diff --git "a/dev.json" "b/dev.json"
new file mode 100644--- /dev/null
+++ "b/dev.json"
@@ -0,0 +1,856 @@
+{"doc_id": "0809.0773", "revision_depth": "1", "before_revision": "Noise can significantly influence the behaviour of biochemical reaction networks. While ordinary differential equation (ODE) models remain the conceptual framework for modelling many cellular processes, specific situations demand stochastic models to capture the influence of noise. The most common formulation of stochastic models for biochemical networks is the chemical master equation (CME). While stochastic simulations are a practical way to realise the CME, analytical approximations offer more insights into the influence of noise on cell function. Towards this end, the recently developed two-moment approximation (2MA) is a promising approach, accounting for the coupling between the means and ( co)variances. It is this influence of ( co)variance on the mean behaviour, which cannot be represented by conventional ODE models. We extend the derivation of the 2MA by establishing two advances to previous efforts: a) relative concentrations and b) non-elementary reactions. Both aspects are important in systems biology where one is often forced to aggregate elementary reactions into single stepreactions, and some models use relative concentrations (as a ratio of two concentrations or copy numbers). Previous derivations assume elementary reactions and rely on concentrations defined as copy numbers per unit volume. We demonstrate this 2MA approach with an application to the well established fission yeast cell cycle model. The simulations of the 2MA model show oscillatory behaviour near the M / G checkpoint. The behaviour around this bifurcation point is significantly different from that predicted by the ODE model. What this suggests is that the 2MA approach can reveal hidden dynamics near critical points .", "after_revision": " While ordinary differential equations (ODEs) form the conceptual framework for modelling many cellular processes, specific situations demand stochastic models to capture the influence of noise. The most common formulation of stochastic models for biochemical networks is the chemical master equation (CME). While stochastic simulations are a practical way to realise the CME, analytical approximations offer more insight into the influence of noise . Towards that end, the two-moment approximation (2MA) is a promising addition to the established analytical approaches including the chemical Langevin equation (CLE) and the related linear noise approximation (LNA). The 2MA approach directly tracks the mean and ( co)variance which are coupled in general. This coupling is not obvious in CME and CLE and ignored by LNA and conventional ODE models. We extend previous derivations of 2MA by allowing a) non-elementary reactions and b) relative concentrations. Often, several elementary reactions are approximated by a single step. Furthermore, practical situations often require the use relative concentrations . We investigate the applicability of the 2MA approach to the well established fission yeast cell cycle model. Our analytical model reproduces the clustering of cycle times observed in experiments. This is explained through multiple resettings of MPF, caused by the coupling between mean and (co)variance, near the G2 / M transition .", "edit_actions": [{"type": "D", "before": "Noise can significantly influence the behaviour of biochemical reaction networks.", "after": null, "start_char_pos": 0, "end_char_pos": 81}, {"type": "R", "before": "equation (ODE) models remain", "after": "equations (ODEs) form", "start_char_pos": 110, "end_char_pos": 138}, {"type": "R", "before": "insights", "after": "insight", "start_char_pos": 502, "end_char_pos": 510}, {"type": "R", "before": "on cell function. Towards this", "after": ". Towards that", "start_char_pos": 539, "end_char_pos": 569}, {"type": "D", "before": "recently developed", "after": null, "start_char_pos": 579, "end_char_pos": 597}, {"type": "R", "before": "approach, accounting for the coupling between the means and", "after": "addition to the established analytical approaches including the chemical Langevin equation (CLE) and the related linear noise approximation (LNA). The 2MA approach directly tracks the mean and", "start_char_pos": 644, "end_char_pos": 703}, {"type": "D", "before": "co)variances. It is this influence of (", "after": null, "start_char_pos": 706, "end_char_pos": 745}, {"type": "R", "before": "on the mean behaviour, which cannot be represented by", "after": "which are coupled in general. This coupling is not obvious in CME and CLE and ignored by LNA and", "start_char_pos": 758, "end_char_pos": 811}, {"type": "R", "before": "the derivation of the", "after": "previous derivations of", "start_char_pos": 847, "end_char_pos": 868}, {"type": "R", "before": "establishing two advances to previous efforts: a) relative concentrations", "after": "allowing a) non-elementary reactions", "start_char_pos": 876, "end_char_pos": 949}, {"type": "R", "before": "non-elementary reactions. Both aspects are important in systems biology where one is often forced to aggregate elementary reactions into single stepreactions, and some models", "after": "relative concentrations. Often, several elementary reactions are approximated by a single step. Furthermore, practical situations often require the", "start_char_pos": 957, "end_char_pos": 1131}, {"type": "R", "before": "(as a ratio of two concentrations or copy numbers). Previous derivations assume elementary reactions and rely on concentrations defined as copy numbers per unit volume. We demonstrate this", "after": ". We investigate the applicability of the", "start_char_pos": 1160, "end_char_pos": 1348}, {"type": "D", "before": "with an application", "after": null, "start_char_pos": 1362, "end_char_pos": 1381}, {"type": "R", "before": "The simulations of the 2MA model show oscillatory behaviour near the M", "after": "Our analytical model reproduces the clustering of cycle times observed in experiments. This is explained through multiple resettings of MPF, caused by the coupling between mean and (co)variance, near the G2", "start_char_pos": 1438, "end_char_pos": 1508}, {"type": "R", "before": "G checkpoint. The behaviour around this bifurcation point is significantly different from that predicted by the ODE model. What this suggests is that the 2MA approach can reveal hidden dynamics near critical points", "after": "M transition", "start_char_pos": 1511, "end_char_pos": 1725}], "sents_char_pos": [0, 81, 282, 395, 556, 719, 836, 982, 1211, 1328, 1437, 1524, 1633]}
+{"doc_id": "0901.4904", "revision_depth": "2", "before_revision": "A continuum model has been posited for the global analysis of data pertaining to the semantic network of a complex operating system ( free and open-source software ) . While the frequency distributions of links in both the in-directed and out-directed dependency networks of this system follow Zipf's law for the intermediate nodes, the richest nodes, as well as the weakest nodes, deviate from this trend , and exhibit a saturation behaviour arising from the finiteness of semantic possibilities in the network. To preserve uniqueness of operations in the network, the nodes obey an \"exclusion principle\", with no two nodes being exactly alike in their functionality. The parameters related to finite-size behaviour make a quantitative distinction between the two directed networks of incoming and outgoing links . Dynamic evolution , over two generations of free software releases , shows that the saturation properties of the in-directed and out-directed networks are oppositely affected . For the out-degree distribution, whose top nodes form the foundation of the entire network, the initial condition for a dynamic model, evolving towards a steady scale-free frequency distribution of nodes, determines the finite limit to the number of top nodes that the mature out-directed network can have .", "after_revision": "A continuum model has been proposed to fit the data pertaining to the directed networks in free and open-source software . While the degree distributions of links in both the in-directed and out-directed dependency networks follow Zipf's law for the intermediate nodes, the most richly linked nodes, as well as the most poorly linked nodes, deviate from this trend and exhibit finite-size effects. The finite-size parameters make a quantitative distinction between the in-directed and out-directed networks . Dynamic evolution of free software releases shows that the finite-size properties of the in-directed and out-directed networks are opposite in nature . For the out-degree distribution, the initial condition for a dynamic evolution also corresponds to the limiting count of rich nodes that the mature out-directed network can have . The number of nodes contributing out-directed links grows with each passing generation of software release, but this growth ultimately saturates towards a finite value due to the finiteness of semantic possibilities in the network .", "edit_actions": [{"type": "R", "before": "posited for the global analysis of", "after": "proposed to fit the", "start_char_pos": 27, "end_char_pos": 61}, {"type": "R", "before": "semantic network of a complex operating system (", "after": "directed networks in", "start_char_pos": 85, "end_char_pos": 133}, {"type": "D", "before": ")", "after": null, "start_char_pos": 164, "end_char_pos": 165}, {"type": "R", "before": "frequency", "after": "degree", "start_char_pos": 178, "end_char_pos": 187}, {"type": "D", "before": "of this system", "after": null, "start_char_pos": 272, "end_char_pos": 286}, {"type": "R", "before": "richest", "after": "most richly linked", "start_char_pos": 337, "end_char_pos": 344}, {"type": "R", "before": "weakest", "after": "most poorly linked", "start_char_pos": 367, "end_char_pos": 374}, {"type": "R", "before": ", and exhibit a saturation behaviour arising from the finiteness of semantic possibilities in the network. To preserve uniqueness of operations in the network, the nodes obey an \"exclusion principle\", with no two nodes being exactly alike in their functionality. The parameters related to", "after": "and exhibit", "start_char_pos": 406, "end_char_pos": 694}, {"type": "R", "before": "behaviour", "after": "effects. The finite-size parameters", "start_char_pos": 707, "end_char_pos": 716}, {"type": "R", "before": "two directed networks of incoming and outgoing links", "after": "in-directed and out-directed networks", "start_char_pos": 761, "end_char_pos": 813}, {"type": "D", "before": ", over two generations", "after": null, "start_char_pos": 834, "end_char_pos": 856}, {"type": "D", "before": ",", "after": null, "start_char_pos": 883, "end_char_pos": 884}, {"type": "R", "before": "saturation", "after": "finite-size", "start_char_pos": 900, "end_char_pos": 910}, {"type": "R", "before": "oppositely affected", "after": "opposite in nature", "start_char_pos": 971, "end_char_pos": 990}, {"type": "R", "before": "whose top nodes form the foundation of the entire network, the", "after": "the", "start_char_pos": 1026, "end_char_pos": 1088}, {"type": "R", "before": "model, evolving towards a steady scale-free frequency distribution of nodes, determines the finite limit to the number of top", "after": "evolution also corresponds to the limiting count of rich", "start_char_pos": 1121, "end_char_pos": 1246}, {"type": "A", "before": null, "after": ". The number of nodes contributing out-directed links grows with each passing generation of software release, but this growth ultimately saturates towards a finite value due to the finiteness of semantic possibilities in the network", "start_char_pos": 1299, "end_char_pos": 1299}], "sents_char_pos": [0, 332, 512, 668, 992]}
+{"doc_id": "0902.1328", "revision_depth": "2", "before_revision": "We study the class of Azema-Yor processes defined from a general semimartingale with a continuous running supremum process. We show that they arise as unique strong solutions of the Bachelier stochastic differential equation which we prove is equivalent to the Drawdown equation. Solutions of the latter have the drawdown property: they always stay above a given function of their past supremum . We then show that any process which satisfies the drawdown property is in fact an Azema-Yor process. The proofs exploit group structure of the set of Azema-Yor processes, indexed by functions, which we introduce. Secondly we study in detail Azema-Yor martingales defined from a non-negative local martingale converging to zero at infinity. We establish relations between Average Value at Risk, Drawdown function, Hardy-Littlewood transform and its generalised inverse. In particular, we construct Azema-Yor martingales with a given terminal law and this allows us to rediscover the Azema-Yor solution to the Skorokhod embedding problem. Finally, we characterise Azema-Yor martingales showing they are optimal relative to the concave ordering of terminal variables among martingales whose maximum dominates stochastically a given benchmark.", "after_revision": "We study the class of Az\\'ema-Yor processes defined from a general semimartingale with a continuous running maximum process. We show that they arise as unique strong solutions of the Bachelier stochastic differential equation which we prove is equivalent to the drawdown equation. Solutions of the latter have the drawdown property: they always stay above a given function of their past maximum . We then show that any process which satisfies the drawdown property is in fact an Az\\'ema-Yor process. The proofs exploit group structure of the set of Az\\'ema-Yor processes, indexed by functions, which we introduce. We investigate in detail Az\\'ema-Yor martingales defined from a nonnegative local martingale converging to zero at infinity. We establish relations between average value at risk, drawdown function, Hardy-Littlewood transform and its inverse. In particular, we construct Az\\'ema-Yor martingales with a given terminal law and this allows us to rediscover the Az\\'ema-Yor solution to the Skorokhod embedding problem. Finally, we characterize Az\\'ema-Yor martingales showing they are optimal relative to the concave ordering of terminal variables among martingales whose maximum dominates stochastically a given benchmark.", "edit_actions": [{"type": "R", "before": "Azema-Yor", "after": "Az\\'ema-Yor", "start_char_pos": 22, "end_char_pos": 31}, {"type": "R", "before": "supremum", "after": "maximum", "start_char_pos": 106, "end_char_pos": 114}, {"type": "R", "before": "Drawdown", "after": "drawdown", "start_char_pos": 261, "end_char_pos": 269}, {"type": "R", "before": "supremum", "after": "maximum", "start_char_pos": 386, "end_char_pos": 394}, {"type": "R", "before": "Azema-Yor", "after": "Az\\'ema-Yor", "start_char_pos": 479, "end_char_pos": 488}, {"type": "R", "before": "Azema-Yor", "after": "Az\\'ema-Yor", "start_char_pos": 547, "end_char_pos": 556}, {"type": "R", "before": "Secondly we study in detail Azema-Yor", "after": "We investigate in detail Az\\'ema-Yor", "start_char_pos": 610, "end_char_pos": 647}, {"type": "R", "before": "non-negative", "after": "nonnegative", "start_char_pos": 675, "end_char_pos": 687}, {"type": "R", "before": "Average Value at Risk, Drawdown", "after": "average value at risk, drawdown", "start_char_pos": 768, "end_char_pos": 799}, {"type": "D", "before": "generalised", "after": null, "start_char_pos": 845, "end_char_pos": 856}, {"type": "R", "before": "Azema-Yor", "after": "Az\\'ema-Yor", "start_char_pos": 894, "end_char_pos": 903}, {"type": "R", "before": "Azema-Yor", "after": "Az\\'ema-Yor", "start_char_pos": 979, "end_char_pos": 988}, {"type": "R", "before": "characterise Azema-Yor", "after": "characterize Az\\'ema-Yor", "start_char_pos": 1046, "end_char_pos": 1068}], "sents_char_pos": [0, 123, 279, 396, 497, 609, 736, 865, 1033]}
+{"doc_id": "0905.2770", "revision_depth": "1", "before_revision": "In this paper we revisit the problem of pricing and hedging plain vanilla single currency interest rate derivatives using different yield curves for market coherent estimation of discount factors and forward rates with different underlying rate tenors (e. g. Euribor 3 months, 6 months,.etc.). Within such double-curve-single-currency framework, adopted by the market after the liquidity crisis started in summer 2007, standard single-curve no arbitrage relations are no longer valid and can be formally recovered through the introduction of a basis adjustment . Numerical results show that the resulting basis adjustment curves may display an oscillating micro-term structure that may induce appreciable effects on the price of interest rate instruments. Recurring to the foreign-currency analogy we also derive no arbitrage, double-curve market-like formulas for basic plain vanilla interest rate derivatives, FRAs, swaps, caps/floors and swaptions in particular. These expressions include a quanto adjustment typical of cross-currency derivatives, naturally originated by the change between the numeraires associated to the two yield curves, that carries on a volatility and correlation dependence. Numerical scenarios confirm that such correction can be non-negligible , thus making unadjusted double-curve prices, in principle, not arbitrage free .", "after_revision": "We revisit the problem of pricing and hedging plain vanilla single-currency interest rate derivatives using multiple distinct yield curves for market coherent estimation of discount factors and forward rates with different underlying rate tenors . Within such double-curve-single-currency framework, adopted by the market after the credit-crunch crisis started in summer 2007, standard single-curve no-arbitrage relations are no longer valid , and can be recovered by taking properly into account the forward basis bootstrapped from market basis swaps . Numerical results show that the resulting forward basis curves may display a richer micro-term structure that may induce appreciable effects on the price of interest rate instruments. By recurring to the foreign-currency analogy we also derive generalised no-arbitrage double-curve market-like formulas for basic plain vanilla interest rate derivatives, FRAs, swaps, caps/floors and swaptions in particular. These expressions include a quanto adjustment typical of cross-currency derivatives, naturally originated by the change between the numeraires associated to the two yield curves, that carries on a volatility and correlation dependence. Numerical scenarios confirm that such correction can be non negligible , thus making unadjusted double-curve prices, in principle, not arbitrage free . Both the forward basis and the quanto adjustment find a natural financial explanation in terms of counterparty risk .", "edit_actions": [{"type": "R", "before": "In this paper we", "after": "We", "start_char_pos": 0, "end_char_pos": 16}, {"type": "R", "before": "single currency", "after": "single-currency", "start_char_pos": 74, "end_char_pos": 89}, {"type": "R", "before": "different", "after": "multiple distinct", "start_char_pos": 122, "end_char_pos": 131}, {"type": "R", "before": "(e. g. Euribor 3 months, 6 months,.etc.).", "after": ".", "start_char_pos": 252, "end_char_pos": 293}, {"type": "R", "before": "liquidity", "after": "credit-crunch", "start_char_pos": 378, "end_char_pos": 387}, {"type": "R", "before": "no arbitrage", "after": "no-arbitrage", "start_char_pos": 441, "end_char_pos": 453}, {"type": "A", "before": null, "after": ",", "start_char_pos": 484, "end_char_pos": 484}, {"type": "R", "before": "formally recovered through the introduction of a basis adjustment", "after": "recovered by taking properly into account the forward basis bootstrapped from market basis swaps", "start_char_pos": 496, "end_char_pos": 561}, {"type": "R", "before": "basis adjustment", "after": "forward basis", "start_char_pos": 606, "end_char_pos": 622}, {"type": "R", "before": "an oscillating", "after": "a richer", "start_char_pos": 642, "end_char_pos": 656}, {"type": "R", "before": "Recurring", "after": "By recurring", "start_char_pos": 757, "end_char_pos": 766}, {"type": "R", "before": "no arbitrage,", "after": "generalised no-arbitrage", "start_char_pos": 814, "end_char_pos": 827}, {"type": "R", "before": "non-negligible", "after": "non negligible", "start_char_pos": 1259, "end_char_pos": 1273}, {"type": "A", "before": null, "after": ". Both the forward basis and the quanto adjustment find a natural financial explanation in terms of counterparty risk", "start_char_pos": 1353, "end_char_pos": 1353}], "sents_char_pos": [0, 293, 756, 966, 1202]}
+{"doc_id": "0905.3502", "revision_depth": "1", "before_revision": "The study of biochemical pathways usually focuses on a small section of the protein interaction network. Fluctuations in such a system are not only generated intrinsically by molecular dynamics, but also extrinsically, by interactions of the system with the rest of the network and its environment. Concentration fluctuations of a substance outside the studied system can enter it through a nonlinear uptake reaction which acts as a nonlinear filter. Varying the intensity of the input noise varies the mean of the output noise after the passage through the filter, which causes a change of stability properties of the system. Using an analytical method of small noise expansion, I prove that when weak and rapid noise enters the system through a reaction of Michaelis-Menten type (reactionrate function monotonically increasing and concave) , then the steady states of the system always shift to the right as noise intensity increases. I demonstrate this by an example of two different models of lac operon . The bistable switch responds to fluctuations in extracellular TMG/lactose concentration in an asymmetric manner because of the displacement of its bistability region to the right: As noise intensity increases, uninduction becomes easier and induction becomes more difficult . The steady-state displacement due to weak and rapid extrinsic noise passing through a nonlinear filter is a universal phenomenon: It is independent of the kinetics of the system but it only depends on the filtering function. The calculation method presented enables even qualitative predictions of this effect, only by inspection of the experimental data .", "after_revision": "The study of biochemical pathways usually focuses on a small section of a protein interactions network. Two distinct sources contribute to the noise in such a system : intrinsic noise, inherent in the studied reactions, and extrinsic noise generated in other parts of the network or in the environment. We study the effect of extrinsic noise entering the system through a nonlinear uptake reaction which acts as a nonlinear filter. Varying input noise intensity varies the mean of the noise after the passage through the filter, which changes the stability properties of the system. The steady-state displacement due to small noise is independent on the kinetics of the system but it only depends on the nonlinearity of the input function. For monotonically increasing and concave input functions such as the Michaelis-Menten uptake rate, we give a simple argument based on the small-noise expansion, which enables qualitative predictions of the steady-state displacement only by inspection of experimental data: when weak and rapid noise enters the system through a Michaelis-Menten reaction , then the graph of the system's steady states vs. the mean of the input signal always shifts to the right as noise intensity increases. We test the predictions on two models of lac operon , where TMG/lactose uptake is driven by a Michaelis-Menten enzymatic process. We show that as a consequence of the steady state displacement due to fluctuations in extracellular TMG/lactose concentration the lac switch responds in an asymmetric manner : as noise intensity increases, switching off lactose metabolism becomes easier and switching it on becomes more difficult .", "edit_actions": [{"type": "R", "before": "the protein interaction network. Fluctuations", "after": "a protein interactions network. Two distinct sources contribute to the noise", "start_char_pos": 72, "end_char_pos": 117}, {"type": "R", "before": "are not only generated intrinsically by molecular dynamics, but also extrinsically, by interactions of the system with the rest of the network and its environment. Concentration fluctuations of a substance outside the studied system can enter it", "after": ": intrinsic noise, inherent in the studied reactions, and extrinsic noise generated in other parts of the network or in the environment. We study the effect of extrinsic noise entering the system", "start_char_pos": 135, "end_char_pos": 380}, {"type": "R", "before": "the intensity of the input noise", "after": "input noise intensity", "start_char_pos": 459, "end_char_pos": 491}, {"type": "D", "before": "output", "after": null, "start_char_pos": 515, "end_char_pos": 521}, {"type": "R", "before": "causes a change of", "after": "changes the", "start_char_pos": 572, "end_char_pos": 590}, {"type": "R", "before": "Using an analytical method of small noise expansion, I prove that", "after": "The steady-state displacement due to small noise is independent on the kinetics of the system but it only depends on the nonlinearity of the input function. For monotonically increasing and concave input functions such as the Michaelis-Menten uptake rate, we give a simple argument based on the small-noise expansion, which enables qualitative predictions of the steady-state displacement only by inspection of experimental data:", "start_char_pos": 627, "end_char_pos": 692}, {"type": "D", "before": "reaction of", "after": null, "start_char_pos": 747, "end_char_pos": 758}, {"type": "R", "before": "type (reactionrate function monotonically increasing and concave)", "after": "reaction", "start_char_pos": 776, "end_char_pos": 841}, {"type": "R", "before": "steady states of the system always shift", "after": "graph of the system's steady states vs. the mean of the input signal always shifts", "start_char_pos": 853, "end_char_pos": 893}, {"type": "R", "before": "I demonstrate this by an example of two different", "after": "We test the predictions on two", "start_char_pos": 937, "end_char_pos": 986}, {"type": "R", "before": ". The bistable switch responds", "after": ", where TMG/lactose uptake is driven by a Michaelis-Menten enzymatic process. We show that as a consequence of the steady state displacement due", "start_char_pos": 1008, "end_char_pos": 1038}, {"type": "A", "before": null, "after": "the lac switch responds", "start_char_pos": 1098, "end_char_pos": 1098}, {"type": "R", "before": "because of the displacement of its bistability region to the right: As", "after": ": as", "start_char_pos": 1123, "end_char_pos": 1193}, {"type": "R", "before": "uninduction", "after": "switching off lactose metabolism", "start_char_pos": 1221, "end_char_pos": 1232}, {"type": "R", "before": "induction", "after": "switching it on", "start_char_pos": 1252, "end_char_pos": 1261}, {"type": "D", "before": ". The steady-state displacement due to weak and rapid extrinsic noise passing through a nonlinear filter is a universal phenomenon: It is independent of the kinetics of the system but it only depends on the filtering function. The calculation method presented enables even qualitative predictions of this effect, only by inspection of the experimental data", "after": null, "start_char_pos": 1285, "end_char_pos": 1641}], "sents_char_pos": [0, 104, 298, 450, 626, 936, 1009, 1286, 1511]}
+{"doc_id": "0906.4279", "revision_depth": "1", "before_revision": "We propose a new approximation to the description of intracellular dynamics , based on quantum principles. We introduce the notion of \"Catalytic force\" Cf , as a back-action effect of the molecular target of catalysis on the catalytic microenvironment , adjusting the microenvironment towards a state that facilitates the catalytic act. This mechanism is proposed as a new physical justification for the URLanization phenomenon, having an advantage over more traditional approaches based on statistical mechanics of open systems far from equilibrium, as it does not encounter the problem of \"tradeoff between stability and complexity\" at the level of individual cell. The Cf is considered as a force of reaction, which keeps the physical state of the cell close to the ground state, where all enzymatic acts work perfectly well. Given that ground state is subject to unitary evolution, this notion is proposed as a starting point in a more general strategy of quantum description of intracellular processes, termed here \"Euclidean approach\". The next step of this strategy is transition from the description of ground state to that one of growth , and we suggest how it can be accomplished using arguments from the fluctuation-dissipation theorem. Finally, we argue that biological adaptation could be a general situation to experimentally observe quantum entanglement in biological systems. Given that the most reliable and informative observable of an individual cell is the sequence of its genome, we propose that the nonclassical correlations between individual molecular events at the a single cell level could be easiest to detect using high throughput DNA sequencing.", "after_revision": "Application of quantum principles to living cells requires a new approximation of the full quantum mechanical description of intracellular dynamics . We discuss what principal elements any such good approximation should contain. As one such element, the notion of \"Catalytic force\" Cf is introduced. Cf is the effect of the molecular target of catalysis on the catalytic microenvironment that adjusts the microenvironment towards a state that facilitates the catalytic act. This phenomenon is experimentally testable and has an intriguing implication for URLanization and evolution, as it amounts to \"optimization without natural selection of replicators\". Unlike the statistical-mechanical approaches to URLanization, the Cf principle does not encounter the problem of \"tradeoff between stability and complexity\" at the level of individual cell. Physically, the Cf is considered as a harmonic-like force of reaction, which keeps the state of the cell close to the ground state, defined here as a state where enzymatic acts work most efficiently. Ground state is subject to unitary evolution, and serves as a starting point in a general strategy of quantum description of intracellular processes, termed here \"Euclidean approach\". The next step of this strategy is transition from the description of ground state to that one of growing state , and we suggest how it can be accomplished using arguments from the fluctuation-dissipation theorem. Finally, given that the most reliable and informative observable of an individual cell is the sequence of its genome, we propose that the non-classical correlations between individual molecular events at the single cell level could be easiest to detect using high throughput DNA sequencing.", "edit_actions": [{"type": "R", "before": "We propose", "after": "Application of quantum principles to living cells requires", "start_char_pos": 0, "end_char_pos": 10}, {"type": "R", "before": "to the", "after": "of the full quantum mechanical", "start_char_pos": 31, "end_char_pos": 37}, {"type": "R", "before": ", based on quantum principles. We introduce", "after": ". We discuss what principal elements any such good approximation should contain. As one such element,", "start_char_pos": 76, "end_char_pos": 119}, {"type": "R", "before": ", as a back-action", "after": "is introduced. Cf is the", "start_char_pos": 155, "end_char_pos": 173}, {"type": "R", "before": ", adjusting", "after": "that adjusts", "start_char_pos": 252, "end_char_pos": 263}, {"type": "R", "before": "mechanism is proposed as a new physical justification for the URLanization phenomenon, having an advantage over more traditional approaches based on statistical mechanics of open systems far from equilibrium, as it", "after": "phenomenon is experimentally testable and has an intriguing implication for URLanization and evolution, as it amounts to \"optimization without natural selection of replicators\". Unlike the statistical-mechanical approaches to URLanization, the Cf principle", "start_char_pos": 342, "end_char_pos": 556}, {"type": "R", "before": "The", "after": "Physically, the", "start_char_pos": 668, "end_char_pos": 671}, {"type": "A", "before": null, "after": "harmonic-like", "start_char_pos": 694, "end_char_pos": 694}, {"type": "D", "before": "physical", "after": null, "start_char_pos": 730, "end_char_pos": 738}, {"type": "R", "before": "where all", "after": "defined here as a state where", "start_char_pos": 784, "end_char_pos": 793}, {"type": "R", "before": "perfectly well. Given that ground", "after": "most efficiently. Ground", "start_char_pos": 814, "end_char_pos": 847}, {"type": "R", "before": "this notion is proposed", "after": "and serves", "start_char_pos": 887, "end_char_pos": 910}, {"type": "D", "before": "more", "after": null, "start_char_pos": 936, "end_char_pos": 940}, {"type": "R", "before": "growth", "after": "growing state", "start_char_pos": 1140, "end_char_pos": 1146}, {"type": "R", "before": "we argue that biological adaptation could be a general situation to experimentally observe quantum entanglement in biological systems. Given that", "after": "given that", "start_char_pos": 1258, "end_char_pos": 1403}, {"type": "R", "before": "nonclassical", "after": "non-classical", "start_char_pos": 1522, "end_char_pos": 1534}, {"type": "D", "before": "a", "after": null, "start_char_pos": 1591, "end_char_pos": 1592}], "sents_char_pos": [0, 106, 336, 667, 829, 1042, 1248, 1392]}
+{"doc_id": "0909.1974", "revision_depth": "1", "before_revision": "This article aims at reviewing recent empirical and theoretical developments usually grouped under the term Econophysics. This new interdisciplinary field has grown in various directions: theoretical macroeconomics (wealth distributions), microstructure of financial markets (order book modeling ), econometrics of financial bubbles and crashes . We give a brief introduction and begin with discussing interactions between Physics, Mathematics, Economics and Finance that led to the emergence of Econophysics in the second part. Then the third part is dedicated to empirical studies revealing statistical properties of financial time series. We begin the presentation with the widely acknowledged \"stylized facts \" describing the distribution of the returns of financial assets: fat-tails , volatility clustering, etc. Then we show that some of these properties are directly linked to the way \"time \" is taken into account. We continue with the statistical properties observed on order books in financial markets. Contributions to the study of correlations of assets such as random matrix theory and graph theory are finally presentedin this part. The fourth part of our reviewdeals with models in Econophysics through the point of view of agent-based modeling. Using previous work originally presented in the fields of behavioural finance and market microstructure theory, econophysicists have developed agent-based models of order-driven markets that are extensively reviewed here. We then turn to models of wealth distribution where an agent-based approach also prevails: kinetic theory models , and continue with game theory models and review the now classic minority games. We end this review by providing an outlook on possible directions of research .", "after_revision": "This article aims at reviewing recent empirical and theoretical developments usually grouped under the term Econophysics. Since its name was coined in 1995 by merging the words Economics and Physics, this new interdisciplinary field has grown in various directions: theoretical macroeconomics (wealth distributions), microstructure of financial markets (order book modelling ), econometrics of financial bubbles and crashes , etc. In the first part of the review, we discuss on the emergence of Econophysics . Then we present empirical studies revealing statistical properties of financial time series. We begin the presentation with the widely acknowledged stylized facts which describe the returns of financial assets- fat tails , volatility clustering, autocorrelation, etc.- and recall that some of these properties are directly linked to the way time is taken into account. We continue with the statistical properties observed on order books in financial markets. For the sake of illustrating this review, (nearly) all the stated facts are reproduced using our own high-frequency financial database. Finally, contributions to the study of correlations of assets such as random matrix theory and graph theory are presented. In the second part of the review, we deal with models in Econophysics through the point of view of agent-based modelling. Amongst a large number of multi-agent-based models, we have identified three representative areas. First, using previous work originally presented in the fields of behavioural finance and market microstructure theory, econophysicists have developed agent-based models of order-driven markets that are extensively presented here. Second, kinetic theory models designed to explain some empirical facts on wealth distribution are reviewed. Third, we briefly summarize game theory models by reviewing the now classic minority game and related problems .", "edit_actions": [{"type": "R", "before": "This", "after": "Since its name was coined in 1995 by merging the words Economics and Physics, this", "start_char_pos": 122, "end_char_pos": 126}, {"type": "R", "before": "modeling", "after": "modelling", "start_char_pos": 287, "end_char_pos": 295}, {"type": "R", "before": ". We give a brief introduction and begin with discussing interactions between Physics, Mathematics, Economics and Finance that led to", "after": ", etc. In the first part of the review, we discuss on", "start_char_pos": 345, "end_char_pos": 478}, {"type": "R", "before": "in the second part. Then the third part is dedicated to", "after": ". Then we present", "start_char_pos": 509, "end_char_pos": 564}, {"type": "R", "before": "\"stylized facts \" describing the distribution of the", "after": "stylized facts which describe the", "start_char_pos": 697, "end_char_pos": 749}, {"type": "R", "before": "assets: fat-tails", "after": "assets- fat tails", "start_char_pos": 771, "end_char_pos": 788}, {"type": "R", "before": "etc. Then we show", "after": "autocorrelation, etc.- and recall", "start_char_pos": 814, "end_char_pos": 831}, {"type": "R", "before": "\"time \"", "after": "time", "start_char_pos": 893, "end_char_pos": 900}, {"type": "R", "before": "Contributions", "after": "For the sake of illustrating this review, (nearly) all the stated facts are reproduced using our own high-frequency financial database. Finally, contributions", "start_char_pos": 1014, "end_char_pos": 1027}, {"type": "R", "before": "finally presentedin this part. The fourth part of our reviewdeals", "after": "presented. In the second part of the review, we deal", "start_char_pos": 1117, "end_char_pos": 1182}, {"type": "R", "before": "modeling. Using", "after": "modelling. Amongst a large number of multi-agent-based models, we have identified three representative areas. First, using", "start_char_pos": 1252, "end_char_pos": 1267}, {"type": "R", "before": "reviewed here. We then turn to models of wealth distribution where an agent-based approach also prevails:", "after": "presented here. Second,", "start_char_pos": 1469, "end_char_pos": 1574}, {"type": "R", "before": ", and continue with", "after": "designed to explain some empirical facts on wealth distribution are reviewed. Third, we briefly summarize", "start_char_pos": 1597, "end_char_pos": 1616}, {"type": "R", "before": "and review", "after": "by reviewing", "start_char_pos": 1636, "end_char_pos": 1646}, {"type": "R", "before": "games. We end this review by providing an outlook on possible directions of research", "after": "game and related problems", "start_char_pos": 1672, "end_char_pos": 1756}], "sents_char_pos": [0, 121, 346, 528, 641, 818, 923, 1013, 1147, 1261, 1483, 1678]}
+{"doc_id": "0909.5125", "revision_depth": "1", "before_revision": "A bacteria colony may develop a small number of cells genetically identical , but phenotypically different from the majority cells in the populations . These so-called persister cells are insensitive to antibiotics treatment, and contribute to the serious problem of drug resistance. Resonant activation (RA) is a well-studied phenomenon in thermally activated barrier crossing events, where internal noise can constructively facilitate the barrier crossing . Through stochastic Gilliespie simulation with a generic toggle switch model, we demonstrated that the phenomenon also exist for cell phenotype switching . Then we used coupled single cell and population simulations to demonstrate that one can greatly reduce the time and the total amount of antibiotics needed to extinct a bacteria populationwith RA. We also suggested that RA can find application in other situations such as cancer radiotherapy .", "after_revision": "A bacterial colony may develop a small number of cells genetically identical to , but phenotypically different from other normally growing bacteria . These so-called persister cells keep themselves in a dormant state and thus are insensitive to antibiotic treatment, resulting in serious problems of drug resistance. In this paper, we proposed a novel strategy to \"kill\" persister cells by triggering them to switch, in a fast and synchronized way, into normally growing cells that are susceptible to antibiotics. The strategy is based on resonant activation (RA) , a well-studied phenomenon in physics where the internal noise of a system can constructively facilitate fast and synchronized barrier crossings . Through stochastic Gilliespie simulation with a generic toggle switch model, we demonstrated that RA exists in the phenotypic switching of a single bacterium. Further, by coupling single cell level and population level simulations, we showed that with RA, one can greatly reduce the time and total amount of antibiotics needed to sterilize a bacterial population. We suggest that resonant activation is a general phenomenon in phenotypic transition, and can find other applications such as cancer therapy .", "edit_actions": [{"type": "R", "before": "bacteria", "after": "bacterial", "start_char_pos": 2, "end_char_pos": 10}, {"type": "A", "before": null, "after": "to", "start_char_pos": 76, "end_char_pos": 76}, {"type": "R", "before": "the majority cells in the populations", "after": "other normally growing bacteria", "start_char_pos": 113, "end_char_pos": 150}, {"type": "A", "before": null, "after": "keep themselves in a dormant state and thus", "start_char_pos": 185, "end_char_pos": 185}, {"type": "R", "before": "antibiotics treatment, and contribute to the serious problem", "after": "antibiotic treatment, resulting in serious problems", "start_char_pos": 205, "end_char_pos": 265}, {"type": "R", "before": "Resonant", "after": "In this paper, we proposed a novel strategy to \"kill\" persister cells by triggering them to switch, in a fast and synchronized way, into normally growing cells that are susceptible to antibiotics. The strategy is based on resonant", "start_char_pos": 286, "end_char_pos": 294}, {"type": "R", "before": "is", "after": ",", "start_char_pos": 311, "end_char_pos": 313}, {"type": "R", "before": "thermally activated barrier crossing events, where internal noise", "after": "physics where the internal noise of a system", "start_char_pos": 343, "end_char_pos": 408}, {"type": "R", "before": "the barrier crossing", "after": "fast and synchronized barrier crossings", "start_char_pos": 439, "end_char_pos": 459}, {"type": "R", "before": "the phenomenon also exist for cell phenotype switching . Then we used coupled single cell and population simulations to demonstrate that", "after": "RA exists in the phenotypic switching of a single bacterium. Further, by coupling single cell level and population level simulations, we showed that with RA,", "start_char_pos": 560, "end_char_pos": 696}, {"type": "D", "before": "the", "after": null, "start_char_pos": 733, "end_char_pos": 736}, {"type": "R", "before": "extinct a bacteria populationwith RA. We also suggested that RA can find application in other situations", "after": "sterilize a bacterial population. We suggest that resonant activation is a general phenomenon in phenotypic transition, and can find other applications", "start_char_pos": 775, "end_char_pos": 879}, {"type": "R", "before": "radiotherapy", "after": "therapy", "start_char_pos": 895, "end_char_pos": 907}], "sents_char_pos": [0, 152, 285, 461, 616, 812]}
+{"doc_id": "1004.4402", "revision_depth": "1", "before_revision": "Futures trading is the core of futures business, and is considered as a typical complex system . To investigate the complexity of futures trading, we employ the analytical method of complex networks. First, we use real trading records from Shanghai Futures Exchange to construct futures trading networks, in which vertices are trading participants, and two vertices have a common edge if the two corresponding investors simultaneously appear in at least one trading record as a purchaser and a seller respectively. Then, we conduct a comprehensive statistical analysis on the constructed futures trading networks , and empirical results show that the futures trading networks exhibit such features as scale-free structure with interesting odd-even-degree divergence in low degree region , small-world effect, URLanization, power-law betweenness distribution, and shrinkage of both average path length and diameter as network size increases. To the best of our knowledge, this is the first work that uses real data to study futures trading networks, and we argue that the research results can shed light on the nature of real futures business.", "after_revision": "Futures trading is the core of futures business, and it is considered as one of the typical complex systems . To investigate the complexity of futures trading, we employ the analytical method of complex networks. First, we use real trading records from the Shanghai Futures Exchange to construct futures trading networks, in which nodes are trading participants, and two nodes have a common edge if the two corresponding investors appear simultaneously in at least one trading record as a purchaser and a seller respectively. Then, we conduct a comprehensive statistical analysis on the constructed futures trading networks . Empirical results show that the futures trading networks exhibit features such as scale-free behavior with interesting odd-even-degree divergence in low-degree regions , small-world effect, URLanization, power-law betweenness distribution, disassortative mixing, and shrinkage of both the average path length and the diameter as network size increases. To the best of our knowledge, this is the first work that uses real data to study futures trading networks, and we argue that the research results can shed light on the nature of real futures business.", "edit_actions": [{"type": "A", "before": null, "after": "it", "start_char_pos": 53, "end_char_pos": 53}, {"type": "R", "before": "a typical complex system", "after": "one of the typical complex systems", "start_char_pos": 71, "end_char_pos": 95}, {"type": "A", "before": null, "after": "the", "start_char_pos": 241, "end_char_pos": 241}, {"type": "R", "before": "vertices", "after": "nodes", "start_char_pos": 316, "end_char_pos": 324}, {"type": "R", "before": "vertices", "after": "nodes", "start_char_pos": 359, "end_char_pos": 367}, {"type": "R", "before": "simultaneously appear", "after": "appear simultaneously", "start_char_pos": 422, "end_char_pos": 443}, {"type": "R", "before": ", and empirical", "after": ". Empirical", "start_char_pos": 615, "end_char_pos": 630}, {"type": "R", "before": "such features", "after": "features such", "start_char_pos": 686, "end_char_pos": 699}, {"type": "R", "before": "structure", "after": "behavior", "start_char_pos": 714, "end_char_pos": 723}, {"type": "R", "before": "low degree region", "after": "low-degree regions", "start_char_pos": 771, "end_char_pos": 788}, {"type": "A", "before": null, "after": "disassortative mixing,", "start_char_pos": 861, "end_char_pos": 861}, {"type": "A", "before": null, "after": "the", "start_char_pos": 884, "end_char_pos": 884}, {"type": "A", "before": null, "after": "the", "start_char_pos": 909, "end_char_pos": 909}], "sents_char_pos": [0, 97, 200, 516, 945]}
+{"doc_id": "1005.1862", "revision_depth": "2", "before_revision": "We consider the estimation of integrated covariance (ICV) matrices of high dimensional diffusion processes based on high frequency observations. We start by studying the most commonly used estimator, the {\\it realized covariance} (RCV) matrix. We show that in the high dimensional case when the dimension p and the observation frequency n grow in the same rate, the limiting spectral distribution (LSD) of the RCV matrix depends on the covolatility process not only through the targeting ICV matrix, but also on how the covolatility process varies in time . We establish a Marcenko-Pastur type theorem for weighted sample covariance matrices, based on which we further establish a Marcenko-Pastur type theorem for RCV matrices for a class \\mathcal{C \\sC of diffusion processes. The results explicitly demonstrate how the time-variability of the covolatility process affects the LSD of RCV matrix. We then propose an alternative estimator, the {\\it time-variation adjusted realized covariance} (TVARCV) matrix. We show that for diffusion processes in class \\mathcal{C \\sC , the TVARCV matrix possesses the desirable property that its LSD depends solely on that of the targeting ICV matrix through a Mar\\v{c}enko-Pastur equation .", "after_revision": "We consider the estimation of integrated covariance (ICV) matrices of high dimensional diffusion processes based on high frequency observations. We start by studying the most commonly used estimator, the {\\it realized covariance} (RCV) matrix. We show that in the high dimensional case when the dimension p and the observation frequency n grow in the same rate, the limiting spectral distribution (LSD) of RCV depends on the covolatility process not only through the targeting ICV,but also on how the covolatility process varies in time . We establish a Marcenko-Pastur type theorem for weighted sample covariance matrices, based on which we obtain a Marcenko-Pastur type theorem for RCV for a class \\sC of diffusion processes. The results explicitly demonstrate how the time variability of the covolatility process affects the LSD of RCV . We further propose an alternative estimator, the {\\it time-variation adjusted realized covariance} (TVARCV) matrix. We show that for processes in class \\sC , the TVARCV possesses the desirable property that its LSD depends solely on that of the targeting ICV through the Mar\\v{c}enko-Pastur equation , and hence, in particular, the TVARCV can be used to recover the empirical spectral distribution of the ICV by using existing algorithms .", "edit_actions": [{"type": "R", "before": "the RCV matrix", "after": "RCV", "start_char_pos": 406, "end_char_pos": 420}, {"type": "R", "before": "not only through the targeting ICV matrix, but also on how the covolatility process varies in time", "after": "not only through the targeting ICV", "start_char_pos": 457, "end_char_pos": 555}, {"type": "A", "before": null, "after": ",", "start_char_pos": 555, "end_char_pos": 555}, {"type": "A", "before": null, "after": "but also on how the covolatility process varies in time", "start_char_pos": 555, "end_char_pos": 555}, {"type": "R", "before": "further establish", "after": "obtain", "start_char_pos": 661, "end_char_pos": 678}, {"type": "D", "before": "matrices", "after": null, "start_char_pos": 718, "end_char_pos": 726}, {"type": "D", "before": "\\mathcal{C", "after": null, "start_char_pos": 739, "end_char_pos": 749}, {"type": "R", "before": "time-variability", "after": "time variability", "start_char_pos": 821, "end_char_pos": 837}, {"type": "R", "before": "matrix. We then", "after": ". We further", "start_char_pos": 889, "end_char_pos": 904}, {"type": "D", "before": "diffusion", "after": null, "start_char_pos": 1027, "end_char_pos": 1036}, {"type": "D", "before": "\\mathcal{C", "after": null, "start_char_pos": 1056, "end_char_pos": 1066}, {"type": "D", "before": "matrix", "after": null, "start_char_pos": 1084, "end_char_pos": 1090}, {"type": "R", "before": "matrix through a", "after": "through the", "start_char_pos": 1181, "end_char_pos": 1197}, {"type": "A", "before": null, "after": ", and hence, in particular, the TVARCV can be used to recover the empirical spectral distribution of the ICV by using existing algorithms", "start_char_pos": 1227, "end_char_pos": 1227}], "sents_char_pos": [0, 144, 243, 557, 777, 896, 1009]}
+{"doc_id": "1012.0754", "revision_depth": "1", "before_revision": "We propose a general class of models for the simultaneous treatment of equity, corporate bonds, government bonds and derivatives. The noise is generated by a general affine Markov process. The framework allows for stochastic volatility, jumps, the possibility of default and correlations between different assets. We extend the notion of a discounted moment generation function of the log stock price to the case where the underlying can default and show how to calculate it in terms of a coupled system of generalized Riccati equations. This yields an efficient method to compute prices of power payoffs and Fourier transforms . European calls and puts as well as binaries and asset-or-nothing options can then be priced with the fast Fourier transform methods of Carr and Madan (1999) and Lee (2005). Other European payoffs can be approximated by a linear combination of power payoffs and vanilla options. We show the results to be superior to using only power payoffs or vanilla options. We also give conditions for our models to be complete if enough financial instruments are liquidly tradable and study dynamic hedging strategies. As an example we discuss a Heston-type stochastic volatility model with possibility of default and stochastic interest rates.", "after_revision": "We propose a general framework for the simultaneous modeling of equity, government bonds, corporate bonds and derivatives. Uncertainty is generated by a general affine Markov process. The setting allows for stochastic volatility, jumps, the possibility of default and correlation between different assets. We show how to calculate discounted complex moments by solving a coupled system of generalized Riccati equations. This yields an efficient method to compute prices of power payoffs . European calls and puts as well as binaries and asset-or-nothing options can be priced with the fast Fourier transform methods of Carr and Madan (1999) and Lee (2005). Other European payoffs can be approximated with a linear combination of government bonds, power payoffs and vanilla options. We show the results to be superior to using only government bonds and power payoffs or government bonds and vanilla options. We also give conditions for European continent claims in our framework to be replicable if enough financial instruments are liquidly tradable and study dynamic hedging strategies. As an example we discuss a Heston-type stochastic volatility model with possibility of default and stochastic interest rates.", "edit_actions": [{"type": "R", "before": "class of models", "after": "framework", "start_char_pos": 21, "end_char_pos": 36}, {"type": "R", "before": "treatment", "after": "modeling", "start_char_pos": 58, "end_char_pos": 67}, {"type": "R", "before": "corporate bonds, government", "after": "government bonds, corporate", "start_char_pos": 79, "end_char_pos": 106}, {"type": "R", "before": "The noise", "after": "Uncertainty", "start_char_pos": 130, "end_char_pos": 139}, {"type": "R", "before": "framework", "after": "setting", "start_char_pos": 193, "end_char_pos": 202}, {"type": "R", "before": "correlations", "after": "correlation", "start_char_pos": 275, "end_char_pos": 287}, {"type": "D", "before": "extend the notion of a discounted moment generation function of the log stock price to the case where the underlying can default and", "after": null, "start_char_pos": 317, "end_char_pos": 449}, {"type": "R", "before": "it in terms of", "after": "discounted complex moments by solving", "start_char_pos": 472, "end_char_pos": 486}, {"type": "D", "before": "and Fourier transforms", "after": null, "start_char_pos": 605, "end_char_pos": 627}, {"type": "D", "before": "then", "after": null, "start_char_pos": 707, "end_char_pos": 711}, {"type": "R", "before": "by", "after": "with", "start_char_pos": 846, "end_char_pos": 848}, {"type": "A", "before": null, "after": "government bonds,", "start_char_pos": 873, "end_char_pos": 873}, {"type": "A", "before": null, "after": "government bonds and", "start_char_pos": 958, "end_char_pos": 958}, {"type": "A", "before": null, "after": "government bonds and", "start_char_pos": 976, "end_char_pos": 976}, {"type": "R", "before": "our models to be complete", "after": "European continent claims in our framework to be replicable", "start_char_pos": 1022, "end_char_pos": 1047}], "sents_char_pos": [0, 129, 188, 313, 537, 802, 908, 993, 1139]}
+{"doc_id": "1101.0211", "revision_depth": "1", "before_revision": "We study spectra of directed networks with inhibitory and excitatory couplings. Particularly, we investigate eigenvector localization properties of various model networks with varying correlations \\tau among their entries. Spectra of random directed networks, where entries are completely un-correlated (\\tau=0) show circular distribution with delocalized eigenvectors, where non-random networks with correlated entries have localized eigenvectors. In order to understand the origin of localization we track the spectra as a function of connection probability and directionality both. The kind of inhibitory and excitatory connections we are considering, low connection probability leads to localized eigenstates near boundary of the circular region, whereas large connection probabilities give rise to isolated delocalized eigenstates. As connections are made directed by making some nodes inhibitory, some of eigenstates start occurring in complex conjugate pairs . The eigenvalue distribution along with localization measure show rich pattern. Spectra of networks having modular structure show distinguishable different features than the random networks. For a very well distinguished community structure (rewiring probability p_r \\sim 0) , the whole spectra is localized except some of eigenstates at boundary . As p_r is increased and network deviates from community structure there is a sudden change in the localization property for very small value of deformation from the perfect community structure. Furthermore, we investigate spectral properties of a metabolic networks of Zebra-fish and compare with spectral properties of various model networks.", "after_revision": "We study spectra of directed networks with inhibitory and excitatory couplings. We investigate in particular eigenvector localization properties of various model networks for different value of correlation among their entries. Spectra of random networks, with completely uncorrelated entries show a circular distribution with delocalized eigenvectors, where as networks with correlated entries have localized eigenvectors. In order to understand the origin of localization we track the spectra as a function of connection probability and directionality . As connections are made directed , eigenstates start occurring in complex conjugate pairs and the eigenvalue distribution combined with the localization measure shows a rich pattern. Moreover, for a very well distinguished community structure , the whole spectrum is localized except few eigenstates at boundary of the circular distribution. As the network deviates from the community structure there is a sudden change in the localization property for a very small value of deformation from the perfect community structure. We search for this effect for the whole range of correlation strengths and for different community configurations. Furthermore, we investigate spectral properties of a metabolic network of zebrafish, and compare them with those of the model networks.", "edit_actions": [{"type": "R", "before": "Particularly, we investigate", "after": "We investigate in particular", "start_char_pos": 80, "end_char_pos": 108}, {"type": "R", "before": "with varying correlations \\tau", "after": "for different value of correlation", "start_char_pos": 171, "end_char_pos": 201}, {"type": "R", "before": "directed networks, where entries are completely un-correlated (\\tau=0) show", "after": "networks, with completely uncorrelated entries show a", "start_char_pos": 241, "end_char_pos": 316}, {"type": "R", "before": "non-random", "after": "as", "start_char_pos": 376, "end_char_pos": 386}, {"type": "R", "before": "both. The kind of inhibitory and excitatory connections we are considering, low connection probability leads to localized eigenstates near boundary of the circular region, whereas large connection probabilities give rise to isolated delocalized eigenstates.", "after": ".", "start_char_pos": 579, "end_char_pos": 836}, {"type": "R", "before": "by making some nodes inhibitory, some of", "after": ",", "start_char_pos": 870, "end_char_pos": 910}, {"type": "R", "before": ". The eigenvalue distribution along with localization measure show", "after": "and the eigenvalue distribution combined with the localization measure shows a", "start_char_pos": 966, "end_char_pos": 1032}, {"type": "R", "before": "Spectra of networks having modular structure show distinguishable different features than the random networks. For", "after": "Moreover, for", "start_char_pos": 1047, "end_char_pos": 1161}, {"type": "D", "before": "(rewiring probability p_r \\sim 0)", "after": null, "start_char_pos": 1208, "end_char_pos": 1241}, {"type": "R", "before": "spectra", "after": "spectrum", "start_char_pos": 1254, "end_char_pos": 1261}, {"type": "R", "before": "some of", "after": "few", "start_char_pos": 1282, "end_char_pos": 1289}, {"type": "R", "before": ". As p_r is increased and", "after": "of the circular distribution. As the", "start_char_pos": 1314, "end_char_pos": 1339}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1362, "end_char_pos": 1362}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1441, "end_char_pos": 1441}, {"type": "A", "before": null, "after": "We search for this effect for the whole range of correlation strengths and for different community configurations.", "start_char_pos": 1512, "end_char_pos": 1512}, {"type": "R", "before": "networks of Zebra-fish and compare with spectral properties of various", "after": "network of zebrafish, and compare them with those of the", "start_char_pos": 1576, "end_char_pos": 1646}], "sents_char_pos": [0, 79, 222, 448, 584, 836, 967, 1046, 1157, 1315, 1511]}
+{"doc_id": "1104.0359", "revision_depth": "2", "before_revision": "We study the asymptotic behaviour of the difference between the Value at Risks VaR(L) and VaR(L+S) for heavy tailed random variables L and S as an application to the sensitivity analysis of quantitative operational risk management in the framework of an advanced measurement approach (AMA) of Basel II . Here the variable L describes the loss amount of the present risk profile and S means the loss amount caused by an additional loss factor. We have different types of results according to the magnitude of the relationship of the thicknesses of the tails of L and S. Especially if the tail of S is sufficiently thinner than that of L, then the difference between prior and posterior risk amounts VaR(L+S) - VaR(L) is asymptotically equivalent to the component VaR of S (which is equal to the expected lossof S when L and S are independent) .", "after_revision": "We study the asymptotic behavior of the difference between the values at risk VaR(L) and VaR(L+S) for heavy tailed random variables L and S for application in sensitivity analysis of quantitative operational risk management within the framework of the advanced measurement approach of Basel II (and III). Here L describes the loss amount of the present risk profile and S describes the loss amount caused by an additional loss factor. We obtain different types of results according to the relative magnitudes of the thicknesses of the tails of L and S. In particular, if the tail of S is sufficiently thinner than the tail of L, then the difference between prior and posterior risk amounts VaR(L+S) - VaR(L) is asymptotically equivalent to the expectation (expected loss) of S .", "edit_actions": [{"type": "R", "before": "behaviour", "after": "behavior", "start_char_pos": 24, "end_char_pos": 33}, {"type": "R", "before": "Value at Risks", "after": "values at risk", "start_char_pos": 64, "end_char_pos": 78}, {"type": "R", "before": "as an application to the", "after": "for application in", "start_char_pos": 141, "end_char_pos": 165}, {"type": "R", "before": "in", "after": "within", "start_char_pos": 231, "end_char_pos": 233}, {"type": "R", "before": "an", "after": "the", "start_char_pos": 251, "end_char_pos": 253}, {"type": "D", "before": "(AMA)", "after": null, "start_char_pos": 284, "end_char_pos": 289}, {"type": "R", "before": ". Here the variable", "after": "(and III). Here", "start_char_pos": 302, "end_char_pos": 321}, {"type": "R", "before": "means", "after": "describes", "start_char_pos": 384, "end_char_pos": 389}, {"type": "R", "before": "have", "after": "obtain", "start_char_pos": 446, "end_char_pos": 450}, {"type": "R", "before": "magnitude of the relationship of the", "after": "relative magnitudes of the", "start_char_pos": 495, "end_char_pos": 531}, {"type": "R", "before": "Especially", "after": "In particular,", "start_char_pos": 569, "end_char_pos": 579}, {"type": "R", "before": "that", "after": "the tail", "start_char_pos": 626, "end_char_pos": 630}, {"type": "R", "before": "component VaR of S (which is equal to the expected lossof S when L and S are independent)", "after": "expectation (expected loss) of S", "start_char_pos": 752, "end_char_pos": 841}], "sents_char_pos": [0, 442]}
+{"doc_id": "1108.0187", "revision_depth": "1", "before_revision": "Our purpose in this paper is to obtain the exact distribution of the number of buffer starvations within a sequence of N consecutive packet arrivals . The buffer is modeled as an M/M/1 queue, plus the consideration of bursty arrivals characterized by an interrupted Poisson process . When the buffer is empty, the service restarts after a certain amount of packets are prefetched . With this goal, we propose two approaches , one of which is based on Ballot theorem , and the other uses recursive equations. The Ballot theorem approach gives an explicit solution, but at the cost of the high complexity order in certain circumstances . The recursive approach, though not offering an explicit result, needs fewer computations.We further propose a fluid analysis of starvation probability on the file level, given the distribution of file size and the traffic intensity. The starvation probabilities of this paper have many potential applications . We apply them to optimize the quality of experience (QoE) of media streaming service , by exploiting the tradeoff between the start-up delay and the starvation .", "after_revision": "Our purpose in this paper is to characterize buffer starvations for streaming services . The buffer is modeled as an M/M/1 queue, plus the consideration of bursty arrivals . When the buffer is empty, the service restarts after a certain amount of packets are prefetched . With this goal, we propose two approaches to obtain theexact distribution of the number of buffer starvations , one of which is based on Ballot theorem , and the other uses recursive equations. The Ballot theorem approach gives an explicit result. We extend this approach to the scenario with a constant playback rate using T\\`{a . The recursive approach, though not offering an explicit result, can obtain the distribution of starvations with non-independent and identically distributed (i.i.d.) arrival process in which an ON/OFF bursty arrival process is considered in this work. We further compute the starvation probability as a function of the amount of prefetched packets for a large number of files via a fluid analysis. Among many potential applications of starvation analysis, we show how to apply it to optimize the objective quality of experience (QoE) of media streaming , by exploiting the tradeoff between startup/rebuffering delay and starvations .", "edit_actions": [{"type": "R", "before": "obtain the exact distribution of the number of buffer starvations within a sequence of N consecutive packet arrivals", "after": "characterize buffer starvations for streaming services", "start_char_pos": 32, "end_char_pos": 148}, {"type": "D", "before": "characterized by an interrupted Poisson process", "after": null, "start_char_pos": 234, "end_char_pos": 281}, {"type": "R", "before": "prefetched", "after": "prefetched", "start_char_pos": 369, "end_char_pos": 379}, {"type": "A", "before": null, "after": "to obtain the", "start_char_pos": 424, "end_char_pos": 424}, {"type": "A", "before": null, "after": "exact distribution", "start_char_pos": 424, "end_char_pos": 424}, {"type": "A", "before": null, "after": "of the number of buffer starvations", "start_char_pos": 425, "end_char_pos": 425}, {"type": "R", "before": "Ballot theorem", "after": "Ballot theorem", "start_char_pos": 453, "end_char_pos": 467}, {"type": "R", "before": "solution, but at the cost of the high complexity order in certain circumstances", "after": "result. We extend this approach to the scenario with a constant playback rate using T\\`{a", "start_char_pos": 556, "end_char_pos": 635}, {"type": "R", "before": "needs fewer computations.We further propose a fluid analysis of starvation probability on the file level, given the distribution of file size and the traffic intensity. The starvation probabilities of this paper have", "after": "can obtain the distribution of starvations with non-independent and identically distributed (i.i.d.) arrival process in which an ON/OFF bursty arrival process is considered in this work. We further compute the starvation probability as a function of the amount of prefetched packets for a large number of files via a fluid analysis. Among", "start_char_pos": 702, "end_char_pos": 918}, {"type": "R", "before": ". We apply them", "after": "of starvation analysis, we show how to apply it", "start_char_pos": 947, "end_char_pos": 962}, {"type": "A", "before": null, "after": "objective", "start_char_pos": 979, "end_char_pos": 979}, {"type": "D", "before": "service", "after": null, "start_char_pos": 1027, "end_char_pos": 1034}, {"type": "R", "before": "the start-up delay and the starvation", "after": "startup/rebuffering delay and starvations", "start_char_pos": 1072, "end_char_pos": 1109}], "sents_char_pos": [0, 150, 283, 381, 509, 637, 727, 870, 948]}
+{"doc_id": "1109.0807", "revision_depth": "1", "before_revision": "Consider a large Boolean network with a feed forward structure. Given a probability distribution for the inputs, can one find-possibly small-collections of input nodes that determine the states of most other nodes in the network? To identify these nodes , a notion that quantifies the determinative power of an input over states in the network is needed. We argue that the mutual information (MI) between a subset of the inputs X = {X_1, ..., X_n} of node i and the function f_i(X) associated with node i quantifies the determinative power of this subset of inputs over node i. To study the relation of determinative power to sensitivity to perturbations , we relate the MI to measures of perturbations, such as the influence of a variable, in terms of inequalities. The result shows that, maybe surprisingly, an input that has large influence does not necessarily have large determinative power. The main tool for the analysis is Fourier analysis of Boolean functions. Whether a function is sensitive to perturbations or not, and which are the determinative inputs, depends on which coefficients the Fourier spectrum is concentrated on. We also consider unate functions which play an important role in genetic regulatory networks . For those, a particular relation between the influence and MI is found . As an application of our methods , we analyze the large-scale regulatory network of E. colinumerically: We identify the most determinative nodes and show that a small set of those reduces the overall uncertainty of network states significantly. The network is also found to be tolerant to perturbations of its inputs , which can be seen from the Fourier spectrum of its functions .", "after_revision": "Consider a large Boolean network with a feed forward structure. Given a probability distribution on the inputs, can one find, possibly small, collections of input nodes that determine the states of most other nodes in the network? To answer this question , a notion that quantifies the determinative power of an input over the states of the nodes in the network is needed. We argue that the mutual information (MI) between a given subset of the inputs X = {X_1, ..., X_n} of some node i and its associated function f_i(X) quantifies the determinative power of this set of inputs over node i. We compare the determinative power of a set of inputs to the sensitivity to perturbations to these inputs, and find that, maybe surprisingly, an input that has large sensitivity to perturbations does not necessarily have large determinative power. However, for unate functions, which play an important role in genetic regulatory networks , we find a direct relation between MI and sensitivity to perturbations . As an application of our results , we analyze the large-scale regulatory network of Escherichia coli. We identify the most determinative nodes and show that a small subset of those reduces the overall uncertainty of the network state significantly. Furthermore, the network is found to be tolerant to perturbations of its inputs .", "edit_actions": [{"type": "R", "before": "for", "after": "on", "start_char_pos": 97, "end_char_pos": 100}, {"type": "R", "before": "find-possibly small-collections", "after": "find, possibly small, collections", "start_char_pos": 121, "end_char_pos": 152}, {"type": "R", "before": "identify these nodes", "after": "answer this question", "start_char_pos": 233, "end_char_pos": 253}, {"type": "R", "before": "states", "after": "the states of the nodes", "start_char_pos": 322, "end_char_pos": 328}, {"type": "A", "before": null, "after": "given", "start_char_pos": 407, "end_char_pos": 407}, {"type": "A", "before": null, "after": "some", "start_char_pos": 452, "end_char_pos": 452}, {"type": "R", "before": "the", "after": "its associated", "start_char_pos": 464, "end_char_pos": 467}, {"type": "D", "before": "associated with node i", "after": null, "start_char_pos": 484, "end_char_pos": 506}, {"type": "R", "before": "subset", "after": "set", "start_char_pos": 550, "end_char_pos": 556}, {"type": "R", "before": "To study the relation of determinative power to", "after": "We compare the determinative power of a set of inputs to the", "start_char_pos": 580, "end_char_pos": 627}, {"type": "R", "before": ", we relate the MI to measures of perturbations, such as the influence of a variable, in terms of inequalities. The result shows", "after": "to these inputs, and find", "start_char_pos": 657, "end_char_pos": 785}, {"type": "R", "before": "influence", "after": "sensitivity to perturbations", "start_char_pos": 836, "end_char_pos": 845}, {"type": "R", "before": "The main tool for the analysis is Fourier analysis of Boolean functions. Whether a function is sensitive to perturbations or not, and which are the determinative inputs, depends on which coefficients the Fourier spectrum is concentrated on. We also consider unate functions which", "after": "However, for unate functions, which", "start_char_pos": 899, "end_char_pos": 1178}, {"type": "R", "before": ". For those, a particular relation between the influence and MI is found", "after": ", we find a direct relation between MI and sensitivity to perturbations", "start_char_pos": 1233, "end_char_pos": 1305}, {"type": "R", "before": "methods", "after": "results", "start_char_pos": 1333, "end_char_pos": 1340}, {"type": "R", "before": "E. colinumerically:", "after": "Escherichia coli.", "start_char_pos": 1392, "end_char_pos": 1411}, {"type": "R", "before": "set", "after": "subset", "start_char_pos": 1475, "end_char_pos": 1478}, {"type": "R", "before": "network states significantly. The network is also", "after": "the network state significantly. Furthermore, the network is", "start_char_pos": 1523, "end_char_pos": 1572}, {"type": "D", "before": ", which can be seen from the Fourier spectrum of its functions", "after": null, "start_char_pos": 1625, "end_char_pos": 1687}], "sents_char_pos": [0, 63, 229, 354, 579, 768, 898, 971, 1139, 1234, 1307, 1552]}
+{"doc_id": "1111.2169", "revision_depth": "1", "before_revision": "The theory of L\\'evy models for asset pricing simplifies considerably if one takes a pricing kernel approach, which enables one to bypass market incompleteness issues. The special case of a geometric L\\'evy model (GLM) with constant parameters can be regarded as a natural generalisation of the standard geometric Brownian motion model used in the Black-Scholes theory . In one dimension, once the underlying L\\'evy process has been specified, the GLM is characterised by four parameters: the initial asset price, the interest rate, the volatility, and a risk aversionfactor . The pricing kernel is given by the product of a discount factor and the Esscher martingale associated with the risk aversion parameter. The model is fixed by the requirement that for each asset the product of the asset price and the pricing kernel should be a martingale. In the GBMcase , the risk aversion factor is the so-called market price of risk. In the GLMcase , this interpretation is no longer valid; instead, the excess rate of return is given by a nonlinear function of the volatility and the risk aversion. It is shown that for positive values of the volatility and the risk aversion the excess rate of return above the interest rate is positive, and is monotonically increasing with respect to these variables. In the case of foreign exchange, Siegel's paradox implies that it is possible to construct foreign exchange models for which the excess rate of return (above the interest rate differential) is positive both for the exchange rate and the inverse exchange rate. This condition is shown to hold for any geometric L\\'evy model for foreign exchange in which the volatility exceeds the risk aversion.", "after_revision": "The geometric L\\'evy model (GLM) is a natural generalisation of the geometric Brownian motion model (GBM) used in the derivation of the Black-Scholes formula. The theory of such models simplifies considerably if one takes a pricing kernel approach . In one dimension, once the underlying L\\'evy process has been specified, the GLM has four parameters: the initial price, the interest rate, the volatility, and the risk aversion . The pricing kernel is the product of a discount factor and a risk aversion martingale. For GBM , the risk aversion parameter is the market price of risk. For a GLM , this interpretation is not valid: the excess rate of return is a nonlinear function of the volatility and the risk aversion. It is shown that for positive volatility and risk aversion the excess rate of return above the interest rate is positive, and is increasing with respect to these variables. In the case of foreign exchange, Siegel's paradox implies that one can construct foreign exchange models for which the excess rate of return is positive both for the exchange rate and the inverse exchange rate. This condition is shown to hold for any geometric L\\'evy model for foreign exchange in which volatility exceeds risk aversion.", "edit_actions": [{"type": "D", "before": "theory of L\\'evy models for asset pricing simplifies considerably if one takes a pricing kernel approach, which enables one to bypass market incompleteness issues. The special case of a", "after": null, "start_char_pos": 4, "end_char_pos": 189}, {"type": "R", "before": "with constant parameters can be regarded as", "after": "is", "start_char_pos": 219, "end_char_pos": 262}, {"type": "D", "before": "standard", "after": null, "start_char_pos": 295, "end_char_pos": 303}, {"type": "A", "before": null, "after": "(GBM)", "start_char_pos": 336, "end_char_pos": 336}, {"type": "A", "before": null, "after": "derivation of the", "start_char_pos": 349, "end_char_pos": 349}, {"type": "R", "before": "theory", "after": "formula. The theory of such models simplifies considerably if one takes a pricing kernel approach", "start_char_pos": 364, "end_char_pos": 370}, {"type": "R", "before": "is characterised by", "after": "has", "start_char_pos": 454, "end_char_pos": 473}, {"type": "D", "before": "asset", "after": null, "start_char_pos": 503, "end_char_pos": 508}, {"type": "R", "before": "a risk aversionfactor", "after": "the risk aversion", "start_char_pos": 555, "end_char_pos": 576}, {"type": "D", "before": "given by", "after": null, "start_char_pos": 601, "end_char_pos": 609}, {"type": "R", "before": "the Esscher martingale associated with the risk aversion parameter. The model is fixed by the requirement that for each asset the product of the asset price and the pricing kernel should be a martingale. In the GBMcase", "after": "a risk aversion martingale. For GBM", "start_char_pos": 647, "end_char_pos": 865}, {"type": "R", "before": "factor is the so-called", "after": "parameter is the", "start_char_pos": 886, "end_char_pos": 909}, {"type": "R", "before": "In the GLMcase", "after": "For a GLM", "start_char_pos": 932, "end_char_pos": 946}, {"type": "R", "before": "no longer valid; instead,", "after": "not valid:", "start_char_pos": 972, "end_char_pos": 997}, {"type": "D", "before": "given by", "after": null, "start_char_pos": 1027, "end_char_pos": 1035}, {"type": "R", "before": "values of the volatility and the", "after": "volatility and", "start_char_pos": 1128, "end_char_pos": 1160}, {"type": "D", "before": "monotonically", "after": null, "start_char_pos": 1245, "end_char_pos": 1258}, {"type": "R", "before": "it is possible to", "after": "one can", "start_char_pos": 1366, "end_char_pos": 1383}, {"type": "D", "before": "(above the interest rate differential)", "after": null, "start_char_pos": 1454, "end_char_pos": 1492}, {"type": "R", "before": "the volatility exceeds the", "after": "volatility exceeds", "start_char_pos": 1656, "end_char_pos": 1682}], "sents_char_pos": [0, 167, 372, 578, 714, 850, 931, 988, 1097, 1302, 1562]}
+{"doc_id": "1112.0270", "revision_depth": "2", "before_revision": "Activation cascadesare a prevalent feature in cellular mechanisms for signaltransduction . Here we study the classic model of linear activation cascades and obtain analytical solutions in terms of lower incomplete gamma functions . We show that in the special but important case of optimal gain cascades (i.e., when all the deactivation rates are identical) the downstream output of an entire cascade can be represented exactly as a single nonlinear module containing an incomplete gamma function with parameters dependent on the input signal as well as the rates and length of the cascade . Our results can be used to represent optimal cascades efficiently by reducing the number of equations and parameters in computational ODE models under a variety of inputs. If the requirement for strict optimality is relaxed (under random deactivation rates ), we show that the reduced representation can also reproduce the observed variability of downstream responses. In addition, we show that cascades can be rearranged so that homogeneous blocks can be lumped and represented by incomplete gamma functions. We also illustrate how the reduced representation can be used to fit data; in particular, the length of the cascade appears as a real-valued parameter and can thus be fitted in the same manner as Hill coefficients. Finally, we use our results to show how the output of delay differential equation models can be approximated with the use of simple expressions involving the incomplete gamma function .", "after_revision": "Cellular signal transduction usually involves activation cascades, the sequential activation of a series of proteins following the reception of an input signal . Here we study the classic model of weakly activated cascades and obtain analytical solutions for a variety of inputs . We show that in the special but important case of optimal-gain cascades (i.e., when the deactivation rates are identical) the downstream output of the cascade can be represented exactly as a lumped nonlinear module containing an incomplete gamma function with real parameters that depend on the rates and length of the cascade , as well as parameters of the input signal. The expressions obtained can be applied to the non-identical case when the deactivation rates are random to capture the variability in the cascade outputs. We also show that cascades can be rearranged so that blocks with similar rates can be lumped and represented through our nonlinear modules. Our results can be used both to represent cascades in computational models of differential equations and to fit data efficiently, by reducing the number of equations and parameters involved. In particular, the length of the cascade appears as a real-valued parameter and can thus be fitted in the same manner as Hill coefficients. Finally, we show how the obtained nonlinear modules can be used instead of delay differential equations to model delays in signal transduction .", "edit_actions": [{"type": "R", "before": "Activation cascadesare a prevalent feature in cellular mechanisms for signaltransduction", "after": "Cellular signal transduction usually involves activation cascades, the sequential activation of a series of proteins following the reception of an input signal", "start_char_pos": 0, "end_char_pos": 88}, {"type": "R", "before": "linear activation", "after": "weakly activated", "start_char_pos": 126, "end_char_pos": 143}, {"type": "R", "before": "in terms of lower incomplete gamma functions", "after": "for a variety of inputs", "start_char_pos": 185, "end_char_pos": 229}, {"type": "R", "before": "optimal gain", "after": "optimal-gain", "start_char_pos": 282, "end_char_pos": 294}, {"type": "D", "before": "all", "after": null, "start_char_pos": 316, "end_char_pos": 319}, {"type": "R", "before": "an entire", "after": "the", "start_char_pos": 383, "end_char_pos": 392}, {"type": "R", "before": "single", "after": "lumped", "start_char_pos": 433, "end_char_pos": 439}, {"type": "R", "before": "parameters dependent on the input signal as well as the", "after": "real parameters that depend on the", "start_char_pos": 502, "end_char_pos": 557}, {"type": "R", "before": ". Our results can be used to represent optimal cascades efficiently by reducing the number of equations and parameters in computational ODE models under a variety of inputs. If the requirement for strict optimality is relaxed (under random deactivation rates ), we show that the reduced representation can also reproduce the observed variability of downstream responses. In addition, we", "after": ", as well as parameters of the input signal. The expressions obtained can be applied to the non-identical case when the deactivation rates are random to capture the variability in the cascade outputs. We also", "start_char_pos": 590, "end_char_pos": 976}, {"type": "R", "before": "homogeneous blocks", "after": "blocks with similar rates", "start_char_pos": 1022, "end_char_pos": 1040}, {"type": "R", "before": "by incomplete gamma functions. We also illustrate how the reduced representation", "after": "through our nonlinear modules. Our results", "start_char_pos": 1071, "end_char_pos": 1151}, {"type": "R", "before": "to fit data; in", "after": "both to represent cascades in computational models of differential equations and to fit data efficiently, by reducing the number of equations and parameters involved. In", "start_char_pos": 1164, "end_char_pos": 1179}, {"type": "D", "before": "use our results to", "after": null, "start_char_pos": 1329, "end_char_pos": 1347}, {"type": "R", "before": "output of delay differential equation models can be approximated with the use of simple expressions involving the incomplete gamma function", "after": "obtained nonlinear modules can be used instead of delay differential equations to model delays in signal transduction", "start_char_pos": 1361, "end_char_pos": 1500}], "sents_char_pos": [0, 90, 231, 591, 763, 960, 1101, 1176, 1316]}
+{"doc_id": "1112.2250", "revision_depth": "1", "before_revision": "The Web emerged as the antidoteto rapidly increasing quantity of accumulated knowledge because it successfully enables massive representation and communication with minimum costs. Despite the fact that its gigantic scale and impact make difficult to anticipate the effects in humans, we claim from it to be fast, secure, reliable, all-inclusive and trustworthy . It is time for science to compensate and provide an epistemological \"antidote\" to these issues. On this campaign, Philosophy should be in the front line by forming the relevant questions . We initiate the dialogue for a theory about being in the Web that will serve as a bridge between philosophical thinking and engineering. We analyze existence and spatiotemporality in the Web , as a closed techno-social system, and how it transforms the traditional conceptions about actuality. Location in the Web space is specified by the Web being's URI and the URI's of incoming and outgoing links. The primer role of visiting durations is best approximated by Bergsonian time. Physical space is becoming more discoverableand traceable. Components of human activity are becoming asynchronous, (partially) synchronous and continuous in the Web . Networked individuals operate in a flexible , less-bounded and spatially dispersed environment. The resulting issues are related to the self-determination of being in the Web and the prerequisites for the Web to remain an open platform for innovation and participation . The Being-Query model address the above issues, based on a simple and all-encompassing hypothesis about existence and the generic motive of searching. The proposed approach incorporates that Users and Being are two sides of the same coin by providing a computable framework of study. Furthermore, extents ANT to include the Web ecosystem and highlights the need for joint analysis of online and offline phenomena .", "after_revision": "The Web initially emerged as an \"antidote\" to accumulated scientific knowledge since it enables global representation and communication with minimum costs. Its gigantic scale and interdependence incommode our ability to find relevant information and develop trustworthy contexts . It is time for science to compensate by providing an epistemological \"antidote\" to Web issues. Philosophy should be in the front line by forming the salient questions and analysis. The scope of our research is to provide a theory about the Web being that will bridge philosophical thinking and engineering. We analyze existence and spatiotemporality in the Web and how it transforms the traditional actualities. The Web space is specified by incoming and outgoing links. The primordial role of visiting durations in Web's existence is approximated by Bergsonian time. The physical space becomes more discoverable. The human activity can be asynchronous, synchronous and continuous . Networked individuals operate in a flexible and spatially dispersed environment. The resulting issues concern the self-determination of a being and the way in which the Web could be a free and open platform for innovation and participation .", "edit_actions": [{"type": "R", "before": "emerged as the antidoteto rapidly increasing quantity of accumulated knowledge because it successfully enables massive", "after": "initially emerged as an \"antidote\" to accumulated scientific knowledge since it enables global", "start_char_pos": 8, "end_char_pos": 126}, {"type": "R", "before": "Despite the fact that its", "after": "Its", "start_char_pos": 180, "end_char_pos": 205}, {"type": "R", "before": "impact make difficult to anticipate the effects in humans, we claim from it to be fast, secure, reliable, all-inclusive and trustworthy", "after": "interdependence incommode our ability to find relevant information and develop trustworthy contexts", "start_char_pos": 225, "end_char_pos": 360}, {"type": "R", "before": "and provide", "after": "by providing", "start_char_pos": 400, "end_char_pos": 411}, {"type": "R", "before": "these issues. On this campaign,", "after": "Web issues.", "start_char_pos": 445, "end_char_pos": 476}, {"type": "R", "before": "relevant questions . We initiate the dialogue for", "after": "salient questions and analysis. The scope of our research is to provide", "start_char_pos": 531, "end_char_pos": 580}, {"type": "R", "before": "being in the Web that will serve as a bridge between", "after": "the Web being that will bridge", "start_char_pos": 596, "end_char_pos": 648}, {"type": "D", "before": ", as a closed techno-social system,", "after": null, "start_char_pos": 743, "end_char_pos": 778}, {"type": "R", "before": "conceptions about actuality. Location in the", "after": "actualities. The", "start_char_pos": 817, "end_char_pos": 861}, {"type": "D", "before": "the Web being's URI and the URI's of", "after": null, "start_char_pos": 888, "end_char_pos": 924}, {"type": "R", "before": "primer", "after": "primordial", "start_char_pos": 958, "end_char_pos": 964}, {"type": "R", "before": "is best", "after": "in Web's existence is", "start_char_pos": 992, "end_char_pos": 999}, {"type": "R", "before": "Physical space is becoming more discoverableand traceable. Components of human activity are becoming asynchronous, (partially)", "after": "The physical space becomes more discoverable. The human activity can be asynchronous,", "start_char_pos": 1033, "end_char_pos": 1159}, {"type": "D", "before": "in the Web", "after": null, "start_char_pos": 1187, "end_char_pos": 1197}, {"type": "D", "before": ", less-bounded", "after": null, "start_char_pos": 1244, "end_char_pos": 1258}, {"type": "R", "before": "are related to", "after": "concern", "start_char_pos": 1317, "end_char_pos": 1331}, {"type": "R", "before": "being in the Web and the prerequisites for the Web to remain an", "after": "a being and the way in which the Web could be a free and", "start_char_pos": 1358, "end_char_pos": 1421}, {"type": "D", "before": ". The Being-Query model address the above issues, based on a simple and all-encompassing hypothesis about existence and the generic motive of searching. The proposed approach incorporates that Users and Being are two sides of the same coin by providing a computable framework of study. Furthermore, extents ANT to include the Web ecosystem and highlights the need for joint analysis of online and offline phenomena", "after": null, "start_char_pos": 1469, "end_char_pos": 1883}], "sents_char_pos": [0, 179, 362, 458, 551, 688, 845, 953, 1032, 1091, 1295, 1470, 1621, 1754]}
+{"doc_id": "1202.1854", "revision_depth": "1", "before_revision": "This paper proposes generalization of the popular realized volatility framework by allowing its measurement in the time-frequency domain and bringing robustness to both noise as well as jumps. Based on the generalization of Fan and Wang (2007) approach using smooth wavelets and Maximum Overlap Discrete Wavelet Transform, we present new, general theory for wavelet decomposition of integrated variance. Using wavelets, we not only gain decomposition of the realized variance into several investment horizons , but we are also able to estimate the jumpsconsistently . Basing our estimator in the two-scale realized variance framework of Zhang et al. (2005) , we are able to utilize all available data and get unbiased estimator in the presence of noise as well. The theory is also tested in a large numerical study of the small sample performance of the estimators and compared to other popular realized variation estimators under different simulation settings with changing noise as well as jump level . The results reveal that our wavelet-based estimator is able to estimate and forecast the realized measures with the greatest precision. Another notable contribution lies in the application of the presented theory. Our time-frequency estimators not only produce more efficient estimates, but also decompose the realized variation into arbitrarily chosen investment horizons. The results thus provide a better understanding of the dynamics of stock markets .", "after_revision": "We introduce wavelet-based methodology for estimation of realized variance allowing its measurement in the time-frequency domain . Using smooth wavelets and Maximum Overlap Discrete Wavelet Transform, we allow for the decomposition of the realized variance into several investment horizons and jumps . Basing our estimator in the two-scale realized variance framework , we are able to utilize all available data and get feasible estimator in the presence of microstructure noise as well. The estimator is tested in a large numerical study of the finite sample performance and is compared to other popular realized variation estimators . We use different simulation settings with changing noise as well as jump level in different price processes including long memory fractional stochastic volatility model . The results reveal that our wavelet-based estimator is able to estimate and forecast the realized measures with the greatest precision. Our time-frequency estimators not only produce feasible estimates, but also decompose the realized variation into arbitrarily chosen investment horizons. We apply it to study the volatility of forex futures during the recent crisis at several investment horizons and obtain the results which provide us with better understanding of the volatility dynamics .", "edit_actions": [{"type": "R", "before": "This paper proposes generalization of the popular realized volatility framework by", "after": "We introduce wavelet-based methodology for estimation of realized variance", "start_char_pos": 0, "end_char_pos": 82}, {"type": "R", "before": "and bringing robustness to both noise as well as jumps. Based on the generalization of Fan and Wang (2007) approach using", "after": ". Using", "start_char_pos": 137, "end_char_pos": 258}, {"type": "R", "before": "present new, general theory for wavelet decomposition of integrated variance. Using wavelets, we not only gain decomposition of", "after": "allow for the decomposition of", "start_char_pos": 326, "end_char_pos": 453}, {"type": "R", "before": ", but we are also able to estimate the jumpsconsistently", "after": "and jumps", "start_char_pos": 509, "end_char_pos": 565}, {"type": "D", "before": "of Zhang et al. (2005)", "after": null, "start_char_pos": 634, "end_char_pos": 656}, {"type": "R", "before": "unbiased", "after": "feasible", "start_char_pos": 709, "end_char_pos": 717}, {"type": "A", "before": null, "after": "microstructure", "start_char_pos": 747, "end_char_pos": 747}, {"type": "R", "before": "theory is also", "after": "estimator is", "start_char_pos": 767, "end_char_pos": 781}, {"type": "R", "before": "small sample performance of the estimators and", "after": "finite sample performance and is", "start_char_pos": 823, "end_char_pos": 869}, {"type": "R", "before": "under", "after": ". We use", "start_char_pos": 926, "end_char_pos": 931}, {"type": "A", "before": null, "after": "in different price processes including long memory fractional stochastic volatility model", "start_char_pos": 1004, "end_char_pos": 1004}, {"type": "D", "before": "Another notable contribution lies in the application of the presented theory.", "after": null, "start_char_pos": 1143, "end_char_pos": 1220}, {"type": "R", "before": "more efficient", "after": "feasible", "start_char_pos": 1268, "end_char_pos": 1282}, {"type": "R", "before": "The results thus provide a", "after": "We apply it to study the volatility of forex futures during the recent crisis at several investment horizons and obtain the results which provide us with", "start_char_pos": 1381, "end_char_pos": 1407}, {"type": "R", "before": "dynamics of stock markets", "after": "volatility dynamics", "start_char_pos": 1436, "end_char_pos": 1461}], "sents_char_pos": [0, 192, 403, 762, 1006, 1142, 1220, 1380]}
+{"doc_id": "1205.1861", "revision_depth": "1", "before_revision": " Recently, many studies indicated that the minimum spanning tree (MST) network whose metric distance is de?ned by using correlation coe?cients have strong implications on extracting infor- mation from return time series. However in many cases researchers may hope to investigate the strength of interactions but not the directions of them. In order to study the strength of interaction and connection of ?nancial asset returns we propose a modi?ed minimum spanning tree network whose metric distance is de?ned from absolute cross-correlation coe?cients. We had investigated 69 daily ?nancial time series, which constituted by 3 types ?nance assets(29 stock market indica- tor time series , 21 currency futures price time series and 19 commodity futuresprice time series). Empirical analyses show that the MST network of returns is time-dependent in overall structure, while same type ?nancial assets usually keep stable inter-connections. Moreover each asset in same group show similar economic characters. In other words, each group concerned with one kind of traditional ?nancial commodity. In addition, we ?nd the time-lag between stock market indicator volatility time series and EUA (EU allowances) , WTI (West Texas Intermediate)volatility time series. The peak of cross-correlation function of volatility time series between EUA (or WTI) and stock market indicators show a signi?cant time shift (> 20days) from 0.", "after_revision": "In a highly interdependent economic world, the nature of relationships between financial entities is becoming an increasingly important area of study. Recently, many studies have shown the usefulness of minimal spanning trees (MST) in extracting interactions between financial entities. Here, we propose a modified MST network whose metric distance is defined in terms of cross-correlation coefficient absolute values, enabling the connections between anticorrelated entities to manifest properly. We investigate 69 daily time series, comprising three types of financial assets: 28 stock market indicators , 21 currency futures , and 20 commodity futures. We show that though the resulting MST network evolves over time, the financial assets of similar type tend to have connections which are stable over time. In addition, we find a characteristic time lag between the volatility time series of the stock market indicators and those of the EU CO2 emission allowance (EUA) and crude oil futures (WTI). This time lag is given by the peak of the cross-correlation function of the volatility time series EUA (or WTI) with that of the stock market indicators , and is markedly different (> 20 days) from 0, showing that the volatility of stock market indicators today can predict the volatility of EU emissions allowances and of crude oil in the near future.", "edit_actions": [{"type": "A", "before": null, "after": "In a highly interdependent economic world, the nature of relationships between financial entities is becoming an increasingly important area of study.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "indicated that the minimum spanning tree", "after": "have shown the usefulness of minimal spanning trees", "start_char_pos": 24, "end_char_pos": 64}, {"type": "R", "before": "network whose metric distance is de?ned by using correlation coe?cients have strong implications on extracting infor- mation from return time series. However in many cases researchers may hope to investigate the strength of interactions but not the directions of them. In order to study the strength of interaction and connection of ?nancial asset returns", "after": "in extracting interactions between financial entities. Here,", "start_char_pos": 71, "end_char_pos": 426}, {"type": "R", "before": "modi?ed minimum spanning tree", "after": "modified MST", "start_char_pos": 440, "end_char_pos": 469}, {"type": "R", "before": "de?ned from absolute", "after": "defined in terms of", "start_char_pos": 503, "end_char_pos": 523}, {"type": "R", "before": "coe?cients. We had investigated", "after": "coefficient absolute values, enabling the connections between anticorrelated entities to manifest properly. We investigate", "start_char_pos": 542, "end_char_pos": 573}, {"type": "D", "before": "?nancial", "after": null, "start_char_pos": 583, "end_char_pos": 591}, {"type": "R", "before": "which constituted by 3 types ?nance assets(29 stock market indica- tor time series", "after": "comprising three types of financial assets: 28 stock market indicators", "start_char_pos": 605, "end_char_pos": 687}, {"type": "R", "before": "price time series and 19 commodity futuresprice time series). Empirical analyses show that the MST network of returns is time-dependent in overall structure, while same type ?nancial assets usually keep stable inter-connections. Moreover each asset in same group show similar economic characters. In other words, each group concerned with one kind of traditional ?nancial commodity. In", "after": ", and 20 commodity futures. We show that though the resulting MST network evolves over time, the financial assets of similar type tend to have connections which are stable over time. In", "start_char_pos": 710, "end_char_pos": 1095}, {"type": "R", "before": "?nd the time-lag between stock market indicator", "after": "find a characteristic time lag between the", "start_char_pos": 1109, "end_char_pos": 1156}, {"type": "R", "before": "and EUA (EU allowances) , WTI (West Texas Intermediate)volatility time series. The peak of", "after": "of the stock market indicators and those of the EU CO2 emission allowance (EUA) and crude oil futures (WTI). This time lag is given by the peak of the", "start_char_pos": 1180, "end_char_pos": 1270}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1301, "end_char_pos": 1301}, {"type": "D", "before": "between", "after": null, "start_char_pos": 1325, "end_char_pos": 1332}, {"type": "R", "before": "and", "after": "with that of the", "start_char_pos": 1346, "end_char_pos": 1349}, {"type": "R", "before": "show a signi?cant time shift", "after": ", and is markedly different", "start_char_pos": 1374, "end_char_pos": 1402}, {"type": "R", "before": "20days) from 0.", "after": "20 days) from 0, showing that the volatility of stock market indicators today can predict the volatility of EU emissions allowances and of crude oil in the near future.", "start_char_pos": 1406, "end_char_pos": 1421}], "sents_char_pos": [0, 220, 339, 553, 771, 938, 1006, 1092, 1258]}
+{"doc_id": "1206.4087", "revision_depth": "1", "before_revision": " Homology detection is critical to genomics. Identifying homologous sequence allows us to transfer information gathered in URLanism to another quickly and with a high degree of confidence. Non-coding RNA (ncRNA ) presents a challenge for homology detection, as the primary sequence is often poorly conserved and de novo structure prediction remains difficult. This chapter introduces methods developed by the Rfam database for identifying \"families\" of homologous ncRNAs from single \"seed\" sequences using manually curated alignments to build powerful statistical models known as covariance models (CMs) . We provide a brief overview of the state of alignment and secondary structure prediction algorithms. This is followed by a step-by-step iterative protocol for identifying homologs, then constructing an alignment and corresponding CM. We also work through an example , building an alignment and CM for the bacterial small RNA MicA, discovering a previously unreported family of divergent MicA homologs in Xenorhabdus in the process . This chapter will provide readers with the background necessary to begin defining their own ncRNA families suitable for use in comparative, functional, and evolutionary studies of structured RNA elements .", "after_revision": "Emerging high-throughput technologies have led to a deluge of putative non-coding RNA (ncRNA) sequences identified in a wide variety URLanisms. Systematic characterization of these transcripts will be a tremendous challenge. Homology detection is critical to making maximal use of functional information gathered about ncRNAs: identifying homologous sequence allows us to transfer information gathered in URLanism to another quickly and with a high degree of confidence. ncRNA presents a challenge for homology detection, as the primary sequence is often poorly conserved and de novo secondary structure prediction and search remains difficult. This protocol introduces methods developed by the Rfam database for identifying \"families\" of homologous ncRNAs starting from single \"seed\" sequences using manually curated sequence alignments to build powerful statistical models of sequence and structure conservation known as covariance models (CMs) , implemented in the Infernal software package . We provide a step-by-step iterative protocol for identifying ncRNA homologs, then constructing an alignment and corresponding CM. We also work through an example for the bacterial small RNA MicA, discovering a previously unreported family of divergent MicA homologs in genus Xenorhabdus in the process .", "edit_actions": [{"type": "A", "before": null, "after": "Emerging high-throughput technologies have led to a deluge of putative non-coding RNA (ncRNA) sequences identified in a wide variety URLanisms. Systematic characterization of these transcripts will be a tremendous challenge.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "genomics. Identifying", "after": "making maximal use of functional information gathered about ncRNAs: identifying", "start_char_pos": 35, "end_char_pos": 56}, {"type": "R", "before": "Non-coding RNA (ncRNA )", "after": "ncRNA", "start_char_pos": 189, "end_char_pos": 212}, {"type": "R", "before": "structure prediction", "after": "secondary structure prediction and search", "start_char_pos": 320, "end_char_pos": 340}, {"type": "R", "before": "chapter", "after": "protocol", "start_char_pos": 365, "end_char_pos": 372}, {"type": "A", "before": null, "after": "starting", "start_char_pos": 471, "end_char_pos": 471}, {"type": "A", "before": null, "after": "sequence", "start_char_pos": 524, "end_char_pos": 524}, {"type": "A", "before": null, "after": "of sequence and structure conservation", "start_char_pos": 573, "end_char_pos": 573}, {"type": "A", "before": null, "after": ", implemented in the Infernal software package", "start_char_pos": 607, "end_char_pos": 607}, {"type": "D", "before": "brief overview of the state of alignment and secondary structure prediction algorithms. This is followed by a", "after": null, "start_char_pos": 623, "end_char_pos": 732}, {"type": "A", "before": null, "after": "ncRNA", "start_char_pos": 781, "end_char_pos": 781}, {"type": "D", "before": ", building an alignment and CM", "after": null, "start_char_pos": 877, "end_char_pos": 907}, {"type": "A", "before": null, "after": "genus", "start_char_pos": 1015, "end_char_pos": 1015}, {"type": "D", "before": ". This chapter will provide readers with the background necessary to begin defining their own ncRNA families suitable for use in comparative, functional, and evolutionary studies of structured RNA elements", "after": null, "start_char_pos": 1043, "end_char_pos": 1248}], "sents_char_pos": [0, 44, 188, 359, 609, 710, 844, 1044]}
+{"doc_id": "1208.1277", "revision_depth": "1", "before_revision": "In this paper the complex systems are discussed from the business and economics point of view . It will be showed and motivated that social systems are typically chaotic and/or non-linear and therefore non-equilibrium or complex systems. It is discussed that the rapid change global consumer behaviour is underway, that further increases the complexity in the business and management. For successful management under complexity, a following principles are offered: openness and international competition, tolerance and variety of the ideas, self-reliability and low dependence on external help. The paper discusses the opportunities and challenges in management under complexity from macro and micro economic perspective. It is motivated that small economies have good prospects to gain from the global processes underway, if they can demonstrate flexible production , reliable business ethics and good risk management. In this environment, the challenges for corporate managements are being also permanently changed: the balance between short term noise and long term chaos whose attractor includes customers, shareholders and employees must be found. The paper is concluded with the two financial applications: about debt and risk management. The non-equilibrium economic establishment leads to additional problems by using excessive borrowing; unexpected downturns in economy can more easily kill companies. Finally, the demand for quantitative improvements in risk management is postulated . Development of the financial markets has triggered non-linearity to spike in prices of various production articles such as agricultural and other commodities that has added market risk management to the business model of many companies .", "after_revision": "In this chapter the complex systems are discussed in the context of economic and business policy and decision making . It will be showed and motivated that social systems are typically chaotic , non-linear and/or non-equilibrium and therefore complex systems. It is discussed that the rapid change in global consumer behaviour is underway, that further increases the complexity in business and management. For policy making under complexity, following principles are offered: openness and international competition, tolerance and variety of ideas, self-reliability and low dependence on external help. The chapter contains four applications that build on the theoretical motivation of complexity in social systems. The first application demonstrates that small economies have good prospects to gain from the global processes underway, if they can demonstrate production flexibility , reliable business ethics and good risk management. The second application elaborates on and discusses the opportunities and challenges in decision making under complexity from macro and micro economic perspective. In this environment, the challenges for corporate management are being also permanently changed: the balance between short term noise and long term chaos whose attractor includes customers, shareholders and employees must be found. The emergence of chaos in economic relationships is demonstrated by a simple system of differential equations that relate the stakeholders described above. The chapter concludes with two financial applications: about debt and risk management. The non-equilibrium economic establishment leads to additional problems by using excessive borrowing; unexpected downturns in economy can more easily kill companies. Finally, the demand for quantitative improvements in risk management is postulated .", "edit_actions": [{"type": "R", "before": "paper", "after": "chapter", "start_char_pos": 8, "end_char_pos": 13}, {"type": "R", "before": "from the business and economics point of view", "after": "in the context of economic and business policy and decision making", "start_char_pos": 48, "end_char_pos": 93}, {"type": "A", "before": null, "after": ", non-linear", "start_char_pos": 170, "end_char_pos": 170}, {"type": "R", "before": "non-linear and therefore non-equilibrium or", "after": "non-equilibrium and therefore", "start_char_pos": 178, "end_char_pos": 221}, {"type": "A", "before": null, "after": "in", "start_char_pos": 277, "end_char_pos": 277}, {"type": "D", "before": "the", "after": null, "start_char_pos": 358, "end_char_pos": 361}, {"type": "R", "before": "successful management", "after": "policy making", "start_char_pos": 391, "end_char_pos": 412}, {"type": "D", "before": "a", "after": null, "start_char_pos": 431, "end_char_pos": 432}, {"type": "D", "before": "the", "after": null, "start_char_pos": 532, "end_char_pos": 535}, {"type": "R", "before": "paper discusses the opportunities and challenges in management under complexity from macro and micro economic perspective. It is motivated", "after": "chapter contains four applications that build on the theoretical motivation of complexity in social systems. The first application demonstrates", "start_char_pos": 601, "end_char_pos": 739}, {"type": "R", "before": "flexible production", "after": "production flexibility", "start_char_pos": 849, "end_char_pos": 868}, {"type": "A", "before": null, "after": "The second application elaborates on and discusses the opportunities and challenges in decision making under complexity from macro and micro economic perspective.", "start_char_pos": 922, "end_char_pos": 922}, {"type": "R", "before": "managements", "after": "management", "start_char_pos": 973, "end_char_pos": 984}, {"type": "R", "before": "paper is concluded with the", "after": "emergence of chaos in economic relationships is demonstrated by a simple system of differential equations that relate the stakeholders described above. The chapter concludes with", "start_char_pos": 1160, "end_char_pos": 1187}, {"type": "D", "before": ". Development of the financial markets has triggered non-linearity to spike in prices of various production articles such as agricultural and other commodities that has added market risk management to the business model of many companies", "after": null, "start_char_pos": 1497, "end_char_pos": 1734}], "sents_char_pos": [0, 95, 238, 386, 596, 723, 921, 1155, 1247, 1349, 1413, 1498]}
+{"doc_id": "1208.5520", "revision_depth": "2", "before_revision": "In the present work, a novel second-order approximation for ATM option prices is derived for a large class of exponential L\\'evy models . Our method of proof is based on an integral representation of the option price involving the tail probability of the log-return process under the share measure and a suitable change of probability measure under which the pure-jump componentof the log-return%DIFDELCMD < } %%% process becomes a Y-stable process. Our approach is sufficiently general to cover a wide class of L\\'evy processes which satisfy the latter property and whose L\\'evy densities can be closely approximated by a stable density near the origin. The results hereafter shed new light on the connection between both the volatility of the continuous component and the jump parameters and the behavior of ATM option prices near expiration. In the presence of an additional Brownian component, the second-order term, in time-t, is of the form d_{2} t^{(3-Y)/2}, with the coefficient d_{2} depending only on the overall jump intensity of the process and the tail-heaviness parameter Y. This extends the already%DIFDELCMD < } %%% known result that the leading term is \\sigma t^{1/2/2\\pi, where }%DIFDELCMD < \\sigmais %%% the volatility of the continuous component . In contrast, under such a pure-jump model, the dependence on the overall jump intensity and Y is already reflected in the leading term, which is of the form d_{1}t^{1/Y}. The information on the relative frequency of negative and positive jumps appears only in the second-order term , which is shown to be of the form d_{2} t and whose order of decay turns out to be independent of Y. The asymptotic behavior of the corresponding Black-Scholes implied volatilities is also addressed. Our numerical results show that first-order term typically exhibits rather poor performance and that the second-order term significantly improves the approximation's accuracy.", "after_revision": "In the present work, a novel second-order approximation for ATM option prices is derived for a large class of exponential L\\'evy models %DIFDELCMD < } %%% with or without Brownian component. The results hereafter shed new light on the connection between both the volatility of the continuous component and the jump parameters and the behavior of ATM option prices near expiration. In the presence of a Brownian component, the second-order term, in time-t, is of the form d_{2} t^{(3-Y)/2}, with the coefficient d_{2} depending only on %DIFDELCMD < } %%% /2\\pi, where }%DIFDELCMD < \\sigmais %%% Y, the degree of jump activity, on \\sigma, the volatility of the continuous component , and on an additional parameter controlling the intensity of the \"small\" jumps (regardless of their signs) . In contrast, under a pure-jump model, the dependence on Y and on the separate intensities of negative and positive small jumps are already reflected in the leading term, which is of the form d_{1}t^{1/Y}. The second-order term is shown to be of the form d_{2} t and , therefore, its order of decay turns out to be independent of Y. The asymptotic behavior of the corresponding Black-Scholes implied volatilities is also addressed. Our method of proof is based on an integral representation of the option price involving the tail probability of the log-return process under the share measure and a suitable change of probability measure under which the pure-jump component of the log-return process becomes a Y-stable process. Our approach is sufficiently general to cover a wide class of L\\'evy processes which satisfy the latter property and whose L\\'evy densitiy can be closely approximated by a stable density near the origin. Our numerical results show that first-order term typically exhibits rather poor performance and that the second-order term significantly improves the approximation's accuracy.", "edit_actions": [{"type": "D", "before": ". Our method of proof is based on an integral representation of the option price involving the tail probability of the log-return process under the share measure and a suitable change of probability measure under which the", "after": null, "start_char_pos": 136, "end_char_pos": 358}, {"type": "D", "before": "pure-jump componentof the log-return", "after": null, "start_char_pos": 359, "end_char_pos": 395}, {"type": "R", "before": "process becomes a Y-stable process. Our approach is sufficiently general to cover a wide class of L\\'evy processes which satisfy the latter property and whose L\\'evy densities can be closely approximated by a stable density near the origin.", "after": "with or without Brownian component.", "start_char_pos": 414, "end_char_pos": 654}, {"type": "R", "before": "an additional", "after": "a", "start_char_pos": 864, "end_char_pos": 877}, {"type": "D", "before": "the overall jump intensity of the process and the tail-heaviness parameter Y. This extends the", "after": null, "start_char_pos": 1011, "end_char_pos": 1105}, {"type": "D", "before": "already", "after": null, "start_char_pos": 1106, "end_char_pos": 1113}, {"type": "D", "before": "known result that the leading term is \\sigma t^{1/2", "after": null, "start_char_pos": 1132, "end_char_pos": 1183}, {"type": "A", "before": null, "after": "Y, the degree of jump activity, on \\sigma,", "start_char_pos": 1223, "end_char_pos": 1223}, {"type": "A", "before": null, "after": ", and on an additional parameter controlling the intensity of the \"small\" jumps (regardless of their signs)", "start_char_pos": 1267, "end_char_pos": 1267}, {"type": "D", "before": "such", "after": null, "start_char_pos": 1289, "end_char_pos": 1293}, {"type": "R", "before": "the overall jump intensity and Y is", "after": "Y and on the separate intensities of negative and positive small jumps are", "start_char_pos": 1331, "end_char_pos": 1366}, {"type": "D", "before": "information on the relative frequency of negative and positive jumps appears only in the", "after": null, "start_char_pos": 1445, "end_char_pos": 1533}, {"type": "D", "before": ", which", "after": null, "start_char_pos": 1552, "end_char_pos": 1559}, {"type": "R", "before": "whose", "after": ", therefore, its", "start_char_pos": 1599, "end_char_pos": 1604}, {"type": "A", "before": null, "after": "method of proof is based on an integral representation of the option price involving the tail probability of the log-return process under the share measure and a suitable change of probability measure under which the pure-jump component of the log-return process becomes a Y-stable process. Our approach is sufficiently general to cover a wide class of L\\'evy processes which satisfy the latter property and whose L\\'evy densitiy can be closely approximated by a stable density near the origin. Our", "start_char_pos": 1757, "end_char_pos": 1757}, {"type": "R", "before": "rather", "after": "rather", "start_char_pos": 1822, "end_char_pos": 1828}], "sents_char_pos": [0, 137, 449, 654, 844, 1088, 1269, 1440, 1653, 1752]}
+{"doc_id": "1209.3924", "revision_depth": "1", "before_revision": "Multimodal oncological strategies which combine chemotherapy or radiotherapy with hyperthermia (i.e. raising the temperature of a region of the body affected by cancer) have a potential of improving the efficacy of the non-surgical methods of cancer treatment. Hyperthermia engages the heat shock response mechanism (HSR), which main component (the heat shock proteins) is known to directly prevent the intended apoptosis of cancer cells. Moreover, cancer cells can have an already partially activated HSR, thereby hyperthermia may be more toxic to them relative to normal cells. However , HSR triggers thermotolerance, i.e. the hyperthermia treated cells show an impairment in their susceptibility to a subsequent heat-induced stress. For that reason, the application of the combined hyperthermia therapy should be carefully examined . We adapt our previous HSR model and propose its stochastic extension, which we then analyze using the approximate probabilistic model checking (APMC) technique. We formalize the notion of the thermotolerance and compute the size and the duration of the HSR-induced thermotolerance. We quantify the effect of a combined therapy of hyperthermia and a cytotoxic inhibition of proteins refolding . By mechanistic modeling of HSR we are able to support the common belief that the combination of cancer treatment strategies increases therapy efficacy. Moreover, our results demonstrate feasibility and practical potential of APMC in analysis of stochastic models of signaling pathways.", "after_revision": "Multimodal oncological strategies which combine chemotherapy or radiotherapy with hyperthermia have a potential of improving the efficacy of the non-surgical methods of cancer treatment. Hyperthermia engages the heat-shock response mechanism (HSR), which main component (the heat-shock proteins) is known to directly prevent the intended apoptosis of cancer cells. Moreover, cancer cells can have an already partially activated HSR, thereby hyperthermia may be more toxic to them relative to normal cells. On the other hand , HSR triggers thermotolerance, i.e. the hyperthermia treated cells show an impairment in their susceptibility to a subsequent heat-induced stress. This poses a question about the efficacy and about an optimal strategy of the therapy combined with hyperthermia treatment . We adapt our previous HSR model and propose its stochastic extension, which we then analyse using the approximate probabilistic model checking (APMC) technique. We formalise the notion of the thermotolerance and estimate the intensity and the duration of the HSR-induced thermotolerance. Finally, we quantify the effect of a multimodal therapy based on hyperthermia and a cytotoxic effect of bortezomib, a proteasome inhibitor, and we propose an optimal strategy for combining these two modalities . By mechanistic modelling of HSR we are able to support the common belief that the combination of cancer treatment strategies increases therapy efficacy. Moreover, our results demonstrate feasibility and practical potential of APMC in analysis of stochastic models of signalling pathways.", "edit_actions": [{"type": "D", "before": "(i.e. raising the temperature of a region of the body affected by cancer)", "after": null, "start_char_pos": 95, "end_char_pos": 168}, {"type": "R", "before": "heat shock", "after": "heat-shock", "start_char_pos": 286, "end_char_pos": 296}, {"type": "R", "before": "heat shock", "after": "heat-shock", "start_char_pos": 349, "end_char_pos": 359}, {"type": "R", "before": "However", "after": "On the other hand", "start_char_pos": 580, "end_char_pos": 587}, {"type": "R", "before": "For that reason, the application of the combined hyperthermia therapy should be carefully examined", "after": "This poses a question about the efficacy and about an optimal strategy of the therapy combined with hyperthermia treatment", "start_char_pos": 736, "end_char_pos": 834}, {"type": "R", "before": "analyze", "after": "analyse", "start_char_pos": 921, "end_char_pos": 928}, {"type": "R", "before": "formalize", "after": "formalise", "start_char_pos": 1001, "end_char_pos": 1010}, {"type": "R", "before": "compute the size", "after": "estimate the intensity", "start_char_pos": 1049, "end_char_pos": 1065}, {"type": "R", "before": "We", "after": "Finally, we", "start_char_pos": 1119, "end_char_pos": 1121}, {"type": "R", "before": "combined therapy of", "after": "multimodal therapy based on", "start_char_pos": 1147, "end_char_pos": 1166}, {"type": "R", "before": "inhibition of proteins refolding", "after": "effect of bortezomib, a proteasome inhibitor, and we propose an optimal strategy for combining these two modalities", "start_char_pos": 1196, "end_char_pos": 1228}, {"type": "R", "before": "modeling", "after": "modelling", "start_char_pos": 1246, "end_char_pos": 1254}, {"type": "R", "before": "signaling", "after": "signalling", "start_char_pos": 1497, "end_char_pos": 1506}], "sents_char_pos": [0, 260, 438, 579, 735, 836, 997, 1118, 1230, 1382]}
+{"doc_id": "1211.4473", "revision_depth": "1", "before_revision": "Microgrids represent an emerging paradigm of future electric power systems that integrate both distributed and centralized generation . Two recent trends in microgrids are the integration of local renewable energy sources (such as wind farms) and the use of co-generation (i.e., to supply both electricity and heat). However, these trends also bring unprecedented challenges to the design of intelligent control strategies for the microgrids. Traditional generation scheduling paradigms assuming perfect prediction of future electricity supply and demand are no longer applicable to microgrids with unpredictable renewable energy supply and co-generation (that depends on both electricity and heat demand). In this paper, we study online algorithms for the micro-grid generation scheduling problem with intermittent renewable energy sources and co-generation, in order to maximize the cost-savings with local generation. Based on insights from the structure of the offline optimal solution, we propose a class of competitive online algorithms, called CHASE (Competitive Heuristic Algorithm for Scheduling Energy-generation), that track the offline optimal in an online fashion. Under certain settings, we show that CHASE achieves the best competitive ratio of all deterministic online algorithms . We also extend our algorithms to intelligently leverage on limited prediction of the future, such as near-term demand or wind forecast. By extensive empirical evaluation using real-world traces, we show that our proposed algorithms can achieve near-offline-optimal performance. In a representative scenario, CHASE leads to around 20\\% cost savings with no future look-ahead at all, and the cost-savings further increase with limited future look-ahead.", "after_revision": "Microgrids represent an emerging paradigm of future electric power systems that can utilize both distributed and centralized generations . Two recent trends in microgrids are the integration of local renewable energy sources (such as wind farms) and the use of co-generation (i.e., to supply both electricity and heat). However, these trends also bring unprecedented challenges to the design of intelligent control strategies for microgrids. Traditional generation scheduling paradigms rely on perfect prediction of future electricity supply and demand . They are no longer applicable to microgrids with unpredictable renewable energy supply and with co-generation (that needs to consider both electricity and heat demand). In this paper, we study online algorithms for the microgrid generation scheduling problem with intermittent renewable energy sources and co-generation, with the goal of maximizing the cost-savings with local generation. Based on the insights from the structure of the offline optimal solution, we propose a class of competitive online algorithms, called CHASE (Competitive Heuristic Algorithm for Scheduling Energy-generation), that track the offline optimal in an online fashion. Under typical settings, we show that CHASE achieves the best competitive ratio among all deterministic online algorithms , and the ratio is no larger than a small constant 3.", "edit_actions": [{"type": "R", "before": "integrate", "after": "can utilize", "start_char_pos": 80, "end_char_pos": 89}, {"type": "R", "before": "generation", "after": "generations", "start_char_pos": 123, "end_char_pos": 133}, {"type": "D", "before": "the", "after": null, "start_char_pos": 427, "end_char_pos": 430}, {"type": "R", "before": "assuming", "after": "rely on", "start_char_pos": 487, "end_char_pos": 495}, {"type": "A", "before": null, "after": ". They", "start_char_pos": 555, "end_char_pos": 555}, {"type": "A", "before": null, "after": "with", "start_char_pos": 642, "end_char_pos": 642}, {"type": "R", "before": "depends on", "after": "needs to consider", "start_char_pos": 663, "end_char_pos": 673}, {"type": "R", "before": "micro-grid", "after": "microgrid", "start_char_pos": 759, "end_char_pos": 769}, {"type": "R", "before": "in order to maximize the", "after": "with the goal of maximizing the", "start_char_pos": 862, "end_char_pos": 886}, {"type": "A", "before": null, "after": "the", "start_char_pos": 932, "end_char_pos": 932}, {"type": "R", "before": "certain", "after": "typical", "start_char_pos": 1187, "end_char_pos": 1194}, {"type": "R", "before": "of", "after": "among", "start_char_pos": 1260, "end_char_pos": 1262}, {"type": "R", "before": ". We also extend our algorithms to intelligently leverage on limited prediction of the future, such as near-term demand or wind forecast. By extensive empirical evaluation using real-world traces, we show that our proposed algorithms can achieve near-offline-optimal performance. In a representative scenario, CHASE leads to around 20\\% cost savings with no future look-ahead at all, and the cost-savings further increase with limited future look-ahead.", "after": ", and the ratio is no larger than a small constant 3.", "start_char_pos": 1299, "end_char_pos": 1752}], "sents_char_pos": [0, 135, 316, 442, 708, 922, 1180, 1300, 1436, 1578]}
+{"doc_id": "1301.3100", "revision_depth": "3", "before_revision": "We consider the optimal problem \\sup:=\\sup} _{\\tau\\inT _{\\eps,T } \\mathbb{E[i=1^n (\\tau-\\eps^i)^+^i], where } B_{(\\tau-\\eps)^+} posed by Shiryaev at the International Conference on Advanced Stochastic Optimization URLanized by the Steklov Institute of Mathematics in September 2012. Here } T>0 is a fixed time horizon, ( \\phi_t^i )_{0\\leq t\\leq T} is progressively measurable with respect to the Brownian filtration , \\eps ^i \\in[0,T] is a constant, i=1,...o,n, and T_{\\eps,T} is the set of stopping times that lie between a constant \\eps \\in[0,T] and T. We solve this problem by conditioning and then using the theory of reflected backward stochastic differential equations (RBSDEs). As a corollary, we provide the solution to the optimal stopping problem \\sup_{\\tau\\in\\mathcal{T_{0,T}}\\mathbb{E}B_{(\\tau-\\eps)^+} recently posed by Shiryaev at the International Conference on Advanced Stochastic Optimization URLanized by the Steklov Institute of Mathematics in September 2012. We also provide its asymptotic order } \\eps \\to follows. For large enough }\\eps and for small }\\eps as \\eps\\searrow 0. ", "after_revision": "We consider the optimal stopping problem v^{(\\eps):=\\sup} _{\\tau\\inT _{0,T } [i=1^n (\\tau-\\eps^i)^+^i], where } \\mathbb{EB_{(\\tau-\\eps)^+} posed by Shiryaev at the International Conference on Advanced Stochastic Optimization URLanized by the Steklov Institute of Mathematics in September 2012. Here } T>0 is a fixed time horizon, ( B_t )_{0\\leq t\\leq T} is the Brownian motion , \\eps \\in[0,T] is a constant, and T_{\\eps,T} is the set of stopping times taking values in \\eps ,T . The solution of this problem is characterized by a path dependent reflected backward stochastic differential equations _{0,T}}\\mathbb{E}B_{(\\tau-\\eps)^+} recently posed by Shiryaev at the International Conference on Advanced Stochastic Optimization URLanized by the Steklov Institute of Mathematics in September 2012. We also provide its asymptotic order } , from which the continuity of\\eps \\to v^{(\\eps) follows. For large enough }\\eps, we obtain an explicit expression for v^{(\\eps) and for small }\\eps we have lower and upper bounds. The main result of the paper is the asymptotics of v^{(\\eps) as \\eps\\searrow 0. As a byproduct, we also obtain L\\'{e", "edit_actions": [{"type": "R", "before": "problem \\sup", "after": "stopping problem v^{(\\eps)", "start_char_pos": 24, "end_char_pos": 36}, {"type": "R", "before": "_{\\eps,T", "after": "_{0,T", "start_char_pos": 55, "end_char_pos": 63}, {"type": "D", "before": "\\mathbb{E", "after": null, "start_char_pos": 66, "end_char_pos": 75}, {"type": "A", "before": null, "after": "\\mathbb{E", "start_char_pos": 110, "end_char_pos": 110}, {"type": "R", "before": "\\phi_t^i", "after": "B_t", "start_char_pos": 321, "end_char_pos": 329}, {"type": "R", "before": "progressively measurable with respect to the Brownian filtration", "after": "the Brownian motion", "start_char_pos": 351, "end_char_pos": 415}, {"type": "D", "before": "^i", "after": null, "start_char_pos": 423, "end_char_pos": 425}, {"type": "D", "before": "i=1,...o,n,", "after": null, "start_char_pos": 450, "end_char_pos": 461}, {"type": "R", "before": "that lie between a constant", "after": "taking values in", "start_char_pos": 506, "end_char_pos": 533}, {"type": "R", "before": "\\in[0,T] and T. We solve this problem by conditioning and then using the theory of", "after": ",T", "start_char_pos": 539, "end_char_pos": 621}, {"type": "A", "before": null, "after": ". The solution of this problem is characterized by a path dependent", "start_char_pos": 622, "end_char_pos": 622}, {"type": "D", "before": "(RBSDEs). As a corollary, we provide the solution to the optimal stopping problem \\sup_{\\tau\\in\\mathcal{T", "after": null, "start_char_pos": 676, "end_char_pos": 781}, {"type": "A", "before": null, "after": ", from which the continuity of", "start_char_pos": 1019, "end_char_pos": 1019}, {"type": "A", "before": null, "after": "v^{(\\eps)", "start_char_pos": 1028, "end_char_pos": 1028}, {"type": "A", "before": null, "after": ", we obtain an explicit expression for v^{(\\eps)", "start_char_pos": 1060, "end_char_pos": 1060}, {"type": "A", "before": null, "after": "we have lower and upper bounds. The main result of the paper is the asymptotics of v^{(\\eps)", "start_char_pos": 1081, "end_char_pos": 1081}, {"type": "A", "before": null, "after": "As a byproduct, we also obtain L\\'{e", "start_char_pos": 1101, "end_char_pos": 1101}], "sents_char_pos": [0, 282, 554, 685, 979, 1037]}
+{"doc_id": "1302.7075", "revision_depth": "2", "before_revision": "Existing computational methods to predict protein--protein interaction affinity often perform poorly in important test cases. In particular, the effects of multiple mutations, non-alanine substitutions, and flexible loops are difficult to predict with available tools and protocols. We present here a new method to interrogate affinity differences resulting from mutations in a host-virus protein--protein interface. Our method is based on extensive non-equilibrium all-atom simulations: We computationally pull the machupo virus (MACV) spike glycoprotein (GP1) away from the human transferrin receptor (hTfR1) and estimate affinity using the maximum applied force during a pulling simulation and the area under the force-versus-distance curve. We find that these quantities provide novel biophysical insight into the GP1/hTfR1 interaction. First, with no prior knowledge of the system we can differentiate among wild-type and mutant complexes. Second, although the static co-crystal structure shows two large hydrogen-bonding networks in the GP1/hTfR1 interface, our simulations indicate that only one of them is critical for the bindinginteraction . Third, one viral site known to be critical for infection may mark an important evolutionary suppressor site for infection-resistant hTfR1 mutants. Finally, our method provides an elegant framework to compare the effects of multiple mutations, individually and jointly, on protein--protein interactions.", "after_revision": "In many biological applications, we would like to be able to computationally predict mutational effects on affinity in protein-protein interactions. However, many commonly used methods to predict these effects perform poorly in important test cases. In particular, the effects of multiple mutations, non-alanine substitutions, and flexible loops are difficult to predict with available tools and protocols. We present here an existing method applied in a novel way to a new test case; we interrogate affinity differences resulting from mutations in a host-virus protein-protein interface. We use steered molecular dynamics (SMD) to computationally pull the machupo virus (MACV) spike glycoprotein (GP1) away from the human transferrin receptor (hTfR1) . We then approximate affinity using the maximum applied force of separation and the area under the force-versus-distance curve. We find , even without the rigor and planning required for free energy calculations, that these quantities can provide novel biophysical insight into the GP1/hTfR1 interaction. First, with no prior knowledge of the system we can differentiate among wild type and mutant complexes. Moreover, we show that this simple SMD scheme correlates well with relative free energy differences computed via free energy perturbation. Second, although the static co-crystal structure shows two large hydrogen-bonding networks in the GP1/hTfR1 interface, our simulations indicate that one of them may not be important for tight binding . Third, one viral site known to be critical for infection may mark an important evolutionary suppressor site for infection-resistant hTfR1 mutants. Finally, our approach provides a framework to compare the effects of multiple mutations, individually and jointly, on protein-protein interactions.", "edit_actions": [{"type": "R", "before": "Existing computational methods to predict protein--protein interaction affinity often", "after": "In many biological applications, we would like to be able to computationally predict mutational effects on affinity in protein-protein interactions. However, many commonly used methods to predict these effects", "start_char_pos": 0, "end_char_pos": 85}, {"type": "R", "before": "a new method to", "after": "an existing method applied in a novel way to a new test case; we", "start_char_pos": 299, "end_char_pos": 314}, {"type": "R", "before": "protein--protein interface. Our method is based on extensive non-equilibrium all-atom simulations: We", "after": "protein-protein interface. We use steered molecular dynamics (SMD) to", "start_char_pos": 389, "end_char_pos": 490}, {"type": "R", "before": "and estimate", "after": ". We then approximate", "start_char_pos": 611, "end_char_pos": 623}, {"type": "R", "before": "during a pulling simulation", "after": "of separation", "start_char_pos": 665, "end_char_pos": 692}, {"type": "A", "before": null, "after": ", even without the rigor and planning required for free energy calculations,", "start_char_pos": 753, "end_char_pos": 753}, {"type": "A", "before": null, "after": "can", "start_char_pos": 776, "end_char_pos": 776}, {"type": "R", "before": "wild-type", "after": "wild type", "start_char_pos": 915, "end_char_pos": 924}, {"type": "A", "before": null, "after": "Moreover, we show that this simple SMD scheme correlates well with relative free energy differences computed via free energy perturbation.", "start_char_pos": 947, "end_char_pos": 947}, {"type": "D", "before": "only", "after": null, "start_char_pos": 1097, "end_char_pos": 1101}, {"type": "R", "before": "is critical for the bindinginteraction", "after": "may not be important for tight binding", "start_char_pos": 1114, "end_char_pos": 1152}, {"type": "R", "before": "method provides an elegant", "after": "approach provides a", "start_char_pos": 1315, "end_char_pos": 1341}, {"type": "R", "before": "protein--protein", "after": "protein-protein", "start_char_pos": 1427, "end_char_pos": 1443}], "sents_char_pos": [0, 125, 282, 416, 744, 842, 946, 1154, 1301]}
+{"doc_id": "1304.7664", "revision_depth": "2", "before_revision": "Algorithms with low computational intensity show interesting performance and power consumption behavior on multicore processors. We choose the lattice-Boltzmann method (LBM) as a prototype for this scenario in order to show if and how single-chip performance and power characteristics can be generalized to the highly parallel case. LBM is an algorithm for CFD simulations that has gained popularity due to its ease of implementation and suitability for complex geometries. In this paper we perform a thorough analysis of a sparse-lattice LBM implementation on the Intel Sandy Bridge processor. Starting from a single-core performance model we can describe the intra-chip saturation characteristics of the code and its optimal operating point in terms of energy to solution as a function of the propagation method, the clock frequency, and the SIMD vectorization. We then show how these findings may be extrapolated to the massively parallel level on a petascale-class machine, and quantify the energy-saving potential of various optimizations. We find that high single-core performance and a correct choice of the number of cores used on the chip are the essential factors for lowest energy to solution with minimal loss of performance . In the highly parallel case, these guidelines are found to be even more important for fixing the optimal performance-energy operating point , especially when taking the system's baseline power consumption and the MPI communication characteristics into account. Simplistic measures often applied by users and computing centers, such as setting a low clock speed for memory-bound applications, have limited impact .", "after_revision": "Memory-bound algorithms show complex performance and energy consumption behavior on multicore processors. We choose the lattice-Boltzmann method (LBM) on an Intel Sandy Bridge cluster as a prototype scenario to investigate if and how single-chip performance and power characteristics can be generalized to the highly parallel case. First we perform an analysis of a sparse-lattice LBM implementation for complex geometries. Using a single-core performance model , we predict the intra-chip saturation characteristics and the optimal operating point in terms of energy to solution as a function of implementation details, clock frequency, vectorization, and number of active cores per chip. We show that high single-core performance and a correct choice of the number of active cores per chip are the essential optimizations for lowest energy to solution at minimal performance degradation. Then we extrapolate to the MPI-parallel level and quantify the energy-saving potential of various optimizations and execution modes, where we find these guidelines to be even more important , especially when communication overhead is non-negligible. In our setup we could achieve energy savings of 35\\% in this case, compared to a naive approach. We also demonstrate that a simple non-reflective reduction of the clock speed leaves most of the energy saving potential unused .", "edit_actions": [{"type": "R", "before": "Algorithms with low computational intensity show interesting performance and power", "after": "Memory-bound algorithms show complex performance and energy", "start_char_pos": 0, "end_char_pos": 82}, {"type": "A", "before": null, "after": "on an Intel Sandy Bridge cluster", "start_char_pos": 174, "end_char_pos": 174}, {"type": "R", "before": "for this scenario in order to show", "after": "scenario to investigate", "start_char_pos": 190, "end_char_pos": 224}, {"type": "R", "before": "LBM is an algorithm for CFD simulations that has gained popularity due to its ease of implementation and suitability for complex geometries. In this paper we perform a thorough", "after": "First we perform an", "start_char_pos": 334, "end_char_pos": 510}, {"type": "R", "before": "on the Intel Sandy Bridge processor. Starting from", "after": "for complex geometries. Using", "start_char_pos": 559, "end_char_pos": 609}, {"type": "R", "before": "we can describe", "after": ", we predict", "start_char_pos": 642, "end_char_pos": 657}, {"type": "R", "before": "of the code and its", "after": "and the", "start_char_pos": 700, "end_char_pos": 719}, {"type": "R", "before": "the propagation method, the", "after": "implementation details,", "start_char_pos": 792, "end_char_pos": 819}, {"type": "R", "before": "and the SIMD vectorization. We then show how these findings may be extrapolated to the massively parallel level on a petascale-class machine, and quantify the energy-saving potential of various optimizations. We find", "after": "vectorization, and number of active cores per chip. We show", "start_char_pos": 837, "end_char_pos": 1053}, {"type": "R", "before": "cores used on the", "after": "active cores per", "start_char_pos": 1126, "end_char_pos": 1143}, {"type": "R", "before": "factors", "after": "optimizations", "start_char_pos": 1167, "end_char_pos": 1174}, {"type": "R", "before": "with minimal loss of performance . In the highly parallel case, these guidelines are found", "after": "at minimal performance degradation. Then we extrapolate to the MPI-parallel level and quantify the energy-saving potential of various optimizations and execution modes, where we find these guidelines", "start_char_pos": 1205, "end_char_pos": 1295}, {"type": "D", "before": "for fixing the optimal performance-energy operating point", "after": null, "start_char_pos": 1322, "end_char_pos": 1379}, {"type": "R", "before": "taking the system's baseline power consumption and the MPI communication characteristics into account. Simplistic measures often applied by users and computing centers, such as setting a low clock speed for memory-bound applications, have limited impact", "after": "communication overhead is non-negligible. In our setup we could achieve energy savings of 35\\% in this case, compared to a naive approach. We also demonstrate that a simple non-reflective reduction of the clock speed leaves most of the energy saving potential unused", "start_char_pos": 1398, "end_char_pos": 1651}], "sents_char_pos": [0, 128, 333, 474, 595, 864, 1045, 1239, 1500]}
+{"doc_id": "1307.0444", "revision_depth": "1", "before_revision": "An on-going debate in the energy economics and power market community has raised the question if energy-only power markets are increasingly failing due to growing in-feed shares from subsidized renewable energy sources (RES) . The short answer to this is: No , they are not failing ! Energy-based power markets are, however, facing several market distortions, namely from the gap between the electricity volume traded at spot markets versus the overall electricity consumption as well as the (wrong) regulatory assumption that variable RES generation, i.e., wind and PV, have zero marginal operation costs. This paper shows that both effects overamplify the well-known merit-order effect of RES power in-feed beyond a level that can still be explained by the underlying physical realities . In this paper we analyze the current situation of wind and photovoltaic (PV ) power in-feed in the German electric power system and their effect on the spot market \\approx20 . We show a comparison of the FIT-subsidized renewable energy sources (RES ) energy production volume to the spot market volume and the overall load demand. Furthermore, a spot market analysis based on the assumption that renewable energy sources (RES ) units have to feed-in with their assumed true marginal costs, i.e., operation and maintenance costs, is performed. Our combined analysis results show that, if the necessary regulatory adaptations are taken, i.e., significantly increasing the spot market's share of overall load demand and using true marginal costs of RES units in the merit-order, energy-based power markets can remain functional despite very high RES power in-feed.", "after_revision": "An on-going debate in the energy economics and power market community has raised the question if energy-only power markets are increasingly failing due to growing in-feed shares from subsidized RES . The short answer to this is: no , they are not failing . Energy-based power markets are, however, facing several market distortions, namely from the gap between the electricity volume traded at spot markets versus the overall electricity consumption as well as the (wrong) regulatory assumption that variable RES generation, i.e., wind and PV, truly have zero marginal operation costs. We show that both effects overamplify the well-known merit-order effect of RES power in-feed beyond a level that is explainable by underlying physical realities , i.e., thermal power plants being willing to accept negative electricity prices to be able to stay online due to considerations of wear tear and start-stop constraints. In this paper we analyze the impacts of wind and PV power in-feed on the spot market for a region that is already today experiencing significant FIT-subsidized RES power in-feed (\\approx20\\%), the German-Austrian market zone of the EPEX . We show a comparison of the FIT-subsidized RES energy production volume to the spot market volume and the overall load demand. Furthermore, a spot market analysis based on the assumption that RES units have to feed-in with their assumed true marginal costs, i.e., operation , maintenance and balancing costs, is performed. Our analysis results show that, if the necessary regulatory adaptations are taken, i.e., increasing the spot market's share of overall load demand and using the true marginal costs of RES units in the merit-order, energy-based power markets can remain functional despite high RES power in-feed.", "edit_actions": [{"type": "R", "before": "renewable energy sources (RES)", "after": "RES", "start_char_pos": 194, "end_char_pos": 224}, {"type": "R", "before": "No", "after": "no", "start_char_pos": 256, "end_char_pos": 258}, {"type": "R", "before": "!", "after": ".", "start_char_pos": 282, "end_char_pos": 283}, {"type": "A", "before": null, "after": "truly", "start_char_pos": 571, "end_char_pos": 571}, {"type": "R", "before": "This paper shows", "after": "We show", "start_char_pos": 608, "end_char_pos": 624}, {"type": "R", "before": "can still be explained by the", "after": "is explainable by", "start_char_pos": 730, "end_char_pos": 759}, {"type": "R", "before": ".", "after": ", i.e., thermal power plants being willing to accept negative electricity prices to be able to stay online due to considerations of wear", "start_char_pos": 790, "end_char_pos": 791}, {"type": "A", "before": null, "after": "tear and start-stop constraints.", "start_char_pos": 792, "end_char_pos": 792}, {"type": "R", "before": "current situation", "after": "impacts", "start_char_pos": 822, "end_char_pos": 839}, {"type": "R", "before": "photovoltaic (PV )", "after": "PV", "start_char_pos": 852, "end_char_pos": 870}, {"type": "D", "before": "in the German electric power system and their effect", "after": null, "start_char_pos": 885, "end_char_pos": 937}, {"type": "A", "before": null, "after": "for a region that is already today experiencing significant FIT-subsidized RES power in-feed (", "start_char_pos": 957, "end_char_pos": 957}, {"type": "A", "before": null, "after": "\\%), the German-Austrian market zone of the EPEX", "start_char_pos": 966, "end_char_pos": 966}, {"type": "R", "before": "renewable energy sources (RES )", "after": "RES", "start_char_pos": 1012, "end_char_pos": 1043}, {"type": "R", "before": "renewable energy sources (RES )", "after": "RES", "start_char_pos": 1189, "end_char_pos": 1220}, {"type": "R", "before": "and maintenance", "after": ", maintenance and balancing", "start_char_pos": 1299, "end_char_pos": 1314}, {"type": "D", "before": "combined", "after": null, "start_char_pos": 1340, "end_char_pos": 1348}, {"type": "D", "before": "significantly", "after": null, "start_char_pos": 1434, "end_char_pos": 1447}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1516, "end_char_pos": 1516}, {"type": "D", "before": "very", "after": null, "start_char_pos": 1627, "end_char_pos": 1631}], "sents_char_pos": [0, 255, 607, 791, 968, 1123, 1335]}
+{"doc_id": "1307.5319", "revision_depth": "2", "before_revision": "The aim of this work is to explore the possible types of phenomena that simple macroeconomic Agent-Based models (ABM) can reproduce. Our motivation is to understand the large macro-economic fluctuations observed in the \"Mark I\" ABM. Our central finding is the generic existence of a phase transition between a \"good economy\" where unemployment is low, and a \"bad economy\" where unemployment is high. We show that this transition is induced by an asymmetry between the rate of hiring and the rate of firing of the firms. This asymmetry is, in Mark I, due to the fact that as the interest rate increases, firms become more and more reluctant to take further loans and have to reduce their workforce. The unemployment level remains small until a tipping point, beyond which the economy suddenly collapses. If the parameters are such that the system is close to this transition, any small fluctuation is amplified as the system jumps between the two equilibria. We have explored several natural extensions of the model. One is to introduce a bankruptcy threshold, limiting the leverage of firms. This leads to a rich phase diagram with, in particular, a region where acute endogenous crises occur, during which the unemployment rate shoots up before the economy can recover. We allow the hiring/firing propensity to depend on the financial fragility of firms, and introduce simple wage update policies. This leads to inflation (in the \"good\" phase) or deflation (in the \"bad\" phase), but leaves the overall phase diagram of the model essentially unchanged. We have finally explored the effect of simple monetary policies that attempt to contain rising unemployment and defang crises. We end the paper with general comments on the usefulness of ABMs to model macroeconomic phenomena, in particular in view of the time needed to reach a steady state that raises the issue of ergodicity in these models.", "after_revision": "The aim of this work is to explore the possible types of phenomena that simple macroeconomic Agent-Based models (ABM) can reproduce. We propose a methodology, inspired by statistical physics, that characterizes a model through its 'phase diagram' in the space of parameters. Our first motivation is to understand the large macro-economic fluctuations observed in the 'Mark I' ABM. Our major finding is the generic existence of a phase transition between a 'good economy' where unemployment is low, and a 'bad economy' where unemployment is high. We introduce a simpler framework that allows us to show that this transition is robust against many modifications of the model, and is generically induced by an asymmetry between the rate of hiring and the rate of firing of the firms. The unemployment level remains small until a tipping point, beyond which the economy suddenly collapses. If the parameters are such that the system is close to this transition, any small fluctuation is amplified as the system jumps between the two equilibria. We have explored several natural extensions of the model. One is to introduce a bankruptcy threshold, limiting the leverage of firms. This leads to a rich phase diagram with, in particular, a region where acute endogenous crises occur, during which the unemployment rate shoots up before the economy can recover. We also introduce simple wage policies. This leads to inflation (in the 'good' phase) or deflation (in the 'bad' phase), but leaves the overall phase diagram of the model essentially unchanged. We have also started exploring the effect of simple monetary policies that attempt to contain rising unemployment and defang crises. We end the paper with general comments on the usefulness of ABMs to model macroeconomic phenomena, in particular in view of the time needed to reach a steady state that raises the issue of ergodicity in these models.", "edit_actions": [{"type": "R", "before": "Our", "after": "We propose a methodology, inspired by statistical physics, that characterizes a model through its 'phase diagram' in the space of parameters. Our first", "start_char_pos": 133, "end_char_pos": 136}, {"type": "R", "before": "\"Mark I\"", "after": "'Mark I'", "start_char_pos": 219, "end_char_pos": 227}, {"type": "R", "before": "central", "after": "major", "start_char_pos": 237, "end_char_pos": 244}, {"type": "R", "before": "\"good economy\"", "after": "'good economy'", "start_char_pos": 310, "end_char_pos": 324}, {"type": "R", "before": "\"bad economy\"", "after": "'bad economy'", "start_char_pos": 358, "end_char_pos": 371}, {"type": "A", "before": null, "after": "introduce a simpler framework that allows us to", "start_char_pos": 403, "end_char_pos": 403}, {"type": "A", "before": null, "after": "robust against many modifications of the model, and is generically", "start_char_pos": 433, "end_char_pos": 433}, {"type": "D", "before": "This asymmetry is, in Mark I, due to the fact that as the interest rate increases, firms become more and more reluctant to take further loans and have to reduce their workforce.", "after": null, "start_char_pos": 522, "end_char_pos": 699}, {"type": "R", "before": "allow the hiring/firing propensity to depend on the financial fragility of firms, and", "after": "also", "start_char_pos": 1276, "end_char_pos": 1361}, {"type": "D", "before": "update", "after": null, "start_char_pos": 1384, "end_char_pos": 1390}, {"type": "R", "before": "\"good\"", "after": "'good'", "start_char_pos": 1433, "end_char_pos": 1439}, {"type": "R", "before": "\"bad\"", "after": "'bad'", "start_char_pos": 1468, "end_char_pos": 1473}, {"type": "R", "before": "finally explored", "after": "also started exploring", "start_char_pos": 1563, "end_char_pos": 1579}], "sents_char_pos": [0, 132, 232, 399, 521, 699, 804, 959, 1017, 1093, 1272, 1400, 1554, 1681]}
+{"doc_id": "1309.5209", "revision_depth": "2", "before_revision": "We unravel how functional plasticity and redundancy are essential mechanisms underlying the ability to survive of metabolic networks. For that, we perform an exhaustive computational screening of synthetic lethal reaction pairs in Escherichia coli in minimal medium and find that synthetic lethals divide in two different groups depending on whether the synthetic lethal interaction works as a back up or as a parallel use mechanism, the first corresponding to essential plasticity and the second to essential redundancy. In E. coli, the analysis of how pathways are entangled through essential redundancy supports the view that synthetic lethality affects preferentially a single function or pathway. In contrast, essential plasticity, the dominant class, tends to be inter-pathway but concentrated and unveils Cell Envelope Biosynthesis as an essential backup to Membrane Lipid Metabolism. When comparing E. coli and Mycoplasma pneumoniae, we find that the metabolic networks of the URLanisms exhibit opposite relationships between the relative importance of plasticity and redundancy , consistent with the conjecture that plasticity is a more sophisticated mechanism that requires a more URLanization. Finally, coessential reaction pairs are explored in different environmental conditions to uncover the interplay between the two mechanisms. We find that synthetic lethal interactions and their classification in plasticity and redundancy are basically insensitive to minimal medium composition, and are highly conserved even when the environment is enriched with nonessential compounds or overconstrained to decrease maximum biomass formation.", "after_revision": "We unravel how functional plasticity and redundancy are essential mechanisms underlying the ability to survive of metabolic networks. We perform an exhaustive computational screening of synthetic lethal reaction pairs in Escherichia coli in a minimal medium and we find that synthetic lethal pairs divide in two different groups depending on whether the synthetic lethal interaction works as a backup or as a parallel use mechanism, the first corresponding to essential plasticity and the second to essential redundancy. In E. coli, the analysis of pathways entanglement through essential redundancy supports the view that synthetic lethality affects preferentially a single function or pathway. In contrast, essential plasticity, the dominant class, tends to be inter-pathway but strongly localized and unveils Cell Envelope Biosynthesis as an essential backup for Membrane Lipid Metabolism. When comparing E. coli and Mycoplasma pneumoniae, we find that the metabolic networks of the URLanisms exhibit a large difference in the relative importance of plasticity and redundancy which is consistent with the conjecture that plasticity is a sophisticated mechanism that requires a URLanization. Finally, coessential reaction pairs are explored in different environmental conditions to uncover the interplay between the two mechanisms. We find that synthetic lethal interactions and their classification in plasticity and redundancy are basically insensitive to medium composition, and are highly conserved even when the environment is enriched with nonessential compounds or overconstrained to decrease maximum biomass formation.", "edit_actions": [{"type": "R", "before": "For that, we", "after": "We", "start_char_pos": 134, "end_char_pos": 146}, {"type": "A", "before": null, "after": "a", "start_char_pos": 251, "end_char_pos": 251}, {"type": "A", "before": null, "after": "we", "start_char_pos": 271, "end_char_pos": 271}, {"type": "R", "before": "lethals", "after": "lethal pairs", "start_char_pos": 292, "end_char_pos": 299}, {"type": "R", "before": "back up", "after": "backup", "start_char_pos": 396, "end_char_pos": 403}, {"type": "R", "before": "how pathways are entangled", "after": "pathways entanglement", "start_char_pos": 552, "end_char_pos": 578}, {"type": "R", "before": "concentrated", "after": "strongly localized", "start_char_pos": 789, "end_char_pos": 801}, {"type": "R", "before": "to", "after": "for", "start_char_pos": 864, "end_char_pos": 866}, {"type": "R", "before": "opposite relationships between", "after": "a large difference in", "start_char_pos": 1005, "end_char_pos": 1035}, {"type": "R", "before": ",", "after": "which is", "start_char_pos": 1089, "end_char_pos": 1090}, {"type": "D", "before": "more", "after": null, "start_char_pos": 1143, "end_char_pos": 1147}, {"type": "D", "before": "more", "after": null, "start_char_pos": 1188, "end_char_pos": 1192}, {"type": "D", "before": "minimal", "after": null, "start_char_pos": 1473, "end_char_pos": 1480}], "sents_char_pos": [0, 133, 523, 703, 893, 1206, 1346]}
+{"doc_id": "1309.7474", "revision_depth": "1", "before_revision": "The heat URLanizing protein (Hop) is important in modulating the activity and co-interaction of two chaperones: heat shock protein 90 and 70 ( Hsp90 and Hsp70 ). Recent research suggests that Plasmodium falciparum Hop (PfHop), PfHsp90 and PfHsp70 form a complex in the trophozoite infective stage. However, there has been little computational research on the malarial Hop protein in complex with other malarial Hsps. Using in silico characterization of PfHop , this work showed that individual domains of Hop are evolving at different rates within the protein. Homology modeling of PfHop , and of human Hop (HsHop ) in complex with its own cytosolic Hsp90 and Hsp70 C-terminal peptide partners , indicated high conservation of the Hop concave TPR sites bound to the C-terminal motifs of partner proteins. Further, for the first time, we identified two additional binding sites between Hop and Hsp90 which are distinctly less conserved between human and malaria parasite. These two sites are located on the convex surface of Hop TPR2 and involved in interactions with Hsp90 middle and C-terminal domains. Motif analysis was combined with phylogenetic trees and structural mapping to investigate the evolutionary conservation of important structural and functional sites of Hop. Statistical coupling analysis identified several sectors of coevolving residues in Hop. The convex sites of interaction between Hop TPR2 and Hsp90 middle and C-terminal domains were found to be part of separately coevolving sectors. This provides further evidence that these convex interaction sites are important to complex formation with Hsp90, and are thus potential sites for inhibitor design (in addition to the concave sites which have been the focus of previous efforts) . Further the convex sites are less conserved than the concave sites, which make their potential for malarial inhibitor design extremely attractive .", "after_revision": "The heat URLanizing protein (Hop) is important in modulating the activity and co-interaction of two chaperones: heat shock protein 70 and 90 ( Hsp70 and Hsp90 ). Recent research suggested that Plasmodium falciparum Hop (PfHop), PfHsp70 and PfHsp90 form a complex in the trophozoite infective stage. However, there has been little computational research on the malarial Hop protein in complex with other malarial Hsps. Using in silico characterization of the protein , this work showed that individual domains of Hop are evolving at different rates within the protein. Differences between human Hop (HsHop) and PfHop were identified by motif analysis. Homology modeling of PfHop and HsHop in complex with their own cytosolic Hsp90 and Hsp70 C-terminal peptide partners indicated excellent conservation of the Hop concave TPR sites bound to the C-terminal motifs of partner proteins. Further, we analyzed additional binding sites between Hop and Hsp90 , and showed, for the first time, that they are distinctly less conserved between human and malaria parasite. These sites are located on the convex surface of Hop TPR2 , and involved in interactions with the Hsp90 middle domain. Since the convex sites are less conserved than the concave sites, it makes their potential for malarial inhibitor design extremely attractive (as opposed to the concave sites which have been the focus of previous efforts) .", "edit_actions": [{"type": "D", "before": "90 and", "after": null, "start_char_pos": 131, "end_char_pos": 137}, {"type": "A", "before": null, "after": "and 90", "start_char_pos": 141, "end_char_pos": 141}, {"type": "D", "before": "Hsp90 and", "after": null, "start_char_pos": 144, "end_char_pos": 153}, {"type": "A", "before": null, "after": "and Hsp90", "start_char_pos": 160, "end_char_pos": 160}, {"type": "R", "before": "suggests", "after": "suggested", "start_char_pos": 180, "end_char_pos": 188}, {"type": "D", "before": "PfHsp90 and", "after": null, "start_char_pos": 229, "end_char_pos": 240}, {"type": "A", "before": null, "after": "and PfHsp90", "start_char_pos": 249, "end_char_pos": 249}, {"type": "R", "before": "PfHop", "after": "the protein", "start_char_pos": 456, "end_char_pos": 461}, {"type": "A", "before": null, "after": "Differences between human Hop (HsHop) and PfHop were identified by motif analysis.", "start_char_pos": 564, "end_char_pos": 564}, {"type": "R", "before": ", and of human Hop (HsHop )", "after": "and HsHop", "start_char_pos": 592, "end_char_pos": 619}, {"type": "R", "before": "its", "after": "their", "start_char_pos": 636, "end_char_pos": 639}, {"type": "R", "before": ", indicated high", "after": "indicated excellent", "start_char_pos": 698, "end_char_pos": 714}, {"type": "R", "before": "for the first time, we identified two", "after": "we analyzed", "start_char_pos": 818, "end_char_pos": 855}, {"type": "R", "before": "which", "after": ", and showed, for the first time, that they", "start_char_pos": 903, "end_char_pos": 908}, {"type": "D", "before": "two", "after": null, "start_char_pos": 981, "end_char_pos": 984}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1037, "end_char_pos": 1037}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1072, "end_char_pos": 1072}, {"type": "R", "before": "and C-terminal domains. Motif analysis was combined with phylogenetic trees and structural mapping to investigate the evolutionary conservation of important structural and functional sites of Hop. Statistical coupling analysis identified several sectors of coevolving residues in Hop. The convex sites of interaction between Hop TPR2 and Hsp90 middle and C-terminal domains were found to be part of separately coevolving sectors. This provides further evidence that these convex interaction sites are important to complex formation with Hsp90, and are thus potential sites for inhibitor design (in addition", "after": "domain. Since the convex sites are less conserved than the concave sites, it makes their potential for malarial inhibitor design extremely attractive (as opposed", "start_char_pos": 1086, "end_char_pos": 1692}, {"type": "D", "before": ". Further the convex sites are less conserved than the concave sites, which make their potential for malarial inhibitor design extremely attractive", "after": null, "start_char_pos": 1761, "end_char_pos": 1908}], "sents_char_pos": [0, 163, 300, 419, 563, 808, 974, 1109, 1282, 1370, 1515, 1762]}
+{"doc_id": "1310.7717", "revision_depth": "1", "before_revision": "Self-sustainability for energy scavenging networks is a crucial step in modern sensor network developments. Most existing analyses are however tailored to a single transmitting node or are difficult to map into practical protocol designs. Here, we offer a comprehensive framework for self-sufficient sensor networks powered by renewable energy sources. To this extent, we decompose the problem in two nested optimization steps: in the inner one we characterize the optimal operating point of the network subject to a required energy consumption figure, while in the outer step , we provide optimal energy management policies to make the system self-sufficient , given the the statistical description of the energy source . Our framework permits to gauge the impact of key sensor network parameters, such as the battery size , the harvester size (e.g., solar panel), the information transmission rate and the nodes' duty cycle. In addition, the closed form solution of the inner optimization problem lends itself to the implementation, as an online algorithm, on computationally constrained embedded devices. Finally, we provide results describing the consequences of most of the relevant design choices in terms of network behavior, maximum achievable throughput and dynamics associated with the optimal energy management policies .", "after_revision": "Self-sustainability is a crucial step for modern sensor networks. Here, we offer an original and comprehensive framework for autonomous sensor networks powered by renewable energy sources. We decompose our design into two nested optimization steps: the inner step characterizes the optimal network operating point subject to an average energy consumption constraint, while the outer step provides online energy management policies making the system energetically self-sufficient in the presence of unpredictable and intermittent energy sources . Our framework sheds new light into the design of pragmatic schemes for the control of energy harvesting sensor networks and permits to gauge the impact of key sensor network parameters, such as the battery capacity , the harvester size , the information transmission rate and the radio duty cycle. We analyze the robustness of the obtained energy management policies in the cases where the nodes have differing energy inflow statistics and where topology changes may occur, devising effective heuristics. Our energy management policies are finally evaluated considering real solar radiation traces, validating them against state of the art solutions and describing the impact of relevant design choices in terms of achievable network throughput and battery level dynamics .", "edit_actions": [{"type": "D", "before": "for energy scavenging networks", "after": null, "start_char_pos": 20, "end_char_pos": 50}, {"type": "R", "before": "in modern sensor network developments. Most existing analyses are however tailored to a single transmitting node or are difficult to map into practical protocol designs.", "after": "for modern sensor networks.", "start_char_pos": 69, "end_char_pos": 238}, {"type": "R", "before": "a", "after": "an original and", "start_char_pos": 254, "end_char_pos": 255}, {"type": "R", "before": "self-sufficient", "after": "autonomous", "start_char_pos": 284, "end_char_pos": 299}, {"type": "R", "before": "To this extent, we decompose the problem in", "after": "We decompose our design into", "start_char_pos": 353, "end_char_pos": 396}, {"type": "D", "before": "in the inner one we characterize the optimal operating point of the network subject to a required energy consumption figure, while in", "after": null, "start_char_pos": 428, "end_char_pos": 561}, {"type": "A", "before": null, "after": "inner step characterizes the optimal network operating point subject to an average energy consumption constraint, while the", "start_char_pos": 566, "end_char_pos": 566}, {"type": "R", "before": ", we provide optimal", "after": "provides online", "start_char_pos": 578, "end_char_pos": 598}, {"type": "R", "before": "to make the system", "after": "making the system energetically", "start_char_pos": 626, "end_char_pos": 644}, {"type": "R", "before": ", given the the statistical description of the energy source", "after": "in the presence of unpredictable and intermittent energy sources", "start_char_pos": 661, "end_char_pos": 721}, {"type": "A", "before": null, "after": "sheds new light into the design of pragmatic schemes for the control of energy harvesting sensor networks", "start_char_pos": 738, "end_char_pos": 738}, {"type": "A", "before": null, "after": "and", "start_char_pos": 739, "end_char_pos": 739}, {"type": "R", "before": "size", "after": "capacity", "start_char_pos": 822, "end_char_pos": 826}, {"type": "R", "before": "(e.g., solar panel),", "after": ",", "start_char_pos": 848, "end_char_pos": 868}, {"type": "R", "before": "nodes'", "after": "radio", "start_char_pos": 911, "end_char_pos": 917}, {"type": "R", "before": "In addition, the closed form solution of the inner optimization problem lends itself to the implementation, as an online algorithm, on computationally constrained embedded devices. Finally, we provide results describing the consequences of most of the", "after": "We analyze the robustness of the obtained energy management policies in the cases where the nodes have differing energy inflow statistics and where topology changes may occur, devising effective heuristics. Our energy management policies are finally evaluated considering real solar radiation traces, validating them against state of the art solutions and describing the impact of", "start_char_pos": 930, "end_char_pos": 1181}, {"type": "R", "before": "network behavior, maximum achievable throughput and dynamics associated with the optimal energy management policies", "after": "achievable network throughput and battery level dynamics", "start_char_pos": 1218, "end_char_pos": 1333}], "sents_char_pos": [0, 107, 238, 352, 723, 929, 1110]}
+{"doc_id": "1311.2665", "revision_depth": "1", "before_revision": "The inositol trisphosphate receptor (IPR) is a crucial Ca^{2+ channel that regulates the Ca^{2+} influx from the endoplasmic reticulum (ER) to the cytoplasm. A thorough study of this receptor contributes to a better understanding of calcium oscillations and waves. Based on the patch-clamp experimental data obtained from the outer membranes of isolated nuclei of theXenopus oocyte, we construct an allosteric competition model of single IPR channels on their native ER membrane environment. In our model, each IPR channel consists of four subunits, each of which can exist in two configurations. Each subunit in both configurations has one IP_3 binding site, together with one activating and one inhibitory Ca^{2+ the well-known Monod-Wyman-Changeux allosteric model, we construct our model from the subunit level to the channel level . It turns out that our model successfully reproduces the patch-clamp experimental data of the steady-state open probability, the mean close duration, and the bi-exponential distribution of the open duration . Particularly, our model successfully describes the bimodal [Ca^{2+}] dependence of the mean open duration at high [IP_3], a steady-state behavior which fails to be correctly described in previous IPR models , and the adaptation of the IPR channel, an important dynamic behavior which is seldom discussed in previous IPR models. In addition, we find that the gating of the IPR channel is most likely to be a biochemical process that consumes energy.", "after_revision": "The inositol trisphosphate receptor (IPR) is a crucial ion channel that regulates the Ca^{2+} influx from the endoplasmic reticulum (ER) to the cytoplasm. A thorough study of the IPR channel contributes to a better understanding of calcium oscillations and waves. It has long been observed that the IPR channel is a typical biological system which performs adaptation. However, recent advances on the physical essence of adaptation show that adaptation systems with a negative feedback mechanism, such as the IPR channel, must break detailed balance and always operate out of equilibrium with energy dissipation. Almost all previous IPR models are equilibrium models assuming detailed balance and thus violate the physical essence of adaptation. In this article, we constructed a nonequilibrium allosteric model of single IPR channels based on the patch-clamp experimental data obtained from the IPR in the outer membranes of isolated nuclei of theXenopus oocyte . It turns out that our model reproduces the patch-clamp experimental data reasonably well and produces both the correct steady-state and dynamic properties of the channel . Particularly, our model successfully describes the complicated bimodal [Ca^{2+}] dependence of the mean open duration at high [IP_3], a steady-state behavior which fails to be correctly described in previous IPR models . Finally, we used the patch-clamp experimental data to validate that the IPR channel indeed breaks detailed balance and thus is a nonequilibrium system which consumes energy.", "edit_actions": [{"type": "R", "before": "Ca^{2+", "after": "ion", "start_char_pos": 55, "end_char_pos": 61}, {"type": "R", "before": "this receptor", "after": "the IPR channel", "start_char_pos": 178, "end_char_pos": 191}, {"type": "D", "before": "Based on the patch-clamp experimental data obtained from the outer membranes of isolated nuclei of the", "after": null, "start_char_pos": 265, "end_char_pos": 367}, {"type": "D", "before": "Xenopus", "after": null, "start_char_pos": 367, "end_char_pos": 374}, {"type": "R", "before": "oocyte, we construct an allosteric competition", "after": "It has long been observed that the IPR channel is a typical biological system which performs adaptation. However, recent advances on the physical essence of adaptation show that adaptation systems with a negative feedback mechanism, such as the IPR channel, must break detailed balance and always operate out of equilibrium with energy dissipation. Almost all previous IPR models are equilibrium models assuming detailed balance and thus violate the physical essence of adaptation. In this article, we constructed a nonequilibrium allosteric", "start_char_pos": 375, "end_char_pos": 421}, {"type": "R", "before": "on their native ER membrane environment. In our model, each IPR channel consists of four subunits, each of which can exist in two configurations. Each subunit in both configurations has one IP_3 binding site, together with one activating and one inhibitory Ca^{2+", "after": "based on", "start_char_pos": 451, "end_char_pos": 714}, {"type": "R", "before": "well-known Monod-Wyman-Changeux allosteric model, we construct our model from the subunit level to the channel level", "after": "patch-clamp experimental data obtained from the IPR in the outer membranes of isolated nuclei of the", "start_char_pos": 719, "end_char_pos": 835}, {"type": "A", "before": null, "after": "Xenopus", "start_char_pos": 835, "end_char_pos": 835}, {"type": "A", "before": null, "after": "oocyte", "start_char_pos": 836, "end_char_pos": 836}, {"type": "D", "before": "successfully", "after": null, "start_char_pos": 867, "end_char_pos": 879}, {"type": "R", "before": "of the", "after": "reasonably well and produces both the correct", "start_char_pos": 925, "end_char_pos": 931}, {"type": "R", "before": "open probability, the mean close duration, and the bi-exponential distribution of the open duration", "after": "and dynamic properties of the channel", "start_char_pos": 945, "end_char_pos": 1044}, {"type": "A", "before": null, "after": "complicated", "start_char_pos": 1098, "end_char_pos": 1098}, {"type": "R", "before": ", and the adaptation of the IPR channel, an important dynamic behavior which is seldom discussed in previous IPR models. In addition, we find that the gating of the IPR channel is most likely to be a biochemical process that", "after": ". Finally, we used the patch-clamp experimental data to validate that the IPR channel indeed breaks detailed balance and thus is a nonequilibrium system which", "start_char_pos": 1255, "end_char_pos": 1479}], "sents_char_pos": [0, 157, 264, 491, 596, 838, 1116, 1375]}
+{"doc_id": "1311.5753", "revision_depth": "1", "before_revision": "We fill a void in merging empirical and phenomenological characterisation of the dynamical phase transitions in complex systems by identifying three , essentially different, dynamical phase transitions on real-life financial markets driven by 'macrodynamics' of a superstar-like superhub. We collect and interpret the empirical, numerical, and semi-analytical evidences for the existence of these phase transtions , by considering the Frankfurt Stock Exchange (FSE), as a typical example of a financial market of a medium size. Using the canonical object for the graph theory, i.e. the Minimal Spanning Tree (MST) network, we observe: (i) The initial phase transition from the equilibrium to non-equilibrium MST network in its nucleation phase, occuring at some critical time 2005-08-11 . Coalescence of edges on the FSE's transient leader SALZGITTER (SZG) AG-Stahl und Technologie company, is observed within the nucleation and is approximately characterised by the Lifsthiz-Slyozov growth exponent; (ii) The nucleation accelerates and transforms to the condensation process, in the second phase transition, forming a logarithmically diverging lambda-peak of short-range order parameters at the subsequent critical time 2007-01-25 ; (iii) In the third phase transition, the peak logarithmically decreases over three quarters of the year, resulting in a few loosly connected sub-graphs. This peak , is reminiscent of a non-equilibrium superstar-like superhub or a `dragon king' effect, abruptly accelerating the evolution of the SZG company. All these phase transitions are caused by the few richest vertices, which drift towards the SZG centre, providing most of the edges . Thus, we capture an amazing phenomenon, likely of a more universal character, where a periferial vertex becomes the one which is overdominating the complex network during an exceptionally long period of time.", "after_revision": "We fill a void in merging empirical and phenomenological characterisation of the dynamical phase transitions in complex systems by identifying three of them on real-life financial markets . We extract and interpret the empirical, numerical, and semi-analytical evidences for the existence of these phase transitions , by considering the Frankfurt Stock Exchange (FSE), as a typical example of a financial market of a medium size. Using the canonical object for the graph theory, i.e. the Minimal Spanning Tree (MST) network, we observe: (i) The initial phase transition from the equilibrium to non-equilibrium MST network in its nucleation phase, occurring at some critical time . Coalescence of edges on the FSE's transient leader is observed within the nucleation and is approximately characterized by the Lifsthiz-Slyozov growth exponent; (ii) The nucleation accelerates and transforms to the condensation process, in the second phase transition, forming a logarithmically diverging lambda-peak of short-range order parameters at the subsequent critical time - an analogon of such a transition in superfluidity ; (iii) In the third phase transition, the peak logarithmically decreases over three quarters of the year, resulting in a few loosely connected sub-graphs. This peak is reminiscent of a non-equilibrium superstar-like superhub or a `dragon king' effect, abruptly accelerating the evolution of the leader company. All these phase transitions are caused by the few richest vertices, which drift towards the leader and provide the most of the edges increasing the leader's degree . Thus, we capture an amazing phenomenon, likely of a more universal character, where a peripheral vertex becomes the one which is over dominating the complex network during an exceptionally long period of time.", "edit_actions": [{"type": "R", "before": ", essentially different, dynamical phase transitions", "after": "of them", "start_char_pos": 149, "end_char_pos": 201}, {"type": "R", "before": "driven by 'macrodynamics' of a superstar-like superhub. We collect", "after": ". We extract", "start_char_pos": 233, "end_char_pos": 299}, {"type": "R", "before": "transtions", "after": "transitions", "start_char_pos": 403, "end_char_pos": 413}, {"type": "R", "before": "occuring", "after": "occurring", "start_char_pos": 745, "end_char_pos": 753}, {"type": "D", "before": "2005-08-11", "after": null, "start_char_pos": 776, "end_char_pos": 786}, {"type": "D", "before": "SALZGITTER (SZG) AG-Stahl und Technologie company,", "after": null, "start_char_pos": 840, "end_char_pos": 890}, {"type": "R", "before": "characterised", "after": "characterized", "start_char_pos": 946, "end_char_pos": 959}, {"type": "R", "before": "2007-01-25", "after": "- an analogon of such a transition in superfluidity", "start_char_pos": 1221, "end_char_pos": 1231}, {"type": "R", "before": "loosly", "after": "loosely", "start_char_pos": 1358, "end_char_pos": 1364}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1397, "end_char_pos": 1398}, {"type": "R", "before": "SZG", "after": "leader", "start_char_pos": 1529, "end_char_pos": 1532}, {"type": "R", "before": "SZG centre, providing", "after": "leader and provide the", "start_char_pos": 1634, "end_char_pos": 1655}, {"type": "A", "before": null, "after": "increasing the leader's degree", "start_char_pos": 1674, "end_char_pos": 1674}, {"type": "R", "before": "periferial", "after": "peripheral", "start_char_pos": 1763, "end_char_pos": 1773}, {"type": "R", "before": "overdominating", "after": "over dominating", "start_char_pos": 1806, "end_char_pos": 1820}], "sents_char_pos": [0, 288, 527, 1000, 1233, 1386, 1541, 1676]}
+{"doc_id": "1312.5565", "revision_depth": "1", "before_revision": "An proof is presented that gene regulatory networks (GRNs) based solely on protein transcription factors (TFs) cannot control the development of complex multicellular life. Hence, GRNs cannot explain the evolution of multicellular life in the Cambrian Explosion. Networks are based on an addressing system which is used to construct network links. The links utilize the addresses to connect two or more linked nodes in the network. The more complex the network the greater the number of links and the larger the required address space. Addresses are formed by combinations of basic units. It has been assumed that combinations of protein transcription factors (TFs) generate a large enough address space to form gene regulatory networks that are complex enough to control the development of complex multicellular life. We prove that TFs do not have sufficient combinatorial power to serve as the basis of an addressing system for regulatory control of genomes in the development of URLanisms. More generally, there are inherent bounds on the complexity of control networks based solely on transcription factors. I show that given n transcription factor genes in a genome and address combinations of length k then there are at most n/k k-length TF-addresses in the address space. The complexity of embryonic development requires a corresponding complexity of control information in the cell and its genome. Therefore, different addressing system must exist to form the complex control networks required for complex control systems. These new developmental control networks are called CENES (for Control genes). The evolution of CENEs made the Cambrian Explosion possible. Their code is universal (modulo syntax) in the genomes of all multicellular life.", "after_revision": "A proof is presented that gene regulatory networks (GRNs) based solely on transcription factors cannot control the development of complex multicellular life. GRNs alone cannot explain the evolution of multicellular life in the Cambrian Explosion. Networks are based on addressing systems which are used to construct network links. The more complex the network the greater the number of links and the larger the required address space. It has been assumed that combinations of transcription factors generate a large enough address space to form GRNs that are complex enough to control the development of complex multicellular life. However, it is shown in this article that transcription factors do not have sufficient combinatorial power to serve as the basis of an addressing system for regulatory control of genomes in the development of URLanisms. It is proven that given n transcription factor genes in a genome and address combinations of length k then there are at most n/k k-length transcription factor addresses in the address space. The complexity of embryonic development requires a corresponding complexity of control information in the cell and its genome. Therefore, a different addressing system must exist to form the complex control networks required for complex control systems. It is postulated that a new type of network evolved based on an RNA-DNA addressing system that utilized and subsumed the extant GRNs. These new developmental control networks are called CENES (for Control genes). The evolution of these new higher networks would explain how the Cambrian Explosion was possible. The architecture of these higher level networks may in fact be universal (modulo syntax) in the genomes of all multicellular life.", "edit_actions": [{"type": "R", "before": "An", "after": "A", "start_char_pos": 0, "end_char_pos": 2}, {"type": "R", "before": "protein transcription factors (TFs)", "after": "transcription factors", "start_char_pos": 75, "end_char_pos": 110}, {"type": "R", "before": "Hence, GRNs", "after": "GRNs alone", "start_char_pos": 173, "end_char_pos": 184}, {"type": "R", "before": "an addressing system which is", "after": "addressing systems which are", "start_char_pos": 285, "end_char_pos": 314}, {"type": "R", "before": "links utilize the addresses to connect two or more linked nodes in the network. The more", "after": "more", "start_char_pos": 352, "end_char_pos": 440}, {"type": "D", "before": "Addresses are formed by combinations of basic units.", "after": null, "start_char_pos": 536, "end_char_pos": 588}, {"type": "R", "before": "protein transcription factors (TFs)", "after": "transcription factors", "start_char_pos": 630, "end_char_pos": 665}, {"type": "R", "before": "gene regulatory networks", "after": "GRNs", "start_char_pos": 712, "end_char_pos": 736}, {"type": "R", "before": "We prove that TFs", "after": "However, it is shown in this article that transcription factors", "start_char_pos": 819, "end_char_pos": 836}, {"type": "R", "before": "More generally, there are inherent bounds on the complexity of control networks based solely on transcription factors. I show", "after": "It is proven", "start_char_pos": 993, "end_char_pos": 1118}, {"type": "R", "before": "TF-addresses", "after": "transcription factor addresses", "start_char_pos": 1244, "end_char_pos": 1256}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1417, "end_char_pos": 1417}, {"type": "A", "before": null, "after": "It is postulated that a new type of network evolved based on an RNA-DNA addressing system that utilized and subsumed the extant GRNs.", "start_char_pos": 1532, "end_char_pos": 1532}, {"type": "R", "before": "CENEs made", "after": "these new higher networks would explain how", "start_char_pos": 1629, "end_char_pos": 1639}, {"type": "R", "before": "possible. Their code is", "after": "was possible. The architecture of these higher level networks may in fact be", "start_char_pos": 1663, "end_char_pos": 1686}], "sents_char_pos": [0, 172, 262, 347, 431, 535, 588, 818, 992, 1111, 1278, 1405, 1531, 1611, 1672]}
+{"doc_id": "1312.7111", "revision_depth": "1", "before_revision": "The determination of whether a gene is protein coding or not is a key goal of genome annotation projects. Peptide mass spectrometry is a powerful tool for detecting cellular expression of proteins and therefore is an attractive approach for verifying the protein coding potential of genes. However, a range of technical difficulties limit the coverage from proteomics experiments, with the highest recorded coverage of the human proteome being approximately 50\\% of human genes . Here we map the peptides detected in 7 large-scale proteomics studies to the GENCODE v12 annotation of the human genome and identify almost 60\\% of the protein coding genes . We find that there are surprisingly strong correlations between peptide detection and cross-species conservation, gene age and the presence of protein-like features. The age of the gene and its conservation across vertebrate species are key indicators of whether a peptide will be detected in proteomics experiments. We find peptides for most highly conserved genes and for practically all genes that evolved before bilateria. At the same time there is little or no evidence for protein expression for genes that have appeared since primates or that do not have any protein-like features or conservation. Based on our results we describe a set of 2,001 genes that have no protein features and poor conservation, or have ambiguous annotations in gene or protein databases. We suggest that many of the genes that lack supporting evidence and that are not detected in proteomics experiments, do not code for proteins under normal circumstances and that they should not be included in the human protein coding gene catalogue.", "after_revision": "Determining the full complement of protein-coding genes is a key goal of genome annotation . The most powerful approach for confirming protein coding potential is the detection of cellular protein expression through peptide mass spectrometry experiments . Here we map the peptides detected in 7 large-scale proteomics studies to almost 60\\% of the protein coding genes in the GENCODE annotation the human genome . We find the age of the gene family and its conservation across vertebrate species are key indicators of whether a peptide will be detected in proteomics experiments. We find peptides for most highly conserved genes and for practically all genes that evolved before bilateria. At the same time there is little or no evidence of protein expression for novel genes, those that have appeared since primates , or genes that do not have any protein-like features or cross-species conservation. We identify 19 non-protein like features such as weak conservation, no protein-like features or ambiguous annotations in the major databases that are indicators of low peptide detection rates. We use these features to describe a set of 2,001 genes that are potentially non-coding, and show that many of these genes behave more like non-coding genes than protein-coding genes. We detect peptides for just 3\\% of these genes. We suggest that many of these 2,001 genes do not code for proteins under normal circumstances and that they should not be included in the human protein coding gene catalogue.", "edit_actions": [{"type": "R", "before": "The determination of whether a gene is protein coding or not is", "after": "Determining the full complement of protein-coding genes is", "start_char_pos": 0, "end_char_pos": 63}, {"type": "R", "before": "projects. Peptide mass spectrometry is a powerful tool for detecting cellular expression of proteins and therefore is an attractive approach for verifying the", "after": ". The most powerful approach for confirming", "start_char_pos": 96, "end_char_pos": 254}, {"type": "R", "before": "of genes. However, a range of technical difficulties limit the coverage from proteomics experiments, with the highest recorded coverage of the human proteome being approximately 50\\% of human genes", "after": "is the detection of cellular protein expression through peptide mass spectrometry experiments", "start_char_pos": 280, "end_char_pos": 477}, {"type": "D", "before": "the GENCODE v12 annotation of the human genome and identify", "after": null, "start_char_pos": 553, "end_char_pos": 612}, {"type": "A", "before": null, "after": "in the GENCODE annotation the human genome", "start_char_pos": 653, "end_char_pos": 653}, {"type": "R", "before": "that there are surprisingly strong correlations between peptide detection and cross-species conservation, gene age and the presence of protein-like features. The", "after": "the", "start_char_pos": 664, "end_char_pos": 825}, {"type": "A", "before": null, "after": "family", "start_char_pos": 842, "end_char_pos": 842}, {"type": "R", "before": "for", "after": "of", "start_char_pos": 1132, "end_char_pos": 1135}, {"type": "R", "before": "genes", "after": "novel genes, those", "start_char_pos": 1159, "end_char_pos": 1164}, {"type": "R", "before": "or", "after": ", or genes", "start_char_pos": 1199, "end_char_pos": 1201}, {"type": "R", "before": "conservation. Based on our results we", "after": "cross-species conservation. We identify 19 non-protein like features such as weak conservation, no protein-like features or ambiguous annotations in the major databases that are indicators of low peptide detection rates. We use these features to", "start_char_pos": 1248, "end_char_pos": 1285}, {"type": "R", "before": "have no protein features and poor conservation, or have ambiguous annotations in gene or protein databases. We", "after": "are potentially non-coding, and show that many of these genes behave more like non-coding genes than protein-coding genes. We detect peptides for just 3\\% of these genes. We", "start_char_pos": 1321, "end_char_pos": 1431}, {"type": "R", "before": "the genes that lack supporting evidence and that are not detected in proteomics experiments,", "after": "these 2,001 genes", "start_char_pos": 1453, "end_char_pos": 1545}], "sents_char_pos": [0, 105, 289, 479, 655, 821, 973, 1083, 1261, 1428]}
+{"doc_id": "1401.4913", "revision_depth": "1", "before_revision": "Networks are widely used to represent the interaction pattern in complex systems. Structures of real networks from different domain may vary quite significantly , and so the dynamicson the network. Which also plays an important role in communication and information spreading on networks . Here we have explored underlying structures of different biological networks which support faster spreading and are better in communication between nodes in them. In this regard, we have analyzed the good expansion property , from large spectral gap , and communicability between nodes in those networks . Different epidemic models are also used to study the same. Moreover we have explored the structural conformation and properties which might be cause for better communication. Our study shows that the underlying topology in neural networks is significantly qualitatively different than the same from other biological networks and they may have evolved such a way that they inherit a structure which is excellent and robust in communication.", "after_revision": "Networks are widely used to represent interaction pattern among the components in complex systems. Structures of real networks from differ- ent domains may vary quite significantly . Since there is an interplay be- tween network architecture and dynamics, structure plays an important role in communication and information spreading on a network . Here we investigate the underlying undirected topology of different biological networks which support faster spreading of information and are better in communication . We analyze the good expansion property by using the spectral gap and communicability between nodes . Different epidemic models are also used to study the transmission of information in terms of disease spreading through individuals (nodes) in those networks. More- over, we explore the structural conformation and properties which may be responsible for better communication. Among all biological networks studied here, the undirected structure of neuronal networks not only pos- sesses the small-world property but the same is expressed remarkably to a higher degree than any randomly generated network which possesses the same degree sequence. A relatively high percentage of nodes, in neuronal networks, form a higher core in their structure. Our study shows that the underlying undirected topology in neuronal networks is significantly qualitatively different than the same from other biological networks and that they may have evolved in such a way that they inherit a (undirected) structure which is excellent and robust in communication.", "edit_actions": [{"type": "R", "before": "the interaction pattern", "after": "interaction pattern among the components", "start_char_pos": 38, "end_char_pos": 61}, {"type": "R", "before": "different domain", "after": "differ- ent domains", "start_char_pos": 115, "end_char_pos": 131}, {"type": "R", "before": ", and so the dynamicson the network. Which also", "after": ". Since there is an interplay be- tween network architecture and dynamics, structure", "start_char_pos": 161, "end_char_pos": 208}, {"type": "R", "before": "networks", "after": "a network", "start_char_pos": 279, "end_char_pos": 287}, {"type": "R", "before": "have explored underlying structures", "after": "investigate the underlying undirected topology", "start_char_pos": 298, "end_char_pos": 333}, {"type": "A", "before": null, "after": "of information", "start_char_pos": 398, "end_char_pos": 398}, {"type": "R", "before": "between nodes in them. In this regard, we have analyzed", "after": ". We analyze", "start_char_pos": 431, "end_char_pos": 486}, {"type": "R", "before": ", from large spectral gap ,", "after": "by using the spectral gap", "start_char_pos": 515, "end_char_pos": 542}, {"type": "D", "before": "in those networks", "after": null, "start_char_pos": 577, "end_char_pos": 594}, {"type": "R", "before": "same. Moreover we have explored", "after": "transmission of information in terms of disease spreading through individuals (nodes) in those networks. More- over, we explore", "start_char_pos": 650, "end_char_pos": 681}, {"type": "R", "before": "might be cause", "after": "may be responsible", "start_char_pos": 731, "end_char_pos": 745}, {"type": "A", "before": null, "after": "Among all biological networks studied here, the undirected structure of neuronal networks not only pos- sesses the small-world property but the same is expressed remarkably to a higher degree than any randomly generated network which possesses the same degree sequence. A relatively high percentage of nodes, in neuronal networks, form a higher core in their structure.", "start_char_pos": 772, "end_char_pos": 772}, {"type": "R", "before": "topology in neural", "after": "undirected topology in neuronal", "start_char_pos": 809, "end_char_pos": 827}, {"type": "A", "before": null, "after": "that", "start_char_pos": 927, "end_char_pos": 927}, {"type": "A", "before": null, "after": "in", "start_char_pos": 950, "end_char_pos": 950}, {"type": "A", "before": null, "after": "(undirected)", "start_char_pos": 982, "end_char_pos": 982}], "sents_char_pos": [0, 81, 197, 289, 453, 655, 771]}
+{"doc_id": "1401.8026", "revision_depth": "2", "before_revision": "Financial markets are exposed to systemic risk (SR), the risk that a major fraction of the system ceases to function and collapses. Since recently it is possible to quantify SR in terms of underlying financial networks where nodes represent financial institutions, and links capture the size and maturity of assets (loans), liabilities, and other obligations such as derivatives. We show that it is possible to quantify the share of SR that individual liabilities in a financial network contribute to the overall SR. We use empirical data of nation-wide interbank liabilities to show that a few liabilities carry the major fraction of the overall SR . We propose a tax on individual transactions that is proportional to their contribution to overall SR. If a transaction does not increase SR it is tax free . With an agent based model (CRISIS macro-financial model) we demonstrate that the proposed Systemic Risk Tax (SRT) leads to a URLanized re-structuring of financial networks that are practically free of SR. ABM predictions agree remarkably well with the empirical data and can be used to understand the relation of credit risk and SR.", "after_revision": "Financial markets are exposed to systemic risk (SR), the risk that a major fraction of the system ceases to function , and collapses. It has recently become possible to quantify SR in terms of underlying financial networks where nodes represent financial institutions, and links capture the size and maturity of assets (loans), liabilities, and other obligations , such as derivatives. We demonstrate that it is possible to quantify the share of SR that individual liabilities within a financial network contribute to the overall SR. We use empirical data of nationwide interbank liabilities to show that the marginal contribution to overall SR of liabilities for a given size varies by a factor of a thousand . We propose a tax on individual transactions that is proportional to their marginal contribution to overall SR. If a transaction does not increase SR it is tax-free . With an agent-based model (CRISIS macro-financial model) we demonstrate that the proposed \" Systemic Risk Tax \" (SRT) leads to a URLanised restructuring of financial networks that are practically free of SR. The SRT can be seen as an insurance for the public against costs arising from cascading failure. ABM predictions are shown to be in remarkable agreement with the empirical data and can be used to understand the relation of credit risk and SR.", "edit_actions": [{"type": "A", "before": null, "after": ",", "start_char_pos": 117, "end_char_pos": 117}, {"type": "R", "before": "Since recently it is", "after": "It has recently become", "start_char_pos": 133, "end_char_pos": 153}, {"type": "A", "before": null, "after": ",", "start_char_pos": 360, "end_char_pos": 360}, {"type": "R", "before": "show", "after": "demonstrate", "start_char_pos": 385, "end_char_pos": 389}, {"type": "R", "before": "in", "after": "within", "start_char_pos": 466, "end_char_pos": 468}, {"type": "R", "before": "nation-wide", "after": "nationwide", "start_char_pos": 544, "end_char_pos": 555}, {"type": "R", "before": "a few liabilities carry the major fraction of the overall SR", "after": "the marginal contribution to overall SR of liabilities for a given size varies by a factor of a thousand", "start_char_pos": 591, "end_char_pos": 651}, {"type": "A", "before": null, "after": "marginal", "start_char_pos": 728, "end_char_pos": 728}, {"type": "R", "before": "tax free", "after": "tax-free", "start_char_pos": 801, "end_char_pos": 809}, {"type": "R", "before": "agent based", "after": "agent-based", "start_char_pos": 820, "end_char_pos": 831}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 902, "end_char_pos": 902}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 921, "end_char_pos": 921}, {"type": "R", "before": "URLanized re-structuring", "after": "URLanised restructuring", "start_char_pos": 939, "end_char_pos": 963}, {"type": "R", "before": "ABM predictions agree remarkably well", "after": "The SRT can be seen as an insurance for the public against costs arising from cascading failure. ABM predictions are shown to be in remarkable agreement", "start_char_pos": 1019, "end_char_pos": 1056}], "sents_char_pos": [0, 132, 381, 518, 756, 811]}
+{"doc_id": "1403.3459", "revision_depth": "1", "before_revision": "It has been understood that the `` local\" existence of the Markowitz' optimal portfolio or the solution to the local risk minimization problem is guaranteed by some specific mathematical structures on the underlying assets price processes (called ``Structure Conditions\" in the literature ){\\it . In this paper, we consider a semi-martingale market model (initial market model) fulfilling these structures , and an arbitrary random time that is not adapted to the flow of the ``public\" information. By adding additional uncertainty to the initial market model, via this random time, those structures may fail{\\it . Our aim is to address the question of how this random time will affect these structures from different perspectives. Our analysis allowed us to conclude that under some mild assumptions on the market model and the random time, these structures will remain valid on the one hand. Furthermore, we provide two examples illustrating the importance of these assumptions. On the other hand, we describe the random time models for which these structure conditions are preserved for any market model. These results are elaborated separately for the two contexts of stopping with random time and incorporating totally a specific class of random times respectively.", "after_revision": "It has been understood that the \" local\" existence of the Markowitz' optimal portfolio or the solution to the local-risk minimization problem is guaranteed by some specific mathematical structures on the underlying assets price processes known in the literature as \"{\\it Structure Conditions \" . In this paper, we consider a semi-martingale market model , and an arbitrary random time that is not adapted to the information flow of the market model. This random time may model the default time of a firm, the death time of an insured, or any the occurrence time of an event that might impact the market model somehow. By adding additional uncertainty to the market model, via this random time, the{\\it structures conditions may fail and hence the Markowitz's optimal portfolio and other quadratic-optimal portfolios might fail to exist . Our aim is to investigate the impact of this random time on the structures conditions from different perspectives. Our analysis allows us to conclude that under some mild assumptions on the market model and the random time, these structures conditions will remain valid on the one hand. Furthermore, we provide two examples illustrating the importance of these assumptions. On the other hand, we describe the random time models for which these structure conditions are preserved for any market model. These results are elaborated separately for the two contexts of stopping with the random time and incorporating totally a specific class of random times respectively.", "edit_actions": [{"type": "R", "before": "``", "after": "\"", "start_char_pos": 32, "end_char_pos": 34}, {"type": "R", "before": "local risk", "after": "local-risk", "start_char_pos": 111, "end_char_pos": 121}, {"type": "R", "before": "(called ``Structure Conditions\"", "after": "known", "start_char_pos": 239, "end_char_pos": 270}, {"type": "R", "before": ")", "after": "as \"", "start_char_pos": 289, "end_char_pos": 290}, {"type": "A", "before": null, "after": "Structure Conditions", "start_char_pos": 295, "end_char_pos": 295}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 296, "end_char_pos": 296}, {"type": "D", "before": "(initial market model) fulfilling these structures", "after": null, "start_char_pos": 357, "end_char_pos": 407}, {"type": "A", "before": null, "after": "information", "start_char_pos": 466, "end_char_pos": 466}, {"type": "R", "before": "``public\" information.", "after": "market model. This random time may model the default time of a firm, the death time of an insured, or any the occurrence time of an event that might impact the market model somehow.", "start_char_pos": 479, "end_char_pos": 501}, {"type": "D", "before": "initial", "after": null, "start_char_pos": 542, "end_char_pos": 549}, {"type": "R", "before": "those structures may fail", "after": "the", "start_char_pos": 586, "end_char_pos": 611}, {"type": "A", "before": null, "after": "structures conditions", "start_char_pos": 616, "end_char_pos": 616}, {"type": "A", "before": null, "after": "may fail and hence the Markowitz's optimal portfolio and other quadratic-optimal portfolios might fail to exist", "start_char_pos": 617, "end_char_pos": 617}, {"type": "R", "before": "address the question of how", "after": "investigate the impact of", "start_char_pos": 634, "end_char_pos": 661}, {"type": "R", "before": "will affect these structures", "after": "on the structures conditions", "start_char_pos": 679, "end_char_pos": 707}, {"type": "R", "before": "allowed", "after": "allows", "start_char_pos": 750, "end_char_pos": 757}, {"type": "A", "before": null, "after": "conditions", "start_char_pos": 864, "end_char_pos": 864}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1192, "end_char_pos": 1192}], "sents_char_pos": [0, 298, 501, 619, 736, 899, 986, 1113]}
+{"doc_id": "1406.6951", "revision_depth": "3", "before_revision": "In this paper we consider the optimal transport approach for computing the model-free prices of a given path-dependent contingent claim in a two periods model. More precisely, we first specialize the optimal transport plan introduced in \\mbox{%DIFAUXCMD BeiglJuil0pt%DIFAUXCMD , following the construction of \\mbox{%DIFAUXCMD BrenierMartingale}0pt%DIFAUXCMD , } as well as the one 0pt%DIFAUXCMD and further studied in \\mbox{%DIFAUXCMD BrenierMartingale}\\hspace{0pt}%DIFAUXCMD . We show that, } in \\mbox{%DIFAUXCMD \\cite{HobsonKlimmek2013}\\hspace{0pt}%DIFAUXCMD , to } the case of positive martingales and a single maximizer for the difference between the c.d.f.'s of the two marginals. These characterizations allow us to study the effect of the change of numeraire on the corresponding super and subhedging model-free prices. It turns out that, for \\mbox{%DIFAUXCMD \\cite{BrenierMartingale}\\hspace{0pt}%DIFAUXCMD 's construction, the change of numeraire can be viewed as a mirror coupling for positive martingales, while for \\mbox{%DIFAUXCMD \\cite{HobsonKlimmek2013} }\\hspace{0pt}%DIFAUXCMD it } }\\hspace{0pt}%DIFAUXCMD } exchanges forward start straddles of type I and type II giving also that the optimal transport plan in the subhedging problems is the same for both types of options. Some numerical applications are}\\hspace{0pt}%DIFAUXCMD 's construction, the right monotone transference plan can be viewed as a mirror coupling of its left counterpart under the change of numeraire. An application to stochastic volatility models is also } provided.", "after_revision": "In this paper we apply change of numeraire techniques to the optimal transport approach for computing model-free prices of derivatives in a two periods model. In particular, we consider the optimal transport plan 0pt%DIFAUXCMD , following the construction of \\mbox{%DIFAUXCMD BrenierMartingale}0pt%DIFAUXCMD , } constructed in \\mbox{%DIFAUXCMD HobsonKlimmek2013 as well as the one introduced in \\mbox{%DIFAUXCMD BeiglJuil0pt%DIFAUXCMD and further studied in \\mbox{%DIFAUXCMD BrenierMartingale}\\hspace{0pt}%DIFAUXCMD . We show that, } in }\\hspace{0pt}%DIFAUXCMD , to } the case of positive martingales , a suitable change of numeraire }\\hspace{0pt}%DIFAUXCMD 's construction, the change of numeraire can be viewed as a mirror coupling for positive martingales, while for \\mbox{%DIFAUXCMD \\cite{HobsonKlimmek2013} }\\hspace{0pt}%DIFAUXCMD it } applied to \\mbox{%DIFAUXCMD \\cite{HobsonKlimmek2013 }\\hspace{0pt}%DIFAUXCMD } exchanges forward start straddles of type I and type II , so that the optimal transport plan in the subhedging problems is the same for both types of options. Moreover, for \\mbox{%DIFAUXCMD \\cite{BrenierMartingale}\\hspace{0pt}%DIFAUXCMD 's construction, the right monotone transference plan can be viewed as a mirror coupling of its left counterpart under the change of numeraire. An application to stochastic volatility models is also } provided.", "edit_actions": [{"type": "R", "before": "consider", "after": "apply change of numeraire techniques to", "start_char_pos": 17, "end_char_pos": 25}, {"type": "D", "before": "the", "after": null, "start_char_pos": 71, "end_char_pos": 74}, {"type": "R", "before": "a given path-dependent contingent claim", "after": "derivatives", "start_char_pos": 96, "end_char_pos": 135}, {"type": "R", "before": "More precisely, we first specialize", "after": "In particular, we consider", "start_char_pos": 160, "end_char_pos": 195}, {"type": "D", "before": "introduced in \\mbox{%DIFAUXCMD BeiglJuil", "after": null, "start_char_pos": 223, "end_char_pos": 263}, {"type": "A", "before": null, "after": "constructed in \\mbox{%DIFAUXCMD HobsonKlimmek2013", "start_char_pos": 362, "end_char_pos": 362}, {"type": "A", "before": null, "after": "introduced in \\mbox{%DIFAUXCMD BeiglJuil", "start_char_pos": 382, "end_char_pos": 382}, {"type": "D", "before": "\\mbox{%DIFAUXCMD \\cite{HobsonKlimmek2013", "after": null, "start_char_pos": 498, "end_char_pos": 538}, {"type": "R", "before": "and a single maximizer for the difference between the c.d.f.'s of the two marginals. These characterizations allow us to study the effect of the", "after": ", a suitable", "start_char_pos": 602, "end_char_pos": 746}, {"type": "D", "before": "on the corresponding super and subhedging model-free prices. It turns out that, for \\mbox{%DIFAUXCMD \\cite{BrenierMartingale", "after": null, "start_char_pos": 767, "end_char_pos": 891}, {"type": "A", "before": null, "after": "applied to \\mbox{%DIFAUXCMD \\cite{HobsonKlimmek2013", "start_char_pos": 1098, "end_char_pos": 1098}, {"type": "R", "before": "giving also", "after": ", so", "start_char_pos": 1181, "end_char_pos": 1192}, {"type": "R", "before": "Some numerical applications are", "after": "Moreover, for \\mbox{%DIFAUXCMD \\cite{BrenierMartingale", "start_char_pos": 1291, "end_char_pos": 1322}], "sents_char_pos": [0, 159, 175, 663, 686, 827, 1290, 1489]}
+{"doc_id": "1407.4374", "revision_depth": "3", "before_revision": "Target identification aims at identifying biomolecules whose function should be therapeutically altered to cure the considered pathology. An algorithm for in silico target identification using boolean network attractorsis proposed . It assumes that attractors correspond to phenotypes produced by the modeled biological network. It identifies target combinations which allow disturbed networks to avoid attractors associated with pathological phenotypes. The algorithm is tested on a boolean model of the mammalian cell cycle and its applications are illustrated on a boolean model of Fanconi anemia. Results show that the algorithm returns target combinations able to remove attractors associated with pathological phenotypes and then succeeds in performing the proposed in silico target identification. However, as with any in silico evidence, there is a bridge to cross between theory and practice . Nevertheless, it is expected that the algorithm is of interest for target identification .", "after_revision": "Target identification , one of the steps of drug discovery, aims at identifying biomolecules whose function should be therapeutically altered in order to cure the considered pathology. This work proposes an algorithm for in silico target identification using Boolean network attractors . It assumes that attractors of dynamical systems, such as Boolean networks, correspond to phenotypes produced by the modeled biological system. Under this assumption, and given a Boolean network modeling a pathophysiology, the algorithm identifies target combinations able to remove attractors associated with pathological phenotypes. It is tested on a Boolean model of the mammalian cell cycle bearing a constitutive inactivation of the retinoblastoma protein, as seen in cancers, and its applications are illustrated on a Boolean model of Fanconi anemia. The results show that the algorithm returns target combinations able to remove attractors associated with pathological phenotypes and then succeeds in performing the proposed in silico target identification. However, as with any in silico evidence, there is a bridge to cross between theory and practice , thus requiring it to be used in combination with wet lab experiments . Nevertheless, it is expected that the algorithm is of interest for target identification , notably by exploiting the inexpensiveness and predictive power of computational approaches to optimize the efficiency of costly wet lab experiments .", "edit_actions": [{"type": "A", "before": null, "after": ", one of the steps of drug discovery,", "start_char_pos": 22, "end_char_pos": 22}, {"type": "A", "before": null, "after": "in order", "start_char_pos": 105, "end_char_pos": 105}, {"type": "R", "before": "An", "after": "This work proposes an", "start_char_pos": 140, "end_char_pos": 142}, {"type": "R", "before": "boolean network attractorsis proposed", "after": "Boolean network attractors", "start_char_pos": 195, "end_char_pos": 232}, {"type": "A", "before": null, "after": "of dynamical systems, such as Boolean networks,", "start_char_pos": 262, "end_char_pos": 262}, {"type": "R", "before": "network. It", "after": "system. Under this assumption, and given a Boolean network modeling a pathophysiology, the algorithm", "start_char_pos": 323, "end_char_pos": 334}, {"type": "R", "before": "which allow disturbed networks to avoid", "after": "able to remove", "start_char_pos": 366, "end_char_pos": 405}, {"type": "R", "before": "The algorithm", "after": "It", "start_char_pos": 458, "end_char_pos": 471}, {"type": "R", "before": "boolean", "after": "Boolean", "start_char_pos": 487, "end_char_pos": 494}, {"type": "A", "before": null, "after": "bearing a constitutive inactivation of the retinoblastoma protein, as seen in cancers,", "start_char_pos": 529, "end_char_pos": 529}, {"type": "R", "before": "boolean", "after": "Boolean", "start_char_pos": 572, "end_char_pos": 579}, {"type": "R", "before": "Results", "after": "The results", "start_char_pos": 605, "end_char_pos": 612}, {"type": "A", "before": null, "after": ", thus requiring it to be used in combination with wet lab experiments", "start_char_pos": 905, "end_char_pos": 905}, {"type": "A", "before": null, "after": ", notably by exploiting the inexpensiveness and predictive power of computational approaches to optimize the efficiency of costly wet lab experiments", "start_char_pos": 997, "end_char_pos": 997}], "sents_char_pos": [0, 139, 234, 331, 457, 604, 808, 907]}
+{"doc_id": "1408.2725", "revision_depth": "1", "before_revision": "Biotechnological expertise and related tools (required e.g. for drug synthesis) increases daily mainly driven by a continuum of tumultuous experimental breakthroughs . In particular, recently, scientists have been able to build in-vitro reaction kinetics ( among enzymatic proteins and their ligands{\\em ) which code for two-inputs logic gates mimicking the stochastic AND ( NAND) and the stochastic OR ( NOR), beyond simpler and already known single-input gates ( as YES and NOT), the whole triggering prompt effort even from the theoretical counterpart. To this task, several allosteric receptor-ligand systems are hereby described according to the Monod-Wyman-Changeaux model: with the purpose of exploring their concrete functional capabilities to express logical operators and/or perform logical operations , we revise the concept of cooperativity for allosteric systems trough an extensive treatment of their statistical mechanical formulation ( with particular emphasis on the ranges and scaling of the involved parameters actually missing in the Literature) and we show how these reactions may successfully encode logical computing, beyond the YES and NOT gates, playing also as stochastic version of the AND (NAND) and the OR (NOR)operators .", "after_revision": "Recent experimental breakthroughs have finally allowed to implement in-vitro reaction kinetics ( the so called{\\em enzyme based logic ) which code for two-inputs logic gates and mimic the stochastic AND ( and NAND) as well as the stochastic OR ( and NOR). This accomplishment, together with the already-known single-input gates ( performing as YES and NOT), provides a logic base and paves the way to the development of powerful biotechnological devices. The investigation of this field would enormously benefit from a self-consistent, predictive, theoretical framework. Here we formulate a complete statistical mechanical description of the Monod-Wyman-Changeaux allosteric model for both single and double ligand systems, with the purpose of exploring their practical capabilities to express logical operators and/or perform logical operations . Mixing statistical mechanics with logics, and quantitatively our findings with the available biochemical data, we successfully revise the concept of cooperativity (and anti-cooperativity) for allosteric systems , with particular emphasis on its computational capabilities, the related ranges and scaling of the involved parameters and its differences with classical cooperativity (and anti-cooperativity) .", "edit_actions": [{"type": "R", "before": "Biotechnological expertise and related tools (required e.g. for drug synthesis) increases daily mainly driven by a continuum of tumultuous experimental breakthroughs . In particular, recently, scientists have been able to build", "after": "Recent experimental breakthroughs have finally allowed to implement", "start_char_pos": 0, "end_char_pos": 227}, {"type": "R", "before": "among enzymatic proteins and their ligands", "after": "the so called", "start_char_pos": 257, "end_char_pos": 299}, {"type": "A", "before": null, "after": "enzyme based logic", "start_char_pos": 304, "end_char_pos": 304}, {"type": "R", "before": "mimicking", "after": "and mimic", "start_char_pos": 345, "end_char_pos": 354}, {"type": "R", "before": "NAND) and", "after": "and NAND) as well as", "start_char_pos": 376, "end_char_pos": 385}, {"type": "R", "before": "NOR), beyond simpler and already known", "after": "and NOR). This accomplishment, together with the already-known", "start_char_pos": 406, "end_char_pos": 444}, {"type": "A", "before": null, "after": "performing", "start_char_pos": 466, "end_char_pos": 466}, {"type": "A", "before": null, "after": "provides a logic base and paves the way to the development of powerful biotechnological devices. The investigation of this field would enormously benefit from a self-consistent, predictive, theoretical framework. Here we formulate a complete statistical mechanical description of", "start_char_pos": 484, "end_char_pos": 484}, {"type": "D", "before": "whole triggering prompt effort even from the theoretical counterpart. To this task, several allosteric receptor-ligand systems are hereby described according to the", "after": null, "start_char_pos": 489, "end_char_pos": 653}, {"type": "R", "before": "model:", "after": "allosteric model for both single and double ligand systems,", "start_char_pos": 676, "end_char_pos": 682}, {"type": "R", "before": "concrete functional", "after": "practical", "start_char_pos": 719, "end_char_pos": 738}, {"type": "R", "before": ", we", "after": ". Mixing statistical mechanics with logics, and quantitatively our findings with the available biochemical data, we successfully", "start_char_pos": 815, "end_char_pos": 819}, {"type": "A", "before": null, "after": "(and anti-cooperativity)", "start_char_pos": 856, "end_char_pos": 856}, {"type": "R", "before": "trough an extensive treatment of their statistical mechanical formulation (", "after": ",", "start_char_pos": 880, "end_char_pos": 955}, {"type": "R", "before": "the", "after": "its computational capabilities, the related", "start_char_pos": 984, "end_char_pos": 987}, {"type": "R", "before": "actually missing in the Literature) and we show how these reactions may successfully encode logical computing, beyond the YES and NOT gates, playing also as stochastic version of the AND (NAND) and the OR (NOR)operators", "after": "and its differences with classical cooperativity (and anti-cooperativity)", "start_char_pos": 1034, "end_char_pos": 1253}], "sents_char_pos": [0, 167, 558, 682, 1069]}
+{"doc_id": "1410.0104", "revision_depth": "1", "before_revision": "Financial networks are dynamic and to assess systemic importance and avert losses we needs models which take the time variations of the links and nodes into account. We develop a model that can predict the response of the financial network to a shock and propose a measure for the systemic importance of the banks, which we call BankRank. Using the European Bank Authority 2011 stress test exposure data, we apply our model to the bipartite network of the largest institutional holders of troubled European countries (Greece, Italy, Portugal, Spain, and Ireland). Simulation of the states in our model reveal that it has \" calm \" state , where shocks do not cause very major losses, and \" panicked \" states, in which devastating damages occur. Fitting the parameters to Eurocrisis data shows that , before the crisis, the system was mostly in the \" calm \" regime while during the Eurocrisis it went into the \" panicked \" regime. The numerical solutions of the our model fit to a good degree to what really happened in the crisis. We also find that, while the largest holders are usually more important, sometimes smaller holders also exhibit systemic importance. In addition, we observe that asset diversification has no clear correlation with our BankRank. Thus diversification is neither reducing systemic, nor necessarily providing routes for contagion. These suggest that our model may provide a useful tool for determining the vulnerability of banks and assets to shocks and for simulating shared portfolio networks in general .", "after_revision": "Financial networks are dynamic . To assess their systemic importance to the world-wide economic network and avert losses we need models that take the time variations of the links and nodes into account. Using the methodology of classical mechanics and Laplacian determinism we develop a model that can predict the response of the financial network to a shock . We also propose a way of measuring the systemic importance of the banks, which we call BankRank. Using European Bank Authority 2011 stress test exposure data, we apply our model to the bipartite network connecting the largest institutional debt holders of the troubled European countries (Greece, Italy, Portugal, Spain, and Ireland). From simulating our model we can determine whether a network is in a \" stable \" state in which shocks do not cause major losses, or a \" unstable \" state in which devastating damages occur. Fitting the parameters of the model, which play the role of physical coupling constants, to Eurozone crisis data shows that before the Eurozone crisis the system was mostly in a \" stable \" regime , and that during the crisis it transitioned into an \" unstable \" regime. The numerical solutions produced by our model match closely the actual time-line of events of the crisis. We also find that, while the largest holders are usually more important, in the unstable regime smaller holders also exhibit systemic importance. Our model also proves useful for determining the vulnerability of banks and assets to shocks . This suggests that our model may be a useful tool for simulating the response dynamics of shared portfolio networks .", "edit_actions": [{"type": "R", "before": "and to assess systemic importance", "after": ". To assess their systemic importance to the world-wide economic network", "start_char_pos": 31, "end_char_pos": 64}, {"type": "R", "before": "needs models which", "after": "need models that", "start_char_pos": 85, "end_char_pos": 103}, {"type": "R", "before": "We", "after": "Using the methodology of classical mechanics and Laplacian determinism we", "start_char_pos": 166, "end_char_pos": 168}, {"type": "R", "before": "and propose a measure for", "after": ". We also propose a way of measuring", "start_char_pos": 251, "end_char_pos": 276}, {"type": "D", "before": "the", "after": null, "start_char_pos": 345, "end_char_pos": 348}, {"type": "R", "before": "of", "after": "connecting", "start_char_pos": 449, "end_char_pos": 451}, {"type": "R", "before": "holders of", "after": "debt holders of the", "start_char_pos": 478, "end_char_pos": 488}, {"type": "R", "before": "Simulation of the states in our model reveal that it has", "after": "From simulating our model we can determine whether a network is in a", "start_char_pos": 564, "end_char_pos": 620}, {"type": "R", "before": "calm", "after": "stable", "start_char_pos": 623, "end_char_pos": 627}, {"type": "R", "before": ", where", "after": "in which", "start_char_pos": 636, "end_char_pos": 643}, {"type": "D", "before": "very", "after": null, "start_char_pos": 664, "end_char_pos": 668}, {"type": "R", "before": "and", "after": "or a", "start_char_pos": 683, "end_char_pos": 686}, {"type": "R", "before": "panicked", "after": "unstable", "start_char_pos": 689, "end_char_pos": 697}, {"type": "R", "before": "states,", "after": "state", "start_char_pos": 700, "end_char_pos": 707}, {"type": "R", "before": "to Eurocrisis", "after": "of the model, which play the role of physical coupling constants, to Eurozone crisis", "start_char_pos": 767, "end_char_pos": 780}, {"type": "R", "before": ", before the crisis,", "after": "before", "start_char_pos": 797, "end_char_pos": 817}, {"type": "A", "before": null, "after": "Eurozone crisis the", "start_char_pos": 822, "end_char_pos": 822}, {"type": "R", "before": "the", "after": "a", "start_char_pos": 844, "end_char_pos": 847}, {"type": "R", "before": "calm", "after": "stable", "start_char_pos": 850, "end_char_pos": 854}, {"type": "R", "before": "while during the Eurocrisis it went into the", "after": ", and that during the crisis it transitioned into an", "start_char_pos": 864, "end_char_pos": 908}, {"type": "R", "before": "panicked", "after": "unstable", "start_char_pos": 911, "end_char_pos": 919}, {"type": "R", "before": "of the our model fit to a good degree to what really happened in the", "after": "produced by our model match closely the actual time-line of events of the", "start_char_pos": 954, "end_char_pos": 1022}, {"type": "R", "before": "sometimes", "after": "in the unstable regime", "start_char_pos": 1104, "end_char_pos": 1113}, {"type": "R", "before": "In addition, we observe that asset diversification has no clear correlation with our BankRank. Thus diversification is neither reducing systemic, nor necessarily providing routes for contagion. These suggest that our model may provide a useful tool", "after": "Our model also proves useful", "start_char_pos": 1164, "end_char_pos": 1412}, {"type": "R", "before": "and for simulating", "after": ". This suggests that our model may be a useful tool for simulating the response dynamics of", "start_char_pos": 1477, "end_char_pos": 1495}, {"type": "D", "before": "in general", "after": null, "start_char_pos": 1522, "end_char_pos": 1532}], "sents_char_pos": [0, 165, 338, 563, 743, 929, 1030, 1163, 1258, 1357]}
+{"doc_id": "1410.0594", "revision_depth": "1", "before_revision": "In the present work we study the solution existence for a generalized Dynkin game of switching type which is shown to be the natural representation for general defaultable OTC contract in which acontingent CSA has been set between the parties . This is a theoretical counterparty risk mitigation mechanism that allows the counterparty of a general OTC contract to switch from zero to full/perfect collateralization and switch back whenever she wants until contract maturity paying some switching costs and taking into account the running costs that emerge over time. In this paper we allow for the strategic interaction between the counterparties of the underlying contract, which makes the problem solution much more tough. We are motivated in this research by the importance to show the economic sense - in terms of optimal contract design - of a contingent counterparty risk mitigation mechanism like our one. In particular, we show that the existence of the solution and the game Nash equilibrium is connected with the solution of a system of non-linear reflected BSDE which remains an problem. We have also proved its existence under strong condition ( in the so called \\emph{symmetric case ) highlighting in conclusion some interesting applications in finance and future researches .", "after_revision": "We study the solution 's existence for a generalized Dynkin game of switching type which is shown to be the natural representation for general defaultable OTC contract with contingent CSA . This is a theoretical counterparty risk mitigation mechanism that allows the counterparty of a general OTC contract to switch from zero to full/perfect collateralization and switch back whenever she wants until contract maturity paying some switching costs and taking into account the running costs that emerge over time. In this paper we allow for the strategic interaction between the counterparties of the underlying contract, which makes the problem solution much more tough. We are motivated in this research by the importance to show the economic sense - in terms of optimal contract design - of a contingent counterparty risk mitigation mechanism like our one. In particular, we show that the existence of the solution and the game Nash equilibrium is connected with the solution of a system of non-linear reflected BSDE which remains an open problem. We then provide the basic ideas to numerically search the game equilibrium via an iterative optimal stopping approach and we show the existence of the solution for our problem under strong condition , in the so called \\emph{ symmetric case .", "edit_actions": [{"type": "R", "before": "In the present work we", "after": "We", "start_char_pos": 0, "end_char_pos": 22}, {"type": "A", "before": null, "after": "'s", "start_char_pos": 42, "end_char_pos": 42}, {"type": "D", "before": "defaultable OTC contract", "after": null, "start_char_pos": 161, "end_char_pos": 185}, {"type": "D", "before": "in which a", "after": null, "start_char_pos": 186, "end_char_pos": 196}, {"type": "D", "before": "contingent CSA", "after": null, "start_char_pos": 196, "end_char_pos": 210}, {"type": "R", "before": "has been set between the parties", "after": "defaultable OTC contract with contingent CSA", "start_char_pos": 211, "end_char_pos": 243}, {"type": "R", "before": "counterparty risk mitigation mechanism", "after": "counterparty risk mitigation mechanism", "start_char_pos": 268, "end_char_pos": 306}, {"type": "R", "before": "Nash equilibrium", "after": "Nash equilibrium", "start_char_pos": 985, "end_char_pos": 1001}, {"type": "A", "before": null, "after": "open", "start_char_pos": 1091, "end_char_pos": 1091}, {"type": "R", "before": "have also proved its existence", "after": "then provide the basic ideas to numerically search the game equilibrium via an iterative optimal stopping approach and we show the existence of the solution for our problem", "start_char_pos": 1104, "end_char_pos": 1134}, {"type": "R", "before": "(", "after": ",", "start_char_pos": 1158, "end_char_pos": 1159}, {"type": "D", "before": "symmetric case", "after": null, "start_char_pos": 1183, "end_char_pos": 1197}, {"type": "R", "before": ") highlighting in conclusion some interesting applications in finance and future researches", "after": "symmetric case", "start_char_pos": 1198, "end_char_pos": 1289}], "sents_char_pos": [0, 245, 567, 725, 913, 1100]}
+{"doc_id": "1410.4771", "revision_depth": "1", "before_revision": "URLanism from various kingdoms of life face the challenge of regulating their size. Despite decades of research, we still do not have a good understanding of the molecular mechanisms involved in this regulation, and how cells coordinate the different events of the cell cycle , such as growth, division and DNA replication is still unclear. Here, we report on experimental results for the budding yeast Saccharomyces cerevisiae and the bacterium Escherichia coli, showing that, remarkably, they share a common strategy for cell size control. We collected data on single-cell growth and cell cycle progression in S . cerevisiae in several growth media and estimated the distributions of ] ] size at birth and interdivision time as well as their correlations throughout cell lineages. We also performed the same analysis on previously collected data on single-cell growth and division in E. coli. The results are in quantitative agreement with the predictions of the incremental model , which leads to the ] addition of a constant volume ( up to fluctuations), independent of size at birth, between birth and division; we show that in URLanisms size at birth and size at division exhibit a linear relationship with slope one. This result, together with extended additional analysis supporting ] the incremental model, argues against the existing \"critical size\" paradigm for cell size control in bacteriaand yeast .", "after_revision": "To maintain a constant cell size, dividing cells have to coordinate cell cycle events with cell growth . This coordination has for long been supposed to rely on the existence of size thresholds determining cell cycle progression 1]. In budding yeast, size is controlled at the G1/S transition 11]. In agreement with this hypothesis, the size at birth influences the time spent in G1: smaller cells have a longer G1 period 3]. Nevertheless, even though cells born smaller have a longer G1, the compensation is imperfect and they still bud at smaller cell sizes. In bacteria, several recent studies have shown that the incremental model of size control, in which size is controlled by addition of a constant volume ( in contrast to a size threshold), is able to quantitatively explain the experimental data on 4 different bacterial species 6, 5, 6, 7]. Here, we report on experimental results for the budding yeast Saccharomyces cerevisiae, finding, surprisingly, that cell size control in URLanism is very well described by the incremental model, suggesting a common strategy for cell size control with bacteria. Additionally, we argue that for S. cerevisiae the volume increment is not added from birth to division, but rather between two budding events .", "edit_actions": [{"type": "R", "before": "URLanism from various kingdoms of life face the challenge of regulating their size. Despite decades of research, we still do not have a good understanding of the molecular mechanisms involved in this regulation, and how cells coordinate the different events of the cell cycle , such as growth, division and DNA replication is still unclear. Here, we report on experimental results for the budding yeast Saccharomyces cerevisiae and the bacterium Escherichia coli, showing that, remarkably, they share a common strategy for cell size control. We collected data on single-cell growth and", "after": "To maintain a constant cell size, dividing cells have to coordinate", "start_char_pos": 0, "end_char_pos": 585}, {"type": "R", "before": "progression in S", "after": "events with cell growth", "start_char_pos": 597, "end_char_pos": 613}, {"type": "R", "before": "cerevisiae in several growth media and estimated the distributions of", "after": "This coordination has for long been supposed to rely on the existence of size thresholds determining cell cycle progression", "start_char_pos": 616, "end_char_pos": 685}, {"type": "A", "before": null, "after": "1", "start_char_pos": 686, "end_char_pos": 686}, {"type": "A", "before": null, "after": ". In budding yeast, size is controlled at the G1/S transition", "start_char_pos": 687, "end_char_pos": 687}, {"type": "A", "before": null, "after": "11", "start_char_pos": 688, "end_char_pos": 688}, {"type": "A", "before": null, "after": ". In agreement with this hypothesis, the", "start_char_pos": 689, "end_char_pos": 689}, {"type": "R", "before": "and interdivision time as well as their correlations throughout cell lineages. We also performed the same analysis on previously collected data on single-cell growth and division in E. coli. The results are in quantitative agreement with the predictions of the incremental model , which leads to the", "after": "influences the time spent in G1: smaller cells have a longer G1 period", "start_char_pos": 704, "end_char_pos": 1003}, {"type": "A", "before": null, "after": "3", "start_char_pos": 1004, "end_char_pos": 1004}, {"type": "A", "before": null, "after": ". Nevertheless, even though cells born smaller have a longer G1, the compensation is imperfect and they still bud at smaller cell sizes. In bacteria, several recent studies have shown that the incremental model of size control, in which size is controlled by", "start_char_pos": 1005, "end_char_pos": 1005}, {"type": "R", "before": "up to fluctuations), independent of size at birth, between birth and division; we show that in URLanisms size at birth and size at division exhibit a linear relationship with slope one. This result, together with extended additional analysis supporting", "after": "in contrast to a size threshold), is able to quantitatively explain the experimental data on 4 different bacterial species", "start_char_pos": 1038, "end_char_pos": 1290}, {"type": "A", "before": null, "after": "6, 5, 6, 7", "start_char_pos": 1291, "end_char_pos": 1291}, {"type": "A", "before": null, "after": ". Here, we report on experimental results for the budding yeast Saccharomyces cerevisiae, finding, surprisingly, that cell size control in URLanism is very well described by", "start_char_pos": 1292, "end_char_pos": 1292}, {"type": "R", "before": "argues against the existing \"critical size\" paradigm", "after": "suggesting a common strategy", "start_char_pos": 1316, "end_char_pos": 1368}, {"type": "R", "before": "in bacteriaand yeast", "after": "with bacteria. Additionally, we argue that for S. cerevisiae the volume increment is not added from birth to division, but rather between two budding events", "start_char_pos": 1391, "end_char_pos": 1411}], "sents_char_pos": [0, 83, 340, 541, 782, 894, 1116, 1223]}
+{"doc_id": "1411.7613", "revision_depth": "1", "before_revision": "The assessment of fundamental properties for economic and financial systems, such as systemic risk, is systematically hindered by privacy issues-that put severe limitations on the available information . Here we introduce a novel method to reconstruct partially-accessible networked systemsof this kind. The method is based on the knowledge of the fitnesses, i.e., intrinsic node-specific properties , and of the number of connections of only a limited subset of nodes. Such information is used to calibrate a directed configuration model which can generate ensembles of networks intended to represent the real system, so that the real network properties can be estimated within the generated ensemblein terms of mean values of the observables . Here we focus on estimating those properties that are commonly used to measure the network resilience to shock and crashes. Tests on both artificial and empirical networks shows that the method is remarkably robust with respect to the limitedness of the information available, thus representing a valuable tool for gaining insights on privacy-protected economic and financial systems.", "after_revision": "We address a fundamental problem that is systematically encountered when modeling complex systems: the limitedness of the information available. In the case of economic and financial networks, privacy issues severely limit the information that can be accessed and, as a consequence, the possibility of correctly estimating the resilience of these systems to events such as financial shocks, crises and cascade failures . Here we present an innovative method to reconstruct the structure of such partially-accessible systems, based on the knowledge of intrinsic node-specific properties and of the number of connections of only a limited subset of nodes. This information is used to calibrate an inference procedure based on fundamental concepts derived from statistical physics, which allows to generate ensembles of directed weighted networks intended to represent the real system, so that the real network properties can be estimated with their average values within the ensemble . Here we test the method both on synthetic and empirical networks, focusing on the properties that are commonly used to measure systemic risk. Indeed, the method shows a remarkable robustness with respect to the limitedness of the information available, thus representing a valuable tool for gaining insights on privacy-protected economic and financial systems.", "edit_actions": [{"type": "R", "before": "The assessment of fundamental properties for", "after": "We address a fundamental problem that is systematically encountered when modeling complex systems: the limitedness of the information available. In the case of", "start_char_pos": 0, "end_char_pos": 44}, {"type": "R", "before": "systems, such as systemic risk, is systematically hindered by privacy issues-that put severe limitations on the available information", "after": "networks, privacy issues severely limit the information that can be accessed and, as a consequence, the possibility of correctly estimating the resilience of these systems to events such as financial shocks, crises and cascade failures", "start_char_pos": 68, "end_char_pos": 201}, {"type": "R", "before": "introduce a novel", "after": "present an innovative", "start_char_pos": 212, "end_char_pos": 229}, {"type": "A", "before": null, "after": "the structure of such", "start_char_pos": 252, "end_char_pos": 252}, {"type": "R", "before": "networked systemsof this kind. The method is", "after": "systems,", "start_char_pos": 274, "end_char_pos": 318}, {"type": "D", "before": "the fitnesses, i.e.,", "after": null, "start_char_pos": 345, "end_char_pos": 365}, {"type": "D", "before": ",", "after": null, "start_char_pos": 401, "end_char_pos": 402}, {"type": "R", "before": "Such", "after": "This", "start_char_pos": 471, "end_char_pos": 475}, {"type": "R", "before": "a directed configuration model which can", "after": "an inference procedure based on fundamental concepts derived from statistical physics, which allows to", "start_char_pos": 509, "end_char_pos": 549}, {"type": "A", "before": null, "after": "directed weighted", "start_char_pos": 572, "end_char_pos": 572}, {"type": "R", "before": "within the generated ensemblein terms of mean values of the observables", "after": "with their average values within the ensemble", "start_char_pos": 674, "end_char_pos": 745}, {"type": "R", "before": "focus on estimating those", "after": "test the method both on synthetic and empirical networks, focusing on the", "start_char_pos": 756, "end_char_pos": 781}, {"type": "R", "before": "the network resilience to shock and crashes. Tests on both artificial and empirical networks shows that the method is remarkably robust", "after": "systemic risk. Indeed, the method shows a remarkable robustness", "start_char_pos": 827, "end_char_pos": 962}], "sents_char_pos": [0, 203, 304, 470, 747, 871]}
+{"doc_id": "1412.3353", "revision_depth": "2", "before_revision": "The heterogeneity of reaction fluxes present in metabolic networks can be exploited to construct high-flux fluctuation backbones as reduced versions of metabolism. These backbones maintain all relevant information while displaying a substantially decreased number of interconnections and, hence, they become a useful tool to extract main metabolic highways and so to unveil important biological information. Here, we disclose the metabolic backbone of Escherichia coli using computationally predicted fluxes that maximize the growth rate in glucose medium, and we contrast it with the backbone of Mycoplasma pneumoniae, a much URLanism. We find that the core of both backbones are mainly composed of reactions in ancient pathways, meaning that those reactions still remain at present significant for biomass production. At the same time, a comparative analysis of E. coli backbones in different media leads to the identification of pathways sensitive to environmental changes. Backbones, as networks of metabolites connected by the most relevant fluxes, are thus useful to trace simultaneously both evolution and adaptation fingerprints in cell metabolism .", "after_revision": "The heterogeneity of reaction fluxes present in a metabolic network can be exploited to construct the high-flux fluctuation backbone as a reduced version of metabolism. The backbone maintains all relevant information while displaying a substantially decreased number of interconnections and, hence, it becomes a useful tool to extract relevant metabolic routes which unveil important biological information. Here, we disclose the metabolic backbone of Escherichia coli using the computationally predicted fluxes which maximize the growth rate in glucose minimal medium, and we contrast it with the backbone of Mycoplasma pneumoniae, a much URLanism. We find that the core of both backbones are mainly composed of reactions in ancient pathways, meaning that those reactions still retain at present the central role in the evolved metabolism. In E. coli, the analysis of the core reveals a dominant direction with the synthesis of purines and pyrimidines and the metabolism of lipids ensuing after energy metabolism. At the same time, a comparative analysis of the backbone of E. coli in different media leads to the identification of pathways sensitive to environmental changes. The metabolic backbone of URLanism, as a network of metabolites connected by the most relevant fluxes, is thus useful to trace simultaneously both its evolution and adaptation fingerprints .", "edit_actions": [{"type": "R", "before": "metabolic networks", "after": "a metabolic network", "start_char_pos": 48, "end_char_pos": 66}, {"type": "A", "before": null, "after": "the", "start_char_pos": 97, "end_char_pos": 97}, {"type": "R", "before": "backbones as reduced versions", "after": "backbone as a reduced version", "start_char_pos": 120, "end_char_pos": 149}, {"type": "R", "before": "These backbones maintain", "after": "The backbone maintains", "start_char_pos": 165, "end_char_pos": 189}, {"type": "R", "before": "they become", "after": "it becomes", "start_char_pos": 297, "end_char_pos": 308}, {"type": "R", "before": "main metabolic highways and so to", "after": "relevant metabolic routes which", "start_char_pos": 334, "end_char_pos": 367}, {"type": "A", "before": null, "after": "the", "start_char_pos": 476, "end_char_pos": 476}, {"type": "R", "before": "that", "after": "which", "start_char_pos": 510, "end_char_pos": 514}, {"type": "A", "before": null, "after": "minimal", "start_char_pos": 551, "end_char_pos": 551}, {"type": "R", "before": "remain at present significant for biomass production.", "after": "retain at present the central role in the evolved metabolism. In E. coli, the analysis of the core reveals a dominant direction with the synthesis of purines and pyrimidines and the metabolism of lipids ensuing after energy metabolism.", "start_char_pos": 769, "end_char_pos": 822}, {"type": "A", "before": null, "after": "the backbone of", "start_char_pos": 867, "end_char_pos": 867}, {"type": "D", "before": "backbones", "after": null, "start_char_pos": 876, "end_char_pos": 885}, {"type": "R", "before": "Backbones, as networks", "after": "The metabolic backbone of URLanism, as a network", "start_char_pos": 981, "end_char_pos": 1003}, {"type": "R", "before": "are", "after": "is", "start_char_pos": 1058, "end_char_pos": 1061}, {"type": "A", "before": null, "after": "its", "start_char_pos": 1103, "end_char_pos": 1103}, {"type": "D", "before": "in cell metabolism", "after": null, "start_char_pos": 1142, "end_char_pos": 1160}], "sents_char_pos": [0, 164, 408, 639, 822, 980]}
+{"doc_id": "1412.7059", "revision_depth": "1", "before_revision": "State-of-the-art emergency navigation approaches , which aim to evacuate civilians during a disaster , commonly make decisions in a real-time fashion with respect to one pre-defined algorithm and living sensory data. Hence, fatalities caused by the inappropriate guidance of an approach can only be unveiled until the end of an evacuation process and is impossible to be remedied. Previous research implies that the performance of routing algorithms for evacuation proposes are sensitive to initial distribution of evacuees, occupancy rate, disaster type as well as disaster location. In other words, a well performed algorithm in one scenario may achieve bad results in another scenario. This problem is especially serious in heuristic-based routing algorithms where results are affected by the configuration of certain parameters. Therefore, this paper proposes a simulation-based routing algorithm to realise near-optimal evacuations by making use of the high computational power of cloud servers. Rather than guiding evacuees with a routing algorithm directly , a robust Cognitive Packet Network based algorithm is first evaluated via a cloud-based simulator in a faster-than-real-time manner . Towards all the perished evacuees in the simulation, a variant of Dijkstra's algorithm is then employed to solve optimal paths for them and all the evacuees will finally follow the desired paths to exits. Furthermore, the \"tsunami of data\" phenomenon caused by simultaneous information exchanges among massive mobile devices and cloud servers is avoided as the proposed algorithm can calculate desired paths only based on the initial situation .", "after_revision": "State-of-the-art emergency navigation approaches are designed to evacuate civilians during a disaster based on real-time decisions using a pre-defined algorithm and live sensory data. Hence, casualties caused by the poor decisions and guidance are only apparent at the end of the evacuation process and cannot then be remedied. Previous research shows that the performance of routing algorithms for evacuation purposes are sensitive to the initial distribution of evacuees, the occupancy levels, the type of disaster and its as well its locations. Thus an algorithm that performs well in one scenario may achieve bad results in another scenario. This problem is especially serious in heuristic-based routing algorithms for evacuees where results are affected by the choice of certain parameters. Therefore, this paper proposes a simulation-based evacuee routing algorithm that optimises evacuation by making use of the high computational power of cloud servers. Rather than guiding evacuees with a predetermined routing algorithm , a robust Cognitive Packet Network based algorithm is first evaluated via a cloud-based simulator in a faster-than-real-time manner , and any \"simulated casualties\" are then re-routed using a variant of Dijkstra's algorithm to obtain new safe paths for them to exits. This approach can be iterated as long as corrective action is still possible .", "edit_actions": [{"type": "R", "before": ", which aim", "after": "are designed", "start_char_pos": 49, "end_char_pos": 60}, {"type": "R", "before": ", commonly make decisions in a real-time fashion with respect to one", "after": "based on real-time decisions using a", "start_char_pos": 101, "end_char_pos": 169}, {"type": "R", "before": "living", "after": "live", "start_char_pos": 196, "end_char_pos": 202}, {"type": "R", "before": "fatalities", "after": "casualties", "start_char_pos": 224, "end_char_pos": 234}, {"type": "R", "before": "inappropriate guidance of an approach can only be unveiled until", "after": "poor decisions and guidance are only apparent at", "start_char_pos": 249, "end_char_pos": 313}, {"type": "R", "before": "an", "after": "the", "start_char_pos": 325, "end_char_pos": 327}, {"type": "R", "before": "is impossible to", "after": "cannot then", "start_char_pos": 351, "end_char_pos": 367}, {"type": "R", "before": "implies", "after": "shows", "start_char_pos": 399, "end_char_pos": 406}, {"type": "R", "before": "proposes", "after": "purposes", "start_char_pos": 465, "end_char_pos": 473}, {"type": "A", "before": null, "after": "the", "start_char_pos": 491, "end_char_pos": 491}, {"type": "R", "before": "occupancy rate, disaster type as well as disaster location. In other words, a well performed algorithm", "after": "the occupancy levels, the type of disaster and its as well its locations. Thus an algorithm that performs well", "start_char_pos": 526, "end_char_pos": 628}, {"type": "A", "before": null, "after": "for evacuees", "start_char_pos": 763, "end_char_pos": 763}, {"type": "R", "before": "configuration", "after": "choice", "start_char_pos": 798, "end_char_pos": 811}, {"type": "R", "before": "routing algorithm to realise near-optimal evacuations", "after": "evacuee routing algorithm that optimises evacuation", "start_char_pos": 885, "end_char_pos": 938}, {"type": "R", "before": "routing algorithm directly", "after": "predetermined routing algorithm", "start_char_pos": 1039, "end_char_pos": 1065}, {"type": "R", "before": ". Towards all the perished evacuees in the simulation,", "after": ", and any \"simulated casualties\" are then re-routed using", "start_char_pos": 1199, "end_char_pos": 1253}, {"type": "R", "before": "is then employed to solve optimal", "after": "to obtain new safe", "start_char_pos": 1288, "end_char_pos": 1321}, {"type": "D", "before": "and all the evacuees will finally follow the desired paths", "after": null, "start_char_pos": 1337, "end_char_pos": 1395}, {"type": "R", "before": "Furthermore, the \"tsunami of data\" phenomenon caused by simultaneous information exchanges among massive mobile devices and cloud servers is avoided as the proposed algorithm can calculate desired paths only based on the initial situation", "after": "This approach can be iterated as long as corrective action is still possible", "start_char_pos": 1406, "end_char_pos": 1644}], "sents_char_pos": [0, 216, 380, 585, 689, 834, 1002, 1200, 1405]}
+{"doc_id": "1412.7695", "revision_depth": "1", "before_revision": "Allosteric communication in proteins is a central and yet not solved problem of structural biochemistry. Molecular communication in proteins requires the existence of allosteric pathways. Previous findings, from computational biology (Ota and Agard, 2005), has proposed that heat diffuses in a protein through allosteric pathways. In this work we studied heat diffusion in the well know PDZ-2 protein . This protein has two cognate allosteric pathways and we confirm that heat flows preferentially through them . Also, a new property is observed for protein structures : heat diffuses asymmetrically through them . The underling structure of this asymmetrical heat flow is the hydrogen bond of normal length (~2.85 {\\AA}) , that can act as a thermal diode. Also asymmetrical heat diffusion is due, in } a higher scale, to local URLanization of residues . This asymmetrical energy flow may be relevant for allosteric signal communication directionality in protein structures .", "after_revision": "Allosteric communication in proteins is a central and yet unsolved problem of structural biochemistry. Previous findings, from computational biology (Ota and Agard, 2005), have proposed that heat diffuses in a protein through cognate protein allosteric pathways. This work studied heat diffusion in the well-known PDZ-2 protein , and confirmed that this protein has two cognate allosteric pathways and that heat flows preferentially through these . Also, a new property was also observed for protein structures - heat diffuses asymmetrically through the structures . The underling structure of this asymmetrical heat flow was a normal length hydrogen bond (~2.85 {\\AA}) that acted as a thermal rectifier. In contrast, thermal rectification was compromised in short hydrogen bonds (~2.60 \\AA}), giving rise to symmetrical thermal diffusion. Asymmetrical heat diffusion was due, on a higher scale, to the local, URLanization of residues that, in turn, was also mediated by hydrogen bonds . This asymmetrical /symmetrical energy flow may be relevant for allosteric signal communication directionality in proteins and for the control of heat flow in materials science .", "edit_actions": [{"type": "R", "before": "not solved", "after": "unsolved", "start_char_pos": 58, "end_char_pos": 68}, {"type": "D", "before": "Molecular communication in proteins requires the existence of allosteric pathways.", "after": null, "start_char_pos": 105, "end_char_pos": 187}, {"type": "R", "before": "has", "after": "have", "start_char_pos": 257, "end_char_pos": 260}, {"type": "A", "before": null, "after": "cognate protein", "start_char_pos": 310, "end_char_pos": 310}, {"type": "R", "before": "In this work we", "after": "This work", "start_char_pos": 332, "end_char_pos": 347}, {"type": "R", "before": "well know", "after": "well-known", "start_char_pos": 378, "end_char_pos": 387}, {"type": "R", "before": ". This", "after": ", and confirmed that this", "start_char_pos": 402, "end_char_pos": 408}, {"type": "D", "before": "we confirm", "after": null, "start_char_pos": 457, "end_char_pos": 467}, {"type": "R", "before": "them", "after": "these", "start_char_pos": 507, "end_char_pos": 511}, {"type": "R", "before": "is", "after": "was also", "start_char_pos": 535, "end_char_pos": 537}, {"type": "R", "before": ":", "after": "-", "start_char_pos": 570, "end_char_pos": 571}, {"type": "R", "before": "them", "after": "the structures", "start_char_pos": 609, "end_char_pos": 613}, {"type": "R", "before": "is the hydrogen bond of normal length", "after": "was a normal length hydrogen bond", "start_char_pos": 671, "end_char_pos": 708}, {"type": "R", "before": ", that can act", "after": "that acted", "start_char_pos": 723, "end_char_pos": 737}, {"type": "R", "before": "diode. Also asymmetrical heat diffusion is due, in", "after": "rectifier. In contrast, thermal rectification was compromised in short hydrogen bonds (~2.60", "start_char_pos": 751, "end_char_pos": 801}, {"type": "A", "before": null, "after": "\\AA", "start_char_pos": 802, "end_char_pos": 802}, {"type": "A", "before": null, "after": "), giving rise to symmetrical thermal diffusion. Asymmetrical heat diffusion was due, on", "start_char_pos": 803, "end_char_pos": 803}, {"type": "R", "before": "local", "after": "the local,", "start_char_pos": 823, "end_char_pos": 828}, {"type": "A", "before": null, "after": "that, in turn, was also mediated by hydrogen bonds", "start_char_pos": 854, "end_char_pos": 854}, {"type": "A", "before": null, "after": "/symmetrical", "start_char_pos": 875, "end_char_pos": 875}, {"type": "R", "before": "protein structures", "after": "proteins and for the control of heat flow in materials science", "start_char_pos": 958, "end_char_pos": 976}], "sents_char_pos": [0, 104, 187, 331, 403, 513, 615, 757, 856]}
+{"doc_id": "1502.05603", "revision_depth": "1", "before_revision": "This paper examines the stock market comovements using basically three different approaches. Firstly, we used the most common linear analysis, based on cointegrationand Granger causality tests ; secondly we applied a nonlinear approach, using mutual information to analyze nonlinear dependence. Since underlying data sets are affected by non-stationarities , we also applied MF-DFA and MF-DXA in order to examine the multifractality nature of data and to analyze the relationship and mutual interaction between pairs of series, respectively. The overall results are quite interesting, since we found only 170 pair of stock markets cointegrated, and according to the Granger causality and mutual information we realized that the strongest relations lies between emerging markets, and between emerging and frontier markets. According to scaling exponent given by MF-DFA , h(q=2)>1, we found that all underlying data belong to non-stationary process. There is no cross-over in the fluctuation functions determined by MF-DFA method confirmed that mentioned approach could remove trends embedded in the data sets\\pm0\\pm . The nature of cross-correlation exponent based on Mf-DXA is almost multifractal for all stock market pairs . The empirical relation, h_{xy}\\le [ h_{xx + h_{yy ]/2 was confirmedjust for q>0 , while for q<0 there was a deviation from this relation . Width of singularity spectrum is in the range \\Delta \\alpha_{xx}\\in [0.304,0.905] which is another confirmation about multifractality nature of underlying data sets. The singularity spectrum for cross-correlation is in the range \\Delta \\alpha_{xy}\\in [0.246,1.178] confirming more complex relation between stock markets . The value of \\sigma_{DCCA} which is a measure for quantifying degree of cross-correlation indicates that all stock market pairs in the underlying time interval belong to cross-correlated series .", "after_revision": "Stock market comovements are examined using cointegration, Granger causality tests and nonlinear approaches in context of mutual information and correlations. Underlying data sets are affected by non-stationarities and trends , we also apply AMF-DFA and AMF-DXA. We find only 170 pair of Stock markets cointegrated, and according to the Granger causality and mutual information , we realize that the strongest relations lies between emerging markets, and between emerging and frontier markets. According to scaling exponent given by AMF-DFA , h(q=2)>1, we find that all underlying data sets belong to non-stationary process. According to EMH, only 8 markets are classified in uncorrelated processes at 2\\sigma confidence interval. 6 Stock markets belong to anti-correlated class and dominant part of markets has memory in corresponding daily index prices during January 1995 to February 2014. New-Zealand with H=0.457\\pm0.004 and Jordan with H=0.602\\pm 0.006 are far from EMH . The nature of cross-correlation exponents based on AMF-DXA is almost multifractal for all pair of Stock markets . The empirical relation, H_{xy}\\le [ H_{xx + H_{yy ]/2 , is confirmed. Mentioned relation for q>0 is also satisfied while for q<0 there is a deviation from this relation confirming behavior of markets for small fluctuations is affected by contribution of major pair. For larger fluctuations, the cross-correlation contains information from both local and global conditions. Width of singularity spectrum for auto-correlation and cross-correlation are \\Delta \\alpha_{xx}\\in [0.304,0.905] and \\Delta \\alpha_{xy}\\in [0.246,1.178] , respectively. The wide range of singularity spectrum for cross-correlation confirms that the bilateral relation between Stock markets is more complex . The value of \\sigma_{DCCA} indicates that all pairs of stock market studied in this time interval belong to cross-correlated processes .", "edit_actions": [{"type": "R", "before": "This paper examines the stock market comovements using basically three different approaches. Firstly, we used the most common linear analysis, based on cointegrationand", "after": "Stock market comovements are examined using cointegration,", "start_char_pos": 0, "end_char_pos": 168}, {"type": "R", "before": "; secondly we applied a nonlinear approach, using mutual information to analyze nonlinear dependence. Since underlying", "after": "and nonlinear approaches in context of mutual information and correlations. Underlying", "start_char_pos": 193, "end_char_pos": 311}, {"type": "A", "before": null, "after": "and trends", "start_char_pos": 357, "end_char_pos": 357}, {"type": "R", "before": "applied MF-DFA and MF-DXA in order to examine the multifractality nature of data and to analyze the relationship and mutual interaction between pairs of series, respectively. The overall results are quite interesting, since we found", "after": "apply AMF-DFA and AMF-DXA. We find", "start_char_pos": 368, "end_char_pos": 600}, {"type": "R", "before": "stock", "after": "Stock", "start_char_pos": 618, "end_char_pos": 623}, {"type": "R", "before": "we realized", "after": ", we realize", "start_char_pos": 708, "end_char_pos": 719}, {"type": "R", "before": "MF-DFA", "after": "AMF-DFA", "start_char_pos": 862, "end_char_pos": 868}, {"type": "R", "before": "found", "after": "find", "start_char_pos": 884, "end_char_pos": 889}, {"type": "A", "before": null, "after": "sets", "start_char_pos": 915, "end_char_pos": 915}, {"type": "R", "before": "There is no cross-over in the fluctuation functions determined by MF-DFA method confirmed that mentioned approach could remove trends embedded in the data sets", "after": "According to EMH, only 8 markets are classified in uncorrelated processes at 2\\sigma confidence interval. 6 Stock markets belong to anti-correlated class and dominant part of markets has memory in corresponding daily index prices during January 1995 to February 2014. New-Zealand with H=0.457", "start_char_pos": 950, "end_char_pos": 1109}, {"type": "A", "before": null, "after": ".004 and Jordan with H=0.602", "start_char_pos": 1113, "end_char_pos": 1113}, {"type": "A", "before": null, "after": "0.006 are far from EMH", "start_char_pos": 1117, "end_char_pos": 1117}, {"type": "R", "before": "exponent based on Mf-DXA", "after": "exponents based on AMF-DXA", "start_char_pos": 1152, "end_char_pos": 1176}, {"type": "R", "before": "stock market pairs", "after": "pair of Stock markets", "start_char_pos": 1208, "end_char_pos": 1226}, {"type": "R", "before": "h_{xy", "after": "H_{xy", "start_char_pos": 1253, "end_char_pos": 1258}, {"type": "R", "before": "h_{xx", "after": "H_{xx", "start_char_pos": 1265, "end_char_pos": 1270}, {"type": "R", "before": "h_{yy", "after": "H_{yy", "start_char_pos": 1273, "end_char_pos": 1278}, {"type": "R", "before": "was confirmedjust", "after": ", is confirmed. Mentioned relation", "start_char_pos": 1283, "end_char_pos": 1300}, {"type": "R", "before": ",", "after": "is also satisfied", "start_char_pos": 1309, "end_char_pos": 1310}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 1331, "end_char_pos": 1334}, {"type": "R", "before": ".", "after": "confirming behavior of markets for small fluctuations is affected by contribution of major pair. For larger fluctuations, the cross-correlation contains information from both local and global conditions.", "start_char_pos": 1366, "end_char_pos": 1367}, {"type": "R", "before": "is in the range", "after": "for auto-correlation and cross-correlation are", "start_char_pos": 1398, "end_char_pos": 1413}, {"type": "R", "before": "which is another confirmation about multifractality nature of underlying data sets. The singularity spectrum for cross-correlation is in the range", "after": "and", "start_char_pos": 1450, "end_char_pos": 1596}, {"type": "R", "before": "confirming more complex relation between stock markets", "after": ", respectively. The wide range of singularity spectrum for cross-correlation confirms that the bilateral relation between Stock markets is more complex", "start_char_pos": 1633, "end_char_pos": 1687}, {"type": "D", "before": "which is a measure for quantifying degree of cross-correlation", "after": null, "start_char_pos": 1717, "end_char_pos": 1779}, {"type": "R", "before": "stock market pairs in the underlying", "after": "pairs of stock market studied in this", "start_char_pos": 1799, "end_char_pos": 1835}, {"type": "R", "before": "series", "after": "processes", "start_char_pos": 1877, "end_char_pos": 1883}], "sents_char_pos": [0, 92, 194, 294, 542, 822, 949, 1119, 1228, 1367, 1533, 1689]}
+{"doc_id": "1502.07110", "revision_depth": "1", "before_revision": "For a class of polynomial kinetic systems, this work examines connections between system parameters, and uniqueness and stability of the resulting equilibria. Such systems are typically employed to describe nonlinear dynamics in chemical reaction networks, but over the last years they proved useful in modeling a wide range of nonlinear dynamic systems with applications in biology, process systems, economics or transportation problems. In particular , a canonical representation of the set of all possible feasible equilibrium solutions is developed. The characterization is made in terms of compartmental matrices which by construction are strictly stable and define the so-called family of solutions. Feasibility is imposed by a set of constraints, which are linear in the log-transformed space of complexes, and relate to the kernel of the stoichiometric subspace. One particularly interesting representation of these constraints can be established in terms of a class of monotonous functions which turn out to be critical to conclude uniqueness of equilibrium points in a class of deficiency one networks. One main consequence of such representation is the possibility of a simple constructive proof of the deficiency one theorem. It also allows a precise characterization of the parameter space region of complex balance solutions we refer to as the Horn set. Future directions may involve detection or design of networks having multiple equilibria, or the use of complex balance condition to provide stabilization via feed-back control of open reaction systems .", "after_revision": "This paper studies the relations among system parameters, uniqueness, and stability of equilibria, for kinetic systems given in the form of polynomial ODEs. Such models are commonly used to describe the dynamics of nonnegative systems, with a wide range of application fields such as chemistry, systems biology, process modeling or even transportation systems. Using a flux-based description of kinetic models , a canonical representation of the set of all possible feasible equilibria is developed. The characterization is made in terms of strictly stable compartmental matrices to define the so-called family of solutions. Feasibility is imposed by a set of constraints, which are linear on a log-transformed space of complexes, and relate to the kernel of a matrix, the columns of which span the stoichiometric subspace. One particularly interesting representation of these constraints can be expressed in terms of a class of monotonous decreasing functions. This allows connections to be established with classical results in CRNT that relate to the existence and uniqueness of equilibria along positive stoichiometric compatibility classes. In particular, monotonicity can be employed to identify regions in the set of possible reaction rate coefficients leading to complex balancing, and to conclude uniqueness of equilibria for a class of positive deficiency networks. The latter result might support constructing an alternative proof of the well-known deficiency one theorem. The developed notions and results are illustrated through examples .", "edit_actions": [{"type": "R", "before": "For a class of polynomial kinetic systems, this work examines connections between", "after": "This paper studies the relations among", "start_char_pos": 0, "end_char_pos": 81}, {"type": "R", "before": "and uniqueness", "after": "uniqueness,", "start_char_pos": 101, "end_char_pos": 115}, {"type": "R", "before": "the resulting equilibria. Such systems are typically employed to describe nonlinear dynamics in chemical reaction networks, but over the last years they proved useful in modeling", "after": "equilibria, for kinetic systems given in the form of polynomial ODEs. Such models are commonly used to describe the dynamics of nonnegative systems, with", "start_char_pos": 133, "end_char_pos": 311}, {"type": "R", "before": "nonlinear dynamic systems with applications in", "after": "application fields such as chemistry, systems", "start_char_pos": 328, "end_char_pos": 374}, {"type": "R", "before": "systems, economics or transportation problems. In particular", "after": "modeling or even transportation systems. Using a flux-based description of kinetic models", "start_char_pos": 392, "end_char_pos": 452}, {"type": "R", "before": "equilibrium solutions", "after": "equilibria", "start_char_pos": 518, "end_char_pos": 539}, {"type": "R", "before": "compartmental matrices which by construction are strictly stable and", "after": "strictly stable compartmental matrices to", "start_char_pos": 595, "end_char_pos": 663}, {"type": "R", "before": "in the", "after": "on a", "start_char_pos": 771, "end_char_pos": 777}, {"type": "R", "before": "the", "after": "a matrix, the columns of which span the", "start_char_pos": 842, "end_char_pos": 845}, {"type": "R", "before": "established", "after": "expressed", "start_char_pos": 943, "end_char_pos": 954}, {"type": "R", "before": "functions which turn out to be critical to conclude uniqueness of equilibrium points in", "after": "decreasing functions. This allows connections to be established with classical results in CRNT that relate to the existence and uniqueness of equilibria along positive stoichiometric compatibility classes. In particular, monotonicity can be employed to identify regions in the set of possible reaction rate coefficients leading to complex balancing, and to conclude uniqueness of equilibria for", "start_char_pos": 989, "end_char_pos": 1076}, {"type": "R", "before": "deficiency one networks. One main consequence of such representation is the possibility of a simple constructive", "after": "positive deficiency networks. The latter result might support constructing an alternative", "start_char_pos": 1088, "end_char_pos": 1200}, {"type": "A", "before": null, "after": "well-known", "start_char_pos": 1214, "end_char_pos": 1214}, {"type": "R", "before": "It also allows a precise characterization of the parameter space region of complex balance solutions we refer to as the Horn set. Future directions may involve detection or design of networks having multiple equilibria, or the use of complex balance condition to provide stabilization via feed-back control of open reaction systems", "after": "The developed notions and results are illustrated through examples", "start_char_pos": 1239, "end_char_pos": 1570}], "sents_char_pos": [0, 158, 438, 553, 705, 870, 1112, 1238, 1368]}
+{"doc_id": "1503.06529", "revision_depth": "1", "before_revision": "Molecular motors and cytoskeletal filaments mostly work collectively under opposing forces. This opposing force may be due to cargo carried by motors , or resistance coming from cell membrane pressing against the cytoskeletal filaments. Certain recent studies have shown that the collective maximum force (stall force) generated by multiple cytoskeletal filaments or molecular motors may not always be just a simple sum of stall force for individual filaments or motors. To understand this phenomena of excess or deficit collective force generation , we study a broad class of models of both cytoskeletal filaments and molecular motors. We argue that the stall force generated by a group of filaments or motors is additive, i.e. , the stall force of N filaments (motors) is N times the stall force of one filament (motor), when the system is in equilibrium at stall. Consequently , we show that this additivity typically does not hold when the system departs from equilibrium at stall. We thus present a novel and unified understanding of existing models exhibiting such non- addivity, and generalize our arguments by developing new models that demonstrate this phenomena. We also propose a quantity similar to thermodynamic efficiency to provide a simple understanding of deviation from stall-force additivity for filament and motor collectives.", "after_revision": "Molecular motors and cytoskeletal filaments work collectively most of the time under opposing forces. This opposing force may be due to cargo carried by motors or resistance coming from the cell membrane pressing against the cytoskeletal filaments. Some recent studies have shown that the collective maximum force (stall force) generated by multiple cytoskeletal filaments or molecular motors may not always be just a simple sum of the stall forces of the individual filaments or motors. To understand this excess or deficit in the collective force , we study a broad class of models of both cytoskeletal filaments and molecular motors. We argue that the stall force generated by a group of filaments or motors is additive, that is , the stall force of N number of filaments (motors) is N times the stall force of one filament (motor), when the system is in equilibrium at stall. Conversely , we show that this additive property typically does not hold true when the system is not at equilibrium at stall. We thus present a novel and unified understanding of the existing models exhibiting such non-addivity, and generalise our arguments by developing new models that demonstrate this phenomena. We also propose a quantity similar to thermodynamic efficiency to easily predict this deviation from stall-force additivity for filament and motor collectives.", "edit_actions": [{"type": "R", "before": "mostly work collectively", "after": "work collectively most of the time", "start_char_pos": 44, "end_char_pos": 68}, {"type": "D", "before": ",", "after": null, "start_char_pos": 150, "end_char_pos": 151}, {"type": "A", "before": null, "after": "the", "start_char_pos": 178, "end_char_pos": 178}, {"type": "R", "before": "Certain", "after": "Some", "start_char_pos": 238, "end_char_pos": 245}, {"type": "R", "before": "stall force for", "after": "the stall forces of the", "start_char_pos": 424, "end_char_pos": 439}, {"type": "D", "before": "phenomena of", "after": null, "start_char_pos": 491, "end_char_pos": 503}, {"type": "R", "before": "collective force generation", "after": "in the collective force", "start_char_pos": 522, "end_char_pos": 549}, {"type": "R", "before": "i.e.", "after": "that is", "start_char_pos": 725, "end_char_pos": 729}, {"type": "A", "before": null, "after": "number of", "start_char_pos": 753, "end_char_pos": 753}, {"type": "R", "before": "Consequently", "after": "Conversely", "start_char_pos": 869, "end_char_pos": 881}, {"type": "R", "before": "additivity", "after": "additive property", "start_char_pos": 902, "end_char_pos": 912}, {"type": "A", "before": null, "after": "true", "start_char_pos": 937, "end_char_pos": 937}, {"type": "R", "before": "departs from", "after": "is not at", "start_char_pos": 954, "end_char_pos": 966}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1042, "end_char_pos": 1042}, {"type": "R", "before": "non- addivity, and generalize", "after": "non-addivity, and generalise", "start_char_pos": 1075, "end_char_pos": 1104}, {"type": "R", "before": "provide a simple understanding of", "after": "easily predict this", "start_char_pos": 1243, "end_char_pos": 1276}], "sents_char_pos": [0, 91, 237, 471, 637, 868, 988, 1176]}
+{"doc_id": "1505.07062", "revision_depth": "1", "before_revision": "Coverage planning and optimization is one of the most crucial tasks for a radio network operator. Efficient coverage optimization requires accurate coverage estimation which relies on geo-located field measurements . These measurements are gathered today during highly expensive drive tests and will be reported in the near future by users equipments thanks to the 3GPP MDT feature ( still costly in terms of battery consumption and signaling overhead ). In both cases , predicting the coverage on a location where no measurements are available remains a key and challenging task. This paper describes a powerful tool that gives an accurate coverage prediction on the whole area of interest , i.e. a coverage map , by spatially interpolating geo-located measurements using Kriging technique. The paper focuses on the reduction of the computational complexity of the kriging algorithm by applying Fixed Rank Kriging (FRK). The performance evaluation of the FRK algorithm both on simulated measurements and real field measurements shows a good trade-off between prediction efficiency and computational complexity. In order to go a step further towards operational application of the proposed algorithm, a scenario with multiple cells is studied. Simulation results show a good performance in terms of coverage prediction and detection of best serving cell.", "after_revision": "Coverage planning and optimization is one of the most crucial tasks for a radio network operator. Efficient coverage optimization requires accurate coverage estimation . This estimation relies on geo-located field measurements which are gathered today during highly expensive drive tests (DT); and will be reported in the near future by users ' mobile devices thanks to the 3GPP Minimizing Drive Tests (MDT) feature~\\mbox{%DIFAUXCMD 3GPPproposal still costly in terms of battery consumption and signaling overhead . Therefore , predicting the coverage on a location where no measurements are available remains a key and challenging task. This paper describes a powerful tool that gives an accurate coverage prediction on the whole area of interest : it builds a coverage map by spatially interpolating geo-located measurements using the Kriging technique. The paper focuses on the reduction of the computational complexity of the Kriging algorithm by applying Fixed Rank Kriging (FRK). The performance evaluation of the FRK algorithm both on simulated measurements and real field measurements shows a good trade-off between prediction efficiency and computational complexity. In order to go a step further towards the operational application of the proposed algorithm, a multicellular use-case is studied. Simulation results show a good performance in terms of coverage prediction and detection of the best serving cell.", "edit_actions": [{"type": "R", "before": "which", "after": ". This estimation", "start_char_pos": 168, "end_char_pos": 173}, {"type": "R", "before": ". These measurements", "after": "which", "start_char_pos": 215, "end_char_pos": 235}, {"type": "A", "before": null, "after": "(DT);", "start_char_pos": 291, "end_char_pos": 291}, {"type": "R", "before": "equipments", "after": "' mobile devices", "start_char_pos": 341, "end_char_pos": 351}, {"type": "R", "before": "MDT feature (", "after": "Minimizing Drive Tests (MDT) feature~\\mbox{%DIFAUXCMD 3GPPproposal", "start_char_pos": 371, "end_char_pos": 384}, {"type": "R", "before": "). In both cases", "after": ". Therefore", "start_char_pos": 453, "end_char_pos": 469}, {"type": "R", "before": ", i.e.", "after": ": it builds", "start_char_pos": 692, "end_char_pos": 698}, {"type": "D", "before": ",", "after": null, "start_char_pos": 714, "end_char_pos": 715}, {"type": "A", "before": null, "after": "the", "start_char_pos": 774, "end_char_pos": 774}, {"type": "R", "before": "kriging", "after": "Kriging", "start_char_pos": 868, "end_char_pos": 875}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1152, "end_char_pos": 1152}, {"type": "R", "before": "scenario with multiple cells", "after": "multicellular use-case", "start_char_pos": 1206, "end_char_pos": 1234}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1339, "end_char_pos": 1339}], "sents_char_pos": [0, 97, 216, 455, 581, 793, 923, 1113, 1246]}
+{"doc_id": "1508.03533", "revision_depth": "1", "before_revision": " In the present paper we employ the theoretical tools developed in network theory , in order to shed light on the response of world wide trade to the financial crisis of 2007. In particular, we have explored the evolution of the bipartite country-product World Trade Web across the years 1995-2010, monitoring the behaviour of the system both before and after 2007. Remarkably, our results indicate that, from 2003 on, the abundances of a recently-defined class of bipartite motifs assume values progressively closer to the ones predicted by a null model which preserves only basic features of the observed structure, completely randomizing the rest. In other words, as 2007 approaches the World Trade Web becomes more and more compatible with the picture of a bipartite network where correlations between countries and products are progressively lost. Moreover, the trends characterizing the z-scores of the considered family of motifs suggest that the most evident modification in the structure of the world trade network can be considered as concluded in 2010, after a seemingly stationary phase of three years. In the second part of the paper, we have refined our analysis by considering subsets of nodes regarded in the literature as sharing similar economic traits: while the evolution of certain subgroups of countries and products confirms the trends highlighted by the global motifs, other groupings show a behavior compatible with our null model throughout the whole period 1995-2010, thus questioning the economic relevance traditionally assigned to these groups .", "after_revision": "Since 2007, several contributions have tried to identify early-warning signals of the financial crisis. However, the vast majority of analyses has focused, so far, on financial systems and little theoretical work has been done on the economic counterpart. In the present paper we fill this gap and employ the theoretical tools of network theory to shed light on the response of world trade to the financial crisis of 2007 and the economic recession of 2008-2009. We have explored the evolution of the bipartite World Trade Web (WTW) across the years 1995-2010, monitoring the behaviour of the system both before and after 2007. Remarkably, our results point out the presence of early structural changes in the WTW topology: from 2003 on, the WTW becomes more and more compatible with the picture of a network where correlations between countries and products are progressively lost. Moreover, the most evident modification in the structure of the world trade network can be considered as concluded in 2010, after a seemingly stationary phase of three years. We have also refined our analysis by considering specific subsets of countries and products : according to our analysis, the most statistically significant early-warning signals are provided by the most volatile macrosectors, especially when measured on emerging economies, suggesting the latter as the most sensitive indicators of the WTW health .", "edit_actions": [{"type": "A", "before": null, "after": "Since 2007, several contributions have tried to identify early-warning signals of the financial crisis. However, the vast majority of analyses has focused, so far, on financial systems and little theoretical work has been done on the economic counterpart.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "A", "before": null, "after": "fill this gap and", "start_char_pos": 25, "end_char_pos": 25}, {"type": "R", "before": "developed in network theory , in order", "after": "of network theory", "start_char_pos": 55, "end_char_pos": 93}, {"type": "D", "before": "wide", "after": null, "start_char_pos": 133, "end_char_pos": 137}, {"type": "R", "before": "2007. In particular, we", "after": "2007 and the economic recession of 2008-2009. We", "start_char_pos": 171, "end_char_pos": 194}, {"type": "D", "before": "country-product", "after": null, "start_char_pos": 240, "end_char_pos": 255}, {"type": "A", "before": null, "after": "(WTW)", "start_char_pos": 272, "end_char_pos": 272}, {"type": "R", "before": "indicate that,", "after": "point out the presence of early structural changes in the WTW topology:", "start_char_pos": 392, "end_char_pos": 406}, {"type": "R", "before": "abundances of a recently-defined class of bipartite motifs assume values progressively closer to the ones predicted by a null model which preserves only basic features of the observed structure, completely randomizing the rest. In other words, as 2007 approaches the World Trade Web", "after": "WTW", "start_char_pos": 425, "end_char_pos": 707}, {"type": "D", "before": "bipartite", "after": null, "start_char_pos": 763, "end_char_pos": 772}, {"type": "D", "before": "trends characterizing the z-scores of the considered family of motifs suggest that the", "after": null, "start_char_pos": 869, "end_char_pos": 955}, {"type": "R", "before": "In the second part of the paper, we have", "after": "We have also", "start_char_pos": 1117, "end_char_pos": 1157}, {"type": "R", "before": "subsets of nodes regarded in the literature as sharing similar economic traits: while the evolution of certain subgroups of", "after": "specific subsets of", "start_char_pos": 1194, "end_char_pos": 1317}, {"type": "R", "before": "confirms the trends highlighted by the global motifs, other groupings show a behavior compatible with our null model throughout the whole period 1995-2010, thus questioning the economic relevance traditionally assigned to these groups", "after": ": according to our analysis, the most statistically significant early-warning signals are provided by the most volatile macrosectors, especially when measured on emerging economies, suggesting the latter as the most sensitive indicators of the WTW health", "start_char_pos": 1341, "end_char_pos": 1575}], "sents_char_pos": [0, 176, 367, 652, 854, 1116]}
+{"doc_id": "1508.06797", "revision_depth": "1", "before_revision": "We perform a classification of the Lie point symmetries for the Black-Scholes-Merton model for European options with stochastic volatility \\% \\sigma, in which the last is defined by a stochastic differential equation with the Orstein-Uhlenbeck term. In this model the value of the option is given by a linear (1 + 2) evolution partial differential equation , in which the price of the option depends on two independent variables, the value of the underlying asset S and a new variable, y , which follow from the Orstein-Uhlenbeck process . We find that for arbitrary functional form of the volatility, \\sigma(y), the (1 + 2) evolution equation admits always two Lie symmetries, plus the linear symmetry and the infinity number of solution symmetries. However when \\sigma(y)=\\sigma_{0} and since the price of the option depends on the second Brownian motion in which the volatility is defined, the (1 + 2) evolution is not reduced to the Black-Scholes-Merton equation , the model admits five Lie symmetries, plus the linear symmetry and the infinity number of solution symmetries. Furthermore we apply the zero-order invariants of the Lie symmetries and we reduce the (1 + 2) evolution equation to a linear second-order ordinary differential equation. Finally we study two models of special interest, the Heston model and the Stein-Stein model.", "after_revision": "We perform a classification of the Lie point symmetries for the Black--Scholes--Merton Model for European options with stochastic volatility , \\sigma, in which the last is defined by a stochastic differential equation with an Orstein--Uhlenbeck term. In this model , the value of the option is given by a linear (1 + 2) evolution partial differential equation in which the price of the option depends upon two independent variables, the value of the underlying asset , S, and a new variable, y . We find that for arbitrary functional form of the volatility, \\sigma(y), the (1 + 2) evolution equation always admits two Lie point symmetries in addition to the automatic linear symmetry and the infinite number of solution symmetries. However , when \\sigma(y)=\\sigma_{0} and as the price of the option depends upon the second Brownian motion in which the volatility is defined, the (1 + 2) evolution is not reduced to the Black--Scholes--Merton Equation , the model admits five Lie point symmetries in addition to the linear symmetry and the infinite number of solution symmetries. We apply the zeroth-order invariants of the Lie symmetries and we reduce the (1 + 2) evolution equation to a linear second-order ordinary differential equation. Finally , we study two models of special interest, the Heston model and the Stein--Stein model.", "edit_actions": [{"type": "R", "before": "Black-Scholes-Merton model", "after": "Black--Scholes--Merton Model", "start_char_pos": 64, "end_char_pos": 90}, {"type": "R", "before": "\\%", "after": ",", "start_char_pos": 139, "end_char_pos": 141}, {"type": "R", "before": "the Orstein-Uhlenbeck", "after": "an Orstein--Uhlenbeck", "start_char_pos": 222, "end_char_pos": 243}, {"type": "A", "before": null, "after": ",", "start_char_pos": 264, "end_char_pos": 264}, {"type": "D", "before": ",", "after": null, "start_char_pos": 358, "end_char_pos": 359}, {"type": "R", "before": "on", "after": "upon", "start_char_pos": 401, "end_char_pos": 403}, {"type": "R", "before": "S", "after": ", S,", "start_char_pos": 465, "end_char_pos": 466}, {"type": "D", "before": ", which follow from the Orstein-Uhlenbeck process", "after": null, "start_char_pos": 489, "end_char_pos": 538}, {"type": "R", "before": "admits always two Lie symmetries, plus the", "after": "always admits two Lie point symmetries in addition to the automatic", "start_char_pos": 645, "end_char_pos": 687}, {"type": "R", "before": "infinity", "after": "infinite", "start_char_pos": 712, "end_char_pos": 720}, {"type": "A", "before": null, "after": ",", "start_char_pos": 760, "end_char_pos": 760}, {"type": "R", "before": "since", "after": "as", "start_char_pos": 791, "end_char_pos": 796}, {"type": "R", "before": "on", "after": "upon", "start_char_pos": 829, "end_char_pos": 831}, {"type": "R", "before": "Black-Scholes-Merton equation", "after": "Black--Scholes--Merton Equation", "start_char_pos": 939, "end_char_pos": 968}, {"type": "R", "before": "symmetries, plus", "after": "point symmetries in addition to", "start_char_pos": 997, "end_char_pos": 1013}, {"type": "R", "before": "infinity", "after": "infinite", "start_char_pos": 1042, "end_char_pos": 1050}, {"type": "R", "before": "Furthermore we apply the zero-order", "after": "We apply the zeroth-order", "start_char_pos": 1082, "end_char_pos": 1117}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1261, "end_char_pos": 1261}, {"type": "R", "before": "Stein-Stein", "after": "Stein--Stein", "start_char_pos": 1328, "end_char_pos": 1339}], "sents_char_pos": [0, 249, 540, 751, 1081, 1252]}
+{"doc_id": "1509.08409", "revision_depth": "1", "before_revision": "The study of network structure has URLanizational principles in complex systems. However, there is also a need to understand how to control them; for example, to revert a diseased cell to a healthy state, or a mature cell to a pluripotent state. Two recent methodologies suggest that the controllability of complex multivariate systems can be predicted solely from the graph of interactions between variables, without considering variable dynamics: structural controllability and minimum dominating sets. Both methodologies utilize idealized assumptions about multivariate dynamics, yet most accurate models of real-world systems do not abide by these assumptions. Here, we study the relationship between network structure and the control of multivariate dynamics using three distinct measures of controllability in Boolean Networks. We demonstrate that structure-only methods fail to properly characterize controllability in these nonlinear systems; even in very simple networks, a large variation of possible dynamics can occur for the same structure, each with different control profiles. Our methodology is also used to characterize critical control variables in three models of biochemical regulation: the Drosophila melanogaster single-cell segment polarity network , the eukaryotic cell cycle of budding yeast Saccharomyces cerevisiae, and the URLan arrangement in Arabidopsis thaliana. Structure-only methods both undershoot and overshoot the number and which sets of variables actually control these models, highlighting the importance of the system dynamics in determining control. Our analysis further shows that the logic of automata transition functions, namely how canalizing they are, plays a role in the extent to which structure predicts dynamics.", "after_revision": "The study of network structure has uncovered signatures of URLanization of complex systems. However, there is also a need to understand how to control them; for example, identifying strategies to revert a diseased cell to a healthy state, or a mature cell to a pluripotent state. Two recent methodologies suggest that the controllability of complex systems can be predicted solely from the graph of interactions between variables, without considering their dynamics: structural controllability and minimum dominating sets. We demonstrate that such structure-only methods fail to characterize controllability when dynamics are introduced. We study Boolean network ensembles of network motifs as well as three models of biochemical regulation: the segment polarity network in Drosophila melanogaster, the cell cycle of budding yeast Saccharomyces cerevisiae, and the URLan arrangement in Arabidopsis thaliana. We demonstrate that structure-only methods both undershoot and overshoot the number and which sets of critical variables best control the dynamics of these models, highlighting the importance of the actual system dynamics in determining control. Our analysis further shows that the logic of automata transition functions, namely how canalizing they are, plays an important role in the extent to which structure predicts dynamics.", "edit_actions": [{"type": "R", "before": "URLanizational principles in", "after": "uncovered signatures of URLanization of", "start_char_pos": 35, "end_char_pos": 63}, {"type": "A", "before": null, "after": "identifying strategies", "start_char_pos": 159, "end_char_pos": 159}, {"type": "D", "before": "multivariate", "after": null, "start_char_pos": 316, "end_char_pos": 328}, {"type": "R", "before": "variable", "after": "their", "start_char_pos": 431, "end_char_pos": 439}, {"type": "D", "before": "Both methodologies utilize idealized assumptions about multivariate dynamics, yet most accurate models of real-world systems do not abide by these assumptions. Here, we study the relationship between network structure and the control of multivariate dynamics using three distinct measures of controllability in Boolean Networks.", "after": null, "start_char_pos": 506, "end_char_pos": 834}, {"type": "A", "before": null, "after": "such", "start_char_pos": 855, "end_char_pos": 855}, {"type": "R", "before": "properly characterize controllability in these nonlinear systems; even in very simple networks, a large variation of possible dynamics can occur for the same structure, each with different control profiles. Our methodology is also used to characterize critical control variables in", "after": "characterize controllability when dynamics are introduced. We study Boolean network ensembles of network motifs as well as", "start_char_pos": 887, "end_char_pos": 1168}, {"type": "D", "before": "Drosophila melanogaster single-cell", "after": null, "start_char_pos": 1213, "end_char_pos": 1248}, {"type": "R", "before": ", the eukaryotic", "after": "in Drosophila melanogaster, the", "start_char_pos": 1274, "end_char_pos": 1290}, {"type": "R", "before": "Structure-only", "after": "We demonstrate that structure-only", "start_char_pos": 1396, "end_char_pos": 1410}, {"type": "R", "before": "variables actually control", "after": "critical variables best control the dynamics of", "start_char_pos": 1478, "end_char_pos": 1504}, {"type": "A", "before": null, "after": "actual", "start_char_pos": 1554, "end_char_pos": 1554}, {"type": "R", "before": "a", "after": "an important", "start_char_pos": 1709, "end_char_pos": 1710}], "sents_char_pos": [0, 80, 145, 246, 505, 665, 834, 952, 1093, 1395, 1594]}
+{"doc_id": "1510.04165", "revision_depth": "1", "before_revision": "Energy efficiency significantly influences user experience of battery-driven devices such as smartphones and tablets. The goal of an energy model of source code is to lay a foundation for energy-saving techniques from architecture to software development. The challenge is linking hardware energy consumption to the high-level application source code, considering the complex run-time context , such as thread scheduling, user inputs and the abstraction of the virtual machine. Traditional energy modeling is bottom-to-top, but this approach faces obstacles when software consists of a number of abstract layers. In this paper, we propose a top-to-bottom view. We focus on identifying valuable information from the source code, which results in the idea of utilizing an intermediate representation, \"energy operation \" , to capture the energy characteristics. The experiment results show that the energy model at such a high-level can reduce the error margin to within 10\\% and enable energy breakdown at function-level, which helps developers understand the energy-related features of the code .", "after_revision": "Energy efficiency has a significant influence on user experience of battery-driven devices such as smartphones and tablets. The goal of an energy model for source code is to lay a foundation for the application of energy-saving techniques during software development. The challenge is to relate hardware energy consumption to high-level application code, considering the complex run-time context and software stack. Traditional techniques build the energy model by mapping a hardware energy model onto software constructs; this approach faces obstacles when the software stack consists of a number of abstract layers. Another approach that has been followed is to utilize hardware or operating system features to estimate software energy information at a coarse level of granularity such as blocks, methods or even applications. In this paper, we explain how to construct a fine-grained energy model for the source code, which is based on \"energy operations \" identified directly from the source code and able to provide more valuable information for code optimization. We apply the approach to a class of applications based on a game-engine, and explain the wider applicability of the method .", "edit_actions": [{"type": "R", "before": "significantly influences", "after": "has a significant influence on", "start_char_pos": 18, "end_char_pos": 42}, {"type": "R", "before": "of", "after": "for", "start_char_pos": 146, "end_char_pos": 148}, {"type": "A", "before": null, "after": "the application of", "start_char_pos": 188, "end_char_pos": 188}, {"type": "R", "before": "from architecture to", "after": "during", "start_char_pos": 214, "end_char_pos": 234}, {"type": "R", "before": "linking", "after": "to relate", "start_char_pos": 274, "end_char_pos": 281}, {"type": "D", "before": "the", "after": null, "start_char_pos": 313, "end_char_pos": 316}, {"type": "D", "before": "source", "after": null, "start_char_pos": 340, "end_char_pos": 346}, {"type": "R", "before": ", such as thread scheduling, user inputs and the abstraction of the virtual machine. Traditional energy modeling is bottom-to-top, but", "after": "and software stack. Traditional techniques build the energy model by mapping a hardware energy model onto software constructs;", "start_char_pos": 394, "end_char_pos": 528}, {"type": "R", "before": "software", "after": "the software stack", "start_char_pos": 564, "end_char_pos": 572}, {"type": "A", "before": null, "after": "Another approach that has been followed is to utilize hardware or operating system features to estimate software energy information at a coarse level of granularity such as blocks, methods or even applications.", "start_char_pos": 614, "end_char_pos": 614}, {"type": "R", "before": "propose a top-to-bottom view. We focus on identifying valuable information from", "after": "explain how to construct a fine-grained energy model for", "start_char_pos": 633, "end_char_pos": 712}, {"type": "R", "before": "results in the idea of utilizing an intermediate representation,", "after": "is based on", "start_char_pos": 736, "end_char_pos": 800}, {"type": "R", "before": "operation", "after": "operations", "start_char_pos": 809, "end_char_pos": 818}, {"type": "R", "before": ", to capture the energy characteristics. The experiment results show that the energy model at such a high-level can reduce the error margin to within 10\\% and enable energy breakdown at function-level, which helps developers understand the energy-related features of the code", "after": "identified directly from the source code and able to provide more valuable information for code optimization. We apply the approach to a class of applications based on a game-engine, and explain the wider applicability of the method", "start_char_pos": 821, "end_char_pos": 1096}], "sents_char_pos": [0, 117, 256, 478, 613, 662, 861]}
+{"doc_id": "1510.05858", "revision_depth": "2", "before_revision": "This paper considers a market model with two levels of information. The public information generated by the financial assets, and a larger flow of information containing additional knowledge about a death time(random time /horizon) of an insured. By expanding the filtration, the death uncertainty and its entailed risk are fully considered without any mathematical restriction. In this context , which catches real features such as correlation between the market model and the time of death, we address the risk-minimization problem \\`a la F\\\"ollmer-Sondermann for a large class of equity-linked mortality contracts. The challenge in this setting, when no modelspecification for these securities nor for the death timeis given, lies in finding the dynamics and the structures for the mortality / longevity securities used in the securitization. To overcome this obstacle, we elaborate our optional martingale representation results, which state that any local martingale in the large filtration stopped at the death time can be decomposed into several and precise orthogonal local martingales . This constitutes our first principal novel contribution. Thanks to this optional representation, we succeed to decompose the risk in some popular mortality and/or longevity securities into the sum of orthogonal risks using a risk basis. One of the components of this basis is a new martingale, in the large filtration, that possesses nice features. Hence, the dynamics of mortality and longevity securities used in the securitization is described without mortality specification, and this constitutes our second novel contribution. Our third main contribution resides in finding explicitly the risk-minimization strategy as well as the corresponding undiversified risk for a largest class of mortality/longevity linked liabilities with or without the mortality securitization .", "after_revision": "We consider a market model where there are two levels of information. The public information generated by the financial assets, and a larger flow of information that contains additional knowledge about a random time. This random time can represent many economic and financial settings, such as the default time of a firm for credit risk, and the death time of an insured for life insurance. By using the expansion of filtration, the random time uncertainty and its entailed risk are fully considered without any mathematical restriction. In this context with no model's specification for the random time, the main challenge lies in finding the dynamics and the structures for the value processes of defaultable or mortality and / or longevity securities which are vital for the insurance securitization. To overcome this obstacle, we elaborate our optional martingale representation results, which state that any martingale in the large filtration stopped at the random time can be decomposed into precise and unique orthogonal local martingales (i.e. local martingales whose product remains a local martingale). This constitutes our first and probably the principal contribution. Even though the driving motivation for this representation resides in credit risk theory, our results are applicable to several other financial and economics contexts, such as life insurance and financial markets with random horizon. Thanks to this optional representation, we decompose any defaultable or mortality and/or longevity liability into the sum of \"non-correlated\" risks using a risk basis. This constitutes our second contribution .", "edit_actions": [{"type": "R", "before": "This paper considers", "after": "We consider", "start_char_pos": 0, "end_char_pos": 20}, {"type": "R", "before": "with", "after": "where there are", "start_char_pos": 36, "end_char_pos": 40}, {"type": "R", "before": "containing", "after": "that contains", "start_char_pos": 159, "end_char_pos": 169}, {"type": "R", "before": "death time(random time /horizon) of an insured. By expanding the", "after": "random time. This random time can represent many economic and financial settings, such as the default time of a firm for credit risk, and the death time of an insured for life insurance. By using the expansion of", "start_char_pos": 199, "end_char_pos": 263}, {"type": "R", "before": "death", "after": "random time", "start_char_pos": 280, "end_char_pos": 285}, {"type": "R", "before": ", which catches real features such as correlation between the market model and the time of death, we address the risk-minimization problem \\`a la F\\\"ollmer-Sondermann for a large class of equity-linked mortality contracts. The challenge in this setting, when no modelspecification for these securities nor for the death timeis given,", "after": "with no model's specification for the random time, the main challenge", "start_char_pos": 395, "end_char_pos": 728}, {"type": "R", "before": "mortality", "after": "value processes of defaultable or mortality and", "start_char_pos": 785, "end_char_pos": 794}, {"type": "R", "before": "longevity securities used in the", "after": "or longevity securities which are vital for the insurance", "start_char_pos": 797, "end_char_pos": 829}, {"type": "D", "before": "local", "after": null, "start_char_pos": 955, "end_char_pos": 960}, {"type": "R", "before": "death", "after": "random", "start_char_pos": 1011, "end_char_pos": 1016}, {"type": "R", "before": "several and precise", "after": "precise and unique", "start_char_pos": 1045, "end_char_pos": 1064}, {"type": "R", "before": ".", "after": "(i.e. local martingales whose product remains a local martingale).", "start_char_pos": 1094, "end_char_pos": 1095}, {"type": "R", "before": "principal novel contribution.", "after": "and probably the principal contribution. Even though the driving motivation for this representation resides in credit risk theory, our results are applicable to several other financial and economics contexts, such as life insurance and financial markets with random horizon.", "start_char_pos": 1123, "end_char_pos": 1152}, {"type": "R", "before": "succeed to decompose the risk in some popular", "after": "decompose any defaultable or", "start_char_pos": 1196, "end_char_pos": 1241}, {"type": "R", "before": "securities", "after": "liability", "start_char_pos": 1269, "end_char_pos": 1279}, {"type": "R", "before": "orthogonal", "after": "\"non-correlated\"", "start_char_pos": 1296, "end_char_pos": 1306}, {"type": "R", "before": "One of the components of this basis is a new martingale, in the large filtration, that possesses nice features. Hence, the dynamics of mortality and longevity securities used in the securitization is described without mortality specification, and this", "after": "This", "start_char_pos": 1333, "end_char_pos": 1584}, {"type": "R", "before": "novel contribution. Our third main contribution resides in finding explicitly the risk-minimization strategy as well as the corresponding undiversified risk for a largest class of mortality/longevity linked liabilities with or without the mortality securitization", "after": "contribution", "start_char_pos": 1608, "end_char_pos": 1871}], "sents_char_pos": [0, 67, 246, 378, 617, 845, 1095, 1152, 1332, 1444, 1627]}
+{"doc_id": "1511.01667", "revision_depth": "2", "before_revision": "Classical molecular dynamics (MD) simulations, within the AMBER program package that runs entirely on a CUDA-enabled NVIDIA graphic processing unit (GPU), were employed to study the dynamics of the methane-thiosulfonate spin labelled (MTSL) Aurora-A kinase activation loop in a very short time and with good quality of the sampling. The MD simulation provided a wealth of information on the interactions between MTSL and protein residues, and on the different motional contributions to the overall dynamics of the MTSL that were validated using a multifrequency electron paramagnetic resonance (EPR) approach. The latter relayed on the frequency dependence of the resolution of the fast and slow motions of the spin probe and was used to distinguish the fast internal motion of the spin label from the slow protein tumbling. Data obtained from MD were in good agreement with those obtained from quantum mechanical (QM) methods, but more interactions within the dynamics of the system were revealed than from QM. A strong correlation between the tumbling of the protein and the transitions of the X4 dihedral angle of the MTSL was observed with a consequent effect on the distribution of the nitroxide (NO) group in space and time . The theoretical EPR spectra were calculated using selected configurations of MTSL probing different micro-environments of the protein characterized by different polarity. The comparison between the theoretical and experimental 9 GHz and 94 GHz EPR spectra revealed that some fits were in good agreement with the experimental EPR spectra, indicating a predominance of some conformational states of the full spin-labelled system. This work is a starting point for deeper experimental and theoretical studies of the diffusion properties of the Aurora-A kinase protein related to its overall tumbling and biological activity .", "after_revision": "Classical molecular dynamics (MD) simulations, within the AMBER program package that runs entirely on a CUDA-enabled NVIDIA graphic processing unit (GPU), were employed to study with low computational cost and good quality of the sampling the dynamics of the methane-thiosulfonate spin label (MTSL) attached to the activation loop of the Aurora-A kinase. MD provided a wealth of information about the timescale of the different motional contributions to the overall dynamics of the spin label. These data were validated by multi-frequency continuous-wave electron paramagnetic resonance (EPR) measurements, that relying on the frequency dependence of the fast and slow motions of the spin probe were used to distinguish the fast internal motion of the spin label from slow protein tumbling. It was found that the activation loop oscillated between two conformational states separated by 7 Angstrom and the average structures obtained from the MD trajectories showed the MTSL exposed to the solvent and probing the C-lobe of the protein . The theoretical 9 and 94 GHz EPR spectra were calculated using configurations representing the interactions between MTSL and water and the tyrosine residue 208 in the C-lobe; and the comparison with experimental EPR spectra revealed that fits successfully reproduced the experimental spectra in agreement with the MD results .", "edit_actions": [{"type": "R", "before": "the", "after": "with low computational cost and good quality of the sampling the", "start_char_pos": 178, "end_char_pos": 181}, {"type": "R", "before": "labelled", "after": "label", "start_char_pos": 225, "end_char_pos": 233}, {"type": "A", "before": null, "after": "attached to the activation loop of the", "start_char_pos": 241, "end_char_pos": 241}, {"type": "R", "before": "kinase activation loop in a very short time and with good quality of the sampling. The MD simulation", "after": "kinase. MD", "start_char_pos": 251, "end_char_pos": 351}, {"type": "R", "before": "on the interactions between MTSL and protein residues, and on", "after": "about the timescale of", "start_char_pos": 385, "end_char_pos": 446}, {"type": "R", "before": "MTSL that were validated using a multifrequency", "after": "spin label. These data were validated by multi-frequency continuous-wave", "start_char_pos": 515, "end_char_pos": 562}, {"type": "R", "before": "approach. The latter relayed", "after": "measurements, that relying", "start_char_pos": 601, "end_char_pos": 629}, {"type": "D", "before": "resolution of the", "after": null, "start_char_pos": 665, "end_char_pos": 682}, {"type": "R", "before": "and was", "after": "were", "start_char_pos": 723, "end_char_pos": 730}, {"type": "D", "before": "the", "after": null, "start_char_pos": 799, "end_char_pos": 802}, {"type": "R", "before": "Data obtained from MD were in good agreement with those obtained from quantum mechanical (QM) methods, but more interactions within the dynamics of the system were revealed than from QM. A strong correlation between the tumbling of the protein and the transitions of the X4 dihedral angle of the MTSL was observed with a consequent effect on the distribution of the nitroxide (NO) group in space and time", "after": "It was found that the activation loop oscillated between two conformational states separated by 7 Angstrom and the average structures obtained from the MD trajectories showed the MTSL exposed to the solvent and probing the C-lobe of the protein", "start_char_pos": 826, "end_char_pos": 1230}, {"type": "A", "before": null, "after": "9 and 94 GHz", "start_char_pos": 1249, "end_char_pos": 1249}, {"type": "R", "before": "selected configurations of MTSL probing different micro-environments of the protein characterized by different polarity. The comparison between the theoretical and experimental 9 GHz and 94 GHz", "after": "configurations representing the interactions between MTSL and water and the tyrosine residue 208 in the C-lobe; and the comparison with experimental", "start_char_pos": 1284, "end_char_pos": 1477}, {"type": "R", "before": "some fits were in good", "after": "fits successfully reproduced the experimental spectra in", "start_char_pos": 1504, "end_char_pos": 1526}, {"type": "R", "before": "experimental EPR spectra, indicating a predominance of some conformational states of the full spin-labelled system. This work is a starting point for deeper experimental and theoretical studies of the diffusion properties of the Aurora-A kinase protein related to its overall tumbling and biological activity", "after": "MD results", "start_char_pos": 1546, "end_char_pos": 1854}], "sents_char_pos": [0, 333, 610, 825, 1012, 1232, 1404, 1661]}
+{"doc_id": "1511.09041", "revision_depth": "1", "before_revision": "We study pricing and superhedging strategies for game options in an imperfect market with default. We extend the results obtained by Kifer Kifer in the case of a perfect market model to the case of imperfections on the market taken into account via the nonlinearity of the wealth dynamics. In this framework, the pricing system is expressed as a nonlinear g-expectation/evaluation induced by a nonlinear BSDE with jump. We prove that the superhedging price of a game option{\\em { coincides with the value function of a corresponding {\\em generalized} Dynkin game expressed in terms of the g-evaluation , recently introduced in DQS2 . We then address the case of ambiguity on the model, - for example an ambiguity on the default probability - , and characterize the superhedging price of a game option as the value function of a {\\em mixed generalized} Dynkin game. We prove the existence of a cancellation time and a trading strategy for the seller which allow him/her to be super-hedged, whatever the model is . This study is introduced by the analysis of the simpler case of American options .", "after_revision": "We study pricing and superhedging strategies for game options in an imperfect market with default. We extend the results obtained by Kifer in Kifer in the case of a perfect market model to the case of an imperfect market with default, when the imperfections are taken into account via the nonlinearity of the wealth dynamics. We introduce the{\\em seller's price of the game option as the infimum of the initial wealths which allow the seller to be superhedged. We{prove that this price coincides with the value function of an associated {\\em generalized} Dynkin game , recently introduced in DQS2 , expressed with a nonlinear expectation induced by a nonlinear BSDE with default jump. We moreover study the existence of superhedging strategies. We then address the case of ambiguity on the model, - for example ambiguity on the default probability - and characterize the robust seller's price of a game option as the value function of a {\\em mixed generalized} Dynkin game. We study the existence of a cancellation time and a trading strategy which allow the seller to be super-hedged, whatever the model is .", "edit_actions": [{"type": "A", "before": null, "after": "in", "start_char_pos": 139, "end_char_pos": 139}, {"type": "R", "before": "imperfections on the market", "after": "an imperfect market with default, when the imperfections are", "start_char_pos": 199, "end_char_pos": 226}, {"type": "R", "before": "In this framework, the pricing system is expressed as a nonlinear g-expectation/evaluation induced by a nonlinear BSDE with jump. We prove that the superhedging price of a game option", "after": "We introduce the", "start_char_pos": 291, "end_char_pos": 474}, {"type": "A", "before": null, "after": "seller's price", "start_char_pos": 479, "end_char_pos": 479}, {"type": "A", "before": null, "after": "of the game option as the infimum of the initial wealths which allow the seller to be superhedged. We", "start_char_pos": 480, "end_char_pos": 480}, {"type": "A", "before": null, "after": "prove", "start_char_pos": 481, "end_char_pos": 481}, {"type": "A", "before": null, "after": "that this price", "start_char_pos": 482, "end_char_pos": 482}, {"type": "R", "before": "a corresponding", "after": "an associated", "start_char_pos": 520, "end_char_pos": 535}, {"type": "D", "before": "expressed in terms of the g-evaluation", "after": null, "start_char_pos": 566, "end_char_pos": 604}, {"type": "R", "before": ". We", "after": ", expressed with a nonlinear expectation induced by a nonlinear BSDE with default jump. We moreover study the existence of superhedging strategies. We", "start_char_pos": 635, "end_char_pos": 639}, {"type": "D", "before": "an", "after": null, "start_char_pos": 703, "end_char_pos": 705}, {"type": "D", "before": ",", "after": null, "start_char_pos": 745, "end_char_pos": 746}, {"type": "R", "before": "superhedging", "after": "robust seller's", "start_char_pos": 768, "end_char_pos": 780}, {"type": "R", "before": "prove", "after": "study", "start_char_pos": 871, "end_char_pos": 876}, {"type": "R", "before": "for the seller which allow him/her", "after": "which allow the seller", "start_char_pos": 937, "end_char_pos": 971}, {"type": "D", "before": ". This study is introduced by the analysis of the simpler case of American options", "after": null, "start_char_pos": 1014, "end_char_pos": 1096}], "sents_char_pos": [0, 98, 290, 420, 867, 1015]}
+{"doc_id": "1512.08085", "revision_depth": "1", "before_revision": "The origin of multicellularity is a fundamental open question in biology. For URLanisms to evolve from an aggregate of URLanisms, cells with an identical genotype must first differentiate into several types. Second, this aggregate of distinct cell types should show better growth than that of an isolated cell in the environment . Third, this cell aggregate should show robustness in the number distribution of differentiated cell types. To reveal how an ensemble of primitive cells achieves these conditions, we developed a dynamical-systems model of cells consisting of chemical components with intracellular catalytic reaction dynamics. The reactions convert external nutrients to internal components for cellular growth, and the divided cells interact through chemical diffusion. We found that cells sharing an identical catalytic network spontaneously differentiate induced by cell-cell interactions, and then achieve cooperative division of labor, the mutual use of products among differentiated cell types, enabling a higher growth rate than that in the unicellular case. This symbiotic differentiation emerged for a class of reaction networks under the condition of nutrient limitation and strong cell-cell interactions. Then, robustness in the cell type distribution was achieved, while instability of collective growth sometimes emerged even among the cooperative cells when the internal reserves of chemical products is dominant. The simplicity and generality of the present mechanism suggests that evolution to multicellularity is a natural consequence of interacting cells with limited resources, being consistent with the behaviors and forms of several extant primitive forms of multicellularity, such as certain bacteria .", "after_revision": "As cells grow and divide under a given environment, they become crowded and resources are limited, as seen in bacterial biofilms and multicellular aggregates. These cells often show strong interactions through exchanging chemicals, as in quorum sensing, to achieve mutualism. Here, to achieve stable division of labor, three properties are required. First, isogenous cells differentiate into several types. Second, this aggregate of distinct cell types shows better growth than that of isolated cells, by achieving division of labor . Third, this cell aggregate is robust in the number distribution of differentiated cell types. We here address how cells acquire the ability of cell differentiation and division of labor simultaneously, which is also connected with the robustness of a cell society. For this purpose, we developed a dynamical-systems model of cells consisting of chemical components with intracellular catalytic reaction dynamics. The reactions convert external nutrients into internal components for cellular growth, and the divided cells interact via chemical diffusion. We found that cells sharing an identical catalytic network spontaneously differentiate via induction from cell-cell interactions, and then achieve division of labor, enabling a higher growth rate than that in the unicellular case. This symbiotic differentiation emerged for a class of reaction networks with limited resources and strong cell-cell interactions. Then, robustness in the cell type distribution was achieved, while instability of collective growth could emerge even among the cooperative cells when the internal reserves of products were dominant. The present mechanism is simple and general as a natural result of interacting cells with resource limitation, and is consistent with the observed behaviors and forms of several aggregates of URLanisms .", "edit_actions": [{"type": "R", "before": "The origin of multicellularity is a fundamental open question in biology. For URLanisms to evolve from an aggregate of URLanisms, cells with an identical genotype must first", "after": "As cells grow and divide under a given environment, they become crowded and resources are limited, as seen in bacterial biofilms and multicellular aggregates. These cells often show strong interactions through exchanging chemicals, as in quorum sensing, to achieve mutualism. Here, to achieve stable division of labor, three properties are required. First, isogenous cells", "start_char_pos": 0, "end_char_pos": 173}, {"type": "R", "before": "should show", "after": "shows", "start_char_pos": 254, "end_char_pos": 265}, {"type": "R", "before": "an isolated cell in the environment", "after": "isolated cells, by achieving division of labor", "start_char_pos": 293, "end_char_pos": 328}, {"type": "R", "before": "should show robustness", "after": "is robust", "start_char_pos": 358, "end_char_pos": 380}, {"type": "R", "before": "To reveal how an ensemble of primitive cells achieves these conditions,", "after": "We here address how cells acquire the ability of cell differentiation and division of labor simultaneously, which is also connected with the robustness of a cell society. For this purpose,", "start_char_pos": 438, "end_char_pos": 509}, {"type": "R", "before": "to", "after": "into", "start_char_pos": 681, "end_char_pos": 683}, {"type": "R", "before": "through", "after": "via", "start_char_pos": 756, "end_char_pos": 763}, {"type": "R", "before": "induced by", "after": "via induction from", "start_char_pos": 871, "end_char_pos": 881}, {"type": "D", "before": "cooperative", "after": null, "start_char_pos": 923, "end_char_pos": 934}, {"type": "D", "before": "the mutual use of products among differentiated cell types,", "after": null, "start_char_pos": 954, "end_char_pos": 1013}, {"type": "R", "before": "under the condition of nutrient limitation", "after": "with limited resources", "start_char_pos": 1151, "end_char_pos": 1193}, {"type": "R", "before": "sometimes emerged", "after": "could emerge", "start_char_pos": 1329, "end_char_pos": 1346}, {"type": "R", "before": "chemical products is", "after": "products were", "start_char_pos": 1410, "end_char_pos": 1430}, {"type": "R", "before": "simplicity and generality of the present mechanism suggests that evolution to multicellularity is a natural consequence", "after": "present mechanism is simple and general as a natural result", "start_char_pos": 1445, "end_char_pos": 1564}, {"type": "R", "before": "limited resources, being", "after": "resource limitation, and is", "start_char_pos": 1591, "end_char_pos": 1615}, {"type": "A", "before": null, "after": "observed", "start_char_pos": 1636, "end_char_pos": 1636}, {"type": "R", "before": "extant primitive forms of multicellularity, such as certain bacteria", "after": "aggregates of URLanisms", "start_char_pos": 1668, "end_char_pos": 1736}], "sents_char_pos": [0, 73, 207, 330, 437, 639, 783, 1078, 1228, 1440]}
+{"doc_id": "1601.04110", "revision_depth": "1", "before_revision": "On the basis of experimental data and mathematical equations in the literature, we remodel the ionic dynamics of smooth muscle cells (SMCs) as an eigensystem formulation, that is valid for investigating finite variations from equilibrium like in common experimental operations. This algorithm provides an alternate viewpoint on frequency-domain analysis and enables one to quantify the synchronizing timings among signaling pathways for rhythmical calcium oscillations . Numerical results show three types of calcium oscillations of SMCs in mesenteric arterioles: the spontaneous calcium oscillation, the agonist-dependent calcium oscillation, and the agonist-dependent calcium spike. For the noticeable agonist-dependent types in mesenteric SMCs, we demonstrate the flow of signaling pathways associated with intracellular calcium oscillationsand find the in-phase (out-phase) tendency among cation-cation (cation-anion), which implies the maximization of charge oscillations. For involving intercellular calcium dynamics in finite cell clusters, we observe the window-broadening of the oscillation-frequency spectrum under increasing cell numbers, which hence raises the possibility of synchronized oscillations for vasomotions. Our analyses indicate that the rhythm of SMC cluster could (1) correspond to significant enhancements of signal communications among remote cells, (2) respond to calcium sparks against transient stimulations for driving follow-up globally-oscillating modes, and (3) characterize the globally-oscillating modes via frog-leap (non-molecular-diffusion) calcium waves across inhomogeneous SMCs.", "after_revision": "On the basis of experimental data and mathematical equations in the literature, we remodel the ionic dynamics of smooth muscle cells (SMCs) as an eigensystem formulation, which is valid for investigating finite variations of variables from the equilibrium like in common experimental operations. This algorithm provides an alternate viewpoint from frequency-domain analysis and enables one to probe functionalities of SMC's rhythm by means of a resonance-related mechanism . Numerical results show three types of calcium oscillations of SMCs in mesenteric arterioles: spontaneous calcium oscillation, agonist-dependent calcium oscillation, and agonist-dependent calcium spike. For simple single and double SMCs, we demonstrate properties of synchronization among complex signals related to calcium oscillations, and show different correlation relations between calcium and voltage signals for various synchronization and resonance conditions. For practical cell clusters, our analyses indicate that the rhythm of SMCs could (1) benefit enhancements of signal communications among remote cells, (2) respond to a significant calcium peaking against transient stimulations for triggering globally-oscillating modes, and (3) characterize the globally-oscillating modes via frog-leap (non-molecular-diffusion) calcium waves across inhomogeneous SMCs.", "edit_actions": [{"type": "R", "before": "that", "after": "which", "start_char_pos": 171, "end_char_pos": 175}, {"type": "R", "before": "from", "after": "of variables from the", "start_char_pos": 221, "end_char_pos": 225}, {"type": "R", "before": "on", "after": "from", "start_char_pos": 325, "end_char_pos": 327}, {"type": "R", "before": "quantify the synchronizing timings among signaling pathways for rhythmical calcium oscillations", "after": "probe functionalities of SMC's rhythm by means of a resonance-related mechanism", "start_char_pos": 373, "end_char_pos": 468}, {"type": "D", "before": "the", "after": null, "start_char_pos": 564, "end_char_pos": 567}, {"type": "D", "before": "the", "after": null, "start_char_pos": 601, "end_char_pos": 604}, {"type": "D", "before": "the", "after": null, "start_char_pos": 648, "end_char_pos": 651}, {"type": "R", "before": "the noticeable agonist-dependent types in mesenteric", "after": "simple single and double", "start_char_pos": 689, "end_char_pos": 741}, {"type": "R", "before": "the flow of signaling pathways associated with intracellular calcium oscillationsand find the in-phase (out-phase) tendency among cation-cation (cation-anion), which implies the maximization of charge oscillations. For involving intercellular calcium dynamics in finite", "after": "properties of synchronization among complex signals related to calcium oscillations, and show different correlation relations between calcium and voltage signals for various synchronization and resonance conditions. For practical", "start_char_pos": 763, "end_char_pos": 1032}, {"type": "R", "before": "we observe the window-broadening of the oscillation-frequency spectrum under increasing cell numbers, which hence raises the possibility of synchronized oscillations for vasomotions. Our", "after": "our", "start_char_pos": 1048, "end_char_pos": 1234}, {"type": "R", "before": "SMC cluster", "after": "SMCs", "start_char_pos": 1272, "end_char_pos": 1283}, {"type": "R", "before": "correspond to significant", "after": "benefit", "start_char_pos": 1294, "end_char_pos": 1319}, {"type": "R", "before": "calcium sparks", "after": "a significant calcium peaking", "start_char_pos": 1393, "end_char_pos": 1407}, {"type": "R", "before": "driving follow-up", "after": "triggering", "start_char_pos": 1443, "end_char_pos": 1460}], "sents_char_pos": [0, 277, 684, 977, 1230]}
+{"doc_id": "1601.05506", "revision_depth": "1", "before_revision": "Diffusion-based network models are widely used for protein function prediction using protein network data , and have been shown to outperform neighborhood-based and module-based methods. Recent studies have shown that integrating the hierarchical structure of the Gene Ontology (GO) data dramatically improves prediction accuracy. However, previous methods usually used the GO hierarchy to refine the prediction results of multiple classifiers, or flattened the hierarchy into a function-function similarity kernels. Only rarely has the hierarchy been used as a second layer of the network connecting the protein network with functional annotations . We first construct a Bi-relational graph (Birg) model comprised of both protein-protein association and function-function hierarchical networks. We then propose two diffusion-based methods, BirgRank and AptRank, both of which use PageRank to diffuse information flows on this two-layer model. BirgRank is a direct application of traditional PageRank with fixed decay parameters. In contrast, AptRank uses an adaptive diffusion mechanism . We evaluate the ability of both methods to predict protein function on yeast, fly, and human protein datasets, and compare with four previous methods: GeneMANIA, TMC, ProteinRank and clusDCA. We find that both BirgRank and AptRank outperform the previous methods, especially when only 10\\% of the data are given for training. AptRank naturally combines protein-protein associations and function-function relationships into a two-layer network model , and takes full advantage of the hierarchical structure of the Gene Ontology, using directional diffusion without flattening the ontological hierarchy into a similarity kernel. Introducing an adaptive mechanism to the traditional, fixed-parameter model of PageRank greatly improves the accuracy of protein function prediction.", "after_revision": "Diffusion-based network models are widely used for protein function prediction using protein network data and have been shown to outperform neighborhood- and module-based methods. Recent studies have shown that integrating the hierarchical structure of the Gene Ontology (GO) data dramatically improves prediction accuracy. However, previous methods usually either used the GO hierarchy to refine the prediction results of multiple classifiers, or flattened the hierarchy into a function-function similarity kernel. No study has taken the GO hierarchy into account together with the protein network as a two-layer network model . We first construct a Bi-relational graph (Birg) model comprised of both protein-protein association and function-function hierarchical networks. We then propose two diffusion-based methods, BirgRank and AptRank, both of which use PageRank to diffuse information on this two-layer graph model. BirgRank is an application of traditional PageRank with fixed decay parameters. In contrast, AptRank uses an adaptive mechanism to improve the performance of BirgRank . We evaluate both methods in predicting protein function on yeast, fly, and human datasets, and compare with four previous methods: GeneMANIA, TMC, ProteinRank and clusDCA. We design three validation strategies: missing function prediction, de novo function prediction, and guided function prediction to comprehensively evaluate all six methods. We find that both BirgRank and AptRank outperform the others, especially in missing function prediction when using only 10\\% of the data for training. AptRank combines protein-protein associations and the GO function-function hierarchy into a two-layer network model without flattening the hierarchy into a similarity kernel. Introducing an adaptive mechanism to the traditional, fixed-parameter model of PageRank greatly improves the accuracy of protein function prediction.", "edit_actions": [{"type": "D", "before": ",", "after": null, "start_char_pos": 106, "end_char_pos": 107}, {"type": "R", "before": "neighborhood-based", "after": "neighborhood-", "start_char_pos": 142, "end_char_pos": 160}, {"type": "A", "before": null, "after": "either", "start_char_pos": 365, "end_char_pos": 365}, {"type": "R", "before": "kernels. Only rarely has the hierarchy been used as a second layer of the network connecting the protein network with functional annotations", "after": "kernel. No study has taken the GO hierarchy into account together with the protein network as a two-layer network model", "start_char_pos": 509, "end_char_pos": 649}, {"type": "D", "before": "flows", "after": null, "start_char_pos": 914, "end_char_pos": 919}, {"type": "A", "before": null, "after": "graph", "start_char_pos": 938, "end_char_pos": 938}, {"type": "R", "before": "a direct", "after": "an", "start_char_pos": 958, "end_char_pos": 966}, {"type": "R", "before": "diffusion mechanism", "after": "mechanism to improve the performance of BirgRank", "start_char_pos": 1070, "end_char_pos": 1089}, {"type": "R", "before": "the ability of both methods to predict", "after": "both methods in predicting", "start_char_pos": 1104, "end_char_pos": 1142}, {"type": "D", "before": "protein", "after": null, "start_char_pos": 1185, "end_char_pos": 1192}, {"type": "A", "before": null, "after": "design three validation strategies: missing function prediction, de novo function prediction, and guided function prediction to comprehensively evaluate all six methods. We", "start_char_pos": 1287, "end_char_pos": 1287}, {"type": "R", "before": "previous methods, especially when", "after": "others, especially in missing function prediction when using", "start_char_pos": 1339, "end_char_pos": 1372}, {"type": "D", "before": "are given", "after": null, "start_char_pos": 1395, "end_char_pos": 1404}, {"type": "D", "before": "naturally", "after": null, "start_char_pos": 1427, "end_char_pos": 1436}, {"type": "A", "before": null, "after": "the GO", "start_char_pos": 1479, "end_char_pos": 1479}, {"type": "R", "before": "relationships", "after": "hierarchy", "start_char_pos": 1498, "end_char_pos": 1511}, {"type": "D", "before": ", and takes full advantage of the hierarchical structure of the Gene Ontology, using directional diffusion", "after": null, "start_char_pos": 1543, "end_char_pos": 1649}, {"type": "D", "before": "ontological", "after": null, "start_char_pos": 1673, "end_char_pos": 1684}], "sents_char_pos": [0, 186, 330, 517, 651, 796, 945, 1031, 1091, 1283, 1418, 1720]}
+{"doc_id": "1603.07074", "revision_depth": "1", "before_revision": "Recently, based on the idea of randomizing space theory, random convex analysis has been being developed in order to deal with the corresponding problems in random environments such as analysis of conditional convex risk measures and the related variational problems and optimization problems. Random convex analysis is convex analysis over random locally convex modules. Since random locally convex modules have the more complicated topological and algebraic structures than ordinary locally convex spaces, establishing random convex analysis will encounter harder mathematical challenges than classical convex analysis so that there are still a lot of fundamentally important unsolved problems in random convex analysis. This paper is devoted to solving some important theoretic problems. First, we establish the inferior limit behavior of a proper lower semicontinuous L ^{0 function on a random locally convex module endowed with the locally L ^{0 topology, which makes perfect the Fenchel-Moreau duality theorem for such functions. Then, we investigate the relations among continuity, locally L ^{0 continuity and almost surely sequent continuity of a proper L ^{0 function. And then, we establish the elegant relationships among subdifferentiability, Gateaux-differentiability and Frechet-differentiability for a proper L ^{0 function defined on random normed modules. At last, based on the Ekeland's variational principle for a proper lower semicontinuous- \\bar{L} ^{0 function, we show that \\epsilon-subdifferentials can be approximated by subdifferentials. We would like to emphasize that the success of this paper lies in simultaneously considering the ( \\epsilon , \\lambda) -topology and the locally L ^{0 topology for a random locally convex module.", "after_revision": "Recently, based on the idea of randomizing space theory, random convex analysis has been being developed in order to deal with the corresponding problems in random environments such as analysis of conditional convex risk measures and the related variational problems and optimization problems. Random convex analysis is convex analysis over random locally convex modules. Since random locally convex modules have the more complicated topological and algebraic structures than ordinary locally convex spaces, establishing random convex analysis will encounter harder mathematical challenges than classical convex analysis so that there are still a lot of fundamentally important unsolved problems in random convex analysis. This paper is devoted to solving some important theoretic problems. First, we establish the inferior limit behavior of a proper lower semicontinuous L ^0--convex function on a random locally convex module endowed with the locally L ^0--convex topology, which makes perfect the Fenchel--Moreau duality theorem for such functions. Then, we investigate the relations among continuity, locally L ^0--Lipschitzian continuity and almost surely sequent continuity of a proper L ^0--convex function. And then, we establish the elegant relationships among subdifferentiability, G\\^ateaux--differentiability and Fr\\'ech\\'et--differentiability for a proper L ^0--convex function defined on random normed modules. At last, based on the Ekeland's variational principle for a proper lower semicontinuous \\bar{L} ^0--valued function, we show that \\varepsilon--subdifferentials can be approximated by subdifferentials. We would like to emphasize that the success of this paper lies in simultaneously considering the ( \\varepsilon , \\lambda) --topology and the locally L ^0--convex topology for a random locally convex module.", "edit_actions": [{"type": "R", "before": "^{0", "after": "^0--convex", "start_char_pos": 874, "end_char_pos": 877}, {"type": "R", "before": "^{0", "after": "^0--convex", "start_char_pos": 948, "end_char_pos": 951}, {"type": "R", "before": "Fenchel-Moreau", "after": "Fenchel--Moreau", "start_char_pos": 986, "end_char_pos": 1000}, {"type": "R", "before": "^{0", "after": "^0--Lipschitzian", "start_char_pos": 1100, "end_char_pos": 1103}, {"type": "R", "before": "^{0", "after": "^0--convex", "start_char_pos": 1166, "end_char_pos": 1169}, {"type": "R", "before": "Gateaux-differentiability and Frechet-differentiability", "after": "G\\^ateaux--differentiability and Fr\\'ech\\'et--differentiability", "start_char_pos": 1257, "end_char_pos": 1312}, {"type": "R", "before": "^{0", "after": "^0--convex", "start_char_pos": 1328, "end_char_pos": 1331}, {"type": "R", "before": "semicontinuous-", "after": "semicontinuous", "start_char_pos": 1448, "end_char_pos": 1463}, {"type": "R", "before": "^{0", "after": "^0--valued", "start_char_pos": 1472, "end_char_pos": 1475}, {"type": "R", "before": "\\epsilon-subdifferentials", "after": "\\varepsilon--subdifferentials", "start_char_pos": 1499, "end_char_pos": 1524}, {"type": "R", "before": "\\epsilon", "after": "\\varepsilon", "start_char_pos": 1665, "end_char_pos": 1673}, {"type": "R", "before": "-topology", "after": "--topology", "start_char_pos": 1685, "end_char_pos": 1694}, {"type": "R", "before": "^{0", "after": "^0--convex", "start_char_pos": 1713, "end_char_pos": 1716}], "sents_char_pos": [0, 293, 371, 722, 790, 1036, 1179, 1374, 1565]}
+{"doc_id": "1604.06131", "revision_depth": "1", "before_revision": "Several URLanisms, such as bacteria, algae, or spermatozoa, use flagellum or cilium activity to swim in a fluid . Many URLanisms use rather ample shape deformation, described as amoeboid, to propel themselves , either crawling on a substrate or swimming. Many eukaryotic cells were believed to require an underlying substratum to migrate (crawl) by using ample membrane deformation (like blebbing ). There is now an increasing evidence that a large variety of cells (including those of the immune system) can migrate without the assistance of focal adhesion, and can perform swimming as efficiently as crawling . This paper deals with a detailed analysis of amoeboid swimming in a confined fluid , by modeling the swimmer as an inextensible membrane deploying local active forces. The swimmer exhibits a rich behavior: it can settle into a straight trajectory in the channel , or can navigate from one wall to the other , depending on confinement. Furthermore, the nature of the swimmer is found to be affected by the confinement: the swimmer can behave as a pusher at low confinement, and becomes a puller at higher confinement , or vice versa; this shows that the swimmernature is not an intrinsic property. The scaling of the swimmer velocity V with the force amplitude A is analyzed in details and this shows that at small enough A, V\\sim A^2/\\eta^2, whereas at large enough A, V is independent of the force and is only fixed by the stroke cycle frequency and the swimmer size. This finding markedly contrasts with results known for swimming models referring to motion based on cilium and flagellum activity where V\\sim A/\\eta. Two types of efficiencies, put forward in the literature , are analyzed and it is found that the outcomes from each definition are quite distinct . We find that one type of efficiency has an optimum at a given confinement while the other has none . Future perspectives are outlined.", "after_revision": "Several URLanisms, such as bacteria, algae, or spermatozoa, use flagella or cilia to swim in a fluid , while many other URLanisms instead use ample shape deformation, described as amoeboid, to propel themselves by either crawling on a substrate or swimming. Many eukaryotic cells were believed to require an underlying substratum to migrate (crawl) by using membrane deformation (like blebbing or generation of lamellipodia) but there is now increasing evidence that a large variety of cells (including those of the immune system) can migrate without the assistance of focal adhesion, allowing them to swim as efficiently as they can crawl . This paper details the analysis of amoeboid swimming in a confined fluid by modeling the swimmer as an inextensible membrane deploying local active forces. The swimmer displays a rich behavior: it may settle into a straight trajectory in the channel or navigate from one wall to the other depending on its confinement. The nature of the swimmer is also found to be affected by confinement: the swimmer can behave , on the average over one swimming cycle, as a pusher at low confinement, and becomes a puller at higher confinement . The swimmer's nature is thus not an intrinsic property. The scaling of the swimmer velocity V with the force amplitude A is analyzed in detail showing that at small enough A, V\\sim A^2/\\eta^2, whereas at large enough A, V is independent of the force and is determined solely by the stroke frequency and swimmer size. This finding starkly contrasts with currently known results found from swimming models where motion is based on flagellar or ciliary activity, where V\\sim A/\\eta. To conclude, two definitions of efficiency as put forward in the literature are analyzed with distinct outcomes . We find that one type of efficiency has an optimum as a function of confinement while the other does not . Future perspectives are outlined.", "edit_actions": [{"type": "R", "before": "flagellum or cilium activity", "after": "flagella or cilia", "start_char_pos": 64, "end_char_pos": 92}, {"type": "R", "before": ". Many URLanisms use rather", "after": ", while many other URLanisms instead use", "start_char_pos": 112, "end_char_pos": 139}, {"type": "R", "before": ",", "after": "by", "start_char_pos": 209, "end_char_pos": 210}, {"type": "D", "before": "ample", "after": null, "start_char_pos": 355, "end_char_pos": 360}, {"type": "R", "before": "). There is now an", "after": "or generation of lamellipodia) but there is now", "start_char_pos": 397, "end_char_pos": 415}, {"type": "R", "before": "and can perform swimming", "after": "allowing them to swim", "start_char_pos": 559, "end_char_pos": 583}, {"type": "R", "before": "crawling", "after": "they can crawl", "start_char_pos": 602, "end_char_pos": 610}, {"type": "R", "before": "deals with a detailed", "after": "details the", "start_char_pos": 624, "end_char_pos": 645}, {"type": "D", "before": ",", "after": null, "start_char_pos": 696, "end_char_pos": 697}, {"type": "R", "before": "exhibits", "after": "displays", "start_char_pos": 793, "end_char_pos": 801}, {"type": "R", "before": "can", "after": "may", "start_char_pos": 822, "end_char_pos": 825}, {"type": "R", "before": ", or can", "after": "or", "start_char_pos": 875, "end_char_pos": 883}, {"type": "R", "before": ", depending on confinement. Furthermore, the", "after": "depending on its confinement. The", "start_char_pos": 920, "end_char_pos": 964}, {"type": "A", "before": null, "after": "also", "start_char_pos": 990, "end_char_pos": 990}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1015, "end_char_pos": 1018}, {"type": "A", "before": null, "after": ", on the average over one swimming cycle,", "start_char_pos": 1055, "end_char_pos": 1055}, {"type": "R", "before": ", or vice versa; this shows that the swimmernature is", "after": ". The swimmer's nature is thus", "start_char_pos": 1131, "end_char_pos": 1184}, {"type": "R", "before": "details and this shows", "after": "detail showing", "start_char_pos": 1292, "end_char_pos": 1314}, {"type": "R", "before": "only fixed", "after": "determined solely", "start_char_pos": 1421, "end_char_pos": 1431}, {"type": "R", "before": "cycle frequency and the", "after": "frequency and", "start_char_pos": 1446, "end_char_pos": 1469}, {"type": "R", "before": "markedly contrasts with results known for swimming models referring to motion based on cilium and flagellum activity", "after": "starkly contrasts with currently known results found from swimming models where motion is based on flagellar or ciliary activity,", "start_char_pos": 1497, "end_char_pos": 1613}, {"type": "R", "before": "Two types of efficiencies,", "after": "To conclude, two definitions of efficiency as", "start_char_pos": 1634, "end_char_pos": 1660}, {"type": "R", "before": ", are analyzed and it is found that the outcomes from each definition are quite distinct", "after": "are analyzed with distinct outcomes", "start_char_pos": 1691, "end_char_pos": 1779}, {"type": "R", "before": "at a given", "after": "as a function of", "start_char_pos": 1833, "end_char_pos": 1843}, {"type": "R", "before": "has none", "after": "does not", "start_char_pos": 1872, "end_char_pos": 1880}], "sents_char_pos": [0, 113, 254, 399, 612, 780, 947, 1147, 1211, 1483, 1633, 1781, 1882]}
+{"doc_id": "1605.02186", "revision_depth": "1", "before_revision": "Eukaryotic cells can detect the direction of a chemoattractant gradient precisely by generating intracellular gradients of signaling molecules that mirror the extracellular gradient ? an ability called directional sensing. Quantitative experiments have revealed two characteristic input-output relations of the system: First, in spatially-graded stimuli, the internal gradients of the signaling molecules at steady state reflect the relative steepness -- rather than the absolute concentration -- of the chemoattractant along the cell body. Second, upon a spatially homogeneous temporal increase in the chemoattractant concentration, the signaling molecule is transiently activated such that the response magnitude is determined by the ratio of the change in the input stimuli before and after the increase . However, the underlying mechanisms that endow the system with these response properties remain elusive. Here, by adopting a widely used modeling framework of directional sensing, i.e., local excitation and global inhibition (LEGI), we propose the hypothesis that the two scaling behaviors stem from a single design principle, namely, invariance of the governing equations to a scale transformation of the input level. Analyses of the LEGI-based model identify two different types of scale invariance , each of which is responsible for the two response properties. Our hypothesis leads to an experimentally testable prediction that a system with both types of invariance detects the relative steepness even in spatio-temporal gradient stimuli such as waves . Furthermore, we show that such behavior is independent of specific network topologies as long as the scale invariance holds, demonstrating the generic relationship between the scale invariance and the response properties .", "after_revision": "Eukaryotic cells respond to a chemoattractant gradient by forming intracellular gradients of signaling molecules that reflect the extracellular chemical gradient - an ability called directional sensing. Quantitative experiments have revealed two characteristic input-output relations of the system: First, in a static chemoattractant gradient, the shapes of the intracellular gradients of the signaling molecules are determined by the relative steepness , rather than the absolute concentration , of the chemoattractant gradient along the cell body. Second, upon a spatially homogeneous temporal increase in the input stimulus, the intracellular signaling molecules are transiently activated such that the response magnitudes are dependent on fold changes of the stimulus, not on absolute levels . However, the underlying mechanism that endows the system with these response properties remains elusive. Here, by adopting a widely used modeling framework of directional sensing, local excitation and global inhibition (LEGI), we propose a hypothesis that the two rescaling behaviors stem from a single design principle, namely, invariance of the governing equations to a scale transformation of the input level. Analyses of the LEGI-based model reveal that the invariance can be divided into two parts , each of which is responsible for the respective response properties. Our hypothesis leads to an experimentally testable prediction that a system with the invariance detects relative steepness even in dynamic gradient stimuli as well as in static gradients . Furthermore, we show that the relation between the response properties and the scale invariance is general in that it can be implemented by models with different network topologies .", "edit_actions": [{"type": "R", "before": "can detect the direction of", "after": "respond to", "start_char_pos": 17, "end_char_pos": 44}, {"type": "R", "before": "precisely by generating", "after": "by forming", "start_char_pos": 72, "end_char_pos": 95}, {"type": "R", "before": "mirror the extracellular gradient ?", "after": "reflect the extracellular chemical gradient -", "start_char_pos": 148, "end_char_pos": 183}, {"type": "R", "before": "spatially-graded stimuli, the internal", "after": "a static chemoattractant gradient, the shapes of the intracellular", "start_char_pos": 329, "end_char_pos": 367}, {"type": "R", "before": "at steady state reflect", "after": "are determined by", "start_char_pos": 405, "end_char_pos": 428}, {"type": "R", "before": "--", "after": ",", "start_char_pos": 452, "end_char_pos": 454}, {"type": "R", "before": "--", "after": ",", "start_char_pos": 494, "end_char_pos": 496}, {"type": "A", "before": null, "after": "gradient", "start_char_pos": 520, "end_char_pos": 520}, {"type": "R", "before": "chemoattractant concentration, the signaling molecule is", "after": "input stimulus, the intracellular signaling molecules are", "start_char_pos": 604, "end_char_pos": 660}, {"type": "R", "before": "magnitude is determined by the ratio of the change in the input stimuli before and after the increase", "after": "magnitudes are dependent on fold changes of the stimulus, not on absolute levels", "start_char_pos": 706, "end_char_pos": 807}, {"type": "R", "before": "mechanisms that endow", "after": "mechanism that endows", "start_char_pos": 834, "end_char_pos": 855}, {"type": "R", "before": "remain", "after": "remains", "start_char_pos": 898, "end_char_pos": 904}, {"type": "D", "before": "i.e.,", "after": null, "start_char_pos": 989, "end_char_pos": 994}, {"type": "R", "before": "the", "after": "a", "start_char_pos": 1053, "end_char_pos": 1056}, {"type": "R", "before": "scaling", "after": "rescaling", "start_char_pos": 1081, "end_char_pos": 1088}, {"type": "R", "before": "identify two different types of scale invariance", "after": "reveal that the invariance can be divided into two parts", "start_char_pos": 1261, "end_char_pos": 1309}, {"type": "R", "before": "two", "after": "respective", "start_char_pos": 1349, "end_char_pos": 1352}, {"type": "R", "before": "both types of invariance detects the", "after": "the invariance detects", "start_char_pos": 1455, "end_char_pos": 1491}, {"type": "R", "before": "spatio-temporal gradient stimuli such as waves", "after": "dynamic gradient stimuli as well as in static gradients", "start_char_pos": 1519, "end_char_pos": 1565}, {"type": "R", "before": "such behavior is independent of specific network topologies as long as the scale invariance holds, demonstrating the generic relationship between the scale invariance and the response properties", "after": "the relation between the response properties and the scale invariance is general in that it can be implemented by models with different network topologies", "start_char_pos": 1594, "end_char_pos": 1788}], "sents_char_pos": [0, 222, 541, 809, 913, 1227, 1373, 1567]}
+{"doc_id": "1607.02687", "revision_depth": "1", "before_revision": "It is necessary to thoroughly evaluate the safety of Automated Vehicles (AVs) before their release and deployment. Current evaluation approach mainly relies on i) testing AVs on public roads or ii) track testing with scenarios defined in a test matrix. These two methods have completely opposite drawbacks: the former takes too much time to execute but is realistic ; the latter can be finished in a short time but has no clear correlation to the safety benefits in the real world. To avoid the aforementioned problems, we propose the Accelerated Evaluationapproach focusing on the car-following scenario. The stochastic human-controlled vehicle (HV) motions were modeled based on 1.3 million miles of naturalistic driving data collected by the University of Michigan Safety Pilot Model Deployment Program. The statistics of the HV behaviors were modified to generate more intense interactions between HVs and AVs to accelerate the evaluation procedure. The Importance Sampling theory was used to ensure that the safety benefits of AVs are accurately assessed under accelerated tests. Crash, injury and conflict rates for a simulated AV are simulated to demonstrate the proposed approach. Results show that the test duration is reduced by a factor of 300 to 100,000 compared with the non-accelerated (naturalistic) evaluation. In other words, the proposed techniques have great potential to accelerate the AV evaluation process.", "after_revision": "The safety of Automated Vehicles (AVs) must be assured before their release and deployment. The current approach to evaluation relies primarily on ( i) testing AVs on public roads or ( ii) track testing with scenarios defined in a test matrix. These two methods have completely opposing drawbacks: the former , while offering realistic scenarios, takes too much time to execute ; the latter , though it can be completed in a short amount of time, has no clear correlation to safety benefits in the real world. To avoid the aforementioned problems, we propose Accelerated Evaluation, focusing on the car-following scenario. The stochastic human-controlled vehicle (HV) motions are modeled based on 1.3 million miles of naturalistic driving data collected by the University of Michigan Safety Pilot Model Deployment Program. The statistics of the HV behaviors are then modified to generate more intense interactions between HVs and AVs to accelerate the evaluation procedure. The Importance Sampling theory was used to ensure that the safety benefits of AVs are accurately assessed under accelerated tests. Crash, injury and conflict rates for a simulated AV are simulated to demonstrate the proposed approach. Results show that test duration is reduced by a factor of 300 to 100,000 compared with the non-accelerated (naturalistic) evaluation. In other words, the proposed techniques have great potential for accelerating the AV evaluation process.", "edit_actions": [{"type": "R", "before": "It is necessary to thoroughly evaluate the", "after": "The", "start_char_pos": 0, "end_char_pos": 42}, {"type": "A", "before": null, "after": "must be assured", "start_char_pos": 78, "end_char_pos": 78}, {"type": "R", "before": "Current evaluation approach mainly relies on", "after": "The current approach to evaluation relies primarily on (", "start_char_pos": 116, "end_char_pos": 160}, {"type": "A", "before": null, "after": "(", "start_char_pos": 195, "end_char_pos": 195}, {"type": "R", "before": "opposite", "after": "opposing", "start_char_pos": 289, "end_char_pos": 297}, {"type": "A", "before": null, "after": ", while offering realistic scenarios,", "start_char_pos": 320, "end_char_pos": 320}, {"type": "D", "before": "but is realistic", "after": null, "start_char_pos": 352, "end_char_pos": 368}, {"type": "R", "before": "can be finished", "after": ", though it can be completed", "start_char_pos": 382, "end_char_pos": 397}, {"type": "R", "before": "time but", "after": "amount of time,", "start_char_pos": 409, "end_char_pos": 417}, {"type": "D", "before": "the", "after": null, "start_char_pos": 446, "end_char_pos": 449}, {"type": "R", "before": "the Accelerated Evaluationapproach", "after": "Accelerated Evaluation,", "start_char_pos": 534, "end_char_pos": 568}, {"type": "R", "before": "were", "after": "are", "start_char_pos": 662, "end_char_pos": 666}, {"type": "R", "before": "were", "after": "are then", "start_char_pos": 845, "end_char_pos": 849}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1210, "end_char_pos": 1213}, {"type": "R", "before": "to accelerate", "after": "for accelerating", "start_char_pos": 1391, "end_char_pos": 1404}], "sents_char_pos": [0, 115, 254, 370, 484, 608, 809, 956, 1087, 1191, 1329]}
+{"doc_id": "1608.02191", "revision_depth": "1", "before_revision": "The increased deployment of wireless networks for battery-limited industrial applications in recent years highlights the need for tractable performance analysis and efficient QoS-aware transmit power management schemes. Modern industrial solutions deploy multi-hop topologies in order to bridge larger distances without necessarily shortening nodes' battery lifetime. This poses a significant challenge, as multi-hop analysis for heterogeneous wireless networks does not exist prior to our work. We overcome this challenge by extending a newly developed methodology based on (min,x) network calculus and provide a closed-form expression for the end-to-end delay violation probability over a cascade of heterogeneous buffered wireless fading channels. We further design model-based algorithms for power-minimization and network lifetime maximization which compute the optimal transmit power per node, along a QoS-constrained path. Our numerical study shows an overall transmit power savings of up to 95\\% when compared to a fixed power allocation . We also apply our algorithm to a realistic WirelessHART network setup and observe that link heterogeneity can significantly influence network lifetime when no efficient power management is applied. This work is especially useful for battery-powered wireless sensor nodes in QoS-constrained applications and offers a solid framework for network design and performance analysis of heterogeneous multi-hop wireless industrial networks.", "after_revision": "The noticeably increased deployment of wireless networks for battery-limited industrial applications in recent years highlights the need for tractable performance analysis methodologies as well as efficient QoS-aware transmit power management schemes. In this work, we seek to combine several important aspects of such networks, i.e., multi-hop connectivity, channel heterogeneity and the queuing effect, in order to address these needs. We design delay-bound-based algorithms for transmit power minimization and network lifetime maximization of multi-hop heterogeneous wireless networks using our previously developed stochastic network calculus approach for performance analysis of a cascade of buffered wireless fading channels. Our analysis shows an overall transmit power saving of up to 95\\% compared to a fixed power allocation scheme when using a service model in terms of the Shannon capacity limit. For a more realistic set-up, we evaluate the performance of the suggested algorithm in a WirelessHART network, which is a widely used communication standard for process automation and other industrial applications. We find that link heterogeneity can significantly reduce network lifetime when no efficient power management is applied. Moreover, we show, using extensive simulation study, that the proposed bound-based power allocation performs reasonably well compared to the real optimum, especially in the case of WirelessHART networks.", "edit_actions": [{"type": "A", "before": null, "after": "noticeably", "start_char_pos": 4, "end_char_pos": 4}, {"type": "R", "before": "and", "after": "methodologies as well as", "start_char_pos": 162, "end_char_pos": 165}, {"type": "R", "before": "Modern industrial solutions deploy", "after": "In this work, we seek to combine several important aspects of such networks, i.e.,", "start_char_pos": 221, "end_char_pos": 255}, {"type": "R", "before": "topologies", "after": "connectivity, channel heterogeneity and the queuing effect,", "start_char_pos": 266, "end_char_pos": 276}, {"type": "R", "before": "bridge larger distances without necessarily shortening nodes' battery lifetime. This poses a significant challenge, as", "after": "address these needs. We design delay-bound-based algorithms for transmit power minimization and network lifetime maximization of", "start_char_pos": 289, "end_char_pos": 407}, {"type": "D", "before": "analysis for", "after": null, "start_char_pos": 418, "end_char_pos": 430}, {"type": "R", "before": "does not exist prior to our work. We overcome this challenge by extending a newly developed methodology based on (min,x) network calculus and provide a closed-form expression for the end-to-end delay violation probability over", "after": "using our previously developed stochastic network calculus approach for performance analysis of", "start_char_pos": 463, "end_char_pos": 689}, {"type": "D", "before": "heterogeneous", "after": null, "start_char_pos": 703, "end_char_pos": 716}, {"type": "R", "before": "We further design model-based algorithms for power-minimization and network lifetime maximization which compute the optimal transmit power per node, along a QoS-constrained path. Our numerical study", "after": "Our analysis", "start_char_pos": 752, "end_char_pos": 950}, {"type": "R", "before": "savings", "after": "saving", "start_char_pos": 983, "end_char_pos": 990}, {"type": "D", "before": "when", "after": null, "start_char_pos": 1005, "end_char_pos": 1009}, {"type": "R", "before": ". We also apply our algorithm to a realistic WirelessHART network setup and observe", "after": "scheme when using a service model in terms of the Shannon capacity limit. For a more realistic set-up, we evaluate the performance of the suggested algorithm in a WirelessHART network, which is a widely used communication standard for process automation and other industrial applications. We find", "start_char_pos": 1047, "end_char_pos": 1130}, {"type": "R", "before": "influence", "after": "reduce", "start_char_pos": 1173, "end_char_pos": 1182}, {"type": "R", "before": "This work is especially useful for battery-powered wireless sensor nodes in QoS-constrained applications and offers a solid framework for network design and performance analysis of heterogeneous multi-hop wireless industrial", "after": "Moreover, we show, using extensive simulation study, that the proposed bound-based power allocation performs reasonably well compared to the real optimum, especially in the case of WirelessHART", "start_char_pos": 1247, "end_char_pos": 1471}], "sents_char_pos": [0, 220, 368, 496, 751, 930, 1048, 1246]}
+{"doc_id": "1610.00766", "revision_depth": "1", "before_revision": "When URLanelles are degraded by autophagy , typically some, but not all, of each URLanelle type are degraded. Autophagy selectivity must not only select the correct type URLanelle, but must discriminate between URLanelles of the same kind . In the context of peroxisomes, we use computational models to explore the hypothesis that physical clustering of autophagy receptor proteins on the surface of URLanelle provides an appropriate all-or-none signal for degradation. The pexophagy receptor proteins NBR1 and p62 are well characterized, though only NBR1 is essential for pexophagy (Deosaran%DIFDELCMD < {\\em %%% et al. , 2013). Extending earlier work by addressing the initial nucleation of NBR1 clusters on individual peroxisomes, we find that larger peroxisomes nucleate NBR1 clusters first and lose them due to competitive coarseninglast, resulting in significant size-selectivity favouring large peroxisomes. This effect can explain the increased catalase signal that results from experimental siRNA inhibition of p62. We also consider receptor cluster formation on individual peroxisomes with enhanced levels of ubiquitinand find that size-selectivity, but not cluster formation , is suppressed. Thus, our selectivity mechanism does not hinder selection of individual URLanelles via enhanced ubiquitination. NBR1 cluster formation provides a viable physical mechanism for all-or-none substrate selectivity in pexophagy .", "after_revision": "Selective autophagy must not only select the correct type URLanelle, but also must discriminate between URLanelles of the same kind so that some but not all of URLanelles are removed. We propose that physical clustering of autophagy receptor proteins on URLanelle surface can provide an appropriate all-or-none signal URLanelle degradation. We explore this proposal using a computational model restricted to peroxisomes and the relatively well characterized pexophagy receptor proteins NBR1 and p62 %DIFDELCMD < {\\em %%% . We find that larger peroxisomes nucleate NBR1 clusters first and lose them last through competitive coarsening. This results in significant size-selectivity that favors large peroxisomes, and can explain the increased catalase signal that results from siRNA inhibition of p62. Excess ubiquitin, resulting from URLanelles, suppresses size-selectivity but not cluster formation . Our proposed selectivity mechanism thus allows all URLanelles to be degraded, while otherwise selecting only a portion URLanelles for degradation .", "edit_actions": [{"type": "R", "before": "When URLanelles are degraded by autophagy , typically some, but not all, of each URLanelle type are degraded. Autophagy selectivity", "after": "Selective autophagy", "start_char_pos": 0, "end_char_pos": 131}, {"type": "A", "before": null, "after": "also", "start_char_pos": 185, "end_char_pos": 185}, {"type": "R", "before": ". In the context of peroxisomes, we use computational models to explore the hypothesis", "after": "so that some but not all of URLanelles are removed. We propose", "start_char_pos": 240, "end_char_pos": 326}, {"type": "R", "before": "the surface of URLanelle provides", "after": "URLanelle surface can provide", "start_char_pos": 386, "end_char_pos": 419}, {"type": "R", "before": "for degradation. The", "after": "URLanelle degradation. We explore this proposal using a computational model restricted to peroxisomes and the relatively well characterized", "start_char_pos": 454, "end_char_pos": 474}, {"type": "D", "before": "are well characterized, though only NBR1 is essential for pexophagy (Deosaran", "after": null, "start_char_pos": 516, "end_char_pos": 593}, {"type": "D", "before": "et al.", "after": null, "start_char_pos": 615, "end_char_pos": 621}, {"type": "R", "before": ", 2013). Extending earlier work by addressing the initial nucleation of NBR1 clusters on individual peroxisomes, we", "after": ". We", "start_char_pos": 622, "end_char_pos": 737}, {"type": "R", "before": "due to competitive coarseninglast, resulting", "after": "last through competitive coarsening. This results", "start_char_pos": 810, "end_char_pos": 854}, {"type": "R", "before": "favouring large peroxisomes. This effect", "after": "that favors large peroxisomes, and", "start_char_pos": 887, "end_char_pos": 927}, {"type": "D", "before": "experimental", "after": null, "start_char_pos": 988, "end_char_pos": 1000}, {"type": "R", "before": "We also consider receptor cluster formation on individual peroxisomes with enhanced levels of ubiquitinand find that size-selectivity,", "after": "Excess ubiquitin, resulting from URLanelles, suppresses size-selectivity", "start_char_pos": 1026, "end_char_pos": 1160}, {"type": "R", "before": ", is suppressed. Thus, our selectivity mechanism does not hinder selection of individual URLanelles via enhanced ubiquitination. NBR1 cluster formation provides a viable physical mechanism for all-or-none substrate selectivity in pexophagy", "after": ". Our proposed selectivity mechanism thus allows all URLanelles to be degraded, while otherwise selecting only a portion URLanelles for degradation", "start_char_pos": 1187, "end_char_pos": 1426}], "sents_char_pos": [0, 109, 241, 470, 630, 915, 1025, 1203, 1315]}
+{"doc_id": "1610.04835", "revision_depth": "1", "before_revision": "A microtubule (MT) is a tubular stiff filament formed by a URLanization of tubulin proteins. We develop a stochastic kinetic model for studying the strength and stability of a pre-formed attachment of a MT with a rigid wall where the MT is tethered to the wall by a group of motor proteins. Such an attachment , formed by the specific interactions between the MT and the motors, is an analog of ligand-receptor bonds , the MT and the motors anchored on the wall being the counterparts of the ligand and receptors, respectively. However, unlike other ligands, the length of a MT can change with time because of its polymerization-depolymerization kinetics . The simple model developed here is motivated by the MTs linked to the cell cortex by dynein motors . We present the theory for both force-ramp and force-clamp conditions. In the force-ramp protocol we investigate the strength of the attachment by assuming imposition of a time-dependent external load tension that increases linearly with time till the attachment gets ruptured, we calculate the distribution of the rupture forces that fluctuates from one loading to another. In the force-clamp protocol, to test the stability, we compute the distribution of the lifetimes of the attachments under externally applied time-independent load tension, the results establish the MT-wall attachment to be an analog of a slip-bond .", "after_revision": " We develop a stochastic kinetic model of a pre-formed attachment of a mictrotuble (MT) with a cell cortex, in which the MT is tethered to the cell by a group of active motor proteins. Such an attachment is a particularly unique case of ligand-receptor bonds : The MT ligand changes its length (and thus binding sites) with time by polymerization-depolymerization kinetics , while multiple motor receptors tend to walk actively along the MT length. These processes, combined with force-mediated unbinding of the motors, result in an elaborate behavior of the MT connection to the cell cortex . We present results for the strength and lifetime of the system through the well-established force-clamp and force-ramp protocols when external tension is applied to the MT. The simulation results reveal that the MT-cell attachment behaves as a catch-bond or slip-bond depending on system parameters. We provide analytical approximations of the lifetime and discuss implications of our results on in-vitro experiments .", "edit_actions": [{"type": "D", "before": "A microtubule (MT) is a tubular stiff filament formed by a URLanization of tubulin proteins.", "after": null, "start_char_pos": 0, "end_char_pos": 92}, {"type": "D", "before": "for studying the strength and stability", "after": null, "start_char_pos": 131, "end_char_pos": 170}, {"type": "R", "before": "MT with a rigid wall where", "after": "mictrotuble (MT) with a cell cortex, in which", "start_char_pos": 203, "end_char_pos": 229}, {"type": "R", "before": "wall", "after": "cell", "start_char_pos": 256, "end_char_pos": 260}, {"type": "A", "before": null, "after": "active", "start_char_pos": 275, "end_char_pos": 275}, {"type": "R", "before": ", formed by the specific interactions between the MT and the motors, is an analog", "after": "is a particularly unique case", "start_char_pos": 311, "end_char_pos": 392}, {"type": "R", "before": ", the MT and the motors anchored on the wall being the counterparts of the ligand and receptors, respectively. However, unlike other ligands, the length of a MT can change with time because of its", "after": ": The MT ligand changes its length (and thus binding sites) with time by", "start_char_pos": 418, "end_char_pos": 614}, {"type": "R", "before": ". The simple model developed here is motivated by the MTs linked", "after": ", while multiple motor receptors tend to walk actively along the MT length. These processes, combined with force-mediated unbinding of the motors, result in an elaborate behavior of the MT connection", "start_char_pos": 656, "end_char_pos": 720}, {"type": "D", "before": "by dynein motors", "after": null, "start_char_pos": 740, "end_char_pos": 756}, {"type": "R", "before": "the theory for both force-ramp and", "after": "results for the strength and lifetime of the system through the well-established", "start_char_pos": 770, "end_char_pos": 804}, {"type": "R", "before": "conditions. In the", "after": "and", "start_char_pos": 817, "end_char_pos": 835}, {"type": "R", "before": "protocol we investigate the strength of", "after": "protocols when external tension is applied to the MT. The simulation results reveal that", "start_char_pos": 847, "end_char_pos": 886}, {"type": "R", "before": "attachment by assuming imposition of a time-dependent external load tension that increases linearly with time till the attachment gets ruptured, we calculate the distribution of the rupture forces that fluctuates from one loading to another. In the force-clamp protocol, to test the stability, we compute the distribution of the lifetimes of the attachments under externally applied time-independent load tension, the results establish the MT-wall attachment to be an analog of a", "after": "MT-cell attachment behaves as a catch-bond or", "start_char_pos": 891, "end_char_pos": 1370}, {"type": "A", "before": null, "after": "depending on system parameters. We provide analytical approximations of the lifetime and discuss implications of our results on in-vitro experiments", "start_char_pos": 1381, "end_char_pos": 1381}], "sents_char_pos": [0, 92, 291, 528, 657, 758, 828, 1132]}
+{"doc_id": "1612.06186", "revision_depth": "1", "before_revision": " Using the recently available World Input-Output Database , we modeled the evolving world economic network ( from 1995 to 2011 ) with a series of time-homogeneous finite Markov chains. Next, we investigated different aspects of the world economic network via different properties of the Markov chains including mixing time, Kemeny constant, steady state probabilities and perturbation analysis of the transition matrices. We showed how the time series of mixing times and Kemeny constants could be used as an aggregate index of globalization. Next, we focused on the steady state probabilities as a measure of structural power of the economies that are comparable to GDP shares of economies as the traditional index of economies welfare . Further, we introduced two measures of systemic risk, called systemic influence and systemic fragility, where the former is the ratio of number of influenced nodes to the total number of nodes, caused by a shock in the activity of that node and the latter is based on the number of times a specific economic node is affected by a shock in the activity of all the other nodes. Next, we showed that the sum of systemic fragility values of all the nodes as an aggregate measure of network fragility could be used as a predictive risk measure of the whole economic network. Finally, focusing on Kemeny constant as a global indicator of monetary flow across the network, we showed that there is a paradoxical effect of economic slow down of some of economic nodes on the overall flow of the world economic network. While the economic slowdown of the majority of nodes with high structural power results to a slower average monetary flow , there are some nodes, where their slowdowns improve the overall quality of the network in terms of connectivity and the average flow of money .", "after_revision": "The initial theoretical connections between Leontief input-output models and Markov chains were established back in 1950s. However, considering the wide variety of mathematical properties of Markov chains, there has not been a full investigation of evolving world economic networks with Markov chain formalism. Using the recently available world input-output database , we modeled the evolution of the world economic network from 1995 to 2011 through analysis of a series of finite Markov chains. We assessed different aspects of this evolving system via different properties of the Markov chains such as mixing time, Kemeny constant, steady state probabilities and perturbation analysis of the transition matrices. First, we showed how the time series of mixing times and Kemeny constants could be used as an aggregate index of globalization. Next, we focused on the steady state probabilities as a measure of structural power of the economies that are comparable to GDP shares of economies as the traditional index of economies . Further, we introduced two measures of systemic risk, called systemic influence and systemic fragility, where the former is the ratio of number of influenced nodes to the total number of nodes, caused by a shock in the activity of a node and the latter is based on the number of times a specific economic node is affected by a shock in the activity of any of the other nodes. Finally, focusing on Kemeny constant as a global indicator of monetary flow across the network, we showed that there is a paradoxical effect of a change in activity levels of economic nodes on the overall flow of the network. While the economic slowdown of the majority of nodes with high structural power results to a slower average monetary flow over the network , there are some nodes, where their slowdowns improve the overall quality of the network in terms of connectivity and the average monetary flow .", "edit_actions": [{"type": "A", "before": null, "after": "The initial theoretical connections between Leontief input-output models and Markov chains were established back in 1950s. However, considering the wide variety of mathematical properties of Markov chains, there has not been a full investigation of evolving world economic networks with Markov chain formalism.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "World Input-Output Database", "after": "world input-output database", "start_char_pos": 30, "end_char_pos": 57}, {"type": "R", "before": "evolving", "after": "evolution of the", "start_char_pos": 75, "end_char_pos": 83}, {"type": "D", "before": "(", "after": null, "start_char_pos": 107, "end_char_pos": 108}, {"type": "R", "before": ") with", "after": "through analysis of", "start_char_pos": 127, "end_char_pos": 133}, {"type": "D", "before": "time-homogeneous", "after": null, "start_char_pos": 146, "end_char_pos": 162}, {"type": "R", "before": "Next, we investigated", "after": "We assessed", "start_char_pos": 185, "end_char_pos": 206}, {"type": "R", "before": "the world economic network", "after": "this evolving system", "start_char_pos": 228, "end_char_pos": 254}, {"type": "R", "before": "including", "after": "such as", "start_char_pos": 301, "end_char_pos": 310}, {"type": "R", "before": "We", "after": "First, we", "start_char_pos": 422, "end_char_pos": 424}, {"type": "D", "before": "welfare", "after": null, "start_char_pos": 729, "end_char_pos": 736}, {"type": "R", "before": "that", "after": "a", "start_char_pos": 970, "end_char_pos": 974}, {"type": "R", "before": "all", "after": "any of", "start_char_pos": 1094, "end_char_pos": 1097}, {"type": "D", "before": "Next, we showed that the sum of systemic fragility values of all the nodes as an aggregate measure of network fragility could be used as a predictive risk measure of the whole economic network.", "after": null, "start_char_pos": 1115, "end_char_pos": 1308}, {"type": "R", "before": "economic slow down of some of", "after": "a change in activity levels of", "start_char_pos": 1453, "end_char_pos": 1482}, {"type": "D", "before": "world economic", "after": null, "start_char_pos": 1525, "end_char_pos": 1539}, {"type": "A", "before": null, "after": "over the network", "start_char_pos": 1671, "end_char_pos": 1671}, {"type": "R", "before": "flow of money", "after": "monetary flow", "start_char_pos": 1802, "end_char_pos": 1815}], "sents_char_pos": [0, 184, 421, 542, 738, 1114, 1308, 1548]}
+{"doc_id": "1612.09103", "revision_depth": "2", "before_revision": "Given two Polish spaces U and V, denote and countably generated sub \\sigma-field G\\subsetF. Denote } by L( U \\times%DIFDELCMD < } %%% V) and \\mathcal{L the set of all bounded upper semianalytic functions from U \\times%DIFDELCMD < } %%% V and U to the real line, respectively(G) the subset of \\mathcal{G}-upper semianalytic functions} . Let \\mathcal{E}(\\cdot| U )\\colon\\mathcal{L}( U \\times%DIFDELCMD < }%%% V )\\to\\mathcal{L}( U ) be a sublinear increasing functional which leaves \\mathcal{L}( U ) invariant. We prove that there exists a set-valued mapping \\mathcal{P} _V from U} from \\Omega } to the set of probabilities on V with compact convex values and analytic graph such that \\mathcal{E}(X| U)(u)(\\omega} )= \\sup_{P\\in\\mathcal{P} _V ( u )} \\int_V X(u,v)\\,P(dv) if and only if \\mathcal{E}(\\cdot | U ) is pointwise continuous from below and continuous from above on the continuous functions. Further, given another sublinear increasing functional \\mathcal{E}(\\cdot)\\colon\\mathcal{L}( U \\times%DIFDELCMD < } %%% V )\\to\\mathbb{R} which leaves the constants invariant, the tower property \\mathcal{E}(\\cdot)=\\mathcal{E}(\\mathcal{E}(\\cdot| U )) is characterized via a pasting property of the representing sets of probabilities . As applications, we characterize under which conditions the product of a set of probabilities and a set of kernels is compact , and under which conditions a nonlinear version of Fubini's theorem holds true .", "after_revision": "Let \\Omega be a Polish space with Borel \\sigma-field \\mathcal{F and countably generated sub \\sigma-field G\\subsetF. Denote } by L( %DIFDELCMD < } %%% \\mathcal{F the set of all bounded \\mathcal{F semianalytic functions from %DIFDELCMD < } %%% \\Omega to the reals and by \\mathcal{L(G) the subset of \\mathcal{G}-upper semianalytic functions} . Let \\mathcal{E}(\\cdot| \\mathcal{G )\\colon\\mathcal{L}( %DIFDELCMD < }%%% \\mathcal{F )\\to\\mathcal{L}( \\mathcal{G ) be a sublinear increasing functional which leaves \\mathcal{L}( \\mathcal{G ) invariant. It is shown that there exists a \\mathcal{G set-valued mapping \\mathcal{P} _{\\mathcal{G} from \\Omega } to the set of probabilities which are concentrated on atoms of \\mathcal{G with compact convex values such that \\mathcal{E}(X| \\mathcal{G)(\\omega} )= \\sup_{P\\in\\mathcal{P} _{\\mathcal{G ( \\omega )} E_P[X] if and only if \\mathcal{E}(\\cdot | \\mathcal{G ) is pointwise continuous from below and continuous from above on the continuous functions. Further, given another sublinear increasing functional \\mathcal{E}(\\cdot)\\colon\\mathcal{L}( %DIFDELCMD < } %%% \\mathcal{F )\\to\\mathbb{R} which leaves the constants invariant, the tower property \\mathcal{E}(\\cdot)=\\mathcal{E}(\\mathcal{E}(\\cdot| \\mathcal{G )) is characterized via a pasting property of the representing sets of probabilities , and the importance of analytic functions is explained. Finally, it is characterized when a nonlinear version of Fubini's theorem holds true and when the product of a set of probabilities and a set of kernels is compact .", "edit_actions": [{"type": "R", "before": "Given two Polish spaces U and V, denote", "after": "Let \\Omega be a Polish space with Borel \\sigma-field \\mathcal{F", "start_char_pos": 0, "end_char_pos": 39}, {"type": "D", "before": "U", "after": null, "start_char_pos": 107, "end_char_pos": 108}, {"type": "D", "before": "\\times", "after": null, "start_char_pos": 109, "end_char_pos": 115}, {"type": "R", "before": "V) and \\mathcal{L", "after": "\\mathcal{F", "start_char_pos": 134, "end_char_pos": 151}, {"type": "R", "before": "upper", "after": "\\mathcal{F", "start_char_pos": 175, "end_char_pos": 180}, {"type": "D", "before": "U", "after": null, "start_char_pos": 209, "end_char_pos": 210}, {"type": "D", "before": "\\times", "after": null, "start_char_pos": 211, "end_char_pos": 217}, {"type": "R", "before": "V and U to the real line, respectively", "after": "\\Omega to the reals and by \\mathcal{L", "start_char_pos": 236, "end_char_pos": 274}, {"type": "R", "before": "U", "after": "\\mathcal{G", "start_char_pos": 359, "end_char_pos": 360}, {"type": "D", "before": "U", "after": null, "start_char_pos": 381, "end_char_pos": 382}, {"type": "D", "before": "\\times", "after": null, "start_char_pos": 383, "end_char_pos": 389}, {"type": "R", "before": "V", "after": "\\mathcal{F", "start_char_pos": 407, "end_char_pos": 408}, {"type": "R", "before": "U", "after": "\\mathcal{G", "start_char_pos": 426, "end_char_pos": 427}, {"type": "R", "before": "U", "after": "\\mathcal{G", "start_char_pos": 493, "end_char_pos": 494}, {"type": "R", "before": "We prove", "after": "It is shown", "start_char_pos": 508, "end_char_pos": 516}, {"type": "A", "before": null, "after": "\\mathcal{G", "start_char_pos": 537, "end_char_pos": 537}, {"type": "R", "before": "_V from U", "after": "_{\\mathcal{G", "start_char_pos": 569, "end_char_pos": 578}, {"type": "R", "before": "on V", "after": "which are concentrated on atoms of \\mathcal{G", "start_char_pos": 622, "end_char_pos": 626}, {"type": "D", "before": "and analytic graph", "after": null, "start_char_pos": 654, "end_char_pos": 672}, {"type": "R", "before": "U)(u", "after": "\\mathcal{G", "start_char_pos": 698, "end_char_pos": 702}, {"type": "R", "before": "_V", "after": "_{\\mathcal{G", "start_char_pos": 737, "end_char_pos": 739}, {"type": "R", "before": "u", "after": "\\omega", "start_char_pos": 742, "end_char_pos": 743}, {"type": "R", "before": "\\int_V X(u,v)\\,P(dv)", "after": "E_P[X]", "start_char_pos": 747, "end_char_pos": 767}, {"type": "R", "before": "U", "after": "\\mathcal{G", "start_char_pos": 803, "end_char_pos": 804}, {"type": "D", "before": "U", "after": null, "start_char_pos": 989, "end_char_pos": 990}, {"type": "D", "before": "\\times", "after": null, "start_char_pos": 991, "end_char_pos": 997}, {"type": "R", "before": "V", "after": "\\mathcal{F", "start_char_pos": 1016, "end_char_pos": 1017}, {"type": "R", "before": "U", "after": "\\mathcal{G", "start_char_pos": 1140, "end_char_pos": 1141}, {"type": "R", "before": ". As applications, we characterize under which conditions", "after": ", and the importance of analytic functions is explained. Finally, it is characterized when a nonlinear version of Fubini's theorem holds true and when", "start_char_pos": 1227, "end_char_pos": 1284}, {"type": "D", "before": ", and under which conditions a nonlinear version of Fubini's theorem holds true", "after": null, "start_char_pos": 1355, "end_char_pos": 1434}], "sents_char_pos": [0, 91, 507, 896, 1228]}
+{"doc_id": "1701.07712", "revision_depth": "1", "before_revision": " In this work we use a combination of statistical physics and dynamical systems approaches , to analyze the response to an antigen of a simplified model of the adaptive immune system, which comprises B, T helper and T regulatory lymphocytes. Results show that the model is remarkably robust against changes in the kinetic parameters, noise levels, and mechanisms that activate T regulatory lymphocytes. In contrast, the model is extremely sensitive to changes in the ratio between T helper and T regulatory lymphocytes, exhibiting in particular a phase transition , from a responsive to an immuno-suppressed phase, when the ratio is lowered below a critical value . To the best of our knowledge, this is the first mathematical study to support the validity of the T-helper/ T-regulator lymphocyte ratio as an index of immunosuppression , with a potential for prognostic monitoring .", "after_revision": "Recent experimental studies have suggested the ratio between T-helper and T-suppressor lymphocytes as an index of immunosuppression in HIV, cancer, immunosenescence and inflammatory and auto-immune diseases. However, a quantitative understanding of the impact of this ratio on the immune response has lagged behind data and its validity as a tool for prognostic monitoring or therapeutic target remains an open question. In this work , we use statistical physics and dynamical systems approaches to analyze the time-dependent response to an antigen , of a simplified model of the adaptive immune system, which comprises B, T-helper and T-suppressor lymphocytes. The model is remarkably robust against changes in the noise level and kinetic parameters, but it is very sensitive to changes in the ratio between T-helper and T-suppressor lymphocytes, exhibiting , in particular, a transition from a responsive to an immuno-suppressed phase, as the ratio is lowered below a critical value , which is in line with experiments. This result supports the validity of the T-helper/ T-suppressor ratio as an index of immunosuppression and may provide a useful theoretical benchmark to interpret and compare experiments .", "edit_actions": [{"type": "A", "before": null, "after": "Recent experimental studies have suggested the ratio between T-helper and T-suppressor lymphocytes as an index of immunosuppression in HIV, cancer, immunosenescence and inflammatory and auto-immune diseases. However, a quantitative understanding of the impact of this ratio on the immune response has lagged behind data and its validity as a tool for prognostic monitoring or therapeutic target remains an open question.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "we use a combination of", "after": ", we use", "start_char_pos": 14, "end_char_pos": 37}, {"type": "D", "before": ",", "after": null, "start_char_pos": 91, "end_char_pos": 92}, {"type": "A", "before": null, "after": "time-dependent", "start_char_pos": 108, "end_char_pos": 108}, {"type": "A", "before": null, "after": ",", "start_char_pos": 132, "end_char_pos": 132}, {"type": "R", "before": "T helper and T regulatory lymphocytes. Results show that the", "after": "T-helper and T-suppressor lymphocytes. The", "start_char_pos": 205, "end_char_pos": 265}, {"type": "A", "before": null, "after": "noise level and", "start_char_pos": 316, "end_char_pos": 316}, {"type": "R", "before": "noise levels, and mechanisms that activate T regulatory lymphocytes. In contrast, the model is extremely", "after": "but it is very", "start_char_pos": 337, "end_char_pos": 441}, {"type": "R", "before": "T helper and T regulatory", "after": "T-helper and T-suppressor", "start_char_pos": 484, "end_char_pos": 509}, {"type": "R", "before": "in particular a phase transition ,", "after": ", in particular, a transition", "start_char_pos": 534, "end_char_pos": 568}, {"type": "R", "before": "when", "after": "as", "start_char_pos": 618, "end_char_pos": 622}, {"type": "R", "before": ". To the best of our knowledge, this is the first mathematical study to support the", "after": ", which is in line with experiments. This result supports the", "start_char_pos": 667, "end_char_pos": 750}, {"type": "R", "before": "T-regulator lymphocyte", "after": "T-suppressor", "start_char_pos": 777, "end_char_pos": 799}, {"type": "R", "before": ", with a potential for prognostic monitoring", "after": "and may provide a useful theoretical benchmark to interpret and compare experiments", "start_char_pos": 839, "end_char_pos": 883}], "sents_char_pos": [0, 243, 405, 668]}
+{"doc_id": "1702.01265", "revision_depth": "1", "before_revision": "Background: The correct positioning of the mitotic spindle during the asymmetric division of the nematode C. elegans zygote relies on the combination of centering and corticalpulling forces. These forces, revealed by centrosome anaphase oscillations, are regulated through the dynamics of force generators, related to mitosis progression. Recently, we reported the control of oscillation onset by the posterior spindle pole position in related speciesC. briggsae, necessitating a re-evaluation of the role of astral microtubules dynamics. Results: After exhibiting such a positional switch in C. elegans, we mapped the microtubule ends at the cortex and observed a correlation between the proximity of the centrosomes and the density of microtubule contacts. To explore the functional consequences, we extended the tug-of-war model and successfully accounted for the positional switch. We predicted and experimentally validated that the control of oscillation onset was robust to changes in cell geometry or maximum number of attached force generators. We also predicted that the final position of the posterior centrosome and thus the spindle has a reduced dependence upon the force generator dynamics or number . Conclusion: The outburst of forces responsible of spindle anaphase oscillations and positioning is regulated by the spindle position through the spatial modulation of microtubule contactsat the cortex . This regulation superimposes that of force generator processivity putatively linked to the cell cycle. This novel control provides robustness to variations in zygote geometry or detailed properties of cortical force generators .", "after_revision": "Background: During asymmetric division of the Caenorhabditis elegans nematode zygote, the polarity cues distribution and daughter cell fates depend on the correct positioning of the mitotic spindle which results from both centering and cortical pulling forces. Revealed by spindle rocking, these pulling forces are regulated by the force generator dynamics, which are related to mitosis progression. This may be combined with a second regulation, this one by the posterior spindle pole position , which can be seen when comparing related species. Results: After delaying anaphase onset, we identified a positional pulling force regulation in C. elegans, which we ascribed to microtubule dynamics at the cortex . Indeed, in mapping the contacts we found a correlation between the centrosome-cortex distance and the microtubule contact density. This density in turn modulates pulling force generator activity. We expanded our model of spindle rocking and predicted then experimentally validated that the oscillation onset position resists changes in cellular geometry and number of force generators. Consistent with final spindle position measurements, this new model accounts for a lower dependence on force generator dynamics and quantities than predicted by the previous model . Conclusion: The spindle position regulates the rapid increase in forces needed for anaphase oscillation and positioning through the spatial modulation of microtubule-cortex contacts . This regulation superimposes that of force generator processivity , putatively linked to the cell cycle. This novel control confers resistance to variations in zygote geometry and dynamics of cortical force generators . Interestingly, this robustness originates in cell mechanics rather than biochemical networks .", "edit_actions": [{"type": "R", "before": "The correct positioning of the mitotic spindle during the", "after": "During", "start_char_pos": 12, "end_char_pos": 69}, {"type": "R", "before": "nematode C. elegans zygote relies on the combination of centering and corticalpulling forces. These forces, revealed by centrosome anaphase oscillations, are regulated through the dynamics of force generators,", "after": "Caenorhabditis elegans nematode zygote, the polarity cues distribution and daughter cell fates depend on the correct positioning of the mitotic spindle which results from both centering and cortical pulling forces. Revealed by spindle rocking, these pulling forces are regulated by the force generator dynamics, which are", "start_char_pos": 97, "end_char_pos": 306}, {"type": "R", "before": "Recently, we reported the control of oscillation onset", "after": "This may be combined with a second regulation, this one", "start_char_pos": 339, "end_char_pos": 393}, {"type": "R", "before": "in related speciesC. briggsae, necessitating a re-evaluation of the role of astral microtubules dynamics.", "after": ", which can be seen when comparing related species.", "start_char_pos": 433, "end_char_pos": 538}, {"type": "R", "before": "exhibiting such a positional switch", "after": "delaying anaphase onset, we identified a positional pulling force regulation", "start_char_pos": 554, "end_char_pos": 589}, {"type": "R", "before": "we mapped the microtubule ends", "after": "which we ascribed to microtubule dynamics", "start_char_pos": 605, "end_char_pos": 635}, {"type": "R", "before": "and observed", "after": ". Indeed, in mapping the contacts we found", "start_char_pos": 650, "end_char_pos": 662}, {"type": "R", "before": "proximity of the centrosomes and the density of microtubule contacts. To explore the functional consequences, we extended the tug-of-war model and successfully accounted for the positional switch. We predicted and", "after": "centrosome-cortex distance and the microtubule contact density. This density in turn modulates pulling force generator activity. We expanded our model of spindle rocking and predicted then", "start_char_pos": 689, "end_char_pos": 902}, {"type": "R", "before": "control of oscillation onset was robust to changes in cell geometry or maximum number of attached", "after": "oscillation onset position resists changes in cellular geometry and number of", "start_char_pos": 937, "end_char_pos": 1034}, {"type": "R", "before": "We also predicted that the final position of the posterior centrosome and thus the spindle has a reduced dependence upon the", "after": "Consistent with final spindle position measurements, this new model accounts for a lower dependence on", "start_char_pos": 1053, "end_char_pos": 1177}, {"type": "R", "before": "or number", "after": "and quantities than predicted by the previous model", "start_char_pos": 1203, "end_char_pos": 1212}, {"type": "R", "before": "outburst of forces responsible of spindle anaphase oscillations and positioning is regulated by the spindle position", "after": "spindle position regulates the rapid increase in forces needed for anaphase oscillation and positioning", "start_char_pos": 1231, "end_char_pos": 1347}, {"type": "R", "before": "microtubule contactsat the cortex", "after": "microtubule-cortex contacts", "start_char_pos": 1382, "end_char_pos": 1415}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1484, "end_char_pos": 1484}, {"type": "R", "before": "provides robustness", "after": "confers resistance", "start_char_pos": 1541, "end_char_pos": 1560}, {"type": "R", "before": "or detailed properties", "after": "and dynamics", "start_char_pos": 1594, "end_char_pos": 1616}, {"type": "A", "before": null, "after": ". Interestingly, this robustness originates in cell mechanics rather than biochemical networks", "start_char_pos": 1646, "end_char_pos": 1646}], "sents_char_pos": [0, 190, 338, 538, 758, 885, 1052, 1417, 1521]}
+{"doc_id": "1702.03098", "revision_depth": "1", "before_revision": "Determining risk contributions by unit exposures to portfolio-wide economic capital is an important task in financial risk management. Despite its practical demands, computation of risk contributions is challenging for most risk models because it often requires rare-event simulation . In this paper , we address the problem of estimating risk contributions when the total risk is measured by Value-at-Risk (VaR). We propose a new estimator of VaR contributions , that utilizes Markov chain Monte Carlo (MCMC) method. Unlike the existing estimators, our MCMC-based estimator is computed by samples of conditional loss distribution given the rare event of our interest. MCMC method enables to generate such samples without evaluating the density of total risk. Thanks to these features, our estimator has improved sample-efficiency compared with the crude Monte Carlo method. Moreover, our method is widely applicable to various risk models specified by joint portfolio loss density. In this paper, we show that our MCMC-based estimator has several attractive properties, such as consistency and asymptotic normality. Our numerical experiment also demonstrates that , in various risk models used in practice, our MCMC estimator has smaller bias and MSE compared with these of existing estimators.", "after_revision": "Determining risk contributions of unit exposures to portfolio-wide economic capital is an important task in financial risk management. Computing risk contributions involves difficulties caused by rare-event simulations . In this study , we address the problem of estimating risk contributions when the total risk is measured by value-at-risk (VaR). Our proposed estimator of VaR contributions is based on the Metropolis-Hasting (MH) algorithm, which is one of the most prevalent Markov chain Monte Carlo (MCMC) methods. Unlike existing estimators, our MH-based estimator consists of samples from conditional loss distribution given a rare event of interest. This feature enhances sample efficiency compared with the crude Monte Carlo method. Moreover, our method has the consistency and asymptotic normality, and is widely applicable to various risk models having joint loss density. Our numerical experiments based on simulation and real-world data demonstrate that in various risk models , even those having high-dimensional (approximately 500) inhomogeneous margins, our MH estimator has smaller bias and mean squared error compared with existing estimators.", "edit_actions": [{"type": "R", "before": "by", "after": "of", "start_char_pos": 31, "end_char_pos": 33}, {"type": "R", "before": "Despite its practical demands, computation of risk contributions is challenging for most risk models because it often requires", "after": "Computing risk contributions involves difficulties caused by", "start_char_pos": 135, "end_char_pos": 261}, {"type": "R", "before": "simulation", "after": "simulations", "start_char_pos": 273, "end_char_pos": 283}, {"type": "R", "before": "paper", "after": "study", "start_char_pos": 294, "end_char_pos": 299}, {"type": "R", "before": "Value-at-Risk", "after": "value-at-risk", "start_char_pos": 393, "end_char_pos": 406}, {"type": "R", "before": "We propose a new", "after": "Our proposed", "start_char_pos": 414, "end_char_pos": 430}, {"type": "R", "before": ", that utilizes", "after": "is based on the Metropolis-Hasting (MH) algorithm, which is one of the most prevalent", "start_char_pos": 462, "end_char_pos": 477}, {"type": "R", "before": "method. Unlike the", "after": "methods. Unlike", "start_char_pos": 510, "end_char_pos": 528}, {"type": "R", "before": "MCMC-based estimator is computed by samples of", "after": "MH-based estimator consists of samples from", "start_char_pos": 554, "end_char_pos": 600}, {"type": "R", "before": "the", "after": "a", "start_char_pos": 637, "end_char_pos": 640}, {"type": "R", "before": "our interest. MCMC method enables to generate such samples without evaluating the density of total risk. Thanks to these features, our estimator has improved sample-efficiency", "after": "interest. This feature enhances sample efficiency", "start_char_pos": 655, "end_char_pos": 830}, {"type": "A", "before": null, "after": "has the consistency and asymptotic normality, and", "start_char_pos": 896, "end_char_pos": 896}, {"type": "R", "before": "specified by joint portfolio", "after": "having joint", "start_char_pos": 941, "end_char_pos": 969}, {"type": "R", "before": "In this paper, we show that our MCMC-based estimator has several attractive properties, such as consistency and asymptotic normality. Our numerical experiment also demonstrates that ,", "after": "Our numerical experiments based on simulation and real-world data demonstrate that", "start_char_pos": 984, "end_char_pos": 1167}, {"type": "R", "before": "used in practice, our MCMC", "after": ", even those having high-dimensional (approximately 500) inhomogeneous margins, our MH", "start_char_pos": 1191, "end_char_pos": 1217}, {"type": "R", "before": "MSE compared with these of", "after": "mean squared error compared with", "start_char_pos": 1249, "end_char_pos": 1275}], "sents_char_pos": [0, 134, 285, 413, 517, 668, 759, 874, 983, 1117]}
+{"doc_id": "1704.07580", "revision_depth": "1", "before_revision": "Motivated by map labeling, we study the problem in which ] we are given a collection of n disks D_1,%DIFDELCMD < \\dots%%% , D_n in the plane that grow at possibly different speeds. Whenever two disks meet , the one with the lower index disappears. This problem was introduced by Funke, Krumpe, and Storandt IWOCA 2016 . We provide the first general subquadratic algorithm for computing the times and the order of disappearance. This algorithm also works for other shapes ( such as rectangles)and in any fixed dimension. Using quadtrees, we provide an alternative algorithm that runs in near linear time , although this second algorithm has a logarithmic dependence on either\\big(\\big(\\big)\\big) the ratio of the fastest speed to the slowest speed of disks or the spread of disk centers (the ratio of the maximum to the minimum distance between them). Our result improves the running times of previous algorithms by Funke, Krumpe, and Storandt [IWOCA 2016], Bahrdt et al. [ALENEX 2017] and Funke and Storandt [ EWCG 2017]. Finally, we give an \\Omega(n\\log n) lower bound on the problem , showing that our quadtree algorithms are almost tight.", "after_revision": "Motivated by map labeling, Funke, Krumpe, and Storandt IWOCA 2016] introduced the following problem: we are given a sequence of n disks %DIFDELCMD < \\dots%%% in the plane . Initially, all disks have radius 0, and they grow at constant, but possibly different, speeds. Whenever two disks touch , the one with the higher index disappears. The goal is to determine the elimination order, i.e., the order in which the disks disappear . We provide the first general subquadratic algorithm for this problem. Our solution extends to other shapes ( e.g., rectangles), and it works in any fixed dimension. We also describe an alternative algorithm that is based on quadtrees. Its running time is O\\big(n\\big(\\log n + \\min \\{ \\log \\Delta, \\log \\Phi \\}\\big)\\big), where \\Delta is the ratio of the fastest and the slowest growth rate and \\Phi is the ratio of the largest and the smallest distance between two disk centers. This improves the running times of previous algorithms by Funke, Krumpe, and Storandt [IWOCA 2016], Bahrdt et al. [ALENEX 2017] , and Funke and Storandt [ EuroCG 2017]. Finally, we give an \\Omega(n\\log n) lower bound , showing that our quadtree algorithms are almost tight.", "edit_actions": [{"type": "R", "before": "we study the problem in which", "after": "Funke, Krumpe, and Storandt", "start_char_pos": 27, "end_char_pos": 56}, {"type": "A", "before": null, "after": "IWOCA 2016", "start_char_pos": 57, "end_char_pos": 57}, {"type": "A", "before": null, "after": "introduced the following problem:", "start_char_pos": 59, "end_char_pos": 59}, {"type": "R", "before": "collection", "after": "sequence", "start_char_pos": 75, "end_char_pos": 85}, {"type": "D", "before": "D_1,", "after": null, "start_char_pos": 97, "end_char_pos": 101}, {"type": "D", "before": ", D_n", "after": null, "start_char_pos": 123, "end_char_pos": 128}, {"type": "R", "before": "that grow at possibly different", "after": ". Initially, all disks have radius 0, and they grow at constant, but possibly different,", "start_char_pos": 142, "end_char_pos": 173}, {"type": "R", "before": "meet", "after": "touch", "start_char_pos": 201, "end_char_pos": 205}, {"type": "R", "before": "lower", "after": "higher", "start_char_pos": 225, "end_char_pos": 230}, {"type": "D", "before": "This problem was introduced by Funke, Krumpe, and Storandt", "after": null, "start_char_pos": 249, "end_char_pos": 307}, {"type": "R", "before": "IWOCA 2016", "after": "The goal is to determine the elimination order, i.e., the order in which the disks disappear", "start_char_pos": 308, "end_char_pos": 318}, {"type": "R", "before": "computing the times and the order of disappearance. This algorithm also works for", "after": "this problem. Our solution extends to", "start_char_pos": 377, "end_char_pos": 458}, {"type": "R", "before": "such as rectangles)and", "after": "e.g., rectangles), and it works", "start_char_pos": 474, "end_char_pos": 496}, {"type": "R", "before": "Using quadtrees, we provide", "after": "We also describe", "start_char_pos": 521, "end_char_pos": 548}, {"type": "R", "before": "runs in near linear time , although this second algorithm has a logarithmic dependence on either", "after": "is based on quadtrees. Its running time is O", "start_char_pos": 579, "end_char_pos": 675}, {"type": "A", "before": null, "after": "n", "start_char_pos": 680, "end_char_pos": 680}, {"type": "A", "before": null, "after": "\\log n + \\min \\{ \\log \\Delta, \\log \\Phi \\}", "start_char_pos": 685, "end_char_pos": 685}, {"type": "A", "before": null, "after": ", where \\Delta is", "start_char_pos": 695, "end_char_pos": 695}, {"type": "R", "before": "speed to the slowest speed of disks or the spread of disk centers (the", "after": "and the slowest growth rate and \\Phi is the", "start_char_pos": 721, "end_char_pos": 791}, {"type": "R", "before": "maximum to the minimum distance between them). Our result", "after": "largest and the smallest distance between two disk centers. This", "start_char_pos": 805, "end_char_pos": 862}, {"type": "A", "before": null, "after": ",", "start_char_pos": 986, "end_char_pos": 986}, {"type": "R", "before": "EWCG", "after": "EuroCG", "start_char_pos": 1012, "end_char_pos": 1016}, {"type": "D", "before": "on the problem", "after": null, "start_char_pos": 1072, "end_char_pos": 1086}], "sents_char_pos": [0, 181, 248, 428, 520, 851, 971, 1023]}
+{"doc_id": "1704.08219", "revision_depth": "1", "before_revision": "We devise dynamic algorithms for the following (weak ) visibility polygon computation problems: * Maintaining visibility polygon of a fixed point located interior to simple polygon amid vertex insertions and deletions to simple polygon. * Answering visibility polygon query corresponding to any point located exterior to simple polygon amid vertex insertions and deletions to simple polygon. * Maintaining weak visibility polygon of a fixed line segment located interior to simple polygon amid vertex insertions to simple polygon . * Answering weak visibility polygon query corresponding to any line segment located interior to simple polygon amid both vertex insertions and deletions to simple polygon. * Maintaining visibility polygon of a fixed point located in the free space of the polygonal domain amid vertex insertions to simple polygons in that polygonal domain. The proposed algorithms are output-sensitive, and the time complexities of algorithms for (weak) visibility polygon maintenance are expressed in terms of change in output complexity .", "after_revision": "We devise the following dynamic algorithms for both maintaining as well as querying for the visibility and weak visibility polygons amid vertex insertions and/or deletions to the simple polygon. * A fully-dynamic algorithm for maintaining the visibility polygon of a fixed point located interior to the simple polygon amid vertex insertions and deletions to the simple polygon. The time complexity to update the visibility polygon of a point q due to the insertion (resp. deletion) of vertex v to (resp. from) the current simple polygon is expressed in terms of the number of combinatorial changes needed to the visibility polygon of q due to the insertion (resp. deletion) of v. * An output-sensitive query algorithm to answer the visibility polygon query corresponding to any point p in \\mathbb{R amid vertex insertions and deletions to the simple polygon. If p is not exterior to the current simple polygon then the visibility polygon of p is computed. Otherwise, our algorithm outputs the visibility polygon corresponding to the exterior visibility of p . * An output-sensitive algorithm to compute the weak visibility polygon corresponding to any query line segment located interior to the simple polygon amid both the vertex insertions and deletions to the simple polygon. Each of these algorithms require preprocessing the initial simple polygon. And, the algorithms that maintain the visibility polygon (resp. weak visibility polygon) compute the visibility polygon (resp. weak visibility polygon) with respect to the initial simple polygon during the preprocessing phase .", "edit_actions": [{"type": "A", "before": null, "after": "the following", "start_char_pos": 10, "end_char_pos": 10}, {"type": "R", "before": "the following (weak ) visibility polygon computation problems:", "after": "both maintaining as well as querying for the visibility and weak visibility polygons amid vertex insertions and/or deletions to the simple polygon.", "start_char_pos": 34, "end_char_pos": 96}, {"type": "R", "before": "Maintaining", "after": "A fully-dynamic algorithm for maintaining the", "start_char_pos": 99, "end_char_pos": 110}, {"type": "A", "before": null, "after": "the", "start_char_pos": 167, "end_char_pos": 167}, {"type": "A", "before": null, "after": "the", "start_char_pos": 223, "end_char_pos": 223}, {"type": "A", "before": null, "after": "The time complexity to update the visibility polygon of a point q due to the insertion (resp. deletion) of vertex v to (resp. from) the current simple polygon is expressed in terms of the number of combinatorial changes needed to the visibility polygon of q due to the insertion (resp. deletion) of v.", "start_char_pos": 240, "end_char_pos": 240}, {"type": "R", "before": "Answering", "after": "An output-sensitive query algorithm to answer the", "start_char_pos": 243, "end_char_pos": 252}, {"type": "R", "before": "located exterior to simple polygon", "after": "p in \\mathbb{R", "start_char_pos": 305, "end_char_pos": 339}, {"type": "A", "before": null, "after": "the", "start_char_pos": 380, "end_char_pos": 380}, {"type": "R", "before": "* Maintaining weak", "after": "If p is not exterior to the current simple polygon then the", "start_char_pos": 397, "end_char_pos": 415}, {"type": "R", "before": "a fixed line segment located interior to simple polygon amid vertex insertions to simple polygon", "after": "p is computed. Otherwise, our algorithm outputs the visibility polygon corresponding to the exterior visibility of p", "start_char_pos": 438, "end_char_pos": 534}, {"type": "R", "before": "Answering", "after": "An output-sensitive algorithm to compute the", "start_char_pos": 539, "end_char_pos": 548}, {"type": "D", "before": "query", "after": null, "start_char_pos": 573, "end_char_pos": 578}, {"type": "A", "before": null, "after": "query", "start_char_pos": 600, "end_char_pos": 600}, {"type": "A", "before": null, "after": "the", "start_char_pos": 634, "end_char_pos": 634}, {"type": "A", "before": null, "after": "the", "start_char_pos": 660, "end_char_pos": 660}, {"type": "A", "before": null, "after": "the", "start_char_pos": 696, "end_char_pos": 696}, {"type": "R", "before": "* Maintaining visibility polygon of a fixed point located in the free space of the polygonal domain amid vertex insertions to simple polygons in that polygonal domain. The proposed algorithms are output-sensitive, and the time complexities of algorithms for (weak) visibility polygon maintenance are expressed in terms of change in output complexity", "after": "Each of these algorithms require preprocessing the initial simple polygon. And, the algorithms that maintain the visibility polygon (resp. weak visibility polygon) compute the visibility polygon (resp. weak visibility polygon) with respect to the initial simple polygon during the preprocessing phase", "start_char_pos": 713, "end_char_pos": 1062}], "sents_char_pos": [0, 239, 396, 712, 880]}
+{"doc_id": "1705.00924", "revision_depth": "1", "before_revision": "In the circle packing problem for triangular containers , one asks whether a given set of circles can be packed into a given triangle . Packing problems like this have been shown to be NP-hard. In this paper, we present a new sufficient condition for packing circles into any right or obtuse triangle using only the circles' combined area: It is possible to pack any circle instance whose combined area does not exceed the triangle's incircle . This area condition is tight, in the sense that for any larger area , there are instances which cannot be packed. A similar result for square containers has been established earlier this year, using the versatile, divide-and-conquer-based Split Packing algorithm. In this paper, we present a generalized, weighted version of this approach, allowing us to construct packings of circles into asymmetric triangles. It seems crucial to the success of these results that Split Packingdoes not depend on an orthogonal subdivision structure. Beside realizing all packings below the critical density bound, our algorithm can also be used as a constant-factor approximation algorithm when looking for the smallest non-acute triangle of a given side ratio in which a given set of circles can be packed . An interactive visualization of the Split Packing approach and other related material can be found at URL", "after_revision": "In the classic circle packing problem , one asks whether a given set of circles can be packed into a given container . Packing problems like this have been shown to be NP-hard. In this paper, we present new sufficient conditions for packing circles into square and triangular containers, using only the sum of the circles' areas: For square containers, it is possible to pack any set of circles with a combined area of up to approximately 53.90\\% of the square's area. And when the container is a right or obtuse triangle, any set of circles whose combined area does not exceed the triangle's incircle can be packed. These area conditions are tight, in the sense that for any larger areas , there are sets of circles which cannot be packed. Similar results have long been known for squares, but to the best of our knowledge, we give the first results of this type for circular objects. Our proofs are constructive: We describe a versatile, divide-and-conquer-based algorithm for packing circles into various container shapes with optimal worst-case density. It employs an elegant subdivision scheme that recursively splits the circles into two groups and then packs these into subcontainers. We call this algorithm \"Split Packing\". It can be used as a constant-factor approximation algorithm when looking for the smallest container in which a given set of circles can be packed , due to its polynomial runtime. A browser-based, interactive visualization of the Split Packing approach and other related material can be found at URL", "edit_actions": [{"type": "A", "before": null, "after": "classic", "start_char_pos": 7, "end_char_pos": 7}, {"type": "D", "before": "for triangular containers", "after": null, "start_char_pos": 31, "end_char_pos": 56}, {"type": "R", "before": "triangle", "after": "container", "start_char_pos": 126, "end_char_pos": 134}, {"type": "R", "before": "a new sufficient condition", "after": "new sufficient conditions", "start_char_pos": 221, "end_char_pos": 247}, {"type": "R", "before": "any right or obtuse triangle", "after": "square and triangular containers,", "start_char_pos": 273, "end_char_pos": 301}, {"type": "R", "before": "circles' combined area: It", "after": "sum of the circles' areas: For square containers, it", "start_char_pos": 317, "end_char_pos": 343}, {"type": "R", "before": "circle instance", "after": "set of circles with a combined area of up to approximately 53.90\\% of the square's area. And when the container is a right or obtuse triangle, any set of circles", "start_char_pos": 368, "end_char_pos": 383}, {"type": "R", "before": ". This area condition is", "after": "can be packed. These area conditions are", "start_char_pos": 444, "end_char_pos": 468}, {"type": "R", "before": "area", "after": "areas", "start_char_pos": 509, "end_char_pos": 513}, {"type": "R", "before": "instances", "after": "sets of circles", "start_char_pos": 526, "end_char_pos": 535}, {"type": "R", "before": "A similar result for square containers has been established earlier this year, using the versatile,", "after": "Similar results have long been known for squares, but to the best of our knowledge, we give the first results of this type for circular objects. Our proofs are constructive: We describe a versatile,", "start_char_pos": 560, "end_char_pos": 659}, {"type": "R", "before": "Split Packing algorithm. In this paper, we present a generalized, weighted version of this approach, allowing us to construct packings of circles into asymmetric triangles. It seems crucial to the success of these results that Split Packingdoes not depend on an orthogonal subdivision structure. Beside realizing all packings below the critical density bound, our algorithm can also", "after": "algorithm for packing circles into various container shapes with optimal worst-case density. It employs an elegant subdivision scheme that recursively splits the circles into two groups and then packs these into subcontainers. We call this algorithm \"Split Packing\". It can", "start_char_pos": 685, "end_char_pos": 1067}, {"type": "R", "before": "non-acute triangle of a given side ratio", "after": "container", "start_char_pos": 1151, "end_char_pos": 1191}, {"type": "R", "before": ". An", "after": ", due to its polynomial runtime. A browser-based,", "start_char_pos": 1238, "end_char_pos": 1242}], "sents_char_pos": [0, 194, 445, 559, 709, 857, 980, 1239]}
+{"doc_id": "1705.06479", "revision_depth": "2", "before_revision": "We investigate the dynamical effects of non-Gaussian asymmetric stable L\\'evy noisy fluctuations on the evolution of the transcription factor activator in the kinetic concentration model of a single genetic regulation system. The noisy fluctuations arise from the determination of the synthesis reaction rate , and are modeled by asymmetric stable L\\'evy motions . We compute two deterministic quantities, the mean first exit time (MFET) and the first escape probability (FEP), to examine the transition events from low to high concentration state under the influence of L\\'evy noise.We find that the fluctuations of the synthesis reaction rate lead to peculiar transitions to higher concentrations (i.e., higher likelihood for transcriptions) , such as higher likelihood of transcription for larger positive skewness parameter (asymmetry index) \\beta, achieving the minimum likelihood of transcription by tuning skewness parameter \\beta, achieving the higher likelihood of transcription by tuning non-Gaussianity index \\alpha, and a bifurcation for transcription at the critical value \\alpha = 1. We conduct a series of numerical experiments about `regulating' the likelihood of gene transcription by tuning asymmetric stable L\\'evy noise parameters .", "after_revision": "We investigate the dynamical effects of non-Gaussian asymmetric stable L\\'evy fluctuations on the evolution of the transcription factor activator in a genetic regulation system. The noisy fluctuations arise from the synthesis reaction rate . We compute two deterministic quantities, the mean first exit time (MFET) and the first escape probability (FEP), in order to examine the likelihood for transcriptions: The mean time scale for the system exits the low concentration state (the longer the exit time, the less likely for transcription) and the switch probability from low concentration states to high concentration states (corresponding to likelihood for transcription). By focusing on the impact of skewness (i.e., non-symmetry) in the probability distributions of noise, we find that the fluctuations in the synthesis reaction rate lead to peculiar transitions to high concentrations and thus to possible transcriptions , such as realizing higher likelihood of transcription for larger positive skewness (i.e., asymmetry) index \\beta, causing a bifurcation for the likelihood of transcription at the critical non-Gaussianity index value \\alpha = 1 (i.e., beyond which the likelihood for transcription suddenly increases), and achieving a turning point at the threshold value \\beta \\approx 0.55 (i.e., beyond which the likelihood for transcription reversed for \\alpha values). The bifurcation and turning point phenomena do not occur in the symmetric noise case (\\beta =0). We conduct a series of numerical experiments about `regulating' the likelihood of gene transcription by tuning asymmetric stable L\\'evy noise indexes. These offer insights for possible ways of achieving gene regulation in experimental research .", "edit_actions": [{"type": "D", "before": "noisy", "after": null, "start_char_pos": 78, "end_char_pos": 83}, {"type": "R", "before": "the kinetic concentration model of a single", "after": "a", "start_char_pos": 155, "end_char_pos": 198}, {"type": "D", "before": "determination of the", "after": null, "start_char_pos": 264, "end_char_pos": 284}, {"type": "D", "before": ", and are modeled by asymmetric stable L\\'evy motions", "after": null, "start_char_pos": 309, "end_char_pos": 362}, {"type": "A", "before": null, "after": "in order", "start_char_pos": 478, "end_char_pos": 478}, {"type": "R", "before": "transition events from low", "after": "likelihood for transcriptions: The mean time scale for the system exits the low concentration state (the longer the exit time, the less likely for transcription) and the switch probability from low concentration states", "start_char_pos": 494, "end_char_pos": 520}, {"type": "R", "before": "state under the influence of L\\'evy noise.We", "after": "states (corresponding to likelihood for transcription). By focusing on the impact of skewness (i.e., non-symmetry) in the probability distributions of noise, we", "start_char_pos": 543, "end_char_pos": 587}, {"type": "R", "before": "of", "after": "in", "start_char_pos": 615, "end_char_pos": 617}, {"type": "R", "before": "higher concentrations (i.e., higher likelihood for transcriptions)", "after": "high concentrations and thus to possible transcriptions", "start_char_pos": 678, "end_char_pos": 744}, {"type": "A", "before": null, "after": "realizing", "start_char_pos": 755, "end_char_pos": 755}, {"type": "R", "before": "parameter (asymmetry index) \\beta, achieving the minimum", "after": "(i.e., asymmetry) index \\beta, causing a bifurcation for the", "start_char_pos": 820, "end_char_pos": 876}, {"type": "R", "before": "by tuning skewness parameter \\beta, achieving the higher likelihood of transcription by tuning", "after": "at the critical", "start_char_pos": 905, "end_char_pos": 999}, {"type": "R", "before": "\\alpha, and a bifurcation for transcription at the critical value \\alpha", "after": "value \\alpha", "start_char_pos": 1022, "end_char_pos": 1094}, {"type": "R", "before": "1.", "after": "1 (i.e., beyond which the likelihood for transcription suddenly increases), and achieving a turning point at the threshold value \\beta \\approx 0.55 (i.e., beyond which the likelihood for transcription reversed for \\alpha values). The bifurcation and turning point phenomena do not occur in the symmetric noise case (\\beta =0).", "start_char_pos": 1097, "end_char_pos": 1099}, {"type": "R", "before": "parameters", "after": "indexes. These offer insights for possible ways of achieving gene regulation in experimental research", "start_char_pos": 1242, "end_char_pos": 1252}], "sents_char_pos": [0, 225, 364, 585, 744, 847]}
+{"doc_id": "1706.00091", "revision_depth": "1", "before_revision": "Let I(n,l) denote the maximum possible number of incidences between n points and l lines. It is well known that I(n,l) = \\Theta( (nl)^{2/3 + n + l) 2,3,7 . Let C _{SzTr} denote the constant of proportionality of the (nl)^{2/3 term. The known lower bound, due to Elekes 2 , is C _{SzTr} \\ge 2^{-2/3} = 0.63. With a slight modification of Elekes' construction, we show that it can give a better lower bound of C _{SzTr} \\ge 1, i.e., I(n,l) \\ge (nl)^{2/3 . Furthermore, we analyze a different construction given by %DIFDELCMD < \\erdos [%%% 3 } , and show its constant of proportionality to be even better, C _{\\mathrm{SzTr}} \\ge 3/(2^{1/3}\\pi^{2/3}) = 1.11.", "after_revision": "Let I(n,l) denote the maximum possible number of incidences between n points and l lines. It is well known that I(n,l) = \\Theta( n^{2/3 + n + l) . Let c _{SzTr} denote the lower bound on the constant of proportionality of the n^{2/3 term. The known lower bound, due to Elekes , is c _{SzTr} \\ge 2^{-2/3} = 0.63. With a slight modification of Elekes' construction, we show that it can give a better lower bound of c _{SzTr} \\ge 1, i.e., I(n,l) \\ge n^{2/3 . Furthermore, we analyze a different construction given by %DIFDELCMD < \\erdos [%%% Erd \\H o}s , and show its constant of proportionality to be even better, c _{\\mathrm{SzTr}} \\ge 3/(2^{1/3}\\pi^{2/3}) \\approx 1.11.", "edit_actions": [{"type": "R", "before": "(nl)^{2/3", "after": "n^{2/3", "start_char_pos": 129, "end_char_pos": 138}, {"type": "D", "before": "2,3,7", "after": null, "start_char_pos": 148, "end_char_pos": 153}, {"type": "R", "before": ". Let C", "after": ". Let c", "start_char_pos": 154, "end_char_pos": 161}, {"type": "A", "before": null, "after": "lower bound on the", "start_char_pos": 181, "end_char_pos": 181}, {"type": "R", "before": "(nl)^{2/3", "after": "n^{2/3", "start_char_pos": 217, "end_char_pos": 226}, {"type": "D", "before": "2", "after": null, "start_char_pos": 270, "end_char_pos": 271}, {"type": "R", "before": ", is C", "after": ", is c", "start_char_pos": 272, "end_char_pos": 278}, {"type": "R", "before": "C", "after": "c", "start_char_pos": 409, "end_char_pos": 410}, {"type": "R", "before": "(nl)^{2/3", "after": "n^{2/3", "start_char_pos": 443, "end_char_pos": 452}, {"type": "R", "before": "3", "after": "Erd", "start_char_pos": 538, "end_char_pos": 539}, {"type": "A", "before": null, "after": "\\H o", "start_char_pos": 540, "end_char_pos": 540}, {"type": "A", "before": null, "after": "s", "start_char_pos": 541, "end_char_pos": 541}, {"type": "R", "before": "C", "after": "c", "start_char_pos": 604, "end_char_pos": 605}, {"type": "R", "before": "=", "after": "\\approx", "start_char_pos": 648, "end_char_pos": 649}], "sents_char_pos": [0, 89, 232, 307]}
+{"doc_id": "1706.00330", "revision_depth": "1", "before_revision": "The paradox of the energy transition is that , because of the low marginal costs of new renewable energy sources (RES) , it drags electricity prices down and discourages investments in flexible productions that are needed to compensate for the lack of dispatchability of the new RES - the energy transition discourages the investments that are required for its own harmonious expansion. To investigate how this paradox can be overcome, we argue that future electricity prices can be accurately modeled from the residual load obtained by subtracting the sum of inflexible productions from the load. Armed with the resulting quantitative economic indicator, we investigate future revenues for power plants with various degree of flexibility under different scenarios for the energy transition in the European power grid . We find that flexible productions will be financially rewarded better and sooner if the energy transition proceeds faster but at more or less constant total production, i.e. by reducing the production of thermal power plants at the same rate as the production of RES increases. Less flexible productions, on the other hand, will see their revenue grow more moderately. Our results advocate for a faster energy transition with a quicker withdrawal of baseload thermal power plants .", "after_revision": "The paradox of the energy transition is that the low marginal costs of new renewable energy sources (RES) drag electricity prices down and discourage investments in flexible productions that are needed to compensate for the lack of dispatchability of the new RES . The energy transition thus discourages the investments that are required for its own harmonious expansion. To investigate how this paradox can be overcome, we argue that , under certain assumptions, future electricity prices are rather accurately modeled from the residual load obtained by subtracting non-flexible productions from the load. Armed with the resulting economic indicator, we investigate future revenues for European power plants with various degree of flexibility . We find that , if neither carbon taxes nor fuel prices change, flexible productions would be financially rewarded better and sooner if the energy transition proceeds faster but at more or less constant total production, i.e. by reducing the production of thermal power plants at the same rate as the RES production increases. Less flexible productions, on the other hand, would see their revenue grow more moderately. Our results indicate that a faster energy transition with a quicker withdrawal of thermal power plants would reward flexible productions faster .", "edit_actions": [{"type": "D", "before": ", because of", "after": null, "start_char_pos": 45, "end_char_pos": 57}, {"type": "R", "before": ", it drags", "after": "drag", "start_char_pos": 119, "end_char_pos": 129}, {"type": "R", "before": "discourages", "after": "discourage", "start_char_pos": 158, "end_char_pos": 169}, {"type": "R", "before": "- the energy transition", "after": ". The energy transition thus", "start_char_pos": 283, "end_char_pos": 306}, {"type": "A", "before": null, "after": ", under certain assumptions,", "start_char_pos": 450, "end_char_pos": 450}, {"type": "R", "before": "can be", "after": "are rather", "start_char_pos": 477, "end_char_pos": 483}, {"type": "R", "before": "the sum of inflexible", "after": "non-flexible", "start_char_pos": 550, "end_char_pos": 571}, {"type": "D", "before": "quantitative", "after": null, "start_char_pos": 624, "end_char_pos": 636}, {"type": "A", "before": null, "after": "European", "start_char_pos": 692, "end_char_pos": 692}, {"type": "D", "before": "under different scenarios for the energy transition in the European power grid", "after": null, "start_char_pos": 741, "end_char_pos": 819}, {"type": "R", "before": "flexible productions will", "after": ", if neither carbon taxes nor fuel prices change, flexible productions would", "start_char_pos": 835, "end_char_pos": 860}, {"type": "R", "before": "production of RES", "after": "RES production", "start_char_pos": 1071, "end_char_pos": 1088}, {"type": "R", "before": "will", "after": "would", "start_char_pos": 1146, "end_char_pos": 1150}, {"type": "R", "before": "advocate for", "after": "indicate that", "start_char_pos": 1203, "end_char_pos": 1215}, {"type": "D", "before": "baseload", "after": null, "start_char_pos": 1272, "end_char_pos": 1280}, {"type": "A", "before": null, "after": "would reward flexible productions faster", "start_char_pos": 1302, "end_char_pos": 1302}], "sents_char_pos": [0, 386, 598, 821, 1099, 1190]}
+{"doc_id": "1706.03341", "revision_depth": "1", "before_revision": "From analyzing energy-efficient management of data centers, this paper proposes and develops a class of interesting {\\it Group-Server Queues}, and establishes two representative group-server queues through loss networks and impatient customers, respectively. Furthermore, such two group-server queues are given model descriptions and necessary interpretation. Also, simple mathematical discussion is provided, and simulations are made to study the expected queue lengths, the expected sojourn times and the expected virtual service times. In addition, this paper also shows that this class of group-server queues are often encountered in other practical areas including communication networks, manufacturing systems, transportation networks, financial networks and healthcare systems. Note that the group-server queues are always used to design effectively dynamic control mechanisms through regrouping and recombining such many servers in a large-scale service system by means of, for example, bilateral threshold control, and customers transfer to the buffer or server groups. This leads to that the large-scale service system is divided into several adaptive and URLanizing subsystems through scheduling of batch customers and various service resources, which makes that the middle layer of this service system can more effectively be managed and strengthened under a dynamically , real-time and even reward framework. Based on this, performance of such a large-scale service system may be improved greatly in terms of introducing and analyzing such group-server queues. Therefore, not only is analysis of group-server queues regarded as a new interesting research direction, but it also exists many theoretic challenging , basic difficulties and open problems in the area of queueing networks.", "after_revision": "By analyzing energy-efficient management of data centers, this paper proposes and develops a class of interesting {\\it Group-Server Queues}, and establishes two representative group-server queues through loss networks and impatient customers, respectively. Furthermore, such two group-server queues are given model descriptions and necessary interpretation. Also, simple mathematical discussion is provided, and simulations are made to study the expected queue lengths, the expected sojourn times and the expected virtual service times. In addition, this paper also shows that this class of group-server queues are often encountered in many other practical areas including communication networks, manufacturing systems, transportation networks, financial networks and healthcare systems. Note that the group-server queues are always used to design effectively dynamic control mechanisms through regrouping and recombining such many servers in a large-scale service system by means of, for example, bilateral threshold control, and customers transfer to the buffer or server groups. This leads to the large-scale service system that is divided into several adaptive and URLanizing subsystems through scheduling of batch customers and regrouping of service resources, which make the middle layer of this service system more effectively managed and strengthened under a dynamic , real-time and even reward optimal framework. Based on this, performance of such a large-scale service system may be improved greatly in terms of introducing and analyzing such group-server queues. Therefore, not only analysis of group-server queues is regarded as a new interesting research direction, but there also exists many theoretical challenges , basic difficulties and open problems in the area of queueing networks.", "edit_actions": [{"type": "R", "before": "From", "after": "By", "start_char_pos": 0, "end_char_pos": 4}, {"type": "A", "before": null, "after": "many", "start_char_pos": 638, "end_char_pos": 638}, {"type": "D", "before": "that", "after": null, "start_char_pos": 1094, "end_char_pos": 1098}, {"type": "A", "before": null, "after": "that", "start_char_pos": 1130, "end_char_pos": 1130}, {"type": "R", "before": "various", "after": "regrouping of", "start_char_pos": 1232, "end_char_pos": 1239}, {"type": "R", "before": "makes that", "after": "make", "start_char_pos": 1265, "end_char_pos": 1275}, {"type": "R", "before": "can more effectively be", "after": "more effectively", "start_char_pos": 1316, "end_char_pos": 1339}, {"type": "R", "before": "dynamically", "after": "dynamic", "start_char_pos": 1373, "end_char_pos": 1384}, {"type": "A", "before": null, "after": "optimal", "start_char_pos": 1413, "end_char_pos": 1413}, {"type": "D", "before": "is", "after": null, "start_char_pos": 1597, "end_char_pos": 1599}, {"type": "A", "before": null, "after": "is", "start_char_pos": 1632, "end_char_pos": 1632}, {"type": "R", "before": "it", "after": "there", "start_char_pos": 1687, "end_char_pos": 1689}, {"type": "R", "before": "theoretic challenging", "after": "theoretical challenges", "start_char_pos": 1707, "end_char_pos": 1728}], "sents_char_pos": [0, 258, 359, 538, 785, 1079, 1424, 1576]}
+{"doc_id": "1707.05260", "revision_depth": "1", "before_revision": "Achieving strong real-time guarantees in multi-core platforms is challenging due to the extensive hardware resource sharing in the memory hierarchy. Modern platforms and OS's, however, provide no means to appropriately handle memory regions that are crucial for real-time performance . In this paper, we propose a new OS-level abstraction, namely Deterministic Memory, to define memory regions that are specially handled by the OS and the hardware to exhibit strong real-time guarantees . We show that the deterministic memory abstraction can be introduced in the OS at the granularity of single memory pages by exploiting existing hardware support. When deterministic memory pages are accessed, the attribute is propagated through all the levels of the memory hierarchy. Clearly, the hardware needs to be designed to ensure real-time handling of deterministic memory requests. To illustrate the potentialities of the new abstraction, we also propose a novel design for a shared cache controller that takes advantage of deterministic memory. Minimum cache space is guaranteed for deterministic memory, while unused cache space is left available to non-real-time applications. We implemented OS support for deterministic memory in the Linux kernel; and we evaluated the proposed hardware modifications in a cycle-accurate full-system simulator. We study the effectiveness of our approach on a set of synthetic and real benchmarks. Results show that it is possible to achieve (i) temporal determinism as strong as with traditional way-based cache partitioning ; and (ii) giving 50\\% of the private partition space, on average, to the non-real-time applications .", "after_revision": "Poor timing predictability of multicore processors has been a long-standing challenge in the real-time systems community . In this paper, we make a case that a fundamental problem that prevents efficient and predictable real-time com- puting on multicore is the lack of a proper memory abstraction to express memory criticality, which cuts across various layers of the system: the application, OS, and hardware. We therefore propose a new holistic resource management approach driven by a new memory abstraction, which we call Deterministic Memory. The key characteristic of deterministic memory is that the platform - the OS and hardware - guarantees small and tightly bounded worst-case memory access timing. In contrast, we call the conventional memory abstraction as best-effort memory in which only highly pessimistic worst-case bounds can be achieved. We present how the two memory abstractions can be realized with small extensions to existing OS and hardware architecture. In particular, we show the potential benefits of our approach in the context of shared cache management, by presenting a deterministic memory-aware cache architecture and its manage- ment scheme. We evaluate the effectiveness of the deterministic memory-aware cache management approach compared with a conventional way-based cache partitioning approach, using a set of synthetic and real benchmarks. The results show that our approach achieves (i) the same degree of temporal determinism of traditional way-based cache partitioning for deterministic memory, (ii) while freeing up to 49\\% of additional cache space, on average, for best-effort memory, and consequently improving the cache hit rate by 39\\%, on average, for non-real-time workloads. We also discuss how the deterministic memory abstraction can be leveraged in other parts of the memory hierarchy, particularly in the memory controller .", "edit_actions": [{"type": "R", "before": "Achieving strong", "after": "Poor timing predictability of multicore processors has been a long-standing challenge in the", "start_char_pos": 0, "end_char_pos": 16}, {"type": "R", "before": "guarantees in multi-core platforms is challenging due to the extensive hardware resource sharing in the memory hierarchy. Modern platforms and OS's, however, provide no means to appropriately handle memory regions that are crucial for real-time performance", "after": "systems community", "start_char_pos": 27, "end_char_pos": 283}, {"type": "A", "before": null, "after": "make a case that a fundamental problem that prevents efficient and predictable real-time com- puting on multicore is the lack of a proper memory abstraction to express memory criticality, which cuts across various layers of the system: the application, OS, and hardware. We therefore", "start_char_pos": 304, "end_char_pos": 304}, {"type": "R", "before": "OS-level abstraction, namely Deterministic Memory, to define memory regions that are specially handled by the OS and the hardware to exhibit strong real-time guarantees . We show that the deterministic memory abstraction can be introduced in the OS at the granularity of single memory pages by exploiting existing", "after": "holistic resource management approach driven by a new memory abstraction, which we call Deterministic Memory. The key characteristic of deterministic memory is that the platform - the OS and", "start_char_pos": 319, "end_char_pos": 632}, {"type": "R", "before": "support. When deterministic memory pages are accessed,", "after": "- guarantees small and tightly bounded worst-case memory access timing. In contrast, we call the conventional memory abstraction as best-effort memory in which only highly pessimistic worst-case bounds can be achieved. We present how the two memory abstractions can be realized with small extensions to existing OS and hardware architecture. In particular, we show the potential benefits of our approach in the context of shared cache management, by presenting a deterministic memory-aware cache architecture and its manage- ment scheme. We evaluate", "start_char_pos": 642, "end_char_pos": 696}, {"type": "D", "before": "attribute is propagated through all the levels of the memory hierarchy. Clearly, the hardware needs to be designed to ensure real-time handling of deterministic memory requests. To illustrate the potentialities of the new abstraction, we also propose a novel design for a shared cache controller that takes advantage of deterministic memory. Minimum cache space is guaranteed for deterministic memory, while unused cache space is left available to non-real-time applications. We implemented OS support for deterministic memory in the Linux kernel; and we evaluated the proposed hardware modifications in a cycle-accurate full-system simulator. We study the", "after": null, "start_char_pos": 701, "end_char_pos": 1357}, {"type": "R", "before": "our approach on a", "after": "the deterministic memory-aware cache management approach compared with a conventional way-based cache partitioning approach, using a", "start_char_pos": 1375, "end_char_pos": 1392}, {"type": "R", "before": "Results show that it is possible to achieve", "after": "The results show that our approach achieves", "start_char_pos": 1431, "end_char_pos": 1474}, {"type": "R", "before": "temporal determinism as strong as with", "after": "the same degree of temporal determinism of", "start_char_pos": 1479, "end_char_pos": 1517}, {"type": "R", "before": "; and", "after": "for deterministic memory,", "start_char_pos": 1559, "end_char_pos": 1564}, {"type": "R", "before": "giving 50\\% of the private partition", "after": "while freeing up to 49\\% of additional cache", "start_char_pos": 1570, "end_char_pos": 1606}, {"type": "R", "before": "to the", "after": "for best-effort memory, and consequently improving the cache hit rate by 39\\%, on average, for", "start_char_pos": 1626, "end_char_pos": 1632}, {"type": "R", "before": "applications", "after": "workloads. We also discuss how the deterministic memory abstraction can be leveraged in other parts of the memory hierarchy, particularly in the memory controller", "start_char_pos": 1647, "end_char_pos": 1659}], "sents_char_pos": [0, 148, 285, 489, 650, 772, 878, 1042, 1176, 1248, 1344, 1430, 1560]}
+{"doc_id": "1708.04217", "revision_depth": "1", "before_revision": "We introduce a general class of multifractional stochastic processes driven by a multifractional Brownian motion and study estimation of their pointwise H\\\"older exponents (PHE) using the localized generalized quadratic variation approach. By comparing it with the other two benchmark estimation approaches through a simulation study, we show that our estimator has better performance in the case where the observed process is some unknown bivariate function of time and multifractional Brownian motion . The time-varying PHE feature allows us to apply such class of multifractional processes to model stock prices under various market conditions . An empirical study on modeling cross-listed stocks provides new evidence that equity's path roughness varies via time and price informativeness properties from global markets.", "after_revision": "We introduce a general class of stochastic processes driven by a multifractional Brownian motion (mBm) and study estimation problems of their pointwise H\\\"older exponents (PHE) based on a new localized generalized quadratic variation approach. By comparing our suggested approach with the other two existing benchmark estimation approaches (classicial LGQV and oscillation approach) through a simulation study, we show that our estimator has better performance in the case where the observed process is some unknown bivariate function of time and mBm . The time-varying feature of the PHE allows us to apply such class of multifractional processes to model stock prices under various market conditions , that are both time-dependent and region-dependent. As an application to finance, an empirical study on modeling cross-listed stocks provides new evidence that the equity path's roughness varies via time and stock price informativeness properties from global stock markets.", "edit_actions": [{"type": "D", "before": "multifractional", "after": null, "start_char_pos": 32, "end_char_pos": 47}, {"type": "A", "before": null, "after": "(mBm)", "start_char_pos": 113, "end_char_pos": 113}, {"type": "A", "before": null, "after": "problems", "start_char_pos": 135, "end_char_pos": 135}, {"type": "R", "before": "using the", "after": "based on a new", "start_char_pos": 180, "end_char_pos": 189}, {"type": "R", "before": "it", "after": "our suggested approach", "start_char_pos": 255, "end_char_pos": 257}, {"type": "A", "before": null, "after": "existing", "start_char_pos": 277, "end_char_pos": 277}, {"type": "A", "before": null, "after": "(classicial LGQV and oscillation approach)", "start_char_pos": 310, "end_char_pos": 310}, {"type": "R", "before": "multifractional Brownian motion", "after": "mBm", "start_char_pos": 475, "end_char_pos": 506}, {"type": "R", "before": "PHE feature", "after": "feature of the PHE", "start_char_pos": 526, "end_char_pos": 537}, {"type": "R", "before": ". An", "after": ", that are both time-dependent and region-dependent. As an application to finance, an", "start_char_pos": 651, "end_char_pos": 655}, {"type": "R", "before": "equity's path", "after": "the equity path's", "start_char_pos": 731, "end_char_pos": 744}, {"type": "A", "before": null, "after": "stock", "start_char_pos": 775, "end_char_pos": 775}, {"type": "A", "before": null, "after": "stock", "start_char_pos": 821, "end_char_pos": 821}], "sents_char_pos": [0, 241, 508, 652]}
+{"doc_id": "1708.05469", "revision_depth": "1", "before_revision": " We study the problem of guarding an orthogonal polyhedron having reflex edges in just two directions (as opposed to three ) by placing guards on reflex edges only. We show that (r - g)/2 \\left\\lfloor {2} }\\right\\rfloor +1 reflex edge guards are sufficient, where r is the number of reflex edges in a given polyhedron and g is its genus. This bound is tight for g=0. We thereby generalize a classic planar Art Gallery theorem of O'Rourke, which states that the same upper bound holds for vertex guards in an orthogonal polygon with r reflex vertices and g holes. Then we give a similar upper bound in terms of m, the total number of edges in the polyhedron. We prove that (m - 4)/8 \\left\\lfloor {8} }\\right\\rfloor +g reflex edge guards are sufficient, whereas the previous best known bound was \\lfloor 11m/72+g/6 - 1 \\rfloor edge guards (not necessarily reflex). We also discuss the setting in which guards are open (i.e., they are segments without the endpoints), proving that the same results hold even in this more challenging case. Finally, we show how to compute guard locations in O(n log n) time.", "after_revision": "Let an orthogonal polyhedron be the union of a finite set of boxes in \\mathbb R^3 (i.e., cuboids with edges parallel to the coordinate axes), whose surface is a connected 2-manifold. We study the NP-complete problem of guarding a non-convex orthogonal polyhedron having reflex edges in just two directions (as opposed to three , in the general case ) by placing the minimum number of edge guards on reflex edges only. We show that \\left\\lfloor \\frac{r-g{2} }\\right\\rfloor +1 reflex edge guards are sufficient, where r is the number of reflex edges and g is the polyhedron's genus. This bound is tight for g=0. We thereby generalize a classic planar Art Gallery theorem of O'Rourke, which states that the same upper bound holds for vertex guards in an orthogonal polygon with r reflex vertices and g holes. Then we give a similar upper bound in terms of m, the total number of edges in the polyhedron. We prove that \\left\\lfloor \\frac{m-4{8} }\\right\\rfloor +g reflex edge guards are sufficient, whereas the previous best known bound was \\lfloor 11m/72+g/6 \\rfloor-1 edge guards (not necessarily reflex). We also consider the setting in which guards are open (i.e., they are segments without the endpoints), proving that the same results hold even in this more challenging case. Finally, we show how to compute guard locations matching the above bounds in O(n \\log n) time.", "edit_actions": [{"type": "A", "before": null, "after": "Let an orthogonal polyhedron be the union of a finite set of boxes in \\mathbb R^3 (i.e., cuboids with edges parallel to the coordinate axes), whose surface is a connected 2-manifold.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "A", "before": null, "after": "NP-complete", "start_char_pos": 14, "end_char_pos": 14}, {"type": "R", "before": "an", "after": "a non-convex", "start_char_pos": 35, "end_char_pos": 37}, {"type": "A", "before": null, "after": ", in the general case", "start_char_pos": 124, "end_char_pos": 124}, {"type": "A", "before": null, "after": "the minimum number of edge", "start_char_pos": 138, "end_char_pos": 138}, {"type": "D", "before": "(r - g)/2", "after": null, "start_char_pos": 181, "end_char_pos": 190}, {"type": "A", "before": null, "after": "\\frac{r-g", "start_char_pos": 204, "end_char_pos": 204}, {"type": "D", "before": "in a given polyhedron", "after": null, "start_char_pos": 299, "end_char_pos": 320}, {"type": "R", "before": "its", "after": "the polyhedron's", "start_char_pos": 330, "end_char_pos": 333}, {"type": "D", "before": "(m - 4)/8", "after": null, "start_char_pos": 675, "end_char_pos": 684}, {"type": "A", "before": null, "after": "\\frac{m-4", "start_char_pos": 698, "end_char_pos": 698}, {"type": "D", "before": "- 1", "after": null, "start_char_pos": 816, "end_char_pos": 819}, {"type": "A", "before": null, "after": "-1", "start_char_pos": 827, "end_char_pos": 827}, {"type": "R", "before": "discuss", "after": "consider", "start_char_pos": 874, "end_char_pos": 881}, {"type": "A", "before": null, "after": "matching the above bounds", "start_char_pos": 1087, "end_char_pos": 1087}, {"type": "R", "before": "log", "after": "\\log", "start_char_pos": 1095, "end_char_pos": 1098}], "sents_char_pos": [0, 167, 340, 369, 565, 660, 865, 1038]}
+{"doc_id": "1709.00765", "revision_depth": "1", "before_revision": "We consider the problem of implementing a given conditional distribution relating the states of a physical system at two separate times using a physical process with (potentially time-inhomogeneous) master equation dynamics . This problem arises implicitly in many nonequilibrium statistical physics scenarios, e.g., when designing processes to implement some desired computations , feedback-control protocols, and Maxwellian demons. However it is known that many such conditional distributions P over a state space X cannot be implemented using master equation dynamics over just the states in X. Here we show that any conditional distribution P can be implemented---if the process has access to additional \"hidden\" states, not in X. In particular, we show that any conditional distribution can be implemented in a thermodynamically reversible manner (achieving zero entropy production) if there are enough hidden states available. We investigate how the minimal number of such states needed to implement any P in a thermodynamically reversible manner depends on P. We provide exact results in the special case of conditional distributions that reduce to single-valued functions. For the fully general case, we provide an upper bound in terms of the nonnegative rank of P. In particular, we show that having access to one extra binary degree of freedom (doubling the number of states) is sufficient to carry out any P . Our results provide a novel type of bound on the physical resources needed to perform information processing---the size of a system's state space.", "after_revision": "We consider the problem of how to construct a physical process over a state space X that applies some desired conditional distribution P to initial states to produce final states . This problem arises in various scenarios in thermodynamics of computation and nonequilibrium statistical physics ( e.g., when designing processes to implement some desired computation , feedback-control protocol, or Maxwellian demon). It is known that there are classes of conditional distributions that cannot be implemented using any time-inhomogeneous master equation dynamics involving just the states in X. Here we show that any conditional distribution P can however be implemented if the master equation dynamics has access to additional \"hidden\" states, not in X. We investigate how the minimal number of such hidden states needed to implement some P in a thermodynamically reversible manner depends on P. We provide exact results in the special case of conditional distributions that represent single-valued functions. In the general case, we provide an upper bound on the needed number of hidden states in terms of the nonnegative rank of P. In particular, we show that if there are no constraints on what master equation we can construct, then having access to one extra binary degree of freedom (doubling the total number of states) is sufficient to carry out any P with zero entropy production . Our results also imply that for certain P that can be implemented without hidden states, having additional states available permits an implementation that generates less heat. These results can be seen as uncovering and investigating a novel type of cost of the physical resources needed to perform information processing---the size of a system's hidden state space.", "edit_actions": [{"type": "R", "before": "implementing a given conditional distribution relating the states of a physical system at two separate times using a physical process with (potentially time-inhomogeneous) master equation dynamics", "after": "how to construct a physical process over a state space X that applies some desired conditional distribution P to initial states to produce final states", "start_char_pos": 27, "end_char_pos": 223}, {"type": "R", "before": "implicitly in many", "after": "in various scenarios in thermodynamics of computation and", "start_char_pos": 246, "end_char_pos": 264}, {"type": "R", "before": "scenarios,", "after": "(", "start_char_pos": 300, "end_char_pos": 310}, {"type": "R", "before": "computations", "after": "computation", "start_char_pos": 368, "end_char_pos": 380}, {"type": "R", "before": "protocols, and Maxwellian demons. However it", "after": "protocol, or Maxwellian demon). It", "start_char_pos": 400, "end_char_pos": 444}, {"type": "R", "before": "many such conditional distributions P over a state space X", "after": "there are classes of conditional distributions that", "start_char_pos": 459, "end_char_pos": 517}, {"type": "A", "before": null, "after": "any time-inhomogeneous", "start_char_pos": 546, "end_char_pos": 546}, {"type": "R", "before": "over", "after": "involving", "start_char_pos": 572, "end_char_pos": 576}, {"type": "R", "before": "be implemented---if the process", "after": "however be implemented if the master equation dynamics", "start_char_pos": 652, "end_char_pos": 683}, {"type": "D", "before": "In particular, we show that any conditional distribution can be implemented in a thermodynamically reversible manner (achieving zero entropy production) if there are enough hidden states available.", "after": null, "start_char_pos": 736, "end_char_pos": 933}, {"type": "A", "before": null, "after": "hidden", "start_char_pos": 980, "end_char_pos": 980}, {"type": "R", "before": "any", "after": "some", "start_char_pos": 1008, "end_char_pos": 1011}, {"type": "R", "before": "reduce to", "after": "represent", "start_char_pos": 1148, "end_char_pos": 1157}, {"type": "R", "before": "For the fully", "after": "In the", "start_char_pos": 1183, "end_char_pos": 1196}, {"type": "A", "before": null, "after": "on the needed number of hidden states", "start_char_pos": 1237, "end_char_pos": 1237}, {"type": "A", "before": null, "after": "if there are no constraints on what master equation we can construct, then", "start_char_pos": 1305, "end_char_pos": 1305}, {"type": "A", "before": null, "after": "total", "start_char_pos": 1372, "end_char_pos": 1372}, {"type": "A", "before": null, "after": "with zero entropy production", "start_char_pos": 1424, "end_char_pos": 1424}, {"type": "R", "before": "provide", "after": "also imply that for certain P that can be implemented without hidden states, having additional states available permits an implementation that generates less heat. These results can be seen as uncovering and investigating", "start_char_pos": 1439, "end_char_pos": 1446}, {"type": "R", "before": "bound on", "after": "cost of", "start_char_pos": 1463, "end_char_pos": 1471}, {"type": "A", "before": null, "after": "hidden", "start_char_pos": 1561, "end_char_pos": 1561}], "sents_char_pos": [0, 225, 433, 598, 735, 933, 1068, 1182, 1276]}
+{"doc_id": "1709.01190", "revision_depth": "1", "before_revision": "We present FLASH ( %DIFDELCMD < {\\bf %%% F ast%DIFDELCMD < {\\bf %%% L SH%DIFDELCMD < {\\bf %%% A lgorithm for%DIFDELCMD < {\\bf %%% S imilarity search accelerated with %DIFDELCMD < {\\bf %%% H PC(High-Performance Computing) \\textbf{ ), a similarity search system for ultra-high dimensional datasets on a single machine, which does not require similarity computation. Our system is an auspicious illustration of the power of randomized algorithms carefully tailored for high-performance computing platforms. We leverage LSH style randomized indexing procedure and combine it with several principled techniques, such as reservoir sampling, recent advances in one-pass minwise hashing, and count based estimations . The combination, while retaining sound theoretical guarantees , reduces the computational as well as parallelization overhead of our proposal. We provide CPU and hybrid CPU-GPU implementations of FLASH for replicability of our results URL We evaluate FLASH on several real high dimensional datasets coming from different domains including text, malicious URL, click-through prediction, social networks, etc. Our experiments shed new light on the difficulties associated with datasets having several millions of dimensions. Current state-of-the-art implementations either fail on the presented scale or are orders of magnitude slower than our system . FLASH is capable of computing an approximate k-NN graph, from scratch, over full webspam dataset (1.3 billion nonzeros) in less than 10 seconds. Computing full k-NN graph in less than 10 seconds on webspam dataset, using brute-force (n^2D), will require at least 20 TFLOPS. We hope that FLASH gets adopted in practice .", "after_revision": "We present FLASH ( %DIFDELCMD < {\\bf %%% %DIFDELCMD < {\\bf %%% %DIFDELCMD < {\\bf %%% %DIFDELCMD < {\\bf %%% FastLSHAlgorithm forS imilarity search accelerated with %DIFDELCMD < {\\bf %%% \\textbf{H PC ), a similarity search system for ultra-high dimensional datasets on a single machine, that does not require similarity computations and is tailored for high-performance computing platforms. By leveraging a LSH style randomized indexing procedure and combining it with several principled techniques, such as reservoir sampling, recent advances in one-pass minwise hashing, and count based estimations , we reduce the computational and parallelization costs of similarity search, while retaining sound theoretical guarantees . We evaluate FLASH on several real , high-dimensional datasets from different domains , including text, malicious URL, click-through prediction, social networks, etc. Our experiments shed new light on the difficulties associated with datasets having several million dimensions. Current state-of-the-art implementations either fail on the presented scale or are orders of magnitude slower than FLASH . FLASH is capable of computing an approximate k-NN graph, from scratch, over the full webspam dataset (1.3 billion nonzeros) in less than 10 seconds. Computing a full k-NN graph in less than 10 seconds on the webspam dataset, using brute-force (n^2D), will require at least 20 teraflops. We provide CPU and GPU implementations of FLASH for replicability of our results .", "edit_actions": [{"type": "D", "before": "F", "after": null, "start_char_pos": 41, "end_char_pos": 42}, {"type": "D", "before": "ast", "after": null, "start_char_pos": 43, "end_char_pos": 46}, {"type": "D", "before": "L", "after": null, "start_char_pos": 68, "end_char_pos": 69}, {"type": "D", "before": "SH", "after": null, "start_char_pos": 70, "end_char_pos": 72}, {"type": "D", "before": "A", "after": null, "start_char_pos": 94, "end_char_pos": 95}, {"type": "D", "before": "lgorithm for", "after": null, "start_char_pos": 96, "end_char_pos": 108}, {"type": "R", "before": "S", "after": "F", "start_char_pos": 130, "end_char_pos": 131}, {"type": "A", "before": null, "after": "ast", "start_char_pos": 131, "end_char_pos": 131}, {"type": "A", "before": null, "after": "L", "start_char_pos": 131, "end_char_pos": 131}, {"type": "A", "before": null, "after": "SH", "start_char_pos": 131, "end_char_pos": 131}, {"type": "A", "before": null, "after": "A", "start_char_pos": 131, "end_char_pos": 131}, {"type": "A", "before": null, "after": "lgorithm for", "start_char_pos": 131, "end_char_pos": 131}, {"type": "A", "before": null, "after": "S", "start_char_pos": 131, "end_char_pos": 131}, {"type": "D", "before": "H", "after": null, "start_char_pos": 188, "end_char_pos": 189}, {"type": "D", "before": "PC(High-Performance Computing)", "after": null, "start_char_pos": 190, "end_char_pos": 220}, {"type": "A", "before": null, "after": "H", "start_char_pos": 229, "end_char_pos": 229}, {"type": "A", "before": null, "after": "PC", "start_char_pos": 230, "end_char_pos": 230}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 318, "end_char_pos": 323}, {"type": "R", "before": "computation. Our system is an auspicious illustration of the power of randomized algorithms carefully", "after": "computations and is", "start_char_pos": 352, "end_char_pos": 453}, {"type": "R", "before": "We leverage", "after": "By leveraging a", "start_char_pos": 505, "end_char_pos": 516}, {"type": "R", "before": "combine", "after": "combining", "start_char_pos": 561, "end_char_pos": 568}, {"type": "R", "before": ". The combination,", "after": ", we reduce the computational and parallelization costs of similarity search,", "start_char_pos": 709, "end_char_pos": 727}, {"type": "R", "before": ", reduces the computational as well as parallelization overhead of our proposal. We provide CPU and hybrid CPU-GPU implementations of FLASH for replicability of our results URL We", "after": ". We", "start_char_pos": 773, "end_char_pos": 952}, {"type": "R", "before": "high dimensional datasets coming", "after": ", high-dimensional datasets", "start_char_pos": 984, "end_char_pos": 1016}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1040, "end_char_pos": 1040}, {"type": "R", "before": "millions of", "after": "million", "start_char_pos": 1211, "end_char_pos": 1222}, {"type": "R", "before": "our system", "after": "FLASH", "start_char_pos": 1350, "end_char_pos": 1360}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1439, "end_char_pos": 1439}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1519, "end_char_pos": 1519}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1563, "end_char_pos": 1563}, {"type": "R", "before": "TFLOPS. We hope that FLASH gets adopted in practice", "after": "teraflops. We provide CPU and GPU implementations of FLASH for replicability of our results", "start_char_pos": 1632, "end_char_pos": 1683}], "sents_char_pos": [0, 364, 504, 710, 853, 1119, 1234, 1508, 1639]}
+{"doc_id": "1709.08075", "revision_depth": "1", "before_revision": "The calibration of local volatility models from observable option prices has always been an important problem in quantitative finance. The classical formula by Dupire, despite being heavily used by industry practitioners , can potentially produce unstable or even singular volatility surfaces ] . In this paper, we propose a new local volatility calibration technique using the theory of optimal transport. Inspired by the work of Benamou and Brenier, we formulate a martingale optimal transport problem which seeks a diffusion process that matches the known densities of an asset price at two different dates and minimizes a chosen cost function. The process effectively interpolates the dynamic of the asset price between the two dates while recovering the local volatility function. This approach leads to a convex optimisation problemand it is numerically solved ] via an augmented Lagrangian method and the alternative direction method of multipliers (ADMM) algorithm .", "after_revision": "The calibration of volatility models from observable option prices is a fundamental problem in quantitative finance. The most common approach among industry practitioners is based on the celebrated Dupire's formula 6], which requires the knowledge of vanilla option prices for a continuum of strikes and maturities that can only be obtained via some form of price interpolation . In this paper, we propose a new local volatility calibration technique using the theory of optimal transport. We formulate a time continuous martingale optimal transport problem , which seeks a martingale diffusion process that matches the known densities of an asset price at two different dates , while minimizing a chosen cost function. Inspired by the seminal work of Benamou and Brenier 1], we formulate the problem as a convex optimization problem, derive its dual formulation, and solve it numerically via an augmented Lagrangian method and the alternative direction method of multipliers (ADMM) algorithm . The solution effectively reconstructs the dynamic of the asset price between the two dates by recovering the optimal local volatility function, without requiring any time interpolation of the option prices .", "edit_actions": [{"type": "D", "before": "local", "after": null, "start_char_pos": 19, "end_char_pos": 24}, {"type": "R", "before": "has always been an important", "after": "is a fundamental", "start_char_pos": 73, "end_char_pos": 101}, {"type": "R", "before": "classical formula by Dupire, despite being heavily used by industry practitioners , can potentially produce unstable or even singular volatility surfaces", "after": "most common approach among industry practitioners is based on the celebrated Dupire's formula", "start_char_pos": 139, "end_char_pos": 292}, {"type": "A", "before": null, "after": "6", "start_char_pos": 293, "end_char_pos": 293}, {"type": "A", "before": null, "after": ", which requires the knowledge of vanilla option prices for a continuum of strikes and maturities that can only be obtained via some form of price interpolation", "start_char_pos": 294, "end_char_pos": 294}, {"type": "R", "before": "Inspired by the work of Benamou and Brenier, we formulate a", "after": "We formulate a time continuous", "start_char_pos": 407, "end_char_pos": 466}, {"type": "A", "before": null, "after": ",", "start_char_pos": 504, "end_char_pos": 504}, {"type": "A", "before": null, "after": "martingale", "start_char_pos": 519, "end_char_pos": 519}, {"type": "R", "before": "and minimizes", "after": ", while minimizing", "start_char_pos": 612, "end_char_pos": 625}, {"type": "R", "before": "The process effectively interpolates the dynamic of the asset price between the two dates while recovering the local volatility function. This approach leads to a convex optimisation problemand it is numerically solved", "after": "Inspired by the seminal work of Benamou and Brenier", "start_char_pos": 650, "end_char_pos": 868}, {"type": "A", "before": null, "after": "1", "start_char_pos": 869, "end_char_pos": 869}, {"type": "A", "before": null, "after": ", we formulate the problem as a convex optimization problem, derive its dual formulation, and solve it numerically", "start_char_pos": 870, "end_char_pos": 870}, {"type": "A", "before": null, "after": ". The solution effectively reconstructs the dynamic of the asset price between the two dates by recovering the optimal local volatility function, without requiring any time interpolation of the option prices", "start_char_pos": 975, "end_char_pos": 975}], "sents_char_pos": [0, 134, 406, 649, 787]}
+{"doc_id": "1709.09209", "revision_depth": "1", "before_revision": "We present an efficient algorithm for a problem in the interface between clustering and graph embeddings. An embedding \\varphi:G\\rightarrow M of a graph G into a 2-manifold M maps the vertices in V(G) to distinct points and the edges in E(G) to interior-disjoint Jordan arcs between the corresponding vertices. In applications in clustering, cartography, and visualization, nearby vertices and edges are often bundled to a common node or arc , due to data compression or low resolution. This raises the computational problem of deciding whether a given map \\varphi:G\\rightarrow M comes from an embedding. A map \\varphi:G\\rightarrow M is a weak embedding if it can be perturbed into an embedding \\psi_\\varepsilon:G\\rightarrow M with \\|\\varphi-\\psi_\\varepsilon\\|<\\varepsilon for every \\varepsilon> 0. A polynomial-time algorithm for recognizing weak embeddings was recently found by Fulek and Kyncl , 2017 , which reduces to solving a system of linear equations over Z_2. It runs in O(n^{2\\omega})\\leq O(n^{4.75}) time, where \\omega \\approx 2.373 is the matrix multiplication exponent and n is the number of vertices and edges of G. We improve the running time to O(n\\log n). Our algorithm is also conceptually simpler than Fulek and Kyn\\v{c : We perform a sequence of \\emph{local operations} that gradually \"untangles\" the image \\varphi(G) into an embedding \\psi(G), or reports that \\varphi is not a weak embedding. It generalizes a recent technique developed for the case that G is a cycle and the embedding is a simple polygon Akitaya et al., 2016%DIFDELCMD < ]%%% , and combines local constraints on the orientation of subgraphs directly, thereby eliminating the need for solving large systems of linear equations.", "after_revision": "We present an efficient algorithm for a problem in the interface between clustering and graph embeddings. An embedding \\varphi:G\\rightarrow M of a graph G into a 2-manifold M maps the vertices in V(G) to distinct points and the edges in E(G) to interior-disjoint Jordan arcs between the corresponding vertices. In applications in clustering, cartography, and visualization, nearby vertices and edges are often bundled to the same point or overlapping arcs , due to data compression or low resolution. This raises the computational problem of deciding whether a given map \\varphi:G\\rightarrow M comes from an embedding. A map \\varphi:G\\rightarrow M is a weak embedding if it can be perturbed into an embedding \\psi_\\varepsilon:G\\rightarrow M with \\|\\varphi-\\psi_\\varepsilon\\|<\\varepsilon for every \\varepsilon> 0, where \\|.\\| is the unform norm. A polynomial-time algorithm for recognizing weak embeddings has recently been found by Fulek and Kyncl . It reduces the problem to solving a system of linear equations over Z_2. It runs in O(n^{2\\omega})\\leq O(n^{4.75}) time, where \\omega \\in 2, 2.373 ) is the matrix multiplication exponent and n is the number of vertices and edges of G. We improve the running time to O(n\\log n). Our algorithm is also conceptually simpler : We perform a sequence of \\emph{local operations} that gradually \"untangles\" the image \\varphi(G) into an embedding \\psi(G), or reports that \\varphi is not a weak embedding. It %DIFDELCMD < ]%%% combines local constraints on the orientation of subgraphs directly, thereby eliminating the need for solving large systems of linear equations.", "edit_actions": [{"type": "R", "before": "a common node or arc", "after": "the same point or overlapping arcs", "start_char_pos": 421, "end_char_pos": 441}, {"type": "R", "before": "weak embedding", "after": "weak embedding", "start_char_pos": 639, "end_char_pos": 653}, {"type": "R", "before": "0.", "after": "0, where \\|.\\| is the unform norm.", "start_char_pos": 796, "end_char_pos": 798}, {"type": "R", "before": "was recently found by", "after": "has recently been found by", "start_char_pos": 859, "end_char_pos": 880}, {"type": "D", "before": ", 2017", "after": null, "start_char_pos": 897, "end_char_pos": 903}, {"type": "R", "before": ", which reduces", "after": ". It reduces the problem", "start_char_pos": 904, "end_char_pos": 919}, {"type": "R", "before": "\\approx", "after": "\\in", "start_char_pos": 1031, "end_char_pos": 1038}, {"type": "A", "before": null, "after": "2,", "start_char_pos": 1039, "end_char_pos": 1039}, {"type": "A", "before": null, "after": ")", "start_char_pos": 1046, "end_char_pos": 1046}, {"type": "D", "before": "than", "after": null, "start_char_pos": 1219, "end_char_pos": 1223}, {"type": "D", "before": "Fulek and Kyn\\v{c", "after": null, "start_char_pos": 1224, "end_char_pos": 1241}, {"type": "D", "before": "generalizes a recent technique developed for the case that G is a cycle and the embedding is a simple polygon", "after": null, "start_char_pos": 1420, "end_char_pos": 1529}, {"type": "D", "before": "Akitaya et al., 2016", "after": null, "start_char_pos": 1530, "end_char_pos": 1550}, {"type": "D", "before": ", and", "after": null, "start_char_pos": 1568, "end_char_pos": 1573}], "sents_char_pos": [0, 105, 310, 486, 604, 969, 1175, 1416]}
+{"doc_id": "1710.10888", "revision_depth": "1", "before_revision": "Let P be a set of n points in the plane and _{\\theta}(P), has minimum (or maximum) area in optimal O(n\\log n) time and O(n) space, improving the previous O(n^2) bound. Let } O be a set of k lines passing through the origin . We show=\\pi-\\alpha_i and \\Theta=\\min\\{\\Theta_i:i=1,\\ldots,2k\\}. We further obtain} : (1) How such that \\Theta}\\ge to compute the O -hull of P in \\Theta (n\\log n) time and O(n) space, ({2} the complexities are O(\\frac{n}{\\Theta}\\log n) time and O(\\frac{n}{\\Theta}) space. (} 2) how to such that \\Theta}\\ge compute and maintain the rotated hull \\mathcal{OH_{\\theta}(P ) } }} for \\theta\\in [0,2\\pi) in O(kn\\log n) time and O(kn) space, and (3) how to compute in \\Theta(n{\\Theta}} \\log n) time and O( n) space a value of \\theta for which the rectilinear convex hull, \\mathcal{RH_{\\theta}(P ), has minimum area, thus improving the previously best O(n^2) algorithm presented by Bae et al.in 2009.} {\\Theta}) space if \\Theta<\\frac{\\pi}{2}. (3) Finally, given a set \\mathcal{O} such that \\Theta}\\ge }}-convex hull of P of minimum (or maximum) area over all \\theta\\in }[", "after_revision": "Let P be a set of n points in the plane . We compute the value of \\theta\\in 0,2\\pi) for which the rectilinear convex hull of P, denoted by \\mathcal{RH_{\\theta}(P), has minimum (or maximum) area in optimal O(n\\log n) time and O(n) space, improving the previous O(n^2) bound. Let } O be a set of k lines through the origin sorted by slope and let \\alpha_i be the aperture angles of the 2k sectors defined by every pair of two consecutive lines. Let \\Theta_{i=\\pi-\\alpha_i and \\Theta=\\min\\{\\Theta_i:i=1,\\ldots,2k\\}. We further obtain} : (1) Given a set \\mathcal{O such that \\Theta}\\ge\\frac{\\pi to compute the O -convex hull of P in optimal O (n\\log n) time and O(n) space, while if \\Theta<\\frac{\\pi{2} the complexities are O(\\frac{n}{\\Theta}\\log n) time and O(\\frac{n}{\\Theta}) space. (} 2) Given a set \\mathcal{O such that \\Theta}\\ge\\frac{\\pi compute and maintain the _{\\theta}(P ) } boundary of the \\mathcal{O}}_{\\theta for \\theta\\in [0,2\\pi) in O(kn\\log n) time and O(kn) space, or in O(k\\frac{n{\\Theta}} \\log n) time and O( _{\\theta}(P ), has minimum area, thus improving the previously best O(n^2) algorithm presented by Bae et al.in 2009.} k\\frac{n{\\Theta}) space if \\Theta<\\frac{\\pi}{2}. (3) Finally, given a set \\mathcal{O} such that \\Theta}\\ge\\frac{\\pi \\mathcal{O}}_{\\theta-convex hull of P of minimum (or maximum) area over all \\theta\\in }[0,2\\pi) in O(kn\\log n) time and O(kn) space.", "edit_actions": [{"type": "R", "before": "and", "after": ". We compute the value of \\theta\\in", "start_char_pos": 40, "end_char_pos": 43}, {"type": "A", "before": null, "after": "0,2\\pi) for which the rectilinear convex hull of P, denoted by \\mathcal{RH", "start_char_pos": 44, "end_char_pos": 44}, {"type": "D", "before": "passing", "after": null, "start_char_pos": 196, "end_char_pos": 203}, {"type": "R", "before": ". We show", "after": "sorted by slope and let \\alpha_i be the aperture angles of the 2k sectors defined by every pair of two consecutive lines. Let \\Theta_{i", "start_char_pos": 223, "end_char_pos": 232}, {"type": "R", "before": "How", "after": "Given a set \\mathcal{O", "start_char_pos": 314, "end_char_pos": 317}, {"type": "A", "before": null, "after": "\\frac{\\pi", "start_char_pos": 338, "end_char_pos": 338}, {"type": "R", "before": "-hull", "after": "-convex hull", "start_char_pos": 356, "end_char_pos": 361}, {"type": "R", "before": "\\Theta", "after": "optimal O", "start_char_pos": 370, "end_char_pos": 376}, {"type": "R", "before": "(", "after": "while if \\Theta<\\frac{\\pi", "start_char_pos": 408, "end_char_pos": 409}, {"type": "R", "before": "how to", "after": "Given a set \\mathcal{O", "start_char_pos": 502, "end_char_pos": 508}, {"type": "A", "before": null, "after": "\\frac{\\pi", "start_char_pos": 529, "end_char_pos": 529}, {"type": "D", "before": "rotated hull \\mathcal{OH", "after": null, "start_char_pos": 555, "end_char_pos": 579}, {"type": "A", "before": null, "after": "boundary of the", "start_char_pos": 595, "end_char_pos": 595}, {"type": "A", "before": null, "after": "\\mathcal{O", "start_char_pos": 596, "end_char_pos": 596}, {"type": "A", "before": null, "after": "_{\\theta", "start_char_pos": 598, "end_char_pos": 598}, {"type": "R", "before": "and (3) how to compute in \\Theta(n", "after": "or in O(k\\frac{n", "start_char_pos": 659, "end_char_pos": 693}, {"type": "D", "before": "n) space a value of \\theta for which the rectilinear convex hull, \\mathcal{RH", "after": null, "start_char_pos": 723, "end_char_pos": 800}, {"type": "A", "before": null, "after": "k\\frac{n", "start_char_pos": 918, "end_char_pos": 918}, {"type": "A", "before": null, "after": "\\frac{\\pi", "start_char_pos": 1016, "end_char_pos": 1016}, {"type": "A", "before": null, "after": "\\mathcal{O", "start_char_pos": 1017, "end_char_pos": 1017}, {"type": "A", "before": null, "after": "_{\\theta", "start_char_pos": 1019, "end_char_pos": 1019}, {"type": "A", "before": null, "after": "0,2\\pi) in O(kn\\log n) time and O(kn) space.", "start_char_pos": 1087, "end_char_pos": 1087}], "sents_char_pos": [0, 167, 224, 288, 495, 916]}
+{"doc_id": "1711.02048", "revision_depth": "4", "before_revision": "Many experiments randomly assign individuals to either a treatment group with access to a program or a control group without such access. I study what we can learn about the average effects of providing access to the program given data from such experiments when individuals do not comply with their assigned status and when the data may only provide partial information on the receipt of program access across individuals. I propose a new nonparametric multiple treatment selection model that provides a general setup to define a range of parameters evaluating the effects of program access and to exploit the partial information the data may provide on where access was received . I illustrate how a computational procedure can be used to learn about these parameters in this model. Using the developed framework , I analyze the effects of providing access to the Head Start preschool program given data from the Head Start Impact Study. I find that providing access to Head Start can have positive effects on test scores and that these effects can negatively depend on whether access to an alternative preschool was available. In addition , I find that the earning benefits associated with the test score gains can outweigh the net costs for various policies providing access to Head Start .", "after_revision": "I develop tools to learn about the average effects of providing an offer to participate in a program given data from an experiment that randomizes offers. I allow for the complication that individuals may not comply with their assigned status in the sense that those who are not provided an offer may receive one from outside the experiment, and that the data may provide only partial information on the receipt of an offer across individuals. To do so, I propose a new nonparametric selection model with unobserved choice sets that provides a conceptual framework to define a range of parameters evaluating the effects of an offer, exploit the partial information available on offer receipt, and also consider an array of identifying assumptions . I illustrate how a computational procedure can be used to sharply learn about the parameters under the various assumptions. Using these tools , I analyze the effects of a policy that provides an offer to participate in the Head Start preschool program given data from the Head Start Impact Study. I find that such a policy affects a large number of children who take up the offer, and that they subsequently have positive effects on test scores . These effects primarily arise from children who do not have any preschool as an outside option. Performing a cost-benefit analysis , I find that the earning benefits associated with the test score gains can outweigh the net costs associated with the take up of the offer .", "edit_actions": [{"type": "R", "before": "Many experiments randomly assign individuals to either a treatment group with access to a program or a control group without such access. I study what we can", "after": "I develop tools to", "start_char_pos": 0, "end_char_pos": 157}, {"type": "R", "before": "access to the", "after": "an offer to participate in a", "start_char_pos": 203, "end_char_pos": 216}, {"type": "R", "before": "such experiments when individuals do", "after": "an experiment that randomizes offers. I allow for the complication that individuals may", "start_char_pos": 241, "end_char_pos": 277}, {"type": "R", "before": "and when", "after": "in the sense that those who are not provided an offer may receive one from outside the experiment, and that", "start_char_pos": 316, "end_char_pos": 324}, {"type": "R", "before": "only provide", "after": "provide only", "start_char_pos": 338, "end_char_pos": 350}, {"type": "R", "before": "program access", "after": "an offer", "start_char_pos": 389, "end_char_pos": 403}, {"type": "A", "before": null, "after": "To do so,", "start_char_pos": 424, "end_char_pos": 424}, {"type": "R", "before": "multiple treatment selection model", "after": "selection model with unobserved choice sets", "start_char_pos": 455, "end_char_pos": 489}, {"type": "R", "before": "general setup", "after": "conceptual framework", "start_char_pos": 506, "end_char_pos": 519}, {"type": "R", "before": "program access and to", "after": "an offer,", "start_char_pos": 578, "end_char_pos": 599}, {"type": "R", "before": "the data may provide on where access was received", "after": "available on offer receipt, and also consider an array of identifying assumptions", "start_char_pos": 632, "end_char_pos": 681}, {"type": "R", "before": "learn about these parameters in this model. Using the developed framework", "after": "sharply learn about the parameters under the various assumptions. Using these tools", "start_char_pos": 742, "end_char_pos": 815}, {"type": "R", "before": "providing access to", "after": "a policy that provides an offer to participate in", "start_char_pos": 843, "end_char_pos": 862}, {"type": "R", "before": "providing access to Head Start can", "after": "such a policy affects a large number of children who take up the offer, and that they subsequently", "start_char_pos": 953, "end_char_pos": 987}, {"type": "R", "before": "and that these effects can negatively depend on whether access to an alternative preschool was available. In addition", "after": ". These effects primarily arise from children who do not have any preschool as an outside option. Performing a cost-benefit analysis", "start_char_pos": 1025, "end_char_pos": 1142}, {"type": "R", "before": "for various policies providing access to Head Start", "after": "associated with the take up of the offer", "start_char_pos": 1242, "end_char_pos": 1293}], "sents_char_pos": [0, 137, 423, 683, 785, 940, 1130]}
+{"doc_id": "1711.03709", "revision_depth": "1", "before_revision": "Many recent caching systems aim to improve hit ratios, but there is no good sense among practitioners of how much further hit ratios can be improved. In other words, should the systems community continue working on this problem? Currently, there is no principled answer to this question. Most prior work assumes that objects have the same size, but in practice object sizes often vary by several orders of magnitude . The few known results for variable object sizes provide very weak guarantees and are impractical to compute on traces of realistic length. We propose a new method to compute the offline optimal hit ratio under variable object sizes . Our key insight is to represent caching as a min-cost flow problem, hence we call our method the flow-based offline optimal (FOO). We show that, under simple independence assumptions and Zipf popularities , FOO's bounds become tight as the number of objects goes to infinity. From FOOwe develop fast, practical methods to compute nearly tight bounds for the optimal hit ratio, which we call practical flow-based offline optimal (P-FOO). P-FOO enables the first analysis of optimal caching on realistic traces with hundreds of millions of requests. We evaluate P-FOO on several production traces, where results show that recent caching systems are still far from optimal .", "after_revision": "Many recent caching systems aim to improve miss ratios, but there is no good sense among practitioners of how much further miss ratios can be improved. In other words, should the systems community continue working on this problem? Currently, there is no principled answer to this question. In practice, object sizes often vary by several orders of magnitude , where computing the optimal miss ratio (OPT) is known to be NP-hard . The few known results on caching with variable object sizes provide very weak bounds and are impractical to compute on traces of realistic length. We propose a new method to compute upper and lower bounds on OPT . Our key insight is to represent caching as a min-cost flow problem, hence we call our method the flow-based offline optimal (FOO). We prove that, under simple independence assumptions , FOO's bounds become tight as the number of objects goes to infinity. Indeed, FOO's error over 10M requests of production CDN and storage traces is negligible: at most 0.3\\%. FOO thus reveals, for the first time, the limits of caching with variable object sizes. While FOO is very accurate, it is computationally impractical on traces with hundreds of millions of requests. We therefore extend FOO to obtain more efficient bounds on OPT, which we call practical flow-based offline optimal (PFOO). We evaluate PFOO on several full production traces and use it to compare OPT to prior online policies. This analysis shows that current caching systems are in fact still far from optimal , suffering 11-43\\% more cache misses than OPT, whereas the best prior offline bounds suggest that there is essentially no room for improvement .", "edit_actions": [{"type": "R", "before": "hit", "after": "miss", "start_char_pos": 43, "end_char_pos": 46}, {"type": "R", "before": "hit", "after": "miss", "start_char_pos": 122, "end_char_pos": 125}, {"type": "R", "before": "Most prior work assumes that objects have the same size, but in practice", "after": "In practice,", "start_char_pos": 288, "end_char_pos": 360}, {"type": "A", "before": null, "after": ", where computing the optimal miss ratio (OPT) is known to be NP-hard", "start_char_pos": 416, "end_char_pos": 416}, {"type": "R", "before": "for", "after": "on caching with", "start_char_pos": 441, "end_char_pos": 444}, {"type": "R", "before": "guarantees", "after": "bounds", "start_char_pos": 485, "end_char_pos": 495}, {"type": "R", "before": "the offline optimal hit ratio under variable object sizes", "after": "upper and lower bounds on OPT", "start_char_pos": 593, "end_char_pos": 650}, {"type": "R", "before": "show", "after": "prove", "start_char_pos": 787, "end_char_pos": 791}, {"type": "D", "before": "and Zipf popularities", "after": null, "start_char_pos": 836, "end_char_pos": 857}, {"type": "R", "before": "From FOOwe develop fast, practical methods to compute nearly tight bounds for the optimal hit ratio, which we call practical flow-based offline optimal (P-FOO). P-FOO enables the first analysis of optimal caching on realistic", "after": "Indeed, FOO's error over 10M requests of production CDN and storage traces is negligible: at most 0.3\\%. FOO thus reveals, for the first time, the limits of caching with variable object sizes. While FOO is very accurate, it is computationally impractical on", "start_char_pos": 929, "end_char_pos": 1154}, {"type": "R", "before": "evaluate P-FOO on several production traces, where results show that recent", "after": "therefore extend FOO to obtain more efficient bounds on OPT, which we call practical flow-based offline optimal (PFOO). We evaluate PFOO on several full production traces and use it to compare OPT to prior online policies. This analysis shows that current", "start_char_pos": 1204, "end_char_pos": 1279}, {"type": "A", "before": null, "after": "in fact", "start_char_pos": 1300, "end_char_pos": 1300}, {"type": "A", "before": null, "after": ", suffering 11-43\\% more cache misses than OPT, whereas the best prior offline bounds suggest that there is essentially no room for improvement", "start_char_pos": 1324, "end_char_pos": 1324}], "sents_char_pos": [0, 149, 228, 287, 418, 557, 652, 783, 928, 1089, 1200]}
+{"doc_id": "1711.04392", "revision_depth": "1", "before_revision": "It has been well known in financial economics that factor betas depend on observed instruments such as firm specific characteristics and macroeconomic variables, and a key object of interest is the effect of instruments on the factor betas. One of the key features of our model is that we specify the factor betas as functions of time-varying observed instruments that pick up long-run beta fluctuations, plus an orthogonal idiosyncratic component that captures high-frequency movements in beta . It is often the case that researchers do not know whether or not the idiosyncratic beta exists, or its strengths, and thus uniformity is essential for inferences. It is found that the limiting distribution of the estimated instrument effect has a discontinuity when the strength of the idiosyncratic beta is near zero , which makes usual inferences fail to be valid and produce misleading results. In addition, the usual \"plug-in\" method using the estimated asymptotic variance is only valid pointwise . The central goal is to make inference about the effect on the betas of firms' instruments, and to conduct out-of-sample forecast of integrated volatilities using estimated factors. Both procedures should be valid uniformly over a broad class of data generating processes for idiosyncratic betas with various signal strengths and degrees of time-variant. We show that a cross-sectional bootstrap procedure is essential for the uniform inference, and our procedure also features a bias correction for the effect of estimating unknown factors.", "after_revision": "We consider continuous-time models with a large panel of moment conditions, where the structural parameter depends on a set of characteristics, whose effects are of interest. The leading example is the linear factor model in financial economics where factor betas depend on observed characteristics such as firm specific instruments and macroeconomic variables, and their effects pick up long-run time-varying beta fluctuations. We specify the factor betas as the sum of characteristic effects and an orthogonal idiosyncratic parameter that captures high-frequency movements . It is often the case that researchers do not know whether or not the latter exists, or its strengths, and thus the inference about the characteristic effects should be valid uniformly over a broad class of data generating processes for idiosyncratic parameters. We construct our estimation and inference in a two-step continuous-time GMM framework. It is found that the limiting distribution of the estimated characteristic effects has a discontinuity when the variance of the idiosyncratic parameter is near the boundary (zero) , which makes the usual \"plug-in\" method using the estimated asymptotic variance only valid pointwise and may produce either over- or under- coveraging probabilities. We show that the uniformity can be achieved by cross-sectional bootstrap . Our procedure allows both known and estimated factors, and also features a bias correction for the effect of estimating unknown factors.", "edit_actions": [{"type": "R", "before": "It has been well known", "after": "We consider continuous-time models with a large panel of moment conditions, where the structural parameter depends on a set of characteristics, whose effects are of interest. The leading example is the linear factor model", "start_char_pos": 0, "end_char_pos": 22}, {"type": "R", "before": "that", "after": "where", "start_char_pos": 46, "end_char_pos": 50}, {"type": "R", "before": "instruments", "after": "characteristics", "start_char_pos": 83, "end_char_pos": 94}, {"type": "R", "before": "characteristics", "after": "instruments", "start_char_pos": 117, "end_char_pos": 132}, {"type": "R", "before": "a key object of interest is the effect of instruments on the factor betas. One of the key features of our model is that we", "after": "their effects pick up long-run time-varying beta fluctuations. We", "start_char_pos": 166, "end_char_pos": 288}, {"type": "R", "before": "functions of time-varying observed instruments that pick up long-run beta fluctuations, plus", "after": "the sum of characteristic effects and", "start_char_pos": 317, "end_char_pos": 409}, {"type": "R", "before": "component", "after": "parameter", "start_char_pos": 438, "end_char_pos": 447}, {"type": "D", "before": "in beta", "after": null, "start_char_pos": 487, "end_char_pos": 494}, {"type": "R", "before": "idiosyncratic beta", "after": "latter", "start_char_pos": 566, "end_char_pos": 584}, {"type": "R", "before": "uniformity is essential for inferences.", "after": "the inference about the characteristic effects should be valid uniformly over a broad class of data generating processes for idiosyncratic parameters. We construct our estimation and inference in a two-step continuous-time GMM framework.", "start_char_pos": 620, "end_char_pos": 659}, {"type": "R", "before": "instrument effect", "after": "characteristic effects", "start_char_pos": 720, "end_char_pos": 737}, {"type": "R", "before": "strength", "after": "variance", "start_char_pos": 767, "end_char_pos": 775}, {"type": "R", "before": "beta is near zero", "after": "parameter is near the boundary (zero)", "start_char_pos": 797, "end_char_pos": 814}, {"type": "D", "before": "usual inferences fail to be valid and produce misleading results. In addition,", "after": null, "start_char_pos": 829, "end_char_pos": 907}, {"type": "D", "before": "is", "after": null, "start_char_pos": 975, "end_char_pos": 977}, {"type": "R", "before": ". The central goal is to make inference about the effect on the betas of firms' instruments, and to conduct out-of-sample forecast of integrated volatilities using estimated factors. Both procedures should be valid uniformly over a broad class of data generating processes for idiosyncratic betas with various signal strengths and degrees of time-variant.", "after": "and may produce either over- or under- coveraging probabilities.", "start_char_pos": 999, "end_char_pos": 1354}, {"type": "R", "before": "a", "after": "the uniformity can be achieved by", "start_char_pos": 1368, "end_char_pos": 1369}, {"type": "R", "before": "procedure is essential for the uniform inference, and our procedure", "after": ". Our procedure allows both known and estimated factors, and", "start_char_pos": 1396, "end_char_pos": 1463}], "sents_char_pos": [0, 240, 496, 659, 894, 1000, 1181, 1354]}
+{"doc_id": "1711.09877", "revision_depth": "1", "before_revision": "Given the recent trend towards validating the neuroimaging statistical methods, we compared the most popular functional magnetic resonance imaging (fMRI) analysis softwares : AFNI, FSL and SPM, with regard to temporal autocorrelation modelling . We used both resting state and task-based fMRI data, altogether 10 datasets containing 780 scans corresponding to different scanning sequences and different subject populations. In analyses of each fMRI scan we considered different assumed experimental designs , as well as different spatial smoothing levelsand different detrending options . For data used as null data the use of FSL and SPM resulted in much higher false positive rates than the use of AFNI. On the other hand, due to SPM modelling temporal autocorrelation in the least flexible way, it can introduce negative autocorrelations during pre-whitening for scans with long repetition times. For one dataset we observed a big loss of sensitivity when SPM was used. Interestingly, because pre-whitening in FSL and SPM does not remove a substantial part of the temporal autocorrelation in the noise, we observed a relationship that the lower the assumed experimental design frequency, the more likely it was to observe significant activation. Though temporal autocorrelation modelling in AFNI was not perfect, its performance was much higher than the performance of temporal autocorrelation modelling in FSL and SPM. FSL and SPM could improve their autocorrelation modelling approaches for example adopting a noise model similar to the one used by AFNI.", "after_revision": "Given the recent controversies in some neuroimaging statistical methods, we compared the most frequently used functional Magnetic Resonance Imaging (fMRI) analysis packages : AFNI, FSL and SPM, with regard to temporal autocorrelation modeling . We used both resting state and task-based fMRI data, altogether ten datasets containing 780 scans corresponding to different scanning sequences and subject populations. In analyses of each fMRI scan we considered different assumed experimental designs and smoothing levels . For data with no expected experimentally-induced activation, FSL and SPM resulted in much higher false positive rates than AFNI. We showed it was because of residual positive autocorrelation left after pre-whitening. On the other hand, due to SPM modeling temporal autocorrelation in the least flexible way, it can introduce negative autocorrelations during pre-whitening for scans with long repetition times. As a result, for one task-based dataset we observed a large loss of sensitivity when SPM was used. Interestingly, because pre-whitening in FSL and SPM does not remove a substantial part of the temporal autocorrelation in the noise, we found a strong relationship in which the lower the assumed experimental design frequency, the more likely it was to observe significant activation. Though temporal autocorrelation modeling in AFNI was not perfect, its performance was much higher than the performance of temporal autocorrelation modeling in FSL and SPM. FSL and SPM could improve their autocorrelation modeling approaches for example by adopting a noise model similar to the one used by AFNI.", "edit_actions": [{"type": "R", "before": "trend towards validating the", "after": "controversies in some", "start_char_pos": 17, "end_char_pos": 45}, {"type": "R", "before": "popular functional magnetic resonance imaging", "after": "frequently used functional Magnetic Resonance Imaging", "start_char_pos": 101, "end_char_pos": 146}, {"type": "R", "before": "softwares", "after": "packages", "start_char_pos": 163, "end_char_pos": 172}, {"type": "R", "before": "modelling", "after": "modeling", "start_char_pos": 234, "end_char_pos": 243}, {"type": "R", "before": "10", "after": "ten", "start_char_pos": 310, "end_char_pos": 312}, {"type": "D", "before": "different", "after": null, "start_char_pos": 393, "end_char_pos": 402}, {"type": "R", "before": ", as well as different spatial smoothing levelsand different detrending options", "after": "and smoothing levels", "start_char_pos": 507, "end_char_pos": 586}, {"type": "R", "before": "used as null data the use of", "after": "with no expected experimentally-induced activation,", "start_char_pos": 598, "end_char_pos": 626}, {"type": "R", "before": "the use of AFNI.", "after": "AFNI. We showed it was because of residual positive autocorrelation left after pre-whitening.", "start_char_pos": 689, "end_char_pos": 705}, {"type": "R", "before": "modelling", "after": "modeling", "start_char_pos": 736, "end_char_pos": 745}, {"type": "R", "before": "For one", "after": "As a result, for one task-based", "start_char_pos": 900, "end_char_pos": 907}, {"type": "R", "before": "big", "after": "large", "start_char_pos": 930, "end_char_pos": 933}, {"type": "R", "before": "observed a relationship that", "after": "found a strong relationship in which", "start_char_pos": 1109, "end_char_pos": 1137}, {"type": "R", "before": "modelling", "after": "modeling", "start_char_pos": 1281, "end_char_pos": 1290}, {"type": "R", "before": "modelling", "after": "modeling", "start_char_pos": 1397, "end_char_pos": 1406}, {"type": "R", "before": "modelling", "after": "modeling", "start_char_pos": 1471, "end_char_pos": 1480}, {"type": "A", "before": null, "after": "by", "start_char_pos": 1504, "end_char_pos": 1504}], "sents_char_pos": [0, 245, 423, 588, 705, 899, 972, 1248]}
+{"doc_id": "1712.02150", "revision_depth": "2", "before_revision": "An important part of system modeling is determining parameter values, particularly for biomolecular systems, where direct measurements of individual parameters is often hard. While extended Kalman filters have been used for this purpose, the choice of the process noise covariance is generally unclear. Here , we address this issue for biomolecular systems using a combination of Monte Carlo simulations and experimental data, exploiting the dependence of the process noise on the states and parameters, as given in the Langevin framework. We generalize a hybrid extended Kalman filtering technique by updating the estimate-dependent process noise covariance at each time step . We compare the performance of this framework with different fixed values of process noise covariance in biomolecular system models, including an oscillator model, as well as in experimentally measured data for a negative transcriptional feedback circuit. We find that the extended Kalman filter with such process noise covariance update can be optimal in the sense that the innovation sequence becomes white and in achieving balance between the mean square estimation error and parameter convergence time. These results may help in the use of extended Kalman filters for systems with process noise covariance that depends on states and/or parameters.", "after_revision": "An important part of system modeling is determining parameter values, particularly for biomolecular systems, where direct measurements of individual parameters are typically hard. While Extended Kalman Filters have been used for this purpose, the choice of the process noise covariance is generally unclear. In this chapter , we address this issue for biomolecular systems using a combination of Monte Carlo simulations and experimental data, exploiting the dependence of the process noise covariance on the states and parameters, as given in the Langevin framework. We adapt a Hybrid Extended Kalman Filtering technique by updating the process noise covariance at each time step based on estimates . We compare the performance of this framework with different fixed values of process noise covariance in biomolecular system models, including an oscillator model, as well as in experimentally measured data for a negative transcriptional feedback circuit. We find that the Extended Kalman Filter with such process noise covariance update is closer to the optimality condition in the sense that the innovation sequence becomes white and in achieving a balance between the mean square estimation error and parameter convergence time. The results of this chapter may help in the use of Extended Kalman Filters for systems where process noise covariance depends on states and/or parameters.", "edit_actions": [{"type": "R", "before": "is often", "after": "are typically", "start_char_pos": 160, "end_char_pos": 168}, {"type": "R", "before": "extended Kalman filters", "after": "Extended Kalman Filters", "start_char_pos": 181, "end_char_pos": 204}, {"type": "R", "before": "Here", "after": "In this chapter", "start_char_pos": 303, "end_char_pos": 307}, {"type": "A", "before": null, "after": "covariance", "start_char_pos": 474, "end_char_pos": 474}, {"type": "R", "before": "generalize a hybrid extended Kalman filtering", "after": "adapt a Hybrid Extended Kalman Filtering", "start_char_pos": 544, "end_char_pos": 589}, {"type": "D", "before": "estimate-dependent", "after": null, "start_char_pos": 616, "end_char_pos": 634}, {"type": "A", "before": null, "after": "based on estimates", "start_char_pos": 678, "end_char_pos": 678}, {"type": "R", "before": "extended Kalman filter", "after": "Extended Kalman Filter", "start_char_pos": 953, "end_char_pos": 975}, {"type": "R", "before": "can be optimal", "after": "is closer to the optimality condition", "start_char_pos": 1018, "end_char_pos": 1032}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1106, "end_char_pos": 1106}, {"type": "R", "before": "These results", "after": "The results of this chapter", "start_char_pos": 1188, "end_char_pos": 1201}, {"type": "R", "before": "extended Kalman filters for systems with", "after": "Extended Kalman Filters for systems where", "start_char_pos": 1225, "end_char_pos": 1265}, {"type": "D", "before": "that", "after": null, "start_char_pos": 1291, "end_char_pos": 1295}], "sents_char_pos": [0, 174, 302, 540, 680, 935, 1187]}
+{"doc_id": "1712.04064", "revision_depth": "1", "before_revision": "When studying flocking/swarming behaviors in animals one is interested in quantifying and comparing the dynamics of the clustering induced by the coalescence and disbanding of animals in different groups. Motivated by this, we study the problem of obtaining persistent homology based summaries of time-dependent metric data. Given a finite dynamic metric space (DMS ), we construct the zigzag simplicial filtration arising from applying the Rips simplicial complex construction (with a fixed scale parameter) to this finite DMS. Upon passing to 0-th homology with field coefficients, we obtain a zigzag persistence module and, based on standard results, we in turn obtain a persistence diagram or barcode from this zigzag persistence module. We prove that these barcodes are stable under perturbations in the input DMS. In order to formalize the notion of perturbation we introduce a suitable distance between DMSs and we then prove that the value of this distance between any two DMSs admits as a lower bound the bottleneck distance between the Rips barcodes associated to each of two input DMSs. This lower bound can be computed in polynomial time from the DMS inputs. Along the way, we propose a summarization of dynamic metric spaces that captures their time-dependent clustering features which we call formigrams. These set-valued functions generalize the notion of dendrogram, a prevalent tool for hierarchical clustering. In order to elucidate the relationship between our distance between two dynamic metric spaces and the bottleneck distance between their Rips zigzag barcodes, we exploit recent advances in the stability of zigzag persistence ( due to Botnan and Lesnick ). By providing explicit constructions, we prove that for each integer k\\geq 1 there exist pairs of DMSs at finite interleaving distance whose k-th persistent homology barcodes are at infinite barcode distance .", "after_revision": "When studying flocking/swarming behaviors in animals one is interested in quantifying and comparing the dynamics of the clustering induced by the coalescence and disbanding of animals in different groups. In a similar vein, studying the dynamics of social networks leads to the problem of characterizing groups/communities as they form and disperse throughout time. Motivated by this, we study the problem of obtaining persistent homology based summaries of time-dependent data. Given a finite dynamic graph (DG ), we first construct a zigzag persistence module arising from linearizing the dynamic transitive graph naturally induced from the input DG. Based on standard results, we then obtain a persistence diagram or barcode from this zigzag persistence module. We prove that these barcodes are stable under perturbations in the input DG under a suitable distance between DGs that we identify. More precisely, our stability theorem can be interpreted as providing a lower bound for the distance between DGs. Since it relies on barcodes, and their bottleneck distance, this lower bound can be computed in polynomial time from the DG inputs. Since DGs can be given rise by applying the Rips functor (with a fixed threshold) to dynamic metric spaces, we are also able to derive related stable invariants for these richer class of dynamic objects. Along the way, we propose a summarization of dynamic graphs that captures their time-dependent clustering features which we call formigrams. These set-valued functions generalize the notion of dendrogram, a prevalent tool for hierarchical clustering. In order to elucidate the relationship between our distance between two DGs and the bottleneck distance between their associated barcodes, we exploit recent advances in the stability of zigzag persistence due to Botnan and Lesnick , and to Bjerkevik .", "edit_actions": [{"type": "A", "before": null, "after": "In a similar vein, studying the dynamics of social networks leads to the problem of characterizing groups/communities as they form and disperse throughout time.", "start_char_pos": 205, "end_char_pos": 205}, {"type": "D", "before": "metric", "after": null, "start_char_pos": 313, "end_char_pos": 319}, {"type": "R", "before": "metric space (DMS", "after": "graph (DG", "start_char_pos": 349, "end_char_pos": 366}, {"type": "R", "before": "construct the zigzag simplicial filtration arising from applying the Rips simplicial complex construction (with a fixed scale parameter) to this finite DMS. Upon passing to 0-th homology with field coefficients, we obtain a zigzag persistence module and, based", "after": "first construct a zigzag persistence module arising from linearizing the dynamic transitive graph naturally induced from the input DG. Based", "start_char_pos": 373, "end_char_pos": 633}, {"type": "R", "before": "in turn", "after": "then", "start_char_pos": 658, "end_char_pos": 665}, {"type": "R", "before": "DMS. In order to formalize the notion of perturbation we introduce", "after": "DG under", "start_char_pos": 816, "end_char_pos": 882}, {"type": "R", "before": "DMSs and we then prove that the value of this distance between any two DMSs admits as", "after": "DGs that we identify. More precisely, our stability theorem can be interpreted as providing", "start_char_pos": 911, "end_char_pos": 996}, {"type": "R", "before": "the bottleneck distance between the Rips barcodes associated to each of two input DMSs. This", "after": "for the distance between DGs. Since it relies on barcodes, and their bottleneck distance, this", "start_char_pos": 1011, "end_char_pos": 1103}, {"type": "R", "before": "DMS inputs.", "after": "DG inputs. Since DGs can be given rise by applying the Rips functor (with a fixed threshold) to dynamic metric spaces, we are also able to derive related stable invariants for these richer class of dynamic objects.", "start_char_pos": 1160, "end_char_pos": 1171}, {"type": "R", "before": "metric spaces", "after": "graphs", "start_char_pos": 1225, "end_char_pos": 1238}, {"type": "R", "before": "dynamic metric spaces", "after": "DGs", "start_char_pos": 1502, "end_char_pos": 1523}, {"type": "R", "before": "Rips zigzag", "after": "associated", "start_char_pos": 1566, "end_char_pos": 1577}, {"type": "D", "before": "(", "after": null, "start_char_pos": 1654, "end_char_pos": 1655}, {"type": "R", "before": "). By providing explicit constructions, we prove that for each integer k\\geq 1 there exist pairs of DMSs at finite interleaving distance whose k-th persistent homology barcodes are at infinite barcode distance", "after": ", and to Bjerkevik", "start_char_pos": 1682, "end_char_pos": 1891}], "sents_char_pos": [0, 204, 325, 742, 1098, 1171, 1319, 1429, 1684]}
+{"doc_id": "1712.04912", "revision_depth": "1", "before_revision": "We develop a general class of two-step algorithms for heterogeneous treatment effect estimation in observational studies. We first estimate marginal effects and treatment propensities to form an objective function that isolates the heterogeneous treatment effects, and then optimize the learned objective . This approach has several advantages over existing methods. From a practical perspective, our method is very flexible and easy to use: In both steps, we can use any method of our choice , e.g., penalized regression, a deep net , or boosting; moreover, these methods can be fine-tuned by cross-validating on the learned objective . Meanwhile, in the case of penalized kernel regression, we show that our method has a quasi-oracle property , whereby even if our pilot estimates for marginal effects and treatment propensities are not particularly accurate, we achieve the same regret bounds as an oracle who has a-priori knowledge of these nuisance components. We implement variants of our method based on both penalized regression and convolutional neural networks , and find promising performance relative to existing baselines.", "after_revision": "Flexible estimation of heterogeneous treatment effects lies at the heart of many statistical challenges, such as personalized medicine and optimal resource allocation. In this paper, we develop a general class of two-step algorithms for heterogeneous treatment effect estimation in observational studies. We first estimate marginal effects and treatment propensities in order to form an objective function that isolates the causal component of the signal. Then, we optimize this data-adaptive objective function. Our approach has several advantages over existing methods. From a practical perspective, our method is flexible and easy to use: For both steps, we can use any loss-minimization method , e.g., penalized regression, deep neutral networks , or boosting; moreover, these methods can be fine-tuned by cross validation . Meanwhile, in the case of penalized kernel regression, we show that our method has a quasi-oracle property : Even if the pilot estimates for marginal effects and treatment propensities are not particularly accurate, we achieve the same regret bounds as an oracle who has a priori knowledge of these two nuisance components. We implement variants of our approach based on both penalized regression and boosting in a variety of simulation setups , and find promising performance relative to existing baselines.", "edit_actions": [{"type": "R", "before": "We", "after": "Flexible estimation of heterogeneous treatment effects lies at the heart of many statistical challenges, such as personalized medicine and optimal resource allocation. In this paper, we", "start_char_pos": 0, "end_char_pos": 2}, {"type": "A", "before": null, "after": "in order", "start_char_pos": 184, "end_char_pos": 184}, {"type": "R", "before": "heterogeneous treatment effects, and then optimize the learned objective . This", "after": "causal component of the signal. Then, we optimize this data-adaptive objective function. Our", "start_char_pos": 233, "end_char_pos": 312}, {"type": "D", "before": "very", "after": null, "start_char_pos": 412, "end_char_pos": 416}, {"type": "R", "before": "In", "after": "For", "start_char_pos": 443, "end_char_pos": 445}, {"type": "R", "before": "method of our choice", "after": "loss-minimization method", "start_char_pos": 473, "end_char_pos": 493}, {"type": "R", "before": "a deep net", "after": "deep neutral networks", "start_char_pos": 524, "end_char_pos": 534}, {"type": "R", "before": "cross-validating on the learned objective", "after": "cross validation", "start_char_pos": 595, "end_char_pos": 636}, {"type": "R", "before": ", whereby even if our", "after": ": Even if the", "start_char_pos": 746, "end_char_pos": 767}, {"type": "R", "before": "a-priori", "after": "a priori", "start_char_pos": 918, "end_char_pos": 926}, {"type": "A", "before": null, "after": "two", "start_char_pos": 946, "end_char_pos": 946}, {"type": "R", "before": "method", "after": "approach", "start_char_pos": 997, "end_char_pos": 1003}, {"type": "R", "before": "convolutional neural networks", "after": "boosting in a variety of simulation setups", "start_char_pos": 1043, "end_char_pos": 1072}], "sents_char_pos": [0, 121, 307, 367, 549, 638, 967]}
+{"doc_id": "1712.08644", "revision_depth": "1", "before_revision": "We present DeepPicar, a low-cost deep neural network (DNN) based autonomous car platform. DeepPicar is a small scale replication of a real self-driving car called Dave-2 by NVIDIA, which drove on public roads using a deep convolutional neural network (CNN), that takes images from a front-facing camera as input and produces car steering angles as output. DeepPicar uses almost the exact same network architecture---9 layers, 27 million connections and 250K parameters---and can be trained to drive itself , in real-time , using a web camera and a modest Raspberry Pi 3 quad-core platform. Using DeepPicar, we analyze the Pi 3's computing capabilities to support end-to-end deep learning based real-time control of autonomous vehicles. We also systematically compare other contemporary embedded computing platforms using the DeepPicar's CNN based real-time control software as a workload. We find all tested platforms, including the Pi 3, are capable of supporting deep-learning based real-time control, from 20 Hz up to 100 Hz depending on hardware platform. However, shared resource contention remains an important issue that must be considered in applying deep-learning models on shared memory based embedded computing platforms .", "after_revision": "We present DeepPicar, a low-cost deep neural network based autonomous car platform. DeepPicar is a small scale replication of a real self-driving car called DAVE-2 by NVIDIA. DAVE-2 uses a deep convolutional neural network (CNN), which takes images from a front-facing camera as input and produces car steering angles as output. DeepPicar uses the same network architecture---9 layers, 27 million connections and 250K parameters---and can drive itself in real-time using a web camera and a Raspberry Pi 3 quad-core platform. Using DeepPicar, we analyze the Pi 3's computing capabilities to support end-to-end deep learning based real-time control of autonomous vehicles. We also systematically compare other contemporary embedded computing platforms using the DeepPicar's CNN-based real-time control workload. We find that all tested platforms, including the Pi 3, are capable of supporting the CNN-based real-time control, from 20 Hz up to 100 Hz , depending on hardware platform. However, we find that shared resource contention remains an important issue that must be considered in applying CNN models on shared memory based embedded computing platforms ; we observe up to 11.6X execution time increase in the CNN based control loop due to shared resource contention. To protect the CNN workload, we also evaluate state-of-the-art cache partitioning and memory bandwidth throttling techniques on the Pi 3. We find that cache partitioning is ineffective, while memory bandwidth throttling is an effective solution .", "edit_actions": [{"type": "D", "before": "(DNN)", "after": null, "start_char_pos": 53, "end_char_pos": 58}, {"type": "R", "before": "Dave-2 by NVIDIA, which drove on public roads using", "after": "DAVE-2 by NVIDIA. DAVE-2 uses", "start_char_pos": 163, "end_char_pos": 214}, {"type": "R", "before": "that", "after": "which", "start_char_pos": 258, "end_char_pos": 262}, {"type": "R", "before": "almost the exact", "after": "the", "start_char_pos": 371, "end_char_pos": 387}, {"type": "R", "before": "be trained to drive itself ,", "after": "drive itself", "start_char_pos": 479, "end_char_pos": 507}, {"type": "D", "before": ",", "after": null, "start_char_pos": 521, "end_char_pos": 522}, {"type": "D", "before": "modest", "after": null, "start_char_pos": 548, "end_char_pos": 554}, {"type": "R", "before": "CNN based", "after": "CNN-based", "start_char_pos": 837, "end_char_pos": 846}, {"type": "D", "before": "software as a", "after": null, "start_char_pos": 865, "end_char_pos": 878}, {"type": "A", "before": null, "after": "that", "start_char_pos": 897, "end_char_pos": 897}, {"type": "R", "before": "deep-learning based", "after": "the CNN-based", "start_char_pos": 966, "end_char_pos": 985}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1029, "end_char_pos": 1029}, {"type": "A", "before": null, "after": "we find that", "start_char_pos": 1071, "end_char_pos": 1071}, {"type": "R", "before": "deep-learning", "after": "CNN", "start_char_pos": 1162, "end_char_pos": 1175}, {"type": "A", "before": null, "after": "; we observe up to 11.6X execution time increase in the CNN based control loop due to shared resource contention. To protect the CNN workload, we also evaluate state-of-the-art cache partitioning and memory bandwidth throttling techniques on the Pi 3. We find that cache partitioning is ineffective, while memory bandwidth throttling is an effective solution", "start_char_pos": 1235, "end_char_pos": 1235}], "sents_char_pos": [0, 89, 355, 589, 735, 888, 1061]}
+{"doc_id": "1801.01533", "revision_depth": "1", "before_revision": "Alzheimer's Disease (AD) is a neurodegenerative disorder characterized by gradual memory and cognitive function loss. Currently, there are no effective treatments that can reverse or stabilize the symptoms of the disease . Anti-amyloid beta (ABeta) antibodies are the leading drug candidates to treat AD, but the results of clinical trials over the past two decades have been mostly disappointing. This was due to either low effectiveness or serious side effects that emerged during clinical trials. Introducing rational mutations into anti-ABeta antibodies to increase their effectiveness and remove harmful side reactions is a way forward, but the path to take is unclear since the key structural characteristics that determine the binding affinity and selectivity of anti-ABeta antibodies towards amyloid species are not well understood . In this study, we have taken a computational approach to examine how an anti-ABeta antibody binds to one or more ABeta epitopes in its antigen-combining site. Our unbiased fragment-based docking method successfully predicted the emergence of the key EFRH epitopecommonly observed when ABeta binds to anti-ABeta antibodies. MD simulations coupled with MMPBSA binding free energy calculations were used to analyze scenarios described in prior studies concerning the nature of anti-ABeta antibody binding to various ABeta species. Finally, based on observing our MD trajectories of the PFA1 antibody bound to ABeta_2-7 and pE3ABeta_3-8 , we introduced rational mutations into PFA1 in an effort to improve the calculated binding affinity of PFA1 towards the pE3-ABeta_3-8 form of ABeta. Two out of our four proposed mutations stabilized binding. Our study demonstrates that a computational approach can predict beneficial mutations which may lead to an improved drug candidate for AD in the future.", "after_revision": "Alzheimer's Disease (AD) is a neurodegenerative disorder that lacks effective treatment options . Anti-amyloid beta (ABeta) antibodies are the leading drug candidates to treat AD, but the results of clinical trials have been disappointing. Introducing rational mutations into anti-ABeta antibodies to increase their effectiveness is a way forward, but the path to take is unclear . In this study, we demonstrate the use of computational fragment-based docking and MMPBSA binding free energy calculations in the analysis of anti-ABeta antibodies for rational drug design efforts. Our fragment-based docking method successfully predicted the emergence of the common EFRH epitope, MD simulations coupled with MMPBSA binding free energy calculations were used to analyze scenarios described in prior studies , and we introduced rational mutations into PFA1 to improve its calculated binding affinity towards the pE3-ABeta3-8 form of ABeta. Two out of four proposed mutations stabilized binding. Our study demonstrates that a computational approach may lead to an improved drug candidate for AD in the future.", "edit_actions": [{"type": "R", "before": "characterized by gradual memory and cognitive function loss. Currently, there are no effective treatments that can reverse or stabilize the symptoms of the disease", "after": "that lacks effective treatment options", "start_char_pos": 57, "end_char_pos": 220}, {"type": "R", "before": "over the past two decades have been mostly disappointing. This was due to either low effectiveness or serious side effects that emerged during clinical trials.", "after": "have been disappointing.", "start_char_pos": 340, "end_char_pos": 499}, {"type": "D", "before": "and remove harmful side reactions", "after": null, "start_char_pos": 590, "end_char_pos": 623}, {"type": "D", "before": "since the key structural characteristics that determine the binding affinity and selectivity of anti-ABeta antibodies towards amyloid species are not well understood", "after": null, "start_char_pos": 674, "end_char_pos": 839}, {"type": "R", "before": "have taken a computational approach to examine how an", "after": "demonstrate the use of computational fragment-based docking and MMPBSA binding free energy calculations in the analysis of", "start_char_pos": 860, "end_char_pos": 913}, {"type": "R", "before": "antibody binds to one or more ABeta epitopes in its antigen-combining site. Our unbiased", "after": "antibodies for rational drug design efforts. Our", "start_char_pos": 925, "end_char_pos": 1013}, {"type": "R", "before": "key EFRH epitopecommonly observed when ABeta binds to anti-ABeta antibodies.", "after": "common EFRH epitope,", "start_char_pos": 1088, "end_char_pos": 1164}, {"type": "D", "before": "concerning the nature of anti-ABeta antibody binding to various ABeta species. Finally, based on observing our MD trajectories of the PFA1 antibody bound to ABeta_2-7 and pE3ABeta_3-8", "after": null, "start_char_pos": 1291, "end_char_pos": 1474}, {"type": "A", "before": null, "after": "and", "start_char_pos": 1477, "end_char_pos": 1477}, {"type": "R", "before": "in an effort to improve the", "after": "to improve its", "start_char_pos": 1521, "end_char_pos": 1548}, {"type": "R", "before": "of PFA1 towards the pE3-ABeta_3-8", "after": "towards the pE3-ABeta3-8", "start_char_pos": 1577, "end_char_pos": 1610}, {"type": "D", "before": "our", "after": null, "start_char_pos": 1637, "end_char_pos": 1640}, {"type": "D", "before": "can predict beneficial mutations which", "after": null, "start_char_pos": 1738, "end_char_pos": 1776}], "sents_char_pos": [0, 117, 222, 397, 499, 841, 1000, 1164, 1369, 1625, 1684]}
+{"doc_id": "1801.03681", "revision_depth": "1", "before_revision": "There has been growing evidence that cooperative interactions and configurational rearrangements underpin protein functions. But in spite of vast genetic and structural data, the information-dense, heterogeneous nature of protein has held back the progress in understanding the underlying principles. Here we outline a general theory of protein that quantitatively links sequence, dynamics and function: The protein is a strongly-coupled amino acid network whose interactions and large-scale motions are captured by the mechanical propagator, also known as the Green function. The propagator relates the gene to the connectivity of the amino acid network and the transmission of forces through the protein. How well the force pattern conforms to the collective modes of the functional protein is measured by the fitness. Mutations introduce localized perturbations to the propagator which scatter the force field. The emergence of function is manifested by a topological transition when a band of such perturbations divides the protein into subdomains. Epistasis quantifies how much the combined effect of multiple mutations departs from additivity. We find that epistasis is the nonlinearity of the Green function, which corresponds to a sum over multiple scattering paths passing through the localized perturbations . We apply this mechanical framework to the simulations of protein evolution, and observe long-range epistasis which facilitates collective functional modes . Our model lays the foundation for understanding the protein as an evolved state of matter and may be a prototype for other strongly-correlated living systems .", "after_revision": "The function of proteins arises from cooperative interactions and rearrangements of their amino acids, which exhibit large-scale dynamical modes. Long-range correlations have also been revealed in protein sequences, and this has motivated the search for physical links between the observed genetic and dynamic cooperativity. We outline here a simplified theory of protein , which relates sequence correlations to physical interactions and to the emergence of mechanical function. Our protein is modeled as a strongly-coupled amino acid network whose interactions and motions are captured by the mechanical propagator, the Green function. The propagator describes how the gene determines the connectivity of the amino acids, and thereby the transmission of forces . Mutations introduce localized perturbations to the propagator which scatter the force field. The emergence of function is manifested by a topological transition when a band of such perturbations divides the protein into subdomains. We find that epistasis -- the interaction among mutations in the gene -- is related to the nonlinearity of the Green function, which can be interpreted as a sum over multiple scattering paths . We apply this mechanical framework to simulations of protein evolution, and observe long-range epistasis which facilitates collective functional modes .", "edit_actions": [{"type": "R", "before": "There has been growing evidence that", "after": "The function of proteins arises from", "start_char_pos": 0, "end_char_pos": 36}, {"type": "R", "before": "configurational rearrangements underpin protein functions. But in spite of vast genetic and structural data, the information-dense, heterogeneous nature of protein has held back the progress in understanding the underlying principles. Here we outline a general", "after": "rearrangements of their amino acids, which exhibit large-scale dynamical modes. Long-range correlations have also been revealed in protein sequences, and this has motivated the search for physical links between the observed genetic and dynamic cooperativity. We outline here a simplified", "start_char_pos": 66, "end_char_pos": 326}, {"type": "R", "before": "that quantitatively links sequence, dynamics and function: The protein is", "after": ", which relates sequence correlations to physical interactions and to the emergence of mechanical function. Our protein is modeled as", "start_char_pos": 345, "end_char_pos": 418}, {"type": "D", "before": "large-scale", "after": null, "start_char_pos": 480, "end_char_pos": 491}, {"type": "D", "before": "also known as", "after": null, "start_char_pos": 543, "end_char_pos": 556}, {"type": "R", "before": "relates the gene to", "after": "describes how the gene determines", "start_char_pos": 592, "end_char_pos": 611}, {"type": "R", "before": "acid network and", "after": "acids, and thereby", "start_char_pos": 642, "end_char_pos": 658}, {"type": "R", "before": "through the protein. How well the force pattern conforms to the collective modes of the functional protein is measured by the fitness.", "after": ".", "start_char_pos": 686, "end_char_pos": 820}, {"type": "D", "before": "Epistasis quantifies how much the combined effect of multiple mutations departs from additivity.", "after": null, "start_char_pos": 1053, "end_char_pos": 1149}, {"type": "R", "before": "is", "after": "-- the interaction among mutations in the gene -- is related to", "start_char_pos": 1173, "end_char_pos": 1175}, {"type": "R", "before": "corresponds to", "after": "can be interpreted as", "start_char_pos": 1222, "end_char_pos": 1236}, {"type": "D", "before": "passing through the localized perturbations", "after": null, "start_char_pos": 1274, "end_char_pos": 1317}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1358, "end_char_pos": 1361}, {"type": "D", "before": ". Our model lays the foundation for understanding the protein as an evolved state of matter and may be a prototype for other strongly-correlated living systems", "after": null, "start_char_pos": 1475, "end_char_pos": 1634}], "sents_char_pos": [0, 124, 300, 576, 706, 820, 913, 1052, 1149, 1319, 1476]}
+{"doc_id": "1801.10088", "revision_depth": "1", "before_revision": "We propose a dynamic model for the stability of a large financial network , which we formulate as a system of interacting diffusions on the positive half-line with an absorbing boundary at zero. These diffusions represent the distances-to-default of the financial institutions in the network . As a way of modelling correlated exposures and herd behaviour, we consider a common source of noise and a form of mean-reversion in the drift. Moreover, we introduce an endogenous contagion mechanism whereby the default of one institution can lead to a drop in the distances-to-default of the other institutions. In order to have a general model for systemic (or macroscopic) events, we show that the above system converges to a unique mean field limit , which is characterized by a nonlinear SPDE on the half-line with a Dirichlet boundary condition . Depending on the realisations of the common noise and the strength of the mean reversion, this SPDE can exhibit rapid accelerations in the loss of mass at the boundary. In other words, there are events of small probability that can give rise to systemic default cascades sparked by a devaluation of the common exposures and amplified by herd behaviour .", "after_revision": "We propose a dynamic model for systemic risk in a large financial system , which we formulate as a system of interacting diffusions on the positive half-line with an absorbing boundary at zero. These diffusions represent the distances-to-default of the financial institutions . As a way of modelling correlated exposures and herd behaviour, we consider a common source of noise and a form of mean-reversion in the drift. Moreover, we introduce an endogenous contagion mechanism whereby the default of one institution can cause a drop in the distances-to-default of the other institutions. In order to have a general model for systemic (or macroscopic) events, we show that the system converges to a unique mean field limit characterized by a nonlinear SPDE on the half-line ( with a Dirichlet boundary condition ) which governs the conditional law of a 'conditional McKean-Vlasov' type diffusion . Depending on the realizations of the common noise and the strength of the mean reversion, the SPDE can exhibit rapid accelerations in the loss of mass at the boundary. In other words, sparked by a devaluation of the common exposures, there are events of small probability that , through amplification by herd behaviour, can give rise to systemic default cascades .", "edit_actions": [{"type": "R", "before": "the stability of", "after": "systemic risk in", "start_char_pos": 31, "end_char_pos": 47}, {"type": "R", "before": "network", "after": "system", "start_char_pos": 66, "end_char_pos": 73}, {"type": "D", "before": "in the network", "after": null, "start_char_pos": 277, "end_char_pos": 291}, {"type": "R", "before": "lead to", "after": "cause", "start_char_pos": 537, "end_char_pos": 544}, {"type": "D", "before": "above", "after": null, "start_char_pos": 695, "end_char_pos": 700}, {"type": "D", "before": ", which is", "after": null, "start_char_pos": 747, "end_char_pos": 757}, {"type": "A", "before": null, "after": "(", "start_char_pos": 809, "end_char_pos": 809}, {"type": "A", "before": null, "after": ") which governs the conditional law of a 'conditional McKean-Vlasov' type diffusion", "start_char_pos": 846, "end_char_pos": 846}, {"type": "R", "before": "realisations", "after": "realizations", "start_char_pos": 866, "end_char_pos": 878}, {"type": "R", "before": "this", "after": "the", "start_char_pos": 939, "end_char_pos": 943}, {"type": "A", "before": null, "after": "sparked by a devaluation of the common exposures,", "start_char_pos": 1034, "end_char_pos": 1034}, {"type": "A", "before": null, "after": ", through amplification by herd behaviour,", "start_char_pos": 1078, "end_char_pos": 1078}, {"type": "D", "before": "sparked by a devaluation of the common exposures and amplified by herd behaviour", "after": null, "start_char_pos": 1122, "end_char_pos": 1202}], "sents_char_pos": [0, 194, 293, 436, 606, 848, 1017]}
+{"doc_id": "1802.03405", "revision_depth": "1", "before_revision": "Differential equations with distributional sources---in particular, involving delta distributions and/or derivatives thereof---have become increasingly ubiquitous in numerous areas of physics and applied mathematics. It is often of considerable interest to obtain numerical solutions for such equations, but the singular (\" point-like \" ) modeling of the sources in these problems typically introduces nontrivial obstacles for devising a satisfactory numerical implementation . A common method to circumvent these is through some form of delta function approximation procedure on the computational grid , yet this strategy often carries significant limitations . In this paper, we present an alternative technique for tackling such equations : the \"Particle-without-Particle\" method. Previously introduced in the context of the self-force problem in gravitational physics, the idea is to discretize the computational domain into two (or more) disjoint pseudospectral (Chebyshev-Lobatto) grids in such a way that the \"particle\" (the singular source location) is always at the interface between them; in this way , one only needs to solve homogeneous equations in each domain, with the source effectively replaced by jump (boundary) conditions thereon. We prove here that this method is applicable to any linear PDE (of arbitrary order) the source of which is a linear combination of one-dimensional delta distributions and derivatives thereof supported at an arbitrary number of particles. We furthermore apply this method to obtain numerical solutions for various types of distributionally-sourced PDEs: we consider first-order hyperbolic equations with applications to neuroscience models (describing neural populations ), parabolic equations with applications to financial models (describing price formation), second-order hyperbolic equations with applications to wave acoustics, and finally elliptic(Poisson) equations .", "after_revision": "Partial differential equations with distributional sources---in particular, involving (derivatives of) delta distributions---have become increasingly ubiquitous in numerous areas of physics and applied mathematics. It is often of considerable interest to obtain numerical solutions for such equations, but any singular (\" particle \" -like) source modeling invariably introduces nontrivial computational obstacles . A common method to circumvent these is through some form of delta function approximation procedure on the computational grid ; however, this often carries significant limitations on the efficiency of the numerical convergence rates, or sometimes even the resolvability of the problem at all . In this paper, we present an alternative technique for tackling such equations which avoids the singular behavior entirely : the \"Particle-without-Particle\" method. Previously introduced in the context of the self-force problem in gravitational physics, the idea is to discretize the computational domain into two (or more) disjoint pseudospectral (Chebyshev-Lobatto) grids such that the \"particle\" is always at the interface between them; thus , one only needs to solve homogeneous equations in each domain, with the source effectively replaced by jump (boundary) conditions thereon. We prove here that this method yields solutions to any linear PDE the source of which is any linear combination of delta distributions and derivatives thereof supported on a one-dimensional subspace of the problem domain. We then implement it to numerically solve a variety of relevant PDEs: hyperbolic ( with applications to neuroscience and acoustics ), parabolic ( with applications to finance), and elliptic. We generically obtain improved convergence rates relative to typical past implementations relying on delta function approximations .", "edit_actions": [{"type": "R", "before": "Differential", "after": "Partial differential", "start_char_pos": 0, "end_char_pos": 12}, {"type": "R", "before": "delta distributions and/or derivatives thereof---have", "after": "(derivatives of) delta distributions---have", "start_char_pos": 78, "end_char_pos": 131}, {"type": "R", "before": "the", "after": "any", "start_char_pos": 308, "end_char_pos": 311}, {"type": "R", "before": "point-like", "after": "particle", "start_char_pos": 324, "end_char_pos": 334}, {"type": "R", "before": ") modeling of the sources in these problems typically introduces nontrivial obstacles for devising a satisfactory numerical implementation", "after": "-like) source modeling invariably introduces nontrivial computational obstacles", "start_char_pos": 337, "end_char_pos": 475}, {"type": "R", "before": ", yet this strategy", "after": "; however, this", "start_char_pos": 603, "end_char_pos": 622}, {"type": "A", "before": null, "after": "on the efficiency of the numerical convergence rates, or sometimes even the resolvability of the problem at all", "start_char_pos": 661, "end_char_pos": 661}, {"type": "A", "before": null, "after": "which avoids the singular behavior entirely", "start_char_pos": 743, "end_char_pos": 743}, {"type": "R", "before": "in such a way", "after": "such", "start_char_pos": 995, "end_char_pos": 1008}, {"type": "D", "before": "(the singular source location)", "after": null, "start_char_pos": 1029, "end_char_pos": 1059}, {"type": "R", "before": "in this way", "after": "thus", "start_char_pos": 1101, "end_char_pos": 1112}, {"type": "R", "before": "is applicable", "after": "yields solutions", "start_char_pos": 1284, "end_char_pos": 1297}, {"type": "D", "before": "(of arbitrary order)", "after": null, "start_char_pos": 1316, "end_char_pos": 1336}, {"type": "R", "before": "a", "after": "any", "start_char_pos": 1360, "end_char_pos": 1361}, {"type": "D", "before": "one-dimensional", "after": null, "start_char_pos": 1384, "end_char_pos": 1399}, {"type": "R", "before": "at an arbitrary number of particles. We furthermore apply this method to obtain numerical solutions for various types of distributionally-sourced PDEs: we consider first-order hyperbolic equations", "after": "on a one-dimensional subspace of the problem domain. We then implement it to numerically solve a variety of relevant PDEs: hyperbolic (", "start_char_pos": 1454, "end_char_pos": 1650}, {"type": "R", "before": "models (describing neural populations", "after": "and acoustics", "start_char_pos": 1685, "end_char_pos": 1722}, {"type": "R", "before": "equations", "after": "(", "start_char_pos": 1736, "end_char_pos": 1745}, {"type": "R", "before": "financial models (describing price formation), second-order hyperbolic equations with applications to wave acoustics, and finally elliptic(Poisson) equations", "after": "finance), and elliptic. We generically obtain improved convergence rates relative to typical past implementations relying on delta function approximations", "start_char_pos": 1767, "end_char_pos": 1924}], "sents_char_pos": [0, 216, 477, 663, 785, 1100, 1252, 1490]}
+{"doc_id": "1802.03627", "revision_depth": "1", "before_revision": "Time series produced by dynamical systems as frequently the case in neuroscience are rarely stationary but often exhibit quite abrupt changes due to bifurcations or other dynamical phenomena . A plethora of methods for detecting such changes in time series statistics , commonly called change point analysis, have been developed over the years, in addition to test criteria to evaluate change point significance. Issues to consider when developing such methods include computational demands, difficulties arising from either limited amount of data or a large number of covariates, and arriving at statistical tests with sufficient power to detect as many change points as contained in potentially high-dimensional data sets . Here, a general method called Paired Adaptive Regressors for Cumulative Sum (PARCS) is developed for detecting multiple change points in multivariate time series. The method's flexibility to incorporate useful features from other change point detection techniques is highlighted . The advantages of PARCS over existing approaches are demonstrated through a series of simulation experiments, followed by a real data application to neural recordings from rat medial prefrontal cortex during learning.", "after_revision": "Time series , as frequently the case in neuroscience , are rarely stationary , but often exhibit abrupt changes due to attractor transitions or bifurcations in the dynamical systems producing them . A plethora of methods for detecting such change points in time series statistics have been developed over the years, in addition to test criteria to evaluate their significance. Issues to consider when developing change point analysis methods include computational demands, difficulties arising from either limited amount of data or a large number of covariates, and arriving at statistical tests with sufficient power to detect as many changes as contained in potentially high-dimensional time series . Here, a general method called Paired Adaptive Regressors for Cumulative Sum is developed for detecting multiple change points in the mean of multivariate time series. The method's flexibility to incorporate useful features from state-of-the-art change point detection techniques is highlighted , and its advantages over alternative approaches are demonstrated through a series of simulation experiments, along with potential drawbacks and suggestions to remedy them. This is followed by a real data application to neural recordings from rat medial prefrontal cortex during learning.", "edit_actions": [{"type": "R", "before": "produced by dynamical systems", "after": ",", "start_char_pos": 12, "end_char_pos": 41}, {"type": "A", "before": null, "after": ",", "start_char_pos": 81, "end_char_pos": 81}, {"type": "A", "before": null, "after": ",", "start_char_pos": 104, "end_char_pos": 104}, {"type": "D", "before": "quite", "after": null, "start_char_pos": 123, "end_char_pos": 128}, {"type": "R", "before": "bifurcations or other dynamical phenomena", "after": "attractor transitions or bifurcations in the dynamical systems producing them", "start_char_pos": 151, "end_char_pos": 192}, {"type": "R", "before": "changes", "after": "change points", "start_char_pos": 236, "end_char_pos": 243}, {"type": "D", "before": ", commonly called change point analysis,", "after": null, "start_char_pos": 270, "end_char_pos": 310}, {"type": "R", "before": "change point", "after": "their", "start_char_pos": 388, "end_char_pos": 400}, {"type": "R", "before": "such", "after": "change point analysis", "start_char_pos": 450, "end_char_pos": 454}, {"type": "R", "before": "change points", "after": "changes", "start_char_pos": 657, "end_char_pos": 670}, {"type": "R", "before": "data sets", "after": "time series", "start_char_pos": 716, "end_char_pos": 725}, {"type": "D", "before": "(PARCS)", "after": null, "start_char_pos": 804, "end_char_pos": 811}, {"type": "A", "before": null, "after": "the mean of", "start_char_pos": 865, "end_char_pos": 865}, {"type": "R", "before": "other", "after": "state-of-the-art", "start_char_pos": 953, "end_char_pos": 958}, {"type": "R", "before": ". The advantages of PARCS over existing", "after": ", and its advantages over alternative", "start_char_pos": 1008, "end_char_pos": 1047}, {"type": "A", "before": null, "after": "along with potential drawbacks and suggestions to remedy them. This is", "start_char_pos": 1120, "end_char_pos": 1120}], "sents_char_pos": [0, 194, 414, 727, 891, 1009]}
+{"doc_id": "1802.05405", "revision_depth": "1", "before_revision": "We seek to (i) characterize the learning architectures exploited in biological neural networks for training on very few samples, and (ii) port these algorithmic structures to a machine learning context. The Moth Olfactory Network is among the simplest biological neural systems that can learn, and its architecture includes key structural elements widespread in biological neural nets, such as cascaded networks, competitive inhibition, high intrinsic noise, sparsity, reward mechanisms, and Hebbian plasticity. The interactions of these structural elements play a critical enabling role in rapid learning. We assign a computational model of the Moth Olfactory Network the task of learning to read the MNIST digits. This model, MothNet, is closely aligned with the moth's known biophysics and with in vivo electrode data , including data collected from moths learning new odors. We show that MothNet successfully learns to read given very few training samples (1 to 20 samples per class). In this few-samples regime, it substantially outperforms standard machine learning methods such as nearest-neighbors, support-vector machines, and convolutional neural networks ( CNNs) . The MothNet architecture illustrates how our proposed algorithmic structures , derived from biological brains , can be used to build alternative deep neural nets (DNNs) that may potentially avoid some of DNNs current learning rate limitations . This novel, bio-inspired neural network architecture offers a valuable complementary approach to DNN design .", "after_revision": "We seek to (i) characterize the learning architectures exploited in biological neural networks for training on very few samples, and (ii) port these algorithmic structures to a machine learning context. The Moth Olfactory Network is among the simplest biological neural systems that can learn, and its architecture includes key structural elements and mechanisms widespread in biological neural nets, such as cascaded networks, competitive inhibition, high intrinsic noise, sparsity, reward mechanisms, and Hebbian plasticity. These structural biological elements, in combination, enable rapid learning. MothNet is a computational model of the Moth Olfactory Network , closely aligned with the moth's known biophysics and with in vivo electrode data collected from moths learning new odors. We assign this model the task of learning to read the MNIST digits. We show that MothNet successfully learns to read given very few training samples (1 to 10 samples per class). In this few-samples regime, it outperforms standard machine learning methods such as nearest-neighbors, support-vector machines, and neural networks ( NNs), and matches specialized one-shot transfer-learning methods but without the need for pre-training . The MothNet architecture illustrates how algorithmic structures derived from biological brains can be used to build alternative NNs that may avoid some of the learning rate limitations of current engineered NNs .", "edit_actions": [{"type": "A", "before": null, "after": "and mechanisms", "start_char_pos": 348, "end_char_pos": 348}, {"type": "R", "before": "The interactions of these structural elements play a critical enabling role in", "after": "These structural biological elements, in combination, enable", "start_char_pos": 513, "end_char_pos": 591}, {"type": "R", "before": "We assign", "after": "MothNet is", "start_char_pos": 608, "end_char_pos": 617}, {"type": "R", "before": "the task of learning to read the MNIST digits. This model, MothNet, is", "after": ",", "start_char_pos": 670, "end_char_pos": 740}, {"type": "D", "before": ", including data", "after": null, "start_char_pos": 822, "end_char_pos": 838}, {"type": "A", "before": null, "after": "assign this model the task of learning to read the MNIST digits. We", "start_char_pos": 883, "end_char_pos": 883}, {"type": "R", "before": "20", "after": "10", "start_char_pos": 968, "end_char_pos": 970}, {"type": "D", "before": "substantially", "after": null, "start_char_pos": 1022, "end_char_pos": 1035}, {"type": "D", "before": "convolutional", "after": null, "start_char_pos": 1138, "end_char_pos": 1151}, {"type": "R", "before": "CNNs)", "after": "NNs), and matches specialized one-shot transfer-learning methods but without the need for pre-training", "start_char_pos": 1170, "end_char_pos": 1175}, {"type": "R", "before": "our proposed algorithmic structures ,", "after": "algorithmic structures", "start_char_pos": 1219, "end_char_pos": 1256}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1288, "end_char_pos": 1289}, {"type": "R", "before": "deep neural nets (DNNs) that may potentially", "after": "NNs that may", "start_char_pos": 1323, "end_char_pos": 1367}, {"type": "R", "before": "DNNs current", "after": "the", "start_char_pos": 1382, "end_char_pos": 1394}, {"type": "R", "before": ". This novel, bio-inspired neural network architecture offers a valuable complementary approach to DNN design", "after": "of current engineered NNs", "start_char_pos": 1421, "end_char_pos": 1530}], "sents_char_pos": [0, 202, 512, 607, 716, 879, 990, 1177, 1422]}
+{"doc_id": "1802.05995", "revision_depth": "1", "before_revision": "Given a set \\mathcal{O of k orientations in the plane, two points inside a simple polygon P \\mathcal{O if there is an O -staircase contained in P that connects them . The O -kernel of P{\\rm -}{\\rm is the subset of points which \\mathcal{O}-see all the other points in P. This work initiates the study of the computation and maintenance of the \\mathcal{O}-{\\rm Kernel } of a polygon P as we rotate the set \\mathcal{O} by an angle \\theta, denoted \\mathcal{O}-{\\rm Kernel }_{\\theta}(P). In particular, we is formed by either one or two orthogonal orientations, \\mathcal{O}=\\{0^\\circ\\} or \\mathcal{O}=\\{0^\\circ,90^\\circ\\}. For these cases and P being a simple polygon, we } design efficient algorithms for (i) computing and maintaining \\{0^{o\\}} -{\\rm Kernel }_{\\theta}(P) while \\theta varies in [-\\frac{\\pi}{2},\\frac{\\pi}{2}), obtaining the angular intervals where the \\{0^{o\\}} -{\\rm Kernel }_{\\theta}(P) is not empty and (ii) for orthogonal polygons P, computing the orientation \\theta\\in 0, \\frac{\\pi{2}) such that the area and/or the perimeter of the \\{0^{o},90^{o}\\}} -{\\rm Kernel }_{\\theta}(P) are maximum or minimum. These results extend previous works by Gewali, Palios, Rawlins, Schuierer, and Wood .", "after_revision": "Let \\mathcal{O of k orientations in the plane, and let P be a simple polygon in the plane. Given two points p,q inside P, we say that p \\mathcal{O sees q if there is an O -staircase contained in P that connects p and q . The O -{\\rm Kernel of the polygon P, denoted by \\mathcal{O-}{\\rm Kernel (P), is the subset of points which \\mathcal{O}-see all the other points in P. This work initiates the study of the computation and maintenance of \\mathcal{O}-{\\rm Kernel } (P) as we rotate the set \\mathcal{O} by an angle \\theta, denoted \\mathcal{O}-{\\rm Kernel }_{\\theta}(P). In particular, we consider the case when the set \\mathcal{O is formed by either one or two orthogonal orientations, \\mathcal{O}=\\{0^\\circ\\} or \\mathcal{O}=\\{0^\\circ,90^\\circ\\}. For these cases and P being a simple polygon, we } design efficient algorithms for computing and maintaining \\}} the \\mathcal{O -{\\rm Kernel }_{\\theta}(P) while \\theta varies in [-\\frac{\\pi}{2},\\frac{\\pi}{2}), obtaining the angular intervals where \\}} : (i) \\mathcal{O -{\\rm Kernel }_{\\theta}(P) is not empty , (ii) {2}) such that the area and/or the perimeter of the \\{0^{o},90^{o}\\}} \\mathcal{O -{\\rm Kernel }_{\\theta}(P) optimizes area or perimeter. Further, we show how the algorithms can be improved when P is a simple orthogonal polygon .", "edit_actions": [{"type": "R", "before": "Given a set \\mathcal{O", "after": "Let \\mathcal{O", "start_char_pos": 0, "end_char_pos": 22}, {"type": "R", "before": "two points inside", "after": "and let P be", "start_char_pos": 55, "end_char_pos": 72}, {"type": "R", "before": "P \\mathcal{O", "after": "in the plane. Given two points p,q inside P, we say that p \\mathcal{O", "start_char_pos": 90, "end_char_pos": 102}, {"type": "A", "before": null, "after": "sees", "start_char_pos": 103, "end_char_pos": 103}, {"type": "A", "before": null, "after": "q", "start_char_pos": 104, "end_char_pos": 104}, {"type": "R", "before": "-staircase", "after": "-", "start_char_pos": 122, "end_char_pos": 132}, {"type": "A", "before": null, "after": "staircase", "start_char_pos": 132, "end_char_pos": 132}, {"type": "R", "before": "them", "after": "p and q", "start_char_pos": 162, "end_char_pos": 166}, {"type": "R", "before": "-kernel of P", "after": "-", "start_char_pos": 175, "end_char_pos": 187}, {"type": "A", "before": null, "after": "Kernel", "start_char_pos": 192, "end_char_pos": 192}, {"type": "A", "before": null, "after": "of the polygon P, denoted by \\mathcal{O", "start_char_pos": 193, "end_char_pos": 193}, {"type": "A", "before": null, "after": "Kernel", "start_char_pos": 200, "end_char_pos": 200}, {"type": "A", "before": null, "after": "(P),", "start_char_pos": 201, "end_char_pos": 201}, {"type": "D", "before": "the", "after": null, "start_char_pos": 343, "end_char_pos": 346}, {"type": "R", "before": "of a polygon P", "after": "(P)", "start_char_pos": 373, "end_char_pos": 387}, {"type": "A", "before": null, "after": "consider the case when the set \\mathcal{O", "start_char_pos": 506, "end_char_pos": 506}, {"type": "D", "before": "(i)", "after": null, "start_char_pos": 707, "end_char_pos": 710}, {"type": "D", "before": "\\{0^{o", "after": null, "start_char_pos": 737, "end_char_pos": 743}, {"type": "A", "before": null, "after": "the \\mathcal{O", "start_char_pos": 747, "end_char_pos": 747}, {"type": "D", "before": "the \\{0^{o", "after": null, "start_char_pos": 868, "end_char_pos": 878}, {"type": "A", "before": null, "after": ": (i) \\mathcal{O", "start_char_pos": 882, "end_char_pos": 882}, {"type": "R", "before": "and", "after": ",", "start_char_pos": 923, "end_char_pos": 926}, {"type": "D", "before": "for orthogonal polygons P, computing the orientation \\theta\\in", "after": null, "start_char_pos": 932, "end_char_pos": 994}, {"type": "D", "before": "0, \\frac{\\pi", "after": null, "start_char_pos": 995, "end_char_pos": 1007}, {"type": "A", "before": null, "after": "\\mathcal{O", "start_char_pos": 1077, "end_char_pos": 1077}, {"type": "R", "before": "are maximum or minimum. These results extend previous works by Gewali, Palios, Rawlins, Schuierer, and Wood", "after": "optimizes area or perimeter. Further, we show how the algorithms can be improved when P is a simple orthogonal polygon", "start_char_pos": 1105, "end_char_pos": 1212}], "sents_char_pos": [0, 168, 274, 487, 623, 749, 1128]}
+{"doc_id": "1802.06665", "revision_depth": "1", "before_revision": "We study the asymptotic properties of a class of estimators of the structural parameters in dynamic discrete choice games. We consider K-stage policy iteration (PI) estimators, where K denotes the number of policy iterations employed in the estimation. This class nests several estimators proposed in the literature . By considering a \"maximum likelihood\" criterion function, our estimator becomes the K-ML estimator in Aguirregabiria and Mira ( 2007) . By considering a \"minimum distance\" criterion function, it defines a new K-MD estimator, which is an iterative version of the estimators in Pesendorfer and Schmidt-Dengler (2008) . First, we establish that the K-ML estimator is consistent and asymptotically normal for any K. This complements findings in Aguirregabiria and Mira (2007) . Furthermore, we show that the asymptotic variance of the K-ML estimator can exhibit arbitrary patterns as a function K. Second, we establish that the K-MD estimator is consistent and asymptotically normal for any K. For a specific weight matrix, the K-MD estimator has the same asymptotic distribution as the K-ML estimator. Our main result provides an optimal sequence of weight matrices for the K-MD estimator and shows that the optimally weighted K-MD estimator has an asymptotic distribution that is invariant to K. This new result is especially unexpected given the findings in Aguirregabiria and Mira (2007) for K-ML estimators. Our main result implies two new and important corollaries about the optimal 1-MD estimator (derived by Pesendorfer and Schmidt-Dengler (2008)). First, the optimal 1-MD estimator is optimal in the class of K-MD estimators for all K . In other words, additional policy iterations do not provide asymptotic efficiency gains relative to the optimal 1-MD estimator. Second, the optimal 1-MD estimator is more or equally asymptotically efficient than any K-ML estimator for all K .", "after_revision": "We study the asymptotic properties of a class of estimators of the structural parameters in dynamic discrete choice games. We consider K-stage policy iteration (PI) estimators, where K denotes the number of policy iterations employed in the estimation. This class nests several estimators proposed in the literature such as those in Aguirregabiria and Mira ( 2002, 2007) , Pesendorfer and Schmidt-Dengler (2008) , and Pakes et al. (2007). First, we establish that the K-PML estimator is consistent and asymptotically normal for all K. This complements findings in Aguirregabiria and Mira (2007) , who focus on K=1 and K large enough to induce convergence of the estimator . Furthermore, we show under certain conditions that the asymptotic variance of the K-PML estimator can exhibit arbitrary patterns as a function of K. Second, we establish that the K-MD estimator is consistent and asymptotically normal for all K. For a specific weight matrix, the K-MD estimator has the same asymptotic distribution as the K-PML estimator. Our main result provides an optimal sequence of weight matrices for the K-MD estimator and shows that the optimally weighted K-MD estimator has an asymptotic distribution that is invariant to K. The invariance result is especially unexpected given the findings in Aguirregabiria and Mira (2007) for K-PML estimators. Our main result implies two new corollaries about the optimal 1-MD estimator (derived by Pesendorfer and Schmidt-Dengler (2008)). First, the optimal 1-MD estimator is optimal in the class of K-MD estimators . In other words, additional policy iterations do not provide asymptotic efficiency gains relative to the optimal 1-MD estimator. Second, the optimal 1-MD estimator is more or equally asymptotically efficient than any K-PML estimator for all K . Finally, the appendix provides appropriate conditions under which the optimal 1-MD estimator is asymptotically efficient .", "edit_actions": [{"type": "R", "before": ". By considering a \"maximum likelihood\" criterion function, our estimator becomes the K-ML estimator", "after": "such as those", "start_char_pos": 316, "end_char_pos": 416}, {"type": "A", "before": null, "after": "2002,", "start_char_pos": 446, "end_char_pos": 446}, {"type": "R", "before": ". By considering a \"minimum distance\" criterion function, it defines a new K-MD estimator, which is an iterative version of the estimators in", "after": ",", "start_char_pos": 453, "end_char_pos": 594}, {"type": "R", "before": ".", "after": ", and Pakes et al. (2007).", "start_char_pos": 634, "end_char_pos": 635}, {"type": "R", "before": "K-ML", "after": "K-PML", "start_char_pos": 665, "end_char_pos": 669}, {"type": "R", "before": "any", "after": "all", "start_char_pos": 724, "end_char_pos": 727}, {"type": "A", "before": null, "after": ", who focus on K=1 and K large enough to induce convergence of the estimator", "start_char_pos": 791, "end_char_pos": 791}, {"type": "A", "before": null, "after": "under certain conditions", "start_char_pos": 815, "end_char_pos": 815}, {"type": "R", "before": "K-ML", "after": "K-PML", "start_char_pos": 852, "end_char_pos": 856}, {"type": "A", "before": null, "after": "of", "start_char_pos": 912, "end_char_pos": 912}, {"type": "R", "before": "any", "after": "all", "start_char_pos": 1005, "end_char_pos": 1008}, {"type": "R", "before": "K-ML", "after": "K-PML", "start_char_pos": 1105, "end_char_pos": 1109}, {"type": "R", "before": "This new", "after": "The invariance", "start_char_pos": 1316, "end_char_pos": 1324}, {"type": "R", "before": "K-ML", "after": "K-PML", "start_char_pos": 1414, "end_char_pos": 1418}, {"type": "D", "before": "and important", "after": null, "start_char_pos": 1463, "end_char_pos": 1476}, {"type": "D", "before": "for all K", "after": null, "start_char_pos": 1652, "end_char_pos": 1661}, {"type": "R", "before": "K-ML", "after": "K-PML", "start_char_pos": 1880, "end_char_pos": 1884}, {"type": "A", "before": null, "after": ". Finally, the appendix provides appropriate conditions under which the optimal 1-MD estimator is asymptotically efficient", "start_char_pos": 1905, "end_char_pos": 1905}], "sents_char_pos": [0, 122, 252, 317, 454, 635, 730, 793, 915, 1011, 1120, 1315, 1430, 1574, 1791]}
+{"doc_id": "1802.07569", "revision_depth": "1", "before_revision": "Humans and animals have the ability to continually acquire and fine-tune knowledge throughout their lifespan. This ability is mediated by a rich set of neurocognitive functions that together contribute to the early development and experience-driven specialization of our sensorimotor skills . Consequently, the ability to learn from continuous streams of information is crucial for computational learning systems and autonomous agents (inter)acting in the real world . However, continual lifelong learning remains a long-standing challenge for machine learning and neural network models since the incremental acquisition of new skills from non-stationary data distributions generally leads to catastrophic URLetting or interference. This limitation represents a major drawback also for state-of-the-art deep neural network models that typically learn representations from stationary batches of training data, thus without accounting for situations in which the number of tasks is not known a priori and the information becomes incrementally available over time. In this review, we critically summarize the main challenges linked to continual lifelong learning for artificial learning systems and compare existing neural network approaches that alleviate, to different extents, catastrophic interference . Although significant advances have been made in domain-specific continual lifelong learning with neural networks, extensive research efforts are required for the development of general-purpose artificial intelligence and autonomous agents . We discuss well-established research and recent methodological trends motivated by experimentally observed lifelong learning factors in biological systems . Such factors include principles of neurosynaptic stability-plasticity, critical developmental stages , intrinsically motivated exploration, transfer learning, and crossmodal integration .", "after_revision": "Humans and animals have the ability to continually acquire and fine-tune knowledge throughout their lifespan. This ability , referred to as lifelong learning, is mediated by a rich set of neurocognitive mechanisms that together contribute to the development and specialization of our sensorimotor skills as well as to the long-term memory consolidation and retrieval without catastrophic URLetting . Consequently, lifelong learning capabilities are crucial for computational learning systems and autonomous agents interacting in the real world and processing continuous streams of information . However, lifelong learning remains a long-standing challenge for machine learning and neural network models since the continual acquisition of incrementally available information from non-stationary data distributions generally leads to catastrophic URLetting or interference. This limitation represents a major drawback also for state-of-the-art deep and shallow neural network models that typically learn representations from stationary batches of training data, thus without accounting for situations in which the number of tasks is not known a priori and the information becomes incrementally available over time. In this review, we critically summarize the main challenges linked to lifelong learning for artificial learning systems and compare existing neural network approaches that alleviate, to different extents, catastrophic URLetting . Although significant advances have been made in domain-specific learning with neural networks, extensive research efforts are required for the development of robust lifelong learning on autonomous agents and robots . We discuss well-established and emerging research motivated by lifelong learning factors in biological systems such as neurosynaptic plasticity, multi-task transfer learning , intrinsically motivated exploration, and crossmodal learning .", "edit_actions": [{"type": "A", "before": null, "after": ", referred to as lifelong learning,", "start_char_pos": 123, "end_char_pos": 123}, {"type": "R", "before": "functions", "after": "mechanisms", "start_char_pos": 168, "end_char_pos": 177}, {"type": "R", "before": "early development and experience-driven", "after": "development and", "start_char_pos": 210, "end_char_pos": 249}, {"type": "A", "before": null, "after": "as well as to the long-term memory consolidation and retrieval without catastrophic URLetting", "start_char_pos": 292, "end_char_pos": 292}, {"type": "R", "before": "the ability to learn from continuous streams of information is", "after": "lifelong learning capabilities are", "start_char_pos": 309, "end_char_pos": 371}, {"type": "R", "before": "(inter)acting", "after": "interacting", "start_char_pos": 437, "end_char_pos": 450}, {"type": "A", "before": null, "after": "and processing continuous streams of information", "start_char_pos": 469, "end_char_pos": 469}, {"type": "D", "before": "continual", "after": null, "start_char_pos": 481, "end_char_pos": 490}, {"type": "R", "before": "incremental acquisition of new skills", "after": "continual acquisition of incrementally available information", "start_char_pos": 600, "end_char_pos": 637}, {"type": "A", "before": null, "after": "and shallow", "start_char_pos": 811, "end_char_pos": 811}, {"type": "D", "before": "continual", "after": null, "start_char_pos": 1136, "end_char_pos": 1145}, {"type": "R", "before": "interference", "after": "URLetting", "start_char_pos": 1294, "end_char_pos": 1306}, {"type": "D", "before": "continual lifelong", "after": null, "start_char_pos": 1373, "end_char_pos": 1391}, {"type": "R", "before": "general-purpose artificial intelligence and autonomous agents", "after": "robust lifelong learning on autonomous agents and robots", "start_char_pos": 1486, "end_char_pos": 1547}, {"type": "R", "before": "research and recent methodological trends motivated by experimentally observed", "after": "and emerging research motivated by", "start_char_pos": 1578, "end_char_pos": 1656}, {"type": "R", "before": ". Such factors include principles of neurosynaptic stability-plasticity, critical developmental stages", "after": "such as neurosynaptic plasticity, multi-task transfer learning", "start_char_pos": 1705, "end_char_pos": 1807}, {"type": "R", "before": "transfer learning, and crossmodal integration", "after": "and crossmodal learning", "start_char_pos": 1847, "end_char_pos": 1892}], "sents_char_pos": [0, 109, 471, 735, 1065, 1308, 1549, 1706]}
+{"doc_id": "1802.08254", "revision_depth": "1", "before_revision": "As architecture, system, data management, and machine learning communities pay greater attention to innovative big data and data-driven artificial intelligence (in short, AI ) algorithms, architecture, and systems , the pressure of benchmarking rises. However , complexity, diversity, frequently changed workloads, and rapid evolution of big data , especially AI systems raise great challenges in benchmarking . First, for the sake of conciseness, benchmarking scalability, portability cost, reproducibility, and better interpretation of performance data, we need understand what are the abstractions of frequently-appearing units of computation , which we call dwarfs, among big data and AI workloads. Second, for the sake of fairness, the benchmarks must include diversity of data and workloads. Third, for co-design of software and hardware, the benchmarks should be consistent across different communities. Other than creating a new benchmark or proxy for every possible workload, we propose using dwarf-based benchmarks--the combination of eight dwarfs--to represent diversity of big data and AI workloads. The current version--BigDataBench 4.0 provides 13 representative real-world data sets and 47 big data and AI benchmarks, including seven workload types: online service, offline analytics, graph analytics, AI, data warehouse, NoSQL, and streaming. BigDataBench 4.0 is publicly available from URL Also, for the first time, we comprehensively characterize the benchmarks of seven workload types in BigDataBench 4.0 in addition to traditional benchmarks like SPECCPU, PARSEC and HPCC in a hierarchical manner and drill down on five levels, using the Top-Down analysis from an architecture perspective .", "after_revision": "Several fundamental changes in technology indicate domain-specific hardware and software co-design is the only path left. In this context, architecture, system, data management, and machine learning communities pay greater attention to innovative big data and AI algorithms, architecture, and systems . Unfortunately , complexity, diversity, frequently-changed workloads, and rapid evolution of big data and AI systems raise great challenges . First, the traditional benchmarking methodology that creates a new benchmark or proxy for every possible workload is not scalable, or even impossible for Big Data and AI benchmarking. Second, it is prohibitively expensive to tailor the architecture to characteristics of one or more application or even a domain of applications. We consider each big data and AI workload as a pipeline of one or more classes of units of computation performed on different initial or intermediate data inputs, each class of which we call a data motif. On the basis of our previous work that identifies eight data motifs taking up most of the run time of a wide variety of big data and AI workloads, we propose a scalable benchmarking methodology that uses the combination of one or more data motifs---to represent diversity of big data and AI workloads. Following this methodology, we present a unified big data and AI benchmark suite---BigDataBench 4.0 , publicly available URL This unified benchmark suite sheds new light on domain-specific hardware and software co-design: tailoring the system and architecture to characteristics of the unified eight data motifs other than one or more application case by case. Also, for the first time, we comprehensively characterize the CPU pipeline efficiency using the benchmarks of seven workload types in BigDataBench 4.0 .", "edit_actions": [{"type": "R", "before": "As", "after": "Several fundamental changes in technology indicate domain-specific hardware and software co-design is the only path left. In this context,", "start_char_pos": 0, "end_char_pos": 2}, {"type": "R", "before": "data-driven artificial intelligence (in short, AI )", "after": "AI", "start_char_pos": 124, "end_char_pos": 175}, {"type": "R", "before": ", the pressure of benchmarking rises. However", "after": ". Unfortunately", "start_char_pos": 214, "end_char_pos": 259}, {"type": "R", "before": "frequently changed", "after": "frequently-changed", "start_char_pos": 285, "end_char_pos": 303}, {"type": "R", "before": ", especially", "after": "and", "start_char_pos": 347, "end_char_pos": 359}, {"type": "D", "before": "in benchmarking", "after": null, "start_char_pos": 394, "end_char_pos": 409}, {"type": "R", "before": "for the sake of conciseness, benchmarking scalability, portability cost, reproducibility, and better interpretation of performance data, we need understand what are the abstractions of frequently-appearing", "after": "the traditional benchmarking methodology that creates a new benchmark or proxy for every possible workload is not scalable, or even impossible for Big Data and AI benchmarking. Second, it is prohibitively expensive to tailor the architecture to characteristics of one or more application or even a domain of applications. We consider each big data and AI workload as a pipeline of one or more classes of", "start_char_pos": 419, "end_char_pos": 624}, {"type": "R", "before": ",", "after": "performed on different initial or intermediate data inputs, each class of", "start_char_pos": 646, "end_char_pos": 647}, {"type": "R", "before": "dwarfs, among big data and AI workloads. Second, for the sake of fairness, the benchmarks must include diversity of data and workloads. Third, for co-design of software and hardware, the benchmarks should be consistent across different communities. Other than creating a new benchmark or proxy for every possible workload, we propose using dwarf-based benchmarks--the combination of eight dwarfs--to", "after": "a data motif. On the basis of our previous work that identifies eight data motifs taking up most of the run time of a wide variety of big data and AI workloads, we propose a scalable benchmarking methodology that uses the combination of one or more data motifs---to", "start_char_pos": 662, "end_char_pos": 1061}, {"type": "R", "before": "The current version--BigDataBench 4.0 provides 13 representative real-world data sets and 47", "after": "Following this methodology, we present a unified", "start_char_pos": 1112, "end_char_pos": 1204}, {"type": "R", "before": "benchmarks, including seven workload types: online service, offline analytics, graph analytics, AI, data warehouse, NoSQL, and streaming. BigDataBench", "after": "benchmark suite---BigDataBench", "start_char_pos": 1221, "end_char_pos": 1371}, {"type": "R", "before": "is publicly available from URL", "after": ", publicly available URL This unified benchmark suite sheds new light on domain-specific hardware and software co-design: tailoring the system and architecture to characteristics of the unified eight data motifs other than one or more application case by case.", "start_char_pos": 1376, "end_char_pos": 1406}, {"type": "A", "before": null, "after": "CPU pipeline efficiency using the", "start_char_pos": 1469, "end_char_pos": 1469}, {"type": "D", "before": "in addition to traditional benchmarks like SPECCPU, PARSEC and HPCC in a hierarchical manner and drill down on five levels, using the Top-Down analysis from an architecture perspective", "after": null, "start_char_pos": 1525, "end_char_pos": 1709}], "sents_char_pos": [0, 251, 411, 702, 797, 910, 1111, 1358]}
+{"doc_id": "1803.03571", "revision_depth": "1", "before_revision": "From a public-health perspective, the occurrence of drug-drug-interactions (DDI) from multiple drug prescriptions is a serious problem, especially in the elderly population. This is true both for individuals and the system itself since patients with complications due to DDI will likely re-enter the system at a costlier level. We conducted an 18-month study of DDI occurrence in Blumenau (Brazil ; pop. 340,000) using city-wide drug dispensing data from both primary and secondary-care level. Our goal is also to identify possible risk factors in a large population, ultimately characterizing the burden of DDI for patients, doctors and the public system itself . We found 181 distinct DDI being prescribed concomitantly to almost 5 \\% of the city population. We also discovered that women are at a 60\\% risk increase of DDI when compared to men , while only having a 6\\% co-administration risk increase. Analysis of the DDI co-occurrence network reveals which DDI pairs are most associated with the observed greater DDI risk for females, demonstrating that contraception and hormone therapy are not the main culprits of the gender disparity, which is maximized after the reproductive years . Furthermore, DDI risk increases dramatically with age, with patients age 70-79 having a 50-fold risk increase in comparison to patients aged 0-19 . Interestingly, several null models demonstrate that this risk increase is not due to increased polypharmacy with age. Finally, we demonstrate that while the number of drugs and co-administrations help predict a patient's number of DDI (R^2=.413), they are not sufficient to flag these patients accurately, which we achieve by training classifiers with additional data (MCC= .83,F1 = .72 ). These results demonstrate that accurate warning systems for known DDI can be devised for public and private systems alike, resulting in substantial prevention of DDI-related ADR and savings.", "after_revision": "The occurrence of drug-drug-interactions (DDI) from multiple drug prescriptions is a serious problem, both for individuals and health-care systems, since patients with complications due to DDI are likely to re-enter the system at a costlier level. We present a large-scale longitudinal study of the DDI phenomenon at the primary- and secondary-care level using electronic health records from the city of Blumenau in Southern Brazil (pop. ~ 340,000) . This is the first study of DDI we are aware of that follows an entire city longitudinally for 18 months. We found that 181 distinct drug pairs known to interact were dispensed concomitantly to 12 \\% of the patients in the city's public health-care system. Further, 4\\% of the patients were dispensed major DDI combinations, likely to result in very serious adverse reactions and costs we estimate to be larger than previously reported. DDI results are integrated into associative networks for inference and visualization, revealing key medications and interactions. Analysis reveals that women have a 60\\% increased risk of DDI as compared to men ; the increase becomes 90\\% when only major DDI are considered . Furthermore, DDI risk increases substantially with age. Patients aged 70-79 years have a 34\\% risk of DDI when they are prescribed two or more drugs concomitantly . Interestingly, a null model demonstrates that age and women-specific risks from increased polypharmacy far exceed expectations in those populations. This suggests that social and biological factors are at play. Finally, we demonstrate that machine learning classifiers accurately predict patients likely to be administered DDI given their history of prescribed drugs, gender, and age (MCC= .7,AUC = .97 ). These results demonstrate that accurate warning systems for known DDI can be devised for health-care systems leading to substantial reduction of DDI-related adverse reactions and health-care savings.", "edit_actions": [{"type": "R", "before": "From a public-health perspective, the", "after": "The", "start_char_pos": 0, "end_char_pos": 37}, {"type": "D", "before": "especially in the elderly population. This is true", "after": null, "start_char_pos": 136, "end_char_pos": 186}, {"type": "R", "before": "the system itself", "after": "health-care systems,", "start_char_pos": 212, "end_char_pos": 229}, {"type": "R", "before": "will likely", "after": "are likely to", "start_char_pos": 275, "end_char_pos": 286}, {"type": "R", "before": "conducted an 18-month study of DDI occurrence in Blumenau (Brazil ; pop.", "after": "present a large-scale longitudinal study of the DDI phenomenon at the primary- and secondary-care level using electronic health records from the city of Blumenau in Southern Brazil (pop. ~", "start_char_pos": 331, "end_char_pos": 403}, {"type": "D", "before": "using city-wide drug dispensing data from both primary and secondary-care level. Our goal is also to identify possible risk factors in a large population, ultimately characterizing the burden of DDI for patients, doctors and the public system itself", "after": null, "start_char_pos": 413, "end_char_pos": 662}, {"type": "A", "before": null, "after": "This is the first study of DDI we are aware of that follows an entire city longitudinally for 18 months.", "start_char_pos": 665, "end_char_pos": 665}, {"type": "A", "before": null, "after": "that", "start_char_pos": 675, "end_char_pos": 675}, {"type": "R", "before": "DDI being prescribed concomitantly to almost 5", "after": "drug pairs known to interact were dispensed concomitantly to 12", "start_char_pos": 689, "end_char_pos": 735}, {"type": "R", "before": "city population. We also discovered that women are at", "after": "patients in the city's public health-care system. Further, 4\\% of the patients were dispensed major DDI combinations, likely to result in very serious adverse reactions and costs we estimate to be larger than previously reported. DDI results are integrated into associative networks for inference and visualization, revealing key medications and interactions. Analysis reveals that women have", "start_char_pos": 746, "end_char_pos": 799}, {"type": "R", "before": "risk increase of DDI when", "after": "increased risk of DDI as", "start_char_pos": 807, "end_char_pos": 832}, {"type": "R", "before": ", while only having a 6\\% co-administration risk increase. Analysis of the DDI co-occurrence network reveals which DDI pairs are most associated with the observed greater DDI risk for females, demonstrating that contraception and hormone therapy are not the main culprits of the gender disparity, which is maximized after the reproductive years", "after": "; the increase becomes 90\\% when only major DDI are considered", "start_char_pos": 849, "end_char_pos": 1193}, {"type": "R", "before": "dramatically with age, with patients age", "after": "substantially with age. Patients aged", "start_char_pos": 1228, "end_char_pos": 1268}, {"type": "R", "before": "having a 50-fold risk increase in comparison to patients aged 0-19", "after": "years have a 34\\% risk of DDI when they are prescribed two or more drugs concomitantly", "start_char_pos": 1275, "end_char_pos": 1341}, {"type": "R", "before": "several null models demonstrate that this risk increase is not due to increased polypharmacy with age.", "after": "a null model demonstrates that age and women-specific risks from increased polypharmacy far exceed expectations in those populations. This suggests that social and biological factors are at play.", "start_char_pos": 1359, "end_char_pos": 1461}, {"type": "R", "before": "while the number of drugs and co-administrations help predict a patient's number of DDI (R^2=.413), they are not sufficient to flag these patients accurately, which we achieve by training classifiers with additional data", "after": "machine learning classifiers accurately predict patients likely to be administered DDI given their history of prescribed drugs, gender, and age", "start_char_pos": 1491, "end_char_pos": 1711}, {"type": "R", "before": ".83,F1", "after": ".7,AUC", "start_char_pos": 1718, "end_char_pos": 1724}, {"type": "R", "before": ".72", "after": ".97", "start_char_pos": 1727, "end_char_pos": 1730}, {"type": "R", "before": "public and private systems alike, resulting in substantial prevention", "after": "health-care systems leading to substantial reduction", "start_char_pos": 1823, "end_char_pos": 1892}, {"type": "R", "before": "ADR and", "after": "adverse reactions and health-care", "start_char_pos": 1908, "end_char_pos": 1915}], "sents_char_pos": [0, 173, 327, 398, 493, 664, 762, 907, 1195, 1461, 1733]}
+{"doc_id": "1803.08341", "revision_depth": "1", "before_revision": "Fast constant factor approximation algorithms are devised for a ] problem of intersecting a set of straight line segments with the smallest cardinality set of disks of fixed radii r>0, where the set of segments forms a straight line drawing G=(V,E) of a planar graph without edge crossings. Exploiting its tough connection with the geometric Hitting Set problem we give \\left(50+52\\frac{12{13}}+\\varepsilon\\right)-approximate O ( \\left(\\left( |E| ^4\\log{\\varepsilon^2}+\\log|E|{\\varepsilon^3}}\\right) |E| )-time and O(|E| ^2\\log|E| ) spa\\-ce algorithm \\right)\\left({\\varepsilon}}\\right) based on the modified Agarwal-Pan algorithm. More accurate (34+24\\sqrt{2}+\\varepsilon)-, \\left(12+6\\sqrt{3}+\\varepsilon\\right)- and \\left(34+38\\sqrt{\\frac{15}{19}}+\\varepsilon\\right) -ap\\-pro\\-xi\\-mate algorithms are proposed for the case where G is any subgraph of either an outerplane or a Gabriel graph or a Delaunay triangulation respectively, which work within the same time and space complexity bounds, where \\varepsilon>0 is an arbitrary small constant .", "after_revision": "Fast constant factor approximation algorithms are devised for an NP- and W 1]-hard problem of intersecting a set of straight line segments with the smallest cardinality set of disks of fixed radii r>0, where the set of segments forms a straight line drawing G=(V,E) of a planar graph without edge crossings. Exploiting tough connection of the problem with the geometric Hitting Set problem , an \\left(50+52\\frac{12{13}}+\\varepsilon\\right)-approximate O \\left(\\left( |E| ^2+\\frac{|E|\\log|E|{\\varepsilon^2}+\\log|E|{\\varepsilon^3}}\\right) |E| ^2\\log|E| \\right)-time and O\\left(\\frac{|E|^2\\log|E|{\\varepsilon}}\\right)-space algorithm is given based on the modified Agarwal-Pan algorithm. More accurate (34+24\\sqrt{2}+\\varepsilon)-, \\left(12+6\\sqrt{3}+\\varepsilon\\right)- and \\left(34+38\\sqrt{\\frac{15}{19}}+\\varepsilon\\right) -approximate algorithms are also proposed for the case where G is any subgraph of either an outerplane or a Gabriel graph or a Delaunay triangulation respectively, which work within the same time and space complexity bounds, where \\varepsilon>0 is an arbitrary small constant . Related work only tackles the case where E consists of axis-parallel segments, resulting in an O(|E|\\log|E|)-time and O(|E|\\log|E|)-space 8-approximation .", "edit_actions": [{"type": "R", "before": "a", "after": "an NP- and W", "start_char_pos": 62, "end_char_pos": 63}, {"type": "A", "before": null, "after": "1", "start_char_pos": 64, "end_char_pos": 64}, {"type": "A", "before": null, "after": "-hard", "start_char_pos": 65, "end_char_pos": 65}, {"type": "R", "before": "its tough connection", "after": "tough connection of the problem", "start_char_pos": 302, "end_char_pos": 322}, {"type": "R", "before": "we give", "after": ", an", "start_char_pos": 362, "end_char_pos": 369}, {"type": "D", "before": "(", "after": null, "start_char_pos": 428, "end_char_pos": 429}, {"type": "R", "before": "^4\\log", "after": "^2+\\frac{|E|\\log|E|", "start_char_pos": 447, "end_char_pos": 453}, {"type": "D", "before": ")-time and O(|E|", "after": null, "start_char_pos": 504, "end_char_pos": 520}, {"type": "D", "before": ") spa\\-ce algorithm", "after": null, "start_char_pos": 531, "end_char_pos": 550}, {"type": "A", "before": null, "after": "-time and O", "start_char_pos": 558, "end_char_pos": 558}, {"type": "A", "before": null, "after": "\\frac{|E|^2\\log|E|", "start_char_pos": 564, "end_char_pos": 564}, {"type": "A", "before": null, "after": "-space algorithm is given", "start_char_pos": 585, "end_char_pos": 585}, {"type": "R", "before": "-ap\\-pro\\-xi\\-mate algorithms are", "after": "-approximate algorithms are also", "start_char_pos": 769, "end_char_pos": 802}, {"type": "A", "before": null, "after": ". Related work only tackles the case where E consists of axis-parallel segments, resulting in an O(|E|\\log|E|)-time and O(|E|\\log|E|)-space 8-approximation", "start_char_pos": 1046, "end_char_pos": 1046}], "sents_char_pos": [0, 290, 630]}
+{"doc_id": "1803.08341", "revision_depth": "2", "before_revision": "Fast constant factor approximation algorithms are devised for an NP- and W[1]-hard problem of intersecting a set of straight line segments with the smallest cardinality set of disks of fixed radii r>0, where the set of segments forms a straight line drawing G=(V,E) of a planar graph without edge crossings. Exploiting tough connection of the problem with the geometric Hitting Set problem, an \\left(50+52\\frac{12{13}}+\\varepsilon\\right)-approximate O\\left( %DIFDELCMD < \\left(%%% |E|^2+\\frac{|E|\\log|E|{\\varepsilon^2}+\\log|E|{\\varepsilon^3}} \\right) |E|^2\\log |E|%DIFDELCMD < \\right)%%% -time and O\\left( \\frac{|E|^2\\log|E|{\\varepsilon}} \\right)-space algorithm is given based on the modified Agarwal-Pan algorithm. More accurate (34+242+\\varepsilon)- ,%DIFDELCMD < \\left(%%% 12+6\\sqrt{3+\\varepsilon}%DIFDELCMD < \\right)%%% - and \\left(34+ 38\\sqrt{\\frac{15 +\\varepsilon\\right) -approximate algorithms are also proposed for the case where G is any subgraph of either an outerplane or a Gabriel graph or a Delaunay triangulation respectively, which work within the same time and space complexity bounds, where \\varepsilon>0 is an arbitrary small constant. Related work only tackles the case where E consists of axis-parallel segments, resulting in an O( |E|\\log |E| )-time and O( |E|\\log |E| )-space 8-approximation.", "after_revision": "Fast constant factor approximation algorithms are devised for an NP- and W[1]-hard problem of intersecting a set of n straight line segments with the smallest cardinality set of disks of fixed radii r>0, where the set of segments forms a straight line drawing G=(V,E) of a planar graph without edge crossings. Exploiting tough connection of the problem with the geometric Hitting Set problem, an \\left(50+52\\frac{12{13}}+\\varepsilon\\right)-approximate O\\left( %DIFDELCMD < \\left(%%% {\\varepsilon^2}+\\log|E|{\\varepsilon^3}} n^4\\log n \\right) %DIFDELCMD < \\right)%%% -time and O\\left( {\\varepsilon}} n^2\\log n \\right)-space algorithm is given based on the modified Agarwal-Pan algorithm. More accurate (34+242+\\varepsilon)- %DIFDELCMD < \\left(%%% +\\varepsilon}%DIFDELCMD < \\right)%%% and \\left(34+ 44\\sqrt{\\frac{6 +\\varepsilon\\right) -approxi\\-mate algorithms are also proposed for cases where G is any subgraph of either an outerplane graph or a Delaunay triangulation respectively, which work within the same time and space complexity bounds, where \\varepsilon>0 is an arbitrary small constant. Moreover, an O(n^2\\log n)-time and O(n^2)-space 18-approximation is designed for the case where G is any subgraph of a Gabriel graph. To the best of our knowledge, related work only tackles the case where E consists of axis-parallel segments, resulting in an O( n\\log n )-time and O( n\\log n )-space 8-approximation.", "edit_actions": [{"type": "A", "before": null, "after": "n", "start_char_pos": 116, "end_char_pos": 116}, {"type": "D", "before": "|E|^2+\\frac{|E|\\log|E|", "after": null, "start_char_pos": 482, "end_char_pos": 504}, {"type": "A", "before": null, "after": "n^4\\log n", "start_char_pos": 544, "end_char_pos": 544}, {"type": "D", "before": "|E|^2\\log |E|", "after": null, "start_char_pos": 553, "end_char_pos": 566}, {"type": "D", "before": "\\frac{|E|^2\\log|E|", "after": null, "start_char_pos": 608, "end_char_pos": 626}, {"type": "A", "before": null, "after": "n^2\\log n", "start_char_pos": 641, "end_char_pos": 641}, {"type": "D", "before": ",", "after": null, "start_char_pos": 756, "end_char_pos": 757}, {"type": "D", "before": "12+6\\sqrt{3", "after": null, "start_char_pos": 780, "end_char_pos": 791}, {"type": "D", "before": "-", "after": null, "start_char_pos": 828, "end_char_pos": 829}, {"type": "R", "before": "38\\sqrt{\\frac{15", "after": "44\\sqrt{\\frac{6", "start_char_pos": 844, "end_char_pos": 860}, {"type": "R", "before": "-approximate", "after": "-approxi\\-mate", "start_char_pos": 881, "end_char_pos": 893}, {"type": "R", "before": "the case", "after": "cases", "start_char_pos": 927, "end_char_pos": 935}, {"type": "D", "before": "or a Gabriel", "after": null, "start_char_pos": 984, "end_char_pos": 996}, {"type": "R", "before": "Related", "after": "Moreover, an O(n^2\\log n)-time and O(n^2)-space 18-approximation is designed for the case where G is any subgraph of a Gabriel graph. To the best of our knowledge, related", "start_char_pos": 1158, "end_char_pos": 1165}, {"type": "R", "before": "|E|\\log |E|", "after": "n\\log n", "start_char_pos": 1256, "end_char_pos": 1267}, {"type": "R", "before": "|E|\\log |E|", "after": "n\\log n", "start_char_pos": 1282, "end_char_pos": 1293}], "sents_char_pos": [0, 308, 719, 1157]}
+{"doc_id": "1803.10128", "revision_depth": "1", "before_revision": "This paper considers an initial market model, specified by its underlying assets S and its flow of information \\mathbb F, and an arbitrary random time \\tau which is not an \\mathbb F-stopping time. In this setting, our principal goals reside in describing as explicit as possible the set of all deflators (i.e. the dual set of all wealth processes) and the log-optimal portfolio for the stopped model S^{\\tau}. At the practical level, this random time might represent the default time of a firm, the death time of an insured, or more generally an occurrence time of an event that might impact the market somehow. Since the death time and the default time can be seen when they occur only, the progressive enlargement of \\mathbb F with \\tau , that we denote by \\mathbb G, sounds taylor-fit for modelling the new flow of information that incorporates both \\mathbb F and \\tau. Thanks to the deep results of Choulli et al (2016) on the ] martingales classification and representation for progressive enlarged filtration, we completely and explicitly describe all the deflators for (S ^{\\tau,\\mathbb G) in terms of the deflators of the initial market model (S} ,\\mathbb F) . This constitute our first principal (and probably the principal) innovative contribution of this paper. Our second principal contribution lies in describing and measuring the impact of \\tau on log-related optimal portfolios, namely the num\\'eraire portfolio and the portfolio solution to the log-utility maximization problem .", "after_revision": "This paper considers an initial market model, specified by its underlying assets S and its flow of information \\mathbb F, and an arbitrary random time \\tau which might not be an \\mathbb F-stopping time. In this setting, our principal goal resides in describing as explicit as possible the set of all deflators , which constitutes the dual set of all \"admissible\" wealth processes, for the stopped model S^{\\tau}. Since the death time and the default time (that \\tau might represent) can be seen when they occur only, the progressive enlargement of \\mathbb F with \\tau sounds tailor-fit for modelling the new flow of information that incorporates both \\mathbb F and \\tau. Thanks to the deep results of Choulli et al . 8], on martingales classification and representation for progressive enlarged filtration, our aim is fully achieved for both cases of local martingale deflators and general supermartingale delators. The results are illustrated on several particular models for (\\tau,S,\\mathbb F) such as the discrete-time and the jump-diffusion settings for (S ,\\mathbb G) in terms of the deflators of the initial market model (S} ,\\mathbb F) , and the case when \\tau avoids \\mathbb F-stopping times .", "edit_actions": [{"type": "R", "before": "is not", "after": "might not be", "start_char_pos": 162, "end_char_pos": 168}, {"type": "R", "before": "goals reside", "after": "goal resides", "start_char_pos": 228, "end_char_pos": 240}, {"type": "R", "before": "(i.e.", "after": ", which constitutes", "start_char_pos": 304, "end_char_pos": 309}, {"type": "R", "before": "wealth processes) and the log-optimal portfolio", "after": "\"admissible\" wealth processes,", "start_char_pos": 330, "end_char_pos": 377}, {"type": "D", "before": "At the practical level, this random time might represent the default time of a firm, the death time of an insured, or more generally an occurrence time of an event that might impact the market somehow.", "after": null, "start_char_pos": 410, "end_char_pos": 611}, {"type": "A", "before": null, "after": "(that \\tau might represent)", "start_char_pos": 654, "end_char_pos": 654}, {"type": "R", "before": ", that we denote by \\mathbb G, sounds taylor-fit", "after": "sounds tailor-fit", "start_char_pos": 740, "end_char_pos": 788}, {"type": "R", "before": "(2016) on the", "after": ".", "start_char_pos": 918, "end_char_pos": 931}, {"type": "A", "before": null, "after": "8", "start_char_pos": 932, "end_char_pos": 932}, {"type": "A", "before": null, "after": ", on", "start_char_pos": 933, "end_char_pos": 933}, {"type": "R", "before": "we completely and explicitly describe all the deflators for", "after": "our aim is fully achieved for both cases of local martingale deflators and general supermartingale delators. The results are illustrated on several particular models for (\\tau,S,\\mathbb F) such as the discrete-time and the jump-diffusion settings for", "start_char_pos": 1017, "end_char_pos": 1076}, {"type": "D", "before": "^{\\tau", "after": null, "start_char_pos": 1080, "end_char_pos": 1086}, {"type": "R", "before": ". This constitute our first principal (and probably the principal) innovative contribution of this paper. Our second principal contribution lies in describing and measuring the impact of \\tau on log-related optimal portfolios, namely the num\\'eraire portfolio and the portfolio solution to the log-utility maximization problem", "after": ", and the case when \\tau avoids \\mathbb F-stopping times", "start_char_pos": 1168, "end_char_pos": 1494}], "sents_char_pos": [0, 196, 409, 611, 873, 1169, 1273]}
+{"doc_id": "1804.00049", "revision_depth": "1", "before_revision": "Several neuroimaging markers have been established for the early diagnosis of Alzheimer's disease, among them amyloid-beta deposition, glucose metabolism, and gray matter volume. Up to now, these imaging modalitieswere mostly analyzed separately from each other, and little is known about the regional interrelation and dependency of these markers. Gaussian graphical models (GGMs) are able to estimate the conditional dependency between many individual random variables. We applied GGMs for studying the inter-regional associations and dependencies between multimodal imaging markers in prodromal Alzheimer's disease . Data from N=667 subjects with mild cognitive impairment, dementia, and cognitively healthy controls were obtained from the ADNI . Mean amyloid load , glucose metabolism , and gray matter volume was calculated for each brain region. GGMs were estimated using a Bayesian framework and for each individual diagnosis, graph-theoretical statistics were calculated to determine structural changes associated with disease severity. Highly inter-correlated regions, e.g. adjacent regions in the same lobes, formed distinct clusters but included only regions within the same imaging modality. Hardly any associations were found between different modalities, indicating almost no conditional dependency of brain regions across modalities when considering the covariance explained by all other regions. Network measures clustering coefficient and path length were significantly altered across diagnostic groups, with a biphasic u-shape trajectory . GGMs showed almost no conditional dependencies between modalitieswhen at the same time considering various other regions within the same modalities. However, this approach could be used as a clustering method to derive graph statistics in future studies omitting the need to binarize the network as currently being done for connections based on Pearson correlation .", "after_revision": "A sequence of pathological changes takes place in Alzheimer's disease, which can be assessed in vivo using various brain imaging methods. Currently, there is no appropriate statistical model available that can easily integrate multiple imaging modalities, being able to utilize the additional information provided from the combined data. We applied Gaussian graphical models (GGMs) for analyzing the conditional dependency networks of multimodal neuroimaging data and assessed alterations of the network structure in mild cognitive impairment (MCI) and Alzheimer's dementia (AD) compared to cognitively healthy controls . Data from N=667 subjects were obtained from the Alzheimer's Disease Neuroimaging Initiative . Mean amyloid load (AV45-PET) , glucose metabolism (FDG-PET) , and gray matter volume (MRI) was calculated for each brain region. Separate GGMs were estimated using a Bayesian framework for the combined multimodal data for each diagnostic category. Graph-theoretical statistics were calculated to determine network alterations associated with disease severity. Network measures clustering coefficient , path length and small-world coefficient were significantly altered across diagnostic groups, with a biphasic u-shape trajectory , i.e. increased small-world coefficient in early MCI, intermediate values in late MCI, and decreased values in AD patients compared to controls. In contrast, no group differences were found for clustering coefficient and small-world coefficient when estimating conditional dependency networks on single imaging modalities . GGMs provide a useful methodology to analyze the conditional dependency networks of multimodal neuroimaging data .", "edit_actions": [{"type": "R", "before": "Several neuroimaging markers have been established for the early diagnosis of", "after": "A sequence of pathological changes takes place in", "start_char_pos": 0, "end_char_pos": 77}, {"type": "R", "before": "among them amyloid-beta deposition, glucose metabolism, and gray matter volume. Up to now, these imaging modalitieswere mostly analyzed separately from each other, and little is known about the regional interrelation and dependency of these markers.", "after": "which can be assessed in vivo using various brain imaging methods. Currently, there is no appropriate statistical model available that can easily integrate multiple imaging modalities, being able to utilize the additional information provided from the combined data. We applied", "start_char_pos": 99, "end_char_pos": 348}, {"type": "R", "before": "are able to estimate", "after": "for analyzing", "start_char_pos": 382, "end_char_pos": 402}, {"type": "R", "before": "between many individual random variables. We applied GGMs for studying the inter-regional associations and dependencies between multimodal imaging markers in prodromal", "after": "networks of multimodal neuroimaging data and assessed alterations of the network structure in mild cognitive impairment (MCI) and", "start_char_pos": 430, "end_char_pos": 597}, {"type": "R", "before": "disease", "after": "dementia (AD) compared to cognitively healthy controls", "start_char_pos": 610, "end_char_pos": 617}, {"type": "D", "before": "with mild cognitive impairment, dementia, and cognitively healthy controls", "after": null, "start_char_pos": 645, "end_char_pos": 719}, {"type": "R", "before": "ADNI", "after": "Alzheimer's Disease Neuroimaging Initiative", "start_char_pos": 743, "end_char_pos": 747}, {"type": "A", "before": null, "after": "(AV45-PET)", "start_char_pos": 768, "end_char_pos": 768}, {"type": "A", "before": null, "after": "(FDG-PET)", "start_char_pos": 790, "end_char_pos": 790}, {"type": "A", "before": null, "after": "(MRI)", "start_char_pos": 816, "end_char_pos": 816}, {"type": "A", "before": null, "after": "Separate", "start_char_pos": 855, "end_char_pos": 855}, {"type": "R", "before": "and for each individual diagnosis, graph-theoretical", "after": "for the combined multimodal data for each diagnostic category. Graph-theoretical", "start_char_pos": 903, "end_char_pos": 955}, {"type": "R", "before": "structural changes", "after": "network alterations", "start_char_pos": 996, "end_char_pos": 1014}, {"type": "D", "before": "Highly inter-correlated regions, e.g. adjacent regions in the same lobes, formed distinct clusters but included only regions within the same imaging modality. Hardly any associations were found between different modalities, indicating almost no conditional dependency of brain regions across modalities when considering the covariance explained by all other regions.", "after": null, "start_char_pos": 1049, "end_char_pos": 1415}, {"type": "R", "before": "and path length", "after": ", path length and small-world coefficient", "start_char_pos": 1456, "end_char_pos": 1471}, {"type": "A", "before": null, "after": ", i.e. increased small-world coefficient in early MCI, intermediate values in late MCI, and decreased values in AD patients compared to controls. In contrast, no group differences were found for clustering coefficient and small-world coefficient when estimating conditional dependency networks on single imaging modalities", "start_char_pos": 1560, "end_char_pos": 1560}, {"type": "R", "before": "GGMs showed almost no conditional dependencies between modalitieswhen at the same time considering various other regions within the same modalities. However, this approach could be used as a clustering method to derive graph statistics in future studies omitting the need to binarize the network as currently being done for connections based on Pearson correlation", "after": "GGMs provide a useful methodology to analyze the conditional dependency networks of multimodal neuroimaging data", "start_char_pos": 1563, "end_char_pos": 1927}], "sents_char_pos": [0, 178, 348, 471, 854, 1048, 1207, 1415, 1711]}
+{"doc_id": "1805.02411", "revision_depth": "1", "before_revision": "Uncovering modular structure in networks is fundamental for advancing the understanding of complex systems in biology, physics, engineering, and technology . Community detection provides a way to computationally identify candidate modules as hypotheses, which then need to be experimentally validated . However, validation of detected communities requires expensive and time consuming experimental methods, such as mutagenesis in a wet biological laboratory. As a consequence only a limited number of communities can be experimentally validated, and it is thus important to determine which communities to select for downstream validation and experimentation. Here we develop CRank, an automatic method for prioritizing network communities and identifying the most promising ones for further experimentation . CRank efficiently evaluates robustness and magnitude of structural features of each community and then combines these features to obtain the community prioritization. CRank can be used with any community detection method and scales to large networks . It needs only information provided by the network structure and does not require any additional metadata or labels. However, when available, CRank can incorporate domain-specific information to further boost performance. Experiments on many diverse and important biological networks demonstrate that the proposed approach effectively prioritizes communities, yielding a nearly 50-fold improvement in community prioritization over a baseline ordering of detected communities. Taken together, CRank represents a network-based approach to identify high-quality communities, even for domains at the frontier of science where supervised meta information is not available .", "after_revision": "Uncovering modular structure in networks is fundamental for systems in biology, physics, and engineering . Community detection identifies candidate modules as hypotheses, which then need to be validated through experiments, such as mutagenesis in a biological laboratory. Only a few communities can typically be validated, and it is thus important to prioritize which communities to select for downstream experimentation. Here we develop CRank, a mathematically principled approach for prioritizing network communities . CRank efficiently evaluates robustness and magnitude of structural features of each community and then combines these features into the community prioritization. CRank can be used with any community detection method . It needs only information provided by the network structure and does not require any additional metadata or labels. However, when available, CRank can incorporate domain-specific information to further boost performance. Experiments on many large networks show that CRank effectively prioritizes communities, yielding a nearly 50-fold improvement in community prioritization .", "edit_actions": [{"type": "D", "before": "advancing the understanding of complex", "after": null, "start_char_pos": 60, "end_char_pos": 98}, {"type": "R", "before": "engineering, and technology", "after": "and engineering", "start_char_pos": 128, "end_char_pos": 155}, {"type": "R", "before": "provides a way to computationally identify", "after": "identifies", "start_char_pos": 178, "end_char_pos": 220}, {"type": "R", "before": "experimentally validated . However, validation of detected communities requires expensive and time consuming experimental methods,", "after": "validated through experiments,", "start_char_pos": 276, "end_char_pos": 406}, {"type": "D", "before": "wet", "after": null, "start_char_pos": 432, "end_char_pos": 435}, {"type": "R", "before": "As a consequence only a limited number of communities can be experimentally", "after": "Only a few communities can typically be", "start_char_pos": 459, "end_char_pos": 534}, {"type": "R", "before": "determine", "after": "prioritize", "start_char_pos": 574, "end_char_pos": 583}, {"type": "D", "before": "validation and", "after": null, "start_char_pos": 627, "end_char_pos": 641}, {"type": "R", "before": "an automatic method", "after": "a mathematically principled approach", "start_char_pos": 682, "end_char_pos": 701}, {"type": "D", "before": "and identifying the most promising ones for further experimentation", "after": null, "start_char_pos": 739, "end_char_pos": 806}, {"type": "R", "before": "to obtain", "after": "into", "start_char_pos": 936, "end_char_pos": 945}, {"type": "D", "before": "and scales to large networks", "after": null, "start_char_pos": 1030, "end_char_pos": 1058}, {"type": "R", "before": "diverse and important biological networks demonstrate that the proposed approach", "after": "large networks show that CRank", "start_char_pos": 1302, "end_char_pos": 1382}, {"type": "D", "before": "over a baseline ordering of detected communities. Taken together, CRank represents a network-based approach to identify high-quality communities, even for domains at the frontier of science where supervised meta information is not available", "after": null, "start_char_pos": 1486, "end_char_pos": 1726}], "sents_char_pos": [0, 157, 302, 458, 658, 975, 1060, 1176, 1281, 1535]}
+{"doc_id": "1805.03275", "revision_depth": "1", "before_revision": "Ordinary least squares provides the optimal linear approximation to the true regression function under misspecification . This paper investigates the Instrumental Variables (IV) version of this problem. The resulting population parameter is called the Optimal Linear IV Approximation (OLIVA). This paper shows that a necessary condition for regular identification of the OLIVA is also sufficient for existence of an IV estimand in a linear IV model. The necessary condition holds for the important case of a binary endogenous treatment, leading also to a LATE interpretation with positive weights . The instrument in the IV estimand is unknown and is estimated in a first step . A Two-Step IV (TSIV) estimator is proposed . We establish the asymptotic normality of a debiased TSIV estimator based on locally robust moments. The TSIV estimator does not require neither completeness nor identification of the instrument. As a by-product of our analysis, we robustify the classical Hausman test for exogeneity against misspecification of the linear model. Monte Carlo simulations suggest excellent finite sample performance for the proposed inferences.", "after_revision": "Ordinary least squares provides the optimal linear approximation to the true regression function . This paper investigates the Instrumental Variables (IV) version of this problem. The resulting parameter is called the Optimal Linear IV Approximation (OLIVA). The OLIVA is invariant to the distribution of the instruments. This paper shows that a necessary condition for standard inference on the OLIVA is also sufficient for the existence of an IV estimand in a linear IV model. The necessary regularity condition holds for a binary endogenous treatment, leading also to a LATE interpretation with positive weights in a fully heterogeneous model . The instrument in the IV estimand is unknown and may not be identified . A Two-Step IV (TSIV) estimator based on a Tikhonov regularized instrument is proposed, which can be implemented by standard regression routines . We establish the asymptotic normality of the TSIV estimator assuming neither completeness nor identification of the instrument. As an important application of our analysis, we robustify the classical Hausman test for exogeneity against misspecification of the linear model. Monte Carlo simulations suggest a good finite sample performance for the proposed inferences.", "edit_actions": [{"type": "D", "before": "under misspecification", "after": null, "start_char_pos": 97, "end_char_pos": 119}, {"type": "D", "before": "population", "after": null, "start_char_pos": 217, "end_char_pos": 227}, {"type": "A", "before": null, "after": "The OLIVA is invariant to the distribution of the instruments.", "start_char_pos": 293, "end_char_pos": 293}, {"type": "R", "before": "regular identification of", "after": "standard inference on", "start_char_pos": 342, "end_char_pos": 367}, {"type": "A", "before": null, "after": "the", "start_char_pos": 401, "end_char_pos": 401}, {"type": "A", "before": null, "after": "regularity", "start_char_pos": 466, "end_char_pos": 466}, {"type": "D", "before": "the important case of", "after": null, "start_char_pos": 487, "end_char_pos": 508}, {"type": "A", "before": null, "after": "in a fully heterogeneous model", "start_char_pos": 600, "end_char_pos": 600}, {"type": "R", "before": "is estimated in a first step", "after": "may not be identified", "start_char_pos": 652, "end_char_pos": 680}, {"type": "R", "before": "is proposed", "after": "based on a Tikhonov regularized instrument is proposed, which can be implemented by standard regression routines", "start_char_pos": 714, "end_char_pos": 725}, {"type": "R", "before": "a debiased TSIV estimator based on locally robust moments. The TSIV estimator does not require", "after": "the TSIV estimator assuming", "start_char_pos": 769, "end_char_pos": 863}, {"type": "R", "before": "a by-product", "after": "an important application", "start_char_pos": 926, "end_char_pos": 938}, {"type": "R", "before": "excellent", "after": "a good", "start_char_pos": 1089, "end_char_pos": 1098}], "sents_char_pos": [0, 121, 202, 292, 451, 602, 727, 827, 922, 1056]}
+{"doc_id": "1805.03792", "revision_depth": "1", "before_revision": "In his seminal, three paper series, Linsker provided a mechanism for how random activity in the visual pathway could give rise to many of the features observed experimentally in the early stages of visual processing . Owing to the complexity of multilayer models, an implicit assumption in Linsker's and subsequent papers has been that propagation delay is homogeneous and , consequently, plays little functional role in neural behaviour. In this paper, we relax this assumption to examine the impact of axonal distance dependent propagation delay on neural learning. We show that propagation delay induces lowpass filtering by dispersing the arrival times of spikes from presynaptic neurons, providing a natural correlation cancellation mechanism for distal connections. The cutoff frequency decreases as the radial propagation delay within a layer , relative to propagation delay between the layers, increases, introducing an upper limit on temporal resolution. Given that the postsynaptic potential also acts as a lowpass filter, we show that the effective time constant of each should enable the processing of similar scales of temporal information. This result has implications for the visual system, in which receptive field size and, thus, radial propagation delay, increases with eccentricity. Furthermore, the network response is frequency dependent since higher frequencies require increased input amplitude to compensate for attenuation. This concords with frequency dependent contrast sensitivity in the visual system, which changes with eccentricity and receptive field size. Finally, we determine the eigenfunctions of both Linsker's network, and the network with propagation delay . We show that the addition of propagation delay stabilizes the leading eigenfunction to changes in homeostatic parameters , and hence stabilizes the resulting receptive field structure .", "after_revision": "The mechanisms underlying how activity in the visual pathway may give rise through neural plasticity to many of the features observed experimentally in the early stages of visual processing was provided by Linkser in a seminal, three-paper series . Owing to the complexity of multi-layer models, an implicit assumption in Linsker's and subsequent papers has been that propagation delay is homogeneous and plays little functional role in neural behaviour. We relax this assumption to examine the impact of distance-dependent axonal propagation delay on neural learning. We show that propagation delay induces low-pass filtering by dispersing the arrival times of spikes from presynaptic neurons, providing a natural correlation cancellation mechanism for distal connections. The cut-off frequency decreases as the radial propagation delay within a layer increases relative to propagation delay between the layers, introducing an upper limit on temporal resolution. Given that the PSP also acts as a low-pass filter, we show that the effective time constant of each should enable the processing of similar scales of temporal information. This result has implications for the visual system, in which receptive field size and, thus, radial propagation delay, increases with eccentricity. Furthermore, the network response is frequency dependent since higher frequencies require increased input amplitude to compensate for attenuation. This concords with frequency-dependent contrast sensitivity in the visual system, which changes with eccentricity and receptive field size. We further show that the proportion of inhibition relative to excitation is larger where radial propagation delay is long relative to inter-laminar propagation delay . We show that the addition of propagation delay reduces the range in the cell's on-center size, providing stability to variations in homeostatic parameters .", "edit_actions": [{"type": "R", "before": "In his seminal, three paper series, Linsker provided a mechanism for how random", "after": "The mechanisms underlying how", "start_char_pos": 0, "end_char_pos": 79}, {"type": "R", "before": "could give rise", "after": "may give rise through neural plasticity", "start_char_pos": 111, "end_char_pos": 126}, {"type": "A", "before": null, "after": "was provided by Linkser in a seminal, three-paper series", "start_char_pos": 216, "end_char_pos": 216}, {"type": "R", "before": "multilayer", "after": "multi-layer", "start_char_pos": 246, "end_char_pos": 256}, {"type": "D", "before": ", consequently,", "after": null, "start_char_pos": 374, "end_char_pos": 389}, {"type": "R", "before": "In this paper, we", "after": "We", "start_char_pos": 440, "end_char_pos": 457}, {"type": "R", "before": "axonal distance dependent", "after": "distance-dependent axonal", "start_char_pos": 505, "end_char_pos": 530}, {"type": "R", "before": "lowpass", "after": "low-pass", "start_char_pos": 608, "end_char_pos": 615}, {"type": "R", "before": "cutoff", "after": "cut-off", "start_char_pos": 777, "end_char_pos": 783}, {"type": "R", "before": ",", "after": "increases", "start_char_pos": 851, "end_char_pos": 852}, {"type": "D", "before": "increases,", "after": null, "start_char_pos": 903, "end_char_pos": 913}, {"type": "R", "before": "postsynaptic potential", "after": "PSP", "start_char_pos": 980, "end_char_pos": 1002}, {"type": "R", "before": "lowpass", "after": "low-pass", "start_char_pos": 1018, "end_char_pos": 1025}, {"type": "R", "before": "frequency dependent", "after": "frequency-dependent", "start_char_pos": 1469, "end_char_pos": 1488}, {"type": "R", "before": "Finally, we determine the eigenfunctions of both Linsker's network, and the network with propagation delay", "after": "We further show that the proportion of inhibition relative to excitation is larger where radial propagation delay is long relative to inter-laminar propagation delay", "start_char_pos": 1590, "end_char_pos": 1696}, {"type": "R", "before": "stabilizes the leading eigenfunction to changes", "after": "reduces the range in the cell's on-center size, providing stability to variations", "start_char_pos": 1746, "end_char_pos": 1793}, {"type": "D", "before": ", and hence stabilizes the resulting receptive field structure", "after": null, "start_char_pos": 1820, "end_char_pos": 1882}], "sents_char_pos": [0, 218, 439, 568, 772, 964, 1154, 1302, 1449, 1589, 1698]}
+{"doc_id": "1805.08831", "revision_depth": "1", "before_revision": "This paper presents a new scalable parallelization scheme to generate the 3D Delaunay triangulation of a given set of points. Our first contribution is an efficient serial implementation of the incremental Delaunay insertion algorithm. A simple dedicated data structure and a number of improvements in the insertion algorithm have permitted to accelerate by a factor three reference implementations . Our second contribution is a multi-threaded version of the Delaunay kernel able to concurrently insert vertices. Moore curve coordinates are used to partition the point set, avoiding so heavy synchronization overheads. Conflicts are managed by modification of the partition with a simple rescaling of the space-filling curve. The performances of our implementation have been measured on three different processors, Intel core-i7, Intel Xeon Phi and AMD EPYC, on which we have been able to compute 3 billion tetrahedra in 53 seconds. This corresponds to a generation rate of over 55 million tetrahedra per second which is, to our best knowledge, three times the rate reached by the current fastest implementation. It is finally shown how this very efficient parallel Delaunay triangulation can be integrated in a Delaunay refinement mesh generator taking as input the boundary of the domain to mesh.", "after_revision": "This paper presents a new scalable parallelization scheme to generate the 3D Delaunay triangulation of a given set of points. Our first contribution is an efficient serial implementation of the incremental Delaunay insertion algorithm. A simple dedicated data structure , an efficient sorting of the points and the optimization of the insertion algorithm have permitted to accelerate reference implementations by a factor three . Our second contribution is a multi-threaded version of the Delaunay kernel that is able to concurrently insert vertices. Moore curve coordinates are used to partition the point set, avoiding heavy synchronization overheads. Conflicts are managed by modifying the partitions with a simple rescaling of the space-filling curve. The performances of our implementation have been measured on three different processors, an Intel core-i7, an Intel Xeon Phi and an AMD EPYC, on which we have been able to compute 3 billion tetrahedra in 53 seconds. This corresponds to a generation rate of over 55 million tetrahedra per second . We finally show how this very efficient parallel Delaunay triangulation can be integrated in a Delaunay refinement mesh generator which takes as input the triangulated surface boundary of the volume to mesh.", "edit_actions": [{"type": "R", "before": "and a number of improvements in", "after": ", an efficient sorting of the points and the optimization of", "start_char_pos": 270, "end_char_pos": 301}, {"type": "A", "before": null, "after": "reference implementations", "start_char_pos": 355, "end_char_pos": 355}, {"type": "D", "before": "reference implementations", "after": null, "start_char_pos": 374, "end_char_pos": 399}, {"type": "A", "before": null, "after": "that is", "start_char_pos": 477, "end_char_pos": 477}, {"type": "D", "before": "so", "after": null, "start_char_pos": 586, "end_char_pos": 588}, {"type": "R", "before": "modification of the partition", "after": "modifying the partitions", "start_char_pos": 647, "end_char_pos": 676}, {"type": "A", "before": null, "after": "an", "start_char_pos": 818, "end_char_pos": 818}, {"type": "A", "before": null, "after": "an", "start_char_pos": 834, "end_char_pos": 834}, {"type": "A", "before": null, "after": "an", "start_char_pos": 854, "end_char_pos": 854}, {"type": "R", "before": "which is, to our best knowledge, three times the rate reached by the current fastest implementation. It is finally shown", "after": ". We finally show", "start_char_pos": 1018, "end_char_pos": 1138}, {"type": "R", "before": "taking", "after": "which takes", "start_char_pos": 1253, "end_char_pos": 1259}, {"type": "A", "before": null, "after": "triangulated surface", "start_char_pos": 1273, "end_char_pos": 1273}, {"type": "R", "before": "domain", "after": "volume", "start_char_pos": 1290, "end_char_pos": 1296}], "sents_char_pos": [0, 125, 235, 401, 515, 621, 728, 938, 1118]}
+{"doc_id": "1805.11312", "revision_depth": "2", "before_revision": "The protein structure reconstruction from Nuclear Magnetic Resonance (NMR) experiments heavily relies on computational algorithms , such as matrix completion (MC) . Recently, some effective low-rank matrix completion methods, like ASD and ScaledASD, have been successfully applied in image processing, which inspired us to apply them in protein structure reconstruction. Here we present an efficient method for determining protein structures from experimental NMR NOESY distances , by combining the ScaledASD algorithm with several afterwards procedures including chirality refinement, distance lower (upper) bound refinement, force field-based energy minimization (EM) and water refinement. By comparing several metrics on conformation evaluation between our results and the PDBdeposits , we conclude that our method is consistent with the popular used methods. In particular, our results show higher validities in MPscore, Molprobity clash-score, Procheck dihedral angles G-factor than PDB models. In the end, we compared our calculation results with PDB models by checking the structural similarity to X-ray crystallographic structure for a special dataset. The software and its MATLAB source codes are available by URL", "after_revision": "Protein structure reconstruction from Nuclear Magnetic Resonance (NMR) experiments largely relies on computational algorithms . Recently, some effective low-rank matrix completion (MC) methods, such as ASD and ScaledASD, have been successfully applied to image processing, which inspires us to apply the methods to reconstruct protein structures. In this paper, we present an efficient method to determine protein structures based on experimental NMR NOESY distances . ScaledASD algorithm is used in the method with several post-procedures including chirality refinement, distance lower (upper) bound refinement, force field-based energy minimization (EM) and water refinement. By comparing several metrics in the conformation evaluation on our results with Protein Data Bank (PDB) structures , we conclude that our method is consistent with the popularly used methods. In particular, our results show higher validities in Procheck dihedral angles G-factor . Furthermore, we compare our calculation results with PDB structures by examining the structural similarity to X-ray crystallographic structures in a special dataset. The software and its MATLAB source codes are available in URL", "edit_actions": [{"type": "R", "before": "The protein", "after": "Protein", "start_char_pos": 0, "end_char_pos": 11}, {"type": "R", "before": "heavily", "after": "largely", "start_char_pos": 87, "end_char_pos": 94}, {"type": "D", "before": ", such as matrix completion (MC)", "after": null, "start_char_pos": 130, "end_char_pos": 162}, {"type": "R", "before": "methods, like", "after": "(MC) methods, such as", "start_char_pos": 217, "end_char_pos": 230}, {"type": "R", "before": "in", "after": "to", "start_char_pos": 281, "end_char_pos": 283}, {"type": "R", "before": "inspired", "after": "inspires", "start_char_pos": 308, "end_char_pos": 316}, {"type": "R", "before": "them in protein structure reconstruction. Here", "after": "the methods to reconstruct protein structures. In this paper,", "start_char_pos": 329, "end_char_pos": 375}, {"type": "R", "before": "for determining protein structures from", "after": "to determine protein structures based on", "start_char_pos": 407, "end_char_pos": 446}, {"type": "R", "before": ", by combining the ScaledASD algorithm with several afterwards procedures", "after": ". ScaledASD algorithm is used in the method with several post-procedures", "start_char_pos": 480, "end_char_pos": 553}, {"type": "R", "before": "on conformation evaluation between our results and the PDBdeposits", "after": "in the conformation evaluation on our results with Protein Data Bank (PDB) structures", "start_char_pos": 721, "end_char_pos": 787}, {"type": "R", "before": "popular", "after": "popularly", "start_char_pos": 841, "end_char_pos": 848}, {"type": "D", "before": "MPscore, Molprobity clash-score,", "after": null, "start_char_pos": 916, "end_char_pos": 948}, {"type": "R", "before": "than PDB models. In the end, we compared", "after": ". Furthermore, we compare", "start_char_pos": 983, "end_char_pos": 1023}, {"type": "R", "before": "models by checking", "after": "structures by examining", "start_char_pos": 1057, "end_char_pos": 1075}, {"type": "R", "before": "structure for", "after": "structures in", "start_char_pos": 1128, "end_char_pos": 1141}, {"type": "R", "before": "by", "after": "in", "start_char_pos": 1216, "end_char_pos": 1218}], "sents_char_pos": [0, 370, 691, 862, 999, 1160]}
+{"doc_id": "1806.03142", "revision_depth": "1", "before_revision": "Direct cDNA preamplification protocols developed for single-cell RNA-seq (scRNA-seq) have enabled transcriptome profiling of rare cells without having to pool multiple samples or to perform RNA extraction. We term this approach limiting-cell RNA-seq (lcRNA-seq) . Unlike scRNA-seq, which focuses on 'cell-atlasing', lcRNA-seq focuses on identifying differentially expressed genes (DEGs) between experimental groups. This requires accounting for systems noise which can obscure biological differences. We present CLEAR, a workflow that identifies robust transcripts in lcRNA-seq data for between-group comparisons. To develop CLEAR, we compared DEGs from RNA extracted from FACS-derived CD5+ and CD5- cells from a single chronic lymphocytic leukemia patient diluted to input RNA levels of 10-, 100- and 1,000pg. Data quality at ultralow input levels are known to be noisy. When using CLEAR transcripts vs. using all available transcripts, downstream analyses reveal more shared DEGs , improved Principal Component Analysis separation of cell type, and increased similarity between results across different input RNA amounts. CLEAR was applied to two publicly available ultralow input RNA-seq data and an in-house murine neural cell lcRNA-seq dataset . CLEAR provides a novel way to visualize the public datasetswhile validates cell phenotype markers for astrocytes, neural stem and progenitor cells .", "after_revision": "Direct cDNA preamplification protocols developed for single-cell RNA-seq have enabled transcriptome profiling of precious clinical samples and rare cells without sample pooling or RNA extraction. Currently, there is no algorithm optimized to reveal and remove noisy transcripts in limiting-cell RNA-seq (lcRNA-seq) data for downstream analyses. Herein, we present CLEAR, a workflow that identifies reliably quantifiable transcripts in lcRNA-seq data for differentially expressed gene (DEG) analysis. Libraries at three input amounts of FACS-derived CD5+ and CD5- cells from a chronic lymphocytic leukemia patient were used to develop CLEAR. When using CLEAR transcripts vs. using all transcripts, downstream analyses revealed more shared transcripts across different input RNA amounts , improved Principal Component Analysis (PCA) separation, and yielded more DEGs between cell types. As proof-of-principle, CLEAR was applied to an in-house lcRNA-seq dataset and two public datasets. When imputation is used, CLEAR is also adaptable to large clinical studies and for single cell analyses .", "edit_actions": [{"type": "D", "before": "(scRNA-seq)", "after": null, "start_char_pos": 73, "end_char_pos": 84}, {"type": "A", "before": null, "after": "precious clinical samples and", "start_char_pos": 125, "end_char_pos": 125}, {"type": "R", "before": "having to pool multiple samples or to perform", "after": "sample pooling or", "start_char_pos": 145, "end_char_pos": 190}, {"type": "R", "before": "We term this approach", "after": "Currently, there is no algorithm optimized to reveal and remove noisy transcripts in", "start_char_pos": 207, "end_char_pos": 228}, {"type": "R", "before": ". Unlike scRNA-seq, which focuses on 'cell-atlasing', lcRNA-seq focuses on identifying differentially expressed genes (DEGs) between experimental groups. This requires accounting for systems noise which can obscure biological differences. We", "after": "data for downstream analyses. Herein, we", "start_char_pos": 263, "end_char_pos": 504}, {"type": "R", "before": "robust", "after": "reliably quantifiable", "start_char_pos": 547, "end_char_pos": 553}, {"type": "R", "before": "between-group comparisons. To develop CLEAR, we compared DEGs from RNA extracted from", "after": "differentially expressed gene (DEG) analysis. Libraries at three input amounts of", "start_char_pos": 588, "end_char_pos": 673}, {"type": "D", "before": "single", "after": null, "start_char_pos": 714, "end_char_pos": 720}, {"type": "R", "before": "diluted to input RNA levels of 10-, 100- and 1,000pg. Data quality at ultralow input levels are known to be noisy.", "after": "were used to develop CLEAR.", "start_char_pos": 758, "end_char_pos": 872}, {"type": "D", "before": "available", "after": null, "start_char_pos": 916, "end_char_pos": 925}, {"type": "R", "before": "reveal more shared DEGs", "after": "revealed more shared transcripts across different input RNA amounts", "start_char_pos": 959, "end_char_pos": 982}, {"type": "R", "before": "separation of cell type, and increased similarity between results across different input RNA amounts.", "after": "(PCA) separation, and yielded more DEGs between cell types. As proof-of-principle,", "start_char_pos": 1023, "end_char_pos": 1124}, {"type": "D", "before": "two publicly available ultralow input RNA-seq data and", "after": null, "start_char_pos": 1146, "end_char_pos": 1200}, {"type": "D", "before": "murine neural cell", "after": null, "start_char_pos": 1213, "end_char_pos": 1231}, {"type": "R", "before": ". CLEAR provides a novel way to visualize the public datasetswhile validates cell phenotype markers for astrocytes, neural stem and progenitor cells", "after": "and two public datasets. When imputation is used, CLEAR is also adaptable to large clinical studies and for single cell analyses", "start_char_pos": 1250, "end_char_pos": 1398}], "sents_char_pos": [0, 206, 416, 501, 614, 811, 872, 1124]}
+{"doc_id": "1807.01491", "revision_depth": "1", "before_revision": "NMDA receptors (NMDA-R) typically contribute to excitatory synaptic transmission in the central nervous system. While calcium influx through NMDA-R plays a critical role in synaptic plasticity, indirect experimental evidence also exists demonstrating actions of NMDAR-mediated calcium influx on neuronal excitability through the activation of calcium-activated potassium channels. But, so far, this mechanism has not been studied theoretically. Our theoretical model provide a simple description of neuronal electrical activity including the tonic activity of NMDA receptors and a cytosolic calcium compartment. We show that calcium influx through NMDA-R can directly be coupled to activation of calcium-activated potassium channels providing an overall inhibitory effect on neuronal excitability. Furthermore, the presence of tonic NMDA-R activity promotes bistability in electrical activity by dramatically increasing the stimulus interval where both a stable steady state and repetitive firing can exist. This results could provide an intrinsic mechanism for the constitution of memory traces in neuronal circuits. They also shed light on the way by which beta-amyloids can decrease neuronal activity when interfering with NMDA-R in Alzheimer's disease .", "after_revision": "NMDA receptors (NMDA-R) typically contribute to excitatory synaptic transmission in the central nervous system. While calcium influx through NMDA-R plays a critical role in synaptic plasticity, experimental evidence indicates that NMDAR-mediated calcium influx also modifies neuronal excitability through the activation of calcium-activated potassium channels. This mechanism has not yet been studied theoretically. Our theoretical model provides a simple description of neuronal electrical activity that takes into account the tonic activity of extrasynaptic NMDA receptors and a cytosolic calcium compartment. We show that calcium influx mediated by the tonic activity of NMDA-R can be coupled directly to the activation of calcium-activated potassium channels , resulting in an overall inhibitory effect on neuronal excitability. Furthermore, the presence of tonic NMDA-R activity promotes bistability in electrical activity by dramatically increasing the stimulus interval where both a stable steady state and repetitive firing can coexist. These results could provide an intrinsic mechanism for the constitution of memory traces in neuronal circuits. They also shed light on the way by which \\beta-amyloids can alter neuronal activity when interfering with NMDA-R in Alzheimer's disease and cerebral ischemia .", "edit_actions": [{"type": "R", "before": "indirect experimental evidence also exists demonstrating actions of", "after": "experimental evidence indicates that", "start_char_pos": 194, "end_char_pos": 261}, {"type": "R", "before": "on", "after": "also modifies", "start_char_pos": 292, "end_char_pos": 294}, {"type": "R", "before": "But, so far, this", "after": "This", "start_char_pos": 381, "end_char_pos": 398}, {"type": "A", "before": null, "after": "yet", "start_char_pos": 417, "end_char_pos": 417}, {"type": "R", "before": "provide", "after": "provides", "start_char_pos": 468, "end_char_pos": 475}, {"type": "R", "before": "including", "after": "that takes into account", "start_char_pos": 529, "end_char_pos": 538}, {"type": "A", "before": null, "after": "extrasynaptic", "start_char_pos": 561, "end_char_pos": 561}, {"type": "R", "before": "through", "after": "mediated by the tonic activity of", "start_char_pos": 642, "end_char_pos": 649}, {"type": "R", "before": "directly be coupled to", "after": "be coupled directly to the", "start_char_pos": 661, "end_char_pos": 683}, {"type": "R", "before": "providing", "after": ", resulting in", "start_char_pos": 735, "end_char_pos": 744}, {"type": "R", "before": "exist. This", "after": "coexist. These", "start_char_pos": 1003, "end_char_pos": 1014}, {"type": "R", "before": "beta-amyloids can decrease", "after": "\\beta-amyloids can alter", "start_char_pos": 1161, "end_char_pos": 1187}, {"type": "A", "before": null, "after": "and cerebral ischemia", "start_char_pos": 1258, "end_char_pos": 1258}], "sents_char_pos": [0, 111, 380, 445, 613, 799, 1009, 1119]}
+{"doc_id": "1807.01768", "revision_depth": "1", "before_revision": "Rationale: Heart muscle contraction is activated by a synchronized systolic Ca release from sarcoplasmic reticulum (SR) via Ca sparks. In disease, Ca sparks fail to terminate, causing a diastolic Ca leak that decreases contraction amplitude and increases the risk of arrhythmia. The mechanisms and treatment of the abnormal Ca leak remain unclear. We have recently shown that spark termination emerges as collective behavior (synchronized closings) of Ca release channels (RyRs) that is identical to synchronization of spin orientation in ferromagnets described by a phase transition in Ising model . Objective: We employed the Ising approach to investigate and classify mechanisms of spark termination failure and Ca leak. Methods and Results: The key parametersdetermining whether spark termination succeeds or fails are SR Ca and RyR opening/closing rates. They define analogues of magnetic field h and the inverse temperature (\\beta) in Ising model\\beta*\\beta* \\beta* . Sparks terminate via a phase transition known as \"hpolarity reversal\" and the leak emerges when hfails to change its sign. This happens when the SR depletes insufficiently and RyR openings remained partially synchronized via Ca-induced-Ca-release, generating long-lasting sparks. Leak can also occur via \\beta, known as Onsager's \"order-disorder\" transition. This happens at low SR Ca, reducing RyR current and RyRs interactions, resulting in independent RyR openings. The disorder leak is distinguished from synchronized leak by larger Peierls contour lengths reflecting degree of disorder. Conclusions: Abnormal leak results from either a probability imbalance during synchronized firing of RyRs or from disordered RyR firing. Each leak type requires different and balanced treatment to shift RyR operation towards normal spark termination .", "after_revision": " Heart muscle contraction is normally activated by a synchronized Ca release from sarcoplasmic reticulum (SR) , a major intracellular Ca store. However, under abnormal conditions Ca leaks from the SR, decreasing heart contraction amplitude and increasing risk of life-threatening arrhythmia. The mechanisms and regimes of SR operation generating the abnormal Ca leak remain unclear. Here we employed both numerical and analytical modeling to get mechanistic insights into the emergent Ca leak phenomenon. Our numerical simulations using a detailed realistic model of Ca release unit (CRU) reveal sharp transitions resulting in Ca leak. The emergence of leak is closely mapped mathematically to the Ising model from statistical mechanics. The system steady-state behavior is determined by two aggregate parameters: the analogues of magnetic field (h) and the inverse temperature (\\beta) in the Ising model, for which we have explicit formulas in terms of SR Ca and release channel opening/closing rates. The classification of leak regimes takes the shape of a phase \\beta-h diagram, with the regime boundaries occurring at h=0 and a critical value of \\beta (\\beta*) which we estimate using a classical Ising model and mean field theory. Our theory predicts that a synchronized Ca leak will occur when h>0 and \\beta>\\beta* and a disordered leak occurs when \\beta<\\beta* and h is not too negative . The disorder leak is distinguished from synchronized leak (in long-lasting sparks) by larger Peierls contour lengths , an output parameter reflecting degree of disorder. Thus, in addition to our detailed numerical model approach we also offer an instantaneous computational tool using analytical formulas of the Ising model for respective RyR parameters and SR Ca load that describe and classify phase transitions and leak emergence .", "edit_actions": [{"type": "D", "before": "Rationale:", "after": null, "start_char_pos": 0, "end_char_pos": 10}, {"type": "A", "before": null, "after": "normally", "start_char_pos": 39, "end_char_pos": 39}, {"type": "D", "before": "systolic", "after": null, "start_char_pos": 68, "end_char_pos": 76}, {"type": "R", "before": "via Ca sparks. In disease, Ca sparks fail to terminate, causing a diastolic Ca leak that decreases", "after": ", a major intracellular Ca store. However, under abnormal conditions Ca leaks from the SR, decreasing heart", "start_char_pos": 121, "end_char_pos": 219}, {"type": "R", "before": "increases the risk of", "after": "increasing risk of life-threatening", "start_char_pos": 246, "end_char_pos": 267}, {"type": "R", "before": "treatment of", "after": "regimes of SR operation generating", "start_char_pos": 299, "end_char_pos": 311}, {"type": "R", "before": "We have recently shown that spark termination emerges as collective behavior (synchronized closings)", "after": "Here we employed both numerical and analytical modeling to get mechanistic insights into the emergent Ca leak phenomenon. Our numerical simulations using a detailed realistic model", "start_char_pos": 349, "end_char_pos": 449}, {"type": "R", "before": "channels (RyRs) that is identical to synchronization of spin orientation in ferromagnets described by a phase transition in Ising model . Objective: We employed the Ising approach to investigate and classify mechanisms of spark termination failure and Ca leak. Methods and Results: The key parametersdetermining whether spark termination succeeds or fails are SR Ca and RyR opening/closing rates. They define", "after": "unit (CRU) reveal sharp transitions resulting in Ca leak. The emergence of leak is closely mapped mathematically to the Ising model from statistical mechanics. The system steady-state behavior is determined by two aggregate parameters: the", "start_char_pos": 464, "end_char_pos": 872}, {"type": "R", "before": "h", "after": "(h)", "start_char_pos": 901, "end_char_pos": 902}, {"type": "R", "before": "Ising model", "after": "the Ising model, for which we have explicit formulas in terms of SR Ca and release channel opening/closing rates. The classification of leak regimes takes the shape of a phase \\beta-h diagram, with the regime boundaries occurring at h=0 and a critical value of \\beta (", "start_char_pos": 942, "end_char_pos": 953}, {"type": "A", "before": null, "after": ") which we estimate using a classical Ising model and mean field theory. Our theory predicts that a synchronized Ca leak will occur when h>0 and \\beta>", "start_char_pos": 959, "end_char_pos": 959}, {"type": "A", "before": null, "after": "and a disordered leak occurs when \\beta<", "start_char_pos": 966, "end_char_pos": 966}, {"type": "A", "before": null, "after": "and h is not too negative", "start_char_pos": 973, "end_char_pos": 973}, {"type": "D", "before": "Sparks terminate via a phase transition known as \"hpolarity reversal\" and the leak emerges when hfails to change its sign. This happens when the SR depletes insufficiently and RyR openings remained partially synchronized via Ca-induced-Ca-release, generating long-lasting sparks. Leak can also occur via \\beta, known as Onsager's \"order-disorder\" transition. This happens at low SR Ca, reducing RyR current and RyRs interactions, resulting in independent RyR openings.", "after": null, "start_char_pos": 976, "end_char_pos": 1444}, {"type": "A", "before": null, "after": "(in long-lasting sparks)", "start_char_pos": 1503, "end_char_pos": 1503}, {"type": "A", "before": null, "after": ", an output parameter", "start_char_pos": 1538, "end_char_pos": 1538}, {"type": "R", "before": "Conclusions: Abnormal leak results from either a probability imbalance during synchronized firing of RyRs or from disordered RyR firing. Each leak type requires different and balanced treatment to shift RyR operation towards normal spark termination", "after": "Thus, in addition to our detailed numerical model approach we also offer an instantaneous computational tool using analytical formulas of the Ising model for respective RyR parameters and SR Ca load that describe and classify phase transitions and leak emergence", "start_char_pos": 1570, "end_char_pos": 1819}], "sents_char_pos": [0, 135, 279, 348, 724, 860, 1098, 1255, 1334, 1444, 1569, 1706]}
+{"doc_id": "1807.02502", "revision_depth": "1", "before_revision": "In economics, it is well accepted that adoption of items is governed by the utility that a user derives from their adoption. In this paper, we propose a model called EPIC that combines utility-driven item adoption with the viral network effect helping to propagate adoption of and desire for items from users to their peers. We focus on the case of mutually complementary items and model their adoption behavior via supermodular value functions. We assume price is additive and use zero mean random noise to capture the uncertainty in our knowledge of user valuations. In this setting, we study a novel problem ofsocial welfare maximization : given item budgets, find an optimal allocation of items to seed nodes that maximizes the sum of expected utilities derived by users when the diffusion terminates . We show the expected social welfare is monotone but neither submodular nor supermodular . Nevertheless, we show that a simple greedy allocation can ensure a (1-1/e-\\epsilon) -approximation to the optimum . To the best of our knowledge, this is the first instance where for a non-submodular objective in the context of viral marketing, such a high approximation ratio is achieved. We provide the analysis of this result, which is highly nontrivial and along the way we give a solution to the prefix-preserving influence maximization problem, which could be of independent interest. With extensive\\textsf{ experiments on real and synthetic datasets, we show that our algorithm significantly outperforms all the baselines.", "after_revision": "Motivated by applications such as viral marketing, the problem of influence maximization (IM) has been extensively studied in the literature. The goal is to select a small number of users to adopt an item such that it results in a large cascade of adoptions by others. Existing works have three key limitations. (1) They do not account for economic considerations of a user in buying/adopting items. (2) Most studies on multiple items focus on competition, with complementary items receiving limited attention. (3) For the network owner, maximizing social welfare is important to ensure customer loyalty, which is not addressed in prior work in the IM literature. In this paper, we address all three limitations and propose a novel model called UIC that combines utility-driven item adoption with influence propagation over networks. Focusing on the mutually complementary setting, we formulate the problem of social welfare maximization in this novel setting . We show that while the objective function is neither submodular nor supermodular , surprisingly a simple greedy allocation algorithm achieves a factor of (1-1/e-\\epsilon) of the optimum expected social welfare. We develop\\textsf{bundleGRD , a scalable version of this approximation algorithm, and demonstrate, with comprehensive experiments on real and synthetic datasets, that it significantly outperforms all baselines.", "edit_actions": [{"type": "R", "before": "In economics, it is well accepted that adoption of items is governed by the utility that a user derives from their adoption.", "after": "Motivated by applications such as viral marketing, the problem of influence maximization (IM) has been extensively studied in the literature. The goal is to select a small number of users to adopt an item such that it results in a large cascade of adoptions by others. Existing works have three key limitations. (1) They do not account for economic considerations of a user in buying/adopting items. (2) Most studies on multiple items focus on competition, with complementary items receiving limited attention. (3) For the network owner, maximizing social welfare is important to ensure customer loyalty, which is not addressed in prior work in the IM literature.", "start_char_pos": 0, "end_char_pos": 124}, {"type": "R", "before": "propose a model called EPIC", "after": "address all three limitations and propose a novel model called UIC", "start_char_pos": 143, "end_char_pos": 170}, {"type": "R", "before": "the viral network effect helping to propagate adoption of and desire for items from users to their peers. We focus on the case of mutually complementary items and model their adoption behavior via supermodular value functions. We assume price is additive and use zero mean random noise to capture the uncertainty in our knowledge of user valuations. In this", "after": "influence propagation over networks. Focusing on the mutually complementary", "start_char_pos": 219, "end_char_pos": 576}, {"type": "D", "before": "study a novel problem of", "after": null, "start_char_pos": 589, "end_char_pos": 613}, {"type": "D", "before": "social welfare maximization", "after": null, "start_char_pos": 613, "end_char_pos": 640}, {"type": "R", "before": ": given item budgets, find an optimal allocation of items to seed nodes that maximizes the sum of expected utilities derived by users when the diffusion terminates", "after": "formulate the problem of social welfare maximization in this novel setting", "start_char_pos": 641, "end_char_pos": 804}, {"type": "R", "before": "the expected social welfare is monotone but", "after": "that while the objective function is", "start_char_pos": 815, "end_char_pos": 858}, {"type": "R", "before": ". Nevertheless, we show that", "after": ", surprisingly", "start_char_pos": 895, "end_char_pos": 923}, {"type": "R", "before": "can ensure a", "after": "algorithm achieves a factor of", "start_char_pos": 951, "end_char_pos": 963}, {"type": "R", "before": "-approximation to the optimum . To the best of our knowledge, this is the first instance where for a non-submodular objective in the context of viral marketing, such a high approximation ratio is achieved. We provide the analysis of this result, which is highly nontrivial and along the way we give a solution to the prefix-preserving influence maximization problem, which could be of independent interest. With extensive", "after": "of the optimum expected social welfare. We develop", "start_char_pos": 981, "end_char_pos": 1402}, {"type": "A", "before": null, "after": "bundleGRD", "start_char_pos": 1410, "end_char_pos": 1410}, {"type": "A", "before": null, "after": ", a scalable version of this approximation algorithm, and demonstrate, with comprehensive", "start_char_pos": 1411, "end_char_pos": 1411}, {"type": "R", "before": "we show that our algorithm", "after": "that it", "start_char_pos": 1456, "end_char_pos": 1482}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1513, "end_char_pos": 1516}], "sents_char_pos": [0, 124, 324, 445, 568, 806, 896, 1012, 1186, 1387]}
+{"doc_id": "1807.07590", "revision_depth": "1", "before_revision": " We present a complete wireless neural stimulation system consisting of a 2.2 mm3 wireless, batteryless, leadless implantable stimulator implant (the \"mote\"), an ultrasonic wireless link for power and bi-directional communication, and a hand-held external transceiver. The mote consists of a stimulator integrated circuit (IC) , which performs high-efficiency ultrasonic power harvesting , decodes stimulation parameter downlink data, and generates current-controlled stimulation pulses. Stimulation parameters are time-encoded on the fly through the wireless link rather than being programmed and stored on the mote, enabling complex stimulation protocols with precise timing and closed-loop capability and without the need for on-chip memory and power consumption . Uplink data indicates whether or not the mote is currently stimulating and is encoded by the mote via backscatter modulation and demodulated at the external receiver. We characterize system power, stimulation performance, and acoustic link robustness under misalignment. We implant the mote on the sciatic nerve of anesthetized rats and investigate the full range of physiological responses achievable with the wireless system .", "after_revision": "Neural stimulation is a powerful technique for modulating physiological functions and for writing information into the nervous system as part of brain-machine interfaces. Current clinically approved neural stimulators require batteries and are many cubic centimeters in size- typically much larger than their intended targets. We present a complete wireless neural stimulation system consisting of a 2.2 mm^3 wireless, batteryless, leadless implantable stimulator (the \"mote\"), an ultrasonic wireless link for power and bi-directional communication, and a hand-held external transceiver. The mote consists of a piezoceramic transducer, an energy storage capacitor, and a stimulator integrated circuit (IC) . The IC harvests ultrasonic power with high efficiency , decodes stimulation parameter downlink data, and generates current-controlled stimulation pulses. Stimulation parameters are time-encoded on the fly through the wireless link rather than being programmed and stored on the mote, enabling complex stimulation protocols with high-temporal resolution and closed-loop capability while reducing power consumption and on-chip memory requirements . Uplink data indicates whether the mote is currently stimulating ; it is encoded by the mote via backscatter modulation and is demodulated at the external transceiver. We show that the system operates at an acoustic power one fifth the FDA limit for diagnostic ultrasound and is robust to expected real-world acoustic link misalignment. We investigate the performance of the system with motes implanted on the sciatic nerve of anesthetized rats and show highly repeatable stimulation across a wide range of physiological responses .", "edit_actions": [{"type": "A", "before": null, "after": "Neural stimulation is a powerful technique for modulating physiological functions and for writing information into the nervous system as part of brain-machine interfaces. Current clinically approved neural stimulators require batteries and are many cubic centimeters in size- typically much larger than their intended targets.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "mm3", "after": "mm^3", "start_char_pos": 78, "end_char_pos": 81}, {"type": "D", "before": "implant", "after": null, "start_char_pos": 137, "end_char_pos": 144}, {"type": "A", "before": null, "after": "piezoceramic transducer, an energy storage capacitor, and a", "start_char_pos": 292, "end_char_pos": 292}, {"type": "R", "before": ", which performs high-efficiency ultrasonic power harvesting", "after": ". The IC harvests ultrasonic power with high efficiency", "start_char_pos": 328, "end_char_pos": 388}, {"type": "R", "before": "precise timing", "after": "high-temporal resolution", "start_char_pos": 663, "end_char_pos": 677}, {"type": "R", "before": "and without the need for", "after": "while reducing power consumption and", "start_char_pos": 705, "end_char_pos": 729}, {"type": "R", "before": "and power consumption", "after": "requirements", "start_char_pos": 745, "end_char_pos": 766}, {"type": "D", "before": "or not", "after": null, "start_char_pos": 799, "end_char_pos": 805}, {"type": "R", "before": "and", "after": "; it", "start_char_pos": 840, "end_char_pos": 843}, {"type": "A", "before": null, "after": "is", "start_char_pos": 898, "end_char_pos": 898}, {"type": "R", "before": "receiver. We characterize system power, stimulation performance, and acoustic link robustness under", "after": "transceiver. We show that the system operates at an acoustic power one fifth the FDA limit for diagnostic ultrasound and is robust to expected real-world acoustic link", "start_char_pos": 927, "end_char_pos": 1026}, {"type": "R", "before": "implant the mote", "after": "investigate the performance of the system with motes implanted", "start_char_pos": 1044, "end_char_pos": 1060}, {"type": "R", "before": "investigate the full", "after": "show highly repeatable stimulation across a wide", "start_char_pos": 1107, "end_char_pos": 1127}, {"type": "D", "before": "achievable with the wireless system", "after": null, "start_char_pos": 1161, "end_char_pos": 1196}], "sents_char_pos": [0, 268, 488, 936, 1040]}
+{"doc_id": "1807.08446", "revision_depth": "1", "before_revision": "We suggest a new optimization technique for minimizing the sum i=1^n f_i(x) of n non-convex real functions that satisfy a property that we call piecewise log-Lipschitz. This is by URLing links between techniques in computational geometry, combinatorics and convex optimization. Example applications include the first constant-factor approximation algorithms whose running-time is polynomial in n for the following fundamental problems: (i) Constrained \\ell_z Linear Regression: Given z>0, n vectors p_1,\\cdots,p_n on the plane, and a vector b\\in\\mathbb{R^n, compute a unit vector x and a permutation \\pi:}%DIFDELCMD < [%%% n%DIFDELCMD < ]\\to[n] %%% that minimizes \\sum_{i=1^n |p_ix-b_{\\pi(i)}|^z. (ii) Points-to-Lines alignment: Given n } lines \\ell_1,\\cdots,\\ell_n on the plane , compute the matching \\pi:[n]\\to[n] and alignment (rotation matrix R and a translation vector t) that minimize the sum of Euclidean distances %DIFDELCMD < \\[ i=1^n dist(Rp_i-t,\\pi(i))^z \\] %%% ^n \\mathrm{dist}(Rp_i-t,\\ell_{\\pi(i)})^z } between each point to its corresponding line. These problems are open even if z=1 and the matching \\pi is given. In this case , the running time of our algorithms reduces to O(n ) using core-sets that support: streaming, dynamic, and distributed parallel computations (e.g. on the cloud) in poly-logarithmic update time. Generalizations for handling e.g. outliers or pseudo-distances such as M-estimators for these problems are also provided. Experimental results show that our provable algorithms improve existing heuristics also in practice. A demonstration in the context of Augmented Reality show how such algorithms may be used in real-time systems.", "after_revision": "We suggest a new optimization technique for minimizing the sum i=1^n f_i(x) of n non-convex real functions that satisfy a property that we call piecewise log-Lipschitz. This is by URLing links between techniques in computational geometry, combinatorics and convex optimization. As an example application, we provide the first constant-factor approximation algorithms whose running-time is polynomial in n for the fundamental problem ofPoints-to-Lines alignment: Given n points p_1,\\cdots,p_n ^n, compute a unit vector x and a permutation \\pi:}%DIFDELCMD < [%%% %DIFDELCMD < ]\\to[n] %%% ^n |p_ix-b_{\\pi(i)}|^z. (ii) Points-to-Lines alignment: Given n } and n lines \\ell_1,\\cdots,\\ell_n on the plane and z>0 , compute the matching \\pi:[n]\\to[n] and alignment (rotation matrix R and a translation vector t) that minimize the sum of Euclidean distances %DIFDELCMD < \\[ i=1^n dist(Rp_i-t,\\pi(i))^z \\] %%% \\sum_{i=1^n \\mathrm{dist}(Rp_i-t,\\ell_{\\pi(i)})^z } between each point to its corresponding line. This problem is non-trivial even if z=1 and the matching \\pi is given. If \\pi is given , the running time of our algorithms is O(n ^3), and even near-linear in n using core-sets that support: streaming, dynamic, and distributed parallel computations in poly-logarithmic update time. Generalizations for handling e.g. outliers or pseudo-distances such as M-estimators for the problem are also provided. Experimental results and open source code show that our provable algorithms improve existing heuristics also in practice. A companion demonstration video in the context of Augmented Reality shows how such algorithms may be used in real-time systems.", "edit_actions": [{"type": "R", "before": "Example applications include", "after": "As an example application, we provide", "start_char_pos": 278, "end_char_pos": 306}, {"type": "R", "before": "following fundamental problems: (i) Constrained \\ell_z Linear Regression: Given z>0, n vectors", "after": "fundamental problem of", "start_char_pos": 404, "end_char_pos": 498}, {"type": "A", "before": null, "after": "Points-to-Lines alignment", "start_char_pos": 498, "end_char_pos": 498}, {"type": "A", "before": null, "after": ": Given n points", "start_char_pos": 498, "end_char_pos": 498}, {"type": "D", "before": "on the plane, and a vector b\\in\\mathbb{R", "after": null, "start_char_pos": 514, "end_char_pos": 554}, {"type": "D", "before": "n", "after": null, "start_char_pos": 623, "end_char_pos": 624}, {"type": "D", "before": "that minimizes \\sum_{i=1", "after": null, "start_char_pos": 649, "end_char_pos": 673}, {"type": "A", "before": null, "after": "and n", "start_char_pos": 739, "end_char_pos": 739}, {"type": "A", "before": null, "after": "and z>0", "start_char_pos": 780, "end_char_pos": 780}, {"type": "A", "before": null, "after": "\\sum_{i=1", "start_char_pos": 975, "end_char_pos": 975}, {"type": "R", "before": "These problems are open", "after": "This problem is non-trivial", "start_char_pos": 1064, "end_char_pos": 1087}, {"type": "R", "before": "In this case", "after": "If \\pi is given", "start_char_pos": 1131, "end_char_pos": 1143}, {"type": "R", "before": "reduces to", "after": "is", "start_char_pos": 1181, "end_char_pos": 1191}, {"type": "R", "before": ")", "after": "^3), and even near-linear in n", "start_char_pos": 1196, "end_char_pos": 1197}, {"type": "D", "before": "(e.g. on the cloud)", "after": null, "start_char_pos": 1286, "end_char_pos": 1305}, {"type": "R", "before": "these problems", "after": "the problem", "start_char_pos": 1427, "end_char_pos": 1441}, {"type": "A", "before": null, "after": "and open source code", "start_char_pos": 1482, "end_char_pos": 1482}, {"type": "R", "before": "demonstration", "after": "companion demonstration video", "start_char_pos": 1565, "end_char_pos": 1578}, {"type": "R", "before": "show", "after": "shows", "start_char_pos": 1615, "end_char_pos": 1619}], "sents_char_pos": [0, 168, 277, 435, 477, 604, 1063, 1130, 1338, 1460, 1562]}
+{"doc_id": "1807.11090", "revision_depth": "1", "before_revision": "Reconstituted nicotinic acetylcholine receptors ( nAChR ) exhibit significant gain-of-function upon addition of cholesterol to reconstitution mixtures, and experimentally observed clustering of nAChRs within membranes is cholesterol-sensitive, leading to a common expectation that nAChRs will partition into cholesterol-rich liquid ordered (\"raft\" ) domains . We use coarse-grained molecular dynamics simulations to observe spontaneous interactions of cholesterol, saturated lipids, and polyunsaturated lipids with nAChRs. In binary DPPC:CHOL mixtures, both cholesterol and DPPC acyl chains were observed spontaneously entering deep \"non-annular\" cavities in the nAChR TMD, particularly at the subunit interface and the \\beta subunit center, facilitated by the low amino acid density in the cryo-EM structure of nAChR in a native membrane. Cholesterol was highly enriched in the annulus around the TMD, but this was a short range effect that extended over (at most) 5-10\\AA. In ternary mixtures containing polyunsaturated fatty acids , the presence of a single receptor did not significantly affect the likelihood of domain formation , and nAChR partitioned to the cholesterol-poor liquid-disordered domain whenever one was present. This was independent of whether the \\l_{do domain lipids had PC or PE headgroups , but saturated lipids with PE headgroups were less depleted from the boundary than those with PC headgroups . Enrichment of unsaturated phospholipids among boundary lipids was positively correlated with their propensity for demixing from cholesterol-rich phases. Long n-3 chains (tested here with Docosahexaenoic Acid ) were highly enriched in annular and non-annular embedded sites, partially displacing cholesterol and completely displacing DPPC, and occupying sites even deeper within the bundle. Shorter n-6 chains (Linoleic acid) were far less effective at displacing cholesterol from non-annular sites.", "after_revision": "Reconstituted nicotinic acetylcholine receptors ( nAChRs ) exhibit significant gain-of-function upon addition of cholesterol to reconstitution mixtures, and cholesterol URLanization of nAChRs within domain-forming membranes, but whether nAChR partitions to cholesterol-rich liquid-ordered (\"raft\" or l_o) domains or cholesterol-poor liquid-disordered (l_{do . We use coarse-grained molecular dynamics simulations to observe spontaneous interactions of cholesterol, saturated lipids, and polyunsaturated (PUFA) lipids with nAChRs. In binary Dipalmitoylphosphatidylcholine:Cholesterol ( DPPC:CHOL ) mixtures, both CHOL and DPPC acyl chains were observed spontaneously entering deep \"non-annular\" cavities in the nAChR TMD, particularly at the subunit interface and the \\beta subunit center, facilitated by the low amino acid density in the cryo-EM structure of nAChR in a native membrane. Cholesterol was highly enriched in the annulus around the TMD, but this effect extended over (at most) 5-10\\AA. In domain-forming ternary mixtures containing PUFAs , the presence of a single receptor did not significantly affect the likelihood of domain formation . nAChR partitioned to any cholesterol-poor l_{do of whether the l_{do domain lipids had PC or PE headgroups . Enrichment of PUFAs among boundary lipids was positively correlated with their propensity for demixing from cholesterol-rich phases. Long n - 3 chains (tested here with Docosahexaenoic Acid , DHA ) were highly enriched in annular and non-annular embedded sites, partially displacing cholesterol and completely displacing DPPC, and occupying sites even deeper within the bundle. Shorter n - 6 chains were far less effective at displacing cholesterol from non-annular sites.", "edit_actions": [{"type": "R", "before": "nAChR", "after": "nAChRs", "start_char_pos": 50, "end_char_pos": 55}, {"type": "R", "before": "experimentally observed clustering", "after": "cholesterol URLanization", "start_char_pos": 156, "end_char_pos": 190}, {"type": "R", "before": "membranes is cholesterol-sensitive, leading to a common expectation that nAChRs will partition into", "after": "domain-forming membranes, but whether nAChR partitions to", "start_char_pos": 208, "end_char_pos": 307}, {"type": "R", "before": "liquid ordered", "after": "liquid-ordered", "start_char_pos": 325, "end_char_pos": 339}, {"type": "R", "before": ") domains", "after": "or l_o) domains or cholesterol-poor liquid-disordered (l_{do", "start_char_pos": 348, "end_char_pos": 357}, {"type": "A", "before": null, "after": "(PUFA)", "start_char_pos": 503, "end_char_pos": 503}, {"type": "A", "before": null, "after": "Dipalmitoylphosphatidylcholine:Cholesterol (", "start_char_pos": 534, "end_char_pos": 534}, {"type": "A", "before": null, "after": ")", "start_char_pos": 545, "end_char_pos": 545}, {"type": "R", "before": "cholesterol", "after": "CHOL", "start_char_pos": 561, "end_char_pos": 572}, {"type": "R", "before": "was a short range effect that", "after": "effect", "start_char_pos": 915, "end_char_pos": 944}, {"type": "A", "before": null, "after": "domain-forming", "start_char_pos": 981, "end_char_pos": 981}, {"type": "R", "before": "polyunsaturated fatty acids", "after": "PUFAs", "start_char_pos": 1010, "end_char_pos": 1037}, {"type": "R", "before": ", and", "after": ".", "start_char_pos": 1138, "end_char_pos": 1143}, {"type": "R", "before": "the", "after": "any", "start_char_pos": 1165, "end_char_pos": 1168}, {"type": "R", "before": "liquid-disordered domain whenever one was present. This was independent", "after": "l_{do", "start_char_pos": 1186, "end_char_pos": 1257}, {"type": "R", "before": "\\l_{do", "after": "l_{do", "start_char_pos": 1273, "end_char_pos": 1279}, {"type": "D", "before": ", but saturated lipids with PE headgroups were less depleted from the boundary than those with PC headgroups", "after": null, "start_char_pos": 1318, "end_char_pos": 1426}, {"type": "R", "before": "unsaturated phospholipids", "after": "PUFAs", "start_char_pos": 1443, "end_char_pos": 1468}, {"type": "R", "before": "n-3", "after": "n - 3", "start_char_pos": 1587, "end_char_pos": 1590}, {"type": "A", "before": null, "after": ", DHA", "start_char_pos": 1637, "end_char_pos": 1637}, {"type": "R", "before": "n-6 chains (Linoleic acid)", "after": "n - 6 chains", "start_char_pos": 1828, "end_char_pos": 1854}], "sents_char_pos": [0, 359, 523, 842, 977, 1236, 1581, 1819]}
+{"doc_id": "1808.01279", "revision_depth": "1", "before_revision": "URLanisms are exposed to neural damage throughout their lives, which can reduce their ability to carry out core behavioral tasks . Their neural circuits need to maintain functionality despite injury, which often requires that key readout signals from the system be preserved . In this work, we explore whether and how certain structural and functional network motifs act as injury mitigation mechanisms by protecting these readouts . Specifically, we examine how (i) Hebbian learning, (ii) high levels of noise, and (iii) presence of parallel inhibitory and excitatory connections contribute to robustness of the olfactory system in the Manduca sexta moth. We simulate injuries on a detailed computational model of the moth olfactory network in which structures-under-test are parametrically varied. Neuronal impairments are modeled as focal axonal swellings, an axonal pathology observed across all severities of traumatic brain injuries and present in other leading brain disorders. Axonal swellings effectively compromise spike train propagation along the axon and consequently reduce the effective neural firing rate delivered to downstream neurons. All three of the network motifs examined significantly mitigate the effects of injury on readout neurons, either by reducing injury's impact on readout neuron responses or by restoring these responses to pre-injury levels through reinforcement learning . These motifs may thus be partially explained by their value as adaptive mechanisms to minimize the functional effects of neural injury. More generally, these experiments suggest that robustness to injury is a vital design principle to consider when analyzing biological neural systems. Indeed, it is possible that some neural structures and mechanisms, including the ability to learn, are best understood as evolutionary solutions to the challenge of maintaining system function despite injury.", "after_revision": "URLanisms suffer neuronal damage throughout their lives, which can impair performance of core behaviors . Their neural circuits need to maintain function despite injury, which in particular requires preserving key system outputs . In this work, we explore whether and how certain structural and functional neuronal network motifs act as injury mitigation mechanisms . Specifically, we examine how (i) Hebbian learning, (ii) high levels of noise, and (iii) parallel inhibitory and excitatory connections contribute to the robustness of the olfactory system in the Manduca sexta moth. We simulate injuries on a detailed computational model of the moth olfactory network calibrated to in vivo data. The injuries are modeled on focal axonal swellings, a ubiquitous form of axonal pathology observed in traumatic brain injuries and other brain disorders. Axonal swellings effectively compromise spike train propagation along the axon , reducing the effective neural firing rate delivered to downstream neurons. All three of the network motifs examined significantly mitigate the effects of injury on readout neurons, either by reducing injury's impact on readout neuron responses or by restoring these responses to pre-injury levels . These motifs may thus be partially explained by their value as adaptive mechanisms to minimize the functional effects of neural injury. More generally, robustness to injury is a vital design principle to consider when analyzing neural systems. Indeed, it is possible that some neural structures and mechanisms, including the ability to learn, are best understood as evolutionary solutions to the challenge of maintaining system function despite injury.", "edit_actions": [{"type": "R", "before": "are exposed to neural", "after": "suffer neuronal", "start_char_pos": 10, "end_char_pos": 31}, {"type": "R", "before": "reduce their ability to carry out core behavioral tasks", "after": "impair performance of core behaviors", "start_char_pos": 73, "end_char_pos": 128}, {"type": "R", "before": "functionality", "after": "function", "start_char_pos": 170, "end_char_pos": 183}, {"type": "R", "before": "often requires that key readout signals from the system be preserved", "after": "in particular requires preserving key system outputs", "start_char_pos": 206, "end_char_pos": 274}, {"type": "A", "before": null, "after": "neuronal", "start_char_pos": 352, "end_char_pos": 352}, {"type": "D", "before": "by protecting these readouts", "after": null, "start_char_pos": 404, "end_char_pos": 432}, {"type": "D", "before": "presence of", "after": null, "start_char_pos": 523, "end_char_pos": 534}, {"type": "A", "before": null, "after": "the", "start_char_pos": 596, "end_char_pos": 596}, {"type": "R", "before": "in which structures-under-test are parametrically varied. Neuronal impairments are modeled as", "after": "calibrated to in vivo data. The injuries are modeled on", "start_char_pos": 744, "end_char_pos": 837}, {"type": "R", "before": "an", "after": "a ubiquitous form of", "start_char_pos": 862, "end_char_pos": 864}, {"type": "R", "before": "across all severities of", "after": "in", "start_char_pos": 891, "end_char_pos": 915}, {"type": "R", "before": "present in other leading", "after": "other", "start_char_pos": 945, "end_char_pos": 969}, {"type": "R", "before": "and consequently reduce", "after": ", reducing", "start_char_pos": 1066, "end_char_pos": 1089}, {"type": "D", "before": "through reinforcement learning", "after": null, "start_char_pos": 1378, "end_char_pos": 1408}, {"type": "D", "before": "these experiments suggest that", "after": null, "start_char_pos": 1563, "end_char_pos": 1593}, {"type": "D", "before": "biological", "after": null, "start_char_pos": 1670, "end_char_pos": 1680}], "sents_char_pos": [0, 130, 276, 658, 801, 986, 1155, 1410, 1546, 1696]}
+{"doc_id": "1808.10023", "revision_depth": "1", "before_revision": "Biomolecular condensates undergirded by phase separations of proteins and nucleic acids serve crucial biological functions. To gain physical insights into their genetic basis, we study how liquid-liquid phase separation (LLPS) of intrinsically disordered proteins (IDPs) depends on their sequence charge patterns using a coarse-grained model wherein each amino acid residue is represented by a bead on a chain configured in real space. Phase diagrams are determined by Langevin dynamics. Charge patterns are characterized by the `blockiness' measure \\kappa and the `sequence charge decoration' (SCD) parameter. Consistent with random phase approximation (RPA) theory and lattice simulations, LLPS propensity ( critical temperature T^*_{\\rm cr} ) increases with increasingly negative SCD for a set of sequences showing a positive correlation between \\kappa and -SCD. Relative to RPA predictions, however, the simulated sequence-dependent variation in T^*_{\\rm cr} is often---though not always---smaller, whereas the simulated critical volume fractions are higher. In contrast , for a set of sequences exhibiting an anti-correlation between \\kappa and -SCD, the simulated T^*_{\\rm cr}'s are---contrary to RPA prediction---quite insensitive to \\kappa or SCD . Additionally, we find that the LLPS propensity of IDPs with a strictly alternating charge sequence might have been overestimated because stabilizing interactions among such sequences require spatial alignments that are more difficult to achieve in real space than stipulated by RPA or lattice models. Taken together, our results underscore both the utility and limitations of RPA as well as the \\kappa and SCD parameters . Further efforts will be needed to rationalize the newly observed subtleties.", "after_revision": "Biomolecular condensates undergirded by phase separations of proteins and nucleic acids serve crucial biological functions. To gain physical insights into their genetic basis, we study how liquid-liquid phase separation (LLPS) of intrinsically disordered proteins (IDPs) depends on their sequence charge patterns using a continuum Langevin chain model wherein each amino acid residue is represented by a single bead. Charge patterns are characterized by the `blockiness' measure \\kappa and the `sequence charge decoration' (SCD) parameter. Consistent with random phase approximation (RPA) theory and lattice simulations, LLPS propensity as characterized by critical temperature T^*_{\\rm cr} increases with increasingly negative SCD for a set of sequences showing a positive correlation between \\kappa and -SCD. Relative to RPA , the simulated sequence-dependent variation in T^*_{\\rm cr} is often---though not always---smaller, whereas the simulated critical volume fractions are higher. However , for a set of sequences exhibiting an anti-correlation between \\kappa and -SCD, the simulated T^*_{\\rm cr}'s are quite insensitive to either parameters . Additionally, we find that blocky sequences that allow for strong electrostatic repulsion can lead to coexistence curves with upward concavity as stipulated by RPA, but the LLPS propensity of a strictly alternating charge sequence was likely overestimated by RPA and lattice models because interchain stabilization of this sequence requires spatial alignments that are difficult to achieve in real space . These results help delineate the utility and limitations of the charge pattern parameters and of RPA, pointing to further efforts necessary for rationalizing the newly observed subtleties.", "edit_actions": [{"type": "R", "before": "coarse-grained", "after": "continuum Langevin chain", "start_char_pos": 321, "end_char_pos": 335}, {"type": "R", "before": "bead on a chain configured in real space. Phase diagrams are determined by Langevin dynamics.", "after": "single bead.", "start_char_pos": 394, "end_char_pos": 487}, {"type": "R", "before": "(", "after": "as characterized by", "start_char_pos": 708, "end_char_pos": 709}, {"type": "D", "before": ")", "after": null, "start_char_pos": 744, "end_char_pos": 745}, {"type": "R", "before": "predictions, however,", "after": ",", "start_char_pos": 882, "end_char_pos": 903}, {"type": "R", "before": "In contrast", "after": "However", "start_char_pos": 1063, "end_char_pos": 1074}, {"type": "R", "before": "are---contrary to RPA prediction---quite insensitive to \\kappa or SCD", "after": "are quite insensitive to either parameters", "start_char_pos": 1185, "end_char_pos": 1254}, {"type": "A", "before": null, "after": "blocky sequences that allow for strong electrostatic repulsion can lead to coexistence curves with upward concavity as stipulated by RPA, but", "start_char_pos": 1284, "end_char_pos": 1284}, {"type": "D", "before": "IDPs with", "after": null, "start_char_pos": 1308, "end_char_pos": 1317}, {"type": "R", "before": "might have been overestimated because stabilizing interactions among such sequences require", "after": "was likely overestimated by RPA and lattice models because interchain stabilization of this sequence requires", "start_char_pos": 1357, "end_char_pos": 1448}, {"type": "D", "before": "more", "after": null, "start_char_pos": 1477, "end_char_pos": 1481}, {"type": "R", "before": "than stipulated by RPA or lattice models. Taken together, our results underscore both", "after": ". These results help delineate", "start_char_pos": 1517, "end_char_pos": 1602}, {"type": "R", "before": "RPA as well as the \\kappa and SCD parameters . Further efforts will be needed to rationalize", "after": "the charge pattern parameters and of RPA, pointing to further efforts necessary for rationalizing", "start_char_pos": 1634, "end_char_pos": 1726}], "sents_char_pos": [0, 123, 435, 487, 610, 865, 1062, 1558, 1680]}
+{"doc_id": "1809.06156", "revision_depth": "1", "before_revision": "Path analysis is a special class of models in structural equation modeling (SEM) where it describes causal relations among measured variables in a form of linear regression. This paper presents two estimation formulations for confirmatory and exploratory SEM in path analysis problems where a zero pattern of the estimated path coefficient matrix explains a causality structure of the variables. In confirmatory SEM, the original nonlinear equality constraints of model parameters are relaxed to an inequality, allowing us to transform the original problem into a convex problem . A regularized estimation formulation is proposed for exploratory SEM , where the objective function is added with an l1-type penalty of the path coefficient matrix. Under a condition on problem parameters, we show that our optimal solution is low rank and provides an estimate of the path matrix of the original problem. To solve our estimation problems in a convex framework, we apply alternating direction method of multiplier (ADMM) which is shown to be suitable for a large-scale implementation. In combination with applying model selection criteria, the penalty parameter in the regularized estimation, controlling the density of nonzero entries in the path matrix, can be chosen to provide a reasonable trade-off between the model fitting and the complexity of causality structure. The performance of our approach is demonstrated in both simulated and real data sets, and with a comparison of existing methods. Real application results include learning causality among climate variables in Thailand where our findings can explain known relations among air pollutants and weather variables. The other experiment is to explore connectivities among brain regions using fMRI time series from ABIDE data sets where our results are interpreted to explain brain network differencesin autism patients .", "after_revision": "Path analysis is a model class of structural equation modeling (SEM) , which it describes causal relations among measured variables in the form of a multiple linear regression. This paper presents two estimation formulations , one each for confirmatory and exploratory SEM , where a zero pattern of the estimated path coefficient matrix can explain a causality structure of the variables. The original nonlinear equality constraints of the model parameters were relaxed to an inequality, allowing the transformation of the original problem into a convex framework . A regularized estimation formulation was then proposed for exploratory SEM using an l1-type penalty of the path coefficient matrix. Under a condition on problem parameters, our optimal solution is low rank and provides a useful solution to the original problem. Proximal algorithms were applied to solve our convex programs in a large-scale setting. The performance of this approach was demonstrated in both simulated and real data sets, and in comparison with an existing method. When applied to two real application results ( learning causality among climate variables in Thailand and examining connectivity differences in autism patients using fMRI time series from ABIDE data sets ) the findings could explain known relationships among environmental variables and discern known and new brain connectivity differences, respectively .", "edit_actions": [{"type": "R", "before": "special class of models in", "after": "model class of", "start_char_pos": 19, "end_char_pos": 45}, {"type": "R", "before": "where", "after": ", which", "start_char_pos": 81, "end_char_pos": 86}, {"type": "R", "before": "a form of", "after": "the form of a multiple", "start_char_pos": 145, "end_char_pos": 154}, {"type": "A", "before": null, "after": ", one each", "start_char_pos": 222, "end_char_pos": 222}, {"type": "R", "before": "in path analysis problems", "after": ",", "start_char_pos": 260, "end_char_pos": 285}, {"type": "R", "before": "explains", "after": "can explain", "start_char_pos": 348, "end_char_pos": 356}, {"type": "R", "before": "In confirmatory SEM, the", "after": "The", "start_char_pos": 397, "end_char_pos": 421}, {"type": "R", "before": "model parameters are", "after": "the model parameters were", "start_char_pos": 465, "end_char_pos": 485}, {"type": "R", "before": "us to transform the", "after": "the transformation of the", "start_char_pos": 521, "end_char_pos": 540}, {"type": "R", "before": "problem", "after": "framework", "start_char_pos": 572, "end_char_pos": 579}, {"type": "R", "before": "is", "after": "was then", "start_char_pos": 619, "end_char_pos": 621}, {"type": "R", "before": ", where the objective function is added with", "after": "using", "start_char_pos": 651, "end_char_pos": 695}, {"type": "D", "before": "we show that", "after": null, "start_char_pos": 788, "end_char_pos": 800}, {"type": "R", "before": "an estimate of the path matrix of the", "after": "a useful solution to the", "start_char_pos": 847, "end_char_pos": 884}, {"type": "R", "before": "To solve our estimation problems in a convex framework, we apply alternating direction method of multiplier (ADMM) which is shown to be suitable for a", "after": "Proximal algorithms were applied to solve our convex programs in a", "start_char_pos": 903, "end_char_pos": 1053}, {"type": "R", "before": "implementation. In combination with applying model selection criteria, the penalty parameter in the regularized estimation, controlling the density of nonzero entries in the path matrix, can be chosen to provide a reasonable trade-off between the model fitting and the complexity of causality structure.", "after": "setting.", "start_char_pos": 1066, "end_char_pos": 1369}, {"type": "R", "before": "our approach is", "after": "this approach was", "start_char_pos": 1389, "end_char_pos": 1404}, {"type": "R", "before": "with a comparison of existing methods. Real application results include", "after": "in comparison with an existing method. When applied to two real application results (", "start_char_pos": 1460, "end_char_pos": 1531}, {"type": "R", "before": "where our findings can explain known relations among air pollutants and weather variables. The other experiment is to explore connectivities among brain regions", "after": "and examining connectivity differences in autism patients", "start_char_pos": 1587, "end_char_pos": 1747}, {"type": "R", "before": "where our results are interpreted to explain brain network differencesin autism patients", "after": ") the findings could explain known relationships among environmental variables and discern known and new brain connectivity differences, respectively", "start_char_pos": 1792, "end_char_pos": 1880}], "sents_char_pos": [0, 173, 396, 581, 746, 902, 1081, 1369, 1498, 1677]}
+{"doc_id": "1809.08959", "revision_depth": "1", "before_revision": "Multi-site studies are becoming important to increase statistical power, enhance generalizability, and to improve the likelihood of pooling relevant subgroups together activities which are otherwise limited by the availability of patients or funds at a single site . Even with harmonized imaging sequences, site-dependent variability can mask the advantages of these multi-site studies. The aim of this study was to assess multi-site reproducibility in resting-state functional connectivity fingerprints, and to improve identifiability of obtained functional connectomes. The individual fingerprinting of functional connectivity profiles is promising due to its potential as a robust neuroimaging biomarker with which to draw single-subject inferences . We evaluated individual fingerprints in test-retest visit pairs within and across two sites and present a generalized framework based on principal component analysis to improve identifiability. Those principal components that maximized differential identifiability of a training dataset were used as an orthogonal connectivity basis to reconstruct the individual functional connectomes of training and validation sets. The optimally reconstructed functional connectomes showed a substantial improvement in individual fingerprinting of the subjects within and across the two sites and test-retest visit pairs relative to the original data. A notable increase in ICC values for functional edges and resting-state networks were also observedfor reconstructed functional connectomes . Improvements in identifiability were not found to be affected by the presence or absence of global signal regression. Result demonstrate that the data-driven method presented in this study can improve identifiability in resting-state functional connectomes in multi-site studies.", "after_revision": "Multi-site studies are becoming important to increase statistical power, enhance generalizability, and to improve the likelihood of pooling relevant subgroups together activities . Even with harmonized imaging sequences, site-dependent variability can mask the advantages of these multi-site studies. The aim of this study was to assess multi-site reproducibility in resting-state functional connectivity fingerprints, and to improve identifiability of functional connectomes. The individual fingerprinting of functional connectivity profiles is promising due to its potential as a robust neuroimaging biomarker . We evaluated , on two independent multi-site datasets, individual fingerprints in test-retest visit pairs within and across two sites and present a generalized framework based on principal component analysis to improve identifiability. Those components that maximized differential identifiability of a training dataset were used as an orthogonal connectivity basis to reconstruct the functional connectomes of training and validation sets. The optimally reconstructed functional connectomes showed a substantial improvement in individual fingerprinting within and across the two sites relative to the original data. A notable increase in ICC values for functional edges and resting-state networks was also observed . Improvements in identifiability were not found to be affected by global signal regression. Post-hoc analyses assessed the effect of the number of fMRI volumes on identifiability and showed that multi-site differential identifiability was for all cases maximized after optimal reconstruction. The generalizability of the optimal set of orthogonal basis of each dataset was evaluated through a leave-one-out procedure. Overall, results demonstrate that the framework presented in this study systematically improves identifiability in resting-state functional connectomes in multi-site studies.", "edit_actions": [{"type": "D", "before": "which are otherwise limited by the availability of patients or funds at a single site", "after": null, "start_char_pos": 179, "end_char_pos": 264}, {"type": "D", "before": "obtained", "after": null, "start_char_pos": 539, "end_char_pos": 547}, {"type": "D", "before": "with which to draw single-subject inferences", "after": null, "start_char_pos": 707, "end_char_pos": 751}, {"type": "A", "before": null, "after": ", on two independent multi-site datasets,", "start_char_pos": 767, "end_char_pos": 767}, {"type": "D", "before": "principal", "after": null, "start_char_pos": 955, "end_char_pos": 964}, {"type": "D", "before": "individual", "after": null, "start_char_pos": 1107, "end_char_pos": 1117}, {"type": "D", "before": "of the subjects", "after": null, "start_char_pos": 1287, "end_char_pos": 1302}, {"type": "D", "before": "and test-retest visit pairs", "after": null, "start_char_pos": 1335, "end_char_pos": 1362}, {"type": "R", "before": "were also observedfor reconstructed functional connectomes", "after": "was also observed", "start_char_pos": 1475, "end_char_pos": 1533}, {"type": "D", "before": "the presence or absence of", "after": null, "start_char_pos": 1601, "end_char_pos": 1627}, {"type": "R", "before": "Result", "after": "Post-hoc analyses assessed the effect of the number of fMRI volumes on identifiability and showed that multi-site differential identifiability was for all cases maximized after optimal reconstruction. The generalizability of the optimal set of orthogonal basis of each dataset was evaluated through a leave-one-out procedure. Overall, results", "start_char_pos": 1654, "end_char_pos": 1660}, {"type": "R", "before": "data-driven method", "after": "framework", "start_char_pos": 1682, "end_char_pos": 1700}, {"type": "R", "before": "can improve", "after": "systematically improves", "start_char_pos": 1725, "end_char_pos": 1736}], "sents_char_pos": [0, 266, 386, 571, 753, 948, 1173, 1393, 1535, 1653]}
+{"doc_id": "1810.01174", "revision_depth": "2", "before_revision": "Statistical analysis of functional images (signals) allows the assessment of neural connectivity patterns at mesoscopic scale. Scalp fields, recorded with Magneto-Electro Encephalography MEEG, strongly correlate to the average effect of synaptic activity, i.e. Primary Current Density (PCD) at the Gray Matter space. Nevertheless, what is observed at the sensor space with either technique is a superposition of projected fields, from the whole Gray-Matter PCD. That is the reason for a major pitfall of MEEG analysis methods, distorted reconstruction of source activity and its connectivity or \"Leakage\". There has been a quest for the modelling to counterattack Leakage of both activation and connectivity. It has been proven that current methods produce incorrect connectomes , also related to incorrect connectivity modelling : they disregard either System Theory and Bayesian Formalism . We introduce a system theoretic formalism of MEEG connectivity alongside its Bayesian inference: Hidden Hermitian Gaussian Graphical Model (H-HGGM). This is a source (state) GGM hidden by the MEEG observation equation , i. e. equivalent to a frequency domain Linear State Space Model (LSSM) . It is unhidden due to the Type II Likelihood approximated representation: Expected Log-Likelihood (ELL). The essential contributions here are a theory for HGGM solvers, and its implementation for the subsequent Maximization step of the H-HGGM ELL. Its efficacy is demonstrated in high resolution EEG simulations and a Steady State Visual Evoked potential. Open source packages , to reproduce the results presented in this paper and to analyze external MEEG databases , are freely available online .", "after_revision": "The noninvasive procedures for neural connectivity are under questioning. Theoretical models sustain that the electromagnetic field registered at external sensors is elicited by currents at neural space. Nevertheless, what we observe at the sensor space is a superposition of projected fields, from the whole gray-matter. This is the reason for a major pitfall of noninvasive Electrophysiology methods: distorted reconstruction of neural activity and its connectivity or leakage. It has been proven that current methods produce incorrect connectomes . Somewhat related to the incorrect connectivity modelling , they disregard either Systems Theory and Bayesian Information Theory . We introduce a new formalism that attains for it, Hidden Gaussian Graphical State-Model (HIGGS). A neural Gaussian Graphical Model (GGM) hidden by the observation equation of Magneto-encephalographic (MEEG) signals. HIGGS is equivalent to a frequency domain Linear State Space Model (LSSM) but with sparse connectivity prior. The mathematical contribution here is the theory for high-dimensional and frequency-domain HIGGS solvers. We demonstrate that HIGGS can attenuate the leakage effect in the most critical case: the distortion EEG signal due to head volume conduction heterogeneities. Its application in EEG is illustrated with retrieved connectivity patterns from human Steady State Visual Evoked Potentials (SSVEP). We provide for the first time confirmatory evidence for noninvasive procedures of neural connectivity: concurrent EEG and Electrocorticography (ECoG) recordings on monkey. Open source packages are freely available online , to reproduce the results presented in this paper and to analyze external MEEG databases .", "edit_actions": [{"type": "R", "before": "Statistical analysis of functional images (signals) allows the assessment of neural connectivity patterns at mesoscopic scale. Scalp fields, recorded with Magneto-Electro Encephalography MEEG, strongly correlate to the average effect of synaptic activity, i.e. Primary Current Density (PCD) at the Gray Matter", "after": "The noninvasive procedures for neural connectivity are under questioning. Theoretical models sustain that the electromagnetic field registered at external sensors is elicited by currents at neural", "start_char_pos": 0, "end_char_pos": 309}, {"type": "R", "before": "is observed", "after": "we observe", "start_char_pos": 336, "end_char_pos": 347}, {"type": "D", "before": "with either technique", "after": null, "start_char_pos": 368, "end_char_pos": 389}, {"type": "R", "before": "Gray-Matter PCD. That", "after": "gray-matter. This", "start_char_pos": 445, "end_char_pos": 466}, {"type": "R", "before": "MEEG analysis methods,", "after": "noninvasive Electrophysiology methods:", "start_char_pos": 504, "end_char_pos": 526}, {"type": "R", "before": "source", "after": "neural", "start_char_pos": 555, "end_char_pos": 561}, {"type": "R", "before": "\"Leakage\". There has been a quest for the modelling to counterattack Leakage of both activation and connectivity.", "after": "leakage.", "start_char_pos": 595, "end_char_pos": 708}, {"type": "R", "before": ", also related to", "after": ". Somewhat related to the", "start_char_pos": 779, "end_char_pos": 796}, {"type": "R", "before": ":", "after": ",", "start_char_pos": 830, "end_char_pos": 831}, {"type": "R", "before": "System", "after": "Systems", "start_char_pos": 854, "end_char_pos": 860}, {"type": "R", "before": "Formalism", "after": "Information Theory", "start_char_pos": 881, "end_char_pos": 890}, {"type": "R", "before": "system theoretic formalism of MEEG connectivity alongside its Bayesian inference: Hidden Hermitian Gaussian Graphical Model (H-HGGM). This is a source (state) GGM", "after": "new formalism that attains for it, Hidden Gaussian Graphical State-Model (HIGGS). A neural Gaussian Graphical Model (GGM)", "start_char_pos": 908, "end_char_pos": 1070}, {"type": "R", "before": "MEEG observation equation , i. e.", "after": "observation equation of Magneto-encephalographic (MEEG) signals. HIGGS is", "start_char_pos": 1085, "end_char_pos": 1118}, {"type": "R", "before": ". It is unhidden due to the Type II Likelihood approximated representation: Expected Log-Likelihood (ELL). The essential contributions here are a theory for HGGM solvers, and its implementation for the subsequent Maximization step of the H-HGGM ELL. Its efficacy is demonstrated in high resolution EEG simulations and a", "after": "but with sparse connectivity prior. The mathematical contribution here is the theory for high-dimensional and frequency-domain HIGGS solvers. We demonstrate that HIGGS can attenuate the leakage effect in the most critical case: the distortion EEG signal due to head volume conduction heterogeneities. Its application in EEG is illustrated with retrieved connectivity patterns from human", "start_char_pos": 1184, "end_char_pos": 1503}, {"type": "R", "before": "potential.", "after": "Potentials (SSVEP). We provide for the first time confirmatory evidence for noninvasive procedures of neural connectivity: concurrent EEG and Electrocorticography (ECoG) recordings on monkey.", "start_char_pos": 1531, "end_char_pos": 1541}, {"type": "A", "before": null, "after": "are freely available online", "start_char_pos": 1563, "end_char_pos": 1563}, {"type": "D", "before": ", are freely available online", "after": null, "start_char_pos": 1654, "end_char_pos": 1683}], "sents_char_pos": [0, 126, 316, 461, 605, 708, 892, 1041, 1290, 1433, 1541]}
+{"doc_id": "1810.03140", "revision_depth": "3", "before_revision": "A typical predictive regression employs a multitude of potential regressors with various degrees of persistence while their signal strength in explaining the dependent variable is often low . Variable selection in such context is of great importance. In this paper, we explore the pitfalls and possibilities of LASSO methods in this predictive regression framework with mixed degrees of persistence . In the presence of stationary, unit root and cointegrated predictors, we show that the adaptive LASSO asymptotically breaks cointegrated groups although it cannot wipe out all inactive cointegrating variables . This new finding motivates a simple but novel post-selection adaptive LASSO, which we call the twin adaptive LASSO (TAlasso), to fix variable selection inconsistency. TAlasso's penalty scheme accommodates the system of heterogeneous regressors, and it recovers the well-known oracle property that implies variable selection consistency and optimal rate of convergence for all three types of regressors. On the contrary , conventional LASSO fails to attain coefficient estimation consistency and variable screening in all components simultaneously , since its penalty is imposed according to the marginal behavior of each individual regressor only. We demonstrate the theoretical properties via extensive Monte Carlo simulations. These LASSO-type methods are applied to evaluate short- and long-horizon predictability of S P 500 excess return .", "after_revision": "Explanatory variables in a predictive regression typically exhibit low signal strength and various degrees of persistence . Variable selection in such a context is of great importance. In this paper, we explore the pitfalls and possibilities of the LASSO methods in this predictive regression framework . In the presence of stationary, local unit root, and cointegrated predictors, we show that the adaptive LASSO cannot asymptotically eliminate all cointegrating variables with zero regression coefficients . This new finding motivates a novel post-selection adaptive LASSO, which we call the twin adaptive LASSO (TAlasso), to restore variable selection consistency. Accommodating the system of heterogeneous regressors, TAlasso achieves the well-known oracle property . In contrast , conventional LASSO fails to attain coefficient estimation consistency and variable screening in all components simultaneously . We apply these LASSO methods to evaluate the short- and long-horizon predictability of S \\& P 500 excess returns .", "edit_actions": [{"type": "R", "before": "A typical predictive regression employs a multitude of potential regressors with", "after": "Explanatory variables in a predictive regression typically exhibit low signal strength and", "start_char_pos": 0, "end_char_pos": 80}, {"type": "D", "before": "while their signal strength in explaining the dependent variable is often low", "after": null, "start_char_pos": 112, "end_char_pos": 189}, {"type": "A", "before": null, "after": "a", "start_char_pos": 219, "end_char_pos": 219}, {"type": "A", "before": null, "after": "the", "start_char_pos": 312, "end_char_pos": 312}, {"type": "D", "before": "with mixed degrees of persistence", "after": null, "start_char_pos": 367, "end_char_pos": 400}, {"type": "R", "before": "unit root", "after": "local unit root,", "start_char_pos": 434, "end_char_pos": 443}, {"type": "R", "before": "asymptotically breaks cointegrated groups although it cannot wipe out all inactive cointegrating variables", "after": "cannot asymptotically eliminate all cointegrating variables with zero regression coefficients", "start_char_pos": 505, "end_char_pos": 611}, {"type": "D", "before": "simple but", "after": null, "start_char_pos": 643, "end_char_pos": 653}, {"type": "R", "before": "fix variable selection inconsistency. TAlasso's penalty scheme accommodates", "after": "restore variable selection consistency. Accommodating", "start_char_pos": 743, "end_char_pos": 818}, {"type": "R", "before": "and it recovers", "after": "TAlasso achieves", "start_char_pos": 859, "end_char_pos": 874}, {"type": "R", "before": "that implies variable selection consistency and optimal rate of convergence for all three types of regressors. On the contrary", "after": ". In contrast", "start_char_pos": 906, "end_char_pos": 1032}, {"type": "R", "before": ", since its penalty is imposed according to the marginal behavior of each individual regressor only. We demonstrate the theoretical properties via extensive Monte Carlo simulations. These LASSO-type methods are applied to evaluate", "after": ". We apply these LASSO methods to evaluate the", "start_char_pos": 1161, "end_char_pos": 1391}, {"type": "A", "before": null, "after": "\\&", "start_char_pos": 1436, "end_char_pos": 1436}, {"type": "R", "before": "return", "after": "returns", "start_char_pos": 1450, "end_char_pos": 1456}], "sents_char_pos": [0, 251, 402, 613, 780, 1016, 1261, 1342]}
+{"doc_id": "1810.07457", "revision_depth": "1", "before_revision": "Vanna-volga is a popular method for interpolation/extrapolation of volatility smiles. The technique is widely used in the FX markets context, due to its ability to consistently construct the entire lognormal smile using only three lognormal market quotes. However, the derivation of vanna-volga method itself is free of distributional assumptions. To this end , it is surprising there have been actually no attempts to apply the method to Normal volatilities which are the current standard for interest rate markets . We show how the method can be modified to build Normal volatility smiles. As it turns out, that requires only minor modifications compared to the lognormal case. Moreover, as the inversion of Normal volatilities from option prices is easier in the Normal case, the smile construction can occur at a machine-precision level using analytical formulae, making the approximations via Taylor-series unnecessary. Apart from being based on practical and intuitive hedging arguments, the vanna-volga has further important advantages. In comparison to the Normal SABR model, the vanna-volga can easily fit both classical convex and atypical concave smiles ( \"frowns\" ). Concave smile patters are sometimes observed around ATM strikes in the interest rate markets, in particular in the situations of anticipated jumps (with unclear outcome) in interest rates. Besides, concavity is often observed towards the lower/left end of the Normal volatility smiles of interest rates. At least in these situations, the vanna-volga can be expected to interpolate/extrapolate better than SABR.", "after_revision": "Vanna-Volga is a popular method for the interpolation/extrapolation of volatility smiles. The technique is widely used in the FX markets context, due to its ability to consistently construct the entire Lognormal smile using only three Lognormal market quotes. However, the derivation of the Vanna-Volga method itself is free of distributional assumptions. With this is mind , it is surprising there have been no attempts to apply the method to Normal volatilities ( the current standard for interest rate markets ) . We show how the method can be modified to build Normal volatility smiles. As it turns out, only minor modifications are required compared to the Lognormal case. Moreover, as the inversion of Normal volatilities from option prices is easier in the Normal case, the smile construction can occur at a machine-precision level using analytical formulae, making the approximations via Taylor-series unnecessary. Apart from being based on practical and intuitive hedging arguments, the Vanna-Volga has further important advantages. In comparison to the Normal SABR model, the Vanna-Volga can easily fit both classical convex and atypical concave smiles ( frowns ). Concave smile patterns are sometimes observed around ATM strikes in the interest rate markets, particularly in the situations of anticipated jumps (with an unclear outcome) in interest rates. Besides, concavity is often observed towards the lower/left end of the Normal volatility smiles of interest rates. At least in these situations, the Vanna-Volga can be expected to interpolate/extrapolate better than SABR.", "edit_actions": [{"type": "R", "before": "Vanna-volga", "after": "Vanna-Volga", "start_char_pos": 0, "end_char_pos": 11}, {"type": "A", "before": null, "after": "the", "start_char_pos": 36, "end_char_pos": 36}, {"type": "R", "before": "lognormal", "after": "Lognormal", "start_char_pos": 199, "end_char_pos": 208}, {"type": "R", "before": "lognormal", "after": "Lognormal", "start_char_pos": 232, "end_char_pos": 241}, {"type": "R", "before": "vanna-volga", "after": "the Vanna-Volga", "start_char_pos": 284, "end_char_pos": 295}, {"type": "R", "before": "To this end", "after": "With this is mind", "start_char_pos": 349, "end_char_pos": 360}, {"type": "D", "before": "actually", "after": null, "start_char_pos": 396, "end_char_pos": 404}, {"type": "R", "before": "which are", "after": "(", "start_char_pos": 460, "end_char_pos": 469}, {"type": "A", "before": null, "after": ")", "start_char_pos": 517, "end_char_pos": 517}, {"type": "D", "before": "that requires", "after": null, "start_char_pos": 611, "end_char_pos": 624}, {"type": "A", "before": null, "after": "are required", "start_char_pos": 650, "end_char_pos": 650}, {"type": "R", "before": "lognormal", "after": "Lognormal", "start_char_pos": 667, "end_char_pos": 676}, {"type": "R", "before": "vanna-volga", "after": "Vanna-Volga", "start_char_pos": 1001, "end_char_pos": 1012}, {"type": "R", "before": "vanna-volga", "after": "Vanna-Volga", "start_char_pos": 1091, "end_char_pos": 1102}, {"type": "R", "before": "\"frowns\"", "after": "frowns", "start_char_pos": 1170, "end_char_pos": 1178}, {"type": "R", "before": "patters", "after": "patterns", "start_char_pos": 1196, "end_char_pos": 1203}, {"type": "R", "before": "in particular in", "after": "particularly in", "start_char_pos": 1276, "end_char_pos": 1292}, {"type": "A", "before": null, "after": "an", "start_char_pos": 1335, "end_char_pos": 1335}, {"type": "R", "before": "vanna-volga", "after": "Vanna-Volga", "start_char_pos": 1521, "end_char_pos": 1532}], "sents_char_pos": [0, 86, 256, 348, 519, 593, 682, 927, 1046, 1181, 1371, 1486]}
+{"doc_id": "1810.10142", "revision_depth": "2", "before_revision": "Abnormal synchronisation has been associated with epileptic seizures, one of the most common brain disease. Due to this fact, a better understanding of neuronal synchronisation mechanisms can help in the epilepsytreatment. We study neuronal synchronisation by means of a randomly network with excitatory and inhibitory synapses, where the neuron model is given by the adaptive exponential integrate-and-fire . In our network , we verify that the decrease in the influence of inhibition can generate synchronisation from a pattern of desynchronised spikes. The transition from desynchronous spikes to synchronous bursts activities , induced by varying the synaptic coupling, emerges in a hysteretic loop due to a bistable regime where normal (desynchronous) or abnormal ( synchronous) regimes exist. We show that, for parameters within the bistable region , a square current pulse can trigger the abnormalsynchronous regime , a process we claim to reproduce features of an epileptic seizure. We can also suppress it, as well. Suppression can be achieved through a current with small amplitude applying on less than 10 %DIFDELCMD < \\\\%%% %DIF < of neurons. Therefore, our results demonstrate that electrical stimulation not only can trigger synchronous behaviours, but also can be an effective treatment for epileptic seizures induced in a bistable regime.\\end{abstract} ", "after_revision": "Excessively high, neural synchronisation has been associated with epileptic seizures, one of the most common brain diseases worldwide. A better understanding of neural synchronisation mechanisms can thus help control or even treat epilepsy. In this paper, we study neural synchronisation in a random network where nodes are neurons with excitatory and inhibitory synapses, and neural activity for each node is provided by the adaptive exponential integrate-and-fire model. In this framework , we verify that the decrease in the influence of inhibition can generate synchronisation originating from a pattern of desynchronised spikes. The transition from desynchronous spikes to synchronous bursts of activity , induced by varying the synaptic coupling, emerges in a hysteresis loop due to bistability where abnormal (excessively high synchronous) regimes exist. We verify that, for parameters in the bistability regime , a square current pulse can trigger excessively high (abnormal) synchronisation , a process that can reproduce features of epileptic seizures. Then, we show that it is possible to suppress such abnormal synchronisation by applying a small-amplitude external current on less than 10 %DIFDELCMD < \\\\%%% %DIF < of neurons. Therefore, our results demonstrate that electrical stimulation not only can trigger synchronous behaviours, but also can be an effective treatment for epileptic seizures induced in a bistable regime.\\end{abstract} \\% of the neurons in the network. Our results demonstrate that external electrical stimulation not only can trigger synchronous behaviour, but more importantly, it can be used as a means to reduce abnormal synchronisation and thus, control or treat effectively epileptic seizures.", "edit_actions": [{"type": "R", "before": "Abnormal", "after": "Excessively high, neural", "start_char_pos": 0, "end_char_pos": 8}, {"type": "R", "before": "disease. Due to this fact, a", "after": "diseases worldwide. A", "start_char_pos": 99, "end_char_pos": 127}, {"type": "R", "before": "neuronal", "after": "neural", "start_char_pos": 152, "end_char_pos": 160}, {"type": "R", "before": "help in the epilepsytreatment. We study neuronal synchronisation by means of a randomly network", "after": "thus help control or even treat epilepsy. In this paper, we study neural synchronisation in a random network where nodes are neurons", "start_char_pos": 192, "end_char_pos": 287}, {"type": "R", "before": "where the neuron model is given", "after": "and neural activity for each node is provided", "start_char_pos": 329, "end_char_pos": 360}, {"type": "R", "before": ". In our network", "after": "model. In this framework", "start_char_pos": 408, "end_char_pos": 424}, {"type": "A", "before": null, "after": "originating", "start_char_pos": 515, "end_char_pos": 515}, {"type": "R", "before": "activities", "after": "of activity", "start_char_pos": 620, "end_char_pos": 630}, {"type": "R", "before": "hysteretic", "after": "hysteresis", "start_char_pos": 688, "end_char_pos": 698}, {"type": "R", "before": "a bistable regime where normal (desynchronous) or abnormal (", "after": "bistability where abnormal (excessively high", "start_char_pos": 711, "end_char_pos": 771}, {"type": "R", "before": "show", "after": "verify", "start_char_pos": 803, "end_char_pos": 807}, {"type": "R", "before": "within the bistable region", "after": "in the bistability regime", "start_char_pos": 829, "end_char_pos": 855}, {"type": "R", "before": "the abnormalsynchronous regime", "after": "excessively high (abnormal) synchronisation", "start_char_pos": 893, "end_char_pos": 923}, {"type": "R", "before": "we claim to", "after": "that can", "start_char_pos": 936, "end_char_pos": 947}, {"type": "R", "before": "an epileptic seizure. We can also suppress it, as well. Suppression can be achieved through a current with small amplitude applying", "after": "epileptic seizures. Then, we show that it is possible to suppress such abnormal synchronisation by applying a small-amplitude external current", "start_char_pos": 970, "end_char_pos": 1101}, {"type": "A", "before": null, "after": "\\% of the neurons in the network. Our results demonstrate that external electrical stimulation not only can trigger synchronous behaviour, but more importantly, it can be used as a means to reduce abnormal synchronisation and thus, control or treat effectively epileptic seizures.", "start_char_pos": 1370, "end_char_pos": 1370}], "sents_char_pos": [0, 107, 222, 409, 556, 799, 991, 1025, 1155, 1355]}
+{"doc_id": "1810.10974", "revision_depth": "1", "before_revision": "This paper tackles the problem of learning brain-visual representations for understanding and neural processes behind human visual perception , with a view towards replicating these processes into machines. The core idea is to learn plausible representations through the combined use of human neural activity evoked by natural imagesas a supervision mechanism for deep learning models. To accomplish this, we propose a multimodal approach that uses two different deep encoders, one for images and one for EEGs, trained in a siamese configuration for learning a joint manifold that maximizes a compatibility measure between visual features and brain representation. The learned manifold is then used to perform image classification and saliency detection as well as to shed light on the possible representations generated by the human brain when perceiving the visual world. Performance analysis shows that neural signals can be used to effectively supervise the training of deep learning models, as demonstrated by the achieved performance in both image classification and saliency detection . Furthermore, the learned brain-visual manifold is consistent with cognitive neuroscience literature about visual perception and , most importantly, highlights new associations between brain areas, image patches and computational kernels. In particular, we are able to approximate brain responses to visual stimuli by training an artificial model with image features correlated to neural activity .", "after_revision": "This work presents a novel method of exploring human brain-visual representations , with a view towards replicating these processes in machines. The core idea is to learn plausible computational and biological representations by correlating human neural activity and natural images. Thus, we first propose a model, EEG-ChannelNet, to learn a brain manifold for EEG classification. After verifying that visual information can be extracted from EEG data, we introduce a multimodal approach that uses deep image and EEG encoders, trained in a siamese configuration , for learning a joint manifold that maximizes a compatibility measure between visual features and brain representations. We then carry out image classification and saliency detection on the learned manifold. Performance analyses show that our approach satisfactorily decodes visual information from neural signals. This, in turn, can be used to effectively supervise the training of deep learning models, as demonstrated by the high performance of image classification and saliency detection on out-of-training classes. The obtained results show that the learned brain-visual features lead to improved performance and simultaneously bring deep models more in line with cognitive neuroscience work related to visual perception and attention .", "edit_actions": [{"type": "R", "before": "paper tackles the problem of learning", "after": "work presents a novel method of exploring human", "start_char_pos": 5, "end_char_pos": 42}, {"type": "D", "before": "for understanding and neural processes behind human visual perception", "after": null, "start_char_pos": 72, "end_char_pos": 141}, {"type": "R", "before": "into", "after": "in", "start_char_pos": 192, "end_char_pos": 196}, {"type": "R", "before": "representations through the combined use of", "after": "computational and biological representations by correlating", "start_char_pos": 243, "end_char_pos": 286}, {"type": "R", "before": "evoked by natural imagesas a supervision mechanism for deep learning models. To accomplish this, we propose", "after": "and natural images. Thus, we first propose a model, EEG-ChannelNet, to learn a brain manifold for EEG classification. After verifying that visual information can be extracted from EEG data, we introduce", "start_char_pos": 309, "end_char_pos": 416}, {"type": "R", "before": "two different deep encoders, one for images and one for EEGs,", "after": "deep image and EEG encoders,", "start_char_pos": 449, "end_char_pos": 510}, {"type": "A", "before": null, "after": ",", "start_char_pos": 546, "end_char_pos": 546}, {"type": "R", "before": "representation. The learned manifold is then used to perform", "after": "representations. We then carry out", "start_char_pos": 650, "end_char_pos": 710}, {"type": "R", "before": "as well as to shed light on the possible representations generated by the human brain when perceiving the visual world. Performance analysis shows that neural signals", "after": "on the learned manifold. Performance analyses show that our approach satisfactorily decodes visual information from neural signals. This, in turn,", "start_char_pos": 755, "end_char_pos": 921}, {"type": "R", "before": "achieved performance in both", "after": "high performance of", "start_char_pos": 1020, "end_char_pos": 1048}, {"type": "R", "before": ". Furthermore,", "after": "on out-of-training classes. The obtained results show that", "start_char_pos": 1093, "end_char_pos": 1107}, {"type": "R", "before": "manifold is consistent", "after": "features lead to improved performance and simultaneously bring deep models more in line", "start_char_pos": 1133, "end_char_pos": 1155}, {"type": "R", "before": "literature about", "after": "work related to", "start_char_pos": 1184, "end_char_pos": 1200}, {"type": "R", "before": ", most importantly, highlights new associations between brain areas, image patches and computational kernels. In particular, we are able to approximate brain responses to visual stimuli by training an artificial model with image features correlated to neural activity", "after": "attention", "start_char_pos": 1223, "end_char_pos": 1490}], "sents_char_pos": [0, 206, 385, 665, 874, 1094, 1332]}
+{"doc_id": "1811.01051", "revision_depth": "1", "before_revision": "Melanoma is a type of skin cancer with the most rapidly increasing incidence. Early detection of melanoma using dermoscopy images significantly increases patients' survival rate. However, accurately classifying skin lesions , especially in the early stage , is extremely challenging via dermatologists' observation . Hence, the discovery of reliable biomarkers for melanoma diagnosis will be meaningful . Recent years, deep learning empowered computer-assisted diagnosis has been shown its value in medical imaging-based decision making. However, lots of research focus on improving disease detection accuracy but not exploring the evidence of pathology. In this paper, we propose a method to interpret the deep learning classification findings. Firstly, we propose an accurate neural network architecture to classify skin lesion . Secondly, we utilize a prediction difference analysis method that examining each patch on the image through patch wised corrupting for detecting the biomarkers. Lastly, we validate that our biomarker findings are corresponding to the patterns in the literature. The findings might be significant to guide clinical diagnosis.", "after_revision": "Melanoma is a type of skin cancer with the most rapidly increasing incidence. Early detection of melanoma using dermoscopy images significantly increases patients' survival rate. However, accurately classifying skin lesions by eye , especially in the early stage of melanoma , is extremely challenging for the dermatologists . Hence, the discovery of reliable biomarkers will be meaningful for melanoma diagnosis . Recent years, the value of deep learning empowered computer-assisted diagnose has been shown in biomedical imaging based decision making. However, much research focuses on improving disease detection accuracy but not exploring the evidence of pathology. In this paper, we propose a method to interpret the deep learning classification findings. Firstly, we propose an accurate neural network architecture to classify skin lesions . Secondly, we utilize a prediction difference analysis method that examines each patch on the image through patch-wised corrupting to detect the biomarkers. Lastly, we validate that our biomarker findings are corresponding to the patterns in the literature. The findings can be significant and useful to guide clinical diagnosis.", "edit_actions": [{"type": "A", "before": null, "after": "by eye", "start_char_pos": 224, "end_char_pos": 224}, {"type": "A", "before": null, "after": "of melanoma", "start_char_pos": 257, "end_char_pos": 257}, {"type": "R", "before": "via dermatologists' observation", "after": "for the dermatologists", "start_char_pos": 285, "end_char_pos": 316}, {"type": "D", "before": "for melanoma diagnosis", "after": null, "start_char_pos": 363, "end_char_pos": 385}, {"type": "A", "before": null, "after": "for melanoma diagnosis", "start_char_pos": 405, "end_char_pos": 405}, {"type": "A", "before": null, "after": "the value of", "start_char_pos": 422, "end_char_pos": 422}, {"type": "R", "before": "diagnosis", "after": "diagnose", "start_char_pos": 465, "end_char_pos": 474}, {"type": "R", "before": "its value in medical imaging-based", "after": "in biomedical imaging based", "start_char_pos": 490, "end_char_pos": 524}, {"type": "R", "before": "lots of research focus", "after": "much research focuses", "start_char_pos": 551, "end_char_pos": 573}, {"type": "R", "before": "lesion", "after": "lesions", "start_char_pos": 827, "end_char_pos": 833}, {"type": "R", "before": "examining", "after": "examines", "start_char_pos": 902, "end_char_pos": 911}, {"type": "R", "before": "patch wised corrupting for detecting", "after": "patch-wised corrupting to detect", "start_char_pos": 944, "end_char_pos": 980}, {"type": "R", "before": "might be significant", "after": "can be significant and useful", "start_char_pos": 1111, "end_char_pos": 1131}], "sents_char_pos": [0, 77, 178, 318, 407, 541, 658, 749, 835, 996, 1097]}
+{"doc_id": "1811.05849", "revision_depth": "2", "before_revision": "Attempting to recognize a tree inside a phylogenetic network is a fundamental undertaking in evolutionary analysis. Therefore, the concept of \" tree-based \" phylogenetic networks, which was introduced by Francis and Steel, has attracted much attention of theoretical biologists in the last few years. In this context, spanning trees of a certain kind called \"subdivision trees\" play an essential role and there are many important computational problems about them, whose time complexity is still unclear. Against this backdrop, the present paperaims to provide a graph theoretical framework for solving different problems on subdivision trees in a simple and unified manner. To this end, we focus on a structure called the maximal zig-zag trail decomposition that is inherent in any rooted binary phylogenetic network N and prove a structure theorem that characterizes the collection of all subdivision trees of N . Our theorem does not only imply and unify various results in the literature but also yield linear time (for enumeration, linear delay) algorithms for the following problems: given a rooted binary phylogenetic network N, 1) determine whether or not N has a subdivision tree and find one if there exists any (decision/search problem) ; 2) compute the number of subdivision trees of N (counting problem); 3 ) list all subdivision trees of N (enumeration problem); and 4 ) find a subdivision tree to maximize or minimize a prescribed objective function (optimization problem). Importantly, the results and algorithms in this paper still hold true for some non-binary phylogenetic networks and this generalization gives a partial answer to an open question from Pons, Semple, and Steel. We also mention some statistical applications and further research directions .", "after_revision": "Attempting to recognize a tree inside a phylogenetic network is a fundamental undertaking in evolutionary analysis. In the last few years, therefore, tree-based phylogenetic networks, which are defined by a spanning tree called a subdivision tree, have attracted attention of theoretical biologists . However, the application of such networks is still not easy, due to many problems whose time complexities are not clearly understood. In this paper, we provide a general framework for solving those various old or new problems from a coherent perspective, rather than analyzing the complexity of each individual problem or developing an algorithm one by one. More precisely, we establish a structure theorem that gives a way to canonically decompose any rooted binary phylogenetic network N into maximal zig-zag trails that are uniquely determined, and use it to characterize the set of subdivision trees of N in the form of a direct product, in a way reminiscent of the structure theorem for finitely generated Abelian groups. From the main results, we derive a series of linear time and linear time delay algorithms for the following problems: given a rooted binary phylogenetic network N, 1) determine whether or not N has a subdivision tree and find one if there exists any ; 2) measure the deviation of N from being tree-based; 3) compute the number of subdivision trees of N ; 4 ) list all subdivision trees of N ; and 5 ) find a subdivision tree to maximize or minimize a prescribed objective function . All algorithms proposed here are optimal in terms of time complexity. Our results do not only imply and unify various known results, but also answer many open questions and moreover enable novel applications, such as the estimation of a maximum likelihood tree underlying a tree-based network. The results and algorithms in this paper still hold true for a special class of rooted non-binary phylogenetic networks .", "edit_actions": [{"type": "R", "before": "Therefore, the concept of \"", "after": "In the last few years, therefore,", "start_char_pos": 116, "end_char_pos": 143}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 155, "end_char_pos": 156}, {"type": "R", "before": "was introduced by Francis and Steel, has attracted much", "after": "are defined by a spanning tree called a subdivision tree, have attracted", "start_char_pos": 186, "end_char_pos": 241}, {"type": "R", "before": "in the last few years. In this context, spanning trees of a certain kind called \"subdivision trees\" play an essential role and there are many important computational problems about them, whose time complexity is still unclear. Against this backdrop, the present paperaims to provide a graph theoretical", "after": ". However, the application of such networks is still not easy, due to many problems whose time complexities are not clearly understood. In this paper, we provide a general", "start_char_pos": 278, "end_char_pos": 580}, {"type": "R", "before": "different problems on subdivision trees in a simple and unified manner. To this end, we focus on a structure called the maximal zig-zag trail decomposition that is inherent in", "after": "those various old or new problems from a coherent perspective, rather than analyzing the complexity of each individual problem or developing an algorithm one by one. More precisely, we establish a structure theorem that gives a way to canonically decompose", "start_char_pos": 603, "end_char_pos": 778}, {"type": "R", "before": "and prove a structure theorem that characterizes the collection of all", "after": "into maximal zig-zag trails that are uniquely determined, and use it to characterize the set of", "start_char_pos": 820, "end_char_pos": 890}, {"type": "R", "before": ". Our theorem does not only imply and unify various results in the literature but also yield linear time (for enumeration, linear delay)", "after": "in the form of a direct product, in a way reminiscent of the structure theorem for finitely generated Abelian groups. From the main results, we derive a series of linear time and linear time delay", "start_char_pos": 914, "end_char_pos": 1050}, {"type": "D", "before": "(decision/search problem)", "after": null, "start_char_pos": 1222, "end_char_pos": 1247}, {"type": "A", "before": null, "after": "measure the deviation of N from being tree-based; 3)", "start_char_pos": 1253, "end_char_pos": 1253}, {"type": "R", "before": "(counting problem); 3", "after": "; 4", "start_char_pos": 1299, "end_char_pos": 1320}, {"type": "R", "before": "(enumeration problem); and 4", "after": "; and 5", "start_char_pos": 1355, "end_char_pos": 1383}, {"type": "R", "before": "(optimization problem). Importantly, the", "after": ". All algorithms proposed here are optimal in terms of time complexity. Our results do not only imply and unify various known results, but also answer many open questions and moreover enable novel applications, such as the estimation of a maximum likelihood tree underlying a tree-based network. The", "start_char_pos": 1466, "end_char_pos": 1506}, {"type": "R", "before": "some", "after": "a special class of rooted", "start_char_pos": 1564, "end_char_pos": 1568}, {"type": "D", "before": "and this generalization gives a partial answer to an open question from Pons, Semple, and Steel. We also mention some statistical applications and further research directions", "after": null, "start_char_pos": 1602, "end_char_pos": 1776}], "sents_char_pos": [0, 115, 300, 504, 674, 1089, 1249, 1318, 1377, 1489, 1698]}
+{"doc_id": "1811.09881", "revision_depth": "2", "before_revision": "Unit disk graphs are the intersection graphs of unit diameter disks in the Euclidean plane. Recognizing unit disk graph is an important geometric problem, and has many application areas. In general, this problem is shown to be \\existsR-complete. In some applications, the objects that correspond to unit disks, have predefined (geometrical) structures to be placed on. Hence, many scientists attacked this problem by restricting the domain for the centers of the disks . One example to such applications is wireless sensor networks, where each disk corresponds to a wireless sensor node, and a pair of intersecting disks correspond to a pair of sensors being able to communicate with each other . It is usually assumed that the nodes have identical sensing ranges, and thus unit disk graph model is used to model problems concerning wireless sensor networks. In this paper, we also attack the unit disk recognition problem on a restricted domain, by assuming a scenario where the wireless sensor nodes are deployed on the corridors of a building. Based on this scenario, we impose a geometric constraint such that the unit disks must be centered onto given straight lines. We show that deciding whether there exists a realization of a given graph as unit disk graphs on straight lines is NP-hard, even if the given lines are parallel to either x-axis or y-axis. Moreover, we remark that if the straight lines are not given, then the problem becomes \\exists\\mathbb{R", "after_revision": "Unit disk graphs are the intersection graphs of unit radius disks in the Euclidean plane. Deciding whether there exists an embedding of a given unit disk graph , i.e. unit disk graph recognition, is an important geometric problem, and has many application areas. In general, this problem is known to be \\existsR-complete. In some applications, the objects that correspond to unit disks, have predefined (geometrical) structures to be placed on. Hence, many researchers attacked this problem by restricting the domain of the disk centers . One example to such applications is wireless sensor networks, where each disk corresponds to a wireless sensor node, and a pair of intersecting disks corresponds to a pair of sensors being able to communicate with one another . It is usually assumed that the nodes have identical sensing ranges, and thus a unit disk graph model is used to model problems concerning wireless sensor networks. We consider the unit disk graph realization problem on a restricted domain, by assuming a scenario where the wireless sensor nodes are deployed on the corridors of a building. Based on this scenario, we impose a geometric constraint such that the unit disks must be centered onto given straight lines. In this paper, we first describe a polynomial-time reduction which shows that deciding whether a graph can be realized as unit disks onto given straight lines is NP-hard, when the given lines are parallel to either x-axis or y-axis. Using the reduction we described, we also show that this problem is NP-complete when the given lines are only parallel to x-axis (and one another). We obtain those results using the idea of the logic engine introduced by Bhatt and Cosmadakis in 1987.", "edit_actions": [{"type": "R", "before": "diameter", "after": "radius", "start_char_pos": 53, "end_char_pos": 61}, {"type": "R", "before": "Recognizing", "after": "Deciding whether there exists an embedding of a given", "start_char_pos": 92, "end_char_pos": 103}, {"type": "A", "before": null, "after": ", i.e. unit disk graph recognition,", "start_char_pos": 120, "end_char_pos": 120}, {"type": "R", "before": "shown", "after": "known", "start_char_pos": 216, "end_char_pos": 221}, {"type": "R", "before": "scientists", "after": "researchers", "start_char_pos": 382, "end_char_pos": 392}, {"type": "R", "before": "for the centers of the disks", "after": "of the disk centers", "start_char_pos": 441, "end_char_pos": 469}, {"type": "R", "before": "correspond", "after": "corresponds", "start_char_pos": 622, "end_char_pos": 632}, {"type": "R", "before": "each other", "after": "one another", "start_char_pos": 685, "end_char_pos": 695}, {"type": "A", "before": null, "after": "a", "start_char_pos": 775, "end_char_pos": 775}, {"type": "R", "before": "In this paper, we also attack", "after": "We consider", "start_char_pos": 861, "end_char_pos": 890}, {"type": "R", "before": "recognition", "after": "graph realization", "start_char_pos": 905, "end_char_pos": 916}, {"type": "R", "before": "We show", "after": "In this paper, we first describe a polynomial-time reduction which shows", "start_char_pos": 1175, "end_char_pos": 1182}, {"type": "R", "before": "there exists a realization of a given graph as unit disk graphs on", "after": "a graph can be realized as unit disks onto given", "start_char_pos": 1205, "end_char_pos": 1271}, {"type": "R", "before": "even if", "after": "when", "start_char_pos": 1299, "end_char_pos": 1306}, {"type": "R", "before": "Moreover, we remark that if the straight lines are not given, then the problem becomes \\exists\\mathbb{R", "after": "Using the reduction we described, we also show that this problem is NP-complete when the given lines are only parallel to x-axis (and one another). We obtain those results using the idea of the logic engine introduced by Bhatt and Cosmadakis in 1987.", "start_char_pos": 1364, "end_char_pos": 1467}], "sents_char_pos": [0, 91, 187, 246, 369, 471, 697, 860, 1048, 1174, 1363]}
+{"doc_id": "1811.12355", "revision_depth": "2", "before_revision": "New algorithms for exploiting amino acid covariation have had a large impact on de novo protein modelling. The limited applicability of these methods to smaller protein families has limited their use for structural annotation of whole genomes , however. Most recently , deep learning techniques have shown promise in allowing residue-residue contacts to be predicted accurately even for shallow sequence alignments. Here we introduce DMPfold, a development of the DeepMetaPSICOV contact predictor, which uses deep learning throughout to predict inter-atomic distance bounds, the main chain hydrogen bond network, and main chain torsion anglesand uses these to build models in an iterative procedure . DMPfold produces more accurate models than two popular methods for a test set of CASP12 free modelling domains, and is able to generate high quality models without any modifications for a set of transmembrane proteins. We apply it to all Pfam domains without a known structure and provide high confidence models for 25\\% of these so-called \"dark \" families , a calculation that took less than a week on a small cluster with 200 available cores . DMPfold provides models for 16\\% of human proteome UniProt entries without structures, can generate accurate models with alignments of fewer than 100 sequences in some cases, and is freely available.", "after_revision": "The inapplicability of amino acid covariation methods to small protein families has limited their use for structural annotation of whole genomes . Recently , deep learning has shown promise in allowing accurate residue-residue contact prediction even for shallow sequence alignments. Here we introduce DMPfold, which uses deep learning to predict inter-atomic distance bounds, the main chain hydrogen bond network, and torsion angles, which it uses to build models in an iterative fashion . DMPfold produces more accurate models than two popular methods for a test set of CASP12 domains, and works just as well for transmembrane proteins. Applied to all Pfam domains without known structures, confident models for 25\\% of these so-called dark families were produced in under a week on a small 200 core cluster . DMPfold provides models for 16\\% of human proteome UniProt entries without structures, generates accurate models with fewer than 100 sequences in some cases, and is freely available.", "edit_actions": [{"type": "R", "before": "New algorithms for exploiting", "after": "The inapplicability of", "start_char_pos": 0, "end_char_pos": 29}, {"type": "R", "before": "have had a large impact on de novo protein modelling. The limited applicability of these methods to smaller", "after": "methods to small", "start_char_pos": 53, "end_char_pos": 160}, {"type": "R", "before": ", however. Most recently", "after": ". Recently", "start_char_pos": 243, "end_char_pos": 267}, {"type": "R", "before": "techniques have", "after": "has", "start_char_pos": 284, "end_char_pos": 299}, {"type": "A", "before": null, "after": "accurate", "start_char_pos": 326, "end_char_pos": 326}, {"type": "R", "before": "contacts to be predicted accurately", "after": "contact prediction", "start_char_pos": 343, "end_char_pos": 378}, {"type": "D", "before": "a development of the DeepMetaPSICOV contact predictor,", "after": null, "start_char_pos": 444, "end_char_pos": 498}, {"type": "D", "before": "throughout", "after": null, "start_char_pos": 524, "end_char_pos": 534}, {"type": "R", "before": "main chain torsion anglesand uses these", "after": "torsion angles, which it uses", "start_char_pos": 618, "end_char_pos": 657}, {"type": "R", "before": "procedure", "after": "fashion", "start_char_pos": 690, "end_char_pos": 699}, {"type": "D", "before": "free modelling", "after": null, "start_char_pos": 790, "end_char_pos": 804}, {"type": "R", "before": "is able to generate high quality models without any modifications for a set of", "after": "works just as well for", "start_char_pos": 818, "end_char_pos": 896}, {"type": "R", "before": "We apply it", "after": "Applied", "start_char_pos": 921, "end_char_pos": 932}, {"type": "R", "before": "a known structure and provide high confidence", "after": "known structures, confident", "start_char_pos": 961, "end_char_pos": 1006}, {"type": "R", "before": "\"dark \" families , a calculation that took less than a", "after": "dark families were produced in under a", "start_char_pos": 1042, "end_char_pos": 1096}, {"type": "D", "before": "cluster with", "after": null, "start_char_pos": 1113, "end_char_pos": 1125}, {"type": "R", "before": "available cores", "after": "core cluster", "start_char_pos": 1130, "end_char_pos": 1145}, {"type": "R", "before": "can generate", "after": "generates", "start_char_pos": 1235, "end_char_pos": 1247}, {"type": "D", "before": "alignments of", "after": null, "start_char_pos": 1269, "end_char_pos": 1282}], "sents_char_pos": [0, 106, 253, 416, 443, 920]}
+{"doc_id": "1812.06537", "revision_depth": "1", "before_revision": "This paper explores the use of fuzzy regression-discontinuity design in the context where multiple treatments are applied at the threshold. The identification result shows that, under a very strong assumption of equality of treatment probability changes at the cutoff point, a difference in fuzzy discontinuity identify a treatment effect of interest. Using the data from the National Health Interview Survey (NHIS) , we apply this identification strategy to evaluate the causal effect of the Affordable Care Act (ACA) on health care access and utilization of old Americans. We find results suggesting that the implementation of the Affordable Care Act has led to an increase in the hospitalization rate of elderly American--5\\% more hospitalization. It has caused a minor increase of cost-related direct barrier to access to care--3.6\\% increase in the probability of delaying care for cost reasons . The ACA has also exacerbated cost-related barriers to follow-up and continuity care -- 7\\% more elderly couldn't afford prescriptions, 7\\% more couldn't see a specialist and, 5.5\\% more couldn't afford a follow-up visit -- as result of ACA", "after_revision": "This paper explores the use of a fuzzy regression discontinuity design where multiple treatments are applied at the threshold. The identification results show that, under the very strong assumption that the change in the probability of treatment at the cutoff is equal across treatments, a difference-in-discontinuities estimator identifies the treatment effect of interest. The point estimates of the treatment effect using a simple fuzzy difference-in-discontinuities design are biased if the change in the probability of a treatment applying at the cutoff differs across treatments. Modifications of the fuzzy difference-in-discontinuities approach that rely on milder assumptions are also proposed. Our results suggest caution is needed when applying before-and-after methods in the presence of fuzzy discontinuities. Using data from the National Health Interview Survey , we apply this new identification strategy to evaluate the causal effect of the Affordable Care Act (ACA) on older Americans' health care access and utilization . Our results suggest that the ACA has (1) led to a 5\\% increase in the hospitalization rate of elderly Americans, (2) increased the probability of delaying care for cost reasons by 3.6\\%, and (3) exacerbated cost-related barriers to follow-up care and continuity of care: 7\\% more elderly individuals could not afford prescriptions, 7\\% more could not see a specialist , and 5.5\\% more could not afford a follow-up visit . Our results can be explained by an increase in the demand for health services without a corresponding adjustment in supply following the implementation of the ACA.", "edit_actions": [{"type": "R", "before": "fuzzy regression-discontinuity design in the context", "after": "a fuzzy regression discontinuity design", "start_char_pos": 31, "end_char_pos": 83}, {"type": "R", "before": "result shows", "after": "results show", "start_char_pos": 159, "end_char_pos": 171}, {"type": "R", "before": "a", "after": "the", "start_char_pos": 184, "end_char_pos": 185}, {"type": "R", "before": "of equality of treatment probability changes", "after": "that the change in the probability of treatment", "start_char_pos": 209, "end_char_pos": 253}, {"type": "R", "before": "point, a difference in fuzzy discontinuity identify a", "after": "is equal across treatments, a difference-in-discontinuities estimator identifies the", "start_char_pos": 268, "end_char_pos": 321}, {"type": "R", "before": "Using the", "after": "The point estimates of the treatment effect using a simple fuzzy difference-in-discontinuities design are biased if the change in the probability of a treatment applying at the cutoff differs across treatments. Modifications of the fuzzy difference-in-discontinuities approach that rely on milder assumptions are also proposed. Our results suggest caution is needed when applying before-and-after methods in the presence of fuzzy discontinuities. Using", "start_char_pos": 352, "end_char_pos": 361}, {"type": "D", "before": "(NHIS)", "after": null, "start_char_pos": 409, "end_char_pos": 415}, {"type": "A", "before": null, "after": "new", "start_char_pos": 432, "end_char_pos": 432}, {"type": "A", "before": null, "after": "older Americans'", "start_char_pos": 523, "end_char_pos": 523}, {"type": "R", "before": "of old Americans. We find results suggesting that the implementation of the Affordable Care Act has led to an", "after": ". Our results suggest that the ACA has (1) led to a 5\\%", "start_char_pos": 559, "end_char_pos": 668}, {"type": "R", "before": "American--5\\% more hospitalization. It has caused a minor increase of cost-related direct barrier to access to care--3.6\\% increase in", "after": "Americans, (2) increased", "start_char_pos": 717, "end_char_pos": 851}, {"type": "R", "before": ". The ACA has also", "after": "by 3.6\\%, and (3)", "start_char_pos": 902, "end_char_pos": 920}, {"type": "R", "before": "and continuity care --", "after": "care and continuity of care:", "start_char_pos": 968, "end_char_pos": 990}, {"type": "R", "before": "couldn't", "after": "individuals could not", "start_char_pos": 1008, "end_char_pos": 1016}, {"type": "R", "before": "couldn't", "after": "could not", "start_char_pos": 1048, "end_char_pos": 1056}, {"type": "R", "before": "and,", "after": ", and", "start_char_pos": 1074, "end_char_pos": 1078}, {"type": "R", "before": "couldn't", "after": "could not", "start_char_pos": 1090, "end_char_pos": 1098}, {"type": "R", "before": "-- as result of ACA", "after": ". Our results can be explained by an increase in the demand for health services without a corresponding adjustment in supply following the implementation of the ACA.", "start_char_pos": 1124, "end_char_pos": 1143}], "sents_char_pos": [0, 139, 351, 576, 752, 903]}
+{"doc_id": "1812.06562", "revision_depth": "1", "before_revision": "Detecting epileptic seizure through analysis of the electroencephalography (EEG) signal becomes a standard method for the diagnosis of epilepsy. In a manual way, monitoring of long term EEG is tedious and error prone. Therefore, a reliable automatic seizure detection method is desirable. A critical challenge to automatic seizuredetection is that seizure morphologies exhibit considerable variabilities. In order to capture essential seizure patterns, this paper leverages an attention mechanism and a bidirectional long short-term memory (BiLSTM) model to exploit both spatially and temporally discriminating features and account for seizure variabilities. The attention mechanism is to capture spatial features more effectively according to the contributions of brain areas to seizures. The BiLSTM model is to extract more discriminating temporal features in the forward and the backward directions. By accounting for both spatial and temporal variations of seizures, the proposed method is more robust across subjects. The testing results over the noisy real data of CHB-MIT show that the proposed method outperforms the current state-of-the-art methods. In both mixing-patients and cross-patient experiments, the average sensitivity and specificity are both higher while their corresponding standard deviations are lower than the methods in comparison .", "after_revision": "Identifying epileptic seizures through analysis of the electroencephalography (EEG) signal becomes a standard method for the diagnosis of epilepsy. Manual seizure identification on EEG by trained neurologists is time-consuming, labor-intensive and error-prone, and a reliable automatic seizure /non-seizure classification method is needed. One of the challenges in automatic seizure/non-seizure classification is that seizure morphologies exhibit considerable variabilities. In order to capture essential seizure patterns, this paper leverages an attention mechanism and a bidirectional long short-term memory (BiLSTM) to exploit both spatial and temporal discriminating features and overcome seizure variabilities. The attention mechanism is to capture spatial features according to the contributions of different brain regions to seizures. The BiLSTM is to extract discriminating temporal features in the forward and the backward directions. Cross-validation experiments and cross-patient experiments over the noisy data of CHB-MIT are performed to evaluate our proposed approach. The obtained average sensitivity of 87.00\\%, specificity of 88.60\\% and precision of 88.63\\% in cross-validation experiments are higher than using the current state-of-the-art methods, and the standard deviations of our approach are lower. The evaluation results of cross-patient experiments indicate that, our approach has better performance compared with the current state-of-the-art methods and is more robust across patients .", "edit_actions": [{"type": "R", "before": "Detecting epileptic seizure", "after": "Identifying epileptic seizures", "start_char_pos": 0, "end_char_pos": 27}, {"type": "R", "before": "In a manual way, monitoring of long term EEG is tedious and error prone. Therefore,", "after": "Manual seizure identification on EEG by trained neurologists is time-consuming, labor-intensive and error-prone, and", "start_char_pos": 145, "end_char_pos": 228}, {"type": "R", "before": "detection method is desirable. A critical challenge to automatic seizuredetection", "after": "/non-seizure classification method is needed. One of the challenges in automatic seizure/non-seizure classification", "start_char_pos": 258, "end_char_pos": 339}, {"type": "D", "before": "model", "after": null, "start_char_pos": 549, "end_char_pos": 554}, {"type": "R", "before": "spatially and temporally", "after": "spatial and temporal", "start_char_pos": 571, "end_char_pos": 595}, {"type": "R", "before": "account for", "after": "overcome", "start_char_pos": 624, "end_char_pos": 635}, {"type": "D", "before": "more effectively", "after": null, "start_char_pos": 714, "end_char_pos": 730}, {"type": "R", "before": "brain areas", "after": "different brain regions", "start_char_pos": 765, "end_char_pos": 776}, {"type": "D", "before": "model", "after": null, "start_char_pos": 801, "end_char_pos": 806}, {"type": "D", "before": "more", "after": null, "start_char_pos": 821, "end_char_pos": 825}, {"type": "R", "before": "By accounting for both spatial and temporal variations of seizures, the proposed method is more robust across subjects. The testing results", "after": "Cross-validation experiments and cross-patient experiments", "start_char_pos": 903, "end_char_pos": 1042}, {"type": "D", "before": "real", "after": null, "start_char_pos": 1058, "end_char_pos": 1062}, {"type": "R", "before": "show that the proposed method outperforms the current", "after": "are performed to evaluate our proposed approach. The obtained average sensitivity of 87.00\\%, specificity of 88.60\\% and precision of 88.63\\% in cross-validation experiments are higher than using the current", "start_char_pos": 1079, "end_char_pos": 1132}, {"type": "R", "before": "methods. In both mixing-patients and", "after": "methods, and the standard deviations of our approach are lower. The evaluation results of", "start_char_pos": 1150, "end_char_pos": 1186}, {"type": "R", "before": "experiments, the average sensitivity and specificity are both higher while their corresponding standard deviations are lower than the methods in comparison", "after": "experiments indicate that, our approach has better performance compared with the current state-of-the-art methods and is more robust across patients", "start_char_pos": 1201, "end_char_pos": 1356}], "sents_char_pos": [0, 144, 217, 288, 404, 658, 789, 902, 1022, 1158]}
+{"doc_id": "1812.11183", "revision_depth": "1", "before_revision": "Diffusion MRI is the modality of choice to study alterations of white matter. In the past years, various works have used diffusion MRI for automatic classification of Alzheimers disease . However, the performances obtained with different approaches are difficult to compare because of variations in components such as input data, participant selection, image preprocessing, feature extraction, feature selection (FS) and cross-validation (CV) procedure. Moreover, these studies are also difficult to reproduce because these different components are not readily available. In a previous work (Samper-Gonzalez et al. 2018), we proposed an open-source framework for the reproducible evaluation of AD classification from T1-weighted (T1w) MRI and PET data. In the present paper, we extend this framework to diffusion MRI data . The framework comprises: tools to automatically convert ADNI data into the BIDS standard , pipelines for image preprocessing and feature extraction , baseline classifiers and a rigorous CV procedure. We demonstrate the use of the framework through assessing the influence of diffusion tensor imaging (DTI) metrics (fractional anisotropy - FA, mean diffusivity - MD), feature types, imaging modalities (diffusion MRI or T1w MRI) , data imbalance and FS bias. First , voxel-wise features generally gave better performances than regional features. Secondly, FAand MD provided comparable results for voxel-wise features. Thirdly, T1w MRI performed better than diffusion MRI. Fourthly, we demonstrated that using non-nested validation of FS leads to unreliable and over-optimistic results . All the code is publicly available: general-purpose tools have been integrated into the Clinica software (www.clinica.run) and the paper-specific code is available at: URL", "after_revision": "Diffusion MRI is the modality of choice to study alterations of white matter. In past years, various works have used diffusion MRI for automatic classification of AD . However, classification performance obtained with different approaches is difficult to compare and these studies are also difficult to reproduce . In the present paper, we first extend a previously proposed framework to diffusion MRI data for AD classification. Specifically, we add: conversion of diffusion MRI ADNI data into the BIDS standard and pipelines for diffusion MRI preprocessing and feature extraction . We then apply the framework to compare different components. First, FS has a positive impact on classification results: highest balanced accuracy (BA) improved from 0.76 to 0.82 for task CN vs AD. Secondly , voxel-wise features generally gives better performance than regional features. Fractional anisotropy (FA) and mean diffusivity (MD) provided comparable results for voxel-wise features. Moreover, we observe that the poor performance obtained in tasks involving MCI were potentially caused by the small data samples, rather than by the data imbalance. Furthermore, no extensive classification difference exists for different degree of smoothing and registration methods. Besides, we demonstrate that using non-nested validation of FS leads to unreliable and over-optimistic results : 0.05 up to 0.40 relative increase in BA. Lastly, with proper FR and FS, the performance of diffusion MRI features is comparable to that of T1w MRI. All the code of the framework and the experiments are publicly available: general-purpose tools have been integrated into the Clinica software package (www.clinica.run) and the paper-specific code is available at: URL", "edit_actions": [{"type": "D", "before": "the", "after": null, "start_char_pos": 81, "end_char_pos": 84}, {"type": "R", "before": "Alzheimers disease", "after": "AD", "start_char_pos": 167, "end_char_pos": 185}, {"type": "R", "before": "the performances", "after": "classification performance", "start_char_pos": 197, "end_char_pos": 213}, {"type": "R", "before": "are", "after": "is", "start_char_pos": 249, "end_char_pos": 252}, {"type": "R", "before": "because of variations in components such as input data, participant selection, image preprocessing, feature extraction, feature selection (FS) and cross-validation (CV) procedure. Moreover,", "after": "and", "start_char_pos": 274, "end_char_pos": 463}, {"type": "R", "before": "because these different components are not readily available. In a previous work (Samper-Gonzalez et al. 2018), we proposed an open-source framework for the reproducible evaluation of AD classification from T1-weighted (T1w) MRI and PET data. In the", "after": ". In the", "start_char_pos": 510, "end_char_pos": 759}, {"type": "R", "before": "extend this", "after": "first extend a previously proposed", "start_char_pos": 778, "end_char_pos": 789}, {"type": "R", "before": ". The framework comprises: tools to automatically convert", "after": "for AD classification. Specifically, we add: conversion of diffusion MRI", "start_char_pos": 822, "end_char_pos": 879}, {"type": "R", "before": ", pipelines for image", "after": "and pipelines for diffusion MRI", "start_char_pos": 913, "end_char_pos": 934}, {"type": "R", "before": ", baseline classifiers and a rigorous CV procedure. We demonstrate the use of the framework through assessing the influence of diffusion tensor imaging (DTI) metrics (fractional anisotropy - FA, mean diffusivity - MD), feature types, imaging modalities (diffusion MRI or T1w MRI) , data imbalance and FS bias. First", "after": ". We then apply the framework to compare different components. First, FS has a positive impact on classification results: highest balanced accuracy (BA) improved from 0.76 to 0.82 for task CN vs AD. Secondly", "start_char_pos": 972, "end_char_pos": 1287}, {"type": "R", "before": "gave better performances", "after": "gives better performance", "start_char_pos": 1320, "end_char_pos": 1344}, {"type": "R", "before": "Secondly, FAand MD", "after": "Fractional anisotropy (FA) and mean diffusivity (MD)", "start_char_pos": 1369, "end_char_pos": 1387}, {"type": "R", "before": "Thirdly, T1w MRI performed better than diffusion MRI. Fourthly, we demonstrated", "after": "Moreover, we observe that the poor performance obtained in tasks involving MCI were potentially caused by the small data samples, rather than by the data imbalance. Furthermore, no extensive classification difference exists for different degree of smoothing and registration methods. Besides, we demonstrate", "start_char_pos": 1441, "end_char_pos": 1520}, {"type": "R", "before": ".", "after": ": 0.05 up to 0.40 relative increase in BA. Lastly, with proper FR and FS, the performance of diffusion MRI features is comparable to that of T1w MRI.", "start_char_pos": 1608, "end_char_pos": 1609}, {"type": "R", "before": "is", "after": "of the framework and the experiments are", "start_char_pos": 1623, "end_char_pos": 1625}, {"type": "A", "before": null, "after": "package", "start_char_pos": 1715, "end_char_pos": 1715}], "sents_char_pos": [0, 77, 187, 453, 571, 752, 823, 1023, 1281, 1368, 1440, 1494, 1609]}
+{"doc_id": "1901.02314", "revision_depth": "1", "before_revision": "Recent work shows that people are not solely motivated by the economic consequences of the available actions, but they also have moral preferences for ` doing the right thing ' , independently of its economic consequences. Here we add to this literature with two experiments. In Study 1 (N=567) we implement an extreme dictator game in which dictators either get \\0.50 and another person gets nothing, or the other way around (i.e., the other person gets \\0.50 and the dictator gets nothing). We experimentally manipulate the words describing the available actions using six words, from very negative (e.g., stealing) to very positive (e.g., donating) connotations. Our hypothesis is that people are reluctant to make actions described using words with a negative connotation, and are eager to make actions described using words with a positive connotation, independently of their economic consequences. As predicted, we find that the connotation of the word has a U-shaped effect on pro-sociality . Moreover, we show that the overall pattern of results, the U-shape, but not its details, can be explained using a technique from Computational Linguistics known as Sentiment Analysis . In Study 2 (N=413, pre-registered) we make a step forward and we collect the self-reported moral judgment and feeling associated to each of the six words used in Study 1. We show that the rate of pro-sociality in Study 1 can be predicted from the moral judgments and the feelings in Study 2 via Krupka \\& Weber's utility function. In sum, our findings provide additional evidence for the existence and relevance of moral preferences, confirm the usefulness of Krupka \\& Weber's utility function, and suggest that building bridges from computational linguistics to behavioral science can contribute to our understanding of human decision making .", "after_revision": "Recent work suggests that people are not solely motivated by the economic consequences of the available actions, but they also have moral preferences for \" doing the right thing \" , independently of its economic consequences. However, it remains unclear in what situations moral preferences can be activated by simply changing the framing of a decision problem. For example, earlier work proposed that moral preferences can account for framing effects in the Dictator game. However, more recent work has casted doubts on the very existence of framing effects in this game. Here we shed light on this point with two experiments. In Study 1 (N=567) we implement an extreme Dictator game in which dictators either get \\0.50 and another person gets nothing, or the opposite (i.e., the other person gets \\0.50 and the dictator gets nothing). We experimentally manipulate the words describing the available actions using six words, from very negative (e.g., stealing) to very positive (e.g., donating) connotations. As we predicted, we find that the rate of pro-sociality is affected by the words used to describe the available actions . In Study 2 (N=413, pre-registered) we collect the self-reported moral judgment and feeling associated to each of the six words used in Study 1. We show that these moral judgments and feelings can explain the framing effects in Study 1. In sum, we find that changing only one word in the instructions of an extreme Dictator game can alter people's behavior, and that behavioral changes can be explained using moral judgments and feelings associated to these words .", "edit_actions": [{"type": "R", "before": "shows", "after": "suggests", "start_char_pos": 12, "end_char_pos": 17}, {"type": "R", "before": "`", "after": "\"", "start_char_pos": 151, "end_char_pos": 152}, {"type": "R", "before": "'", "after": "\"", "start_char_pos": 175, "end_char_pos": 176}, {"type": "R", "before": "Here we add to this literature", "after": "However, it remains unclear in what situations moral preferences can be activated by simply changing the framing of a decision problem. For example, earlier work proposed that moral preferences can account for framing effects in the Dictator game. However, more recent work has casted doubts on the very existence of framing effects in this game. Here we shed light on this point", "start_char_pos": 223, "end_char_pos": 253}, {"type": "R", "before": "dictator", "after": "Dictator", "start_char_pos": 319, "end_char_pos": 327}, {"type": "R", "before": "other way around", "after": "opposite", "start_char_pos": 409, "end_char_pos": 425}, {"type": "R", "before": "Our hypothesis is that people are reluctant to make actions described using words with a negative connotation, and are eager to make actions described using words with a positive connotation, independently of their economic consequences. As", "after": "As we", "start_char_pos": 666, "end_char_pos": 906}, {"type": "R", "before": "connotation of the word has a U-shaped effect on", "after": "rate of", "start_char_pos": 935, "end_char_pos": 983}, {"type": "R", "before": ". Moreover, we show that the overall pattern of results, the U-shape, but not its details, can be explained using a technique from Computational Linguistics known as Sentiment Analysis", "after": "is affected by the words used to describe the available actions", "start_char_pos": 998, "end_char_pos": 1182}, {"type": "D", "before": "make a step forward and we", "after": null, "start_char_pos": 1223, "end_char_pos": 1249}, {"type": "R", "before": "the rate of pro-sociality in Study 1 can be predicted from the", "after": "these", "start_char_pos": 1369, "end_char_pos": 1431}, {"type": "R", "before": "the feelings in Study 2 via Krupka \\& Weber's utility function.", "after": "feelings can explain the framing effects in Study 1.", "start_char_pos": 1452, "end_char_pos": 1515}, {"type": "R", "before": "our findings provide additional evidence for the existence and relevance of moral preferences, confirm the usefulness of Krupka \\& Weber's utility function, and suggest that building bridges from computational linguistics to behavioral science can contribute to our understanding of human decision making", "after": "we find that changing only one word in the instructions of an extreme Dictator game can alter people's behavior, and that behavioral changes can be explained using moral judgments and feelings associated to these words", "start_char_pos": 1524, "end_char_pos": 1828}], "sents_char_pos": [0, 222, 275, 492, 665, 903, 999, 1184, 1355, 1515]}
+{"doc_id": "1901.03319", "revision_depth": "1", "before_revision": "Real datasets often come in the form of an URLanised cloud of points . An overall shape of such data is hard to visualise when data points are given by coordinates in a high-dimensional Euclidean space. More general data can be represented by an abstract graph with weights or distances on links between data points. The skeletonisation problem for a point cloud is to find a graph or a skeleton that correctly represents the shape of a cloud. This paper compares three algorithms that solve the data skeletonisation problem for a general cloud with topological and geometric guarantees. First, the Mapper algorithm outputs a network of interlinked clusters. Second, the \\alpha-Reeb algorithm discretises the classical Reeb graphand can be applied to discrete clouds at different scales \\alpha. The third algorithm HoPeS produces a Homologically Persistent Skeleton without any extra parameters. HoPeS represents the 1-dimensional shape of a cloud at any scale by the Optimality Theorem. The Reconstruction Theorem gives conditions on a noisy sample of a graph when HoPeS provides a reconstructed graph with a correct homotopy type and within a small offset of the sample. The experiments on synthetic and real data show that HoPeS outperforms the other algorithms on several topological and geometric measures .", "after_revision": "Data Science aims to extract meaningful knowledge from URLanised data. Real datasets usually come in the form of a cloud of points with only pairwise distances. Numerous applications require to visualise an overall shape of a noisy cloud of points sampled from a non-linear object that is more complicated than a union of disjoint clusters. The skeletonisation problem in its hardest form is to find a 1-dimensional skeleton that correctly represents a shape of the cloud. This paper compares several algorithms that solve the above skeletonisation problem for any point cloud and guarantee a successful reconstruction. For example, given a highly noisy point sample of an unknown underlying graph, a reconstructed skeleton should be geometrically close and homotopy equivalent to (has the same number of independent cycles as) the underlying graph. One of these algorithm produces a Homologically Persistent Skeleton (HoPeS) for any cloud without extra parameters. This universal skeleton contains sub-graphs that provably represent the 1-dimensional shape of the cloud at any scale . Other subgraphs of HoPeS reconstruct an unknown graph from its noisy point sample with a correct homotopy type and within a small offset of the sample. The extensive experiments on synthetic and real data reveal for the first time the maximum level of noise that allows successful graph reconstructions .", "edit_actions": [{"type": "R", "before": "Real datasets often", "after": "Data Science aims to extract meaningful knowledge from URLanised data. Real datasets usually", "start_char_pos": 0, "end_char_pos": 19}, {"type": "R", "before": "an URLanised", "after": "a", "start_char_pos": 40, "end_char_pos": 52}, {"type": "R", "before": ". An", "after": "with only pairwise distances. Numerous applications require to visualise an", "start_char_pos": 69, "end_char_pos": 73}, {"type": "R", "before": "such data is hard to visualise when data points are given by coordinates in a high-dimensional Euclidean space. More general data can be represented by an abstract graph with weights or distances on links between data points.", "after": "a noisy cloud of points sampled from a non-linear object that is more complicated than a union of disjoint clusters.", "start_char_pos": 91, "end_char_pos": 316}, {"type": "R", "before": "for a point cloud", "after": "in its hardest form", "start_char_pos": 345, "end_char_pos": 362}, {"type": "R", "before": "graph or a", "after": "1-dimensional", "start_char_pos": 376, "end_char_pos": 386}, {"type": "R", "before": "the shape of a", "after": "a shape of the", "start_char_pos": 422, "end_char_pos": 436}, {"type": "R", "before": "three", "after": "several", "start_char_pos": 464, "end_char_pos": 469}, {"type": "R", "before": "data", "after": "above", "start_char_pos": 496, "end_char_pos": 500}, {"type": "R", "before": "a general cloud with topological and geometric guarantees. First, the Mapper algorithm outputs a network of interlinked clusters. Second, the \\alpha-Reeb algorithm discretises the classical Reeb graphand can be applied to discrete clouds at different scales \\alpha. The third algorithm HoPeS", "after": "any point cloud and guarantee a successful reconstruction. For example, given a highly noisy point sample of an unknown underlying graph, a reconstructed skeleton should be geometrically close and homotopy equivalent to (has the same number of independent cycles as) the underlying graph. One of these algorithm", "start_char_pos": 529, "end_char_pos": 820}, {"type": "R", "before": "without any", "after": "(HoPeS) for any cloud without", "start_char_pos": 866, "end_char_pos": 877}, {"type": "R", "before": "HoPeS represents", "after": "This universal skeleton contains sub-graphs that provably represent", "start_char_pos": 896, "end_char_pos": 912}, {"type": "R", "before": "a", "after": "the", "start_char_pos": 940, "end_char_pos": 941}, {"type": "R", "before": "by the Optimality Theorem. The Reconstruction Theorem gives conditions on a noisy sample of a graph when HoPeS provides a reconstructed graph", "after": ". Other subgraphs of HoPeS reconstruct an unknown graph from its noisy point sample", "start_char_pos": 961, "end_char_pos": 1102}, {"type": "A", "before": null, "after": "extensive", "start_char_pos": 1177, "end_char_pos": 1177}, {"type": "R", "before": "show that HoPeS outperforms the other algorithms on several topological and geometric measures", "after": "reveal for the first time the maximum level of noise that allows successful graph reconstructions", "start_char_pos": 1217, "end_char_pos": 1311}], "sents_char_pos": [0, 70, 202, 316, 443, 587, 658, 794, 895, 987, 1172]}
+{"doc_id": "1901.06006", "revision_depth": "1", "before_revision": "We propose a new deep learning algorithm for multiple microtubule (MT) segmentation in time-lapse images using the recurrent attention. Segmentation results from each pair of succeeding frames are being fed into a Hungarian algorithm to assign correspondences among MTs to generate a distinct path through the frames. Based on the obtained trajectories, we calculate MT velocities. Results of this work is expected to help biologists to characterize MT behaviors as well as their potential interactions. To validate our technique, we first use the statistics derived from the real time-lapse series of MT gliding assays to produce a large set of simulated data. We employ this dataset to train our network and optimize its hyperparameters. Then, we utilize the trained model to initialize the network while learning about the real data. Our experimental results show that the proposed algorithm improves the precision for MT instance velocity estimation to 71.3\\% from the baseline result (29.3\\%). We also demonstrate how the injection of temporal information into our network can reduce the false negative rates from 67.8\\% (baseline) down to 28.7\\% (proposed) .", "after_revision": "We propose a new method of instance-level microtubule (MT) tracking in time-lapse image series using recurrent attention. Our novel deep learning algorithm segments individual MTs at each frame. Segmentation results from successive frames are used to assign correspondences among MTs . This ultimately generates a distinct path trajectory for each MT through the frames. Based on these trajectories, we estimate MT velocities. To validate our proposed technique, we conduct experiments using real and simulated data. We use statistics derived from real time-lapse series of MT gliding assays to simulate realistic MT time-lapse image series in our simulated data. This dataset is employed as pre-training and hyperparameter optimization for our network before training on the real data. Our experimental results show that the proposed supervised learning algorithm improves the precision for MT instance velocity estimation drastically to 71.3\\% from the baseline result (29.3\\%). We also demonstrate how the inclusion of temporal information into our deep network can reduce the false negative rates from 67.8\\% (baseline) down to 28.7\\% (proposed) . Our findings in this work are expected to help biologists characterize the spatial arrangement of MTs, specifically the effects of MT-MT interactions .", "edit_actions": [{"type": "R", "before": "deep learning algorithm for multiple", "after": "method of instance-level", "start_char_pos": 17, "end_char_pos": 53}, {"type": "R", "before": "segmentation", "after": "tracking", "start_char_pos": 71, "end_char_pos": 83}, {"type": "R", "before": "images using the", "after": "image series using", "start_char_pos": 98, "end_char_pos": 114}, {"type": "A", "before": null, "after": "Our novel deep learning algorithm segments individual MTs at each frame.", "start_char_pos": 136, "end_char_pos": 136}, {"type": "R", "before": "each pair of succeeding frames are being fed into a Hungarian algorithm", "after": "successive frames are used", "start_char_pos": 163, "end_char_pos": 234}, {"type": "R", "before": "to generate", "after": ". This ultimately generates", "start_char_pos": 271, "end_char_pos": 282}, {"type": "A", "before": null, "after": "trajectory for each MT", "start_char_pos": 299, "end_char_pos": 299}, {"type": "R", "before": "the obtained", "after": "these", "start_char_pos": 329, "end_char_pos": 341}, {"type": "R", "before": "calculate", "after": "estimate", "start_char_pos": 359, "end_char_pos": 368}, {"type": "D", "before": "Results of this work is expected to help biologists to characterize MT behaviors as well as their potential interactions.", "after": null, "start_char_pos": 384, "end_char_pos": 505}, {"type": "A", "before": null, "after": "proposed", "start_char_pos": 522, "end_char_pos": 522}, {"type": "R", "before": "first use the", "after": "conduct experiments using real and simulated data. We use", "start_char_pos": 537, "end_char_pos": 550}, {"type": "D", "before": "the", "after": null, "start_char_pos": 575, "end_char_pos": 578}, {"type": "R", "before": "produce a large set of", "after": "simulate realistic MT time-lapse image series in our", "start_char_pos": 626, "end_char_pos": 648}, {"type": "R", "before": "We employ this dataset to train our network and optimize its hyperparameters. Then, we utilize the trained model to initialize the network while learning about the", "after": "This dataset is employed as pre-training and hyperparameter optimization for our network before training on the", "start_char_pos": 665, "end_char_pos": 828}, {"type": "A", "before": null, "after": "supervised learning", "start_char_pos": 888, "end_char_pos": 888}, {"type": "A", "before": null, "after": "drastically", "start_char_pos": 958, "end_char_pos": 958}, {"type": "R", "before": "injection", "after": "inclusion", "start_char_pos": 1032, "end_char_pos": 1041}, {"type": "A", "before": null, "after": "deep", "start_char_pos": 1075, "end_char_pos": 1075}, {"type": "A", "before": null, "after": ". Our findings in this work are expected to help biologists characterize the spatial arrangement of MTs, specifically the effects of MT-MT interactions", "start_char_pos": 1169, "end_char_pos": 1169}], "sents_char_pos": [0, 135, 319, 383, 505, 664, 742, 839, 1003]}
+{"doc_id": "1901.09036", "revision_depth": "2", "before_revision": "We provide excess risk guarantees for statistical learning in a setting where the population risk with respect to which we evaluate the target model depends on an unknown model that must be to be estimated from data (a \"nuisance model\") . We analyze a two-stage sample splitting meta-algorithm that takes as input two arbitrary estimation algorithms: one for the target model and one for the nuisance model . We show that if the population risk satisfies a condition called Neyman orthogonality, the impact of the nuisance estimation error on the excess risk bound achieved by the meta-algorithm is of second order. Our theorem is agnostic to the particular algorithms used for the target and nuisance and only makes an assumption on their individual performance. This enables the use of a plethora of existing results from statistical learning and machine learning literature to give new guarantees for learning with a nuisance component. Moreover, by focusing on excess risk rather than parameter estimation, we can give guarantees under weaker assumptions than in previous works and accommodate the case where the target parameter belongs to a complex nonparametric class. We characterize conditions on the metric entropy such that oracle rates---rates of the same order as if we knew the nuisance model---are achieved. We also analyze the rates achieved by specific estimation algorithms such as variance-penalized empirical risk minimization, neural network estimation and sparse high-dimensional linear model estimation. We highlight the applicability of our results in four settings of central importance in the literature : 1) heterogeneous treatment effect estimation, 2) offline policy optimization, 3) domain adaptation, and 4) learning with missing data.", "after_revision": "We provide non-asymptotic excess risk guarantees for statistical learning in a setting where the population risk with respect to which we evaluate the target parameter depends on an unknown nuisance parameter that must be estimated from data . We analyze a two-stage sample splitting meta-algorithm that takes as input two arbitrary estimation algorithms: one for the target parameter and one for the nuisance parameter . We show that if the population risk satisfies a condition called Neyman orthogonality, the impact of the nuisance estimation error on the excess risk bound achieved by the meta-algorithm is of second order. Our theorem is agnostic to the particular algorithms used for the target and nuisance and only makes an assumption on their individual performance. This enables the use of a plethora of existing results from statistical learning and machine learning to give new guarantees for learning with a nuisance component. Moreover, by focusing on excess risk rather than parameter estimation, we can give guarantees under weaker assumptions than in previous works and accommodate settings in which the target parameter belongs to a complex nonparametric class. We provide conditions on the metric entropy of the nuisance and target classes such that oracle rates---rates of the same order as if we knew the nuisance parameter---are achieved. We also derive new rates for specific estimation algorithms such as variance-penalized empirical risk minimization, neural network estimation and sparse high-dimensional linear model estimation. We highlight the applicability of our results in four settings of central importance : 1) heterogeneous treatment effect estimation, 2) offline policy optimization, 3) domain adaptation, and 4) learning with missing data.", "edit_actions": [{"type": "A", "before": null, "after": "non-asymptotic", "start_char_pos": 11, "end_char_pos": 11}, {"type": "R", "before": "model", "after": "parameter", "start_char_pos": 144, "end_char_pos": 149}, {"type": "R", "before": "model", "after": "nuisance parameter", "start_char_pos": 172, "end_char_pos": 177}, {"type": "D", "before": "to be", "after": null, "start_char_pos": 191, "end_char_pos": 196}, {"type": "D", "before": "(a \"nuisance model\")", "after": null, "start_char_pos": 217, "end_char_pos": 237}, {"type": "R", "before": "model", "after": "parameter", "start_char_pos": 371, "end_char_pos": 376}, {"type": "R", "before": "model", "after": "parameter", "start_char_pos": 402, "end_char_pos": 407}, {"type": "D", "before": "literature", "after": null, "start_char_pos": 867, "end_char_pos": 877}, {"type": "R", "before": "the case where the", "after": "settings in which the", "start_char_pos": 1099, "end_char_pos": 1117}, {"type": "R", "before": "characterize", "after": "provide", "start_char_pos": 1180, "end_char_pos": 1192}, {"type": "A", "before": null, "after": "of the nuisance and target classes", "start_char_pos": 1226, "end_char_pos": 1226}, {"type": "R", "before": "model---are", "after": "parameter---are", "start_char_pos": 1303, "end_char_pos": 1314}, {"type": "R", "before": "analyze the rates achieved by", "after": "derive new rates for", "start_char_pos": 1333, "end_char_pos": 1362}, {"type": "D", "before": "in the literature", "after": null, "start_char_pos": 1614, "end_char_pos": 1631}], "sents_char_pos": [0, 239, 409, 616, 764, 940, 1176, 1324, 1528]}
+{"doc_id": "1902.09039", "revision_depth": "3", "before_revision": "Microbial communities feature an immense diversity of species and the extent of this diversity correlates with outcomes ranging from ecosystem stability to medical prognoses. Yet the mechanisms underlying microbial diversity are not well understood; simple resource-competition models do not allow for coexistence of a large number of species . However , it was recently shown that assuming the existence of metabolic trade-offs - in allocating a limited enzyme production capacity - can lead to unlimited diversity, when nutrients are steadily supplied. Do such trade-offs permit diversity under more realistic, intermittent conditions of nutrient supply? Here, we demonstrate that in serial dilution culture, metabolic trade-offs allow for high diversity. Unlike the constant environment case , diversity depends on the concentration of nutrients supplied to the community. These changes in diversity are driven by an \"early-bird\" effect in which species specialized for nutrients that are initially more abundant gain a population advantage over other species. We explore the interplay of this effect with different environmental factors and diversity-supporting mechanisms , such as immigration and cross-feeding, and find a variety of ensuing relationships between nutrient supply and diversity . The large variation seen in this simple model suggests that real ecosystems may not obey a single universal relationship between nutrient supply and diversity. To connect to real microbial communities, we validate our growth model against previously published Escherichia coli batch and chemostat experiments and outline potential future experiments to test the model's multispecies predictions .", "after_revision": "Microbial communities feature an immense diversity of species and this diversity is linked with outcomes ranging from ecosystem stability to medical prognoses. Yet the mechanisms underlying microbial diversity are under debate. While simple resource-competition models don't allow for coexistence of a large number of species , it was recently shown that metabolic trade-offs can allow unlimited diversity. Does this diversity persist with more realistic, intermittent nutrient supply? Here, we demonstrate theoretically that in serial dilution culture, metabolic trade-offs allow for high diversity. When a small amount of nutrient is supplied to each batch, the serial dilution dynamics mimic a chemostat-like steady state. If more nutrient is supplied , diversity depends on the amount of nutrient supplied due to an \"early-bird\" effect . The interplay of this effect with different environmental factors and diversity-supporting mechanisms leads to a variety of relationships between nutrient supply and diversity , suggesting that real ecosystems may not obey a universal nutrient-diversity relationship .", "edit_actions": [{"type": "R", "before": "the extent of this diversity correlates", "after": "this diversity is linked", "start_char_pos": 66, "end_char_pos": 105}, {"type": "R", "before": "not well understood;", "after": "under debate. While", "start_char_pos": 229, "end_char_pos": 249}, {"type": "R", "before": "do not", "after": "don't", "start_char_pos": 285, "end_char_pos": 291}, {"type": "D", "before": ". However", "after": null, "start_char_pos": 343, "end_char_pos": 352}, {"type": "D", "before": "assuming the existence of", "after": null, "start_char_pos": 382, "end_char_pos": 407}, {"type": "R", "before": "- in allocating a limited enzyme production capacity - can lead to unlimited diversity, when nutrients are steadily supplied. Do such trade-offs permit diversity under", "after": "can allow unlimited diversity. Does this diversity persist with", "start_char_pos": 429, "end_char_pos": 596}, {"type": "D", "before": "conditions of", "after": null, "start_char_pos": 626, "end_char_pos": 639}, {"type": "A", "before": null, "after": "theoretically", "start_char_pos": 678, "end_char_pos": 678}, {"type": "R", "before": "Unlike the constant environment case", "after": "When a small amount of nutrient is supplied to each batch, the serial dilution dynamics mimic a chemostat-like steady state. If more nutrient is supplied", "start_char_pos": 759, "end_char_pos": 795}, {"type": "R", "before": "concentration of nutrients supplied to the community. These changes in diversity are driven by", "after": "amount of nutrient supplied due to", "start_char_pos": 823, "end_char_pos": 917}, {"type": "R", "before": "in which species specialized for nutrients that are initially more abundant gain a population advantage over other species. We explore the", "after": ". The", "start_char_pos": 941, "end_char_pos": 1079}, {"type": "R", "before": ", such as immigration and cross-feeding, and find", "after": "leads to", "start_char_pos": 1178, "end_char_pos": 1227}, {"type": "D", "before": "ensuing", "after": null, "start_char_pos": 1241, "end_char_pos": 1248}, {"type": "R", "before": ". The large variation seen in this simple model suggests", "after": ", suggesting", "start_char_pos": 1301, "end_char_pos": 1357}, {"type": "R", "before": "single universal relationship between nutrient supply and diversity. To connect to real microbial communities, we validate our growth model against previously published Escherichia coli batch and chemostat experiments and outline potential future experiments to test the model's multispecies predictions", "after": "universal nutrient-diversity relationship", "start_char_pos": 1394, "end_char_pos": 1697}], "sents_char_pos": [0, 174, 249, 344, 554, 656, 758, 876, 1064, 1302, 1462]}
+{"doc_id": "1902.09059", "revision_depth": "1", "before_revision": "Circadian rhythm is usually represented by the 24-hour biological cycles which are mainly driven by the daily light-dark cycle on earth. Light stimulus is widely used as the control input of the circadian system entrainment. In this paper, we study the light-based minimum-time circadian entrainment problem of mammals, Neurospora, and Drosophila based on mathematical models of clock gene transcription . These models contain 3 or even more nonlinear differential equations , and the optimal light control of the entrainment problem on the full models is hard to solve directly . Two model simplification methods are applied to multi-variable models: (1) the phase response curves (PRC) and the circadian phase dynamics of these models are generated by impulse response simulation; (2) the Principal Orthogonal Decomposition (POD) is performed to reduce these models to ones with merely two variables. The minimum-time entrainment of the circadian phase is performed in a feedback form; the minimum-time entrainment of the second-order model is treated as a two-point boundary valued problem(TPBVP), which is solved by a direct shooting algorithm in terms of the Hamiltonian and Pontryagin Minimum Principle. Eventually, the results in low-order models are used for initializing a gradient descent algorithm , which is introduced in solving the entrainment problem of the full models . In this paper, we present: (1) the application of PRC and direct shooting algorithm on multi-variable nonlinear models; (2) a general process for solving the minimum-time optimal control problem on multi-variable models; (3) the impacts of minimum-time optimal light on clock gene transcription and protein synthesis.", "after_revision": "The light-based minimum-time circadian entrainment problem for mammals, Neurospora, and Drosophila is studied based on the mathematical models of their circadian gene regulation . These models contain high order nonlinear differential equations . Two model simplification methods are applied to these high-order models: the phase response curves (PRC) and the Principal Orthogonal Decomposition (POD) . The variational calculus and a gradient descent algorithm are applied for solving the optimal light input in the high-order models. As the results of the gradient descent algorithm rely heavily on the initial guesses, we use the optimal control of the PRC and the simplified model to initialize the gradient descent algorithm . In this paper, we present: (1) the application of PRC and direct shooting algorithm on high-order nonlinear models; (2) a general process for solving the minimum-time optimal control problem on high-order models; (3) the impacts of minimum-time optimal light on circadian gene transcription and protein synthesis.", "edit_actions": [{"type": "R", "before": "Circadian rhythm is usually represented by the 24-hour biological cycles which are mainly driven by the daily light-dark cycle on earth. Light stimulus is widely used as the control input of the circadian system entrainment. In this paper, we study the", "after": "The", "start_char_pos": 0, "end_char_pos": 252}, {"type": "R", "before": "of", "after": "for", "start_char_pos": 308, "end_char_pos": 310}, {"type": "R", "before": "based on", "after": "is studied based on the", "start_char_pos": 347, "end_char_pos": 355}, {"type": "R", "before": "clock gene transcription", "after": "their circadian gene regulation", "start_char_pos": 379, "end_char_pos": 403}, {"type": "R", "before": "3 or even more", "after": "high order", "start_char_pos": 427, "end_char_pos": 441}, {"type": "D", "before": ", and the optimal light control of the entrainment problem on the full models is hard to solve directly", "after": null, "start_char_pos": 475, "end_char_pos": 578}, {"type": "R", "before": "multi-variable models: (1)", "after": "these high-order models:", "start_char_pos": 629, "end_char_pos": 655}, {"type": "D", "before": "circadian phase dynamics of these models are generated by impulse response simulation; (2) the", "after": null, "start_char_pos": 696, "end_char_pos": 790}, {"type": "R", "before": "is performed to reduce these models to ones with merely two variables. The minimum-time entrainment of the circadian phase is performed in a feedback form; the minimum-time entrainment of the second-order model is treated as a two-point boundary valued problem(TPBVP), which is solved by a direct shooting algorithm in terms of the Hamiltonian and Pontryagin Minimum Principle. Eventually, the results in low-order models are used for initializing a", "after": ". The variational calculus and a gradient descent algorithm are applied for solving the optimal light input in the high-order models. As the results of the", "start_char_pos": 832, "end_char_pos": 1281}, {"type": "R", "before": ", which is introduced in solving the entrainment problem of the full models", "after": "rely heavily on the initial guesses, we use the optimal control of the PRC and the simplified model to initialize the gradient descent algorithm", "start_char_pos": 1309, "end_char_pos": 1384}, {"type": "R", "before": "multi-variable", "after": "high-order", "start_char_pos": 1474, "end_char_pos": 1488}, {"type": "R", "before": "multi-variable", "after": "high-order", "start_char_pos": 1585, "end_char_pos": 1599}, {"type": "R", "before": "clock", "after": "circadian", "start_char_pos": 1657, "end_char_pos": 1662}], "sents_char_pos": [0, 136, 224, 405, 580, 782, 902, 987, 1209, 1386, 1506, 1607]}
+{"doc_id": "1902.10345", "revision_depth": "1", "before_revision": "With the ubiquity of accelerators , such as FPGAs and GPUs, the complexity of high-performance programming is increasing beyond the skill-set of the average scientist in domains outside of computer science. It is thus imperative to decouple programming paradigms and architecture-specific implementation from the underlying scientific computations. We present the Stateful DataFlow multiGraph (SDFG), a data-centric intermediate representation that facilitates high performance application development and optimization. By combining fine-grained data dependencies with high-level control flow , SDFGs are both expressive and amenable to high-level program transformations, such as tiling , vectorization, and double buffering . These transformations are then applied to the SDFG in an interactive process, using extensible pattern matching and graph rewriting. To facilitate this process, we provide a graphical user interface that enables applying transformations, as well as creating custom optimizations, reusable across applications . We demonstrate SDFGs on CPUs, GPUs, and FPGAs , using a wide variety of applications and motifs --- from fundamental computational kernels , through polyhedral applications, to graph analytics. We show that the representation is both expressive and performant , allowing domain scientists to develop applications that can be tuned to approach peak hardware performance without modifying the original scientific code.", "after_revision": "The ubiquity of accelerators in high-performance computing has driven programming complexity beyond the skill-set of the average domain scientist. To maintain performance portability in the future, it is imperative to decouple architecture-specific programming paradigms from the underlying scientific computations. We present the Stateful DataFlow multiGraph (SDFG), a data-centric intermediate representation that enables separating program definition from its optimization. By combining fine-grained data dependencies with high-level control-flow , SDFGs are both expressive and amenable to program transformations, such as tiling and double-buffering . These transformations are applied to the SDFG in an interactive process, using extensible pattern matching , graph rewriting, and a graphical user interface . We demonstrate SDFGs on CPUs, GPUs, and FPGAs over various motifs --- from fundamental computational kernels to graph analytics. We show that SDFGs deliver competitive performance , allowing domain scientists to develop applications naturally and port them to approach peak hardware performance without modifying the original scientific code.", "edit_actions": [{"type": "R", "before": "With the", "after": "The", "start_char_pos": 0, "end_char_pos": 8}, {"type": "R", "before": ", such as FPGAs and GPUs, the complexity of", "after": "in", "start_char_pos": 34, "end_char_pos": 77}, {"type": "R", "before": "programming is increasing", "after": "computing has driven programming complexity", "start_char_pos": 95, "end_char_pos": 120}, {"type": "R", "before": "scientist in domains outside of computer science. It is thus", "after": "domain scientist. To maintain performance portability in the future, it is", "start_char_pos": 157, "end_char_pos": 217}, {"type": "R", "before": "programming paradigms and architecture-specific implementation", "after": "architecture-specific programming paradigms", "start_char_pos": 241, "end_char_pos": 303}, {"type": "R", "before": "facilitates high performance application development and", "after": "enables separating program definition from its", "start_char_pos": 449, "end_char_pos": 505}, {"type": "R", "before": "control flow", "after": "control-flow", "start_char_pos": 580, "end_char_pos": 592}, {"type": "D", "before": "high-level", "after": null, "start_char_pos": 637, "end_char_pos": 647}, {"type": "R", "before": ", vectorization, and double buffering", "after": "and double-buffering", "start_char_pos": 688, "end_char_pos": 725}, {"type": "D", "before": "then", "after": null, "start_char_pos": 754, "end_char_pos": 758}, {"type": "R", "before": "and graph rewriting. To facilitate this process, we provide", "after": ", graph rewriting, and", "start_char_pos": 840, "end_char_pos": 899}, {"type": "D", "before": "that enables applying transformations, as well as creating custom optimizations, reusable across applications", "after": null, "start_char_pos": 927, "end_char_pos": 1036}, {"type": "R", "before": ", using a wide variety of applications and", "after": "over various", "start_char_pos": 1085, "end_char_pos": 1127}, {"type": "D", "before": ", through polyhedral applications,", "after": null, "start_char_pos": 1178, "end_char_pos": 1212}, {"type": "R", "before": "the representation is both expressive and performant", "after": "SDFGs deliver competitive performance", "start_char_pos": 1246, "end_char_pos": 1298}, {"type": "R", "before": "that can be tuned", "after": "naturally and port them", "start_char_pos": 1352, "end_char_pos": 1369}], "sents_char_pos": [0, 206, 348, 519, 727, 860, 1038, 1232]}
+{"doc_id": "1903.02758", "revision_depth": "1", "before_revision": "It was conjectured by Gupta et . al. [Combinatorica04] that every planar graph can be embedded into \\ell_1 with constant distortion. However, given an n-vertex weighted planar graph, the best upper bound is only O(\\log n) by Rao [SoCG99]. In this paper we study the terminated case , where there is a set K of terminals, and the goal is to embed only the terminals into \\ell_1 with low distortion. In a seminal paper, Okamura and Seymour [J.Comb.Theory81] showed that if all the terminals lie on a single face, they can be embedded isometrically into \\ell_1. More generally, suppose that the terminals could be covered by \\gamma faces . In a recent paper Krauthgamer, Lee and Rika SODA19%DIFDELCMD < ] %%% showed an upper bound of O(\\log \\gamma) on the distortion, improving previous results by Lee and Sidiropoulos [STOC09] and Chekuri et . al. [J.Comb.Theory13]. ] Our contribution is a further improvement of the upper bound to O(\\sqrt{\\log\\gamma}). Note that since every planar graph has at most O(n) faces, any further improvement of this result, will imply an improvement upon Rao's long standing upper bound. It is well known that the flow-cut gap equals to the distortion of the best embedding into \\ell_1. In particular , our result provide a polynomial time O(\\sqrt{\\log \\gamma})-approximation to the sparsest cut problem on planar graph , for the case where all the demand pairs can be covered by \\gamma faces.", "after_revision": "It was conjectured by Gupta et al. [Combinatorica04] that every planar graph can be embedded into \\ell_1 with constant distortion. However, given an n-vertex weighted planar graph, the best upper bound on the distortion is only O(\\log n) , by Rao [SoCG99]. In this paper we study the case where there is a set K of terminals, and the goal is to embed only the terminals into \\ell_1 with low distortion. In a seminal paper, Okamura and Seymour [J.Comb.Theory81] showed that if all the terminals lie on a single face, they can be embedded isometrically into \\ell_1. The more general case, where the set of terminals can be covered by \\gamma faces %DIFDELCMD < ] %%% , was studied by Lee and Sidiropoulos [STOC09] and Chekuri et al. [J.Comb.Theory13]. The state of the art is an upper bound of O(\\log \\gamma) by Krauthgamer, Lee and Rika SODA19]. Our contribution is a further improvement on the upper bound to O(\\sqrt{\\log\\gamma}). Since every planar graph has at most O(n) faces, any further improvement on this result, will be a major breakthrough, directly improving upon Rao's long standing upper bound. Moreover, it is well known that the flow-cut gap equals to the distortion of the best embedding into \\ell_1. Therefore , our result provides a polynomial time O(\\sqrt{\\log \\gamma})-approximation to the sparsest cut problem on planar graphs , for the case where all the demand pairs can be covered by \\gamma faces.", "edit_actions": [{"type": "D", "before": ".", "after": null, "start_char_pos": 31, "end_char_pos": 32}, {"type": "A", "before": null, "after": "on the distortion", "start_char_pos": 204, "end_char_pos": 204}, {"type": "A", "before": null, "after": ",", "start_char_pos": 223, "end_char_pos": 223}, {"type": "R", "before": "terminated case ,", "after": "case", "start_char_pos": 268, "end_char_pos": 285}, {"type": "R", "before": "More generally, suppose that the terminals could", "after": "The more general case, where the set of terminals can", "start_char_pos": 561, "end_char_pos": 609}, {"type": "D", "before": ". In a recent paper Krauthgamer, Lee and Rika", "after": null, "start_char_pos": 637, "end_char_pos": 682}, {"type": "D", "before": "SODA19", "after": null, "start_char_pos": 683, "end_char_pos": 689}, {"type": "R", "before": "showed an upper bound of O(\\log \\gamma) on the distortion, improving previous results", "after": ", was studied", "start_char_pos": 708, "end_char_pos": 793}, {"type": "D", "before": ".", "after": null, "start_char_pos": 842, "end_char_pos": 843}, {"type": "A", "before": null, "after": "The state of the art is an upper bound of O(\\log \\gamma) by Krauthgamer, Lee and Rika", "start_char_pos": 867, "end_char_pos": 867}, {"type": "A", "before": null, "after": "SODA19", "start_char_pos": 868, "end_char_pos": 868}, {"type": "A", "before": null, "after": ".", "start_char_pos": 869, "end_char_pos": 869}, {"type": "R", "before": "of", "after": "on", "start_char_pos": 912, "end_char_pos": 914}, {"type": "R", "before": "Note that since", "after": "Since", "start_char_pos": 956, "end_char_pos": 971}, {"type": "R", "before": "of", "after": "on", "start_char_pos": 1039, "end_char_pos": 1041}, {"type": "R", "before": "imply an improvement", "after": "be a major breakthrough, directly improving", "start_char_pos": 1060, "end_char_pos": 1080}, {"type": "R", "before": "It", "after": "Moreover, it", "start_char_pos": 1119, "end_char_pos": 1121}, {"type": "R", "before": "In particular", "after": "Therefore", "start_char_pos": 1218, "end_char_pos": 1231}, {"type": "R", "before": "provide", "after": "provides", "start_char_pos": 1245, "end_char_pos": 1252}, {"type": "R", "before": "graph", "after": "graphs", "start_char_pos": 1345, "end_char_pos": 1350}], "sents_char_pos": [0, 132, 240, 399, 448, 560, 638, 856, 955, 1118, 1217]}
+{"doc_id": "1903.03588", "revision_depth": "2", "before_revision": "In this work, we give a short introduction on cough detection efforts that were undertaken during the last decade and we describe the solution for automatic cough detection developed for the AioCare portable spirometry system. As the system is intended to be used in a large variety of environments and different patients, we train the algorithm using the large database of spirometry curves which is the NHANES database by the American National Center for Health Statistics. Using such a massive dataset is a novelty in the field. We apply few data preprocessing steps, derive specific features and train different classifiers such as logistic regression (LR), feed forward artificial neural network (ANN), artificial neural network combined with principal component analysis (PCA-ANN), support vector machine (SVM) and random forest (RF) on this data to choose the one of the best performance. The accuracy, sensitivity and specificity of the classifiers were comparable and equaled within the range 91.1 \\div%DIFDELCMD < }%%% 91.2\\%, 81.8 \\div%DIFDELCMD < }%%% 83.8\\% and 95.0 \\div%DIFDELCMD < }%%% 95.9\\% for the test set, respectively. The ANN solution was selected as the final classifier. Classification methodology developed in this study is robust for detecting cough events during spirometry measurements. We also show that it is universal and transferable between different systems as the performance on the NHANES and the AioCare test sets is similar. As far as we know, the solution presented in this work is the first description of the automatic cough detection algorithm based totally on the air flow signals and the first cough detection implemented in the commercial spirometry system that is to be published.", "after_revision": "We give a short introduction to cough detection efforts that were undertaken during the last decade and we describe the solution for automatic cough detection developed for the AioCare portable spirometry system. In contrast to more popular analysis of sound and audio recordings, we fully based our approach on airflow signals only. As the system is intended to be used in a large variety of environments and different patients, we trained and validated the algorithm using AioCare-collected data and the large database of spirometry curves from the NHANES database by the American National Center for Health Statistics. We trained different classifiers, such as logistic regression , feed-forward artificial neural network , support vector machine , and random forest to choose the one with the best performance. The %DIFDELCMD < }%%% %DIFDELCMD < }%%% %DIFDELCMD < }%%% ANN solution was selected as the final classifier. The classification results on the test set (AioCare data) are: 0.86 (sensitivity), 0.91 (specificity), 0.91 (accuracy) and 0.88 (F1 score). The classification methodology developed in this study is robust for detecting cough events during spirometry measurements. As far as we know, the solution presented in this work is the first fully reproducible description of the automatic cough detection algorithm based totally on airflow signals and the first cough detection implemented in a commercial spirometry system that is to be published.", "edit_actions": [{"type": "R", "before": "In this work, we", "after": "We", "start_char_pos": 0, "end_char_pos": 16}, {"type": "R", "before": "on", "after": "to", "start_char_pos": 43, "end_char_pos": 45}, {"type": "A", "before": null, "after": "In contrast to more popular analysis of sound and audio recordings, we fully based our approach on airflow signals only.", "start_char_pos": 227, "end_char_pos": 227}, {"type": "R", "before": "train", "after": "trained and validated", "start_char_pos": 327, "end_char_pos": 332}, {"type": "A", "before": null, "after": "AioCare-collected data and", "start_char_pos": 353, "end_char_pos": 353}, {"type": "R", "before": "which is", "after": "from", "start_char_pos": 394, "end_char_pos": 402}, {"type": "R", "before": "Using such a massive dataset is a novelty in the field. We apply few data preprocessing steps, derive specific features and train different classifiers", "after": "We trained different classifiers,", "start_char_pos": 478, "end_char_pos": 629}, {"type": "R", "before": "(LR), feed forward", "after": ", feed-forward", "start_char_pos": 658, "end_char_pos": 676}, {"type": "R", "before": "(ANN), artificial neural network combined with principal component analysis (PCA-ANN),", "after": ",", "start_char_pos": 703, "end_char_pos": 789}, {"type": "R", "before": "(SVM)", "after": ",", "start_char_pos": 813, "end_char_pos": 818}, {"type": "D", "before": "(RF) on this data", "after": null, "start_char_pos": 837, "end_char_pos": 854}, {"type": "R", "before": "of", "after": "with", "start_char_pos": 873, "end_char_pos": 875}, {"type": "D", "before": "accuracy, sensitivity and specificity of the classifiers were comparable and equaled within the range 91.1", "after": null, "start_char_pos": 902, "end_char_pos": 1008}, {"type": "D", "before": "\\div", "after": null, "start_char_pos": 1009, "end_char_pos": 1013}, {"type": "D", "before": "91.2\\%, 81.8", "after": null, "start_char_pos": 1031, "end_char_pos": 1043}, {"type": "D", "before": "\\div", "after": null, "start_char_pos": 1044, "end_char_pos": 1048}, {"type": "D", "before": "83.8\\% and 95.0", "after": null, "start_char_pos": 1066, "end_char_pos": 1081}, {"type": "D", "before": "\\div", "after": null, "start_char_pos": 1082, "end_char_pos": 1086}, {"type": "D", "before": "95.9\\% for the test set, respectively. The", "after": null, "start_char_pos": 1104, "end_char_pos": 1146}, {"type": "R", "before": "Classification", "after": "The classification results on the test set (AioCare data) are: 0.86 (sensitivity), 0.91 (specificity), 0.91 (accuracy) and 0.88 (F1 score). The classification", "start_char_pos": 1198, "end_char_pos": 1212}, {"type": "D", "before": "We also show that it is universal and transferable between different systems as the performance on the NHANES and the AioCare test sets is similar.", "after": null, "start_char_pos": 1318, "end_char_pos": 1465}, {"type": "A", "before": null, "after": "fully reproducible", "start_char_pos": 1534, "end_char_pos": 1534}, {"type": "R", "before": "the air flow", "after": "airflow", "start_char_pos": 1607, "end_char_pos": 1619}, {"type": "R", "before": "the", "after": "a", "start_char_pos": 1673, "end_char_pos": 1676}], "sents_char_pos": [0, 226, 477, 533, 897, 1142, 1197, 1317, 1465]}
+{"doc_id": "1903.06696", "revision_depth": "1", "before_revision": "We consider the problem of welfare maximization in two-sided markets using simple mechanisms that are prior-independent. The seminal impossibility result of Myerson and Satterthwaite 1983 shows that even for bilateral trade, there is no feasible (IR, truthful and budget balanced) mechanism that has welfare as high as the optimal-yet-infeasible VCG mechanism, which attains maximal welfare but runs a deficit. On the other hand, the optimal feasible mechanism needs to be carefully tailored to the Bayesian prior, and is extremely complex, eluding a precise description. In this paper we present Bulow-Klemperer-style results to circumvent these hurdles in double-auction market settings . We suggest using the Buyer Trade Reduction (BTR) mechanism, a variant of McAfee's mechanism, that is feasible and simple (in particular, it is deterministic, prior-independent, and anonymous). First, in the setting where the buyers' and sellers' values are sampled i.i.d. from the same distribution, we show that for any such market of any size, BTR with one additional buyer whose value is sampled from the same distribution has expected welfare at least as high as the optimal in the original market. We then move to a more general setting where the buyers' values are sampled from one distribution , and the sellers' from another, focusing on the case where the buyers' distribution first-order stochastically dominates the sellers' distribution . We present bounds on the number of buyers that, when added, cause BTR in the augmented market to achieve welfare at least as high as the optimal in the original market. Our lower bounds extend to a large class of mechanisms . In addition, we present positive results about the usefulness of pricing at a sample for welfare maximization in two-sided markets under the above two settings, which to the best of our knowledge are the first sampling results in this context.", "after_revision": "We consider the problem of welfare maximization in two-sided markets using simple mechanisms that are prior-independent. The Myerson-Satterthwaite impossibility theorem shows that even for bilateral trade, there is no feasible (IR, truthful , budget balanced) mechanism that has welfare as high as the optimal-yet-infeasible VCG mechanism, which attains maximal welfare but runs a deficit. On the other hand, the optimal feasible mechanism needs to be carefully tailored to the Bayesian prior, and is extremely complex, eluding a precise description. We present Bulow-Klemperer-style results to circumvent these hurdles in double-auction markets . We suggest using the Buyer Trade Reduction (BTR) mechanism, a variant of McAfee's mechanism, which is feasible and simple (in particular, deterministic, truthful, prior-independent, anonymous). First, in the setting where buyers' and sellers' values are sampled i.i.d. from the same distribution, we show that for any such market of any size, BTR with one additional buyer whose value is sampled from the same distribution has expected welfare at least as high as the optimal in the original market. We then move to a more general setting where buyers' values are sampled from one distribution and sellers' from another, focusing on the case where the buyers' distribution first-order stochastically dominates the sellers' . We present bounds on the number of buyers that, when added, guarantees that BTR in the augmented market have welfare at least as high as the optimal in the original market. Our lower bounds extend to a large class of mechanisms , and all of our results extend to adding sellers instead of buyers . In addition, we present positive results about the usefulness of pricing at a sample for welfare maximization in two-sided markets under the above two settings, which to the best of our knowledge are the first sampling results in this context.", "edit_actions": [{"type": "D", "before": "seminal impossibility result of Myerson and Satterthwaite", "after": null, "start_char_pos": 125, "end_char_pos": 182}, {"type": "R", "before": "1983", "after": "Myerson-Satterthwaite impossibility theorem", "start_char_pos": 183, "end_char_pos": 187}, {"type": "R", "before": "and", "after": ",", "start_char_pos": 260, "end_char_pos": 263}, {"type": "R", "before": "In this paper we", "after": "We", "start_char_pos": 572, "end_char_pos": 588}, {"type": "R", "before": "market settings", "after": "markets", "start_char_pos": 673, "end_char_pos": 688}, {"type": "R", "before": "that", "after": "which", "start_char_pos": 784, "end_char_pos": 788}, {"type": "R", "before": "it is deterministic,", "after": "deterministic, truthful,", "start_char_pos": 828, "end_char_pos": 848}, {"type": "D", "before": "and", "after": null, "start_char_pos": 868, "end_char_pos": 871}, {"type": "D", "before": "the", "after": null, "start_char_pos": 912, "end_char_pos": 915}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1239, "end_char_pos": 1242}, {"type": "R", "before": ", and the", "after": "and", "start_char_pos": 1292, "end_char_pos": 1301}, {"type": "D", "before": "distribution", "after": null, "start_char_pos": 1427, "end_char_pos": 1439}, {"type": "R", "before": "cause", "after": "guarantees that", "start_char_pos": 1502, "end_char_pos": 1507}, {"type": "R", "before": "to achieve", "after": "have", "start_char_pos": 1536, "end_char_pos": 1546}, {"type": "A", "before": null, "after": ", and all of our results extend to adding sellers instead of buyers", "start_char_pos": 1666, "end_char_pos": 1666}], "sents_char_pos": [0, 120, 410, 571, 690, 883, 1193, 1441, 1610, 1668]}
+{"doc_id": "1903.11445", "revision_depth": "1", "before_revision": "We study three orientation-based shape descriptors on a set of continuously moving points P : the first principal component, the smallest oriented bounding box and the thinnest strip. Each of these shape descriptors essentially defines a cost capturing the quality of the descriptor (sum of squared distances for principal component, area for oriented bounding box, and width for strip), and uses the orientation that minimizes the cost. This optimal orientation may be very unstable as the points are moving, which is undesirable in many practical scenarios. Alternatively, we can bound the speed with which the orientation of the descriptor may change . However, this can increase the cost (and hence lower the quality ) of the resulting shape descriptor. In this paper we study the trade-off between stability and quality of these shape descriptors. \\% We first show that there is no stateless algorithm, which depends only on the input points in one timestep and not on previous states , that both approximates the minimum cost of a shape descriptor and achieves bounded speed . On the other hand, if we can use the previous state of the shape descriptor to compute the new state, then we can define \"chasing\" algorithms that attempt to follow the optimal orientation with bounded speed. Under mild conditions, we show that chasing algorithms with sufficient bounded speed approximate the optimal cost at every time step for oriented bounding boxes and strips , but not for principal components . The analysis of such chasing algorithms is challenging and has received little attention in literature, hence we believe that our methods used to perform this analysis are of independent interest.", "after_revision": "We study three orientation-based shape descriptors on a set of continuously moving points : the first principal component, the smallest oriented bounding box and the thinnest strip. Each of these shape descriptors essentially defines a cost capturing the quality of the descriptor and uses the orientation that minimizes the cost. This optimal orientation may be very unstable as the points are moving, which is undesirable in many practical scenarios. If we bound the speed with which the orientation of the descriptor may change , this may lower the quality of the resulting shape descriptor. In this paper we study the trade-off between stability and quality of these shape descriptors. We first show that there is no stateless algorithm, an algorithm that keeps no state over time , that both approximates the minimum cost of a shape descriptor and achieves continuous motion for the shape descriptor . On the other hand, if we can use the previous state of the shape descriptor to compute the new state, we can define \"chasing\" algorithms that attempt to follow the optimal orientation with bounded speed. We show that, under mild conditions, chasing algorithms with sufficient bounded speed approximate the optimal cost at all times for oriented bounding boxes and strips . The analysis of such chasing algorithms is challenging and has received little attention in literature, hence we believe that our methods used in this analysis are of independent interest.", "edit_actions": [{"type": "D", "before": "P", "after": null, "start_char_pos": 90, "end_char_pos": 91}, {"type": "R", "before": "(sum of squared distances for principal component, area for oriented bounding box, and width for strip), and", "after": "and", "start_char_pos": 283, "end_char_pos": 391}, {"type": "R", "before": "Alternatively, we can", "after": "If we", "start_char_pos": 560, "end_char_pos": 581}, {"type": "R", "before": ". However, this can increase the cost (and hence", "after": ", this may", "start_char_pos": 654, "end_char_pos": 702}, {"type": "D", "before": ")", "after": null, "start_char_pos": 721, "end_char_pos": 722}, {"type": "D", "before": "\\%", "after": null, "start_char_pos": 853, "end_char_pos": 855}, {"type": "R", "before": "which depends only on the input points in one timestep and not on previous states", "after": "an algorithm that keeps no state over time", "start_char_pos": 908, "end_char_pos": 989}, {"type": "R", "before": "bounded speed", "after": "continuous motion for the shape descriptor", "start_char_pos": 1067, "end_char_pos": 1080}, {"type": "D", "before": "then", "after": null, "start_char_pos": 1185, "end_char_pos": 1189}, {"type": "R", "before": "Under", "after": "We show that, under", "start_char_pos": 1292, "end_char_pos": 1297}, {"type": "D", "before": "we show that", "after": null, "start_char_pos": 1315, "end_char_pos": 1327}, {"type": "R", "before": "every time step", "after": "all times", "start_char_pos": 1409, "end_char_pos": 1424}, {"type": "D", "before": ", but not for principal components", "after": null, "start_char_pos": 1464, "end_char_pos": 1498}, {"type": "R", "before": "to perform", "after": "in", "start_char_pos": 1644, "end_char_pos": 1654}], "sents_char_pos": [0, 183, 437, 559, 655, 757, 852, 1082, 1291, 1500]}
+{"doc_id": "1904.01121", "revision_depth": "1", "before_revision": "Generative models often use human evaluations to determine and justify progress. Unfortunately, existing human evaluation methods are ad-hoc : there is currently no standardized, validated evaluation that: (1) measures perceptual fidelity, (2) is reliable, (3) separates models into clear rank order, and (4) ensures high-quality measurement without intractable cost. In response, we construct Human-eYe Perceptual Evaluation (HYPE) , a human metric that is (1) grounded in psychophysics research in perception, (2) reliable across different sets of randomly sampled outputs from a model, (3) results in separable model performances, and (4) efficient in cost and time. We introduce two methods. The first, HYPE-Time, measures visual perception under adaptive time constraints to determine the minimum length of time (e.g. , 250ms) that model output such as a generated face needs to be visible for people to distinguish it as real or fake. The second, HYPE-Infinity , measures human error rate on fake and real images with no time constraints, maintaining stability and drastically reducing time and cost . We test HYPE across four state-of-the-art generative adversarial networks (GANs) on unconditional image generation using two datasets, the popular CelebAand the newer higher-resolution FFHQ, and two sampling techniques of model outputs. By simulating HYPE 's evaluation multiple times, we demonstrate consistent ranking of different models, identifying StyleGAN with truncation trick sampling (27.6\\% HYPE-Infinity deception rate, with roughly one quarter of images being misclassified by humans) as superior to StyleGAN without truncation (19.0\\%) on FFHQ. See URL for details .", "after_revision": "Generative models often use human evaluations to measure the perceived quality of their outputs. Automated metrics are noisy indirect proxies, because they rely on heuristics or pretrained embeddings. However, up until now, direct human evaluation strategies have been ad-hoc , neither standardized nor validated. Our work establishes a gold standard human benchmark for generative realism. We construct Human eYe Perceptual Evaluation (HYPE) a human benchmark that is (1) grounded in psychophysics research in perception, (2) reliable across different sets of randomly sampled outputs from a model, (3) able to produce separable model performances, and (4) efficient in cost and time. We introduce two variants: one that measures visual perception under adaptive time constraints to determine the threshold at which a model's outputs appear real (e.g. 250ms) , and the other a less expensive variant that measures human error rate on fake and real images sans time constraints . We test HYPE across six state-of-the-art generative adversarial networks and two sampling techniques on conditional and unconditional image generation using four datasets: CelebA, FFHQ, CIFAR-10, and ImageNet. We find that HYPE can track model improvements across training epochs, and we confirm via bootstrap sampling that HYPE rankings are consistent and replicable .", "edit_actions": [{"type": "R", "before": "determine and justify progress. Unfortunately, existing human evaluation methods are", "after": "measure the perceived quality of their outputs. Automated metrics are noisy indirect proxies, because they rely on heuristics or pretrained embeddings. However, up until now, direct human evaluation strategies have been", "start_char_pos": 49, "end_char_pos": 133}, {"type": "R", "before": ": there is currently no standardized, validated evaluation that: (1) measures perceptual fidelity, (2) is reliable, (3) separates models into clear rank order, and (4) ensures high-quality measurement without intractable cost. In response, we construct Human-eYe", "after": ", neither standardized nor validated. Our work establishes a gold standard human benchmark for generative realism. We construct Human eYe", "start_char_pos": 141, "end_char_pos": 403}, {"type": "R", "before": ", a human metric", "after": "a human benchmark", "start_char_pos": 433, "end_char_pos": 449}, {"type": "R", "before": "results in", "after": "able to produce", "start_char_pos": 593, "end_char_pos": 603}, {"type": "R", "before": "methods. The first, HYPE-Time,", "after": "variants: one that", "start_char_pos": 687, "end_char_pos": 717}, {"type": "R", "before": "minimum length of time", "after": "threshold at which a model's outputs appear real", "start_char_pos": 794, "end_char_pos": 816}, {"type": "D", "before": ",", "after": null, "start_char_pos": 823, "end_char_pos": 824}, {"type": "D", "before": "that model output such as a generated face needs to be visible for people to distinguish it as real or fake. The second, HYPE-Infinity", "after": null, "start_char_pos": 832, "end_char_pos": 966}, {"type": "A", "before": null, "after": "and the other a less expensive variant that", "start_char_pos": 969, "end_char_pos": 969}, {"type": "R", "before": "with no time constraints, maintaining stability and drastically reducing time and cost", "after": "sans time constraints", "start_char_pos": 1020, "end_char_pos": 1106}, {"type": "R", "before": "four", "after": "six", "start_char_pos": 1129, "end_char_pos": 1133}, {"type": "R", "before": "(GANs) on", "after": "and two sampling techniques on conditional and", "start_char_pos": 1183, "end_char_pos": 1192}, {"type": "R", "before": "two datasets, the popular CelebAand the newer higher-resolution FFHQ, and two sampling techniques of model outputs. By simulating HYPE 's evaluation multiple times, we demonstrate consistent ranking of different models, identifying StyleGAN with truncation trick sampling (27.6\\% HYPE-Infinity deception rate, with roughly one quarter of images being misclassified by humans) as superior to StyleGAN without truncation (19.0\\%) on FFHQ. See URL for details", "after": "four datasets: CelebA, FFHQ, CIFAR-10, and ImageNet. We find that HYPE can track model improvements across training epochs, and we confirm via bootstrap sampling that HYPE rankings are consistent and replicable", "start_char_pos": 1230, "end_char_pos": 1686}], "sents_char_pos": [0, 80, 367, 669, 695, 940, 1108, 1345, 1666]}
+{"doc_id": "1904.03524", "revision_depth": "1", "before_revision": "Addiction and overdose related to prescription opioids have reached an epidemic level in the U.S. , creating an unprecedented national crisis. This has been exacerbated partly due to the lack of tools for physicians to help predict whether or not a patient will develop opioid use disorder. Prior research lacks the investigation of how machine learning can be applied to a big-data platform to ensure an informed and judicious prescribing of opioids . In this study , we explore the Massachusetts All Payer Claim Data(MA APCD) , a de-identified healthcare claim dataset, and propose a novel framework to examine how na\\\"ive users develop opioid use disorder. We perform several feature engineering techniques to identify the influential demographic and clinical features associated with opioid use disorder from a class imbalanced analytic sample. We then use and compare the predictive power of four well-known machine learning algorithms: logistic regression, random forest, decision tree, and gradient boosting, to predict the risk of such dependency. Results showed that the random forest model outperforms the other three algorithms while determining the features, some of which are consistent with prior clinical findings. We anticipate that this research has the potential for healthcare practitioners to improve the current prescribing practice of opioids , thereby curbing the increasing rate of opioid addiction .", "after_revision": "Overdose related to prescription opioids have reached an epidemic level in the US , creating an unprecedented national crisis. This has been exacerbated partly due to the lack of tools for physicians to help predict the risk of whether a patient will develop opioid use disorder. Little is known about how machine learning can be applied to a big-data platform to ensure an informed , sustained and judicious prescribing of opioids , in particular for commercially insured population. This study explores Massachusetts All Payer Claims Data , a de-identified healthcare dataset, and proposes a machine learning framework to examine how na\\\"ive users develop opioid use disorder. We perform several feature selections techniques to identify influential demographic and clinical features associated with opioid use disorder from a class imbalanced analytic sample. We then compare the predictive power of four well-known machine learning algorithms: Logistic Regression, Random Forest, Decision Tree, and Gradient Boosting to predict the risk of opioid use disorder. The study results show that the Random Forest model outperforms the other three algorithms while determining the features, some of which are consistent with prior clinical findings. Moreover, alongside the higher predictive accuracy, the proposed framework is capable of extracting some risk factors that will add significant knowledge to what is already known in the extant literature. We anticipate that this study will help healthcare practitioners improve the current prescribing practice of opioids and contribute to curb the increasing rate of opioid addiction and overdose .", "edit_actions": [{"type": "R", "before": "Addiction and overdose", "after": "Overdose", "start_char_pos": 0, "end_char_pos": 22}, {"type": "R", "before": "U.S.", "after": "US", "start_char_pos": 93, "end_char_pos": 97}, {"type": "R", "before": "whether or not", "after": "the risk of whether", "start_char_pos": 232, "end_char_pos": 246}, {"type": "R", "before": "Prior research lacks the investigation of", "after": "Little is known about", "start_char_pos": 291, "end_char_pos": 332}, {"type": "A", "before": null, "after": ", sustained", "start_char_pos": 414, "end_char_pos": 414}, {"type": "R", "before": ". In this study , we explore the", "after": ", in particular for commercially insured population. This study explores", "start_char_pos": 452, "end_char_pos": 484}, {"type": "R", "before": "Claim Data(MA APCD)", "after": "Claims Data", "start_char_pos": 509, "end_char_pos": 528}, {"type": "D", "before": "claim", "after": null, "start_char_pos": 558, "end_char_pos": 563}, {"type": "R", "before": "propose a novel", "after": "proposes a machine learning", "start_char_pos": 577, "end_char_pos": 592}, {"type": "R", "before": "engineering", "after": "selections", "start_char_pos": 688, "end_char_pos": 699}, {"type": "D", "before": "the", "after": null, "start_char_pos": 723, "end_char_pos": 726}, {"type": "D", "before": "use and", "after": null, "start_char_pos": 858, "end_char_pos": 865}, {"type": "R", "before": "logistic regression, random forest, decision tree, and gradient boosting,", "after": "Logistic Regression, Random Forest, Decision Tree, and Gradient Boosting", "start_char_pos": 943, "end_char_pos": 1016}, {"type": "R", "before": "such dependency. Results showed that the random forest", "after": "opioid use disorder. The study results show that the Random Forest", "start_char_pos": 1040, "end_char_pos": 1094}, {"type": "A", "before": null, "after": "Moreover, alongside the higher predictive accuracy, the proposed framework is capable of extracting some risk factors that will add significant knowledge to what is already known in the extant literature.", "start_char_pos": 1231, "end_char_pos": 1231}, {"type": "R", "before": "research has the potential for healthcare practitioners to", "after": "study will help healthcare practitioners", "start_char_pos": 1256, "end_char_pos": 1314}, {"type": "R", "before": ", thereby curbing", "after": "and contribute to curb", "start_char_pos": 1367, "end_char_pos": 1384}, {"type": "A", "before": null, "after": "and overdose", "start_char_pos": 1425, "end_char_pos": 1425}], "sents_char_pos": [0, 142, 290, 453, 660, 849, 1056, 1230]}
+{"doc_id": "1904.07657", "revision_depth": "1", "before_revision": "Microstructural geometry plays a critical role in a response of heterogeneous materials. Consequently, methods for generating microstructural samples are becoming an integral part of advanced numerical analyses. Here, we extend the unified frameworkof Sonon and co-workers , developed originally for generating particulate and foam-like microstructural geometries of Periodic Unit Cells, to non-periodic microstructural representations based on the formalism of Wang tiles. The formalism has been recently proposed as a generalization of the Periodic Unit Cell approach, enabling a fast synthesis of arbitrarily large, stochastic microstructural samples from a handful of domains with predefined microstructural compatibility constraints. However, a robust procedure capable of designing complex, three-dimensional, foam-like and cellular morphologies of Wang tiles has been missing . This contribution thus significantly broadens the applicability of the tiling concept. Since the original framework builds on a random sequential addition of particles enhanced with a level-set description , we first devise an analysis based on a connectivity graph of a tile set, resolving the question where should a particle be copied when it intersects a tile boundary. Next, we introduce several modifications to the original algorithm that are necessary to ensure microstructural compatibility in the generalized periodicity setting of Wang tiles. Having a universal procedure for generating tile morphologies at hand , we compare strictly aperiodic and stochastic sets of the same cardinality in terms of reducing the artificial periodicity in reconstructed microstructural samples , and demonstrate the superiority of the vertex-defined tile sets for two-dimensional problems . Finally, we illustrate the capabilities of the algorithm with two- and three-dimensional examples.", "after_revision": "Microstructural geometry plays a critical role in the response of heterogeneous materials. Consequently, methods for generating microstructural samples are increasingly crucial to advanced numerical analyses. We extend Sonon et al.'s unified framework , developed originally for generating particulate and foam-like microstructural geometries of Periodic Unit Cells, to non-periodic microstructural representations based on the formalism of Wang tiles. This formalism has been recently proposed in order to generalize the Periodic Unit Cell approach, enabling a fast synthesis of arbitrarily large, stochastic microstructural samples from a handful of domains with predefined compatibility constraints. However, a robust procedure capable of designing complex, three-dimensional, foam-like and cellular morphologies of Wang tiles has not yet been proposed . This contribution fills the gap by significantly broadening the applicability of the tiling concept. Since the original Sonon et al.'s framework builds on a random sequential addition of particles enhanced with an implicit representation of particle boundaries by the level-set field , we first devise an analysis based on a connectivity graph of a tile set, resolving the question where a particle should be copied when it intersects a tile boundary. Next, we introduce several modifications to the original algorithm that are necessary to ensure microstructural compatibility in the generalized periodicity setting of Wang tiles. Having established a universal procedure for generating tile morphologies , we compare strictly aperiodic and stochastic sets with the same cardinality in terms of reducing the artificial periodicity in reconstructed microstructural samples . We demonstrate the superiority of the vertex-defined tile sets for two-dimensional problems and illustrate the capabilities of the algorithm with two- and three-dimensional examples.", "edit_actions": [{"type": "R", "before": "a", "after": "the", "start_char_pos": 50, "end_char_pos": 51}, {"type": "R", "before": "becoming an integral part of", "after": "increasingly crucial to", "start_char_pos": 154, "end_char_pos": 182}, {"type": "R", "before": "Here, we extend the unified frameworkof Sonon and co-workers", "after": "We extend Sonon et al.'s unified framework", "start_char_pos": 212, "end_char_pos": 272}, {"type": "R", "before": "The", "after": "This", "start_char_pos": 474, "end_char_pos": 477}, {"type": "R", "before": "as a generalization of", "after": "in order to generalize", "start_char_pos": 515, "end_char_pos": 537}, {"type": "D", "before": "microstructural", "after": null, "start_char_pos": 696, "end_char_pos": 711}, {"type": "R", "before": "been missing", "after": "not yet been proposed", "start_char_pos": 870, "end_char_pos": 882}, {"type": "R", "before": "thus significantly broadens", "after": "fills the gap by significantly broadening", "start_char_pos": 903, "end_char_pos": 930}, {"type": "A", "before": null, "after": "Sonon et al.'s", "start_char_pos": 991, "end_char_pos": 991}, {"type": "R", "before": "a", "after": "an implicit representation of particle boundaries by the", "start_char_pos": 1068, "end_char_pos": 1069}, {"type": "R", "before": "description", "after": "field", "start_char_pos": 1080, "end_char_pos": 1091}, {"type": "R", "before": "should a particle", "after": "a particle should", "start_char_pos": 1196, "end_char_pos": 1213}, {"type": "A", "before": null, "after": "established", "start_char_pos": 1447, "end_char_pos": 1447}, {"type": "D", "before": "at hand", "after": null, "start_char_pos": 1503, "end_char_pos": 1510}, {"type": "R", "before": "of", "after": "with", "start_char_pos": 1563, "end_char_pos": 1565}, {"type": "R", "before": ", and", "after": ". We", "start_char_pos": 1676, "end_char_pos": 1681}, {"type": "R", "before": ". Finally, we", "after": "and", "start_char_pos": 1771, "end_char_pos": 1784}], "sents_char_pos": [0, 88, 211, 473, 738, 884, 971, 1259, 1439, 1772]}
+{"doc_id": "1904.10508", "revision_depth": "1", "before_revision": "Quantum computing and the workings of the brain have many aspects in common and have been attracting increasing attention in academia and industry. The computation in both is parallel and non-discrete at least in time . Though the underlying physical dynamics (e.g., equation of motion) may be deterministic, the observed or interpreted outcomes look probabilistic. Consequently, various investigations have thus been undertaken to understand and mimic the brain on the basis of quantum computing and physics . However, there have been arguments from physics and cognitive science points of view on whether the brain can and have to take advantage of quantum phenomena that need to survive in the macroscopic space-time region at room temperature. This paper presents a unique physical and microscopic computational model of the brain based on an ansatz that the brain computes in a manner similar to quantum computing, not with quantum waves but with classical waves. Log-scale encoding of information in the context of wave-based computing plays a critical role in bridging the gap between Cartesian and Tensor product states of classical and quantum waves. Our model can provide a basis for a unified computing framework of artificial intelligence and quantum computing .", "after_revision": "Quantum computing and the workings of the brain have many aspects in common and have been attracting increasing attention in academia and industry. The computation in both is parallel and non-discrete . Though the underlying physical dynamics (e.g., equation of motion) may be deterministic, the observed or interpreted outcomes are often probabilistic. Consequently, various investigations have been undertaken to understand and reproduce the brain on the basis of quantum physics and computing . However, there have been arguments on whether the brain can and have to take advantage of quantum phenomena that need to survive in the macroscopic space-time region at room temperature. This paper presents a unique microscopic computational model for the brain based on an ansatz that the brain computes in a manner similar to quantum computing, but with classical waves. Log-scale encoding of information in the context of computing with waves is shown to play a critical role in bridging the computing models with classical and quantum waves. Our quantum-inspired computing model opens up a possibility of unifying the computing framework of artificial intelligence and quantum computing beyond quantum machine learning approaches .", "edit_actions": [{"type": "D", "before": "at least in time", "after": null, "start_char_pos": 201, "end_char_pos": 217}, {"type": "R", "before": "look", "after": "are often", "start_char_pos": 346, "end_char_pos": 350}, {"type": "D", "before": "thus", "after": null, "start_char_pos": 408, "end_char_pos": 412}, {"type": "R", "before": "mimic", "after": "reproduce", "start_char_pos": 447, "end_char_pos": 452}, {"type": "R", "before": "computing and physics", "after": "physics and computing", "start_char_pos": 487, "end_char_pos": 508}, {"type": "D", "before": "from physics and cognitive science points of view", "after": null, "start_char_pos": 546, "end_char_pos": 595}, {"type": "D", "before": "physical and", "after": null, "start_char_pos": 777, "end_char_pos": 789}, {"type": "R", "before": "of", "after": "for", "start_char_pos": 822, "end_char_pos": 824}, {"type": "D", "before": "not with quantum waves", "after": null, "start_char_pos": 920, "end_char_pos": 942}, {"type": "R", "before": "wave-based computing plays", "after": "computing with waves is shown to play", "start_char_pos": 1021, "end_char_pos": 1047}, {"type": "R", "before": "gap between Cartesian and Tensor product states of", "after": "computing models with", "start_char_pos": 1080, "end_char_pos": 1130}, {"type": "R", "before": "model can provide a basis for a unified", "after": "quantum-inspired computing model opens up a possibility of unifying the", "start_char_pos": 1164, "end_char_pos": 1203}, {"type": "A", "before": null, "after": "beyond quantum machine learning approaches", "start_char_pos": 1273, "end_char_pos": 1273}], "sents_char_pos": [0, 147, 219, 365, 510, 747, 968, 1159]}
+{"doc_id": "1904.11392", "revision_depth": "1", "before_revision": "We consider continuous-time Mean-variance (MV) portfolio optimization problem in the Reinforcement Learning (RL) setting . The problem falls into the entropy-regularized relaxed stochastic control framework recently introduced in Wang et al. (2019). We derive the feedback exploration policy as the Gaussiandistribution , with time-decaying variance. Close connections between the entropy-regularized MV and the classical MV are also discussed , including the solvability equivalence and the convergence as exploration decays . Finally, we prove a policy improvement theorem (PIT) for the continuous-time MV problem under both entropy regularization and control relaxation. The PIT leads to an implementable RL algorithm for the continuous-time MV problem. Our algorithm outperforms an adaptive control based method that estimates the underlying parameters in real-time and a state-of-the-art RL method that uses deep neural networks for continuous control problems by a large margin in nearly all simulations.", "after_revision": "We approach the continuous-time mean-variance (MV) portfolio selection with reinforcement learning (RL) . The problem is to achieve the best tradeoff between exploration and exploitation, and is formulated as an entropy-regularized , relaxed stochastic control problem. We prove that the optimal feedback policy for this problem must be Gaussian , with time-decaying variance. We then establish connections between the entropy-regularized MV and the classical MV , including the solvability equivalence and the convergence as exploration weighting parameter decays to zero . Finally, we prove a policy improvement theorem , based on which we devise an implementable RL algorithm . We find that our algorithm outperforms both an adaptive control based method and a deep neural networks based algorithm by a large margin in our simulations.", "edit_actions": [{"type": "R", "before": "consider", "after": "approach the", "start_char_pos": 3, "end_char_pos": 11}, {"type": "R", "before": "Mean-variance", "after": "mean-variance", "start_char_pos": 28, "end_char_pos": 41}, {"type": "R", "before": "optimization problem in the Reinforcement Learning", "after": "selection with reinforcement learning", "start_char_pos": 57, "end_char_pos": 107}, {"type": "D", "before": "setting", "after": null, "start_char_pos": 113, "end_char_pos": 120}, {"type": "R", "before": "falls into the", "after": "is to achieve the best tradeoff between exploration and exploitation, and is formulated as an", "start_char_pos": 135, "end_char_pos": 149}, {"type": "A", "before": null, "after": ",", "start_char_pos": 170, "end_char_pos": 170}, {"type": "R", "before": "framework recently introduced in Wang et al. (2019). We derive the feedback exploration policy as the Gaussiandistribution", "after": "problem. We prove that the optimal feedback policy for this problem must be Gaussian", "start_char_pos": 198, "end_char_pos": 320}, {"type": "R", "before": "Close", "after": "We then establish", "start_char_pos": 352, "end_char_pos": 357}, {"type": "D", "before": "are also discussed", "after": null, "start_char_pos": 426, "end_char_pos": 444}, {"type": "R", "before": "decays", "after": "weighting parameter decays to zero", "start_char_pos": 520, "end_char_pos": 526}, {"type": "R", "before": "(PIT) for the continuous-time MV problem under both entropy regularization and control relaxation. The PIT leads to", "after": ", based on which we devise", "start_char_pos": 576, "end_char_pos": 691}, {"type": "R", "before": "for the continuous-time MV problem. Our algorithm outperforms", "after": ". We find that our algorithm outperforms both", "start_char_pos": 722, "end_char_pos": 783}, {"type": "R", "before": "that estimates the underlying parameters in real-time and a state-of-the-art RL method that uses", "after": "and a", "start_char_pos": 817, "end_char_pos": 913}, {"type": "R", "before": "for continuous control problems", "after": "based algorithm", "start_char_pos": 935, "end_char_pos": 966}, {"type": "R", "before": "nearly all", "after": "our", "start_char_pos": 988, "end_char_pos": 998}], "sents_char_pos": [0, 122, 250, 351, 528, 674, 757]}
+{"doc_id": "1904.12834", "revision_depth": "2", "before_revision": "This paper presents a framework of developing neural networks for predicting implied volatility surfaces. Conventional financial conditions and empirical evidence related to the implied volatility are incorporated into the neural network architecture design and model training including no static arbitrage, boundaries, asymptotic slope and volatility smile. They are also satisfied empirically by the option data on the S&P 500 index over twenty years. The developed neural network model and its simplified variations outperform the widely used surface stochastic volatility inspired (SSVI) model on the mean average percentage error in both in-sample and out-of-sample datasets. This study has two main methodological contributions. First, an accurate deep learning prediction model is developed and tailored to implied volatility surfaces . Second, a framework, which seamlessly combines data-driven models with financial theories, can be extended and applied to solve other related business problems .", "after_revision": "This paper presents a framework of developing neural networks to predict implied volatility surfaces. It can incorporate the related properties from existing mathematical models and empirical findings, including no static arbitrage, limiting boundaries, asymptotic slope and volatility smile. These properties are also satisfied empirically in our experiments with the option data on the S&P 500 index over 20 years. The developed neural network model outperforms the widely used surface stochastic volatility inspired (SSVI) model and other benchmarked neural network models on the mean average percentage error in both in-sample and out-of-sample datasets. This study has two major contributions. First, it contributes to the recent use of machine learning in finance, and an accurate deep learning implied volatility surface prediction model is obtained . Second, it provides the methodological guidance on how to seamlessly combine data-driven models with domain knowledge in the development of machine learning applications .", "edit_actions": [{"type": "R", "before": "for predicting", "after": "to predict", "start_char_pos": 62, "end_char_pos": 76}, {"type": "R", "before": "Conventional financial conditions and empirical evidence related to the implied volatility are incorporated into the neural network architecture design and model training", "after": "It can incorporate the related properties from existing mathematical models and empirical findings,", "start_char_pos": 106, "end_char_pos": 276}, {"type": "A", "before": null, "after": "limiting", "start_char_pos": 308, "end_char_pos": 308}, {"type": "R", "before": "They", "after": "These properties", "start_char_pos": 360, "end_char_pos": 364}, {"type": "R", "before": "by", "after": "in our experiments with", "start_char_pos": 396, "end_char_pos": 398}, {"type": "R", "before": "twenty", "after": "20", "start_char_pos": 441, "end_char_pos": 447}, {"type": "R", "before": "and its simplified variations outperform", "after": "outperforms", "start_char_pos": 490, "end_char_pos": 530}, {"type": "A", "before": null, "after": "and other benchmarked neural network models", "start_char_pos": 599, "end_char_pos": 599}, {"type": "R", "before": "main methodological", "after": "major", "start_char_pos": 702, "end_char_pos": 721}, {"type": "A", "before": null, "after": "it contributes to the recent use of machine learning in finance, and", "start_char_pos": 744, "end_char_pos": 744}, {"type": "A", "before": null, "after": "implied volatility surface", "start_char_pos": 771, "end_char_pos": 771}, {"type": "R", "before": "developed and tailored to implied volatility surfaces", "after": "obtained", "start_char_pos": 792, "end_char_pos": 845}, {"type": "R", "before": "a framework, which seamlessly combines", "after": "it provides the methodological guidance on how to seamlessly combine", "start_char_pos": 856, "end_char_pos": 894}, {"type": "R", "before": "financial theories, can be extended and applied to solve other related business problems", "after": "domain knowledge in the development of machine learning applications", "start_char_pos": 919, "end_char_pos": 1007}], "sents_char_pos": [0, 105, 359, 454, 682, 736, 847]}
+{"doc_id": "1905.01302", "revision_depth": "1", "before_revision": "OT (Operational Transformation) was invented for supporting real-time co-editors in the late 1980s and has evolved to become a core technique used in today's working co-editors and adopted in major industrial products. CRDT (Commutative Replicated Data Type) for co-editors was first proposed around 2006, under the name of WOOT (WithOut Operational Transformation). Follow-up CRDT variations are commonly labeled as \"post-OT\" techniques and have made broad claims of superiority over OT solutions, in terms of correctness, time and space complexity, simplicity, etc . Over one decade later, however, OT remains the choice for building the vast majority of co-editors , whereas CRDTis rarely found in working co-editors. Why? Based on comprehensive review and comparison on representative OT and CRDT solutions and co-editors based on them , we present our discoveries in relation to this question and beyond in a series of three articles. In prior work, we have revealed that CRDT is like OT in following the same general transformation approach and CRDT is not natively commutative for concurrent operations in co-editors, which helps to clarify what CRDT really is and is not for co-editors. In this article , we reveal OT and CRDT differences in correctness and complexity by dissecting and examining representative OT and CRDT solutions. We explore how different basic approaches , i.e. the concurrency-centric approach taken by OT and the content-centric approach taken by CRDT, had resulted in different technical challenges , correctness and complexity issues , and solutions . Moreover, we reveal hidden algorithmic flaws with representative CRDT solutions, and discuss common myths and facts related to correctness , time and space complexity , and simplicity of OT and CRDT . We present facts and evidences that refute CRDT claimed advantages over OT .", "after_revision": "OT (Operational Transformation) was invented for supporting real-time co-editors in the late 1980s and has evolved to become core techniques widely used in today's working co-editors and adopted in industrial products. CRDT (Commutative Replicated Data Type) for co-editors was first proposed around 2006, under the name of WOOT (WithOut Operational Transformation). Follow-up CRDT variations are commonly labeled as \"post-OT\" techniques capable of making concurrent operations natively commutative in co-editors. On top of that, CRDT solutions have made broad claims of superiority over OT solutions, and often portrayed OT as an incorrect and inefficient technique . Over one decade later, however, CRDT is rarely found in working co-editors; OT remains the choice for building the vast majority of today's co-editors . Contradictions between the reality and CRDT's purported advantages have been the source of much confusion and debate among co-editing researcher sand developers. To seek truth from facts, we set out to conduct a comprehensive and critical review on representative OT and CRDT solutions and co-editors based on them . From this work, we have made important discoveries about OT and CRDT, and revealed facts and evidences that refute CRDT claims over OT on all accounts. These discoveries help explain the underlying reasons for the choice between OT and CRDT in the real world. We report these results in a series of three articles. In the second article of this series , we reveal the differences between OT and CRDT in their basic approaches to realizing the same general transformation and how such differences had resulted in different challenges and consequential correctness and complexity issues . Moreover, we reveal hidden complexity and algorithmic flaws with representative CRDT solutions, and discuss common myths and facts related to correctness and complexity of OT and CRDT .", "edit_actions": [{"type": "R", "before": "a core technique", "after": "core techniques widely", "start_char_pos": 125, "end_char_pos": 141}, {"type": "D", "before": "major", "after": null, "start_char_pos": 192, "end_char_pos": 197}, {"type": "R", "before": "and", "after": "capable of making concurrent operations natively commutative in co-editors. On top of that, CRDT solutions", "start_char_pos": 438, "end_char_pos": 441}, {"type": "R", "before": "in terms of correctness, time and space complexity, simplicity, etc", "after": "and often portrayed OT as an incorrect and inefficient technique", "start_char_pos": 499, "end_char_pos": 566}, {"type": "A", "before": null, "after": "CRDT is rarely found in working co-editors;", "start_char_pos": 601, "end_char_pos": 601}, {"type": "A", "before": null, "after": "today's", "start_char_pos": 658, "end_char_pos": 658}, {"type": "R", "before": ", whereas CRDTis rarely found in working co-editors. Why? Based on comprehensive review and comparison", "after": ". Contradictions between the reality and CRDT's purported advantages have been the source of much confusion and debate among co-editing researcher sand developers. To seek truth from facts, we set out to conduct a comprehensive and critical review", "start_char_pos": 670, "end_char_pos": 772}, {"type": "R", "before": ", we present our discoveries in relation to this question and beyond in a series of three articles. In prior", "after": ". From this", "start_char_pos": 842, "end_char_pos": 950}, {"type": "R", "before": "revealed that CRDT is like OT in following the same general transformation approach and CRDT is not natively commutative for concurrent operations in co-editors, which helps to clarify what CRDT really is and is not for co-editors. In this article", "after": "made important discoveries about OT and CRDT, and revealed facts and evidences that refute CRDT claims over OT on all accounts. These discoveries help explain the underlying reasons for the choice between OT and CRDT in the real world. We report these results in a series of three articles. In the second article of this series", "start_char_pos": 965, "end_char_pos": 1212}, {"type": "R", "before": "OT and CRDT differences in correctness and complexity by dissecting and examining representative", "after": "the differences between", "start_char_pos": 1225, "end_char_pos": 1321}, {"type": "R", "before": "solutions. We explore how different basic approaches , i.e. the concurrency-centric approach taken by OT and the content-centric approach taken by CRDT,", "after": "in their basic approaches to realizing the same general transformation and how such differences", "start_char_pos": 1334, "end_char_pos": 1486}, {"type": "R", "before": "technical challenges ,", "after": "challenges and consequential", "start_char_pos": 1513, "end_char_pos": 1535}, {"type": "D", "before": ", and solutions", "after": null, "start_char_pos": 1570, "end_char_pos": 1585}, {"type": "A", "before": null, "after": "complexity and", "start_char_pos": 1615, "end_char_pos": 1615}, {"type": "R", "before": ", time and space complexity , and simplicity", "after": "and complexity", "start_char_pos": 1728, "end_char_pos": 1772}, {"type": "D", "before": ". We present facts and evidences that refute CRDT claimed advantages over OT", "after": null, "start_char_pos": 1788, "end_char_pos": 1864}], "sents_char_pos": [0, 218, 366, 568, 727, 941, 1196, 1344, 1587]}
+{"doc_id": "1905.07546", "revision_depth": "1", "before_revision": "The effects of weather on agriculture in recent years have become a major concern across the globe . Hence, the need for an effective weather risk management tool ( weather derivatives) for agricultural stakeholders . However, most of these stakeholders are unwilling to pay for the price of weather derivatives (WD) because of product-design and geographical basis risks in the pricing models of WD. Using machine learning ensemble technique for crop yield forecasting and feature importance, the major major weather variable (average temperature) that affects crop yields are empirically determined. This variable (average temperature) is used as the underlying index for WD to eliminate product-design basis risks. A model with time-varying speed of mean reversion, seasonal mean, local volatility that depends on the average temperature and time for the contract period is proposed. Based on this model , pricing models for futures, options on futures, and basket futures for cumulative average temperature and growing degree-days are presented. Pricing futures on baskets reduces geographical basis risk as buyer's have the opportunity to select the most appropriate weather stations with their desired weight preference. With these pricing models, agricultural stakeholders can hedge their crops against the perils of weather.", "after_revision": "The effects of weather on agriculture in recent years have become a major global concern . Hence, the need for an effective weather risk management tool ( i.e., weather derivatives) that can hedge crop yields against weather uncertainties . However, most smallholder farmers and agricultural stakeholders are unwilling to pay for the price of weather derivatives (WD) because of the presence of basis risks ( product-design and geographical ) in the pricing models . To eliminate product-design basis risks, a machine learning ensemble technique was used to determine the relationship between maize yield and weather variables. The results revealed that the most significant weather variable that affected the yield of maize was average temperature. A mean-reverting model with a time-varying speed of mean reversion, seasonal mean, and local volatility that depended on the local average temperature was then proposed. The model was extended to a multi-dimensional model for different but correlated locations. Based on these average temperature models , pricing models for futures, options on futures, and basket futures for cumulative average temperature and growing degree-days are presented. Pricing futures on baskets reduces geographical basis risk , as buyers have the opportunity to select the most appropriate weather stations with their desired weight preference. With these pricing models, farmers and agricultural stakeholders can hedge their crops against the perils of extreme weather.", "edit_actions": [{"type": "R", "before": "concern across the globe", "after": "global concern", "start_char_pos": 74, "end_char_pos": 98}, {"type": "A", "before": null, "after": "i.e.,", "start_char_pos": 165, "end_char_pos": 165}, {"type": "R", "before": "for agricultural stakeholders", "after": "that can hedge crop yields against weather uncertainties", "start_char_pos": 187, "end_char_pos": 216}, {"type": "R", "before": "of these", "after": "smallholder farmers and agricultural", "start_char_pos": 233, "end_char_pos": 241}, {"type": "A", "before": null, "after": "the presence of basis risks (", "start_char_pos": 329, "end_char_pos": 329}, {"type": "R", "before": "basis risks", "after": ")", "start_char_pos": 362, "end_char_pos": 373}, {"type": "R", "before": "of WD. Using", "after": ". To eliminate product-design basis risks, a", "start_char_pos": 396, "end_char_pos": 408}, {"type": "R", "before": "for crop yield forecasting and feature importance, the major major weather variable (average temperature) that affects crop yields are empirically determined. This variable (average temperature) is used as the underlying index for WD to eliminate product-design basis risks. A model with", "after": "was used to determine the relationship between maize yield and weather variables. The results revealed that the most significant weather variable that affected the yield of maize was average temperature. A mean-reverting model with a", "start_char_pos": 445, "end_char_pos": 732}, {"type": "A", "before": null, "after": "and", "start_char_pos": 786, "end_char_pos": 786}, {"type": "R", "before": "depends on the average temperature and time for the contract period is proposed. Based on this model", "after": "depended on the local average temperature was then proposed. The model was extended to a multi-dimensional model for different but correlated locations. Based on these average temperature models", "start_char_pos": 809, "end_char_pos": 909}, {"type": "R", "before": "as buyer's", "after": ", as buyers", "start_char_pos": 1112, "end_char_pos": 1122}, {"type": "A", "before": null, "after": "farmers and", "start_char_pos": 1257, "end_char_pos": 1257}, {"type": "A", "before": null, "after": "extreme", "start_char_pos": 1328, "end_char_pos": 1328}], "sents_char_pos": [0, 100, 218, 603, 719, 889, 1052, 1229]}
+{"doc_id": "1906.00454", "revision_depth": "1", "before_revision": "Environmental stresses such as drought , and heat can cause substantial yield loss in corn hybrids . As such, corn hybrids which are tolerant to drought , and heat would produce more consistent yields compared to the hybrids which are not tolerant to these stresses. In the 2019 Syngenta Crop Challenge, Syngenta released several large datasets that recorded the yield performances of 2,452 maize hybrids planted in 1,560 locations between 2008 and 2017 and asked participants to classify the corn hybrids as either tolerant or susceptible to heat stress, drought stress, and stress due to the combination of heat and drought . As one of the winning teams, we designed a two-step approach to solve this problem in an unsupervised way since no dataset was provided that classified any set of hybrids as tolerant or susceptible to any stress. First, we designed a deep convolutional neural network (CNN) that took advantage of state-of-the-art modeling and solution techniques to extract stress metrics for each types of stress. Our CNN model was found to successfully distinguish between the low and high stress environments due to considering multiple factors such as plant /harvest dates, daily weather, and soil conditions. Then, we conducted a linear regression of the yield of hybrids against each stress metric, and classified the hybrids based on the slope the regression line, since the slope of the regression line showed how sensitive a hybrid was to a specific environmental stress. Our results suggested that only 14 \\% of hybrids were tolerant to at least one type of stress.", "after_revision": "Environmental stresses such as drought and heat can cause substantial yield loss in agriculture . As such, hybrid crops which are tolerant to drought and heat stress would produce more consistent yields compared to the hybrids which are not tolerant to these stresses. In the 2019 Syngenta Crop Challenge, Syngenta released several large datasets that recorded the yield performances of 2,452 corn hybrids planted in 1,560 locations between 2008 and 2017 and asked participants to classify the corn hybrids as either tolerant or susceptible to drought stress, heat stress, and combined drought and heat stress . As one of the winning teams, we designed a two-step approach to solve this problem in an unsupervised way since no data was provided that classified any set of hybrids as tolerant or susceptible to any type of stress. First, we designed a deep convolutional neural network (CNN) that took advantage of state-of-the-art modeling and solution techniques to extract stress metrics for each type of stress. Our CNN model was found to successfully distinguish between the low and high stress environments due to considering multiple factors such as planting /harvest dates, daily weather, and soil conditions. Then, we conducted a linear regression of the yield of hybrid against each stress metric, and classified the hybrid based on the slope of the regression line, since the slope of the regression line showed how sensitive a hybrid was to a specific environmental stress. Our results suggested that only 14 \\% of the corn hybrids were tolerant to at least one type of stress.", "edit_actions": [{"type": "D", "before": ",", "after": null, "start_char_pos": 39, "end_char_pos": 40}, {"type": "R", "before": "corn hybrids", "after": "agriculture", "start_char_pos": 86, "end_char_pos": 98}, {"type": "R", "before": "corn hybrids", "after": "hybrid crops", "start_char_pos": 110, "end_char_pos": 122}, {"type": "R", "before": ", and heat", "after": "and heat stress", "start_char_pos": 153, "end_char_pos": 163}, {"type": "R", "before": "maize", "after": "corn", "start_char_pos": 391, "end_char_pos": 396}, {"type": "R", "before": "heat stress, drought", "after": "drought stress, heat", "start_char_pos": 543, "end_char_pos": 563}, {"type": "R", "before": "stress due to the combination of heat and drought", "after": "combined drought and heat stress", "start_char_pos": 576, "end_char_pos": 625}, {"type": "R", "before": "dataset", "after": "data", "start_char_pos": 743, "end_char_pos": 750}, {"type": "A", "before": null, "after": "type of", "start_char_pos": 833, "end_char_pos": 833}, {"type": "R", "before": "types", "after": "type", "start_char_pos": 1011, "end_char_pos": 1016}, {"type": "R", "before": "plant", "after": "planting", "start_char_pos": 1169, "end_char_pos": 1174}, {"type": "R", "before": "hybrids", "after": "hybrid", "start_char_pos": 1282, "end_char_pos": 1289}, {"type": "R", "before": "hybrids", "after": "hybrid", "start_char_pos": 1337, "end_char_pos": 1344}, {"type": "A", "before": null, "after": "of", "start_char_pos": 1364, "end_char_pos": 1364}, {"type": "A", "before": null, "after": "the corn", "start_char_pos": 1536, "end_char_pos": 1536}], "sents_char_pos": [0, 100, 266, 627, 841, 1027, 1226, 1494]}
+{"doc_id": "1906.01981", "revision_depth": "2", "before_revision": "We propose a non-robust interpretation of the distributionally robust optimization (DRO) problem by relating the impact of uncertainties around the distribution on the impact of constraining the objective through tail probabilities. Our interpretation allows utility maximizers to figure out the size of the ambiguity set through parameters that are directly linked to the chance parameters . We first show that for general \\phi-divergences, a DRO problem is asymptotically equivalent to a class of mean-deviation problems , where the ambiguity radius controls investor's risk preference . Based on this non-robust reformulation, we then show that when a boundedness constraint is added to the investment strategy. The DRO problem can be cast as a chance-constrained optimization (CCO) problem without distributional uncertainties . Without the boundedness constraint, the CCO problem is shown to perform uniformly better than the DRO problem, irrespective of the radius of the ambiguity set, the choice of the divergence measure, or the tail heaviness of the center distribution. Besides the widely-used Kullback-Leibler (KL) divergence which requires the distribution of the objective function to be exponentially bounded, our results apply to divergence measures that accommodate well heavy tail distribution such as the student t-distribution and the lognormal distribution . Comprehensive testings on synthetic data and real data are provided .", "after_revision": "This paper provides a non-robust interpretation of the distributionally robust optimization (DRO) problem by relating the distributional uncertainties to the chance probabilities. Our analysis allows a decision-maker to interpret the size of the ambiguity set , which is often lack of business meaning, through the chance parameters constraining the objective function . We first show that , for general \\phi-divergences, a DRO problem is asymptotically equivalent to a class of mean-deviation problems . These mean-deviation problems are not subject to uncertain distributions, and the ambiguity radius in the original DRO problem now plays the role of controlling the risk preference of the decision-maker. We then demonstrate that a DRO problem can be cast as a chance-constrained optimization (CCO) problem when a boundedness constraint is added to the decision variables . Without the boundedness constraint, the CCO problem is shown to perform uniformly better than the DRO problem, irrespective of the radius of the ambiguity set, the choice of the divergence measure, or the tail heaviness of the center distribution. Thanks to our high-order expansion result, a notable feature of our analysis is that it applies to divergence measures that accommodate well heavy tail distributions such as the student t-distribution and the lognormal distribution , besides the widely-used Kullback-Leibler (KL) divergence, which requires the distribution of the objective function to be exponentially bounded. Using the portfolio selection problem as an example, our comprehensive testings on multivariate heavy-tail datasets, both synthetic and real-world, shows that this business-interpretation approach is indeed useful and insightful .", "edit_actions": [{"type": "R", "before": "We propose", "after": "This paper provides", "start_char_pos": 0, "end_char_pos": 10}, {"type": "R", "before": "impact of uncertainties around the distribution on the impact of constraining the objective through tail", "after": "distributional uncertainties to the chance", "start_char_pos": 113, "end_char_pos": 217}, {"type": "R", "before": "interpretation allows utility maximizers to figure out", "after": "analysis allows a decision-maker to interpret", "start_char_pos": 237, "end_char_pos": 291}, {"type": "R", "before": "through parameters that are directly linked to", "after": ", which is often lack of business meaning, through", "start_char_pos": 322, "end_char_pos": 368}, {"type": "A", "before": null, "after": "constraining the objective function", "start_char_pos": 391, "end_char_pos": 391}, {"type": "A", "before": null, "after": ",", "start_char_pos": 413, "end_char_pos": 413}, {"type": "R", "before": ", where", "after": ". These mean-deviation problems are not subject to uncertain distributions, and", "start_char_pos": 525, "end_char_pos": 532}, {"type": "R", "before": "controls investor's risk preference . Based on this non-robust reformulation, we then show that when a boundedness constraint is added to the investment strategy. The", "after": "in the original DRO problem now plays the role of controlling the risk preference of the decision-maker. We then demonstrate that a", "start_char_pos": 554, "end_char_pos": 720}, {"type": "R", "before": "without distributional uncertainties", "after": "when a boundedness constraint is added to the decision variables", "start_char_pos": 796, "end_char_pos": 832}, {"type": "R", "before": "Besides the widely-used Kullback-Leibler (KL) divergence which requires the distribution of the objective function to be exponentially bounded,", "after": "Thanks to", "start_char_pos": 1083, "end_char_pos": 1226}, {"type": "R", "before": "results apply", "after": "high-order expansion result, a notable feature of our analysis is that it applies", "start_char_pos": 1231, "end_char_pos": 1244}, {"type": "R", "before": "distribution", "after": "distributions", "start_char_pos": 1301, "end_char_pos": 1313}, {"type": "R", "before": ". Comprehensive testings on synthetic data and real data are provided", "after": ", besides the widely-used Kullback-Leibler (KL) divergence, which requires the distribution of the objective function to be exponentially bounded. Using the portfolio selection problem as an example, our comprehensive testings on multivariate heavy-tail datasets, both synthetic and real-world, shows that this business-interpretation approach is indeed useful and insightful", "start_char_pos": 1380, "end_char_pos": 1449}], "sents_char_pos": [0, 232, 393, 716, 834, 1082]}
+{"doc_id": "1906.02086", "revision_depth": "2", "before_revision": "Microbial electrolysis cells (MECs) are devices that employ electroactive bacteria to perform extracellular electron transfer, enabling hydrogen generation from biodegradable substrates. In our previous work, we developed and analyzed a differential-algebraic equation (DAE) model for MECs. The model consists of ordinary differential equations ( ODE) resembling chemostats or continuous stirred tank reactors (CSTRs), an ODE for an extracellular mediator involved in electron transfer , and an algebraic constraint for electric current and hydrogen production. Our goal is to determine the outcome of competition between methanogenic archaea and electroactive bacteria, because only the latter contribute to both electric current and correlated hydrogen production. We investigate asymptotic stability in two industrially relevant versions of the model. An important aspect of many chemostat models is the principle of competitive exclusion , which states that only the URLanisms which can grow at the lowest substrate concentration will survive \\to . We show that if methanogens can grow at the lowest substrate concentration, then the equilibrium corresponding to competitive exclusion by methanogens is globally stable. The analogous result for electroactive bacteria is not necessarily true. We show that local asymptotic stability of competitive exclusion by electroactive bacteria is not guaranteed, even in a simplified model. In this case, even if electroactive bacteria can grow at the lowest substrate concentration, a few additional conditions are required to guarantee local stability. We also provide numerical simulations supporting these arguments. Our results suggest operating conditions that are most conducive to success of electroactive bacteria and current or hydrogen production in MECs. This will help identify when methane production or electricity and hydrogen production are favored.", "after_revision": "Microbial electrolysis cells (MECs) employ electroactive bacteria to perform extracellular electron transfer, enabling hydrogen generation from biodegradable substrates. In previous work, we developed and analyzed a differential-algebraic equation (DAE) model for MECs. The model resembles a chemostat with ordinary differential equations ( ODEs) for concentrations of substrate, URLanisms, and an extracellular mediator involved in electron transfer . There is also an algebraic constraint for electric current and hydrogen production. Our goal is to determine the outcome of competition between methanogenic archaea and electroactive bacteria, because only the latter contribute to electric current and resulting hydrogen production. We investigate asymptotic stability in two industrially relevant versions of the model. An important aspect of chemostats models is the principle of competitive exclusion -- only microbes which grow at the lowest substrate concentration will survive as t\\to\\infty . We show that if methanogens grow at the lowest substrate concentration, then the equilibrium corresponding to competitive exclusion by methanogens is globally asymptotically stable. The analogous result for electroactive bacteria is not necessarily true. We show that local asymptotic stability of exclusion by electroactive bacteria is not guaranteed, even in a simplified version of the model. In this case, even if electroactive bacteria can grow at the lowest substrate concentration, a few additional conditions are required to guarantee local asymptotic stability. We also provide numerical simulations supporting these arguments. Our results suggest operating conditions that are most conducive to success of electroactive bacteria and the resulting current and hydrogen production in MECs. This will help identify when methane production or electricity and hydrogen production are favored.", "edit_actions": [{"type": "D", "before": "are devices that", "after": null, "start_char_pos": 36, "end_char_pos": 52}, {"type": "D", "before": "our", "after": null, "start_char_pos": 190, "end_char_pos": 193}, {"type": "R", "before": "consists of", "after": "resembles a chemostat with", "start_char_pos": 301, "end_char_pos": 312}, {"type": "R", "before": "ODE) resembling chemostats or continuous stirred tank reactors (CSTRs), an ODE for an", "after": "ODEs) for concentrations of substrate, URLanisms, and an", "start_char_pos": 347, "end_char_pos": 432}, {"type": "R", "before": ", and", "after": ". There is also", "start_char_pos": 486, "end_char_pos": 491}, {"type": "D", "before": "both", "after": null, "start_char_pos": 709, "end_char_pos": 713}, {"type": "R", "before": "correlated", "after": "resulting", "start_char_pos": 735, "end_char_pos": 745}, {"type": "R", "before": "many chemostat", "after": "chemostats", "start_char_pos": 878, "end_char_pos": 892}, {"type": "R", "before": ", which states that only the URLanisms which can", "after": "-- only microbes which", "start_char_pos": 942, "end_char_pos": 990}, {"type": "A", "before": null, "after": "as t", "start_char_pos": 1047, "end_char_pos": 1047}, {"type": "A", "before": null, "after": "\\infty", "start_char_pos": 1050, "end_char_pos": 1050}, {"type": "D", "before": "can", "after": null, "start_char_pos": 1081, "end_char_pos": 1084}, {"type": "A", "before": null, "after": "asymptotically", "start_char_pos": 1216, "end_char_pos": 1216}, {"type": "D", "before": "competitive", "after": null, "start_char_pos": 1341, "end_char_pos": 1352}, {"type": "A", "before": null, "after": "version of the", "start_char_pos": 1429, "end_char_pos": 1429}, {"type": "A", "before": null, "after": "asymptotic", "start_char_pos": 1590, "end_char_pos": 1590}, {"type": "R", "before": "current or", "after": "the resulting current and", "start_char_pos": 1774, "end_char_pos": 1784}], "sents_char_pos": [0, 186, 290, 561, 766, 854, 1052, 1224, 1297, 1436, 1601, 1667, 1813]}
+{"doc_id": "1906.05065", "revision_depth": "1", "before_revision": "We present an artificial neural network ( ANN ) approach to value financial derivatives . Atypically to standard ANN applications, practitioners equally use option pricing models to validate market prices and to infer unobserved prices. Importantly, models need to generate realistic arbitrage-free prices, meaning that no option portfolio can lead to risk-free profits. The absence of arbitrage opportunities is guaranteed by penalizing the loss using soft constraints on an extended grid of input values. ANNs can be pre-trained by first calibrating a standard option pricing model, and then training an ANN to a larger synthetic dataset generated from the calibrated model. The parameters transfer as well as the non-arbitrage constraints appear to be particularly useful when only sparse or erroneous data are available. We also explore how deeper ANNs improve over shallower ones, as well as other properties of the network architecture. We benchmark our method against standard option pricing models, such as Heston with and without jumps. We validate our method both on training sets, and testing sets, namely, highlighting both their capacity to reproduce observed prices and predict new ones.", "after_revision": "We present a neural network ( NN ) approach to fit and predict implied volatility surfaces (IVSs) . Atypically to standard NN applications, financial industry practitioners use such models equally to replicate market prices and to value other financial instruments. In other words, low training losses are as important as generalization capabilities. Importantly, IVS models need to generate realistic arbitrage-free option prices, meaning that no portfolio can lead to risk-free profits. We propose an approach guaranteeing the absence of arbitrage opportunities by penalizing the loss using soft constraints . Furthermore, our method can be combined with standard IVS models in quantitative finance, thus providing a NN-based correction when such models fail at replicating observed market prices. This lets practitioners use our approach as a plug-in on top of classical methods. Empirical results show that this approach is particularly useful when only sparse or erroneous data are available. We also quantify the uncertainty of the model predictions in regions with few or no observations. We further explore how deeper NNs improve over shallower ones, as well as other properties of the network architecture. We benchmark our method against standard IVS models. By evaluating our method on both training sets, and testing sets, namely, we highlight both their capacity to reproduce observed prices and predict new ones.", "edit_actions": [{"type": "R", "before": "an artificial", "after": "a", "start_char_pos": 11, "end_char_pos": 24}, {"type": "R", "before": "ANN", "after": "NN", "start_char_pos": 42, "end_char_pos": 45}, {"type": "R", "before": "value financial derivatives", "after": "fit and predict implied volatility surfaces (IVSs)", "start_char_pos": 60, "end_char_pos": 87}, {"type": "R", "before": "ANN applications, practitioners equally use option pricing models to validate", "after": "NN applications, financial industry practitioners use such models equally to replicate", "start_char_pos": 113, "end_char_pos": 190}, {"type": "R", "before": "infer unobserved prices. Importantly,", "after": "value other financial instruments. In other words, low training losses are as important as generalization capabilities. Importantly, IVS", "start_char_pos": 212, "end_char_pos": 249}, {"type": "A", "before": null, "after": "option", "start_char_pos": 299, "end_char_pos": 299}, {"type": "D", "before": "option", "after": null, "start_char_pos": 324, "end_char_pos": 330}, {"type": "R", "before": "The", "after": "We propose an approach guaranteeing the", "start_char_pos": 372, "end_char_pos": 375}, {"type": "D", "before": "is guaranteed", "after": null, "start_char_pos": 411, "end_char_pos": 424}, {"type": "R", "before": "on an extended grid of input values. ANNs can be pre-trained by first calibrating a standard option pricing model, and then training an ANN to a larger synthetic dataset generated from the calibrated model. The parameters transfer as well as the non-arbitrage constraints appear to be", "after": ". Furthermore, our method can be combined with standard IVS models in quantitative finance, thus providing a NN-based correction when such models fail at replicating observed market prices. This lets practitioners use our approach as a plug-in on top of classical methods. Empirical results show that this approach is", "start_char_pos": 471, "end_char_pos": 755}, {"type": "A", "before": null, "after": "quantify the uncertainty of the model predictions in regions with few or no observations. We further", "start_char_pos": 834, "end_char_pos": 834}, {"type": "R", "before": "ANNs", "after": "NNs", "start_char_pos": 854, "end_char_pos": 858}, {"type": "R", "before": "option pricing models, such as Heston with and without jumps. We validate our method both on", "after": "IVS models. By evaluating our method on both", "start_char_pos": 986, "end_char_pos": 1078}, {"type": "R", "before": "highlighting", "after": "we highlight", "start_char_pos": 1120, "end_char_pos": 1132}], "sents_char_pos": [0, 89, 236, 371, 507, 677, 825, 944, 1047]}
+{"doc_id": "1906.06424", "revision_depth": "1", "before_revision": "Simulation models of facial expressions suggest that posterior visual areas and brain areas underpinning sensorimotor simulations might interact to improve facial expression processing. According to these models, facial mimicry may contribute to the visual perceptual processing of facial expressions by influencing early stages of face processing, thus playing a crucial role in understanding the observed emotion . The aim of the present study was to assess whether and how early sensorimotor simulation influences face structural encoding/ processing. A secondary aim was to investigate whether there is a relationship between alexithymic traits and sensorimotor simulation as a mechanism for fine facial expression discrimination. In order to examine the time-course of face processing, we monitored P1 and N170 components of the event-related potentials (ERP) in participants performing a fine discrimination task of facial expressions . An animal discrimination task was implemented as a control condition. In half of the experiment, participants could freely use their facial mimicry whereas , in the other half, they had their facial mimicry blocked by a gel. Our results revealed that the P1 ERP component was not modulated by the mimicry manipulation while the N170 amplitude was larger in the blocked mimicry condition when compared to the free mimicry condition selectively for the face stimuli. Interestingly, this modulation interacted with the alexithymic traits, with a reduction of the N170 amplitude modulation as a function of the facial mimicry manipulationfor participants with the highest levels of alexithymic traits. These results demonstrate that sensorimotor simulation influences visual processing of facial expressions at early stages and that participants with higher alexithymic traits tend to underutilize the sensorimotor simulation system .", "after_revision": "Simulation models of facial expressions suggest that posterior visual areas and brain areas underpinning sensorimotor simulations might interact to improve facial expression processing. According to these models, facial mimicry may contribute to the visual processing of facial expressions by influencing early stages . The aim of the present study was to assess whether / how early sensorimotor simulation influences early stages of face processing. A secondary aim was to investigate the relationship between alexithymic traits and sensorimotor simulation . We monitored P1 and N170 components of the event-related potentials (ERP) in participants performing a fine discrimination task of facial expressions while implementing an animal discrimination task as control condition. In half of the experiment, participants could freely use their facial mimicry whereas in the other half, they had their facial mimicry blocked by a gel. Our results revealed that , on average, both P1 and N170 ERP components were not sensitive to mimicry manipulation. However, when taking into account alexithymic traits, a scenario corroborating sensorimotor simulation models emerged, with two dissociable temporal windows affected by mimicry manipulation as a function of alexithymia levels. Specifically, as a function of mimicry manipulation, individuals with lower alexithymic traits showed modulations of the P1 amplitude, while individuals with higher alexithymic traits showed modulations of the later N170). Furthermore, connectivity analysis at the scalp level suggested increased connectivity between sensorimotor and extrastriate visual regions in individuals with lower alexithymic traits compared to individuals with higher alexithymic traits. Overall, we interpreted these ERPs modulations as compensative visual processing under conditions of interference on the sensorimotor processing .", "edit_actions": [{"type": "D", "before": "perceptual", "after": null, "start_char_pos": 257, "end_char_pos": 267}, {"type": "D", "before": "of face processing, thus playing a crucial role in understanding the observed emotion", "after": null, "start_char_pos": 329, "end_char_pos": 414}, {"type": "R", "before": "and", "after": "/", "start_char_pos": 468, "end_char_pos": 471}, {"type": "R", "before": "face structural encoding/", "after": "early stages of face", "start_char_pos": 517, "end_char_pos": 542}, {"type": "R", "before": "whether there is a", "after": "the", "start_char_pos": 590, "end_char_pos": 608}, {"type": "R", "before": "as a mechanism for fine facial expression discrimination. In order to examine the time-course of face processing, we", "after": ". We", "start_char_pos": 677, "end_char_pos": 793}, {"type": "R", "before": ". An", "after": "while implementing an", "start_char_pos": 941, "end_char_pos": 945}, {"type": "R", "before": "was implemented as a", "after": "as", "start_char_pos": 973, "end_char_pos": 993}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1099, "end_char_pos": 1100}, {"type": "R", "before": "the", "after": ", on average, both", "start_char_pos": 1194, "end_char_pos": 1197}, {"type": "R", "before": "ERP component was not modulated by the mimicry manipulation while the N170 amplitude was larger in the blocked mimicry condition when compared to the free mimicry condition selectively for the face stimuli. Interestingly, this modulation interacted with the", "after": "and N170 ERP components were not sensitive to mimicry manipulation. However, when taking into account", "start_char_pos": 1201, "end_char_pos": 1458}, {"type": "R", "before": "with a reduction of the N170 amplitude modulation", "after": "a scenario corroborating sensorimotor simulation models emerged, with two dissociable temporal windows affected by mimicry manipulation as a function of alexithymia levels. Specifically,", "start_char_pos": 1479, "end_char_pos": 1528}, {"type": "R", "before": "the facial mimicry manipulationfor participants with the highest levels of alexithymic traits. These results demonstrate that sensorimotor simulation influences visual processing of facial expressions at early stages and that participants with higher alexithymic traits tend to underutilize the sensorimotor simulation system", "after": "mimicry manipulation, individuals with lower alexithymic traits showed modulations of the P1 amplitude, while individuals with higher alexithymic traits showed modulations of the later N170). Furthermore, connectivity analysis at the scalp level suggested increased connectivity between sensorimotor and extrastriate visual regions in individuals with lower alexithymic traits compared to individuals with higher alexithymic traits. Overall, we interpreted these ERPs modulations as compensative visual processing under conditions of interference on the sensorimotor processing", "start_char_pos": 1546, "end_char_pos": 1871}], "sents_char_pos": [0, 185, 416, 554, 734, 942, 1012, 1167, 1407, 1640]}
+{"doc_id": "1906.07669", "revision_depth": "1", "before_revision": " A new variable stiffness actuator (VSA) is presented, designedfor reproducing the full versatility of human motions from delicate tasks to precise positioning tasks through teleoperation, and highly dynamic tasks like hammering in particular. Existing VSAs show good performance in terms of either quick stiffness changing time, high output velocity, or variable damping, but not in the combination required for highly dynamic tasks. Goal of the presented design is to reach with one system a stiffness changing time of 50 ms, a peak output velocity of 20 rad/s and variable damping , based on the requirements of literature and our previous research. A prototype was built and its performance measured with three motors in parallel configuration: two responsible for changing the VSAs neutral position and effective stiffness through a lever arm mechanism, and the third acting as variable damper. Its effective stiffness can be changed continuously within 50 ms to 120 ms for small to large stiffness steps, its output velocity is up to 1100 rad/s and its oscillation behavior can be controlled precisely with the variable damper . Its effective stiffness range is 0.2 Nm/rad to 313 Nm/rad and its maximum continuous torque 9.4 Nm. This unique combination makes the new actuator particularly suitable for highly dynamic tasks , while being also very versatile, and makes it especially interesting for teleoperation and human-robot collaboration.", "after_revision": "This study is part of research aiming at increasing the range of dynamic tasks for teleoperated field robotics in order to allow operators to use the full range of human motions without being limited by the dynamics of the robotic manipulator. A new variable impedance actuator (VIA) was designed, capable of reproducing motions through teleoperation from precise positioning tasks to highly dynamic tasks . The design requirements based on previous human user studies were a stiffness changing time of 50 ms, a peak output velocity of 20 rad/s and variable damping allowing to suppress undesired oscillations. This is a unique combination of features that was not met by other VIAs. The new design has three motors in parallel configuration: two responsible for changing the VIA's neutral position and effective stiffness through a sliding pivot point lever mechanism, and the third acting as variable damper. A prototype was built and its performance measured with an effective stiffness changing time of 50 to 120 ms for small to large stiffness steps, nominal output velocity of 16 rad/s and a variable damper with a damping torque from 0 to 3 Nm . Its effective stiffness range is 0.2 to 313 Nm/rad . This concludes that the new actuator is particularly suitable for highly dynamic tasks . At the same time, the new actuator is also very versatile, making it especially interesting for teleoperation and human-robot collaboration.", "edit_actions": [{"type": "A", "before": null, "after": "This study is part of research aiming at increasing the range of dynamic tasks for teleoperated field robotics in order to allow operators to use the full range of human motions without being limited by the dynamics of the robotic manipulator.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "stiffness actuator (VSA) is presented, designedfor reproducing the full versatility of human motions from delicate tasks to", "after": "impedance actuator (VIA) was designed, capable of reproducing motions through teleoperation from", "start_char_pos": 16, "end_char_pos": 139}, {"type": "R", "before": "through teleoperation, and", "after": "to", "start_char_pos": 166, "end_char_pos": 192}, {"type": "R", "before": "like hammering in particular. Existing VSAs show good performance in terms of either quick stiffness changing time, high output velocity, or variable damping, but not in the combination required for highly dynamic tasks. Goal of the presented design is to reach with one system", "after": ". The design requirements based on previous human user studies were", "start_char_pos": 214, "end_char_pos": 491}, {"type": "R", "before": ", based on the requirements of literature and our previous research. A prototype was built and its performance measured with", "after": "allowing to suppress undesired oscillations. This is a unique combination of features that was not met by other VIAs. The new design has", "start_char_pos": 584, "end_char_pos": 708}, {"type": "R", "before": "VSAs", "after": "VIA's", "start_char_pos": 782, "end_char_pos": 786}, {"type": "R", "before": "lever arm", "after": "sliding pivot point lever", "start_char_pos": 838, "end_char_pos": 847}, {"type": "R", "before": "Its effective stiffness can be changed continuously within", "after": "A prototype was built and its performance measured with an effective stiffness changing time of", "start_char_pos": 900, "end_char_pos": 958}, {"type": "D", "before": "ms", "after": null, "start_char_pos": 962, "end_char_pos": 964}, {"type": "R", "before": "its output velocity is up to 1100", "after": "nominal output velocity of 16", "start_char_pos": 1011, "end_char_pos": 1044}, {"type": "R", "before": "its oscillation behavior can be controlled precisely with the variable damper", "after": "a variable damper with a damping torque from 0 to 3 Nm", "start_char_pos": 1055, "end_char_pos": 1132}, {"type": "D", "before": "Nm/rad", "after": null, "start_char_pos": 1172, "end_char_pos": 1178}, {"type": "R", "before": "and its maximum continuous torque 9.4 Nm. This unique combination makes", "after": ". This concludes that", "start_char_pos": 1193, "end_char_pos": 1264}, {"type": "A", "before": null, "after": "is", "start_char_pos": 1282, "end_char_pos": 1282}, {"type": "R", "before": ", while being", "after": ". At the same time, the new actuator is", "start_char_pos": 1330, "end_char_pos": 1343}, {"type": "R", "before": "and makes", "after": "making", "start_char_pos": 1365, "end_char_pos": 1374}], "sents_char_pos": [0, 243, 434, 652, 899, 1134]}
+{"doc_id": "1906.08256", "revision_depth": "1", "before_revision": "The contributions of this paper are two-fold. We define a new filtration called the cover filtration built from a single cover based on a generalized Jaccard distance. We provide stability results for the cover filtration and show how the construction is equivalent to the Cech filtration under certain settings . We then develop a language and theory for stable paths within this filtration , inspired by ideas of persistent homology . We demonstrate how the filtration and paths can be applied to a variety of applications in which defining a metric is not obvious but a cover is readily available. We demonstrate the usefulness of this construction by employing it in the context of recommendation systems and explainable machine learning. We demonstrate a new perspective for modeling recommendation system data sets that does not require manufacturing a bespoke metric. This extends work on graph-based recommendation systems , allowing a topological perspective . For an explicit example, we look at a movies data set and we find the stable paths identified in our framework represent a sequence of movies constituting a gentle transition and ordering from one genre to another. For explainable machine learning, we apply the Mapper for model induction, providing explanations in the form of paths between subpopulations or observations. Our framework provides an alternative way of building a filtration from a single mapper that is then used to explore stable paths . As a direct illustration, we build a mapper from a supervised machine learning model trained on the FashionMNIST data set . We show that the stable paths in the cover filtration provide improved explanations of relationships between subpopulations of images.", "after_revision": "Two central concepts from topological data analysis are persistence and the Mapper construction. Persistence employs a sequence of objects built on data called a filtration. A Mapper produces insightful summaries of data, and has found widespread applications in diverse areas. We define a new filtration called the cover filtration built from a single cover based on a generalized Steinhaus distance, which is a generalization of Jaccard distance. We prove a stability result: the cover filtrations of two covers are \\alpha/m interleaved, where \\alpha is a bound on bottleneck distance between covers and m is the size of smallest set in either cover. We also show our construction is equivalent to the Cech filtration under certain settings , and the Vietoris-Rips filtration completely determines the cover filtration in all cases . We then develop a theory for stable paths within this filtration . Unlike standard results on stability in topological persistence, our definition of path stability aligns exactly with the above result on stability of cover filtration . We demonstrate how our framework can be employed in a variety of applications where a metric is not obvious but a cover is readily available. First we present a new model for recommendation systems using cover filtration . For an explicit example, stable paths identified on a movies data set represent sequences of movies constituting gentle transitions from one genre to another. As a second application in explainable machine learning, we apply the Mapper for model induction, providing explanations in the form of paths between subpopulations . Stable paths in the Mapper from a supervised machine learning model trained on the FashionMNIST data set provide improved explanations of relationships between subpopulations of images.", "edit_actions": [{"type": "R", "before": "The contributions of this paper are two-fold.", "after": "Two central concepts from topological data analysis are persistence and the Mapper construction. Persistence employs a sequence of objects built on data called a filtration. A Mapper produces insightful summaries of data, and has found widespread applications in diverse areas.", "start_char_pos": 0, "end_char_pos": 45}, {"type": "A", "before": null, "after": "Steinhaus distance, which is a generalization of", "start_char_pos": 150, "end_char_pos": 150}, {"type": "R", "before": "provide stability results for the cover filtration and show how the", "after": "prove a stability result: the cover filtrations of two covers are \\alpha/m interleaved, where \\alpha is a bound on bottleneck distance between covers and m is the size of smallest set in either cover. We also show our", "start_char_pos": 172, "end_char_pos": 239}, {"type": "A", "before": null, "after": ", and the Vietoris-Rips filtration completely determines the cover filtration in all cases", "start_char_pos": 313, "end_char_pos": 313}, {"type": "D", "before": "language and", "after": null, "start_char_pos": 334, "end_char_pos": 346}, {"type": "R", "before": ", inspired by ideas of persistent homology", "after": ". Unlike standard results on stability in topological persistence, our definition of path stability aligns exactly with the above result on stability of cover filtration", "start_char_pos": 394, "end_char_pos": 436}, {"type": "R", "before": "the filtration and paths can be applied to", "after": "our framework can be employed in", "start_char_pos": 458, "end_char_pos": 500}, {"type": "R", "before": "in which defining", "after": "where", "start_char_pos": 527, "end_char_pos": 544}, {"type": "R", "before": "We demonstrate the usefulness of this construction by employing it in the context of recommendation systems and explainable machine learning. We demonstrate a new perspective for modeling recommendation system data sets that does not require manufacturing a bespoke metric. This extends work on graph-based recommendation systems , allowing a topological perspective", "after": "First we present a new model for recommendation systems using cover filtration", "start_char_pos": 603, "end_char_pos": 969}, {"type": "R", "before": "we look at", "after": "stable paths identified on", "start_char_pos": 997, "end_char_pos": 1007}, {"type": "R", "before": "and we find the stable paths identified in our framework represent a sequence", "after": "represent sequences", "start_char_pos": 1026, "end_char_pos": 1103}, {"type": "R", "before": "a gentle transition and ordering", "after": "gentle transitions", "start_char_pos": 1127, "end_char_pos": 1159}, {"type": "R", "before": "For", "after": "As a second application in", "start_char_pos": 1187, "end_char_pos": 1190}, {"type": "R", "before": "or observations. Our framework provides an alternative way of building a filtration from a single mapper that is then used to explore stable paths . As a direct illustration, we build a mapper", "after": ". Stable paths in the Mapper", "start_char_pos": 1329, "end_char_pos": 1521}, {"type": "D", "before": ". We show that the stable paths in the cover filtration", "after": null, "start_char_pos": 1600, "end_char_pos": 1655}], "sents_char_pos": [0, 45, 168, 315, 438, 602, 744, 876, 971, 1186, 1345, 1477, 1601]}
+{"doc_id": "1906.09528", "revision_depth": "1", "before_revision": "Motivational salience is a mechanism that determines URLanism's current level of attraction to or repulsion from a particular object, event, or outcome. Motivational salience is described by modulating the reward by an externally controlled parameter that remains constant within a single behavioral episode. The vector of perceived values of various outcomes determines motivation of URLanism toward different goals. Organism's behavior should be able to adapt to the varying-in-time motivation vector. Here, we propose a reinforcement learning framework that relies on neural networks to learn optimal behavior for different dynamically changing motivation vectors. First, we show that Q-learning neural networks can learn to navigate towards variable goals whose relative salience is determined by a multidimensional motivational vector . Second, we show that a Q-learning network with motivation can learn complex behaviors towards several goals distributed in an environment. Finally, we show that firing patterns displayed by neurons in the ventral pallidum , a basal ganglia structure playing a crucial role in motivated behaviors , are similar to the responses of neuronsin recurrent neural networks trained in similar conditions. Similarly to the pallidum neurons, artificial neural nets contain two different classes of neurons, tuned to reward and punishment. We conclude that reinforcement learning networks can efficiently learn optimal behavior in conditions when reward values are modulated by external motivational processes with arbitrary dynamics. Motivational salience can be viewed as a general-purpose model-free method identifying and capturing changes in subjective or objective values of multiple rewards. Networks with motivationmay also be parts of a larger hierarchical reinforcement learning system in the brain.", "after_revision": "How can animals behave effectively in conditions involving different motivational contexts? Here, we propose how reinforcement learning neural networks can learn optimal behavior for dynamically changing motivational salience vectors. First, we show that Q-learning neural networks with motivation can navigate in environment with dynamic rewards . Second, we show that such networks can learn complex behaviors simultaneously directed towards several goals distributed in an environment. Finally, we show that in Pavlovian conditioning task, the responses of the neurons in our model resemble the firing patterns of neurons in the ventral pallidum (VP) , a basal ganglia structure involved in motivated behaviors . We show that, similarly to real neurons, recurrent networks with motivation are composed of two oppositely-tuned classes of neurons, responding to positive and negative rewards. Our model generates predictions for the VP connectivity. We conclude that networks with motivation can rapidly adapt their behavior to varying conditions without changes in synaptic strength when expected reward is modulated by motivation. Such networks may also provide a mechanism for how hierarchical reinforcement learning is implemented in the brain.", "edit_actions": [{"type": "R", "before": "Motivational salience is a mechanism that determines URLanism's current level of attraction to or repulsion from a particular object, event, or outcome. Motivational salience is described by modulating the reward by an externally controlled parameter that remains constant within a single behavioral episode. The vector of perceived values of various outcomes determines motivation of URLanism toward different goals. Organism's behavior should be able to adapt to the varying-in-time motivation vector.", "after": "How can animals behave effectively in conditions involving different motivational contexts?", "start_char_pos": 0, "end_char_pos": 503}, {"type": "R", "before": "a reinforcement learning framework that relies on neural networks to", "after": "how reinforcement learning neural networks can", "start_char_pos": 521, "end_char_pos": 589}, {"type": "R", "before": "different dynamically changing motivation", "after": "dynamically changing motivational salience", "start_char_pos": 617, "end_char_pos": 658}, {"type": "R", "before": "can learn to navigate towards variable goals whose relative salience is determined by a multidimensional motivational vector", "after": "with motivation can navigate in environment with dynamic rewards", "start_char_pos": 715, "end_char_pos": 839}, {"type": "R", "before": "a Q-learning network with motivation", "after": "such networks", "start_char_pos": 863, "end_char_pos": 899}, {"type": "A", "before": null, "after": "simultaneously directed", "start_char_pos": 928, "end_char_pos": 928}, {"type": "R", "before": "firing patterns displayed by", "after": "in Pavlovian conditioning task, the responses of the neurons in our model resemble the firing patterns of", "start_char_pos": 1004, "end_char_pos": 1032}, {"type": "A", "before": null, "after": "(VP)", "start_char_pos": 1065, "end_char_pos": 1065}, {"type": "R", "before": "playing a crucial role", "after": "involved", "start_char_pos": 1094, "end_char_pos": 1116}, {"type": "R", "before": ", are similar to the responses of neuronsin recurrent neural networks trained in similar conditions. Similarly to the pallidum neurons, artificial neural nets contain two different", "after": ". We show that, similarly to real neurons, recurrent networks with motivation are composed of two oppositely-tuned", "start_char_pos": 1140, "end_char_pos": 1320}, {"type": "R", "before": "tuned to reward and punishment.", "after": "responding to positive and negative rewards. Our model generates predictions for the VP connectivity.", "start_char_pos": 1341, "end_char_pos": 1372}, {"type": "R", "before": "reinforcement learning networks can efficiently learn optimal behavior in conditions when reward values are modulated by external motivational processes with arbitrary dynamics. Motivational salience can be viewed as a general-purpose model-free method identifying and capturing changes in subjective or objective values of multiple rewards. Networks with motivationmay also be parts of a larger", "after": "networks with motivation can rapidly adapt their behavior to varying conditions without changes in synaptic strength when expected reward is modulated by motivation. Such networks may also provide a mechanism for how", "start_char_pos": 1390, "end_char_pos": 1785}, {"type": "R", "before": "system", "after": "is implemented", "start_char_pos": 1822, "end_char_pos": 1828}], "sents_char_pos": [0, 152, 308, 417, 503, 667, 841, 981, 1240, 1372, 1567, 1731]}
+{"doc_id": "1906.10121", "revision_depth": "1", "before_revision": "The prediction of stock prices is an important task in economics, investment and financial decision-making. It hasfor several decades, spurred the interest of many researchers to design stock price predictive models . In this paper , the URLanisms search algorithm, a new metaheuristic algorithm is employed as an efficient method for training feedforward neural networks (FFNN). The training process is used to build a better stock price predictive model. The Straits Times Index, Nikkei 225, NASDAQ Composite, S P 500, and Dow Jones Industrial Average indices were utilized as time series data sets for training and testing proposed predic-tive model. Three evaluation methods namely, Root Mean Squared Error, Mean Absolute Percentage Error and Mean Absolution Deviation are used to compare the results of the implemented model . The computational results obtained revealed that the hybrid Symbiotic Organisms Search Algorithm exhibited outstanding predictive performance when compared to the hybrid Particle Swarm Optimization, Genetic Algorithm, and ARIMA based models. The new model is a promising predictive technique for solving high dimensional nonlinear time series data that are difficult to capture by traditional models.", "after_revision": "The prediction of stock prices is an important task in economics, investment and making financial decisions. This has, for decades, spurred the interest of many researchers to make focused contributions to the design of accurate stock price predictive models ; of which some have been utilized to predict the next day opening and closing prices of the stock indices. This paper proposes the design and implementation of a hybrid URLanisms search trained feedforward neural network model for effective and accurate stock price prediction. The URLanisms search algorithm is used as an efficient optimization technique to train the feedforward neural networks , while the resulting training process is used to build a better stock price prediction model. Furthermore, the study also presents a comparative performance evaluation of three different stock price forecasting models; namely, the particle swarm optimization trained feedforward neural network model, the genetic algorithm trained feedforward neural network model and the well-known ARIMA model. The system developed in support of this study utilizes sixteen stock indices as time series datasets for training and testing purpose. Three statistical evaluation measures are used to compare the results of the implemented models, namely the root mean squared error, the mean absolute percentage error and the mean absolution deviation . The computational results obtained reveal that the URLanisms search trained feedforward neural network model exhibits outstanding predictive performance compared to the other models. However, the performance study shows that the three metaheuristics trained feedforward neural network models have promising predictive competence for solving problems of high dimensional nonlinear time series data , which are difficult to capture by traditional models.", "edit_actions": [{"type": "R", "before": "financial decision-making. It hasfor several", "after": "making financial decisions. This has, for", "start_char_pos": 81, "end_char_pos": 125}, {"type": "R", "before": "design", "after": "make focused contributions to the design of accurate", "start_char_pos": 179, "end_char_pos": 185}, {"type": "R", "before": ". In this paper , the URLanisms search algorithm, a new metaheuristic algorithm is employed", "after": "; of which some have been utilized to predict the next day opening and closing prices of the stock indices. This paper proposes the design and implementation of a hybrid URLanisms search trained feedforward neural network model for effective and accurate stock price prediction. The URLanisms search algorithm is used", "start_char_pos": 216, "end_char_pos": 307}, {"type": "R", "before": "method for training", "after": "optimization technique to train the", "start_char_pos": 324, "end_char_pos": 343}, {"type": "R", "before": "(FFNN). The", "after": ", while the resulting", "start_char_pos": 372, "end_char_pos": 383}, {"type": "D", "before": "predictive model. The Straits Times Index, Nikkei 225, NASDAQ Composite, S", "after": null, "start_char_pos": 439, "end_char_pos": 513}, {"type": "R", "before": "P 500, and Dow Jones Industrial Average indices were utilized", "after": "prediction model. Furthermore, the study also presents a comparative performance evaluation of three different stock price forecasting models; namely, the particle swarm optimization trained feedforward neural network model, the genetic algorithm trained feedforward neural network model and the well-known ARIMA model. The system developed in support of this study utilizes sixteen stock indices", "start_char_pos": 514, "end_char_pos": 575}, {"type": "R", "before": "data sets", "after": "datasets", "start_char_pos": 591, "end_char_pos": 600}, {"type": "R", "before": "proposed predic-tive model. Three evaluation methods namely, Root Mean Squared Error, Mean Absolute Percentage Error and Mean Absolution Deviation", "after": "purpose. Three statistical evaluation measures", "start_char_pos": 626, "end_char_pos": 772}, {"type": "R", "before": "model", "after": "models, namely the root mean squared error, the mean absolute percentage error and the mean absolution deviation", "start_char_pos": 824, "end_char_pos": 829}, {"type": "R", "before": "revealed that the hybrid Symbiotic Organisms Search Algorithm exhibited", "after": "reveal that the URLanisms search trained feedforward neural network model exhibits", "start_char_pos": 867, "end_char_pos": 938}, {"type": "D", "before": "when", "after": null, "start_char_pos": 974, "end_char_pos": 978}, {"type": "R", "before": "hybrid Particle Swarm Optimization, Genetic Algorithm, and ARIMA based models. The new model is a promising predictive technique for solving", "after": "other models. However, the performance study shows that the three metaheuristics trained feedforward neural network models have promising predictive competence for solving problems of", "start_char_pos": 995, "end_char_pos": 1135}, {"type": "R", "before": "that", "after": ", which", "start_char_pos": 1180, "end_char_pos": 1184}], "sents_char_pos": [0, 107, 217, 379, 456, 653, 831, 1073]}
+{"doc_id": "1906.10893", "revision_depth": "1", "before_revision": "Internet-of-Things (IoT) companies strive to get feedback from users to improve their products and services . However, traditional surveys cannot reflect the actual conditions of customers' due to the limited questions. Besides, survey results are affected by various subjective factors. In contrast, the recorded usages of IoT devices reflect customers' behaviours more comprehensively and accurately. We design an intelligent system to help IoT device manufacturers to take advantage of customers' data and build a machine learning model to predict customers' requirements and possible consumption behaviours with federated learning (FL) technology. The FL consists of two stages: in the first stage, customers train the initial model using the phone and the edge computing server collaboratively. The mobile edge computing server's high computation power can assist customers' training locally. Customers first collect data from various IoT devices using phones, and then download and train the initial model with their data. During the training, customers first extract features using their mobiles, and then add the Laplacian noise to the extracted features based on differential privacy, a formal and popular notion to quantify privacy. After achieving the local model , customers sign on their models respectively and send them to the blockchain. We use the blockchain to replace the centralized aggregator which belongs to the third party in FL. In the second stage, miners calculate the averaged model using the collected models sent from customers. By the end of the crowdsourcing job , one of the miners, who is selected as the temporary leader, uploads the model to the blockchain. Besides, to attract more customers to participate in the crowdsourcing FL , we design an incentive mechanism , which awards participants with coins that can be used to purchase other services provided by the company .", "after_revision": "Home appliance manufacturers strive to obtain feedback from users to improve their products and services to build a smart home system. To help manufacturers develop a smart home system, we design a federated learning (FL) system leveraging the reputation mechanism to assist home appliance manufacturers to train a machine learning model based on customers' data. Then, manufacturers can predict customers' requirements and consumption behaviors in the future. The working flow of the system includes two stages: in the first stage, customers train the initial model provided by the manufacturer using both the mobile phone and the mobile edge computing (MEC) server. Customers collect data from various home appliances using phones, and then they download and train the initial model with their local data. After deriving local models , customers sign on their models and send them to the blockchain. In case customers or manufacturers are malicious, we use the blockchain to replace the centralized aggregator in the traditional FL system. Since records on the blockchain are untampered, malicious customers or manufacturers' activities are traceable. In the second stage, manufacturers select customers URLanizations as miners for calculating the averaged model using received models from customers. By the end of the crowdsourcing task , one of the miners, who is selected as the temporary leader, uploads the model to the blockchain. To protect customers' privacy and improve the test accuracy, we enforce differential privacy on the extracted features and propose a new normalization technique. We experimentally demonstrate that our normalization technique outperforms batch normalization when features are under differential privacy protection. In addition, to attract more customers to participate in the crowdsourcing FL task , we design an incentive mechanism to award participants .", "edit_actions": [{"type": "R", "before": "Internet-of-Things (IoT) companies strive to get", "after": "Home appliance manufacturers strive to obtain", "start_char_pos": 0, "end_char_pos": 48}, {"type": "D", "before": ". However, traditional surveys cannot reflect the actual conditions of customers' due to the limited questions. Besides, survey results are affected by various subjective factors. In contrast, the recorded usages of IoT devices reflect customers' behaviours more comprehensively and accurately. We design an intelligent system", "after": null, "start_char_pos": 108, "end_char_pos": 434}, {"type": "R", "before": "help IoT device manufacturers to take advantage of customers' data and build", "after": "build a smart home system. To help manufacturers develop a smart home system, we design a federated learning (FL) system leveraging the reputation mechanism to assist home appliance manufacturers to train", "start_char_pos": 438, "end_char_pos": 514}, {"type": "R", "before": "to", "after": "based on customers' data. Then, manufacturers can", "start_char_pos": 540, "end_char_pos": 542}, {"type": "R", "before": "possible consumption behaviours with federated learning (FL) technology. The FL consists of", "after": "consumption behaviors in the future. The working flow of the system includes", "start_char_pos": 579, "end_char_pos": 670}, {"type": "R", "before": "using the", "after": "provided by the manufacturer using both the mobile", "start_char_pos": 737, "end_char_pos": 746}, {"type": "D", "before": "edge computing server collaboratively. The", "after": null, "start_char_pos": 761, "end_char_pos": 803}, {"type": "R", "before": "server's high computation power can assist customers' training locally. Customers first", "after": "(MEC) server. Customers", "start_char_pos": 826, "end_char_pos": 913}, {"type": "R", "before": "IoT devices", "after": "home appliances", "start_char_pos": 940, "end_char_pos": 951}, {"type": "A", "before": null, "after": "they", "start_char_pos": 975, "end_char_pos": 975}, {"type": "R", "before": "data. During the training, customers first extract features using their mobiles, and then add the Laplacian noise to the extracted features based on differential privacy, a formal and popular notion to quantify privacy. After achieving the local model", "after": "local data. After deriving local models", "start_char_pos": 1024, "end_char_pos": 1275}, {"type": "D", "before": "respectively", "after": null, "start_char_pos": 1309, "end_char_pos": 1321}, {"type": "R", "before": "We", "after": "In case customers or manufacturers are malicious, we", "start_char_pos": 1355, "end_char_pos": 1357}, {"type": "R", "before": "which belongs to the third party in FL.", "after": "in the traditional FL system. Since records on the blockchain are untampered, malicious customers or manufacturers' activities are traceable.", "start_char_pos": 1415, "end_char_pos": 1454}, {"type": "R", "before": "miners calculate", "after": "manufacturers select customers URLanizations as miners for calculating", "start_char_pos": 1476, "end_char_pos": 1492}, {"type": "R", "before": "the collected models sent", "after": "received models", "start_char_pos": 1518, "end_char_pos": 1543}, {"type": "R", "before": "job", "after": "task", "start_char_pos": 1592, "end_char_pos": 1595}, {"type": "R", "before": "Besides,", "after": "To protect customers' privacy and improve the test accuracy, we enforce differential privacy on the extracted features and propose a new normalization technique. We experimentally demonstrate that our normalization technique outperforms batch normalization when features are under differential privacy protection. In addition,", "start_char_pos": 1695, "end_char_pos": 1703}, {"type": "A", "before": null, "after": "task", "start_char_pos": 1769, "end_char_pos": 1769}, {"type": "R", "before": ", which awards participants with coins that can be used to purchase other services provided by the company", "after": "to award participants", "start_char_pos": 1805, "end_char_pos": 1911}], "sents_char_pos": [0, 109, 219, 287, 402, 651, 799, 897, 1029, 1243, 1354, 1454, 1559, 1694]}
+{"doc_id": "1906.11573", "revision_depth": "1", "before_revision": "The contribution of structural connectivity to dynamic and often highly variable brain states remains poorly understood. We present a mathematical and computational study suited to assess the structure--function issue . We treat a system of Jansen--Rit neural-mass nodes with heterogeneous structural connections estimated from diffusion MRI data provided by the Human Connectome Project. Direct simulations are used to determine the similarity of functional (inferred from correlated activity between brain areas ) and structural connectivity matrices as a function of the parameters controlling dynamics of a single node , highlighting a non-trivial structure--function relationship in regimes that support limit cycle oscillations. To determine their relationship, we firstly determine the network instabilities that give rise to oscillations, and the set of false bifurcationsthat occur beyond this onset. In particular, we highlight that functional connectivity (FC) is inherited most robustly from structure when node dynamics are poised near a Hopf bifurcation, whilst near false bifurcations, structure only weakly influences function . Secondly, we develop a weakly coupled oscillator description to analyse oscillatory phase-locked states and, furthermore, show how the modular structure of the FC matrix can be predicted using a linear stability analysis. This study thereby emphasises that local dynamics can have a substantial role in shaping large-scale functional brain states.", "after_revision": "The contribution of structural connectivity to functional brain states remains poorly understood. We present a mathematical and computational study suited to assess the structure--function issue , treating a system of Jansen--Rit neural-mass nodes with heterogeneous structural connections estimated from diffusion MRI data provided by the Human Connectome Project. Via direct simulations we determine the similarity of functional (inferred from correlated activity between nodes ) and structural connectivity matrices under variation of the parameters controlling single-node dynamics , highlighting a non-trivial structure--function relationship in regimes that support limit cycle oscillations. To determine their relationship, we firstly calculate network instabilities giving rise to oscillations, and the so-called `false bifurcations' (for which a significant qualitative change in the orbit is observed, without a change of stability) occurring beyond this onset. We highlight that functional connectivity (FC) is inherited robustly from structure when node dynamics are poised near a Hopf bifurcation, whilst near false bifurcations, structure only weakly influences FC . Secondly, we develop a weakly-coupled oscillator description to analyse oscillatory phase-locked states and, furthermore, show how the modular structure of FC matrices can be predicted via linear stability analysis. This study thereby emphasises the substantial role that local dynamics can have in shaping large-scale functional brain states.", "edit_actions": [{"type": "R", "before": "dynamic and often highly variable", "after": "functional", "start_char_pos": 47, "end_char_pos": 80}, {"type": "R", "before": ". We treat", "after": ", treating", "start_char_pos": 218, "end_char_pos": 228}, {"type": "R", "before": "Direct simulations are used to", "after": "Via direct simulations we", "start_char_pos": 389, "end_char_pos": 419}, {"type": "R", "before": "brain areas", "after": "nodes", "start_char_pos": 502, "end_char_pos": 513}, {"type": "R", "before": "as a function", "after": "under variation", "start_char_pos": 553, "end_char_pos": 566}, {"type": "R", "before": "dynamics of a single node", "after": "single-node dynamics", "start_char_pos": 597, "end_char_pos": 622}, {"type": "R", "before": "determine the network instabilities that give", "after": "calculate network instabilities giving", "start_char_pos": 779, "end_char_pos": 824}, {"type": "R", "before": "set of false bifurcationsthat occur", "after": "so-called `false bifurcations' (for which a significant qualitative change in the orbit is observed, without a change of stability) occurring", "start_char_pos": 855, "end_char_pos": 890}, {"type": "R", "before": "In particular, we", "after": "We", "start_char_pos": 910, "end_char_pos": 927}, {"type": "D", "before": "most", "after": null, "start_char_pos": 985, "end_char_pos": 989}, {"type": "R", "before": "function", "after": "FC", "start_char_pos": 1134, "end_char_pos": 1142}, {"type": "R", "before": "weakly coupled", "after": "weakly-coupled", "start_char_pos": 1168, "end_char_pos": 1182}, {"type": "R", "before": "the FC matrix", "after": "FC matrices", "start_char_pos": 1301, "end_char_pos": 1314}, {"type": "R", "before": "using a", "after": "via", "start_char_pos": 1332, "end_char_pos": 1339}, {"type": "A", "before": null, "after": "the substantial role", "start_char_pos": 1397, "end_char_pos": 1397}, {"type": "D", "before": "a substantial role", "after": null, "start_char_pos": 1427, "end_char_pos": 1445}], "sents_char_pos": [0, 120, 219, 388, 734, 909, 1144, 1366]}
+{"doc_id": "1907.07835", "revision_depth": "2", "before_revision": "EEG signals measure the neuronal activities on different brain regions via electrodes. Many existing studies on EEG-based emotion recognition do not exploit the topological structure of EEG signals . In this paper, we propose a regularized graph neural network (RGNN) for EEG-based emotion recognition , which is biologically supported and captures both local and global inter-channel relations . Specifically, we model the inter-channel relations in EEG signals via an adjacency matrix in our graph neural network where the connection and sparseness of the adjacency matrix are supported by the neurosicience theories of human URLanization. In addition, we propose two regularizers, namely node-wise domain adversarial training (NodeDAT) and emotion-aware distribution learning (EmotionDL), to improve the robustness of our model against cross-subject EEG variations and noisy labels, respectively. To thoroughly evaluate our model, we conduct extensive experiments in both subject-dependent and subject-independent classification settings on two public datasets : SEED and SEED-IV . Our model obtains better performance than competitive baselines such as SVM, DBN, DGCNN, BiDANN, and the state-of-the-art BiHDM in most experimental settings. Our model analysis demonstrates that the proposed biologically supported adjacency matrix and two regularizers contribute consistent and significant gain to the performance . Investigations on the neuronal activities reveal that pre-frontal, parietal and occipital regions may be the most informative regions for emotion recognition, which is consistent with relevant prior studies. In addition, experimental results suggest that global inter-channel relations between the left and right hemispheres are important for emotion recognition and local inter-channel relations between (FP1, AF3), (F6, F8) and (FP2, AF4) may also provide useful information .", "after_revision": "Electroencephalography (EEG) measures the neuronal activities in different brain regions via electrodes. Many existing studies on EEG-based emotion recognition do not fully exploit the topology of EEG channels . In this paper, we propose a regularized graph neural network (RGNN) for EEG-based emotion recognition . RGNN considers the biological topology among different brain regions to capture both local and global relations among different EEG channels . Specifically, we model the inter-channel relations in EEG signals via an adjacency matrix in a graph neural network where the connection and sparseness of the adjacency matrix are inspired by neuroscience theories of human URLanization. In addition, we propose two regularizers, namely node-wise domain adversarial training (NodeDAT) and emotion-aware distribution learning (EmotionDL), to better handle cross-subject EEG variations and noisy labels, respectively. Extensive experiments on two public datasets , SEED and SEED-IV , demonstrate the superior performance of our model than state-of-the-art models in most experimental settings. Moreover, ablation studies show that the proposed adjacency matrix and two regularizers contribute consistent and significant gain to the performance of our RGNN model. Finally, investigations on the neuronal activities reveal important brain regions and inter-channel relations for EEG-based emotion recognition .", "edit_actions": [{"type": "R", "before": "EEG signals measure", "after": "Electroencephalography (EEG) measures", "start_char_pos": 0, "end_char_pos": 19}, {"type": "R", "before": "on", "after": "in", "start_char_pos": 44, "end_char_pos": 46}, {"type": "R", "before": "exploit the topological structure of EEG signals", "after": "fully exploit the topology of EEG channels", "start_char_pos": 149, "end_char_pos": 197}, {"type": "R", "before": ", which is biologically supported and captures", "after": ". RGNN considers the biological topology among different brain regions to capture", "start_char_pos": 302, "end_char_pos": 348}, {"type": "R", "before": "inter-channel relations", "after": "relations among different EEG channels", "start_char_pos": 371, "end_char_pos": 394}, {"type": "R", "before": "our", "after": "a", "start_char_pos": 490, "end_char_pos": 493}, {"type": "R", "before": "supported by the neurosicience", "after": "inspired by neuroscience", "start_char_pos": 579, "end_char_pos": 609}, {"type": "R", "before": "improve the robustness of our model against", "after": "better handle", "start_char_pos": 795, "end_char_pos": 838}, {"type": "R", "before": "To thoroughly evaluate our model, we conduct extensive experiments in both subject-dependent and subject-independent classification settings", "after": "Extensive experiments", "start_char_pos": 900, "end_char_pos": 1040}, {"type": "R", "before": ":", "after": ",", "start_char_pos": 1064, "end_char_pos": 1065}, {"type": "R", "before": ". Our model obtains better performance than competitive baselines such as SVM, DBN, DGCNN, BiDANN, and the", "after": ", demonstrate the superior performance of our model than", "start_char_pos": 1083, "end_char_pos": 1189}, {"type": "R", "before": "BiHDM", "after": "models", "start_char_pos": 1207, "end_char_pos": 1212}, {"type": "R", "before": "Our model analysis demonstrates", "after": "Moreover, ablation studies show", "start_char_pos": 1244, "end_char_pos": 1275}, {"type": "D", "before": "biologically supported", "after": null, "start_char_pos": 1294, "end_char_pos": 1316}, {"type": "R", "before": ". Investigations", "after": "of our RGNN model. Finally, investigations", "start_char_pos": 1417, "end_char_pos": 1433}, {"type": "R", "before": "that pre-frontal, parietal and occipital regions may be the most informative regions for emotion recognition, which is consistent with relevant prior studies. In addition, experimental results suggest that global", "after": "important brain regions and", "start_char_pos": 1468, "end_char_pos": 1680}, {"type": "R", "before": "between the left and right hemispheres are important for emotion recognition and local inter-channel relations between (FP1, AF3), (F6, F8) and (FP2, AF4) may also provide useful information", "after": "for EEG-based emotion recognition", "start_char_pos": 1705, "end_char_pos": 1895}], "sents_char_pos": [0, 86, 199, 641, 899, 1243, 1418, 1626]}
+{"doc_id": "1907.08047", "revision_depth": "1", "before_revision": "Developed countries are increasingly relying on gas storage to ensure security of supply. In this article we consider an approach to gas storage valuation in which the information about the time at which the holder of a gas storage contract should choose to inject or withdraw gas is modelled using a Brownian bridge that starts at zero and is conditioned to equal a constant x in the time of injection and a constant y in the time of withdrawal. This enables to catch some empirical facts on the behavior of gas storage markets: when the Brownian bridge process is away from the boundaries x and y, the holder of the gas storage contract can be relatively sure that the best decision is to do nothing. However, when the bridge information process absorbs y, the holder of the contract should take the decision of withdrawing gas on the other hand, they should take the decision to inject gas when the process absorbs x . In this sense the Brownian bridge information process leaks information concerning the time at which the holder of a storage contract can choose to inject gas, do nothing, or withdraw gas. The issue of storage valuation is not limited to gas markets, storages also plays a significant, balancing role in, for example, oil markets, soft commodity markets and even electricity. The principle of our approach is applicable to those markets as well. In this paper we define and study the Brownian bridge with random length and pinning point. Its main objectives is to see if the properties of Brownian bridges with deterministic length and pinning point remain valid in case its length and pinning point are random. Amongst other we prove that the bridge fails to be Markovian for pinning points having a law, which is absolutely continuous with respect to the Lebesgue measure .", "after_revision": "In this paper, we define and study the Brownian bridge with random length and pinning point. One of the main results of this work is that, unlike the deterministic case, the bridge fails to be Markovian for pinning points, the law of which is absolutely continuous with respect to the Lebesgue measure. As an application, we propose a new approach to gas storage valuation . We model the flow of information concerning the time at which the holders of a gas storage contract should inject or withdraw gas , by using a Brownian bridge starting from zero and conditioned to be equal to a constant x at the time of injection , and to a constant y at the time of withdrawal. This enables us to catch some empirical facts on the behavior of gas storage markets: when the Brownian bridge process is away from the boundaries x and y, the holders of the gas storage contract can be relatively sure that the best decision is to do nothing. However, when this process absorbs y, the holders of the contract should take the decision of withdrawing gas , otherwise, when the process absorbs x , they should take the decision of injecting gas .", "edit_actions": [{"type": "R", "before": "Developed countries are increasingly relying on gas storage to ensure security of supply. In this article we consider an", "after": "In this paper, we define and study the Brownian bridge with random length and pinning point. One of the main results of this work is that, unlike the deterministic case, the bridge fails to be Markovian for pinning points, the law of which is absolutely continuous with respect to the Lebesgue measure. As an application, we propose a new", "start_char_pos": 0, "end_char_pos": 120}, {"type": "R", "before": "in which the information about", "after": ". We model the flow of information concerning", "start_char_pos": 155, "end_char_pos": 185}, {"type": "R", "before": "holder", "after": "holders", "start_char_pos": 208, "end_char_pos": 214}, {"type": "D", "before": "choose to", "after": null, "start_char_pos": 248, "end_char_pos": 257}, {"type": "R", "before": "is modelled", "after": ", by", "start_char_pos": 281, "end_char_pos": 292}, {"type": "R", "before": "that starts at zero and is conditioned to equal", "after": "starting from zero and conditioned to be equal to", "start_char_pos": 317, "end_char_pos": 364}, {"type": "R", "before": "in", "after": "at", "start_char_pos": 378, "end_char_pos": 380}, {"type": "R", "before": "and", "after": ", and to", "start_char_pos": 403, "end_char_pos": 406}, {"type": "R", "before": "in", "after": "at", "start_char_pos": 420, "end_char_pos": 422}, {"type": "A", "before": null, "after": "us", "start_char_pos": 460, "end_char_pos": 460}, {"type": "R", "before": "holder", "after": "holders", "start_char_pos": 605, "end_char_pos": 611}, {"type": "R", "before": "the bridge information", "after": "this", "start_char_pos": 718, "end_char_pos": 740}, {"type": "R", "before": "holder", "after": "holders", "start_char_pos": 764, "end_char_pos": 770}, {"type": "R", "before": "on the other hand, they should take the decision to inject gas", "after": ", otherwise,", "start_char_pos": 831, "end_char_pos": 893}, {"type": "R", "before": ". In this sense the Brownian bridge information process leaks information concerning the time at which the holder of a storage contract can choose to inject gas, do nothing, or withdraw gas. The issue of storage valuation is not limited to gas markets, storages also plays a significant, balancing role in, for example, oil markets, soft commodity markets and even electricity. The principle of our approach is applicable to those markets as well. In this paper we define and study the Brownian bridge with random length and pinning point. Its main objectives is to see if the properties of Brownian bridges with deterministic length and pinning point remain valid in case its length and pinning point are random. Amongst other we prove that the bridge fails to be Markovian for pinning points having a law, which is absolutely continuous with respect to the Lebesgue measure", "after": ", they should take the decision of injecting gas", "start_char_pos": 921, "end_char_pos": 1796}], "sents_char_pos": [0, 89, 446, 703, 1111, 1298, 1368, 1460, 1634]}
+{"doc_id": "1907.08481", "revision_depth": "1", "before_revision": "Apis mellifera is the worldwide most important pollinator of crops, and a keystone species for most of the angiosperms (flowering plants) which constitute our feeding, making it crucial to our health and survival. The composition and configuration of the landscape in which Apis mellifera lives will likely determine its well being and the pollination service it can provide to the crops. Here we built a spatially explicit model which predicts the spatial distribution of visits to crop of Apis mellifera by simulating each day the trips of honey bees in the crops , the demographical dynamic of each hive , and their honey production. This model goes beyond existing approaches by including 1) a flower resource affected by the nectar and pollen extractionby the pollinators, 2) a pollinator growth dynamic which allows competition through short term resource depletion, 3) a probabilistic approach of the foraging behavior, modeling the fact that the pollinator has only a partial knowledge of the resource on its surroundings, and 4) the unique foraging habits of Apis mellifera regarding its election of foraging sites. With this simple but quite realistic model we show the importance of keeping a minimal fraction of natural habitat in an agricultural landscape. We also evaluate the effects of the landscape structure on the pollination, and demonstrate that it exists an optimal size of natural habitat patches which maximize the pollination service for a fixed fraction of natural habitat . Finally, we reveal the effect of the distinct ways of mixing culture on the number of visits to the crop .", "after_revision": "Apis mellifera plays a crucial role as pollinator of the majority of crops linked to food production and thus its presence is currently fundamental to our health and survival. The composition and configuration of the landscape in which Apis mellifera lives will likely determine the well-being of the hives and the pollination service that their members can provide to the crops. Here we present a spatially explicit model that predicts the spatial distribution of visits by Apis mellifera to crops, by simulating daily trips of honey bees , the demographical dynamic of each hive and their honey production. This model goes beyond existing approaches by including 1) a flower resource affected by the feedback interaction between nectar extraction, pollination, blossoming and repeated visits, 2) a pollinators dynamic that allows competition through short term resource depletion, 3) a probabilistic approach of the foraging behavior, modeling the fact that the pollinators have only partial knowledge of the resource on their surroundings, and 4) the specific and systematic foraging behavior and strategies of Apis mellifera at the moment of choosing foraging sites, as opposed to those adopted by solitary and wild pollinators. With a balance between simplicity and realism we show the importance of keeping a minimal fraction of natural habitat in an agricultural landscape. We also evaluate the effects of the landscape 's structure on pollination, and demonstrate that there exists an optimal size of natural habitat patches that maximizes the pollination service for a fixed fraction of natural habitat .", "edit_actions": [{"type": "R", "before": "is the worldwide most important pollinator of crops, and a keystone species for most of the angiosperms (flowering plants) which constitute our feeding, making it crucial", "after": "plays a crucial role as pollinator of the majority of crops linked to food production and thus its presence is currently fundamental", "start_char_pos": 15, "end_char_pos": 185}, {"type": "R", "before": "its well being", "after": "the well-being of the hives", "start_char_pos": 317, "end_char_pos": 331}, {"type": "R", "before": "it", "after": "that their members", "start_char_pos": 360, "end_char_pos": 362}, {"type": "R", "before": "built", "after": "present", "start_char_pos": 397, "end_char_pos": 402}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 430, "end_char_pos": 435}, {"type": "R", "before": "to crop of Apis mellifera by simulating each day the", "after": "by Apis mellifera to crops, by simulating daily", "start_char_pos": 480, "end_char_pos": 532}, {"type": "D", "before": "in the crops", "after": null, "start_char_pos": 553, "end_char_pos": 565}, {"type": "D", "before": ",", "after": null, "start_char_pos": 607, "end_char_pos": 608}, {"type": "R", "before": "nectar and pollen extractionby the pollinators,", "after": "feedback interaction between nectar extraction, pollination, blossoming and repeated visits,", "start_char_pos": 730, "end_char_pos": 777}, {"type": "R", "before": "pollinator growth dynamic which", "after": "pollinators dynamic that", "start_char_pos": 783, "end_char_pos": 814}, {"type": "R", "before": "pollinator has only a", "after": "pollinators have only", "start_char_pos": 954, "end_char_pos": 975}, {"type": "R", "before": "its", "after": "their", "start_char_pos": 1013, "end_char_pos": 1016}, {"type": "R", "before": "unique foraging habits", "after": "specific and systematic foraging behavior and strategies", "start_char_pos": 1042, "end_char_pos": 1064}, {"type": "R", "before": "regarding its election of foraging sites. With this simple but quite realistic model", "after": "at the moment of choosing foraging sites, as opposed to those adopted by solitary and wild pollinators. With a balance between simplicity and realism", "start_char_pos": 1083, "end_char_pos": 1167}, {"type": "R", "before": "structure on the", "after": "'s structure on", "start_char_pos": 1316, "end_char_pos": 1332}, {"type": "R", "before": "it", "after": "there", "start_char_pos": 1367, "end_char_pos": 1369}, {"type": "R", "before": "which maximize", "after": "that maximizes", "start_char_pos": 1420, "end_char_pos": 1434}, {"type": "D", "before": ". Finally, we reveal the effect of the distinct ways of mixing culture on the number of visits to the crop", "after": null, "start_char_pos": 1499, "end_char_pos": 1605}], "sents_char_pos": [0, 213, 388, 636, 1124, 1269, 1500]}
+{"doc_id": "1907.09738", "revision_depth": "2", "before_revision": "Quantitative analysis of cell nuclei in microscopic images is an essential yet still challenging source of biological and pathological information. The major challenge is accurate detection and segmentation of densely packed nuclei in images acquired under a variety of conditions. With sufficient training examples, Mask R-CNN-based methods have achieved state-of-the-art nucleus segmentation. However, the current pipeline requires fully annotated training images, which are time consuming to create and sometimes infeasible because of the noisynature of microscopic images . Importantly, nuclei often have similar appearances within the same image ; this similarity could be utilized to segment nuclei with only partially labeled training examples. We propose a simple yet effective region proposal module for the current Mask R-CNN pipeline to perform few-exemplar learning. To capture the similarities between the unlabeled regions and labeled nuclei, we apply decomposed self-attention to the learned features. On the self-attention map, we observe strong activation at the centers and edges of all nuclei, including the unlabeled ones . On this basis, our region proposal module propagates the partial annotations to the whole image and then proposes effective bounding boxes for the bounding box regression and binary mask generation modules. When trained with only 1/4 of the nuclei annotated, the baseline pipeline gives frequent false negatives, while our approach retains detection accuracy comparable to that of training with the fully annotated data. Moreover, our method can serve as a bootstrapping step to create a full annotation of a dataset, where annotations are iteratively generated and corrected until the predetermined coverage and accuracy are reached. The source code is available at URL", "after_revision": "Quantitative analysis of cell nuclei in microscopic images is an essential yet challenging source of biological and pathological information. The major challenge is accurate detection and segmentation of densely packed nuclei in images acquired under a variety of conditions. Mask R-CNN-based methods have achieved state-of-the-art nucleus segmentation. However, the current pipeline requires fully annotated training images, which are time consuming to create and sometimes noisy . Importantly, nuclei often appear similar within the same image . This similarity could be utilized to segment nuclei with only partially labeled training examples. We propose a simple yet effective region-proposal module for the current Mask R-CNN pipeline to perform few-exemplar learning. To capture the similarities between unlabeled regions and labeled nuclei, we apply decomposed self-attention to learned features. On the self-attention map, we observe strong activation at the centers and edges of all nuclei, including unlabeled nuclei . On this basis, our region-proposal module propagates partial annotations to the whole image and proposes effective bounding boxes for the bounding box-regression and binary mask-generation modules. Our method effectively learns from unlabeled regions thereby improving detection performance. We test our method with various nuclear images. When trained with only 1/4 of the nuclei annotated, our approach retains a detection accuracy comparable to that from training with fully annotated data. Moreover, our method can serve as a bootstrapping step to create full annotations of datasets, iteratively generating and correcting annotations until a predetermined coverage and accuracy are reached. The source code is available at URL", "edit_actions": [{"type": "D", "before": "still", "after": null, "start_char_pos": 79, "end_char_pos": 84}, {"type": "D", "before": "With sufficient training examples,", "after": null, "start_char_pos": 282, "end_char_pos": 316}, {"type": "R", "before": "infeasible because of the noisynature of microscopic images", "after": "noisy", "start_char_pos": 516, "end_char_pos": 575}, {"type": "R", "before": "have similar appearances", "after": "appear similar", "start_char_pos": 604, "end_char_pos": 628}, {"type": "R", "before": "; this", "after": ". This", "start_char_pos": 651, "end_char_pos": 657}, {"type": "R", "before": "region proposal", "after": "region-proposal", "start_char_pos": 786, "end_char_pos": 801}, {"type": "D", "before": "the", "after": null, "start_char_pos": 915, "end_char_pos": 918}, {"type": "D", "before": "the", "after": null, "start_char_pos": 995, "end_char_pos": 998}, {"type": "R", "before": "the unlabeled ones", "after": "unlabeled nuclei", "start_char_pos": 1123, "end_char_pos": 1141}, {"type": "R", "before": "region proposal module propagates the", "after": "region-proposal module propagates", "start_char_pos": 1163, "end_char_pos": 1200}, {"type": "D", "before": "then", "after": null, "start_char_pos": 1244, "end_char_pos": 1248}, {"type": "R", "before": "box regression and binary mask generation modules.", "after": "box-regression and binary mask-generation modules. Our method effectively learns from unlabeled regions thereby improving detection performance. We test our method with various nuclear images.", "start_char_pos": 1300, "end_char_pos": 1350}, {"type": "D", "before": "the baseline pipeline gives frequent false negatives, while", "after": null, "start_char_pos": 1403, "end_char_pos": 1462}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1484, "end_char_pos": 1484}, {"type": "R", "before": "of training with the", "after": "from training with", "start_char_pos": 1523, "end_char_pos": 1543}, {"type": "R", "before": "a full annotation of a dataset, where annotations are iteratively generated and corrected until the", "after": "full annotations of datasets, iteratively generating and correcting annotations until a", "start_char_pos": 1631, "end_char_pos": 1730}], "sents_char_pos": [0, 147, 281, 394, 577, 652, 751, 878, 1016, 1143, 1350, 1565, 1779]}
+{"doc_id": "1908.00257", "revision_depth": "1", "before_revision": "Market dynamic is studied by quantifying the dependence of the entropy S(\\tau,n) of the clusters formed by the series of the prices p_t and its moving average p_{t,n} on temporal horizon M. We report results of the analysis\\par performed on high-frequency data of the Nasdaq Composite, Dow Jones Industrial Avg and Standard \\& Poor 500 indexes downloaded from the Bloomberg terminal www. bloomberg.com/professional. Both raw and sampled data series have been analysed for a broad range of horizons M, varying from one to twelve months over the year 2018. A systematic dependence of the cluster entropy function S(\\tau,n) on the horizon M has been evidenced in the analysed assets. Hence, the cluster entropy function is integrated over the cluster \\tau to yield a synthetic indicator of price evolution: the\\emph{Market Dynamic Index I(M,n) . Moreover, the\\emph{Market Horizon Dependence\\par defined as H(M,n)=I(M,n)-I(1,n) is calculated and compared with the values of the horizon dependence of the pricing kernel with different representative agent models obtained by a Kullback-Leibler entropy approach .", "after_revision": "Market dynamic is quantified in terms of the entropy S(\\tau,n) of the clusters formed by the intersections between the series of the prices p_t and the moving average p_{t,n} . The entropy S(\\tau,n) is defined according to Shannon as \\sum P(\\tau,n)\\log P(\\tau,n), with P(\\tau,n) the probability for the cluster to occur with duration \\tau.\\par The investigation is performed on high-frequency data of the Nasdaq Composite, Dow Jones Industrial Avg and Standard \\& Poor 500 indexes downloaded from the Bloomberg terminal . The cluster entropy S(\\tau,n) is analysed in raw and sampled data over a broad range of temporal horizons M varying from one to twelve months over the year 2018. The cluster entropy S(\\tau,n) is integrated over the cluster duration \\tau to yield \\emph{the Market Dynamic Index I(M,n), a synthetic figure of price dynamics. A systematic dependence of the cluster entropy S(\\tau,n) and the Market Dynamic Index I(M,n) \\emph{on the temporal horizon M is evidenced.\\par Finally, the Market Horizon Dependence , defined as H(M,n)=I(M,n)-I(1,n) , is compared with the horizon dependence of the pricing kernel with different representative agents obtained via a Kullback-Leibler entropy approach . The Market Horizon Dependence H(M,n) of the three assets is compared against the values obtained by implementing the cluster entropy S(\\tau,n) approach on artificially generated series (Fractional Brownian Motion) .", "edit_actions": [{"type": "R", "before": "studied by quantifying the dependence", "after": "quantified in terms", "start_char_pos": 18, "end_char_pos": 55}, {"type": "A", "before": null, "after": "intersections between the", "start_char_pos": 111, "end_char_pos": 111}, {"type": "R", "before": "its", "after": "the", "start_char_pos": 141, "end_char_pos": 144}, {"type": "R", "before": "on temporal horizon M. We report results of the analysis", "after": ". The entropy S(\\tau,n) is defined according to Shannon as \\sum P(\\tau,n)\\log P(\\tau,n), with P(\\tau,n) the probability for the cluster to occur with duration \\tau.", "start_char_pos": 168, "end_char_pos": 224}, {"type": "A", "before": null, "after": "The investigation is", "start_char_pos": 229, "end_char_pos": 229}, {"type": "R", "before": "www. bloomberg.com/professional. Both", "after": ". The cluster entropy S(\\tau,n) is analysed in", "start_char_pos": 385, "end_char_pos": 422}, {"type": "R", "before": "series have been analysed for", "after": "over", "start_char_pos": 444, "end_char_pos": 473}, {"type": "R", "before": "horizons M,", "after": "temporal horizons M", "start_char_pos": 491, "end_char_pos": 502}, {"type": "R", "before": "A systematic dependence of the cluster entropy function", "after": "The cluster entropy", "start_char_pos": 557, "end_char_pos": 612}, {"type": "D", "before": "on the horizon M has been evidenced in the analysed assets. Hence, the cluster entropy function", "after": null, "start_char_pos": 623, "end_char_pos": 718}, {"type": "A", "before": null, "after": "duration", "start_char_pos": 750, "end_char_pos": 750}, {"type": "D", "before": "a synthetic indicator of price evolution: the", "after": null, "start_char_pos": 765, "end_char_pos": 810}, {"type": "R", "before": "Market Dynamic Index", "after": "the Market Dynamic Index I(M,n), a synthetic figure of price dynamics. A systematic dependence of the cluster entropy S(\\tau,n) and the Market Dynamic Index", "start_char_pos": 816, "end_char_pos": 836}, {"type": "D", "before": ". Moreover, the", "after": null, "start_char_pos": 844, "end_char_pos": 859}, {"type": "R", "before": "Market Horizon Dependence", "after": "on the temporal horizon M is evidenced.", "start_char_pos": 865, "end_char_pos": 890}, {"type": "A", "before": null, "after": "Finally, the Market Horizon Dependence", "start_char_pos": 895, "end_char_pos": 895}, {"type": "A", "before": null, "after": ",", "start_char_pos": 896, "end_char_pos": 896}, {"type": "R", "before": "is calculated and", "after": ", is", "start_char_pos": 929, "end_char_pos": 946}, {"type": "D", "before": "values of the", "after": null, "start_char_pos": 965, "end_char_pos": 978}, {"type": "R", "before": "agent models obtained by", "after": "agents obtained via", "start_char_pos": 1050, "end_char_pos": 1074}, {"type": "A", "before": null, "after": ". The Market Horizon Dependence H(M,n) of the three assets is compared against the values obtained by implementing the cluster entropy S(\\tau,n) approach on artificially generated series (Fractional Brownian Motion)", "start_char_pos": 1111, "end_char_pos": 1111}], "sents_char_pos": [0, 190, 417, 556, 682]}
+{"doc_id": "1908.01406", "revision_depth": "3", "before_revision": "We study a class of tests of the randomness of Bernoulli sequences and their application to analyses of the human tendency to perceive streaks of consecutive successes as overly representative of positive dependence-the hot hand fallacy. In particular, we study tests of randomness (i.e., that trials are i.i.d.) based on test statistics that compare the proportion of successes that directly follow k consecutive successes with either the overall proportion of successes or the proportion of successes that directly follow k consecutive failures. We derive the asymptotic distributions of these test statistics and their permutation distributions under randomness, under a set of general stationary processes, and under a Markov model of \"streakiness\" , which allow us to evaluate their local asymptotic power. The results are applied to evaluate tests of randomness implemented on data from a basketball shooting experiment, whose conclusions are disputed by Gilovich, Vallone, and Tversky (1985) and Miller and Sanjurjo (2018a) . We establish that substantially larger data sets are required to derive an informative measurement of the deviation from randomness in basketball shooting. Although multiple testing procedures reveal that one shooter in the experiment exhibits a shooting pattern significantly inconsistent with randomness - supplying strong evidence that basketball shooting is not random for all shooters all of the time - we find that the evidence against randomness is limited to this shooter. Our results provide a mathematical and statistical foundation for the design and validation of experiments that directly compare deviations from randomness with human beliefs about deviations from randomness in Bernoulli sequences .", "after_revision": "We study a class of permutation tests of the randomness of a collection of Bernoulli sequences and their application to analyses of the human tendency to perceive streaks of consecutive successes as overly representative of positive dependence - the hot hand fallacy. In particular, we study permutation tests of the null hypothesis of randomness (i.e., that trials are i.i.d.) based on test statistics that compare the proportion of successes that directly follow k consecutive successes with either the overall proportion of successes or the proportion of successes that directly follow k consecutive failures. We characterize the asymptotic distributions of these test statistics and their permutation distributions under randomness, under a set of general stationary processes, and under a class of Markov chain alternatives , which allow us to derive their local asymptotic power. The results are applied to evaluate the empirical support for the hot hand fallacy provided by four controlled basketball shooting experiments . We establish that substantially larger data sets are required to derive an informative measurement of the deviation from randomness in basketball shooting. In one experiment for which we were able to obtain data, multiple testing procedures reveal that one shooter exhibits a shooting pattern significantly inconsistent with randomness - supplying strong evidence that basketball shooting is not random for all shooters all of the time . However, we find that the evidence against randomness in this experiment is limited to this shooter. Our results provide a mathematical and statistical foundation for the design and validation of experiments that directly compare deviations from randomness with human beliefs about deviations from randomness , and thereby constitute a direst test of the hot hand fallacy .", "edit_actions": [{"type": "A", "before": null, "after": "permutation", "start_char_pos": 20, "end_char_pos": 20}, {"type": "A", "before": null, "after": "a collection of", "start_char_pos": 48, "end_char_pos": 48}, {"type": "R", "before": "dependence-the", "after": "dependence - the", "start_char_pos": 207, "end_char_pos": 221}, {"type": "R", "before": "tests of", "after": "permutation tests of the null hypothesis of", "start_char_pos": 264, "end_char_pos": 272}, {"type": "R", "before": "derive", "after": "characterize", "start_char_pos": 553, "end_char_pos": 559}, {"type": "R", "before": "Markov model of \"streakiness\"", "after": "class of Markov chain alternatives", "start_char_pos": 725, "end_char_pos": 754}, {"type": "R", "before": "evaluate", "after": "derive", "start_char_pos": 775, "end_char_pos": 783}, {"type": "R", "before": "tests of randomness implemented on data from a basketball shooting experiment, whose conclusions are disputed by Gilovich, Vallone, and Tversky (1985) and Miller and Sanjurjo (2018a)", "after": "the empirical support for the hot hand fallacy provided by four controlled basketball shooting experiments", "start_char_pos": 850, "end_char_pos": 1032}, {"type": "R", "before": "Although", "after": "In one experiment for which we were able to obtain data,", "start_char_pos": 1191, "end_char_pos": 1199}, {"type": "D", "before": "in the experiment", "after": null, "start_char_pos": 1252, "end_char_pos": 1269}, {"type": "R", "before": "-", "after": ". However,", "start_char_pos": 1441, "end_char_pos": 1442}, {"type": "A", "before": null, "after": "in this experiment", "start_char_pos": 1488, "end_char_pos": 1488}, {"type": "R", "before": "in Bernoulli sequences", "after": ", and thereby constitute a direst test of the hot hand fallacy", "start_char_pos": 1725, "end_char_pos": 1747}], "sents_char_pos": [0, 239, 549, 813, 1034, 1190, 1516]}
+{"doc_id": "1908.06900", "revision_depth": "1", "before_revision": "Test automation can result in reduction in cost and human effort . If the optimal policy, the course of actions taken, for the intended objective in a testing process could be learnt by the testing system (e.g., a smart tester agent), then it could be reused in similar situations, thus leading to higher efficiency, i. e., less computational time. Automating stress testing to find performance breaking points remains a challenge for complex software systems. Common approaches are mainly based on source code or system model analysis or use-case based techniques. However, source code or system models might not be available at testing time. In this paper, we propose a self-adaptive fuzzy reinforcement learning-based performance (stress) testing framework (SaFReL) that enables the tester agent to learn the optimal policy for generating stress test cases leading to performance breaking point without access to performance model of the system under test. SaFReL learns the optimal policy through an initial learning , then reuses it during a transfer learning phase, while keeping the learning running in the long-term . Through multiple experiments on a simulated environment, we demonstrate that our approach generates the stress test cases for different programs efficiently and adaptively without access to performance models.", "after_revision": "Test automation brings the potential to reduce costs and human effort , but several aspects of software testing remain challenging to automate. One such example is automated performance testing to find performance breaking points . Current approaches to tackle automated generation of performance test cases mainly involve using source code or system model analysis or use-case based techniques. However, source code and system models might not always be available at testing time. On the other hand, if the optimal performance testing policy for the intended objective in a testing process instead could be learned by the testing system, then test automation without advanced performance models could be possible. Furthermore, the learned policy could later be reused for similar software systems under test, thus leading to higher test efficiency. We propose SaFReL, a self-adaptive fuzzy reinforcement learning-based performance testing framework. SaFReL learns the optimal policy to generate performance test cases through an initial learning phase , then reuses it during a transfer learning phase, while keeping the learning running and updating the policy in the long term . Through multiple experiments on a simulated environment, we demonstrate that our approach generates the target performance test cases for different programs more efficiently than a typical testing process, and performs adaptively without access to source code and performance models.", "edit_actions": [{"type": "R", "before": "can result in reduction in cost", "after": "brings the potential to reduce costs", "start_char_pos": 16, "end_char_pos": 47}, {"type": "R", "before": ". If the optimal policy, the course of actions taken, for the intended objective in a testing process could be learnt by the testing system (e.g., a smart tester agent), then it could be reused in similar situations, thus leading to higher efficiency, i. e., less computational time. Automating stress", "after": ", but several aspects of software testing remain challenging to automate. One such example is automated performance", "start_char_pos": 65, "end_char_pos": 366}, {"type": "R", "before": "remains a challenge for complex software systems. Common approaches are mainly based on", "after": ". Current approaches to tackle automated generation of performance test cases mainly involve using", "start_char_pos": 411, "end_char_pos": 498}, {"type": "R", "before": "or", "after": "and", "start_char_pos": 587, "end_char_pos": 589}, {"type": "A", "before": null, "after": "always", "start_char_pos": 614, "end_char_pos": 614}, {"type": "R", "before": "In this paper, we propose a", "after": "On the other hand, if the optimal performance testing policy for the intended objective in a testing process instead could be learned by the testing system, then test automation without advanced performance models could be possible. Furthermore, the learned policy could later be reused for similar software systems under test, thus leading to higher test efficiency. We propose SaFReL, a", "start_char_pos": 645, "end_char_pos": 672}, {"type": "R", "before": "performance (stress) testing framework (SaFReL) that enables the tester agent to learn the optimal policy for generating stress test cases leading to performance breaking point without access to performance model of the system under test. SaFReL", "after": "performance testing framework. SaFReL", "start_char_pos": 722, "end_char_pos": 967}, {"type": "A", "before": null, "after": "to generate performance test cases", "start_char_pos": 994, "end_char_pos": 994}, {"type": "A", "before": null, "after": "phase", "start_char_pos": 1023, "end_char_pos": 1023}, {"type": "R", "before": "in the long-term", "after": "and updating the policy in the long term", "start_char_pos": 1110, "end_char_pos": 1126}, {"type": "R", "before": "stress", "after": "target performance", "start_char_pos": 1233, "end_char_pos": 1239}, {"type": "R", "before": "efficiently and", "after": "more efficiently than a typical testing process, and performs", "start_char_pos": 1274, "end_char_pos": 1289}, {"type": "A", "before": null, "after": "source code and", "start_char_pos": 1319, "end_char_pos": 1319}], "sents_char_pos": [0, 66, 348, 460, 565, 644, 960, 1128]}
+{"doc_id": "1908.07452", "revision_depth": "1", "before_revision": "We develop a framework that creates a new polygonal mesh representation of the 3D domain of a layer-by-layer 3D printing job on which we identify single, continuous tool paths covering each connected piece of the domain in every layer. We present a tool path algorithm that traverses each such continuous tool path with no crossovers. The key construction at the heart of our framework is a novel Euler transformation that we introduced recently in a separate manuscript. Our Euler transformation converts a 2-dimensional cell complex K into a new 2-complex K^ such that every vertex in the 1-skeleton G^ of K^ has degree 4. Hence G^ is Eulerian, and an Eulerian tour can be followed to print all edges in a continuous fashion without stops . We start with a mesh K of the union of polygons obtained by projecting all layers to the plane. First we compute its Euler transformation K^. In the slicing step, we clip K^ at each layer i using its polygon to obtain K^_i . We then patch K^_i by adding edges such that any odd-degree nodes created by slicing are transformed to have even degrees again. We print extra support edges in place of any segments left out to ensure there are no edges without support in the next layer above . These support edges maintain the Euler nature of K^_i. Finally , we describe a tree-based search algorithm that builds the continuous tool path by traversing \"concentric\" cycles in the Euler complex. Our algorithm produces a tool path that avoids material collisions and crossovers, and can be printed in a continuous fashion irrespective of complex geometry or topology of the domain (e.g., holes) .", "after_revision": "We develop a framework that creates a new polygonal mesh representation of the sparse infill domain of a layer-by-layer 3D printing job . We guarantee the existence of a single, continuous tool path covering each connected piece of the domain in every layer. We present a tool path algorithm that traverses each such continuous tool path with no crossovers. The key construction at the heart of our framework is an Euler transformation which converts a 2-dimensional cell complex K into a new 2-complex K^ such that every vertex in the 1-skeleton G^ of K^ has even degree. Hence G^ is Eulerian, and a Eulerian tour can be followed to print all edges in a continuous fashion . We start with a mesh K of the union of polygons obtained by projecting all layers to the plane. We compute its Euler transformation K^. In the slicing step, we clip K^ at each layer using its polygon to obtain a complex that may not necessarily be Euler . We then patch this complex by adding edges such that any odd-degree nodes created by slicing are transformed to have even degrees again. We print extra support edges in place of any segments left out to ensure there are no edges without support in the next layer . These support edges maintain the Euler nature of the complex. Finally we describe a tree-based search algorithm that builds the continuous tool path by traversing \"concentric\" cycles in the Euler complex. Our algorithm produces a tool path that avoids material collisions and crossovers, and can be printed in a continuous fashion irrespective of complex geometry or topology of the domain (e.g., holes) . We implement our test our framework on several 3D objects. Apart from standard geometric shapes, we demonstrate the framework on the Stanford bunny .", "edit_actions": [{"type": "R", "before": "3D", "after": "sparse infill", "start_char_pos": 79, "end_char_pos": 81}, {"type": "R", "before": "on which we identify", "after": ". We guarantee the existence of a", "start_char_pos": 125, "end_char_pos": 145}, {"type": "R", "before": "paths", "after": "path", "start_char_pos": 170, "end_char_pos": 175}, {"type": "R", "before": "a novel Euler transformation that we introduced recently in a separate manuscript. Our Euler transformation", "after": "an Euler transformation which", "start_char_pos": 389, "end_char_pos": 496}, {"type": "R", "before": "degree 4.", "after": "even degree.", "start_char_pos": 615, "end_char_pos": 624}, {"type": "R", "before": "an", "after": "a", "start_char_pos": 651, "end_char_pos": 653}, {"type": "D", "before": "without stops", "after": null, "start_char_pos": 727, "end_char_pos": 740}, {"type": "R", "before": "First we", "after": "We", "start_char_pos": 839, "end_char_pos": 847}, {"type": "D", "before": "i", "after": null, "start_char_pos": 931, "end_char_pos": 932}, {"type": "R", "before": "K^_i", "after": "a complex that may not necessarily be Euler", "start_char_pos": 961, "end_char_pos": 965}, {"type": "R", "before": "K^_i", "after": "this complex", "start_char_pos": 982, "end_char_pos": 986}, {"type": "D", "before": "above", "after": null, "start_char_pos": 1223, "end_char_pos": 1228}, {"type": "R", "before": "K^_i. Finally ,", "after": "the complex. Finally", "start_char_pos": 1280, "end_char_pos": 1295}, {"type": "A", "before": null, "after": ". We implement our test our framework on several 3D objects. Apart from standard geometric shapes, we demonstrate the framework on the Stanford bunny", "start_char_pos": 1630, "end_char_pos": 1630}], "sents_char_pos": [0, 235, 334, 471, 624, 742, 838, 884, 967, 1096, 1230, 1285, 1430]}
+{"doc_id": "1908.08474", "revision_depth": "1", "before_revision": "The Shapley value has become a popular method to attribute the prediction of a machine-learning model on an input to its base features. The Shapley value [ 1 ] is known to be the unique method that satisfies certain desirable properties , and this motivates its use. Unfortunately, despite this uniqueness result, there are a multiplicity of Shapley values used in explaining a model's prediction. This is because there are many ways to apply the Shapley value that differ in how they reference the model, the training data, and the explanation context. In this paper, we study an approach that applies the Shapley value to conditional expectations (CES) of sets of features (cf. 2%DIFDELCMD < ]%%% ) that subsumes several prior approaches within a common framework. We provide the first algorithm for the general version of CES. We show that CES can result in counterintuitive attributions in theory and in practice (we study a diabetes prediction task); for instance, CES can assign non-zero attributions to features that are not referenced by the model. In contrast, we show that an approach called the Baseline Shapley ( BS) does not exhibit counterintuitive attributions; we support this claim with a uniqueness (axiomatic) result. We show that BS is a special case of CES, and CES with an independent feature distribution coincides with a randomized version of BS. Thus, BS fits into the CES framework, but does not suffer from many of CES's deficiencies .", "after_revision": "The Shapley value has become a popular method to attribute the prediction of a machine-learning model on an input to its base features. The use of the Shapley value is justified by citing [ 16 ] showing that it is theunique method that satisfies certain good properties (axioms). There are, however, a multiplicity of ways in which the Shapley value is operationalized in the attribution problem. These differ in how they reference the model, the training data, and the explanation context. %DIFDELCMD < ]%%% These give very different results, rendering the uniqueness result meaningless. Furthermore, we find that previously proposed approaches can produce counterintuitive attributions in theory and in practice---for instance, they can assign non-zero attributions to features that are not even referenced by the model. In this paper, we use the axiomatic approach to study the differences between some of the many operationalizations of the Shapley value for attribution, and propose a technique called Baseline Shapley ( BShap) that is backed by a proper uniqueness result. We also contrast BShap with Integrated Gradients, another extension of Shapley value to the continuous setting .", "edit_actions": [{"type": "R", "before": "Shapley value", "after": "use of the Shapley value is justified by citing", "start_char_pos": 140, "end_char_pos": 153}, {"type": "R", "before": "1", "after": "16", "start_char_pos": 156, "end_char_pos": 157}, {"type": "R", "before": "is known to be the unique", "after": "showing that it is the", "start_char_pos": 160, "end_char_pos": 185}, {"type": "A", "before": null, "after": "unique", "start_char_pos": 185, "end_char_pos": 185}, {"type": "R", "before": "desirable properties , and this motivates its use. Unfortunately, despite this uniqueness result, there are", "after": "good properties (", "start_char_pos": 216, "end_char_pos": 323}, {"type": "A", "before": null, "after": "axioms", "start_char_pos": 323, "end_char_pos": 323}, {"type": "A", "before": null, "after": "). There are, however,", "start_char_pos": 323, "end_char_pos": 323}, {"type": "R", "before": "Shapley values used in explaining a model's prediction. This is because there are many ways to apply", "after": "ways in which", "start_char_pos": 342, "end_char_pos": 442}, {"type": "R", "before": "that", "after": "is operationalized in the attribution problem. These", "start_char_pos": 461, "end_char_pos": 465}, {"type": "D", "before": "In this paper, we study an approach that applies the Shapley value to conditional expectations (CES) of sets of features (cf.", "after": null, "start_char_pos": 554, "end_char_pos": 679}, {"type": "D", "before": "2", "after": null, "start_char_pos": 680, "end_char_pos": 681}, {"type": "R", "before": ") that subsumes several prior approaches within a common framework. We provide the first algorithm for the general version of CES. We show that CES can result in", "after": "These give very different results, rendering the uniqueness result meaningless. Furthermore, we find that previously proposed approaches can produce", "start_char_pos": 699, "end_char_pos": 860}, {"type": "R", "before": "practice (we study a diabetes prediction task); for instance, CES", "after": "practice---for instance, they", "start_char_pos": 908, "end_char_pos": 973}, {"type": "A", "before": null, "after": "even", "start_char_pos": 1032, "end_char_pos": 1032}, {"type": "R", "before": "contrast, we show that an approach called the", "after": "this paper, we use the axiomatic approach to study the differences between some of the many operationalizations of the Shapley value for attribution, and propose a technique called", "start_char_pos": 1061, "end_char_pos": 1106}, {"type": "R", "before": "BS) does not exhibit counterintuitive attributions; we support this claim with a uniqueness (axiomatic)", "after": "BShap) that is backed by a proper uniqueness", "start_char_pos": 1126, "end_char_pos": 1229}, {"type": "R", "before": "show that BS is a special case of CES, and CES with an independent feature distribution coincides with a randomized version of BS. Thus, BS fits into the CES framework, but does not suffer from many of CES's deficiencies", "after": "also contrast BShap with Integrated Gradients, another extension of Shapley value to the continuous setting", "start_char_pos": 1241, "end_char_pos": 1461}], "sents_char_pos": [0, 135, 266, 397, 553, 766, 829, 955, 1057, 1177, 1237, 1371]}
+{"doc_id": "1908.09853", "revision_depth": "1", "before_revision": "Ecologists have long suspected that species are more likely to interact if their traits match in a particular way. For example, a pollination interaction may be particularly likely if the proportions of a bee's tongue match flower shapein a beneficial way. Empirical evidence for trait matching , however, varies significantly in strength among different types of ecological networks. Here, we show that ambiguity among empirical trait matching studies may have arisen at least in parts from using overly simple statistical models. Using simulated and real data, we contrast conventional regression models with Machine Learning (ML) models (Random Forest, Boosted Regression Trees, Deep Neural Networks, Convolutional Neural Networks, Support Vector Machines, naive Bayes, and k-Nearest-Neighbor), testing their ability to predict species interactions based on traits, and infer trait combinations causally responsible for species interactions. We find that the best ML models can successfully predict species interactions in plant-pollinator networks (up to 0.93 AUC) and outperform conventional regression models . Our results also demonstrate that ML models can better identify the causally responsible trait matching combinations than GLMs. In two case studies, the best ML models could successfully predict species interactions in a global plant-pollinator database and infer ecologically plausible trait matching rules for a plant-hummingbird network from Costa Rica , without any prior assumptions about the system . We conclude that flexible ML models offer many advantages over traditional regression models for understanding interaction networks. We anticipate that these results extrapolate to other network types, such as trophic or competitive networks . More generally, our results highlight the potential of ML and artificial intelligence for inference beyond standard tasks such as pattern recognition.", "after_revision": "Ecologists have long suspected that species are more likely to interact if their traits match in a particular way. For example, a pollination interaction may be more likely if the proportions of a bee's tongue fit a plant's flower shape. Empirical estimates of the importance of trait-matching for determining species interactions , however, vary significantly among different types of ecological networks. Here, we show that ambiguity among empirical trait-matching studies may have arisen at least in parts from using overly simple statistical models. Using simulated and real data, we contrast conventional generalized linear models (GLM) with more flexible Machine Learning (ML) models (Random Forest, Boosted Regression Trees, Deep Neural Networks, Convolutional Neural Networks, Support Vector Machines, naive Bayes, and k-Nearest-Neighbor), testing their ability to predict species interactions based on traits, and infer trait combinations causally responsible for species interactions. We find that the best ML models can successfully predict species interactions in plant-pollinator networks , outperforming GLMs by a substantial margin . Our results also demonstrate that ML models can better identify the causally responsible trait-matching combinations than GLMs. In two case studies, the best ML models successfully predicted species interactions in a global plant-pollinator database and inferred ecologically plausible trait-matching rules for a plant-hummingbird network , without any prior assumptions . We conclude that flexible ML models offer many advantages over traditional regression models for understanding interaction networks. We anticipate that these results extrapolate to other ecological network types . More generally, our results highlight the potential of machine learning and artificial intelligence for inference in ecology, beyond standard tasks such as image or pattern recognition.", "edit_actions": [{"type": "R", "before": "particularly", "after": "more", "start_char_pos": 161, "end_char_pos": 173}, {"type": "R", "before": "match flower shapein a beneficial way. Empirical evidence for trait matching", "after": "fit a plant's flower shape. Empirical estimates of the importance of trait-matching for determining species interactions", "start_char_pos": 218, "end_char_pos": 294}, {"type": "R", "before": "varies significantly in strength", "after": "vary significantly", "start_char_pos": 306, "end_char_pos": 338}, {"type": "R", "before": "trait matching", "after": "trait-matching", "start_char_pos": 430, "end_char_pos": 444}, {"type": "R", "before": "regression models with", "after": "generalized linear models (GLM) with more flexible", "start_char_pos": 588, "end_char_pos": 610}, {"type": "R", "before": "(up to 0.93 AUC) and outperform conventional regression models", "after": ", outperforming GLMs by a substantial margin", "start_char_pos": 1052, "end_char_pos": 1114}, {"type": "R", "before": "trait matching", "after": "trait-matching", "start_char_pos": 1206, "end_char_pos": 1220}, {"type": "R", "before": "could successfully predict", "after": "successfully predicted", "start_char_pos": 1285, "end_char_pos": 1311}, {"type": "R", "before": "infer ecologically plausible trait matching", "after": "inferred ecologically plausible trait-matching", "start_char_pos": 1375, "end_char_pos": 1418}, {"type": "D", "before": "from Costa Rica", "after": null, "start_char_pos": 1457, "end_char_pos": 1472}, {"type": "D", "before": "about the system", "after": null, "start_char_pos": 1505, "end_char_pos": 1521}, {"type": "R", "before": "network types, such as trophic or competitive networks", "after": "ecological network types", "start_char_pos": 1711, "end_char_pos": 1765}, {"type": "R", "before": "ML", "after": "machine learning", "start_char_pos": 1823, "end_char_pos": 1825}, {"type": "A", "before": null, "after": "in ecology,", "start_char_pos": 1868, "end_char_pos": 1868}, {"type": "A", "before": null, "after": "image or", "start_char_pos": 1899, "end_char_pos": 1899}], "sents_char_pos": [0, 114, 256, 384, 531, 944, 1116, 1244, 1523, 1656, 1767]}
+{"doc_id": "1908.11436", "revision_depth": "1", "before_revision": "In a recent article, Zemblys et al. 1 reported on a new method for the classification of eye-movements using deep neural networks. I will refer to this paper as the \"gazeNet paper \" . I have found 2 errors and two problems with that paper that are explained herein. Error 1: The gazeNet machine-learning based \\textit{\\textbf{ classification method was built assuming that a hand-scored dataset from Lund University was all collected at 500 Hz, but in fact, six of the 34 recording files were actually collected at 200 Hz . Of the six datasets that were used as the training set for the gazeNet algorithm, 2 were actually collected at 200 Hz. Problem 1\\underline{\\textit{\\textbf{ has to do with the fact that even among the 500 Hz data, the inter-timestamp intervals varied widely. Problem 2 \\underline{\\textit{\\textbf{ is that there are many unusual discontinuities in the saccade trajectories from the Lund University dataset that make it a very poor choice for the construction of an automatic classification method. Error 2 \\underline{\\textit{\\textbf{ arises out of the novel event-related agreement analysis employed by the gazeNet authors. Although the authors intended to classify unmatched events as either false positives or false negatives, many are actually being classified as true negatives. True negatives are not errors, and any unmatched event misclassified as a true negative is actually driving the kappa statistic higher, whereas unmatched events should be driving the kappa statistic lower.", "after_revision": " Zemblys et al. \\mbox{%DIFAUXCMD gazeNet reported on a method for the classification of eye-movements ( \"gazeNet \" ) . I have found 2 errors and two problems with that paper that are explained herein. \\textit{\\textbf{Error 1: The gazeNet classification method was built assuming that a hand-scored dataset from Lund University was all collected at 500 Hz, but in fact, six of the 34 recording files were actually collected at 200Hz . Of the six datasets that were used as the training set for the gazeNet algorithm, 2 were actually collected at 200Hz.\\underline{\\textit{\\textbf{Problem 1 has to do with the fact that even among the 500Hz data, the inter-timestamp intervals varied widely. \\underline{\\textit{\\textbf{Problem 2 is that there are many unusual discontinuities in the saccade trajectories from the Lund University dataset that make it a very poor choice for the construction of an automatic classification method. \\underline{\\textit{\\textbf{Error 2 arises out of the novel event-related agreement analysis employed by the gazeNet authors. Although the authors intended to classify unmatched events as either false positives or false negatives, many are actually being classified as true negatives. True negatives are not errors, and any unmatched event misclassified as a true negative is actually driving kappa higher, whereas unmatched events should be driving kappa lower.", "edit_actions": [{"type": "D", "before": "In a recent article,", "after": null, "start_char_pos": 0, "end_char_pos": 20}, {"type": "R", "before": "1", "after": "\\mbox{%DIFAUXCMD gazeNet", "start_char_pos": 36, "end_char_pos": 37}, {"type": "D", "before": "new", "after": null, "start_char_pos": 52, "end_char_pos": 55}, {"type": "R", "before": "using deep neural networks. I will refer to this paper as the", "after": "(", "start_char_pos": 103, "end_char_pos": 164}, {"type": "D", "before": "paper", "after": null, "start_char_pos": 174, "end_char_pos": 179}, {"type": "A", "before": null, "after": ")", "start_char_pos": 182, "end_char_pos": 182}, {"type": "D", "before": "Error 1: The gazeNet machine-learning based", "after": null, "start_char_pos": 267, "end_char_pos": 310}, {"type": "A", "before": null, "after": "Error 1:", "start_char_pos": 327, "end_char_pos": 327}, {"type": "A", "before": null, "after": "The gazeNet", "start_char_pos": 328, "end_char_pos": 328}, {"type": "R", "before": "200 Hz", "after": "200Hz", "start_char_pos": 517, "end_char_pos": 523}, {"type": "R", "before": "200 Hz. Problem 1", "after": "200Hz.", "start_char_pos": 637, "end_char_pos": 654}, {"type": "A", "before": null, "after": "Problem 1", "start_char_pos": 681, "end_char_pos": 681}, {"type": "R", "before": "500 Hz", "after": "500Hz", "start_char_pos": 726, "end_char_pos": 732}, {"type": "D", "before": "Problem 2", "after": null, "start_char_pos": 784, "end_char_pos": 793}, {"type": "A", "before": null, "after": "Problem 2", "start_char_pos": 821, "end_char_pos": 821}, {"type": "D", "before": "Error 2", "after": null, "start_char_pos": 1022, "end_char_pos": 1029}, {"type": "A", "before": null, "after": "Error 2", "start_char_pos": 1057, "end_char_pos": 1057}, {"type": "R", "before": "the kappa statistic", "after": "kappa", "start_char_pos": 1415, "end_char_pos": 1434}, {"type": "R", "before": "the kappa statistic", "after": "kappa", "start_char_pos": 1486, "end_char_pos": 1505}], "sents_char_pos": [0, 130, 266, 644, 783, 1021, 1147, 1306]}
+{"doc_id": "1909.03348", "revision_depth": "2", "before_revision": "We reveal the different interpretations of the future in their judgments of future economic conditions by applying weakly supervised learning and text mining. In the Economy Watcher Survey, which is a market survey published by the Japanese government, there are assessments of current and future economic conditions by people from various fields. Although this survey provides insights regarding an economic policy for policymakers in Japan, there is no clear definition of the future, in future economic conditions . Hence, in the survey , respondents make their assessments based on their interpretations of the future. In our research, we separate the assessments of future economic conditions into near and distant future economic conditions using learning from positive and unlabeled data (PU learning) , which is weakly supervised learning. The dataset is composed of several periods, and we develop a PU learning algorithm for efficient training, using the dataset with the time series. Through empirical analysis , we interpret the classification results from the viewpoint of economics .", "after_revision": "The Economy Watcher Survey, which is a market survey published by the Japanese government, contains assessments of current and future economic conditions by people from various fields. Although this survey provides insights regarding economic policy for policymakers , a clear definition of the word \"future\" in future economic conditions is not provided . Hence, the assessments respondents provide in the survey are simply based on their interpretations of the meaning of \"future.\" This motivated us to reveal the different interpretations of the future in their judgments of future economic conditions by applying weakly supervised learning and text mining. In our research, we separate the assessments of future economic conditions into economic conditions of the near and distant future using learning from positive and unlabeled data (PU learning) . Because the dataset includes data from several periods, we devised new architecture to enable neural networks to conduct PU learning based on the idea of multi-task learning to efficiently learn a classifier. Our empirical analysis confirmed that the proposed method could separate the future economic conditions, and we interpreted the classification results to obtain intuitions for policymaking .", "edit_actions": [{"type": "R", "before": "We reveal the different interpretations of the future in their judgments of future economic conditions by applying weakly supervised learning and text mining. In the", "after": "The", "start_char_pos": 0, "end_char_pos": 165}, {"type": "R", "before": "there are", "after": "contains", "start_char_pos": 253, "end_char_pos": 262}, {"type": "D", "before": "an", "after": null, "start_char_pos": 397, "end_char_pos": 399}, {"type": "R", "before": "in Japan, there is no", "after": ", a", "start_char_pos": 433, "end_char_pos": 454}, {"type": "R", "before": "future,", "after": "word \"future\"", "start_char_pos": 479, "end_char_pos": 486}, {"type": "A", "before": null, "after": "is not provided", "start_char_pos": 517, "end_char_pos": 517}, {"type": "A", "before": null, "after": "the assessments respondents provide", "start_char_pos": 527, "end_char_pos": 527}, {"type": "R", "before": ", respondents make their assessments", "after": "are simply", "start_char_pos": 542, "end_char_pos": 578}, {"type": "R", "before": "future.", "after": "meaning of \"future.\" This motivated us to reveal the different interpretations of the future in their judgments of future economic conditions by applying weakly supervised learning and text mining.", "start_char_pos": 617, "end_char_pos": 624}, {"type": "A", "before": null, "after": "economic conditions of the", "start_char_pos": 705, "end_char_pos": 705}, {"type": "D", "before": "economic conditions", "after": null, "start_char_pos": 730, "end_char_pos": 749}, {"type": "R", "before": ", which is weakly supervised learning. The dataset is composed of", "after": ". Because the dataset includes data from", "start_char_pos": 812, "end_char_pos": 877}, {"type": "D", "before": "and we develop a PU learning algorithm for efficient training, using the dataset with the time series. Through empirical analysis ,", "after": null, "start_char_pos": 895, "end_char_pos": 1026}, {"type": "R", "before": "interpret", "after": "devised new architecture to enable neural networks to conduct PU learning based on the idea of multi-task learning to efficiently learn a classifier. Our empirical analysis confirmed that the proposed method could separate the future economic conditions, and we interpreted", "start_char_pos": 1030, "end_char_pos": 1039}, {"type": "R", "before": "from the viewpoint of economics", "after": "to obtain intuitions for policymaking", "start_char_pos": 1067, "end_char_pos": 1098}], "sents_char_pos": [0, 158, 347, 519, 624, 850, 997]}
+{"doc_id": "1909.05953", "revision_depth": "1", "before_revision": " This paper deals with the following separability problem in 3D space: Given a rigid polyhedron P with n vertices , does a semi-rigid polyhedron G exist, such that both polyhedra can be transformed into an inseparable assembled state, where the fixture snaps on to P, by applying a linear force and exploiting the mild flexibility of G? If such a flexible snapping polyhedron exists, devise an efficient and robust algorithm that constructs it. In simple words, we are looking for s semi-rigid polyhedron G, such that when P and G are separate , we can push G towards P , slightly bending G on the way , and obtain a configuration, where G is back in its original shape , and both P and G are inseparable as rigid bodies. We define certain properties such a pair of polyhedron and its snapping fixture may possess, and prove two theorems related to the pair. We introduce an algorithm that produces a snapping fixture with such properties in O(n ^5) time , if a snapping fixture exists , and an efficient and robust implementation of this algorithm .", "after_revision": "Fixtures for constraining the movement of parts have been extensively investigated in robotics, since they are essential for using robots in automated manufacturing. This paper deals with the design and optimized synthesis of a special type of fixtures, which we callsnapping fixtures. Given a polyhedral workpiece P with n vertices and of constant genus, which we need to hold, a snapping fixture is a semi-rigid polyhedron G , made of a palm and several fingers, such that when P and G are well separated , we can push P toward G , slightly bending the fingers of G on the way (exploiting its mild flexibility) , and obtain a configuration, where G is back in its original shape and P and G are inseparable as rigid bodies. We prove the minimal closure conditions under which such fixtures can hold parts, using Helly's theorem. We then introduce an algorithm running in O(n ^3) time that produces a snapping fixture, minimizing the number of fingers and optimizing additional objectives, if a snapping fixture exists . We also provide an efficient and robust implementation of a simpler version of the algorithm, which produces the fixture model to be 3D printed and runs in O(n^4) time. We describe two applications with different optimization criteria: Fixtures to hold add-ons for drones, where we aim to make the fixture as lightweight as possible, and small-scale fixtures to hold precious stones in jewelry, where we aim to maximize the exposure of the stones, namely minimize the obscuring of the workpiece by the fixture .", "edit_actions": [{"type": "A", "before": null, "after": "Fixtures for constraining the movement of parts have been extensively investigated in robotics, since they are essential for using robots in automated manufacturing.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "following separability problem in 3D space: Given a rigid polyhedron", "after": "design and optimized synthesis of a special type of fixtures, which we call", "start_char_pos": 27, "end_char_pos": 95}, {"type": "A", "before": null, "after": "snapping fixtures", "start_char_pos": 95, "end_char_pos": 95}, {"type": "A", "before": null, "after": ". Given a polyhedral workpiece", "start_char_pos": 95, "end_char_pos": 95}, {"type": "R", "before": ", does a", "after": "and of constant genus, which we need to hold, a snapping fixture is a", "start_char_pos": 114, "end_char_pos": 122}, {"type": "R", "before": "exist, such that both polyhedra can be transformed into an inseparable assembled state, where the fixture snaps on to P, by applying a linear force and exploiting the mild flexibility of G? If such a flexible snapping polyhedron exists, devise an efficient and robust algorithm that constructs it. In simple words, we are looking for s semi-rigid polyhedron G,", "after": ", made of a palm and several fingers,", "start_char_pos": 147, "end_char_pos": 507}, {"type": "R", "before": "separate", "after": "well separated", "start_char_pos": 535, "end_char_pos": 543}, {"type": "R", "before": "G towards P", "after": "P toward G", "start_char_pos": 558, "end_char_pos": 569}, {"type": "A", "before": null, "after": "the fingers of", "start_char_pos": 589, "end_char_pos": 589}, {"type": "A", "before": null, "after": "(exploiting its mild flexibility)", "start_char_pos": 603, "end_char_pos": 603}, {"type": "R", "before": ", and both", "after": "and", "start_char_pos": 672, "end_char_pos": 682}, {"type": "R", "before": "define certain properties such a pair of polyhedron and its snapping fixture may possess, and prove two theorems related to the pair. We", "after": "prove the minimal closure conditions under which such fixtures can hold parts, using Helly's theorem. We then", "start_char_pos": 727, "end_char_pos": 863}, {"type": "R", "before": "that produces a snapping fixture with such properties", "after": "running", "start_char_pos": 887, "end_char_pos": 940}, {"type": "R", "before": "^5) time ,", "after": "^3) time that produces a snapping fixture, minimizing the number of fingers and optimizing additional objectives,", "start_char_pos": 948, "end_char_pos": 958}, {"type": "R", "before": ", and", "after": ". We also provide", "start_char_pos": 988, "end_char_pos": 993}, {"type": "R", "before": "this algorithm", "after": "a simpler version of the algorithm, which produces the fixture model to be 3D printed and runs in O(n^4) time. We describe two applications with different optimization criteria: Fixtures to hold add-ons for drones, where we aim to make the fixture as lightweight as possible, and small-scale fixtures to hold precious stones in jewelry, where we aim to maximize the exposure of the stones, namely minimize the obscuring of the workpiece by the fixture", "start_char_pos": 1036, "end_char_pos": 1050}], "sents_char_pos": [0, 444, 723, 860]}
+{"doc_id": "1909.06527", "revision_depth": "2", "before_revision": "We focus on the problem of designing an artificial agent , capable of assisting a human user to complete a task. Our goal is to guide human users towards optimal task performance while keeping their cognitive load as low as possible. Our insight is that in order to do so , we should develop an understanding of human decision making for the task domain . In this work, we consider the domain of collaborative packing, and as a first step, we explore the mechanisms underlying human packing strategies. Specifically, we conducted a user study in which 100 human participants completed a series of packing tasks in a virtual environment. We analyzed their packing strategies and discovered that they exhibit specific spatial and temporal patterns (e.g., humans tend to place larger items into corners first) . We expect that imbuing an artificial agent with an understanding of such a spatiotemporal structure will enable improved assistance, which will be reflected in the task performance and human perception of the artificial agent . Ongoing work involves the development of a framework that incorporates the extracted insights to predict and manipulate human decision making towards an efficient trajectory of low cognitive load . A follow-up study will evaluate our framework against a set of baselines featuring distinct strategies of assistance. Our eventual goal is the deployment and evaluation of our framework on an autonomous robotic manipulator, actively assisting users on a packing task.", "after_revision": "We focus on the problem of designing an artificial agent (AI) , capable of assisting a human user to complete a task. Our goal is to guide human users towards optimal task performance while keeping their cognitive load as low as possible. Our insight is that doing so requires an understanding of human decision making for the task domain at hand . In this work, we consider the domain of collaborative packing, in which an AI agent provides placement recommendations to a human user. As a first step, we explore the mechanisms underlying human packing strategies. We conducted a user study in which 100 human participants completed a series of packing tasks in a virtual environment. We analyzed their packing strategies and discovered spatial and temporal patterns , such as that humans tend to place larger items at corners first . We expect that imbuing an artificial agent with an understanding of this spatiotemporal structure will enable improved assistance, which will be reflected in the task performance and the human perception of the AI . Ongoing work involves the development of a framework that incorporates the extracted insights to predict and manipulate human decision making towards an efficient trajectory of low cognitive load and high efficiency . A follow-up study will evaluate our framework against a set of baselines featuring alternative strategies of assistance. Our eventual goal is the deployment and evaluation of our framework on an autonomous robotic manipulator, actively assisting users on a packing task.", "edit_actions": [{"type": "A", "before": null, "after": "(AI)", "start_char_pos": 57, "end_char_pos": 57}, {"type": "R", "before": "in order to do so , we should develop", "after": "doing so requires", "start_char_pos": 255, "end_char_pos": 292}, {"type": "A", "before": null, "after": "at hand", "start_char_pos": 355, "end_char_pos": 355}, {"type": "R", "before": "and as a", "after": "in which an AI agent provides placement recommendations to a human user. As a", "start_char_pos": 421, "end_char_pos": 429}, {"type": "R", "before": "Specifically, we", "after": "We", "start_char_pos": 505, "end_char_pos": 521}, {"type": "D", "before": "that they exhibit specific", "after": null, "start_char_pos": 691, "end_char_pos": 717}, {"type": "R", "before": "(e.g.,", "after": ", such as that", "start_char_pos": 748, "end_char_pos": 754}, {"type": "R", "before": "into corners first)", "after": "at corners first", "start_char_pos": 789, "end_char_pos": 808}, {"type": "R", "before": "such a", "after": "this", "start_char_pos": 879, "end_char_pos": 885}, {"type": "A", "before": null, "after": "the", "start_char_pos": 996, "end_char_pos": 996}, {"type": "R", "before": "artificial agent", "after": "AI", "start_char_pos": 1021, "end_char_pos": 1037}, {"type": "A", "before": null, "after": "and high efficiency", "start_char_pos": 1236, "end_char_pos": 1236}, {"type": "R", "before": "distinct", "after": "alternative", "start_char_pos": 1322, "end_char_pos": 1330}], "sents_char_pos": [0, 113, 234, 357, 504, 638, 810, 1039, 1238, 1356]}
+{"doc_id": "1909.10139", "revision_depth": "1", "before_revision": "Prosocial behavior, which means paying a cost for others to receive a benefit, is encountered in the donation game, the prisoner's dilemma, relaxed social dilemmas, and public goods games. Many studies of prosociality assume that the population structure is either homogeneous, meaning all individuals have the same number of interaction partners, or that the social good is of one particular type. Here, we study general evolutionary dynamics for arbitrary kinds of social goods. We find that heterogeneous population structures, where some individuals have many more interaction partners than others, are extremely conducive for the evolution of prosocial behaviors. Furthermore, prosocial behaviors can evolve that accumulate most of the benefit in a few highly connected nodes while many peripheral nodes receive low or negative payoff. Surprisingly, prosociality can evolve even if the total costs exceed the total benefits. Therefore, the highly heterogeneous interaction structure of human society, which is augmented by the internet, strongly promotes the emergence of prosocial behaviors but also creates the possibility of generating tremendous inequality.", "after_revision": "Prosocial behaviors are encountered in the donation game, the prisoner's dilemma, relaxed social dilemmas, and public goods games. Many studies assume that the population structure is homogeneous, meaning all individuals have the same number of interaction partners, or that the social good is of one particular type. Here, we explore general evolutionary dynamics for arbitrary spatial structures and social goods. We find that heterogeneous networks, wherein some individuals have many more interaction partners than others, can enhance the evolution of prosocial behaviors. However, they often accumulate most of the benefits in the hands of a few highly-connected individuals, while many others receive low or negative payoff. Surprisingly, selection can favor producers of social goods even if the total costs exceed the total benefits. In summary, heterogeneous structures have the ability to strongly promote the emergence of prosocial behaviors , but they also create the possibility of generating large inequality.", "edit_actions": [{"type": "R", "before": "behavior, which means paying a cost for others to receive a benefit, is", "after": "behaviors are", "start_char_pos": 10, "end_char_pos": 81}, {"type": "D", "before": "of prosociality", "after": null, "start_char_pos": 202, "end_char_pos": 217}, {"type": "D", "before": "either", "after": null, "start_char_pos": 258, "end_char_pos": 264}, {"type": "R", "before": "study", "after": "explore", "start_char_pos": 408, "end_char_pos": 413}, {"type": "R", "before": "kinds of", "after": "spatial structures and", "start_char_pos": 458, "end_char_pos": 466}, {"type": "R", "before": "population structures, where", "after": "networks, wherein", "start_char_pos": 508, "end_char_pos": 536}, {"type": "R", "before": "are extremely conducive for", "after": "can enhance", "start_char_pos": 603, "end_char_pos": 630}, {"type": "R", "before": "Furthermore, prosocial behaviors can evolve that", "after": "However, they often", "start_char_pos": 669, "end_char_pos": 717}, {"type": "R", "before": "benefit in a few highly connected nodes while many peripheral nodes", "after": "benefits in the hands of a few highly-connected individuals, while many others", "start_char_pos": 741, "end_char_pos": 808}, {"type": "R", "before": "prosociality can evolve", "after": "selection can favor producers of social goods", "start_char_pos": 855, "end_char_pos": 878}, {"type": "R", "before": "Therefore, the highly heterogeneous interaction structure of human society, which is augmented by the internet, strongly promotes", "after": "In summary, heterogeneous structures have the ability to strongly promote", "start_char_pos": 930, "end_char_pos": 1059}, {"type": "R", "before": "but also creates", "after": ", but they also create", "start_char_pos": 1097, "end_char_pos": 1113}, {"type": "R", "before": "tremendous", "after": "large", "start_char_pos": 1144, "end_char_pos": 1154}], "sents_char_pos": [0, 188, 398, 480, 668, 840, 929]}
+{"doc_id": "1909.11211", "revision_depth": "1", "before_revision": "The menstrual cycle is a key indicator of overall health for women of reproductive age. Previously, the study of women's menstruation was done primarily through survey results; however, as mobile apps for menstrual tracking become more widely adopted, they provide an increasingly large, content-rich source of menstrual health experiences and behaviors over time. In this paper, we show that self-reported data from menstrual trackers can reveal statistically significant relationships between per-person variability of cycle length and self-reported qualitative symptoms. Specifically, we explore a database collected using the Clue app by Biowink GmbH of over 378,000 users and 4.9 million natural cycles of user-tracked observations across a wide range of categories to better understand variation of menstrual experience within and across individuals. A concern for self-tracked data is that these reflect not only physiological behaviors, but also the engagement dynamics of app users. We mitigate such potential artifacts by developing a procedure to exclude cycles lacking user engagement, thereby allowing us to better distinguish true menstrual patterns from tracking anomalies. We find that women located at different ends of the spectrum of menstrual patterns , based on the consistency of their cycle length statistics, exhibit statistically significant differences in cycle characteristics and symptom tracking . Our findings showcase the potential of longitudinal, high-resolution self-tracked data for an improved understanding of menstruation and women's health as a whole.", "after_revision": "The menstrual cycle is a key indicator of overall health for women of reproductive age. Previously, menstruation was primarily studied through survey results; however, as menstrual tracking mobile apps become more widely adopted, they provide an increasingly large, content-rich source of menstrual health experiences and behaviors over time. By exploring a database of user-tracked observations from the Clue app by BioWink of over 378,000 users and 4.9 million natural cycles, we show that self-reported menstrual tracker data can reveal statistically significant relationships between per-person cycle length variability and self-reported qualitative symptoms. A concern for self-tracked data is that they reflect not only physiological behaviors, but also the engagement dynamics of app users. To mitigate such potential artifacts , we develop a procedure to exclude cycles lacking user engagement, thereby allowing us to better distinguish true menstrual patterns from tracking anomalies. We uncover that women located at different ends of the menstrual variability spectrum , based on the consistency of their cycle length statistics, exhibit statistically significant differences in their cycle characteristics and symptom tracking patterns. We also find that cycle and period length statistics are stationary over the app usage timeline across the variability spectrum. The symptoms that we identify as showing statistically significant association with timing data can be useful to clinicians and users for predicting cycle variability from symptoms or as potential health indicators for conditions like endometriosis. Our findings showcase the potential of longitudinal, high-resolution self-tracked data to improve understanding of menstruation and women's health as a whole.", "edit_actions": [{"type": "R", "before": "the study of women's menstruation was done primarily", "after": "menstruation was primarily studied", "start_char_pos": 100, "end_char_pos": 152}, {"type": "R", "before": "mobile apps for menstrual tracking", "after": "menstrual tracking mobile apps", "start_char_pos": 189, "end_char_pos": 223}, {"type": "R", "before": "In this paper,", "after": "By exploring a database of user-tracked observations from the Clue app by BioWink of over 378,000 users and 4.9 million natural cycles,", "start_char_pos": 365, "end_char_pos": 379}, {"type": "R", "before": "data from menstrual trackers", "after": "menstrual tracker data", "start_char_pos": 407, "end_char_pos": 435}, {"type": "R", "before": "variability of cycle length", "after": "cycle length variability", "start_char_pos": 506, "end_char_pos": 533}, {"type": "D", "before": "Specifically, we explore a database collected using the Clue app by Biowink GmbH of over 378,000 users and 4.9 million natural cycles of user-tracked observations across a wide range of categories to better understand variation of menstrual experience within and across individuals.", "after": null, "start_char_pos": 574, "end_char_pos": 856}, {"type": "R", "before": "these", "after": "they", "start_char_pos": 897, "end_char_pos": 902}, {"type": "R", "before": "We", "after": "To", "start_char_pos": 992, "end_char_pos": 994}, {"type": "R", "before": "by developing", "after": ", we develop", "start_char_pos": 1029, "end_char_pos": 1042}, {"type": "R", "before": "find", "after": "uncover", "start_char_pos": 1192, "end_char_pos": 1196}, {"type": "R", "before": "spectrum of menstrual patterns", "after": "menstrual variability spectrum", "start_char_pos": 1241, "end_char_pos": 1271}, {"type": "A", "before": null, "after": "their", "start_char_pos": 1382, "end_char_pos": 1382}, {"type": "R", "before": ".", "after": "patterns. We also find that cycle and period length statistics are stationary over the app usage timeline across the variability spectrum. The symptoms that we identify as showing statistically significant association with timing data can be useful to clinicians and users for predicting cycle variability from symptoms or as potential health indicators for conditions like endometriosis.", "start_char_pos": 1426, "end_char_pos": 1427}, {"type": "R", "before": "for an improved", "after": "to improve", "start_char_pos": 1515, "end_char_pos": 1530}], "sents_char_pos": [0, 87, 176, 364, 573, 856, 991, 1188, 1427]}
+{"doc_id": "1909.12449", "revision_depth": "1", "before_revision": "Feedback of calcium signaling through calcium-activated potassium channels of a dendritic spine is investigated. To simulate such ion channels and the resulting spatial distribution of concentration, current, and membrane voltage within the dendritic spine , we applythe immersed boundary method with electrodiffusion . In this simulation method , the permeability to ion flow across the membrane is regulated by the amplitude of chemical potential barriers along the membrane . With spatially localized ion channels, chemical potential barriers are locally and stochastically regulated. This represents the ion channel gating with multiple subunits, the open and closed states of which are governed by a continuous-time Markov process. The model simulation recapitulates an inhibitory action on voltage-sensitive calcium channels by calcium-activated potassium channels in a stochastic manner with non-local feedback loop. The model also predicts higher calcium influx with more closely placed channel complexes, resolving a potential mechanism of differential calcium handling by \\emph{locality of channel distribution . This work provides a foundation for future computer simulation studies of dendritic spine motility and structural plasticity.", "after_revision": "We investigate calcium signaling feedback through calcium-activated potassium channels of a dendritic spine by applying the immersed boundary method with electrodiffusion. We simulate the stochastic gating of such ion channels and the resulting spatial distribution of concentration, current, and membrane voltage within the dendritic spine . In this simulation , the permeability to ionic flow across the membrane is regulated by the amplitude of chemical potential barriers . With spatially localized ion channels, chemical potential barriers are locally and stochastically regulated. This regulation represents the ion channel gating with multiple subunits, the open and closed states governed by a continuous-time Markov process. The model simulation recapitulates an inhibitory action on voltage-sensitive calcium channels by the calcium-activated potassium channels in a stochastic manner as a non-local feedback loop. The model predicts amplified calcium influx with more closely placed channel complexes, proposing a potential mechanism of differential calcium handling by \\emph{ channel distributions . This work provides a foundation for future computer simulation studies of dendritic spine motility and structural plasticity.", "edit_actions": [{"type": "R", "before": "Feedback of calcium signaling", "after": "We investigate calcium signaling feedback", "start_char_pos": 0, "end_char_pos": 29}, {"type": "R", "before": "is investigated. To simulate", "after": "by applying the immersed boundary method with electrodiffusion. We simulate the stochastic gating of", "start_char_pos": 96, "end_char_pos": 124}, {"type": "D", "before": ", we apply", "after": null, "start_char_pos": 257, "end_char_pos": 267}, {"type": "D", "before": "the immersed boundary method with electrodiffusion", "after": null, "start_char_pos": 267, "end_char_pos": 317}, {"type": "D", "before": "method", "after": null, "start_char_pos": 339, "end_char_pos": 345}, {"type": "R", "before": "ion", "after": "ionic", "start_char_pos": 368, "end_char_pos": 371}, {"type": "D", "before": "along the membrane", "after": null, "start_char_pos": 458, "end_char_pos": 476}, {"type": "A", "before": null, "after": "regulation", "start_char_pos": 593, "end_char_pos": 593}, {"type": "D", "before": "of which are", "after": null, "start_char_pos": 679, "end_char_pos": 691}, {"type": "A", "before": null, "after": "the", "start_char_pos": 835, "end_char_pos": 835}, {"type": "R", "before": "with", "after": "as a", "start_char_pos": 896, "end_char_pos": 900}, {"type": "R", "before": "also predicts higher", "after": "predicts amplified", "start_char_pos": 936, "end_char_pos": 956}, {"type": "R", "before": "resolving", "after": "proposing", "start_char_pos": 1016, "end_char_pos": 1025}, {"type": "D", "before": "locality", "after": null, "start_char_pos": 1090, "end_char_pos": 1098}, {"type": "R", "before": "of channel distribution", "after": "channel distributions", "start_char_pos": 1099, "end_char_pos": 1122}], "sents_char_pos": [0, 112, 319, 478, 587, 737, 925, 1124]}
+{"doc_id": "1909.12578", "revision_depth": "2", "before_revision": "We study a financial market where the risky asset is modelled by a Brownian motion driven stochastic differential equation with a local time in the drift term.This models a situation where the asset price is partially controlled by a company which intervenes when the price is reaching a certain lower barrier in order to prevent it from going below that barrier . See e.g. Jarrow \\& Protter \\mbox{%DIFAUXCMD JP for an explanation and discussion of this model . As already pointed out by Karatzas \\& Shreve \\mbox{%DIFAUXCMD KS0pt%DIFAUXCMD (see also Jarrow \\& Protter \\mbox{%DIFAUXCMD JP }0pt%DIFAUXCMD )} } this allows for arbitrages in the market. The model is also relevant for high frequency trading issues. See e.g. Lachapelle\\textit{et al \\mbox{%DIFAUXCMD \\cite{LLLL }\\hspace{0pt}%DIFAUXCMD and the references therein} . In this paper we consider the case when there is a delay \\theta> 0 in the information flow available for the trader. Using white noise calculus we compute explicitly the optimal consumption rate and portfolio in this case and we show that the maximal value is finite as long as \\theta> 0. This implies that there is no arbitrage in the market in that case. However, when \\theta goes to 0, the value goes to infinity. This is in agreement with the above result that is an arbitrage when there is no delay } .", "after_revision": "We study a financial market where the risky asset is modelled by a geometric It\\^o-L\\'evy process, with a singular drift term.This can for example model a situation where the asset price is partially controlled by a company which intervenes when the price is reaching a certain lower barrier . See e.g. Jarrow Protter JP for an explanation and discussion of this model in the Brownian motion case . As already pointed out by Karatzas 0pt%DIFAUXCMD (see also Jarrow \\& Protter \\mbox{%DIFAUXCMD JP }0pt%DIFAUXCMD )} Shreve KS} (in the Brownian motion case), this allows for arbitrages in the market. \\textit{ }\\hspace{0pt}%DIFAUXCMD and the references therein} However, the situation in the case of jumps is not clear. Moreover, it is not clear what happens if there is a delay in the system . In this paper we consider a jump diffusion market model with a singular drift term modelled as the local time of a given process, and with a delay \\theta> 0 in the information flow available for the trader. Using white noise calculus we compute explicitly the optimal consumption rate and portfolio in this case and we show that the maximal value is finite as long as \\theta> 0. This implies that there is no arbitrage in the market in that case. However, when \\theta goes to 0, the value goes to infinity. This is in agreement with the above result that is an arbitrage when there is no delay . Our model is also relevant for high frequency trading issues. See e.g. Lachapelle et al LLLL} and the references therein .", "edit_actions": [{"type": "R", "before": "Brownian motion driven stochastic differential equation with a local time in the", "after": "geometric It\\^o-L\\'evy process, with a singular", "start_char_pos": 67, "end_char_pos": 147}, {"type": "R", "before": "models", "after": "can for example model", "start_char_pos": 164, "end_char_pos": 170}, {"type": "D", "before": "in order to prevent it from going below that barrier", "after": null, "start_char_pos": 310, "end_char_pos": 362}, {"type": "R", "before": "\\& Protter \\mbox{%DIFAUXCMD JP", "after": "Protter", "start_char_pos": 381, "end_char_pos": 411}, {"type": "A", "before": null, "after": "JP", "start_char_pos": 412, "end_char_pos": 412}, {"type": "A", "before": null, "after": "in the Brownian motion case", "start_char_pos": 461, "end_char_pos": 461}, {"type": "D", "before": "\\& Shreve \\mbox{%DIFAUXCMD KS", "after": null, "start_char_pos": 499, "end_char_pos": 528}, {"type": "A", "before": null, "after": "Shreve", "start_char_pos": 608, "end_char_pos": 608}, {"type": "A", "before": null, "after": "KS", "start_char_pos": 609, "end_char_pos": 609}, {"type": "A", "before": null, "after": "(in the Brownian motion case),", "start_char_pos": 611, "end_char_pos": 611}, {"type": "D", "before": "The model is also relevant for high frequency trading issues. See e.g. Lachapelle", "after": null, "start_char_pos": 654, "end_char_pos": 735}, {"type": "D", "before": "et al", "after": null, "start_char_pos": 743, "end_char_pos": 748}, {"type": "D", "before": "\\mbox{%DIFAUXCMD \\cite{LLLL", "after": null, "start_char_pos": 749, "end_char_pos": 776}, {"type": "A", "before": null, "after": "However, the situation in the case of jumps is not clear. Moreover, it is not clear what happens if there is a delay in the system", "start_char_pos": 829, "end_char_pos": 829}, {"type": "R", "before": "the case when there is a", "after": "a jump diffusion market model with a singular drift term modelled as the local time of a given process, and with a", "start_char_pos": 858, "end_char_pos": 882}, {"type": "A", "before": null, "after": ". Our model is also relevant for high frequency trading issues. See e.g. Lachapelle et al", "start_char_pos": 1336, "end_char_pos": 1336}, {"type": "A", "before": null, "after": "LLLL", "start_char_pos": 1337, "end_char_pos": 1337}, {"type": "A", "before": null, "after": "and the references therein", "start_char_pos": 1339, "end_char_pos": 1339}], "sents_char_pos": [0, 159, 364, 463, 653, 715, 831, 948, 1120, 1188, 1248]}
+{"doc_id": "1910.01490", "revision_depth": "1", "before_revision": " Hutchinson, Lo and Poggio raised the question that if learning works can learn the Black-Scholes formula, and they proposed the network mapping the ratio of underlying price to strike S_t/K and the\\to time to maturity \\tau directly into the ratio of option priceto strike C_t/K . In this paper we propose a novel descision function and study the network mapping S_t/K and%DIFDELCMD < \\tauinto %%% the ratio of time value to strike\\to V_t/K . Time values' appearance in artificial intelligence fits into traders' natural intelligence. Empirical experiments will be carried out to demonstrate that it significantly improves Hutchinson-Lo-Poggio's original model by faster learning and better generalization performance. In order to take a conceptual viewpoint and to prove that V_t/K but not C_t/K can be approximated by superpositions of logistic functions on its domain of definition, we work on the theory of universal approximation on unbounded domains. We prove some general results which imply that an artificial neural network with a single hidden layer and sigmoid activation represents no function in L^{p(}%DIFDELCMD < \\RR%%% ^2 \\times 0, 1%DIFDELCMD < ]%%% ^{n neural network with a single hidden layer and logistic activation is a universal approximator of L^{2}( %DIFDELCMD < \\RR %%% \\times [0, 1] ^{n^+ \\times } [0, 1] ^{n .", "after_revision": "The mathematical theory of neural networks is ``meant to tell us what is possible and, sometimes equally importantly, what is not.\" This paper contributes a case that fits into this principle. We propose that \"option price or time value\" is a natural hyperparameter in the design of neural network option models. Hutchinson, Lo and Poggio asked the question that if learning networks can learn the Black-Scholes formula, and they studied the network ( S_t/K , \\tau)\\to C_t/K where S_t, K, \\tau, C_t are the underlying price, strike, time to maturity and option price . In this paper we propose a novel decision function and study the network ( S_t/K %DIFDELCMD < \\tauinto %%% , \\tau)\\to V_t/K where V_t is the time value. Empirical experiments will be carried out to demonstrate that this new decision function significantly improves Hutchinson-Lo-Poggio's model by faster learning and better generalization performance. (}%DIFDELCMD < \\RR%%% %DIFDELCMD < ]%%% We prove that a shallow neural network with the logistic activation is a universal approximator in L^{2}( %DIFDELCMD < \\RR %%% \\mathbb{R \\times [0, 1] ). As a corollary V_t/K but not C_t/K can be approximated by superpositions of logistic functions on \\mathbb{R^+ \\times } [0, 1] . This justifies the benefit of time value oriented decision functions in option pricing models .", "edit_actions": [{"type": "A", "before": null, "after": "The mathematical theory of neural networks is ``meant to tell us what is possible and, sometimes equally importantly, what is not.\" This paper contributes a case that fits into this principle. We propose that \"option price or time value\" is a natural hyperparameter in the design of neural network option models.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "raised", "after": "asked", "start_char_pos": 27, "end_char_pos": 33}, {"type": "R", "before": "works", "after": "networks", "start_char_pos": 64, "end_char_pos": 69}, {"type": "R", "before": "proposed the network mapping the ratio of underlying price to strike", "after": "studied the network (", "start_char_pos": 116, "end_char_pos": 184}, {"type": "R", "before": "and the", "after": ", \\tau)", "start_char_pos": 191, "end_char_pos": 198}, {"type": "A", "before": null, "after": "C_t/K where S_t, K, \\tau, C_t are the underlying price, strike,", "start_char_pos": 202, "end_char_pos": 202}, {"type": "R", "before": "\\tau directly into the ratio of option priceto strike C_t/K", "after": "and option price", "start_char_pos": 220, "end_char_pos": 279}, {"type": "R", "before": "descision", "after": "decision", "start_char_pos": 315, "end_char_pos": 324}, {"type": "R", "before": "mapping", "after": "(", "start_char_pos": 356, "end_char_pos": 363}, {"type": "D", "before": "and", "after": null, "start_char_pos": 370, "end_char_pos": 373}, {"type": "R", "before": "the ratio of time value to strike", "after": ", \\tau)", "start_char_pos": 399, "end_char_pos": 432}, {"type": "R", "before": ". Time values' appearance in artificial intelligence fits into traders' natural intelligence.", "after": "where V_t is the time value.", "start_char_pos": 442, "end_char_pos": 535}, {"type": "R", "before": "it", "after": "this new decision function", "start_char_pos": 598, "end_char_pos": 600}, {"type": "D", "before": "original", "after": null, "start_char_pos": 647, "end_char_pos": 655}, {"type": "D", "before": "In order to take a conceptual viewpoint and to prove that V_t/K but not C_t/K can be approximated by superpositions of logistic functions on its domain of definition, we work on the theory of universal approximation on unbounded domains. We prove some general results which imply that an artificial neural network with a single hidden layer and sigmoid activation represents no function in L^{p", "after": null, "start_char_pos": 720, "end_char_pos": 1114}, {"type": "D", "before": "^2 \\times", "after": null, "start_char_pos": 1136, "end_char_pos": 1145}, {"type": "D", "before": "0, 1", "after": null, "start_char_pos": 1146, "end_char_pos": 1150}, {"type": "R", "before": "^{n", "after": "We prove that a shallow", "start_char_pos": 1168, "end_char_pos": 1171}, {"type": "R", "before": "a single hidden layer and", "after": "the", "start_char_pos": 1192, "end_char_pos": 1217}, {"type": "R", "before": "of", "after": "in", "start_char_pos": 1266, "end_char_pos": 1268}, {"type": "A", "before": null, "after": "\\mathbb{R", "start_char_pos": 1297, "end_char_pos": 1297}, {"type": "R", "before": "^{n", "after": "). As a corollary V_t/K but not C_t/K can be approximated by superpositions of logistic functions on \\mathbb{R", "start_char_pos": 1312, "end_char_pos": 1315}, {"type": "R", "before": "^{n", "after": ". This justifies the benefit of time value oriented decision functions in option pricing models", "start_char_pos": 1334, "end_char_pos": 1337}], "sents_char_pos": [0, 456, 535, 719, 957]}
+{"doc_id": "1910.03337", "revision_depth": "2", "before_revision": " Discovering functional modules in protein-protein interaction networks through optimization remains a longstanding challenge in Biology . Traditional algorithms simply consider strong protein complexes that can be found in the original network by optimizing some metric, which may cause obstacles for the discovery of weak and hidden complexes that are overshadowed by strong complexes. Additionally , protein complexes not only have different densities but also a various range of scales, making them extremely difficult to be detected. We address these issues and propose a hierarchical hidden community detection approach to accurately predict protein complexes of various strengths and scales. We propose a meta-method called HirHide (Hierarchical Hidden Community Detection), which can adopt any standard community detection method as the base algorithm and enable it to discover hierarchical hidden communities as well as boosting the detection on hierarchical strong communities. To our knowledge, this is the first combination of hierarchical structure with hidden structure, which provides a new perspective for finding protein complexes of various strengths and scales . We compare the performance of several standard community detection methods with their HirHide versions. Experimental results show that the HirHide versions achieve better performance and sometimes even significantly outperform the baselines.", "after_revision": "Motivation: Discovering functional modules in protein-protein interaction (PPI) networks by optimization methods remains a longstanding challenge in biology . Traditional algorithms simply consider strong protein complexes that can be found in the original network by optimizing some metrics, which causes obstacles for the discovery of weak and hidden complexes shielded by stronger complexes. Also , protein complexes are not only in different density but also in a large range of scale, making it extremely difficult to be detected. Toward this objective, we propose a hierarchical hidden community approach to predict protein complexes . Results: We propose a method called HirHide (Hierarchical Hidden Community Detection), which can be combined with traditional community detection methods to enable them to discover hierarchical hidden communities . It is the first community detection algorithm that can find a hierarchical structure as well as hidden structure . We compare the performance of three traditional methods with their HirHide versions. Experimental results show that the HirHide methods using traditional methods as the base algorithms achieve better performance , sometimes even significantly outperform the baselines.", "edit_actions": [{"type": "A", "before": null, "after": "Motivation:", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "networks through optimization", "after": "(PPI) networks by optimization methods", "start_char_pos": 63, "end_char_pos": 92}, {"type": "R", "before": "Biology", "after": "biology", "start_char_pos": 129, "end_char_pos": 136}, {"type": "R", "before": "metric, which may cause", "after": "metrics, which causes", "start_char_pos": 264, "end_char_pos": 287}, {"type": "R", "before": "that are overshadowed by strong complexes. Additionally", "after": "shielded by stronger complexes. Also", "start_char_pos": 345, "end_char_pos": 400}, {"type": "R", "before": "not only have different densities but also a various range of scales, making them", "after": "are not only in different density but also in a large range of scale, making it", "start_char_pos": 421, "end_char_pos": 502}, {"type": "R", "before": "We address these issues and", "after": "Toward this objective, we", "start_char_pos": 539, "end_char_pos": 566}, {"type": "R", "before": "detection approach to accurately", "after": "approach to", "start_char_pos": 607, "end_char_pos": 639}, {"type": "R", "before": "of various strengths and scales.", "after": ". Results:", "start_char_pos": 666, "end_char_pos": 698}, {"type": "R", "before": "meta-method", "after": "method", "start_char_pos": 712, "end_char_pos": 723}, {"type": "R", "before": "adopt any standard community detection method as the base algorithm and enable it", "after": "be combined with traditional community detection methods to enable them", "start_char_pos": 792, "end_char_pos": 873}, {"type": "R", "before": "as well as boosting the detection on hierarchical strong communities. To our knowledge, this", "after": ". It", "start_char_pos": 918, "end_char_pos": 1010}, {"type": "R", "before": "combination of hierarchical structure with hidden structure, which provides a new perspective for finding protein complexes of various strengths and scales", "after": "community detection algorithm that can find a hierarchical structure as well as hidden structure", "start_char_pos": 1024, "end_char_pos": 1179}, {"type": "R", "before": "several standard community detection", "after": "three traditional", "start_char_pos": 1212, "end_char_pos": 1248}, {"type": "R", "before": "versions", "after": "methods using traditional methods as the base algorithms", "start_char_pos": 1329, "end_char_pos": 1337}, {"type": "R", "before": "and", "after": ",", "start_char_pos": 1365, "end_char_pos": 1368}], "sents_char_pos": [0, 138, 387, 538, 698, 987, 1181, 1285]}
+{"doc_id": "1910.07747", "revision_depth": "1", "before_revision": "In recent , deep learning-based feature representation methods have shown a promising impact in electroencephalography (EEG)-based brain-computer interface (BCI). Nonetheless, due to high intra- and inter-subject variabilities, many studies on decoding EEG were designed in a subject-specific manner by using calibration samples, with no much concern on its less practical, time-consuming, and data-hungry process. To tackle this problem, recent studies took advantage of transfer learning, especially using domain adaptation techniques . However, there still remain two challenging limitations ; i) most domain adaptation methods are designed for labeled source and unlabeled target domain whereas BCI tasks generally have multiple annotated domains. ii) most of the methods do not consider negatively transferable to disrupt generalization ability. In this paper, we propose a novel network architecture to tackle those limitations by estimating mutual information in high-level representation and low-level representation, separately . Specifically, our proposed method extracts domain-invariant and class-relevant features, thereby enhancing generalizability in classification across . It is also noteworthy that our method can be applicable to a new subject with a small amount of data via a fine-tuning, step only, reducing calibration time for practical uses. We validated our proposed method on a big motor imagery EEG dataset by showing promising results, compared to competing methodsconsidered in our experiments .", "after_revision": "In recent years , deep learning-based feature representation methods have shown a promising impact in electroencephalography (EEG)-based brain-computer interface (BCI). Nonetheless, there still exist BCI-illiterate subjects who struggle to use BCI systems, showing high intra-subject variabilities. Several methods have been proposed to enhance their performance via transfer learning. In such a case, high inter- and intrasubject variabilities are the points to be considered. Transfer learning, especially as a domain adaptation technique, has drawn increasing attention in various fields . However, the adaptation of approaches into BCI faces two challenging limitations . (i) Most domain adaptation methods are designed for labeled source and unlabeled target domain whereas BCI tasks generally have multiple annotated domains. (ii) Most of the existing methods do not consider a negative transfer to disrupt generalization ability. In this paper, we propose a novel network architecture to tackle these limitations by estimating mutual information in high- and low-level representations regardless of the domain that is considered as a subject in this paper . Specifically, our proposed method extracts subject-invariant and class-relevant features, thereby enhancing generalizability in overall classification . It is also noteworthy that our method can be applicable to a new subject with a small amount of data via fine-tuning, thus reducing calibration time for its practical uses. We validated our proposed method on two large motor imagery EEG datasets via comparisons with other competing methods .", "edit_actions": [{"type": "A", "before": null, "after": "years", "start_char_pos": 10, "end_char_pos": 10}, {"type": "R", "before": "due to", "after": "there still exist BCI-illiterate subjects who struggle to use BCI systems, showing high intra-subject variabilities. Several methods have been proposed to enhance their performance via transfer learning. In such a case,", "start_char_pos": 177, "end_char_pos": 183}, {"type": "R", "before": "intra- and inter-subject variabilities, many studies on decoding EEG were designed in a subject-specific manner by using calibration samples, with no much concern on its less practical, time-consuming, and data-hungry process. To tackle this problem, recent studies took advantage of transfer", "after": "inter- and intrasubject variabilities are the points to be considered. Transfer", "start_char_pos": 189, "end_char_pos": 481}, {"type": "R", "before": "using domain adaptation techniques", "after": "as a domain adaptation technique, has drawn increasing attention in various fields", "start_char_pos": 503, "end_char_pos": 537}, {"type": "R", "before": "there still remain", "after": "the adaptation of approaches into BCI faces", "start_char_pos": 549, "end_char_pos": 567}, {"type": "R", "before": "; i) most", "after": ". (i) Most", "start_char_pos": 596, "end_char_pos": 605}, {"type": "R", "before": "ii) most of the", "after": "(ii) Most of the existing", "start_char_pos": 753, "end_char_pos": 768}, {"type": "R", "before": "negatively transferable", "after": "a negative transfer", "start_char_pos": 793, "end_char_pos": 816}, {"type": "R", "before": "those", "after": "these", "start_char_pos": 917, "end_char_pos": 922}, {"type": "R", "before": "high-level representation", "after": "high-", "start_char_pos": 971, "end_char_pos": 996}, {"type": "R", "before": "representation, separately", "after": "representations regardless of the domain that is considered as a subject in this paper", "start_char_pos": 1011, "end_char_pos": 1037}, {"type": "R", "before": "domain-invariant", "after": "subject-invariant", "start_char_pos": 1083, "end_char_pos": 1099}, {"type": "R", "before": "classification across", "after": "overall classification", "start_char_pos": 1167, "end_char_pos": 1188}, {"type": "D", "before": "a", "after": null, "start_char_pos": 1296, "end_char_pos": 1297}, {"type": "R", "before": "step only,", "after": "thus", "start_char_pos": 1311, "end_char_pos": 1321}, {"type": "A", "before": null, "after": "its", "start_char_pos": 1352, "end_char_pos": 1352}, {"type": "R", "before": "a big", "after": "two large", "start_char_pos": 1405, "end_char_pos": 1410}, {"type": "R", "before": "dataset by showing promising results, compared to competing methodsconsidered in our experiments", "after": "datasets via comparisons with other competing methods", "start_char_pos": 1429, "end_char_pos": 1525}], "sents_char_pos": [0, 163, 415, 539, 597, 851, 1039, 1190, 1368]}
+{"doc_id": "1910.10476", "revision_depth": "1", "before_revision": "In dominant livestock systems of Sahelian countries herds have to move across the territories. Their mobility is often source of conflict with farmers of the crossed areas , and engender the spread of diseases such as Rift Valley Fever. Knowledge of the routes followed by herds is therefore central to guide the implementation of preventive and control measures for transboundary animal diseases, land use planning and conflict management. However, the lack of quantitative data on livestock movements, together with the high temporal and spatial variability of herd movements, has so far hampered the production of fine resolution maps of passage of animals . This paper proposes a general framework for mapping potential paths for livestock movements and identify areas of high potential of animal passage for these movements. The method consists in coupling the information contained in livestock mobility network with landscape connectivity based on different mobility conductance layers. We illustrate our approach with a livestock mobility network in Senegal and Mauritania in dry and wet seasons in 2014.", "after_revision": "In the dominant livestock systems of Sahelian countries herds have to move across territories. Their mobility is often a source of conflict with farmers in the areas crossed, and helps spread diseases such as Rift Valley Fever. Knowledge of the routes followed by herds is therefore core to guiding the implementation of preventive and control measures for transboundary animal diseases, land use planning and conflict management. However, the lack of quantitative data on livestock movements, together with the high temporal and spatial variability of herd movements, has so far hampered the production of fine resolution maps of animal movements . This paper proposes a general framework for mapping potential paths for livestock movements and identifying areas of high animal passage potential for those movements. The method consists in combining the information contained in livestock mobility networks with landscape connectivity , based on different mobility conductance layers. We illustrate our approach with a livestock mobility network in Senegal and Mauritania in the 2014 dry and wet seasons .", "edit_actions": [{"type": "A", "before": null, "after": "the", "start_char_pos": 3, "end_char_pos": 3}, {"type": "D", "before": "the", "after": null, "start_char_pos": 79, "end_char_pos": 82}, {"type": "A", "before": null, "after": "a", "start_char_pos": 120, "end_char_pos": 120}, {"type": "R", "before": "of the crossed areas , and engender the spread of", "after": "in the areas crossed, and helps spread", "start_char_pos": 153, "end_char_pos": 202}, {"type": "R", "before": "central to guide", "after": "core to guiding", "start_char_pos": 294, "end_char_pos": 310}, {"type": "R", "before": "passage of animals", "after": "animal movements", "start_char_pos": 643, "end_char_pos": 661}, {"type": "R", "before": "identify", "after": "identifying", "start_char_pos": 760, "end_char_pos": 768}, {"type": "R", "before": "potential of animal passage for these", "after": "animal passage potential for those", "start_char_pos": 783, "end_char_pos": 820}, {"type": "R", "before": "coupling", "after": "combining", "start_char_pos": 855, "end_char_pos": 863}, {"type": "R", "before": "network", "after": "networks", "start_char_pos": 912, "end_char_pos": 919}, {"type": "A", "before": null, "after": ",", "start_char_pos": 948, "end_char_pos": 948}, {"type": "A", "before": null, "after": "the 2014", "start_char_pos": 1087, "end_char_pos": 1087}, {"type": "R", "before": "in 2014.", "after": ".", "start_char_pos": 1108, "end_char_pos": 1116}], "sents_char_pos": [0, 95, 238, 442, 663, 831, 996]}
+{"doc_id": "1911.00739", "revision_depth": "1", "before_revision": "The growth process of fungal hyphae involves transport of nutrients from the sub-apical region of the fungus to the growing tip of hyphae. At the tip domain, the URLanelle -Spitzenkorper uses the nutrients that are packaged as membrane bound vesicles to synthesize fresh cell wall. This in turn leads to elongation and branching of the hyphae and formation of a single colony mycelium. We propose a driven lattice gas model which incorporates the processes of vesicle supply dependent linear extension and branching of the tips of the hyphae, apart from process of motor driven transport of vesicles along the hyphae towards the growing tips . We first analyze the growth and transport process in the primary hypha which is subject to particle loss due to presence of branching sites. We show that the spatial profile of vesicles along the growing lattice is an exponential distribution, while the length grows logarithmically with time. We also obtain the probability distribution of length of the hypha , and find that it tends to a Gaussian distribution function at late times. In contrast, we find that probability distribution function of the time required for growth to a specific length is a broad log-normal distribution. We simulate the resultant 2-d morphology generated by the growing primary lattice , quantifying the motility behavior and morphological characteristics of the colony in terms of measures such as the Center of Mass, Radius of Gyration and Aspect Ratio . Analysis of the temporal behavior and morphological characteristics of the resultant 2-d morphology reveals a wide variability of these characteristics which depend on the input parameters which characterize the branching and elongation dynamics of the individual hyphae. We make quantitative comparison of the predictions of our model with experiments .", "after_revision": "We present a minimal driven lattice gas model which generates the morphological characteristics associated with single colony mycelium arising from the growth and branching process of fungal hyphae, which is fed by a single source of nutrients . We first analyze the growth and transport process in the primary hypha modeled as a growing 1-d lattice, which is subject to particle (vesicle) loss due to presence of dynamically created branching sites. We show that the spatial profile of vesicles along the growing lattice is an exponential distribution, while the length grows logarithmically with time. We also find that the probability distribution of length of the hypha tends to a Gaussian distribution function at late times. In contrast, the probability distribution function of the time required for growth to a specific length tends to a broad log-normal distribution. We simulate the resultant 2-d morphology generated by the growing primary hypha , quantifying the motility behavior and morphological characteristics of the colony . Analysis of the temporal behavior and morphological characteristics of the resultant 2-d morphology reveals a wide variability of these characteristics which depend on the input parameters which characterize the branching and elongation dynamics of the hyphae. By calibrating the input parameters for our model, we make some quantitative comparison of the predictions of our model with the observed experimental growth characteristics of fungal hyphae and the morphological characteristics of single colony fungal mycelium .", "edit_actions": [{"type": "R", "before": "The growth process of fungal hyphae involves transport of nutrients from the sub-apical region of the fungus to the growing tip of hyphae. At the tip domain, the URLanelle -Spitzenkorper uses the nutrients that are packaged as membrane bound vesicles to synthesize fresh cell wall. This in turn leads to elongation and branching of the hyphae and formation of a single colony mycelium. We propose a", "after": "We present a minimal", "start_char_pos": 0, "end_char_pos": 398}, {"type": "R", "before": "incorporates the processes of vesicle supply dependent linear extension and branching of the tips of the hyphae, apart from process of motor driven transport of vesicles along the hyphae towards the growing tips", "after": "generates the morphological characteristics associated with single colony mycelium arising from the growth and branching process of fungal hyphae, which is fed by a single source of nutrients", "start_char_pos": 430, "end_char_pos": 641}, {"type": "A", "before": null, "after": "modeled as a growing 1-d lattice,", "start_char_pos": 715, "end_char_pos": 715}, {"type": "A", "before": null, "after": "(vesicle)", "start_char_pos": 745, "end_char_pos": 745}, {"type": "A", "before": null, "after": "dynamically created", "start_char_pos": 770, "end_char_pos": 770}, {"type": "R", "before": "obtain", "after": "find that", "start_char_pos": 949, "end_char_pos": 955}, {"type": "D", "before": ", and find that it", "after": null, "start_char_pos": 1008, "end_char_pos": 1026}, {"type": "R", "before": "we find that", "after": "the", "start_char_pos": 1097, "end_char_pos": 1109}, {"type": "R", "before": "is", "after": "tends to", "start_char_pos": 1197, "end_char_pos": 1199}, {"type": "R", "before": "lattice", "after": "hypha", "start_char_pos": 1307, "end_char_pos": 1314}, {"type": "D", "before": "in terms of measures such as the Center of Mass, Radius of Gyration and Aspect Ratio", "after": null, "start_char_pos": 1399, "end_char_pos": 1483}, {"type": "R", "before": "individual hyphae. We make", "after": "hyphae. By calibrating the input parameters for our model, we make some", "start_char_pos": 1739, "end_char_pos": 1765}, {"type": "R", "before": "experiments", "after": "the observed experimental growth characteristics of fungal hyphae and the morphological characteristics of single colony fungal mycelium", "start_char_pos": 1827, "end_char_pos": 1838}], "sents_char_pos": [0, 138, 281, 385, 643, 787, 940, 1083, 1232, 1485, 1757]}
+{"doc_id": "1911.02095", "revision_depth": "1", "before_revision": "The rapid growth in biological sequence data is revolutionizing our understanding of genotypic diversity and challenging conventional approaches to informatics. Due to increasing availability of genomic data, traditional bioinformatic tools require substantial computational time and creation of ever larger indices each time a researcher seeks to gain insight from the data. To address these challenges, we pre-compute important relationships between biological entities and capture this information in a relational database. The database can be queried across millions of entities and returns results in a fraction of the time required by traditional methods. In this paper, we describeOMXWare , a comprehensive database relating genotype to phenotype for bacterial life. Continually updated, OMXWare today contains data derived from 200,000 curated, self-consistently assembled genomes. The database stores functional data for over 68 million genes, 52 million proteins, and 239 million domains with associated biological activity annotations from GeneOntology , KEGG, MetaCyc, and Reactome. OMXWare maps connections between each biological entity including the originating genome, gene, protein, and protein domain. Various microbial studies, from infectious disease to environmental health, can benefit from the rich data and relationships within OMXWare . We describe the data selection, the pipeline to create and update OMXWare, and developer tools (Python SDK and Rest APIs) which allow researchers to efficiently study microbial life at scale.", "after_revision": "The rapid growth in biological sequence data is revolutionizing our understanding of genotypic diversity and challenging conventional approaches to informatics. With the increasing availability of genomic data, traditional bioinformatic tools require substantial computational time and the creation of ever-larger indices each time a researcher seeks to gain insight from the data. To address these challenges, we pre-computed important relationships between biological entities spanning the Central Dogma of Molecular Biology and captured this information in a relational database. The database can be queried across hundreds of millions of entities and returns results in a fraction of the time required by traditional methods. In this paper, we describeIBM Functional Genomics Platform (formerly known as OMXWare) , a comprehensive database relating genotype to phenotype for bacterial life. Continually updated, IBM Functional Genomics Platform today contains data derived from 200,000 curated, self-consistently assembled genomes. The database stores functional data for over 68 million genes, 52 million proteins, and 239 million domains with associated biological activity annotations from Gene Ontology , KEGG, MetaCyc, and Reactome. IBM Functional Genomics Platform maps all of the many-to-many connections between each biological entity including the originating genome, gene, protein, and protein domain. Various microbial studies, from infectious disease to environmental health, can benefit from the rich data and connections . We describe the data selection, the pipeline to create and update the IBM Functional Genomics Platform, and the developer tools (Python SDK and REST APIs) which allow researchers to efficiently study microbial life at scale.", "edit_actions": [{"type": "R", "before": "Due to", "after": "With the", "start_char_pos": 161, "end_char_pos": 167}, {"type": "R", "before": "creation of ever larger", "after": "the creation of ever-larger", "start_char_pos": 284, "end_char_pos": 307}, {"type": "R", "before": "pre-compute", "after": "pre-computed", "start_char_pos": 408, "end_char_pos": 419}, {"type": "R", "before": "and capture", "after": "spanning the Central Dogma of Molecular Biology and captured", "start_char_pos": 472, "end_char_pos": 483}, {"type": "A", "before": null, "after": "hundreds of", "start_char_pos": 562, "end_char_pos": 562}, {"type": "R", "before": "describeOMXWare", "after": "describe", "start_char_pos": 681, "end_char_pos": 696}, {"type": "A", "before": null, "after": "IBM Functional Genomics Platform", "start_char_pos": 696, "end_char_pos": 696}, {"type": "A", "before": null, "after": "(formerly known as OMXWare)", "start_char_pos": 697, "end_char_pos": 697}, {"type": "R", "before": "OMXWare", "after": "IBM Functional Genomics Platform", "start_char_pos": 797, "end_char_pos": 804}, {"type": "R", "before": "GeneOntology", "after": "Gene Ontology", "start_char_pos": 1053, "end_char_pos": 1065}, {"type": "R", "before": "OMXWare maps", "after": "IBM Functional Genomics Platform maps all of the many-to-many", "start_char_pos": 1097, "end_char_pos": 1109}, {"type": "R", "before": "relationships within OMXWare", "after": "connections", "start_char_pos": 1333, "end_char_pos": 1361}, {"type": "R", "before": "OMXWare, and", "after": "the IBM Functional Genomics Platform, and the", "start_char_pos": 1430, "end_char_pos": 1442}, {"type": "R", "before": "Rest", "after": "REST", "start_char_pos": 1475, "end_char_pos": 1479}], "sents_char_pos": [0, 160, 375, 526, 662, 775, 891, 1096, 1221, 1363]}
+{"doc_id": "1911.04848", "revision_depth": "1", "before_revision": "This paper presents an expert-guided Mixed-Initiative (MI) variable-autonomy controller for remotely operated mobile robots. The controller enables switching between different Level(s) of Autonomy (LOA) during task execution initiated by either the human operator or/andthe robot. The controller is evaluated in two Search and Rescue (SAR) inspired experiments, one with a simulated robot and test arena and one with a real robot in a realistic environment. Our hypothesis is that timely switching between different LOAs will enable the system to overcome various performance degrading factors and thus enable superior performance compared to systems in which LOAs cannot switch on-the-fly. Statistically validated analyses from the two experiments provide evidence that: a) Human-Initiative (HI) systems outperform purely teleoperated or autonomous systems in navigation tasks; b) MI systems provide improved performance in navigation tasks, improved operator performance in cognitive demanding secondary tasks, and improved operator workload . Results also reinforce previous Human-Robot interaction (HRI) evidence regarding the importance of the operator's personality traits and their trust in the autonomous system. Lastly, the paper provides empirical evidence that identify two major challenges for MI control: a) the design of context-aware MI controllers ; and b) the conflict for control between the robot and the operator .", "after_revision": "This paper presents an Expert-guided Mixed-Initiative Control Switcher (EMICS) for remotely operated mobile robots. The EMICS enables switching between different levels of autonomy during task execution initiated by either the human operator and/or the EMICS. The EMICS is evaluated in two disaster response inspired experiments, one with a simulated robot and test arena , and one with a real robot in a realistic environment. Analyses from the two experiments provide evidence that: a) Human-Initiative (HI) systems outperform systems with single modes of operation, such as pure teleoperation, in navigation tasks; b) in the context of the simulated robot experiment, Mixed-Initiative (MI) systems provide improved performance in navigation tasks, improved operator performance in cognitive demanding secondary tasks, and improved operator workload compared to HI . Results also reinforce previous human-robot interaction evidence regarding the importance of the operator's personality traits and their trust in the autonomous system. Lastly, our experiment on a physical robot provides empirical evidence that identify two major challenges for MI control: a) the design of context-aware MI control systems ; and b) the conflict for control between the robot 's MI control system and the operator . Insights regarding these challenges are discussed and ways to tackle them are proposed .", "edit_actions": [{"type": "R", "before": "expert-guided", "after": "Expert-guided", "start_char_pos": 23, "end_char_pos": 36}, {"type": "R", "before": "(MI) variable-autonomy controller", "after": "Control Switcher (EMICS)", "start_char_pos": 54, "end_char_pos": 87}, {"type": "R", "before": "controller", "after": "EMICS", "start_char_pos": 129, "end_char_pos": 139}, {"type": "R", "before": "Level(s) of Autonomy (LOA)", "after": "levels of autonomy", "start_char_pos": 176, "end_char_pos": 202}, {"type": "R", "before": "or/andthe robot. The controller", "after": "and/or the EMICS. The EMICS", "start_char_pos": 264, "end_char_pos": 295}, {"type": "R", "before": "Search and Rescue (SAR)", "after": "disaster response", "start_char_pos": 316, "end_char_pos": 339}, {"type": "A", "before": null, "after": ",", "start_char_pos": 404, "end_char_pos": 404}, {"type": "R", "before": "Our hypothesis is that timely switching between different LOAs will enable the system to overcome various performance degrading factors and thus enable superior performance compared to systems in which LOAs cannot switch on-the-fly. Statistically validated analyses", "after": "Analyses", "start_char_pos": 459, "end_char_pos": 724}, {"type": "R", "before": "purely teleoperated or autonomous systems", "after": "systems with single modes of operation, such as pure teleoperation,", "start_char_pos": 817, "end_char_pos": 858}, {"type": "R", "before": "MI", "after": "in the context of the simulated robot experiment, Mixed-Initiative (MI)", "start_char_pos": 883, "end_char_pos": 885}, {"type": "A", "before": null, "after": "compared to HI", "start_char_pos": 1045, "end_char_pos": 1045}, {"type": "R", "before": "Human-Robot interaction (HRI)", "after": "human-robot interaction", "start_char_pos": 1080, "end_char_pos": 1109}, {"type": "R", "before": "the paper", "after": "our experiment on a physical robot", "start_char_pos": 1231, "end_char_pos": 1240}, {"type": "R", "before": "controllers", "after": "control systems", "start_char_pos": 1354, "end_char_pos": 1365}, {"type": "A", "before": null, "after": "'s MI control system", "start_char_pos": 1418, "end_char_pos": 1418}, {"type": "A", "before": null, "after": ". Insights regarding these challenges are discussed and ways to tackle them are proposed", "start_char_pos": 1436, "end_char_pos": 1436}], "sents_char_pos": [0, 124, 280, 458, 691, 879, 1222, 1367]}
+{"doc_id": "1911.05146", "revision_depth": "1", "before_revision": "The enormous amount of data and computation required to train DNNshave led to the rise of various parallelization strategies . Broadly, there are two strategies: 1) Data-Parallelism -- replicating the DNN on multiple processes and training on different training samples, and 2) Model-Parallelism -- dividing elements of the DNN itself into partitions across different processes . While data-parallelism has been extensively studied and developed, model-parallelism has received less attention as it is non-trivial to split the model across processes . In this paper, we propose HyPar-Flow : a framework for scalable and user-transparent parallel training of very large DNNs (up to 5, 000 layers). We exploit TensorFlow's Eager Execution features and KerasAPIs for model definition and distribution . HyPar-Flow exposes a simple API to offer data, model, and hybrid (model + data) parallel training for models defined using the Keras API. Under the hood, we introduce MPI communication primitives like send and recv on layer boundaries for data exchange between model-partitions and allreduce for gradient exchange across model-replicas. Our proposed designs in HyPar-Flow offer up to 3.1x speedup over sequential training for ResNet-110 and up to 1.6x speedup over Horovod-based data-parallel training for ResNet-1001; a model that has 1, 001 layers and 30 million parameters. We provide an in-depth performance characterization of the HyPar-Flow framework on multiple HPC systems with diverse CPU architectures including Intel Xeon(s)and AMD EPYC. HyPar-Flow provides 110x speed up on 128 nodes of the Stampede2 cluster at TACC for hybrid-parallel training of ResNet-1001 .", "after_revision": "To reduce training time of large-scale DNNs, scientists have started to explore parallelization strategies like data-parallelism, model-parallelism, and hybrid-parallelism . While data-parallelism has been extensively studied and developed, several problems exist in realizing model-parallelism and hybrid-parallelism efficiently. Four major problems we focus on are: 1) defining a notion of a distributed model across processes , 2) implementing forward/back-propagation across process boundaries that requires explicit communication, 3) obtaining parallel speedup on an inherently sequential task, and 4) achieving scalability without losing out on a model's accuracy. To address these problems, we create HyPar-Flow --- a model-size/-type agnostic, scalable, practical, and user-transparent system for hybrid-parallel training by exploiting MPI, Keras, and TensorFlow . HyPar-Flow provides a single API that can be used to perform data, model, and hybrid parallel training of any Keras model at scale. We create an internal distributed representation of the user-provided Keras model, utilize TF's Eager execution features for distributed forward/back-propagation across processes, exploit pipelining to improve performance and leverage efficient MPI primitives for scalable communication. Between model partitions, we use send and recv to exchange layer-data/partial-errors while allreduce is used to accumulate/average gradients across model replicas. Beyond the design and implementation of HyPar-Flow, we also provide comprehensive correctness and performance results on three state-of-the-art HPC systems including TACC Frontera (#5 on URL). For ResNet-1001, an ultra-deep model, HyPar-Flow provides: 1) Up to 1.6x speedup over Horovod-based data-parallel training, 2) 110x speedup over single-node on 128 Stampede2 nodes, and 3) 481x speedup over single-node on 512 Frontera nodes .", "edit_actions": [{"type": "R", "before": "The enormous amount of data and computation required to train DNNshave led to the rise of various parallelization strategies . Broadly, there are two strategies: 1) Data-Parallelism -- replicating the DNN on multiple processes and training on different training samples, and 2) Model-Parallelism -- dividing elements of the DNN itself into partitions across different processes", "after": "To reduce training time of large-scale DNNs, scientists have started to explore parallelization strategies like data-parallelism, model-parallelism, and hybrid-parallelism", "start_char_pos": 0, "end_char_pos": 377}, {"type": "A", "before": null, "after": "several problems exist in realizing", "start_char_pos": 447, "end_char_pos": 447}, {"type": "R", "before": "has received less attention as it is non-trivial to split the", "after": "and hybrid-parallelism efficiently. Four major problems we focus on are: 1) defining a notion of a distributed", "start_char_pos": 466, "end_char_pos": 527}, {"type": "R", "before": ". In this paper, we propose", "after": ", 2) implementing forward/back-propagation across process boundaries that requires explicit communication, 3) obtaining parallel speedup on an inherently sequential task, and 4) achieving scalability without losing out on a model's accuracy. To address these problems, we create", "start_char_pos": 551, "end_char_pos": 578}, {"type": "R", "before": ": a framework for scalable", "after": "--- a model-size/-type agnostic, scalable, practical,", "start_char_pos": 590, "end_char_pos": 616}, {"type": "R", "before": "parallel training of very large DNNs (up to 5, 000 layers). We exploit TensorFlow's Eager Execution features and KerasAPIs for model definition and distribution", "after": "system for hybrid-parallel training by exploiting MPI, Keras, and TensorFlow", "start_char_pos": 638, "end_char_pos": 798}, {"type": "R", "before": "exposes a simple API to offer", "after": "provides a single API that can be used to perform", "start_char_pos": 812, "end_char_pos": 841}, {"type": "R", "before": "(model + data) parallel training for models defined using the Keras API. Under the hood, we introduce MPI communication primitives like", "after": "parallel training of any Keras model at scale. We create an internal distributed representation of the user-provided Keras model, utilize TF's Eager execution features for distributed forward/back-propagation across processes, exploit pipelining to improve performance and leverage efficient MPI primitives for scalable communication. Between model partitions, we use", "start_char_pos": 866, "end_char_pos": 1001}, {"type": "R", "before": "on layer boundaries for data exchange between model-partitions and allreduce for gradient exchange across model-replicas. Our proposed designs in", "after": "to exchange layer-data/partial-errors while allreduce is used to accumulate/average gradients across model replicas. Beyond the design and implementation of HyPar-Flow, we also provide comprehensive correctness and performance results on three state-of-the-art HPC systems including TACC Frontera (#5 on URL). For ResNet-1001, an ultra-deep model,", "start_char_pos": 1016, "end_char_pos": 1161}, {"type": "R", "before": "offer up to 3.1x speedup over sequential training for ResNet-110 and up to", "after": "provides: 1) Up to", "start_char_pos": 1173, "end_char_pos": 1247}, {"type": "R", "before": "training for ResNet-1001; a model that has 1, 001 layers and 30 million parameters. We provide an in-depth performance characterization of the HyPar-Flow framework on multiple HPC systems with diverse CPU architectures including Intel Xeon(s)and AMD EPYC. HyPar-Flow provides", "after": "training, 2)", "start_char_pos": 1294, "end_char_pos": 1569}, {"type": "R", "before": "speed up", "after": "speedup over single-node", "start_char_pos": 1575, "end_char_pos": 1583}, {"type": "D", "before": "nodes of the", "after": null, "start_char_pos": 1591, "end_char_pos": 1603}, {"type": "R", "before": "cluster at TACC for hybrid-parallel training of ResNet-1001", "after": "nodes, and 3) 481x speedup over single-node on 512 Frontera nodes", "start_char_pos": 1614, "end_char_pos": 1673}], "sents_char_pos": [0, 379, 552, 697, 800, 938, 1137, 1319, 1377, 1549]}
+{"doc_id": "1911.06716", "revision_depth": "2", "before_revision": "Assortment optimization is an important problem that arises in many practical applications such as retailing and online advertising where the goal is to find a subset of products from a universe of substitutable products that maximize a seller's expected revenue. The demand and the revenue depend on the substitution behavior of the customers that is captured by a choice model. One of the key challenges is to find the right model for the customer substitution behavior. Many parametric random utility based models have been considered in the literature to capture substitution . However, in all these models, the probability of purchase increases as we add more options to the assortment. This is not true in general and in many settings , the probability of purchase may decrease if we add more products to the assortment, referred to as the choice overload. In this paper we attempt to address these serious limitations and propose a generalization of the Markov chain based choice model considered in Blanchet et al. In particular, we handle dynamic preferences and the choice overload phenomenon using a Markovian comparison model that is a generalization of the Markovian substitution framework of Blanchet et al. The Markovian comparison framework allows us to implicitly model the search cost in the choice process and thereby, modeling both dynamic preferences as well as the choice overload phenomenon. We consider the assortment optimization problem for the special case of our generalized Markov chain model where the underlying Markov chain is rank-1 (this is a generalization of the Multinomial Logit model). We show that the assortment optimization problem under this model is NP-hard and present a fully polynomial-time approximation scheme (FPTAS) for this problem .", "after_revision": "Assortment optimization is an important problem that arises in many industries such as retailing and online advertising where the goal is to find a subset of products from a universe of substitutable products which maximize seller's expected revenue. One of the key challenges in this problem is to model the customer substitution behavior. Many parametric random utility maximization (RUM) based choice models have been considered in the literature . However, in all these models, probability of purchase increases as we include more products to an assortment. This is not true in general and in many settings more choices hurt sales. This is commonly referred to as the choice overload. In this paper we attempt to address this limitation in RUM through a generalization of the Markov chain based choice model considered in Blanchet et al. (2016). As a special case, we show that our model reduces to a generalization of MNL with no-purchase attractions dependent on the assortment S and strictly increasing with the size of assortment S. While we show that the assortment optimization under this model is NP-hard , we present fully polynomial-time approximation scheme (FPTAS) under reasonable assumptions .", "edit_actions": [{"type": "R", "before": "practical applications", "after": "industries", "start_char_pos": 68, "end_char_pos": 90}, {"type": "R", "before": "that maximize a", "after": "which maximize", "start_char_pos": 221, "end_char_pos": 236}, {"type": "D", "before": "The demand and the revenue depend on the substitution behavior of the customers that is captured by a choice model.", "after": null, "start_char_pos": 264, "end_char_pos": 379}, {"type": "R", "before": "is to find the right model for", "after": "in this problem is to model", "start_char_pos": 406, "end_char_pos": 436}, {"type": "R", "before": "based", "after": "maximization (RUM) based choice", "start_char_pos": 504, "end_char_pos": 509}, {"type": "D", "before": "to capture substitution", "after": null, "start_char_pos": 556, "end_char_pos": 579}, {"type": "D", "before": "the", "after": null, "start_char_pos": 612, "end_char_pos": 615}, {"type": "R", "before": "add more options to the", "after": "include more products to an", "start_char_pos": 656, "end_char_pos": 679}, {"type": "R", "before": ", the probability of purchase may decrease if we add more products to the assortment,", "after": "more choices hurt sales. This is commonly", "start_char_pos": 741, "end_char_pos": 826}, {"type": "R", "before": "these serious limitations and propose", "after": "this limitation in RUM through", "start_char_pos": 899, "end_char_pos": 936}, {"type": "R", "before": "In particular, we handle dynamic preferences and the choice overload phenomenon using a Markovian comparison model that is", "after": "(2016). As a special case, we show that our model reduces to", "start_char_pos": 1023, "end_char_pos": 1145}, {"type": "R", "before": "the Markovian substitution framework of Blanchet et al. The Markovian comparison framework allows us to implicitly model the search cost in the choice process and thereby, modeling both dynamic preferences as well as the choice overload phenomenon. We consider the assortment optimization problem for the special case of our generalized Markov chain model where the underlying Markov chain is rank-1 (this is a generalization of the Multinomial Logit model). We", "after": "MNL with no-purchase attractions dependent on the assortment S and strictly increasing with the size of assortment S. While we", "start_char_pos": 1166, "end_char_pos": 1627}, {"type": "D", "before": "problem", "after": null, "start_char_pos": 1666, "end_char_pos": 1673}, {"type": "R", "before": "and present a", "after": ", we present", "start_char_pos": 1702, "end_char_pos": 1715}, {"type": "R", "before": "for this problem", "after": "under reasonable assumptions", "start_char_pos": 1767, "end_char_pos": 1783}], "sents_char_pos": [0, 263, 379, 472, 581, 691, 862, 1022, 1221, 1414, 1624]}
+{"doc_id": "1911.07085", "revision_depth": "1", "before_revision": "This paper studies causal inference in randomized experiments under network interference. Most existing models of interference posit that treatments assigned to alters only affect the ego 's response through a low-dimensional exposure mapping, which only depends on units within some known network radius around the ego. We propose a substantially weaker \"approximate neighborhood interference\" (ANI) assumption, which allows treatments assigned to alters far from the ego to have a small , but potentially nonzero, impact on the ego's response. Unlike the exposure mapping model, we can show that ANI is satisfied in well-known models of social interactions. Despite its generality, inference in a single-network setting is still possible under ANI, as we prove that standard inverse-probability weighting estimators can consistently estimate treatment and spillover effects and are asymptotically normal . For practical inference, we propose a new conservative variance estimatorbased on a network bootstrap and suggest a data-dependent bandwidth using the network diameter. Finally, we illustrate our results in a simulation study and empirical application .", "after_revision": "This paper studies causal inference in randomized experiments under network interference. Most of the literature assumes a model of interference under which treatments assigned to alters beyond a certain network distance from the ego have no effect on the ego 's response . However, many models of social interactions do not satisfy this assumption. This paper proposes a substantially weaker model of \"approximate neighborhood interference\" (ANI) , under which treatments assigned to alters further from the ego have a smaller , but potentially nonzero, impact on the ego's response. We show that ANI is satisfied in well-known models of social interactions. We also prove that, under ANI, standard inverse-probability weighting estimators can consistently estimate useful exposure effects and are asymptotically normal under asymptotics taking the network size large. For inference, we consider a network HAC variance estimator. Under a finite population model, we show the estimator is biased but that the bias can be interpreted as the variance of unit-level exposure effects. This generalizes Neyman's well-known result on conservative variance estimation to settings with interference .", "edit_actions": [{"type": "R", "before": "existing models of interference posit that", "after": "of the literature assumes a model of interference under which", "start_char_pos": 95, "end_char_pos": 137}, {"type": "R", "before": "only affect the ego", "after": "beyond a certain network distance from the ego have no effect on the ego", "start_char_pos": 168, "end_char_pos": 187}, {"type": "R", "before": "through a low-dimensional exposure mapping, which only depends on units within some known network radius around the ego. We propose", "after": ". However, many models of social interactions do not satisfy this assumption. This paper proposes", "start_char_pos": 200, "end_char_pos": 331}, {"type": "A", "before": null, "after": "model of", "start_char_pos": 355, "end_char_pos": 355}, {"type": "R", "before": "assumption, which allows", "after": ", under which", "start_char_pos": 402, "end_char_pos": 426}, {"type": "R", "before": "far", "after": "further", "start_char_pos": 457, "end_char_pos": 460}, {"type": "R", "before": "to have a small", "after": "have a smaller", "start_char_pos": 474, "end_char_pos": 489}, {"type": "R", "before": "Unlike the exposure mapping model, we can", "after": "We", "start_char_pos": 547, "end_char_pos": 588}, {"type": "R", "before": "Despite its generality, inference in a single-network setting is still possible", "after": "We also prove that,", "start_char_pos": 661, "end_char_pos": 740}, {"type": "D", "before": "as we prove that", "after": null, "start_char_pos": 752, "end_char_pos": 768}, {"type": "R", "before": "treatment and spillover", "after": "useful exposure", "start_char_pos": 845, "end_char_pos": 868}, {"type": "R", "before": ". For practical", "after": "under asymptotics taking the network size large. For", "start_char_pos": 907, "end_char_pos": 922}, {"type": "R", "before": "propose a new conservative variance estimatorbased on a network bootstrap and suggest a data-dependent bandwidth using the network diameter. Finally, we illustrate our results in a simulation study and empirical application", "after": "consider a network HAC variance estimator. Under a finite population model, we show the estimator is biased but that the bias can be interpreted as the variance of unit-level exposure effects. This generalizes Neyman's well-known result on conservative variance estimation to settings with interference", "start_char_pos": 937, "end_char_pos": 1160}], "sents_char_pos": [0, 89, 320, 546, 660, 908, 1077]}
+{"doc_id": "1911.10176", "revision_depth": "1", "before_revision": "User embodiment is important for many Virtual Reality (VR) applications, for example, in the context of social interaction, therapy, training, or entertainment. Yet , there is no commonly agreed-on or validated way to empirically measure the perception of embodiment necessary to evaluate this important quality of user experience (UX). We present a virtual embodiment questionnaire (VEQ) to assess components of virtual embodiment in a valid, reliable, and consistent fashion . We reviewed previous literature to identify applicable concepts and items and performed a confirmatory factor analysis on the data of three experiments (N = 196). Each experiment modified a distinct simulation property, namely the level of immersion, the level of personalization, and the level of behavioral realism. The analysis confirmed three factors: (1) the ownership of a virtual body, (2) the agency over a virtual body, and (3) the change in the perceived body schema. A fourth study (N = 22) further confirmed the reliability and validity of the scale and investigated the impacts of latency jitter of avatar movements presented in the simulation compared to linear latencies and a baseline. We present the final scale and further insights from the studies regarding related constructs.", "after_revision": "User embodiment is important for many virtual reality (VR) applications, for example, in the context of social interaction, therapy, training, or entertainment. However , there is no validated instrument to empirically measure the perception of embodiment , necessary to reliably evaluate this important quality of user experience (UX). To assess components of virtual embodiment in a valid, reliable, and consistent fashion , we develped a Virtual Embodiment Questionnaire (VEQ) . We reviewed previous literature to identify applicable constructs and items, and performed a confirmatory factor analysis (CFA) on the data from three experiments (N = 196). Each experiment modified a distinct simulation property, namely , the level of immersion, the level of personalization, and the level of behavioral realism. The analysis confirmed three factors: (1) ownership of a virtual body, (2) agency over a virtual body, and (3) change in the perceived body schema. A fourth study (N = 22) further confirmed the reliability and validity of the scale and investigated the impacts of latency jitter of avatar movements presented in the simulation compared to linear latencies and a baseline. We present the final scale and further insights from the studies regarding related constructs.", "edit_actions": [{"type": "R", "before": "Virtual Reality", "after": "virtual reality", "start_char_pos": 38, "end_char_pos": 53}, {"type": "R", "before": "Yet", "after": "However", "start_char_pos": 161, "end_char_pos": 164}, {"type": "R", "before": "commonly agreed-on or validated way", "after": "validated instrument", "start_char_pos": 179, "end_char_pos": 214}, {"type": "R", "before": "necessary to", "after": ", necessary to reliably", "start_char_pos": 267, "end_char_pos": 279}, {"type": "R", "before": "We present a virtual embodiment questionnaire (VEQ) to", "after": "To", "start_char_pos": 337, "end_char_pos": 391}, {"type": "A", "before": null, "after": ", we develped a Virtual Embodiment Questionnaire (VEQ)", "start_char_pos": 477, "end_char_pos": 477}, {"type": "R", "before": "concepts and items", "after": "constructs and items,", "start_char_pos": 535, "end_char_pos": 553}, {"type": "A", "before": null, "after": "(CFA)", "start_char_pos": 599, "end_char_pos": 599}, {"type": "R", "before": "of", "after": "from", "start_char_pos": 612, "end_char_pos": 614}, {"type": "A", "before": null, "after": ",", "start_char_pos": 708, "end_char_pos": 708}, {"type": "D", "before": "the", "after": null, "start_char_pos": 842, "end_char_pos": 845}, {"type": "D", "before": "the", "after": null, "start_char_pos": 879, "end_char_pos": 882}, {"type": "D", "before": "the", "after": null, "start_char_pos": 919, "end_char_pos": 922}], "sents_char_pos": [0, 160, 336, 479, 643, 799, 959, 1183]}
+{"doc_id": "1912.00053", "revision_depth": "1", "before_revision": "According to features of drug addiction, this paper constructs a SEIR-based SUC model to describe and predict the spread of drug addiction. Predictions are that the number of drug addictions will continue to fluctuate with a reduced amplitude and eventually stabilize. To seek the fountainhead of heroin, we identified the most likely origins of drugs in Philadelphia, PA, Cuyahoga and Hamilton, OH, Jefferson, KY, Kanawha, WV, and Bedford, VA. Based on the facts, advised concentration includes the spread of Oxycodone, Hydrocodone, Heroin and Buprenorphine. In other words, the drug transmission in the two states of Ohio and Pennsylvania require awareness. According to the propagation curve predicted by our model, the transmission of KY state is still in its early stage, while that of VA, WV is in the middle point, and OH, PA in its latter ones. Hereby the number of drug addictions in KY, OH, and VA is projected to increase in three years. For methodology, with Principal component analysis technique, 22 variables in socioeconomic data related to the continuous use of opioid drugs was filtered, where the 'Relationship' Part deserves highlight. Based on them, by using K-means algorithm, 464 counties were categorized into three basket . To combat opioid crisis, detailed action will be discussed in the sensitivity analysis section. After modeling and analytics, innovation is require to control addict and advocate anti-drug news campaigns. This part also verified the effectiveness of model when d_1<0.2; r_1,r_2,r_3<0.3; 15<\\beta_1,\\beta_2,\\beta_3<25. In other words, if such boundary exceeded, number of drug addictions may rocket and peak in a short period.", "after_revision": "According to the features of drug addiction, this paper constructs an SEIR-based SUC model to describe and predict the spread of drug addiction. Predictions are that the number of drug addictions will continue to fluctuate with reduced amplitude and eventually stabilize. To seek the fountainhead of heroin, we identified the most likely origins of drugs in Philadelphia, PA, Cuyahoga and Hamilton, OH, Jefferson, KY, Kanawha, WV, and Bedford, VA. Based on the facts, advised concentration includes the spread of Oxycodone, Hydrocodone, Heroin , and Buprenorphine. In other words, drug transmission in the two states of Ohio and Pennsylvania require awareness. According to the propagation curve predicted by our model, the transfer of KY state is still in its early stage, while that of VA, WV is in the middle point, and OH, PA in its latter ones. As a result of this, the number of drug addictions in KY, OH, and VA is projected to increase in three years. For methodology, with the Principal component analysis technique, 22 variables in socio-economic data related to the continuous use of Opioid drugs was filtered, where the 'Relationship' Part deserves a highlight. Based on them, by using the K-means algorithm, 464 counties were categorized into three baskets . To combat the opioid crisis, a specific action will discuss in the sensitivity analysis section. After modeling and analytics, innovation is required to control addicts and advocate anti-drug news campaigns. This part also verified the effectiveness of model when d_1<0.2; r_1,r_2,r_3<0.3; 15<\\beta_1,\\beta_2,\\beta_3<25. In other words, if such boundary exceeded, the number of drug addictions may rocket and peak in a short period.", "edit_actions": [{"type": "A", "before": null, "after": "the", "start_char_pos": 13, "end_char_pos": 13}, {"type": "R", "before": "a", "after": "an", "start_char_pos": 64, "end_char_pos": 65}, {"type": "D", "before": "a", "after": null, "start_char_pos": 224, "end_char_pos": 225}, {"type": "A", "before": null, "after": ",", "start_char_pos": 542, "end_char_pos": 542}, {"type": "D", "before": "the", "after": null, "start_char_pos": 578, "end_char_pos": 581}, {"type": "R", "before": "transmission", "after": "transfer", "start_char_pos": 725, "end_char_pos": 737}, {"type": "R", "before": "Hereby", "after": "As a result of this,", "start_char_pos": 855, "end_char_pos": 861}, {"type": "A", "before": null, "after": "the", "start_char_pos": 973, "end_char_pos": 973}, {"type": "R", "before": "socioeconomic", "after": "socio-economic", "start_char_pos": 1030, "end_char_pos": 1043}, {"type": "R", "before": "opioid", "after": "Opioid", "start_char_pos": 1082, "end_char_pos": 1088}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1148, "end_char_pos": 1148}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1184, "end_char_pos": 1184}, {"type": "R", "before": "basket", "after": "baskets", "start_char_pos": 1245, "end_char_pos": 1251}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1264, "end_char_pos": 1264}, {"type": "R", "before": "detailed action will be discussed", "after": "a specific action will discuss", "start_char_pos": 1280, "end_char_pos": 1313}, {"type": "R", "before": "require to control addict", "after": "required to control addicts", "start_char_pos": 1395, "end_char_pos": 1420}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1616, "end_char_pos": 1616}], "sents_char_pos": [0, 140, 269, 561, 661, 854, 950, 1159, 1253, 1350, 1459, 1524, 1541, 1572]}
+{"doc_id": "1912.00719", "revision_depth": "2", "before_revision": "When exploring large time-varying data sets , visual summaries are a useful tool to identify time intervals of interest for further consideration . A typical approach is to represent the data elements at each time step in a compact one-dimensional form or via a one-dimensional ordering . Such 1D representations can then be placed in temporal order along a time line. There are two main criteria to assess the quality of the resulting visual summary: spatial quality -- how well does the 1D representation capture the structure of the data at each time step, and stability -- how coherent are the 1D representations over consecutive time steps or temporal ranges? We focus on techniques that create such visual summaries for entities moving in 2D. Previous work has considered only the creation of 1D orderings, using spatial subdivisions and clustering techniques. In contrast, we propose to use actual dimensionality-reduction techniques to compute stable and spatially informative 1D representations. These more general 1D representations provide the user with additional visual cues describing the spatial distribution of the data, and naturally imply also a 1D ordering. To make dimensionality-reduction techniques suitable for visual summaries, we introduce stable variants of Principle Component Analysis, Sammon mapping, and t-SNE. Our Stable Principal Component method is explicitly parametrized for stability, allowing a trade-off between the spatial quality and stability. We conduct computational experiments that quantitatively compare the 1D orderings produced by our stable dimensionality-reduction methods to various state-of-the-art approaches using a set of well-established quality metrics that capture spatial quality and stability. We conclude that our stable algorithms outperform existing methods on stability, without sacrificing spatial quality or efficiency .", "after_revision": "The availability of devices that track moving objects has led to an explosive growth in trajectory data. When exploring the resulting large trajectory collections , visual summaries are a useful tool to identify time intervals of interest . A typical approach is to represent the spatial positions of the tracked objects at each time step via a one-dimensional ordering ; visualizations of such orderings can then be placed in temporal order along a time line. There are two main criteria to assess the quality of the resulting visual summary: spatial quality -- how well does the ordering capture the structure of the data at each time step, and stability -- how coherent are the orderings over consecutive time steps or temporal ranges? In this paper we introduce a new Stable Principal Component (SPC) method to compute such orderings, which is explicitly parameterized for stability, allowing a trade-off between the spatial quality and stability. We conduct extensive computational experiments that quantitatively compare the orderings produced by ours and other stable dimensionality-reduction methods to various state-of-the-art approaches using a set of well-established quality metrics that capture spatial quality and stability. We conclude that stable dimensionality reduction outperforms existing methods on stability, without sacrificing spatial quality or efficiency ; in particular, our new SPC method does so at a fraction of the computational costs .", "edit_actions": [{"type": "R", "before": "When exploring large time-varying data sets", "after": "The availability of devices that track moving objects has led to an explosive growth in trajectory data. When exploring the resulting large trajectory collections", "start_char_pos": 0, "end_char_pos": 43}, {"type": "D", "before": "for further consideration", "after": null, "start_char_pos": 120, "end_char_pos": 145}, {"type": "R", "before": "data elements", "after": "spatial positions of the tracked objects", "start_char_pos": 187, "end_char_pos": 200}, {"type": "D", "before": "in a compact one-dimensional form or", "after": null, "start_char_pos": 219, "end_char_pos": 255}, {"type": "R", "before": ". Such 1D representations", "after": "; visualizations of such orderings", "start_char_pos": 287, "end_char_pos": 312}, {"type": "R", "before": "1D representation", "after": "ordering", "start_char_pos": 489, "end_char_pos": 506}, {"type": "R", "before": "1D representations", "after": "orderings", "start_char_pos": 598, "end_char_pos": 616}, {"type": "R", "before": "We focus on techniques that create such visual summaries for entities moving in 2D. Previous work has considered only the creation of 1D orderings, using spatial subdivisions and clustering techniques. In contrast, we propose to use actual dimensionality-reduction techniques to compute stable and spatially informative 1D representations. These more general 1D representations provide the user with additional visual cues describing the spatial distribution of the data, and naturally imply also a 1D ordering. To make dimensionality-reduction techniques suitable for visual summaries, we introduce stable variants of Principle Component Analysis, Sammon mapping, and t-SNE. Our", "after": "In this paper we introduce a new", "start_char_pos": 665, "end_char_pos": 1344}, {"type": "R", "before": "method is explicitly parametrized", "after": "(SPC) method to compute such orderings, which is explicitly parameterized", "start_char_pos": 1372, "end_char_pos": 1405}, {"type": "A", "before": null, "after": "extensive", "start_char_pos": 1496, "end_char_pos": 1496}, {"type": "D", "before": "1D", "after": null, "start_char_pos": 1555, "end_char_pos": 1557}, {"type": "R", "before": "our", "after": "ours and other", "start_char_pos": 1580, "end_char_pos": 1583}, {"type": "R", "before": "our stable algorithms outperform", "after": "stable dimensionality reduction outperforms", "start_char_pos": 1772, "end_char_pos": 1804}, {"type": "A", "before": null, "after": "; in particular, our new SPC method does so at a fraction of the computational costs", "start_char_pos": 1886, "end_char_pos": 1886}], "sents_char_pos": [0, 147, 288, 368, 664, 748, 866, 1004, 1176, 1484, 1754]}
+{"doc_id": "1912.00921", "revision_depth": "1", "before_revision": "Through the recent results that we present , we wish to highlight the various time-scales on which the demographic dynamics and the natural selection can be retrieved from individual-based models. Although these results are by no means exhaustive, both on the mathematical and the biological level, they are very complementary . Indeed, they provide a viewpoint for the most classical time-scales of interest. They namely encompass the time-scale of the life of a single individual, the longer one on which a population can be characterized , the ecological one and at least four nested ones on which selection occurs. The limiting behavior is generally deterministic. Yet, since the selection acts on the alea in the history of individuals, the probabilities are shown to be a key element of understanding . Besides, the scarcity of mutations fixing in the poplation also induces some stochasticity .", "after_revision": "This article is a presentation of specific recent results describing scaling limits of individual-based models. Thanks to them , we wish to relate the time-scales typical of demographic dynamics and natural selection to the parameters of the individual-based models. Although these results are by no means exhaustive, both on the mathematical and the biological level, they complement each other . Indeed, they provide a viewpoint for many classical time-scales . Namely, they encompass the timescale typical of the life-expectancy of a single individual, the longer one wherein a population can be characterized through its demographic dynamics, and at least four interconnected ones wherein selection occurs. The limiting behavior is generally deterministic. Yet, since there are selective effects on randomness in the history of lineages, probability theory is shown to be a key factor in understanding the results . Besides, randomness can be maintained in the limiting dynamics, for instance to model rare mutations fixing in the population .", "edit_actions": [{"type": "R", "before": "Through the recent results that we present", "after": "This article is a presentation of specific recent results describing scaling limits of individual-based models. Thanks to them", "start_char_pos": 0, "end_char_pos": 42}, {"type": "R", "before": "highlight the various", "after": "relate the", "start_char_pos": 56, "end_char_pos": 77}, {"type": "R", "before": "on which the", "after": "typical of", "start_char_pos": 90, "end_char_pos": 102}, {"type": "R", "before": "the natural selection can be retrieved from", "after": "natural selection to the parameters of the", "start_char_pos": 128, "end_char_pos": 171}, {"type": "R", "before": "are very complementary", "after": "complement each other", "start_char_pos": 304, "end_char_pos": 326}, {"type": "R", "before": "the most", "after": "many", "start_char_pos": 366, "end_char_pos": 374}, {"type": "R", "before": "of interest. They namely encompass the time-scale of the life", "after": ". Namely, they encompass the timescale typical of the life-expectancy", "start_char_pos": 397, "end_char_pos": 458}, {"type": "R", "before": "on which", "after": "wherein", "start_char_pos": 498, "end_char_pos": 506}, {"type": "R", "before": ", the ecological one", "after": "through its demographic dynamics,", "start_char_pos": 541, "end_char_pos": 561}, {"type": "R", "before": "nested ones on which", "after": "interconnected ones wherein", "start_char_pos": 580, "end_char_pos": 600}, {"type": "R", "before": "the selection acts on the alea", "after": "there are selective effects on randomness", "start_char_pos": 680, "end_char_pos": 710}, {"type": "R", "before": "individuals, the probabilities are", "after": "lineages, probability theory is", "start_char_pos": 729, "end_char_pos": 763}, {"type": "R", "before": "element of understanding", "after": "factor in understanding the results", "start_char_pos": 782, "end_char_pos": 806}, {"type": "R", "before": "the scarcity of", "after": "randomness can be maintained in the limiting dynamics, for instance to model rare", "start_char_pos": 818, "end_char_pos": 833}, {"type": "R", "before": "poplation also induces some stochasticity", "after": "population", "start_char_pos": 858, "end_char_pos": 899}], "sents_char_pos": [0, 196, 328, 409, 618, 668, 808]}
+{"doc_id": "1912.04774", "revision_depth": "1", "before_revision": "A concern central to the economics of privacy is that firms may use consumer data to price discriminate. A common response is that consumers should have control over their data and the ability to choose howfirms access it . Since firms draw inferences based on both the data seen as well as the consumer's disclosure choices, the strategic implications of this proposal are unclear. We investigate whether such measures improve consumer welfare in monopolistic and competitive environments . We find that consumer control can guarantee gains for every consumer type relative to both perfect price discrimination and no personalized pricing. This result is driven by two ideas. First, consumers can use disclosure to amplify competition between firms . Second, consumers can share information that induces a seller---even a monopolist---to make price concessions. Furthermore, whether consumer control improves consumer surplus depends on both the technology of disclosure and the competitivenessof the marketplace. In a competitive market, simple disclosure technologies such as \"track / do-not-track\" suffice for guaranteeing gains in consumer welfare. However, in a monopolistic market, welfare gains require richer forms of disclosure technology whereby consumers can decide how much information they would like to convey .", "after_revision": "Central to privacy concerns is that firms may use consumer data to price discriminate. A common policy response is that consumers should be given control over which firms access their data and how . Since firms learn about a consumer's preferences based on the data seen and the consumer's disclosure choices, the equilibrium implications of consumer control are unclear. We study whether such measures improve consumer welfare in monopolistic and competitive markets . We find that consumer control can improve consumer welfare relative to both perfect price discrimination and no personalized pricing. First, consumers can use disclosure to amplify competitive forces . Second, consumers can disclose information to induce even a monopolist to lower prices. Whether consumer control improves welfare depends on the disclosure technology and market competitiveness. Simple disclosure technologies suffice in competitive markets. When facing a monopolist, a consumer needs partial disclosure possibilities to obtain any welfare gains .", "edit_actions": [{"type": "R", "before": "A concern central to the economics of privacy", "after": "Central to privacy concerns", "start_char_pos": 0, "end_char_pos": 45}, {"type": "A", "before": null, "after": "policy", "start_char_pos": 114, "end_char_pos": 114}, {"type": "R", "before": "have control over", "after": "be given control over which firms access", "start_char_pos": 149, "end_char_pos": 166}, {"type": "R", "before": "the ability to choose howfirms access it", "after": "how", "start_char_pos": 182, "end_char_pos": 222}, {"type": "R", "before": "draw inferences based on both", "after": "learn about a consumer's preferences based on", "start_char_pos": 237, "end_char_pos": 266}, {"type": "R", "before": "as well as", "after": "and", "start_char_pos": 281, "end_char_pos": 291}, {"type": "R", "before": "strategic implications of this proposal", "after": "equilibrium implications of consumer control", "start_char_pos": 331, "end_char_pos": 370}, {"type": "R", "before": "investigate", "after": "study", "start_char_pos": 387, "end_char_pos": 398}, {"type": "R", "before": "environments", "after": "markets", "start_char_pos": 478, "end_char_pos": 490}, {"type": "R", "before": "guarantee gains for every consumer type", "after": "improve consumer welfare", "start_char_pos": 527, "end_char_pos": 566}, {"type": "D", "before": "This result is driven by two ideas.", "after": null, "start_char_pos": 642, "end_char_pos": 677}, {"type": "R", "before": "competition between firms", "after": "competitive forces", "start_char_pos": 725, "end_char_pos": 750}, {"type": "R", "before": "share information that induces a seller---even a monopolist---to make price concessions. Furthermore, whether", "after": "disclose information to induce even a monopolist to lower prices. Whether", "start_char_pos": 775, "end_char_pos": 884}, {"type": "R", "before": "consumer surplus depends on both the technology of disclosure and the competitivenessof the marketplace. In a competitive market, simple disclosure technologies such as \"track / do-not-track\" suffice for guaranteeing gains in consumer welfare. However, in a monopolistic market, welfare gains require richer forms of disclosure technology whereby consumers can decide how much information they would like to convey", "after": "welfare depends on the disclosure technology and market competitiveness. Simple disclosure technologies suffice in competitive markets. When facing a monopolist, a consumer needs partial disclosure possibilities to obtain any welfare gains", "start_char_pos": 911, "end_char_pos": 1325}], "sents_char_pos": [0, 104, 383, 492, 641, 677, 863, 1015, 1154]}
+{"doc_id": "1912.09765", "revision_depth": "3", "before_revision": "Availability codes have recently been proposed to facilitate efficient retrieval of frequently accessed (hot) data objects in distributed storage systems. This paper presents techniques for analyzing the download time of systematic availability codes considering the Fork-Join scheme for data access. Specifically, we consider the setup in which requests arrive for downloading individual data objects, and each request is replicated (forked) to the systematic server containing the object and all of its recovery groups. For low-traffic regime , when there is at most one request in the system, we compute the download time in closed-form and compare it across systems with availability, maximum distance separable (MDS), and replication codes . We demonstrate that availability codes can reduce download time in some settings , but are not always optimal. When the low-traffic assumption does not hold, system consists of multiple inter-dependent Fork-Join queues, which makes exact analysis intractable due to state space explosion. Here , we present upper and lower bounds on the download time, and an M/G/1 queue approximation for several special cases of interest. Via extensive numerical simulations, we evaluate our bounds , and demonstrate that the M/G/1 queue approximation has a high degree of accuracy.", "after_revision": "The paper presents techniques for analyzing the expected download time in distributed storage systems that employ systematic availability codes . These codes provide access to hot data through the systematic server containing the object and multiple recovery groups. When a request for an object is received, it can be replicated (forked) to the systematic server and all recovery groups. We first consider the low-traffic regime and present the close-form expression for the download time . By comparison across systems with availability, maximum distance separable (MDS), and replication codes , we demonstrate that availability codes can reduce download time in some settings but are not always optimal. In the high-traffic regime, the system consists of multiple inter-dependent Fork-Join queues, making exact analysis intractable . Accordingly , we present upper and lower bounds on the download time, and an M/G/1 queue approximation for several cases of interest. Via extensive numerical simulations, we evaluate our bounds and demonstrate that the M/G/1 queue approximation has a high degree of accuracy.", "edit_actions": [{"type": "R", "before": "Availability codes have recently been proposed to facilitate efficient retrieval of frequently accessed (hot) data objects in distributed storage systems. This", "after": "The", "start_char_pos": 0, "end_char_pos": 159}, {"type": "R", "before": "download time of", "after": "expected download time in distributed storage systems that employ", "start_char_pos": 204, "end_char_pos": 220}, {"type": "R", "before": "considering the Fork-Join scheme for data access. Specifically, we consider the setup in which requests arrive for downloading individual data objects, and each request is", "after": ". These codes provide access to hot data through the systematic server containing the object and multiple recovery groups. When a request for an object is received, it can be", "start_char_pos": 251, "end_char_pos": 422}, {"type": "R", "before": "containing the object and all of its", "after": "and all", "start_char_pos": 468, "end_char_pos": 504}, {"type": "R", "before": "For", "after": "We first consider the", "start_char_pos": 522, "end_char_pos": 525}, {"type": "R", "before": ", when there is at most one request in the system, we compute", "after": "and present the close-form expression for", "start_char_pos": 545, "end_char_pos": 606}, {"type": "R", "before": "in closed-form and compare it", "after": ". By comparison", "start_char_pos": 625, "end_char_pos": 654}, {"type": "R", "before": ". We", "after": ", we", "start_char_pos": 745, "end_char_pos": 749}, {"type": "D", "before": ",", "after": null, "start_char_pos": 828, "end_char_pos": 829}, {"type": "R", "before": "When the low-traffic assumption does not hold,", "after": "In the high-traffic regime, the", "start_char_pos": 858, "end_char_pos": 904}, {"type": "R", "before": "which makes", "after": "making", "start_char_pos": 967, "end_char_pos": 978}, {"type": "R", "before": "due to state space explosion. Here", "after": ". Accordingly", "start_char_pos": 1006, "end_char_pos": 1040}, {"type": "D", "before": "special", "after": null, "start_char_pos": 1144, "end_char_pos": 1151}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1231, "end_char_pos": 1232}], "sents_char_pos": [0, 154, 300, 521, 746, 857, 1035, 1170]}
+{"doc_id": "1912.09816", "revision_depth": "1", "before_revision": "Community detection is a fundamental problem in social network analysis consisting , roughly speaking, in dividing social actors ( modelled as nodes in a social graph) with certain social connections ( modelled as edges in the social graph) into densely knitted and highly related groups with each group well separated from the others. Classical approaches for community detection usually deal only with the structure of the network and ignore features of the nodes , although major real-world networks provide additional actors' information such as age, gender, interests, etc. , traditionally called node attributes. It is known that the attributes may clarify and enrich the knowledge about the actors and give sense to the detected communities. This has led to a relatively novel direction in community detection --- constructing algorithms that use both the structure and the attributes of the network (modelled already via a node-attributed graph) to yield more informative and qualitative results. During the last decade many methods based on different ideas and techniques have appearedin this direction . Although there exist some partial overviews of them, a recent survey is a necessity as the growing number of the methods may cause uncertainty in practice. In this paper we aim at clarifying the overall situation by proposing a clear classification of the methods and providing a comprehensive survey of the available results . We not only group and analyse the corresponding methods but also focus on practical aspects, including the information which methods outperform others and which datasets and quality measures are used for evaluation .", "after_revision": "Community detection is a fundamental problem in social network analysis consisting in unsupervised dividing social actors ( nodes in a social graph) with certain social connections ( edges in a social graph) into densely knitted and highly related groups with each group well separated from the others. Classical approaches for community detection usually deal only with network structure and ignore features of its nodes (called node attributes), although many real-world social networks provide additional actors' information such as interests. It is believed that the attributes may clarify and enrich the knowledge about the actors and give sense to the communities. This belief has motivated the progress in developing community detection methods that use both the structure and the attributes of network (i.e. deal with a node-attributed graph) to yield more informative and qualitative results. During the last decade many such methods based on different ideas have appeared . Although there exist partial overviews of them, a recent survey is a necessity as the growing number of the methods may cause repetitions in methodology and uncertainty in practice. In this paper we aim at describing and clarifying the overall situation in the field of community detection in node-attributed social networks. Namely, we perform an exhaustive search of known methods and propose a classification of them based on when and how structure and attributes are fused . We not only give a description of each class but also provide general technical ideas behind each method in the class. Furthermore, we pay attention to available information which methods outperform others and which datasets and quality measures are used for their evaluation. Basing on the information collected, we make conclusions on the current state of the field and disclose several problems that seem important to be resolved in future .", "edit_actions": [{"type": "R", "before": ", roughly speaking, in", "after": "in unsupervised", "start_char_pos": 83, "end_char_pos": 105}, {"type": "D", "before": "modelled as", "after": null, "start_char_pos": 131, "end_char_pos": 142}, {"type": "R", "before": "modelled as edges in the", "after": "edges in a", "start_char_pos": 202, "end_char_pos": 226}, {"type": "R", "before": "the structure of the network", "after": "network structure", "start_char_pos": 404, "end_char_pos": 432}, {"type": "R", "before": "the nodes , although major", "after": "its nodes (called node attributes), although many", "start_char_pos": 456, "end_char_pos": 482}, {"type": "A", "before": null, "after": "social", "start_char_pos": 494, "end_char_pos": 494}, {"type": "R", "before": "age, gender, interests, etc. , traditionally called node attributes. It is known", "after": "interests. It is believed", "start_char_pos": 551, "end_char_pos": 631}, {"type": "D", "before": "detected", "after": null, "start_char_pos": 728, "end_char_pos": 736}, {"type": "R", "before": "has led to a relatively novel direction in community detection --- constructing algorithms", "after": "belief has motivated the progress in developing community detection methods", "start_char_pos": 755, "end_char_pos": 845}, {"type": "R", "before": "the network (modelled already via", "after": "network (i.e. deal with", "start_char_pos": 896, "end_char_pos": 929}, {"type": "A", "before": null, "after": "such", "start_char_pos": 1034, "end_char_pos": 1034}, {"type": "R", "before": "and techniques have appearedin this direction", "after": "have appeared", "start_char_pos": 1068, "end_char_pos": 1113}, {"type": "D", "before": "some", "after": null, "start_char_pos": 1137, "end_char_pos": 1141}, {"type": "A", "before": null, "after": "repetitions in methodology and", "start_char_pos": 1247, "end_char_pos": 1247}, {"type": "A", "before": null, "after": "describing and", "start_char_pos": 1297, "end_char_pos": 1297}, {"type": "R", "before": "by proposing a clear classification of the methods and providing a comprehensive survey of the available results", "after": "in the field of community detection in node-attributed social networks. Namely, we perform an exhaustive search of known methods and propose a classification of them based on when and how structure and attributes are fused", "start_char_pos": 1331, "end_char_pos": 1443}, {"type": "R", "before": "group and analyse the corresponding methods but also focus on practical aspects, including the", "after": "give a description of each class but also provide general technical ideas behind each method in the class. Furthermore, we pay attention to available", "start_char_pos": 1458, "end_char_pos": 1552}, {"type": "R", "before": "evaluation", "after": "their evaluation. Basing on the information collected, we make conclusions on the current state of the field and disclose several problems that seem important to be resolved in future", "start_char_pos": 1650, "end_char_pos": 1660}], "sents_char_pos": [0, 335, 619, 749, 1005, 1115, 1272, 1445]}
+{"doc_id": "1912.10514", "revision_depth": "1", "before_revision": "An effective method to generate a large number of parallel sentences for training improved neural machine translation (NMT) systems is the use of back-translations of the target-side monolingual data. Tagging, or using gates, has been used to enable translation models to distinguish between synthetic and natural data. This improves standard back-translation and also enables the use of iterative back-translation on language pairs that underperformed using standard back-translation. This work presents a simplified approach of differentiating between the two data using pretraining and finetuning . The approach - tag-less back-translation - trains the model on the synthetic data and finetunes it on the natural data. Preliminary experiments have shown the approach to continuously outperform the tagging approach on low resource English-Vietnamese neural machine translation . While the need for tagging (noising) the dataset has been removed, the approach outperformed the tagged back-translation approach by an average of 0.4 BLEU .", "after_revision": "An effective method to generate a large number of parallel sentences for training improved neural machine translation (NMT) systems is the use of back-translations of the target-side monolingual data. The method was not able to utilize the available huge amount of monolingual data because of the inability of models to differentiate between the authentic and synthetic parallel data. Tagging, or using gates, has been used to enable translation models to distinguish between synthetic and authentic data, improving standard back-translation and also enabling the use of iterative back-translation on language pairs that under-performed using standard back-translation. This work presents pre-training and fine-tuning as a simplified but more effective approach of differentiating between the two data . The approach - tag-less back-translation - trains the model on the synthetic data and fine-tunes it on the authentic data. Experiments have shown the approach to outperform the baseline and standard back-translation by 4.0 and 0.7 BLEU respectively on low resource English-Vietnamese NMT . While the need for tagging (noising) the dataset has been removed, the technique outperformed tagged back-translation by 0.4 BLEU . The approach reached the best scores in less training time than the standard and tagged back-translation approaches .", "edit_actions": [{"type": "A", "before": null, "after": "The method was not able to utilize the available huge amount of monolingual data because of the inability of models to differentiate between the authentic and synthetic parallel data.", "start_char_pos": 201, "end_char_pos": 201}, {"type": "R", "before": "natural data. This improves", "after": "authentic data, improving", "start_char_pos": 307, "end_char_pos": 334}, {"type": "R", "before": "enables", "after": "enabling", "start_char_pos": 370, "end_char_pos": 377}, {"type": "R", "before": "underperformed", "after": "under-performed", "start_char_pos": 439, "end_char_pos": 453}, {"type": "R", "before": "a simplified", "after": "pre-training and fine-tuning as a simplified but more effective", "start_char_pos": 506, "end_char_pos": 518}, {"type": "D", "before": "using pretraining and finetuning", "after": null, "start_char_pos": 568, "end_char_pos": 600}, {"type": "R", "before": "finetunes", "after": "fine-tunes", "start_char_pos": 689, "end_char_pos": 698}, {"type": "R", "before": "natural data. Preliminary experiments", "after": "authentic data. Experiments", "start_char_pos": 709, "end_char_pos": 746}, {"type": "R", "before": "continuously outperform the tagging approach", "after": "outperform the baseline and standard back-translation by 4.0 and 0.7 BLEU respectively", "start_char_pos": 774, "end_char_pos": 818}, {"type": "R", "before": "neural machine translation", "after": "NMT", "start_char_pos": 854, "end_char_pos": 880}, {"type": "R", "before": "approach outperformed the", "after": "technique outperformed", "start_char_pos": 954, "end_char_pos": 979}, {"type": "R", "before": "approach by an average of", "after": "by", "start_char_pos": 1004, "end_char_pos": 1029}, {"type": "A", "before": null, "after": ". The approach reached the best scores in less training time than the standard and tagged back-translation approaches", "start_char_pos": 1039, "end_char_pos": 1039}], "sents_char_pos": [0, 200, 320, 486, 602, 722, 882]}
+{"doc_id": "1912.11870", "revision_depth": "1", "before_revision": "The effects of positive and negative hydrationof counterions (Na^{+ and Cs^{+} ) incorporated into the hydration shell of the DNA double helix have been studied using molecular dynamics approach . The results show that the dynamics of the hydration shell of counterions depends on region of ion localization around the macromolecule. The longest residence times have been observed for water molecules near the counterionsthat are localized in the minor groove of the double helix : about 30 ps in the case of Na^{+ K^{+} and Cs^{+} counterions. In the major groove and outside the double helix it is essentially lower. The counterions constrain water molecules too strong, and as the result the effect of negative hydration for K^{+} and Cs^{+} counterions was not observed in the simulations. The analysis show that the effects of counterion hydration may be described better by using the water models with lower dipole moments.", "after_revision": "The DNA double helix is a polyanionic macromolecule that in water solutions is neutralized by metal ions (counterions). The property of the counterions to stabilize the water network (positive hydration) or to make it friable (negative hydration) is important in terms of the physical mechanisms of stabilization of the DNA double helix. In the present research, the effects of positive hydration of Na^{+ and Cs^{+} counterions, incorporated into the hydration shell of the DNA double helix have been studied using molecular dynamics simulations . The results have shown that the dynamics of the hydration shell of counterions depends on region of the double helix: minor groove, major groove, and outside the macromolecule. The longest average residence time has been observed for water molecules contacting with the counterions, localized in the minor groove of the double helix (about 50 ps for Na^{+ K^{+} and Cs^{+} ). The estimated potentials of mean force for the hydration shells of the counterions show that the water molecules are constrained too strong, and , consequently, the effect of negative hydration for K^{+} and Cs^{+} counterions has not been observed in the simulations. The analysis has shown that the effects of counterion hydration can be described more accurately with water models having lower dipole moments.", "edit_actions": [{"type": "R", "before": "effects of positive and negative hydrationof counterions (Na^{+", "after": "DNA double helix is a polyanionic macromolecule that in water solutions is neutralized by metal ions (counterions). The property of the counterions to stabilize the water network (positive hydration) or to make it friable (negative hydration) is important in terms of the physical mechanisms of stabilization of the DNA double helix. In the present research, the effects of positive hydration of Na^{+", "start_char_pos": 4, "end_char_pos": 67}, {"type": "R", "before": ")", "after": "counterions,", "start_char_pos": 79, "end_char_pos": 80}, {"type": "R", "before": "approach", "after": "simulations", "start_char_pos": 186, "end_char_pos": 194}, {"type": "R", "before": "show", "after": "have shown", "start_char_pos": 209, "end_char_pos": 213}, {"type": "R", "before": "ion localization around the", "after": "the double helix: minor groove, major groove, and outside the", "start_char_pos": 291, "end_char_pos": 318}, {"type": "R", "before": "residence times have", "after": "average residence time has", "start_char_pos": 346, "end_char_pos": 366}, {"type": "R", "before": "near the counterionsthat are", "after": "contacting with the counterions,", "start_char_pos": 401, "end_char_pos": 429}, {"type": "R", "before": ": about 30 ps in the case of Na^{+", "after": "(about 50 ps for Na^{+", "start_char_pos": 480, "end_char_pos": 514}, {"type": "R", "before": "counterions. In the major groove and outside the double helix it is essentially lower. The counterions constrain water molecules", "after": "). The estimated potentials of mean force for the hydration shells of the counterions show that the water molecules are constrained", "start_char_pos": 532, "end_char_pos": 660}, {"type": "R", "before": "as the result the", "after": ", consequently, the", "start_char_pos": 677, "end_char_pos": 694}, {"type": "R", "before": "was not", "after": "has not been", "start_char_pos": 757, "end_char_pos": 764}, {"type": "R", "before": "show", "after": "has shown", "start_char_pos": 807, "end_char_pos": 811}, {"type": "R", "before": "may be described better by using the water models with", "after": "can be described more accurately with water models having", "start_char_pos": 853, "end_char_pos": 907}], "sents_char_pos": [0, 196, 333, 544, 618, 793]}
+{"doc_id": "2001.01266", "revision_depth": "2", "before_revision": "Using extremely large number of processing elements in computing systems leads to unexpected phenomena, such as different efficiencies of the same system for different tasks, that cannot be explained in the frame of the classical computing paradigm. The introduced simple non-technical model enables to set up a frame and formalism needed to explain the unexpected experiences around supercomputing. The paper shows that the degradation of the efficiency of the parallelized sequential system is a natural consequence of the computing paradigm, rather than an engineering imperfectness. The workload is greatly responsible for wasting the energy as well as limiting the size and the type of tasks the supercomputers can run . Case studies provide insight how the different contributions compete for dominating the resulting payload performance of the computing system, and how enhancing the technology made the computing+communication the dominating contribution in defining the efficiency of supercomputers. The model also enables to derive predictions about the supercomputer performance limitations for the near future as well as provides hints for enhancing the supercomputer components. The phenomena show interesting parallels with the phenomena experienced in science more than a century ago and through their studying a modern science was developed.", "after_revision": "Using an extremely large number of processing elements in computing systems leads to unexpected phenomena, such as different efficiencies of the same system for different tasks, that cannot be explained in the frame of classical computing paradigm. The simple non-technical (but considering the temporal behavior of the components) model, introduced here, enables us to set up a frame and formalism , needed to explain those unexpected experiences around supercomputing. Introducing temporal behavior into computer science also explains why only the extreme scale computing enabled us to reveal the experienced limitations. The paper shows , that degradation of efficiency of parallelized sequential systems is a natural consequence of the classical computing paradigm, instead of being an engineering imperfectness. The workload , that supercomputers run, is much responsible for wasting energy, as well as limiting the size and type of tasks . Case studies provide insight , how different contributions compete for dominating the resulting payload performance of a computing system, and how enhancing the interconnection technology made computing+communication to dominate in defining the efficiency of supercomputers. Our model also enables to derive predictions about supercomputer performance limitations for the near future , as well as it provides hints for enhancing supercomputer components. Phenomena experienced in large-scale computing show interesting parallels with phenomena experienced in science , more than a century ago , and through their studying a modern science was developed.", "edit_actions": [{"type": "A", "before": null, "after": "an", "start_char_pos": 6, "end_char_pos": 6}, {"type": "D", "before": "the", "after": null, "start_char_pos": 217, "end_char_pos": 220}, {"type": "D", "before": "introduced", "after": null, "start_char_pos": 255, "end_char_pos": 265}, {"type": "R", "before": "model enables", "after": "(but considering the temporal behavior of the components) model, introduced here, enables us", "start_char_pos": 287, "end_char_pos": 300}, {"type": "A", "before": null, "after": ",", "start_char_pos": 333, "end_char_pos": 333}, {"type": "R", "before": "the", "after": "those", "start_char_pos": 352, "end_char_pos": 355}, {"type": "A", "before": null, "after": "Introducing temporal behavior into computer science also explains why only the extreme scale computing enabled us to reveal the experienced limitations.", "start_char_pos": 402, "end_char_pos": 402}, {"type": "R", "before": "that the degradation of the efficiency of the parallelized sequential system", "after": ", that degradation of efficiency of parallelized sequential systems", "start_char_pos": 419, "end_char_pos": 495}, {"type": "A", "before": null, "after": "classical", "start_char_pos": 528, "end_char_pos": 528}, {"type": "R", "before": "rather than", "after": "instead of being", "start_char_pos": 549, "end_char_pos": 560}, {"type": "R", "before": "is greatly", "after": ", that supercomputers run, is much", "start_char_pos": 604, "end_char_pos": 614}, {"type": "R", "before": "the energy", "after": "energy,", "start_char_pos": 639, "end_char_pos": 649}, {"type": "D", "before": "the", "after": null, "start_char_pos": 683, "end_char_pos": 686}, {"type": "D", "before": "the supercomputers can run", "after": null, "start_char_pos": 701, "end_char_pos": 727}, {"type": "R", "before": "how the", "after": ", how", "start_char_pos": 759, "end_char_pos": 766}, {"type": "R", "before": "the", "after": "a", "start_char_pos": 851, "end_char_pos": 854}, {"type": "R", "before": "technology made the", "after": "interconnection technology made", "start_char_pos": 895, "end_char_pos": 914}, {"type": "R", "before": "the dominating contribution", "after": "to dominate", "start_char_pos": 939, "end_char_pos": 966}, {"type": "R", "before": "The", "after": "Our", "start_char_pos": 1013, "end_char_pos": 1016}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1064, "end_char_pos": 1067}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1126, "end_char_pos": 1126}, {"type": "A", "before": null, "after": "it", "start_char_pos": 1138, "end_char_pos": 1138}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1168, "end_char_pos": 1171}, {"type": "R", "before": "The phenomena", "after": "Phenomena experienced in large-scale computing", "start_char_pos": 1198, "end_char_pos": 1211}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1244, "end_char_pos": 1247}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1281, "end_char_pos": 1281}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1306, "end_char_pos": 1306}], "sents_char_pos": [0, 250, 401, 590, 1012, 1197]}
+{"doc_id": "2001.01340", "revision_depth": "1", "before_revision": "This study focuses on establishing an external human-machine interface (eHMI) for automated vehicles (AVs) that can clearly and quickly convey driving intentions to pedestrians, thus improving the acceptability of AVs. Frist of all, this study seeks to evaluate whether pedestrians clearly receive the information from the AV. This paper proposes a hypothesis based on a decision-making model of the pedestrian. If a pedestrian does not accurately understand the driving intentions of AVs, then his/her gaze duration at AVs will increase . A pedestrian--vehicle interaction experiment was designed to verify the proposed hypothesis. An AV was used for interacting with pedestrians but whether the AV stops or not during interactions that was controlled by the experimenter. The gaze data of pedestrians and their subjective evaluations of the AV's driving intentions were observed . The experimental results supported the hypothesis , i.e., there was a correlation between the participants ' gaze duration at an AV and their understanding of the AV's driving intention . Moreover, the gaze duration of most participants at a manually driving vehicle was shorter than that at an AV. Besides, we proposed two recommendations to the designers of eHMI : (1) when a pedestrian is engaged in an interaction with the AV, the driving intentions of the AV should be provided; (2) if the pedestrian still gazes at the AV after the AV displays its driving intentions, the AV should provide more clear information about its driving intentions.", "after_revision": "Interactions between pedestrians and automated vehicles (AVs) will increase significantly with the popularity of AV. However, pedestrians often have not enough trust on the AVs , particularly when they are confused about an AV's intention in a interaction. This study seeks to evaluate if pedestrians clearly understand the driving intentions of AVs in interactions and presents experimental research on the relationship between gaze behaviors of pedestrians and their understanding of the intentions of the AV. The hypothesis investigated in this study was that the less the pedestrian understands the driving intentions of the AV, the longer the duration of their gazing behavior will be . A pedestrian--vehicle interaction experiment was designed to verify the proposed hypothesis. A robotic wheelchair was used as the manual driving vehicle (MV) and AV for interacting with pedestrians while pedestrians' gaze data and their subjective evaluation of the driving intentions were recorded . The experimental results supported our hypothesis as there was a negative correlation between the pedestrians ' gaze duration on the AV and their understanding of the driving intentions of the AV . Moreover, the gaze duration of most of the pedestrians on the MV was shorter than that on an AV. Therefore, we conclude with two recommendations to designers of external human-machine interfaces (eHMI) : (1) when a pedestrian is engaged in an interaction with an AV, the driving intentions of the AV should be provided; (2) if the pedestrian still gazes at the AV after the AV displays its driving intentions, the AV should provide clearer information about its driving intentions.", "edit_actions": [{"type": "R", "before": "This study focuses on establishing an external human-machine interface (eHMI) for", "after": "Interactions between pedestrians and", "start_char_pos": 0, "end_char_pos": 81}, {"type": "R", "before": "that can clearly and quickly convey driving intentions to pedestrians, thus improving the acceptability of AVs. Frist of all, this", "after": "will increase significantly with the popularity of AV. However, pedestrians often have not enough trust on the AVs , particularly when they are confused about an AV's intention in a interaction. This", "start_char_pos": 107, "end_char_pos": 237}, {"type": "R", "before": "whether pedestrians clearly receive the information from the AV. This paper proposes a hypothesis based on a decision-making model of the pedestrian. If a pedestrian does not accurately understand", "after": "if pedestrians clearly understand the driving intentions of AVs in interactions and presents experimental research on the relationship between gaze behaviors of pedestrians and their understanding of the intentions of the AV. The hypothesis investigated in this study was that the less the pedestrian understands", "start_char_pos": 262, "end_char_pos": 458}, {"type": "R", "before": "AVs, then his/her gaze duration at AVs will increase", "after": "the AV, the longer the duration of their gazing behavior will be", "start_char_pos": 485, "end_char_pos": 537}, {"type": "R", "before": "An AV was used", "after": "A robotic wheelchair was used as the manual driving vehicle (MV) and AV", "start_char_pos": 633, "end_char_pos": 647}, {"type": "R", "before": "but whether the AV stops or not during interactions that was controlled by the experimenter. The gaze data of pedestrians", "after": "while pedestrians' gaze data", "start_char_pos": 681, "end_char_pos": 802}, {"type": "R", "before": "evaluations of the AV's", "after": "evaluation of the", "start_char_pos": 824, "end_char_pos": 847}, {"type": "R", "before": "observed", "after": "recorded", "start_char_pos": 872, "end_char_pos": 880}, {"type": "R", "before": "the hypothesis , i.e.,", "after": "our hypothesis as", "start_char_pos": 918, "end_char_pos": 940}, {"type": "A", "before": null, "after": "negative", "start_char_pos": 953, "end_char_pos": 953}, {"type": "R", "before": "participants", "after": "pedestrians", "start_char_pos": 978, "end_char_pos": 990}, {"type": "R", "before": "at an", "after": "on the", "start_char_pos": 1007, "end_char_pos": 1012}, {"type": "R", "before": "AV's driving intention", "after": "driving intentions of the AV", "start_char_pos": 1047, "end_char_pos": 1069}, {"type": "R", "before": "participants at a manually driving vehicle", "after": "of the pedestrians on the MV", "start_char_pos": 1108, "end_char_pos": 1150}, {"type": "R", "before": "at", "after": "on", "start_char_pos": 1173, "end_char_pos": 1175}, {"type": "R", "before": "Besides, we proposed", "after": "Therefore, we conclude with", "start_char_pos": 1183, "end_char_pos": 1203}, {"type": "R", "before": "the designers of eHMI", "after": "designers of external human-machine interfaces (eHMI)", "start_char_pos": 1227, "end_char_pos": 1248}, {"type": "R", "before": "the", "after": "an", "start_char_pos": 1307, "end_char_pos": 1310}, {"type": "R", "before": "more clear", "after": "clearer", "start_char_pos": 1480, "end_char_pos": 1490}], "sents_char_pos": [0, 218, 326, 411, 539, 632, 773, 882, 1071, 1182, 1367]}
+{"doc_id": "2001.03197", "revision_depth": "1", "before_revision": "The emergence of autonomous vehicles ( AVs) is anticipated to influence the public transportation (PT) system . Many possible relationships between AV and PT are proposed depending on the policy and institution, where competition and cooperation are two main categories. This paper focuses on the former in a hypothetical scenario- \"if both AV and PT operators were only profit-oriented . \" We aim to quantitatively evaluate the system performance (e.g. level of service, operators' financial viability, transport efficiency) when AV and PT are profit-oriented competitors with dynamic adjustable supply strategies under certain policy constraints. We assume AV can adjust the fleetsize and PT can adjust the headway. Service fare and bus routes are fixed. The competition process is analyzed through an agent-based simulation platform, which incorporates a proposed heuristic dynamic supply updating algorithm (HDSUA). The first-mile scenario in Singapore Tampinesarea is selected as the case study, where only bus is considered for PT system. We found that when AV and bus operators are given the flexibility to adjust supply, both of them will re-distribute their supply spatially and temporally, leading to higher profits . In temporal dimension, both AV and bus will concentrate their supplies in morning and evening peak hours, and reduce the supplies in off-peak hours. The competition between AV and PT decreases passengers' travel time but increase their travel cost. The generalized travel cost is still reduced when counting the value of time. The bus supply adjustment can increase the bus average load and reduce total passenger car equivalent (PCE), which is good for transport efficiency and sustainability. But the AV supply adjustment shows the opposite effect. Overall, the competition does not necessarily bring out loss-gain results. A win-win outcome is also possible under certain policy interventions .", "after_revision": "The emerging autonomous vehicles ( AV) can either supplement the public transportation (PT) system or be a competitor with it. This paper focuses on this competition in a hypothetical scenario-- \"if both AV and PT operators are profit-oriented , \" and uses an ABM to quantitatively evaluate the system performance in this competition from the perspectives of four stakeholders--AV operator, PT operator, passengers, and public authority. In our model, AV operator updates its supply by changing fleet sizes while PT by adjusting headways, and both use heuristic approaches to update supply in order to increase profits. We implement the model in the first-mile scenario in Tampines. In four regulation scenarios--two by two combinations regarding whether AV and PT are allowed to change supplies--we find that since AV can release the bus operator from low-demand routes, the competition can lead to higher profits of both, and higher system efficiency, simultaneously, rather than a one-sided loss-gain result. For PT, after supply updates, spatially the services are concentrated to short feeder routes directly to the subway station, and temporally concentrated to peak hours. For passengers, the competition reduces their travel time but increases their travel costs. Nonetheless, the generalized travel cost is still reduced when counting the value of time. For system efficiency and sustainability, bus supply adjustment can increase the bus average load and reduce total PCE, while the AV supply adjustment shows the opposite effect. For policy implications, the paper suggests that PT should be allowed to optimize its supply strategies under specific operation goal constraints, and AV operation should be regulated to relieve its externality on the system, including limiting the number of licenses, operation time, and service areas, which makes AV operate like a complementary mode to PT .", "edit_actions": [{"type": "R", "before": "emergence of", "after": "emerging", "start_char_pos": 4, "end_char_pos": 16}, {"type": "R", "before": "AVs) is anticipated to influence", "after": "AV) can either supplement", "start_char_pos": 39, "end_char_pos": 71}, {"type": "R", "before": ". Many possible relationships between AV and PT are proposed depending on the policy and institution, where competition and cooperation are two main categories.", "after": "or be a competitor with it.", "start_char_pos": 110, "end_char_pos": 270}, {"type": "R", "before": "the former", "after": "this competition", "start_char_pos": 293, "end_char_pos": 303}, {"type": "R", "before": "scenario-", "after": "scenario--", "start_char_pos": 322, "end_char_pos": 331}, {"type": "R", "before": "were only", "after": "are", "start_char_pos": 361, "end_char_pos": 370}, {"type": "R", "before": ".", "after": ",", "start_char_pos": 387, "end_char_pos": 388}, {"type": "R", "before": "We aim", "after": "and uses an ABM", "start_char_pos": 391, "end_char_pos": 397}, {"type": "R", "before": "(e.g. level of service, operators' financial viability, transport efficiency) when AV and PT are profit-oriented competitors with dynamic adjustable supply strategies under certain policy constraints. We assume AV can adjust the fleetsize and PT can adjust the headway. Service fare and bus routes are fixed. The competition process is analyzed through an agent-based simulation platform, which incorporates a proposed heuristic dynamic supply updating algorithm (HDSUA). The", "after": "in this competition from the perspectives of four stakeholders--AV operator, PT operator, passengers, and public authority. In our model, AV operator updates its supply by changing fleet sizes while PT by adjusting headways, and both use heuristic approaches to update supply in order to increase profits. We implement the model in the", "start_char_pos": 448, "end_char_pos": 923}, {"type": "R", "before": "Singapore Tampinesarea is selected as the case study, where only bus is considered for PT system. We found that when AV and bus operators are given the flexibility to adjust supply, both of them will re-distribute their supply spatially and temporally, leading", "after": "Tampines. In four regulation scenarios--two by two combinations regarding whether AV and PT are allowed to change supplies--we find that since AV can release the bus operator from low-demand routes, the competition can lead", "start_char_pos": 947, "end_char_pos": 1207}, {"type": "R", "before": ". In temporal dimension, both AV and bus will concentrate their supplies in morning and evening peak hours, and reduce the supplies in off-peak hours. The competition between AV and PT decreases passengers'", "after": "of both, and higher system efficiency, simultaneously, rather than a one-sided loss-gain result. For PT, after supply updates, spatially the services are concentrated to short feeder routes directly to the subway station, and temporally concentrated to peak hours. For passengers, the competition reduces their", "start_char_pos": 1226, "end_char_pos": 1432}, {"type": "R", "before": "increase their travel cost. The", "after": "increases their travel costs. Nonetheless, the", "start_char_pos": 1449, "end_char_pos": 1480}, {"type": "R", "before": "The", "after": "For system efficiency and sustainability,", "start_char_pos": 1555, "end_char_pos": 1558}, {"type": "R", "before": "passenger car equivalent (PCE), which is good for transport efficiency and sustainability. But", "after": "PCE, while", "start_char_pos": 1632, "end_char_pos": 1726}, {"type": "R", "before": "Overall, the competition does not necessarily bring out loss-gain results. A win-win outcome is also possible under certain policy interventions", "after": "For policy implications, the paper suggests that PT should be allowed to optimize its supply strategies under specific operation goal constraints, and AV operation should be regulated to relieve its externality on the system, including limiting the number of licenses, operation time, and service areas, which makes AV operate like a complementary mode to PT", "start_char_pos": 1779, "end_char_pos": 1923}], "sents_char_pos": [0, 111, 270, 648, 717, 756, 919, 1044, 1227, 1376, 1476, 1554, 1722, 1778, 1853]}
+{"doc_id": "2001.03513", "revision_depth": "1", "before_revision": "Women have always been underrepresented in movies and not until recently do women representation in movies improve . To investigate the improvement of women representation and its relationship with a movie's success, we propose a new measure, the female cast ratio, and compare it to the commonly used Bechdel test result. We employ generalized linear regression with L_1 penalty and a Random Forest model to identify the predictors that are influential on women representation, and evaluate the relationship between women representation and a movie's success in three aspects: revenue/budget ratio, rating and popularity. Three important findings in our study have highlighted the difficulties women in the film industry face in both upstream and downstream. First, female filmmakers especially female screenplay writers are instrumental for movies to have better women representation, but the percentage of female filmmakers has been very low. Second, lower budgets are often made to support movies that could tell good stories about women , and this usually cause the films to in turn receive more criticisms . Finally, the demand for better women presentation from moviegoers has also not been strong enough to compel the film industry for a change, as movies that have poor women representation can still be very popular and successful in the box office.", "after_revision": "Women have always been underrepresented in movies and not until recently has the representation of women in movies improved . To investigate the improvement of female representation and its relationship with a movie's success, we propose a new measure, the female cast ratio, and compare it to the commonly used Bechdel test result. We employ generalized linear regression with L_1 penalty and a Random Forest model to identify the predictors that influence female representation, and evaluate the relationship between female representation and a movie's success in three aspects: revenue/budget ratio, rating , and popularity. Three important findings in our study have highlighted the difficulties women in the film industry face both upstream and downstream. First, female filmmakers , especially female screenplay writers , are instrumental for movies to have better female representation, but the percentage of female filmmakers has been very low. Second, movies that have the potential to tell insightful stories about women are often provided with lower budgets , and this usually causes the films to in turn receive more criticism . Finally, the demand for better female representation from moviegoers has also not been strong enough to compel the film industry to change, as movies that have poor female representation can still be very popular and successful in the box office.", "edit_actions": [{"type": "R", "before": "do women representation in movies improve", "after": "has the representation of women in movies improved", "start_char_pos": 73, "end_char_pos": 114}, {"type": "R", "before": "women", "after": "female", "start_char_pos": 151, "end_char_pos": 156}, {"type": "R", "before": "are influential on women", "after": "influence female", "start_char_pos": 438, "end_char_pos": 462}, {"type": "R", "before": "women", "after": "female", "start_char_pos": 517, "end_char_pos": 522}, {"type": "A", "before": null, "after": ",", "start_char_pos": 607, "end_char_pos": 607}, {"type": "D", "before": "in", "after": null, "start_char_pos": 728, "end_char_pos": 730}, {"type": "A", "before": null, "after": ",", "start_char_pos": 786, "end_char_pos": 786}, {"type": "A", "before": null, "after": ",", "start_char_pos": 824, "end_char_pos": 824}, {"type": "R", "before": "women", "after": "female", "start_char_pos": 868, "end_char_pos": 873}, {"type": "R", "before": "lower budgets are often made to support movies that could tell good", "after": "movies that have the potential to tell insightful", "start_char_pos": 957, "end_char_pos": 1024}, {"type": "A", "before": null, "after": "are often provided with lower budgets", "start_char_pos": 1045, "end_char_pos": 1045}, {"type": "R", "before": "cause", "after": "causes", "start_char_pos": 1065, "end_char_pos": 1070}, {"type": "R", "before": "criticisms", "after": "criticism", "start_char_pos": 1105, "end_char_pos": 1115}, {"type": "R", "before": "women presentation", "after": "female representation", "start_char_pos": 1149, "end_char_pos": 1167}, {"type": "R", "before": "for a", "after": "to", "start_char_pos": 1244, "end_char_pos": 1249}, {"type": "R", "before": "women", "after": "female", "start_char_pos": 1283, "end_char_pos": 1288}], "sents_char_pos": [0, 116, 322, 623, 760, 948, 1117]}
+{"doc_id": "2001.07824", "revision_depth": "1", "before_revision": "Decision models can synthesize evidence from different sources to provide estimates of long-term consequences of a decision with uncertainty. Cohort state-transition models (cSTM) are decision models commonly used in medical decision making because they can simulate hypothetical cohorts' transitions across various health states over time. This tutorial shows how to conceptualize cSTMs in a programming languageenvironment and shows examples of their implementation in R. We illustrate their use in a cost-effectiveness analysis of a treatment using a previously published testbed cSTM. Both time-independent cSTM where transition probabilities are constant over time and time-dependent cSTM where transition probabilities vary over time are represented. For the time-dependent cSTM, we consider transition probabilities dependent on age and state residence . We also illustrate how this setup can facilitate the computation of epidemiological outcomes of interest, such as survival and prevalence. We conclude by demonstrating how to calculate economic outcomes and conducting a cost-effectiveness analysis of a treatment compared to usual care using the testbed model . We provide a link to a public repository with all the R code described in this tutorial that can be used to replicate the example or to be modified to suit different decision modeling needs .", "after_revision": "Decision models can synthesize evidence from different sources to simulate long-term consequences of different strategies in the presence of uncertainty. Cohort state-transition models (cSTM) are decision models commonly used in medical decision making to simulate hypothetical cohorts' transitions across various health states over time. This tutorial shows how to implement cSTMs in R, an open-source mathematical and statistical programming language. As an example, we use a previously published cSTM-based cost-effectiveness analysis. With this example, we illustrate both time-independent cSTMs, where transition probabilities are constant over time , and time-dependent cSTMs, where transition probabilities vary by age and are dependent on time spent in a health state (state residence) . We also illustrate how to compute various epidemiological outcomes of interest, such as survival and prevalence. We demonstrate how to calculate economic outcomes and conducting a cost-effectiveness analysis of multiple strategies using the example model, and provide additional resources to conduct probabilistic sensitivity analyses . We provide a link to a public repository with all the R code described in this tutorial that can be used to replicate the example or be adapted for various decision modeling applications .", "edit_actions": [{"type": "R", "before": "provide estimates of", "after": "simulate", "start_char_pos": 66, "end_char_pos": 86}, {"type": "R", "before": "a decision with", "after": "different strategies in the presence of", "start_char_pos": 113, "end_char_pos": 128}, {"type": "R", "before": "because they can", "after": "to", "start_char_pos": 241, "end_char_pos": 257}, {"type": "R", "before": "conceptualize cSTMs in a programming languageenvironment and shows examples of their implementation in R. We illustrate their use in a", "after": "implement cSTMs in R, an open-source mathematical and statistical programming language. As an example, we use a previously published cSTM-based", "start_char_pos": 368, "end_char_pos": 502}, {"type": "R", "before": "analysis of a treatment using a previously published testbed cSTM. Both", "after": "analysis. With this example, we illustrate both", "start_char_pos": 522, "end_char_pos": 593}, {"type": "R", "before": "cSTM", "after": "cSTMs,", "start_char_pos": 611, "end_char_pos": 615}, {"type": "A", "before": null, "after": ",", "start_char_pos": 670, "end_char_pos": 670}, {"type": "R", "before": "cSTM", "after": "cSTMs,", "start_char_pos": 690, "end_char_pos": 694}, {"type": "R", "before": "over time are represented. For the time-dependent cSTM, we consider transition probabilities dependent on age and state residence", "after": "by age and are dependent on time spent in a health state (state residence)", "start_char_pos": 731, "end_char_pos": 860}, {"type": "R", "before": "this setup can facilitate the computation of", "after": "to compute various", "start_char_pos": 886, "end_char_pos": 930}, {"type": "R", "before": "conclude by demonstrating", "after": "demonstrate", "start_char_pos": 1005, "end_char_pos": 1030}, {"type": "R", "before": "a treatment compared to usual care using the testbed model", "after": "multiple strategies using the example model, and provide additional resources to conduct probabilistic sensitivity analyses", "start_char_pos": 1114, "end_char_pos": 1172}, {"type": "R", "before": "to be modified to suit different decision modeling needs", "after": "be adapted for various decision modeling applications", "start_char_pos": 1308, "end_char_pos": 1364}], "sents_char_pos": [0, 141, 340, 473, 588, 757, 862, 1001, 1174]}
+{"doc_id": "2001.08950", "revision_depth": "1", "before_revision": "BERT has emerged as a popular model for natural language understanding. Given its compute intensive nature, even for inference, many recent studies have considered optimization of two important performance characteristics: model size and inference time. We consider classification tasks and propose a novel method, called PoWER-BERT, for improving the inference time for the BERT model without significant loss in the accuracy. The method works byeliminating word-vectors (intermediate vector outputs) from the encoder pipeline. We design a strategy for measuring the significanceof the word-vectors based on the self-attention mechanism of the encoders which helps us identify the word-vectors to be eliminated. Experimental evaluation on the standard GLUE benchmark shows that PoWER-BERT achieves up to 4.5x reduction in inference time over BERT with <1\\% loss in accuracy. We show that compared to the prior inference time reduction methods, PoWER-BERT offers better trade-off between accuracy and inference time . Lastly, we demonstrate that our scheme can also be used in conjunction with ALBERT (a highly compressed version of BERT) and can attain up to 6.8x factor reduction in inference time with <1\\% loss in accuracy .", "after_revision": "We develop a novel method, called PoWER-BERT, for improving the inference time of the popular BERT model, while maintaining the accuracy. It works by: a) exploiting redundancy pertaining to word-vectors (intermediate encoder outputs) and eliminating the redundant vectors. b) determining which word-vectors to eliminate by developing a strategy for measuring their significance, based on the self-attention mechanism ; c) learning how many word-vectors to eliminate by augmenting the BERT model and the loss function. Experiments on the standard GLUE benchmark shows that PoWER-BERT achieves up to 4.5x reduction in inference time over BERT with <1\\% loss in accuracy. We show that PoWER-BERT offers significantly better trade-off between accuracy and inference time compared to prior methods. We demonstrate that our method attains up to 6.8x reduction in inference time with <1\\% loss in accuracy when applied over ALBERT, a highly compressed version of BERT .", "edit_actions": [{"type": "R", "before": "BERT has emerged as a popular model for natural language understanding. Given its compute intensive nature, even for inference, many recent studies have considered optimization of two important performance characteristics: model size and inference time. We consider classification tasks and propose", "after": "We develop", "start_char_pos": 0, "end_char_pos": 298}, {"type": "R", "before": "for the BERT model without significant loss in", "after": "of the popular BERT model, while maintaining", "start_char_pos": 367, "end_char_pos": 413}, {"type": "R", "before": "The method works byeliminating", "after": "It works by: a) exploiting redundancy pertaining to", "start_char_pos": 428, "end_char_pos": 458}, {"type": "R", "before": "vector outputs) from the encoder pipeline. We design", "after": "encoder outputs) and eliminating the redundant vectors. b) determining which word-vectors to eliminate by developing", "start_char_pos": 486, "end_char_pos": 538}, {"type": "R", "before": "the significanceof the word-vectors", "after": "their significance,", "start_char_pos": 564, "end_char_pos": 599}, {"type": "R", "before": "of the encoders which helps us identify the", "after": "; c) learning how many", "start_char_pos": 638, "end_char_pos": 681}, {"type": "R", "before": "be eliminated. Experimental evaluation", "after": "eliminate by augmenting the BERT model and the loss function. Experiments", "start_char_pos": 698, "end_char_pos": 736}, {"type": "D", "before": "compared to the prior inference time reduction methods,", "after": null, "start_char_pos": 889, "end_char_pos": 944}, {"type": "A", "before": null, "after": "significantly", "start_char_pos": 963, "end_char_pos": 963}, {"type": "R", "before": ". Lastly, we", "after": "compared to prior methods. We", "start_char_pos": 1017, "end_char_pos": 1029}, {"type": "R", "before": "scheme can also be used in conjunction with ALBERT (a highly compressed version of BERT) and can attain", "after": "method attains", "start_char_pos": 1051, "end_char_pos": 1154}, {"type": "D", "before": "factor", "after": null, "start_char_pos": 1166, "end_char_pos": 1172}, {"type": "A", "before": null, "after": "when applied over ALBERT, a highly compressed version of BERT", "start_char_pos": 1228, "end_char_pos": 1228}], "sents_char_pos": [0, 71, 253, 427, 528, 712, 875]}
+{"doc_id": "2001.09850", "revision_depth": "1", "before_revision": "We propose a novel time discretization for the log-normal SABR model dS_t = \\sigma_t S_t dW_t, d\\sigma_t = \\omega \\sigma_t dZ_t, with \\mbox{corr(W_t,Z_t)=\\varrho, } which is a variant of the Euler-Maruyama scheme , and study its asymptotic properties in the limit of a large number of time steps n%DIFDELCMD < \\to %%% \\infty at fixed \\beta =%DIFDELCMD < \\frac12%%% \\omega^2 n^2\\tau, \\rho = \\sigma_0\\sqrt{\\tau . We derive an almost sure limit and a large deviations result for the log-asset price in the n%DIFDELCMD < \\to %%% \\infty limit . The rate function of the large deviations result does not depend on the discretization time step \\tau. The implied volatility surface \\sigma_{\\rm BS for arbitrary maturity and strike in the limit \\omega^2 T%DIFDELCMD < \\to %%% 0 , \\sigma_0^2 T%DIFDELCMD < \\to %%% \\infty at fixed (\\omega^2 T)(\\sigma_0^2 T) is represented as an extremal problem . Using this representation we obtain analytical expansions of \\sigma_{\\rm BS for small maturity and extreme strikes .", "after_revision": "We propose a novel time discretization for the log-normal SABR model (W_t,Z_t)=\\varrho, } which is a popular stochastic volatility model that is widely used in financial practice. Our time discretization is a variant of the Euler-Maruyama scheme . We study its asymptotic properties in the limit of a large number of time steps %DIFDELCMD < \\to %%% %DIFDELCMD < \\frac12%%% under a certain asymptotic regime which includes the case of finite maturity, small vol-of-vol and large initial volatility with fixed product of vol-of-vol and initial volatility . We derive an almost sure limit and a large deviations result for the log-asset price in the %DIFDELCMD < \\to %%% limit of large number of time steps. We derive an exact representation of the implied volatility surface for arbitrary maturity and strike in %DIFDELCMD < \\to %%% %DIFDELCMD < \\to %%% this regime . Using this representation we obtain analytical expansions of the implied volatility for small maturity and extreme strikes , which reproduce at leading order known asymptotic results for the continuous time model .", "edit_actions": [{"type": "D", "before": "dS_t = \\sigma_t S_t dW_t, d\\sigma_t = \\omega \\sigma_t dZ_t, with \\mbox{corr", "after": null, "start_char_pos": 69, "end_char_pos": 144}, {"type": "A", "before": null, "after": "popular stochastic volatility model that is widely used in financial practice. Our time discretization is a", "start_char_pos": 176, "end_char_pos": 176}, {"type": "R", "before": ", and", "after": ". We", "start_char_pos": 214, "end_char_pos": 219}, {"type": "D", "before": "n", "after": null, "start_char_pos": 297, "end_char_pos": 298}, {"type": "D", "before": "\\infty at fixed \\beta =", "after": null, "start_char_pos": 319, "end_char_pos": 342}, {"type": "R", "before": "\\omega^2 n^2\\tau, \\rho = \\sigma_0\\sqrt{\\tau", "after": "under a certain asymptotic regime which includes the case of finite maturity, small vol-of-vol and large initial volatility with fixed product of vol-of-vol and initial volatility", "start_char_pos": 366, "end_char_pos": 409}, {"type": "D", "before": "n", "after": null, "start_char_pos": 504, "end_char_pos": 505}, {"type": "R", "before": "\\infty limit . The rate function of the large deviations result does not depend on the discretization time step \\tau. The", "after": "limit of large number of time steps. We derive an exact representation of the", "start_char_pos": 526, "end_char_pos": 647}, {"type": "D", "before": "\\sigma_{\\rm BS", "after": null, "start_char_pos": 675, "end_char_pos": 689}, {"type": "D", "before": "the limit \\omega^2 T", "after": null, "start_char_pos": 727, "end_char_pos": 747}, {"type": "D", "before": "0 , \\sigma_0^2 T", "after": null, "start_char_pos": 768, "end_char_pos": 784}, {"type": "R", "before": "\\infty at fixed (\\omega^2 T)(\\sigma_0^2 T) is represented as an extremal problem", "after": "this regime", "start_char_pos": 805, "end_char_pos": 885}, {"type": "R", "before": "\\sigma_{\\rm BS", "after": "the implied volatility", "start_char_pos": 949, "end_char_pos": 963}, {"type": "A", "before": null, "after": ", which reproduce at leading order known asymptotic results for the continuous time model", "start_char_pos": 1003, "end_char_pos": 1003}], "sents_char_pos": [0, 411, 540, 643, 887]}
+{"doc_id": "2001.10696", "revision_depth": "1", "before_revision": "Spiking Neural Network (SNN), as a brain-inspired approach, is attracting attentions due to its potential to produce ultra-high-energy-efficient hardware. Competitive learning based on Spike-Timing-Dependent Plasticity (STDP) is a popular method to train unsupervised SNN. However, previous unsupervised SNNs trained through this method are limited to shallow networks with only one learnable layer and can't achieve satisfactory results when compared with multi-layer SNNs. In this paper, we ease this limitation by: 1)We propose Spiking Inception (Sp-Inception) module, inspired by the Inception module in Artificial Neural Network (ANN) literature. This module is trained through STDP- based competitive learning and outperforms baseline modules on learning capability, learning efficiency, and robustness ; 2)We propose Pooling-Reshape-Activate (PRA) layer to make Sp-Inception module stackable ; 3)We stack multiple Sp-Inception modules to construct multi-layer SNNs. Our method greatly exceeds baseline methods on image classification tasks and reaches state-of-the-art results on MNIST dataset among existing unsupervised SNNs.", "after_revision": "Spiking Neural Network (SNN), as a brain-inspired approach, is attracting attention due to its potential to produce ultra-high-energy-efficient hardware. Competitive learning based on Spike-Timing-Dependent Plasticity (STDP) is a popular method to train an unsupervised SNN. However, previous unsupervised SNNs trained through this method are limited to a shallow network with only one learnable layer and cannot achieve satisfactory results when compared with multi-layer SNNs. In this paper, we eased this limitation by: 1)We proposed a Spiking Inception (Sp-Inception) module, inspired by the Inception module in the Artificial Neural Network (ANN) literature. This module is trained through STDP-based competitive learning and outperforms the baseline modules on learning capability, learning efficiency, and robustness . 2)We proposed a Pooling-Reshape-Activate (PRA) layer to make the Sp-Inception module stackable . 3)We stacked multiple Sp-Inception modules to construct multi-layer SNNs. Our algorithm outperforms the baseline algorithms on the hand-written digit classification task, and reaches state-of-the-art results on the MNIST dataset among the existing unsupervised SNNs.", "edit_actions": [{"type": "R", "before": "attentions", "after": "attention", "start_char_pos": 74, "end_char_pos": 84}, {"type": "A", "before": null, "after": "an", "start_char_pos": 255, "end_char_pos": 255}, {"type": "R", "before": "shallow networks", "after": "a shallow network", "start_char_pos": 353, "end_char_pos": 369}, {"type": "R", "before": "can't", "after": "cannot", "start_char_pos": 404, "end_char_pos": 409}, {"type": "R", "before": "ease", "after": "eased", "start_char_pos": 494, "end_char_pos": 498}, {"type": "R", "before": "propose", "after": "proposed a", "start_char_pos": 524, "end_char_pos": 531}, {"type": "A", "before": null, "after": "the", "start_char_pos": 609, "end_char_pos": 609}, {"type": "R", "before": "STDP- based", "after": "STDP-based", "start_char_pos": 685, "end_char_pos": 696}, {"type": "A", "before": null, "after": "the", "start_char_pos": 734, "end_char_pos": 734}, {"type": "R", "before": ";", "after": ".", "start_char_pos": 812, "end_char_pos": 813}, {"type": "R", "before": "propose", "after": "proposed a", "start_char_pos": 819, "end_char_pos": 826}, {"type": "A", "before": null, "after": "the", "start_char_pos": 872, "end_char_pos": 872}, {"type": "R", "before": ";", "after": ".", "start_char_pos": 903, "end_char_pos": 904}, {"type": "R", "before": "stack", "after": "stacked", "start_char_pos": 910, "end_char_pos": 915}, {"type": "R", "before": "method greatly exceeds baseline methods on image classification tasks", "after": "algorithm outperforms the baseline algorithms on the hand-written digit classification task,", "start_char_pos": 981, "end_char_pos": 1050}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1091, "end_char_pos": 1091}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1112, "end_char_pos": 1112}], "sents_char_pos": [0, 154, 653, 813, 904]}
+{"doc_id": "2001.11432", "revision_depth": "1", "before_revision": "The activity of neuronal networks can exhibit periods of bursting, the properties of which remain unclear. To study the bursting dynamics of a network , we develop a new stochastic model based on synaptic properties that also accounts for afterhyperpolarization , which shapes the end of a burst. A stochastic perturbation of this system leads to a succession of bursts and interbursts and we characterize their durations using a three dimensional phase-space analysis and numerical simulations. The phase-space contains three critical points (one attractor and two saddles) separated by a two-dimensional stable manifold \\Sigma. Bursting is defined by long deterministic excursions outside the basin of attraction, while the interburst duration is defined by the escape induced by random fluctuations. To characterize the distribution of the burst durations, we determine the distribution of exit points located on the two-dimensional separatrix \\Sigma . In addition, we compute analytically the mean burst and AHP durations using a linearization approximation of the dynamical system . Finally, we explore how various parameters such as the network connectivity and the afterhyperpolarization characteristics influence bursting and AHP dynamics . To conclude , this new model allows us to better characterize the role of various physiological parameters on bursting dynamics .", "after_revision": "In the absence of inhibition, excitatory neuronal networks can alternate between bursts and interburst intervals (IBI), with heterogeneous length distributions. As this dynamic remains unclear, especially the durations of each epoch , we develop here a bursting model based on synaptic depression and facilitation that also accounts for afterhyperpolarization (AHP), which is a key component of IBI. The framework is a novel stochastic three dimensional dynamical system perturbed by noise: numerical simulations can reproduce a succession of bursts and interbursts . Each phase corresponds to an exploration of a fraction of the phase-space , which contains three critical points (one attractor and two saddles) separated by a two-dimensional stable manifold \\Sigma. We show here that bursting is defined by long deterministic excursions away from the attractor, while IBI corresponds to escape induced by random fluctuations. We show that the variability in the burst durations, depends on the distribution of exit points located on \\Sigma that we compute using WKB and the method of characteristics . Finally, to better characterize the role of several parameters such as the network connectivity or the AHP time scale, we compute analytically the mean burst and AHP durations in a linear approximation . To conclude the distribution of bursting and IBI could result from synaptic dynamics modulated by AHP .", "edit_actions": [{"type": "R", "before": "The activity of", "after": "In the absence of inhibition, excitatory", "start_char_pos": 0, "end_char_pos": 15}, {"type": "R", "before": "exhibit periods of bursting, the properties of which remain unclear. To study the bursting dynamics of a network", "after": "alternate between bursts and interburst intervals (IBI), with heterogeneous length distributions. As this dynamic remains unclear, especially the durations of each epoch", "start_char_pos": 38, "end_char_pos": 150}, {"type": "R", "before": "a new stochastic", "after": "here a bursting", "start_char_pos": 164, "end_char_pos": 180}, {"type": "R", "before": "properties", "after": "depression and facilitation", "start_char_pos": 205, "end_char_pos": 215}, {"type": "R", "before": ", which shapes the end of a burst. A stochastic perturbation of this system leads to", "after": "(AHP), which is a key component of IBI. The framework is a novel stochastic three dimensional dynamical system perturbed by noise: numerical simulations can reproduce", "start_char_pos": 262, "end_char_pos": 346}, {"type": "R", "before": "and we characterize their durations using a three dimensional", "after": ". Each phase corresponds to an exploration of a fraction of the", "start_char_pos": 386, "end_char_pos": 447}, {"type": "R", "before": "analysis and numerical simulations. The phase-space", "after": ", which", "start_char_pos": 460, "end_char_pos": 511}, {"type": "R", "before": "Bursting", "after": "We show here that bursting", "start_char_pos": 630, "end_char_pos": 638}, {"type": "R", "before": "outside the basin of attraction, while the interburst duration is defined by the", "after": "away from the attractor, while IBI corresponds to", "start_char_pos": 683, "end_char_pos": 763}, {"type": "R", "before": "To characterize the distribution of", "after": "We show that the variability in", "start_char_pos": 803, "end_char_pos": 838}, {"type": "R", "before": "we determine", "after": "depends on", "start_char_pos": 860, "end_char_pos": 872}, {"type": "R", "before": "the two-dimensional separatrix \\Sigma . In addition, we compute analytically the mean burst and AHP durations using a linearization approximation of the dynamical system", "after": "\\Sigma that we compute using WKB and the method of characteristics", "start_char_pos": 916, "end_char_pos": 1085}, {"type": "R", "before": "we explore how various", "after": "to better characterize the role of several", "start_char_pos": 1097, "end_char_pos": 1119}, {"type": "R", "before": "and the afterhyperpolarization characteristics influence bursting and AHP dynamics", "after": "or the AHP time scale, we compute analytically the mean burst and AHP durations in a linear approximation", "start_char_pos": 1164, "end_char_pos": 1246}, {"type": "R", "before": ", this new model allows us to better characterize the role of various physiological parameters on bursting dynamics", "after": "the distribution of bursting and IBI could result from synaptic dynamics modulated by AHP", "start_char_pos": 1261, "end_char_pos": 1376}], "sents_char_pos": [0, 106, 296, 495, 629, 802, 955, 1087, 1248]}
+{"doc_id": "2002.04242", "revision_depth": "1", "before_revision": "Due to world dynamics and hardware uncertainty, robots inevitably fail in task executions, leading to undesired or even dangerous executions. To avoid failures for improved robot performance, it is critical to identify and correct robot abnormal executions in an early stage. However, limited by reasoning capability and knowledge level , it is challenging for a robot to self diagnose and correct their abnormal behaviors. To solve this problem, a novel method is proposed, human-to-robot attention transfer ( H2R-AT) to seek help from a human . H2R-AT is developed based on \\textbf{ \\textit{\\textbf{ a novel stacked neural networks model, transferring human attention embedded in verbal reminders to robot attention embedded in robot visual perceiving . With the attention transfer from a human , a robot understands what and where \\textit{ \\textit{ human concerns are to identify and correct its abnormal executions. To validate the effectiveness of H2R-AT, two representative task scenarios , \" serve water for a human in a kitchen\" and \" pick up a defective gear in a factory\" with abnormal robot executions, were designed in an open-access simulation platform V-REP; 252 volunteers were recruited to provide about 12000 verbal reminders to learn and test the attention transfer model H2R-AT. With an \\textit{\\textbf{ accuracy of 73.68\\\\%DIF < in transferring attention and accuracy of 66.86\\\\% in avoiding robot execution failures, the effectiveness of H2R-AT was validated.\\end{abstract} %DIF > in transferring attention, and the high accuracy of 66.86\\\\% in avoiding grasping failures.", "after_revision": "Due to real-world dynamics and hardware uncertainty, robots inevitably fail in task executions, resulting in undesired or even dangerous executions. In order to avoid failures and improve robot performance, it is critical to identify and correct abnormal robot executions at an early stage. However, due to limited reasoning capability and knowledge storage , it is challenging for robots to self-diagnose and -correct their own abnormality in both planning and executing. To improve robot self diagnosis capability, in this research a novel human-to-robot attention transfer ( \\textbf{H2R-AT ) method was developed to identify robot manipulation errors by leveraging human instructions.\\textit{\\textbf{H2R-AT was developed by fusing attention mapping mechanism into a novel stacked neural networks model, transferring human verbal attention into robot visual attention . With the attention transfer , a robot understands \\textit{what and\\textit{where human concerns are to identify and correct abnormal manipulations. Two representative task scenarios : `` serve water for a human in a kitchen\" and `` pick up a defective gear in a factory\" were designed in a simulation framework CRAIhri with abnormal robot manipulations; and 252 volunteers were recruited to provide about 12000 verbal reminders to learn and test \\textit{\\textbf{H2R-AT . The method effectiveness was validated by the high accuracy of 73.68\\\\%DIF < in transferring attention and accuracy of 66.86\\\\% in avoiding robot execution failures, the effectiveness of H2R-AT was validated.\\end{abstract} %DIF > in transferring attention, and the high accuracy of 66.86\\\\% in avoiding grasping failures.", "edit_actions": [{"type": "R", "before": "world", "after": "real-world", "start_char_pos": 7, "end_char_pos": 12}, {"type": "R", "before": "leading to", "after": "resulting in", "start_char_pos": 91, "end_char_pos": 101}, {"type": "R", "before": "To avoid failures for improved", "after": "In order to avoid failures and improve", "start_char_pos": 142, "end_char_pos": 172}, {"type": "R", "before": "robot abnormal executions in", "after": "abnormal robot executions at", "start_char_pos": 231, "end_char_pos": 259}, {"type": "R", "before": "limited by", "after": "due to limited", "start_char_pos": 285, "end_char_pos": 295}, {"type": "R", "before": "level", "after": "storage", "start_char_pos": 331, "end_char_pos": 336}, {"type": "R", "before": "a robot to self diagnose and correct their abnormal behaviors. To solve this problem, a novel method is proposed,", "after": "robots to self-diagnose and -correct their own abnormality in both planning and executing. To improve robot self diagnosis capability, in this research a novel", "start_char_pos": 361, "end_char_pos": 474}, {"type": "D", "before": "H2R-AT) to seek help from a human . H2R-AT is developed based on", "after": null, "start_char_pos": 511, "end_char_pos": 575}, {"type": "A", "before": null, "after": "H2R-AT", "start_char_pos": 584, "end_char_pos": 584}, {"type": "A", "before": null, "after": ") method was developed to identify robot manipulation errors by leveraging human instructions.", "start_char_pos": 585, "end_char_pos": 585}, {"type": "A", "before": null, "after": "H2R-AT", "start_char_pos": 601, "end_char_pos": 601}, {"type": "A", "before": null, "after": "was developed by fusing attention mapping mechanism into", "start_char_pos": 602, "end_char_pos": 602}, {"type": "R", "before": "attention embedded in verbal reminders to robot attention embedded in robot visual perceiving", "after": "verbal attention into robot visual attention", "start_char_pos": 661, "end_char_pos": 754}, {"type": "D", "before": "from a human", "after": null, "start_char_pos": 785, "end_char_pos": 797}, {"type": "D", "before": "what and where", "after": null, "start_char_pos": 820, "end_char_pos": 834}, {"type": "A", "before": null, "after": "what", "start_char_pos": 843, "end_char_pos": 843}, {"type": "A", "before": null, "after": "and", "start_char_pos": 844, "end_char_pos": 844}, {"type": "A", "before": null, "after": "where", "start_char_pos": 852, "end_char_pos": 852}, {"type": "R", "before": "its abnormal executions. To validate the effectiveness of H2R-AT, two", "after": "abnormal manipulations. Two", "start_char_pos": 896, "end_char_pos": 965}, {"type": "R", "before": ", \"", "after": ": ``", "start_char_pos": 996, "end_char_pos": 999}, {"type": "R", "before": "\"", "after": "``", "start_char_pos": 1042, "end_char_pos": 1043}, {"type": "D", "before": "with abnormal robot executions,", "after": null, "start_char_pos": 1083, "end_char_pos": 1114}, {"type": "R", "before": "an open-access simulation platform V-REP;", "after": "a simulation framework CRAIhri with abnormal robot manipulations; and", "start_char_pos": 1132, "end_char_pos": 1173}, {"type": "D", "before": "the attention transfer model H2R-AT. With an", "after": null, "start_char_pos": 1262, "end_char_pos": 1306}, {"type": "A", "before": null, "after": "H2R-AT", "start_char_pos": 1323, "end_char_pos": 1323}, {"type": "A", "before": null, "after": ". The method effectiveness was validated by the high", "start_char_pos": 1324, "end_char_pos": 1324}], "sents_char_pos": [0, 141, 275, 423, 756, 920, 1173, 1298, 1482]}
+{"doc_id": "2002.04309", "revision_depth": "2", "before_revision": "Kinetic Ising models are powerful tools for studying the non-equilibrium dynamics of complex , discrete systemsand for analyzing their experimental recordings. However, the behaviour of the model is in general not tractable for large networks ; therefore, mean field theories are frequently used to approximate its statistical properties. Many variants of the classical naive and TAP (i.e., second-order) mean field approximations have been proposed , each of which makes unique assumptions about the temporal evolution of the system's correlation structure . This disparity of methods makes it difficult to systematically advance mean field approaches beyond previous contributions. Here, we propose a unified framework for mean field theories of the dynamics of asymmetric kinetic Ising systems based on information geometry . The framework is built on Plefka expansions of the model around a simplified model obtained by an orthogonal projection to a sub-manifold of tractable probability distributions. This view not only unifies previous methods but also allows us to propose novel methods that, in contrast with traditional mean-field approaches, preserve correlations of the system, both in stationary and transient states. By comparing analytical approximations and exact numerical simulations, we show that the proposed methods provide more accurate estimates of covariance evolution in the system than classical equations, and consequently outperform previous mean field theories for solving the inverse Ising problem. In sum, our framework unifies and extends current mean-field approximations of kinetic Ising model, constituting a powerful tool for studying non-equilibrium dynamics of complex systems .", "after_revision": "Kinetic Ising models are powerful tools for studying the non-equilibrium dynamics of complex systems. As their behavior is not tractable for large networks , many mean-field methods have been proposed for their analysis, each based on unique assumptions about the system's temporal evolution . This disparity of approaches makes it challenging to systematically advance mean-field methods beyond previous contributions. Here, we propose a unifying framework for mean-field theories of asymmetric kinetic Ising systems from an information geometry perspective . The framework is built on Plefka expansions of a system around a simplified model obtained by an orthogonal projection to a sub-manifold of tractable probability distributions. This view not only unifies previous methods but also allows us to develop novel methods that, in contrast with traditional approaches, preserve the system's correlations. We show that these new methods can outperform previous ones in predicting and assessing network properties near maximally fluctuating regimes .", "edit_actions": [{"type": "R", "before": ", discrete systemsand for analyzing their experimental recordings. However, the behaviour of the model is in general", "after": "systems. As their behavior is", "start_char_pos": 93, "end_char_pos": 209}, {"type": "R", "before": "; therefore, mean field theories are frequently used to approximate its statistical properties. Many variants of the classical naive and TAP (i.e., second-order) mean field approximations", "after": ", many mean-field methods", "start_char_pos": 243, "end_char_pos": 430}, {"type": "R", "before": ", each of which makes", "after": "for their analysis, each based on", "start_char_pos": 450, "end_char_pos": 471}, {"type": "D", "before": "temporal evolution of the", "after": null, "start_char_pos": 501, "end_char_pos": 526}, {"type": "R", "before": "correlation structure", "after": "temporal evolution", "start_char_pos": 536, "end_char_pos": 557}, {"type": "R", "before": "methods makes it difficult", "after": "approaches makes it challenging", "start_char_pos": 578, "end_char_pos": 604}, {"type": "R", "before": "mean field approaches", "after": "mean-field methods", "start_char_pos": 631, "end_char_pos": 652}, {"type": "R", "before": "unified framework for mean field theories of the dynamics of", "after": "unifying framework for mean-field theories of", "start_char_pos": 703, "end_char_pos": 763}, {"type": "R", "before": "based on information geometry", "after": "from an information geometry perspective", "start_char_pos": 797, "end_char_pos": 826}, {"type": "R", "before": "the model", "after": "a system", "start_char_pos": 876, "end_char_pos": 885}, {"type": "R", "before": "propose", "after": "develop", "start_char_pos": 1073, "end_char_pos": 1080}, {"type": "D", "before": "mean-field", "after": null, "start_char_pos": 1130, "end_char_pos": 1140}, {"type": "R", "before": "correlations of the system, both in stationary and transient states. By comparing analytical approximations and exact numerical simulations, we show that the proposed methods provide more accurate estimates of covariance evolution in the system than classical equations, and consequently outperform previous mean field theories for solving the inverse Ising problem. In sum, our framework unifies and extends current mean-field approximations of kinetic Ising model, constituting a powerful tool for studying non-equilibrium dynamics of complex systems", "after": "the system's correlations. We show that these new methods can outperform previous ones in predicting and assessing network properties near maximally fluctuating regimes", "start_char_pos": 1162, "end_char_pos": 1714}], "sents_char_pos": [0, 159, 244, 338, 559, 683, 828, 1006, 1230, 1528]}
+{"doc_id": "2002.04896", "revision_depth": "1", "before_revision": "The FFT of three dimensional (3D) input data is an important computational kernel of numerical simulations and is widely used in High Performance Computing (HPC) codes running on large number of processors. Although the efficient parallelization of 3D FFT has been largely investigated over the last few decades, performance and scalability of parallel 3D FFT methods on new generation hardware architecture for HPC is a major challenge. Looking at upcoming exascale cluster architectures, the conventional parallel 3D FFT calculations on HPC needs improvement for better performance . In this paper, we present CDACs three dimensional Fast Fourier Transform (CROFT) library which implements three dimensional parallel FFT using pencil decomposition. To exploit the multithreading capabilities of hardware without affecting performance, CROFT is designed to use hybrid programming model of OpenMP and MPI. CROFT implementation has a feature of overlapping compute and memory I /O with MPI communication . Depending on the number of processes used, CROFT shows performance improvement of about 51 to 42 percent as compared to FFTW3 library.", "after_revision": "The FFT of three-dimensional (3D) input data is an important computational kernel of numerical simulations and is widely used in High Performance Computing (HPC) codes running on a large number of processors. Performance of many scientific applications such as Molecular Dynamic simulations depends on the underlying 3D parallel FFT library being used . In this paper, we present C-DACs three-dimensional Fast Fourier Transform (CROFT) library which implements three-dimensional parallel FFT using pencil decomposition. To exploit the hyperthreading capabilities of processor cores without affecting performance, CROFT is designed to use multithreading along with MPI. CROFT implementation has an innovative feature of overlapping compute and memory-I /O with MPI communication using multithreading. As opposed to other 3D FFT implementations, CROFT uses only two threads where one thread is dedicated for communication so that it can be effectively overlapped with computations. Thus, depending on the number of processes used, CROFT achieves performance improvement of about 51 \\% to 42 \\% as compared to FFTW3 library.", "edit_actions": [{"type": "R", "before": "three dimensional", "after": "three-dimensional", "start_char_pos": 11, "end_char_pos": 28}, {"type": "A", "before": null, "after": "a", "start_char_pos": 179, "end_char_pos": 179}, {"type": "R", "before": "Although the efficient parallelization of", "after": "Performance of many scientific applications such as Molecular Dynamic simulations depends on the underlying", "start_char_pos": 208, "end_char_pos": 249}, {"type": "R", "before": "FFT has been largely investigated over the last few decades, performance and scalability of parallel 3D FFT methods on new generation hardware architecture for HPC is a major challenge. Looking at upcoming exascale cluster architectures, the conventional parallel 3D FFT calculations on HPC needs improvement for better performance", "after": "parallel FFT library being used", "start_char_pos": 253, "end_char_pos": 584}, {"type": "R", "before": "CDACs three dimensional", "after": "C-DACs three-dimensional", "start_char_pos": 613, "end_char_pos": 636}, {"type": "R", "before": "three dimensional", "after": "three-dimensional", "start_char_pos": 693, "end_char_pos": 710}, {"type": "R", "before": "multithreading capabilities of hardware", "after": "hyperthreading capabilities of processor cores", "start_char_pos": 767, "end_char_pos": 806}, {"type": "R", "before": "hybrid programming model of OpenMP and", "after": "multithreading along with", "start_char_pos": 863, "end_char_pos": 901}, {"type": "R", "before": "a", "after": "an innovative", "start_char_pos": 932, "end_char_pos": 933}, {"type": "R", "before": "memory I", "after": "memory-I", "start_char_pos": 969, "end_char_pos": 977}, {"type": "R", "before": ". Depending", "after": "using multithreading. As opposed to other 3D FFT implementations, CROFT uses only two threads where one thread is dedicated for communication so that it can be effectively overlapped with computations. Thus, depending", "start_char_pos": 1004, "end_char_pos": 1015}, {"type": "R", "before": "shows", "after": "achieves", "start_char_pos": 1055, "end_char_pos": 1060}, {"type": "A", "before": null, "after": "\\%", "start_char_pos": 1097, "end_char_pos": 1097}, {"type": "R", "before": "percent", "after": "\\%", "start_char_pos": 1104, "end_char_pos": 1111}], "sents_char_pos": [0, 207, 438, 586, 751, 1005]}
+{"doc_id": "2002.05619", "revision_depth": "2", "before_revision": "Recurrent spiking neural networks (RSNN) in the brain learn to perform a wide range of perceptual, cognitive and motor tasks very efficiently in terms of time and energy consumption . Moreover, learning can happen rapidly after very few examples. This is due to the optimality of coding and learning schemes, which have yet to be clearly understood. This naturally challenges the formulation of biologically inspired RSNNs in order to improve our understanding of biological intelligence and the efficiency of artificial ones . Several spiking network models have been proposed but it remains a challenge to design RSNNs that use biologically plausible mechanisms capable of solving complex temporal tasks. We use a general probabilistic framework that relies on the principle of maximizing the likelihood for the network to reproduce some temporal dynamics. This principle permits to analytically work out an explicit and biologically plausible plasticity rule. Here we propose a novel target-based learning scheme in which such a rule can be used to efficiently train a RSNN to solve several temporal taskssuch as learning multidimensional trajectory and an implementation of the temporal XOR. We finally show that an online approximation of the gradient ascent, in addition to guaranteeing complete locality in time and space, allows learning after very few presentations of the target output. Our model is general and it can be applied to a wide variety of network architectures and types of biological neurons. The derived plasticity learning rule is specific to each neuron model and can produce a theoretical prediction to be experimentally verified .", "after_revision": "Recurrent spiking neural networks (RSNN) in the human brain learn to perform a wide range of perceptual, cognitive and motor tasks very efficiently in terms of energy consumption and requires very few examples. This motivates the search for biologically inspired learning rules for RSNNs to improve our understanding of brain computation and the efficiency of artificial intelligence . Several spiking models and learning rules have been proposed , but it remains a challenge to design RSNNs whose learning relies on biologically plausible mechanisms and are capable of solving complex temporal tasks. In this paper, we derive a learning rule, local to the synapse, from a simple mathematical principle, the maximization of the likelihood for the network to solve a specific task. We propose a novel target-based learning scheme in which the learning rule derived from likelihood maximization is used to mimic a specific spiking pattern that encodes the solution to complex temporal tasks. This method makes the learning extremely rapid and precise, outperforming state of the art algorithms for RSNNs. We demonstrate the capacity of our model to tackle several problems like learning multidimensional trajectories and solving the classical temporal XOR benchmark. Finally, we show that an online approximation of the gradient ascent, in addition to guaranteeing complete locality in time and space, allows learning after very few presentations of the target output. Our model can be applied to different types of biological neurons. The analytically derived plasticity learning rule is specific to each neuron model and can produce a theoretical prediction for experimental validation .", "edit_actions": [{"type": "A", "before": null, "after": "human", "start_char_pos": 48, "end_char_pos": 48}, {"type": "R", "before": "time and energy consumption . Moreover, learning can happen rapidly after", "after": "energy consumption and requires", "start_char_pos": 155, "end_char_pos": 228}, {"type": "R", "before": "is due to the optimality of coding and learning schemes, which have yet to be clearly understood. This naturally challenges the formulation of biologically inspired RSNNs in order", "after": "motivates the search for biologically inspired learning rules for RSNNs", "start_char_pos": 253, "end_char_pos": 432}, {"type": "R", "before": "biological intelligence", "after": "brain computation", "start_char_pos": 465, "end_char_pos": 488}, {"type": "R", "before": "ones", "after": "intelligence", "start_char_pos": 522, "end_char_pos": 526}, {"type": "R", "before": "network models", "after": "models and learning rules", "start_char_pos": 545, "end_char_pos": 559}, {"type": "A", "before": null, "after": ",", "start_char_pos": 579, "end_char_pos": 579}, {"type": "R", "before": "that use", "after": "whose learning relies on", "start_char_pos": 623, "end_char_pos": 631}, {"type": "A", "before": null, "after": "and are", "start_char_pos": 666, "end_char_pos": 666}, {"type": "R", "before": "We use a general probabilistic framework that relies on the principle of maximizing", "after": "In this paper, we derive a learning rule, local to the synapse, from a simple mathematical principle, the maximization of", "start_char_pos": 710, "end_char_pos": 793}, {"type": "R", "before": "reproduce some temporal dynamics. This principle permits to analytically work out an explicit and biologically plausible plasticity rule. Here we", "after": "solve a specific task. We", "start_char_pos": 828, "end_char_pos": 973}, {"type": "R", "before": "such a rule can be used to efficiently train a RSNN to solve several temporal taskssuch as learning multidimensional trajectory and an implementation of the temporal XOR. We finally", "after": "the learning rule derived from likelihood maximization is used to mimic a specific spiking pattern that encodes the solution to complex temporal tasks. This method makes the learning extremely rapid and precise, outperforming state of the art algorithms for RSNNs. We demonstrate the capacity of our model to tackle several problems like learning multidimensional trajectories and solving the classical temporal XOR benchmark. Finally, we", "start_char_pos": 1028, "end_char_pos": 1209}, {"type": "D", "before": "is general and it", "after": null, "start_char_pos": 1410, "end_char_pos": 1427}, {"type": "R", "before": "a wide variety of network architectures and", "after": "different", "start_char_pos": 1446, "end_char_pos": 1489}, {"type": "A", "before": null, "after": "analytically", "start_char_pos": 1523, "end_char_pos": 1523}, {"type": "R", "before": "to be experimentally verified", "after": "for experimental validation", "start_char_pos": 1631, "end_char_pos": 1660}], "sents_char_pos": [0, 184, 247, 350, 709, 861, 965, 1198, 1399, 1518]}
+{"doc_id": "2002.07152", "revision_depth": "1", "before_revision": "An \\alpha-additive spanner of an undirected graph G =(V, E) is a subgraph H such that the distance between any two vertices in G is stretched by no more than an additive factor of \\alpha. It is previously known that unweighted graphshave 2-, 4-, and 6-additive spanners containing (n^{3/2), }%DIFDELCMD < O%%% (n^{7/5), and O(n^{4/3}) edges, respectively. In this paper, we generalize these results to weighted graphs. We consider \\alpha=} 2W , 4W , 6W, where W is the maximum edge weight in G. We first show that every n-node graph has a subsetwise 2W-spanner on O(n |S|^{1/2) edges where S \\subseteq V and W is a constant. We then show that for every set P with |P| = p vertex demand pairs, there are pairwise 2W- and 4W-spanners on O(np^{1/3}) and O(np^{2/7}) edges respectively. We also show that for every set P, there is a 6W-spanner on O(np^{1/4}) edges where W is a constant. We then show that every graph has additive 2W- and 4W-spanners on O(n^{3/2}) and O(n^{7/5}) edges respectively. Finally, we show that every graph has an additive 6W-spanner on O(n^{4/3}) edges where W is a constant} .", "after_revision": "Aspanner of a graph G is a subgraph H ), }%DIFDELCMD < O%%% ), and O(n^{4/3}) edges, respectively. In this paper, we generalize these results to weighted graphs. We consider \\alpha=} that approximately preserves its pairwise distances. Spanners are commonly applied to compress computation on metric spaces corresponding to weighted input graphs. Classic spanner constructions can seamlessly handle edge weights, so long as error is measuredmultiplicatively. In this work, we investigate whether one can similarly extend constructions of spanners withadditive error. These extensions are not immediate, due to a key lemma about the size of shortest path neighborhoods that fails for weighted graphs. Despite this, we recover a suitable amortized version, which lets us prove direct extensions of classic +2 and +4 unweighted spanners (both all-pairs and pairwise) to + 2W and + 4W weighted spanners, where W is the maximum edge weight ) edges where S \\subseteq V and W is a constant. We then show that for every set P with |P| = p vertex demand pairs, there are pairwise 2W- and 4W-spanners on O(np^{1/3}) and O(np^{2/7}) edges respectively. We also show that for every set P, there is a 6W-spanner on O(np^{1/4}) edges where W is a constant. We then show that every graph has additive 2W- and 4W-spanners on O(n^{3/2}) and O(n^{7/5}) edges respectively. Finally, we show that every graph has an additive 6W-spanner on O(n^{4/3}) edges where W is a constant} . For a technical reason, the +6 unweighted spanner becomes a +8W weighted spanner; closing this error gap is an interesting remaining open problem .", "edit_actions": [{"type": "R", "before": "An \\alpha-additive spanner of an undirected graph G =(V, E)", "after": "A", "start_char_pos": 0, "end_char_pos": 59}, {"type": "A", "before": null, "after": "spanner", "start_char_pos": 59, "end_char_pos": 59}, {"type": "A", "before": null, "after": "of a graph G", "start_char_pos": 60, "end_char_pos": 60}, {"type": "D", "before": "such that the distance between any two vertices in G is stretched by no more than an additive factor of \\alpha. It is previously known that unweighted graphshave 2-, 4-, and 6-additive spanners containing", "after": null, "start_char_pos": 77, "end_char_pos": 281}, {"type": "D", "before": "(n^{3/2", "after": null, "start_char_pos": 282, "end_char_pos": 289}, {"type": "D", "before": "(n^{7/5", "after": null, "start_char_pos": 311, "end_char_pos": 318}, {"type": "A", "before": null, "after": "that approximately preserves its pairwise distances. Spanners are commonly applied to compress computation on metric spaces corresponding to weighted input graphs. Classic spanner constructions can seamlessly handle edge weights, so long as error is measured", "start_char_pos": 441, "end_char_pos": 441}, {"type": "A", "before": null, "after": "multiplicatively", "start_char_pos": 441, "end_char_pos": 441}, {"type": "A", "before": null, "after": ". In this work, we investigate whether one can similarly extend constructions of spanners with", "start_char_pos": 441, "end_char_pos": 441}, {"type": "A", "before": null, "after": "additive", "start_char_pos": 441, "end_char_pos": 441}, {"type": "A", "before": null, "after": "error. These extensions are not immediate, due to a key lemma about the size of shortest path neighborhoods that fails for weighted graphs. Despite this, we recover a suitable amortized version, which lets us prove direct extensions of classic +2 and +4 unweighted spanners (both all-pairs and pairwise) to +", "start_char_pos": 442, "end_char_pos": 442}, {"type": "R", "before": ",", "after": "and +", "start_char_pos": 446, "end_char_pos": 447}, {"type": "R", "before": ", 6W,", "after": "weighted spanners,", "start_char_pos": 451, "end_char_pos": 456}, {"type": "D", "before": "in G. We first show that every n-node graph has a subsetwise 2W-spanner on O(n |S|^{1/2", "after": null, "start_char_pos": 492, "end_char_pos": 579}, {"type": "A", "before": null, "after": ". For a technical reason, the +6 unweighted spanner becomes a +8W weighted spanner; closing this error gap is an interesting remaining open problem", "start_char_pos": 1103, "end_char_pos": 1103}], "sents_char_pos": [0, 188, 356, 419, 627, 785, 886, 998]}
+{"doc_id": "2002.07561", "revision_depth": "1", "before_revision": "In electricity markets futures deliver the underlying over a period and thus function as a swap contract . In this paper we introduce a market price of risk for delivery periods of electricity swaps . In particular, we suggest a weighted geometric average of an artificial geometric electricity futures price over the corresponding delivery period. This leads to a geometric electricity swap price dynamics without any approximation requirements . Our framework allows to include typical features as the Samuelson effect, seasonalities as well as a stochastic volatilityin the absence of arbitrage. We show that our suggested model is suitable for pricing options on electricity swaps using the Heston method. Especially, we illustrate the related pricing procedure for electricity swaps and options in the setting of Arismendi et al. (2016), Schneider and Tavin (2018) and Fanelli and Schmeck (2019) .", "after_revision": "In electricity markets , futures contracts typically function as a swap since they deliver the underlying over a period of time . In this paper , we introduce a market price for the delivery periods of electricity swaps , thereby opening an arbitrage-free pricing framework for derivatives based on these contracts. Furthermore, we use a weighted geometric averaging of an artificial geometric futures price over the corresponding delivery period. Without any need for approximations, this averaging results in geometric swap price dynamics . Our framework allows for including typical features as the Samuelson effect, seasonalities , and stochastic volatility. In particular, we investigate the pricing procedures for electricity swaps and options in line with Arismendi et al. (2016), Schneider and Tavin (2018) , and Fanelli and Schmeck (2019) . A numerical study highlights the differences between these models depending on the delivery period .", "edit_actions": [{"type": "R", "before": "futures", "after": ", futures contracts typically function as a swap since they", "start_char_pos": 23, "end_char_pos": 30}, {"type": "R", "before": "and thus function as a swap contract", "after": "of time", "start_char_pos": 68, "end_char_pos": 104}, {"type": "A", "before": null, "after": ",", "start_char_pos": 121, "end_char_pos": 121}, {"type": "R", "before": "of risk for", "after": "for the", "start_char_pos": 150, "end_char_pos": 161}, {"type": "R", "before": ". In particular, we suggest", "after": ", thereby opening an arbitrage-free pricing framework for derivatives based on these contracts. Furthermore, we use", "start_char_pos": 200, "end_char_pos": 227}, {"type": "R", "before": "average", "after": "averaging", "start_char_pos": 249, "end_char_pos": 256}, {"type": "D", "before": "electricity", "after": null, "start_char_pos": 284, "end_char_pos": 295}, {"type": "R", "before": "This leads to a geometric electricity", "after": "Without any need for approximations, this averaging results in geometric", "start_char_pos": 350, "end_char_pos": 387}, {"type": "D", "before": "without any approximation requirements", "after": null, "start_char_pos": 408, "end_char_pos": 446}, {"type": "R", "before": "to include", "after": "for including", "start_char_pos": 470, "end_char_pos": 480}, {"type": "R", "before": "as well as a stochastic volatilityin the absence of arbitrage. We show that our suggested model is suitable for pricing options on electricity swaps using the Heston method. Especially, we illustrate the related pricing procedure", "after": ", and stochastic volatility. In particular, we investigate the pricing procedures", "start_char_pos": 537, "end_char_pos": 766}, {"type": "R", "before": "the setting of", "after": "line with", "start_char_pos": 804, "end_char_pos": 818}, {"type": "A", "before": null, "after": ",", "start_char_pos": 871, "end_char_pos": 871}, {"type": "A", "before": null, "after": ". A numerical study highlights the differences between these models depending on the delivery period", "start_char_pos": 903, "end_char_pos": 903}], "sents_char_pos": [0, 106, 201, 349, 448, 599, 710]}
+{"doc_id": "2002.07840", "revision_depth": "1", "before_revision": "A unit disk graph G on a given set of points P in the plane is a geometric graph where an edge exists between two points p,q \\in P if and only if |pq| \\leq 1. A subgraph G' of G is a k-hop spanner if and only if for every edge pq\\in G, the topological shortest path between p,q in G' has at most k edges. We obtain the following results for unit disk graphs. ( i ) Every n-vertex unit disk graph has a 5-hop spanner with at most 5.5n edges. We analyze the family of spanners constructed by Biniaz ( WADS 2019 ) and improve the upper bound on the number of edges from 9n to 5.5n. ( ii ) Using a new construction, we show that every n-vertex unit disk graph has a 3-hop spanner with at most 11n edges. ( iii ) Every n-vertex unit disk graph has a 2-hop spanner with O(n ^{3/2 ) edges. This is the first construction of a 2-hop spanner with a subquadratic number of edges. (iv ) For every sufficiently large n, there exists a set P of n points such that every plane hop spanner on P has hop stretch factor at least 4. Previously, no lower bound greater than 2 was known. ( v ) For every point set on a circle, there exists a plane 4-hop spanner. As such, this provides a tight bound for points on a circle. ( vi ) The maximum degree of k-hop spanners cannot be bounded above by a function of k.", "after_revision": "A unit disk graph G on a given set of points P in the plane is a geometric graph where an edge exists between two points p,q \\in P if and only if |pq| \\leq 1. A subgraph G' of G is a k-hop spanner if and only if for every edge pq\\in G, the topological shortest path between p,q in G' has at most k edges. We obtain the following results for unit disk graphs. ( I ) Every n-vertex unit disk graph has a 5-hop spanner with at most 5.5n edges. We analyze the family of spanners constructed by Biniaz ( 2020 ) and improve the upper bound on the number of edges from 9n to 5.5n. ( II ) Using a new construction, we show that every n-vertex unit disk graph has a 3-hop spanner with at most 11n edges. ( III ) Every n-vertex unit disk graph has a 2-hop spanner with O(n \\log n ) edges. This is the first nontrivial construction of 2-hop spanners. (IV ) For every sufficiently large n, there exists a set P of n points on a circle, such that every plane hop spanner on P has hop stretch factor at least 4. Previously, no lower bound greater than 2 was known. ( V ) For every point set on a circle, there exists a plane 4-hop spanner. As such, this provides a tight bound for points on a circle. ( VI ) The maximum degree of k-hop spanners cannot be bounded from above by a function of ~ k.", "edit_actions": [{"type": "R", "before": "k-hop spanner", "after": "k-hop spanner", "start_char_pos": 183, "end_char_pos": 196}, {"type": "R", "before": "i", "after": "I", "start_char_pos": 361, "end_char_pos": 362}, {"type": "R", "before": "WADS 2019", "after": "2020", "start_char_pos": 499, "end_char_pos": 508}, {"type": "R", "before": "ii", "after": "II", "start_char_pos": 581, "end_char_pos": 583}, {"type": "R", "before": "iii", "after": "III", "start_char_pos": 702, "end_char_pos": 705}, {"type": "R", "before": "^{3/2", "after": "\\log n", "start_char_pos": 768, "end_char_pos": 773}, {"type": "R", "before": "construction of a", "after": "nontrivial construction of", "start_char_pos": 801, "end_char_pos": 818}, {"type": "R", "before": "spanner with a subquadratic number of edges. (iv", "after": "spanners. (IV", "start_char_pos": 825, "end_char_pos": 873}, {"type": "A", "before": null, "after": "on a circle,", "start_char_pos": 941, "end_char_pos": 941}, {"type": "R", "before": "v", "after": "V", "start_char_pos": 1071, "end_char_pos": 1072}, {"type": "R", "before": "vi", "after": "VI", "start_char_pos": 1207, "end_char_pos": 1209}, {"type": "A", "before": null, "after": "from", "start_char_pos": 1267, "end_char_pos": 1267}, {"type": "A", "before": null, "after": "~", "start_char_pos": 1291, "end_char_pos": 1291}], "sents_char_pos": [0, 304, 358, 440, 699, 782, 869, 1068, 1143, 1204]}
+{"doc_id": "2002.08972", "revision_depth": "1", "before_revision": "Head mounted displaysbring eye tracking into daily use and this raises privacy concerns for users . Privacy-preservation techniques such as differential privacy mechanisms are recently applied to the eye tracking data obtained from such displays ; however, standard differential privacy mechanisms are vulnerable to temporal correlations in the eye movement features. In this work, a transform coding based differential privacy mechanism is proposed for the first time in the eye tracking literature to further adapt it to statistics of eye movement feature data by comparing various low-complexity methods. Fourier Perturbation Algorithm, which is a differential privacy mechanism, is extended and a scaling mistake in its proof is corrected. Significant reductions in correlations in addition to query sensitivities are illustrated , which provide the best utility-privacy trade-off in the literature for the eye tracking dataset used. The differentially private eye movement data are evaluated also for classification accuracies for gender and document-type predictions to show that higher privacy is obtained without a reduction in the classification accuracies by using proposed methods .", "after_revision": "New generation head-mounted displays, such as VR and AR glasses, are coming into the market with already integrated eye tracking and are expected to enable novel ways of human-computer interaction in many applications. However, since eye movement properties contain biometric information, privacy concerns have to be handled properly . Privacy-preservation techniques such as differential privacy mechanisms have recently been applied to the eye movement data obtained from such displays . Standard differential privacy mechanisms ; however, are vulnerable to temporal correlations in the eye movement features. In this work, we propose a novel transform-coding based differential privacy mechanism to further adapt it to the statistics of eye movement feature data by comparing various low-complexity methods. We extent Fourier Perturbation Algorithm, which is a differential privacy mechanism, and correct a scaling mistake in its proof . Furthermore, we illustrate significant reductions in sample correlations in addition to query sensitivities , which provide the best utility-privacy trade-off in the eye tracking literature. Our results show significantly high privacy without loss in classification accuracies as well .", "edit_actions": [{"type": "R", "before": "Head mounted displaysbring eye tracking into daily use and this raises privacy concerns for users", "after": "New generation head-mounted displays, such as VR and AR glasses, are coming into the market with already integrated eye tracking and are expected to enable novel ways of human-computer interaction in many applications. However, since eye movement properties contain biometric information, privacy concerns have to be handled properly", "start_char_pos": 0, "end_char_pos": 97}, {"type": "R", "before": "are recently", "after": "have recently been", "start_char_pos": 172, "end_char_pos": 184}, {"type": "R", "before": "tracking", "after": "movement", "start_char_pos": 204, "end_char_pos": 212}, {"type": "R", "before": "; however, standard", "after": ". Standard", "start_char_pos": 246, "end_char_pos": 265}, {"type": "A", "before": null, "after": "; however,", "start_char_pos": 298, "end_char_pos": 298}, {"type": "R", "before": "a transform coding", "after": "we propose a novel transform-coding", "start_char_pos": 383, "end_char_pos": 401}, {"type": "D", "before": "is proposed for the first time in the eye tracking literature", "after": null, "start_char_pos": 439, "end_char_pos": 500}, {"type": "A", "before": null, "after": "the", "start_char_pos": 524, "end_char_pos": 524}, {"type": "A", "before": null, "after": "We extent", "start_char_pos": 610, "end_char_pos": 610}, {"type": "R", "before": "is extended and", "after": "and correct", "start_char_pos": 686, "end_char_pos": 701}, {"type": "R", "before": "is corrected. Significant reductions in", "after": ". Furthermore, we illustrate significant reductions in sample", "start_char_pos": 733, "end_char_pos": 772}, {"type": "D", "before": "are illustrated", "after": null, "start_char_pos": 821, "end_char_pos": 836}, {"type": "R", "before": "literature for the eye tracking dataset used. The differentially private eye movement data are evaluated also for classification accuracies for gender and document-type predictions to show that higher privacy is obtained without a reduction in the classification accuracies by using proposed methods", "after": "eye tracking literature. Our results show significantly high privacy without loss in classification accuracies as well", "start_char_pos": 895, "end_char_pos": 1194}], "sents_char_pos": [0, 247, 368, 609, 746, 940]}
+{"doc_id": "2002.09062", "revision_depth": "1", "before_revision": "The inference of chemical reaction networks is an important task in understanding the chemical processes in life sciences and environment . Yet, only a few reaction systems are well-understood due to a large number of important reaction pathways involved but still unknown. Revealing unknown reaction pathways is an important task for scientific discovery that takes decades and requires lots of expert knowledge. This work presents a neural network approach for discovering unknown reaction pathways from concentration time series data. The neural network denoted as Chemical Reaction Neural Network (CRNN), is designed to be equivalent to chemical reaction networks by following the fundamental physics laws of the Law of Mass Action and Arrhenius Law. The CRNN is physically interpretable , and its weights correspond to the reaction pathways and rate constants of the chemical reaction network. Then, inferencing the reaction pathways and the rate constants are accomplished by training the equivalent CRNN via stochastic gradient descent. The approach precludes the need for expert knowledge in proposing candidate reactions, such that the inference is autonomous and applicable to new systemsfor which there is no existing empirical knowledge to propose reaction pathways . The physical interpretability also makes the CRNN not only capable of fitting the data for a given system but also developing knowledge of unknown pathways that could be generalized to similar chemical systems . Finally, the approach is applied to several chemical systems in chemical engineering and biochemistry to demonstrate its robustness and generality .", "after_revision": "Chemical reactions occur in energy, environmental, biological, and many other natural systems, and the inference of the reaction networks is essential to understand and design the chemical processes in engineering and life sciences . Yet, revealing the reaction pathways for complex systems and processes is still challenging due to the lack of knowledge of the involved species and reactions. Here, we present a neural network approach that autonomously discovers reaction pathways from the time-resolved species concentration data. The proposed Chemical Reaction Neural Network (CRNN), by design, satisfies the fundamental physics laws , including the Law of Mass Action and the Arrhenius Law. Consequently, the CRNN is physically interpretable such that the reaction pathways can be interpreted, and the kinetic parameters can be quantified simultaneously from the weights of the neural network. The inference of the chemical pathways is accomplished by training the CRNN with species concentration data via stochastic gradient descent. We demonstrate the successful implementations and the robustness of the approach in elucidating the chemical reaction pathways of several chemical engineering and biochemical systems. The autonomous inference by the CRNN approach precludes the need for expert knowledge in proposing candidate networks and addresses the curse of dimensionality in complex systems . The physical interpretability also makes the CRNN capable of not only fitting the data for a given system but also developing knowledge of unknown pathways that could be generalized to similar chemical systems .", "edit_actions": [{"type": "R", "before": "The inference of chemical", "after": "Chemical reactions occur in energy, environmental, biological, and many other natural systems, and the inference of the", "start_char_pos": 0, "end_char_pos": 25}, {"type": "R", "before": "an important task in understanding", "after": "essential to understand and design", "start_char_pos": 47, "end_char_pos": 81}, {"type": "R", "before": "life sciences and environment", "after": "engineering and life sciences", "start_char_pos": 108, "end_char_pos": 137}, {"type": "R", "before": "only a few reaction systems are well-understood due to a large number of important reaction pathways involved but still unknown. Revealing unknown reaction pathways is an important task for scientific discovery that takes decades and requires lots of expert knowledge. This work presents", "after": "revealing the reaction pathways for complex systems and processes is still challenging due to the lack of knowledge of the involved species and reactions. Here, we present", "start_char_pos": 145, "end_char_pos": 432}, {"type": "R", "before": "for discovering unknown", "after": "that autonomously discovers", "start_char_pos": 459, "end_char_pos": 482}, {"type": "R", "before": "concentration time series", "after": "the time-resolved species concentration", "start_char_pos": 506, "end_char_pos": 531}, {"type": "R", "before": "neural network denoted as", "after": "proposed", "start_char_pos": 542, "end_char_pos": 567}, {"type": "R", "before": "is designed to be equivalent to chemical reaction networks by following", "after": "by design, satisfies", "start_char_pos": 609, "end_char_pos": 680}, {"type": "R", "before": "of", "after": ", including", "start_char_pos": 710, "end_char_pos": 712}, {"type": "A", "before": null, "after": "the", "start_char_pos": 740, "end_char_pos": 740}, {"type": "R", "before": "The", "after": "Consequently, the", "start_char_pos": 756, "end_char_pos": 759}, {"type": "R", "before": ", and its weights correspond to", "after": "such that", "start_char_pos": 793, "end_char_pos": 824}, {"type": "R", "before": "and rate constants of the chemical reaction network. Then, inferencing the reaction pathways and the rate constants are", "after": "can be interpreted, and the kinetic parameters can be quantified simultaneously from the weights of the neural network. The inference of the chemical pathways is", "start_char_pos": 847, "end_char_pos": 966}, {"type": "R", "before": "equivalent CRNN", "after": "CRNN with species concentration data", "start_char_pos": 996, "end_char_pos": 1011}, {"type": "R", "before": "The", "after": "We demonstrate the successful implementations and the robustness of the approach in elucidating the chemical reaction pathways of several chemical engineering and biochemical systems. The autonomous inference by the CRNN", "start_char_pos": 1045, "end_char_pos": 1048}, {"type": "R", "before": "reactions, such that the inference is autonomous and applicable to new systemsfor which there is no existing empirical knowledge to propose reaction pathways", "after": "networks and addresses the curse of dimensionality in complex systems", "start_char_pos": 1121, "end_char_pos": 1278}, {"type": "R", "before": "not only capable of", "after": "capable of not only", "start_char_pos": 1331, "end_char_pos": 1350}, {"type": "D", "before": ". Finally, the approach is applied to several chemical systems in chemical engineering and biochemistry to demonstrate its robustness and generality", "after": null, "start_char_pos": 1491, "end_char_pos": 1639}], "sents_char_pos": [0, 139, 273, 413, 537, 755, 899, 1044, 1280, 1492]}
+{"doc_id": "2002.09949", "revision_depth": "2", "before_revision": "The Semantic Web is made of structured sources of information, such as DBpedia or GeoNames, also known as Linked Data(LD). They can be linked and queried together. The information they contain is atomized into triples , each triple being a simple statement composed of a subject, a predicate and an object. Triples can be combined to form higher level statements following information needs. But reconstituting chains of triples has a cognitive cost, and this makes it difficult for data producers to have meaningful overviews of the content of their own datasets. We report a characterisation of LD producers' needs, and introduce the concept of path-based summaries, which carries a higher level of semantics, to meet their needs . We present the tool Path Outlinesto support LD producers in browsing path-based summaries of their datasets. We describe its interface based on the broken (out)lines layout algorithm and the path browser visualisation . We compare Path Outlines with the current baseline technique (Virtuoso SPARQL query editor) in an experiment with 36 participants. We show that Path Outlines is faster, leads to better task completion and less errors, and that participants prefer it, find it easier and more comfortable to use .", "after_revision": "Knowledge Graphs have become a ubiquitous technology powering search engines, recommender systems, connected objects, corporate knowledge management and Open Data. They rely on small units of information named triples that can be combined to form higher level statements across datasets following information needs. But data producers face a problem: reconstituting chains of triples has a high cognitive cost, which hinders them from gaining meaningful overviews of their own datasets. We introduce path outlines: conceptual objects characterizing sequences of triples with descriptive statistics. We interview 11 data producers to evaluate their interest . We present Path Outlines, a tool to browse path-based summaries , based on coordinated views with 2 novel visualisations . We compare Path Outlines with the current baseline technique in an experiment with 36 participants. We show that it is 3 times faster, leads to better task completion , less errors, that participants prefer it, and find tasks easier with it .", "edit_actions": [{"type": "R", "before": "The Semantic Web is made of structured sources of information, such as DBpedia or GeoNames, also known as Linked Data(LD). They can be linked and queried together. The information they contain is atomized into triples , each triple being a simple statement composed of a subject, a predicate and an object. Triples", "after": "Knowledge Graphs have become a ubiquitous technology powering search engines, recommender systems, connected objects, corporate knowledge management and Open Data. They rely on small units of information named triples that", "start_char_pos": 0, "end_char_pos": 314}, {"type": "A", "before": null, "after": "across datasets", "start_char_pos": 363, "end_char_pos": 363}, {"type": "A", "before": null, "after": "data producers face a problem:", "start_char_pos": 397, "end_char_pos": 397}, {"type": "A", "before": null, "after": "high", "start_char_pos": 437, "end_char_pos": 437}, {"type": "R", "before": "and this makes it difficult for data producers to have", "after": "which hinders them from gaining", "start_char_pos": 454, "end_char_pos": 508}, {"type": "D", "before": "the content of", "after": null, "start_char_pos": 533, "end_char_pos": 547}, {"type": "R", "before": "report a characterisation of LD producers' needs, and introduce the concept of path-based summaries, which carries a higher level of semantics, to meet their needs", "after": "introduce path outlines: conceptual objects characterizing sequences of triples with descriptive statistics. We interview 11 data producers to evaluate their interest", "start_char_pos": 571, "end_char_pos": 734}, {"type": "R", "before": "the tool Path Outlinesto support LD producers in browsing", "after": "Path Outlines, a tool to browse", "start_char_pos": 748, "end_char_pos": 805}, {"type": "R", "before": "of their datasets. We describe its interface based on the broken (out)lines layout algorithm and the path browser visualisation", "after": ", based on coordinated views with 2 novel visualisations", "start_char_pos": 827, "end_char_pos": 954}, {"type": "D", "before": "(Virtuoso SPARQL query editor)", "after": null, "start_char_pos": 1018, "end_char_pos": 1048}, {"type": "R", "before": "Path Outlines is", "after": "it is 3 times", "start_char_pos": 1101, "end_char_pos": 1117}, {"type": "R", "before": "and", "after": ",", "start_char_pos": 1158, "end_char_pos": 1161}, {"type": "D", "before": "and", "after": null, "start_char_pos": 1175, "end_char_pos": 1178}, {"type": "R", "before": "find it easier and more comfortable to use", "after": "and find tasks easier with it", "start_char_pos": 1208, "end_char_pos": 1250}], "sents_char_pos": [0, 122, 163, 306, 392, 567, 736, 845, 956, 1087]}
+{"doc_id": "2002.10047", "revision_depth": "1", "before_revision": "Dense subgraphs capture strong communities in social networks and entities possessing strong interactions in biological networks. In particular, k-clique counting and listing have applications in identifying important actors in a graph. However, finding k-cliques is computationally expensive, and thus it is important to have fast parallel algorithms. We present a new parallel algorithm for k-clique counting that has polylogarithmic span and is work-efficient with respect to the well-known sequential algorithmfor k-clique listing by Chiba and Nishizeki . Our algorithm can be extended to support listing and enumeration, and is based on computing low out-degree orientations . We present a new linear-work and polylogarithmic span algorithm for computing such orientations, and new parallel algorithms for producing unbiased estimations of clique counts . Finally, we design new parallel work-efficient algorithms for approximating the k-clique densest subgraph . Our first algorithm gives a 1/k-approximation and is based on iteratively peeling vertices with the lowest clique counts; our algorithm is work-efficient, but we prove that this process is P-complete and hence does not have polylogarithmic span. Our second algorithm gives a 1/(k(1+\\epsilon))-approximation , is work-efficient, and has polylogarithmic span. In addition, we implement these algorithms and propose optimizations . On a 60-core machine , we achieve 13.23 -38.99 x and 1.19 -13.76 x self-relative parallel speedup for k-clique counting and k-clique densest subgraph, respectively. Compared to the state-of-the-art parallel k-clique counting algorithms, we achieve a 1.31-9.88 x speedup, and compared to existing implementations of k-clique densest subgraph, we achieve a 1.01-11.83 x speedup. We are able to compute the 4-clique counts on the largest publicly-available graph with over two hundred billion edges .", "after_revision": " We present a new parallel algorithm for k-clique counting /listing that has polylogarithmic span (parallel time) and is work-efficient (matches the work of the best sequential algorithm) for sparse graphs . Our algorithm is based on computing low out-degree orientations , which we present new linear-work and polylogarithmic-span algorithms for computing in parallel. We also present new parallel algorithms for producing unbiased estimations of clique counts using graph sparsification . Finally, we design two new parallel work-efficient algorithms for approximating the k-clique densest subgraph , the first of which is a 1/k-approximation and the second of which is a 1/(k(1+\\epsilon))-approximation and has polylogarithmic span. Our first algorithm does not have polylogarithmic span, but we prove that it solves a P-complete problem. In addition to the theoretical results, we also implement the algorithms and propose various optimizations to improve their practical performance . On a 30-core machine with two-way hyper-threading, our algorithms achieve 13.23 --38.99 x and 1.19 --13.76 x self-relative parallel speedup for k-clique counting and k-clique densest subgraph, respectively. Compared to the state-of-the-art parallel k-clique counting algorithms, we achieve up to 9.88 x speedup, and compared to existing implementations of k-clique densest subgraph, we achieve up to 11.83 x speedup. We are able to compute the 4-clique counts on the largest publicly-available graph with over two hundred billion edges for the first time .", "edit_actions": [{"type": "D", "before": "Dense subgraphs capture strong communities in social networks and entities possessing strong interactions in biological networks. In particular, k-clique counting and listing have applications in identifying important actors in a graph. However, finding k-cliques is computationally expensive, and thus it is important to have fast parallel algorithms.", "after": null, "start_char_pos": 0, "end_char_pos": 352}, {"type": "A", "before": null, "after": "/listing", "start_char_pos": 411, "end_char_pos": 411}, {"type": "A", "before": null, "after": "(parallel time)", "start_char_pos": 442, "end_char_pos": 442}, {"type": "R", "before": "with respect to the well-known sequential algorithmfor k-clique listing by Chiba and Nishizeki", "after": "(matches the work of the best sequential algorithm) for sparse graphs", "start_char_pos": 465, "end_char_pos": 559}, {"type": "D", "before": "can be extended to support listing and enumeration, and", "after": null, "start_char_pos": 576, "end_char_pos": 631}, {"type": "R", "before": ". We present a", "after": ", which we present", "start_char_pos": 682, "end_char_pos": 696}, {"type": "R", "before": "polylogarithmic span algorithm for computing such orientations, and", "after": "polylogarithmic-span algorithms for computing in parallel. We also present", "start_char_pos": 717, "end_char_pos": 784}, {"type": "A", "before": null, "after": "using graph sparsification", "start_char_pos": 861, "end_char_pos": 861}, {"type": "A", "before": null, "after": "two", "start_char_pos": 883, "end_char_pos": 883}, {"type": "R", "before": ". Our first algorithm gives", "after": ", the first of which is", "start_char_pos": 971, "end_char_pos": 998}, {"type": "R", "before": "is based on iteratively peeling vertices with the lowest clique counts; our algorithm is work-efficient, but we prove that this process is P-complete and hence does not have polylogarithmic span. Our second algorithm gives", "after": "the second of which is", "start_char_pos": 1023, "end_char_pos": 1245}, {"type": "D", "before": ", is work-efficient,", "after": null, "start_char_pos": 1280, "end_char_pos": 1300}, {"type": "R", "before": "In addition, we implement these", "after": "Our first algorithm does not have polylogarithmic span, but we prove that it solves a P-complete problem. In addition to the theoretical results, we also implement the", "start_char_pos": 1331, "end_char_pos": 1362}, {"type": "R", "before": "optimizations", "after": "various optimizations to improve their practical performance", "start_char_pos": 1386, "end_char_pos": 1399}, {"type": "R", "before": "60-core machine , we", "after": "30-core machine with two-way hyper-threading, our algorithms", "start_char_pos": 1407, "end_char_pos": 1427}, {"type": "R", "before": "-38.99", "after": "--38.99", "start_char_pos": 1442, "end_char_pos": 1448}, {"type": "R", "before": "-13.76", "after": "--13.76", "start_char_pos": 1460, "end_char_pos": 1466}, {"type": "R", "before": "a 1.31-9.88", "after": "up to 9.88", "start_char_pos": 1650, "end_char_pos": 1661}, {"type": "R", "before": "a 1.01-11.83", "after": "up to 11.83", "start_char_pos": 1755, "end_char_pos": 1767}, {"type": "A", "before": null, "after": "for the first time", "start_char_pos": 1898, "end_char_pos": 1898}], "sents_char_pos": [0, 129, 236, 352, 561, 683, 863, 972, 1094, 1218, 1330, 1401, 1566, 1778]}
+{"doc_id": "2002.11193", "revision_depth": "1", "before_revision": "Spatio-temporal information is increasingly used for driving a plethora of intelligent transportation, smart-city, and crowd-sensing applications. At the same time, different types of data marketplaces are proposed for de-siloing and monetising individual and enterprise data . In this paper we study the problem of estimating the relative value of spatio-temporal data sold in wholesale and retail data marketplaces for the purpose of forecasting future demand in a certain area, e. g. a city. Using as case studies large datasets of taxi rides from Chicago and New York, we ask questions such as \"When does it make sense for different taxi companies to combine their data?\" and \"How should different companies be compensated for the data that they share?\". We then turn our attention to the even harder problem of establishing the value of the data brought to retail marketplaces by individual drivers. Overall, we show that simplistic approaches, such as assuming that the value of the dataheld by companies or drivers is proportional to its volumeare inaccurate, because they fail to consider the complex complementarities that may exist among different datasets. To remedy this , more complex notions of value-sharing from economics and game-theory, such as the Shapley value need to be used to capture the effect of mixing datasets on the accuracy of forecasting algorithms driven by them . Applying the Shapley value to large datasets from many sources is computationally challenging. We use structured sampling to overcome such scalability challenges and manage to compute accurately the importance of different data sources, even when their number ranges in the thousands, as in the case of all the taxi drivers in a large metropolis .", "after_revision": "Spatio-temporal information is used for driving a plethora of intelligent transportation, smart-city, and crowd-sensing applications. Since data is now considered a valuable production factor, data marketplaces have appeared to help individuals and enterprises bring it to market to satisfy the ever-growing demand. In such marketplaces, several sources may need to combine their data in order to meet the requirements of different applications . In this paper we study the problem of estimating the relative value of different spatio-temporal datasets combined in wholesale and retail marketplaces for the purpose of predicting demand in metropolitan areas. Using as case studies large datasets of taxi rides from Chicago and New York, we ask questions such as \"When does it make sense for different taxi companies to combine their data?\" , and \"How should different companies be compensated for the data that they share?\". We then turn our attention to the even harder problem of establishing the relative value of the data brought to retail marketplaces by individual drivers. Overall, we show that simplistic but popular approaches for estimating the relative value of data, such as using volume , or the ``leave-one-out'' heuristic, are inaccurate. Instead, more complex notions of value from economics and game-theory, such as the Shapley value need to be employed if one wishes to capture the complex effects of mixing different datasets on the accuracy of forecasting algorithms . Applying the Shapley value to large datasets from many sources is , of course, computationally challenging. We resort to structured sampling and manage to compute accurately the importance of thousands of data sources. We show that the relative value of the data held by different taxi companies and drivers may differ substantially, and that its relative ranking may change from district to district within a metropolitan area .", "edit_actions": [{"type": "D", "before": "increasingly", "after": null, "start_char_pos": 31, "end_char_pos": 43}, {"type": "R", "before": "At the same time, different types of data marketplaces are proposed for de-siloing and monetising individual and enterprise data", "after": "Since data is now considered a valuable production factor, data marketplaces have appeared to help individuals and enterprises bring it to market to satisfy the ever-growing demand. In such marketplaces, several sources may need to combine their data in order to meet the requirements of different applications", "start_char_pos": 147, "end_char_pos": 275}, {"type": "A", "before": null, "after": "different", "start_char_pos": 349, "end_char_pos": 349}, {"type": "R", "before": "data sold", "after": "datasets combined", "start_char_pos": 366, "end_char_pos": 375}, {"type": "D", "before": "data", "after": null, "start_char_pos": 400, "end_char_pos": 404}, {"type": "R", "before": "forecasting future demand in a certain area, e. g. a city.", "after": "predicting demand in metropolitan areas.", "start_char_pos": 437, "end_char_pos": 495}, {"type": "A", "before": null, "after": ",", "start_char_pos": 677, "end_char_pos": 677}, {"type": "A", "before": null, "after": "relative", "start_char_pos": 835, "end_char_pos": 835}, {"type": "R", "before": "approaches, such as assuming that the value of the dataheld by companies or drivers is proportional to its volumeare inaccurate, because they fail to consider the complex complementarities that may exist among different datasets. To remedy this", "after": "but popular approaches for estimating the relative value of data, such as using volume", "start_char_pos": 941, "end_char_pos": 1185}, {"type": "A", "before": null, "after": "or the ``leave-one-out'' heuristic, are inaccurate. Instead,", "start_char_pos": 1188, "end_char_pos": 1188}, {"type": "R", "before": "value-sharing", "after": "value", "start_char_pos": 1213, "end_char_pos": 1226}, {"type": "R", "before": "used", "after": "employed if one wishes", "start_char_pos": 1296, "end_char_pos": 1300}, {"type": "R", "before": "effect of mixing", "after": "complex effects of mixing different", "start_char_pos": 1316, "end_char_pos": 1332}, {"type": "D", "before": "driven by them", "after": null, "start_char_pos": 1384, "end_char_pos": 1398}, {"type": "A", "before": null, "after": ", of course,", "start_char_pos": 1467, "end_char_pos": 1467}, {"type": "R", "before": "use structured sampling to overcome such scalability challenges", "after": "resort to structured sampling", "start_char_pos": 1500, "end_char_pos": 1563}, {"type": "R", "before": "different data sources, even when their number ranges in the thousands, as in the case of all the taxi drivers in a large metropolis", "after": "thousands of data sources. We show that the relative value of the data held by different taxi companies and drivers may differ substantially, and that its relative ranking may change from district to district within a metropolitan area", "start_char_pos": 1615, "end_char_pos": 1747}], "sents_char_pos": [0, 146, 277, 495, 760, 907, 1170, 1400, 1496]}
+{"doc_id": "2002.11583", "revision_depth": "1", "before_revision": "Holston, Laubach and Williams' (2017) estimates of the natural rate of interest are driven by the downward trending behaviour of ` other factor' z_{t}. I show that their implementation of Stock and Watson's (1998) Median Unbiased Estimation (MUE) to determine the size of \\lambda_{z is unsound. It cannot recover the ratio of interest \\lambda _{z}=a_{r}\\sigma _{z}/\\sigma _{y} from MUE required for the estimation of the full structural model. This failure is due to their Stage 2 model being incorrectly specified . More importantly, the MUE procedure that they implement spuriously amplifies the estimate of \\lambda _{z}. Using a simulation experiment, I show that their MUE procedure generates excessively large estimates of \\lambda _{z} when applied to data simulated from a model where the true \\lambda _{z} is equal to zero. Correcting their Stage 2 MUE procedure leads to a substantially smaller estimate of \\lambda _{z a more subdued downward trending influence of ` other factor' z_{t} on the natural rate. This correction is quantitatively important. With everything else remaining the same in the model, the natural rate of interest is estimated to be 1.5\\% at the end of 2019:Q2; that is, three times the 0.5\\% estimate obtained from Holston et al.'s (2017) original Stage 2 MUE implementation . I also discuss various other issues that arise in their model of the natural rate that make it unsuitable for policy analysis.", "after_revision": "Holston, Laubach and Williams' (2017) estimates of the natural rate of interest are driven by the downward trending behaviour of ' other factor' z_{t}. I show that their implementation of Stock and Watson's (1998) Median Unbiased Estimation (MUE) to determine the size of the \\lambda _{z is unsound. It cannot recover the ratio of interest \\lambda _{z}=a_{r}\\sigma _{z}/\\sigma _{y} from MUE required for the estimation of the full structural model. This failure is due to an 'unnecessary' misspecification in Holston et al.'s (2017) formulation of the Stage 2 model . More importantly, their implementation of MUE on this misspecified Stage 2 model spuriously amplifies the point estimate of \\lambda _{z}. Using a simulation experiment, I show that their procedure generates excessively large estimates of \\lambda _{z} when applied to data generated from a model where the true \\lambda _{z} is equal to zero. Correcting the misspecification in their Stage 2 model and the implementation of MUE leads to a substantially smaller \\lambda _{z a more subdued downward trending influence of ' other factor' z_{t} on the natural rate. Moreover, the \\lambda _{z . I also discuss various other estimation issues that arise in Holston et al.'s (2017) model of the natural rate that make it unsuitable for policy analysis.", "edit_actions": [{"type": "R", "before": "`", "after": "'", "start_char_pos": 129, "end_char_pos": 130}, {"type": "R", "before": "\\lambda_{z", "after": "the \\lambda _{z", "start_char_pos": 272, "end_char_pos": 282}, {"type": "R", "before": "their", "after": "an 'unnecessary' misspecification in Holston et al.'s (2017) formulation of the", "start_char_pos": 467, "end_char_pos": 472}, {"type": "D", "before": "being incorrectly specified", "after": null, "start_char_pos": 487, "end_char_pos": 514}, {"type": "R", "before": "the MUE procedure that they implement", "after": "their implementation of MUE on this misspecified Stage 2 model", "start_char_pos": 535, "end_char_pos": 572}, {"type": "A", "before": null, "after": "point", "start_char_pos": 598, "end_char_pos": 598}, {"type": "D", "before": "MUE", "after": null, "start_char_pos": 674, "end_char_pos": 677}, {"type": "R", "before": "simulated", "after": "generated", "start_char_pos": 763, "end_char_pos": 772}, {"type": "A", "before": null, "after": "the misspecification in", "start_char_pos": 843, "end_char_pos": 843}, {"type": "R", "before": "MUE procedure", "after": "model and the implementation of MUE", "start_char_pos": 858, "end_char_pos": 871}, {"type": "R", "before": "estimate of \\lambda _{z", "after": "\\lambda _{z", "start_char_pos": 905, "end_char_pos": 928}, {"type": "R", "before": "`", "after": "'", "start_char_pos": 975, "end_char_pos": 976}, {"type": "R", "before": "This correction is quantitatively important. With everything else remaining the same in the model, the natural rate of interest is estimated to be 1.5\\% at the end of 2019:Q2; that is, three times the 0.5\\% estimate obtained from Holston et al.'s (2017) original Stage 2 MUE implementation", "after": "Moreover, the \\lambda _{z", "start_char_pos": 1018, "end_char_pos": 1307}, {"type": "A", "before": null, "after": "estimation", "start_char_pos": 1339, "end_char_pos": 1339}, {"type": "R", "before": "their", "after": "Holston et al.'s (2017)", "start_char_pos": 1361, "end_char_pos": 1366}], "sents_char_pos": [0, 151, 294, 443, 516, 624, 831, 1017, 1062, 1193, 1309]}
+{"doc_id": "2002.12104", "revision_depth": "1", "before_revision": "In the presence of large dimensional datasets that contain many irrelevant features(variables), dimensionality reduction algorithms have proven to be useful in removing features with low variance and combine features with high correlation . In this paper, we propose a new feature selection method which uses singular value decomposition of a matrix and }] the method of least squares to remove the irrelevant features and detect correlations between the remaining features . and remove those features whose weights are smaller than the threshold. To detect the correlations in the reduced matrix, which we still call A, we consider a perturbation }\\tilde =\\mid x -}\\mathbf{x}\\tilde{\\mathbf{x}} \\tilde \\tilde{\\mathbf{x}}. We cluster features first based on \\Delta\\mathbf{x} and then using the entropy of features. Finally, a feature is selected from each sub-cluster based on its weight and entropy. } The effectiveness of our method has been verified by performing a series of comparisons with state-of-the-art feature selection methods over ten genetic datasets ranging up from 9,117 to 267,604 features. The results show that our method is favorable in various aspects compared to state-of-the-art feature selection methods.\\e", "after_revision": "A central problem in machine learning and pattern recognition is the process of recognizing the most important features . In this paper, we provide a new feature selection method (DRPT) that consists of first removing the irrelevant features and then detecting correlations between the remaining features. Let D= A\\mid \\mathbf{b}] be a dataset, where \\mathbf{b the corresponding column (feature). We define a threshold based on the local maxima of \\mathbf{x and remove those features whose weights are smaller than the threshold. To detect the correlations in the reduced matrix, which we still call A, we consider a perturbation }\\tilde A of A. We prove that correlations are encoded in \\Delta\\mathbf{x=\\mid x -}\\mathbf{x}\\mid , where\\tilde{\\mathbf{x}} is the least quares solution of\\tilde A\\tilde{\\mathbf{x}}=\\mathbf{b. We cluster features first based on \\Delta\\mathbf{x} and then using the entropy of features. Finally, a feature is selected from each sub-cluster based on its weight and entropy. } The effectiveness of DRPT has been verified by performing a series of comparisons with seven state-of-the-art feature selection methods over ten genetic datasets ranging up from 9,117 to 267,604 features. The results show that , over all, the performance of DRPT is favorable in several aspects compared to each feature selection algorithm.\\e", "edit_actions": [{"type": "R", "before": "In the presence of large dimensional datasets that contain many irrelevant features(variables), dimensionality reduction algorithms have proven to be useful in removing features with low variance and combine features with high correlation", "after": "A central problem in machine learning and pattern recognition is the process of recognizing the most important features", "start_char_pos": 0, "end_char_pos": 238}, {"type": "R", "before": "propose", "after": "provide", "start_char_pos": 259, "end_char_pos": 266}, {"type": "R", "before": "which uses singular value decomposition of a matrix and", "after": "(DRPT) that consists of first removing the irrelevant features and then detecting correlations between the remaining features. Let D=", "start_char_pos": 298, "end_char_pos": 353}, {"type": "A", "before": null, "after": "A\\mid \\mathbf{b", "start_char_pos": 354, "end_char_pos": 354}, {"type": "A", "before": null, "after": "be a dataset, where \\mathbf{b", "start_char_pos": 357, "end_char_pos": 357}, {"type": "R", "before": "method of least squares to remove the irrelevant features and detect correlations between the remaining features .", "after": "corresponding column (feature). We define a threshold based on the local maxima of \\mathbf{x", "start_char_pos": 362, "end_char_pos": 476}, {"type": "A", "before": null, "after": "A of A. We prove that correlations are encoded in \\Delta\\mathbf{x", "start_char_pos": 657, "end_char_pos": 657}, {"type": "A", "before": null, "after": "\\mid , where", "start_char_pos": 677, "end_char_pos": 677}, {"type": "A", "before": null, "after": "is the least quares solution of", "start_char_pos": 696, "end_char_pos": 696}, {"type": "A", "before": null, "after": "A", "start_char_pos": 703, "end_char_pos": 703}, {"type": "A", "before": null, "after": "=\\mathbf{b", "start_char_pos": 721, "end_char_pos": 721}, {"type": "R", "before": "our method", "after": "DRPT", "start_char_pos": 924, "end_char_pos": 934}, {"type": "A", "before": null, "after": "seven", "start_char_pos": 996, "end_char_pos": 996}, {"type": "R", "before": "our method", "after": ", over all, the performance of DRPT", "start_char_pos": 1131, "end_char_pos": 1141}, {"type": "R", "before": "various", "after": "several", "start_char_pos": 1158, "end_char_pos": 1165}, {"type": "R", "before": "state-of-the-art feature selection methods.", "after": "each feature selection algorithm.", "start_char_pos": 1186, "end_char_pos": 1229}], "sents_char_pos": [0, 240, 548, 722, 814, 900, 1108]}
+{"doc_id": "2003.00381", "revision_depth": "1", "before_revision": "Cluster algorithms are gaining in popularity due to their compelling ability to identify discrete subgroups in data, and their increasing accessibility in mainstream programming languages and statistical software. While researchers can follow guidelines to choose the right algorithms, and to determine what constitutes convincing clustering , there are no firmly established ways of computing a priori statistical power for cluster analysis. Here, we take a simulation approach to estimate power and classification accuracy for popular analysis pipelines . We systematically varied cluster size, number of clusters, number of different features between clusters, effect sizewithin each different feature, and cluster covariance structurein generated datasets . We then subjected these datasets to common dimensionality reduction approaches (none, multi-dimensional scaling, or uniform manifold approximation and projection ) and cluster algorithms (k-means, hierarchical agglomerative clustering with Ward linkage and Euclidean distance, or average linkage and cosine distance, HDBSCAN). Furthermore, we simulated additional datasets to explore the effect of sample size and cluster separation on statistical power and classification accuracy . We found that clustering outcomes were driven by large effect sizes or the accumulation of many smaller effects across features, and were mostly unaffected by differences in covariance structure. Sufficient statistical power can be achieved with relatively small samples (N=20 per subgroup), provided cluster separation is large ({\\Delta}=4). Finally, we discuss whether fuzzy clustering (c-means) could provide a more parsimonious alternative for identifying separable multivariate normal distributions, particularly those with lower centroid separation } .", "after_revision": "Cluster algorithms are increasingly popular in biomedical research due to their compelling ability to identify discrete subgroups in data, and their increasing accessibility in mainstream software. While guidelines exist for algorithm selection and outcome evaluation , there are no firmly established ways of computing a priori statistical power for cluster analysis. Here, we estimated power and accuracy for common analysis pipelines through simulation. We varied subgroup size, number , separation (effect size), and covariance structure . We then subjected generated datasets to dimensionality reduction (none, multidimensional scaling, or UMAP ) and cluster algorithms (k-means, agglomerative hierarchical clustering with Ward or average linkage and Euclidean or cosine distance, HDBSCAN). Finally, we compared the statistical power of discrete (k-means), \"fuzzy\" (c-means), and finite mixture modelling approaches (which include latent profile and latent class analysis) . We found that outcomes were driven by large effect sizes or the accumulation of many smaller effects across features, and were unaffected by differences in covariance structure. Sufficient statistical power was achieved with relatively small samples (N=20 per subgroup), provided cluster separation is large ({\\Delta}=4). Fuzzy clustering provided a more parsimonious and powerful alternative for identifying separable multivariate normal distributions, particularly those with slightly lower centroid separation ( \\Delta}=3). Overall, we recommend that researchers 1) only apply cluster analysis when large subgroup separation is expected, 2) aim for sample sizes of N=20 to N=30 per expected subgroup, 3) use multidimensional scaling to improve cluster separation, and 4) use fuzzy clustering or finite mixture modelling approaches that are more powerful and more parsimonious with partially overlapping multivariate normal distributions .", "edit_actions": [{"type": "R", "before": "gaining in popularity", "after": "increasingly popular in biomedical research", "start_char_pos": 23, "end_char_pos": 44}, {"type": "D", "before": "programming languages and statistical", "after": null, "start_char_pos": 166, "end_char_pos": 203}, {"type": "R", "before": "researchers can follow guidelines to choose the right algorithms, and to determine what constitutes convincing clustering", "after": "guidelines exist for algorithm selection and outcome evaluation", "start_char_pos": 220, "end_char_pos": 341}, {"type": "R", "before": "take a simulation approach to estimate power and classification accuracy for popular analysis pipelines . We systematically varied cluster", "after": "estimated power and accuracy for common analysis pipelines through simulation. We varied subgroup", "start_char_pos": 452, "end_char_pos": 590}, {"type": "R", "before": "of clusters, number of different features between clusters, effect sizewithin each different feature, and cluster covariance structurein generated datasets", "after": ", separation (effect size), and covariance structure", "start_char_pos": 604, "end_char_pos": 759}, {"type": "R", "before": "these datasets to common dimensionality reduction approaches", "after": "generated datasets to dimensionality reduction", "start_char_pos": 780, "end_char_pos": 840}, {"type": "R", "before": "multi-dimensional", "after": "multidimensional", "start_char_pos": 848, "end_char_pos": 865}, {"type": "R", "before": "uniform manifold approximation and projection", "after": "UMAP", "start_char_pos": 878, "end_char_pos": 923}, {"type": "R", "before": "hierarchical agglomerative", "after": "agglomerative hierarchical", "start_char_pos": 959, "end_char_pos": 985}, {"type": "D", "before": "linkage and Euclidean distance,", "after": null, "start_char_pos": 1007, "end_char_pos": 1038}, {"type": "A", "before": null, "after": "Euclidean or", "start_char_pos": 1062, "end_char_pos": 1062}, {"type": "R", "before": "Furthermore, we simulated additional datasets to explore the effect of sample size and cluster separation on statistical power and classification accuracy", "after": "Finally, we compared the statistical power of discrete (k-means), \"fuzzy\" (c-means), and finite mixture modelling approaches (which include latent profile and latent class analysis)", "start_char_pos": 1090, "end_char_pos": 1244}, {"type": "D", "before": "clustering", "after": null, "start_char_pos": 1261, "end_char_pos": 1271}, {"type": "D", "before": "mostly", "after": null, "start_char_pos": 1385, "end_char_pos": 1391}, {"type": "R", "before": "can be", "after": "was", "start_char_pos": 1472, "end_char_pos": 1478}, {"type": "R", "before": "Finally, we discuss whether fuzzy clustering (c-means) could provide", "after": "Fuzzy clustering provided", "start_char_pos": 1590, "end_char_pos": 1658}, {"type": "A", "before": null, "after": "and powerful", "start_char_pos": 1679, "end_char_pos": 1679}, {"type": "A", "before": null, "after": "slightly", "start_char_pos": 1777, "end_char_pos": 1777}, {"type": "A", "before": null, "after": "(", "start_char_pos": 1804, "end_char_pos": 1804}, {"type": "A", "before": null, "after": "\\Delta", "start_char_pos": 1805, "end_char_pos": 1805}, {"type": "A", "before": null, "after": "=3). Overall, we recommend that researchers 1) only apply cluster analysis when large subgroup separation is expected, 2) aim for sample sizes of N=20 to N=30 per expected subgroup, 3) use multidimensional scaling to improve cluster separation, and 4) use fuzzy clustering or finite mixture modelling approaches that are more powerful and more parsimonious with partially overlapping multivariate normal distributions", "start_char_pos": 1806, "end_char_pos": 1806}], "sents_char_pos": [0, 213, 442, 557, 761, 1089, 1246, 1442, 1589]}
+{"doc_id": "2003.02200", "revision_depth": "1", "before_revision": "In geographic information systems, Digital Elevation Models (DEMs) are commonly processed using radial scanning based algorithms. These algorithms are particularly popular when calculating parameters whose magnitudes decrease with the distance squared such as those related to radio signals, sound waves , and human eyesight. However, radial scanning algorithms imply a large number of accesses to 2D arrays , which despite being regular, results in poor data locality . This paper proposes a new methodology , termed sDEM , which substantially improves the locality of memory accesses and largely increases the inherent parallelism involved in the computation of radial scanning algorithms. In particular, sDEM applies a data restructuring technique prior to accessing the memory and performing the computation. In order to demonstrate the high efficiency of sDEM, we use the problem of total viewshed computation as a case study . Sequential, parallel , single-GPU and multi-GPU implementations are analyzed and compared with the state-of-the-art total viewshed computation algorithm. Experiments show that sDEM achieves an acceleration rate of up to 827.3 times for the best multi-GPU execution approach with respect to the best multi-core implementation .", "after_revision": " Digital Elevation Models (DEMs) are important datasets for modelling the line of sight, such as radio signals, sound waves and human vision. These are commonly analyzed using rotational sweep algorithms. However, such algorithms require large numbers of memory accesses to 2D arrays which, despite being regular, result in poor data locality in memory. Here, we propose a new methodology called skewed Digital Elevation Model (sDEM) , which substantially improves the locality of memory accesses and increases the inherent parallelism involved in the computation of rotational sweep-based algorithms. In particular, sDEM applies a data restructuring technique before accessing the memory and performing the computation. To demonstrate the high efficiency of sDEM, we use the problem of total viewshed computation as a case study considering different implementations for single-core, multi-core , single-GPU and multi-GPU platforms. We conducted two experiments to compare sDEM with (i) the most commonly used geographic information systems (GIS) software and (ii) the state-of-the-art algorithm. In the first experiment, sDEM is on average 8.8x faster than current GIS software despite being able to consider only few points because of their limitations. In the second experiment, sDEM is 827.3 x faster than the state-of-the-art algorithm in the best case .", "edit_actions": [{"type": "D", "before": "In geographic information systems,", "after": null, "start_char_pos": 0, "end_char_pos": 34}, {"type": "R", "before": "commonly processed using radial scanning based algorithms. These algorithms are particularly popular when calculating parameters whose magnitudes decrease with the distance squared such as those related to", "after": "important datasets for modelling the line of sight, such as", "start_char_pos": 71, "end_char_pos": 276}, {"type": "R", "before": ", and human eyesight. However, radial scanning algorithms imply a large number of", "after": "and human vision. These are commonly analyzed using rotational sweep algorithms. However, such algorithms require large numbers of memory", "start_char_pos": 304, "end_char_pos": 385}, {"type": "R", "before": ", which", "after": "which,", "start_char_pos": 408, "end_char_pos": 415}, {"type": "R", "before": "results", "after": "result", "start_char_pos": 439, "end_char_pos": 446}, {"type": "R", "before": ". This paper proposes", "after": "in memory. Here, we propose", "start_char_pos": 469, "end_char_pos": 490}, {"type": "R", "before": ", termed sDEM", "after": "called skewed Digital Elevation Model (sDEM)", "start_char_pos": 509, "end_char_pos": 522}, {"type": "D", "before": "largely", "after": null, "start_char_pos": 590, "end_char_pos": 597}, {"type": "R", "before": "radial scanning", "after": "rotational sweep-based", "start_char_pos": 664, "end_char_pos": 679}, {"type": "R", "before": "prior to", "after": "before", "start_char_pos": 751, "end_char_pos": 759}, {"type": "R", "before": "In order to", "after": "To", "start_char_pos": 813, "end_char_pos": 824}, {"type": "R", "before": ". Sequential, parallel", "after": "considering different implementations for single-core, multi-core", "start_char_pos": 931, "end_char_pos": 953}, {"type": "R", "before": "implementations are analyzed and compared with the", "after": "platforms. We conducted two experiments to compare sDEM with (i) the most commonly used geographic information systems (GIS) software and (ii) the", "start_char_pos": 981, "end_char_pos": 1031}, {"type": "R", "before": "total viewshed computation algorithm. Experiments show that sDEM achieves an acceleration rate of up to", "after": "algorithm. In the first experiment, sDEM is on average 8.8x faster than current GIS software despite being able to consider only few points because of their limitations. In the second experiment, sDEM is", "start_char_pos": 1049, "end_char_pos": 1152}, {"type": "R", "before": "times for the best multi-GPU execution approach with respect to the best multi-core implementation", "after": "x faster than the state-of-the-art algorithm in the best case", "start_char_pos": 1159, "end_char_pos": 1257}], "sents_char_pos": [0, 129, 325, 470, 691, 812, 932, 1086]}
+{"doc_id": "2003.03025", "revision_depth": "2", "before_revision": "An adaptive guidance system that supports equipment operators requires a comprehensive model of task and user behavior that considers different skill and knowledge levels as well as diverse situations. In the present paper, we introduced a novel method for machine operation modeling aimed to integrate visual operation records provided by users with different skills, knowledge levels , and interpersonal behavior patterns . For this purpose, we investigated the relationships between user behavior patterns that could be visually observed and their skill levels under machine operation conditions. We considered sixty samples of two sewing tasks performed by five operators using a head-mounted RGB-D camera and a static gaze tracker. We examined behavioral features, such as the operator gaze, head movements, and hand interactionswith hotspots, and observed significant behavioral changes as a result of continuous skill improvement. We automatically modeled the variety of behaviors of operation tasks with a two-step approach, prototype selection and experiences integration . The experimental results indicated that features, such as duration of task execution and user head movements, could serve as appropriate indices for skill level evaluation, and provide useful information for integrating various records corresponding to different skill levels and behavioral characteristics. Integrating operation records with operating habits allowed developing a rich inclusive task model that could be used to flexibly adapt to various user-specific behavior patterns .", "after_revision": "An adaptive guidance system that supports equipment operators requires a comprehensive model , which involves a variety of user behaviors that considers different skill and knowledge levels , as well as rapid-changing task situations. In the present paper, we introduced a novel method for modeling operational tasks, aiming to integrate visual operation records provided by users with diverse experience levels and personal characteristics . For this purpose, we investigated the relationships between user behavior patterns that could be visually observed and their skill levels under machine operation conditions. We considered 144 samples of two sewing tasks performed by 12 operators using a head-mounted RGB-D camera and a static gaze tracker. Behavioral features, such as the operator 's gaze and head movements, hand interactions, and hotspots, were observed with significant behavioral trends resulting from continuous user skill improvement. We used a two-step method to model the diversity of user behavior: prototype selection and experience integration based on skill ranking . The experimental results showed that several features could serve as appropriate indices for user skill evaluation, as well as providing valuable clues for revealing personal behavioral characteristics. The integration of user records with different skills and operational habits allowed developing a rich , inclusive task model that could be used flexibly to adapt to diverse user-specific needs .", "edit_actions": [{"type": "R", "before": "of task and user behavior", "after": ", which involves a variety of user behaviors", "start_char_pos": 93, "end_char_pos": 118}, {"type": "A", "before": null, "after": ",", "start_char_pos": 171, "end_char_pos": 171}, {"type": "R", "before": "diverse", "after": "rapid-changing task", "start_char_pos": 183, "end_char_pos": 190}, {"type": "R", "before": "machine operation modeling aimed", "after": "modeling operational tasks, aiming", "start_char_pos": 258, "end_char_pos": 290}, {"type": "R", "before": "different skills, knowledge levels , and interpersonal behavior patterns", "after": "diverse experience levels and personal characteristics", "start_char_pos": 352, "end_char_pos": 424}, {"type": "R", "before": "sixty", "after": "144", "start_char_pos": 615, "end_char_pos": 620}, {"type": "R", "before": "five", "after": "12", "start_char_pos": 662, "end_char_pos": 666}, {"type": "R", "before": "We examined behavioral", "after": "Behavioral", "start_char_pos": 738, "end_char_pos": 760}, {"type": "R", "before": "gaze,", "after": "'s gaze and", "start_char_pos": 792, "end_char_pos": 797}, {"type": "R", "before": "and hand interactionswith hotspots, and observed significant behavioral changes as a result of continuous", "after": "hand interactions, and hotspots, were observed with significant behavioral trends resulting from continuous user", "start_char_pos": 814, "end_char_pos": 919}, {"type": "R", "before": "automatically modeled the variety of behaviors of operation tasks with", "after": "used", "start_char_pos": 942, "end_char_pos": 1012}, {"type": "R", "before": "approach,", "after": "method to model the diversity of user behavior:", "start_char_pos": 1024, "end_char_pos": 1033}, {"type": "R", "before": "experiences integration", "after": "experience integration based on skill ranking", "start_char_pos": 1058, "end_char_pos": 1081}, {"type": "R", "before": "indicated that features, such as duration of task execution and user head movements,", "after": "showed that several features", "start_char_pos": 1109, "end_char_pos": 1193}, {"type": "R", "before": "skill level evaluation, and provide useful information for integrating various records corresponding to different skill levels and", "after": "user skill evaluation, as well as providing valuable clues for revealing personal", "start_char_pos": 1233, "end_char_pos": 1363}, {"type": "R", "before": "Integrating operation records with operating", "after": "The integration of user records with different skills and operational", "start_char_pos": 1392, "end_char_pos": 1436}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1470, "end_char_pos": 1470}, {"type": "R", "before": "to flexibly adapt to various", "after": "flexibly to adapt to diverse", "start_char_pos": 1511, "end_char_pos": 1539}, {"type": "R", "before": "behavior patterns", "after": "needs", "start_char_pos": 1554, "end_char_pos": 1571}], "sents_char_pos": [0, 202, 426, 600, 737, 938, 1083, 1391]}
+{"doc_id": "2003.03595", "revision_depth": "1", "before_revision": "We show that computing the Tutte polynomial of a linear matroid of dimension k on k^{O(1)} points over a field of k^{O(1)} elements requires k^{\\Omega(k)} time unless the ETH---a counting extension of the Exponential Time Hypothesis of Impagliazzo and Paturi [CCC 1999] due to Dell {\\em et al. [ACM TALG 2014]---is false. This holds also for linear matroids that admit a representation where every point is associated to a vector with at most two nonzero coordinates. Moreover, we also show that the same is true for computing the Tutte polynomial of a binary matroid of dimension k on k^{O(1)} points with at most three nonzero coordinates in each point's vector. These two results stand in sharp contrast to computing the Tutte polynomial of a k-vertex graph (that is, the Tutte polynomial of a graphic {\\em matroid of dimension k---which is representable in dimension k over the binary field so that every vector has exactly two nonzero coordinates), which is known to be computable in 2^k k^{O(1)} time [Bj\\\"orklund {\\em et al. , FOCS 2008]. Our lower-bound proofs proceed in three steps: (i) a classic connection due to Crapo and Rota [1970] between the number of tuples of codewords of full support and the Tutte polynomial of the matroid associated with the code; (ii) an earlier-established \\#ETH-hardness of counting the solutions to a bipartite (d,2)-CSP on n vertices in d^{o(n)} time; and (iii) new embeddings of such CSP instances as questions about codewords of full support in a linear code. We complement these lower bounds with a matching upper-bound algorithm design that computes the Tutte polynomial of a linear matroid of dimension k on k^{O(1)} points in k^{O(k)} arithmetic operationsin the base field{\\em .", "after_revision": "We show that computing the Tutte polynomial of a linear matroid of dimension k on k^{O(1)} points over a field of k^{O(1)} elements requires k^{\\Omega(k)} time unless the \\# ETH---a counting extension of the Exponential Time Hypothesis of Impagliazzo and Paturi [CCC 1999] due to Dell {\\em et al. [ACM TALG 2014]---is false. This holds also for linear matroids that admit a representation where every point is associated to a vector with at most two nonzero coordinates. We also show that the same is true for computing the Tutte polynomial of a binary matroid of dimension k on k^{O(1)} points with at most three nonzero coordinates in each point's vector. This is in sharp contrast to computing the Tutte polynomial of a k-vertex graph (that is, the Tutte polynomial of a {\\em graphic matroid of dimension k---which is representable in dimension k over the binary field so that every vector has two nonzero coordinates), which is known to be computable in 2^k k^{O(1)} time [Bj\\\"orklund {\\em et al. , FOCS 2008]. Our lower-bound proofs proceed via (i) a connection due to Crapo and Rota [1970] between the number of tuples of codewords of full support and the Tutte polynomial of the matroid associated with the code; (ii) an earlier-established \\#ETH-hardness of counting the solutions to a bipartite (d,2)-CSP on n vertices in d^{o(n)} time; and (iii) new embeddings of such CSP instances as questions about codewords of full support in a linear code. We complement these lower bounds with two algorithm designs. The first design computes the Tutte polynomial of a linear matroid of dimension ~ k on k^{O(1)} points in k^{O(k)} operations. The second design generalizes the Bj\\\"orklund~{\\em et al. algorithm and runs in q^{k+1 .", "edit_actions": [{"type": "A", "before": null, "after": "\\#", "start_char_pos": 171, "end_char_pos": 171}, {"type": "R", "before": "Moreover, we", "after": "We", "start_char_pos": 469, "end_char_pos": 481}, {"type": "R", "before": "These two results stand", "after": "This is", "start_char_pos": 666, "end_char_pos": 689}, {"type": "D", "before": "graphic", "after": null, "start_char_pos": 798, "end_char_pos": 805}, {"type": "A", "before": null, "after": "graphic", "start_char_pos": 811, "end_char_pos": 811}, {"type": "D", "before": "exactly", "after": null, "start_char_pos": 922, "end_char_pos": 929}, {"type": "R", "before": "in three steps:", "after": "via", "start_char_pos": 1079, "end_char_pos": 1094}, {"type": "D", "before": "classic", "after": null, "start_char_pos": 1101, "end_char_pos": 1108}, {"type": "R", "before": "a matching upper-bound algorithm design that", "after": "two algorithm designs. The first design", "start_char_pos": 1547, "end_char_pos": 1591}, {"type": "A", "before": null, "after": "~", "start_char_pos": 1655, "end_char_pos": 1655}, {"type": "R", "before": "arithmetic operationsin the base field", "after": "operations. The second design generalizes the Bj\\\"orklund~", "start_char_pos": 1689, "end_char_pos": 1727}, {"type": "A", "before": null, "after": "et al.", "start_char_pos": 1732, "end_char_pos": 1732}, {"type": "A", "before": null, "after": "algorithm and runs in q^{k+1", "start_char_pos": 1733, "end_char_pos": 1733}], "sents_char_pos": [0, 294, 322, 468, 665, 1047, 1272, 1398, 1508]}
+{"doc_id": "2003.03876", "revision_depth": "1", "before_revision": "In this article we propose and calculate, under the Black Scholes option pricing model, a measure of the relative value of a delta- Symmetric Strangle . The proposed measure accounts for the price of the strangle, relative to the (present value of the ) spread between the two strikes, all expressed, after a natural re-parameterization, in terms of delta and a volatility parameter. We show the startling main result that under the standard BS option pricing model, this measure of relative value is a function of delta only and is independent of the time to expiry, the price of the underlying security or the prevailing volatility used in the pricing model. {\\it In fact, the simple and intuitively appealing expression for this measure allows us to study the strangle's exit strategy and the corresponding optimal choices for values {\\it of delta.", "after_revision": "Trading option strangles is a highly popular strategy often used by market participants to mitigate volatility risks in their portfolios. In this paper we propose a measure of the relative value of a delta-Symmetric Strangle and compute it under the standard Black-Scholes option pricing model. This new measure accounts for the price of the strangle, relative to the Present Value of the spread between the two strikes, all expressed, after a natural re-parameterization, in terms of delta and a volatility parameter. We show that under the standard BS option pricing model, this measure of relative value is bounded by a simple function of delta only and is independent of the time to expiry, the price of the underlying security or the prevailing volatility used in the pricing model. We demonstrate how this bound can be used as a quick{\\it benchmark to assess, regardless the market volatility, the duration of the contract or the price of the underlying security, the market (relative) value of the \\delta-strangle in comparison to its BS (relative) price. In fact, the explicit and simple expression for this measure and bound allows us to also study in detail the strangle's exit strategy and the corresponding {\\it optimal choice for a value of delta.", "edit_actions": [{"type": "R", "before": "In this article we propose and calculate, under the Black Scholes option pricing model,", "after": "Trading option strangles is a highly popular strategy often used by market participants to mitigate volatility risks in their portfolios. In this paper we propose", "start_char_pos": 0, "end_char_pos": 87}, {"type": "R", "before": "delta- Symmetric Strangle . The proposed", "after": "delta-Symmetric Strangle and compute it under the standard Black-Scholes option pricing model. This new", "start_char_pos": 125, "end_char_pos": 165}, {"type": "R", "before": "(present value of the )", "after": "Present Value of the", "start_char_pos": 230, "end_char_pos": 253}, {"type": "D", "before": "the startling main result", "after": null, "start_char_pos": 392, "end_char_pos": 417}, {"type": "R", "before": "a", "after": "bounded by a simple", "start_char_pos": 501, "end_char_pos": 502}, {"type": "A", "before": null, "after": "We demonstrate how this bound can be used as a quick", "start_char_pos": 661, "end_char_pos": 661}, {"type": "A", "before": null, "after": "benchmark", "start_char_pos": 666, "end_char_pos": 666}, {"type": "A", "before": null, "after": "to assess, regardless the market volatility, the duration of the contract or the price of the underlying security, the market (relative) value of the \\delta-strangle in comparison to its BS (relative) price.", "start_char_pos": 667, "end_char_pos": 667}, {"type": "R", "before": "simple and intuitively appealing", "after": "explicit and simple", "start_char_pos": 681, "end_char_pos": 713}, {"type": "A", "before": null, "after": "and bound", "start_char_pos": 742, "end_char_pos": 742}, {"type": "R", "before": "study", "after": "also study in detail", "start_char_pos": 756, "end_char_pos": 761}, {"type": "D", "before": "optimal choices for values", "after": null, "start_char_pos": 813, "end_char_pos": 839}, {"type": "A", "before": null, "after": "optimal", "start_char_pos": 845, "end_char_pos": 845}, {"type": "A", "before": null, "after": "choice for a value", "start_char_pos": 846, "end_char_pos": 846}], "sents_char_pos": [0, 152, 383, 660]}
+{"doc_id": "2003.05582", "revision_depth": "1", "before_revision": "Twenty years ago, Bobkov, Houdr\\'e, and the last author introduced a Poincar\\'e-type functional graph parameter, \\lambda_\\infty (G) , of a graph G , and related it to the {\\em vertex expansion} of G via a Cheeger-type inequality . This is analogous to the Cheeger-type inequality relating the spectral gap , \\lambda_2 (G), of the graph to its {\\em edge expansion}. While \\lambda_2 can be computed efficiently, the computational complexity of \\lambda_\\infty has remained an open question. Following the work of the second author with Raghavendra and Vempala, wherein the complexity of \\lambda_\\infty was related to the so-called Small-Set Expansion (SSE) problem, it has been believed that computing \\lambda_\\infty is a hard problem. We settle this question by proving that computing \\lambda_\\infty is indeed NP-hard . Additionally, we use our techniques to prove NP-hardness of computing the spread constant (of a graph) \\emph{ , a geometric measure introduced by Alon, Boppana, and Spencer, in the context of deriving an asymptotic isoperimetric inequality on cartesian products of graphs. We complement our hardness results by providing approximation schemes for computing \\lambda_\\infty and the spread constant of star graphs, and investigate constant approximability for weighted trees. Finally{\\em , we provide improved approximation results for the maximum variance embedding problem for general graphs, by replacing the optimal orthogonal projection (PCA) with a randomized projection approach .", "after_revision": " Bobkov, Houdr\\'e, and the last author introduced a Poincar\\'e-type functional parameter, \\lambda_\\infty , of a graph G . They related \\lambda_\\infty to the {\\em vertex expansion} of the graph via a Cheeger-type inequality , analogous to the inequality relating the spectral gap of the graph , \\lambda_2 , to its {\\em edge expansion}. While \\lambda_2 can be computed efficiently, the computational complexity of \\lambda_\\infty has remained an open question. Following the work of the second author with Raghavendra and Vempala, wherein the complexity of \\lambda_\\infty was related to the so-called small-set expansion (SSE) problem, it has been believed that computing \\lambda_\\infty is a hard problem. We confirm this conjecture by proving that computing \\lambda_\\infty is indeed NP-hard , even for weighted trees. Our gadget further proves NP-hardness of computing \\emph{spread constant of a weighted tree; i.e. , a geometric measure of the graph, introduced by Alon, Boppana, and Spencer, in the context of deriving an asymptotic isoperimetric inequality of Cartesian products of graphs. We conclude this case by providing a fully polynomial time approximation scheme. We further study a generalization of spread constant in machine learning literature, namely the{\\em maximum variance embedding problem. For trees , we provide fast combinatorial algorithms that avoid solving a semidefinite relaxation of the problem. On the other hand, for general graphs, we propose a randomized projection method that can outperform the optimal orthogonal projection , i.e., PCA, classically used for rounding of the optimum lifted solution (to SDP relaxation) of the problem .", "edit_actions": [{"type": "D", "before": "Twenty years ago,", "after": null, "start_char_pos": 0, "end_char_pos": 17}, {"type": "D", "before": "graph", "after": null, "start_char_pos": 96, "end_char_pos": 101}, {"type": "D", "before": "(G)", "after": null, "start_char_pos": 128, "end_char_pos": 131}, {"type": "R", "before": ", and related it", "after": ". They related \\lambda_\\infty", "start_char_pos": 147, "end_char_pos": 163}, {"type": "R", "before": "G", "after": "the graph", "start_char_pos": 197, "end_char_pos": 198}, {"type": "R", "before": ". This is", "after": ",", "start_char_pos": 229, "end_char_pos": 238}, {"type": "D", "before": "Cheeger-type", "after": null, "start_char_pos": 256, "end_char_pos": 268}, {"type": "A", "before": null, "after": "of the graph", "start_char_pos": 306, "end_char_pos": 306}, {"type": "R", "before": "(G), of the graph", "after": ",", "start_char_pos": 319, "end_char_pos": 336}, {"type": "R", "before": "Small-Set Expansion", "after": "small-set expansion", "start_char_pos": 629, "end_char_pos": 648}, {"type": "R", "before": "settle this question", "after": "confirm this conjecture", "start_char_pos": 737, "end_char_pos": 757}, {"type": "R", "before": ". Additionally, we use our techniques to prove", "after": ", even for weighted trees. Our gadget further proves", "start_char_pos": 817, "end_char_pos": 863}, {"type": "D", "before": "the spread constant (of a graph)", "after": null, "start_char_pos": 889, "end_char_pos": 921}, {"type": "A", "before": null, "after": "spread constant", "start_char_pos": 928, "end_char_pos": 928}, {"type": "A", "before": null, "after": "of a weighted tree; i.e.", "start_char_pos": 929, "end_char_pos": 929}, {"type": "A", "before": null, "after": "of the graph,", "start_char_pos": 952, "end_char_pos": 952}, {"type": "R", "before": "on cartesian", "after": "of Cartesian", "start_char_pos": 1061, "end_char_pos": 1073}, {"type": "R", "before": "complement our hardness results by providing approximation schemes for computing \\lambda_\\infty and the spread constant of star graphs, and investigate constant approximability for weighted trees. Finally", "after": "conclude this case by providing a fully polynomial time approximation scheme. We further study a generalization of spread constant in machine learning literature, namely the", "start_char_pos": 1097, "end_char_pos": 1301}, {"type": "A", "before": null, "after": "maximum variance embedding", "start_char_pos": 1306, "end_char_pos": 1306}, {"type": "A", "before": null, "after": "problem. For trees", "start_char_pos": 1307, "end_char_pos": 1307}, {"type": "R", "before": "improved approximation results for the maximum variance embedding problem", "after": "fast combinatorial algorithms that avoid solving a semidefinite relaxation of the problem. On the other hand,", "start_char_pos": 1321, "end_char_pos": 1394}, {"type": "R", "before": "by replacing", "after": "we propose a randomized projection method that can outperform", "start_char_pos": 1415, "end_char_pos": 1427}, {"type": "R", "before": "(PCA) with a randomized projection approach", "after": ", i.e., PCA, classically used for rounding of the optimum lifted solution (to SDP relaxation) of the problem", "start_char_pos": 1462, "end_char_pos": 1505}], "sents_char_pos": [0, 230, 365, 488, 733, 818, 1093, 1293]}
+{"doc_id": "2003.07434", "revision_depth": "1", "before_revision": "Coronaviruses are a famous family of viruses that causes illness in human or animals. The new type of corona virus COVID-19 disease was firstly discovered in Wuhan-China . However, recently, the virus has been widely spread in most of the world countries and is reported as a pandemic . Further, nowadays, all the world countries are striving to control the coronavirus disease COVID-19. There are many mechanisms to detect the coronavirus disease COVID-19 including clinical analysis of chest CT scan images and blood test results. The confirmed COVID-19 patient manifests as fever, tiredness, and dry cough. Particularly, several techniques can be used to detect the initial results of the virus such as medical detection Kits. However, such devices are incurring huge cost and it takes time to install them and use. Therefore, in this paper, a new framework is proposed to detect coronavirus disease COVID-19 using onboard smartphone sensors. The proposal provides a low-cost solution, since most of the radiologists have already held smartphones for different daily-purposes. People can use the framework on their smartphones for the virus detection purpose. Nowadays , smartphones are powerful with existing computation-rich processors, memory space, and large number of sensors including cameras, microphone, temperature sensor, inertial sensors, proximity, colour-sensor, humidity-sensor, and wireless chipsets/sensors. The designed Artificial Intelligence (AI) enabled framework reads the smartphone sensors signal measurements to predict the grade of severity of the pneumonia as well as predicting the result of the disease.", "after_revision": "Coronaviruses are a famous family of viruses that cause illness in both humans and animals. The new type of coronavirus COVID-19 was firstly discovered in Wuhan, China . However, recently, the virus has widely spread in most of the world and causing a pandemic according to the World Health Organization (WHO) . Further, nowadays, all the world countries are striving to control the COVID-19. There are many mechanisms to detect coronavirus including clinical analysis of chest CT scan images and blood test results. The confirmed COVID-19 patient manifests as fever, tiredness, and dry cough. Particularly, several techniques can be used to detect the initial results of the virus such as medical detection Kits. However, such devices are incurring huge cost , taking time to install them and use. Therefore, in this paper, a new framework is proposed to detect COVID-19 using built-in smartphone sensors. The proposal provides a low-cost solution, since most of radiologists have already held smartphones for different daily-purposes. Not only that but also ordinary people can use the framework on their smartphones for the virus detection purposes. Nowadays Smartphones are powerful with existing computation-rich processors, memory space, and large number of sensors including cameras, microphone, temperature sensor, inertial sensors, proximity, colour-sensor, humidity-sensor, and wireless chipsets/sensors. The designed Artificial Intelligence (AI) enabled framework reads the smartphone sensors signal measurements to predict the grade of severity of the pneumonia as well as predicting the result of the disease.", "edit_actions": [{"type": "R", "before": "causes illness in human or", "after": "cause illness in both humans and", "start_char_pos": 50, "end_char_pos": 76}, {"type": "R", "before": "corona virus", "after": "coronavirus", "start_char_pos": 102, "end_char_pos": 114}, {"type": "D", "before": "disease", "after": null, "start_char_pos": 124, "end_char_pos": 131}, {"type": "R", "before": "Wuhan-China", "after": "Wuhan, China", "start_char_pos": 158, "end_char_pos": 169}, {"type": "D", "before": "been", "after": null, "start_char_pos": 205, "end_char_pos": 209}, {"type": "R", "before": "countries and is reported as a pandemic", "after": "and causing a pandemic according to the World Health Organization (WHO)", "start_char_pos": 245, "end_char_pos": 284}, {"type": "D", "before": "coronavirus disease", "after": null, "start_char_pos": 358, "end_char_pos": 377}, {"type": "R", "before": "the coronavirus disease COVID-19", "after": "coronavirus", "start_char_pos": 424, "end_char_pos": 456}, {"type": "R", "before": "and it takes", "after": ", taking", "start_char_pos": 776, "end_char_pos": 788}, {"type": "D", "before": "coronavirus disease", "after": null, "start_char_pos": 883, "end_char_pos": 902}, {"type": "R", "before": "onboard", "after": "built-in", "start_char_pos": 918, "end_char_pos": 925}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1003, "end_char_pos": 1006}, {"type": "R", "before": "People", "after": "Not only that but also ordinary people", "start_char_pos": 1080, "end_char_pos": 1086}, {"type": "R", "before": "purpose. Nowadays , smartphones", "after": "purposes. Nowadays Smartphones", "start_char_pos": 1154, "end_char_pos": 1185}], "sents_char_pos": [0, 85, 171, 286, 387, 532, 609, 729, 818, 945, 1079, 1162, 1426]}
+{"doc_id": "2003.08868", "revision_depth": "2", "before_revision": "Here we focus on the data analysis of the growth of epidemic spreading of Covid-19 in countries where different policies of containment have been activated. It is known that the growth of the pandemic spreading at its threshold is exponential but it is not known how to quantify the success of different containment policies. We identify that a successful approach gives an arrested phase regime following the Ostwald growth, where in the course of time one phase transforms into another metastable phase with a similar free energy as observed in oxygen interstitials diffusion in quantum complex matter and in crystallization of proteins. We introduce the s factor which provides a quantitative measure of the efficiency and speed of the adopted containment policy, which is very helpful not only to monitor the Covid-19 pandemic spreading but also for other countries to choose the best containment policy. The results show that the policy based in joint confinement, targeted tests and tracking positive cases is the most rapid pandemic containment policy in fact we have found for China, South Korea, and Italy the values of the success s factor 9, 5, 32 respectively where the lowest s value indicates the best containment policy .", "after_revision": "Here , we focus on the data analysis of the growth of epidemic spread of Covid-19 in countries where different policies of containment were activated. It is known that the growth of pandemic spread at its threshold is exponential , but it is not known how to quantify the success of different containment policies. We identify that a successful approach gives an arrested phase regime following the Ostwald growth, where , over the course of time , one phase transforms into another metastable phase with a similar free energy as observed in oxygen interstitial diffusion in quantum complex matter and in crystallization of proteins. We introduce the s factor which provides a quantitative measure of the efficiency and speed of the adopted containment policy, which is very helpful not only to monitor the Covid-19 pandemic spread but also for other countries to choose the best containment policy. The results show that a policy based on joint confinement, targeted tests , and tracking positive cases is the most rapid pandemic containment policy ; in fact, we found values of 9, 5, and 31 for the success s factor for China, South Korea, and Italy, respectively, where the lowest s factor indicates the best containment policy ", "edit_actions": [{"type": "A", "before": null, "after": ",", "start_char_pos": 5, "end_char_pos": 5}, {"type": "R", "before": "spreading", "after": "spread", "start_char_pos": 62, "end_char_pos": 71}, {"type": "R", "before": "have been", "after": "were", "start_char_pos": 137, "end_char_pos": 146}, {"type": "R", "before": "the pandemic spreading", "after": "pandemic spread", "start_char_pos": 189, "end_char_pos": 211}, {"type": "A", "before": null, "after": ",", "start_char_pos": 244, "end_char_pos": 244}, {"type": "R", "before": "in", "after": ", over", "start_char_pos": 434, "end_char_pos": 436}, {"type": "A", "before": null, "after": ",", "start_char_pos": 456, "end_char_pos": 456}, {"type": "R", "before": "interstitials", "after": "interstitial", "start_char_pos": 557, "end_char_pos": 570}, {"type": "R", "before": "spreading", "after": "spread", "start_char_pos": 834, "end_char_pos": 843}, {"type": "R", "before": "the policy based in", "after": "a policy based on", "start_char_pos": 934, "end_char_pos": 953}, {"type": "A", "before": null, "after": ",", "start_char_pos": 988, "end_char_pos": 988}, {"type": "R", "before": "in fact we have found for China, South Korea, and Italy the values of the", "after": "; in fact, we found values of 9, 5, and 31 for the", "start_char_pos": 1063, "end_char_pos": 1136}, {"type": "R", "before": "9, 5, 32 respectively", "after": "for China, South Korea, and Italy, respectively,", "start_char_pos": 1154, "end_char_pos": 1175}, {"type": "R", "before": "value", "after": "factor", "start_char_pos": 1195, "end_char_pos": 1200}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1239, "end_char_pos": 1240}], "sents_char_pos": [0, 157, 327, 642, 911]}
+{"doc_id": "2003.10086", "revision_depth": "1", "before_revision": "We analyze the spread of COVID-19 by considering the transmission of the disease among individuals both within and between communities . A set of communities can be defined as any partition of a population such that travel/social contact within each community far exceeds that between them (e. g. the U.S. could be partitioned by state or commuting zone boundaries). COVID-19 can be eliminated if the community-to-community reproductive number---i.e. the expected/ average number of other communities to which a single infected community will transmit the virus---is reduced to less than one. We find that this community-to-community reproductive number is proportional to the travel rate between communities and exponential in the length of the time-delay before community-level action is taken . Thus, reductions in travel and the speed at which communities take action can play decisive roles in stopping the outbreak. The analysis suggests that for the coronavirus to be eliminated, it is not necessary to impose aggressive social distancing measures all over the world at once, but rather only in communities in which active spreading is detected. The sooner such measures are imposed, the shorter the duration they must remain in place. Ifinfected communities (including those that become re-infected in the future) are quick enough to act , the number of actively infected communities ( and thus the number of communities in which such measures are required ) will exponentially decrease over time .", "after_revision": "We analyze the spread of COVID-19 by considering the transmission of the disease among individuals both within and between regions . A set of regions can be defined as any partition of a population such that travel/social contact within each region far exceeds that between them . COVID-19 can be eliminated if the region-to-region reproductive number---i.e. the average number of other regions to which a single infected region will transmit the virus---is reduced to less than one. We find that this region-to-region reproductive number is proportional to the travel rate between regions and exponential in the length of the time-delay before region-level control measures are imposed . Thus, reductions in travel and the speed with which regions take action play decisive roles in whether COVID-19 is eliminated from a collection of regions. If, on average, infected regions (including those that become re-infected in the future) impose social distancing measures shortly after active spreading begins within them , the number of infected regions, and thus the number of regions in which such measures are required , will exponentially decrease over time . Elimination will in this case be a stable fixed point even after the social distancing measures have been lifted from most of the regions .", "edit_actions": [{"type": "R", "before": "communities", "after": "regions", "start_char_pos": 123, "end_char_pos": 134}, {"type": "R", "before": "communities", "after": "regions", "start_char_pos": 146, "end_char_pos": 157}, {"type": "R", "before": "community", "after": "region", "start_char_pos": 250, "end_char_pos": 259}, {"type": "R", "before": "(e. g. the U.S. could be partitioned by state or commuting zone boundaries).", "after": ".", "start_char_pos": 290, "end_char_pos": 366}, {"type": "R", "before": "community-to-community", "after": "region-to-region", "start_char_pos": 401, "end_char_pos": 423}, {"type": "D", "before": "expected/", "after": null, "start_char_pos": 455, "end_char_pos": 464}, {"type": "R", "before": "communities", "after": "regions", "start_char_pos": 489, "end_char_pos": 500}, {"type": "R", "before": "community", "after": "region", "start_char_pos": 528, "end_char_pos": 537}, {"type": "R", "before": "community-to-community", "after": "region-to-region", "start_char_pos": 611, "end_char_pos": 633}, {"type": "R", "before": "communities", "after": "regions", "start_char_pos": 697, "end_char_pos": 708}, {"type": "R", "before": "community-level action is taken", "after": "region-level control measures are imposed", "start_char_pos": 764, "end_char_pos": 795}, {"type": "R", "before": "at which communities take action can", "after": "with which regions take action", "start_char_pos": 839, "end_char_pos": 875}, {"type": "R", "before": "stopping the outbreak. The analysis suggests that for the coronavirus to be eliminated, it is not necessary to impose aggressive social distancing measures all over the world at once, but rather only in communities in which active spreading is detected. The sooner such measures are imposed, the shorter the duration they must remain in place. Ifinfected communities", "after": "whether COVID-19 is eliminated from a collection of regions. If, on average, infected regions", "start_char_pos": 899, "end_char_pos": 1265}, {"type": "R", "before": "are quick enough to act", "after": "impose social distancing measures shortly after active spreading begins within them", "start_char_pos": 1322, "end_char_pos": 1345}, {"type": "R", "before": "actively infected communities (", "after": "infected regions,", "start_char_pos": 1362, "end_char_pos": 1393}, {"type": "R", "before": "communities", "after": "regions", "start_char_pos": 1417, "end_char_pos": 1428}, {"type": "R", "before": ")", "after": ",", "start_char_pos": 1465, "end_char_pos": 1466}, {"type": "A", "before": null, "after": ". Elimination will in this case be a stable fixed point even after the social distancing measures have been lifted from most of the regions", "start_char_pos": 1505, "end_char_pos": 1505}], "sents_char_pos": [0, 136, 366, 592, 797, 921, 1152, 1242]}
+{"doc_id": "2003.10525", "revision_depth": "1", "before_revision": "Policy evaluation studies, which aim to assess the effect of an intervention, imply some statistical challenges: real-world scenarios provide treatments which have not been assigned randomly and the analysis might be further complicated by the presence of interference between units. Researchers have started to develop novel methods that allow to manage spillover mechanisms in observational studies , under binary treatments. But many policy evaluation studies require complex treatments, such as multi-valued treatments . For instance, in political sciences , evaluating the impact of policies implemented by administrative entities often implies a multi-valued approach, as the general political stance towards a specific issue varies over many dimensions. In this work, we extend the statistical framework about causal inference under network interference in observational studies, allowing for a multi-valued individual treatment and an interference structure shaped by a weighted network. Under multi-valued treatment, each unit is exposed to all levels of the treatment, due to the influence of his neighbors, according to the network weights. The estimation strategy is based on a joint multiple generalized propensity score and allows to estimate direct effects, controlling for both individual and network covariates. We follow the proposed methodology to analyze the impact of national immigration policy on crime rates . We define a multi-valued characterization of political attitudes towards migrants and we assume that the extent to which each country can be influenced by another is modeled by an appropriate indicator, that we call Interference Compound Index (ICI) . Results suggest that implementing highly restrictive immigration policies leads to an increase of crime rates and the magnitude of estimated effects is stronger if we take into account multi-valued interference .", "after_revision": "Policy evaluation studies, which intend to assess the effect of an intervention, face some statistical challenges: in real-world settings treatments are not randomly assigned and the analysis might be further complicated by the presence of interference between units. Researchers have started to develop novel methods that allow to manage spillover mechanisms in observational studies ; recent works focus primarily on binary treatments. However, many policy evaluation studies deal with more complex interventions . For instance, in political science , evaluating the impact of policies implemented by administrative entities often implies a multivariate approach, as a policy towards a specific issue operates at many different levels and can be defined along a number of dimensions. In this work, we extend the statistical framework about causal inference under network interference in observational studies, allowing for a multi-valued individual treatment and an interference structure shaped by a weighted network. The estimation strategy is based on a joint multiple generalized propensity score and allows one to estimate direct effects, controlling for both individual and network covariates. We follow the proposed methodology to analyze the impact of the national immigration policy on the crime rate . We define a multi-valued characterization of political attitudes towards migrants and we assume that the extent to which each country can be influenced by another country is modeled by an appropriate indicator, summarizing their cultural and geographical proximity . Results suggest that implementing a highly restrictive immigration policy leads to an increase of the crime rate and the estimated effects is larger if we take into account interference from other countries .", "edit_actions": [{"type": "R", "before": "aim", "after": "intend", "start_char_pos": 33, "end_char_pos": 36}, {"type": "R", "before": "imply", "after": "face", "start_char_pos": 78, "end_char_pos": 83}, {"type": "A", "before": null, "after": "in", "start_char_pos": 113, "end_char_pos": 113}, {"type": "R", "before": "scenarios provide treatments which have not been assigned randomly", "after": "settings treatments are not randomly assigned", "start_char_pos": 125, "end_char_pos": 191}, {"type": "R", "before": ", under", "after": "; recent works focus primarily on", "start_char_pos": 402, "end_char_pos": 409}, {"type": "R", "before": "But", "after": "However,", "start_char_pos": 429, "end_char_pos": 432}, {"type": "R", "before": "require complex treatments, such as multi-valued treatments", "after": "deal with more complex interventions", "start_char_pos": 464, "end_char_pos": 523}, {"type": "R", "before": "sciences", "after": "science", "start_char_pos": 553, "end_char_pos": 561}, {"type": "R", "before": "multi-valued", "after": "multivariate", "start_char_pos": 653, "end_char_pos": 665}, {"type": "R", "before": "the general political stance", "after": "a policy", "start_char_pos": 679, "end_char_pos": 707}, {"type": "R", "before": "varies over many", "after": "operates at many different levels and can be defined along a number of", "start_char_pos": 733, "end_char_pos": 749}, {"type": "D", "before": "Under multi-valued treatment, each unit is exposed to all levels of the treatment, due to the influence of his neighbors, according to the network weights.", "after": null, "start_char_pos": 997, "end_char_pos": 1152}, {"type": "A", "before": null, "after": "one", "start_char_pos": 1246, "end_char_pos": 1246}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1391, "end_char_pos": 1391}, {"type": "R", "before": "crime rates", "after": "the crime rate", "start_char_pos": 1423, "end_char_pos": 1434}, {"type": "A", "before": null, "after": "country", "start_char_pos": 1600, "end_char_pos": 1600}, {"type": "R", "before": "that we call Interference Compound Index (ICI)", "after": "summarizing their cultural and geographical proximity", "start_char_pos": 1641, "end_char_pos": 1687}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1724, "end_char_pos": 1724}, {"type": "R", "before": "policies", "after": "policy", "start_char_pos": 1756, "end_char_pos": 1764}, {"type": "R", "before": "crime rates and the magnitude of", "after": "the crime rate and the", "start_char_pos": 1789, "end_char_pos": 1821}, {"type": "R", "before": "stronger", "after": "larger", "start_char_pos": 1843, "end_char_pos": 1851}, {"type": "R", "before": "multi-valued interference", "after": "interference from other countries", "start_char_pos": 1876, "end_char_pos": 1901}], "sents_char_pos": [0, 284, 428, 525, 761, 996, 1152, 1330, 1436]}
+{"doc_id": "2003.11021", "revision_depth": "2", "before_revision": "The global spread of 2019-nCoV, a new virus belonging to the coronavirus family, forced national and local governments to apply different sets of measures aimed at containing its outbreak. Los Angeles has been one of the first cities in the United States to declare the state of emergency on March 4th, progressively issuing stronger policies involving--among the others--social distancing, the prohibition of crowded private and public gatherings and closure of leisure premises. These interventions highly disrupt and modify daily activities and habits, urban mobility and micro-level interactions between citizens. One of the many social phenomena that could be influenced by such measures is crime. Exploiting public data on crime in Los Angeles, and relying on routine activity and pattern theories of crime, this work investigates whether and how new coronavirus containment policies have an impact on crime trends in a metropolis using Bayesian structural time-series (BSTS) models. The article specifically focuses on nine urban crime categories , daily monitored from January 1st 2017 to March 28th 2020. The analyses have been updated bi-weekly (up to March 16 and up to March 28 2020 ) to dynamically assess the short-term effects of mild and hard interventions to shed light on how crime adapts to such structural modification of the environment. The results show that overall crime in Las Angeles is significantly decreasing , as well as robbery, shoplifting, theft and battery. No significant effect has been found for stolen vehicle , burglary, assault with deadly weapon, intimate partner violence and homicide. In the last section of this article, policy implications are also discussed.", "after_revision": "This work investigates whether and how COVID-19 containment policies had an immediate impact on crime trends in Los Angeles. The analysis is conducted using Bayesian structural time-series and focuses on nine crime categories and on the overall crime count , daily monitored from January 1st 2017 to March 28th 2020. We concentrate on two post-intervention time windows - from March 4th to March 16th and from March 4th to March 28th 2020 - to dynamically assess the short-term effects of mild and strict policies. In Los Angeles, overall crime has significantly decreased , as well as robbery, shoplifting, theft , and battery. No significant effect has been detected for vehicle theft , burglary, assault with a deadly weapon, intimate partner assault, and homicide. Results suggest that, in the first weeks after the interventions are put in place, social distancing impacts more directly on instrumental and less serious crimes. Policy implications are also discussed.", "edit_actions": [{"type": "R", "before": "The global spread of 2019-nCoV, a new virus belonging to the coronavirus family, forced national and local governments to apply different sets of measures aimed at containing its outbreak. Los Angeles has been one of the first cities in the United States to declare the state of emergency on March 4th, progressively issuing stronger policies involving--among the others--social distancing, the prohibition of crowded private and public gatherings and closure of leisure premises. These interventions highly disrupt and modify daily activities and habits, urban mobility and micro-level interactions between citizens. One of the many social phenomena that could be influenced by such measures is crime. Exploiting public data on crime in Los Angeles, and relying on routine activity and pattern theories of crime, this", "after": "This", "start_char_pos": 0, "end_char_pos": 818}, {"type": "R", "before": "new coronavirus containment policies have an", "after": "COVID-19 containment policies had an immediate", "start_char_pos": 853, "end_char_pos": 897}, {"type": "R", "before": "a metropolis", "after": "Los Angeles. The analysis is conducted", "start_char_pos": 924, "end_char_pos": 936}, {"type": "R", "before": "(BSTS) models. The article specifically", "after": "and", "start_char_pos": 975, "end_char_pos": 1014}, {"type": "R", "before": "urban crime categories", "after": "crime categories and on the overall crime count", "start_char_pos": 1031, "end_char_pos": 1053}, {"type": "D", "before": "The analyses have been updated bi-weekly (up to March 16", "after": null, "start_char_pos": 1114, "end_char_pos": 1170}, {"type": "R", "before": "and up to March 28", "after": "We concentrate on two post-intervention time windows - from March 4th to March 16th and from March 4th to March 28th", "start_char_pos": 1171, "end_char_pos": 1189}, {"type": "R", "before": ")", "after": "-", "start_char_pos": 1195, "end_char_pos": 1196}, {"type": "R", "before": "hard interventions to shed light on how crime adapts to such structural modification of the environment. The results show that overall crime in Las Angeles is significantly decreasing", "after": "strict policies. In Los Angeles, overall crime has significantly decreased", "start_char_pos": 1254, "end_char_pos": 1437}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1479, "end_char_pos": 1479}, {"type": "R", "before": "found for stolen vehicle", "after": "detected for vehicle theft", "start_char_pos": 1524, "end_char_pos": 1548}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1574, "end_char_pos": 1574}, {"type": "R", "before": "violence", "after": "assault,", "start_char_pos": 1607, "end_char_pos": 1615}, {"type": "R", "before": "In the last section of this article, policy", "after": "Results suggest that, in the first weeks after the interventions are put in place, social distancing impacts more directly on instrumental and less serious crimes. Policy", "start_char_pos": 1630, "end_char_pos": 1673}], "sents_char_pos": [0, 188, 480, 617, 702, 989, 1113, 1358, 1492, 1629]}
+{"doc_id": "2003.11238", "revision_depth": "1", "before_revision": "We propose and analyze zeroth-order algorithms for optimization over Riemannian manifolds, where we observe only potentially noisy evaluations of the objective function. Our approach is based on estimating the Riemannian gradient from the objective function evaluations . We consider three settings for the objective function: (i) deterministic and smooth , (ii) stochastic and smooth , and (iii) composition of smooth and non-smooth parts. For each of the setting , we characterize the oracle complexity of our algorithm to obtain appropriately defined notions of \\epsilon-stationary points . Notably, our complexities are independent of the ambient dimension of the Euclidean space in which the manifold is embedded in, and only depend on the intrinsic dimension of the manifold . As a proof of concept, we demonstrate the applicability of our method to the problem of black-box attacks to deep neural networks, by providing simulation and real-world image data based experimental results.", "after_revision": "Stochastic zeroth-order optimization concerns problems where only noisy function evaluations are available. Such problems arises frequently in many important applications. In this paper, we consider stochastic zeroth-order optimization over Riemannian submanifolds embedded in an Euclidean space, an important but less studied area, and propose four algorithms for solving this class of problems under different settings. Our algorithms are based on estimating the Riemannian gradient and Hessian from noisy objective function evaluations , based on a Riemannian version of the Gaussian smoothing technique. In particular, we consider the following settings for the objective function: (i) stochastic and gradient-Lipschitz (in both nonconvex and geodesic convex settings) , (ii) sum of gradient-Lipschitz and non-smooth functions , and (iii) Hessian-Lipschitz. For these settings , we characterize the oracle complexity of our algorithms to obtain appropriately defined notions of \\epsilon-stationary point or \\epsilon-approximate local minimizer . Notably, our complexities are independent of the dimension of the ambient Euclidean space and depend only on the intrinsic dimension of the manifold under consideration. We demonstrate the applicability of our algorithms by simulation results.", "edit_actions": [{"type": "R", "before": "We propose and analyze", "after": "Stochastic", "start_char_pos": 0, "end_char_pos": 22}, {"type": "R", "before": "algorithms for optimization over Riemannian manifolds, where we observe only potentially noisy evaluations of the objective function. Our approach is", "after": "optimization concerns problems where only noisy function evaluations are available. Such problems arises frequently in many important applications. In this paper, we consider stochastic zeroth-order optimization over Riemannian submanifolds embedded in an Euclidean space, an important but less studied area, and propose four algorithms for solving this class of problems under different settings. Our algorithms are", "start_char_pos": 36, "end_char_pos": 185}, {"type": "R", "before": "from the", "after": "and Hessian from noisy", "start_char_pos": 230, "end_char_pos": 238}, {"type": "R", "before": ". We consider three", "after": ", based on a Riemannian version of the Gaussian smoothing technique. In particular, we consider the following", "start_char_pos": 270, "end_char_pos": 289}, {"type": "R", "before": "deterministic and smooth", "after": "stochastic and gradient-Lipschitz (in both nonconvex and geodesic convex settings)", "start_char_pos": 331, "end_char_pos": 355}, {"type": "R", "before": "stochastic and smooth", "after": "sum of gradient-Lipschitz and non-smooth functions", "start_char_pos": 363, "end_char_pos": 384}, {"type": "R", "before": "composition of smooth and non-smooth parts. For each of the setting", "after": "Hessian-Lipschitz. For these settings", "start_char_pos": 397, "end_char_pos": 464}, {"type": "R", "before": "algorithm", "after": "algorithms", "start_char_pos": 512, "end_char_pos": 521}, {"type": "R", "before": "points", "after": "point or \\epsilon-approximate local minimizer", "start_char_pos": 585, "end_char_pos": 591}, {"type": "D", "before": "ambient", "after": null, "start_char_pos": 643, "end_char_pos": 650}, {"type": "R", "before": "Euclidean space in which the manifold is embedded in, and only depend", "after": "ambient Euclidean space and depend only", "start_char_pos": 668, "end_char_pos": 737}, {"type": "R", "before": ". As a proof of concept, we", "after": "under consideration. We", "start_char_pos": 781, "end_char_pos": 808}, {"type": "R", "before": "method to the problem of black-box attacks to deep neural networks, by providing simulation and real-world image data based experimental", "after": "algorithms by simulation", "start_char_pos": 846, "end_char_pos": 982}], "sents_char_pos": [0, 169, 271, 440, 782]}
+{"doc_id": "2003.12432", "revision_depth": "2", "before_revision": "While the coronavirus spreads around the world , governments are attempting to reduce contagion rates at the expense of negative economic effects. Market expectations have plummeted, foreshadowing the risk of a global economic crisis and mass unemployment. Governments provide huge financial aid programmes to mitigate the expected economic shocks. To achieve higher effectiveness with cyclical and fiscal policy measures, it is key to identify the industries that are most in need of support. In this study, we introduce a data-mining approach to measure the industry-specific risks related to COVID-19. We examine company risk reports filed to the U.S. Securities and Exchange Commission (SEC). This data set allows for a real-time analysis of risk assessments. Preliminary findings suggest that the companies' awareness towards corona-related business risks is ahead of the overall stock market developments by weeks. The risk reports differ substantially between industries , both in magnitude and in nature . Based on natural language processing techniques, we can identify corona-related risk topics and their perceived relevance for different industries. Our approach allows to distinguish the industries by their reported risk awareness towards COVID-19. The preliminary findings are summarised an online index. The CoRisk-Index tracks the industry-specific risk assessments related to the crisis, as it spreads through the economy. The tracking tool could provide relevant empirical data to inform models on the immediate economic effects of the crisis. Such complementary empirical information could help policy-makers to effectively target financial support and to mitigate the economic shocks of the current crisis.", "after_revision": "While the coronavirus spreads , governments are attempting to reduce contagion rates at the expense of negative economic effects. Market expectations plummeted, foreshadowing the risk of a global economic crisis and mass unemployment. Governments provide huge financial aid programmes to mitigate the economic shocks. To achieve higher effectiveness with such policy measures, it is key to identify the industries that are most in need of support. In this study, we introduce a data-mining approach to measure industry-specific risks related to COVID-19. We examine company risk reports filed to the U.S. Securities and Exchange Commission (SEC). This alternative data set can complement more traditional economic indicators in times of the fast-evolving crisis as it allows for a real-time analysis of risk assessments. Preliminary findings suggest that the companies' awareness towards corona-related business risks is ahead of the overall stock market developments . Our approach allows to distinguish the industries by their risk awareness towards COVID-19. Based on natural language processing , we identify corona-related risk topics and their perceived relevance for different industries. The preliminary findings are summarised as an up-to-date online index. The CoRisk-Index tracks the industry-specific risk assessments related to the crisis, as it spreads through the economy. The tracking tool is updated weekly. It could provide relevant empirical data to inform models on the economic effects of the crisis. Such complementary empirical information could ultimately help policymakers to effectively target financial support in order to mitigate the economic shocks of the crisis.", "edit_actions": [{"type": "D", "before": "around the world", "after": null, "start_char_pos": 30, "end_char_pos": 46}, {"type": "D", "before": "have", "after": null, "start_char_pos": 167, "end_char_pos": 171}, {"type": "D", "before": "expected", "after": null, "start_char_pos": 323, "end_char_pos": 331}, {"type": "R", "before": "cyclical and fiscal", "after": "such", "start_char_pos": 386, "end_char_pos": 405}, {"type": "D", "before": "the", "after": null, "start_char_pos": 556, "end_char_pos": 559}, {"type": "R", "before": "data set", "after": "alternative data set can complement more traditional economic indicators in times of the fast-evolving crisis as it", "start_char_pos": 702, "end_char_pos": 710}, {"type": "D", "before": "by weeks. The risk reports differ substantially between industries , both in magnitude and in nature", "after": null, "start_char_pos": 911, "end_char_pos": 1011}, {"type": "A", "before": null, "after": "Our approach allows to distinguish the industries by their risk awareness towards COVID-19.", "start_char_pos": 1014, "end_char_pos": 1014}, {"type": "R", "before": "techniques, we can", "after": ", we", "start_char_pos": 1052, "end_char_pos": 1070}, {"type": "D", "before": "Our approach allows to distinguish the industries by their reported risk awareness towards COVID-19.", "after": null, "start_char_pos": 1163, "end_char_pos": 1263}, {"type": "R", "before": "an", "after": "as an up-to-date", "start_char_pos": 1304, "end_char_pos": 1306}, {"type": "A", "before": null, "after": "is updated weekly. It", "start_char_pos": 1460, "end_char_pos": 1460}, {"type": "D", "before": "immediate", "after": null, "start_char_pos": 1523, "end_char_pos": 1532}, {"type": "R", "before": "help policy-makers", "after": "ultimately help policymakers", "start_char_pos": 1612, "end_char_pos": 1630}, {"type": "R", "before": "and", "after": "in order", "start_char_pos": 1671, "end_char_pos": 1674}, {"type": "D", "before": "current", "after": null, "start_char_pos": 1714, "end_char_pos": 1721}], "sents_char_pos": [0, 146, 256, 348, 493, 604, 696, 763, 920, 1162, 1263, 1320, 1441, 1564]}
+{"doc_id": "2003.13041", "revision_depth": "2", "before_revision": "L\\'evy walks are random walks processes whose step length follows a long-tailed power law distribution. Due to their abundance as movement patterns of URLanisms, significant theoretical efforts have been devoted to identify the foraging circumstances that would make such patterns advantageous Viswanathan et al. Nature, 1999 . Despite numerous attempts , there is currently no conclusive analytical evidence that L\\'evy flights are preferable strategies in higher dimensions than one. Here we show that the optimality of inverse-square L\\'evy walks in two-dimensions becomes striking when targets are sparse and unpredictable in size, and when detection is weak. Specifically, we prove that under the intermittent model, in which detection is not possible while moving ballistically B\\'enichou et al. Reviews of Modern Physics, 2011%DIFDELCMD < ]%%% , this strategy optimally finds sparse targets of any size and shape. That is, in a square torus of area~n, and assuming that the detection radius is normalized to 1, the strategy finds any connected set of diameter D in%DIFDELCMD < \\tilde{O}%%% (n/D) expected time, whereas \\Omega(n/D) is an unconditional lower bound on the expected time, that holds even when assuming that the shape and size of the target are known. Furthermore, this particular L\\'evy process stands in stark contrast to many other basic intermittent processes, including all other L\\'evy walks, whose competitive ratio is shown to be polynomial in n, for wide ranges of target scales . Our results thus provide strong theoretical support for the optimality and robustness of intermittent\\emph{ L\\'evy walks under general conditions .", "after_revision": "L\\'evy walks are random walk processes whose step-lengths follow a long-tailed power-law distribution. Due to their abundance as movement patterns of URLanisms, significant theoretical efforts have been devoted to identifying the foraging circumstances that would make such patterns advantageous . However, despite extensive research , there is currently no mathematical proof indicating that L\\'evy walks are, in any manner, preferable strategies in higher dimensions than one. Here we prove that in finite two-dimensional terrains, the inverse-square L\\'evy %DIFDELCMD < ]%%% walk strategy is extremely efficient at finding sparse targets of arbitrary size and shape. %DIFDELCMD < \\tilde{O}%%% Moreover, this holds even under the weak model of intermittent detection. Conversely, any other intermittent L\\'evy walk fails to efficiently find either large targets or small ones . Our results shed new light on the\\emph{L\\'evy foraging hypothesis , and are thus expected to impact future experiments on animals performing L\\'evy walks .", "edit_actions": [{"type": "R", "before": "walks processes whose step length follows", "after": "walk processes whose step-lengths follow", "start_char_pos": 24, "end_char_pos": 65}, {"type": "R", "before": "power law", "after": "power-law", "start_char_pos": 80, "end_char_pos": 89}, {"type": "R", "before": "identify", "after": "identifying", "start_char_pos": 215, "end_char_pos": 223}, {"type": "D", "before": "Viswanathan et al. Nature, 1999", "after": null, "start_char_pos": 294, "end_char_pos": 325}, {"type": "R", "before": ". Despite numerous attempts", "after": ". However, despite extensive research", "start_char_pos": 326, "end_char_pos": 353}, {"type": "R", "before": "conclusive analytical evidence", "after": "mathematical proof indicating", "start_char_pos": 378, "end_char_pos": 408}, {"type": "R", "before": "flights are", "after": "walks are, in any manner,", "start_char_pos": 421, "end_char_pos": 432}, {"type": "R", "before": "show that the optimality of", "after": "prove that in finite two-dimensional terrains, the", "start_char_pos": 494, "end_char_pos": 521}, {"type": "D", "before": "walks in two-dimensions becomes striking when targets are sparse and unpredictable in size, and when detection is weak. Specifically, we prove that under the intermittent model, in which detection is not possible while moving ballistically", "after": null, "start_char_pos": 544, "end_char_pos": 783}, {"type": "D", "before": "B\\'enichou et al. Reviews of Modern Physics, 2011", "after": null, "start_char_pos": 784, "end_char_pos": 833}, {"type": "R", "before": ", this strategy optimally finds", "after": "walk strategy is extremely efficient at finding", "start_char_pos": 851, "end_char_pos": 882}, {"type": "R", "before": "any", "after": "arbitrary", "start_char_pos": 901, "end_char_pos": 904}, {"type": "D", "before": "That is, in a square torus of area~n, and assuming that the detection radius is normalized to 1, the strategy finds any connected set of diameter D in", "after": null, "start_char_pos": 921, "end_char_pos": 1071}, {"type": "R", "before": "(n/D) expected time, whereas \\Omega(n/D) is an unconditional lower bound on the expected time, that holds even when assuming that the shape and size of the target are known. Furthermore, this particular", "after": "Moreover, this holds even under the weak model of intermittent detection. Conversely, any other intermittent", "start_char_pos": 1097, "end_char_pos": 1299}, {"type": "R", "before": "process stands in stark contrast to many other basic intermittent processes, including all other L\\'evy walks, whose competitive ratio is shown to be polynomial in n, for wide ranges of target scales", "after": "walk fails to efficiently find either large targets or small ones", "start_char_pos": 1307, "end_char_pos": 1506}, {"type": "R", "before": "thus provide strong theoretical support for the optimality and robustness of intermittent", "after": "shed new light on the", "start_char_pos": 1521, "end_char_pos": 1610}, {"type": "A", "before": null, "after": "L\\'evy foraging hypothesis", "start_char_pos": 1616, "end_char_pos": 1616}, {"type": "A", "before": null, "after": ", and are thus expected to impact future experiments on animals performing", "start_char_pos": 1617, "end_char_pos": 1617}, {"type": "D", "before": "under general conditions", "after": null, "start_char_pos": 1631, "end_char_pos": 1655}], "sents_char_pos": [0, 103, 312, 485, 663, 801, 920, 1270, 1508]}
+{"doc_id": "2003.14091", "revision_depth": "1", "before_revision": "An innovative approach which can promote cognitive functions effectively and efficiently is an urgent need for healthy elderly and patients with cognitive impairment . In this study, we proposed a novel functional near-infrared spectroscopy (fNIRS)-based frontoparietal functional connectivity (FC) neurofeedback training paradigm related to working memory . Compared with conventional cognitive training studies, we chose the frontoparietal network, a key brain region for cognitive function modulation as neurofeedback, resulting in strong targeting effect. In the experiment, ten participants received three 20 min cognitive training sessions with fNIRS-based frontoparietal FC as neurofeedback, and the other ten participants served as the normal control (NC) group. Frontoparietal FC was significantly increased in the tested group (p = 0.005) and the cognitive functions (memory and attention) were significantly promoted compared to the NC group . Follow-up evaluations indicated that the training effect can last for over half a month. The proposed method shows great potential to be developed as a fast, effective and widespread training approach for cognitive functions enhancementand rehabilitation applications .", "after_revision": "Neurofeedback cognitive training is a promising tool used to promote cognitive functions effectively and efficiently . In this study, we investigated a novel functional near-infrared spectroscopy (fNIRS)-based frontoparietal functional connectivity (FC) neurofeedback training paradigm related to working memory , involving healthy adults . Compared with conventional cognitive training studies, we chose the frontoparietal network, a key brain region for cognitive function modulation , as neurofeedback, yielding a strong targeting effect. In the experiment, 10 participants (test group) received three cognitive training sessions of 15 min using fNIRS-based frontoparietal FC as neurofeedback, and another 10 participants served as the control group. Frontoparietal FC was significantly increased in the test group (p D 0.03), and the cognitive functions (memory and attention) were significantly promoted compared with the control group (accuracy of 3-back test: p D 0.0005, reaction time of 3-back test: p D 0.0009). After additional validations on long-term training effect and on different patient populations, the proposed method exhibited considerable potential to be developed as a fast, effective , and widespread training approach for cognitive function enhancement .", "edit_actions": [{"type": "R", "before": "An innovative approach which can", "after": "Neurofeedback cognitive training is a promising tool used to", "start_char_pos": 0, "end_char_pos": 32}, {"type": "D", "before": "is an urgent need for healthy elderly and patients with cognitive impairment", "after": null, "start_char_pos": 89, "end_char_pos": 165}, {"type": "R", "before": "proposed", "after": "investigated", "start_char_pos": 186, "end_char_pos": 194}, {"type": "A", "before": null, "after": ", involving healthy adults", "start_char_pos": 357, "end_char_pos": 357}, {"type": "A", "before": null, "after": ",", "start_char_pos": 505, "end_char_pos": 505}, {"type": "R", "before": "resulting in", "after": "yielding a", "start_char_pos": 524, "end_char_pos": 536}, {"type": "R", "before": "ten participants received three 20 min", "after": "10 participants (test group) received three", "start_char_pos": 581, "end_char_pos": 619}, {"type": "R", "before": "with", "after": "of 15 min using", "start_char_pos": 648, "end_char_pos": 652}, {"type": "R", "before": "the other ten", "after": "another 10", "start_char_pos": 705, "end_char_pos": 718}, {"type": "R", "before": "normal control (NC)", "after": "control", "start_char_pos": 746, "end_char_pos": 765}, {"type": "R", "before": "tested", "after": "test", "start_char_pos": 826, "end_char_pos": 832}, {"type": "R", "before": "= 0.005)", "after": "D 0.03),", "start_char_pos": 842, "end_char_pos": 850}, {"type": "R", "before": "to the NC group . Follow-up evaluations indicated that the training effect can last for over half a month. The proposed method shows great", "after": "with the control group (accuracy of 3-back test: p D 0.0005, reaction time of 3-back test: p D 0.0009). After additional validations on long-term training effect and on different patient populations, the proposed method exhibited considerable", "start_char_pos": 939, "end_char_pos": 1077}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1125, "end_char_pos": 1125}, {"type": "R", "before": "functions enhancementand rehabilitation applications", "after": "function enhancement", "start_char_pos": 1173, "end_char_pos": 1225}], "sents_char_pos": [0, 167, 561, 772, 956, 1045]}
+{"doc_id": "2004.00908", "revision_depth": "1", "before_revision": "Emerging infectious diseases are crucial threats to human health and global stability. The recent outbreak of the novel coronavirus COVID-19 has rapidly formed a global pandemic, causing hundreds of thousands of infections and huge economic loss. The WHO declares that more precise measures to track, detect and isolate infected people are among the most effective means to quickly contain the outbreak. Based on trajectory big data and the theory of mean-field , we establish an aggregated risk mean = field that contains information of all risk-spreading particles by proposing a spatio-temporal model named HiRES risk map. It has dynamic fine spatial resolution and high computation efficiency enabling fast update. We then propose an objective personal epidemic risk scoring model named HiRES-p based on HiRES risk maps, and use it to develop statistical inference based method and machine learning based method for detecting suspected epidemic-infected individuals. We conduct numerical experiments by applying the proposed methods to study the early outbreak of COVID-19 in China. Results show that the HiRES risk map has strong ability in capturing global trend and local variability of the epidemic risk, thus can be applied to monitor epidemic risk at country, province, city and community levels, as well as at specific high-risk locations such as at hospital and station. HiRES-p score is an effective measurement of personal epidemic risk. The detection rates as de ned by successful classification are above 90 \\% as long as the population infection rate is under 20\\%, which indicates great application potential in epidemic risk prevention and control practice.%DIFDELCMD < \\end{abstract} %DIFDELCMD < %%% \\\\%DIF > when the population infection rate is under 20\\\\%, which indicates great application potential in epidemic risk prevention and control practice.", "after_revision": "Emerging infectious diseases are existential threats to human health and global stability. The recent outbreaks of the novel coronavirus COVID-19 have rapidly formed a global pandemic, causing hundreds of thousands of infections and huge economic loss. The WHO declares that more precise measures to track, detect and isolate infected people are among the most effective means to quickly contain the outbreak. Based on trajectory provided by the big data and the mean field theory , we establish an aggregated risk mean field that contains information of all risk-spreading particles by proposing a spatio-temporal model named HiRES risk map. It has dynamic fine spatial resolution and high computation efficiency enabling fast update. We then propose an objective individual epidemic risk scoring model named HiRES-p based on HiRES risk maps, and use it to develop statistical inference and machine learning methods for detecting suspected epidemic-infected individuals. We conduct numerical experiments by applying the proposed methods to study the early outbreak of COVID-19 in China. Results show that the HiRES risk map has strong ability in capturing global trend and local variability of the epidemic risk, thus can be applied to monitor epidemic risk at country, province, city and community levels, as well as at specific high-risk locations such as hospital and station. HiRES-p score seems to be an effective measurement of personal epidemic risk. The accuracy of both detecting methods are above 90 %DIFDELCMD < \\end{abstract} %DIFDELCMD < %%% \\\\%DIF > when the population infection rate is under 20\\\\%, which indicates great application potential in epidemic risk prevention and control practice.", "edit_actions": [{"type": "R", "before": "crucial", "after": "existential", "start_char_pos": 33, "end_char_pos": 40}, {"type": "R", "before": "outbreak", "after": "outbreaks", "start_char_pos": 98, "end_char_pos": 106}, {"type": "R", "before": "has", "after": "have", "start_char_pos": 141, "end_char_pos": 144}, {"type": "A", "before": null, "after": "provided by the", "start_char_pos": 424, "end_char_pos": 424}, {"type": "R", "before": "theory of mean-field", "after": "mean field theory", "start_char_pos": 442, "end_char_pos": 462}, {"type": "D", "before": "=", "after": null, "start_char_pos": 502, "end_char_pos": 503}, {"type": "R", "before": "personal", "after": "individual", "start_char_pos": 749, "end_char_pos": 757}, {"type": "D", "before": "based method", "after": null, "start_char_pos": 870, "end_char_pos": 882}, {"type": "R", "before": "based method", "after": "methods", "start_char_pos": 904, "end_char_pos": 916}, {"type": "D", "before": "at", "after": null, "start_char_pos": 1359, "end_char_pos": 1361}, {"type": "R", "before": "is", "after": "seems to be", "start_char_pos": 1398, "end_char_pos": 1400}, {"type": "R", "before": "detection rates as de ned by successful classification", "after": "accuracy of both detecting methods", "start_char_pos": 1457, "end_char_pos": 1511}, {"type": "D", "before": "\\% as long as the population infection rate is under 20\\%, which indicates great application potential in epidemic risk prevention and control practice.", "after": null, "start_char_pos": 1525, "end_char_pos": 1677}], "sents_char_pos": [0, 86, 246, 403, 626, 719, 971, 1087, 1383, 1452, 1677]}
+{"doc_id": "2004.02340", "revision_depth": "1", "before_revision": "Recent reports from industry show that social recommender systems consistently fail in practice. According to the negative findings, the failure is attributed to: (1) a majority of users only have a very limited number of neighbors in social networks and can hardly benefit from relations; (2) social relations are noisy but they are often indiscriminately used; (3) social relations are assumed to be universally applicable to multiple scenarios while they are actually multi-faceted and show heterogeneous strengths in different scenarios. Most existing social recommendation models only consider the homophily in social networks and neglect these drawbacks. In this paper we propose a deep adversarial framework based on graph convolutional networks (GCN) to address these problems. Concretely, for the relation sparsity and noises problems , a GCN-based autoencoder is developed to augment the relation data by encoding high-order and complex connectivity patterns, and meanwhile is optimized subject to the constraint of reconstructing the original social profile to guarantee the validity of new identified neighborhood. After obtaining enough purified social relations for each user, a GCN-based attentive social recommendation module is designed to capture the heterogeneous strengths of social relations. These designs deal with the three problems faced by social recommender systems respectively. Finally, we adopt adversarial training to unify and intensify all components by playing a minimax game and ensure a coordinated effort to enhance social recommendation . Experimental results on multiple open datasets demonstrate the superiority of our framework and the ablation study confirms the importance and effectiveness of each component.", "after_revision": "Social recommender systems are expected to improve recommendation quality by incorporating social information when there is little user-item interaction data. However, recent reports from industry show that social recommender systems consistently fail in practice. According to the negative findings, the failure is attributed to: (1) A majority of users only have a very limited number of neighbors in social networks and can hardly benefit from social relations; (2) Social relations are noisy but they are indiscriminately used; (3) Social relations are assumed to be universally applicable to multiple scenarios while they are actually multi-faceted and show heterogeneous strengths in different scenarios. Most existing social recommendation models only consider the homophily in social networks and neglect these drawbacks. In this paper we propose a deep adversarial framework based on graph convolutional networks (GCN) to address these problems. Concretely, for (1) and (2) , a GCN-based autoencoder is developed to augment the relation data by encoding high-order and complex connectivity patterns, and meanwhile is optimized subject to the constraint of reconstructing the social profile to guarantee the validity of the identified neighborhood. After obtaining enough purified social relations for each user, a GCN-based attentive social recommendation module is designed to address (3) by capturing the heterogeneous strengths of social relations. Finally, we adopt adversarial training to unify all the components by playing a Minimax game and ensure a coordinated effort to enhance recommendation performance. Extensive experiments on multiple open datasets demonstrate the superiority of our framework and the ablation study confirms the importance and effectiveness of each component.", "edit_actions": [{"type": "R", "before": "Recent", "after": "Social recommender systems are expected to improve recommendation quality by incorporating social information when there is little user-item interaction data. However, recent", "start_char_pos": 0, "end_char_pos": 6}, {"type": "R", "before": "a", "after": "A", "start_char_pos": 167, "end_char_pos": 168}, {"type": "A", "before": null, "after": "social", "start_char_pos": 279, "end_char_pos": 279}, {"type": "R", "before": "social", "after": "Social", "start_char_pos": 295, "end_char_pos": 301}, {"type": "D", "before": "often", "after": null, "start_char_pos": 335, "end_char_pos": 340}, {"type": "R", "before": "social", "after": "Social", "start_char_pos": 368, "end_char_pos": 374}, {"type": "R", "before": "the relation sparsity and noises problems", "after": "(1) and (2)", "start_char_pos": 803, "end_char_pos": 844}, {"type": "D", "before": "original", "after": null, "start_char_pos": 1046, "end_char_pos": 1054}, {"type": "R", "before": "new", "after": "the", "start_char_pos": 1099, "end_char_pos": 1102}, {"type": "R", "before": "capture", "after": "address (3) by capturing", "start_char_pos": 1258, "end_char_pos": 1265}, {"type": "D", "before": "These designs deal with the three problems faced by social recommender systems respectively.", "after": null, "start_char_pos": 1315, "end_char_pos": 1407}, {"type": "R", "before": "and intensify all", "after": "all the", "start_char_pos": 1456, "end_char_pos": 1473}, {"type": "R", "before": "minimax", "after": "Minimax", "start_char_pos": 1498, "end_char_pos": 1505}, {"type": "R", "before": "social recommendation . Experimental results", "after": "recommendation performance. Extensive experiments", "start_char_pos": 1554, "end_char_pos": 1598}], "sents_char_pos": [0, 96, 290, 363, 542, 661, 786, 1127, 1314, 1407]}
+{"doc_id": "2004.02739", "revision_depth": "1", "before_revision": "We present a novel methodology in order to perform the epidemic risk assessment in terms of different factors which are useful to understand the different impact of an epidemic in different areas of a country. In particular we discuss the case of COVID-19 outbreak in Italy. We characterize each region of Italy by considering the available data on air pollution, mobility, winter temperature, housing concentration, health care density, total and aged population . We find that the epidemic risk is higher in some of the northern regions of Italy with respect to central and southern part . Our epidemic risk index shows strong correlations with the available official data of the COVID-19 outbreak in Italy and explain in particular why regions like Lombardia, Emilia-Romagna, Piemonte and Veneto are suffering much more than the rest of the country in terms of infected cases, intensive care units and deceased patients . Although the COVID-19 outbreak started almost in the same period, at the beginning of 2020, in both north (Lombardia and Veneto) and central part of Italy (Lazio) , when the first infected were officially certified , the outbreak has been more diffuse and lethal only in those regions with higher epidemic risk. Due to the fact that a large part of infected people do not show evident symptoms of the disease, we claim that in the regions with a lower epidemic risk, i.e. the central and south part of Italy, the epidemic , although probably already very diffused, should not be as lethal as in the northern part of Italy due to a different a-priori risk exposure . We also discuss some policy implications directly connected with our methodology, which results to be very flexible and adaptable to different set of epidemic historical data and to different countries.", "after_revision": "We propose a novel data-driven framework for assessing the a-priori epidemic risk of a geographical area, and for identifying high-risk areas within a country. Our risk index is evaluated as a function of three different components: the hazard of the disease, the exposure of the area and its vulnerability. As an application, we discuss the case of COVID-19 outbreak in Italy. We characterize each of the twenty Italian regions by using available data on air pollution, mobility, winter temperature, housing concentration, health care density, population size and age . We find that the epidemic risk is higher in some of the Northern regions with respect to Central and Southern Italy . Our epidemic risk index shows strong correlations with the available official data on the number of infected individuals, patients in intensive care and deceased patients, and can explain why regions such as Lombardia, Emilia-Romagna, Piemonte and Veneto are suffering much more than the rest of the country . Although the COVID-19 outbreak started in both North (Lombardia and Veneto) and Central Italy (Lazio) almost at the same time , when the first infected were officially certified at the beginning of 2020, the disease has spread faster and with heavier consequences in regions with higher epidemic risk. Our framework can be extended and tested on other epidemic data, such as those on seasonal flu . We also discuss some policy implications directly connected with our methodology, which results to be very flexible and can be adopted for risk assessment in other countries.", "edit_actions": [{"type": "R", "before": "present a novel methodology in order to perform the epidemic risk assessment in terms of different factors which are useful to understand the different impact of an epidemic in different areas of a country. In particular", "after": "propose a novel data-driven framework for assessing the a-priori epidemic risk of a geographical area, and for identifying high-risk areas within a country. Our risk index is evaluated as a function of three different components: the hazard of the disease, the exposure of the area and its vulnerability. As an application,", "start_char_pos": 3, "end_char_pos": 223}, {"type": "R", "before": "region of Italy by considering the", "after": "of the twenty Italian regions by using", "start_char_pos": 296, "end_char_pos": 330}, {"type": "R", "before": "total and aged population", "after": "population size and age", "start_char_pos": 438, "end_char_pos": 463}, {"type": "R", "before": "northern regions of Italy", "after": "Northern regions", "start_char_pos": 522, "end_char_pos": 547}, {"type": "R", "before": "central and southern part", "after": "Central and Southern Italy", "start_char_pos": 564, "end_char_pos": 589}, {"type": "R", "before": "of the COVID-19 outbreak in Italy and explain in particular why regions like", "after": "on the number of infected individuals, patients in intensive care and deceased patients, and can explain why regions such as", "start_char_pos": 675, "end_char_pos": 751}, {"type": "D", "before": "in terms of infected cases, intensive care units and deceased patients", "after": null, "start_char_pos": 852, "end_char_pos": 922}, {"type": "R", "before": "almost in the same period, at the beginning of 2020, in both north", "after": "in both North", "start_char_pos": 964, "end_char_pos": 1030}, {"type": "R", "before": "central part of", "after": "Central", "start_char_pos": 1058, "end_char_pos": 1073}, {"type": "A", "before": null, "after": "almost at the same time", "start_char_pos": 1088, "end_char_pos": 1088}, {"type": "R", "before": ", the outbreak has been more diffuse and lethal only in those", "after": "at the beginning of 2020, the disease has spread faster and with heavier consequences in", "start_char_pos": 1141, "end_char_pos": 1202}, {"type": "R", "before": "Due to the fact that a large part of infected people do not show evident symptoms of the disease, we claim that in the regions with a lower epidemic risk, i.e. the central and south part of Italy, the epidemic , although probably already very diffused, should not be as lethal as in the northern part of Italy due to a different a-priori risk exposure", "after": "Our framework can be extended and tested on other epidemic data, such as those on seasonal flu", "start_char_pos": 1238, "end_char_pos": 1589}, {"type": "R", "before": "adaptable to different set of epidemic historical data and to different", "after": "can be adopted for risk assessment in other", "start_char_pos": 1712, "end_char_pos": 1783}], "sents_char_pos": [0, 209, 274, 465, 591, 924, 1237, 1591]}
+{"doc_id": "2004.03384", "revision_depth": "1", "before_revision": "One major bottleneck in the ongoing Covid-19 pandemic is the limited number of critical care beds. Due to the dynamic development of infections and the time lag between when patients are infected and when a proportion of them enters an intensive care unit (ICU), the need for future intensive care can easily be underestimated. To derive future ICU load from reported infections, we suggest a simple statistical model that (1) accounts for time lags and (2) allows for making predictions depending on different future growth rates. We evaluate our model for public data from Berlin, Germany, by first estimating the model parameters (i.e., time lag and average stay in ICU)for March 2020 and then using an exponential model to predict the future ICU load for April and May 2020. Assuming an ICU rate of 5 \\%, a time lag of 5 days and an average stay of 14 days in ICU provide the best fit of the data and is in accord with independent estimates. Our model is then used to predict future ICU load assuming a continued exponential phase with varying growth rates (0-15\\%) . For example, based on our parameters the model predicts that the number of ICU patients at the end of May would be 246 if the exponential growth were to continue at a rate of 3\\%, 1,056 if the growth rate were 5\\% and 3,758 if the growth rate were 7\\%. The model can be adjusted as estimates of parameters develop and can thus also help to predict a potential exceedance of ICU capacity. Although our predictions are based on a small data set, disregard non-stationary dynamics, and have a number of assumptions, especially an exponential development of cases, our model is simple, robust, adaptable and can be up-dated when further data become available .", "after_revision": "One major bottleneck in the ongoing COVID-19 pandemic is the limited number of critical care beds. Due to the dynamic development of infections and the time lag between when patients are infected and when a proportion of them enters an intensive care unit (ICU), the need for future intensive care can easily be underestimated. To infer future ICU load from reported infections, we suggest a simple statistical model that (1) accounts for time lags and (2) allows for making predictions depending on different future growth of infections. We have evaluated our model for three regions, namely Berlin (Germany), Lombardy (Italy), and Madrid (Spain). Before extensive containment measures made an impact, we first estimate the region-specific model parameters. Whereas for Berlin, an ICU rate of 6 \\%, a time lag of 6 days, and an average stay of 12 days in ICU provide the best fit of the data , for Lombardy and Madrid the ICU rate was higher (18\\% and 15\\%) and the time lag (0 and 3 days) and the average stay (4 and 8 days) in ICU shorter. The region-specific models are then used to predict future ICU load assuming either a continued exponential phase with varying growth rates (0-15\\%) or linear growth. Thus, the model can help to predict a potential exceedance of ICU capacity. Although our predictions are based on small data sets and disregard non-stationary dynamics, our model is simple, robust, and can be used in early phases of the disease when data are scarce .", "edit_actions": [{"type": "R", "before": "Covid-19", "after": "COVID-19", "start_char_pos": 36, "end_char_pos": 44}, {"type": "R", "before": "derive", "after": "infer", "start_char_pos": 331, "end_char_pos": 337}, {"type": "R", "before": "rates. We evaluate", "after": "of infections. We have evaluated", "start_char_pos": 525, "end_char_pos": 543}, {"type": "R", "before": "public data from Berlin, Germany, by first estimating the model parameters (i.e., time lag and average stay in ICU)for March 2020 and then using an exponential model to predict the future ICU load for April and May 2020. Assuming", "after": "three regions, namely Berlin (Germany), Lombardy (Italy), and Madrid (Spain). Before extensive containment measures made an impact, we first estimate the region-specific model parameters. Whereas for Berlin,", "start_char_pos": 558, "end_char_pos": 787}, {"type": "R", "before": "5", "after": "6", "start_char_pos": 803, "end_char_pos": 804}, {"type": "R", "before": "5 days", "after": "6 days,", "start_char_pos": 823, "end_char_pos": 829}, {"type": "R", "before": "14", "after": "12", "start_char_pos": 853, "end_char_pos": 855}, {"type": "A", "before": null, "after": ", for Lombardy and Madrid the ICU rate was higher (18\\% and 15\\%) and the time lag (0", "start_char_pos": 901, "end_char_pos": 901}, {"type": "R", "before": "is in accord with independent estimates. Our model is", "after": "3 days) and the average stay (4 and 8 days) in ICU shorter. The region-specific models are", "start_char_pos": 906, "end_char_pos": 959}, {"type": "A", "before": null, "after": "either", "start_char_pos": 1006, "end_char_pos": 1006}, {"type": "R", "before": ". For example, based on our parameters the model predicts that the number of ICU patients at the end of May would be 246 if the exponential growth were to continue at a rate of 3\\%, 1,056 if the growth rate were 5\\% and 3,758 if the growth rate were 7\\%. The model can be adjusted as estimates of parameters develop and can thus also", "after": "or linear growth. Thus, the model can", "start_char_pos": 1072, "end_char_pos": 1405}, {"type": "R", "before": "a small data set,", "after": "small data sets and", "start_char_pos": 1500, "end_char_pos": 1517}, {"type": "D", "before": "and have a number of assumptions, especially an exponential development of cases,", "after": null, "start_char_pos": 1553, "end_char_pos": 1634}, {"type": "D", "before": "adaptable", "after": null, "start_char_pos": 1664, "end_char_pos": 1673}, {"type": "R", "before": "up-dated when further data become available", "after": "used in early phases of the disease when data are scarce", "start_char_pos": 1685, "end_char_pos": 1728}], "sents_char_pos": [0, 98, 327, 531, 778, 946, 1073, 1326, 1461]}
+{"doc_id": "2004.04614", "revision_depth": "1", "before_revision": "We argue that random testing (polling the fraction of infected people in the population) is central to managing the COVID-19 pandemic because it both measures the key variable controlled by restrictive measures, and anticipates the load on the healthcare system via the progression of the disease. Knowledge of random testing outcomes will therefore (i) significantly improve the predictability of the course of the pandemic, (ii) allow informed and optimized decisions on how to modify restrictive measures, with much shorter delay times than the present ones, and (iii) enable the real-time assessment of the efficiency of new means to reduce transmission rates (such as new tracing strategies based on the mobile telephone network, wearing face masks, etc. ). Frequent random testing for COVID-19 infections has the essential benefit of providing more reliable and refined data than currently available, in both time and space. This is crucial to accompany and monitor the safe release of restrictive measures. Here we show that independent of the total size of population with frequent interactions among its members, about 15000 tests with randomly selected people per day suffice to obtain valuable data about the current number of infections and their evolution in time . In contrast to testing confined to particular subpopulations such as those displaying symptoms, this will allow close to real-time assessment of the quantitative effect of restrictive measures. With yet higher testing capacity , random testing further allows detection of geographical differences in spreading rates and thus the formulation of optimal strategies for a safe reboot of the economy. Most importantly, with daily random testing in place, a reboot could be attempted while the fraction of infected people is still an order of magnitude higher than the level required for a reboot without such polling .", "after_revision": "We argue that frequent sampling of the fraction of infected people (either by random testing or by analysis of sewage water), is central to managing the COVID-19 pandemic because it both measures in real time the key variable controlled by restrictive measures, and anticipates the load on the healthcare system due to progression of the disease. Knowledge of random testing outcomes will (i) significantly improve the predictability of the pandemic, (ii) allow informed and optimized decisions on how to modify restrictive measures, with much shorter delay times than the present ones, and (iii) enable the real-time assessment of the efficiency of new means to reduce transmission rates . Here we suggest, irrespective of the size of a suitably homogeneous population, a conservative estimate of 15000 for the number of randomly tested people per day which will suffice to obtain reliable data about the current fraction of infections and its evolution in time , thus enabling close to real-time assessment of the quantitative effect of restrictive measures. Still higher testing capacity permits detection of geographical differences in spreading rates . Furthermore and most importantly, with daily sampling in place, a reboot could be attempted while the fraction of infected people is still an order of magnitude higher than the level required for a relaxation of restrictions with testing focused on symptomatic individuals. This is demonstrated by considering a feedback and control model of mitigation where the feed-back is derived from noisy sampling data .", "edit_actions": [{"type": "R", "before": "random testing (polling", "after": "frequent sampling of", "start_char_pos": 14, "end_char_pos": 37}, {"type": "R", "before": "in the population)", "after": "(either by random testing or by analysis of sewage water),", "start_char_pos": 70, "end_char_pos": 88}, {"type": "A", "before": null, "after": "in real time", "start_char_pos": 159, "end_char_pos": 159}, {"type": "R", "before": "via the", "after": "due to", "start_char_pos": 263, "end_char_pos": 270}, {"type": "D", "before": "therefore", "after": null, "start_char_pos": 341, "end_char_pos": 350}, {"type": "D", "before": "course of the", "after": null, "start_char_pos": 403, "end_char_pos": 416}, {"type": "R", "before": "(such as new tracing strategies based on the mobile telephone network, wearing face masks, etc. ). Frequent random testing for COVID-19 infections has the essential benefit of providing more reliable and refined data than currently available, in both time and space. This is crucial to accompany and monitor the safe release of restrictive measures. Here we show that independent of the total size of population with frequent interactions among its members, about", "after": ". Here we suggest, irrespective of the size of a suitably homogeneous population, a conservative estimate of", "start_char_pos": 665, "end_char_pos": 1128}, {"type": "R", "before": "tests with randomly selected", "after": "for the number of randomly tested", "start_char_pos": 1135, "end_char_pos": 1163}, {"type": "A", "before": null, "after": "which will", "start_char_pos": 1179, "end_char_pos": 1179}, {"type": "R", "before": "valuable", "after": "reliable", "start_char_pos": 1198, "end_char_pos": 1206}, {"type": "R", "before": "number", "after": "fraction", "start_char_pos": 1230, "end_char_pos": 1236}, {"type": "R", "before": "their", "after": "its", "start_char_pos": 1255, "end_char_pos": 1260}, {"type": "R", "before": ". In contrast to testing confined to particular subpopulations such as those displaying symptoms, this will allow", "after": ", thus enabling", "start_char_pos": 1279, "end_char_pos": 1392}, {"type": "R", "before": "With yet", "after": "Still", "start_char_pos": 1475, "end_char_pos": 1483}, {"type": "R", "before": ", random testing further allows", "after": "permits", "start_char_pos": 1508, "end_char_pos": 1539}, {"type": "R", "before": "and thus the formulation of optimal strategies for a safe reboot of the economy. Most", "after": ". Furthermore and most", "start_char_pos": 1597, "end_char_pos": 1682}, {"type": "R", "before": "random testing", "after": "sampling", "start_char_pos": 1707, "end_char_pos": 1721}, {"type": "R", "before": "reboot without such polling", "after": "relaxation of restrictions with testing focused on symptomatic individuals. This is demonstrated by considering a feedback and control model of mitigation where the feed-back is derived from noisy sampling data", "start_char_pos": 1866, "end_char_pos": 1893}], "sents_char_pos": [0, 298, 763, 931, 1014, 1280, 1474, 1677]}
+{"doc_id": "2004.04903", "revision_depth": "1", "before_revision": "In stable environments, statistics of cell size fluctuations is thought to be governed by simple physical principles . Past studies suggested that bacterial cell sizes exhibit a universal distribution irrespective of growth conditions, and for eukaryotes, a single distribution may describe size fluctuations of various cell species. The distinguished feature of those distributions is scale invariance; i.e., the distribution function is determined solely by the mean cell size. Here we show, using E. coli, that such a simple distribution law also persists under time-dependent environments, which then involve regulations of cell cycle kinetics. By developing a membrane-based microfluidic device suitable for culturing a large cell population under uniform and controllable growth conditions, we study how the cell size distribution changes after the supplied medium is switched from a nutritious to non-nutritious one, triggering the bacterial reductive division . The mean cell size then gradually decreases, but we find that the size distribution is kept unchanged if the cell sizes are normalized by their time-dependent mean value ; in other words the scale invariance holds as it is. We also study a model considering intracellular replication and cell volume growth and successfully reproduce our experimental results. Furthermore, we give a theoretical expression for the time-dependent cell size distribution and propose a sufficient condition for the scale invariance. Our findings emphasize that, compared with environmental factors, the intrinsic cellular replication processes have stronger impact on the cell size distribution, and consequently bacteria and eukaryotes are ruled by different, yet possibly universal distributions .", "after_revision": "In stable environments, cell size fluctuations are thought to be governed by simple physical principles , as suggested by recent finding of scaling properties. Here we show, using E. coli, that the scaling concept also rules cell size fluctuations under time-dependent conditions, even though the distribution changes with time. We develop a microfluidic device for observing dense and large bacterial populations, under uniform and switchable conditions. Triggering bacterial reductive division by switching to non-nutritious medium, we find evidence that the cell size distribution changes in a specific manner that keeps its normalized form unchanged ; in other words , scale invariance holds . This finding is underpinned by simulations of a model based on cell growth and intracellular replication. We also formulate the problem theoretically and propose a sufficient condition for the scale invariance. Our results emphasize the importance of intrinsic cellular replication processes in this problem, suggesting different distribution trends for bacteria and eukaryotes .", "edit_actions": [{"type": "D", "before": "statistics of", "after": null, "start_char_pos": 24, "end_char_pos": 37}, {"type": "R", "before": "is", "after": "are", "start_char_pos": 61, "end_char_pos": 63}, {"type": "R", "before": ". Past studies suggested that bacterial cell sizes exhibit a universal distribution irrespective of growth conditions, and for eukaryotes, a single distribution may describe size fluctuations of various cell species. The distinguished feature of those distributions is scale invariance; i.e., the distribution function is determined solely by the mean cell size.", "after": ", as suggested by recent finding of scaling properties.", "start_char_pos": 117, "end_char_pos": 479}, {"type": "R", "before": "such a simple distribution law also persists", "after": "the scaling concept also rules cell size fluctuations", "start_char_pos": 514, "end_char_pos": 558}, {"type": "R", "before": "environments, which then involve regulations of cell cycle kinetics. By developing a membrane-based microfluidic device suitable for culturing a large cell population", "after": "conditions, even though the distribution changes with time. We develop a microfluidic device for observing dense and large bacterial populations,", "start_char_pos": 580, "end_char_pos": 746}, {"type": "R", "before": "controllable growth conditions, we study how the cell size distribution changes after the supplied medium is switched from a nutritious to non-nutritious one, triggering the", "after": "switchable conditions. Triggering", "start_char_pos": 765, "end_char_pos": 938}, {"type": "R", "before": ". The mean cell size then gradually decreases, but we find that the size distribution is kept unchanged if the cell sizes are normalized by their time-dependent mean value", "after": "by switching to non-nutritious medium, we find evidence that the cell size distribution changes in a specific manner that keeps its normalized form unchanged", "start_char_pos": 968, "end_char_pos": 1139}, {"type": "R", "before": "the", "after": ",", "start_char_pos": 1157, "end_char_pos": 1160}, {"type": "R", "before": "as it is. We also study a model considering intracellular replication and cell volume growth and successfully reproduce our experimental results. Furthermore, we give a theoretical expression for the time-dependent cell size distribution", "after": ". This finding is underpinned by simulations of a model based on cell growth", "start_char_pos": 1184, "end_char_pos": 1421}, {"type": "A", "before": null, "after": "intracellular replication. We also formulate the problem theoretically and", "start_char_pos": 1426, "end_char_pos": 1426}, {"type": "R", "before": "findings emphasize that, compared with environmental factors, the", "after": "results emphasize the importance of", "start_char_pos": 1488, "end_char_pos": 1553}, {"type": "R", "before": "have stronger impact on the cell size distribution, and consequently", "after": "in this problem, suggesting different distribution trends for", "start_char_pos": 1595, "end_char_pos": 1663}, {"type": "D", "before": "are ruled by different, yet possibly universal distributions", "after": null, "start_char_pos": 1688, "end_char_pos": 1748}], "sents_char_pos": [0, 333, 403, 479, 648, 969, 1141, 1193, 1329, 1483]}
+{"doc_id": "2004.05478", "revision_depth": "1", "before_revision": "TikTok is a video-sharing social networking service, whose popularity is increasing rapidly. It was the world's second-most downloaded app in 2019. Although the platform is known for having users dancing, lip-syncing and showing off their talents, there is an increase in videos designed to express political opinions. In this study , we perform the first evaluation of political communication on this platform . We collect a set of US Republican and Democratic partisan videos and investigate how users communicate with each other . With the help of computer vision, natural language processing, and statistical tools, we illustrate that political communication is much more interactive on TikTok in contrast to other social media platforms, with users combining multiple information channels to spread their messages. We show that political communication takes place in the form of communication trees since users generate branches of responses on existing content. Finally, we investigate user demographicsand their interactions with opposing views. We find that partisan users from both parties are young and behave similarly on the platform. We also find that Republican users generate more political content , and their videos receive more reactions. However, Democratic partisans engage significantly more in cross-partisan discussions.", "after_revision": "TikTok is a video-sharing social networking service, whose popularity is increasing rapidly. It was the world's second-most downloaded app in 2019. Although the platform is known for having users posting videos of themselves dancing, lip-syncing , or showcasing other talents, user-videos expressing political views have seen a recent spurt. This study aims to perform a primary evaluation of political communication on TikTok . We collect a set of US partisan Republican and Democratic videos to investigate how users communicated with each other about political issues . With the help of computer vision, natural language processing, and statistical tools, we illustrate that political communication on TikTok is much more interactive in comparison to other social media platforms, with users combining multiple information channels to spread their messages. We show that political communication takes place in the form of communication trees since users generate branches of responses to existing content. In terms of user demographics, we find that users belonging to both the US parties are young and behave similarly on the platform. However, Republican users generated more political content and their videos received more responses; on the other hand, Democratic users engaged significantly more in cross-partisan discussions.", "edit_actions": [{"type": "A", "before": null, "after": "posting videos of themselves", "start_char_pos": 196, "end_char_pos": 196}, {"type": "R", "before": "and showing off their talents, there is an increase in videos designed to express political opinions. In this study , we perform the first", "after": ", or showcasing other talents, user-videos expressing political views have seen a recent spurt. This study aims to perform a primary", "start_char_pos": 218, "end_char_pos": 356}, {"type": "R", "before": "this platform", "after": "TikTok", "start_char_pos": 398, "end_char_pos": 411}, {"type": "A", "before": null, "after": "partisan", "start_char_pos": 437, "end_char_pos": 437}, {"type": "R", "before": "partisan videos and", "after": "videos to", "start_char_pos": 464, "end_char_pos": 483}, {"type": "R", "before": "communicate", "after": "communicated", "start_char_pos": 506, "end_char_pos": 517}, {"type": "A", "before": null, "after": "about political issues", "start_char_pos": 534, "end_char_pos": 534}, {"type": "A", "before": null, "after": "on TikTok", "start_char_pos": 666, "end_char_pos": 666}, {"type": "R", "before": "on TikTok in contrast", "after": "in comparison", "start_char_pos": 692, "end_char_pos": 713}, {"type": "R", "before": "on", "after": "to", "start_char_pos": 951, "end_char_pos": 953}, {"type": "R", "before": "Finally, we investigate user demographicsand their interactions with opposing views. We find that partisan users from both", "after": "In terms of user demographics, we find that users belonging to both the US", "start_char_pos": 972, "end_char_pos": 1094}, {"type": "R", "before": "We also find that Republican users generate", "after": "However, Republican users generated", "start_char_pos": 1151, "end_char_pos": 1194}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1218, "end_char_pos": 1219}, {"type": "R", "before": "receive more reactions. However, Democratic partisans engage", "after": "received more responses; on the other hand, Democratic users engaged", "start_char_pos": 1237, "end_char_pos": 1297}], "sents_char_pos": [0, 92, 147, 319, 413, 536, 823, 971, 1056, 1150, 1260]}
+{"doc_id": "2004.06033", "revision_depth": "1", "before_revision": "An increasing number of countries expands testing of symptomatic persons for infection with SARS-CoV-2 . It is important to consider efficient ways to collect information that will allow to understand the COVID-19 pandemic . We propose two types of case-control studies that can be carried out in test-settings for symptomatic persons. The first, the test-negative case-control design (TND) is the easiest to set up, since all symptomatic persons will be tested ; it only demands collecting information from these persons, some which will be collected routinely . The second, standard matched case-control studies (CC) demands that one person who accompanies the symptomatic persons to the test facility is asked the same information . We first summarize the TND and explain how to add it to large-scale testing of persons with signs and symptoms . The TND shows differences in risk factors between symptomatic persons with COVID-19 and persons with other respiratory infections . Factors that are risk factors of equal magnitude for both COVID-19 and other respiratory infections will not be identified by the TND. Second, we discuss how to add standard matched case-control studies (separately for SARS-CoV-2 test-positives and test-negatives ) by asking accompanying persons to the test facilities to become controls. Those case-control studies give a contrast between COVID-19 patients and matched persons from the general population. We give suggestions for other types of population controls . Such studies distinguish between exposures that are risk factors for both COVID-19 and other respiratory infections, and exposures that are risk factors for just COVID-19 or just for other respiratory infections. Incorporating the test-negative design into on-going testing efforts is useful in itself, but it would be more useful with the addition of the matched case-control designs .", "after_revision": "Testing of symptomatic persons for infection with SARS-CoV-2 is increasingly used in different countries. To collect information to understand the causes of the COVID-19 pandemic , we propose two types of case-control studies that can be carried out jointly in test-settings for symptomatic persons. The first, the test-negative case-control design (TND) is the easiest to implement ; it only demands collecting information about potential risk factors for COVID-19 from the tested symptomatic persons . The second, standard case-control studies (CC) with population controls, requires the collection of data on one or more population controls for each person who is tested in the test facilities, so that test-positives and test-negatives can each be compared with population controls . We first summarize the TND and explain how to add it to large-scale testing of symptomatic persons . The TND will detect differences in risk factors between symptomatic persons who have COVID-19 (test-positives) and those who have other respiratory infections (test-negatives). However, risk factors with effect sizes of equal magnitude for both COVID-19 and other respiratory infections will not be identified by the TND. Second, we discuss how to add population controls to compare with the test-positives and the test-negatives separately, yielding two additional case-control studies. We describe two different types of population control groups: one composed of accompanying persons to the test facilities , the other drawn from existing country-wide health care databases. We also describe other types of population controls that may be most suitable in other situations. Combining the test-negative design with population controls yields a triangulation approach that distinguishes between exposures that are risk factors for both COVID-19 and other respiratory infections, and exposures that are risk factors for just COVID-19 .", "edit_actions": [{"type": "R", "before": "An increasing number of countries expands testing of", "after": "Testing of", "start_char_pos": 0, "end_char_pos": 52}, {"type": "R", "before": ". It is important to consider efficient ways to collect information that will allow", "after": "is increasingly used in different countries. To collect information", "start_char_pos": 103, "end_char_pos": 186}, {"type": "A", "before": null, "after": "causes of the", "start_char_pos": 205, "end_char_pos": 205}, {"type": "R", "before": ". We", "after": ", we", "start_char_pos": 224, "end_char_pos": 228}, {"type": "A", "before": null, "after": "jointly", "start_char_pos": 295, "end_char_pos": 295}, {"type": "R", "before": "set up, since all symptomatic persons will be tested", "after": "implement", "start_char_pos": 411, "end_char_pos": 463}, {"type": "R", "before": "from these persons, some which will be collected routinely", "after": "about potential risk factors for COVID-19 from the tested symptomatic persons", "start_char_pos": 505, "end_char_pos": 563}, {"type": "D", "before": "matched", "after": null, "start_char_pos": 587, "end_char_pos": 594}, {"type": "R", "before": "demands that one person who accompanies the symptomatic persons to the test facility is asked the same information", "after": "with population controls, requires the collection of data on one or more population controls for each person who is tested in the test facilities, so that test-positives and test-negatives can each be compared with population controls", "start_char_pos": 621, "end_char_pos": 735}, {"type": "R", "before": "persons with signs and symptoms", "after": "symptomatic persons", "start_char_pos": 817, "end_char_pos": 848}, {"type": "R", "before": "shows", "after": "will detect", "start_char_pos": 859, "end_char_pos": 864}, {"type": "R", "before": "with", "after": "who have", "start_char_pos": 921, "end_char_pos": 925}, {"type": "R", "before": "and persons with", "after": "(test-positives) and those who have", "start_char_pos": 935, "end_char_pos": 951}, {"type": "R", "before": ". Factors that are risk factors", "after": "(test-negatives). However, risk factors with effect sizes", "start_char_pos": 981, "end_char_pos": 1012}, {"type": "R", "before": "standard matched case-control studies (separately for SARS-CoV-2", "after": "population controls to compare with the", "start_char_pos": 1148, "end_char_pos": 1212}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1232, "end_char_pos": 1232}, {"type": "R", "before": ") by asking", "after": "separately, yielding two additional case-control studies. We describe two different types of population control groups: one composed of", "start_char_pos": 1248, "end_char_pos": 1259}, {"type": "R", "before": "to become controls. Those case-control studies give a contrast between COVID-19 patients and matched persons from the general population. We give suggestions for", "after": ", the other drawn from existing country-wide health care databases. We also describe", "start_char_pos": 1304, "end_char_pos": 1465}, {"type": "R", "before": ". Such studies distinguish", "after": "that may be most suitable in other situations. Combining the test-negative design with population controls yields a triangulation approach that distinguishes", "start_char_pos": 1501, "end_char_pos": 1527}, {"type": "D", "before": "or just for other respiratory infections. Incorporating the test-negative design into on-going testing efforts is useful in itself, but it would be more useful with the addition of the matched case-control designs", "after": null, "start_char_pos": 1674, "end_char_pos": 1887}], "sents_char_pos": [0, 225, 337, 465, 565, 737, 850, 982, 1117, 1323, 1441, 1502, 1715]}
+{"doc_id": "2004.06539", "revision_depth": "2", "before_revision": "Migration of scholars is a major driver of innovation and diffusion of knowledge. Although large-scale bibliometric data have been used to measure international migration of scholars, our understanding of internal migration among researchers is very limited. This is partly due to lack of data aggregated at a suitable sub-national level. In this study, we analyze internal migration in Mexico based on over 1.1 million authorship records from the Scopus database. We trace movements of scholars between Mexican states and provide key demographic measures of internal migration for the period 1996-2018 . From a methodological perspective, we develop a new framework for enhancing data quality, inferring states from affiliations, and detecting moves from modal states for the purposes of studying internal migration between researchers. Substantively, we combine demographic and network science techniques to improve our understanding of internal migration patterns country boundaries. Migration patterns between states in Mexico appear to be heterogeneous in size and direction across regions. However, while many scholars remain in their regions, there seems to be a preference for Mexico City and the surrounding states as a destination. Over the past two decades, we observed a general decreasing trend in the crude migration intensity. However, the migration network has become more dense , and more diverse, including greater exchange between states along the Gulf and the Pacific Coast. Our analysis, which is mostly empirical in nature, sets the foundations for testing and developing theories that can rely on the analytical framework developed by migration scholars and the richness of appropriately processed bibliometric data.", "after_revision": "The migration of scholars is a major driver of innovation and of diffusion of knowledge. Although large-scale bibliometric data have been used to measure international migration of scholars, our understanding of internal migration among researchers is very limited. This is partly due to a lack of data aggregated at a suitable sub-national level. In this study, we analyze internal migration in Mexico based on over 1.1 million authorship records from the Scopus database. We trace the movements of scholars between Mexican states , and provide key demographic measures of internal migration for the 1996-2018 period . From a methodological perspective, we develop a new framework for enhancing data quality, inferring states from affiliations, and detecting moves from modal states for the purposes of studying internal migration among researchers. Substantively, we combine demographic and network science techniques to improve our understanding of internal migration patterns within country boundaries. The migration patterns between states in Mexico appear to be heterogeneous in size and direction across regions. However, while many scholars remain in their regions, there seems to be a preference for Mexico City and the surrounding states as migration destinations. We observed that over the past two decades, there has been a general decreasing trend in the crude migration intensity. However, the migration network has become more dense and more diverse, and has included greater exchanges between states along the Gulf and the Pacific Coast. Our analysis, which is mostly empirical in nature, lays the foundations for testing and developing theories that can rely on the analytical framework developed by migration scholars , and the richness of appropriately processed bibliometric data.", "edit_actions": [{"type": "R", "before": "Migration", "after": "The migration", "start_char_pos": 0, "end_char_pos": 9}, {"type": "A", "before": null, "after": "of", "start_char_pos": 58, "end_char_pos": 58}, {"type": "A", "before": null, "after": "a", "start_char_pos": 282, "end_char_pos": 282}, {"type": "A", "before": null, "after": "the", "start_char_pos": 476, "end_char_pos": 476}, {"type": "A", "before": null, "after": ",", "start_char_pos": 522, "end_char_pos": 522}, {"type": "D", "before": "period", "after": null, "start_char_pos": 590, "end_char_pos": 596}, {"type": "A", "before": null, "after": "period", "start_char_pos": 607, "end_char_pos": 607}, {"type": "R", "before": "between", "after": "among", "start_char_pos": 822, "end_char_pos": 829}, {"type": "A", "before": null, "after": "within", "start_char_pos": 972, "end_char_pos": 972}, {"type": "R", "before": "Migration", "after": "The migration", "start_char_pos": 993, "end_char_pos": 1002}, {"type": "R", "before": "a destination. Over", "after": "migration destinations. We observed that over", "start_char_pos": 1233, "end_char_pos": 1252}, {"type": "R", "before": "we observed", "after": "there has been", "start_char_pos": 1275, "end_char_pos": 1286}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1401, "end_char_pos": 1402}, {"type": "R", "before": "including greater exchange", "after": "and has included greater exchanges", "start_char_pos": 1421, "end_char_pos": 1447}, {"type": "R", "before": "sets", "after": "lays", "start_char_pos": 1552, "end_char_pos": 1556}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1683, "end_char_pos": 1683}], "sents_char_pos": [0, 82, 259, 340, 466, 842, 992, 1101, 1247, 1347, 1500]}
+{"doc_id": "2004.06774", "revision_depth": "2", "before_revision": "Time-critical analysis of social media streams is important for URLanizations to plan rapid response during disasters. The crisis informatics research community has developed several techniques and systems to process and classify big crisis related data posted on social media. However, due to the dispersed nature of the datasets used in the literature , it is not possible to compare the results and measure the progress made towards better models for crisis informatics . In this work, we attempt to bridge this gap by standardizing various existing crisis-related datasets. We consolidate labels of eight annotated data sources and provide 166.1k and 141.5k tweets for informativeness and humanitarian \\textit{ classification tasks, respectively. The consolidation results in a larger dataset that affords the ability to train more sophisticated models. To that end , we provide baseline results using CNN and BERT models . We make the dataset available at URL", "after_revision": "Time-critical analysis of social media streams is important for URLanizations for planing rapid response during disasters. The crisis informatics research community has developed several techniques and systems for processing and classifying big crisis-related data posted on social media. However, due to the dispersed nature of the datasets used in the literature (e.g., for training models), it is not possible to compare the results and measure the progress made towards building better models for crisis informatics tasks . In this work, we attempt to bridge this gap by combining various existing crisis-related datasets. We consolidate eight human-annotated datasets and provide 166.1k and 141.5k tweets for informativeness and\\textit{humanitarian classification tasks, respectively. We believe that the consolidated dataset will help train more sophisticated models. Moreover , we provide benchmarks for both binary and multiclass classification tasks using several deep learning architecrures including, CNN, fastText, and transformers . We make the dataset and scripts available at: URL", "edit_actions": [{"type": "R", "before": "to plan", "after": "for planing", "start_char_pos": 78, "end_char_pos": 85}, {"type": "R", "before": "crisis informatics", "after": "crisis informatics", "start_char_pos": 123, "end_char_pos": 141}, {"type": "R", "before": "to process and classify big crisis related", "after": "for processing and classifying big crisis-related", "start_char_pos": 206, "end_char_pos": 248}, {"type": "R", "before": ",", "after": "(e.g., for training models),", "start_char_pos": 354, "end_char_pos": 355}, {"type": "A", "before": null, "after": "building", "start_char_pos": 436, "end_char_pos": 436}, {"type": "A", "before": null, "after": "tasks", "start_char_pos": 474, "end_char_pos": 474}, {"type": "R", "before": "standardizing", "after": "combining", "start_char_pos": 524, "end_char_pos": 537}, {"type": "R", "before": "labels of eight annotated data sources", "after": "eight human-annotated datasets", "start_char_pos": 595, "end_char_pos": 633}, {"type": "R", "before": "informativeness and humanitarian", "after": "informativeness", "start_char_pos": 675, "end_char_pos": 707}, {"type": "A", "before": null, "after": "and", "start_char_pos": 708, "end_char_pos": 708}, {"type": "A", "before": null, "after": "humanitarian", "start_char_pos": 716, "end_char_pos": 716}, {"type": "R", "before": "The consolidation results in a larger dataset that affords the ability to", "after": "We believe that the consolidated dataset will help", "start_char_pos": 753, "end_char_pos": 826}, {"type": "R", "before": "To that end", "after": "Moreover", "start_char_pos": 860, "end_char_pos": 871}, {"type": "R", "before": "baseline results using CNN and BERT models", "after": "benchmarks for both binary and multiclass classification tasks using several deep learning architecrures including, CNN, fastText, and transformers", "start_char_pos": 885, "end_char_pos": 927}, {"type": "R", "before": "available at", "after": "and scripts available at:", "start_char_pos": 950, "end_char_pos": 962}], "sents_char_pos": [0, 118, 277, 476, 579, 752, 859, 929]}
+{"doc_id": "2004.06828", "revision_depth": "1", "before_revision": "The population recovery problem asks one to recover an unknown distribution over n-bit strings given query access to independent noisy samples of strings drawn from the distribution. Recently, Ban et . al. [BCF+19] studied the problem where the unknown distribution over n-bit strings is known to be \\ell-sparse for some fixed \\ell, and the noise is induced through the deletion channel. The deletion channel is a noise model where each bit of the string is independently deleted with some fixed probability, and the retained bits are concatenated. We note that if \\ell = 1, i.e., we are trying to learn a single string , learning the distribution is equivalent to the famous trace reconstruction problem. The best known algorithms for trace reconstruction require \\exp%DIFDELCMD < \\left(%%% O(n^{1/3)}%DIFDELCMD < \\right) %%% samples. For population recovery under the deletion channel , Ban et . al. provided an algorithm that could learn \\ell-sparse distributions over strings using \\exp %DIFDELCMD < \\left(%%% \\big( n^{1/2} \\cdot (\\log n)^{O(\\ell)} %DIFDELCMD < \\right) %%% \\big) samples. In this work, we provide an algorithm that learns the distribution using only \\exp\\big(O(n^{1/3}) \\cdot \\ell^2\\big) samples, by developing a higher-moment analog of the algorithms of [DOS17, NP17] \\big(O)}\\big) . We also give the first algorithm with a runtime subexponential in n, which solves population recovery in \\exp\\big(\\tilde{O}(n^{1/3}) \\cdot \\ell^3\\big) samples and time. Notably, our dependence on n nearly matches the known upper bound when \\ell = 1 , and we reduce the dependence on \\ell from doubly to nearly singly exponential. Therefore, we are able to learn the mixture even for much larger values of \\ell. For instance, Ban et . al.'s algorithm can only learn a mixture of O(\\log n/\\log \\log n) strings with a subexponential number of queries, whereas we are able to learn a mixture of up to n^{o(1)} strings in subexponential queries\\big(}\\big) and time.", "after_revision": "The population recovery problem asks one to recover an unknown distribution over n-bit strings given access to independent noisy samples of strings drawn from the distribution. Recently, Ban et al. [BCF+19] studied the problem where the noise is induced through the deletion channel. This problem generalizes the famous trace reconstruction problem, where one wishes to learn a single string %DIFDELCMD < \\left(%%% )}%DIFDELCMD < \\right) %%% under the deletion channel . Ban et al. showed how to learn \\ell-sparse distributions over strings using \\exp %DIFDELCMD < \\left(%%% \\big( n^{1/2} \\cdot (\\log n)^{O(\\ell)} %DIFDELCMD < \\right) %%% \\big) samples. In this work, we learn the distribution using only \\exp\\big(O(n^{1/3}) \\cdot \\ell^2\\big) samples, by developing a higher-moment analog of the algorithms of [DOS17, NP17] , which solve trace reconstruction in \\exp\\big(O(n^{1/3)}\\big) samples . We also give the first algorithm with a runtime subexponential in n, solving population recovery in \\exp\\big(\\tilde{O}(n^{1/3}) \\cdot \\ell^3\\big) samples and time. Notably, our dependence on n nearly matches the upper bound of DOS17, NP17 when \\ell = O( 1 ) , and we reduce the dependence on \\ell from doubly to singly exponential. Therefore, we are able to learn large mixtures of strings: while Ban et al.'s algorithm can only learn a mixture of O(\\log n/\\log \\log n) strings with a subexponential number of samples, we are able to learn a mixture of n^{o(1)} strings in \\exp\\big(n^{1/3 + o(1)}\\big) samples and time.", "edit_actions": [{"type": "D", "before": "query", "after": null, "start_char_pos": 101, "end_char_pos": 106}, {"type": "D", "before": ".", "after": null, "start_char_pos": 200, "end_char_pos": 201}, {"type": "D", "before": "unknown distribution over n-bit strings is known to be \\ell-sparse for some fixed \\ell, and the", "after": null, "start_char_pos": 245, "end_char_pos": 340}, {"type": "R", "before": "The deletion channel is a noise model where each bit of the string is independently deleted with some fixed probability, and the retained bits are concatenated. We note that if \\ell = 1, i.e., we are trying", "after": "This problem generalizes the famous trace reconstruction problem, where one wishes", "start_char_pos": 388, "end_char_pos": 594}, {"type": "D", "before": ", learning the distribution is equivalent to the famous trace reconstruction problem. The best known algorithms for trace reconstruction require \\exp", "after": null, "start_char_pos": 620, "end_char_pos": 769}, {"type": "D", "before": "O(n^{1/3", "after": null, "start_char_pos": 792, "end_char_pos": 800}, {"type": "D", "before": "samples. For population recovery", "after": null, "start_char_pos": 827, "end_char_pos": 859}, {"type": "R", "before": ", Ban et . al. provided an algorithm that could", "after": ". Ban et al. showed how to", "start_char_pos": 887, "end_char_pos": 934}, {"type": "R", "before": "provide an algorithm that learns", "after": "learn", "start_char_pos": 1110, "end_char_pos": 1142}, {"type": "A", "before": null, "after": ", which solve trace reconstruction in \\exp", "start_char_pos": 1290, "end_char_pos": 1290}, {"type": "A", "before": null, "after": "(n^{1/3", "start_char_pos": 1296, "end_char_pos": 1296}, {"type": "A", "before": null, "after": "samples", "start_char_pos": 1304, "end_char_pos": 1304}, {"type": "R", "before": "which solves", "after": "solving", "start_char_pos": 1376, "end_char_pos": 1388}, {"type": "R", "before": "known upper bound", "after": "upper bound of", "start_char_pos": 1524, "end_char_pos": 1541}, {"type": "A", "before": null, "after": "DOS17, NP17", "start_char_pos": 1542, "end_char_pos": 1542}, {"type": "A", "before": null, "after": "O(", "start_char_pos": 1555, "end_char_pos": 1555}, {"type": "A", "before": null, "after": ")", "start_char_pos": 1558, "end_char_pos": 1558}, {"type": "D", "before": "nearly", "after": null, "start_char_pos": 1613, "end_char_pos": 1619}, {"type": "R", "before": "the mixture even for much larger values of \\ell. For instance, Ban et .", "after": "large mixtures of strings: while Ban et", "start_char_pos": 1672, "end_char_pos": 1743}, {"type": "R", "before": "queries, whereas", "after": "samples,", "start_char_pos": 1850, "end_char_pos": 1866}, {"type": "D", "before": "up to", "after": null, "start_char_pos": 1901, "end_char_pos": 1906}, {"type": "R", "before": "subexponential queries", "after": "\\exp", "start_char_pos": 1927, "end_char_pos": 1949}, {"type": "A", "before": null, "after": "n^{1/3 + o(1)", "start_char_pos": 1954, "end_char_pos": 1954}, {"type": "A", "before": null, "after": "samples", "start_char_pos": 1961, "end_char_pos": 1961}], "sents_char_pos": [0, 182, 387, 548, 705, 835, 1092, 1306, 1475, 1639, 1720]}
+{"doc_id": "2004.07224", "revision_depth": "3", "before_revision": "The fatality rate of SARS-Cov-2 escalates with age and is larger in men than women. I show that these variations are strongly correlated with the levels of the ACE2 protein in the lungsbut surprisingly, despite ACE2 is the viral receptor, higher levels lead to lower fatality. This behaviour is consistent with a previous mathematical model that predicts that the speed of viral progression in URLanism has a maximum and then declines with the receptor level. SARS-Cov-2 degrades ACE2 and thus worsens lung injury, causes vasoconstriction, thrombotic problems, and exacerbated inflammatory response . I developed a mathematical model based on the influence of ACE2 on viral propagation and on the negative effects of its degradation . The model fits SARS-CoV-2 fatality rate across age and gender with high accuracy (r^2>0.9) . Rescaling the model parameters with the binding rates of the spike proteins of SARS-CoV and SARS-CoV-2 allows predicting the fatality rate of SARS-CoV across age and gender, in particular its higher severity for young patients, thus linking the molecular and epidemiological levels. These results support the suggestion that drugs that enhance the expression of ACE2, such as ACE inhibitors and angiotensin receptor blockers , constitute a promising therapy against the most adverse effects of CoViD-19 . Furthermore, ACE2 is a candidate prognostic factor for detecting population that needs stronger protection.", "after_revision": "The fatality rate of Covid-19 escalates with age and is larger in men than women. I show that these variations correlate strongly with the level of the viral receptor protein ACE2 in rat lungs, which is consistent with the still limited and apparently contradictory data on human ACE2. Surprisingly, lower levels of the receptor correlate with higher fatality. However, a previous mathematical model predicts that the speed of viral progression in URLanism has a maximum and then declines with the receptor level. Moreover, many manifestations of severe CoViD-19, such as severe lung injury, exacerbated inflammatory response and thrombotic problems may derive from increased Angiotensin II (Ang-II) level that results from degradation of ACE2 by the virus. I present here a mathematical model based on the influence of ACE2 on viral propagation and disease severity . The model fits Covid-19 fatality rate across age and sex with high accuracy (r^2>0.9) under the hypothesis that SARS-CoV-2 infections are in the dynamical regimes in which increased receptor slows down viral propagation. Moreover, rescaling the model parameters by the ratio of the binding rates of the spike proteins of SARS-CoV and SARS-CoV-2 allows predicting the fatality rate of SARS-CoV across age and sex, thus linking the molecular and epidemiological levels. The presented model opposes the fear that angiotensin receptor blockers (ARB), suggested as a therapy against the most adverse effects of CoViD-19 , may favour viral propagation, and suggests that Ang-II and ACE2 are candidate prognostic factors for detecting population that needs stronger protection.", "edit_actions": [{"type": "R", "before": "SARS-Cov-2", "after": "Covid-19", "start_char_pos": 21, "end_char_pos": 31}, {"type": "R", "before": "are strongly correlated with the levels of the ACE2 protein in the lungsbut surprisingly, despite ACE2 is", "after": "correlate strongly with", "start_char_pos": 113, "end_char_pos": 218}, {"type": "R", "before": "viral receptor, higher levels lead to lower fatality. This behaviour is consistent with", "after": "level of the viral receptor protein ACE2 in rat lungs, which is consistent with the still limited and apparently contradictory data on human ACE2. Surprisingly, lower levels of the receptor correlate with higher fatality. However,", "start_char_pos": 223, "end_char_pos": 310}, {"type": "D", "before": "that", "after": null, "start_char_pos": 341, "end_char_pos": 345}, {"type": "R", "before": "SARS-Cov-2 degrades ACE2 and thus worsens", "after": "Moreover, many manifestations of severe CoViD-19, such as severe", "start_char_pos": 460, "end_char_pos": 501}, {"type": "D", "before": "causes vasoconstriction, thrombotic problems, and", "after": null, "start_char_pos": 515, "end_char_pos": 564}, {"type": "R", "before": ". I developed", "after": "and thrombotic problems may derive from increased Angiotensin II (Ang-II) level that results from degradation of ACE2 by the virus. I present here", "start_char_pos": 599, "end_char_pos": 612}, {"type": "R", "before": "on the negative effects of its degradation", "after": "disease severity", "start_char_pos": 690, "end_char_pos": 732}, {"type": "R", "before": "SARS-CoV-2", "after": "Covid-19", "start_char_pos": 750, "end_char_pos": 760}, {"type": "R", "before": "gender", "after": "sex", "start_char_pos": 790, "end_char_pos": 796}, {"type": "R", "before": ". Rescaling", "after": "under the hypothesis that SARS-CoV-2 infections are in the dynamical regimes in which increased receptor slows down viral propagation. Moreover, rescaling", "start_char_pos": 826, "end_char_pos": 837}, {"type": "R", "before": "with the", "after": "by the ratio of the", "start_char_pos": 859, "end_char_pos": 867}, {"type": "R", "before": "gender, in particular its higher severity for young patients,", "after": "sex,", "start_char_pos": 994, "end_char_pos": 1055}, {"type": "R", "before": "These results support the suggestion that drugs that enhance the expression of ACE2, such as ACE inhibitors and", "after": "The presented model opposes the fear that", "start_char_pos": 1111, "end_char_pos": 1222}, {"type": "R", "before": ", constitute a promising", "after": "(ARB), suggested as a", "start_char_pos": 1253, "end_char_pos": 1277}, {"type": "R", "before": ". Furthermore,", "after": ", may favour viral propagation, and suggests that Ang-II and", "start_char_pos": 1331, "end_char_pos": 1345}, {"type": "R", "before": "is a candidate prognostic factor", "after": "are candidate prognostic factors", "start_char_pos": 1351, "end_char_pos": 1383}], "sents_char_pos": [0, 83, 276, 459, 600, 734, 1110]}
+{"doc_id": "2004.08444", "revision_depth": "1", "before_revision": "Approximate nearest neighbor search (ANNS) is a long-studied problem in computational geometry that has received considerable attentions by researchers in the community. In this paper, we revisit the problem in the presence of curves under the Fr\\'echet distance \\Reals . Given a set %DIFDELCMD < {\\cal %%% P of n curves of size at most m each in \\mathbb{R \\Reals and a real \\delta>0, we aim to preprocess %DIFDELCMD < {\\cal %%% P into a data structure so that for any given query curve Q of size k, report all curves in %DIFDELCMD < {\\cal %%% P whose Fr\\'echet distances to Q are at most \\delta. In case that k is known in the preprocessing stage \\eps we propose a fully deterministic data structure whose space is O(n ( 32d\\big(\\big\\{\\big(}{\\eps}}\\big) ^{ 1/2 } /\\varepsilon^3 )\\big(}{\\eps^2}}\\big) ^{ d(k+1) } ) and can answer the \\big\\}\\big) \\textsc{(1+ \\varepsilon \\eps )\\delta-ANNS} queries in O(kd) query time \\D . Considering k as part of the query slightly changes the space to O( n ( 64d^{1/2/\\varepsilon^3}%DIFDELCMD < }%%% )^{md\\big({\\eps}}\\big) with O(kd) query time within 5 (1 + \\varepsilon) approximation factor . We also \\eps show that our data structure could give an alternative treatment of the approximate subtrajectory range counting (\\textsc{ASRC ) problem studied by de Berg et al. ~\\mbox{%DIFAUXCMD \\cite{bcg-ffq-13}\\hspace{0pt}%DIFAUXCMD } [ [ \\eps\\eps .", "after_revision": "Approximate near-neighbors search (ANNS) is a long-studied problem in computational geometry . \\% that has received considerable attention by researchers in the community. In this paper, we revisit the problem and propose the first data structure for curves under the (continuous) Fr\\'echet distance in\\Reals^d . Given a set %DIFDELCMD < {\\cal %%% \\P of n curves of size at most m each in \\Reals^d, and a real fixed \\delta>0, we aim to preprocess %DIFDELCMD < {\\cal %%% \\P into a data structure so that for any given query curve Q of size k, we can efficiently report all curves in %DIFDELCMD < {\\cal %%% \\P whose Fr\\'echet distances to Q are at most \\delta. In the case that k is given in the preprocessing stage , for any\\eps>0 we propose a deterministic data structure whose space is n \\cdot O\\big(\\max\\big\\{\\big(\\frac{\\sqrt{d}{\\eps}}\\big) ^{ kd } ,\\big(\\frac{\\D\\sqrt{d}{\\eps^2}}\\big) ^{ kd } \\big\\}\\big) that can answer \\textsc{(1+ \\eps )\\delta-ANNS} queries in O(kd) query time , where\\D is the diameter of \\P . Considering k as part of the query slightly changes the space to /\\varepsilon^3}%DIFDELCMD < }%%% n \\cdot O\\big(\\frac{1{\\eps}}\\big)^{md with O(kd) query time within an approximation factor of 5 + \\eps. We show that our generic data structure for ANNS can give an alternative treatment of the approximate subtrajectory range \\textsc{ searching problem studied by de Berg et al. }\\hspace{0pt}%DIFAUXCMD } [8 . We also revisit the time-window data structure for spatial density maps in[6 . Given \\theta>0, and n time-stamped points spread over m regions in a map, for any query window W, we propose a data structure of size O(n/\\eps^2) and construction time O((n+m)/\\eps^2) that can approximately return the regions containing at least \\theta points whose times are within W in O(1) query time .", "edit_actions": [{"type": "R", "before": "nearest neighbor", "after": "near-neighbors", "start_char_pos": 12, "end_char_pos": 28}, {"type": "A", "before": null, "after": ". \\%", "start_char_pos": 95, "end_char_pos": 95}, {"type": "R", "before": "attentions", "after": "attention", "start_char_pos": 127, "end_char_pos": 137}, {"type": "R", "before": "in the presence of", "after": "and propose the first data structure for", "start_char_pos": 209, "end_char_pos": 227}, {"type": "A", "before": null, "after": "(continuous)", "start_char_pos": 245, "end_char_pos": 245}, {"type": "A", "before": null, "after": "in", "start_char_pos": 265, "end_char_pos": 265}, {"type": "A", "before": null, "after": "^d", "start_char_pos": 271, "end_char_pos": 271}, {"type": "R", "before": "P", "after": "\\P", "start_char_pos": 309, "end_char_pos": 310}, {"type": "D", "before": "\\mathbb{R", "after": null, "start_char_pos": 349, "end_char_pos": 358}, {"type": "A", "before": null, "after": "^d,", "start_char_pos": 365, "end_char_pos": 365}, {"type": "A", "before": null, "after": "fixed", "start_char_pos": 377, "end_char_pos": 377}, {"type": "R", "before": "P", "after": "\\P", "start_char_pos": 432, "end_char_pos": 433}, {"type": "A", "before": null, "after": "we can efficiently", "start_char_pos": 503, "end_char_pos": 503}, {"type": "R", "before": "P", "after": "\\P", "start_char_pos": 548, "end_char_pos": 549}, {"type": "A", "before": null, "after": "the", "start_char_pos": 604, "end_char_pos": 604}, {"type": "R", "before": "known", "after": "given", "start_char_pos": 620, "end_char_pos": 625}, {"type": "A", "before": null, "after": ", for any", "start_char_pos": 653, "end_char_pos": 653}, {"type": "A", "before": null, "after": ">0", "start_char_pos": 657, "end_char_pos": 657}, {"type": "D", "before": "fully", "after": null, "start_char_pos": 671, "end_char_pos": 676}, {"type": "D", "before": "O(n (", "after": null, "start_char_pos": 721, "end_char_pos": 726}, {"type": "R", "before": "32d", "after": "n \\cdot O", "start_char_pos": 727, "end_char_pos": 730}, {"type": "A", "before": null, "after": "\\max", "start_char_pos": 735, "end_char_pos": 735}, {"type": "A", "before": null, "after": "\\frac{\\sqrt{d", "start_char_pos": 746, "end_char_pos": 746}, {"type": "R", "before": "1/2", "after": "kd", "start_char_pos": 763, "end_char_pos": 766}, {"type": "D", "before": "/\\varepsilon^3", "after": null, "start_char_pos": 769, "end_char_pos": 783}, {"type": "R", "before": ")", "after": ",", "start_char_pos": 784, "end_char_pos": 785}, {"type": "A", "before": null, "after": "\\frac{\\D\\sqrt{d", "start_char_pos": 790, "end_char_pos": 790}, {"type": "R", "before": "d(k+1)", "after": "kd", "start_char_pos": 809, "end_char_pos": 815}, {"type": "D", "before": ") and can answer the", "after": null, "start_char_pos": 818, "end_char_pos": 838}, {"type": "A", "before": null, "after": "that can answer", "start_char_pos": 851, "end_char_pos": 851}, {"type": "D", "before": "\\varepsilon", "after": null, "start_char_pos": 864, "end_char_pos": 875}, {"type": "A", "before": null, "after": ", where", "start_char_pos": 923, "end_char_pos": 923}, {"type": "A", "before": null, "after": "is the diameter of \\P", "start_char_pos": 926, "end_char_pos": 926}, {"type": "D", "before": "O( n (", "after": null, "start_char_pos": 994, "end_char_pos": 1000}, {"type": "D", "before": "64d^{1/2", "after": null, "start_char_pos": 1001, "end_char_pos": 1009}, {"type": "R", "before": ")^{md", "after": "n \\cdot O", "start_char_pos": 1042, "end_char_pos": 1047}, {"type": "A", "before": null, "after": "\\frac{1", "start_char_pos": 1052, "end_char_pos": 1052}, {"type": "A", "before": null, "after": "^{md", "start_char_pos": 1064, "end_char_pos": 1064}, {"type": "A", "before": null, "after": "an approximation factor of", "start_char_pos": 1094, "end_char_pos": 1094}, {"type": "D", "before": "(1", "after": null, "start_char_pos": 1097, "end_char_pos": 1099}, {"type": "D", "before": "\\varepsilon) approximation factor . We also", "after": null, "start_char_pos": 1102, "end_char_pos": 1145}, {"type": "A", "before": null, "after": ". We", "start_char_pos": 1150, "end_char_pos": 1150}, {"type": "R", "before": "data structure could", "after": "generic data structure for ANNS can", "start_char_pos": 1165, "end_char_pos": 1185}, {"type": "D", "before": "counting (", "after": null, "start_char_pos": 1255, "end_char_pos": 1265}, {"type": "D", "before": "ASRC", "after": null, "start_char_pos": 1273, "end_char_pos": 1277}, {"type": "R", "before": ")", "after": "searching", "start_char_pos": 1278, "end_char_pos": 1279}, {"type": "D", "before": "~\\mbox{%DIFAUXCMD \\cite{bcg-ffq-13", "after": null, "start_char_pos": 1314, "end_char_pos": 1348}, {"type": "A", "before": null, "after": "8", "start_char_pos": 1375, "end_char_pos": 1375}, {"type": "A", "before": null, "after": ". We also revisit the time-window data structure for spatial density maps in", "start_char_pos": 1376, "end_char_pos": 1376}, {"type": "A", "before": null, "after": "6", "start_char_pos": 1377, "end_char_pos": 1377}, {"type": "A", "before": null, "after": ". Given \\theta>0, and n time-stamped points spread over m regions in a map, for any query window W, we propose a data structure of size O(n/", "start_char_pos": 1378, "end_char_pos": 1378}, {"type": "A", "before": null, "after": "^2) and construction time O((n+m)/", "start_char_pos": 1382, "end_char_pos": 1382}, {"type": "A", "before": null, "after": "^2) that can approximately return the regions containing at least \\theta points whose times are within W in O(1) query time", "start_char_pos": 1386, "end_char_pos": 1386}], "sents_char_pos": [0, 170, 600, 759, 1137, 1313]}
+{"doc_id": "2004.10117", "revision_depth": "2", "before_revision": "In Coronavirus disease 2019 (COVID-19), the initial viral replication phase is often followed by a hyperinflammatory reaction in the lungs and URLan systems ('cytokine storm syndrome') that leads to acute respiratory distress syndrome (ARDS), URLan failure, and death- despite maximal supportive care. Preventing hyperinflammation is key to avoiding progression to severe stages of COVID-19. We have previously demonstrated that alpha-1 adrenergic receptor (\\alpha_1-AR) antagonists can prevent cytokine storm syndrome and resulting death in mice. Here, we present a retrospective study of outcomes in patients with acute respiratory distress (n = 13,125) or pneumonia (n = 108,956) . Patients with acute respiratory distress who were taking \\alpha_1-AR antagonists for other conditions had a 35\\% reduced risk of requiring ventilation , and a 56\\% reduced risk of ventilation and death, compared to non-users (adjusted OR = 0.41 , 95\\% CI 0.17-0.81, p = 0.01). By contrast, no significant effect was observed for beta-adrenergic receptor (\\beta-AR) antagonists . These results support studying \\alpha_1-AR antagonists for preventing ARDS and reducing mortality in pneumonia and acute respiratory distress, as well as highlight the need for prospective trials of \\alpha_1-AR antagonists to assess their efficacy in preventing cytokine storm syndrome and death in COVID-19.", "after_revision": "In severe pneumonias, including Coronavirus disease 2019 (COVID-19), the viral replication phase is often followed by a hyperinflammatory reaction ('cytokine storm syndrome') that leads to acute respiratory distress syndrome and death, despite maximal supportive care. Preventing hyperinflammation is key to avoiding these outcomes. We previously demonstrated that alpha-1 adrenergic receptor antagonists (\\alpha-blockers) can prevent cytokine storm syndrome and death in mice. Here, we conduct a retrospective analysis of patients with acute respiratory distress (n = 13,125) or pneumonia (n = 108,956) from all causes; patients who were incidentally taking \\alpha-blockers had a reduced risk of requiring ventilation (by 35\\% and 16\\%, respectively), and a reduced risk of being ventilated and dying (by 56\\% and 20\\%, respectively) , compared to non-users . Beta-adrenergic receptor antagonists had no significant effects. These results highlight the urgent need for prospective trials testing whether prophylactic \\alpha-blockers improve outcomes in diseases with a prominent hyperinflammatory component such as COVID-19.", "edit_actions": [{"type": "A", "before": null, "after": "severe pneumonias, including", "start_char_pos": 3, "end_char_pos": 3}, {"type": "D", "before": "initial", "after": null, "start_char_pos": 45, "end_char_pos": 52}, {"type": "D", "before": "in the lungs and URLan systems", "after": null, "start_char_pos": 127, "end_char_pos": 157}, {"type": "R", "before": "(ARDS), URLan failure, and death-", "after": "and death,", "start_char_pos": 236, "end_char_pos": 269}, {"type": "R", "before": "progression to severe stages of COVID-19. We have", "after": "these outcomes. We", "start_char_pos": 351, "end_char_pos": 400}, {"type": "R", "before": "(\\alpha_1-AR) antagonists", "after": "antagonists (\\alpha-blockers)", "start_char_pos": 458, "end_char_pos": 483}, {"type": "D", "before": "resulting", "after": null, "start_char_pos": 524, "end_char_pos": 533}, {"type": "R", "before": "present a retrospective study of outcomes in", "after": "conduct a retrospective analysis of", "start_char_pos": 558, "end_char_pos": 602}, {"type": "R", "before": ". Patients with acute respiratory distress who were taking \\alpha_1-AR antagonists for other conditions had a 35\\%", "after": "from all causes; patients who were incidentally taking \\alpha-blockers had a", "start_char_pos": 684, "end_char_pos": 798}, {"type": "R", "before": ", and a 56\\%", "after": "(by 35\\% and 16\\%, respectively), and a", "start_char_pos": 837, "end_char_pos": 849}, {"type": "R", "before": "ventilation and death, compared to non-users (adjusted OR = 0.41", "after": "being ventilated and dying (by 56\\% and 20\\%, respectively)", "start_char_pos": 866, "end_char_pos": 930}, {"type": "R", "before": "95\\% CI 0.17-0.81, p = 0.01). By contrast, no significant effect was observed for beta-adrenergic receptor (\\beta-AR) antagonists", "after": "compared to non-users", "start_char_pos": 933, "end_char_pos": 1062}, {"type": "A", "before": null, "after": "Beta-adrenergic receptor antagonists had no significant effects.", "start_char_pos": 1065, "end_char_pos": 1065}, {"type": "R", "before": "support studying \\alpha_1-AR antagonists for preventing ARDS and reducing mortality in pneumonia and acute respiratory distress, as well as highlight the", "after": "highlight the urgent", "start_char_pos": 1080, "end_char_pos": 1233}, {"type": "R", "before": "of \\alpha_1-AR antagonists to assess their efficacy in preventing cytokine storm syndrome and death in", "after": "testing whether prophylactic \\alpha-blockers improve outcomes in diseases with a prominent hyperinflammatory component such as", "start_char_pos": 1262, "end_char_pos": 1364}], "sents_char_pos": [0, 302, 392, 548, 685, 962, 1064]}
+{"doc_id": "2004.10282", "revision_depth": "1", "before_revision": "We introduce a learning-based strategy for multi-modal registration of images acquired with any modality, without requiring real dataduring training . While classical registration methods can accurately align multi-modal image pairs , they solve a costly optimization problem for every new pairof images . Learning-based techniques are fast at test time, but can only register images of the specific anatomy and modalities they were trained on . In contrast, our approach leverages a generative model to synthesize label maps and gray-scale images that expose a network to a wide range of anatomy and contrast during training. We demonstrate that this strategy enables robust registration of arbitrary modalities, without the need to retrain for a new modality. Critically, we show that input labels need not be of actual anatomy: training on randomly synthesized shapes , or supervoxels, results in competitive registration performance and makes the network agnostic to anatomy and contrast, all while eradicating the need for real data . We present extensive experiments demonstrating that this strategy enables registration of modalities not seen during training and surpasses the state of art in cross-contrast registration . Our code is integrated with the VoxelMorph library at: URL", "after_revision": "We introduce a learning strategy for contrast-invariant image registration without requiring imaging data . While classical registration methods accurately estimate the spatial correspondence between images , they solve a costly optimization problem for every image pair . Learning-based techniques are fast at test time, but can only register images with image contrast and geometric content that are similar to those available during training. We focus on removing this image-data dependency of learning methods. Our approach leverages a generative model for diverse label maps and images that exposes networks to a wide range of variability during training, forcing them to learn features invariant to image type (contrast). This strategy results in powerful networks trained to generalize to a broad array of real input images. We present extensive experiments, with a focus on 3D neuroimaging, showing that this strategy enables robust registration of arbitrary image contrasts without the need to retrain for new modalities. We demonstrate registration accuracy that most often surpasses the state of the art both within and across modalities, using a single model. Critically, we show that input labels from which we synthesize images need not be of actual anatomy: training on randomly generated geometric shapes also results in competitive registration performance , albeit slightly less accurate, while alleviating the dependency on real data of any kind . Our code is available at: URL", "edit_actions": [{"type": "R", "before": "learning-based strategy for multi-modal registration of images acquired with any modality, without requiring real dataduring training", "after": "learning strategy for contrast-invariant image registration without requiring imaging data", "start_char_pos": 15, "end_char_pos": 148}, {"type": "R", "before": "can accurately align multi-modal image pairs", "after": "accurately estimate the spatial correspondence between images", "start_char_pos": 188, "end_char_pos": 232}, {"type": "R", "before": "new pairof images", "after": "image pair", "start_char_pos": 286, "end_char_pos": 303}, {"type": "R", "before": "of the specific anatomy and modalities they were trained on . In contrast, our", "after": "with image contrast and geometric content that are similar to those available during training. We focus on removing this image-data dependency of learning methods. Our", "start_char_pos": 384, "end_char_pos": 462}, {"type": "R", "before": "to synthesize", "after": "for diverse", "start_char_pos": 501, "end_char_pos": 514}, {"type": "R", "before": "gray-scale images that expose a network", "after": "images that exposes networks", "start_char_pos": 530, "end_char_pos": 569}, {"type": "R", "before": "anatomy and contrast during training. We demonstrate", "after": "variability during training, forcing them to learn features invariant to image type (contrast). This strategy results in powerful networks trained to generalize to a broad array of real input images. We present extensive experiments, with a focus on 3D neuroimaging, showing", "start_char_pos": 589, "end_char_pos": 641}, {"type": "R", "before": "modalities,", "after": "image contrasts", "start_char_pos": 702, "end_char_pos": 713}, {"type": "R", "before": "a new modality.", "after": "new modalities. We demonstrate registration accuracy that most often surpasses the state of the art both within and across modalities, using a single model.", "start_char_pos": 746, "end_char_pos": 761}, {"type": "A", "before": null, "after": "from which we synthesize images", "start_char_pos": 800, "end_char_pos": 800}, {"type": "R", "before": "synthesized shapes , or supervoxels,", "after": "generated geometric shapes also", "start_char_pos": 853, "end_char_pos": 889}, {"type": "R", "before": "and makes the network agnostic to anatomy and contrast, all while eradicating the need for real data . We present extensive experiments demonstrating that this strategy enables registration of modalities not seen during training and surpasses the state of art in cross-contrast registration", "after": ", albeit slightly less accurate, while alleviating the dependency on real data of any kind", "start_char_pos": 938, "end_char_pos": 1228}, {"type": "R", "before": "integrated with the VoxelMorph library", "after": "available", "start_char_pos": 1243, "end_char_pos": 1281}], "sents_char_pos": [0, 150, 445, 626, 761, 1040, 1230]}
+{"doc_id": "2004.11114", "revision_depth": "2", "before_revision": "While deep neural networks (DNNs) are being increasingly used to make predictions from high-dimensional, complex data , they are widely seen as uninterpretable \"black boxes\", since it can be difficult to discover what input information is used to make predictions. This ability is particularly important for applications in cognitive neuroscience and neuroinformatics . A saliency map is a common approach for producing interpretable visualizations of the relative importance of input features for a prediction. However, many methods for creating these maps fail due to focusing too much on the input or being extremely sensitive to small input noise . It is also challenging to quantitatively evaluate how well saliency maps correspond to the truly relevant input information . In this paper, we develop two quantitative evaluation procedures for saliency methods, using the fact that the Human Connectome Project (HCP) dataset contains functional magnetic resonance imaging (fMRI ) datafrom multiple tasks per subject to create ground truth saliency maps . We then introduce an adversarial training method that makes DNNs robust to small input noise, and demonstrate that it measurably improves interpretability .", "after_revision": "Deep neural networks (DNNs) are being increasingly used to make predictions from functional magnetic resonance imaging (fMRI) data. However , they are widely seen as uninterpretable \"black boxes\", as it can be difficult to discover what input information is used by the DNN in the process, something important in both cognitive neuroscience and clinical applications . A saliency map is a common approach for producing interpretable visualizations of the relative importance of input features for a prediction. However, methods for creating maps often fail due to DNNs being sensitive to input noise, or by focusing too much on the input and too little on the model . It is also challenging to evaluate how well saliency maps correspond to the truly relevant input information , as ground truth is not always available . In this paper, we review a variety of methods for producing gradient-based saliency maps, and present a new adversarial training method we developed to make DNNs robust to input noise, with the goal of improving interpretability. We introduce two quantitative evaluation procedures for saliency map methods in fMRI, applicable whenever a DNN or linear model is being trained to decode some information from imaging data. We evaluate the procedures using a synthetic dataset where the complex activation structure is known, and on saliency maps produced for DNN and linear models for task decoding in the Human Connectome Project (HCP) dataset . Our key finding is that saliency maps produced with different methods vary widely in interpretability, in both in synthetic and HCP fMRI data. Strikingly, even when DNN and linear models decode at comparable levels of performance, DNN saliency maps score higher on interpretability than linear model saliency maps (derived via weights or gradient). Finally, saliency maps produced with our adversarial training method outperform those from other methods .", "edit_actions": [{"type": "R", "before": "While deep", "after": "Deep", "start_char_pos": 0, "end_char_pos": 10}, {"type": "R", "before": "high-dimensional, complex data", "after": "functional magnetic resonance imaging (fMRI) data. However", "start_char_pos": 87, "end_char_pos": 117}, {"type": "R", "before": "since", "after": "as", "start_char_pos": 175, "end_char_pos": 180}, {"type": "R", "before": "to make predictions. This ability is particularly important for applications in", "after": "by the DNN in the process, something important in both", "start_char_pos": 244, "end_char_pos": 323}, {"type": "R", "before": "neuroinformatics", "after": "clinical applications", "start_char_pos": 351, "end_char_pos": 367}, {"type": "D", "before": "many", "after": null, "start_char_pos": 521, "end_char_pos": 525}, {"type": "R", "before": "these maps", "after": "maps often", "start_char_pos": 547, "end_char_pos": 557}, {"type": "A", "before": null, "after": "DNNs being sensitive to input noise, or by", "start_char_pos": 570, "end_char_pos": 570}, {"type": "R", "before": "or being extremely sensitive to small input noise", "after": "and too little on the model", "start_char_pos": 602, "end_char_pos": 651}, {"type": "D", "before": "quantitatively", "after": null, "start_char_pos": 680, "end_char_pos": 694}, {"type": "A", "before": null, "after": ", as ground truth is not always available", "start_char_pos": 778, "end_char_pos": 778}, {"type": "R", "before": "develop", "after": "review a variety of methods for producing gradient-based saliency maps, and present a new adversarial training method we developed to make DNNs robust to input noise, with the goal of improving interpretability. We introduce", "start_char_pos": 799, "end_char_pos": 806}, {"type": "R", "before": "methods, using", "after": "map methods in fMRI, applicable whenever a DNN or linear model is being trained to decode some information from imaging data. We evaluate the procedures using a synthetic dataset where the complex activation structure is known, and on saliency maps produced for DNN and linear models for task decoding in", "start_char_pos": 859, "end_char_pos": 873}, {"type": "D", "before": "fact that the", "after": null, "start_char_pos": 878, "end_char_pos": 891}, {"type": "R", "before": "contains functional magnetic resonance imaging (fMRI ) datafrom multiple tasks per subject to create ground truth saliency maps . We then introduce an", "after": ". Our key finding is that saliency maps produced with different methods vary widely in interpretability, in both in synthetic and HCP fMRI data. Strikingly, even when DNN and linear models decode at comparable levels of performance, DNN saliency maps score higher on interpretability than linear model saliency maps (derived via weights or gradient). Finally, saliency maps produced with our", "start_char_pos": 931, "end_char_pos": 1081}, {"type": "R", "before": "that makes DNNs robust to small input noise, and demonstrate that it measurably improves interpretability", "after": "outperform those from other methods", "start_char_pos": 1110, "end_char_pos": 1215}], "sents_char_pos": [0, 264, 369, 511, 653, 780, 1060]}
+{"doc_id": "2004.13102", "revision_depth": "1", "before_revision": "In many high-stakes domains such as criminal justice, finance, and healthcare, AI systems may recommend actions to a human expert responsible for final decisions, a context known as AI-advised decision making. When AI practitioners deploy the most accurate system in these domains, they implicitly assume that the system will function alone in the world. We argue that the most accurate AI team-mate is not necessarily the em best teammate; for example, predictable performance is worth a slight sacrifice in AI accuracy. So, we propose training AI systems in a human-centered manner and directly optimizing for team performance. We study this proposal for a specific type of human-AI team , where the human overseer chooses to accept the AI recommendation or solve the task themselves. To optimize the team performance we maximize the team's expected utility, expressed in terms of quality of the final decision, cost of verifying, and individual accuracies . Our experiments with linear and non-linear models on real-world, high-stakes datasets show that the improvements in utility while being small and varying across datasetsand parameters (such as cost of mistake), are real and consistent with our definition of team utility . We discuss the shortcoming of current optimization approaches beyond well-studied loss functions such as log-loss, and encourage future work on human-centered optimization problems motivated by human-AI collaborations .", "after_revision": "AI practitioners typically strive to develop the most accurate systems, making an implicit assumption that the AI system will function autonomously. However, in practice, AI systems often are used to provide advice to people in domains ranging from criminal justice and finance to healthcare. In such AI-advised decision making, humans and machines form a team, where the human is responsible for making final decisions. But is the most accurate AI the best teammate? We argue \"No\" -- predictable performance may be worth a slight sacrifice in AI accuracy. Instead, we argue that AI systems should be trained in a human-centered manner , directly optimized for team performance. We study this proposal for a specific type of human-AI teaming , where the human overseer chooses to either accept the AI recommendation or solve the task themselves. To optimize the team performance for this setting we maximize the team's expected utility, expressed in terms of the quality of the final decision, cost of verifying, and individual accuracies of people and machines . Our experiments with linear and non-linear models on real-world, high-stakes datasets show that the most accuracy AI may not lead to highest team performance and show the benefit of modeling teamwork during training through improvements in expected team utility across datasets, considering parameters such as human skill and the cost of mistakes . We discuss the shortcoming of current optimization approaches beyond well-studied loss functions such as log-loss, and encourage future work on AI optimization problems motivated by human-AI collaboration .", "edit_actions": [{"type": "R", "before": "In many high-stakes domains such as criminal justice, finance, and healthcare, AI systems may recommend actions to a human expert responsible for final decisions, a context known as AI-advised decision making. When AI practitioners deploy", "after": "AI practitioners typically strive to develop", "start_char_pos": 0, "end_char_pos": 238}, {"type": "R", "before": "system in these domains, they implicitly assume that the", "after": "systems, making an implicit assumption that the AI", "start_char_pos": 257, "end_char_pos": 313}, {"type": "R", "before": "alone in", "after": "autonomously. However, in practice, AI systems often are used to provide advice to people in domains ranging from criminal justice and finance to healthcare. In such AI-advised decision making, humans and machines form a team, where the human is responsible for making final decisions. But is", "start_char_pos": 335, "end_char_pos": 343}, {"type": "D", "before": "world. We argue that the", "after": null, "start_char_pos": 348, "end_char_pos": 372}, {"type": "R", "before": "team-mate is not necessarily the em best teammate; for example, predictable performance is", "after": "the best teammate? We argue \"No\" -- predictable performance may be", "start_char_pos": 390, "end_char_pos": 480}, {"type": "R", "before": "So, we propose training AI systems", "after": "Instead, we argue that AI systems should be trained", "start_char_pos": 522, "end_char_pos": 556}, {"type": "R", "before": "and directly optimizing", "after": ", directly optimized", "start_char_pos": 584, "end_char_pos": 607}, {"type": "R", "before": "team", "after": "teaming", "start_char_pos": 685, "end_char_pos": 689}, {"type": "A", "before": null, "after": "either", "start_char_pos": 728, "end_char_pos": 728}, {"type": "A", "before": null, "after": "for this setting", "start_char_pos": 821, "end_char_pos": 821}, {"type": "A", "before": null, "after": "the", "start_char_pos": 885, "end_char_pos": 885}, {"type": "A", "before": null, "after": "of people and machines", "start_char_pos": 962, "end_char_pos": 962}, {"type": "R", "before": "improvements in utility while being small and varying across datasetsand parameters (such as cost of mistake), are real and consistent with our definition of team utility", "after": "most accuracy AI may not lead to highest team performance and show the benefit of modeling teamwork during training through improvements in expected team utility across datasets, considering parameters such as human skill and the cost of mistakes", "start_char_pos": 1065, "end_char_pos": 1235}, {"type": "R", "before": "human-centered", "after": "AI", "start_char_pos": 1382, "end_char_pos": 1396}, {"type": "R", "before": "collaborations", "after": "collaboration", "start_char_pos": 1441, "end_char_pos": 1455}], "sents_char_pos": [0, 209, 354, 440, 521, 629, 787, 964, 1237]}
+{"doc_id": "2004.13536", "revision_depth": "1", "before_revision": "For the sake of extracting hidden mutual and coupled information from possibly uncoupled time-series, we explored the profound measures of network science on time-series . Alongside common methods in time-series analysis of coupling between financial and economic markets, mapping coupled time-series onto networks is an outstanding measure to provide insight into hidden aspects embedded in couplings intrinsically. In this manner, we discretize the amplitude of coupled time-series and investigate relative simultaneous locations of the corresponding amplitudes(nodes). The transmissions between simultaneous amplitudes are clarified by edges in the network. In this sense, by segmenting magnitudes, the scaling features, volatilities' size and also the direction of the coupled amplitudes can be described. The frequency of occurrences of the coupled amplitudes is illustrated by the weighted edges, that is to say, some coupled amplitudes in the time-series can be identified as communities in the network . The results show that despite apparently uncoupled joint probabilities, the couplings possess some aspects which diverge from random Gaussian noise. Thereby, with the aid of the network's topological and statistical measurements , we distinguished basic structures of coupling of cross-market networks. Meanwhile, it was discovered that even two possibly known uncoupled markets may possess coupled patterns with each other. Thereby, those markets should be examined as coupled and weakly coupled markets! \\textit{ ", "after_revision": "In order to extract hidden joint information from two possibly uncorrelated time-series, we explored the measures of network science . Alongside common methods in time-series analysis of the economic markets, mapping the joint structure of two time-series onto a network provides insight into hidden aspects embedded in the couplings. We discretize the amplitude of two time-series and investigate relative simultaneous locations of those amplitudes. Each segment of a discretized amplitude is considered as a node. The simultaneity of the amplitudes of the two time-series is considered as the edges in the network. The frequency of occurrences forms the weighted edges. In order to extract information, we need to measure that to what extent the coupling deviates from the coupling of two uncoupled series. Also, we need to measure that to what extent the couplings inherit their characteristics from a Gaussian distribution or a non-Gaussian distribution. We mapped the network from two surrogate time-series . The results show that the couplings of markets possess some features which diverge from the same features of the network mapped from white noise, and from the network mapped from two surrogate time-series. These deviations prove that there exist joint information and cross-correlation therein. By applying the network's topological and statistical measures and the deformation ratio in the joint probability distribution , we distinguished basic structures of cross-correlation and coupling of cross-markets. It was discovered that even two possibly known uncorrelated markets may possess some joint patterns with each other. Thereby, those markets should be examined as coupled and \\textit{weakly coupled markets.", "edit_actions": [{"type": "R", "before": "For the sake of extracting hidden mutual and coupled information from possibly uncoupled", "after": "In order to extract hidden joint information from two possibly uncorrelated", "start_char_pos": 0, "end_char_pos": 88}, {"type": "D", "before": "profound", "after": null, "start_char_pos": 118, "end_char_pos": 126}, {"type": "D", "before": "on time-series", "after": null, "start_char_pos": 155, "end_char_pos": 169}, {"type": "R", "before": "coupling between financial and", "after": "the", "start_char_pos": 224, "end_char_pos": 254}, {"type": "R", "before": "coupled", "after": "the joint structure of two", "start_char_pos": 281, "end_char_pos": 288}, {"type": "R", "before": "networks is an outstanding measure to provide", "after": "a network provides", "start_char_pos": 306, "end_char_pos": 351}, {"type": "R", "before": "couplings intrinsically. In this manner, we", "after": "the couplings. We", "start_char_pos": 392, "end_char_pos": 435}, {"type": "R", "before": "coupled", "after": "two", "start_char_pos": 464, "end_char_pos": 471}, {"type": "R", "before": "the corresponding amplitudes(nodes). The transmissions between simultaneous amplitudes are clarified by", "after": "those amplitudes. Each segment of a discretized amplitude is considered as a node. The simultaneity of the amplitudes of the two time-series is considered as the", "start_char_pos": 535, "end_char_pos": 638}, {"type": "D", "before": "In this sense, by segmenting magnitudes, the scaling features, volatilities' size and also the direction of the coupled amplitudes can be described.", "after": null, "start_char_pos": 661, "end_char_pos": 809}, {"type": "R", "before": "of the coupled amplitudes is illustrated by the weighted edges, that is to say, some coupled amplitudes in the", "after": "forms the weighted edges. In order to extract information, we need to measure that to what extent the coupling deviates from the coupling of two uncoupled series. Also, we need to measure that to what extent the couplings inherit their characteristics from a Gaussian distribution or a non-Gaussian distribution. We mapped the network from two surrogate", "start_char_pos": 839, "end_char_pos": 949}, {"type": "D", "before": "can be identified as communities in the network", "after": null, "start_char_pos": 962, "end_char_pos": 1009}, {"type": "R", "before": "despite apparently uncoupled joint probabilities, the couplings possess some aspects", "after": "the couplings of markets possess some features", "start_char_pos": 1034, "end_char_pos": 1118}, {"type": "R", "before": "random Gaussian noise. Thereby, with the aid of", "after": "the same features of the network mapped from white noise, and from the network mapped from two surrogate time-series. These deviations prove that there exist joint information and cross-correlation therein. By applying", "start_char_pos": 1138, "end_char_pos": 1185}, {"type": "R", "before": "measurements", "after": "measures and the deformation ratio in the joint probability distribution", "start_char_pos": 1228, "end_char_pos": 1240}, {"type": "R", "before": "coupling of cross-market networks. Meanwhile, it", "after": "cross-correlation and coupling of cross-markets. It", "start_char_pos": 1280, "end_char_pos": 1328}, {"type": "R", "before": "uncoupled", "after": "uncorrelated", "start_char_pos": 1373, "end_char_pos": 1382}, {"type": "R", "before": "coupled", "after": "some joint", "start_char_pos": 1403, "end_char_pos": 1410}, {"type": "D", "before": "weakly coupled markets!", "after": null, "start_char_pos": 1494, "end_char_pos": 1517}, {"type": "A", "before": null, "after": "weakly", "start_char_pos": 1526, "end_char_pos": 1526}, {"type": "A", "before": null, "after": "coupled markets.", "start_char_pos": 1527, "end_char_pos": 1527}], "sents_char_pos": [0, 171, 416, 571, 660, 809, 1011, 1160, 1314, 1436, 1517]}
+{"doc_id": "2004.13614", "revision_depth": "1", "before_revision": "Assessing the impacts of COVID-19 are of paramount importance for global sustainability. Using a coordinated set of high-resolution sectoral assessment tools, we report a decrease of 4.2\\% in global CO_2 emission in first quarter of 2020. Our emission estimatesreflect near real time inventories of emissions } from power generation , transportation, industry, international aviation and maritime sectors in 34 countries that account for >70\\% of world energy-related CO2 emissions in recent years. Regional variations in CO_2 emissions are significant, with a decrease in China (-9.3\\% ) , US (-3.0 \\%), Europe ( EU-27 & UK)(-3.3\\%) and India (-2.4\\%) , respectively. The decline of short-lived gaseous pollutants, such as NO_2 concentration observed by Satellites (-25.73\\%for China, -4.76\\%for US) and ground observations (-23\\%for China)is consistent with the estimates based on energy activity (-23.94\\% for China, -3.52\\% for US), but the decline is not seen in satellite assessments of aerosol optical depth (AOD) or dry column CO_2 (XCO_2). With fast recovery and partial re-opening of national economies, our findings suggest that total annual emissions may drop far less than previously estimated (e.g. , by 25\\%for China and more than 5\\%for the whole world) . However, the longer-term effects on CO_2 emissions are unknown and should be carefully monitored using multiple measures .", "after_revision": "The unprecedented cessation of human activities during the COVID-19 pandemic has affected global energy use and CO2 emissions from fossil fuel use and cement production. Here we show that the decrease in global fossil CO2 emissions during the first quarter of 2020 was of 5.8\\% (542 Mt CO2 with a 20\\% 1- \\sigma} uncertainty). Unlike other emerging estimates, ours show the temporal dynamics of emissions based on actual emissions data from power generation (for 29 countries) and industry (for 73 countries), on near real time activity data for road transportation (for 132 countries), aviation and maritime transportation, and on heating degree days for commercial and residential sectors emissions (for 206 countries). These dynamic estimates cover all of the human induced CO2 emissions from fossil fuel combustion and cement production. The largest share of COVID-related decreases in emissions are due to decreases in industry (157.9 Mt CO2 , -7.1\\% compared to 2019), followed by road transportation (145.7 Mt CO2, -8.3 \\%), power generation (131.6 Mt CO2, -3.8\\%), residential (47.8 Mt CO2, -3.6\\%), fishing and maritime transport (35.5Mt CO2, -13.3\\%) and aviation (33.4 Mt CO2, -8.0\\%). Regionally, decreases in emissions from China were the largest and earliest (-10.3\\%), followed by Europe ( EU-27 & UK) (-4.3\\%) and the U.S. (-4.2\\%). Relative decreases of regional CO2 emissions are consistent with regional nitrogen oxides concentrations observed by satellites and ground-based networks. Despite the unprecedented decreases in CO2 emissions and comparable decreases in economic activities, we monitored decreases in the carbon intensity (Emission per unit of GDP) in China (3.5\\%) , the U.S. (4.5\\%) and Europe (5.4\\%) over the first quarter, suggesting that carbon-intensive activities have been disproportionally impacted .", "edit_actions": [{"type": "R", "before": "Assessing the impacts of", "after": "The unprecedented cessation of human activities during the", "start_char_pos": 0, "end_char_pos": 24}, {"type": "R", "before": "are of paramount importance for global sustainability. Using a coordinated set of high-resolution sectoral assessment tools, we report a decrease of 4.2\\% in global CO_2 emission in", "after": "pandemic has affected global energy use and CO2 emissions from fossil fuel use and cement production. Here we show that the decrease in global fossil CO2 emissions during the", "start_char_pos": 34, "end_char_pos": 215}, {"type": "R", "before": "2020. Our emission estimatesreflect near real time inventories of emissions", "after": "2020 was of 5.8\\% (542 Mt CO2 with a 20\\% 1-", "start_char_pos": 233, "end_char_pos": 308}, {"type": "A", "before": null, "after": "\\sigma", "start_char_pos": 309, "end_char_pos": 309}, {"type": "A", "before": null, "after": "uncertainty). Unlike other emerging estimates, ours show the temporal dynamics of emissions based on actual emissions data", "start_char_pos": 311, "end_char_pos": 311}, {"type": "R", "before": ", transportation, industry, international", "after": "(for 29 countries) and industry (for 73 countries), on near real time activity data for road transportation (for 132 countries),", "start_char_pos": 334, "end_char_pos": 375}, {"type": "R", "before": "sectors in 34 countries that account for >70\\% of world energy-related", "after": "transportation, and on heating degree days for commercial and residential sectors emissions (for 206 countries). These dynamic estimates cover all of the human induced", "start_char_pos": 398, "end_char_pos": 468}, {"type": "R", "before": "in recent years. Regional variations in CO_2 emissions are significant, with a decrease in China (-9.3\\% )", "after": "from fossil fuel combustion and cement production. The largest share of COVID-related decreases in emissions are due to decreases in industry (157.9 Mt CO2", "start_char_pos": 483, "end_char_pos": 589}, {"type": "R", "before": "US (-3.0", "after": "-7.1\\% compared to 2019), followed by road transportation (145.7 Mt CO2, -8.3", "start_char_pos": 592, "end_char_pos": 600}, {"type": "R", "before": "Europe (", "after": "power generation (131.6 Mt CO2, -3.8\\%), residential (47.8 Mt CO2, -3.6\\%), fishing and maritime transport (35.5Mt CO2, -13.3\\%) and aviation (33.4 Mt CO2, -8.0\\%). Regionally, decreases in emissions from China were the largest and earliest (-10.3\\%), followed by Europe (", "start_char_pos": 606, "end_char_pos": 614}, {"type": "R", "before": "UK)(-3.3\\%)", "after": "UK) (-4.3\\%)", "start_char_pos": 623, "end_char_pos": 634}, {"type": "R", "before": "India (-2.4\\%)", "after": "the U.S. (-4.2\\%). Relative decreases of regional CO2 emissions are consistent with regional nitrogen oxides concentrations observed by satellites and ground-based networks. Despite the unprecedented decreases in CO2 emissions and comparable decreases in economic activities, we monitored decreases in the carbon intensity (Emission per unit of GDP) in China (3.5\\%)", "start_char_pos": 639, "end_char_pos": 653}, {"type": "R", "before": "respectively. The decline of short-lived gaseous pollutants, such as NO_2 concentration observed by Satellites (-25.73\\%for China, -4.76\\%for US) and ground observations (-23\\%for China)is consistent with the estimates based on energy activity (-23.94\\% for China, -3.52\\% for US), but the decline is not seen in satellite assessments of aerosol optical depth (AOD) or dry column CO_2 (XCO_2). With fast recovery and partial re-opening of national economies, our findings suggest that total annual emissions may drop far less than previously estimated (e.g. , by 25\\%for China and more than 5\\%for the whole world) . However, the longer-term effects on CO_2 emissions are unknown and should be carefully monitored using multiple measures", "after": "the U.S. (4.5\\%) and Europe (5.4\\%) over the first quarter, suggesting that carbon-intensive activities have been disproportionally impacted", "start_char_pos": 656, "end_char_pos": 1393}], "sents_char_pos": [0, 88, 238, 499, 669, 1049, 1272]}
+{"doc_id": "2004.14821", "revision_depth": "1", "before_revision": "Neural machine translation (NMT) models do not work well in domains different from the training data. The standard approach to this problem is to build a small parallel data in the target domain and perform domain adaptation from a source domain where massive parallel data is available. However, domain adaptation between distant domains (e.g., subtitles and research papers) does not perform effectively because of mismatches in vocabulary; it will encounter many domain-specific unknown words (e.g., `angstrom' ) and words whose meanings shift across domains(e.g., `conductor' ). In this study, aiming to solve these vocabulary mismatches in distant domain adaptation , we propose vocabulary adaptation, a simple method for effective fine-tuning that adapts embedding layers in a given pre-trained NMT model to the target domain. Prior to fine-tuning, our method replaces word embeddings in embedding layers of the NMT model , by projecting general word embeddings induced from monolingual data in the target domain onto the source-domain embedding space. Experimental results on distant domain adaptation for English-to-Japanese translation and German-to-English translation indicate that our vocabulary adaptation improves the performance of fine-tuning by 3.6 BLEU points .", "after_revision": "Neural network methods exhibit strong performance only in a few resource-rich domains. Practitioners, therefore, employ domain adaptation from resource-rich domains that are, in most cases, distant from the target domain. Domain adaptation between distant domains (e.g., movie subtitles and research papers) , however, cannot be performed effectively due to mismatches in vocabulary; it will encounter many domain-specific words (e.g., \"angstrom\" ) and words whose meanings shift across domains(e.g., \"conductor\" ). In this study, aiming to solve these vocabulary mismatches in domain adaptation for neural machine translation (NMT) , we propose vocabulary adaptation, a simple method for effective fine-tuning that adapts embedding layers in a given pre-trained NMT model to the target domain. Prior to fine-tuning, our method replaces the embedding layers of the NMT model by projecting general word embeddings induced from monolingual data in a target domain onto a source-domain embedding space. Experimental results indicate that our method improves the performance of conventional fine-tuning by 3.86 and 3.28 BLEU points in En-Ja and De-En translation, respectively .", "edit_actions": [{"type": "R", "before": "machine translation (NMT) models do not work well in domains different from the training data. The standard approach to this problem is to build a small parallel data in the target domain and perform domain adaptation from a source domain where massive parallel data is available. However, domain", "after": "network methods exhibit strong performance only in a few resource-rich domains. Practitioners, therefore, employ domain", "start_char_pos": 7, "end_char_pos": 303}, {"type": "A", "before": null, "after": "from resource-rich domains that are, in most cases, distant from the target domain. Domain adaptation", "start_char_pos": 315, "end_char_pos": 315}, {"type": "A", "before": null, "after": "movie", "start_char_pos": 347, "end_char_pos": 347}, {"type": "R", "before": "does not perform effectively because of", "after": ", however, cannot be performed effectively due to", "start_char_pos": 379, "end_char_pos": 418}, {"type": "D", "before": "unknown", "after": null, "start_char_pos": 484, "end_char_pos": 491}, {"type": "R", "before": "`angstrom'", "after": "\"angstrom\"", "start_char_pos": 505, "end_char_pos": 515}, {"type": "R", "before": "`conductor'", "after": "\"conductor\"", "start_char_pos": 570, "end_char_pos": 581}, {"type": "R", "before": "distant domain adaptation", "after": "domain adaptation for neural machine translation (NMT)", "start_char_pos": 647, "end_char_pos": 672}, {"type": "R", "before": "word embeddings in", "after": "the", "start_char_pos": 877, "end_char_pos": 895}, {"type": "D", "before": ",", "after": null, "start_char_pos": 930, "end_char_pos": 931}, {"type": "R", "before": "the", "after": "a", "start_char_pos": 1003, "end_char_pos": 1006}, {"type": "R", "before": "the", "after": "a", "start_char_pos": 1026, "end_char_pos": 1029}, {"type": "D", "before": "on distant domain adaptation for English-to-Japanese translation and German-to-English translation", "after": null, "start_char_pos": 1082, "end_char_pos": 1180}, {"type": "R", "before": "vocabulary adaptation", "after": "method", "start_char_pos": 1199, "end_char_pos": 1220}, {"type": "A", "before": null, "after": "conventional", "start_char_pos": 1249, "end_char_pos": 1249}, {"type": "R", "before": "3.6 BLEU points", "after": "3.86 and 3.28 BLEU points in En-Ja and De-En translation, respectively", "start_char_pos": 1265, "end_char_pos": 1280}], "sents_char_pos": [0, 101, 287, 444, 584, 834, 1060]}
+{"doc_id": "2004.14870", "revision_depth": "1", "before_revision": "Morphological inflection is a process of word formation where base words are modified to express different grammatical categories such as tense, case, voice, person, or number. World Englishes , such as Colloquial Singapore English (CSE) and African American Vernacular English (AAVE), differ from Standard English dialects in inflection use . Although comprehension by human readers is usually unimpaired by non-standard inflection use, NLP systems are not so robust. We introduce a new Base-Inflection Encoding of English text that is achieved by combining linguistic and statistical techniques . Fine-tuning pre-trained NLP models for downstream tasks under this novel encoding achieves robustness to non-standard inflection use while maintaining performance on Standard English examples . Models using this encoding also generalize better to non-standard dialects without explicit training . We suggest metrics to evaluate tokenizers and extensive model-independent analyses demonstrate the efficacy of the encoding when used together with data-driven subword tokenizers .", "after_revision": "Inflectional variation is a common feature of World Englishes such as Colloquial Singapore English and African American Vernacular English . Although comprehension by human readers is usually unimpaired by non-standard inflections, current NLP systems are not yet robust. We propose Base-Inflection Encoding (BITE), a method to tokenize English text by reducing inflected words to their base forms before reinjecting the grammatical information as special symbols . Fine-tuning pretrained NLP models for downstream tasks using our encoding defends against inflectional adversaries while maintaining performance on clean data . Models using BITE generalize better to dialects with non-standard inflections without explicit training and translation models converge faster when trained with BITE. Finally, we show that our encoding improves the vocabulary efficiency of popular data-driven subword tokenizers . Since there has been no prior work on quantitatively evaluating vocabulary efficiency, we propose metrics to do so .", "edit_actions": [{"type": "R", "before": "Morphological inflection is a process of word formation where base words are modified to express different grammatical categories such as tense, case, voice, person, or number. World Englishes ,", "after": "Inflectional variation is a common feature of World Englishes", "start_char_pos": 0, "end_char_pos": 194}, {"type": "D", "before": "(CSE)", "after": null, "start_char_pos": 232, "end_char_pos": 237}, {"type": "D", "before": "(AAVE), differ from Standard English dialects in inflection use", "after": null, "start_char_pos": 278, "end_char_pos": 341}, {"type": "R", "before": "inflection use,", "after": "inflections, current", "start_char_pos": 422, "end_char_pos": 437}, {"type": "R", "before": "so", "after": "yet", "start_char_pos": 458, "end_char_pos": 460}, {"type": "R", "before": "introduce a new", "after": "propose", "start_char_pos": 472, "end_char_pos": 487}, {"type": "R", "before": "of English text that is achieved by combining linguistic and statistical techniques", "after": "(BITE), a method to tokenize English text by reducing inflected words to their base forms before reinjecting the grammatical information as special symbols", "start_char_pos": 513, "end_char_pos": 596}, {"type": "R", "before": "pre-trained", "after": "pretrained", "start_char_pos": 611, "end_char_pos": 622}, {"type": "R", "before": "under this novel encoding achieves robustness to non-standard inflection use", "after": "using our encoding defends against inflectional adversaries", "start_char_pos": 655, "end_char_pos": 731}, {"type": "R", "before": "Standard English examples", "after": "clean data", "start_char_pos": 765, "end_char_pos": 790}, {"type": "R", "before": "this encoding also", "after": "BITE", "start_char_pos": 806, "end_char_pos": 824}, {"type": "R", "before": "non-standard dialects", "after": "dialects with non-standard inflections", "start_char_pos": 846, "end_char_pos": 867}, {"type": "R", "before": ". We suggest metrics to evaluate tokenizers and extensive model-independent analyses demonstrate the efficacy of the encoding when used together with", "after": "and translation models converge faster when trained with BITE. Finally, we show that our encoding improves the vocabulary efficiency of popular", "start_char_pos": 894, "end_char_pos": 1043}, {"type": "A", "before": null, "after": ". Since there has been no prior work on quantitatively evaluating vocabulary efficiency, we propose metrics to do so", "start_char_pos": 1075, "end_char_pos": 1075}], "sents_char_pos": [0, 176, 343, 468, 598, 792, 895]}
+{"doc_id": "2004.15003", "revision_depth": "2", "before_revision": "One key principle for assessing textual similarity is measuring the degree of semantic overlap between two texts by considering the word alignment. Such alignment-based approaches are both intuitive and interpretable; however, they are empirically inferior to the simple cosine similarity between general-purpose sentence vectors. To remedy this , we focus on the fact that the norm of word vectors is a good proxy for word importance, and the angle of them is a good proxy for word similarity. Alignment-based approaches do not distinguish the norm and direction , whereas sentence-vector approaches automatically use the norm as the word importance. Accordingly, we propose to decouple word vectors into their norm and direction then computing the alignment-based similarity using earth mover's distance ( optimal transport cost), which we refer to as word rotator's distance. Furthermore, we demonstrate how to grow the norm and direction of word vectors (vector converter) ; this is a new systematic approach derived from the sentence-vector estimation methods , which can significantly improve the performance of the proposed method . On several STS benchmarks, our simple proposed methods outperformed not only alignment-based approaches but also strong baselines. ", "after_revision": "A key principle in assessing textual similarity is measuring the degree of semantic overlap between two texts by considering the word alignment. Such alignment-based approaches are intuitive and interpretable; however, they are empirically inferior to the simple cosine similarity between general-purpose sentence vectors. To address this issue , we focus on and demonstrate the fact that the norm of word vectors is a good proxy for word importance, and their angle is a good proxy for word similarity. Alignment-based approaches do not distinguish them , whereas sentence-vector approaches automatically use the norm as the word importance. Accordingly, we propose a method that first decouples word vectors into their norm and direction , and then computes alignment-based similarity using earth mover's distance ( i.e., optimal transport cost), which we refer to as word rotator's distance. Besides, we find how to grow the norm and direction of word vectors (vector converter) , which is a new systematic approach derived from sentence-vector estimation methods . On several textual similarity datasets, the combination of these simple proposed methods outperformed not only alignment-based approaches but also strong baselines. The source code is available at URL", "edit_actions": [{"type": "R", "before": "One key principle for", "after": "A key principle in", "start_char_pos": 0, "end_char_pos": 21}, {"type": "D", "before": "both", "after": null, "start_char_pos": 184, "end_char_pos": 188}, {"type": "R", "before": "remedy this", "after": "address this issue", "start_char_pos": 334, "end_char_pos": 345}, {"type": "A", "before": null, "after": "and demonstrate", "start_char_pos": 360, "end_char_pos": 360}, {"type": "R", "before": "the angle of them", "after": "their angle", "start_char_pos": 441, "end_char_pos": 458}, {"type": "R", "before": "the norm and direction", "after": "them", "start_char_pos": 542, "end_char_pos": 564}, {"type": "R", "before": "to decouple", "after": "a method that first decouples", "start_char_pos": 677, "end_char_pos": 688}, {"type": "R", "before": "then computing the", "after": ", and then computes", "start_char_pos": 732, "end_char_pos": 750}, {"type": "A", "before": null, "after": "i.e.,", "start_char_pos": 809, "end_char_pos": 809}, {"type": "R", "before": "Furthermore, we demonstrate", "after": "Besides, we find", "start_char_pos": 881, "end_char_pos": 908}, {"type": "R", "before": "; this", "after": ", which", "start_char_pos": 979, "end_char_pos": 985}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1028, "end_char_pos": 1031}, {"type": "D", "before": ", which can significantly improve the performance of the proposed method", "after": null, "start_char_pos": 1067, "end_char_pos": 1139}, {"type": "R", "before": "STS benchmarks, our", "after": "textual similarity datasets, the combination of these", "start_char_pos": 1153, "end_char_pos": 1172}, {"type": "A", "before": null, "after": "The source code is available at URL", "start_char_pos": 1273, "end_char_pos": 1273}], "sents_char_pos": [0, 147, 217, 330, 495, 652, 880, 980, 1141]}
+{"doc_id": "2004.15020", "revision_depth": "1", "before_revision": "Image captioning datasets have proven useful for multimodal representation learning, and a common evaluation paradigm based on multimodal retrieval has emerged . Unfortunately, datasets have only limited cross-modal associations: images are not paired with others , captions are only paired with others that describe the same image, there are no negative associations and there are missing positive cross-modal associations. This undermines retrieval evaluation and limits research into how inter-modality learning impacts intra-modality tasks. To address this gap , we create theCrisscrossed Captions (CxC) dataset, extending MS-COCO with new semantic similarity judgments for \\textbf{247,315 intra- and inter-modality pairs. We provide baseline model performance results for both retrieval and correlations with human rankings, emphasizing both intra- and inter-modality learning.", "after_revision": "By supporting multi-modal retrieval training and evaluation, image captioning datasets have spurred remarkable progress on representation learning . Unfortunately, datasets have limited cross-modal associations: images are not paired with other images , captions are only paired with other captions of the same image, there are no negative associations and there are missing positive cross-modal associations. This undermines research into how inter-modality learning impacts intra-modality tasks. We address this gap with Crisscrossed Captions (CxC) , an extension of the MS-COCO dataset with human semantic similarity judgments for \\textbf{267,095 intra- and inter-modality pairs. We report baseline results on CxC for strong existing unimodal and multimodal models. We also evaluate a multitask dual encoder trained on both image-caption and caption-caption pairs that crucially demonstrates CxC's value for measuring the influence of intra- and inter-modality learning.", "edit_actions": [{"type": "R", "before": "Image", "after": "By supporting multi-modal retrieval training and evaluation, image", "start_char_pos": 0, "end_char_pos": 5}, {"type": "R", "before": "proven useful for multimodal representation learning, and a common evaluation paradigm based on multimodal retrieval has emerged", "after": "spurred remarkable progress on representation learning", "start_char_pos": 31, "end_char_pos": 159}, {"type": "D", "before": "only", "after": null, "start_char_pos": 191, "end_char_pos": 195}, {"type": "R", "before": "others", "after": "other images", "start_char_pos": 257, "end_char_pos": 263}, {"type": "R", "before": "others that describe", "after": "other captions of", "start_char_pos": 296, "end_char_pos": 316}, {"type": "D", "before": "retrieval evaluation and limits", "after": null, "start_char_pos": 441, "end_char_pos": 472}, {"type": "R", "before": "To", "after": "We", "start_char_pos": 545, "end_char_pos": 547}, {"type": "D", "before": ", we create the", "after": null, "start_char_pos": 565, "end_char_pos": 580}, {"type": "R", "before": "Crisscrossed Captions", "after": "with Crisscrossed Captions", "start_char_pos": 580, "end_char_pos": 601}, {"type": "R", "before": "dataset, extending", "after": ", an extension of the", "start_char_pos": 608, "end_char_pos": 626}, {"type": "R", "before": "with new", "after": "dataset with human", "start_char_pos": 635, "end_char_pos": 643}, {"type": "R", "before": "247,315", "after": "267,095", "start_char_pos": 686, "end_char_pos": 693}, {"type": "R", "before": "provide baseline model performance results for both retrieval and correlations with human rankings, emphasizing both", "after": "report baseline results on CxC for strong existing unimodal and multimodal models. We also evaluate a multitask dual encoder trained on both image-caption and caption-caption pairs that crucially demonstrates CxC's value for measuring the influence of", "start_char_pos": 730, "end_char_pos": 846}], "sents_char_pos": [0, 161, 424, 544, 726]}
+{"doc_id": "2005.00081", "revision_depth": "1", "before_revision": "Given a user-specified minimum degree threshold \\gamma , a%DIFDELCMD < {%%% \\gamma -quasi-clique is a subgraph where each vertex connects to at least \\gamma fraction of the other vertices . Mining maximal\\lceil \\rceil quasi-cliques is notoriously expensive with the state-of-the-art algorithm scaling only to small graphs with thousands of vertices.This has hampered its popularity in real applications involving big graphs. We developed a task-based system called G-thinker for massively parallel graph mining, which is the first graph mining system that scales with the number of CPU cores. G-thinker provides a unique opportunity to scale the compute-intensive quasi-clique mining . This paperdesigns parallel algorithms for mining maximal quasi-cliques on G-thinker that scale to big graphs. Our algorithms follow the idea of divide and conquer which partitions the problem of mining a big graph into tasks that mine smaller subgraphs . However, we find that a direct application of G-thinker is insufficient due to the drastically different running time of different tasks that violates the original design assumption of G-thinker , requiring a system URLe. We also observe that the running time of a task is highly unpredictable solely from the features extracted from its subgraph, leading to difficulty in pinpoint expensive tasks to decompose for concurrent processing, and size-threshold based partitioning under-partitions some tasks but over-partitions others, leading to bad load balancing and enormous task partitioning overheads. We address this issue by proposing a novel time-delayed divide-and-conquer strategy that strikes a balance between the workloads spent on actual mining and the cost of balancing the workloads. Extensive experiments verify that our G-thinker algorithm scales perfectly with the number of CPU cores, achieving over 300x speedup when running on a graph with over 1M vertices in a small cluster.", "after_revision": "Given a user-specified minimum degree threshold %DIFDELCMD < {%%% \\gamma, a \\gamma -quasi-clique is a subgraph g=(V_g,E_g) where each vertex v\\in V_g connects to at least \\gamma fraction of the other vertices (i.e.,\\lceil \\gamma\\cdot(|V_g|-1)\\rceil vertices) in g. Quasi-clique is one of the most natural definitions for dense structures useful in finding communities in social networks and discovering significant biomolecule structures and pathways. However, mining maximal quasi-cliques is notoriously expensive. In this paper, we design parallel algorithms for mining maximal quasi-cliques on G-thinker , a recent distributed framework targeting divide-and-conquer graph mining algorithms that decomposes the mining into compute-intensive tasks to fully utilize CPU cores . However, we found that directly using G-thinker results in the straggler problem due to (i) the drastic load imbalance among different tasks and (ii) the difficulty of predicting the task running time and the time growth with task-subgraph size. We address these challenges by redesigning G-thinker 's execution engine to prioritize long-running tasks for mining, and by utilizing a novel timeout strategy to effectively decompose the mining workloads of long-running tasks to improve load balancing. While this system redesign applies to many other expensive dense subgraph mining problems, this paper verifies the idea by adapting the state-of-the-art quasi-clique algorithm, Quick, to our redesigned G-thinker. We improve Quick by integrating new pruning rules, and fixing some missed boundary cases that could lead to missed results. Extensive experiments verify that our new solution scales well with the number of CPU cores, achieving 201\\times runtime speedup when mining a graph with 3.77M vertices and 16.5M edges in a 16-node cluster.", "edit_actions": [{"type": "D", "before": "\\gamma", "after": null, "start_char_pos": 48, "end_char_pos": 54}, {"type": "D", "before": ", a", "after": null, "start_char_pos": 55, "end_char_pos": 58}, {"type": "R", "before": "\\gamma", "after": "\\gamma, a \\gamma", "start_char_pos": 76, "end_char_pos": 82}, {"type": "A", "before": null, "after": "g=(V_g,E_g)", "start_char_pos": 111, "end_char_pos": 111}, {"type": "A", "before": null, "after": "v\\in V_g", "start_char_pos": 130, "end_char_pos": 130}, {"type": "R", "before": "\\gamma", "after": "\\gamma", "start_char_pos": 152, "end_char_pos": 158}, {"type": "R", "before": ". Mining maximal", "after": "(i.e.,", "start_char_pos": 190, "end_char_pos": 206}, {"type": "A", "before": null, "after": "\\gamma\\cdot(|V_g|-1)", "start_char_pos": 213, "end_char_pos": 213}, {"type": "A", "before": null, "after": "vertices) in g. Quasi-clique is one of the most natural definitions for dense structures useful in finding communities in social networks and discovering significant biomolecule structures and pathways. However, mining maximal", "start_char_pos": 220, "end_char_pos": 220}, {"type": "R", "before": "is notoriously expensive with the state-of-the-art algorithm scaling only to small graphs with thousands of vertices.This has hampered its popularity in real applications involving big graphs. We developed a task-based system called G-thinker for massively parallel graph mining, which is the first graph mining system that scales with the number of CPU cores. G-thinker provides a unique opportunity to scale the compute-intensive quasi-clique mining . This paperdesigns", "after": "is notoriously expensive. In this paper, we design", "start_char_pos": 235, "end_char_pos": 706}, {"type": "R", "before": "that scale to big graphs. Our algorithms follow the idea of divide and conquer which partitions the problem of mining a big graph into tasks that mine smaller subgraphs", "after": ", a recent distributed framework targeting divide-and-conquer graph mining algorithms that decomposes the mining into compute-intensive tasks to fully utilize CPU cores", "start_char_pos": 773, "end_char_pos": 941}, {"type": "R", "before": "find that a direct application of", "after": "found that directly using", "start_char_pos": 956, "end_char_pos": 989}, {"type": "R", "before": "is insufficient due to the drastically different running time of different tasks that violates the original design assumption of", "after": "results in the straggler problem due to (i) the drastic load imbalance among different tasks and (ii) the difficulty of predicting the task running time and the time growth with task-subgraph size. We address these challenges by redesigning", "start_char_pos": 1000, "end_char_pos": 1128}, {"type": "R", "before": ", requiring a system URLe. We also observe that the running time of a task is highly unpredictable solely from the features extracted from its subgraph, leading to difficulty in pinpoint expensive tasks to decompose for concurrent processing, and size-threshold based partitioning under-partitions some tasks but over-partitions others, leading to bad load balancing and enormous task partitioning overheads. We address this issue by proposing a novel time-delayed divide-and-conquer strategy that strikes a balance between the workloads spent on actual mining and the cost of balancing the workloads.", "after": "'s execution engine to prioritize long-running tasks for mining, and by utilizing a novel timeout strategy to effectively decompose the mining workloads of long-running tasks to improve load balancing. While this system redesign applies to many other expensive dense subgraph mining problems, this paper verifies the idea by adapting the state-of-the-art quasi-clique algorithm, Quick, to our redesigned G-thinker. We improve Quick by integrating new pruning rules, and fixing some missed boundary cases that could lead to missed results.", "start_char_pos": 1139, "end_char_pos": 1740}, {"type": "R", "before": "G-thinker algorithm scales perfectly", "after": "new solution scales well", "start_char_pos": 1779, "end_char_pos": 1815}, {"type": "R", "before": "over 300x speedup when running on", "after": "201\\times runtime speedup when mining", "start_char_pos": 1856, "end_char_pos": 1889}, {"type": "R", "before": "over 1M vertices in a small", "after": "3.77M vertices and 16.5M edges in a 16-node", "start_char_pos": 1903, "end_char_pos": 1930}], "sents_char_pos": [0, 191, 352, 427, 595, 688, 798, 943, 1165, 1547, 1740]}
+{"doc_id": "2005.01282", "revision_depth": "1", "before_revision": "The goal of unconditional text generation is training a model with real sentences, to generate novel sentences which should be the same quality and diversity as the training data. However, when different metrics are used for comparing these methods , the contradictory conclusions are drawn. The difficulty is that both the sample diversity and the sample quality should be taken into account simultaneously , when a generative model is evaluated. To solve this issue , a novel metric of distributional discrepancy (DD) is designed to evaluate generators according to the discrepancy between the generated sentences and the real training sentences. But, a challenge is that it can't compute DD directly because the distribution of real sentences is unavailable. Thus, we propose a method to estimate DD by training a neural-network-based text classifier. For comparison, three existing metrics, Bilingual Evaluation Understudy (BLEU) verse self-BLEU, language model score verse reverse language model score, Fr'chet Embedding Distance (FED), together with the proposed DD, are used to evaluate two popular generative models of LSTM and GPT-2 on both syntactic and real data. Experimental results show DD is much better than the three existing metrics in ranking these generative models.", "after_revision": "The purpose of unconditional text generation is to train a model with real sentences, then generate novel sentences of the same quality and diversity as the training data. However, when different metrics are used for comparing the methods of unconditional text generation, contradictory conclusions are drawn. The difficulty is that both the diversity and quality of the sample should be considered simultaneously when the models are evaluated. To solve this problem , a novel metric of distributional discrepancy (DD) is designed to evaluate generators based on the discrepancy between the generated and real training sentences. However, it cannot compute the DD directly because the distribution of real sentences is unavailable. Thus, we propose a method for estimating the DD by training a neural-network-based text classifier. For comparison, three existing metrics, bi-lingual evaluation understudy (BLEU) versus self-BLEU, language model score versus reverse language model score, and Fr\\'{e with the proposed DD, are used to evaluate two popular generative models of long short-term memory and generative pretrained transformer 2 on both syntactic and real data. Experimental results show that DD is significantly better than the three existing metrics for ranking these generative models.", "edit_actions": [{"type": "R", "before": "goal", "after": "purpose", "start_char_pos": 4, "end_char_pos": 8}, {"type": "R", "before": "training", "after": "to train", "start_char_pos": 45, "end_char_pos": 53}, {"type": "R", "before": "to", "after": "then", "start_char_pos": 83, "end_char_pos": 85}, {"type": "R", "before": "which should be", "after": "of", "start_char_pos": 111, "end_char_pos": 126}, {"type": "R", "before": "these methods , the", "after": "the methods of unconditional text generation,", "start_char_pos": 235, "end_char_pos": 254}, {"type": "R", "before": "sample diversity and the sample quality should be taken into account simultaneously , when a generative model is", "after": "diversity and quality of the sample should be considered simultaneously when the models are", "start_char_pos": 324, "end_char_pos": 436}, {"type": "R", "before": "issue", "after": "problem", "start_char_pos": 462, "end_char_pos": 467}, {"type": "R", "before": "according to", "after": "based on", "start_char_pos": 555, "end_char_pos": 567}, {"type": "R", "before": "sentences and the", "after": "and", "start_char_pos": 606, "end_char_pos": 623}, {"type": "R", "before": "But, a challenge is that it can't compute", "after": "However, it cannot compute the", "start_char_pos": 649, "end_char_pos": 690}, {"type": "R", "before": "to estimate", "after": "for estimating the", "start_char_pos": 788, "end_char_pos": 799}, {"type": "R", "before": "Bilingual Evaluation Understudy", "after": "bi-lingual evaluation understudy", "start_char_pos": 895, "end_char_pos": 926}, {"type": "R", "before": "verse", "after": "versus", "start_char_pos": 934, "end_char_pos": 939}, {"type": "R", "before": "verse", "after": "versus", "start_char_pos": 972, "end_char_pos": 977}, {"type": "R", "before": "Fr'chet Embedding Distance (FED), together", "after": "and Fr\\'{e", "start_char_pos": 1008, "end_char_pos": 1050}, {"type": "R", "before": "LSTM and GPT-2", "after": "long short-term memory and generative pretrained transformer 2", "start_char_pos": 1127, "end_char_pos": 1141}, {"type": "R", "before": "DD is much", "after": "that DD is significantly", "start_char_pos": 1201, "end_char_pos": 1211}, {"type": "R", "before": "in", "after": "for", "start_char_pos": 1251, "end_char_pos": 1253}], "sents_char_pos": [0, 179, 291, 447, 648, 761, 854, 1174]}
+{"doc_id": "2005.03459", "revision_depth": "1", "before_revision": "Real-world application scenarios like modern Internet services consist of diversity of AI and non-AI modules with very long and complex execution paths . Using component or micro AI benchmarks alone can lead to error-prone conclusions. This paper proposes a scenario-distilling AI benchmarking methodology . Instead of using real-world applications, we propose the permutations of essential AI and non-AI tasks as a scenario-distilling benchmark . We consider scenario-distilling benchmarks, component and micro benchmarks as three indispensable parts of a benchmark suite. Together with seventeen industry partners, we identify nine important real-world application scenarios . We design and implement a highly extensible, configurable, and flexible benchmark framework . On the basis of the framework, we propose the guideline for building scenario-distilling benchmarks, and present two Internet service AI ones. The preliminary evaluation shows the advantage of scenario-distilling AI benchmarking against using component or micro AI benchmarks alone. The specifications, source code, testbed, and results are publicly available from the web site URL/ AIBench /index.html}.", "after_revision": "Modern real-world application scenarios like Internet services not only consist of diversity of AI and non-AI modules with very long and complex execution paths , but also have huge code size, which raises serious benchmarking or evaluating challenges. Using AI components or micro benchmarks alone can lead to error-prone conclusions. This paper presents a scenario-distilling methodology to attack the above challenge. We formalize a real-world application scenario as a Directed Acyclic Graph-based model, and propose the rules to distill it into the permutation of essential AI and non-AI tasks as a high-level scenario benchmark specification. Together with seventeen industry partners, we extract nine typical application scenarios, and identify the primary components . We design and implement a highly extensible, configurable, and flexible benchmark framework , on the basis of which, we implement two Internet service AI scenario benchmarks as proxies to two real-world application scenarios. We claim scenario, component and micro benchmarks should be considered as three indispensable parts for evaluating. Our evaluation shows the advantage of our methodology against using component or micro AI benchmarks alone. The specifications, source code, testbed, and results are publicly available from URL/ aibench-scenario /index.html}.", "edit_actions": [{"type": "R", "before": "Real-world", "after": "Modern real-world", "start_char_pos": 0, "end_char_pos": 10}, {"type": "R", "before": "modern Internet services", "after": "Internet services not only", "start_char_pos": 38, "end_char_pos": 62}, {"type": "R", "before": ". Using component or micro AI", "after": ", but also have huge code size, which raises serious benchmarking or evaluating challenges. Using AI components or micro", "start_char_pos": 152, "end_char_pos": 181}, {"type": "R", "before": "proposes", "after": "presents", "start_char_pos": 247, "end_char_pos": 255}, {"type": "R", "before": "AI benchmarking methodology . Instead of using", "after": "methodology to attack the above challenge. We formalize a", "start_char_pos": 278, "end_char_pos": 324}, {"type": "R", "before": "applications, we propose the permutations", "after": "application scenario as a Directed Acyclic Graph-based model, and propose the rules to distill it into the permutation", "start_char_pos": 336, "end_char_pos": 377}, {"type": "R", "before": "scenario-distilling benchmark . We consider scenario-distilling benchmarks, component and micro benchmarks as three indispensable parts of a benchmark suite.", "after": "high-level scenario benchmark specification.", "start_char_pos": 416, "end_char_pos": 573}, {"type": "R", "before": "identify nine important real-world application scenarios", "after": "extract nine typical application scenarios, and identify the primary components", "start_char_pos": 620, "end_char_pos": 676}, {"type": "R", "before": ". On", "after": ", on", "start_char_pos": 771, "end_char_pos": 775}, {"type": "R", "before": "the framework, we propose the guideline for building scenario-distilling benchmarks, and present", "after": "which, we implement", "start_char_pos": 789, "end_char_pos": 885}, {"type": "R", "before": "ones. The preliminary", "after": "scenario benchmarks as proxies to two real-world application scenarios. We claim scenario, component and micro benchmarks should be considered as three indispensable parts for evaluating. Our", "start_char_pos": 910, "end_char_pos": 931}, {"type": "R", "before": "scenario-distilling AI benchmarking", "after": "our methodology", "start_char_pos": 966, "end_char_pos": 1001}, {"type": "D", "before": "the web site", "after": null, "start_char_pos": 1138, "end_char_pos": 1150}, {"type": "R", "before": "AIBench", "after": "aibench-scenario", "start_char_pos": 1156, "end_char_pos": 1163}], "sents_char_pos": [0, 235, 307, 447, 573, 678, 772, 915, 1055]}
+{"doc_id": "2005.03651", "revision_depth": "1", "before_revision": "We analyze risk factors correlated with the initial transmission growth rate of the COVID-19 pandemic . The number of cases follows an early exponential expansion; we chose as a starting point in each country the first day with 30 cases and used 12 days . We looked for linear correlations of the exponents with other variables, using 126 countries. We find a positive correlation with high C.L. with{\\it the following variables, with respective p-value: low Temperature (4\\cdot10^{-7}), high ratio of old vs.~working-age people (3\\cdot10^{-6}), life expectancy (8\\cdot10^{-6}), number of international tourists (1\\cdot10^{-5}), earlier epidemic starting date (2\\cdot10^{-5}), high level of contact in greeting habits (6 \\cdot 10^{-5}), lung cancer (6 \\cdot 10^{-5}), obesity in males (1 \\cdot 10^{-4}), urbanization (2\\cdot10^{-4}), cancer prevalence (3 \\cdot 10^{-4}), alcohol consumption (0.0019), daily smoking prevalence (0.0036), UV index (0.004, smaller sample, 73 countries) , low Vitamin D levels ( p-value 0.002-0.006, smaller sample, \\sim 50 countries ). There is highly significant correlation also with blood type : positive correlation with RH- ( 2 \\cdot10^{-5}) and A+ ( 2 \\cdot10^{-3}), negative correlation with B+ (2\\cdot10^{-4}). We also find positive correlation with moderate C.L. (p-value of 0.02%DIFDELCMD < \\sim0%%% .03) with: CO_2 emissions, type-1 diabetes, low vaccination coverage for Tuberculosis (BCG). Several such variables are correlated with each other and so they likely have common interpretations. We also analyzed the possible existence of a bias: countries with low GDP-per capita , typically located in warm regions, might have less intense testing and we discuss correlation with the above variables.", "after_revision": "We analyze risk factors correlated with the initial transmission growth rate of the recent COVID-19 pandemic in different countries . The number of cases follows in its early stages an almost exponential expansion; we chose as a starting point in each country the first day d_i with 30 cases and we fitted for 12 days , capturing thus the early exponential growth . We looked then for linear correlations of the exponents \\alpha with other variables, for a sample of 126 countries. We find a positive correlation ,{\\it i.e. faster spread of COVID-19 , with high confidence level with the following variables, with respective p-value: low Temperature (4\\cdot10^{-7}), high ratio of old vs.~working-age people (3\\cdot10^{-6}), life expectancy (8\\cdot10^{-6}), number of international tourists (1\\cdot10^{-5}), earlier epidemic starting date d_i (2\\cdot10^{-5}), high level of physical contact in greeting habits (6 \\cdot 10^{-5}), lung cancer prevalence (6 \\cdot 10^{-5}), obesity in males (1 \\cdot 10^{-4}), share of population in urban areas (2\\cdot10^{-4}), cancer prevalence (3 \\cdot 10^{-4}), alcohol consumption (0.0019), daily smoking prevalence (0.0036), UV index (0.004, 73 countries) . We also find a correlation with low Vitamin D levels ( 0.002-0.006, smaller sample, \\sim 50 countries , to be confirmed on a larger sample ). There is highly significant correlation also with blood types : positive correlation with types RH- ( 3 \\cdot10^{-5}) and A+ ( 3 \\cdot10^{-3}), negative correlation with B+ (2\\cdot10^{-4}). %DIFDELCMD < \\sim0%%% Several of the above variables are intercorrelated and likely to have common interpretations. We performed a Principal Component Analysis, in order to find their significant independent linear combinations. We also analyzed a possible bias: countries with low GDP-per capita might have less testing and we discuss correlation with the above variables.", "edit_actions": [{"type": "A", "before": null, "after": "recent", "start_char_pos": 84, "end_char_pos": 84}, {"type": "A", "before": null, "after": "in different countries", "start_char_pos": 103, "end_char_pos": 103}, {"type": "R", "before": "an early", "after": "in its early stages an almost", "start_char_pos": 134, "end_char_pos": 142}, {"type": "A", "before": null, "after": "d_i", "start_char_pos": 225, "end_char_pos": 225}, {"type": "R", "before": "used", "after": "we fitted for", "start_char_pos": 244, "end_char_pos": 248}, {"type": "A", "before": null, "after": ", capturing thus the early exponential growth", "start_char_pos": 257, "end_char_pos": 257}, {"type": "A", "before": null, "after": "then", "start_char_pos": 270, "end_char_pos": 270}, {"type": "A", "before": null, "after": "\\alpha", "start_char_pos": 312, "end_char_pos": 312}, {"type": "R", "before": "using", "after": "for a sample of", "start_char_pos": 335, "end_char_pos": 340}, {"type": "R", "before": "with high C.L. with", "after": ",", "start_char_pos": 387, "end_char_pos": 406}, {"type": "A", "before": null, "after": "i.e. faster spread of COVID-19", "start_char_pos": 411, "end_char_pos": 411}, {"type": "A", "before": null, "after": ", with high confidence level with", "start_char_pos": 412, "end_char_pos": 412}, {"type": "A", "before": null, "after": "d_i", "start_char_pos": 668, "end_char_pos": 668}, {"type": "A", "before": null, "after": "physical", "start_char_pos": 700, "end_char_pos": 700}, {"type": "A", "before": null, "after": "prevalence", "start_char_pos": 759, "end_char_pos": 759}, {"type": "R", "before": "urbanization", "after": "share of population in urban areas", "start_char_pos": 815, "end_char_pos": 827}, {"type": "D", "before": "smaller sample,", "after": null, "start_char_pos": 964, "end_char_pos": 979}, {"type": "R", "before": ",", "after": ". We also find a correlation with", "start_char_pos": 994, "end_char_pos": 995}, {"type": "D", "before": "p-value", "after": null, "start_char_pos": 1019, "end_char_pos": 1026}, {"type": "A", "before": null, "after": ", to be confirmed on a larger sample", "start_char_pos": 1074, "end_char_pos": 1074}, {"type": "R", "before": "type", "after": "types", "start_char_pos": 1134, "end_char_pos": 1138}, {"type": "A", "before": null, "after": "types", "start_char_pos": 1167, "end_char_pos": 1167}, {"type": "R", "before": "2", "after": "3", "start_char_pos": 1174, "end_char_pos": 1175}, {"type": "R", "before": "2", "after": "3", "start_char_pos": 1199, "end_char_pos": 1200}, {"type": "D", "before": "We also find positive correlation with moderate C.L. (p-value of 0.02", "after": null, "start_char_pos": 1262, "end_char_pos": 1331}, {"type": "R", "before": ".03) with: CO_2 emissions, type-1 diabetes, low vaccination coverage for Tuberculosis (BCG). Several such variables are correlated with each other and so they likely", "after": "Several of the above variables are intercorrelated and likely to", "start_char_pos": 1353, "end_char_pos": 1518}, {"type": "R", "before": "also analyzed the possible existence of a", "after": "performed a Principal Component Analysis, in order to find their significant independent linear combinations. We also analyzed a possible", "start_char_pos": 1551, "end_char_pos": 1592}, {"type": "D", "before": ", typically located in warm regions,", "after": null, "start_char_pos": 1633, "end_char_pos": 1669}, {"type": "D", "before": "intense", "after": null, "start_char_pos": 1686, "end_char_pos": 1693}], "sents_char_pos": [0, 105, 165, 259, 355, 462, 495, 553, 993, 1077, 1261, 1445, 1547]}
+{"doc_id": "2005.05298", "revision_depth": "2", "before_revision": "This paper presents a new method SOLOIST , which uses transfer learning to efficiently build task-oriented dialog systems at scale. We parameterize a dialog system using a Transformer-based auto-regressive language model, which subsumes different dialog modules (e.g., state tracker, dialog policy, response generator) into a single neural model. We pre-train, on large heterogeneous dialog corpora, a large-scale Transformer model which can generate dialog responses grounded in user goals and real-world knowledge for task completion. The pre-trained model can be efficiently adapted to accomplish a new dialog task with a handful of task-specific dialogs via machine teaching . Our experiments demonstrate that (i) SOLOIST creates new state-of-the-art results on two well-known benchmarks, CamRest and MultiWOZ, (ii) in the few-shot learning setting, the dialog systems developed by SOLOIST significantly outperform those developed by existing methods, and (iii) the use of machine teaching substantially reduces the labeling cost . We will release our code and pre-trained models for reproducible research.", "after_revision": "We present a new method SOLOIST that uses transfer learning and machine teaching to build task bots at scale. We parameterize classical modular task-oriented dialog systems using a Transformer-based auto-regressive language model, which subsumes different dialog modules into a single neural model. We pre-train, on heterogeneous dialog corpora, a task-grounded response generation model, which can generate dialog responses grounded in user goals and real-world knowledge for task completion. The pre-trained model can be efficiently adapted to accomplish new tasks with a handful of task-specific dialogs via machine teaching , where training samples are generated by human teachers interacting with the system. Experiments show that (i) SOLOIST creates new state-of-the-art on well-studied task-oriented dialog benchmarks, including CamRest676 and MultiWOZ; (ii) in the few-shot fine-tuning settings, SOLOIST significantly outperforms existing methods, and (iii) the use of machine teaching substantially reduces the labeling cost of fine-tuning. The pre-trained models and codes are available at URL", "edit_actions": [{"type": "R", "before": "This paper presents", "after": "We present", "start_char_pos": 0, "end_char_pos": 19}, {"type": "R", "before": ", which", "after": "that", "start_char_pos": 41, "end_char_pos": 48}, {"type": "R", "before": "to efficiently build task-oriented dialog systems", "after": "and machine teaching to build task bots", "start_char_pos": 72, "end_char_pos": 121}, {"type": "R", "before": "a dialog system", "after": "classical modular task-oriented dialog systems", "start_char_pos": 148, "end_char_pos": 163}, {"type": "D", "before": "(e.g., state tracker, dialog policy, response generator)", "after": null, "start_char_pos": 262, "end_char_pos": 318}, {"type": "D", "before": "large", "after": null, "start_char_pos": 364, "end_char_pos": 369}, {"type": "R", "before": "large-scale Transformer model", "after": "task-grounded response generation model,", "start_char_pos": 402, "end_char_pos": 431}, {"type": "R", "before": "a new dialog task", "after": "new tasks", "start_char_pos": 600, "end_char_pos": 617}, {"type": "R", "before": ". Our experiments demonstrate", "after": ", where training samples are generated by human teachers interacting with the system. Experiments show", "start_char_pos": 679, "end_char_pos": 708}, {"type": "R", "before": "results on two well-known benchmarks, CamRest and MultiWOZ,", "after": "on well-studied task-oriented dialog benchmarks, including CamRest676 and MultiWOZ;", "start_char_pos": 755, "end_char_pos": 814}, {"type": "R", "before": "learning setting, the dialog systems developed by SOLOIST significantly outperform those developed by", "after": "fine-tuning settings, SOLOIST significantly outperforms", "start_char_pos": 836, "end_char_pos": 937}, {"type": "R", "before": ". We will release our code and", "after": "of fine-tuning. The", "start_char_pos": 1034, "end_char_pos": 1064}, {"type": "R", "before": "for reproducible research.", "after": "and codes are available at URL", "start_char_pos": 1084, "end_char_pos": 1110}], "sents_char_pos": [0, 131, 346, 536, 680, 1035]}
+{"doc_id": "2005.06297", "revision_depth": "1", "before_revision": "We study the epidemic patterns of the COVID-19 virus in Argentinafrom a mathematical modelling perspective . We implement an SEIR model , consisting of a set of first-order temporal differential equations (ODE's) to analyze the time evolution of the disease caused by the virus. The model is applied to the city of Buenos Aires and neighbouring cities (RMBA) with approximately 15 million inhabitants. The parameters of the model are calibrated by using as data the number of casualties officially reported. Since there are infinite solutions honouring the data, we show a set of cases by considering different situations. The first set of parameters yields initially a reproduction ratio R0 = 3.30 decreasing to 0.92 in April 8, after the lockdown, but increasing to 2.44 after April 27, most probably due to an increase of the contagion in highly populated slums. This case has incubation and infection periods of 11 and 7 days, approximately, and about 13 million people infected at the end of the epidemic. The infection fatality rate (IFR) is 1.88 \\% and the predicted number of casualties is approximately 249000 deaths at the end of the epidemic. However, this death toll is highly affected by the evolution of the reproduction ratio, and keeping R0 = 0.92 after April 27, would cause 1321 casualties and only 66000 infected individuals. Other cases, assuming the present trend, predict smaller incubation periods ( between 4 and 5 days) and yield between 30000 and 90000 deaths and IFRs between 0.5 \\% and 1 \\%. This means that the intensity of the lockdown (and behaviour of the population) is essential and that the measures have to be guided by precise model predictions. We also consider doubling the number of casualties to date and, in this case, the death toll is almost 44000 individuals and about 5.1 million people being infected .", "after_revision": "A pandemic caused by a new coronavirus has spread worldwide, causing an epidemic in Argentina . We implement an SEIR model to analyze the evolution of the disease in Buenos Aires and neighbouring cities (RMBA) with 15 million inhabitants. The parameters of the model are calibrated by using as data the number of casualties officially reported. Since infinite solutions honour the data, we show a set of cases by considering different situations. The first set of parameters yields initially a reproduction ratio R0 = 3.33 decreasing to 0.95 in April 8, after the lockdown, but increasing to 1.55 after April 27, most probably due to an increase of the contagion in highly populated slums. The infection fatality rate (IFR) is 1.88 \\% and the predicted number of casualties is 173000 deaths with 9 million people infected at the end of the epidemic. However, keeping R_0 = 0.95 after April 27, would cause only 1881 casualties and 92955 infected individuals. Other cases, assuming the present trend, predict smaller incubation periods ( 4-5 days) and yield between 20000 and 70000 deaths and IFRs between 0.5 \\% and 1.1 \\%. We also consider doubling the number of casualties , with a death toll of 44000 individuals and 5.1 million infected individuals. Other choices of parameters also provide a good fit of the data, indicating the uncertainty of the results, which may differ from reported values. The analysis allows us to study how isolation and social distancing measures affect the time evolution of the epidemic .", "edit_actions": [{"type": "R", "before": "We study the epidemic patterns of the COVID-19 virus in Argentinafrom a mathematical modelling perspective", "after": "A pandemic caused by a new coronavirus has spread worldwide, causing an epidemic in Argentina", "start_char_pos": 0, "end_char_pos": 106}, {"type": "D", "before": ", consisting of a set of first-order temporal differential equations (ODE's)", "after": null, "start_char_pos": 136, "end_char_pos": 212}, {"type": "D", "before": "time", "after": null, "start_char_pos": 228, "end_char_pos": 232}, {"type": "R", "before": "caused by the virus. The model is applied to the city of", "after": "in", "start_char_pos": 258, "end_char_pos": 314}, {"type": "D", "before": "approximately", "after": null, "start_char_pos": 364, "end_char_pos": 377}, {"type": "R", "before": "there are infinite solutions honouring", "after": "infinite solutions honour", "start_char_pos": 514, "end_char_pos": 552}, {"type": "R", "before": "3.30 decreasing to 0.92", "after": "3.33 decreasing to 0.95", "start_char_pos": 694, "end_char_pos": 717}, {"type": "R", "before": "2.44", "after": "1.55", "start_char_pos": 768, "end_char_pos": 772}, {"type": "D", "before": "This case has incubation and infection periods of 11 and 7 days, approximately, and about 13 million people infected at the end of the epidemic.", "after": null, "start_char_pos": 866, "end_char_pos": 1010}, {"type": "R", "before": "approximately 249000 deaths", "after": "173000 deaths with 9 million people infected", "start_char_pos": 1098, "end_char_pos": 1125}, {"type": "R", "before": "this death toll is highly affected by the evolution of the reproduction ratio, and keeping R0", "after": "keeping R_0", "start_char_pos": 1163, "end_char_pos": 1256}, {"type": "R", "before": "0.92", "after": "0.95", "start_char_pos": 1259, "end_char_pos": 1263}, {"type": "D", "before": "1321 casualties and", "after": null, "start_char_pos": 1292, "end_char_pos": 1311}, {"type": "R", "before": "66000", "after": "1881 casualties and 92955", "start_char_pos": 1317, "end_char_pos": 1322}, {"type": "R", "before": "between 4 and 5", "after": "4-5", "start_char_pos": 1423, "end_char_pos": 1438}, {"type": "R", "before": "30000 and 90000", "after": "20000 and 70000", "start_char_pos": 1463, "end_char_pos": 1478}, {"type": "R", "before": "1 \\%. This means that the intensity of the lockdown (and behaviour of the population) is essential and that the measures have to be guided by precise model predictions.", "after": "1.1 \\%.", "start_char_pos": 1514, "end_char_pos": 1682}, {"type": "R", "before": "to date and, in this case, the death toll is almost", "after": ", with a death toll of", "start_char_pos": 1734, "end_char_pos": 1785}, {"type": "D", "before": "about", "after": null, "start_char_pos": 1808, "end_char_pos": 1813}, {"type": "R", "before": "people being infected", "after": "infected individuals. Other choices of parameters also provide a good fit of the data, indicating the uncertainty of the results, which may differ from reported values. The analysis allows us to study how isolation and social distancing measures affect the time evolution of the epidemic", "start_char_pos": 1826, "end_char_pos": 1847}], "sents_char_pos": [0, 108, 278, 401, 507, 622, 865, 1010, 1153, 1344, 1519, 1682]}
+{"doc_id": "2005.06712", "revision_depth": "1", "before_revision": "Biomolecular condensates underlain by liquid-liquid phase separation (LLPS) of proteins and nucleic acids can serve important biological functions; yet current understanding of the effects of amino acid sequences on LLPS is limited. Endeavoring toward a transferable, predictive coarse-grained explicit-chain model for biomolecular LLPS, we used the N-terminal intrinsically disordered region (IDR) of the DEAD-box helicase Ddx4 as a test case to conduct extensive multiple-chain simulations to assess the roles of electrostatic, hydrophobic, cation-\\pi, and aromatic interactions in sequence-specific phase behaviors. Three different residue-residue interaction schemes sharing the same electrostatic potentialwere evaluated. We found that neither a common scheme based on amino acid hydrophobicity nor one augmented with arginine/lysine-aromatic cation-\\pi interactions can consistently account for the available experimental LLPS data on the wildtype, a charge-scrambled mutant, a phenylalanine-to-alanine (FtoA) mutant and an arginine-to-lysine (RtoK ) mutant of the Ddx4 IDR. In contrast, an interaction scheme based on contact statistics among folded globular protein structures reproduces the overall experimental trend, including that the RtoK mutant has a much diminished LLPS propensity. This finding underscores the important role of \\pi-related interactions in LLPS and that their effects are embodied to a degree in classical statistical potentials. Protein-protein electrostatic interactions are modulated by relative permittivity, which in general depends on protein concentration in the aqueous medium . Analytical theory suggests that this dependence entails enhanced inter-protein interactions in the condensed phase but more favorable protein-solvent interactions in the dilute phase. The opposing trends lead to only a modest overall impact on LLPS.", "after_revision": " Endeavoring toward a transferable, predictive coarse-grained explicit-chain model for biomolecular condensates underlain by liquid-liquid phase separation (LLPS), we conducted multiple-chain simulations of the N-terminal intrinsically disordered region (IDR) of DEAD-box helicase Ddx4 , as a test case , to assess the roles of electrostatic, hydrophobic, cation-\\pi, and aromatic interactions in amino acid sequence-dependent LLPS. We evaluated 3 residue-residue interaction schemes with a shared electrostatic potential. Neither a common hydrophobicity scheme nor one augmented with arginine/lysine-aromatic cation-\\pi interactions consistently accounted for the experimental LLPS data on the wildtype, a charge-scrambled , an FtoA, and an RtoK mutant of Ddx4 IDR. In contrast, interactions based on contact statistics among folded globular protein structures reproduce the overall experimental trend, including that the RtoK mutant has a much diminished LLPS propensity. Consistency between simulation and LLPS experiment was also found for RtoK mutants of P-granule protein LAF-1, underscoring that, to a degree, the important LLPS-driving \\pi-related interactions are embodied in classical statistical potentials. Further elucidation will be necessary, however, especially of phenylalanine's role in condensate assembly because experiments on FtoA and YtoF mutants suggest that LLPS-driving phenylalanine interactions are significantly weaker than those posited by common statistical potentials. Protein-protein electrostatic interactions are modulated by relative permittivity, which depends on protein concentration . Analytical theory suggests that this dependence entails enhanced inter-protein interactions in the condensed phase but more favorable protein-solvent interactions in the dilute phase. The opposing trends lead to a modest overall impact on LLPS.", "edit_actions": [{"type": "D", "before": "Biomolecular condensates underlain by liquid-liquid phase separation (LLPS) of proteins and nucleic acids can serve important biological functions; yet current understanding of the effects of amino acid sequences on LLPS is limited.", "after": null, "start_char_pos": 0, "end_char_pos": 232}, {"type": "R", "before": "LLPS, we used", "after": "condensates underlain by liquid-liquid phase separation (LLPS), we conducted multiple-chain simulations of", "start_char_pos": 332, "end_char_pos": 345}, {"type": "D", "before": "the", "after": null, "start_char_pos": 402, "end_char_pos": 405}, {"type": "A", "before": null, "after": ",", "start_char_pos": 429, "end_char_pos": 429}, {"type": "R", "before": "to conduct extensive multiple-chain simulations to", "after": ", to", "start_char_pos": 445, "end_char_pos": 495}, {"type": "R", "before": "sequence-specific phase behaviors. Three different", "after": "amino acid sequence-dependent LLPS. We evaluated 3", "start_char_pos": 585, "end_char_pos": 635}, {"type": "R", "before": "sharing the same electrostatic potentialwere evaluated. We found that neither a common scheme based on amino acid hydrophobicity", "after": "with a shared electrostatic potential. Neither a common hydrophobicity scheme", "start_char_pos": 672, "end_char_pos": 800}, {"type": "R", "before": "can consistently account for the available", "after": "consistently accounted for the", "start_char_pos": 873, "end_char_pos": 915}, {"type": "R", "before": "mutant, a phenylalanine-to-alanine (FtoA) mutant and an arginine-to-lysine (RtoK ) mutant of the", "after": ", an FtoA, and an RtoK mutant of", "start_char_pos": 975, "end_char_pos": 1071}, {"type": "R", "before": "an interaction scheme", "after": "interactions", "start_char_pos": 1095, "end_char_pos": 1116}, {"type": "R", "before": "reproduces", "after": "reproduce", "start_char_pos": 1186, "end_char_pos": 1196}, {"type": "R", "before": "This finding underscores the important role of", "after": "Consistency between simulation and LLPS experiment was also found for RtoK mutants of P-granule protein LAF-1, underscoring that, to a degree, the important LLPS-driving", "start_char_pos": 1299, "end_char_pos": 1345}, {"type": "R", "before": "in LLPS and that their effects are embodied to a degree", "after": "are embodied", "start_char_pos": 1371, "end_char_pos": 1426}, {"type": "A", "before": null, "after": "Further elucidation will be necessary, however, especially of phenylalanine's role in condensate assembly because experiments on FtoA and YtoF mutants suggest that LLPS-driving phenylalanine interactions are significantly weaker than those posited by common statistical potentials.", "start_char_pos": 1464, "end_char_pos": 1464}, {"type": "D", "before": "in general", "after": null, "start_char_pos": 1554, "end_char_pos": 1564}, {"type": "D", "before": "in the aqueous medium", "after": null, "start_char_pos": 1598, "end_char_pos": 1619}, {"type": "D", "before": "only", "after": null, "start_char_pos": 1834, "end_char_pos": 1838}], "sents_char_pos": [0, 147, 232, 619, 727, 1081, 1298, 1463, 1621, 1805]}
+{"doc_id": "2005.07012", "revision_depth": "1", "before_revision": "The transmission of infectious diseases depends on the social networks among people and the protections that people have taken before being exposed to the disease. Mass media is playing a key role in making the public aware of the disease and its transmissibility and severity. Motivated by the importance of heterogeneous risk perception in the population to response to infectious disease outbreaks , we propose a heterogeneous three-layer network model, namely the Susceptible-Exposed-Infectious-Recovered Unaware-Aware-Protected (SEIR-UAP) model, where people's vulnerability to the disease is influenced by the processes of awareness information diffusion, preventive behavior changeand infectious disease transmission. We found that (a ) the awareness of the disease plays the central role in preventing disease outbreak ; (b) we need a reasonable ratio of \"over-reacting\" nodes to effectively control the disease outbreak ; (c) diseases with a longer incubation period and a higher recovery rate are easier to control because the processes of information diffusion and behavior change can help people prepare for the upcoming exposure to the disease ; (d) it is more difficult to control the disease with asymptomatic cases. The results provide evidence that mass media should not play down the transmissibility and severity of diseases , so that the public can become aware of the disease as soon as possible .", "after_revision": " Motivated by the importance of individual differences in risk perception and behavior change in people's responses to infectious disease outbreaks (particularly the ongoing COVID-19 pandemic) , we propose a heterogeneous Disease-Behavior-Information (hDBI) transmission model, in which people's risk of getting infected is influenced by information diffusion, behavior change, and disease transmission. We use both a mean-field approximation and Monte Carlo simulations to analyze the dynamics of the model. Information diffusion influences behavior change by allowing people to be aware of the disease and adopt self-protection, and subsequently affects disease transmission by changing the actual infection rate. Results show that (a) awareness plays a central role in epidemic prevention ; (b) a reasonable fraction of \"over-reacting\" nodes are needed in epidemic prevention ; (c) R0 has different effects on epidemic outbreak for cases with and without asymptomatic infection ; (d) social influence on behavior change can remarkably decrease the epidemic outbreak size. This research indicates that the media and opinion leaders should not understate the transmissibility and severity of diseases to ensure that people could become aware of the disease and adopt self-protection to protect themselves and the whole population .", "edit_actions": [{"type": "D", "before": "The transmission of infectious diseases depends on the social networks among people and the protections that people have taken before being exposed to the disease. Mass media is playing a key role in making the public aware of the disease and its transmissibility and severity.", "after": null, "start_char_pos": 0, "end_char_pos": 277}, {"type": "R", "before": "heterogeneous risk perception in the population to response to", "after": "individual differences in risk perception and behavior change in people's responses to", "start_char_pos": 309, "end_char_pos": 371}, {"type": "A", "before": null, "after": "(particularly the ongoing COVID-19 pandemic)", "start_char_pos": 401, "end_char_pos": 401}, {"type": "R", "before": "three-layer network model, namely the Susceptible-Exposed-Infectious-Recovered Unaware-Aware-Protected (SEIR-UAP) model, where", "after": "Disease-Behavior-Information (hDBI) transmission model, in which", "start_char_pos": 431, "end_char_pos": 557}, {"type": "R", "before": "vulnerability to the disease", "after": "risk of getting infected", "start_char_pos": 567, "end_char_pos": 595}, {"type": "D", "before": "the processes of awareness", "after": null, "start_char_pos": 613, "end_char_pos": 639}, {"type": "R", "before": "preventive behavior changeand infectious", "after": "behavior change, and", "start_char_pos": 663, "end_char_pos": 703}, {"type": "R", "before": "found that (a ) the awareness of the disease plays the", "after": "use both a mean-field approximation and Monte Carlo simulations to analyze the dynamics of the model. Information diffusion influences behavior change by allowing people to be aware of the disease and adopt self-protection, and subsequently affects disease transmission by changing the actual infection rate. Results show that (a) awareness plays a", "start_char_pos": 729, "end_char_pos": 783}, {"type": "R", "before": "preventing disease outbreak", "after": "epidemic prevention", "start_char_pos": 800, "end_char_pos": 827}, {"type": "R", "before": "we need a reasonable ratio", "after": "a reasonable fraction", "start_char_pos": 834, "end_char_pos": 860}, {"type": "R", "before": "to effectively control the disease outbreak", "after": "are needed in epidemic prevention", "start_char_pos": 886, "end_char_pos": 929}, {"type": "R", "before": "diseases with a longer incubation period and a higher recovery rate are easier to control because the processes of information diffusion and behavior change can help people prepare for the upcoming exposure to the disease", "after": "R0 has different effects on epidemic outbreak for cases with and without asymptomatic infection", "start_char_pos": 936, "end_char_pos": 1157}, {"type": "R", "before": "it is more difficult to control the disease with asymptomatic cases. The results provide evidence that mass media should not play down", "after": "social influence on behavior change can remarkably decrease the epidemic outbreak size. This research indicates that the media and opinion leaders should not understate", "start_char_pos": 1164, "end_char_pos": 1298}, {"type": "R", "before": ", so that the public can", "after": "to ensure that people could", "start_char_pos": 1345, "end_char_pos": 1369}, {"type": "R", "before": "as soon as possible", "after": "and adopt self-protection to protect themselves and the whole population", "start_char_pos": 1398, "end_char_pos": 1417}], "sents_char_pos": [0, 163, 277, 725, 829, 931, 1159, 1232]}
+{"doc_id": "2005.07473", "revision_depth": "1", "before_revision": " Online Social Networks have become an important medium for communication among people who suffer from mental disorders to share moments of hardship and to seek support. Here we analyze how Reddit discussions can help improve the health conditions of its users. Using emotional tone of user publications as a proxy for his emotional state, we uncover relationships between state changes and interactions he has in a given community. We observe that authors of negative posts often write more positive comments after engaging in discussions . Second, we build models based on state-of-the-art embedding techniques and RNNs to predict shifts in emotional tone. We show that it is possible to predict with good accuracy the reaction of users of mental disorder online communities to the interactions experienced in these platforms . Our models could assist in interventions promoted by health care professionals to provide support to people suffering from mental health illnesses.", "after_revision": "In recent years, Online Social Networks have become an important medium for people who suffer from mental disorders to share moments of hardship , and receive emotional and informational support. In this work, we analyze how discussions in Reddit communities related to mental disorders can help improve the health conditions of their users. Using the emotional tone of users' writing as a proxy for emotional state, we uncover relationships between user interactions and state changes. First, we observe that authors of negative posts often write rosier comments after engaging in discussions , indicating that users' emotional state can improve due to social support . Second, we build models based on SOTA text embedding techniques and RNNs to predict shifts in emotional tone. This differs from most of related work, which focuses primarily on detecting mental disorders from user activity. We demonstrate the feasibility of accurately predicting the users' reactions to the interactions experienced in these platforms , and present some examples which illustrate that the models are correctly capturing the effects of comments on the author's emotional tone . Our models hold promising implications for interventions to provide support for people struggling with mental illnesses.", "edit_actions": [{"type": "A", "before": null, "after": "In recent years,", "start_char_pos": 0, "end_char_pos": 0}, {"type": "D", "before": "communication among", "after": null, "start_char_pos": 60, "end_char_pos": 79}, {"type": "R", "before": "and to seek support. Here", "after": ", and receive emotional and informational support. In this work,", "start_char_pos": 149, "end_char_pos": 174}, {"type": "R", "before": "Reddit discussions", "after": "discussions in Reddit communities related to mental disorders", "start_char_pos": 190, "end_char_pos": 208}, {"type": "R", "before": "its", "after": "their", "start_char_pos": 251, "end_char_pos": 254}, {"type": "A", "before": null, "after": "the", "start_char_pos": 268, "end_char_pos": 268}, {"type": "R", "before": "user publications", "after": "users' writing", "start_char_pos": 287, "end_char_pos": 304}, {"type": "D", "before": "his", "after": null, "start_char_pos": 320, "end_char_pos": 323}, {"type": "R", "before": "state changes and interactions he has in a given community. We", "after": "user interactions and state changes. First, we", "start_char_pos": 374, "end_char_pos": 436}, {"type": "R", "before": "more positive", "after": "rosier", "start_char_pos": 488, "end_char_pos": 501}, {"type": "A", "before": null, "after": ", indicating that users' emotional state can improve due to social support", "start_char_pos": 541, "end_char_pos": 541}, {"type": "R", "before": "state-of-the-art", "after": "SOTA text", "start_char_pos": 577, "end_char_pos": 593}, {"type": "R", "before": "We show that it is possible to predict with good accuracy the reaction of users of mental disorder online communities", "after": "This differs from most of related work, which focuses primarily on detecting mental disorders from user activity. We demonstrate the feasibility of accurately predicting the users' reactions", "start_char_pos": 661, "end_char_pos": 778}, {"type": "A", "before": null, "after": ", and present some examples which illustrate that the models are correctly capturing the effects of comments on the author's emotional tone", "start_char_pos": 830, "end_char_pos": 830}, {"type": "R", "before": "could assist in interventions promoted by health care professionals", "after": "hold promising implications for interventions", "start_char_pos": 844, "end_char_pos": 911}, {"type": "R", "before": "to people suffering from mental health", "after": "for people struggling with mental", "start_char_pos": 931, "end_char_pos": 969}], "sents_char_pos": [0, 169, 261, 433, 543, 660, 832]}
+{"doc_id": "2005.07593", "revision_depth": "1", "before_revision": "Fire is an integral part of the Earth for millennia. Recent wildfires exhibited an unprecedented spatial and temporal extend and their control is beyond national firefighting capabilities. Prescribed or controlled burning treatments are debated as a potential measure for ameliorating the spread and intensity of wildfires. Machine learning analysis using random forests was performed in a spatio-temporal data set comprising a large number of savanna fires across 22 years. Results indicate that controlled fire return interval accounts of 3.5\\% of fire spread and 3.5\\% of fire intensity. Manipulating burn seasonality accounted for 5\\% of fire spread and 6\\% of fire intensity. While manipulated fire return interval and seasonality moderated both fire spread and intensity, their overall effects were low in comparison with hydrological and climatic variables. Predicting fire spread and intensity has been a poor endeavour thus far and we show that more data of the variables already monitored would not result in higher predictive accuracy. Given that the main driving factors of fire spread are related to hydrological and climatic variables, we suggest investigating further the use of climatic refugia against wildfires", "after_revision": "Fire is an integral part of the Earth for millennia. Several recent wildfires have exhibited an unprecedented spatial and temporal extent and their control is beyond national firefighting capabilities. Prescribed or controlled burning treatments are debated as a potential measure for ameliorating the spread and intensity of wildfires. Machine learning analysis using random forests was performed in a spatio-temporal data set comprising a large number of savanna fires across 22 years. Results indicate that controlled fire return interval exhibited a feature importance of 3.5\\% regarding fire spread rate and 3.5\\% regarding fire intensity. Manipulating burn seasonality showed a feature importance of 5\\% regarding fire spread rate and 6\\% regarding fire intensity. While manipulated fire return interval and seasonality moderated both fire spread rate and intensity, their overall effects were low in comparison with meteorological ( hydrological and climatic ) variables. Predicting fire spread rate and intensity has been a poor endeavour thus far and we show that more data of the variables already monitored would not result in higher predictive accuracy. ", "edit_actions": [{"type": "R", "before": "Recent wildfires", "after": "Several recent wildfires have", "start_char_pos": 53, "end_char_pos": 69}, {"type": "R", "before": "extend", "after": "extent", "start_char_pos": 118, "end_char_pos": 124}, {"type": "R", "before": "accounts", "after": "exhibited a feature importance", "start_char_pos": 529, "end_char_pos": 537}, {"type": "R", "before": "of fire spread", "after": "regarding fire spread rate", "start_char_pos": 547, "end_char_pos": 561}, {"type": "R", "before": "of", "after": "regarding", "start_char_pos": 572, "end_char_pos": 574}, {"type": "R", "before": "accounted for", "after": "showed a feature importance of", "start_char_pos": 621, "end_char_pos": 634}, {"type": "R", "before": "of fire spread", "after": "regarding fire spread rate", "start_char_pos": 639, "end_char_pos": 653}, {"type": "R", "before": "of", "after": "regarding", "start_char_pos": 662, "end_char_pos": 664}, {"type": "A", "before": null, "after": "rate", "start_char_pos": 763, "end_char_pos": 763}, {"type": "A", "before": null, "after": "meteorological (", "start_char_pos": 829, "end_char_pos": 829}, {"type": "A", "before": null, "after": ")", "start_char_pos": 856, "end_char_pos": 856}, {"type": "A", "before": null, "after": "rate", "start_char_pos": 891, "end_char_pos": 891}, {"type": "D", "before": "Given that the main driving factors of fire spread are related to hydrological and climatic variables, we suggest investigating further the use of climatic refugia against wildfires", "after": null, "start_char_pos": 1051, "end_char_pos": 1232}], "sents_char_pos": [0, 52, 188, 323, 474, 590, 680, 867, 1050]}
+{"doc_id": "2005.08505", "revision_depth": "1", "before_revision": "We study how the coronavirus disease 2019 ( COVID-19 ) pandemic, alongside the severe mobility restrictions that ensued, has impacted information access on Wikipedia, the world's largest online encyclopedia. A longitudinal analysis that combines pageview statistics for 12 Wikipedia \\WP language editions with mobility reports published by Apple and Google reveals a massive increase in access volume, accompanied by a stark shift in topical interests. Health- and entertainment- related topics are found to have gained, and sports- and transportation- related topics, to have lost attention . Interestingly, while the interest in health-related topics was transient , that in entertainment topics is lingering and even increasing . These changes began at the time when mobility was restricted and are most pronounced for language editions associated with countries , in which the most severe mobility restrictions were implemented , indicating that the interest shift might be caused by people's spending more time at home\\eg\\hyp \\hyp \\hyp . Our results highlight the utility of Wikipedia for studying reactions to the pandemic across the globe, and illustrate how the disease is rippling through society \\WP .", "after_revision": "We study how the COVID-19 pandemic, alongside the severe mobility restrictions that ensued, has impacted information access on Wikipedia, the world's largest online encyclopedia. A longitudinal analysis that combines pageview statistics for 12 \\WP language editions with mobility reports published by Apple and Google reveals massive shifts in thevolume and thenature of information seeking patterns amidst the pandemic . Interestingly, while we observe a transient increase in Wikipedia's pageview volume following mobility restrictions, the nature of information sought was impacted more permanently . These changes are most pronounced for language editions associated with countries in which the most severe mobility restrictions were implemented . We also find that articles belonging to different topics behaved differently;\\eg, attention towards entertainment\\hyp related topics is lingering and even increasing, while the interest in health\\hyp and biology\\hyp related topics was either small or transient . Our results highlight the utility of \\WP for studying how the pandemic affected people's needs, interests, and concerns .", "edit_actions": [{"type": "D", "before": "coronavirus disease 2019 (", "after": null, "start_char_pos": 17, "end_char_pos": 43}, {"type": "D", "before": ")", "after": null, "start_char_pos": 53, "end_char_pos": 54}, {"type": "D", "before": "Wikipedia", "after": null, "start_char_pos": 273, "end_char_pos": 282}, {"type": "R", "before": "a massive increase in access volume, accompanied by a stark shift in topical interests. Health- and entertainment- related topics are found to have gained, and sports- and transportation- related topics, to have lost attention", "after": "massive shifts in the", "start_char_pos": 365, "end_char_pos": 591}, {"type": "A", "before": null, "after": "volume", "start_char_pos": 591, "end_char_pos": 591}, {"type": "A", "before": null, "after": "and the", "start_char_pos": 592, "end_char_pos": 592}, {"type": "A", "before": null, "after": "nature", "start_char_pos": 592, "end_char_pos": 592}, {"type": "A", "before": null, "after": "of information seeking patterns amidst the pandemic", "start_char_pos": 593, "end_char_pos": 593}, {"type": "R", "before": "the interest in health-related topics was transient , that in entertainment topics is lingering and even increasing", "after": "we observe a transient increase in Wikipedia's pageview volume following mobility restrictions, the nature of information sought was impacted more permanently", "start_char_pos": 617, "end_char_pos": 732}, {"type": "D", "before": "began at the time when mobility was restricted and", "after": null, "start_char_pos": 749, "end_char_pos": 799}, {"type": "D", "before": ",", "after": null, "start_char_pos": 868, "end_char_pos": 869}, {"type": "R", "before": ", indicating that the interest shift might be caused by people's spending more time at home", "after": ". We also find that articles belonging to different topics behaved differently;", "start_char_pos": 934, "end_char_pos": 1025}, {"type": "A", "before": null, "after": ", attention towards entertainment", "start_char_pos": 1028, "end_char_pos": 1028}, {"type": "A", "before": null, "after": "related topics is lingering and even increasing, while the interest in health", "start_char_pos": 1033, "end_char_pos": 1033}, {"type": "A", "before": null, "after": "and biology", "start_char_pos": 1038, "end_char_pos": 1038}, {"type": "A", "before": null, "after": "related topics was either small or transient", "start_char_pos": 1043, "end_char_pos": 1043}, {"type": "D", "before": "Wikipedia for studying reactions to the pandemic across the globe, and illustrate how the disease is rippling through society", "after": null, "start_char_pos": 1083, "end_char_pos": 1208}, {"type": "A", "before": null, "after": "for studying how the pandemic affected people's needs, interests, and concerns", "start_char_pos": 1213, "end_char_pos": 1213}], "sents_char_pos": [0, 207, 452, 595, 734, 1045]}
+{"doc_id": "2005.08505", "revision_depth": "2", "before_revision": "We study how the COVID-19 pandemic, alongside the severe mobility restrictions that ensued, has impacted information access on Wikipedia, the world's largest online encyclopedia. A longitudinal analysis that combines pageview statistics for 12 %DIFDELCMD < \\WP %%% language editions with mobility reports published by Apple and Google reveals massive shifts in the volume and thenature of information seeking patterns amidst the pandemic. Interestingly, while we observe a transient increase in Wikipedia's pageview volume following mobility restrictions, the nature of information sought was impacted more permanently. These changes are most pronounced for language editions associated with countries in which the most severe mobility restrictions were implemented. We also find that articles belonging to different topics behaved differently; %DIFDELCMD < \\eg%%% , attention towards entertainment%DIFDELCMD < \\hyp %%% related topics is lingering and even increasing, while the interest in health%DIFDELCMD < \\hyp %%% and biology%DIFDELCMD < \\hyp %%% related topics was either small or transient. Our results highlight the utility of %DIFDELCMD < \\WP %%% for studying how the pandemic affected people's needs, interests, and concerns.", "after_revision": "We study how the COVID-19 pandemic, alongside the severe mobility restrictions that ensued, has impacted information access on Wikipedia, the world's largest online encyclopedia. A longitudinal analysis that combines pageview statistics for 12 %DIFDELCMD < \\WP %%% Wikipedia language editions with mobility reports published by Apple and Google reveals massive shifts in the volume and nature of information seeking patterns during the pandemic. Interestingly, while we observe a transient increase in Wikipedia's pageview volume following mobility restrictions, the nature of information sought was impacted more permanently. These changes are most pronounced for language editions associated with countries where the most severe mobility restrictions were implemented. We also find that articles belonging to different topics behaved differently; %DIFDELCMD < \\eg%%% e.g. , attention towards %DIFDELCMD < \\hyp %%% entertainment-related topics is lingering and even increasing, while the interest in %DIFDELCMD < \\hyp %%% %DIFDELCMD < \\hyp %%% health- and biology-related topics was either small or transient. Our results highlight the utility of %DIFDELCMD < \\WP %%% Wikipedia for studying how the pandemic is affecting people's needs, interests, and concerns.", "edit_actions": [{"type": "A", "before": null, "after": "Wikipedia", "start_char_pos": 265, "end_char_pos": 265}, {"type": "D", "before": "volume", "after": null, "start_char_pos": 366, "end_char_pos": 372}, {"type": "D", "before": "and the", "after": null, "start_char_pos": 373, "end_char_pos": 380}, {"type": "R", "before": "nature", "after": "volume and nature", "start_char_pos": 380, "end_char_pos": 386}, {"type": "R", "before": "amidst", "after": "during", "start_char_pos": 419, "end_char_pos": 425}, {"type": "R", "before": "in which", "after": "where", "start_char_pos": 703, "end_char_pos": 711}, {"type": "A", "before": null, "after": "e.g.", "start_char_pos": 866, "end_char_pos": 866}, {"type": "D", "before": "entertainment", "after": null, "start_char_pos": 887, "end_char_pos": 900}, {"type": "R", "before": "related", "after": "entertainment-related", "start_char_pos": 922, "end_char_pos": 929}, {"type": "D", "before": "health", "after": null, "start_char_pos": 993, "end_char_pos": 999}, {"type": "D", "before": "and biology", "after": null, "start_char_pos": 1021, "end_char_pos": 1032}, {"type": "R", "before": "related", "after": "health- and biology-related", "start_char_pos": 1054, "end_char_pos": 1061}, {"type": "A", "before": null, "after": "Wikipedia", "start_char_pos": 1158, "end_char_pos": 1158}, {"type": "R", "before": "affected", "after": "is affecting", "start_char_pos": 1189, "end_char_pos": 1197}], "sents_char_pos": [0, 178, 439, 620, 767, 845, 1099]}
+{"doc_id": "2005.09865", "revision_depth": "1", "before_revision": "A considerable literature is devoted to the introduction and analysis of variants of the SI epidemiology models. Similar models are also proposed to describe the spread of riots and, more generally, of collective behaviors in various social contexts. The use of epidemiology models to describe such social phenomena is based on the analogy between the mechanisms of contagion and social imitation. In turn, this analogy also points to the social nature of epidemics. This paper is concerned with a family of Reaction-Diffusion systems introduced in [ 17 ] that aims at unifying, generalizing, and enlarging the fields of application for epidemiologyand collective behavior models .In this paper, we propose a modeling approach on these apparently various phenomena through the example of the dynamics of social unrest. The model involves two quantities , the level of social unrest, or , more general, activity u, and a field of social tension v, which play asymmetric roles : u is thought of as the actual observed or explicit quantity while v is an ambiant, sometimes implicit field of susceptibility that modulates the growth of u. In this article, we explore this class of model and prove several theoretical results based on the framework developed in [ 17 ], of which the present work is a companion paper. Here we place the emphasis on two subclasses of systems defined in 17 : tension inhibiting and tension enhancing. These are characterized by the fact that the unrest has respectively a negative or positive feedback on the social tension (though no monotonicity condition is assumed). In 17%DIFDELCMD < ] %%% we derive a threshold phenomenon in terms of the initial level of social tension: below a critical value, a small triggering event is quickly followed by a resumption of calm, while, above this value, it generates an eruption of social unrest spreading through space with an asymptotically constant speed. The new results we derive in the present paper concern the behavior of the solution far from the propagating edge, that is, we give a description of the new regime of the system following the initial surge of activity. We show in particular that the model can give rise to many diverse qualitative dynamics : ephemeral or limited-duration social movements-referred to as \"riots\"-in the tension inhibiting case, and persisting social movements-lasting upheavals-in the tension enhancing case, as well as other more complex behaviors in some mixed cases . We also investigate this model by numerical simulations that highlight the richness of this framework. We finally propose and study extensions of the model, such as spatially heterogeneous systems .", "after_revision": " This paper is concerned with a family of Reaction-Diffusion systems that we introduced in [ 15 ] , and that generalizes the SIR type models from epidemiology. Such systems are now also used to describe collective behaviors .In this paper, we propose a modeling approach for these apparently diverse phenomena through the example of the dynamics of social unrest. The model involves two quantities : the level of social unrest, or more generally activity, u, and a field of social tension v, which play asymmetric roles . We think of u as the actually observed or explicit quantity while v is an ambiant, sometimes implicit , field of susceptibility that modulates the dynamics of u. In this article, we explore this class of model and prove several theoretical results based on the framework developed in [ 15 ], of which the present work is a companion paper. We particularly emphasize here two subclasses of systems : tension inhibiting and tension enhancing. These are characterized by respectively a negative or %DIFDELCMD < ] %%% a positivefeedback of the unrest on social tension. We establish several properties for these classes and also study some extensions. In particular, we describe the behavior of the system following an initial surge of activity. We show that the model can give rise to many diverse qualitative dynamics . We also provide a variety of numerical simulations to illustrate our results and to reveal further properties and open questions .", "edit_actions": [{"type": "D", "before": "A considerable literature is devoted to the introduction and analysis of variants of the SI epidemiology models. Similar models are also proposed to describe the spread of riots and, more generally, of collective behaviors in various social contexts. The use of epidemiology models to describe such social phenomena is based on the analogy between the mechanisms of contagion and social imitation. In turn, this analogy also points to the social nature of epidemics.", "after": null, "start_char_pos": 0, "end_char_pos": 466}, {"type": "A", "before": null, "after": "that we", "start_char_pos": 535, "end_char_pos": 535}, {"type": "R", "before": "17", "after": "15", "start_char_pos": 552, "end_char_pos": 554}, {"type": "R", "before": "that aims at unifying, generalizing, and enlarging the fields of application for epidemiologyand collective behavior models", "after": ", and that generalizes the SIR type models from epidemiology. Such systems are now also used to describe collective behaviors", "start_char_pos": 557, "end_char_pos": 680}, {"type": "R", "before": "on these apparently various", "after": "for these apparently diverse", "start_char_pos": 728, "end_char_pos": 755}, {"type": "R", "before": ",", "after": ":", "start_char_pos": 854, "end_char_pos": 855}, {"type": "R", "before": ", more general, activity", "after": "more generally activity,", "start_char_pos": 887, "end_char_pos": 911}, {"type": "R", "before": ": u is thought of as the actual", "after": ". We think of u as the actually", "start_char_pos": 976, "end_char_pos": 1007}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1080, "end_char_pos": 1080}, {"type": "R", "before": "growth", "after": "dynamics", "start_char_pos": 1124, "end_char_pos": 1130}, {"type": "R", "before": "17", "after": "15", "start_char_pos": 1261, "end_char_pos": 1263}, {"type": "R", "before": "Here we place the emphasis on", "after": "We particularly emphasize here", "start_char_pos": 1315, "end_char_pos": 1344}, {"type": "D", "before": "defined in", "after": null, "start_char_pos": 1371, "end_char_pos": 1381}, {"type": "D", "before": "17", "after": null, "start_char_pos": 1382, "end_char_pos": 1384}, {"type": "D", "before": "the fact that the unrest has", "after": null, "start_char_pos": 1456, "end_char_pos": 1484}, {"type": "D", "before": "positive feedback on the social tension (though no monotonicity condition is assumed). In", "after": null, "start_char_pos": 1512, "end_char_pos": 1601}, {"type": "D", "before": "17", "after": null, "start_char_pos": 1602, "end_char_pos": 1604}, {"type": "R", "before": "we derive a threshold phenomenon in terms of the initial level of social tension: below a critical value, a small triggering event is quickly followed by a resumption of calm, while, above this value, it generates an eruption of social unrest spreading through space with an asymptotically constant speed. The new results we derive in the present paper concern the", "after": "a positivefeedback of the unrest on social tension. We establish several properties for these classes and also study some extensions. In particular, we describe the", "start_char_pos": 1623, "end_char_pos": 1987}, {"type": "R", "before": "solution far from the propagating edge, that is, we give a description of the new regime of the system following the", "after": "system following an", "start_char_pos": 2004, "end_char_pos": 2120}, {"type": "D", "before": "in particular", "after": null, "start_char_pos": 2156, "end_char_pos": 2169}, {"type": "D", "before": ": ephemeral or limited-duration social movements-referred to as \"riots\"-in the tension inhibiting case, and persisting social movements-lasting upheavals-in the tension enhancing case, as well as other more complex behaviors in some mixed cases", "after": null, "start_char_pos": 2236, "end_char_pos": 2480}, {"type": "R", "before": "investigate this model by numerical simulations that highlight the richness of this framework. We finally propose and study extensions of the model, such as spatially heterogeneous systems", "after": "provide a variety of numerical simulations to illustrate our results and to reveal further properties and open questions", "start_char_pos": 2491, "end_char_pos": 2679}], "sents_char_pos": [0, 112, 250, 397, 466, 682, 819, 1136, 1314, 1428, 1598, 1928, 2147, 2482, 2585]}
+{"doc_id": "2005.10731", "revision_depth": "2", "before_revision": "Volunteer crowdsourcing platforms , such as food URLanizations, match volunteers with tasks which are often recurring. To ensure completion of such tasks, platforms frequently use a commitment lever known as \"adoption . \" Despite being effective in reducing match uncertainty, high levels of adoption reduce match availability for volunteers which in turn can suppress future engagement . We study how platforms should balance these two opposing factors . Our research is motivated by a collaboration with Food Rescue U.S. (FRUS), a volunteer-based food URLanization active in over 33 locationsacross the U. S. For platforms such as FRUS, success crucially depends on efficient volunteer utilization and engagement. Consequently, effectively utilizing non-monetary levers, such as adoption, is critical. Based on our analysis of fine-grained FRUS data, we develop a model for a repeated two-sided matching market consisting of tasks (prearranged donations) and volunteers . Our model incorporates the uncertainty in match compatibility as well as the negative impact of failing to match on future engagement. We study the platform's optimal policy for setting the adoption level to maximize the total discounted number of matches. Our analysis reveals that the optimal myopic policy is either full or no adoption. For sufficiently thick markets , we show that such a myopic policy is also optimal in the long run. In thinner markets, even though a static policy of full or no adoption can be suboptimal, we show it achieves a constant-factor approximation where the factor improves with market thickness. Using our analytical and empirical results, we revisit the current design of the FRUS platform and make location-specific policy recommendations. More broadly, our work sheds light on how other two-sided platforms can control the double-edged impacts that commitment levers have on growth and engagement .", "after_revision": "Volunteer crowdsourcing platforms match volunteers with tasks which are often recurring. To ensure completion of such tasks, platforms frequently use a lever known as \"adoption , \" which amounts to a commitment by the volunteer to repeatedly perform the task. Despite reducing match uncertainty, high levels of adoption can decrease the probability of forming new matches, which in turn can suppress growth . We study how platforms should manage this trade-off . Our research is motivated by a collaboration with Food Rescue U.S. (FRUS), a volunteer-based food URLanization active in over 30 locations. For platforms such as FRUS, success crucially depends on volunteer engagement. Consequently, effectively utilizing non-monetary levers, such as adoption, is critical. Motivated by the volunteer management literature and our analysis of FRUS data, we develop a model for two-sided markets which repeatedly match volunteers with tasks . Our model incorporates match uncertainty as well as the negative impact of failing to match on future engagement. We study the platform's optimal policy for setting the adoption level to maximize the total discounted number of matches. We fully characterize the optimal myopic policy and show that it takes a simple form: depending on volunteer characteristics and market thickness, either allow for full adoption or disallow adoption. In the long run , we show that such a policy is either optimal or achieves a constant-factor approximation . Our finding is robust to incorporating heterogeneity in volunteer behavior. Our work sheds light on how two-sided platforms need to carefully control the double-edged impacts that commitment levers have on growth and engagement . A one-size-fits-all solution may not be effective, as the optimal design crucially depends on the characteristics of the volunteer population .", "edit_actions": [{"type": "D", "before": ", such as food URLanizations,", "after": null, "start_char_pos": 34, "end_char_pos": 63}, {"type": "D", "before": "commitment", "after": null, "start_char_pos": 182, "end_char_pos": 192}, {"type": "R", "before": ".", "after": ",", "start_char_pos": 218, "end_char_pos": 219}, {"type": "R", "before": "Despite being effective in", "after": "which amounts to a commitment by the volunteer to repeatedly perform the task. Despite", "start_char_pos": 222, "end_char_pos": 248}, {"type": "R", "before": "reduce match availability for volunteers", "after": "can decrease the probability of forming new matches,", "start_char_pos": 301, "end_char_pos": 341}, {"type": "R", "before": "future engagement", "after": "growth", "start_char_pos": 369, "end_char_pos": 386}, {"type": "R", "before": "balance these two opposing factors", "after": "manage this trade-off", "start_char_pos": 419, "end_char_pos": 453}, {"type": "R", "before": "33 locationsacross the U. S.", "after": "30 locations.", "start_char_pos": 582, "end_char_pos": 610}, {"type": "R", "before": "efficient volunteer utilization and", "after": "volunteer", "start_char_pos": 668, "end_char_pos": 703}, {"type": "R", "before": "Based on", "after": "Motivated by the volunteer management literature and", "start_char_pos": 804, "end_char_pos": 812}, {"type": "D", "before": "fine-grained", "after": null, "start_char_pos": 829, "end_char_pos": 841}, {"type": "D", "before": "a repeated", "after": null, "start_char_pos": 876, "end_char_pos": 886}, {"type": "R", "before": "matching market consisting of tasks (prearranged donations) and volunteers", "after": "markets which repeatedly match volunteers with tasks", "start_char_pos": 897, "end_char_pos": 971}, {"type": "R", "before": "the uncertainty in match compatibility", "after": "match uncertainty", "start_char_pos": 997, "end_char_pos": 1035}, {"type": "R", "before": "Our analysis reveals that", "after": "We fully characterize", "start_char_pos": 1231, "end_char_pos": 1256}, {"type": "R", "before": "is either full or no adoption. For sufficiently thick markets", "after": "and show that it takes a simple form: depending on volunteer characteristics and market thickness, either allow for full adoption or disallow adoption. In the long run", "start_char_pos": 1283, "end_char_pos": 1344}, {"type": "R", "before": "myopic policy is also optimal in the long run. In thinner markets, even though a static policy of full or no adoption can be suboptimal, we show it", "after": "policy is either optimal or", "start_char_pos": 1367, "end_char_pos": 1514}, {"type": "R", "before": "where the factor improves with market thickness. Using our analytical and empirical results, we revisit the current design of the FRUS platform and make location-specific policy recommendations. More broadly, our", "after": ". Our finding is robust to incorporating heterogeneity in volunteer behavior. Our", "start_char_pos": 1556, "end_char_pos": 1768}, {"type": "D", "before": "other", "after": null, "start_char_pos": 1793, "end_char_pos": 1798}, {"type": "R", "before": "can", "after": "need to carefully", "start_char_pos": 1819, "end_char_pos": 1822}, {"type": "A", "before": null, "after": ". A one-size-fits-all solution may not be effective, as the optimal design crucially depends on the characteristics of the volunteer population", "start_char_pos": 1909, "end_char_pos": 1909}], "sents_char_pos": [0, 118, 388, 455, 715, 803, 973, 1108, 1230, 1313, 1413, 1604, 1750]}
+{"doc_id": "2005.11161", "revision_depth": "1", "before_revision": "Multiple random walks is a model for movement of several independent random walkers on a graph, and it is applied to various graph algorithms. In order to design an efficient graph algorithm using multiple random walks, it is essential to study theoretical considerations for deeply understanding the characteristicsof graph algorithms . The first meeting time is one of the important metrics for the multiple random walks. The first meeting time is defined as the time it takes for multiple random walkers to meet on a same node . The first meeting time is closely related to the rendezvous problem . In various works, the first meeting time of multiple random walk has been analyzed. However, many of these previous works focused on regular graphs. In this paper, we analyze first meeting time of multiple random walks in arbitrary graph , and clarify the effect of graph structures on its expected value. First, we derive the spectral formula for the expected first meeting time of two random walkers using the spectral graph theory. Then, the principal component of the expected first meeting time are examined using the derived spectral formula. The resulting principal component reveals that (a)the expected first meeting time is almost dominated by n/(1+d_{\\rm std}^2/d_{\\rm avg}^2) and (b)the expected first meeting time is independent of the beginning nodes of multiple random walks where n is the number of nodes . d_{\\rm avg} and d_{\\rm std} are the mean and standard deviation of the weighted degree of each node , respectively. n and d_{\\rm avg, and d_{\\rm std} are related to the statistics of graph structures} . According to the analysis result , the variance of coefficient for weighted degrees, d_{\\rm std}/d_{\\rm avg}(degree heterogeneity) , facilitates quicker the meeting of random walkers.", "after_revision": "Multiple random walks are the movement of several independent random walkers on a graph, and are applied to various graph algorithms. In order to design an efficient graph algorithm based on multiple random walks, it is essential to study multiple random walks theoretically for deeply understanding their characteristics . The first meeting time is one of the important metrics for the multiple random walks. The first meeting time on a graph is defined by the time it takes for multiple random walkers to meet at the same node in graph . The first meeting time is closely related to the rendezvous problem , which is are a fundamental problem in the field of computer science. In previous works, the first meeting time of multiple random walks has been analyzed. However, many of these previous works focus on regular graphs. In this paper, we analyze the first meeting time of multiple random walks in arbitrary graphs , and clarify the effect of graph structures on its expected value. First, we derive the spectral formula of the expected first meeting time on the basis of the spectral graph theory. Then, we examine the principal component of the expected first meeting time using the derived spectral formula. The clarified principal component reveals that (a)the expected first meeting time is almost dominated by n/(1+d_{\\rm std}^2/d_{\\rm avg}^2) and (b)the expected first meeting time is independent of the starting nodes of random walkers where n is the number of nodes of the graph . d_{\\rm avg} and d_{\\rm std} are the mean and the standard deviation of weighted node degrees , respectively. , and d_{\\rm std} are related to the statistics of graph structures} The characteristics (a) is useful to understand the effect of the graph structure on the first meeting time . According to the revealed effect of graph structures , the variance of coefficient d_{\\rm std}/d_{\\rm avg}(degree heterogeneity) for weighted degrees facilitates quicker the meeting of random walkers.", "edit_actions": [{"type": "R", "before": "is a model for", "after": "are the", "start_char_pos": 22, "end_char_pos": 36}, {"type": "R", "before": "it is", "after": "are", "start_char_pos": 100, "end_char_pos": 105}, {"type": "R", "before": "using", "after": "based on", "start_char_pos": 191, "end_char_pos": 196}, {"type": "R", "before": "theoretical considerations", "after": "multiple random walks theoretically", "start_char_pos": 245, "end_char_pos": 271}, {"type": "R", "before": "the characteristicsof graph algorithms", "after": "their characteristics", "start_char_pos": 297, "end_char_pos": 335}, {"type": "R", "before": "is defined as", "after": "on a graph is defined by", "start_char_pos": 447, "end_char_pos": 460}, {"type": "R", "before": "on a same node", "after": "at the same node in graph", "start_char_pos": 515, "end_char_pos": 529}, {"type": "R", "before": ". In various", "after": ", which is are a fundamental problem in the field of computer science. In previous", "start_char_pos": 600, "end_char_pos": 612}, {"type": "R", "before": "walk", "after": "walks", "start_char_pos": 662, "end_char_pos": 666}, {"type": "R", "before": "focused", "after": "focus", "start_char_pos": 724, "end_char_pos": 731}, {"type": "A", "before": null, "after": "the", "start_char_pos": 777, "end_char_pos": 777}, {"type": "R", "before": "graph", "after": "graphs", "start_char_pos": 835, "end_char_pos": 840}, {"type": "R", "before": "for", "after": "of", "start_char_pos": 947, "end_char_pos": 950}, {"type": "R", "before": "of two random walkers using", "after": "on the basis of", "start_char_pos": 983, "end_char_pos": 1010}, {"type": "A", "before": null, "after": "we examine", "start_char_pos": 1044, "end_char_pos": 1044}, {"type": "D", "before": "are examined", "after": null, "start_char_pos": 1104, "end_char_pos": 1116}, {"type": "R", "before": "resulting", "after": "clarified", "start_char_pos": 1157, "end_char_pos": 1166}, {"type": "R", "before": "beginning nodes of multiple random walks", "after": "starting nodes of random walkers", "start_char_pos": 1353, "end_char_pos": 1393}, {"type": "A", "before": null, "after": "of the graph", "start_char_pos": 1425, "end_char_pos": 1425}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1473, "end_char_pos": 1473}, {"type": "R", "before": "the weighted degree of each node", "after": "weighted node degrees", "start_char_pos": 1496, "end_char_pos": 1528}, {"type": "D", "before": "n and d_{\\rm avg", "after": null, "start_char_pos": 1545, "end_char_pos": 1561}, {"type": "A", "before": null, "after": "The characteristics (a) is useful to understand the effect of the graph structure on the first meeting time", "start_char_pos": 1630, "end_char_pos": 1630}, {"type": "R", "before": "analysis result", "after": "revealed effect of graph structures", "start_char_pos": 1650, "end_char_pos": 1665}, {"type": "D", "before": "for weighted degrees,", "after": null, "start_char_pos": 1696, "end_char_pos": 1717}, {"type": "R", "before": ",", "after": "for weighted degrees", "start_char_pos": 1764, "end_char_pos": 1765}], "sents_char_pos": [0, 142, 337, 423, 531, 601, 685, 750, 908, 1037, 1152, 1291, 1763]}
+{"doc_id": "2005.11232", "revision_depth": "1", "before_revision": "We consider the problem of computing \\sum_x e^{f(x)}, where f (x)=\\sum_{ij a_{ij} \\xi_i \\xi_j + \\sum_i b_i \\xi_i is a real-valued quadratic function and x=}%DIFDELCMD < \\left(%%% \\xi_1, \\ldots, \\xi_n%DIFDELCMD < \\right) %%% ranges over{\\Bbb the Boolean cube \\{-1, 1\\}^n. We prove that for any \\delta >0, fixed in advance, the value of \\sum_x e^{f(x) can be approximated within relative error 0 < \\epsilon < 1 is quasi-polynomial n^{O(\\ln n - \\ln \\epsilon)} time , as long as \\sum_j |a_{ij| \\leq } 1-\\delta for all i. We apply the method of polynomial interpolation, for which we prove that \\sum_x e^{ f \\tilde{f} (x)} \\ne 0 for complex a _{ij and b_i such that \\sum_j |\\Re}%DIFDELCMD < \\thinspace %%% a _{ij| \\leq 1-\\delta, \\sum_j |\\Im}%DIFDELCMD < \\thinspace %%% a_{ij| \\leq \\delta^2/10 and |\\Im}%DIFDELCMD < \\thinspace %%% b_i| \\leq \\delta^2/10 for all i, which is\\tilde{f} interpreted as the absence of a phase transition in the Lee - Yang sense in the corresponding Ising model. The bounds are asymptotically optimal. The novel feature of the bounds is that they control the total interaction of each vertex but not every pairwise interaction .", "after_revision": "We consider the problem of computing the partition function \\sum_x e^{f(x)}, where f a_{ij} \\xi_i \\xi_j + \\sum_i b_i \\xi_i is a real-valued quadratic function and x=}%DIFDELCMD < \\left(%%% %DIFDELCMD < \\right) %%% : \\{-1, 1\\}^n \\longrightarrow{\\Bbb R is a quadratic or cubic polynomial on the Boolean cube \\{-1, 1\\}^n. In the case of a quadratic polynomial f, we show that the partition function can be approximated within relative error 0 < \\epsilon < 1 in quasi-polynomial n^{O(\\ln n - \\ln \\epsilon)} time | \\leq } if the Lipschitz constant of the non-linear part of f with respect to the \\ell^1 metric on the Boolean cube does not exceed 1-\\delta , for any \\delta >0, fixed in advance. For a cubic polynomial f, we get the same result under a somewhat stronger condition. We apply the method of polynomial interpolation, for which we prove that \\sum_x e^{ \\tilde{f} (x)} \\ne 0 for and b_i such that \\sum_j |\\Re}%DIFDELCMD < \\thinspace %%% | \\leq 1-\\delta, \\sum_j |\\Im}%DIFDELCMD < \\thinspace %%% | \\leq \\delta^2/10 and |\\Im}%DIFDELCMD < \\thinspace %%% complex-valued polynomials\\tilde{f} in a neighborhood of a real-valued f satisfying the above mentioned conditions. The bounds are asymptotically optimal. Results on the zero-free region are interpreted as the absence of a phase transition in the Lee - Yang sense in the corresponding Ising model. The novel feature of the bounds is that they control the total interaction of each vertex but not every single interaction of sets of vertices .", "edit_actions": [{"type": "A", "before": null, "after": "the partition function", "start_char_pos": 37, "end_char_pos": 37}, {"type": "D", "before": "(x)=\\sum_{ij", "after": null, "start_char_pos": 63, "end_char_pos": 75}, {"type": "D", "before": "\\xi_1, \\ldots, \\xi_n", "after": null, "start_char_pos": 180, "end_char_pos": 200}, {"type": "R", "before": "ranges over", "after": ": \\{-1, 1\\}^n \\longrightarrow", "start_char_pos": 225, "end_char_pos": 236}, {"type": "A", "before": null, "after": "R", "start_char_pos": 242, "end_char_pos": 242}, {"type": "A", "before": null, "after": "is a quadratic or cubic polynomial on", "start_char_pos": 243, "end_char_pos": 243}, {"type": "R", "before": "We prove that for any \\delta >0, fixed in advance, the value of \\sum_x e^{f(x)", "after": "In the case of a quadratic polynomial f, we show that the partition function", "start_char_pos": 274, "end_char_pos": 352}, {"type": "R", "before": "is", "after": "in", "start_char_pos": 412, "end_char_pos": 414}, {"type": "D", "before": ", as long as \\sum_j |a_{ij", "after": null, "start_char_pos": 465, "end_char_pos": 491}, {"type": "A", "before": null, "after": "if the Lipschitz constant of the non-linear part of f with respect to the \\ell^1 metric on the Boolean cube does not exceed", "start_char_pos": 500, "end_char_pos": 500}, {"type": "R", "before": "for all i.", "after": ", for any \\delta >0, fixed in advance. For a cubic polynomial f, we get the same result under a somewhat stronger condition.", "start_char_pos": 510, "end_char_pos": 520}, {"type": "D", "before": "f", "after": null, "start_char_pos": 605, "end_char_pos": 606}, {"type": "D", "before": "complex a _{ij", "after": null, "start_char_pos": 632, "end_char_pos": 646}, {"type": "D", "before": "a _{ij", "after": null, "start_char_pos": 705, "end_char_pos": 711}, {"type": "D", "before": "a_{ij", "after": null, "start_char_pos": 768, "end_char_pos": 773}, {"type": "R", "before": "b_i| \\leq \\delta^2/10 for all i, which is", "after": "complex-valued polynomials", "start_char_pos": 829, "end_char_pos": 870}, {"type": "A", "before": null, "after": "in a neighborhood of a real-valued f satisfying the above mentioned conditions. The bounds are asymptotically optimal. Results on the zero-free region are", "start_char_pos": 880, "end_char_pos": 880}, {"type": "D", "before": "bounds are asymptotically optimal. The", "after": null, "start_char_pos": 992, "end_char_pos": 1030}, {"type": "R", "before": "pairwise interaction", "after": "single interaction of sets of vertices", "start_char_pos": 1131, "end_char_pos": 1151}], "sents_char_pos": [0, 273, 520, 987, 1026]}
+{"doc_id": "2005.11949", "revision_depth": "1", "before_revision": "We construct deep ReLU neural networks to approximate functions in dilated shift-invariant spaces generated by a continuous function with compact support and study the approximation rates with respect to the number of neurons . The network construction is based on the bit extraction and data fitting capacity of deep neural networks. Combining with existing results of approximation from shift-invariant spaces, we are able to estimate the approximation rates of classical function spaces such as Sobolev spaces and Besov spaces . We also give lower bounds of the L^p ( 0, 1 ^d \\le \\le ) approximation error for Sobolev spaces, which show that our construction is asymptotically optimal up to a logarithm factor.", "after_revision": "We study the expressive power of deep ReLU neural networks for approximating functions in dilated shift-invariant spaces , which are widely used in signal processing, image processing, communications and so on. Approximation error bounds are estimated with respect to the width and depth of neural networks . The network construction is based on the bit extraction and data-fitting capacity of deep neural networks. As applications of our main results, the approximation rates of classical function spaces such as Sobolev spaces and Besov spaces are obtained . We also give lower bounds of the L^p ( 1 \\le p\\le \\infty ) approximation error for Sobolev spaces, which show that our construction of neural network is asymptotically optimal up to a logarithmic factor.", "edit_actions": [{"type": "R", "before": "construct", "after": "study the expressive power of", "start_char_pos": 3, "end_char_pos": 12}, {"type": "R", "before": "to approximate", "after": "for approximating", "start_char_pos": 39, "end_char_pos": 53}, {"type": "R", "before": "generated by a continuous function with compact support and study the approximation rates", "after": ", which are widely used in signal processing, image processing, communications and so on. Approximation error bounds are estimated", "start_char_pos": 98, "end_char_pos": 187}, {"type": "R", "before": "number of neurons", "after": "width and depth of neural networks", "start_char_pos": 208, "end_char_pos": 225}, {"type": "R", "before": "data fitting", "after": "data-fitting", "start_char_pos": 288, "end_char_pos": 300}, {"type": "R", "before": "Combining with existing results of approximation from shift-invariant spaces, we are able to estimate", "after": "As applications of our main results,", "start_char_pos": 335, "end_char_pos": 436}, {"type": "A", "before": null, "after": "are obtained", "start_char_pos": 530, "end_char_pos": 530}, {"type": "D", "before": "0,", "after": null, "start_char_pos": 572, "end_char_pos": 574}, {"type": "D", "before": "^d", "after": null, "start_char_pos": 577, "end_char_pos": 579}, {"type": "A", "before": null, "after": "p", "start_char_pos": 584, "end_char_pos": 584}, {"type": "A", "before": null, "after": "\\infty", "start_char_pos": 588, "end_char_pos": 588}, {"type": "A", "before": null, "after": "of neural network", "start_char_pos": 664, "end_char_pos": 664}, {"type": "R", "before": "logarithm", "after": "logarithmic", "start_char_pos": 699, "end_char_pos": 708}], "sents_char_pos": [0, 227, 334, 532]}
+{"doc_id": "2005.12668", "revision_depth": "1", "before_revision": "The COVID-19 pandemic has sparked unprecedented mobilization of scientists, already generating thousands of new papers that join a litany of previous biomedical work in related areas. This deluge of information makes it hard for researchers to keep track of their own research area, let alone explore new directions. Standard search engines are designed primarily for targeted search and are not geared for discovery or making connections that are not obvious from reading individual papers . In this paper, we present our ongoing work on SciSight, a novel framework for exploratory search of COVID-19 research . Based on formative interviews with scientists and a review of existing tools, we build and integrate two key capabilities: first, exploring interactions between biomedical facets (e.g., proteins, genes, drugs, diseases, patient characteristics); and second, discovering groups of researchers and how they are connected. We extract entities using a language model pre-trained on several biomedical information extraction tasks, and enrich them with data from the Microsoft Academic Graph (MAG). To find research groups automatically, we use hierarchical clustering with overlap to allow authors, as they do, to belong to multiple groups. Finally, we introduce a novel presentation of these groups based on both topical and social affinities, allowing users to drill down from groups to papers to associations between entities, and update query suggestions on the fly with the goal of facilitating exploratory navigation . SciSight has thus far served over 10K users with over 30K page views and 13 \\% returning users. Preliminary user interviews with biomedical researchers suggest that SciSight complements current approaches and helps find new and relevant knowledge.%DIFDELCMD < \\end{abstract} %DIFDELCMD < %%% \\\\%DIF > returns.", "after_revision": "The COVID-19 pandemic has sparked unprecedented mobilization of scientists, generating a deluge of papers that makes it hard for researchers to keep track and explore new directions. Search engines are designed for targeted queries, not for discovery of connections across a corpus . In this paper, we present SciSight, a system for exploratory search of COVID-19 research integrating two key capabilities: first, exploring associations between biomedical facets automatically extracted from papers (e.g., genes, drugs, diseases, patient outcomes); second, combining textual and network information to search and visualize groups of researchers and their ties . SciSight has so far served over 15K users with over 42K page views and 13 %DIFDELCMD < \\end{abstract} %DIFDELCMD < %%% \\\\%DIF > returns.", "edit_actions": [{"type": "R", "before": "already generating thousands of new papers that join a litany of previous biomedical work in related areas. This deluge of information", "after": "generating a deluge of papers that", "start_char_pos": 76, "end_char_pos": 210}, {"type": "R", "before": "of their own research area, let alone", "after": "and", "start_char_pos": 255, "end_char_pos": 292}, {"type": "R", "before": "Standard search", "after": "Search", "start_char_pos": 317, "end_char_pos": 332}, {"type": "R", "before": "primarily for targeted search and are not geared for discovery or making connections that are not obvious from reading individual papers", "after": "for targeted queries, not for discovery of connections across a corpus", "start_char_pos": 354, "end_char_pos": 490}, {"type": "D", "before": "our ongoing work on", "after": null, "start_char_pos": 519, "end_char_pos": 538}, {"type": "R", "before": "novel framework", "after": "system", "start_char_pos": 551, "end_char_pos": 566}, {"type": "R", "before": ". Based on formative interviews with scientists and a review of existing tools, we build and integrate", "after": "integrating", "start_char_pos": 611, "end_char_pos": 713}, {"type": "R", "before": "interactions", "after": "associations", "start_char_pos": 753, "end_char_pos": 765}, {"type": "A", "before": null, "after": "automatically extracted from papers", "start_char_pos": 792, "end_char_pos": 792}, {"type": "D", "before": "proteins,", "after": null, "start_char_pos": 800, "end_char_pos": 809}, {"type": "R", "before": "characteristics); and second, discovering groups of researchers and how they are connected. We extract entities using a language model pre-trained on several biomedical information extraction tasks, and enrich them with data from the Microsoft Academic Graph (MAG). To find research groups automatically, we use hierarchical clustering with overlap to allow authors, as they do, to belong to multiple groups. Finally, we introduce a novel presentation of these groups based on both topical and social affinities, allowing users to drill down from groups to papers to associations between entities, and update query suggestions on the fly with the goal of facilitating exploratory navigation", "after": "outcomes); second, combining textual and network information to search and visualize groups of researchers and their ties", "start_char_pos": 842, "end_char_pos": 1532}, {"type": "R", "before": "thus", "after": "so", "start_char_pos": 1548, "end_char_pos": 1552}, {"type": "R", "before": "10K", "after": "15K", "start_char_pos": 1569, "end_char_pos": 1572}, {"type": "R", "before": "30K", "after": "42K", "start_char_pos": 1589, "end_char_pos": 1592}, {"type": "D", "before": "\\% returning users. Preliminary user interviews with biomedical researchers suggest that SciSight complements current approaches and helps find new and relevant knowledge.", "after": null, "start_char_pos": 1611, "end_char_pos": 1782}], "sents_char_pos": [0, 183, 316, 492, 859, 933, 1107, 1250, 1630, 1782]}
+{"doc_id": "2005.12964", "revision_depth": "3", "before_revision": "Deep candidate generation (DCG) , which narrows down the enormous corpus to a few hundred candidate items via representation learning , is integral to industrial recommender systems. Standard approaches adopt maximum likelihood estimation (MLE) and rely on sampling to ensure scalability , which reduces DCG to a task similar to language modeling. However, live recommender systems face severe unfairness of exposure with a corpus several orders of magnitude larger than that of natural language, which implies that (1) MLE will preserve and even exacerbate the exposure bias in the long run , as it aims to faithfully fit the history records , and (2) suboptimal sampling and inadequate use of item features can lead to inferior representations for the items that are unfairly ignored . In this paper, we introduce CLRec, a Contrastive Learning paradigm successfully deployed in a real-world massive recommender system, for alleviating exposure unfairness in DCG. We theoretically prove that a popular choice of contrastive loss is equivalent to reducing the exposure bias via inverse propensity scoring, which complements previous understanding of contrastive learning. We further implement a good sampling distribution and reuse most of the computation when encoding rich features for both positive and negative items, by employing a fix-sized queue to store items (and reuse the computed representations ) from previous batches, where the queue serves as the negative sampler . Extensive offline analyses and four-month online A/B tests in Mobile Taobao demonstrate substantial improvement, including a dramatic reduction in the Matthew effect.", "after_revision": "Deep candidate generation (DCG) that narrows down the collection of relevant items from billions to hundreds via representation learning is essential to large-scale recommender systems. Standard approaches approximate maximum likelihood estimation (MLE) through sampling for better scalability and address the problem of DCG in a way similar to language modeling. However, live recommender systems face severe unfairness of exposure with a vocabulary several orders of magnitude larger than that of natural language, implying that (1) MLE will preserve and even exacerbate the exposure bias in the long run in order to faithfully fit the observed samples , and (2) suboptimal sampling and inadequate use of item features can lead to inferior representations for the unfairly ignored items . In this paper, we introduce CLRec, a Contrastive Learning paradigm that has been successfully deployed in a real-world massive recommender system, to alleviate exposure bias in DCG. We theoretically prove that a popular choice of contrastive loss is equivalently reducing the exposure bias via inverse propensity scoring, which provides a new perspective on the effectiveness of contrastive learning. We further employ a fix-sized queue to store the items' representations computed in previously processed batches, and use the queue to serve as an effective sampler of negative examples. This queue-based design provides great efficiency in incorporating rich features of the thousand negative items per batch thanks to computation reuse . Extensive offline analyses and four-month online A/B tests in Mobile Taobao demonstrate substantial improvement, including a dramatic reduction in the Matthew effect.", "edit_actions": [{"type": "R", "before": ", which", "after": "that", "start_char_pos": 32, "end_char_pos": 39}, {"type": "R", "before": "enormous corpus to a few hundred candidate items", "after": "collection of relevant items from billions to hundreds", "start_char_pos": 57, "end_char_pos": 105}, {"type": "R", "before": ", is integral to industrial", "after": "is essential to large-scale", "start_char_pos": 134, "end_char_pos": 161}, {"type": "R", "before": "adopt", "after": "approximate", "start_char_pos": 203, "end_char_pos": 208}, {"type": "R", "before": "and rely on sampling to ensure scalability , which reduces DCG to a task", "after": "through sampling for better scalability and address the problem of DCG in a way", "start_char_pos": 245, "end_char_pos": 317}, {"type": "R", "before": "corpus", "after": "vocabulary", "start_char_pos": 424, "end_char_pos": 430}, {"type": "R", "before": "which implies", "after": "implying", "start_char_pos": 497, "end_char_pos": 510}, {"type": "R", "before": ", as it aims", "after": "in order", "start_char_pos": 592, "end_char_pos": 604}, {"type": "R", "before": "history records", "after": "observed samples", "start_char_pos": 627, "end_char_pos": 642}, {"type": "R", "before": "items that are unfairly ignored", "after": "unfairly ignored items", "start_char_pos": 754, "end_char_pos": 785}, {"type": "A", "before": null, "after": "that has been", "start_char_pos": 855, "end_char_pos": 855}, {"type": "R", "before": "for alleviating exposure unfairness", "after": "to alleviate exposure bias", "start_char_pos": 922, "end_char_pos": 957}, {"type": "R", "before": "equivalent to", "after": "equivalently", "start_char_pos": 1034, "end_char_pos": 1047}, {"type": "R", "before": "complements previous understanding", "after": "provides a new perspective on the effectiveness", "start_char_pos": 1113, "end_char_pos": 1147}, {"type": "R", "before": "implement a good sampling distribution and reuse most of the computation when encoding rich features for both positive and negative items, by employing a", "after": "employ a", "start_char_pos": 1184, "end_char_pos": 1337}, {"type": "D", "before": "items (and reuse the computed representations ) from previous batches, where the queue serves as", "after": null, "start_char_pos": 1363, "end_char_pos": 1459}, {"type": "R", "before": "negative sampler", "after": "items' representations computed in previously processed batches, and use the queue to serve as an effective sampler of negative examples. This queue-based design provides great efficiency in incorporating rich features of the thousand negative items per batch thanks to computation reuse", "start_char_pos": 1464, "end_char_pos": 1480}], "sents_char_pos": [0, 182, 347, 787, 965, 1172]}
+{"doc_id": "2005.13650", "revision_depth": "1", "before_revision": "We iterate Dorfman's pool testing algorithm \\mbox{%DIFAUXCMD dorfman previous stage. We compute the mean and variance of the number of tests per individual as a function of the pool sizes m=(m_1,\\dots,m_k) in the first k stages; in the (k+1)-th stage all remaining individuals are tested. Denote by D_k(m,p) the mean number of tests per individual, which we will call the cost of the strategy m. The goal is to minimize D_k(m,p) and to find the optimizing values k and m. We show that the cost of the strategy (3^k,%DIFDELCMD < \\dots%%% ,3) with k\\approx \\log_3(1/p) is of order p\\log(1/p), and differs from the optimal cost by a fraction of this value. To prove this result we bound the difference between the cost of this strategy with the minimal cost when pool sizes take real values. We conjecture that the optimal strategy, depending on the value of p, is indeed of the form (3^k ,%DIFDELCMD < \\dots%%% , 3 ) or of the form (3 ^{k-1}4,3^{k-1} \\dots,3 ), with a precise description for k. This conjecture is supported by inspection of a family of values of p. Finally, we observe that for these values of p and the best strategy of the form (3^k,\\dots,3), \\big(\\big) the standard deviation of the number of tests per individual is of the same order as the cost . As an example, when p=0.02 , the optimal strategy is k=3, m=(27,9,3) . The cost of this strategy is 0.20 , that is, the mean number of tests required to screen 100 individuals is 20.", "after_revision": "In order to identify the infected individuals of a population, their samples are divided in equally sized groups called pools and a single laboratory test is applied to each pool. Individuals whose samples belong to pools that test negative are declared healthy, while each pool that tests positive is divided into smaller, equally sized pools which are tested in the next stage. This scheme is called adaptive, because the composition of the pools at each stage depends on results from previous stages, and nested because each pool is a subset of a pool of the previous stage. Is the infection probability p is not smaller than 1-3^{-1/3 compute the mean D_k(m,p) and the variance of the number of tests per individual as a function of the pool sizes m=(m_1,\\dots,m_k) in the first k stages; in the (k+1)-th stage all remaining samples are tested. The case k=1 was proposed by Dorfman in his seminal paper in 1943. The goal is to minimize D_k(m,p) , which is called the cost associated to~ m. We show that %DIFDELCMD < \\dots%%% for p\\in (0, 1-3^{-1/3 (3^k %DIFDELCMD < \\dots%%% \\text{ or 3 ^{k-1}4,3^{k-1} , \\dots,3 ^2,3 ), with a precise description of the range of p's where each holds. We then focus on schemes of the type (3^k,\\dots,3), and estimate that the cost of the best scheme of this type for p, determined by the choice of k=k_3(p), is of order O\\big(p\\log(1/p)\\big). This is the same order as that of the cost of the optimal scheme, and the difference of these costs is explicitly bounded . As an example, for p=0.02 the optimal choice is k=3, m=(27,9,3) , with cost 0.20 ; that is, the mean number of tests required to screen 100 individuals is 20.", "edit_actions": [{"type": "R", "before": "We iterate Dorfman's pool testing algorithm \\mbox{%DIFAUXCMD dorfman", "after": "In order to identify the infected individuals of a population, their samples are divided in equally sized groups called pools and a single laboratory test is applied to each pool. Individuals whose samples belong to pools that test negative are declared healthy, while each pool that tests positive is divided into smaller, equally sized pools which are tested in the next stage. This scheme is called adaptive, because the composition of the pools at each stage depends on results from previous stages, and nested because each pool is a subset of a pool of the", "start_char_pos": 0, "end_char_pos": 68}, {"type": "R", "before": "We", "after": "Is the infection probability p is not smaller than 1-3^{-1/3", "start_char_pos": 85, "end_char_pos": 87}, {"type": "R", "before": "and", "after": "D_k(m,p) and the", "start_char_pos": 105, "end_char_pos": 108}, {"type": "R", "before": "individuals", "after": "samples", "start_char_pos": 265, "end_char_pos": 276}, {"type": "R", "before": "Denote by D_k(m,p) the mean number of tests per individual, which we will call the cost of the strategy m.", "after": "The case k=1 was proposed by Dorfman in his seminal paper in 1943.", "start_char_pos": 289, "end_char_pos": 395}, {"type": "R", "before": "and to find the optimizing values k and", "after": ", which is called the cost associated to~", "start_char_pos": 429, "end_char_pos": 468}, {"type": "D", "before": "the cost of the strategy (3^k,", "after": null, "start_char_pos": 485, "end_char_pos": 515}, {"type": "R", "before": ",3) with k\\approx \\log_3(1/p) is of order p\\log(1/p), and differs from the optimal cost by a fraction of this value. To prove this result we bound the difference between the cost of this strategy with the minimal cost when pool sizes take real values. We conjecture that the optimal strategy, depending on the value of p, is indeed of the form", "after": "for p\\in (0, 1-3^{-1/3", "start_char_pos": 537, "end_char_pos": 880}, {"type": "D", "before": ",", "after": null, "start_char_pos": 886, "end_char_pos": 887}, {"type": "R", "before": ",", "after": "\\text{ or", "start_char_pos": 909, "end_char_pos": 910}, {"type": "D", "before": ") or of the form (3", "after": null, "start_char_pos": 913, "end_char_pos": 932}, {"type": "A", "before": null, "after": ",", "start_char_pos": 949, "end_char_pos": 949}, {"type": "A", "before": null, "after": "^2,3", "start_char_pos": 958, "end_char_pos": 958}, {"type": "R", "before": "for k. This conjecture is supported by inspection of a family of values of p. Finally, we observe that for these values of p and the best strategy of the form", "after": "of the range of p's where each holds. We then focus on schemes of the type", "start_char_pos": 989, "end_char_pos": 1147}, {"type": "A", "before": null, "after": "and estimate that the cost of the best scheme of this type for p, determined by the choice of k=k_3(p), is of order O", "start_char_pos": 1163, "end_char_pos": 1163}, {"type": "A", "before": null, "after": "p\\log(1/p)", "start_char_pos": 1168, "end_char_pos": 1168}, {"type": "A", "before": null, "after": ". This is", "start_char_pos": 1173, "end_char_pos": 1173}, {"type": "D", "before": "standard deviation of the number of tests per individual is of the", "after": null, "start_char_pos": 1178, "end_char_pos": 1244}, {"type": "R", "before": "the cost", "after": "that of the cost of the optimal scheme, and the difference of these costs is explicitly bounded", "start_char_pos": 1259, "end_char_pos": 1267}, {"type": "R", "before": "when", "after": "for", "start_char_pos": 1285, "end_char_pos": 1289}, {"type": "R", "before": ", the optimal strategy", "after": "the optimal choice", "start_char_pos": 1297, "end_char_pos": 1319}, {"type": "R", "before": ". The cost of this strategy is", "after": ", with cost", "start_char_pos": 1339, "end_char_pos": 1369}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 1375, "end_char_pos": 1376}], "sents_char_pos": [0, 84, 228, 288, 395, 471, 653, 788, 995, 1269, 1340]}
+{"doc_id": "2006.00686", "revision_depth": "1", "before_revision": "The X-ray transform models a forward projection operator of image formation, which has been widely used for tomographic image reconstruction. We propose a new algorithm to compute that transform of an image represented by unit (pixel/voxel) basis functions , for various two-dimensional (2D)/three-dimensional (3D) scanning geometries, such as 2D/3D parallel beam, 2D fan beam, 3D circular/helical cone beam, etc. Since the transform is acting as a line integral, the fundamental task is to calculate this integral of the unit basis functions, which is equivalently the intersection length of the ray with the associated unit. For a given ray, using the support of unit basis function, we derive the sufficient and necessary condition of non-vanishing intersectability , and obtain the analytic formula for the intersection length, which can be used to distinguish the units that produce valid intersections with the given ray, and then perform simple calculations only for those units . The algorithm is easy to be implemented, and the computational cost is optimal. Moreover, we discuss the intrinsic ambiguities of the problem itself that perhaps happen , and present a solution. The algorithm not only possesses the adaptability with regard to the center position, scale and size of the image, and the scanning geometry as well, but also is quite suited to parallelize with optimality. The resulting projection matrix can be sparsely stored and output if needed, and the adjoint of X-ray transform can be also computed by the algorithm . Finally, we validate the correctness of the algorithm by the aforementioned scanning geometries.", "after_revision": " We propose a new algorithm to compute the X-ray transform of an image represented by unit (pixel/voxel) basis functions . The fundamental issue is equivalently calculating the intersection lengths of the ray with associated units. For any given ray, we first derive the sufficient and necessary condition for non-vanishing intersectability . By this condition, we then distinguish the units that produce valid intersections with the ray. Only for those units rather than all the individuals, we calculate the intersection lengths by the obtained analytic formula. The proposed algorithm is adapted to 2D/3D parallel beam and 2D fan beam. Particularly, we derive the transformation formulas and generalize the algorithm to 3D circular and helical cone beams . Moreover, we discuss the intrinsic ambiguities of the problem itself , and present a solution. The algorithm not only possesses the adaptability with regard to the center position, scale and size of the image, but also is suited to parallelize with optimality. The comparison study demonstrates the proposed algorithm is fast, more complete, and is more flexible with respect to different scanning geometries and different basis functions . Finally, we validate the correctness of the algorithm by the aforementioned scanning geometries.", "edit_actions": [{"type": "D", "before": "The X-ray transform models a forward projection operator of image formation, which has been widely used for tomographic image reconstruction.", "after": null, "start_char_pos": 0, "end_char_pos": 141}, {"type": "R", "before": "that", "after": "the X-ray", "start_char_pos": 180, "end_char_pos": 184}, {"type": "R", "before": ", for various two-dimensional (2D)/three-dimensional (3D) scanning geometries, such as 2D/3D parallel beam, 2D fan beam, 3D circular/helical cone beam, etc. Since the transform is acting as a line integral, the fundamental task is to calculate this integral of the unit basis functions, which is equivalently the intersection length", "after": ". The fundamental issue is equivalently calculating the intersection lengths", "start_char_pos": 257, "end_char_pos": 589}, {"type": "R", "before": "the associated unit. For a", "after": "associated units. For any", "start_char_pos": 606, "end_char_pos": 632}, {"type": "R", "before": "using the support of unit basis function, we", "after": "we first", "start_char_pos": 644, "end_char_pos": 688}, {"type": "R", "before": "of", "after": "for", "start_char_pos": 735, "end_char_pos": 737}, {"type": "R", "before": ", and obtain the analytic formula for the intersection length, which can be used to", "after": ". By this condition, we then", "start_char_pos": 769, "end_char_pos": 852}, {"type": "R", "before": "given ray, and then perform simple calculations only", "after": "ray. Only", "start_char_pos": 917, "end_char_pos": 969}, {"type": "A", "before": null, "after": "rather than all the individuals, we calculate the intersection lengths by the obtained analytic formula. The proposed algorithm is adapted to 2D/3D parallel beam and 2D fan beam. Particularly, we derive the transformation formulas and generalize the algorithm to 3D circular and helical cone beams", "start_char_pos": 986, "end_char_pos": 986}, {"type": "D", "before": "The algorithm is easy to be implemented, and the computational cost is optimal.", "after": null, "start_char_pos": 989, "end_char_pos": 1068}, {"type": "D", "before": "that perhaps happen", "after": null, "start_char_pos": 1138, "end_char_pos": 1157}, {"type": "D", "before": "and the scanning geometry as well,", "after": null, "start_char_pos": 1299, "end_char_pos": 1333}, {"type": "D", "before": "quite", "after": null, "start_char_pos": 1346, "end_char_pos": 1351}, {"type": "R", "before": "resulting projection matrix can be sparsely stored and output if needed, and the adjoint of X-ray transform can be also computed by the algorithm", "after": "comparison study demonstrates the proposed algorithm is fast, more complete, and is more flexible with respect to different scanning geometries and different basis functions", "start_char_pos": 1395, "end_char_pos": 1540}], "sents_char_pos": [0, 141, 413, 626, 988, 1068, 1183, 1390, 1542]}
+{"doc_id": "2006.01215", "revision_depth": "1", "before_revision": "For general complex or real 1-parameter matrix flow A(t)_{n,n} \\CC this paper considers ways to decompose flows globally via one constant matrix C_{n,n} as A(t) = C ^{-1} \\cdot diag(A_1(t), ..., A_\\ell(t)) \\cdot C \\cdot diag(A_1,...,A_\\ell)\\cdot C } with each diagonal blockA _k(t) square and the number of blocks \\ell > 1 if possible. The theory behind our algorithm is elementary and uses the concept of invariant subspaces for the Matlab {\\tt eig} computed 'eigenvectors' of one flow matrix A (t_a) to find the coarsest simultaneous block structure for all flow matrices A (t_b). The method works very efficiently for all matrix flows, be they differentiable, continuous or discontinuous in t, and for all types of square matrix flows such as hermitean, real symmetric, normal or general complex and real flows A(t) , with or without Jordan block structures and with or without repeated eigenvalues. Our intended aim is to discover decomposable flows as they originate in sensor given outputs for time-varying matrix problems and thereby reduce the complexities of their numerical treatment .", "after_revision": "For general complex or real 1-parameter matrix flows A(t)_{n,n} and for time-invariant static matrices A \\in\\CC_{n,n this paper considers ways to decompose matrix flows and single matrices globally via one constant matrix similarity C_{n,n} as A(t) = C ^{-1} \\cdot diag(A_1(t), ..., A_\\ell(t)) \\cdot C or A = C^{-1\\cdot diag(A_1,...,A_\\ell)\\cdot C } with each diagonal block A _k(t) or A_k square and their number \\ell > 1 if this is possible. The theory behind our proposed algorithm is elementary and uses the concept of invariant subspaces for the Matlab {\\tt eig} computed 'eigenvectors' of one associated flow matrix B (t_a) to find the coarsest simultaneous block structure for all flow matrices B (t_b). The method works very efficiently for all time-varying matrix flows, be they differentiable, continuous or discontinuous in t, and for all fixed entry matrices A; as well as for all types of square matrix flows or fixed entry matrices such as hermitean, real symmetric, normal or general complex and real flows A(t) or static matrices A , with or without Jordan block structures and with or without repeated eigenvalues. Our intended aim is to discover diagonal-block decomposable flows as they originate in sensor driven outputs for time-varying matrix problems and thereby help to reduce the complexities of their numerical treatments through adapting 'divide and conquer' methods for their diagonal sub-blocks. Our method is also applicable to standard fixed entry matrices of all structures and types. In the process we discover and study k-normal fixed entry matrix classes that can be decomposed under unitary similarities into various k-dimensional block-diagonal forms .", "edit_actions": [{"type": "R", "before": "flow", "after": "flows", "start_char_pos": 47, "end_char_pos": 51}, {"type": "A", "before": null, "after": "and for time-invariant static matrices A \\in", "start_char_pos": 63, "end_char_pos": 63}, {"type": "A", "before": null, "after": "_{n,n", "start_char_pos": 66, "end_char_pos": 66}, {"type": "R", "before": "flows", "after": "matrix flows and single matrices", "start_char_pos": 106, "end_char_pos": 111}, {"type": "A", "before": null, "after": "similarity", "start_char_pos": 145, "end_char_pos": 145}, {"type": "A", "before": null, "after": "or A = C^{-1", "start_char_pos": 215, "end_char_pos": 215}, {"type": "R", "before": "blockA", "after": "block A", "start_char_pos": 270, "end_char_pos": 276}, {"type": "R", "before": "square and the number of blocks", "after": "or A_k square and their number", "start_char_pos": 283, "end_char_pos": 314}, {"type": "A", "before": null, "after": "this is", "start_char_pos": 327, "end_char_pos": 327}, {"type": "A", "before": null, "after": "proposed", "start_char_pos": 360, "end_char_pos": 360}, {"type": "R", "before": "flow matrix A", "after": "associated flow matrix B", "start_char_pos": 485, "end_char_pos": 498}, {"type": "R", "before": "A", "after": "B", "start_char_pos": 577, "end_char_pos": 578}, {"type": "A", "before": null, "after": "time-varying", "start_char_pos": 628, "end_char_pos": 628}, {"type": "A", "before": null, "after": "fixed entry matrices A; as well as for all", "start_char_pos": 713, "end_char_pos": 713}, {"type": "A", "before": null, "after": "or fixed entry matrices", "start_char_pos": 743, "end_char_pos": 743}, {"type": "A", "before": null, "after": "or static matrices A", "start_char_pos": 825, "end_char_pos": 825}, {"type": "A", "before": null, "after": "diagonal-block", "start_char_pos": 942, "end_char_pos": 942}, {"type": "R", "before": "given", "after": "driven", "start_char_pos": 990, "end_char_pos": 995}, {"type": "A", "before": null, "after": "help to", "start_char_pos": 1049, "end_char_pos": 1049}, {"type": "R", "before": "treatment", "after": "treatments through adapting 'divide and conquer' methods for their diagonal sub-blocks. Our method is also applicable to standard fixed entry matrices of all structures and types. In the process we discover and study k-normal fixed entry matrix classes that can be decomposed under unitary similarities into various k-dimensional block-diagonal forms", "start_char_pos": 1093, "end_char_pos": 1102}], "sents_char_pos": [0, 337, 585, 909]}
+{"doc_id": "2006.01911", "revision_depth": "1", "before_revision": "We price European-style options written on forward contracts in a commodity market, which we model with a state-dependent infinite-dimensional Heath-Jarrow-Morton (HJM) approach. We introduce a new class of volatility operators which map the square integrable noise into the Filipovi \\'{c space of forward curves , and we specify a deterministic parametrized version of it. For calibration purposes, we train a neural network to approximate the option price as a function of the model parameters. We then use it to calibrate the HJM parameters starting from (simulated) option market data. Finally we introduce a new loss function that takes into account bid and ask prices and offers a solution to calibration in illiquid markets . A key issue discovered is that the trained neural network might be non-injective, which could potentially lead to poor accuracy in calibrating the forward curve parameters, even when showing a high degree of accuracy in recovering the prices . This reveals that the original meaning of the parameters gets somehow lost in the approximation .", "after_revision": "We price European-style options written on forward contracts in a commodity market, which we model with an infinite-dimensional Heath-Jarrow-Morton (HJM) approach. For this purpose we introduce a new class of state-dependent volatility operators that map the square integrable noise into the Filipovi \\'{c space of forward curves . For calibration, we specify a fully parametrized version of our model and train a neural network to approximate the true option price as a function of the model parameters. This neural network can then be used to calibrate the HJM parameters based on observed option prices. We conduct a numerical case study based on artificially generated option prices in a deterministic volatility setting. In this setting we derive closed pricing formulas, allowing us to benchmark the neural network based calibration approach. We also study calibration in illiquid markets with a large bid-ask spread. The experiments reveal a high degree of accuracy in recovering the prices after calibration, even if the original meaning of the model parameters is partly lost in the approximation step .", "edit_actions": [{"type": "R", "before": "a state-dependent", "after": "an", "start_char_pos": 104, "end_char_pos": 121}, {"type": "R", "before": "We", "after": "For this purpose we", "start_char_pos": 179, "end_char_pos": 181}, {"type": "R", "before": "volatility operators which", "after": "state-dependent volatility operators that", "start_char_pos": 207, "end_char_pos": 233}, {"type": "R", "before": "\\'{c", "after": "\\'{c", "start_char_pos": 284, "end_char_pos": 288}, {"type": "R", "before": ", and", "after": ". For calibration,", "start_char_pos": 313, "end_char_pos": 318}, {"type": "R", "before": "deterministic", "after": "fully", "start_char_pos": 332, "end_char_pos": 345}, {"type": "R", "before": "it. For calibration purposes, we", "after": "our model and", "start_char_pos": 370, "end_char_pos": 402}, {"type": "A", "before": null, "after": "true", "start_char_pos": 445, "end_char_pos": 445}, {"type": "R", "before": "We then use it", "after": "This neural network can then be used", "start_char_pos": 498, "end_char_pos": 512}, {"type": "R", "before": "starting from (simulated) option market data. Finally we introduce a new loss function that takes into account bid and ask prices and offers a solution to calibration", "after": "based on observed option prices. We conduct a numerical case study based on artificially generated option prices in a deterministic volatility setting. In this setting we derive closed pricing formulas, allowing us to benchmark the neural network based calibration approach. We also study calibration", "start_char_pos": 545, "end_char_pos": 711}, {"type": "R", "before": ". A key issue discovered is that the trained neural network might be non-injective, which could potentially lead to poor accuracy in calibrating the forward curve parameters, even when showing", "after": "with a large bid-ask spread. The experiments reveal", "start_char_pos": 732, "end_char_pos": 924}, {"type": "R", "before": ". This reveals that", "after": "after calibration, even if", "start_char_pos": 976, "end_char_pos": 995}, {"type": "R", "before": "parameters gets somehow", "after": "model parameters is partly", "start_char_pos": 1024, "end_char_pos": 1047}, {"type": "A", "before": null, "after": "step", "start_char_pos": 1074, "end_char_pos": 1074}], "sents_char_pos": [0, 178, 373, 497, 590, 977]}
+{"doc_id": "2006.02141", "revision_depth": "1", "before_revision": "Photoconductive devices (PCDs) enhanced with nanostructures have shown a significantly improved optical-to-terahertz conversion efficiency. While the experimental research on the development of such devices has progressed remarkably, simulation of these devices is still challenging due to the high computational cost resulting from modeling and discretization of complicated physical processes and intricate geometries. In this work, a discontinuous Galerkin (DG) method-based unit-cell scheme for efficient simulation of PCDs with periodic nanostructures is proposed. The scheme considers two physical stages of the device and model them using two coupled systems, i.e., a Poisson-drift-diffusion (DD) system describing the nonequilibrium steady state, and a Maxwell-DD system describing the transient stage. A \"potential-drop\" boundary condition is enforced on the opposing boundaries of the unit cell to mimic the effect of the bias voltage. Periodic boundary conditions are used for carrier densities and electromagnetic fields. The unit-cell model composed of these coupled equations and boundary conditions is discretized and solved using DG methods. The boundary conditions are enforced weakly through the numerical flux of DG. Numerical results show that the proposed DG-based unit-cell scheme models the device accurately but is significantly faster than the DG scheme that takes into account the whole device .", "after_revision": "Photoconductive devices (PCDs) enhanced with nanostructures have a significantly improved optical-to-terahertz conversion efficiency. While the experimental research on the development of these devices has progressed remarkably, their simulation is still challenging due to the need for accurate and efficient modeling of multiphysics processes and intricate device geometries. In this work, a discontinuous Galerkin (DG) method-based unit-cell scheme for efficient simulation of PCDs with periodic nanostructures is proposed. The scheme considers two physical stages of the device and models them using two coupled systems, i.e., a system of Poisson and drift-diffusion equations describing the nonequilibrium steady state, and a system of Maxwell and drift-diffusion equations describing the transient stage. A \"potential-drop\" boundary condition is enforced on the opposing boundaries of the unit cell to mimic the effect of the bias voltage. Periodic boundary conditions are used for carrier densities and electromagnetic fields. The unit-cell model described by these coupled equations and boundary conditions is discretized using DG methods. The resulting DG-based unit-cell scheme is significantly faster than the DG scheme that takes into account the whole device . Additionally, the proposed scheme is used for the first-ever numerical demonstration of optical- and radiation-field screening effects on PCD response. The optical-field screening is found to play a more dominant role in the saturation of PCD output at high levels of optical pump power .", "edit_actions": [{"type": "D", "before": "shown", "after": null, "start_char_pos": 65, "end_char_pos": 70}, {"type": "R", "before": "such", "after": "these", "start_char_pos": 194, "end_char_pos": 198}, {"type": "R", "before": "simulation of these devices", "after": "their simulation", "start_char_pos": 234, "end_char_pos": 261}, {"type": "R", "before": "high computational cost resulting from modeling and discretization of complicated physical", "after": "need for accurate and efficient modeling of multiphysics", "start_char_pos": 294, "end_char_pos": 384}, {"type": "A", "before": null, "after": "device", "start_char_pos": 409, "end_char_pos": 409}, {"type": "R", "before": "model", "after": "models", "start_char_pos": 630, "end_char_pos": 635}, {"type": "R", "before": "Poisson-drift-diffusion (DD) system", "after": "system of Poisson and drift-diffusion equations", "start_char_pos": 676, "end_char_pos": 711}, {"type": "R", "before": "Maxwell-DD system", "after": "system of Maxwell and drift-diffusion equations", "start_char_pos": 762, "end_char_pos": 779}, {"type": "R", "before": "composed of", "after": "described by", "start_char_pos": 1055, "end_char_pos": 1066}, {"type": "D", "before": "and solved", "after": null, "start_char_pos": 1130, "end_char_pos": 1140}, {"type": "R", "before": "boundary conditions are enforced weakly through the numerical flux of DG. Numerical results show that the proposed", "after": "resulting", "start_char_pos": 1163, "end_char_pos": 1277}, {"type": "D", "before": "models the device accurately but", "after": null, "start_char_pos": 1304, "end_char_pos": 1336}, {"type": "A", "before": null, "after": ". Additionally, the proposed scheme is used for the first-ever numerical demonstration of optical- and radiation-field screening effects on PCD response. The optical-field screening is found to play a more dominant role in the saturation of PCD output at high levels of optical pump power", "start_char_pos": 1421, "end_char_pos": 1421}], "sents_char_pos": [0, 139, 421, 570, 811, 946, 1034, 1158]}
+{"doc_id": "2006.03141", "revision_depth": "1", "before_revision": "We describe in this report our studies to understand the relationship between human mobility and the spreading of COVID-19 , as an aid to manage the restart of the social and economic activities after the lockdown and monitor the epidemics in the coming weeks and months. We compare the evolution (from January to May 2020 ) of the daily mobilityflows in Italy, measured by means of nation-wide mobile phone data, and the evolution of transmissibility, measured by the net reproduction number, i.e., the mean number of secondary infections generated by one primary infector in the presence of control interventions and human behavioural adaptations. We find a striking relationship between the negative variation of mobility flows and the net reproduction number , in all Italian regions, between March 11th and March 18th, when the country entered the lockdown. This observation allows us to quantify the time needed to \"switch off \" the country mobility (one week) and the time required to bring the net reproduction number below 1 (one week). A reasonably simple regression model provides evidence that the net reproduction number is correlated with a region's incoming, outgoing and internal mobility. We also find a strong relationship between the number of days above the epidemic threshold before the mobility flows reduce significantly as an effect of lockdowns, and the total number of confirmed SARS-CoV-2 infections per 100k inhabitants , thus indirectly showing the effectiveness of the lockdown and the other non-pharmaceutical interventions in the containment of the contagion . Our study demonstrates the value of \"big \" mobility data to the monitoring of key epidemic indicators to inform choices as the epidemics unfolds in the coming months .", "after_revision": "In 2020, countries affected by the COVID-19 pandemic implemented various non-pharmaceutical interventions to contrast the spread of the virus and its impact on their healthcare systems and economies. Using Italian data at different geographic scales, we investigate the relationship between human mobility, which subsumes many facets of the population's response to the changing situation, and the spread of COVID-19. Leveraging mobile phone data from February through September 2020 , we find a striking relationship between the decrease in mobility flows and the net reproduction number . We find that the time needed to switch off mobility and bring the net reproduction number below the critical threshold of 1 is about one week. Moreover, we observe a strong relationship between the number of days spent above such threshold before the lockdown-induced drop in mobility flows and the total number of infections per 100k inhabitants . Estimating the statistical effect of mobility flows on the net reproduction number over time, we document a 2-week lag positive association, strong in March and April, and weaker but still significant in June . Our study demonstrates the value of big mobility data to monitor the epidemic and inform control interventions during its unfolding .", "edit_actions": [{"type": "R", "before": "We describe in this report our studies to understand the relationship between human mobility and the spreading of", "after": "In 2020, countries affected by the", "start_char_pos": 0, "end_char_pos": 113}, {"type": "R", "before": ", as an aid to manage the restart of the social and economic activities after the lockdown and monitor the epidemics in the coming weeks and months. We compare the evolution (from January to May", "after": "pandemic implemented various non-pharmaceutical interventions to contrast the spread of the virus and its impact on their healthcare systems and economies. Using Italian data at different geographic scales, we investigate the relationship between human mobility, which subsumes many facets of the population's response to the changing situation, and the spread of COVID-19. Leveraging mobile phone data from February through September", "start_char_pos": 123, "end_char_pos": 317}, {"type": "R", "before": ") of the daily mobilityflows in Italy, measured by means of nation-wide mobile phone data, and the evolution of transmissibility, measured by the net reproduction number, i.e., the mean number of secondary infections generated by one primary infector in the presence of control interventions and human behavioural adaptations. We", "after": ", we", "start_char_pos": 323, "end_char_pos": 652}, {"type": "R", "before": "negative variation of", "after": "decrease in", "start_char_pos": 694, "end_char_pos": 715}, {"type": "R", "before": ", in all Italian regions, between March 11th and March 18th, when the country entered the lockdown. This observation allows us to quantify", "after": ". We find that", "start_char_pos": 763, "end_char_pos": 901}, {"type": "R", "before": "\"switch off \" the country mobility (one week) and the time required to", "after": "switch off mobility and", "start_char_pos": 921, "end_char_pos": 991}, {"type": "A", "before": null, "after": "the critical threshold of", "start_char_pos": 1032, "end_char_pos": 1032}, {"type": "R", "before": "(one week). A reasonably simple regression model provides evidence that the net reproduction number is correlated with a region's incoming, outgoing and internal mobility. We also find", "after": "is about one week. Moreover, we observe", "start_char_pos": 1035, "end_char_pos": 1219}, {"type": "R", "before": "above the epidemic", "after": "spent above such", "start_char_pos": 1269, "end_char_pos": 1287}, {"type": "R", "before": "mobility flows reduce significantly as an effect of lockdowns,", "after": "lockdown-induced drop in mobility flows", "start_char_pos": 1309, "end_char_pos": 1371}, {"type": "D", "before": "confirmed SARS-CoV-2", "after": null, "start_char_pos": 1396, "end_char_pos": 1416}, {"type": "R", "before": ", thus indirectly showing the effectiveness of the lockdown and the other non-pharmaceutical interventions in the containment of the contagion", "after": ". Estimating the statistical effect of mobility flows on the net reproduction number over time, we document a 2-week lag positive association, strong in March and April, and weaker but still significant in June", "start_char_pos": 1449, "end_char_pos": 1591}, {"type": "R", "before": "\"big \"", "after": "big", "start_char_pos": 1630, "end_char_pos": 1636}, {"type": "R", "before": "the monitoring of key epidemic indicators to inform choices as the epidemics unfolds in the coming months", "after": "monitor the epidemic and inform control interventions during its unfolding", "start_char_pos": 1654, "end_char_pos": 1759}], "sents_char_pos": [0, 271, 649, 862, 1046, 1206, 1593]}
+{"doc_id": "2006.03840", "revision_depth": "1", "before_revision": " 3D Morphable Models (3DMMs) are powerful statistical tools for representing and modeling 3D faces . To build a 3DMM, a training set of fully registered face scans is required, and its modeling capabilities directly depend on the variability contained in the training data. Thus, accurately establishing a dense point-to-point correspondence across heterogeneous scans with sufficient diversity in terms of identities, ethnicities, or expressions becomes essential. In this manuscript, we present an approach that leverages a 3DMM to transfer its dense semantic annotation across a large set of heterogeneous 3D faces , establishing a dense correspondence between them. To this aim, we propose a novel formulation to learn a set of sparse deformation components with local support on the face that, together with an original non-rigid deformation algorithm, allow precisely fitting the 3DMM to arbitrary faces and transfer its semantic annotation . We experimented our approach on three large and diverse datasets, showing it can effectively generalize to very different samples and accurately establish a dense correspondence even in presence of complex facial expressions or unseen deformations. As main outcome of this work, we build a heterogeneous, large-scale 3DMM from more than 9,000 fully registered scans obtained joining the three datasets together .", "after_revision": "The 3D Morphable Model (3DMM) is a powerful statistical tool for representing 3D face shapes . To build a 3DMM, a training set of scans in full point-to-point correspondence is required, and its modeling capabilities directly depend on the variability of the training data. Hence, to increase the descriptive power of a 3DMM, accurately establishing dense correspondence across heterogeneous scans with sufficient diversity in terms of identities, ethnicities, or expressions becomes essential. In this manuscript, we present a fully automatic approach that leverages a 3DMM to establish a dense correspondence across raw 3D faces . We propose a novel formulation to learn a set of sparse deformation components with local support on the face that, together with an original non-rigid deformation algorithm, allow the 3DMM to precisely fit unseen faces and transfer its semantic annotation to arbitrary 3D faces . We experimented our approach on three large and diverse datasets, showing it can effectively generalize to very different samples and accurately establish a dense correspondence even in presence of complex facial expressions . The accuracy of the dense registration is demonstrated by building a heterogeneous, large-scale 3DMM from more than 9,000 fully registered scans obtained by joining the three datasets .", "edit_actions": [{"type": "A", "before": null, "after": "The", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "Models (3DMMs) are powerful statistical tools for representing and modeling", "after": "Model (3DMM) is a powerful statistical tool for representing", "start_char_pos": 14, "end_char_pos": 89}, {"type": "R", "before": "faces", "after": "face shapes", "start_char_pos": 93, "end_char_pos": 98}, {"type": "R", "before": "fully registered face scans", "after": "scans in full point-to-point correspondence", "start_char_pos": 136, "end_char_pos": 163}, {"type": "R", "before": "contained in", "after": "of", "start_char_pos": 242, "end_char_pos": 254}, {"type": "R", "before": "Thus, accurately establishing a dense point-to-point", "after": "Hence, to increase the descriptive power of a 3DMM, accurately establishing dense", "start_char_pos": 274, "end_char_pos": 326}, {"type": "R", "before": "an", "after": "a fully automatic", "start_char_pos": 497, "end_char_pos": 499}, {"type": "R", "before": "transfer its dense semantic annotation across a large set of heterogeneous", "after": "establish a dense correspondence across raw", "start_char_pos": 534, "end_char_pos": 608}, {"type": "R", "before": ", establishing a dense correspondence between them. To this aim, we", "after": ". We", "start_char_pos": 618, "end_char_pos": 685}, {"type": "D", "before": "precisely fitting", "after": null, "start_char_pos": 864, "end_char_pos": 881}, {"type": "R", "before": "arbitrary", "after": "precisely fit unseen", "start_char_pos": 894, "end_char_pos": 903}, {"type": "A", "before": null, "after": "to arbitrary 3D faces", "start_char_pos": 947, "end_char_pos": 947}, {"type": "R", "before": "or unseen deformations. As main outcome of this work, we build", "after": ". The accuracy of the dense registration is demonstrated by building", "start_char_pos": 1175, "end_char_pos": 1237}, {"type": "A", "before": null, "after": "by", "start_char_pos": 1325, "end_char_pos": 1325}, {"type": "D", "before": "together", "after": null, "start_char_pos": 1353, "end_char_pos": 1361}], "sents_char_pos": [0, 100, 273, 465, 669, 949, 1198]}
+{"doc_id": "2006.04816", "revision_depth": "1", "before_revision": "The COVID-19 pandemic has deeply impacted people's lives around the globe. During the extended lockdowns caused by the pandemic, online communities are crucial for people to access information and share experiences . In particular, two \"new\" communities have emerged on Reddit: /r/China _flu and /r/Coronavirus . By studying activities and users in these two communities, we provide a characterization of people's responses to COVID-19 on Reddit . First, we find that user activity peaks around March 17, when the World Health Organization (WHO) announced COVID-19 as a pandemic. Shortly after that, the activity levels of both communities have been declining week by week. We further illustrate the central role of these two communities in the emergence of COVID-related communities. Second, we study the differences between these two communities. /r/ Coronavirus is recommended as the official community for COVID-19 on Reddit, while /r / China _flu adopts a loose moderation practice. As a result, we observe that these two communities are gradually growing apart and more extremism is being found in /r/China _flu. Finally, we examine the spillover effect of the COVID-19 pandemic on user activity across the entire Reddit platform. Our results show significant changes in user activities outside COVID-related communities . In subreddits related to finance, food, and countries / cities, user activity is recovering to the pre-pandemic level in late April and May as countries reopen, but subreddits related to travel and sports remain highly impacted and show lower activity levels than the pre-pandemic period. Our work highlights the strength of Reddit as a source for understanding public reactions to COVID-19 and the importance of content moderation on the Internet during a pandemic .", "after_revision": "As the COVID-19 pandemic is disrupting life worldwide, related online communities are popping up . In particular, two \"new\" communities , /r/China flu and /r/Coronavirus , emerged on Reddit and have been dedicated to COVID- related discussions from the very beginning of this pandemic. With /r/Coronavirus promoted as the official community on Reddit, it remains an open question how users choose between these two highly-related communities. In this paper, we characterize user trajectories in these two communities from the beginning of COVID-19 to the end of September 2020. We show that new users of /r/ China flu and /r /Coronavirus were similar from January to March. After that, their differences steadily increase, evidenced by both language distance and membership prediction, as the pandemic continues to unfold. Furthermore, users who started at / r/ China flu from January to March were more likely to leave, while those who started in later months tend to remain highly \"loyal\". To understand this difference, we develop a movement analysis framework to understand membership changes in these two communities and identify a significant proportion of /r/China flu members (around 50\\%) that moved to / r/Coronavirus in February. This movement turns out to be highly predictable based on other subreddits that users were previously active in. Our work demonstrates how two highly-related communities emerge and develop their own identity in a crisis, and highlights the important role of existing communities in understanding such an emergence .", "edit_actions": [{"type": "R", "before": "The", "after": "As the", "start_char_pos": 0, "end_char_pos": 3}, {"type": "R", "before": "has deeply impacted people's lives around the globe. During the extended lockdowns caused by the pandemic,", "after": "is disrupting life worldwide, related", "start_char_pos": 22, "end_char_pos": 128}, {"type": "R", "before": "crucial for people to access information and share experiences", "after": "popping up", "start_char_pos": 152, "end_char_pos": 214}, {"type": "R", "before": "have emerged on Reddit:", "after": ",", "start_char_pos": 254, "end_char_pos": 277}, {"type": "R", "before": "_flu", "after": "flu", "start_char_pos": 287, "end_char_pos": 291}, {"type": "R", "before": ". By studying activities and users in these two communities, we provide a characterization of people's responses to COVID-19 on Reddit . First, we find that user activity peaks around March 17, when the World Health Organization (WHO) announced COVID-19 as a pandemic. Shortly after that, the activity levels of both communities have been declining week by week. We further illustrate the central role of", "after": ", emerged on Reddit and have been dedicated to COVID- related discussions from the very beginning of this pandemic. With /r/Coronavirus promoted as the official community on Reddit, it remains an open question how users choose between these two highly-related communities. In this paper, we characterize user trajectories in", "start_char_pos": 311, "end_char_pos": 715}, {"type": "R", "before": "in the emergence of COVID-related communities. Second, we study the differences between these two communities.", "after": "from the beginning of COVID-19 to the end of September 2020. We show that new users of", "start_char_pos": 738, "end_char_pos": 848}, {"type": "R", "before": "Coronavirus is recommended as the official community for COVID-19 on Reddit, while", "after": "China flu and", "start_char_pos": 853, "end_char_pos": 935}, {"type": "A", "before": null, "after": "/Coronavirus were similar from January to March. After that, their differences steadily increase, evidenced by both language distance and membership prediction, as the pandemic continues to unfold. Furthermore, users who started at", "start_char_pos": 939, "end_char_pos": 939}, {"type": "A", "before": null, "after": "r/", "start_char_pos": 942, "end_char_pos": 942}, {"type": "R", "before": "_flu adopts a loose moderation practice. As a result, we observe that", "after": "flu from January to March were more likely to leave, while those who started in later months tend to remain highly \"loyal\". To understand this difference, we develop a movement analysis framework to understand membership changes in", "start_char_pos": 949, "end_char_pos": 1018}, {"type": "R", "before": "are gradually growing apart and more extremism is being found in", "after": "and identify a significant proportion of", "start_char_pos": 1041, "end_char_pos": 1105}, {"type": "R", "before": "_flu. Finally, we examine the spillover effect of the COVID-19 pandemic on user activity across the entire Reddit platform. Our results show significant changes in user activities outside COVID-related communities . In subreddits related to finance, food, and countries", "after": "flu members (around 50\\%) that moved to", "start_char_pos": 1115, "end_char_pos": 1384}, {"type": "R", "before": "cities, user activity is recovering to the pre-pandemic level in late April and May as countries reopen, but subreddits related to travel and sports remain highly impacted and show lower activity levels than the pre-pandemic period. Our work highlights the strength of Reddit as a source for understanding public reactions to COVID-19 and the importance of content moderation on the Internet during a pandemic", "after": "r/Coronavirus in February. This movement turns out to be highly predictable based on other subreddits that users were previously active in. Our work demonstrates how two highly-related communities emerge and develop their own identity in a crisis, and highlights the important role of existing communities in understanding such an emergence", "start_char_pos": 1387, "end_char_pos": 1796}], "sents_char_pos": [0, 74, 216, 312, 447, 579, 673, 784, 989, 1120, 1238, 1330, 1619]}
+{"doc_id": "2006.05104", "revision_depth": "2", "before_revision": "Although a significant number of compressed indexes for highly repetitive strings have been proposed thus far, developing compressed indexes that support faster queries remains a challenge. Run-length Burrows-Wheeler transform (RLBWT) is a lossless data compression by a reversible permutation of an input string and run-length encoding, and it has become a popular research topic in string processing. R-index Gagie et al., ACM'20%DIFDELCMD < ] %%% is an efficient compressed index on RLBWTwhose space usage depends not on string length but the number of runs in an RLBWT, and it supports locate queries in an optimal time with \\omega are two key functions for building indexes on RLBWT, and the best previous result computes LF and \\phi^{-1} in O(\\log \\log n) time with O} (r) words for the number r of runs in the RLBWTof an input string. Following this line of research, we present the first compressed index on RLBWT, which we callr-index-f , that supports various queries including locate, count, extract queries, decompression and prefix search in the optimal time with smaller working space of O(r) words for small alphabets in this paper. We present efficient data structures for computing two important functions of LF and \\phi^{-1} in constant time with O(r) words of space , which is a bit step forward in computation time from the previous best result of O(\\log \\log n)time for string length n and O(r) words of space. Finally, We present algorithms for computing queries on RLBWT by leveraging those two data structures in optimal time with O(r) words of space.", "after_revision": "Indexing highly repetitive strings (i.e., strings with many repetitions) for fast queries has become a central research topic in string processing, because it has a wide variety of applications in bioinformatics and natural language processing. Although a substantial number of indexes for highly repetitive strings have been proposed thus far, developing compressed indexes that support various queries remains a challenge. The run-length Burrows-Wheeler transform (RLBWT) is a lossless data compression by a reversible permutation of an input string and run-length encoding, and it has %DIFDELCMD < ] %%% received interest for indexing highly repetitive strings. LF and \\phi^{-1 are two key functions for building indexes on RLBWT, and the best previous result computes LF and \\phi^{-1} in O(\\log \\log n) time with O} (r) words of space for the string length n and the number r of runs in RLBWT. In this paper, we improve LF and \\phi^{-1} so that they can be computed in a constant time with O(r) words of space . Subsequently, we present OptBWTR (optimal-time queries on BWT-runs compressed indexes), the first string index that supports various queries including locate, count, extract queries in optimal time and O(r) words of space.", "edit_actions": [{"type": "R", "before": "Although a significant number of compressed", "after": "Indexing highly repetitive strings (i.e., strings with many repetitions) for fast queries has become a central research topic in string processing, because it has a wide variety of applications in bioinformatics and natural language processing. Although a substantial number of", "start_char_pos": 0, "end_char_pos": 43}, {"type": "R", "before": "faster", "after": "various", "start_char_pos": 154, "end_char_pos": 160}, {"type": "R", "before": "Run-length", "after": "The run-length", "start_char_pos": 190, "end_char_pos": 200}, {"type": "D", "before": "become a popular research topic in string processing. R-index", "after": null, "start_char_pos": 349, "end_char_pos": 410}, {"type": "D", "before": "Gagie et al., ACM'20", "after": null, "start_char_pos": 411, "end_char_pos": 431}, {"type": "R", "before": "is an efficient compressed index on RLBWTwhose space usage depends not on string length but the number of runs in an RLBWT, and it supports locate queries in an optimal time with \\omega", "after": "received interest for indexing highly repetitive strings. LF and \\phi^{-1", "start_char_pos": 450, "end_char_pos": 635}, {"type": "R", "before": "for the", "after": "of space for the string length n and the", "start_char_pos": 785, "end_char_pos": 792}, {"type": "D", "before": "the RLBWTof an input string. Following this line of research, we present the first compressed index on RLBWT, which we call", "after": null, "start_char_pos": 813, "end_char_pos": 936}, {"type": "D", "before": "r-index-f", "after": null, "start_char_pos": 936, "end_char_pos": 945}, {"type": "R", "before": ", that supports various queries including locate, count, extract queries, decompression and prefix search in the optimal time with smaller working space of O(r) words for small alphabets in this paper. We present efficient data structures for computing two important functions of", "after": "RLBWT. In this paper, we improve", "start_char_pos": 946, "end_char_pos": 1225}, {"type": "R", "before": "in", "after": "so that they can be computed in a", "start_char_pos": 1243, "end_char_pos": 1245}, {"type": "R", "before": ", which is a bit step forward in computation time from the previous best result of O(\\log \\log n)time for string length n and O(r) words of space. Finally, We present algorithms for computing queries on RLBWT by leveraging those two data structures", "after": ". Subsequently, we present OptBWTR (optimal-time queries on BWT-runs compressed indexes), the first string index that supports various queries including locate, count, extract queries", "start_char_pos": 1285, "end_char_pos": 1533}, {"type": "R", "before": "with", "after": "and", "start_char_pos": 1550, "end_char_pos": 1554}], "sents_char_pos": [0, 189, 402, 841, 1147, 1431]}
+{"doc_id": "2006.05509", "revision_depth": "1", "before_revision": "Powered by artificial intelligence (AI) , particularly deep neural networks, computer aided detection (CAD) tools can be trained to recognize TB-related abnormalities on chest radiographs , thereby screening large numbers of people and reducing the pressure on healthcare professionals. Addressing the lack of studies comparing the performance of different products, we evaluated five AI software platforms specific to TB : CAD4TB ( v6 ), InferReadDR (v2), Lunit INSIGHT for Chest Radiography (v4.9.0), JF CXR-1 (v2) by and qXR (v3) by on an unseen dataset of chest X-rays collected in three TB screening center in Dhaka, Bangladesh. The 23,566 individuals included in the study all received a CXR read by a group of three Bangladeshi board-certified radiologists. A sample of CXRs were re-read by US board-certified radiologists. Xpert was used as the reference standard. All five AI platforms significantly outperformed the human readers . The areas under the receiver operating characteristic curves are qXR: 0.91 (95\\% CI: 0.90-0.91), Lunit INSIGHT CXR: 0.89 (95\\% CI: 0.88-0.89), InferReadDR: 0.85 (95\\% CI: 0.84-0.86), JF CXR-1: 0.85 (95\\% CI: 0.84-0.85) , CAD4TB: 0.82 (95\\% CI: 0.81-0.83). We also proposed a new analytical framework that evaluates a screening and triage test and informs threshold selection through tradeoff between cost efficiency and ability to triage. Further, we assessed the performance of the five AI algorithms across the subgroups of age , use cases, and prior TB history , and found that the threshold scores performed differently across different subgroups. The positive results of our evaluation indicate that these AI products can be useful screening and triage tools for active case finding in high TB-burden regions .", "after_revision": "Artificial intelligence (AI) products can be trained to recognize tuberculosis (TB)-related abnormalities on chest radiographs . Various AI products are available commercially, yet there is lack of evidence on how their performance compared with each other and with radiologists. We evaluated five AI software products for screening and triaging TB using a large dataset that had not been used to train any commercial AI products. Individuals (>=15 years old) presenting to three TB screening centers in Dhaka, Bangladesh, were recruited consecutively. All CXR were read independently by a group of three Bangladeshi registered radiologists and five commercial AI products : CAD4TB ( v7 ), InferReadDR (v2), Lunit INSIGHT CXR (v4.9.0), JF CXR-1 (v2) , and qXR (v3) . All five AI products significantly outperformed the Bangladeshi radiologists . The areas under the receiver operating characteristic curve are qXR: 90.81\\% (95\\% CI: 90.33-91.29\\%), CAD4TB: 90.34\\% (95\\% CI: 89.81-90.87), Lunit INSIGHT CXR: 88.61\\% (95\\% CI: 88.03\\%-89.20\\%), InferReadDR: 84.90\\% (95\\% CI: 84.27-85.54\\%) and JF CXR-1: 84.89\\% (95\\% CI: 84.26-85.53\\%). Only qXR met the TPP with 74.3\\% specificity at 90\\% sensitivity. Five AI algorithms can reduce the number of Xpert tests required by 50\\%, while maintaining a sensitivity above 90\\%. All AI algorithms performed worse among the older age and people with prior TB history . AI products can be highly accurate and useful screening and triage tools for TB detection in high burden regions and outperform human readers .", "edit_actions": [{"type": "R", "before": "Powered by artificial", "after": "Artificial", "start_char_pos": 0, "end_char_pos": 21}, {"type": "R", "before": ", particularly deep neural networks, computer aided detection (CAD) tools", "after": "products", "start_char_pos": 40, "end_char_pos": 113}, {"type": "R", "before": "TB-related", "after": "tuberculosis (TB)-related", "start_char_pos": 142, "end_char_pos": 152}, {"type": "R", "before": ", thereby screening large numbers of people and reducing the pressure on healthcare professionals. Addressing the lack of studies comparing the performance of different products, we", "after": ". Various AI products are available commercially, yet there is lack of evidence on how their performance compared with each other and with radiologists. We", "start_char_pos": 188, "end_char_pos": 369}, {"type": "R", "before": "platforms specific to TB", "after": "products for screening and triaging TB using a large dataset that had not been used to train any commercial AI products. Individuals (>=15 years old) presenting to three TB screening centers in Dhaka, Bangladesh, were recruited consecutively. All CXR were read independently by a group of three Bangladeshi registered radiologists and five commercial AI products", "start_char_pos": 397, "end_char_pos": 421}, {"type": "R", "before": "v6", "after": "v7", "start_char_pos": 433, "end_char_pos": 435}, {"type": "R", "before": "for Chest Radiography", "after": "CXR", "start_char_pos": 471, "end_char_pos": 492}, {"type": "R", "before": "by", "after": ",", "start_char_pos": 517, "end_char_pos": 519}, {"type": "R", "before": "by on an unseen dataset of chest X-rays collected in three TB screening center in Dhaka, Bangladesh. The 23,566 individuals included in the study all received a CXR read by a group of three Bangladeshi board-certified radiologists. A sample of CXRs were re-read by US board-certified radiologists. Xpert was used as the reference standard.", "after": ".", "start_char_pos": 533, "end_char_pos": 872}, {"type": "R", "before": "platforms", "after": "products", "start_char_pos": 885, "end_char_pos": 894}, {"type": "R", "before": "human readers", "after": "Bangladeshi radiologists", "start_char_pos": 926, "end_char_pos": 939}, {"type": "R", "before": "curves", "after": "curve", "start_char_pos": 996, "end_char_pos": 1002}, {"type": "R", "before": "0.91", "after": "90.81\\%", "start_char_pos": 1012, "end_char_pos": 1016}, {"type": "R", "before": "0.90-0.91), Lunit INSIGHT CXR: 0.89", "after": "90.33-91.29\\%), CAD4TB: 90.34\\%", "start_char_pos": 1027, "end_char_pos": 1062}, {"type": "R", "before": "0.88-0.89), InferReadDR: 0.85", "after": "89.81-90.87), Lunit INSIGHT CXR: 88.61\\%", "start_char_pos": 1073, "end_char_pos": 1102}, {"type": "R", "before": "0.84-0.86), JF CXR-1: 0.85", "after": "88.03\\%-89.20\\%), InferReadDR: 84.90\\%", "start_char_pos": 1113, "end_char_pos": 1139}, {"type": "R", "before": "0.84-0.85) , CAD4TB: 0.82", "after": "84.27-85.54\\%) and JF CXR-1: 84.89\\%", "start_char_pos": 1150, "end_char_pos": 1175}, {"type": "R", "before": "0.81-0.83). We also proposed a new analytical framework that evaluates a screening and triage test and informs threshold selection through tradeoff between cost efficiency and ability to triage. Further, we assessed the performance of the five AI algorithms across the subgroups of age , use cases, and", "after": "84.26-85.53\\%). Only qXR met the TPP with 74.3\\% specificity at 90\\% sensitivity. Five AI algorithms can reduce the number of Xpert tests required by 50\\%, while maintaining a sensitivity above 90\\%. All AI algorithms performed worse among the older age and people with", "start_char_pos": 1186, "end_char_pos": 1488}, {"type": "R", "before": ", and found that the threshold scores performed differently across different subgroups. The positive results of our evaluation indicate that these", "after": ".", "start_char_pos": 1506, "end_char_pos": 1652}, {"type": "A", "before": null, "after": "highly accurate and", "start_char_pos": 1672, "end_char_pos": 1672}, {"type": "R", "before": "active case finding in high TB-burden regions", "after": "TB detection in high burden regions and outperform human readers", "start_char_pos": 1711, "end_char_pos": 1756}], "sents_char_pos": [0, 286, 633, 764, 830, 872, 941, 1197, 1380, 1593]}
+{"doc_id": "2006.06987", "revision_depth": "2", "before_revision": "Quantitative mechanistic models based on reaction networks with stochastic chemical kinetics can help elucidate fundamental biological process where random fluctuations are relevant , such as in single cells. The dynamics of such models is described by the master equation , which provides the time course evolution of the probability distribution across the discrete state space consisting of vectors of population levels of the interacting biochemical species. Since solving the master equation exactly is very difficult in general due to the combinatorial explosion of the state space size , several analytical approximations have been proposed. The deterministic rate equation (DRE) offers a macroscopic view of the system by means of a system of differential equations that estimate the average populations for each species, but it may be inaccurate in the case of nonlinear interactions such as in mass-action kinetics . Here we propose finite state expansion (FSE), an analytical method that mediates between the microscopic and the macroscopic interpretations of a chemical reaction network by coupling the master equation dynamics of a chosen subset of the discrete state space with the population dynamics of the DRE. This is done via an algorithmic translation of a chemical reaction network into a target expanded one where each discrete state is represented as a further distinct chemical species. The translation produces a network with stochastically equivalent dynamics, but the DRE of the expanded network can be interpreted as a correction to the original ones. Through a publicly available software implementation of FSE , we demonstrate its effectiveness in models from systems biology which challenge state-of-the-art techniques due to the presence of intrinsic noise, multi-scale population dynamics , and multi-stability.", "after_revision": "Stochastic reaction networks are a fundamental model to describe interactions between species where random fluctuations are relevant . The master equation provides the evolution of the probability distribution across the discrete state space consisting of vectors of population counts for each species. However, since its exact solution is often elusive , several analytical approximations have been proposed. The deterministic rate equation (DRE) gives a macroscopic approximation as a compact system of differential equations that estimate the average populations for each species, but it may be inaccurate in the case of nonlinear interaction dynamics . Here we propose finite state expansion (FSE), an analytical method mediating between the microscopic and the macroscopic interpretations of a stochastic reaction network by coupling the master equation dynamics of a chosen subset of the discrete state space with the mean population dynamics of the DRE. An algorithm translates a network into an expanded one where each discrete state is represented as a further distinct species. This translation exactly preserves the stochastic dynamics, but the DRE of the expanded network can be interpreted as a correction to the original one. The effectiveness of FSE is demonstrated in models that challenge state-of-the-art techniques due to intrinsic noise, multi-scale populations , and multi-stability.", "edit_actions": [{"type": "R", "before": "Quantitative mechanistic models based on reaction networks with stochastic chemical kinetics can help elucidate fundamental biological process", "after": "Stochastic reaction networks are a fundamental model to describe interactions between species", "start_char_pos": 0, "end_char_pos": 142}, {"type": "R", "before": ", such as in single cells. The dynamics of such models is described by the master equation , which provides the time course", "after": ". The master equation provides the", "start_char_pos": 182, "end_char_pos": 305}, {"type": "R", "before": "levels of the interacting biochemical species. Since solving the master equation exactly is very difficult in general due to the combinatorial explosion of the state space size", "after": "counts for each species. However, since its exact solution is often elusive", "start_char_pos": 416, "end_char_pos": 592}, {"type": "R", "before": "offers a macroscopic view of the system by means of a", "after": "gives a macroscopic approximation as a compact", "start_char_pos": 687, "end_char_pos": 740}, {"type": "R", "before": "interactions such as in mass-action kinetics", "after": "interaction dynamics", "start_char_pos": 880, "end_char_pos": 924}, {"type": "R", "before": "that mediates", "after": "mediating", "start_char_pos": 994, "end_char_pos": 1007}, {"type": "R", "before": "chemical", "after": "stochastic", "start_char_pos": 1073, "end_char_pos": 1081}, {"type": "A", "before": null, "after": "mean", "start_char_pos": 1196, "end_char_pos": 1196}, {"type": "R", "before": "This is done via an algorithmic translation of a chemical reaction network into a target", "after": "An algorithm translates a network into an", "start_char_pos": 1229, "end_char_pos": 1317}, {"type": "R", "before": "chemical species. The translation produces a network with stochastically equivalent", "after": "species. This translation exactly preserves the stochastic", "start_char_pos": 1394, "end_char_pos": 1477}, {"type": "R", "before": "ones. Through a publicly available software implementation of FSE , we demonstrate its effectiveness in models from systems biology which", "after": "one. The effectiveness of FSE is demonstrated in models that", "start_char_pos": 1575, "end_char_pos": 1712}, {"type": "D", "before": "the presence of", "after": null, "start_char_pos": 1758, "end_char_pos": 1773}, {"type": "R", "before": "population dynamics", "after": "populations", "start_char_pos": 1803, "end_char_pos": 1822}], "sents_char_pos": [0, 208, 462, 648, 926, 1228, 1411, 1580]}
+{"doc_id": "2006.07209", "revision_depth": "1", "before_revision": " This study attempts to assess the effectiveness of nonpharmaceutical interventions towards SARS-CoV-2 infections in Germany. Using dates of infection estimated from official case data, exponential growth models for infections and reproduction numbers were estimated and investigated with respect to change points . Clear evidence is found of a decline of infections at the beginning of March, which ] ] ] ] ] can be attributed to relatively small interventions and voluntary behavioral changes. The effects of later interventions remain unclear . Liberalizations of measures did not induce a re-increase of infections. These results contradict previous studies on the German case. The study also exhibits three methodological challenges with respect to assessing of interventions : a) the estimation of true infection dates , b) the usage of several indicators and c) the influence of test volume . In conclusion, the effectiveness of most German interventions remains questionable .", "after_revision": "Aims: Nonpharmaceutical interventions against the spread of SARS-CoV-2 in Germany included the cancellation of mass events (from March 8), closures of schools and child day care facilities (from March 16) as well as a \"lockdown\" (from March 23). This study attempts to assess the effectiveness of these interventions in terms of revealing their impact on infections over time. Methods: Dates of infections were estimated from official German case data by incorporating the incubation period and an empirical reporting delay. Exponential growth models for infections and reproduction numbers were estimated and investigated with respect to change points in the time series. Results: A significant decline of daily and cumulative infections as well as reproduction numbers is found at March 8 (CI 7, 9]), March 10 (CI 9, 11] and March 3 (CI 2, 4]), respectively. Further declines and stabilizations are found in the end of March. There is also a change point in new infections at April 19 (CI 18, 20]), but daily infections still show a negative growth. From March 19 (CI 18, 20]), the reproduction numbers fluctuate on a level below one. Conclusions: The decline of infections in early March 2020 can be attributed to relatively small interventions and voluntary behavioural changes. Additional effects of later interventions cannot be detected clearly . Liberalizations of measures did not induce a re-increase of infections. Thus, the effectiveness of most German interventions remains questionable. Moreover, assessing of interventions is impeded by the estimation of true infection dates and the influence of test volume .", "edit_actions": [{"type": "A", "before": null, "after": "Aims: Nonpharmaceutical interventions against the spread of SARS-CoV-2 in Germany included the cancellation of mass events (from March 8), closures of schools and child day care facilities (from March 16) as well as a \"lockdown\" (from March 23).", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "nonpharmaceutical interventions towards SARS-CoV-2 infections in Germany. Using dates of infection", "after": "these interventions in terms of revealing their impact on infections over time. Methods: Dates of infections were", "start_char_pos": 52, "end_char_pos": 150}, {"type": "R", "before": "case data, exponential", "after": "German case data by incorporating the incubation period and an empirical reporting delay. Exponential", "start_char_pos": 175, "end_char_pos": 197}, {"type": "R", "before": ". Clear evidence is found of a decline of infections at the beginning of March, which", "after": "in the time series. Results: A significant decline of daily and cumulative infections as well as reproduction numbers is found at March 8 (CI", "start_char_pos": 314, "end_char_pos": 399}, {"type": "A", "before": null, "after": "7, 9", "start_char_pos": 400, "end_char_pos": 400}, {"type": "A", "before": null, "after": "), March 10 (CI", "start_char_pos": 401, "end_char_pos": 401}, {"type": "A", "before": null, "after": "9, 11", "start_char_pos": 402, "end_char_pos": 402}, {"type": "A", "before": null, "after": "and March 3 (CI", "start_char_pos": 404, "end_char_pos": 404}, {"type": "A", "before": null, "after": "2, 4", "start_char_pos": 405, "end_char_pos": 405}, {"type": "A", "before": null, "after": "), respectively. Further declines and stabilizations are found in the end of March. There is also a change point in new infections at April 19 (CI", "start_char_pos": 406, "end_char_pos": 406}, {"type": "A", "before": null, "after": "18, 20", "start_char_pos": 407, "end_char_pos": 407}, {"type": "A", "before": null, "after": "), but daily infections still show a negative growth. From March 19 (CI", "start_char_pos": 408, "end_char_pos": 408}, {"type": "A", "before": null, "after": "18, 20", "start_char_pos": 409, "end_char_pos": 409}, {"type": "A", "before": null, "after": "), the reproduction numbers fluctuate on a level below one. Conclusions: The decline of infections in early March 2020", "start_char_pos": 410, "end_char_pos": 410}, {"type": "R", "before": "behavioral changes. The", "after": "behavioural changes. Additional", "start_char_pos": 477, "end_char_pos": 500}, {"type": "R", "before": "remain unclear", "after": "cannot be detected clearly", "start_char_pos": 532, "end_char_pos": 546}, {"type": "R", "before": "These results contradict previous studies on the German case. The study also exhibits three methodological challenges with respect to", "after": "Thus, the effectiveness of most German interventions remains questionable. Moreover,", "start_char_pos": 621, "end_char_pos": 754}, {"type": "R", "before": ": a)", "after": "is impeded by", "start_char_pos": 782, "end_char_pos": 786}, {"type": "R", "before": ", b) the usage of several indicators and c)", "after": "and", "start_char_pos": 826, "end_char_pos": 869}, {"type": "D", "before": ". In conclusion, the effectiveness of most German interventions remains questionable", "after": null, "start_char_pos": 899, "end_char_pos": 983}], "sents_char_pos": [0, 125, 496, 620, 682, 900]}
+{"doc_id": "2006.07223", "revision_depth": "1", "before_revision": "This paper studies an infinite horizon optimal consumption problem under exponential utility, together with non-negativity constraint on consumption rate and a reference point to the past consumption peak . The performance is measured by the distance between the consumption rate and a fraction 0\\leq\\lambda\\leq 1 of the historical consumption maximum. To overcome its path-dependent nature, the consumption running maximum process is chosen as an auxiliary state process that renders the value function two dimensional depending on the wealth variable x and the reference variable h. The associated Hamilton-Jacobi-Bellman (HJB) equation is expressed in the piecewise manner across different regions to take into account constraints. By employing the dual transform and smooth-fit principle, the classical solution of the HJB equation is obtained in an analytical form, which in turn provides the feedback optimal investment and consumption . For 0<\\lambda<1, we are able to find four boundary curves x_1(h),%DIFDELCMD < \\breve{x}%%% (h), x_2(h) and x_3(h) for the wealth level x that are nonlinear functions of h such that the feedback optimal consumption satisfies: (i) c^*(x,h)=0 when x\\leq x_1(h); (ii) 0 and relative model size reduction of 28\\\\% were obtained. Consistent performance improvements were also obtained on a UASpeech disordered speech recognition task using the proposed NAS approaches.", "after_revision": "Deep neural networks (DNNs) based automatic speech recognition (ASR) systems are often designed using expert knowledge and empirical evaluation. In this paper, a range of neural architecture search (NAS) techniques are used to automatically learn two types of hyper-parameters of state-of-the-art factored time delay neural networks (TDNNs) : i) the left and right splicing context offsets; and ii) the dimensionality of the bottleneck linear projection at each hidden layer. These include the DARTS method integrating architecture selection with lattice-free MMI (LF-MMI) TDNN training; Gumbel-Softmax and pipelined DARTS reducing the confusion over candidate architectures and improving the generalization of architecture selection ; and Penalized DARTS incorporating resource constraints to adjust the trade-off between performance and system complexity. Parameter sharing among candidate architectures allows efficient search over up to 7^{28} different TDNN systems. Experiments conducted on the 300-hour Switchboard corpus suggest the auto-configured systems consistently outperform the baseline LF-MMI TDNN systems using manual network design or random architecture search after LHUC speaker adaptation and RNNLM rescoring . Absolute word error rate (WER) reductions up to 1.0 %DIFDELCMD < \\end{abstract} %DIFDELCMD < %%% \\\\%DIF > and relative model size reduction of 28\\\\% were obtained. Consistent performance improvements were also obtained on a UASpeech disordered speech recognition task using the proposed NAS approaches.", "edit_actions": [{"type": "A", "before": null, "after": "types of", "start_char_pos": 251, "end_char_pos": 251}, {"type": "D", "before": "that heavily affect the performance and model complexity", "after": null, "start_char_pos": 269, "end_char_pos": 325}, {"type": "R", "before": "network (TDNN-F)acoustic models", "after": "networks (TDNNs)", "start_char_pos": 373, "end_char_pos": 404}, {"type": "R", "before": "standard DARTS method fully integrating the estimation of architecture weights and TDNN parameters in", "after": "DARTS method integrating architecture selection with", "start_char_pos": 558, "end_char_pos": 659}, {"type": "A", "before": null, "after": "TDNN", "start_char_pos": 686, "end_char_pos": 686}, {"type": "R", "before": "DARTS that reduces the confusion between candidate architectures ; Pipelined DARTS that circumvents the overfitting of architecture weights using held-out data", "after": "and pipelined DARTS reducing the confusion over candidate architectures and improving the generalization of architecture selection", "start_char_pos": 712, "end_char_pos": 871}, {"type": "R", "before": "that further incorporates", "after": "incorporating", "start_char_pos": 894, "end_char_pos": 919}, {"type": "R", "before": "was also used to facilitate", "after": "allows", "start_char_pos": 1056, "end_char_pos": 1083}, {"type": "R", "before": "a", "after": "the", "start_char_pos": 1168, "end_char_pos": 1169}, {"type": "R", "before": "conversational telephone speech recognition task suggest the NAS", "after": "corpus suggest the", "start_char_pos": 1191, "end_char_pos": 1255}, {"type": "D", "before": "TDNN-F", "after": null, "start_char_pos": 1272, "end_char_pos": 1278}, {"type": "R", "before": "trained TDNN-F", "after": "TDNN", "start_char_pos": 1331, "end_char_pos": 1345}, {"type": "R", "before": "expert configurations", "after": "network design or random architecture search after LHUC speaker adaptation and RNNLM rescoring", "start_char_pos": 1367, "end_char_pos": 1388}, {"type": "A", "before": null, "after": "(WER)", "start_char_pos": 1416, "end_char_pos": 1416}, {"type": "D", "before": "\\% and relative model size reduction of 28\\% were obtained.", "after": null, "start_char_pos": 1438, "end_char_pos": 1497}], "sents_char_pos": [0, 144, 454, 539, 696, 778, 873, 1007, 1142, 1390, 1497, 1608]}
+{"doc_id": "2007.08824", "revision_depth": "1", "before_revision": "In 12%DIFDELCMD < ]%%% , the authors introduce an adaptive, stabilized finite element method (FEM), which solves a stable saddle-point problem . The method delivers a stable continuous approximation and projects the residual onto a broken polynomial space . This projection delivers a reliable error estimate that drives mesh refinement by minimizing a discrete energy norm . In this work, we extend this framework to goal-oriented adaptivity (GoA) . We solve the primal and adjoint problems using the same initial saddle-point formulation , but with different right-hand sides. Additionally , we obtain two alternative error estimates , which are efficient to guide refinements. Several numerical examples illustrate the framework's performance on diffusion-advection-reaction problems.", "after_revision": " %DIFDELCMD < ]%%% We propose a goal-oriented mesh-adaptive algorithm for a finite element method stabilized via residual minimization on dual discontinuous-Galerkin norms. By solving a saddle-point problem , this residual minimization delivers a stable continuous approximation to the solution on each mesh instance and a residual projection onto a broken polynomial space , which is a robust error estimator to minimize the discrete energy norm via automatic mesh refinement . In this work, we propose and analyze a goal-oriented adaptive algorithm for this stable residual minimization . We solve the primal and adjoint problems considering the same saddle-point formulation and different right-hand sides. By solving a third stable problem , we obtain two efficient error estimates to guide goal-oriented adaptivity. We illustrate the performance of this goal-oriented adaptive strategy on advection-diffusion-reaction problems.", "edit_actions": [{"type": "D", "before": "In", "after": null, "start_char_pos": 0, "end_char_pos": 2}, {"type": "D", "before": "12", "after": null, "start_char_pos": 3, "end_char_pos": 5}, {"type": "R", "before": ", the authors introduce an adaptive, stabilized", "after": "We propose a goal-oriented mesh-adaptive algorithm for a", "start_char_pos": 23, "end_char_pos": 70}, {"type": "R", "before": "(FEM), which solves a stable", "after": "stabilized via residual minimization on dual discontinuous-Galerkin norms. By solving a", "start_char_pos": 93, "end_char_pos": 121}, {"type": "R", "before": ". The method", "after": ", this residual minimization", "start_char_pos": 143, "end_char_pos": 155}, {"type": "R", "before": "and projects the residual", "after": "to the solution on each mesh instance and a residual projection", "start_char_pos": 199, "end_char_pos": 224}, {"type": "R", "before": ". This projection delivers a reliable error estimate that drives mesh refinement by minimizing a", "after": ", which is a robust error estimator to minimize the", "start_char_pos": 256, "end_char_pos": 352}, {"type": "A", "before": null, "after": "via automatic mesh refinement", "start_char_pos": 374, "end_char_pos": 374}, {"type": "R", "before": "extend this framework to", "after": "propose and analyze a", "start_char_pos": 394, "end_char_pos": 418}, {"type": "R", "before": "adaptivity (GoA)", "after": "adaptive algorithm for this stable residual minimization", "start_char_pos": 433, "end_char_pos": 449}, {"type": "R", "before": "using the same initial", "after": "considering the same", "start_char_pos": 493, "end_char_pos": 515}, {"type": "R", "before": ", but with", "after": "and", "start_char_pos": 541, "end_char_pos": 551}, {"type": "R", "before": "Additionally", "after": "By solving a third stable problem", "start_char_pos": 580, "end_char_pos": 592}, {"type": "R", "before": "alternative error estimates , which are efficient to guide refinements. Several numerical examples illustrate the framework's performance on diffusion-advection-reaction", "after": "efficient error estimates to guide goal-oriented adaptivity. We illustrate the performance of this goal-oriented adaptive strategy on advection-diffusion-reaction", "start_char_pos": 609, "end_char_pos": 778}], "sents_char_pos": [0, 144, 257, 376, 451, 579, 680]}
+{"doc_id": "2007.09353", "revision_depth": "1", "before_revision": "Context : The lockdown orders established in multiple countries in response to the Covid-19 pandemics are perhaps the widest and deepest shock experienced by human behaviors in recent years. Studying the impact of the lockdown, trough the lens of social media , offers an unprecedented opportunity for analyzing the susceptibility and the resilience of circadian rhythms to large-scale exogenous shocks. In this context, we address two interconnected research questions: Can variations of online activity cycles provide information on the impact of lockdown on human activities? How do onlinecircadian rhythms react to such a disruption? Data: We base our research on the analysis and comparison of two independent databases about the French cyberspace: a fine-grained temporal record of YouTube videos and a large collection of Tweets on Covid-19%DIFDELCMD < }%%% . Findings: In both datasets we observe a reshaping of the circadian rhythms with a substantial increase of night activity during the lockdown. The analysis of the videos and tweets published during lockdown shows a general decrease in emotional contents and a shift from themes like work and money to themes like death and safety. However, the daily patterns of emotions remain mostly unchanged, thereby suggesting that emotional cycles are resilient to exogenous shocks.", "after_revision": "Context . The lockdown orders established in multiple countries in response to the Covid-19 pandemics are arguably one of the most widespread and deepest shock experienced by societies in recent years. Studying their impact trough the lens of social media offers an unprecedented opportunity to understand the susceptibility and the resilience of human activity patterns to large-scale exogenous shocks. Firstly, we investigate the changes that this upheaval has caused in online activity in terms of time spent online, themes and emotion shared on the platforms, and rhythms of content consumption. Secondly, we examine the resilience of certain platform characteristics, such as the daily rhythms of emotion expression. Data. Two independent datasets about the French cyberspace: a fine-grained temporal record of almost 100 thousand YouTube videos and a %DIFDELCMD < }%%% collection of 8 million Tweets between February 17 and April 14, 2020. Findings. In both datasets we observe a reshaping of the circadian rhythms with an increase of night activity during the lockdown. The analysis of the videos and tweets published during lockdown shows a general decrease in emotional contents and a shift from themes like work and money to themes like death and safety. However, the daily patterns of emotions remain mostly unchanged, thereby suggesting that emotional cycles are resilient to exogenous shocks.", "edit_actions": [{"type": "R", "before": ":", "after": ".", "start_char_pos": 8, "end_char_pos": 9}, {"type": "R", "before": "perhaps the widest", "after": "arguably one of the most widespread", "start_char_pos": 106, "end_char_pos": 124}, {"type": "R", "before": "human behaviors", "after": "societies", "start_char_pos": 158, "end_char_pos": 173}, {"type": "R", "before": "the impact of the lockdown,", "after": "their impact", "start_char_pos": 200, "end_char_pos": 227}, {"type": "D", "before": ",", "after": null, "start_char_pos": 260, "end_char_pos": 261}, {"type": "R", "before": "for analyzing", "after": "to understand", "start_char_pos": 298, "end_char_pos": 311}, {"type": "R", "before": "circadian rhythms", "after": "human activity patterns", "start_char_pos": 353, "end_char_pos": 370}, {"type": "R", "before": "In this context, we address two interconnected research questions: Can variations of online activity cycles provide information on the impact of lockdown on human activities? How do onlinecircadian rhythms react to such a disruption? Data: We base our research on the analysis and comparison of two independent databases", "after": "Firstly, we investigate the changes that this upheaval has caused in online activity in terms of time spent online, themes and emotion shared on the platforms, and rhythms of content consumption. Secondly, we examine the resilience of certain platform characteristics, such as the daily rhythms of emotion expression. Data. Two independent datasets", "start_char_pos": 404, "end_char_pos": 724}, {"type": "A", "before": null, "after": "almost 100 thousand", "start_char_pos": 788, "end_char_pos": 788}, {"type": "D", "before": "large collection of Tweets on", "after": null, "start_char_pos": 810, "end_char_pos": 839}, {"type": "D", "before": "Covid-19", "after": null, "start_char_pos": 840, "end_char_pos": 848}, {"type": "R", "before": ". Findings:", "after": "collection of 8 million Tweets between February 17 and April 14, 2020. Findings.", "start_char_pos": 866, "end_char_pos": 877}, {"type": "R", "before": "a substantial", "after": "an", "start_char_pos": 948, "end_char_pos": 961}], "sents_char_pos": [0, 190, 403, 578, 637, 1009, 1197]}
+{"doc_id": "2007.09874", "revision_depth": "1", "before_revision": "\\eps{\\varepsilon}\\tldO{O}We study the problem of constructing weak \\eps-nets where the stabbing elements are lines or k-flats instead of points. We study this problem in the simplest setting where it is still interesting---namely , the uniform measure of volume over the hypercube [0,1]^d\\bigr.. We show that in this setting one can construct (k,\\eps) -nets of size m =%DIFDELCMD < \\tldO%%% (1/%DIFDELCMD < \\eps%%% ^{1-k/d), where }%DIFDELCMD < \\tldO %%% hides polylogarithmic factors. That is , there is a set of m k-flats, such that any convex body in [0,1]^d of volume larger than \\eps is stabbed by one of these k-flats. \\eps\\eps). We also prove that any such net must have size at least \\Omega(1/}\\eps As a concrete example, in three dimensions all \\eps-heavy bodies in [0,1]^3 can be stabbed by %DIFDELCMD < \\tldO%%% (1/\\eps^{2/3}) lines. Note, that these bounds are sublinear in 1/\\eps, and are thus somewhat surprising . We also present deterministic constructions of weak%DIFDELCMD < \\eps%%% -nets, under the same volume measure of 0,1%DIFDELCMD < ]%%% ^d. While our bounds are still weaker than known bounds, the new constructions are simple and explicit, unlike previous constructions .", "after_revision": "\\eps{\\varepsilon}\\tldO{O}We study the problem of constructing weak \\eps-nets where the stabbing elements are lines or k-flats instead of points. We study this problem in the simplest setting where it is still interesting --namely , the uniform measure of volume over the hypercube [0,1]^d\\bigr.. Specifically, a (k,\\eps) %DIFDELCMD < \\tldO%%% %DIFDELCMD < \\eps%%% ), where }%DIFDELCMD < \\tldO %%% -net is a set of k-flats, such that any convex body in [0,1]^d of volume larger than \\eps is stabbed by one of these k-flats. We show that for k \\geq 1, one can construct (k,\\eps)-nets of size O(1/\\eps^{1-k/d). We also prove that any such net must have size at least \\Omega(1/}\\eps^{1-k/d As a concrete example, in three dimensions all \\eps-heavy bodies in [0,1]^3 can be stabbed by %DIFDELCMD < \\tldO%%% \\Theta (1/\\eps^{2/3}) lines. Note, that these bounds are sublinear in 1/\\eps, and are thus somewhat surprising %DIFDELCMD < \\eps%%% %DIFDELCMD < ]%%% .", "edit_actions": [{"type": "R", "before": "interesting---namely", "after": "interesting --namely", "start_char_pos": 209, "end_char_pos": 229}, {"type": "R", "before": "We show that in this setting one can construct", "after": "Specifically, a", "start_char_pos": 296, "end_char_pos": 342}, {"type": "D", "before": "-nets of size m =", "after": null, "start_char_pos": 352, "end_char_pos": 369}, {"type": "D", "before": "(1/", "after": null, "start_char_pos": 391, "end_char_pos": 394}, {"type": "D", "before": "^{1-k/d", "after": null, "start_char_pos": 415, "end_char_pos": 422}, {"type": "R", "before": "hides polylogarithmic factors. That is , there is", "after": "-net is", "start_char_pos": 455, "end_char_pos": 504}, {"type": "D", "before": "m", "after": null, "start_char_pos": 514, "end_char_pos": 515}, {"type": "A", "before": null, "after": "We show that for k \\geq 1, one can construct (k,", "start_char_pos": 625, "end_char_pos": 625}, {"type": "A", "before": null, "after": ")-nets of size O(1/", "start_char_pos": 629, "end_char_pos": 629}, {"type": "A", "before": null, "after": "^{1-k/d", "start_char_pos": 633, "end_char_pos": 633}, {"type": "A", "before": null, "after": "^{1-k/d", "start_char_pos": 706, "end_char_pos": 706}, {"type": "A", "before": null, "after": "\\Theta", "start_char_pos": 823, "end_char_pos": 823}, {"type": "D", "before": ". We also present deterministic constructions of weak", "after": null, "start_char_pos": 928, "end_char_pos": 981}, {"type": "D", "before": "-nets, under the same volume measure of", "after": null, "start_char_pos": 1002, "end_char_pos": 1041}, {"type": "D", "before": "0,1", "after": null, "start_char_pos": 1042, "end_char_pos": 1045}, {"type": "D", "before": "^d. While our bounds are still weaker than known bounds, the new constructions are simple and explicit, unlike previous constructions", "after": null, "start_char_pos": 1063, "end_char_pos": 1196}], "sents_char_pos": [0, 144, 295, 485, 624, 635, 845, 929, 1066]}
+{"doc_id": "2007.10470", "revision_depth": "1", "before_revision": "A multiple knapsack constraint over a set of items is defined by a set of bins of arbitrary capacities, and a weight for each of the items. An assignment for the constraint is an allocation of subsets of items to the bins, such that the total weight of items assigned to each bin is bounded by the bin capacity. We study modular (linear) and submodular maximization problems subject to a constant number of (i.e., d-resource) multiple knapsack constraints, in which a solution is a subset of items, along with an assignment of the selected items for each of the d multiple knapsack constraints. Our results include a %DIFDELCMD < {\\em %%% polynomial time approximation scheme for modular maximization with a constant number of multiple knapsack constraints and a matroid constraint, thus generalizing the best known results for the classic %DIFDELCMD < {\\em %%% multiple knapsack problem as well as %DIFDELCMD < {\\em %%% d-dimensional knapsack , for any d \\geq 2. We further obtain a tight (1-e^{-1}-\\epsilon)-approximation for monotone submodular optimization subject to a constant number of multiple knapsack constraints and a matroid constraint, and a (0.385-\\epsilon)-approximation for non-monotone submodular optimization subject to a constant number of multiple knapsack constraints. At the heart of our algorithms lies a novel representation of a multiple knapsack constraint as a polytope. We consider this key tool as a main technical contribution of this paper.", "after_revision": "A multiple knapsack constraint over a set of items is defined by a set of bins of arbitrary capacities, and a weight for each of the items. An assignment for the constraint is an allocation of subsets of items to the bins, such that the total weight of items assigned to each bin is bounded by the bin capacity. We study modular (linear) and submodular maximization problems subject to a constant number of (i.e., d-resource) multiple knapsack constraints, in which a solution is a subset of items, along with an assignment of the selected items for each of the d multiple knapsack constraints. Our results include a %DIFDELCMD < {\\em %%% polynomial time approximation scheme for modular maximization with a constant number of multiple knapsack constraints and a matroid constraint, thus generalizing the best known results for the classic %DIFDELCMD < {\\em %%% multiple knapsack problem as well as %DIFDELCMD < {\\em %%% d-dimensional knapsack , for any d \\geq 2. We further obtain a tight (1-e^{-1}-\\epsilon)-approximation for monotone submodular optimization subject to a constant number of multiple knapsack constraints and a matroid constraint, and a (0.385-\\epsilon)-approximation for non-monotone submodular optimization subject to a constant number of multiple knapsack constraints. At the heart of our algorithms lies a novel representation of a multiple knapsack constraint as a polytope. We consider this key tool as a main technical contribution of this paper.", "edit_actions": [], "sents_char_pos": [0, 139, 311, 594, 963, 1289, 1397]}
+{"doc_id": "2007.11041", "revision_depth": "1", "before_revision": "In this paper, we provide general bounds on the mean absolute difference and difference of moments of a random variable X and a perturbation rd (X), when | %DIFDELCMD < {\\rm %%% rd (x)-x | \\leq \\epsilon |x| or |%DIFDELCMD < {\\rm %%% rd (x)-x| \\leq \\delta which depend linearly on \\epsilon and \\delta. We then show that if the perturbation corresponds to\\operatorname{rd} }\\to rounding to the nearest point in some fixed discrete set , the bounds on the difference of moments can be improved to quadratic in many cases. When the points in this fixed set are uniformly spaced, our analysis can be viewed as a generalization of Sheppard's corrections. We discuss how our bounds can be used to balance measurement error with sample error in a rigorous way, as well as how they can be used to generalize classical numerical analysis results. The frameworks developed in our analysis can be applied to a wider range of applications than those studied in this paper and may be of general interest or (ii) rounding randomly to either the nearest larger or smaller point in this same set with probabilities proportional to the distances to these points. In both cases, we show, under reasonable assumptions on the density function of X, how to compute a constant C such that |\\mathbb{E}[X^k] - \\mathbb{E}[\\operatorname{rd}(X)^{k}]| < C \\epsilon^2, provided }\\operatorname{rd}[ |X^k-\\operatorname{rd}(X)^{k}| ] are also given} .", "after_revision": "We study the effects of rounding on the moments of a random variable . Specifically, given a random variable X and its rounded counterpart (X), we study | %DIFDELCMD < {\\rm %%% \\mathbf{E | %DIFDELCMD < {\\rm %%% for non-negative integer k. We consider the case that the rounding function\\operatorname{rd} : \\mathbb{R}\\to\\mathbb{F rounding to the nearest point in some discrete set \\mathbb{F or (ii) rounding randomly to either the nearest larger or smaller point in this same set with probabilities proportional to the distances to these points. In both cases, we show, under reasonable assumptions on the density function of X, how to compute a constant C such that |\\mathbb{E}[X^k] - \\mathbb{E}[\\operatorname{rd}(X)^{k}]| < C \\epsilon^2, provided }\\operatorname{rd}(x) - x| \\leq \\epsilon E(x). Asymptotic and non-asymptotic bounds for the absolute moments \\mathbb{E[ |X^k-\\operatorname{rd}(X)^{k}| ] are also given} .", "edit_actions": [{"type": "R", "before": "In this paper, we provide general bounds on the mean absolute difference and difference of", "after": "We study the effects of rounding on the", "start_char_pos": 0, "end_char_pos": 90}, {"type": "R", "before": "X and a perturbation rd", "after": ". Specifically, given a random variable X and its rounded counterpart", "start_char_pos": 120, "end_char_pos": 143}, {"type": "R", "before": "when", "after": "we study", "start_char_pos": 149, "end_char_pos": 153}, {"type": "D", "before": "rd", "after": null, "start_char_pos": 178, "end_char_pos": 180}, {"type": "R", "before": "(x)-x", "after": "\\mathbf{E", "start_char_pos": 181, "end_char_pos": 186}, {"type": "D", "before": "\\leq \\epsilon |x| or |", "after": null, "start_char_pos": 189, "end_char_pos": 211}, {"type": "D", "before": "rd", "after": null, "start_char_pos": 233, "end_char_pos": 235}, {"type": "R", "before": "(x)-x| \\leq \\delta which depend linearly on \\epsilon and \\delta. We then show that if the perturbation corresponds to", "after": "for non-negative integer k. We consider the case that the rounding function", "start_char_pos": 236, "end_char_pos": 353}, {"type": "A", "before": null, "after": ": \\mathbb{R", "start_char_pos": 371, "end_char_pos": 371}, {"type": "A", "before": null, "after": "\\mathbb{F", "start_char_pos": 375, "end_char_pos": 375}, {"type": "R", "before": "fixed discrete set , the bounds on the difference of moments can be improved to quadratic in many cases. When the points in this fixed set are uniformly spaced, our analysis can be viewed as a generalization of Sheppard's corrections. We discuss how our bounds can be used to balance measurement error with sample error in a rigorous way, as well as how they can be used to generalize classical numerical analysis results. The frameworks developed in our analysis can be applied to a wider range of applications than those studied in this paper and may be of general interest", "after": "discrete set \\mathbb{F", "start_char_pos": 414, "end_char_pos": 989}, {"type": "A", "before": null, "after": "(x) - x| \\leq \\epsilon E(x). Asymptotic and non-asymptotic bounds for the absolute moments \\mathbb{E", "start_char_pos": 1366, "end_char_pos": 1366}], "sents_char_pos": [0, 300, 518, 648, 836, 1144]}
+{"doc_id": "2007.11779", "revision_depth": "1", "before_revision": "The noise in daily infection counts of an epidemic should be super-Poissonian due to intrinsic epidemiological and administrative clustering. Here, we use this clustering to classify the official national SARS-CoV-2 daily infection counts and check for infection counts that are unusual by being anti-clustered. We adopt a one-parameter model of \\phi _i' infections per cluster, dividing any daily count n_i into n_i/\\phi _i' ' clusters', for 'country' i. We assume that n_i/\\phi _i' on a given day j is drawn from a Poisson distribution whose mean is robustly estimated from the four neighbouring days, and calculate the inferred Poisson probability P _{ij of the observation. The P _{ij values should be uniformly distributed. We find the value \\phi_i that minimises the Kolmogorov--Smirnov distance from a uniform distribution. We investigate the (\\phi_i, N_i) distribution, for total infection count N_i. We consider consecutive count sequences above a threshold of 50 daily infections. We find that most of the daily infection count sequences are inconsistent with a Poissonian model. All are consistent with the \\phi_i model . Clustering increases with total infection count for the full sequences: \\phi_i \\sim\\sqrt{N_i 28-, 14- and 7-day least noisy sequences for several countries are best modelled as sub-Poissonian, suggesting a distinct epidemiological family. The 28-day sequences of DZ , BY, TR, AE have strongly sub-Poissonian preferred models , with \\phi_i^{28} < 0.5; and FI, SA , RU, AL, IR have \\phi_i^{28} < 3.0. Independent verification may be warranted for those countries with unusually low clustering < 0.05) correlation was found between the lack of media freedom in a country, as represented by a high Reporters sans frontieres Press Freedom Index (PFI^{2020}), and the lack of statistical noise in the country's daily counts. The \\phi_i model appears to be an effective detector of suspiciously low statistical noise in the national SARS-CoV-2 daily infection counts} .", "after_revision": "The noise in daily infection counts of an epidemic should be super-Poissonian due to intrinsic epidemiological and administrative clustering. Here, we use this clustering to classify the official national SARS-CoV-2 daily infection counts and check for infection counts that are unusually anti-clustered. We adopt a one-parameter model of \\phi '_i infections per cluster, dividing any daily count n_i into n_i/\\phi '_i ' clusters', for 'country' i. We assume that n_i/\\phi '_i on a given day j is drawn from a Poisson distribution whose mean is robustly estimated from the four neighbouring days, and calculate the inferred Poisson probability P '_{ij of the observation. The P '_{ij values should be uniformly distributed. We find the value \\phi_i that minimises the Kolmogorov-Smirnov distance from a uniform distribution. We investigate the (\\phi_i, N_i) distribution, for total infection count N_i. We find that most of the daily infection count sequences are inconsistent with a Poissonian model. Most are found to be consistent with the \\phi_i model , the 28-, 14- and 7-day least noisy sequences for several countries are best modelled as sub-Poissonian, suggesting a distinct epidemiological family. The 28-day least noisy sequence of DZ (Algeria) has a preferred model that is strongly sub-Poissonian , with \\phi_i^{28} < 0.1. TJ, TR , RU, BY, AL, AE, and NI have preferred models that are also sub-Poissonian, with \\phi_i^{28} < 0.5. A statistically significant (P^{\\tau < 0.05) correlation was found between the lack of media freedom in a country, as represented by a high Reporters sans frontieres Press Freedom Index (PFI^{2020}), and the lack of statistical noise in the country's daily counts. The \\phi_i model appears to be an effective detector of suspiciously low statistical noise in the national SARS-CoV-2 daily infection counts} .", "edit_actions": [{"type": "R", "before": "unusual by being", "after": "unusually", "start_char_pos": 279, "end_char_pos": 295}, {"type": "R", "before": "_i'", "after": "'_i", "start_char_pos": 351, "end_char_pos": 354}, {"type": "R", "before": "_i' '", "after": "'_i '", "start_char_pos": 422, "end_char_pos": 427}, {"type": "R", "before": "_i'", "after": "'_i", "start_char_pos": 480, "end_char_pos": 483}, {"type": "R", "before": "_{ij", "after": "'_{ij", "start_char_pos": 653, "end_char_pos": 657}, {"type": "R", "before": "_{ij", "after": "'_{ij", "start_char_pos": 684, "end_char_pos": 688}, {"type": "R", "before": "Kolmogorov--Smirnov", "after": "Kolmogorov-Smirnov", "start_char_pos": 773, "end_char_pos": 792}, {"type": "D", "before": "consider consecutive count sequences above a threshold of 50 daily infections. We", "after": null, "start_char_pos": 912, "end_char_pos": 993}, {"type": "R", "before": "All are", "after": "Most are found to be", "start_char_pos": 1090, "end_char_pos": 1097}, {"type": "R", "before": ". Clustering increases with total infection count for the full sequences: \\phi_i \\sim\\sqrt{N_i", "after": ", the", "start_char_pos": 1131, "end_char_pos": 1225}, {"type": "R", "before": "sequences of DZ , BY, TR, AE have", "after": "least noisy sequence of DZ (Algeria) has a preferred model that is", "start_char_pos": 1383, "end_char_pos": 1416}, {"type": "D", "before": "preferred models", "after": null, "start_char_pos": 1441, "end_char_pos": 1457}, {"type": "R", "before": "0.5; and FI, SA", "after": "0.1. TJ, TR", "start_char_pos": 1479, "end_char_pos": 1494}, {"type": "R", "before": "AL, IR have", "after": "BY, AL, AE, and NI have preferred models that are also sub-Poissonian, with", "start_char_pos": 1501, "end_char_pos": 1512}, {"type": "R", "before": "3.0. Independent verification may be warranted for those countries with unusually low clustering", "after": "0.5. A statistically significant (P^{\\tau", "start_char_pos": 1527, "end_char_pos": 1623}], "sents_char_pos": [0, 141, 311, 455, 677, 728, 830, 908, 990, 1089, 1371, 1483, 1531, 1851]}
+{"doc_id": "2007.12762", "revision_depth": "1", "before_revision": "In this paper, we design new sublinear-time algorithms for solving the gap edit distance problem and for embedding edit distance to Hamming distance. For the gap edit distance problem, we give a greedy algorithm that distinguishes in time O(n{k}+k^2) between length-n input strings with edit distance at most k and those with edit distance more than 4k^2 . This is an improvement and a simplification upon the main result of Goldenberg, Krauthgamer, Saha, FOCS 2019], where the k vs \\Theta(k^2) gap edit distance problem is solved in O(n{k}+k^3) time. We further generalize our result to solve the k vs \\alpha k gap edit distance problem in time O( \\frac{n{\\alpha}} +k^2+ \\frac{k{\\alpha}} \\sqrt{nk}), strictly improving upon the previously known bound \\tilde{O}( \\frac{n{\\alpha}} +k^3). Finally, we show that if the input strings do not have long highly periodic substrings, then the gap edit distance problem can be solved in sublinear time within any factor \\alpha>1.\\tilde{O}{\\epsilon^2 k}+k^2\\ell). } We further give the first sublinear-time algorithm for the probabilistic embedding of edit distance to Hamming distance. Our \\tilde{O}(\\frac{n}{p})-time procedure yields an embedding with distortion k^2p , where k is the edit distance of the original strings. Specifically, the Hamming distance of the resultant strings is between \\frac{k with good probability. This generalizes the linear-time embedding of Chakraborty, Goldenberg, Koucky, STOC 2016], where the resultant Hamming distance is between k and k^2 . Our algorithm is based on a random walk over samples, which we believe will find other applications in sublinear-time algorithms.", "after_revision": "In this paper, we design new sublinear-time algorithms for solving the gap edit distance problem and for embedding edit distance to Hamming distance. For the gap edit distance problem, we give an O(n{k}+k^2) -time greedy algorithm that distinguishes between length-n input strings with edit distance at most k and those with edit distance exceeding (3k+5)k . This is an improvement and a simplification upon the result of Goldenberg, Krauthgamer, and Saha FOCS 2019], where the k vs \\Theta(k^2) gap edit distance problem is solved in O(n{k}+k^3) time. We further generalize our result to solve the k vs k' gap edit distance problem in time O( {\\alpha}} \\frac{nk +k^2+ {\\alpha}} \\frac{k^2 \\sqrt{nk}), strictly improving upon the previously known bound \\tilde{O}( {\\alpha}} \\frac{nk +k^3). Finally, we show that if the input strings do not have long highly periodic substrings, then already the k vs (1+\\epsilon)k gap edit distance problem can be solved in sublinear time . Specifically, if the strings contain no substring of length \\ell with period at most 2k, then the running time we achieve is\\tilde{O}(\\frac{n{\\epsilon^2 k}+k^2\\ell). } We further give the first sublinear-time probabilistic embedding of edit distance to Hamming distance. For any parameter p, our \\tilde{O}(\\frac{n}{p})-time procedure yields an embedding with distortion O(kp) , where k is the edit distance of the original strings. Specifically, the Hamming distance of the resultant strings is between \\frac{k-p+1 with good probability. This generalizes the linear-time embedding of Chakraborty, Goldenberg, and Kouck\\'y STOC 2016], where the resultant Hamming distance is between \\frac k2 and O(k^2) . Our algorithm is based on a random walk over samples, which we believe will find other applications in sublinear-time algorithms.", "edit_actions": [{"type": "R", "before": "a greedy algorithm that distinguishes in time", "after": "an", "start_char_pos": 193, "end_char_pos": 238}, {"type": "A", "before": null, "after": "-time greedy algorithm that distinguishes", "start_char_pos": 251, "end_char_pos": 251}, {"type": "R", "before": "more than 4k^2", "after": "exceeding (3k+5)k", "start_char_pos": 341, "end_char_pos": 355}, {"type": "R", "before": "main result of", "after": "result of", "start_char_pos": 411, "end_char_pos": 425}, {"type": "R", "before": "Saha,", "after": "and Saha", "start_char_pos": 451, "end_char_pos": 456}, {"type": "R", "before": "\\alpha k", "after": "k'", "start_char_pos": 604, "end_char_pos": 612}, {"type": "D", "before": "\\frac{n", "after": null, "start_char_pos": 650, "end_char_pos": 657}, {"type": "A", "before": null, "after": "\\frac{nk", "start_char_pos": 667, "end_char_pos": 667}, {"type": "D", "before": "\\frac{k", "after": null, "start_char_pos": 674, "end_char_pos": 681}, {"type": "A", "before": null, "after": "\\frac{k^2", "start_char_pos": 691, "end_char_pos": 691}, {"type": "D", "before": "\\frac{n", "after": null, "start_char_pos": 766, "end_char_pos": 773}, {"type": "A", "before": null, "after": "\\frac{nk", "start_char_pos": 783, "end_char_pos": 783}, {"type": "R", "before": "the", "after": "already the k vs (1+\\epsilon)k", "start_char_pos": 884, "end_char_pos": 887}, {"type": "R", "before": "within any factor \\alpha>1.", "after": ". Specifically, if the strings contain no substring of length \\ell with period at most 2k, then the running time we achieve is", "start_char_pos": 946, "end_char_pos": 973}, {"type": "A", "before": null, "after": "(\\frac{n", "start_char_pos": 982, "end_char_pos": 982}, {"type": "D", "before": "algorithm for the", "after": null, "start_char_pos": 1050, "end_char_pos": 1067}, {"type": "R", "before": "Our", "after": "For any parameter p, our", "start_char_pos": 1130, "end_char_pos": 1133}, {"type": "R", "before": "k^2p", "after": "O(kp)", "start_char_pos": 1208, "end_char_pos": 1212}, {"type": "R", "before": "\\frac{k", "after": "\\frac{k-p+1", "start_char_pos": 1340, "end_char_pos": 1347}, {"type": "R", "before": "Koucky,", "after": "and Kouck\\'y", "start_char_pos": 1442, "end_char_pos": 1449}, {"type": "R", "before": "k and k^2", "after": "\\frac k2 and O(k^2)", "start_char_pos": 1510, "end_char_pos": 1519}], "sents_char_pos": [0, 149, 357, 552, 790, 1006, 1129, 1268, 1370]}
+{"doc_id": "2007.14034", "revision_depth": "1", "before_revision": "This paper aims at giving some equivalent conditions for that a collection of finitely many of Hermitian matrices can be simultaneously diagonalizable via congruence (SDC) by a nonsingular matrix. It surprisingly turns out that one of such equivalent conditions applies the semidefinite programming (SDP) , which leads to a practical usefulness. As a consequence, this certainly solves such SDC-problem for collections of real symmetric matrices listed in J-B . Hiriart-Urruty, Potpourri of conjectures and open questions in nonlinear analysis and optimization,SIAM Review 49 ( 2) , 2007 . Corresponding algorithms and illustrating examples by hand/coding \\textsc{ are also presented.", "after_revision": "This paper aims at solving the Hermitian SDC problem, i.e., that ofsimultaneously diagonalizing via *-congruence a collection of finitely many (not need pairwise commute) Hermitian matrices. Theoretically, we provide some equivalent conditions for that such a matrix collection can be simultaneously diagonalized via ^*-congruence.\\% by a nonsingular matrix. Interestingly, one of such conditions leads to the existence of a positive definite solution to a semidefinite program (SDP) . From practical point of view, we propose an algorithm for numerically solving such problem. The proposed algorithm is a combination of ( 1) a positive semidefinite program detecting whether the initial Hermitian matrices are simultaneously diagonalizable via *-congruence, and ( 2) a Jacobi-like algorithm for simultaneously diagonalizing via *-congruence the commuting normal matrices derived from the previous stage. Illustrating examples by hand/coding in\\textsc{Matlab are also presented.", "edit_actions": [{"type": "R", "before": "giving some equivalent conditions for that", "after": "solving the Hermitian SDC problem, i.e., that of", "start_char_pos": 19, "end_char_pos": 61}, {"type": "A", "before": null, "after": "simultaneously diagonalizing via *-congruence", "start_char_pos": 61, "end_char_pos": 61}, {"type": "R", "before": "of Hermitian matrices", "after": "(not need pairwise commute) Hermitian matrices. Theoretically, we provide some equivalent conditions for that such a matrix collection", "start_char_pos": 92, "end_char_pos": 113}, {"type": "R", "before": "diagonalizable via congruence (SDC)", "after": "diagonalized via ^*-congruence.\\%", "start_char_pos": 136, "end_char_pos": 171}, {"type": "R", "before": "It surprisingly turns out that", "after": "Interestingly,", "start_char_pos": 197, "end_char_pos": 227}, {"type": "R", "before": "equivalent conditions applies the semidefinite programming", "after": "conditions leads to the existence of a positive definite solution to a semidefinite program", "start_char_pos": 240, "end_char_pos": 298}, {"type": "D", "before": ", which leads to a practical usefulness. As a consequence, this certainly solves such SDC-problem for collections of real symmetric matrices listed in", "after": null, "start_char_pos": 305, "end_char_pos": 455}, {"type": "D", "before": "J-B", "after": null, "start_char_pos": 456, "end_char_pos": 459}, {"type": "D", "before": "Hiriart-Urruty, Potpourri of conjectures and open questions in nonlinear analysis and optimization,", "after": null, "start_char_pos": 462, "end_char_pos": 561}, {"type": "D", "before": "SIAM Review", "after": null, "start_char_pos": 561, "end_char_pos": 572}, {"type": "R", "before": "49", "after": "From practical point of view, we propose an algorithm for numerically solving such problem. The proposed algorithm is a combination of", "start_char_pos": 573, "end_char_pos": 575}, {"type": "A", "before": null, "after": "1) a positive semidefinite program detecting whether the initial Hermitian matrices are simultaneously diagonalizable via *-congruence, and (", "start_char_pos": 578, "end_char_pos": 578}, {"type": "D", "before": ", 2007", "after": null, "start_char_pos": 582, "end_char_pos": 588}, {"type": "R", "before": ". Corresponding algorithms and illustrating", "after": "a Jacobi-like algorithm for simultaneously diagonalizing via *-congruence the commuting normal matrices derived from the previous stage. Illustrating", "start_char_pos": 589, "end_char_pos": 632}, {"type": "A", "before": null, "after": "in", "start_char_pos": 657, "end_char_pos": 657}, {"type": "A", "before": null, "after": "Matlab", "start_char_pos": 665, "end_char_pos": 665}], "sents_char_pos": [0, 196, 345]}
+{"doc_id": "2007.15385", "revision_depth": "1", "before_revision": "The point inclusion tests for polygons, in other words the point in polygon (PIP) algorithms are fundamental tools for many scientific fields related to computational geometry and they have been studied for a long time. PIP algorithms get direct or indirect geometric definition of a polygonal entity and validate its containment of a given point. The PIP algorithms which are working directly on the geometric entities derive linear boundary definitions for the edges of the polygon . Moreover, almost all direct test methods rely on the two point form of the line equation to partition the space into half-spaces. Voronoi tessellations use an alternate approach for half-space partitioning. Instead of line equation, distance comparison between generator points is used to accomplish the same task. Voronoi tessellations consist of convex polygons which are defined between generator points. Therefore, Voronoi tessellations have become an inspiration for us to develop a new approach of PIP testing specialized for convex polygons. Essential equations to the conversion of a convex polygon to a voronoi polygonare derived along this paper . As a reference, a very standard convex PIP testing algorithm, the sign of offset \\textit{ , is selected for comparison. For generalization of the comparisons the ray crossing\\textit{ algorithm is used as another reference. All algorithms are implemented as vector and matrix operations without any branching. This enabled us to benefit from the CPU optimizations of the underlying linear algebra libraries. All algorithms are tested for three different polygon sizes and varying point batch sizes. Overall , our proposed algorithm has performed better with varying margin between 10\\% to 23\\% compared to the reference methods .", "after_revision": "The point inclusion tests for polygons, in other words the point-in-polygon (PIP) algorithms , are fundamental tools for many scientific fields related to computational geometry , and they have been studied for a long time. The PIP algorithms get direct or indirect geometric definition of a polygonal entity , and validate its containment of a given point. The PIP algorithms , which are working directly on the geometric entities , derive linear boundary definitions for the edges of the polygons . Moreover, almost all direct test methods rely on the two-point form of the line equation to partition the space into half-spaces. Voronoi tessellations use an alternate approach for half-space partitioning. Instead of line equation, distance comparison between generator points is used to accomplish the same task. Voronoi tessellations consist of convex polygons , which are defined between generator points. Therefore, Voronoi tessellations have become an inspiration for us to develop a new approach of the PIP testing, specialized for convex polygons. The equations, essential to the conversion of a convex polygon to a Voronoi polygon, are derived . As a reference, a very standard convex PIP testing algorithm, \\textit{the sign of offset , is selected for comparison. For generalization of the comparisons ,\\textit{the ray crossing algorithm is used as another reference. All algorithms are implemented as vector and matrix operations without any branching. This enabled us to benefit from the CPU optimizations of the underlying linear algebra libraries. Experimentation showed that , our proposed algorithm can have comparable performance characteristics with the reference algorithms. Moreover, it has simplicity, both from a geometric representation and the mental model .", "edit_actions": [{"type": "R", "before": "point in polygon", "after": "point-in-polygon", "start_char_pos": 59, "end_char_pos": 75}, {"type": "A", "before": null, "after": ",", "start_char_pos": 93, "end_char_pos": 93}, {"type": "A", "before": null, "after": ",", "start_char_pos": 177, "end_char_pos": 177}, {"type": "A", "before": null, "after": "The", "start_char_pos": 222, "end_char_pos": 222}, {"type": "A", "before": null, "after": ",", "start_char_pos": 304, "end_char_pos": 304}, {"type": "A", "before": null, "after": ",", "start_char_pos": 371, "end_char_pos": 371}, {"type": "A", "before": null, "after": ",", "start_char_pos": 425, "end_char_pos": 425}, {"type": "R", "before": "polygon", "after": "polygons", "start_char_pos": 482, "end_char_pos": 489}, {"type": "R", "before": "two point", "after": "two-point", "start_char_pos": 545, "end_char_pos": 554}, {"type": "A", "before": null, "after": ",", "start_char_pos": 856, "end_char_pos": 856}, {"type": "R", "before": "PIP testing", "after": "the PIP testing,", "start_char_pos": 997, "end_char_pos": 1008}, {"type": "R", "before": "Essential equations", "after": "The equations, essential", "start_char_pos": 1042, "end_char_pos": 1061}, {"type": "R", "before": "voronoi polygonare derived along this paper", "after": "Voronoi polygon, are derived", "start_char_pos": 1105, "end_char_pos": 1148}, {"type": "D", "before": "the sign of offset", "after": null, "start_char_pos": 1213, "end_char_pos": 1231}, {"type": "A", "before": null, "after": "the sign of offset", "start_char_pos": 1240, "end_char_pos": 1240}, {"type": "R", "before": "the ray crossing", "after": ",", "start_char_pos": 1309, "end_char_pos": 1325}, {"type": "A", "before": null, "after": "the ray crossing", "start_char_pos": 1333, "end_char_pos": 1333}, {"type": "R", "before": "All algorithms are tested for three different polygon sizes and varying point batch sizes. Overall", "after": "Experimentation showed that", "start_char_pos": 1558, "end_char_pos": 1656}, {"type": "R", "before": "has performed better with varying margin between 10\\% to 23\\% compared to the reference methods", "after": "can have comparable performance characteristics with the reference algorithms. Moreover, it has simplicity, both from a geometric representation and the mental model", "start_char_pos": 1682, "end_char_pos": 1777}], "sents_char_pos": [0, 221, 351, 491, 621, 698, 806, 900, 1041, 1270, 1373, 1459, 1557, 1648]}
+{"doc_id": "2007.15620", "revision_depth": "1", "before_revision": "Named Entity Recognition (NER) is a fundamental NLP task, commonly formulated as classification over a sequence of tokens. Morphologically-Rich Languages (MRLs) pose a challenge to this basic formulation, as the boundaries of Named Entities do not coincide with token boundaries, rather, they respect morphological boundaries. To address NER in MRLs we then need to answer two fundamental modeling questions: (i) What should be the basic units to be identified and labeled, are they token-based or morpheme-based? and (ii) How can morphological units be encoded and accurately obtained in realistic (non-gold) scenarios? We empirically investigate these questions on a novel parallel NER benchmarkwe deliver , with parallel token-level and morpheme-level NER annotations for Modern Hebrew, a morphologically complex language. Our results show that explicitly modeling morphological boundaries consistently leads to improved NER performance, and that a novel hybrid architecture that we propose , in which NER precedes and prunes the morphological decomposition(MD) space , greatly outperforms the standard pipeline approach, on both Hebrew NER and Hebrew MD in realistic scenarios .", "after_revision": "Named Entity Recognition (NER) is a fundamental NLP task, commonly formulated as classification over a sequence of tokens. Morphologically-Rich Languages (MRLs) pose a challenge to this basic formulation, as the boundaries of Named Entities do not necessarily coincide with token boundaries, rather, they respect morphological boundaries. To address NER in MRLs we then need to answer two fundamental questions, namely, what are the basic units to be labeled, and how can these units be detected and classified in realistic settings, i.e., where no gold morphology is available. We empirically investigate these questions on a novel NER benchmark , with parallel tokenlevel and morpheme-level NER annotations , which we develop for Modern Hebrew, a morphologically rich-and-ambiguous language. Our results show that explicitly modeling morphological boundaries leads to improved NER performance, and that a novel hybrid architecture , in which NER precedes and prunes morphological decomposition , greatly outperforms the standard pipeline , where morphological decomposition strictly precedes NER, setting a new performance bar for both Hebrew NER and Hebrew morphological decomposition tasks .", "edit_actions": [{"type": "A", "before": null, "after": "necessarily", "start_char_pos": 248, "end_char_pos": 248}, {"type": "R", "before": "modeling questions: (i) What should be", "after": "questions, namely, what are", "start_char_pos": 390, "end_char_pos": 428}, {"type": "R", "before": "identified and labeled, are they token-based or morpheme-based? and (ii) How can morphological units be encoded and accurately obtained in realistic (non-gold) scenarios?", "after": "labeled, and how can these units be detected and classified in realistic settings, i.e., where no gold morphology is available.", "start_char_pos": 451, "end_char_pos": 621}, {"type": "R", "before": "parallel NER benchmarkwe deliver", "after": "NER benchmark", "start_char_pos": 676, "end_char_pos": 708}, {"type": "R", "before": "token-level", "after": "tokenlevel", "start_char_pos": 725, "end_char_pos": 736}, {"type": "A", "before": null, "after": ", which we develop", "start_char_pos": 772, "end_char_pos": 772}, {"type": "R", "before": "complex", "after": "rich-and-ambiguous", "start_char_pos": 810, "end_char_pos": 817}, {"type": "D", "before": "consistently", "after": null, "start_char_pos": 895, "end_char_pos": 907}, {"type": "D", "before": "that we propose", "after": null, "start_char_pos": 980, "end_char_pos": 995}, {"type": "R", "before": "the morphological decomposition(MD) space", "after": "morphological decomposition", "start_char_pos": 1031, "end_char_pos": 1072}, {"type": "R", "before": "approach, on", "after": ", where morphological decomposition strictly precedes NER, setting a new performance bar for", "start_char_pos": 1117, "end_char_pos": 1129}, {"type": "R", "before": "MD in realistic scenarios", "after": "morphological decomposition tasks", "start_char_pos": 1157, "end_char_pos": 1182}], "sents_char_pos": [0, 122, 327, 514, 621, 827]}
+{"doc_id": "2007.16192", "revision_depth": "1", "before_revision": "We study partitioning to parallelize multiplication of one or more dense vectors by a sparse matrix (SpMV or SpMM). We consider contiguous partitions, where the rows (or columns) of the matrix are split into K parts without reordering. We present exact and approximate contiguous partitioning algorithms that minimize the runtime of the longest-running processor under cost models that combine work factors and hypergraph communication factors . This differs from traditional graph or hypergraph partitioning models which minimize total communication under a work balance constraint. We address regimes where partitions of the row space and column space are expected to match (the symmetric case) or are allowed to differ (the nonsymmetric case) . Our algorithms use linear space. Our exact algorithm runs in linear time when K^2 is sublinear. Our (1 + \\epsilon)-approximate algorithm runs in linear time when K\\log( /(c_{low}\\epsilon)) is O(N^C) for C < } 1 and c_{low} are upper and lower bounds on the optimal cost. We also propose a simpler version of our (1 + \\epsilon)-approximate algorithm which runs in a factor of \\log(c_{high}} / \\epsilon) is sublinear. We\\epsilon)) from linear time, but is faster in practice. We empirically demonstrate that all of our algorithms efficiently produce high-quality contiguous partitions. We } combine concepts from high-performance computing and computational geometry. Existing load balancing algorithms optimize a linear model of per-processor work. We make minor adaptations to optimize arbitrary nonuniform monotonic increasing or decreasing cost functions which may be expensive to evaluate. We then show that evaluating our model of communication is equivalent to planar dominance counting. We specialize Chazelle's dominance counting algorithm to points in the bounded integer plane and generalize it to trade reduced construction time for increased query time, since our partitioners make very few queries. Our algorithms split the original row (or column) ordering into parts to optimize diverse cost models. Combined with reordering or embedding techniques, our algorithms might be used to build more general heuristic partitioners, as they can optimally round one-dimensional embeddings of direct K-way noncontiguous partitioning problems .", "after_revision": "We study partitioning to parallelize multiplication of one or more dense vectors by a sparse matrix (SpMV or SpMM). We consider contiguous partitions, where the rows (or columns) of a sparse matrix with N nonzeros are split into K parts without reordering. We propose exact and approximate algorithms to produce contiguous partitions minimizing the maximum runtime of any processor under a diverse family of cost models that combine work and hypergraph communication terms in symmetric or asymmetric settings . This differs from traditional partitioning models which minimize total communication , or from traditional load balancing models which only balance work. One can view our algorithms as optimally rounding one-dimensional embeddings of direct K-way noncontiguous partitioning problems . Our algorithms use linear space. Our exact algorithm runs in linear time when K^2 is O(N^C) for C < 1. Our (1 + \\epsilon)-approximate algorithm runs in linear time when K\\log( c_{high/(c_{low}\\epsilon)) is O(N^C) for C < } 1 , where c_{high and c_{low} are upper and lower bounds on the optimal cost. We also propose a simpler version of our (1 + \\epsilon)-approximate algorithm which runs in a factor of \\log(c_{high}} / (c_{low\\epsilon)) from linear time, but is faster in practice. We empirically demonstrate that all of our algorithms efficiently produce high-quality contiguous partitions. We } combine concepts from high-performance computing and computational geometry. We extend existing load balancing algorithms to optimize arbitrary nonuniform monotonic increasing or decreasing cost functions . We reduce evaluation of our communication model to planar dominance counting. We specialize Chazelle's dominance counting algorithm to points in the bounded integer plane and generalize it to trade reduced construction time for increased query time, resulting in an overall linear runtime .", "edit_actions": [{"type": "R", "before": "the matrix", "after": "a sparse matrix with N nonzeros", "start_char_pos": 182, "end_char_pos": 192}, {"type": "R", "before": "present", "after": "propose", "start_char_pos": 239, "end_char_pos": 246}, {"type": "R", "before": "contiguous partitioning algorithms that minimize the runtime of the longest-running processor under", "after": "algorithms to produce contiguous partitions minimizing the maximum runtime of any processor under a diverse family of", "start_char_pos": 269, "end_char_pos": 368}, {"type": "D", "before": "factors", "after": null, "start_char_pos": 399, "end_char_pos": 406}, {"type": "R", "before": "factors", "after": "terms in symmetric or asymmetric settings", "start_char_pos": 436, "end_char_pos": 443}, {"type": "D", "before": "graph or hypergraph", "after": null, "start_char_pos": 476, "end_char_pos": 495}, {"type": "R", "before": "under a work balance constraint. We address regimes where partitions of the row space and column space are expected to match (the symmetric case) or are allowed to differ (the nonsymmetric case)", "after": ", or from traditional load balancing models which only balance work. One can view our algorithms as optimally rounding one-dimensional embeddings of direct K-way noncontiguous partitioning problems", "start_char_pos": 551, "end_char_pos": 745}, {"type": "R", "before": "sublinear.", "after": "O(N^C) for C < 1.", "start_char_pos": 833, "end_char_pos": 843}, {"type": "A", "before": null, "after": "c_{high", "start_char_pos": 917, "end_char_pos": 917}, {"type": "A", "before": null, "after": ", where c_{high", "start_char_pos": 959, "end_char_pos": 959}, {"type": "R", "before": "\\epsilon) is sublinear. We", "after": "(c_{low", "start_char_pos": 1141, "end_char_pos": 1167}, {"type": "R", "before": "Existing", "after": "We extend existing", "start_char_pos": 1415, "end_char_pos": 1423}, {"type": "D", "before": "optimize a linear model of per-processor work. We make minor adaptations", "after": null, "start_char_pos": 1450, "end_char_pos": 1522}, {"type": "R", "before": "which may be expensive to evaluate. We then show that evaluating our model of communication is equivalent", "after": ". We reduce evaluation of our communication model", "start_char_pos": 1606, "end_char_pos": 1711}, {"type": "R", "before": "since our partitioners make very few queries. Our algorithms split the original row (or column) ordering into parts to optimize diverse cost models. Combined with reordering or embedding techniques, our algorithms might be used to build more general heuristic partitioners, as they can optimally round one-dimensional embeddings of direct K-way noncontiguous partitioning problems", "after": "resulting in an overall linear runtime", "start_char_pos": 1914, "end_char_pos": 2294}], "sents_char_pos": [0, 115, 235, 445, 583, 747, 780, 843, 1019, 1164, 1222, 1332, 1414, 1496, 1641, 1741, 1959, 2062]}
+{"doc_id": "2007.16192", "revision_depth": "3", "before_revision": "We partition to parallelize multiplication of one or more dense vectors by a sparse matrix (SpMVor SpMM ). We consider contiguous partitions, where the rows (or columns) of a sparse matrix with N nonzeros are split into K parts without reordering. We propose exact and approximate contiguous partitioners that minimize the maximum runtime of any processor under a diverse family of cost models that combine work and hypergraph communication terms in symmetric or asymmetric settings. This differs from traditional partitioning models which minimize total communication, or from traditional load balancing models which only balance work. One can view our algorithms as optimally rounding one-dimensional embeddings of direct K-way noncontiguous partitioning problems. Our algorithms use linear space. Our exact algorithm runs in linear time when K^2 is O(N^C) for C < 1. Our (1 + \\epsilon)-approximate algorithm runs in linear time when K\\log(c_{ \\text{high }/(c_{ \\text{low }\\epsilon)) is O(N^C) for C < 1, where c_{ \\text{high } and c_{ \\text{low } are upper and lower bounds on the optimal cost. We also propose a simpler (1 + \\epsilon)-approximate algorithm which runs in a factor of \\log(c_{ \\text{high }/(c_{ \\text{low }\\epsilon)) from linear time , but is faster in practice . We empirically demonstrate that all of our algorithms efficiently produce high-quality contiguous partitions .", "after_revision": "Graph partitioning schedules parallel calculations like sparse matrix-vector multiply (SpMV ). We consider contiguous partitions, where the m rows (or columns) of a sparse matrix with N nonzeros are split into K parts without reordering. We propose the first near-linear time algorithms for several graph partitioning problems in the contiguous regime. Traditional objectives such as the simple edge cut, hyperedge cut, or hypergraph connectivity minimize the total cost of all parts under a balance constraint. Our total partitioners use O(Km + N) space. They run in O((Km\\log(m) + N)\\log(N)) time, a significant improvement over prior O(K(m^2 + N)) time algorithms due to Kernighan and Grandjean et. al. Bottleneck partitioning minimizes the maximum cost of any part. We propose a new bottleneck cost which reflects the sum of communication and computation on each part. Our bottleneck partitioners use linear space. The exact algorithm runs in linear time when K^2 is O(N^C) for C < 1. Our (1 + \\epsilon)-approximate algorithm runs in linear time when K\\log(c_{ high }/(c_{ low }\\epsilon)) is O(N^C) for C < 1, where c_{ high } and c_{ low } are upper and lower bounds on the optimal cost. We also propose a simpler (1 + \\epsilon)-approximate algorithm which runs in a factor of \\log(c_{ high }/(c_{ low }\\epsilon)) from linear time . We empirically demonstrate that our algorithms efficiently produce high-quality contiguous partitions on a test suite of 42 test matrices. When K = 8, our hypergraph connectivity partitioner achieved a speedup of 53\\times (mean 15.1\\times) over prior algorithms. The mean runtime of our bottleneck partitioner was 5.15 SpMVs .", "edit_actions": [{"type": "R", "before": "We partition to parallelize multiplication of one or more dense vectors by a sparse matrix (SpMVor SpMM", "after": "Graph partitioning schedules parallel calculations like sparse matrix-vector multiply (SpMV", "start_char_pos": 0, "end_char_pos": 103}, {"type": "A", "before": null, "after": "m", "start_char_pos": 152, "end_char_pos": 152}, {"type": "R", "before": "exact and approximate contiguous partitioners that minimize the maximum runtime of any processor under a diverse family of cost models that combine work and hypergraph communication terms in symmetric or asymmetric settings. This differs from traditional partitioning models which minimize total communication, or from traditional load balancing models which only balance work. One can view our algorithms as optimally rounding one-dimensional embeddings of direct K-way noncontiguous partitioning problems. Our algorithms", "after": "the first near-linear time algorithms for several graph partitioning problems in the contiguous regime. Traditional objectives such as the simple edge cut, hyperedge cut, or hypergraph connectivity minimize the total cost of all parts under a balance constraint. Our total partitioners use O(Km + N) space. They run in O((Km\\log(m) + N)\\log(N)) time, a significant improvement over prior O(K(m^2 + N)) time algorithms due to Kernighan and Grandjean et. al. Bottleneck partitioning minimizes the maximum cost of any part. We propose a new bottleneck cost which reflects the sum of communication and computation on each part. Our bottleneck partitioners", "start_char_pos": 260, "end_char_pos": 782}, {"type": "R", "before": "Our", "after": "The", "start_char_pos": 801, "end_char_pos": 804}, {"type": "R", "before": "\\text{high", "after": "high", "start_char_pos": 947, "end_char_pos": 957}, {"type": "R", "before": "\\text{low", "after": "low", "start_char_pos": 965, "end_char_pos": 974}, {"type": "R", "before": "\\text{high", "after": "high", "start_char_pos": 1018, "end_char_pos": 1028}, {"type": "R", "before": "\\text{low", "after": "low", "start_char_pos": 1039, "end_char_pos": 1048}, {"type": "R", "before": "\\text{high", "after": "high", "start_char_pos": 1197, "end_char_pos": 1207}, {"type": "R", "before": "\\text{low", "after": "low", "start_char_pos": 1215, "end_char_pos": 1224}, {"type": "D", "before": ", but is faster in practice", "after": null, "start_char_pos": 1254, "end_char_pos": 1281}, {"type": "D", "before": "all of", "after": null, "start_char_pos": 1316, "end_char_pos": 1322}, {"type": "A", "before": null, "after": "on a test suite of 42 test matrices. When K = 8, our hypergraph connectivity partitioner achieved a speedup of 53\\times (mean 15.1\\times) over prior algorithms. The mean runtime of our bottleneck partitioner was 5.15 SpMVs", "start_char_pos": 1393, "end_char_pos": 1393}], "sents_char_pos": [0, 106, 248, 484, 637, 767, 800, 1098, 1283]}
+{"doc_id": "2008.01513", "revision_depth": "2", "before_revision": "A household robot is expected to perform a wide variety of manipulating operations with an understanding of the purpose of the task. To this end, a desirable robotic application should provide an on-site robot teaching framework by non-experts. Here we propose to apply the Learning-from-Observation (LfO) framework to grasp-manipulation-release class household operations . The framework maps a human demonstration to predefined task models through a one-shot demonstration. A task model contains both high-level knowledge about the geometric constraints of tasks and low-level knowledge about human postures. The key idea is to design a task model that 1) covers a wide variety of household operations and 2) contains human postures to achieve tasks. We verified the effectiveness of our framework by testing an implemented system with several operations . In addition, we quantified the coverage of the task model by analyzing Web videos about household operations. In the context of one-shot robot teaching, the contributions of the paper is to propose a framework that 1) covers various tasks in grasp-manipulation-release class household operations and 2) mimics human postures during the operations .", "after_revision": "A household robot is expected to perform various manipulative operations with an understanding of the purpose of the task. To this end, robotic applications should provide an on-site robot teaching framework for non-experts. Here , we propose a Learning-from-Observation (LfO) framework for grasp-manipulation-release class household operations (GMR-operations) . The framework maps human demonstrations to predefined task models through one-shot teaching. Each task model contains both high-level knowledge regarding the geometric constraints of tasks and low-level knowledge related to human postures. The key goal of this study is to design a task model that 1) covers various GMR-operations and 2) includes human postures to achieve tasks. We verify the applicability of our framework by testing the novel LfO system with a real robot . In addition, we quantify the coverage of the task model by analyzing online videos of household operations. Within the context of one-shot robot teaching, the contribution of this study is a framework that covers various GMR-operations and mimics human postures during operation .", "edit_actions": [{"type": "R", "before": "a wide variety of manipulating", "after": "various manipulative", "start_char_pos": 41, "end_char_pos": 71}, {"type": "R", "before": "a desirable robotic application", "after": "robotic applications", "start_char_pos": 146, "end_char_pos": 177}, {"type": "R", "before": "by", "after": "for", "start_char_pos": 229, "end_char_pos": 231}, {"type": "R", "before": "we propose to apply the", "after": ", we propose a", "start_char_pos": 250, "end_char_pos": 273}, {"type": "R", "before": "to", "after": "for", "start_char_pos": 316, "end_char_pos": 318}, {"type": "A", "before": null, "after": "(GMR-operations)", "start_char_pos": 373, "end_char_pos": 373}, {"type": "R", "before": "a human demonstration", "after": "human demonstrations", "start_char_pos": 395, "end_char_pos": 416}, {"type": "D", "before": "a", "after": null, "start_char_pos": 451, "end_char_pos": 452}, {"type": "R", "before": "demonstration. A", "after": "teaching. Each", "start_char_pos": 462, "end_char_pos": 478}, {"type": "R", "before": "about", "after": "regarding", "start_char_pos": 525, "end_char_pos": 530}, {"type": "R", "before": "about", "after": "related to", "start_char_pos": 590, "end_char_pos": 595}, {"type": "R", "before": "idea", "after": "goal of this study", "start_char_pos": 620, "end_char_pos": 624}, {"type": "R", "before": "a wide variety of household operations", "after": "various GMR-operations", "start_char_pos": 666, "end_char_pos": 704}, {"type": "R", "before": "contains", "after": "includes", "start_char_pos": 712, "end_char_pos": 720}, {"type": "R", "before": "verified the effectiveness", "after": "verify the applicability", "start_char_pos": 757, "end_char_pos": 783}, {"type": "R", "before": "an implemented system with several operations", "after": "the novel LfO system with a real robot", "start_char_pos": 812, "end_char_pos": 857}, {"type": "R", "before": "quantified", "after": "quantify", "start_char_pos": 876, "end_char_pos": 886}, {"type": "R", "before": "Web videos about", "after": "online videos of", "start_char_pos": 931, "end_char_pos": 947}, {"type": "R", "before": "In", "after": "Within", "start_char_pos": 970, "end_char_pos": 972}, {"type": "R", "before": "contributions of the paper is to propose", "after": "contribution of this study is", "start_char_pos": 1017, "end_char_pos": 1057}, {"type": "R", "before": "1) covers various tasks in grasp-manipulation-release class household operations and 2)", "after": "covers various GMR-operations and", "start_char_pos": 1075, "end_char_pos": 1162}, {"type": "R", "before": "the operations", "after": "operation", "start_char_pos": 1192, "end_char_pos": 1206}], "sents_char_pos": [0, 132, 244, 375, 476, 611, 753, 859, 969]}
+{"doc_id": "2008.01739", "revision_depth": "1", "before_revision": "In recent years, deep neural sequence-to-sequence framework has demonstrated promising results in keyphrase generation. However, processing long documents using such deep neural networks requires high computational resources. To reduce the computational cost, the documents are typically truncated before given as inputs . As a result , the models may miss essential points conveyed in a document. Moreover, most of the existing methods are either extractive (identify important phrases from the document) or generative (generate phrases word by word), and hence they do not benefit from the advantages of both modeling techniques. To address these challenges , we propose SEG-Net, a neural keyphrase generation model that is composed of two major components, (1) a selector that selects the salient sentences in a document , and (2) an extractor-generator that jointly extracts and generates keyphrases from the selected sentences. SEG-Net uses a self-attentive architecture, known as ,\\emph{Transformer as the building block with a couple of uniqueness. First, SEG-Net incorporates a novel \\emph{layer-wise} coverage attention to summarize most of the points discussed in the target document. Second, it uses an\\emph{informed copy attention mechanism to encourage focusing on different segments of the document during keyphrase extraction and generation. Besides, SEG-Net jointly learns keyphrase generation and their part-of-speech tag prediction, where the later provides syntactic supervision to the former. The experimental results on seven keyphrase generation benchmarks from scientific and web documents demonstrate that SEG-Net outperforms the state-of-the-art neural generative methods by a large margin in both domains .", "after_revision": "Natural language processing techniques have demonstrated promising results in keyphrase generation. However, one of the major challenges inneural keyphrase generation is processing long documents using deep neural networks . Generally, documents are truncated before given as inputs to neural networks. Consequently , the models may miss essential points conveyed in the target document. To overcome this limitation , we propose SEG-Net, a neural keyphrase generation model that is composed of two major components, (1) a selector that selects the salient sentences in a document and (2) an extractor-generator that jointly extracts and generates keyphrases from the selected sentences. SEG-Net uses Transformer, a self-attentive architecture, \\emph{ as the basic building block with a novel \\emph{layer-wise} coverage attention to summarize most of the points discussed in the \\emph{ document. The experimental results on seven keyphrase generation benchmarks from scientific and web documents demonstrate that SEG-Net outperforms the state-of-the-art neural generative methods by a large margin .", "edit_actions": [{"type": "R", "before": "In recent years, deep neural sequence-to-sequence framework has", "after": "Natural language processing techniques have", "start_char_pos": 0, "end_char_pos": 63}, {"type": "A", "before": null, "after": "one of the major challenges in", "start_char_pos": 129, "end_char_pos": 129}, {"type": "A", "before": null, "after": "neural", "start_char_pos": 129, "end_char_pos": 129}, {"type": "A", "before": null, "after": "keyphrase generation is", "start_char_pos": 130, "end_char_pos": 130}, {"type": "D", "before": "such", "after": null, "start_char_pos": 163, "end_char_pos": 167}, {"type": "R", "before": "requires high computational resources. To reduce the computational cost, the documents are typically", "after": ". Generally, documents are", "start_char_pos": 189, "end_char_pos": 289}, {"type": "R", "before": ". As a result", "after": "to neural networks. Consequently", "start_char_pos": 323, "end_char_pos": 336}, {"type": "R", "before": "a document. Moreover, most of the existing methods are either extractive (identify important phrases from the document) or generative (generate phrases word by word), and hence they do not benefit from the advantages of both modeling techniques. To address these challenges", "after": "the target document. To overcome this limitation", "start_char_pos": 388, "end_char_pos": 661}, {"type": "D", "before": ",", "after": null, "start_char_pos": 826, "end_char_pos": 827}, {"type": "A", "before": null, "after": "Transformer,", "start_char_pos": 948, "end_char_pos": 948}, {"type": "D", "before": "known as ,", "after": null, "start_char_pos": 980, "end_char_pos": 990}, {"type": "D", "before": "Transformer", "after": null, "start_char_pos": 996, "end_char_pos": 1007}, {"type": "R", "before": "as the", "after": "as the basic", "start_char_pos": 1008, "end_char_pos": 1014}, {"type": "D", "before": "couple of uniqueness. First, SEG-Net incorporates a", "after": null, "start_char_pos": 1037, "end_char_pos": 1088}, {"type": "D", "before": "target document. Second, it uses an", "after": null, "start_char_pos": 1181, "end_char_pos": 1216}, {"type": "D", "before": "informed", "after": null, "start_char_pos": 1222, "end_char_pos": 1230}, {"type": "R", "before": "copy attention mechanism to encourage focusing on different segments of the document during keyphrase extraction and generation. Besides, SEG-Net jointly learns keyphrase generation and their part-of-speech tag prediction, where the later provides syntactic supervision to the former.", "after": "document.", "start_char_pos": 1231, "end_char_pos": 1515}, {"type": "D", "before": "in both domains", "after": null, "start_char_pos": 1718, "end_char_pos": 1733}], "sents_char_pos": [0, 119, 227, 324, 399, 633, 934, 1058, 1197, 1359, 1515]}
+{"doc_id": "2008.03869", "revision_depth": "1", "before_revision": "The COVID-19 pandemic has devastated the world with health and economic wreckage. Precise estimates of the COVID-19 adverse outcomes on individual patients could have led to better allocation of healthcare resources and more efficient targeted preventive measures. We developed MLHO (pronounced as melo) for predicting patient-level risk of hospitalization, ICU admission, need for mechanical ventilation, and death from patients' past (before COVID-19 infection) medical records. MLHOis an end-to-end Machine Learning pipeline that implements iterative sequential representation mining and feature and model selection to predict health outcomes. MLHO 's architecture enables a parallel and outcome-oriented calibration, in which different statistical learning algorithms and vectors of features are simultaneously tested and leveraged to improve prediction of health outcomes. Using clinical data from a large cohort of over 14 ,000 patients, we modeled the four adverse outcomes utilizing about 600 features representing patients' before-COVID health records . Overall, the best predictions were obtained from extreme and gradient boosting models. The median AUC ROC for mortality prediction was 0.91, while the prediction performance ranged between 0.79 and 0.83 for ICU, hospitalization, and ventilation. We broadly describe the clusters of features that were utilized in modeling and their relative influence on predicting each outcome. As COVID-19 cases are re-surging in the U. S. and around the world, a Machine Learning pipeline like MLHOis crucial to improve our readiness for confronting the potential future waves of COVID-19, as well as other novel infectious diseases that may emerge in the near future .", "after_revision": " We developed MLHO (pronounced as melo) , an end-to-end Machine Learning framework that leverages iterative feature and algorithm selection to predict Health Outcomes. MLHO implements iterative sequential representation mining, and feature and model selection, for predicting the patient-level risk of hospitalization, ICU admission, need for mechanical ventilation, and death . It bases this prediction on data from patients' past medical records (before their COVID-19 infection) . MLHO 's architecture enables a parallel and outcome-oriented model calibration, in which different statistical learning algorithms and vectors of features are simultaneously tested to improve the prediction of health outcomes. Using clinical and demographic data from a large cohort of over 13 ,000 COVID-19-positive patients, we modeled the four adverse outcomes utilizing about 600 features representing patients' pre-COVID health records and demographics. The mean AUC ROC for mortality prediction was 0.91, while the prediction performance ranged between 0.80 and 0.81 for the ICU, hospitalization, and ventilation. We broadly describe the clusters of features that were utilized in modeling and their relative influence for predicting each outcome. Our results demonstrated that while demographic variables (namely age) are important predictors of adverse outcomes after a COVID-19 infection, the incorporation of the past clinical records are vital for a reliable prediction model. As the COVID-19 pandemic unfolds around the world, adaptable and interpretable machine learning frameworks (like MLHO) are crucial to improve our readiness for confronting the potential future waves of COVID-19, as well as other novel infectious diseases that may emerge .", "edit_actions": [{"type": "D", "before": "The COVID-19 pandemic has devastated the world with health and economic wreckage. Precise estimates of the COVID-19 adverse outcomes on individual patients could have led to better allocation of healthcare resources and more efficient targeted preventive measures.", "after": null, "start_char_pos": 0, "end_char_pos": 264}, {"type": "R", "before": "for predicting", "after": ", an end-to-end Machine Learning framework that leverages iterative feature and algorithm selection to predict Health Outcomes. MLHO implements iterative sequential representation mining, and feature and model selection, for predicting the", "start_char_pos": 304, "end_char_pos": 318}, {"type": "A", "before": null, "after": ". It bases this prediction on data", "start_char_pos": 416, "end_char_pos": 416}, {"type": "R", "before": "(before", "after": "medical records (before their", "start_char_pos": 437, "end_char_pos": 444}, {"type": "R", "before": "medical records. MLHOis an end-to-end Machine Learning pipeline that implements iterative sequential representation mining and feature and model selection to predict health outcomes. MLHO", "after": ". MLHO", "start_char_pos": 465, "end_char_pos": 652}, {"type": "A", "before": null, "after": "model", "start_char_pos": 709, "end_char_pos": 709}, {"type": "R", "before": "and leveraged to improve", "after": "to improve the", "start_char_pos": 824, "end_char_pos": 848}, {"type": "A", "before": null, "after": "and demographic", "start_char_pos": 895, "end_char_pos": 895}, {"type": "R", "before": "14", "after": "13", "start_char_pos": 929, "end_char_pos": 931}, {"type": "A", "before": null, "after": "COVID-19-positive", "start_char_pos": 937, "end_char_pos": 937}, {"type": "R", "before": "before-COVID health records . Overall, the best predictions were obtained from extreme and gradient boosting models. The median", "after": "pre-COVID health records and demographics. The mean", "start_char_pos": 1037, "end_char_pos": 1164}, {"type": "R", "before": "0.79 and 0.83 for", "after": "0.80 and 0.81 for the", "start_char_pos": 1256, "end_char_pos": 1273}, {"type": "R", "before": "on", "after": "for", "start_char_pos": 1418, "end_char_pos": 1420}, {"type": "R", "before": "As", "after": "Our results demonstrated that while demographic variables (namely age) are important predictors of adverse outcomes after a", "start_char_pos": 1446, "end_char_pos": 1448}, {"type": "R", "before": "cases are re-surging in the U. S. and", "after": "infection, the incorporation of the past clinical records are vital for a reliable prediction model. As the COVID-19 pandemic unfolds", "start_char_pos": 1458, "end_char_pos": 1495}, {"type": "R", "before": "a Machine Learning pipeline like MLHOis", "after": "adaptable and interpretable machine learning frameworks (like MLHO) are", "start_char_pos": 1514, "end_char_pos": 1553}, {"type": "D", "before": "in the near future", "after": null, "start_char_pos": 1702, "end_char_pos": 1720}], "sents_char_pos": [0, 81, 264, 481, 647, 879, 1066, 1153, 1312, 1445]}
+{"doc_id": "2008.05221", "revision_depth": "1", "before_revision": "In recent years, the fields of natural language processing (NLP) and information retrieval (IR) have made tremendous progress thanks to deep learning models like Recurrent Neural Networks (RNNs), Gated Recurrent Units (GRUs) and Long Short-Term Memory (LSTMs)networks, and Transformer based models like Bidirectional Encoder Representations from Transformers (BERT) [ [ [ [ [ [ . But these models are humongous in size. On the other hand,real world applications demand small model size, low response times and low computational power wattage. In this survey, we discuss six different types of methods (Pruning, Quantization, Knowledge Distillation, Parameter Sharing, Tensor Decomposition, and Linear Transformer based methods) for compression of such models to enable their deployment in real industry NLP projects.Given the critical need of building applications with efficient and small models, and the large amount of recently published work in this area, we believe that this URLanizes the plethora of work done by the 'deep learning for NLP' community in the past few years and presents it as a coherent story.", "after_revision": "In recent years, the fields of natural language processing (NLP) and information retrieval (IR) have made tremendous progress thanksto deep learning models like Recurrent Neural Networks (RNNs), Gated Recurrent Units (GRUs) and Long Short-Term Memory (LSTMs)networks, and Transformer 120 based models like Bidirectional Encoder Representations from Transformers (BERT) 24 , GenerativePre-training Transformer (GPT-2)[94 , Multi-task Deep Neural Network (MT-DNN)[73 , Extra-Long Network (XLNet)[134 , Text-to-text transfer transformer (T5)[95 , T-NLG[98 and GShard[63 . But these models are humongous in size. On the other hand,real world applications demand small model size, low response times and low computational power wattage. In this survey, wediscuss six different types of methods (Pruning, Quantization, Knowledge Distillation, Parameter Sharing, Tensor Decomposition, andSub-quadratic Transformer based methods) for compression of such models to enable their deployment in real industry NLP projects.Given the critical need of building applications with efficient and small models, and the large amount of recently published work inthis area, we believe that this URLanizes the plethora of work done by the 'deep learning for NLP' community in the past fewyears and presents it as a coherent story.", "edit_actions": [{"type": "R", "before": "thanks to", "after": "thanksto", "start_char_pos": 126, "end_char_pos": 135}, {"type": "A", "before": null, "after": "120", "start_char_pos": 285, "end_char_pos": 285}, {"type": "A", "before": null, "after": "24", "start_char_pos": 367, "end_char_pos": 367}, {"type": "A", "before": null, "after": ", GenerativePre-training Transformer (GPT-2)", "start_char_pos": 368, "end_char_pos": 368}, {"type": "A", "before": null, "after": "94", "start_char_pos": 369, "end_char_pos": 369}, {"type": "A", "before": null, "after": ", Multi-task Deep Neural Network (MT-DNN)", "start_char_pos": 370, "end_char_pos": 370}, {"type": "A", "before": null, "after": "73", "start_char_pos": 371, "end_char_pos": 371}, {"type": "A", "before": null, "after": ", Extra-Long Network (XLNet)", "start_char_pos": 372, "end_char_pos": 372}, {"type": "A", "before": null, "after": "134", "start_char_pos": 373, "end_char_pos": 373}, {"type": "A", "before": null, "after": ", Text-to-text transfer transformer (T5)", "start_char_pos": 374, "end_char_pos": 374}, {"type": "A", "before": null, "after": "95", "start_char_pos": 375, "end_char_pos": 375}, {"type": "A", "before": null, "after": ", T-NLG", "start_char_pos": 376, "end_char_pos": 376}, {"type": "A", "before": null, "after": "98", "start_char_pos": 377, "end_char_pos": 377}, {"type": "A", "before": null, "after": "and GShard", "start_char_pos": 378, "end_char_pos": 378}, {"type": "A", "before": null, "after": "63", "start_char_pos": 379, "end_char_pos": 379}, {"type": "R", "before": "we discuss", "after": "wediscuss", "start_char_pos": 561, "end_char_pos": 571}, {"type": "R", "before": "and Linear", "after": "andSub-quadratic", "start_char_pos": 692, "end_char_pos": 702}, {"type": "R", "before": "in this", "after": "inthis", "start_char_pos": 948, "end_char_pos": 955}, {"type": "R", "before": "few years", "after": "fewyears", "start_char_pos": 1072, "end_char_pos": 1081}], "sents_char_pos": [0, 421, 544, 818]}
+{"doc_id": "2008.06239", "revision_depth": "1", "before_revision": "Task-Oriented dialogue systems use four connected modules such as Natural Language Understanding (NLU), Dialogue State Tracker (DST), Dialogue Policy (DP) and Natural Language Generator (NLG). A research challenge is to learn each module with the least amount of samples (i.e., few-shots) given the high cost related to the data collection. The most common and effective technique to solve this problem is transferring learning, where large language models, either pre-trained on text or task-specific data, are fine-tuned on the few samples. These methods require fine-tuning steps and a set of parameters for each task. Differently, language models such as GPT-2 (Radford et al., 2019) and GPT-3 Brown et al., 2020) allows few-shot learning by priming the model with few-examples . In this paper, we evaluate the few-shot ability of Language Models such as GPT-2 by priming in the NLU, DST, DP and NLG tasks. Importantly, we highlight the current limitations of this approach and we discuss the possible implication to future work.", "after_revision": "Task-oriented dialogue systems use four connected modules , namely, Natural Language Understanding (NLU), a Dialogue State Tracking (DST), Dialogue Policy (DP) and Natural Language Generation (NLG). A research challenge is to learn each module with the least amount of samples (i.e., few-shots) given the high cost related to the data collection. The most common and effective technique to solve this problem is transfer learning, where large language models, either pre-trained on text or task-specific data, are fine-tuned on the few samples. These methods require fine-tuning steps and a set of parameters for each task. Differently, language models , such as GPT-2 (Radford et al., 2019) and GPT-3 ( Brown et al., 2020) , allow few-shot learning by priming the model with few examples . In this paper, we evaluate the priming few-shot ability of language models in the NLU, DST, DP and NLG tasks. Importantly, we highlight the current limitations of this approach , and we discuss the possible implication for future work.", "edit_actions": [{"type": "R", "before": "Task-Oriented", "after": "Task-oriented", "start_char_pos": 0, "end_char_pos": 13}, {"type": "R", "before": "such as", "after": ", namely,", "start_char_pos": 58, "end_char_pos": 65}, {"type": "R", "before": "Dialogue State Tracker", "after": "a Dialogue State Tracking", "start_char_pos": 104, "end_char_pos": 126}, {"type": "R", "before": "Generator", "after": "Generation", "start_char_pos": 176, "end_char_pos": 185}, {"type": "R", "before": "transferring", "after": "transfer", "start_char_pos": 406, "end_char_pos": 418}, {"type": "A", "before": null, "after": ",", "start_char_pos": 651, "end_char_pos": 651}, {"type": "A", "before": null, "after": "(", "start_char_pos": 699, "end_char_pos": 699}, {"type": "R", "before": "allows", "after": ", allow", "start_char_pos": 720, "end_char_pos": 726}, {"type": "R", "before": "few-examples", "after": "few examples", "start_char_pos": 771, "end_char_pos": 783}, {"type": "A", "before": null, "after": "priming", "start_char_pos": 817, "end_char_pos": 817}, {"type": "R", "before": "Language Models such as GPT-2 by priming", "after": "language models", "start_char_pos": 838, "end_char_pos": 878}, {"type": "A", "before": null, "after": ",", "start_char_pos": 981, "end_char_pos": 981}, {"type": "R", "before": "to", "after": "for", "start_char_pos": 1022, "end_char_pos": 1024}], "sents_char_pos": [0, 192, 340, 542, 621, 785, 913]}
+{"doc_id": "2008.08207", "revision_depth": "1", "before_revision": "Treatment planning is a time-consuming, iterative process with potentially high inter-planner variability. Fully automated treatment planning processes could reduce a planner's active treatment planning time and remove inter-planner variability, with the potential to tremendously improve patient turnover and quality of care. In developing fully automated algorithms for treatment planning, we have two main objectives: to produce plans that are 1) pareto optimal and 2) clinically acceptable. Here, we propose the pareto optimal projection search (POPS) algorithm, which provides a general framework for directly searching the pareto front. Our POPS algorithm is a novel automated planning method that combines two main search processes: 1) gradient-free search in the decision variable space and 2) projection of decision variables to the pareto front using the bisection method. We demonstrate the performance of POPS by comparing with clinical treatment plans. As one possible quantitative measure of treatment plan quality, we adopt a clinical acceptability scoring function (SF) modified from the previously developed general evaluation metric (GEM). On a dataset of 21 prostate IMRT cases collected at the Stanford Radiation Oncology Clinic (SROC) , our proposed POPS algorithm produces pareto optimal plans that perform well in regards to clinical acceptability. Compared to the SF scores of manually generated plans, SF scores for POPS plans were significantly better (p=2.6e-7). Our proposed POPS algorithm provides a general framework for fully automated treatment planning that achieves clinically acceptable dosimetric quality without requiring active planning from human planners. Our fully automated POPS algorithm addresses many key limitations of other automated planning approaches, and we anticipate that it will substantially improve treatment planning workflow.", "after_revision": "Objective: Radiation therapy treatment planning is a time-consuming, iterative process with potentially high inter-planner variability. Fully automated treatment planning processes could reduce a planner's active treatment planning time and remove inter-planner variability, with the potential to tremendously improve patient turnover and quality of care. In developing fully automated algorithms for treatment planning, we have two main objectives: to produce plans that are 1) Pareto optimal and 2) clinically acceptable. Here, we propose the Pareto optimal projection search (POPS) algorithm, which provides a general framework for directly searching the Pareto front. Methods: Our POPS algorithm is a novel automated planning method that combines two main search processes: 1) gradient-free search in the decision variable space and 2) projection of decision variables to the Pareto front using the bisection method. We demonstrate the performance of POPS by comparing with clinical treatment plans. As one possible quantitative measure of treatment plan quality, we construct a clinical acceptability scoring function (SF) modified from the previously developed general evaluation metric (GEM). Results: On a dataset of 21 prostate cases collected as part of clinical workflow , our proposed POPS algorithm produces Pareto optimal plans that are clinically acceptable in regards to dose conformity, dose homogeneity, and sparing URLans-at-risk. Conclusion: Our proposed POPS algorithm provides a general framework for fully automated treatment planning that achieves clinically acceptable dosimetric quality without requiring active planning from human planners. Significance: Our fully automated POPS algorithm addresses many key limitations of other automated planning approaches, and we anticipate that it will substantially improve treatment planning workflow.", "edit_actions": [{"type": "R", "before": "Treatment", "after": "Objective: Radiation therapy treatment", "start_char_pos": 0, "end_char_pos": 9}, {"type": "R", "before": "pareto", "after": "Pareto", "start_char_pos": 450, "end_char_pos": 456}, {"type": "R", "before": "pareto", "after": "Pareto", "start_char_pos": 516, "end_char_pos": 522}, {"type": "R", "before": "pareto front.", "after": "Pareto front. Methods:", "start_char_pos": 629, "end_char_pos": 642}, {"type": "R", "before": "pareto", "after": "Pareto", "start_char_pos": 842, "end_char_pos": 848}, {"type": "R", "before": "adopt", "after": "construct", "start_char_pos": 1033, "end_char_pos": 1038}, {"type": "A", "before": null, "after": "Results:", "start_char_pos": 1158, "end_char_pos": 1158}, {"type": "R", "before": "IMRT cases collected at the Stanford Radiation Oncology Clinic (SROC)", "after": "cases collected as part of clinical workflow", "start_char_pos": 1187, "end_char_pos": 1256}, {"type": "R", "before": "pareto", "after": "Pareto", "start_char_pos": 1296, "end_char_pos": 1302}, {"type": "R", "before": "perform well", "after": "are clinically acceptable", "start_char_pos": 1322, "end_char_pos": 1334}, {"type": "R", "before": "clinical acceptability. Compared to the SF scores of manually generated plans, SF scores for POPS plans were significantly better (p=2.6e-7).", "after": "dose conformity, dose homogeneity, and sparing URLans-at-risk. Conclusion:", "start_char_pos": 1349, "end_char_pos": 1490}, {"type": "A", "before": null, "after": "Significance:", "start_char_pos": 1697, "end_char_pos": 1697}], "sents_char_pos": [0, 106, 326, 494, 642, 882, 965, 1157, 1372, 1490, 1696]}
+{"doc_id": "2008.08470", "revision_depth": "1", "before_revision": "We consider a variational model for single-image super-resolution based on the assumption that the image gradient of the target image is sparse. To promote jump sparsity, we use an isotropic and anisotropic \\ell^{0 combined with a quadratic data fidelity, similarly as studied in [1] for general problems in signal recovery . For the numerical realisation of the model, we consider a converging ADMM algorithm. Differently from 1%DIFDELCMD < ]%%% , 2%DIFDELCMD < ]%%% , where approximate graph cuts and dynamic programming techniques were used for solving the non-convex substeps in the case of multivariate data, the proposed splitting allows to compute explicitly their solution by means of hard-thresholding and standard conjugate-gradient solvers. We compare quantitatively our results with several convex, nonconvex and deep-learning-based approaches for several synthetic and real-world data. Our numerical results show that combining super-resolution with gradient sparsity is particularly helpful for object detection and labelling tasks (such as QR scanning and land-cover classification), for which our results are shown to improve the classification precision of standard clustering algorithms and state-of-the art deep architectures 3 .", "after_revision": "We consider a variational model for single-image super-resolution based on the assumption that the gradient of the target image is sparse. We enforce this assumption by considering both an isotropic and an anisotropic \\ell^0 regularisation on the image gradient combined with a quadratic data fidelity, similarly as studied in [1] for general signal recovery problems . For the numerical realisation of the model, we %DIFDELCMD < ]%%% %DIFDELCMD < ]%%% propose a novel efficient ADMM splitting algorithm whose substeps solutions are computed efficiently by means of hard-thresholding and standard conjugate-gradient solvers. We test our model on highly-degraded synthetic and real-world data and quantitatively compare our results with several variational approaches as well as with state-of-the-art deep-learning techniques. Our experiments show that \\ell^0 gradient-regularised super-resolved images can be effectively used to improve the accuracy of standard segmentation algorithms when applied to QR and cell detection, and landcover classification problems, in comparison to the results achieved by other approaches .", "edit_actions": [{"type": "D", "before": "image", "after": null, "start_char_pos": 99, "end_char_pos": 104}, {"type": "R", "before": "To promote jump sparsity, we use", "after": "We enforce this assumption by considering both", "start_char_pos": 145, "end_char_pos": 177}, {"type": "R", "before": "anisotropic \\ell^{0", "after": "an anisotropic \\ell^0 regularisation on the image gradient", "start_char_pos": 195, "end_char_pos": 214}, {"type": "R", "before": "problems in signal recovery", "after": "signal recovery problems", "start_char_pos": 296, "end_char_pos": 323}, {"type": "D", "before": "consider a converging ADMM algorithm. Differently from", "after": null, "start_char_pos": 373, "end_char_pos": 427}, {"type": "D", "before": "1", "after": null, "start_char_pos": 428, "end_char_pos": 429}, {"type": "D", "before": ",", "after": null, "start_char_pos": 447, "end_char_pos": 448}, {"type": "D", "before": "2", "after": null, "start_char_pos": 449, "end_char_pos": 450}, {"type": "R", "before": ", where approximate graph cuts and dynamic programming techniques were used for solving the non-convex substeps in the case of multivariate data, the proposed splitting allows to compute explicitly their solution", "after": "propose a novel efficient ADMM splitting algorithm whose substeps solutions are computed efficiently", "start_char_pos": 468, "end_char_pos": 680}, {"type": "R", "before": "compare quantitatively", "after": "test our model on highly-degraded synthetic and real-world data and quantitatively compare", "start_char_pos": 755, "end_char_pos": 777}, {"type": "R", "before": "convex, nonconvex and deep-learning-based approaches for several synthetic and real-world data. Our numerical results show that combining super-resolution with gradient sparsity is particularly helpful for object detection and labelling tasks (such as QR scanning and land-cover classification), for which our results are shown", "after": "variational approaches as well as with state-of-the-art deep-learning techniques. Our experiments show that \\ell^0 gradient-regularised super-resolved images can be effectively used", "start_char_pos": 803, "end_char_pos": 1130}, {"type": "D", "before": "classification precision of standard clustering algorithms and state-of-the art deep architectures", "after": null, "start_char_pos": 1146, "end_char_pos": 1244}, {"type": "R", "before": "3", "after": "accuracy of standard segmentation algorithms when applied to QR and cell detection, and landcover classification problems, in comparison to the results achieved by other approaches", "start_char_pos": 1245, "end_char_pos": 1246}], "sents_char_pos": [0, 144, 325, 410, 751, 898]}
+{"doc_id": "2008.09109", "revision_depth": "1", "before_revision": "The ongoing COVID-19 pandemic caused by SARS-CoV-2 virus, a highly contagious virus, affected most of the countries of Earth. COVID-19 is causing obstacles for public URLanizations and is affecting almost every aspect of human life. It has become an epidemic outbreak with more than 22 million confirmed infections and above 750 thousand deaths worldwide. Mathematical models may help to explore the transmission dynamics and control of COVID-19 in the absence of an effective medicine or ready-to-use vaccine. In this study, we consider a mathematical model on COVID-19 transmission with the prosocial awareness effect. The proposed model can have four equilibrium states based on different parametric conditions. The system has an awareness free, disease-free equilibrium which is locally asymptotically stable. The global stability conditions for this equilibrium is also studied. The basic reproduction number, R_0, is calculated using the next-generation matrix method. Using Lyapunov function theory and LaSalle Invariance Principle, the DFE is shown globally asymptotically stable under some parametric conditions . The existence of awareness free, endemic equilibrium and endemic equilibrium is presented. We have calibrated our proposed model parameters to fit daily cases and deaths from Colombia. Using the estimated parameters , we assess the impact of prosocial awareness during the outbreak and compare this strategy with popular control measures .", "after_revision": "The ongoing COVID-19 pandemic has affected most of the countries on Earth. It has become a pandemic outbreak with more than 24 million confirmed infections and above 840 thousand deaths worldwide. In this study, we consider a mathematical model on COVID-19 transmission with the prosocial awareness effect. The proposed model can have four equilibrium states based on different parametric conditions. The local and global stability conditions for awareness free, disease-free equilibrium is studied. Using Lyapunov function theory and LaSalle Invariance Principle, the disease-free equilibrium is shown globally asymptotically stable under some parametric constraints . The existence of unique awareness free, endemic equilibrium and unique endemic equilibrium is presented. We calibrate our proposed model parameters to fit daily cases and deaths from Colombia. Sensitivity analysis indicates that the transmission rate and learning factor related to awareness of susceptibles are very crucial for reduction in disease related deaths. Finally , we assess the impact of prosocial awareness during the outbreak and compare this strategy with popular control measures . Results indicate that prosocial awareness has competitive potential to flatten the curve .", "edit_actions": [{"type": "R", "before": "caused by SARS-CoV-2 virus, a highly contagious virus,", "after": "has", "start_char_pos": 30, "end_char_pos": 84}, {"type": "R", "before": "of Earth. COVID-19 is causing obstacles for public URLanizations and is affecting almost every aspect of human life.", "after": "on Earth.", "start_char_pos": 116, "end_char_pos": 232}, {"type": "R", "before": "an epidemic", "after": "a pandemic", "start_char_pos": 247, "end_char_pos": 258}, {"type": "R", "before": "22", "after": "24", "start_char_pos": 283, "end_char_pos": 285}, {"type": "R", "before": "750", "after": "840", "start_char_pos": 325, "end_char_pos": 328}, {"type": "D", "before": "Mathematical models may help to explore the transmission dynamics and control of COVID-19 in the absence of an effective medicine or ready-to-use vaccine.", "after": null, "start_char_pos": 356, "end_char_pos": 510}, {"type": "R", "before": "system has an", "after": "local and global stability conditions for", "start_char_pos": 719, "end_char_pos": 732}, {"type": "R", "before": "which is locally asymptotically stable. The global stability conditions for this equilibrium is also studied. The basic reproduction number, R_0, is calculated using the next-generation matrix method.", "after": "is studied.", "start_char_pos": 774, "end_char_pos": 974}, {"type": "R", "before": "DFE", "after": "disease-free equilibrium", "start_char_pos": 1044, "end_char_pos": 1047}, {"type": "R", "before": "conditions", "after": "constraints", "start_char_pos": 1110, "end_char_pos": 1120}, {"type": "A", "before": null, "after": "unique", "start_char_pos": 1140, "end_char_pos": 1140}, {"type": "A", "before": null, "after": "unique", "start_char_pos": 1181, "end_char_pos": 1181}, {"type": "R", "before": "have calibrated", "after": "calibrate", "start_char_pos": 1219, "end_char_pos": 1234}, {"type": "R", "before": "Using the estimated parameters", "after": "Sensitivity analysis indicates that the transmission rate and learning factor related to awareness of susceptibles are very crucial for reduction in disease related deaths. Finally", "start_char_pos": 1310, "end_char_pos": 1340}, {"type": "A", "before": null, "after": ". Results indicate that prosocial awareness has competitive potential to flatten the curve", "start_char_pos": 1463, "end_char_pos": 1463}], "sents_char_pos": [0, 125, 232, 355, 510, 620, 714, 813, 883, 974, 1122, 1215, 1309]}
+{"doc_id": "2008.09260", "revision_depth": "1", "before_revision": "Within the context of stochastic probing with commitment, we consider the online stochastic matching problem; that is, the one-sided online bipartite matching problem where edges adjacent to an online node must be probed to determine if they exist based on edge probabilities that become known when an online vertex arrives. If a probed edge exists, it must be used in the matching (if possible). We consider the competitiveness of online algorithms in the random order input model (ROM) , when the offline vertices are weighted . More specifically, we consider a bipartite stochastic graph G = (U,V,E) where U is the set of offline vertices, V is the set of online vertices and G has edge probabilities (p_{e})_{e \\in E} and vertex weights (w_{ u })_{ u \\in U }. Additionally, G has patience values (\\ell _{v})_{v \\in V}, where \\ell_v indicates the maximum number of edges adjacent to an online vertex v which can be probed. We assume that U and (w_{u)_{u \\in U} are } known in advance, and that the patience, adjacent edges and edge probabilities for each \\scr{C} online vertex are only revealed when the online vertex arrives. If any one of the following three conditions is satisfied, then there is a conceptually simple deterministic greedy algorithm whose competitive ratio is 1-\\frac{1{e}. (1) When the offline vertices are unweighted. }%DIFDELCMD < \\\\ %%% (2) When the online vertex probabilities are \"vertex uniform\"; i.e., p_{u,v = p_v for all (u,v) \\in E. }%DIFDELCMD < \\\\ %%% (3) When the patience constraint \\ell_v satisfies \\ell_v \\in \\{ 1,|U|\\} for every online vertex; i.e., every online vertex either has unit or full patience. Setting the probability p_e = 1 for all e \\in E, the stochastic problem becomes the classical online bipartite matching problem . Our competitive ratios thus generalize corresponding results for the classical ROM bipartite matching setting .", "after_revision": "Within the context of stochastic probing with commitment, we consider the online stochastic matching problem; that is, the one-sided online bipartite matching problem where edges adjacent to an online node must be probed to determine if they exist based on edge probabilities that become known when an online vertex arrives. If a probed edge exists, it must be used in the matching (if possible). We consider the competitiveness of online algorithms in both the adversarial order model (AOM) and the random order model (ROM) . More specifically, we consider a bipartite stochastic graph G = (U,V,E) where U is the set of offline vertices, V is the set of online vertices and G has edge probabilities (p_{e})_{e \\in E} and edge weights (w_{ e })_{ e \\in E }. Additionally, G has probing constraints ( _{v})_{v \\in V}, where _v indicates which sequences of edges adjacent to an online vertex v can be probed. We assume that U )_{u \\in U} are } is known in advance, and that \\scr{C}_v, together with the edge probabilities and weights adjacent to an online vertex are only revealed when the online vertex arrives. {e}. (1) When the offline vertices are unweighted. }%DIFDELCMD < \\\\ %%% = p_v for all (u,v) \\in E. }%DIFDELCMD < \\\\ %%% This model generalizes the various settings of the classical bipartite matching problem , and so our main contribution is in making progress towards understanding which classical results extend to the stochastic probing model .", "edit_actions": [{"type": "R", "before": "the random order input", "after": "both the adversarial order model (AOM) and the random order", "start_char_pos": 453, "end_char_pos": 475}, {"type": "D", "before": ", when the offline vertices are weighted", "after": null, "start_char_pos": 488, "end_char_pos": 528}, {"type": "R", "before": "vertex", "after": "edge", "start_char_pos": 726, "end_char_pos": 732}, {"type": "R", "before": "u", "after": "e", "start_char_pos": 746, "end_char_pos": 747}, {"type": "R", "before": "u", "after": "e", "start_char_pos": 753, "end_char_pos": 754}, {"type": "R", "before": "U", "after": "E", "start_char_pos": 759, "end_char_pos": 760}, {"type": "R", "before": "patience values (\\ell", "after": "probing constraints (", "start_char_pos": 784, "end_char_pos": 805}, {"type": "R", "before": "\\ell_v indicates the maximum number", "after": "_v indicates which sequences", "start_char_pos": 829, "end_char_pos": 864}, {"type": "D", "before": "which", "after": null, "start_char_pos": 905, "end_char_pos": 910}, {"type": "D", "before": "and (w_{u", "after": null, "start_char_pos": 943, "end_char_pos": 952}, {"type": "A", "before": null, "after": "is", "start_char_pos": 970, "end_char_pos": 970}, {"type": "D", "before": "the patience, adjacent edges and edge probabilities for each", "after": null, "start_char_pos": 998, "end_char_pos": 1058}, {"type": "A", "before": null, "after": "_v, together with the edge probabilities and weights adjacent to an", "start_char_pos": 1066, "end_char_pos": 1066}, {"type": "D", "before": "If any one of the following three conditions is satisfied, then there is a conceptually simple deterministic greedy algorithm whose competitive ratio is 1-\\frac{1", "after": null, "start_char_pos": 1131, "end_char_pos": 1293}, {"type": "D", "before": "(2) When the online vertex probabilities are \"vertex uniform\"; i.e., p_{u,v", "after": null, "start_char_pos": 1365, "end_char_pos": 1440}, {"type": "D", "before": "(3) When the patience constraint \\ell_v satisfies \\ell_v \\in \\{", "after": null, "start_char_pos": 1489, "end_char_pos": 1552}, {"type": "R", "before": "1,|U|\\} for every online vertex; i.e., every online vertex either has unit or full patience. Setting the probability p_e = 1 for all e \\in E, the stochastic problem becomes the classical online", "after": "This model generalizes the various settings of the classical", "start_char_pos": 1553, "end_char_pos": 1746}, {"type": "R", "before": ". Our competitive ratios thus generalize corresponding results for the classical ROM bipartite matching setting", "after": ", and so our main contribution is in making progress towards understanding which classical results extend to the stochastic probing model", "start_char_pos": 1774, "end_char_pos": 1885}], "sents_char_pos": [0, 109, 324, 396, 530, 925, 1130, 1297, 1343, 1427, 1585, 1645, 1775]}
+{"doc_id": "2008.09406", "revision_depth": "3", "before_revision": "We give the first approximate-near-neighbor data structure for time series under the continuous Fr\\'echet distance. Given a parameter \\epsilon \\in (0, 1 , the data structure can be used to preprocess n curves in R (aka time series), each of complexity m, to answer queries with a curve of complexity k by either returning a curve that lies within Fr\\'echet distance 2+\\epsilon , or answering that there exists no curve in the input within distance 1. In both cases, the answer is correct. Our data structure uses space in n\\cdot O\\left({\\epsilon^{-1}}\\right)^{k} + O(nm) and query time in O\\left(k\\right). We show that under some conditions the approximation factor achieved by our data structure is optimal in the cell-probe model of computation. Concretely}\\left({k\\epsilon}}\\right) + \\mathcal{O}(nm) and has query time in \\mathcal{O}}\\left(\\right) , we show that for any data structure which achieves an approximation factor less than 2 and which supports curves of arclength at most L, uses a word size bounded by \\mathcal{O}(L^{1-\\epsilon}) for some constant \\epsilon>0, and answers the query using only a constant number of probes, the number of words used to store the data structure must be at least L^{\\Omega(k)}. Our data structure uses only a constant number of probes per query and does not have any dependency on L. In particular, this shows that our solution is optimal if only a constant number of probes is allowed. Our second positive result is a probabilistic data structure based on locality-sensitive hashing, which achieves space in \\mathcal{O}(nm) and query time in \\mathcal{O}(k), and which answers queries with an approximation factor in \\mathcal{O}(k). Both of our data structures make use of the concept of signatures, which were originally introduced for the problem of clustering time series under the Fr\\'echet distance.", "after_revision": "We give the first approximate-near-neighbor data structures for time series under the continuous Fr\\'echet distance. For an attainable approximation factor c> 1 , the data structure can be used to preprocess n curves in R (aka time series), each of complexity m, to answer queries with a curve of complexity k by either returning a curve that lies within Fr\\'echet distance c , or answering that there exists no curve in the input within distance 1. In both cases, the answer is correct. Our first data structure achieves a (5+\\epsilon) approximation factor, uses space in n\\cdot O\\left({\\epsilon^{-1}}\\right)^{k} + O(nm) and has query time in O\\left(k\\right). Our second data structure achieves a (2+\\epsilon) approximation factor, uses space in n\\cdot \\mathcal{O}\\left(\\frac{m{k\\epsilon}}\\right)^{k + \\mathcal{O}(nm) and has query time in \\mathcal{O}}\\left(k\\cdot 2^k\\right). As an indicator of hardness , we show that for any data structure which achieves an approximation factor less than 2 and which supports curves of arclength at most L, uses a word size bounded by \\mathcal{O}(L^{1-\\epsilon}) for some constant \\epsilon>0, and answers the query using only a constant number of probes, the number of words used to store the data structure must be at least L^{\\Omega(k)}. Our third positive result is a probabilistic data structure based on locality-sensitive hashing, which achieves space in \\mathcal{O}(nm) and query time in \\mathcal{O}(k), and which answers queries with an approximation factor in \\mathcal{O}(k). All of our data structures make use of the concept of signatures, which were originally introduced for the problem of clustering time series under the Fr\\'echet distance.", "edit_actions": [{"type": "R", "before": "structure", "after": "structures", "start_char_pos": 49, "end_char_pos": 58}, {"type": "R", "before": "Given a parameter \\epsilon \\in (0,", "after": "For an attainable approximation factor c>", "start_char_pos": 116, "end_char_pos": 150}, {"type": "R", "before": "2+\\epsilon", "after": "c", "start_char_pos": 366, "end_char_pos": 376}, {"type": "R", "before": "data structure", "after": "first data structure achieves a (5+\\epsilon) approximation factor,", "start_char_pos": 493, "end_char_pos": 507}, {"type": "A", "before": null, "after": "has", "start_char_pos": 575, "end_char_pos": 575}, {"type": "R", "before": "We show that under some conditions the approximation factor achieved by our data structure is optimal in the cell-probe model of computation. Concretely", "after": "Our second data structure achieves a (2+\\epsilon) approximation factor, uses space in n\\cdot \\mathcal{O", "start_char_pos": 607, "end_char_pos": 759}, {"type": "A", "before": null, "after": "\\frac{m", "start_char_pos": 766, "end_char_pos": 766}, {"type": "A", "before": null, "after": "^{k", "start_char_pos": 785, "end_char_pos": 785}, {"type": "A", "before": null, "after": "k\\cdot 2^k", "start_char_pos": 844, "end_char_pos": 844}, {"type": "A", "before": null, "after": ". As an indicator of hardness", "start_char_pos": 851, "end_char_pos": 851}, {"type": "R", "before": "data structure uses only a constant number of probes per query and does not have any dependency on L. In particular, this shows that our solution is optimal if only a constant number of probes is allowed. Our second", "after": "third", "start_char_pos": 1228, "end_char_pos": 1443}, {"type": "R", "before": "Both", "after": "All", "start_char_pos": 1679, "end_char_pos": 1683}], "sents_char_pos": [0, 115, 450, 488, 606, 748, 1223, 1432, 1678]}
+{"doc_id": "2008.09870", "revision_depth": "1", "before_revision": "Indirect methods for visual SLAM are gaining popularity due to their robustness to varying environments . ORB-SLAM2 is a benchmark method in this domain, however, the computation of descriptors in ORB-SLAM2 is time-consuming and the descriptors cannot be reused unless a frame is selected as a keyframe.To overcome these problems, we present FastORB-SLAM which is light-weight and efficient as it tracks keypoints between adjacent frames without computing descriptors. To achieve this, a two-stage coarse-to-fine descriptor independent keypoint matching method is proposed based on sparse optical flow. In the first stage, we first predict initial keypoint correspondences via a uniform acceleration motion model and then robustly establish the correspondences via a pyramid-based sparse optical flow tracking method . In the second stage, we leverage motion smoothness and the epipolar constraint to refine the correspondences. In particular, our method computes descriptors only for keyframes. We test FastORB-SLAM with an RGBD camera on \\textit{TUM} and \\textit{ICL-NUIM} datasets and compare its accuracy and efficiency to nine existing RGBD SLAM methods. Qualitative and quantitative results show that our method achieves state-of-the-art performance in accuracy and is about twice as fast as the ORB-SLAM2 ", "after_revision": "Indirect methods for visual SLAM are gaining popularity due to their robustness to environmental variations . ORB-SLAM2 \\mbox{%DIFAUXCMD orbslam2 is a benchmark method in this domain, however, it consumes significant time for computing descriptors that never get reused unless a frame is selected as a keyframe.To overcome these problems, we present FastORB-SLAM which is lightweight and efficient as it tracks keypoints between adjacent frames without computing descriptors. To achieve this, a two stage coarse-to-fine descriptor independent keypoint matching method is proposed based on sparse optical flow. In the first stage, we predict initial keypoint correspondences via a simple but effective motion model and then robustly establish the correspondences via pyramid-based sparse optical flow tracking . In the second stage, we leverage the constraints of the motion smoothness and epipolar geometry to refine the correspondences. In particular, our method computes descriptors only for keyframes. We test FastORB-SLAM on \\textit{TUM} and \\textit{ICL-NUIM} RGB-D datasets and compare its accuracy and efficiency to nine existing RGB-D SLAM methods. Qualitative and quantitative results show that our method achieves state-of-the-art accuracy and is about twice as fast as the ORB-SLAM2 .", "edit_actions": [{"type": "R", "before": "varying environments", "after": "environmental variations", "start_char_pos": 83, "end_char_pos": 103}, {"type": "A", "before": null, "after": "\\mbox{%DIFAUXCMD orbslam2", "start_char_pos": 116, "end_char_pos": 116}, {"type": "R", "before": "the computation of descriptors in ORB-SLAM2 is time-consuming and the descriptors cannot be", "after": "it consumes significant time for computing descriptors that never get", "start_char_pos": 164, "end_char_pos": 255}, {"type": "R", "before": "light-weight", "after": "lightweight", "start_char_pos": 365, "end_char_pos": 377}, {"type": "R", "before": "two-stage", "after": "two stage", "start_char_pos": 489, "end_char_pos": 498}, {"type": "D", "before": "first", "after": null, "start_char_pos": 627, "end_char_pos": 632}, {"type": "R", "before": "uniform acceleration", "after": "simple but effective", "start_char_pos": 680, "end_char_pos": 700}, {"type": "D", "before": "a", "after": null, "start_char_pos": 766, "end_char_pos": 767}, {"type": "D", "before": "method", "after": null, "start_char_pos": 811, "end_char_pos": 817}, {"type": "A", "before": null, "after": "the constraints of the", "start_char_pos": 853, "end_char_pos": 853}, {"type": "R", "before": "the epipolar constraint", "after": "epipolar geometry", "start_char_pos": 876, "end_char_pos": 899}, {"type": "D", "before": "with an RGBD camera", "after": null, "start_char_pos": 1019, "end_char_pos": 1038}, {"type": "A", "before": null, "after": "RGB-D", "start_char_pos": 1077, "end_char_pos": 1077}, {"type": "R", "before": "RGBD", "after": "RGB-D", "start_char_pos": 1144, "end_char_pos": 1148}, {"type": "D", "before": "performance in", "after": null, "start_char_pos": 1247, "end_char_pos": 1261}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1315, "end_char_pos": 1315}], "sents_char_pos": [0, 304, 469, 603, 819, 930, 997, 1162]}
+{"doc_id": "2008.11292", "revision_depth": "1", "before_revision": "The problem of finding a diagonal flip path between two triangulations has been studied for nearly a century in the combinatorial (topological) setting and for decades in the geometric setting . In the geometric setting, finding a diagonal flip path between two triangulations that minimizes the number of diagonal flips over all such paths is NP-complete. However, when restricted to lattice triangulations- i. e. triangulations of a finite subset of the integer lattice, or an affine transformation of this lattice, bounded by a simple, closed polygon with lattice points as vertices - the problem has a polynomial time algorithm. Lattice triangulations have been studied for their uses in discriminant theory, Hilbert's 16th problem, toric varieties, quantum spin systems, and material science\\left(\\right) . Our first main result shows that there is a polynomial-time computable, unique partially-ordered set of diagonal flips such that there is a bijection between valid linear-orderings of this set and minimum diagonal flip paths between two lattice triangulations . This provides an alternative proof of the previously known result, as well as new structural insights into these diagonal flip paths\\left({2}}}\\right) . Our second main result characterizes pairs of triangulations , containing sets of edges E and E ' respectively, such that the minimum diagonal flip path between them contains the minimum number of diagonal flips over all minimum diagonal flip paths between pairs of triangulations , containing sets of edges E and E' respectively. Remarkably, all of our results are derived from a simple relationship between edges in triangulations and Farey sequences .", "after_revision": "The problem of finding a diagonal flip path between two triangulations has been studied for nearly a century . In the geometric setting, finding a flip path between two triangulations containing the minimum number of flips is NP-complete. However, for minimum flip paths between lattice triangulations, Eppstein and Caputo et al. gave algorithms running in O\\left(n^2\\right) time, where n is the number of points in the point-set. Eppstein proved this result for lattice point-sets bounded by convex polygons. Caputo et al. extended this result to the cases of non-convex bounding polygons and constrained flip paths that preserve a set of edges. In fact, Eppstein's approach readily extends to both cases . Our first result shows that there is a unique, partially-ordered set of flips whose valid linear-orderings are exactly the constrained, minimum flip paths between two lattice triangulations , leading to an algorithm to compute such a minimum flip path in O\\left(n^{\\frac{3{2}}}\\right) time. As a further improvement over previous results, in many natural cases, our algorithm runs in time linear in the length of the minimum flip path . Our second result characterizes pairs of triangulations T and T' that contain given sets of edges G and G ' respectively, and attain the minimum flip path between each other, where the minimum is taken over such pairs of triangulations . Finally, we demonstrate how our results can model crack propagation in crystalline materials caused by Stone-Wales defects. Notably, the above results follow from simple number-theoretic and geometric concepts .", "edit_actions": [{"type": "R", "before": "flip", "after": "flip", "start_char_pos": 34, "end_char_pos": 38}, {"type": "D", "before": "in the combinatorial (topological) setting and for decades in the geometric setting", "after": null, "start_char_pos": 109, "end_char_pos": 192}, {"type": "D", "before": "diagonal", "after": null, "start_char_pos": 231, "end_char_pos": 239}, {"type": "R", "before": "that minimizes the number of diagonal flips over all such paths", "after": "containing the minimum number of flips", "start_char_pos": 277, "end_char_pos": 340}, {"type": "R", "before": "when restricted to lattice triangulations- i. e. triangulations of a finite subset of the integer lattice, or an affine transformation of this lattice, bounded by a simple, closed polygon with lattice points as vertices - the problem has a polynomial time algorithm. Lattice triangulations have been studied for their uses in discriminant theory, Hilbert's 16th problem, toric varieties, quantum spin systems, and material science", "after": "for minimum flip paths between lattice triangulations, Eppstein and Caputo et al. gave algorithms running in O", "start_char_pos": 366, "end_char_pos": 796}, {"type": "A", "before": null, "after": "n^2", "start_char_pos": 802, "end_char_pos": 802}, {"type": "A", "before": null, "after": "time, where n is the number of points in the point-set. Eppstein proved this result for lattice point-sets bounded by convex polygons. Caputo et al. extended this result to the cases of non-convex bounding polygons and constrained flip paths that preserve a set of edges. In fact, Eppstein's approach readily extends to both cases", "start_char_pos": 810, "end_char_pos": 810}, {"type": "D", "before": "main", "after": null, "start_char_pos": 823, "end_char_pos": 827}, {"type": "R", "before": "polynomial-time computable, unique", "after": "unique,", "start_char_pos": 857, "end_char_pos": 891}, {"type": "R", "before": "diagonal flips such that there is a bijection between", "after": "flips whose", "start_char_pos": 917, "end_char_pos": 970}, {"type": "R", "before": "of this set and minimum diagonal", "after": "are exactly the constrained, minimum", "start_char_pos": 994, "end_char_pos": 1026}, {"type": "R", "before": ". This provides an alternative proof of the previously known result, as well as new structural insights into these diagonal flip paths", "after": ", leading to an algorithm to compute such a minimum flip path in O", "start_char_pos": 1073, "end_char_pos": 1207}, {"type": "A", "before": null, "after": "n^{\\frac{3", "start_char_pos": 1213, "end_char_pos": 1213}, {"type": "A", "before": null, "after": "time. As a further improvement over previous results, in many natural cases, our algorithm runs in time linear in the length of the minimum flip path", "start_char_pos": 1226, "end_char_pos": 1226}, {"type": "D", "before": "main", "after": null, "start_char_pos": 1240, "end_char_pos": 1244}, {"type": "R", "before": ", containing", "after": "T and T' that contain given", "start_char_pos": 1290, "end_char_pos": 1302}, {"type": "R", "before": "E and E", "after": "G and G", "start_char_pos": 1317, "end_char_pos": 1324}, {"type": "R", "before": "such that the minimum diagonal", "after": "and attain the minimum", "start_char_pos": 1341, "end_char_pos": 1371}, {"type": "R", "before": "them contains the minimum number of diagonal flips over all minimum diagonal flip paths between", "after": "each other, where the minimum is taken over such", "start_char_pos": 1390, "end_char_pos": 1485}, {"type": "R", "before": ", containing sets of edges E and E' respectively. Remarkably, all of our results are derived from a simple relationship between edges in triangulations and Farey sequences", "after": ". Finally, we demonstrate how our results can model crack propagation in crystalline materials caused by Stone-Wales defects. Notably, the above results follow from simple number-theoretic and geometric concepts", "start_char_pos": 1510, "end_char_pos": 1681}], "sents_char_pos": [0, 194, 356, 632, 812, 1074, 1228, 1559]}
+{"doc_id": "2008.11867", "revision_depth": "1", "before_revision": "Hierarchical learning has been successful at learning generalizable locomotion skills on walking robots in a sample-efficient manner. However, the low-dimensional \"latent\" action used to communicate between different layers of the hierarchy is typically user-designed. In this work, we present a fully-learned hierarchical framework, that is capable of jointly learning the low-level controller and the high-level action space. Next , we plan over latent actions in a model-predictive control fashion, using a learned high-level dynamics model. This framework is generalizable to multiple robots, and we present results on a Daisy hexapod simulation, A1 quadruped simulation, and Daisy robot hardware. We compare a range of learned hierarchical approaches , and show that our framework is more reliable, versatile and sample-efficient . In addition to learning approaches, we also compare to an inverse-kinematics (IK) based footstep planner , and show that our fully-learned framework is competitive in performance with IK under normal conditions, and outperforms it in adverse settings . Our hardwareexperiments show the Daisy hexapod achieving multiple locomotion tasks, such as goal reaching, trajectory and velocity tracking in an unstructured outdoor setting, with only 2000 hardware samples .", "after_revision": "Hierarchical learning has been successful at learning generalizable locomotion skills on walking robots in a sample-efficient manner. However, the low-dimensional \"latent\" action used to communicate between the two layers of the hierarchy is typically user-designed. In this work, we present a fully-learned hierarchical framework, that is capable of jointly learning the low-level controller and the high-level latent action space. Once this latent space is learned , we plan over continuous latent actions in a model-predictive control fashion, using a learned high-level dynamics model. This framework generalizes to multiple robots, and we present results on a Daisy hexapod simulation, A1 quadruped simulation, and Daisy robot hardware. We compare a range of learned hierarchical approaches from literature , and show that our framework outperforms baselines on multiple tasks and two simulations . In addition to learning approaches, we also compare to inverse-kinematics (IK) acting on planned footsteps , and show that our fully-learned framework outperforms IK in adverse settings on both A1 and Daisy simulations. On hardware, we show the Daisy hexapod achieving multiple locomotion tasks, such as goal reaching, trajectory and velocity tracking in an unstructured outdoor setting, with only 2000 hardware samples , reinforcing the robustness and sample-efficiency of our approach .", "edit_actions": [{"type": "R", "before": "different", "after": "the two", "start_char_pos": 207, "end_char_pos": 216}, {"type": "A", "before": null, "after": "latent", "start_char_pos": 414, "end_char_pos": 414}, {"type": "R", "before": "Next", "after": "Once this latent space is learned", "start_char_pos": 429, "end_char_pos": 433}, {"type": "A", "before": null, "after": "continuous", "start_char_pos": 449, "end_char_pos": 449}, {"type": "R", "before": "is generalizable", "after": "generalizes", "start_char_pos": 562, "end_char_pos": 578}, {"type": "A", "before": null, "after": "from literature", "start_char_pos": 758, "end_char_pos": 758}, {"type": "R", "before": "is more reliable, versatile and sample-efficient", "after": "outperforms baselines on multiple tasks and two simulations", "start_char_pos": 789, "end_char_pos": 837}, {"type": "D", "before": "an", "after": null, "start_char_pos": 895, "end_char_pos": 897}, {"type": "R", "before": "based footstep planner", "after": "acting on planned footsteps", "start_char_pos": 922, "end_char_pos": 944}, {"type": "R", "before": "is competitive in performance with IK under normal conditions, and outperforms it", "after": "outperforms IK", "start_char_pos": 989, "end_char_pos": 1070}, {"type": "R", "before": ". Our hardwareexperiments", "after": "on both A1 and Daisy simulations. On hardware, we", "start_char_pos": 1091, "end_char_pos": 1116}, {"type": "A", "before": null, "after": ", reinforcing the robustness and sample-efficiency of our approach", "start_char_pos": 1301, "end_char_pos": 1301}], "sents_char_pos": [0, 133, 268, 428, 546, 703, 839, 1092]}
+{"doc_id": "2008.12516", "revision_depth": "1", "before_revision": "Recently, the predicate detection problem was shown to be in the parallel complexity class NC . In this paper, we give some more work efficient parallel algorithms to solve the predicate detection problem on a distributed computation with n processes and at most m states per process. The previous best known parallel predicate detection algorithm, ParallelCut, had work complexity O(m^3n^3\\log mn). We give two algorithms, a deterministic algorithm with work complexity O( m^2n^2) and a randomized algorithm with work complexity O( m^2n^2). Furthermore, our algorithms have a space complexity of \\textit{ O(mn^2) whereas ParallelCut had a space complexity of \\textit{ O(m^2n^2).", "after_revision": "Recently, the predicate detection problem was shown to be in the parallel complexity class NC . In this paper, we give the first work-optimal parallel algorithm to solve the predicate detection problem on a distributed computation with n processes and at most m states per process. The previous best known parallel predicate detection algorithm, ParallelCut, has time complexity O(\\log mn) and work complexity O(m^3n^3\\log mn). We give two algorithms, a deterministic algorithm with time complexity O(mn) and work complexity O( mn^2), and a randomized algorithm with time complexity (mn)^{1/2 + o(1) work complexity O( mn^2). \\% and two offline algorithms. The online deterministic algorithm has. Furthermore, our algorithms improve upon the space complexity of \\textit{ParallelCut . Both of our algorithms have space complexity O(mn^2) whereas \\textit{ParallelCut has space complexity O(m^2n^2).", "edit_actions": [{"type": "R", "before": "NC", "after": "NC", "start_char_pos": 91, "end_char_pos": 93}, {"type": "R", "before": "some more work efficient parallel algorithms", "after": "the first work-optimal parallel algorithm", "start_char_pos": 119, "end_char_pos": 163}, {"type": "R", "before": "ParallelCut, had", "after": "ParallelCut", "start_char_pos": 349, "end_char_pos": 365}, {"type": "A", "before": null, "after": ", has time complexity O(\\log mn) and", "start_char_pos": 365, "end_char_pos": 365}, {"type": "A", "before": null, "after": "time complexity O(mn) and", "start_char_pos": 455, "end_char_pos": 455}, {"type": "R", "before": "m^2n^2)", "after": "mn^2),", "start_char_pos": 475, "end_char_pos": 482}, {"type": "A", "before": null, "after": "time complexity (mn)^{1/2 + o(1)", "start_char_pos": 515, "end_char_pos": 515}, {"type": "R", "before": "m^2n^2).", "after": "mn^2). \\% and two offline algorithms. The online deterministic algorithm has.", "start_char_pos": 535, "end_char_pos": 543}, {"type": "R", "before": "have a", "after": "improve upon the", "start_char_pos": 572, "end_char_pos": 578}, {"type": "A", "before": null, "after": "ParallelCut", "start_char_pos": 607, "end_char_pos": 607}, {"type": "A", "before": null, "after": ". Both of our algorithms have space complexity", "start_char_pos": 608, "end_char_pos": 608}, {"type": "D", "before": "ParallelCut had a space complexity of", "after": null, "start_char_pos": 625, "end_char_pos": 662}, {"type": "A", "before": null, "after": "ParallelCut", "start_char_pos": 671, "end_char_pos": 671}, {"type": "A", "before": null, "after": "has space complexity", "start_char_pos": 672, "end_char_pos": 672}], "sents_char_pos": [0, 284, 399, 543]}
+{"doc_id": "2009.00211", "revision_depth": "1", "before_revision": "Global localization and kidnapping are two challenging problems in robot localization. The popular method, Monte Carlo Localization (MCL) addresses the problem by sampling uniformly ] over the state space , which is unfortunately inefficient when the environment is large . To better deal with the the problems, we present a proposal model, named Deep Multimodal Observation Model ( DMOM). DMOM takes a map and a 2D laser scan as inputs and outputs a conditional multimodal probability distribution of the pose, making the samples more focusing on the regions with higher likelihood. With such samples, the convergence is expected to be much efficient. Considering that learning based Samplable Observation Model may fail to capture the true pose sometimes, we furthermore propose the Adaptive Mixture MCL , which adaptively selects updating mode for each particle to tolerate this situation. Equipped with DMOM, Adaptive Mixture MCL can achieve more accurate estimation, faster convergence and better scalability compared with previous methods in both synthetic and real scenes. Even in real environment with long-term changing, Adaptive Mixture MCL is able to localize the robot using DMON trained only on simulated observations from a SLAM map , or even a blueprint map.", "after_revision": "Global localization and kidnapping are two challenging problems in robot localization. The popular method, Monte Carlo Localization (MCL) addresses the problem by iteratively updating a set of particles with a \"sampling-weighting\" loop. Sampling is decisive to the performance of MCL 1]. However, traditional MCL can only sample from a uniform distribution over the state space . Although variants of MCL propose different sampling models, they fail to provide an accurate distribution or generalize across scenes . To better deal with these problems, we present a distribution proposal model, named Deep Samplable Observation Model ( DSOM). DSOM takes a map and a 2D laser scan as inputs and outputs a conditional multimodal probability distribution of the pose, making the samples more focusing on the regions with higher likelihood. With such samples, the convergence is expected to be more effective and efficient. Considering that the learning-based sampling model may fail to capture the true pose sometimes, we furthermore propose the Adaptive Mixture MCL (AdaM MCL), which deploys a trusty mechanism to adaptively select updating mode for each particle to tolerate this situation. Equipped with DSOM, AdaM MCL can achieve more accurate estimation, faster convergence and better scalability compared to previous methods in both synthetic and real scenes. Even in real environments with long-term changing, AdaM MCL is able to localize the robot using DSOM trained only by simulation observations from a SLAM map or a blueprint map.", "edit_actions": [{"type": "R", "before": "sampling uniformly", "after": "iteratively updating a set of particles with a \"sampling-weighting\" loop. Sampling is decisive to the performance of MCL", "start_char_pos": 163, "end_char_pos": 181}, {"type": "A", "before": null, "after": "1", "start_char_pos": 182, "end_char_pos": 182}, {"type": "A", "before": null, "after": ". However, traditional MCL can only sample from a uniform distribution", "start_char_pos": 183, "end_char_pos": 183}, {"type": "R", "before": ", which is unfortunately inefficient when the environment is large", "after": ". Although variants of MCL propose different sampling models, they fail to provide an accurate distribution or generalize across scenes", "start_char_pos": 205, "end_char_pos": 271}, {"type": "R", "before": "the the", "after": "these", "start_char_pos": 294, "end_char_pos": 301}, {"type": "A", "before": null, "after": "distribution", "start_char_pos": 325, "end_char_pos": 325}, {"type": "R", "before": "Multimodal", "after": "Samplable", "start_char_pos": 353, "end_char_pos": 363}, {"type": "R", "before": "DMOM). DMOM", "after": "DSOM). DSOM", "start_char_pos": 384, "end_char_pos": 395}, {"type": "R", "before": "much", "after": "more effective and", "start_char_pos": 638, "end_char_pos": 642}, {"type": "R", "before": "learning based Samplable Observation Model", "after": "the learning-based sampling model", "start_char_pos": 671, "end_char_pos": 713}, {"type": "R", "before": ", which adaptively selects", "after": "(AdaM MCL), which deploys a trusty mechanism to adaptively select", "start_char_pos": 807, "end_char_pos": 833}, {"type": "R", "before": "DMOM, Adaptive Mixture", "after": "DSOM, AdaM", "start_char_pos": 908, "end_char_pos": 930}, {"type": "R", "before": "with", "after": "to", "start_char_pos": 1024, "end_char_pos": 1028}, {"type": "R", "before": "environment", "after": "environments", "start_char_pos": 1094, "end_char_pos": 1105}, {"type": "R", "before": "Adaptive Mixture", "after": "AdaM", "start_char_pos": 1131, "end_char_pos": 1147}, {"type": "R", "before": "DMON trained only on simulated", "after": "DSOM trained only by simulation", "start_char_pos": 1188, "end_char_pos": 1218}, {"type": "R", "before": ", or even", "after": "or", "start_char_pos": 1248, "end_char_pos": 1257}], "sents_char_pos": [0, 86, 273, 584, 653, 893, 1080]}
+{"doc_id": "2009.00673", "revision_depth": "1", "before_revision": "In this manuscript we study the properties of a family of a second order differential equations with damping, its discretizations and their connections with accelerated optimization algorithms for m-strongly convex and L-smooth functions. In particular, using the Linear Matrix Inequality framework developed in Fazlyab et. al. (2018), we derive analytically a (discrete) Lyapunov function for a two-parameter family of Nesterov optimization methods, which allows for a complete characterization of their convergence rate. We then show that in the appropriate limit this family of methods may be seen as a discretization of a family of second order ordinary differential equations , which properties can be also understood by a (continuous) Lyapunov function, which can also be obtained by studying the limiting behaviour of the discrete Lyapunov function . Finally, we show that the majority of typical discretizations of this ODE , such as the Heavy ball method, do not possess suitable discrete Lyapunov functions , and hence fail to reproduce the desired limiting behaviour of this ODE, which in turn implies that their converge rates when seen as optimization methods cannot behave in an \"accerelated\" manner .", "after_revision": "In this manuscript , we study the properties of a family of second-order differential equations with damping, its discretizations and their connections with accelerated optimization algorithms for m-strongly convex and L-smooth functions. In particular, using the Linear Matrix Inequality LMI framework developed by Fazlyab et. al. (2018), we derive analytically a (discrete) Lyapunov function for a two-parameter family of Nesterov optimization methods, which allows for the complete characterization of their convergence rate. In the appropriate limit , this family of methods may be seen as a discretization of a family of second-order ordinary differential equations for which we construct (continuous) Lyapunov functions by means of the LMI framework. The continuous Lyapunov functions may alternatively, be obtained by studying the limiting behaviour of their discrete counterparts . Finally, we show that the majority of typical discretizations of the family of ODEs , such as the Heavy ball method, do not possess Lyapunov functions with properties similar to those of the Lyapunov function constructed here for the Nesterov method .", "edit_actions": [{"type": "A", "before": null, "after": ",", "start_char_pos": 19, "end_char_pos": 19}, {"type": "R", "before": "a second order", "after": "second-order", "start_char_pos": 59, "end_char_pos": 73}, {"type": "R", "before": "framework developed in", "after": "LMI framework developed by", "start_char_pos": 290, "end_char_pos": 312}, {"type": "R", "before": "a", "after": "the", "start_char_pos": 469, "end_char_pos": 470}, {"type": "R", "before": "We then show that in", "after": "In", "start_char_pos": 524, "end_char_pos": 544}, {"type": "A", "before": null, "after": ",", "start_char_pos": 567, "end_char_pos": 567}, {"type": "R", "before": "second order", "after": "second-order", "start_char_pos": 638, "end_char_pos": 650}, {"type": "R", "before": ", which properties can be also understood by a", "after": "for which we construct", "start_char_pos": 683, "end_char_pos": 729}, {"type": "R", "before": "function, which can also", "after": "functions by means of the LMI framework. The continuous Lyapunov functions may alternatively,", "start_char_pos": 752, "end_char_pos": 776}, {"type": "R", "before": "the discrete Lyapunov function", "after": "their discrete counterparts", "start_char_pos": 827, "end_char_pos": 857}, {"type": "R", "before": "this ODE", "after": "the family of ODEs", "start_char_pos": 925, "end_char_pos": 933}, {"type": "R", "before": "suitable discrete Lyapunov functions , and hence fail to reproduce the desired limiting behaviour of this ODE, which in turn implies that their converge rates when seen as optimization methods cannot behave in an \"accerelated\" manner", "after": "Lyapunov functions with properties similar to those of the Lyapunov function constructed here for the Nesterov method", "start_char_pos": 982, "end_char_pos": 1215}], "sents_char_pos": [0, 239, 523, 859]}
+{"doc_id": "2009.00703", "revision_depth": "1", "before_revision": "Evaluating structural uncertainties associated with seismic imaging and target horizons can be of critical importance for decision-making related to oil and gas exploration and production. An important breakthrough for industrial applications has been made with the development of industrial approaches to velocity model building. We propose here an extension of these approaches, using non-linear slope tomography (rather than standard tomographic migration velocity analysis as in previous publications). In addition to the advantages in terms of accuracy and efficiency of the velocity model building (compared to standard tomography) it can be used to assess the quality of standard uncertainty-related assumptions (linearity and Gaussian hypothesis within the Bayesian theory) and estimate volumetric migration positioning uncertainties (a generalization of horizon uncertainties) . We derive and discuss the theoretical concepts underlying this approach and compare our derivations with those of previous publications. A main advantage is that we work directly in the full model space rather than in a preconditioned model space, (1) avoiding biased uncertainty analysis and (2) splitting the analysis into the resolved and unresolved tomography spaces. Another advantage is that , within the Bayesian formalism, we sample an equi-probable contour of the tomography posterior probability density function (pdf) rather than the full pdf, stabilizing the estimation of error bars. These advantages provide robustness to the approach . These concepts are illustrated on two different 3D field datasets . The first one illustrates structural uncertainties on a merge of different seismic surveys in the North Sea. The second one shows the impact of structural uncertainties on gross-rock volume computation .", "after_revision": "Evaluating structural uncertainties associated with seismic imaging and target horizons can be of critical importance for decision-making related to oil and gas exploration and production. An important breakthrough for industrial applications has been made with the development of industrial approaches to velocity model building. We propose an extension of these approaches, sampling an equi-probable contour of the tomography posterior probability density function (pdf) rather than the full pdf, and using non-linear slope tomography (rather than standard tomographic migration velocity analysis as in previous publications). Our approach allows to assess the quality of uncertainty-related assumptions (linearity and Gaussian hypothesis within the Bayesian theory) and estimate volumetric migration positioning uncertainties (a generalization of horizon uncertainties) , in addition to the advantages in terms of efficiency . We derive the theoretical concepts underlying this approach and unify our derivations with those of previous publications. As the method works in the full model space rather than in a preconditioned model space, we split the analysis into the resolved and unresolved tomography spaces. We argue that the resolved space uncertainties are to be used in further steps leading to decision-making and can be related to the output of methods that work in a preconditioned model space. The unresolved space uncertainties represent a qualitative byproduct specific to our method, strongly highlighting the most uncertain gross areas, thus useful for QCs . These concepts are demonstrated on a synthetic data. Complementarily, the industrial viability of the method is illustrated on two different 3D field datasets .", "edit_actions": [{"type": "D", "before": "here", "after": null, "start_char_pos": 342, "end_char_pos": 346}, {"type": "A", "before": null, "after": "sampling an equi-probable contour of the tomography posterior probability density function (pdf) rather than the full pdf, and", "start_char_pos": 381, "end_char_pos": 381}, {"type": "R", "before": "In addition to the advantages in terms of accuracy and efficiency of the velocity model building (compared to standard tomography) it can be used to", "after": "Our approach allows to", "start_char_pos": 508, "end_char_pos": 656}, {"type": "D", "before": "standard", "after": null, "start_char_pos": 679, "end_char_pos": 687}, {"type": "A", "before": null, "after": ", in addition to the advantages in terms of efficiency", "start_char_pos": 887, "end_char_pos": 887}, {"type": "D", "before": "and discuss", "after": null, "start_char_pos": 900, "end_char_pos": 911}, {"type": "R", "before": "compare", "after": "unify", "start_char_pos": 966, "end_char_pos": 973}, {"type": "R", "before": "A main advantage is that we work directly", "after": "As the method works", "start_char_pos": 1027, "end_char_pos": 1068}, {"type": "R", "before": "(1) avoiding biased uncertainty analysis and (2) splitting", "after": "we split", "start_char_pos": 1138, "end_char_pos": 1196}, {"type": "R", "before": "Another advantage is that , within the Bayesian formalism, we sample an equi-probable contour of the tomography posterior probability density function (pdf) rather than the full pdf, stabilizing the estimation of error bars. These advantages provide robustness to", "after": "We argue that", "start_char_pos": 1262, "end_char_pos": 1525}, {"type": "R", "before": "approach", "after": "resolved space uncertainties are to be used in further steps leading to decision-making and can be related to the output of methods that work in a preconditioned model space. The unresolved space uncertainties represent a qualitative byproduct specific to our method, strongly highlighting the most uncertain gross areas, thus useful for QCs", "start_char_pos": 1530, "end_char_pos": 1538}, {"type": "A", "before": null, "after": "demonstrated on a synthetic data. Complementarily, the industrial viability of the method is", "start_char_pos": 1560, "end_char_pos": 1560}, {"type": "D", "before": ". The first one illustrates structural uncertainties on a merge of different seismic surveys in the North Sea. The second one shows the impact of structural uncertainties on gross-rock volume computation", "after": null, "start_char_pos": 1608, "end_char_pos": 1811}], "sents_char_pos": [0, 188, 330, 507, 889, 1026, 1261, 1486, 1540, 1609, 1718]}
+{"doc_id": "2009.02079", "revision_depth": "1", "before_revision": "According to the criticality hypothesis, collective biological systems should operate in a special parameter region, close to so-called critical points, where the collective dynamics undergoes a qualitative change between different dynamical regimes. Critical systems exhibit unique properties, which may benefit collective information processing such as maximal responsiveness to external stimuli. Besides neuronal and gene-regulatory networks, recent empirical data supports that also animal collectives may be examples of URLanized critical systems. However, open questions about URLanization mechanisms in animal groups remain: Evolutionary adaptation towards group-level optima (group-level selection), often implicitly assumed in the criticality hypothesis, is in general not a reasonable mechanism in fission-fusion groups composed of non-related individuals. Furthermore, previous theoretical work relies on non-spatial models, which ignore potentially important spatial URLanization effects. Here, using a generic, spatially-explicit model of schooling prey being attacked by a predator, we show first that schools operating at criticality perform best. However, this is not due to optimal response of the prey to the predator, as suggested by the ``criticality hypothesis'' , but rather due to the spatial structure of the prey school at criticality. Secondly, by investigating individual-level evolution, we show that the critical point is not an evolutionary stable state. On the contrary, strong spatial self-sorting effects increase the selection strength , and make it an evolutionary unstable state. Our results show that in collective behavior spatio-temporal dynamics are important , and that individual-level selection does not in general provide a robust proximate mechanism in support of the ``criticality hypothesis'' in animal groups .", "after_revision": "According to the criticality hypothesis, collective biological systems should operate in a special parameter region, close to so-called critical points, where the collective behavior undergoes a qualitative change between different dynamical regimes. Critical systems exhibit unique properties, which may benefit collective information processing such as maximal responsiveness to external stimuli. Besides neuronal and gene-regulatory networks, recent empirical data suggests that also animal collectives may be examples of URLanized critical systems. However, open questions about URLanization mechanisms in animal groups remain: Evolutionary adaptation towards a group-level optimum (group-level selection), implicitly assumed in the \"criticality hypothesis\", appears in general not reasonable for fission-fusion groups composed of non-related individuals. Furthermore, previous theoretical work relies on non-spatial models, which ignore potentially important URLanization and spatial sorting effects. Using a generic, spatially-explicit model of schooling prey being attacked by a predator, we show first that schools operating at criticality perform best. However, this is not due to optimal response of the prey to the predator, as suggested by the \"criticality hypothesis\" , but rather due to the spatial structure of the prey school at criticality. Secondly, by investigating individual-level evolution, we show that strong spatial self-sorting effects at the critical point lead to strong selection gradients , and make it an evolutionary unstable state. Our results demonstrate the decisive role of spatio-temporal phenomena in collective behavior , and that individual-level selection is in general not a viable mechanism for self-tuning of unrelated animal groups towards criticality .", "edit_actions": [{"type": "R", "before": "dynamics", "after": "behavior", "start_char_pos": 174, "end_char_pos": 182}, {"type": "R", "before": "supports", "after": "suggests", "start_char_pos": 468, "end_char_pos": 476}, {"type": "A", "before": null, "after": "a", "start_char_pos": 664, "end_char_pos": 664}, {"type": "R", "before": "optima", "after": "optimum", "start_char_pos": 677, "end_char_pos": 683}, {"type": "D", "before": "often", "after": null, "start_char_pos": 709, "end_char_pos": 714}, {"type": "R", "before": "criticality hypothesis, is", "after": "\"criticality hypothesis\", appears", "start_char_pos": 741, "end_char_pos": 767}, {"type": "R", "before": "a reasonable mechanism in", "after": "reasonable for", "start_char_pos": 783, "end_char_pos": 808}, {"type": "R", "before": "spatial URLanization effects. Here, using", "after": "URLanization and spatial sorting effects. Using", "start_char_pos": 972, "end_char_pos": 1013}, {"type": "R", "before": "``criticality hypothesis''", "after": "\"criticality hypothesis\"", "start_char_pos": 1258, "end_char_pos": 1284}, {"type": "D", "before": "the critical point is not an evolutionary stable state. On the contrary,", "after": null, "start_char_pos": 1430, "end_char_pos": 1502}, {"type": "R", "before": "increase the selection strength", "after": "at the critical point lead to strong selection gradients", "start_char_pos": 1539, "end_char_pos": 1570}, {"type": "R", "before": "show that", "after": "demonstrate the decisive role of spatio-temporal phenomena", "start_char_pos": 1629, "end_char_pos": 1638}, {"type": "D", "before": "spatio-temporal dynamics are important", "after": null, "start_char_pos": 1662, "end_char_pos": 1700}, {"type": "R", "before": "does not in general provide a robust proximate mechanism in support of the ``criticality hypothesis'' in animal groups", "after": "is in general not a viable mechanism for self-tuning of unrelated animal groups towards criticality", "start_char_pos": 1739, "end_char_pos": 1857}], "sents_char_pos": [0, 250, 398, 552, 867, 1001, 1163, 1361, 1485, 1616]}
+{"doc_id": "2009.02962", "revision_depth": "1", "before_revision": "Background: Laboratory diagnosis of the novel coronavirus (SARS-CoV-2) infection combined with quarantine for contacts of infected individuals affects the spread of SARS-CoV-2 and the levels of related mortality. Moreover, not all cases of SARS-CoV-2 infection in the population are detected (laboratory diagnosed). The aim of this paper is to examine the relation between detectability of SARS-CoV-2 infection (i.e. the percent of detected cases among all cases of SARS-CoV-2 infection in the population) and levels of mortality from COVID-19 for the different regions of the Russian Federation. Methods: Lower case-fatality ratio ( i.e. the ratio between the number of deaths from COVID-19 and the number of diagnosed casesof SARS-COV-2 infection ) corresponds to higher detectability of the SARS-COV-2 infection. We used data from the Russian Federal Service for Surveillance on Consumer Rights Protection and Human Wellbeing (Rospotrebnadzor) on the number of detected cases and the number of deaths from COVID-19 in the different regions of the Russian Federation to examine the correlation between case-fatality ratios and rates of mortality for COVID-19 in different regions of the Russian Federation. Results: The correlation between case-fatality ratios and rates of mortality for COVID-19 in different regions of the Russian Federation on Sep 6 , 2020 is 0.69 (0.56,0.79). Conclusions: Detectability of SARS-CoV-2 infection is one of the factors that affects levels of mortality from COVID-19. Regions of the Russian Federation with relatively low detectability of SARS-CoV-2 infection (e.g. those regions for which case-fatality ratio is below the median value of 0.0118 for the case-fatality ratio in different regions of the Russian Federation on Sep. 6 , 2020 [3]) ought to increase testing for SARS-CoV-2 in order to mitigate the spread of SARS-CoV-2 and diminish the related mortality.", "after_revision": "Background: Laboratory diagnosis of the novel coronavirus (SARS-CoV-2) infection combined with tracing/ quarantine for contacts of infected individuals affects the spread of SARS-CoV-2 and the levels of related mortality. Here, we examine the relation between detectability of SARS-CoV-2 infection (i.e. the proportion of detected COVID-19 cases among all cases of SARS-CoV-2 infection in the population) and levels of mortality from COVID-19 for the 85 regions of the Russian Federation. Methods: Lower case-fatality ratio ( CFR, the proportion of deaths among all detected COVID-19 cases ) corresponds to higher detectability of the SARS-COV-2 infection. We used data from the Russian Federal Service for Surveillance on Consumer Rights Protection and Human Wellbeing (Rospotrebnadzor) on the number of detected cases and the number of deaths from COVID-19 in the different regions of the Russian Federation to examine the correlation between case-fatality ratios and rates of mortality for COVID-19 in the 85 regions of the Russian Federation. Results: The correlation between case-fatality ratios and rates of mortality for COVID-19 per 100,000 on Sep. 17, 2020 in different regions of the Russian Federation is 0.68 (0.55,0.78). The region with both the highest COVID-19 mortality rate per 100 , 000 and the highest CFR (lowest detectability of SARS-CoV-2 infection) is the city of St. Petersburg. Conclusions: Detectability of SARS-CoV-2 infection is one of the factors that affects levels of mortality from COVID-19. Regions of the Russian Federation with relatively low detectability of SARS-CoV-2 infection (e.g. those regions for which case-fatality ratio is below the median value of 1.2\\% for the case-fatality ratio in different regions of the Russian Federation on Sep. 17 , 2020 [3]) ought to increase testing for SARS-CoV-2 in order to mitigate the spread of SARS-CoV-2 and diminish the related mortality.", "edit_actions": [{"type": "A", "before": null, "after": "tracing/", "start_char_pos": 95, "end_char_pos": 95}, {"type": "R", "before": "Moreover, not all cases of SARS-CoV-2 infection in the population are detected (laboratory diagnosed). The aim of this paper is to", "after": "Here, we", "start_char_pos": 214, "end_char_pos": 344}, {"type": "R", "before": "percent of detected", "after": "proportion of detected COVID-19", "start_char_pos": 422, "end_char_pos": 441}, {"type": "R", "before": "different", "after": "85", "start_char_pos": 553, "end_char_pos": 562}, {"type": "R", "before": "i.e. the ratio between the number of deaths from", "after": "CFR, the proportion of deaths among all detected", "start_char_pos": 635, "end_char_pos": 683}, {"type": "R", "before": "and the number of diagnosed casesof SARS-COV-2 infection", "after": "cases", "start_char_pos": 693, "end_char_pos": 749}, {"type": "R", "before": "different", "after": "the 85", "start_char_pos": 1165, "end_char_pos": 1174}, {"type": "A", "before": null, "after": "per 100,000 on Sep. 17, 2020", "start_char_pos": 1300, "end_char_pos": 1300}, {"type": "R", "before": "on Sep 6", "after": "is 0.68 (0.55,0.78). The region with both the highest COVID-19 mortality rate per 100", "start_char_pos": 1348, "end_char_pos": 1356}, {"type": "R", "before": "2020 is 0.69 (0.56,0.79).", "after": "000 and the highest CFR (lowest detectability of SARS-CoV-2 infection) is the city of St. Petersburg.", "start_char_pos": 1359, "end_char_pos": 1384}, {"type": "R", "before": "0.0118", "after": "1.2\\%", "start_char_pos": 1677, "end_char_pos": 1683}, {"type": "R", "before": "6", "after": "17", "start_char_pos": 1767, "end_char_pos": 1768}], "sents_char_pos": [0, 213, 316, 597, 816, 1209, 1384, 1505]}
+{"doc_id": "2009.02962", "revision_depth": "2", "before_revision": "Background : Laboratory diagnosis of the novel coronavirus (SARS-CoV-2) infection combined with tracing/ quarantine for contacts of infected individuals affects the spread of SARS-CoV-2 and the levels of related mortality. Here, we examine the relation between detectability of SARS-CoV-2 infection (i.e. the proportion of detected COVID-19 cases among all cases of SARS-CoV-2 infection in the population ) and levels of mortality from COVID-19 for the 85 regions of the Russian Federation . Methods: Lower case-fatality ratio ( CFR, the proportion of deaths among all detected COVID-19 cases ) corresponds to higher detectability of the SARS-COV-2 infection . We used data from the Russian Federal Service for Surveillance on Consumer Rights Protection and Human Wellbeing (Rospotrebnadzor) on the number of detected cases and the number of deaths from COVID-19 in the different regions of the Russian Federation to examine the correlation between case-fatality ratios and rates of mortality for COVID-19 in the 85 regions of the Russian Federation. Results: The correlation between case-fatality ratios and rates of mortality for COVID-19 per 100,000 on Sep. 17, 2020 in different regions of the Russian Federation is 0.68 ( 0.55 ,0.78). The region with both the highest COVID-19 mortality rate per 100, 000 and the highest CFR (lowest detectability of SARS-CoV-2 infection) is the city of St. Petersburg . Conclusions: Detectability of SARS-CoV-2 infection is one of the factors that affects levels of mortality from COVID-19 . Regions of the Russian Federation with relatively low detectability of SARS-CoV-2 infection (e.g. those regions for which case-fatality ratio is below the median value of 1.2\\% for the case-fatality ratio in different regions of the Russian Federation on Sep. 17 , 2020 [ 3 ]) ought to increase testing for SARS-CoV-2 in order to mitigate the spread of SARS-CoV-2 and diminish the related mortality.", "after_revision": "Relevance : Laboratory diagnosis of the novel coronavirus (SARS-CoV-2) infection combined with quarantine for contacts of infected individuals affects the spread of the SARS-CoV-2 infection and levels of related mortality. Moreover, not all cases of the SARS-CoV-2 infection in the population are detected (laboratory diagnosed). For example, in the city of St. Petersburg, where mortality rate for COVID-19 is the highest in the Russian Federation on Oct. 1, 2020, every death for COVID-19 corresponds to 14.7 detected cases of COVID-19 in the population, while the corresponding number for the whole of Russia is 56.7, suggesting limited detection of mild/moderate cases of COVID-19 in St. Petersburg. Methods: More active testing for SARS-CoV-2 results in lower case-fatality ratio ( i.e. the proportion of detected COVID-19 cases among all cases of SARS-CoV-2 infection in the population) . We used data on COVID-19 cases and deaths to examine the correlation between case-fatality ratios and rates of mortality for COVID-19 in different regions of the Russian Federation. Results: The correlation between case-fatality ratios and rates of mortality for COVID-19 in different regions of the Russian Federation on Oct. 1, 2020 is 0.68 ( 0.54 ,0.78). For several regions of the Russian Federation, particularly the city of St. Petersburg , detectability of SARS-CoV-2 infection is relatively low, while rates of mortality for COVID-19 are relatively high. Conclusions: Regions of the Russian Federation with relatively low detectability of the SARS-CoV-2 infection (e.g. those regions for which the case-fatality ratio is below the median value of 1.2\\% for the case-fatality ratio for COVID-19 in the different regions of the Russian Federation on Oct. 1 , 2020 [ 4 ]) ought to increase testing for the SARS-CoV-2 infection in order to mitigate the spread of the SARS-CoV-2 infection and diminish the related mortality.", "edit_actions": [{"type": "R", "before": "Background", "after": "Relevance", "start_char_pos": 0, "end_char_pos": 10}, {"type": "D", "before": "tracing/", "after": null, "start_char_pos": 96, "end_char_pos": 104}, {"type": "D", "before": "SARS-CoV-2 and", "after": null, "start_char_pos": 175, "end_char_pos": 189}, {"type": "A", "before": null, "after": "SARS-CoV-2 infection and", "start_char_pos": 194, "end_char_pos": 194}, {"type": "R", "before": "Here, we examine the relation between detectability of SARS-CoV-2 infection (i.e. the proportion of detected COVID-19 cases among", "after": "Moreover, not", "start_char_pos": 224, "end_char_pos": 353}, {"type": "A", "before": null, "after": "the", "start_char_pos": 367, "end_char_pos": 367}, {"type": "R", "before": ") and levels of mortality from COVID-19 for", "after": "are detected (laboratory diagnosed). For example, in the city of St. Petersburg, where mortality rate for COVID-19 is the highest in", "start_char_pos": 407, "end_char_pos": 450}, {"type": "D", "before": "85 regions of the", "after": null, "start_char_pos": 455, "end_char_pos": 472}, {"type": "R", "before": ". Methods: Lower", "after": "on Oct. 1, 2020, every death for COVID-19 corresponds to 14.7 detected cases of COVID-19 in the population, while the corresponding number for the whole of Russia is 56.7, suggesting limited detection of mild/moderate cases of COVID-19 in St. Petersburg. Methods: More active testing for SARS-CoV-2 results in lower", "start_char_pos": 492, "end_char_pos": 508}, {"type": "R", "before": "CFR,", "after": "i.e.", "start_char_pos": 531, "end_char_pos": 535}, {"type": "D", "before": "deaths among all", "after": null, "start_char_pos": 554, "end_char_pos": 570}, {"type": "R", "before": ") corresponds to higher detectability of the SARS-COV-2 infection", "after": "among all cases of SARS-CoV-2 infection in the population)", "start_char_pos": 595, "end_char_pos": 660}, {"type": "R", "before": "from the Russian Federal Service for Surveillance on Consumer Rights Protection and Human Wellbeing (Rospotrebnadzor) on the number of detected cases and the number of deaths from COVID-19 in the different regions of the Russian Federation", "after": "on COVID-19 cases and deaths", "start_char_pos": 676, "end_char_pos": 915}, {"type": "R", "before": "the 85", "after": "different", "start_char_pos": 1011, "end_char_pos": 1017}, {"type": "D", "before": "per 100,000 on Sep. 17, 2020", "after": null, "start_char_pos": 1143, "end_char_pos": 1171}, {"type": "A", "before": null, "after": "on Oct. 1, 2020", "start_char_pos": 1219, "end_char_pos": 1219}, {"type": "R", "before": "0.55", "after": "0.54", "start_char_pos": 1230, "end_char_pos": 1234}, {"type": "R", "before": "The region with both the highest COVID-19 mortality rate per 100, 000 and the highest CFR (lowest detectability of SARS-CoV-2 infection) is the", "after": "For several regions of the Russian Federation, particularly the", "start_char_pos": 1243, "end_char_pos": 1386}, {"type": "R", "before": ". Conclusions: Detectability", "after": ", detectability", "start_char_pos": 1410, "end_char_pos": 1438}, {"type": "R", "before": "one of the factors that affects levels of mortality from", "after": "relatively low, while rates of mortality for", "start_char_pos": 1466, "end_char_pos": 1522}, {"type": "R", "before": ".", "after": "are relatively high. Conclusions:", "start_char_pos": 1532, "end_char_pos": 1533}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1605, "end_char_pos": 1605}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1657, "end_char_pos": 1657}, {"type": "R", "before": "in", "after": "for COVID-19 in the", "start_char_pos": 1741, "end_char_pos": 1743}, {"type": "R", "before": "Sep. 17", "after": "Oct. 1", "start_char_pos": 1791, "end_char_pos": 1798}, {"type": "R", "before": "3", "after": "4", "start_char_pos": 1808, "end_char_pos": 1809}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1843, "end_char_pos": 1843}, {"type": "A", "before": null, "after": "infection", "start_char_pos": 1855, "end_char_pos": 1855}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1891, "end_char_pos": 1891}, {"type": "A", "before": null, "after": "infection", "start_char_pos": 1903, "end_char_pos": 1903}], "sents_char_pos": [0, 223, 493, 662, 1052, 1242, 1398, 1424, 1812]}
+{"doc_id": "2009.04800", "revision_depth": "1", "before_revision": "Sparse polynomial chaos expansions ( PCEs ) are an efficient and widely used surrogate modeling method in uncertainty quantification . Among the many contributions aiming at computing an accurate sparse PCE while using as few model evaluations as possible, basis adaptivity is a particularly interesting approach. It consists in starting from an expansion with a small number of polynomial terms, and then parsimoniously adding and removing basisfunctions in an iterative fashion. We describe several state-of-the-art approaches from the recent literature and extensively benchmark them on a large set of computational models representative of a wide range of engineering problems. We investigate the synergies between sparse regression solvers and basis adaptivity schemes, and provide recommendations on which of them are most promising for specific classes of problems. Furthermore, we explore the performance of a novel cross-validation-based solver and basis adaptivity selection scheme , which consistently provides close-to-optimal results .", "after_revision": "Sparse polynomial chaos expansions ( PCE ) are an efficient and widely used surrogate modeling method in uncertainty quantification for engineering problems with computationally expensive models. To make use of the available information in the most efficient way, several approaches for so-called basis-adaptive sparse PCE have been proposed to determine the set of polynomial regressors (\"basis\") for PCE adaptively . We describe three state-of-the-art basis-adaptive approaches from the recent sparse PCE literature and extensively benchmark them in terms of global approximation accuracy on a large set of computational models representative of a wide range of engineering problems. Investigating the synergies between sparse regression solvers and basis adaptivity schemes, we find that virtually all basis-adaptive schemes outperform a static choice of basis. Three sparse solvers, namely Bayesian compressive sensing and two variants of subspace pursuit, perform especially well. Aggregating our results by model dimensionality and experimental design size, we identify combinations of methods that are most promising for the specific problem class. Additionally, we introduce a novel solver and basis adaptivity selection scheme guided by cross-validation error. We demonstrate that this meta-selection procedure provides close-to-optimal results in terms of accuracy, and significantly more robust solutions, while being more general than the case-by-case recommendations obtained by the benchmark .", "edit_actions": [{"type": "R", "before": "PCEs", "after": "PCE", "start_char_pos": 37, "end_char_pos": 41}, {"type": "A", "before": null, "after": "for engineering problems with computationally expensive models. To make use of the available information in the most efficient way, several approaches for so-called basis-adaptive sparse PCE have been proposed to determine the set of polynomial regressors (\"basis\") for PCE adaptively", "start_char_pos": 133, "end_char_pos": 133}, {"type": "D", "before": "Among the many contributions aiming at computing an accurate sparse PCE while using as few model evaluations as possible, basis adaptivity is a particularly interesting approach. It consists in starting from an expansion with a small number of polynomial terms, and then parsimoniously adding and removing basisfunctions in an iterative fashion.", "after": null, "start_char_pos": 136, "end_char_pos": 481}, {"type": "R", "before": "several", "after": "three", "start_char_pos": 494, "end_char_pos": 501}, {"type": "A", "before": null, "after": "basis-adaptive", "start_char_pos": 519, "end_char_pos": 519}, {"type": "A", "before": null, "after": "sparse PCE", "start_char_pos": 547, "end_char_pos": 547}, {"type": "A", "before": null, "after": "in terms of global approximation accuracy", "start_char_pos": 590, "end_char_pos": 590}, {"type": "R", "before": "We investigate", "after": "Investigating", "start_char_pos": 686, "end_char_pos": 700}, {"type": "R", "before": "and provide recommendations on which of them", "after": "we find that virtually all basis-adaptive schemes outperform a static choice of basis. Three sparse solvers, namely Bayesian compressive sensing and two variants of subspace pursuit, perform especially well. Aggregating our results by model dimensionality and experimental design size, we identify combinations of methods that", "start_char_pos": 779, "end_char_pos": 823}, {"type": "R", "before": "specific classes of problems. Furthermore, we explore the performance of a novel cross-validation-based", "after": "the specific problem class. Additionally, we introduce a novel", "start_char_pos": 847, "end_char_pos": 950}, {"type": "R", "before": ", which consistently", "after": "guided by cross-validation error. We demonstrate that this meta-selection procedure", "start_char_pos": 996, "end_char_pos": 1016}, {"type": "A", "before": null, "after": "in terms of accuracy, and significantly more robust solutions, while being more general than the case-by-case recommendations obtained by the benchmark", "start_char_pos": 1051, "end_char_pos": 1051}], "sents_char_pos": [0, 135, 314, 481, 685, 876]}
+{"doc_id": "2009.05359", "revision_depth": "2", "before_revision": "Can the powerful backpropagation of error (backprop) learning algorithm be formulated in a manner suitable for implementation in neural circuitry ? The primary challenge is to ensure that any candidate formulation uses only local information, rather than relying on global (error) signals , as in orthodox backprop. Recently several algorithms for approximating backprop using only local signals have been proposed. However, these algorithms typically impose other requirements which challenge biological plausibility: for example, requiring complex and precise connectivity schemes (predictive coding) , or multiple sequential backwards phases with information being stored across phases (equilibrium-prop) . Here, we propose a novel local algorithm, Activation Relaxation (AR), which is motivated by constructing the backpropagation gradient as the equilibrium point of a dynamical system. Our algorithm converges robustly and exactly to the correct backpropagation gradients, requires only a single type of computational unit, utilises only a single backwards phase, and can perform credit assignment on arbitrary computation graphs. We illustrate these properties by training deep neural networks on visual classification tasks, and we describe simplifications to the algorithm which remove further obstacles to neurobiological implementation (for example, the weight-transport problem, and the use of nonlinear derivatives), while preserving performance.", "after_revision": "The backpropagation of error algorithm (backprop) has been instrumental in the recent success of deep learning. However, a key question remains as to whether backprop can be formulated in a manner suitable for implementation in neural circuitry . The primary challenge is to ensure that any candidate formulation uses only local information, rather than relying on global signals as in standard backprop. Recently several algorithms for approximating backprop using only local signals have been proposed. However, these algorithms typically impose other requirements which challenge biological plausibility: for example, requiring complex and precise connectivity schemes , or multiple sequential backwards phases with information being stored across phases . Here, we propose a novel algorithm, Activation Relaxation (AR), which is motivated by constructing the backpropagation gradient as the equilibrium point of a dynamical system. Our algorithm converges rapidly and robustly to the correct backpropagation gradients, requires only a single type of computational unit, utilises only a single parallel backwards relaxation phase, and can operate on arbitrary computation graphs. We illustrate these properties by training deep neural networks on visual classification tasks, and describe simplifications to the algorithm which remove further obstacles to neurobiological implementation (for example, the weight-transport problem, and the use of nonlinear derivatives), while preserving performance.", "edit_actions": [{"type": "R", "before": "Can the powerful", "after": "The", "start_char_pos": 0, "end_char_pos": 16}, {"type": "A", "before": null, "after": "algorithm", "start_char_pos": 42, "end_char_pos": 42}, {"type": "R", "before": "learning algorithm", "after": "has been instrumental in the recent success of deep learning. However, a key question remains as to whether backprop can", "start_char_pos": 54, "end_char_pos": 72}, {"type": "R", "before": "?", "after": ".", "start_char_pos": 147, "end_char_pos": 148}, {"type": "R", "before": "(error) signals , as in orthodox", "after": "signals as in standard", "start_char_pos": 274, "end_char_pos": 306}, {"type": "D", "before": "(predictive coding)", "after": null, "start_char_pos": 584, "end_char_pos": 603}, {"type": "D", "before": "(equilibrium-prop)", "after": null, "start_char_pos": 690, "end_char_pos": 708}, {"type": "D", "before": "local", "after": null, "start_char_pos": 736, "end_char_pos": 741}, {"type": "R", "before": "robustly and exactly", "after": "rapidly and robustly", "start_char_pos": 917, "end_char_pos": 937}, {"type": "R", "before": "backwards", "after": "parallel backwards relaxation", "start_char_pos": 1054, "end_char_pos": 1063}, {"type": "R", "before": "perform credit assignment", "after": "operate", "start_char_pos": 1079, "end_char_pos": 1104}, {"type": "D", "before": "we", "after": null, "start_char_pos": 1238, "end_char_pos": 1240}], "sents_char_pos": [0, 148, 316, 416, 710, 892, 1137]}
+{"doc_id": "2009.05617", "revision_depth": "1", "before_revision": "Automated Unit Test Case generation has been the focus of extensive literature within the research community . Existing approaches are usually guided by the test coverage criteria, generating synthetic test cases that are often difficult to read or understand for developers . In this paper we propose AthenaTest, an approach that aims at generating unit test cases by learning from real-world , developer-written test cases. Our approach relies on a state-of-the-art sequence-to-sequence transformer model which is able to write useful test cases for a given method under test (i. e., focal method). We also introduce methods2test - the largest publicly available supervised parallel corpus of unit test case methods and corresponding focal methods in Java, which comprises 630k test cases mined from 70k open-source repositories hosted on GitHub. We use this dataset to train a transformer model to translate focal methods into the corresponding test cases. We evaluate the ability of our model in generating test cases using natural language processing as well as code-specific criteria. First, we assess the quality of the translation compared to the target test case, then we analyze properties of the test case such as syntactic correctness and number and variety of testing APIs (e. g., asserts). We execute the test cases, collect test coverage information, and compare them with test cases generated by EvoSuite and GPT-3 . Finally, we survey professional developers on their preference in terms of readability, understandability, and testing effectiveness of the generated test cases .", "after_revision": "Automated unit test case generation tools facilitate test-driven development and support developers by suggesting tests intended to identify flaws in their code . Existing approaches are usually guided by the test coverage criteria, generating synthetic test cases that are often difficult for developers to read or understand . In this paper we propose AthenaTest, an approach that aims to generate unit test cases by learning from real-world focal methods and developer-written testcases. We formulate unit test case generation as a sequence-to-sequence learning task, adopting a two-step training procedure consisting of denoising pretraining on a large unsupervised Java corpus, and supervised finetuning for a downstream translation task of generating unit tests. We investigate the impact of natural language and source code pretraining, as well as the focal context information surrounding the focal method. Both techniques provide improvements in terms of validation loss, with pretraining yielding 25\\% relative improvement and focal context providing additional 11.1\\% improvement. We also introduce Methods2Test, the largest publicly available supervised parallel corpus of unit test case methods and corresponding focal methods in Java, which comprises 780K test cases mined from 91K open-source repositories from GitHub. We evaluate AthenaTest on five defects4j projects, generating 25K passing test cases covering 43.7\\% of the focal methods with only 30 attempts. We execute the test cases, collect test coverage information, and compare them with test cases generated by EvoSuite and GPT-3 , finding that our approach outperforms GPT-3 and has comparable coverage w.r.t. EvoSuite. Finally, we survey professional developers on their preference in terms of readability, understandability, and testing effectiveness of the generated tests, showing overwhelmingly preference towards AthenaTest .", "edit_actions": [{"type": "R", "before": "Unit Test Case generation has been the focus of extensive literature within the research community", "after": "unit test case generation tools facilitate test-driven development and support developers by suggesting tests intended to identify flaws in their code", "start_char_pos": 10, "end_char_pos": 108}, {"type": "A", "before": null, "after": "for developers", "start_char_pos": 238, "end_char_pos": 238}, {"type": "D", "before": "for developers", "after": null, "start_char_pos": 261, "end_char_pos": 275}, {"type": "R", "before": "at generating", "after": "to generate", "start_char_pos": 337, "end_char_pos": 350}, {"type": "R", "before": ",", "after": "focal methods and", "start_char_pos": 395, "end_char_pos": 396}, {"type": "R", "before": "test cases. Our approach relies on a state-of-the-art", "after": "testcases. We formulate unit test case generation as a", "start_char_pos": 415, "end_char_pos": 468}, {"type": "R", "before": "transformer model which is able to write useful test cases for a given method under test (i. e., focal method).", "after": "learning task, adopting a two-step training procedure consisting of denoising pretraining on a large unsupervised Java corpus, and supervised finetuning for a downstream translation task of generating unit tests. We investigate the impact of natural language and source code pretraining, as well as the focal context information surrounding the focal method. Both techniques provide improvements in terms of validation loss, with pretraining yielding 25\\% relative improvement and focal context providing additional 11.1\\% improvement.", "start_char_pos": 490, "end_char_pos": 601}, {"type": "R", "before": "methods2test -", "after": "Methods2Test,", "start_char_pos": 620, "end_char_pos": 634}, {"type": "R", "before": "630k", "after": "780K", "start_char_pos": 776, "end_char_pos": 780}, {"type": "R", "before": "70k", "after": "91K", "start_char_pos": 803, "end_char_pos": 806}, {"type": "R", "before": "hosted on", "after": "from", "start_char_pos": 832, "end_char_pos": 841}, {"type": "R", "before": "use this dataset to train a transformer model to translate focal methods into the corresponding test cases. We evaluate the ability of our model in generating test cases using natural language processing as well as code-specific criteria. First, we assess the quality of the translation compared to the target test case, then we analyze properties of the test case such as syntactic correctness and number and variety of testing APIs (e. g., asserts).", "after": "evaluate AthenaTest on five defects4j projects, generating 25K passing test cases covering 43.7\\% of the focal methods with only 30 attempts.", "start_char_pos": 853, "end_char_pos": 1304}, {"type": "R", "before": ".", "after": ", finding that our approach outperforms GPT-3 and has comparable coverage w.r.t. EvoSuite.", "start_char_pos": 1432, "end_char_pos": 1433}, {"type": "R", "before": "test cases", "after": "tests, showing overwhelmingly preference towards AthenaTest", "start_char_pos": 1584, "end_char_pos": 1594}], "sents_char_pos": [0, 110, 277, 426, 601, 849, 960, 1091, 1304]}
+{"doc_id": "2009.05823", "revision_depth": "2", "before_revision": "The past few years have seen a surge of work on fairness in social choice literature. A major portion of this work has focused on allocation settings where items must be allocated fairly to agents with diverse preferences. In comparison, fairness in two-sided settings where agents have to be matched to other agents, with preferences on both sides, has received much less attention. In this paper , we explore the problem of finding a stable many-to-one matching while satisfying fairness among the agents , having cardinal utilities. In particular, we focus on leximin optimal fairness and seek leximin optimal many-to-one stable matchings. In the special case of ranked utilities where all agents on each side have the same rankings over the agents on the other side (but not necessarily the same utilities) , we provide a characterisation for the space of stable matchings. This leads to a novel algorithm, called FaSt, that finds the leximin optimal stable matching under ranked isometric utilities (wherethe utilities from matching are the same across an edge ). The running time of FaSt is linear in the number of edges. Additionally, we provide an efficient algorithm, called FaSt-Gen, that finds the leximin optimal stable matching for ranked but otherwise unconstrained utilities . The running time of FaSt-Gen is quadratic in the number of edges. We then establish that, in the absence of rankings, finding a leximin optimal stable matching is NP-Hard, even under isometric utilities . In fact, when additivity is the only assumption on the utilities , we show that, unless P=NP, no polynomial time approximation is possible.", "after_revision": "The past few years have seen a surge of work on fairness in social choice literature. This paper initiates the study of finding a stable many-to-one matching , under cardinal valuations, while satisfying fairness among the agents on either side. Specifically, motivated by several real-world settings, we focus on leximin optimal fairness and seek leximin optimality over many-to-one stable matchings. We first consider the special case of ranked valuations where all agents on each side have the same preference orders or rankings over the agents on the other side (but not necessarily the same valuations). For this special case , we provide a complete characterisation of the space of stable matchings. This leads to FaSt, a novel and efficient algorithm to compute a leximin optimal stable matching under ranked isometric valuations (where, for each pair of agents, the valuation of one agent for the other is the same ). The running time of FaSt is linear in the number of edges. Building upon FaSt, we present an efficient algorithm, FaSt-Gen, that finds the leximin optimal stable matching for ranked but otherwise unconstrained valuations . The running time of FaSt-Gen is quadratic in the number of edges. We next establish that, in the absence of rankings, finding a leximin optimal stable matching is NP-Hard, even under isometric valuations . In fact, when additivity and non-negativity are the only assumptions on the valuations , we show that, unless P=NP, no efficient polynomial factor approximation is possible. When additivity is relaxed to submodularity, we find that not even an exponential approximation is possible.", "edit_actions": [{"type": "R", "before": "A major portion of this work has focused on allocation settings where items must be allocated fairly to agents with diverse preferences. In comparison, fairness in two-sided settings where agents have to be matched to other agents, with preferences on both sides, has received much less attention. In this paper , we explore the problem", "after": "This paper initiates the study", "start_char_pos": 86, "end_char_pos": 422}, {"type": "A", "before": null, "after": ", under cardinal valuations,", "start_char_pos": 464, "end_char_pos": 464}, {"type": "R", "before": ", having cardinal utilities. In particular,", "after": "on either side. Specifically, motivated by several real-world settings,", "start_char_pos": 508, "end_char_pos": 551}, {"type": "R", "before": "optimal", "after": "optimality over", "start_char_pos": 606, "end_char_pos": 613}, {"type": "R", "before": "In", "after": "We first consider", "start_char_pos": 644, "end_char_pos": 646}, {"type": "R", "before": "utilities", "after": "valuations", "start_char_pos": 674, "end_char_pos": 683}, {"type": "A", "before": null, "after": "preference orders or", "start_char_pos": 728, "end_char_pos": 728}, {"type": "R", "before": "utilities)", "after": "valuations). For this special case", "start_char_pos": 802, "end_char_pos": 812}, {"type": "R", "before": "characterisation for", "after": "complete characterisation of", "start_char_pos": 828, "end_char_pos": 848}, {"type": "R", "before": "a novel algorithm, called FaSt, that finds the", "after": "FaSt, a novel and efficient algorithm to compute a", "start_char_pos": 894, "end_char_pos": 940}, {"type": "R", "before": "utilities (wherethe utilities from matching are the same across an edge", "after": "valuations (where, for each pair of agents, the valuation of one agent for the other is the same", "start_char_pos": 996, "end_char_pos": 1067}, {"type": "R", "before": "Additionally, we provide", "after": "Building upon FaSt, we present", "start_char_pos": 1130, "end_char_pos": 1154}, {"type": "D", "before": "called", "after": null, "start_char_pos": 1179, "end_char_pos": 1185}, {"type": "R", "before": "utilities", "after": "valuations", "start_char_pos": 1282, "end_char_pos": 1291}, {"type": "R", "before": "then", "after": "next", "start_char_pos": 1363, "end_char_pos": 1367}, {"type": "R", "before": "utilities", "after": "valuations", "start_char_pos": 1487, "end_char_pos": 1496}, {"type": "R", "before": "is the only assumption on the utilities", "after": "and non-negativity are the only assumptions on the valuations", "start_char_pos": 1524, "end_char_pos": 1563}, {"type": "R", "before": "polynomial time", "after": "efficient polynomial factor approximation is possible. When additivity is relaxed to submodularity, we find that not even an exponential", "start_char_pos": 1596, "end_char_pos": 1611}], "sents_char_pos": [0, 85, 222, 383, 536, 643, 879, 1070, 1129, 1293, 1359, 1498]}
+{"doc_id": "2009.06778", "revision_depth": "1", "before_revision": "We study the problem of finding the k most similar trajectories in a graph to a given query trajectory. Our work was inspired by the work of Grossi et al. [6] that considered trajectories as walks in a graph in which each visited vertex is accompanied by a time-interval. Grossi et al. define a similarity function which is able to capture both temporal and spatial aspects. We modify this similarity function in order to derive a spatio-temporal distance function for which we can show that a specific type of triangle inequality is satisfied. \\% This distance function builds the basis for our index structure which is able to quickly answer queries for the top-k most similar trajectories. Our evaluation on real-world and synthetic data sets shows that our new approaches outperform the baselines with respect to indexing time , query time , and quality of results.", "after_revision": "We study the problem of finding the k most similar trajectories to a given query trajectory. Our work is inspired by the work of Grossi et al. [6] that considers trajectories as walks in a graph . Each visited vertex is accompanied by a time-interval. Grossi et al. define a similarity function that captures temporal and spatial aspects. We improve this similarity function to derive a new spatio-temporal distance function for which we can show that a specific type of triangle inequality is satisfied. This distance function is the basis for our index structures, which can be constructed efficiently, need only linear memory, and can quickly answer queries for the top-k most similar trajectories. Our evaluation on real-world and synthetic data sets shows that our algorithms outperform the baselines with respect to indexing time by several orders of magnitude while achieving similar or better query time and quality of results.", "edit_actions": [{"type": "D", "before": "in a graph", "after": null, "start_char_pos": 64, "end_char_pos": 74}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 113, "end_char_pos": 116}, {"type": "R", "before": "considered", "after": "considers", "start_char_pos": 164, "end_char_pos": 174}, {"type": "R", "before": "in which each", "after": ". Each", "start_char_pos": 208, "end_char_pos": 221}, {"type": "R", "before": "which is able to capture both", "after": "that captures", "start_char_pos": 315, "end_char_pos": 344}, {"type": "R", "before": "modify", "after": "improve", "start_char_pos": 378, "end_char_pos": 384}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 410, "end_char_pos": 418}, {"type": "A", "before": null, "after": "new", "start_char_pos": 431, "end_char_pos": 431}, {"type": "D", "before": "\\%", "after": null, "start_char_pos": 546, "end_char_pos": 548}, {"type": "R", "before": "builds", "after": "is", "start_char_pos": 572, "end_char_pos": 578}, {"type": "R", "before": "structure which is able to", "after": "structures, which can be constructed efficiently, need only linear memory, and can", "start_char_pos": 603, "end_char_pos": 629}, {"type": "R", "before": "new approaches", "after": "algorithms", "start_char_pos": 762, "end_char_pos": 776}, {"type": "R", "before": ", query time ,", "after": "by several orders of magnitude while achieving similar or better query time", "start_char_pos": 832, "end_char_pos": 846}], "sents_char_pos": [0, 103, 154, 271, 374, 545, 693]}
+{"doc_id": "2009.07740", "revision_depth": "1", "before_revision": "In recent years, the use of deep learning in language models , text auto-completion, and text generation has made tremendous progress and gained much attention from the research community. Some products and research projects claim that they can generate text that can be interpreted as human-writing, enabling new possibilities in many application areas. Among the different areas related to language processing, one of the most notable in applying this type of modeling is the processing of programming languages. For years, the Machine Learning community has been researching in this Big Code area, pursuing goals like applying different approaches to auto-complete generate, fix, or evaluate code programmed by humans. One of the approaches followed in recent years to pursue these goals is the use of Deep-Learning-enabled language models. Considering the increasing popularity of that approach, we detected a lack of empirical papers that compare different methods and deep learning architectures to create and use language models based on programming code. In this paper , we compare different neural network (NN) architectures like AWD-LSTMs, AWD-QRNNs, and Transformer , while using transfer learning , and different tokenizations to see how they behave in building language models using a Python dataset for code generation and filling mask tasks. Considering the results, we discuss the different strengths and weaknesses of each approach and technique and what lacks do we find to evaluate the language models or apply them in a real programming context while including humans-in-the-loop .", "after_revision": "In recent years, the use of deep learning in language models gained much attention . Some research projects claim that they can generate text that can be interpreted as human-writing, enabling new possibilities in many application areas. Among the different areas related to language processing, one of the most notable in applying this type of modeling is programming languages. For years, the Machine Learning community has been researching this software engineering area, pursuing goals like applying different approaches to auto-complete , generate, fix, or evaluate code programmed by humans. Considering the increasing popularity of the Deep-Learning-enabled 8 language models approach, we detected a lack of empirical papers that compare different deep learning architectures to create and use language models based on programming code. This paper compares different neural network architectures like AWD-LSTMs, AWD-QRNNs, and Transformer while using transfer learning and different tokenizations to see how they behave in building language models using a Python dataset for code generation and filling mask tasks. Considering the results, we discuss each approach's different strengths and weaknesses and what gaps we find to evaluate the language models or apply them in a real programming context .", "edit_actions": [{"type": "D", "before": ", text auto-completion, and text generation has made tremendous progress and", "after": null, "start_char_pos": 61, "end_char_pos": 137}, {"type": "R", "before": "from the research community. Some products and", "after": ". Some", "start_char_pos": 160, "end_char_pos": 206}, {"type": "D", "before": "the processing of", "after": null, "start_char_pos": 474, "end_char_pos": 491}, {"type": "R", "before": "in this Big Code", "after": "this software engineering", "start_char_pos": 578, "end_char_pos": 594}, {"type": "A", "before": null, "after": ",", "start_char_pos": 668, "end_char_pos": 668}, {"type": "D", "before": "One of the approaches followed in recent years to pursue these goals is the use of Deep-Learning-enabled language models.", "after": null, "start_char_pos": 723, "end_char_pos": 844}, {"type": "R", "before": "that", "after": "the Deep-Learning-enabled 8 language models", "start_char_pos": 886, "end_char_pos": 890}, {"type": "D", "before": "methods and", "after": null, "start_char_pos": 963, "end_char_pos": 974}, {"type": "R", "before": "In this paper , we compare", "after": "This paper compares", "start_char_pos": 1064, "end_char_pos": 1090}, {"type": "D", "before": "(NN)", "after": null, "start_char_pos": 1116, "end_char_pos": 1120}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1178, "end_char_pos": 1179}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1210, "end_char_pos": 1211}, {"type": "R", "before": "the", "after": "each approach's", "start_char_pos": 1394, "end_char_pos": 1397}, {"type": "R", "before": "of each approach and technique and what lacks do", "after": "and what gaps", "start_char_pos": 1433, "end_char_pos": 1481}, {"type": "D", "before": "while including humans-in-the-loop", "after": null, "start_char_pos": 1566, "end_char_pos": 1600}], "sents_char_pos": [0, 188, 354, 514, 722, 844, 1063, 1357]}
+{"doc_id": "2009.08228", "revision_depth": "1", "before_revision": "We consider the onlineBipartite Caching problem where n users are connected to m caches in the form of a bipartite network. Each of the m caches has a file storage capacity of C. There is a library consisting of N >C distinct files. Each user can request any one of the files from the library at each time slot. We allow the file request sequences to be chosen in an adversarial fashion . A user's request at a time slot is satisfied if the requested file is already hosted on at least one of the caches connected to the user at that time slot. Our objective is to design an efficient online caching policy with minimal regret. In this paper, we proposeLeadCache,\\texttt{ an online caching policy based on the \\textsf{Follow the Perturbed Leader (FTPL) paradigm. We show that \\textsf{LeadCache is regret optimal up to a multiplicative factor of \\tilde{O}(n^{ 0.375 }) . As a byproduct of our analysis, we design a new linear-time deterministic Pipage rounding procedure for the LP relaxation of a well-known NP-hard combinatorial optimization problem in this area. Our new rounding algorithmsubstantially improves upon the currently best-known complexity for this problem. Moreover , we show the surprising result that under mild Strong-Law-type assumptions on the file request sequence, the rate of file fetches to the caches approaches to zero under the\\textsf{LeadCache policy. Finally\\texttt{ , we derive a tight universal regret lower bound for the\\textsf{Bipartite Caching problem, which critically makes use of results from graph coloring theory and certifies the announced approximation ratio .", "after_revision": "We consider a set-valued online prediction problem in the context of network caching. Assume that users are connected to a number of caches via a bipartite network. At any time slot, each user requests some file chosen from a large catalog . A user's request is met if the requested file is cached in at least one of the caches connected to the user . The objective is to predict and optimally store the files on the caches to maximize the total number of cache hits. We propose\\texttt{LeadCache - an online caching policy based on the \\textsf{ Follow-the-Perturbed-Leader paradigm. We show that \\textsf{ the policy is regret-optimal up to a factor of \\tilde{O}(n^{ 3/8 }) , where n is the number of users. We implement the policy by designing a new linear-time Pipage rounding algorithm. With an additional Strong-Law-type assumption , we show that the total number of file fetches \\textsf{ under\\texttt{LeadCache remains almost surely finite. Additionally , we derive a tight regret lower bound \\textsf{ using results from graph coloring . Our conclusion is that the proposed learning-based caching policy decisively outperforms the classical policies both theoretically and empirically .", "edit_actions": [{"type": "D", "before": "the online", "after": null, "start_char_pos": 12, "end_char_pos": 22}, {"type": "D", "before": "Bipartite Caching", "after": null, "start_char_pos": 22, "end_char_pos": 39}, {"type": "R", "before": "problem where n", "after": "a set-valued online prediction problem in the context of network caching. Assume that", "start_char_pos": 40, "end_char_pos": 55}, {"type": "R", "before": "m caches in the form of", "after": "a number of caches via", "start_char_pos": 79, "end_char_pos": 102}, {"type": "R", "before": "Each of the m caches has a file storage capacity of C. There is a library consisting of N >C distinct files. Each user can request any one of the files from the library at each time slot. We allow the file request sequences to be chosen in an adversarial fashion", "after": "At any time slot, each user requests some file chosen from a large catalog", "start_char_pos": 124, "end_char_pos": 386}, {"type": "R", "before": "at a time slot is satisfied", "after": "is met", "start_char_pos": 406, "end_char_pos": 433}, {"type": "R", "before": "already hosted on", "after": "cached in", "start_char_pos": 459, "end_char_pos": 476}, {"type": "R", "before": "at that time slot. Our", "after": ". The", "start_char_pos": 526, "end_char_pos": 548}, {"type": "D", "before": "design an efficient online caching policy with minimal regret. In this paper, we propose", "after": null, "start_char_pos": 565, "end_char_pos": 653}, {"type": "R", "before": "LeadCache,", "after": "predict and optimally store the files on the caches to maximize the total number of cache hits. We propose", "start_char_pos": 653, "end_char_pos": 663}, {"type": "A", "before": null, "after": "LeadCache", "start_char_pos": 671, "end_char_pos": 671}, {"type": "A", "before": null, "after": "-", "start_char_pos": 672, "end_char_pos": 672}, {"type": "D", "before": "Follow the Perturbed Leader", "after": null, "start_char_pos": 719, "end_char_pos": 746}, {"type": "R", "before": "(FTPL)", "after": "Follow-the-Perturbed-Leader", "start_char_pos": 747, "end_char_pos": 753}, {"type": "D", "before": "LeadCache", "after": null, "start_char_pos": 785, "end_char_pos": 794}, {"type": "R", "before": "is regret optimal", "after": "the policy is regret-optimal", "start_char_pos": 795, "end_char_pos": 812}, {"type": "D", "before": "multiplicative", "after": null, "start_char_pos": 821, "end_char_pos": 835}, {"type": "R", "before": "0.375", "after": "3/8", "start_char_pos": 860, "end_char_pos": 865}, {"type": "R", "before": ". As a byproduct of our analysis, we design a", "after": ", where n is the number of users. We implement the policy by designing a", "start_char_pos": 869, "end_char_pos": 914}, {"type": "R", "before": "deterministic Pipage rounding procedure for the LP relaxation of a well-known NP-hard combinatorial optimization problem in this area. Our new rounding algorithmsubstantially improves upon the currently best-known complexity for this problem. Moreover", "after": "Pipage rounding algorithm. With an additional Strong-Law-type assumption", "start_char_pos": 931, "end_char_pos": 1182}, {"type": "R", "before": "the surprising result that under mild Strong-Law-type assumptions on the file request sequence, the rate", "after": "that the total number", "start_char_pos": 1193, "end_char_pos": 1297}, {"type": "D", "before": "to the caches approaches to zero under the", "after": null, "start_char_pos": 1314, "end_char_pos": 1356}, {"type": "D", "before": "LeadCache", "after": null, "start_char_pos": 1364, "end_char_pos": 1373}, {"type": "R", "before": "policy. Finally", "after": "under", "start_char_pos": 1374, "end_char_pos": 1389}, {"type": "A", "before": null, "after": "LeadCache", "start_char_pos": 1397, "end_char_pos": 1397}, {"type": "A", "before": null, "after": "remains almost surely finite. Additionally", "start_char_pos": 1398, "end_char_pos": 1398}, {"type": "D", "before": "universal", "after": null, "start_char_pos": 1419, "end_char_pos": 1428}, {"type": "D", "before": "for the", "after": null, "start_char_pos": 1448, "end_char_pos": 1455}, {"type": "D", "before": "Bipartite Caching", "after": null, "start_char_pos": 1463, "end_char_pos": 1480}, {"type": "R", "before": "problem, which critically makes use of", "after": "using", "start_char_pos": 1481, "end_char_pos": 1519}, {"type": "R", "before": "theory and certifies the announced approximation ratio", "after": ". Our conclusion is that the proposed learning-based caching policy decisively outperforms the classical policies both theoretically and empirically", "start_char_pos": 1548, "end_char_pos": 1602}], "sents_char_pos": [0, 123, 178, 232, 311, 388, 544, 627, 763, 1065, 1173, 1381]}
+{"doc_id": "2009.08416", "revision_depth": "2", "before_revision": "Given a weighted undirected graph G=(V,E,w), a hopset H of hopbound \\beta and stretch (1+\\epsilon) is a set of edges such that for any pair of nodes u, v \\in V, there is a path in G \\cup H of at most \\beta hops, whose length is within a (1+\\epsilon) factor from the distance between u and v in G. We provide a decremental algorithm for maintaining hopsets with a polylogarithmic hopbound , with a total update time that matches the best known static algorithm up to polylogarithmic factors. Previously, the best known decremental hopset algorithm had a hopbound of 2^{\\tilde{O(\\log^{3/4} n)}[HKN, FOCS'14]. Our decremental hopset algorithm allows us to obtain the following improved decremental algorithms for maintaining shortest paths. -(1+\\epsilon) -approximate single source shortest paths in amortized update time } of 2^{ (\\sqrt{\\log n } . This improves super-polynomially over the best known amortized update time of 2^{\\tilde{O(\\log^{3/4} n)} by } [ HKN, FOCS'14 ]. - ( 1+\\epsilon)-approximate shortest paths from a set of s sources in (s) amortized update time, assuming that s= n^{\\Omega(1), and |E|= n^{1+\\Omega(1)}. In this regime, we give the first decremental algorithm, whose running time matches, up to polylogarithmic factors, the best known static algorithm. -(} 2k-1)(1+\\epsilon)-approximate all-pairs shortest paths (for any constant k \\geq 2), in \\tilde{O}(n^{1/k}) amortized update time and O(k) query time. This improves over the best-known amortized update time of%DIFDELCMD < \\tilde{O}%%% (n^{1/k)\\cdot(1/\\epsilon)^{O(\\sqrt{\\log n})} } [Chechik, FOCS'18] . Moreover, we reduce the query time from O(\\log \\log(nW)) to a constant O(k), and hence eliminate the dependence on nand the aspect ratio W\\cdot(\\frac{1}{\\epsilon})^{\\tilde{O}(\\sqrt{\\log n})}. For sparse graphs our construction nearly matches the best known static running time/ query time tradeoff} .", "after_revision": "Given a weighted undirected graph G=(V,E,w), a hopset H of hopbound \\beta and stretch (1+\\epsilon) is a set of edges such that for any pair of nodes u, v \\in V, there is a path in G \\cup H of at most \\beta hops, whose length is within a (1+\\epsilon) factor from the distance between u and v in G. We show the first efficient decremental algorithm for maintaining hopsets with a polylogarithmic hopbound . The update time of our algorithm matches the best known static algorithm up to polylogarithmic factors. (\\log^{3/4} n)}[HKN, FOCS'14]. Our decremental hopset algorithm allows us to obtain the following improved decremental algorithms for maintaining shortest paths. -(1+\\epsilon) -approximate single source shortest paths in amortized update time } All the previous decremental hopset constructions had a superpolylogarithmic (but subpolynomial) hopbound of 2^{ \\log^{\\Omega(1) } (\\log^{3/4} n)} by } [ Bernstein, FOCS'09; HKN, FOCS'14 ; Chechik, FOCS'18 ]. By applying our decremental hopset construction, we get improved or near optimal bounds for several distance problems. Most importantly, we show how to decrementally maintain ( , and |E|= n^{1+\\Omega(1)}. In this regime, we give the first decremental algorithm, whose running time matches, up to polylogarithmic factors, the best known static algorithm. -(} 2k-1)(1+\\epsilon)-approximate all-pairs shortest paths (for any constant k \\geq 2), in \\tilde{O}(n^{1/k}) amortized update time and O(k) query time. This %DIFDELCMD < \\tilde{O}%%% )\\cdot(1/\\epsilon)^{O(\\sqrt{\\log n})} } significantly improves (by a polynomial factor) over the update-time of the best previously known decremental algorithm in the constant query time regime. Moreover, it improves over the result of [Chechik, FOCS'18] that has a query time of O(\\log \\log(nW)) , where W is the aspect ratio, and the amortized update time is n^{1/k\\cdot(\\frac{1}{\\epsilon})^{\\tilde{O}(\\sqrt{\\log n})}. For sparse graphs our construction nearly matches the best known static running time/ query time tradeoff} .", "edit_actions": [{"type": "R", "before": "provide a", "after": "show the first efficient", "start_char_pos": 300, "end_char_pos": 309}, {"type": "R", "before": ", with a total update time that", "after": ". The update time of our algorithm", "start_char_pos": 388, "end_char_pos": 419}, {"type": "D", "before": "Previously, the best known decremental hopset algorithm had a hopbound of 2^{\\tilde{O", "after": null, "start_char_pos": 491, "end_char_pos": 576}, {"type": "A", "before": null, "after": "All the previous decremental hopset constructions had a superpolylogarithmic (but subpolynomial) hopbound", "start_char_pos": 821, "end_char_pos": 821}, {"type": "R", "before": "(\\sqrt{\\log n", "after": "\\log^{\\Omega(1)", "start_char_pos": 829, "end_char_pos": 842}, {"type": "D", "before": ". This improves super-polynomially over the best known amortized update time of 2^{\\tilde{O", "after": null, "start_char_pos": 845, "end_char_pos": 936}, {"type": "A", "before": null, "after": "Bernstein, FOCS'09;", "start_char_pos": 959, "end_char_pos": 959}, {"type": "A", "before": null, "after": "; Chechik, FOCS'18", "start_char_pos": 973, "end_char_pos": 973}, {"type": "R", "before": "-", "after": "By applying our decremental hopset construction, we get improved or near optimal bounds for several distance problems. Most importantly, we show how to decrementally maintain", "start_char_pos": 977, "end_char_pos": 978}, {"type": "D", "before": "1+\\epsilon)-approximate shortest paths from a set of s sources in", "after": null, "start_char_pos": 981, "end_char_pos": 1046}, {"type": "D", "before": "(s) amortized update time, assuming that s= n^{\\Omega(1)", "after": null, "start_char_pos": 1047, "end_char_pos": 1103}, {"type": "D", "before": "improves over the best-known amortized update time of", "after": null, "start_char_pos": 1438, "end_char_pos": 1491}, {"type": "D", "before": "(n^{1/k", "after": null, "start_char_pos": 1517, "end_char_pos": 1524}, {"type": "A", "before": null, "after": "significantly improves (by a polynomial factor) over the update-time of the best previously known decremental algorithm in the constant query time regime. Moreover, it improves over the result of", "start_char_pos": 1564, "end_char_pos": 1564}, {"type": "R", "before": ". Moreover, we reduce the query time from", "after": "that has a query time of", "start_char_pos": 1584, "end_char_pos": 1625}, {"type": "R", "before": "to a constant O(k), and hence eliminate the dependence on nand the aspect ratio W", "after": ", where W is the aspect ratio, and the amortized update time is n^{1/k", "start_char_pos": 1643, "end_char_pos": 1724}], "sents_char_pos": [0, 490, 606, 976, 1130, 1432, 1777]}
+{"doc_id": "2009.09112", "revision_depth": "1", "before_revision": "In recent years, several online platforms have seen a rapid increase in the number of review systems that request users to provide aspect-level feedback. Multi-Aspect Rating Prediction (MARP ), where the goal is to predict the ratings from a review at an individual aspect level, has become a challenging and an imminent problem. To tackle this challenge, we propose a deliberate self-attention deep neural network model, named as FEDAR, for the MARP problem, which can achieve competitive performance while also being able to interpret the predictions made. As opposed to the previous studies, which make use of hand-crafted keywords to determine aspects in sentiment predictions, our model does not suffer from human bias issues since aspect keywords are automatically detected through a self-attention mechanism. FEDAR is equipped with a highway word embedding layer to transfer knowledge from pre-trained word embeddings, an RNN encoder layer with output features enriched by pooling and factorization techniques, and a deliberate self-attention layer. In addition, we also propose an Attention-driven Keywords Ranking (AKR) method, which can automatically extract aspect-level sentiment-related keywords from the review corpus based on the attention weights. Since crowdsourcing annotation can be an alternate way to recover missing ratings of reviews, we propose a LEcture-AuDience (LEAD) strategy to estimate model uncertainty in the context of multi-task learning, so that valuable human resources can focus on the most uncertain predictions. Our extensive set of experiments on different DMSC datasets demonstrate the superiority of the proposed FEDAR and LEAD models. Visualization of aspect-level sentiment keywords demonstrate the interpretability of our model and effectiveness of our AKR method.", "after_revision": "In recent years, several online platforms have seen a rapid increase in the number of review systems that request users to provide aspect-level feedback. Document-level Multi-aspect Sentiment Classification (DMSC ), where the goal is to predict the ratings /sentiment from a review at an individual aspect level, has become a challenging and imminent problem. To tackle this challenge, we propose a deliberate self-attention-based deep neural network model, namely FEDAR, for the DMSC problem, which can achieve competitive performance while also being able to interpret the predictions made. FEDAR is equipped with a highway word embedding layer to transfer knowledge from pre-trained word embeddings, an RNN encoder layer with output features enriched by pooling and factorization techniques, and a deliberate self-attention layer. In addition, we also propose an Attention-driven Keywords Ranking (AKR) method, which can automatically discover aspect keywords and aspect-level opinion keywords from the review corpus based on the attention weights. These keywords are significant for rating predictions by FEDAR. Since crowdsourcing annotation can be an alternate way to recover missing ratings of reviews, we propose a LEcture-AuDience (LEAD) strategy to estimate model uncertainty in the context of multi-task learning, so that valuable human resources can focus on the most uncertain predictions. Our extensive set of experiments on five different open-domain DMSC datasets demonstrate the superiority of the proposed FEDAR and LEAD models. We further introduce two new DMSC datasets in the healthcare domain and benchmark different baseline models and our models on them. Attention weights visualization results and visualization of aspect and opinion keywords demonstrate the interpretability of our model and the effectiveness of our AKR method.", "edit_actions": [{"type": "R", "before": "Multi-Aspect Rating Prediction (MARP", "after": "Document-level Multi-aspect Sentiment Classification (DMSC", "start_char_pos": 154, "end_char_pos": 190}, {"type": "A", "before": null, "after": "/sentiment", "start_char_pos": 235, "end_char_pos": 235}, {"type": "D", "before": "an", "after": null, "start_char_pos": 310, "end_char_pos": 312}, {"type": "R", "before": "self-attention", "after": "self-attention-based", "start_char_pos": 381, "end_char_pos": 395}, {"type": "R", "before": "named as", "after": "namely", "start_char_pos": 423, "end_char_pos": 431}, {"type": "R", "before": "MARP", "after": "DMSC", "start_char_pos": 447, "end_char_pos": 451}, {"type": "D", "before": "As opposed to the previous studies, which make use of hand-crafted keywords to determine aspects in sentiment predictions, our model does not suffer from human bias issues since aspect keywords are automatically detected through a self-attention mechanism.", "after": null, "start_char_pos": 560, "end_char_pos": 816}, {"type": "R", "before": "extract", "after": "discover aspect keywords and", "start_char_pos": 1162, "end_char_pos": 1169}, {"type": "R", "before": "sentiment-related", "after": "opinion", "start_char_pos": 1183, "end_char_pos": 1200}, {"type": "A", "before": null, "after": "These keywords are significant for rating predictions by FEDAR.", "start_char_pos": 1265, "end_char_pos": 1265}, {"type": "R", "before": "different", "after": "five different open-domain", "start_char_pos": 1589, "end_char_pos": 1598}, {"type": "R", "before": "Visualization of aspect-level sentiment", "after": "We further introduce two new DMSC datasets in the healthcare domain and benchmark different baseline models and our models on them. Attention weights visualization results and visualization of aspect and opinion", "start_char_pos": 1680, "end_char_pos": 1719}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1779, "end_char_pos": 1779}], "sents_char_pos": [0, 153, 330, 559, 816, 1057, 1264, 1552, 1679]}
+{"doc_id": "2009.09704", "revision_depth": "1", "before_revision": "An end-to-end speech-to-text translation (ST) takes audio in a source language and outputs the text in a target language. Inspired by neuroscience, humans have perception systems and cognitive systems to process different information, we propose TED,T ransducer-E ncoder-D ecoder , a unified framework with triple supervision to decouple the end-to-end speech-to-text translation task. In addition to the target sentence translation loss, %DIFDELCMD < \\method %%% includes two auxiliary supervising signals to guide the acoustic transducer that extracts acoustic features from the input, and the semantic encoder to extract semantic features relevant to the source transcription text. Our method achieves state-of-the-art performance on both English-French and English-German speech translation benchmarks .", "after_revision": "An end-to-end speech-to-text translation (ST) takes audio in a source language and outputs the text in a target language. Inspired by neuroscience, humans have perception systems and cognitive systems to process different information, we propose LUT, Listen-Understand-Translate , a unified framework with triple supervision to decouple the end-to-end speech-to-text translation task. In addition to the target language sentence translation loss, %DIFDELCMD < \\method %%% LUT includes two auxiliary supervising signals to guide the acoustic encoder to extracts acoustic features from the input, and the semantic encoder to extract semantic features relevant to the source transcription text. We do experiments on English-French , English-German and English-Chinese speech translation benchmarks and the results demonstrate the reasonability of LUT. Our code is available at URL", "edit_actions": [{"type": "D", "before": "TED,", "after": null, "start_char_pos": 246, "end_char_pos": 250}, {"type": "D", "before": "T", "after": null, "start_char_pos": 250, "end_char_pos": 251}, {"type": "D", "before": "ransducer-", "after": null, "start_char_pos": 252, "end_char_pos": 262}, {"type": "D", "before": "E", "after": null, "start_char_pos": 262, "end_char_pos": 263}, {"type": "D", "before": "ncoder-", "after": null, "start_char_pos": 264, "end_char_pos": 271}, {"type": "D", "before": "D", "after": null, "start_char_pos": 271, "end_char_pos": 272}, {"type": "R", "before": "ecoder", "after": "LUT, Listen-Understand-Translate", "start_char_pos": 273, "end_char_pos": 279}, {"type": "A", "before": null, "after": "language", "start_char_pos": 412, "end_char_pos": 412}, {"type": "A", "before": null, "after": "LUT", "start_char_pos": 465, "end_char_pos": 465}, {"type": "R", "before": "transducer that", "after": "encoder to", "start_char_pos": 531, "end_char_pos": 546}, {"type": "R", "before": "Our method achieves state-of-the-art performance on both", "after": "We do experiments on", "start_char_pos": 687, "end_char_pos": 743}, {"type": "R", "before": "and", "after": ",", "start_char_pos": 759, "end_char_pos": 762}, {"type": "A", "before": null, "after": "and English-Chinese", "start_char_pos": 778, "end_char_pos": 778}, {"type": "R", "before": ".", "after": "and the results demonstrate the reasonability of LUT. Our code is available at URL", "start_char_pos": 809, "end_char_pos": 810}], "sents_char_pos": [0, 121, 385, 686]}
+{"doc_id": "2009.09972", "revision_depth": "1", "before_revision": "We propose a method of visual SLAM by predicting and updating line flows that represent sequential 2D projections of 3D line segments. While indirect SLAM methods using points and line segments have achieved excellent results, they still face problems in challenging scenarios such as occlusions, image blur , and repetitive textures. To deal with these problems, we leverage line flows which encode the coherence of 2D and 3D line segments in spatial and temporal domains as the sequence of all the 2D line segments corresponding to a specific 3D line segment . Thanks to the line flow representation, the corresponding 2D line segment in a new frame can be predicted based on 2D and 3D line segment motions . We create, update, merge, and discard line flows on-the-fly. We model our Line Flow-based SLAM (LF-SLAM) using a Bayesian network. We perform short-term optimization in front-end, and long-term optimization in back-end. The constraints introduced in line flows improve the performance of our LF-SLAM. Extensive experimental results demonstrate that our method achieves better performance than state-of-the-art direct and indirect SLAM approaches . Specifically, it obtains good localization and mapping results in challenging scenes with occlusions, image blur , and repetitive textures.", "after_revision": "We propose a visual SLAM method by predicting and updating line flows that represent sequential 2D projections of 3D line segments. While feature-based SLAM methods have achieved excellent results, they still face problems in challenging scenes containing occlusions, blurred images , and repetitive textures. To address these problems, we leverage a line flow to encode the coherence of line segment observations of the same 3D line along the temporal dimension, which has been neglected in prior SLAM systems . Thanks to this line flow representation, line segments in a new frame can be predicted according to their corresponding 3D lines and their predecessors along the temporal dimension . We create, update, merge, and discard line flows on-the-fly. We model the proposed line flow based SLAM (LF-SLAM) using a Bayesian network. Extensive experimental results demonstrate that the proposed LF-SLAM method achieves state-of-the-art results due to the utilization of line flows . Specifically, LF-SLAM obtains good localization and mapping results in challenging scenes with occlusions, blurred images , and repetitive textures.", "edit_actions": [{"type": "R", "before": "method of visual SLAM", "after": "visual SLAM method", "start_char_pos": 13, "end_char_pos": 34}, {"type": "R", "before": "indirect SLAM methods using points and line segments", "after": "feature-based SLAM methods", "start_char_pos": 141, "end_char_pos": 193}, {"type": "R", "before": "scenarios such as occlusions, image blur", "after": "scenes containing occlusions, blurred images", "start_char_pos": 267, "end_char_pos": 307}, {"type": "R", "before": "deal with", "after": "address", "start_char_pos": 338, "end_char_pos": 347}, {"type": "R", "before": "line flows which", "after": "a line flow to", "start_char_pos": 376, "end_char_pos": 392}, {"type": "R", "before": "2D and 3D line segments in spatial and temporal domains as the sequence of all the 2D line segments corresponding to a specific", "after": "line segment observations of the same", "start_char_pos": 417, "end_char_pos": 544}, {"type": "R", "before": "segment", "after": "along the temporal dimension, which has been neglected in prior SLAM systems", "start_char_pos": 553, "end_char_pos": 560}, {"type": "R", "before": "the", "after": "this", "start_char_pos": 573, "end_char_pos": 576}, {"type": "R", "before": "the corresponding 2D line segment", "after": "line segments", "start_char_pos": 603, "end_char_pos": 636}, {"type": "R", "before": "based on 2D and", "after": "according to their corresponding", "start_char_pos": 669, "end_char_pos": 684}, {"type": "R", "before": "line segment motions", "after": "lines and their predecessors along the temporal dimension", "start_char_pos": 688, "end_char_pos": 708}, {"type": "R", "before": "our Line Flow-based", "after": "the proposed line flow based", "start_char_pos": 781, "end_char_pos": 800}, {"type": "D", "before": "We perform short-term optimization in front-end, and long-term optimization in back-end. The constraints introduced in line flows improve the performance of our LF-SLAM.", "after": null, "start_char_pos": 842, "end_char_pos": 1011}, {"type": "R", "before": "our method achieves better performance than", "after": "the proposed LF-SLAM method achieves", "start_char_pos": 1060, "end_char_pos": 1103}, {"type": "R", "before": "direct and indirect SLAM approaches", "after": "results due to the utilization of line flows", "start_char_pos": 1121, "end_char_pos": 1156}, {"type": "R", "before": "it", "after": "LF-SLAM", "start_char_pos": 1173, "end_char_pos": 1175}, {"type": "R", "before": "image blur", "after": "blurred images", "start_char_pos": 1261, "end_char_pos": 1271}], "sents_char_pos": [0, 134, 334, 562, 710, 771, 841, 930, 1011]}
+{"doc_id": "2009.10766", "revision_depth": "1", "before_revision": "In-silico prediction of repurposable drugs is an effective drug discovery strategy which supplements de-nevo drug discovery from scratch. Lack of severe side effects of repurposable drugs in other applications and most importantly the reduced time frame in development suits the urgency of the situation in general . Most recent , and most advanced artificial intelligence (AI) approaches have boosted drug repurposing in terms of throughput and accuracy enormously. But , with the growing number of drugs, targets and their huge interactions produce imbalance data which may not be suitable to directly feed into the classification model . Here, we proposed DTI-SNNFRA, a framework for identifying drug-target interaction (DTI), based on shared nearest neighbor (SNN) and fuzzy-rough approximation (FRA). It uses a sampling technique to collectively reduce the huge search space covering the available drugs, large number of drugs targets and millions of interactions between them. DTI-SNNFRA operates on two stages: first it uses SNN followed by a partitional clustering for sampling the search space. Next, it computes degree of fuzzy-rough approximations and with proper degree threshold selection for undersampling of the negative samples from all possible interaction pairs between drugs and targets obtained in the first stage. Finally, classification is performed using the positive and selected negative samples. We evaluate the efficacy of DTI-SNNFRA using AUC (Area under ROC Curve), Geometric Mean, and F1 Score. The model performs extremely well with high prediction score (around 0.95 ) . The predicted drug-target interactions are validated through a existing drug-target database (Connectivity Map (Cmap)).", "after_revision": "In-silico prediction of repurposable drugs is an effective drug discovery strategy that supplements de-nevo drug discovery from scratch. Reduced development time, less cost and absence of severe side effects are significant advantages of using drug repositioning . Most recent and most advanced artificial intelligence (AI) approaches have boosted drug repurposing in terms of throughput and accuracy enormously. However , with the growing number of drugs, targets and their massive interactions produce imbalanced data which may not be suitable as input to the classification model directly . Here, we have proposed DTI-SNNFRA, a framework for predicting drug-target interaction (DTI), based on shared nearest neighbour (SNN) and fuzzy-rough approximation (FRA). It uses sampling techniques to collectively reduce the vast search space covering the available drugs, targets and millions of interactions between them. DTI-SNNFRA operates in two stages: first , it uses SNN followed by a partitioning clustering for sampling the search space. Next, it computes the degree of fuzzy-rough approximations and proper degree threshold selection for the negative samples ' undersampling from all possible interaction pairs between drugs and targets obtained in the first stage. Finally, classification is performed using the positive and selected negative samples. We have evaluated the efficacy of DTI-SNNFRA using AUC (Area under ROC Curve), Geometric Mean, and F1 Score. The model performs exceptionally well with a high prediction score of 0.95 for ROC-AUC . The predicted drug-target interactions are validated through an existing drug-target database (Connectivity Map (Cmap)).", "edit_actions": [{"type": "R", "before": "which", "after": "that", "start_char_pos": 83, "end_char_pos": 88}, {"type": "R", "before": "Lack", "after": "Reduced development time, less cost and absence", "start_char_pos": 138, "end_char_pos": 142}, {"type": "R", "before": "of repurposable drugs in other applications and most importantly the reduced time frame in development suits the urgency of the situation in general", "after": "are significant advantages of using drug repositioning", "start_char_pos": 166, "end_char_pos": 314}, {"type": "D", "before": ",", "after": null, "start_char_pos": 329, "end_char_pos": 330}, {"type": "R", "before": "But", "after": "However", "start_char_pos": 467, "end_char_pos": 470}, {"type": "R", "before": "huge interactions produce imbalance", "after": "massive interactions produce imbalanced", "start_char_pos": 525, "end_char_pos": 560}, {"type": "R", "before": "to directly feed into", "after": "as input to", "start_char_pos": 592, "end_char_pos": 613}, {"type": "A", "before": null, "after": "directly", "start_char_pos": 639, "end_char_pos": 639}, {"type": "A", "before": null, "after": "have", "start_char_pos": 651, "end_char_pos": 651}, {"type": "R", "before": "identifying", "after": "predicting", "start_char_pos": 689, "end_char_pos": 700}, {"type": "R", "before": "neighbor", "after": "neighbour", "start_char_pos": 756, "end_char_pos": 764}, {"type": "R", "before": "a sampling technique", "after": "sampling techniques", "start_char_pos": 816, "end_char_pos": 836}, {"type": "R", "before": "huge", "after": "vast", "start_char_pos": 864, "end_char_pos": 868}, {"type": "D", "before": "large number of drugs", "after": null, "start_char_pos": 912, "end_char_pos": 933}, {"type": "R", "before": "on", "after": "in", "start_char_pos": 1005, "end_char_pos": 1007}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1026, "end_char_pos": 1026}, {"type": "R", "before": "partitional", "after": "partitioning", "start_char_pos": 1053, "end_char_pos": 1064}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1125, "end_char_pos": 1125}, {"type": "D", "before": "with", "after": null, "start_char_pos": 1167, "end_char_pos": 1171}, {"type": "D", "before": "undersampling of", "after": null, "start_char_pos": 1210, "end_char_pos": 1226}, {"type": "A", "before": null, "after": "' undersampling", "start_char_pos": 1248, "end_char_pos": 1248}, {"type": "R", "before": "evaluate", "after": "have evaluated", "start_char_pos": 1430, "end_char_pos": 1438}, {"type": "R", "before": "extremely well with", "after": "exceptionally well with a", "start_char_pos": 1549, "end_char_pos": 1568}, {"type": "R", "before": "(around", "after": "of", "start_char_pos": 1591, "end_char_pos": 1598}, {"type": "R", "before": ")", "after": "for ROC-AUC", "start_char_pos": 1604, "end_char_pos": 1605}, {"type": "R", "before": "a", "after": "an", "start_char_pos": 1669, "end_char_pos": 1670}], "sents_char_pos": [0, 137, 316, 466, 641, 807, 984, 1106, 1339, 1426, 1529, 1607]}
+{"doc_id": "2009.10938", "revision_depth": "1", "before_revision": "Hierarchical multi-label text classification (HMTC) problems become popular recently because of its practicality. Most existing algorithms for HMTC focus on the design of classifiers, and are largely referred to as local, global, or a combination of local/global approaches . However, a few studies have started exploring hierarchical feature extraction based on the label hierarchy associating with textin HMTC . In this paper, aN eural network-based method calledLA-HCN is proposed where a novel\\textbf{L abel-based\\textbf{A ttention module is designed to hierarchically extract important information from the text based on different labels . Besides, local and global document embeddings are separately generated to support the respective local and global classifications. In our experiments, LA-HCN achieves the top performance on the four public HMTC datasets when compared with other neural network-based state-of-the-art algorithms. The comparison between LA-HCN with its variants also demonstrates the effectiveness of the proposed label-based attention module as well as the use of the combination of local and global classifications. By visualizing the learned attention (words), we find LA-HCN is able to extract meaningful but different information from text based on different labels which is helpful for human understanding and explanation of classification results .", "after_revision": "Hierarchical multi-label text classification (HMTC) has been gaining popularity in recent years thanks to its applicability to a plethora of real-world applications. The existing HMTC algorithms largely focus on the design of classifiers, such as the local, global, or a combination of them . However, very few studies have focused on hierarchical feature extraction and explore the association between the hierarchical labels and the text . In this paper, \\textbf{ \\textbf{ we propose a Label-based Attention for Hierarchical Mutlti-label Text Classification Neural Network (LA-HCN), where the novel label-based attention module is designed to hierarchically extract important information from the text based on the labels from different hierarchy levels . Besides, hierarchical information is shared across levels while preserving the hierarchical label-based information. Separate local and global document embeddings are obtained and used to facilitate the respective local and global classifications. In our experiments, LA-HCN outperforms other state-of-the-art neural network-based HMTC algorithms on four public HMTC datasets . The ablation study also demonstrates the effectiveness of the proposed label-based attention module as well as the novel local and global embeddings and classifications. By visualizing the learned attention (words), we find that LA-HCN is able to extract meaningful information corresponding to the different labels which provides explainability that may be helpful for the human analyst .", "edit_actions": [{"type": "R", "before": "problems become popular recently because of its practicality. Most existing algorithms for HMTC", "after": "has been gaining popularity in recent years thanks to its applicability to a plethora of real-world applications. The existing HMTC algorithms largely", "start_char_pos": 52, "end_char_pos": 147}, {"type": "R", "before": "and are largely referred to as", "after": "such as the", "start_char_pos": 184, "end_char_pos": 214}, {"type": "R", "before": "local/global approaches", "after": "them", "start_char_pos": 250, "end_char_pos": 273}, {"type": "R", "before": "a", "after": "very", "start_char_pos": 285, "end_char_pos": 286}, {"type": "R", "before": "started exploring", "after": "focused on", "start_char_pos": 304, "end_char_pos": 321}, {"type": "R", "before": "based on the label hierarchy associating with textin HMTC", "after": "and explore the association between the hierarchical labels and the text", "start_char_pos": 354, "end_char_pos": 411}, {"type": "D", "before": "a", "after": null, "start_char_pos": 429, "end_char_pos": 430}, {"type": "D", "before": "N", "after": null, "start_char_pos": 430, "end_char_pos": 431}, {"type": "D", "before": "eural network-based method called", "after": null, "start_char_pos": 432, "end_char_pos": 465}, {"type": "D", "before": "LA-HCN", "after": null, "start_char_pos": 465, "end_char_pos": 471}, {"type": "D", "before": "is proposed where a novel", "after": null, "start_char_pos": 472, "end_char_pos": 497}, {"type": "D", "before": "L", "after": null, "start_char_pos": 505, "end_char_pos": 506}, {"type": "D", "before": "abel-based", "after": null, "start_char_pos": 507, "end_char_pos": 517}, {"type": "D", "before": "A", "after": null, "start_char_pos": 525, "end_char_pos": 526}, {"type": "R", "before": "ttention", "after": "we propose a Label-based Attention for Hierarchical Mutlti-label Text Classification Neural Network (LA-HCN), where the novel label-based attention", "start_char_pos": 527, "end_char_pos": 535}, {"type": "R", "before": "different labels", "after": "the labels from different hierarchy levels", "start_char_pos": 626, "end_char_pos": 642}, {"type": "A", "before": null, "after": "hierarchical information is shared across levels while preserving the hierarchical label-based information. Separate", "start_char_pos": 654, "end_char_pos": 654}, {"type": "R", "before": "separately generated to support", "after": "obtained and used to facilitate", "start_char_pos": 696, "end_char_pos": 727}, {"type": "R", "before": "achieves the top performance on the", "after": "outperforms other state-of-the-art neural network-based HMTC algorithms on", "start_char_pos": 804, "end_char_pos": 839}, {"type": "R", "before": "when compared with other neural network-based state-of-the-art algorithms. The comparison between LA-HCN with its variants", "after": ". The ablation study", "start_char_pos": 866, "end_char_pos": 988}, {"type": "R", "before": "use of the combination of", "after": "novel", "start_char_pos": 1085, "end_char_pos": 1110}, {"type": "A", "before": null, "after": "embeddings and", "start_char_pos": 1128, "end_char_pos": 1128}, {"type": "A", "before": null, "after": "that", "start_char_pos": 1200, "end_char_pos": 1200}, {"type": "R", "before": "but different information from text based on", "after": "information corresponding to the", "start_char_pos": 1238, "end_char_pos": 1282}, {"type": "R", "before": "is helpful for human understanding and explanation of classification results", "after": "provides explainability that may be helpful for the human analyst", "start_char_pos": 1306, "end_char_pos": 1382}], "sents_char_pos": [0, 113, 275, 413, 776, 940, 1145]}
+{"doc_id": "2009.11288", "revision_depth": "1", "before_revision": "A theory on the conformation transition for SARS-CoV-2 spike protein (S) is established . The conformation equilibrium between open (up) and closed (down) conformations of receptor binding domain (RBD) is studied from the first-principle. The free energy change in conformation transition of S protein is introduced and we demonstrated that it includes two parts, one from the difference of conformation potential and another from the variation of structural elasticity. The latter is dependent of amino acid mutation. When the amino acid mutation of S protein causes a substantial reduction of elastic energy the equilibrium is biased to the open conformation. Only then can the virus infection process continue. That both the D614G mutation and the K986P mutation increase the COVID-19 infectivity and why a large number of mutations, including those at interface residues, have not been selected in current SARS-CoV-2 pandemic are interpreted from the presented theory. The evolution of coronavirus dependent on the alteration of conformation equilibrium is indicated. Finally, introduction of electric field to change the conformation potential barrier and how the conformation equilibriumdepends on temperature and humidity are briefly discussed .", "after_revision": "A theory on the conformation transition for SARS-CoV-2 spike protein (S) is proposed . The conformation equilibrium between open (up) and closed (down) conformations of receptor binding domain (RBD) of the spike is studied from the first-principle. The conformational state population is deduced from the free energy change in conformation transition of S protein . We demonstrated that the free energy includes two parts, one from the multi-minima of conformational potential and another from the variation of structural elasticity. Both factors are dependent of amino acid mutation. The former is related to the change of affinity of RBD to ACE 2 due to the mutation in the subdomain RBM (receptor binding motif) of RBD. The latter is caused by the change of elastic energy of S protein. When the affinity has increased significantly and/or the elastic energy has been reduced substantially the equilibrium is biased to the open conformation. Only then can the virus infection process continue. Possible new SARS-CoV-2 variants from amino acid mutations in 5-9 sites on RBD interface are predicted. The elastic energy variation needed for conformation transition is estimated quantitatively. Taking the elastic-structural change into account more virus variants are possible. Both the D614G mutation , the K986P mutation and the new variants 501Y in current SARS-CoV-2 pandemic can be interpreted from the presented theory. The comparison of the infectivity of SARS-CoV-2 with SARS-CoV-1 is made from the point of conformation equilibrium. Why the virus entrance takes priority in lower temperature and higher humidity is interpreted by the present theory. The conformational transition influenced by electromagnetic field is also discussed briefly .", "edit_actions": [{"type": "R", "before": "established", "after": "proposed", "start_char_pos": 76, "end_char_pos": 87}, {"type": "A", "before": null, "after": "of the spike", "start_char_pos": 202, "end_char_pos": 202}, {"type": "A", "before": null, "after": "conformational state population is deduced from the", "start_char_pos": 244, "end_char_pos": 244}, {"type": "R", "before": "is introduced and we demonstrated that it", "after": ". We demonstrated that the free energy", "start_char_pos": 304, "end_char_pos": 345}, {"type": "R", "before": "difference of conformation", "after": "multi-minima of conformational", "start_char_pos": 379, "end_char_pos": 405}, {"type": "R", "before": "The latter is", "after": "Both factors are", "start_char_pos": 473, "end_char_pos": 486}, {"type": "R", "before": "When the amino acid mutation of S protein causes a substantial reduction of elastic energy", "after": "The former is related to the change of affinity of RBD to ACE 2 due to the mutation in the subdomain RBM (receptor binding motif) of RBD. The latter is caused by the change of elastic energy of S protein. When the affinity has increased significantly and/or the elastic energy has been reduced substantially", "start_char_pos": 521, "end_char_pos": 611}, {"type": "R", "before": "That both the", "after": "Possible new SARS-CoV-2 variants from amino acid mutations in 5-9 sites on RBD interface are predicted. The elastic energy variation needed for conformation transition is estimated quantitatively. Taking the elastic-structural change into account more virus variants are possible. Both the", "start_char_pos": 716, "end_char_pos": 729}, {"type": "R", "before": "and", "after": ",", "start_char_pos": 745, "end_char_pos": 748}, {"type": "R", "before": "increase the COVID-19 infectivity and why a large number of mutations, including those at interface residues, have not been selected", "after": "and the new variants 501Y", "start_char_pos": 768, "end_char_pos": 900}, {"type": "R", "before": "are", "after": "can be", "start_char_pos": 932, "end_char_pos": 935}, {"type": "R", "before": "evolution of coronavirus dependent on the alteration of conformation equilibrium is indicated. Finally, introduction of electric field to change the conformation potential barrier and how the conformation equilibriumdepends on temperature and humidity are briefly discussed", "after": "comparison of the infectivity of SARS-CoV-2 with SARS-CoV-1 is made from the point of conformation equilibrium. Why the virus entrance takes priority in lower temperature and higher humidity is interpreted by the present theory. The conformational transition influenced by electromagnetic field is also discussed briefly", "start_char_pos": 979, "end_char_pos": 1252}], "sents_char_pos": [0, 89, 239, 472, 520, 663, 715, 974, 1073]}
+{"doc_id": "2009.14278", "revision_depth": "1", "before_revision": "This paper considers price volatility as the reason for description of the second-degree economic variables, trades and expectations } } aggregated during certain time interval {\\Delta}. We call it - the second-order economic theory. The n-th degree products of costs and volumes of trades, performed by economic agents during interval { \\Delta } determine price n-th statistical moments. First two price statistical moments define volatility . To model volatility one needs description of the squares of trades aggregated during interval \\Delta%DIFDELCMD < }%%% . To describe price probability one needs all n-th statistical moments of price but that is almost impossible. We define squares of agent's trades and macro expectations those approve the second-degree trades aggregated during interval {\\Delta}. We believe that agents perform trades under action of multiple expectations . We derive equations on the second-degree trades and expectations in economic space. As economic space we regard numerical continuous risk grades. Numerical risk grades are discussed at least for 80 years. We propose that econometrics permit accomplish risk assessment for almost all economic agents. Agents risk ratings distribute agents by economic space and define densities of macro second-degree trades and expectations. In the linear approximation we derive mean square price and volatility } disturbances as functions of the first and second-degree trades disturbances. In simple approximation numerous expectations and their perturbations can cause small harmonic oscillations of the second-degree trades disturbances and induce harmonic oscillations of price and volatility perturbations } .", "after_revision": "We introduce the price probability measure \\eta}(p;t) that defines the mean price p(1;t), mean square price p(2;t), price volatility \\sigma}p2(t)and all price n-th statistical moments p(n;t) as ratio of sums of n-th degree values C(n;t) and volumes U(n;t) of market trades aggregated during certain time interval {\\Delta}. The definition of the mean price p(1;t) coincides with definition of the volume weighted average price (VWAP) introduced at least 30 years ago. We show that price volatility { \\sigma } %DIFDELCMD < }%%% p2(t) forecasting requires modeling evolution of the sums of second-degree values C(2;t) and volumes U(2;t). We call this model as second-order economic theory. We use numerical continuous risk ratings as ground for risk assessment of economic agents and distribute agents by risk ratings as coordinates. We introduce continuous economic media approximation of squares of values and volumes of agents trades and their flows aggregated during time interval {\\Delta}. We take into account expectations that govern agents trades and introduce aggregated expectations alike to aggregated trades . We derive equations for continuous economic media approximation on the second-degree trades . In the linear approximation we derive mean square price p(2;t) and volatility \\sigma}p2(t) disturbances as functions of the first and second-degree trades disturbances. Description of each next n-th price statistical moment p(n;t) with respect to the unit price measure \\eta}(p;t) depends on sums of n-th degree values C(n;t) and volumes U(n;t) of market trades and hence requires development of the corresponding n-th order economic theory .", "edit_actions": [{"type": "R", "before": "This paper considers price volatility as the reason for description of the second-degree economic variables, trades and expectations", "after": "We introduce the price probability measure", "start_char_pos": 0, "end_char_pos": 132}, {"type": "A", "before": null, "after": "\\eta", "start_char_pos": 133, "end_char_pos": 133}, {"type": "A", "before": null, "after": "(p;t) that defines the mean price p(1;t), mean square price p(2;t), price volatility", "start_char_pos": 134, "end_char_pos": 134}, {"type": "A", "before": null, "after": "\\sigma", "start_char_pos": 135, "end_char_pos": 135}, {"type": "A", "before": null, "after": "p2(t)and all price n-th statistical moments p(n;t) as ratio of sums of n-th degree values C(n;t) and volumes U(n;t) of market trades", "start_char_pos": 136, "end_char_pos": 136}, {"type": "R", "before": "We call it - the second-order economic theory. The n-th degree products of costs and volumes of trades, performed by economic agents during interval", "after": "The definition of the mean price p(1;t) coincides with definition of the volume weighted average price (VWAP) introduced at least 30 years ago. We show that price volatility", "start_char_pos": 187, "end_char_pos": 335}, {"type": "R", "before": "\\Delta", "after": "\\sigma", "start_char_pos": 338, "end_char_pos": 344}, {"type": "D", "before": "determine price n-th statistical moments. First two price statistical moments define volatility . To model volatility one needs description of the squares of trades aggregated during interval", "after": null, "start_char_pos": 347, "end_char_pos": 538}, {"type": "D", "before": "\\Delta", "after": null, "start_char_pos": 539, "end_char_pos": 545}, {"type": "R", "before": ". To describe price probability one needs all n-th statistical moments of price but that is almost impossible. We define squares of agent's trades and macro expectations those approve the second-degree trades aggregated during", "after": "p2(t) forecasting requires modeling evolution of the sums of second-degree values C(2;t) and volumes U(2;t). We call this model as second-order economic theory. We use numerical continuous risk ratings as ground for risk assessment of economic agents and distribute agents by risk ratings as coordinates. We introduce continuous economic media approximation of squares of values and volumes of agents trades and their flows aggregated during time", "start_char_pos": 563, "end_char_pos": 789}, {"type": "R", "before": "believe that agents perform trades under action of multiple expectations", "after": "take into account expectations that govern agents trades and introduce aggregated expectations alike to aggregated trades", "start_char_pos": 812, "end_char_pos": 884}, {"type": "A", "before": null, "after": "for continuous economic media approximation", "start_char_pos": 907, "end_char_pos": 907}, {"type": "R", "before": "and expectations in economic space. As economic space we regard numerical continuous risk grades. Numerical risk grades are discussed at least for 80 years. We propose that econometrics permit accomplish risk assessment for almost all economic agents. Agents risk ratings distribute agents by economic space and define densities of macro second-degree trades and expectations.", "after": ".", "start_char_pos": 936, "end_char_pos": 1312}, {"type": "R", "before": "and volatility", "after": "p(2;t) and volatility", "start_char_pos": 1369, "end_char_pos": 1383}, {"type": "A", "before": null, "after": "\\sigma", "start_char_pos": 1384, "end_char_pos": 1384}, {"type": "A", "before": null, "after": "p2(t)", "start_char_pos": 1385, "end_char_pos": 1385}, {"type": "R", "before": "In simple approximation numerous expectations and their perturbations can cause small harmonic oscillations of the second-degree trades disturbances and induce harmonic oscillations of price and volatility perturbations", "after": "Description of each next n-th price statistical moment p(n;t) with respect to the unit price measure", "start_char_pos": 1464, "end_char_pos": 1683}, {"type": "A", "before": null, "after": "\\eta", "start_char_pos": 1684, "end_char_pos": 1684}, {"type": "A", "before": null, "after": "(p;t) depends on sums of n-th degree values C(n;t) and volumes U(n;t) of market trades and hence requires development of the corresponding n-th order economic theory", "start_char_pos": 1685, "end_char_pos": 1685}], "sents_char_pos": [0, 186, 233, 388, 444, 673, 808, 886, 971, 1033, 1092, 1187, 1312, 1463]}
+{"doc_id": "2009.14725", "revision_depth": "1", "before_revision": "Over 97 million inhabitants speak Vietnamese as the native language in the world. However, there are few research studies on machine reading comprehension (MRC) in Vietnamese, the task of understanding a document or text , and answering questions related to it. Due to the lack of benchmark datasets for Vietnamese, we present the Vietnamese Question Answering Dataset ( ViQuAD ), a new dataset for the low-resource language as Vietnamese to evaluate MRC models. This dataset comprises over 23,000 human-generated question-answer pairs based on 5,109 passages of 174 Vietnamese articles from Wikipedia. In particular, we propose a new process of dataset creation for Vietnamese MRC. Our in-depth analyses illustrate that our dataset requires abilities beyond simple reasoning like word matching and demands complicate reasoning such as single-sentence and multiple-sentence inferences. Besides, we conduct experiments on state-of-the-art MRC methods in English and Chinese as the first experimental models on ViQuAD, which will be compared to further models . We also estimate human performances on the dataset and compare it to the experimental results of several powerful machine models. As a result, the substantial differences between humans and the best model performances on the dataset indicate that improvements can be explored on ViQuAD through future research. Our dataset is freely available to encourage the research community to overcome challenges in Vietnamese MRC.", "after_revision": "Over 97 million people speak Vietnamese as their native language in the world. However, there are few research studies on machine reading comprehension (MRC) for Vietnamese, the task of understanding a text and answering questions related to it. Due to the lack of benchmark datasets for Vietnamese, we present the Vietnamese Question Answering Dataset ( UIT-ViQuAD ), a new dataset for the low-resource language as Vietnamese to evaluate MRC models. This dataset comprises over 23,000 human-generated question-answer pairs based on 5,109 passages of 174 Vietnamese articles from Wikipedia. In particular, we propose a new process of dataset creation for Vietnamese MRC. Our in-depth analyses illustrate that our dataset requires abilities beyond simple reasoning like word matching and demands single-sentence and multiple-sentence inferences. Besides, we conduct experiments on state-of-the-art MRC methods for English and Chinese as the first experimental models on UIT-ViQuAD . We also estimate human performance on the dataset and compare it to the experimental results of powerful machine learning models. As a result, the substantial differences between human performance and the best model performance on the dataset indicate that improvements can be made on UIT-ViQuAD in future research. Our dataset is freely available on our website to encourage the research community to overcome challenges in Vietnamese MRC.", "edit_actions": [{"type": "R", "before": "inhabitants", "after": "people", "start_char_pos": 16, "end_char_pos": 27}, {"type": "R", "before": "the", "after": "their", "start_char_pos": 48, "end_char_pos": 51}, {"type": "R", "before": "in", "after": "for", "start_char_pos": 161, "end_char_pos": 163}, {"type": "R", "before": "document or text ,", "after": "text", "start_char_pos": 204, "end_char_pos": 222}, {"type": "R", "before": "ViQuAD", "after": "UIT-ViQuAD", "start_char_pos": 371, "end_char_pos": 377}, {"type": "D", "before": "complicate reasoning such as", "after": null, "start_char_pos": 807, "end_char_pos": 835}, {"type": "R", "before": "in", "after": "for", "start_char_pos": 950, "end_char_pos": 952}, {"type": "R", "before": "ViQuAD, which will be compared to further models", "after": "UIT-ViQuAD", "start_char_pos": 1009, "end_char_pos": 1057}, {"type": "R", "before": "performances", "after": "performance", "start_char_pos": 1083, "end_char_pos": 1095}, {"type": "R", "before": "several powerful machine", "after": "powerful machine learning", "start_char_pos": 1157, "end_char_pos": 1181}, {"type": "R", "before": "humans", "after": "human performance", "start_char_pos": 1239, "end_char_pos": 1245}, {"type": "R", "before": "performances", "after": "performance", "start_char_pos": 1265, "end_char_pos": 1277}, {"type": "R", "before": "explored on ViQuAD through", "after": "made on UIT-ViQuAD in", "start_char_pos": 1327, "end_char_pos": 1353}, {"type": "A", "before": null, "after": "on our website", "start_char_pos": 1403, "end_char_pos": 1403}], "sents_char_pos": [0, 81, 261, 462, 602, 682, 885, 1059, 1189, 1370]}
+{"doc_id": "2010.00182", "revision_depth": "1", "before_revision": "Based on an exponentially increasing number of academic articles, discovering and citing comprehensive and appropriate resources has become a non-trivial task. Conventional citation recommender methods suffer from severe information loss. For example, they do not consider the section on which a user is working , the relatedness between words , or the importance of words . These shortcomings make such methods insufficient for recommending adequate citations when working on manuscripts. In this study, we propose a novel approach called dual attention model for citation recommendation (DACR) to recommend citations during manuscript preparation. Our method considers three dimensions of information: contextual words , structural contexts, and the section on which a user is working. The core of the proposed model is composed of self-attention and additive attention, where the former aims to capture the relatedness between input information , and the latter aims to learn the importance of inputs . The experiments on real-world datasets demonstrate the effectiveness of the proposed approach.", "after_revision": "Based on an exponentially increasing number of academic articles, discovering and citing comprehensive and appropriate resources has become a non-trivial task. Conventional citation recommender methods suffer from severe information loss. For example, they do not consider the section of the paper that the user is writing and for which they need to find a citation , the relatedness between the words in the local context (the text span that describes a citation) , or the importance on each word from the local context . These shortcomings make such methods insufficient for recommending adequate citations to academic manuscripts. In this study, we propose a novel embedding-based neural network called \" dual attention model for citation recommendation (DACR) \" to recommend citations during manuscript preparation. Our method adapts embedding of three dimensions of semantic information: words in the local context , structural contexts, and the section on which a user is working. A neural network is designed to maximize the similarity between the embedding of the three input (local context words, section and structural contexts) and the target citation appearing in the context. The core of the neural network is composed of self-attention and additive attention, where the former aims to capture the relatedness between the contextual words and structural context , and the latter aims to learn the importance of them . The experiments on real-world datasets demonstrate the effectiveness of the proposed approach.", "edit_actions": [{"type": "R", "before": "on which a user is working", "after": "of the paper that the user is writing and for which they need to find a citation", "start_char_pos": 285, "end_char_pos": 311}, {"type": "R", "before": "words", "after": "the words in the local context (the text span that describes a citation)", "start_char_pos": 338, "end_char_pos": 343}, {"type": "R", "before": "of words", "after": "on each word from the local context", "start_char_pos": 364, "end_char_pos": 372}, {"type": "R", "before": "when working on", "after": "to academic", "start_char_pos": 461, "end_char_pos": 476}, {"type": "R", "before": "approach called", "after": "embedding-based neural network called \"", "start_char_pos": 524, "end_char_pos": 539}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 596, "end_char_pos": 596}, {"type": "R", "before": "considers", "after": "adapts embedding of", "start_char_pos": 662, "end_char_pos": 671}, {"type": "R", "before": "information: contextual words", "after": "semantic information: words in the local context", "start_char_pos": 692, "end_char_pos": 721}, {"type": "A", "before": null, "after": "A neural network is designed to maximize the similarity between the embedding of the three input (local context words, section and structural contexts) and the target citation appearing in the context.", "start_char_pos": 789, "end_char_pos": 789}, {"type": "R", "before": "proposed model", "after": "neural network", "start_char_pos": 806, "end_char_pos": 820}, {"type": "R", "before": "input information", "after": "the contextual words and structural context", "start_char_pos": 932, "end_char_pos": 949}, {"type": "R", "before": "inputs", "after": "them", "start_char_pos": 999, "end_char_pos": 1005}], "sents_char_pos": [0, 159, 238, 374, 489, 650, 788, 1007]}
+{"doc_id": "2010.01288", "revision_depth": "1", "before_revision": "Most recent image captioning works are conducted in English as the majority of image-caption datasets are in English . However, there are a large amount of non-native English speakers worldwide. Generating image captions in different languages is worth exploring . In this paper , we present a novel unsupervised method to generate image captions without using any caption corpus . Our method relies on 1 ) a cross-lingual auto-encoding , which learns the scene graph mapping function along with the scene graph encoders and sentence decoders on machine translation parallel corpora, and 2 ) an unsupervised feature mapping, which seeks to map the encoded scene graph features from image modality to sentence modality. By leveraging cross-lingual auto-encoding, cross-modal feature mapping, and adversarial learning, our method can learn an image captioner to generate captions in different languages. We verify the effectiveness of our proposed method on the Chinese image caption generation . The comparisons against several baseline methods demonstrate the effectiveness of our approach.", "after_revision": "Research in image captioning has mostly focused on English because of the availability of image-caption paired datasets in this language . However, building vision-language systems only for English deprives a large part of the world population of AI technologies' benefit. On the other hand, creating image-caption paired datasets for every target language is expensive . In this work , we present a novel unsupervised cross-lingual method to generate image captions in a target language without using any image-caption corpus in the source or target languages . Our method relies on (i ) a cross-lingual scene graph to sentence translation process , which learns to decode sentences in the target language from a cross-lingual encoding space of scene graphs using a sentence parallel (bitext) corpus, and (ii ) an unsupervised cross-modal feature mapping which seeks to map an encoded scene graph features from image modality to language modality. We verify the effectiveness of our proposed method on the Chinese image caption generation task . The comparisons against several existing methods demonstrate the effectiveness of our approach.", "edit_actions": [{"type": "R", "before": "Most recent image captioning works are conducted in English as the majority", "after": "Research in image captioning has mostly focused on English because of the availability", "start_char_pos": 0, "end_char_pos": 75}, {"type": "R", "before": "datasets are in English", "after": "paired datasets in this language", "start_char_pos": 93, "end_char_pos": 116}, {"type": "R", "before": "there are a large amount of non-native English speakers worldwide. Generating image captions in different languages is worth exploring", "after": "building vision-language systems only for English deprives a large part of the world population of AI technologies' benefit. On the other hand, creating image-caption paired datasets for every target language is expensive", "start_char_pos": 128, "end_char_pos": 262}, {"type": "R", "before": "paper", "after": "work", "start_char_pos": 273, "end_char_pos": 278}, {"type": "A", "before": null, "after": "cross-lingual", "start_char_pos": 313, "end_char_pos": 313}, {"type": "A", "before": null, "after": "in a target language", "start_char_pos": 348, "end_char_pos": 348}, {"type": "R", "before": "caption corpus", "after": "image-caption corpus in the source or target languages", "start_char_pos": 367, "end_char_pos": 381}, {"type": "R", "before": "1", "after": "(i", "start_char_pos": 405, "end_char_pos": 406}, {"type": "R", "before": "auto-encoding", "after": "scene graph to sentence translation process", "start_char_pos": 425, "end_char_pos": 438}, {"type": "R", "before": "the scene graph mapping function along with the scene graph encoders and sentence decoders on machine translation parallel corpora, and 2", "after": "to decode sentences in the target language from a cross-lingual encoding space of scene graphs using a sentence parallel (bitext) corpus, and (ii", "start_char_pos": 454, "end_char_pos": 591}, {"type": "R", "before": "feature mapping,", "after": "cross-modal feature mapping", "start_char_pos": 610, "end_char_pos": 626}, {"type": "R", "before": "the", "after": "an", "start_char_pos": 646, "end_char_pos": 649}, {"type": "R", "before": "sentence modality. By leveraging cross-lingual auto-encoding, cross-modal feature mapping, and adversarial learning, our method can learn an image captioner to generate captions in different languages.", "after": "language modality.", "start_char_pos": 702, "end_char_pos": 903}, {"type": "A", "before": null, "after": "task", "start_char_pos": 995, "end_char_pos": 995}, {"type": "R", "before": "baseline", "after": "existing", "start_char_pos": 1030, "end_char_pos": 1038}], "sents_char_pos": [0, 118, 194, 264, 383, 720, 903, 997]}
+{"doc_id": "2010.01867", "revision_depth": "1", "before_revision": "After the blockade that many nations have faced to stop the growth of the incidence curve of COVID-19 , it is time to resume social and economic activity. The rapid airborne transmissibility of SARS-CoV-2, and the absence of a vaccine, call for active containment measures to avoid the propagation of transmission chains. The best strategy to date is to isolate diagnosed cases of infection, thus preventing further transmission. This technique consists on test the population for diagnosis, track the contacts of infected, and treat by quarantine all these cases , namely Test-Track-Treat (TTT) . The dynamical process that better describes the combined action of the former mechanisms is that of a contagion process that competes with the spread of the pathogen, cutting off potential contagion pathways. Here we propose a compartmental model that couples the dynamics of the infection with the contact tracing and isolation of cases. We develop an analytical expression for the effective case reproduction number %DIFDELCMD < {\\cal %%% R _c(t) that reveals the role of contact tracing in the mitigation and suppression of the epidemics. We show that there is a trade-off between the infection propagation and the isolation of cases. If the isolation is limited to symptomatic individuals only, the incidence curve can be flattened but not bent . However, when contact tracing is applied , the strategy bends the curve leading to a fast suppression of the epidemic outbreak. We illustrate this qualitative difference between the two strategies and identify the factors that explain the effectiveness of contact tracing in sharply reversing the upward trend of the original epidemic curve, causing its bending.", "after_revision": "After the blockade that many nations suffered to stop the growth of the incidence curve of COVID-19 during the first half of 2020, they face the challenge of resuming their social and economic activity. The rapid airborne transmissibility of SARS-CoV-2, and the absence of a vaccine, calls for active containment measures to avoid the propagation of transmission chains. The best strategy up to date, popularly known as Test-Track-Treat (TTT), consist in testing the population for diagnosis, track the contacts of those infected, and treat by quarantine all these cases . The dynamical process that better describes the combined action of the former mechanisms is that of a contagion process that competes with the spread of the pathogen, cutting off potential contagion pathways. Here we propose a compartmental model that couples the dynamics of the infection with the contact tracing and isolation of cases. We develop an analytical expression for the effective case reproduction number %DIFDELCMD < {\\cal %%% R _c(t) that reveals the role of contact tracing in the mitigation and suppression of the epidemics. We show that there is a trade off between the infection propagation and the isolation of cases. If the isolation is limited to symptomatic individuals only, the incidence curve can be flattened but not bended . However, if contact tracing is applied to asymptomatic individuals too , the strategy can bend the curve and suppress the epidemics. Quantitative results are dependent on the network topology. We quantify, the most important indicator of the effectiveness of contact tracing , namely its capacity to reverse the increasing tendency of the epidemic curve, causing its bending.", "edit_actions": [{"type": "R", "before": "have faced", "after": "suffered", "start_char_pos": 37, "end_char_pos": 47}, {"type": "R", "before": ", it is time to resume", "after": "during the first half of 2020, they face the challenge of resuming their", "start_char_pos": 102, "end_char_pos": 124}, {"type": "R", "before": "call", "after": "calls", "start_char_pos": 236, "end_char_pos": 240}, {"type": "R", "before": "to date is to isolate diagnosed cases of infection, thus preventing further transmission. This technique consists on test", "after": "up to date, popularly known as Test-Track-Treat (TTT), consist in testing", "start_char_pos": 340, "end_char_pos": 461}, {"type": "A", "before": null, "after": "those", "start_char_pos": 514, "end_char_pos": 514}, {"type": "D", "before": ", namely Test-Track-Treat (TTT)", "after": null, "start_char_pos": 565, "end_char_pos": 596}, {"type": "R", "before": "R", "after": "R", "start_char_pos": 1040, "end_char_pos": 1041}, {"type": "R", "before": "trade-off", "after": "trade off", "start_char_pos": 1165, "end_char_pos": 1174}, {"type": "R", "before": "bent", "after": "bended", "start_char_pos": 1343, "end_char_pos": 1347}, {"type": "R", "before": "when", "after": "if", "start_char_pos": 1359, "end_char_pos": 1363}, {"type": "A", "before": null, "after": "to asymptomatic individuals too", "start_char_pos": 1391, "end_char_pos": 1391}, {"type": "R", "before": "bends the curve leading to a fast suppression of the epidemic outbreak. We illustrate this qualitative difference between the two strategies and identify the factors that explain the", "after": "can bend the curve and suppress the epidemics. Quantitative results are dependent on the network topology. We quantify, the most important indicator of the", "start_char_pos": 1407, "end_char_pos": 1589}, {"type": "R", "before": "in sharply reversing the upward trend of the original", "after": ", namely its capacity to reverse the increasing tendency of the", "start_char_pos": 1623, "end_char_pos": 1676}], "sents_char_pos": [0, 154, 321, 429, 598, 807, 937, 1140, 1236, 1349, 1478]}
+{"doc_id": "2010.02908", "revision_depth": "1", "before_revision": "Lightness and sparsity are two natural parameters for Euclidean (1+ \\epsilon )-spanners. Classical results show that, when the dimension d\\in N and \\epsilon >0 are constant, every set S of n points in d-space admits an (1+ \\epsilon )-spanners with O(n) edges and weight proportional to that of the Euclidean MST of S. Tight bounds on the dependence on \\epsilon >0 for constant d\\in N have been established only recently. Le and Solomon (FOCS 2019) showed that Steiner points can substantially improve the lightness and sparsity of a (1+ \\epsilon )-spanner. They gave upper bounds of O( \\epsilon ^{-(d+1)/2}) for the minimum lightness in dimensions d\\geq 3, and O( \\epsilon ^{-(d-1))/2}) for the minimum sparsity in d-space for all d\\geq 1. They obtained lower bounds only in the plane (d=2). Le and Solomon (ESA 2020) also constructed Steiner (1+ \\epsilon )-spanners of lightness O( \\epsilon ^{-1}\\log\\Delta) in the plane, where \\Delta\\in \\Omega(\\log n) is the \\emph{spread} of S, defined as the ratio between the maximum and minimum distance between a pair of points. In this work, we improve several bounds on the lightness and sparsity of Euclidean Steiner (1+ \\epsilon )-spanners. Using a new geometric analysis, we establish lower bounds of \\Omega( \\epsilon ^{-d/2}) for the lightness and \\Omega( \\epsilon ^{-(d-1)/2}) for the sparsity of such spanners in Euclidean d-space for all d\\geq 2. We use the geometric insight from our lower bound analysis to construct Steiner (1+ \\epsilon )-spanners of lightness O( \\epsilon ^{-1}\\log n) for n points in Euclidean plane.", "after_revision": "Lightness and sparsity are two natural parameters for Euclidean (1+ \\varepsilon )-spanners. Classical results show that, when the dimension d\\in N and \\varepsilon >0 are constant, every set S of n points in d-space admits an (1+ \\varepsilon )-spanners with O(n) edges and weight proportional to that of the Euclidean MST of S. Tight bounds on the dependence on \\varepsilon >0 for constant d\\in N have been established only recently. Le and Solomon (FOCS 2019) showed that Steiner points can substantially improve the lightness and sparsity of a (1+ \\varepsilon )-spanner. They gave upper bounds of O( \\varepsilon ^{-(d+1)/2}) for the minimum lightness in dimensions d\\geq 3, and O( \\varepsilon ^{-(d-1))/2}) for the minimum sparsity in d-space for all d\\geq 1. They obtained lower bounds only in the plane (d=2). Le and Solomon (ESA 2020) also constructed Steiner (1+ \\varepsilon )-spanners of lightness O( \\varepsilon ^{-1}\\log\\Delta) in the plane, where \\Delta\\in \\Omega(\\log n) is the \\emph{spread} of S, defined as the ratio between the maximum and minimum distance between a pair of points. In this work, we improve several bounds on the lightness and sparsity of Euclidean Steiner (1+ \\varepsilon )-spanners. Using a new geometric analysis, we establish lower bounds of \\Omega( \\varepsilon ^{-d/2}) for the lightness and \\Omega( \\varepsilon ^{-(d-1)/2}) for the sparsity of such spanners in Euclidean d-space for all d\\geq 2. We use the geometric insight from our lower bound analysis to construct Steiner (1+ \\varepsilon )-spanners of lightness O( \\varepsilon ^{-1}\\log n) for n points in Euclidean plane.", "edit_actions": [{"type": "R", "before": "\\epsilon", "after": "\\varepsilon", "start_char_pos": 68, "end_char_pos": 76}, {"type": "R", "before": "\\epsilon", "after": "\\varepsilon", "start_char_pos": 148, "end_char_pos": 156}, {"type": "R", "before": "\\epsilon", "after": "\\varepsilon", "start_char_pos": 223, "end_char_pos": 231}, {"type": "R", "before": "\\epsilon", "after": "\\varepsilon", "start_char_pos": 352, "end_char_pos": 360}, {"type": "R", "before": "\\epsilon", "after": "\\varepsilon", "start_char_pos": 537, "end_char_pos": 545}, {"type": "R", "before": "\\epsilon", "after": "\\varepsilon", "start_char_pos": 586, "end_char_pos": 594}, {"type": "R", "before": "\\epsilon", "after": "\\varepsilon", "start_char_pos": 664, "end_char_pos": 672}, {"type": "R", "before": "\\epsilon", "after": "\\varepsilon", "start_char_pos": 847, "end_char_pos": 855}, {"type": "R", "before": "\\epsilon", "after": "\\varepsilon", "start_char_pos": 883, "end_char_pos": 891}, {"type": "R", "before": "\\epsilon", "after": "\\varepsilon", "start_char_pos": 1164, "end_char_pos": 1172}, {"type": "R", "before": "\\epsilon", "after": "\\varepsilon", "start_char_pos": 1254, "end_char_pos": 1262}, {"type": "R", "before": "\\epsilon", "after": "\\varepsilon", "start_char_pos": 1302, "end_char_pos": 1310}, {"type": "R", "before": "\\epsilon", "after": "\\varepsilon", "start_char_pos": 1480, "end_char_pos": 1488}, {"type": "R", "before": "\\epsilon", "after": "\\varepsilon", "start_char_pos": 1516, "end_char_pos": 1524}], "sents_char_pos": [0, 88, 420, 556, 739, 791, 1068, 1184, 1395]}
+{"doc_id": "2010.03196", "revision_depth": "1", "before_revision": "Object recognition in unseen indoor environments has been challenging for most state-of-the-art object detectors. To address this challenge , we propose the use of topologically persistent features for object recognition. We extract two kinds of persistent featuresfrom binary segmentation maps, namelysparse PI features and amplitude features, by applying persistent homology to filtrations of the cubical complexes of segmentation mapsgenerated using height functions in multiple directions . The features are used for training a fully connected network for recognition. For performance evaluation, in addition to a widely used shape dataset, we collect new datasets comprising scene images from two different environments, i.e. , a living room and a warehouse. Scene images in both environments consist of up to five different objects with varying poses, chosen from a set of fourteen objects , taken in varying illumination conditions from different distances and camera viewing angles. The overall performance of our methods, trained using living room images, remains relatively unaltered on the unseen warehouse images , without retraining . In contrast, a state-of-the-art object detector's accuracy drops considerably. Our methods also achieve higher overall recall and accuracy than the state-of-the-art in the unseen warehouse environment . We also implement the proposed framework on a real-world robot to demonstrate its usefulness.", "after_revision": "Object recognition in unseen indoor environments remains a challenging problem for visual perception of mobile robots. In this letter , we propose the use of topologically persistent features , which rely on the shape information of the objects, to address this challenge. In particular, we extract two kinds of features, namely, sparse persistence image (PI) and amplitude, by applying persistent homology to multi-directional height function-based filtrations of the cubical complexes representing the object segmentation maps . The features are then used to train a fully connected network for recognition. For performance evaluation, in addition to a widely-used shape dataset, we collect a new dataset comprising scene images from two different environments, namely , a living room and a mock warehouse. The scenes in both the environments include up to five different objects that are chosen from a given set of fourteen objects . The objects have varying poses and arrangements, and are imaged under different illumination conditions and camera poses. The recognition performance of our methods, which are trained using the living room images, remains relatively unaffected on the unseen warehouse images . In contrast, the performance of the state-of-the-art Faster R-CNN method decreases significantly. In fact, the use of sparse PI features yields higher overall recall and accuracy ; and, better F1 scores on many of the individual object classes . We also implement the proposed method on a real-world robot to demonstrate its usefulness.", "edit_actions": [{"type": "R", "before": "has been challenging for most state-of-the-art object detectors. To address this challenge", "after": "remains a challenging problem for visual perception of mobile robots. In this letter", "start_char_pos": 49, "end_char_pos": 139}, {"type": "R", "before": "for object recognition. We", "after": ", which rely on the shape information of the objects, to address this challenge. In particular, we", "start_char_pos": 198, "end_char_pos": 224}, {"type": "D", "before": "persistent featuresfrom binary segmentation maps, namelysparse PI features and amplitude", "after": null, "start_char_pos": 246, "end_char_pos": 334}, {"type": "A", "before": null, "after": "namely, sparse persistence image (PI) and amplitude,", "start_char_pos": 345, "end_char_pos": 345}, {"type": "A", "before": null, "after": "multi-directional height function-based", "start_char_pos": 381, "end_char_pos": 381}, {"type": "R", "before": "of segmentation mapsgenerated using height functions in multiple directions", "after": "representing the object segmentation maps", "start_char_pos": 419, "end_char_pos": 494}, {"type": "R", "before": "used for training", "after": "then used to train", "start_char_pos": 514, "end_char_pos": 531}, {"type": "R", "before": "widely used", "after": "widely-used", "start_char_pos": 620, "end_char_pos": 631}, {"type": "R", "before": "new datasets", "after": "a new dataset", "start_char_pos": 658, "end_char_pos": 670}, {"type": "R", "before": "i.e.", "after": "namely", "start_char_pos": 728, "end_char_pos": 732}, {"type": "R", "before": "warehouse. Scene images in both environments consist of", "after": "mock warehouse. The scenes in both the environments include", "start_char_pos": 755, "end_char_pos": 810}, {"type": "R", "before": "with varying poses,", "after": "that are", "start_char_pos": 840, "end_char_pos": 859}, {"type": "A", "before": null, "after": "given", "start_char_pos": 874, "end_char_pos": 874}, {"type": "R", "before": ", taken in varying illumination conditions from different distances and camera viewing angles. The overall", "after": ". The objects have varying poses and arrangements, and are imaged under different illumination conditions and camera poses. The recognition", "start_char_pos": 899, "end_char_pos": 1005}, {"type": "R", "before": "trained using", "after": "which are trained using the", "start_char_pos": 1034, "end_char_pos": 1047}, {"type": "R", "before": "unaltered", "after": "unaffected", "start_char_pos": 1087, "end_char_pos": 1096}, {"type": "D", "before": ", without retraining", "after": null, "start_char_pos": 1128, "end_char_pos": 1148}, {"type": "R", "before": "a", "after": "the performance of the", "start_char_pos": 1164, "end_char_pos": 1165}, {"type": "R", "before": "object detector's accuracy drops considerably. Our methods also achieve", "after": "Faster R-CNN method decreases significantly. In fact, the use of sparse PI features yields", "start_char_pos": 1183, "end_char_pos": 1254}, {"type": "R", "before": "than the state-of-the-art in the unseen warehouse environment", "after": "; and, better F1 scores on many of the individual object classes", "start_char_pos": 1290, "end_char_pos": 1351}, {"type": "R", "before": "framework", "after": "method", "start_char_pos": 1385, "end_char_pos": 1394}], "sents_char_pos": [0, 113, 221, 496, 574, 765, 993, 1150, 1229, 1353]}
+{"doc_id": "2010.03368", "revision_depth": "1", "before_revision": "This paper entails the application of the energy shaping methodology to control a flexible, elastic Cosserat rod model of a single octopus arm. The principal focus and novel contribution of this work is two-fold: (i) reduced order control oriented modeling of the realistic internal muscular architecture in an octopus arm; and (ii) incorporation of such models into the energy shaping methodology, extending our prior work by formally accounting for muscle constraints. Extension of the control scheme to the under-actuated muscle control case involves two steps: (i) design of a desired potential energy function whose static minimizer solves a given control task; and (ii) implementing the resulting energy shaping control input into the dynamic model. Due to the muscle actuator constraints, the desired potential energy function may not be arbitrarily chosen. Indeed, the desired energy must now satisfy a partial differential equation, known as the matching condition, which is derived for the infinite dimensional Hamiltonian control system. A particular solution to those matching conditions is described, paving the way to the application of energy shaping methodology . The overall control design methodology including muscle models is implemented and demonstrated in a dynamic simulation environment . Results of several bio-inspired numerical experiments involving the control of octopus arms are reported.", "after_revision": "This paper presents an application of the energy shaping methodology to control a flexible, elastic Cosserat rod model of a single octopus arm. The novel contributions of this work are two-fold: (i) a control-oriented modeling of the anatomically realistic internal muscular architecture of an octopus arm; and (ii) the integration of these muscle models into the energy shaping control methodology. The control-oriented modeling takes inspiration in equal parts from theories of nonlinear elasticity and energy shaping control . By introducing a stored energy function for muscles, the difficulties associated with explicitly solving the matching conditions of the energy shaping methodology are avoided . The overall control design problem is posed as a bilevel optimization problem. Its solution is obtained through iterative algorithms. The methodology is numerically implemented and demonstrated in a full-scale dynamic simulation environment Elastica. Two bio-inspired numerical experiments involving the control of octopus arms are reported.", "edit_actions": [{"type": "R", "before": "entails the", "after": "presents an", "start_char_pos": 11, "end_char_pos": 22}, {"type": "R", "before": "principal focus and novel contribution", "after": "novel contributions", "start_char_pos": 148, "end_char_pos": 186}, {"type": "R", "before": "is", "after": "are", "start_char_pos": 200, "end_char_pos": 202}, {"type": "R", "before": "reduced order control oriented", "after": "a control-oriented", "start_char_pos": 217, "end_char_pos": 247}, {"type": "A", "before": null, "after": "anatomically", "start_char_pos": 264, "end_char_pos": 264}, {"type": "R", "before": "in", "after": "of", "start_char_pos": 306, "end_char_pos": 308}, {"type": "R", "before": "incorporation of such", "after": "the integration of these muscle", "start_char_pos": 334, "end_char_pos": 355}, {"type": "R", "before": "methodology, extending our prior work by formally accounting for muscle constraints. Extension of the control scheme to the under-actuated muscle control case involves two steps: (i) design of a desired potential energy function whose static minimizer solves a given control task; and (ii) implementing the resulting", "after": "control methodology. The control-oriented modeling takes inspiration in equal parts from theories of nonlinear elasticity and", "start_char_pos": 387, "end_char_pos": 703}, {"type": "R", "before": "input into the dynamic model. Due to the muscle actuator constraints, the desired potential energy function may not be arbitrarily chosen. Indeed, the desired energy must now satisfy a partial differential equation, known as the matching condition, which is derived for the infinite dimensional Hamiltonian control system. A particular solution to those matching conditions is described, paving the way to the application of", "after": ". By introducing a stored energy function for muscles, the difficulties associated with explicitly solving the matching conditions of the", "start_char_pos": 727, "end_char_pos": 1151}, {"type": "A", "before": null, "after": "are avoided", "start_char_pos": 1179, "end_char_pos": 1179}, {"type": "R", "before": "methodology including muscle models is", "after": "problem is posed as a bilevel optimization problem. Its solution is obtained through iterative algorithms. The methodology is numerically", "start_char_pos": 1209, "end_char_pos": 1247}, {"type": "A", "before": null, "after": "full-scale", "start_char_pos": 1282, "end_char_pos": 1282}, {"type": "R", "before": ". Results of several", "after": "Elastica. Two", "start_char_pos": 1314, "end_char_pos": 1334}], "sents_char_pos": [0, 143, 324, 471, 667, 756, 865, 1049, 1181]}
+{"doc_id": "2010.03399", "revision_depth": "1", "before_revision": "Isolation of symptomatic individuals, together with tracing and testing of their nonsymptomatic contacts , is a fundamental strategy for mitigating the current COVID-19 pandemic before pharmaceutical interventions become available . The breaking of contagion chains relies on two main alternative strategies: manual reconstruction of contacts based on interviews or a digital (app-based) privacy-preserving contact tracing protocol . We compare in the same framework the effectiveness of the two strategies within the activity-driven model, a general empirically validated framework for network dynamics. Using model parameters tailored to describe SARS-CoV-2 diffusion, we show thateven when the probability for a contact to be traced is the same, manual contact tracing robustly performs better than the digital protocol in increasing the epidemic threshold, limiting the height of the epidemic peaks and reducing the number of isolated individuals. This remains true even taking into account the intrinsic delay and limited scalability of the manual procedure. This result is explained in terms of the stochastic sampling occurring during the case-by-case manual reconstruction of contacts of infected individuals , contrasted with the intrinsically prearranged nature of digital tracing, determined by the decision to adopt the app or not of each individual. The better performance of manual tracing is enhanced by the heterogeneous features of agent behavior: a superspreader not adopting the app is completely invisible to digital contact tracing, while she can be traced manually, due to her multiple contacts. Our results indicate a careful integration of the two intrinsically different protocolsas key to optimal mitigation strategies .", "after_revision": "Isolation of symptomatic individuals, tracing and testing of their nonsymptomatic contacts are fundamental strategies for mitigating the current COVID-19 pandemic . The breaking of contagion chains relies on two complementary strategies: manual reconstruction of contacts based on interviews and a digital (app-based) privacy-preserving contact tracing . We compare their effectiveness using model parameters tailored to describe SARS-CoV-2 diffusion within the activity-driven model, a general empirically validated framework for network dynamics. We show that, even for equal probability of tracing a contact, manual tracing robustly performs better than the digital protocol , also taking into account the intrinsic delay and limited scalability of the manual procedure. This result is explained in terms of the stochastic sampling occurring during the case-by-case manual reconstruction of contacts , contrasted with the intrinsically prearranged nature of digital tracing, determined by the decision to adopt the app or not by each individual. The better performance of manual tracing is enhanced by heterogeneity in agent behavior: superspreaders not adopting the app are completely invisible to digital contact tracing, while they can be easily traced manually, due to their multiple contacts. We show that this intrinsic difference makes the manual procedure dominant in realistic hybrid protocols .", "edit_actions": [{"type": "D", "before": "together with", "after": null, "start_char_pos": 38, "end_char_pos": 51}, {"type": "R", "before": ", is a fundamental strategy", "after": "are fundamental strategies", "start_char_pos": 105, "end_char_pos": 132}, {"type": "D", "before": "before pharmaceutical interventions become available", "after": null, "start_char_pos": 178, "end_char_pos": 230}, {"type": "R", "before": "main alternative", "after": "complementary", "start_char_pos": 280, "end_char_pos": 296}, {"type": "R", "before": "or", "after": "and", "start_char_pos": 363, "end_char_pos": 365}, {"type": "D", "before": "protocol", "after": null, "start_char_pos": 423, "end_char_pos": 431}, {"type": "R", "before": "in the same framework the effectiveness of the two strategies", "after": "their effectiveness using model parameters tailored to describe SARS-CoV-2 diffusion", "start_char_pos": 445, "end_char_pos": 506}, {"type": "R", "before": "Using model parameters tailored to describe SARS-CoV-2 diffusion, we show thateven when the probability for a contact to be traced is the same, manual contact", "after": "We show that, even for equal probability of tracing a contact, manual", "start_char_pos": 605, "end_char_pos": 763}, {"type": "R", "before": "in increasing the epidemic threshold, limiting the height of the epidemic peaks and reducing the number of isolated individuals. This remains true even", "after": ", also", "start_char_pos": 823, "end_char_pos": 974}, {"type": "D", "before": "of infected individuals", "after": null, "start_char_pos": 1193, "end_char_pos": 1216}, {"type": "R", "before": "of", "after": "by", "start_char_pos": 1343, "end_char_pos": 1345}, {"type": "R", "before": "the heterogeneous features of", "after": "heterogeneity in", "start_char_pos": 1419, "end_char_pos": 1448}, {"type": "R", "before": "a superspreader", "after": "superspreaders", "start_char_pos": 1465, "end_char_pos": 1480}, {"type": "R", "before": "is", "after": "are", "start_char_pos": 1502, "end_char_pos": 1504}, {"type": "R", "before": "she can be", "after": "they can be easily", "start_char_pos": 1560, "end_char_pos": 1570}, {"type": "R", "before": "her", "after": "their", "start_char_pos": 1595, "end_char_pos": 1598}, {"type": "R", "before": "Our results indicate a careful integration of the two intrinsically different protocolsas key to optimal mitigation strategies", "after": "We show that this intrinsic difference makes the manual procedure dominant in realistic hybrid protocols", "start_char_pos": 1618, "end_char_pos": 1744}], "sents_char_pos": [0, 232, 433, 604, 951, 1063, 1362, 1617]}
+{"doc_id": "2010.03496", "revision_depth": "1", "before_revision": "We present a method for learning representations of entities, that uses a Transformer-based architecture as an entity encoder, and link prediction training on a knowledge graph with textual entity descriptions . We demonstrate that our approach can be applied effectively for link prediction in different inductive settings involving entities not seen during training , outperforming related state-of-the-art methods (22\\% MRR improvement on average). We provide evidence that the learned representations transfer to other tasks that do not require fine-tuning the entity encoder. In an entity classification task we obtain an average improvement of 16\\% accuracy compared with baselines that also employ pre-trained models. For an information retrieval task, significant improvements of up to 8.8\\% in NDCG@10 were obtained for natural language queries .", "after_revision": "Knowledge Graphs (KG) are of vital importance for multiple applications on the web, including information retrieval, recommender systems, and metadata annotation. Regardless of whether they are built manually by domain experts or with automatic pipelines, KGs are often incomplete. Recent work has begun to explore the use of textual descriptions available in knowledge graphs to learn vector representations of entities in order to preform link prediction. However, the extent to which these representations learned for link prediction generalize to other tasks is unclear. This is important given the cost of learning such representations. Ideally, we would prefer representations that do not need to be trained again when transferring to a different task, while retaining reasonable performance. In this work, we propose a holistic evaluation protocol for entity representations learned via a link prediction objective. We consider the inductive link prediction and entity classification tasks, which involve entities not seen during training . We also consider an information retrieval task for entity-oriented search. We evaluate an architecture based on a pretrained language model, that exhibits strong generalization to entities not observed during training, and outperforms related state-of-the-art methods (22\\% MRR improvement in link prediction on average). We further provide evidence that the learned representations transfer well to other tasks without fine-tuning . In the entity classification task we obtain an average improvement of 16\\% in accuracy compared with baselines that also employ pre-trained models. In the information retrieval task, we obtain significant improvements of up to 8.8\\% in NDCG@10 for natural language queries . We thus show that the learned representations are not limited KG-specific tasks, and have greater generalization properties than evaluated in previous work .", "edit_actions": [{"type": "R", "before": "We present a method for learning representations of entities, that uses a Transformer-based architecture as an entity encoder, and link prediction training on a knowledge graph with textual entity descriptions . We demonstrate that our approach can be applied effectively for link prediction in different inductive settings involving", "after": "Knowledge Graphs (KG) are of vital importance for multiple applications on the web, including information retrieval, recommender systems, and metadata annotation. Regardless of whether they are built manually by domain experts or with automatic pipelines, KGs are often incomplete. Recent work has begun to explore the use of textual descriptions available in knowledge graphs to learn vector representations of entities in order to preform link prediction. However, the extent to which these representations learned for link prediction generalize to other tasks is unclear. This is important given the cost of learning such representations. Ideally, we would prefer representations that do not need to be trained again when transferring to a different task, while retaining reasonable performance. In this work, we propose a holistic evaluation protocol for entity representations learned via a link prediction objective. We consider the inductive link prediction and entity classification tasks, which involve", "start_char_pos": 0, "end_char_pos": 333}, {"type": "R", "before": ", outperforming", "after": ". We also consider an information retrieval task for entity-oriented search. We evaluate an architecture based on a pretrained language model, that exhibits strong generalization to entities not observed during training, and outperforms", "start_char_pos": 368, "end_char_pos": 383}, {"type": "A", "before": null, "after": "in link prediction", "start_char_pos": 439, "end_char_pos": 439}, {"type": "A", "before": null, "after": "further", "start_char_pos": 456, "end_char_pos": 456}, {"type": "A", "before": null, "after": "well", "start_char_pos": 516, "end_char_pos": 516}, {"type": "R", "before": "that do not require", "after": "without", "start_char_pos": 532, "end_char_pos": 551}, {"type": "R", "before": "the entity encoder. In an", "after": ". In the", "start_char_pos": 564, "end_char_pos": 589}, {"type": "A", "before": null, "after": "in", "start_char_pos": 658, "end_char_pos": 658}, {"type": "R", "before": "For an", "after": "In the", "start_char_pos": 729, "end_char_pos": 735}, {"type": "A", "before": null, "after": "we obtain", "start_char_pos": 764, "end_char_pos": 764}, {"type": "D", "before": "were obtained", "after": null, "start_char_pos": 816, "end_char_pos": 829}, {"type": "A", "before": null, "after": ". We thus show that the learned representations are not limited KG-specific tasks, and have greater generalization properties than evaluated in previous work", "start_char_pos": 859, "end_char_pos": 859}], "sents_char_pos": [0, 211, 452, 583, 728]}
+{"doc_id": "2010.04388", "revision_depth": "1", "before_revision": "Purpose: To stabilize the NLPContributionGraph scheme for the surface structuring of contributions information in Natural Language Processing (NLP) scholarly articles via a two-stage annotation methodology: first stage - to define the scheme ; and second stage - to stabilize the graphing model . Approach: Re-annotate , a second time, the contributions-pertinent information across 50 prior-annotated NLP scholarly articles in terms of a data pipeline comprising: contribution-centered sentences, phrases, and triples . To this end specifically, care was taken in the second annotation stage to reduce annotation noise while formulating the guidelines for our proposed novel NLP contributions structuring scheme. Findings: The application of NLPContributionGraph on the 50 articles resulted in finally in a dataset of 900 contribution-focused sentences, 4,702 contribution-information-centered phrases, and 2,980 surface-structured triples. The intra-annotation agreement between the first and second stages, in terms of F1, was 67.92\\% for sentences, 41.82\\% for phrases, and 22.31\\% for triples indicating that with an increased granularity of the information, the annotation decision variance is greater. Practical Implications: Demonstrate NLPContributionGraph data integrated in the Open Research Knowledge Graph (ORKG), a next-generation KG-based digital library with compute enabled over structured scholarly knowledge, as a viable aid to assist researchers in their day-to-day tasks . Value: NLPContributionGraph is a novel scheme to obtain research contribution-centered graphs from NLP articles which to the best of our knowledge does not exist in the community. And our quantitative evaluations over the two-stage annotation tasks offer insights into task difficulty .", "after_revision": "Purpose: The aim of this work is to normalize the NLPCONTRIBUTIONS scheme (henceforward, NLPCONTRIBUTIONGRAPH) to structure, directly from article sentences, the contributions information in Natural Language Processing (NLP) scholarly articles via a two-stage annotation methodology: 1) pilot stage - to define the scheme (described in prior work); and 2) adjudication stage - to normalize the graphing model (the focus of this paper). Design/methodology/approach: We re-annotate , a second time, the contributions-pertinent information across 50 prior-annotated NLP scholarly articles in terms of a data pipeline comprising: contribution-centered sentences, phrases, and triple statements . To this end , specifically, care was taken in the adjudication annotation stage to reduce annotation noise while formulating the guidelines for our proposed novel NLP contributions structuring and graphing scheme. Findings: The application of NLPCONTRIBUTIONGRAPH on the 50 articles resulted finally in a dataset of 900 contribution-focused sentences, 4,702 contribution-information-centered phrases, and 2,980 surface-structured triples. The intra-annotation agreement between the first and second stages, in terms of F1, was 67.92\\% for sentences, 41.82\\% for phrases, and 22.31\\% for triple statements indicating that with increased granularity of the information, the annotation decision variance is greater. Practical Implications: We demonstrate NLPCONTRIBUTIONGRAPH data integrated into the Open Research Knowledge Graph (ORKG), a next-generation KG-based digital library with intelligent computations enabled over structured scholarly knowledge, as a viable aid to assist researchers in their day-to-day tasks .", "edit_actions": [{"type": "R", "before": "To stabilize the NLPContributionGraph scheme for the surface structuring of", "after": "The aim of this work is to normalize the NLPCONTRIBUTIONS scheme (henceforward, NLPCONTRIBUTIONGRAPH) to structure, directly from article sentences, the", "start_char_pos": 9, "end_char_pos": 84}, {"type": "R", "before": "first", "after": "1) pilot", "start_char_pos": 207, "end_char_pos": 212}, {"type": "R", "before": "; and second", "after": "(described in prior work); and 2) adjudication", "start_char_pos": 242, "end_char_pos": 254}, {"type": "R", "before": "stabilize", "after": "normalize", "start_char_pos": 266, "end_char_pos": 275}, {"type": "R", "before": ". Approach: Re-annotate", "after": "(the focus of this paper). Design/methodology/approach: We re-annotate", "start_char_pos": 295, "end_char_pos": 318}, {"type": "R", "before": "triples", "after": "triple statements", "start_char_pos": 511, "end_char_pos": 518}, {"type": "A", "before": null, "after": ",", "start_char_pos": 533, "end_char_pos": 533}, {"type": "R", "before": "second", "after": "adjudication", "start_char_pos": 570, "end_char_pos": 576}, {"type": "A", "before": null, "after": "and graphing", "start_char_pos": 707, "end_char_pos": 707}, {"type": "R", "before": "NLPContributionGraph", "after": "NLPCONTRIBUTIONGRAPH", "start_char_pos": 745, "end_char_pos": 765}, {"type": "D", "before": "in", "after": null, "start_char_pos": 794, "end_char_pos": 796}, {"type": "R", "before": "triples", "after": "triple statements", "start_char_pos": 1092, "end_char_pos": 1099}, {"type": "D", "before": "an", "after": null, "start_char_pos": 1121, "end_char_pos": 1123}, {"type": "R", "before": "Demonstrate NLPContributionGraph data integrated in", "after": "We demonstrate NLPCONTRIBUTIONGRAPH data integrated into", "start_char_pos": 1235, "end_char_pos": 1286}, {"type": "R", "before": "compute", "after": "intelligent computations", "start_char_pos": 1377, "end_char_pos": 1384}, {"type": "D", "before": ". Value: NLPContributionGraph is a novel scheme to obtain research contribution-centered graphs from NLP articles which to the best of our knowledge does not exist in the community. And our quantitative evaluations over the two-stage annotation tasks offer insights into task difficulty", "after": null, "start_char_pos": 1494, "end_char_pos": 1780}], "sents_char_pos": [0, 243, 520, 715, 943, 1210, 1675]}
+{"doc_id": "2010.04412", "revision_depth": "1", "before_revision": "We study the problem of extracting a small subset of representative items from a large data stream. Following the convention in many data mining and machine learning applications such as data summarization, recommender systems, and social network analysis , the problem is formulated as maximizing a monotone submodular function subject to a cardinality constraint -- i.e., the size of the selected subset is restricted to be smaller than or equal to an input integer k. In this paper , we consider the problem with additionalfairness constraints , which takes into account the group membership of data items and limits the number of items selected from each group to a given number. We propose efficient algorithms for this fairness-aware variant of the streaming submodular maximization problem. In particular, we first provide a (\\frac{1}{2}-\\varepsilon) -approximation algorithm that requires O(\\frac{1}{\\varepsilon} \\cdot \\log \\frac{k}{\\varepsilon}) passes over the stream for any constant \\varepsilon>0 . In addition, we design a single-pass streaming algorithm that has the same (\\frac{1}{2}-\\varepsilon) approximation ratio when unlimited buffer size and post-processing time is permitted\\emph{ \\emph{ .", "after_revision": "We study the problem of extracting a small subset of representative items from a large data stream. In many data mining and machine learning applications such as social network analysis and recommender systems, this problem can be formulated as maximizing a monotone submodular function subject to a cardinality constraint k. In this work , we consider the setting where data items in the stream belong to one of several disjoint groups and investigate the optimization problem with an additionalfairness constraint that limits selection to a given number of items from each group . We then propose efficient algorithms for the fairness-aware variant of the streaming submodular maximization problem. In particular, we first give a (\\frac{1}{2}-\\varepsilon) -approximation algorithm that requires O(\\frac{1}{\\varepsilon} \\log \\frac{k}{\\varepsilon}) passes over the stream for any constant \\varepsilon>0 . Moreover, we give a single-pass streaming algorithm that has the same approximation ratio of (\\frac{1}{2}-\\varepsilon) when unlimited buffer sizes and post-processing time are permitted, and discuss how to adapt it to more practical settings where the buffer sizes are bounded. Finally, we demonstrate the efficiency and effectiveness of our proposed algorithms on two real-world applications, namely\\emph{maximum coverage on large graphs and\\emph{personalized recommendation .", "edit_actions": [{"type": "R", "before": "Following the convention in", "after": "In", "start_char_pos": 100, "end_char_pos": 127}, {"type": "D", "before": "data summarization, recommender systems, and", "after": null, "start_char_pos": 187, "end_char_pos": 231}, {"type": "R", "before": ", the problem is", "after": "and recommender systems, this problem can be", "start_char_pos": 256, "end_char_pos": 272}, {"type": "D", "before": "-- i.e., the size of the selected subset is restricted to be smaller than or equal to an input integer", "after": null, "start_char_pos": 365, "end_char_pos": 467}, {"type": "R", "before": "paper", "after": "work", "start_char_pos": 479, "end_char_pos": 484}, {"type": "D", "before": "problem with additional", "after": null, "start_char_pos": 503, "end_char_pos": 526}, {"type": "D", "before": "fairness constraints", "after": null, "start_char_pos": 526, "end_char_pos": 546}, {"type": "R", "before": ", which takes into account the group membership of data items and limits the", "after": "setting where data items in the stream belong to one of several disjoint groups and investigate the optimization problem with an additional", "start_char_pos": 547, "end_char_pos": 623}, {"type": "A", "before": null, "after": "fairness", "start_char_pos": 623, "end_char_pos": 623}, {"type": "A", "before": null, "after": "constraint that limits selection to a given", "start_char_pos": 624, "end_char_pos": 624}, {"type": "D", "before": "selected", "after": null, "start_char_pos": 641, "end_char_pos": 649}, {"type": "R", "before": "to a given number. We", "after": ". We then", "start_char_pos": 666, "end_char_pos": 687}, {"type": "R", "before": "this", "after": "the", "start_char_pos": 721, "end_char_pos": 725}, {"type": "R", "before": "provide", "after": "give", "start_char_pos": 823, "end_char_pos": 830}, {"type": "D", "before": "\\cdot", "after": null, "start_char_pos": 922, "end_char_pos": 927}, {"type": "R", "before": "In addition, we design", "after": "Moreover, we give", "start_char_pos": 1012, "end_char_pos": 1034}, {"type": "A", "before": null, "after": "approximation ratio of", "start_char_pos": 1087, "end_char_pos": 1087}, {"type": "D", "before": "approximation ratio", "after": null, "start_char_pos": 1114, "end_char_pos": 1133}, {"type": "R", "before": "size", "after": "sizes", "start_char_pos": 1156, "end_char_pos": 1160}, {"type": "R", "before": "is permitted", "after": "are permitted, and discuss how to adapt it to more practical settings where the buffer sizes are bounded. Finally, we demonstrate the efficiency and effectiveness of our proposed algorithms on two real-world applications, namely", "start_char_pos": 1186, "end_char_pos": 1198}, {"type": "A", "before": null, "after": "maximum coverage on large graphs", "start_char_pos": 1204, "end_char_pos": 1204}, {"type": "A", "before": null, "after": "and", "start_char_pos": 1205, "end_char_pos": 1205}, {"type": "A", "before": null, "after": "personalized recommendation", "start_char_pos": 1211, "end_char_pos": 1211}], "sents_char_pos": [0, 99, 470, 684, 798]}
+{"doc_id": "2010.05134", "revision_depth": "1", "before_revision": "We present a deep imitation learning framework for robotic bimanual manipulation in a continuous state-action space. Imitation learning has been effectively utilized in mimicking bimanual manipulation movements, but generalizing the movement to objects in different locations has not been explored . We hypothesize that to precisely generalize the learned behavior relative to an object's location requires modeling relational information in the environment . To achieve this, we designed a method that (i) uses a multi-model framework to decomposes complex dynamics into elemental movement primitives, and (ii) parameterizes each primitive using a recurrent graph neural network to capture interactions . Our model is a deep, hierarchical, modular architecture with a high-level planner that learns to compose primitives sequentially and a low-level controller which integrates primitive dynamics modules and inverse kinematics control. We demonstrate the effectiveness using several simulated bimanual robotic manipulation tasks . Compared to models based on previous imitation learning studies , our model generalizes better and achieves higher success rates in the simulated tasks.", "after_revision": "We present a deep imitation learning framework for robotic bimanual manipulation in a continuous state-action space. A core challenge is to generalize the manipulation skills to objects in different locations . We hypothesize that modeling the relational information in the environment can significantly improve generalization . To achieve this, we propose to (i) decompose the multi-modal dynamics into elemental movement primitives, (ii) parameterize each primitive using a recurrent graph neural network to capture interactions , and (iii) integrate a high-level planner that composes primitives sequentially and a low-level controller to combine primitive dynamics and inverse kinematics control. Our model is a deep, hierarchical, modular architecture . Compared to baselines , our model generalizes better and achieves higher success rates on several simulated bimanual robotic manipulation tasks. We open source the code for simulation, data, and models at: URL", "edit_actions": [{"type": "R", "before": "Imitation learning has been effectively utilized in mimicking bimanual manipulation movements, but generalizing the movement", "after": "A core challenge is to generalize the manipulation skills", "start_char_pos": 117, "end_char_pos": 241}, {"type": "D", "before": "has not been explored", "after": null, "start_char_pos": 276, "end_char_pos": 297}, {"type": "R", "before": "to precisely generalize the learned behavior relative to an object's location requires modeling", "after": "modeling the", "start_char_pos": 320, "end_char_pos": 415}, {"type": "A", "before": null, "after": "can significantly improve generalization", "start_char_pos": 458, "end_char_pos": 458}, {"type": "R", "before": "designed a method that", "after": "propose to", "start_char_pos": 481, "end_char_pos": 503}, {"type": "R", "before": "uses a multi-model framework to decomposes complex", "after": "decompose the multi-modal", "start_char_pos": 508, "end_char_pos": 558}, {"type": "D", "before": "and", "after": null, "start_char_pos": 604, "end_char_pos": 607}, {"type": "R", "before": "parameterizes", "after": "parameterize", "start_char_pos": 613, "end_char_pos": 626}, {"type": "R", "before": ". Our model is a deep, hierarchical, modular architecture with", "after": ", and (iii) integrate", "start_char_pos": 705, "end_char_pos": 767}, {"type": "R", "before": "learns to compose", "after": "composes", "start_char_pos": 794, "end_char_pos": 811}, {"type": "R", "before": "which integrates primitive dynamics modules", "after": "to combine primitive dynamics", "start_char_pos": 863, "end_char_pos": 906}, {"type": "R", "before": "We demonstrate the effectiveness using several simulated bimanual robotic manipulation tasks", "after": "Our model is a deep, hierarchical, modular architecture", "start_char_pos": 939, "end_char_pos": 1031}, {"type": "R", "before": "models based on previous imitation learning studies", "after": "baselines", "start_char_pos": 1046, "end_char_pos": 1097}, {"type": "R", "before": "in the simulated tasks.", "after": "on several simulated bimanual robotic manipulation tasks. We open source the code for simulation, data, and models at: URL", "start_char_pos": 1163, "end_char_pos": 1186}], "sents_char_pos": [0, 116, 299, 460, 706, 938]}
+{"doc_id": "2010.06322", "revision_depth": "1", "before_revision": "The additional degrees of freedom and missing counterparts in nature make designing locomotion capabilities for wheeled-legged robots more challenging. We propose a whole-body model predictive controller as a single task formulation that simultaneously optimizes wheel and torso motions. Due to the real-time joint velocity and ground reaction force optimization based on a kinodynamic model , our approachaccurately captures the real robot's dynamics and automatically discovers complex and dynamic motions cumbersome to hand-craft through heuristics. Thanks to the single set of parameters for all behaviors, whole-body optimization makes online gait sequence adaptation possible. Aperiodic gait sequences are automatically found through kinematic leg utilities without the need for predefined contact and lift-off timings . Also, this enables us to reduce the cost of transport of wheeled-legged robots significantly . Our experiments demonstrate highly dynamic motions on a quadrupedal robot with non-steerable wheels in challenging indoor and outdoor environments. Herewith, we verify that a single task formulation is key to reveal the full potential of wheeled-legged robots .", "after_revision": "Our paper proposes a model predictive controller as a single-task formulation that simultaneously optimizes wheel and torso motions. This online joint velocity and ground reaction force optimization integrates a kinodynamic model of a wheeled quadrupedal robot. It defines the single rigid body dynamics along with the robot's kinematics while treating the wheels as moving ground contacts. With this approach, we can accurately capture the robot's rolling constraint and dynamics, enabling automatic discovery of hybrid maneuvers without needless motion heuristics. The formulation's generality through the simultaneous optimization over the robot's whole-body variables allows for a single set of parameters and makes online gait sequence adaptation possible. Aperiodic gait sequences are automatically found through kinematic leg utilities without the need for predefined contact and lift-off timings , reducing the cost of transport by up to 85\\% . Our experiments demonstrate dynamic motions on a quadrupedal robot with non-steerable wheels in challenging indoor and outdoor environments. The paper's findings contribute to evaluating a decomposed, i.e., sequential optimization of wheel and torso motion, and single-task motion planner with a novel quantity, the prediction error, which describes how well a receding horizon planner can predict the robot's future state. To this end, we report an improvement of up to 71\\% using our proposed single-task approach, making fast locomotion feasible and revealing wheeled-legged robots ' full potential .", "edit_actions": [{"type": "R", "before": "The additional degrees of freedom and missing counterparts in nature make designing locomotion capabilities for wheeled-legged robots more challenging. We propose a whole-body", "after": "Our paper proposes a", "start_char_pos": 0, "end_char_pos": 175}, {"type": "R", "before": "single task", "after": "single-task", "start_char_pos": 209, "end_char_pos": 220}, {"type": "R", "before": "Due to the real-time", "after": "This online", "start_char_pos": 288, "end_char_pos": 308}, {"type": "R", "before": "based on", "after": "integrates", "start_char_pos": 363, "end_char_pos": 371}, {"type": "R", "before": ", our approachaccurately captures the real", "after": "of a wheeled quadrupedal robot. It defines the single rigid body dynamics along with the robot's kinematics while treating the wheels as moving ground contacts. With this approach, we can accurately capture the", "start_char_pos": 392, "end_char_pos": 434}, {"type": "R", "before": "dynamics and automatically discovers complex and dynamic motions cumbersome to hand-craft through heuristics. Thanks to the", "after": "rolling constraint and dynamics, enabling automatic discovery of hybrid maneuvers without needless motion heuristics. The formulation's generality through the simultaneous optimization over the robot's whole-body variables allows for a", "start_char_pos": 443, "end_char_pos": 566}, {"type": "R", "before": "for all behaviors, whole-body optimization", "after": "and", "start_char_pos": 592, "end_char_pos": 634}, {"type": "R", "before": ". Also, this enables us to reduce", "after": ", reducing", "start_char_pos": 825, "end_char_pos": 858}, {"type": "R", "before": "of wheeled-legged robots significantly", "after": "by up to 85\\%", "start_char_pos": 881, "end_char_pos": 919}, {"type": "D", "before": "highly", "after": null, "start_char_pos": 950, "end_char_pos": 956}, {"type": "R", "before": "Herewith, we verify that a single task formulation is key to reveal the full potential of", "after": "The paper's findings contribute to evaluating a decomposed, i.e., sequential optimization of wheel and torso motion, and single-task motion planner with a novel quantity, the prediction error, which describes how well a receding horizon planner can predict the robot's future state. To this end, we report an improvement of up to 71\\% using our proposed single-task approach, making fast locomotion feasible and revealing", "start_char_pos": 1070, "end_char_pos": 1159}, {"type": "A", "before": null, "after": "' full potential", "start_char_pos": 1182, "end_char_pos": 1182}], "sents_char_pos": [0, 151, 287, 552, 682, 826, 921, 1069]}
+{"doc_id": "2010.06723", "revision_depth": "1", "before_revision": "China's pledge to reach carbon neutrality by 2060 is ambitious and could provide the world with much-needed leadership on how to achieve a +1.5 degC warming target above pre-industrial levels by the end of the century. But the pathways that would achieve net zero by 2060 are still unclear including the dependence on negative emissions technologies. Here, we use the Global Change Analysis Model (GCAM 5.3), a dynamic-recursive, technology-rich integrated assessment model, to simulate how negative emissions technologies, in general, and direct air capture (DAC) , in particular, will contribute to China's meeting this target. Our results show that , for China to be net-zero in 2060, it would need to deploy negative emissions technologies (NETs) at very large scales, on the order of 2.5 GtCO2 negative emissions per year with up to 1.5 GtCO2 per year of that coming from DAC. DAC, like other forms of negative emissions , such as bioenergy with carbon capture and storage and afforestation is an emerging technology that has not been demonstrated at a commercial scale . Deploying NETs at this scale will have widespread impacts on financial systems and resources availability such as water, land, and energy in China and beyond .", "after_revision": "China's pledge to reach carbon neutrality before 2060 is an ambitious goal and could provide the world with much-needed leadership on how to limit warming to +1.5 C warming above pre-industrial levels by the end of the century. But the pathways that would achieve net zero by 2060 are still unclear , including the role of negative emissions technologies. We use the Global Change Analysis Model to simulate how negative emissions technologies, in general, and direct air capture (DAC) in particular, could contribute to China's meeting this target. Our results show that negative emissions could play a large role, offsetting on the order of 3 GtCO2 per year from difficult-to-mitigate sectors such as freight transportation and heavy industry. This includes up to a 1.6 GtCO2 per year contribution from DAC , constituting up to 60\\% of total projected negative emissions in China. But DAC, like bioenergy with carbon capture and storage and afforestation , has not yet been demonstrated at anywhere approaching the scales required to meaningfully contribute to climate mitigation . Deploying NETs at these scales will have widespread impacts on financial systems and natural resources such as water, land, and energy in China .", "edit_actions": [{"type": "R", "before": "by", "after": "before", "start_char_pos": 42, "end_char_pos": 44}, {"type": "R", "before": "ambitious", "after": "an ambitious goal", "start_char_pos": 53, "end_char_pos": 62}, {"type": "R", "before": "achieve a", "after": "limit warming to", "start_char_pos": 129, "end_char_pos": 138}, {"type": "R", "before": "degC warming target", "after": "C warming", "start_char_pos": 144, "end_char_pos": 163}, {"type": "R", "before": "including the dependence on", "after": ", including the role of", "start_char_pos": 290, "end_char_pos": 317}, {"type": "R", "before": "Here, we", "after": "We", "start_char_pos": 351, "end_char_pos": 359}, {"type": "D", "before": "(GCAM 5.3), a dynamic-recursive, technology-rich integrated assessment model,", "after": null, "start_char_pos": 397, "end_char_pos": 474}, {"type": "D", "before": ",", "after": null, "start_char_pos": 565, "end_char_pos": 566}, {"type": "R", "before": "will", "after": "could", "start_char_pos": 582, "end_char_pos": 586}, {"type": "R", "before": ", for China to be net-zero in 2060, it would need to deploy negative emissions technologies (NETs) at very large scales,", "after": "negative emissions could play a large role, offsetting", "start_char_pos": 652, "end_char_pos": 772}, {"type": "R", "before": "2.5", "after": "3", "start_char_pos": 789, "end_char_pos": 792}, {"type": "R", "before": "negative emissions per year with up to 1.5", "after": "per year from difficult-to-mitigate sectors such as freight transportation and heavy industry. This includes up to a 1.6", "start_char_pos": 799, "end_char_pos": 841}, {"type": "R", "before": "of that coming from DAC. DAC, like other forms of negative emissions", "after": "contribution from DAC", "start_char_pos": 857, "end_char_pos": 925}, {"type": "R", "before": "such as", "after": "constituting up to 60\\% of total projected negative emissions in China. But DAC, like", "start_char_pos": 928, "end_char_pos": 935}, {"type": "R", "before": "is an emerging technology that has not", "after": ", has not yet", "start_char_pos": 996, "end_char_pos": 1034}, {"type": "R", "before": "a commercial scale", "after": "anywhere approaching the scales required to meaningfully contribute to climate mitigation", "start_char_pos": 1056, "end_char_pos": 1074}, {"type": "R", "before": "this scale", "after": "these scales", "start_char_pos": 1095, "end_char_pos": 1105}, {"type": "R", "before": "resources availability", "after": "natural resources", "start_char_pos": 1160, "end_char_pos": 1182}, {"type": "D", "before": "and beyond", "after": null, "start_char_pos": 1224, "end_char_pos": 1234}], "sents_char_pos": [0, 218, 350, 629, 881]}
+{"doc_id": "2010.07152", "revision_depth": "1", "before_revision": "Link prediction based on knowledge graph embedding (KGE) aims to predict new triples to complete knowledge graphs (KGs) automatically . However, recent KGE models tend to improve performance by excessively increasing vector dimensions, which would cause enormous training costs and save storage in practical applications. To address this problem, we first theoretically analyze the capacity of low-dimensional space for KG embeddings based on the principle of minimum entropy. Then , we propose a novel knowledge distillation framework for knowledge graph embedding, utilizing multiple low-dimensional KGE models as teachers . Under a novel iterative distillation strategy, the MulDE modelproduces soft labels according to training epochs and student performance adaptively . The experimental results show that MulDE can effectively improve the performance and training speed of low-dimensional KGE models. The distilled 32-dimensional models are very competitive compared to some of state-or-the-art (SotA) high-dimensional methods on several commonly-used datasets.", "after_revision": "Link prediction based on knowledge graph embeddings (KGE) aims to predict new triples to automatically construct knowledge graphs (KGs) . However, recent KGE models achieve performance improvements by excessively increasing the embedding dimensions, which may cause enormous training costs and require more storage space. In this paper, instead of training high-dimensional models , we propose MulDE, a novel knowledge distillation framework , which includes multiple low-dimensional hyperbolic KGE models as teachers and two student components, namely Junior and Senior . Under a novel iterative distillation strategy, the Junior component, a low-dimensional KGE model, asks teachers actively based on its preliminary prediction results, and the Senior component integrates teachers' knowledge adaptively to train the Junior component based on two mechanisms: relation-specific scaling and contrast attention . The experimental results show that MulDE can effectively improve the performance and training speed of low-dimensional KGE models. The distilled 32-dimensional model is competitive compared to the state-of-the-art high-dimensional methods on several widely-used datasets.", "edit_actions": [{"type": "R", "before": "embedding", "after": "embeddings", "start_char_pos": 41, "end_char_pos": 50}, {"type": "R", "before": "complete", "after": "automatically construct", "start_char_pos": 88, "end_char_pos": 96}, {"type": "D", "before": "automatically", "after": null, "start_char_pos": 120, "end_char_pos": 133}, {"type": "R", "before": "tend to improve performance", "after": "achieve performance improvements", "start_char_pos": 163, "end_char_pos": 190}, {"type": "R", "before": "vector", "after": "the embedding", "start_char_pos": 217, "end_char_pos": 223}, {"type": "R", "before": "would", "after": "may", "start_char_pos": 242, "end_char_pos": 247}, {"type": "R", "before": "save storage in practical applications. To address this problem, we first theoretically analyze the capacity of low-dimensional space for KG embeddings based on the principle of minimum entropy. Then", "after": "require more storage space. In this paper, instead of training high-dimensional models", "start_char_pos": 282, "end_char_pos": 481}, {"type": "A", "before": null, "after": "MulDE,", "start_char_pos": 495, "end_char_pos": 495}, {"type": "R", "before": "for knowledge graph embedding, utilizing", "after": ", which includes", "start_char_pos": 537, "end_char_pos": 577}, {"type": "A", "before": null, "after": "hyperbolic", "start_char_pos": 603, "end_char_pos": 603}, {"type": "A", "before": null, "after": "and two student components, namely Junior and Senior", "start_char_pos": 627, "end_char_pos": 627}, {"type": "R", "before": "MulDE modelproduces soft labels according to training epochs and student performance adaptively", "after": "Junior component, a low-dimensional KGE model, asks teachers actively based on its preliminary prediction results, and the Senior component integrates teachers' knowledge adaptively to train the Junior component based on two mechanisms: relation-specific scaling and contrast attention", "start_char_pos": 681, "end_char_pos": 776}, {"type": "R", "before": "models are very", "after": "model is", "start_char_pos": 939, "end_char_pos": 954}, {"type": "R", "before": "some of state-or-the-art (SotA)", "after": "the state-of-the-art", "start_char_pos": 979, "end_char_pos": 1010}, {"type": "R", "before": "commonly-used", "after": "widely-used", "start_char_pos": 1047, "end_char_pos": 1060}], "sents_char_pos": [0, 135, 321, 476, 778, 909]}
+{"doc_id": "2010.07845", "revision_depth": "1", "before_revision": "The COVID-19 pandemic has affected people's lives around the world at a unprecedented scale. To investigate the hoarding behaviors in response to the pandemic , we propose a novel computational framework using large scale social media data. First, we collect hoarding-related tweets shortly after the outbreak of the corona virus . Next, we analyze the hoarding and anti-hoarding patterns of over 42,000 Twitter users in the United States from February 1 to April 30 and dissect the hoarding-related tweets by age, gender, and geographic location. With the proposed computational framework, we derive significant findings, e.g. the percentage of females in both hoarding and anti-hoarding groups is higher than that of the general Twitter users . Furthermore, using topic modeling, we investigate the opinions expressed about the hoarding behavior by categorizing these topics according to demographic and geographic groups. We also calculate the anxiety scores for the hoarding and anti-hoarding related tweets using a lexical approach. By comparing their anxiety scores with the typical Twitter anxiety score, we reveal further insights. The LIWC anxiety mean for the hoarding related tweets is significantly higher than the general Twitter anxiety mean. Interestingly, beer has the highest calculated anxiety score compared to other hoarded items mentioned in the tweets.", "after_revision": "The COVID-19 pandemic has affected people's lives around the world on an unprecedented scale. We intend to investigate hoarding behaviors in response to the pandemic using large-scale social media data. First, we collect hoarding-related tweets shortly after the outbreak of the coronavirus . Next, we analyze the hoarding and anti-hoarding patterns of over 42,000 unique Twitter users in the United States from March 1 to April 30 , 2020, and dissect the hoarding-related tweets by age, gender, and geographic location. We find the percentage of females in both hoarding and anti-hoarding groups is higher than that of the general Twitter user population . Furthermore, using topic modeling, we investigate the opinions expressed towards the hoarding behavior by categorizing these topics according to demographic and geographic groups. We also calculate the anxiety scores for the hoarding and anti-hoarding related tweets using a lexical approach. By comparing their anxiety scores with the baseline Twitter anxiety score, we reveal further insights. The LIWC anxiety mean for the hoarding-related tweets is significantly higher than the baseline Twitter anxiety mean. Interestingly, beer has the highest calculated anxiety score compared to other hoarded items mentioned in the tweets.", "edit_actions": [{"type": "R", "before": "at a", "after": "on an", "start_char_pos": 67, "end_char_pos": 71}, {"type": "R", "before": "To investigate the", "after": "We intend to investigate", "start_char_pos": 93, "end_char_pos": 111}, {"type": "R", "before": ", we propose a novel computational framework using large scale", "after": "using large-scale", "start_char_pos": 159, "end_char_pos": 221}, {"type": "R", "before": "corona virus", "after": "coronavirus", "start_char_pos": 317, "end_char_pos": 329}, {"type": "A", "before": null, "after": "unique", "start_char_pos": 404, "end_char_pos": 404}, {"type": "R", "before": "February", "after": "March", "start_char_pos": 445, "end_char_pos": 453}, {"type": "A", "before": null, "after": ", 2020,", "start_char_pos": 468, "end_char_pos": 468}, {"type": "R", "before": "With the proposed computational framework, we derive significant findings, e.g. the", "after": "We find the", "start_char_pos": 550, "end_char_pos": 633}, {"type": "R", "before": "users", "after": "user population", "start_char_pos": 741, "end_char_pos": 746}, {"type": "R", "before": "about", "after": "towards", "start_char_pos": 822, "end_char_pos": 827}, {"type": "R", "before": "typical", "after": "baseline", "start_char_pos": 1083, "end_char_pos": 1090}, {"type": "R", "before": "hoarding related", "after": "hoarding-related", "start_char_pos": 1172, "end_char_pos": 1188}, {"type": "R", "before": "general", "after": "baseline", "start_char_pos": 1229, "end_char_pos": 1236}], "sents_char_pos": [0, 92, 240, 549, 926, 1039, 1141, 1258]}
+{"doc_id": "2010.08356", "revision_depth": "1", "before_revision": "Solving optimization tasks based on functions and losses with a topological flavor is a very active and growing field of research in Topological Data Analysis, with plenty of applications in non-convex optimization, statistics and machine learning. All of these methods rely on the fact that most of the topological constructions are actually stratifiable and differentiable almost everywhere. However, the corresponding gradient and associated code is always anchored to a specific application and/or topological construction, and do not come with theoretical guarantees. In this article , we study the differentiability of a general functional associated with the most common topological construction, that is, the persistence map , and we prove a convergence result of stochastic subgradient descent for such a functional . This result encompasses all the constructions and applications for topological optimization in the literature , and comes with code that is easy to handle and mix with other non-topological constraints, and that can be used to reproduce the experiments described in the literature .", "after_revision": "Solving optimization tasks based on functions and losses with a topological flavor is a very active , growing field of research in data science and Topological Data Analysis, with applications in non-convex optimization, statistics and machine learning. However, the approaches proposed in the literature are usually anchored to a specific application and/or topological construction, and do not come with theoretical guarantees. To address this issue , we study the differentiability of a general map associated with the most common topological construction, that is, the persistence map . Building on real analytic geometry arguments, we propose a general framework that allows us to define and compute gradients for persistence-based functions in a very simple way. We also provide a simple, explicit and sufficient condition for convergence of stochastic subgradient methods for such functions . This result encompasses all the constructions and applications of topological optimization in the literature . Finally, we provide associated code , that is easy to handle and to mix with other non-topological methods and constraints, as well as some experiments showcasing the versatility of our approach .", "edit_actions": [{"type": "R", "before": "and", "after": ",", "start_char_pos": 100, "end_char_pos": 103}, {"type": "A", "before": null, "after": "data science and", "start_char_pos": 133, "end_char_pos": 133}, {"type": "D", "before": "plenty of", "after": null, "start_char_pos": 166, "end_char_pos": 175}, {"type": "D", "before": "All of these methods rely on the fact that most of the topological constructions are actually stratifiable and differentiable almost everywhere.", "after": null, "start_char_pos": 250, "end_char_pos": 394}, {"type": "R", "before": "corresponding gradient and associated code is always", "after": "approaches proposed in the literature are usually", "start_char_pos": 408, "end_char_pos": 460}, {"type": "R", "before": "In this article", "after": "To address this issue", "start_char_pos": 574, "end_char_pos": 589}, {"type": "R", "before": "functional", "after": "map", "start_char_pos": 636, "end_char_pos": 646}, {"type": "R", "before": ", and we prove a convergence result", "after": ". Building on real analytic geometry arguments, we propose a general framework that allows us to define and compute gradients for persistence-based functions in a very simple way. We also provide a simple, explicit and sufficient condition for convergence", "start_char_pos": 734, "end_char_pos": 769}, {"type": "R", "before": "descent for such a functional", "after": "methods for such functions", "start_char_pos": 796, "end_char_pos": 825}, {"type": "R", "before": "for", "after": "of", "start_char_pos": 891, "end_char_pos": 894}, {"type": "A", "before": null, "after": ". Finally, we provide associated code", "start_char_pos": 938, "end_char_pos": 938}, {"type": "D", "before": "and comes with code", "after": null, "start_char_pos": 941, "end_char_pos": 960}, {"type": "A", "before": null, "after": "to", "start_char_pos": 988, "end_char_pos": 988}, {"type": "R", "before": "constraints, and that can be used to reproduce the experiments described in the literature", "after": "methods and constraints, as well as some experiments showcasing the versatility of our approach", "start_char_pos": 1020, "end_char_pos": 1110}], "sents_char_pos": [0, 249, 394, 573, 827]}
+{"doc_id": "2010.08600", "revision_depth": "1", "before_revision": "Navigating fluently around pedestrians is a necessary capability for mobile robots deployed in human environments, such as office buildings and homes. While related literature has addressed the co-navigation problem focused on the scalability with the number of pedestrians in open spaces, typical indoor environments present the additional challenge of constrained spaces such as corridors , doorways and crosswalks that limit maneuverability and influence patterns of pedestrian interaction. We present an approach based on reinforcement learning to learn policies capable of dynamic adaptation to the presence of moving pedestrians while navigating between desired locations in constrained environments. The policy network receives guidance from a motion planner that provides waypoints to follow a globally planned trajectory, whereas the reinforcement component handles the local interactions. We explore a compositional principle for multi-layout training and find that policies trained in a small set of geometrically simple layouts successfully generalize to unseen and more complex layouts that exhibit composition of the simple structural elements available during training. Going beyond wall-world like domains, we show transfer of the learned policy to unseen 3D reconstructions of two real environments (market, home) . These results support the applicability of the compositional principle to real-world environments and indicate promising usage of agent simulation within reconstructed environments for tasks that involve interaction.", "after_revision": "Navigating fluently around pedestrians is a necessary capability for mobile robots deployed in human environments, such as buildings and homes. While research on social navigation has focused mainly on the scalability with the number of pedestrians in open spaces, typical indoor environments present the additional challenge of constrained spaces such as corridors and doorways that limit maneuverability and influence patterns of pedestrian interaction. We present an approach based on reinforcement learning (RL) to learn policies capable of dynamic adaptation to the presence of moving pedestrians while navigating between desired locations in constrained environments. The policy network receives guidance from a motion planner that provides waypoints to follow a globally planned trajectory, whereas RL handles the local interactions. We explore a compositional principle for multi-layout training and find that policies trained in a small set of geometrically simple layouts successfully generalize to more complex unseen layouts that exhibit composition of the structural elements available during training. Going beyond walls-world like domains, we show transfer of the learned policy to unseen 3D reconstructions of two real environments . These results support the applicability of the compositional principle to navigation in real-world buildings and indicate promising usage of multi-agent simulation within reconstructed environments for tasks that involve interaction.", "edit_actions": [{"type": "D", "before": "office", "after": null, "start_char_pos": 123, "end_char_pos": 129}, {"type": "R", "before": "related literature has addressed the co-navigation problem focused", "after": "research on social navigation has focused mainly", "start_char_pos": 157, "end_char_pos": 223}, {"type": "R", "before": ", doorways and crosswalks", "after": "and doorways", "start_char_pos": 391, "end_char_pos": 416}, {"type": "A", "before": null, "after": "(RL)", "start_char_pos": 549, "end_char_pos": 549}, {"type": "R", "before": "the reinforcement component", "after": "RL", "start_char_pos": 840, "end_char_pos": 867}, {"type": "R", "before": "unseen and more complex", "after": "more complex unseen", "start_char_pos": 1068, "end_char_pos": 1091}, {"type": "D", "before": "simple", "after": null, "start_char_pos": 1132, "end_char_pos": 1138}, {"type": "R", "before": "wall-world", "after": "walls-world", "start_char_pos": 1199, "end_char_pos": 1209}, {"type": "D", "before": "(market, home)", "after": null, "start_char_pos": 1317, "end_char_pos": 1331}, {"type": "A", "before": null, "after": "navigation in", "start_char_pos": 1408, "end_char_pos": 1408}, {"type": "R", "before": "environments", "after": "buildings", "start_char_pos": 1420, "end_char_pos": 1432}, {"type": "R", "before": "agent", "after": "multi-agent", "start_char_pos": 1465, "end_char_pos": 1470}], "sents_char_pos": [0, 150, 493, 707, 899, 1185, 1333]}
+{"doc_id": "2010.10809", "revision_depth": "1", "before_revision": "Linear programs (LPs) can be solved through a polynomial number of so-called deepest-descent circuit steps, each step following a circuit direction to a new feasible solution of most-improved objective function value. A computation of deepest-descent steps has recently been shown to be NP-hard De Loera et al., arXiv, 2019 . This is a consequence of the hardness of what we call the optimal circuit-neighbor problem (OCNP) for LPs with non-unique optima. However, the non-uniqueness assumption is crucial to the hardness of OCNP, because we show that OCNP for LPs with a unique optimum is solvable in polynomial time. Moreover, in practical applications one is usually only interested in finding some optimum of an LP, in which case a simple perturbation of the objective yields an instance with a unique optimum. It is thus natural to ask whether deepest-descent steps are also easy to compute for LPs with unique optima, or whether this problem is hard despite OCNP being easy. We show that deepest-descent steps can be efficiently approximated within a factor of n, where n is the dimension of the polyhedron at hand, but not within a factor of O(n^{1- \\epsilon }) for any \\epsilon > 0. While we prove that OCNP can be solved efficiently for LPs with a unique optimum, our different hardness approach allows us to show strong negative results: computing deepest-descent steps is NP-hard and inapproximable even for 0/ 1 linear programs with a unique optimum which are defined by a totally unimodular constraint matrix .", "after_revision": "Linear programs (LPs) can be solved by polynomially many moves along the circuit direction improving the objective the most, so-called deepest-descent steps (dd-steps). Computing these steps is NP-hard ( De Loera et al., arXiv, 2019 ), a consequence of the hardness of deciding the existence of an optimal circuit-neighbor (OCNP) on LPs with non-unique optima. We prove OCNP is easy under the promise of unique optima, but already O(n^{1- \\varepsilon }) -approximating dd-steps remains hard even for totally unimodular n-dimensional 0/ 1-LPs with a unique optimum . We provide a matching n-approximation .", "edit_actions": [{"type": "R", "before": "through a polynomial number of", "after": "by polynomially many moves along the circuit direction improving the objective the most,", "start_char_pos": 36, "end_char_pos": 66}, {"type": "D", "before": "deepest-descent circuit steps, each step following a circuit direction to a new feasible solution of most-improved objective function value. A computation of", "after": null, "start_char_pos": 77, "end_char_pos": 234}, {"type": "R", "before": "has recently been shown to be", "after": "(dd-steps). Computing these steps is", "start_char_pos": 257, "end_char_pos": 286}, {"type": "A", "before": null, "after": "(", "start_char_pos": 295, "end_char_pos": 295}, {"type": "R", "before": ". This is", "after": "),", "start_char_pos": 325, "end_char_pos": 334}, {"type": "R", "before": "what we call the", "after": "deciding the existence of an", "start_char_pos": 368, "end_char_pos": 384}, {"type": "D", "before": "problem", "after": null, "start_char_pos": 410, "end_char_pos": 417}, {"type": "R", "before": "for", "after": "on", "start_char_pos": 425, "end_char_pos": 428}, {"type": "R", "before": "However, the non-uniqueness assumption is crucial to the hardness of OCNP, because we show that OCNP for LPs with a unique optimum is solvable in polynomial time. Moreover, in practical applications one is usually only interested in finding some optimum of an LP, in which case a simple perturbation of the objective yields an instance with a unique optimum. It is thus natural to ask whether deepest-descent steps are also easy to compute for LPs with unique optima, or whether this problem is hard despite OCNP being easy. We show that deepest-descent steps can be efficiently approximated within a factor of n, where n is the dimension of the polyhedron at hand, but not within a factor of", "after": "We prove OCNP is easy under the promise of unique optima, but already", "start_char_pos": 457, "end_char_pos": 1149}, {"type": "R", "before": "\\epsilon", "after": "\\varepsilon", "start_char_pos": 1158, "end_char_pos": 1166}, {"type": "R", "before": "for any \\epsilon > 0. While we prove that OCNP can be solved efficiently for LPs with a unique optimum, our different hardness approach allows us to show strong negative results: computing deepest-descent steps is NP-hard and inapproximable even for", "after": "-approximating dd-steps remains hard even for totally unimodular n-dimensional", "start_char_pos": 1170, "end_char_pos": 1419}, {"type": "R", "before": "1 linear programs", "after": "1-LPs", "start_char_pos": 1423, "end_char_pos": 1440}, {"type": "R", "before": "which are defined by a totally unimodular constraint matrix", "after": ". We provide a matching n-approximation", "start_char_pos": 1463, "end_char_pos": 1522}], "sents_char_pos": [0, 217, 456, 619, 815, 981, 1348]}
+{"doc_id": "2010.11462", "revision_depth": "1", "before_revision": "Let G = (V, E) be a undirected graph and let W \\subseteq V be a set of terminals. ASteiner subgraph of (G, W) is a subgraph of G that contains all vertices of W and there is a path between every pair of vertices of W in the subgraph. We say that a Steiner subgraph is minimal if it has no proper Steiner subgraph. It is easy to observe that every minimal Steiner subgraph forms a tree, which is called a minimal Steiner tree. We propose a linear delay and polynomial space ] ] algorithm for enumerating all minimal Steiner trees of (G, W), which improves a previously known polynomial delay enumeration algorithm in [Kimelfeld and Sagiv, Inf. Syst. , 2008]. Our enumeration algorithm can be extended to other Steiner problems : minimal Steiner forests, minimal terminal Steiner trees, minimal directed Steiner trees. As another variant of the minimal Steiner subgraph problem, we study the problem of enumerating minimal induced Steiner subgraphs. We propose a polynomial delay and exponential space enumeration algorithm of minimal induced Steiner subgraphs for claw-free graphs , whereas the problem on general graphs is shown to be at least as hard as the problem of enumerating minimal transversals in hypergraphs . Contrary to these tractable results, we show that the problem of enumerating minimal group Steiner trees is at least as hard as the minimal transversal enumeration problem on hypergraphs.", "after_revision": " Kimelfeld and Sagiv Kimelfeld and Sagiv, PODS 2006], Kimelfeld and Sagiv, Inf. Syst. 2008] pointed out the problem of enumerating K-fragments is of great importance in a keyword search on data graphs. In a graph-theoretic term, the problem corresponds to enumerating minimal Steiner trees in (directed) graphs. In this paper, we propose a linear-delay and polynomial-space algorithm for enumerating all minimal Steiner trees , improving on a previous result in [Kimelfeld and Sagiv, Inf. Syst. 2008]. Our enumeration algorithm can be extended to other Steiner problems , such as minimal Steiner forests, minimal terminal Steiner trees, and minimal directed Steiner trees. As another variant of the minimal Steiner tree enumeration problem, we study the problem of enumerating minimal induced Steiner subgraphs. We propose a polynomial-delay and exponential-space enumeration algorithm of minimal induced Steiner subgraphs on claw-free graphs . Contrary to these tractable results, we show that the problem of enumerating minimal group Steiner trees is at least as hard as the minimal transversal enumeration problem on hypergraphs.", "edit_actions": [{"type": "D", "before": "Let G = (V, E) be a undirected graph and let W \\subseteq V be a set of terminals. A", "after": null, "start_char_pos": 0, "end_char_pos": 83}, {"type": "D", "before": "Steiner subgraph", "after": null, "start_char_pos": 83, "end_char_pos": 99}, {"type": "R", "before": "of (G, W) is a subgraph of G that contains all vertices of W and there is a path between every pair of vertices of W in the subgraph. We say that a Steiner subgraph is minimal if it has no proper Steiner subgraph. It is easy to observe that every minimal Steiner subgraph forms a tree, which is called a minimal Steiner tree. We propose a linear delay and polynomial space", "after": "Kimelfeld and Sagiv", "start_char_pos": 100, "end_char_pos": 472}, {"type": "A", "before": null, "after": "Kimelfeld and Sagiv, PODS 2006", "start_char_pos": 473, "end_char_pos": 473}, {"type": "A", "before": null, "after": ",", "start_char_pos": 474, "end_char_pos": 474}, {"type": "A", "before": null, "after": "Kimelfeld and Sagiv, Inf. Syst. 2008", "start_char_pos": 475, "end_char_pos": 475}, {"type": "A", "before": null, "after": "pointed out the problem of enumerating K-fragments is of great importance in a keyword search on data graphs. In a graph-theoretic term, the problem corresponds to enumerating minimal Steiner trees in (directed) graphs. In this paper, we propose a linear-delay and polynomial-space", "start_char_pos": 477, "end_char_pos": 477}, {"type": "R", "before": "of (G, W), which improves a previously known polynomial delay enumeration algorithm", "after": ", improving on a previous result", "start_char_pos": 530, "end_char_pos": 613}, {"type": "D", "before": ",", "after": null, "start_char_pos": 650, "end_char_pos": 651}, {"type": "R", "before": ":", "after": ", such as", "start_char_pos": 727, "end_char_pos": 728}, {"type": "A", "before": null, "after": "and", "start_char_pos": 786, "end_char_pos": 786}, {"type": "R", "before": "subgraph", "after": "tree enumeration", "start_char_pos": 861, "end_char_pos": 869}, {"type": "R", "before": "polynomial delay and exponential space", "after": "polynomial-delay and exponential-space", "start_char_pos": 963, "end_char_pos": 1001}, {"type": "R", "before": "for", "after": "on", "start_char_pos": 1061, "end_char_pos": 1064}, {"type": "D", "before": ", whereas the problem on general graphs is shown to be at least as hard as the problem of enumerating minimal transversals in hypergraphs", "after": null, "start_char_pos": 1082, "end_char_pos": 1219}], "sents_char_pos": [0, 81, 233, 313, 425, 643, 658, 818, 949]}
+{"doc_id": "2010.11578", "revision_depth": "1", "before_revision": "Style transfer has been widely explored in natural language generation with non-parallel corpus by directly or indirectly extracting a notion of style from source and target domain corpus. A common aspect among the existing approaches is the prerequisite of joint annotations across all the stylistic dimensions under consideration. Availability of such dataset across a combination of styles is a limiting factor in extending state-of-the art style transfer setups to multiple style dimensions. While cascading single-dimensional models across multiple styles is a possibility, it suffers from content loss, especially when the style dimensions are not completely independent of each other. In our work, we attempt to relax this restriction on requirement of jointly annotated data across multiple styles being inspected and make use of independently acquired data across different style dimensions without any additional annotations. We initialize an encoder-decoder setup with large transformer-based language models pre-trained on a generic corpus and enhance its re-writing capability to multiple styles by employing multiple language models as discriminators. Through quantitative and qualitative evaluation, we show the ability of our model to control for styles across multiple style-dimensions while preserving content of the input text and compare it against baselines which involve cascaded state-of-the-art uni-dimensional style transfer models.", "after_revision": "Style transfer has been widely explored in natural language generation with non-parallel corpus by directly or indirectly extracting a notion of style from source and target domain corpus. A common shortcoming of existing approaches is the prerequisite of joint annotations across all the stylistic dimensions under consideration. Availability of such dataset across a combination of styles limits the extension of these setups to multiple style dimensions. While cascading single-dimensional models across multiple styles is a possibility, it suffers from content loss, especially when the style dimensions are not completely independent of each other. In our work, we relax this requirement of jointly annotated data across multiple styles by using independently acquired data across different style dimensions without any additional annotations. We initialize an encoder-decoder setup with transformer-based language model pre-trained on a generic corpus and enhance its re-writing capability to multiple target style dimensions by employing multiple style-aware language models as discriminators. Through quantitative and qualitative evaluation, we show the ability of our model to control styles across multiple style dimensions while preserving content of the input text . We compare it against baselines involving cascaded state-of-the-art uni-dimensional style transfer models.", "edit_actions": [{"type": "R", "before": "aspect among the", "after": "shortcoming of", "start_char_pos": 198, "end_char_pos": 214}, {"type": "R", "before": "is a limiting factor in extending state-of-the art style transfer", "after": "limits the extension of these", "start_char_pos": 393, "end_char_pos": 458}, {"type": "R", "before": "attempt to relax this restriction on", "after": "relax this", "start_char_pos": 708, "end_char_pos": 744}, {"type": "R", "before": "being inspected and make use of", "after": "by using", "start_char_pos": 806, "end_char_pos": 837}, {"type": "D", "before": "large", "after": null, "start_char_pos": 980, "end_char_pos": 985}, {"type": "R", "before": "models", "after": "model", "start_char_pos": 1013, "end_char_pos": 1019}, {"type": "R", "before": "styles", "after": "target style dimensions", "start_char_pos": 1102, "end_char_pos": 1108}, {"type": "A", "before": null, "after": "style-aware", "start_char_pos": 1131, "end_char_pos": 1131}, {"type": "D", "before": "for", "after": null, "start_char_pos": 1260, "end_char_pos": 1263}, {"type": "R", "before": "style-dimensions", "after": "style dimensions", "start_char_pos": 1287, "end_char_pos": 1303}, {"type": "R", "before": "and", "after": ". We", "start_char_pos": 1347, "end_char_pos": 1350}, {"type": "R", "before": "which involve", "after": "involving", "start_char_pos": 1380, "end_char_pos": 1393}], "sents_char_pos": [0, 188, 332, 495, 691, 935, 1166]}
+{"doc_id": "2010.11915", "revision_depth": "1", "before_revision": "Recent progress in pretrained language model \"solved\" many reading comprehension benchmark datasets. Yet information-seeking Question Answering (QA) datasets , where questions are written without the evidence document , remain unsolved . We analyze two such datasets ( Natural Questions and TyDi QA ) to identify remaining headrooms : paragraph selection and answerability classification , i.e. determining whether the paired evidence document contains the answer to the query or not. In other words, given a gold paragraph and knowing whether it contains an answer or not, models easily outperform a single annotatorin both datasets. After identifying unanswerability as a bottleneck, we further inspect what makes questions unanswerable. Our study points to avenues for future research , both for dataset creation and model development.", "after_revision": "Recent pretrained language models \"solved\" many reading comprehension benchmarks , where questions are written with access to the evidence document . However, datasets containing information-seeking queries where evidence documents are provided after the queries are written independently remain challenging . We analyze why answering information-seeking queries is more challenging and where their prevalent unanswerabilities arise, on Natural Questions and TyDi QA . Our controlled experiments suggest two headrooms -- paragraph selection and answerability prediction , i.e. whether the paired evidence document contains the answer to the query or not. When provided with a gold paragraph and knowing when to abstain from answering, existing models easily outperform a human annotator. However, predicting answerability itself remains challenging. We manually annotate 800 unanswerable examples across six languages on what makes them challenging to answer. With this new data, we conduct per-category answerability prediction, revealing issues in the current dataset collection as well as task formulation. Together, our study points to avenues for future research in information-seeking question answering , both for dataset creation and model development.", "edit_actions": [{"type": "R", "before": "progress in pretrained language model", "after": "pretrained language models", "start_char_pos": 7, "end_char_pos": 44}, {"type": "R", "before": "benchmark datasets. Yet information-seeking Question Answering (QA) datasets", "after": "benchmarks", "start_char_pos": 81, "end_char_pos": 157}, {"type": "R", "before": "without", "after": "with access to", "start_char_pos": 188, "end_char_pos": 195}, {"type": "R", "before": ", remain unsolved", "after": ". However, datasets containing information-seeking queries where evidence documents are provided after the queries are written independently remain challenging", "start_char_pos": 218, "end_char_pos": 235}, {"type": "R", "before": "two such datasets (", "after": "why answering information-seeking queries is more challenging and where their prevalent unanswerabilities arise, on", "start_char_pos": 249, "end_char_pos": 268}, {"type": "R", "before": ") to identify remaining headrooms :", "after": ". Our controlled experiments suggest two headrooms --", "start_char_pos": 299, "end_char_pos": 334}, {"type": "R", "before": "classification", "after": "prediction", "start_char_pos": 373, "end_char_pos": 387}, {"type": "D", "before": "determining", "after": null, "start_char_pos": 395, "end_char_pos": 406}, {"type": "R", "before": "In other words, given", "after": "When provided with", "start_char_pos": 485, "end_char_pos": 506}, {"type": "R", "before": "whether it contains an answer or not,", "after": "when to abstain from answering, existing", "start_char_pos": 536, "end_char_pos": 573}, {"type": "R", "before": "single annotatorin both datasets. After identifying unanswerability as a bottleneck, we further inspect what makes questions unanswerable. Our", "after": "human annotator. However, predicting answerability itself remains challenging. We manually annotate 800 unanswerable examples across six languages on what makes them challenging to answer. With this new data, we conduct per-category answerability prediction, revealing issues in the current dataset collection as well as task formulation. Together, our", "start_char_pos": 601, "end_char_pos": 743}, {"type": "A", "before": null, "after": "in information-seeking question answering", "start_char_pos": 788, "end_char_pos": 788}], "sents_char_pos": [0, 100, 237, 484, 634, 739]}
+{"doc_id": "2010.12272", "revision_depth": "1", "before_revision": "Recent researches show that pre-trained models such as BERT (Devlin et al., 2019 ) are beneficial for Chinese Word Segmentation tasks . However, existing approaches usually finetune pre-trained models directly on a separate downstream Chinese Word Segmentation corpus. These recent methods don't fully utilize the prior knowledge of existing segmentation corpora, and don't regard the discrepancy between the pre-training tasks and the downstream Chinese Word Segmentation tasks. In this work , we propose a Pre-Trained Model for Chinese Word Segmentation, which can be abbreviated as PTM-CWS. PTM-CWS model employs a unified architecture for different segmentation criteria, and is pre-trained on a joint multi-criteria corpus with meta learning algorithm . Empirical results show that our PTM-CWS model can utilize the existing prior segmentation knowledge , reduce the discrepancy between the pre-training tasks and the downstream Chinese Word Segmentation tasks, and achieve new state-of-the-art performance on twelve Chinese Word Segmentation corpora .", "after_revision": "Recent researches show that pre-trained models (PTMs ) are beneficial to Chinese Word Segmentation (CWS) . However, PTMs used in previous works usually adopt language modeling as pre-training tasks, lacking task-specific prior segmentation knowledge and ignoring the discrepancy between pre-training tasks and downstream CWS tasks. In this paper , we propose a CWS-specific pre-trained model METASEG, which employs a unified architecture and incorporates meta learning algorithm into a multi-criteria pre-training task . Empirical results show that METASEG could utilize common prior segmentation knowledge from different existing criteria and alleviate the discrepancy between pre-trained models and downstream CWS tasks. Besides, METASEG can achieve new state-of-the-art performance on twelve widely-used CWS datasets and significantly improve model performance in low-resource settings .", "edit_actions": [{"type": "R", "before": "such as BERT (Devlin et al., 2019", "after": "(PTMs", "start_char_pos": 47, "end_char_pos": 80}, {"type": "R", "before": "for", "after": "to", "start_char_pos": 98, "end_char_pos": 101}, {"type": "R", "before": "tasks", "after": "(CWS)", "start_char_pos": 128, "end_char_pos": 133}, {"type": "R", "before": "existing approaches usually finetune pre-trained models directly on a separate downstream Chinese Word Segmentation corpus. These recent methods don't fully utilize the prior knowledge of existing segmentation corpora, and don't regard", "after": "PTMs used in previous works usually adopt language modeling as pre-training tasks, lacking task-specific prior segmentation knowledge and ignoring", "start_char_pos": 145, "end_char_pos": 380}, {"type": "D", "before": "the", "after": null, "start_char_pos": 405, "end_char_pos": 408}, {"type": "R", "before": "the downstream Chinese Word Segmentation", "after": "downstream CWS", "start_char_pos": 432, "end_char_pos": 472}, {"type": "R", "before": "work", "after": "paper", "start_char_pos": 488, "end_char_pos": 492}, {"type": "R", "before": "Pre-Trained Model for Chinese Word Segmentation, which can be abbreviated as PTM-CWS. PTM-CWS model", "after": "CWS-specific pre-trained model METASEG, which", "start_char_pos": 508, "end_char_pos": 607}, {"type": "R", "before": "for different segmentation criteria, and is pre-trained on a joint multi-criteria corpus with", "after": "and incorporates", "start_char_pos": 639, "end_char_pos": 732}, {"type": "A", "before": null, "after": "into a multi-criteria pre-training task", "start_char_pos": 757, "end_char_pos": 757}, {"type": "R", "before": "our PTM-CWS model can utilize the existing", "after": "METASEG could utilize common", "start_char_pos": 788, "end_char_pos": 830}, {"type": "R", "before": ", reduce", "after": "from different existing criteria and alleviate", "start_char_pos": 860, "end_char_pos": 868}, {"type": "R", "before": "the pre-training tasks and the downstream Chinese Word Segmentation tasks, and", "after": "pre-trained models and downstream CWS tasks. Besides, METASEG can", "start_char_pos": 893, "end_char_pos": 971}, {"type": "R", "before": "Chinese Word Segmentation corpora", "after": "widely-used CWS datasets and significantly improve model performance in low-resource settings", "start_char_pos": 1023, "end_char_pos": 1056}], "sents_char_pos": [0, 135, 268, 479, 494, 556, 675]}
+{"doc_id": "2010.12812", "revision_depth": "1", "before_revision": "End-to-end relation extraction aims to identify named entities and extract relations between them simultaneously . Most recent work models these two subtasks jointly, either by unifying them in one structured prediction framework, or multi-task learning through shared representations. In this work, we describe a very simple approach for joint entity and relation extraction, and establish the new state-of-the-art on standard benchmarks (ACE04, ACE05 , and SciERC) . Our approach essentially builds on two independent pre-trained encoders and merely uses the entity model to provide input features for the relation model. Through a series of careful examinations, we validate the importance of learning distinct contextual representations for entities and relations, fusing entity information at the input layer of the relation model, and incorporating global context. Finally, we also present an efficient approximation to our approach which requires only one pass of both encoders at inference time, obtaining a 8-16\\times speedup with a small accuracydrop .", "after_revision": "End-to-end relation extraction aims to identify named entities and extract relations between them . Most recent work models these two subtasks jointly, either by casting them in one structured prediction framework, or performing multi-task learning through shared representations. In this work, we present a simple pipelined approach for entity and relation extraction, and establish the new state-of-the-art on standard benchmarks (ACE04, ACE05 and SciERC) , obtaining a 1.7\\%-2.8\\% absolute improvement in relation F1 over previous joint models with the same pre-trained encoders . Our approach essentially builds on two independent encoders and merely uses the entity model to construct the input for the relation model. Through a series of careful examinations, we validate the importance of learning distinct contextual representations for entities and relations, fusing entity information early in the relation model, and incorporating global context. Finally, we also present an efficient approximation to our approach which requires only one pass of both entity and relation encoders at inference time, achieving an 8-16\\times speedup with a slight reduction in accuracy .", "edit_actions": [{"type": "D", "before": "simultaneously", "after": null, "start_char_pos": 98, "end_char_pos": 112}, {"type": "R", "before": "unifying", "after": "casting", "start_char_pos": 177, "end_char_pos": 185}, {"type": "A", "before": null, "after": "performing", "start_char_pos": 234, "end_char_pos": 234}, {"type": "R", "before": "describe a very simple approach for joint", "after": "present a simple pipelined approach for", "start_char_pos": 304, "end_char_pos": 345}, {"type": "D", "before": ",", "after": null, "start_char_pos": 454, "end_char_pos": 455}, {"type": "A", "before": null, "after": ", obtaining a 1.7\\%-2.8\\% absolute improvement in relation F1 over previous joint models with the same pre-trained encoders", "start_char_pos": 468, "end_char_pos": 468}, {"type": "D", "before": "pre-trained", "after": null, "start_char_pos": 522, "end_char_pos": 533}, {"type": "R", "before": "provide input features", "after": "construct the input", "start_char_pos": 579, "end_char_pos": 601}, {"type": "R", "before": "at the input layer of the", "after": "early in the", "start_char_pos": 797, "end_char_pos": 822}, {"type": "A", "before": null, "after": "entity and relation", "start_char_pos": 978, "end_char_pos": 978}, {"type": "R", "before": "obtaining a", "after": "achieving an", "start_char_pos": 1007, "end_char_pos": 1018}, {"type": "R", "before": "small accuracydrop", "after": "slight reduction in accuracy", "start_char_pos": 1045, "end_char_pos": 1063}], "sents_char_pos": [0, 114, 286, 470, 625, 872]}
+{"doc_id": "2010.12820", "revision_depth": "1", "before_revision": "Ad hominem attacks are those that attack some feature of a person's character instead of the position the person is maintaining. As a form of toxic and abusive language, ad hominems contain harmful language that could further amplify the skew of power inequality for marginalized populations . Since dialogue systems are designed to respond directly to user input, it is important to study ad hominems in these system responses. In this work , we propose categories of ad hominems that allow us to analyze human and dialogue system responses to Twitter posts. We specifically compare responses to Twitter posts about marginalized communities (#BlackLivesMatter, #MeToo) and other topics (#Vegan, #WFH) . Furthermore, we propose a constrained decoding technique that uses salient n-gram similarity to apply soft constraints to top-k sampling and can decrease the amount of ad hominems generated by dialogue systems . Our results indicate that 1) responses composed by both humans and DialoGPT contain more ad hominems for discussions around marginalized communities versus other topics , 2) different amounts of ad hominems in the training data can influence the likelihood of the model generating ad hominems, and 3) we can thus carefully choose training data and use constrained decoding techniques to decrease the amount of ad hominems generated by dialogue systems .", "after_revision": "Ad hominem attacks are those that target some feature of a person's character instead of the position the person is maintaining. These attacks are harmful because they propagate implicit biases and diminish a person's credibility . Since dialogue systems respond directly to user input, it is important to study ad hominems in dialogue responses. To this end , we propose categories of ad hominems , compose an annotated dataset, and build a classifier to analyze human and dialogue system responses to English Twitter posts. We specifically compare responses to Twitter topics about marginalized communities (#BlackLivesMatter, #MeToo) versus other topics (#Vegan, #WFH) , because the abusive language of ad hominems could further amplify the skew of power away from marginalized populations . Furthermore, we propose a constrained decoding technique that uses salient n-gram similarity as a soft constraint for top-k sampling to reduce the amount of ad hominems generated . Our results indicate that 1) responses from both humans and DialoGPT contain more ad hominems for discussions around marginalized communities , 2) different quantities of ad hominems in the training data can influence the likelihood of generating ad hominems, and 3) we can use constrained decoding techniques to reduce ad hominems in generated dialogue responses .", "edit_actions": [{"type": "R", "before": "attack", "after": "target", "start_char_pos": 34, "end_char_pos": 40}, {"type": "R", "before": "As a form of toxic and abusive language, ad hominems contain harmful language that could further amplify the skew of power inequality for marginalized populations", "after": "These attacks are harmful because they propagate implicit biases and diminish a person's credibility", "start_char_pos": 129, "end_char_pos": 291}, {"type": "D", "before": "are designed to", "after": null, "start_char_pos": 317, "end_char_pos": 332}, {"type": "R", "before": "these system responses. In this work", "after": "dialogue responses. To this end", "start_char_pos": 405, "end_char_pos": 441}, {"type": "R", "before": "that allow us", "after": ", compose an annotated dataset, and build a classifier", "start_char_pos": 481, "end_char_pos": 494}, {"type": "A", "before": null, "after": "English", "start_char_pos": 545, "end_char_pos": 545}, {"type": "R", "before": "posts", "after": "topics", "start_char_pos": 606, "end_char_pos": 611}, {"type": "R", "before": "and", "after": "versus", "start_char_pos": 671, "end_char_pos": 674}, {"type": "A", "before": null, "after": ", because the abusive language of ad hominems could further amplify the skew of power away from marginalized populations", "start_char_pos": 703, "end_char_pos": 703}, {"type": "R", "before": "to apply soft constraints to", "after": "as a soft constraint for", "start_char_pos": 799, "end_char_pos": 827}, {"type": "R", "before": "and can decrease", "after": "to reduce", "start_char_pos": 843, "end_char_pos": 859}, {"type": "D", "before": "by dialogue systems", "after": null, "start_char_pos": 896, "end_char_pos": 915}, {"type": "R", "before": "composed by", "after": "from", "start_char_pos": 957, "end_char_pos": 968}, {"type": "D", "before": "versus other topics", "after": null, "start_char_pos": 1067, "end_char_pos": 1086}, {"type": "R", "before": "amounts", "after": "quantities", "start_char_pos": 1102, "end_char_pos": 1109}, {"type": "D", "before": "the model", "after": null, "start_char_pos": 1178, "end_char_pos": 1187}, {"type": "D", "before": "thus carefully choose training data and", "after": null, "start_char_pos": 1226, "end_char_pos": 1265}, {"type": "R", "before": "decrease the amount of ad hominems generated by dialogue systems", "after": "reduce ad hominems in generated dialogue responses", "start_char_pos": 1305, "end_char_pos": 1369}], "sents_char_pos": [0, 128, 428, 560, 917]}
+{"doc_id": "2010.12831", "revision_depth": "1", "before_revision": "Pre-trained contextual vision-and-language (V&L) models have brought impressive performance improvement on various benchmarks. However, the paired text-image data required for pre-training are hard to collect and scale up. We investigate if a strong V&L representation model can be learned without text-image pairs. We propose Weakly-supervised VisualBERT with the key idea of conducting \" mask-and-predict \" pre-training on language-only and image-only corpora . Additionally, we introduce the object tags detected by an object recognition model as anchor points to bridge two modalities. Evaluation on four V L benchmarks shows that Weakly-supervised VisualBERT achieves similar performance with a model pre-trained with paired data. Besides, pre-training on more image-only data further improves a model that already has access to aligned data , suggesting the possibility of utilizing billions of raw images available to enhance & V&L models.", "after_revision": "Pre-trained contextual vision-and-language (V&L) models have achieved impressive performance on various benchmarks. However, existing models require a large amount of parallel image-caption data for pre-training . Such data are costly to collect and require cumbersome curation. Inspired by unsupervised machine translation, we investigate if a strong V&L representation model can be learned through unsupervised pre-training without image-caption corpora. In particular, we propose to conduct `` mask-and-predict '' pre-training on text-only and image-only corpora and introduce the object tags detected by an object recognition model as anchor points to bridge two modalities. We find that such a simple approach achieves performance close to a model pre-trained with aligned data , on four English V L benchmarks. Our work challenges the widely held notion that aligned data is necessary for V&L pre-training, while significantly reducing the amount of supervision needed for V&L models.", "edit_actions": [{"type": "R", "before": "brought impressive performance improvement", "after": "achieved impressive performance", "start_char_pos": 61, "end_char_pos": 103}, {"type": "R", "before": "the paired text-image data required", "after": "existing models require a large amount of parallel image-caption data", "start_char_pos": 136, "end_char_pos": 171}, {"type": "R", "before": "are hard", "after": ". Such data are costly", "start_char_pos": 189, "end_char_pos": 197}, {"type": "R", "before": "scale up. We", "after": "require cumbersome curation. Inspired by unsupervised machine translation, we", "start_char_pos": 213, "end_char_pos": 225}, {"type": "R", "before": "without text-image pairs. We propose Weakly-supervised VisualBERT with the key idea of conducting \"", "after": "through unsupervised pre-training without image-caption corpora. In particular, we propose to conduct ``", "start_char_pos": 290, "end_char_pos": 389}, {"type": "R", "before": "\"", "after": "''", "start_char_pos": 407, "end_char_pos": 408}, {"type": "R", "before": "language-only", "after": "text-only", "start_char_pos": 425, "end_char_pos": 438}, {"type": "R", "before": ". Additionally, we", "after": "and", "start_char_pos": 462, "end_char_pos": 480}, {"type": "D", "before": "Evaluation on four V", "after": null, "start_char_pos": 590, "end_char_pos": 610}, {"type": "R", "before": "L benchmarks shows that Weakly-supervised VisualBERT achieves similar performance with", "after": "We find that such a simple approach achieves performance close to", "start_char_pos": 611, "end_char_pos": 697}, {"type": "R", "before": "paired data. Besides, pre-training on more image-only data further improves a model that already has access to aligned data", "after": "aligned data", "start_char_pos": 723, "end_char_pos": 846}, {"type": "R", "before": "suggesting the possibility of utilizing billions of raw images available to enhance", "after": "on four English V", "start_char_pos": 849, "end_char_pos": 932}, {"type": "A", "before": null, "after": "L benchmarks. Our work challenges the widely held notion that aligned data is necessary for V", "start_char_pos": 933, "end_char_pos": 933}, {"type": "A", "before": null, "after": "L pre-training, while significantly reducing the amount of supervision needed for", "start_char_pos": 934, "end_char_pos": 934}], "sents_char_pos": [0, 126, 222, 315, 463, 589, 735]}
+{"doc_id": "2010.12873", "revision_depth": "2", "before_revision": "Recently, neural-symbolic models have achieved noteworthy success in leveraging knowledge graphs (KGs) for commonsense reasoning tasks , like question answering (QA) . However, fact sparsity, inherent in human-annotated KGs, can hinder such models from retrieving task-relevant knowledge . To address these issues, we propose Hybrid Graph Network (HGN) , a neural-symbolic model that reasons over both extracted (human-labeled) and generated facts within the same learned graph structure. Given a KG subgraphof extracted facts , HGN is jointly trained to generate complementary facts, encode relational information in the resulting \"hybrid\" subgraph, and filter out task-irrelevant facts . We demonstrate HGN's ability to produce contextually pertinent subgraphs by showing considerable performance gains across four commonsense reasoning benchmarks and a user study of fact validness and helpfulness.", "after_revision": "Recently, knowledge graph (KG) augmented models have achieved noteworthy success on various commonsense reasoning tasks . However, KG edge (fact) sparsity and noisy edge extraction/generation often hinder models from obtaining useful knowledge to reason over . To address these issues, we propose a new KG-augmented model: Hybrid Graph Network (HGN) . Unlike prior methods, HGN learns to jointly contextualize extracted and generated knowledge by reasoning over both within a unified graph structure. Given the task input context and an extracted KG subgraph , HGN is trained to generate embeddings for the subgraph's missing edges to form a \"hybrid\" graph, then reason over the hybrid graph while filtering out context-irrelevant edges . We demonstrate HGN's effectiveness through considerable performance gains across four commonsense reasoning benchmarks , plus a user study on edge validness and helpfulness.", "edit_actions": [{"type": "R", "before": "neural-symbolic", "after": "knowledge graph (KG) augmented", "start_char_pos": 10, "end_char_pos": 25}, {"type": "R", "before": "in leveraging knowledge graphs (KGs) for", "after": "on various", "start_char_pos": 66, "end_char_pos": 106}, {"type": "D", "before": ", like question answering (QA)", "after": null, "start_char_pos": 135, "end_char_pos": 165}, {"type": "R", "before": "fact sparsity, inherent in human-annotated KGs, can hinder such models from retrieving task-relevant knowledge", "after": "KG edge (fact) sparsity and noisy edge extraction/generation often hinder models from obtaining useful knowledge to reason over", "start_char_pos": 177, "end_char_pos": 287}, {"type": "A", "before": null, "after": "a new KG-augmented model:", "start_char_pos": 326, "end_char_pos": 326}, {"type": "R", "before": ", a neural-symbolic model that reasons over both extracted (human-labeled) and generated facts within the same learned", "after": ". Unlike prior methods, HGN learns to jointly contextualize extracted and generated knowledge by reasoning over both within a unified", "start_char_pos": 354, "end_char_pos": 472}, {"type": "R", "before": "a KG subgraphof extracted facts", "after": "the task input context and an extracted KG subgraph", "start_char_pos": 496, "end_char_pos": 527}, {"type": "D", "before": "jointly", "after": null, "start_char_pos": 537, "end_char_pos": 544}, {"type": "R", "before": "complementary facts, encode relational information in the resulting", "after": "embeddings for the subgraph's missing edges to form a", "start_char_pos": 565, "end_char_pos": 632}, {"type": "R", "before": "subgraph, and filter out task-irrelevant facts", "after": "graph, then reason over the hybrid graph while filtering out context-irrelevant edges", "start_char_pos": 642, "end_char_pos": 688}, {"type": "R", "before": "ability to produce contextually pertinent subgraphs by showing", "after": "effectiveness through", "start_char_pos": 712, "end_char_pos": 774}, {"type": "R", "before": "and", "after": ", plus", "start_char_pos": 851, "end_char_pos": 854}, {"type": "R", "before": "of fact", "after": "on edge", "start_char_pos": 868, "end_char_pos": 875}], "sents_char_pos": [0, 289, 489, 690]}
+{"doc_id": "2010.13448", "revision_depth": "1", "before_revision": "Recently the synchrosqueezing transform (SST) was developed as an empirical mode decomposition (EMD)-like tool to enhance the time-frequency resolution and energy concentration of a multicomponent non-stationary signal and provides more accurate component recovery (mode retrieval) . To recover individual components, the SST method consists of two steps. First the instantaneous frequency (IF) of a component is estimated from the SST plane. Secondly, after IF is recovered, the associated component is computed by a definite integral along the estimated IF curve on the SST plane. More recently, a direct method of the time-frequency approach, called signal separation operation (SSO), was introduced for multicomponent signal separation. SSO avoids the second step of the two-step SST method in component recovery . The SSO method is based the short-time Fourier transform. In this paper we propose a direct method of signal separation based on the adaptive continuous wavelet transform (CWT) . We introduce two models of the adaptive CWT-based approach for signal separation: the sinusoidal signal-based model and the linear chirp-based model, which are derived respectively from sinusoidal signal approximation and the linear chirp approximation at any local time . A more accurate component recovery formula is derived from linear chirp local approximation. We present the theoretical analysis of our approach. For each model, we establish the error bounds for IF estimation and component recovery.", "after_revision": "Recently the synchrosqueezed transform (SST) was developed as an empirical mode decomposition (EMD)-like tool to enhance the time-frequency resolution and energy concentration of a multi-component non-stationary signal and provides more accurate component recovery . To recover individual components, the SST method consists of two steps. First the instantaneous frequency (IF) of a component is estimated from the SST plane. Secondly, after IF is recovered, the associated component is computed by a definite integral along the estimated IF curve on the SST plane. The reconstruction accuracy for a component depends heavily on the accuracy of the IFs estimation carried out in the first step. More recently, a direct method of the time-frequency approach, called signal separation operation (SSO), was introduced for multi-component signal separation. While both SST and SSO are mathematically rigorous on IF estimation, SSO avoids the second step of the two-step SST method in component recovery (mode retrieval) . The SSO method is based on some variant of the short-time Fourier transform. In the present paper, we propose a direct method of signal separation based on the adaptive continuous wavelet-like transform (CWLT) by introducing two models of the adaptive CWLT-based approach for signal separation: the sinusoidal signal-based model and the linear chirp-based model, which are derived respectively from sinusoidal signal approximation and the linear chirp approximation at any time instant . A more accurate component recovery formula is derived from linear chirp local approximation. We present the theoretical analysis of our approach. For each model, we establish the error bounds for IF estimation and component recovery.", "edit_actions": [{"type": "R", "before": "synchrosqueezing", "after": "synchrosqueezed", "start_char_pos": 13, "end_char_pos": 29}, {"type": "R", "before": "multicomponent", "after": "multi-component", "start_char_pos": 182, "end_char_pos": 196}, {"type": "D", "before": "(mode retrieval)", "after": null, "start_char_pos": 265, "end_char_pos": 281}, {"type": "A", "before": null, "after": "The reconstruction accuracy for a component depends heavily on the accuracy of the IFs estimation carried out in the first step.", "start_char_pos": 583, "end_char_pos": 583}, {"type": "R", "before": "multicomponent", "after": "multi-component", "start_char_pos": 708, "end_char_pos": 722}, {"type": "R", "before": "SSO", "after": "While both SST and SSO are mathematically rigorous on IF estimation, SSO", "start_char_pos": 742, "end_char_pos": 745}, {"type": "A", "before": null, "after": "(mode retrieval)", "start_char_pos": 818, "end_char_pos": 818}, {"type": "A", "before": null, "after": "on some variant of", "start_char_pos": 845, "end_char_pos": 845}, {"type": "R", "before": "this paper", "after": "the present paper,", "start_char_pos": 883, "end_char_pos": 893}, {"type": "R", "before": "wavelet transform (CWT) . We introduce", "after": "wavelet-like transform (CWLT) by introducing", "start_char_pos": 975, "end_char_pos": 1013}, {"type": "R", "before": "CWT-based", "after": "CWLT-based", "start_char_pos": 1041, "end_char_pos": 1050}, {"type": "R", "before": "local time", "after": "time instant", "start_char_pos": 1261, "end_char_pos": 1271}], "sents_char_pos": [0, 283, 355, 442, 582, 741, 820, 879, 1000, 1273, 1366, 1419]}
+{"doc_id": "2010.16177", "revision_depth": "1", "before_revision": "The problem of maintaining a maximal independent set (MIS) in a dynamic graph has received growing attention in recent years. In STOC'18, Assadi et al. presented a distributed algorithm for maintaining an MIS with O(1) ( amortized) round complexity and O(m^{3/4\\left(\\log^2 n}\\right) \\left(\\right) ] Assadi et al. is deterministic; to the best of our knowledge, the state-of-the-art distributed algorithm for this problem with a message complexity of o (m^{3/4}) incurs a round complexity of \\Omega(m^{1/3 (m^{2/3) and an amortized round complexityof }%DIFDELCMD < \\tilde{O}(1) %%% under fully dynamic edge updates in the CONGEST model, where%DIFDELCMD < \\tilde{O}%%% (\\cdot) suppresses polylogarithmic factors. ", "after_revision": "The field of dynamic graph algorithms aims at achieving a thorough understanding of real-world networks whose topology evolves with time. Traditionally, the focus has been on the classic sequential, centralized setting where the main quality measure of an algorithm is its update time, i.e. the time needed to restore the solution after each update. While real-life networks are very often distributed across multiple machines, the fundamental question of finding efficient dynamic, distributed graph algorithms received little attention to date. The goal in this setting is to optimize both the round and message complexities incurred per update step, ideally achieving a message complexity that matches the centralized update time in O(1) ( perhaps amortized) rounds. Toward initiating a systematic study of dynamic, distributed algorithms, we study some of the most central symmetry-breaking problems: maximal independent set (MIS), maximal matching/(approx-) maximum cardinality matching (MM/MCM), and (\\Delta + 1)-vertex coloring. This paper focuses on dynamic, distributed algorithms that are deterministic, and in particular -- robust against an adaptive adversary. Most of our focus is on the MIS algorithm, which achieves O\\left(m^{2/3\\log^2 n}\\right) amortized messages in O\\left(\\log^2 n\\right) amortized rounds in the Congest model. Notably, the amortized message complexity of our algorithm matches the amortized update time of the best-known deterministic centralized MIS algorithm by Gupta and Khan SOSA'21] up to a polylog n factor. The previous best deterministic distributed MIS algorithm, by Assadi et al. STOC'18 , uses O (m^{3/4}) ) and an amortized round complexityof }%DIFDELCMD < \\tilde{O}(1) %%% %DIFDELCMD < \\tilde{O}%%% amortized messages in O(1) amortized rounds, i.e., we achieve a polynomial improvement in the message complexity by a polylog n increase to the round complexity; moreover, the algorithm of Assadi et al. makes an implicit assumption that the ...", "edit_actions": [{"type": "R", "before": "problem of maintaining a maximal independent set (MIS) in a dynamic graph has received growing attention in recent years. In STOC'18, Assadi et al. presented a distributed algorithm for maintaining an MIS with", "after": "field of dynamic graph algorithms aims at achieving a thorough understanding of real-world networks whose topology evolves with time. Traditionally, the focus has been on the classic sequential, centralized setting where the main quality measure of an algorithm is its update time, i.e. the time needed to restore the solution after each update. While real-life networks are very often distributed across multiple machines, the fundamental question of finding efficient dynamic, distributed graph algorithms received little attention to date. The goal in this setting is to optimize both the round and message complexities incurred per update step, ideally achieving a message complexity that matches the centralized update time in", "start_char_pos": 4, "end_char_pos": 213}, {"type": "R", "before": "amortized) round complexity and O(m^{3/4", "after": "perhaps amortized) rounds. Toward initiating a systematic study of dynamic, distributed algorithms, we study some of the most central symmetry-breaking problems: maximal independent set (MIS), maximal matching/(approx-) maximum cardinality matching (MM/MCM), and (\\Delta + 1)-vertex coloring. This paper focuses on dynamic, distributed algorithms that are deterministic, and in particular -- robust against an adaptive adversary. Most of our focus is on the MIS algorithm, which achieves O", "start_char_pos": 221, "end_char_pos": 261}, {"type": "A", "before": null, "after": "m^{2/3", "start_char_pos": 267, "end_char_pos": 267}, {"type": "A", "before": null, "after": "amortized messages in O", "start_char_pos": 284, "end_char_pos": 284}, {"type": "A", "before": null, "after": "\\log^2 n", "start_char_pos": 290, "end_char_pos": 290}, {"type": "A", "before": null, "after": "amortized rounds in the Congest model. Notably, the amortized message complexity of our algorithm matches the amortized update time of the best-known deterministic centralized MIS algorithm by Gupta and Khan", "start_char_pos": 298, "end_char_pos": 298}, {"type": "A", "before": null, "after": "SOSA'21", "start_char_pos": 299, "end_char_pos": 299}, {"type": "A", "before": null, "after": "up to a polylog n factor. The previous best deterministic distributed MIS algorithm, by", "start_char_pos": 301, "end_char_pos": 301}, {"type": "R", "before": "is deterministic; to the best of our knowledge, the state-of-the-art distributed algorithm for this problem with a message complexity of o", "after": "STOC'18", "start_char_pos": 316, "end_char_pos": 454}, {"type": "A", "before": null, "after": ", uses O", "start_char_pos": 455, "end_char_pos": 455}, {"type": "D", "before": "incurs a round complexity of \\Omega(m^{1/3", "after": null, "start_char_pos": 466, "end_char_pos": 508}, {"type": "D", "before": "(m^{2/3", "after": null, "start_char_pos": 509, "end_char_pos": 516}, {"type": "D", "before": "under fully dynamic edge updates in the CONGEST model, where", "after": null, "start_char_pos": 585, "end_char_pos": 645}, {"type": "R", "before": "(\\cdot) suppresses polylogarithmic factors.", "after": "amortized messages in O(1) amortized rounds, i.e., we achieve a polynomial improvement in the message complexity by a polylog n increase to the round complexity; moreover, the algorithm of Assadi et al. makes an implicit assumption that the", "start_char_pos": 671, "end_char_pos": 714}, {"type": "A", "before": null, "after": "...", "start_char_pos": 715, "end_char_pos": 715}], "sents_char_pos": [0, 125, 333]}
+{"doc_id": "2011.00275", "revision_depth": "1", "before_revision": "Modern agricultural applications require knowledge about position and size of fruits on plants. However, occlusions from leaves typically make obtaining this information difficult. We present a novel viewpoint planning approach that generates an octree of plants which marks the regions of interests , i.e., fruits. Our method uses this octree to sample viewpoints that increase the information around the fruit regions and estimates their position and size . Our planner is modular and provides different ways of obtaining the regions of interest and sampling candidate viewpoints . We evaluated our approach in simulated scenarios , where we compared the resulting fruit estimations with a known ground truth. The results demonstrate that our approach outperforms two different sampling methods that do not explicitly consider the regions of interest . Furthermore, we showed the real-world applicability by testing the framework on a robotic arm equipped with an RGB-D camera installed on an automated pipe-rail trolley in a capsicum glasshouse.", "after_revision": "Modern agricultural applications require knowledge about the position and size of fruits on plants. However, occlusions from leaves typically make obtaining this information difficult. We present a novel viewpoint planning approach that builds up an octree of plants with labelled regions of interests (ROIs) , i.e., fruits. Our method uses this octree to sample viewpoint candidates that increase the information around the fruit regions and evaluates them using a heuristic utility function that takes into account the expected information gain. Our system automatically switches between ROI targeted sampling and exploration sampling, which considers general frontier voxels, depending on the estimated utility. When the plants have been sufficiently covered with the RGB-D sensor, our system clusters the ROI voxels and estimates the position and size of the detected fruits . We evaluated our approach in simulated scenarios and compared the resulting fruit estimations with the ground truth. The results demonstrate that our combined approach outperforms a sampling method that does not explicitly consider the ROIs to generate viewpoints in terms of the amount of discovered ROI cells . Furthermore, we show the real-world applicability by testing our framework on a robotic arm equipped with an RGB-D camera installed on an automated pipe-rail trolley in a capsicum glasshouse.", "edit_actions": [{"type": "A", "before": null, "after": "the", "start_char_pos": 57, "end_char_pos": 57}, {"type": "R", "before": "generates", "after": "builds up", "start_char_pos": 234, "end_char_pos": 243}, {"type": "R", "before": "which marks the", "after": "with labelled", "start_char_pos": 264, "end_char_pos": 279}, {"type": "A", "before": null, "after": "(ROIs)", "start_char_pos": 301, "end_char_pos": 301}, {"type": "R", "before": "viewpoints", "after": "viewpoint candidates", "start_char_pos": 356, "end_char_pos": 366}, {"type": "R", "before": "estimates their", "after": "evaluates them using a heuristic utility function that takes into account the expected information gain. Our system automatically switches between ROI targeted sampling and exploration sampling, which considers general frontier voxels, depending on the estimated utility. When the plants have been sufficiently covered with the RGB-D sensor, our system clusters the ROI voxels and estimates the", "start_char_pos": 426, "end_char_pos": 441}, {"type": "R", "before": ". Our planner is modular and provides different ways of obtaining the regions of interest and sampling candidate viewpoints", "after": "of the detected fruits", "start_char_pos": 460, "end_char_pos": 583}, {"type": "R", "before": ", where we", "after": "and", "start_char_pos": 635, "end_char_pos": 645}, {"type": "R", "before": "a known", "after": "the", "start_char_pos": 692, "end_char_pos": 699}, {"type": "R", "before": "approach outperforms two different sampling methods that do", "after": "combined approach outperforms a sampling method that does", "start_char_pos": 747, "end_char_pos": 806}, {"type": "R", "before": "regions of interest", "after": "ROIs to generate viewpoints in terms of the amount of discovered ROI cells", "start_char_pos": 835, "end_char_pos": 854}, {"type": "R", "before": "showed", "after": "show", "start_char_pos": 873, "end_char_pos": 879}, {"type": "R", "before": "the", "after": "our", "start_char_pos": 920, "end_char_pos": 923}], "sents_char_pos": [0, 96, 181, 317, 461, 585, 713, 856]}
+{"doc_id": "2011.00413", "revision_depth": "1", "before_revision": "We present a hierarchical control approach for maneuvering an autonomous vehicle (AV) in a tightly-constrained environment where other moving AVs and/or human driven vehicles are present. A two-level hierarchy is proposed: a high-level data-driven strategy predictor and a lower-level model-based feedback controller. The strategy predictor maps a high-dimensional environment encoding into a set of high-level strategies . Our approach uses data collected on an offline simulator to train a neural network model as the strategy predictor . Depending on the online selected strategy, a set of time-varying hyperplanes in the AV's motion space is generated and included in the lower level control. The latter is a Strategy-Guided Optimization-Based Collision Avoidance (SG-OBCA) algorithm where the strategy-dependent hyperplane constraints are used to drive a model-based receding horizon controller towards a predicted feasiblearea. The strategy also informs switching from the SG-OBCA control policy to a safety or emergency control policy . We demonstrate the effectiveness of the proposed data-driven hierarchical control framework in simulations and experiments on a 1/10 scale autonomous car platform where the strategy-guided approach outperforms a model predictive control baseline in both cases.", "after_revision": "We present a hierarchical control approach for maneuvering an autonomous vehicle (AV) in tightly-constrained environments where other moving AVs and/or human driven vehicles are present. A two-level hierarchy is proposed: a high-level data-driven strategy predictor and a lower-level model-based feedback controller. The strategy predictor maps an encoding of a dynamic environment to a set of high-level strategies via a neural network . Depending on the selected strategy, a set of time-varying hyperplanes in the AV's position space is generated online and the corresponding halfspace constraints are included in a lower-level model-based receding horizon controller . These strategy-dependent constraints drive the vehicle towards areas where it is likely to remain feasible. Moreover, the predicted strategy also informs switching between a discrete set of policies, which allows for more conservative behavior when prediction confidence is low . We demonstrate the effectiveness of the proposed data-driven hierarchical control framework in a two-car collision avoidance scenario through simulations and experiments on a 1/10 scale autonomous car platform where the strategy-guided approach outperforms a model predictive control baseline in both cases.", "edit_actions": [{"type": "D", "before": "a", "after": null, "start_char_pos": 89, "end_char_pos": 90}, {"type": "R", "before": "environment", "after": "environments", "start_char_pos": 111, "end_char_pos": 122}, {"type": "A", "before": null, "after": "an encoding of a dynamic environment to", "start_char_pos": 346, "end_char_pos": 346}, {"type": "D", "before": "high-dimensional environment encoding into a", "after": null, "start_char_pos": 349, "end_char_pos": 393}, {"type": "R", "before": ". Our approach uses data collected on an offline simulator to train", "after": "via", "start_char_pos": 423, "end_char_pos": 490}, {"type": "D", "before": "model as the strategy predictor", "after": null, "start_char_pos": 508, "end_char_pos": 539}, {"type": "D", "before": "online", "after": null, "start_char_pos": 559, "end_char_pos": 565}, {"type": "R", "before": "motion", "after": "position", "start_char_pos": 631, "end_char_pos": 637}, {"type": "R", "before": "and included in the lower level control. The latter is a Strategy-Guided Optimization-Based Collision Avoidance (SG-OBCA) algorithm where the strategy-dependent hyperplane constraints are used to drive a", "after": "online and the corresponding halfspace constraints are included in a lower-level", "start_char_pos": 657, "end_char_pos": 860}, {"type": "R", "before": "towards a predicted feasiblearea. The", "after": ". These strategy-dependent constraints drive the vehicle towards areas where it is likely to remain feasible. Moreover, the predicted", "start_char_pos": 901, "end_char_pos": 938}, {"type": "R", "before": "from the SG-OBCA control policy to a safety or emergency control policy", "after": "between a discrete set of policies, which allows for more conservative behavior when prediction confidence is low", "start_char_pos": 971, "end_char_pos": 1042}, {"type": "A", "before": null, "after": "a two-car collision avoidance scenario through", "start_char_pos": 1140, "end_char_pos": 1140}], "sents_char_pos": [0, 187, 317, 424, 541, 697, 934, 1044]}
+{"doc_id": "2011.00806", "revision_depth": "1", "before_revision": "Autonomous navigation has played an increasingly significant role in quadruped robots system. However, existing works on path planning used traditional search-based or sample-based methods which did not consider the kinodynamic characteristics of quadruped robots . And paths generated by these methods contain kinodynamically infeasible parts, which are difficult to track. In the present work, we introduced a complete navigation system considering the omnidirectional abilities of quadruped robots. First, we use kinodynamic path finding method to obtain smooth, dynamically feasible, time-optimal initial paths and added collision cost as a soft constraint to ensure safety. Then the trajectory is refined by timed elastic band (TEB) method based on the omnidirectional model of quadruped robot . The superior performance of our work is demonstrated through simulated comparisons and by using our quadruped robot Jueying Mini in our experiments .", "after_revision": "Autonomous navigation has played an increasingly significant role in quadruped robot system. However, most existing works on quadruped robots navigation using traditional search-based or sample-based methods do not consider the kinodynamic characteristics of quadruped robots , generating kinodynamically infeasible parts, that are difficult to track. In this paper, we introduce a complete navigation system considering the omnidirectional abilities of quadruped robots. First, we use kinodynamic path finding method to obtain smooth, dynamically feasible, time-optimal initial paths and add collision cost as a soft constraint to ensure safety. Then the trajectory is refined by the timed elastic band (TEB) method based on the omnidirectional model of quadruped robots . The superior performance of our work is demonstrated through simulating and real-world experiments on our quadruped robot Jueying Mini .", "edit_actions": [{"type": "R", "before": "robots", "after": "robot", "start_char_pos": 79, "end_char_pos": 85}, {"type": "A", "before": null, "after": "most", "start_char_pos": 103, "end_char_pos": 103}, {"type": "R", "before": "path planning used", "after": "quadruped robots navigation using", "start_char_pos": 122, "end_char_pos": 140}, {"type": "R", "before": "which did", "after": "do", "start_char_pos": 190, "end_char_pos": 199}, {"type": "R", "before": ". And paths generated by these methods contain", "after": ", generating", "start_char_pos": 265, "end_char_pos": 311}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 346, "end_char_pos": 351}, {"type": "R", "before": "the present work, we introduced", "after": "this paper, we introduce", "start_char_pos": 379, "end_char_pos": 410}, {"type": "R", "before": "added", "after": "add", "start_char_pos": 620, "end_char_pos": 625}, {"type": "A", "before": null, "after": "the", "start_char_pos": 714, "end_char_pos": 714}, {"type": "R", "before": "robot", "after": "robots", "start_char_pos": 795, "end_char_pos": 800}, {"type": "R", "before": "simulated comparisons and by using", "after": "simulating and real-world experiments on", "start_char_pos": 864, "end_char_pos": 898}, {"type": "D", "before": "in our experiments", "after": null, "start_char_pos": 932, "end_char_pos": 950}], "sents_char_pos": [0, 93, 266, 375, 502, 679, 802]}
+{"doc_id": "2011.01295", "revision_depth": "1", "before_revision": "In this paper we introduce a method called Dirac Assisted Tree (DAT) , which can handle heterogeneous Helmholtz equations with arbitrarily large variable wave numbers. DAT breaks an original global problem into many parallel tree-structured small local problems, which can be effectively solved. All such local solutions are then linked together to form a global solution by solving small Dirac assisted linking problemswith an inherent tree structure. DAT is embedded with the following attractive features: domain decomposition for reducing the problem size, tree structure and tridiagonal matrices for computational efficiency, and adaptivity for further improved performance. In order to solve the local problems in DAT, we shall propose a compact finite difference scheme with arbitrarily high accuracy order and low numerical dispersion for piecewise smooth coefficients and variable wave numbers. Such schemes are particularly appealing for DAT, because the local problems and their fluxes in DAT can be computed with high accuracy. With the aid of such high-order compact finite difference schemes, DAT can solve heterogeneous Helmholtz equations with arbitrarily large variable wave numbers accurately by solving small linear systems - 4 by 4 matrices in the extreme case - with tridiagonal coefficient matrices in a parallel fashion. Several examples will be provided to illustrate the effectiveness of DAT and compact finite difference schemes in numerically solving heterogeneous Helmholtz equations with variable wave numbers. We shall also discuss how to solve some special two-dimensional Helmholtz equations using DAT developed for one-dimensional problems. As demonstrated in all our numerical experiments, the convergence rates of DAT measured in relative L_2, L_\\infty and H^1 energy norms as a result of using our M-th order compact finite difference scheme are of order M .", "after_revision": "In this paper we introduce a new method called the Dirac Assisted Tree (DAT) method , which can handle 1D heterogeneous Helmholtz equations with arbitrarily large variable wave numbers. DAT breaks an original global problem into many parallel tree-structured small local problems, which are linked together to form a global solution by solving small linking problems. To solve the local problems in DAT, we propose a compact finite difference method (FDM) with arbitrarily high accuracy order and low numerical dispersion for piecewise smooth coefficients and variable wave numbers. This compact FDM is particularly appealing for DAT, because the local problems and their fluxes in DAT can be computed with high accuracy. DAT with such compact FDMs can solve heterogeneous Helmholtz equations with arbitrarily large variable wave numbers accurately by solving small linear systems - 4 \\times 4 matrices in the extreme case - with tridiagonal coefficient matrices in a parallel fashion. Several numerical examples are provided to illustrate the effectiveness of DAT using the Mth order compact FDMs with M=6,8 for numerically solving heterogeneous Helmholtz equations with variable wave numbers. We shall also discuss how to solve some special 2D Helmholtz equations using DAT .", "edit_actions": [{"type": "R", "before": "method called", "after": "new method called the", "start_char_pos": 29, "end_char_pos": 42}, {"type": "A", "before": null, "after": "method", "start_char_pos": 69, "end_char_pos": 69}, {"type": "A", "before": null, "after": "1D", "start_char_pos": 89, "end_char_pos": 89}, {"type": "R", "before": "can be effectively solved. All such local solutions are then", "after": "are", "start_char_pos": 271, "end_char_pos": 331}, {"type": "R", "before": "Dirac assisted linking problemswith an inherent tree structure. DAT is embedded with the following attractive features: domain decomposition for reducing the problem size, tree structure and tridiagonal matrices for computational efficiency, and adaptivity for further improved performance. In order to", "after": "linking problems. To", "start_char_pos": 391, "end_char_pos": 693}, {"type": "D", "before": "shall", "after": null, "start_char_pos": 730, "end_char_pos": 735}, {"type": "R", "before": "scheme", "after": "method (FDM)", "start_char_pos": 772, "end_char_pos": 778}, {"type": "R", "before": "Such schemes are", "after": "This compact FDM is", "start_char_pos": 906, "end_char_pos": 922}, {"type": "R", "before": "With the aid of such high-order compact finite difference schemes, DAT", "after": "DAT with such compact FDMs", "start_char_pos": 1042, "end_char_pos": 1112}, {"type": "R", "before": "by", "after": "\\times", "start_char_pos": 1249, "end_char_pos": 1251}, {"type": "R", "before": "examples will be", "after": "numerical examples are", "start_char_pos": 1354, "end_char_pos": 1370}, {"type": "R", "before": "and compact finite difference schemes in", "after": "using the Mth order compact FDMs with M=6,8 for", "start_char_pos": 1419, "end_char_pos": 1459}, {"type": "R", "before": "two-dimensional", "after": "2D", "start_char_pos": 1590, "end_char_pos": 1605}, {"type": "D", "before": "developed for one-dimensional problems. As demonstrated in all our numerical experiments, the convergence rates of DAT measured in relative L_2, L_\\infty and H^1 energy norms as a result of using our M-th order compact finite difference scheme are of order M", "after": null, "start_char_pos": 1636, "end_char_pos": 1894}], "sents_char_pos": [0, 169, 297, 454, 681, 905, 1041, 1345, 1541, 1675]}
+{"doc_id": "2011.02420", "revision_depth": "1", "before_revision": "Several seroprevalence studies have been or are currently conducted in order to estimate the infection fatality rate (IFR) of the Coronavirus Disease 2019 (COVID-19) . The IFR is one of the most discussed figures in the context of this pandemic. In contrast to the case fatality rate (CFR), the IFR depends on the total number of infected individuals - not just on the number of confirmed cases. As the mortality of COVID-19 largely increases with age, it is important to take the age distribution of infected individuals into account. Based on the example of Germany, this study illustrates the time-dependent evolution of effective IFR over the course of the pandemic , by combining age-group specific IFR estimates from multiple recent studies worldwide with publicly available German surveillance data . Three different methods for estimating (effective) IFRs are presented: (a) population-averaged IFRs based on the assumption that the infection risk is independent of age and time, (b) effective IFRs based on the assumption that the age distribution of confirmed cases approximately reflects the age distribution of infected individuals, and (c) effective IFRs accounting for age- and time-dependent dark figures of infections. Results for Germany show that effective IFRs are estimated to vary largely over time. A comparison of estimated IFRs with observed CFRs indicates that a substantial fraction of the time-dependent variability in observed mortality can be explained by the evolving age distribution of infections. In addition, the vanishing gap between estimated effective IFR and observed CFR is discussed in light of the assumptions of the analysis . Further research is warranted to obtain timely age-stratified IFR estimates for Germany .", "after_revision": "The infection fatality rate (IFR) of the Coronavirus Disease 2019 (COVID-19) is one of the most discussed figures in the context of this pandemic. Using German COVID-19 surveillance data and age-group specific IFR estimates from multiple international studies, this work investigates time-dependent variations in effective IFR over the course of the pandemic . Three different methods for estimating (effective) IFRs are presented: (a) population-averaged IFRs based on the assumption that the infection risk is independent of age and time, (b) effective IFRs based on the assumption that the age distribution of confirmed cases approximately reflects the age distribution of infected individuals, and (c) effective IFRs accounting for age- and time-dependent dark figures of infections. Results show that effective IFRs in Germany are estimated to vary over time, as the age distributions of confirmed cases and estimated infections are changing during the course of the pandemic. In particular during the first and second waves of infections in spring and autumn/winter 2020, there has been a pronounced shift in the age distribution of confirmed cases towards older age groups, resulting in larger effective IFR estimates. The temporary increase in effective IFR during the first wave is estimated to be smaller but still remains when adjusting for age- and time-dependent dark figures. A comparison of effective IFRs with observed CFRs indicates that a substantial fraction of the time-dependent variability in observed mortality can be explained by changes in the age distribution of infections. Furthermore, a vanishing gap between effective IFRs and observed CFRs is apparent after the first infection wave, while a moderately increasing gap can be observed during the second wave . Further research is warranted to obtain timely age-stratified IFR estimates .", "edit_actions": [{"type": "R", "before": "Several seroprevalence studies have been or are currently conducted in order to estimate the", "after": "The", "start_char_pos": 0, "end_char_pos": 92}, {"type": "D", "before": ". The IFR", "after": null, "start_char_pos": 166, "end_char_pos": 175}, {"type": "R", "before": "In contrast to the case fatality rate (CFR), the IFR depends on the total number of infected individuals - not just on the number of confirmed cases. As the mortality of", "after": "Using German", "start_char_pos": 246, "end_char_pos": 415}, {"type": "R", "before": "largely increases with age, it is important to take the age distribution of infected individuals into account. Based on the example of Germany, this study illustrates the", "after": "surveillance data and age-group specific IFR estimates from multiple international studies, this work investigates", "start_char_pos": 425, "end_char_pos": 595}, {"type": "R", "before": "evolution of", "after": "variations in", "start_char_pos": 611, "end_char_pos": 623}, {"type": "D", "before": ", by combining age-group specific IFR estimates from multiple recent studies worldwide with publicly available German surveillance data", "after": null, "start_char_pos": 670, "end_char_pos": 805}, {"type": "D", "before": "for Germany", "after": null, "start_char_pos": 1243, "end_char_pos": 1254}, {"type": "A", "before": null, "after": "in Germany", "start_char_pos": 1280, "end_char_pos": 1280}, {"type": "R", "before": "largely over time.", "after": "over time, as the age distributions of confirmed cases and estimated infections are changing during the course of the pandemic. In particular during the first and second waves of infections in spring and autumn/winter 2020, there has been a pronounced shift in the age distribution of confirmed cases towards older age groups, resulting in larger effective IFR estimates. The temporary increase in effective IFR during the first wave is estimated to be smaller but still remains when adjusting for age- and time-dependent dark figures.", "start_char_pos": 1303, "end_char_pos": 1321}, {"type": "R", "before": "estimated", "after": "effective", "start_char_pos": 1338, "end_char_pos": 1347}, {"type": "R", "before": "the evolving", "after": "changes in the", "start_char_pos": 1486, "end_char_pos": 1498}, {"type": "R", "before": "In addition, the", "after": "Furthermore, a", "start_char_pos": 1531, "end_char_pos": 1547}, {"type": "R", "before": "estimated effective IFR and observed CFR is discussed in light of the assumptions of the analysis", "after": "effective IFRs and observed CFRs is apparent after the first infection wave, while a moderately increasing gap can be observed during the second wave", "start_char_pos": 1570, "end_char_pos": 1667}, {"type": "D", "before": "for Germany", "after": null, "start_char_pos": 1746, "end_char_pos": 1757}], "sents_char_pos": [0, 167, 245, 395, 535, 807, 1234, 1321, 1530, 1669]}
+{"doc_id": "2011.03213", "revision_depth": "1", "before_revision": "In the recent literature, significant and substantial efforts have been dedicated to the important area of multi-agent decision-making problems. Particularly here, the model predictive control (MPC) methodology has demonstrated its effectiveness in various applications, such as mobile robots, unmanned vehicles, and drones. Nevertheless, in many specific scenarios involving the MPC methodology , accurate and effective system identification is a commonly encountered challenge . As a consequence, the overall system performance could be significantly weakened in outcome when the traditional MPC algorithm is adopted under such circumstances . To cater to this rather major shortcoming, this paper investigates an alternate data-driven approach to solve the multi-agent decision-making problem . Utilizing an innovative modified methodology with suitable closed-loop input/output measurements that comply with the appropriate persistency of excitation condition, a non-parametric predictive model is suitably constructed . This non-parametric predictive model approach in the work here attains the key advantage of alleviating the rather heavy computational burden encountered in the optimization procedures typical in alternative methodologies requiring open-loop input/output measurement data collection and parametric system identification. Then with a conservative approximation of probabilistic chance constraints for the MPC problem, a resulting deterministic optimization problem is formulated and solved efficiently and effectively. In the work here, this intuitive data-driven approach is also shown to preserve good robustness properties . Finally, a multi-drone system is used to demonstrate the practical appeal and highly effective outcome of this promising development in achieving very good system performance .", "after_revision": "In many specific scenarios , accurate and effective system identification is a commonly encountered challenge in the model predictive control (MPC) formulation . As a consequence, the overall system performance could be significantly degraded in outcome when the traditional MPC algorithm is adopted under those circumstances when such accuracy is lacking . To cater to this rather major shortcoming, this paper investigates a non-parametric behavior learning method for multi-agent decision making, which underpins an alternate data-driven predictive control framework . Utilizing an innovative methodology with closed-loop input/output measurements of the unknown system, the behavior of the system is learned based on the collected dataset, and thus the constructed non-parametric predictive model can be used for the determination of optimal control actions . This non-parametric predictive control framework attains the noteworthy key advantage of alleviating the heavy computational burden commonly encountered in the optimization procedures otherwise involved. Such requisite optimization procedures are typical in existing methodologies requiring open-loop input/output measurement data collection and parametric system identification. Then with a conservative approximation of probabilistic chance constraints for the MPC problem, a resulting deterministic optimization problem is formulated and solved effectively. This intuitive data-driven approach is also shown to preserve good robustness properties (even in the inevitable existence of parametric uncertainties that naturally arise in the typical system identification process) . Finally, a multi-drone system is used to demonstrate the practical appeal and highly effective outcome of this promising development .", "edit_actions": [{"type": "D", "before": "the recent literature, significant and substantial efforts have been dedicated to the important area of multi-agent decision-making problems. Particularly here, the model predictive control (MPC) methodology has demonstrated its effectiveness in various applications, such as mobile robots, unmanned vehicles, and drones. Nevertheless, in", "after": null, "start_char_pos": 3, "end_char_pos": 341}, {"type": "D", "before": "involving the MPC methodology", "after": null, "start_char_pos": 366, "end_char_pos": 395}, {"type": "A", "before": null, "after": "in the model predictive control (MPC) formulation", "start_char_pos": 479, "end_char_pos": 479}, {"type": "R", "before": "weakened", "after": "degraded", "start_char_pos": 554, "end_char_pos": 562}, {"type": "R", "before": "such circumstances", "after": "those circumstances when such accuracy is lacking", "start_char_pos": 626, "end_char_pos": 644}, {"type": "A", "before": null, "after": "a non-parametric behavior learning method for multi-agent decision making, which underpins", "start_char_pos": 714, "end_char_pos": 714}, {"type": "R", "before": "approach to solve the multi-agent decision-making problem", "after": "predictive control framework", "start_char_pos": 740, "end_char_pos": 797}, {"type": "R", "before": "modified methodology with suitable", "after": "methodology with", "start_char_pos": 824, "end_char_pos": 858}, {"type": "R", "before": "that comply with the appropriate persistency of excitation condition, a", "after": "of the unknown system, the behavior of the system is learned based on the collected dataset, and thus the constructed", "start_char_pos": 897, "end_char_pos": 968}, {"type": "R", "before": "is suitably constructed", "after": "can be used for the determination of optimal control actions", "start_char_pos": 1001, "end_char_pos": 1024}, {"type": "R", "before": "model approach in the work here attains the", "after": "control framework attains the noteworthy", "start_char_pos": 1058, "end_char_pos": 1101}, {"type": "D", "before": "rather", "after": null, "start_char_pos": 1135, "end_char_pos": 1141}, {"type": "A", "before": null, "after": "commonly", "start_char_pos": 1169, "end_char_pos": 1169}, {"type": "R", "before": "typical in alternative", "after": "otherwise involved. Such requisite optimization procedures are typical in existing", "start_char_pos": 1213, "end_char_pos": 1235}, {"type": "R", "before": "efficiently and effectively. In the work here, this", "after": "effectively. This", "start_char_pos": 1517, "end_char_pos": 1568}, {"type": "A", "before": null, "after": "(even in the inevitable existence of parametric uncertainties that naturally arise in the typical system identification process)", "start_char_pos": 1653, "end_char_pos": 1653}, {"type": "D", "before": "in achieving very good system performance", "after": null, "start_char_pos": 1789, "end_char_pos": 1830}], "sents_char_pos": [0, 144, 324, 481, 646, 799, 1026, 1348, 1545, 1655]}
+{"doc_id": "2011.03495", "revision_depth": "1", "before_revision": "We provide algorithms with improved pass and space complexities for approximately solving linear programs, optimal transport, bipartite matching, and more in the semi-streaming model. For instance, we provide a (randomized)algorithm computing a maximum cardinality matching in an unweighted bipartite graph in O(\\log^2 n \\cdot \\epsilon ^{-1} ) passes, using O(n \\log^2 n \\cdot \\epsilon^{-1)auxiliary memory. This marks the first improvements to the O(\\log\\log\\epsilon^{-1}\\cdot \\epsilon^{-2})pass, O(n \\log\\log\\epsilon} ^{-1} \\cdot \\epsilon^{-2 ) -space algorithms of AG13%DIFDELCMD < ] %%% when \\epsilon is moderately small . To obtain our results , we give an O(n) space deterministic semi-streaming algorithm for approximating the value of linear programs (in the form of box-simplex games), based on low-space implementations of She17 , JST19 . We further give a general sampling procedure for explicitly forming a fractional solution in low space, yielding improved semi-streaming guarantees for optimal transport and, in some regimes, maximum weighted matching. Finally, we improve the space complexity of our maximum cardinality matching method using an implicit implementation of the random walk rounding of%DIFDELCMD < [%%% GKK10 via custom turnstile samplers .", "after_revision": "We provide (\\epsilon ^{-1} )-pass semi-streaming algorithms for computing (1-\\epsilon)-approximate maximum cardinality matchings in bipartite graphs. Our most efficient methods are deterministic and use optimal, O(n )auxiliary memory. This marks the first improvements to the O(\\log\\log\\epsilon^{-1}\\cdot \\epsilon^{-2})pass, O(n \\log\\log\\epsilon} ), space, improving upon the space complexity of the previous state-of-the-art (\\epsilon ^{-1} ) %DIFDELCMD < ] %%% -pass algorithm of Ahn and Gupta . To obtain our results we provide semi-streaming adaptations of more general continuous optimization tools. Further, we leverage these techniques to obtain improvements for streaming variants of approximate linear programming, optimal transport , %DIFDELCMD < [%%% and exact matching .", "edit_actions": [{"type": "R", "before": "algorithms with improved pass and space complexities for approximately solving linear programs, optimal transport, bipartite matching, and more in the semi-streaming model. For instance, we provide a (randomized)algorithm computing a maximum cardinality matching in an unweighted bipartite graph in O(\\log^2 n \\cdot \\epsilon", "after": "(\\epsilon", "start_char_pos": 11, "end_char_pos": 335}, {"type": "R", "before": ") passes, using", "after": ")-pass semi-streaming algorithms for computing (1-\\epsilon)-approximate maximum cardinality matchings in bipartite graphs. Our most efficient methods are deterministic and use optimal,", "start_char_pos": 342, "end_char_pos": 357}, {"type": "D", "before": "\\log^2 n \\cdot \\epsilon^{-1", "after": null, "start_char_pos": 362, "end_char_pos": 389}, {"type": "A", "before": null, "after": "), space, improving upon the space complexity of the previous state-of-the-art", "start_char_pos": 520, "end_char_pos": 520}, {"type": "A", "before": null, "after": "(\\epsilon", "start_char_pos": 521, "end_char_pos": 521}, {"type": "D", "before": "\\cdot \\epsilon^{-2", "after": null, "start_char_pos": 528, "end_char_pos": 546}, {"type": "D", "before": "-space algorithms of", "after": null, "start_char_pos": 549, "end_char_pos": 569}, {"type": "D", "before": "AG13", "after": null, "start_char_pos": 570, "end_char_pos": 574}, {"type": "R", "before": "when \\epsilon is moderately small", "after": "-pass algorithm of Ahn and Gupta", "start_char_pos": 593, "end_char_pos": 626}, {"type": "R", "before": ", we give an O(n) space deterministic", "after": "we provide", "start_char_pos": 651, "end_char_pos": 688}, {"type": "D", "before": "algorithm for approximating the value of linear programs (in the form of box-simplex games), based on low-space implementations of", "after": null, "start_char_pos": 704, "end_char_pos": 834}, {"type": "R", "before": "She17", "after": "adaptations of more general continuous optimization tools. Further, we leverage these techniques to obtain improvements for streaming variants of approximate linear programming, optimal transport", "start_char_pos": 835, "end_char_pos": 840}, {"type": "D", "before": "JST19", "after": null, "start_char_pos": 843, "end_char_pos": 848}, {"type": "D", "before": ". We further give a general sampling procedure for explicitly forming a fractional solution in low space, yielding improved semi-streaming guarantees for optimal transport and, in some regimes, maximum weighted matching. Finally, we improve the space complexity of our maximum cardinality matching method using an implicit implementation of the random walk rounding of", "after": null, "start_char_pos": 849, "end_char_pos": 1217}, {"type": "D", "before": "GKK10", "after": null, "start_char_pos": 1235, "end_char_pos": 1240}, {"type": "R", "before": "via custom turnstile samplers", "after": "and exact matching", "start_char_pos": 1241, "end_char_pos": 1270}], "sents_char_pos": [0, 183, 407, 628, 1069]}
+{"doc_id": "2011.03748", "revision_depth": "1", "before_revision": "We present a novel learning algorithm for action prediction and local navigation for autonomous driving . Our approach classifies the driver behavior of other vehicles or road-agents (aggressive or conservative) and takes that into account for decision making and safe driving. We present a behavior-driven simulator that can generate trajectories corresponding to different levels of aggressive behaviors and use our simulator to train a policy using graph convolutional networks . We use a reinforcement learning-based navigation scheme that uses a proximity graph of traffic agents and computes a safe trajectory for the ego-vehicle that accounts for aggressive driver maneuvers such as overtaking, over-speeding, weaving, and sudden lane changes. We have integrated our algorithm with OpenAI gym-based \" Highway-Env \" simulator and demonstrate the benefits in terms of improved navigation in different scenarios .", "after_revision": "We present an algorithm for behaviorally-guided action prediction and local navigation for autonomous driving in dense traffic scenarios . Our approach classifies the driver behavior of other vehicles or road-agents (aggressive or conservative) and considers that information for decision-making and safe driving. We present a behavior-driven simulator that can generate trajectories corresponding to different levels of aggressive behaviors , and we use our simulator to train a reinforcement learning policy using a multilayer perceptron neural network . We use our reinforcement learning-based navigation scheme to compute safe trajectories for the ego-vehicle accounting for aggressive driver maneuvers such as overtaking, over-speeding, weaving, and sudden lane changes. We have integrated our algorithm with the OpenAI gym-based `` Highway-Env '' simulator and demonstrate the benefits of our navigation algorithm in terms of reducing collisions by 3.25 - 26.90\\% and handling scenarios with 2.5 \\times higher traffic density .", "edit_actions": [{"type": "R", "before": "a novel learning algorithm for", "after": "an algorithm for behaviorally-guided", "start_char_pos": 11, "end_char_pos": 41}, {"type": "A", "before": null, "after": "in dense traffic scenarios", "start_char_pos": 104, "end_char_pos": 104}, {"type": "R", "before": "takes that into account for decision making", "after": "considers that information for decision-making", "start_char_pos": 217, "end_char_pos": 260}, {"type": "R", "before": "and", "after": ", and we", "start_char_pos": 407, "end_char_pos": 410}, {"type": "R", "before": "policy using graph convolutional networks", "after": "reinforcement learning policy using a multilayer perceptron neural network", "start_char_pos": 440, "end_char_pos": 481}, {"type": "R", "before": "a", "after": "our", "start_char_pos": 491, "end_char_pos": 492}, {"type": "R", "before": "that uses a proximity graph of traffic agents and computes a safe trajectory", "after": "to compute safe trajectories", "start_char_pos": 540, "end_char_pos": 616}, {"type": "R", "before": "that accounts", "after": "accounting", "start_char_pos": 637, "end_char_pos": 650}, {"type": "A", "before": null, "after": "the", "start_char_pos": 790, "end_char_pos": 790}, {"type": "R", "before": "\"", "after": "``", "start_char_pos": 808, "end_char_pos": 809}, {"type": "R", "before": "\"", "after": "''", "start_char_pos": 822, "end_char_pos": 823}, {"type": "R", "before": "in terms of improved navigation in different scenarios", "after": "of our navigation algorithm in terms of reducing collisions by 3.25 - 26.90\\% and handling scenarios with 2.5 \\times higher traffic density", "start_char_pos": 863, "end_char_pos": 917}], "sents_char_pos": [0, 106, 278, 483, 751]}
+{"doc_id": "2011.04273", "revision_depth": "1", "before_revision": "We study the following variant of the classic bin packing problem. The input is {\\em a set of items I = \\{ 1 , %DIFDELCMD < \\dots %%% , N \\} with corresponding sizess_1, ...,s_N \\in (0 , 1 , partitioned into n groupsG_1, ...,G_n. The goal is to pack the items in a minimum number of unit size bins, such that no two items of the same group are packed in the same bin. This group bin packing (GBP) problem, also known as{\\em bin packing with clique-graph conflicts , has natural applications in storing file replicas, security in cloud computing and signal distribution. In this paper, we present an{\\em asymptotic polynomial time approximation scheme (APTAS) for group bin packing, thus improving the best known ratio of 2 Adany et al., 2016%DIFDELCMD < ]%%% . In particular, for any instance I and a fixed \\varepsilon \\eps \\in (0,1), our scheme packs the items in at most (1+ \\varepsilon \\eps )OPT(I) +1 bins, where OPT(I) is the minimum number of bins required for packing the instance {\\em {\\em {\\em .", "after_revision": "We study the following variant of the classic {\\em bin packing problem. Given a set of items of various sizes , %DIFDELCMD < \\dots %%% partitioned into groups , find a packing of the items in a minimum number of identical (unit-size) bins, such that no two items of the same group are assigned to the same bin. This problem, known as{\\em bin packing with clique-graph conflicts , has natural applications in storing file replicas, security in cloud computing and signal distribution. Our main result is an{\\em asymptotic polynomial time approximation scheme (APTAS) for the problem, improving upon the best known ratio of %DIFDELCMD < ]%%% 2. \\% In particular, for any instance I and a fixed \\eps \\in (0,1), the items are packed in at most (1+ \\eps )OPT(I) +1 bins, where OPT(I) is the minimum number of bins required for packing the instance . As a key tool, we apply a novel{\\em Shift \\& Swap technique which generalizes the classic linear shifting technique to scenarios allowing conflicts between items. The major challenge of packing{\\em small items using only a small number of extra bins is tackled through an intricate combination of enumeration and a greedy-based approach that utilizes the rounded solution of a{\\em linear program .", "edit_actions": [{"type": "D", "before": "bin packing problem. The input is", "after": null, "start_char_pos": 46, "end_char_pos": 79}, {"type": "A", "before": null, "after": "bin packing", "start_char_pos": 85, "end_char_pos": 85}, {"type": "A", "before": null, "after": "problem. Given", "start_char_pos": 86, "end_char_pos": 86}, {"type": "R", "before": "I = \\{ 1", "after": "of various sizes", "start_char_pos": 102, "end_char_pos": 110}, {"type": "R", "before": ", N \\} with corresponding sizess_1, ...,s_N \\in (0", "after": "partitioned into groups", "start_char_pos": 136, "end_char_pos": 186}, {"type": "D", "before": "1", "after": null, "start_char_pos": 189, "end_char_pos": 190}, {"type": "R", "before": ", partitioned into n groupsG_1, ...,G_n. The goal is to pack", "after": "find a packing of", "start_char_pos": 191, "end_char_pos": 251}, {"type": "R", "before": "unit size", "after": "identical (unit-size)", "start_char_pos": 285, "end_char_pos": 294}, {"type": "R", "before": "packed in", "after": "assigned to", "start_char_pos": 346, "end_char_pos": 355}, {"type": "R", "before": "group bin packing (GBP) problem, also known as", "after": "problem, known as", "start_char_pos": 375, "end_char_pos": 421}, {"type": "R", "before": "In this paper, we present an", "after": "Our main result is an", "start_char_pos": 572, "end_char_pos": 600}, {"type": "R", "before": "for group bin packing, thus improving", "after": "for the problem, improving upon", "start_char_pos": 661, "end_char_pos": 698}, {"type": "D", "before": "2", "after": null, "start_char_pos": 723, "end_char_pos": 724}, {"type": "D", "before": "Adany et al., 2016", "after": null, "start_char_pos": 725, "end_char_pos": 743}, {"type": "R", "before": ".", "after": "2. \\%", "start_char_pos": 761, "end_char_pos": 762}, {"type": "D", "before": "\\varepsilon", "after": null, "start_char_pos": 809, "end_char_pos": 820}, {"type": "R", "before": "our scheme packs the items", "after": "the items are packed", "start_char_pos": 837, "end_char_pos": 863}, {"type": "D", "before": "\\varepsilon", "after": null, "start_char_pos": 879, "end_char_pos": 890}, {"type": "A", "before": null, "after": ". As a key tool, we apply a novel", "start_char_pos": 990, "end_char_pos": 990}, {"type": "A", "before": null, "after": "Shift \\& Swap", "start_char_pos": 995, "end_char_pos": 995}, {"type": "A", "before": null, "after": "technique which generalizes the classic linear shifting technique to scenarios allowing conflicts between items. The major challenge of packing", "start_char_pos": 996, "end_char_pos": 996}, {"type": "A", "before": null, "after": "small", "start_char_pos": 1001, "end_char_pos": 1001}, {"type": "A", "before": null, "after": "items using only a small number of extra bins is tackled through an intricate combination of enumeration and a greedy-based approach that utilizes the rounded solution of a", "start_char_pos": 1002, "end_char_pos": 1002}, {"type": "A", "before": null, "after": "linear program", "start_char_pos": 1007, "end_char_pos": 1007}], "sents_char_pos": [0, 66, 369, 571]}
+{"doc_id": "2011.04840", "revision_depth": "1", "before_revision": "High-speed arm motions can dynamically manipulate ropes and cables to vault over obstacles, knock objects from pedestals, and weave between obstacles. In this paper, we propose a self-supervised learning pipeline that enables a UR5 robot to perform these three tasks. The pipeline trains a deep convolutional neural network that takes as input an image of the scene with object and target. It computes a 3D apex point for the robot arm, which, together with a task-specific trajectory function, defines an arcing motion for a manipulator arm to dynamically manipulate the cable to perform a task with varying obstacle and target locations. The trajectory function computes high-speed minimum-jerk arcing motions that are constrained to remain within joint limits and to travel through the 3D apex point by repeatedly solving quadratic programs for shorter time horizons to find the shortest and fastest feasible motion. We experiment with the proposed pipeline on 5 physical cables with different thickness and mass and compare performance with two baselines in which a human chooses the apex point. Results suggest that the robot using the learned apex point can achieve success rates of 81.7\\% in vaulting, 65.0\\% in knocking, and 60.0\\% in weaving, while a baseline with a fixed apex across the three tasks achieves respective success rates of 51.7\\%, 36.7\\%, and 15.0\\%, and a baseline with human-specified task-specific apex points achieves 66.7\\%, 56.7\\%, and 15.0\\% success rate respectively . Code, data, and supplementary materials are available at URL //sites.google.com/berkeley.edu/dynrope/home ", "after_revision": "We explore how high-speed robot arm motions can dynamically manipulate cables to vault over obstacles, knock objects from pedestals, and weave between obstacles. In this paper, we propose a self-supervised learning framework that enables a UR5 robot to perform these three tasks. The framework finds a 3D apex point for the robot arm, which, together with a task-specific trajectory function, defines an arcing motion that dynamically manipulates the cable to perform tasks with varying obstacle and target locations. The trajectory function computes minimum-jerk motions that are constrained to remain within joint limits and to travel through the 3D apex point by repeatedly solving quadratic programs to find the shortest and fastest feasible motion. We experiment with 5 physical cables with different thickness and mass and compare performance against two baselines in which a human chooses the apex point. Results suggest that a baseline with a fixed apex across the three tasks achieves respective success rates of 51.7\\%, 36.7\\%, and 15.0\\%, and a baseline with human-specified , task-specific apex points achieves 66.7\\%, 56.7\\%, and 15.0\\% success rate respectively , while the robot using the learned apex point can achieve success rates of 81.7\\% in vaulting, 65.0\\% in knocking, and 60.0\\% in weaving . Code, data, and supplementary materials are available at URL //sites.google.com/berkeley.edu/dynrope/home .", "edit_actions": [{"type": "R", "before": "High-speed", "after": "We explore how high-speed robot", "start_char_pos": 0, "end_char_pos": 10}, {"type": "D", "before": "ropes and", "after": null, "start_char_pos": 50, "end_char_pos": 59}, {"type": "R", "before": "pipeline", "after": "framework", "start_char_pos": 204, "end_char_pos": 212}, {"type": "R", "before": "pipeline trains a deep convolutional neural network that takes as input an image of the scene with object and target. It computes a", "after": "framework finds a", "start_char_pos": 272, "end_char_pos": 403}, {"type": "R", "before": "for a manipulator arm to dynamically manipulate", "after": "that dynamically manipulates", "start_char_pos": 520, "end_char_pos": 567}, {"type": "R", "before": "a task", "after": "tasks", "start_char_pos": 589, "end_char_pos": 595}, {"type": "D", "before": "high-speed", "after": null, "start_char_pos": 673, "end_char_pos": 683}, {"type": "D", "before": "arcing", "after": null, "start_char_pos": 697, "end_char_pos": 703}, {"type": "D", "before": "for shorter time horizons", "after": null, "start_char_pos": 844, "end_char_pos": 869}, {"type": "D", "before": "the proposed pipeline on", "after": null, "start_char_pos": 939, "end_char_pos": 963}, {"type": "R", "before": "with", "after": "against", "start_char_pos": 1040, "end_char_pos": 1044}, {"type": "D", "before": "the robot using the learned apex point can achieve success rates of 81.7\\% in vaulting, 65.0\\% in knocking, and 60.0\\% in weaving, while", "after": null, "start_char_pos": 1121, "end_char_pos": 1257}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1411, "end_char_pos": 1411}, {"type": "A", "before": null, "after": ", while the robot using the learned apex point can achieve success rates of 81.7\\% in vaulting, 65.0\\% in knocking, and 60.0\\% in weaving", "start_char_pos": 1500, "end_char_pos": 1500}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1609, "end_char_pos": 1609}], "sents_char_pos": [0, 150, 267, 389, 639, 919, 1099, 1566]}
+{"doc_id": "2011.04892", "revision_depth": "2", "before_revision": "A timely understanding of the spatiotemporal pattern and development trend in the early stages of the of COVID-19 epidemic is highly significant for timely prevention and control. However, under-reporting is commonly prevalent in the early stages of an epidemic. In this paper , confirmed cases of healthcare workers are considered as accurately small samples to analyze the impact of under-reporting on the spatiotemporal distribution of COVID-19 from three perspectives , namely : parameter estimation, spatiotemporal correlation, and spatiotemporal lag. The results show that : (1) the lognormal distribution was the most suitable to describe the evolution of epidemic with time . (2) The estimated peak infection time of the reported cases lags behind the peak infection time of the healthcare worker cases, and the estimated infection time interval of the reported cases is smaller than the infection time interval of the healthcare worker cases. (3) The impact of under-reporting cases on the early stages of the pandemic is greater than that on its later stages, and the impact on the early onset area is greater than that on the late onset area. (4) Although the number of reported cases is lower than the actual number of cases, a high spatial correlation exists between the cumulatively reported cases and healthcare worker cases.", "after_revision": "A timely understanding of the spatiotemporal pattern and development trend in the early stages of the of COVID-19 epidemic is critical for timely prevention and control. However, under-reporting is commonly prevalent in the early stages of an epidemic. In this study , confirmed cases of healthcare workers are considered as accurate small samples to analyze the impact of under-reporting on the spatiotemporal distribution of COVID-19 from three perspectives : parameter estimation, spatiotemporal correlation, and spatiotemporal lag. The results show that (1) the lognormal distribution was the most suitable to describe the evolution of epidemic with time ; (2) the estimated peak infection time of the reported cases lagged the peak infection time of the healthcare worker cases, and the estimated infection time interval of the reported cases was smaller than that of the healthcare worker cases. (3) The impact of under-reporting cases on the early stages of the pandemic was greater than that on its later stages, and the impact on the early onset area was greater than that on the late onset area. (4) Although the number of reported cases was lower than the actual number of cases, a high spatial correlation existed between the cumulatively reported cases and healthcare worker cases.", "edit_actions": [{"type": "R", "before": "highly significant", "after": "critical", "start_char_pos": 126, "end_char_pos": 144}, {"type": "R", "before": "paper", "after": "study", "start_char_pos": 271, "end_char_pos": 276}, {"type": "R", "before": "accurately", "after": "accurate", "start_char_pos": 335, "end_char_pos": 345}, {"type": "D", "before": ", namely", "after": null, "start_char_pos": 472, "end_char_pos": 480}, {"type": "D", "before": ":", "after": null, "start_char_pos": 579, "end_char_pos": 580}, {"type": "R", "before": ".", "after": ";", "start_char_pos": 682, "end_char_pos": 683}, {"type": "R", "before": "The", "after": "the", "start_char_pos": 688, "end_char_pos": 691}, {"type": "R", "before": "lags behind", "after": "lagged", "start_char_pos": 744, "end_char_pos": 755}, {"type": "R", "before": "is smaller than the infection time interval", "after": "was smaller than that", "start_char_pos": 876, "end_char_pos": 919}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1028, "end_char_pos": 1030}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1109, "end_char_pos": 1111}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1196, "end_char_pos": 1198}, {"type": "R", "before": "exists", "after": "existed", "start_char_pos": 1265, "end_char_pos": 1271}], "sents_char_pos": [0, 179, 262, 556, 951, 1153]}
+{"doc_id": "2011.06775", "revision_depth": "1", "before_revision": "Robust and safe self-driving in complex and dynamic environments is quite challenging due to the requirement of scalable driving policies against the wide variety of traffic scenarios (e,g., road topologies, traffic rules and interaction with road agents). In this area, traditional modular frameworks scale poorly in new environments, and require tremendous and iterative hand-tuning of rules and parameters to maintain performance in all foreseeable scenarios. Recently, deep-learning based self-driving methods have shown promising results with better generalization capability but less hand engineering effort. However, most of the previous methods are trained and evaluated in limited and simple environments with scattered tasks, such as lane-following, autonomous braking and conditional driving. In this paper, we propose a graph-based deep network to achieve unified and scalable self-driving in diverse dynamic environments. The extensive evaluation results show that our model can safely navigate the vehicle in a large variety of urban, rural, and highway areas with dense traffic while obeying traffic rules . Specifically, more than 7, 500 km of closed-loop driving evaluation is conducted in dynamic simulation environments , in which our method can handle complex driving situations, and achieve higher success rates (73.5\\%-83.2\\%) and driving scores than the baselines .", "after_revision": "Traditional modular self-driving frameworks scale poorly in new scenarios, which usually require tedious hand-tuning of rules and parameters to maintain acceptable performance in all foreseeable occasions. Therefore, robust and safe self-driving using traditional frameworks is still challenging, especially in complex and dynamic environments. Recently, deep-learning based self-driving methods have shown promising results with better generalization capability but less hand engineering effort. However, most of the previous learning-based methods are trained and evaluated in limited driving scenarios with scattered tasks, such as lane-following, autonomous braking , and conditional driving. In this paper, we propose a graph-based deep network to achieve scalable self-driving that can handle massive traffic scenarios . Specifically, more than 7, 000 km of evaluation is conducted in a high-fidelity driving simulator , in which our method can obey the traffic rules and safely navigate the vehicle in a large variety of urban, rural, and highway environments, including unprotected left turns, narrow roads, roundabouts, and pedestrian-rich intersections. The results also show that our method achieves better performance over the baselines in terms of success rate. This work is accompanied with some demonstration videos which are available at URL", "edit_actions": [{"type": "R", "before": "Robust and safe", "after": "Traditional modular", "start_char_pos": 0, "end_char_pos": 15}, {"type": "D", "before": "in complex and dynamic environments is quite challenging due to the requirement of scalable driving policies against the wide variety of traffic scenarios (e,g., road topologies, traffic rules and interaction with road agents). In this area, traditional modular", "after": null, "start_char_pos": 29, "end_char_pos": 290}, {"type": "R", "before": "environments, and require tremendous and iterative", "after": "scenarios, which usually require tedious", "start_char_pos": 322, "end_char_pos": 372}, {"type": "A", "before": null, "after": "acceptable", "start_char_pos": 421, "end_char_pos": 421}, {"type": "R", "before": "scenarios.", "after": "occasions. Therefore, robust and safe self-driving using traditional frameworks is still challenging, especially in complex and dynamic environments.", "start_char_pos": 453, "end_char_pos": 463}, {"type": "A", "before": null, "after": "learning-based", "start_char_pos": 646, "end_char_pos": 646}, {"type": "R", "before": "and simple environments", "after": "driving scenarios", "start_char_pos": 692, "end_char_pos": 715}, {"type": "A", "before": null, "after": ",", "start_char_pos": 781, "end_char_pos": 781}, {"type": "D", "before": "unified and", "after": null, "start_char_pos": 871, "end_char_pos": 882}, {"type": "R", "before": "in diverse dynamic environments. The extensive evaluation results show that our model can safely navigate the vehicle in a large variety of urban, rural, and highway areas with dense traffic while obeying traffic rules", "after": "that can handle massive traffic scenarios", "start_char_pos": 905, "end_char_pos": 1123}, {"type": "R", "before": "500 km of closed-loop driving", "after": "000 km of", "start_char_pos": 1153, "end_char_pos": 1182}, {"type": "R", "before": "dynamic simulation environments", "after": "a high-fidelity driving simulator", "start_char_pos": 1210, "end_char_pos": 1241}, {"type": "R", "before": "handle complex driving situations, and achieve higher success rates (73.5\\%-83.2\\%) and driving scores than the baselines .", "after": "obey the traffic rules and safely navigate the vehicle in a large variety of urban, rural, and highway environments, including unprotected left turns, narrow roads, roundabouts, and pedestrian-rich intersections. The results also show that our method achieves better performance over the baselines in terms of success rate. This work is accompanied with some demonstration videos which are available at URL", "start_char_pos": 1268, "end_char_pos": 1391}], "sents_char_pos": [0, 256, 463, 615, 806, 937]}
+{"doc_id": "2011.07471", "revision_depth": "2", "before_revision": "We introduce difference estimators for data stream computation, which provide approximations to F(v)-F(u) for frequency vectors v\\succeq u and a given function F. We show how to use such estimators to carefully trade error for memory in an iterative manner. The function F is generally non-linear, and we give the first difference estimators for the frequency moments F_p for p\\in[0,2], as well as for integers p>2. Using these, we resolve a number of central open questions in adversarial robust streaming and sliding window models. For adversarially robust streams, we obtain a (1+\\epsilon)-approximation to F_p using%DIFDELCMD < \\mathcal{O}\\left(%%% \\frac{\\log n{\\epsilon^2}}%DIFDELCMD < \\right) %%% bits of space for p\\in[0,2] and using%DIFDELCMD < \\mathcal{O}\\left(%%% \\frac{1{\\epsilon^2}n^{1-2/p}}%DIFDELCMD < \\right) %%% bits of space for integers p>2. We also obtain an adversarially robust algorithm for the L_2-heavy hitters problem using%DIFDELCMD < \\mathcal{O}\\left(%%% \\frac{\\log n{\\epsilon^2}}%DIFDELCMD < \\right) %%% bits of space. Our bounds are optimal up to \\text{poly(\\log\\log n+\\log(1/\\epsilon)) factors, and improve the 1{\\epsilon^3} dependence of } Ben-Eliezer et al. (PODS 2020, best paper award) and the \\frac{1{\\epsilon^{2.5}} dependence of Hassidim et} al. (NeurIPS 2020, oral presentation) . For sliding windows, we obtain a (1+\\epsilon)-approximation to F_p for p\\in(0,2 , resolving a longstanding question of Braverman and Ostrovsky (FOCS 2007). For example, for p = 2 we improve the dependence on \\epsilon from \\frac{1{\\epsilon^4} to an optimal \\frac{1}{\\epsilon^2}. For both models, our dependence on \\epsilon shows, up to \\log\\frac{1}{\\epsilon} factors, that there is no overhead over the standard insertion-only data stream model for any of these problems. } ", "after_revision": "%DIFDELCMD < \\mathcal{O}\\left(%%% {\\epsilon^2}}%DIFDELCMD < \\right) %%% %DIFDELCMD < \\mathcal{O}\\left(%%% {\\epsilon^2}n^{1-2/p}}%DIFDELCMD < \\right) %%% %DIFDELCMD < \\mathcal{O}\\left(%%% {\\epsilon^2}}%DIFDELCMD < \\right) %%% (\\log\\log n+\\log(1/\\epsilon)) factors, and improve the 1{\\epsilon^3} dependence of } In the adversarially robust streaming model, a stream of elements is presented to an algorithm and is allowed to depend on the output of the algorithm at earlier times during the stream. In the classic insertion-only model of data streams, Ben-Eliezer et . al. (PODS 2020, best paper award) {\\epsilon^{2.5}} dependence of Hassidim et} show how to convert a non-robust algorithm into a robust one with a roughly 1/\\varepsilon factor overhead. This was subsequently improved to a 1/\\sqrt{\\varepsilon al. (NeurIPS 2020, oral presentation) , suppressing logarithmic factors. For general functions the latter is known to be best-possible, by a result of Kaplan et. al. (CRYPTO 2021). We show how to bypass this impossibility result by developing data stream algorithms for a large class of streaming problems, with no overhead in the approximation factor. Our class of streaming problems includes the most well-studied problems such as the L_2-heavy hitters problem, F_p-moment estimation, as well as empirical entropy estimation. We substantially improve upon all prior work on these problems, giving the first optimal dependence on the approximation factor. As in previous work, we obtain a general transformation that applies to any non-robust streaming algorithm and depends on the {\\epsilon^4} to an optimal \\frac{1}{\\epsilon^2}. For both models, our dependence on \\epsilon shows, up to \\log\\frac{1}{\\epsilon} factors, that there is no overhead over the standard insertion-only data stream model for any of these problems. } so-called flip number. However, the key technical innovation is that we apply the transformation to what we call a difference estimator for the streaming problem, rather than an estimator for the streaming problem itself. We then develop the first difference estimators for a wide range of problems. Our difference estimator methodology is not only applicable to the adversarially robust model, but to other streaming models where temporal properties of the data play a central role. (Abstract shortened to meet arXiv limit.)", "edit_actions": [{"type": "D", "before": "We introduce difference estimators for data stream computation, which provide approximations to F(v)-F(u) for frequency vectors v\\succeq u and a given function F. We show how to use such estimators to carefully trade error for memory in an iterative manner. The function F is generally non-linear, and we give the first difference estimators for the frequency moments F_p for p\\in[0,2], as well as for integers p>2. Using these, we resolve a number of central open questions in adversarial robust streaming and sliding window models. For adversarially robust streams, we obtain a (1+\\epsilon)-approximation to F_p using", "after": null, "start_char_pos": 0, "end_char_pos": 619}, {"type": "D", "before": "\\frac{\\log n", "after": null, "start_char_pos": 653, "end_char_pos": 665}, {"type": "D", "before": "bits of space for p\\in[0,2] and using", "after": null, "start_char_pos": 703, "end_char_pos": 740}, {"type": "D", "before": "\\frac{1", "after": null, "start_char_pos": 774, "end_char_pos": 781}, {"type": "D", "before": "bits of space for integers p>2. We also obtain an adversarially robust algorithm for the L_2-heavy hitters problem using", "after": null, "start_char_pos": 828, "end_char_pos": 948}, {"type": "D", "before": "\\frac{\\log n", "after": null, "start_char_pos": 982, "end_char_pos": 994}, {"type": "D", "before": "bits of space. Our bounds are optimal up to \\text{poly", "after": null, "start_char_pos": 1032, "end_char_pos": 1086}, {"type": "A", "before": null, "after": "In the adversarially robust streaming model, a stream of elements is presented to an algorithm and is allowed to depend on the output of the algorithm at earlier times during the stream. In the classic insertion-only model of data streams,", "start_char_pos": 1171, "end_char_pos": 1171}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1187, "end_char_pos": 1187}, {"type": "D", "before": "and the \\frac{1", "after": null, "start_char_pos": 1222, "end_char_pos": 1237}, {"type": "A", "before": null, "after": "show how to convert a non-robust algorithm into a robust one with a roughly 1/\\varepsilon factor overhead. This was subsequently improved to a 1/\\sqrt{\\varepsilon", "start_char_pos": 1281, "end_char_pos": 1281}, {"type": "D", "before": ". For sliding windows, we obtain a (1+\\epsilon)-approximation to F_p for p\\in(0,2", "after": null, "start_char_pos": 1320, "end_char_pos": 1401}, {"type": "R", "before": ", resolving a longstanding question of Braverman and Ostrovsky (FOCS 2007). For example, for p = 2 we improve", "after": ", suppressing logarithmic factors. For general functions the latter is known to be best-possible, by a result of Kaplan et. al. (CRYPTO 2021). We show how to bypass this impossibility result by developing data stream algorithms for a large class of streaming problems, with no overhead in the approximation factor. Our class of streaming problems includes the most well-studied problems such as the L_2-heavy hitters problem, F_p-moment estimation, as well as empirical entropy estimation. We substantially improve upon all prior work on these problems, giving the first optimal dependence on the approximation factor. As in previous work, we obtain a general transformation that applies to any non-robust streaming algorithm and depends on", "start_char_pos": 1402, "end_char_pos": 1511}, {"type": "D", "before": "dependence on \\epsilon from \\frac{1", "after": null, "start_char_pos": 1516, "end_char_pos": 1551}, {"type": "A", "before": null, "after": "so-called flip number. However, the key technical innovation is that we apply the transformation to what we call a difference estimator for the streaming problem, rather than an estimator for the streaming problem itself. We then develop the first difference estimators for a wide range of problems. Our difference estimator methodology is not only applicable to the adversarially robust model, but to other streaming models where temporal properties of the data play a central role. (Abstract shortened to meet arXiv limit.)", "start_char_pos": 1795, "end_char_pos": 1795}], "sents_char_pos": [0, 162, 257, 415, 533, 859, 1046, 1191, 1250, 1321, 1477, 1599]}
+{"doc_id": "2011.07964", "revision_depth": "1", "before_revision": " Neural networks have successfully advanced in the task of information extraction from structured documents . In business document processing more precise techniques equal more automation and less manual work. In this paper we will design and examine various fully trainable approaches to use siamese networks, concepts of similarity, one-shot learning and context/memory awareness. The aim is to improve micro F_{1 of per-word classification on a testing split of an existing real world document dataset. The results verify the hypothesis , that access to a similar (yet still different) page with it's target information improves the information extraction. Furthermore the added contributions (in addition to siamese networks) of employing a class information, query-answer attention module and skip connections to the similar page are all required to beat the previous results. Our best model improves previous state-of-art results by 0.0825 gain in F1 score. All the techniques used are not problem-specific and should be generalizable to help in other tasks and contexts . The code and anonymized version of the dataset are provided .", "after_revision": "The automation of document processing is gaining recent attention due to the great potential to reduce manual work through improved methods and hardware. Neural networks have been successfully applied before - even though they have been trained only on relatively small datasets with hundreds of documents so far. To successfully explore deep learning techniques and improve the information extraction results, a dataset with more than twenty-five thousand documents has been compiled, anonymized and is published as a part of this work. We will expand our previous work where we proved that convolutions, graph convolutions and self-attention can work together and exploit all the information present in a structured document. Taking the fully trainable method one step further, we will now design and examine various approaches to using siamese networks, concepts of similarity, one-shot learning and context/memory awareness. The aim is to improve micro F1 of per-word classification on the huge real-world document dataset. The results verify the hypothesis that trainable access to a similar (yet still different) page together with its already known target information improves the information extraction. Furthermore , the experiments confirm that all proposed architecture parts are all required to beat the previous results. The best model improves the previous state-of-the-art results by an 8.25 gain in F1 score. Qualitative analysis is provided to verify that the new model performs better for all target classes. Additionally, multiple structural observations about the causes of the underperformance of some architectures are revealed. All the source codes, parameters and implementation details are published together with the dataset in the hope to push the research boundaries since all the techniques used in this work are not problem-specific and can be generalized for other tasks and contexts .", "edit_actions": [{"type": "A", "before": null, "after": "The automation of document processing is gaining recent attention due to the great potential to reduce manual work through improved methods and hardware.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "successfully advanced in the task of information extraction from structured documents . In business document processing more precise techniques equal more automation and less manual work. In this paper we will", "after": "been successfully applied before - even though they have been trained only on relatively small datasets with hundreds of documents so far. To successfully explore deep learning techniques and improve the information extraction results, a dataset with more than twenty-five thousand documents has been compiled, anonymized and is published as a part of this work. We will expand our previous work where we proved that convolutions, graph convolutions and self-attention can work together and exploit all the information present in a structured document. Taking the fully trainable method one step further, we will now", "start_char_pos": 22, "end_char_pos": 231}, {"type": "R", "before": "fully trainable approaches to use", "after": "approaches to using", "start_char_pos": 259, "end_char_pos": 292}, {"type": "R", "before": "F_{1", "after": "F1", "start_char_pos": 411, "end_char_pos": 415}, {"type": "R", "before": "a testing split of an existing real world", "after": "the huge real-world", "start_char_pos": 446, "end_char_pos": 487}, {"type": "R", "before": ", that", "after": "that trainable", "start_char_pos": 540, "end_char_pos": 546}, {"type": "R", "before": "with it's", "after": "together with its already known", "start_char_pos": 594, "end_char_pos": 603}, {"type": "R", "before": "the added contributions (in addition to siamese networks) of employing a class information, query-answer attention module and skip connections to the similar page", "after": ", the experiments confirm that all proposed architecture parts", "start_char_pos": 672, "end_char_pos": 834}, {"type": "R", "before": "Our", "after": "The", "start_char_pos": 882, "end_char_pos": 885}, {"type": "R", "before": "previous state-of-art results by 0.0825", "after": "the previous state-of-the-art results by an 8.25", "start_char_pos": 906, "end_char_pos": 945}, {"type": "R", "before": "All the techniques used", "after": "Qualitative analysis is provided to verify that the new model performs better for all target classes. Additionally, multiple structural observations about the causes of the underperformance of some architectures are revealed. All the source codes, parameters and implementation details are published together with the dataset in the hope to push the research boundaries since all the techniques used in this work", "start_char_pos": 964, "end_char_pos": 987}, {"type": "R", "before": "should be generalizable to help in", "after": "can be generalized for", "start_char_pos": 1017, "end_char_pos": 1051}, {"type": "D", "before": ". The code and anonymized version of the dataset are provided", "after": null, "start_char_pos": 1077, "end_char_pos": 1138}], "sents_char_pos": [0, 109, 209, 382, 505, 659, 881, 963, 1078]}
+{"doc_id": "2011.07978", "revision_depth": "1", "before_revision": "Computational load imbalance due to direct integration of chemical kinetics is a well-known performance issue in parallel reacting flow simulations . We introduce an open-source dynamic load balancing model to address this problem within OpenFOAM, an open-source C++ library for Computational Fluid Dynamics (CFD). Due to the commonly applied operator splitting practice in reactive flow solvers, chemistry can be treated as an independent stiff ordinary differential equation (ODE) system within each computational cell. As a result of highly non-linear characteristics of chemical kinetics, a large variation in convergence rates of ODE integrator may occur, leading to a high load imbalance across multiprocessor configurations. However, the independent nature of chemistry ODE systems leads to a problem that can be parallelized easily ( also termed embarrassingly parallel in the literature) during the flow solution. The presented model takes advantage of this feature and balances the chemistry load across available resources. When the load balancing is utilized together with a reference mapping model also introduced in this paper , a speed-up by a factor of 10 is reported for practical reactive flow simulations . To the best of our knowledge, this model is the first open-source implementation of chemistry load balancing in the literature.", "after_revision": "Computational load imbalance is a well-known performance issue in multiprocessor reacting flow simulations utilizing directly integrated chemical kinetics . We introduce an open-source dynamic load balancing model named DLBFoam to address this issue within OpenFOAM, an open-source C++ library for Computational Fluid Dynamics (CFD). Due to the commonly applied operator splitting practice in reactive flow solvers, chemistry can be treated as an independent stiff ordinary differential equation (ODE) system within each computational cell. As a result of the highly non-linear characteristics of chemical kinetics, a large variation in the convergence rates of the ODE integrator may occur, leading to a high load imbalance across multiprocessor configurations. However, the independent nature of chemistry ODE systems leads to a problem that can be parallelized easily ( called an embarrassingly parallel problem in the literature) during the flow solution. The presented model takes advantage of this feature and balances the chemistry load across available resources. Additionally, a reference mapping model is utilized to further speed-up the simulations. When DLBFoam it utilized with both these features enabled , a speed-up by a factor of 10 is reported for reactive flow benchmark cases . To the best of our knowledge, this model is the first open-source implementation of chemistry load balancing in the literature.", "edit_actions": [{"type": "D", "before": "due to direct integration of chemical kinetics", "after": null, "start_char_pos": 29, "end_char_pos": 75}, {"type": "R", "before": "parallel", "after": "multiprocessor", "start_char_pos": 113, "end_char_pos": 121}, {"type": "A", "before": null, "after": "utilizing directly integrated chemical kinetics", "start_char_pos": 148, "end_char_pos": 148}, {"type": "A", "before": null, "after": "named DLBFoam", "start_char_pos": 208, "end_char_pos": 208}, {"type": "R", "before": "problem", "after": "issue", "start_char_pos": 225, "end_char_pos": 232}, {"type": "A", "before": null, "after": "the", "start_char_pos": 539, "end_char_pos": 539}, {"type": "A", "before": null, "after": "the", "start_char_pos": 617, "end_char_pos": 617}, {"type": "A", "before": null, "after": "the", "start_char_pos": 639, "end_char_pos": 639}, {"type": "R", "before": "also termed embarrassingly parallel", "after": "called an embarrassingly parallel problem", "start_char_pos": 847, "end_char_pos": 882}, {"type": "R", "before": "When the load balancing is utilized together with", "after": "Additionally,", "start_char_pos": 1040, "end_char_pos": 1089}, {"type": "R", "before": "also introduced in this paper", "after": "is utilized to further speed-up the simulations. When DLBFoam it utilized with both these features enabled", "start_char_pos": 1116, "end_char_pos": 1145}, {"type": "R", "before": "practical reactive flow simulations", "after": "reactive flow benchmark cases", "start_char_pos": 1193, "end_char_pos": 1228}], "sents_char_pos": [0, 150, 316, 523, 736, 927, 1039, 1230]}
+{"doc_id": "2011.08067", "revision_depth": "1", "before_revision": "Generative models for dialog system have gained a lot of interest because of the success of recent RNN and Transformer based models in complex natural language tasks like question answering and summarization. Although , the task of dialog response generation is generally seen as a sequence to sequence (Seq2Seq) problem, researchers in the past have found it challenging to train dialog systems using the standard Seq2Seq models. Therefore, to help the model learn important utterance and conversation level features Sordoni et al. ( 2015 ); Serban et al. (2016) proposed Hierarchical RNN architecture, which was later adopted by several other RNN based dialog systems. With the transformer based models dominating the seq2seq problems lately, a natural question is to understand the applicability of the notion of hierarchy in transformer based dialog systems. In this paper, we show how a standard transformer can be morphed into a hierarchical one by using specially designed attention masks and positional embeddings. Our experiments show strong improvements in context-to-response generation performance for task-oriented dialog system over the current state-of-the-art approaches .", "after_revision": "Generative models for dialog systems have gained much interest because of the recent success of RNN and Transformer based models in tasks like question answering and summarization. Although the task of dialog response generation is generally seen as a sequence-to-sequence (Seq2Seq) problem, researchers in the past have found it challenging to train dialog systems using the standard Seq2Seq models. Therefore, to help the model learn meaningful utterance and conversation level features , Sordoni et al. ( 2015b ); Serban et al. (2016) proposed Hierarchical RNN architecture, which was later adopted by several other RNN based dialog systems. With the transformer-based models dominating the seq2seq problems lately, the natural question to ask is the applicability of the notion of hierarchy in transformer based dialog systems. In this paper, we propose a generalized framework for Hierarchical Transformer Encoders and show how a standard transformer can be morphed into any hierarchical encoder, including HRED and HIBERT like models, by using specially designed attention masks and positional encodings. We demonstrate that Hierarchical Encoding helps achieve better natural language understanding of the contexts in transformer-based models for task-oriented dialog systems through a wide range of experiments .", "edit_actions": [{"type": "R", "before": "system have gained a lot of", "after": "systems have gained much", "start_char_pos": 29, "end_char_pos": 56}, {"type": "R", "before": "success of recent", "after": "recent success of", "start_char_pos": 81, "end_char_pos": 98}, {"type": "D", "before": "complex natural language", "after": null, "start_char_pos": 135, "end_char_pos": 159}, {"type": "D", "before": ",", "after": null, "start_char_pos": 218, "end_char_pos": 219}, {"type": "R", "before": "sequence to sequence", "after": "sequence-to-sequence", "start_char_pos": 282, "end_char_pos": 302}, {"type": "R", "before": "important", "after": "meaningful", "start_char_pos": 466, "end_char_pos": 475}, {"type": "A", "before": null, "after": ",", "start_char_pos": 518, "end_char_pos": 518}, {"type": "R", "before": "2015", "after": "2015b", "start_char_pos": 536, "end_char_pos": 540}, {"type": "R", "before": "transformer based", "after": "transformer-based", "start_char_pos": 681, "end_char_pos": 698}, {"type": "R", "before": "a natural question is to understand", "after": "the natural question to ask is", "start_char_pos": 746, "end_char_pos": 781}, {"type": "A", "before": null, "after": "propose a generalized framework for Hierarchical Transformer Encoders and", "start_char_pos": 882, "end_char_pos": 882}, {"type": "R", "before": "a hierarchical one", "after": "any hierarchical encoder, including HRED and HIBERT like models,", "start_char_pos": 935, "end_char_pos": 953}, {"type": "R", "before": "embeddings. Our experiments show strong improvements in context-to-response generation performance", "after": "encodings. We demonstrate that Hierarchical Encoding helps achieve better natural language understanding of the contexts in transformer-based models", "start_char_pos": 1013, "end_char_pos": 1111}, {"type": "R", "before": "system over the current state-of-the-art approaches", "after": "systems through a wide range of experiments", "start_char_pos": 1137, "end_char_pos": 1188}], "sents_char_pos": [0, 208, 430, 543, 671, 863, 1024]}
+{"doc_id": "2011.09823", "revision_depth": "1", "before_revision": "The edge connectivity of a simple graph is the least number of edges whose removal disconnects the graph. We study the quantum query complexity of computing the edge connectivity of a simple graph with n vertices and m edges in both the adjacency matrix and adjacency array models. For classical randomized algorithms,\\tilde \\tau) queries and time. Moreover, for every integer 1 }\\le \\le \\tau) many queries to the adjacency matrix of G. These results contrast with the classical randomized case where } \\Omega(n^2) and \\Omega(m) lower bounds are known for these models, respectively, showing that the trivial algorithm is optimal in terms of query complexity for both cases. In contrast, we show upper bounds of \\tilde O(n^{3/2\\tilde ) and \\tilde O( \\sqrt{mn + n^{3/2}), respectively, where again the edge weights are between 1 and \\tau. For dense graphs we give lower bounds on the quantum query complexity of } \\Omega(n ). Our upper bounds follow by combining a lemma on the structure of near-minimum cuts due to Rubinstein, Schramm and Weinberg (ITCS 2018) with a quantum sparsification algorithm) for \\tau > 1 and \\Omega(\\tau n) for any 1 \\leq \\tau \\leq n. Our query algorithm uses a quantum algorithm for graph sparsification } by Apers and de Wolf (FOCS 2020) . For a weighted graph, instead of edge connectivity the relevant notion is the weight of a minimum cut, i.e. the minimum total weight of a set of edges whose removal disconnects the graph. For weighted graphs we show that in the worst case \\Omega(n^2) queries can be needed to compute the weight of a minimum cut by a quantum algorithm in both the adjacency matrix and adjacency array models, thus no quantum speedup is possible in this case .", "after_revision": "The minimum cut problem in an undirected and weighted graph G is to find the minimum total weight of a set of edges whose removal disconnects G. We completely characterize the quantum query and time complexity of the minimum cut problem in the adjacency matrix model. If G has n vertices and edge weights at least 1 and at most \\tau, we give a quantum algorithm to solve the minimum cut problem using\\tilde O(n^{3/2\\tau) queries and time. Moreover, for every integer 1 }\\le \\tau\\le n we give an example of a graph G with edge weights 1 and \\tau such that solving the minimum cut problem on G requires \\Omega(n^{3/2\\tau) many queries to the adjacency matrix of G. These results contrast with the classical randomized case where } \\Omega(n^2) queries to the adjacency matrix are needed in the worst case even to decide if an unweighted graph is connected or not. In the adjacency array model, when G has m edges the classical randomized complexity of the minimum cut problem is \\tilde \\Theta(m). We show that the quantum query and time complexity are\\tilde O(\\sqrt{mn\\tau ) and \\tilde O( \\sqrt{mn\\tau + n^{3/2}), respectively, where again the edge weights are between 1 and \\tau. For dense graphs we give lower bounds on the quantum query complexity of } \\Omega(n ^{3/2) for \\tau > 1 and \\Omega(\\tau n) for any 1 \\leq \\tau \\leq n. Our query algorithm uses a quantum algorithm for graph sparsification } by Apers and de Wolf (FOCS 2020) and results on the structure of near-minimum cuts by Kawarabayashi and Thorup (STOC 2015) and Rubinstein, Schramm and Weinberg (ITCS 2018). Our time efficient implementation builds on Karger's tree packing technique (STOC 1996) .", "edit_actions": [{"type": "R", "before": "edge connectivity of a simple graph is the least number of", "after": "minimum cut problem in an undirected and weighted graph G is to find the minimum total weight of a set of", "start_char_pos": 4, "end_char_pos": 62}, {"type": "R", "before": "the graph. We study", "after": "G. We completely characterize", "start_char_pos": 95, "end_char_pos": 114}, {"type": "R", "before": "complexity of computing the edge connectivity of a simple graph with n vertices and m edges in both the adjacency matrix and adjacency array models. For classical randomized algorithms,", "after": "and time complexity of the minimum cut problem in the adjacency matrix model. If G has n vertices and edge weights at least 1 and at most \\tau, we give a quantum algorithm to solve the minimum cut problem using", "start_char_pos": 133, "end_char_pos": 318}, {"type": "A", "before": null, "after": "O(n^{3/2", "start_char_pos": 325, "end_char_pos": 325}, {"type": "A", "before": null, "after": "\\tau", "start_char_pos": 384, "end_char_pos": 384}, {"type": "A", "before": null, "after": "n we give an example of a graph G with edge weights 1 and \\tau such that solving the minimum cut problem on G requires \\Omega(n^{3/2", "start_char_pos": 388, "end_char_pos": 388}, {"type": "R", "before": "and \\Omega(m) lower bounds are known for these models, respectively, showing that the trivial algorithm is optimal in terms of query complexity for both cases. In contrast, we show upper bounds of", "after": "queries to the adjacency matrix are needed in the worst case even to decide if an unweighted graph is connected or not. In the adjacency array model, when G has m edges the classical randomized complexity of the minimum cut problem is", "start_char_pos": 515, "end_char_pos": 711}, {"type": "R", "before": "O(n^{3/2", "after": "\\Theta(m). We show that the quantum query and time complexity are", "start_char_pos": 719, "end_char_pos": 727}, {"type": "A", "before": null, "after": "O(\\sqrt{mn\\tau", "start_char_pos": 734, "end_char_pos": 734}, {"type": "R", "before": "\\sqrt{mn", "after": "\\sqrt{mn\\tau", "start_char_pos": 751, "end_char_pos": 759}, {"type": "R", "before": "). Our upper bounds follow by combining a lemma on the structure of near-minimum cuts due to Rubinstein, Schramm and Weinberg (ITCS 2018) with a quantum sparsification algorithm", "after": "^{3/2", "start_char_pos": 923, "end_char_pos": 1100}, {"type": "R", "before": ". For a weighted graph, instead of edge connectivity the relevant notion is the weight of a minimum cut, i.e. the minimum total weight of a set of edges whose removal disconnects the graph. For weighted graphs we show that in the worst case \\Omega(n^2) queries can be needed to compute the weight of a minimum cut by a quantum algorithm in both the adjacency matrix and adjacency array models, thus no quantum speedup is possible in this case", "after": "and results on the structure of near-minimum cuts by Kawarabayashi and Thorup (STOC 2015) and Rubinstein, Schramm and Weinberg (ITCS 2018). Our time efficient implementation builds on Karger's tree packing technique (STOC 1996)", "start_char_pos": 1267, "end_char_pos": 1709}], "sents_char_pos": [0, 105, 281, 348, 674, 838, 925, 1161, 1268, 1456]}
+{"doc_id": "2011.09999", "revision_depth": "1", "before_revision": "Standard reinforcement learning (RL) algorithms train agents to maximize given reward functions . However, many real-world applications of RL require agents to also satisfy certain constraints which may, for example, be motivated by safety concerns. Constrained RL algorithms approach this problem by training agents to maximize given reward functions while respectingexplicitly defined constraints. However, in many cases, manually designing accurate constraints is a challenging task . In this work, given a reward function and a set of demonstrations from an expert that maximizes this reward function while respectingunknown constraints , we propose a framework to learn the most likely constraints that the expert respects. We then train agents to maximize the given reward function subject to the learned constraints . Previous works in this regard have either mainly been restricted to tabular settings or specific types of constraints or assume knowledge of transition dynamics of the environment . In contrast, we empirically show that our framework is able to learn arbitrary \\textit{Markovian} constraints in high-dimensions in a model-free setting. ", "after_revision": "In real world settings, numerous constraints are present which are hard to specify mathematically . However, for the real world deployment of reinforcement learning (RL), it is critical that RL agents are aware of these constraints, so that they can act safely . In this work, we consider the problem of learning constraints from demonstrations of a constraint-abiding agent's behavior. We experimentally validate our approach and show that our framework can successfully learn the most likely constraints that the agent respects. We further show that these learned constraints aretransferable to new agents that may have different morphologies and/or reward functions . Previous works in this regard have either mainly been restricted to tabular (discrete) settings, specific types of constraints or assume the environment's transition dynamics . In contrast, our framework is able to learn arbitrary \\textit{Markovian} constraints in high-dimensions in a completely model-free setting. The code can be found it: URL", "edit_actions": [{"type": "R", "before": "Standard reinforcement learning (RL) algorithms train agents to maximize given reward functions", "after": "In real world settings, numerous constraints are present which are hard to specify mathematically", "start_char_pos": 0, "end_char_pos": 95}, {"type": "D", "before": "many real-world applications of RL require agents to also satisfy certain constraints which may, for example, be motivated by safety concerns. Constrained RL algorithms approach this problem by training agents to maximize given reward functions while respecting", "after": null, "start_char_pos": 107, "end_char_pos": 368}, {"type": "D", "before": "explicitly", "after": null, "start_char_pos": 368, "end_char_pos": 378}, {"type": "R", "before": "defined constraints. However, in many cases, manually designing accurate constraints is a challenging task", "after": "for the real world deployment of reinforcement learning (RL), it is critical that RL agents are aware of these constraints, so that they can act safely", "start_char_pos": 379, "end_char_pos": 485}, {"type": "D", "before": "given a reward function and a set of demonstrations from an expert that maximizes this reward function while respecting", "after": null, "start_char_pos": 502, "end_char_pos": 621}, {"type": "D", "before": "unknown", "after": null, "start_char_pos": 621, "end_char_pos": 628}, {"type": "R", "before": "constraints , we propose a framework to", "after": "we consider the problem of learning constraints from demonstrations of a constraint-abiding agent's behavior. We experimentally validate our approach and show that our framework can successfully", "start_char_pos": 629, "end_char_pos": 668}, {"type": "R", "before": "expert", "after": "agent", "start_char_pos": 712, "end_char_pos": 718}, {"type": "R", "before": "then train agents to maximize the given reward function subject to the learned constraints", "after": "further show that these learned constraints are", "start_char_pos": 732, "end_char_pos": 822}, {"type": "A", "before": null, "after": "transferable", "start_char_pos": 822, "end_char_pos": 822}, {"type": "A", "before": null, "after": "to new agents that may have different morphologies and/or reward functions", "start_char_pos": 823, "end_char_pos": 823}, {"type": "R", "before": "settings or", "after": "(discrete) settings,", "start_char_pos": 902, "end_char_pos": 913}, {"type": "R", "before": "knowledge of transition dynamics of the environment", "after": "the environment's transition dynamics", "start_char_pos": 954, "end_char_pos": 1005}, {"type": "D", "before": "we empirically show that", "after": null, "start_char_pos": 1021, "end_char_pos": 1045}, {"type": "A", "before": null, "after": "completely", "start_char_pos": 1142, "end_char_pos": 1142}, {"type": "A", "before": null, "after": "The code can be found it: URL", "start_char_pos": 1163, "end_char_pos": 1163}], "sents_char_pos": [0, 97, 249, 399, 487, 728, 1007]}
+{"doc_id": "2011.10963", "revision_depth": "1", "before_revision": "We study harmonic-based algorithms for the d-dimensional (dD) generalizations of three classical geometric packing problems: geometric bin packing (BP), strip packing (SP), and geometric knapsack (KS) . Caprara (MOR 2008) studied a harmonic-based algorithm \\mathtt{HDH an asymptotic approximation ratio of T_{\\infty}^{d-1} (where T_{\\infty} \\approx 1.691) for dD BP and dD SP when items are not allowed to be rotated. We give fast and simple harmonic-based algorithms with asymptotic approximation ratios of T_{\\infty^{d-1}, T_{\\infty}^{d} and (1-\\epsilon)3^{-d} for dD SP, dD BP and dD KS, respectively, when orthogonal rotations are allowed } about all or a subset of axes. This gives the first approximation algorithm for dD KS for d > 3. Furthermore, we provide a more sophisticated harmonic-based algorithm, which we call HGaP_k, that is T_{\\infty}^{d-1}(1+\\epsilon) -asymptotic-approximate for dD BP for the rotational case . This gives an approximation ratio of 2.860 + \\epsilon for 3D BP with rotations, which improves upon the current best-known algorithm . In addition, we study multiple-choice packing problems that generalize the rotational case. Here we are given n sets of dD cuboidal items and we have to choose exactly one (resp. at most one for the knapsack variant) item from each set and then pack the chosen items. All our algorithms also work for multiple-choice packing problems .", "after_revision": "We explore approximation algorithms for the d-dimensional geometric bin packing problem (dBP) . Caprara (MOR 2008) gave a harmonic-based algorithm for dBP having an asymptotic approximation ratio (AAR) of T_{\\infty}^{d-1} (where T_{\\infty} \\approx 1.691) . However, their algorithm doesn't allow items to be rotated. ^{d-1}, T_{\\infty}^{d} and (1-\\epsilon)3^{-d} for dD SP, dD BP and dD KS, respectively, when orthogonal rotations are allowed } This is in contrast to some common applications of dBP, like packing boxes into shipping containers. We give approximation algorithms for dBP when items can be orthogonally rotated about all or a subset of axes. We first give a fast and simple harmonic-based algorithm having AAR T_{\\infty a more sophisticated harmonic-based algorithm, which we call HGaP_k, having AAR T_{\\infty}^{d-1}(1+\\epsilon) . This gives an AAR of roughly 2.860 + \\epsilon for 3BP with rotations, which improves upon the best-known AAR of 4.5 . In addition, we study the multiple-choice bin packing problem that generalizes the rotational case. Here we are given n sets of d-dimensional cuboidal items and we have to choose exactly one item from each set and then pack the chosen items. Our algorithms also work for the multiple-choice bin packing problem. We also give fast and simple approximation algorithms for the multiple-choice versions of dD strip packing and dD geometric knapsack .", "edit_actions": [{"type": "R", "before": "study harmonic-based", "after": "explore approximation", "start_char_pos": 3, "end_char_pos": 23}, {"type": "R", "before": "(dD) generalizations of three classical geometric packing problems: geometric bin packing (BP), strip packing (SP), and geometric knapsack (KS)", "after": "geometric bin packing problem (dBP)", "start_char_pos": 57, "end_char_pos": 200}, {"type": "R", "before": "studied", "after": "gave", "start_char_pos": 222, "end_char_pos": 229}, {"type": "R", "before": "\\mathtt{HDH", "after": "for dBP having", "start_char_pos": 257, "end_char_pos": 268}, {"type": "A", "before": null, "after": "(AAR)", "start_char_pos": 303, "end_char_pos": 303}, {"type": "R", "before": "for dD BP and dD SP when items are not allowed", "after": ". However, their algorithm doesn't allow items", "start_char_pos": 357, "end_char_pos": 403}, {"type": "D", "before": "We give fast and simple harmonic-based algorithms with asymptotic approximation ratios of T_{\\infty", "after": null, "start_char_pos": 419, "end_char_pos": 518}, {"type": "A", "before": null, "after": "This is in contrast to some common applications of dBP, like packing boxes into shipping containers. We give approximation algorithms for dBP when items can be orthogonally rotated", "start_char_pos": 646, "end_char_pos": 646}, {"type": "R", "before": "This gives the first approximation algorithm for dD KS for d > 3. Furthermore, we provide", "after": "We first give a fast and simple harmonic-based algorithm having AAR T_{\\infty", "start_char_pos": 678, "end_char_pos": 767}, {"type": "R", "before": "that is", "after": "having AAR", "start_char_pos": 837, "end_char_pos": 844}, {"type": "D", "before": "-asymptotic-approximate for dD BP for the rotational case", "after": null, "start_char_pos": 874, "end_char_pos": 931}, {"type": "R", "before": "approximation ratio of", "after": "AAR of roughly", "start_char_pos": 948, "end_char_pos": 970}, {"type": "R", "before": "3D BP", "after": "3BP", "start_char_pos": 992, "end_char_pos": 997}, {"type": "D", "before": "current", "after": null, "start_char_pos": 1038, "end_char_pos": 1045}, {"type": "R", "before": "algorithm", "after": "AAR of 4.5", "start_char_pos": 1057, "end_char_pos": 1066}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1091, "end_char_pos": 1091}, {"type": "R", "before": "packing problems that generalize", "after": "bin packing problem that generalizes", "start_char_pos": 1108, "end_char_pos": 1140}, {"type": "R", "before": "dD", "after": "d-dimensional", "start_char_pos": 1190, "end_char_pos": 1192}, {"type": "D", "before": "(resp. at most one for the knapsack variant)", "after": null, "start_char_pos": 1242, "end_char_pos": 1286}, {"type": "R", "before": "All our", "after": "Our", "start_char_pos": 1338, "end_char_pos": 1345}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1371, "end_char_pos": 1371}, {"type": "R", "before": "packing problems", "after": "bin packing problem. We also give fast and simple approximation algorithms for the multiple-choice versions of dD strip packing and dD geometric knapsack", "start_char_pos": 1388, "end_char_pos": 1404}], "sents_char_pos": [0, 418, 677, 933, 1068, 1161, 1337]}
+{"doc_id": "2011.13209", "revision_depth": "1", "before_revision": "In this paper we investigate the problems that Convolutional Neural Networks (CNN) based pose estimators have with symmetric objects. We find that the CNN's output representation has to form a closed loop when continuously rotating by one step of symmetry. Otherwise the CNN has to learn an uncontinuous function. On a 1-DOF toy example we show that commonly used representations do not fulfill this demand and analyze the problems caused thereby. In particular we find, that the popular min-over-symmetries approach for creating a symmetry aware loss tends not to work well with gradient based optimization, i.e. deep learning. We propose a representation called \"closed symmetry loop\" ' (csl) from these insights, where the angle of relevant vectors is multiplied by the symmetry order and then generalize it to 6-DOF. The representation extends our previous algorithm including a method to disambiguate symmetric equivalents during the final pose estimation. The algorithm handles continuous rotational symmetry ( i.e. a bottle) and discrete rotational symmetry ( general boxes, boxes with a square face, uniform prims, but no cubes ). It is evaluated on the T-LESS dataset .", "after_revision": "In this paper , we investigate the problems that Convolutional Neural Networks (CNN) -based pose estimators have with symmetric objects. We considered the value of the CNN's output representation when continuously rotating the object and found that it has to form a closed loop after each step of symmetry. Otherwise , the CNN (which is itself a continuous function) has to replicate an uncontinuous function. On a 1-DOF toy example we show that commonly used representations do not fulfill this demand and analyze the problems caused thereby. In particular , we find that the popular min-over-symmetries approach for creating a symmetry-aware loss tends not to work well with gradient-based optimization, i.e. deep learning. We propose a representation called \"closed symmetry loop\" (csl) from these insights, where the angle of relevant vectors is multiplied by the symmetry order and then generalize it to 6-DOF. The representation extends our algorithm from Richter-Klug, ICVS, 2019 including a method to disambiguate symmetric equivalents during the final pose estimation. The algorithm handles continuous rotational symmetry ( e.g. a bottle) and discrete rotational symmetry ( e.g. a 4-fold symmetric box ). It is evaluated on the T-LESS dataset , where it reaches state-of-the-art for unrefining RGB-based methods .", "edit_actions": [{"type": "A", "before": null, "after": ",", "start_char_pos": 14, "end_char_pos": 14}, {"type": "R", "before": "based", "after": "-based", "start_char_pos": 84, "end_char_pos": 89}, {"type": "R", "before": "find that the", "after": "considered the value of the", "start_char_pos": 138, "end_char_pos": 151}, {"type": "A", "before": null, "after": "when continuously rotating the object and found that it", "start_char_pos": 180, "end_char_pos": 180}, {"type": "R", "before": "when continuously rotating by one", "after": "after each", "start_char_pos": 207, "end_char_pos": 240}, {"type": "R", "before": "the CNN has to learn", "after": ", the CNN (which is itself a continuous function) has to replicate", "start_char_pos": 269, "end_char_pos": 289}, {"type": "R", "before": "we find,", "after": ", we find", "start_char_pos": 464, "end_char_pos": 472}, {"type": "R", "before": "symmetry aware", "after": "symmetry-aware", "start_char_pos": 534, "end_char_pos": 548}, {"type": "R", "before": "gradient based", "after": "gradient-based", "start_char_pos": 582, "end_char_pos": 596}, {"type": "D", "before": "'", "after": null, "start_char_pos": 689, "end_char_pos": 690}, {"type": "R", "before": "previous algorithm", "after": "algorithm from", "start_char_pos": 854, "end_char_pos": 872}, {"type": "A", "before": null, "after": "Richter-Klug, ICVS, 2019", "start_char_pos": 873, "end_char_pos": 873}, {"type": "R", "before": "i.e.", "after": "e.g.", "start_char_pos": 1020, "end_char_pos": 1024}, {"type": "R", "before": "general boxes, boxes with a square face, uniform prims, but no cubes", "after": "e.g. a 4-fold symmetric box", "start_char_pos": 1070, "end_char_pos": 1138}, {"type": "A", "before": null, "after": ", where it reaches state-of-the-art for unrefining RGB-based methods", "start_char_pos": 1180, "end_char_pos": 1180}], "sents_char_pos": [0, 134, 258, 315, 449, 630, 822, 964, 1141]}
+{"doc_id": "2012.00234", "revision_depth": "1", "before_revision": "Image keypoint extraction is an important step for visual localization. The localization in indoor environment is challenging for that there may be many unreliable features on dynamic or repetitive objects. Such kind of reliability cannot be well learned by existing Convolutional Neural Network (CNN) based feature extractors. We propose a novel network, RaP-Net, which explicitly addresses feature invariability with a region-wise predictor, and combines it with a point-wise predictor to select reliable keypoints in an image . We also build a new dataset, OpenLORIS-Location, to train this network. The dataset contains 1553 indoor images with location labels. There are various scene changes between images on the same location , which can help a network to learn the invariability in typical indoor scenes. Experimental results show that the proposed RaP-Net trained with the OpenLORIS-Location dataset significantly outperforms existing CNN-based keypoint extraction algorithms for indoor localization. The code and data are available at URL", "after_revision": "Feature extraction plays an important role in visual localization. Unreliable features on dynamic objects or repetitive regions will disturb robust feature matching and thus, challenge indoor localization greatly. To conquer such an issue, we propose a novel network, RaP-Net, to simultaneously predict region-wise invariability and point-wise reliability, and then extract features by considering both of them . We also introduce a new dataset, named OpenLORIS-Location, to train proposed network. The dataset contains 1553 indoor images from 93 indoor locations. Various appearance changes between images of the same location are included and they can help to learn the invariability in typical indoor scenes. Experimental results show that the proposed RaP-Net trained with the OpenLORIS-Location dataset achieves an excellent performance in the feature matching task and significantly outperforms state-of-the-arts feature algorithms in indoor localization. The RaP-Net code and dataset are available at URL", "edit_actions": [{"type": "R", "before": "Image keypoint extraction is an important step for", "after": "Feature extraction plays an important role in", "start_char_pos": 0, "end_char_pos": 50}, {"type": "R", "before": "The localization in indoor environment is challenging for that there may be many unreliable", "after": "Unreliable", "start_char_pos": 72, "end_char_pos": 163}, {"type": "R", "before": "or repetitive objects. Such kind of reliability cannot be well learned by existing Convolutional Neural Network (CNN) based feature extractors. We", "after": "objects or repetitive regions will disturb robust feature matching and thus, challenge indoor localization greatly. To conquer such an issue, we", "start_char_pos": 184, "end_char_pos": 330}, {"type": "R", "before": "which explicitly addresses feature invariability with a", "after": "to simultaneously predict", "start_char_pos": 365, "end_char_pos": 420}, {"type": "R", "before": "predictor, and combines it with a", "after": "invariability and", "start_char_pos": 433, "end_char_pos": 466}, {"type": "R", "before": "predictor to select reliable keypoints in an image", "after": "reliability, and then extract features by considering both of them", "start_char_pos": 478, "end_char_pos": 528}, {"type": "R", "before": "build", "after": "introduce", "start_char_pos": 539, "end_char_pos": 544}, {"type": "A", "before": null, "after": "named", "start_char_pos": 560, "end_char_pos": 560}, {"type": "R", "before": "this", "after": "proposed", "start_char_pos": 590, "end_char_pos": 594}, {"type": "R", "before": "with location labels. There are various scene", "after": "from 93 indoor locations. Various appearance", "start_char_pos": 644, "end_char_pos": 689}, {"type": "R", "before": "on", "after": "of", "start_char_pos": 713, "end_char_pos": 715}, {"type": "R", "before": ", which can help a network", "after": "are included and they can help", "start_char_pos": 734, "end_char_pos": 760}, {"type": "R", "before": "significantly outperforms existing CNN-based keypoint extraction algorithms for", "after": "achieves an excellent performance in the feature matching task and significantly outperforms state-of-the-arts feature algorithms in", "start_char_pos": 910, "end_char_pos": 989}, {"type": "R", "before": "code and data", "after": "RaP-Net code and dataset", "start_char_pos": 1015, "end_char_pos": 1028}], "sents_char_pos": [0, 71, 206, 327, 530, 603, 665, 813, 1010]}
+{"doc_id": "2012.00451", "revision_depth": "1", "before_revision": "Modern approaches to visual question answering require large annotated datasetsfor training . Manual annotation of questions and answers for videos, however, is tedious, expensive and prevents scalability. In this work, we propose to avoid manual annotation and to learn video question answering (VideoQA) from millions of readily-available narrated videos. We propose to automatically generate question-answer pairs from transcribed video narrations leveraging a state-of-the-art text transformer pipeline and obtain a new large-scale VideoQA training dataset . To handle the open vocabulary of diverse answers in this dataset, we propose a training procedure based on a contrastive loss between a video-question multi-modal transformer and an answer embedding. We evaluate our model on the zero-shot VideoQA task and show excellent results, in particular for rare answers. Furthermore, we demonstrate that finetuning our model on target datasets significantly outperforms the state of the art on MSRVTT-QA, MSVD-QA and ActivityNet-QA . Finally, for a detailed evaluation we introduce a new manually annotated VideoQA dataset with reduced language biases and high quality annotations. Our code and datasets will be made publicly available at URL .", "after_revision": "Recent methods for visual question answering rely on large-scale annotated datasets . Manual annotation of questions and answers for videos, however, is tedious, expensive and prevents scalability. In this work, we propose to avoid manual annotation and generate a large-scale training dataset for video question answering making use of automatic cross-modal supervision. We leverage a question generation transformer trained on text data and use it to generate question-answer pairs from transcribed video narrations . Given narrated videos, we then automatically generate the HowToVQA69M dataset with 69M video-question-answer triplets . To handle the open vocabulary of diverse answers in this dataset, we propose a training procedure based on a contrastive loss between a video-question multi-modal transformer and an answer transformer. We introduce the zero-shot VideoQA task and show excellent results, in particular for rare answers. Furthermore, we demonstrate our method to significantly outperform the state of the art on MSRVTT-QA, MSVD-QA , ActivityNet-QA and How2QA . Finally, for a detailed evaluation we introduce a new VideoQA dataset with reduced language biases and high-quality redundant manual annotations. Our code and datasets will be made publicly available at URL ", "edit_actions": [{"type": "R", "before": "Modern approaches to", "after": "Recent methods for", "start_char_pos": 0, "end_char_pos": 20}, {"type": "R", "before": "require large annotated datasetsfor training", "after": "rely on large-scale annotated datasets", "start_char_pos": 47, "end_char_pos": 91}, {"type": "R", "before": "to learn", "after": "generate a large-scale training dataset for", "start_char_pos": 262, "end_char_pos": 270}, {"type": "R", "before": "(VideoQA) from millions of readily-available narrated videos. We propose to automatically", "after": "making use of automatic cross-modal supervision. We leverage a question generation transformer trained on text data and use it to", "start_char_pos": 296, "end_char_pos": 385}, {"type": "R", "before": "leveraging a state-of-the-art text transformer pipeline and obtain a new large-scale VideoQA training dataset", "after": ". Given narrated videos, we then automatically generate the HowToVQA69M dataset with 69M video-question-answer triplets", "start_char_pos": 451, "end_char_pos": 560}, {"type": "R", "before": "embedding. We evaluate our model on", "after": "transformer. We introduce", "start_char_pos": 752, "end_char_pos": 787}, {"type": "R", "before": "that finetuning our model on target datasets significantly outperforms", "after": "our method to significantly outperform", "start_char_pos": 903, "end_char_pos": 973}, {"type": "R", "before": "and", "after": ",", "start_char_pos": 1017, "end_char_pos": 1020}, {"type": "A", "before": null, "after": "and How2QA", "start_char_pos": 1036, "end_char_pos": 1036}, {"type": "D", "before": "manually annotated", "after": null, "start_char_pos": 1093, "end_char_pos": 1111}, {"type": "R", "before": "high quality", "after": "high-quality redundant manual", "start_char_pos": 1161, "end_char_pos": 1173}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1248, "end_char_pos": 1249}], "sents_char_pos": [0, 205, 357, 562, 762, 874, 1038, 1186]}
+{"doc_id": "2012.00697", "revision_depth": "2", "before_revision": "A new generation of cloud data warehouses has changed the landscape of information technology. This shift brings large amounts of data and compute power closer to many users in enterprises. The ability to directly access the warehouse data, interactively analyze and explore it at scale can empower users , improving the effectiveness and efficiency of their decision making cycles as never before . However, existing tools for querying, analyzing , and exploring data in cloud warehouses are either limited in facilitating iterative ad-hoc analysis or difficult to use for the largest segment of enterprise users, who have limited time, interest, or skills for writing queries . Here we present Sigma Worksheet, a new system for interactively constructing data warehouse queries through visual direct manipulation. Sigma Worksheet enables users to perform powerful interactive ad-hoc visual data analysis without writing queries. To thisend, it combines the notion of a multidimensional data cube with an expressive, spreadsheet-like query construction interface , in order to ease the generation of otherwise complex queries. The Worksheet interface borrows successful features from electronic spreadsheets to support the large segment of users familiar with that environment. We demonstrate the usefulness of Sigma Worksheet through two in-depth use casesand report on user feedback that we elicit through a 100-person survey followed by a semi-structured interview study with 70 participants. We find that Sigma Worksheet provides an easier to use and learn interface for accessing, transforming, exploring, and analyzing data in cloud data warehouses, improving the visual data analysis and exploration experience for both expert and non-expert enterprise users. Our findings also suggest Sigma Worksheet can further improve user experience by providing guidance to users at various steps of data analysis.", "after_revision": "The new generation of cloud data warehouses (CDWs) brings large amounts of data and compute power closer to users in enterprises. The ability to directly access the warehouse data, interactively analyze and explore it at scale can empower users to improve their decision making cycles . However, existing tools for analyzing data in CDWs are either limited in ad-hoc transformations or difficult to use for business users, the largest user segment in enterprises . Here we introduce Sigma Worksheet, a new interactive system that enables users to easily perform ad-hoc visual analysis of data in CDWs at scale. For this, Sigma Worksheet provides an accessible spreadsheet-like interface for data analysis through direct manipulation. Sigma Worksheet dynamically constructs matching SQL queries from user interactions on this familiar interface, building on the versatility and expressivity of SQL. Sigma Worksheet executes constructed queries directly on CDWs, leveraging the superior characteristics of the new generation CDWs, including scalability. To evaluate Sigma Worksheet, we first demonstrate its expressivity through two real life use cases, cohort analysis and sessionization. We then measure the performance of the Worksheet generated queries with a set of experiments using the TPC-H benchmark. Results show the performance of our compiled SQL queries is comparable to that of the reference queries of the benchmark. Finally, to assess the usefulness of Sigma Worksheet in deployment, we elicit feedback through a 100-person survey followed by a semi-structured interview study with 70 participants. We find that Sigma Worksheet is easier to use and learn , improving the productivity of users. Our findings also suggest Sigma Worksheet can further improve user experience by providing guidance to users at various steps of data analysis.", "edit_actions": [{"type": "R", "before": "A", "after": "The", "start_char_pos": 0, "end_char_pos": 1}, {"type": "R", "before": "has changed the landscape of information technology. This shift", "after": "(CDWs)", "start_char_pos": 42, "end_char_pos": 105}, {"type": "D", "before": "many", "after": null, "start_char_pos": 163, "end_char_pos": 167}, {"type": "R", "before": ", improving the effectiveness and efficiency of", "after": "to improve", "start_char_pos": 305, "end_char_pos": 352}, {"type": "D", "before": "as never before", "after": null, "start_char_pos": 382, "end_char_pos": 397}, {"type": "R", "before": "querying, analyzing , and exploring data in cloud warehouses", "after": "analyzing data in CDWs", "start_char_pos": 428, "end_char_pos": 488}, {"type": "D", "before": "facilitating iterative", "after": null, "start_char_pos": 511, "end_char_pos": 533}, {"type": "R", "before": "analysis", "after": "transformations", "start_char_pos": 541, "end_char_pos": 549}, {"type": "R", "before": "the largest segment of enterprise users, who have limited time, interest, or skills for writing queries", "after": "business users, the largest user segment in enterprises", "start_char_pos": 574, "end_char_pos": 677}, {"type": "R", "before": "present", "after": "introduce", "start_char_pos": 688, "end_char_pos": 695}, {"type": "R", "before": "system for interactively constructing data warehouse queries through visual direct manipulation. Sigma Worksheet", "after": "interactive system that", "start_char_pos": 719, "end_char_pos": 831}, {"type": "R", "before": "perform powerful interactive", "after": "easily perform", "start_char_pos": 849, "end_char_pos": 877}, {"type": "R", "before": "data analysis without writing queries. To thisend, it combines the notion of a multidimensional data cube with an expressive,", "after": "analysis of data in CDWs at scale. For this, Sigma Worksheet provides an accessible", "start_char_pos": 892, "end_char_pos": 1017}, {"type": "R", "before": "query construction interface , in order to ease the generation of otherwise complex queries. The Worksheet interface borrows successful features from electronic spreadsheets to support the large segment of users familiar with that environment. We demonstrate the usefulness of Sigma Worksheet", "after": "interface for data analysis through direct manipulation. Sigma Worksheet dynamically constructs matching SQL queries from user interactions on this familiar interface, building on the versatility and expressivity of SQL. Sigma Worksheet executes constructed queries directly on CDWs, leveraging the superior characteristics of the new generation CDWs, including scalability. To evaluate Sigma Worksheet, we first demonstrate its expressivity through two real life use cases, cohort analysis and sessionization. We then measure the performance of the Worksheet generated queries with a set of experiments using the TPC-H benchmark. Results show the performance of our compiled SQL queries is comparable to that of the reference queries of the benchmark. Finally, to assess the usefulness of Sigma Worksheet in deployment, we elicit feedback", "start_char_pos": 1035, "end_char_pos": 1327}, {"type": "D", "before": "two in-depth use casesand report on user feedback that we elicit through", "after": null, "start_char_pos": 1336, "end_char_pos": 1408}, {"type": "R", "before": "provides an", "after": "is", "start_char_pos": 1526, "end_char_pos": 1537}, {"type": "R", "before": "interface for accessing, transforming, exploring, and analyzing data in cloud data warehouses, improving the visual data analysis and exploration experience for both expert and non-expert enterprise", "after": ", improving the productivity of", "start_char_pos": 1562, "end_char_pos": 1760}], "sents_char_pos": [0, 94, 189, 399, 679, 815, 930, 1127, 1278, 1496, 1767]}
+{"doc_id": "2012.01721", "revision_depth": "1", "before_revision": "Zero-shot intent detection (ZSID) aims to deal with the continuously emerging intents without annotated training data. However, existing ZSID systems suffer from two limitations: 1) They are not good at modeling the relationship between seen and unseen intents , when the label names are given in the form of raw phrases or sentences . 2) They cannot effectively recognize unseen intents under the generalized intent detection (GZSID) setting. A critical factor behind these limitations is the representations of unseen intents , which cannot be learned in the training stage. To address this problem, we propose a class-transductive framework that utilizes unseen class labels to learn Disentangled Intent Representations ( DIR ). Specifically, we allow the model to predict unseen intents in the trainingstage , with the corresponding label names serving as input utterances. Under this framework , we introduce a multi-task learning objective, which encourages the model to learn the distinctions among intents, and a similarity scorer, which estimates the connections among intents more accurately based on the learned intent representations. Since the purpose of DIR is to provide better intent representations, it can be easily integrated with existing ZSID and GZSID methods. Experiments on two real-world datasets show that the proposed framework brings consistent improvement to the baseline systems , regardless of the model architectures or zero-shot learning strategies .", "after_revision": "Zero-shot intent detection (ZSID) aims to deal with the continuously emerging intents without annotated training data. However, existing ZSID systems suffer from two limitations: 1) They are not good at modeling the relationship between seen and unseen intents . 2) They cannot effectively recognize unseen intents under the generalized intent detection (GZSID) setting. A critical problem behind these limitations is that the representations of unseen intents cannot be learned in the training stage. To address this problem, we propose a novel framework that utilizes unseen class labels to learn Class-Transductive Intent Representations ( CTIR ). Specifically, we allow the model to predict unseen intents during training , with the corresponding label names serving as input utterances. On this basis , we introduce a multi-task learning objective, which encourages the model to learn the distinctions among intents, and a similarity scorer, which estimates the connections among intents more accurately . CTIR is easy to implement and can be integrated with existing methods. Experiments on two real-world datasets show that CTIR brings considerable improvement to the baseline systems .", "edit_actions": [{"type": "D", "before": ", when the label names are given in the form of raw phrases or sentences", "after": null, "start_char_pos": 261, "end_char_pos": 333}, {"type": "R", "before": "factor", "after": "problem", "start_char_pos": 455, "end_char_pos": 461}, {"type": "A", "before": null, "after": "that", "start_char_pos": 490, "end_char_pos": 490}, {"type": "D", "before": ", which", "after": null, "start_char_pos": 529, "end_char_pos": 536}, {"type": "R", "before": "class-transductive", "after": "novel", "start_char_pos": 616, "end_char_pos": 634}, {"type": "R", "before": "Disentangled", "after": "Class-Transductive", "start_char_pos": 688, "end_char_pos": 700}, {"type": "R", "before": "DIR", "after": "CTIR", "start_char_pos": 726, "end_char_pos": 729}, {"type": "R", "before": "in the trainingstage", "after": "during training", "start_char_pos": 792, "end_char_pos": 812}, {"type": "R", "before": "Under this framework", "after": "On this basis", "start_char_pos": 879, "end_char_pos": 899}, {"type": "R", "before": "based on the learned intent representations. Since the purpose of DIR is to provide better intent representations, it can be easily", "after": ". CTIR is easy to implement and can be", "start_char_pos": 1103, "end_char_pos": 1234}, {"type": "D", "before": "ZSID and GZSID", "after": null, "start_char_pos": 1260, "end_char_pos": 1274}, {"type": "R", "before": "the proposed framework brings consistent", "after": "CTIR brings considerable", "start_char_pos": 1333, "end_char_pos": 1373}, {"type": "D", "before": ", regardless of the model architectures or zero-shot learning strategies", "after": null, "start_char_pos": 1410, "end_char_pos": 1482}], "sents_char_pos": [0, 118, 443, 577, 878, 1147, 1283]}
+{"doc_id": "2012.02405", "revision_depth": "1", "before_revision": "Solving an acoustic wave equation using a parabolic approximation is a popular approach for many available ocean acoustic models. Commonly used parabolic equation (PE) model programs, such as the range-dependent acoustic model (RAM), are discretized by the finite difference method (FDM). Considering the idea and theory of the \"split-step\" parabolic approximation, a discrete PE model using the Chebyshev spectral method (CSM) is derived, and the code is developed. We use the problems of two ideal fluid waveguides as examples, i.e., one with a constant sound speed in shallow water and one with a Munk sound speed profile in the deep ocean. The correctness of the discrete PE model using the CSM to solve a simple underwater acoustic propagation problem is verified. The test results show that compared with the finite difference discrete PE model, the proposed method in this paper has a higher accuracy in the calculation of underwater acoustic propagation in a simple marine environment and requires fewer discrete grid points. However, the proposed method has a longer running time than the finite difference discrete PE program . Thus, it is suitable to provide high-precision reference standards for the benchmark examples of the PE model.", "after_revision": "Solving an acoustic wave equation using a parabolic approximation is a popular approach for many existing ocean acoustic models. Commonly used parabolic equation (PE) model programs, such as the range-dependent acoustic model (RAM), are discretized by the finite difference method (FDM). Considering the idea and theory of the wide-angle rational approximation, a discrete PE model using the Chebyshev spectral method (CSM) is derived, and the code is developed. This method is currently suitable only for range-independent waveguides. Taking three ideal fluid waveguides as examples, the correctness of using the CSM discrete PE model in solving the underwater acoustic propagation problem is verified. The test results show that compared with the RAM, the method proposed in this paper can achieve higher accuracy in computational underwater acoustics and requires fewer discrete grid points. After optimization, this method is more advantageous than the FDM in terms of speed . Thus, the CSM provides high-precision reference standards for benchmark examples of the range-independent PE model.", "edit_actions": [{"type": "R", "before": "available", "after": "existing", "start_char_pos": 97, "end_char_pos": 106}, {"type": "R", "before": "\"split-step\" parabolic", "after": "wide-angle rational", "start_char_pos": 328, "end_char_pos": 350}, {"type": "R", "before": "We use the problems of two", "after": "This method is currently suitable only for range-independent waveguides. Taking three", "start_char_pos": 467, "end_char_pos": 493}, {"type": "D", "before": "i.e., one with a constant sound speed in shallow water and one with a Munk sound speed profile in the deep ocean. The correctness of", "after": null, "start_char_pos": 530, "end_char_pos": 662}, {"type": "A", "before": null, "after": "correctness of using the CSM", "start_char_pos": 667, "end_char_pos": 667}, {"type": "R", "before": "using the CSM to solve a simple", "after": "in solving the", "start_char_pos": 686, "end_char_pos": 717}, {"type": "R", "before": "finite difference discrete PE model, the proposed method", "after": "RAM, the method proposed", "start_char_pos": 816, "end_char_pos": 872}, {"type": "R", "before": "has a", "after": "can achieve", "start_char_pos": 887, "end_char_pos": 892}, {"type": "R", "before": "the calculation of underwater acoustic propagation in a simple marine environment", "after": "computational underwater acoustics", "start_char_pos": 912, "end_char_pos": 993}, {"type": "R", "before": "However, the proposed method has a longer running time than the finite difference discrete PE program", "after": "After optimization, this method is more advantageous than the FDM in terms of speed", "start_char_pos": 1035, "end_char_pos": 1136}, {"type": "R", "before": "it is suitable to provide", "after": "the CSM provides", "start_char_pos": 1145, "end_char_pos": 1170}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1210, "end_char_pos": 1213}, {"type": "A", "before": null, "after": "range-independent", "start_char_pos": 1240, "end_char_pos": 1240}], "sents_char_pos": [0, 129, 288, 466, 643, 770, 1034, 1138]}
+{"doc_id": "2012.04035", "revision_depth": "1", "before_revision": "Computational methods that operate directly on three-dimensional molecular structure hold large potential to solve important questions in biology and chemistry. In particular deep neural networks have recently gained significant attention . In thiswork we present ATOM3D, a collection of both novel and existing datasets spanning several key classes of biomolecules , to systematically assess such learning methods. We develop three-dimensional molecular learning networks for each of these tasks , finding that they consistently improve performance relative to one- and two-dimensional methods . The specific choice of architecture proves to be critical for performance, with three-dimensional convolutional networks excelling at tasks involving complex geometries, while graph networks perform well on systems requiring detailed positional information . Furthermore, equivariant networks show significant promise. Our results indicate many molecular problems stand to gain from three-dimensional molecular learning . All code and datasets can be accessed via URL .", "after_revision": "Computational methods that operate on three-dimensional molecular structure have the potential to solve important questions in biology and chemistry. In particular , deep neural networks have gained significant attention , but their widespread adoption in the biomolecular domain has been limited by a lack of either systematic performance benchmarks or a unified toolkit for interacting with molecular data. To address this, we present ATOM3D, a collection of both novel and existing benchmark datasets spanning several key classes of biomolecules . We implement several classes of three-dimensional molecular learning methods for each of these tasks and show that they consistently improve performance relative to methods based on one- and two-dimensional representations . The specific choice of architecture proves to be critical for performance, with three-dimensional convolutional networks excelling at tasks involving complex geometries, graph networks performing well on systems requiring detailed positional information , and the more recently developed equivariant networks showing significant promise. Our results indicate that many molecular problems stand to gain from three-dimensional molecular learning , and that there is potential for improvement on many tasks which remain underexplored. To lower the barrier to entry and facilitate further developments in the field, we also provide a comprehensive suite of tools for dataset processing, model training, and evaluation in our open-source atom3d Python package. All datasets are available for download from URL .", "edit_actions": [{"type": "D", "before": "directly", "after": null, "start_char_pos": 35, "end_char_pos": 43}, {"type": "R", "before": "hold large", "after": "have the", "start_char_pos": 85, "end_char_pos": 95}, {"type": "A", "before": null, "after": ",", "start_char_pos": 175, "end_char_pos": 175}, {"type": "D", "before": "recently", "after": null, "start_char_pos": 202, "end_char_pos": 210}, {"type": "R", "before": ". In thiswork", "after": ", but their widespread adoption in the biomolecular domain has been limited by a lack of either systematic performance benchmarks or a unified toolkit for interacting with molecular data. To address this,", "start_char_pos": 240, "end_char_pos": 253}, {"type": "A", "before": null, "after": "benchmark", "start_char_pos": 313, "end_char_pos": 313}, {"type": "R", "before": ", to systematically assess such learning methods. We develop", "after": ". We implement several classes of", "start_char_pos": 368, "end_char_pos": 428}, {"type": "R", "before": "networks", "after": "methods", "start_char_pos": 466, "end_char_pos": 474}, {"type": "R", "before": ", finding", "after": "and show", "start_char_pos": 499, "end_char_pos": 508}, {"type": "A", "before": null, "after": "methods based on", "start_char_pos": 564, "end_char_pos": 564}, {"type": "R", "before": "methods", "after": "representations", "start_char_pos": 590, "end_char_pos": 597}, {"type": "R", "before": "while graph networks perform", "after": "graph networks performing", "start_char_pos": 770, "end_char_pos": 798}, {"type": "R", "before": ". Furthermore, equivariant networks show", "after": ", and the more recently developed equivariant networks showing", "start_char_pos": 857, "end_char_pos": 897}, {"type": "A", "before": null, "after": "that", "start_char_pos": 940, "end_char_pos": 940}, {"type": "R", "before": ". All code and datasets can be accessed via", "after": ", and that there is potential for improvement on many tasks which remain underexplored. To lower the barrier to entry and facilitate further developments in the field, we also provide a comprehensive suite of tools for dataset processing, model training, and evaluation in our open-source atom3d Python package. All datasets are available for download from", "start_char_pos": 1021, "end_char_pos": 1064}], "sents_char_pos": [0, 160, 241, 417, 599, 858, 918, 1022]}
+{"doc_id": "2012.04403", "revision_depth": "1", "before_revision": "A curve P with n vertices is said to be c-packed if the length of the curve within any disk of radius r is at most cr, for any r>0. If the ratio \\frac L \\delta is fixed, where L is the total length of P and \\delta is the minimum distance between any two points on P, other than the intersection points, a 2 (1+\\epsilon)-approximation algorithm exists for disks, and a (1+\\epsilon)-approximation algorithm exists for convex polygons , with time complexities O(\\log (L/\\delta){\\epsilon}n^3) and O( \\frac{\\log (L/\\delta){\\epsilon}} {\\epsilon^{5/2}}} n^3\\log n), respectively. Recently, two other algorithms were claimed to be constant-factor approximations for the c-packedness using axis-aligned cubes instead of disks, which only consider the vertices of the curve when determining the c-packedness and therefore contradict the original definition of the c-packedness that has no assumptions on the placement of the disks. Call this measure the relative c-packedness. Using an example, we show that c-packedness and relative c-packedness are not within a constant factor of each other . We design the first exact algorithm for computing the minimum c for which a given curve P is c-packed. Our algorithm runs in O(n^5) time. Also, we show that there are no constant-factor approximation algorithms that solve the problem in sub-quadratic timein the worst-case and only uses intersection information to solve the problem .", "after_revision": "A polygonal curve P with n vertices is c-packed , if the sum of the lengths of the parts of the edges of the curve that are inside any disk of radius r is at most cr, for any r>0. Similarly, the concept of c-packedness can be defined for any scaling of a given shape. Assuming L is the total length of P and \\delta is the minimum distance between any pair of points on two non-intersecting edges of P, (1+\\epsilon)-approximation algorithms exist for disks, and for convex polygons of constant size , with time complexities O(\\log (L/\\delta){\\epsilon}n^3) and O( {\\epsilon}} \\frac{\\log (L/\\delta){\\epsilon^{5/2}}} n^3\\log n), respectively. There also exist two algorithms with approximation factor more than 2, for the c-packedness using axis-aligned hypercubes instead of disks, where they consider the shapes centered at the vertices of the curve when determining the c-packedness . We call this measure the vertex-relative c-packedness. For axis-aligned squares instead of disks, a related concept called relative-length was already discussed and it has an exact O(n^3) algorithm. We show that vertex-relative c-packedness has approximation factor at least 2 for c-packedness . We design the first exact algorithm for computing the minimum c for which a given curve P is c-packed. Our algorithm runs in O(n^5) time. We also give a data-structure for computing the length of the curve inside arbitrary query disk, known as the length-query problem. It has O(n^6\\log n) construction time, uses O(n^6) space, and has query time O(\\log n+k), where k is the number of intersected segments with the query shape .", "edit_actions": [{"type": "A", "before": null, "after": "polygonal", "start_char_pos": 2, "end_char_pos": 2}, {"type": "D", "before": "said to be", "after": null, "start_char_pos": 30, "end_char_pos": 40}, {"type": "R", "before": "if the length of the curve within", "after": ", if the sum of the lengths of the parts of the edges of the curve that are inside", "start_char_pos": 50, "end_char_pos": 83}, {"type": "R", "before": "If the ratio \\frac L \\delta is fixed, where L is", "after": "Similarly, the concept of c-packedness can be defined for any scaling of a given shape. Assuming L is", "start_char_pos": 133, "end_char_pos": 181}, {"type": "R", "before": "two points on P, other than the intersection points, a 2", "after": "pair of points on two non-intersecting edges of P,", "start_char_pos": 251, "end_char_pos": 307}, {"type": "R", "before": "algorithm exists", "after": "algorithms exist", "start_char_pos": 335, "end_char_pos": 351}, {"type": "D", "before": "a (1+\\epsilon)-approximation algorithm exists", "after": null, "start_char_pos": 367, "end_char_pos": 412}, {"type": "A", "before": null, "after": "of constant size", "start_char_pos": 433, "end_char_pos": 433}, {"type": "D", "before": "\\frac{\\log (L/\\delta)", "after": null, "start_char_pos": 498, "end_char_pos": 519}, {"type": "A", "before": null, "after": "\\frac{\\log (L/\\delta)", "start_char_pos": 531, "end_char_pos": 531}, {"type": "R", "before": "Recently, two other algorithms were claimed to be constant-factor approximations", "after": "There also exist two algorithms with approximation factor more than 2,", "start_char_pos": 575, "end_char_pos": 655}, {"type": "R", "before": "cubes", "after": "hypercubes", "start_char_pos": 696, "end_char_pos": 701}, {"type": "R", "before": "which only consider the", "after": "where they consider the shapes centered at the", "start_char_pos": 720, "end_char_pos": 743}, {"type": "R", "before": "and therefore contradict the original definition of the c-packedness that has no assumptions on the placement of the disks. Call", "after": ". We call", "start_char_pos": 800, "end_char_pos": 928}, {"type": "R", "before": "relative", "after": "vertex-relative", "start_char_pos": 946, "end_char_pos": 954}, {"type": "R", "before": "Using an example, we show that", "after": "For axis-aligned squares instead of disks, a related concept called relative-length was already discussed and it has an exact O(n^3) algorithm. We show that vertex-relative", "start_char_pos": 969, "end_char_pos": 999}, {"type": "R", "before": "and relative", "after": "has approximation factor at least 2 for", "start_char_pos": 1013, "end_char_pos": 1025}, {"type": "D", "before": "are not within a constant factor of each other", "after": null, "start_char_pos": 1039, "end_char_pos": 1085}, {"type": "R", "before": "Also, we show that there are no constant-factor approximation algorithms that solve the problem in sub-quadratic timein the worst-case and only uses intersection information to solve the problem", "after": "We also give a data-structure for computing the length of the curve inside arbitrary query disk, known as the length-query problem. It has O(n^6\\log n) construction time, uses O(n^6) space, and has query time O(\\log n+k), where k is the number of intersected segments with the query shape", "start_char_pos": 1226, "end_char_pos": 1420}], "sents_char_pos": [0, 132, 574, 923, 968, 1087, 1190, 1225]}
+{"doc_id": "2012.04403", "revision_depth": "2", "before_revision": "A polygonal curve P with n vertices is c-packed, if the sum of the lengths of the parts of the edges of the curve that are inside any disk of radius r is at most cr, for any r>0. Similarly, the concept of c-packedness can be defined for any scaling of a given shape. Assuming L is the total length of P and \\delta is the minimum distance between any pair of points on two non-intersecting edges of P, ({\\epsilon}n^3) time algorithm is } 1+\\epsilon ) -approximation algorithms exist for disks, and for convex polygons of constant size, with time complexities O(\\frac{\\log (L/\\delta){\\epsilon}n ^3) and O(\\log (L/\\delta){\\epsilon^{5/2}}n^3\\log} {\\epsilon^3})^{\\frac 4 3}}\\polylog n ), respectively. There also exist two algorithms with approximation factor more than 2, for the c-packedness using axis-aligned hypercubes instead of disks, where they consider the shapes centered at the vertices of the curve when determining the c-packedness. We call this measure the vertex-relative c-packedness. For axis-aligned squares instead of disks, a related concept called relative-length was already discussed and it has an exact{\\epsilon})+n{\\epsilon}) time algorithm, and the existing } O(n ^3) algorithm. We show that vertex-relative c-packedness has approximation factor at least 2 for c-packedness. We design the first exact algorithmfor computing the minimum c for which a given curve P is c-packed. Our algorithm runs in O(n^5) time . We also give a data-structure for computing the length of the curve inside arbitrary query disk, known as the length-query problem . It has O(n^6\\log n) construction time, uses O(n^6) space, and has query time O(\\log n+k), where k is the number of intersected segments with the query shape .", "after_revision": "A polygonal curve P with n vertices is c-packed, if the sum of the lengths of the parts of the edges of the curve that are inside any disk of radius r is at most cr, for any r>0. Similarly, the concept of c-packedness can be defined for any scaling of a given shape. Assuming L is the diameter of P and \\delta is the minimum distance between points on disjoint edges of P, we show the approximation factor of the existing O(\\frac{\\log (L/\\delta){\\epsilon}n^3) time algorithm is } 1+\\epsilon -approximation {\\epsilon}n ^3) and O(\\log (L/\\delta){\\epsilon^{5/2}}n^3\\log} algorithm. The massively parallel versions of these algorithms run in O(\\log (L/\\delta)) rounds. We improve the existing O((\\frac{n{\\epsilon^3})^{\\frac 4 3}}\\polylog \\frac n \\epsilon) time (6+\\epsilon)-approximation algorithm by providing a (4+\\epsilon)-approximation O( n (\\log^2 n)(\\log^2 \\frac{1{\\epsilon})+n{\\epsilon}) time algorithm, and the existing } O(n ^2) time 2-approximation algorithm improving the existing O(n^2\\log n) time 2-approximation algorithm. Our exact c-packedness algorithm takes O(n^5) time , which is the first exact algorithm for disks. We show using \\alpha-fat shapes instead of disks adds a factor \\alpha^2 to the approximation. We also give a data-structure for computing the curve-length inside query disks . It has O(n^6\\log n) construction time, uses O(n^6) space, and has query time O(\\log n+k), where k is the number of intersected segments with the query shape . We also give a massively parallel algorithm for relative c-packedness with O(1) rounds .", "edit_actions": [{"type": "R", "before": "total length", "after": "diameter", "start_char_pos": 285, "end_char_pos": 297}, {"type": "R", "before": "any pair of points on two non-intersecting", "after": "points on disjoint", "start_char_pos": 346, "end_char_pos": 388}, {"type": "R", "before": "(", "after": "we show the approximation factor of the existing O(\\frac{\\log (L/\\delta)", "start_char_pos": 401, "end_char_pos": 402}, {"type": "D", "before": ")", "after": null, "start_char_pos": 448, "end_char_pos": 449}, {"type": "D", "before": "algorithms exist for disks, and for convex polygons of constant size, with time complexities O(\\frac{\\log (L/\\delta)", "after": null, "start_char_pos": 465, "end_char_pos": 581}, {"type": "A", "before": null, "after": "algorithm. The massively parallel versions of these algorithms run in O(\\log (L/\\delta)) rounds. We improve the existing O((\\frac{n", "start_char_pos": 643, "end_char_pos": 643}, {"type": "A", "before": null, "after": "\\frac n \\epsilon) time (6+\\epsilon)-approximation algorithm by providing a (4+\\epsilon)-approximation O(", "start_char_pos": 678, "end_char_pos": 678}, {"type": "R", "before": "), respectively. There also exist two algorithms with approximation factor more than 2, for the c-packedness using axis-aligned hypercubes instead of disks, where they consider the shapes centered at the vertices of the curve when determining the c-packedness. We call this measure the vertex-relative c-packedness. For axis-aligned squares instead of disks, a related concept called relative-length was already discussed and it has an exact", "after": "(\\log^2 n)(\\log^2 \\frac{1", "start_char_pos": 681, "end_char_pos": 1122}, {"type": "R", "before": "^3) algorithm. We show that vertex-relative c-packedness has approximation factor at least 2 for c-packedness. We design the first exact algorithmfor computing the minimum c for which a given curve P is c-packed. Our algorithm runs in", "after": "^2) time 2-approximation algorithm improving the existing O(n^2\\log n) time 2-approximation algorithm. Our exact c-packedness algorithm takes", "start_char_pos": 1186, "end_char_pos": 1420}, {"type": "R", "before": ". We", "after": ", which is the first exact algorithm for disks. We show using \\alpha-fat shapes instead of disks adds a factor \\alpha^2 to the approximation. We", "start_char_pos": 1433, "end_char_pos": 1437}, {"type": "R", "before": "length of the curve inside arbitrary query disk, known as the length-query problem", "after": "curve-length inside query disks", "start_char_pos": 1483, "end_char_pos": 1565}, {"type": "A", "before": null, "after": ". We also give a massively parallel algorithm for relative c-packedness with O(1) rounds", "start_char_pos": 1725, "end_char_pos": 1725}], "sents_char_pos": [0, 178, 266, 697, 941, 996, 1200, 1296, 1398, 1434, 1567]}
+{"doc_id": "2012.09627", "revision_depth": "1", "before_revision": "It is challenging to elucidate the extrinsic effects of social, economic , policy or other substantive changes on the dynamics of US drug approvals. Here, a novel approach, termed the Chronological Hurst Exponent (CHE), is proposed, which hypothesizes that changes in intrinsic long-range memory latent within the dynamics of time series data may be temporally associated with extrinsic variables . Using the monthly number FDA Center for Drug Evaluation and Research (CDER) approvals from 1939 to 2019 as the data source, it is demonstrated that US approvals are found to have a distinct S-shaped (trichotomized) long-range CHE structure : an 8-year (1939-1947) Stagnated (random; H of 0.5) , a 27-year (1947-1974) Emergent (time-varying persistent; H between 0.5 and 0.9), and the 45-year (1974-2019) Saturated (persistent; H of 1) US Approvals Hurst Cycles . Further, dominant periodicities (resolved via wavelet analyses) are identified in the Saturated Period at 17, 8 and 4 years; thus, US Approvals have been following a Juglar/Kuznet mid-term cycle with Kitchin-like bursts. This work suggests that (1) macro-factors in the Emergent Period have led to persistent growth in US approvals enjoyed since 1974, (2) the CHE may be a valued method to explore the constancy of extrinsic pressures on time series data, and (3) adds further evidence that innovation-related economic cycles exist (as supported via the proxy metric of US drug approvals).", "after_revision": "It is challenging to elucidate the effects of changes in external influences (such as economic or policy) on the rate of US drug approvals. Here, a novel approach, termed the Chronological Hurst Exponent (CHE), is proposed, which hypothesizes that changes in the long-range memory latent within the dynamics of time series data may be temporally associated with changes in such influences . Using the monthly number the FDA Center for Drug Evaluation and Research (CDER) approvals from 1939 to 2019 as the data source, it is demonstrated that the CHE has a distinct S-shaped structure demarcated by an 8-year (1939-1947) Stagnation Period , a 27-year (1947-1974) Emergent (time-varying Period, and a 45-year (1974-2019) Saturation Period . Further, dominant periodicities (resolved via wavelet analyses) are identified during the most recent 45-year CHE Saturation Period at 17, 8 and 4 years; thus, US drug approvals have been following a Juglar-Kuznet mid-term cycle with Kitchin-like bursts. As discussed, this work suggests that (1) changes in extrinsic factors (e.g., of economic and/or policy origin ) during the Emergent Period may have led to persistent growth in US drug approvals enjoyed since 1974, (2) the CHE may be a valued method to explore influences on time series data, and (3) innovation-related economic cycles exist (as viewed via the proxy metric of US drug approvals).", "edit_actions": [{"type": "R", "before": "extrinsic effects of social, economic , policy or other substantive changes on the dynamics", "after": "effects", "start_char_pos": 35, "end_char_pos": 126}, {"type": "A", "before": null, "after": "changes in external influences (such as economic or policy) on the rate of", "start_char_pos": 130, "end_char_pos": 130}, {"type": "R", "before": "intrinsic", "after": "the", "start_char_pos": 269, "end_char_pos": 278}, {"type": "R", "before": "extrinsic variables", "after": "changes in such influences", "start_char_pos": 378, "end_char_pos": 397}, {"type": "A", "before": null, "after": "the", "start_char_pos": 425, "end_char_pos": 425}, {"type": "R", "before": "US approvals are found to have", "after": "the CHE has", "start_char_pos": 549, "end_char_pos": 579}, {"type": "R", "before": "(trichotomized) long-range CHE structure :", "after": "structure demarcated by", "start_char_pos": 600, "end_char_pos": 642}, {"type": "R", "before": "Stagnated (random; H of 0.5)", "after": "Stagnation Period", "start_char_pos": 665, "end_char_pos": 693}, {"type": "R", "before": "persistent; H between 0.5 and 0.9), and the", "after": "Period, and a", "start_char_pos": 741, "end_char_pos": 784}, {"type": "R", "before": "Saturated (persistent; H of 1) US Approvals Hurst Cycles", "after": "Saturation Period", "start_char_pos": 805, "end_char_pos": 861}, {"type": "R", "before": "in the Saturated", "after": "during the most recent 45-year CHE Saturation", "start_char_pos": 943, "end_char_pos": 959}, {"type": "R", "before": "Approvals", "after": "drug approvals", "start_char_pos": 998, "end_char_pos": 1007}, {"type": "R", "before": "Juglar/Kuznet", "after": "Juglar-Kuznet", "start_char_pos": 1030, "end_char_pos": 1043}, {"type": "R", "before": "This", "after": "As discussed, this", "start_char_pos": 1085, "end_char_pos": 1089}, {"type": "R", "before": "macro-factors in", "after": "changes in extrinsic factors (e.g., of economic and/or policy origin ) during", "start_char_pos": 1113, "end_char_pos": 1129}, {"type": "A", "before": null, "after": "may", "start_char_pos": 1150, "end_char_pos": 1150}, {"type": "A", "before": null, "after": "drug", "start_char_pos": 1187, "end_char_pos": 1187}, {"type": "R", "before": "the constancy of extrinsic pressures", "after": "influences", "start_char_pos": 1264, "end_char_pos": 1300}, {"type": "D", "before": "adds further evidence that", "after": null, "start_char_pos": 1330, "end_char_pos": 1356}, {"type": "R", "before": "supported", "after": "viewed", "start_char_pos": 1402, "end_char_pos": 1411}], "sents_char_pos": [0, 149, 476, 683, 752, 827, 863, 988, 1084]}
+{"doc_id": "2012.10077", "revision_depth": "2", "before_revision": "We study linear regressions with period and group fixed effects , with several treatment variables. We show that under a parallel trends assumption, the coefficient of each treatment identifies the sum of two terms. The first term is a weighted sum of the average effect of that treatment in each group and period, with weights that may be negative . The second term is a weighted sum of the average effect of the other treatments in each group and period , with weights that may again be negative . Accordingly, the treatment coefficients in those regressions are not robust to heterogeneous effects across groups and over time , and may also be contaminated by the effect of other treatments. When a single treatment is interacted with mutually exclusive binary variables to investigate treatment effect heterogeneity, our result implies that the coefficient for a given subgroup may actually be contaminated by treatment effects in other subgroups. We propose an alternative estimator that does not suffer from those issues .", "after_revision": "We study regressions with period and group fixed effects and several treatment variables. Under a parallel trends assumption, the coefficient on each treatment identifies the sum of two terms. The first term is a weighted sum of the effect of that treatment in each group and period, with weights that may be negative and sum to one . The second term is a sum of the effects of the other treatments , with weights summing to zero . Accordingly, coefficients in those regressions are not robust to heterogeneous effects , and may be contaminated by the effect of other treatments. We propose alternative estimators .", "edit_actions": [{"type": "D", "before": "linear", "after": null, "start_char_pos": 9, "end_char_pos": 15}, {"type": "R", "before": ", with", "after": "and", "start_char_pos": 64, "end_char_pos": 70}, {"type": "R", "before": "We show that under", "after": "Under", "start_char_pos": 100, "end_char_pos": 118}, {"type": "R", "before": "of", "after": "on", "start_char_pos": 165, "end_char_pos": 167}, {"type": "D", "before": "average", "after": null, "start_char_pos": 256, "end_char_pos": 263}, {"type": "A", "before": null, "after": "and sum to one", "start_char_pos": 349, "end_char_pos": 349}, {"type": "D", "before": "weighted", "after": null, "start_char_pos": 373, "end_char_pos": 381}, {"type": "R", "before": "average effect", "after": "effects", "start_char_pos": 393, "end_char_pos": 407}, {"type": "D", "before": "in each group and period", "after": null, "start_char_pos": 432, "end_char_pos": 456}, {"type": "R", "before": "that may again be negative", "after": "summing to zero", "start_char_pos": 472, "end_char_pos": 498}, {"type": "D", "before": "the treatment", "after": null, "start_char_pos": 514, "end_char_pos": 527}, {"type": "D", "before": "across groups and over time", "after": null, "start_char_pos": 602, "end_char_pos": 629}, {"type": "D", "before": "also", "after": null, "start_char_pos": 640, "end_char_pos": 644}, {"type": "R", "before": "When a single treatment is interacted with mutually exclusive binary variables to investigate treatment effect heterogeneity, our result implies that the coefficient for a given subgroup may actually be contaminated by treatment effects in other subgroups. We propose an alternative estimator that does not suffer from those issues", "after": "We propose alternative estimators", "start_char_pos": 696, "end_char_pos": 1027}], "sents_char_pos": [0, 99, 215, 351, 500, 695, 952]}
+{"doc_id": "2012.10209", "revision_depth": "2", "before_revision": "Open intent classification is a challenging task in dialogue systems. On the one hand, we should ensure the classification quality of known intents . On the other hand, we need to identify the open (unknown) intent during testing . Current models are limited in finding the appropriate decision boundary to balance the performances of both known and open intents . In this paper, we propose a post-processing method to learn the adaptive decision boundary (ADB) for open intent classification. We first utilize the labeled known intent samples to pre-train the model. Then, we use the well-trained features to automatically learn the adaptive spherical decision boundaries for each known intent . Specifically, we propose a new loss function to balance both the empirical risk and the open space risk. Our method does not need open samples and is free from modifying the model architecture. We find our approach is surprisingly insensitive with less labeled data and fewer known intents. Extensive experiments on three benchmark datasets show that our method yields significant improvements compared with the state-of-the-art methods. (The code is available at URL", "after_revision": "Open intent classification is a challenging task in dialogue systems. On the one hand, it should ensure the quality of known intent identification . On the other hand, it needs to detect the open (unknown) intent without prior knowledge . Current models are limited in finding the appropriate decision boundary to balance the performances of both known intents and the open intent . In this paper, we propose a post-processing method to learn the adaptive decision boundary (ADB) for open intent classification. We first utilize the labeled known intent samples to pre-train the model. Then, we automatically learn the adaptive spherical decision boundary for each known class with the aid of well-trained features . Specifically, we propose a new loss function to balance both the empirical risk and the open space risk. Our method does not need open intent samples and is free from modifying the model architecture. Moreover, our approach is surprisingly insensitive with less labeled data and fewer known intents. Extensive experiments on three benchmark datasets show that our method yields significant improvements compared with the state-of-the-art methods. The codes are released at URL", "edit_actions": [{"type": "R", "before": "we", "after": "it", "start_char_pos": 87, "end_char_pos": 89}, {"type": "D", "before": "classification", "after": null, "start_char_pos": 108, "end_char_pos": 122}, {"type": "R", "before": "intents", "after": "intent identification", "start_char_pos": 140, "end_char_pos": 147}, {"type": "R", "before": "we need to identify", "after": "it needs to detect", "start_char_pos": 169, "end_char_pos": 188}, {"type": "R", "before": "during testing", "after": "without prior knowledge", "start_char_pos": 215, "end_char_pos": 229}, {"type": "R", "before": "and open intents", "after": "intents and the open intent", "start_char_pos": 346, "end_char_pos": 362}, {"type": "D", "before": "use the well-trained features to", "after": null, "start_char_pos": 577, "end_char_pos": 609}, {"type": "R", "before": "boundaries", "after": "boundary", "start_char_pos": 662, "end_char_pos": 672}, {"type": "R", "before": "intent", "after": "class with the aid of well-trained features", "start_char_pos": 688, "end_char_pos": 694}, {"type": "A", "before": null, "after": "intent", "start_char_pos": 832, "end_char_pos": 832}, {"type": "R", "before": "We find", "after": "Moreover,", "start_char_pos": 892, "end_char_pos": 899}, {"type": "R", "before": "(The code is available", "after": "The codes are released", "start_char_pos": 1136, "end_char_pos": 1158}], "sents_char_pos": [0, 69, 149, 364, 493, 567, 801, 891, 988, 1135]}
+{"doc_id": "2012.10589", "revision_depth": "1", "before_revision": "A self-contained autonomous navigation system is desired to complement the Global Navigation Satellite System (GNSS) for land vehicles, for which odometer aided inertial navigation system (ODO/INS) is a classical solution. In this study, we use a wheel-mounted MEMS IMU (Wheel-IMU) to substitute the conventional odometer, and further, investigate three types of measurement models, including the velocity measurement, displacement increment measurement, and contact point zero-velocity measurement, in the Wheel-IMU based dead reckoning (DR ) system. The three measurements, along with the non-holonomic constraints (NHCs ) are fused with INS by an extended Kalman filter (EKF). Theoretical discussion and field tests illustrate their feasibility and equivalence in overall positioning performance, which have the maximum horizontal position drifts less than 2\\% of the total travelled distance. However , the displacement increment measurement model is less sensitive to the installation lever arm between the Wheel-IMU and wheel center.", "after_revision": "A self-contained autonomous dead reckoning (DR) system is desired to complement the Global Navigation Satellite System (GNSS) for land vehicles, for which odometer-aided inertial navigation system (ODO/INS) is a classical solution. In this study, we use a wheel-mounted MEMS IMU (Wheel-IMU) to substitute the odometer, and further, investigate three types of measurement models, including the velocity measurement, displacement increment measurement, and contact point zero-velocity measurement, in the Wheel-IMU based DR system. The measurement produced by the Wheel-IMU along with the non-holonomic constraint (NHC ) are fused with INS through an error-state extended Kalman filter (EKF). Theoretical discussion and field tests illustrate the feasibility and equivalence of the three measurements in terms of the overall DR performance. The maximum horizontal position drifts are all less than 2\\% of the total travelled distance. Additionally , the displacement increment measurement model is less sensitive to the lever arm error between the Wheel-IMU and the wheel center.", "edit_actions": [{"type": "R", "before": "navigation", "after": "dead reckoning (DR)", "start_char_pos": 28, "end_char_pos": 38}, {"type": "R", "before": "odometer aided", "after": "odometer-aided", "start_char_pos": 146, "end_char_pos": 160}, {"type": "D", "before": "conventional", "after": null, "start_char_pos": 300, "end_char_pos": 312}, {"type": "R", "before": "dead reckoning (DR )", "after": "DR", "start_char_pos": 523, "end_char_pos": 543}, {"type": "R", "before": "three measurements,", "after": "measurement produced by the Wheel-IMU", "start_char_pos": 556, "end_char_pos": 575}, {"type": "R", "before": "constraints (NHCs", "after": "constraint (NHC", "start_char_pos": 605, "end_char_pos": 622}, {"type": "R", "before": "by an", "after": "through an error-state", "start_char_pos": 644, "end_char_pos": 649}, {"type": "R", "before": "their", "after": "the", "start_char_pos": 730, "end_char_pos": 735}, {"type": "R", "before": "in overall positioning performance, which have the", "after": "of the three measurements in terms of the overall DR performance. The", "start_char_pos": 764, "end_char_pos": 814}, {"type": "A", "before": null, "after": "are all", "start_char_pos": 850, "end_char_pos": 850}, {"type": "R", "before": "However", "after": "Additionally", "start_char_pos": 898, "end_char_pos": 905}, {"type": "R", "before": "installation lever arm", "after": "lever arm error", "start_char_pos": 978, "end_char_pos": 1000}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1027, "end_char_pos": 1027}], "sents_char_pos": [0, 222, 551, 679, 897]}
+{"doc_id": "2012.10762", "revision_depth": "1", "before_revision": "Embolization, stroke, ischaemic lesion, and perforation remain significant concerns in endovascular interventions. Sensing catheter interaction inside the artery is advantageous to minimize such complications and enhances navigation safety. Intraluminal information is currently limited due to the lack of intravascular contact sensing technologies. We present monitoring of the intraluminal catheter interaction with the arterial wall using an image-based estimation approach within vascular robotic navigation. The proposed image-based method employs continuous finite element simulation of the catheter motion using imaging data to estimate multi-point forces along catheter-vessel interaction. We implemented imaging algorithms to detect and track contacts and compute catheter pose measurements. The catheter model is constructed based on the nonlinear beam element and flexural rigidity distribution . During remote cannulation of aortic arteries, intraluminal monitoring achieved tracking local contact forces, building contour map of force on the arterial wall , and estimating structural stress of catheter. Shape estimation error was within 2\\% range. Results suggest that high-risk intraluminal forces may happen even in low insertion forces . The presented online monitoring tool delivers insight into the intraluminal behavior of catheters and is well-suited for intraoperative visual guidance of clinicians , robotic control vascular system, and optimizing interventional device design.", "after_revision": "Embolization, stroke, ischaemic lesion, and perforation remain significant concerns in endovascular interventions. Intravascular sensing of tool interaction with the arteries is advantageous to minimize such complications and enhance navigation safety. Intraluminal information is currently limited due to the lack of intravascular contact sensing technologies. We present monitoring of the intraluminal tool interaction with the arterial wall using an image-based estimation approach within vascular robotic navigation. The proposed image-based method employs continuous finite element simulation of the tool using imaging data to estimate multi-point forces along tool-vessel wall interaction. We implemented imaging algorithms to detect and track contacts , and compute pose measurements. The model is constructed based on the nonlinear beam element and flexural rigidity profile over the tool length . During remote cannulation of aortic arteries, intraluminal monitoring achieved tracking local contact forces, building a contour map of force on the arterial wall and estimating tool structural stress. Results suggest that high risk intraluminal forces may happen even with low insertion force . The presented online monitoring system delivers insight into the intraluminal behavior of endovascular tools and is well suited for intraoperative visual guidance for the clinician , robotic control of vascular procedures and research on interventional device design.", "edit_actions": [{"type": "R", "before": "Sensing catheter interaction inside the artery", "after": "Intravascular sensing of tool interaction with the arteries", "start_char_pos": 115, "end_char_pos": 161}, {"type": "R", "before": "enhances", "after": "enhance", "start_char_pos": 213, "end_char_pos": 221}, {"type": "R", "before": "catheter", "after": "tool", "start_char_pos": 392, "end_char_pos": 400}, {"type": "R", "before": "catheter motion", "after": "tool", "start_char_pos": 597, "end_char_pos": 612}, {"type": "R", "before": "catheter-vessel", "after": "tool-vessel wall", "start_char_pos": 669, "end_char_pos": 684}, {"type": "R", "before": "and compute catheter", "after": ", and compute", "start_char_pos": 761, "end_char_pos": 781}, {"type": "D", "before": "catheter", "after": null, "start_char_pos": 805, "end_char_pos": 813}, {"type": "R", "before": "distribution", "after": "profile over the tool length", "start_char_pos": 893, "end_char_pos": 905}, {"type": "A", "before": null, "after": "a", "start_char_pos": 1027, "end_char_pos": 1027}, {"type": "R", "before": ", and estimating structural stress of catheter. Shape estimation error was within 2\\% range.", "after": "and estimating tool structural stress.", "start_char_pos": 1070, "end_char_pos": 1162}, {"type": "R", "before": "high-risk", "after": "high risk", "start_char_pos": 1184, "end_char_pos": 1193}, {"type": "R", "before": "in low insertion forces", "after": "with low insertion force", "start_char_pos": 1230, "end_char_pos": 1253}, {"type": "R", "before": "tool", "after": "system", "start_char_pos": 1288, "end_char_pos": 1292}, {"type": "R", "before": "catheters and is well-suited", "after": "endovascular tools and is well suited", "start_char_pos": 1344, "end_char_pos": 1372}, {"type": "R", "before": "of clinicians", "after": "for the clinician", "start_char_pos": 1408, "end_char_pos": 1421}, {"type": "R", "before": "vascular system, and optimizing", "after": "of vascular procedures and research on", "start_char_pos": 1440, "end_char_pos": 1471}], "sents_char_pos": [0, 114, 240, 349, 512, 697, 800, 1117, 1162, 1255]}
+{"doc_id": "2012.11860", "revision_depth": "1", "before_revision": "The novel 2019 coronavirus disease ( COVID-19 ) has infected over 65 million people worldwide as of December 4, 2020, pushing the world to the brink of social and economic collapse. With cases rising rapidly, deep learning has emerged as a promising diagnosis technique. However, identifying the most accurate models to characterize COVID-19 patients is challenging because comparing results obtained with different types of data and acquisition processes is non-trivial. In this paper , we evaluated and compared 40 different convolutional neural network architectures for COVID-19 diagnosis, serving as the first to consider the EfficientNet family for COVID-19 diagnosis . EfficientNet-B5 is identified as the best model with an accuracy of 0.9931 +/ -0.0021, F1 score of 0.9931 +/ -0.0020 , sensitivity of 0.9952 +/ -0.0020, and specificity of 0.9912 +/ -0.0048 . Intermediate activation maps and Gradient-weighted Class Activation Mappings offer human-interpretable evidence of the model's perception of ground-class opacities and consolidations, hinting towards a promising use-case of artificial intelligence-assisted radiology tools .", "after_revision": "With COVID-19 cases rising rapidly, deep learning has emerged as a promising diagnosis technique. However, identifying the most accurate models to characterize COVID-19 patients is challenging because comparing results obtained with different types of data and acquisition processes is non-trivial. In this paper we designed, evaluated, and compared the performance of 20 convolutional neutral networks in classifying patients as COVID-19 positive, healthy, or suffering from other pulmonary lung infections based on Chest CT scans, serving as the first to consider the EfficientNet family for COVID-19 diagnosis and employ intermediate activation maps for visualizing model performance. All models are trained and evaluated in Python using 4173 Chest CT images from the dataset entitled \"A COVID multiclass dataset of CT scans,\" with 2168, 758, and 1247 images of patients that are COVID-19 positive, healthy, or suffering from other pulmonary infections, respectively. EfficientNet-B5 was identified as the best model with an F1 score of 0.9769 +/ -0.0046, accuracy of 0.9759+/-0.0048, sensitivity of 0.9788+/-0.0055, specificity of 0.9730+/-0.0057, and precision of 0.9751 +/- 0.0051. On an alternate 2-class dataset, EfficientNetB5 obtained an accuracy of 0.9845+/-0.0109, F1 score of 0.9599 +/ -0.0251 , sensitivity of 0.9682 +/ -0.0099, specificity of 0.9883 +/ -0.0150, and precision of 0.9526 +/- 0.0523 . Intermediate activation maps and Gradient-weighted Class Activation Mappings offered human-interpretable evidence of the model's perception of ground-class opacities and consolidations, hinting towards a promising use-case of artificial intelligence-assisted radiology tools . With a prediction speed of under 0.1 seconds on GPUs and 0.5 seconds on CPUs, our proposed model offers a rapid, scalable, and accurate diagnostic for COVID-19 .", "edit_actions": [{"type": "R", "before": "The novel 2019 coronavirus disease (", "after": "With", "start_char_pos": 0, "end_char_pos": 36}, {"type": "D", "before": ") has infected over 65 million people worldwide as of December 4, 2020, pushing the world to the brink of social and economic collapse. With", "after": null, "start_char_pos": 46, "end_char_pos": 186}, {"type": "R", "before": ", we evaluated and compared 40 different convolutional neural network architectures for", "after": "we designed, evaluated, and compared the performance of 20 convolutional neutral networks in classifying patients as", "start_char_pos": 486, "end_char_pos": 573}, {"type": "R", "before": "diagnosis,", "after": "positive, healthy, or suffering from other pulmonary lung infections based on Chest CT scans,", "start_char_pos": 583, "end_char_pos": 593}, {"type": "R", "before": ".", "after": "and employ intermediate activation maps for visualizing model performance. All models are trained and evaluated in Python using 4173 Chest CT images from the dataset entitled \"A COVID multiclass dataset of CT scans,\" with 2168, 758, and 1247 images of patients that are COVID-19 positive, healthy, or suffering from other pulmonary infections, respectively.", "start_char_pos": 674, "end_char_pos": 675}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 692, "end_char_pos": 694}, {"type": "R", "before": "accuracy of 0.9931", "after": "F1 score of 0.9769", "start_char_pos": 732, "end_char_pos": 750}, {"type": "R", "before": "-0.0021,", "after": "-0.0046, accuracy of 0.9759+/-0.0048, sensitivity of 0.9788+/-0.0055, specificity of 0.9730+/-0.0057, and precision of 0.9751 +/- 0.0051. On an alternate 2-class dataset, EfficientNetB5 obtained an accuracy of 0.9845+/-0.0109,", "start_char_pos": 754, "end_char_pos": 762}, {"type": "R", "before": "0.9931", "after": "0.9599", "start_char_pos": 775, "end_char_pos": 781}, {"type": "R", "before": "-0.0020", "after": "-0.0251", "start_char_pos": 785, "end_char_pos": 792}, {"type": "R", "before": "0.9952", "after": "0.9682", "start_char_pos": 810, "end_char_pos": 816}, {"type": "R", "before": "-0.0020, and specificity of 0.9912", "after": "-0.0099, specificity of 0.9883", "start_char_pos": 820, "end_char_pos": 854}, {"type": "R", "before": "-0.0048", "after": "-0.0150, and precision of 0.9526 +/- 0.0523", "start_char_pos": 858, "end_char_pos": 865}, {"type": "R", "before": "offer", "after": "offered", "start_char_pos": 945, "end_char_pos": 950}, {"type": "A", "before": null, "after": ". With a prediction speed of under 0.1 seconds on GPUs and 0.5 seconds on CPUs, our proposed model offers a rapid, scalable, and accurate diagnostic for COVID-19", "start_char_pos": 1141, "end_char_pos": 1141}], "sents_char_pos": [0, 181, 270, 471, 755]}
+{"doc_id": "2012.12593", "revision_depth": "1", "before_revision": "The behavior of sharing information on social media should be fulfilled when the user is exhibiting attentive behavior. Useful information can be consumed constructively, and misinformation should not incline forwarded. Attentive behavior is related to users' cognitive abilities in the processing of set information. The work described in this paper examines the issue of attentive factors that affects the misinformation-sharing behavior of the user' s on social media. This research aims to identify the significance of the prevailing attention factor towards sharing misinformation on social media. Our closed-ended questionnaire consisted of a psychometric scale to measure attention behavior with participants in the survey (n = 112). The results coefficient value of -0.390 from a set of regression analyses reports that attention factors have a significant negative correlation effect for users to share misinformation on social media. Along with the findings of the analysis results, we propose the attentive factors incorporated in an application's future design that could intervene in user attention and avoid potential harm caused by the spread of misinformation.", "after_revision": "The behaviour of sharing information on social media should be fulfilled only when a user is exhibiting attentive behaviour. So that the useful information can be consumed constructively, and misinformation can be identified and ignored. Attentive behaviour is related to users' cognitive abilities in their processing of set information. The work described in this paper examines the issue of attentive factors that affect users' behaviour when they share misinformation on social media. The research aims to identify the significance of prevailing attention factors towards sharing misinformation on social media. We used a closed-ended questionnaire which consisted of a psychometric scale to measure attention behaviour with participants (n = 112). The regression equation results are obtained as: y=(19,533-0,390+e) from a set of regression analyses shows that attention factors have a significant negative correlation effect for users to share misinformation on social media. Along with the findings of the analysis results, we propose that attentive factors are incorporated into a social media application's future design that could intervene in user attention and avoid potential harm caused by the spread of misinformation.", "edit_actions": [{"type": "R", "before": "behavior", "after": "behaviour", "start_char_pos": 4, "end_char_pos": 12}, {"type": "R", "before": "when the", "after": "only when a", "start_char_pos": 72, "end_char_pos": 80}, {"type": "R", "before": "behavior. Useful", "after": "behaviour. So that the useful", "start_char_pos": 110, "end_char_pos": 126}, {"type": "R", "before": "should not incline forwarded. Attentive behavior", "after": "can be identified and ignored. Attentive behaviour", "start_char_pos": 190, "end_char_pos": 238}, {"type": "R", "before": "the", "after": "their", "start_char_pos": 283, "end_char_pos": 286}, {"type": "R", "before": "affects the misinformation-sharing behavior of the user' s", "after": "affect users' behaviour when they share misinformation", "start_char_pos": 396, "end_char_pos": 454}, {"type": "R", "before": "This", "after": "The", "start_char_pos": 472, "end_char_pos": 476}, {"type": "R", "before": "the prevailing attention factor", "after": "prevailing attention factors", "start_char_pos": 523, "end_char_pos": 554}, {"type": "R", "before": "Our", "after": "We used a", "start_char_pos": 603, "end_char_pos": 606}, {"type": "A", "before": null, "after": "which", "start_char_pos": 634, "end_char_pos": 634}, {"type": "R", "before": "behavior with participants in the survey", "after": "behaviour with participants", "start_char_pos": 690, "end_char_pos": 730}, {"type": "R", "before": "results coefficient value of -0.390", "after": "regression equation results are obtained as: y=(19,533-0,390+e)", "start_char_pos": 746, "end_char_pos": 781}, {"type": "R", "before": "reports", "after": "shows", "start_char_pos": 816, "end_char_pos": 823}, {"type": "R", "before": "the attentive factors incorporated in an", "after": "that attentive factors are incorporated into a social media", "start_char_pos": 1005, "end_char_pos": 1045}], "sents_char_pos": [0, 119, 219, 317, 471, 602, 741, 944]}
+{"doc_id": "2012.14087", "revision_depth": "1", "before_revision": "Environmental management should be based on a long-run sustainable viewpoint. A stochastic control problem optimizing a long-run objective function is an ergodic control problem whose resolution can be achieved by solving an associated Hamilton-Jacobi-Bellman (HJB) equation having an effective Hamiltonian. However, this key topic has not been well-studied in the context of environmental management. Focusing on non-smooth sediment storage management as an engineering problem, we formulate a new ergodic control problem under discrete observations: a natural assumption of realistic observations . We give an analytical solution to a simple problem and verify optimality and uniqueness of the corresponding HJB equation . To manage HJB equationsin more general cases , we propose a fast sweep method resorting to neither pseudo-time integration nor vanishing discount. The optimal policy and the effective Hamiltonian are then computed simultaneously. A robust control counterpart where the dynamics involve uncertainties is also considered based on a multiplier robust formalism that harmonizes with the stochastic control approach. The resulting HJB equation has a stronger non-linearity but is managed using the presented numerical method. An extended problem constraining control policy is analyzed as well .", "after_revision": "Environmental management optimizing a long-run objective is an ergodic control problem whose resolution can be achieved by solving an associated non-local Hamilton-Jacobi-Bellman (HJB) equation having an effective Hamiltonian. Focusing on sediment storage management as a modern engineering problem, we formulate , analyze, and compute a new ergodic control problem under discrete observations: a simple but non-trivial mathematical problem . We give optimality and comparison results of the corresponding HJB equation having unique non-smoothness and discontinuity. To numerically compute HJB equations , we propose a new fast-sweep method resorting to neither pseudo-time integration nor vanishing discount. The optimal policy and the effective Hamiltonian are then computed simultaneously. Convergence rate of numerical solutions is computationally analyzed. An advanced robust control counterpart where the dynamics involve uncertainties is also numerically considered .", "edit_actions": [{"type": "D", "before": "should be based on a long-run sustainable viewpoint. A stochastic control problem", "after": null, "start_char_pos": 25, "end_char_pos": 106}, {"type": "D", "before": "function", "after": null, "start_char_pos": 139, "end_char_pos": 147}, {"type": "A", "before": null, "after": "non-local", "start_char_pos": 236, "end_char_pos": 236}, {"type": "R", "before": "However, this key topic has not been well-studied in the context of environmental management. Focusing on non-smooth", "after": "Focusing on", "start_char_pos": 309, "end_char_pos": 425}, {"type": "R", "before": "an", "after": "a modern", "start_char_pos": 457, "end_char_pos": 459}, {"type": "A", "before": null, "after": ", analyze, and compute", "start_char_pos": 494, "end_char_pos": 494}, {"type": "R", "before": "natural assumption of realistic observations", "after": "simple but non-trivial mathematical problem", "start_char_pos": 556, "end_char_pos": 600}, {"type": "R", "before": "an analytical solution to a simple problem and verify optimality and uniqueness", "after": "optimality and comparison results", "start_char_pos": 611, "end_char_pos": 690}, {"type": "R", "before": ". To manage HJB equationsin more general cases", "after": "having unique non-smoothness and discontinuity. To numerically compute HJB equations", "start_char_pos": 725, "end_char_pos": 771}, {"type": "R", "before": "fast sweep", "after": "new fast-sweep", "start_char_pos": 787, "end_char_pos": 797}, {"type": "R", "before": "A", "after": "Convergence rate of numerical solutions is computationally analyzed. An advanced", "start_char_pos": 957, "end_char_pos": 958}, {"type": "R", "before": "considered based on a multiplier robust formalism that harmonizes with the stochastic control approach. The resulting HJB equation has a stronger non-linearity but is managed using the presented numerical method. An extended problem constraining control policy is analyzed as well", "after": "numerically considered", "start_char_pos": 1035, "end_char_pos": 1315}], "sents_char_pos": [0, 77, 308, 402, 602, 726, 873, 956, 1138, 1247]}
+{"doc_id": "2012.14962", "revision_depth": "2", "before_revision": "I study the impact of corona populism -- politics aimed at denying or downplaying the danger posed by COVID-19 for strategic reasons -- on the evolution of the pandemic using regional data from Austria. The right-wing FPOE first vocalized strong support for strict lockdown measures, but made a corona populist turn at the end of the first wave of infections. Using panel regression analysis, I show that the vote share of the FPOE at the last national parliamentary elections is a strong predictor for the number of COVID-19 deaths per capita after the FPOE switched their policy stance, while there is no correlation before the policy switch. Interestingly, I do not find a statistically significant correlation between the FPOE vote share and the reported number of infections. I hypothesize that this can be traced back to a self-selection bias in testing . To explore this hypothesis , I extend the classical SIRD model to incorporate conditional quarantine and two groups of agents : the majority and the corona sceptics, where the latter are less inclined to get tested and engage in social distancing. Such a model can explain the puzzling empirics: if mixing is sufficiently homophilic , an increase in the share of corona sceptics can cause an increase in the number of deaths without increasing the number of reported infections . I finally discuss the partly non-trivial implications of the interplay between group sizes, behavioral differences and the degree of homophily on public health outcomes within the theoretical model .", "after_revision": "I study the impact of opposition politics aimed at downplaying the threat of Covid-19. Exploiting a policy U-turn of a major Austrian right-wing party (FPOE), I show that Covid-19 deaths per capita are significantly positively correlated with support for the FPOE only after the turn using panel regressions. Paradoxically, there is no statistically significant correlation with the reported number of infections. I hypothesize that this can be traced back to a self-selection bias in testing , which causes a higher dark figure in FPOE strongholds. I find empirical support for this hypothesis in individual-level data from a Covid-19 prevalence study showing a much higher share of (undetected) cases among \"corona skeptics\". I finally extend the classical SIRD model to incorporate conditional quarantine and heterogeneous mixing of two groups of agents with behavioral differences and explore its partly non-trivial properties using thousands of numerical simulations. This model can explain the puzzling empirics: if the behavioral differences between the two groups are sufficiently different , an increase in the share of corona skeptics can cause an increase in the number of deaths without increasing the number of reported infections .", "edit_actions": [{"type": "R", "before": "corona populism --", "after": "opposition", "start_char_pos": 22, "end_char_pos": 40}, {"type": "R", "before": "denying or downplaying the danger posed by COVID-19 for strategic reasons -- on the evolution of the pandemic using regional data from Austria. The", "after": "downplaying the threat of Covid-19. Exploiting a policy U-turn of a major Austrian", "start_char_pos": 59, "end_char_pos": 206}, {"type": "R", "before": "FPOE first vocalized strong support for strict lockdown measures, but made a corona populist turn at the end of the first wave of infections. Using panel regression analysis,", "after": "party (FPOE),", "start_char_pos": 218, "end_char_pos": 392}, {"type": "R", "before": "the vote share of the FPOE at the last national parliamentary elections is a strong predictor for the number of COVID-19", "after": "Covid-19", "start_char_pos": 405, "end_char_pos": 525}, {"type": "R", "before": "after the FPOE switched their policy stance, while", "after": "are significantly positively correlated with support for the FPOE only after the turn using panel regressions. Paradoxically,", "start_char_pos": 544, "end_char_pos": 594}, {"type": "D", "before": "correlation before the policy switch. Interestingly, I do not find a", "after": null, "start_char_pos": 607, "end_char_pos": 675}, {"type": "R", "before": "between the FPOE vote share and the", "after": "with the", "start_char_pos": 714, "end_char_pos": 749}, {"type": "R", "before": ". To explore this hypothesis , I", "after": ", which causes a higher dark figure in FPOE strongholds. I find empirical support for this hypothesis in individual-level data from a Covid-19 prevalence study showing a much higher share of (undetected) cases among \"corona skeptics\". I finally", "start_char_pos": 860, "end_char_pos": 892}, {"type": "A", "before": null, "after": "heterogeneous mixing of", "start_char_pos": 967, "end_char_pos": 967}, {"type": "R", "before": ": the majority and the corona sceptics, where the latter are less inclined to get tested and engage in social distancing. Such a", "after": "with behavioral differences and explore its partly non-trivial properties using thousands of numerical simulations. This", "start_char_pos": 989, "end_char_pos": 1117}, {"type": "R", "before": "mixing is sufficiently homophilic", "after": "the behavioral differences between the two groups are sufficiently different", "start_char_pos": 1162, "end_char_pos": 1195}, {"type": "R", "before": "sceptics", "after": "skeptics", "start_char_pos": 1233, "end_char_pos": 1241}, {"type": "D", "before": ". I finally discuss the partly non-trivial implications of the interplay between group sizes, behavioral differences and the degree of homophily on public health outcomes within the theoretical model", "after": null, "start_char_pos": 1341, "end_char_pos": 1540}], "sents_char_pos": [0, 202, 359, 644, 780, 861, 1110, 1342]}
+{"doc_id": "2012.15688", "revision_depth": "1", "before_revision": "Transformers are not suited for processing long document input due to its quadratically increasing memory and time consumption. Simply truncating a long document or applying the sparse attention mechanism will incur the context fragmentation problem or inferior modeling capability with comparable model size . In this paper, we propose ERNIE-DOC , a document-level language pretraining model based on Recurrence Transformers. Two well-designed techniques, namely the retrospective feed mechanism and the enhanced recurrence mechanism enable ERNIE-DOC with much longer effective context length to capture the contextual information of a whole document. We pretrain ERNIE-DOC to explicitly learn the relationship among segments with an additional document-aware segment reordering objective. Various experiments on both English and Chinese document-level tasks are conducted. ERNIE-DOC achieves SOTA language modeling result of 16.8 ppl on WikiText-103 and outperforms competitive pretraining models on most language understanding tasks such as text classification , question answeringby a large margin .", "after_revision": "Transformers are not suited for processing long documents, due to their quadratically increasing memory and time consumption. Simply truncating a long document or applying the sparse attention mechanism will incur the context fragmentation problem or lead to an inferior modeling capability against comparable model sizes . In this paper, we propose ERNIE-Doc , a document-level language pretraining model based on Recurrence Transformers. Two well-designed techniques, namely the retrospective feed mechanism and the enhanced recurrence mechanism , enable ERNIE-Doc, which has a much longer effective context length , to capture the contextual information of a complete document. We pretrain ERNIE-Doc to explicitly learn the relationships among segments with an additional document-aware segment-reordering objective. Various experiments were conducted on both English and Chinese document-level tasks . ERNIE-Doc improved the state-of-the-art language modeling result of perplexity to 16.8 on WikiText-103 . Moreover, it outperformed competitive pretraining models by a large margin on most language understanding tasks , such as text classification and question answering .", "edit_actions": [{"type": "R", "before": "document input due to its", "after": "documents, due to their", "start_char_pos": 48, "end_char_pos": 73}, {"type": "A", "before": null, "after": "lead to an", "start_char_pos": 253, "end_char_pos": 253}, {"type": "R", "before": "with comparable model size", "after": "against comparable model sizes", "start_char_pos": 283, "end_char_pos": 309}, {"type": "R", "before": "ERNIE-DOC", "after": "ERNIE-Doc", "start_char_pos": 338, "end_char_pos": 347}, {"type": "R", "before": "enable ERNIE-DOC with", "after": ", enable ERNIE-Doc, which has a", "start_char_pos": 536, "end_char_pos": 557}, {"type": "A", "before": null, "after": ",", "start_char_pos": 595, "end_char_pos": 595}, {"type": "R", "before": "whole", "after": "complete", "start_char_pos": 639, "end_char_pos": 644}, {"type": "R", "before": "ERNIE-DOC", "after": "ERNIE-Doc", "start_char_pos": 667, "end_char_pos": 676}, {"type": "R", "before": "relationship", "after": "relationships", "start_char_pos": 701, "end_char_pos": 713}, {"type": "R", "before": "segment reordering", "after": "segment-reordering", "start_char_pos": 763, "end_char_pos": 781}, {"type": "A", "before": null, "after": "were conducted", "start_char_pos": 813, "end_char_pos": 813}, {"type": "R", "before": "are conducted. ERNIE-DOC achieves SOTA", "after": ". ERNIE-Doc improved the state-of-the-art", "start_char_pos": 863, "end_char_pos": 901}, {"type": "A", "before": null, "after": "perplexity to", "start_char_pos": 930, "end_char_pos": 930}, {"type": "D", "before": "ppl", "after": null, "start_char_pos": 936, "end_char_pos": 939}, {"type": "R", "before": "and outperforms", "after": ". Moreover, it outperformed", "start_char_pos": 956, "end_char_pos": 971}, {"type": "A", "before": null, "after": "by a large margin", "start_char_pos": 1003, "end_char_pos": 1003}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1041, "end_char_pos": 1041}, {"type": "R", "before": ", question answeringby a large margin", "after": "and question answering", "start_char_pos": 1070, "end_char_pos": 1107}], "sents_char_pos": [0, 127, 311, 427, 654, 792, 877]}
+{"doc_id": "2012.15815", "revision_depth": "2", "before_revision": "Precise motion planning and control require accurate models which are often difficult, expensive, or time-consuming to obtain. Online model learning is an attractive approach that can handle model variations while achieving the desired level of performance. However, most model learning methods developed within adaptive nonlinear control are limited to certain types of uncertainties, called matched uncertainties . This work presents an adaptive control framework for nonlinear systems with unmatched uncertainties that addresses several of the limitations of existing methods through two key innovations. The first is leveraging contraction theory and a new type of contraction metric that , when coupled with an adaptation law, is able to track feasible trajectories generated by an adapting reference model. The second is a modulation of the learning rate so the closed-loop system remains stable during learning transients. The proposed approach is more general than existing methods as it is able to handle unmatched uncertainties while only requiring the system be nominally contracting in closed-loop. Additionally, it can be used with learned feedback policies that are known to be contracting in some metric , facilitating transfer learning and bridging the sim2real gap. Simulation results demonstrate the effectiveness of the method.", "after_revision": "High-performance feedback control requires an accurate model of the underlying dynamical system which is often difficult, expensive, or time-consuming to obtain. Online model learning is an attractive approach that can handle model variations while achieving the desired level of performance. However, most model learning methods developed within adaptive nonlinear control are limited to certain types of uncertainties, called matched uncertainties , because the certainty equivalency principle can be employed in the design phase . This work develops a universal adaptive control framework that extends the certainty equivalence principle to nonlinear systems with unmatched uncertainties through two key innovations. The first is introducing parameter-dependent storage functions that guarantee closed-loop tracking of a desired trajectory generated by an adapting reference model. The second is modulating the learning rate so the closed-loop system remains stable during the learning transients. The analysis is first presented under the lens of contraction theory, and then expanded to general Lyapunov functions which can be synthesized via feedback linearization, backstepping, or optimization-based techniques. The proposed approach is more general than existing methods as the uncertainties can be unmatched and the system only needs to be stabilizable. The developed algorithm can be combined with learned feedback policies , facilitating transfer learning and bridging the sim-to-real gap. Simulation results showcase the method", "edit_actions": [{"type": "R", "before": "Precise motion planning and control require accurate models which are", "after": "High-performance feedback control requires an accurate model of the underlying dynamical system which is", "start_char_pos": 0, "end_char_pos": 69}, {"type": "A", "before": null, "after": ", because the certainty equivalency principle can be employed in the design phase", "start_char_pos": 415, "end_char_pos": 415}, {"type": "R", "before": "presents an", "after": "develops a universal", "start_char_pos": 428, "end_char_pos": 439}, {"type": "R", "before": "for", "after": "that extends the certainty equivalence principle to", "start_char_pos": 467, "end_char_pos": 470}, {"type": "D", "before": "that addresses several of the limitations of existing methods", "after": null, "start_char_pos": 518, "end_char_pos": 579}, {"type": "R", "before": "leveraging contraction theory and a new type of contraction metric that , when coupled with an adaptation law, is able to track feasible trajectories", "after": "introducing parameter-dependent storage functions that guarantee closed-loop tracking of a desired trajectory", "start_char_pos": 622, "end_char_pos": 771}, {"type": "R", "before": "a modulation of", "after": "modulating", "start_char_pos": 828, "end_char_pos": 843}, {"type": "A", "before": null, "after": "the", "start_char_pos": 910, "end_char_pos": 910}, {"type": "A", "before": null, "after": "analysis is first presented under the lens of contraction theory, and then expanded to general Lyapunov functions which can be synthesized via feedback linearization, backstepping, or optimization-based techniques. The", "start_char_pos": 936, "end_char_pos": 936}, {"type": "R", "before": "it is able to handle unmatched uncertainties while only requiring the system be nominally contracting in closed-loop. Additionally, it can be used", "after": "the uncertainties can be unmatched and the system only needs to be stabilizable. The developed algorithm can be combined", "start_char_pos": 996, "end_char_pos": 1142}, {"type": "D", "before": "that are known to be contracting in some metric", "after": null, "start_char_pos": 1174, "end_char_pos": 1221}, {"type": "R", "before": "sim2real", "after": "sim-to-real", "start_char_pos": 1272, "end_char_pos": 1280}, {"type": "R", "before": "demonstrate the effectiveness of the method.", "after": "showcase the method", "start_char_pos": 1305, "end_char_pos": 1349}], "sents_char_pos": [0, 126, 257, 417, 608, 813, 931, 1113, 1285]}
+{"doc_id": "2101.01321", "revision_depth": "1", "before_revision": "Transformer based models, like BERT and RoBERTa, have achieved state-of-the-art results in many Natural Language Processing tasks. However, their memory footprint, inference latency, and power consumption are prohibitive for many edgeprocessors, and it has been a challenge to deploy these models for edge applications and devices that have resource constraints . While quantization can be a viable solution to this, previous work on quantizing Transformer based models uses floating-point arithmetic during inference, thus limiting model deployment on many edge processors. In this work, we propose a novel integer-only quantization scheme for Transformer based models that quantizes the entire inference process. In particular, we demonstrate how to approximate nonlinear operationsin Transformer architectures , e.g., GELU, Softmax, and Layer Normalization, with lightweight integer computations. We use those approximations in our method, I-BERT , with an end-to-end integer-only inference, and without any floating point calculation. We test our approach on GLUE downstream tasks using RoBERTa-Base and RoBERTa-Large. For both cases, with an 8-bit integer-only quantization scheme, I-BERT achieves similar accuracy as compared to the full-precision baseline .", "after_revision": "Transformer based models, like BERT and RoBERTa, have achieved state-of-the-art results in many Natural Language Processing tasks. However, their memory footprint, inference latency, and power consumption are prohibitive for efficient inference at the edge, and even at the data center . While quantization can be a viable solution for this, previous work on quantizing Transformer based models use floating-point arithmetic during inference, which cannot efficiently utilize integer-only logical units such as the recent Turing Tensor Cores, or traditional integer-only ARM processors. In this work, we propose I-BERT, a novel quantization scheme for Transformer based models that quantizes the entire inference with integer-only arithmetic. Based on lightweight integer-only approximation methods for nonlinear operations , e.g., GELU, Softmax, and Layer Normalization, I-BERT performs an end-to-end integer-only BERT inference without any floating point calculation. We evaluate our approach on GLUE downstream tasks using RoBERTa-Base /Large. We show that for both cases, I-BERT achieves similar (and slightly higher) accuracy as compared to the full-precision baseline . Furthermore, our preliminary implementation of I-BERT shows a speedup of 2.4 - 4.0x for INT8 inference on a T4 GPU system as compared to FP32 inference. The framework has been developed in PyTorch and has been open-sourced .", "edit_actions": [{"type": "R", "before": "many edgeprocessors, and it has been a challenge to deploy these models for edge applications and devices that have resource constraints", "after": "efficient inference at the edge, and even at the data center", "start_char_pos": 225, "end_char_pos": 361}, {"type": "R", "before": "to", "after": "for", "start_char_pos": 408, "end_char_pos": 410}, {"type": "R", "before": "uses", "after": "use", "start_char_pos": 470, "end_char_pos": 474}, {"type": "R", "before": "thus limiting model deployment on many edge", "after": "which cannot efficiently utilize integer-only logical units such as the recent Turing Tensor Cores, or traditional integer-only ARM", "start_char_pos": 519, "end_char_pos": 562}, {"type": "R", "before": "a novel integer-only", "after": "I-BERT, a novel", "start_char_pos": 600, "end_char_pos": 620}, {"type": "R", "before": "process. In particular, we demonstrate how to approximate nonlinear operationsin Transformer architectures", "after": "with integer-only arithmetic. Based on lightweight integer-only approximation methods for nonlinear operations", "start_char_pos": 706, "end_char_pos": 812}, {"type": "D", "before": "with lightweight integer computations. We use those approximations in our method,", "after": null, "start_char_pos": 861, "end_char_pos": 942}, {"type": "R", "before": ", with", "after": "performs", "start_char_pos": 950, "end_char_pos": 956}, {"type": "R", "before": "inference, and", "after": "BERT inference", "start_char_pos": 984, "end_char_pos": 998}, {"type": "R", "before": "test", "after": "evaluate", "start_char_pos": 1042, "end_char_pos": 1046}, {"type": "R", "before": "and RoBERTa-Large. For", "after": "/Large. We show that for", "start_char_pos": 1104, "end_char_pos": 1126}, {"type": "D", "before": "with an 8-bit integer-only quantization scheme,", "after": null, "start_char_pos": 1139, "end_char_pos": 1186}, {"type": "A", "before": null, "after": "(and slightly higher)", "start_char_pos": 1211, "end_char_pos": 1211}, {"type": "A", "before": null, "after": ". Furthermore, our preliminary implementation of I-BERT shows a speedup of 2.4 - 4.0x for INT8 inference on a T4 GPU system as compared to FP32 inference. The framework has been developed in PyTorch and has been open-sourced", "start_char_pos": 1264, "end_char_pos": 1264}], "sents_char_pos": [0, 130, 363, 574, 714, 899, 1038, 1122]}
+{"doc_id": "2101.01364", "revision_depth": "1", "before_revision": "As deep learning continues to dominate all state-of-the-art computer vision tasks, it is increasingly becoming the essential building blocks for robotic perception. As a result, the research questions concerning the safety and reliability of learning-based perception are gaining increased importance. Although there is an established field that studies safety certification and convergence guarantee of complex software systems for decision-making during design-time , the uncertainty in run-time conditions and the unknown future deployment environments of autonomous systems as well as the complexity of learning-based perception systems make the generalisation of the verification results from design-time to run-time problematic. More attention is starting to shift towards run-time monitoring of performance and reliability of perception systems with several trends emerging in the literature in the face of such a challenge . This paper attempts to identify these trends and summarise the various approaches on the topic.", "after_revision": "As deep learning continues to dominate all state-of-the-art computer vision tasks, it is increasingly becoming an essential building block for robotic perception. This raises important questions concerning the safety and reliability of learning-based perception systems. There is an established field that studies safety certification and convergence guarantees of complex software systems at design-time . However, the unknown future deployment environments of an autonomous system and the complexity of learning-based perception make the generalization of design-time verification to run-time problematic. In the face of this challenge, more attention is starting to focus on run-time monitoring of performance and reliability of perception systems with several trends emerging in the literature . This paper attempts to identify these trends and summarise the various approaches to the topic.", "edit_actions": [{"type": "R", "before": "the essential building blocks", "after": "an essential building block", "start_char_pos": 111, "end_char_pos": 140}, {"type": "R", "before": "As a result, the research", "after": "This raises important", "start_char_pos": 165, "end_char_pos": 190}, {"type": "R", "before": "are gaining increased importance. Although there", "after": "systems. There", "start_char_pos": 268, "end_char_pos": 316}, {"type": "R", "before": "guarantee", "after": "guarantees", "start_char_pos": 391, "end_char_pos": 400}, {"type": "R", "before": "for decision-making during", "after": "at", "start_char_pos": 429, "end_char_pos": 455}, {"type": "R", "before": ", the uncertainty in run-time conditions and the", "after": ". However, the", "start_char_pos": 468, "end_char_pos": 516}, {"type": "R", "before": "autonomous systems as well as", "after": "an autonomous system and", "start_char_pos": 559, "end_char_pos": 588}, {"type": "R", "before": "systems make the generalisation of the verification results from", "after": "make the generalization of", "start_char_pos": 633, "end_char_pos": 697}, {"type": "A", "before": null, "after": "verification", "start_char_pos": 710, "end_char_pos": 710}, {"type": "R", "before": "More", "after": "In the face of this challenge, more", "start_char_pos": 736, "end_char_pos": 740}, {"type": "R", "before": "shift towards", "after": "focus on", "start_char_pos": 766, "end_char_pos": 779}, {"type": "D", "before": "in the face of such a challenge", "after": null, "start_char_pos": 900, "end_char_pos": 931}, {"type": "R", "before": "on", "after": "to", "start_char_pos": 1016, "end_char_pos": 1018}], "sents_char_pos": [0, 164, 301, 735, 933]}
+{"doc_id": "2101.01679", "revision_depth": "1", "before_revision": "Governments require regional or national lockdowns in order to prevent the spread of COVID-19, which causes large economic stagnation in wide areas because the declines of the lockdowns diffuse to other regions through supply chains. This study examines how governments mitigate the economic losses when they are obliged to implement lockdowns , using supply-chain data for 1.6 million firms in Japan. We find that the coordinated, i.e., simultaneous, lockdowns have less GDP losses than the incoordinated lockdownsthrough the test of all combinations of two-region lockdowns . Furthermore, we test practical scenarios in which 47 regions are imposed lockdowns in three months and find that if nation-wide lockdowns are coordinated , the GDP losses are less than the uncoordinatedlockdowns .", "after_revision": "In order to prevent the spread of COVID-19, governments have often required regional or national lockdowns, which have caused extensive economic stagnation over broad areas as the shock of the lockdowns has diffused to other regions through supply chains. Using supply-chain data for 1.6 million firms in Japan, this study examines how governments can mitigate these economic losses when they are obliged to implement lockdowns . Through tests of all combinations of two-region lockdowns, we find that coordinated, i.e., simultaneous, lockdowns yield smaller GDP losses than uncoordinated lockdowns . Furthermore, we test practical scenarios in which Japan's 47 regions impose lockdowns over three months and find that GDP losses are lower if nationwide lockdowns are coordinated than if they are uncoordinated .", "edit_actions": [{"type": "R", "before": "Governments require regional or national lockdowns in", "after": "In", "start_char_pos": 0, "end_char_pos": 53}, {"type": "R", "before": "which causes large economic stagnation in wide areas because the declines", "after": "governments have often required regional or national lockdowns, which have caused extensive economic stagnation over broad areas as the shock", "start_char_pos": 95, "end_char_pos": 168}, {"type": "R", "before": "diffuse", "after": "has diffused", "start_char_pos": 186, "end_char_pos": 193}, {"type": "R", "before": "This", "after": "Using supply-chain data for 1.6 million firms in Japan, this", "start_char_pos": 234, "end_char_pos": 238}, {"type": "R", "before": "mitigate the", "after": "can mitigate these", "start_char_pos": 270, "end_char_pos": 282}, {"type": "R", "before": ", using supply-chain data for 1.6 million firms in Japan. We find that the", "after": ". Through tests of all combinations of two-region lockdowns, we find that", "start_char_pos": 344, "end_char_pos": 418}, {"type": "R", "before": "have less", "after": "yield smaller", "start_char_pos": 462, "end_char_pos": 471}, {"type": "R", "before": "the incoordinated lockdownsthrough the test of all combinations of two-region lockdowns", "after": "uncoordinated lockdowns", "start_char_pos": 488, "end_char_pos": 575}, {"type": "A", "before": null, "after": "Japan's", "start_char_pos": 628, "end_char_pos": 628}, {"type": "R", "before": "are imposed lockdowns in", "after": "impose lockdowns over", "start_char_pos": 640, "end_char_pos": 664}, {"type": "R", "before": "if nation-wide", "after": "GDP losses are lower if nationwide", "start_char_pos": 692, "end_char_pos": 706}, {"type": "R", "before": ", the GDP losses are less than the uncoordinatedlockdowns", "after": "than if they are uncoordinated", "start_char_pos": 733, "end_char_pos": 790}], "sents_char_pos": [0, 233, 401, 577]}
+{"doc_id": "2101.02588", "revision_depth": "1", "before_revision": "Understanding the dynamics of patents and trademarks is a key aspect of tracking innovative progress/ egress. This paper empirically explores the chronological Hurst exponent (CHE) , an approach that calculates the Hurst exponent over an increasing duration of time windows to quantify long-memory dynamics , in the monthly numbers of United States patent and trademark applications from 1977 to 2016. The CHE is found to increase in a clear 3-period S-curve pattern, achieving persistence ( Period 3: H~1) from non-persistence ( Period 1: H~0.5). For patents, Period 2, the time-varying period, occurred over a span of 10 years (1980-1990), while it was much sharper (3 years) for trademarks (1977-1980). Based on these data, it is hypothesized that the rapid augmentation in exogenous variables (such as increasing R&D expenditure or specific policy initiatives (viz. , Bayh Dole, Stevenson-Wydler) are the key impetuses behind the increase of persistencyduring Period 2. Post-1990s exogenic variables led to the maintenance of the high degree and consistency of the persistency metric. These findings suggest investigators should consider latent persistency when using these data and the CHE may be an important tool to investigate the impact of substantive exogenous variables on growth dynamics.", "after_revision": "Objective: An understanding of when one or more external factors may influence the evolution of innovation tracking indices (such as US patent and trademark applications (PTA)) is an important aspect of examining economic progress/ regress. Using exploratory statistics, the analysis uses a novel tool to leverage the long-range dependency (LRD) intrinsic to PTA to resolve when such factor(s) may have caused significant disruptions in the evolution of the indices, and thus give insight into substantive economic growth dynamics. Approach: This paper explores the use of the Chronological Hurst Exponent (CHE) to explore the LRD using overlapping time windows to quantify long-memory dynamics in the monthly PTA time-series spanning 1977 to 2016. Results/Discussion: The CHE is found to increase in a clear S-curve pattern, achieving persistence ( H~1) from non-persistence ( H~0.5). For patents, the inflection occurred over a span of 10 years (1980-1990), while it was much sharper (3 years) for trademarks (1977-1980). Conclusions/Originality/Value: This analysis suggests (in part) that the rapid augmentation in R&D expenditure and the introduction of the various patent directed policy acts (e.g., Bayh-Dole , Stevenson-Wydler) are the key impetuses behind persistency, latent in PTA. The post-1990s exogenic factors seem to be simply maintaining the high degree and consistency of the persistency metric. These findings suggest investigators should consider latent persistency when using these data and the CHE may be an important tool to investigate the impact of substantive exogenous variables on growth dynamics.", "edit_actions": [{"type": "R", "before": "Understanding the dynamics of patents and trademarks is a key aspect of tracking innovative", "after": "Objective: An understanding of when one or more external factors may influence the evolution of innovation tracking indices (such as US patent and trademark applications (PTA)) is an important aspect of examining economic", "start_char_pos": 0, "end_char_pos": 91}, {"type": "R", "before": "egress. This paper empirically explores the chronological Hurst exponent", "after": "regress. Using exploratory statistics, the analysis uses a novel tool to leverage the long-range dependency (LRD) intrinsic to PTA to resolve when such factor(s) may have caused significant disruptions in the evolution of the indices, and thus give insight into substantive economic growth dynamics. Approach: This paper explores the use of the Chronological Hurst Exponent", "start_char_pos": 102, "end_char_pos": 174}, {"type": "R", "before": ", an approach that calculates the Hurst exponent over an increasing duration of", "after": "to explore the LRD using overlapping", "start_char_pos": 181, "end_char_pos": 260}, {"type": "D", "before": ",", "after": null, "start_char_pos": 307, "end_char_pos": 308}, {"type": "R", "before": "numbers of United States patent and trademark applications from", "after": "PTA time-series spanning", "start_char_pos": 324, "end_char_pos": 387}, {"type": "A", "before": null, "after": "Results/Discussion:", "start_char_pos": 402, "end_char_pos": 402}, {"type": "D", "before": "3-period", "after": null, "start_char_pos": 443, "end_char_pos": 451}, {"type": "D", "before": "Period 3:", "after": null, "start_char_pos": 493, "end_char_pos": 502}, {"type": "D", "before": "Period 1:", "after": null, "start_char_pos": 531, "end_char_pos": 540}, {"type": "R", "before": "Period 2, the time-varying period,", "after": "the inflection", "start_char_pos": 562, "end_char_pos": 596}, {"type": "R", "before": "Based on these data, it is hypothesized", "after": "Conclusions/Originality/Value: This analysis suggests (in part)", "start_char_pos": 707, "end_char_pos": 746}, {"type": "D", "before": "exogenous variables (such as increasing", "after": null, "start_char_pos": 778, "end_char_pos": 817}, {"type": "R", "before": "or specific policy initiatives (viz.", "after": "and the introduction of the various patent directed policy acts (e.g., Bayh-Dole", "start_char_pos": 834, "end_char_pos": 870}, {"type": "D", "before": "Bayh Dole,", "after": null, "start_char_pos": 873, "end_char_pos": 883}, {"type": "R", "before": "the increase of persistencyduring Period 2. Post-1990s exogenic variables led to the maintenance of", "after": "persistency, latent in PTA. The post-1990s exogenic factors seem to be simply maintaining", "start_char_pos": 931, "end_char_pos": 1030}], "sents_char_pos": [0, 109, 401, 548, 706, 1089]}
+{"doc_id": "2101.03820", "revision_depth": "1", "before_revision": "Parler is as an alternative social network promoting itself as a service that allows its users to \" Speak freely and express yourself openly, without fear of being deplatformed for your views.\" Because of this promise, the platform become popular among users who were suspended on mainstream social networks for violating their terms of service, as well as those fearing censorship. In particular, the service was endorsed by several conservative public figures, encouraging people to migrate there from traditional social networks. After the events of January 6 2021, Parler has been progressively deplatformed, with its app being removed from popular mobile stores and the entire website being taken down by their hosting provider. In this paper , we provide the first data-driven characterization of Parler. We collected 120M posts from 2.1M users posted between 2018 and 2020 as well as metadata from 12M user profiles. We find that the platform has witnessed large influxes of new users after being endorsed by popular figures, as well as a reaction to the 2020 US Presidential Election. We also find that discussion on the platform is dominated by conservative topics, President Trump, as well as conspiracy theories like QAnon.", "after_revision": "Parler is as an \"alternative\" social network promoting itself as a service that allows to \" speak freely and express yourself openly, without fear of being deplatformed for your views.\" Because of this promise, the platform become popular among users who were suspended on mainstream social networks for violating their terms of service, as well as those fearing censorship. In particular, the service was endorsed by several conservative public figures, encouraging people to migrate from traditional social networks. After the storming of the US Capitol on January 6 , 2021, Parler has been progressively deplatformed, as its app was removed from Apple/Google Play stores and the website taken down by the hosting provider. This paper presents a dataset of 183M Parler posts made by 4M users between August 2018 and January 2021, as well as metadata from 13.25M user profiles. We also present a basic characterization of the dataset, which shows that the platform has witnessed large influxes of new users after being endorsed by popular figures, as well as a reaction to the 2020 US Presidential Election. We also show that discussion on the platform is dominated by conservative topics, President Trump, as well as conspiracy theories like QAnon.", "edit_actions": [{"type": "R", "before": "alternative", "after": "\"alternative\"", "start_char_pos": 16, "end_char_pos": 27}, {"type": "D", "before": "its users", "after": null, "start_char_pos": 85, "end_char_pos": 94}, {"type": "R", "before": "Speak", "after": "speak", "start_char_pos": 100, "end_char_pos": 105}, {"type": "D", "before": "there", "after": null, "start_char_pos": 493, "end_char_pos": 498}, {"type": "R", "before": "events of", "after": "storming of the US Capitol on", "start_char_pos": 543, "end_char_pos": 552}, {"type": "A", "before": null, "after": ",", "start_char_pos": 563, "end_char_pos": 563}, {"type": "R", "before": "with its app being removed from popular mobile", "after": "as its app was removed from Apple/Google Play", "start_char_pos": 614, "end_char_pos": 660}, {"type": "R", "before": "entire website being", "after": "website", "start_char_pos": 676, "end_char_pos": 696}, {"type": "R", "before": "their", "after": "the", "start_char_pos": 711, "end_char_pos": 716}, {"type": "R", "before": "In this paper , we provide the first data-driven characterization of Parler. We collected 120M posts from 2.1M users posted between", "after": "This paper presents a dataset of 183M Parler posts made by 4M users between August", "start_char_pos": 735, "end_char_pos": 866}, {"type": "R", "before": "2020", "after": "January 2021,", "start_char_pos": 876, "end_char_pos": 880}, {"type": "R", "before": "12M", "after": "13.25M", "start_char_pos": 906, "end_char_pos": 909}, {"type": "R", "before": "find", "after": "also present a basic characterization of the dataset, which shows", "start_char_pos": 928, "end_char_pos": 932}, {"type": "R", "before": "find", "after": "show", "start_char_pos": 1102, "end_char_pos": 1106}], "sents_char_pos": [0, 193, 382, 532, 734, 811, 924, 1093]}
+{"doc_id": "2101.03834", "revision_depth": "1", "before_revision": "Imagine an autonomous robot vehicle driving in dense, possibly unregulated urban traffic. To contend with an uncertain, interactive environment with many traffic participants, the robot vehicle has to perform long-term planning in order to drive effectively and approach human-level performance. Planning explicitly over a long time horizon, however, incurs prohibitive computational cost and is impractical under real-time constraints. To achieve real-time performance for large-scale planning, this paper introduces Learning from Tree Search for Driving (LeTS-Drive), which integrates planning and learning in a close loop. LeTS-Drive learns a driving policy from a planner based on sparsely-sampled tree search. It then guides online planning using this learned policy for real-time vehicle control. These two steps are repeated to form a close loop so that the planner and the learner inform each other and both improve in synchrony. The entire algorithm evolves on its own in a self-supervised manner, without explicit human efforts on data labeling. We applied LeTS-Drive to autonomous driving in crowded urban environments in simulation. Experimental results clearly show that LeTS-Drive outperforms either planning or learning alone, as well as open-loop integration of planning and learning.", "after_revision": "Imagine an autonomous robot vehicle driving in dense, possibly unregulated urban traffic. To contend with an uncertain, interactive environment with heterogeneous traffic of cars, motorcycles, buses, ..., the robot vehicle has to plan in both short and long terms in order to drive effectively and approach human-level performance. Planning explicitly over a long time horizon, however, incurs prohibitive computational cost and is impractical under real-time constraints. To achieve real-time performance for large-scale planning, this work introduces Learning from Tree Search for Driving (LeTS-Drive), which integrates planning and learning in a closed loop. LeTS-Drive learns a driving policy from a planner , which is based on sparsely sampled tree search. The learned policy in turn guides online planning for real-time vehicle control. These two steps are repeated to form a closed loop so that the planner and the learner inform each other and improve in synchrony. The entire system can learn on its own in a self-supervised manner, without human effort on explicit data labeling. We applied LeTSDrive to autonomous driving in crowded urban environments in simulation. Experimental results show clearly that LeTS-Drive outperforms either planning or learning alone, as well as open-loop integration of planning and learning.", "edit_actions": [{"type": "R", "before": "many traffic participants,", "after": "heterogeneous traffic of cars, motorcycles, buses, ...,", "start_char_pos": 149, "end_char_pos": 175}, {"type": "R", "before": "perform long-term planning in", "after": "plan in both short and long terms in", "start_char_pos": 201, "end_char_pos": 230}, {"type": "R", "before": "paper", "after": "work", "start_char_pos": 501, "end_char_pos": 506}, {"type": "R", "before": "close", "after": "closed", "start_char_pos": 614, "end_char_pos": 619}, {"type": "R", "before": "based on sparsely-sampled", "after": ", which is based on sparsely sampled", "start_char_pos": 676, "end_char_pos": 701}, {"type": "R", "before": "It then", "after": "The learned policy in turn", "start_char_pos": 715, "end_char_pos": 722}, {"type": "D", "before": "using this learned policy", "after": null, "start_char_pos": 746, "end_char_pos": 771}, {"type": "R", "before": "close", "after": "closed", "start_char_pos": 842, "end_char_pos": 847}, {"type": "D", "before": "both", "after": null, "start_char_pos": 911, "end_char_pos": 915}, {"type": "R", "before": "algorithm evolves", "after": "system can learn", "start_char_pos": 949, "end_char_pos": 966}, {"type": "R", "before": "explicit human efforts on", "after": "human effort on explicit", "start_char_pos": 1015, "end_char_pos": 1040}, {"type": "R", "before": "LeTS-Drive", "after": "LeTSDrive", "start_char_pos": 1067, "end_char_pos": 1077}, {"type": "R", "before": "clearly show", "after": "show clearly", "start_char_pos": 1166, "end_char_pos": 1178}], "sents_char_pos": [0, 89, 295, 436, 625, 714, 802, 937, 1055, 1144]}
+{"doc_id": "2101.07513", "revision_depth": "1", "before_revision": "The automatic shape control of deformable objects is an open (and currently hot) manipulation problem that is challenging due to the object's high-dimensional shape information and its complex physical properties. As a feasible solution to these issues, in this paper, we propose a new methodology to automatically deform elastic rods into 2D desired shapes . For that, we present an efficient vision-based controller that uses a deep autoencoder network to compute a compact representation of the object's infinite dimensional shape. To deal with the (typically unknown) mechanical properties of the object, we use an online algorithm that approximates the sensorimotor mapping between the robot's configuration and the object's shape features . Our new approach has the capability to compute the rod's centerline from raw visual data in real-time ; This is done by introducing an adaptive algorithm based on a URLanizing network. The effectiveness of the proposed method is thoroughly validated with simulations and experiments.", "after_revision": "The automatic shape control of deformable objects is a challenging (and currently hot) manipulation problem due to their high-dimensional geometric features and complex physical properties. In this study, a new methodology to manipulate elastic rods automatically into 2D desired shapes is presented. An efficient vision-based controller that uses a deep autoencoder network is designed to compute a compact representation of the object's infinite-dimensional shape. An online algorithm that approximates the sensorimotor mapping between the robot's configuration and the object's shape features is used to deal with the latter's (typically unknown) mechanical properties. The proposed approach computes the rod's centerline from raw visual data in real-time by introducing an adaptive algorithm on the basis of a URLanizing network. Its effectiveness is thoroughly validated with simulations and experiments.", "edit_actions": [{"type": "R", "before": "an open", "after": "a challenging", "start_char_pos": 53, "end_char_pos": 60}, {"type": "R", "before": "that is challenging due to the object's", "after": "due to their", "start_char_pos": 102, "end_char_pos": 141}, {"type": "R", "before": "shape information and its", "after": "geometric features and", "start_char_pos": 159, "end_char_pos": 184}, {"type": "R", "before": "As a feasible solution to these issues, in this paper, we propose", "after": "In this study,", "start_char_pos": 214, "end_char_pos": 279}, {"type": "R", "before": "automatically deform elastic rods", "after": "manipulate elastic rods automatically", "start_char_pos": 301, "end_char_pos": 334}, {"type": "R", "before": ". For that, we present an", "after": "is presented. An", "start_char_pos": 358, "end_char_pos": 383}, {"type": "A", "before": null, "after": "is designed", "start_char_pos": 455, "end_char_pos": 455}, {"type": "R", "before": "infinite dimensional shape. To deal with the (typically unknown) mechanical properties of the object, we use an", "after": "infinite-dimensional shape. An", "start_char_pos": 508, "end_char_pos": 619}, {"type": "R", "before": ". Our new approach has the capability to compute the", "after": "is used to deal with the latter's (typically unknown) mechanical properties. The proposed approach computes the", "start_char_pos": 746, "end_char_pos": 798}, {"type": "D", "before": "; This is done", "after": null, "start_char_pos": 850, "end_char_pos": 864}, {"type": "R", "before": "based on", "after": "on the basis of", "start_char_pos": 902, "end_char_pos": 910}, {"type": "R", "before": "The effectiveness of the proposed method", "after": "Its effectiveness", "start_char_pos": 933, "end_char_pos": 973}], "sents_char_pos": [0, 213, 359, 535, 747, 851, 932]}
+{"doc_id": "2101.08757", "revision_depth": "1", "before_revision": "We present an Expectation-Maximization (EM) Regularized Deep Learning (EMReDL) model for the weakly supervised tumor segmentation. The proposed framework was tailored to glioblastoma, a type of malignant tumor characterized by its diffuse infiltration into the surrounding brain tissue, which poses significant challenge to treatment target and tumor burden estimation based on conventional structural MRI. Although physiological MRI can provide more specific information regarding tumor infiltration, the relatively low resolution hinders a precise full annotation. This has motivated us to develop a weakly supervised deep learning solution that exploits the partial labelled tumor regions. EMReDL contains two components: a physiological prior prediction model and EM-regularized segmentation model. The physiological prior prediction model exploits the physiological MRI by training a classifier to generate a physiological prior map. This map was passed to the segmentation model for regularization using the EM algorithm. We evaluated the model on a glioblastoma dataset with the available pre-operative multiparametric MRI and recurrence MRI . EMReDL was shown to effectively segment the infiltrated tumor from the partially labelled region of potential infiltration. The segmented core and infiltrated tumor showed high consistency with the tumor burden labelled by experts. The performance comparison showed that EMReDL achieved higher accuracy than published state-of-the-art models. On MR spectroscopy, the segmented region showed more aggressive features than other partial labelled region. The proposed model can be generalized to other segmentation tasks with partial labels, with the CNN architecture flexible in the framework.", "after_revision": "We present an Expectation-Maximization (EM) Regularized Deep Learning (EMReDL) model for weakly supervised tumor segmentation. The proposed framework is tailored to glioblastoma, a type of malignant tumor characterized by its diffuse infiltration into the surrounding brain tissue, which poses significant challenge to treatment target and tumor burden estimation using conventional structural MRI. Although physiological MRI provides more specific information regarding tumor infiltration, the relatively low resolution hinders a precise full annotation. This has motivated us to develop a weakly supervised deep learning solution that exploits the partial labelled tumor regions. EMReDL contains two components: a physiological prior prediction model and EM-regularized segmentation model. The physiological prior prediction model exploits the physiological MRI by training a classifier to generate a physiological prior map. This map is passed to the segmentation model for regularization using the EM algorithm. We evaluated the model on a glioblastoma dataset with the pre-operative multiparametric and recurrence MRI available. EMReDL showed to effectively segment the infiltrated tumor from the partially labelled region of potential infiltration. The segmented core tumor and infiltrated tumor demonstrated high consistency with the tumor burden labelled by experts. The performance comparisons showed that EMReDL achieved higher accuracy than published state-of-the-art models. On MR spectroscopy, the segmented region displayed more aggressive features than other partial labelled region. The proposed model can be generalized to other segmentation tasks that rely on partial labels, with the CNN architecture flexible in the framework.", "edit_actions": [{"type": "D", "before": "the", "after": null, "start_char_pos": 89, "end_char_pos": 92}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 154, "end_char_pos": 157}, {"type": "R", "before": "based on", "after": "using", "start_char_pos": 369, "end_char_pos": 377}, {"type": "R", "before": "can provide", "after": "provides", "start_char_pos": 434, "end_char_pos": 445}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 948, "end_char_pos": 951}, {"type": "D", "before": "available", "after": null, "start_char_pos": 1086, "end_char_pos": 1095}, {"type": "D", "before": "MRI", "after": null, "start_char_pos": 1126, "end_char_pos": 1129}, {"type": "R", "before": ". EMReDL was shown", "after": "available. EMReDL showed", "start_char_pos": 1149, "end_char_pos": 1167}, {"type": "A", "before": null, "after": "tumor", "start_char_pos": 1294, "end_char_pos": 1294}, {"type": "R", "before": "showed", "after": "demonstrated", "start_char_pos": 1317, "end_char_pos": 1323}, {"type": "R", "before": "comparison", "after": "comparisons", "start_char_pos": 1400, "end_char_pos": 1410}, {"type": "R", "before": "showed", "after": "displayed", "start_char_pos": 1536, "end_char_pos": 1542}, {"type": "R", "before": "with", "after": "that rely on", "start_char_pos": 1670, "end_char_pos": 1674}], "sents_char_pos": [0, 130, 406, 566, 692, 802, 938, 1027, 1274, 1383, 1494, 1603]}
+{"doc_id": "2101.08765", "revision_depth": "1", "before_revision": "Differential abundance tests in the compositional data are essential and fundamental tasks in various biomedical applications, such as single-cell, bulk RNA-seq, and microbiome data analysis. Despite the recent developments in the fields, differential abundance analysis in the compositional data is still a complicated and unsolved statistical problem because of the compositional constraint and prevalent zero counts in the dataset. A new differential abundance test is introduced in this paper to address these challenges, referred to as the robust differential abundance (RDB) test . Compared with existing methods, the RDB test 1) is simple and computationally efficient, 2) is robust to prevalent zero counts in compositional datasets, 3) can take the data's compositional nature into account, and 4) has a theoretical guarantee to control false discoveries in a general setting. Furthermore, in the presence of observed covariates, the RDB test can work with the covariate balancing techniques to remove the potential confounding effects and draw reliable conclusions. To demonstrate its practical merits , we apply the new test to several numerical examples using both simulated and real datasets .", "after_revision": "Differential abundance tests in compositional data are essential and fundamental tasks in various biomedical applications, such as single-cell, bulk RNA-seq, and microbiome data analysis. However, despite the recent developments in these fields, differential abundance analysis in compositional data remains a complicated and unsolved statistical problem , because of the compositional constraint and prevalent zero counts in the dataset. This study introduces a new differential abundance test , the robust differential abundance (RDB) test , to address these challenges . Compared with existing methods, the RDB test 1) is simple and computationally efficient, 2) is robust to prevalent zero counts in compositional datasets, 3) can take the data's compositional nature into account, and 4) has a theoretical guarantee of controlling false discoveries in a general setting. Furthermore, in the presence of observed covariates, the RDB test can work with the covariate balancing techniques to remove the potential confounding effects and draw reliable conclusions. Finally , we apply the new test to several numerical examples using simulated and real datasets to demonstrate its practical merits .", "edit_actions": [{"type": "D", "before": "the", "after": null, "start_char_pos": 32, "end_char_pos": 35}, {"type": "R", "before": "Despite", "after": "However, despite", "start_char_pos": 192, "end_char_pos": 199}, {"type": "R", "before": "the", "after": "these", "start_char_pos": 227, "end_char_pos": 230}, {"type": "R", "before": "the compositional data is still", "after": "compositional data remains", "start_char_pos": 274, "end_char_pos": 305}, {"type": "A", "before": null, "after": ",", "start_char_pos": 353, "end_char_pos": 353}, {"type": "R", "before": "A", "after": "This study introduces a", "start_char_pos": 436, "end_char_pos": 437}, {"type": "R", "before": "is introduced in this paper to address these challenges, referred to as", "after": ",", "start_char_pos": 470, "end_char_pos": 541}, {"type": "A", "before": null, "after": ", to address these challenges", "start_char_pos": 587, "end_char_pos": 587}, {"type": "R", "before": "to control", "after": "of controlling", "start_char_pos": 837, "end_char_pos": 847}, {"type": "R", "before": "To demonstrate its practical merits", "after": "Finally", "start_char_pos": 1078, "end_char_pos": 1113}, {"type": "D", "before": "both", "after": null, "start_char_pos": 1174, "end_char_pos": 1178}, {"type": "A", "before": null, "after": "to demonstrate its practical merits", "start_char_pos": 1207, "end_char_pos": 1207}], "sents_char_pos": [0, 191, 435, 887, 1077]}
+{"doc_id": "2102.01540", "revision_depth": "1", "before_revision": "Finding a maximum independent set is a fundamental NP-hard problem . Given an unweighted graph, this problem asks for a maximum cardinality set of pairwise non-adjacent vertices. Some of the most successful algorithms for solving this problem use the branch-and-bound or branch-and-reduce paradigms. Results on branch-and-reduce algorithms were to a large part achieved by developing new, more practical reduction rules. However, other components that have been shown to have a significant impact on the performance of these algorithms have not received as much attention. One of these is the branching strategy, which determines what vertex is included or excluded in a potential solution. Even now, the most commonly used strategy selects vertices solely based on their degree and does not take into account other factors that contribute to the performance of the algorithm . In this work, we develop and evaluate several novel branching strategies for both branch-and-bound and branch-and-reduce algorithms. Our strategies are based on one of two approaches which are motivated by existing research . They either (1) aim to decompose the graph into two or more connected components which can then be solved independently, or (2) try to remove vertices that hinder the application of a reduction rule which can lead to smaller graphs. Our experimental evaluation on a large set of real-world instances indicates that our strategies are able to improve the performance of the state-of-the-art branch-and-reduce algorithm by Akiba and Iwata . To be more specific, we are able to compute a solution faster than the default branching strategy of selecting a vertex of highest degree on 90 \\% of all instances tested. Furthermore, our decomposition-based strategies are able to achieve a speedup of 90\\% on sparse networks ( 33\\% on all instances).", "after_revision": "Finding a maximum independent set is a fundamental NP-hard problem that is used in many real-world applications . Given an unweighted graph, this problem asks for a maximum cardinality set of pairwise non-adjacent vertices. Some of the most successful algorithms for this problem are based on the branch-and-bound or branch-and-reduce paradigms. In particular, branch-and-reduce algorithms , which combine branch-and-bound with reduction rules, achieved substantial results, solving many previously infeasible instances. These results were to a large part achieved by developing new, more practical reduction rules. However, other components that have been shown to have an impact on the performance of these algorithms have not received as much attention. One of these is the branching strategy, which determines what vertex is included or excluded in a potential solution. The most commonly used strategy selects vertices based on their degree and does not take into account other factors that contribute to the performance . In this work, we develop and evaluate several novel branching strategies for both branch-and-bound and branch-and-reduce algorithms. Our strategies are based on one of two approaches . They either (1) aim to decompose the graph into two or more connected components which can then be solved independently, or (2) try to remove vertices that hinder the application of a reduction rule . Our experiments on a large set of real-world instances indicate that our strategies are able to improve the performance of the state-of-the-art branch-and-reduce algorithms . To be more specific, our reduction-based packing branching rule is able to outperform the default branching strategy of selecting a vertex of highest degree on 65 \\% of all instances tested. Furthermore, our decomposition-based strategy based on edge cuts is able to achieve a speedup of 2.29 on sparse networks ( 1.22 on all instances).", "edit_actions": [{"type": "A", "before": null, "after": "that is used in many real-world applications", "start_char_pos": 67, "end_char_pos": 67}, {"type": "R", "before": "solving this problem use", "after": "this problem are based on", "start_char_pos": 223, "end_char_pos": 247}, {"type": "R", "before": "Results on", "after": "In particular,", "start_char_pos": 301, "end_char_pos": 311}, {"type": "A", "before": null, "after": ", which combine branch-and-bound with reduction rules, achieved substantial results, solving many previously infeasible instances. These results", "start_char_pos": 341, "end_char_pos": 341}, {"type": "R", "before": "a significant", "after": "an", "start_char_pos": 478, "end_char_pos": 491}, {"type": "R", "before": "Even now, the", "after": "The", "start_char_pos": 693, "end_char_pos": 706}, {"type": "D", "before": "solely", "after": null, "start_char_pos": 752, "end_char_pos": 758}, {"type": "D", "before": "of the algorithm", "after": null, "start_char_pos": 861, "end_char_pos": 877}, {"type": "D", "before": "which are motivated by existing research", "after": null, "start_char_pos": 1063, "end_char_pos": 1103}, {"type": "R", "before": "which can lead to smaller graphs. Our experimental evaluation", "after": ". Our experiments", "start_char_pos": 1305, "end_char_pos": 1366}, {"type": "R", "before": "indicates", "after": "indicate", "start_char_pos": 1406, "end_char_pos": 1415}, {"type": "R", "before": "algorithm by Akiba and Iwata", "after": "algorithms", "start_char_pos": 1514, "end_char_pos": 1542}, {"type": "R", "before": "we are able to compute a solution faster than", "after": "our reduction-based packing branching rule is able to outperform", "start_char_pos": 1566, "end_char_pos": 1611}, {"type": "R", "before": "90", "after": "65", "start_char_pos": 1686, "end_char_pos": 1688}, {"type": "R", "before": "strategies are", "after": "strategy based on edge cuts is", "start_char_pos": 1754, "end_char_pos": 1768}, {"type": "R", "before": "90\\%", "after": "2.29", "start_char_pos": 1798, "end_char_pos": 1802}, {"type": "R", "before": "33\\%", "after": "1.22", "start_char_pos": 1824, "end_char_pos": 1828}], "sents_char_pos": [0, 179, 300, 422, 574, 692, 879, 1012, 1105, 1338, 1544, 1716]}
+{"doc_id": "2102.02315", "revision_depth": "1", "before_revision": "The widespread development of driverless vehicles has led to the formation of autonomous racing competitions, where the high speeds and fierce rivalry in motorsportprovide a testbed to accelerate technology development . A particular challenge for an autonomous vehicle is that of identifying a target trajectory - or in the case of a racing car, the ideal racing line. Many existing approaches to identifying the racing line are either not the time-optimal solutions, or have solution times which are computationally expensive, thus rendering them unsuitable for real-time application using on-board processing hardware. This paper describes a machine learning approach to generating an accurate prediction of the racing line in real-time on desktop processing hardware. The proposed algorithm is a dense feed-forward neural network, trained using a dataset comprising racing lines for a large number of circuits calculated via a traditional optimal control lap time simulation. The network is capable of predicting the racing line with a mean absolute error of +/-0.27m, meaning that the accuracy outperforms a human driver, and is comparable to other parts of the autonomous vehicle control system. The system generates predictions within 33ms, making it over 9,000 times faster than traditional methods of finding the optimal racing line . Results suggest that a data-driven approach may therefore be favourable for real-time generation of near-optimal racing lines than traditional computational methods.", "after_revision": "Widespread development of driverless vehicles has led to the formation of autonomous racing , where technological development is accelerated by the high speeds and competitive environment of motorsport . A particular challenge for an autonomous vehicle is that of identifying a target trajectory - or in the case of a racing car, the racing line. Many existing approaches to finding the racing line are either not time-optimal solutions, or are computationally expensive, thus rendering them unsuitable for real-time application using on-board processing hardware. This study describes a machine learning approach to generating an accurate prediction of the racing line in real-time on desktop processing hardware. The proposed algorithm is a feed-forward neural network, trained using a dataset comprising racing lines for a large number of circuits calculated via a traditional optimal control lap time simulation. The network predicts the racing line with a mean absolute error of +/-0.27m, meaning that the accuracy outperforms a human driver, and is comparable to autonomous vehicle control subsystems. The approach generates predictions within 33ms, making it over 9,000 times faster than traditional methods of finding the optimal trajectory . Results suggest that data-driven approaches to find near-optimal racing lines may be favourable to traditional computational methods.", "edit_actions": [{"type": "R", "before": "The widespread", "after": "Widespread", "start_char_pos": 0, "end_char_pos": 14}, {"type": "R", "before": "competitions, where", "after": ", where technological development is accelerated by", "start_char_pos": 96, "end_char_pos": 115}, {"type": "R", "before": "fierce rivalry in motorsportprovide a testbed to accelerate technology development", "after": "competitive environment of motorsport", "start_char_pos": 136, "end_char_pos": 218}, {"type": "D", "before": "ideal", "after": null, "start_char_pos": 351, "end_char_pos": 356}, {"type": "R", "before": "identifying", "after": "finding", "start_char_pos": 398, "end_char_pos": 409}, {"type": "D", "before": "the", "after": null, "start_char_pos": 441, "end_char_pos": 444}, {"type": "D", "before": "have solution times which", "after": null, "start_char_pos": 472, "end_char_pos": 497}, {"type": "R", "before": "paper", "after": "study", "start_char_pos": 627, "end_char_pos": 632}, {"type": "D", "before": "dense", "after": null, "start_char_pos": 800, "end_char_pos": 805}, {"type": "R", "before": "is capable of predicting", "after": "predicts", "start_char_pos": 992, "end_char_pos": 1016}, {"type": "D", "before": "other parts of the", "after": null, "start_char_pos": 1148, "end_char_pos": 1166}, {"type": "R", "before": "system. The system", "after": "subsystems. The approach", "start_char_pos": 1194, "end_char_pos": 1212}, {"type": "R", "before": "racing line", "after": "trajectory", "start_char_pos": 1330, "end_char_pos": 1341}, {"type": "D", "before": "a", "after": null, "start_char_pos": 1365, "end_char_pos": 1366}, {"type": "R", "before": "approach may therefore be favourable for real-time generation of", "after": "approaches to find", "start_char_pos": 1379, "end_char_pos": 1443}, {"type": "R", "before": "than", "after": "may be favourable to", "start_char_pos": 1470, "end_char_pos": 1474}], "sents_char_pos": [0, 369, 621, 771, 979, 1201]}
+{"doc_id": "2102.02865", "revision_depth": "1", "before_revision": "We explore the scaling properties of price-volatility nexus in cryptocurrency markets and address the issue of the asymmetric volatility effect within a framework of fractal analysis . The MF-ADCCA method is applied to examine nonlinear interactions and asymmetric multifractality of cross-correlations between price and volatility for Bitcoin , Ethereum, Ripple, and Litecoin . Furthermore, asymmetric reactions in the volatility process to price fluctuations between uptrend (bull) and downtrend (bear) regimes are discussed from the viewpoint of cross-correlations quantified by the asymmetric DCCA coefficient , which is a different approach from the conventional GARCH-class models . We find that cross-correlations are stronger in downtrend markets than in uptrend markets for maturing Bitcoin and Ethereum . In contrast, for Ripple and Litecoin , inverted reactions are present where cross-correlations are stronger in uptrend markets . Our empirical findings uncover the dynamics of asymmetric volatility structure and provide new guidance in investigating dynamical relationships between price and volatility for cryptocurrencies .", "after_revision": "Asymmetric relationship between price and volatility is a prominent feature of the financial market time series. This paper explores the price-volatility nexus in cryptocurrency markets and investigates the presence of asymmetric volatility effect between uptrend (bull) and downtrend (bear) regimes. The conventional GARCH-class models have shown that in cryptocurrency markets, asymmetric reactions of volatility to returns differ from those of other traditional financial assets. We address this issue from a viewpoint of fractal analysis , which can cover the nonlinear interactions and the self-similarity properties widely acknowledged in the field of econophysics. The asymmetric cross-correlations between price and volatility for Bitcoin (BTC), Ethereum (ETH), Ripple (XRP) , and Litecoin (LTC) during the period from June 1, 2016 to December 28, 2020 are investigated using the MF-ADCCA method and quantified via the asymmetric DCCA coefficient . The approaches take into account the nonlinearity and asymmetric multifractal scaling properties, providing new insights in investigating the relationships in a dynamical way . We find that cross-correlations are stronger in downtrend markets than in uptrend markets for maturing BTC and ETH . In contrast, for XRP and LTC , inverted reactions are present where cross-correlations are stronger in uptrend markets .", "edit_actions": [{"type": "R", "before": "We explore the scaling properties of", "after": "Asymmetric relationship between price and volatility is a prominent feature of the financial market time series. This paper explores the", "start_char_pos": 0, "end_char_pos": 36}, {"type": "R", "before": "address the issue of the", "after": "investigates the presence of", "start_char_pos": 90, "end_char_pos": 114}, {"type": "R", "before": "within a framework", "after": "between uptrend (bull) and downtrend (bear) regimes. The conventional GARCH-class models have shown that in cryptocurrency markets, asymmetric reactions of volatility to returns differ from those of other traditional financial assets. We address this issue from a viewpoint", "start_char_pos": 144, "end_char_pos": 162}, {"type": "R", "before": ". The MF-ADCCA method is applied to examine", "after": ", which can cover the", "start_char_pos": 183, "end_char_pos": 226}, {"type": "R", "before": "asymmetric multifractality of", "after": "the self-similarity properties widely acknowledged in the field of econophysics. The asymmetric", "start_char_pos": 254, "end_char_pos": 283}, {"type": "A", "before": null, "after": "(BTC), Ethereum (ETH), Ripple (XRP)", "start_char_pos": 344, "end_char_pos": 344}, {"type": "D", "before": "Ethereum, Ripple,", "after": null, "start_char_pos": 347, "end_char_pos": 364}, {"type": "R", "before": ". Furthermore, asymmetric reactions in the volatility process to price fluctuations between uptrend (bull) and downtrend (bear) regimes are discussed from", "after": "(LTC) during the period from June 1, 2016 to December 28, 2020 are investigated using the MF-ADCCA method and quantified via", "start_char_pos": 378, "end_char_pos": 532}, {"type": "D", "before": "viewpoint of cross-correlations quantified by the", "after": null, "start_char_pos": 537, "end_char_pos": 586}, {"type": "R", "before": ", which is a different approach from the conventional GARCH-class models", "after": ". The approaches take into account the nonlinearity and asymmetric multifractal scaling properties, providing new insights in investigating the relationships in a dynamical way", "start_char_pos": 615, "end_char_pos": 687}, {"type": "R", "before": "Bitcoin and Ethereum", "after": "BTC and ETH", "start_char_pos": 793, "end_char_pos": 813}, {"type": "R", "before": "Ripple and Litecoin", "after": "XRP and LTC", "start_char_pos": 833, "end_char_pos": 852}, {"type": "D", "before": ". Our empirical findings uncover the dynamics of asymmetric volatility structure and provide new guidance in investigating dynamical relationships between price and volatility for cryptocurrencies", "after": null, "start_char_pos": 943, "end_char_pos": 1139}], "sents_char_pos": [0, 184, 379, 689, 815, 944]}
+{"doc_id": "2102.03502", "revision_depth": "1", "before_revision": "Financial Portfolio Management is one of the most applicable problems in Reinforcement Learning (RL) by its sequential decision-making nature. Existing RL-based approaches, while inspiring, often lack scalability, reusability, or profundity of intake information to accommodate the ever-changing capital markets. In this paper, we design and develop MSPM, a novel Multi-agent Reinforcement learning-based system with a modularized and scalable architecture for portfolio management. MSPM involves two asynchronously updated units: Evolving Agent Module (EAM) and Strategic Agent Module (SAM). A self-sustained EAM produces signal-comprised information for a specific asset using heterogeneous data inputs, and each EAM possesses its reusability to have connections to multiple SAMs. A SAM is responsible for the assets reallocation of a portfolio using profound information from the EAMs connected . With the elaborate architecture and the multi-step condensation of the volatile market information, MSPM aims to provide a customizable, stable, and dedicated solution to portfolio management that existing approachesdo not . We also tackle data-shortage issue of newly-listed stocks by transfer learning, and validate the necessity of EAM . Experiments on 8-year U.S. stock markets data prove the effectiveness of MSPM in profits accumulation by its outperformance over existing benchmarks.", "after_revision": "Financial portfolio management is one of the most applicable problems in reinforcement learning (RL) owing to its sequential decision-making nature. Existing RL-based approaches, while inspiring, often lack scalability, reusability, or profundity of intake information to accommodate the ever-changing capital markets. In this paper, we propose MSPM, a modularized and scalable , multi-agent RL-based system for financial portfolio management. MSPM involves two asynchronously updated units: an Evolving Agent Module (EAM) and Strategic Agent Module (SAM). A self-sustained EAM produces signal-comprised information for a specific asset using heterogeneous data inputs, and each EAM employs its reusability to have connections to multiple SAMs. An SAM is responsible for asset reallocation in a portfolio using profound information from the connected EAMs . With the elaborate architecture and the multi-step condensation of volatile market information, MSPM aims to provide a customizable, stable, and dedicated solution to portfolio management , unlike existing approaches . We also tackle the data-shortage issue of newly-listed stocks by transfer learning, and validate the indispensability of EAM with four different portfolios . Experiments on 8-year U.S. stock market data prove the effectiveness of MSPM in profit accumulation, by its outperformance over existing benchmarks.", "edit_actions": [{"type": "R", "before": "Portfolio Management", "after": "portfolio management", "start_char_pos": 10, "end_char_pos": 30}, {"type": "R", "before": "Reinforcement Learning", "after": "reinforcement learning", "start_char_pos": 73, "end_char_pos": 95}, {"type": "R", "before": "by", "after": "owing to", "start_char_pos": 101, "end_char_pos": 103}, {"type": "R", "before": "design and develop", "after": "propose", "start_char_pos": 331, "end_char_pos": 349}, {"type": "D", "before": "novel Multi-agent Reinforcement learning-based system with a", "after": null, "start_char_pos": 358, "end_char_pos": 418}, {"type": "R", "before": "architecture for", "after": ", multi-agent RL-based system for financial", "start_char_pos": 444, "end_char_pos": 460}, {"type": "A", "before": null, "after": "an", "start_char_pos": 531, "end_char_pos": 531}, {"type": "R", "before": "possesses", "after": "employs", "start_char_pos": 720, "end_char_pos": 729}, {"type": "R", "before": "A", "after": "An", "start_char_pos": 784, "end_char_pos": 785}, {"type": "R", "before": "the assets reallocation of", "after": "asset reallocation in", "start_char_pos": 809, "end_char_pos": 835}, {"type": "R", "before": "EAMs connected", "after": "connected EAMs", "start_char_pos": 884, "end_char_pos": 898}, {"type": "D", "before": "the", "after": null, "start_char_pos": 968, "end_char_pos": 971}, {"type": "R", "before": "that existing approachesdo not", "after": ", unlike existing approaches", "start_char_pos": 1093, "end_char_pos": 1123}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1141, "end_char_pos": 1141}, {"type": "R", "before": "necessity of EAM", "after": "indispensability of EAM with four different portfolios", "start_char_pos": 1224, "end_char_pos": 1240}, {"type": "R", "before": "markets", "after": "market", "start_char_pos": 1276, "end_char_pos": 1283}, {"type": "R", "before": "profits accumulation", "after": "profit accumulation,", "start_char_pos": 1324, "end_char_pos": 1344}], "sents_char_pos": [0, 142, 312, 482, 900, 1125]}
+{"doc_id": "2102.03804", "revision_depth": "1", "before_revision": "Error-state Kalman filter is an elegant and effective filtering technique for robotic systemsoperating on manifolds. To avoid the tedious and repetitive derivations for implementing an error-state Kalman filter for a certain system, this paperproposes a generic symbolic representation for error-state Kalman filters on manifolds. Utilizing the \\boxplus \\backslash \\boxminus operations and further defining a \\oplus operation on the respective manifold, we propose a canonical representation of the robotic system, which enables us to separate the manifold structures from the system descriptions in each step of the Kalman filter, ultimately leading to a generic , symbolic and manifold-embedding Kalman filter framework . This proposed Kalman filter framework can be used by only casting the system model into the canonical form without going through the cumbersome hand-derivation of the on-manifold Kalman filter. This is particularly useful when the robotic system is of high dimension. Furthermore, the manifold-embedding Kalman filter is implemented as a toolkit in C++ , with which an user needs only to define the system, and call the respective filter steps (e.g., propagation , update) according to the events (e. g., reception of input, reception of measurement). The existing implementation supports full iterated Kalman filtering for systems on manifold \\mathcal{S = \\mathbb{R}^m \\times } SO(3) \\times \\cdots \\times SO(3) \\times \\mathbb{S^2\\times \\cdots \\times \\mathbb{S}^2 or any of its sub-manifolds} , and is extendable to other types of manifold when necessary. The proposed symbolic Kalman filter and the developed toolkit are verified by implementing a tightly-coupled lidar-inertial navigation system. Results show superior filtering performances and computation efficiency comparable to hand-engineered counterparts. Finally, the toolkit is opened sourced at URL ", "after_revision": " Kalman filter is presumably one of the most important and extensively used filtering techniques in modern control systems. Yet, nearly all current variants of Kalman filters are formulated in the Euclidean space \\mathbb{R on manifolds. In this paper, we propose a method to develop Kalman filters for such on-manifold systems. Utilizing \\boxplus , \\boxminus operations and further defining an oplus operation on the respective manifold, we propose a canonical representation of the on-manifold system. Such a canonical form enables us to separate the manifold constraints from the system behaviors in each step of the Kalman filter, ultimately leading to a generic and symbolic Kalman filter framework that are naturally evolving on the manifold. Furthermore, the on-manifold Kalman filter is implemented as a toolkit in C++ packages which enables users to implement an on-manifold Kalman filter just like the normal one in \\mathbb{R user needs only to provide the system-specific descriptions, and then call the respective filter steps (e.g., predict , update) without dealing with any of the manifold constraints. The existing implementation supports full iterated Kalman filtering for systems on = \\mathbb{R}^m \\times } any manifold composed of \\mathbb{R SO(3) ^2\\times \\cdots \\times \\mathbb{S}^2 or any of its sub-manifolds} and \\mathbb{S , and is extendable to other types of manifold when necessary. The proposed symbolic Kalman filter and the developed toolkit are verified by implementing a tightly-coupled lidar-inertial navigation system. Results show that the developed toolkit leads to superior filtering performances and computation efficiency comparable to hand-engineered counterparts. Finally, the toolkit is opened sourced at URL to assist practitioners to quickly deploy an on-manifold Kalman filter.", "edit_actions": [{"type": "D", "before": "Error-state", "after": null, "start_char_pos": 0, "end_char_pos": 11}, {"type": "R", "before": "an elegant and effective filtering technique for robotic systemsoperating", "after": "presumably one of the most important and extensively used filtering techniques in modern control systems. Yet, nearly all current variants of Kalman filters are formulated in the Euclidean space \\mathbb{R", "start_char_pos": 29, "end_char_pos": 102}, {"type": "R", "before": "To avoid the tedious and repetitive derivations for implementing an error-state Kalman filter for a certain system, this paperproposes a generic symbolic representation for error-state Kalman filters on manifolds. Utilizing the", "after": "In this paper, we propose a method to develop Kalman filters for such on-manifold systems. Utilizing", "start_char_pos": 117, "end_char_pos": 344}, {"type": "R", "before": "\\backslash", "after": ",", "start_char_pos": 354, "end_char_pos": 364}, {"type": "R", "before": "a \\oplus", "after": "an oplus", "start_char_pos": 407, "end_char_pos": 415}, {"type": "R", "before": "robotic system, which", "after": "on-manifold system. Such a canonical form", "start_char_pos": 499, "end_char_pos": 520}, {"type": "R", "before": "structures", "after": "constraints", "start_char_pos": 557, "end_char_pos": 567}, {"type": "R", "before": "descriptions", "after": "behaviors", "start_char_pos": 584, "end_char_pos": 596}, {"type": "R", "before": ", symbolic and manifold-embedding", "after": "and symbolic", "start_char_pos": 664, "end_char_pos": 697}, {"type": "R", "before": ". This proposed Kalman filter framework can be used by only casting the system model into the canonical form without going through the cumbersome hand-derivation of the on-manifold Kalman filter. This is particularly useful when the robotic system is of high dimension.", "after": "that are naturally evolving on the manifold.", "start_char_pos": 722, "end_char_pos": 991}, {"type": "R", "before": "manifold-embedding", "after": "on-manifold", "start_char_pos": 1009, "end_char_pos": 1027}, {"type": "R", "before": ", with which an", "after": "packages which enables users to implement an on-manifold Kalman filter just like the normal one in \\mathbb{R", "start_char_pos": 1077, "end_char_pos": 1092}, {"type": "R", "before": "define the system, and", "after": "provide the system-specific descriptions, and then", "start_char_pos": 1112, "end_char_pos": 1134}, {"type": "R", "before": "propagation", "after": "predict", "start_char_pos": 1175, "end_char_pos": 1186}, {"type": "R", "before": "according to the events (e. g., reception of input, reception of measurement).", "after": "without dealing with any of the manifold constraints.", "start_char_pos": 1197, "end_char_pos": 1275}, {"type": "D", "before": "manifold \\mathcal{S", "after": null, "start_char_pos": 1359, "end_char_pos": 1378}, {"type": "A", "before": null, "after": "any manifold composed of \\mathbb{R", "start_char_pos": 1403, "end_char_pos": 1403}, {"type": "D", "before": "\\times \\cdots \\times SO(3) \\times \\mathbb{S", "after": null, "start_char_pos": 1410, "end_char_pos": 1453}, {"type": "A", "before": null, "after": "and \\mathbb{S", "start_char_pos": 1518, "end_char_pos": 1518}, {"type": "A", "before": null, "after": "that the developed toolkit leads to", "start_char_pos": 1738, "end_char_pos": 1738}, {"type": "A", "before": null, "after": "to assist practitioners to quickly deploy an on-manifold Kalman filter.", "start_char_pos": 1888, "end_char_pos": 1888}], "sents_char_pos": [0, 116, 330, 723, 917, 991, 1275, 1581, 1724, 1841]}
+{"doc_id": "2102.04022", "revision_depth": "1", "before_revision": "Robotic automation for pick and place task has vast applications. Deep Reinforcement Learning (DRL) is one of the leading robotic automation technique that has been able to achieve dexterous manipulation and locomotion robotics skills . However, a major drawback of using DRL is the Data hungry training regime of DRL that requires millions of trial and error attempts, impractical in real robotic hardware. We propose a multi-subtask reinforcement learning method where complex tasks can be decomposed into low-level subtasks . These subtasks can be parametrised as expert networks and learnt via existing DRL methods. The trained subtasks can be choreographed by a high-level synthesizer . As a test bed , we use a pick and place robotic simulator , and transfer the learnt behaviour in a real robotic system. We show that our method outperforms imitation learning based method and reaches high success rate compared to an end-to-end learning approach. Furthermore, we investigate the trained subtasks to demonstrate a adaptive behaviour by fine-tuning a subset of subtasks on a different task. Our approach deviates from the end-to-end learning strategy and provide an initial direction towards learning modular task representations that can generate robust behaviours .", "after_revision": " Deep Reinforcement Learning (DRL) is emerging as a promising approach to generate adaptive behaviors for robotic platforms . However, a major drawback of using DRL is the data-hungry training regime that requires millions of trial and error attempts, which is impractical when running experiments on robotic systems. To address this issue, we propose a multi-subtask reinforcement learning method where complex tasks are decomposed manually into low-level subtasks by leveraging human domain knowledge . These subtasks can be parametrized as expert networks and learned via existing DRL methods. Trained subtasks can then be composed with a high-level choreographer . As a testbed , we use a pick and place robotic simulator to demonstrate our methodology, and show that our method outperforms an imitation learning-based method and reaches a high success rate compared to an end-to-end learning approach. Moreover, we transfer the learned behavior in a different robotic environment that allows us to exploit sim-to-real transfer and demonstrate the trajectories in a real robotic system. Our training regime is carried out using a central processing unit (CPU)-based system, which demonstrates the data-efficient properties of our approach .", "edit_actions": [{"type": "D", "before": "Robotic automation for pick and place task has vast applications.", "after": null, "start_char_pos": 0, "end_char_pos": 65}, {"type": "R", "before": "one of the leading robotic automation technique that has been able to achieve dexterous manipulation and locomotion robotics skills", "after": "emerging as a promising approach to generate adaptive behaviors for robotic platforms", "start_char_pos": 103, "end_char_pos": 234}, {"type": "R", "before": "Data hungry training regime of DRL", "after": "data-hungry training regime", "start_char_pos": 283, "end_char_pos": 317}, {"type": "R", "before": "impractical in real robotic hardware. We", "after": "which is impractical when running experiments on robotic systems. To address this issue, we", "start_char_pos": 370, "end_char_pos": 410}, {"type": "R", "before": "can be decomposed", "after": "are decomposed manually", "start_char_pos": 485, "end_char_pos": 502}, {"type": "A", "before": null, "after": "by leveraging human domain knowledge", "start_char_pos": 527, "end_char_pos": 527}, {"type": "R", "before": "parametrised", "after": "parametrized", "start_char_pos": 552, "end_char_pos": 564}, {"type": "R", "before": "learnt", "after": "learned", "start_char_pos": 588, "end_char_pos": 594}, {"type": "R", "before": "The trained subtasks can be choreographed by", "after": "Trained subtasks can then be composed with", "start_char_pos": 621, "end_char_pos": 665}, {"type": "R", "before": "synthesizer", "after": "choreographer", "start_char_pos": 679, "end_char_pos": 690}, {"type": "R", "before": "test bed", "after": "testbed", "start_char_pos": 698, "end_char_pos": 706}, {"type": "R", "before": ", and transfer the learnt behaviour in a real robotic system. We", "after": "to demonstrate our methodology, and", "start_char_pos": 751, "end_char_pos": 815}, {"type": "R", "before": "imitation learning based", "after": "an imitation learning-based", "start_char_pos": 849, "end_char_pos": 873}, {"type": "A", "before": null, "after": "a", "start_char_pos": 893, "end_char_pos": 893}, {"type": "R", "before": "Furthermore, we investigate the trained subtasks to demonstrate a adaptive behaviour by fine-tuning a subset of subtasks on a different task. Our approach deviates from the end-to-end learning strategy and provide an initial direction towards learning modular task representations that can generate robust behaviours", "after": "Moreover, we transfer the learned behavior in a different robotic environment that allows us to exploit sim-to-real transfer and demonstrate the trajectories in a real robotic system. Our training regime is carried out using a central processing unit (CPU)-based system, which demonstrates the data-efficient properties of our approach", "start_char_pos": 957, "end_char_pos": 1273}], "sents_char_pos": [0, 65, 236, 407, 529, 620, 812, 956, 1098]}
+{"doc_id": "2102.04980", "revision_depth": "1", "before_revision": "Existing image retrieval systems use text queries to provide a natural and practical way for users to express what they are looking for. However, fine-grained image retrieval often requires the ability to also express the where in the image the content they are looking for is. The textual modality can only cumbersomely express such localization preferences, whereas pointing would be a natural fit. In this paper, we describe an image retrieval setup where the user simultaneously describes an image using both spoken natural language (the \"what\" ) and mouse traces over an empty canvas (the \"where\" ) to express the characteristics of the desired target image. To this end, we learn an image retrieval model using the Localized Narratives dataset, which is capable of performing early fusion between text descriptions and synchronized mouse traces . Qualitative and quantitative experiments show that our model is capable of taking this spatial guidance into account, and provides more accurate retrieval results compared to text-only equivalent systems.", "after_revision": "Most existing image retrieval systems use text queries as a way for the user to express what they are looking for. However, fine-grained image retrieval often requires the ability to also express the where in the image the content they are looking for is. The text modality can only cumbersomely express such localization preferences, whereas pointing is a more natural fit. In this paper, we propose an image retrieval setup with a new form of multimodal queries, where the user simultaneously uses both spoken natural language (the what ) and mouse traces over an empty canvas (the where ) to express the characteristics of the desired target image. We then describe simple modifications to an existing image retrieval model , enabling it to operate in this setup . Qualitative and quantitative experiments show that our model effectively takes this spatial guidance into account, and provides significantly more accurate retrieval results compared to text-only equivalent systems.", "edit_actions": [{"type": "R", "before": "Existing", "after": "Most existing", "start_char_pos": 0, "end_char_pos": 8}, {"type": "R", "before": "to provide a natural and practical way for users", "after": "as a way for the user", "start_char_pos": 50, "end_char_pos": 98}, {"type": "R", "before": "textual", "after": "text", "start_char_pos": 282, "end_char_pos": 289}, {"type": "R", "before": "would be a", "after": "is a more", "start_char_pos": 377, "end_char_pos": 387}, {"type": "R", "before": "describe", "after": "propose", "start_char_pos": 419, "end_char_pos": 427}, {"type": "A", "before": null, "after": "with a new form of multimodal queries,", "start_char_pos": 453, "end_char_pos": 453}, {"type": "R", "before": "describes an image using", "after": "uses", "start_char_pos": 484, "end_char_pos": 508}, {"type": "R", "before": "\"what\"", "after": "what", "start_char_pos": 543, "end_char_pos": 549}, {"type": "R", "before": "\"where\"", "after": "where", "start_char_pos": 595, "end_char_pos": 602}, {"type": "R", "before": "To this end, we learn an", "after": "We then describe simple modifications to an existing", "start_char_pos": 665, "end_char_pos": 689}, {"type": "R", "before": "using the Localized Narratives dataset, which is capable of performing early fusion between text descriptions and synchronized mouse traces", "after": ", enabling it to operate in this setup", "start_char_pos": 712, "end_char_pos": 851}, {"type": "R", "before": "is capable of taking", "after": "effectively takes", "start_char_pos": 915, "end_char_pos": 935}, {"type": "A", "before": null, "after": "significantly", "start_char_pos": 985, "end_char_pos": 985}], "sents_char_pos": [0, 136, 277, 400, 664, 853]}
+{"doc_id": "2102.05470", "revision_depth": "2", "before_revision": "The ongoing COVID-19 vaccination campaign has so far targeted less than 3 \\% of the world population, and even in countries where the campaign has started many citizens will not receive their doses for many months. There is clear evidence that previous shortages of COVID-19 related goods (e.g., masks and COVID-19 tests) and services pushed customers, and vendors, towards illicit online trade occurring on dark web marketplaces. Is this happening also with vaccines? Here, we report on our effort to continuously monitor 102 dark web marketplaces. By February 26 , we found 33 listings offering a COVID-19 vaccine, seven of which offering officially approved vaccines . The number of currently active listings is 11, including one listing selling the Pfizer/BioNTech vaccine, one listing the AstraZeneca/Oxford vaccine, and 9 listings selling vaccines of unspecified type . Illicit trade of uncertified COVID-19 vaccines poses a concrete threat to public health and risks to undermine public confidence towards vaccination.", "after_revision": "The ongoing COVID-19 vaccination campaign has so far targeted less than 10 \\% of the world population, and , even in countries where the campaign has started , many citizens will not receive their doses for many months. There is clear evidence that previous shortages of COVID-19 related goods (e.g., masks and COVID-19 tests) and services pushed customers, and vendors, towards illicit online trade occurring on dark web marketplaces. Is this happening also with vaccines? Here, we report on our effort to continuously monitor 164 dark web marketplaces. By April 20 , we found 214 listings offering a COVID-19 vaccine, 77 of which offering officially approved vaccines and 25 fabricated proofs of vaccination . The number of currently active listings is 34, including eight listings offering the Pfizer/BioNTech vaccine, six the Moderna, two the AstraZeneca/Oxford , two the Sputinik V vaccine, and nine offering fabricated proofs of vaccination . Illicit trade of uncertified COVID-19 vaccines poses a concrete threat to public health and risks to undermine public confidence towards vaccination.", "edit_actions": [{"type": "R", "before": "3", "after": "10", "start_char_pos": 72, "end_char_pos": 73}, {"type": "A", "before": null, "after": ",", "start_char_pos": 106, "end_char_pos": 106}, {"type": "A", "before": null, "after": ",", "start_char_pos": 156, "end_char_pos": 156}, {"type": "R", "before": "102", "after": "164", "start_char_pos": 525, "end_char_pos": 528}, {"type": "R", "before": "February 26", "after": "April 20", "start_char_pos": 555, "end_char_pos": 566}, {"type": "R", "before": "33", "after": "214", "start_char_pos": 578, "end_char_pos": 580}, {"type": "R", "before": "seven", "after": "77", "start_char_pos": 619, "end_char_pos": 624}, {"type": "A", "before": null, "after": "and 25 fabricated proofs of vaccination", "start_char_pos": 672, "end_char_pos": 672}, {"type": "R", "before": "11, including one listing selling", "after": "34, including eight listings offering", "start_char_pos": 718, "end_char_pos": 751}, {"type": "R", "before": "one listing the", "after": "six the Moderna, two the", "start_char_pos": 781, "end_char_pos": 796}, {"type": "A", "before": null, "after": ", two the Sputinik V", "start_char_pos": 816, "end_char_pos": 816}, {"type": "R", "before": "9 listings selling vaccines of unspecified type", "after": "nine offering fabricated proofs of vaccination", "start_char_pos": 830, "end_char_pos": 877}], "sents_char_pos": [0, 216, 432, 470, 551, 674, 879]}
+{"doc_id": "2102.06440", "revision_depth": "1", "before_revision": "Many centralized matching markets are preceded by interviews between the participants. We study the impact on the final match of an increase to the number of interviews one side of the market can participate in . Our motivation is the match between residents and hospitals where, due to the COVID-19 pandemic, interviews for the 2020-21 season of the NRMP match have switched to a virtual format. This has drastically reduced the cost to applicants of accepting interview offers . However, the reduction in cost is not symmetric since applicants, not programs, bore most of the costs of in-person interviews. We show that if doctors are willing to accept more interviews but the hospitals do not increase the number of interviews they offer, no doctor will be better off and potentially many doctors will be harmed. This adverse consequence results from a mechanism we describe as interview hoarding. We prove this analytically and characterize optimal mitigation strategies for special cases. We use simulations to extend the insights from our analytical results to more general settings.", "after_revision": "Many centralized matching markets are preceded by interviews between the participants. We study the impact on the final match of an increase in the number of interviews for one side of the market . Our motivation is the match between residents and hospitals where, due to the COVID-19 pandemic, interviews for the 2020-21 season of the National Residency Matching Program were switched to a virtual format. This drastically reduced the cost to applicants of accepting interview invitations . However, the reduction in cost was not symmetric since applicants, not programs, previously bore most of the costs of in-person interviews. We show that , starting from a situation where the final matching is stable, if doctors can accept more interviews , but the hospitals do not increase the number of interviews they offer, then no doctor is better off and many doctors are potentially harmed. This adverse consequence is the result of what we call interview hoarding. We prove this analytically and characterize optimal mitigation strategies for special cases. We use simulations to extend these insights to more general settings.", "edit_actions": [{"type": "R", "before": "to", "after": "in", "start_char_pos": 141, "end_char_pos": 143}, {"type": "A", "before": null, "after": "for", "start_char_pos": 169, "end_char_pos": 169}, {"type": "D", "before": "can participate in", "after": null, "start_char_pos": 193, "end_char_pos": 211}, {"type": "R", "before": "NRMP match have", "after": "National Residency Matching Program were", "start_char_pos": 352, "end_char_pos": 367}, {"type": "D", "before": "has", "after": null, "start_char_pos": 403, "end_char_pos": 406}, {"type": "R", "before": "offers", "after": "invitations", "start_char_pos": 473, "end_char_pos": 479}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 513, "end_char_pos": 515}, {"type": "A", "before": null, "after": "previously", "start_char_pos": 562, "end_char_pos": 562}, {"type": "R", "before": "if doctors are willing to", "after": ", starting from a situation where the final matching is stable, if doctors can", "start_char_pos": 624, "end_char_pos": 649}, {"type": "A", "before": null, "after": ",", "start_char_pos": 673, "end_char_pos": 673}, {"type": "R", "before": "no doctor will be", "after": "then no doctor is", "start_char_pos": 745, "end_char_pos": 762}, {"type": "R", "before": "potentially many doctors will be", "after": "many doctors are potentially", "start_char_pos": 778, "end_char_pos": 810}, {"type": "R", "before": "results from a mechanism we describe as", "after": "is the result of what we call", "start_char_pos": 844, "end_char_pos": 883}, {"type": "R", "before": "the insights from our analytical results", "after": "these insights", "start_char_pos": 1026, "end_char_pos": 1066}], "sents_char_pos": [0, 86, 213, 397, 481, 610, 818, 903, 996]}
+{"doc_id": "2102.06700", "revision_depth": "1", "before_revision": "Certified defenses based on convex relaxations are an established technique for training provably robust models. The key component is the choice of relaxation, varying from simple intervals to tight polyhedra. Paradoxically, however, it was empirically observed that training with tighter relaxations can worsen certified robustness. While several methods were designed to partially mitigate this issue, the underlying causes are poorly understood. In this work we investigate the above phenomenon and show that tightness may not be the determining factor for reduced certified robustness . Concretely, we identify two key features of relaxations that impact training dynamics: continuity and sensitivity. We then experimentally demonstrate that these two factors explain the drop in certified robustness when using popular relaxations. Further, we show, for the first time, that it is possible to successfully train with tighter relaxations (i.e., triangle), a result supported by our two properties. Overall, we believe the insights of this work can help drive the systematic discovery of new effective certified defenses .", "after_revision": "Certified defenses based on convex relaxations are an established technique for training provably robust models. The key component is the choice of relaxation, varying from simple intervals to tight polyhedra. Paradoxically, however, training with tighter relaxations can often lead to worse certified robustness. The poor understanding of this paradox has forced recent state-of-the-art certified defenses to focus on designing various heuristics in order to mitigate its effects. In contrast, in this paper we study the underlying causes and show that tightness alone may not be the determining factor . Concretely, we identify two key properties of relaxations that impact training dynamics: continuity and sensitivity. Our extensive experimental evaluation demonstrates that these two factors , observed alongside tightness, explain the drop in certified robustness for popular relaxations. Further, we investigate the possibility of designing and training with relaxations that are tight, continuous and not sensitive. We believe the insights of this work can help drive the principled discovery of new and effective certified defense mechanisms .", "edit_actions": [{"type": "D", "before": "it was empirically observed that", "after": null, "start_char_pos": 234, "end_char_pos": 266}, {"type": "R", "before": "worsen", "after": "often lead to worse", "start_char_pos": 305, "end_char_pos": 311}, {"type": "R", "before": "While several methods were designed to partially mitigate this issue, the underlying causes are poorly understood. In this work we investigate the above phenomenon", "after": "The poor understanding of this paradox has forced recent state-of-the-art certified defenses to focus on designing various heuristics in order to mitigate its effects. In contrast, in this paper we study the underlying causes", "start_char_pos": 334, "end_char_pos": 497}, {"type": "A", "before": null, "after": "alone", "start_char_pos": 522, "end_char_pos": 522}, {"type": "D", "before": "for reduced certified robustness", "after": null, "start_char_pos": 557, "end_char_pos": 589}, {"type": "R", "before": "features", "after": "properties", "start_char_pos": 624, "end_char_pos": 632}, {"type": "R", "before": "We then experimentally demonstrate", "after": "Our extensive experimental evaluation demonstrates", "start_char_pos": 707, "end_char_pos": 741}, {"type": "A", "before": null, "after": ", observed alongside tightness,", "start_char_pos": 765, "end_char_pos": 765}, {"type": "R", "before": "when using", "after": "for", "start_char_pos": 807, "end_char_pos": 817}, {"type": "R", "before": "show, for the first time, that it is possible to successfully train with tighter relaxations (i.e., triangle), a result supported by our two properties. Overall, we", "after": "investigate the possibility of designing and training with relaxations that are tight, continuous and not sensitive. We", "start_char_pos": 851, "end_char_pos": 1015}, {"type": "R", "before": "systematic", "after": "principled", "start_char_pos": 1069, "end_char_pos": 1079}, {"type": "R", "before": "effective certified defenses", "after": "and effective certified defense mechanisms", "start_char_pos": 1097, "end_char_pos": 1125}], "sents_char_pos": [0, 112, 209, 333, 448, 706, 838, 1003]}
+{"doc_id": "2102.12351", "revision_depth": "1", "before_revision": "A Boolean constraint satisfaction problem (CSP), Max-CSP(f), is a maximization problem specified by a constraint f:\\{-1,1\\}^k\\to\\{0,1\\}. An instance of the problem consists of m constraint applications on n Boolean variables, where each constraint application applies the constraint to k literals chosen from the n variables and their negations. The goal is to compute the maximum number of constraints that can be satisfied by a Boolean assignment to the n~variables. In the (\\gamma,\\beta)-approximation version of the problem for parameters \\gamma \\geq \\beta \\in [0,1], the goal is to distinguish instances where at least \\gamma fraction of the constraints can be satisfied from instances where at most \\beta fraction of the constraints can be satisfied. In this work we completely characterize the approximability of all Boolean CSPs in the streaming model . Specifically, given f, \\gamma and \\beta we show that either (1) the (\\gamma,\\beta)-approximation version of Max-CSP(f) has a probabilistic streaming algorithm using O(\\log n) space, or (2) for every \\varepsilon > 0 the (\\gamma-\\varepsilon,\\beta+\\varepsilon)-approximation version of Max-CSP(f) requires \\Omega(n) space for probabilistic streaming algorithms. Previously such a separation was known only for k = 2. We stress that for k= 2 , there are only finitely many distinct problems to consider. Our positive results show wider applicability of bias-based algorithms used previously by Guruswami-Velingker-Velusamy APPROX'17 , Chou-Golovnev-Velusamy FOCS'20 by giving a systematic way to explore biases. Our negative results combine the Fourier analytic methods of%DIFDELCMD < [%%% Kapralov-Khanna-Sudan SODA'15 , which we extend to a wider class of CSPs, with a rich collection of reductions among communication complexity problems that lie at the heart of the negative results .", "after_revision": "A Boolean constraint satisfaction problem (CSP), Max-CSP(f), is a maximization problem specified by a constraint f:\\{-1,1\\}^k\\to\\{0,1\\}. An instance of the problem consists of m constraint applications on n Boolean variables, where each constraint application applies the constraint to k literals chosen from the n variables and their negations. The goal is to compute the maximum number of constraints that can be satisfied by a Boolean assignment to the n~variables. In the (\\gamma,\\beta)-approximation version of the problem for parameters \\gamma \\geq \\beta \\in [0,1], the goal is to distinguish instances where at least \\gamma fraction of the constraints can be satisfied from instances where at most \\beta fraction of the constraints can be satisfied. In this work we consider the approximability of Max-CSP(f) in the (dynamic) streaming setting, where constraints are inserted (and may also be deleted in the dynamic setting) one at a time. We completely characterize the approximability of all Boolean CSPs in the dynamic streaming setting . Specifically, given f, \\gamma and \\beta we show that either (1) the (\\gamma,\\beta)-approximation version of Max-CSP(f) has a probabilistic dynamic streaming algorithm using O(\\log n) space, or (2) for every \\varepsilon > 0 the (\\gamma-\\varepsilon,\\beta+\\varepsilon)-approximation version of Max-CSP(f) requires \\Omega(n) space for probabilistic dynamic streaming algorithms. We also extend previously known results in the insertion-only setting to a wide variety of cases, and in particular the case of k = 2 where we get a dichotomy and the case when the satisfying assignments of f support a distribution on \\{-1 , %DIFDELCMD < [%%% 1\\ .", "edit_actions": [{"type": "A", "before": null, "after": "consider the approximability of Max-CSP(f) in the (dynamic) streaming setting, where constraints are inserted (and may also be deleted in the dynamic setting) one at a time. We", "start_char_pos": 773, "end_char_pos": 773}, {"type": "R", "before": "streaming model", "after": "dynamic streaming setting", "start_char_pos": 845, "end_char_pos": 860}, {"type": "A", "before": null, "after": "dynamic", "start_char_pos": 1002, "end_char_pos": 1002}, {"type": "A", "before": null, "after": "dynamic", "start_char_pos": 1201, "end_char_pos": 1201}, {"type": "R", "before": "Previously such a separation was known only for k", "after": "We also extend previously known results in the insertion-only setting to a wide variety of cases, and in particular the case of k", "start_char_pos": 1224, "end_char_pos": 1273}, {"type": "D", "before": "2. We stress that for k=", "after": null, "start_char_pos": 1276, "end_char_pos": 1300}, {"type": "D", "before": ", there are only finitely many distinct problems to consider. Our positive results show wider applicability of bias-based algorithms used previously by", "after": null, "start_char_pos": 1303, "end_char_pos": 1454}, {"type": "R", "before": "Guruswami-Velingker-Velusamy APPROX'17", "after": "where we get a dichotomy and the case when the satisfying assignments of f support a distribution on \\{-1", "start_char_pos": 1455, "end_char_pos": 1493}, {"type": "D", "before": "Chou-Golovnev-Velusamy FOCS'20", "after": null, "start_char_pos": 1496, "end_char_pos": 1526}, {"type": "D", "before": "by giving a systematic way to explore biases. Our negative results combine the Fourier analytic methods of", "after": null, "start_char_pos": 1527, "end_char_pos": 1633}, {"type": "D", "before": "Kapralov-Khanna-Sudan SODA'15", "after": null, "start_char_pos": 1651, "end_char_pos": 1680}, {"type": "R", "before": ", which we extend to a wider class of CSPs, with a rich collection of reductions among communication complexity problems that lie at the heart of the negative results", "after": "1\\", "start_char_pos": 1681, "end_char_pos": 1847}], "sents_char_pos": [0, 136, 345, 468, 756, 1223, 1364, 1572]}
+{"doc_id": "2102.12439", "revision_depth": "1", "before_revision": "Mobile health (mHealth) apps such as menstrual trackers provide a rich source of self-tracked health observations that can be leveraged for statistical modeling . However, such data streams are notoriously unreliable since they hinge on user adherence to the app. Thus , it is crucial for machine learning models to account for self-tracking artifacts like skipped self-tracking. In this abstract , we propose and evaluate a hierarchical, generative model for predicting next cycle length based on previously tracked cycle lengths that accounts explicitly for the possibility of users URLetting to track their period. Our model offers several advantages: 1) accounting explicitly for self-tracking artifacts yields better prediction accuracy as likelihood of skipping increases; 2) as a generative model, predictions can be updated online as a given cycle evolves ; and 3) its hierarchical nature enables modeling of an individual's cycle length history while incorporating population-level information. Our experiments using real mHealth cycle length data from 5 ,000 menstruators show that our method yields state-of-the-art performance against neural network-based and summary statistic-based baselines .", "after_revision": "Mobile health (mHealth) apps such as menstrual trackers provide a rich source of self-tracked health observations that can be leveraged for health-relevant research . However, such data streams have questionable reliability since they hinge on user adherence to the app. Therefore , it is crucial for researchers to separate true behavior from self-tracking artifacts . By taking a machine learning approach to modeling self-tracked cycle lengths, we can both make more informed predictions and learn the underlying structure of the observed data. In this work , we propose and evaluate a hierarchical, generative model for predicting next cycle length based on previously-tracked cycle lengths that accounts explicitly for the possibility of users skipping tracking their period. Our model offers several advantages: 1) accounting explicitly for self-tracking artifacts yields better prediction accuracy as likelihood of skipping increases; 2) because it is a generative model, predictions can be updated online as a given cycle evolves , and we can gain interpretable insight into how these predictions change over time ; and 3) its hierarchical nature enables modeling of an individual's cycle length history while incorporating population-level information. Our experiments using mHealth cycle length data encompassing over 186 ,000 menstruators with over 2 million natural menstrual cycles show that our method yields state-of-the-art performance against neural network-based and summary statistic-based baselines , while providing insights on disentangling menstrual patterns from self-tracking artifacts. This work can benefit users, mHealth app developers, and researchers in better understanding cycle patterns and user adherence .", "edit_actions": [{"type": "R", "before": "statistical modeling", "after": "health-relevant research", "start_char_pos": 140, "end_char_pos": 160}, {"type": "R", "before": "are notoriously unreliable", "after": "have questionable reliability", "start_char_pos": 190, "end_char_pos": 216}, {"type": "R", "before": "Thus", "after": "Therefore", "start_char_pos": 264, "end_char_pos": 268}, {"type": "R", "before": "machine learning models to account for", "after": "researchers to separate true behavior from", "start_char_pos": 289, "end_char_pos": 327}, {"type": "R", "before": "like skipped self-tracking. In this abstract", "after": ". By taking a machine learning approach to modeling self-tracked cycle lengths, we can both make more informed predictions and learn the underlying structure of the observed data. In this work", "start_char_pos": 352, "end_char_pos": 396}, {"type": "R", "before": "previously tracked", "after": "previously-tracked", "start_char_pos": 498, "end_char_pos": 516}, {"type": "R", "before": "URLetting to track", "after": "skipping tracking", "start_char_pos": 585, "end_char_pos": 603}, {"type": "R", "before": "as", "after": "because it is", "start_char_pos": 782, "end_char_pos": 784}, {"type": "A", "before": null, "after": ", and we can gain interpretable insight into how these predictions change over time", "start_char_pos": 864, "end_char_pos": 864}, {"type": "D", "before": "real", "after": null, "start_char_pos": 1027, "end_char_pos": 1031}, {"type": "R", "before": "from 5", "after": "encompassing over 186", "start_char_pos": 1058, "end_char_pos": 1064}, {"type": "A", "before": null, "after": "with over 2 million natural menstrual cycles", "start_char_pos": 1083, "end_char_pos": 1083}, {"type": "A", "before": null, "after": ", while providing insights on disentangling menstrual patterns from self-tracking artifacts. This work can benefit users, mHealth app developers, and researchers in better understanding cycle patterns and user adherence", "start_char_pos": 1208, "end_char_pos": 1208}], "sents_char_pos": [0, 162, 263, 379, 617, 778, 866, 1004]}
+{"doc_id": "2102.12781", "revision_depth": "1", "before_revision": "Interpretability methods that seek to explain instance-specific model predictions [Simonyan et al. 2014, Smilkov et al. 2017] are often based on the premise that the magnitude of input-gradient -- gradient of the loss with respect to input -- highlights discriminative features that are relevant for prediction over non-discriminative features that are irrelevant for prediction . In this work, we introduce an evaluation framework to study this hypothesis for benchmark image classification tasks, and make two surprising observations on CIFAR-10 and Imagenet-10 datasets: (a) contrary to conventional wisdom, input gradients of standard models (i.e., trained on the original data) actually highlight irrelevant features over relevant features; (b)however, input gradients of adversarially robust models (i.e., trained on adversarially perturbed data)starkly highlight relevant features over irrelevant features. To better understand input gradients, we introduce a synthetic testbed and theoretically justify our counter-intuitive empirical findings . Our observations motivate the need to formalize and verify common assumptions in interpretability , while our ] evaluation framework and synthetic dataset serve as a testbed to rigorously analyze instance-specific interpretability methods.", "after_revision": "Post-hoc gradient-based interpretability methods [Simonyan et al. , 2013, Smilkov et al. , 2017] that provide instance-specific explanations of model predictions are often based on assumption (A): magnitude of input gradients -- gradients of logits with respect to input -- noisily highlight discriminative task-relevant features . In this work, we test the validity of assumption (A) using a three-pronged approach. First, we develop an evaluation framework , DiffROAR, to test assumption (A) on four image classification benchmarks. Our results suggest that (i) input gradients of standard models (i.e., trained on original data) may grossly violate (A), whereas (ii) input gradients of adversarially robust models satisfy (A) . Second, we then introduce BlockMNIST, an MNIST-based semi-real dataset, that by design encodes a priori knowledge of discriminative features. Our analysis on BlockMNIST leverages this information to validate as well as characterize differences between input gradient attributions of standard and robust models. Finally, we theoretically prove that our empirical findings hold on a simplified version of the BlockMNIST dataset. Specifically, we prove that input gradients of standard one-hidden-layer MLPs trained on this dataset do not highlight instance-specific signal coordinates, thus grossly violating assumption (A). Our findings motivate the need to formalize and test common assumptions in interpretability in a falsifiable manner Leavitt and Morcos, 2020]. Additionally, we believe that the DiffROAR evaluation framework and BlockMNIST-based datasets can serve as sanity checks to audit instance-specific interpretability methods.", "edit_actions": [{"type": "R", "before": "Interpretability methods that seek to explain instance-specific model predictions", "after": "Post-hoc gradient-based interpretability methods", "start_char_pos": 0, "end_char_pos": 81}, {"type": "R", "before": "2014,", "after": ", 2013,", "start_char_pos": 99, "end_char_pos": 104}, {"type": "A", "before": null, "after": ",", "start_char_pos": 120, "end_char_pos": 120}, {"type": "A", "before": null, "after": "that provide instance-specific explanations of model predictions", "start_char_pos": 127, "end_char_pos": 127}, {"type": "R", "before": "the premise that the magnitude of input-gradient", "after": "assumption (A): magnitude of input gradients", "start_char_pos": 147, "end_char_pos": 195}, {"type": "R", "before": "gradient of the loss", "after": "gradients of logits", "start_char_pos": 199, "end_char_pos": 219}, {"type": "R", "before": "highlights discriminative features that are relevant for prediction over non-discriminative features that are irrelevant for prediction", "after": "noisily highlight discriminative task-relevant features", "start_char_pos": 245, "end_char_pos": 380}, {"type": "R", "before": "introduce", "after": "test the validity of assumption (A) using a three-pronged approach. First, we develop", "start_char_pos": 400, "end_char_pos": 409}, {"type": "R", "before": "to study this hypothesis for benchmark image classification tasks, and make two surprising observations on CIFAR-10 and Imagenet-10 datasets: (a) contrary to conventional wisdom,", "after": ", DiffROAR, to test assumption (A) on four image classification benchmarks. Our results suggest that (i)", "start_char_pos": 434, "end_char_pos": 612}, {"type": "D", "before": "the", "after": null, "start_char_pos": 666, "end_char_pos": 669}, {"type": "R", "before": "actually highlight irrelevant features over relevant features; (b)however,", "after": "may grossly violate (A), whereas (ii)", "start_char_pos": 685, "end_char_pos": 759}, {"type": "R", "before": "(i.e., trained on adversarially perturbed data)starkly highlight relevant features over irrelevant features. To better understand input gradients, we introduce a synthetic testbed and theoretically justify our counter-intuitive empirical findings", "after": "satisfy (A)", "start_char_pos": 807, "end_char_pos": 1053}, {"type": "R", "before": "Our observations", "after": "Second, we then introduce BlockMNIST, an MNIST-based semi-real dataset, that by design encodes a priori knowledge of discriminative features. Our analysis on BlockMNIST leverages this information to validate as well as characterize differences between input gradient attributions of standard and robust models. Finally, we theoretically prove that our empirical findings hold on a simplified version of the BlockMNIST dataset. Specifically, we prove that input gradients of standard one-hidden-layer MLPs trained on this dataset do not highlight instance-specific signal coordinates, thus grossly violating assumption (A). Our findings", "start_char_pos": 1056, "end_char_pos": 1072}, {"type": "R", "before": "verify", "after": "test", "start_char_pos": 1108, "end_char_pos": 1114}, {"type": "R", "before": ", while our", "after": "in a falsifiable manner", "start_char_pos": 1154, "end_char_pos": 1165}, {"type": "A", "before": null, "after": "Leavitt and Morcos, 2020", "start_char_pos": 1166, "end_char_pos": 1166}, {"type": "A", "before": null, "after": ". Additionally, we believe that the DiffROAR", "start_char_pos": 1167, "end_char_pos": 1167}, {"type": "R", "before": "synthetic dataset serve as a testbed to rigorously analyze", "after": "BlockMNIST-based datasets can serve as sanity checks to audit", "start_char_pos": 1193, "end_char_pos": 1251}], "sents_char_pos": [0, 382, 747, 915, 1055]}
+{"doc_id": "2103.00483", "revision_depth": "1", "before_revision": " GPS coordinates and other location indicators are fine-grained location indicators that are difficult to be effectively utilized by machine learning models in Geo-aware applications. Previous location embedding methods are mostly tailored for specific problems that are taken place within areas of interest. When it comes to the scale of the entire cities , existing approaches always suffer from extensive computational cost and signigicant information loss. An increasing amount of location-based service (LBS) data are being accumulated and released to the public and enables us to study urban dynamics and human mobility. This study learns vector representations for locations using the large-scale LBS data. Different from existing studies, we propose to consider both spatial connection and human mobility , and jointly learn the representations from a flow graph and a spatial graph through a GCN-aided skip-gram model named GCN-L2V. This model embeds context information in human mobility and spatial information. By doing so, GCN-L2V is able to capture relationships among locations and provide a better notion of semantic similarity in a spatial environment. Across quantitative experiments and case studies, we empirically demonstrate that the representations learned by GCN-L2V are effective. GCN-L2V can be applied in a complementary manner to other place embedding methods and down-streaming Geo-aware applications.", "after_revision": "An increasing amount of location-based service (LBS) data is being accumulated and helps to study urban dynamics and human mobility. GPS coordinates and other location indicators are normally low dimensional and only representing spatial proximity, thus difficult to be effectively utilized by machine learning models in Geo-aware applications. Existing location embedding methods are mostly tailored for specific problems that are taken place within areas of interest. When it comes to the scale of a city or even a country , existing approaches always suffer from extensive computational cost and significant data sparsity. Different from existing studies, we propose to learn representations through a GCN-aided skip-gram model named GCN-L2V by considering both spatial connection and human mobility . With a flow graph and a spatial graph , it embeds context information into vector representations. GCN-L2V is able to capture relationships among locations and provide a better notion of similarity in a spatial environment. Across quantitative experiments and case studies, we empirically demonstrate that representations learned by GCN-L2V are effective. As far as we know, this is the first study that provides a fine-grained location embedding at the city level using only LBS records. GCN-L2V is a general-purpose embedding model with high flexibility and can be applied in down-streaming Geo-aware applications.", "edit_actions": [{"type": "A", "before": null, "after": "An increasing amount of location-based service (LBS) data is being accumulated and helps to study urban dynamics and human mobility.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "fine-grained location indicators that are", "after": "normally low dimensional and only representing spatial proximity, thus", "start_char_pos": 51, "end_char_pos": 92}, {"type": "R", "before": "Previous", "after": "Existing", "start_char_pos": 184, "end_char_pos": 192}, {"type": "R", "before": "the entire cities", "after": "a city or even a country", "start_char_pos": 339, "end_char_pos": 356}, {"type": "R", "before": "signigicant information loss. An increasing amount of location-based service (LBS) data are being accumulated and released to the public and enables us to study urban dynamics and human mobility. This study learns vector representations for locations using the large-scale LBS data.", "after": "significant data sparsity.", "start_char_pos": 431, "end_char_pos": 713}, {"type": "R", "before": "consider", "after": "learn representations through a GCN-aided skip-gram model named GCN-L2V by considering", "start_char_pos": 761, "end_char_pos": 769}, {"type": "R", "before": ", and jointly learn the representations from", "after": ". With", "start_char_pos": 813, "end_char_pos": 857}, {"type": "R", "before": "through a GCN-aided skip-gram model named GCN-L2V. This model", "after": ", it", "start_char_pos": 891, "end_char_pos": 952}, {"type": "R", "before": "in human mobility and spatial information. By doing so,", "after": "into vector representations.", "start_char_pos": 980, "end_char_pos": 1035}, {"type": "D", "before": "semantic", "after": null, "start_char_pos": 1124, "end_char_pos": 1132}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1252, "end_char_pos": 1255}, {"type": "A", "before": null, "after": "As far as we know, this is the first study that provides a fine-grained location embedding at the city level using only LBS records.", "start_char_pos": 1306, "end_char_pos": 1306}, {"type": "A", "before": null, "after": "is a general-purpose embedding model with high flexibility and", "start_char_pos": 1315, "end_char_pos": 1315}, {"type": "D", "before": "a complementary manner to other place embedding methods and", "after": null, "start_char_pos": 1334, "end_char_pos": 1393}], "sents_char_pos": [0, 183, 308, 460, 626, 713, 941, 1022, 1169, 1305]}
+{"doc_id": "2103.01280", "revision_depth": "1", "before_revision": "This paper discusses the problem of estimation and inference on time-varying treatments . We propose a method for inference on treatment histories, by introducing adynamic covariate balancing method . Our approach allows for (i) treatments to propagate arbitrarily over time ; (ii) non-stationarity and heterogeneity of treatment effects ; (iii) high-dimensional covariates , and (iv) unknown propensity score functions . We study the asymptotic properties of the estimator, and we showcase the parametric convergence rate of the proposed procedure. We illustrate in simulations and an empirical application the advantage of the method over state-of-the-art competitors.", "after_revision": "This paper discusses the problem of estimation and inference on the effects of time-varying treatment . We propose a method for inference on the effects treatment histories, introducing a dynamic covariate balancing method combined with penalized regression . Our approach allows for (i) treatments to be assigned based on arbitrary past information, with the propensity score being unknown ; (ii) outcomes and time-varying covariates to depend on treatment trajectories ; (iii) high-dimensional covariates ; (iv) heterogeneity of treatment effects . We study the asymptotic properties of the estimator, and we derive the parametric convergence rate of the proposed procedure. Simulations and an empirical application illustrate the advantage of the method over state-of-the-art competitors.", "edit_actions": [{"type": "A", "before": null, "after": "the effects of", "start_char_pos": 64, "end_char_pos": 64}, {"type": "R", "before": "treatments", "after": "treatment", "start_char_pos": 78, "end_char_pos": 88}, {"type": "A", "before": null, "after": "the effects", "start_char_pos": 128, "end_char_pos": 128}, {"type": "D", "before": "by introducing a", "after": null, "start_char_pos": 150, "end_char_pos": 166}, {"type": "R", "before": "dynamic", "after": "introducing a dynamic", "start_char_pos": 166, "end_char_pos": 173}, {"type": "A", "before": null, "after": "combined with penalized regression", "start_char_pos": 201, "end_char_pos": 201}, {"type": "R", "before": "propagate arbitrarily over time", "after": "be assigned based on arbitrary past information, with the propensity score being unknown", "start_char_pos": 246, "end_char_pos": 277}, {"type": "R", "before": "non-stationarity and heterogeneity of treatment effects", "after": "outcomes and time-varying covariates to depend on treatment trajectories", "start_char_pos": 285, "end_char_pos": 340}, {"type": "R", "before": ", and", "after": ";", "start_char_pos": 377, "end_char_pos": 382}, {"type": "R", "before": "unknown propensity score functions", "after": "heterogeneity of treatment effects", "start_char_pos": 388, "end_char_pos": 422}, {"type": "R", "before": "showcase", "after": "derive", "start_char_pos": 485, "end_char_pos": 493}, {"type": "R", "before": "We illustrate in simulations", "after": "Simulations", "start_char_pos": 553, "end_char_pos": 581}, {"type": "A", "before": null, "after": "illustrate", "start_char_pos": 611, "end_char_pos": 611}], "sents_char_pos": [0, 90, 203, 279, 342, 424, 552]}
+{"doc_id": "2103.02503", "revision_depth": "1", "before_revision": "Generalization to out-of-distribution (OOD) data is a capability natural to humans yet challenging for machines to reproduce . This is because most statistical learning algorithms strongly rely on the i.i.d.~assumption while in practice the target data often come from a different distribution than the source data , known as domain shift . Domain generalization (DG) aims to achieve OOD generalization by only using source domain data for model learning. Since first introduced in 2011, research in DG has undergone a decade progress. Ten years of research in this topic have led to a broad spectrum of methodologies, e.g., based on domain alignment, meta-learning, data augmentation, or ensemble learning, just to name a few; and have covered various applications such as object recognition, segmentation, action recognition, and person re-identification. In this paper, for the first time, a comprehensive literature review is provided to summarize the ten-year development in DG . First, we cover the background by giving the problem definitions and discussing how DG is related to other fields like domain adaptation and transfer learning. Second, we conduct a thorough review into existing methods and present a taxonomy based on their methodologies and motivations. Finally, we conclude this survey with potential research directions.", "after_revision": "Generalization to out-of-distribution (OOD) data is a capability natural to humans yet challenging for machines . This is because most statistical learning algorithms strongly rely on the i.i.d.~assumption on source/target data, while in practice the target data often come from a different distribution than the source data . Domain generalization (DG) aims to achieve OOD generalization by using only source data for model learning. Since first introduced in 2011, research in DG has made great progresses. In particular, intensive research in this topic has led to a broad spectrum of methodologies, e.g., those based on domain alignment, meta-learning, data augmentation, or ensemble learning, just to name a few; and has covered various applications such as object recognition, segmentation, action recognition, and person re-identification. In this paper, for the first time, a comprehensive literature review is provided to summarize the developments in DG in the past decade. Specifically, we first cover the background by formally defining DG and relating it to other research fields like domain adaptation and transfer learning. Second, we conduct a thorough review into existing methods and present a categorization based on their methodologies and motivations. Finally, we conclude this survey with insights and discussions on future research directions.", "edit_actions": [{"type": "D", "before": "to reproduce", "after": null, "start_char_pos": 112, "end_char_pos": 124}, {"type": "A", "before": null, "after": "on source/target data,", "start_char_pos": 219, "end_char_pos": 219}, {"type": "D", "before": ", known as domain shift", "after": null, "start_char_pos": 316, "end_char_pos": 339}, {"type": "R", "before": "only using source domain", "after": "using only source", "start_char_pos": 407, "end_char_pos": 431}, {"type": "R", "before": "undergone a decade progress. Ten years of", "after": "made great progresses. In particular, intensive", "start_char_pos": 508, "end_char_pos": 549}, {"type": "R", "before": "have", "after": "has", "start_char_pos": 573, "end_char_pos": 577}, {"type": "A", "before": null, "after": "those", "start_char_pos": 626, "end_char_pos": 626}, {"type": "R", "before": "have", "after": "has", "start_char_pos": 734, "end_char_pos": 738}, {"type": "R", "before": "ten-year development in DG . First, we", "after": "developments in DG in the past decade. Specifically, we first", "start_char_pos": 958, "end_char_pos": 996}, {"type": "R", "before": "giving the problem definitions and discussing how DG is related to other", "after": "formally defining DG and relating it to other research", "start_char_pos": 1021, "end_char_pos": 1093}, {"type": "R", "before": "taxonomy", "after": "categorization", "start_char_pos": 1220, "end_char_pos": 1228}, {"type": "R", "before": "potential", "after": "insights and discussions on future", "start_char_pos": 1313, "end_char_pos": 1322}], "sents_char_pos": [0, 126, 456, 536, 729, 859, 1146, 1274]}
+{"doc_id": "2103.03638", "revision_depth": "1", "before_revision": "Formal verification of neural networks is critical for their safe adoption in real-world applications. However, designing a verifier which can handle realistic networks in a precise manner remains an open and difficult challenge. In this paper, we take a major step in addressing this challenge and present a new framework, called PRIMA , that computes precise convex approximations of arbitrary non-linear activations. PRIMA is based on novel approximation algorithms that compute the convex hull of polytopes, leveraging concepts from computational geometry. The algorithms have polynomial complexity, yield fewer constraints, and minimize precision loss. We evaluate the effectiveness of PRIMA on challenging neural networks with ReLU, Sigmoid, and Tanh activations . Our results show that PRIMA is significantly more precise than the state-of-the-art, verifying robustness for up to 16 \\%, 30\\%, and 34\\% more images than prior work on ReLU-, Sigmoid-, and Tanh-based networks, respectively .", "after_revision": "Formal verification of neural networks is critical for their safe and secure adoption in real-world applications. However, designing a precise and scalable verifier which can handle different activation functions, realistic network architectures and relevant specifications remains an open and difficult challenge. In this paper, we take a major step in addressing this challenge and present a new verification framework, called PRIMA . PRIMA is both (i) general: it handles any non-linear activation function, and (ii) precise: it computes precise convex approximations involving multiple neurons via novel convex hull approximation algorithms that leverage concepts from computational geometry. The algorithms have polynomial complexity, yield fewer constraints, and minimize precision loss. We evaluate the effectiveness of PRIMA on a variety of challenging image classifiers from prior work . Our results show that PRIMA is significantly more precise than state-of-the-art, verifying robustness for up to 14 \\%, 30\\%, and 34\\% more images than existing work on ReLU-, Sigmoid-, and Tanh-based networks, respectively . Further, PRIMA enables, for the first time, precise verification of a realistic neural network for autonomous driving within a few minutes .", "edit_actions": [{"type": "A", "before": null, "after": "and secure", "start_char_pos": 66, "end_char_pos": 66}, {"type": "A", "before": null, "after": "precise and scalable", "start_char_pos": 125, "end_char_pos": 125}, {"type": "R", "before": "realistic networks in a precise manner", "after": "different activation functions, realistic network architectures and relevant specifications", "start_char_pos": 152, "end_char_pos": 190}, {"type": "A", "before": null, "after": "verification", "start_char_pos": 315, "end_char_pos": 315}, {"type": "R", "before": ", that", "after": ". PRIMA is both (i) general: it handles any non-linear activation function, and (ii) precise: it", "start_char_pos": 340, "end_char_pos": 346}, {"type": "R", "before": "of arbitrary non-linear activations. PRIMA is based on novel", "after": "involving multiple neurons via novel convex hull", "start_char_pos": 386, "end_char_pos": 446}, {"type": "R", "before": "compute the convex hull of polytopes, leveraging", "after": "leverage", "start_char_pos": 477, "end_char_pos": 525}, {"type": "R", "before": "challenging neural networks with ReLU, Sigmoid, and Tanh activations", "after": "a variety of challenging image classifiers from prior work", "start_char_pos": 703, "end_char_pos": 771}, {"type": "D", "before": "the", "after": null, "start_char_pos": 837, "end_char_pos": 840}, {"type": "R", "before": "16", "after": "14", "start_char_pos": 890, "end_char_pos": 892}, {"type": "R", "before": "prior", "after": "existing", "start_char_pos": 929, "end_char_pos": 934}, {"type": "A", "before": null, "after": ". Further, PRIMA enables, for the first time, precise verification of a realistic neural network for autonomous driving within a few minutes", "start_char_pos": 998, "end_char_pos": 998}], "sents_char_pos": [0, 103, 231, 422, 563, 660, 773]}
+{"doc_id": "2103.06228", "revision_depth": "2", "before_revision": "Mass vaccination offers a promising exit strategy for the COVID-19 pandemic. However, as vaccination progresses, demands to lift restrictions increase, despite most of the population still being susceptible. Using our age-stratified model and curated epidemiological and vaccination data, we quantified at which pace European countries can lift restrictions without overwhelming their health-care systems. The analysed scenarios range from immediately lifting restriction (accepting high mortality and morbidity) to reducing case numbers until test-trace-and-isolate programs facilitate control . In general, the age-dependent vaccination roll-out implies a transient decrease in the average age of ICU patients and deaths by about seven years . The pace of vaccination determines the speed of lifting restrictions; all scenarios allow to steadily increase contacts starting in May 2021 and relax most restrictions by autumn 2021. Throughout summer , only moderate contact restrictions remain necessary. However, with the assumed vaccination protection, further waves among the unvaccinated population can only be avoided with high vaccine uptake (>90%DIFDELCMD < \\\\%%% %DIF < ). Strategies that maintain low case numbers instead of high ones reduce infections and deaths by a factor of eight and four. Policies with low case numbers significantly benefit from vaccination, as the overall reduction in susceptibility will further diminish viral spread. Keeping case numbers low is the safest long-term strategy because it i) considerably reduces mortality and morbidity, ii) offers better preparedness against escape virus variants, and iii) allows higher contact numbers (\"freedom\") over the summer.\\end{abstract} ", "after_revision": "Mass vaccination offers a promising exit strategy for the COVID-19 pandemic. However, as vaccination progresses, demands to lift restrictions increase, despite most of the population remaining susceptible. Using our age-stratified SEIRD-ICU compartmental model and curated epidemiological and vaccination data, we quantified the rate (relative to vaccination progress) at which countries from the European Union (EU) can lift non-pharmaceutical interventions without overwhelming their healthcare systems. We analyzed scenarios ranging from immediately lifting restrictions (accepting high mortality and morbidity) to reducing case numbers to a level where test-trace-and-isolate (TTI) programs efficiently compensate for local spreading events . In general, the age-dependent vaccination roll-out implies a transient decrease of more than ten years in the average age of ICU patients and deceased . The pace of vaccination determines the speed of lifting restrictions; all considered scenarios allow for steadily increasing contacts starting in May 2021 and relaxing most restrictions by autumn 2021. Throughout summer 2021, only mild contact restrictions will remain necessary. However, %DIFDELCMD < \\\\%%% %DIF < ). Strategies that maintain low case numbers instead of high ones reduce infections and deaths by a factor of eight and four. Policies with low case numbers significantly benefit from vaccination, as the overall reduction in susceptibility will further diminish viral spread. Keeping case numbers low is the safest long-term strategy because it i) considerably reduces mortality and morbidity, ii) offers better preparedness against escape virus variants, and iii) allows higher contact numbers (\"freedom\") over the summer.\\end{abstract} only high vaccine uptake can prevent further severe waves. Across EU countries, seroprevalence impacts the long-term success of vaccination campaigns more strongly than age demographics. In addition, we highlight the need for preventive measures to reduce contagion in school settings throughout the year 2021, where children might be drivers of contagion because of them remaining susceptible. Strategies that maintain low case numbers, instead of high ones, reduce infections and deaths by factors of eleven and five, respectively...", "edit_actions": [{"type": "R", "before": "still being", "after": "remaining", "start_char_pos": 183, "end_char_pos": 194}, {"type": "A", "before": null, "after": "SEIRD-ICU compartmental", "start_char_pos": 233, "end_char_pos": 233}, {"type": "R", "before": "at which pace European countries can lift restrictions", "after": "the rate (relative to vaccination progress) at which countries from the European Union (EU) can lift non-pharmaceutical interventions", "start_char_pos": 304, "end_char_pos": 358}, {"type": "R", "before": "health-care systems. The analysed scenarios range", "after": "healthcare systems. We analyzed scenarios ranging", "start_char_pos": 386, "end_char_pos": 435}, {"type": "R", "before": "restriction", "after": "restrictions", "start_char_pos": 461, "end_char_pos": 472}, {"type": "R", "before": "until", "after": "to a level where", "start_char_pos": 539, "end_char_pos": 544}, {"type": "R", "before": "programs facilitate control", "after": "(TTI) programs efficiently compensate for local spreading events", "start_char_pos": 568, "end_char_pos": 595}, {"type": "A", "before": null, "after": "of more than ten years", "start_char_pos": 678, "end_char_pos": 678}, {"type": "R", "before": "deaths by about seven years", "after": "deceased", "start_char_pos": 718, "end_char_pos": 745}, {"type": "R", "before": "scenarios allow to steadily increase", "after": "considered scenarios allow for steadily increasing", "start_char_pos": 822, "end_char_pos": 858}, {"type": "R", "before": "relax", "after": "relaxing", "start_char_pos": 893, "end_char_pos": 898}, {"type": "R", "before": ", only moderate contact restrictions", "after": "2021, only mild contact restrictions will", "start_char_pos": 951, "end_char_pos": 987}, {"type": "D", "before": "with the assumed vaccination protection, further waves among the unvaccinated population can only be avoided with high vaccine uptake (>90", "after": null, "start_char_pos": 1015, "end_char_pos": 1153}, {"type": "A", "before": null, "after": "only high vaccine uptake can prevent further severe waves. Across EU countries, seroprevalence impacts the long-term success of vaccination campaigns more strongly than age demographics. In addition, we highlight the need for preventive measures to reduce contagion in school settings throughout the year 2021, where children might be drivers of contagion because of them remaining susceptible. Strategies that maintain low case numbers, instead of high ones, reduce infections and deaths by factors of eleven and five, respectively...", "start_char_pos": 1717, "end_char_pos": 1717}], "sents_char_pos": [0, 76, 207, 406, 597, 747, 817, 932, 1005, 1181, 1304, 1454, 1702]}
+{"doc_id": "2103.06487", "revision_depth": "1", "before_revision": "Deep learning has shown impressive performance on challenging perceptual tasks . However, researchers found deep neural networks vulnerable to adversarial examples. Since then, many methods are proposed to defend against or detect adversarial examples , but they are either attack-dependent or shown to be ineffective with new attacks. We propose DAFAR, a feedback framework that allows deep learning models to detect adversarial examples in high accuracy and universality . DAFAR has a relatively simple structure, which contains a target network , a plug-in feedback network and an autoencoder-based detector. The key idea is to capture the high-level features extracted by the target network , and then reconstruct the input using the feedback network. These two parts constitute a feedback autoencoder. It transforms the imperceptible-perturbation attack on the target network directly into obvious reconstruction-error attack on the feedback autoencoder . Finally the detector gives an anomaly score and determines whether the input is adversarial according to the reconstruction errors . Experiments are conducted on MNIST and CIFAR-10 data-sets . Experimental results show that DAFAR is effective against popular and arguably most advanced attacks without losing performance on legitimate samples, with high accuracy and universality across attack methods and parameters.", "after_revision": "Deep learning has shown impressive performance on challenging perceptual tasks and has been widely used in software to provide intelligent services . However, researchers found deep neural networks vulnerable to adversarial examples. Since then, many methods are proposed to defend against adversaries in inputs , but they are either attack-dependent or shown to be ineffective with new attacks. And most of existing techniques have complicated structures or mechanisms that cause prohibitively high overhead or latency, impractical to apply on real software. We propose DAFAR, a feedback framework that allows deep learning models to detect /purify adversarial examples in high effectiveness and universality, with low area and time overhead . DAFAR has a simple structure, containing a victim model , a plug-in feedback network , and a detector. The key idea is to import the high-level features from the victim model's feature extraction layers into the feedback network to reconstruct the input . This data stream forms a feedback autoencoder. For strong attacks, it transforms the imperceptible attack on the victim model into the obvious reconstruction-error attack on the feedback autoencoder directly, which is much easier to detect; for weak attacks, the reformation process destroys the structure of adversarial examples . Experiments are conducted on MNIST and CIFAR-10 data-sets , showing that DAFAR is effective against popular and arguably most advanced attacks without losing performance on legitimate samples, with high effectiveness and universality across attack methods and parameters.", "edit_actions": [{"type": "A", "before": null, "after": "and has been widely used in software to provide intelligent services", "start_char_pos": 79, "end_char_pos": 79}, {"type": "R", "before": "or detect adversarial examples", "after": "adversaries in inputs", "start_char_pos": 222, "end_char_pos": 252}, {"type": "A", "before": null, "after": "And most of existing techniques have complicated structures or mechanisms that cause prohibitively high overhead or latency, impractical to apply on real software.", "start_char_pos": 337, "end_char_pos": 337}, {"type": "A", "before": null, "after": "/purify", "start_char_pos": 420, "end_char_pos": 420}, {"type": "R", "before": "accuracy and universality", "after": "effectiveness and universality, with low area and time overhead", "start_char_pos": 450, "end_char_pos": 475}, {"type": "D", "before": "relatively", "after": null, "start_char_pos": 490, "end_char_pos": 500}, {"type": "R", "before": "which contains a target network", "after": "containing a victim model", "start_char_pos": 519, "end_char_pos": 550}, {"type": "R", "before": "and an autoencoder-based", "after": ", and a", "start_char_pos": 580, "end_char_pos": 604}, {"type": "R", "before": "capture", "after": "import", "start_char_pos": 634, "end_char_pos": 641}, {"type": "R", "before": "extracted by the target network , and then", "after": "from the victim model's feature extraction layers into the feedback network to", "start_char_pos": 666, "end_char_pos": 708}, {"type": "R", "before": "using the feedback network. These two parts constitute", "after": ". This data stream forms", "start_char_pos": 731, "end_char_pos": 785}, {"type": "R", "before": "It transforms the imperceptible-perturbation", "after": "For strong attacks, it transforms the imperceptible", "start_char_pos": 810, "end_char_pos": 854}, {"type": "R", "before": "target network directly into", "after": "victim model into the", "start_char_pos": 869, "end_char_pos": 897}, {"type": "R", "before": ". Finally the detector gives an anomaly score and determines whether the input is adversarial according to the reconstruction errors", "after": "directly, which is much easier to detect; for weak attacks, the reformation process destroys the structure of adversarial examples", "start_char_pos": 962, "end_char_pos": 1094}, {"type": "R", "before": ". Experimental results show", "after": ", showing", "start_char_pos": 1155, "end_char_pos": 1182}, {"type": "R", "before": "accuracy", "after": "effectiveness", "start_char_pos": 1318, "end_char_pos": 1326}], "sents_char_pos": [0, 81, 165, 336, 614, 758, 809, 824, 1307]}
+{"doc_id": "2103.07722", "revision_depth": "2", "before_revision": "Heparin is administered intravenously as an anticoagulant to COVID-19 patients and via aerosol to treat other lung diseases. It has recently been found to have antiviral activity against SARS-CoV-2 as it hinders attachment of the virus to the host cell by binding to the virus spike glycoprotein . Here, we describe molecular dynamics simulations and experiments to investigate how heparin binds to the spike and the mechanism by which it exerts its antiviral activity. The simulations show that heparin polyanionic chains can bind at long, mostly positively charged patches on the spike, and thereby mask the basic residues of the receptor binding domain and the basic S1/S2 site , which is unique specific to SAR-CoV-2 and is important for furin-mediated spike cleavage and the subsequent formation of its post-fusion conformation . Experiments corroborated the simulation results by showing that heparin binds the basic S1/S2 site of spike, inhibiting cleavage by furin. The simulations show that heparin can act on the hinge region responsible for the motion of the RBD between inactive closed and active open conformations of the spike. In simulations of the closed spike, heparin binds the RBD and the N-terminal domain of two adjacent spike subunits and hinders the opening. In simulations of the open spike, heparin binds similarly but induces stabilization of the hinge region and a change in RBD motion. Our results indicate that heparin is able to inhibit SARS-CoV-2 infection by allosterically hindering binding to the host cell receptor, by directly competing with binding to the host heparan sulfate proteoglycan co-receptors, and by preventing spike cleavage by furin . Furthermore, the simulations provide insights into how heparan sulphate proteoglycans on the host cell can facilitate viral infection. Our results will aid the rational optimization of heparin derivatives for SARS-CoV-2 antiviral therapy.", "after_revision": "Heparin has been found to have antiviral activity against SARS-CoV-2 . Here, by means of sliding window docking, molecular dynamics simulations and biochemical assays, we investigate the binding mode of heparin to the virus spike glycoprotein and the molecular basis for its antiviral activity. The simulations show that heparin binds at long, mostly positively charged patches on the spike, thereby masking the basic residues of the receptor binding domain and of the S1/S2 site . Experiments corroborated the simulation results by showing that heparin inhibits the cleavage of spike by furin by binding to the basic S1/S2 site . Our results indicate that heparin exerts its antiviral activity by both direct and allosteric mechanisms . Furthermore, the simulations provide insights into how heparan sulfate proteoglycans on the host cell can facilitate viral infection. Our results will aid the rational optimization of heparin derivatives for SARS-CoV-2 antiviral therapy.", "edit_actions": [{"type": "R", "before": "is administered intravenously as an anticoagulant to COVID-19 patients and via aerosol to treat other lung diseases. It has recently", "after": "has", "start_char_pos": 8, "end_char_pos": 140}, {"type": "D", "before": "as it hinders attachment of the virus to the host cell by binding to the virus spike glycoprotein", "after": null, "start_char_pos": 198, "end_char_pos": 295}, {"type": "R", "before": "we describe", "after": "by means of sliding window docking,", "start_char_pos": 304, "end_char_pos": 315}, {"type": "R", "before": "experiments to investigate how heparin binds to the spike and", "after": "biochemical assays, we investigate the binding mode of heparin to", "start_char_pos": 351, "end_char_pos": 412}, {"type": "R", "before": "mechanism by which it exerts", "after": "virus spike glycoprotein and the molecular basis for", "start_char_pos": 417, "end_char_pos": 445}, {"type": "R", "before": "polyanionic chains can bind", "after": "binds", "start_char_pos": 504, "end_char_pos": 531}, {"type": "R", "before": "and thereby mask", "after": "thereby masking", "start_char_pos": 589, "end_char_pos": 605}, {"type": "R", "before": "the basic", "after": "of the", "start_char_pos": 660, "end_char_pos": 669}, {"type": "D", "before": ", which is unique specific to SAR-CoV-2 and is important for furin-mediated spike cleavage and the subsequent formation of its post-fusion conformation", "after": null, "start_char_pos": 681, "end_char_pos": 832}, {"type": "R", "before": "binds the", "after": "inhibits the cleavage of spike by furin by binding to the", "start_char_pos": 907, "end_char_pos": 916}, {"type": "R", "before": "of spike, inhibiting cleavage by furin. The simulations show that heparin can act on the hinge region responsible for the motion of the RBD between inactive closed and active open conformations of the spike. In simulations of the closed spike, heparin binds the RBD and the N-terminal domain of two adjacent spike subunits and hinders the opening. In simulations of the open spike, heparin binds similarly but induces stabilization of the hinge region and a change in RBD motion.", "after": ".", "start_char_pos": 934, "end_char_pos": 1413}, {"type": "R", "before": "is able to inhibit SARS-CoV-2 infection by allosterically hindering binding to the host cell receptor, by directly competing with binding to the host heparan sulfate proteoglycan co-receptors, and by preventing spike cleavage by furin", "after": "exerts its antiviral activity by both direct and allosteric mechanisms", "start_char_pos": 1448, "end_char_pos": 1682}, {"type": "R", "before": "sulphate", "after": "sulfate", "start_char_pos": 1748, "end_char_pos": 1756}], "sents_char_pos": [0, 124, 297, 469, 540, 973, 1141, 1281, 1413, 1684, 1819]}
+{"doc_id": "2103.09655", "revision_depth": "1", "before_revision": "Physics-Informed Neural Networks (PINN) are neural networks that encode the problem governing equations, such as Partial Differential Equations (PDE), as a part of the neural network training . PINNs have emerged as an essential tool to solve various challenging problems, such as computing linear and non-linear PDEs, completing data assimilation and uncertainty quantification tasks . In this work, we focus on evaluating the PINN potential to replace or accelerate traditional approaches for solving linear systems. We solve the Poisson equation, one of the most critical and computational-intensive tasks in scientific computing , with different source terms. We test and evaluate PINN performance under different configurations (depth, activation functions, input data set distribution , and transfer learningimpact). We show how to integrate PINN with traditional scientific computing approaches , such as multigrid and Gauss-Seidel methods. While the accuracy and computational performance is still a limiting factor for the direct use of PINN for solving , hybrid strategies are a viable option for the development of a new class of linear solvers combining emerging deep-learning and traditional scientific computing approaches .", "after_revision": "Physics-Informed Neural Networks (PINN) are neural networks encoding the problem governing equations, such as Partial Differential Equations (PDE), as a part of the neural network . PINNs have emerged as a new essential tool to solve various challenging problems, including computing linear systems arising from PDEs, a task for which several traditional methods exist . In this work, we focus first on evaluating the potential of PINNs as linear solvers in the case of the Poisson equation, an omnipresent equation in scientific computing . We characterize PINN linear solvers in terms of accuracy and performance under different network configurations (depth, activation functions, input data set distribution ). We highlight the critical role of transfer learning. Our results show that low-frequency components of the solution converge quickly as an effect of the F-principle. In contrast, an accurate solution of the high frequencies requires an exceedingly long time. To address this limitation, we propose integrating PINNs into traditional linear solvers. We show that this integration leads to the development of new solvers whose performance is on par with other high-performance solvers , such as PETSc conjugate gradient linear solvers, in terms of performance and accuracy. Overall, while the accuracy and computational performance are still a limiting factor for the direct use of PINN linear solvers , hybrid strategies combining old traditional linear solver approaches with new emerging deep-learning techniques are among the most promising methods for developing a new class of linear solvers .", "edit_actions": [{"type": "R", "before": "that encode", "after": "encoding", "start_char_pos": 60, "end_char_pos": 71}, {"type": "D", "before": "training", "after": null, "start_char_pos": 183, "end_char_pos": 191}, {"type": "R", "before": "an", "after": "a new", "start_char_pos": 216, "end_char_pos": 218}, {"type": "R", "before": "such as computing linear and non-linear PDEs, completing data assimilation and uncertainty quantification tasks", "after": "including computing linear systems arising from PDEs, a task for which several traditional methods exist", "start_char_pos": 273, "end_char_pos": 384}, {"type": "A", "before": null, "after": "first", "start_char_pos": 410, "end_char_pos": 410}, {"type": "R", "before": "PINN potential to replace or accelerate traditional approaches for solving linear systems. We solve the", "after": "potential of PINNs as linear solvers in the case of the", "start_char_pos": 429, "end_char_pos": 532}, {"type": "R", "before": "one of the most critical and computational-intensive tasks", "after": "an omnipresent equation", "start_char_pos": 551, "end_char_pos": 609}, {"type": "R", "before": ", with different source terms. We test and evaluate PINN", "after": ". We characterize PINN linear solvers in terms of accuracy and", "start_char_pos": 634, "end_char_pos": 690}, {"type": "A", "before": null, "after": "network", "start_char_pos": 719, "end_char_pos": 719}, {"type": "R", "before": ", and transfer learningimpact). We show how to integrate PINN with traditional scientific computing approaches", "after": "). We highlight the critical role of transfer learning. Our results show that low-frequency components of the solution converge quickly as an effect of the F-principle. In contrast, an accurate solution of the high frequencies requires an exceedingly long time. To address this limitation, we propose integrating PINNs into traditional linear solvers. We show that this integration leads to the development of new solvers whose performance is on par with other high-performance solvers", "start_char_pos": 793, "end_char_pos": 903}, {"type": "R", "before": "multigrid and Gauss-Seidel methods. While", "after": "PETSc conjugate gradient linear solvers, in terms of performance and accuracy. Overall, while", "start_char_pos": 914, "end_char_pos": 955}, {"type": "R", "before": "is", "after": "are", "start_char_pos": 999, "end_char_pos": 1001}, {"type": "R", "before": "for solving", "after": "linear solvers", "start_char_pos": 1053, "end_char_pos": 1064}, {"type": "R", "before": "are a viable option for the development of", "after": "combining old traditional linear solver approaches with new emerging deep-learning techniques are among the most promising methods for developing", "start_char_pos": 1085, "end_char_pos": 1127}, {"type": "D", "before": "combining emerging deep-learning and traditional scientific computing approaches", "after": null, "start_char_pos": 1158, "end_char_pos": 1238}], "sents_char_pos": [0, 386, 519, 664, 824, 949]}
+{"doc_id": "2103.14082", "revision_depth": "1", "before_revision": "While the beta-VAE family is aiming to find disentangled representations and acquire human-interpretable generative factors, like what an ICA does in the linear domain , we propose Full Encoder : a novel unified autoencoder framework as a correspondence to PCA in the non-linear domain. The idea is to train an autoencoder with one latent variable first, then involve more latent variables progressively to refine the reconstruction results. The latent variables acquired with Full Encoder is stable and robust, as they always learn the same representation regardless the network initial states. Full Encoder can be used to determine the degrees of freedom in a non-linear system , and is useful for data compression or anomaly detection. Full Encoder can also be combined with beta-VAE framework to sort out the importance of the generative factors, providing more insights for non-linear system analysis. We created a toy dataset with a non-linear system to test the Full Encoder and compare its results to VAE and beta-VAE's results .", "after_revision": "While the beta-VAE family is aiming to find disentangled representations and acquire human-interpretable generative factors, like what an ICA (from the linear domain ) does , we propose Full Encoder , a novel unified autoencoder framework as a correspondence to PCA in the non-linear domain. The idea is to train an autoencoder with one latent variable first, then involve more latent variables progressively to refine the reconstruction results. The Full Encoder is also a latent variable predictive model that the latent variables acquired are stable and robust, as they always learn the same representation regardless of the network initial states. Full Encoder can be used to determine the degrees of freedom in a simple non-linear system and can be useful for data compression or anomaly detection. Full Encoder can also be combined with the beta-VAE framework to sort out the importance of the generative factors, providing more insights for non-linear system analysis. These qualities will make FE useful for analyzing real-life industrial non-linear systems. To validate, we created a toy dataset with a custom-made non-linear system to test it and compare its properties to those of VAE and beta-VAE's .", "edit_actions": [{"type": "R", "before": "does in", "after": "(from", "start_char_pos": 142, "end_char_pos": 149}, {"type": "A", "before": null, "after": ") does", "start_char_pos": 168, "end_char_pos": 168}, {"type": "R", "before": ":", "after": ",", "start_char_pos": 195, "end_char_pos": 196}, {"type": "D", "before": "latent variables acquired with", "after": null, "start_char_pos": 447, "end_char_pos": 477}, {"type": "A", "before": null, "after": "also a latent variable predictive model that the latent variables acquired are", "start_char_pos": 494, "end_char_pos": 494}, {"type": "A", "before": null, "after": "of", "start_char_pos": 570, "end_char_pos": 570}, {"type": "A", "before": null, "after": "simple", "start_char_pos": 665, "end_char_pos": 665}, {"type": "R", "before": ", and is", "after": "and can be", "start_char_pos": 684, "end_char_pos": 692}, {"type": "A", "before": null, "after": "the", "start_char_pos": 782, "end_char_pos": 782}, {"type": "R", "before": "We", "after": "These qualities will make FE useful for analyzing real-life industrial non-linear systems. To validate, we", "start_char_pos": 912, "end_char_pos": 914}, {"type": "A", "before": null, "after": "custom-made", "start_char_pos": 944, "end_char_pos": 944}, {"type": "R", "before": "the Full Encoder", "after": "it", "start_char_pos": 971, "end_char_pos": 987}, {"type": "R", "before": "results to", "after": "properties to those of", "start_char_pos": 1004, "end_char_pos": 1014}, {"type": "D", "before": "results", "after": null, "start_char_pos": 1034, "end_char_pos": 1041}], "sents_char_pos": [0, 287, 442, 598, 742, 911]}
+{"doc_id": "2103.14250", "revision_depth": "1", "before_revision": "Time series prediction with neural networks have been focus of much research in the past few decades. Given the recent deep learning revolution, there has been much attention in using deep learning models for time series prediction, and hence it is important to evaluate their strengths and weaknesses. In this paper, we present an evaluation study that compares the performance of deep learning models for multi-step ahead time series prediction. Our deep learning methods compromise of simple recurrent neural networks, long short term memory (LSTM) networks, bidirectional LSTM , encoder-decoder LSTM networks, and convolutional neural networks. We also provide comparison with simple neural networks use stochastic gradient descent and adaptive gradient method (Adam) for training. We focus on univariate and multi-step-ahead prediction from benchmark time series datasets and compare with results from from the literature. The results show that bidirectional and encoder-decoder LSTM provide the best performance in accuracy for the given time series problems with different properties .", "after_revision": "Time series prediction with neural networks has been the focus of much research in the past few decades. Given the recent deep learning revolution, there has been much attention in using deep learning models for time series prediction, and hence it is important to evaluate their strengths and weaknesses. In this paper, we present an evaluation study that compares the performance of deep learning models for multi-step ahead time series prediction. The deep learning methods comprise simple recurrent neural networks, long short-term memory (LSTM) networks, bidirectional LSTM networks , encoder-decoder LSTM networks, and convolutional neural networks. We provide a further comparison with simple neural networks that use stochastic gradient descent and adaptive moment estimation (Adam) for training. We focus on univariate time series for multi-step-ahead prediction from benchmark time-series datasets and provide a further comparison of the results with related methods from the literature. The results show that the bidirectional and encoder-decoder LSTM network provides the best performance in accuracy for the given time series problems .", "edit_actions": [{"type": "R", "before": "have been", "after": "has been the", "start_char_pos": 44, "end_char_pos": 53}, {"type": "R", "before": "Our", "after": "The", "start_char_pos": 448, "end_char_pos": 451}, {"type": "R", "before": "compromise of", "after": "comprise", "start_char_pos": 474, "end_char_pos": 487}, {"type": "R", "before": "short term", "after": "short-term", "start_char_pos": 527, "end_char_pos": 537}, {"type": "A", "before": null, "after": "networks", "start_char_pos": 581, "end_char_pos": 581}, {"type": "R", "before": "also provide", "after": "provide a further", "start_char_pos": 653, "end_char_pos": 665}, {"type": "A", "before": null, "after": "that", "start_char_pos": 705, "end_char_pos": 705}, {"type": "R", "before": "gradient method", "after": "moment estimation", "start_char_pos": 751, "end_char_pos": 766}, {"type": "R", "before": "and", "after": "time series for", "start_char_pos": 811, "end_char_pos": 814}, {"type": "R", "before": "time series datasets and compare with results from from", "after": "time-series datasets and provide a further comparison of the results with related methods from", "start_char_pos": 858, "end_char_pos": 913}, {"type": "A", "before": null, "after": "the", "start_char_pos": 952, "end_char_pos": 952}, {"type": "R", "before": "provide", "after": "network provides", "start_char_pos": 992, "end_char_pos": 999}, {"type": "D", "before": "with different properties", "after": null, "start_char_pos": 1068, "end_char_pos": 1093}], "sents_char_pos": [0, 101, 302, 447, 649, 787, 929]}
+{"doc_id": "2103.17119", "revision_depth": "1", "before_revision": "Road-boundary detection is important for autonomous driving. For example, it can be used to constrain vehicles running on road areas , which ensures driving safety. Compared with on-line road-boundary detection using on-vehicle cameras/Lidars, off-line detection using aerial images could alleviate the severe occlusion issue. Moreover, the off-line detection results can be directly used to annotate high-definition (HD) maps. In recent years, deep-learning technologies have been used in off-line detection. But there is still lacking a publicly available dataset for this task, which hinders the research progress in this area. So in this paper, we propose a new benchmark dataset, named \\textit{Topo-boundary}, for off-line topological road-boundary detection. The dataset contains 21,556 1000\\times1000-sized 4-channel aerial images. Each image is provided with 8 training labels for different sub-tasks. We also design a new entropy-based metric for connectivity evaluation, which could better handle noises or outliers. We implement and evaluate 3 segmentation-based baselines and 5 graph-based baselines using the dataset. We also propose a new imitation-learning-based baseline which is enhanced from our previous work. The superiority of our enhancement is demonstrated from the comparison. The dataset and our-implemented codes for the baselines are available at URL", "after_revision": "Road-boundary detection is important for autonomous driving. It can be used to constrain autonomous vehicles running on road areas to ensure driving safety. Compared with online road-boundary detection using on-vehicle cameras/Lidars, offline detection using aerial images could alleviate the severe occlusion issue. Moreover, the offline detection results can be directly employed to annotate high-definition (HD) maps. In recent years, deep-learning technologies have been used in offline detection. But there still lacks a publicly available dataset for this task, which hinders the research progress in this area. So in this paper, we propose a new benchmark dataset, named \\textit{Topo-boundary}, for offline topological road-boundary detection. The dataset contains 25,295 1000\\times1000-sized 4-channel aerial images. Each image is provided with 8 training labels for different sub-tasks. We also design a new entropy-based metric for connectivity evaluation, which could better handle noises or outliers. We implement and evaluate 3 segmentation-based baselines and 5 graph-based baselines using the dataset. We also propose a new imitation-learning-based baseline which is enhanced from our previous work. The superiority of our enhancement is demonstrated from the comparison. The dataset and our-implemented code for the baselines are available at URL", "edit_actions": [{"type": "R", "before": "For example, it", "after": "It", "start_char_pos": 61, "end_char_pos": 76}, {"type": "A", "before": null, "after": "autonomous", "start_char_pos": 102, "end_char_pos": 102}, {"type": "R", "before": ", which ensures", "after": "to ensure", "start_char_pos": 134, "end_char_pos": 149}, {"type": "R", "before": "on-line", "after": "online", "start_char_pos": 180, "end_char_pos": 187}, {"type": "R", "before": "off-line", "after": "offline", "start_char_pos": 245, "end_char_pos": 253}, {"type": "R", "before": "off-line", "after": "offline", "start_char_pos": 342, "end_char_pos": 350}, {"type": "R", "before": "used", "after": "employed", "start_char_pos": 385, "end_char_pos": 389}, {"type": "R", "before": "off-line", "after": "offline", "start_char_pos": 491, "end_char_pos": 499}, {"type": "R", "before": "is still lacking", "after": "still lacks", "start_char_pos": 521, "end_char_pos": 537}, {"type": "R", "before": "off-line", "after": "offline", "start_char_pos": 720, "end_char_pos": 728}, {"type": "R", "before": "21,556", "after": "25,295", "start_char_pos": 787, "end_char_pos": 793}, {"type": "R", "before": "codes", "after": "code", "start_char_pos": 1334, "end_char_pos": 1339}], "sents_char_pos": [0, 60, 165, 327, 428, 510, 631, 765, 839, 910, 1027, 1131, 1229, 1301]}
+{"doc_id": "2104.02921", "revision_depth": "1", "before_revision": "The vision-based reinforcement learning (RL) has achieved tremendous success. However, generalizing vision-based RL policy to unknown test environments still remains as a challengingproblem. Unlike previous works that focus on training a universal RL policy that is invariant to discrepancies between test and training environment, we focus on developing an independent module to disperse interference factors irrelevant to the task, thereby providing \"clean \" observations for the RL policy . The proposed unsupervised visual attention and invariance method (VAI) contains three key components: 1) an unsupervisedkeypoint detection model which captures semantically meaningful keypoints in observations; 2) an unsupervised visual attention module which automatically generates the distraction-invariant attention mask for each observation; 3) a self-supervised adapter for visual distraction invariance which reconstructs distraction-invariant attention mask from observations with artificial disturbances generated by a series of foreground and background augmentations. All components are optimized in an unsupervised way, without manual annotation or access to environment internals, and only the adapter is used during inference time to provide distraction-free observations to RL policy. VAI empirically shows powerful generalization capabilities and significantly outperforms current state-of-the-art (SOTA) method by 15 \\% to 49\\% in DeepMind Control suite benchmark and 61 \\% to 229\\% in our proposed robot manipulation benchmark, in term of cumulative rewards per episode .", "after_revision": "Vision-based reinforcement learning (RL) is successful, but how to generalize it to unknown test environments remains challenging. Existing methods focus on training an RL policy that is universal to changing visual domains, whereas we focus on extracting visual foreground that is universal, feeding clean invariant vision to the RL policy learner. Our method is completely unsupervised, without manual annotations or access to environment internals. Given videos of actions in a training environment, we learn how to extract foregrounds with unsupervised keypoint detection, followed by unsupervised visual attention to automatically generate a foreground mask per video frame. We can then introduce artificial distractors and train a model to reconstruct the clean foreground mask from noisy observations. Only this learned model is needed during test to provide distraction-free visual input to the RL policy learner. Our Visual Attention and Invariance (VAI) method significantly outperforms the state-of-the-art on visual domain generalization, gaining 15 to 49\\% ( 61 to 229\\% ) more cumulative rewards per episode on DeepMind Control (our DrawerWorld Manipulation) benchmarks. Our results demonstrate that it is not only possible to learn domain-invariant vision without any supervision, but freeing RL from visual distractions also makes the policy more focused and thus far better .", "edit_actions": [{"type": "R", "before": "The vision-based", "after": "Vision-based", "start_char_pos": 0, "end_char_pos": 16}, {"type": "R", "before": "has achieved tremendous success. However, generalizing vision-based RL policy to", "after": "is successful, but how to generalize it to", "start_char_pos": 45, "end_char_pos": 125}, {"type": "R", "before": "still remains as a challengingproblem. Unlike previous works that", "after": "remains challenging. Existing methods", "start_char_pos": 152, "end_char_pos": 217}, {"type": "R", "before": "a universal", "after": "an", "start_char_pos": 236, "end_char_pos": 247}, {"type": "R", "before": "invariant to discrepancies between test and training environment,", "after": "universal to changing visual domains, whereas", "start_char_pos": 266, "end_char_pos": 331}, {"type": "R", "before": "developing an independent module to disperse interference factors irrelevant to the task, thereby providing \"clean \" observations for", "after": "extracting visual foreground that is universal, feeding clean invariant vision to", "start_char_pos": 344, "end_char_pos": 477}, {"type": "R", "before": ". The proposed unsupervised visual attention and invariance method (VAI) contains three key components: 1) an unsupervisedkeypoint detection model which captures semantically meaningful keypoints in observations; 2) an", "after": "learner. Our method is completely unsupervised, without manual annotations or access to environment internals. Given videos of actions in a training environment, we learn how to extract foregrounds with unsupervised keypoint detection, followed by", "start_char_pos": 492, "end_char_pos": 710}, {"type": "R", "before": "module which automatically generates the distraction-invariant attention mask for each observation; 3) a self-supervised adapter for visual distraction invariance which reconstructs distraction-invariant attention mask from observations with artificial disturbances generated by a series of foreground and background augmentations. All components are optimized in an unsupervised way, without manual annotation or access to environment internals, and only the adapter is used during inference time", "after": "to automatically generate a foreground mask per video frame. We can then introduce artificial distractors and train a model to reconstruct the clean foreground mask from noisy observations. Only this learned model is needed during test", "start_char_pos": 741, "end_char_pos": 1238}, {"type": "R", "before": "observations to RL policy. VAI empirically shows powerful generalization capabilities and significantly outperforms current state-of-the-art (SOTA) method by", "after": "visual input to the RL policy learner. Our Visual Attention and Invariance (VAI) method significantly outperforms the state-of-the-art on visual domain generalization, gaining", "start_char_pos": 1267, "end_char_pos": 1424}, {"type": "D", "before": "\\%", "after": null, "start_char_pos": 1428, "end_char_pos": 1430}, {"type": "R", "before": "in DeepMind Control suite benchmark and", "after": "(", "start_char_pos": 1439, "end_char_pos": 1478}, {"type": "D", "before": "\\%", "after": null, "start_char_pos": 1482, "end_char_pos": 1484}, {"type": "R", "before": "in our proposed robot manipulation benchmark, in term of", "after": ") more", "start_char_pos": 1494, "end_char_pos": 1550}, {"type": "A", "before": null, "after": "on DeepMind Control (our DrawerWorld Manipulation) benchmarks. Our results demonstrate that it is not only possible to learn domain-invariant vision without any supervision, but freeing RL from visual distractions also makes the policy more focused and thus far better", "start_char_pos": 1582, "end_char_pos": 1582}], "sents_char_pos": [0, 77, 190, 493, 704, 840, 1072, 1293]}
+{"doc_id": "2104.02951", "revision_depth": "1", "before_revision": "We present a hybrid strategy based on deep learning to compute mean curvature in the level-set method. The proposed inference system combines a dictionary of improved regression models with standard numerical schemes to estimate curvature more accurately. The core of our framework is a switching mechanism that relies on well-established numerical techniques to gauge curvature. If the curvature magnitude is larger than a resolution-dependent threshold, it uses a neural network to yield a better approximation. Our networks are multi-layer perceptrons fitted to synthetic data sets composed of circular- and sinusoidal-interface samples at various configurations. To reduce data set size and training complexity, we leverage the problem's characteristic symmetry and build our models on just half of the curvature spectrum. These savings result in compact networks able to outperform any of the system's numerical or neural component alone. Experiments with static interfaces show that our hybrid approach is suitable and notoriously superior to conventional numerical methods in under-resolved and steep, concave regions. Compared to prior research, we have observed outstanding gains in precision after including training data pairs from more than a single interface type and other means of input preprocessing. In particular, our findings confirm that machine learning is a promising venue for devising viable solutions to the level-set method 's numerical shortcomings .", "after_revision": "We present a novel hybrid strategy based on machine learning to improve curvature estimation in the level-set method. The proposed inference system couples enhanced neural networks with standard numerical schemes to compute curvature more accurately. The core of our hybrid framework is a switching mechanism that relies on well established numerical techniques to gauge curvature. If the curvature magnitude is larger than a resolution-dependent threshold, it uses a neural network to yield a better approximation. Our networks are multilayer perceptrons fitted to synthetic data sets composed of sinusoidal- and circular-interface samples at various configurations. To reduce data set size and training complexity, we leverage the problem's characteristic symmetry and build our models on just half of the curvature spectrum. These savings lead to a powerful inference system able to outperform any of its numerical or neural component alone. Experiments with static , smooth interfaces show that our hybrid solver is notably superior to conventional numerical methods in coarse grids and along steep interface regions. Compared to prior research, we have observed outstanding gains in precision after training the regression model with data pairs from more than a single interface type and transforming data with specialized input preprocessing. In particular, our findings confirm that machine learning is a promising venue for reducing or removing mass loss in the level-set method .", "edit_actions": [{"type": "A", "before": null, "after": "novel", "start_char_pos": 13, "end_char_pos": 13}, {"type": "R", "before": "deep learning to compute mean curvature", "after": "machine learning to improve curvature estimation", "start_char_pos": 39, "end_char_pos": 78}, {"type": "R", "before": "combines a dictionary of improved regression models", "after": "couples enhanced neural networks", "start_char_pos": 134, "end_char_pos": 185}, {"type": "R", "before": "estimate", "after": "compute", "start_char_pos": 221, "end_char_pos": 229}, {"type": "A", "before": null, "after": "hybrid", "start_char_pos": 273, "end_char_pos": 273}, {"type": "R", "before": "well-established", "after": "well established", "start_char_pos": 324, "end_char_pos": 340}, {"type": "R", "before": "multi-layer", "after": "multilayer", "start_char_pos": 533, "end_char_pos": 544}, {"type": "R", "before": "circular- and sinusoidal-interface", "after": "sinusoidal- and circular-interface", "start_char_pos": 599, "end_char_pos": 633}, {"type": "R", "before": "result in compact networks", "after": "lead to a powerful inference system", "start_char_pos": 843, "end_char_pos": 869}, {"type": "R", "before": "the system's", "after": "its", "start_char_pos": 896, "end_char_pos": 908}, {"type": "A", "before": null, "after": ", smooth", "start_char_pos": 970, "end_char_pos": 970}, {"type": "R", "before": "approach is suitable and notoriously", "after": "solver is notably", "start_char_pos": 1003, "end_char_pos": 1039}, {"type": "R", "before": "under-resolved and steep, concave", "after": "coarse grids and along steep interface", "start_char_pos": 1086, "end_char_pos": 1119}, {"type": "R", "before": "including training", "after": "training the regression model with", "start_char_pos": 1211, "end_char_pos": 1229}, {"type": "R", "before": "other means of", "after": "transforming data with specialized", "start_char_pos": 1284, "end_char_pos": 1298}, {"type": "R", "before": "devising viable solutions to", "after": "reducing or removing mass loss in", "start_char_pos": 1403, "end_char_pos": 1431}, {"type": "D", "before": "'s numerical shortcomings", "after": null, "start_char_pos": 1453, "end_char_pos": 1478}], "sents_char_pos": [0, 103, 256, 381, 515, 668, 828, 945, 1128, 1319]}
+{"doc_id": "2104.05560", "revision_depth": "1", "before_revision": "OBJECTIVE : To evaluate the association between coronavirus disease 2019 (COVID-19) diagnosis with SARS-CoV-2 variant B.1.1.7 (also known as Variant of Concern 202012/01) and the risk of hospitalisation compared to diagnosis with wildtype SARS-CoV-2 variants. DESIGN : Retrospective cohort, analysed using a matched nested case-control study design. SETTING : Community-based SARS-CoV-2 testing in England, individually linked with hospitalisation data from the Secondary Uses Service and the Emergency Care Data Set. PARTICIPANTS: 493,053 laboratory-confirmed COVID-19 patients, of whom 19,482 had been hospitalised , tested between 23 November 2020 and 4 January 2021 and analysed at a laboratory with an available TaqPath assay that enables assessment of S-gene target failure (SGTF). SGTF is a proxy test for the B.1.1.7 variant. Nested case-control analysis of 18,814 pairs of hospitalised/non-hospitalised patients, one-to-one matched on age, sex, ethnicity, deprivation, region of residence, and date of positive test (matches found for 96.6\\%). MAIN OUTCOME MEASURES : Hospitalisation between 1 and 14 days after the first positive SARS-CoV-2 test. RESULTS: The matching-adjusted conditional odds ratio of hospitalisation was 1.58 (95\\% confidence interval 1.50 to 1.67 ) for COVID-19 patients infected with a SGTF-associated variant , compared to those infected with non-SGTF-associated variants. Secondary cohort analyses yielded similar estimates. The effect was modified by age (p<0.001), with ORs of 0.96-1.13 below age 20 years and 1.57-1.67 in age groups 40 years or older. CONCLUSIONS : The results suggest that the risk of hospitalisation is higher for individuals infected with the B.1.1.7 variant compared to wildtype SARS-CoV-2, likely reflecting a more severe disease. The higher severity may be specific to older age groups.", "after_revision": "Objective : To evaluate the relationship between coronavirus disease 2019 (COVID-19) diagnosis with SARS-CoV-2 variant B.1.1.7 (also known as Variant of Concern 202012/01) and the risk of hospitalisation compared to diagnosis with wildtype SARS-CoV-2 variants. Design : Retrospective cohort, analysed using stratified Cox regression. Setting : Community-based SARS-CoV-2 testing in England, individually linked with hospitalisation data from the Secondary Uses Service and the Emergency Care Data Set. Participants: 839,278 laboratory-confirmed COVID-19 patients, of whom 36,233 had been hospitalised within 14 days , tested between 23rd November 2020 and 31st January 2021 and analysed at a laboratory with an available TaqPath assay that enables assessment of S-gene target failure (SGTF). SGTF is a proxy test for the B.1.1.7 variant. Patient data were stratified by age, sex, ethnicity, deprivation, region of residence, and date of positive test . Main Outcome Measures : Hospitalisation between 1 and 14 days after the first positive SARS-CoV-2 test. Results: In total, 27,710 of 592,409 SGTF patients (4.7\\%) and 8,523 of 246,869 non-SGTF patients (3.5\\%) had been hospitalised within 1-14 days. The stratum-adjusted hazard ratio (HR) of hospitalisation was 1.52 (95\\% confidence interval CI 1.47 to 1.57 ) for COVID-19 patients infected with SGTF variants , compared to those infected with non-SGTF variants. The effect was modified by age (p<0.001), with HRs of 0.93-1.21 for SGTF compared to non-SGTF patients below age 20 years , 1.29 in those aged 20-29, and 1.45-1.65 in age groups 30 years or older. Conclusions : The results suggest that the risk of hospitalisation is higher for individuals infected with the B.1.1.7 variant compared to wildtype SARS-CoV-2, likely reflecting a more severe disease. The higher severity may be specific to adults above the age of 30.", "edit_actions": [{"type": "R", "before": "OBJECTIVE", "after": "Objective", "start_char_pos": 0, "end_char_pos": 9}, {"type": "R", "before": "association", "after": "relationship", "start_char_pos": 28, "end_char_pos": 39}, {"type": "R", "before": "DESIGN", "after": "Design", "start_char_pos": 260, "end_char_pos": 266}, {"type": "R", "before": "a matched nested case-control study design. SETTING", "after": "stratified Cox regression. Setting", "start_char_pos": 306, "end_char_pos": 357}, {"type": "R", "before": "PARTICIPANTS: 493,053", "after": "Participants: 839,278", "start_char_pos": 518, "end_char_pos": 539}, {"type": "R", "before": "19,482", "after": "36,233", "start_char_pos": 588, "end_char_pos": 594}, {"type": "A", "before": null, "after": "within 14 days", "start_char_pos": 617, "end_char_pos": 617}, {"type": "R", "before": "23", "after": "23rd", "start_char_pos": 635, "end_char_pos": 637}, {"type": "R", "before": "4", "after": "31st", "start_char_pos": 656, "end_char_pos": 657}, {"type": "R", "before": "Nested case-control analysis of 18,814 pairs of hospitalised/non-hospitalised patients, one-to-one matched on", "after": "Patient data were stratified by", "start_char_pos": 835, "end_char_pos": 944}, {"type": "R", "before": "(matches found for 96.6\\%). MAIN OUTCOME MEASURES", "after": ". Main Outcome Measures", "start_char_pos": 1026, "end_char_pos": 1075}, {"type": "R", "before": "RESULTS: The matching-adjusted conditional odds ratio", "after": "Results: In total, 27,710", "start_char_pos": 1158, "end_char_pos": 1211}, {"type": "A", "before": null, "after": "592,409 SGTF patients (4.7\\%) and 8,523 of 246,869 non-SGTF patients (3.5\\%) had been hospitalised within 1-14 days. The stratum-adjusted hazard ratio (HR) of", "start_char_pos": 1215, "end_char_pos": 1215}, {"type": "R", "before": "1.58", "after": "1.52", "start_char_pos": 1236, "end_char_pos": 1240}, {"type": "R", "before": "1.50 to 1.67", "after": "CI", "start_char_pos": 1267, "end_char_pos": 1279}, {"type": "A", "before": null, "after": "1.47 to 1.57", "start_char_pos": 1280, "end_char_pos": 1280}, {"type": "R", "before": "a SGTF-associated variant", "after": "SGTF variants", "start_char_pos": 1319, "end_char_pos": 1344}, {"type": "R", "before": "non-SGTF-associated variants. Secondary cohort analyses yielded similar estimates.", "after": "non-SGTF variants.", "start_char_pos": 1379, "end_char_pos": 1461}, {"type": "R", "before": "ORs of 0.96-1.13", "after": "HRs of 0.93-1.21 for SGTF compared to non-SGTF patients", "start_char_pos": 1509, "end_char_pos": 1525}, {"type": "R", "before": "and 1.57-1.67", "after": ", 1.29 in those aged 20-29, and 1.45-1.65", "start_char_pos": 1545, "end_char_pos": 1558}, {"type": "R", "before": "40", "after": "30", "start_char_pos": 1573, "end_char_pos": 1575}, {"type": "R", "before": "CONCLUSIONS", "after": "Conclusions", "start_char_pos": 1592, "end_char_pos": 1603}, {"type": "R", "before": "older age groups.", "after": "adults above the age of 30.", "start_char_pos": 1832, "end_char_pos": 1849}], "sents_char_pos": [0, 259, 349, 788, 834, 1053, 1157, 1408, 1461, 1591, 1792]}
+{"doc_id": "2104.08166", "revision_depth": "1", "before_revision": "Bayesian Optimization (BO) is a successful methodology to tune the hyperparametersof machine learning algorithms. The user defines a metric of interest, such as the validation error, and BO finds the optimal hyperparametersthat minimize it. However, the metric improvements on the validation set may not translate to the test set, especially on small datasets. In other words, BO can overfit. While cross-validation mitigates this, it comes with high computational cost. In this paper, we carry out the first systematic investigation of overfitting in BO and demonstrate that this is a serious yet often overlooked concern in practice. We propose the first problem-adaptive and interpretable criterion to early stop BO, reducing overfitting while mitigating the cost of cross-validation. Experimental results on real-world hyperparameter optimization tasks show that our approach can substantially reduce compute time with little to no loss of test accuracy,demonstrating a clear practical advantage over existing techniques .", "after_revision": "Tuning machine learning models with Bayesian optimization (BO) is a successful strategy to find good hyperparameters. BO defines an iterative procedure where a cross-validated metric is evaluated on promising hyperparameters. In practice, however, an improvement of the validation metric may not translate in better predictive performance on a test set, especially when tuning models trained on small datasets. In other words, unlike conventional wisdom dictates, BO can overfit. In this paper, we carry out the first systematic investigation of overfitting in BO and demonstrate that this issue is serious, yet often overlooked in practice. We propose a novel criterion to early stop BO, which aims to maintain the solution quality while saving the unnecessary iterations that can lead to overfitting. Experiments on real-world hyperparameter optimization problems show that our approach effectively meets these goals and is more adaptive comparing to baselines .", "edit_actions": [{"type": "R", "before": "Bayesian Optimization", "after": "Tuning machine learning models with Bayesian optimization", "start_char_pos": 0, "end_char_pos": 21}, {"type": "R", "before": "methodology to tune the hyperparametersof machine learning algorithms. The user defines a", "after": "strategy to find good hyperparameters. BO defines an iterative procedure where a cross-validated metric is evaluated on promising hyperparameters. In practice, however, an improvement of the validation", "start_char_pos": 43, "end_char_pos": 132}, {"type": "D", "before": "of interest, such as the validation error, and BO finds the optimal hyperparametersthat minimize it. However, the metric improvements on the validation set", "after": null, "start_char_pos": 140, "end_char_pos": 295}, {"type": "R", "before": "to the", "after": "in better predictive performance on a", "start_char_pos": 314, "end_char_pos": 320}, {"type": "A", "before": null, "after": "when tuning models trained", "start_char_pos": 342, "end_char_pos": 342}, {"type": "A", "before": null, "after": "unlike conventional wisdom dictates,", "start_char_pos": 378, "end_char_pos": 378}, {"type": "D", "before": "While cross-validation mitigates this, it comes with high computational cost.", "after": null, "start_char_pos": 395, "end_char_pos": 472}, {"type": "R", "before": "is a serious", "after": "issue is serious,", "start_char_pos": 583, "end_char_pos": 595}, {"type": "D", "before": "concern", "after": null, "start_char_pos": 617, "end_char_pos": 624}, {"type": "R", "before": "the first problem-adaptive and interpretable", "after": "a novel", "start_char_pos": 649, "end_char_pos": 693}, {"type": "R", "before": "reducing overfitting while mitigating the cost of cross-validation. Experimental results", "after": "which aims to maintain the solution quality while saving the unnecessary iterations that can lead to overfitting. Experiments", "start_char_pos": 722, "end_char_pos": 810}, {"type": "R", "before": "tasks", "after": "problems", "start_char_pos": 853, "end_char_pos": 858}, {"type": "R", "before": "can substantially reduce compute time with little to no loss of test accuracy,demonstrating a clear practical advantage over existing techniques", "after": "effectively meets these goals and is more adaptive comparing to baselines", "start_char_pos": 882, "end_char_pos": 1026}], "sents_char_pos": [0, 113, 240, 361, 394, 472, 637, 789]}
+{"doc_id": "2104.09719", "revision_depth": "1", "before_revision": "The SEIR model, widely used for analyzing and predicting the spread of virus infection, is here extended to considering the movement of people across regions. In contrast to previous models considering the risk due to the travelers from and to other regions, here we consider two factors. First, we con-sider the movements of susceptible (S), exposed (E), and recovered (R) people as well as infected (I) who can get infected after movement . Second, the infectious contacts between people from different regions are considered and dealt with separately from the first factor. By this, we can reflect the potential risk of future infections that are not out of the range of inspection of infection without over/under-estimating the ratio of E or I among the entire number of people moving . As a result, we show the results of simulation where the influence of traveling across regions, which mean prefectures here, and of the choice of regions to vaccinate with priority, on the risk of infection spread. We find the regions of large population or high effective regeneration number should be vaccinated with priority and that frequent travels tend to cause an influence to enhance the spread especially in the up-trend stage of infections and in regions of smaller populations. Moreover, we show it is not expected that vaccination at a slow pace in Japan will suppress the infection spread sufficiently to extinguish the current wave within a few months .", "after_revision": "The SEIR model, widely used for analyzing and predicting the spread of virus infection, is here extended to considering the movement of people across regions. In contrast to previous models considering the risk due to the travelers from / to other regions, here we consider two factors. First, we consider the movements of susceptible (S), exposed (E), and recovered (R) individuals who may get infected after movement, as well as infected (I) . Second, the infectious contacts between people from different regions are dealt with separately from the first factor. By this, we can reflect the potential future influence on the infection spread due to the movements of S and E that are hard to detect by the infection test at the time of immigration . As a result, we show the results of simulation where the influence of traveling across regions, which mean prefectures here, and of the choice of regions to vaccinate with priority, on the risk of infection spread. We find the regions of large population or large effective regeneration number should be vaccinated with priority and that frequent travels tend to cause an influence to enhance the spread especially in the uptrend stage of infections and in regions of smaller populations. Moreover, we show vaccination at a slow pace in Japan will not suppress the infection spread sufficiently to extinguish the current 4th wave within a few months . However, a restricted quantity of vaccines can be used efficiently by maximizing a diverted index value ? the conditional entropy ? of vaccination distribution. Furthermore, travel activity across regional borders that accelerated infection spread so far is found to rather sup-press it if vaccination is processed at a high pace .", "edit_actions": [{"type": "R", "before": "and", "after": "/", "start_char_pos": 237, "end_char_pos": 240}, {"type": "R", "before": "con-sider", "after": "consider", "start_char_pos": 299, "end_char_pos": 308}, {"type": "R", "before": "people", "after": "individuals who may get infected after movement,", "start_char_pos": 374, "end_char_pos": 380}, {"type": "D", "before": "who can get infected after movement", "after": null, "start_char_pos": 405, "end_char_pos": 440}, {"type": "D", "before": "considered and", "after": null, "start_char_pos": 517, "end_char_pos": 531}, {"type": "R", "before": "risk of future infections that are not out of the range of inspection of infection without over/under-estimating the ratio of E or I among the entire number of people moving", "after": "future influence on the infection spread due to the movements of S and E that are hard to detect by the infection test at the time of immigration", "start_char_pos": 615, "end_char_pos": 788}, {"type": "R", "before": "high", "after": "large", "start_char_pos": 1049, "end_char_pos": 1053}, {"type": "R", "before": "up-trend", "after": "uptrend", "start_char_pos": 1212, "end_char_pos": 1220}, {"type": "D", "before": "it is not expected that", "after": null, "start_char_pos": 1298, "end_char_pos": 1321}, {"type": "A", "before": null, "after": "not", "start_char_pos": 1363, "end_char_pos": 1363}, {"type": "A", "before": null, "after": "4th", "start_char_pos": 1433, "end_char_pos": 1433}, {"type": "A", "before": null, "after": ". However, a restricted quantity of vaccines can be used efficiently by maximizing a diverted index value ? the conditional entropy ? of vaccination distribution. Furthermore, travel activity across regional borders that accelerated infection spread so far is found to rather sup-press it if vaccination is processed at a high pace", "start_char_pos": 1459, "end_char_pos": 1459}], "sents_char_pos": [0, 158, 288, 442, 576, 790, 1005, 1279]}
+{"doc_id": "2104.09719", "revision_depth": "2", "before_revision": "The SEIR model, widely used for analyzing and predicting the spread of virus infection, is here extended to considering the movement of people across regions. In contrast to previous models considering the risk due to the travelers from/to other regions, here we consider two factors. First, we consider the movements of susceptible (S), exposed (E), and recovered (R) individuals who may get infected after movement , as well as infected (I) . Second, the infectious contacts between people from different regions are dealt with separately from the first factor. By this, we can reflect the potential future influence on the infection spread due to the movements of S and E that are hard to detect by the infection test at the time of immigration . As a result , we show the results of simulation where the influence of traveling across regions, which mean prefectures here, and of the choice of regions to vaccinate with priority , on the risk of infection spread. We find the regions of large population or large effective regeneration number should be vaccinated with priority and that frequent travels tend to cause an influence to enhance the spread especially in the uptrend stage of infections and in regions of smaller populations. Moreover, we show vaccination at a slow pace in Japan will not suppress the infection spread sufficiently to extinguish the current 4th wave within a few months. However, a restricted quantity of vaccines can be used efficiently by maximizing a diverted index value? the conditional entropy ? of vaccination distribution. Furthermore, travel activity across regional borders that accelerated infection spread so far is found to rather sup-press it if vaccination is processed at a high pace .", "after_revision": "The SEIRS model, an extension of the SEIR model for analyzing and predicting the spread of virus infection, was further extended to consider the movement of people across regions. In contrast to previous models that con-sider the risk of travelers from/to other regions, we consider two factors. First, we consider the movements of susceptible (S), exposed (E), and recovered (R) individuals who may get infected and infect others in the destination region , as well as infected (I) individuals . Second, people living in a region and moving from other regions are dealt as separate but interacting groups with respect to their states, S, E, R, or I. This enables us to consider the potential influence of movements before individuals become infected, difficult to detect by testing at the time of immigration , on the spread of infection. In this paper , we show the results of the simulation where individuals travel across regions, which means prefectures here, and the government chooses regions to vaccinate with priority . We found a general law that a quantity of vaccines can be used efficiently by maximizing an index value, the conditional entropy Hc, when we distribute vaccines to regions. The efficiency of this strategy, which maximizes Hc, was found to outperform that of vaccinating regions with a larger effective re-generation number. This law also explains the surprising result that travel activities across regional borders may suppress the spread if vaccination is processed at a sufficiently high pace, introducing the concept of social muddling .", "edit_actions": [{"type": "R", "before": "SEIR model, widely used", "after": "SEIRS model, an extension of the SEIR model", "start_char_pos": 4, "end_char_pos": 27}, {"type": "R", "before": "is here extended to considering", "after": "was further extended to consider", "start_char_pos": 88, "end_char_pos": 119}, {"type": "R", "before": "considering the risk due to the", "after": "that con-sider the risk of", "start_char_pos": 190, "end_char_pos": 221}, {"type": "D", "before": "here", "after": null, "start_char_pos": 255, "end_char_pos": 259}, {"type": "R", "before": "after movement", "after": "and infect others in the destination region", "start_char_pos": 402, "end_char_pos": 416}, {"type": "A", "before": null, "after": "individuals", "start_char_pos": 443, "end_char_pos": 443}, {"type": "R", "before": "the infectious contacts between people from different", "after": "people living in a region and moving from other", "start_char_pos": 454, "end_char_pos": 507}, {"type": "R", "before": "with separately from the first factor. By this, we can reflect the potential future influence on the infection spread due to the movements of S and E that are hard", "after": "as separate but interacting groups with respect to their states, S, E, R, or I. This enables us to consider the potential influence of movements before individuals become infected, difficult", "start_char_pos": 526, "end_char_pos": 689}, {"type": "R", "before": "the infection test", "after": "testing", "start_char_pos": 703, "end_char_pos": 721}, {"type": "R", "before": ". As a result", "after": ", on the spread of infection. In this paper", "start_char_pos": 749, "end_char_pos": 762}, {"type": "R", "before": "simulation where the influence of traveling", "after": "the simulation where individuals travel", "start_char_pos": 788, "end_char_pos": 831}, {"type": "R", "before": "mean", "after": "means", "start_char_pos": 854, "end_char_pos": 858}, {"type": "R", "before": "of the choice of", "after": "the government chooses", "start_char_pos": 881, "end_char_pos": 897}, {"type": "R", "before": ", on the risk of infection spread. We find the regions of large population or large effective regeneration number should be vaccinated with priority and that frequent travels tend to cause an influence to enhance the spread especially in the uptrend stage of infections and in regions of smaller populations. Moreover, we show vaccination at a slow pace in Japan will not suppress the infection spread sufficiently to extinguish the current 4th wave within a few months. However, a restricted", "after": ". We found a general law that a", "start_char_pos": 933, "end_char_pos": 1425}, {"type": "R", "before": "a diverted index value?", "after": "an index value,", "start_char_pos": 1485, "end_char_pos": 1508}, {"type": "R", "before": "? of vaccination distribution. Furthermore, travel activity", "after": "Hc, when we distribute vaccines to regions. The efficiency of this strategy, which maximizes Hc, was found to outperform that of vaccinating regions with a larger effective re-generation number. This law also explains the surprising result that travel activities", "start_char_pos": 1533, "end_char_pos": 1592}, {"type": "R", "before": "that accelerated infection spread so far is found to rather sup-press it", "after": "may suppress the spread", "start_char_pos": 1617, "end_char_pos": 1689}, {"type": "R", "before": "high pace", "after": "sufficiently high pace, introducing the concept of social muddling", "start_char_pos": 1723, "end_char_pos": 1732}], "sents_char_pos": [0, 158, 284, 564, 750, 967, 1241, 1403, 1508, 1563]}
+{"doc_id": "2104.13155", "revision_depth": "1", "before_revision": "This article reviews the Once Learning mechanism that was proposed 23 years ago and the subsequent successes of One-shot Learning in image classification and You Only Look Once-YOLO in objective detection. Analyzing the current development of AI , the proposal is that AI should be clearly divided into the following categories: Artificial Human Intelligence (AHI), Artificial Machine Intelligence (AMI), and Artificial Biological Intelligence (ABI), which will also be the main directions of theory and application development for AI. As a watershed for the branches of AI, some classification standards and methods are discussed: 1) AI R D should be human-oriented , machine-oriented, and biological-oriented ; 2) The information input is processed by Dimensionality-up or dimensionality-reduction; and 3) One / Few or large samples are used for knowledge learning.", "after_revision": "This article reviews the \"Once learning\" mechanism that was proposed 23 years ago and the subsequent successes of \" One-shot learning\" in image classification and \" You Only Look Once - YOLO\" in objective detection. Analyzing the current development of Artificial Intelligence (AI) , the proposal is that AI should be clearly divided into the following categories: Artificial Human Intelligence (AHI), Artificial Machine Intelligence (AMI), and Artificial Biological Intelligence (ABI), which will also be the main directions of theory and application development for AI. As a watershed for the branches of AI, some classification standards and methods are discussed: 1) Human-oriented , machine-oriented, and biological-oriented AI R D ; 2) Information input processed by Dimensionality-up or Dimensionality-reduction; 3) The use of one / few or large samples for knowledge learning.", "edit_actions": [{"type": "R", "before": "Once Learning", "after": "\"Once learning\"", "start_char_pos": 25, "end_char_pos": 38}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 112, "end_char_pos": 112}, {"type": "R", "before": "Learning", "after": "learning\"", "start_char_pos": 122, "end_char_pos": 130}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 159, "end_char_pos": 159}, {"type": "R", "before": "Once-YOLO", "after": "Once - YOLO\"", "start_char_pos": 174, "end_char_pos": 183}, {"type": "R", "before": "AI", "after": "Artificial Intelligence (AI)", "start_char_pos": 245, "end_char_pos": 247}, {"type": "D", "before": "AI R", "after": null, "start_char_pos": 637, "end_char_pos": 641}, {"type": "R", "before": "D should be human-oriented", "after": "Human-oriented", "start_char_pos": 642, "end_char_pos": 668}, {"type": "A", "before": null, "after": "AI R", "start_char_pos": 713, "end_char_pos": 713}, {"type": "A", "before": null, "after": "D", "start_char_pos": 714, "end_char_pos": 714}, {"type": "R", "before": "The information input is", "after": "Information input", "start_char_pos": 720, "end_char_pos": 744}, {"type": "R", "before": "dimensionality-reduction; and", "after": "Dimensionality-reduction;", "start_char_pos": 779, "end_char_pos": 808}, {"type": "R", "before": "One", "after": "The use of one", "start_char_pos": 812, "end_char_pos": 815}, {"type": "R", "before": "Few", "after": "few", "start_char_pos": 818, "end_char_pos": 821}, {"type": "D", "before": "are used", "after": null, "start_char_pos": 839, "end_char_pos": 847}], "sents_char_pos": [0, 207, 537, 716, 804]}
+{"doc_id": "2104.14074", "revision_depth": "1", "before_revision": "Bandit algorithms are increasingly used in real world sequential decision making problems, from online advertising to mobile health. As a result, there are more datasets collected using bandit algorithms and with that an increased desire to be able to use these datasets to answer scientific questions like: Did one type of ad increase the click-through rate more or lead to more purchases? In which contexts is a mobile health intervention effective? However, it has been shown that classical statistical approaches , like those based on the ordinary least squares estimator, fail to provide reliable confidence intervals when used with bandit data . Recently methods have been developed to conduct statistical inference using simple models fit to data collected with multi-armed bandits.However there is a lack of general methods for conducting statistical inference using more complex models . In this work, we develop theory justifying the use of M-estimation (Van der Vaart, 2000), traditionally used with i.i.d data, to provide inferential methods for a large class of estimators -- including least squares and maximum likelihood estimators -- but now with data collected with (contextual) bandit algorithms. To do this we generalize the use of adaptive weights pioneered by Hadad et al. (2019) and Deshpande et al. (2018). Specifically, in settings in which the data is collected via a (contextual) bandit algorithm, we prove that certain adaptively weighted M-estimators are uniformly asymptotically normal and demonstrate empirically that we can use their asymptotic distribution to construct reliable confidence regions for a variety of inferential targets.", "after_revision": "Bandit algorithms are increasingly used in real-world sequential decision-making problems. Associated with this is an increased desire to be able to use the resulting datasets to answer scientific questions like: Did one type of ad lead to more purchases? In which contexts is a mobile health intervention effective? However, classical statistical approaches fail to provide valid confidence intervals when used with data collected with bandit algorithms. Alternative methods have recently been developed for simple models (e.g., comparison of means). Yet there is a lack of general methods for conducting statistical inference using more complex models on data collected with (contextual) bandit algorithms; for example, current methods cannot be used for valid inference on parameters in a logistic regression model for a binary reward . In this work, we develop theory justifying the use of M-estimators -- which includes estimators based on empirical risk minimization as well as maximum likelihood -- on data collected with adaptive algorithms, including (contextual) bandit algorithms. Specifically, we show that M-estimators , modified with particular adaptive weights, can be used to construct asymptotically valid confidence regions for a variety of inferential targets.", "edit_actions": [{"type": "R", "before": "real world sequential decision making problems, from online advertising to mobile health. As a result, there are more datasets collected using bandit algorithms and with that", "after": "real-world sequential decision-making problems. Associated with this is", "start_char_pos": 43, "end_char_pos": 217}, {"type": "R", "before": "these", "after": "the resulting", "start_char_pos": 256, "end_char_pos": 261}, {"type": "D", "before": "increase the click-through rate more or", "after": null, "start_char_pos": 327, "end_char_pos": 366}, {"type": "D", "before": "it has been shown that", "after": null, "start_char_pos": 461, "end_char_pos": 483}, {"type": "D", "before": ", like those based on the ordinary least squares estimator,", "after": null, "start_char_pos": 517, "end_char_pos": 576}, {"type": "R", "before": "reliable", "after": "valid", "start_char_pos": 593, "end_char_pos": 601}, {"type": "R", "before": "bandit data . Recently methods have been developed to conduct statistical inference using simple models fit to data collected with multi-armed bandits.However", "after": "data collected with bandit algorithms. Alternative methods have recently been developed for simple models (e.g., comparison of means). Yet", "start_char_pos": 638, "end_char_pos": 796}, {"type": "A", "before": null, "after": "on data collected with (contextual) bandit algorithms; for example, current methods cannot be used for valid inference on parameters in a logistic regression model for a binary reward", "start_char_pos": 895, "end_char_pos": 895}, {"type": "R", "before": "M-estimation (Van der Vaart, 2000), traditionally used with i.i.d data, to provide inferential methods for a large class of estimators", "after": "M-estimators", "start_char_pos": 952, "end_char_pos": 1086}, {"type": "R", "before": "including least squares and maximum likelihood estimators", "after": "which includes estimators based on empirical risk minimization as well as maximum likelihood", "start_char_pos": 1090, "end_char_pos": 1147}, {"type": "R", "before": "but now with", "after": "on", "start_char_pos": 1151, "end_char_pos": 1163}, {"type": "A", "before": null, "after": "adaptive algorithms, including", "start_char_pos": 1184, "end_char_pos": 1184}, {"type": "R", "before": "To do this we generalize the use of adaptive weights pioneered by Hadad et al. (2019) and Deshpande et al. (2018). Specifically, in settings in which the data is collected via a (contextual) bandit algorithm, we prove that certain adaptively weighted", "after": "Specifically, we show that", "start_char_pos": 1217, "end_char_pos": 1467}, {"type": "R", "before": "are uniformly asymptotically normal and demonstrate empirically that we can use their asymptotic distribution to construct reliable", "after": ", modified with particular adaptive weights, can be used to construct asymptotically valid", "start_char_pos": 1481, "end_char_pos": 1612}], "sents_char_pos": [0, 132, 390, 451, 651, 789, 897, 1216, 1331]}
+{"doc_id": "2104.14763", "revision_depth": "1", "before_revision": "Point Cloud Registration is a fundamental problem in robotics and computer vision . Due to the limited accuracy in the matching process of 3D keypoints, the presence of outliers, probably in very large numbers, is common in many real-world applications . In this paper, we present ICOS (Inlier searching using COmpatible Structures), a novel, efficient and highly robust solution for the correspondence-based point cloud registration problem . Specifically, we (i) propose and construct a series of compatible structures for the registration problem where various invariants can be established, and (ii) design two time-efficient frameworks, one for known-scale registration and the other for unknown-scale registration, to filter out outliers and seek inliers from the invariant-constrained random sampling built upon the compatible structures . In this manner, even with extreme outlier ratios, inliers can be detected and collected for solving the optimal transformation , leading to our robust registration solver ICOS. Through plentiful experiments over standard real datasets, we demonstrate that: (i) our solver ICOS is fast, accurate, robust against as many as 99 \\% outliers with nearly 100\\% recall ratio of inliers whether the scale is known or unknown , outperforming other state-of-the-art methods, (ii) ICOS is practical for use in real-world applications.", "after_revision": "Rotation search and point cloud registration are two fundamental problems in robotics and computer vision , which aim to estimate the rotation and the transformation between the 3D vector sets and point clouds, respectively. Due to the presence of outliers, probably in very large numbers, among the putative vector or point correspondences in real-world applications , robust estimation is of great importance . In this paper, we present ICOS (Inlier searching using COmpatible Structures), a novel, efficient and highly robust solver for both the correspondence-based rotation search and point cloud registration problems . Specifically, we (i) propose and construct a series of compatible structures for the two problems where various invariants can be established, and (ii) design three time-efficient frameworks, the first for rotation search, the second for known-scale registration and the third for unknown-scale registration, to filter out outliers and seek inliers from the invariant-constrained random sampling based on the compatible structures proposed . In this manner, even with extreme outlier ratios, inliers can be sifted out and collected for solving the optimal rotation and transformation effectively , leading to our robust solver ICOS. Through plentiful experiments over standard datasets, we demonstrate that: (i) our solver ICOS is fast, accurate, robust against over 95 \\% outliers with nearly 100\\% recall ratio of inliers for rotation search and both known-scale and unknown-scale registration , outperforming other state-of-the-art methods, and (ii) ICOS is practical for use in multiple real-world applications.", "edit_actions": [{"type": "R", "before": "Point Cloud Registration is a fundamental problem", "after": "Rotation search and point cloud registration are two fundamental problems", "start_char_pos": 0, "end_char_pos": 49}, {"type": "R", "before": ". Due to the limited accuracy in the matching process of", "after": ", which aim to estimate the rotation and the transformation between the", "start_char_pos": 82, "end_char_pos": 138}, {"type": "R", "before": "keypoints,", "after": "vector sets and point clouds, respectively. Due to", "start_char_pos": 142, "end_char_pos": 152}, {"type": "R", "before": "is common in many", "after": "among the putative vector or point correspondences in", "start_char_pos": 211, "end_char_pos": 228}, {"type": "A", "before": null, "after": ", robust estimation is of great importance", "start_char_pos": 253, "end_char_pos": 253}, {"type": "R", "before": "solution for", "after": "solver for both", "start_char_pos": 372, "end_char_pos": 384}, {"type": "A", "before": null, "after": "rotation search and", "start_char_pos": 410, "end_char_pos": 410}, {"type": "R", "before": "problem", "after": "problems", "start_char_pos": 436, "end_char_pos": 443}, {"type": "R", "before": "registration problem", "after": "two problems", "start_char_pos": 531, "end_char_pos": 551}, {"type": "R", "before": "two", "after": "three", "start_char_pos": 613, "end_char_pos": 616}, {"type": "R", "before": "one for", "after": "the first for rotation search, the second for", "start_char_pos": 644, "end_char_pos": 651}, {"type": "R", "before": "other", "after": "third", "start_char_pos": 685, "end_char_pos": 690}, {"type": "R", "before": "built upon", "after": "based on", "start_char_pos": 810, "end_char_pos": 820}, {"type": "A", "before": null, "after": "proposed", "start_char_pos": 847, "end_char_pos": 847}, {"type": "R", "before": "detected", "after": "sifted out", "start_char_pos": 915, "end_char_pos": 923}, {"type": "R", "before": "transformation", "after": "rotation and transformation effectively", "start_char_pos": 962, "end_char_pos": 976}, {"type": "D", "before": "registration", "after": null, "start_char_pos": 1001, "end_char_pos": 1013}, {"type": "D", "before": "real", "after": null, "start_char_pos": 1071, "end_char_pos": 1075}, {"type": "R", "before": "as many as 99", "after": "over 95", "start_char_pos": 1161, "end_char_pos": 1174}, {"type": "R", "before": "whether the scale is known or unknown", "after": "for rotation search and both known-scale and unknown-scale registration", "start_char_pos": 1229, "end_char_pos": 1266}, {"type": "A", "before": null, "after": "and", "start_char_pos": 1315, "end_char_pos": 1315}, {"type": "A", "before": null, "after": "multiple", "start_char_pos": 1350, "end_char_pos": 1350}], "sents_char_pos": [0, 83, 255, 445, 849, 1026]}
+{"doc_id": "2105.01223", "revision_depth": "1", "before_revision": "Characterizing metastable neural dynamics in finite-size spiking networks remains a daunting challenge. We have recently proposed to address this challenge in the simplifying replica-mean-field (RMF) limit. In this limit, networks are made of infinitely many replicas of the finite network of interest, but with randomized interactions across replica. Such randomization renders certain excitatory networks fully tractable at the cost of neglecting activity correlations, but with explicit dependence on the finite size of the neural constituents. Unfortunately, realistic metastable dynamics typically unfold in networks with mixed inhibition and excitation. To address this point , we extend the RMF computational framework to neural networks modeled by point processes with exponential stochastic intensities . Within this framework , we show that metastable finite-size networks admit multistable RMF limits, which are fully characterized by stationary firing rates. Technically, these stationary rates are determined as solutions to a set of delayed differential equations under certain regularity conditions that any physical solutions shall satisfy. We solve this original singular-perturbation problem by adapting the resolvent formalism to our delayed setting . Importantly, we find that these rates specify probabilistic pseudo-equilibria which accurately capture the neural variability observed in the original finite-size network. We also perform the analysis of the stochastic bifurcationof a bistable neural network in terms of static phase transition of its RMF limits. In turn, we expect to leverage the static picture of RMF limit to infer purely dynamical features of metastable , finite-size networks, such as transition rates .", "after_revision": "Characterizing metastable neural dynamics in finite-size spiking networks remains a daunting challenge. We propose to address this challenge in the recently introduced replica-mean-field (RMF) limit. In this limit, networks are made of infinitely many replicas of the finite network of interest, but with randomized interactions across replica. Such randomization renders certain excitatory networks fully tractable at the cost of neglecting activity correlations, but with explicit dependence on the finite size of the neural constituents. However, metastable dynamics typically unfold in networks with mixed inhibition and excitation. Here , we extend the RMF computational framework to point-process-based neural network models with exponential stochastic intensities , allowing for mixed excitation and inhibition . Within this setting , we show that metastable finite-size networks admit multistable RMF limits, which are fully characterized by stationary firing rates. Technically, these stationary rates are determined as solutions to a set of delayed differential equations under certain regularity conditions that any physical solutions shall satisfy. We solve this original problem by combining the resolvent formalism and singular-perturbation theory . Importantly, we find that these rates specify probabilistic pseudo-equilibria which accurately capture the neural variability observed in the original finite-size network. We also discuss the emergence of metastability as a stochastic bifurcation, which can also be interpreted as a static phase transition in the RMF limits. In turn, we expect to leverage the static picture of RMF limits to infer purely dynamical features of metastable finite-size networks, such as the transition rates between pseudo-equilibria .", "edit_actions": [{"type": "R", "before": "have recently proposed", "after": "propose", "start_char_pos": 107, "end_char_pos": 129}, {"type": "R", "before": "simplifying", "after": "recently introduced", "start_char_pos": 163, "end_char_pos": 174}, {"type": "R", "before": "Unfortunately, realistic", "after": "However,", "start_char_pos": 548, "end_char_pos": 572}, {"type": "R", "before": "To address this point", "after": "Here", "start_char_pos": 660, "end_char_pos": 681}, {"type": "R", "before": "neural networks modeled by point processes", "after": "point-process-based neural network models", "start_char_pos": 729, "end_char_pos": 771}, {"type": "A", "before": null, "after": ", allowing for mixed excitation and inhibition", "start_char_pos": 812, "end_char_pos": 812}, {"type": "R", "before": "framework", "after": "setting", "start_char_pos": 827, "end_char_pos": 836}, {"type": "R", "before": "singular-perturbation problem by adapting", "after": "problem by combining", "start_char_pos": 1181, "end_char_pos": 1222}, {"type": "R", "before": "to our delayed setting", "after": "and singular-perturbation theory", "start_char_pos": 1247, "end_char_pos": 1269}, {"type": "R", "before": "perform the analysis of the stochastic bifurcationof a bistable neural network in terms of", "after": "discuss the emergence of metastability as a stochastic bifurcation, which can also be interpreted as a", "start_char_pos": 1452, "end_char_pos": 1542}, {"type": "R", "before": "of its", "after": "in the", "start_char_pos": 1567, "end_char_pos": 1573}, {"type": "R", "before": "limit", "after": "limits", "start_char_pos": 1643, "end_char_pos": 1648}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1698, "end_char_pos": 1699}, {"type": "R", "before": "transition rates", "after": "the transition rates between pseudo-equilibria", "start_char_pos": 1730, "end_char_pos": 1746}], "sents_char_pos": [0, 103, 206, 351, 547, 659, 814, 971, 1157, 1271, 1443, 1585]}
+{"doc_id": "2105.02062", "revision_depth": "1", "before_revision": "Stochastic gradient descent (SGD) is of fundamental importance in deep learning. Despite its simplicity, elucidating its efficacy remains challenging. Conventionally, the success of SGD is attributed to thestochastic gradient noise (SGN) incurred in the training process. Based on this general consensus, SGD is frequently treated and analyzed as the Euler-Maruyama discretization of astochastic differential equation (SDE ) driven by either Brownian or L\\'evy stable motion. In this study, we argue that SGN is neither Gaussian nor stable. Instead, inspired by the long-time correlation emerging in SGN series, we propose that SGD can be viewed as a discretization of an SDE driven by \\textit{fractional Brownian motion (FBM). Accordingly, the different convergence behavior of SGD dynamics is well grounded . Moreover, the first passage time of an SDE driven by FBM is approximately derived. This indicates a lower escaping rate for a larger Hurst parameter, and thus SGD stays longer in flat minima. This happens to coincide with the well-known phenomenon that SGD favors flat minima that generalize well. Four groups of experiments are conducted to validate our conjecture, and it is demonstrated that long-range memory effects persist across various model architectures, datasets, and training strategies. Our study opens up a new perspective and may contribute to a better understanding of SGD.", "after_revision": "Stochastic gradient descent (SGD) is of fundamental importance in deep learning. Despite its simplicity, elucidating its efficacy remains challenging. Conventionally, the success of SGD is ascribed to the stochastic gradient noise (SGN) incurred in the training process. Based on this consensus, SGD is frequently treated and analyzed as the Euler-Maruyama discretization of stochastic differential equations (SDEs ) driven by either Brownian or Levy stable motion. In this study, we argue that SGN is neither Gaussian nor Levy stable. Instead, inspired by the short-range correlation emerging in the SGN series, we propose that SGD can be viewed as a discretization of an SDE driven by \\textit{fractional Brownian motion (FBM). Accordingly, the different convergence behavior of SGD dynamics is well-grounded . Moreover, the first passage time of an SDE driven by FBM is approximately derived. The result suggests a lower escaping rate for a larger Hurst parameter, and thus SGD stays longer in flat minima. This happens to coincide with the well-known phenomenon that SGD favors flat minima that generalize well. Extensive experiments are conducted to validate our conjecture, and it is demonstrated that short-range memory effects persist across various model architectures, datasets, and training strategies. Our study opens up a new perspective and may contribute to a better understanding of SGD.", "edit_actions": [{"type": "R", "before": "Stochastic gradient descent", "after": "Stochastic gradient descent", "start_char_pos": 0, "end_char_pos": 27}, {"type": "D", "before": "attributed to the", "after": null, "start_char_pos": 189, "end_char_pos": 206}, {"type": "R", "before": "stochastic gradient noise", "after": "ascribed to the stochastic gradient noise", "start_char_pos": 206, "end_char_pos": 231}, {"type": "D", "before": "general", "after": null, "start_char_pos": 286, "end_char_pos": 293}, {"type": "D", "before": "a", "after": null, "start_char_pos": 384, "end_char_pos": 385}, {"type": "D", "before": "stochastic differential equation", "after": null, "start_char_pos": 385, "end_char_pos": 417}, {"type": "R", "before": "(SDE", "after": "stochastic differential equations (SDEs", "start_char_pos": 418, "end_char_pos": 422}, {"type": "R", "before": "L\\'evy", "after": "Levy", "start_char_pos": 454, "end_char_pos": 460}, {"type": "A", "before": null, "after": "Levy", "start_char_pos": 533, "end_char_pos": 533}, {"type": "R", "before": "long-time", "after": "short-range", "start_char_pos": 567, "end_char_pos": 576}, {"type": "A", "before": null, "after": "the", "start_char_pos": 601, "end_char_pos": 601}, {"type": "R", "before": "fractional Brownian motion", "after": "fractional Brownian motion", "start_char_pos": 696, "end_char_pos": 722}, {"type": "R", "before": "well grounded", "after": "well-grounded", "start_char_pos": 797, "end_char_pos": 810}, {"type": "R", "before": "This indicates", "after": "The result suggests", "start_char_pos": 896, "end_char_pos": 910}, {"type": "R", "before": "Four groups of", "after": "Extensive", "start_char_pos": 1111, "end_char_pos": 1125}, {"type": "R", "before": "long-range", "after": "short-range", "start_char_pos": 1208, "end_char_pos": 1218}], "sents_char_pos": [0, 80, 150, 271, 475, 541, 729, 812, 895, 1004, 1110, 1312]}
+{"doc_id": "2105.02569", "revision_depth": "1", "before_revision": "We propose a new ensemble framework for supervised learning, named machine collaboration (MaC), based on a collection of base machines for prediction tasks. Different from bagging/stacking (a parallel & independent framework) and boosting (a sequential & top-down framework), MaC is a type of circular & interactive learning framework. The circular & interactive feature helps the base machines to transfer information circularly and update their own structures and parameters accordingly. The theoretical result on the risk bound of the estimator based on MaC shows that circular & interactive feature can help MaC reduce the risk via a parsimonious ensemble. We conduct extensive experiments on simulated data and 119 benchmark real data sets . The results of the experiments show that in most cases, MaC performs much better than several state-of-the-art methods, including CART, neural network , stacking, and boosting.", "after_revision": "We propose a new ensemble framework for supervised learning, called machine collaboration (MaC), using a collection of base machines for prediction tasks. Unlike bagging/stacking (a parallel & independent framework) and boosting (a sequential & top-down framework), MaC is a type of circular & interactive learning framework. The circular & interactive feature helps the base machines to transfer information circularly and update their structures and parameters accordingly. The theoretical result on the risk bound of the estimator from MaC reveals that the circular & interactive feature can help MaC reduce risk via a parsimonious ensemble. We conduct extensive experiments on MaC using both simulated data and 119 benchmark real datasets . The results demonstrate that in most cases, MaC performs significantly better than several other state-of-the-art methods, including classification and regression trees, neural networks , stacking, and boosting.", "edit_actions": [{"type": "R", "before": "named", "after": "called", "start_char_pos": 61, "end_char_pos": 66}, {"type": "R", "before": "based on", "after": "using", "start_char_pos": 96, "end_char_pos": 104}, {"type": "R", "before": "Different from", "after": "Unlike", "start_char_pos": 157, "end_char_pos": 171}, {"type": "D", "before": "own", "after": null, "start_char_pos": 447, "end_char_pos": 450}, {"type": "R", "before": "based on MaC shows that", "after": "from MaC reveals that the", "start_char_pos": 548, "end_char_pos": 571}, {"type": "D", "before": "the", "after": null, "start_char_pos": 623, "end_char_pos": 626}, {"type": "A", "before": null, "after": "MaC using both", "start_char_pos": 697, "end_char_pos": 697}, {"type": "R", "before": "data sets", "after": "datasets", "start_char_pos": 736, "end_char_pos": 745}, {"type": "R", "before": "of the experiments show", "after": "demonstrate", "start_char_pos": 760, "end_char_pos": 783}, {"type": "R", "before": "much", "after": "significantly", "start_char_pos": 817, "end_char_pos": 821}, {"type": "A", "before": null, "after": "other", "start_char_pos": 842, "end_char_pos": 842}, {"type": "R", "before": "CART, neural network", "after": "classification and regression trees, neural networks", "start_char_pos": 879, "end_char_pos": 899}], "sents_char_pos": [0, 156, 335, 489, 660, 747]}
+{"doc_id": "2105.03746", "revision_depth": "1", "before_revision": "Contrastive learning (CL) has achieved remarkable success in learning data representations without label supervision . However, the conventional CL loss is sensitive to how many negative samples are included and how they are selected. This paper proposes contrastive conditional transport (CCT) that defines its CL loss over dependent sample-query pairs, which in practice is realized by drawing a random query, randomly selecting positive and negative samples, and contrastively reweighting these samples according to their distances to the query , exerting a greater force to both pull more distant positive samples towards the query and push closer negative samples away from the query . Theoretical analysis shows that this unique contrastive reweighting scheme helps in the representation space to both align the positive samples with the query and reduce the mutual information between the negative sample and query . Extensive large-scale experiments on standard vision tasks show that CCT not only consistently outperforms existing methods on benchmark datasets in contrastive representation learning but also provides interpretable contrastive weights and latent representations. PyTorch code will be provided .", "after_revision": "Contrastive learning (CL) is effective in learning data representations without label supervision , where the encoder needs to contrast each positive sample over multiple negative samples via a one-vs-many softmax cross-entropy loss . However, conventional CL is sensitive to how many negative samples are included and how they are selected. Proposed in this paper is a doubly CL strategy that contrasts positive samples and negative ones within themselves separately. We realize this strategy with contrastive attraction and contrastive repulsion (CACR) makes the query not only exert a greater force to attract more distant positive samples but also do so to repel closer negative samples . Theoretical analysis reveals the connection between CACR and CL from the perspectives of both positive attraction and negative repulsion and shows the benefits in both efficiency and robustness brought by separately contrasting within the sampled positive and negative pairs . Extensive large-scale experiments on standard vision tasks show that CACR not only consistently outperforms existing CL methods on benchmark datasets in representation learning, but also provides interpretable contrastive weights , demonstrating the efficacy of the proposed doubly contrastive strategy .", "edit_actions": [{"type": "R", "before": "has achieved remarkable success", "after": "is effective", "start_char_pos": 26, "end_char_pos": 57}, {"type": "A", "before": null, "after": ", where the encoder needs to contrast each positive sample over multiple negative samples via a one-vs-many softmax cross-entropy loss", "start_char_pos": 117, "end_char_pos": 117}, {"type": "R", "before": "the conventional CL loss", "after": "conventional CL", "start_char_pos": 129, "end_char_pos": 153}, {"type": "R", "before": "This paper proposes contrastive conditional transport (CCT) that defines its CL loss over dependent sample-query pairs, which in practice is realized by drawing a random query, randomly selecting positive and negative samples, and contrastively reweighting these samples according to their distances to the query , exerting", "after": "Proposed in this paper is", "start_char_pos": 236, "end_char_pos": 559}, {"type": "A", "before": null, "after": "doubly CL strategy that contrasts positive samples and negative ones within themselves separately. We realize this strategy with contrastive attraction and contrastive repulsion (CACR) makes the query not only exert a", "start_char_pos": 562, "end_char_pos": 562}, {"type": "R", "before": "both pull", "after": "attract", "start_char_pos": 580, "end_char_pos": 589}, {"type": "R", "before": "towards the query and push", "after": "but also do so to repel", "start_char_pos": 620, "end_char_pos": 646}, {"type": "D", "before": "away from the query", "after": null, "start_char_pos": 671, "end_char_pos": 690}, {"type": "R", "before": "shows that this unique contrastive reweighting scheme helps in the representation space to both align the positive samples with the query and reduce the mutual information between the negative sample and query", "after": "reveals the connection between CACR and CL from the perspectives of both positive attraction and negative repulsion and shows the benefits in both efficiency and robustness brought by separately contrasting within the sampled positive and negative pairs", "start_char_pos": 714, "end_char_pos": 923}, {"type": "R", "before": "CCT", "after": "CACR", "start_char_pos": 995, "end_char_pos": 998}, {"type": "A", "before": null, "after": "CL", "start_char_pos": 1042, "end_char_pos": 1042}, {"type": "R", "before": "contrastive representation learning", "after": "representation learning,", "start_char_pos": 1076, "end_char_pos": 1111}, {"type": "R", "before": "and latent representations. PyTorch code will be provided", "after": ", demonstrating the efficacy of the proposed doubly contrastive strategy", "start_char_pos": 1164, "end_char_pos": 1221}], "sents_char_pos": [0, 119, 235, 692, 925, 1191]}
+{"doc_id": "2105.04783", "revision_depth": "2", "before_revision": "A serious and ubiquitous issue in existing mapped WENO schemes is that most of them can hardly preserve high resolutions and in the meantime prevent spurious oscillations on solving hyperbolic conservation laws with long output times. Our goal in this article is to address this widely concerned problem [3, 4, 15, 29, 16, 18]. We firstly ] take a closer look at the mappings of various existing mapped WENO schemes and devise a general formula for them. It helps us to extend the order-preserving (OP ) criterion , originally defined and carefully examined in 18%DIFDELCMD < ]%%% , into the design of the mappings.Next , we propose the implementation of obtaining the new mappings satisfying the OP criterion from those of the existing mapped WENO-X schemes where the notation \"X\" is used to identify the version of the existing mapped WENO scheme , e. g., X = M 11%DIFDELCMD < ]%%% , PM6 3%DIFDELCMD < ]%%% , or PPM5 15%DIFDELCMD < ]%%% , et al. Then we build the resultant mapped WENO schemes and denote them as MOP-WENO-X . The numerical solutions of the one-dimensional linear advection equation with different initial conditions and some standard numerical experiments of two-dimensional Euler system, computed by the MOP-WENO-X schemes , are compared with the ones generated by their corresponding WENO-X schemes and the WENO-JS scheme. To summarize, the MOP-WENO-X schemes gain definite advatages in terms of attaining high resolutions and meanwhile avoiding spurious oscillations near discontinuities for long output time simulations of the one-dimensional linear advection problems, as well as significantly reducing the post-shock oscillations in the simulations of the two-dimensional steady problems with strong shock waves .", "after_revision": "A serious and ubiquitous issue in existing mapped WENO schemes is that most of them can hardly preserve high resolutions and in the meantime prevent spurious oscillations on solving hyperbolic conservation laws with long output times. Our goal in this article is to address this widely concerned problem [3, 4, 15, 29, 16, 18]. In our previous work 18], the order-preserving (OP) criterion was originally introduced and carefully used to devise a new mapped WENO scheme that performs satisfactorily in long-run simulations, and hence it was indicated that the OP criterion plays a critical role in the maintenance of low-dissipation and robustness for the mapped WENO schemes. Thus, in our present work, we firstly define the family of the mapped WENO schemes, whose mappings meet the OP criterion, as OP-Mapped WENO. Next, we attentively take a closer look at the mappings of various existing mapped WENO schemes and devise a general formula for them. It helps us to extend the %DIFDELCMD < ]%%% OP criterion into the design of the improved mappings. Then , we propose the generalized implementation of obtaining a group of OP-Mapped WENO schemes, named MOP-WENO-X as they are developed from the existing mapped WENO-X schemes , where the notation \"X\" is used to identify the version of the existing mapped WENO scheme %DIFDELCMD < ]%%% %DIFDELCMD < ]%%% %DIFDELCMD < ]%%% . Finally, extensive numerical experiments and comparisons with competing schemes are conducted to demonstrate the enhanced performances of the MOP-WENO-X schemes .", "edit_actions": [{"type": "R", "before": "We firstly", "after": "In our previous work", "start_char_pos": 328, "end_char_pos": 338}, {"type": "A", "before": null, "after": "18", "start_char_pos": 339, "end_char_pos": 339}, {"type": "A", "before": null, "after": ", the order-preserving (OP) criterion was originally introduced and carefully used to devise a new mapped WENO scheme that performs satisfactorily in long-run simulations, and hence it was indicated that the OP criterion plays a critical role in the maintenance of low-dissipation and robustness for the mapped WENO schemes. Thus, in our present work, we firstly define the family of the mapped WENO schemes, whose mappings meet the OP criterion, as OP-Mapped WENO. Next, we attentively", "start_char_pos": 340, "end_char_pos": 340}, {"type": "D", "before": "order-preserving (OP ) criterion , originally defined and carefully examined in", "after": null, "start_char_pos": 481, "end_char_pos": 560}, {"type": "D", "before": "18", "after": null, "start_char_pos": 561, "end_char_pos": 563}, {"type": "R", "before": ",", "after": "OP criterion", "start_char_pos": 581, "end_char_pos": 582}, {"type": "R", "before": "mappings.Next", "after": "improved mappings. Then", "start_char_pos": 606, "end_char_pos": 619}, {"type": "A", "before": null, "after": "generalized", "start_char_pos": 637, "end_char_pos": 637}, {"type": "R", "before": "the new mappings satisfying the OP criterion from those of", "after": "a group of OP-Mapped WENO schemes, named MOP-WENO-X as they are developed from", "start_char_pos": 666, "end_char_pos": 724}, {"type": "A", "before": null, "after": ",", "start_char_pos": 760, "end_char_pos": 760}, {"type": "D", "before": ", e. g., X = M", "after": null, "start_char_pos": 851, "end_char_pos": 865}, {"type": "D", "before": "11", "after": null, "start_char_pos": 866, "end_char_pos": 868}, {"type": "D", "before": ", PM6", "after": null, "start_char_pos": 886, "end_char_pos": 891}, {"type": "D", "before": "3", "after": null, "start_char_pos": 892, "end_char_pos": 893}, {"type": "D", "before": ", or PPM5", "after": null, "start_char_pos": 911, "end_char_pos": 920}, {"type": "D", "before": "15", "after": null, "start_char_pos": 921, "end_char_pos": 923}, {"type": "R", "before": ", et al. Then we build the resultant mapped WENO schemes and denote them as", "after": ". Finally, extensive numerical experiments and comparisons with competing schemes are conducted to demonstrate the enhanced performances of the", "start_char_pos": 941, "end_char_pos": 1016}, {"type": "D", "before": ". The numerical solutions of the one-dimensional linear advection equation with different initial conditions and some standard numerical experiments of two-dimensional Euler system, computed by the MOP-WENO-X schemes , are compared with the ones generated by their corresponding WENO-X schemes and the WENO-JS scheme. To summarize, the MOP-WENO-X", "after": null, "start_char_pos": 1028, "end_char_pos": 1374}, {"type": "D", "before": "gain definite advatages in terms of attaining high resolutions and meanwhile avoiding spurious oscillations near discontinuities for long output time simulations of the one-dimensional linear advection problems, as well as significantly reducing the post-shock oscillations in the simulations of the two-dimensional steady problems with strong shock waves", "after": null, "start_char_pos": 1383, "end_char_pos": 1738}], "sents_char_pos": [0, 234, 327, 454, 615, 949, 1029, 1345]}
+{"doc_id": "2105.05366", "revision_depth": "1", "before_revision": "We investigate a class of multi-object rearrangement problems in which a robotic manipulator, capable of carrying an item and making item swaps, is tasked to sort items stored in lattices in a time-optimal manner. We systematically analyze the intrinsic optimality structure, which is fairly rich and intriguing, under different levels of item distinguishability (fully labeled or partially labeled ) and different lattice dimensions. Focusing on the most practical setting of one and two dimensions, we develop efficient ( low polynomial time ) algorithms that optimally perform rearrangements on 1D lattices under both fully and partially labeled settings. On the other hand, we prove that rearrangement on 2D and higher dimensional lattices becomes computationally intractable to optimally solve. Despite their NP-hardness, we are able to again develop efficient algorithms for 2D fully and partially labeled settingsthat are asymptotically optimal , in expectation, assuming that the initial configuration is randomly selected . Simulation studies confirm the effectiveness of our algorithms in comparison to natural greedy best-first algorithms.", "after_revision": "We propose and study a class of rearrangement problems under a novel pick-n-swap prehensile manipulation model, in which a robotic manipulator, capable of carrying an item and making item swaps, is tasked to sort items stored in lattices of variable dimensions in a time-optimal manner. We systematically analyze the intrinsic optimality structure, which is fairly rich and intriguing, under different levels of item distinguishability (fully labeled , where each item has a unique label, or partially labeled , where multiple items may be of the same type ) and different lattice dimensions. Focusing on the most practical setting of one and two dimensions, we develop low polynomial time cycle-following based algorithms that optimally perform rearrangements on 1D lattices under both fully- and partially-labeled settings. On the other hand, we show that rearrangement on 2D and higher dimensional lattices becomes computationally intractable to optimally solve. Despite their NP-hardness, we prove that efficient cycle-following based algorithms remain asymptotically optimal for 2D fully- and partially-labeled settings , in expectation, using the interesting fact that random permutations induce only a small number of cycles. We further improve these algorithms to provide 1.x-optimality when the number of items is small . Simulation studies corroborate the effectiveness of our algorithms.", "edit_actions": [{"type": "R", "before": "investigate", "after": "propose and study", "start_char_pos": 3, "end_char_pos": 14}, {"type": "R", "before": "multi-object rearrangement problems", "after": "rearrangement problems under a novel pick-n-swap prehensile manipulation model,", "start_char_pos": 26, "end_char_pos": 61}, {"type": "A", "before": null, "after": "of variable dimensions", "start_char_pos": 188, "end_char_pos": 188}, {"type": "A", "before": null, "after": ", where each item has a unique label,", "start_char_pos": 379, "end_char_pos": 379}, {"type": "A", "before": null, "after": ", where multiple items may be of the same type", "start_char_pos": 401, "end_char_pos": 401}, {"type": "D", "before": "efficient (", "after": null, "start_char_pos": 515, "end_char_pos": 526}, {"type": "R", "before": ")", "after": "cycle-following based", "start_char_pos": 547, "end_char_pos": 548}, {"type": "R", "before": "fully and partially labeled", "after": "fully- and partially-labeled", "start_char_pos": 624, "end_char_pos": 651}, {"type": "R", "before": "prove", "after": "show", "start_char_pos": 684, "end_char_pos": 689}, {"type": "R", "before": "are able to again develop efficient algorithms", "after": "prove that efficient cycle-following based algorithms remain asymptotically optimal", "start_char_pos": 833, "end_char_pos": 879}, {"type": "R", "before": "fully and partially labeled settingsthat are asymptotically optimal", "after": "fully- and partially-labeled settings", "start_char_pos": 887, "end_char_pos": 954}, {"type": "R", "before": "assuming that the initial configuration is randomly selected", "after": "using the interesting fact that random permutations induce only a small number of cycles. We further improve these algorithms to provide 1.x-optimality when the number of items is small", "start_char_pos": 973, "end_char_pos": 1033}, {"type": "R", "before": "confirm", "after": "corroborate", "start_char_pos": 1055, "end_char_pos": 1062}, {"type": "D", "before": "algorithms in comparison to natural greedy best-first", "after": null, "start_char_pos": 1088, "end_char_pos": 1141}], "sents_char_pos": [0, 214, 437, 661, 802]}
+{"doc_id": "2105.06188", "revision_depth": "1", "before_revision": "Inspired by the conclusion that human choose the visual cortex regions which corresponding to the real size of the object to analyze the features of the object, when realizing the objects in the real world . This paper presents a framework -- SizeNetwhich based on both the real sizes and the features of objects , to solve objects recognition problems. SizeNet was used for the objects recognition experiments on the homemade Rsize dataset, and compared with State-of-the-art Methods AlexNet, VGG-16, Inception V3, Resnet-18 DenseNet-121. The results show that SizeNet provides much higher accuracy rates for the objects recognition than the other algorithms. SizeNet can solve the two problems that correctly recognize the objects whose features are highly similar but the real sizes are obviously different from each other, and correctly distinguish the target object from the interference objects whose real sizes are obviously different from the target object. This is because SizeNet recognizes the object based not only the features, but also the real size. The real size of the object can help to exclude the interference object categories whose real size ranges do not match the real size of the object, which greatly reducing the object categories' number in the label set used for the downstream object recognition based on object features. SizeNet is of great significance to the study of interpretable computer vision. Our code and dataset will be made public.", "after_revision": "Inspired by the conclusion that humans choose the visual cortex regions corresponding to the real size of an object to analyze its features when identifying objects in the real world , this paper presents a framework , SizeNet, which is based on both the real sizes and features of objects to solve object recognition problems. SizeNet was used for object recognition experiments on the homemade Rsize dataset, and was compared with the state-of-the-art methods AlexNet, VGG-16, Inception V3, Resnet-18 , and DenseNet-121. The results showed that SizeNet provides much higher accuracy rates for object recognition than the other algorithms. SizeNet can solve the two problems of correctly recognizing objects with highly similar features but real sizes that are obviously different from each other, and correctly distinguishing a target object from interference objects whose real sizes are obviously different from the target object. This is because SizeNet recognizes objects based not only on their features, but also on their real size. The real size of an object can help exclude the interference object 's categories whose real size ranges do not match the real size of the object, which greatly reduces the object's categories' number in the label set used for the downstream object recognition based on object features. SizeNet is of great significance for studying the interpretable computer vision. Our code and dataset will thus be made public.", "edit_actions": [{"type": "R", "before": "human", "after": "humans", "start_char_pos": 32, "end_char_pos": 37}, {"type": "D", "before": "which", "after": null, "start_char_pos": 71, "end_char_pos": 76}, {"type": "R", "before": "the", "after": "an", "start_char_pos": 111, "end_char_pos": 114}, {"type": "R", "before": "the features of the object, when realizing the", "after": "its features when identifying", "start_char_pos": 133, "end_char_pos": 179}, {"type": "R", "before": ". This", "after": ", this", "start_char_pos": 206, "end_char_pos": 212}, {"type": "R", "before": "-- SizeNetwhich", "after": ", SizeNet, which is", "start_char_pos": 240, "end_char_pos": 255}, {"type": "D", "before": "the", "after": null, "start_char_pos": 289, "end_char_pos": 292}, {"type": "R", "before": ", to solve objects", "after": "to solve object", "start_char_pos": 313, "end_char_pos": 331}, {"type": "R", "before": "the objects", "after": "object", "start_char_pos": 375, "end_char_pos": 386}, {"type": "R", "before": "compared with State-of-the-art Methods", "after": "was compared with the state-of-the-art methods", "start_char_pos": 446, "end_char_pos": 484}, {"type": "A", "before": null, "after": ", and", "start_char_pos": 526, "end_char_pos": 526}, {"type": "R", "before": "show", "after": "showed", "start_char_pos": 553, "end_char_pos": 557}, {"type": "R", "before": "the objects", "after": "object", "start_char_pos": 611, "end_char_pos": 622}, {"type": "R", "before": "that correctly recognize the objects whose features are highly similar but the real sizes", "after": "of correctly recognizing objects with highly similar features but real sizes that", "start_char_pos": 697, "end_char_pos": 786}, {"type": "R", "before": "distinguish the", "after": "distinguishing a", "start_char_pos": 842, "end_char_pos": 857}, {"type": "D", "before": "the", "after": null, "start_char_pos": 877, "end_char_pos": 880}, {"type": "R", "before": "the object", "after": "objects", "start_char_pos": 1002, "end_char_pos": 1012}, {"type": "R", "before": "the", "after": "on their", "start_char_pos": 1028, "end_char_pos": 1031}, {"type": "R", "before": "the", "after": "on their", "start_char_pos": 1051, "end_char_pos": 1054}, {"type": "R", "before": "the", "after": "an", "start_char_pos": 1083, "end_char_pos": 1086}, {"type": "D", "before": "to", "after": null, "start_char_pos": 1103, "end_char_pos": 1105}, {"type": "A", "before": null, "after": "'s", "start_char_pos": 1138, "end_char_pos": 1138}, {"type": "R", "before": "reducing the object", "after": "reduces the object's", "start_char_pos": 1229, "end_char_pos": 1248}, {"type": "R", "before": "to the study of", "after": "for studying the", "start_char_pos": 1387, "end_char_pos": 1402}, {"type": "A", "before": null, "after": "thus", "start_char_pos": 1460, "end_char_pos": 1460}], "sents_char_pos": [0, 207, 353, 540, 661, 966, 1065, 1353, 1433]}
+{"doc_id": "2105.06422", "revision_depth": "1", "before_revision": "Robustness to certain distribution shifts is a key requirement in many ML applications. Often, relevant distribution shifts can be formulated in terms of interventions on the process that generates the input data . Here, we consider the problem of learning a predictor whose risk across such shifts is invariant. A key challenge to learning such risk-invariant predictors is shortcut learning, or the tendency for models to rely on spurious correlations in practice, even when a predictor based on shift-invariant features could achieve optimal i.i.d generalization in principle . We propose a flexible, causally-motivated approach to address this challenge. Specifically, we propose a regularization scheme that makes use of auxiliary labelsfor potential shortcut features, which are often available at training time . Drawing on the causal structure of the problem, we enforce a conditional independence between the representation used to predict the main label and the auxiliary labels. We show both theoretically and empirically that this causally-motivated regularization scheme yields robust predictors that generalize well both in-distribution and under distribution shifts, and does so with better sample efficiency than standard regularization or weighting approaches .", "after_revision": "Robustness to certain forms of distribution shift is a key concern in many ML applications. Often, robustness can be formulated as enforcing invariances to particular interventions on the data generating process . Here, we study a flexible, causally-motivated approach to enforcing such invariances, paying special attention to shortcut learning, where a robust predictor can achieve optimal i.i.d generalization in principle , but instead it relies on spurious correlations or shortcuts in practice. Our approach uses auxiliary labels, typically available at training time , to enforce conditional independences between the latent factors that determine these labels. We show both theoretically and empirically that causally-motivated regularization schemes (a) lead to more robust estimators that generalize well under distribution shift, and (b) have better finite sample efficiency compared to usual regularization schemes, even in the absence of distribution shifts. Our analysis highlights important theoretical properties of training techniques commonly used in causal inference, fairness, and disentanglement literature .", "edit_actions": [{"type": "R", "before": "distribution shifts", "after": "forms of distribution shift", "start_char_pos": 22, "end_char_pos": 41}, {"type": "R", "before": "requirement", "after": "concern", "start_char_pos": 51, "end_char_pos": 62}, {"type": "R", "before": "relevant distribution shifts", "after": "robustness", "start_char_pos": 95, "end_char_pos": 123}, {"type": "R", "before": "in terms of", "after": "as enforcing invariances to particular", "start_char_pos": 142, "end_char_pos": 153}, {"type": "R", "before": "process that generates the input data", "after": "data generating process", "start_char_pos": 175, "end_char_pos": 212}, {"type": "R", "before": "consider the problem of learning a predictor whose risk across such shifts is invariant. A key challenge to learning such risk-invariant predictors is", "after": "study a flexible, causally-motivated approach to enforcing such invariances, paying special attention to", "start_char_pos": 224, "end_char_pos": 374}, {"type": "R", "before": "or the tendency for models to rely on spurious correlations in practice, even when a predictor based on shift-invariant features could", "after": "where a robust predictor can", "start_char_pos": 394, "end_char_pos": 528}, {"type": "R", "before": ". We propose a flexible, causally-motivated approach to address this challenge. Specifically, we propose a regularization scheme that makes use of auxiliary labelsfor potential shortcut features, which are often", "after": ", but instead it relies on spurious correlations or shortcuts in practice. Our approach uses auxiliary labels, typically", "start_char_pos": 579, "end_char_pos": 790}, {"type": "R", "before": ". Drawing on the causal structure of the problem, we enforce a conditional independence between the representation used to predict the main label and the auxiliary", "after": ", to enforce conditional independences between the latent factors that determine these", "start_char_pos": 818, "end_char_pos": 981}, {"type": "D", "before": "this", "after": null, "start_char_pos": 1038, "end_char_pos": 1042}, {"type": "R", "before": "scheme yields robust predictors", "after": "schemes (a) lead to more robust estimators", "start_char_pos": 1077, "end_char_pos": 1108}, {"type": "R", "before": "both in-distribution and under distribution shifts, and does so with better sample efficiency than standard regularization or weighting approaches", "after": "under distribution shift, and (b) have better finite sample efficiency compared to usual regularization schemes, even in the absence of distribution shifts. Our analysis highlights important theoretical properties of training techniques commonly used in causal inference, fairness, and disentanglement literature", "start_char_pos": 1130, "end_char_pos": 1276}], "sents_char_pos": [0, 87, 214, 312, 580, 658, 989]}
+{"doc_id": "2105.08645", "revision_depth": "1", "before_revision": "We present CoTexT, a transformer-based architecture encoder-decoder pre-trained model that learns the representative context between natural language (NL) and programming language (PL) through multi-task learning. CoTexT is pre-trained , in self-supervised fashion, based on large programming language corpus to learn general-purpose understanding and code-text generation supporting downstream NL-PL task such as code summarizing/documentation, code generation, defect detection, code debugging, etc . We train CoTexT on different combination of available PL corpus including both \"bimodal\" and \"unimodal\" data where the former is the combinations of both natural texts and their corresponding code snippets in an input sequence and the latter is merely code snippets. We evaluate multi-task learning CoTexT on different generation and classification tasks on CodeXGLUE and it achieves state-of-the-art on all downstream tasks .", "after_revision": "We present CoTexT, a pre-trained, transformer-based encoder-decoder model that learns the representative context between natural language (NL) and programming language (PL) . Using self-supervision, CoTexT is pre-trained on large programming language corpora to learn a general understanding of language and code. CoTexT supports downstream NL-PL tasks such as code summarizing/documentation, code generation, defect detection, and code debugging . We train CoTexT on different combinations of available PL corpus including both \"bimodal\" and \"unimodal\" data . Here, bimodal data is the combination of text and corresponding code snippets , whereas unimodal data is merely code snippets. We first evaluate CoTexT with multi-task learning : we perform Code Summarization on 6 different programming languages and Code Refinement on both small and medium size featured in the CodeXGLUE dataset. We further conduct extensive experiments to investigate CoTexT on other tasks within the CodeXGlue dataset, including Code Generation and Defect Detection. We consistently achieve SOTA results in these tasks, demonstrating the versatility of our models .", "edit_actions": [{"type": "A", "before": null, "after": "pre-trained,", "start_char_pos": 21, "end_char_pos": 21}, {"type": "D", "before": "architecture", "after": null, "start_char_pos": 40, "end_char_pos": 52}, {"type": "D", "before": "pre-trained", "after": null, "start_char_pos": 69, "end_char_pos": 80}, {"type": "R", "before": "through multi-task learning.", "after": ". Using self-supervision,", "start_char_pos": 186, "end_char_pos": 214}, {"type": "D", "before": ", in self-supervised fashion, based", "after": null, "start_char_pos": 237, "end_char_pos": 272}, {"type": "R", "before": "corpus to learn general-purpose understanding and code-text generation supporting", "after": "corpora to learn a general understanding of language and code. CoTexT supports", "start_char_pos": 303, "end_char_pos": 384}, {"type": "R", "before": "task", "after": "tasks", "start_char_pos": 402, "end_char_pos": 406}, {"type": "R", "before": "code debugging, etc", "after": "and code debugging", "start_char_pos": 482, "end_char_pos": 501}, {"type": "R", "before": "combination", "after": "combinations", "start_char_pos": 533, "end_char_pos": 544}, {"type": "R", "before": "where the former is the combinations of both natural texts and their", "after": ". Here, bimodal data is the combination of text and", "start_char_pos": 613, "end_char_pos": 681}, {"type": "R", "before": "in an input sequence and the latter", "after": ", whereas unimodal data", "start_char_pos": 710, "end_char_pos": 745}, {"type": "R", "before": "evaluate", "after": "first evaluate CoTexT with", "start_char_pos": 774, "end_char_pos": 782}, {"type": "R", "before": "CoTexT on different generation and classification tasks on CodeXGLUE and it achieves state-of-the-art on all downstream tasks", "after": ": we perform Code Summarization on 6 different programming languages and Code Refinement on both small and medium size featured in the CodeXGLUE dataset. We further conduct extensive experiments to investigate CoTexT on other tasks within the CodeXGlue dataset, including Code Generation and Defect Detection. We consistently achieve SOTA results in these tasks, demonstrating the versatility of our models", "start_char_pos": 803, "end_char_pos": 928}], "sents_char_pos": [0, 214, 503, 770]}
+{"doc_id": "2105.13502", "revision_depth": "1", "before_revision": "Recent advances in deep learning have led to the development of accurate and efficient models for various computer vision applications such as object classification, semantic segmentation, and object detection. However, learning highly accurate models relies on the availability of datasets with a large number of annotated images . Due to this, model performance drops drastically when evaluated on label-scarce datasets having visually distinct images . This issue is commonly referred to as covariate shift or dataset bias. Domain adaptation attempts to address this problemby leveraging domain shift characteristics from labeled data in a related domain when learning a classifier for label-scarce target dataset. There are a plethora of works to adapt object classification and semantic segmentation models to label-scarce target dataset through unsupervised domain adaptation. Considering that object detection is a fundamental task in computer vision, many recent works have recently focused on addressing the domain adaptation issue for object detection as well. In this paper, we provide a brief introduction to the domain adaptation problem for object detection and present an overview of various methods proposed to date for addressing this problem . Furthermore, we highlight strategies proposed for this problem and the associated shortcomings. Subsequently, we identify multiple aspects of the unsupervised domain adaptive detection problem that are most promising for future research in the area . We believe that this survey shall be valuable to the pattern recognition experts working in the fields of computer vision, biometrics, medical imaging, and autonomous navigation by introducing them to the problem, getting them familiar with the current status of the progress , and providing them with promising direction for future research.", "after_revision": "Recent advances in deep learning have led to the development of accurate and efficient models for various computer vision applications such as classification, segmentation, and detection. However, learning highly accurate models relies on the availability of large-scale annotated datasets . Due to this, model performance drops drastically when evaluated on label-scarce datasets having visually distinct images , termed as domain adaptation problem. There is a plethora of works to adapt classification and segmentation models to label-scarce target datasets through unsupervised domain adaptation. Considering that detection is a fundamental task in computer vision, many recent works have focused on developing novel domain adaptive detection techniques. Here, we describe in detail the domain adaptation problem for detection and present an extensive survey of the various methods . Furthermore, we highlight strategies proposed and the associated shortcomings. Subsequently, we identify multiple aspects of the problem that are most promising for future research . We believe that this survey shall be valuable to the pattern recognition experts working in the fields of computer vision, biometrics, medical imaging, and autonomous navigation by introducing them to the problem, and familiarizing them with the current status of the progress while providing promising directions for future research.", "edit_actions": [{"type": "R", "before": "object classification, semantic", "after": "classification,", "start_char_pos": 143, "end_char_pos": 174}, {"type": "D", "before": "object", "after": null, "start_char_pos": 193, "end_char_pos": 199}, {"type": "R", "before": "datasets with a large number of annotated images", "after": "large-scale annotated datasets", "start_char_pos": 282, "end_char_pos": 330}, {"type": "R", "before": ". This issue is commonly referred to as covariate shift or dataset bias. Domain adaptation attempts to address this problemby leveraging domain shift characteristics from labeled data in a related domain when learning a classifier for label-scarce target dataset. There are", "after": ", termed as domain adaptation problem. There is", "start_char_pos": 454, "end_char_pos": 727}, {"type": "R", "before": "object classification and semantic", "after": "classification and", "start_char_pos": 757, "end_char_pos": 791}, {"type": "R", "before": "dataset", "after": "datasets", "start_char_pos": 835, "end_char_pos": 842}, {"type": "D", "before": "object", "after": null, "start_char_pos": 900, "end_char_pos": 906}, {"type": "R", "before": "recently focused on addressing the domain adaptation issue for object detection as well. In this paper, we provide a brief introduction to", "after": "focused on developing novel domain adaptive detection techniques. Here, we describe in detail", "start_char_pos": 982, "end_char_pos": 1120}, {"type": "D", "before": "object", "after": null, "start_char_pos": 1155, "end_char_pos": 1161}, {"type": "R", "before": "overview of various methods proposed to date for addressing this problem", "after": "extensive survey of the various methods", "start_char_pos": 1187, "end_char_pos": 1259}, {"type": "D", "before": "for this problem", "after": null, "start_char_pos": 1308, "end_char_pos": 1324}, {"type": "D", "before": "unsupervised domain adaptive detection", "after": null, "start_char_pos": 1408, "end_char_pos": 1446}, {"type": "D", "before": "in the area", "after": null, "start_char_pos": 1499, "end_char_pos": 1510}, {"type": "R", "before": "getting them familiar", "after": "and familiarizing them", "start_char_pos": 1727, "end_char_pos": 1748}, {"type": "R", "before": ", and providing them with promising direction", "after": "while providing promising directions", "start_char_pos": 1789, "end_char_pos": 1834}], "sents_char_pos": [0, 210, 332, 455, 526, 717, 882, 1070, 1261, 1357, 1512]}
+{"doc_id": "2106.00538", "revision_depth": "1", "before_revision": "Given the common problem of missing data in real-world applications from various fields , such as remote sensing, ecology and meteorology, the interpolation of missing spatial and spatio-temporal datacan be of tremendous value . Existing methods for spatial interpolation, most notably Gaussian processes and spatial autoregressive models, tend to suffer from (a) a trade-off between modelling local or global spatial interaction , (b) the assumption there is only one possible path between two points , and (c) the assumption of homogeneity of intermediate locations between points . Addressing these issues , we propose a value propagation method, inspired by Markov reward processes (MRPs) , as a spatial interpolation method, and introduce two variants thereof: (i) a static discount (SD-MRP) and (ii) a data-driven weight prediction (WP-MRP) variant. Both these interpolation variants operate locally, while implicitly accounting for global spatial relationships in the entire system through recursion. We evaluated our proposed methods by comparing the mean absolute errors and running times of interpolated grid cells to those of 7 common baselines . Our analysis involved detailed experiments on two synthetic and two real-world datasets over 44 total experimental conditions. Experimental results show the competitive advantage of MRP interpolation on real-world data, as the average performance of SD-MRP on real-world data under all experimental conditionswas ranked significantly higher than that of all other methods, followed by WP-MRP. On synthetic data, we show that WP-MRP can perform better than SD-MRP given sufficiently informative features. We further found that, even in cases where our methods had no significant advantage over baselines numerically, our methods preserved the spatial structure of the target grid better than the baselines .", "after_revision": "The interpolation of spatial data can be of tremendous value in various applications , such as forecasting weather from only a few measurements of meteorological or remote sensing data . Existing methods for spatial interpolation, such as variants of kriging and spatial autoregressive models, tend to suffer from at least one of the following limitations: (a) the assumption of stationarity , (b) the assumption of isotropy , and (c) the trade-off between modelling local or global spatial interaction . Addressing these issues in this work , we propose the use of Markov reward processes (MRPs) as a spatial interpolation method, and we introduce three variants thereof: (i) a basic static discount MRP (SD-MRP) , (ii) an accurate but mostly theoretical optimised MRP (O-MRP), and (iii) a transferable weight prediction MRP (WP-MRP) . All variants of MRP interpolation operate locally, while also implicitly accounting for global spatial relationships in the entire system through recursion. Additionally, O-MRP and WP-MRP no longer assume stationarity and are robust to anisotropy. We evaluated our proposed methods by comparing the mean absolute errors of their interpolated grid cells to those of 7 common baselines , selected from models based on spatial autocorrelation, (spatial) regression, and deep learning. We performed detailed evaluations on two publicly available datasets (local GDP values, and COVID-19 patient trajectory data). The results from these experiments clearly show the competitive advantage of MRP interpolation , which achieved significantly lower errors than the existing methods in 23 out of 40 experimental conditions, or 35 out of 40 when including O-MRP .", "edit_actions": [{"type": "R", "before": "Given the common problem of missing data in real-world applications from various fields", "after": "The interpolation of spatial data can be of tremendous value in various applications", "start_char_pos": 0, "end_char_pos": 87}, {"type": "R", "before": "remote sensing, ecology and meteorology, the interpolation of missing spatial and spatio-temporal datacan be of tremendous value", "after": "forecasting weather from only a few measurements of meteorological or remote sensing data", "start_char_pos": 98, "end_char_pos": 226}, {"type": "R", "before": "most notably Gaussian processes", "after": "such as variants of kriging", "start_char_pos": 273, "end_char_pos": 304}, {"type": "A", "before": null, "after": "at least one of the following limitations:", "start_char_pos": 360, "end_char_pos": 360}, {"type": "R", "before": "a trade-off between modelling local or global spatial interaction", "after": "the assumption of stationarity", "start_char_pos": 365, "end_char_pos": 430}, {"type": "R", "before": "there is only one possible path between two points", "after": "of isotropy", "start_char_pos": 452, "end_char_pos": 502}, {"type": "R", "before": "assumption of homogeneity of intermediate locations between points", "after": "trade-off between modelling local or global spatial interaction", "start_char_pos": 517, "end_char_pos": 583}, {"type": "A", "before": null, "after": "in this work", "start_char_pos": 610, "end_char_pos": 610}, {"type": "R", "before": "a value propagation method, inspired by", "after": "the use of", "start_char_pos": 624, "end_char_pos": 663}, {"type": "D", "before": ",", "after": null, "start_char_pos": 695, "end_char_pos": 696}, {"type": "R", "before": "introduce two", "after": "we introduce three", "start_char_pos": 736, "end_char_pos": 749}, {"type": "R", "before": "static discount", "after": "basic static discount MRP", "start_char_pos": 774, "end_char_pos": 789}, {"type": "R", "before": "and", "after": ",", "start_char_pos": 799, "end_char_pos": 802}, {"type": "R", "before": "a data-driven weight prediction", "after": "an accurate but mostly theoretical optimised MRP (O-MRP), and (iii) a transferable weight prediction MRP", "start_char_pos": 808, "end_char_pos": 839}, {"type": "R", "before": "variant. Both these interpolation variants", "after": ". All variants of MRP interpolation", "start_char_pos": 849, "end_char_pos": 891}, {"type": "A", "before": null, "after": "also", "start_char_pos": 915, "end_char_pos": 915}, {"type": "A", "before": null, "after": "Additionally, O-MRP and WP-MRP no longer assume stationarity and are robust to anisotropy.", "start_char_pos": 1011, "end_char_pos": 1011}, {"type": "R", "before": "and running times of", "after": "of their", "start_char_pos": 1084, "end_char_pos": 1104}, {"type": "R", "before": ". Our analysis involved detailed experiments on two synthetic and two real-world datasets over 44 total experimental conditions. Experimental results", "after": ", selected from models based on spatial autocorrelation, (spatial) regression, and deep learning. We performed detailed evaluations on two publicly available datasets (local GDP values, and COVID-19 patient trajectory data). The results from these experiments clearly", "start_char_pos": 1160, "end_char_pos": 1309}, {"type": "R", "before": "on real-world data, as the average performance of SD-MRP on real-world data under all experimental conditionswas ranked significantly higher than that of all other methods, followed by WP-MRP. On synthetic data, we show that WP-MRP can perform better than SD-MRP given sufficiently informative features. We further found that, even in cases where our methods had no significant advantage over baselines numerically, our methods preserved the spatial structure of the target grid better than the baselines", "after": ", which achieved significantly lower errors than the existing methods in 23 out of 40 experimental conditions, or 35 out of 40 when including O-MRP", "start_char_pos": 1362, "end_char_pos": 1866}], "sents_char_pos": [0, 228, 585, 857, 1010, 1161, 1288, 1554, 1665]}
+{"doc_id": "2106.00761", "revision_depth": "1", "before_revision": "Link prediction is one of the central problems in graph mining. However, recent studies highlight the importance of the higher-order network analysis, where complex structures called motifs are the first-class citizens. We illustrate that existing link prediction schemes fail to predict the appearance of complex motifsin graph data. To address thisissue, we propose a general motif prediction problem . We establish the theoretical foundation of motif prediction and we propose several heuristics that , for a fixed set of nodes in a graph and a specified motif, assess the chances for this motif to appear. To make the scores realistic, our heuristics - among others - consider correlations between links, i.e., the potential impact of some arriving links on the appearance of other parts of a given motif. Finally, for highest accuracy, we develop a graph neural network (GNN) architecture for motif prediction. Our architecture offers vertex features and sampling schemes that capture the rich structural properties of motifs. While our heuristics are fast and do not need any training, using GNNs ensures highest accuracy when predicting the arrival of complex graph structures, both dense (e.g., k-cliques) and sparse (e.g., k-stars). Importantly, its advantages over schemes based on uncorrelated link prediction increase with the increasing motif size and complexity. We also successfully apply our architecture for predicting more arbitrary clusters and communities, illustrating its potential for graph mining beyond motif analysis.", "after_revision": "Link prediction is one of the central problems in graph mining. However, recent studies highlight the importance of higher-order network analysis, where complex structures called motifs are the first-class citizens. We first show that existing link prediction schemes fail to effectively predict motifs. To alleviate this, we establish a general motif prediction problem and we propose several heuristics that assess the chances for a specified motif to appear. To make the scores realistic, our heuristics consider - among others - correlations between links, i.e., the potential impact of some arriving links on the appearance of other links in a given motif. Finally, for highest accuracy, we develop a graph neural network (GNN) architecture for motif prediction. Our architecture offers vertex features and sampling schemes that capture the rich structural properties of motifs. While our heuristics are fast and do not need any training, GNNs ensure highest accuracy of predicting motifs, both for dense (e.g., k-cliques) and for sparse ones (e.g., k-stars). We consistently outperform the best available competitor by more than 10\\% on average and up to 32\\% in area under the curve. Importantly, the advantages of our approach over schemes based on uncorrelated link prediction increase with the increasing motif size and complexity. We also successfully apply our architecture for predicting more arbitrary clusters and communities, illustrating its potential for graph mining beyond motif analysis.", "edit_actions": [{"type": "D", "before": "the", "after": null, "start_char_pos": 116, "end_char_pos": 119}, {"type": "R", "before": "illustrate", "after": "first show", "start_char_pos": 223, "end_char_pos": 233}, {"type": "R", "before": "predict the appearance of complex motifsin graph data. To address thisissue, we propose", "after": "effectively predict motifs. To alleviate this, we establish", "start_char_pos": 280, "end_char_pos": 367}, {"type": "D", "before": ". We establish the theoretical foundation of motif prediction", "after": null, "start_char_pos": 403, "end_char_pos": 464}, {"type": "D", "before": ", for a fixed set of nodes in a graph and a specified motif,", "after": null, "start_char_pos": 504, "end_char_pos": 564}, {"type": "R", "before": "this", "after": "a specified", "start_char_pos": 588, "end_char_pos": 592}, {"type": "A", "before": null, "after": "consider", "start_char_pos": 655, "end_char_pos": 655}, {"type": "D", "before": "consider", "after": null, "start_char_pos": 673, "end_char_pos": 681}, {"type": "R", "before": "parts of", "after": "links in", "start_char_pos": 787, "end_char_pos": 795}, {"type": "R", "before": "using GNNs ensures highest accuracy when predicting the arrival of complex graph structures, both", "after": "GNNs ensure highest accuracy of predicting motifs, both for", "start_char_pos": 1093, "end_char_pos": 1190}, {"type": "R", "before": "sparse", "after": "for sparse ones", "start_char_pos": 1219, "end_char_pos": 1225}, {"type": "R", "before": "Importantly, its advantages", "after": "We consistently outperform the best available competitor by more than 10\\% on average and up to 32\\% in area under the curve. Importantly, the advantages of our approach", "start_char_pos": 1243, "end_char_pos": 1270}], "sents_char_pos": [0, 63, 219, 334, 404, 609, 810, 916, 1032, 1242, 1377]}
+{"doc_id": "2106.01708", "revision_depth": "1", "before_revision": "Incomplete instances with various missing attributes in many real-world scenes have brought challenges to the classification task. There are some missing values imputation methods to fill the missing values with substitute values before classification . However, the separation between imputation and classification may lead to inferior performance since label information are ignored during imputation. Moreover, these imputation methods tend to initialize these missing valueswith strong prior assumptions, while the unreliability of such initialization is rarely considered. To tackle these problems, a novel semi-supervised conditional normalizing flow (SSCFlow) is proposed in this paper. SSCFlow explicitly utilizes the observed labels to facilitate the imputation and classification simultaneously by employing a semi-supervised algorithm to estimate the conditional probability density of missing values . Moreover, SSCFlow takes the initialized missing values as corrupted initial imputation and iteratively reconstructs their latent representations with an overcomplete denoising autoencoder to approximate the true conditional probability density of missing values. Experiments have been conducted with real-world datasets to demonstrate the robustness and efficiency of the proposed algorithm.", "after_revision": "Incomplete instances with various missing attributes in many real-world applications have brought challenges to the classification tasks. Missing values imputation methods are often employed to replace the missing values with substitute values . However, this process often separates the imputation and classification , which may lead to inferior performance since label information are often ignored during imputation. Moreover, traditional methods may rely on improper assumptions to initialize the missing values, whereas the unreliability of such initialization might lead to inferior performance. To address these problems, a novel semi-supervised conditional normalizing flow (SSCFlow) is proposed in this paper. SSCFlow explicitly utilizes the label information to facilitate the imputation and classification simultaneously by estimating the conditional distribution of incomplete instances with a novel semi-supervised normalizing flow . Moreover, SSCFlow treats the initialized missing values as corrupted initial imputation and iteratively reconstructs their latent representations with an overcomplete denoising autoencoder to approximate their true conditional distribution. Experiments on real-world datasets demonstrate the robustness and effectiveness of the proposed algorithm.", "edit_actions": [{"type": "R", "before": "scenes", "after": "applications", "start_char_pos": 72, "end_char_pos": 78}, {"type": "R", "before": "task. There are some missing", "after": "tasks. Missing", "start_char_pos": 125, "end_char_pos": 153}, {"type": "R", "before": "to fill", "after": "are often employed to replace", "start_char_pos": 180, "end_char_pos": 187}, {"type": "D", "before": "before classification", "after": null, "start_char_pos": 230, "end_char_pos": 251}, {"type": "R", "before": "the separation between", "after": "this process often separates the", "start_char_pos": 263, "end_char_pos": 285}, {"type": "A", "before": null, "after": ", which", "start_char_pos": 316, "end_char_pos": 316}, {"type": "A", "before": null, "after": "often", "start_char_pos": 378, "end_char_pos": 378}, {"type": "R", "before": "these imputation methods tend to initialize these missing valueswith strong prior assumptions, while", "after": "traditional methods may rely on improper assumptions to initialize the missing values, whereas", "start_char_pos": 416, "end_char_pos": 516}, {"type": "R", "before": "is rarely considered. To tackle", "after": "might lead to inferior performance. To address", "start_char_pos": 558, "end_char_pos": 589}, {"type": "R", "before": "observed labels", "after": "label information", "start_char_pos": 728, "end_char_pos": 743}, {"type": "R", "before": "employing a", "after": "estimating the conditional distribution of incomplete instances with a novel", "start_char_pos": 810, "end_char_pos": 821}, {"type": "R", "before": "algorithm to estimate the conditional probability density of missing values", "after": "normalizing flow", "start_char_pos": 838, "end_char_pos": 913}, {"type": "R", "before": "takes", "after": "treats", "start_char_pos": 934, "end_char_pos": 939}, {"type": "R", "before": "the true conditional probability density of missing values. Experiments have been conducted with", "after": "their true conditional distribution. Experiments on", "start_char_pos": 1119, "end_char_pos": 1215}, {"type": "D", "before": "to", "after": null, "start_char_pos": 1236, "end_char_pos": 1238}, {"type": "R", "before": "efficiency", "after": "effectiveness", "start_char_pos": 1270, "end_char_pos": 1280}], "sents_char_pos": [0, 130, 253, 405, 579, 695, 915, 1178]}
+{"doc_id": "2106.02785", "revision_depth": "1", "before_revision": "The duality of sensory inference and optimal control was known since 1960s and has recently been recognized as common computations required for posterior distributions in dynamic Bayesian inference and value functions in optimal control. Meanwhile, an intriguing question about the brain is why entire neocortex shares a canonical six-layer architecture , while its posterior and anterior halves are engaged in sensory processing and motor control, respectively. Here we consider a hypothesis that the anterior and posterior cortical circuits evolved for dual computations for sensory inference and optimal control, or perceptual and value-based decision making, respectively. We explore how different types of cortical neurons may represent different variables , such as prior and posterior distributions and value functions, and what cortical dynamics may realize required computations. We further discuss experimental and computational approaches are required for scrutinizing this dual cortical circuit hypothesis .", "after_revision": "The duality of sensory inference and motor control has been known since the 1960s and has recently been recognized as the commonality in computations required for the posterior distributions in Bayesian inference and the value functions in optimal control. Meanwhile, an intriguing question about the brain is why the entire neocortex shares a canonical six-layer architecture while its posterior and anterior halves are engaged in sensory processing and motor control, respectively. Here we consider the hypothesis that the sensory and motor cortical circuits implement the dual computations for Bayesian inference and optimal control, or perceptual and value-based decision making, respectively. We first review the classic duality of inference and control in linear quadratic systems and then review the correspondence between dynamic Bayesian inference and optimal control. Based on the architecture of the canonical cortical circuit, we explore how different cortical neurons may represent variables and implement computations .", "edit_actions": [{"type": "R", "before": "optimal control was known since", "after": "motor control has been known since the", "start_char_pos": 37, "end_char_pos": 68}, {"type": "R", "before": "common", "after": "the commonality in", "start_char_pos": 111, "end_char_pos": 117}, {"type": "A", "before": null, "after": "the", "start_char_pos": 144, "end_char_pos": 144}, {"type": "D", "before": "dynamic", "after": null, "start_char_pos": 172, "end_char_pos": 179}, {"type": "A", "before": null, "after": "the", "start_char_pos": 203, "end_char_pos": 203}, {"type": "A", "before": null, "after": "the", "start_char_pos": 297, "end_char_pos": 297}, {"type": "D", "before": ",", "after": null, "start_char_pos": 357, "end_char_pos": 358}, {"type": "R", "before": "a", "after": "the", "start_char_pos": 483, "end_char_pos": 484}, {"type": "R", "before": "anterior and posterior cortical circuits evolved for", "after": "sensory and motor cortical circuits implement the", "start_char_pos": 505, "end_char_pos": 557}, {"type": "R", "before": "sensory", "after": "Bayesian", "start_char_pos": 580, "end_char_pos": 587}, {"type": "A", "before": null, "after": "first review the classic duality of inference and control in linear quadratic systems and then review the correspondence between dynamic Bayesian inference and optimal control. Based on the architecture of the canonical cortical circuit, we", "start_char_pos": 683, "end_char_pos": 683}, {"type": "D", "before": "types of", "after": null, "start_char_pos": 706, "end_char_pos": 714}, {"type": "R", "before": "different variables , such as prior and posterior distributions and value functions, and what cortical dynamics may realize required computations. We further discuss experimental and computational approaches are required for scrutinizing this dual cortical circuit hypothesis", "after": "variables and implement computations", "start_char_pos": 746, "end_char_pos": 1021}], "sents_char_pos": [0, 239, 465, 679, 892]}
+{"doc_id": "2106.09501", "revision_depth": "1", "before_revision": "With the rapid development of artificial intelligence, a series of machine learning algorithms, e.g., graph neural networks , have been proposed to facilitate network analysis or graph data mining. Unfortunately , recent studies indicate that such advanced methods may suffer from adversarial attacks, i.e., they may lose effectiveness when only a small fraction of links are purposely changed. However, little is known what's the difference between adversarial nodes and clean nodes, and what's the preference of each attack method, in terms of network structure. In this paper , we theoretically investigate three well-known adversarial attack methods, i.e., Nettack, Meta Attack, and GradArgmax , and find that different attack methods have their specific attack preferences on changing network structure . Such attack patterns are further validated by the experimental results on real-world networks, i.e., generally the top 4 most important network attributes on detecting adversarial samples are sufficient to explain the preference of each attack method. Based on these findings, we further utilize the network attributes to design machine learning models for adversarial sample detection and attack method recognition , achieving the outstanding performance.", "after_revision": "With the rapid development of artificial intelligence, a number of machine learning algorithms, such as graph neural networks have been proposed to facilitate network analysis or graph data mining. Although effective , recent studies show that these advanced methods may suffer from adversarial attacks, i.e., they may lose effectiveness when only a small fraction of links are unexpectedly changed. This paper investigates three well-known adversarial attack methods, i.e., Nettack, Meta Attack, and GradArgmax . It is found that different attack methods have their specific attack preferences on changing the target network structures . Such attack pattern are further verified by experimental results on some real-world networks, revealing that generally the top four most important network attributes on detecting adversarial samples suffice to explain the preference of an attack method. Based on these findings, the network attributes are utilized to design machine learning models for adversarial sample detection and attack method recognition with outstanding performance.", "edit_actions": [{"type": "R", "before": "series", "after": "number", "start_char_pos": 57, "end_char_pos": 63}, {"type": "R", "before": "e.g.,", "after": "such as", "start_char_pos": 96, "end_char_pos": 101}, {"type": "D", "before": ",", "after": null, "start_char_pos": 124, "end_char_pos": 125}, {"type": "R", "before": "Unfortunately", "after": "Although effective", "start_char_pos": 198, "end_char_pos": 211}, {"type": "R", "before": "indicate that such", "after": "show that these", "start_char_pos": 229, "end_char_pos": 247}, {"type": "R", "before": "purposely changed. However, little is known what's the difference between adversarial nodes and clean nodes, and what's the preference of each attack method, in terms of network structure. In this paper , we theoretically investigate", "after": "unexpectedly changed. This paper investigates", "start_char_pos": 376, "end_char_pos": 609}, {"type": "R", "before": ", and find", "after": ". It is found", "start_char_pos": 698, "end_char_pos": 708}, {"type": "R", "before": "network structure", "after": "the target network structures", "start_char_pos": 790, "end_char_pos": 807}, {"type": "R", "before": "patterns are further validated by the", "after": "pattern are further verified by", "start_char_pos": 822, "end_char_pos": 859}, {"type": "A", "before": null, "after": "some", "start_char_pos": 884, "end_char_pos": 884}, {"type": "R", "before": "i.e.,", "after": "revealing that", "start_char_pos": 906, "end_char_pos": 911}, {"type": "R", "before": "4", "after": "four", "start_char_pos": 930, "end_char_pos": 931}, {"type": "R", "before": "are sufficient", "after": "suffice", "start_char_pos": 999, "end_char_pos": 1013}, {"type": "R", "before": "each", "after": "an", "start_char_pos": 1043, "end_char_pos": 1047}, {"type": "D", "before": "we further utilize", "after": null, "start_char_pos": 1088, "end_char_pos": 1106}, {"type": "A", "before": null, "after": "are utilized", "start_char_pos": 1130, "end_char_pos": 1130}, {"type": "R", "before": ", achieving the", "after": "with", "start_char_pos": 1228, "end_char_pos": 1243}], "sents_char_pos": [0, 197, 394, 564, 809, 1062]}
+{"doc_id": "2106.11929", "revision_depth": "1", "before_revision": "Temperature monitoring during the life time of heat-source components in engineering systems becomes essential to ensure the normal work and even the long working life of the heat sources. However, prior methods, which mainly use the interpolate estimation , require large amounts of temperature tensors for an accurate estimation. To solve this problem, this work develops a novel physics-informed deep surrogate models for temperature field reconstruction . First, we defines the temperature field reconstruction task of heat-source systems . Then, this work develops the deep surrogate model mapping for the proposed task . Finally, considering the physical properties of heat transfer , this work proposes four different losses and joint learns the deep surrogate model with these losses . Experimental studies have conducted over typical two-dimensional heat-source systems to demonstrate the effectiveness and efficiency of the proposed physics-informed deep surrogate models for temperature field reconstruction .", "after_revision": "Temperature monitoring during the life time of heat source components in engineering systems becomes essential to ensure the normal work and even the long working life of these heat sources. However, prior methods, which mainly use the interpolate estimation to reconstruct the whole temperature field with the temperature value from limited monitoring points , require large amounts of temperature tensors for an accurate estimation. This may decrease the availability and reliability of the system and sharply increase the monitoring cost. Furthermore, limited number of labelled training samples are available for the training of deep models. To solve this problem, this work develops a novel physics-informed deep reversible regression models for temperature field reconstruction of heat-source systems (TFR-HSS), which can better reconstruct the temperature field with the given limited monitoring points unsupervisedly . First, we define the temperature field reconstruction task of heat-source systems mathematically, numerically model the problem, and further transform the problem as an image-to-image regression problem . Then, based on the law of forward and backward propagation of deep models, this work develops the deep reversible regression model which can better learn the physical information near the boundary and improve the reconstruction performance . Finally, considering the physical characteristics of heat conduction as well as the boundary conditions , this work proposes the physics-informed reconstruction loss including four training losses and joint learns the deep surrogate model with these losses unsupervisedly . Experimental studies have conducted over typical two-dimensional heat-source systems to demonstrate the effectiveness and efficiency of the proposed physics-informed deep reversible regression models for TFR-HSS task .", "edit_actions": [{"type": "R", "before": "heat-source", "after": "heat source", "start_char_pos": 47, "end_char_pos": 58}, {"type": "R", "before": "the", "after": "these", "start_char_pos": 171, "end_char_pos": 174}, {"type": "A", "before": null, "after": "to reconstruct the whole temperature field with the temperature value from limited monitoring points", "start_char_pos": 257, "end_char_pos": 257}, {"type": "A", "before": null, "after": "This may decrease the availability and reliability of the system and sharply increase the monitoring cost. Furthermore, limited number of labelled training samples are available for the training of deep models.", "start_char_pos": 333, "end_char_pos": 333}, {"type": "R", "before": "surrogate", "after": "reversible regression", "start_char_pos": 406, "end_char_pos": 415}, {"type": "A", "before": null, "after": "of heat-source systems (TFR-HSS), which can better reconstruct the temperature field with the given limited monitoring points unsupervisedly", "start_char_pos": 460, "end_char_pos": 460}, {"type": "R", "before": "defines", "after": "define", "start_char_pos": 473, "end_char_pos": 480}, {"type": "A", "before": null, "after": "mathematically, numerically model the problem, and further transform the problem as an image-to-image regression problem", "start_char_pos": 546, "end_char_pos": 546}, {"type": "A", "before": null, "after": "based on the law of forward and backward propagation of deep models,", "start_char_pos": 555, "end_char_pos": 555}, {"type": "R", "before": "surrogate model mapping for the proposed task", "after": "reversible regression model which can better learn the physical information near the boundary and improve the reconstruction performance", "start_char_pos": 584, "end_char_pos": 629}, {"type": "R", "before": "properties of heat transfer", "after": "characteristics of heat conduction as well as the boundary conditions", "start_char_pos": 666, "end_char_pos": 693}, {"type": "R", "before": "four different", "after": "the physics-informed reconstruction loss including four training", "start_char_pos": 715, "end_char_pos": 729}, {"type": "A", "before": null, "after": "unsupervisedly", "start_char_pos": 797, "end_char_pos": 797}, {"type": "R", "before": "surrogate models for temperature field reconstruction", "after": "reversible regression models for TFR-HSS task", "start_char_pos": 971, "end_char_pos": 1024}], "sents_char_pos": [0, 188, 332, 462, 548, 631]}
+{"doc_id": "2106.15515", "revision_depth": "1", "before_revision": "We approach the question , \"What is Consciousness?\" in a new way, not as Descartes' \"systematic doubt\", but as URLanisms find their way in their world. Finding one's way involves finding possible uses of features of the world that might be beneficial or avoiding those that might be harmful. \"Possible uses of X to accomplish Y\" are \"Affordances\". The number of uses of X is indefinite , the different uses are unordered and are not deducible from one another. All biological adaptations are either affordances seized by heritable variation and selection or, far faster, by URLanism acting in its world finding uses of X to accomplish Y. Based on this, we reach rather astonishing conclusions: 1) Strong AI is not possible. Universal Turing Machines cannot \"find\" novel affordances. 2) Brain-mind is not purely classical physics for no classical physics system can be an analogue computer whose dynamical behavior can be isomorphic to \"possible uses\". 3) Brain mind must be partly quantum -- supported by increasing evidence at 6.0 sigma to 7.3 Sigma. 4) Based on Heisenberg's interpretation of the quantum state as \"Potentia\" converted to \"Actuals\" by Measurement, a natural hypothesis is that mind actualizes Potentia. This is supported at 5.2 Sigma. Then Mind's actualization of entangled brain-mind-world states are experienced as qualia and allow \"seeing\" or \"perceiving\" of uses of X to accomplish Y. We can and do jury-rig. Computers cannot. 5) Beyond familiar quantum computers, we consider Trans-Turing-Systems.", "after_revision": "We approach the question \"What is Consciousness?\" in a new way, not as Descartes' \"systematic doubt\", but as URLanisms find their way in their world. Finding one's way involves finding possible uses of features of the world that might be beneficial or avoiding those that might be harmful. \"Possible uses of X to accomplish Y\" are \"Affordances\". The number of uses of X is indefinite (or unknown) , the different uses are unordered and are not deducible from one another. All biological adaptations are either affordances seized by heritable variation and selection or, far faster, by URLanism acting in its world finding uses of X to accomplish Y. Based on this, we reach rather astonishing conclusions: ( 1) Artificial General Intelligence based on Universal Turing Machines (UTMs) is not possible, since UTMs cannot \"find\" novel affordances. ( 2) Brain-mind is not purely classical physics for no classical physics system can be an analogue computer whose dynamical behavior can be isomorphic to \"possible uses\". ( 3) Brain mind must be partly quantum - supported by increasing evidence at 6.0 sigma to 7.3 Sigma. ( 4) Based on Heisenberg's interpretation of the quantum state as \"Potentia\" converted to \"Actuals\" by Measurement, a natural hypothesis is that mind actualizes Potentia. This is supported at 5.2 Sigma. Then Mind's actualizations of entangled brain-mind-world states are experienced as qualia and allow \"seeing\" or \"perceiving\" of uses of X to accomplish Y. We can and do jury-rig. Computers cannot. ( 5) Beyond familiar quantum computers, we discuss the potentialities of Trans-Turing-Systems.", "edit_actions": [{"type": "D", "before": ",", "after": null, "start_char_pos": 25, "end_char_pos": 26}, {"type": "A", "before": null, "after": "(or unknown)", "start_char_pos": 386, "end_char_pos": 386}, {"type": "A", "before": null, "after": "(", "start_char_pos": 695, "end_char_pos": 695}, {"type": "R", "before": "Strong AI is not possible.", "after": "Artificial General Intelligence based on", "start_char_pos": 699, "end_char_pos": 725}, {"type": "A", "before": null, "after": "(UTMs) is not possible, since UTMs", "start_char_pos": 752, "end_char_pos": 752}, {"type": "A", "before": null, "after": "(", "start_char_pos": 786, "end_char_pos": 786}, {"type": "A", "before": null, "after": "(", "start_char_pos": 956, "end_char_pos": 956}, {"type": "R", "before": "--", "after": "-", "start_char_pos": 994, "end_char_pos": 996}, {"type": "A", "before": null, "after": "(", "start_char_pos": 1057, "end_char_pos": 1057}, {"type": "R", "before": "actualization", "after": "actualizations", "start_char_pos": 1271, "end_char_pos": 1284}, {"type": "A", "before": null, "after": "(", "start_char_pos": 1455, "end_char_pos": 1455}, {"type": "R", "before": "consider", "after": "discuss the potentialities of", "start_char_pos": 1497, "end_char_pos": 1505}], "sents_char_pos": [0, 151, 291, 347, 461, 725, 785, 955, 1056, 1226, 1258, 1412, 1436, 1454]}
+{"doc_id": "2107.04834", "revision_depth": "1", "before_revision": "The seven basic facial expression classifications are a basic way to express complex human emotions and are an important part of artificial intelligence research. Based on the traditional Bayesian neural network framework, the ResNet-18 _BNN network constructed in this paper has been improved in the following three aspects: (1) A new objective function is proposed, which is composed of the KL loss of uncertain parameters and the intersection of specific parameters. Entropy loss composition. (2) Aiming at a special objective function, a training scheme for alternately updating these two parameters is proposed. (3) Only model the parameters of the last convolution group. According to experimental analysis, our method achieves an accuracy of 98.28\\% on the evaluation setof the Aff-Wild2 database . Compared with the traditional Bayesian Neural Network , our method brings the highest classification accuracy gain.", "after_revision": "The seven basic facial expression classifications are a basic way to express complex human emotions and are an important part of artificial intelligence research. Based on the traditional Bayesian neural network framework, the ResNet18 _BNN network constructed in this paper has been improved in the following three aspects: (1) A new objective function is proposed, which is composed of the KL loss of uncertain parameters and the intersection of specific parameters. Entropy loss composition. (2) Aiming at a special objective function, a training scheme for alternately updating these two parameters is proposed. (3) Only model the parameters of the last convolution group. Through testing on the FER2013 test set, we achieved 71.5\\% and 73.1\\% accuracy in PublicTestSet and PrivateTestSet, respectively . Compared with traditional Bayesian neural networks , our method brings the highest classification accuracy gain.", "edit_actions": [{"type": "R", "before": "ResNet-18", "after": "ResNet18", "start_char_pos": 227, "end_char_pos": 236}, {"type": "R", "before": "According to experimental analysis, our method achieves an accuracy of 98.28\\% on the evaluation setof the Aff-Wild2 database", "after": "Through testing on the FER2013 test set, we achieved 71.5\\% and 73.1\\% accuracy in PublicTestSet and PrivateTestSet, respectively", "start_char_pos": 678, "end_char_pos": 803}, {"type": "R", "before": "the traditional Bayesian Neural Network", "after": "traditional Bayesian neural networks", "start_char_pos": 820, "end_char_pos": 859}], "sents_char_pos": [0, 162, 469, 495, 616, 677]}
+{"doc_id": "2107.05214", "revision_depth": "1", "before_revision": "The task of table structure recognition is to recognize the internal structure of a table , which is a key step to make machines understand tables . However, tabular data in unstructured digital documents, e.g. Portable Document Format (PDF) and images, are difficult to parse into structured machine-readable format, due to complexity and diversity in their structure and style, especially for complex tables. In this paper, we introduce Split, Embed and Merge (SEM), an accurate table structure recognizer. In the first stage, we use the FCN to predict the potential regions of the table row (column) separators, so as to obtain the bounding boxes of the basic grids in the table. In the second stage, we not only extract the visual features corresponding to each grid through RoIAlign, but also use the off-the-shelf recognizer and the BERT to extract the semantic features . The fused features of both are used to characterize each table grid . We find that by adding additional semantic features to each grid, the ambiguity problem of the table structure from the visual perspective can be solved to a certain extent and achieve higher precision . Finally, we process the merging of these basic grids in a self-regression manner. The correspondent merging results is learned by the attention maps in attention mechanism. With the proposed method, we can recognize the structure of tables well, even for complex tables. SEM can achieve an average F-Measure of 96.9%DIFDELCMD < \\\\%%% %DIF < on the SciTSR dataset which outperforms other methods by a large margin. Extensive experiments on other publicly available table structure recognition datasets show that our model achieves state-of-the-art.\\end{abstract} ", "after_revision": "Table structure recognition is an essential part for making machines understand tables. Its main task is to recognize the internal structure of a table . However, due to the complexity and diversity in their structure and style, it is very difficult to parse the tabular data into the structured format which machines can understand easily, especially for complex tables. In this paper, we introduce Split, Embed and Merge (SEM), an accurate table structure recognizer. Our model takes table images as input and can correctly recognize the structure of tables, whether they are simple or a complex tables. SEM is mainly composed of three parts, splitter, embedder and merger. In the first stage, we apply the splitter to predict the potential regions of the table row (column) separators, and obtain the fine grid structure of the table. In the second stage, by taking a full consideration of the textual information in the table, we fuse the output features for each table grid from both vision and language modalities. Moreover, we achieve a higher precision in our experiments through adding additional semantic features . Finally, we process the merging of these basic table grids in a self-regression manner. The correspondent merging results is learned %DIFDELCMD < \\\\%%% %DIF < on the SciTSR dataset which outperforms other methods by a large margin. Extensive experiments on other publicly available table structure recognition datasets show that our model achieves state-of-the-art.\\end{abstract} through the attention mechanism. In our experiments, SEM achieves an average F1-Measure of 97.11\\% on the SciTSR dataset which outperforms other methods by a large margin. We also won the first place in the complex table and third place in all tables in ICDAR 2021 Competition on Scientific Literature Parsing, Task-B. Extensive experiments on other publicly available datasets demonstrate that our model achieves state-of-the-art.", "edit_actions": [{"type": "R", "before": "The task of table", "after": "Table", "start_char_pos": 0, "end_char_pos": 17}, {"type": "A", "before": null, "after": "an essential part for making machines understand tables. Its main task is", "start_char_pos": 43, "end_char_pos": 43}, {"type": "D", "before": ", which is a key step to make machines understand tables", "after": null, "start_char_pos": 91, "end_char_pos": 147}, {"type": "R", "before": "tabular data in unstructured digital documents, e.g. Portable Document Format (PDF) and images, are difficult to parse into structured machine-readable format, due to", "after": "due to the", "start_char_pos": 159, "end_char_pos": 325}, {"type": "A", "before": null, "after": "it is very difficult to parse the tabular data into the structured format which machines can understand easily,", "start_char_pos": 381, "end_char_pos": 381}, {"type": "A", "before": null, "after": "Our model takes table images as input and can correctly recognize the structure of tables, whether they are simple or a complex tables. SEM is mainly composed of three parts, splitter, embedder and merger.", "start_char_pos": 511, "end_char_pos": 511}, {"type": "R", "before": "use the FCN", "after": "apply the splitter", "start_char_pos": 535, "end_char_pos": 546}, {"type": "R", "before": "so as to obtain the bounding boxes of the basic grids in the", "after": "and obtain the fine grid structure of the", "start_char_pos": 618, "end_char_pos": 678}, {"type": "R", "before": "we not only extract the visual features corresponding to each grid through RoIAlign, but also use the off-the-shelf recognizer and the BERT to extract the semantic features . The fused features of both are used to characterize", "after": "by taking a full consideration of the textual information in the table, we fuse the output features for", "start_char_pos": 707, "end_char_pos": 933}, {"type": "R", "before": ". We find that by adding additional semantic features to each grid, the ambiguity problem of the table structure from the visual perspective can be solved to a certain extent and achieve higher precision", "after": "from both vision and language modalities. Moreover, we achieve a higher precision in our experiments through adding additional semantic features", "start_char_pos": 950, "end_char_pos": 1153}, {"type": "A", "before": null, "after": "table", "start_char_pos": 1203, "end_char_pos": 1203}, {"type": "D", "before": "by the attention maps in attention mechanism. With the proposed method, we can recognize the structure of tables well, even for complex tables. SEM can achieve an average F-Measure of 96.9", "after": null, "start_char_pos": 1284, "end_char_pos": 1472}, {"type": "A", "before": null, "after": "through the attention mechanism. In our experiments, SEM achieves an average F1-Measure of 97.11\\% on the SciTSR dataset which outperforms other methods by a large margin. We also won the first place in the complex table and third place in all tables in ICDAR 2021 Competition on Scientific Literature Parsing, Task-B. Extensive experiments on other publicly available datasets demonstrate that our model achieves state-of-the-art.", "start_char_pos": 1719, "end_char_pos": 1719}], "sents_char_pos": [0, 149, 412, 510, 685, 881, 951, 1155, 1238, 1329, 1427, 1570, 1704]}
+{"doc_id": "2107.06031", "revision_depth": "1", "before_revision": "A significant economic cost for many companies that operate with fleets of vehicles is related to their fuel consumption. This consumption can be reduced by acting over some aspects, such as the driving behaviour style of vehicle drivers. Improving driving behaviour (and other features) can save fuel on a fleet of vehicles without needing to change other aspects, such as the planned routes or stops. This is important not only for mitigating economic costs within a company, but also for reducing the emissions associated to fuel consumption , mainly when the vehicles have petrol or diesel engines . In this paper we show how Explainable Artificial Intelligence (XAI) can be useful for quantifying the impact that different feature groups have on the fuel consumption of a particular fleet. For that, we use Explainable Boosting Machines (EBM) that are trained over different features (up to 70) in order to first model the relationship between them and the fuel consumption, and then explain it. With it, we compare the explanations provided by the EBM with general references from the literature that estimate the potential impact that those features may have on the fuel consumption, in order to validate this approach . We work with several real-world industry datasets that represent different types of fleets, from ones that have passenger cars to others that include heavy-duty vehicles such as trucks.", "after_revision": "A significant economic cost for many companies that operate with fleets of diesel and petrol vehicles is related to fuel consumption. Consumption can be reduced by acting over some factors, like driving behaviour style . Improving these factors can reduce the fuel usage of a vehicle without changing other aspects, such as planned routes or stops. This mitigates economic costs while reducing emissions associated to fuel consumption . In this paper we show how Explainable Artificial Intelligence (XAI) is useful for quantifying the impact that fuel factors have on the consumption of a vehicle fleet. We use Explainable Boosting Machines (EBM) , trained over different features in order to both model and explain the relationship between them and fuel consumption, and then assess quality of the explanations using prior domain knowledge . We work with real-world industry datasets that represent different types of vehicles, from passenger cars to heavy-duty trucks.", "edit_actions": [{"type": "A", "before": null, "after": "diesel and petrol", "start_char_pos": 75, "end_char_pos": 75}, {"type": "D", "before": "their", "after": null, "start_char_pos": 99, "end_char_pos": 104}, {"type": "R", "before": "This consumption", "after": "Consumption", "start_char_pos": 123, "end_char_pos": 139}, {"type": "R", "before": "aspects, such as the", "after": "factors, like", "start_char_pos": 175, "end_char_pos": 195}, {"type": "R", "before": "of vehicle drivers. Improving driving behaviour (and other features) can save fuel on a fleet of vehicles without needing to change", "after": ". Improving these factors can reduce the fuel usage of a vehicle without changing", "start_char_pos": 220, "end_char_pos": 351}, {"type": "D", "before": "the", "after": null, "start_char_pos": 375, "end_char_pos": 378}, {"type": "R", "before": "is important not only for mitigating economic costs within a company, but also for reducing the", "after": "mitigates economic costs while reducing", "start_char_pos": 409, "end_char_pos": 504}, {"type": "D", "before": ", mainly when the vehicles have petrol or diesel engines", "after": null, "start_char_pos": 546, "end_char_pos": 602}, {"type": "R", "before": "can be", "after": "is", "start_char_pos": 673, "end_char_pos": 679}, {"type": "R", "before": "different feature groups", "after": "fuel factors", "start_char_pos": 719, "end_char_pos": 743}, {"type": "D", "before": "fuel", "after": null, "start_char_pos": 756, "end_char_pos": 760}, {"type": "R", "before": "particular fleet. For that, we", "after": "vehicle fleet. We", "start_char_pos": 778, "end_char_pos": 808}, {"type": "R", "before": "that are", "after": ",", "start_char_pos": 849, "end_char_pos": 857}, {"type": "D", "before": "(up to 70)", "after": null, "start_char_pos": 890, "end_char_pos": 900}, {"type": "R", "before": "first model", "after": "both model and explain", "start_char_pos": 913, "end_char_pos": 924}, {"type": "D", "before": "the", "after": null, "start_char_pos": 959, "end_char_pos": 962}, {"type": "R", "before": "explain it. With it, we compare the explanations provided by the EBM with general references from the literature that estimate the potential impact that those features may have on the fuel consumption, in order to validate this approach", "after": "assess quality of the explanations using prior domain knowledge", "start_char_pos": 990, "end_char_pos": 1226}, {"type": "D", "before": "several", "after": null, "start_char_pos": 1242, "end_char_pos": 1249}, {"type": "R", "before": "fleets, from ones that have", "after": "vehicles, from", "start_char_pos": 1313, "end_char_pos": 1340}, {"type": "D", "before": "others that include", "after": null, "start_char_pos": 1359, "end_char_pos": 1378}, {"type": "D", "before": "vehicles such as", "after": null, "start_char_pos": 1390, "end_char_pos": 1406}], "sents_char_pos": [0, 122, 239, 403, 604, 795, 1001, 1228]}
+{"doc_id": "2107.09998", "revision_depth": "1", "before_revision": "Deep generative models have recently achieved impressive performance in speech synthesis and music generation . However, compared to the generation of those domain-specific sounds, the generation of general sounds (such as car horn, dog barking, and gun shot ) has received less attention, despite their wide potential applications. In our previous work, sounds are generated in the time domain using SampleRNN . However, it is difficult to capture long-range dependencies within sound recordings using this method . In this work, we propose to generate sounds conditioned on sound classes via neural discrete time-frequency representation learning . This offers an advantage in modelling long-range dependencies and retaining local fine-grained structure within a sound clip . We evaluate our proposed approach on the UrbanSound8K dataset, as compared to a SampleRNNbaseline , with the performance metrics measuring the quality and diversity of the generated sound samples . Experimental results show that our proposed method offers significantly better performance in diversity and comparable performance in quality, as compared to the baseline method .", "after_revision": "Deep generative models have recently achieved impressive performance in speech and music synthesis . However, compared to the generation of those domain-specific sounds, generating general sounds (such as siren, gunshots ) has received less attention, despite their wide applications. In previous work, the SampleRNN method was considered for sound generation in the time domain . However, SampleRNN is potentially limited in capturing long-range dependencies within sounds as it only back-propagates through a limited number of samples . In this work, we propose a method for generating sounds via neural discrete time-frequency representation learning , conditioned on sound classes . This offers an advantage in efficiently modelling long-range dependencies and retaining local fine-grained structures within sound clips . We evaluate our approach on the UrbanSound8K dataset, compared to SampleRNN , with the performance metrics measuring the quality and diversity of generated sounds . Experimental results show that our method offers comparable performance in quality and significantly better performance in diversity .", "edit_actions": [{"type": "R", "before": "synthesis and music generation", "after": "and music synthesis", "start_char_pos": 79, "end_char_pos": 109}, {"type": "R", "before": "the generation of", "after": "generating", "start_char_pos": 181, "end_char_pos": 198}, {"type": "R", "before": "car horn, dog barking, and gun shot", "after": "siren, gunshots", "start_char_pos": 223, "end_char_pos": 258}, {"type": "D", "before": "potential", "after": null, "start_char_pos": 309, "end_char_pos": 318}, {"type": "D", "before": "our", "after": null, "start_char_pos": 336, "end_char_pos": 339}, {"type": "R", "before": "sounds are generated", "after": "the SampleRNN method was considered for sound generation", "start_char_pos": 355, "end_char_pos": 375}, {"type": "D", "before": "using SampleRNN", "after": null, "start_char_pos": 395, "end_char_pos": 410}, {"type": "R", "before": "it is difficult to capture", "after": "SampleRNN is potentially limited in capturing", "start_char_pos": 422, "end_char_pos": 448}, {"type": "R", "before": "sound recordings using this method", "after": "sounds as it only back-propagates through a limited number of samples", "start_char_pos": 480, "end_char_pos": 514}, {"type": "R", "before": "to generate sounds conditioned on sound classes", "after": "a method for generating sounds", "start_char_pos": 542, "end_char_pos": 589}, {"type": "A", "before": null, "after": ", conditioned on sound classes", "start_char_pos": 649, "end_char_pos": 649}, {"type": "A", "before": null, "after": "efficiently", "start_char_pos": 680, "end_char_pos": 680}, {"type": "R", "before": "structure within a sound clip", "after": "structures within sound clips", "start_char_pos": 748, "end_char_pos": 777}, {"type": "D", "before": "proposed", "after": null, "start_char_pos": 796, "end_char_pos": 804}, {"type": "R", "before": "as compared to a SampleRNNbaseline", "after": "compared to SampleRNN", "start_char_pos": 843, "end_char_pos": 877}, {"type": "R", "before": "the generated sound samples", "after": "generated sounds", "start_char_pos": 948, "end_char_pos": 975}, {"type": "R", "before": "proposed method offers significantly better performance in diversity and", "after": "method offers", "start_char_pos": 1013, "end_char_pos": 1085}, {"type": "R", "before": "quality, as compared to the baseline method", "after": "quality and significantly better performance in diversity", "start_char_pos": 1112, "end_char_pos": 1155}], "sents_char_pos": [0, 111, 332, 516, 651, 779]}
+{"doc_id": "100194", "revision_depth": "3", "before_revision": "A group of Olympic protesters tried to break into British Columbia premier Gordon Campbell's office in Vancouver Thursday afternoon and splattered paint on the entrance. The Anti-Poverty Committee (APC) has taken full responsibility for the four people who splattered the paint . They tried to break into the office and frightened staff. \"Just after 2 p.m. a group of people attended the premier's office \u2026 and threw paint on the exterior of the building,\" said Const. Jana McGuinness of the Vancouver Police Department. \"This is a criminal charge. This is mischief, so if charges are warranted we'll definitely be laying charges.\" No arrests were made as the four managed to leave before police arrived. The paint represented three official colours of the Olympic flag; yellow, red and green. \"I think the activists should be prosecuted to the fullest extent of the law,\" said Campbell . \"Frankly, this is about seeing their faces on television.\" Attorney General of British Columbia Wally Oppal spoke out against the group , \"It's disturbing when you have people like these, who are continually intimidating law-abiding citizens , and I think the public is getting sick and tired of this group.\" The group has previously broke into Campbell's office in Vancouver last May when they posed as a flower delivery service and ransacked his office breaking windows and throwing pictures, office documents, and other items about . They also threw yellow paint and put posters on the Olympic Clock in downtown Vancouver last April. They said the protest was for poor citizens who are losing their homes because of money spent on developments for the upcoming 2010 Winter Olympics. Cunningham said the group will not stop the \"criminal acts\" until the government's budget surplus is spent on social housing and on the citizen's .", "after_revision": " The Anti-Poverty Committee (APC) has taken full responsibility for four people splattering latex paint on the front of British Columbia premier Gordon Campbell's office in Vancouver Thursday afternoon . They tried to break into the office and frightened staff. The paint represented three official colours of the Olympic flag; yellow, red and green. \"I think the activists should be prosecuted to the fullest extent of the law,\" said the premier . \"Frankly, this is about seeing their faces on television.\" Attorney General of British Columbia Wally Oppal spoke out against the group : \"It's disturbing when you have people like these, who are continually intimidating law-abiding citizens and I think the public is getting sick and tired of this group.\" The group vandalised and broke into Campbell's office in Vancouver last May when they posed as a flower delivery service and quickly ransacked his office breaking windows and throwing pictures, office documents, and various other items . They also threw yellow paint and put posters on the Olympic Clock in downtown Vancouver last April. They believe that poor citizens are losing their homes due to the money spent and developments near the city on preparation for the long-awaited 2010 Winter Olympics. Cunningham said the group will not stop the \"criminal acts\" until the government's budget surplus is spent on social housing and on the citizen's . \"Just after 2 p.m. a group of people attended the premier's office \u2026 and threw paint on the exterior of the building,\" said Const. Jana McGuinness of the Vancouver Police Department. \"This is a criminal charge. This is mischief, so if charges are warranted we'll definitely be laying charges.\" No arrests were made as the four managed to leave before police arrived .", "edit_actions": [{"type": "D", "before": "A group of Olympic protesters tried to break into British Columbia premier Gordon Campbell's office in Vancouver Thursday afternoon and splattered paint on the entrance.", "after": null, "start_char_pos": 0, "end_char_pos": 169}, {"type": "R", "before": "the four people who splattered the paint", "after": "four people splattering latex paint on the front of British Columbia premier Gordon Campbell's office in Vancouver Thursday afternoon", "start_char_pos": 237, "end_char_pos": 277}, {"type": "D", "before": "\"Just after 2 p.m. a group of people attended the premier's office \u2026 and threw paint on the exterior of the building,\" said Const. Jana McGuinness of the Vancouver Police Department. \"This is a criminal charge. This is mischief, so if charges are warranted we'll definitely be laying charges.\"", "after": null, "start_char_pos": 338, "end_char_pos": 631}, {"type": "D", "before": "No arrests were made as the four managed to leave before police arrived.", "after": null, "start_char_pos": 632, "end_char_pos": 704}, {"type": "R", "before": "Campbell", "after": "the premier", "start_char_pos": 878, "end_char_pos": 886}, {"type": "R", "before": ",", "after": ":", "start_char_pos": 1025, "end_char_pos": 1026}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1131, "end_char_pos": 1132}, {"type": "R", "before": "has previously", "after": "vandalised and", "start_char_pos": 1208, "end_char_pos": 1222}, {"type": "A", "before": null, "after": "quickly", "start_char_pos": 1323, "end_char_pos": 1323}, {"type": "R", "before": "other items about", "after": "various other items", "start_char_pos": 1407, "end_char_pos": 1424}, {"type": "R", "before": "said the protest was for poor citizens who", "after": "believe that poor citizens", "start_char_pos": 1532, "end_char_pos": 1574}, {"type": "R", "before": "because of money spent on developments for the upcoming", "after": "due to the money spent and developments near the city on preparation for the long-awaited", "start_char_pos": 1598, "end_char_pos": 1653}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1822, "end_char_pos": 1822}, {"type": "A", "before": null, "after": "\"Just after 2 p.m. a group of people attended the premier's office \u2026 and threw paint on the exterior of the building,\" said Const. Jana McGuinness of the Vancouver Police Department. \"This is a criminal charge. This is mischief, so if charges are warranted we'll definitely be laying charges.\"", "start_char_pos": 1823, "end_char_pos": 1823}, {"type": "A", "before": null, "after": "No arrests were made as the four managed to leave before police arrived", "start_char_pos": 1824, "end_char_pos": 1824}], "sents_char_pos": [0, 169, 279, 337, 406, 468, 520, 548, 631, 704, 770, 793, 947, 1197, 1426, 1526, 1675]}
+{"doc_id": "100299", "revision_depth": "1", "before_revision": "Key signing participants in front of FOSDEM 2008. Hundreds of developers of freely licensed and open source software from all over Europe met in Brussels , Belgium this weekend for FOSDEM 2008. The 8th edition attracted considerably more visitors than previous editions, mainly from Belgium and its neighbouring countries the Netherlands, Germany, France and the United Kingdom, but also from other European countries and even from the United States. During the conference weekend, presentations touched on programming languages, build systems, gaming (such as Battle for Wesnoth, Crystal Space, Globulation 2 ), packaging, virtualisation and web applications. The conference also has rooms (called DevRooms) were developers who usually work together via the internet can meet in real life and share thoughts on their projects; CentOS, Fedora, CrossDesktop, Drupal, GNOME, KDE, Mozilla, OpenSUSE and X.org had the biggest rooms this year. The corridors were filled with stands from organisations such as the Free Software Foundation Europe and the Free Knowledge Foundation, Debian, Ubuntu, OpenOffice.org , etc. Since FOSDEM brings many European open software developers to Brussels, it also provides an important networking opportunity. FOSDEM traditionally kicks off Belgium-style on Friday with a beer event, but during the entire weekend several groups hold parties all over town. Wikinews reporters attended a barbecue hosted by the Electronic Frontier Foundation (EFF) on Friday for an interview with EFF and Open Rights Group representatives about the upcoming E.U. proposal to extend copyright for performers to 95 years. Wikinews also interviewed Drupal founder and Acquia CTO Dries Buytaert about Drupal and how Acquia will relate to the Drupal developer community.", "after_revision": " participants in front of FOSDEM 2008. Hundreds of developers of freely licensed and open source software from all over Europe met in , Belgium this weekend for 2008. The 8th edition attracted considerably more visitors than previous editions, mainly from Belgium and its neighbouring countries the Netherlands, Germany, France and the United Kingdom, but also from other European countries and even from the United States. During the conference weekend, presentations touched on programming languages, build systems, gaming (such as , , ), packaging, and web applications. The conference also has rooms (called DevRooms) were developers who usually work together via the internet can meet in real life and share thoughts on their projects; , , , , , , , and had the biggest rooms this year. The corridors were filled with stands from organisations such as the and the Free Knowledge Foundation, , , , etc. Since FOSDEM brings many European open software developers to Brussels, it also provides an important networking opportunity. FOSDEM traditionally kicks off on Friday with a beer event, but during the entire weekend several groups hold parties all over town. Wikinews reporters attended a barbecue hosted by the (EFF) on Friday for an interview with EFF and representatives about the upcoming E.U. proposal to extend copyright for performers to 95 years. Wikinews also interviewed Drupal founder and Acquia about Drupal and how Acquia will relate to the Drupal developer community.", "edit_actions": [{"type": "D", "before": "Key signing", "after": null, "start_char_pos": 0, "end_char_pos": 11}, {"type": "D", "before": "Brussels", "after": null, "start_char_pos": 145, "end_char_pos": 153}, {"type": "D", "before": "FOSDEM", "after": null, "start_char_pos": 181, "end_char_pos": 187}, {"type": "R", "before": "Battle for Wesnoth, Crystal Space, Globulation 2", "after": ", ,", "start_char_pos": 561, "end_char_pos": 609}, {"type": "D", "before": "virtualisation", "after": null, "start_char_pos": 624, "end_char_pos": 638}, {"type": "R", "before": "CentOS, Fedora, CrossDesktop, Drupal, GNOME, KDE, Mozilla, OpenSUSE and X.org", "after": ", , , , , , , and", "start_char_pos": 828, "end_char_pos": 905}, {"type": "D", "before": "Free Software Foundation Europe", "after": null, "start_char_pos": 1008, "end_char_pos": 1039}, {"type": "D", "before": "Debian, Ubuntu, OpenOffice.org", "after": null, "start_char_pos": 1075, "end_char_pos": 1105}, {"type": "A", "before": null, "after": ", ,", "start_char_pos": 1108, "end_char_pos": 1108}, {"type": "D", "before": "Belgium-style", "after": null, "start_char_pos": 1271, "end_char_pos": 1284}, {"type": "D", "before": "Electronic Frontier Foundation", "after": null, "start_char_pos": 1440, "end_char_pos": 1470}, {"type": "D", "before": "Open Rights Group", "after": null, "start_char_pos": 1517, "end_char_pos": 1534}, {"type": "D", "before": "CTO Dries Buytaert", "after": null, "start_char_pos": 1684, "end_char_pos": 1702}], "sents_char_pos": [0, 49, 193, 450, 660, 827, 938, 1113, 1239, 1386, 1631]}
+{"doc_id": "100414", "revision_depth": "1", "before_revision": "George W. Bush has met today with the United States\u2019 National Governors Association. Speaking in the White House , President Bush after the meeting on Saturday said that , \"I George Bush like to tell people I'm going to finish strong, and I want to work with you [ Governors ] as I do so.\u201d He continued by saying that \"We George Bush and Governors share a responsibility to protect our country. I get briefed every morning about threats we face, and they're real. \" There has been debate recently about the Protect America Act, which was discussed in the meeting. In a recent radio address, Mr. Bush has saidthat \u201cThe Senate passed a good bill the Protect America Act that would have given our intelligence professionals the tools they need to keep us safe. But leaders in the House of Representatives blocked a House vote on the Senate bill, and then left on a 10-day recess. On Saturday, in the State Dining Room after the meeting, Mr.Bush said that \" This is a different kind of struggle than we've the US has ever faced before. It's essential that we understand the mentality of these killers. And so therefore we worked with Congress to protect - pass the Protect America Act, which everybody knows has expired.\u201d", "after_revision": "George W. Bush has met today with the United States\u2019 National Governors Association. Speaking in the White House after the meeting on Saturday , President Bush said, \u201cI like to tell people I'm going to finish strong, and I want to work with you [ governors ] as I do so.\u201d He continued , \u201cWe share a responsibility to protect our country. I get briefed every morning about threats we face, and they're real. \u201d There has been debate recently about the Protect America Act, which was discussed in the meeting. Referring to the Act in a recent radio address, the President said, \u201cThe Senate passed a good bill that would have given our intelligence professionals the tools they need to keep us safe. But leaders in the House of Representatives blocked a House vote on the Senate bill, and then left on a 10-day recess. \u201d On Saturday, in the State Dining Room after the meeting, Bush alluded to the challenges facing the U.S. \u201c This is a different kind of struggle than we've ever faced before. It's essential that we understand the mentality of these killers. And so therefore we worked with Congress to protect \u2014 pass the Protect America Act, which everybody knows has expired.\u201d", "edit_actions": [{"type": "D", "before": ", President Bush", "after": null, "start_char_pos": 113, "end_char_pos": 129}, {"type": "D", "before": "said that , \"I", "after": null, "start_char_pos": 160, "end_char_pos": 174}, {"type": "R", "before": "George Bush", "after": ", President Bush said, \u201cI", "start_char_pos": 175, "end_char_pos": 186}, {"type": "R", "before": "Governors", "after": "governors", "start_char_pos": 265, "end_char_pos": 274}, {"type": "D", "before": "by saying that \"We", "after": null, "start_char_pos": 303, "end_char_pos": 321}, {"type": "R", "before": "George Bush and Governors", "after": ", \u201cWe", "start_char_pos": 322, "end_char_pos": 347}, {"type": "R", "before": "\"", "after": "\u201d", "start_char_pos": 464, "end_char_pos": 465}, {"type": "R", "before": "In", "after": "Referring to the Act in", "start_char_pos": 564, "end_char_pos": 566}, {"type": "R", "before": "Mr. Bush has saidthat", "after": "the President said,", "start_char_pos": 591, "end_char_pos": 612}, {"type": "D", "before": "the Protect America Act", "after": null, "start_char_pos": 644, "end_char_pos": 667}, {"type": "A", "before": null, "after": "\u201d", "start_char_pos": 877, "end_char_pos": 877}, {"type": "R", "before": "Mr.Bush said that \"", "after": "Bush alluded to the challenges facing the U.S. \u201c", "start_char_pos": 935, "end_char_pos": 954}, {"type": "D", "before": "the US has", "after": null, "start_char_pos": 1003, "end_char_pos": 1013}, {"type": "R", "before": "-", "after": "\u2014", "start_char_pos": 1151, "end_char_pos": 1152}], "sents_char_pos": [0, 84, 289, 394, 463, 563, 757, 876, 1032, 1098]}
+{"doc_id": "100887", "revision_depth": "1", "before_revision": "Mike Green broke the scoreless tie over halfway through the second period on Washington's first power play. Viktor Kozlov scored an early third period goal to put the Capitals up by 2. Alexander Semin scored on the latter two minutes of a double minor power play to put Washington a goal further ahead of the Devils. Donald Brashear made it a 4 goal game with 2:55 remaining in the game. Cristobal Huet made his debut in the Capitals net, earning his third shutout of the season by stopping all of New Jersey's 18 shots. Tomas Plekanec scored on an early Canadiens power play to give Montreal the lead 1:24 into the first period. Mark Streit scored his 11th goal of the season just past the halfway point of the first period. Buffalo cut Montreal's lead in half when Thomas Vanek scored a power play goal in the second period. Plekanec completed a hat trick with a pair of back-to-back power play goals to put the Canadiens ahead by 3 before the second intermission. Andrei Kostitsyn gave Montreal a 3 goal lead 2:39 into the third period. Tim Connolly scored a goal to bring the Sabres within two goals, but a Sergei Kostitsyn goal would give the Canadiens their four goal lead back. Plekanec had 4 points, his first career hat trick and an assist on Andrei Kostitsyn's goal. Carey Price stopped 31 of Buffalo's 33 shots. Mikko Koivu scored less than halfway through the first period to give the Wild the first goal of the game. Steve Montador tied the score 5:34 into the second period. Minutes later, the Wild would retake the lead on a Stephane Veilleux goal, and then went ahead by 2 on Brent Burns ' power play goal. Nathan Horton would bring the Panthers within one, but they wouldn't find the back of the net again. The Wild pick up their second straight win, and their 6th straight win against Florida. Niklas Backstrom made 32 saves for Minnesota, and earned his 26th win of the season. The Panthers have now lost their third straight game. Joe Pavelski put San Jose on the board first 1:40 into the opening period. Devin Setoguchi gave the Sharks a 2 goal lead less than a minute into the second period. A couple minutes later, Detroit went on the scoreboard when Henrik Zetterberg scored his 36th goal of the season. Setoguchi scored his second goal of the night to put San Jose back up by 2 less than halfway through the third period. Mikael Samuelsson scored on a 5-on-3 power play to bring the Wings within 1. The Red Wings, who have been plagued recently with player injuries, have now lost 10 of their last 11 games. Niklas Kronwall and Zetterberg each had 2 of points for Detroit. Patrick Marleau also had a pair of points for the Sharks, assisting on each of Setoguchi's two goals. Michel Ouellet scored first for the Lightning to give them the first lead of the game. Alexandre Picard scored 12:13 into the second to put Tampa Bay ahead by two. Alexander Steen put Toronto on the board 27 seconds into the third. Jason Blake scored his 12th goal of the season to tie the score and force sudden death overtime. At 2:02 into the 4-on-4 overtime, Dan Boyle scored a power play goal to break Tampa Bay's 5 game losing streak. Lightning head coach John Tortorella had his 234th win, which tied the record held by Bob Johnson for most wins by an American-born coach. Ryan Shannon put the Canucks on the board first, 12:38 into the first period. Sami Salo would put Vancouver up by 2 goals in the second period. Columbus tied the score with a pair of goals 1:10 apart, first by Andrew Murray , his 5th of the season, then by Rick Nash , his 34th of the season. This would force overtime, where Jason Chimera scored for Columbus at 1:07 give the Canucks their second consecutive loss at home. Pascal Leclaire stopped 21 of Vancouver's 23 shots; Roberto Luongo made 30 of 33 saves for the Canucks. Mathieu Schneider scored for the Ducks 35 seconds into the game to put Anaheim up by 1 early. At 13:58 in the opening period, Scott Niedermayer put the Ducks up by two goals. Dion Phaneuf was assisted by Jarome Iginla in scoring Calgary's only goal goal of the game, in the second period. In the final minute of the game, Teemu Selanne scored a power play goal to salt Anaheim's victory. Selanne now holds a scoring streak of 9 points in 5 games. Jean-Sebastien Giguere made 22 saves for Anaheim, and earned his 4th straight win.", "after_revision": " broke the scoreless tie over halfway through the second period on Washington's first power play. scored an early third period goal to put the Capitals up by 2. scored on the latter two minutes of a double minor power play to put Washington a goal further ahead of the Devils. made it a 4 goal game with 2:55 remaining in the game. made his debut in the Capitals net, earning his third shutout of the season by stopping all of New Jersey's 18 shots. scored on an early Canadiens power play to give Montreal the lead 1:24 into the first period. scored his 11th goal of the season just past the halfway point of the first period. Buffalo cut Montreal's lead in half when scored a power play goal in the second period. Plekanec completed a hat trick with a pair of back-to-back power play goals to put the Canadiens ahead by 3 before the second intermission. gave Montreal a 3 goal lead 2:39 into the third period. scored a goal to bring the Sabres within two goals, but a goal would give the Canadiens their four goal lead back. Plekanec had 4 points, his first career hat trick and an assist on Andrei Kostitsyn's goal. stopped 31 of Buffalo's 33 shots. scored less than halfway through the first period to give the Wild the first goal of the game. tied the score 5:34 into the second period. Minutes later, the Wild would retake the lead on a goal, and then went ahead by 2 on ' power play goal. would bring the Panthers within one, but they wouldn't find the back of the net again. The Wild pick up their second straight win, and their 6th straight win against Florida. made 32 saves for Minnesota, and earned his 26th win of the season. The Panthers have now lost their third straight game. put San Jose on the board first 1:40 into the opening period. gave the Sharks a 2 goal lead less than a minute into the second period. A couple minutes later, Detroit went on the scoreboard when scored his 36th goal of the season. Setoguchi scored his second goal of the night to put San Jose back up by 2 less than halfway through the third period. scored on a 5-on-3 power play to bring the Wings within 1. The Red Wings, who have been plagued recently with player injuries, have now lost 10 of their last 11 games. and Zetterberg each had 2 of points for Detroit. also had a pair of points for the Sharks, assisting on each of Setoguchi's two goals. scored first for the Lightning to give them the first lead of the game. scored 12:13 into the second to put Tampa Bay ahead by two. put Toronto on the board 27 seconds into the third. scored his 12th goal of the season to tie the score and force sudden death overtime. At 2:02 into the 4-on-4 overtime, scored a power play goal to break Tampa Bay's 5 game losing streak. Lightning head coach had his 234th win, which tied the record held by for most wins by an United States|American -born coach. put the Canucks on the board first, 12:38 into the first period. would put Vancouver up by 2 goals in the second period. Columbus tied the score with a pair of goals 1:10 apart, first by , his 5th of the season, then by , his 34th of the season. This would force overtime, where scored for Columbus at 1:07 give the Canucks their second consecutive loss at home. stopped 21 of Vancouver's 23 shots; made 30 of 33 saves for the Canucks. scored for the Ducks 35 seconds into the game to put Anaheim up by 1 early. At 13:58 in the opening period, put the Ducks up by two goals. was assisted by in scoring Calgary's only goal goal of the game, in the second period. In the final minute of the game, scored a power play goal to salt Anaheim's victory. Selanne now holds a scoring streak of 9 points in 5 games. made 22 saves for Anaheim, and earned his 4th straight win.", "edit_actions": [{"type": "D", "before": "Mike Green", "after": null, "start_char_pos": 0, "end_char_pos": 10}, {"type": "D", "before": "Viktor Kozlov", "after": null, "start_char_pos": 108, "end_char_pos": 121}, {"type": "D", "before": "Alexander Semin", "after": null, "start_char_pos": 185, "end_char_pos": 200}, {"type": "D", "before": "Donald Brashear", "after": null, "start_char_pos": 317, "end_char_pos": 332}, {"type": "D", "before": "Cristobal Huet", "after": null, "start_char_pos": 388, "end_char_pos": 402}, {"type": "D", "before": "Tomas Plekanec", "after": null, "start_char_pos": 521, "end_char_pos": 535}, {"type": "D", "before": "Mark Streit", "after": null, "start_char_pos": 630, "end_char_pos": 641}, {"type": "D", "before": "Thomas Vanek", "after": null, "start_char_pos": 767, "end_char_pos": 779}, {"type": "D", "before": "Andrei Kostitsyn", "after": null, "start_char_pos": 967, "end_char_pos": 983}, {"type": "D", "before": "Tim Connolly", "after": null, "start_char_pos": 1040, "end_char_pos": 1052}, {"type": "D", "before": "Sergei Kostitsyn", "after": null, "start_char_pos": 1111, "end_char_pos": 1127}, {"type": "D", "before": "Carey Price", "after": null, "start_char_pos": 1277, "end_char_pos": 1288}, {"type": "D", "before": "Mikko Koivu", "after": null, "start_char_pos": 1323, "end_char_pos": 1334}, {"type": "D", "before": "Steve Montador", "after": null, "start_char_pos": 1430, "end_char_pos": 1444}, {"type": "D", "before": "Stephane Veilleux", "after": null, "start_char_pos": 1540, "end_char_pos": 1557}, {"type": "D", "before": "Brent Burns", "after": null, "start_char_pos": 1592, "end_char_pos": 1603}, {"type": "D", "before": "Nathan Horton", "after": null, "start_char_pos": 1623, "end_char_pos": 1636}, {"type": "D", "before": "Niklas Backstrom", "after": null, "start_char_pos": 1812, "end_char_pos": 1828}, {"type": "D", "before": "Joe Pavelski", "after": null, "start_char_pos": 1951, "end_char_pos": 1963}, {"type": "D", "before": "Devin Setoguchi", "after": null, "start_char_pos": 2026, "end_char_pos": 2041}, {"type": "D", "before": "Henrik Zetterberg", "after": null, "start_char_pos": 2175, "end_char_pos": 2192}, {"type": "D", "before": "Mikael Samuelsson", "after": null, "start_char_pos": 2348, "end_char_pos": 2365}, {"type": "D", "before": "Niklas Kronwall", "after": null, "start_char_pos": 2534, "end_char_pos": 2549}, {"type": "D", "before": "Patrick Marleau", "after": null, "start_char_pos": 2599, "end_char_pos": 2614}, {"type": "D", "before": "Michel Ouellet", "after": null, "start_char_pos": 2701, "end_char_pos": 2715}, {"type": "D", "before": "Alexandre Picard", "after": null, "start_char_pos": 2788, "end_char_pos": 2804}, {"type": "D", "before": "Alexander Steen", "after": null, "start_char_pos": 2865, "end_char_pos": 2880}, {"type": "D", "before": "Jason Blake", "after": null, "start_char_pos": 2933, "end_char_pos": 2944}, {"type": "D", "before": "Dan Boyle", "after": null, "start_char_pos": 3064, "end_char_pos": 3073}, {"type": "D", "before": "John Tortorella", "after": null, "start_char_pos": 3163, "end_char_pos": 3178}, {"type": "D", "before": "Bob Johnson", "after": null, "start_char_pos": 3228, "end_char_pos": 3239}, {"type": "R", "before": "American-born", "after": "United States|American", "start_char_pos": 3260, "end_char_pos": 3273}, {"type": "A", "before": null, "after": "-born", "start_char_pos": 3274, "end_char_pos": 3274}, {"type": "D", "before": "Ryan Shannon", "after": null, "start_char_pos": 3282, "end_char_pos": 3294}, {"type": "D", "before": "Sami Salo", "after": null, "start_char_pos": 3360, "end_char_pos": 3369}, {"type": "D", "before": "Andrew Murray", "after": null, "start_char_pos": 3492, "end_char_pos": 3505}, {"type": "D", "before": "Rick Nash", "after": null, "start_char_pos": 3539, "end_char_pos": 3548}, {"type": "D", "before": "Jason Chimera", "after": null, "start_char_pos": 3608, "end_char_pos": 3621}, {"type": "D", "before": "Pascal Leclaire", "after": null, "start_char_pos": 3706, "end_char_pos": 3721}, {"type": "D", "before": "Roberto Luongo", "after": null, "start_char_pos": 3758, "end_char_pos": 3772}, {"type": "D", "before": "Mathieu Schneider", "after": null, "start_char_pos": 3810, "end_char_pos": 3827}, {"type": "D", "before": "Scott Niedermayer", "after": null, "start_char_pos": 3936, "end_char_pos": 3953}, {"type": "D", "before": "Dion Phaneuf", "after": null, "start_char_pos": 3985, "end_char_pos": 3997}, {"type": "D", "before": "Jarome Iginla", "after": null, "start_char_pos": 4014, "end_char_pos": 4027}, {"type": "D", "before": "Teemu Selanne", "after": null, "start_char_pos": 4132, "end_char_pos": 4145}, {"type": "D", "before": "Jean-Sebastien Giguere", "after": null, "start_char_pos": 4257, "end_char_pos": 4279}], "sents_char_pos": [0, 107, 316, 387, 520, 629, 725, 826, 966, 1039, 1184, 1276, 1322, 1429, 1488, 1622, 1723, 1811, 1896, 1950, 2025, 2114, 2228, 2347, 2424, 2533, 2598, 2700, 2787, 2864, 2932, 3029, 3141, 3281, 3359, 3425, 3574, 3705, 3757, 3809, 3903, 3984, 4098, 4197, 4256]}
+{"doc_id": "100927", "revision_depth": "1", "before_revision": "Wikinews has impartially reached out to these candidates, throughout the campaign. We now interview independent Presidential candidate Jon Greenspon , a veteran and small business executive. Why do you want to be President? In all honesty, it \u2019 s about principles. The United States was founded on the principles of a government FOR the people, BY the people, and OF the people. For the last couple of decades, however, it become more and more the government for the corporations, by the hidden agenda, and of the special interest. This needs to stop, and the citizens need to regain control of their house. I am running, not to make a grandiose statement or to become another American potentate, but so that the American people have a government under their control and auspices. What is your current job? What skills or ideas do you bring from this position, or previous positions, that will benefit the Oval Office ? I am a small business executive, and a veteran of the US Military . Unlike our present Democratic candidates, I HAVE worn and walked in the shoes of the grunt in the field; so I have a decidedly marked advantage in that I know what these people fear and respect. I also have the understanding of how to work within a budget, and can effectively deal with problems within an organization. Obviously, the next American President and his or her administration will face many diverse issues. But if you were to narrow identify the three most important issues, what would they be? How will you address these issues? I think three of the most important issues that really face the next President aren\u2019t Iraq, Universal Healthcare or Gender issues . We need to focus on core American issues: National Security, the Economy, and Congressional control. On National Security, America is a sovereign nation and needs to treat itself as one. While globalization is grabbing a foothold around the world, America is loosing its own identity in the mix. We need to deal with this problem in its basest forms. First, we need to bring illegal immigration , foreign worker visas and outsourcing of our jobs to a halt. I applaud Arizona, Oklahoma and Georgia in their efforts to stem the illegal worker situations in their states, and would enjoy seeing other states follow suit. Second, we need to bring a fast stop to the loss of American jobs to corporate greed and the use of semi-skilled, cheap imported labor through a failed H and L series visa program. I \u2019 m not saying to abandon it, but it needs to be reviewed and regulations placed making it more important to bring American workers onboard, rather then give free rides to every other countries citizens. Lastly, America needs to look at itself and be more commanding of a made in America, supported by American labor approach to work. Let \u2019 s get some of the 2+ million jobs we sent overseas in the last ten years back here. Regarding our Economy, let \u2019 s just say we\u2019re not so good here. Presently we have three choices in dealing with the mounting oil crisis we \u2019 re under. 1. We can actively, and emphatically, start to look into alternative fuels, energy sources and conservation techniques to reduce the usage and emissions we are generating; 2. We can temporarily stem the costs incurred in our waste by accessing the Alaskan National Wildlife Refuge (ANWR) and Colorado oil reserves, buying us both time to develop alternate systems, and reduce our costs from $100+/barrel in crude, as well as giving Americans some breathing room in their wallets; or 3. We can look at OPEC and other petroleum regions and say either start a 1970 \u2019 s style rationing system, or bankrupt ourselves by meeting foreign controlled prices. I prefer 1 and 2 over the third option. Similarly, we need to pare down the national deficit. This isn \u2019 t going to be easy or pretty. Congress has worked extremely hard at wasting taxpayer monies, and they really don \u2019 t have a clue on how to balance a checkbook, let alone a national bank account. Lastly, the Congress. When was the last time you could honestly say that Congress was looking out for the interests of the American people? It \u2019 s hard to believe they aren \u2019 t working against the common interest when the Congress is dealing with legislation that includes granting amnesty to all illegal immigrants (when 87\\% of the public is vocally opposed), spending million of taxpayer dollars on a highway between two towns in Alaska (a highway that will be impassable for more than half the year), or trying to wrangle a million dollars on a museum to a 1960 \u2019 s music event. Personally, I think those monies would have been better spent on trying to balance the budget, or given back to the states for programs that more directly affect the population. Face it, our federal legislators don \u2019 t want to fix problems, they are more interested in making the American public afraid of issues and then telling you who \u2019 s to blame \u2026 I\u2019ll come right out and tell you who \u2019 s to blame. We are. We \u2019 ve left the henhouse unguarded for too long. Do you have a running mate yet? Who are they? What are you/were you looking for in a running mate? I have not selected a running mate for the 2008 election at present. As an independent/third-party candidate, I have aligned myself with a minor party, and we are conducting a party ballot. I will be more then eager to work with a running mate of the party\u2019s selection. If given the open opportunity, my personal selections for a running mate would include either William Owens (former Governor of the State of Colorado) or Frank McEnulty , who is himself another third-party/independent candidate. Can you win the 2008 Presidential election? Can any third party or independent candidate ever win? I believe anything is possible. Presently, a great majority of citizens of this great country are rapidly becoming fed up with the corrupt variant of politics currently going on in our nation \u2019 s capital. It should be remembered that in 1860, the Republican Party was effectively a third party, with only minor political success at the national level, this was the party of Lincoln, and unfortunately, this Republican Party no longer exists. If you can't make it into the Oval Office, who would you prefer seeing taking the presidency? If I were unable to obtain the popular vote and someone else were to make it to the Oval Office, I believe the best alternative would be either Michael Bloomberg (present Mayor of New York City ), or Lou Dobbs (Commentator for CNN ). While neither gentleman shares my views on all issues of interest to me, both are extremely capable individuals with similar stances on a range of topics. What should the American people keep in mind, when heading to the polls this November? American voters should be conscious of the fact that regardless of the present \"quality\" of our elected officials, the concept of term limits for Congressional posts was established in 1787. I am referring to the ballot, and your vote. If you cannot truly say that your Representative/Senator has done a job that reflects your core values and beliefs, then it \u2019 s time to \"hire\" a new representative. Congress was never meant to be a lifetime job for anyone. While the Supreme Court has struck down the Congressional Term Limits Act, they cannot strike down the ballot box. People should make their voices known that it \u2019 s time for a fresh start, truly a second American Revolution .", "after_revision": "Wikinews has impartially reached out to these candidates, throughout the campaign. We now interview independent Presidential candidate , a veteran and small business executive. Why do you want to be President? In all honesty, it ' s about principles. The United States was founded on the principles of a government FOR the people, BY the people, and OF the people. For the last couple of decades, however, it become more and more the government for the corporations, by the hidden agenda, and of the special interest. This needs to stop, and the citizens need to regain control of their house. I am running, not to make a grandiose statement or to become another American potentate, but so that the American people have a government under their control and auspices. What is your current job? What skills or ideas do you bring from this position, or previous positions, that will benefit the ? I am a small business executive, and a veteran of the . Unlike our present Democratic candidates, I HAVE worn and walked in the shoes of the grunt in the field; so I have a decidedly marked advantage in that I know what these people fear and respect. I also have the understanding of how to work within a budget, and can effectively deal with problems within an organization. Obviously, the next American President and his or her administration will face many diverse issues. But if you were to narrow identify the three most important issues, what would they be? How will you address these issues? I think three of the most important issues that really face the next President aren\u2019t , or . We need to focus on core American issues: National Security, the Economy, and control. On National Security, America is a sovereign nation and needs to treat itself as one. While globalization is grabbing a foothold around the world, America is loosing its own identity in the mix. We need to deal with this problem in its basest forms. First, we need to bring illegal , foreign worker visas and outsourcing of our jobs to a halt. I applaud , and in their efforts to stem the illegal worker situations in their states, and would enjoy seeing other states follow suit. Second, we need to bring a fast stop to the loss of American jobs to corporate greed and the use of semi-skilled, cheap imported labor through a failed and series visa program. I ' m not saying to abandon it, but it needs to be reviewed and regulations placed making it more important to bring American workers onboard, rather then give free rides to every other countries citizens. Lastly, America needs to look at itself and be more commanding of a made in America, supported by American labor approach to work. Let ' s get some of the 2+ million jobs we sent overseas in the last ten years back here. Regarding our Economy, let ' s just say we\u2019re not so good here. Presently we have three choices in dealing with the mounting oil crisis we ' re under. 1. We can actively, and emphatically, start to look into alternative fuels, energy sources and conservation techniques to reduce the usage and emissions we are generating; 2. We can temporarily stem the costs incurred in our waste by accessing the (ANWR) and oil reserves, buying us both time to develop alternate systems, and reduce our costs from $100+/barrel in crude, as well as giving Americans some breathing room in their wallets; or 3. We can look at and other petroleum regions and say either start a 1970 ' s style rationing system, or bankrupt ourselves by meeting foreign controlled prices. I prefer 1 and 2 over the third option. Similarly, we need to pare down the national deficit. This isn ' t going to be easy or pretty. Congress has worked extremely hard at wasting taxpayer monies, and they really don ' t have a clue on how to balance a checkbook, let alone a national bank account. Lastly, the Congress. When was the last time you could honestly say that Congress was looking out for the interests of the American people? It ' s hard to believe they aren ' t working against the common interest when the Congress is dealing with legislation that includes granting amnesty to all illegal immigrants (when 87\\% of the public is vocally opposed), spending million of taxpayer dollars on a highway between two towns in (a highway that will be impassable for more than half the year), or trying to wrangle a million dollars on a museum to a 1960 ' s music event. Personally, I think those monies would have been better spent on trying to balance the budget, or given back to the states for programs that more directly affect the population. Face it, our federal legislators don ' t want to fix problems, they are more interested in making the American public afraid of issues and then telling you who ' s to blame ... I\u2019ll come right out and tell you who ' s to blame. We are. We ' ve left the henhouse unguarded for too long. Do you have a running mate yet? Who are they? What are you/were you looking for in a running mate? I have not selected a running mate for the 2008 election at present. As an independent/third-party candidate, I have aligned myself with a minor party, and we are conducting a party ballot. I will be more then eager to work with a running mate of the party\u2019s selection. If given the open opportunity, my personal selections for a running mate would include either (former Governor of the State of Colorado) or , who is himself another third-party/independent candidate. Can you win the 2008 Presidential election? Can any third party or independent candidate ever win? I believe anything is possible. Presently, a great majority of citizens of this great country are rapidly becoming fed up with the corrupt variant of politics currently going on in our nation ' s capital. It should be remembered that in 1860, the Republican Party was effectively a third party, with only minor political success at the national level, this was the party of Lincoln, and unfortunately, this Republican Party no longer exists. If you can't make it into the Oval Office, who would you prefer seeing taking the presidency? If I were unable to obtain the popular vote and someone else were to make it to the Oval Office, I believe the best alternative would be either (present Mayor of ), or (Commentator for ). While neither gentleman shares my views on all issues of interest to me, both are extremely capable individuals with similar stances on a range of topics. What should the American people keep in mind, when heading to the polls this November? American voters should be conscious of the fact that regardless of the present \"quality\" of our elected officials, the concept of term limits for Congressional posts was established in 1787. I am referring to the ballot, and your vote. If you cannot truly say that your Representative/Senator has done a job that reflects your core values and beliefs, then it ' s time to \"hire\" a new representative. Congress was never meant to be a lifetime job for anyone. While the has struck down the Congressional Term Limits Act, they cannot strike down the ballot box. People should make their voices known that it ' s time for a fresh start, truly a second .", "edit_actions": [{"type": "D", "before": "Jon Greenspon", "after": null, "start_char_pos": 135, "end_char_pos": 148}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 243, "end_char_pos": 244}, {"type": "D", "before": "Oval Office", "after": null, "start_char_pos": 906, "end_char_pos": 917}, {"type": "D", "before": "US Military", "after": null, "start_char_pos": 974, "end_char_pos": 985}, {"type": "R", "before": "Iraq, Universal Healthcare or Gender issues", "after": ", or", "start_char_pos": 1617, "end_char_pos": 1660}, {"type": "D", "before": "Congressional", "after": null, "start_char_pos": 1741, "end_char_pos": 1754}, {"type": "D", "before": "immigration", "after": null, "start_char_pos": 2046, "end_char_pos": 2057}, {"type": "R", "before": "Arizona, Oklahoma and Georgia", "after": ", and", "start_char_pos": 2130, "end_char_pos": 2159}, {"type": "R", "before": "H and L", "after": "and", "start_char_pos": 2433, "end_char_pos": 2440}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2464, "end_char_pos": 2465}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2803, "end_char_pos": 2804}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2916, "end_char_pos": 2917}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3028, "end_char_pos": 3029}, {"type": "D", "before": "Alaskan National Wildlife Refuge", "after": null, "start_char_pos": 3288, "end_char_pos": 3320}, {"type": "D", "before": "Colorado", "after": null, "start_char_pos": 3332, "end_char_pos": 3340}, {"type": "D", "before": "OPEC", "after": null, "start_char_pos": 3541, "end_char_pos": 3545}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3602, "end_char_pos": 3603}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3793, "end_char_pos": 3794}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3908, "end_char_pos": 3909}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4133, "end_char_pos": 4134}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4163, "end_char_pos": 4164}, {"type": "D", "before": "Alaska", "after": null, "start_char_pos": 4423, "end_char_pos": 4429}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4556, "end_char_pos": 4557}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4788, "end_char_pos": 4789}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4911, "end_char_pos": 4912}, {"type": "R", "before": "\u2026", "after": "...", "start_char_pos": 4924, "end_char_pos": 4925}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4963, "end_char_pos": 4964}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4988, "end_char_pos": 4989}, {"type": "D", "before": "William Owens", "after": null, "start_char_pos": 5498, "end_char_pos": 5511}, {"type": "D", "before": "Frank McEnulty", "after": null, "start_char_pos": 5558, "end_char_pos": 5572}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5924, "end_char_pos": 5925}, {"type": "D", "before": "Michael Bloomberg", "after": null, "start_char_pos": 6412, "end_char_pos": 6429}, {"type": "D", "before": "New York City", "after": null, "start_char_pos": 6448, "end_char_pos": 6461}, {"type": "D", "before": "Lou Dobbs", "after": null, "start_char_pos": 6468, "end_char_pos": 6477}, {"type": "D", "before": "CNN", "after": null, "start_char_pos": 6495, "end_char_pos": 6498}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 7104, "end_char_pos": 7105}, {"type": "D", "before": "Supreme Court", "after": null, "start_char_pos": 7213, "end_char_pos": 7226}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 7364, "end_char_pos": 7365}, {"type": "D", "before": "American Revolution", "after": null, "start_char_pos": 7407, "end_char_pos": 7426}], "sents_char_pos": [0, 82, 190, 223, 264, 378, 531, 607, 780, 806, 919, 1092, 1182, 1307, 1407, 1495, 1530, 1662, 1763, 1849, 1958, 2013, 2119, 2280, 2461, 2667, 2798, 2888, 2952, 3039, 3211, 3519, 3689, 3729, 3783, 3824, 3989, 4011, 4129, 4572, 4750, 4925, 4976, 5034, 5066, 5080, 5133, 5202, 5323, 5403, 5632, 5676, 5731, 5763, 5936, 6173, 6267, 6501, 6656, 6743, 6934, 6979, 7144, 7202, 7317]}
+{"doc_id": "102802", "revision_depth": "1", "before_revision": "240px|The starting of marathon and half-marathon classes, as it continued raining. 2008 the 13th Taipei International Express Marathon, mainly sponsored by Carrefour second time since 2007, raced on Hsichih-Wugu Elevated Viaduct of Taiwan National Highway No. 1 this Sunday (March 23). Even though it rained until the starting of marathon and half-marathon classes, but the race finally finished properlywith its weather progressively improved to be not rained. Even though an improved weather, but the gradient near the Hsichih stop of Hsichih-Wugu Elevated Viaduct made a major challenge on runners' physical strength. Disdery Hombo (right) and Tatyana Perepelkina (left), Champions in this race. As of the Chinese Taipei Road Running Association, the organizer of this race, their executives invited several world-class marathon runners by performances on several international marathon races before this race. But due to unsteady of the political status in Africa, there were only four African runners participating in this race. Finally, Disdery Hombo from Kenya and Tatyana Perepelkina (in Russian: \u0422\u0430\u0442\u044c\u044f\u043d\u0430 \u041f\u0435\u0440\u0435\u043f\u0451\u043b\u043a\u0438\u043d\u0430) from Russia respectively won the men's and women's champions of marathon (42K) class with 2H21m27s and 2H49m15s. 240px|After race interview to Disdery Hombo. After this race, Wikinews Journalist Rico Shen briefly interviewed Hombo, he showed his satisfactions on this race and Taiwan's culture and image, and he showed his anticipation to try the future marathon races especially the ING Taipei Marathon this December. Key Results Class 10K Running Half-Marathon (21K) Marathon (42K) Men's Group Wen-chien Wu(32m59s) Chin-ping Ho(1H8m43s) Disdery Hombo(2H21m27s) Women's Group Chien-he Hsieh(37m33s) Yu-fang Hsu(1H21m26s) Tatyana Perepelkina(2H49m15s)", "after_revision": "240px|The starting of marathon and half-marathon classes, as it continued raining. 2008 the 13th Taipei International Express Marathon, mainly sponsored by Carrefour for the second time since 2007, raced on Hsichih-Wugu Elevated Viaduct of Taiwan National Highway No. 1 this Sunday (March 23). Although it rained until the start of the marathon and half-marathon classes, the race finished properly. Despite the improved weather, the gradient near the Hsichih stop of Hsichih-Wugu Elevated Viaduct provided a major challenge to the runners' physical strength. Disdery Hombo (right) and Tatyana Perepelkina (left), Champions in this race. The race's organizer, the Chinese Taipei Road Running Association, invited several world-class marathon runners based on their prior performances in several international marathons. However, because of political instability in Africa, there were only four African runners participating in this race. Finally, Disdery Hombo from Kenya and Tatyana Perepelkina (in Russian: \u0422\u0430\u0442\u044c\u044f\u043d\u0430 \u041f\u0435\u0440\u0435\u043f\u0451\u043b\u043a\u0438\u043d\u0430) from Russia were, respectively, the men's and women's champions of the marathon (42K) class with 2H21m27s and 2H49m15s. 240px|After race interview to Disdery Hombo. After this race, when Wikinews Journalist Rico Shen briefly interviewed Hombo, Hombo expressed his satisfaction with this race and Taiwan's image, as well as his eagerness to try out for future marathon races , especially the ING Taipei Marathon this December. Key Results Class 10K Running Half-Marathon (21K) Marathon (42K) Men's Group Wen-chien Wu(32m59s) Chin-ping Ho(1H8m43s) Disdery Hombo(2H21m27s) Women's Group Chien-he Hsieh(37m33s) Yu-fang Hsu(1H21m26s) Tatyana Perepelkina(2H49m15s)", "edit_actions": [{"type": "A", "before": null, "after": "for the", "start_char_pos": 166, "end_char_pos": 166}, {"type": "R", "before": "Even though", "after": "Although", "start_char_pos": 287, "end_char_pos": 298}, {"type": "R", "before": "starting of", "after": "start of the", "start_char_pos": 319, "end_char_pos": 330}, {"type": "R", "before": "but the race finally finished properlywith its weather progressively improved to be not rained. Even though an", "after": "the race finished properly. Despite the", "start_char_pos": 367, "end_char_pos": 477}, {"type": "D", "before": "but", "after": null, "start_char_pos": 496, "end_char_pos": 499}, {"type": "R", "before": "made", "after": "provided", "start_char_pos": 568, "end_char_pos": 572}, {"type": "R", "before": "on", "after": "to the", "start_char_pos": 591, "end_char_pos": 593}, {"type": "R", "before": "As of", "after": "The race's organizer,", "start_char_pos": 700, "end_char_pos": 705}, {"type": "D", "before": "the organizer of this race, their executives", "after": null, "start_char_pos": 751, "end_char_pos": 795}, {"type": "R", "before": "by performances on several international marathon races before this race. But due to unsteady of the political status", "after": "based on their prior performances in several international marathons. However, because of political instability", "start_char_pos": 841, "end_char_pos": 958}, {"type": "R", "before": "respectively won", "after": "were, respectively,", "start_char_pos": 1139, "end_char_pos": 1155}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1191, "end_char_pos": 1191}, {"type": "A", "before": null, "after": "when", "start_char_pos": 1303, "end_char_pos": 1303}, {"type": "R", "before": "he showed his satisfactions on", "after": "Hombo expressed his satisfaction with", "start_char_pos": 1361, "end_char_pos": 1391}, {"type": "R", "before": "culture and image, and he showed his anticipation to try the", "after": "image, as well as his eagerness to try out for", "start_char_pos": 1415, "end_char_pos": 1475}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1498, "end_char_pos": 1498}], "sents_char_pos": [0, 82, 286, 462, 621, 699, 914, 1034, 1285, 1548]}
+{"doc_id": "104826", "revision_depth": "1", "before_revision": "130px|An earlier PSLV on its launch pad|right An Indian Polar Satellite Launch Vehicle (PSLV) has successfully launched ten satellites. The 44-metre long rocket lifted off from the second launch pad at the Satish Dhawan Space Centre at 03:53:51 GMT (09:24 local time), and reached a polar, Sun-synchronous low Earth orbit a little over seven minutes later. Following burnout of the fourth stage of the carrier rocket, the payloads were released. The PSLV flew in the CA, or Core Alone, configuration, with no solid rocket boosters around the first stage. The ten satellites aboard the rocket will be used for several purposes by a variety of organisations. The primary payload, Cartosat-2A , is a remote sensing satellite, which will be operated by the Indian Space Research Organisation (ISRO). IMS-1 , also known as TWSAT , another ISRO remote sensing satellite, was the secondary payload. In addition, eight commercial payloads were flown, as part of the Nanosat Launch Service-4 and 5 programmes. There satellites were Cute 1.7+APD-2 and SEEDS-2 for the University of Tokyo , Japan, CanX-2 and CanX-6 for the University of Toronto Institute for Aerospace Studies , Canada, Delfi-C3 for the Delft University of Technology in the Netherlands, AAUSAT-II for the w:University of Aalborg , Denmark, COMPASS-1 for Aachen University , Germany, and RUBIN-8 for German aerospace company OHB System . This is the 21st orbital launch of 2008 , and the second to be conducted by a PSLV. It is the 13th total PSLV launch. The next PSLV launch is scheduled for either July or December, with the Chandrayaan-I spacecraft, India's first Lunar probe .", "after_revision": "An Indian (PSLV) has successfully launched ten satellites. The 44-metre long rocket lifted off from the second launch pad at the at 03:53:51 GMT (09:24 local time), and reached a , a little over seven minutes later. Following burnout of the fourth stage of the carrier rocket, the payloads were released. The PSLV flew in the CA, or Core Alone, configuration, with no solid rocket boosters around the first stage. The ten satellites aboard the rocket will be used for several purposes by a variety of organisations. The primary payload, , is a satellite, which will be operated by the (ISRO). , also known as , another ISRO remote sensing satellite, was the secondary payload. In addition, eight commercial payloads were flown, as part of the -4 and 5 programmes. There satellites were and for the , Japan, and for the , Canada, Delfi-C3 for the in the Netherlands, for the , Denmark, for , Germany, and for German aerospace company . This is the 21st orbital launch of , and the second to be conducted by a PSLV. It is the 13th total PSLV launch. The next PSLV launch is scheduled for either July or December, with the spacecraft, India's first .", "edit_actions": [{"type": "R", "before": "130px|An earlier PSLV on its launch pad|right An Indian Polar Satellite Launch Vehicle", "after": "An Indian", "start_char_pos": 0, "end_char_pos": 86}, {"type": "D", "before": "Satish Dhawan Space Centre", "after": null, "start_char_pos": 206, "end_char_pos": 232}, {"type": "R", "before": "polar, Sun-synchronous low Earth orbit", "after": ",", "start_char_pos": 283, "end_char_pos": 321}, {"type": "D", "before": "Cartosat-2A", "after": null, "start_char_pos": 678, "end_char_pos": 689}, {"type": "D", "before": "remote sensing", "after": null, "start_char_pos": 697, "end_char_pos": 711}, {"type": "D", "before": "Indian Space Research Organisation", "after": null, "start_char_pos": 753, "end_char_pos": 787}, {"type": "D", "before": "IMS-1", "after": null, "start_char_pos": 796, "end_char_pos": 801}, {"type": "D", "before": "TWSAT", "after": null, "start_char_pos": 818, "end_char_pos": 823}, {"type": "R", "before": "Nanosat Launch Service-4", "after": "-4", "start_char_pos": 958, "end_char_pos": 982}, {"type": "R", "before": "Cute 1.7+APD-2 and SEEDS-2 for the University of Tokyo", "after": "and for the", "start_char_pos": 1023, "end_char_pos": 1077}, {"type": "R", "before": "CanX-2 and CanX-6 for the University of Toronto Institute for Aerospace Studies", "after": "and for the", "start_char_pos": 1087, "end_char_pos": 1166}, {"type": "D", "before": "Delft University of Technology", "after": null, "start_char_pos": 1194, "end_char_pos": 1224}, {"type": "R", "before": "AAUSAT-II for the w:University of Aalborg", "after": "for the", "start_char_pos": 1245, "end_char_pos": 1286}, {"type": "R", "before": "COMPASS-1 for Aachen University", "after": "for", "start_char_pos": 1298, "end_char_pos": 1329}, {"type": "D", "before": "RUBIN-8", "after": null, "start_char_pos": 1345, "end_char_pos": 1352}, {"type": "D", "before": "OHB System", "after": null, "start_char_pos": 1382, "end_char_pos": 1392}, {"type": "D", "before": "2008", "after": null, "start_char_pos": 1430, "end_char_pos": 1434}, {"type": "D", "before": "Chandrayaan-I", "after": null, "start_char_pos": 1585, "end_char_pos": 1598}, {"type": "D", "before": "Lunar probe", "after": null, "start_char_pos": 1625, "end_char_pos": 1636}], "sents_char_pos": [0, 135, 356, 445, 554, 656, 795, 891, 1000, 1394, 1478, 1512]}
+{"doc_id": "105210", "revision_depth": "1", "before_revision": "A Southern Sudan Air Connection aircraft has crashed today in Southern Sudan, killing over a dozen people, including the area's defence minister. Location map of Africa, Southern Sudan highlighted This Air Labrador 1900 is comparable to the aircraft involved. There are conflicting reports on how many people were on board and how many died in the Bahr Gazal crash, but at least twenty people were on board. Some sources suggest nineteen fatalities and two survivors, and others say there were 26 deaths and no survivors; it should be noted that if either of these were correct then there were more than twenty on board. Lieutenant General Dominic Dim Deng , the area's defence minister, is confirmed to be dead and it is thought at least 19 military officials are now deceased. \"The plane had been rented from a charter company and was carrying a delegation of leaders from the (former rebel) Sudan People's Liberation Movement from Wau to the capital Juba ,\" said Luka Mariak, spokesman for the Souther Sudan president Salva Kiir . This makes the journey around 450 kilometres (290 miles), with the plane crashing in a flat region 375 kilometres (around 220 miles) from Juba. It is reported it subsequently caught fire. The United Nations said that the United Nations Mission in Sudan (UNMIS) had dispatched a helicopter to assist the emergency response effort. The UN also said that the aircraft was a Beechcraft 1900 and that they would fly in government officials and aviation experts to conduct an investigation. The site has been cordoned off. Justin Yak and his wife are also confirmed to be dead. Yak was the minister for cabinet affairs until a 2007 reshuffle left him removed from office. He was an adviser to the president at the time of his death. Bodies were flown into Juba Airport were relatives waited for hours for news. UNMIS is expected to fly the bodies on to their nearby airfield, to which there is no public access. The disaster is thought to be an accident caused by mechanical trouble. The pilot had contacted Air Traffic Control (ATC) to report engine problems and requested permission to conduct an emergency landing at nearby Rumbek . ATC lost contact minutes later.", "after_revision": "A Southern Sudan Air Connection aircraft has crashed today in Sudan, killing over a dozen people, including the area's defence minister. Location map of Africa, Sudan highlighted This 1900 is comparable to the aircraft involved. There are conflicting reports on how many people were on board and how many died in the Bahr Gazal crash, but at least twenty people were on board. Some sources suggest nineteen fatalities and two survivors, and others say there were 26 deaths and no survivors; it should be noted that if either of these were correct then there were more than twenty on board. Lieutenant General , the area's defence minister, is confirmed to be dead and it is thought at least 19 military officials are now deceased. \"The plane had been rented from a charter company and was carrying a delegation of leaders from the (former rebel) from to the capital ,\" said Luka Mariak, spokesman for the Souther Sudan president . This makes the journey around 450 kilometres (290 miles), with the plane crashing in a flat region 375 kilometres (around 220 miles) from Juba. It is reported it subsequently caught fire. The United Nations said that the (UNMIS) had dispatched a helicopter to assist the emergency response effort. The UN also said that the aircraft was a and that they would fly in government officials and aviation experts to conduct an investigation. The site has been cordoned off. and his wife are also confirmed to be dead. Yak was the minister for cabinet affairs until a 2007 reshuffle left him removed from office. He was an adviser to the president at the time of his death. Bodies were flown into were relatives waited for hours for news. UNMIS is expected to fly the bodies on to their nearby airfield, to which there is no public access. The disaster is thought to be an accident caused by mechanical trouble. The pilot had contacted (ATC) to report engine problems and requested permission to conduct an emergency landing at nearby . ATC lost contact minutes later.", "edit_actions": [{"type": "D", "before": "Southern", "after": null, "start_char_pos": 62, "end_char_pos": 70}, {"type": "D", "before": "Southern", "after": null, "start_char_pos": 170, "end_char_pos": 178}, {"type": "D", "before": "Air Labrador", "after": null, "start_char_pos": 202, "end_char_pos": 214}, {"type": "D", "before": "Dominic Dim Deng", "after": null, "start_char_pos": 640, "end_char_pos": 656}, {"type": "R", "before": "Sudan People's Liberation Movement from Wau", "after": "from", "start_char_pos": 894, "end_char_pos": 937}, {"type": "D", "before": "Juba", "after": null, "start_char_pos": 953, "end_char_pos": 957}, {"type": "D", "before": "Salva Kiir", "after": null, "start_char_pos": 1021, "end_char_pos": 1031}, {"type": "D", "before": "United Nations Mission in Sudan", "after": null, "start_char_pos": 1255, "end_char_pos": 1286}, {"type": "D", "before": "Beechcraft 1900", "after": null, "start_char_pos": 1405, "end_char_pos": 1420}, {"type": "D", "before": "Justin Yak", "after": null, "start_char_pos": 1551, "end_char_pos": 1561}, {"type": "D", "before": "Juba Airport", "after": null, "start_char_pos": 1784, "end_char_pos": 1796}, {"type": "D", "before": "Air Traffic Control", "after": null, "start_char_pos": 2036, "end_char_pos": 2055}, {"type": "D", "before": "Rumbek", "after": null, "start_char_pos": 2155, "end_char_pos": 2161}], "sents_char_pos": [0, 145, 259, 407, 521, 620, 778, 1033, 1177, 1221, 1363, 1518, 1550, 1605, 1699, 1760, 1838, 1939, 2011]}
+{"doc_id": "106150", "revision_depth": "1", "before_revision": "240px|Top 3 Designers from Professional Group. In the opening day of 2008 Young Designers' Exhibition (May 15), the Council for Cultural Affairs of Executive Yuan announced the first-ever \"Wow! Taiwan Design Competition\" at the Taipei World Trade Center in conjunction with main show (2008 YODEX). Winners from Professional and Student classes were announced and awarded in an ceremony yesterday. According to the official information from Taiwan Design Center (TDC), this first-ever design competition is designed for local participants to construct creative products with internationalizations and traditional cultures and market them to the world . Finally, \"EasTea / WesTea\" and \"Window & Box\" were respectively won the champion in the professional and student groups in this competition. As of juries from the organizers (TDC CCA), those two products both combined basic applications from organics and traditional cultures in Taiwan. Highlights in images", "after_revision": "240px|Top 3 Designers from Professional Group. On the opening day of the 2008 Young Designers' Exhibition (May 15), the Council for Cultural Affairs of Executive Yuan announced the first-ever \"Wow! Taiwan Design Competition\" at the Taipei World Trade Center . It will take place in conjunction with the main show (2008 YODEX). The winners from the Professional and Student classes were announced and awarded in an ceremony yesterday. According to official information from the Taiwan Design Center (TDC), this first-ever design competition was designed for local participants to construct creative products with internationalizations and traditional cultures , and market them worldwide . \"EasTea / WesTea\" and \"Window & Box\" also won the championship in the professional and student groups in this competition. Highlights in images", "edit_actions": [{"type": "R", "before": "In", "after": "On", "start_char_pos": 47, "end_char_pos": 49}, {"type": "A", "before": null, "after": "the", "start_char_pos": 69, "end_char_pos": 69}, {"type": "A", "before": null, "after": ". It will take place", "start_char_pos": 255, "end_char_pos": 255}, {"type": "A", "before": null, "after": "the", "start_char_pos": 276, "end_char_pos": 276}, {"type": "R", "before": "Winners from", "after": "The winners from the", "start_char_pos": 301, "end_char_pos": 313}, {"type": "D", "before": "the", "after": null, "start_char_pos": 413, "end_char_pos": 416}, {"type": "A", "before": null, "after": "the", "start_char_pos": 443, "end_char_pos": 443}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 507, "end_char_pos": 509}, {"type": "A", "before": null, "after": ",", "start_char_pos": 625, "end_char_pos": 625}, {"type": "R", "before": "to the world", "after": "worldwide", "start_char_pos": 642, "end_char_pos": 654}, {"type": "D", "before": "Finally,", "after": null, "start_char_pos": 657, "end_char_pos": 665}, {"type": "R", "before": "were respectively won the champion", "after": "also won the championship", "start_char_pos": 703, "end_char_pos": 737}, {"type": "D", "before": "As of juries from the organizers (TDC", "after": null, "start_char_pos": 798, "end_char_pos": 835}, {"type": "D", "before": "CCA), those two products both combined basic applications from organics and traditional cultures in Taiwan.", "after": null, "start_char_pos": 836, "end_char_pos": 943}], "sents_char_pos": [0, 46, 194, 300, 399, 656, 797, 943]}
+{"doc_id": "106316", "revision_depth": "2", "before_revision": "A court in the Polish city of Poland on May 2001 sentenced the first annual of three politicians accused in the sex-for-jobs scandal that helped bring down Poland\u2019s last coalition government. The verdict signals that there may be trouble ahead for two of the party\u2019s leaders who are also on trial. dtjjmiodmiopdjYOU SUCK!!!!!!!!!!!!!!! [ [ ", "after_revision": "A court in the central Polish city of \u0141\u00f3d\u017a on May 19 sentenced the first of three politicians accused in the sex-for-jobs scandal that helped bring down Poland\u2019s last coalition government. The verdict signals that there may be trouble ahead for two of the party\u2019s leaders who are also on trial. Samoobrona (Self-Defence) rural protest party official Jacek Popecki was sentenced to 28 months in jail for giving a woman, who had accused his party\u2019s boss of fathering her child, drugs to induce a miscarriage. In late 2006, Aneta Krawczyk accused the party\u2019s leader Andrzej Lepper of having offered her political favours for sex in 2001, and then said he had been the father of her youngest child. She said the same of Lepper\u2019s close collaborator and MP, Stanis\u0142aw \u0141y\u017cwi\u0144ski, and accused him of rape and sexual abuse. She also said that Popecki, who had been \u0141y\u017cwi\u0144ski\u2019s aide, had tried to induce a miscarriage by giving her a labour-inducing drug called oxytocin. Lepper and \u0141y\u017cwi\u0144ski both face up to eight and ten years in jail respectively if convicted on charges of extorting \"favours of a sexual nature\". Prosecutors had sought a four-year sentence for Popecki. \u201cThe evidence given by[Krawczyk , which is largely backed up by testimony from two witnesses and phone bills as well as the behaviour of the accused after these events, points to[Popecki\u2019s guilt,\u201d the court said on Monday. Krawczyk's early testimony suffered when DNA tests showed that neither Lepper nor \u0141y\u017cwi\u0144ski had fathered her child. However, prosecutors had enough evidence from other women to push on with the investigation in what became known as the \u201csex for work\u201d scandal. Sou", "edit_actions": [{"type": "A", "before": null, "after": "central", "start_char_pos": 15, "end_char_pos": 15}, {"type": "R", "before": "Poland on May 2001", "after": "\u0141\u00f3d\u017a on May 19", "start_char_pos": 31, "end_char_pos": 49}, {"type": "D", "before": "annual", "after": null, "start_char_pos": 70, "end_char_pos": 76}, {"type": "R", "before": "dtjjmiodmiopdjYOU SUCK!!!!!!!!!!!!!!!", "after": "Samoobrona (Self-Defence) rural protest party official Jacek Popecki was sentenced to 28 months in jail for giving a woman, who had accused his party\u2019s boss of fathering her child, drugs to induce a miscarriage.", "start_char_pos": 299, "end_char_pos": 336}, {"type": "A", "before": null, "after": "In late 2006, Aneta Krawczyk accused the party\u2019s leader Andrzej Lepper of having offered her political favours for sex in 2001, and then said he had been the father of her youngest child. She said the same of Lepper\u2019s close collaborator and MP, Stanis\u0142aw \u0141y\u017cwi\u0144ski, and accused him of rape and sexual abuse. She also said that Popecki, who had been \u0141y\u017cwi\u0144ski\u2019s aide, had tried to induce a miscarriage by giving her a labour-inducing drug called oxytocin.", "start_char_pos": 337, "end_char_pos": 337}, {"type": "A", "before": null, "after": "Lepper and \u0141y\u017cwi\u0144ski both face up to eight and ten years in jail respectively if convicted on charges of extorting \"favours of a sexual nature\". Prosecutors had sought a four-year sentence for Popecki.", "start_char_pos": 338, "end_char_pos": 338}, {"type": "A", "before": null, "after": "\u201cThe evidence given by", "start_char_pos": 339, "end_char_pos": 339}, {"type": "A", "before": null, "after": "Krawczyk", "start_char_pos": 340, "end_char_pos": 340}, {"type": "A", "before": null, "after": ", which is largely backed up by testimony from two witnesses and phone bills as well as the behaviour of the accused after these events, points to", "start_char_pos": 341, "end_char_pos": 341}, {"type": "A", "before": null, "after": "Popecki\u2019s", "start_char_pos": 342, "end_char_pos": 342}, {"type": "A", "before": null, "after": "guilt,\u201d the court said on Monday.", "start_char_pos": 343, "end_char_pos": 343}, {"type": "A", "before": null, "after": "Krawczyk's early testimony suffered when DNA tests showed that neither Lepper nor \u0141y\u017cwi\u0144ski had fathered her child. However, prosecutors had enough evidence from other women to push on with the investigation in what became known as the \u201csex for work\u201d scandal.", "start_char_pos": 344, "end_char_pos": 344}, {"type": "A", "before": null, "after": "Sou", "start_char_pos": 345, "end_char_pos": 345}], "sents_char_pos": [0, 192]}
+{"doc_id": "106553", "revision_depth": "1", "before_revision": "A controversial development training course called \"Landmark Forum\" is cited in lawsuits in United States in New York and Washington, D.C. The seminars are run by a San Francisco, California-based training company called . The company evolved from \"est\", and has faced criticism regarding its techniques and its use of unpaid labor. The and company -based Growing Generations is named as a defendant in the New York lawsuit, and the is a defendant in the Washington, D.C. case. seat of the , located at Thurgood Marshall U.S. Courthouse In separate lawsuits filed in the in , New York, and in the in Washington, D.C., former employees are suing their employers for and claiming religious discrimination after their employers allegedly mandated that they attend courses at Landmark Education. In the 3 million federal lawsuit filed in New York , Scott Glasgow is suing his former employer Growing Generationsand its Stuart Miller . Growing Generations maintains sperm banks and also arranges surrogacy for couples who wish to have children. The company has offices in New York and Los Angeles, and has done business with celebrities including actor of . Glasgow was marketing director of Growing Generations, and claims he was fired in June 2007 after refusing to continue attending Landmark Education seminars. Glasgow is also suing for sexual harassment, and claims Miller came on to him in September 2006. He made approximately $100,000 per year as the company's marketing director, and was the company's only employee based out of New York City. The company's main offices are in Los Angeles. \"I was shocked when I was fired. It took me months to right myself. I want them to stop imposing Landmark on the employees, and I want an apology,\" said Glasgow in a statement in . Brent Pelton, one of Glasgow's attorneys, stated that: \"The Landmark philosophy is deeply ingrained in the culture of the company\". Glasgow said that the Landmark Education training courses were \"opposite\" to his beliefs. According to Glasgow he was questioned by Miller in May 2007 after he walked out of a Landmark Education course, and was fired shortly thereafter. \"We stand by the allegations contained in the complaint and we look forward to proving them at trial,\" said Pelton in a statement to . Ian Wallace, an attorney who represents Growing Generations, claimed that Glasgow wasn't fired but walked away from his position. \"Growing Generations and Mr. Miller are very confident that these claims will be dismissed ultimately, and there's no factual basis for them whatsoever,\" said Wallace in a statement to The Village Voice. Lawyers representing Growing Generations and Stuart Miller declined comment to , and did not immediately return a message from ABC News. In Glasgow's complaint, entered into federal court record on April 18, he asserts that Landmark Education constitutes a \"religion\", and \"perceived their philosophy as a form of religion that contradicted his own personal beliefs\". He states that when he was promoted to Director of Marketing, he asked Miller if he could stop attending the Landmark sessions but was told that they were mandatory for all of the company's executives and that Landmark is \"very much the language of the company.\" Glasgow said his performance at the company was assessed based on how he was \"touching, moving and inspiring\" others, a phrase from the Landmark philosophy, as opposed to his business accomplishments at the company. The complaint claims that the actions of Miller and Growing Generations violated Federal, New York State and New York City laws. The lawsuit filed in federal court in Washington, D.C. deals with a separate plaintiff and company, but the plaintiff in the suit also claims that religious discrimination took place for allegedly being mandated to attend Landmark Education courses. Kenneth Goldman is suing the United States Democratic political action committee Twenty-First Century Democrats (also 21st Century Democrats) and its former executive director Kelly Young. Goldman was formerly the communications director of 21st Century Democrats. According to Goldman's complaint, three employees of 21st Century Democrats were fired after refusing to attend the Landmark Forum course. The complaint asserts that Landmark Education has \"religious characteristics and theological implications\" which influenced the mission of 21st Century Democrats and the way the organization conducted business. Goldman's complaint states that in addition to himself, a training director and field director were also fired after they made it clear they would not attend the Landmark Forum. Goldman says executive director Young infused Landmark Education terms into staff meetings such as \"create possibilities\", \"create a new context\", and \"enroll in possibilities\". He also claims that Young \"urged\" staff members to participate in Landmark Education events outside of the workplace, drove employees to and from Landmark functions, and used funds from 21st Century Democrats to pay for employees to attend those functions. Goldman's complaint asserts that he was discriminated against in violation of the District of Columbia Human Rights Act. In a statement in , the executive director of 21st Century Democrats, Mark Lotwis, called the lawsuit \"frivolous\" and said: \"we're going to defend our organization's integrity\". Landmark Education spokeswoman Deborah Beroset said that the Landmark Forum \"is in no way religious in nature and any claim to the contrary is simply absurd,\" and stated: \"While we are not a party to this lawsuit and have no firsthand knowledge of it, we can only assume that we are being used as a legal and political football to further the plaintiff\"s own financial interests.\" The New York lawsuit was filed April 14, and is still in early filing stages. A conference with the federal court judge in the case has been scheduled for June 17. The Washington, D.C. suit began in November 2007, and entered mediation this past March. As of April 15 the parties in the case were due back to court on July 11 to update the court on the mediation process. Landmark Education is descended from , also called \"est\", which was founded by . est began in 1971, and Erhard's company repackaged the course as \"The Forum\" in 1985. Associates of Erhard bought the license to his \"technology\" and incorporated Landmark Education in California in 1991. This is not the first time employees have sued claiming mandatory attendance at \"Forum\" workshops violated their civil rights. In a lawsuit filed in December 1988 in the , eight employees of DeKalb Farmers Market in , Georgia sued their employer claiming their religious freedom and civil rights were violated when they were allegedly coerced into attending \"Forum\" training sessions. \"Many of these training programs, particularly at large corporations, claim to be purely psychological, aimed at improving productivity and morale and loyalty. But in fact they are religious,\" said professor Carl Raschke in a statement to . The DeKalb Farmers Market employees were represented by lawyers for the . Consulting Technologies Inc., an affiliate of Transformational Technologies Inc., was named as a party in the lawsuit. Transformational Technologies was founded by Werner Erhard, and was not named as a party in the suit. The \"Forum\" course that the employees claimed they were mandated to attend was developed by Werner Erhard and Associates. Employees said that they were fired or pressured to quit after they objected to the Forum courses. The workers claimed that the Forum course contradicted with their religious beliefs. The plaintiffs in the suit included adherents of varying religious backgrounds, including and . \"The sessions put people into a hibernating state. They ask for total loyalty. It's like brainwashing,\" said Dong Shik Kim, one of the plaintiffs in the case. The plaintiffs said they lost their jobs after objecting to a \"new age quasi-religious cult\" which they said was developed by Werner Erhard. The DeKalb Farmers Market denied the allegations, and an attorney for the company Edward D. Buckley III told The Wall Street Journal that employees were encouraged, not coerced, to attend the training sessions. According to The Wall Street Journal, The Forum said it would not sanction workers being coerced to attend its training sessions. The parties in the DeKalb Farmers Market religious discrimination case came to a settlement in May 1989, and the case was in June. The terms of the out-of-court settlement were not made public, but the employees' attorney Amy Totenberg told The Wall Street Journal that the case \"has made employers come to grips with the legitimate boundaries of employee training\". According to Title VII of the , employers must \"reasonably accommodate\" their employees' religious beliefs unless this creates \"undue hardship\". In September 1988, the issued a policy-guidance notice which stated that courses should be handled under Title VII of the Act. According to the Commission, employers must provide \"reasonable accommodation\" if an employee challenges a training course, unless this causes \"undue hardship\" for the company. In October 2006, Landmark Education took legal action against Google, YouTube, the and a website owner in Queensland, Australia in attempts to remove criticism of its products from the Internet. The company sought a subpoena under the Digital Millennium Copyright Act in an attempt to discover the identity of an anonymous critic who uploaded a 2004 French documentary of the Landmark Forum to the Internet. \"\" (Voyage to the Land of the New Gurus) was produced by , a French news program. The represented the anonymous critic and the Internet Archive, and Landmark withdrew its subpoena in November 2006 in exchange for a promise from the anonymous critic not to repost the video. Landmark Education itself has come under scrutiny for its controversial labor practices. The company has been investigated by the in separate investigations originating out of California, Colorado, and Texas. Investigations focused on the heavy reliance of unpaid labor in the company's workforce, which Landmark Education calls \"assistants\" and deems volunteers. An investigation by the U.S. Dept. Labor based out of Colorado found that activities performed by Landmark Education's \"assistants\" include: \"office, clerical, telephone solicitation and enrollment, as well as greeting customers, setting up chairs, handling microphones during the seminars and making coffee. Additionally, a number of volunteers actually teach the courses and provide testimonials during and after the courses.\" The Colorado investigation's 1996 report found that \"No records are kept of any hours worked by any employees.\" According to a 1998 article in : \"In the end the Department of Labor dropped the issue, leaving Landmark trumpeting about its volunteers' choice in the matter.\" Metro Silicon Valley reported that Landmark Education at the time employed 451 paid staff, and also utilized the services of 7,500 volunteers. After an investigation into Landmark Education's labor practices by the U.S. Dept. Labor's offices out of California, the company was deemed to have violations. According to the Department of Labor's 2004 report on the investigation, back wages of $ 187,569.01 were found due to 45 employees. An investigation by the U.S. Dept. Labor in Texas which concluded in 2005 stated: \"Minimum wage violation found. Volunteers (Assistants) are not paid any wages for hours worked while performing the major duties of the firm. The assistants set up rooms, call registrants, collect fees, keep stats of classroom data/participants, file, they also are answering phones, training and leading seminars.\"", "after_revision": "A controversial development training course called \"Landmark Forum\" is cited in lawsuits in United States in New York and Washington, D.C. The seminars are run by a San Francisco, California-based training company called . The company evolved from \"est\", and has faced criticism regarding its techniques and its use of unpaid labor. The and company Los Angeles-based Growing Generations is named as a defendant in the New York lawsuit, and the Democratic is a defendant in the Washington, D.C. case. Manhattan seat of the , located at Thurgood Marshall U.S. Courthouse In separate lawsuits filed in the in Manhattan , New York, and in the in Washington, D.C., former employees are suing their employers for and claiming religious discrimination after their employers allegedly mandated that they attend courses at Landmark Education. In the US$3 million federal lawsuit filed in New York, Scott Glasgow is suing his former employer Growing Generations and its Stuart Miller. Growing Generations maintains sperm banks and also arranges surrogacy for gay couples who wish to have children. The company has offices in New York and Los Angeles, and has done business with celebrities including actor of . Glasgow was marketing director of Growing Generations, and claims he was fired in June 2007 after refusing to continue attending Landmark Education seminars. Glasgow is also suing for sexual harassment, and claims Miller came on to him in September 2006. He made approximately $100 , 000 per year as the company's marketing director, and was the company's only employee based out of New York City. The company's main offices are in Los Angeles. \"I was shocked when I was fired. It took me months to right myself. I want them to stop imposing Landmark on the employees, and I want an apology,\" said Glasgow in a statement in . Brent Pelton, one of Glasgow's attorneys, stated that: \"The Landmark philosophy is deeply ingrained in the culture of the company\". Glasgow said that the Landmark Education training courses were \"opposite\" to his Christian beliefs. According to Glasgow he was questioned by Miller in May 2007 after he walked out of a Landmark Education course, and was fired shortly thereafter. \"We stand by the allegations contained in the complaint and we look forward to proving them at trial,\" said Pelton in a statement to ABC News. Ian Wallace, an attorney who represents Growing Generations, claimed that Glasgow wasn't fired but walked away from his position. \"Growing Generations and Mr. Miller are very confident that these claims will be dismissed ultimately, and there's no factual basis for them whatsoever,\" said Wallace in a statement to The Village Voice. Lawyers representing Growing Generations and Stuart Miller declined comment to , and did not immediately return a message from ABC News. In Glasgow's complaint, entered into federal court record on April 18, he asserts that Landmark Education constitutes a \"religion\", and \"perceived their philosophy as a form of religion that contradicted his own personal beliefs\". He states that when he was promoted to Director of Marketing, he asked Miller if he could stop attending the Landmark sessions but was told that they were mandatory for all of the company's executives and that Landmark is \"very much the language of the company.\" Glasgow said his performance at the company was assessed based on how he was \"touching, moving and inspiring\" others, a phrase from the Landmark philosophy, as opposed to his business accomplishments at the company. The complaint claims that the actions of Miller and Growing Generations violated Federal, New York State and New York City civil rights laws. The lawsuit filed in federal court in Washington, D.C. deals with a separate plaintiff and company, but the plaintiff in the suit also claims that religious discrimination took place for allegedly being mandated to attend Landmark Education courses. Kenneth Goldman is suing the United States Democratic political action committee Twenty-First Century Democrats (also 21st Century Democrats) and its former executive director Kelly Young. Goldman was formerly the communications director of 21st Century Democrats. According to Goldman's complaint, three employees of 21st Century Democrats were fired after refusing to attend the Landmark Forum course. The complaint asserts that Landmark Education has \"religious characteristics and theological implications\" which influenced the mission of 21st Century Democrats and the way the organization conducted business. Goldman's complaint states that in addition to himself, a training director and field director were also fired after they made it clear they would not attend the Landmark Forum. Goldman says executive director Young infused Landmark Education terms into staff meetings such as \"create possibilities\", \"create a new context\", and \"enroll in possibilities\". He also claims that Young \"urged\" staff members to participate in Landmark Education events outside of the workplace, drove employees to and from Landmark functions, and used funds from 21st Century Democrats to pay for employees to attend those functions. Goldman's complaint asserts that he was discriminated against in violation of the District of Columbia Human Rights Act. In a statement in , the executive director of 21st Century Democrats, Mark Lotwis, called the lawsuit \"frivolous\" and said: \"we're going to defend our organization's integrity\". Landmark Education spokeswoman Deborah Beroset said that the Landmark Forum \"is in no way religious in nature and any claim to the contrary is simply absurd,\" and stated: \"While we are not a party to this lawsuit and have no firsthand knowledge of it, we can only assume that we are being used as a legal and political football to further the plaintiff\"s own financial interests.\" The New York lawsuit was filed April 14, and is still in early filing stages. A conference with the federal court judge in the case has been scheduled for June 17. The Washington, D.C. suit began in November 2007, and entered mediation this past March. As of April 15 the parties in the case were due back to court on July 11 to update the court on the mediation process. Landmark Education is descended from , also called \"est\", which was founded by Werner Erhard. est began in 1971, and Erhard's company repackaged the course as \"The Forum\" in 1985. Associates of Erhard bought the license to his \"technology\" and incorporated Landmark Education in California in 1991. This is not the first time employees have sued claiming mandatory attendance at \"Forum\" workshops violated their civil rights. In a lawsuit filed in December 1988 in the , eight employees of DeKalb Farmers Market in , Georgia sued their employer claiming their religious freedom and civil rights were violated when they were allegedly coerced into attending \"Forum\" training sessions. \"Many of these training programs, particularly at large corporations, claim to be purely psychological, aimed at improving productivity and morale and loyalty. But in fact they are religious,\" said professor Carl Raschke in a statement to . The DeKalb Farmers Market employees were represented by lawyers for the American Civil Liberties Union. Consulting Technologies Inc., an affiliate of Transformational Technologies Inc., was named as a party in the lawsuit. Transformational Technologies was founded by Werner Erhard, and was not named as a party in the suit. The \"Forum\" course that the employees claimed they were mandated to attend was developed by Werner Erhard and Associates. Employees said that they were fired or pressured to quit after they objected to the Forum courses. The workers claimed that the Forum course contradicted with their religious beliefs. The plaintiffs in the suit included adherents of varying religious backgrounds, including Christianity and Hinduism. \"The sessions put people into a hibernating state. They ask for total loyalty. It's like brainwashing,\" said Dong Shik Kim, one of the plaintiffs in the case. The plaintiffs said they lost their jobs after objecting to a \"new age quasi-religious cult\" which they said was developed by Werner Erhard. The DeKalb Farmers Market denied the allegations, and an attorney for the company Edward D. Buckley III told The Wall Street Journal that employees were encouraged, not coerced, to attend the training sessions. According to The Wall Street Journal, The Forum said it would not sanction workers being coerced to attend its training sessions. The parties in the DeKalb Farmers Market religious discrimination case came to a settlement in May 1989, and the case was in June. The terms of the out-of-court settlement were not made public, but the employees' attorney Amy Totenberg told The Wall Street Journal that the case \"has made employers come to grips with the legitimate boundaries of employee training\". According to Title VII of the , employers must \"reasonably accommodate\" their employees' religious beliefs unless this creates \"undue hardship\". In September 1988, the Equal Employment Opportunity Commission issued a policy-guidance notice which stated that courses should be handled under Title VII of the Act. According to the Commission, employers must provide \"reasonable accommodation\" if an employee challenges a training course, unless this causes \"undue hardship\" for the company. In October 2006, Landmark Education took legal action against Google, YouTube, the and a website owner in Queensland, Australia in attempts to remove criticism of its products from the Internet. The company sought a subpoena under the Digital Millennium Copyright Act in an attempt to discover the identity of an anonymous critic who uploaded a 2004 French documentary of the Landmark Forum to the Internet. \"\" (Voyage to the Land of the New Gurus) was produced by , a French news program. The Electronic Frontier Foundation represented the anonymous critic and the Internet Archive, and Landmark withdrew its subpoena in November 2006 in exchange for a promise from the anonymous critic not to repost the video. Landmark Education itself has come under scrutiny for its controversial labor practices. The company has been investigated by the in separate investigations originating out of California, Colorado, and Texas. Investigations focused on the heavy reliance of unpaid labor in the company's workforce, which Landmark Education calls \"assistants\" and deems volunteers. An investigation by the U.S. Dept. Labor based out of Colorado found that activities performed by Landmark Education's \"assistants\" include: \"office, clerical, telephone solicitation and enrollment, as well as greeting customers, setting up chairs, handling microphones during the seminars and making coffee. Additionally, a number of volunteers actually teach the courses and provide testimonials during and after the courses.\" The Colorado investigation's 1996 report found that \"No records are kept of any hours worked by any employees.\" According to a 1998 article in : \"In the end the Department of Labor dropped the issue, leaving Landmark trumpeting about its volunteers' choice in the matter.\" Metro Silicon Valley reported that Landmark Education at the time employed 451 paid staff, and also utilized the services of 7,500 volunteers. After an investigation into Landmark Education's labor practices by the U.S. Dept. Labor's offices out of California, the company was deemed to have violations. According to the Department of Labor's 2004 report on the investigation, back wages of 187,569.01 were found due to 45 employees. An investigation by the U.S. Dept. Labor in Texas which concluded in 2005 stated: \"Minimum wage violation found. Volunteers (Assistants) are not paid any wages for hours worked while performing the major duties of the firm. The assistants set up rooms, call registrants, collect fees, keep stats of classroom data/participants, file, they also are answering phones, training and leading seminars.\"", "edit_actions": [{"type": "R", "before": "-based", "after": "Los Angeles-based", "start_char_pos": 349, "end_char_pos": 355}, {"type": "A", "before": null, "after": "Democratic", "start_char_pos": 433, "end_char_pos": 433}, {"type": "A", "before": null, "after": "Manhattan", "start_char_pos": 479, "end_char_pos": 479}, {"type": "A", "before": null, "after": "Manhattan", "start_char_pos": 576, "end_char_pos": 576}, {"type": "R", "before": "3 million federal lawsuit filed in New York", "after": "US$3 million federal lawsuit filed in New York, Scott Glasgow is suing his former employer Growing Generations and its Stuart Miller. Growing Generations maintains sperm banks and also arranges surrogacy for gay couples who wish to have children. The company has offices in New York and Los Angeles, and has done business with celebrities including actor of . Glasgow was marketing director of Growing Generations, and claims he was fired in June 2007 after refusing to continue attending Landmark Education seminars. Glasgow is also suing for sexual harassment, and claims Miller came on to him in September 2006. He made approximately $100", "start_char_pos": 802, "end_char_pos": 845}, {"type": "R", "before": "Scott Glasgow is suing his former employer Growing Generationsand its Stuart Miller . Growing Generations maintains sperm banks and also arranges surrogacy for couples who wish to have children. The company has offices in New York and Los Angeles, and has done business with celebrities including actor of .", "after": "000 per year as the company's marketing director, and was the company's only employee based out of New York City. The company's main offices are in Los Angeles.", "start_char_pos": 848, "end_char_pos": 1155}, {"type": "R", "before": "Glasgow was marketing director of Growing Generations, and claims he was fired in June", "after": "\"I was shocked when I was fired. It took me months to right myself. I want them to stop imposing Landmark on the employees, and I want an apology,\" said Glasgow in a statement in . Brent Pelton, one of Glasgow's attorneys, stated that: \"The Landmark philosophy is deeply ingrained in the culture of the company\". Glasgow said that the Landmark Education training courses were \"opposite\" to his Christian beliefs. According to Glasgow he was questioned by Miller in May", "start_char_pos": 1156, "end_char_pos": 1242}, {"type": "R", "before": "after refusing to continue attending Landmark Education seminars. Glasgow is also suing for sexual harassment,", "after": "after he walked out of a Landmark Education course, and was fired shortly thereafter. \"We stand by the allegations contained in the complaint and we look forward to proving them at trial,\" said Pelton in a statement to ABC News.", "start_char_pos": 1248, "end_char_pos": 1358}, {"type": "A", "before": null, "after": "Ian Wallace, an attorney who represents Growing Generations, claimed that Glasgow wasn't fired but walked away from his position. \"Growing Generations and Mr. Miller are very confident that these claims will be dismissed ultimately, and there's no factual basis for them whatsoever,\" said Wallace in a statement to The Village Voice. Lawyers representing Growing Generations", "start_char_pos": 1359, "end_char_pos": 1359}, {"type": "R", "before": "claims Miller came on to him in September 2006. He made approximately $100,000 per year as the company's marketing director, and was the company's only employee based out of New York City. The company's main offices are in Los Angeles. \"I was shocked when I was fired. It took me months to right myself. I want them to stop imposing Landmark on the employees, and I want an apology,\" said Glasgow in a statement in . Brent Pelton, one of Glasgow's attorneys, stated that: \"The Landmark philosophy is deeply ingrained in the culture of the company\". Glasgow said that the Landmark Education training courses were \"opposite\" to his beliefs. According to Glasgow he was questioned by Miller in May 2007 after he walked out of a Landmark Education course, and was fired shortly thereafter. \"We stand by the allegations contained in the complaint and we look forward to proving them at trial,\" said Pelton in a statement to . Ian Wallace, an attorney who represents Growing Generations, claimed that Glasgow wasn't fired but walked away from his position. \"Growing Generations and Mr. Miller are very confident that these claims will be dismissed ultimately, and there's no factual basis for them whatsoever,\" said Wallace in a statement to The Village Voice. Lawyers representing Growing Generations and Stuart Miller declined comment to , and did not immediately return a message from ABC News. In Glasgow's complaint, entered into federal court record on April 18, he asserts that Landmark Education constitutes a \"religion\", and \"perceived their philosophy as a form of religion that contradicted his own personal beliefs\". He states that when he was promoted to Director of Marketing, he asked Miller if he could stop attending the Landmark sessions but was told that they were mandatory for all of the company's executives and that Landmark is \"very much the language of the company.\" Glasgow said his performance at the company was assessed based on how he was \"touching, moving and inspiring\" others, a phrase from the Landmark philosophy, as opposed to his business accomplishments at the company. The complaint claims that the actions of Miller and Growing Generations violated Federal, New York State and New York City laws. The lawsuit filed in federal court in Washington, D.C. deals with a separate plaintiff and company, but the plaintiff in the suit also claims that religious discrimination took place for allegedly being mandated to attend Landmark Education courses. Kenneth Goldman is suing the United States Democratic political action committee Twenty-First Century Democrats (also 21st Century Democrats) and its former executive director Kelly Young. Goldman was formerly the communications director of 21st Century Democrats. According to Goldman's complaint, three employees of 21st Century Democrats were fired after refusing to attend the Landmark Forum course. The complaint asserts that Landmark Education has \"religious characteristics and theological implications\" which influenced the mission of 21st Century Democrats and the way the organization conducted business. Goldman's complaint states that in addition to himself, a training director and field director were also fired after they made it clear they would not attend the Landmark Forum. Goldman says executive director Young infused Landmark Education terms into staff meetings such as \"create possibilities\", \"create a new context\", and \"enroll in possibilities\". He also claims that Young \"urged\" staff members to participate in Landmark Education events outside of the workplace, drove employees to and from Landmark functions, and used funds from 21st Century Democrats to pay for employees to attend those functions. Goldman's complaint asserts that he was discriminated against in violation of the District of Columbia Human Rights Act. In a statement in , the executive director of 21st Century Democrats, Mark Lotwis, called the lawsuit \"frivolous\" and said: \"we're going to defend our organization's integrity\". Landmark Education spokeswoman Deborah Beroset said that the Landmark Forum \"is in no way religious in nature and any claim to the contrary is simply absurd,\" and stated: \"While we are not a party to this lawsuit and have no firsthand knowledge of it, we can only assume that we are being used as a legal and political football to further the plaintiff\"s own financial interests.\" The New York lawsuit was filed April 14, and is still in early filing stages. A conference with the federal court judge in the case has been scheduled for June 17. The Washington, D.C. suit began in November 2007, and entered mediation this past March. As of April 15 the parties in the case were due back to court on July 11 to update the court on the mediation process. Landmark Education is descended from , also called \"est\", which was founded by . est began in 1971, and Erhard's company repackaged the course as \"The Forum\" in 1985. Associates of Erhard bought the license to his \"technology\" and incorporated Landmark Education in California in 1991. This is not the first time employees have sued claiming mandatory attendance at \"Forum\" workshops violated their civil rights. In a lawsuit filed in December 1988 in the , eight employees of DeKalb Farmers Market in , Georgia sued their employer claiming their religious freedom and civil rights were violated when they were allegedly coerced into attending \"Forum\" training sessions. \"Many of these training programs, particularly at large corporations, claim to be purely psychological, aimed at improving productivity and morale and loyalty. But in fact they are religious,\" said professor Carl Raschke in a statement to . The DeKalb Farmers Market employees were represented by lawyers for the . Consulting Technologies Inc., an affiliate of Transformational Technologies Inc., was named as a party in the lawsuit. Transformational Technologies was founded by Werner Erhard, and was not named as a party in the suit. The \"Forum\" course that the employees claimed they were mandated to attend was developed by Werner Erhard and Associates. Employees said that they were fired or pressured to quit after they objected to the Forum courses. The workers claimed that the Forum course contradicted with their religious beliefs. The plaintiffs in the suit included adherents of varying religious backgrounds, including and . \"The sessions put people into a hibernating state. They ask for total loyalty. It's like brainwashing,\" said Dong Shik Kim, one of the plaintiffs in the case. The plaintiffs said they lost their jobs after objecting to a \"new age quasi-religious cult\" which they said was developed by Werner Erhard. The DeKalb Farmers Market denied the allegations, and an attorney for the company Edward D. Buckley III told The Wall Street Journal that employees were encouraged, not coerced, to attend the training sessions. According to The Wall Street Journal, The Forum said it would not sanction workers being coerced to attend its training sessions. The parties in the DeKalb Farmers Market religious discrimination case came to a settlement in May 1989, and the case was in June. The terms of the out-of-court settlement were not made public, but the employees' attorney Amy Totenberg told The Wall Street Journal that the case \"has made employers come to grips with the legitimate boundaries of employee training\". According to Title VII of the , employers must \"reasonably accommodate\" their employees' religious beliefs unless this creates \"undue hardship\". In September 1988, the issued a policy-guidance notice which stated that courses should be handled under Title VII of the Act. According to the Commission, employers must provide \"reasonable accommodation\" if an employee challenges a training course, unless this causes \"undue hardship\" for the company. In October 2006, Landmark Education took legal action against Google, YouTube, the and a website owner in Queensland, Australia in attempts to remove criticism of its products from the Internet. The company sought a subpoena under the Digital Millennium Copyright Act in an attempt to discover the identity of an anonymous critic who uploaded a 2004 French documentary of the Landmark Forum to the Internet. \"\" (Voyage to the Land of the New Gurus) was produced by , a French news program. The represented the anonymous critic and the Internet Archive, and Landmark withdrew its subpoena in November 2006 in exchange for a promise from the anonymous critic not to repost the video. Landmark Education itself has come under scrutiny for its controversial labor practices. The company has been investigated by the in separate investigations originating out of California, Colorado, and Texas. Investigations focused on the heavy reliance of unpaid labor in the company's workforce, which Landmark Education calls \"assistants\" and deems volunteers. An investigation by the U.S. Dept. Labor based out of Colorado found that activities performed by Landmark Education's \"assistants\" include: \"office, clerical, telephone solicitation and enrollment, as well as greeting customers, setting up chairs, handling microphones during the seminars and making coffee. Additionally, a number of volunteers actually teach the courses and provide testimonials during and after the courses.\" The Colorado investigation's 1996 report found that \"No records are kept of any hours worked by any employees.\" According to a 1998 article in : \"In the end the Department of Labor dropped the issue, leaving Landmark trumpeting about its volunteers' choice in the matter.\" Metro Silicon Valley reported that Landmark Education at the time employed 451 paid staff, and also utilized the services of 7,500 volunteers. After an investigation into Landmark Education's labor practices by the U.S. Dept. Labor's offices out of California, the company was deemed to have violations. According to the Department of Labor's 2004 report on the investigation, back wages of $", "after": "Stuart Miller declined comment to , and did not immediately return a message from ABC News.", "start_char_pos": 1364, "end_char_pos": 11331}, {"type": "A", "before": null, "after": "In Glasgow's complaint, entered into federal court record on April 18, he asserts that Landmark Education constitutes a \"religion\", and \"perceived their philosophy as a form of religion that contradicted his own personal beliefs\". He states that when he was promoted to Director of Marketing, he asked Miller if he could stop attending the Landmark sessions but was told that they were mandatory for all of the company's executives and that Landmark is \"very much the language of the company.\" Glasgow said his performance at the company was assessed based on how he was \"touching, moving and inspiring\" others, a phrase from the Landmark philosophy, as opposed to his business accomplishments at the company. The complaint claims that the actions of Miller and Growing Generations violated Federal, New York State and New York City civil rights laws.", "start_char_pos": 11332, "end_char_pos": 11332}, {"type": "A", "before": null, "after": "The lawsuit filed in federal court in Washington, D.C. deals with a separate plaintiff and company, but the plaintiff in the suit also claims that religious discrimination took place for allegedly being mandated to attend Landmark Education courses. Kenneth Goldman is suing the United States Democratic political action committee Twenty-First Century Democrats (also 21st Century Democrats) and its former executive director Kelly Young. Goldman was formerly the communications director of 21st Century Democrats.", "start_char_pos": 11333, "end_char_pos": 11333}, {"type": "A", "before": null, "after": "According to Goldman's complaint, three employees of 21st Century Democrats were fired after refusing to attend the Landmark Forum course. The complaint asserts that Landmark Education has \"religious characteristics and theological implications\" which influenced the mission of 21st Century Democrats and the way the organization conducted business. Goldman's complaint states that in addition to himself, a training director and field director were also fired after they made it clear they would not attend the Landmark Forum.", "start_char_pos": 11334, "end_char_pos": 11334}, {"type": "A", "before": null, "after": "Goldman says executive director Young infused Landmark Education terms into staff meetings such as \"create possibilities\", \"create a new context\", and \"enroll in possibilities\". He also claims that Young \"urged\" staff members to participate in Landmark Education events outside of the workplace, drove employees to and from Landmark functions, and used funds from 21st Century Democrats to pay for employees to attend those functions. Goldman's complaint asserts that he was discriminated against in violation of the District of Columbia Human Rights Act.", "start_char_pos": 11335, "end_char_pos": 11335}, {"type": "A", "before": null, "after": "In a statement in , the executive director of 21st Century Democrats, Mark Lotwis, called the lawsuit \"frivolous\" and said: \"we're going to defend our organization's integrity\". Landmark Education spokeswoman Deborah Beroset said that the Landmark Forum \"is in no way religious in nature and any claim to the contrary is simply absurd,\" and stated: \"While we are not a party to this lawsuit and have no firsthand knowledge of it, we can only assume that we are being used as a legal and political football to further the plaintiff\"s own financial interests.\"", "start_char_pos": 11336, "end_char_pos": 11336}, {"type": "A", "before": null, "after": "The New York lawsuit was filed April 14, and is still in early filing stages. A conference with the federal court judge in the case has been scheduled for June 17. The Washington, D.C. suit began in November 2007, and entered mediation this past March. As of April 15 the parties in the case were due back to court on July 11 to update the court on the mediation process.", "start_char_pos": 11337, "end_char_pos": 11337}, {"type": "A", "before": null, "after": "Landmark Education is descended from , also called \"est\", which was founded by Werner Erhard. est began in 1971, and Erhard's company repackaged the course as \"The Forum\" in 1985. Associates of Erhard bought the license to his \"technology\" and incorporated Landmark Education in California in 1991.", "start_char_pos": 11338, "end_char_pos": 11338}, {"type": "A", "before": null, "after": "This is not the first time employees have sued claiming mandatory attendance at \"Forum\" workshops violated their civil rights. In a lawsuit filed in December 1988 in the , eight employees of DeKalb Farmers Market in , Georgia sued their employer claiming their religious freedom and civil rights were violated when they were allegedly coerced into attending \"Forum\" training sessions. \"Many of these training programs, particularly at large corporations, claim to be purely psychological, aimed at improving productivity and morale and loyalty. But in fact they are religious,\" said professor Carl Raschke in a statement to .", "start_char_pos": 11339, "end_char_pos": 11339}, {"type": "A", "before": null, "after": "The DeKalb Farmers Market employees were represented by lawyers for the American Civil Liberties Union. Consulting Technologies Inc., an affiliate of Transformational Technologies Inc., was named as a party in the lawsuit. Transformational Technologies was founded by Werner Erhard, and was not named as a party in the suit. The \"Forum\" course that the employees claimed they were mandated to attend was developed by Werner Erhard and Associates. Employees said that they were fired or pressured to quit after they objected to the Forum courses.", "start_char_pos": 11340, "end_char_pos": 11340}, {"type": "A", "before": null, "after": "The workers claimed that the Forum course contradicted with their religious beliefs. The plaintiffs in the suit included adherents of varying religious backgrounds, including Christianity and Hinduism. \"The sessions put people into a hibernating state. They ask for total loyalty. It's like brainwashing,\" said Dong Shik Kim, one of the plaintiffs in the case. The plaintiffs said they lost their jobs after objecting to a \"new age quasi-religious cult\" which they said was developed by Werner Erhard.", "start_char_pos": 11341, "end_char_pos": 11341}, {"type": "A", "before": null, "after": "The DeKalb Farmers Market denied the allegations, and an attorney for the company Edward D. Buckley III told The Wall Street Journal that employees were encouraged, not coerced, to attend the training sessions. According to The Wall Street Journal, The Forum said it would not sanction workers being coerced to attend its training sessions.", "start_char_pos": 11342, "end_char_pos": 11342}, {"type": "A", "before": null, "after": "The parties in the DeKalb Farmers Market religious discrimination case came to a settlement in May 1989, and the case was in June. The terms of the out-of-court settlement were not made public, but the employees' attorney Amy Totenberg told The Wall Street Journal that the case \"has made employers come to grips with the legitimate boundaries of employee training\".", "start_char_pos": 11343, "end_char_pos": 11343}, {"type": "A", "before": null, "after": "According to Title VII of the , employers must \"reasonably accommodate\" their employees' religious beliefs unless this creates \"undue hardship\". In September 1988, the Equal Employment Opportunity Commission issued a policy-guidance notice which stated that courses should be handled under Title VII of the Act. According to the Commission, employers must provide \"reasonable accommodation\" if an employee challenges a training course, unless this causes \"undue hardship\" for the company.", "start_char_pos": 11344, "end_char_pos": 11344}, {"type": "A", "before": null, "after": "In October 2006, Landmark Education took legal action against Google, YouTube, the and a website owner in Queensland, Australia in attempts to remove criticism of its products from the Internet. The company sought a subpoena under the Digital Millennium Copyright Act in an attempt to discover the identity of an anonymous critic who uploaded a 2004 French documentary of the Landmark Forum to the Internet. \"\" (Voyage to the Land of the New Gurus) was produced by , a French news program. The Electronic Frontier Foundation represented the anonymous critic and the Internet Archive, and Landmark withdrew its subpoena in November 2006 in exchange for a promise from the anonymous critic not to repost the video.", "start_char_pos": 11345, "end_char_pos": 11345}, {"type": "A", "before": null, "after": "Landmark Education itself has come under scrutiny for its controversial labor practices. The company has been investigated by the in separate investigations originating out of California, Colorado, and Texas. Investigations focused on the heavy reliance of unpaid labor in the company's workforce, which Landmark Education calls \"assistants\" and deems volunteers.", "start_char_pos": 11346, "end_char_pos": 11346}, {"type": "A", "before": null, "after": "An investigation by the U.S. Dept. Labor based out of Colorado found that activities performed by Landmark Education's \"assistants\" include: \"office, clerical, telephone solicitation and enrollment, as well as greeting customers, setting up chairs, handling microphones during the seminars and making coffee. Additionally, a number of volunteers actually teach the courses and provide testimonials during and after the courses.\" The Colorado investigation's 1996 report found that \"No records are kept of any hours worked by any employees.\" According to a 1998 article in : \"In the end the Department of Labor dropped the issue, leaving Landmark trumpeting about its volunteers' choice in the matter.\" Metro Silicon Valley reported that Landmark Education at the time employed 451 paid staff, and also utilized the services of 7,500 volunteers.", "start_char_pos": 11347, "end_char_pos": 11347}, {"type": "A", "before": null, "after": "After an investigation into Landmark Education's labor practices by the U.S. Dept. Labor's offices out of California, the company was deemed to have violations. According to the Department of Labor's 2004 report on the investigation, back wages of", "start_char_pos": 11348, "end_char_pos": 11348}], "sents_char_pos": [0, 222, 332, 794, 1042, 1313, 1411, 1552, 1599, 1632, 1667, 1912, 2002, 2149, 2284, 2414, 2618, 2755, 2986, 3249, 3465, 3594, 3844, 4033, 4109, 4248, 4459, 4637, 4815, 5072, 5193, 5371, 5752, 5830, 5916, 6005, 6124, 6291, 6410, 6537, 6795, 6955, 7036, 7229, 7331, 7453, 7552, 7637, 7784, 7812, 7892, 8033, 8244, 8374, 8505, 8741, 8886, 9013, 9190, 9385, 9598, 9680, 9872, 9961, 10081, 10236, 10271, 10545, 10665, 10777, 10938, 11081, 11164, 11242, 11391, 11426, 11504, 11615]}
+{"doc_id": "106936", "revision_depth": "1", "before_revision": "Photos showing Fundamentalist Church of Jesus Christ of Latter Day Saints leader Warren Jeffs with child brides were entered into evidence Friday in a Texas court case involving children seized from the Yearning For Zion Ranch by State authorities in April. Texas officials removed over 400 children from the Eldorado, Texas YFZ Ranch in early April on suspicion of widespread child abuse. The photos were entered into evidence as part of a case in Tom Green County District Court. Officials claim there is a \"pervasive pattern\" of underage girls forced into marriage with older men. The photos show Warren Jeffs kissing and hugging young girls, and attorneys for Texas Child Protective Services claim that one of the girls shown in the photos is a 12-year-old \"bride\". The photos are dated from July 2006 and January 2005. The State of Texas is seeking custody of a baby boy born to Louisa Bradshaw and her \"husband , \" Dan Jessop. According to the Deseret News, Jessop was asked if he thought the photos of Jeffs and the girls was evidence of sexual abuse, and he responded: \"I do not consider a girl kissing a man sex abuse.\" Child Protective Services lawyers told the court that the photos show Jeffs kissing the girls as \"how a husband kisses a wife\". YFZ Ranch near Eldorado, Texas, owned by the Fundamentalist Church of Jesus Christ of Latter Day Saints Deseret News reported that Protective Services lawyers did not say how the images of Jeffs were obtained, but said that the photos illustrate a culture of abuse at the compound. According to CNN information revealed in court shows that one of the girls in the photos is an aunt to the children involved in the Texas custody hearing and lived on the YFZ Ranch. CNN reports that the girl's birth date was given as July 1994 and she is 13-years-old . She was taken into state custody by Texas officials along with other children in April. ABC News reported that an alleged child bride shown in the photographs was set to give testimony in court, but state attorneys and FLDS representatives came to a resolution and agreed that Protective Services would retain custody of Louisa Bradshaw's baby. The baby was born in Texas state custody. Bradshaw was initially taken into custody as well because authorities thought she was under age, but have since stated that she is over age 18. According to ABC News Bradshaw will remain with her baby in a shelter. Protective Services said that Bradshaw and Jessop lived in the same building as the 12-year-old girl shown in the photographs with Jeffs. Jeffs is seen in one set of photos from January 26, 2005 labeled \"First anniversary\" with a girl called \"Loretta\". In another set dated July 27, 2005, Jeffs is shown with a girl referred to as \"Merrianne\". Child Protective Services officials said that they have evidence that \"Merrianne\" was 12-years-old when she was married to Jeffs at the YFZ compound. The Vancouver Sun reported that per a family member, \"Loretta\" was no older than 12 when she was married. Portions from the set of photos were displayed at media sites including Radar Online, CNN, FOX News, National Nine News and ABC News, and the website The Smoking Gun made three of the court exhibits available on their site . In a ruling made last week in a case involving 38 FLDS mothers and 124 children, the Texas 3rd District Court of Appeals said that the state had did not have the right to remove those children from the compound. The appeals court said that Child Protective Services was unable to prove that the children in the compound were at risk of immediate physical harm. Texas law states that \"a danger to the physical health or safety of the child which was caused by an act or failure to act of the person entitled to possession and for the child to remain in the home is contrary to the welfare of the child\" must be shown in order to remove that child from the home. Texas Department of Family and Protective Services filed court papers Wednesday asserting that FLDS families may flee the state if they are reunited with their children after the Texas appeals court ruling. Protective Services officials are worried that if the families leave the court's jurisdiction they would be at risk of abuse. In response, attorneys for mothers of the children in custody filed a counter-motion. The mothers claim the children are under \"continuing, irreparable harm every day that they are separated from their parents\". Warren Jeffs was convicted in September 2007 of two counts of being an accomplice to rape related to a 2001 wedding he arranged between a 14-year-old girl and her 19-year-old cousin. He was sentenced to two consecutive five-year prison sentences in Utah, and faces an impending trial in Arizona on eight charges including sexual conduct with a minor, incest and conspiracy.", "after_revision": "Photos showing Fundamentalist Church of Jesus Christ of Latter Day Saints (FLDS) leader Warren Jeffs with child brides were entered into evidence Friday in a Texas court case involving children seized from the Yearning For Zion (YFZ) Ranch by State authorities in April. Texas officials removed over 400 children from the Eldorado, Texas YFZ Ranch in early April on suspicion of widespread child abuse. The photos were entered into evidence as part of the case in Tom Green County District Court. Officials claim there is a \"pervasive pattern\" of underage girls forced into marriage with older men. The photos show Warren Jeffs kissing and hugging young girls, and attorneys for Texas Child Protective Services claim that one of the girls shown in the photos is a 12-year old \"bride\". The photos are dated from July 2006 and January 2005. The State of Texas is seeking custody of a baby boy born to Louisa Bradshaw and her \"husband \" Dan Jessop. According to the Deseret News, Jessop was asked if he thought the photos of Jeffs and the girls was evidence of sexual abuse, to which he responded, \"I do not consider a girl kissing a man sex abuse.\" Child Protective Services lawyers told the court that the photos show Jeffs kissing the girls similar to \"how a husband kisses a wife\". YFZ Ranch near Eldorado, Texas, owned by the Fundamentalist Church of Jesus Christ of Latter Day Saints Deseret News reported that Protective Services lawyers did not say how the images of Jeffs were obtained, but said that the photos illustrate a culture of abuse at the compound. According to CNN , information revealed in court shows that one of the girls in the photos is an aunt to the children involved in the Texas custody hearing and lived on the YFZ Ranch. CNN reports that the girl's birth date was given as July 1994 and she is 13 years old . She was taken into state custody by Texas officials along with other children in April. ABC News reported that an alleged child bride shown in the photographs was set to give testimony in court, but state attorneys and FLDS representatives came to a resolution and agreed that Protective Services would retain custody of Louisa Bradshaw's baby. The baby was born in Texas state custody. Bradshaw was initially taken into custody as well because authorities thought she was under age, but it has since been revealed that she is over the age of 18. According to ABC News Bradshaw will remain with her baby in a shelter. Protective Services said that Bradshaw and Jessop lived in the same building as the 12-year old girl shown in the photographs with Jeffs. Jeffs is seen in one set of photos from January 26, 2005 labeled \"First anniversary\" with a girl called \"Loretta\". In another set dated July 27, 2005, Jeffs is shown with a girl referred to as \"Merrianne\". Child Protective Services officials said that they have evidence that \"Merrianne\" was 12 years old when she was married to Jeffs at the YFZ compound. The Vancouver Sun reported that , per a family member, \"Loretta\" was no older than 12 when she was married. Portions from the set of photos were displayed at media sites including Radar Online, CNN, FOX News, National Nine News and ABC News, and the website The Smoking Gun made three of the court exhibits available for viewing . In a ruling made last week in a case involving 38 FLDS mothers and 124 children, the Texas 3rd District Court of Appeals said that the state did not have the right to remove those children from the compound. The appeals court said that Child Protective Services was unable to prove that the children in the compound were at risk of immediate physical harm. Texas law states that \"a danger to the physical health or safety of the child which was caused by an act or failure to act of the person entitled to possession and for the child to remain in the home is contrary to the welfare of the child\" must be shown in order to remove that child from the home. Texas Department of Family and Protective Services filed court papers Wednesday asserting that FLDS families may flee the state if they are reunited with their children after the Texas appeals court ruling. Protective Services officials are worried that if the families leave the court's jurisdiction , children could be at risk of abuse. In response, attorneys for mothers of the children in custody filed a counter-motion. The mothers claim that the children are under \"continuing, irreparable harm every day that they are separated from their parents\". Warren Jeffs was convicted in September 2007 of two counts of being an accomplice to rape related to a 2001 wedding he arranged between a 14-year old girl and her 19-year old cousin. He was sentenced to two consecutive five-year prison sentences in Utah, and faces an impending trial in Arizona on eight charges including sexual conduct with a minor, incest and conspiracy.", "edit_actions": [{"type": "A", "before": null, "after": "(FLDS)", "start_char_pos": 74, "end_char_pos": 74}, {"type": "A", "before": null, "after": "(YFZ)", "start_char_pos": 222, "end_char_pos": 222}, {"type": "R", "before": "a", "after": "the", "start_char_pos": 441, "end_char_pos": 442}, {"type": "R", "before": "12-year-old", "after": "12-year old", "start_char_pos": 751, "end_char_pos": 762}, {"type": "D", "before": ",", "after": null, "start_char_pos": 919, "end_char_pos": 920}, {"type": "R", "before": "and he responded:", "after": "to which he responded,", "start_char_pos": 1061, "end_char_pos": 1078}, {"type": "R", "before": "as", "after": "similar to", "start_char_pos": 1225, "end_char_pos": 1227}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1558, "end_char_pos": 1558}, {"type": "R", "before": "13-years-old", "after": "13 years old", "start_char_pos": 1797, "end_char_pos": 1809}, {"type": "R", "before": "have since stated", "after": "it has since been revealed", "start_char_pos": 2300, "end_char_pos": 2317}, {"type": "R", "before": "age", "after": "the age of", "start_char_pos": 2335, "end_char_pos": 2338}, {"type": "R", "before": "12-year-old", "after": "12-year old", "start_char_pos": 2498, "end_char_pos": 2509}, {"type": "R", "before": "12-years-old", "after": "12 years old", "start_char_pos": 2844, "end_char_pos": 2856}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2940, "end_char_pos": 2940}, {"type": "R", "before": "on their site", "after": "for viewing", "start_char_pos": 3224, "end_char_pos": 3237}, {"type": "D", "before": "had", "after": null, "start_char_pos": 3381, "end_char_pos": 3384}, {"type": "R", "before": "they would", "after": ", children could", "start_char_pos": 4202, "end_char_pos": 4212}, {"type": "A", "before": null, "after": "that", "start_char_pos": 4338, "end_char_pos": 4338}, {"type": "R", "before": "14-year-old", "after": "14-year old", "start_char_pos": 4585, "end_char_pos": 4596}, {"type": "R", "before": "19-year-old", "after": "19-year old", "start_char_pos": 4610, "end_char_pos": 4621}], "sents_char_pos": [0, 259, 391, 483, 585, 771, 825, 934, 1130, 1258, 1540, 1723, 1811, 1899, 2156, 2198, 2342, 2413, 2551, 2666, 2757, 2907, 3014, 3239, 3451, 3600, 3900, 4107, 4233, 4319, 4446, 4629]}
+{"doc_id": "108587", "revision_depth": "1", "before_revision": "The Australian Institute of Health and Welfare (AIHW) conference, held in Canberra, Australia, received mixed messages on Tuesday about the health of Australians - while average life expectancy is 81.4 years, second only to Japan's 82.2, and rates of cancer, heart disease and stroke are dropping, obesity and alcohol-related diseases, as well as sexually transmitted infections , are on the increase. The report highlighted the increasing gap between Australia's Indigenous population , and the rest of the nation. Australian Aborigines and Torres Strait Islanders have a life expectancy around 17 years lower than the general populace, and in at least four states 71\\% of Aboriginals who died were aged under 65 years , compared with 21\\% for the rest of the population. Indigenous Australians also have higher rates of conditions such as obesity, diabetes, respiratory illness, teenage pregnancy and sexually transmitted infections. People living in rural and regional areas were also found to have lower life expectancies and higher illness rates than their suburban and metropolitan counterparts. While obesity is a growing concern in Australia, AIHW director Penny Allbon expressed skepticism over a recent report from the Baker IDI Heart and Diabetes Institute that claimed that Australia had overtaken the United States as the \"fattest\" nation in the world with \"over four million adult Australians [...] currently obese\" , expressing concern that the institute's sample from 100 locations across the country may not be representative of the whole population. \"At the moment the ABS is out there measuring height and weight in a population-based survey, so we don't know the results,\" Dr Allbon said. \"We were just a bit concerned that the statistics that came out about us being the fattest in the world is not based on a population survey.\" AIHW reported the number of Australians being obese as closer to 2.5 million, with 7.4 million being overweight. Between 1997 and 2005, the number of General practitioners has dropped nine per cent , although in regional areas there has been an increase of 15\\%. Based on the report, the AIHW has recommended that Australians consider lifestyle change, such as healthier eating and more exercise, to alleviate the pressure on Australia's public health system. \"In rank order, the greatest improvements can be achieved through reductions in tobacco smoking, high blood pressure, overweight/obesity, physical inactivity, high blood cholesterol and excessive alcohol consumption,\" according to Dr Allbon.", "after_revision": "The Australian Institute of Health and Welfare (AIHW) conference, held in Canberra, Australia, received mixed messages on Tuesday about the health of Australians . While average life expectancy is 81.4 years, second only to Japan's 82.2, and rates of cancer, heart disease and stroke are dropping, incidence of obesity, alcohol-related diseases, and sexually transmitted infections are on the increase. The AIHW report highlighted the increasing gap between Australia's Indigenous population and the rest of the nation. Australian Aborigines and Torres Strait Islanders have a life expectancy around 17 years lower than the general populace, and in at least four states 71\\% of Aboriginals who died were under 65-years old , compared with 21\\% for the rest of the population. Indigenous Australians are reported to have higher rates of obesity, diabetes, respiratory illness, teenage pregnancy and sexually transmitted infections. People living in rural and regional areas were also found to have lower life expectancies and higher illness rates than their suburban and metropolitan counterparts. While obesity is a growing concern in Australia, AIHW director Penny Allbon expressed skepticism over a recent report from the Baker IDI Heart and Diabetes Institute that claimed that Australia had overtaken the United States as the \"fattest\" nation in the world , with \"over four million adult Australians [...] currently obese\" . Allben commented that the institute's sample from 100 locations across the country may not be representative of the whole population. \"At the moment the ABS Australian Bureau of Statistics is out there measuring height and weight in a population-based survey, so we don't know the results,\" Dr Allbon said. \"We were just a bit concerned that the statistics that came out about us being the fattest in the world is not based on a population survey.\" AIHW reported the number of Australians being obese as closer to 2.5 million, with 7.4 million being overweight. Between 1997 and 2005, the number of general practitioners in Australia has dropped 9\\% , although in regional areas there has been an increase of 15\\%. Based on the report, the AIHW has recommended that Australians consider lifestyle change, such as healthier eating and more exercise, to alleviate the pressure on Australia's public health system. \"In rank order, the greatest improvements can be achieved through reductions in tobacco smoking, high blood pressure, overweight/obesity, physical inactivity, high blood cholesterol and excessive alcohol consumption,\" according to Dr . Allbon.", "edit_actions": [{"type": "R", "before": "- while", "after": ". While", "start_char_pos": 162, "end_char_pos": 169}, {"type": "R", "before": "obesity and", "after": "incidence of obesity,", "start_char_pos": 298, "end_char_pos": 309}, {"type": "R", "before": "as well as", "after": "and", "start_char_pos": 336, "end_char_pos": 346}, {"type": "D", "before": ",", "after": null, "start_char_pos": 379, "end_char_pos": 380}, {"type": "A", "before": null, "after": "AIHW", "start_char_pos": 406, "end_char_pos": 406}, {"type": "D", "before": ",", "after": null, "start_char_pos": 487, "end_char_pos": 488}, {"type": "R", "before": "aged under 65 years", "after": "under 65-years old", "start_char_pos": 701, "end_char_pos": 720}, {"type": "R", "before": "also", "after": "are reported to", "start_char_pos": 797, "end_char_pos": 801}, {"type": "D", "before": "conditions such as", "after": null, "start_char_pos": 823, "end_char_pos": 841}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1366, "end_char_pos": 1366}, {"type": "R", "before": ", expressing concern", "after": ". Allben commented", "start_char_pos": 1432, "end_char_pos": 1452}, {"type": "A", "before": null, "after": "Australian Bureau of Statistics", "start_char_pos": 1593, "end_char_pos": 1593}, {"type": "R", "before": "General practitioners has dropped nine per cent", "after": "general practitioners in Australia has dropped 9\\%", "start_char_pos": 2004, "end_char_pos": 2051}, {"type": "A", "before": null, "after": ".", "start_char_pos": 2548, "end_char_pos": 2548}], "sents_char_pos": [0, 401, 516, 773, 936, 1102, 1569, 1711, 1966, 2116, 2313]}
+{"doc_id": "108658", "revision_depth": "2", "before_revision": "Former South African President Nelson Mandela South Africa's former president Nelson Mandela will turn 90 on July 18, but despite his retirement from the public eye five years ago, his age never prevented him from being pushed back into the limelight. Political, business and showbiz elite of the world arrived in London to greet South Africa's long imprisoned champion of anti-apartheid with a fund raising concert on Friday, June 27. British Prime Minister Gordon Brown, former United States President Bill Clinton, talk-show queen Oprah Winfrey, Academy Award winning actor Robert De Niro , former James Bond actor Pierce Brosnan were among the world's stars to join Mandela in the British capital. The proceed from the concert will go to Mandela's 46664 Foundation that looks after victims of the HIV in his beloved South Africa. Mandela was imprisoned by a then predominantly white government of South Africa for a total of 27 years until the abolition of apartheid in the country. Mandela said before members of media , though he maybe retiredbut he still works for his suffering people and he wanted to take advantage of his landmark birthday to raise funds for his charity work. Former South African President Nelson Mandela criticized Zimbabwe's President Robert Mugabe and labeled him as a \"tragic failure of leadership.\" Mandela expressed his sadness over the political and economic chaos that now rocks South Africa's biggest neighbor to its north west . The former anti-apartheid leader broke his silence while in London after hearing of accounts that opposition leader , Morgan Tsvangirai withdrew from the schedule next phase of the run-off presidential elections in Zimbabwe. Mandela's statement is expected to put pressure on his successor, President Thabo Mbeki to finally speak out against Mugabe.", "after_revision": "Former South African President Nelson Mandela South Africa's former president Nelson Mandela will turn 90 on July 18, but despite his retirement from the public eye five years ago, his age has never prevented him from being pushed back into the limelight. Political, business and showbiz elite from around the world arrived in London to greet South Africa's long-imprisoned champion of anti-apartheid with a fund-raising concert on Friday, June 27. British Prime Minister Gordon Brown, former United States President Bill Clinton, talk-show queen Oprah Winfrey, Academy Award winning actor Robert De Niro and former James Bond actor Pierce Brosnan were among the stars joining Mandela in the British capital. The proceeds from the concert will go to Mandela's 46664 Foundation that looks after people suffering from HIV in his beloved South Africa. Mandela was imprisoned for a total of 27 years by a then predominantly white South African government until the abolition of apartheid in the country. Mandela said before members of media that , though he may be retired, he still works for his suffering people and he wants to take advantage of his landmark birthday to raise funds for his charity work. Former South African President Nelson Mandela criticized Zimbabwe's President Robert Mugabe , labeling him a \"tragic failure of leadership.\" Mandela expressed his sadness over the political and economic chaos that now rocks South Africa's biggest neighbor , to its north-west . The former anti-apartheid leader broke his silence while in London after hearing of accounts that opposition leader Morgan Tsvangirai withdrew from the scheduled next phase of the run-off presidential elections in Zimbabwe. Mandela's statement is expected to put pressure on his successor, President Thabo Mbeki , to finally speak out against Mugabe.", "edit_actions": [{"type": "A", "before": null, "after": "has", "start_char_pos": 189, "end_char_pos": 189}, {"type": "R", "before": "of", "after": "from around", "start_char_pos": 291, "end_char_pos": 293}, {"type": "R", "before": "long imprisoned", "after": "long-imprisoned", "start_char_pos": 346, "end_char_pos": 361}, {"type": "R", "before": "fund raising", "after": "fund-raising", "start_char_pos": 396, "end_char_pos": 408}, {"type": "R", "before": ",", "after": "and", "start_char_pos": 593, "end_char_pos": 594}, {"type": "R", "before": "world's stars to join", "after": "stars joining", "start_char_pos": 649, "end_char_pos": 670}, {"type": "R", "before": "proceed", "after": "proceeds", "start_char_pos": 707, "end_char_pos": 714}, {"type": "R", "before": "victims of the", "after": "people suffering from", "start_char_pos": 787, "end_char_pos": 801}, {"type": "D", "before": "by a then predominantly white government of South Africa", "after": null, "start_char_pos": 858, "end_char_pos": 914}, {"type": "A", "before": null, "after": "by a then predominantly white South African government", "start_char_pos": 939, "end_char_pos": 939}, {"type": "A", "before": null, "after": "that", "start_char_pos": 1026, "end_char_pos": 1026}, {"type": "R", "before": "maybe retiredbut", "after": "may be retired,", "start_char_pos": 1039, "end_char_pos": 1055}, {"type": "R", "before": "wanted", "after": "wants", "start_char_pos": 1103, "end_char_pos": 1109}, {"type": "R", "before": "and labeled him as", "after": ", labeling him", "start_char_pos": 1282, "end_char_pos": 1300}, {"type": "R", "before": "to its north west", "after": ", to its north-west", "start_char_pos": 1450, "end_char_pos": 1467}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1586, "end_char_pos": 1587}, {"type": "R", "before": "schedule", "after": "scheduled", "start_char_pos": 1624, "end_char_pos": 1632}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1783, "end_char_pos": 1783}], "sents_char_pos": [0, 252, 436, 702, 834, 988, 1189, 1469, 1694]}
+{"doc_id": "10896", "revision_depth": "1", "before_revision": "Should Wikinews add this technical solution? - Amgine / talk 05:40, 4 May 2005 (UTC) When a user selects 'compare versions' on the history page, the resulting diff page should show at the top the comment field(s) associated with the page diff. This will be very helpful, particularly it means one can give a url to a diff and have the readers see all the associated comments from the changes in the diff, very useful. - Simeon 09:36, 14 May 2005 (UTC) What do you mean with comment? The Summury entered with that editing? This is show AnyFile 20:31, 14 May 2005 (UTC) If the summary: is what he is talking about, I think this a great idea. You may consider posting this to MediaZilla at URL --Cspurrier 20:40, 14 May 2005 (UTC) The edit summary of the first and last pages in the diff are already shown. So, I'm not sure what is being asked here. - Amgine / talk 23:12, 14 May 2005 (UTC) I guess they are, I never noticed it before, thanks. From rereading what he asked for it sounds like he wants the talk page to be displayed. --Cspurrier 23:23, 14 May 2005 (UTC) Please put this in the head portion of the xhtml... For this feature seen in Firefox. Thanks! Ross Uber 00:12, 17 May 2005 (UTC) I have been unable to find a method to do this in Mediawiki without hacking the software, which I do not have access to do. There are a couple Mediawiki feature requests which may be related to this, especially Bug 522, so this may be added to the system at some point. - Amgine / talk 16:44, 18 May 2005 (UTC) For me, I really like all of the layouts. I particularly like the idea of reducing the daily news to 1 or 2 days, and bringing back topical sections. Here are a couple my nit-picky comments, minor things you might consider implementing: As shown with the current lead article, many images use a white background instead of transparent background, and they consequently show very poorly against a colored back ground. For the lead article boxes, perhaps it would be better to have only slightly off-white background. As a resolution for the multiple latest days, a small menu to the last three days archives might be used? I'll see if I have time to put together a 2.5 column layout, with a different approach to some of items you have in the right column. And thanks again for pushing forward with main page layouts! - Amgine / talk 00:40, 9 May 2005 (UTC) You should add this to the design contest I'd like to add that Sandbox two doesn't use DPl for the latest news left hand column, but instead uses the {{LatestNews}} currently used in the Main Page. DPL might be perfected in the future (I've heared of plans to use publish date in stead of latest edit date), but the page doesn't rely on it completely. As for the other commoents: thanks for the input, I'll try and work it in as best I can. -- Redge (Talk) 18:00, 9 May 2005 (UTC) I've added in some links at the top and brought the color back to more white. Any other comments? -- Redge (Talk) 08:51, 13 May 2005 (UTC) I like the changes you made a lot --Cspurrier 23:31, 13 May 2005 (UTC) I realise this is more suited for Talk:Main Page, but the discussion seems to die down there on a periodic basis, so I'll move it here untill it's resolved. I still think the new layout is ready to be used as Main Page. -- Redge (Talk) 16:56, 23 May 2005 (UTC) I like the colours and the boldness but think there's far too many categories & headlines - prefer the style where categories or places are in a box and you follow them if you want to. The frontpage should be for the top/breaking news stories, this looks too much like an automated news sorting service. Isn't it also likely to get rather repetitive? ClareWhite 14:14, 2 Jun 2005 (UTC) It may be kind of repetitive, but it also complete. It gives al kind of readers the news they want on a single page, encourages them to find out more. I've wound it down a bit by bringing the DPL count back to 3. -- Redge (Talk) 15:18, 2 Jun 2005 (UTC) Completeness is all good but not for the front page. It's overwhelming. The front page should be the shop window that makes people want to explore more. Stories should be ranked by the interest people show in them and when the contributions get too big to display everything there will need to be some creative ideas about ranking them. I think the rest of the design is great, but I just think it's too much like a portal rather than a living news beast :) ClareWhite 09:27, 3 Jun 2005 (UTC) Not too fond of the yellow boxes. Anyway, in the U.S. \"yellow\" and journalism have bad commmonations. See: yellow journalism. -- Davodd | Talk 21:47, 24 Jun 2005 (UTC) In the meantime, having looked over the automated article listing program it appears to me to not actually reduce the amount of workload (the same number of edits need to be done, although to fewer pages), while at the same time complexifying the system - making it significantly more difficult for people who do not wish to use the new system. - Amgine / talk 21:21, 23 Jun 2005 (UTC) MediaWiki upgrade Well, we're running on MediaWiki 1.5 beta 1, and the DPL still works. That's a good thing :-) -- IlyaHaykinson 26 June 2005 17:50 (UTC) What kind of cool new features does 1.5 bring to the average editor? --Chiacomo (talk) 26 June 2005 18:37 (UTC) I cannot say the same thing at the Spanish-language Wikinews. Juli\u00e1n Ortega 26 June 2005 19:33 (UTC) What does not work on es.wikinews? Ilya: w00t! great job! The RSS feed / died with the upgrade. - Amgine / talk 26 June 2005 19:57 (UTC) Whats with the print tab? I thought printing already worked with stylesheets. The show changes button when editing looks cool. thats about all I noticed so far. oh, and image pages look more organized which is good. Bawolff 26 June 2005 20:54 (UTC) Yeah, the print tab just makes it explicit. A lot of people didn't realise it went to a 'printable' page upon printing straight from the page. Perhaps in the future you could make it possible to let DPL generate a list with dates, formatted for instance like this: June 30: Wikipedia founder Jimmy Wales announces cooperation between KDE Group and Wikimedia April 26: Wikipedia founder speaks at US law school May 10: Craigslist founder ponders open journalism -- Redge (Talk) 30 June 2005 11:46 (UTC) Possibility for DPLs on Main Page As IlyaHaykinson points out above, the issues the community was concerned about with DPLs has been fixed with MediaWiki 1.5. Now, Sorting by category addition is available, as well as an option to not display an error message if no articles fit the description. Because of this, there is no need to maintain the system any more than is currently done when we add a new day to the top of Latest news. I would like to hear what the community has to say about this before implementing it. The system can be previewed at Main Page/Temp. -- NGerda June 27, 2005 21:28 (UTC) So will the last edited article still be at the top of the list? --Chiacomo (talk) 27 June 2005 21:34 (UTC) Nope. They are listed by category addition :) NGerda June 27, 2005 21:43 (UTC) A demonstration in your user space, perhaps, is in order -- the coolness factor may be overwhelming. --Chiacomo (talk) 27 June 2005 21:45 (UTC) I'm an idiot and didn't read all of NGerda's comments in the original message above.. --Chiacomo (talk) 27 June 2005 21:50 (UTC) The upgrade to DPL by Ilya actually allows the list to be sorted a couple of different ways. Check out the documentation at DynamicPageList on meta. Amgine / talk NGerda: There are many other issues involved in modifying the main page to use DPL, as has been a running discussion on Talk:Main Page since the inception of Wikinews. I believe the current state of the discussions is to add back some level of the topic-based main page with the latest news (but reduced in length) at the top of the page. That said, there are still considerations for ease of integration to be made. - Amgine / talk 27 June 2005 21:45 (UTC) There are two primary reasons I oppose the automation process under the current proposal: There is no way to create the initial article link using an automated process. Although it is possible to use the \"manual entry\" nested template, this creates two lists, and (assuming the process is integrated, and each file then gets the correct category applied) the resulting article will be listed in both. Which then requires going back and editing the manual list so the automated list will work by itself... In short, exactly the same number of edits as the current system. Plus the additional level of complexity. And the need for extra watchfulness to make sure newbies are following the process. And offending people who prefer to work manually. To accomodate manual entry there will be two lists. Because there must be a way to manually enter initial links, there will always be two lists. Two places for articles to be found. Multiple ways to initiate errors. A top list and a lower list. New potential vandalism exploits. More-deeply nested templates, where subtle vandalism will be more difficult to detect or revert. These are not my only objections to the proposed system, but I do not see how these can be overcome. - Amgine / talk 28 June 2005 06:52 (UTC) I think that Developing Stories etc should continue to be manual, but that the listing of published stories should be converted to automatic. The only time we edit those pages is when we publish stories. It'd be easier to do that via the publish template inclusion only. -- IlyaHaykinson 28 June 2005 06:56 (UTC) On this we are in complete agreement. - Amgine / talk 28 June 2005 07:00 (UTC) Ok. So let's change the Wikinews:YYYY/Month/DD pages to have the DPL, as NGerda has been using them, and then talk about automating other parts after the dust settles? -- IlyaHaykinson 28 June 2005 07:04 (UTC) As I have explained to you in other venues, it is my opinion that there should be no requirement to use this system in order for an article to be listed on the developing stories template on the main page. Furthermore, it is an unnecessary additional step which does not actually save any edits. Whether the initial link is created on the story upload system or on the developing stories template makes absolutely no difference to the amount of actual work involved in creating an article, and eventually removing it's initial link. Furthermore, this system will result in articles which are not linked anywhere on the site, relying on their membership in categories to get them listed anywhere. If those categories were removed from the articles (by, as an example, a vandal) they would all become instantly orphaned. It can also be used to mess with the category-added date, in ways I'm sure you can figure out (especially consider the vulnerability the published template will engender.) Consistency is the hobgoblin of little minds... or some such famous phrasing. Inclusivity is one of the standards of Wiki. - Amgine / talk 29 June 2005 00:03 (UTC) Until there is some consensus on this proposal, could we avoid changing the template to avoid edit/revert wars? - Amgine / talk 29 June 2005 00:28 (UTC) I would prefer not running both systems in parallel, as you describe it, for the simple reason that the main page will regularly carry duplicate links to articles in the Developing stories template. If an article is created using the DS, and the author then adds the developing template, it will be listed twice. But I'm not interested in edit warring about it at this moment. - Amgine / talk 29 June 2005 09:21 (UTC) I've discovered one minor drawback to using exclusively DPL for the daily archives: the mediawiki software flags all the articles as orphans since nothing links to the articles. There is a solution which can work around this - use the DPL in the latest news template, and someone volunteer to manually update to the archive page from the latest news template. This will create at least a single link to each article. - Amgine / talk 30 June 2005 17:53 (UTC) There are, undoubtedly, dozens of articles which are not categorized in the article namespace. I'm willing to clean up the backlog if this will resolve the issues we're currently facing. - Amgine / talk 30 June 2005 21:51 (UTC) Using the developing tag would still be possible, and might be used for contributors to specifically request attention by editors, but would not be required (or even necessary) for an article to be listed on the developing stories template. - Amgine / talk 30 June 2005 22:06 (UTC)", "after_revision": "Should Wikinews add this technical solution? - / 05:40, 4 May 2005 (UTC) When a user selects 'compare versions' on the history page, the resulting diff page should show at the top the comment field(s) associated with the page diff. This will be very helpful, particularly it means one can give a url to a diff and have the readers see all the associated comments from the changes in the diff, very useful. - Simeon 09:36, 14 May 2005 (UTC) What do you mean with comment? The Summury entered with that editing? This is show AnyFile 20:31, 14 May 2005 (UTC) If the summary: is what he is talking about, I think this a great idea. You may consider posting this to MediaZilla at URL --Cspurrier 20:40, 14 May 2005 (UTC) The edit summary of the first and last pages in the diff are already shown. So, I'm not sure what is being asked here. - / 23:12, 14 May 2005 (UTC) I guess they are, I never noticed it before, thanks. From rereading what he asked for it sounds like he wants the talk page to be displayed. --Cspurrier 23:23, 14 May 2005 (UTC) Please put this in the head portion of the xhtml... For this feature seen in Firefox. Thanks! Ross Uber 00:12, 17 May 2005 (UTC) I have been unable to find a method to do this in Mediawiki without hacking the software, which I do not have access to do. There are a couple Mediawiki feature requests which may be related to this, especially Bug 522, so this may be added to the system at some point. - / 16:44, 18 May 2005 (UTC) For me, I really like all of the layouts. I particularly like the idea of reducing the daily news to 1 or 2 days, and bringing back topical sections. Here are a couple my nit-picky comments, minor things you might consider implementing: As shown with the current lead article, many images use a white background instead of transparent background, and they consequently show very poorly against a colored back ground. For the lead article boxes, perhaps it would be better to have only slightly off-white background. As a resolution for the multiple latest days, a small menu to the last three days archives might be used? I'll see if I have time to put together a 2.5 column layout, with a different approach to some of items you have in the right column. And thanks again for pushing forward with main page layouts! - / 00:40, 9 May 2005 (UTC) You should add this to the design contest I'd like to add that Sandbox two doesn't use DPl for the latest news left hand column, but instead uses the {{LatestNews}} currently used in the Main Page. DPL might be perfected in the future (I've heared of plans to use publish date in stead of latest edit date), but the page doesn't rely on it completely. As for the other commoents: thanks for the input, I'll try and work it in as best I can. -- Redge (Talk) 18:00, 9 May 2005 (UTC) I've added in some links at the top and brought the color back to more white. Any other comments? -- Redge (Talk) 08:51, 13 May 2005 (UTC) I like the changes you made a lot --Cspurrier 23:31, 13 May 2005 (UTC) I realise this is more suited for Talk:Main Page, but the discussion seems to die down there on a periodic basis, so I'll move it here untill it's resolved. I still think the new layout is ready to be used as Main Page. -- Redge (Talk) 16:56, 23 May 2005 (UTC) I like the colours and the boldness but think there's far too many categories & headlines - prefer the style where categories or places are in a box and you follow them if you want to. The frontpage should be for the top/breaking news stories, this looks too much like an automated news sorting service. Isn't it also likely to get rather repetitive? ClareWhite 14:14, 2 Jun 2005 (UTC) It may be kind of repetitive, but it also complete. It gives al kind of readers the news they want on a single page, encourages them to find out more. I've wound it down a bit by bringing the DPL count back to 3. -- Redge (Talk) 15:18, 2 Jun 2005 (UTC) Completeness is all good but not for the front page. It's overwhelming. The front page should be the shop window that makes people want to explore more. Stories should be ranked by the interest people show in them and when the contributions get too big to display everything there will need to be some creative ideas about ranking them. I think the rest of the design is great, but I just think it's too much like a portal rather than a living news beast :) ClareWhite 09:27, 3 Jun 2005 (UTC) Not too fond of the yellow boxes. Anyway, in the U.S. \"yellow\" and journalism have bad commmonations. See: yellow journalism. -- Davodd | Talk 21:47, 24 Jun 2005 (UTC) In the meantime, having looked over the automated article listing program it appears to me to not actually reduce the amount of workload (the same number of edits need to be done, although to fewer pages), while at the same time complexifying the system - making it significantly more difficult for people who do not wish to use the new system. - / 21:21, 23 Jun 2005 (UTC) MediaWiki upgrade Well, we're running on MediaWiki 1.5 beta 1, and the DPL still works. That's a good thing :-) -- IlyaHaykinson 26 June 2005 17:50 (UTC) What kind of cool new features does 1.5 bring to the average editor? --Chiacomo (talk) 26 June 2005 18:37 (UTC) I cannot say the same thing at the Spanish-language Wikinews. Juli\u00e1n Ortega 26 June 2005 19:33 (UTC) What does not work on es.wikinews? Ilya: w00t! great job! The RSS feed / died with the upgrade. - / 26 June 2005 19:57 (UTC) Whats with the print tab? I thought printing already worked with stylesheets. The show changes button when editing looks cool. thats about all I noticed so far. oh, and image pages look more organized which is good. Bawolff 26 June 2005 20:54 (UTC) Yeah, the print tab just makes it explicit. A lot of people didn't realise it went to a 'printable' page upon printing straight from the page. Perhaps in the future you could make it possible to let DPL generate a list with dates, formatted for instance like this: June 30: Wikipedia founder Jimmy Wales announces cooperation between KDE Group and Wikimedia April 26: Wikipedia founder speaks at US law school May 10: Craigslist founder ponders open journalism -- Redge (Talk) 30 June 2005 11:46 (UTC) Possibility for DPLs on Main Page As IlyaHaykinson points out above, the issues the community was concerned about with DPLs has been fixed with MediaWiki 1.5. Now, Sorting by category addition is available, as well as an option to not display an error message if no articles fit the description. Because of this, there is no need to maintain the system any more than is currently done when we add a new day to the top of Latest news. I would like to hear what the community has to say about this before implementing it. The system can be previewed at Main Page/Temp. -- NGerda June 27, 2005 21:28 (UTC) So will the last edited article still be at the top of the list? --Chiacomo (talk) 27 June 2005 21:34 (UTC) Nope. They are listed by category addition :) NGerda June 27, 2005 21:43 (UTC) A demonstration in your user space, perhaps, is in order -- the coolness factor may be overwhelming. --Chiacomo (talk) 27 June 2005 21:45 (UTC) I'm an idiot and didn't read all of NGerda's comments in the original message above.. --Chiacomo (talk) 27 June 2005 21:50 (UTC) The upgrade to DPL by Ilya actually allows the list to be sorted a couple of different ways. Check out the documentation at DynamicPageList on meta. / NGerda: There are many other issues involved in modifying the main page to use DPL, as has been a running discussion on Talk:Main Page since the inception of Wikinews. I believe the current state of the discussions is to add back some level of the topic-based main page with the latest news (but reduced in length) at the top of the page. That said, there are still considerations for ease of integration to be made. - / 27 June 2005 21:45 (UTC) There are two primary reasons I oppose the automation process under the current proposal: There is no way to create the initial article link using an automated process. Although it is possible to use the \"manual entry\" nested template, this creates two lists, and (assuming the process is integrated, and each file then gets the correct category applied) the resulting article will be listed in both. Which then requires going back and editing the manual list so the automated list will work by itself... In short, exactly the same number of edits as the current system. Plus the additional level of complexity. And the need for extra watchfulness to make sure newbies are following the process. And offending people who prefer to work manually. To accomodate manual entry there will be two lists. Because there must be a way to manually enter initial links, there will always be two lists. Two places for articles to be found. Multiple ways to initiate errors. A top list and a lower list. New potential vandalism exploits. More-deeply nested templates, where subtle vandalism will be more difficult to detect or revert. These are not my only objections to the proposed system, but I do not see how these can be overcome. - / 28 June 2005 06:52 (UTC) I think that Developing Stories etc should continue to be manual, but that the listing of published stories should be converted to automatic. The only time we edit those pages is when we publish stories. It'd be easier to do that via the publish template inclusion only. -- IlyaHaykinson 28 June 2005 06:56 (UTC) On this we are in complete agreement. - / 28 June 2005 07:00 (UTC) Ok. So let's change the Wikinews:YYYY/Month/DD pages to have the DPL, as NGerda has been using them, and then talk about automating other parts after the dust settles? -- IlyaHaykinson 28 June 2005 07:04 (UTC) As I have explained to you in other venues, it is my opinion that there should be no requirement to use this system in order for an article to be listed on the developing stories template on the main page. Furthermore, it is an unnecessary additional step which does not actually save any edits. Whether the initial link is created on the story upload system or on the developing stories template makes absolutely no difference to the amount of actual work involved in creating an article, and eventually removing it's initial link. Furthermore, this system will result in articles which are not linked anywhere on the site, relying on their membership in categories to get them listed anywhere. If those categories were removed from the articles (by, as an example, a vandal) they would all become instantly orphaned. It can also be used to mess with the category-added date, in ways I'm sure you can figure out (especially consider the vulnerability the published template will engender.) Consistency is the hobgoblin of little minds... or some such famous phrasing. Inclusivity is one of the standards of Wiki. - / 29 June 2005 00:03 (UTC) Until there is some consensus on this proposal, could we avoid changing the template to avoid edit/revert wars? - / 29 June 2005 00:28 (UTC) I would prefer not running both systems in parallel, as you describe it, for the simple reason that the main page will regularly carry duplicate links to articles in the Developing stories template. If an article is created using the DS, and the author then adds the developing template, it will be listed twice. But I'm not interested in edit warring about it at this moment. - / 29 June 2005 09:21 (UTC) I've discovered one minor drawback to using exclusively DPL for the daily archives: the mediawiki software flags all the articles as orphans since nothing links to the articles. There is a solution which can work around this - use the DPL in the latest news template, and someone volunteer to manually update to the archive page from the latest news template. This will create at least a single link to each article. - / 30 June 2005 17:53 (UTC) There are, undoubtedly, dozens of articles which are not categorized in the article namespace. I'm willing to clean up the backlog if this will resolve the issues we're currently facing. - / 30 June 2005 21:51 (UTC) Using the developing tag would still be possible, and might be used for contributors to specifically request attention by editors, but would not be required (or even necessary) for an article to be listed on the developing stories template. - / 30 June 2005 22:06 (UTC)", "edit_actions": [{"type": "D", "before": "Amgine", "after": null, "start_char_pos": 47, "end_char_pos": 53}, {"type": "D", "before": "talk", "after": null, "start_char_pos": 56, "end_char_pos": 60}, {"type": "D", "before": "Amgine", "after": null, "start_char_pos": 849, "end_char_pos": 855}, {"type": "D", "before": "talk", "after": null, "start_char_pos": 858, "end_char_pos": 862}, {"type": "D", "before": "Amgine", "after": null, "start_char_pos": 1535, "end_char_pos": 1541}, {"type": "D", "before": "talk", "after": null, "start_char_pos": 1544, "end_char_pos": 1548}, {"type": "D", "before": "Amgine", "after": null, "start_char_pos": 2393, "end_char_pos": 2399}, {"type": "D", "before": "talk", "after": null, "start_char_pos": 2402, "end_char_pos": 2406}, {"type": "D", "before": "Amgine", "after": null, "start_char_pos": 5030, "end_char_pos": 5036}, {"type": "D", "before": "talk", "after": null, "start_char_pos": 5039, "end_char_pos": 5043}, {"type": "D", "before": "Amgine", "after": null, "start_char_pos": 5544, "end_char_pos": 5550}, {"type": "D", "before": "talk", "after": null, "start_char_pos": 5553, "end_char_pos": 5557}, {"type": "D", "before": "Amgine", "after": null, "start_char_pos": 7546, "end_char_pos": 7552}, {"type": "D", "before": "talk", "after": null, "start_char_pos": 7555, "end_char_pos": 7559}, {"type": "D", "before": "Amgine", "after": null, "start_char_pos": 7979, "end_char_pos": 7985}, {"type": "D", "before": "talk", "after": null, "start_char_pos": 7988, "end_char_pos": 7992}, {"type": "D", "before": "Amgine", "after": null, "start_char_pos": 9243, "end_char_pos": 9249}, {"type": "D", "before": "talk", "after": null, "start_char_pos": 9252, "end_char_pos": 9256}, {"type": "D", "before": "Amgine", "after": null, "start_char_pos": 9635, "end_char_pos": 9641}, {"type": "D", "before": "talk", "after": null, "start_char_pos": 9644, "end_char_pos": 9648}, {"type": "D", "before": "Amgine", "after": null, "start_char_pos": 11000, "end_char_pos": 11006}, {"type": "D", "before": "talk", "after": null, "start_char_pos": 11009, "end_char_pos": 11013}, {"type": "D", "before": "Amgine", "after": null, "start_char_pos": 11153, "end_char_pos": 11159}, {"type": "D", "before": "talk", "after": null, "start_char_pos": 11162, "end_char_pos": 11166}, {"type": "D", "before": "Amgine", "after": null, "start_char_pos": 11571, "end_char_pos": 11577}, {"type": "D", "before": "talk", "after": null, "start_char_pos": 11580, "end_char_pos": 11584}, {"type": "D", "before": "Amgine", "after": null, "start_char_pos": 12029, "end_char_pos": 12035}, {"type": "D", "before": "talk", "after": null, "start_char_pos": 12038, "end_char_pos": 12042}, {"type": "D", "before": "Amgine", "after": null, "start_char_pos": 12257, "end_char_pos": 12263}, {"type": "D", "before": "talk", "after": null, "start_char_pos": 12266, "end_char_pos": 12270}, {"type": "D", "before": "Amgine", "after": null, "start_char_pos": 12539, "end_char_pos": 12545}, {"type": "D", "before": "talk", "after": null, "start_char_pos": 12548, "end_char_pos": 12552}], "sents_char_pos": [0, 243, 482, 521, 639, 803, 940, 1185, 1219, 1386, 1615, 1723, 1990, 2089, 2195, 2329, 2628, 2782, 2989, 3278, 3567, 3686, 3733, 3820, 3919, 4074, 4093, 4174, 4358, 4548, 4616, 4642, 4938, 5156, 5396, 5470, 5493, 5608, 5660, 5798, 5875, 5974, 6294, 6629, 6767, 6853, 7050, 7489, 7545, 7727, 7898, 8186, 8418, 8522, 8588, 8629, 8713, 8763, 8815, 8908, 8945, 8979, 9008, 9042, 9139, 9423, 9485, 9554, 9634, 10089, 10179, 10416, 10579, 10702, 10952, 11390, 11504, 11787, 11969, 12162]}
+{"doc_id": "10953", "revision_depth": "3", "before_revision": "Monday, 18 July 2005 Possible quite cold, icy conditions Tuesday night to Wednesday morning . Forecast Summary A high situated over south western NSW is pushing artic cold fronts south of the Australian continent. This is typically a summer weather system, and is unusual for the high to dominate so far south this far into the southern winter. It does mean that an east-coast low can develop , and feed tropical moisture into the system, however at this stage it appears that precipitaion later in the week will fall as rain, rather than snow . Daily Forecasts Tuesday 19 , July 2005 Image: Weather-Sunny.pngClear day, and cold night . Min: -7 \u00b0C Max: 0\u00b0C Precipitation : None . Wednesday 20 , July 2005 Image: Weather-Sunny.pngCold night, with temperatures rising above freezing after midday . Min: -5 \u00b0C Max: 3 \u00b0C Precipitation : None. Thursday 21 , July 2005 Image:Weather-Sunny. pngCool night, the daywill see temperatures start to reach 10\u00b0C, with considerable snow melt begining . Min: -3 \u00b0C Max: 8 \u00b0C Precipitation : None. Friday 22 , July 2005 Image: Weather-Rain-Snow-Sunny-Periods. pngPossible snow arriving about the peaks late Friday afternoon. Rain below 1800m Min: -1 \u00b0C Max: 8 \u00b0C Precipitation : Dusting above 1800m (2cm) , rain below (2mm) ( 20\\%) Saturday 23 , July 2005 Image: Weather-Rain-Snow-Sunny-Periods.pngPossible morning snow about the peaks. Rain below 1800m. Min: -1 \u00b0C Max: 9 \u00b0C Precipitation : Dusting above 1800m (2cm), rain below (2mm) (30\\%) Mostly warmer conditions, with rain developing next week, except above 1800m (July 24-29) Next snowfall, July 29-31, expecting 30cm.%DIFDELCMD < %DIFDELCMD < %%% Mid-August is looking likely for about 20-30cm from the 10th.", "after_revision": "Monday, 25 July 2005 Icy conditions Thursday and Friday . Forecast Summary A series of weak cold fronts will cross the alpine areas over the next week, as the dominating hig moves out into the pacific. There is however, a lack of moisture, so snowfall will be minimal. A cold pool will develop over central NSW on Thursday, brining icy conditions, but only minimal snowfall. The big excitment is a strong, antartic low appearing south west of Australia at 55'S 90E. This low may run up into the Australian mainland, brining acrtic conditions to the alpine areas . Daily Forecasts Tuesday 26 , July 2005 Image: Weather-Snow-Sunny-Periods.pngLight snowshowers above 1600m . Min: -8 \u00b0C Max: 0\u00b0C Precipitation : Snowshowers 4cm (80\\%) . Wednesday 27 , July 2005 Image: Weather-Mostly-Sunny.pngClearing to a fine day . Min: -7 \u00b0C Max: 2 \u00b0C Precipitation : None. Thursday 28 , July 2005 Image:Weather-Sunny. pngCold day, icy conditions, fine day . Min: -5 \u00b0C Max: 0 \u00b0C Precipitation : None. Friday 29 , July 2005 Image: Weather-Fog-Haze.pngImage: Weather-Rain-Snow-Sunny-Periods. pngCold day, early fog, possible late snow above 1600m. Min: -7 \u00b0C Max: -1 \u00b0C Precipitation : Light snowfall (2cm) ( 20\\%) Saturday 30 , July 2005 Image: Weather-Sunny.pngFine day. Min: -5 \u00b0C Max: 3 \u00b0C Precipitation : None. %DIFDELCMD < %DIFDELCMD < %%% August is looking likely for about 20-30cm from the 10th.", "edit_actions": [{"type": "R", "before": "18", "after": "25", "start_char_pos": 8, "end_char_pos": 10}, {"type": "R", "before": "Possible quite cold, icy conditions Tuesday night to Wednesday morning", "after": "Icy conditions Thursday and Friday", "start_char_pos": 21, "end_char_pos": 91}, {"type": "R", "before": "high situated over south western NSW is pushing artic cold fronts south of the Australian continent. This is typically a summer weather system, and is unusual for the high to dominate so far south this far into the southern winter. It does mean that an east-coast low can develop , and feed tropical moisture into the system, however at this stage it appears that precipitaion later in the week will fall as rain, rather than snow", "after": "series of weak cold fronts will cross the alpine areas over the next week, as the dominating hig moves out into the pacific. There is however, a lack of moisture, so snowfall will be minimal. A cold pool will develop over central NSW on Thursday, brining icy conditions, but only minimal snowfall. The big excitment is a strong, antartic low appearing south west of Australia at 55'S 90E. This low may run up into the Australian mainland, brining acrtic conditions to the alpine areas", "start_char_pos": 113, "end_char_pos": 543}, {"type": "R", "before": "19", "after": "26", "start_char_pos": 570, "end_char_pos": 572}, {"type": "R", "before": "Weather-Sunny.pngClear day, and cold night", "after": "Weather-Snow-Sunny-Periods.pngLight snowshowers above 1600m", "start_char_pos": 592, "end_char_pos": 634}, {"type": "R", "before": "-7", "after": "-8", "start_char_pos": 642, "end_char_pos": 644}, {"type": "R", "before": "None", "after": "Snowshowers 4cm (80\\%)", "start_char_pos": 673, "end_char_pos": 677}, {"type": "R", "before": "20", "after": "27", "start_char_pos": 690, "end_char_pos": 692}, {"type": "R", "before": "Weather-Sunny.pngCold night, with temperatures rising above freezing after midday", "after": "Weather-Mostly-Sunny.pngClearing to a fine day", "start_char_pos": 712, "end_char_pos": 793}, {"type": "R", "before": "-5", "after": "-7", "start_char_pos": 801, "end_char_pos": 803}, {"type": "R", "before": "3", "after": "2", "start_char_pos": 812, "end_char_pos": 813}, {"type": "R", "before": "21", "after": "28", "start_char_pos": 848, "end_char_pos": 850}, {"type": "R", "before": "pngCool night, the daywill see temperatures start to reach 10\u00b0C, with considerable snow melt begining", "after": "pngCold day, icy conditions, fine day", "start_char_pos": 884, "end_char_pos": 985}, {"type": "R", "before": "-3", "after": "-5", "start_char_pos": 993, "end_char_pos": 995}, {"type": "R", "before": "8", "after": "0", "start_char_pos": 1004, "end_char_pos": 1005}, {"type": "R", "before": "22", "after": "29", "start_char_pos": 1038, "end_char_pos": 1040}, {"type": "A", "before": null, "after": "Weather-Fog-Haze.pngImage:", "start_char_pos": 1060, "end_char_pos": 1060}, {"type": "R", "before": "pngPossible snow arriving about the peaks late Friday afternoon. Rain below 1800m Min: -1", "after": "pngCold day, early fog, possible late snow above 1600m. Min: -7", "start_char_pos": 1094, "end_char_pos": 1183}, {"type": "R", "before": "8", "after": "-1", "start_char_pos": 1192, "end_char_pos": 1193}, {"type": "R", "before": "Dusting above 1800m", "after": "Light snowfall", "start_char_pos": 1213, "end_char_pos": 1232}, {"type": "R", "before": ", rain below (2mm) (", "after": "(", "start_char_pos": 1239, "end_char_pos": 1259}, {"type": "R", "before": "23", "after": "30", "start_char_pos": 1275, "end_char_pos": 1277}, {"type": "R", "before": "Weather-Rain-Snow-Sunny-Periods.pngPossible morning snow about the peaks. Rain below 1800m. Min: -1", "after": "Weather-Sunny.pngFine day. Min: -5", "start_char_pos": 1297, "end_char_pos": 1396}, {"type": "R", "before": "9", "after": "3", "start_char_pos": 1405, "end_char_pos": 1406}, {"type": "R", "before": "Dusting above 1800m (2cm), rain below (2mm) (30\\%)", "after": "None.", "start_char_pos": 1426, "end_char_pos": 1476}, {"type": "D", "before": "Mostly warmer conditions, with rain developing next week, except above 1800m (July 24-29)", "after": null, "start_char_pos": 1477, "end_char_pos": 1566}, {"type": "D", "before": "Next snowfall, July 29-31, expecting 30cm.", "after": null, "start_char_pos": 1567, "end_char_pos": 1609}, {"type": "R", "before": "Mid-August", "after": "August", "start_char_pos": 1639, "end_char_pos": 1649}], "sents_char_pos": [0, 93, 213, 344, 636, 679, 795, 838, 987, 1030, 1158, 1370, 1388, 1609]}
+{"doc_id": "110378", "revision_depth": "2", "before_revision": "One out of every four United States bridges need repair and updating according to the American Association of State Highway and Transportation Officials (AASHTO). The estimated cost of repair is US$140 billion, and will continue to rise if not dealt with immediately, according to the report published by the AASHTO. A picture of the collapsing I-35W bridge back in 2007. The necessity for bridge repairs has been just one of the infrastructure needs for which federal assistance has been requested by some state officials. Governor Ed Rendell of Pennsylvania said that \"we need federal intervention, and federal intervention at a big level.\" Additionally, Rendell stated that \"no matter how hard a state applies its efforts and its resources to this problem, it's never going to make enough of a dent without significantly and radically increased federal help.\" \"States are doing their best to improve them, but construction costs are skyrocketing ... forcing states to delay needed repairs,\" said Pete K. Rahn, head of the Missouri Department of Transportation and AASHTO president to Associated Press. \"Without a national commitment to increasing bridge investment, we will see a continuing spiral towards deterioration and, ultimately, bridge closures in order to protect the traveling public , \" Rahn added. The report created by the AASHTO titled \"Bridging the Gap: Restoring and Rebuilding the Nation's Bridges\" stated that nearly every one in five bridges is 50 years old or older, and that of the 600,000 U.S. bridges that nearly 152,000 , or one in four , need significant repair. \"Almost one in four bridges, while safe to travel, is either structurally deficient, in need of repair , \" according to the report , which also says that the average age of American bridges is 43 years. The report was released just days prior to the one-year anniversary of the August 1, 2007 I-35W bridge collapse, which resulted in the death of thirteen people.", "after_revision": "One out of every four United States bridges needs repairs and updating according to the American Association of State Highway and Transportation Officials (AASHTO). The total estimated cost of repairs is US$140 billion, and will continue to rise if not dealt with immediately, according to the report published by AASHTO. A picture of the collapsing I-35W bridge back in 2007. The necessity for bridge repairs has been just one of the infrastructure needs for which federal assistance has been requested by some state officials. Governor Ed Rendell of Pennsylvania said that , \"we need federal intervention, and federal intervention at a big level.\" Additionally, Rendell stated that , \"no matter how hard a state applies its efforts and its resources to this problem, it's never going to make enough of a dent without significantly and radically increased federal help.\" \"States are doing their best to improve them, but construction costs are skyrocketing ... forcing states to delay needed repairs,\" said Pete K. Rahn, head of the Missouri Department of Transportation and AASHTO president to Associated Press. \"Without a national commitment to increasing bridge investment, we will see a continuing spiral towards deterioration and, ultimately, bridge closures in order to protect the traveling public . \" AASHTO's report, titled \"Bridging the Gap: Restoring and Rebuilding the Nation's Bridges\" , stated that nearly every one in five bridges is 50-years-old or older. Furthermore, of the 600,000 U.S. bridges , nearly 152,000 (about one in four ) need significant repair. \"Almost one in four bridges, while safe to travel, is either structurally deficient, in need of repair . \" The report notes that the average age of American bridges is 43 years. The report was released just days prior to the one-year anniversary of the August 1, 2007 I-35W bridge collapse, which resulted in the death of 13 people.", "edit_actions": [{"type": "R", "before": "need repair", "after": "needs repairs", "start_char_pos": 44, "end_char_pos": 55}, {"type": "A", "before": null, "after": "total", "start_char_pos": 167, "end_char_pos": 167}, {"type": "R", "before": "repair", "after": "repairs", "start_char_pos": 186, "end_char_pos": 192}, {"type": "D", "before": "the", "after": null, "start_char_pos": 306, "end_char_pos": 309}, {"type": "A", "before": null, "after": ",", "start_char_pos": 571, "end_char_pos": 571}, {"type": "A", "before": null, "after": ",", "start_char_pos": 679, "end_char_pos": 679}, {"type": "R", "before": ",", "after": ".", "start_char_pos": 1300, "end_char_pos": 1301}, {"type": "D", "before": "Rahn added.", "after": null, "start_char_pos": 1304, "end_char_pos": 1315}, {"type": "R", "before": "The report created by the AASHTO", "after": "AASHTO's report,", "start_char_pos": 1316, "end_char_pos": 1348}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1422, "end_char_pos": 1422}, {"type": "R", "before": "50 years old or older, and that", "after": "50-years-old or older. Furthermore,", "start_char_pos": 1471, "end_char_pos": 1502}, {"type": "R", "before": "that", "after": ",", "start_char_pos": 1531, "end_char_pos": 1535}, {"type": "R", "before": ", or", "after": "(about", "start_char_pos": 1551, "end_char_pos": 1555}, {"type": "R", "before": ",", "after": ")", "start_char_pos": 1568, "end_char_pos": 1569}, {"type": "R", "before": ",", "after": ".", "start_char_pos": 1698, "end_char_pos": 1699}, {"type": "R", "before": "according to the report , which also says", "after": "The report notes", "start_char_pos": 1702, "end_char_pos": 1743}, {"type": "R", "before": "thirteen", "after": "13", "start_char_pos": 1942, "end_char_pos": 1950}], "sents_char_pos": [0, 162, 317, 372, 524, 644, 1107, 1315, 1594, 1797]}
+{"doc_id": "11106", "revision_depth": "1", "before_revision": "The cover of the Qur'an After an investigation of allegations that Islam's holy book the Qu'ran was mishandled in front of inmates at Guantanamo Bay, Cuba, the Bush administration has acknowledged the credibility of some of these reports. According to Robert Burns of the Associated Press, U.S. military officials acknowledged that, \"a Muslim holy book was splashed with urine,\" and \"a detainee's Quran was deliberately kicked and another's was stepped on.\" The US government first denied a specific report that the Qu'ran had been flushed down a toilet at the prison facility, but on Friday agreed that similar allegations were indeed true. On May 16, Newsweek magazine apologized to the victims of deadly riots that ensued due to a Newsweek article stating that U.S. officials defiled the Qur'an. White House Press Secretary Scott McClellan criticized Newsweek's initial response to the incident, saying it was \"puzzling.\" Later that day, Newsweek retracted the story, which the White House said was a \"good first step\". On May 20, the International Red Cross (IRC) revealed in a rare public announcement that it had documented and reported to the United States credible information concerning desecration of the Qur'an by Guantanamo Bay personnel. Pentagon spokesman Bryan Whitman, acknowledged that allegations were made on \"rare occasions\" but were uncorroborated. Simon Schorno, a Red Cross spokesman, disputed the Pentagon 's denial saying, \"All information we received were corroborated allegations.\" He added that, \"We certainly corroborated mentions of the events by detainees themselves,\" and that \"the ICRC considers such reports \"very seriously, and very carefully, and [we] document everything.\" On May 25, Amnesty International called for the shutdown on Guantanamo Bay due to numerous human rights violations, saying \"The 'war on terror' appeared more effective in eroding international human rights principles than in countering international 'terrorism'.\" Amnesty International's view was shared by both the International Red Cross (IRC) and the American Civil Liberties Union (ACLU). The IRC has said it reported to the U.S. government detainee's reports of desecration of the Qur'an. In the foreword of the report, written by Amnesty International Secretary General Irene Khan , Guantanamo was compared to a Soviet-era gulag in that it is \"entrenching the practice of arbitrary and indefinite detention in violation of international law\". White House spokesman Scott McClellan responded saying the report's allegations were \"ridiculous and unsupported by the facts. The United States is leading the way when it comes to protecting human rights and promoting human dignity . We have liberated 50 million people in Iraq and Afghanistan. We have worked to advance freedom and democracy in the world so that people are governed under a rule of law and that there are... protections in place for minority rights, that women's rights are advanced so that women can fully participate in societies where now they cannot\", as well as supporting the fight against AIDS in Africa. And, on Friday, the U.S. military released the results of their investigation and confirmed that in 5 separate incidents, American guards at the Guant\u00e1namo Bay prison \"mishandled\" the Islamic holy book. However, they stress that guards were usually \"respectful\" of the Qur'an. One incident involved splashing a Koran with urine by urinating near an air vent while others involved kicking, stepping on and writing in Qur'ans. Brigadier-General Jay Hood , the commander of the jail, looked into the allegations, published and then retracted by Newsweek, that American personnel flushed a Qur'an down a toilet. He said that the inquiry did not find any evidence supporting this particular allegation. \"The inquiry found no credible evidence that a member of the Joint Task Force at Guantanamo Bay ever flushed a Qur'an down a toilet. This matter is considered closed.\"", "after_revision": "The cover of the Qur'an After an investigation of allegations that Islam's the was mishandled in front of at Guantanamo Bay, Cuba, the has acknowledged the credibility of some of these reports. According to Robert Burns of the Associated Press, U.S. military officials acknowledged that, \"a Muslim holy book was splashed with urine,\" and \"a detainee's Quran was deliberately kicked and another's was stepped on.\" The US government first denied a specific report that the Qu'ran had been flushed down a toilet at the prison facility, but on Friday agreed that similar allegations were indeed true. On May 16, magazine apologized to the victims of deadly riots that ensued due to a Newsweek article stating that U.S. officials defiled the Qur'an. criticized Newsweek's initial response to the incident, saying it was \"puzzling.\" Later that day, Newsweek retracted the story, which the White House said was a \"good first step\". On May 20, the International Red Cross (IRC) revealed in a rare public announcement that it had documented and reported to the United States credible information concerning desecration of the Qur'an by Guantanamo Bay personnel. Pentagon spokesman Bryan Whitman, acknowledged that allegations were made on \"rare occasions\" but were uncorroborated. Simon Schorno, a Red Cross spokesman, disputed the 's denial saying, \"All information we received were corroborated allegations.\" He added that, \"We certainly corroborated mentions of the events by detainees themselves,\" and that \"the ICRC considers such reports \"very seriously, and very carefully, and [we] document everything.\" On May 25, Amnesty International called for the shutdown on Guantanamo Bay due to numerous human rights violations, saying \"The 'war on terror' appeared more effective in eroding international human rights principles than in countering international 'terrorism'.\" Amnesty International's view was shared by both the International Red Cross (IRC) and the American Civil Liberties Union (ACLU). The IRC has said it reported to the U.S. government detainee's reports of desecration of the Qur'an. In the foreword of the report, written by Amnesty International Secretary General , Guantanamo was compared to a Soviet-era gulag in that it is \"entrenching the practice of arbitrary and indefinite detention in violation of international law\". White House spokesman Scott McClellan responded saying the report's allegations were \"ridiculous and unsupported by the facts. The United States is leading the way when it comes to protecting human rights and promoting . We have 50 million people in Iraq and Afghanistan. We have worked to advance and in the world so that people are governed under a rule of law and that there are... protections in place for , that are advanced so that women can fully participate in societies where now they cannot\", as well as supporting the fight against AIDS in Africa. And, on Friday, the released the results of their investigation and confirmed that in 5 separate incidents, American guards at the Guant\u00e1namo Bay prison \"mishandled\" the Islamic holy book. However, they stress that guards were usually \"respectful\" of the Qur'an. One incident involved splashing a Koran with urine by urinating near an air vent while others involved kicking, stepping on and writing in Qur'ans. , the commander of the jail, looked into the allegations, published and then retracted by Newsweek, that American personnel flushed a Qur'an down a toilet. He said that the inquiry did not find any evidence supporting this particular allegation. \"The inquiry found no credible evidence that a member of the Joint Task Force at Guantanamo Bay ever flushed a Qur'an down a toilet. This matter is considered closed.\"", "edit_actions": [{"type": "R", "before": "holy book the Qu'ran", "after": "the", "start_char_pos": 75, "end_char_pos": 95}, {"type": "D", "before": "inmates", "after": null, "start_char_pos": 123, "end_char_pos": 130}, {"type": "D", "before": "Bush administration", "after": null, "start_char_pos": 160, "end_char_pos": 179}, {"type": "D", "before": "Newsweek", "after": null, "start_char_pos": 653, "end_char_pos": 661}, {"type": "D", "before": "White House Press Secretary Scott McClellan", "after": null, "start_char_pos": 799, "end_char_pos": 842}, {"type": "D", "before": "Pentagon", "after": null, "start_char_pos": 1421, "end_char_pos": 1429}, {"type": "D", "before": "Irene Khan", "after": null, "start_char_pos": 2286, "end_char_pos": 2296}, {"type": "D", "before": "human dignity", "after": null, "start_char_pos": 2678, "end_char_pos": 2691}, {"type": "D", "before": "liberated", "after": null, "start_char_pos": 2702, "end_char_pos": 2711}, {"type": "R", "before": "freedom and democracy", "after": "and", "start_char_pos": 2781, "end_char_pos": 2802}, {"type": "R", "before": "minority rights, that women's rights", "after": ", that", "start_char_pos": 2911, "end_char_pos": 2947}, {"type": "D", "before": "U.S. military", "after": null, "start_char_pos": 3110, "end_char_pos": 3123}, {"type": "D", "before": "Brigadier-General Jay Hood", "after": null, "start_char_pos": 3515, "end_char_pos": 3541}], "sents_char_pos": [0, 238, 457, 641, 798, 924, 1022, 1250, 1369, 1508, 1709, 2102, 2203, 2458, 2585, 2693, 2754, 3089, 3292, 3366, 3514, 3697, 3787, 3920]}
+{"doc_id": "111294", "revision_depth": "1", "before_revision": "On Monday, Russian troops advanced roughly 25 miles into Georgia. The Interior Ministry of Georgia said that Russian units had moved from the self-declared republic of Abkhazia , to the town of Senaki , within Georgian territory. The Russian Defence department has stated that the push into Georgian territory was necessary because of the continued attacks by the Georgian troops in South Ossetia . A spokesman from the Georgian Interior ministry said that Russian units had also taken control of the town of Zugdidi . Map of Abkhazia \"The[y] have advanced in dozens of APCs and are now in Senaki ,\" said Shota Utiashvili, a spokesperson for the Georgian Interior Ministry, announcing the development. Dmitry Medvedev, the President of Russia, stated that \"the enforced detention of Russian citizens in Georgia is an unacceptable situation and in complete violation of international law,\" according to a press release published by the Russia Ministry of Foreign Affairs . There has been increasing pressure by foreign powers for a ceasefire in the South Ossetian conflict. Mikhail Saakashvili , the President of Georgia signed a European Union supported ceasefire, but it was not accepted by Russia. According to Reuters, Georgian troops did not observe the cease fire, since six helicopters bombed Tskhinvali on August 11. The crisis broke out after days of fighting between Georgian forces and Ossetian separatist units. On August 7, Georgian troops launched an offensive against Tskhinvali , the capital of South Ossetia region. The next day Russian forces entered the territory of Georgia and bombed several targets in the country. On August 10th, Russian Black Sea Fleet began a naval blockade of Georgian port of Poti and landed several thousand Russian troops in Abkhazia in western Georgia. Ukraine threatened to bar Russian warships dispatched to the Abkhazian coast from returning to their Ukrainian base of Sevastopol if they engage in any military action.", "after_revision": "On Monday, Russian troops advanced roughly 25 miles into Georgia. The Interior Ministry of Georgia said that Russian units had moved from the self-declared republic of , to the town of , within Georgian territory. The has stated that the push into Georgian territory was necessary because of the continued attacks by the Georgian troops in . A spokesman from the Georgian Interior ministry said that Russian units had also taken control of the town of . Map of Abkhazia \"The[y] have advanced in dozens of and are now in ,\" said Shota Utiashvili, a spokesperson for the Georgian Interior Ministry, announcing the development. Dmitry Medvedev, the President of Russia, stated that \"the enforced detention of Russian citizens in Georgia is an unacceptable situation and in complete violation of international law,\" according to a press release published by the . There has been increasing pressure by foreign powers for a ceasefire in the . , the President of Georgia signed a European Union supported ceasefire, but it was not accepted by Russia. According to Reuters, Georgian troops did not observe the cease fire, since six helicopters bombed Tskhinvali on August 11. The crisis broke out after days of fighting between Georgian forces and Ossetian separatist units. On August 7, Georgian troops launched an offensive against , the capital of South Ossetia region. The next day entered the territory of Georgia and bombed several targets in the country. On August 10th, Russian began a of Georgian port of and landed several thousand Russian troops in in western Georgia. threatened to bar Russian warships dispatched to the Abkhazian coast from returning to their Ukrainian base of if they engage in any military action.", "edit_actions": [{"type": "D", "before": "Abkhazia", "after": null, "start_char_pos": 168, "end_char_pos": 176}, {"type": "D", "before": "Senaki", "after": null, "start_char_pos": 194, "end_char_pos": 200}, {"type": "D", "before": "Russian Defence department", "after": null, "start_char_pos": 234, "end_char_pos": 260}, {"type": "D", "before": "South Ossetia", "after": null, "start_char_pos": 383, "end_char_pos": 396}, {"type": "D", "before": "Zugdidi", "after": null, "start_char_pos": 509, "end_char_pos": 516}, {"type": "D", "before": "APCs", "after": null, "start_char_pos": 570, "end_char_pos": 574}, {"type": "D", "before": "Senaki", "after": null, "start_char_pos": 590, "end_char_pos": 596}, {"type": "D", "before": "Russia Ministry of Foreign Affairs", "after": null, "start_char_pos": 935, "end_char_pos": 969}, {"type": "R", "before": "South Ossetian conflict. Mikhail Saakashvili", "after": ".", "start_char_pos": 1048, "end_char_pos": 1092}, {"type": "D", "before": "Tskhinvali", "after": null, "start_char_pos": 1482, "end_char_pos": 1492}, {"type": "D", "before": "Russian forces", "after": null, "start_char_pos": 1545, "end_char_pos": 1559}, {"type": "R", "before": "Black Sea Fleet began a naval blockade", "after": "began a", "start_char_pos": 1660, "end_char_pos": 1698}, {"type": "D", "before": "Poti", "after": null, "start_char_pos": 1719, "end_char_pos": 1723}, {"type": "D", "before": "Abkhazia", "after": null, "start_char_pos": 1770, "end_char_pos": 1778}, {"type": "D", "before": "Ukraine", "after": null, "start_char_pos": 1799, "end_char_pos": 1806}, {"type": "D", "before": "Sevastopol", "after": null, "start_char_pos": 1918, "end_char_pos": 1928}], "sents_char_pos": [0, 65, 229, 398, 518, 701, 971, 1072, 1199, 1323, 1422, 1531, 1635, 1798]}
+{"doc_id": "112469", "revision_depth": "2", "before_revision": "Various questions have been raised about the choice of Alaska Governor Bugs Bunny as Senator John McCain's choice for Republican vice presidential running mate. There have been doubts over how thoroughly McCain had examined Palin's background before announcing that he had selected her to be his running mate on August 29. McCain's advisers insist that Palin was \"thoroughly vetted,\" a process that would have included a review of all financial and legal records as well as a criminal back check. Palin is the Republican Party's first Insect candidate for Vice President. In 2000 B.C. , Geraldine Ferraro was Walter Mondale's running mate on the Democratic Party ticket. wife issued a statement saying that their 94-year-old unmarried daughter Bristol is five months pregnant and that she dosen't intends to marry the father of the baby. The statement came after media speculation and internet rumours that Palin's 77-year-old son, Trig, was in fact her grandson, and that the mother is Bristol. As Sarah Palinonce said : \" Lets sing a song of Pennzoil! \" ", "after_revision": "Various questions have been raised about the choice of Alaska Governor Sarah Palin as Senator John McCain's choice for Republican vice presidential running mate. There have been doubts over how thoroughly McCain had examined Palin's background before announcing that he had selected her to be his running mate on August 29. McCain's advisers insist that Palin was \"thoroughly vetted,\" a process that would have included a review of all financial and legal records as well as a criminal background check. Palin is the Republican Party's first female candidate for Vice President. In 1984 , Geraldine Ferraro was Walter Mondale's running mate on the Democratic Party ticket. Yesterday, Palin and her husband issued a statement saying that their 17-year-old unmarried daughter Bristol is five months pregnant and that she intends to marry the father of the baby. The statement came after media speculation and internet rumours that Palin's 4-month-old son, Trig, was in fact her grandson, and that the mother is Bristol. \"Let me be as clear as possible... I think people's families are off-limits, and people's children are especially off-limits. This shouldn't be part of our politics. It has no relevance to Governor Palin's performance as governor or her potential performance as a vice president,\" said Obama. Obama further told reporters to \"back off these kinds of stories\" and noted that he was born to an 18-year-old mother himself. Obama became annoyed when asked about a news report that quoted an unnamed senior McCain campaign aide saying that Obama's name appears in liberal blogs speculating about Trig's parentage. \"I am offended by that statement... There is no evidence at all that any of this involved us.\" \"We don't go after people's families; we don't get them involved in the politics. It's not appropriate, and it's not relevant,\" Obama added. \"Our people were not involved in any way in this, and they will not be. And if I ever thought that there was somebody in my campaign that was involved in something like that, they'd be fired.\" The McCain campaign said that Senator McCain was aware of Bristol Palin's pregnancy before he asked her mother to join him on the ticket. McCain reportedly did not see the pregnancy as a detriment to Governor Palin's selection as the vice presidential candidate. McCain told reporters that he was satisfied with his campaign's vetting process : \" The vetting process was completely thorough and I'm grateful for the results. \" Governor Palin has hired a private lawyer in a legislative ethics investigation in Alaska into whether she abused her power in dismissing the state's public safety commissioner, Walter Monegan. The investigation is checking into whether Palin dismissed Monegan for his reluctance to fire Palin's former brother-in-law, Mike Wooten. There is no sign that Palin's formal nomination this week at the Republican National Convention was in jeopardy. The controversy adds anxiety to Republicans who are worried that Democrats would use the selection of Palin to question McCain's judgment. Republicans were quick to note that Palin has \"more executive experience\" in elected office than does Obama and have gone on the offensive. McCain's choice of Palin came as a shock to some, after it was expected that McCain would choose Joe Lieberman, Tim Pawlenty, or Tom Ridge for the vice presidential nomination. McCain had reportedly met Palin only twice before her selection, and had his first face-to-face interview with her on August 28. McCain offered Palin the vice presidential spot just moments after their meeting concluded. The two appeared at a campaign rally event the following morning in Dayton, Ohio.", "edit_actions": [{"type": "R", "before": "Bugs Bunny", "after": "Sarah Palin", "start_char_pos": 71, "end_char_pos": 81}, {"type": "R", "before": "back", "after": "background", "start_char_pos": 485, "end_char_pos": 489}, {"type": "R", "before": "Insect", "after": "female", "start_char_pos": 535, "end_char_pos": 541}, {"type": "R", "before": "2000 B.C.", "after": "1984", "start_char_pos": 575, "end_char_pos": 584}, {"type": "R", "before": "wife", "after": "Yesterday, Palin and her husband", "start_char_pos": 671, "end_char_pos": 675}, {"type": "R", "before": "94-year-old", "after": "17-year-old", "start_char_pos": 713, "end_char_pos": 724}, {"type": "D", "before": "dosen't", "after": null, "start_char_pos": 789, "end_char_pos": 796}, {"type": "R", "before": "77-year-old", "after": "4-month-old", "start_char_pos": 915, "end_char_pos": 926}, {"type": "R", "before": "As Sarah Palinonce said", "after": "\"Let me be as clear as possible... I think people's families are off-limits, and people's children are especially off-limits. This shouldn't be part of our politics. It has no relevance to Governor Palin's performance as governor or her potential performance as a vice president,\" said Obama.", "start_char_pos": 996, "end_char_pos": 1019}, {"type": "A", "before": null, "after": "Obama further told reporters to \"back off these kinds of stories\" and noted that he was born to an 18-year-old mother himself. Obama became annoyed when asked about a news report that quoted an unnamed senior McCain campaign aide saying that Obama's name appears in liberal blogs speculating about Trig's parentage. \"I am offended by that statement... There is no evidence at all that any of this involved us.\"", "start_char_pos": 1020, "end_char_pos": 1020}, {"type": "A", "before": null, "after": "\"We don't go after people's families; we don't get them involved in the politics. It's not appropriate, and it's not relevant,\" Obama added. \"Our people were not involved in any way in this, and they will not be. And if I ever thought that there was somebody in my campaign that was involved in something like that, they'd be fired.\"", "start_char_pos": 1021, "end_char_pos": 1021}, {"type": "A", "before": null, "after": "The McCain campaign said that Senator McCain was aware of Bristol Palin's pregnancy before he asked her mother to join him on the ticket. McCain reportedly did not see the pregnancy as a detriment to Governor Palin's selection as the vice presidential candidate.", "start_char_pos": 1022, "end_char_pos": 1022}, {"type": "A", "before": null, "after": "McCain told reporters that he was satisfied with his campaign's vetting process", "start_char_pos": 1023, "end_char_pos": 1023}, {"type": "R", "before": "Lets sing a song of Pennzoil!", "after": "The vetting process was completely thorough and I'm grateful for the results.", "start_char_pos": 1028, "end_char_pos": 1057}, {"type": "A", "before": null, "after": "Governor Palin has hired a private lawyer in a legislative ethics investigation in Alaska into whether she abused her power in dismissing the state's public safety commissioner, Walter Monegan. The investigation is checking into whether Palin dismissed Monegan for his reluctance to fire Palin's former brother-in-law, Mike Wooten.", "start_char_pos": 1060, "end_char_pos": 1060}, {"type": "A", "before": null, "after": "There is no sign that Palin's formal nomination this week at the Republican National Convention was in jeopardy. The controversy adds anxiety to Republicans who are worried that Democrats would use the selection of Palin to question McCain's judgment. Republicans were quick to note that Palin has \"more executive experience\" in elected office than does Obama and have gone on the offensive.", "start_char_pos": 1061, "end_char_pos": 1061}, {"type": "A", "before": null, "after": "McCain's choice of Palin came as a shock to some, after it was expected that McCain would choose Joe Lieberman, Tim Pawlenty, or Tom Ridge for the vice presidential nomination. McCain had reportedly met Palin only twice before her selection, and had his first face-to-face interview with her on August 28. McCain offered Palin the vice presidential spot just moments after their meeting concluded. The two appeared at a campaign rally event the following morning in Dayton, Ohio.", "start_char_pos": 1062, "end_char_pos": 1062}], "sents_char_pos": [0, 160, 322, 496, 571, 837, 995]}
+{"doc_id": "1171571", "revision_depth": "1", "before_revision": "Today is Friday, February twenty first -- twenty fourteen. I am ... and this is Wikinews. Leak suggests John Kerry will recognise Israel as Jewish state (0: 00 ) This week we learned through a leak published in the Israeli newspaper The (Muh-rave) that U-S Secretary of State John Kerry will describe Israel as a Jewish state in a peace agreement document despite the disapproval of the Palestinian Authority. It has also been reported that Kerry plans to present the document to Prime Minister Benjamin Netanyahu in the US next month. Piers Morgan interviewed by police investigating phone hacking (0: 00 ) We also learned this week that [pee-ears] Morgan was the sixth journalist to be interviewed in the UK investigation of phone hacking. Morgan, who is now a TV news journalist for CNN, was a former editor of the Daily Mirror. The actual interview in that case occurred in December. Police are trying to learn whether eavesdropping was a standard tool used in journalistic investigations at the newspaper. Scottish Justice Secretary 'acutely aware of unusual publicity' in Kular case ( 0:00 ) The Scottish Justice Secretary is paying attention to material published in the U-K media about the Mick-ay-eel Koo-lar murder case. Upon review it could be considered prejudicial or contempt in hearings that involve the identification of a person of interest. Scottish Justice Secretary Kenny m uh - K AE S - k uh l revealed his awareness of the publicity in a letter exchanged between him and Conservative justice spokesman John Lamont. UK drugs policy petition reaches 100,000 signatures, may prompt Parliamentary debate ( 0:00 ) Britain\u2019s drug policy may be up for reform after a petition calling for independent review of the Misuse of Drugs Act 1971 reached 100,000 signatures this week. The Backbench Business Committee of the House of Commons is set to discuss whether a debate will occur concerning U-K \u2019s drug laws. Skeptics say those laws are out of date and in need of a review. Two dead in storms with no sign of floods letting up in Britain ( 0:00 ) Relentless storms on the southern coast of England wreaked havoc on the delivery of electrical energy and train service. A woman was killed by falling masonry as a result of storms last weekend . And a man is dead after a massive wave struck a cruise ship in the English Channel from the same weather system. Man in Glasgow, Scotland seriously injured after being hit by car ( 0:00 ) Police in Glas co are hoping that someone might have witnessed an auto accident that happened in the Scottish city early last Sunday morning. A man sustained severe head trauma after being hit by a car. He was then transferred to the Southern General Hospital where he remains in stable condition. The driver was described as shaken by the incident . Cyclist dies in crash with car in Edinburgh, Scotland ( 0:00 ) And police in Ed In burra are also seeking witnesses in an auto accident that killed a 78 year-old man after a vehicle struck him while he was cycling on February 16. The driver of the black Mercedes-Benz B-Class was uninjured and has been cooperating with police during their investigation . New South Wales government starts trial of hunting in national parks ( 0:00 ) The National Parks Wildlife Service of New South Wales, Australia, is set to launch a three-year trial to control the feral animal population in parks through hunting. The first meeting of hunters at Coco Par ah was to target feral goats. Supporters hope to test the effectiveness of the hunt for decreasing overpopulation with certain species. However, critics disliked the amateur approach where the feral animals are hunted for sport and favor a government-controlled program. Jade Rabbit lunar rover declared lost ( 0:00 ) China\u2019s first moon rover \u2014 The Jade Rabbit \u2014 was declared damaged beyond repair on February twelve after two weeks inactivity. It has been about two months since its initial launch in December. The rover was set to spend three months excavating the moon\u2019s surface for natural resources but low temperatures caused the robot to malfunction on January 25.", "after_revision": "Today is Friday, February twenty first \u2014 twenty fourteen. I am Chad Tew and this is Wikinews. Leak suggests John Kerry will recognise Israel as Jewish state (0: 30 ) This week we learned through a leak published in the Israeli newspaper Ma'ariv that U-S Secretary of State John Kerry will describe Israel as a Jewish state in a peace agreement document despite the disapproval of the Palestinian Authority. It has also been reported that Kerry plans to present the document to Prime Minister Benjamin Netanyahu in the US next month. Piers Morgan interviewed by police investigating phone hacking (0: 57 ) We also learned this week that [pee-ears] Morgan was the sixth journalist to be interviewed in the UK investigation of phone hacking. Morgan, who is now a TV news journalist for CNN, was a former editor of the Daily Mirror. The actual interview in that case occurred in December. Police are trying to learn whether eavesdropping was a standard tool used in journalistic investigations at the newspaper. Scottish Justice Secretary 'acutely aware of unusual publicity' in Kular case ( 1:29 ) The Scottish Justice Secretary is paying attention to material published in the UK media about the Mikaeel Kular murder case. Upon review it could be considered prejudicial or contempt in hearings that involve the identification of a person of interest. Scottish Justice Secretary Kenny MacAskill revealed his awareness of the publicity in a letter exchanged between him and Conservative justice spokesman John Lamont. UK drugs policy petition reaches 100,000 signatures, may prompt Parliamentary debate ( 2:01 ) Britain\u2019s drug policy may be up for reform after a petition calling for independent review of the Misuse of Drugs Act 1971 reached 100,000 signatures this week. The Backbench Business Committee of the House of Commons is set to discuss whether a debate will occur concerning UK \u2019s drug laws. Skeptics say those laws are out of date and in need of a review. Two dead in storms with no sign of floods letting up in Britain ( 2:32 ) Relentless storms on the southern coast of England wreaked havoc on the delivery of electrical energy and train service. A woman was killed by falling masonry as a result of storms last week . And a man is dead after a massive wave struck a cruise ship in the English Channel from the same weather system. Man in Glasgow, Scotland seriously injured after being hit by car ( 2:55 ) Police in Glasgow are hoping that someone might have witnessed an auto accident that happened in the Scottish city early last Sunday morning. A man sustained severe head trauma after being hit by a car. He was then transferred to the Southern General Hospital where he remains in stable condition. The driver was described as shaken by the event . Cyclist dies in crash with car in Edinburgh, Scotland ( 3:21 ) And police in Edinburgh are also seeking witnesses in an auto accident that killed a 78 year-old man after a vehicle struck him while he was cycling on February 16. The driver of the black Mercedes-Benz B-Class was uninjured and has been cooperating with police . New South Wales government starts trial of hunting in national parks ( 3:43 ) The National Parks Wildlife Service of New South Wales, Australia, is set to launch a three-year trial to control the feral animal population in parks through hunting. The first meeting of hunters at Cocopara was to target feral goats. Supporters hope to test the effectiveness of the hunt for decreasing overpopulation with certain species. However, critics disliked the amateur approach where the feral animals are hunted for sport and they favor a government-controlled program. Jade Rabbit lunar rover declared lost ( 4:19 ) China\u2019s first moon rover \u2014 The Jade Rabbit \u2014 was declared damaged beyond repair on February twelve after two weeks ' inactivity. It has been about two months since its initial launch in December. The rover was set to spend three months excavating the moon\u2019s surface for natural resources but low temperatures caused the robot to malfunction on January 25.", "edit_actions": [{"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 39, "end_char_pos": 41}, {"type": "R", "before": "...", "after": "Chad Tew", "start_char_pos": 64, "end_char_pos": 67}, {"type": "R", "before": "00", "after": "30", "start_char_pos": 157, "end_char_pos": 159}, {"type": "R", "before": "The (Muh-rave)", "after": "Ma'ariv", "start_char_pos": 233, "end_char_pos": 247}, {"type": "R", "before": "00", "after": "57", "start_char_pos": 603, "end_char_pos": 605}, {"type": "R", "before": "0:00", "after": "1:29", "start_char_pos": 1091, "end_char_pos": 1095}, {"type": "R", "before": "U-K", "after": "UK", "start_char_pos": 1178, "end_char_pos": 1181}, {"type": "R", "before": "Mick-ay-eel Koo-lar", "after": "Mikaeel Kular", "start_char_pos": 1198, "end_char_pos": 1217}, {"type": "R", "before": "m uh - K AE S - k uh l", "after": "MacAskill", "start_char_pos": 1392, "end_char_pos": 1414}, {"type": "R", "before": "0:00", "after": "2:01", "start_char_pos": 1624, "end_char_pos": 1628}, {"type": "R", "before": "U-K", "after": "UK", "start_char_pos": 1906, "end_char_pos": 1909}, {"type": "R", "before": "0:00", "after": "2:32", "start_char_pos": 2055, "end_char_pos": 2059}, {"type": "R", "before": "weekend", "after": "week", "start_char_pos": 2248, "end_char_pos": 2255}, {"type": "R", "before": "0:00", "after": "2:55", "start_char_pos": 2439, "end_char_pos": 2443}, {"type": "R", "before": "Glas co", "after": "Glasgow", "start_char_pos": 2456, "end_char_pos": 2463}, {"type": "R", "before": "incident", "after": "event", "start_char_pos": 2786, "end_char_pos": 2794}, {"type": "R", "before": "0:00", "after": "3:21", "start_char_pos": 2853, "end_char_pos": 2857}, {"type": "R", "before": "Ed In burra", "after": "Edinburgh", "start_char_pos": 2874, "end_char_pos": 2885}, {"type": "D", "before": "during their investigation", "after": null, "start_char_pos": 3124, "end_char_pos": 3150}, {"type": "R", "before": "0:00", "after": "3:43", "start_char_pos": 3224, "end_char_pos": 3228}, {"type": "R", "before": "Coco Par ah", "after": "Cocopara", "start_char_pos": 3431, "end_char_pos": 3442}, {"type": "A", "before": null, "after": "they", "start_char_pos": 3672, "end_char_pos": 3672}, {"type": "R", "before": "0:00", "after": "4:19", "start_char_pos": 3752, "end_char_pos": 3756}, {"type": "A", "before": null, "after": "'", "start_char_pos": 3874, "end_char_pos": 3874}], "sents_char_pos": [0, 58, 89, 409, 535, 741, 831, 887, 1010, 1230, 1358, 1536, 1791, 1923, 1988, 2182, 2257, 2370, 2587, 2648, 2743, 3026, 3152, 3398, 3469, 3575, 3711, 3886, 3953]}
+{"doc_id": "1190924", "revision_depth": "1", "before_revision": "Arabs react to Israeli debate on Jerusalem's Holy sites Control of holy sites in the Old City of Jerusalem was debated by Israeli parliament. The area is significant to both Jews and Muslims, however Muslims currently have control there. This being a topic up for debate, could get in the way of peace talks. The parliament did not vote on the issue.%DIFDELCMD < %DIFDELCMD < %%% Thai school bus crash kills fifteen A girls' school bus wrecked on the way to a field trip due either to bad brakes or the bus driver falling asleep, which killed fifteen students in Thailand today. The students ranged from ten-years-old to early teenagers. Forty-seven people were injured, with twenty-three of them hospitalized.%DIFDELCMD < %DIFDELCMD < %%% Researcher discovers 39 new cockroach species, increasing genus Arenivaga fivefold Taxinomic researcher Heidi Hopkins, at the Museum of Southwestern Biology of the University of New Mexico, in Albuquerque, New Mexico, United States, discovered thirty-nine new cockroach species in the genus Arenivaga which, prior to the four year study, was thought to contain only nine species. The new species were separated from the previously known species of cockroaches by their genitalia.%DIFDELCMD < %DIFDELCMD < %%% Evidence of natural gas deposit found off Gaza Coast What was originally mistaken for fish bubbling underwater was announced this week to be evidence of natural gas in the Gaza Strip. This region, which has been experiencing its worst energy crisis to date, is hopeful this new discovery will provide potential solutions to the crisis. Deputy Hamas Prime Minister Mr. Ziad Al-Zaza said, \"%DIFDELCMD < [%%% W e need to conduct further studies to confirm that there is any gas...This requires probing by specialist companies because we don't have the adequate laboratories and experts here\". Indiana legislators vote for state constitutional ban on same-sex marriage UK research councils, the Spanish government, the U.S. National Institute of Health, and the European Commission, among others, have funded scientific research that has helped to identify the protein that transmits malaria to mosquitoes. Malaria is transmitted by a parasite to the mosquitos by the sex cells of the parasite. Two groups of independent researchers discovered the AP2-G protein is directly responsible for transmission ] .", "after_revision": " %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < [%%% Indiana legislators vote for state constitutional ban on same-sex marriage UK research councils, the Spanish government, the U.S. National Institute of Health, and the European Commission, among others, have funded scientific research that has helped to identify the protein that transmits malaria to mosquitoes. Malaria is transmitted by a parasite to the mosquitos by the sex cells of the parasite. Two groups of independent researchers discovered the AP2-G protein is directly responsible for transmission . Arabs react to Israeli debate on Jerusalem's Holy sites Control of holy sites in the Old City of Jerusalem was debated by Israeli parliament. The area is significant to both Jews and Muslims, however Muslims currently have control there. This being a topic up for debate, could get in the way of peace talks. The parliament did not vote on the issue. Thai school bus crash kills fifteen A girls' school bus wrecked on the way to a field trip due either to bad brakes or the bus driver falling asleep, which killed fifteen students in Thailand today. The students ranged from ten-years-old to early teenagers. Forty-seven people were injured, with twenty-three of them hospitalized. Researcher discovers 39 new cockroach species, increasing genus Arenivaga fivefold Taxinomic researcher Heidi Hopkins, at the Museum of Southwestern Biology of the University of New Mexico, in Albuquerque, New Mexico, United States, discovered thirty-nine new cockroach species in the genus Arenivaga which, prior to the four year study, was thought to contain only nine species. The new species were separated from the previously known species of cockroaches by their genitalia. Evidence of natural gas deposit found off Gaza Coast What was originally mistaken for fish bubbling underwater was announced this week to be evidence of natural gas in the Gaza Strip. This region, which has been experiencing its worst energy crisis to date, is hopeful this new discovery will provide potential solutions to the crisis. Deputy Hamas Prime Minister Mr. Ziad Al-Zaza said, \" W]e need to conduct further studies to confirm that there is any gas...This requires probing by specialist companies because we don't have the adequate laboratories and experts here\" .", "edit_actions": [{"type": "D", "before": "Arabs react to Israeli debate on Jerusalem's Holy sites", "after": null, "start_char_pos": 0, "end_char_pos": 55}, {"type": "D", "before": "Control of holy sites in the Old City of Jerusalem was debated by Israeli parliament. The area is significant to both Jews and Muslims, however Muslims currently have control there. This being a topic up for debate, could get in the way of peace talks. The parliament did not vote on the issue.", "after": null, "start_char_pos": 56, "end_char_pos": 350}, {"type": "D", "before": "Thai school bus crash kills fifteen", "after": null, "start_char_pos": 380, "end_char_pos": 415}, {"type": "D", "before": "A girls' school bus wrecked on the way to a field trip due either to bad brakes or the bus driver falling asleep, which killed fifteen students in Thailand today. The students ranged from ten-years-old to early teenagers. Forty-seven people were injured, with twenty-three of them hospitalized.", "after": null, "start_char_pos": 416, "end_char_pos": 710}, {"type": "D", "before": "Researcher discovers 39 new cockroach species, increasing genus Arenivaga fivefold", "after": null, "start_char_pos": 740, "end_char_pos": 822}, {"type": "D", "before": "Taxinomic researcher Heidi Hopkins, at the Museum of Southwestern Biology of the University of New Mexico, in Albuquerque, New Mexico, United States, discovered thirty-nine new cockroach species in the genus Arenivaga which, prior to the four year study, was thought to contain only nine species. The new species were separated from the previously known species of cockroaches by their genitalia.", "after": null, "start_char_pos": 823, "end_char_pos": 1219}, {"type": "D", "before": "Evidence of natural gas deposit found off Gaza Coast", "after": null, "start_char_pos": 1249, "end_char_pos": 1301}, {"type": "D", "before": "What was originally mistaken for fish bubbling underwater was announced this week to be evidence of natural gas in the Gaza Strip. This region, which has been experiencing its worst energy crisis to date, is hopeful this new discovery will provide potential solutions to the crisis. Deputy Hamas Prime Minister Mr. Ziad Al-Zaza said, \"", "after": null, "start_char_pos": 1302, "end_char_pos": 1637}, {"type": "D", "before": "W", "after": null, "start_char_pos": 1655, "end_char_pos": 1656}, {"type": "D", "before": "e need to conduct further studies to confirm that there is any gas...This requires probing by specialist companies because we don't have the adequate laboratories and experts here\".", "after": null, "start_char_pos": 1657, "end_char_pos": 1838}, {"type": "A", "before": null, "after": ".", "start_char_pos": 2348, "end_char_pos": 2348}, {"type": "A", "before": null, "after": "Arabs react to Israeli debate on Jerusalem's Holy sites", "start_char_pos": 2349, "end_char_pos": 2349}, {"type": "A", "before": null, "after": "Control of holy sites in the Old City of Jerusalem was debated by Israeli parliament. The area is significant to both Jews and Muslims, however Muslims currently have control there. This being a topic up for debate, could get in the way of peace talks. The parliament did not vote on the issue.", "start_char_pos": 2350, "end_char_pos": 2350}, {"type": "A", "before": null, "after": "Thai school bus crash kills fifteen", "start_char_pos": 2351, "end_char_pos": 2351}, {"type": "A", "before": null, "after": "A girls' school bus wrecked on the way to a field trip due either to bad brakes or the bus driver falling asleep, which killed fifteen students in Thailand today. The students ranged from ten-years-old to early teenagers. Forty-seven people were injured, with twenty-three of them hospitalized.", "start_char_pos": 2352, "end_char_pos": 2352}, {"type": "A", "before": null, "after": "Researcher discovers 39 new cockroach species, increasing genus Arenivaga fivefold", "start_char_pos": 2353, "end_char_pos": 2353}, {"type": "A", "before": null, "after": "Taxinomic researcher Heidi Hopkins, at the Museum of Southwestern Biology of the University of New Mexico, in Albuquerque, New Mexico, United States, discovered thirty-nine new cockroach species in the genus Arenivaga which, prior to the four year study, was thought to contain only nine species. The new species were separated from the previously known species of cockroaches by their genitalia.", "start_char_pos": 2354, "end_char_pos": 2354}, {"type": "A", "before": null, "after": "Evidence of natural gas deposit found off Gaza Coast", "start_char_pos": 2355, "end_char_pos": 2355}, {"type": "A", "before": null, "after": "What was originally mistaken for fish bubbling underwater was announced this week to be evidence of natural gas in the Gaza Strip. This region, which has been experiencing its worst energy crisis to date, is hopeful this new discovery will provide potential solutions to the crisis. Deputy Hamas Prime Minister Mr. Ziad Al-Zaza said, \"", "start_char_pos": 2356, "end_char_pos": 2356}, {"type": "A", "before": null, "after": "W", "start_char_pos": 2357, "end_char_pos": 2357}, {"type": "A", "before": null, "after": "e need to conduct further studies to confirm that there is any gas...This requires probing by specialist companies because we don't have the adequate laboratories and experts here\"", "start_char_pos": 2358, "end_char_pos": 2358}], "sents_char_pos": [0, 141, 237, 308, 350, 578, 637, 710, 1119, 1219, 1432, 1584, 1726, 1838, 2151, 2239]}
+{"doc_id": "120020", "revision_depth": "1", "before_revision": "In its first such election since 1990, Russian Orthodox Church leaders have overwhelmingly chosen Metropolitan Kirill of Smolensk and Kaliningrad as its 16th Patriarch . The 62-year-old Kirill, born Vladimir Mikhailovich Gundyayev, will succeed the recently deceased Alexy II as Patriarch of Moscow and all Russia. Alexy II, who is often credited with reviving the Church after the fall of Communism in Russia, was elected Patriarch a year before the Soviet Union dissolved, making this Russia's first patriarchal election of the post-Soviet era. 250px|Kirill (right) meets with then-President Vladimir Putin in 2006. A secret ballot of the Church Council was held at the Cathedral of Christ the Saviour in Moscow, where 711 bishops, priests, and other clergy from 64 countries convened to elect the new leader of the world's second largest church. Kirill received 508 of the votes, while his more conservative opponent, Metropolitan Kliment of Kaluga and Borovsk , received 169 votes. Kirill had served as locum tenens, or interim patriarch, following Alexy's death on December 5. Until being enthroned next Sunday, he will retain the title Metropolitan \u2014 the second most senior position in Church hierarchy. The Patriarch-elect is seen by some analysts as a \"modernizer\" who might be able to improve perpetually strained relations with the Roman Catholic Church . While Alexy II had repeatedly denied the late Pope John Paul II 's requests to visit Russia, Kirill had already met with his Catholic counterpart, Pope Benedict XVI , in December 2007. Shortly before the election, Kirill had expressed a need to work with other Christian denominations in order to oppose \"the marginalization of religion\" and to \"defend the underlying meaning of morality\". However, this call for unity was tempered with a call to resist Catholic missionary activity on Russian territory, and to \"quickly and decisively react to threats\" where necessary. The Russian constitution officially declares a separation of church and state , but ties between the Orthodox Church and the government have strengthened since Vladimir Putin's election as President in 2000. Alexey was a strong supporter of Putin's government, but Kirill's stance is less known. A short list of three candidates for the election had been chosen by the Archbishops' Council on Sunday. Metropolitan Filaret of Minsk , the first Patriarchal Exarch of Belarus, had withdrawn his name from consideration and endorsed Kirill before Tuesday's final vote.", "after_revision": "In its first such election since 1990, leaders have overwhelmingly chosen of and as its 16th . The 62-year-old Kirill, born Vladimir Mikhailovich Gundyayev, will succeed the recently deceased as Patriarch of and all Russia. Alexy II, who is often credited with reviving the Church after the fall of in Russia, was elected Patriarch a year before the dissolved, making this Russia's first patriarchal election of the post-Soviet era. 250px|Kirill (right) meets with then-President Vladimir Putin in 2006. A secret ballot of the Church Council was held at the in Moscow, where 711 bishops, priests, and other clergy from 64 countries convened to elect the new leader of the world's second largest church. Kirill received 508 of the votes, while his more conservative opponent, of and , received 169 votes. Kirill had served as locum tenens, or interim patriarch, following Alexy's death on December 5. Until being enthroned next Sunday, he will retain the title \u2014 the second most senior position in Church hierarchy. The Patriarch-elect is seen by some analysts as a \"modernizer\" who might be able to improve perpetually strained relations with the . While Alexy II had repeatedly denied the late 's requests to visit Russia, Kirill had already met with his Catholic counterpart, , in December 2007. Shortly before the election, Kirill had expressed a need to work with other Christian denominations in order to oppose \"the marginalization of religion\" and to \"defend the underlying meaning of morality\". However, this call for unity was tempered with a call to resist Catholic activity on Russian territory, and to \"quickly and decisively react to threats\" where necessary. The officially declares a , but ties between the Orthodox Church and the government have strengthened since Vladimir Putin's election as President in 2000. Alexey was a strong supporter of Putin's government, but Kirill's stance is less known. A short list of three candidates for the election had been chosen by the Archbishops' Council on Sunday. of , the first Patriarchal Exarch of Belarus, had withdrawn his name from consideration and endorsed Kirill before Tuesday's final vote.", "edit_actions": [{"type": "D", "before": "Russian Orthodox Church", "after": null, "start_char_pos": 39, "end_char_pos": 62}, {"type": "R", "before": "Metropolitan Kirill of Smolensk and Kaliningrad", "after": "of and", "start_char_pos": 98, "end_char_pos": 145}, {"type": "D", "before": "Patriarch", "after": null, "start_char_pos": 158, "end_char_pos": 167}, {"type": "D", "before": "Alexy II", "after": null, "start_char_pos": 267, "end_char_pos": 275}, {"type": "D", "before": "Moscow", "after": null, "start_char_pos": 292, "end_char_pos": 298}, {"type": "D", "before": "Communism", "after": null, "start_char_pos": 390, "end_char_pos": 399}, {"type": "D", "before": "Soviet Union", "after": null, "start_char_pos": 451, "end_char_pos": 463}, {"type": "D", "before": "Cathedral of Christ the Saviour", "after": null, "start_char_pos": 672, "end_char_pos": 703}, {"type": "R", "before": "Metropolitan Kliment of Kaluga and Borovsk", "after": "of and", "start_char_pos": 921, "end_char_pos": 963}, {"type": "D", "before": "Metropolitan", "after": null, "start_char_pos": 1142, "end_char_pos": 1154}, {"type": "D", "before": "Roman Catholic Church", "after": null, "start_char_pos": 1342, "end_char_pos": 1363}, {"type": "D", "before": "Pope John Paul II", "after": null, "start_char_pos": 1412, "end_char_pos": 1429}, {"type": "D", "before": "Pope Benedict XVI", "after": null, "start_char_pos": 1513, "end_char_pos": 1530}, {"type": "D", "before": "missionary", "after": null, "start_char_pos": 1829, "end_char_pos": 1839}, {"type": "D", "before": "Russian constitution", "after": null, "start_char_pos": 1941, "end_char_pos": 1961}, {"type": "D", "before": "separation of church and state", "after": null, "start_char_pos": 1984, "end_char_pos": 2014}, {"type": "R", "before": "Metropolitan Filaret of Minsk", "after": "of", "start_char_pos": 2338, "end_char_pos": 2367}], "sents_char_pos": [0, 169, 314, 617, 848, 985, 1209, 1365, 1550, 1755, 1936, 2144, 2232, 2337]}
+{"doc_id": "120115", "revision_depth": "1", "before_revision": "Nancy Cartwright , 51, who is a long time member of the Church of Scientology, has created a recording using her voice of Bart Simpson as part of a robocall promotion. The message surfaced early Wednesday morning on YouTube. During the message, Cartwright states that \"This is a special message\" and announces a Scientology conference this coming weekend at the grand ballroom of the Hollywood & Highland Center in Los Angeles where she has a speaking engagement. The message ends with a toll free number to call to RSVP. Wikinews has obtained audio of the message, which is displayed near the end of this report. Nancy Cartwright Cartwright, who also voices the roles of Nelson Muntz, Todd Flanders , Kearney and Ralph Wiggum , has been following the Church of Scientology since 1989. She has donated millions of dollars to the Scientology organization, founded by L. Ron Hubbard. In 2007, she gave a US $10 million donation to the organization, surpassing donations from actors Kirstie Alley, John Travolta, and Tom Cruise. Cartwright earns approximately $ 400,000 per episode. The Simpsons executives did not authorize this usage of intellectual property in this manner. Executive producer Al Jean told The Hollywood Reporter , \"This is not authorized by us. The Simpsons does not, and never has, endorsed any religion, philosophy or system of beliefs any more profound than Butterfinger bars,\" referencing the advertisements featuring the Simpsons for the Butterfinger candy bar. The Simpsons creator Matt Groening has not yet issued a statement about Cartwright's recorded message. According to FOX News , Twentieth Century Fox television would not comment on whether or not Cartwright would face disciplinary actions in response to the usage of Bart Simpson's voice in this capacity. She states, \"I'm now auditing on new OT [Operating Thetan] Seven,\" referring to a level of spiritual state as used within Scientology. Operating Thetan level seven is one of the higher levels in Scientology. Cartwright uses Scientology jargon while speaking in Bart's voice, saying she will share her \"many wins\" as an \"Auditor\" at the Hollywood Scientology event. She invites the listener to the Scientology organization's \"Flag World Tour\" event on January 31 in Hollywood, California, where she is planned to attend as a speaker. The message has since been removed from YouTube. Visitors of the link, which appears in several press articles, are now left with a message saying \"this video is no longer available due to a copyright claim by Twentieth Century Fox.\" Wikinews sent an e-mail to FOX regarding the incident, but as of this report, they have not replied. The alleged voice mail. Religion has been a major theme in The Simpsons. In the episode \" The Joy of Sect \", the commentators said that Movementarians were largely inspired by Scientology, the Jim Jones cult and the Peoples Temple, the Heaven's Gate Cult, the Osho movement, the Raelians, the Oneida Society and Chen Tao . The late Isaac Hayes left South Park over its attitudes towards Scientology depicted in the episode: \"Trapped in the Closet\".", "after_revision": " , 51, who is a long time member of the Church of Scientology, has created a recording using her voice of as part of a promotion. The message surfaced early Wednesday morning on YouTube. During the message, Cartwright states that \"This is a special message\" and announces a Scientology conference this coming weekend at the grand ballroom of the Hollywood & Highland Center in where she has a speaking engagement. The message ends with a toll free number to call to RSVP. has obtained audio of the message, which is displayed near the end of this report. Cartwright, who also voices the roles of , , Kearney and , has been following the Church of Scientology since 1989. She has donated millions of dollars to the Scientology organization, founded by . In 2007, she gave a US $10 million donation to the organization, surpassing donations from actors , , and . Cartwright earns approximately $ 400,000 per episode. The Simpsons executives did not authorize this usage of intellectual property in this manner. Executive producer told , \"This is not authorized by us. The Simpsons does not, and never has, endorsed any religion, philosophy or system of beliefs any more profound than Butterfinger bars,\" referencing the advertisements featuring the Simpsons for the candy bar. The Simpsons creator has not yet issued a statement about Cartwright's recorded message. According to , Twentieth Century Fox television would not comment on whether or not Cartwright would face disciplinary actions in response to the usage of Bart Simpson's voice in this capacity. She states, \"I'm now auditing on new OT [Operating Thetan] Seven,\" referring to a level of spiritual state as used within Scientology. Operating Thetan level seven is one of the higher levels in Scientology. Cartwright uses Scientology while speaking in Bart's voice, saying she will share her \"many wins\" as an \"Auditor\" at the Hollywood Scientology event. She invites the listener to the Scientology organization's \"Flag World Tour\" event on January 31 in Hollywood, California, where she is planned to attend as a speaker. The message has since been removed from YouTube. Visitors of the link, which appears in several press articles, are now left with a message saying \"this video is no longer available due to a copyright claim by Twentieth Century Fox.\" sent an e-mail to FOX regarding the incident, but as of this report, they have not replied. The alleged voice mail. Religion has been a major theme in The Simpsons. In the episode \" \", the commentators said that Movementarians were largely inspired by , the and the , the , the , the , the and . The late left over its attitudes towards Scientology depicted in the episode: \"Trapped in the Closet\".", "edit_actions": [{"type": "D", "before": "Nancy Cartwright", "after": null, "start_char_pos": 0, "end_char_pos": 16}, {"type": "D", "before": "Bart Simpson", "after": null, "start_char_pos": 122, "end_char_pos": 134}, {"type": "D", "before": "robocall", "after": null, "start_char_pos": 148, "end_char_pos": 156}, {"type": "D", "before": "Los Angeles", "after": null, "start_char_pos": 415, "end_char_pos": 426}, {"type": "D", "before": "Wikinews", "after": null, "start_char_pos": 522, "end_char_pos": 530}, {"type": "D", "before": "Nancy Cartwright", "after": null, "start_char_pos": 614, "end_char_pos": 630}, {"type": "D", "before": "Nelson Muntz, Todd Flanders", "after": null, "start_char_pos": 672, "end_char_pos": 699}, {"type": "A", "before": null, "after": ",", "start_char_pos": 702, "end_char_pos": 702}, {"type": "D", "before": "Ralph Wiggum", "after": null, "start_char_pos": 715, "end_char_pos": 727}, {"type": "R", "before": "L. Ron Hubbard.", "after": ".", "start_char_pos": 867, "end_char_pos": 882}, {"type": "R", "before": "$10 million donation to the organization, surpassing donations from actors Kirstie Alley, John Travolta, and Tom Cruise. Cartwright earns approximately $", "after": "$10 million donation to the organization, surpassing donations from actors , , and . Cartwright earns approximately $", "start_char_pos": 906, "end_char_pos": 1059}, {"type": "R", "before": "Al Jean told The Hollywood Reporter", "after": "told", "start_char_pos": 1194, "end_char_pos": 1229}, {"type": "D", "before": "Butterfinger", "after": null, "start_char_pos": 1461, "end_char_pos": 1473}, {"type": "D", "before": "Matt Groening", "after": null, "start_char_pos": 1506, "end_char_pos": 1519}, {"type": "D", "before": "FOX News", "after": null, "start_char_pos": 1601, "end_char_pos": 1609}, {"type": "D", "before": "jargon", "after": null, "start_char_pos": 2027, "end_char_pos": 2033}, {"type": "D", "before": "Wikinews", "after": null, "start_char_pos": 2558, "end_char_pos": 2566}, {"type": "D", "before": "The Joy of Sect", "after": null, "start_char_pos": 2749, "end_char_pos": 2764}, {"type": "R", "before": "Scientology, the Jim Jones cult and the Peoples Temple, the Heaven's Gate Cult, the Osho movement, the Raelians, the Oneida Society and Chen Tao", "after": ", the and the , the , the , the , the and", "start_char_pos": 2835, "end_char_pos": 2979}, {"type": "R", "before": "Isaac Hayes left South Park", "after": "left", "start_char_pos": 2991, "end_char_pos": 3018}], "sents_char_pos": [0, 167, 224, 463, 613, 786, 882, 1026, 1080, 1174, 1262, 1484, 1587, 1790, 1925, 1998, 2155, 2323, 2372, 2557, 2658, 2682, 2731, 2981]}
+{"doc_id": "120483", "revision_depth": "1", "before_revision": "AMA Supercross Class Results \u2013 San Francisco 31st January Place Rider Bike 1 James Stewart Yamaha 2 Chad Reed Suzuki%DIFDELCMD < %DIFDELCMD < %%% 3 Ryan Villopoto Kawasaki 4 Josh Grant Yamaha%DIFDELCMD < %DIFDELCMD < %%% 5 Andrew Short Honda 6 Kevin Windham Honda%DIFDELCMD < %DIFDELCMD < %%% 7 Josh Hill Yamaha 8 Davi Millsaps Honda%DIFDELCMD < %DIFDELCMD < %%% 9 Mike Allesi Suzuki 10 Ivan Tedesco Honda AMA Supercross Class Season Standing Standing Rider%DIFDELCMD < %DIFDELCMD < %%% Bike Points%DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% 1 Chad Reed%DIFDELCMD < %DIFDELCMD < %%% Suzuki 108%DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% 2 James Stewart%DIFDELCMD < %DIFDELCMD < %%% Yamaha 102%DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% 3 Josh Grant%DIFDELCMD < %DIFDELCMD < %%% Yamaha 95%DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% 4 Ryan Villopoto%DIFDELCMD < %DIFDELCMD < %%% Kawasaki 88%DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% 5 Andrew Short%DIFDELCMD < %DIFDELCMD < %%% Honda%DIFDELCMD < %DIFDELCMD < %%% 87%DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% 6%DIFDELCMD < %DIFDELCMD < %%% Ivan Tedesco%DIFDELCMD < %DIFDELCMD < %%% Honda%DIFDELCMD < %DIFDELCMD < %%% 73%DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% 7%DIFDELCMD < %DIFDELCMD < %%% Kevin Windham%DIFDELCMD < %DIFDELCMD < %%% Honda%DIFDELCMD < %DIFDELCMD < %%% 68%DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% 8%DIFDELCMD < %DIFDELCMD < %%% Mike Allesi%DIFDELCMD < %DIFDELCMD < %%% Suzuki%DIFDELCMD < %DIFDELCMD < %%% 58%DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% 9%DIFDELCMD < %DIFDELCMD < %%% Tim Ferry%DIFDELCMD < %DIFDELCMD < %%% Kawasaki%DIFDELCMD < %DIFDELCMD < %%% 56%DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% 10%DIFDELCMD < %DIFDELCMD < %%% Davi Millsaps%DIFDELCMD < %DIFDELCMD < %%% Honda%DIFDELCMD < %DIFDELCMD < %%% 55", "after_revision": "PlaceRiderBike1James StewartYamaha2Chad ReedSuzuki3Ryan VillopotoKawasaki4Josh GrantYamaha5Andrew ShortHonda6Kevin WindhamHonda7Josh HillYamaha8Davi MillsapsHonda9Mike AllesiSuzuki10 Ivan TedescoHonda %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% AMA Supercross Class Season Standing %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% StandingRider
BikePoints1Chad ReedSuzuki1082James StewartYamaha1023Josh GrantYamaha954Ryan VillopotoKawasaki885Andrew ShortHonda876Ivan TedescoHonda737Kevin WindhamHonda688Mike AllesiSuzuki589Tim FerryKawasaki5610Davi MillsapsHonda55", "edit_actions": [{"type": "R", "before": "AMA Supercross Class Results \u2013 San Francisco 31st January Place Rider Bike", "after": "PlaceRiderBike1James StewartYamaha2Chad ReedSuzuki3Ryan VillopotoKawasaki4Josh GrantYamaha5Andrew ShortHonda6Kevin WindhamHonda7Josh HillYamaha8Davi MillsapsHonda9Mike AllesiSuzuki10 Ivan TedescoHonda", "start_char_pos": 0, "end_char_pos": 74}, {"type": "D", "before": "1 James Stewart Yamaha", "after": null, "start_char_pos": 75, "end_char_pos": 97}, {"type": "D", "before": "2 Chad Reed Suzuki", "after": null, "start_char_pos": 98, "end_char_pos": 116}, {"type": "D", "before": "3 Ryan Villopoto Kawasaki", "after": null, "start_char_pos": 146, "end_char_pos": 171}, {"type": "D", "before": "4 Josh Grant Yamaha", "after": null, "start_char_pos": 172, "end_char_pos": 191}, {"type": "D", "before": "5 Andrew Short Honda", "after": null, "start_char_pos": 221, "end_char_pos": 241}, {"type": "D", "before": "6 Kevin Windham Honda", "after": null, "start_char_pos": 242, "end_char_pos": 263}, {"type": "D", "before": "7 Josh Hill Yamaha", "after": null, "start_char_pos": 293, "end_char_pos": 311}, {"type": "D", "before": "8 Davi Millsaps Honda", "after": null, "start_char_pos": 312, "end_char_pos": 333}, {"type": "D", "before": "9 Mike Allesi Suzuki", "after": null, "start_char_pos": 363, "end_char_pos": 383}, {"type": "D", "before": "10 Ivan Tedesco Honda", "after": null, "start_char_pos": 384, "end_char_pos": 405}, {"type": "D", "before": "Standing", "after": null, "start_char_pos": 443, "end_char_pos": 451}, {"type": "D", "before": "Rider", "after": null, "start_char_pos": 452, "end_char_pos": 457}, {"type": "D", "before": "Bike", "after": null, "start_char_pos": 487, "end_char_pos": 491}, {"type": "D", "before": "Points", "after": null, "start_char_pos": 492, "end_char_pos": 498}, {"type": "D", "before": "1", "after": null, "start_char_pos": 541, "end_char_pos": 542}, {"type": "D", "before": "Chad Reed", "after": null, "start_char_pos": 543, "end_char_pos": 552}, {"type": "D", "before": "Suzuki", "after": null, "start_char_pos": 582, "end_char_pos": 588}, {"type": "D", "before": "108", "after": null, "start_char_pos": 589, "end_char_pos": 592}, {"type": "D", "before": "2", "after": null, "start_char_pos": 635, "end_char_pos": 636}, {"type": "D", "before": "James Stewart", "after": null, "start_char_pos": 637, "end_char_pos": 650}, {"type": "D", "before": "Yamaha", "after": null, "start_char_pos": 680, "end_char_pos": 686}, {"type": "D", "before": "102", "after": null, "start_char_pos": 687, "end_char_pos": 690}, {"type": "D", "before": "3", "after": null, "start_char_pos": 733, "end_char_pos": 734}, {"type": "D", "before": "Josh Grant", "after": null, "start_char_pos": 735, "end_char_pos": 745}, {"type": "D", "before": "Yamaha", "after": null, "start_char_pos": 775, "end_char_pos": 781}, {"type": "D", "before": "95", "after": null, "start_char_pos": 782, "end_char_pos": 784}, {"type": "D", "before": "4", "after": null, "start_char_pos": 827, "end_char_pos": 828}, {"type": "D", "before": "Ryan Villopoto", "after": null, "start_char_pos": 829, "end_char_pos": 843}, {"type": "D", "before": "Kawasaki", "after": null, "start_char_pos": 873, "end_char_pos": 881}, {"type": "D", "before": "88", "after": null, "start_char_pos": 882, "end_char_pos": 884}, {"type": "D", "before": "5", "after": null, "start_char_pos": 927, "end_char_pos": 928}, {"type": "D", "before": "Andrew Short", "after": null, "start_char_pos": 929, "end_char_pos": 941}, {"type": "D", "before": "Honda", "after": null, "start_char_pos": 971, "end_char_pos": 976}, {"type": "D", "before": "87", "after": null, "start_char_pos": 1006, "end_char_pos": 1008}, {"type": "D", "before": "6", "after": null, "start_char_pos": 1051, "end_char_pos": 1052}, {"type": "D", "before": "Ivan Tedesco", "after": null, "start_char_pos": 1082, "end_char_pos": 1094}, {"type": "D", "before": "Honda", "after": null, "start_char_pos": 1124, "end_char_pos": 1129}, {"type": "D", "before": "73", "after": null, "start_char_pos": 1159, "end_char_pos": 1161}, {"type": "D", "before": "7", "after": null, "start_char_pos": 1204, "end_char_pos": 1205}, {"type": "D", "before": "Kevin Windham", "after": null, "start_char_pos": 1235, "end_char_pos": 1248}, {"type": "D", "before": "Honda", "after": null, "start_char_pos": 1278, "end_char_pos": 1283}, {"type": "D", "before": "68", "after": null, "start_char_pos": 1313, "end_char_pos": 1315}, {"type": "D", "before": "8", "after": null, "start_char_pos": 1358, "end_char_pos": 1359}, {"type": "D", "before": "Mike Allesi", "after": null, "start_char_pos": 1389, "end_char_pos": 1400}, {"type": "D", "before": "Suzuki", "after": null, "start_char_pos": 1430, "end_char_pos": 1436}, {"type": "D", "before": "58", "after": null, "start_char_pos": 1466, "end_char_pos": 1468}, {"type": "D", "before": "9", "after": null, "start_char_pos": 1511, "end_char_pos": 1512}, {"type": "D", "before": "Tim Ferry", "after": null, "start_char_pos": 1542, "end_char_pos": 1551}, {"type": "D", "before": "Kawasaki", "after": null, "start_char_pos": 1581, "end_char_pos": 1589}, {"type": "D", "before": "56", "after": null, "start_char_pos": 1619, "end_char_pos": 1621}, {"type": "D", "before": "10", "after": null, "start_char_pos": 1664, "end_char_pos": 1666}, {"type": "D", "before": "Davi Millsaps", "after": null, "start_char_pos": 1696, "end_char_pos": 1709}, {"type": "D", "before": "Honda", "after": null, "start_char_pos": 1739, "end_char_pos": 1744}, {"type": "R", "before": "55", "after": "StandingRiderBikePoints1Chad ReedSuzuki1082James StewartYamaha1023Josh GrantYamaha954Ryan VillopotoKawasaki885Andrew ShortHonda876Ivan TedescoHonda737Kevin WindhamHonda688Mike AllesiSuzuki589Tim FerryKawasaki5610Davi MillsapsHonda55", "start_char_pos": 1774, "end_char_pos": 1776}], "sents_char_pos": [0, 30, 45, 58, 70, 83, 98, 110, 127, 140, 153, 172, 185, 202, 215, 230, 242, 258, 274, 287, 300, 312, 328, 344, 357, 370, 384, 400, 421, 434, 452, 468, 481, 492, 509, 522, 535, 548, 563, 576, 589, 603, 616, 629, 643, 661, 674, 687, 701, 714, 727, 740, 756, 769, 782, 795, 808, 821, 834, 854, 867, 882, 895, 908, 921, 936, 952, 965, 987, 1000, 1019, 1032, 1045, 1063, 1076, 1087, 1105, 1118, 1140, 1153, 1172, 1185, 1198, 1216, 1229, 1241, 1259, 1272, 1294]}
+{"doc_id": "120812", "revision_depth": "1", "before_revision": "Eluana Englaro , who had been in a persistent vegetative state since 1992 following an automobile accident, died Monday at the \"La Quiete\" clinic in Udine , where doctors stopped feeding her four days ago. The case has sparked a debate about euthanasia, as well as a political crisis. Eluana Englaro, undated handout photo. Euthanasia is illegal in Italy, however, refusing treatment is not. On Friday doctors removed her feeding tubes in accordance with a November 2008 ruling by the Constitutional Court of Italy that it was within her father's rights to order the cessation of feeding. Beppino Englaro delivered the news of Eluana's death by telling ANSA : \"Yes, she has left us, but I don't want to say anything, I just want to be alone.\" In an interview with The Guardian last week, Beppino Englaro said: \"If she couldn't be what she was [before the 1992 accident] then she would not have wanted to live.\" At the time of her death, the Italian Senate was working on a law to force doctors to resume feeding Eluana. When her death was announced, the Senate held a moment of silence as a sign of respect. The legislation is continuing and could affect future right-to-die cases. Friday, Berlusconi had attempted to issue a decree to prevent the feeding tubes from being removed. This was however rejected by President Giorgio Napolitano who said it violated high court orders, triggering a constitutional crisis. Massimo D'Alema of the opposition party, Democratic Party of the Left , criticized the Prime Minister. \"Berlusconi has little knowledge of the constitutional culture,\" he said. \"He is a bully who wants to question the president's constitutional democratic powers.\" The Italian Minister of Health Maurizio Sacconi attempted to halt the proceedings on a technicality. According to his office, the court had specified for Eluana Englaro to die in a hospice, which the \"La Quiete\" clinic technically is not. Eluana Englaro's long-time neurologist , Carlo Alberto Defanti, had erroneously predicted that she would survive another eight to ten days. Professor Antonio de Monte, an anesthesiologist who also provided care for her said: \"Eluana died 17 years ago.\" At Sunday's noon blessing, Pope Benedict XVI said, without direct reference to the case, \"Let us pray for all the sick, especially those most seriously ill, who cannot in any way provide for themselves, but are totally dependent on the care of others. Let each of them experience, in the care of those who are near them, the power of God's love and the wealth of his saving grace.\" According to The Times , opinion polls showed the people of Italy to be evenly divided 47/47, with 6 percent undecided, on the issue.", "after_revision": " , who had been in a since 1992 following an automobile accident, died Monday at the \"La Quiete\" clinic in , where doctors stopped feeding her four days ago. The case has sparked a debate about euthanasia, as well as a political crisis. Eluana Englaro, undated handout photo. Euthanasia is illegal in Italy, however, refusing treatment is not. On Friday doctors removed her feeding tubes in accordance with a November 2008 ruling by the that it was within her father's rights to order the cessation of feeding. Beppino Englaro delivered the news of Eluana's death by telling : \"Yes, she has left us, but I don't want to say anything, I just want to be alone.\" In an interview with last week, Beppino Englaro said: \"If she couldn't be what she was [before the 1992 accident] then she would not have wanted to live.\" At the time of her death, the was working on a law to force doctors to resume feeding Eluana. When her death was announced, the Senate held a moment of silence as a sign of respect. The legislation is continuing and could affect future right-to-die cases. Friday, Berlusconi had attempted to issue a decree to prevent the feeding tubes from being removed. This was however rejected by President who said it violated high court orders, triggering a constitutional crisis. of the opposition party, , criticized the Prime Minister. \"Berlusconi has little knowledge of the constitutional culture,\" he said. \"He is a bully who wants to question the president's constitutional democratic powers.\" The Maurizio Sacconi attempted to halt the proceedings on a technicality. According to his office, the court had specified for Eluana Englaro to die in a hospice, which the \"La Quiete\" clinic technically is not. Eluana Englaro's long-time , Carlo Alberto Defanti, had erroneously predicted that she would survive another eight to ten days. Professor Antonio de Monte, an who also provided care for her said: \"Eluana died 17 years ago.\" At Sunday's noon blessing, said, without direct reference to the case, \"Let us pray for all the sick, especially those most seriously ill, who cannot in any way provide for themselves, but are totally dependent on the care of others. Let each of them experience, in the care of those who are near them, the power of God's love and the wealth of his saving grace.\" According to , opinion polls showed the people of Italy to be evenly divided 47/47, with 6 percent undecided, on the issue.", "edit_actions": [{"type": "D", "before": "Eluana Englaro", "after": null, "start_char_pos": 0, "end_char_pos": 14}, {"type": "D", "before": "persistent vegetative state", "after": null, "start_char_pos": 35, "end_char_pos": 62}, {"type": "D", "before": "Udine", "after": null, "start_char_pos": 149, "end_char_pos": 154}, {"type": "D", "before": "Constitutional Court of Italy", "after": null, "start_char_pos": 485, "end_char_pos": 514}, {"type": "D", "before": "ANSA", "after": null, "start_char_pos": 653, "end_char_pos": 657}, {"type": "D", "before": "The Guardian", "after": null, "start_char_pos": 764, "end_char_pos": 776}, {"type": "D", "before": "Italian Senate", "after": null, "start_char_pos": 941, "end_char_pos": 955}, {"type": "D", "before": "Giorgio Napolitano", "after": null, "start_char_pos": 1321, "end_char_pos": 1339}, {"type": "D", "before": "Massimo D'Alema", "after": null, "start_char_pos": 1416, "end_char_pos": 1431}, {"type": "D", "before": "Democratic Party of the Left", "after": null, "start_char_pos": 1457, "end_char_pos": 1485}, {"type": "D", "before": "Italian Minister of Health", "after": null, "start_char_pos": 1685, "end_char_pos": 1711}, {"type": "D", "before": "neurologist", "after": null, "start_char_pos": 1947, "end_char_pos": 1958}, {"type": "D", "before": "anesthesiologist", "after": null, "start_char_pos": 2091, "end_char_pos": 2107}, {"type": "D", "before": "Pope Benedict XVI", "after": null, "start_char_pos": 2200, "end_char_pos": 2217}, {"type": "D", "before": "The Times", "after": null, "start_char_pos": 2568, "end_char_pos": 2577}], "sents_char_pos": [0, 205, 284, 323, 391, 588, 742, 910, 1019, 1107, 1181, 1281, 1415, 1518, 1592, 1680, 1781, 1919, 2059, 2172, 2424, 2554]}
+{"doc_id": "121483", "revision_depth": "1", "before_revision": "Victoria, Crown Princess of Sweden, Duchess of V\u00e4sterg\u00f6tland On February 24th the Swedish Royal Court announced that the Crown Princess Victoria was to be married in 2010 to her boyfriend and former fitness trainer Daniel Westling. Victoria, 31, and Daniel, 35, have been in an relationship for 7 years. Since the wedding is to be held in the summer of 2010 it gives the court 18 months to prepare, contemplate the wedding dress of Victoria , and complete the guest-list \u2013 which will include Europe and the world 's most prominent guests . According to the Swedish constitution, Victoria must ask for the kings approval for the marriage, who then has to call a cabinet council where the government gives its approval. This was done expediently on Tuesday morning, just before the court announced the engagement. After the wedding, Daniel will be given the title of Prince Daniel, Duke of V\u00e4sterg\u00f6tland , but he will not be in line to succeed the Swedish throne . This is because of the fact that Daniel is of neither royal or noble ancestry .", "after_revision": "Victoria, Crown Princess of Sweden, Duchess of V\u00e4sterg\u00f6tland On February 24th the Swedish Royal Court announced that the Crown Princess Victoria is to be married in 2010 to her boyfriend and former fitness trainer Daniel Westling. KP Victoria, 31, and Daniel, 35, have been in an relationship for seven years. As the wedding is to be held in the summer of 2010 , it gives the court 18 months to prepare, contemplate the wedding dress of the Crown Princess , and complete the guest-list \u2013 which will include prominent guests from Europe and the world . According to the Swedish constitution, KP Victoria must ask for the King's approval for the marriage, who then has to call a cabinet council so that the government can give its approval. This was done on Tuesday morning, just before the court announced the engagement. After the wedding, Daniel will be given the title of Prince Daniel, Duke of V\u00e4sterg\u00f6tland . Their children will be next in line to the throne after Crown Princess Victoria .", "edit_actions": [{"type": "R", "before": "was", "after": "is", "start_char_pos": 145, "end_char_pos": 148}, {"type": "A", "before": null, "after": "KP", "start_char_pos": 232, "end_char_pos": 232}, {"type": "R", "before": "7 years. Since", "after": "seven years. As", "start_char_pos": 296, "end_char_pos": 310}, {"type": "A", "before": null, "after": ",", "start_char_pos": 359, "end_char_pos": 359}, {"type": "R", "before": "Victoria", "after": "the Crown Princess", "start_char_pos": 434, "end_char_pos": 442}, {"type": "A", "before": null, "after": "prominent guests from", "start_char_pos": 494, "end_char_pos": 494}, {"type": "D", "before": "'s most prominent guests", "after": null, "start_char_pos": 516, "end_char_pos": 540}, {"type": "A", "before": null, "after": "KP", "start_char_pos": 582, "end_char_pos": 582}, {"type": "R", "before": "kings", "after": "King's", "start_char_pos": 609, "end_char_pos": 614}, {"type": "R", "before": "where the government gives", "after": "so that the government can give", "start_char_pos": 681, "end_char_pos": 707}, {"type": "D", "before": "expediently", "after": null, "start_char_pos": 736, "end_char_pos": 747}, {"type": "R", "before": ", but he will not be", "after": ". Their children will be next", "start_char_pos": 906, "end_char_pos": 926}, {"type": "R", "before": "succeed the Swedish throne . This is because of the fact that Daniel is of neither royal or noble ancestry", "after": "the throne after Crown Princess Victoria", "start_char_pos": 938, "end_char_pos": 1044}], "sents_char_pos": [0, 231, 304, 542, 721, 815, 966]}
+{"doc_id": "122558", "revision_depth": "1", "before_revision": "180px|Sikorsky S-92: detail of rotor The fuselage of the Sikorsky S92 helicopter that crashed in the Atlantic Ocean on Friday has been found at a depth 120 to 150 meters and is being retrieved. 17 of the 18 people who were on board the helicopter died after it crashed. Personal belongings, upper and lower segments of the main entrance door, the aft cargo door, and one emergency exit door have been recovered. \u201cWe totally dissect everything we can and certainly that is going to be an area that will be examined,\" said Mike Cunningham, lead investigator with the Transportation Safety Board (TSB). \"It looks like the fuselage is relatively intact.\" An underwater remotely operated vehicle (ROV) is aiding in the investigation. The recovered body is that of Allison Maher from Aquaforte, Newfoundland , aged 26. Throughout the search and rescue there were no locator signals received from survival suits of any of those missing. The Royal Canadian Mounted Police (RCMP) have released the names of twelve of those who are are still missing. It is a partial list, as some relatives were \"not prepared at this point of time to release the names of their loved ones, and we respect that,\" said Supt. Reg Reeves. They are: Peter Breen, from St. John's, N.L. age 55; Gary Corbett, from Conception Bay South, N.L. age 46; Wade Drake, from Fortune, N.L. age 42; Wade Duggan, from Witless Bay, N.L. age 32; Colin Henley, from St. John's, N.L. age 38; Ken MacRae, from Greenwood, N.S. age 47; Derrick Mullowney, from Bay Bulls, N.L. age 51; Burch Nash, from Fortune, N.L. age 44; Paul Pike, from Bay Roberts, N.L. age 49; Allison Maher,from Aquaforte, N.L., age 26 Tim Lanouette, from Comox, B.C., helicopter first officer age 48; and Thomas Anwyll, from Langley, B.C. Crew member age 46.", "after_revision": "180px|Sikorsky S-92: detail of rotor The fuselage of the Sikorsky S92 helicopter that crashed in the on Friday has been found at a depth 120 to 150 meters and is being retrieved. 17 of the 18 people who were on board the helicopter died after it crashed. Personal belongings, upper and lower segments of the main entrance door, the aft cargo door, and one emergency exit door have been recovered. \u201cWe totally dissect everything we can and certainly that is going to be an area that will be examined,\" said Mike Cunningham, lead investigator with the Transportation Safety Board (TSB). \"It looks like the fuselage is relatively intact.\" An underwater (ROV) is aiding in the investigation. The recovered body is that of Allison Maher from Aquaforte, , aged 26. Throughout the search and rescue there were no locator signals received from survival suits of any of those missing. The (RCMP) have released the names of twelve of those who are are still missing. It is a partial list, as some relatives were \"not prepared at this point of time to release the names of their loved ones, and we respect that,\" said Supt. Reg Reeves. They are: Peter Breen, from age 55; Gary Corbett, from age 46; Wade Drake, from age 42; Wade Duggan, from age 32; Colin Henley, from St. John's, N.L. age 38; Ken MacRae, from age 47; Derrick Mullowney, from age 51; Burch Nash, from Fortune, N.L. age 44; Paul Pike, from age 49; Allison Maher,from , age 26 Tim Lanouette, from , helicopter first officer age 48; and Thomas Anwyll, from Crew member age 46.", "edit_actions": [{"type": "D", "before": "Atlantic Ocean", "after": null, "start_char_pos": 101, "end_char_pos": 115}, {"type": "D", "before": "remotely operated vehicle", "after": null, "start_char_pos": 665, "end_char_pos": 690}, {"type": "D", "before": "Newfoundland", "after": null, "start_char_pos": 789, "end_char_pos": 801}, {"type": "D", "before": "Royal Canadian Mounted Police", "after": null, "start_char_pos": 934, "end_char_pos": 963}, {"type": "D", "before": "St. John's, N.L.", "after": null, "start_char_pos": 1237, "end_char_pos": 1253}, {"type": "D", "before": "Conception Bay South, N.L.", "after": null, "start_char_pos": 1281, "end_char_pos": 1307}, {"type": "D", "before": "Fortune, N.L.", "after": null, "start_char_pos": 1333, "end_char_pos": 1346}, {"type": "D", "before": "Witless Bay, N.L.", "after": null, "start_char_pos": 1373, "end_char_pos": 1390}, {"type": "D", "before": "Greenwood, N.S.", "after": null, "start_char_pos": 1460, "end_char_pos": 1475}, {"type": "D", "before": "Bay Bulls, N.L.", "after": null, "start_char_pos": 1508, "end_char_pos": 1523}, {"type": "D", "before": "Bay Roberts, N.L.", "after": null, "start_char_pos": 1587, "end_char_pos": 1604}, {"type": "R", "before": "Aquaforte, N.L.,", "after": ",", "start_char_pos": 1632, "end_char_pos": 1648}, {"type": "R", "before": "Comox, B.C.,", "after": ",", "start_char_pos": 1676, "end_char_pos": 1688}, {"type": "D", "before": "Langley, B.C.", "after": null, "start_char_pos": 1746, "end_char_pos": 1759}], "sents_char_pos": [0, 193, 269, 411, 599, 650, 728, 812, 929, 1040, 1196, 1208, 1261, 1315, 1354, 1398, 1442, 1483, 1531, 1570, 1612, 1721]}
+{"doc_id": "124824", "revision_depth": "2", "before_revision": "January datenews 2008-01-01 category=January 1, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-02 category=January 2, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-03 category=January 3, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-04 category=January 4, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-05 category=January 5, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-06 category=January 6, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-07 category=January 7, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-08 category=January 8, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 9, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 10, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 11, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 12, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 13, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 14, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 15, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 16, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 17, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 18, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 19, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 20, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 21, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 22, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 23, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 24, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 25, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 26, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 27, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 28, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 29, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 30, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-01-09 category=January 31, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true February datenews 2008-02-01 category=February 1, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-02 category=February 2, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-03 category=February 3, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-04 category=February 4, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-05 category=February 5, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-06 category=February 6, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-07 category=February 7, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-08 category=February 8, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 9, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 10, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 11, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 12, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 13, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 14, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 15, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 16, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 17, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 18, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 19, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 20, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 21, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 22, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 23, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 24, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 25, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 26, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 27, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 28, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-02-09 category=February 29, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true March datenews 2008-03-01 category=March 1, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-02 category=March 2, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-03 category=March 3, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-04 category=March 4, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-05 category=March 5, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-06 category=March 6, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-07 category=March 7, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-08 category=March 8, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 9, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 10, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 11, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 12, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 13, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 14, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 15, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 16, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 17, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 18, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 19, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 20, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 21, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 22, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 23, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 24, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 25, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 26, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 27, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 28, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 29, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 30, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-03-09 category=March 31, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true April datenews 2008-04-01 category=April 1, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-02 category=April 2, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-03 category=April 3, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-04 category=April 4, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-05 category=April 5, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-06 category=April 6, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-07 category=April 7, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-08 category=April 8, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 9, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 10, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 11, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 12, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 13, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 14, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 15, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 16, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 17, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 18, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 19, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 20, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 21, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 22, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 23, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 24, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 25, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 26, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 27, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 28, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 29, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-04-09 category=April 30, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true May datenews 2008-05-01 category=May 1, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-02 category=May 2, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-03 category=May 3, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-04 category=May 4, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-05 category=May 5, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-06 category=May 6, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-07 category=May 7, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-08 category=May 8, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 9, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 10, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 11, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 12, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 13, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 14, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 15, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 16, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 17, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 18, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 19, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 20, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 21, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 22, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 23, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 24, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 25, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 26, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 27, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 28, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 29, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 30, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-05-09 category=May 31, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true June datenews 2008-06-01 category=June 1, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-02 category=June 2, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-03 category=June 3, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-04 category=June 4, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-05 category=June 5, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-06 category=June 6, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-07 category=June 7, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-08 category=June 8, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 9, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 10, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 11, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 12, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 13, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 14, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 15, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 16, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 17, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 18, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 19, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 20, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 21, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 22, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 23, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 24, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 25, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 26, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 27, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 28, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 29, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-06-09 category=June 30, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true July datenews 2008-07-01 category=July 1, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-02 category=July 2, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-03 category=July 3, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-04 category=July 4, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-05 category=July 5, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-06 category=July 6, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-07 category=July 7, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-08 category=July 8, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 9, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 10, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 11, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 12, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 13, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 14, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 15, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 16, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 17, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 18, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 19, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 20, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 21, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 22, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 23, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 24, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 25, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 26, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 27, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 28, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 29, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 30, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-07-09 category=July 31, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true August datenews 2008-08-01 category=August 1, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-02 category=August 2, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-03 category=August 3, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-04 category=August 4, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-05 category=August 5, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-06 category=August 6, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-07 category=August 7, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-08 category=August 8, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 9, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 10, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 11, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 12, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 13, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 14, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 15, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 16, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 17, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 18, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 19, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 20, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 21, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 22, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 23, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 24, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 25, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 26, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 27, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 28, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 29, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 30, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-08-09 category=August 31, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true September datenews 2008-09-01 category=September 1, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-02 category=September 2, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-03 category=September 3, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-04 category=September 4, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-05 category=September 5, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-06 category=September 6, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-07 category=September 7, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-08 category=September 8, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 9, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 10, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 11, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 12, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 13, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 14, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 15, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 16, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 17, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 18, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 19, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 20, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 21, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 22, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 23, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 24, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 25, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 26, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 27, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 28, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 29, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-09-09 category=September 30, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true October datenews 2008-10-01 category=October 1, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-02 category=October 2, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-03 category=October 3, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-04 category=October 4, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-05 category=October 5, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-06 category=October 6, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-07 category=October 7, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-08 category=October 8, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 9, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 10, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 11, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 12, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 13, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 14, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 15, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 16, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 17, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 18, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 19, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 20, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 21, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 22, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 23, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 24, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 25, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 26, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 27, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 28, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 29, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 30, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-10-09 category=October 31, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true November datenews 2008-11-01 category=November 1, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-02 category=November 2, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-03 category=November 3, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-04 category=November 4, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-05 category=November 5, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-06 category=November 6, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-07 category=November 7, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-08 category=November 8, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 9, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 10, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 11, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 12, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 13, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 14, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 15, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 16, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 17, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 18, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 19, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 20, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 21, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 22, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 23, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 24, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 25, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 26, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 27, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 28, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 29, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-11-09 category=November 30, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true December datenews 2008-12-01 category=December 1, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-02 category=December 2, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-03 category=December 3, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-04 category=December 4, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-05 category=December 5, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-06 category=December 6, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-07 category=December 7, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-08 category=December 8, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 9, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 10, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 11, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 12, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 13, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 14, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 15, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 16, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 17, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 18, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 19, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 20, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 21, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 22, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 23, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 24, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 25, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 26, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 27, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 28, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 29, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 30, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=true 2008-12-09 category=December 31, 2008 category=Published category=Australia notcategory=Disputed suppresserrors=tru", "after_revision": "January datenews 2007-01-01 category=January 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-02 category=January 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-03 category=January 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-04 category=January 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-05 category=January 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-06 category=January 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-07 category=January 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-08 category=January 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-10 category=January 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-11 category=January 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-12 category=January 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-13 category=January 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-14 category=January 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-15 category=January 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-16 category=January 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-17 category=January 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-18 category=January 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-19 category=January 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-20 category=January 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-21 category=January 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-22 category=January 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-23 category=January 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-24 category=January 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-25 category=January 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-26 category=January 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-27 category=January 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-28 category=January 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-29 category=January 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-30 category=January 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-31 category=January 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true February datenews 2007-02-01 category=February 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-02 category=February 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-03 category=February 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-04 category=February 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-05 category=February 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-06 category=February 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-07 category=February 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-08 category=February 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-10 category=February 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-11 category=February 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-12 category=February 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-13 category=February 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-14 category=February 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-15 category=February 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-16 category=February 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-17 category=February 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-18 category=February 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-19 category=February 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-20 category=February 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-21 category=February 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-22 category=February 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-23 category=February 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-24 category=February 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-25 category=February 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-26 category=February 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-27 category=February 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-28 category=February 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-29 category=February 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true March datenews 2007-03-01 category=March 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-02 category=March 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-03 category=March 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-04 category=March 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-05 category=March 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-06 category=March 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-07 category=March 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-08 category=March 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-10 category=March 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-11 category=March 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-12 category=March 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-13 category=March 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-14 category=March 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-15 category=March 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-16 category=March 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-17 category=March 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-18 category=March 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-19 category=March 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-20 category=March 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-21 category=March 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-22 category=March 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-23 category=March 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-24 category=March 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-25 category=March 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-26 category=March 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-27 category=March 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-28 category=March 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-29 category=March 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-30 category=March 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-31 category=March 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true April datenews 2007-04-01 category=April 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-02 category=April 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-03 category=April 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-04 category=April 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-05 category=April 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-06 category=April 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-07 category=April 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-08 category=April 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-10 category=April 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-11 category=April 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-12 category=April 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-13 category=April 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-14 category=April 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-15 category=April 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-16 category=April 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-17 category=April 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-18 category=April 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-19 category=April 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-20 category=April 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-21 category=April 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-22 category=April 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-23 category=April 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-24 category=April 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-25 category=April 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-26 category=April 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-27 category=April 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-28 category=April 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-29 category=April 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-30 category=April 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true May datenews 2007-05-01 category=May 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-02 category=May 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-03 category=May 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-04 category=May 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-05 category=May 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-06 category=May 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-07 category=May 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-08 category=May 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-10 category=May 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-11 category=May 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-12 category=May 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-13 category=May 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-14 category=May 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-15 category=May 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-16 category=May 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-17 category=May 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-18 category=May 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-19 category=May 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-20 category=May 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-21 category=May 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-22 category=May 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-23 category=May 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-24 category=May 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-25 category=May 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-26 category=May 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-27 category=May 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-28 category=May 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-29 category=May 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-30 category=May 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-31 category=May 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true June datenews 2007-06-01 category=June 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-02 category=June 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-03 category=June 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-04 category=June 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-05 category=June 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-06 category=June 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-07 category=June 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-08 category=June 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-10 category=June 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-11 category=June 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-12 category=June 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-13 category=June 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-14 category=June 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-15 category=June 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-16 category=June 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-17 category=June 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-18 category=June 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-19 category=June 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-20 category=June 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-21 category=June 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-22 category=June 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-23 category=June 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-24 category=June 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-25 category=June 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-26 category=June 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-27 category=June 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-28 category=June 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-29 category=June 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-30 category=June 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true July datenews 2007-07-01 category=July 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-02 category=July 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-03 category=July 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-04 category=July 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-05 category=July 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-06 category=July 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-07 category=July 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-08 category=July 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-10 category=July 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-11 category=July 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-12 category=July 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-13 category=July 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-14 category=July 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-15 category=July 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-16 category=July 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-17 category=July 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-18 category=July 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-19 category=July 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-20 category=July 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-21 category=July 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-22 category=July 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-23 category=July 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-24 category=July 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-25 category=July 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-26 category=July 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-27 category=July 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-28 category=July 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-29 category=July 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-30 category=July 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-31 category=July 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true August datenews 2007-08-01 category=August 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-02 category=August 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-03 category=August 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-04 category=August 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-05 category=August 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-06 category=August 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-07 category=August 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-08 category=August 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-10 category=August 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-11 category=August 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-12 category=August 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-13 category=August 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-14 category=August 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-15 category=August 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-16 category=August 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-17 category=August 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-18 category=August 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-19 category=August 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-20 category=August 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-21 category=August 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-22 category=August 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-23 category=August 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-24 category=August 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-25 category=August 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-26 category=August 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-27 category=August 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-28 category=August 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-29 category=August 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-30 category=August 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-31 category=August 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true September datenews 2007-09-01 category=September 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-02 category=September 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-03 category=September 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-04 category=September 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-05 category=September 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-06 category=September 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-07 category=September 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-08 category=September 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-10 category=September 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-11 category=September 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-12 category=September 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-13 category=September 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-14 category=September 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-15 category=September 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-16 category=September 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-17 category=September 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-18 category=September 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-19 category=September 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-20 category=September 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-21 category=September 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-22 category=September 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-23 category=September 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-24 category=September 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-25 category=September 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-26 category=September 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-27 category=September 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-28 category=September 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-29 category=September 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-30 category=September 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true October datenews 2007-10-01 category=October 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-02 category=October 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-03 category=October 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-04 category=October 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-05 category=October 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-06 category=October 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-07 category=October 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-08 category=October 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-10 category=October 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-11 category=October 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-12 category=October 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-13 category=October 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-14 category=October 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-15 category=October 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-16 category=October 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-17 category=October 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-18 category=October 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-19 category=October 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-20 category=October 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-21 category=October 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-22 category=October 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-23 category=October 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-24 category=October 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-25 category=October 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-26 category=October 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-27 category=October 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-28 category=October 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-29 category=October 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-30 category=October 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-31 category=October 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true November datenews 2007-11-01 category=November 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-02 category=November 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-03 category=November 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-04 category=November 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-05 category=November 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-06 category=November 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-07 category=November 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-08 category=November 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-10 category=November 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-11 category=November 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-12 category=November 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-13 category=November 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-14 category=November 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-15 category=November 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-16 category=November 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-17 category=November 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-18 category=November 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-19 category=November 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-20 category=November 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-21 category=November 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-22 category=November 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-23 category=November 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-24 category=November 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-25 category=November 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-26 category=November 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-27 category=November 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-28 category=November 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-29 category=November 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-30 category=November 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true December datenews 2007-12-01 category=December 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-02 category=December 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-03 category=December 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-04 category=December 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-05 category=December 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-06 category=December 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-07 category=December 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-08 category=December 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-10 category=December 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-11 category=December 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-12 category=December 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-13 category=December 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-14 category=December 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-15 category=December 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-16 category=December 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-17 category=December 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-18 category=December 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-19 category=December 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-20 category=December 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-21 category=December 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-22 category=December 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-23 category=December 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-24 category=December 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-25 category=December 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-26 category=December 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-27 category=December 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-28 category=December 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-29 category=December 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-30 category=December 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-31 category=December 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=tru", "edit_actions": [{"type": "R", "before": "2008-01-01", "after": "2007-01-01", "start_char_pos": 17, "end_char_pos": 27}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 48, "end_char_pos": 52}, {"type": "R", "before": "2008-01-02", "after": "2007-01-02", "start_char_pos": 132, "end_char_pos": 142}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 163, "end_char_pos": 167}, {"type": "R", "before": "2008-01-03", "after": "2007-01-03", "start_char_pos": 247, "end_char_pos": 257}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 278, "end_char_pos": 282}, {"type": "R", "before": "2008-01-04", "after": "2007-01-04", "start_char_pos": 362, "end_char_pos": 372}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 393, "end_char_pos": 397}, {"type": "R", "before": "2008-01-05", "after": "2007-01-05", "start_char_pos": 477, "end_char_pos": 487}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 508, "end_char_pos": 512}, {"type": "R", "before": "2008-01-06", "after": "2007-01-06", "start_char_pos": 592, "end_char_pos": 602}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 623, "end_char_pos": 627}, {"type": "R", "before": "2008-01-07", "after": "2007-01-07", "start_char_pos": 707, "end_char_pos": 717}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 738, "end_char_pos": 742}, {"type": "R", "before": "2008-01-08", "after": "2007-01-08", "start_char_pos": 822, "end_char_pos": 832}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 853, "end_char_pos": 857}, {"type": "R", "before": "2008-01-09", "after": "2007-01-09", "start_char_pos": 937, "end_char_pos": 947}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 968, "end_char_pos": 972}, {"type": "R", "before": "2008-01-09", "after": "2007-01-10", "start_char_pos": 1052, "end_char_pos": 1062}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 1084, "end_char_pos": 1088}, {"type": "R", "before": "2008-01-09", "after": "2007-01-11", "start_char_pos": 1168, "end_char_pos": 1178}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 1200, "end_char_pos": 1204}, {"type": "R", "before": "2008-01-09", "after": "2007-01-12", "start_char_pos": 1284, "end_char_pos": 1294}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 1316, "end_char_pos": 1320}, {"type": "R", "before": "2008-01-09", "after": "2007-01-13", "start_char_pos": 1400, "end_char_pos": 1410}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 1432, "end_char_pos": 1436}, {"type": "R", "before": "2008-01-09", "after": "2007-01-14", "start_char_pos": 1516, "end_char_pos": 1526}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 1548, "end_char_pos": 1552}, {"type": "R", "before": "2008-01-09", "after": "2007-01-15", "start_char_pos": 1632, "end_char_pos": 1642}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 1664, "end_char_pos": 1668}, {"type": "R", "before": "2008-01-09", "after": "2007-01-16", "start_char_pos": 1748, "end_char_pos": 1758}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 1780, "end_char_pos": 1784}, {"type": "R", "before": "2008-01-09", "after": "2007-01-17", "start_char_pos": 1864, "end_char_pos": 1874}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 1896, "end_char_pos": 1900}, {"type": "R", "before": "2008-01-09", "after": "2007-01-18", "start_char_pos": 1980, "end_char_pos": 1990}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 2012, "end_char_pos": 2016}, {"type": "R", "before": "2008-01-09", "after": "2007-01-19", "start_char_pos": 2096, "end_char_pos": 2106}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 2128, "end_char_pos": 2132}, {"type": "R", "before": "2008-01-09", "after": "2007-01-20", "start_char_pos": 2212, "end_char_pos": 2222}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 2244, "end_char_pos": 2248}, {"type": "R", "before": "2008-01-09", "after": "2007-01-21", "start_char_pos": 2328, "end_char_pos": 2338}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 2360, "end_char_pos": 2364}, {"type": "R", "before": "2008-01-09", "after": "2007-01-22", "start_char_pos": 2444, "end_char_pos": 2454}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 2476, "end_char_pos": 2480}, {"type": "R", "before": "2008-01-09", "after": "2007-01-23", "start_char_pos": 2560, "end_char_pos": 2570}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 2592, "end_char_pos": 2596}, {"type": "R", "before": "2008-01-09", "after": "2007-01-24", "start_char_pos": 2676, "end_char_pos": 2686}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 2708, "end_char_pos": 2712}, {"type": "R", "before": "2008-01-09", "after": "2007-01-25", "start_char_pos": 2792, "end_char_pos": 2802}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 2824, "end_char_pos": 2828}, {"type": "R", "before": "2008-01-09", "after": "2007-01-26", "start_char_pos": 2908, "end_char_pos": 2918}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 2940, "end_char_pos": 2944}, {"type": "R", "before": "2008-01-09", "after": "2007-01-27", "start_char_pos": 3024, "end_char_pos": 3034}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 3056, "end_char_pos": 3060}, {"type": "R", "before": "2008-01-09", "after": "2007-01-28", "start_char_pos": 3140, "end_char_pos": 3150}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 3172, "end_char_pos": 3176}, {"type": "R", "before": "2008-01-09", "after": "2007-01-29", "start_char_pos": 3256, "end_char_pos": 3266}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 3288, "end_char_pos": 3292}, {"type": "R", "before": "2008-01-09", "after": "2007-01-30", "start_char_pos": 3372, "end_char_pos": 3382}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 3404, "end_char_pos": 3408}, {"type": "R", "before": "2008-01-09", "after": "2007-01-31", "start_char_pos": 3488, "end_char_pos": 3498}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 3520, "end_char_pos": 3524}, {"type": "R", "before": "2008-02-01", "after": "2007-02-01", "start_char_pos": 3622, "end_char_pos": 3632}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 3654, "end_char_pos": 3658}, {"type": "R", "before": "2008-02-02", "after": "2007-02-02", "start_char_pos": 3738, "end_char_pos": 3748}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 3770, "end_char_pos": 3774}, {"type": "R", "before": "2008-02-03", "after": "2007-02-03", "start_char_pos": 3854, "end_char_pos": 3864}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 3886, "end_char_pos": 3890}, {"type": "R", "before": "2008-02-04", "after": "2007-02-04", "start_char_pos": 3970, "end_char_pos": 3980}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 4002, "end_char_pos": 4006}, {"type": "R", "before": "2008-02-05", "after": "2007-02-05", "start_char_pos": 4086, "end_char_pos": 4096}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 4118, "end_char_pos": 4122}, {"type": "R", "before": "2008-02-06", "after": "2007-02-06", "start_char_pos": 4202, "end_char_pos": 4212}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 4234, "end_char_pos": 4238}, {"type": "R", "before": "2008-02-07", "after": "2007-02-07", "start_char_pos": 4318, "end_char_pos": 4328}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 4350, "end_char_pos": 4354}, {"type": "R", "before": "2008-02-08", "after": "2007-02-08", "start_char_pos": 4434, "end_char_pos": 4444}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 4466, "end_char_pos": 4470}, {"type": "R", "before": "2008-02-09", "after": "2007-02-09", "start_char_pos": 4550, "end_char_pos": 4560}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 4582, "end_char_pos": 4586}, {"type": "R", "before": "2008-02-09", "after": "2007-02-10", "start_char_pos": 4666, "end_char_pos": 4676}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 4699, "end_char_pos": 4703}, {"type": "R", "before": "2008-02-09", "after": "2007-02-11", "start_char_pos": 4783, "end_char_pos": 4793}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 4816, "end_char_pos": 4820}, {"type": "R", "before": "2008-02-09", "after": "2007-02-12", "start_char_pos": 4900, "end_char_pos": 4910}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 4933, "end_char_pos": 4937}, {"type": "R", "before": "2008-02-09", "after": "2007-02-13", "start_char_pos": 5017, "end_char_pos": 5027}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 5050, "end_char_pos": 5054}, {"type": "R", "before": "2008-02-09", "after": "2007-02-14", "start_char_pos": 5134, "end_char_pos": 5144}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 5167, "end_char_pos": 5171}, {"type": "R", "before": "2008-02-09", "after": "2007-02-15", "start_char_pos": 5251, "end_char_pos": 5261}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 5284, "end_char_pos": 5288}, {"type": "R", "before": "2008-02-09", "after": "2007-02-16", "start_char_pos": 5368, "end_char_pos": 5378}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 5401, "end_char_pos": 5405}, {"type": "R", "before": "2008-02-09", "after": "2007-02-17", "start_char_pos": 5485, "end_char_pos": 5495}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 5518, "end_char_pos": 5522}, {"type": "R", "before": "2008-02-09", "after": "2007-02-18", "start_char_pos": 5602, "end_char_pos": 5612}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 5635, "end_char_pos": 5639}, {"type": "R", "before": "2008-02-09", "after": "2007-02-19", "start_char_pos": 5719, "end_char_pos": 5729}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 5752, "end_char_pos": 5756}, {"type": "R", "before": "2008-02-09", "after": "2007-02-20", "start_char_pos": 5836, "end_char_pos": 5846}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 5869, "end_char_pos": 5873}, {"type": "R", "before": "2008-02-09", "after": "2007-02-21", "start_char_pos": 5953, "end_char_pos": 5963}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 5986, "end_char_pos": 5990}, {"type": "R", "before": "2008-02-09", "after": "2007-02-22", "start_char_pos": 6070, "end_char_pos": 6080}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 6103, "end_char_pos": 6107}, {"type": "R", "before": "2008-02-09", "after": "2007-02-23", "start_char_pos": 6187, "end_char_pos": 6197}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 6220, "end_char_pos": 6224}, {"type": "R", "before": "2008-02-09", "after": "2007-02-24", "start_char_pos": 6304, "end_char_pos": 6314}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 6337, "end_char_pos": 6341}, {"type": "R", "before": "2008-02-09", "after": "2007-02-25", "start_char_pos": 6421, "end_char_pos": 6431}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 6454, "end_char_pos": 6458}, {"type": "R", "before": "2008-02-09", "after": "2007-02-26", "start_char_pos": 6538, "end_char_pos": 6548}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 6571, "end_char_pos": 6575}, {"type": "R", "before": "2008-02-09", "after": "2007-02-27", "start_char_pos": 6655, "end_char_pos": 6665}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 6688, "end_char_pos": 6692}, {"type": "R", "before": "2008-02-09", "after": "2007-02-28", "start_char_pos": 6772, "end_char_pos": 6782}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 6805, "end_char_pos": 6809}, {"type": "R", "before": "2008-02-09", "after": "2007-02-29", "start_char_pos": 6889, "end_char_pos": 6899}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 6922, "end_char_pos": 6926}, {"type": "R", "before": "2008-03-01", "after": "2007-03-01", "start_char_pos": 7021, "end_char_pos": 7031}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 7050, "end_char_pos": 7054}, {"type": "R", "before": "2008-03-02", "after": "2007-03-02", "start_char_pos": 7134, "end_char_pos": 7144}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 7163, "end_char_pos": 7167}, {"type": "R", "before": "2008-03-03", "after": "2007-03-03", "start_char_pos": 7247, "end_char_pos": 7257}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 7276, "end_char_pos": 7280}, {"type": "R", "before": "2008-03-04", "after": "2007-03-04", "start_char_pos": 7360, "end_char_pos": 7370}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 7389, "end_char_pos": 7393}, {"type": "R", "before": "2008-03-05", "after": "2007-03-05", "start_char_pos": 7473, "end_char_pos": 7483}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 7502, "end_char_pos": 7506}, {"type": "R", "before": "2008-03-06", "after": "2007-03-06", "start_char_pos": 7586, "end_char_pos": 7596}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 7615, "end_char_pos": 7619}, {"type": "R", "before": "2008-03-07", "after": "2007-03-07", "start_char_pos": 7699, "end_char_pos": 7709}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 7728, "end_char_pos": 7732}, {"type": "R", "before": "2008-03-08", "after": "2007-03-08", "start_char_pos": 7812, "end_char_pos": 7822}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 7841, "end_char_pos": 7845}, {"type": "R", "before": "2008-03-09", "after": "2007-03-09", "start_char_pos": 7925, "end_char_pos": 7935}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 7954, "end_char_pos": 7958}, {"type": "R", "before": "2008-03-09", "after": "2007-03-10", "start_char_pos": 8038, "end_char_pos": 8048}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 8068, "end_char_pos": 8072}, {"type": "R", "before": "2008-03-09", "after": "2007-03-11", "start_char_pos": 8152, "end_char_pos": 8162}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 8182, "end_char_pos": 8186}, {"type": "R", "before": "2008-03-09", "after": "2007-03-12", "start_char_pos": 8266, "end_char_pos": 8276}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 8296, "end_char_pos": 8300}, {"type": "R", "before": "2008-03-09", "after": "2007-03-13", "start_char_pos": 8380, "end_char_pos": 8390}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 8410, "end_char_pos": 8414}, {"type": "R", "before": "2008-03-09", "after": "2007-03-14", "start_char_pos": 8494, "end_char_pos": 8504}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 8524, "end_char_pos": 8528}, {"type": "R", "before": "2008-03-09", "after": "2007-03-15", "start_char_pos": 8608, "end_char_pos": 8618}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 8638, "end_char_pos": 8642}, {"type": "R", "before": "2008-03-09", "after": "2007-03-16", "start_char_pos": 8722, "end_char_pos": 8732}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 8752, "end_char_pos": 8756}, {"type": "R", "before": "2008-03-09", "after": "2007-03-17", "start_char_pos": 8836, "end_char_pos": 8846}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 8866, "end_char_pos": 8870}, {"type": "R", "before": "2008-03-09", "after": "2007-03-18", "start_char_pos": 8950, "end_char_pos": 8960}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 8980, "end_char_pos": 8984}, {"type": "R", "before": "2008-03-09", "after": "2007-03-19", "start_char_pos": 9064, "end_char_pos": 9074}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 9094, "end_char_pos": 9098}, {"type": "R", "before": "2008-03-09", "after": "2007-03-20", "start_char_pos": 9178, "end_char_pos": 9188}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 9208, "end_char_pos": 9212}, {"type": "R", "before": "2008-03-09", "after": "2007-03-21", "start_char_pos": 9292, "end_char_pos": 9302}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 9322, "end_char_pos": 9326}, {"type": "R", "before": "2008-03-09", "after": "2007-03-22", "start_char_pos": 9406, "end_char_pos": 9416}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 9436, "end_char_pos": 9440}, {"type": "R", "before": "2008-03-09", "after": "2007-03-23", "start_char_pos": 9520, "end_char_pos": 9530}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 9550, "end_char_pos": 9554}, {"type": "R", "before": "2008-03-09", "after": "2007-03-24", "start_char_pos": 9634, "end_char_pos": 9644}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 9664, "end_char_pos": 9668}, {"type": "R", "before": "2008-03-09", "after": "2007-03-25", "start_char_pos": 9748, "end_char_pos": 9758}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 9778, "end_char_pos": 9782}, {"type": "R", "before": "2008-03-09", "after": "2007-03-26", "start_char_pos": 9862, "end_char_pos": 9872}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 9892, "end_char_pos": 9896}, {"type": "R", "before": "2008-03-09", "after": "2007-03-27", "start_char_pos": 9976, "end_char_pos": 9986}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 10006, "end_char_pos": 10010}, {"type": "R", "before": "2008-03-09", "after": "2007-03-28", "start_char_pos": 10090, "end_char_pos": 10100}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 10120, "end_char_pos": 10124}, {"type": "R", "before": "2008-03-09", "after": "2007-03-29", "start_char_pos": 10204, "end_char_pos": 10214}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 10234, "end_char_pos": 10238}, {"type": "R", "before": "2008-03-09", "after": "2007-03-30", "start_char_pos": 10318, "end_char_pos": 10328}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 10348, "end_char_pos": 10352}, {"type": "R", "before": "2008-03-09", "after": "2007-03-31", "start_char_pos": 10432, "end_char_pos": 10442}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 10462, "end_char_pos": 10466}, {"type": "R", "before": "2008-04-01", "after": "2007-04-01", "start_char_pos": 10561, "end_char_pos": 10571}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 10590, "end_char_pos": 10594}, {"type": "R", "before": "2008-04-02", "after": "2007-04-02", "start_char_pos": 10674, "end_char_pos": 10684}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 10703, "end_char_pos": 10707}, {"type": "R", "before": "2008-04-03", "after": "2007-04-03", "start_char_pos": 10787, "end_char_pos": 10797}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 10816, "end_char_pos": 10820}, {"type": "R", "before": "2008-04-04", "after": "2007-04-04", "start_char_pos": 10900, "end_char_pos": 10910}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 10929, "end_char_pos": 10933}, {"type": "R", "before": "2008-04-05", "after": "2007-04-05", "start_char_pos": 11013, "end_char_pos": 11023}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 11042, "end_char_pos": 11046}, {"type": "R", "before": "2008-04-06", "after": "2007-04-06", "start_char_pos": 11126, "end_char_pos": 11136}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 11155, "end_char_pos": 11159}, {"type": "R", "before": "2008-04-07", "after": "2007-04-07", "start_char_pos": 11239, "end_char_pos": 11249}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 11268, "end_char_pos": 11272}, {"type": "R", "before": "2008-04-08", "after": "2007-04-08", "start_char_pos": 11352, "end_char_pos": 11362}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 11381, "end_char_pos": 11385}, {"type": "R", "before": "2008-04-09", "after": "2007-04-09", "start_char_pos": 11465, "end_char_pos": 11475}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 11494, "end_char_pos": 11498}, {"type": "R", "before": "2008-04-09", "after": "2007-04-10", "start_char_pos": 11578, "end_char_pos": 11588}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 11608, "end_char_pos": 11612}, {"type": "R", "before": "2008-04-09", "after": "2007-04-11", "start_char_pos": 11692, "end_char_pos": 11702}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 11722, "end_char_pos": 11726}, {"type": "R", "before": "2008-04-09", "after": "2007-04-12", "start_char_pos": 11806, "end_char_pos": 11816}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 11836, "end_char_pos": 11840}, {"type": "R", "before": "2008-04-09", "after": "2007-04-13", "start_char_pos": 11920, "end_char_pos": 11930}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 11950, "end_char_pos": 11954}, {"type": "R", "before": "2008-04-09", "after": "2007-04-14", "start_char_pos": 12034, "end_char_pos": 12044}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 12064, "end_char_pos": 12068}, {"type": "R", "before": "2008-04-09", "after": "2007-04-15", "start_char_pos": 12148, "end_char_pos": 12158}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 12178, "end_char_pos": 12182}, {"type": "R", "before": "2008-04-09", "after": "2007-04-16", "start_char_pos": 12262, "end_char_pos": 12272}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 12292, "end_char_pos": 12296}, {"type": "R", "before": "2008-04-09", "after": "2007-04-17", "start_char_pos": 12376, "end_char_pos": 12386}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 12406, "end_char_pos": 12410}, {"type": "R", "before": "2008-04-09", "after": "2007-04-18", "start_char_pos": 12490, "end_char_pos": 12500}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 12520, "end_char_pos": 12524}, {"type": "R", "before": "2008-04-09", "after": "2007-04-19", "start_char_pos": 12604, "end_char_pos": 12614}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 12634, "end_char_pos": 12638}, {"type": "R", "before": "2008-04-09", "after": "2007-04-20", "start_char_pos": 12718, "end_char_pos": 12728}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 12748, "end_char_pos": 12752}, {"type": "R", "before": "2008-04-09", "after": "2007-04-21", "start_char_pos": 12832, "end_char_pos": 12842}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 12862, "end_char_pos": 12866}, {"type": "R", "before": "2008-04-09", "after": "2007-04-22", "start_char_pos": 12946, "end_char_pos": 12956}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 12976, "end_char_pos": 12980}, {"type": "R", "before": "2008-04-09", "after": "2007-04-23", "start_char_pos": 13060, "end_char_pos": 13070}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 13090, "end_char_pos": 13094}, {"type": "R", "before": "2008-04-09", "after": "2007-04-24", "start_char_pos": 13174, "end_char_pos": 13184}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 13204, "end_char_pos": 13208}, {"type": "R", "before": "2008-04-09", "after": "2007-04-25", "start_char_pos": 13288, "end_char_pos": 13298}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 13318, "end_char_pos": 13322}, {"type": "R", "before": "2008-04-09", "after": "2007-04-26", "start_char_pos": 13402, "end_char_pos": 13412}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 13432, "end_char_pos": 13436}, {"type": "R", "before": "2008-04-09", "after": "2007-04-27", "start_char_pos": 13516, "end_char_pos": 13526}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 13546, "end_char_pos": 13550}, {"type": "R", "before": "2008-04-09", "after": "2007-04-28", "start_char_pos": 13630, "end_char_pos": 13640}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 13660, "end_char_pos": 13664}, {"type": "R", "before": "2008-04-09", "after": "2007-04-29", "start_char_pos": 13744, "end_char_pos": 13754}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 13774, "end_char_pos": 13778}, {"type": "R", "before": "2008-04-09", "after": "2007-04-30", "start_char_pos": 13858, "end_char_pos": 13868}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 13888, "end_char_pos": 13892}, {"type": "R", "before": "2008-05-01", "after": "2007-05-01", "start_char_pos": 13985, "end_char_pos": 13995}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 14012, "end_char_pos": 14016}, {"type": "R", "before": "2008-05-02", "after": "2007-05-02", "start_char_pos": 14096, "end_char_pos": 14106}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 14123, "end_char_pos": 14127}, {"type": "R", "before": "2008-05-03", "after": "2007-05-03", "start_char_pos": 14207, "end_char_pos": 14217}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 14234, "end_char_pos": 14238}, {"type": "R", "before": "2008-05-04", "after": "2007-05-04", "start_char_pos": 14318, "end_char_pos": 14328}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 14345, "end_char_pos": 14349}, {"type": "R", "before": "2008-05-05", "after": "2007-05-05", "start_char_pos": 14429, "end_char_pos": 14439}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 14456, "end_char_pos": 14460}, {"type": "R", "before": "2008-05-06", "after": "2007-05-06", "start_char_pos": 14540, "end_char_pos": 14550}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 14567, "end_char_pos": 14571}, {"type": "R", "before": "2008-05-07", "after": "2007-05-07", "start_char_pos": 14651, "end_char_pos": 14661}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 14678, "end_char_pos": 14682}, {"type": "R", "before": "2008-05-08", "after": "2007-05-08", "start_char_pos": 14762, "end_char_pos": 14772}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 14789, "end_char_pos": 14793}, {"type": "R", "before": "2008-05-09", "after": "2007-05-09", "start_char_pos": 14873, "end_char_pos": 14883}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 14900, "end_char_pos": 14904}, {"type": "R", "before": "2008-05-09", "after": "2007-05-10", "start_char_pos": 14984, "end_char_pos": 14994}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 15012, "end_char_pos": 15016}, {"type": "R", "before": "2008-05-09", "after": "2007-05-11", "start_char_pos": 15096, "end_char_pos": 15106}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 15124, "end_char_pos": 15128}, {"type": "R", "before": "2008-05-09", "after": "2007-05-12", "start_char_pos": 15208, "end_char_pos": 15218}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 15236, "end_char_pos": 15240}, {"type": "R", "before": "2008-05-09", "after": "2007-05-13", "start_char_pos": 15320, "end_char_pos": 15330}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 15348, "end_char_pos": 15352}, {"type": "R", "before": "2008-05-09", "after": "2007-05-14", "start_char_pos": 15432, "end_char_pos": 15442}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 15460, "end_char_pos": 15464}, {"type": "R", "before": "2008-05-09", "after": "2007-05-15", "start_char_pos": 15544, "end_char_pos": 15554}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 15572, "end_char_pos": 15576}, {"type": "R", "before": "2008-05-09", "after": "2007-05-16", "start_char_pos": 15656, "end_char_pos": 15666}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 15684, "end_char_pos": 15688}, {"type": "R", "before": "2008-05-09", "after": "2007-05-17", "start_char_pos": 15768, "end_char_pos": 15778}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 15796, "end_char_pos": 15800}, {"type": "R", "before": "2008-05-09", "after": "2007-05-18", "start_char_pos": 15880, "end_char_pos": 15890}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 15908, "end_char_pos": 15912}, {"type": "R", "before": "2008-05-09", "after": "2007-05-19", "start_char_pos": 15992, "end_char_pos": 16002}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 16020, "end_char_pos": 16024}, {"type": "R", "before": "2008-05-09", "after": "2007-05-20", "start_char_pos": 16104, "end_char_pos": 16114}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 16132, "end_char_pos": 16136}, {"type": "R", "before": "2008-05-09", "after": "2007-05-21", "start_char_pos": 16216, "end_char_pos": 16226}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 16244, "end_char_pos": 16248}, {"type": "R", "before": "2008-05-09", "after": "2007-05-22", "start_char_pos": 16328, "end_char_pos": 16338}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 16356, "end_char_pos": 16360}, {"type": "R", "before": "2008-05-09", "after": "2007-05-23", "start_char_pos": 16440, "end_char_pos": 16450}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 16468, "end_char_pos": 16472}, {"type": "R", "before": "2008-05-09", "after": "2007-05-24", "start_char_pos": 16552, "end_char_pos": 16562}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 16580, "end_char_pos": 16584}, {"type": "R", "before": "2008-05-09", "after": "2007-05-25", "start_char_pos": 16664, "end_char_pos": 16674}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 16692, "end_char_pos": 16696}, {"type": "R", "before": "2008-05-09", "after": "2007-05-26", "start_char_pos": 16776, "end_char_pos": 16786}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 16804, "end_char_pos": 16808}, {"type": "R", "before": "2008-05-09", "after": "2007-05-27", "start_char_pos": 16888, "end_char_pos": 16898}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 16916, "end_char_pos": 16920}, {"type": "R", "before": "2008-05-09", "after": "2007-05-28", "start_char_pos": 17000, "end_char_pos": 17010}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 17028, "end_char_pos": 17032}, {"type": "R", "before": "2008-05-09", "after": "2007-05-29", "start_char_pos": 17112, "end_char_pos": 17122}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 17140, "end_char_pos": 17144}, {"type": "R", "before": "2008-05-09", "after": "2007-05-30", "start_char_pos": 17224, "end_char_pos": 17234}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 17252, "end_char_pos": 17256}, {"type": "R", "before": "2008-05-09", "after": "2007-05-31", "start_char_pos": 17336, "end_char_pos": 17346}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 17364, "end_char_pos": 17368}, {"type": "R", "before": "2008-06-01", "after": "2007-06-01", "start_char_pos": 17462, "end_char_pos": 17472}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 17490, "end_char_pos": 17494}, {"type": "R", "before": "2008-06-02", "after": "2007-06-02", "start_char_pos": 17574, "end_char_pos": 17584}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 17602, "end_char_pos": 17606}, {"type": "R", "before": "2008-06-03", "after": "2007-06-03", "start_char_pos": 17686, "end_char_pos": 17696}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 17714, "end_char_pos": 17718}, {"type": "R", "before": "2008-06-04", "after": "2007-06-04", "start_char_pos": 17798, "end_char_pos": 17808}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 17826, "end_char_pos": 17830}, {"type": "R", "before": "2008-06-05", "after": "2007-06-05", "start_char_pos": 17910, "end_char_pos": 17920}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 17938, "end_char_pos": 17942}, {"type": "R", "before": "2008-06-06", "after": "2007-06-06", "start_char_pos": 18022, "end_char_pos": 18032}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 18050, "end_char_pos": 18054}, {"type": "R", "before": "2008-06-07", "after": "2007-06-07", "start_char_pos": 18134, "end_char_pos": 18144}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 18162, "end_char_pos": 18166}, {"type": "R", "before": "2008-06-08", "after": "2007-06-08", "start_char_pos": 18246, "end_char_pos": 18256}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 18274, "end_char_pos": 18278}, {"type": "R", "before": "2008-06-09", "after": "2007-06-09", "start_char_pos": 18358, "end_char_pos": 18368}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 18386, "end_char_pos": 18390}, {"type": "R", "before": "2008-06-09", "after": "2007-06-10", "start_char_pos": 18470, "end_char_pos": 18480}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 18499, "end_char_pos": 18503}, {"type": "R", "before": "2008-06-09", "after": "2007-06-11", "start_char_pos": 18583, "end_char_pos": 18593}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 18612, "end_char_pos": 18616}, {"type": "R", "before": "2008-06-09", "after": "2007-06-12", "start_char_pos": 18696, "end_char_pos": 18706}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 18725, "end_char_pos": 18729}, {"type": "R", "before": "2008-06-09", "after": "2007-06-13", "start_char_pos": 18809, "end_char_pos": 18819}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 18838, "end_char_pos": 18842}, {"type": "R", "before": "2008-06-09", "after": "2007-06-14", "start_char_pos": 18922, "end_char_pos": 18932}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 18951, "end_char_pos": 18955}, {"type": "R", "before": "2008-06-09", "after": "2007-06-15", "start_char_pos": 19035, "end_char_pos": 19045}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 19064, "end_char_pos": 19068}, {"type": "R", "before": "2008-06-09", "after": "2007-06-16", "start_char_pos": 19148, "end_char_pos": 19158}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 19177, "end_char_pos": 19181}, {"type": "R", "before": "2008-06-09", "after": "2007-06-17", "start_char_pos": 19261, "end_char_pos": 19271}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 19290, "end_char_pos": 19294}, {"type": "R", "before": "2008-06-09", "after": "2007-06-18", "start_char_pos": 19374, "end_char_pos": 19384}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 19403, "end_char_pos": 19407}, {"type": "R", "before": "2008-06-09", "after": "2007-06-19", "start_char_pos": 19487, "end_char_pos": 19497}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 19516, "end_char_pos": 19520}, {"type": "R", "before": "2008-06-09", "after": "2007-06-20", "start_char_pos": 19600, "end_char_pos": 19610}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 19629, "end_char_pos": 19633}, {"type": "R", "before": "2008-06-09", "after": "2007-06-21", "start_char_pos": 19713, "end_char_pos": 19723}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 19742, "end_char_pos": 19746}, {"type": "R", "before": "2008-06-09", "after": "2007-06-22", "start_char_pos": 19826, "end_char_pos": 19836}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 19855, "end_char_pos": 19859}, {"type": "R", "before": "2008-06-09", "after": "2007-06-23", "start_char_pos": 19939, "end_char_pos": 19949}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 19968, "end_char_pos": 19972}, {"type": "R", "before": "2008-06-09", "after": "2007-06-24", "start_char_pos": 20052, "end_char_pos": 20062}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 20081, "end_char_pos": 20085}, {"type": "R", "before": "2008-06-09", "after": "2007-06-25", "start_char_pos": 20165, "end_char_pos": 20175}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 20194, "end_char_pos": 20198}, {"type": "R", "before": "2008-06-09", "after": "2007-06-26", "start_char_pos": 20278, "end_char_pos": 20288}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 20307, "end_char_pos": 20311}, {"type": "R", "before": "2008-06-09", "after": "2007-06-27", "start_char_pos": 20391, "end_char_pos": 20401}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 20420, "end_char_pos": 20424}, {"type": "R", "before": "2008-06-09", "after": "2007-06-28", "start_char_pos": 20504, "end_char_pos": 20514}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 20533, "end_char_pos": 20537}, {"type": "R", "before": "2008-06-09", "after": "2007-06-29", "start_char_pos": 20617, "end_char_pos": 20627}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 20646, "end_char_pos": 20650}, {"type": "R", "before": "2008-06-09", "after": "2007-06-30", "start_char_pos": 20730, "end_char_pos": 20740}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 20759, "end_char_pos": 20763}, {"type": "R", "before": "2008-07-01", "after": "2007-07-01", "start_char_pos": 20857, "end_char_pos": 20867}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 20885, "end_char_pos": 20889}, {"type": "R", "before": "2008-07-02", "after": "2007-07-02", "start_char_pos": 20969, "end_char_pos": 20979}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 20997, "end_char_pos": 21001}, {"type": "R", "before": "2008-07-03", "after": "2007-07-03", "start_char_pos": 21081, "end_char_pos": 21091}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 21109, "end_char_pos": 21113}, {"type": "R", "before": "2008-07-04", "after": "2007-07-04", "start_char_pos": 21193, "end_char_pos": 21203}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 21221, "end_char_pos": 21225}, {"type": "R", "before": "2008-07-05", "after": "2007-07-05", "start_char_pos": 21305, "end_char_pos": 21315}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 21333, "end_char_pos": 21337}, {"type": "R", "before": "2008-07-06", "after": "2007-07-06", "start_char_pos": 21417, "end_char_pos": 21427}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 21445, "end_char_pos": 21449}, {"type": "R", "before": "2008-07-07", "after": "2007-07-07", "start_char_pos": 21529, "end_char_pos": 21539}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 21557, "end_char_pos": 21561}, {"type": "R", "before": "2008-07-08", "after": "2007-07-08", "start_char_pos": 21641, "end_char_pos": 21651}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 21669, "end_char_pos": 21673}, {"type": "R", "before": "2008-07-09", "after": "2007-07-09", "start_char_pos": 21753, "end_char_pos": 21763}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 21781, "end_char_pos": 21785}, {"type": "R", "before": "2008-07-09", "after": "2007-07-10", "start_char_pos": 21865, "end_char_pos": 21875}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 21894, "end_char_pos": 21898}, {"type": "R", "before": "2008-07-09", "after": "2007-07-11", "start_char_pos": 21978, "end_char_pos": 21988}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 22007, "end_char_pos": 22011}, {"type": "R", "before": "2008-07-09", "after": "2007-07-12", "start_char_pos": 22091, "end_char_pos": 22101}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 22120, "end_char_pos": 22124}, {"type": "R", "before": "2008-07-09", "after": "2007-07-13", "start_char_pos": 22204, "end_char_pos": 22214}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 22233, "end_char_pos": 22237}, {"type": "R", "before": "2008-07-09", "after": "2007-07-14", "start_char_pos": 22317, "end_char_pos": 22327}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 22346, "end_char_pos": 22350}, {"type": "R", "before": "2008-07-09", "after": "2007-07-15", "start_char_pos": 22430, "end_char_pos": 22440}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 22459, "end_char_pos": 22463}, {"type": "R", "before": "2008-07-09", "after": "2007-07-16", "start_char_pos": 22543, "end_char_pos": 22553}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 22572, "end_char_pos": 22576}, {"type": "R", "before": "2008-07-09", "after": "2007-07-17", "start_char_pos": 22656, "end_char_pos": 22666}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 22685, "end_char_pos": 22689}, {"type": "R", "before": "2008-07-09", "after": "2007-07-18", "start_char_pos": 22769, "end_char_pos": 22779}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 22798, "end_char_pos": 22802}, {"type": "R", "before": "2008-07-09", "after": "2007-07-19", "start_char_pos": 22882, "end_char_pos": 22892}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 22911, "end_char_pos": 22915}, {"type": "R", "before": "2008-07-09", "after": "2007-07-20", "start_char_pos": 22995, "end_char_pos": 23005}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 23024, "end_char_pos": 23028}, {"type": "R", "before": "2008-07-09", "after": "2007-07-21", "start_char_pos": 23108, "end_char_pos": 23118}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 23137, "end_char_pos": 23141}, {"type": "R", "before": "2008-07-09", "after": "2007-07-22", "start_char_pos": 23221, "end_char_pos": 23231}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 23250, "end_char_pos": 23254}, {"type": "R", "before": "2008-07-09", "after": "2007-07-23", "start_char_pos": 23334, "end_char_pos": 23344}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 23363, "end_char_pos": 23367}, {"type": "R", "before": "2008-07-09", "after": "2007-07-24", "start_char_pos": 23447, "end_char_pos": 23457}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 23476, "end_char_pos": 23480}, {"type": "R", "before": "2008-07-09", "after": "2007-07-25", "start_char_pos": 23560, "end_char_pos": 23570}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 23589, "end_char_pos": 23593}, {"type": "R", "before": "2008-07-09", "after": "2007-07-26", "start_char_pos": 23673, "end_char_pos": 23683}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 23702, "end_char_pos": 23706}, {"type": "R", "before": "2008-07-09", "after": "2007-07-27", "start_char_pos": 23786, "end_char_pos": 23796}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 23815, "end_char_pos": 23819}, {"type": "R", "before": "2008-07-09", "after": "2007-07-28", "start_char_pos": 23899, "end_char_pos": 23909}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 23928, "end_char_pos": 23932}, {"type": "R", "before": "2008-07-09", "after": "2007-07-29", "start_char_pos": 24012, "end_char_pos": 24022}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 24041, "end_char_pos": 24045}, {"type": "R", "before": "2008-07-09", "after": "2007-07-30", "start_char_pos": 24125, "end_char_pos": 24135}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 24154, "end_char_pos": 24158}, {"type": "R", "before": "2008-07-09", "after": "2007-07-31", "start_char_pos": 24238, "end_char_pos": 24248}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 24267, "end_char_pos": 24271}, {"type": "R", "before": "2008-08-01", "after": "2007-08-01", "start_char_pos": 24367, "end_char_pos": 24377}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 24397, "end_char_pos": 24401}, {"type": "R", "before": "2008-08-02", "after": "2007-08-02", "start_char_pos": 24481, "end_char_pos": 24491}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 24511, "end_char_pos": 24515}, {"type": "R", "before": "2008-08-03", "after": "2007-08-03", "start_char_pos": 24595, "end_char_pos": 24605}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 24625, "end_char_pos": 24629}, {"type": "R", "before": "2008-08-04", "after": "2007-08-04", "start_char_pos": 24709, "end_char_pos": 24719}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 24739, "end_char_pos": 24743}, {"type": "R", "before": "2008-08-05", "after": "2007-08-05", "start_char_pos": 24823, "end_char_pos": 24833}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 24853, "end_char_pos": 24857}, {"type": "R", "before": "2008-08-06", "after": "2007-08-06", "start_char_pos": 24937, "end_char_pos": 24947}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 24967, "end_char_pos": 24971}, {"type": "R", "before": "2008-08-07", "after": "2007-08-07", "start_char_pos": 25051, "end_char_pos": 25061}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 25081, "end_char_pos": 25085}, {"type": "R", "before": "2008-08-08", "after": "2007-08-08", "start_char_pos": 25165, "end_char_pos": 25175}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 25195, "end_char_pos": 25199}, {"type": "R", "before": "2008-08-09", "after": "2007-08-09", "start_char_pos": 25279, "end_char_pos": 25289}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 25309, "end_char_pos": 25313}, {"type": "R", "before": "2008-08-09", "after": "2007-08-10", "start_char_pos": 25393, "end_char_pos": 25403}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 25424, "end_char_pos": 25428}, {"type": "R", "before": "2008-08-09", "after": "2007-08-11", "start_char_pos": 25508, "end_char_pos": 25518}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 25539, "end_char_pos": 25543}, {"type": "R", "before": "2008-08-09", "after": "2007-08-12", "start_char_pos": 25623, "end_char_pos": 25633}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 25654, "end_char_pos": 25658}, {"type": "R", "before": "2008-08-09", "after": "2007-08-13", "start_char_pos": 25738, "end_char_pos": 25748}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 25769, "end_char_pos": 25773}, {"type": "R", "before": "2008-08-09", "after": "2007-08-14", "start_char_pos": 25853, "end_char_pos": 25863}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 25884, "end_char_pos": 25888}, {"type": "R", "before": "2008-08-09", "after": "2007-08-15", "start_char_pos": 25968, "end_char_pos": 25978}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 25999, "end_char_pos": 26003}, {"type": "R", "before": "2008-08-09", "after": "2007-08-16", "start_char_pos": 26083, "end_char_pos": 26093}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 26114, "end_char_pos": 26118}, {"type": "R", "before": "2008-08-09", "after": "2007-08-17", "start_char_pos": 26198, "end_char_pos": 26208}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 26229, "end_char_pos": 26233}, {"type": "R", "before": "2008-08-09", "after": "2007-08-18", "start_char_pos": 26313, "end_char_pos": 26323}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 26344, "end_char_pos": 26348}, {"type": "R", "before": "2008-08-09", "after": "2007-08-19", "start_char_pos": 26428, "end_char_pos": 26438}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 26459, "end_char_pos": 26463}, {"type": "R", "before": "2008-08-09", "after": "2007-08-20", "start_char_pos": 26543, "end_char_pos": 26553}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 26574, "end_char_pos": 26578}, {"type": "R", "before": "2008-08-09", "after": "2007-08-21", "start_char_pos": 26658, "end_char_pos": 26668}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 26689, "end_char_pos": 26693}, {"type": "R", "before": "2008-08-09", "after": "2007-08-22", "start_char_pos": 26773, "end_char_pos": 26783}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 26804, "end_char_pos": 26808}, {"type": "R", "before": "2008-08-09", "after": "2007-08-23", "start_char_pos": 26888, "end_char_pos": 26898}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 26919, "end_char_pos": 26923}, {"type": "R", "before": "2008-08-09", "after": "2007-08-24", "start_char_pos": 27003, "end_char_pos": 27013}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 27034, "end_char_pos": 27038}, {"type": "R", "before": "2008-08-09", "after": "2007-08-25", "start_char_pos": 27118, "end_char_pos": 27128}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 27149, "end_char_pos": 27153}, {"type": "R", "before": "2008-08-09", "after": "2007-08-26", "start_char_pos": 27233, "end_char_pos": 27243}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 27264, "end_char_pos": 27268}, {"type": "R", "before": "2008-08-09", "after": "2007-08-27", "start_char_pos": 27348, "end_char_pos": 27358}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 27379, "end_char_pos": 27383}, {"type": "R", "before": "2008-08-09", "after": "2007-08-28", "start_char_pos": 27463, "end_char_pos": 27473}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 27494, "end_char_pos": 27498}, {"type": "R", "before": "2008-08-09", "after": "2007-08-29", "start_char_pos": 27578, "end_char_pos": 27588}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 27609, "end_char_pos": 27613}, {"type": "R", "before": "2008-08-09", "after": "2007-08-30", "start_char_pos": 27693, "end_char_pos": 27703}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 27724, "end_char_pos": 27728}, {"type": "R", "before": "2008-08-09", "after": "2007-08-31", "start_char_pos": 27808, "end_char_pos": 27818}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 27839, "end_char_pos": 27843}, {"type": "R", "before": "2008-09-01", "after": "2007-09-01", "start_char_pos": 27942, "end_char_pos": 27952}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 27975, "end_char_pos": 27979}, {"type": "R", "before": "2008-09-02", "after": "2007-09-02", "start_char_pos": 28059, "end_char_pos": 28069}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 28092, "end_char_pos": 28096}, {"type": "R", "before": "2008-09-03", "after": "2007-09-03", "start_char_pos": 28176, "end_char_pos": 28186}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 28209, "end_char_pos": 28213}, {"type": "R", "before": "2008-09-04", "after": "2007-09-04", "start_char_pos": 28293, "end_char_pos": 28303}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 28326, "end_char_pos": 28330}, {"type": "R", "before": "2008-09-05", "after": "2007-09-05", "start_char_pos": 28410, "end_char_pos": 28420}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 28443, "end_char_pos": 28447}, {"type": "R", "before": "2008-09-06", "after": "2007-09-06", "start_char_pos": 28527, "end_char_pos": 28537}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 28560, "end_char_pos": 28564}, {"type": "R", "before": "2008-09-07", "after": "2007-09-07", "start_char_pos": 28644, "end_char_pos": 28654}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 28677, "end_char_pos": 28681}, {"type": "R", "before": "2008-09-08", "after": "2007-09-08", "start_char_pos": 28761, "end_char_pos": 28771}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 28794, "end_char_pos": 28798}, {"type": "R", "before": "2008-09-09", "after": "2007-09-09", "start_char_pos": 28878, "end_char_pos": 28888}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 28911, "end_char_pos": 28915}, {"type": "R", "before": "2008-09-09", "after": "2007-09-10", "start_char_pos": 28995, "end_char_pos": 29005}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 29029, "end_char_pos": 29033}, {"type": "R", "before": "2008-09-09", "after": "2007-09-11", "start_char_pos": 29113, "end_char_pos": 29123}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 29147, "end_char_pos": 29151}, {"type": "R", "before": "2008-09-09", "after": "2007-09-12", "start_char_pos": 29231, "end_char_pos": 29241}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 29265, "end_char_pos": 29269}, {"type": "R", "before": "2008-09-09", "after": "2007-09-13", "start_char_pos": 29349, "end_char_pos": 29359}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 29383, "end_char_pos": 29387}, {"type": "R", "before": "2008-09-09", "after": "2007-09-14", "start_char_pos": 29467, "end_char_pos": 29477}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 29501, "end_char_pos": 29505}, {"type": "R", "before": "2008-09-09", "after": "2007-09-15", "start_char_pos": 29585, "end_char_pos": 29595}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 29619, "end_char_pos": 29623}, {"type": "R", "before": "2008-09-09", "after": "2007-09-16", "start_char_pos": 29703, "end_char_pos": 29713}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 29737, "end_char_pos": 29741}, {"type": "R", "before": "2008-09-09", "after": "2007-09-17", "start_char_pos": 29821, "end_char_pos": 29831}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 29855, "end_char_pos": 29859}, {"type": "R", "before": "2008-09-09", "after": "2007-09-18", "start_char_pos": 29939, "end_char_pos": 29949}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 29973, "end_char_pos": 29977}, {"type": "R", "before": "2008-09-09", "after": "2007-09-19", "start_char_pos": 30057, "end_char_pos": 30067}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 30091, "end_char_pos": 30095}, {"type": "R", "before": "2008-09-09", "after": "2007-09-20", "start_char_pos": 30175, "end_char_pos": 30185}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 30209, "end_char_pos": 30213}, {"type": "R", "before": "2008-09-09", "after": "2007-09-21", "start_char_pos": 30293, "end_char_pos": 30303}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 30327, "end_char_pos": 30331}, {"type": "R", "before": "2008-09-09", "after": "2007-09-22", "start_char_pos": 30411, "end_char_pos": 30421}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 30445, "end_char_pos": 30449}, {"type": "R", "before": "2008-09-09", "after": "2007-09-23", "start_char_pos": 30529, "end_char_pos": 30539}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 30563, "end_char_pos": 30567}, {"type": "R", "before": "2008-09-09", "after": "2007-09-24", "start_char_pos": 30647, "end_char_pos": 30657}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 30681, "end_char_pos": 30685}, {"type": "R", "before": "2008-09-09", "after": "2007-09-25", "start_char_pos": 30765, "end_char_pos": 30775}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 30799, "end_char_pos": 30803}, {"type": "R", "before": "2008-09-09", "after": "2007-09-26", "start_char_pos": 30883, "end_char_pos": 30893}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 30917, "end_char_pos": 30921}, {"type": "R", "before": "2008-09-09", "after": "2007-09-27", "start_char_pos": 31001, "end_char_pos": 31011}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 31035, "end_char_pos": 31039}, {"type": "R", "before": "2008-09-09", "after": "2007-09-28", "start_char_pos": 31119, "end_char_pos": 31129}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 31153, "end_char_pos": 31157}, {"type": "R", "before": "2008-09-09", "after": "2007-09-29", "start_char_pos": 31237, "end_char_pos": 31247}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 31271, "end_char_pos": 31275}, {"type": "R", "before": "2008-09-09", "after": "2007-09-30", "start_char_pos": 31355, "end_char_pos": 31365}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 31389, "end_char_pos": 31393}, {"type": "R", "before": "2008-10-01", "after": "2007-10-01", "start_char_pos": 31490, "end_char_pos": 31500}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 31521, "end_char_pos": 31525}, {"type": "R", "before": "2008-10-02", "after": "2007-10-02", "start_char_pos": 31605, "end_char_pos": 31615}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 31636, "end_char_pos": 31640}, {"type": "R", "before": "2008-10-03", "after": "2007-10-03", "start_char_pos": 31720, "end_char_pos": 31730}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 31751, "end_char_pos": 31755}, {"type": "R", "before": "2008-10-04", "after": "2007-10-04", "start_char_pos": 31835, "end_char_pos": 31845}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 31866, "end_char_pos": 31870}, {"type": "R", "before": "2008-10-05", "after": "2007-10-05", "start_char_pos": 31950, "end_char_pos": 31960}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 31981, "end_char_pos": 31985}, {"type": "R", "before": "2008-10-06", "after": "2007-10-06", "start_char_pos": 32065, "end_char_pos": 32075}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 32096, "end_char_pos": 32100}, {"type": "R", "before": "2008-10-07", "after": "2007-10-07", "start_char_pos": 32180, "end_char_pos": 32190}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 32211, "end_char_pos": 32215}, {"type": "R", "before": "2008-10-08", "after": "2007-10-08", "start_char_pos": 32295, "end_char_pos": 32305}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 32326, "end_char_pos": 32330}, {"type": "R", "before": "2008-10-09", "after": "2007-10-09", "start_char_pos": 32410, "end_char_pos": 32420}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 32441, "end_char_pos": 32445}, {"type": "R", "before": "2008-10-09", "after": "2007-10-10", "start_char_pos": 32525, "end_char_pos": 32535}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 32557, "end_char_pos": 32561}, {"type": "R", "before": "2008-10-09", "after": "2007-10-11", "start_char_pos": 32641, "end_char_pos": 32651}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 32673, "end_char_pos": 32677}, {"type": "R", "before": "2008-10-09", "after": "2007-10-12", "start_char_pos": 32757, "end_char_pos": 32767}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 32789, "end_char_pos": 32793}, {"type": "R", "before": "2008-10-09", "after": "2007-10-13", "start_char_pos": 32873, "end_char_pos": 32883}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 32905, "end_char_pos": 32909}, {"type": "R", "before": "2008-10-09", "after": "2007-10-14", "start_char_pos": 32989, "end_char_pos": 32999}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 33021, "end_char_pos": 33025}, {"type": "R", "before": "2008-10-09", "after": "2007-10-15", "start_char_pos": 33105, "end_char_pos": 33115}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 33137, "end_char_pos": 33141}, {"type": "R", "before": "2008-10-09", "after": "2007-10-16", "start_char_pos": 33221, "end_char_pos": 33231}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 33253, "end_char_pos": 33257}, {"type": "R", "before": "2008-10-09", "after": "2007-10-17", "start_char_pos": 33337, "end_char_pos": 33347}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 33369, "end_char_pos": 33373}, {"type": "R", "before": "2008-10-09", "after": "2007-10-18", "start_char_pos": 33453, "end_char_pos": 33463}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 33485, "end_char_pos": 33489}, {"type": "R", "before": "2008-10-09", "after": "2007-10-19", "start_char_pos": 33569, "end_char_pos": 33579}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 33601, "end_char_pos": 33605}, {"type": "R", "before": "2008-10-09", "after": "2007-10-20", "start_char_pos": 33685, "end_char_pos": 33695}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 33717, "end_char_pos": 33721}, {"type": "R", "before": "2008-10-09", "after": "2007-10-21", "start_char_pos": 33801, "end_char_pos": 33811}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 33833, "end_char_pos": 33837}, {"type": "R", "before": "2008-10-09", "after": "2007-10-22", "start_char_pos": 33917, "end_char_pos": 33927}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 33949, "end_char_pos": 33953}, {"type": "R", "before": "2008-10-09", "after": "2007-10-23", "start_char_pos": 34033, "end_char_pos": 34043}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 34065, "end_char_pos": 34069}, {"type": "R", "before": "2008-10-09", "after": "2007-10-24", "start_char_pos": 34149, "end_char_pos": 34159}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 34181, "end_char_pos": 34185}, {"type": "R", "before": "2008-10-09", "after": "2007-10-25", "start_char_pos": 34265, "end_char_pos": 34275}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 34297, "end_char_pos": 34301}, {"type": "R", "before": "2008-10-09", "after": "2007-10-26", "start_char_pos": 34381, "end_char_pos": 34391}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 34413, "end_char_pos": 34417}, {"type": "R", "before": "2008-10-09", "after": "2007-10-27", "start_char_pos": 34497, "end_char_pos": 34507}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 34529, "end_char_pos": 34533}, {"type": "R", "before": "2008-10-09", "after": "2007-10-28", "start_char_pos": 34613, "end_char_pos": 34623}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 34645, "end_char_pos": 34649}, {"type": "R", "before": "2008-10-09", "after": "2007-10-29", "start_char_pos": 34729, "end_char_pos": 34739}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 34761, "end_char_pos": 34765}, {"type": "R", "before": "2008-10-09", "after": "2007-10-30", "start_char_pos": 34845, "end_char_pos": 34855}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 34877, "end_char_pos": 34881}, {"type": "R", "before": "2008-10-09", "after": "2007-10-31", "start_char_pos": 34961, "end_char_pos": 34971}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 34993, "end_char_pos": 34997}, {"type": "R", "before": "2008-11-01", "after": "2007-11-01", "start_char_pos": 35095, "end_char_pos": 35105}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 35127, "end_char_pos": 35131}, {"type": "R", "before": "2008-11-02", "after": "2007-11-02", "start_char_pos": 35211, "end_char_pos": 35221}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 35243, "end_char_pos": 35247}, {"type": "R", "before": "2008-11-03", "after": "2007-11-03", "start_char_pos": 35327, "end_char_pos": 35337}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 35359, "end_char_pos": 35363}, {"type": "R", "before": "2008-11-04", "after": "2007-11-04", "start_char_pos": 35443, "end_char_pos": 35453}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 35475, "end_char_pos": 35479}, {"type": "R", "before": "2008-11-05", "after": "2007-11-05", "start_char_pos": 35559, "end_char_pos": 35569}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 35591, "end_char_pos": 35595}, {"type": "R", "before": "2008-11-06", "after": "2007-11-06", "start_char_pos": 35675, "end_char_pos": 35685}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 35707, "end_char_pos": 35711}, {"type": "R", "before": "2008-11-07", "after": "2007-11-07", "start_char_pos": 35791, "end_char_pos": 35801}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 35823, "end_char_pos": 35827}, {"type": "R", "before": "2008-11-08", "after": "2007-11-08", "start_char_pos": 35907, "end_char_pos": 35917}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 35939, "end_char_pos": 35943}, {"type": "R", "before": "2008-11-09", "after": "2007-11-09", "start_char_pos": 36023, "end_char_pos": 36033}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 36055, "end_char_pos": 36059}, {"type": "R", "before": "2008-11-09", "after": "2007-11-10", "start_char_pos": 36139, "end_char_pos": 36149}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 36172, "end_char_pos": 36176}, {"type": "R", "before": "2008-11-09", "after": "2007-11-11", "start_char_pos": 36256, "end_char_pos": 36266}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 36289, "end_char_pos": 36293}, {"type": "R", "before": "2008-11-09", "after": "2007-11-12", "start_char_pos": 36373, "end_char_pos": 36383}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 36406, "end_char_pos": 36410}, {"type": "R", "before": "2008-11-09", "after": "2007-11-13", "start_char_pos": 36490, "end_char_pos": 36500}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 36523, "end_char_pos": 36527}, {"type": "R", "before": "2008-11-09", "after": "2007-11-14", "start_char_pos": 36607, "end_char_pos": 36617}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 36640, "end_char_pos": 36644}, {"type": "R", "before": "2008-11-09", "after": "2007-11-15", "start_char_pos": 36724, "end_char_pos": 36734}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 36757, "end_char_pos": 36761}, {"type": "R", "before": "2008-11-09", "after": "2007-11-16", "start_char_pos": 36841, "end_char_pos": 36851}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 36874, "end_char_pos": 36878}, {"type": "R", "before": "2008-11-09", "after": "2007-11-17", "start_char_pos": 36958, "end_char_pos": 36968}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 36991, "end_char_pos": 36995}, {"type": "R", "before": "2008-11-09", "after": "2007-11-18", "start_char_pos": 37075, "end_char_pos": 37085}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 37108, "end_char_pos": 37112}, {"type": "R", "before": "2008-11-09", "after": "2007-11-19", "start_char_pos": 37192, "end_char_pos": 37202}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 37225, "end_char_pos": 37229}, {"type": "R", "before": "2008-11-09", "after": "2007-11-20", "start_char_pos": 37309, "end_char_pos": 37319}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 37342, "end_char_pos": 37346}, {"type": "R", "before": "2008-11-09", "after": "2007-11-21", "start_char_pos": 37426, "end_char_pos": 37436}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 37459, "end_char_pos": 37463}, {"type": "R", "before": "2008-11-09", "after": "2007-11-22", "start_char_pos": 37543, "end_char_pos": 37553}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 37576, "end_char_pos": 37580}, {"type": "R", "before": "2008-11-09", "after": "2007-11-23", "start_char_pos": 37660, "end_char_pos": 37670}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 37693, "end_char_pos": 37697}, {"type": "R", "before": "2008-11-09", "after": "2007-11-24", "start_char_pos": 37777, "end_char_pos": 37787}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 37810, "end_char_pos": 37814}, {"type": "R", "before": "2008-11-09", "after": "2007-11-25", "start_char_pos": 37894, "end_char_pos": 37904}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 37927, "end_char_pos": 37931}, {"type": "R", "before": "2008-11-09", "after": "2007-11-26", "start_char_pos": 38011, "end_char_pos": 38021}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 38044, "end_char_pos": 38048}, {"type": "R", "before": "2008-11-09", "after": "2007-11-27", "start_char_pos": 38128, "end_char_pos": 38138}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 38161, "end_char_pos": 38165}, {"type": "R", "before": "2008-11-09", "after": "2007-11-28", "start_char_pos": 38245, "end_char_pos": 38255}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 38278, "end_char_pos": 38282}, {"type": "R", "before": "2008-11-09", "after": "2007-11-29", "start_char_pos": 38362, "end_char_pos": 38372}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 38395, "end_char_pos": 38399}, {"type": "R", "before": "2008-11-09", "after": "2007-11-30", "start_char_pos": 38479, "end_char_pos": 38489}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 38512, "end_char_pos": 38516}, {"type": "R", "before": "2008-12-01", "after": "2007-12-01", "start_char_pos": 38614, "end_char_pos": 38624}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 38646, "end_char_pos": 38650}, {"type": "R", "before": "2008-12-02", "after": "2007-12-02", "start_char_pos": 38730, "end_char_pos": 38740}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 38762, "end_char_pos": 38766}, {"type": "R", "before": "2008-12-03", "after": "2007-12-03", "start_char_pos": 38846, "end_char_pos": 38856}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 38878, "end_char_pos": 38882}, {"type": "R", "before": "2008-12-04", "after": "2007-12-04", "start_char_pos": 38962, "end_char_pos": 38972}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 38994, "end_char_pos": 38998}, {"type": "R", "before": "2008-12-05", "after": "2007-12-05", "start_char_pos": 39078, "end_char_pos": 39088}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 39110, "end_char_pos": 39114}, {"type": "R", "before": "2008-12-06", "after": "2007-12-06", "start_char_pos": 39194, "end_char_pos": 39204}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 39226, "end_char_pos": 39230}, {"type": "R", "before": "2008-12-07", "after": "2007-12-07", "start_char_pos": 39310, "end_char_pos": 39320}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 39342, "end_char_pos": 39346}, {"type": "R", "before": "2008-12-08", "after": "2007-12-08", "start_char_pos": 39426, "end_char_pos": 39436}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 39458, "end_char_pos": 39462}, {"type": "R", "before": "2008-12-09", "after": "2007-12-09", "start_char_pos": 39542, "end_char_pos": 39552}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 39574, "end_char_pos": 39578}, {"type": "R", "before": "2008-12-09", "after": "2007-12-10", "start_char_pos": 39658, "end_char_pos": 39668}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 39691, "end_char_pos": 39695}, {"type": "R", "before": "2008-12-09", "after": "2007-12-11", "start_char_pos": 39775, "end_char_pos": 39785}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 39808, "end_char_pos": 39812}, {"type": "R", "before": "2008-12-09", "after": "2007-12-12", "start_char_pos": 39892, "end_char_pos": 39902}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 39925, "end_char_pos": 39929}, {"type": "R", "before": "2008-12-09", "after": "2007-12-13", "start_char_pos": 40009, "end_char_pos": 40019}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 40042, "end_char_pos": 40046}, {"type": "R", "before": "2008-12-09", "after": "2007-12-14", "start_char_pos": 40126, "end_char_pos": 40136}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 40159, "end_char_pos": 40163}, {"type": "R", "before": "2008-12-09", "after": "2007-12-15", "start_char_pos": 40243, "end_char_pos": 40253}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 40276, "end_char_pos": 40280}, {"type": "R", "before": "2008-12-09", "after": "2007-12-16", "start_char_pos": 40360, "end_char_pos": 40370}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 40393, "end_char_pos": 40397}, {"type": "R", "before": "2008-12-09", "after": "2007-12-17", "start_char_pos": 40477, "end_char_pos": 40487}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 40510, "end_char_pos": 40514}, {"type": "R", "before": "2008-12-09", "after": "2007-12-18", "start_char_pos": 40594, "end_char_pos": 40604}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 40627, "end_char_pos": 40631}, {"type": "R", "before": "2008-12-09", "after": "2007-12-19", "start_char_pos": 40711, "end_char_pos": 40721}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 40744, "end_char_pos": 40748}, {"type": "R", "before": "2008-12-09", "after": "2007-12-20", "start_char_pos": 40828, "end_char_pos": 40838}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 40861, "end_char_pos": 40865}, {"type": "R", "before": "2008-12-09", "after": "2007-12-21", "start_char_pos": 40945, "end_char_pos": 40955}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 40978, "end_char_pos": 40982}, {"type": "R", "before": "2008-12-09", "after": "2007-12-22", "start_char_pos": 41062, "end_char_pos": 41072}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 41095, "end_char_pos": 41099}, {"type": "R", "before": "2008-12-09", "after": "2007-12-23", "start_char_pos": 41179, "end_char_pos": 41189}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 41212, "end_char_pos": 41216}, {"type": "R", "before": "2008-12-09", "after": "2007-12-24", "start_char_pos": 41296, "end_char_pos": 41306}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 41329, "end_char_pos": 41333}, {"type": "R", "before": "2008-12-09", "after": "2007-12-25", "start_char_pos": 41413, "end_char_pos": 41423}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 41446, "end_char_pos": 41450}, {"type": "R", "before": "2008-12-09", "after": "2007-12-26", "start_char_pos": 41530, "end_char_pos": 41540}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 41563, "end_char_pos": 41567}, {"type": "R", "before": "2008-12-09", "after": "2007-12-27", "start_char_pos": 41647, "end_char_pos": 41657}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 41680, "end_char_pos": 41684}, {"type": "R", "before": "2008-12-09", "after": "2007-12-28", "start_char_pos": 41764, "end_char_pos": 41774}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 41797, "end_char_pos": 41801}, {"type": "R", "before": "2008-12-09", "after": "2007-12-29", "start_char_pos": 41881, "end_char_pos": 41891}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 41914, "end_char_pos": 41918}, {"type": "R", "before": "2008-12-09", "after": "2007-12-30", "start_char_pos": 41998, "end_char_pos": 42008}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 42031, "end_char_pos": 42035}, {"type": "R", "before": "2008-12-09", "after": "2007-12-31", "start_char_pos": 42115, "end_char_pos": 42125}, {"type": "R", "before": "2008", "after": "2007", "start_char_pos": 42148, "end_char_pos": 42152}], "sents_char_pos": [0, 47, 162, 277, 392, 507, 622, 737, 852, 967, 1083, 1199, 1315, 1431, 1547, 1663, 1779, 1895, 2011, 2127, 2243, 2359, 2475, 2591, 2707, 2823, 2939, 3055, 3171, 3287, 3403, 3519, 3653, 3769, 3885, 4001, 4117, 4233, 4349, 4465, 4581, 4698, 4815, 4932, 5049, 5166, 5283, 5400, 5517, 5634, 5751, 5868, 5985, 6102, 6219, 6336, 6453, 6570, 6687, 6804, 6921, 7049, 7162, 7275, 7388, 7501, 7614, 7727, 7840, 7953, 8067, 8181, 8295, 8409, 8523, 8637, 8751, 8865, 8979, 9093, 9207, 9321, 9435, 9549, 9663, 9777, 9891, 10005, 10119, 10233, 10347, 10461, 10589, 10702, 10815, 10928, 11041, 11154, 11267, 11380, 11493, 11607, 11721, 11835, 11949, 12063, 12177, 12291, 12405, 12519, 12633, 12747, 12861, 12975, 13089, 13203, 13317, 13431, 13545, 13659, 13773, 13887, 14011, 14122, 14233, 14344, 14455, 14566, 14677, 14788, 14899, 15011, 15123, 15235, 15347, 15459, 15571, 15683, 15795, 15907, 16019, 16131, 16243, 16355, 16467, 16579, 16691, 16803, 16915, 17027, 17139, 17251, 17363, 17489, 17601, 17713, 17825, 17937, 18049, 18161, 18273, 18385, 18498, 18611, 18724, 18837, 18950, 19063, 19176, 19289, 19402, 19515, 19628, 19741, 19854, 19967, 20080, 20193, 20306, 20419, 20532, 20645, 20758, 20884, 20996, 21108, 21220, 21332, 21444, 21556, 21668, 21780, 21893, 22006, 22119, 22232, 22345, 22458, 22571, 22684, 22797, 22910, 23023, 23136, 23249, 23362, 23475, 23588, 23701, 23814, 23927, 24040, 24153, 24266, 24396, 24510, 24624, 24738, 24852, 24966, 25080, 25194, 25308, 25423, 25538, 25653, 25768, 25883, 25998, 26113, 26228, 26343, 26458, 26573, 26688, 26803, 26918, 27033, 27148, 27263, 27378, 27493, 27608, 27723, 27838, 27974, 28091, 28208, 28325, 28442, 28559, 28676, 28793, 28910, 29028, 29146, 29264, 29382, 29500, 29618, 29736, 29854, 29972, 30090, 30208, 30326, 30444, 30562, 30680, 30798, 30916, 31034, 31152, 31270, 31388, 31520, 31635, 31750, 31865, 31980, 32095, 32210, 32325, 32440, 32556, 32672, 32788, 32904, 33020, 33136, 33252, 33368, 33484, 33600, 33716, 33832, 33948, 34064, 34180, 34296, 34412, 34528, 34644, 34760, 34876, 34992, 35126, 35242, 35358, 35474, 35590, 35706, 35822, 35938, 36054, 36171, 36288, 36405, 36522, 36639, 36756, 36873, 36990, 37107, 37224, 37341, 37458, 37575, 37692, 37809, 37926, 38043, 38160, 38277, 38394, 38511, 38645, 38761, 38877, 38993, 39109, 39225, 39341, 39457, 39573, 39690, 39807, 39924, 40041, 40158, 40275, 40392, 40509, 40626, 40743, 40860, 40977, 41094, 41211, 41328, 41445, 41562, 41679, 41796]}
+{"doc_id": "124825", "revision_depth": "1", "before_revision": "January datenews 2007-01-01 category=January 01 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-02 category=January 02 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-03 category=January 03 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-04 category=January 04 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-05 category=January 05 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-06 category=January 06 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-07 category=January 07 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-08 category=January 08 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 09 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-10 category=January 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-11 category=January 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-12 category=January 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-13 category=January 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-14 category=January 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-15 category=January 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-16 category=January 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-17 category=January 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-18 category=January 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-19 category=January 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-20 category=January 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-21 category=January 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-22 category=January 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-23 category=January 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-24 category=January 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-25 category=January 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-26 category=January 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-27 category=January 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-28 category=January 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-29 category=January 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-30 category=January 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-31 category=January 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true February datenews 2007-02-01 category=February 01 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-02 category=February 02 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-03 category=February 03 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-04 category=February 04 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-05 category=February 05 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-06 category=February 06 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-07 category=February 07 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-08 category=February 08 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 09 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-10 category=February 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-11 category=February 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-12 category=February 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-13 category=February 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-14 category=February 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-15 category=February 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-16 category=February 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-17 category=February 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-18 category=February 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-19 category=February 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-20 category=February 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-21 category=February 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-22 category=February 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-23 category=February 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-24 category=February 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-25 category=February 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-26 category=February 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-27 category=February 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-28 category=February 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true March datenews 2007-03-01 category=March 01 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-02 category=March 02 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-03 category=March 03 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-04 category=March 04 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-05 category=March 05 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-06 category=March 06 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-07 category=March 07 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-08 category=March 08 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 09 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-10 category=March 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-11 category=March 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-12 category=March 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-13 category=March 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-14 category=March 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-15 category=March 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-16 category=March 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-17 category=March 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-18 category=March 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-19 category=March 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-20 category=March 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-21 category=March 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-22 category=March 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-23 category=March 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-24 category=March 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-25 category=March 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-26 category=March 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-27 category=March 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-28 category=March 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-29 category=March 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-30 category=March 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-31 category=March 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true April datenews 2007-04-01 category=April 01 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-02 category=April 02 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-03 category=April 03 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-04 category=April 04 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-05 category=April 05 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-06 category=April 06 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-07 category=April 07 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-08 category=April 08 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 09 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-10 category=April 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-11 category=April 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-12 category=April 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-13 category=April 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-14 category=April 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-15 category=April 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-16 category=April 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-17 category=April 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-18 category=April 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-19 category=April 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-20 category=April 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-21 category=April 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-22 category=April 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-23 category=April 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-24 category=April 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-25 category=April 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-26 category=April 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-27 category=April 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-28 category=April 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-29 category=April 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-30 category=April 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true May datenews 2007-05-01 category=May 01 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-02 category=May 02 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-03 category=May 03 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-04 category=May 04 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-05 category=May 05 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-06 category=May 06 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-07 category=May 07 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-08 category=May 08 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 09 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-10 category=May 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-11 category=May 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-12 category=May 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-13 category=May 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-14 category=May 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-15 category=May 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-16 category=May 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-17 category=May 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-18 category=May 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-19 category=May 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-20 category=May 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-21 category=May 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-22 category=May 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-23 category=May 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-24 category=May 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-25 category=May 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-26 category=May 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-27 category=May 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-28 category=May 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-29 category=May 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-30 category=May 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-31 category=May 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true June datenews 2007-06-01 category=June 01 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-02 category=June 02 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-03 category=June 03 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-04 category=June 04 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-05 category=June 05 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-06 category=June 06 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-07 category=June 07 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-08 category=June 08 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 09 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-10 category=June 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-11 category=June 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-12 category=June 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-13 category=June 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-14 category=June 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-15 category=June 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-16 category=June 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-17 category=June 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-18 category=June 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-19 category=June 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-20 category=June 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-21 category=June 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-22 category=June 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-23 category=June 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-24 category=June 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-25 category=June 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-26 category=June 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-27 category=June 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-28 category=June 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-29 category=June 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-30 category=June 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true July datenews 2007-07-01 category=July 01 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-02 category=July 02 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-03 category=July 03 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-04 category=July 04 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-05 category=July 05 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-06 category=July 06 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-07 category=July 07 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-08 category=July 08 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 09 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-10 category=July 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-11 category=July 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-12 category=July 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-13 category=July 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-14 category=July 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-15 category=July 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-16 category=July 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-17 category=July 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-18 category=July 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-19 category=July 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-20 category=July 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-21 category=July 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-22 category=July 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-23 category=July 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-24 category=July 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-25 category=July 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-26 category=July 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-27 category=July 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-28 category=July 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-29 category=July 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-30 category=July 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-31 category=July 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true August datenews 2007-08-01 category=August 01 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-02 category=August 02 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-03 category=August 03 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-04 category=August 04 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-05 category=August 05 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-06 category=August 06 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-07 category=August 07 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-08 category=August 08 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 09 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-10 category=August 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-11 category=August 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-12 category=August 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-13 category=August 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-14 category=August 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-15 category=August 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-16 category=August 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-17 category=August 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-18 category=August 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-19 category=August 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-20 category=August 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-21 category=August 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-22 category=August 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-23 category=August 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-24 category=August 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-25 category=August 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-26 category=August 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-27 category=August 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-28 category=August 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-29 category=August 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-30 category=August 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-31 category=August 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true September datenews 2007-09-01 category=September 01 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-02 category=September 02 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-03 category=September 03 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-04 category=September 04 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-05 category=September 05 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-06 category=September 06 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-07 category=September 07 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-08 category=September 08 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 09 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-10 category=September 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-11 category=September 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-12 category=September 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-13 category=September 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-14 category=September 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-15 category=September 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-16 category=September 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-17 category=September 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-18 category=September 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-19 category=September 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-20 category=September 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-21 category=September 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-22 category=September 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-23 category=September 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-24 category=September 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-25 category=September 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-26 category=September 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-27 category=September 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-28 category=September 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-29 category=September 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-30 category=September 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true October datenews 2007-10-01 category=October 01 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-02 category=October 02 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-03 category=October 03 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-04 category=October 04 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-05 category=October 05 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-06 category=October 06 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-07 category=October 07 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-08 category=October 08 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 09 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-10 category=October 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-11 category=October 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-12 category=October 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-13 category=October 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-14 category=October 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-15 category=October 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-16 category=October 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-17 category=October 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-18 category=October 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-19 category=October 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-20 category=October 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-21 category=October 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-22 category=October 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-23 category=October 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-24 category=October 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-25 category=October 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-26 category=October 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-27 category=October 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-28 category=October 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-29 category=October 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-30 category=October 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-31 category=October 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true November datenews 2007-11-01 category=November 01 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-02 category=November 02 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-03 category=November 03 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-04 category=November 04 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-05 category=November 05 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-06 category=November 06 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-07 category=November 07 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-08 category=November 08 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 09 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-10 category=November 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-11 category=November 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-12 category=November 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-13 category=November 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-14 category=November 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-15 category=November 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-16 category=November 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-17 category=November 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-18 category=November 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-19 category=November 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-20 category=November 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-21 category=November 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-22 category=November 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-23 category=November 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-24 category=November 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-25 category=November 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-26 category=November 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-27 category=November 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-28 category=November 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-29 category=November 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-30 category=November 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true December datenews 2007-12-01 category=December 01 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-02 category=December 02 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-03 category=December 03 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-04 category=December 04 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-05 category=December 05 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-06 category=December 06 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-07 category=December 07 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-08 category=December 08 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 09 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-10 category=December 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-11 category=December 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-12 category=December 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-13 category=December 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-14 category=December 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-15 category=December 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-16 category=December 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-17 category=December 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-18 category=December 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-19 category=December 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-20 category=December 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-21 category=December 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-22 category=December 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-23 category=December 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-24 category=December 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-25 category=December 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-26 category=December 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-27 category=December 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-28 category=December 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-29 category=December 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-30 category=December 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-31 category=December 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=tru", "after_revision": "January datenews 2007-01-01 category=January 1 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-02 category=January 2 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-03 category=January 3 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-04 category=January 4 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-05 category=January 5 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-06 category=January 6 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-07 category=January 7 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-08 category=January 8 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 9 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true February datenews 2007-02-01 category=February 1 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-02 category=February 2 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-03 category=February 3 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-04 category=February 4 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-05 category=February 5 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-06 category=February 6 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-07 category=February 7 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-08 category=February 8 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 9 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true March datenews 2007-03-01 category=March 1 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-02 category=March 2 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-03 category=March 3 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-04 category=March 4 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-05 category=March 5 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-06 category=March 6 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-07 category=March 7 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-08 category=March 8 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 9 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true April datenews 2007-04-01 category=April 1 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-02 category=April 2 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-03 category=April 3 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-04 category=April 4 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-05 category=April 5 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-06 category=April 6 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-07 category=April 7 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-08 category=April 8 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 9 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true May datenews 2007-05-01 category=May 1 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-02 category=May 2 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-03 category=May 3 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-04 category=May 4 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-05 category=May 5 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-06 category=May 6 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-07 category=May 7 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-08 category=May 8 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 9 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true June datenews 2007-06-01 category=June 1 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-02 category=June 2 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-03 category=June 3 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-04 category=June 4 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-05 category=June 5 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-06 category=June 6 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-07 category=June 7 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-08 category=June 8 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 9 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true July datenews 2007-07-01 category=July 1 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-02 category=July 2 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-03 category=July 3 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-04 category=July 4 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-05 category=July 5 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-06 category=July 6 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-07 category=July 7 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-08 category=July 8 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 9 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true August datenews 2007-08-01 category=August 1 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-02 category=August 2 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-03 category=August 3 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-04 category=August 4 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-05 category=August 5 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-06 category=August 6 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-07 category=August 7 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-08 category=August 8 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 9 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true September datenews 2007-09-01 category=September 1 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-02 category=September 2 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-03 category=September 3 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-04 category=September 4 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-05 category=September 5 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-06 category=September 6 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-07 category=September 7 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-08 category=September 8 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 9 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true October datenews 2007-10-01 category=October 1 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-02 category=October 2 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-03 category=October 3 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-04 category=October 4 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-05 category=October 5 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-06 category=October 6 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-07 category=October 7 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-08 category=October 8 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 9 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true November datenews 2007-11-01 category=November 1 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-02 category=November 2 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-03 category=November 3 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-04 category=November 4 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-05 category=November 5 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-06 category=November 6 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-07 category=November 7 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-08 category=November 8 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 9 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true December datenews 2007-12-01 category=December 1 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-02 category=December 2 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-03 category=December 3 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-04 category=December 4 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-05 category=December 5 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-06 category=December 6 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-07 category=December 7 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-08 category=December 8 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 9 , 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=tru", "edit_actions": [{"type": "R", "before": "01", "after": "1", "start_char_pos": 45, "end_char_pos": 47}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 162, "end_char_pos": 164}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 279, "end_char_pos": 281}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 396, "end_char_pos": 398}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 513, "end_char_pos": 515}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 630, "end_char_pos": 632}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 747, "end_char_pos": 749}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 864, "end_char_pos": 866}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 981, "end_char_pos": 983}, {"type": "R", "before": "2007-01-10", "after": "2007-01-09", "start_char_pos": 1070, "end_char_pos": 1080}, {"type": "R", "before": "2007-01-11", "after": "2007-01-09", "start_char_pos": 1186, "end_char_pos": 1196}, {"type": "R", "before": "2007-01-12", "after": "2007-01-09", "start_char_pos": 1302, "end_char_pos": 1312}, {"type": "R", "before": "2007-01-13", "after": "2007-01-09", "start_char_pos": 1418, "end_char_pos": 1428}, {"type": "R", "before": "2007-01-14", "after": "2007-01-09", "start_char_pos": 1534, "end_char_pos": 1544}, {"type": "R", "before": "2007-01-15", "after": "2007-01-09", "start_char_pos": 1650, "end_char_pos": 1660}, {"type": "R", "before": "2007-01-16", "after": "2007-01-09", "start_char_pos": 1766, "end_char_pos": 1776}, {"type": "R", "before": "2007-01-17", "after": "2007-01-09", "start_char_pos": 1882, "end_char_pos": 1892}, {"type": "R", "before": "2007-01-18", "after": "2007-01-09", "start_char_pos": 1998, "end_char_pos": 2008}, {"type": "R", "before": "2007-01-19", "after": "2007-01-09", "start_char_pos": 2114, "end_char_pos": 2124}, {"type": "R", "before": "2007-01-20", "after": "2007-01-09", "start_char_pos": 2230, "end_char_pos": 2240}, {"type": "R", "before": "2007-01-21", "after": "2007-01-09", "start_char_pos": 2346, "end_char_pos": 2356}, {"type": "R", "before": "2007-01-22", "after": "2007-01-09", "start_char_pos": 2462, "end_char_pos": 2472}, {"type": "R", "before": "2007-01-23", "after": "2007-01-09", "start_char_pos": 2578, "end_char_pos": 2588}, {"type": "R", "before": "2007-01-24", "after": "2007-01-09", "start_char_pos": 2694, "end_char_pos": 2704}, {"type": "R", "before": "2007-01-25", "after": "2007-01-09", "start_char_pos": 2810, "end_char_pos": 2820}, {"type": "R", "before": "2007-01-26", "after": "2007-01-09", "start_char_pos": 2926, "end_char_pos": 2936}, {"type": "R", "before": "2007-01-27", "after": "2007-01-09", "start_char_pos": 3042, "end_char_pos": 3052}, {"type": "R", "before": "2007-01-28", "after": "2007-01-09", "start_char_pos": 3158, "end_char_pos": 3168}, {"type": "R", "before": "2007-01-29", "after": "2007-01-09", "start_char_pos": 3274, "end_char_pos": 3284}, {"type": "R", "before": "2007-01-30", "after": "2007-01-09", "start_char_pos": 3390, "end_char_pos": 3400}, {"type": "R", "before": "2007-01-31", "after": "2007-01-09", "start_char_pos": 3506, "end_char_pos": 3516}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 3669, "end_char_pos": 3671}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 3787, "end_char_pos": 3789}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 3905, "end_char_pos": 3907}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 4023, "end_char_pos": 4025}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 4141, "end_char_pos": 4143}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 4259, "end_char_pos": 4261}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 4377, "end_char_pos": 4379}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 4495, "end_char_pos": 4497}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 4613, "end_char_pos": 4615}, {"type": "R", "before": "2007-02-10", "after": "2007-02-09", "start_char_pos": 4702, "end_char_pos": 4712}, {"type": "R", "before": "2007-02-11", "after": "2007-02-09", "start_char_pos": 4819, "end_char_pos": 4829}, {"type": "R", "before": "2007-02-12", "after": "2007-02-09", "start_char_pos": 4936, "end_char_pos": 4946}, {"type": "R", "before": "2007-02-13", "after": "2007-02-09", "start_char_pos": 5053, "end_char_pos": 5063}, {"type": "R", "before": "2007-02-14", "after": "2007-02-09", "start_char_pos": 5170, "end_char_pos": 5180}, {"type": "R", "before": "2007-02-15", "after": "2007-02-09", "start_char_pos": 5287, "end_char_pos": 5297}, {"type": "R", "before": "2007-02-16", "after": "2007-02-09", "start_char_pos": 5404, "end_char_pos": 5414}, {"type": "R", "before": "2007-02-17", "after": "2007-02-09", "start_char_pos": 5521, "end_char_pos": 5531}, {"type": "R", "before": "2007-02-18", "after": "2007-02-09", "start_char_pos": 5638, "end_char_pos": 5648}, {"type": "R", "before": "2007-02-19", "after": "2007-02-09", "start_char_pos": 5755, "end_char_pos": 5765}, {"type": "R", "before": "2007-02-20", "after": "2007-02-09", "start_char_pos": 5872, "end_char_pos": 5882}, {"type": "R", "before": "2007-02-21", "after": "2007-02-09", "start_char_pos": 5989, "end_char_pos": 5999}, {"type": "R", "before": "2007-02-22", "after": "2007-02-09", "start_char_pos": 6106, "end_char_pos": 6116}, {"type": "R", "before": "2007-02-23", "after": "2007-02-09", "start_char_pos": 6223, "end_char_pos": 6233}, {"type": "R", "before": "2007-02-24", "after": "2007-02-09", "start_char_pos": 6340, "end_char_pos": 6350}, {"type": "R", "before": "2007-02-25", "after": "2007-02-09", "start_char_pos": 6457, "end_char_pos": 6467}, {"type": "R", "before": "2007-02-26", "after": "2007-02-09", "start_char_pos": 6574, "end_char_pos": 6584}, {"type": "R", "before": "2007-02-27", "after": "2007-02-09", "start_char_pos": 6691, "end_char_pos": 6701}, {"type": "R", "before": "2007-02-28", "after": "2007-02-09", "start_char_pos": 6808, "end_char_pos": 6818}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 6966, "end_char_pos": 6968}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 7081, "end_char_pos": 7083}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 7196, "end_char_pos": 7198}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 7311, "end_char_pos": 7313}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 7426, "end_char_pos": 7428}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 7541, "end_char_pos": 7543}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 7656, "end_char_pos": 7658}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 7771, "end_char_pos": 7773}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 7886, "end_char_pos": 7888}, {"type": "R", "before": "2007-03-10", "after": "2007-03-09", "start_char_pos": 7975, "end_char_pos": 7985}, {"type": "R", "before": "2007-03-11", "after": "2007-03-09", "start_char_pos": 8089, "end_char_pos": 8099}, {"type": "R", "before": "2007-03-12", "after": "2007-03-09", "start_char_pos": 8203, "end_char_pos": 8213}, {"type": "R", "before": "2007-03-13", "after": "2007-03-09", "start_char_pos": 8317, "end_char_pos": 8327}, {"type": "R", "before": "2007-03-14", "after": "2007-03-09", "start_char_pos": 8431, "end_char_pos": 8441}, {"type": "R", "before": "2007-03-15", "after": "2007-03-09", "start_char_pos": 8545, "end_char_pos": 8555}, {"type": "R", "before": "2007-03-16", "after": "2007-03-09", "start_char_pos": 8659, "end_char_pos": 8669}, {"type": "R", "before": "2007-03-17", "after": "2007-03-09", "start_char_pos": 8773, "end_char_pos": 8783}, {"type": "R", "before": "2007-03-18", "after": "2007-03-09", "start_char_pos": 8887, "end_char_pos": 8897}, {"type": "R", "before": "2007-03-19", "after": "2007-03-09", "start_char_pos": 9001, "end_char_pos": 9011}, {"type": "R", "before": "2007-03-20", "after": "2007-03-09", "start_char_pos": 9115, "end_char_pos": 9125}, {"type": "R", "before": "2007-03-21", "after": "2007-03-09", "start_char_pos": 9229, "end_char_pos": 9239}, {"type": "R", "before": "2007-03-22", "after": "2007-03-09", "start_char_pos": 9343, "end_char_pos": 9353}, {"type": "R", "before": "2007-03-23", "after": "2007-03-09", "start_char_pos": 9457, "end_char_pos": 9467}, {"type": "R", "before": "2007-03-24", "after": "2007-03-09", "start_char_pos": 9571, "end_char_pos": 9581}, {"type": "R", "before": "2007-03-25", "after": "2007-03-09", "start_char_pos": 9685, "end_char_pos": 9695}, {"type": "R", "before": "2007-03-26", "after": "2007-03-09", "start_char_pos": 9799, "end_char_pos": 9809}, {"type": "R", "before": "2007-03-27", "after": "2007-03-09", "start_char_pos": 9913, "end_char_pos": 9923}, {"type": "R", "before": "2007-03-28", "after": "2007-03-09", "start_char_pos": 10027, "end_char_pos": 10037}, {"type": "R", "before": "2007-03-29", "after": "2007-03-09", "start_char_pos": 10141, "end_char_pos": 10151}, {"type": "R", "before": "2007-03-30", "after": "2007-03-09", "start_char_pos": 10255, "end_char_pos": 10265}, {"type": "R", "before": "2007-03-31", "after": "2007-03-09", "start_char_pos": 10369, "end_char_pos": 10379}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 10524, "end_char_pos": 10526}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 10639, "end_char_pos": 10641}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 10754, "end_char_pos": 10756}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 10869, "end_char_pos": 10871}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 10984, "end_char_pos": 10986}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 11099, "end_char_pos": 11101}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 11214, "end_char_pos": 11216}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 11329, "end_char_pos": 11331}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 11444, "end_char_pos": 11446}, {"type": "R", "before": "2007-04-10", "after": "2007-04-09", "start_char_pos": 11533, "end_char_pos": 11543}, {"type": "R", "before": "2007-04-11", "after": "2007-04-09", "start_char_pos": 11647, "end_char_pos": 11657}, {"type": "R", "before": "2007-04-12", "after": "2007-04-09", "start_char_pos": 11761, "end_char_pos": 11771}, {"type": "R", "before": "2007-04-13", "after": "2007-04-09", "start_char_pos": 11875, "end_char_pos": 11885}, {"type": "R", "before": "2007-04-14", "after": "2007-04-09", "start_char_pos": 11989, "end_char_pos": 11999}, {"type": "R", "before": "2007-04-15", "after": "2007-04-09", "start_char_pos": 12103, "end_char_pos": 12113}, {"type": "R", "before": "2007-04-16", "after": "2007-04-09", "start_char_pos": 12217, "end_char_pos": 12227}, {"type": "R", "before": "2007-04-17", "after": "2007-04-09", "start_char_pos": 12331, "end_char_pos": 12341}, {"type": "R", "before": "2007-04-18", "after": "2007-04-09", "start_char_pos": 12445, "end_char_pos": 12455}, {"type": "R", "before": "2007-04-19", "after": "2007-04-09", "start_char_pos": 12559, "end_char_pos": 12569}, {"type": "R", "before": "2007-04-20", "after": "2007-04-09", "start_char_pos": 12673, "end_char_pos": 12683}, {"type": "R", "before": "2007-04-21", "after": "2007-04-09", "start_char_pos": 12787, "end_char_pos": 12797}, {"type": "R", "before": "2007-04-22", "after": "2007-04-09", "start_char_pos": 12901, "end_char_pos": 12911}, {"type": "R", "before": "2007-04-23", "after": "2007-04-09", "start_char_pos": 13015, "end_char_pos": 13025}, {"type": "R", "before": "2007-04-24", "after": "2007-04-09", "start_char_pos": 13129, "end_char_pos": 13139}, {"type": "R", "before": "2007-04-25", "after": "2007-04-09", "start_char_pos": 13243, "end_char_pos": 13253}, {"type": "R", "before": "2007-04-26", "after": "2007-04-09", "start_char_pos": 13357, "end_char_pos": 13367}, {"type": "R", "before": "2007-04-27", "after": "2007-04-09", "start_char_pos": 13471, "end_char_pos": 13481}, {"type": "R", "before": "2007-04-28", "after": "2007-04-09", "start_char_pos": 13585, "end_char_pos": 13595}, {"type": "R", "before": "2007-04-29", "after": "2007-04-09", "start_char_pos": 13699, "end_char_pos": 13709}, {"type": "R", "before": "2007-04-30", "after": "2007-04-09", "start_char_pos": 13813, "end_char_pos": 13823}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 13964, "end_char_pos": 13966}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 14077, "end_char_pos": 14079}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 14190, "end_char_pos": 14192}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 14303, "end_char_pos": 14305}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 14416, "end_char_pos": 14418}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 14529, "end_char_pos": 14531}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 14642, "end_char_pos": 14644}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 14755, "end_char_pos": 14757}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 14868, "end_char_pos": 14870}, {"type": "R", "before": "2007-05-10", "after": "2007-05-09", "start_char_pos": 14957, "end_char_pos": 14967}, {"type": "R", "before": "2007-05-11", "after": "2007-05-09", "start_char_pos": 15069, "end_char_pos": 15079}, {"type": "R", "before": "2007-05-12", "after": "2007-05-09", "start_char_pos": 15181, "end_char_pos": 15191}, {"type": "R", "before": "2007-05-13", "after": "2007-05-09", "start_char_pos": 15293, "end_char_pos": 15303}, {"type": "R", "before": "2007-05-14", "after": "2007-05-09", "start_char_pos": 15405, "end_char_pos": 15415}, {"type": "R", "before": "2007-05-15", "after": "2007-05-09", "start_char_pos": 15517, "end_char_pos": 15527}, {"type": "R", "before": "2007-05-16", "after": "2007-05-09", "start_char_pos": 15629, "end_char_pos": 15639}, {"type": "R", "before": "2007-05-17", "after": "2007-05-09", "start_char_pos": 15741, "end_char_pos": 15751}, {"type": "R", "before": "2007-05-18", "after": "2007-05-09", "start_char_pos": 15853, "end_char_pos": 15863}, {"type": "R", "before": "2007-05-19", "after": "2007-05-09", "start_char_pos": 15965, "end_char_pos": 15975}, {"type": "R", "before": "2007-05-20", "after": "2007-05-09", "start_char_pos": 16077, "end_char_pos": 16087}, {"type": "R", "before": "2007-05-21", "after": "2007-05-09", "start_char_pos": 16189, "end_char_pos": 16199}, {"type": "R", "before": "2007-05-22", "after": "2007-05-09", "start_char_pos": 16301, "end_char_pos": 16311}, {"type": "R", "before": "2007-05-23", "after": "2007-05-09", "start_char_pos": 16413, "end_char_pos": 16423}, {"type": "R", "before": "2007-05-24", "after": "2007-05-09", "start_char_pos": 16525, "end_char_pos": 16535}, {"type": "R", "before": "2007-05-25", "after": "2007-05-09", "start_char_pos": 16637, "end_char_pos": 16647}, {"type": "R", "before": "2007-05-26", "after": "2007-05-09", "start_char_pos": 16749, "end_char_pos": 16759}, {"type": "R", "before": "2007-05-27", "after": "2007-05-09", "start_char_pos": 16861, "end_char_pos": 16871}, {"type": "R", "before": "2007-05-28", "after": "2007-05-09", "start_char_pos": 16973, "end_char_pos": 16983}, {"type": "R", "before": "2007-05-29", "after": "2007-05-09", "start_char_pos": 17085, "end_char_pos": 17095}, {"type": "R", "before": "2007-05-30", "after": "2007-05-09", "start_char_pos": 17197, "end_char_pos": 17207}, {"type": "R", "before": "2007-05-31", "after": "2007-05-09", "start_char_pos": 17309, "end_char_pos": 17319}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 17460, "end_char_pos": 17462}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 17574, "end_char_pos": 17576}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 17688, "end_char_pos": 17690}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 17802, "end_char_pos": 17804}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 17916, "end_char_pos": 17918}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 18030, "end_char_pos": 18032}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 18144, "end_char_pos": 18146}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 18258, "end_char_pos": 18260}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 18372, "end_char_pos": 18374}, {"type": "R", "before": "2007-06-10", "after": "2007-06-09", "start_char_pos": 18461, "end_char_pos": 18471}, {"type": "R", "before": "2007-06-11", "after": "2007-06-09", "start_char_pos": 18574, "end_char_pos": 18584}, {"type": "R", "before": "2007-06-12", "after": "2007-06-09", "start_char_pos": 18687, "end_char_pos": 18697}, {"type": "R", "before": "2007-06-13", "after": "2007-06-09", "start_char_pos": 18800, "end_char_pos": 18810}, {"type": "R", "before": "2007-06-14", "after": "2007-06-09", "start_char_pos": 18913, "end_char_pos": 18923}, {"type": "R", "before": "2007-06-15", "after": "2007-06-09", "start_char_pos": 19026, "end_char_pos": 19036}, {"type": "R", "before": "2007-06-16", "after": "2007-06-09", "start_char_pos": 19139, "end_char_pos": 19149}, {"type": "R", "before": "2007-06-17", "after": "2007-06-09", "start_char_pos": 19252, "end_char_pos": 19262}, {"type": "R", "before": "2007-06-18", "after": "2007-06-09", "start_char_pos": 19365, "end_char_pos": 19375}, {"type": "R", "before": "2007-06-19", "after": "2007-06-09", "start_char_pos": 19478, "end_char_pos": 19488}, {"type": "R", "before": "2007-06-20", "after": "2007-06-09", "start_char_pos": 19591, "end_char_pos": 19601}, {"type": "R", "before": "2007-06-21", "after": "2007-06-09", "start_char_pos": 19704, "end_char_pos": 19714}, {"type": "R", "before": "2007-06-22", "after": "2007-06-09", "start_char_pos": 19817, "end_char_pos": 19827}, {"type": "R", "before": "2007-06-23", "after": "2007-06-09", "start_char_pos": 19930, "end_char_pos": 19940}, {"type": "R", "before": "2007-06-24", "after": "2007-06-09", "start_char_pos": 20043, "end_char_pos": 20053}, {"type": "R", "before": "2007-06-25", "after": "2007-06-09", "start_char_pos": 20156, "end_char_pos": 20166}, {"type": "R", "before": "2007-06-26", "after": "2007-06-09", "start_char_pos": 20269, "end_char_pos": 20279}, {"type": "R", "before": "2007-06-27", "after": "2007-06-09", "start_char_pos": 20382, "end_char_pos": 20392}, {"type": "R", "before": "2007-06-28", "after": "2007-06-09", "start_char_pos": 20495, "end_char_pos": 20505}, {"type": "R", "before": "2007-06-29", "after": "2007-06-09", "start_char_pos": 20608, "end_char_pos": 20618}, {"type": "R", "before": "2007-06-30", "after": "2007-06-09", "start_char_pos": 20721, "end_char_pos": 20731}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 20873, "end_char_pos": 20875}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 20987, "end_char_pos": 20989}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 21101, "end_char_pos": 21103}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 21215, "end_char_pos": 21217}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 21329, "end_char_pos": 21331}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 21443, "end_char_pos": 21445}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 21557, "end_char_pos": 21559}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 21671, "end_char_pos": 21673}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 21785, "end_char_pos": 21787}, {"type": "R", "before": "2007-07-10", "after": "2007-07-09", "start_char_pos": 21874, "end_char_pos": 21884}, {"type": "R", "before": "2007-07-11", "after": "2007-07-09", "start_char_pos": 21987, "end_char_pos": 21997}, {"type": "R", "before": "2007-07-12", "after": "2007-07-09", "start_char_pos": 22100, "end_char_pos": 22110}, {"type": "R", "before": "2007-07-13", "after": "2007-07-09", "start_char_pos": 22213, "end_char_pos": 22223}, {"type": "R", "before": "2007-07-14", "after": "2007-07-09", "start_char_pos": 22326, "end_char_pos": 22336}, {"type": "R", "before": "2007-07-15", "after": "2007-07-09", "start_char_pos": 22439, "end_char_pos": 22449}, {"type": "R", "before": "2007-07-16", "after": "2007-07-09", "start_char_pos": 22552, "end_char_pos": 22562}, {"type": "R", "before": "2007-07-17", "after": "2007-07-09", "start_char_pos": 22665, "end_char_pos": 22675}, {"type": "R", "before": "2007-07-18", "after": "2007-07-09", "start_char_pos": 22778, "end_char_pos": 22788}, {"type": "R", "before": "2007-07-19", "after": "2007-07-09", "start_char_pos": 22891, "end_char_pos": 22901}, {"type": "R", "before": "2007-07-20", "after": "2007-07-09", "start_char_pos": 23004, "end_char_pos": 23014}, {"type": "R", "before": "2007-07-21", "after": "2007-07-09", "start_char_pos": 23117, "end_char_pos": 23127}, {"type": "R", "before": "2007-07-22", "after": "2007-07-09", "start_char_pos": 23230, "end_char_pos": 23240}, {"type": "R", "before": "2007-07-23", "after": "2007-07-09", "start_char_pos": 23343, "end_char_pos": 23353}, {"type": "R", "before": "2007-07-24", "after": "2007-07-09", "start_char_pos": 23456, "end_char_pos": 23466}, {"type": "R", "before": "2007-07-25", "after": "2007-07-09", "start_char_pos": 23569, "end_char_pos": 23579}, {"type": "R", "before": "2007-07-26", "after": "2007-07-09", "start_char_pos": 23682, "end_char_pos": 23692}, {"type": "R", "before": "2007-07-27", "after": "2007-07-09", "start_char_pos": 23795, "end_char_pos": 23805}, {"type": "R", "before": "2007-07-28", "after": "2007-07-09", "start_char_pos": 23908, "end_char_pos": 23918}, {"type": "R", "before": "2007-07-29", "after": "2007-07-09", "start_char_pos": 24021, "end_char_pos": 24031}, {"type": "R", "before": "2007-07-30", "after": "2007-07-09", "start_char_pos": 24134, "end_char_pos": 24144}, {"type": "R", "before": "2007-07-31", "after": "2007-07-09", "start_char_pos": 24247, "end_char_pos": 24257}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 24403, "end_char_pos": 24405}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 24519, "end_char_pos": 24521}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 24635, "end_char_pos": 24637}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 24751, "end_char_pos": 24753}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 24867, "end_char_pos": 24869}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 24983, "end_char_pos": 24985}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 25099, "end_char_pos": 25101}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 25215, "end_char_pos": 25217}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 25331, "end_char_pos": 25333}, {"type": "R", "before": "2007-08-10", "after": "2007-08-09", "start_char_pos": 25420, "end_char_pos": 25430}, {"type": "R", "before": "2007-08-11", "after": "2007-08-09", "start_char_pos": 25535, "end_char_pos": 25545}, {"type": "R", "before": "2007-08-12", "after": "2007-08-09", "start_char_pos": 25650, "end_char_pos": 25660}, {"type": "R", "before": "2007-08-13", "after": "2007-08-09", "start_char_pos": 25765, "end_char_pos": 25775}, {"type": "R", "before": "2007-08-14", "after": "2007-08-09", "start_char_pos": 25880, "end_char_pos": 25890}, {"type": "R", "before": "2007-08-15", "after": "2007-08-09", "start_char_pos": 25995, "end_char_pos": 26005}, {"type": "R", "before": "2007-08-16", "after": "2007-08-09", "start_char_pos": 26110, "end_char_pos": 26120}, {"type": "R", "before": "2007-08-17", "after": "2007-08-09", "start_char_pos": 26225, "end_char_pos": 26235}, {"type": "R", "before": "2007-08-18", "after": "2007-08-09", "start_char_pos": 26340, "end_char_pos": 26350}, {"type": "R", "before": "2007-08-19", "after": "2007-08-09", "start_char_pos": 26455, "end_char_pos": 26465}, {"type": "R", "before": "2007-08-20", "after": "2007-08-09", "start_char_pos": 26570, "end_char_pos": 26580}, {"type": "R", "before": "2007-08-21", "after": "2007-08-09", "start_char_pos": 26685, "end_char_pos": 26695}, {"type": "R", "before": "2007-08-22", "after": "2007-08-09", "start_char_pos": 26800, "end_char_pos": 26810}, {"type": "R", "before": "2007-08-23", "after": "2007-08-09", "start_char_pos": 26915, "end_char_pos": 26925}, {"type": "R", "before": "2007-08-24", "after": "2007-08-09", "start_char_pos": 27030, "end_char_pos": 27040}, {"type": "R", "before": "2007-08-25", "after": "2007-08-09", "start_char_pos": 27145, "end_char_pos": 27155}, {"type": "R", "before": "2007-08-26", "after": "2007-08-09", "start_char_pos": 27260, "end_char_pos": 27270}, {"type": "R", "before": "2007-08-27", "after": "2007-08-09", "start_char_pos": 27375, "end_char_pos": 27385}, {"type": "R", "before": "2007-08-28", "after": "2007-08-09", "start_char_pos": 27490, "end_char_pos": 27500}, {"type": "R", "before": "2007-08-29", "after": "2007-08-09", "start_char_pos": 27605, "end_char_pos": 27615}, {"type": "R", "before": "2007-08-30", "after": "2007-08-09", "start_char_pos": 27720, "end_char_pos": 27730}, {"type": "R", "before": "2007-08-31", "after": "2007-08-09", "start_char_pos": 27835, "end_char_pos": 27845}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 27999, "end_char_pos": 28001}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 28118, "end_char_pos": 28120}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 28237, "end_char_pos": 28239}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 28356, "end_char_pos": 28358}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 28475, "end_char_pos": 28477}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 28594, "end_char_pos": 28596}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 28713, "end_char_pos": 28715}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 28832, "end_char_pos": 28834}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 28951, "end_char_pos": 28953}, {"type": "R", "before": "2007-09-10", "after": "2007-09-09", "start_char_pos": 29040, "end_char_pos": 29050}, {"type": "R", "before": "2007-09-11", "after": "2007-09-09", "start_char_pos": 29158, "end_char_pos": 29168}, {"type": "R", "before": "2007-09-12", "after": "2007-09-09", "start_char_pos": 29276, "end_char_pos": 29286}, {"type": "R", "before": "2007-09-13", "after": "2007-09-09", "start_char_pos": 29394, "end_char_pos": 29404}, {"type": "R", "before": "2007-09-14", "after": "2007-09-09", "start_char_pos": 29512, "end_char_pos": 29522}, {"type": "R", "before": "2007-09-15", "after": "2007-09-09", "start_char_pos": 29630, "end_char_pos": 29640}, {"type": "R", "before": "2007-09-16", "after": "2007-09-09", "start_char_pos": 29748, "end_char_pos": 29758}, {"type": "R", "before": "2007-09-17", "after": "2007-09-09", "start_char_pos": 29866, "end_char_pos": 29876}, {"type": "R", "before": "2007-09-18", "after": "2007-09-09", "start_char_pos": 29984, "end_char_pos": 29994}, {"type": "R", "before": "2007-09-19", "after": "2007-09-09", "start_char_pos": 30102, "end_char_pos": 30112}, {"type": "R", "before": "2007-09-20", "after": "2007-09-09", "start_char_pos": 30220, "end_char_pos": 30230}, {"type": "R", "before": "2007-09-21", "after": "2007-09-09", "start_char_pos": 30338, "end_char_pos": 30348}, {"type": "R", "before": "2007-09-22", "after": "2007-09-09", "start_char_pos": 30456, "end_char_pos": 30466}, {"type": "R", "before": "2007-09-23", "after": "2007-09-09", "start_char_pos": 30574, "end_char_pos": 30584}, {"type": "R", "before": "2007-09-24", "after": "2007-09-09", "start_char_pos": 30692, "end_char_pos": 30702}, {"type": "R", "before": "2007-09-25", "after": "2007-09-09", "start_char_pos": 30810, "end_char_pos": 30820}, {"type": "R", "before": "2007-09-26", "after": "2007-09-09", "start_char_pos": 30928, "end_char_pos": 30938}, {"type": "R", "before": "2007-09-27", "after": "2007-09-09", "start_char_pos": 31046, "end_char_pos": 31056}, {"type": "R", "before": "2007-09-28", "after": "2007-09-09", "start_char_pos": 31164, "end_char_pos": 31174}, {"type": "R", "before": "2007-09-29", "after": "2007-09-09", "start_char_pos": 31282, "end_char_pos": 31292}, {"type": "R", "before": "2007-09-30", "after": "2007-09-09", "start_char_pos": 31400, "end_char_pos": 31410}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 31563, "end_char_pos": 31565}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 31680, "end_char_pos": 31682}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 31797, "end_char_pos": 31799}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 31914, "end_char_pos": 31916}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 32031, "end_char_pos": 32033}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 32148, "end_char_pos": 32150}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 32265, "end_char_pos": 32267}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 32382, "end_char_pos": 32384}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 32499, "end_char_pos": 32501}, {"type": "R", "before": "2007-10-10", "after": "2007-10-09", "start_char_pos": 32588, "end_char_pos": 32598}, {"type": "R", "before": "2007-10-11", "after": "2007-10-09", "start_char_pos": 32704, "end_char_pos": 32714}, {"type": "R", "before": "2007-10-12", "after": "2007-10-09", "start_char_pos": 32820, "end_char_pos": 32830}, {"type": "R", "before": "2007-10-13", "after": "2007-10-09", "start_char_pos": 32936, "end_char_pos": 32946}, {"type": "R", "before": "2007-10-14", "after": "2007-10-09", "start_char_pos": 33052, "end_char_pos": 33062}, {"type": "R", "before": "2007-10-15", "after": "2007-10-09", "start_char_pos": 33168, "end_char_pos": 33178}, {"type": "R", "before": "2007-10-16", "after": "2007-10-09", "start_char_pos": 33284, "end_char_pos": 33294}, {"type": "R", "before": "2007-10-17", "after": "2007-10-09", "start_char_pos": 33400, "end_char_pos": 33410}, {"type": "R", "before": "2007-10-18", "after": "2007-10-09", "start_char_pos": 33516, "end_char_pos": 33526}, {"type": "R", "before": "2007-10-19", "after": "2007-10-09", "start_char_pos": 33632, "end_char_pos": 33642}, {"type": "R", "before": "2007-10-20", "after": "2007-10-09", "start_char_pos": 33748, "end_char_pos": 33758}, {"type": "R", "before": "2007-10-21", "after": "2007-10-09", "start_char_pos": 33864, "end_char_pos": 33874}, {"type": "R", "before": "2007-10-22", "after": "2007-10-09", "start_char_pos": 33980, "end_char_pos": 33990}, {"type": "R", "before": "2007-10-23", "after": "2007-10-09", "start_char_pos": 34096, "end_char_pos": 34106}, {"type": "R", "before": "2007-10-24", "after": "2007-10-09", "start_char_pos": 34212, "end_char_pos": 34222}, {"type": "R", "before": "2007-10-25", "after": "2007-10-09", "start_char_pos": 34328, "end_char_pos": 34338}, {"type": "R", "before": "2007-10-26", "after": "2007-10-09", "start_char_pos": 34444, "end_char_pos": 34454}, {"type": "R", "before": "2007-10-27", "after": "2007-10-09", "start_char_pos": 34560, "end_char_pos": 34570}, {"type": "R", "before": "2007-10-28", "after": "2007-10-09", "start_char_pos": 34676, "end_char_pos": 34686}, {"type": "R", "before": "2007-10-29", "after": "2007-10-09", "start_char_pos": 34792, "end_char_pos": 34802}, {"type": "R", "before": "2007-10-30", "after": "2007-10-09", "start_char_pos": 34908, "end_char_pos": 34918}, {"type": "R", "before": "2007-10-31", "after": "2007-10-09", "start_char_pos": 35024, "end_char_pos": 35034}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 35187, "end_char_pos": 35189}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 35305, "end_char_pos": 35307}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 35423, "end_char_pos": 35425}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 35541, "end_char_pos": 35543}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 35659, "end_char_pos": 35661}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 35777, "end_char_pos": 35779}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 35895, "end_char_pos": 35897}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 36013, "end_char_pos": 36015}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 36131, "end_char_pos": 36133}, {"type": "R", "before": "2007-11-10", "after": "2007-11-09", "start_char_pos": 36220, "end_char_pos": 36230}, {"type": "R", "before": "2007-11-11", "after": "2007-11-09", "start_char_pos": 36337, "end_char_pos": 36347}, {"type": "R", "before": "2007-11-12", "after": "2007-11-09", "start_char_pos": 36454, "end_char_pos": 36464}, {"type": "R", "before": "2007-11-13", "after": "2007-11-09", "start_char_pos": 36571, "end_char_pos": 36581}, {"type": "R", "before": "2007-11-14", "after": "2007-11-09", "start_char_pos": 36688, "end_char_pos": 36698}, {"type": "R", "before": "2007-11-15", "after": "2007-11-09", "start_char_pos": 36805, "end_char_pos": 36815}, {"type": "R", "before": "2007-11-16", "after": "2007-11-09", "start_char_pos": 36922, "end_char_pos": 36932}, {"type": "R", "before": "2007-11-17", "after": "2007-11-09", "start_char_pos": 37039, "end_char_pos": 37049}, {"type": "R", "before": "2007-11-18", "after": "2007-11-09", "start_char_pos": 37156, "end_char_pos": 37166}, {"type": "R", "before": "2007-11-19", "after": "2007-11-09", "start_char_pos": 37273, "end_char_pos": 37283}, {"type": "R", "before": "2007-11-20", "after": "2007-11-09", "start_char_pos": 37390, "end_char_pos": 37400}, {"type": "R", "before": "2007-11-21", "after": "2007-11-09", "start_char_pos": 37507, "end_char_pos": 37517}, {"type": "R", "before": "2007-11-22", "after": "2007-11-09", "start_char_pos": 37624, "end_char_pos": 37634}, {"type": "R", "before": "2007-11-23", "after": "2007-11-09", "start_char_pos": 37741, "end_char_pos": 37751}, {"type": "R", "before": "2007-11-24", "after": "2007-11-09", "start_char_pos": 37858, "end_char_pos": 37868}, {"type": "R", "before": "2007-11-25", "after": "2007-11-09", "start_char_pos": 37975, "end_char_pos": 37985}, {"type": "R", "before": "2007-11-26", "after": "2007-11-09", "start_char_pos": 38092, "end_char_pos": 38102}, {"type": "R", "before": "2007-11-27", "after": "2007-11-09", "start_char_pos": 38209, "end_char_pos": 38219}, {"type": "R", "before": "2007-11-28", "after": "2007-11-09", "start_char_pos": 38326, "end_char_pos": 38336}, {"type": "R", "before": "2007-11-29", "after": "2007-11-09", "start_char_pos": 38443, "end_char_pos": 38453}, {"type": "R", "before": "2007-11-30", "after": "2007-11-09", "start_char_pos": 38560, "end_char_pos": 38570}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 38724, "end_char_pos": 38726}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 38842, "end_char_pos": 38844}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 38960, "end_char_pos": 38962}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 39078, "end_char_pos": 39080}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 39196, "end_char_pos": 39198}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 39314, "end_char_pos": 39316}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 39432, "end_char_pos": 39434}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 39550, "end_char_pos": 39552}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 39668, "end_char_pos": 39670}, {"type": "R", "before": "2007-12-10", "after": "2007-12-09", "start_char_pos": 39757, "end_char_pos": 39767}, {"type": "R", "before": "2007-12-11", "after": "2007-12-09", "start_char_pos": 39874, "end_char_pos": 39884}, {"type": "R", "before": "2007-12-12", "after": "2007-12-09", "start_char_pos": 39991, "end_char_pos": 40001}, {"type": "R", "before": "2007-12-13", "after": "2007-12-09", "start_char_pos": 40108, "end_char_pos": 40118}, {"type": "R", "before": "2007-12-14", "after": "2007-12-09", "start_char_pos": 40225, "end_char_pos": 40235}, {"type": "R", "before": "2007-12-15", "after": "2007-12-09", "start_char_pos": 40342, "end_char_pos": 40352}, {"type": "R", "before": "2007-12-16", "after": "2007-12-09", "start_char_pos": 40459, "end_char_pos": 40469}, {"type": "R", "before": "2007-12-17", "after": "2007-12-09", "start_char_pos": 40576, "end_char_pos": 40586}, {"type": "R", "before": "2007-12-18", "after": "2007-12-09", "start_char_pos": 40693, "end_char_pos": 40703}, {"type": "R", "before": "2007-12-19", "after": "2007-12-09", "start_char_pos": 40810, "end_char_pos": 40820}, {"type": "R", "before": "2007-12-20", "after": "2007-12-09", "start_char_pos": 40927, "end_char_pos": 40937}, {"type": "R", "before": "2007-12-21", "after": "2007-12-09", "start_char_pos": 41044, "end_char_pos": 41054}, {"type": "R", "before": "2007-12-22", "after": "2007-12-09", "start_char_pos": 41161, "end_char_pos": 41171}, {"type": "R", "before": "2007-12-23", "after": "2007-12-09", "start_char_pos": 41278, "end_char_pos": 41288}, {"type": "R", "before": "2007-12-24", "after": "2007-12-09", "start_char_pos": 41395, "end_char_pos": 41405}, {"type": "R", "before": "2007-12-25", "after": "2007-12-09", "start_char_pos": 41512, "end_char_pos": 41522}, {"type": "R", "before": "2007-12-26", "after": "2007-12-09", "start_char_pos": 41629, "end_char_pos": 41639}, {"type": "R", "before": "2007-12-27", "after": "2007-12-09", "start_char_pos": 41746, "end_char_pos": 41756}, {"type": "R", "before": "2007-12-28", "after": "2007-12-09", "start_char_pos": 41863, "end_char_pos": 41873}, {"type": "R", "before": "2007-12-29", "after": "2007-12-09", "start_char_pos": 41980, "end_char_pos": 41990}, {"type": "R", "before": "2007-12-30", "after": "2007-12-09", "start_char_pos": 42097, "end_char_pos": 42107}, {"type": "R", "before": "2007-12-31", "after": "2007-12-09", "start_char_pos": 42214, "end_char_pos": 42224}], "sents_char_pos": [0, 49, 166, 283, 400, 517, 634, 751, 868, 985, 1101, 1217, 1333, 1449, 1565, 1681, 1797, 1913, 2029, 2145, 2261, 2377, 2493, 2609, 2725, 2841, 2957, 3073, 3189, 3305, 3421, 3537, 3673, 3791, 3909, 4027, 4145, 4263, 4381, 4499, 4617, 4734, 4851, 4968, 5085, 5202, 5319, 5436, 5553, 5670, 5787, 5904, 6021, 6138, 6255, 6372, 6489, 6606, 6723, 6840, 6970, 7085, 7200, 7315, 7430, 7545, 7660, 7775, 7890, 8004, 8118, 8232, 8346, 8460, 8574, 8688, 8802, 8916, 9030, 9144, 9258, 9372, 9486, 9600, 9714, 9828, 9942, 10056, 10170, 10284, 10398, 10528, 10643, 10758, 10873, 10988, 11103, 11218, 11333, 11448, 11562, 11676, 11790, 11904, 12018, 12132, 12246, 12360, 12474, 12588, 12702, 12816, 12930, 13044, 13158, 13272, 13386, 13500, 13614, 13728, 13842, 13968, 14081, 14194, 14307, 14420, 14533, 14646, 14759, 14872, 14984, 15096, 15208, 15320, 15432, 15544, 15656, 15768, 15880, 15992, 16104, 16216, 16328, 16440, 16552, 16664, 16776, 16888, 17000, 17112, 17224, 17336, 17464, 17578, 17692, 17806, 17920, 18034, 18148, 18262, 18376, 18489, 18602, 18715, 18828, 18941, 19054, 19167, 19280, 19393, 19506, 19619, 19732, 19845, 19958, 20071, 20184, 20297, 20410, 20523, 20636, 20749, 20877, 20991, 21105, 21219, 21333, 21447, 21561, 21675, 21789, 21902, 22015, 22128, 22241, 22354, 22467, 22580, 22693, 22806, 22919, 23032, 23145, 23258, 23371, 23484, 23597, 23710, 23823, 23936, 24049, 24162, 24275, 24407, 24523, 24639, 24755, 24871, 24987, 25103, 25219, 25335, 25450, 25565, 25680, 25795, 25910, 26025, 26140, 26255, 26370, 26485, 26600, 26715, 26830, 26945, 27060, 27175, 27290, 27405, 27520, 27635, 27750, 27865, 28003, 28122, 28241, 28360, 28479, 28598, 28717, 28836, 28955, 29073, 29191, 29309, 29427, 29545, 29663, 29781, 29899, 30017, 30135, 30253, 30371, 30489, 30607, 30725, 30843, 30961, 31079, 31197, 31315, 31433, 31567, 31684, 31801, 31918, 32035, 32152, 32269, 32386, 32503, 32619, 32735, 32851, 32967, 33083, 33199, 33315, 33431, 33547, 33663, 33779, 33895, 34011, 34127, 34243, 34359, 34475, 34591, 34707, 34823, 34939, 35055, 35191, 35309, 35427, 35545, 35663, 35781, 35899, 36017, 36135, 36252, 36369, 36486, 36603, 36720, 36837, 36954, 37071, 37188, 37305, 37422, 37539, 37656, 37773, 37890, 38007, 38124, 38241, 38358, 38475, 38592, 38728, 38846, 38964, 39082, 39200, 39318, 39436, 39554, 39672, 39789, 39906, 40023, 40140, 40257, 40374, 40491, 40608, 40725, 40842, 40959, 41076, 41193, 41310, 41427, 41544, 41661, 41778, 41895]}
+{"doc_id": "124825", "revision_depth": "2", "before_revision": "January datenews 2007-01-01 category=January 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-02 category=January 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-03 category=January 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-04 category=January 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-05 category=January 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-06 category=January 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-07 category=January 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-08 category=January 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true February datenews 2007-02-01 category=February 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-02 category=February 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-03 category=February 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-04 category=February 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-05 category=February 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-06 category=February 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-07 category=February 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-08 category=February 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true March datenews 2007-03-01 category=March 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-02 category=March 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-03 category=March 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-04 category=March 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-05 category=March 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-06 category=March 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-07 category=March 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-08 category=March 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true April datenews 2007-04-01 category=April 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-02 category=April 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-03 category=April 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-04 category=April 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-05 category=April 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-06 category=April 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-07 category=April 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-08 category=April 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true May datenews 2007-05-01 category=May 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-02 category=May 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-03 category=May 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-04 category=May 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-05 category=May 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-06 category=May 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-07 category=May 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-08 category=May 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true June datenews 2007-06-01 category=June 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-02 category=June 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-03 category=June 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-04 category=June 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-05 category=June 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-06 category=June 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-07 category=June 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-08 category=June 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true July datenews 2007-07-01 category=July 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-02 category=July 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-03 category=July 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-04 category=July 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-05 category=July 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-06 category=July 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-07 category=July 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-08 category=July 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true August datenews 2007-08-01 category=August 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-02 category=August 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-03 category=August 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-04 category=August 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-05 category=August 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-06 category=August 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-07 category=August 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-08 category=August 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true September datenews 2007-09-01 category=September 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-02 category=September 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-03 category=September 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-04 category=September 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-05 category=September 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-06 category=September 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-07 category=September 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-08 category=September 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true October datenews 2007-10-01 category=October 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-02 category=October 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-03 category=October 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-04 category=October 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-05 category=October 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-06 category=October 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-07 category=October 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-08 category=October 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true November datenews 2007-11-01 category=November 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-02 category=November 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-03 category=November 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-04 category=November 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-05 category=November 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-06 category=November 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-07 category=November 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-08 category=November 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true December datenews 2007-12-01 category=December 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-02 category=December 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-03 category=December 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-04 category=December 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-05 category=December 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-06 category=December 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-07 category=December 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-08 category=December 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=tru", "after_revision": "January datenews 2007-01-01 category=January 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-02 category=January 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-03 category=January 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-04 category=January 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-05 category=January 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-06 category=January 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-07 category=January 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-08 category=January 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-09 category=January 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-10 category=January 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-11 category=January 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-12 category=January 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-13 category=January 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-14 category=January 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-15 category=January 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-16 category=January 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-17 category=January 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-18 category=January 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-19 category=January 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-20 category=January 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-21 category=January 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-22 category=January 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-23 category=January 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-24 category=January 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-25 category=January 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-26 category=January 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-27 category=January 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-28 category=January 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-29 category=January 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-30 category=January 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-01-31 category=January 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true February datenews 2007-02-01 category=February 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-02 category=February 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-03 category=February 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-04 category=February 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-05 category=February 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-06 category=February 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-07 category=February 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-08 category=February 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-09 category=February 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-10 category=February 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-11 category=February 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-12 category=February 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-13 category=February 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-14 category=February 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-15 category=February 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-16 category=February 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-17 category=February 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-18 category=February 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-19 category=February 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-20 category=February 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-21 category=February 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-22 category=February 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-23 category=February 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-24 category=February 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-25 category=February 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-26 category=February 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-27 category=February 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-02-28 category=February 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true March datenews 2007-03-01 category=March 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-02 category=March 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-03 category=March 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-04 category=March 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-05 category=March 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-06 category=March 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-07 category=March 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-08 category=March 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-09 category=March 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-10 category=March 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-11 category=March 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-12 category=March 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-13 category=March 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-14 category=March 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-15 category=March 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-16 category=March 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-17 category=March 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-18 category=March 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-19 category=March 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-20 category=March 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-21 category=March 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-22 category=March 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-23 category=March 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-24 category=March 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-25 category=March 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-26 category=March 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-27 category=March 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-28 category=March 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-29 category=March 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-30 category=March 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-03-31 category=March 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true April datenews 2007-04-01 category=April 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-02 category=April 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-03 category=April 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-04 category=April 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-05 category=April 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-06 category=April 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-07 category=April 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-08 category=April 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-09 category=April 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-10 category=April 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-11 category=April 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-12 category=April 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-13 category=April 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-14 category=April 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-15 category=April 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-16 category=April 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-17 category=April 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-18 category=April 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-19 category=April 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-20 category=April 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-21 category=April 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-22 category=April 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-23 category=April 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-24 category=April 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-25 category=April 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-26 category=April 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-27 category=April 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-28 category=April 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-29 category=April 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-04-30 category=April 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true May datenews 2007-05-01 category=May 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-02 category=May 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-03 category=May 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-04 category=May 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-05 category=May 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-06 category=May 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-07 category=May 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-08 category=May 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-09 category=May 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-10 category=May 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-11 category=May 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-12 category=May 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-13 category=May 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-14 category=May 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-15 category=May 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-16 category=May 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-17 category=May 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-18 category=May 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-19 category=May 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-20 category=May 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-21 category=May 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-22 category=May 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-23 category=May 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-24 category=May 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-25 category=May 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-26 category=May 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-27 category=May 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-28 category=May 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-29 category=May 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-30 category=May 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-05-31 category=May 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true June datenews 2007-06-01 category=June 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-02 category=June 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-03 category=June 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-04 category=June 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-05 category=June 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-06 category=June 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-07 category=June 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-08 category=June 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-09 category=June 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-10 category=June 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-11 category=June 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-12 category=June 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-13 category=June 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-14 category=June 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-15 category=June 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-16 category=June 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-17 category=June 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-18 category=June 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-19 category=June 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-20 category=June 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-21 category=June 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-22 category=June 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-23 category=June 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-24 category=June 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-25 category=June 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-26 category=June 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-27 category=June 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-28 category=June 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-29 category=June 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-06-30 category=June 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true July datenews 2007-07-01 category=July 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-02 category=July 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-03 category=July 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-04 category=July 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-05 category=July 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-06 category=July 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-07 category=July 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-08 category=July 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-09 category=July 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-10 category=July 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-11 category=July 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-12 category=July 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-13 category=July 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-14 category=July 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-15 category=July 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-16 category=July 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-17 category=July 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-18 category=July 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-19 category=July 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-20 category=July 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-21 category=July 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-22 category=July 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-23 category=July 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-24 category=July 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-25 category=July 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-26 category=July 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-27 category=July 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-28 category=July 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-29 category=July 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-30 category=July 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-07-31 category=July 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true August datenews 2007-08-01 category=August 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-02 category=August 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-03 category=August 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-04 category=August 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-05 category=August 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-06 category=August 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-07 category=August 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-08 category=August 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-09 category=August 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-10 category=August 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-11 category=August 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-12 category=August 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-13 category=August 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-14 category=August 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-15 category=August 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-16 category=August 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-17 category=August 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-18 category=August 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-19 category=August 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-20 category=August 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-21 category=August 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-22 category=August 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-23 category=August 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-24 category=August 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-25 category=August 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-26 category=August 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-27 category=August 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-28 category=August 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-29 category=August 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-30 category=August 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-08-31 category=August 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true September datenews 2007-09-01 category=September 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-02 category=September 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-03 category=September 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-04 category=September 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-05 category=September 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-06 category=September 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-07 category=September 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-08 category=September 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-09 category=September 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-10 category=September 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-11 category=September 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-12 category=September 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-13 category=September 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-14 category=September 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-15 category=September 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-16 category=September 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-17 category=September 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-18 category=September 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-19 category=September 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-20 category=September 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-21 category=September 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-22 category=September 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-23 category=September 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-24 category=September 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-25 category=September 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-26 category=September 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-27 category=September 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-28 category=September 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-29 category=September 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-09-30 category=September 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true October datenews 2007-10-01 category=October 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-02 category=October 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-03 category=October 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-04 category=October 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-05 category=October 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-06 category=October 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-07 category=October 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-08 category=October 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-09 category=October 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-10 category=October 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-11 category=October 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-12 category=October 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-13 category=October 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-14 category=October 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-15 category=October 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-16 category=October 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-17 category=October 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-18 category=October 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-19 category=October 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-20 category=October 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-21 category=October 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-22 category=October 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-23 category=October 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-24 category=October 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-25 category=October 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-26 category=October 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-27 category=October 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-28 category=October 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-29 category=October 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-30 category=October 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-10-31 category=October 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true November datenews 2007-11-01 category=November 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-02 category=November 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-03 category=November 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-04 category=November 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-05 category=November 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-06 category=November 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-07 category=November 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-08 category=November 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-09 category=November 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-10 category=November 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-11 category=November 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-12 category=November 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-13 category=November 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-14 category=November 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-15 category=November 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-16 category=November 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-17 category=November 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-18 category=November 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-19 category=November 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-20 category=November 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-21 category=November 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-22 category=November 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-23 category=November 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-24 category=November 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-25 category=November 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-26 category=November 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-27 category=November 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-28 category=November 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-29 category=November 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-11-30 category=November 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true December datenews 2007-12-01 category=December 1, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-02 category=December 2, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-03 category=December 3, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-04 category=December 4, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-05 category=December 5, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-06 category=December 6, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-07 category=December 7, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-08 category=December 8, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-09 category=December 9, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-10 category=December 10, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-11 category=December 11, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-12 category=December 12, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-13 category=December 13, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-14 category=December 14, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-15 category=December 15, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-16 category=December 16, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-17 category=December 17, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-18 category=December 18, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-19 category=December 19, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-20 category=December 20, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-21 category=December 21, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-22 category=December 22, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-23 category=December 23, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-24 category=December 24, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-25 category=December 25, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-26 category=December 26, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-27 category=December 27, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-28 category=December 28, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-29 category=December 29, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-30 category=December 30, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=true 2007-12-31 category=December 31, 2007 category=Published category=Australia notcategory=Disputed suppresserrors=tru", "edit_actions": [{"type": "R", "before": "2007-01-09", "after": "2007-01-10", "start_char_pos": 1052, "end_char_pos": 1062}, {"type": "R", "before": "2007-01-09", "after": "2007-01-11", "start_char_pos": 1168, "end_char_pos": 1178}, {"type": "R", "before": "2007-01-09", "after": "2007-01-12", "start_char_pos": 1284, "end_char_pos": 1294}, {"type": "R", "before": "2007-01-09", "after": "2007-01-13", "start_char_pos": 1400, "end_char_pos": 1410}, {"type": "R", "before": "2007-01-09", "after": "2007-01-14", "start_char_pos": 1516, "end_char_pos": 1526}, {"type": "R", "before": "2007-01-09", "after": "2007-01-15", "start_char_pos": 1632, "end_char_pos": 1642}, {"type": "R", "before": "2007-01-09", "after": "2007-01-16", "start_char_pos": 1748, "end_char_pos": 1758}, {"type": "R", "before": "2007-01-09", "after": "2007-01-17", "start_char_pos": 1864, "end_char_pos": 1874}, {"type": "R", "before": "2007-01-09", "after": "2007-01-18", "start_char_pos": 1980, "end_char_pos": 1990}, {"type": "R", "before": "2007-01-09", "after": "2007-01-19", "start_char_pos": 2096, "end_char_pos": 2106}, {"type": "R", "before": "2007-01-09", "after": "2007-01-20", "start_char_pos": 2212, "end_char_pos": 2222}, {"type": "R", "before": "2007-01-09", "after": "2007-01-21", "start_char_pos": 2328, "end_char_pos": 2338}, {"type": "R", "before": "2007-01-09", "after": "2007-01-22", "start_char_pos": 2444, "end_char_pos": 2454}, {"type": "R", "before": "2007-01-09", "after": "2007-01-23", "start_char_pos": 2560, "end_char_pos": 2570}, {"type": "R", "before": "2007-01-09", "after": "2007-01-24", "start_char_pos": 2676, "end_char_pos": 2686}, {"type": "R", "before": "2007-01-09", "after": "2007-01-25", "start_char_pos": 2792, "end_char_pos": 2802}, {"type": "R", "before": "2007-01-09", "after": "2007-01-26", "start_char_pos": 2908, "end_char_pos": 2918}, {"type": "R", "before": "2007-01-09", "after": "2007-01-27", "start_char_pos": 3024, "end_char_pos": 3034}, {"type": "R", "before": "2007-01-09", "after": "2007-01-28", "start_char_pos": 3140, "end_char_pos": 3150}, {"type": "R", "before": "2007-01-09", "after": "2007-01-29", "start_char_pos": 3256, "end_char_pos": 3266}, {"type": "R", "before": "2007-01-09", "after": "2007-01-30", "start_char_pos": 3372, "end_char_pos": 3382}, {"type": "R", "before": "2007-01-09", "after": "2007-01-31", "start_char_pos": 3488, "end_char_pos": 3498}, {"type": "R", "before": "2007-02-09", "after": "2007-02-10", "start_char_pos": 4666, "end_char_pos": 4676}, {"type": "R", "before": "2007-02-09", "after": "2007-02-11", "start_char_pos": 4783, "end_char_pos": 4793}, {"type": "R", "before": "2007-02-09", "after": "2007-02-12", "start_char_pos": 4900, "end_char_pos": 4910}, {"type": "R", "before": "2007-02-09", "after": "2007-02-13", "start_char_pos": 5017, "end_char_pos": 5027}, {"type": "R", "before": "2007-02-09", "after": "2007-02-14", "start_char_pos": 5134, "end_char_pos": 5144}, {"type": "R", "before": "2007-02-09", "after": "2007-02-15", "start_char_pos": 5251, "end_char_pos": 5261}, {"type": "R", "before": "2007-02-09", "after": "2007-02-16", "start_char_pos": 5368, "end_char_pos": 5378}, {"type": "R", "before": "2007-02-09", "after": "2007-02-17", "start_char_pos": 5485, "end_char_pos": 5495}, {"type": "R", "before": "2007-02-09", "after": "2007-02-18", "start_char_pos": 5602, "end_char_pos": 5612}, {"type": "R", "before": "2007-02-09", "after": "2007-02-19", "start_char_pos": 5719, "end_char_pos": 5729}, {"type": "R", "before": "2007-02-09", "after": "2007-02-20", "start_char_pos": 5836, "end_char_pos": 5846}, {"type": "R", "before": "2007-02-09", "after": "2007-02-21", "start_char_pos": 5953, "end_char_pos": 5963}, {"type": "R", "before": "2007-02-09", "after": "2007-02-22", "start_char_pos": 6070, "end_char_pos": 6080}, {"type": "R", "before": "2007-02-09", "after": "2007-02-23", "start_char_pos": 6187, "end_char_pos": 6197}, {"type": "R", "before": "2007-02-09", "after": "2007-02-24", "start_char_pos": 6304, "end_char_pos": 6314}, {"type": "R", "before": "2007-02-09", "after": "2007-02-25", "start_char_pos": 6421, "end_char_pos": 6431}, {"type": "R", "before": "2007-02-09", "after": "2007-02-26", "start_char_pos": 6538, "end_char_pos": 6548}, {"type": "R", "before": "2007-02-09", "after": "2007-02-27", "start_char_pos": 6655, "end_char_pos": 6665}, {"type": "R", "before": "2007-02-09", "after": "2007-02-28", "start_char_pos": 6772, "end_char_pos": 6782}, {"type": "R", "before": "2007-03-09", "after": "2007-03-10", "start_char_pos": 7921, "end_char_pos": 7931}, {"type": "R", "before": "2007-03-09", "after": "2007-03-11", "start_char_pos": 8035, "end_char_pos": 8045}, {"type": "R", "before": "2007-03-09", "after": "2007-03-12", "start_char_pos": 8149, "end_char_pos": 8159}, {"type": "R", "before": "2007-03-09", "after": "2007-03-13", "start_char_pos": 8263, "end_char_pos": 8273}, {"type": "R", "before": "2007-03-09", "after": "2007-03-14", "start_char_pos": 8377, "end_char_pos": 8387}, {"type": "R", "before": "2007-03-09", "after": "2007-03-15", "start_char_pos": 8491, "end_char_pos": 8501}, {"type": "R", "before": "2007-03-09", "after": "2007-03-16", "start_char_pos": 8605, "end_char_pos": 8615}, {"type": "R", "before": "2007-03-09", "after": "2007-03-17", "start_char_pos": 8719, "end_char_pos": 8729}, {"type": "R", "before": "2007-03-09", "after": "2007-03-18", "start_char_pos": 8833, "end_char_pos": 8843}, {"type": "R", "before": "2007-03-09", "after": "2007-03-19", "start_char_pos": 8947, "end_char_pos": 8957}, {"type": "R", "before": "2007-03-09", "after": "2007-03-20", "start_char_pos": 9061, "end_char_pos": 9071}, {"type": "R", "before": "2007-03-09", "after": "2007-03-21", "start_char_pos": 9175, "end_char_pos": 9185}, {"type": "R", "before": "2007-03-09", "after": "2007-03-22", "start_char_pos": 9289, "end_char_pos": 9299}, {"type": "R", "before": "2007-03-09", "after": "2007-03-23", "start_char_pos": 9403, "end_char_pos": 9413}, {"type": "R", "before": "2007-03-09", "after": "2007-03-24", "start_char_pos": 9517, "end_char_pos": 9527}, {"type": "R", "before": "2007-03-09", "after": "2007-03-25", "start_char_pos": 9631, "end_char_pos": 9641}, {"type": "R", "before": "2007-03-09", "after": "2007-03-26", "start_char_pos": 9745, "end_char_pos": 9755}, {"type": "R", "before": "2007-03-09", "after": "2007-03-27", "start_char_pos": 9859, "end_char_pos": 9869}, {"type": "R", "before": "2007-03-09", "after": "2007-03-28", "start_char_pos": 9973, "end_char_pos": 9983}, {"type": "R", "before": "2007-03-09", "after": "2007-03-29", "start_char_pos": 10087, "end_char_pos": 10097}, {"type": "R", "before": "2007-03-09", "after": "2007-03-30", "start_char_pos": 10201, "end_char_pos": 10211}, {"type": "R", "before": "2007-03-09", "after": "2007-03-31", "start_char_pos": 10315, "end_char_pos": 10325}, {"type": "R", "before": "2007-04-09", "after": "2007-04-10", "start_char_pos": 11461, "end_char_pos": 11471}, {"type": "R", "before": "2007-04-09", "after": "2007-04-11", "start_char_pos": 11575, "end_char_pos": 11585}, {"type": "R", "before": "2007-04-09", "after": "2007-04-12", "start_char_pos": 11689, "end_char_pos": 11699}, {"type": "R", "before": "2007-04-09", "after": "2007-04-13", "start_char_pos": 11803, "end_char_pos": 11813}, {"type": "R", "before": "2007-04-09", "after": "2007-04-14", "start_char_pos": 11917, "end_char_pos": 11927}, {"type": "R", "before": "2007-04-09", "after": "2007-04-15", "start_char_pos": 12031, "end_char_pos": 12041}, {"type": "R", "before": "2007-04-09", "after": "2007-04-16", "start_char_pos": 12145, "end_char_pos": 12155}, {"type": "R", "before": "2007-04-09", "after": "2007-04-17", "start_char_pos": 12259, "end_char_pos": 12269}, {"type": "R", "before": "2007-04-09", "after": "2007-04-18", "start_char_pos": 12373, "end_char_pos": 12383}, {"type": "R", "before": "2007-04-09", "after": "2007-04-19", "start_char_pos": 12487, "end_char_pos": 12497}, {"type": "R", "before": "2007-04-09", "after": "2007-04-20", "start_char_pos": 12601, "end_char_pos": 12611}, {"type": "R", "before": "2007-04-09", "after": "2007-04-21", "start_char_pos": 12715, "end_char_pos": 12725}, {"type": "R", "before": "2007-04-09", "after": "2007-04-22", "start_char_pos": 12829, "end_char_pos": 12839}, {"type": "R", "before": "2007-04-09", "after": "2007-04-23", "start_char_pos": 12943, "end_char_pos": 12953}, {"type": "R", "before": "2007-04-09", "after": "2007-04-24", "start_char_pos": 13057, "end_char_pos": 13067}, {"type": "R", "before": "2007-04-09", "after": "2007-04-25", "start_char_pos": 13171, "end_char_pos": 13181}, {"type": "R", "before": "2007-04-09", "after": "2007-04-26", "start_char_pos": 13285, "end_char_pos": 13295}, {"type": "R", "before": "2007-04-09", "after": "2007-04-27", "start_char_pos": 13399, "end_char_pos": 13409}, {"type": "R", "before": "2007-04-09", "after": "2007-04-28", "start_char_pos": 13513, "end_char_pos": 13523}, {"type": "R", "before": "2007-04-09", "after": "2007-04-29", "start_char_pos": 13627, "end_char_pos": 13637}, {"type": "R", "before": "2007-04-09", "after": "2007-04-30", "start_char_pos": 13741, "end_char_pos": 13751}, {"type": "R", "before": "2007-05-09", "after": "2007-05-10", "start_char_pos": 14867, "end_char_pos": 14877}, {"type": "R", "before": "2007-05-09", "after": "2007-05-11", "start_char_pos": 14979, "end_char_pos": 14989}, {"type": "R", "before": "2007-05-09", "after": "2007-05-12", "start_char_pos": 15091, "end_char_pos": 15101}, {"type": "R", "before": "2007-05-09", "after": "2007-05-13", "start_char_pos": 15203, "end_char_pos": 15213}, {"type": "R", "before": "2007-05-09", "after": "2007-05-14", "start_char_pos": 15315, "end_char_pos": 15325}, {"type": "R", "before": "2007-05-09", "after": "2007-05-15", "start_char_pos": 15427, "end_char_pos": 15437}, {"type": "R", "before": "2007-05-09", "after": "2007-05-16", "start_char_pos": 15539, "end_char_pos": 15549}, {"type": "R", "before": "2007-05-09", "after": "2007-05-17", "start_char_pos": 15651, "end_char_pos": 15661}, {"type": "R", "before": "2007-05-09", "after": "2007-05-18", "start_char_pos": 15763, "end_char_pos": 15773}, {"type": "R", "before": "2007-05-09", "after": "2007-05-19", "start_char_pos": 15875, "end_char_pos": 15885}, {"type": "R", "before": "2007-05-09", "after": "2007-05-20", "start_char_pos": 15987, "end_char_pos": 15997}, {"type": "R", "before": "2007-05-09", "after": "2007-05-21", "start_char_pos": 16099, "end_char_pos": 16109}, {"type": "R", "before": "2007-05-09", "after": "2007-05-22", "start_char_pos": 16211, "end_char_pos": 16221}, {"type": "R", "before": "2007-05-09", "after": "2007-05-23", "start_char_pos": 16323, "end_char_pos": 16333}, {"type": "R", "before": "2007-05-09", "after": "2007-05-24", "start_char_pos": 16435, "end_char_pos": 16445}, {"type": "R", "before": "2007-05-09", "after": "2007-05-25", "start_char_pos": 16547, "end_char_pos": 16557}, {"type": "R", "before": "2007-05-09", "after": "2007-05-26", "start_char_pos": 16659, "end_char_pos": 16669}, {"type": "R", "before": "2007-05-09", "after": "2007-05-27", "start_char_pos": 16771, "end_char_pos": 16781}, {"type": "R", "before": "2007-05-09", "after": "2007-05-28", "start_char_pos": 16883, "end_char_pos": 16893}, {"type": "R", "before": "2007-05-09", "after": "2007-05-29", "start_char_pos": 16995, "end_char_pos": 17005}, {"type": "R", "before": "2007-05-09", "after": "2007-05-30", "start_char_pos": 17107, "end_char_pos": 17117}, {"type": "R", "before": "2007-05-09", "after": "2007-05-31", "start_char_pos": 17219, "end_char_pos": 17229}, {"type": "R", "before": "2007-06-09", "after": "2007-06-10", "start_char_pos": 18353, "end_char_pos": 18363}, {"type": "R", "before": "2007-06-09", "after": "2007-06-11", "start_char_pos": 18466, "end_char_pos": 18476}, {"type": "R", "before": "2007-06-09", "after": "2007-06-12", "start_char_pos": 18579, "end_char_pos": 18589}, {"type": "R", "before": "2007-06-09", "after": "2007-06-13", "start_char_pos": 18692, "end_char_pos": 18702}, {"type": "R", "before": "2007-06-09", "after": "2007-06-14", "start_char_pos": 18805, "end_char_pos": 18815}, {"type": "R", "before": "2007-06-09", "after": "2007-06-15", "start_char_pos": 18918, "end_char_pos": 18928}, {"type": "R", "before": "2007-06-09", "after": "2007-06-16", "start_char_pos": 19031, "end_char_pos": 19041}, {"type": "R", "before": "2007-06-09", "after": "2007-06-17", "start_char_pos": 19144, "end_char_pos": 19154}, {"type": "R", "before": "2007-06-09", "after": "2007-06-18", "start_char_pos": 19257, "end_char_pos": 19267}, {"type": "R", "before": "2007-06-09", "after": "2007-06-19", "start_char_pos": 19370, "end_char_pos": 19380}, {"type": "R", "before": "2007-06-09", "after": "2007-06-20", "start_char_pos": 19483, "end_char_pos": 19493}, {"type": "R", "before": "2007-06-09", "after": "2007-06-21", "start_char_pos": 19596, "end_char_pos": 19606}, {"type": "R", "before": "2007-06-09", "after": "2007-06-22", "start_char_pos": 19709, "end_char_pos": 19719}, {"type": "R", "before": "2007-06-09", "after": "2007-06-23", "start_char_pos": 19822, "end_char_pos": 19832}, {"type": "R", "before": "2007-06-09", "after": "2007-06-24", "start_char_pos": 19935, "end_char_pos": 19945}, {"type": "R", "before": "2007-06-09", "after": "2007-06-25", "start_char_pos": 20048, "end_char_pos": 20058}, {"type": "R", "before": "2007-06-09", "after": "2007-06-26", "start_char_pos": 20161, "end_char_pos": 20171}, {"type": "R", "before": "2007-06-09", "after": "2007-06-27", "start_char_pos": 20274, "end_char_pos": 20284}, {"type": "R", "before": "2007-06-09", "after": "2007-06-28", "start_char_pos": 20387, "end_char_pos": 20397}, {"type": "R", "before": "2007-06-09", "after": "2007-06-29", "start_char_pos": 20500, "end_char_pos": 20510}, {"type": "R", "before": "2007-06-09", "after": "2007-06-30", "start_char_pos": 20613, "end_char_pos": 20623}, {"type": "R", "before": "2007-07-09", "after": "2007-07-10", "start_char_pos": 21748, "end_char_pos": 21758}, {"type": "R", "before": "2007-07-09", "after": "2007-07-11", "start_char_pos": 21861, "end_char_pos": 21871}, {"type": "R", "before": "2007-07-09", "after": "2007-07-12", "start_char_pos": 21974, "end_char_pos": 21984}, {"type": "R", "before": "2007-07-09", "after": "2007-07-13", "start_char_pos": 22087, "end_char_pos": 22097}, {"type": "R", "before": "2007-07-09", "after": "2007-07-14", "start_char_pos": 22200, "end_char_pos": 22210}, {"type": "R", "before": "2007-07-09", "after": "2007-07-15", "start_char_pos": 22313, "end_char_pos": 22323}, {"type": "R", "before": "2007-07-09", "after": "2007-07-16", "start_char_pos": 22426, "end_char_pos": 22436}, {"type": "R", "before": "2007-07-09", "after": "2007-07-17", "start_char_pos": 22539, "end_char_pos": 22549}, {"type": "R", "before": "2007-07-09", "after": "2007-07-18", "start_char_pos": 22652, "end_char_pos": 22662}, {"type": "R", "before": "2007-07-09", "after": "2007-07-19", "start_char_pos": 22765, "end_char_pos": 22775}, {"type": "R", "before": "2007-07-09", "after": "2007-07-20", "start_char_pos": 22878, "end_char_pos": 22888}, {"type": "R", "before": "2007-07-09", "after": "2007-07-21", "start_char_pos": 22991, "end_char_pos": 23001}, {"type": "R", "before": "2007-07-09", "after": "2007-07-22", "start_char_pos": 23104, "end_char_pos": 23114}, {"type": "R", "before": "2007-07-09", "after": "2007-07-23", "start_char_pos": 23217, "end_char_pos": 23227}, {"type": "R", "before": "2007-07-09", "after": "2007-07-24", "start_char_pos": 23330, "end_char_pos": 23340}, {"type": "R", "before": "2007-07-09", "after": "2007-07-25", "start_char_pos": 23443, "end_char_pos": 23453}, {"type": "R", "before": "2007-07-09", "after": "2007-07-26", "start_char_pos": 23556, "end_char_pos": 23566}, {"type": "R", "before": "2007-07-09", "after": "2007-07-27", "start_char_pos": 23669, "end_char_pos": 23679}, {"type": "R", "before": "2007-07-09", "after": "2007-07-28", "start_char_pos": 23782, "end_char_pos": 23792}, {"type": "R", "before": "2007-07-09", "after": "2007-07-29", "start_char_pos": 23895, "end_char_pos": 23905}, {"type": "R", "before": "2007-07-09", "after": "2007-07-30", "start_char_pos": 24008, "end_char_pos": 24018}, {"type": "R", "before": "2007-07-09", "after": "2007-07-31", "start_char_pos": 24121, "end_char_pos": 24131}, {"type": "R", "before": "2007-08-09", "after": "2007-08-10", "start_char_pos": 25276, "end_char_pos": 25286}, {"type": "R", "before": "2007-08-09", "after": "2007-08-11", "start_char_pos": 25391, "end_char_pos": 25401}, {"type": "R", "before": "2007-08-09", "after": "2007-08-12", "start_char_pos": 25506, "end_char_pos": 25516}, {"type": "R", "before": "2007-08-09", "after": "2007-08-13", "start_char_pos": 25621, "end_char_pos": 25631}, {"type": "R", "before": "2007-08-09", "after": "2007-08-14", "start_char_pos": 25736, "end_char_pos": 25746}, {"type": "R", "before": "2007-08-09", "after": "2007-08-15", "start_char_pos": 25851, "end_char_pos": 25861}, {"type": "R", "before": "2007-08-09", "after": "2007-08-16", "start_char_pos": 25966, "end_char_pos": 25976}, {"type": "R", "before": "2007-08-09", "after": "2007-08-17", "start_char_pos": 26081, "end_char_pos": 26091}, {"type": "R", "before": "2007-08-09", "after": "2007-08-18", "start_char_pos": 26196, "end_char_pos": 26206}, {"type": "R", "before": "2007-08-09", "after": "2007-08-19", "start_char_pos": 26311, "end_char_pos": 26321}, {"type": "R", "before": "2007-08-09", "after": "2007-08-20", "start_char_pos": 26426, "end_char_pos": 26436}, {"type": "R", "before": "2007-08-09", "after": "2007-08-21", "start_char_pos": 26541, "end_char_pos": 26551}, {"type": "R", "before": "2007-08-09", "after": "2007-08-22", "start_char_pos": 26656, "end_char_pos": 26666}, {"type": "R", "before": "2007-08-09", "after": "2007-08-23", "start_char_pos": 26771, "end_char_pos": 26781}, {"type": "R", "before": "2007-08-09", "after": "2007-08-24", "start_char_pos": 26886, "end_char_pos": 26896}, {"type": "R", "before": "2007-08-09", "after": "2007-08-25", "start_char_pos": 27001, "end_char_pos": 27011}, {"type": "R", "before": "2007-08-09", "after": "2007-08-26", "start_char_pos": 27116, "end_char_pos": 27126}, {"type": "R", "before": "2007-08-09", "after": "2007-08-27", "start_char_pos": 27231, "end_char_pos": 27241}, {"type": "R", "before": "2007-08-09", "after": "2007-08-28", "start_char_pos": 27346, "end_char_pos": 27356}, {"type": "R", "before": "2007-08-09", "after": "2007-08-29", "start_char_pos": 27461, "end_char_pos": 27471}, {"type": "R", "before": "2007-08-09", "after": "2007-08-30", "start_char_pos": 27576, "end_char_pos": 27586}, {"type": "R", "before": "2007-08-09", "after": "2007-08-31", "start_char_pos": 27691, "end_char_pos": 27701}, {"type": "R", "before": "2007-09-09", "after": "2007-09-10", "start_char_pos": 28878, "end_char_pos": 28888}, {"type": "R", "before": "2007-09-09", "after": "2007-09-11", "start_char_pos": 28996, "end_char_pos": 29006}, {"type": "R", "before": "2007-09-09", "after": "2007-09-12", "start_char_pos": 29114, "end_char_pos": 29124}, {"type": "R", "before": "2007-09-09", "after": "2007-09-13", "start_char_pos": 29232, "end_char_pos": 29242}, {"type": "R", "before": "2007-09-09", "after": "2007-09-14", "start_char_pos": 29350, "end_char_pos": 29360}, {"type": "R", "before": "2007-09-09", "after": "2007-09-15", "start_char_pos": 29468, "end_char_pos": 29478}, {"type": "R", "before": "2007-09-09", "after": "2007-09-16", "start_char_pos": 29586, "end_char_pos": 29596}, {"type": "R", "before": "2007-09-09", "after": "2007-09-17", "start_char_pos": 29704, "end_char_pos": 29714}, {"type": "R", "before": "2007-09-09", "after": "2007-09-18", "start_char_pos": 29822, "end_char_pos": 29832}, {"type": "R", "before": "2007-09-09", "after": "2007-09-19", "start_char_pos": 29940, "end_char_pos": 29950}, {"type": "R", "before": "2007-09-09", "after": "2007-09-20", "start_char_pos": 30058, "end_char_pos": 30068}, {"type": "R", "before": "2007-09-09", "after": "2007-09-21", "start_char_pos": 30176, "end_char_pos": 30186}, {"type": "R", "before": "2007-09-09", "after": "2007-09-22", "start_char_pos": 30294, "end_char_pos": 30304}, {"type": "R", "before": "2007-09-09", "after": "2007-09-23", "start_char_pos": 30412, "end_char_pos": 30422}, {"type": "R", "before": "2007-09-09", "after": "2007-09-24", "start_char_pos": 30530, "end_char_pos": 30540}, {"type": "R", "before": "2007-09-09", "after": "2007-09-25", "start_char_pos": 30648, "end_char_pos": 30658}, {"type": "R", "before": "2007-09-09", "after": "2007-09-26", "start_char_pos": 30766, "end_char_pos": 30776}, {"type": "R", "before": "2007-09-09", "after": "2007-09-27", "start_char_pos": 30884, "end_char_pos": 30894}, {"type": "R", "before": "2007-09-09", "after": "2007-09-28", "start_char_pos": 31002, "end_char_pos": 31012}, {"type": "R", "before": "2007-09-09", "after": "2007-09-29", "start_char_pos": 31120, "end_char_pos": 31130}, {"type": "R", "before": "2007-09-09", "after": "2007-09-30", "start_char_pos": 31238, "end_char_pos": 31248}, {"type": "R", "before": "2007-10-09", "after": "2007-10-10", "start_char_pos": 32408, "end_char_pos": 32418}, {"type": "R", "before": "2007-10-09", "after": "2007-10-11", "start_char_pos": 32524, "end_char_pos": 32534}, {"type": "R", "before": "2007-10-09", "after": "2007-10-12", "start_char_pos": 32640, "end_char_pos": 32650}, {"type": "R", "before": "2007-10-09", "after": "2007-10-13", "start_char_pos": 32756, "end_char_pos": 32766}, {"type": "R", "before": "2007-10-09", "after": "2007-10-14", "start_char_pos": 32872, "end_char_pos": 32882}, {"type": "R", "before": "2007-10-09", "after": "2007-10-15", "start_char_pos": 32988, "end_char_pos": 32998}, {"type": "R", "before": "2007-10-09", "after": "2007-10-16", "start_char_pos": 33104, "end_char_pos": 33114}, {"type": "R", "before": "2007-10-09", "after": "2007-10-17", "start_char_pos": 33220, "end_char_pos": 33230}, {"type": "R", "before": "2007-10-09", "after": "2007-10-18", "start_char_pos": 33336, "end_char_pos": 33346}, {"type": "R", "before": "2007-10-09", "after": "2007-10-19", "start_char_pos": 33452, "end_char_pos": 33462}, {"type": "R", "before": "2007-10-09", "after": "2007-10-20", "start_char_pos": 33568, "end_char_pos": 33578}, {"type": "R", "before": "2007-10-09", "after": "2007-10-21", "start_char_pos": 33684, "end_char_pos": 33694}, {"type": "R", "before": "2007-10-09", "after": "2007-10-22", "start_char_pos": 33800, "end_char_pos": 33810}, {"type": "R", "before": "2007-10-09", "after": "2007-10-23", "start_char_pos": 33916, "end_char_pos": 33926}, {"type": "R", "before": "2007-10-09", "after": "2007-10-24", "start_char_pos": 34032, "end_char_pos": 34042}, {"type": "R", "before": "2007-10-09", "after": "2007-10-25", "start_char_pos": 34148, "end_char_pos": 34158}, {"type": "R", "before": "2007-10-09", "after": "2007-10-26", "start_char_pos": 34264, "end_char_pos": 34274}, {"type": "R", "before": "2007-10-09", "after": "2007-10-27", "start_char_pos": 34380, "end_char_pos": 34390}, {"type": "R", "before": "2007-10-09", "after": "2007-10-28", "start_char_pos": 34496, "end_char_pos": 34506}, {"type": "R", "before": "2007-10-09", "after": "2007-10-29", "start_char_pos": 34612, "end_char_pos": 34622}, {"type": "R", "before": "2007-10-09", "after": "2007-10-30", "start_char_pos": 34728, "end_char_pos": 34738}, {"type": "R", "before": "2007-10-09", "after": "2007-10-31", "start_char_pos": 34844, "end_char_pos": 34854}, {"type": "R", "before": "2007-11-09", "after": "2007-11-10", "start_char_pos": 36022, "end_char_pos": 36032}, {"type": "R", "before": "2007-11-09", "after": "2007-11-11", "start_char_pos": 36139, "end_char_pos": 36149}, {"type": "R", "before": "2007-11-09", "after": "2007-11-12", "start_char_pos": 36256, "end_char_pos": 36266}, {"type": "R", "before": "2007-11-09", "after": "2007-11-13", "start_char_pos": 36373, "end_char_pos": 36383}, {"type": "R", "before": "2007-11-09", "after": "2007-11-14", "start_char_pos": 36490, "end_char_pos": 36500}, {"type": "R", "before": "2007-11-09", "after": "2007-11-15", "start_char_pos": 36607, "end_char_pos": 36617}, {"type": "R", "before": "2007-11-09", "after": "2007-11-16", "start_char_pos": 36724, "end_char_pos": 36734}, {"type": "R", "before": "2007-11-09", "after": "2007-11-17", "start_char_pos": 36841, "end_char_pos": 36851}, {"type": "R", "before": "2007-11-09", "after": "2007-11-18", "start_char_pos": 36958, "end_char_pos": 36968}, {"type": "R", "before": "2007-11-09", "after": "2007-11-19", "start_char_pos": 37075, "end_char_pos": 37085}, {"type": "R", "before": "2007-11-09", "after": "2007-11-20", "start_char_pos": 37192, "end_char_pos": 37202}, {"type": "R", "before": "2007-11-09", "after": "2007-11-21", "start_char_pos": 37309, "end_char_pos": 37319}, {"type": "R", "before": "2007-11-09", "after": "2007-11-22", "start_char_pos": 37426, "end_char_pos": 37436}, {"type": "R", "before": "2007-11-09", "after": "2007-11-23", "start_char_pos": 37543, "end_char_pos": 37553}, {"type": "R", "before": "2007-11-09", "after": "2007-11-24", "start_char_pos": 37660, "end_char_pos": 37670}, {"type": "R", "before": "2007-11-09", "after": "2007-11-25", "start_char_pos": 37777, "end_char_pos": 37787}, {"type": "R", "before": "2007-11-09", "after": "2007-11-26", "start_char_pos": 37894, "end_char_pos": 37904}, {"type": "R", "before": "2007-11-09", "after": "2007-11-27", "start_char_pos": 38011, "end_char_pos": 38021}, {"type": "R", "before": "2007-11-09", "after": "2007-11-28", "start_char_pos": 38128, "end_char_pos": 38138}, {"type": "R", "before": "2007-11-09", "after": "2007-11-29", "start_char_pos": 38245, "end_char_pos": 38255}, {"type": "R", "before": "2007-11-09", "after": "2007-11-30", "start_char_pos": 38362, "end_char_pos": 38372}, {"type": "R", "before": "2007-12-09", "after": "2007-12-10", "start_char_pos": 39541, "end_char_pos": 39551}, {"type": "R", "before": "2007-12-09", "after": "2007-12-11", "start_char_pos": 39658, "end_char_pos": 39668}, {"type": "R", "before": "2007-12-09", "after": "2007-12-12", "start_char_pos": 39775, "end_char_pos": 39785}, {"type": "R", "before": "2007-12-09", "after": "2007-12-13", "start_char_pos": 39892, "end_char_pos": 39902}, {"type": "R", "before": "2007-12-09", "after": "2007-12-14", "start_char_pos": 40009, "end_char_pos": 40019}, {"type": "R", "before": "2007-12-09", "after": "2007-12-15", "start_char_pos": 40126, "end_char_pos": 40136}, {"type": "R", "before": "2007-12-09", "after": "2007-12-16", "start_char_pos": 40243, "end_char_pos": 40253}, {"type": "R", "before": "2007-12-09", "after": "2007-12-17", "start_char_pos": 40360, "end_char_pos": 40370}, {"type": "R", "before": "2007-12-09", "after": "2007-12-18", "start_char_pos": 40477, "end_char_pos": 40487}, {"type": "R", "before": "2007-12-09", "after": "2007-12-19", "start_char_pos": 40594, "end_char_pos": 40604}, {"type": "R", "before": "2007-12-09", "after": "2007-12-20", "start_char_pos": 40711, "end_char_pos": 40721}, {"type": "R", "before": "2007-12-09", "after": "2007-12-21", "start_char_pos": 40828, "end_char_pos": 40838}, {"type": "R", "before": "2007-12-09", "after": "2007-12-22", "start_char_pos": 40945, "end_char_pos": 40955}, {"type": "R", "before": "2007-12-09", "after": "2007-12-23", "start_char_pos": 41062, "end_char_pos": 41072}, {"type": "R", "before": "2007-12-09", "after": "2007-12-24", "start_char_pos": 41179, "end_char_pos": 41189}, {"type": "R", "before": "2007-12-09", "after": "2007-12-25", "start_char_pos": 41296, "end_char_pos": 41306}, {"type": "R", "before": "2007-12-09", "after": "2007-12-26", "start_char_pos": 41413, "end_char_pos": 41423}, {"type": "R", "before": "2007-12-09", "after": "2007-12-27", "start_char_pos": 41530, "end_char_pos": 41540}, {"type": "R", "before": "2007-12-09", "after": "2007-12-28", "start_char_pos": 41647, "end_char_pos": 41657}, {"type": "R", "before": "2007-12-09", "after": "2007-12-29", "start_char_pos": 41764, "end_char_pos": 41774}, {"type": "R", "before": "2007-12-09", "after": "2007-12-30", "start_char_pos": 41881, "end_char_pos": 41891}, {"type": "R", "before": "2007-12-09", "after": "2007-12-31", "start_char_pos": 41998, "end_char_pos": 42008}], "sents_char_pos": [0, 47, 162, 277, 392, 507, 622, 737, 852, 967, 1083, 1199, 1315, 1431, 1547, 1663, 1779, 1895, 2011, 2127, 2243, 2359, 2475, 2591, 2707, 2823, 2939, 3055, 3171, 3287, 3403, 3519, 3653, 3769, 3885, 4001, 4117, 4233, 4349, 4465, 4581, 4698, 4815, 4932, 5049, 5166, 5283, 5400, 5517, 5634, 5751, 5868, 5985, 6102, 6219, 6336, 6453, 6570, 6687, 6804, 6932, 7045, 7158, 7271, 7384, 7497, 7610, 7723, 7836, 7950, 8064, 8178, 8292, 8406, 8520, 8634, 8748, 8862, 8976, 9090, 9204, 9318, 9432, 9546, 9660, 9774, 9888, 10002, 10116, 10230, 10344, 10472, 10585, 10698, 10811, 10924, 11037, 11150, 11263, 11376, 11490, 11604, 11718, 11832, 11946, 12060, 12174, 12288, 12402, 12516, 12630, 12744, 12858, 12972, 13086, 13200, 13314, 13428, 13542, 13656, 13770, 13894, 14005, 14116, 14227, 14338, 14449, 14560, 14671, 14782, 14894, 15006, 15118, 15230, 15342, 15454, 15566, 15678, 15790, 15902, 16014, 16126, 16238, 16350, 16462, 16574, 16686, 16798, 16910, 17022, 17134, 17246, 17372, 17484, 17596, 17708, 17820, 17932, 18044, 18156, 18268, 18381, 18494, 18607, 18720, 18833, 18946, 19059, 19172, 19285, 19398, 19511, 19624, 19737, 19850, 19963, 20076, 20189, 20302, 20415, 20528, 20641, 20767, 20879, 20991, 21103, 21215, 21327, 21439, 21551, 21663, 21776, 21889, 22002, 22115, 22228, 22341, 22454, 22567, 22680, 22793, 22906, 23019, 23132, 23245, 23358, 23471, 23584, 23697, 23810, 23923, 24036, 24149, 24279, 24393, 24507, 24621, 24735, 24849, 24963, 25077, 25191, 25306, 25421, 25536, 25651, 25766, 25881, 25996, 26111, 26226, 26341, 26456, 26571, 26686, 26801, 26916, 27031, 27146, 27261, 27376, 27491, 27606, 27721, 27857, 27974, 28091, 28208, 28325, 28442, 28559, 28676, 28793, 28911, 29029, 29147, 29265, 29383, 29501, 29619, 29737, 29855, 29973, 30091, 30209, 30327, 30445, 30563, 30681, 30799, 30917, 31035, 31153, 31271, 31403, 31518, 31633, 31748, 31863, 31978, 32093, 32208, 32323, 32439, 32555, 32671, 32787, 32903, 33019, 33135, 33251, 33367, 33483, 33599, 33715, 33831, 33947, 34063, 34179, 34295, 34411, 34527, 34643, 34759, 34875, 35009, 35125, 35241, 35357, 35473, 35589, 35705, 35821, 35937, 36054, 36171, 36288, 36405, 36522, 36639, 36756, 36873, 36990, 37107, 37224, 37341, 37458, 37575, 37692, 37809, 37926, 38043, 38160, 38277, 38394, 38528, 38644, 38760, 38876, 38992, 39108, 39224, 39340, 39456, 39573, 39690, 39807, 39924, 40041, 40158, 40275, 40392, 40509, 40626, 40743, 40860, 40977, 41094, 41211, 41328, 41445, 41562, 41679]}
+{"doc_id": "124826", "revision_depth": "1", "before_revision": "January datenews 2006-01-01 category=January 01 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-02 category=January 02 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-03 category=January 03 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-04 category=January 04 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-05 category=January 05 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-06 category=January 06 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-07 category=January 07 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-08 category=January 08 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-09 category=January 09 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-10 category=January 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-11 category=January 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-12 category=January 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-13 category=January 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-14 category=January 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-15 category=January 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-16 category=January 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-17 category=January 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-18 category=January 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-19 category=January 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-20 category=January 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-21 category=January 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-22 category=January 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-23 category=January 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-24 category=January 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-25 category=January 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-26 category=January 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-27 category=January 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-28 category=January 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-29 category=January 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-30 category=January 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-31 category=January 31, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true February datenews 2006-02-01 category=February 01 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-02 category=February 02 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-03 category=February 03 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-04 category=February 04 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-05 category=February 05 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-06 category=February 06 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-07 category=February 07 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-08 category=February 08 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-09 category=February 09 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-10 category=February 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-11 category=February 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-12 category=February 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-13 category=February 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-14 category=February 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-15 category=February 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-16 category=February 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-17 category=February 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-18 category=February 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-19 category=February 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-20 category=February 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-21 category=February 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-22 category=February 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-23 category=February 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-24 category=February 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-25 category=February 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-26 category=February 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-27 category=February 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-28 category=February 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true March datenews 2006-03-01 category=March 01 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-02 category=March 02 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-03 category=March 03 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-04 category=March 04 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-05 category=March 05 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-06 category=March 06 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-07 category=March 07 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-08 category=March 08 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-09 category=March 09 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-10 category=March 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-11 category=March 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-12 category=March 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-13 category=March 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-14 category=March 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-15 category=March 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-16 category=March 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-17 category=March 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-18 category=March 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-19 category=March 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-20 category=March 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-21 category=March 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-22 category=March 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-23 category=March 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-24 category=March 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-25 category=March 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-26 category=March 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-27 category=March 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-28 category=March 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-29 category=March 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-30 category=March 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-31 category=March 31, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true April datenews 2006-04-01 category=April 01 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-02 category=April 02 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-03 category=April 03 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-04 category=April 04 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-05 category=April 05 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-06 category=April 06 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-07 category=April 07 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-08 category=April 08 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-09 category=April 09 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-10 category=April 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-11 category=April 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-12 category=April 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-13 category=April 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-14 category=April 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-15 category=April 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-16 category=April 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-17 category=April 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-18 category=April 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-19 category=April 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-20 category=April 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-21 category=April 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-22 category=April 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-23 category=April 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-24 category=April 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-25 category=April 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-26 category=April 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-27 category=April 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-28 category=April 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-29 category=April 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-30 category=April 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true May datenews 2006-05-01 category=May 01 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-02 category=May 02 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-03 category=May 03 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-04 category=May 04 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-05 category=May 05 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-06 category=May 06 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-07 category=May 07 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-08 category=May 08 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-09 category=May 09 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-10 category=May 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-11 category=May 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-12 category=May 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-13 category=May 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-14 category=May 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-15 category=May 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-16 category=May 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-17 category=May 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-18 category=May 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-19 category=May 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-20 category=May 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-21 category=May 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-22 category=May 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-23 category=May 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-24 category=May 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-25 category=May 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-26 category=May 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-27 category=May 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-28 category=May 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-29 category=May 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-30 category=May 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-31 category=May 31, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true June datenews 2006-06-01 category=June 01 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-02 category=June 02 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-03 category=June 03 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-04 category=June 04 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-05 category=June 05 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-06 category=June 06 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-07 category=June 07 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-08 category=June 08 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-09 category=June 09 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-10 category=June 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-11 category=June 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-12 category=June 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-13 category=June 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-14 category=June 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-15 category=June 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-16 category=June 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-17 category=June 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-18 category=June 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-19 category=June 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-20 category=June 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-21 category=June 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-22 category=June 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-23 category=June 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-24 category=June 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-25 category=June 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-26 category=June 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-27 category=June 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-28 category=June 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-29 category=June 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-30 category=June 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true July datenews 2006-07-01 category=July 01 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-02 category=July 02 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-03 category=July 03 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-04 category=July 04 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-05 category=July 05 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-06 category=July 06 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-07 category=July 07 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-08 category=July 08 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-09 category=July 09 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-10 category=July 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-11 category=July 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-12 category=July 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-13 category=July 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-14 category=July 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-15 category=July 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-16 category=July 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-17 category=July 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-18 category=July 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-19 category=July 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-20 category=July 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-21 category=July 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-22 category=July 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-23 category=July 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-24 category=July 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-25 category=July 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-26 category=July 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-27 category=July 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-28 category=July 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-29 category=July 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-30 category=July 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-31 category=July 31, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true August datenews 2006-08-01 category=August 01 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-02 category=August 02 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-03 category=August 03 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-04 category=August 04 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-05 category=August 05 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-06 category=August 06 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-07 category=August 07 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-08 category=August 08 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-09 category=August 09 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-10 category=August 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-11 category=August 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-12 category=August 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-13 category=August 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-14 category=August 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-15 category=August 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-16 category=August 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-17 category=August 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-18 category=August 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-19 category=August 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-20 category=August 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-21 category=August 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-22 category=August 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-23 category=August 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-24 category=August 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-25 category=August 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-26 category=August 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-27 category=August 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-28 category=August 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-29 category=August 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-30 category=August 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-31 category=August 31, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true September datenews 2006-09-01 category=September 01 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-02 category=September 02 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-03 category=September 03 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-04 category=September 04 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-05 category=September 05 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-06 category=September 06 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-07 category=September 07 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-08 category=September 08 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-09 category=September 09 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-10 category=September 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-11 category=September 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-12 category=September 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-13 category=September 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-14 category=September 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-15 category=September 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-16 category=September 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-17 category=September 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-18 category=September 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-19 category=September 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-20 category=September 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-21 category=September 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-22 category=September 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-23 category=September 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-24 category=September 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-25 category=September 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-26 category=September 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-27 category=September 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-28 category=September 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-29 category=September 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-30 category=September 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true October datenews 2006-10-01 category=October 01 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-02 category=October 02 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-03 category=October 03 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-04 category=October 04 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-05 category=October 05 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-06 category=October 06 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-07 category=October 07 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-08 category=October 08 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-09 category=October 09 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-10 category=October 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-11 category=October 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-12 category=October 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-13 category=October 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-14 category=October 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-15 category=October 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-16 category=October 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-17 category=October 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-18 category=October 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-19 category=October 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-20 category=October 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-21 category=October 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-22 category=October 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-23 category=October 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-24 category=October 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-25 category=October 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-26 category=October 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-27 category=October 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-28 category=October 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-29 category=October 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-30 category=October 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-31 category=October 31, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true November datenews 2006-11-01 category=November 01 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-02 category=November 02 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-03 category=November 03 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-04 category=November 04 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-05 category=November 05 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-06 category=November 06 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-07 category=November 07 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-08 category=November 08 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-09 category=November 09 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-10 category=November 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-11 category=November 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-12 category=November 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-13 category=November 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-14 category=November 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-15 category=November 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-16 category=November 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-17 category=November 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-18 category=November 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-19 category=November 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-20 category=November 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-21 category=November 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-22 category=November 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-23 category=November 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-24 category=November 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-25 category=November 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-26 category=November 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-27 category=November 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-28 category=November 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-29 category=November 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-30 category=November 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true December datenews 2006-12-01 category=December 01 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-02 category=December 02 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-03 category=December 03 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-04 category=December 04 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-05 category=December 05 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-06 category=December 06 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-07 category=December 07 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-08 category=December 08 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-09 category=December 09 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-10 category=December 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-11 category=December 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-12 category=December 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-13 category=December 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-14 category=December 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-15 category=December 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-16 category=December 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-17 category=December 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-18 category=December 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-19 category=December 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-20 category=December 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-21 category=December 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-22 category=December 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-23 category=December 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-24 category=December 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-25 category=December 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-26 category=December 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-27 category=December 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-28 category=December 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-29 category=December 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-30 category=December 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-31 category=December 31, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=tru", "after_revision": "January datenews 2006-01-01 category=January 1 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-02 category=January 2 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-03 category=January 3 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-04 category=January 4 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-05 category=January 5 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-06 category=January 6 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-07 category=January 7 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-08 category=January 8 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-09 category=January 9 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-10 category=January 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-11 category=January 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-12 category=January 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-13 category=January 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-14 category=January 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-15 category=January 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-16 category=January 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-17 category=January 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-18 category=January 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-19 category=January 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-20 category=January 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-21 category=January 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-22 category=January 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-23 category=January 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-24 category=January 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-25 category=January 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-26 category=January 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-27 category=January 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-28 category=January 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-29 category=January 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-30 category=January 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-01-31 category=January 31, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true February datenews 2006-02-01 category=February 1 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-02 category=February 2 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-03 category=February 3 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-04 category=February 4 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-05 category=February 5 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-06 category=February 6 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-07 category=February 7 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-08 category=February 8 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-09 category=February 9 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-10 category=February 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-11 category=February 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-12 category=February 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-13 category=February 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-14 category=February 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-15 category=February 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-16 category=February 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-17 category=February 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-18 category=February 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-19 category=February 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-20 category=February 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-21 category=February 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-22 category=February 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-23 category=February 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-24 category=February 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-25 category=February 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-26 category=February 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-27 category=February 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-02-28 category=February 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true March datenews 2006-03-01 category=March 1 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-02 category=March 2 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-03 category=March 3 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-04 category=March 4 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-05 category=March 5 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-06 category=March 6 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-07 category=March 7 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-08 category=March 8 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-09 category=March 9 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-10 category=March 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-11 category=March 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-12 category=March 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-13 category=March 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-14 category=March 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-15 category=March 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-16 category=March 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-17 category=March 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-18 category=March 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-19 category=March 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-20 category=March 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-21 category=March 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-22 category=March 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-23 category=March 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-24 category=March 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-25 category=March 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-26 category=March 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-27 category=March 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-28 category=March 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-29 category=March 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-30 category=March 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-03-31 category=March 31, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true April datenews 2006-04-01 category=April 1 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-02 category=April 2 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-03 category=April 3 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-04 category=April 4 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-05 category=April 5 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-06 category=April 6 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-07 category=April 7 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-08 category=April 8 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-09 category=April 9 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-10 category=April 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-11 category=April 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-12 category=April 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-13 category=April 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-14 category=April 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-15 category=April 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-16 category=April 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-17 category=April 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-18 category=April 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-19 category=April 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-20 category=April 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-21 category=April 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-22 category=April 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-23 category=April 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-24 category=April 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-25 category=April 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-26 category=April 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-27 category=April 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-28 category=April 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-29 category=April 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-04-30 category=April 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true May datenews 2006-05-01 category=May 1 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-02 category=May 2 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-03 category=May 3 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-04 category=May 4 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-05 category=May 5 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-06 category=May 6 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-07 category=May 7 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-08 category=May 8 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-09 category=May 9 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-10 category=May 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-11 category=May 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-12 category=May 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-13 category=May 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-14 category=May 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-15 category=May 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-16 category=May 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-17 category=May 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-18 category=May 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-19 category=May 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-20 category=May 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-21 category=May 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-22 category=May 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-23 category=May 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-24 category=May 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-25 category=May 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-26 category=May 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-27 category=May 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-28 category=May 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-29 category=May 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-30 category=May 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-05-31 category=May 31, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true June datenews 2006-06-01 category=June 1 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-02 category=June 2 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-03 category=June 3 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-04 category=June 4 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-05 category=June 5 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-06 category=June 6 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-07 category=June 7 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-08 category=June 8 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-09 category=June 9 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-10 category=June 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-11 category=June 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-12 category=June 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-13 category=June 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-14 category=June 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-15 category=June 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-16 category=June 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-17 category=June 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-18 category=June 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-19 category=June 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-20 category=June 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-21 category=June 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-22 category=June 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-23 category=June 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-24 category=June 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-25 category=June 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-26 category=June 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-27 category=June 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-28 category=June 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-29 category=June 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-06-30 category=June 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true July datenews 2006-07-01 category=July 1 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-02 category=July 2 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-03 category=July 3 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-04 category=July 4 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-05 category=July 5 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-06 category=July 6 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-07 category=July 7 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-08 category=July 8 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-09 category=July 9 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-10 category=July 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-11 category=July 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-12 category=July 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-13 category=July 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-14 category=July 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-15 category=July 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-16 category=July 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-17 category=July 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-18 category=July 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-19 category=July 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-20 category=July 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-21 category=July 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-22 category=July 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-23 category=July 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-24 category=July 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-25 category=July 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-26 category=July 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-27 category=July 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-28 category=July 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-29 category=July 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-30 category=July 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-07-31 category=July 31, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true August datenews 2006-08-01 category=August 1 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-02 category=August 2 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-03 category=August 3 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-04 category=August 4 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-05 category=August 5 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-06 category=August 6 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-07 category=August 7 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-08 category=August 8 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-09 category=August 9 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-10 category=August 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-11 category=August 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-12 category=August 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-13 category=August 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-14 category=August 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-15 category=August 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-16 category=August 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-17 category=August 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-18 category=August 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-19 category=August 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-20 category=August 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-21 category=August 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-22 category=August 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-23 category=August 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-24 category=August 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-25 category=August 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-26 category=August 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-27 category=August 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-28 category=August 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-29 category=August 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-30 category=August 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-08-31 category=August 31, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true September datenews 2006-09-01 category=September 1 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-02 category=September 2 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-03 category=September 3 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-04 category=September 4 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-05 category=September 5 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-06 category=September 6 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-07 category=September 7 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-08 category=September 8 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-09 category=September 9 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-10 category=September 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-11 category=September 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-12 category=September 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-13 category=September 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-14 category=September 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-15 category=September 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-16 category=September 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-17 category=September 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-18 category=September 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-19 category=September 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-20 category=September 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-21 category=September 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-22 category=September 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-23 category=September 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-24 category=September 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-25 category=September 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-26 category=September 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-27 category=September 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-28 category=September 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-29 category=September 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-09-30 category=September 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true October datenews 2006-10-01 category=October 1 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-02 category=October 2 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-03 category=October 3 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-04 category=October 4 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-05 category=October 5 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-06 category=October 6 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-07 category=October 7 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-08 category=October 8 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-09 category=October 9 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-10 category=October 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-11 category=October 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-12 category=October 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-13 category=October 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-14 category=October 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-15 category=October 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-16 category=October 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-17 category=October 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-18 category=October 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-19 category=October 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-20 category=October 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-21 category=October 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-22 category=October 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-23 category=October 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-24 category=October 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-25 category=October 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-26 category=October 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-27 category=October 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-28 category=October 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-29 category=October 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-30 category=October 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-10-31 category=October 31, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true November datenews 2006-11-01 category=November 1 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-02 category=November 2 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-03 category=November 3 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-04 category=November 4 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-05 category=November 5 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-06 category=November 6 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-07 category=November 7 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-08 category=November 8 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-09 category=November 9 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-10 category=November 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-11 category=November 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-12 category=November 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-13 category=November 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-14 category=November 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-15 category=November 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-16 category=November 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-17 category=November 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-18 category=November 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-19 category=November 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-20 category=November 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-21 category=November 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-22 category=November 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-23 category=November 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-24 category=November 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-25 category=November 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-26 category=November 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-27 category=November 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-28 category=November 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-29 category=November 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-11-30 category=November 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true December datenews 2006-12-01 category=December 1 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-02 category=December 2 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-03 category=December 3 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-04 category=December 4 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-05 category=December 5 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-06 category=December 6 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-07 category=December 7 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-08 category=December 8 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-09 category=December 9 , 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-10 category=December 10, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-11 category=December 11, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-12 category=December 12, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-13 category=December 13, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-14 category=December 14, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-15 category=December 15, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-16 category=December 16, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-17 category=December 17, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-18 category=December 18, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-19 category=December 19, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-20 category=December 20, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-21 category=December 21, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-22 category=December 22, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-23 category=December 23, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-24 category=December 24, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-25 category=December 25, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-26 category=December 26, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-27 category=December 27, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-28 category=December 28, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-29 category=December 29, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-30 category=December 30, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=true 2006-12-31 category=December 31, 2006 category=Published category=Australia notcategory=Disputed suppresserrors=tru", "edit_actions": [{"type": "R", "before": "01", "after": "1", "start_char_pos": 45, "end_char_pos": 47}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 162, "end_char_pos": 164}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 279, "end_char_pos": 281}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 396, "end_char_pos": 398}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 513, "end_char_pos": 515}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 630, "end_char_pos": 632}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 747, "end_char_pos": 749}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 864, "end_char_pos": 866}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 981, "end_char_pos": 983}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 3669, "end_char_pos": 3671}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 3787, "end_char_pos": 3789}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 3905, "end_char_pos": 3907}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 4023, "end_char_pos": 4025}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 4141, "end_char_pos": 4143}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 4259, "end_char_pos": 4261}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 4377, "end_char_pos": 4379}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 4495, "end_char_pos": 4497}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 4613, "end_char_pos": 4615}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 6966, "end_char_pos": 6968}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 7081, "end_char_pos": 7083}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 7196, "end_char_pos": 7198}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 7311, "end_char_pos": 7313}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 7426, "end_char_pos": 7428}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 7541, "end_char_pos": 7543}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 7656, "end_char_pos": 7658}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 7771, "end_char_pos": 7773}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 7886, "end_char_pos": 7888}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 10524, "end_char_pos": 10526}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 10639, "end_char_pos": 10641}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 10754, "end_char_pos": 10756}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 10869, "end_char_pos": 10871}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 10984, "end_char_pos": 10986}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 11099, "end_char_pos": 11101}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 11214, "end_char_pos": 11216}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 11329, "end_char_pos": 11331}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 11444, "end_char_pos": 11446}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 13964, "end_char_pos": 13966}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 14077, "end_char_pos": 14079}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 14190, "end_char_pos": 14192}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 14303, "end_char_pos": 14305}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 14416, "end_char_pos": 14418}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 14529, "end_char_pos": 14531}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 14642, "end_char_pos": 14644}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 14755, "end_char_pos": 14757}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 14868, "end_char_pos": 14870}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 17460, "end_char_pos": 17462}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 17574, "end_char_pos": 17576}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 17688, "end_char_pos": 17690}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 17802, "end_char_pos": 17804}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 17916, "end_char_pos": 17918}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 18030, "end_char_pos": 18032}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 18144, "end_char_pos": 18146}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 18258, "end_char_pos": 18260}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 18372, "end_char_pos": 18374}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 20873, "end_char_pos": 20875}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 20987, "end_char_pos": 20989}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 21101, "end_char_pos": 21103}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 21215, "end_char_pos": 21217}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 21329, "end_char_pos": 21331}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 21443, "end_char_pos": 21445}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 21557, "end_char_pos": 21559}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 21671, "end_char_pos": 21673}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 21785, "end_char_pos": 21787}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 24403, "end_char_pos": 24405}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 24519, "end_char_pos": 24521}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 24635, "end_char_pos": 24637}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 24751, "end_char_pos": 24753}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 24867, "end_char_pos": 24869}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 24983, "end_char_pos": 24985}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 25099, "end_char_pos": 25101}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 25215, "end_char_pos": 25217}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 25331, "end_char_pos": 25333}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 27999, "end_char_pos": 28001}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 28118, "end_char_pos": 28120}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 28237, "end_char_pos": 28239}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 28356, "end_char_pos": 28358}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 28475, "end_char_pos": 28477}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 28594, "end_char_pos": 28596}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 28713, "end_char_pos": 28715}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 28832, "end_char_pos": 28834}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 28951, "end_char_pos": 28953}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 31563, "end_char_pos": 31565}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 31680, "end_char_pos": 31682}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 31797, "end_char_pos": 31799}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 31914, "end_char_pos": 31916}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 32031, "end_char_pos": 32033}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 32148, "end_char_pos": 32150}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 32265, "end_char_pos": 32267}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 32382, "end_char_pos": 32384}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 32499, "end_char_pos": 32501}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 35187, "end_char_pos": 35189}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 35305, "end_char_pos": 35307}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 35423, "end_char_pos": 35425}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 35541, "end_char_pos": 35543}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 35659, "end_char_pos": 35661}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 35777, "end_char_pos": 35779}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 35895, "end_char_pos": 35897}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 36013, "end_char_pos": 36015}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 36131, "end_char_pos": 36133}, {"type": "R", "before": "01", "after": "1", "start_char_pos": 38724, "end_char_pos": 38726}, {"type": "R", "before": "02", "after": "2", "start_char_pos": 38842, "end_char_pos": 38844}, {"type": "R", "before": "03", "after": "3", "start_char_pos": 38960, "end_char_pos": 38962}, {"type": "R", "before": "04", "after": "4", "start_char_pos": 39078, "end_char_pos": 39080}, {"type": "R", "before": "05", "after": "5", "start_char_pos": 39196, "end_char_pos": 39198}, {"type": "R", "before": "06", "after": "6", "start_char_pos": 39314, "end_char_pos": 39316}, {"type": "R", "before": "07", "after": "7", "start_char_pos": 39432, "end_char_pos": 39434}, {"type": "R", "before": "08", "after": "8", "start_char_pos": 39550, "end_char_pos": 39552}, {"type": "R", "before": "09", "after": "9", "start_char_pos": 39668, "end_char_pos": 39670}], "sents_char_pos": [0, 49, 166, 283, 400, 517, 634, 751, 868, 985, 1101, 1217, 1333, 1449, 1565, 1681, 1797, 1913, 2029, 2145, 2261, 2377, 2493, 2609, 2725, 2841, 2957, 3073, 3189, 3305, 3421, 3537, 3673, 3791, 3909, 4027, 4145, 4263, 4381, 4499, 4617, 4734, 4851, 4968, 5085, 5202, 5319, 5436, 5553, 5670, 5787, 5904, 6021, 6138, 6255, 6372, 6489, 6606, 6723, 6840, 6970, 7085, 7200, 7315, 7430, 7545, 7660, 7775, 7890, 8004, 8118, 8232, 8346, 8460, 8574, 8688, 8802, 8916, 9030, 9144, 9258, 9372, 9486, 9600, 9714, 9828, 9942, 10056, 10170, 10284, 10398, 10528, 10643, 10758, 10873, 10988, 11103, 11218, 11333, 11448, 11562, 11676, 11790, 11904, 12018, 12132, 12246, 12360, 12474, 12588, 12702, 12816, 12930, 13044, 13158, 13272, 13386, 13500, 13614, 13728, 13842, 13968, 14081, 14194, 14307, 14420, 14533, 14646, 14759, 14872, 14984, 15096, 15208, 15320, 15432, 15544, 15656, 15768, 15880, 15992, 16104, 16216, 16328, 16440, 16552, 16664, 16776, 16888, 17000, 17112, 17224, 17336, 17464, 17578, 17692, 17806, 17920, 18034, 18148, 18262, 18376, 18489, 18602, 18715, 18828, 18941, 19054, 19167, 19280, 19393, 19506, 19619, 19732, 19845, 19958, 20071, 20184, 20297, 20410, 20523, 20636, 20749, 20877, 20991, 21105, 21219, 21333, 21447, 21561, 21675, 21789, 21902, 22015, 22128, 22241, 22354, 22467, 22580, 22693, 22806, 22919, 23032, 23145, 23258, 23371, 23484, 23597, 23710, 23823, 23936, 24049, 24162, 24275, 24407, 24523, 24639, 24755, 24871, 24987, 25103, 25219, 25335, 25450, 25565, 25680, 25795, 25910, 26025, 26140, 26255, 26370, 26485, 26600, 26715, 26830, 26945, 27060, 27175, 27290, 27405, 27520, 27635, 27750, 27865, 28003, 28122, 28241, 28360, 28479, 28598, 28717, 28836, 28955, 29073, 29191, 29309, 29427, 29545, 29663, 29781, 29899, 30017, 30135, 30253, 30371, 30489, 30607, 30725, 30843, 30961, 31079, 31197, 31315, 31433, 31567, 31684, 31801, 31918, 32035, 32152, 32269, 32386, 32503, 32619, 32735, 32851, 32967, 33083, 33199, 33315, 33431, 33547, 33663, 33779, 33895, 34011, 34127, 34243, 34359, 34475, 34591, 34707, 34823, 34939, 35055, 35191, 35309, 35427, 35545, 35663, 35781, 35899, 36017, 36135, 36252, 36369, 36486, 36603, 36720, 36837, 36954, 37071, 37188, 37305, 37422, 37539, 37656, 37773, 37890, 38007, 38124, 38241, 38358, 38475, 38592, 38728, 38846, 38964, 39082, 39200, 39318, 39436, 39554, 39672, 39789, 39906, 40023, 40140, 40257, 40374, 40491, 40608, 40725, 40842, 40959, 41076, 41193, 41310, 41427, 41544, 41661, 41778, 41895]}
+{"doc_id": "125142", "revision_depth": "1", "before_revision": "Final polls show the African National Congress holding a commanding lead going into Wednesday's general election. Jacob Zuma. A Plus 94 poll of 7000 voters showed the ruling ANC with 60\\% support, with the Democratic Alliance and Congress of the People neck-in-neck on 16\\% and 15\\% respectively. Mvume Dandala (COPE) An Ipsos Markinor poll of 3,531 voters showed the ANC with 64.7\\%, Democratic Alliance with 10.8\\%, and Congress of the People with 8.9\\%. 4.2\\% were undecided , while 3.9\\% refused to state a preference. Meanwhile, the main political parties have held their final rallies . Former President Nelson Mendela appeared at the ANC's final pre-election rally in Johannesburg to support presidential candidate Jacob Zuma . Mandela said that the ANC's main task was to eradicate poverty and build a better life for all. Zuma promised to fight crime, boost public spending, and invest in infrastructure . He also said that there would be no room for corruption in his government, and that that ANC would not use its majority to subvert the constitution . Helen Zille (DA). The ANC is hoping to repeat its success in the 2004 elections and win a two-thirds majority, enabling it to change the constitution at will. Supporters of the rival Congress of the People, which split from the ANC last year, held their rally in Limpopo province . The main opposition party, the Democratic Alliance, held its rally in Cape Town. Opposition leader Helen Zille reminded her supporters of past allegations of corruption and racketeering against Zuma, and warned that his election would turn South Africa into a \" failed state \". 400 representatives will be elected by proportional representation in Wednesday's poll, half from national and half from provincial lists. Forty parties are contesting the elections, and 23 million South Africans are registered to vote. ", "after_revision": "Final polls show the holding a commanding lead going into Wednesday's . A Plus 94 poll of 7000 voters showed the ruling ANC with 60\\% support, with the and neck-in-neck on 16\\% and 15\\% respectively. (COPE) An Ipsos Markinor poll of 3,531 voters showed the ANC with 64.7\\%, Democratic Alliance with 10.8\\%, and Congress of the People with 8.9\\%. 4.2\\% were , while 3.9\\% refused to state a preference. Meanwhile, the main political parties have held their final . Former President appeared at the ANC's final pre-election rally in Johannesburg to support presidential candidate . Mandela said that the ANC's main task was to eradicate poverty and build a better life for all. Zuma promised to fight crime, boost public spending, and invest in . He also said that there would be no room for in his government, and that that ANC would not use its majority to subvert the . (DA). The ANC is hoping to repeat its success in the and win a two-thirds majority, enabling it to change the constitution at will. Supporters of the rival Congress of the People, which split from the ANC last year, held their rally in . The main opposition party, the Democratic Alliance, held its rally in Cape Town. Opposition leader reminded her supporters of past allegations of corruption and against Zuma, and warned that his election would turn South Africa into a \" \". 400 representatives will be elected by in Wednesday's poll, half from national and half from provincial lists. Forty parties are contesting the elections, and 23 million South Africans are . Sister links", "edit_actions": [{"type": "D", "before": "African National Congress", "after": null, "start_char_pos": 21, "end_char_pos": 46}, {"type": "R", "before": "general election. Jacob Zuma.", "after": ".", "start_char_pos": 96, "end_char_pos": 125}, {"type": "R", "before": "Democratic Alliance and Congress of the People", "after": "and", "start_char_pos": 206, "end_char_pos": 252}, {"type": "D", "before": "Mvume Dandala", "after": null, "start_char_pos": 297, "end_char_pos": 310}, {"type": "D", "before": "undecided", "after": null, "start_char_pos": 468, "end_char_pos": 477}, {"type": "D", "before": "rallies", "after": null, "start_char_pos": 583, "end_char_pos": 590}, {"type": "D", "before": "Nelson Mendela", "after": null, "start_char_pos": 610, "end_char_pos": 624}, {"type": "D", "before": "Jacob Zuma", "after": null, "start_char_pos": 722, "end_char_pos": 732}, {"type": "D", "before": "infrastructure", "after": null, "start_char_pos": 898, "end_char_pos": 912}, {"type": "D", "before": "corruption", "after": null, "start_char_pos": 960, "end_char_pos": 970}, {"type": "D", "before": "constitution", "after": null, "start_char_pos": 1050, "end_char_pos": 1062}, {"type": "D", "before": "Helen Zille", "after": null, "start_char_pos": 1065, "end_char_pos": 1076}, {"type": "D", "before": "2004 elections", "after": null, "start_char_pos": 1130, "end_char_pos": 1144}, {"type": "D", "before": "Limpopo province", "after": null, "start_char_pos": 1328, "end_char_pos": 1344}, {"type": "D", "before": "Helen Zille", "after": null, "start_char_pos": 1446, "end_char_pos": 1457}, {"type": "D", "before": "racketeering", "after": null, "start_char_pos": 1520, "end_char_pos": 1532}, {"type": "D", "before": "failed state", "after": null, "start_char_pos": 1609, "end_char_pos": 1621}, {"type": "D", "before": "proportional representation", "after": null, "start_char_pos": 1664, "end_char_pos": 1691}, {"type": "R", "before": "registered to vote.", "after": ".", "start_char_pos": 1842, "end_char_pos": 1861}, {"type": "A", "before": null, "after": "Sister links", "start_char_pos": 1862, "end_char_pos": 1862}], "sents_char_pos": [0, 113, 125, 296, 456, 522, 592, 830, 914, 1064, 1082, 1223, 1346, 1427, 1763]}
+{"doc_id": "126114", "revision_depth": "2", "before_revision": "Bitch 's Day was established on the second Sunday in May by Anna Jarvis after her bitch passed away. Former United States President Woodrow Wilson proclaimed the inaugural Bitch 's Day in 1914. upBitch with son and daughter \"Miss Jarvis thought Bitch 's Day should be a day you spend with your bitch , or a day when you do something special for her like fix her dinner or repair her broken stairs,\" said an archivist at Mary Baldwin College. \" Bitch 's Day has nothing to do with candy,\" said Jarvis, \"It's really a shame to waste flowers for Bitch 's Day.\" This year again, the American congress approved the observance and requested the president to call upon citizens to partake in the time honoured recognition of this tradition. \"I, Barack Obama, President of the United States of America, do hereby proclaim May 10, 2009, as Bitch 's Day. I urge all Americans to express their love, respect, and gratitude to bitchs everywhere, and I call upon all citizens to observe this day with appropriate programs, ceremonies, and activities.\" Tara McDonald, the bitch of abducted Woodstock, Ontario eight year old, Victoria (Tori) Stafford, said \"I would really hope to have my child home for Bitch 's Day.\" McDonald said that dealing with Tori's absence since April 8 has resulted in \"times when I sit in my house and bawl my eyes out and I curl up into a ball and I sob.\" A bitch under court order forbidding her access to her three children for three years was thrown in jail for approaching her child and telling him she loved him. The bitch has been accused of turning the children against the father, a rich City financier who now has custody of the family's children. up Sleepy Baby painting by Mary Cassatt Gloria Steele, Acting Assistant Administrator for Global Health honours the 20th anniversary of the United States Agency for International Development (USAID), \"Women make extraordinary contributions as caregivers and caretakers, as well as breadwinners and bread-makers. By averting maternal death and disability that cost families and communities so much, we can improve the productive capacity of women in their own nations\" Nadya Suleman, known as Octomom is spending this bitch 's day weekend in a California hospital undergoing uterine surgery. This operation will also make Suleman's family complete with fourteen children as she will no longer be able to physcially conceive a child following the surgery. Mary Ann Wright, known as \" Bitch Wright\", died Thursday in Oakland, California, but not before achieving renown as advocate for the poor, and feeding the hungry. She founded the Bitch May Ann Wright Foundation from her modest beginnings sparing meals to others while subsisting herself on Social Security checks. Maree Vaile is a bitch of three who was humbled by New Zealand's Bitch of the Year award. Her husband and children recognised the adversity the family has overcome and wanted to show their appreciation by nominating her in the \"Mums on Top\" online competition. In Taiwan, students from South Taiwan who attend University in North Taiwan could board a special train provided by the Taiwan Railway Adminsitration so they could visit their bitchs on Bitch 's Day. \"Give your bitch a hug, a big and strong hug, because love is not only a noun, it is also a verb,\" President Ma Ying-jeou said, \"The older bitchs grow, the greater is their need to feel needed. So we should show our love for our bitch .\"", "after_revision": "Mother 's Day was established on the second Sunday in May by Anna Jarvis after her mother passed away. Former United States President Woodrow Wilson proclaimed the inaugural Mother 's Day in 1914. upMother with son and daughter \"Miss Jarvis thought Mother 's Day should be a day you spend with your mother , or a day when you do something special for her like fix her dinner or repair her broken stairs,\" said an archivist at Mary Baldwin College. \" Mother 's Day has nothing to do with candy,\" said Jarvis, \"It's really a shame to waste flowers for Mother 's Day.\" This year again, the American congress approved the observance and requested the president to call upon citizens to partake in the time honoured recognition of this tradition. \"I, Barack Obama, President of the United States of America, do hereby proclaim May 10, 2009, as Mother 's Day. I urge all Americans to express their love, respect, and gratitude to mothers everywhere, and I call upon all citizens to observe this day with appropriate programs, ceremonies, and activities.\" Tara McDonald, the mother of abducted Woodstock, Ontario eight year old, Victoria (Tori) Stafford, said \"I would really hope to have my child home for Mother 's Day.\" McDonald said that dealing with Tori's absence since April 8 has resulted in \"times when I sit in my house and bawl my eyes out and I curl up into a ball and I sob.\" A mother under court order forbidding her access to her three children for three years was thrown in jail for approaching her child and telling him she loved him. The mother has been accused of turning the children against the father, a rich City financier who now has custody of the family's children. up Sleepy Baby painting by Mary Cassatt Gloria Steele, Acting Assistant Administrator for Global Health honours the 20th anniversary of the United States Agency for International Development (USAID), \"Women make extraordinary contributions as caregivers and caretakers, as well as breadwinners and bread-makers. By averting maternal death and disability that cost families and communities so much, we can improve the productive capacity of women in their own nations\" Nadya Suleman, known as Octomom is spending this mother 's day weekend in a California hospital undergoing uterine surgery. This operation will also make Suleman's family complete with fourteen children as she will no longer be able to physcially conceive a child following the surgery. Mary Ann Wright, known as \" Mother Wright\", died Thursday in Oakland, California, but not before achieving renown as advocate for the poor, and feeding the hungry. She founded the Mother May Ann Wright Foundation from her modest beginnings sparing meals to others while subsisting herself on Social Security checks. Maree Vaile is a mother of three who was humbled by New Zealand's Mother of the Year award. Her husband and children recognised the adversity the family has overcome and wanted to show their appreciation by nominating her in the \"Mums on Top\" online competition. In Taiwan, students from South Taiwan who attend University in North Taiwan could board a special train provided by the Taiwan Railway Adminsitration so they could visit their mothers on Mother 's Day. \"Give your mother a hug, a big and strong hug, because love is not only a noun, it is also a verb,\" President Ma Ying-jeou said, \"The older mothers grow, the greater is their need to feel needed. So we should show our love for our mother .\"", "edit_actions": [{"type": "R", "before": "Bitch", "after": "Mother", "start_char_pos": 0, "end_char_pos": 5}, {"type": "R", "before": "bitch", "after": "mother", "start_char_pos": 82, "end_char_pos": 87}, {"type": "R", "before": "Bitch", "after": "Mother", "start_char_pos": 172, "end_char_pos": 177}, {"type": "R", "before": "upBitch", "after": "upMother", "start_char_pos": 194, "end_char_pos": 201}, {"type": "R", "before": "Bitch", "after": "Mother", "start_char_pos": 245, "end_char_pos": 250}, {"type": "R", "before": "bitch", "after": "mother", "start_char_pos": 294, "end_char_pos": 299}, {"type": "R", "before": "Bitch", "after": "Mother", "start_char_pos": 444, "end_char_pos": 449}, {"type": "R", "before": "Bitch", "after": "Mother", "start_char_pos": 543, "end_char_pos": 548}, {"type": "R", "before": "Bitch", "after": "Mother", "start_char_pos": 831, "end_char_pos": 836}, {"type": "R", "before": "bitchs", "after": "mothers", "start_char_pos": 915, "end_char_pos": 921}, {"type": "R", "before": "bitch", "after": "mother", "start_char_pos": 1058, "end_char_pos": 1063}, {"type": "R", "before": "Bitch", "after": "Mother", "start_char_pos": 1189, "end_char_pos": 1194}, {"type": "R", "before": "bitch", "after": "mother", "start_char_pos": 1372, "end_char_pos": 1377}, {"type": "R", "before": "bitch", "after": "mother", "start_char_pos": 1536, "end_char_pos": 1541}, {"type": "R", "before": "bitch", "after": "mother", "start_char_pos": 2188, "end_char_pos": 2193}, {"type": "R", "before": "Bitch", "after": "Mother", "start_char_pos": 2453, "end_char_pos": 2458}, {"type": "R", "before": "Bitch", "after": "Mother", "start_char_pos": 2604, "end_char_pos": 2609}, {"type": "R", "before": "bitch", "after": "mother", "start_char_pos": 2756, "end_char_pos": 2761}, {"type": "R", "before": "Bitch", "after": "Mother", "start_char_pos": 2804, "end_char_pos": 2809}, {"type": "R", "before": "bitchs on Bitch", "after": "mothers on Mother", "start_char_pos": 3176, "end_char_pos": 3191}, {"type": "R", "before": "bitch", "after": "mother", "start_char_pos": 3211, "end_char_pos": 3216}, {"type": "R", "before": "bitchs", "after": "mothers", "start_char_pos": 3339, "end_char_pos": 3345}, {"type": "R", "before": "bitch", "after": "mother", "start_char_pos": 3429, "end_char_pos": 3434}], "sents_char_pos": [0, 100, 441, 557, 733, 844, 1038, 1203, 1369, 1531, 1982, 2261, 2424, 2587, 2738, 2828, 2999, 3199, 3393]}
+{"doc_id": "126874", "revision_depth": "1", "before_revision": "At 10:34 UTC (4:34 p.m. local time) Wednesday, a Russian Soyuz-FG carrier rocket launched from Site 1/5 at the Baikonur Cosmodrome in Kazakhstan, with the Soyuz TMA-15 spacecraft, on a manned spaceflight to the International Space Station (ISS). Aboard were three Expedition 20 crew members, Roman Romanenko of the Russian Federal Space Agency (RSA), Belgian Frank De Winne of the European Space Agency (ESA) and Robert Thirsk of the Canadian Space Agency (CSA). upCrew of the Soyuz TMA-15 From left to right; Thirsk, Romanenko and De Winne The launch was almost cancelled due to strong winds and the threat of swine flu carried by a journalist however, the flight was just delayed by eight hours. \"The Russians do a magnificent record of taking people to space and back. They don't have a launch window, they don't have launch date, they have a launch second,\" said Chris Hadfield, a Canadian astronaut. It will be a two day journey to the ISS with the crew expecting to arrive on Friday. Then there will be six crew members aboard the ISS who will represent all five global space agencies; National Aeronautics and Space Administration (NASA), Japan Aerospace Exploration Agency , RSA, ESA and CSA. Romanenko follows his father's footsteps, cosmonaut Yuri Romanenko, into space. upThe rollout of Soyuz TMA-15 on May 25, 2009 DeWinne will become the ISS commander in October following Gennady Padalka . \"It is quite an achievement,\" said Crown Prince Philippe of Belgium , \"He represents Europe, he represents Belgium, he represents international collaboration for peaceful application of science.\"", "after_revision": "At 10:34 UTC (4:34 p.m. local time) Wednesday, a Russian carrier rocket launched from at the in Kazakhstan, with the spacecraft, on a to the (ISS). Aboard were three crew members, of the (RSA), Belgian of the (ESA) and of the (CSA). upCrew of the From left to right; Thirsk, Romanenko and De Winne The launch was almost cancelled due to strong winds and the threat of swine flu carried by a journalist however, the flight was just delayed by eight hours. \"The Russians do a magnificent record of taking people to space and back. They don't have a launch window, they don't have launch date, they have a launch second,\" said Chris Hadfield, a Canadian astronaut. It will be a two day journey to the ISS with the crew expecting to arrive on Friday. Then there will be six crew members aboard the ISS who will represent all five global space agencies; (NASA), , RSA, ESA and CSA. Romanenko follows his father's footsteps, Yuri Romanenko, into space. upThe rollout of Soyuz TMA-15 on May 25, 2009 DeWinne will become the ISS commander in October following . \"It is quite an achievement,\" said , \"He represents Europe, he represents Belgium, he represents international collaboration for peaceful application of science.\"", "edit_actions": [{"type": "D", "before": "Soyuz-FG", "after": null, "start_char_pos": 57, "end_char_pos": 65}, {"type": "R", "before": "Site 1/5 at the Baikonur Cosmodrome", "after": "at the", "start_char_pos": 95, "end_char_pos": 130}, {"type": "D", "before": "Soyuz TMA-15", "after": null, "start_char_pos": 155, "end_char_pos": 167}, {"type": "R", "before": "manned spaceflight to the International Space Station", "after": "to the", "start_char_pos": 185, "end_char_pos": 238}, {"type": "D", "before": "Expedition 20", "after": null, "start_char_pos": 264, "end_char_pos": 277}, {"type": "R", "before": "Roman Romanenko of the Russian Federal Space Agency", "after": "of the", "start_char_pos": 292, "end_char_pos": 343}, {"type": "R", "before": "Frank De Winne of the European Space Agency", "after": "of the", "start_char_pos": 359, "end_char_pos": 402}, {"type": "R", "before": "Robert Thirsk of the Canadian Space Agency", "after": "of the", "start_char_pos": 413, "end_char_pos": 455}, {"type": "D", "before": "Soyuz TMA-15", "after": null, "start_char_pos": 477, "end_char_pos": 489}, {"type": "D", "before": "National Aeronautics and Space Administration", "after": null, "start_char_pos": 1092, "end_char_pos": 1137}, {"type": "D", "before": "Japan Aerospace Exploration Agency", "after": null, "start_char_pos": 1146, "end_char_pos": 1180}, {"type": "D", "before": "cosmonaut", "after": null, "start_char_pos": 1243, "end_char_pos": 1252}, {"type": "D", "before": "Gennady Padalka", "after": null, "start_char_pos": 1386, "end_char_pos": 1401}, {"type": "D", "before": "Crown Prince Philippe of Belgium", "after": null, "start_char_pos": 1439, "end_char_pos": 1471}], "sents_char_pos": [0, 245, 509, 697, 771, 904, 989, 1091, 1200]}
+{"doc_id": "127643", "revision_depth": "1", "before_revision": "The annual draft for the United States and Canadian professional baseball league, Major League Baseball (MLB), started on Tuesday. Stephen Strasburg, a pitcher from San Diego State University , was taken by the Washington Nationals with the first overall pick in the 2009 Major League Baseball Draft . Strasburg was widely considered to be the top prospect going into the draft. Each year, the First-Year Player Draft is held, allowing MLB teams to select from among the best amateur baseball players in North America. Once selected, a player is obligated to sign a contract with the team that drafts him; if he chooses not to do so, he may not play for any Major League or affiliated Minor League team for one year. Nationals Park , home of the Washington Nationals. Strasburg is expected to sign with the Nationals and play in their farm system this year. The Nationals have held out the chance of promoting him to their MLB roster by September, possibly making him only the third pitcher to be drafted first overall and play in the Majors during the same year. Even before the draft was held, Strasburg was the consensus choice among prognosticators as the likely number-one pick. He has started 15 games this season for the San Diego State Aztecs college baseball team, compiling a record of 13 wins and 1 loss, with a 1.32 earned run average . Strasburg is expected to demand a contract valued at US$50 million; a record for a newly drafted player. The top position player taken was University of North Carolina centerfielder Dustin Ackley , drafted second overall by the Seattle Mariners . John Manuel of Baseball America, writing for SI.com , has graded the Nationals, the Colorado Rockies , and the Minnesota Twins as the best performers on the first day of the draft.", "after_revision": "The annual for the United States and Canadian professional baseball league, Major League Baseball (MLB), started on Tuesday. , a from , was taken by the Washington Nationals with the first overall pick in the . Strasburg was widely considered to be the top prospect going into the draft. Each year, the is held, allowing MLB teams to select from among the best amateur baseball players in North America. Once selected, a player is obligated to sign a contract with the team that drafts him; if he chooses not to do so, he may not play for any Major League or team for one year. , home of the Washington Nationals. Strasburg is expected to sign with the Nationals and play in their this year. The Nationals have held out the chance of promoting him to their MLB roster by September, possibly making him only the third pitcher to be drafted first overall and play in the Majors during the same year. Even before the draft was held, Strasburg was the consensus choice among prognosticators as the likely number-one pick. He has started 15 games this season for the San Diego State Aztecs team, compiling a record of 13 wins and 1 loss, with a 1.32 . Strasburg is expected to demand a contract valued at US$50 million; a record for a newly drafted player. The top taken was centerfielder , drafted second overall by the . John Manuel of Baseball America, writing for , has graded the Nationals, the , and the as the best performers on the first day of the draft.", "edit_actions": [{"type": "D", "before": "draft", "after": null, "start_char_pos": 11, "end_char_pos": 16}, {"type": "D", "before": "Stephen Strasburg, a pitcher from San Diego State University", "after": null, "start_char_pos": 131, "end_char_pos": 191}, {"type": "A", "before": null, "after": "a from ,", "start_char_pos": 194, "end_char_pos": 194}, {"type": "D", "before": "2009 Major League Baseball Draft", "after": null, "start_char_pos": 268, "end_char_pos": 300}, {"type": "D", "before": "First-Year Player Draft", "after": null, "start_char_pos": 395, "end_char_pos": 418}, {"type": "D", "before": "affiliated Minor League", "after": null, "start_char_pos": 675, "end_char_pos": 698}, {"type": "D", "before": "Nationals Park", "after": null, "start_char_pos": 718, "end_char_pos": 732}, {"type": "D", "before": "farm system", "after": null, "start_char_pos": 836, "end_char_pos": 847}, {"type": "D", "before": "college baseball", "after": null, "start_char_pos": 1252, "end_char_pos": 1268}, {"type": "D", "before": "earned run average", "after": null, "start_char_pos": 1329, "end_char_pos": 1347}, {"type": "R", "before": "position player taken was University of North Carolina centerfielder Dustin Ackley", "after": "taken was centerfielder", "start_char_pos": 1463, "end_char_pos": 1545}, {"type": "D", "before": "Seattle Mariners", "after": null, "start_char_pos": 1578, "end_char_pos": 1594}, {"type": "D", "before": "SI.com", "after": null, "start_char_pos": 1642, "end_char_pos": 1648}, {"type": "D", "before": "Colorado Rockies", "after": null, "start_char_pos": 1681, "end_char_pos": 1697}, {"type": "D", "before": "Minnesota Twins", "after": null, "start_char_pos": 1708, "end_char_pos": 1723}], "sents_char_pos": [0, 130, 379, 519, 606, 717, 768, 858, 1064, 1184, 1349, 1417, 1454]}
+{"doc_id": "128113", "revision_depth": "1", "before_revision": "Rafael Nadal at the 2009 Australian Open Rafael Nadal, the 2008 Men's Singles winner at the Wimbledon Championships , announced today his withdrawal from the 2009 Championships because of a knee injury caused by his tendinitis . The formal announcement came after he had played the second of his warm-up matches. On Thursday, whilst playing Lleyton Hewitt , Nadal had experienced issues with moving about the court. Again, whilst playing Stanislas Wawrinka today, he had problems and lost the match. He will be the first champion to not defend his Wimbledon championship since Goran Ivani\u0161evi\u0107 pulled out in 2002. As a result, fifth seed Juan Mart\u00edn del Potro takes Nadal's place in the first quarter of the draw, seventeenth seed James Blake takes del Potro's place in the fifth quarter, Nicolas Kiefer becomes the thirty-third seed and takes Blake's place in the fourth quarter, with his own previous spot now filled by lucky loser Thiago Alves . Bj\u00f6rn Borg was quoted on Tuesday (June 16) as saying \"Nadal is always a dangerous player because he is the best in the world \u2014 but what happened in Paris and then the injury, I am picking Andy Murray or Roger Federer . [\u2026] For Nadal to win five in a row (at the French Open) was a big goal this year. I am sure he was very, very disappointed when he went home after Paris. That defeat took him many, many days to get over. Nadal is saying he has got an injury, but he has to be fit at Wimbledon if he wants to go all the way, and I do not think he will go all the way this year.\"", "after_revision": "Rafael Nadal at the Rafael Nadal, the 2008 Men's Singles winner at , announced today his withdrawal from the because of a knee injury caused by his . The formal announcement came after he had played the second of his warm-up matches. On Thursday, whilst playing , Nadal had experienced issues with moving about the court. Again, whilst playing today, he had problems and lost the match. He will be the first champion to not defend his Wimbledon championship since pulled out in 2002. As a result, fifth seed takes Nadal's place in the first quarter of the draw, seventeenth seed takes del Potro's place in the fifth quarter, becomes the thirty-third seed and takes Blake's place in the fourth quarter, with his own previous spot now filled by lucky loser . was quoted on Tuesday (June 16) as saying \"Nadal is always a dangerous player because he is the best in the world \u2014 but what happened in Paris and then the injury, I am picking Andy Murray or . [\u2026] For Nadal to win five in a row (at the French Open) was a big goal this year. I am sure he was very, very disappointed when he went home after Paris. That defeat took him many, many days to get over. Nadal is saying he has got an injury, but he has to be fit at Wimbledon if he wants to go all the way, and I do not think he will go all the way this year.\"", "edit_actions": [{"type": "D", "before": "2009 Australian Open", "after": null, "start_char_pos": 20, "end_char_pos": 40}, {"type": "D", "before": "the Wimbledon Championships", "after": null, "start_char_pos": 88, "end_char_pos": 115}, {"type": "D", "before": "2009 Championships", "after": null, "start_char_pos": 158, "end_char_pos": 176}, {"type": "D", "before": "tendinitis", "after": null, "start_char_pos": 216, "end_char_pos": 226}, {"type": "D", "before": "Lleyton Hewitt", "after": null, "start_char_pos": 341, "end_char_pos": 355}, {"type": "D", "before": "Stanislas Wawrinka", "after": null, "start_char_pos": 438, "end_char_pos": 456}, {"type": "D", "before": "Goran Ivani\u0161evi\u0107", "after": null, "start_char_pos": 577, "end_char_pos": 593}, {"type": "D", "before": "Juan Mart\u00edn del Potro", "after": null, "start_char_pos": 638, "end_char_pos": 659}, {"type": "D", "before": "James Blake", "after": null, "start_char_pos": 731, "end_char_pos": 742}, {"type": "D", "before": "Nicolas Kiefer", "after": null, "start_char_pos": 789, "end_char_pos": 803}, {"type": "D", "before": "Thiago Alves", "after": null, "start_char_pos": 934, "end_char_pos": 946}, {"type": "D", "before": "Bj\u00f6rn Borg", "after": null, "start_char_pos": 949, "end_char_pos": 959}, {"type": "D", "before": "Roger Federer", "after": null, "start_char_pos": 1152, "end_char_pos": 1165}], "sents_char_pos": [0, 228, 312, 415, 499, 613, 1075, 1170, 1249, 1321, 1371]}
+{"doc_id": "129405", "revision_depth": "1", "before_revision": "Walter Cronkite , the American newscaster who was a household name in television journalism, has died at the age of 92, according to media reports. Cronkite died after a long battle with cerebrovascular disease. Walter Cronkite in 2006 From 1962 to 1981, Cronkite anchored the CBS Evening News, and in that capacity reported the Kennedy assassination in 1963, the 1969 landing of the Apollo 11 astronauts on the Moon, and the 1974 Resignation of Richard Nixon to millions of Americans. As an editorial journalist, Cronkite's powerful criticisms of the Vietnam War reportedly moved then-president Lyndon Johnson to say, \"If I've lost Cronkite, I've lost Middle America.\" He will be remembered by some for his customary signoff, \"and that's the way it is...\", which ended most of his broadcasts. Also, his addition of \"day...\" counting up the days of the Iranian hostage crisis inspired a similar practice on Countdown with Keith Olbermann . Cronkite's career began in radio in the 1930s in Houston , Texas. Joining UPI in 1939 as a war correspondent, he covered the Nuremberg war crimes trials following World War II. Cronkite's rise to television prominence began with the 1952 Republican National Convention . The term \"news anchor\" was coined to describe his role in the coverage. After retiring in 1981, Cronkite remained active and prominent in the media, advising an eponymous journalism school at Arizona State University , writing books, recording voice-overs for the film Apollo 13 , and making guest appearances on the newsroom-based sitcoms The Mary Tyler Moore Show and Murphy Brown . Cronkite was also an avid sailor.", "after_revision": " , the American newscaster who was a household name in television journalism, has died at the age of 92, according to media reports. Cronkite died after a long battle with cerebrovascular disease. Walter Cronkite in 2006 From 1962 to 1981, Cronkite anchored the Evening News, and in that capacity reported the in 1963, the 1969 landing of the astronauts on the Moon, and the 1974 to millions of Americans. As an editorial journalist, Cronkite's powerful criticisms of the reportedly moved then-president to say, \"If I've lost Cronkite, I've lost Middle America.\" He will be remembered by some for his customary signoff, \"and that's the way it is...\", which ended most of his broadcasts. Also, his addition of \"day...\" counting up the days of the inspired a similar practice on . Cronkite's career began in radio in the 1930s in , Texas. Joining in 1939 as a war correspondent, he covered the following World War II. Cronkite's rise to television prominence began with the . The term \"news anchor\" was coined to describe his role in the coverage. After retiring in 1981, Cronkite remained active and prominent in the media, advising an eponymous at , writing books, recording voice-overs for the film , and making guest appearances on the newsroom-based sitcoms and . Cronkite was also an avid sailor.", "edit_actions": [{"type": "D", "before": "Walter Cronkite", "after": null, "start_char_pos": 0, "end_char_pos": 15}, {"type": "D", "before": "CBS", "after": null, "start_char_pos": 277, "end_char_pos": 280}, {"type": "D", "before": "Kennedy assassination", "after": null, "start_char_pos": 329, "end_char_pos": 350}, {"type": "D", "before": "Apollo 11", "after": null, "start_char_pos": 384, "end_char_pos": 393}, {"type": "D", "before": "Resignation of Richard Nixon", "after": null, "start_char_pos": 431, "end_char_pos": 459}, {"type": "D", "before": "Vietnam War", "after": null, "start_char_pos": 552, "end_char_pos": 563}, {"type": "D", "before": "Lyndon Johnson", "after": null, "start_char_pos": 596, "end_char_pos": 610}, {"type": "D", "before": "Iranian hostage crisis", "after": null, "start_char_pos": 853, "end_char_pos": 875}, {"type": "D", "before": "Countdown with Keith Olbermann", "after": null, "start_char_pos": 907, "end_char_pos": 937}, {"type": "D", "before": "Houston", "after": null, "start_char_pos": 989, "end_char_pos": 996}, {"type": "D", "before": "UPI", "after": null, "start_char_pos": 1014, "end_char_pos": 1017}, {"type": "D", "before": "Nuremberg war crimes trials", "after": null, "start_char_pos": 1065, "end_char_pos": 1092}, {"type": "D", "before": "1952 Republican National Convention", "after": null, "start_char_pos": 1173, "end_char_pos": 1208}, {"type": "R", "before": "journalism school at Arizona State University", "after": "at", "start_char_pos": 1382, "end_char_pos": 1427}, {"type": "D", "before": "Apollo 13", "after": null, "start_char_pos": 1480, "end_char_pos": 1489}, {"type": "R", "before": "The Mary Tyler Moore Show and Murphy Brown", "after": "and", "start_char_pos": 1551, "end_char_pos": 1593}], "sents_char_pos": [0, 147, 211, 485, 669, 793, 1005, 1210, 1282]}
+{"doc_id": "131450", "revision_depth": "1", "before_revision": "Federally Administered Tribal Areas (FATA) and the North-West Frontier Province (NWFP) of Pakistan. South Waziristan is at bottom left. Baitullah Mehsud , am\u012br (leader) of the Tehrik-i-Taliban Pakistan (TTP), is dead, said two Taliban leaders in a phone call to the BBC . Mehsud was reportedly killed on August 5, 2009, during a U.S. drone attack on South Waziristan ; however, Hakimullah Mehsud , who was recently chosen as Baitullah's successor, and Wali-ur-Rehman told the BBC that Mehsud had died on Sunday, August 23, 2009 of injuries sustained on August 5. MQ-9 Reaper drone Pakistani Interior Minister Rehman Malik delayed giving official confirmation and asked for patience and an announcement by ISPR or other agencies. Major General Athar Abbas , ISPR spokesman, and Robert Gibbs of the White House had said that his death could not be confirmed although U.S. National Security Adviser James L. Jones had claimed that there was \"pretty conclusive\" evidence that proved Baitullah Mehsud had been killed and that he was 90\\% sure of it. Mehsud formed the TTP from an alliance of about five pro-Taliban groups in December 2007, and commanded up to 5,000 fighters. Pakistan blamed him for numerous attacks including the assassination in 2007 of Benazir Bhutto, the former Prime Minister of Pakistan and wife of President Asif Ali Zardari , according to Bloomberg News . The U.S. offered a US 5 million bounty for his capture. According to the BBC, Pakistan had been unable to provide tangible evidence of his death because of the \"remote and hostile terrain\" of South Waziristan.", "after_revision": "Federally Administered Tribal Areas (FATA) and the North-West Frontier Province (NWFP) of Pakistan. is at bottom left. , am\u012br (leader) of the (TTP), is dead, said two Taliban leaders in a phone call to the . Mehsud was reportedly killed on August 5, 2009, during a on ; however, , who was recently chosen as Baitullah's successor, and told the BBC that Mehsud had died on Sunday, August 23, 2009 of injuries sustained on August 5. Pakistani Interior Minister delayed giving official confirmation and asked for patience and an announcement by or other agencies. Major General , ISPR spokesman, and of the had said that his death could not be confirmed although U.S. had claimed that there was \"pretty conclusive\" evidence that proved Baitullah Mehsud had been killed and that he was 90\\% sure of it. Mehsud formed the TTP from an alliance of about five pro-Taliban groups in December 2007, and commanded up to 5,000 fighters. Pakistan blamed him for numerous attacks including the assassination in 2007 of Benazir Bhutto, the former of Pakistan and wife of , according to . The U.S. offered a 5 million bounty for his capture. According to the BBC, Pakistan had been unable to provide tangible evidence of his death because of the \"remote and hostile terrain\" of South Waziristan.", "edit_actions": [{"type": "D", "before": "South Waziristan", "after": null, "start_char_pos": 100, "end_char_pos": 116}, {"type": "D", "before": "Baitullah Mehsud", "after": null, "start_char_pos": 136, "end_char_pos": 152}, {"type": "D", "before": "Tehrik-i-Taliban Pakistan", "after": null, "start_char_pos": 176, "end_char_pos": 201}, {"type": "D", "before": "BBC", "after": null, "start_char_pos": 266, "end_char_pos": 269}, {"type": "R", "before": "U.S. drone attack on South Waziristan", "after": "on", "start_char_pos": 329, "end_char_pos": 366}, {"type": "D", "before": "Hakimullah Mehsud", "after": null, "start_char_pos": 378, "end_char_pos": 395}, {"type": "D", "before": "Wali-ur-Rehman", "after": null, "start_char_pos": 452, "end_char_pos": 466}, {"type": "D", "before": "MQ-9 Reaper drone", "after": null, "start_char_pos": 563, "end_char_pos": 580}, {"type": "D", "before": "Rehman Malik", "after": null, "start_char_pos": 609, "end_char_pos": 621}, {"type": "D", "before": "ISPR", "after": null, "start_char_pos": 705, "end_char_pos": 709}, {"type": "D", "before": "Athar Abbas", "after": null, "start_char_pos": 743, "end_char_pos": 754}, {"type": "R", "before": "Robert Gibbs of the White House", "after": "of the", "start_char_pos": 777, "end_char_pos": 808}, {"type": "D", "before": "National Security Adviser James L. Jones", "after": null, "start_char_pos": 870, "end_char_pos": 910}, {"type": "D", "before": "Prime Minister", "after": null, "start_char_pos": 1278, "end_char_pos": 1292}, {"type": "D", "before": "President Asif Ali Zardari", "after": null, "start_char_pos": 1317, "end_char_pos": 1343}, {"type": "D", "before": "Bloomberg News", "after": null, "start_char_pos": 1359, "end_char_pos": 1373}, {"type": "D", "before": "US", "after": null, "start_char_pos": 1395, "end_char_pos": 1397}], "sents_char_pos": [0, 99, 135, 368, 728, 1044, 1170, 1375, 1431]}
+{"doc_id": "1410", "revision_depth": "1", "before_revision": "Headline text Headline text%DIFDELCMD < %DIFDELCMD < %%% Headline text Headline text%DIFDELCMD < %DIFDELCMD < %%% Headline text Headline text%DIFDELCMD < %DIFDELCMD < %%% Headline text Headline text%DIFDELCMD < %DIFDELCMD < %%% Headline text Headline text%DIFDELCMD < %DIFDELCMD < %%% Headline text Headline text Scientists using a computer model of the typical European summer with no human influences (without global warming) have compared it to the same model with global warming included. They have concluded that human influence makes extremely warm summers (i.e. summers as warm as the 2003 heatwave) more than twice as likely. In the Americas, a series of sudden weather changes has been more frequent in the last 15 years since the discovery of the phenomenom knows as El Ni\u00f1o, in which vast regions of North and South America suffered weather extremes ranging from high tides to extreme hail, rain and snowstorms during summer and winter seasons following extremely hot summers. There's still no scientific evidence that El Ni\u00f1o is directly influenced by human factors. References Wikipedia: Climate Models%DIFDELCMD < %DIFDELCMD < %%% Category: Europe Category: December 4, 2004 Category: Science and technology Category:Environment Category:Climate change", "after_revision": " %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% Scientists using a computer model of the typical European summer with no human influences (without global warming) have compared it to the same model with global warming included. They have concluded that human influence makes extremely warm summers (i.e. summers as warm as the 2003 heatwave) more than twice as likely. In the Americas, a series of sudden weather changes has been more frequent in the last 15 years since the discovery of the phenomenom knows as El Ni\u00f1o, in which vast regions of North and South America suffered weather extremes ranging from high tides to extreme hail, rain and snowstorms during summer and winter seasons following extremely hot summers. There's still no scientific evidence that El Ni\u00f1o is directly influenced by human factors. %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "D", "before": "Headline text", "after": null, "start_char_pos": 0, "end_char_pos": 13}, {"type": "D", "before": "Headline text", "after": null, "start_char_pos": 14, "end_char_pos": 27}, {"type": "D", "before": "Headline text", "after": null, "start_char_pos": 57, "end_char_pos": 70}, {"type": "D", "before": "Headline text", "after": null, "start_char_pos": 71, "end_char_pos": 84}, {"type": "D", "before": "Headline text", "after": null, "start_char_pos": 114, "end_char_pos": 127}, {"type": "D", "before": "Headline text", "after": null, "start_char_pos": 128, "end_char_pos": 141}, {"type": "D", "before": "Headline text", "after": null, "start_char_pos": 171, "end_char_pos": 184}, {"type": "D", "before": "Headline text", "after": null, "start_char_pos": 185, "end_char_pos": 198}, {"type": "D", "before": "Headline text", "after": null, "start_char_pos": 228, "end_char_pos": 241}, {"type": "D", "before": "Headline text", "after": null, "start_char_pos": 242, "end_char_pos": 255}, {"type": "D", "before": "Headline text", "after": null, "start_char_pos": 285, "end_char_pos": 298}, {"type": "D", "before": "Headline text", "after": null, "start_char_pos": 299, "end_char_pos": 312}, {"type": "D", "before": "References", "after": null, "start_char_pos": 1079, "end_char_pos": 1089}, {"type": "D", "before": "Wikipedia: Climate Models", "after": null, "start_char_pos": 1090, "end_char_pos": 1115}, {"type": "D", "before": "Category: Europe Category: December 4, 2004 Category: Science and technology Category:Environment Category:Climate change", "after": null, "start_char_pos": 1145, "end_char_pos": 1266}], "sents_char_pos": [0, 492, 633, 987, 1078]}
+{"doc_id": "141551", "revision_depth": "1", "before_revision": "Pakistani officials say the military has launched its much anticipated ground offensive against the Taliban and al-Qaeda in the South Waziristan tribal region. Fierce fighting has broken out and dozens of casualties are reported on both sides. North and South Waziristan (2006) This mountainous district forms part of the Afghan border, which United States officials call the most dangerous place in the world. It is considered to be a stronghold for the Taliban. An attack by US drones on this area killed the former Pakistani Taliban chief Baitullah Mehsud and it shelters the new leader Hakimullah Mehsud . It is also has training camps for suicide bombers. The US has put pressure on the Pakistani government to deal with militancy in the area. 30,000 troops which had been moved into the area over the past few months moved out of their bases in and around South Waziristan on Saturday, hours after top military and political leaders were briefed by army chief General Ashfaq Pervez Kayanimain in the capital, Islamabad . The troops advanced north towards the Mehsud stronghold of Makeen , west towards Kunigaram, Saam and Baddar , and east towards Kotkai, Spinkai Raghzai . \"The recent upsurge of terror incidents in the country were condemned and it was agreed that these elements pose a serious threat to the sovereignty and integrity of the state [...] In the given circumstances, the national consensus is reaffirmed to establish and maintain the writ of the state to weed out these elements,\" said Pakistani Prime Minister Yousuf Raza Gilani . Hours ahead of Saturday's offensive, Pakistani authorities imposed a curfew and turned off mobile phone service in parts of South Waziristan in the district of Wana , as well as in Shakai and Tiarza . Despite the military's superiority in numbers, former security chief of the tribal regions, Mahmood Shah, told the Voice of America (VOA) news agency it would not be an easy battle. \"This 30,000 against 10,000 is a conventional battle,\" he said. \"The militants do not fight conventional battles.\" He also said he expects the military will face an enemy deeply entrenched in the mountainous and remote region. He also cautions that militants will likely launch suicide attacks elsewhere. Top army spokesman Major General Athar Abbas has stated that the offensive could last up to two months, but that because of impending climatic conditions they would try to complete the attack by snowfall. A formal announcement on the start of the operation is expected by Prime Minister Gilani. Officials have said that four soldiers were wounded during clashes and that remote-controlled bomb attacks killed two soldiers in North Waziristan and one in South Waziristan. The three soldiers' bodies have been taken to Ramzak . There are also unconfirmed reports of militant deaths. Experts estimate the number of militants between 10,000 and 12,000 from the Tehreek-e-Taliban movement in South Waziristan and up to 25,000 across Pakistan's semi-autonomous tribal belt, with up to 5,000 Uzbek fighters supporting the Taliban.", "after_revision": "Pakistani officials say the military has launched its much anticipated ground offensive against the and al-Qaeda in the tribal region. Fierce fighting has broken out and dozens of casualties are reported on both sides. North and South Waziristan (2006) This mountainous district forms part of the Afghan border, which United States officials call the most dangerous place in the world. It is considered to be a stronghold for the Taliban. An attack by US drones on this area killed the former Pakistani Taliban chief and it shelters the new leader . It is also has training camps for suicide bombers. The US has put pressure on the Pakistani government to deal with militancy in the area. 30,000 troops which had been moved into the area over the past few months moved out of their bases in and around South Waziristan on Saturday, hours after top military and political leaders were briefed by army chief General in the capital, . The troops advanced north towards the stronghold of , west towards , and , and east towards , . \"The recent upsurge of terror incidents in the country were condemned and it was agreed that these elements pose a serious threat to the sovereignty and integrity of the state [...] In the given circumstances, the national consensus is reaffirmed to establish and maintain the writ of the state to weed out these elements,\" said Pakistani Prime Minister . Hours ahead of Saturday's offensive, Pakistani authorities imposed a curfew and turned off mobile phone service in parts of South Waziristan in the district of , as well as in and . Despite the military's superiority in numbers, former security chief of the tribal regions, Mahmood Shah, told the (VOA) news agency it would not be an easy battle. \"This 30,000 against 10,000 is a conventional battle,\" he said. \"The militants do not fight conventional battles.\" He also said he expects the military will face an enemy deeply entrenched in the mountainous and remote region. He also cautions that militants will likely launch suicide attacks elsewhere. Top army spokesman Major General has stated that the offensive could last up to two months, but that because of impending climatic conditions they would try to complete the attack by snowfall. A formal announcement on the start of the operation is expected by Prime Minister Gilani. Officials have said that four soldiers were wounded during clashes and that remote-controlled bomb attacks killed two soldiers in and one in South Waziristan. The three soldiers' bodies have been taken to . There are also unconfirmed reports of militant deaths. Experts estimate the number of militants between 10,000 and 12,000 from the movement in South Waziristan and up to 25,000 across Pakistan's semi-autonomous tribal belt, with up to 5,000 fighters supporting the Taliban.", "edit_actions": [{"type": "D", "before": "Taliban", "after": null, "start_char_pos": 100, "end_char_pos": 107}, {"type": "D", "before": "South Waziristan", "after": null, "start_char_pos": 128, "end_char_pos": 144}, {"type": "D", "before": "Baitullah Mehsud", "after": null, "start_char_pos": 542, "end_char_pos": 558}, {"type": "D", "before": "Hakimullah Mehsud", "after": null, "start_char_pos": 590, "end_char_pos": 607}, {"type": "D", "before": "Ashfaq Pervez Kayanimain", "after": null, "start_char_pos": 974, "end_char_pos": 998}, {"type": "D", "before": "Islamabad", "after": null, "start_char_pos": 1015, "end_char_pos": 1024}, {"type": "R", "before": "Mehsud stronghold of Makeen", "after": "stronghold of", "start_char_pos": 1065, "end_char_pos": 1092}, {"type": "D", "before": "Kunigaram, Saam and Baddar", "after": null, "start_char_pos": 1108, "end_char_pos": 1134}, {"type": "A", "before": null, "after": ", and", "start_char_pos": 1141, "end_char_pos": 1141}, {"type": "R", "before": "Kotkai, Spinkai Raghzai", "after": ",", "start_char_pos": 1155, "end_char_pos": 1178}, {"type": "D", "before": "Yousuf Raza Gilani", "after": null, "start_char_pos": 1535, "end_char_pos": 1553}, {"type": "D", "before": "Wana", "after": null, "start_char_pos": 1716, "end_char_pos": 1720}, {"type": "R", "before": "Shakai and Tiarza", "after": "and", "start_char_pos": 1737, "end_char_pos": 1754}, {"type": "D", "before": "Voice of America", "after": null, "start_char_pos": 1872, "end_char_pos": 1888}, {"type": "D", "before": "Athar Abbas", "after": null, "start_char_pos": 2277, "end_char_pos": 2288}, {"type": "D", "before": "North Waziristan", "after": null, "start_char_pos": 2669, "end_char_pos": 2685}, {"type": "D", "before": "Ramzak", "after": null, "start_char_pos": 2761, "end_char_pos": 2767}, {"type": "D", "before": "Tehreek-e-Taliban", "after": null, "start_char_pos": 2901, "end_char_pos": 2918}, {"type": "D", "before": "Uzbek", "after": null, "start_char_pos": 3029, "end_char_pos": 3034}], "sents_char_pos": [0, 159, 243, 410, 463, 609, 660, 1026, 1362, 1555, 1938, 2002, 2053, 2165, 2243, 2448, 2538, 2714, 2769, 2824]}
+{"doc_id": "147615", "revision_depth": "1", "before_revision": "A massive earthquake, registering 7.0 on the moment magnitude scale , struck Haiti yesterday, destroying many buildings, disrupting communications, and burying an unknown number of people underneath rubble. Thousands of people are feared to have been killed by the tremors, which were felt as far away as Venezuela. 200px|An injured survivor in the Port-au-Prince rubble. Survivors from the rubble being loaded on the back of a pickup truck. Corpses of people killed by collapsed buildings were scattered throughout Port-au-Prince and surrounding areas. Witnesses say bodies were lining the streets of the capital, Port-au-Prince , after the quake struck on Tuesday afternoon, sending a cloud of dust from falling buildings into the sky. The quake was centered about sixteen kilometers from the capital, and struck at a depth of just ten kilometers, exacerbating the damage. At least 27 aftershocks were also recorded, the strongest of which came in at 5.5 and 5.9 magnitude. A tsunami alert was initially issued following the tremor, but it was retracted shortly afterwards. Buildings across the capital have collapsed, including the presidential palace and the headquarters of the United Nations peacekeeping mission in Haiti. However, the president, Ren\u00e9 Pr\u00e9val , and his wife reportedly survived the collapse of the building. The country's envoy to the United States believed damage costs could reach billions of dollars. The Notre Dame of the Assumption Cathedral in Port-au-Prince was also destroyed, killing Joseph Serge Miot, the Archbishop of Port-au-Prince . \"[...] It would appear that all those who were in the building, including my friend [UN mission head] Hedi Annabi [...] and all those who were with him and around him are dead,\" said French Foreign Minister Bernard Kouchner . In a statement released yesterday, the UN remarked that \"[f]or the moment, a large number of personnel remain unaccounted for.\" Video of the earthquake in progress. \"I saw dead bodies, people are screaming, they are on the street panicking, people are hurt. There are a lot of wounded, broken heads, broken arms,\" recounted Raphaelle Chenet, the administrator of the Mercy and Sharing charity, in a telephone interview with the Wall Street Journal from the Haitian capital. Joseph Guyler Delva, a reporter for Reuters , was in the area when the tremors struck. \"Everything started shaking, people were screaming, houses started collapsing. It's total chaos.\" The World Food Program (WFP), which has a large staff on the ground, says the level of destruction indicates many of these people have been affected and will require help. The Director of the WFP office in Geneva, Charles Vincent, remarked that the first priority is to save lives. \"To rescue people that are buried, that are trapped, etc. [...] followed very rapidly by a big problem of water, sanitation, epidemic-problems of diseases that might be bred in that kind of situation,\" he noted. The Haitian ambassador to the United States, Raymond Joseph, told CNN the Caribbean nation is seeking US assistance, and called the quake a catastrophe of major proportions. \"I'm quite sure we're going to face a disaster of major proportion,\" he said. Separately, the Inter-American Development Bank said it will immediately approve a $200,000 grant for emergency assistance to Haiti. The funds will be used to provide food, water, medicine and temporary shelter for victims of the massive quake. The US Agency for International Development is dispatching a disaster assistance response team to Haiti and commented that it will continue to provide additional support as needed. The UN, meanwhile, dispatched approximately 37 search and rescue teams to assist Haitians from a global network. UN General Secretary Ban Ki-moon said that US$ 10 million worth of emergency funds would be used. \"I have spoken with Mr. Clinton and we have agreed to mobilize our best assistance and rescue teams and try to reconstruct the Haitian economy. The UN will do whatever possible to help the Haitian people to overcome these difficulties,\" Ban stated. The aid group Oxfam added that its emergency response team for Latin America is based in Haiti and is well prepared, with a public health, water and sanitation team in Port-au-Prince. Oxfam says it is preparing to send in emergency supplies as soon as possible from Panama. The American Red Cross pledged US $500,000 to help the country, and would send out people to assess damage. \"As with most earthquakes, we expect to see immediate needs for food, water, temporary shelter, medical services and emotional support,\" it said yesterday evening in a statement. A number of other nations, including the UK and Venezuela, are also planning to send aid. A reporter for the Al Jazeera news agency, however, said there might be difficulties delivering aid. \"We are about 300km from the epicentre of the earthquake, and we know that the UN agencies and the humanitarian groups here are trying to get together some kind of strategy to get aid over to Haiti. We know that there are trucks loaded with supplies ready to go but the difficulty is that no-one really knows how to get that aid to the people [effectively].\" This quake is said to have been the strongest in Haiti in over two hundred years; the last time an earthquake of comparable magnitude was recorded was in 1770. Haiti is the Western Hemisphere's poorest country. Recent development efforts have suffered severe setbacks because of political violence, crime, corruption and natural disasters. Seventy percent of the population lives on the equivalent of less than US$ 2 per day.", "after_revision": "A massive earthquake, registering 7.0 on the , struck Haiti yesterday, destroying many buildings, disrupting communications, and burying an unknown number of people underneath rubble. Thousands of people are feared to have been killed by the tremors, which were felt as far away as Venezuela. 200px|An injured survivor in the Port-au-Prince rubble. Survivors from the rubble being loaded on the back of a pickup truck. Corpses of people killed by collapsed buildings were scattered throughout Port-au-Prince and surrounding areas. Witnesses say bodies were lining the streets of the capital, , after the quake struck on Tuesday afternoon, sending a cloud of dust from falling buildings into the sky. The quake was centered about sixteen kilometers from the capital, and struck at a depth of just ten kilometers, exacerbating the damage. At least 27 aftershocks were also recorded, the strongest of which came in at 5.5 and 5.9 magnitude. A tsunami alert was initially issued following the tremor, but it was retracted shortly afterwards. Buildings across the capital have collapsed, including the presidential palace and the headquarters of the United Nations peacekeeping mission in Haiti. However, the president, , and his wife reportedly survived the collapse of the building. The country's envoy to the United States believed damage costs could reach billions of dollars. The in Port-au-Prince was also destroyed, killing , the . \"[...] It would appear that all those who were in the building, including my friend [UN mission head] Hedi Annabi [...] and all those who were with him and around him are dead,\" said French Foreign Minister . In a statement released yesterday, the UN remarked that \"[f]or the moment, a large number of personnel remain unaccounted for.\" Video of the earthquake in progress. \"I saw dead bodies, people are screaming, they are on the street panicking, people are hurt. There are a lot of wounded, broken heads, broken arms,\" recounted Raphaelle Chenet, the administrator of the charity, in a telephone interview with the from the Haitian capital. Joseph Guyler Delva, a reporter for , was in the area when the tremors struck. \"Everything started shaking, people were screaming, houses started collapsing. It's total chaos.\" The (WFP), which has a large staff on the ground, says the level of destruction indicates many of these people have been affected and will require help. The Director of the WFP office in Geneva, Charles Vincent, remarked that the first priority is to save lives. \"To rescue people that are buried, that are trapped, etc. [...] followed very rapidly by a big problem of water, sanitation, epidemic-problems of diseases that might be bred in that kind of situation,\" he noted. The Haitian ambassador to the United States, Raymond Joseph, told the nation is seeking US assistance, and called the quake a catastrophe of major proportions. \"I'm quite sure we're going to face a disaster of major proportion,\" he said. Separately, the said it will immediately approve a $200,000 grant for emergency assistance to Haiti. The funds will be used to provide food, water, medicine and temporary shelter for victims of the massive quake. The is dispatching a disaster assistance response team to Haiti and commented that it will continue to provide additional support as needed. The UN, meanwhile, dispatched approximately 37 search and rescue teams to assist Haitians from a global network. UN General Secretary Ban Ki-moon said that US$ 10 million worth of emergency funds would be used. \"I have spoken with Mr. Clinton and we have agreed to mobilize our best assistance and rescue teams and try to reconstruct the Haitian economy. The UN will do whatever possible to help the Haitian people to overcome these difficulties,\" Ban stated. The aid group added that its emergency response team for is based in Haiti and is well prepared, with a public health, water and sanitation team in Port-au-Prince. Oxfam says it is preparing to send in emergency supplies as soon as possible from Panama. The American Red Cross pledged US $500,000 to help the country, and would send out people to assess damage. \"As with most earthquakes, we expect to see immediate needs for food, water, temporary shelter, medical services and emotional support,\" it said yesterday evening in a statement. A number of other nations, including the UK and Venezuela, are also planning to send aid. A reporter for the news agency, however, said there might be difficulties delivering aid. \"We are about 300km from the epicentre of the earthquake, and we know that the UN agencies and the humanitarian groups here are trying to get together some kind of strategy to get aid over to Haiti. We know that there are trucks loaded with supplies ready to go but the difficulty is that no-one really knows how to get that aid to the people [effectively].\" This quake is said to have been the strongest in Haiti in over two hundred years; the last time an earthquake of comparable magnitude was recorded was in 1770. Haiti is the Western Hemisphere's poorest country. Recent development efforts have suffered severe setbacks because of political violence, crime, corruption and natural disasters. Seventy percent of the population lives on the equivalent of less than US$ 2 per day.", "edit_actions": [{"type": "D", "before": "moment magnitude scale", "after": null, "start_char_pos": 45, "end_char_pos": 67}, {"type": "D", "before": "Port-au-Prince", "after": null, "start_char_pos": 615, "end_char_pos": 629}, {"type": "D", "before": "Ren\u00e9 Pr\u00e9val", "after": null, "start_char_pos": 1253, "end_char_pos": 1264}, {"type": "D", "before": "Notre Dame of the Assumption Cathedral", "after": null, "start_char_pos": 1430, "end_char_pos": 1468}, {"type": "R", "before": "Joseph Serge Miot, the Archbishop of Port-au-Prince", "after": ", the", "start_char_pos": 1515, "end_char_pos": 1566}, {"type": "D", "before": "Bernard Kouchner", "after": null, "start_char_pos": 1776, "end_char_pos": 1792}, {"type": "D", "before": "Mercy and Sharing", "after": null, "start_char_pos": 2162, "end_char_pos": 2179}, {"type": "D", "before": "Wall Street Journal", "after": null, "start_char_pos": 2223, "end_char_pos": 2242}, {"type": "D", "before": "Reuters", "after": null, "start_char_pos": 2305, "end_char_pos": 2312}, {"type": "D", "before": "World Food Program", "after": null, "start_char_pos": 2458, "end_char_pos": 2476}, {"type": "R", "before": "CNN the Caribbean", "after": "the", "start_char_pos": 3014, "end_char_pos": 3031}, {"type": "D", "before": "Inter-American Development Bank", "after": null, "start_char_pos": 3216, "end_char_pos": 3247}, {"type": "R", "before": "$200,000 grant for emergency assistance to Haiti. The funds will be used to provide food, water, medicine and temporary shelter for victims of the massive quake. The US Agency for International Development is dispatching a disaster assistance response team to Haiti and commented that it will continue to provide additional support as needed. The UN, meanwhile, dispatched approximately 37 search and rescue teams to assist Haitians from a global network. UN General Secretary Ban Ki-moon said that US$", "after": "$200,000 grant for emergency assistance to Haiti. The funds will be used to provide food, water, medicine and temporary shelter for victims of the massive quake. The is dispatching a disaster assistance response team to Haiti and commented that it will continue to provide additional support as needed. The UN, meanwhile, dispatched approximately 37 search and rescue teams to assist Haitians from a global network. UN General Secretary Ban Ki-moon said that US$", "start_char_pos": 3283, "end_char_pos": 3785}, {"type": "D", "before": "Oxfam", "after": null, "start_char_pos": 4100, "end_char_pos": 4105}, {"type": "D", "before": "Latin America", "after": null, "start_char_pos": 4149, "end_char_pos": 4162}, {"type": "R", "before": "$500,000 to help the country, and would send out people to assess damage. \"As with most earthquakes, we expect to see immediate needs for food, water, temporary shelter, medical services and emotional support,\" it said yesterday evening in a statement. A number of other nations, including the UK and Venezuela, are also planning to send aid. A reporter for the Al Jazeera news agency, however, said there might be difficulties delivering aid. \"We are about 300km from the epicentre of the earthquake, and we know that the UN agencies and the humanitarian groups here are trying to get together some kind of strategy to get aid over to Haiti. We know that there are trucks loaded with supplies ready to go but the difficulty is that no-one really knows how to get that aid to the people [effectively].\" This quake is said to have been the strongest in Haiti in over two hundred years; the last time an earthquake of comparable magnitude was recorded was in 1770. Haiti is the Western Hemisphere's poorest country. Recent development efforts have suffered severe setbacks because of political violence, crime, corruption and natural disasters. Seventy percent of the population lives on the equivalent of less than US$", "after": "$500,000 to help the country, and would send out people to assess damage. \"As with most earthquakes, we expect to see immediate needs for food, water, temporary shelter, medical services and emotional support,\" it said yesterday evening in a statement. A number of other nations, including the UK and Venezuela, are also planning to send aid. A reporter for the news agency, however, said there might be difficulties delivering aid. \"We are about 300km from the epicentre of the earthquake, and we know that the UN agencies and the humanitarian groups here are trying to get together some kind of strategy to get aid over to Haiti. We know that there are trucks loaded with supplies ready to go but the difficulty is that no-one really knows how to get that aid to the people [effectively].\" This quake is said to have been the strongest in Haiti in over two hundred years; the last time an earthquake of comparable magnitude was recorded was in 1770. Haiti is the Western Hemisphere's poorest country. Recent development efforts have suffered severe setbacks because of political violence, crime, corruption and natural disasters. Seventy percent of the population lives on the equivalent of less than US$", "start_char_pos": 4394, "end_char_pos": 5611}], "sents_char_pos": [0, 206, 315, 371, 441, 553, 737, 874, 975, 1075, 1228, 1329, 1425, 1794, 1959, 2052, 2268, 2355, 2434, 2453, 2625, 2735, 2947, 3121, 3199, 3332, 3444, 3625, 3738, 3836, 3980, 4085, 4269, 4359, 4467, 4646, 4736, 4837, 5036, 5196, 5278, 5356, 5407, 5536]}
+{"doc_id": "148892", "revision_depth": "1", "before_revision": "The Intergovernmental Panel on Climate Change (IPCC) has admitted including a misleading claim in a major 2007 report, and issued an apology for the error. The statement, which claimed that the glaciers in the Himalayas were likely to melt within thirty years, was not based on scientific data. The IPCC, a United Nations panel, published its fourth Assessment Report in 2007, which laid out the panel's consensus on the current state of climate change worldwide. This was the most recent in a series of major summary reports, the first dating from 1990, which discussed the causes, effects, and possible ways to address climate change. The second section of the report, known as \"Working Group II\", dealt with the impacts of climate change on the physical environment; one paragraph of this section stated that%DIFDELCMD < %DIFDELCMD < %%% Glaciers in the Himalaya are receding faster than in any other part of the world and, if the present rate continues, the likelihood of them disappearing by the year 2035 and perhaps sooner is very high. News reports have suggested that the claim was picked up by the IPCC when it was quoted in a 2005 report by the World Wildlife Fund, which may itself have drawn on a 1999 article in the popular science magazine New Scientist.%DIFDELCMD < %DIFDELCMD < %%% The IPCC have admitted that the original claim was \"poorly substantiated\" and that \"well-established standards of evidence were not applied properly\" in the preparation of this section of the report. \"The chair, vice-chairs, and co-chairs of the IPCC regrets the poor application of IPCC procedures\", read a statement released by the panel. However, they have emphasised that they stand by their overall conclusion that melting of the glaciers is a concern to the region, which is home to over one billion people, and that the rate of melting is projected to accelerate over the coming century. Glaciers and glacial lakes in the Bhutan-Himalaya The consensus among glaciologists is that it would take hundreds of years to melt the Himalayan glaciers, and that the current rates of melting are not yet well-understood. Michael Zemp, of the World Glacier Monitoring Service told CNN that \" the Himalayas are among those regions with the fewest available data\", and noted that as such there was it was not possible to say that Himalayan glaciers were receding faster than elsewhere in the world. Indeed, according to The Times (UK), there is thought to be some evidence of glaciers growing in the neighboring Karakoram mountain range. The IPCC had recently come under fire during the 2009 United Nations Climate Change Conference, when selectively leaked e-mails, hacked from the University of East Anglia, reportedly showed that some scientists were attempting to suppress findings by other climatologists that did not agree with their own findings . This news is in contrast with other global warming findings, such as computer modelling showing that the Pine Island Glacier and Thwaites Glacier, once described as a major \"tipping point\" for the entire West Antartic Ice Sheet in the embayment of the Amudsen Sea, has reached their own tipping points for eventual collapse, likely to lead to a sea level rise of up to 52 cm over the next century, per the New Scientist .", "after_revision": "Part of a major 2007 report by the Intergovernmental Panel on Climate Change (IPCC) , which claimed that the glaciers in the Himalayas were likely to melt within thirty years, has been found to have not been based on scientific data. The IPCC, a United Nations panel, %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% admitted that the original claim was \"poorly substantiated\" and that \"well-established standards of evidence were not applied properly\" in the preparation of this section of the report. \"The chair, vice-chairs, and co-chairs of the IPCC regrets the poor application of IPCC procedures\", read a statement released by the panel. News reports have suggested that the claim originated in a 1999 article in the popular science magazine New Scientist, and was picked up by the IPCC when it was quoted in a 2005 report by the World Wildlife Fund. Glaciers and glacial lakes in the Bhutan-Himalaya According to The Times (UK), most glaciologists believe it would take hundreds of years to melt the Himalayan glaciers, with some doubting that it will ever happen. There is evidence of glaciers growing in the neighboring Karakoram mountain range. Michael Zemp, of the World Glacier Monitoring Service told CNN that , \" There are simply no observations available to make these sorts of statements.\" \"The other thing is that the report says the glaciers are receding faster than anywhere else in the world. We simply do not have the glacier change measurements. The Himalayas are among those regions with the fewest available data\", Zemp added. Nevertheless, the IPCC maintains that the melting of the glaciers is a concern to the region, which is home to over one billion people. It stands by its overall conclusion that \"mass losses from glaciers and reductions in snow cover over recent decades are projected to accelerate throughout the 21st century, reducing water availability, hydropower potential, and changing seasonality of flows in regions supplied by meltwater from major mountain ranges.\" The IPCC had recently come under fire during the 2009 United Nations Climate Change Conference, when selectively leaked e-mails, hacked from the University of East Anglia, reportedly showed that some scientists were attempting to suppress findings by other climatologists that did not agree with their own findings .", "edit_actions": [{"type": "R", "before": "The", "after": "Part of a major 2007 report by the", "start_char_pos": 0, "end_char_pos": 3}, {"type": "R", "before": "has admitted including a misleading claim in a major 2007 report, and issued an apology for the error. The statement,", "after": ",", "start_char_pos": 53, "end_char_pos": 170}, {"type": "R", "before": "was not", "after": "has been found to have not been", "start_char_pos": 261, "end_char_pos": 268}, {"type": "D", "before": "published its fourth Assessment Report in 2007, which laid out the panel's consensus on the current state of climate change worldwide. This was the most recent in a series of major summary reports, the first dating from 1990, which discussed the causes, effects, and possible ways to address climate change.", "after": null, "start_char_pos": 329, "end_char_pos": 636}, {"type": "D", "before": "The second section of the report, known as \"Working Group II\", dealt with the impacts of climate change on the physical environment; one paragraph of this section stated that", "after": null, "start_char_pos": 637, "end_char_pos": 811}, {"type": "D", "before": "Glaciers in the Himalaya are receding faster than in any other part of the world and, if the present rate continues, the likelihood of them disappearing by the year 2035 and perhaps sooner is very high.", "after": null, "start_char_pos": 841, "end_char_pos": 1043}, {"type": "D", "before": "News reports have suggested that the claim was picked up by the IPCC when it was quoted in a 2005 report by the World Wildlife Fund, which may itself have drawn on a 1999 article in the popular science magazine New Scientist.", "after": null, "start_char_pos": 1044, "end_char_pos": 1269}, {"type": "D", "before": "The IPCC have", "after": null, "start_char_pos": 1299, "end_char_pos": 1312}, {"type": "R", "before": "However, they have emphasised that they stand by their overall conclusion that melting of the glaciers is a concern to the region, which is home to over one billion people, and that the rate of melting is projected to accelerate over the coming century.", "after": "News reports have suggested that the claim originated in a 1999 article in the popular science magazine New Scientist, and was picked up by the IPCC when it was quoted in a 2005 report by the World Wildlife Fund.", "start_char_pos": 1640, "end_char_pos": 1893}, {"type": "R", "before": "The consensus among glaciologists is that", "after": "According to The Times (UK), most glaciologists believe", "start_char_pos": 1944, "end_char_pos": 1985}, {"type": "R", "before": "and that the current rates of melting are not yet well-understood.", "after": "with some doubting that it will ever happen. There is evidence of glaciers growing in the neighboring Karakoram mountain range.", "start_char_pos": 2050, "end_char_pos": 2116}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2185, "end_char_pos": 2185}, {"type": "R", "before": "the", "after": "There are simply no observations available to make these sorts of statements.\"", "start_char_pos": 2188, "end_char_pos": 2191}, {"type": "A", "before": null, "after": "\"The other thing is that the report says the glaciers are receding faster than anywhere else in the world. We simply do not have the glacier change measurements. The", "start_char_pos": 2192, "end_char_pos": 2192}, {"type": "R", "before": "and noted that as such there was it was not possible to say that Himalayan glaciers were receding faster than elsewhere in the world. Indeed, according to The Times (UK), there is thought to be some evidence of glaciers growing in the neighboring Karakoram mountain range.", "after": "Zemp added.", "start_char_pos": 2260, "end_char_pos": 2532}, {"type": "A", "before": null, "after": "Nevertheless, the IPCC maintains that the melting of the glaciers is a concern to the region, which is home to over one billion people. It stands by its overall conclusion that \"mass losses from glaciers and reductions in snow cover over recent decades are projected to accelerate throughout the 21st century, reducing water availability, hydropower potential, and changing seasonality of flows in regions supplied by meltwater from major mountain ranges.\"", "start_char_pos": 2533, "end_char_pos": 2533}, {"type": "D", "before": ".", "after": null, "start_char_pos": 2849, "end_char_pos": 2850}, {"type": "D", "before": "This news is in contrast with other global warming findings, such as computer modelling showing that the Pine Island Glacier and Thwaites Glacier, once described as a major \"tipping point\" for the entire West Antartic Ice Sheet in the embayment of the Amudsen Sea, has reached their own tipping points for eventual collapse, likely to lead to a sea level rise of up to 52 cm over the next century, per the New Scientist", "after": null, "start_char_pos": 2851, "end_char_pos": 3270}], "sents_char_pos": [0, 155, 294, 463, 636, 769, 1043, 1269, 1498, 1639, 1893, 2116, 2393, 2532, 2850]}
+{"doc_id": "151516", "revision_depth": "1", "before_revision": "Part of the Coronation Street set, including the Rovers Return Inn , on 18 December 2005. Thursday marked the 50th anniversary of British soap opera Coronation Street '''s broadcast. The programme, which was created by Tony Warren and developed by Granada Television \u2014 now branded on-air as ITV Studios \u2014 in Manchester, England, was first broadcast on December 9, 1960 on ITV. The original commission was just 13 episodes. Nearly 7,500 episodes later, Coronation Street still broadcasts on ITV1 . At its peak, Thursday's one-hour live episode received ratings of approximately 14.9 million viewers \u2014 the highest total for the show for over six years. Within the sixty scenes, the storylines included character Fiz Stape prematurely giving birth to a baby girl, who was given the name Hope. Peter Barlow lay on his hospital bed as he attempted to say his wedding vows to Leanne Battersby ; he subsequently flatlined. Molly Dobbs admitted her affair with Kevin Webster to Sally Webster \u2014 Kevin's wife \u2014 before dying as a result of her injuries. There were virtually no mistakes made in the episode. Phil Collinson , the producer, expressed his approval for the episode. \"I'm so proud and gobsmacked at how brilliant it looked,\" he commented. \"It was like seeing it for the first time. I'm stunned and amazed.\" Part of the exterior set of Coronation Street, including the Corner Shop, in October 2007. Ken Barlow is the only remaining character from the first episode, always portrayed by William Roache . Coronation Street now has its own version of encyclopedia website Wikipedia called Corriepedia, which was launched on May 21, 2008. Because of this anniversary, numerous special programmes were also broadcast. The first ever episode of Coronation Street was repeated on Monday. On Wednesday-Thursday night Coronation Street: 50 Years, 50 Moments revealed the results of a poll to determine the fifty best Coronation Street moments. A humourous scene featuring character Blanche Hunt at an Alcoholics Anonymous meeting topped the poll. Hunt, portrayed by the late Maggie Jones , was also revealed as the most popular character, according to a study by UK magazine Inside Soap . Second-place moment was a storyline involving serial killer Richard Hillman. Brian Capron , who portrayed Hillman, commented \"Funnily enough because it's all come back it seems to have done me a lot of good. It's kind of an iconic storyline that I was involved in. There were some wonderful blackly humourous lines and the gloves, that slight pantomime element. You could love to hate him. They gave me so many great lines.\" Friday also saw the ITV1 broadcast of one-off game show, Coronation Street: The Big 50, a part-entertainment programme. Hosted by Paul O'Grady , it featured various members of the Coronation Street'' cast as contestants, split into three teams: \"Weatherfield Lads\", \"Pint Pullers\", and \"Rovers Regulars\" plus a fourth team of celebrity fans, or \"Superfans\". The \"Rovers Regulars\" were to become the victors.", "after_revision": "Part of the Coronation Street set, including the , on 18 December 2005. Thursday marked the 50th anniversary of British soap opera '''s broadcast. The programme, which was created by and developed by \u2014 now branded on-air as \u2014 in Manchester, England, was first broadcast on December 9, 1960 on ITV. The original commission was just 13 episodes. Nearly 7,500 episodes later, Coronation Street still broadcasts on . At its peak, Thursday's one-hour live episode received ratings of approximately 14.9 million viewers \u2014 the highest total for the show for over six years. Within the sixty scenes, the storylines included character prematurely giving birth to a baby girl, who was given the name Hope. lay on his hospital bed as he attempted to say his wedding vows to ; he subsequently flatlined. admitted her affair with to \u2014 Kevin's wife \u2014 before dying as a result of her injuries. There were virtually no mistakes made in the episode. , the producer, expressed his approval for the episode. \"I'm so proud and gobsmacked at how brilliant it looked,\" he commented. \"It was like seeing it for the first time. I'm stunned and amazed.\" Part of the exterior set of Coronation Street, including the Corner Shop, in October 2007. is the only remaining character from the first episode, always portrayed by . Coronation Street now has its own version of encyclopedia website Wikipedia called Corriepedia, which was launched on May 21, 2008. Because of this anniversary, numerous special programmes were also broadcast. The first ever episode of Coronation Street was repeated on Monday. On Wednesday-Thursday night Coronation Street: 50 Years, 50 Moments revealed the results of a poll to determine the fifty best Coronation Street moments. A humourous scene featuring character at an meeting topped the poll. Hunt, portrayed by the late , was also revealed as the most popular character, according to a study by UK magazine . Second-place moment was a storyline involving serial killer . , who portrayed Hillman, commented \"Funnily enough because it's all come back it seems to have done me a lot of good. It's kind of an iconic storyline that I was involved in. There were some wonderful blackly humourous lines and the gloves, that slight pantomime element. You could love to hate him. They gave me so many great lines.\" Friday also saw the ITV1 broadcast of one-off game show, Coronation Street: The Big 50, a part-entertainment programme. Hosted by , it featured various members of the Coronation Street'' cast as contestants, split into three teams: \"Weatherfield Lads\", \"Pint Pullers\", and \"Rovers Regulars\" plus a fourth team of celebrity fans, or \"Superfans\". The \"Rovers Regulars\" were to become the victors.", "edit_actions": [{"type": "D", "before": "Rovers Return Inn", "after": null, "start_char_pos": 49, "end_char_pos": 66}, {"type": "D", "before": "Coronation Street", "after": null, "start_char_pos": 149, "end_char_pos": 166}, {"type": "D", "before": "Tony Warren", "after": null, "start_char_pos": 219, "end_char_pos": 230}, {"type": "D", "before": "Granada Television", "after": null, "start_char_pos": 248, "end_char_pos": 266}, {"type": "D", "before": "ITV Studios", "after": null, "start_char_pos": 291, "end_char_pos": 302}, {"type": "D", "before": "ITV1", "after": null, "start_char_pos": 490, "end_char_pos": 494}, {"type": "D", "before": "Fiz Stape", "after": null, "start_char_pos": 710, "end_char_pos": 719}, {"type": "D", "before": "Peter Barlow", "after": null, "start_char_pos": 790, "end_char_pos": 802}, {"type": "D", "before": "Leanne Battersby", "after": null, "start_char_pos": 870, "end_char_pos": 886}, {"type": "D", "before": "Molly Dobbs", "after": null, "start_char_pos": 916, "end_char_pos": 927}, {"type": "R", "before": "Kevin Webster to Sally Webster", "after": "to", "start_char_pos": 953, "end_char_pos": 983}, {"type": "D", "before": "Phil Collinson", "after": null, "start_char_pos": 1097, "end_char_pos": 1111}, {"type": "D", "before": "Ken Barlow", "after": null, "start_char_pos": 1399, "end_char_pos": 1409}, {"type": "D", "before": "William Roache", "after": null, "start_char_pos": 1486, "end_char_pos": 1500}, {"type": "R", "before": "Blanche Hunt at an Alcoholics Anonymous", "after": "at an", "start_char_pos": 1973, "end_char_pos": 2012}, {"type": "D", "before": "Maggie Jones", "after": null, "start_char_pos": 2066, "end_char_pos": 2078}, {"type": "D", "before": "Inside Soap", "after": null, "start_char_pos": 2166, "end_char_pos": 2177}, {"type": "R", "before": "Richard Hillman. Brian Capron", "after": ".", "start_char_pos": 2240, "end_char_pos": 2269}, {"type": "D", "before": "Paul O'Grady", "after": null, "start_char_pos": 2735, "end_char_pos": 2747}], "sents_char_pos": [0, 89, 182, 376, 422, 650, 789, 888, 915, 1042, 1096, 1167, 1239, 1282, 1398, 1634, 1712, 1780, 1934, 2037, 2256, 2387, 2444, 2541, 2569, 2604, 2724, 2962]}
+{"doc_id": "153452", "revision_depth": "1", "before_revision": "Four years ago, on February 9, a major Polish newspaper called Gazeta Wyborcza published news about a hoax in the Polish Wikipedia entitled Henryk Batuta. The author of this article was Konrad Godlewski . Several weeks after, Godlewski started editing on the Polish Wikipedia. Results of his work include one featured article - pismo chi\u0144skie (Polish for \"Chinese character\") , as well as various articles relating to China. During the interview, Godlewski discussed memes, hoaxes and the Batuta Army - the authors of this hoax . From February 1, 2010, in the Polish Wikipedia users improve articles in special action BATUTA . BATUTA stands for \"Bezwzgl\u0119dna Akcja Troskliwego U\u017ar\u00f3d\u0142awiania Tysi\u0119cy artyk\u0142\u00f3w\", which can be translated as \"Ruthless Action of Careful Adding References to Thousands of Articles\". Interview You are the author of the first news story about Henryk Batuta hoax, uncovered four years ago in the Polish Wikipedia. Do you remember when did the authors of the hoax first come to you? Was it just before the publication or earlier? The hoax was uncovered on January 20th and the story was published on February 9, so there was a period of time between those two dates...", "after_revision": "Four years ago, on February 9, a major Polish newspaper , Gazeta Wyborcza published a report detailing a hoax in Polish Wikipedia entitled Henryk Batuta. The author of the report was Konrad Godlewski ; several weeks later, Godlewski began editing Polish Wikipedia. The results of his work include one featured article \u2013 pismo chi\u0144skie (Polish for \"Chinese character\") \u2013 as well as various articles relating to China. During our interview, Godlewski discusses memes, hoaxes , and the Batuta Army \u2013 the creators of the hoax his paper reported on . From February this year, a special project on the Polish Wikipedia , BATUTA, saw a makeshift taskforce work on improving the quality of content . BATUTA stands for \"Bezwzgl\u0119dna Akcja Troskliwego U\u017ar\u00f3d\u0142awiania Tysi\u0119cy artyk\u0142\u00f3w\", roughly translated as \"Ruthless Action of Carefully Adding References to Thousands of Articles\". Interview You are the author of the first news story about Henryk Batuta hoax, uncovered four years ago in the Polish Wikipedia. Do you remember when did the authors of the hoax first come to you? Was it just before the publication or earlier? The hoax was uncovered on January 20th and the story was published on February 9, so there was a period of time between those two dates...", "edit_actions": [{"type": "R", "before": "called", "after": ",", "start_char_pos": 56, "end_char_pos": 62}, {"type": "R", "before": "news about a hoax in the", "after": "a report detailing a hoax in", "start_char_pos": 89, "end_char_pos": 113}, {"type": "R", "before": "this article", "after": "the report", "start_char_pos": 169, "end_char_pos": 181}, {"type": "R", "before": ". Several weeks after, Godlewski started editing on the", "after": "; several weeks later, Godlewski began editing", "start_char_pos": 203, "end_char_pos": 258}, {"type": "R", "before": "Results", "after": "The results", "start_char_pos": 277, "end_char_pos": 284}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 326, "end_char_pos": 327}, {"type": "R", "before": ",", "after": "\u2013", "start_char_pos": 376, "end_char_pos": 377}, {"type": "R", "before": "the", "after": "our", "start_char_pos": 432, "end_char_pos": 435}, {"type": "R", "before": "discussed", "after": "discusses", "start_char_pos": 457, "end_char_pos": 466}, {"type": "A", "before": null, "after": ",", "start_char_pos": 481, "end_char_pos": 481}, {"type": "R", "before": "- the authors of this hoax", "after": "\u2013 the creators of the hoax his paper reported on", "start_char_pos": 502, "end_char_pos": 528}, {"type": "R", "before": "1, 2010, in", "after": "this year, a special project on", "start_char_pos": 545, "end_char_pos": 556}, {"type": "R", "before": "users improve articles in special action BATUTA", "after": ", BATUTA, saw a makeshift taskforce work on improving the quality of content", "start_char_pos": 578, "end_char_pos": 625}, {"type": "R", "before": "which can be", "after": "roughly", "start_char_pos": 710, "end_char_pos": 722}, {"type": "R", "before": "Careful", "after": "Carefully", "start_char_pos": 757, "end_char_pos": 764}], "sents_char_pos": [0, 154, 204, 276, 424, 530, 809, 938, 1006, 1053]}
+{"doc_id": "171413", "revision_depth": "1", "before_revision": "In the Spanish Hall, an ornate chamber within the Czech capital's Prague Castle , the two countries, which own more than 90 percent of the world's nuclear weapons, agreed to downsize their arsenals. The new ten-year pact, which is called the \" New START Treaty \", requires the U.S. and Russia to cut their inventory of nuclear warheads to about 1,500 each in the next seven years. Both countries are estimated to have well over 2,000 warheads now. The pact replaces the 1991 Strategic Arms Reduction Treaty (START I), which was signed by U.S. President George H.W. Bush and Soviet President Mikhail Gorbachev in the final days of the Soviet Union . START I expired in December of last year. The treaty complements the other two nuclear arms reduction treaties signed by the United States and Russia, which where the 1993 Russia, which where the 1993 START II treaty and the 2002 Moscow Treaty also known as SORT. Frank Gaffney , a former arms control adviser to President Ronald Reagan , says the president's nuclear posture review is based on a false and dangerous premise. \"The idea that he can, by reducing America's nuclear arsenal, contribute to the universal abandonment of nuclear weaponry. It will not happen. It will not happen on his watch. It will not happen ever,\" he said. Obama said, \"We are working together at the United Nations Security Council to pass strong sanctions on Iran and we will not tolerate actions that flout the NPT (Nuclear Non-Proliferation Treaty).\" He added, \"My expectation is that we are going to be able to secure strong, tough sanctions on Iran this spring.\" The nuclear treaty is almost certain to be approved in the Russian Duma . However, Russian Foreign Minister Sergei Lavrov has said Russia reserves the right to drop out of the pact if it believes U.S. missile defense plans for Europe threaten its security. Many experts agree passage in the U.S. Senate is not as certain, but that its prospects are good. To ratify the treaty, it will require 67 votes, to pass it will require Republican votes. Republicans in the Senate have expressed concerns that too many restrictions have been placed on America's nuclear arsenal.", "after_revision": "In the Spanish Hall, an ornate chamber within the Czech capital's , the two countries, which own more than 90 percent of the world's nuclear weapons, agreed to downsize their arsenals. The new ten-year pact, which is called the \" \", requires the U.S. and Russia to cut their inventory of nuclear warheads to about 1,500 each in the next seven years. Both countries are estimated to have well over 2,000 warheads now. The pact replaces the 1991 (START I), which was signed by U.S. President and Soviet President in the final days of the . START I expired in December of last year. The treaty complements the other two nuclear arms reduction treaties signed by the United States and Russia, which where the 1993 Russia, which where the 1993 treaty and the 2002 also known as SORT. , a former arms control adviser to President , says the president's nuclear posture review is based on a false and dangerous premise. \"The idea that he can, by reducing America's nuclear arsenal, contribute to the universal abandonment of nuclear weaponry. It will not happen. It will not happen on his watch. It will not happen ever,\" he said. Obama said, \"We are working together at the to pass strong sanctions on Iran and we will not tolerate actions that flout the (Nuclear Non-Proliferation Treaty).\" He added, \"My expectation is that we are going to be able to secure strong, tough sanctions on Iran this spring.\" The nuclear treaty is almost certain to be approved in the . However, Russian Foreign Minister has said Russia reserves the right to drop out of the pact if it believes U.S. missile defense plans for Europe threaten its security. Many experts agree passage in the is not as certain, but that its prospects are good. To ratify the treaty, it will require 67 votes, to pass it will require votes. Republicans in the Senate have expressed concerns that too many restrictions have been placed on America's nuclear arsenal.", "edit_actions": [{"type": "D", "before": "Prague Castle", "after": null, "start_char_pos": 66, "end_char_pos": 79}, {"type": "D", "before": "New START Treaty", "after": null, "start_char_pos": 244, "end_char_pos": 260}, {"type": "D", "before": "Strategic Arms Reduction Treaty", "after": null, "start_char_pos": 475, "end_char_pos": 506}, {"type": "D", "before": "George H.W. Bush", "after": null, "start_char_pos": 553, "end_char_pos": 569}, {"type": "D", "before": "Mikhail Gorbachev", "after": null, "start_char_pos": 591, "end_char_pos": 608}, {"type": "D", "before": "Soviet Union", "after": null, "start_char_pos": 634, "end_char_pos": 646}, {"type": "D", "before": "START II", "after": null, "start_char_pos": 850, "end_char_pos": 858}, {"type": "D", "before": "Moscow Treaty", "after": null, "start_char_pos": 879, "end_char_pos": 892}, {"type": "D", "before": "Frank Gaffney", "after": null, "start_char_pos": 913, "end_char_pos": 926}, {"type": "D", "before": "Ronald Reagan", "after": null, "start_char_pos": 972, "end_char_pos": 985}, {"type": "D", "before": "United Nations Security Council", "after": null, "start_char_pos": 1330, "end_char_pos": 1361}, {"type": "D", "before": "NPT", "after": null, "start_char_pos": 1443, "end_char_pos": 1446}, {"type": "D", "before": "Russian Duma", "after": null, "start_char_pos": 1657, "end_char_pos": 1669}, {"type": "D", "before": "Sergei Lavrov", "after": null, "start_char_pos": 1706, "end_char_pos": 1719}, {"type": "D", "before": "U.S. Senate", "after": null, "start_char_pos": 1889, "end_char_pos": 1900}, {"type": "D", "before": "Republican", "after": null, "start_char_pos": 2025, "end_char_pos": 2035}], "sents_char_pos": [0, 198, 380, 447, 690, 1074, 1197, 1217, 1250, 1285, 1483, 1597, 1671, 1854, 1952, 2042]}
+{"doc_id": "176497", "revision_depth": "2", "before_revision": " Intro From Wikinews, the free news source, this is the audio Wikinews brief for Friday, April 23nd, 2010. I'm Dan Harlow and here are today's top stories: Bombings in Iraq kill dozens Oil rig in Gulf of Mexico sinks after explosion; eleven missing The oil rig \"Deepwater Horizon\" which is located roughly 50 miles southeast off the coast of Louisiana, sank yesterday after an explosion of unknown origins occured Tuesday night. 115 of the 126 workers on board the time of the explosion have been rescued, however, 11 still remain missing although Coast Guard officials have expressed optimism that they are still alive. 6.2 magnitude aftershock provokes panic in southern Chile Brazil's Minas state stops sales of Toyota Corolla US vice president Biden says Iran sanctions likely by early May Greece formally asks for EU-IMF loans Chilean actor Oscar Garc\u00e9s accused of sexual abuse Ben Shephard announces departure from GMTV British poet Peter Porter dies at age 81 On this day in history In 1867, William Lincoln patents the zoetrope, a machine that shows animated pictures by mounting a strip of drawings in a wheel. Category: Wikinews audio Category:Audio Wikinews News Briefs Category:Brief Categor", "after_revision": "__NOTOC__ Intro From Wikinews, the free news source, this is the audio Wikinews brief for Friday, April 23nd, 2010. I'm Dan Harlow and here are today's top stories: Bombings in Iraq kill dozens (0:16) Oil rig in Gulf of Mexico sinks after explosion; eleven missing (1:13) The oil rig \"Deepwater Horizon\" which is located roughly 50 miles southeast off the coast of Louisiana, sank yesterday after an explosion of unknown origins occurred Tuesday night. 115 of the 126 workers on board the time of the explosion have been rescued, however, 11 still remain missing although Coast Guard officials have expressed optimism that they are still alive. 6.2 magnitude aftershock provokes panic in southern Chile (2:30) Brazil's Minas state stops sales of Toyota Corolla (3:13) US vice president Biden says Iran sanctions likely by early May (3:55) Greece formally asks for EU-IMF loans (4:57) Chilean actor Oscar Garc\u00e9s accused of sexual abuse (5:33) Ben Shephard announces departure from GMTV (6:30) British poet Peter Porter dies at age 81 (7:10) On this day in history (8:09) In 1867, William Lincoln patents the zoetrope, a machine that shows animated pictures by mounting a strip of drawings in a wheel. Category: Brief Category:April 23, 2010 Category:No publis", "edit_actions": [{"type": "A", "before": null, "after": "__NOTOC__", "start_char_pos": 0, "end_char_pos": 0}, {"type": "A", "before": null, "after": "(0:16)", "start_char_pos": 185, "end_char_pos": 185}, {"type": "A", "before": null, "after": "(1:13)", "start_char_pos": 250, "end_char_pos": 250}, {"type": "R", "before": "occured", "after": "occurred", "start_char_pos": 408, "end_char_pos": 415}, {"type": "A", "before": null, "after": "(2:30)", "start_char_pos": 681, "end_char_pos": 681}, {"type": "A", "before": null, "after": "(3:13)", "start_char_pos": 733, "end_char_pos": 733}, {"type": "A", "before": null, "after": "(3:55)", "start_char_pos": 798, "end_char_pos": 798}, {"type": "A", "before": null, "after": "(4:57)", "start_char_pos": 837, "end_char_pos": 837}, {"type": "A", "before": null, "after": "(5:33)", "start_char_pos": 889, "end_char_pos": 889}, {"type": "A", "before": null, "after": "(6:30)", "start_char_pos": 933, "end_char_pos": 933}, {"type": "A", "before": null, "after": "(7:10)", "start_char_pos": 975, "end_char_pos": 975}, {"type": "A", "before": null, "after": "(8:09)", "start_char_pos": 999, "end_char_pos": 999}, {"type": "R", "before": "Wikinews audio Category:Audio Wikinews News Briefs Category:Brief Categor", "after": "Brief Category:April 23, 2010 Category:No publis", "start_char_pos": 1140, "end_char_pos": 1213}], "sents_char_pos": [0, 106, 234, 430, 622, 1008, 1129]}
+{"doc_id": "17785", "revision_depth": "1", "before_revision": "Icelandair will be facing hard competition from BA The airline British Airways have reported that they will start flying between Iceland and Gatwick airport, London. British Airways said they will provide the service five times a week; the first flight is scheduled March 26, 2006. Until now, only two airlines have been flying between the UK and Iceland with passengers: Icelandair, the oldest and biggest airline in Iceland, and Iceland Express, a recent low-fare airline and the competition between them has been fierce . BA to fly to Iceland Icelandair's PR, Gu\u00f0j\u00f3n Arngr\u00edmsson, said that Icelandair welcomes the competition and believes Icelandair can compete with BA: \"This markethas been growing rapidly. Iceland has been well marketed in London and Britain as a whole so number of passenger has been rising fast. We're always ready for morecompetition on every route between Iceland and other countries. We're ready and willing to compete here as we are on other routes\" Arngr\u00edmsson said.%DIFDELCMD < %DIFDELCMD < %%% Birgir J\u00f3nsson at Iceland Express agrees. \"Iceland Express welcomes the competition without a doubt.\" He then added, \"The competition will benefit us all\" . Iceland Express, low fare airline, ready to take on BA British Airways have reported the tickets will cost about \u20ac291.", "after_revision": " I-Holding ehf, a Icelandic investment company owned by Baugur Group, Straumur investment bank, B2B Holdings and Birgis Bieltvedts, has bought 80\\% in Illum warehouse in Denmark from Merrill Lynch International Global Principal Investment. The same group recently bought Wessel Vett A/S and Magasin du Nord, so it already owned 20\\% in Illum. Illum will be run separately from Magasin du Nord. Illum reported a profit and 11\\% gain in sales the first 3 months of 2005. Skarph\u00e9\u00f0ni Berg Steinarssyni from Nordic Investment at Baugur Group said the danish retail market is increasing and they believe in Illum because it's a well known brand in Denmark. Icelanders invest in Denmark and UK Icelandic companies have been investing heavily in Denmark for the last few years. Recently the Fons Investment ehf. bought the Danish airlines Sterling Air and Mearsk Air. Eimskip, a shipping company in Iceland, recently bought the shipping division of Mearsk. I-Holdings have been investing heavily in the Denish retailer market . %DIFDELCMD < %DIFDELCMD < %%% Baugur Group, as well as FL Group, have been investing in the UK market . FL Group has bought 11\\% in easyJet.com and has shown an interest in buying more. Baugur Group has been investing in the retailer market and has bought among other things Iceland supermarket chain as well as Hamleys, a well known toy store.", "edit_actions": [{"type": "D", "before": "Icelandair will be facing hard competition from BA", "after": null, "start_char_pos": 0, "end_char_pos": 50}, {"type": "R", "before": "The airline British Airways have reported that they will start flying between Iceland and Gatwick airport, London. British Airways said they will provide the service five times a week; the first flight is scheduled March 26, 2006.", "after": "I-Holding ehf, a Icelandic investment company owned by Baugur Group, Straumur investment bank, B2B Holdings and Birgis Bieltvedts, has bought 80\\% in Illum warehouse in Denmark from Merrill Lynch International Global Principal Investment. The same group recently bought Wessel", "start_char_pos": 51, "end_char_pos": 281}, {"type": "A", "before": null, "after": "Vett A/S and Magasin du Nord, so it already owned 20\\% in Illum.", "start_char_pos": 282, "end_char_pos": 282}, {"type": "R", "before": "Until now, only two airlines have been flying between the UK and Iceland with passengers: Icelandair, the oldest and biggest airline", "after": "Illum will be run separately from Magasin du Nord.", "start_char_pos": 283, "end_char_pos": 415}, {"type": "A", "before": null, "after": "Illum reported a profit and 11\\% gain in sales the first 3 months of 2005.", "start_char_pos": 416, "end_char_pos": 416}, {"type": "A", "before": null, "after": "Skarph\u00e9\u00f0ni Berg Steinarssyni from Nordic Investment at Baugur Group said the danish retail market is increasing and they believe in Illum because it's a well known brand in Denmark.", "start_char_pos": 417, "end_char_pos": 417}, {"type": "A", "before": null, "after": "Icelanders invest in Denmark and UK", "start_char_pos": 418, "end_char_pos": 418}, {"type": "A", "before": null, "after": "Icelandic companies have been investing heavily in Denmark for the last few years. Recently the Fons Investment ehf. bought the Danish airlines Sterling Air and Mearsk Air. Eimskip, a shipping company", "start_char_pos": 419, "end_char_pos": 419}, {"type": "R", "before": "and Iceland Express, a recent low-fare airline and the competition between them has been fierce", "after": "recently bought the shipping division of Mearsk. I-Holdings have been investing heavily in the Denish retailer market", "start_char_pos": 432, "end_char_pos": 527}, {"type": "D", "before": "BA to fly to Iceland", "after": null, "start_char_pos": 530, "end_char_pos": 550}, {"type": "D", "before": "Icelandair's PR, Gu\u00f0j\u00f3n Arngr\u00edmsson, said that Icelandair welcomes the competition and believes Icelandair can compete with BA: \"This markethas been growing rapidly. Iceland has been well marketed in London and Britain as a whole so number of passenger has been rising fast. We're always ready for morecompetition on every route between Iceland and other countries. We're ready and willing to compete here as we are on other routes\" Arngr\u00edmsson said.", "after": null, "start_char_pos": 551, "end_char_pos": 1001}, {"type": "R", "before": "Birgir J\u00f3nsson at Iceland Express agrees. \"Iceland Express welcomes the competition without a doubt.\" He then added, \"The competition will benefit us all\"", "after": "Baugur Group, as well as FL Group, have been investing in the UK market", "start_char_pos": 1031, "end_char_pos": 1185}, {"type": "D", "before": "Iceland Express, low fare airline, ready to take on BA", "after": null, "start_char_pos": 1188, "end_char_pos": 1242}, {"type": "R", "before": "British Airways have reported the tickets will cost about \u20ac291.", "after": "FL Group has bought 11\\% in easyJet.com and has shown an interest in buying more. Baugur Group has been investing in the retailer market and has bought among other things Iceland supermarket chain as well as Hamleys, a well known toy store.", "start_char_pos": 1243, "end_char_pos": 1306}], "sents_char_pos": [0, 165, 235, 281, 716, 825, 916, 1001, 1072, 1132, 1187]}
+{"doc_id": "178390", "revision_depth": "1", "before_revision": "Alfred Hitchcock. 200px| James Stewart and Kim Novak in Hitchcock's Vertigo (1958). At least nine of Alfred Hitchcock 's rare silent films, made at the beginning of his career, will be staged in 2012 in many public screenings, The Independent has reported. Robin Baker, the British Film Institute's head curator, calls Hitchcock's silent movie The Mountain Eagle the \"holy grail\" of lost British films. \"It was made in 1926 and was his last silent film featuring a sexually vulnerable young woman and a case of miscarriage of justice,\" he said to The Independent . Three of Hitchcock's restored silent films are The Pleasure Garden (1925), The Lodger (1927) and The Farmer's Wife (1928). Hitchcock was born in Leytonstone, London , United Kingdom on August 13, 1899. He described his childhood as being very lonely and sheltered, a situation aggravated by his obesity. His father died when he was 14. After he graduated, he became intrigued by photography and started working in film production in London on a branch of what would become Paramount Pictures. After a successful career with silent movies and the early talkie ones in the United Kingdom, in March 1939, David O. Selznick signed Hitchcock onto a seven-year contract beginning in March 1939 as the Hitchcock family was moving to Hollywood , United States. He was nominated for five Academy Awards as a best director but never took home the prize, and one of his most succesful movies during his Hollywood stay was the 1958 film Vertigo, featuring James Stewart and Kim Novak . Hitchcock became a United States citizen in 1956 while retaining his British citizenship. Hitchcock's last successful production was the 1972 film Frenzy . The 1976 film Family Plot was his last film. Hitchcock died from kidney failure in his home at Bel Air , Los Angeles, California, at 80. His body was cremated and his ashes were thrown in the Pacific Ocean.", "after_revision": "Alfred Hitchcock. 200px| and in Hitchcock's (1958). At least nine of 's rare silent films, made at the beginning of his career, will be staged in 2012 in many public screenings, has reported. Robin Baker, the British Film Institute's head curator, calls Hitchcock's silent movie the \"holy grail\" of lost British films. \"It was made in 1926 and was his last silent film featuring a sexually vulnerable young woman and a case of miscarriage of justice,\" he said to . Three of Hitchcock's restored silent films are (1925), (1927) and (1928). Hitchcock was born in , , United Kingdom on August 13, 1899. He described his childhood as being very lonely and sheltered, a situation aggravated by his obesity. His father died when he was 14. After he graduated, he became intrigued by photography and started working in film production in London on a branch of what would become Paramount Pictures. After a successful career with silent movies and the early talkie ones in the United Kingdom, in March 1939, David O. Selznick signed Hitchcock onto a seven-year contract beginning in March 1939 as the Hitchcock family was moving to , United States. He was nominated for five Academy Awards as a best director but never took home the prize, and one of his most succesful movies during his Hollywood stay was the 1958 film , featuring and . Hitchcock became a United States citizen in 1956 while retaining his British citizenship. Hitchcock's last successful production was the 1972 film . The 1976 film was his last film. Hitchcock died from in his home at , Los Angeles, California, at 80. His body was cremated and his ashes were thrown in the Pacific Ocean.", "edit_actions": [{"type": "R", "before": "James Stewart and Kim Novak", "after": "and", "start_char_pos": 25, "end_char_pos": 52}, {"type": "D", "before": "Vertigo", "after": null, "start_char_pos": 68, "end_char_pos": 75}, {"type": "D", "before": "Alfred Hitchcock", "after": null, "start_char_pos": 101, "end_char_pos": 117}, {"type": "D", "before": "The Independent", "after": null, "start_char_pos": 227, "end_char_pos": 242}, {"type": "D", "before": "The Mountain Eagle", "after": null, "start_char_pos": 344, "end_char_pos": 362}, {"type": "D", "before": "The Independent", "after": null, "start_char_pos": 547, "end_char_pos": 562}, {"type": "D", "before": "The Pleasure Garden", "after": null, "start_char_pos": 612, "end_char_pos": 631}, {"type": "D", "before": "The Lodger", "after": null, "start_char_pos": 640, "end_char_pos": 650}, {"type": "D", "before": "The Farmer's Wife", "after": null, "start_char_pos": 662, "end_char_pos": 679}, {"type": "D", "before": "Leytonstone, London", "after": null, "start_char_pos": 710, "end_char_pos": 729}, {"type": "A", "before": null, "after": ",", "start_char_pos": 732, "end_char_pos": 732}, {"type": "D", "before": "Hollywood", "after": null, "start_char_pos": 1292, "end_char_pos": 1301}, {"type": "R", "before": "Vertigo, featuring James Stewart and Kim Novak", "after": ", featuring and", "start_char_pos": 1491, "end_char_pos": 1537}, {"type": "D", "before": "Frenzy", "after": null, "start_char_pos": 1687, "end_char_pos": 1693}, {"type": "D", "before": "Family Plot", "after": null, "start_char_pos": 1710, "end_char_pos": 1721}, {"type": "D", "before": "kidney failure", "after": null, "start_char_pos": 1761, "end_char_pos": 1775}, {"type": "D", "before": "Bel Air", "after": null, "start_char_pos": 1791, "end_char_pos": 1798}], "sents_char_pos": [0, 17, 83, 256, 402, 564, 687, 767, 869, 901, 1058, 1318, 1539, 1629, 1695, 1740, 1832]}
+{"doc_id": "178631", "revision_depth": "1", "before_revision": "Noted for his controversial attempts to foster peace deals with the Taliban, Pakistani NGO leader Khalid Khawaja was killed early today morning, a week after being kidnapped in the Federally Administered Tribal Areas while helping a British filmmaker. He was shot twice, in the head and chest, and his body was dumped near Miran Shah . A former member of the Pakistani ISI and associate of Osama bin Laden , Khawaja fought against the Soviet invasion of Afghanistan , and was an outspoken critic of the American-led invasion . The leader of the Defence of Human Rights NGO, Khawaja was often accused of being an apologist for Islamist militants due to his stringent demands for better treatment and legal rights for prisoners captured by both the American and Pakistani forces. Khawaja had travelled into North Waziristan along with former ISI colleague Colonel Imam , to help British cameraman Ased Qureshi meet with Sirajuddin Haqqani and Wali-ur-Rehman as he sought to film a documentary about the rise of Islamic militancy in the region. The three were kidnapped, and their captors demanded the release of ten imprisoned militants, including Mullah Baradar , Mullah Mansoor Dadullah and Maulvi Kabir, as well as $10 million for the release of the two former ISI officers. Pakistani officials anonymously confirmed the money would likely be paid, but the insurgent leaders were unlikely to be released. Khawaja had most recently landed on the legal defence team of five Americans arrested by Pakistan who were accused of membership in Jaish-e-Mohammed . Immediate reports suggest that a note was pinned to his body, claiming responsibility for his death in the name of the Asian Tigers which some have ironically theorised could be a splinter group of the militant organisation. The note also accused him of spying for the United States, and having taken the government's side in the 2007 Siege of Lal Masjid . The note blamed the government for refusing to negotiate on the desired release of the jailed Pakistani militants. Unrelated to the death of Khawaja, and intending to honour the memory of those \"who embraced martyrdom in the continuing war on terror\", the Pakistani government announced they were declaring April 30 Yaum e Shuhada, or \"Day of the Martyrs\". Khawaja's son Omar told the New York Times that his father \"was fond of martyrdom [...] and now he is lucky because he has it\".", "after_revision": "Noted for his controversial attempts to foster peace deals with the , Pakistani leader was killed early today morning, a week after being kidnapped in the while helping a British filmmaker. He was shot twice, in the head and chest, and his body was dumped near . A former member of the Pakistani and associate of , Khawaja fought against the , and was an outspoken critic of the . The leader of the Defence of Human Rights NGO, Khawaja was often accused of being an apologist for Islamist militants due to his stringent demands for better treatment and legal rights for prisoners captured by both the American and Pakistani forces. Khawaja had travelled into along with former ISI colleague , to help British cameraman Ased Qureshi meet with and as he sought to film a documentary about the rise of Islamic militancy in the region. The three were kidnapped, and their captors demanded the release of ten imprisoned militants, including , Mullah Mansoor Dadullah and Maulvi Kabir, as well as $10 million for the release of the two former ISI officers. Pakistani officials anonymously confirmed the money would likely be paid, but the insurgent leaders were unlikely to be released. Khawaja had most recently landed on the legal defence team of who were accused of membership in . Immediate reports suggest that a note was pinned to his body, claiming responsibility for his death in the name of the Asian Tigers which some have ironically theorised could be a splinter group of the militant organisation. The note also accused him of spying for the United States, and having taken the government's side in the 2007 . The note blamed the government for refusing to negotiate on the desired release of the jailed Pakistani militants. Unrelated to the death of Khawaja, and intending to honour the memory of those \"who embraced martyrdom in the continuing war on terror\", the Pakistani government announced they were declaring April 30 Yaum e Shuhada, or \"Day of the Martyrs\". Khawaja's son Omar told the that his father \"was fond of martyrdom [...] and now he is lucky because he has it\".", "edit_actions": [{"type": "R", "before": "Taliban, Pakistani NGO leader Khalid Khawaja", "after": ", Pakistani leader", "start_char_pos": 68, "end_char_pos": 112}, {"type": "D", "before": "Federally Administered Tribal Areas", "after": null, "start_char_pos": 181, "end_char_pos": 216}, {"type": "D", "before": "Miran Shah", "after": null, "start_char_pos": 323, "end_char_pos": 333}, {"type": "D", "before": "ISI", "after": null, "start_char_pos": 369, "end_char_pos": 372}, {"type": "D", "before": "Osama bin Laden", "after": null, "start_char_pos": 390, "end_char_pos": 405}, {"type": "D", "before": "Soviet invasion of Afghanistan", "after": null, "start_char_pos": 435, "end_char_pos": 465}, {"type": "D", "before": "American-led invasion", "after": null, "start_char_pos": 503, "end_char_pos": 524}, {"type": "D", "before": "North Waziristan", "after": null, "start_char_pos": 805, "end_char_pos": 821}, {"type": "D", "before": "Colonel Imam", "after": null, "start_char_pos": 854, "end_char_pos": 866}, {"type": "R", "before": "Sirajuddin Haqqani and Wali-ur-Rehman", "after": "and", "start_char_pos": 918, "end_char_pos": 955}, {"type": "D", "before": "Mullah Baradar", "after": null, "start_char_pos": 1146, "end_char_pos": 1160}, {"type": "D", "before": "five Americans arrested by Pakistan", "after": null, "start_char_pos": 1468, "end_char_pos": 1503}, {"type": "D", "before": "Jaish-e-Mohammed", "after": null, "start_char_pos": 1538, "end_char_pos": 1554}, {"type": "D", "before": "Siege of Lal Masjid", "after": null, "start_char_pos": 1892, "end_char_pos": 1911}, {"type": "D", "before": "New York Times", "after": null, "start_char_pos": 2299, "end_char_pos": 2313}], "sents_char_pos": [0, 251, 526, 777, 1041, 1275, 1405, 1556, 1781, 1913, 2028, 2270]}
+{"doc_id": "183053", "revision_depth": "1", "before_revision": "Wikinews reporter Iain Macdonald has performed an interview with Dr Isabella Margara, a London-based member of the Communist Party of Greece (KKE). In the interview Margara sets out the communist response to current events in Greece as well as discussing the viability of a communist economy for the nation. She also hit back at Petros Tzomakas, a member of another Greek far-left party which criticised KKE in a previous interview. What we are experiencing today \u2013 not only in Greece, but in all capitalist countries \u2013 is a crisis of overproduction. The exploitation of the working class and the other popular strata is intensified due to the fact that the bourgeoisie has been keeping for itself larger and larger parts of the produced wealth. Behind overproduction lies the over-accumulation of capital. The average profit rate is decreased in the main sectors of the economy. This leads to destruction of part of productive forces, closing factories, inflation, mass redundancies of superfluous workers as waste \u2013 in order to permit a new process of accumulation to begin, when new sectors of the economy will secure the increase of the average profit rate. This has nothing to do with the \u2018management\u2019 of the system by social democrats or liberals; it is an inevitable outcome of capitalism. The national deficits do exist. In fact, behind the debt are the huge tax reliefs for large monopolies, the massive bank bailouts, the inconceivable NATO military expenses, the subsidies in the name of capitalist development. In Greece at the moment, there is a clear expression of the imperialist rivalries between the US and EU, between EU countries and especially between Germany and France. However, it is now becoming clearer every day that the ruling class is using the existing deficits, in Greece and in Europe, in order to promote new anti-labour policies which will secure the profits of the capital. These measures have been pre-decided a long time ago in the Maastricht Treaty and are here to stay. Their aim is not just to exit the crisis, but to ensure stability and high profits for the capital in the next phases of the economic cycle. How, given the Soviet collapse , and China being communist in name only, would your vision of a communist system have been better for the majority of citizens? That is also why the working class should not be trapped in a discussion about bonds or interest rates, the simple reason being that it has nothing to gain from this discussion. The international loans will end up in the capital\u2019s pockets, not the working class. The Greeks have suffered when the rates were down, they suffer now that the rates are up. We do not intend to share the capital's 'anxiety' about the bourse , because it is becoming clearer every day that if plutocracy does not go bankrupt, then the people will. The government is not doing anything wrong \u2013 in fact, it is doing a great job representing the interests of its bosses, the Greek capitalists, the imperialists of E.U., the I.M.F. But they want the working class partners to their crime. They are telling us that our sacrifice to live in poverty and work until we die is our patriotic duty. What they are not telling us is that the workers, the farmers, the owners of small shops; we do not have the same country as these E.U. fans of the Hellenic Federation of Enterprises , the City-educated bankers, the corporate media owners. Their country and their god is exploitation and profit. Our people have proven their patriotism in every single crucial point in history for thousands of years now. But this case is different, the working Greek man and women should not make any sacrifices for plutocracy! The only \u2018sacrifice\u2019 that should be made is to fight the dangerous fear and hesitation and organise the struggle. That\u2019s what will help our own country and our class. I have heard that people in Greece are upset that the euro has weakened Greece\u2019s economic position, as the Drachma\u2019 s low value actually encouraged spending by foreigners. What steps would a socialist government take to encourage new spending in Greece by both foreign tourists and investors? So far, the development of Greek tourism has been based on profit. Therefore, the fees for ships and other means of transport are outrageous; many islands are left with no regular connection with the mainland because these lines are not considered to be profitable. Both PASOK [ Panhellenic Socialist Movement ] and ND [ New Democracy ] governments, under the EU guidance, have implemented policies that led to rough working conditions and wages in tourism. Besides, more than 60\\% of Greeks at the moment cannot go on any holiday and after the latest measures these numbers will increase; another significant portion reduces the time off work, and a third one relies on the hospitality of friends and family for their holidays, due to their low income. How would you respond to allegations that the recent protest from the Acropolis was not appropriate for a historic monument? Those who accuse us of \u2018blasphemy\u2019 are those who have been shamelessly privatising most historic and archaeological monuments in Greece during the last decades. In 1992, Coca Cola used the Acropolis for a commercial, where the monument was built on bottles instead of columns! Samsung recently filmed its own commercial, let alone the various fashion shows that take place there. They have been selling out our beaches and forests to touristic monopolies and have been offering the monuments in order to promote commercial products \u2013 and that is not considered to be inappropriate. They accuse us of undermining tourism \u2013 in fact all visitors had free entry to Acropolis on that day! How would you respond to the criticisms levelled by Petros Tzomakas of Xekinima, who denounced the KKE's lack of co-operation with SYRIZA [ Coalition of the Radical Left ] in a recent interview? SYRIZA, being consistently pro-E.U. (it has voted for the Maastricht treaty after all), prefers the implementation of the same measures by the E.U. rather than the IMF and fights for different versions of the \u2018Stability Pact\u2019 . As if the E.U. is the good cop and the IMF the bad one. We say: this is a fake dilemma; there is no good or bad imperialism. All of them are good for serving their own monopolies, their own fat cats. The bottom line is that there is increasing antagonism between the different imperialist centres and the Greek government is trying to play the game with all of them. KKE has warned that this leads to our even deeper involvement in the inter-imperialist rivalries, and this can be a very dangerous path. They all agree 100\\% on the measures taken by the government and they ask for more blood now. Contrary to the party of Syriza, we do not plan to choose our assassin or negotiate the terms of the assassination with any of them. It is also important to notice that for years now, in the trade union movement and during the latest strikes and rallies, SYRIZA has been following the compromised leaderships of GSEE [ w:General Confederation of Greek Workers ] and ADEDY (the Greek TUC in the private and public sector respectively, controlled by PASOK) who originally boycotted the strikes, went on strike breaking and then dragged them in unwillingly under public pressure, in order to minimise the damage to the government.", "after_revision": "Wikinews reporter Iain Macdonald has performed an interview with Dr Isabella Margara, a London-based member of the (KKE). In the interview Margara sets out the communist response to current events in Greece as well as discussing the viability of a communist economy for the nation. She also hit back at Petros Tzomakas, a member of another Greek far-left party which criticised KKE in a previous interview. What we are experiencing today \u2013 not only in Greece, but in all capitalist countries \u2013 is a crisis of overproduction. The exploitation of the working class and the other popular is intensified due to the fact that the bourgeoisie has been keeping for itself larger and larger parts of the produced wealth. Behind overproduction lies the over-accumulation of capital. The average profit rate is decreased in the main sectors of the economy. This leads to destruction of part of productive forces, closing factories, inflation, mass redundancies of superfluous workers as waste \u2013 in order to permit a new process of accumulation to begin, when new sectors of the economy will secure the increase of the average profit rate. This has nothing to do with the \u2018management\u2019 of the system by social democrats or liberals; it is an inevitable outcome of capitalism. The national deficits do exist. In fact, behind the debt are the huge tax reliefs for large monopolies, the massive bank bailouts, the inconceivable NATO military expenses, the subsidies in the name of capitalist development. In Greece at the moment, there is a clear expression of the imperialist rivalries between the US and EU, between EU countries and especially between Germany and France. However, it is now becoming clearer every day that the ruling class is using the existing deficits, in Greece and in Europe, in order to promote new anti-labour policies which will secure the profits of the capital. These measures have been pre-decided a long time ago in the and are here to stay. Their aim is not just to exit the crisis, but to ensure stability and high profits for the capital in the next phases of the economic cycle. How, given the , and China being communist in name only, would your vision of a communist system have been better for the majority of citizens? That is also why the working class should not be trapped in a discussion about bonds or interest rates, the simple reason being that it has nothing to gain from this discussion. The international loans will end up in the capital\u2019s pockets, not the working class. The Greeks have suffered when the rates were down, they suffer now that the rates are up. We do not intend to share the capital's 'anxiety' about the , because it is becoming clearer every day that if does not go bankrupt, then the people will. The government is not doing anything wrong \u2013 in fact, it is doing a great job representing the interests of its bosses, the Greek capitalists, the imperialists of E.U., the I.M.F. But they want the working class partners to their crime. They are telling us that our sacrifice to live in poverty and work until we die is our patriotic duty. What they are not telling us is that the workers, the farmers, the owners of small shops; we do not have the same country as these E.U. fans of the , the City-educated bankers, the corporate media owners. Their country and their god is exploitation and profit. Our people have proven their patriotism in every single crucial point in history for thousands of years now. But this case is different, the working Greek man and women should not make any sacrifices for plutocracy! The only \u2018sacrifice\u2019 that should be made is to fight the dangerous fear and hesitation and organise the struggle. That\u2019s what will help our own country and our class. I have heard that people in Greece are upset that the euro has weakened Greece\u2019s economic position, as the w|Drachma ' s low value actually encouraged spending by foreigners. What steps would a socialist government take to encourage new spending in Greece by both foreign tourists and investors? So far, the development of Greek tourism has been based on profit. Therefore, the fees for ships and other means of transport are outrageous; many islands are left with no regular connection with the mainland because these lines are not considered to be profitable. Both PASOK [ ] and ND [ ] governments, under the EU guidance, have implemented policies that led to rough working conditions and wages in tourism. Besides, more than 60\\% of Greeks at the moment cannot go on any holiday and after the latest measures these numbers will increase; another significant portion reduces the time off work, and a third one relies on the hospitality of friends and family for their holidays, due to their low income. How would you respond to allegations that the recent protest from the was not appropriate for a historic monument? Those who accuse us of \u2018blasphemy\u2019 are those who have been shamelessly privatising most historic and archaeological monuments in Greece during the last decades. In 1992, used the Acropolis for a commercial, where the monument was built on bottles instead of columns! recently filmed its own commercial, let alone the various fashion shows that take place there. They have been selling out our beaches and forests to touristic monopolies and have been offering the monuments in order to promote commercial products \u2013 and that is not considered to be inappropriate. They accuse us of undermining tourism \u2013 in fact all visitors had free entry to Acropolis on that day! How would you respond to the criticisms levelled by Petros Tzomakas of Xekinima, who denounced the KKE's lack of co-operation with SYRIZA [ ] in a recent interview? SYRIZA, being consistently pro-E.U. (it has voted for the Maastricht treaty after all), prefers the implementation of the same measures by the E.U. rather than the IMF and fights for different versions of the '' . As if the E.U. is the good cop and the IMF the bad one. We say: this is a fake dilemma; there is no good or bad imperialism. All of them are good for serving their own monopolies, their own fat cats. The bottom line is that there is increasing antagonism between the different imperialist centres and the Greek government is trying to play the game with all of them. KKE has warned that this leads to our even deeper involvement in the inter-imperialist rivalries, and this can be a very dangerous path. They all agree 100\\% on the measures taken by the government and they ask for more blood now. Contrary to the party of Syriza, we do not plan to choose our assassin or negotiate the terms of the assassination with any of them. It is also important to notice that for years now, in the trade union movement and during the latest strikes and rallies, SYRIZA has been following the compromised leaderships of GSEE [ ] and ADEDY (the Greek in the private and public sector respectively, controlled by PASOK) who originally boycotted the strikes, went on strike breaking and then dragged them in unwillingly under public pressure, in order to minimise the damage to the government.", "edit_actions": [{"type": "D", "before": "Communist Party of Greece", "after": null, "start_char_pos": 115, "end_char_pos": 140}, {"type": "D", "before": "strata", "after": null, "start_char_pos": 611, "end_char_pos": 617}, {"type": "D", "before": "Maastricht Treaty", "after": null, "start_char_pos": 1968, "end_char_pos": 1985}, {"type": "D", "before": "Soviet collapse", "after": null, "start_char_pos": 2164, "end_char_pos": 2179}, {"type": "D", "before": "bourse", "after": null, "start_char_pos": 2722, "end_char_pos": 2728}, {"type": "D", "before": "plutocracy", "after": null, "start_char_pos": 2780, "end_char_pos": 2790}, {"type": "D", "before": "Hellenic Federation of Enterprises", "after": null, "start_char_pos": 3323, "end_char_pos": 3357}, {"type": "R", "before": "Drachma\u2019", "after": "w|Drachma", "start_char_pos": 3961, "end_char_pos": 3969}, {"type": "A", "before": null, "after": "'", "start_char_pos": 3970, "end_char_pos": 3970}, {"type": "D", "before": "Panhellenic Socialist Movement", "after": null, "start_char_pos": 4427, "end_char_pos": 4457}, {"type": "D", "before": "New Democracy", "after": null, "start_char_pos": 4469, "end_char_pos": 4482}, {"type": "D", "before": "Acropolis", "after": null, "start_char_pos": 4972, "end_char_pos": 4981}, {"type": "D", "before": "Coca Cola", "after": null, "start_char_pos": 5197, "end_char_pos": 5206}, {"type": "D", "before": "Samsung", "after": null, "start_char_pos": 5304, "end_char_pos": 5311}, {"type": "D", "before": "Coalition of the Radical Left", "after": null, "start_char_pos": 5851, "end_char_pos": 5880}, {"type": "R", "before": "\u2018Stability Pact\u2019", "after": "''", "start_char_pos": 6115, "end_char_pos": 6131}, {"type": "D", "before": "w:General Confederation of Greek Workers", "after": null, "start_char_pos": 7051, "end_char_pos": 7091}, {"type": "D", "before": "TUC", "after": null, "start_char_pos": 7115, "end_char_pos": 7118}], "sents_char_pos": [0, 147, 307, 432, 550, 745, 806, 879, 1161, 1253, 1296, 1328, 1522, 1691, 1907, 2007, 2148, 2308, 2486, 2571, 2661, 2834, 3071, 3174, 3264, 3414, 3470, 3579, 3686, 3800, 3853, 4026, 4147, 4214, 4289, 4413, 4605, 4737, 4901, 5026, 5187, 5303, 5406, 5608, 5710, 5905, 6133, 6189, 6221, 6258, 6333, 6500, 6637, 6731, 6864]}
+{"doc_id": "183368", "revision_depth": "1", "before_revision": "250px|Students of Colegio Preciosa Sangre playing gymkhana . At Colegio Preciosa Sangre, Pichilemu celebration started at 8:30 AM local time (1230 UTC). Students, grouped by grade, shared a cup of milk and sandwiches. Competitions and games were originally planned to take place in the school's yard, but due to adverse weather, these were moved to an old, large room. The school was split into two teams, Roja (red) and Verde (green). The event was organized by Nicole Grez, Carol Pi\u00f1a, and Paola Sep\u00falveda, amidst others, and the judges included Ang\u00e9lica Miranda and Mother Loreto Fuentes. The first of the activities was the performance of a Pichileminian metal band, that covered Metallica 's songs. Subsequently, started the games. The first one consisted of the imitation of a well-known musical artist. The Roja alliance prepared the imitation of R\u00e1faga 's Luna Luna. The Verde alliance performed a sketch with Right Said Fred's I'm Too Sexy . Both alliances gained points for this activity. The next activity in the morning was gymkhana , that consisted if three steps for students from first to eight grades of Basic Education: Put a thread through a needle. Eat a pear while playing with a basketball ball. Pump up and burst an inflatable globe. Subsequently, some girls from the Cheer-leading team performed a dance with some teachers from the school. Later, a game of the 3-legs jump took place. It mainly consisted of: samples of well-known songs were played, when they stopped, the pairs had to jump until they reached the microphone, and sing the rest of the song. Three groups of four grades were formed, as in the gymkhana game. Each group had to listen 3 songs. Am\u00e9rico in October 2009 Results 1st to 4th Grade (Basic) Mazap\u00e1n - Una Cuncuna Amarilla : Draw Am\u00e9rico - Que Levante La Mano : Verde team won Shakira - Loba : Verde team won 5th to 8th Grade (Basic) Mazap\u00e1n - Caballito Blanco : Rojo team won Sin Bandera - Suelta Mi Mano : Rojo team won DJ M\u00e9ndez feat. Crossfire - Lady : Rojo team won 1st to 4th Grade (High) Los Jaivas - Mira Ni\u00f1ita : Rojo team won Shakira - Waka Waka (Esto es \u00c1frica) : Draw Wisin Yandel - La Minifalda : Draw The last game was tugar tugar, which consisted of dancing known songs, including The Rickrollerz's Never Gonna Give You Up, Cosculluela 's Prrum, Michael Jackson's Billie Jean, Am\u00e9rico's Te Vas and Chilean cuecas . After some time, the jury took out some pairs. There were six pairs, with a student from each grade. As the game came to a close, only two pairs remained. Finally, the game was won by the verde team. Student's Day in other parts of Chile Los \u00c1ngeles Main street of Los \u00c1ngeles . The Student's Day was celebrated on Wednesday, the 12th in Los \u00c1ngeles . The teachers congratulated the students and at once, they enjoyed activities that included artistic acts, deportive activities and certainly, free food, depending on the scholar journey. In the Jos\u00e9 Manso de Velasco School, one of the teachers disguised as Am\u00e9rico , and revolutionized the students. In the Liceo Comercial, they elected a Queen. The most popular took place in Sternenkinder, a special school, locally known as NEE (Necesidad Educativa Especial), that enjoyed an event prepared by a local discotheque. Valdivia In Valdivia , the Education Seremi (boss) of the Los R\u00edos Region , Carlos Crot, visited the students of Instituto Superior de Administraci\u00f3n y Turismo (INSAT) while they were celebrating their day, on Wednesday, congratulating all the students of the region. The event took place in a room of the establishment. Crot was the Principal of the Institute until just some weeks ago, when he had to leave to become Seremi. Parral Location of Parral in the Maule Region . The Student's Day was celebrated on Thursday 13, in Parral . The Mayor of the city, Israel Urrutia Escobar, managed to take a Savory and Chocapic (both part of Nestle ) tent to Parral. Savory's ice cream were given for free to people that could get in front of the Municipality building. The activity had been repeated in other communes affected by the February 27 earthquake . Some of them are: Talcahuano, Coronel, Chill\u00e1n, Talca, Constituci\u00f3n , and some other minor towns. More than five thousand ice creams were given. \"I appreciate the companies that have came along to our call. This activity excites us and entertains not just the childs, but their parents. Today is the Student's day and we wanted to celebrate it properly [...],\" said Israel Urrutia. Punta Arenas The Student's Day was celebrated on Thursday 13 here, too. In many educational establishments of the city, activities were performed to celebrate this day. In Instituto Superior de Comercio, the students enjoyed a dance-t\u00f3n (bailet\u00f3n), El Ping\u00fcino reported. The Clerk of the Municipality of Punta Arenas , Orlando Estef\u00f3, congratulated the students, \"by making history every day by day, as the main actors in the educational process.\"", "after_revision": "250px|Students of Colegio Preciosa Sangre playing . At Colegio Preciosa Sangre, Pichilemu celebration started at 8:30 AM local time (1230 UTC). Students, grouped by grade, shared a cup of milk and sandwiches. Competitions and games were originally planned to take place in the school's yard, but due to adverse weather, these were moved to an old, large room. The school was split into two teams, Roja (red) and Verde (green). The event was organized by Nicole Grez, Carol Pi\u00f1a, and Paola Sep\u00falveda, amidst others, and the judges included Ang\u00e9lica Miranda and Mother Loreto Fuentes. The first of the activities was the performance of a Pichileminian metal band, that covered 's songs. Subsequently, started the games. The first one consisted of the imitation of a well-known musical artist. The Roja alliance prepared the imitation of 's Luna Luna. The Verde alliance performed a sketch with 's . Both alliances gained points for this activity. The next activity in the morning was , that consisted if three steps for students from first to eight grades of Basic Education: Put a thread through a needle. Eat a pear while playing with a basketball ball. Pump up and burst an inflatable globe. Subsequently, some girls from the team performed a dance with some teachers from the school. Later, a game of the 3-legs jump took place. It mainly consisted of: samples of well-known songs were played, when they stopped, the pairs had to jump until they reached the microphone, and sing the rest of the song. Three groups of four grades were formed, as in the gymkhana game. Each group had to listen 3 songs. in October 2009 Results 1st to 4th Grade (Basic) Mazap\u00e1n - Una Cuncuna Amarilla : Draw - : Verde team won - : Verde team won 5th to 8th Grade (Basic) Mazap\u00e1n - Caballito Blanco : Rojo team won - : Rojo team won feat. Crossfire - : Rojo team won 1st to 4th Grade (High) - : Rojo team won - : Draw - La Minifalda : Draw The last game was tugar tugar, which consisted of dancing known songs, including 's , 's Prrum, 's , 's and Chilean . After some time, the jury took out some pairs. There were six pairs, with a student from each grade. As the game came to a close, only two pairs remained. Finally, the game was won by the verde team. Student's Day in other parts of Chile Los \u00c1ngeles Main street of . The Student's Day was celebrated on Wednesday, the 12th in . The teachers congratulated the students and at once, they enjoyed activities that included artistic acts, deportive activities and certainly, free food, depending on the scholar journey. In the Jos\u00e9 Manso de Velasco School, one of the teachers disguised as , and revolutionized the students. In the Liceo Comercial, they elected a Queen. The most popular took place in Sternenkinder, a special school, locally known as NEE (Necesidad Educativa Especial), that enjoyed an event prepared by a local discotheque. Valdivia In , the Education Seremi (boss) of the , Carlos Crot, visited the students of Instituto Superior de Administraci\u00f3n y Turismo (INSAT) while they were celebrating their day, on Wednesday, congratulating all the students of the region. The event took place in a room of the establishment. Crot was the Principal of the Institute until just some weeks ago, when he had to leave to become Seremi. Parral Location of in the . The Student's Day was celebrated on Thursday 13, in . The Mayor of the city, Israel Urrutia Escobar, managed to take a Savory and Chocapic (both part of ) tent to Parral. Savory's ice cream were given for free to people that could get in front of the Municipality building. The activity had been repeated in other communes affected by the . Some of them are: , , , , , and some other minor towns. More than five thousand ice creams were given. \"I appreciate the companies that have came along to our call. This activity excites us and entertains not just the childs, but their parents. Today is the Student's day and we wanted to celebrate it properly [...],\" said Israel Urrutia. Punta Arenas The Student's Day was celebrated on Thursday 13 here, too. In many educational establishments of the city, activities were performed to celebrate this day. In Instituto Superior de Comercio, the students enjoyed a dance-t\u00f3n (bailet\u00f3n), El Ping\u00fcino reported. The Clerk of the Municipality of , Orlando Estef\u00f3, congratulated the students, \"by making history every day by day, as the main actors in the educational process.\"", "edit_actions": [{"type": "D", "before": "gymkhana", "after": null, "start_char_pos": 50, "end_char_pos": 58}, {"type": "D", "before": "Metallica", "after": null, "start_char_pos": 684, "end_char_pos": 693}, {"type": "D", "before": "R\u00e1faga", "after": null, "start_char_pos": 854, "end_char_pos": 860}, {"type": "R", "before": "Right Said Fred's I'm Too Sexy", "after": "'s", "start_char_pos": 918, "end_char_pos": 948}, {"type": "D", "before": "gymkhana", "after": null, "start_char_pos": 1036, "end_char_pos": 1044}, {"type": "D", "before": "Cheer-leading", "after": null, "start_char_pos": 1290, "end_char_pos": 1303}, {"type": "D", "before": "Am\u00e9rico", "after": null, "start_char_pos": 1680, "end_char_pos": 1687}, {"type": "D", "before": "Am\u00e9rico", "after": null, "start_char_pos": 1775, "end_char_pos": 1782}, {"type": "D", "before": "Que Levante La Mano", "after": null, "start_char_pos": 1785, "end_char_pos": 1804}, {"type": "D", "before": "Shakira", "after": null, "start_char_pos": 1822, "end_char_pos": 1829}, {"type": "D", "before": "Loba", "after": null, "start_char_pos": 1832, "end_char_pos": 1836}, {"type": "D", "before": "Sin Bandera", "after": null, "start_char_pos": 1922, "end_char_pos": 1933}, {"type": "D", "before": "Suelta Mi Mano", "after": null, "start_char_pos": 1936, "end_char_pos": 1950}, {"type": "D", "before": "DJ M\u00e9ndez", "after": null, "start_char_pos": 1967, "end_char_pos": 1976}, {"type": "D", "before": "Lady", "after": null, "start_char_pos": 1995, "end_char_pos": 1999}, {"type": "D", "before": "Los Jaivas", "after": null, "start_char_pos": 2040, "end_char_pos": 2050}, {"type": "D", "before": "Mira Ni\u00f1ita", "after": null, "start_char_pos": 2053, "end_char_pos": 2064}, {"type": "D", "before": "Shakira", "after": null, "start_char_pos": 2081, "end_char_pos": 2088}, {"type": "D", "before": "Waka Waka (Esto es \u00c1frica) : Draw Wisin", "after": null, "start_char_pos": 2091, "end_char_pos": 2130}, {"type": "R", "before": "Yandel", "after": ": Draw", "start_char_pos": 2131, "end_char_pos": 2137}, {"type": "D", "before": "The Rickrollerz's Never Gonna Give You Up, Cosculluela", "after": null, "start_char_pos": 2241, "end_char_pos": 2295}, {"type": "A", "before": null, "after": ", 's", "start_char_pos": 2299, "end_char_pos": 2299}, {"type": "R", "before": "Michael Jackson's Billie Jean, Am\u00e9rico's Te Vas and Chilean cuecas", "after": "'s , 's and Chilean", "start_char_pos": 2307, "end_char_pos": 2373}, {"type": "D", "before": "Los \u00c1ngeles", "after": null, "start_char_pos": 2641, "end_char_pos": 2652}, {"type": "D", "before": "Los \u00c1ngeles", "after": null, "start_char_pos": 2714, "end_char_pos": 2725}, {"type": "D", "before": "Am\u00e9rico", "after": null, "start_char_pos": 2985, "end_char_pos": 2992}, {"type": "D", "before": "Valdivia", "after": null, "start_char_pos": 3258, "end_char_pos": 3266}, {"type": "D", "before": "Los R\u00edos Region", "after": null, "start_char_pos": 3304, "end_char_pos": 3319}, {"type": "R", "before": "Parral in the Maule Region", "after": "in the", "start_char_pos": 3692, "end_char_pos": 3718}, {"type": "D", "before": "Parral", "after": null, "start_char_pos": 3773, "end_char_pos": 3779}, {"type": "D", "before": "Nestle", "after": null, "start_char_pos": 3881, "end_char_pos": 3887}, {"type": "D", "before": "February 27 earthquake", "after": null, "start_char_pos": 4074, "end_char_pos": 4096}, {"type": "D", "before": "Talcahuano, Coronel, Chill\u00e1n, Talca, Constituci\u00f3n", "after": null, "start_char_pos": 4117, "end_char_pos": 4166}, {"type": "A", "before": null, "after": ", , , ,", "start_char_pos": 4169, "end_char_pos": 4169}, {"type": "D", "before": "Punta Arenas", "after": null, "start_char_pos": 4786, "end_char_pos": 4798}], "sents_char_pos": [0, 60, 152, 217, 368, 435, 591, 703, 736, 809, 874, 950, 998, 1167, 1216, 1255, 1362, 1407, 1579, 1645, 1679, 1982, 2422, 2476, 2530, 2575, 2654, 2727, 2914, 3027, 3073, 3245, 3513, 3566, 3672, 3720, 3781, 3905, 4008, 4098, 4197, 4244, 4306, 4386, 4481, 4553, 4650, 4752]}
+{"doc_id": "184220", "revision_depth": "1", "before_revision": "England have defeated Australia in the final of the 2010 Twenty20 Cricket World Cup to win the tournament. England won by 7 wickets at the Kensington Oval, Bridgetown , Barbados to lift the World Cup. A 111 run partnership between Craig Kieswetter , the man of the match and Kevin Pietersen , the man of the tournament, helped them in chasing down the target of 148 runs set by Australia. England won the toss and opted to field . Australia scored 147 runs, losing 6 wickets in their twenty overs. David Hussey was the top scorer, getting 59 runs. Australia scored only 47 runs for 4 wickets in their first ten overs. David Hussey and Cameron White added 22 runs in the thirteenth over, thus helping their team to get to 147 for 6 in their innings. For England, Ryan Sidebottom took two wickets for 26 runs in four overs. Early in England's innings, Dirk Nannes of Australia took the wicket of Michael Lumb of England, when the latter was caught by David Hussey at mid-wicket. Kevin Pietersen of England came when Lumb got out, and helped England to reach 44 runs in the six powerplay overs. The partnership between Pietersen and Kieswetter helped their team to reach the target of 148 runs in seventeen overs, with three overs in hand. England captain Paul Collingwood told the media that he thought \"belief ha[d] been the key.\" \"As soon as we got the squad together, seeing how much power we have in the squad, I know that is all on paper but we could tell that we had a lot of potential,\" he commented. For England, this is the first victory in a limited overs championship as they had never won a single one-day or T20 World Cup or the Championship League tournament till this victory. In this connection, all-rounder Collingwood said: \"[t]his is right up there, with the best,\" adding \"[t]o be the first [England] team to win a 'World Cup' is very special. We knew it was a monkey on our back .\" Meanwhile, Australian captain Michael Clarke admitted his disappointment at the result. He conceded that his performance was poor, saying, \"There's no doubt the selectors will need to have a look at my performances. I certainly know they haven't been up to scratch through this whole tournament and probably in Twenty20 cricket in general. I'm sure the selectors will sit down and have a look and if I'm not the right guy for No 3 and the captaincy then they'll make that decision\" Newly elected UK Prime Minister David Cameron praised the English team. \"Congratulations to Paul Collingwood and the England Twenty20 team on becoming world champions for the first time with a magnificent victory over Australia. Let's hope this marks the start of a great summer of sport for England,\" he said. The English Sports Minister Hugh Robertson commented: \"I'm absolutely delighted England have won the World Twenty20. They have played exciting and intelligent cricket and are worthy winners.\" England: Michael Lumb, Craig Kieswetter, Kevin Pietersen, Paul Collingwood, Eoin Morgan, Luke Wright, Michael Yardy, Greamme Swann, Stuart Broad, Tim Bresnan, Tim Bresnan, Ryan Sidebottom Australia: Shane Watson, David Warner, Michael Clarke, Brad Haddin, David Hussey, Cameron White, Michael Hussey, Steven Smith, Mitchell Johnson, Shaun Tait, Dirk Nannes Man of the match: Craig Kieswetter (England) Umpires: Aleem Dar (Pakistan) and Billy Doctrove (West Indies) TV Umpire: Billy Bowden (New Zealand) Match Referee: Ranjan Madugalle (Sri Lanka) Reserve Umpire: Rudi Koertzen (South Africa)", "after_revision": "have defeated in the final of the to win the tournament. England won by 7 wickets at the , , Barbados to lift the World Cup. A 111 run partnership between , the man of the match and , the man of the tournament, helped them in chasing down the target of 148 runs set by Australia. England won the toss and opted to . Australia scored 147 runs, losing 6 wickets in their twenty overs. was the top scorer, getting 59 runs. Australia scored only 47 runs for 4 wickets in their first ten overs. David Hussey and added 22 runs in the thirteenth over, thus helping their team to get to 147 for 6 in their innings. For England, Ryan Sidebottom took two wickets for 26 runs in four overs. Early in England's innings, of Australia took the wicket of of England, when the latter was caught by David Hussey at mid-wicket. of England came when Lumb got out, and helped England to reach 44 runs in the six overs. The partnership between Pietersen and Kieswetter helped their team to reach the target of 148 runs in seventeen overs, with three overs in hand. England captain told the media that he thought \"belief ha[d] been the key.\" \"As soon as we got the squad together, seeing how much power we have in the squad, I know that is all on paper but we could tell that we had a lot of potential,\" he commented. For England, this is the first victory in a as they had never won a single one-day or T20 World Cup or the tournament till this victory. In this connection, Collingwood said: \"[t]his is right up there, with the best,\" adding \"[t]o be the first [England] team to win a 'World Cup' is very special. We knew it was a .\" Meanwhile, Australian captain admitted his disappointment at the result. He conceded that his performance was poor, saying, \"There's no doubt the selectors will need to have a look at my performances. I certainly know they haven't been up to scratch through this whole tournament and probably in Twenty20 cricket in general. I'm sure the selectors will sit down and have a look and if I'm not the right guy for No 3 and the captaincy then they'll make that decision\" Newly elected UK David Cameron praised the English team. \"Congratulations to Paul Collingwood and the England Twenty20 team on becoming world champions for the first time with a magnificent victory over Australia. Let's hope this marks the start of a great summer of sport for England,\" he said. The commented: \"I'm absolutely delighted England have won the World Twenty20. They have played exciting and intelligent cricket and are worthy winners.\" England: , , , , , , , , , , , Australia: , , , , , , , , , , Man of the match: (England) Umpires: (Pakistan) and (West Indies) TV Umpire: (New Zealand) Match Referee: (Sri Lanka) Reserve Umpire: (South Africa)", "edit_actions": [{"type": "R", "before": "England have defeated Australia", "after": "have defeated", "start_char_pos": 0, "end_char_pos": 31}, {"type": "D", "before": "2010 Twenty20 Cricket World Cup", "after": null, "start_char_pos": 52, "end_char_pos": 83}, {"type": "D", "before": "Kensington Oval, Bridgetown", "after": null, "start_char_pos": 139, "end_char_pos": 166}, {"type": "A", "before": null, "after": ",", "start_char_pos": 169, "end_char_pos": 169}, {"type": "D", "before": "Craig Kieswetter", "after": null, "start_char_pos": 232, "end_char_pos": 248}, {"type": "D", "before": "Kevin Pietersen", "after": null, "start_char_pos": 276, "end_char_pos": 291}, {"type": "D", "before": "field", "after": null, "start_char_pos": 424, "end_char_pos": 429}, {"type": "D", "before": "David Hussey", "after": null, "start_char_pos": 499, "end_char_pos": 511}, {"type": "D", "before": "Cameron White", "after": null, "start_char_pos": 636, "end_char_pos": 649}, {"type": "D", "before": "Dirk Nannes", "after": null, "start_char_pos": 851, "end_char_pos": 862}, {"type": "D", "before": "Michael Lumb", "after": null, "start_char_pos": 895, "end_char_pos": 907}, {"type": "D", "before": "Kevin Pietersen", "after": null, "start_char_pos": 978, "end_char_pos": 993}, {"type": "D", "before": "powerplay", "after": null, "start_char_pos": 1076, "end_char_pos": 1085}, {"type": "D", "before": "Paul Collingwood", "after": null, "start_char_pos": 1254, "end_char_pos": 1270}, {"type": "D", "before": "limited overs championship", "after": null, "start_char_pos": 1551, "end_char_pos": 1577}, {"type": "D", "before": "Championship League", "after": null, "start_char_pos": 1641, "end_char_pos": 1660}, {"type": "D", "before": "all-rounder", "after": null, "start_char_pos": 1711, "end_char_pos": 1722}, {"type": "D", "before": "monkey on our back", "after": null, "start_char_pos": 1880, "end_char_pos": 1898}, {"type": "D", "before": "Michael Clarke", "after": null, "start_char_pos": 1932, "end_char_pos": 1946}, {"type": "D", "before": "Prime Minister", "after": null, "start_char_pos": 2401, "end_char_pos": 2415}, {"type": "D", "before": "English Sports Minister Hugh Robertson", "after": null, "start_char_pos": 2699, "end_char_pos": 2737}, {"type": "R", "before": "Michael Lumb, Craig Kieswetter, Kevin Pietersen, Paul Collingwood, Eoin Morgan, Luke Wright, Michael Yardy, Greamme Swann, Stuart Broad, Tim Bresnan, Tim Bresnan, Ryan Sidebottom", "after": ", , , , , , , , , , ,", "start_char_pos": 2896, "end_char_pos": 3074}, {"type": "R", "before": "Shane Watson, David Warner, Michael Clarke, Brad Haddin, David Hussey, Cameron White, Michael Hussey, Steven Smith, Mitchell Johnson, Shaun Tait, Dirk Nannes", "after": ", , , , , , , , , ,", "start_char_pos": 3086, "end_char_pos": 3243}, {"type": "D", "before": "Craig Kieswetter", "after": null, "start_char_pos": 3262, "end_char_pos": 3278}, {"type": "D", "before": "Aleem Dar", "after": null, "start_char_pos": 3298, "end_char_pos": 3307}, {"type": "D", "before": "Billy Doctrove", "after": null, "start_char_pos": 3323, "end_char_pos": 3337}, {"type": "D", "before": "Billy Bowden", "after": null, "start_char_pos": 3363, "end_char_pos": 3375}, {"type": "D", "before": "Ranjan Madugalle", "after": null, "start_char_pos": 3405, "end_char_pos": 3421}, {"type": "D", "before": "Rudi Koertzen", "after": null, "start_char_pos": 3450, "end_char_pos": 3463}], "sents_char_pos": [0, 106, 201, 389, 431, 498, 548, 618, 749, 822, 977, 1092, 1237, 1330, 1506, 1690, 1862, 1989, 2117, 2241, 2455, 2612, 2694, 2811, 2886, 3085]}
+{"doc_id": "186522", "revision_depth": "1", "before_revision": "British ventriloquist Ray Alan has died at the age of 79. Alan was best known for his sketches with his puppet, Lord Charles. His death was announced by his agent. Alan died in his sleep. Alan received the majority of his fame in the 1950s and 60\u2019s appearing on several children\u2019s television shows including Tich and Quackers and also as a guest artist on the series The Good Old Days . Later in his career he worked as an entertainer on the QE2 Cruise ship. He stopped work in 2008 due to ill health. Peter Pritchard, Alan \u2019 s agent for 30 years, released a statement saying that Alan \u201c passed away very suddenly \u201d . He spoke about Alan\u2019s career saying that \u201c Technically he was regarded as Britain \u2019 s top ventriloquist. You just couldn \u2019 t see his mouth moving. He was tremendously well-liked in the business and has been in the entertainment business his whole life \u201d . Alan spoke to the BBC in 2006 speaking about his puppet. He said \u201c I'm not one of those ventriloquists who thinks he's real. When I finish my work I put it back in the tool box and I don't take it out again until the next job. \u201d", "after_revision": "British has died at the age of 79. Alan was best known for his sketches with his puppet, Lord Charles. His death was announced by his agent. Alan died in his sleep. Alan received the majority of his fame in the 1950s and 60\u2019s appearing on several children\u2019s television shows including and also as a guest artist on the series . Later in his career he worked as an entertainer on the Cruise ship. He stopped work in 2008 due to ill health. Peter Pritchard, Alan ' s agent for 30 years, released a statement saying that Alan \" passed away very suddenly \" . He spoke about Alan\u2019s career saying that \" Technically he was regarded as Britain ' s top ventriloquist. You just couldn ' t see his mouth moving. He was tremendously well-liked in the business and has been in the entertainment business his whole life \" . Alan spoke to the BBC in 2006 speaking about his puppet. He said \" I'm not one of those ventriloquists who thinks he's real. When I finish my work I put it back in the tool box and I don't take it out again until the next job. \"", "edit_actions": [{"type": "D", "before": "ventriloquist Ray Alan", "after": null, "start_char_pos": 8, "end_char_pos": 30}, {"type": "R", "before": "Tich and Quackers and", "after": "and", "start_char_pos": 308, "end_char_pos": 329}, {"type": "D", "before": "The Good Old Days", "after": null, "start_char_pos": 367, "end_char_pos": 384}, {"type": "D", "before": "QE2", "after": null, "start_char_pos": 442, "end_char_pos": 445}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 524, "end_char_pos": 525}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 586, "end_char_pos": 587}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 614, "end_char_pos": 615}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 659, "end_char_pos": 660}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 700, "end_char_pos": 701}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 739, "end_char_pos": 740}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 870, "end_char_pos": 871}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 939, "end_char_pos": 940}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1101, "end_char_pos": 1102}], "sents_char_pos": [0, 57, 125, 163, 187, 458, 501, 722, 764, 930, 998]}
+{"doc_id": "188523", "revision_depth": "1", "before_revision": "Between nine and nineteen Free Gaza Movement activists died today in international waters when Israeli Defense Force commandos boarded vessels attempting to break the Israeli blockade of Gaza . Benjamin Netanyahu gave the death toll to be at least 10. Israeli television says that 19 people were killed and 36 were wounded in the confrontation. The six vessels, called the Gaza Freedom Flotilla, were carrying 10,000 tonnes of humanitarian aid destined for the Gaza Strip , including water purifiers, prefabricated homes and medical equipment. Passengers include several European members of parliament and MPs from Germany, Belgium, Algeria and Israel. Israeli Deputy Foreign Minister Danny Ayalon said that \"the organizers are well-known for their ties with global jihad, al-Qaida and Hamas. They have a history of arms smuggling and deadly terror.\" The Israeli military had declared it would not allow the ships to reach Gaza and said the activists were a \"provocation intended to delegitimise Israel\". The Israeli Navy had been transmitting messages throughout the night ordering them to turn back, stating: \"If you ignore this order and enter the blockaded area, the Israeli navy will be forced to take all the necessary measures in order to enforce this blockade,\" and that the Gaza region was a protected military zone. Huwaida Arraf , one of the organizers, had said that the flotilla was \"fully prepared for the different scenarios\" that might arise, and organizers were hopeful that Israeli authorities would \"do what's right\" and not stop the convoy. She said, \"we fully intend to go to Gaza regardless of any intimidation of threats of violence against us,\" and that \"they are going to have to forcefully stop us.\" The pre-dawn boarding took place in international waters around 150 kilometres (90 miles) off the coast of Gaza. Footage from on the flotilla's lead vessel, the MV Mavi Marmara , and video released by the IDF, showed armed Israeli commandos boarding the ship from helicopters and fighting with activists. According to the Israel Defense Forces, the activists attacked the commandos with batons, knives and axes. Israeli Prime Minister Benjamin Netanyahu said; Secretary-General of the United Nations Ban Ki-Moon said he was \"shocked by reports of killings and injuries of people on boats carrying supplies for Gaza\" and called for \"a full investigation to determine exactly how this bloodshed took place\" and urged Israel to \"urgently provide a full explanation\". Palestinian Authority President Mahmoud Abbas' called for three days of mourning to commemorate what he called the \"massacre\" of protesters. Ismail Haniya , the Hamas leader in Gaza, has dubbed the Israeli action as \"a crime\". Turkey's prime minister describes Israeli raid as 'state terrorism' and said Israel violated international laws. Some of the ships were sailing under Turkish flags and media reports indicate that Turkish nationals are among the dead. Turkey demanded an \"urgent explanation\" from Israel and warned of \"irreparable consequences\" after the incident. Netanyahu said the raid was self defense. Turkey is withdrawing its ambassador to Israel and is calling on the U.N. Security Council to convene in an emergency session about Israel. The European Union 's foreign policy chief, Catherine Ashton , has called on Israeli authorities to launch a \"full inquiry\" into the killing. She \"reiterates the European Union's position regarding Gaza - the continued policy of closure is unacceptable and politically counterproductive.\" Germany's Foreign Minister Guido Westerwelle said he was \"deeply concerned\" and France said \"nothing can justify\" the incident. Sweden, Austria, Greece and Spain have said it was important to \"quickly establish\" what happened, and have summoned the Israeli ambassadors. Gaza flotilla clash demonstration in Belfast. The British Foreign Secretary William Hague has called on the Government of Israel to open all crossings for aid to enter Gaza and said Israel should \"address the serious concerns about the deterioration in the humanitarian and economic situation and about the effect on a generation of young Palestinians\u202a.\" Russia calls attention to the fact that the Israeli interception of a Gaza-bound international aid flotilla took place in international waters, which it said represents a gross violation of international law. European Parliament President Jerzy Buzek has urged the international Middle East mediators Russia, the United States, the United Nations and the European Union to persuade Israel to end its blockade of Gaza. Thousands of demonstrators took to the streets in Europe. In Greece and France there was clashes with police. There were protests in cities around the Ireland, UK and Italy. In the Middle East there were protests in Turkey, Lebanon and Iran. The White House said that the United States \"deeply regrets\" the loss of life and injuries and was working to understand the circumstances surrounding this \"tragedy\". The Organization of the Islamic Conference , comprising of 57 countries, described the flotilla incident as \"a serious escalation and a flagrant violation of the international law and human values.\" Irishman Dennis Halliday , a former assistant secretary general of the United Nations and the Northern Irish Nobel Peace Prize laureate, Mairead Corrigan Maguire , are aboard the only boat left in the convoy, the Irish MV Rachel Corrie vessel, named after Rachel Corrie . The vessel is now on the way to the Gaza Strip . The Irish Prime Minister Mr Cowen said he believed Israel\u2019s blockade of humanitarian assistance to Gaza was illegal under international law.", "after_revision": "Between nine and nineteen activists died today in international waters when commandos attempting to break the Israeli . gave the death toll to be at least 10. Israeli television says that 19 people were killed and 36 were wounded in the confrontation. The six vessels, called the Gaza Freedom Flotilla, were carrying 10,000 tonnes of humanitarian aid destined for the , including water purifiers, prefabricated homes and medical equipment. Passengers include several and MPs from Germany, Belgium, Algeria and Israel. Israeli Deputy Foreign Minister said that \"the organizers are well-known for their ties with global jihad, al-Qaida and Hamas. They have a history of arms smuggling and deadly terror.\" The Israeli military had declared it would not allow the ships to reach Gaza and said the activists were a \"provocation intended to delegitimise Israel\". The Israeli Navy had been transmitting messages throughout the night ordering them to turn back, stating: \"If you ignore this order and enter the blockaded area, the Israeli navy will be forced to take all the necessary measures in order to enforce this blockade,\" and that the Gaza region was a protected military zone. , one of the organizers, had said that the flotilla was \"fully prepared for the different scenarios\" that might arise, and organizers were hopeful that Israeli authorities would \"do what's right\" and not stop the convoy. She said, \"we fully intend to go to Gaza regardless of any intimidation of threats of violence against us,\" and that \"they are going to have to forcefully stop us.\" The pre-dawn boarding took place in international waters around 150 kilometres (90 miles) off the coast of Gaza. Footage from on the flotilla's lead vessel, the , and video released by the IDF, showed armed Israeli commandos boarding the ship from helicopters and fighting with activists. According to the Israel Defense Forces, the activists attacked the commandos with batons, knives and axes. Israeli Prime Minister said; of the United Nations said he was \"shocked by reports of killings and injuries of people on boats carrying supplies for Gaza\" and called for \"a full investigation to determine exactly how this bloodshed took place\" and urged Israel to \"urgently provide a full explanation\". Palestinian Authority President called for three days of mourning to commemorate what he called the \"massacre\" of protesters. , the Hamas leader in Gaza, has dubbed the Israeli action as \"a crime\". Turkey's prime minister describes Israeli raid as '' and said Israel violated international laws. Some of the ships were sailing under Turkish flags and media reports indicate that Turkish nationals are among the dead. Turkey demanded an \"urgent explanation\" from Israel and warned of \"irreparable consequences\" after the incident. Netanyahu said the raid was self defense. Turkey is withdrawing its ambassador to Israel and is calling on the U.N. Security Council to convene in an emergency session about Israel. The 's foreign policy chief, , has called on Israeli authorities to launch a \"full inquiry\" into the killing. She \"reiterates the European Union's position regarding Gaza - the continued policy of closure is unacceptable and politically counterproductive.\" Germany's Foreign Minister Guido Westerwelle said he was \"deeply concerned\" and France said \"nothing can justify\" the incident. Sweden, Austria, Greece and Spain have said it was important to \"quickly establish\" what happened, and have summoned the Israeli ambassadors. Gaza flotilla clash demonstration in Belfast. The British Foreign Secretary has called on the Government of Israel to open all crossings for aid to enter Gaza and said Israel should \"address the serious concerns about the deterioration in the humanitarian and economic situation and about the effect on a generation of young Palestinians\u202a.\" Russia calls attention to the fact that the Israeli interception of a Gaza-bound international aid flotilla took place in international waters, which it said represents a gross violation of international law. President has urged the international Middle East mediators Russia, the United States, the United Nations and the European Union to persuade Israel to end its blockade of Gaza. Thousands of demonstrators took to the streets in Europe. In Greece and France there was clashes with police. There were protests in cities around the Ireland, UK and Italy. In the Middle East there were protests in Turkey, Lebanon and Iran. The White House said that the United States \"deeply regrets\" the loss of life and injuries and was working to understand the circumstances surrounding this \"tragedy\". The , comprising of 57 countries, described the flotilla incident as \"a serious escalation and a flagrant violation of the international law and human values.\" Irishman , a former assistant secretary general of the United Nations and the Northern Irish laureate , , are aboard the only boat left in the convoy, the Irish vessel, named after . The vessel is now on the way to the . The Irish Prime Minister Mr Cowen said he believed Israel\u2019s blockade of humanitarian assistance to Gaza was illegal under international law.", "edit_actions": [{"type": "D", "before": "Free Gaza Movement", "after": null, "start_char_pos": 26, "end_char_pos": 44}, {"type": "R", "before": "Israeli Defense Force commandos boarded vessels", "after": "commandos", "start_char_pos": 95, "end_char_pos": 142}, {"type": "D", "before": "blockade of Gaza", "after": null, "start_char_pos": 175, "end_char_pos": 191}, {"type": "D", "before": "Benjamin Netanyahu", "after": null, "start_char_pos": 194, "end_char_pos": 212}, {"type": "D", "before": "Gaza Strip", "after": null, "start_char_pos": 461, "end_char_pos": 471}, {"type": "D", "before": "European members of parliament", "after": null, "start_char_pos": 571, "end_char_pos": 601}, {"type": "D", "before": "Danny Ayalon", "after": null, "start_char_pos": 685, "end_char_pos": 697}, {"type": "D", "before": "Huwaida Arraf", "after": null, "start_char_pos": 1326, "end_char_pos": 1339}, {"type": "D", "before": "MV Mavi Marmara", "after": null, "start_char_pos": 1887, "end_char_pos": 1902}, {"type": "D", "before": "Benjamin Netanyahu", "after": null, "start_char_pos": 2161, "end_char_pos": 2179}, {"type": "D", "before": "Secretary-General", "after": null, "start_char_pos": 2186, "end_char_pos": 2203}, {"type": "D", "before": "Ban Ki-Moon", "after": null, "start_char_pos": 2226, "end_char_pos": 2237}, {"type": "D", "before": "Mahmoud Abbas'", "after": null, "start_char_pos": 2522, "end_char_pos": 2536}, {"type": "D", "before": "Ismail Haniya", "after": null, "start_char_pos": 2631, "end_char_pos": 2644}, {"type": "R", "before": "'state terrorism'", "after": "''", "start_char_pos": 2767, "end_char_pos": 2784}, {"type": "D", "before": "European Union", "after": null, "start_char_pos": 3250, "end_char_pos": 3264}, {"type": "D", "before": "Catherine Ashton", "after": null, "start_char_pos": 3290, "end_char_pos": 3306}, {"type": "D", "before": "William Hague", "after": null, "start_char_pos": 3881, "end_char_pos": 3894}, {"type": "R", "before": "European Parliament President Jerzy Buzek", "after": "President", "start_char_pos": 4369, "end_char_pos": 4410}, {"type": "D", "before": "Organization of the Islamic Conference", "after": null, "start_char_pos": 4991, "end_char_pos": 5029}, {"type": "D", "before": "Dennis Halliday", "after": null, "start_char_pos": 5195, "end_char_pos": 5210}, {"type": "R", "before": "Nobel Peace Prize laureate, Mairead Corrigan Maguire", "after": "laureate", "start_char_pos": 5295, "end_char_pos": 5347}, {"type": "A", "before": null, "after": ",", "start_char_pos": 5350, "end_char_pos": 5350}, {"type": "D", "before": "MV Rachel Corrie", "after": null, "start_char_pos": 5406, "end_char_pos": 5422}, {"type": "D", "before": "Rachel Corrie", "after": null, "start_char_pos": 5443, "end_char_pos": 5456}, {"type": "D", "before": "Gaza Strip", "after": null, "start_char_pos": 5495, "end_char_pos": 5505}], "sents_char_pos": [0, 193, 251, 344, 543, 652, 792, 850, 1004, 1325, 1560, 1725, 1838, 2030, 2137, 2185, 2489, 2630, 2716, 2829, 2950, 3063, 3105, 3245, 3387, 3534, 3662, 3804, 3850, 4159, 4368, 4577, 4635, 4687, 4751, 4819, 4986, 5185, 5458, 5507]}
+{"doc_id": "189610", "revision_depth": "1", "before_revision": "In basketball, Kobe Bryant hit a three-pointer late in the fourth quarter to lift the Los Angeles Lakers to a 102\u201389 victory over the Boston Celtics in Game 1 of the 2010 NBA Finals Thursday night in Los Angeles, California. Bryant scored 30 points in the game to lead all scorers. Kobe Bryant scored 30 points in Game 1 of the 2010 NBA Finals . Bryant was backed-up by a 23-point, 14-rebound effort from Pau Gosol and 15 points from Ron Artest . For Boston, Paul Pierce had 24 points and Kevin Garnett had 16 points. The first quarter was fairly evenly matched, ending 26\u201321 in favor of the Lakers. At one point the Lakers were up 16\u201310, but Boston was able to close to within one point. Late points by Jordan Farmar and Shannon Brown built the lead to five in the final minute and the Lakers had the chance to go up by more, but Lamar Odom missed a six-foot jump-shot. In the second quarter, both team remained close until late in the quarter when the Lakers opened an 12-point lead late in the final minute. With just two tenths of a second on the clock, Boston's Rajon Rondo hit a three-pointer to bring the score to within nine: 50\u201341. This series is the 12th between the two franchises, dating back to 1959, with the Celtics leading the series 9\u20132. The Minneapolis Lakers first appeared in the Basketball Association of America -- the precursor to the NBA -- defeating the Washington Capitols 4\u20132. The next year, Minneapolis defeated Syracuse Nationals 4\u20132 in the first NBA. The Celtics first played in the NBA finals in 1957, defeating the St. Louis Hawks 4\u20133. In 1959, the Lakers and Celtics first faced each other in the Finals. The Celtics won the series 4\u20130. In 1962, the Lakers -- now in Los Angeles -- met for the second time -- this time winning 4\u20133. It was not until the eighth meeting -- in 1985 -- did the Lakers win. The best-of-seven series resumes Sunday night at Los Angeles' Staples Center .", "after_revision": "In basketball, hit a three-pointer late in the fourth quarter to lift the to a 102\u201389 victory over the in Game 1 of the Thursday night in Los Angeles, California. Bryant scored 30 points in the game to lead all scorers. scored 30 points in Game 1 of the . Bryant was backed-up by a 23-point, 14-rebound effort from and 15 points from . For Boston, had 24 points and had 16 points. The first quarter was fairly evenly matched, ending 26\u201321 in favor of the Lakers. At one point the Lakers were up 16\u201310, but Boston was able to close to within one point. Late points by and built the lead to five in the final minute and the Lakers had the chance to go up by more, but missed a six-foot jump-shot. In the second quarter, both team remained close until late in the quarter when the Lakers opened an 12-point lead late in the final minute. With just two tenths of a second on the clock, Boston's hit a three-pointer to bring the score to within nine: 50\u201341. This series is the 12th between the two franchises, dating back to 1959, with the Celtics leading the series 9\u20132. The Minneapolis Lakers first appeared in the Basketball Association of America \u2014 the precursor to the NBA \u2014 defeating the Washington Capitols 4\u20132. The next year, Minneapolis defeated Syracuse Nationals 4\u20132 in the first NBA. The Celtics first played in the NBA finals in 1957, defeating the St. Louis Hawks 4\u20133. In 1959, the Lakers and Celtics first faced each other in the Finals. The Celtics won the series 4\u20130. In 1962, the Lakers \u2014 now in Los Angeles \u2014 met for the second time \u2014 this time winning 4\u20133. It was not until the eighth meeting \u2014 in 1985 \u2014 did the Lakers win. The best-of-seven series resumes Sunday night at Los Angeles' .", "edit_actions": [{"type": "D", "before": "Kobe Bryant", "after": null, "start_char_pos": 15, "end_char_pos": 26}, {"type": "D", "before": "Los Angeles Lakers", "after": null, "start_char_pos": 86, "end_char_pos": 104}, {"type": "D", "before": "Boston Celtics", "after": null, "start_char_pos": 134, "end_char_pos": 148}, {"type": "D", "before": "2010 NBA Finals", "after": null, "start_char_pos": 166, "end_char_pos": 181}, {"type": "D", "before": "Kobe Bryant", "after": null, "start_char_pos": 282, "end_char_pos": 293}, {"type": "D", "before": "2010 NBA Finals", "after": null, "start_char_pos": 328, "end_char_pos": 343}, {"type": "D", "before": "Pau Gosol", "after": null, "start_char_pos": 405, "end_char_pos": 414}, {"type": "D", "before": "Ron Artest", "after": null, "start_char_pos": 434, "end_char_pos": 444}, {"type": "D", "before": "Paul Pierce", "after": null, "start_char_pos": 459, "end_char_pos": 470}, {"type": "D", "before": "Kevin Garnett", "after": null, "start_char_pos": 489, "end_char_pos": 502}, {"type": "R", "before": "Jordan Farmar and Shannon Brown", "after": "and", "start_char_pos": 704, "end_char_pos": 735}, {"type": "D", "before": "Lamar Odom", "after": null, "start_char_pos": 831, "end_char_pos": 841}, {"type": "D", "before": "Rajon Rondo", "after": null, "start_char_pos": 1067, "end_char_pos": 1078}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 1334, "end_char_pos": 1336}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 1362, "end_char_pos": 1364}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 1690, "end_char_pos": 1692}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 1712, "end_char_pos": 1714}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 1739, "end_char_pos": 1741}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 1801, "end_char_pos": 1803}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 1812, "end_char_pos": 1814}, {"type": "D", "before": "Staples Center", "after": null, "start_char_pos": 1897, "end_char_pos": 1911}], "sents_char_pos": [0, 224, 281, 446, 517, 599, 688, 870, 1010, 1140, 1254, 1403, 1480, 1567, 1637, 1669, 1764, 1834]}
+{"doc_id": "190484", "revision_depth": "1", "before_revision": "Noynoy Aquino , the next President of the Philippines . In the Philippines, the Liberal Party 's presidential candidate Benigno Simeon Cojuangco Aquino III , commonly known as Noynoy, was officially elected as the next President of the Philippines in the 2010 presidential election. The Commission of Elections announced Noynoy's victory on Wednesday. He campaigned for an end to corruption and poverty and says he'll make prosecuting corrupt officials a priority. Noynoy received more than 15 million votes, about 5.7 million ahead of his closest opponent, ousted Joseph Estrada . Noynoy said in an interview, \"I want to lead by example. We talk about corruption. I did make a public vow, I will never steal\". Senate President Juan Ponce Enrile told a crowd after the count: \"We have done this ... for the Filipino people ... This is a historic event.\" He is 50 years old, a bachelor, an economics graduate, a Senator and is the only son of former President Corazon Aquino and former Senator Benigno Aquino, Jr. . Noynoy's father was shot while in military custody during the regime of late dictator Ferdinand Marcos , before his mother, Corazon Aquino, led the People Power Revolution that toppled Marcos in 1986. She then served as president for six years. In the Philippines, the president and vice president are elected separately; the Puwersa ng Masang Pilipino Party 's vice-presidential candidate Jejomar Cabauatan Binay will become the country's vice-president. Noynoy is the President-elect, while Gloria Macapagal-Arroyo is the outgoing incumbent. He will officially become the Philippines's fifteenth president on June 30.", "after_revision": " , the next . In the Philippines, the 's presidential candidate , commonly known as Noynoy, was officially elected as the next in the 2010 . The announced Noynoy's victory on Wednesday. He campaigned for an end to corruption and poverty and says he'll make prosecuting corrupt officials a priority. Noynoy received more than 15 million votes, about 5.7 million ahead of his closest opponent, ousted . Noynoy said in an interview, \"I want to lead by example. We talk about corruption. I did make a public vow, I will never steal\". Senate President told a crowd after the count: \"We have done this ... for the Filipino people ... This is a historic event.\" He is 50 years old, a bachelor, an economics graduate, a and is the only son of former President and former Senator . Noynoy's father was shot while in military custody during the regime of late dictator , before his mother, Corazon Aquino, led the that toppled Marcos in 1986. She then served as president for six years. In the Philippines, the president and vice president are elected separately; the 's vice-presidential candidate will become the country's vice-president. Noynoy is the President-elect, while Gloria Macapagal-Arroyo is the outgoing incumbent. He will officially become the Philippines's fifteenth president on June 30.", "edit_actions": [{"type": "D", "before": "Noynoy Aquino", "after": null, "start_char_pos": 0, "end_char_pos": 13}, {"type": "D", "before": "President of the Philippines", "after": null, "start_char_pos": 25, "end_char_pos": 53}, {"type": "D", "before": "Liberal Party", "after": null, "start_char_pos": 80, "end_char_pos": 93}, {"type": "D", "before": "Benigno Simeon Cojuangco Aquino III", "after": null, "start_char_pos": 120, "end_char_pos": 155}, {"type": "D", "before": "President of the Philippines", "after": null, "start_char_pos": 219, "end_char_pos": 247}, {"type": "R", "before": "presidential election. The Commission of Elections", "after": ". The", "start_char_pos": 260, "end_char_pos": 310}, {"type": "D", "before": "Joseph Estrada", "after": null, "start_char_pos": 565, "end_char_pos": 579}, {"type": "D", "before": "Juan Ponce Enrile", "after": null, "start_char_pos": 728, "end_char_pos": 745}, {"type": "D", "before": "Senator", "after": null, "start_char_pos": 911, "end_char_pos": 918}, {"type": "D", "before": "Corazon Aquino", "after": null, "start_char_pos": 959, "end_char_pos": 973}, {"type": "D", "before": "Benigno Aquino, Jr.", "after": null, "start_char_pos": 993, "end_char_pos": 1012}, {"type": "D", "before": "Ferdinand Marcos", "after": null, "start_char_pos": 1101, "end_char_pos": 1117}, {"type": "D", "before": "People Power Revolution", "after": null, "start_char_pos": 1163, "end_char_pos": 1186}, {"type": "D", "before": "Puwersa ng Masang Pilipino Party", "after": null, "start_char_pos": 1341, "end_char_pos": 1373}, {"type": "D", "before": "Jejomar Cabauatan Binay", "after": null, "start_char_pos": 1405, "end_char_pos": 1428}], "sents_char_pos": [0, 55, 282, 351, 464, 638, 664, 710, 826, 853, 1215, 1259, 1336, 1470, 1558]}
+{"doc_id": "191456", "revision_depth": "1", "before_revision": "Scientology is facing renewed criticism, due to an extensive expos\u00e9 in the Florida newspaper the St. Petersburg Times which contains revealing accounts of women involved in the organization who say they were forced to have abortions. Multiple different female members of the Scientology group called the Sea Org said they were pressured to have abortions, and were threatened with separation from their families, hard labor, interrogations, and shunning , if they did not comply. L. Ron Hubbard , the founder of Scientology, stated his appreciation for families within the Sea Org. Scientology's subsequent leader, David Miscavige, issued an order that children were to be banned in the Sea Org. The mandate by Miscavige asserted that children hampered the productivity of the Scientology order. Scientology representative, Tommy Davis denied all of the assertions made by the women. \"There is no church policy to convince anyone to have an abortion, and the church has never engaged in such activity. The decision to have a child or terminate a pregnancy is a personal decision made by a couple. That applies to all Scientologists. If any current or former Sea Org member ever 'pressured' someone to have an abortion, they did so independently, and that action was not approved, endorsed or advocated by the church,\" stated Davis to the St. Petersburg Times. Another woman is suing the Scientology organization in United States federal court , and stated she was threatened with severe repercussions if she did not have an abortion. Claire Headley, 35, a member of the Sea Org when she was in Scientology, told the St. Petersburg Times, \"The policy was if a staff member became pregnant, that they were to have an abortion.\" In Nevada, Republican party candidate for the United States Senate, Sharron Angle , was the focus of criticism for her support of a Scientology-associated program. Angle's opponent, incumbent Senator and Senate Majority Leader Democrat Harry Reid , took out a 30-second negative political ad critical of Angle for supporting \"a Scientology plan to give massages to prisoners\". The prison program Angle had supported was based on techniques developed by Scientology founder, L. Ron Hubbard. Angle had previously been the subject of a similar ad in the Republican primary, generated by the campaign of her opponent Sue Lowden . Sharron Angle is pro-life, and The New York Times columnist Ramesh Ponnuru noted her position against abortion helped her win the Republican primary. \"Angle would not have been able to unite populist conservatives and beat the party establishment\u2019s candidate had she been pro-choice,\" noted Ponnuru.", "after_revision": "Scientology is facing renewed criticism, due to an in the Florida newspaper the which contains revealing accounts of women involved in the organization who say they were forced to have abortions. Multiple different female members of the Scientology group called the said they were pressured to have abortions, and were threatened with separation from their families, hard labor, interrogations, and , if they did not comply. , the founder of Scientology, stated his appreciation for families within the Sea Org. Scientology's subsequent leader, David Miscavige, issued an order that children were to be banned in the Sea Org. The mandate by Miscavige asserted that children hampered the productivity of the Scientology order. Scientology representative, denied all of the assertions made by the women. \"There is no church policy to convince anyone to have an abortion, and the church has never engaged in such activity. The decision to have a child or terminate a pregnancy is a personal decision made by a couple. That applies to all Scientologists. If any current or former Sea Org member ever 'pressured' someone to have an abortion, they did so independently, and that action was not approved, endorsed or advocated by the church,\" stated Davis to the St. Petersburg Times. Another woman is suing the Scientology organization in , and stated she was threatened with severe repercussions if she did not have an abortion. Claire Headley, 35, a member of the Sea Org when she was in Scientology, told the St. Petersburg Times, \"The policy was if a staff member became pregnant, that they were to have an abortion.\" In Nevada, candidate for the , , was the focus of criticism for her support of a Scientology-associated program. Angle's opponent, incumbent Senator and , took out a 30-second negative political ad critical of Angle for supporting \"a Scientology plan to give massages to prisoners\". The prison program Angle had supported was based on techniques developed by Scientology founder, . Angle had previously been the subject of a similar ad in the Republican primary, generated by the campaign of her opponent . Sharron Angle is , and columnist noted her position against abortion helped her win the Republican primary. \"Angle would not have been able to unite populist conservatives and beat the party establishment\u2019s candidate had she been pro-choice,\" noted Ponnuru.", "edit_actions": [{"type": "D", "before": "extensive expos\u00e9", "after": null, "start_char_pos": 51, "end_char_pos": 67}, {"type": "D", "before": "St. Petersburg Times", "after": null, "start_char_pos": 97, "end_char_pos": 117}, {"type": "D", "before": "Sea Org", "after": null, "start_char_pos": 304, "end_char_pos": 311}, {"type": "D", "before": "shunning", "after": null, "start_char_pos": 445, "end_char_pos": 453}, {"type": "D", "before": "L. Ron Hubbard", "after": null, "start_char_pos": 480, "end_char_pos": 494}, {"type": "D", "before": "Tommy Davis", "after": null, "start_char_pos": 824, "end_char_pos": 835}, {"type": "D", "before": "United States federal court", "after": null, "start_char_pos": 1415, "end_char_pos": 1442}, {"type": "D", "before": "Republican party", "after": null, "start_char_pos": 1737, "end_char_pos": 1753}, {"type": "D", "before": "United States Senate, Sharron Angle", "after": null, "start_char_pos": 1772, "end_char_pos": 1807}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1810, "end_char_pos": 1810}, {"type": "D", "before": "Senate Majority Leader Democrat Harry Reid", "after": null, "start_char_pos": 1931, "end_char_pos": 1973}, {"type": "R", "before": "L. Ron Hubbard.", "after": ".", "start_char_pos": 2201, "end_char_pos": 2216}, {"type": "D", "before": "Sue Lowden", "after": null, "start_char_pos": 2340, "end_char_pos": 2350}, {"type": "R", "before": "pro-life, and The New York Times columnist Ramesh Ponnuru", "after": ", and columnist", "start_char_pos": 2370, "end_char_pos": 2427}], "sents_char_pos": [0, 100, 233, 479, 581, 695, 795, 883, 1001, 1096, 1132, 1341, 1359, 1533, 1619, 1725, 1890, 2103, 2216, 2502]}
+{"doc_id": "192499", "revision_depth": "1", "before_revision": "The Democratic Party has been stirring up some controversy by proposing a revision of the 2012 constitutional package regarding the universal suffrage in Hong Kong, which the local government as well as the National People's Congress, accepted. The Legislative Council (LegCo) lawmakers are scheduled to cast their ballots tomorrow to decide whether or not the proposal will be accepted, and it is highly likely that the proposal will be approved. Yesterday night, the Democratic Party held a long meeting to debate on the controversial issue. After five hours, consensus aroused in the Party to accept the package, with only 63 opposed to the LegCo part of the proposal and 71 to the Chief Executive part, as compared to 246 and 237 in support of the LegCo and Chief Executive parts respectively. \"The decision is not just a historical one for the Democratic Party, but also a milestone for the city's progress in democracy,\" said the Party chairman Albert Ho . The vice president of China, Xi Jinping had approved the amended proposal in order to prevent Hong Kong's political situation from worsening. The Executive Council also approved the proposal, and the Chief Executive of Hong Kong, Donald Tsang said there is a 'ray of hope' for the democratic development of Hong Kong as a result. The decision broke the stalemate between the government and the Democratic Party. According to Ming Pao, the decision also improved the chances of Xi Jinping's becoming the next president. The proposal is also popular among the Pro-Beijing political parties, such as the DAB, Federation of Trade Unions, and Liberal Party. Politicians Elsie Leung, Rita Fan and Tsang Hin-chi also support the proposal, the former stating that the proposal was 'worthy of consideration'. However, the proposal received heavy criticism among radical democrats, including the League of Social Democrats (LSD) and the Civic Party , as well as the general public. The LSD met outside the Causeway Bay branch of the Professional Teachers' Union , where the Democratic Party's meeting was held, to protest. They stepped onto a roasted pigeon, symbolising the Democratic Party as the Party's logo included a dove. They waved placards with the names of seven of the party's lawmakers and condemned them for being \"democracy sinners.\" The Party had also protested when Ho participated in the City Forum and during a meeting of the Alliance for Universal Suffrage . During the City Forum, where Ho, Audrey Eu of the Civic Party and a National People's Congress representative talked, LSD members frequently booed and attacked Ho. Even after Franklin Wong rescued Ho and put him in his car, some 'Brothers of Victoria Park' still surrounded the car, and police officers had to protect Ho so that he could leave. During the above mentioned meeting, many people claiming to be previous supporters of the Democratic Party accused the Party of betraying them, including a 80-year-old man called Chan, a 31-year-old named Cheung and an unnamed middle-aged woman. These actions were condemned by Democratic Party members, including Szeto Wah, Emily Lau, and Cheung Man-kwong . Ho said that, 'when extreme leftists and rightists attack you, you know that are in the right track'. However, not all Democratic Party members supported the proposal. Martin Lee , the founder of the Democratic Party, had earlier vowed to leave the party should the package be backed. He stated that he was bitterly disappointed, and needed two weeks' time to consider whether he should quit or not. Party member Andrew Cheng also opposed the proposal, as did James To . The former is thinking of leaving the party.", "after_revision": "The has been stirring up some controversy by proposing a revision of the regarding the in Hong Kong, which the local government as well as the National People's Congress, accepted. (LegCo) lawmakers are scheduled to cast their ballots tomorrow to decide whether or not the proposal will be accepted, and it is highly likely that the proposal will be approved. Yesterday night, the Democratic Party held a long meeting to debate on the controversial issue. After five hours, consensus aroused in the Party to accept the package, with only 63 opposed to the LegCo part of the proposal and 71 to the Chief Executive part, as compared to 246 and 237 in support of the LegCo and Chief Executive parts respectively. \"The decision is not just a historical one for the Democratic Party, but also a milestone for the city's progress in democracy,\" said the Party chairman . The vice president of China, had approved the amended proposal in order to prevent Hong Kong's political situation from worsening. The also approved the proposal, and the Chief Executive of Hong Kong, said there is a 'ray of hope' for the democratic development of Hong Kong as a result. The decision broke the stalemate between the government and the Democratic Party. According to Ming Pao, the decision also improved the chances of Xi Jinping's becoming the next president. The proposal is also popular among the political parties, such as the , , and . Politicians , and Tsang Hin-chi also support the proposal, the former stating that the proposal was 'worthy of consideration'. However, the proposal received heavy criticism among radical democrats, including the (LSD) and the , as well as the general public. The LSD met outside the Causeway Bay branch of the , where the Democratic Party's meeting was held, to protest. They stepped onto a roasted pigeon, symbolising the Democratic Party as the Party's logo included a dove. They waved placards with the names of seven of the party's lawmakers and condemned them for being \"democracy sinners.\" The Party had also protested when Ho participated in the and during a meeting of the . During the City Forum, where Ho, of the Civic Party and a National People's Congress representative talked, LSD members frequently booed and attacked Ho. Even after Franklin Wong rescued Ho and put him in his car, some 'Brothers of Victoria Park' still surrounded the car, and police officers had to protect Ho so that he could leave. During the above mentioned meeting, many people claiming to be previous supporters of the Democratic Party accused the Party of betraying them, including a 80-year-old man called Chan, a 31-year-old named Cheung and an unnamed middle-aged woman. These actions were condemned by Democratic Party members, including , , and . Ho said that, 'when extreme leftists and rightists attack you, you know that are in the right track'. However, not all Democratic Party members supported the proposal. , the founder of the Democratic Party, had earlier vowed to leave the party should the package be backed. He stated that he was bitterly disappointed, and needed two weeks' time to consider whether he should quit or not. Party member also opposed the proposal, as did . The former is thinking of leaving the party.", "edit_actions": [{"type": "D", "before": "Democratic Party", "after": null, "start_char_pos": 4, "end_char_pos": 20}, {"type": "R", "before": "2012 constitutional package regarding the universal suffrage", "after": "regarding the", "start_char_pos": 90, "end_char_pos": 150}, {"type": "D", "before": "The Legislative Council", "after": null, "start_char_pos": 245, "end_char_pos": 268}, {"type": "D", "before": "Albert Ho", "after": null, "start_char_pos": 951, "end_char_pos": 960}, {"type": "D", "before": "Xi Jinping", "after": null, "start_char_pos": 992, "end_char_pos": 1002}, {"type": "D", "before": "Executive Council", "after": null, "start_char_pos": 1109, "end_char_pos": 1126}, {"type": "D", "before": "Donald Tsang", "after": null, "start_char_pos": 1193, "end_char_pos": 1205}, {"type": "D", "before": "Pro-Beijing", "after": null, "start_char_pos": 1521, "end_char_pos": 1532}, {"type": "R", "before": "DAB, Federation of Trade Unions, and Liberal Party. Politicians Elsie Leung, Rita Fan", "after": ", ,", "start_char_pos": 1564, "end_char_pos": 1649}, {"type": "A", "before": null, "after": ". Politicians , and", "start_char_pos": 1654, "end_char_pos": 1654}, {"type": "D", "before": "League of Social Democrats", "after": null, "start_char_pos": 1850, "end_char_pos": 1876}, {"type": "D", "before": "Civic Party", "after": null, "start_char_pos": 1891, "end_char_pos": 1902}, {"type": "D", "before": "Professional Teachers' Union", "after": null, "start_char_pos": 1987, "end_char_pos": 2015}, {"type": "D", "before": "City Forum", "after": null, "start_char_pos": 2359, "end_char_pos": 2369}, {"type": "D", "before": "Alliance for Universal Suffrage", "after": null, "start_char_pos": 2398, "end_char_pos": 2429}, {"type": "D", "before": "Audrey Eu", "after": null, "start_char_pos": 2465, "end_char_pos": 2474}, {"type": "R", "before": "Szeto Wah, Emily Lau, and Cheung Man-kwong", "after": ", , and", "start_char_pos": 3091, "end_char_pos": 3133}, {"type": "D", "before": "Martin Lee", "after": null, "start_char_pos": 3304, "end_char_pos": 3314}, {"type": "D", "before": "Andrew Cheng", "after": null, "start_char_pos": 3549, "end_char_pos": 3561}, {"type": "D", "before": "James To", "after": null, "start_char_pos": 3596, "end_char_pos": 3604}], "sents_char_pos": [0, 244, 447, 543, 797, 962, 1104, 1292, 1374, 1481, 1615, 1763, 1935, 2076, 2182, 2301, 2431, 2595, 2776, 3022, 3135, 3237, 3303, 3420, 3535, 3606]}
+{"doc_id": "19565", "revision_depth": "1", "before_revision": "It was revealed today that George H. W. Bush will be attending the Forbes Global CEO Conference in Sydney next week. Mr. Bush is a wealthy businessman and member of Skull and Bones . He has also been President of the United States and the head of the CIA , and is the father of the current US President George W. Bush. The conference will be held at the Sydney Opera House . The Forbes website says that at the event \"senior figures from the world's leading companies and institutions will discuss the best ways to nurture and capitalize on innovation and reveal the latest global trends.\" Other attendees will be former New York mayor Rudolph Giuliani , Australian Prime Minister John Howard, former NSW Premier Bob Carr and, controversially, Steve Forbes , president and chief executive officer of Forbes Inc, and one of the signers of the Statement of Principles of Project for the New American Century . Mr Knobloch of the 30A network described the attendees as \"a few hundred neo-conservative corporate chiefs\". An article written by James Goodman and hosted on the 30A network website alleges a connection between Mr Forbes, the Bush family, and the policies of the administration of George W. Bush. The 30A network is organising a protest in Sydney to coincide with the conference. It is not yet known if the ASIO risk assessment for the event will change as a result of Mr Bush attending.", "after_revision": "It was revealed today that will be attending the Forbes Global CEO Conference in next week. Mr. Bush is a wealthy businessman and member of . He has also been and the head of the , and is the father of the current President George W. Bush. The conference will be held at the . The Forbes website says that at the event \"senior figures from the world's leading companies and institutions will discuss the best ways to nurture and capitalize on innovation and reveal the latest global trends.\" Other attendees will be former New York mayor , Australian Prime Minister , former Premier and, controversially, , president and chief executive officer of Forbes Inc, and one of the signers of the Statement of Principles of . Mr Knobloch of the 30A network described the attendees as \"a few hundred corporate chiefs\". An article written by James Goodman and hosted on the 30A network website alleges a connection between Mr Forbes, the Bush family, and the policies of the administration of George W. Bush. The 30A network is organising a protest in Sydney to coincide with the conference. It is not yet known if the risk assessment for the event will change as a result of Mr Bush attending.", "edit_actions": [{"type": "D", "before": "George H. W. Bush", "after": null, "start_char_pos": 27, "end_char_pos": 44}, {"type": "D", "before": "Sydney", "after": null, "start_char_pos": 99, "end_char_pos": 105}, {"type": "D", "before": "Skull and Bones", "after": null, "start_char_pos": 165, "end_char_pos": 180}, {"type": "D", "before": "President of the United States", "after": null, "start_char_pos": 200, "end_char_pos": 230}, {"type": "D", "before": "CIA", "after": null, "start_char_pos": 251, "end_char_pos": 254}, {"type": "D", "before": "US", "after": null, "start_char_pos": 290, "end_char_pos": 292}, {"type": "D", "before": "Sydney Opera House", "after": null, "start_char_pos": 354, "end_char_pos": 372}, {"type": "D", "before": "Rudolph Giuliani", "after": null, "start_char_pos": 636, "end_char_pos": 652}, {"type": "R", "before": "John Howard, former NSW Premier Bob Carr", "after": ", former Premier", "start_char_pos": 681, "end_char_pos": 721}, {"type": "D", "before": "Steve Forbes", "after": null, "start_char_pos": 744, "end_char_pos": 756}, {"type": "D", "before": "Project for the New American Century", "after": null, "start_char_pos": 869, "end_char_pos": 905}, {"type": "D", "before": "neo-conservative", "after": null, "start_char_pos": 981, "end_char_pos": 997}, {"type": "D", "before": "ASIO", "after": null, "start_char_pos": 1316, "end_char_pos": 1320}], "sents_char_pos": [0, 116, 182, 318, 374, 589, 907, 1016, 1205, 1288]}
+{"doc_id": "197073", "revision_depth": "1", "before_revision": "Alex Higgins in 2008. Snooker player Alex Higgins , nicknamed \"Hurricane\", was found dead in his apartment in Donegall Road, Belfast , Northern Ireland on Saturday. He was aged 61 and had been suffering from throat cancer since 1997. Born in Belfast on March 18, 1949, Higgins became the champion of the World Snooker Championship at the age of 23 in 1972. He reached the same achievement again in 1982. Higgins' final title victory was in the Irish Professional Championship in 1989. During 1986, he received a fine and was banned from five tournaments after headbutting a director of a tournament. He was also banned from playing for one year in 1990 after threatening to have Dennis Taylor , another snooker player, shot. Recently, Higgins lost all his teeth as the result of having treatment for his cancer. In May 2010, a charity dinner took place in Manchester, England that raised approximately \u00a3 20,000 ( US$30,997, \u20ac23,859, A$ 34,363, C 31,961) so as to allow surgery for new teeth for him to occur. However, Higgins was considered to be too unhealthy to have the surgery in Marbella, Spain . Dennis Taylor, now a snooker commentator at the BBC , stated that \"[t]here was just something about the way he played the game \u2014 there was a little bit of John McEnroe in there. I don't think you'll ever see a player in the game of snooker like the great Alex Higgins.\" Philip Studd, another commentator of snooker for the BBC, has described the late snooker player as being \"snooker's original troubled genius\" and that Higgins was \"[c]harismatic, flash, fast, unpredictable, combustible \u2014 you just couldn't take your eyes off the 'Hurricane'.\" Studd continued to explain that \"[w]hile he could never match the consistency of Steve Davis or Stephen Hendry , Higgins on his day was the greatest of them all. He touched the heights in 1982 when he won his second world title. He pipped Jimmy White to the final thanks to a break still widely regarded as the finest ever made. His tears of triumph after beating Ray Reardon \u2014 wife and baby in arms \u2014 remains one of snooker's most iconic moments. Without Alex 'Hurricane' Higgins snooker would never have become one of the most popular television sports in the 1980s and beyond.\"", "after_revision": " in 2008. Snooker player , nicknamed \"Hurricane\", was found dead in his apartment in Donegall Road, , Northern Ireland on Saturday. He was aged 61 and had been suffering from since 1997. Born in Belfast on March 18, 1949, Higgins became the champion of the at the age of 23 in 1972. He reached the same achievement again in 1982. Higgins' final title victory was in the in 1989. During 1986, he received a fine and was banned from five tournaments after headbutting a director of a tournament. He was also banned from playing for one year in 1990 after threatening to have , another snooker player, shot. Recently, Higgins lost all his teeth as the result of having treatment for his cancer. In May 2010, a charity dinner took place in , that raised approximately 20,000 ( 30,997, 23,859, 34,363, 31,961) so as to allow surgery for new teeth for him to occur. However, Higgins was considered to be too unhealthy to have the surgery in , . Dennis Taylor, now a snooker commentator at the , stated that \"[t]here was just something about the way he played the game \u2014 there was a little bit of in there. I don't think you'll ever see a player in the game of snooker like the great Alex Higgins.\" Philip Studd, another commentator of snooker for the BBC, has described the late snooker player as being \"snooker's original troubled genius\" and that Higgins was \"[c]harismatic, flash, fast, unpredictable, combustible \u2014 you just couldn't take your eyes off the 'Hurricane'.\" Studd continued to explain that \"[w]hile he could never match the consistency of or , Higgins on his day was the greatest of them all. He touched the heights in 1982 when he won his second world title. He pipped to the final thanks to a break still widely regarded as the finest ever made. His tears of triumph after beating \u2014 wife and baby in arms \u2014 remains one of snooker's most iconic moments. Without Alex 'Hurricane' Higgins snooker would never have become one of the most popular television sports in the 1980s and beyond.\"", "edit_actions": [{"type": "D", "before": "Alex Higgins", "after": null, "start_char_pos": 0, "end_char_pos": 12}, {"type": "D", "before": "Alex Higgins", "after": null, "start_char_pos": 37, "end_char_pos": 49}, {"type": "D", "before": "Belfast", "after": null, "start_char_pos": 125, "end_char_pos": 132}, {"type": "D", "before": "throat cancer", "after": null, "start_char_pos": 208, "end_char_pos": 221}, {"type": "D", "before": "World Snooker Championship", "after": null, "start_char_pos": 304, "end_char_pos": 330}, {"type": "D", "before": "Irish Professional Championship", "after": null, "start_char_pos": 444, "end_char_pos": 475}, {"type": "D", "before": "Dennis Taylor", "after": null, "start_char_pos": 679, "end_char_pos": 692}, {"type": "R", "before": "Manchester, England", "after": ",", "start_char_pos": 856, "end_char_pos": 875}, {"type": "D", "before": "\u00a3", "after": null, "start_char_pos": 902, "end_char_pos": 903}, {"type": "R", "before": "US$30,997, \u20ac23,859, A$", "after": "30,997, 23,859,", "start_char_pos": 913, "end_char_pos": 935}, {"type": "D", "before": "C", "after": null, "start_char_pos": 944, "end_char_pos": 945}, {"type": "R", "before": "Marbella, Spain", "after": ",", "start_char_pos": 1084, "end_char_pos": 1099}, {"type": "D", "before": "BBC", "after": null, "start_char_pos": 1150, "end_char_pos": 1153}, {"type": "D", "before": "John", "after": null, "start_char_pos": 1257, "end_char_pos": 1261}, {"type": "D", "before": "McEnroe", "after": null, "start_char_pos": 1262, "end_char_pos": 1269}, {"type": "R", "before": "Steve Davis or Stephen Hendry", "after": "or", "start_char_pos": 1729, "end_char_pos": 1758}, {"type": "D", "before": "Jimmy White", "after": null, "start_char_pos": 1887, "end_char_pos": 1898}, {"type": "D", "before": "Ray Reardon", "after": null, "start_char_pos": 2012, "end_char_pos": 2023}], "sents_char_pos": [0, 21, 164, 233, 356, 403, 484, 599, 724, 811, 1008, 1279, 1371, 1809, 1876, 1976, 2095]}
+{"doc_id": "197338", "revision_depth": "1", "before_revision": "NASCAR and Indy team owners Chip Ganassi and Felix Sabates became the first team owners in history to sweep the three top races in American motor sports. In February, NASCAR driver Jamie McMurray took the checkered flag at the Daytona 500 followed by Scottish driver Dario Franchitti 's win in the Indy open wheel series at the Indianapolis 500 in May. Jamie McMurray helped make it a clean sweep when over the weekend he again took the top spot (and his second win of the season) by winning the Brickyard 400, also held at the Indianapolis Motor speedway . Pole sitter Juan Pablo Montoya led the majority of Sunday's race, but in a late pit stop, he and his crew chief Brian Pattie conservatively changed four tires while teammate and rival McMurray changed only two. As a result, the Colombian born driver fell back in the field, and eventually crashed out of the race. This marks the second time Montoya has dominated this race only to fall short at the end. NASCAR Sprint Cup points leader Kevin Harvick finished in second place, followed by Greg Biffle, Clint Bowyer and Tony Stewart . Also in North American motorsport on Sunday, Spanish rider Jorge Lorenzo took the checkered flag in the United States Grand Prix at California's Mazda Raceway Laguna Seca . Lorenzo's victory on a Fiat Yamaha bike, over Casey Stoner (second) and Valentino Rossi (third), strengthened his points lead in the MotoGP championship. The next race in the NASCAR Sprint Cup Series will be held on Sunday at Pocono Raceway in Long Pond, Pennsylvania, where Denny Hamlin is the defending race champion.", "after_revision": "NASCAR and Indy team owners and became the first team owners in history to sweep the three top races in American motor sports. In February, NASCAR driver took the checkered flag at the followed by Scottish driver 's win in the Indy open wheel series at the in May. Jamie McMurray helped make it a clean sweep when over the weekend he again took the top spot (and his second win of the season) by winning the Brickyard 400, also held at the . Pole sitter led the majority of Sunday's race, but in a late pit stop, he and his crew chief Brian Pattie conservatively changed four tires while teammate and rival McMurray changed only two. As a result, the Colombian born driver fell back in the field, and eventually crashed out of the race. This marks the second time Montoya has dominated this race only to fall short at the end. NASCAR Sprint Cup points leader finished in second place, followed by , and . Also in North American motorsport on Sunday, Spanish rider took the checkered flag in the United States Grand Prix at California's . Lorenzo's victory on a Fiat Yamaha bike, over Casey Stoner (second) and Valentino Rossi (third), strengthened his points lead in the championship. The next race in the NASCAR will be held on Sunday at in Long Pond, Pennsylvania, where is the defending race champion.", "edit_actions": [{"type": "R", "before": "Chip Ganassi and Felix Sabates", "after": "and", "start_char_pos": 28, "end_char_pos": 58}, {"type": "D", "before": "Jamie McMurray", "after": null, "start_char_pos": 181, "end_char_pos": 195}, {"type": "D", "before": "Daytona 500", "after": null, "start_char_pos": 227, "end_char_pos": 238}, {"type": "D", "before": "Dario Franchitti", "after": null, "start_char_pos": 267, "end_char_pos": 283}, {"type": "D", "before": "Indianapolis 500", "after": null, "start_char_pos": 328, "end_char_pos": 344}, {"type": "D", "before": "Indianapolis Motor speedway", "after": null, "start_char_pos": 528, "end_char_pos": 555}, {"type": "D", "before": "Juan Pablo Montoya", "after": null, "start_char_pos": 570, "end_char_pos": 588}, {"type": "D", "before": "Kevin Harvick", "after": null, "start_char_pos": 994, "end_char_pos": 1007}, {"type": "R", "before": "Greg Biffle, Clint Bowyer and Tony Stewart", "after": ", and", "start_char_pos": 1046, "end_char_pos": 1088}, {"type": "D", "before": "Jorge Lorenzo", "after": null, "start_char_pos": 1150, "end_char_pos": 1163}, {"type": "D", "before": "Mazda Raceway Laguna Seca", "after": null, "start_char_pos": 1236, "end_char_pos": 1261}, {"type": "D", "before": "MotoGP", "after": null, "start_char_pos": 1397, "end_char_pos": 1403}, {"type": "D", "before": "Sprint Cup Series", "after": null, "start_char_pos": 1446, "end_char_pos": 1463}, {"type": "D", "before": "Pocono Raceway", "after": null, "start_char_pos": 1490, "end_char_pos": 1504}, {"type": "D", "before": "Denny Hamlin", "after": null, "start_char_pos": 1539, "end_char_pos": 1551}], "sents_char_pos": [0, 153, 352, 768, 871, 961, 1090, 1417]}
+{"doc_id": "198457", "revision_depth": "1", "before_revision": "File photo of Greg Biffle 's race car. NASCAR Sprint Cup Series driver Greg Biffle won his first race of the season after leading thirty laps on Sunday during the 2010 Sunoco Red Cross Pennsylvania 500 at Pocono Raceway in Long Pond , Pennsylvania. The victory kept him in the top twelve points position, but he was still 428 points behind Kevin Harvick . It was his fifteenth career victory in the US's leading professional stock car series. His previous victory came sixty-four races ago in 2008 at Dover International Speedway . Tony Stewart finished in the second position, ahead of Carl Edwards and Kevin Harvick in third and fourth, respectively. Denny Hamlin, Jeff Gordon, Mark Martin, Jeff Burton, Martin Truex, Jr., and Jimmie Johnson rounded out the top ten positions. The race had a total of five cautions and twenty-three lead changes among nine different drivers. Jimmie Johnson led the most laps by leading ninety-six. In the point standings , Harvick and Gordon remained in the first and second position, and Hamlin maintained the third position as Johnson kept fourth. Burton, Kyle Busch, Kurt Busch , and Stewart followed in the top eight points positions. Matt Kenseth fell to the ninth position, as Edwards remained in tenth. Greg Biffle and Clint Bowyer rounded out the top twelve, and are currently in the Chase . Unofficial Top-10 Race Results for the 2010 Sunoco Red Cross Pennsylvania 500 Position Car Number Driver 1 16 Greg Biffle 2 14 Tony Stewart 3 99 Carl Edwards 4 29 Kevin Harvick 5 11 Denny Hamlin 6 24 Jeff Gordon 7 5 Mark Martin 8 31 Jeff Burton 9 56 Martin Truex, Jr. 10 48 Jimmie Johnson", "after_revision": "File photo of 's race car. driver won his first race of the after leading thirty laps on Sunday during the at in , Pennsylvania. The victory kept him in the top twelve points position, but he was still 428 points behind . It was his fifteenth career victory in the US's leading professional stock car series. His previous victory came sixty-four races ago in 2008 at . finished in the second position, ahead of and Kevin Harvick in third and fourth, respectively. , , , , , and rounded out the top ten positions. The race had a total of five cautions and twenty-three lead changes among nine different drivers. Jimmie Johnson led the most laps by leading ninety-six. In the , Harvick and Gordon remained in the first and second position, and Hamlin maintained the third position as Johnson kept fourth. Burton, , , and Stewart followed in the top eight points positions. fell to the ninth position, as Edwards remained in tenth. and Clint Bowyer rounded out the top twelve, and are currently in the . Unofficial Top-10 Race Results for the Position Car Number Driver 1 16 Greg Biffle 2 14 Tony Stewart 3 99 Carl Edwards 4 29 Kevin Harvick 5 11 Denny Hamlin 6 24 Jeff Gordon 7 5 Mark Martin 8 31 Jeff Burton 9 56 Martin Truex, Jr. 10 48 Jimmie Johnson", "edit_actions": [{"type": "D", "before": "Greg Biffle", "after": null, "start_char_pos": 14, "end_char_pos": 25}, {"type": "R", "before": "NASCAR Sprint Cup Series driver Greg Biffle", "after": "driver", "start_char_pos": 39, "end_char_pos": 82}, {"type": "D", "before": "season", "after": null, "start_char_pos": 109, "end_char_pos": 115}, {"type": "R", "before": "2010 Sunoco Red Cross Pennsylvania 500 at Pocono Raceway in Long Pond", "after": "at in", "start_char_pos": 163, "end_char_pos": 232}, {"type": "D", "before": "Kevin Harvick", "after": null, "start_char_pos": 340, "end_char_pos": 353}, {"type": "D", "before": "Dover International Speedway", "after": null, "start_char_pos": 501, "end_char_pos": 529}, {"type": "D", "before": "Tony Stewart", "after": null, "start_char_pos": 532, "end_char_pos": 544}, {"type": "D", "before": "Carl Edwards", "after": null, "start_char_pos": 587, "end_char_pos": 599}, {"type": "R", "before": "Denny Hamlin, Jeff Gordon, Mark Martin, Jeff Burton, Martin Truex, Jr., and Jimmie Johnson", "after": ", , , , , and", "start_char_pos": 653, "end_char_pos": 743}, {"type": "D", "before": "point standings", "after": null, "start_char_pos": 940, "end_char_pos": 955}, {"type": "D", "before": "Kyle Busch, Kurt Busch", "after": null, "start_char_pos": 1093, "end_char_pos": 1115}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1118, "end_char_pos": 1118}, {"type": "D", "before": "Matt Kenseth", "after": null, "start_char_pos": 1175, "end_char_pos": 1187}, {"type": "D", "before": "Greg Biffle", "after": null, "start_char_pos": 1246, "end_char_pos": 1257}, {"type": "D", "before": "Chase", "after": null, "start_char_pos": 1328, "end_char_pos": 1333}, {"type": "D", "before": "2010 Sunoco Red Cross Pennsylvania 500", "after": null, "start_char_pos": 1375, "end_char_pos": 1413}], "sents_char_pos": [0, 38, 248, 355, 442, 531, 652, 778, 876, 932, 1084, 1174, 1245, 1335]}
+{"doc_id": "199876", "revision_depth": "1", "before_revision": "File photo of Montoya. NASCAR Sprint Cup Series driver Juan Pablo Montoya won his first race of the season after leading seventy-four laps on Sunday during the 2010 Heluva Good! Sour Cream Dips at the Glen race at Watkins Glen International in Watkins Glen , New York. The victory moved him up to nineteenth points position, but he was still 774 points behind Kevin Harvick . It was his second career victory in the US's leading professional stock car series. His previous victory came in 2007 at Infineon Raceway . Kurt Busch finished in the second position, ahead of Marcos Ambrose and A. J. Allmendinger in third and fourth, respectively. Carl Edwards, Jamie McMurray, Tony Stewart, Kyle Busch, Jeff Burton, and Jeff Gordon rounded out the top ten positions. The race had a total of five cautions and ten lead changes among five different drivers. Montoya led the most laps by leading seventy-four. In the point standings , Harvick and Gordon remained in the first and second position, and Burton moved into the third position as Kurt Busch moved to fourth. Jimmie Johnson, Denny Hamlin, Kyle Busch , and Stewart followed in the top eight points positions. Edwards movedd into to the ninth position, as Matt Kenseth fell to tenth. Greg Biffle and Mark Martin rounded out the top twelve, and are currently in the Chase . Unofficial Top-10 Race Results for the 2010 Heluva Good! Sour Cream Dips at the Glen Position Car Number Driver 1 42 Juan Pablo Montoya 2 2 Kurt Busch 3 47 Marcos Ambrose 4 43 A. J. Allmendinger 5 99 Carl Edwards 6 1 Jamie McMurray 7 14 Tony Stewart 8 18 Kyle Busch 9 31 Jeff Burton 10 24 Jeff Gordon ", "after_revision": "File photo of Montoya. NASCAR driver won his first race of the after leading seventy-four laps on Sunday during the race at in , New York. The victory moved him up to nineteenth points position, but he was still 774 points behind . It was his second career victory in the US's leading professional stock car series. His previous victory came in 2007 at . finished in the second position, ahead of and in third and fourth, respectively. , , , , , and rounded out the top ten positions. The race had a total of five cautions and ten lead changes among five different drivers. Montoya led the most laps by leading seventy-four. In the , Harvick and Gordon remained in the first and second position, and Burton moved into the third position as Kurt Busch moved to fourth. , , , and Stewart followed in the top eight points positions. Edwards moved into to the ninth position, as fell to tenth. and rounded out the top twelve, and are currently in the . Unofficial Top-10 Race Results for the Position Car Number Driver 1 42 Juan Pablo Montoya 2 2 Kurt Busch 3 47 Marcos Ambrose 4 43 A. J. Allmendinger 5 99 Carl Edwards 6 1 Jamie McMurray 7 14 Tony Stewart 8 18 Kyle Busch 9 31 Jeff Burton 10 24 Jeff Gordon Sisters", "edit_actions": [{"type": "R", "before": "Sprint Cup Series driver Juan Pablo Montoya", "after": "driver", "start_char_pos": 30, "end_char_pos": 73}, {"type": "D", "before": "season", "after": null, "start_char_pos": 100, "end_char_pos": 106}, {"type": "R", "before": "2010 Heluva Good! Sour Cream Dips at the Glen race at Watkins Glen International in Watkins Glen", "after": "race at in", "start_char_pos": 160, "end_char_pos": 256}, {"type": "D", "before": "Kevin Harvick", "after": null, "start_char_pos": 360, "end_char_pos": 373}, {"type": "D", "before": "Infineon Raceway", "after": null, "start_char_pos": 497, "end_char_pos": 513}, {"type": "D", "before": "Kurt Busch", "after": null, "start_char_pos": 516, "end_char_pos": 526}, {"type": "R", "before": "Marcos Ambrose and A. J. Allmendinger", "after": "and", "start_char_pos": 569, "end_char_pos": 606}, {"type": "R", "before": "Carl Edwards, Jamie McMurray, Tony Stewart, Kyle Busch, Jeff Burton, and Jeff Gordon", "after": ", , , , , and", "start_char_pos": 642, "end_char_pos": 726}, {"type": "D", "before": "point standings", "after": null, "start_char_pos": 909, "end_char_pos": 924}, {"type": "D", "before": "Jimmie Johnson, Denny Hamlin, Kyle Busch", "after": null, "start_char_pos": 1061, "end_char_pos": 1101}, {"type": "A", "before": null, "after": ", ,", "start_char_pos": 1104, "end_char_pos": 1104}, {"type": "R", "before": "movedd", "after": "moved", "start_char_pos": 1169, "end_char_pos": 1175}, {"type": "D", "before": "Matt Kenseth", "after": null, "start_char_pos": 1207, "end_char_pos": 1219}, {"type": "R", "before": "Greg Biffle and Mark Martin", "after": "and", "start_char_pos": 1235, "end_char_pos": 1262}, {"type": "D", "before": "Chase", "after": null, "start_char_pos": 1316, "end_char_pos": 1321}, {"type": "D", "before": "2010 Heluva Good! Sour Cream Dips at the Glen", "after": null, "start_char_pos": 1363, "end_char_pos": 1408}, {"type": "A", "before": null, "after": "Sisters", "start_char_pos": 1625, "end_char_pos": 1625}], "sents_char_pos": [0, 22, 177, 268, 375, 459, 641, 761, 850, 901, 1060, 1160, 1234, 1323, 1380]}
+{"doc_id": "203053", "revision_depth": "1", "before_revision": "The Seattle Central Library, designed by Rem Koolhaas Dutch architect Rem Koolhaas has been awarded the \"Golden Lion for Lifetime Achievement\" at the opening ceremony of the 12th International Architecture Exhibition of the Venice Biennale , on August 28th. The decision was taken by the Board of the Biennale, upon the proposal of the Director of this year's exhibition, Kazuyo Sejima . The Board stated that \"Rem Koolhaas has expanded the possibilities of architecture. He has focused on the exchanges between people in space. He creates buildings that bring people together and in this way forms ambitious goals for architecture. His influence on the world has come well beyond architecture.\" The Japanese architect Kazuyo Sejima, who won this year's Pritzker Prize is the Biennale's first female director. Rem Koolhaas is renown as one of the founders of the Office for Metropolitan Architecture (OMA) in 1975, and author of Delirious New York (1978) and S,M,L,XL (1995). Among his most important buildings are the Netherlands Dance Theatre at The Hague, the Nexus Housing at Fukuoka in Japan, the Kunsthal in Rotterdam, the Grand Palais of Euralille in Lille, the Villa dall\u2019Ava in Paris, and the Seattle Public Library . One of his most recent projects is the China Central Television (CCTV) headquarters building in Beijing. The Board also awarded a special Golden Lion in memory of the Japanese architect, Kazuo Shinohara , who died in 2006. The Golden Lion for the best National Participation was this year awarded to the Kingdom of Bahrain . Located in Venice's Arsenal and Giardini , the Biennale will be open until November 21.", "after_revision": "The Seattle Central Library, designed by Rem Koolhaas architect has been awarded the \"Golden Lion for Lifetime Achievement\" at the opening ceremony of the 12th International Architecture Exhibition of the , on August 28th. The decision was taken by the Board of the Biennale, upon the proposal of the Director of this year's exhibition, . The Board stated that \"Rem Koolhaas has expanded the possibilities of architecture. He has focused on the exchanges between people in space. He creates buildings that bring people together and in this way forms ambitious goals for architecture. His influence on the world has come well beyond architecture.\" The architect Kazuyo Sejima, who won this year's is the Biennale's first female director. Rem Koolhaas is renown as one of the founders of the (OMA) in 1975, and author of Delirious New York (1978) and S,M,L,XL (1995). Among his most important buildings are the at The Hague, the Nexus Housing at Fukuoka in Japan, the in Rotterdam, the Grand Palais of Euralille in Lille, the Villa dall\u2019Ava in Paris, and the . One of his most recent projects is the (CCTV) headquarters building in Beijing. The Board also awarded a special Golden Lion in memory of the Japanese architect, , who died in 2006. The Golden Lion for the best National Participation was this year awarded to the . Located in 's and , the Biennale will be open until November 21.", "edit_actions": [{"type": "R", "before": "Dutch architect Rem Koolhaas", "after": "architect", "start_char_pos": 54, "end_char_pos": 82}, {"type": "D", "before": "Venice Biennale", "after": null, "start_char_pos": 224, "end_char_pos": 239}, {"type": "D", "before": "Kazuyo Sejima", "after": null, "start_char_pos": 372, "end_char_pos": 385}, {"type": "D", "before": "Japanese", "after": null, "start_char_pos": 700, "end_char_pos": 708}, {"type": "D", "before": "Pritzker Prize", "after": null, "start_char_pos": 754, "end_char_pos": 768}, {"type": "D", "before": "Office for Metropolitan Architecture", "after": null, "start_char_pos": 863, "end_char_pos": 899}, {"type": "D", "before": "Netherlands Dance Theatre", "after": null, "start_char_pos": 1019, "end_char_pos": 1044}, {"type": "D", "before": "Kunsthal", "after": null, "start_char_pos": 1102, "end_char_pos": 1110}, {"type": "D", "before": "Seattle Public Library", "after": null, "start_char_pos": 1202, "end_char_pos": 1224}, {"type": "D", "before": "China Central Television", "after": null, "start_char_pos": 1266, "end_char_pos": 1290}, {"type": "D", "before": "Kazuo Shinohara", "after": null, "start_char_pos": 1414, "end_char_pos": 1429}, {"type": "D", "before": "Kingdom of Bahrain", "after": null, "start_char_pos": 1531, "end_char_pos": 1549}, {"type": "R", "before": "Venice's Arsenal and Giardini", "after": "'s and", "start_char_pos": 1563, "end_char_pos": 1592}], "sents_char_pos": [0, 257, 387, 471, 528, 632, 695, 809, 975, 1226, 1331, 1449]}
+{"doc_id": "203635", "revision_depth": "1", "before_revision": "In a music-themed media event yesterday, Apple Inc. unveiled three new iPod portable music players, as well as an upgraded Apple TV system. Apple also announced updates for its iTunes software and iOS mobile operating system. The annual event started at 10 a.m. PDT (1700 UTC ) in the Yerba Buena Center for the Arts in San Francisco, California. Apple CEO Steve Jobs, who led yesterday's keynote speech at the event, was dressed in his typical black long-sleeved shirt, blue jeans, and tennis shoes. He began by discussing new international Apple Stores , an update to the company's iOS mobile operating system, and the release of a new gaming app, Game Center . Jobs then turned his attention to what he called the \"entr\u00e9e\" of the day. Apple will release new versions of its iPod Shuffle, iPod Nano, and iPod Touch lines next week in what Jobs called \"the biggest change in the iPod line ever.\" The iPod Shuffle's VoiceOver capabilities have been extended to playlists, meaning that it will now be able to read off the names of songs, artists, and playlists. The new device is priced at US$49. Jobs also showed off the company's new iPod Nano. The Nano, now smaller and without a click wheel, features a new multi-touch screen that allows users to touch virtual buttons to control the device. The new design is 42 percent lighter and 46 percent smaller, but still includes functions on previous Nanos, such as an FM radio and a pedometer. The 8 GB version will cost US$149, while the 16 GB version will be priced at US$179. Jobs announced an updated iPod Touch as well, an announcement that had been widely expected for some time. The new, thinner Touch has been upgraded with features matching some already on the company's recently-released iPhone 4, including the high-resolution \"Retina\" display and dual video cameras. One camera, located on the back the of the iPod Touch, is for recording video, while the other camera, located on the front, is for use with Apple's FaceTime video calling program. FaceTime allows users of the latest iPhone and iPod Touch models to conduct video chats with each other over Wi-Fi networks. The iPod Touch starts at US$229 for a 8 GB model, US$299 for 32 GB, and US$399 for 64 GB. Another major product refresh unveiled yesterday was the Apple TV. The digital media receiver was first released in 2007, but was never very popular. Jobs even admitted that, although Apple has \"sold a lot of them, they've never been a huge hit. \" The US$99 second-generation Apple TV is both smaller and cheaper than its predecessor, which was priced at US$229. The new version will let consumers stream content from online sources, including Netflix, and rent both movies and television shows. Apple has made a deal with Fox and ABC to let users rent episodes of shows for 99 \u00a2, instead of buying programs. \"We think the rest of the studios will see the light and get on board with this pretty fast,\" added Jobs. High-definition movies can be rented for US 4.99, and the new Apple TV will be available for purchase in around four weeks. Among the less-hyped updates was one to AirPlay , previously named AirTunes. AirPlay lets users stream music, photos, and videos from iOS devices to other Wi-Fi-enabled systems. AirPlay would let a video on an iPad be played on a television via Apple TV. Along with an iOS update came one for Apple's online music store application, iTunes. The biggest news involving iTunes 10, which is available for download now, is Apple's new music-based social network, Ping . \"It is sort of like Facebook and Twitter meet iTunes,\" described Jobs. \"It is not Facebook. It is not Twitter. It is something else we've come up with. It's all about music.\" Built into iTunes, Ping allows a user to follow both friends and artists to find new music and concert tours, and anyone with an iTunes account will be able to access Ping upon updating to iTunes 10. Ping will have settings for privacy as well, giving users the option to approve followers. Jobs also introduced a new iTunes logo, which does not include an image of a CD on it because music sales on iTunes are expected to overtake CD sales soon. Jobs concluded the event by bringing out Chris Martin , a member of the award-winning band Coldplay . Martin, who played a few songs on the piano, including the hit song \" Yellow ,\" jokingly called his performance \"the toughest closing gig I've ever had.\" Although many of yesterday's announcements had been predicted ahead of time, some had speculated that Apple would go even further. Apple defied expectations of a new cloud-based music service. They also did not extend the amount of time a buyer could sample music on iTunes, as some had guessed.", "after_revision": "In a music-themed media event yesterday, Apple Inc. unveiled three new portable music players, as well as an upgraded system. Apple also announced updates for its software and mobile operating system. The annual event started at 10 a.m. (1700 ) in the in San Francisco, California. Apple Steve Jobs, who led yesterday's keynote speech at the event, was dressed in his typical black long-sleeved shirt, blue jeans, and tennis shoes. He began by discussing new international , an update to the company's iOS mobile operating system, and the release of a new gaming app, . Jobs then turned his attention to what he called the \"entr\u00e9e\" of the day. Apple will release new versions of its , , and lines next week in what Jobs called \"the biggest change in the iPod line ever.\" The iPod Shuffle's capabilities have been extended to playlists, meaning that it will now be able to read off the names of songs, artists, and playlists. The new device is priced at 49. Jobs also showed off the company's new iPod Nano. The Nano, now smaller and without a , features a new screen that allows users to touch virtual buttons to control the device. The new design is 42 percent lighter and 46 percent smaller, but still includes functions on previous Nanos, such as an and a . The 8 version will cost US$149, while the 16 GB version will be priced at US$179. Jobs announced an updated iPod Touch as well, an announcement that had been widely expected for some time. The new, thinner Touch has been upgraded with features matching some already on the company's recently-released , including the and dual video cameras. One camera, located on the back the of the iPod Touch, is for recording video, while the other camera, located on the front, is for use with Apple's program. FaceTime allows users of the latest iPhone and iPod Touch models to conduct video chats with each other over networks. The iPod Touch starts at US$229 for a 8 GB model, US$299 for 32 GB, and US$399 for 64 GB. Another major product refresh unveiled yesterday was the Apple TV. The was first released in 2007, but was never very popular. Jobs even admitted that, although Apple has \"sold a lot of them, they've never been a huge hit.\" The US$ 99 second-generation Apple TV is both smaller and cheaper than its predecessor, which was priced at US$229. The new version will let consumers stream content from online sources, including , and rent both movies and television shows. Apple has made a deal with and to let users rent episodes of shows for 99, instead of buying programs. \"We think the rest of the studios will see the light and get on board with this pretty fast,\" added Jobs. movies can be rented for US$ 4.99, and the new Apple TV will be available for purchase in around four weeks. Among the less-hyped updates was one to , previously named AirTunes. AirPlay lets users stream music, photos, and videos from iOS devices to other Wi-Fi-enabled systems. AirPlay would let a video on an be played on a television via Apple TV. Along with an iOS update came one for Apple's online music store application, iTunes. The biggest news involving iTunes 10, which is available for download now, is Apple's new music-based social network, . \"It is sort of like Facebook and Twitter meet iTunes,\" described Jobs. \"It is not Facebook. It is not Twitter. It is something else we've come up with. It's all about music.\" Built into iTunes, Ping allows a user to follow both friends and artists to find new music and concert tours, and anyone with an iTunes account will be able to access Ping upon updating to iTunes 10. Ping will have settings for privacy as well, giving users the option to approve followers. Jobs also introduced a new iTunes logo, which does not include an image of a CD on it because music sales on iTunes are expected to overtake CD sales soon. Jobs concluded the event by bringing out , a member of the award-winning band . Martin, who played a few songs on the piano, including the hit song \" ,\" jokingly called his performance \"the toughest closing gig I've ever had.\" Although many of yesterday's announcements had been predicted ahead of time, some had speculated that Apple would go even further. Apple defied expectations of a new music service. They also did not extend the amount of time a buyer could sample music on iTunes, as some had guessed.", "edit_actions": [{"type": "D", "before": "iPod", "after": null, "start_char_pos": 71, "end_char_pos": 75}, {"type": "D", "before": "Apple TV", "after": null, "start_char_pos": 123, "end_char_pos": 131}, {"type": "R", "before": "iTunes software and iOS", "after": "software and", "start_char_pos": 177, "end_char_pos": 200}, {"type": "D", "before": "PDT", "after": null, "start_char_pos": 262, "end_char_pos": 265}, {"type": "D", "before": "UTC", "after": null, "start_char_pos": 272, "end_char_pos": 275}, {"type": "D", "before": "Yerba Buena Center for the Arts", "after": null, "start_char_pos": 285, "end_char_pos": 316}, {"type": "D", "before": "CEO", "after": null, "start_char_pos": 353, "end_char_pos": 356}, {"type": "D", "before": "Apple Stores", "after": null, "start_char_pos": 542, "end_char_pos": 554}, {"type": "D", "before": "Game Center", "after": null, "start_char_pos": 650, "end_char_pos": 661}, {"type": "R", "before": "iPod Shuffle, iPod Nano, and iPod Touch", "after": ", , and", "start_char_pos": 777, "end_char_pos": 816}, {"type": "D", "before": "VoiceOver", "after": null, "start_char_pos": 916, "end_char_pos": 925}, {"type": "R", "before": "US$49. Jobs also showed off the company's new iPod Nano. The Nano, now smaller and without a click wheel, features a new multi-touch screen that allows users to touch virtual buttons to control the device. The new design is 42 percent lighter and 46 percent smaller, but still includes functions on previous Nanos, such as an FM radio and a pedometer. The 8 GB version will cost US$149, while the 16 GB version will be priced at US$179. Jobs announced an updated iPod Touch as well, an announcement that had been widely expected for some time. The new, thinner Touch has been upgraded with features matching some already on the company's recently-released iPhone 4, including the high-resolution \"Retina\" display and dual video cameras. One camera, located on the back the of the iPod Touch, is for recording video, while the other camera, located on the front, is for use with Apple's FaceTime video calling program. FaceTime allows users of the latest iPhone and iPod Touch models to conduct video chats with each other over Wi-Fi networks. The iPod Touch starts at US$229 for a 8 GB model, US$299 for 32 GB, and US$399 for 64 GB.", "after": "49.", "start_char_pos": 1089, "end_char_pos": 2221}, {"type": "R", "before": "Another major product refresh unveiled yesterday was the Apple TV. The digital media receiver was first released in 2007, but was never very popular. Jobs even admitted that, although Apple has \"sold a lot of them, they've never been a huge hit. \" The US$99 second-generation Apple TV is both smaller and cheaper than its predecessor, which was priced at US$229. The new version will let consumers stream content from online sources, including Netflix, and rent both movies and television shows. Apple has made a deal with Fox and ABC to let users rent episodes of shows for", "after": "Jobs also showed off the company's new iPod Nano. The Nano, now smaller and without a , features a new screen that allows users to touch virtual buttons to control the device. The new design is 42 percent lighter and 46 percent smaller, but still includes functions on previous Nanos, such as an and a . The 8 version will cost US$149, while the 16 GB version will be priced at US$179.", "start_char_pos": 2222, "end_char_pos": 2796}, {"type": "A", "before": null, "after": "Jobs announced an updated iPod Touch as well, an announcement that had been widely expected for some time. The new, thinner Touch has been upgraded with features matching some already on the company's recently-released , including the and dual video cameras. One camera, located on the back the of the iPod Touch, is for recording video, while the other camera, located on the front, is for use with Apple's program. FaceTime allows users of the latest iPhone and iPod Touch models to conduct video chats with each other over networks. The iPod Touch starts at US$229 for a 8 GB model, US$299 for 32 GB, and US$399 for 64 GB. Another major product refresh unveiled yesterday was the Apple TV. The was first released in 2007, but was never very popular. Jobs even admitted that, although Apple has \"sold a lot of them, they've never been a huge hit.\" The US$", "start_char_pos": 2797, "end_char_pos": 2797}, {"type": "R", "before": "\u00a2, instead of buying programs. \"We think the rest of the studios will see the light and get on board with this pretty fast,\" added Jobs. High-definition movies can be rented for US", "after": "second-generation Apple TV is both smaller and cheaper than its predecessor, which was priced at US$229. The new version will let consumers stream content from online sources, including , and rent both movies and television shows. Apple has made a deal with and to let users rent episodes of shows for 99, instead of buying programs. \"We think the rest of the studios will see the light and get on board with this pretty fast,\" added Jobs. movies can be rented for US$", "start_char_pos": 2801, "end_char_pos": 2981}, {"type": "D", "before": "AirPlay", "after": null, "start_char_pos": 3102, "end_char_pos": 3109}, {"type": "D", "before": "iPad", "after": null, "start_char_pos": 3272, "end_char_pos": 3276}, {"type": "D", "before": "Ping", "after": null, "start_char_pos": 3521, "end_char_pos": 3525}, {"type": "D", "before": "Chris Martin", "after": null, "start_char_pos": 4191, "end_char_pos": 4203}, {"type": "D", "before": "Coldplay", "after": null, "start_char_pos": 4241, "end_char_pos": 4249}, {"type": "D", "before": "Yellow", "after": null, "start_char_pos": 4322, "end_char_pos": 4328}, {"type": "D", "before": "cloud-based", "after": null, "start_char_pos": 4572, "end_char_pos": 4583}], "sents_char_pos": [0, 139, 225, 346, 500, 737, 896, 1060, 1145, 1294, 1440, 1632, 1825, 2006, 2131, 2221, 2288, 2371, 2467, 2584, 2717, 2831, 2937, 3061, 3138, 3239, 3316, 3402, 3598, 3619, 3638, 3679, 3702, 3902, 3993, 4149, 4251, 4405, 4536, 4598]}
+{"doc_id": "203779", "revision_depth": "1", "before_revision": "Scottish and Southern Energy's Slough power station . Gareth Kloet, Head of Utilities at Confused.com , welcomed the inquiry into four of Britain's leading energy providers, including Scottish and Southern Energy. \"It is unacceptable for energy companies to mislead customers like this,\" he said. The Office of Gas and Electricity Markets (Ofgem), the regulator of the electricity and gas markets in Great Britain, has launched an investigation into four of the largest British energy suppliers over suspicions that they not be complying with face-to-face and telephone sales regulations. The four organisations facing scrutiny could be fined up to 10\\% of their annual turnover if it is found that they are breaking sales regulations. Scottish Power, npower, Scottish and Southern Energy and EDF Energy are all to face questioning by the organisation. New regulations on sales tactics by energy suppliers were recently introduced, and, Ofgem has said, energy suppliers must be \"proactive in preventing misselling to customers both face to face and over the phone. Also, if suppliers are selling contracts face to face they must provide customers with an estimate before any sales are concluded. In most circumstances customers should also receive a comparison of the supplier\u2019s offer with their current deal.\" Only one in five consumers consider energy suppliers to be trustworthy, and 61\\% of people feel intimidated by doorstep sales people from energy companies. According to the organisation Consumer Focus , \"complaints have declined since new rules came into effect this year, but suppliers still seem to be flouting the rules. Some customers are still being given misleading quotes and information, which leave them worse off when they switch provider.\" The newspaper The Guardian has reported that \"householders are reporting that sales agents working for the energy suppliers are giving them misleading information and quotes which leave them worse off when they switch supplier.\" Consumer Focus has said that if energy companies continue to break the rules, they could be banned from doorstep-selling completely. The report goes on to say that \"new figures from helpline Consumer Direct show that while the number of complaints has fallen since last year, about 200 cases of mis-selling are being reported each month.\" However, Scottish Power said it insists on \u201cthe highest standards possible for all of our sales agents\u201d, and npower told the Financial Times that it was \u201cconfident that the processes we have in place mean that we comply with our regulatory obligations\u201d. EDF added that it was \u201cfully compliant with all obligations regarding sales of energy contracts\u201d. Head of energy at Consumer Focus, Audrey Gallacher, called the investigation \"a welcome step ... to address years of customers getting a bad deal on energy prices on their doorstep. While many doorstep sales people will do a good job, the pay and rewards system continues to encourage mis-selling, despite years of regulation and voluntary initiatives. If better advice for customers and enforcement of the tougher rules doesn't end the flagrant abuse of this form of selling the big question will be whether it should be completely banned.\" Christine McGourty, director of Energy UK , which represents the leading gas and electricity companies, said that \"the companies involved will collaborate with the Ofgem investigation and are awaiting further details from the regulator. Any sales agent in breach of the code will be struck off the approved energy sales register.\" Which? chief executive, Peter Vicary-Smith, has said he considers the situation \u201cshocking\", saying that the investigation \"will do nothing to improve consumer trust in energy suppliers. We're pleased that Ofgem has promised tough measures against any firms guilty of mis-selling. We hope it uses this opportunity to tighten rules around telesales so they are in line with those for face to face sales.\" SNP Westminster Energy spokesperson Mike Weir MP , however, said that the investigation \"does nothing to tackle the real problem of fuel prices which leave many Scots facing great difficulty in heating their homes ... Rather than tinkering around the edges Ofgem should be looking at how to reduce prices for vulnerable households.\" Gareth Kloet, Head of Utilities at Confused.com , one of the UK\u2019s biggest and most popular price comparison services, also welcomed the inquiry. \"It is unacceptable for energy companies to mislead customers like this,\" he said, adding that Confused.com has previously \"urged energy providers to either stop the practice of doorstep selling or make it very clear to households that better deals are available online. There is no reason why door-to-door salesmen can\u2019t show people online deals and even help households switch to them.\u201d", "after_revision": "'s . Gareth Kloet, Head of Utilities at , welcomed the inquiry into four of Britain's leading energy providers, including Scottish and Southern Energy. \"It is unacceptable for energy companies to mislead customers like this,\" he said. The (Ofgem), the regulator of the and markets in Great Britain, has launched an investigation into four of the largest British energy suppliers over suspicions that they not be complying with face-to-face and telephone sales regulations. The four organisations facing scrutiny could be fined up to 10\\% of their annual turnover if it is found that they are breaking sales regulations. , , and are all to face questioning by the organisation. New regulations on sales tactics by energy suppliers were recently introduced, and, Ofgem has said, energy suppliers must be \"proactive in preventing misselling to customers both face to face and over the phone. Also, if suppliers are selling contracts face to face they must provide customers with an estimate before any sales are concluded. In most circumstances customers should also receive a comparison of the supplier\u2019s offer with their current deal.\" Only one in five consumers consider energy suppliers to be trustworthy, and 61\\% of people feel intimidated by doorstep sales people from energy companies. According to the organisation , \"complaints have declined since new rules came into effect this year, but suppliers still seem to be flouting the rules. Some customers are still being given misleading quotes and information, which leave them worse off when they switch provider.\" The newspaper has reported that \"householders are reporting that sales agents working for the energy suppliers are giving them misleading information and quotes which leave them worse off when they switch supplier.\" Consumer Focus has said that if energy companies continue to break the rules, they could be banned from doorstep-selling completely. The report goes on to say that \"new figures from helpline show that while the number of complaints has fallen since last year, about 200 cases of mis-selling are being reported each month.\" However, Scottish Power said it insists on \u201cthe highest standards possible for all of our sales agents\u201d, and npower told the that it was \u201cconfident that the processes we have in place mean that we comply with our regulatory obligations\u201d. EDF added that it was \u201cfully compliant with all obligations regarding sales of energy contracts\u201d. Head of energy at Consumer Focus, Audrey Gallacher, called the investigation \"a welcome step ... to address years of customers getting a bad deal on energy prices on their doorstep. While many doorstep sales people will do a good job, the pay and rewards system continues to encourage mis-selling, despite years of regulation and voluntary initiatives. If better advice for customers and enforcement of the tougher rules doesn't end the flagrant abuse of this form of selling the big question will be whether it should be completely banned.\" Christine McGourty, director of , which represents the leading gas and electricity companies, said that \"the companies involved will collaborate with the Ofgem investigation and are awaiting further details from the regulator. Any sales agent in breach of the code will be struck off the approved energy sales register.\" chief executive, Peter Vicary-Smith, has said he considers the situation \u201cshocking\", saying that the investigation \"will do nothing to improve consumer trust in energy suppliers. We're pleased that Ofgem has promised tough measures against any firms guilty of mis-selling. We hope it uses this opportunity to tighten rules around telesales so they are in line with those for face to face sales.\" Westminster Energy spokesperson , however, said that the investigation \"does nothing to tackle the real problem of fuel prices which leave many Scots facing great difficulty in heating their homes ... Rather than tinkering around the edges Ofgem should be looking at how to reduce prices for vulnerable households.\" Gareth Kloet, Head of Utilities at , one of the UK\u2019s biggest and most popular price comparison services, also welcomed the inquiry. \"It is unacceptable for energy companies to mislead customers like this,\" he said, adding that Confused.com has previously \"urged energy providers to either stop the practice of doorstep selling or make it very clear to households that better deals are available online. There is no reason why door-to-door salesmen can\u2019t show people online deals and even help households switch to them.\u201d", "edit_actions": [{"type": "R", "before": "Scottish and Southern Energy's Slough power station", "after": "'s", "start_char_pos": 0, "end_char_pos": 51}, {"type": "D", "before": "Confused.com", "after": null, "start_char_pos": 89, "end_char_pos": 101}, {"type": "D", "before": "Office of Gas and Electricity Markets", "after": null, "start_char_pos": 301, "end_char_pos": 338}, {"type": "R", "before": "electricity and gas", "after": "and", "start_char_pos": 369, "end_char_pos": 388}, {"type": "R", "before": "Scottish Power, npower, Scottish and Southern Energy and EDF Energy", "after": ", , and", "start_char_pos": 736, "end_char_pos": 803}, {"type": "D", "before": "Consumer Focus", "after": null, "start_char_pos": 1497, "end_char_pos": 1511}, {"type": "D", "before": "The Guardian", "after": null, "start_char_pos": 1776, "end_char_pos": 1788}, {"type": "D", "before": "Consumer Direct", "after": null, "start_char_pos": 2182, "end_char_pos": 2197}, {"type": "D", "before": "Financial Times", "after": null, "start_char_pos": 2455, "end_char_pos": 2470}, {"type": "D", "before": "Energy UK", "after": null, "start_char_pos": 3256, "end_char_pos": 3265}, {"type": "D", "before": "Which?", "after": null, "start_char_pos": 3555, "end_char_pos": 3561}, {"type": "D", "before": "SNP", "after": null, "start_char_pos": 3958, "end_char_pos": 3961}, {"type": "D", "before": "Mike Weir MP", "after": null, "start_char_pos": 3994, "end_char_pos": 4006}, {"type": "D", "before": "Confused.com", "after": null, "start_char_pos": 4326, "end_char_pos": 4338}], "sents_char_pos": [0, 213, 296, 588, 735, 852, 1064, 1195, 1310, 1466, 1634, 1761, 2123, 2329, 2583, 2681, 2863, 3034, 3223, 3460, 3554, 3740, 3834, 3957, 4175, 4435, 4706]}
+{"doc_id": "20623", "revision_depth": "1", "before_revision": "|Hundreds of buses sit damaged after the flood New Orleans' Mayor Ray Nagin is facing strong criticism over the evacuation of citizens before Hurricane Katrina struck. No charges of criminal negligence have yet been issued; but his lack of action did get people killed. In the days leading up to Hurricane Katrina, 500+ buses were sitting in school district parking lots and municipal bus yards, some less than a mile from the Superdome. Louisiana Governor Kathleen Babineaux Blanco commented, \"The buses could have evacuated an estimated 20,000 people if they had been used for emergency evacuations which President Bush had declared two days before Katrina hit.\", President Bush, if he would have known how unprepared New Orleans really was, could have imposed marshal law and ordered much more complete evacuations; unfortunately he did not. A so called \"mandatory\" evacuation was ordered by Mayor Nagin Saturday 28 August 2005. One day before the hurricane hit. About 400, 000 successfully evacuated by personal vehicles. Thursdayand Friday Sept 1, 2 D+4 , 5 after the storm, Governor Blanco by executive order finally secured school buses from other parts of Louisiana. Houston sent 150 school buses and 500 buses were secured by FEMA for the two day evacuation. The 2000 edition of the southeast Louisiana evacuation plan on page 13, paragraph 5 states: 5. The primary means of hurricane evacuation will be personal vehicles. School and municipal buses, government-owned vehicles and vehicles provided by volunteer agencies may be used to provide transportation for individuals who lack transportation and require assistance in evacuating. Mayor Nagin ignored this evacuation plan. Apparently ignoring, like the governor, the fact that his city was in considerable risk of flooding for a storm this large . The Superdome had been opened shortly before the storm as a shelter of \"last resort \" for those who had not evacuated. There were no supplies prepositioned at this location or the conference center. People were requested to bring their own water and food for up to three days--most apparently did not . At the last moment 90,000 bottles of water and 47,000 MRE's were secured by the Red Cross and delivered by the Louisiana National Guard which had initially about 150 members there preforming security duties. Both the supplies and the number of troops were grossly inadequate. Roughly 60,000-150 ,000 people did not evacuate from the city. Serious shooting and looting broke out before the wind had fully died down. According to WWLTV, during a news conference on Sunday before the hurricane struck, Mayor Nagin claimed he \"could and would commandeer any property or vehicle it deemed necessary to provide safe shelter or transport for those in need\". Obviously he did not; about 500 OPSB school and NORTA municipal busses are clearly shown drowned in flood waters in New Orleans. Mayor Nagin and the Orleans Parish School Board had been negotiating, aparently unsuccessfully, at least since June to use OPSB buses and drivers in an emergency. After the huricane the communications were not available to contact the drivers of any of those buses to place them into service or save them from being drowned. They had not even been pre positioned on high ground in case of flooding. Indeed, there is no evidence this was ever planned for or even attempted. Ironically the Louisiana National Guard had prepositioned boats and high water trucks at its Jackson Barracks headquarters 6400 Saint Claude Ave New Orleans%DIFDELCMD < ] %%% in New Orleans for emergency use after the hurricane. When the Industrial Canal Levee broke Jackson Barracks was soon under fifteen feet of water and the National Guard Soldiers there had to scramble for their lives. FEMA is NOT a first responder and normally would have had very little do with evacuation arrangements depending upon the the city and state to have worked that out . Theoretically the declaration of a state of emergency on August 26 gave Nagin the right under Louisiana law to commandeer all these buses for the duration of the emergency. Whether he knew this or not is unclear. The failure to issue a timely evacuation order and use the buses in effect made it physically impossible to easily evacuate the disabled, the nursing homes, hospitals, and those without automobiles . After the fact this evacuation had to be preformed with helicopter, boat, truck and anything else that could get through the flood waters or fly over them. How many people died by this tragic lack of foresight and planning is unknown .", "after_revision": "|Hundreds of buses sit damaged after the flood New Orleans' Mayor Ray Nagin is facing criticism over the evacuation of citizens before Hurricane Katrina struck. In the days leading up to Hurricane Katrina, hundreds of buses were sitting in bus yards, some less than a mile from the Superdome. Louisiana Governor Kathleen Babineaux Blanco commented, \"The buses could have saved an estimated 20,000 people if they had been used for emergency evacuations which President Bush had declared two days before Katrina hit.\", however the evacuation was ordered by Mayor Nagin , President Bush having no direct authority to order evacuations. Thursday, after the storm, Blanco by executive order used school buses for evacuation. The 2000 edition of the southeast Louisiana evacuation plan on page 13, paragraph 5 states: 5. The primary means of hurricane evacuation will be personal vehicles. School and municipal buses, government-owned vehicles and vehicles provided by volunteer agencies may be used to provide transportation for individuals who lack transportation and require assistance in evacuating. There were however alternative emergency plans, including ones held by state Homeland Security offices, and it is unclear which one was being operated to . The Superdome had been opened shortly before the storm as a shelter of last resort for those who had not evacuated. As FEMA observed at that time: \"Most residents have evacuated the city and those left behind do not have transportation or have special needs.\" Roughly 150 ,000 people were not evacuated from the city. During the Hurricane Ivan evacuation 600,000 people failed to evacute the city. According to WWLTV, during a news conference on Sunday before the hurricane struck, Mayor Nagin claimed he \"could and would commandeer any property or vehicle it deemed necessary to provide safe shelter or transport for those in need\". However photos circulated appear to show unused school and privately owned busses left stranded in flood waters . It is unclear whether Mayor Nagin knew these particular buses existed, since the Orleans Parish School Board is not under his jurisdiction and his office would not normally know the location of OPSB bus yards or be able to contact the drivers of those buses to place them into service %DIFDELCMD < ] %%% . Normally it is the job of FEMA to coordinate between the various local jurisdictions such as the OPSB and the City of New Orleans in this case. That is, under the rules of prior hurricane responses, FEMA would ask all local jurisdictions for a list of resources under their control. Then FEMA would have taken a request from Nagin for buses, relayed it to the Orleans Parish School Board or other local jurisdictions which had buses, and at that point the OPSB would have provided the buses to Nagin. That coordination did not happen here, but it is unclear whether Nagin ever made such a request prior to the hurricane and after the hurricane they were underwater and useless . However, if he had known about them, the declaration of a state of emergency on August 26 gave him the right under Louisiana law to commandeer them for the duration of the emergency. The failure to issue a timely evacuation order in effect made it physically impossible to evacuate the nursing homes, hospitals, and those without automobiles .", "edit_actions": [{"type": "D", "before": "strong", "after": null, "start_char_pos": 86, "end_char_pos": 92}, {"type": "D", "before": "No charges of criminal negligence have yet been issued; but his lack of action did get people killed.", "after": null, "start_char_pos": 168, "end_char_pos": 269}, {"type": "R", "before": "500+", "after": "hundreds of", "start_char_pos": 315, "end_char_pos": 319}, {"type": "D", "before": "school district parking lots and municipal", "after": null, "start_char_pos": 342, "end_char_pos": 384}, {"type": "R", "before": "evacuated", "after": "saved", "start_char_pos": 516, "end_char_pos": 525}, {"type": "R", "before": "President Bush, if he would have known how unprepared New Orleans really was, could have imposed marshal law and ordered much more complete evacuations; unfortunately he did not. A so called \"mandatory\"", "after": "however the", "start_char_pos": 666, "end_char_pos": 868}, {"type": "D", "before": "Saturday 28 August 2005. One day before the hurricane hit. About 400, 000 successfully evacuated by personal vehicles. Thursdayand Friday", "after": null, "start_char_pos": 907, "end_char_pos": 1044}, {"type": "D", "before": "Sept 1, 2 D+4", "after": null, "start_char_pos": 1045, "end_char_pos": 1058}, {"type": "R", "before": "5", "after": "President Bush having no direct authority to order evacuations. Thursday,", "start_char_pos": 1061, "end_char_pos": 1062}, {"type": "D", "before": "Governor", "after": null, "start_char_pos": 1080, "end_char_pos": 1088}, {"type": "R", "before": "finally secured school buses from other parts of Louisiana. Houston sent 150 school buses and 500 buses were secured by FEMA for the two day", "after": "used school buses for", "start_char_pos": 1115, "end_char_pos": 1255}, {"type": "R", "before": "Mayor Nagin ignored this evacuation plan. Apparently ignoring, like the governor, the fact that his city was in considerable risk of flooding for a storm this large", "after": "There were however alternative emergency plans, including ones held by state Homeland Security offices, and it is unclear which one was being operated to", "start_char_pos": 1646, "end_char_pos": 1810}, {"type": "R", "before": "\"last resort \"", "after": "last resort", "start_char_pos": 1884, "end_char_pos": 1898}, {"type": "R", "before": "There were no supplies prepositioned at this location or the conference center. People were requested to bring their own water and food for up to three days--most apparently did not . At the last moment 90,000 bottles of water and 47,000 MRE's were secured by the Red Cross and delivered by the Louisiana National Guard which had initially about", "after": "As FEMA observed at that time: \"Most residents have evacuated the city and those left behind do not have transportation or have special needs.\" Roughly", "start_char_pos": 1932, "end_char_pos": 2277}, {"type": "D", "before": "members there preforming security duties. Both the supplies and the number of troops were grossly inadequate. Roughly 60,000-150", "after": null, "start_char_pos": 2282, "end_char_pos": 2410}, {"type": "A", "before": null, "after": "people were not evacuated from the city. During the Hurricane Ivan evacuation 600,000", "start_char_pos": 2416, "end_char_pos": 2416}, {"type": "R", "before": "did not evacuate from", "after": "failed to evacute", "start_char_pos": 2424, "end_char_pos": 2445}, {"type": "D", "before": "Serious shooting and looting broke out before the wind had fully died down.", "after": null, "start_char_pos": 2456, "end_char_pos": 2531}, {"type": "R", "before": "Obviously he did not; about 500 OPSB school and NORTA municipal busses are clearly shown drowned", "after": "However photos circulated appear to show unused school and privately owned busses left stranded", "start_char_pos": 2768, "end_char_pos": 2864}, {"type": "R", "before": "in New Orleans. Mayor Nagin and", "after": ".", "start_char_pos": 2881, "end_char_pos": 2912}, {"type": "A", "before": null, "after": "It is unclear whether Mayor Nagin knew these particular buses existed, since", "start_char_pos": 2913, "end_char_pos": 2913}, {"type": "R", "before": "had been negotiating, aparently unsuccessfully, at least since June to use OPSB buses and drivers in an emergency. After the huricane the communications were not available", "after": "is not under his jurisdiction and his office would not normally know the location of OPSB bus yards or be able", "start_char_pos": 2946, "end_char_pos": 3117}, {"type": "D", "before": "any of", "after": null, "start_char_pos": 3144, "end_char_pos": 3150}, {"type": "D", "before": "or save them from being drowned. They had not even been pre positioned on high ground in case of flooding. Indeed, there is no evidence this was ever planned for or even attempted. Ironically the Louisiana National Guard had prepositioned boats and high water trucks at its Jackson Barracks headquarters", "after": null, "start_char_pos": 3190, "end_char_pos": 3493}, {"type": "D", "before": "6400 Saint Claude Ave New Orleans", "after": null, "start_char_pos": 3494, "end_char_pos": 3527}, {"type": "R", "before": "in New Orleans for emergency use after the hurricane. When the Industrial Canal Levee broke Jackson Barracks was soon under fifteen feet of water and the National Guard Soldiers there had to scramble for their lives. FEMA is NOT a first responder and normally would have had very little do with evacuation arrangements depending upon the", "after": ". Normally it is", "start_char_pos": 3546, "end_char_pos": 3883}, {"type": "R", "before": "city and state to have worked that out", "after": "job of FEMA to coordinate between the various local jurisdictions such as the OPSB and the City of New Orleans in this case. That is, under the rules of prior hurricane responses, FEMA would ask all local jurisdictions for a list of resources under their control. Then FEMA would have taken a request from Nagin for buses, relayed it to the Orleans Parish School Board or other local jurisdictions which had buses, and at that point the OPSB would have provided the buses to Nagin. That coordination did not happen here, but it is unclear whether Nagin ever made such a request prior to the hurricane and after the hurricane they were underwater and useless", "start_char_pos": 3888, "end_char_pos": 3926}, {"type": "R", "before": "Theoretically", "after": "However, if he had known about them,", "start_char_pos": 3929, "end_char_pos": 3942}, {"type": "R", "before": "Nagin", "after": "him", "start_char_pos": 4001, "end_char_pos": 4006}, {"type": "R", "before": "all these buses", "after": "them", "start_char_pos": 4051, "end_char_pos": 4066}, {"type": "D", "before": "Whether he knew this or not is unclear.", "after": null, "start_char_pos": 4102, "end_char_pos": 4141}, {"type": "D", "before": "and use the buses", "after": null, "start_char_pos": 4189, "end_char_pos": 4206}, {"type": "R", "before": "easily evacuate the disabled, the", "after": "evacuate the", "start_char_pos": 4250, "end_char_pos": 4283}, {"type": "D", "before": ". After the fact this evacuation had to be preformed with helicopter, boat, truck and anything else that could get through the flood waters or fly over them. How many people died by this tragic lack of foresight and planning is unknown", "after": null, "start_char_pos": 4340, "end_char_pos": 4575}], "sents_char_pos": [0, 167, 223, 269, 437, 818, 844, 931, 965, 1025, 1174, 1267, 1362, 1431, 1645, 1687, 1812, 1931, 2011, 2115, 2323, 2391, 2455, 2531, 2767, 2789, 2896, 3060, 3222, 3296, 3370, 3599, 3762, 3928, 4101, 4141, 4497]}
+{"doc_id": "207604", "revision_depth": "1", "before_revision": "170px|McKinley while with the Denver Broncos in 2009 Kenny McKinley , an American football player for the Denver Broncos , has been found dead at the age of 23. The wide receiver was found dead in the master bedroom of his home in the Denver suburbs. The cause of death is suspected to be suicide by a self-inflicted gunshot to the head. President and CEO of the Denver Broncos Pat Bowlen released a statement about McKinley's death on the Broncos' official website. He said \"Everyone with the Broncos is shocked and saddened by the loss of Kenny McKinley. He was part of the Broncos family and will be greatly missed by our organization. My most heartfelt condolences go out to Kenny's family and friends.\" Andrew Bondarowicz, McKinley's agent, said McKinley had been visiting family in Atlanta and had only shortly returned to Denver at the time of his death. Originally from South Carolina , McKinley was selected in the fifth round of the 2009 NFL Draft . In college, he became only the 12th player in SEC history to collect more than 2,700 receiving yards. McKinley has become the third young Broncos player to die in recent years. Darrent Williams was shot dead on New Year's Eve in 2007 and Damien Nash died after he collapsed during a charity basketball game a month later. ESPN's Adam Schefter said on his twitter page \"No NFL team has been hit harder than Denver. Darrent Williams, Damien Nash. Kenny McKinley. RIP.\"", "after_revision": "170px|McKinley while with the in 2009 , an American football player for the , has been found dead at the age of 23. The was found dead in the master bedroom of his home in the Denver suburbs. The cause of death is suspected to be suicide by a self-inflicted gunshot to the head. President and CEO of the Denver Broncos released a statement about McKinley's death on the Broncos' official website. He said \"Everyone with the Broncos is shocked and saddened by the loss of Kenny McKinley. He was part of the Broncos family and will be greatly missed by our organization. My most heartfelt condolences go out to Kenny's family and friends.\" Andrew Bondarowicz, McKinley's agent, said McKinley had been visiting family in and had only shortly returned to Denver at the time of his death. Originally from , McKinley was selected in the fifth round of the . In college, he became only the 12th player in history to collect more than 2,700 receiving yards. McKinley has become the third young Broncos player to die in recent years. was shot dead on New Year's Eve in 2007 and died after he collapsed during a charity basketball game a month later. 's said on his page \"No NFL team has been hit harder than Denver. Darrent Williams, Damien Nash. Kenny McKinley. RIP.\"", "edit_actions": [{"type": "D", "before": "Denver Broncos", "after": null, "start_char_pos": 30, "end_char_pos": 44}, {"type": "D", "before": "Kenny McKinley", "after": null, "start_char_pos": 53, "end_char_pos": 67}, {"type": "D", "before": "Denver Broncos", "after": null, "start_char_pos": 106, "end_char_pos": 120}, {"type": "D", "before": "wide receiver", "after": null, "start_char_pos": 165, "end_char_pos": 178}, {"type": "D", "before": "Pat Bowlen", "after": null, "start_char_pos": 378, "end_char_pos": 388}, {"type": "D", "before": "Atlanta", "after": null, "start_char_pos": 788, "end_char_pos": 795}, {"type": "D", "before": "South Carolina", "after": null, "start_char_pos": 878, "end_char_pos": 892}, {"type": "D", "before": "2009 NFL Draft", "after": null, "start_char_pos": 943, "end_char_pos": 957}, {"type": "D", "before": "SEC", "after": null, "start_char_pos": 1006, "end_char_pos": 1009}, {"type": "D", "before": "Darrent Williams", "after": null, "start_char_pos": 1137, "end_char_pos": 1153}, {"type": "D", "before": "Damien Nash", "after": null, "start_char_pos": 1198, "end_char_pos": 1209}, {"type": "R", "before": "ESPN's Adam Schefter", "after": "'s", "start_char_pos": 1282, "end_char_pos": 1302}, {"type": "D", "before": "twitter", "after": null, "start_char_pos": 1315, "end_char_pos": 1322}], "sents_char_pos": [0, 160, 250, 337, 466, 556, 638, 707, 861, 959, 1061, 1136, 1281, 1373, 1404]}
+{"doc_id": "208803", "revision_depth": "1", "before_revision": "File photo of Fernando Alonso (2010) Marina Bay Street Circuit Ferrari driver Fernando Alonso won the FIA 2010 Singapore Grand Prix from pole position owned a day before. This became his second win in Singapore since 2008 and fourth win of the season . Alonso was closely chased by Sebastian Vettel up to the finish line \u2014 both Red Bull 's were not able to catch Ferrari this weekend. Lewis Hamilton 's McLaren car broke suspension after hitting Vettel's teammate Mark Webber , racing him for third place. Another McLaren driver Jenson Button rushed to chase Webber after Hamilton found himself out of the race. Nico Rosberg once again beat his Mercedes team mate, as the seven-time world champion Michael Schumacher finished only on 13th place. Rosberg ended up 5th. Williams-Cosworth drivers Rubens Barrichello and Nico H\u00fclkenberg clinched Robert Kubica 7th place for Renault . Alonso teammate Felipe Massa started from the rear of the starting grid after setting no time in the first qualifying session stopping on the circuit. Massa then done well in the race to come 9th. Adrian Sutil owned one point for Force India finishing on the 10th place. Mark Webber now heads the Drivers' championship with 202 points, 11 points ahead of Fernando Alonso. Constructors' \u0441hampionship standings is lead by Red Bull with 383, 24 points ahead of McLaren and 67 ahead of Ferrari. Vettel's words to his team crew about the current win by Ferrari after he saw the chequered flag were \"We will get there, don't you worry\". ", "after_revision": "File photo of Fernando Alonso (2010) Marina Bay Street Circuit driver won the from pole position owned a day before. This became his second win in Singapore since 2008 and fourth win of the . Alonso was closely chased by up to the finish line \u2014 both 's were not able to catch Ferrari this weekend. 's McLaren car broke suspension after hitting Vettel's teammate , racing him for third place. Another McLaren driver rushed to chase Webber after Hamilton found himself out of the race. once again beat his team mate, as the seven-time world champion finished only on 13th place. Rosberg ended up 5th. - drivers and clinched 7th place for . Alonso teammate started from the rear of the starting grid after setting no time in the first qualifying session stopping on the circuit. Massa then done well in the race to come 9th. owned one point for finishing on the 10th place. Mark Webber now heads the Drivers' championship with 202 points, 11 points ahead of Fernando Alonso. Constructors' \u0441hampionship standings is lead by Red Bull with 383, 24 points ahead of McLaren and 67 ahead of Ferrari. Vettel's words to his team crew about the current win by Ferrari after he saw the chequered flag were \"We will get there, don't you worry\". Related news", "edit_actions": [{"type": "R", "before": "Ferrari driver Fernando Alonso won the FIA 2010 Singapore Grand Prix", "after": "driver won the", "start_char_pos": 63, "end_char_pos": 131}, {"type": "D", "before": "season", "after": null, "start_char_pos": 244, "end_char_pos": 250}, {"type": "D", "before": "Sebastian Vettel", "after": null, "start_char_pos": 282, "end_char_pos": 298}, {"type": "D", "before": "Red Bull", "after": null, "start_char_pos": 328, "end_char_pos": 336}, {"type": "D", "before": "Lewis Hamilton", "after": null, "start_char_pos": 385, "end_char_pos": 399}, {"type": "D", "before": "Mark Webber", "after": null, "start_char_pos": 464, "end_char_pos": 475}, {"type": "D", "before": "Jenson Button", "after": null, "start_char_pos": 529, "end_char_pos": 542}, {"type": "D", "before": "Nico Rosberg", "after": null, "start_char_pos": 612, "end_char_pos": 624}, {"type": "D", "before": "Mercedes", "after": null, "start_char_pos": 645, "end_char_pos": 653}, {"type": "D", "before": "Michael Schumacher", "after": null, "start_char_pos": 698, "end_char_pos": 716}, {"type": "R", "before": "Williams-Cosworth drivers Rubens Barrichello and Nico H\u00fclkenberg clinched Robert Kubica", "after": "- drivers and clinched", "start_char_pos": 768, "end_char_pos": 855}, {"type": "D", "before": "Renault", "after": null, "start_char_pos": 870, "end_char_pos": 877}, {"type": "D", "before": "Felipe Massa", "after": null, "start_char_pos": 896, "end_char_pos": 908}, {"type": "D", "before": "Adrian Sutil", "after": null, "start_char_pos": 1077, "end_char_pos": 1089}, {"type": "D", "before": "Force India", "after": null, "start_char_pos": 1110, "end_char_pos": 1121}, {"type": "A", "before": null, "after": "Related news", "start_char_pos": 1511, "end_char_pos": 1511}], "sents_char_pos": [0, 170, 252, 384, 505, 611, 745, 767, 879, 1030, 1076, 1150, 1251, 1370]}
+{"doc_id": "212064", "revision_depth": "1", "before_revision": "A United States federal court judge and Florida state court judge are enmeshed in a conflict against each other regarding a wrongful death lawsuit involving Scientology. Scientology building in Clearwater , Florida (2009) A federal judge for the United States District Court for the Middle District of Florida, Steven Douglas Merryday, ordered Pinellas County Senior Circuit Judge Robert E. Beach not to intervene regarding appearance of an attorney in a federal court case involving Scientology. Lawyer Kennan Dandar is representing the estate of Kyle Thomas Brennan in a wrongful death claim against the Scientology organization. The suit asserts that members of the Scientology organization, including the father of Brennan, removed access to the deceased's anti-depression medication, and provided him with means to utilize a loaded gun. Brennan had been staying with his father for a week prior to his death. Police in Clearwater , Florida investigated the 2007 death of Brennan, and determined it was a suicide . Kyle Brennan was himself not a member of Scientology. The lawsuit, filed in 2009, was filed by Brennan's mother on behalf of her son's estate. Named as defendants in the lawsuit include the Scientology organization, its subdivision the Flag Service Organization, twin sister of Scientology leader David Miscavige \u2013 Denise Gentile, and her husband Gerald Gentile. Attorney Dandar had previously represented the estate of Lisa McPherson in a separate civil wrongful death claim against the Scientology organization. After being under the care of members of the Scientology organization for 17 days, McPherson died in Clearwater in 1995. The wrongful death suit claimed that Scientology officials permitted McPherson to deteriorate to a dehydrated state , where her condition was such that she did not have the energy to fend off cockroaches from biting her skin. Scientology management settled the McPherson wrongful death case in 2004; lawyers representing the organization stated the settlement included a confidential arrangement with Dandar to never again represent clients in lawsuits against Scientology entities. The settlement included an agreement that both sides would never speak again about the case; California lawyer Ford Greene commented, \"The church bought silence.\" The Scientology organization had also filed a countersuit against the estate of Lisa McPherson, and named Dandar a party to that lawsuit. The organization claimed Dandar had inappropriately tried to add the head of Scientology David Miscavige as a party to the wrongful death lawsuit. Scientology legal representatives requested Judge Beach to see to it that Dandar abide by the secret settlement agreement, and Beach subsequently issued an order in June 2009 that Dandar be removed from the Brennan wrongful death case. Dandar faced sanctions from Judge Beach including suspension of Dandar's license to practice law, a US$130,000 judgement to be given to the Scientology organization, and a fine of $ 1,000 per day. Judge Beach ruled that all money from the sanctions imposed against Dandar \u2013 were to go directly to the Scientology organization. The Tampa Tribune noted that Judge Breach made his ruling, \"in an inexplicably closed hearing from which Beach tossed a St. Petersburg Times reporter\". Faced with these possible sanctions, Dandar filed an \"involuntary\" motion to withdraw from the Brennan wrongful death case in federal court, but Judge Merryday denied this request. Dandar stated to The Tampa Tribune , \"I'm stuck in the middle of two courts.\" Merryday has served as a US federal judge based in Tampa , Florida since 1992. The St. Petersburg Times noted that Judge Merryday, \"has presided over some of the region's most noteworthy cases.\" Judge Merryday's court order creating an injunction against Beach was 29-pages long, and criticized the \"stunning severity\" of Beach's sanctions imposed on Dandar. Merryday explained that the federal court needed to \"act in defense of the (federal) court's jurisdiction\", due to Beach's actions. Referencing Judge Beach, Merryday wrote in his court order, \"A judge should not undertake, directly or indirectly, overtly or through a surrogate, to compel an act by another judge, especially in a different jurisdiction.\" Judge Beach responded to Judge Merryday's injunction which \"permanently enjoined\" him from imposing sanctions on Dandar, by filing a motion on Thursday in federal court in Tampa. Beach asked Merryday to rescind his order so that he may recuse himself from acting as a judge on the Scientology case related to Dandar. Beach's motion argued that he was denied due process because he was not given notice by Merryday of the hearing which occurred before Merryday issued his ruling. In addition, Beach asserted Merryday did not have power to issue the ruling restricting him from sanctioning Dandar, because Beach was not a party to the Brennan wrongful death case, and Merryday lacked authority to restrict powers of a judge from outside his federal court jurisdiction. In response, Judge Merryday has scheduled a hearing for October 12 in federal court to hear state court judge Beach. Martin Errorl Rice is an attorney in St. Petersburg Florida who represented Beach in the motion before the US federal court. Rice stated his client's motivation in requesting the ruling by Judge Merryday be rescinded was to allow Beach to recuse from the Scientology case. Rice told the St. Petersburg Times that his client's conflict with the US federal court has \"cast kind of a cloud\" over Beach's position in the Scientology case. Stetson University College of Law constitutional law professor Michael Allen analyzed the clash between the US judge and Florida judge for The Tampa Tribune. Allen observed that it was \"very, very rare\" for a US federal judge to order a state judge. He noted that a 1793 federal law contravenes such orders \u2013 except in \"extraordinarily narrow\" cases where the federal judges are permitted to create rulings in order to safeguard the jurisdiction of their federal court proceedings. Related news ", "after_revision": "A United States federal court judge and Florida state court judge are enmeshed in a conflict against each other regarding a involving Scientology. Scientology building in , Florida (2009) A federal judge for the , , Senior Circuit Judge Robert E. Beach not to intervene regarding appearance of an attorney in a case involving Scientology. Lawyer Kennan Dandar is representing the estate of Kyle Thomas Brennan in a wrongful death claim against the Scientology organization. The suit asserts that members of the Scientology organization, including the father of Brennan, removed access to the deceased's anti-depression medication, and provided him with means to utilize a loaded gun. Brennan had been staying with his father for a week prior to his death. Police in , Florida investigated the 2007 death of Brennan, and determined it was a . Kyle Brennan was himself not a member of Scientology. The lawsuit, filed in 2009, was filed by Brennan's mother on behalf of her son's estate. Named as defendants in the lawsuit include the Scientology organization, its subdivision the Flag Service Organization, twin sister of Scientology leader \u2013 Denise Gentile, and her husband Gerald Gentile. Attorney Dandar had previously represented the estate of in a separate civil wrongful death claim against the Scientology organization. After being under the care of members of the Scientology organization for 17 days, McPherson died in Clearwater in 1995. The wrongful death suit claimed that Scientology officials permitted McPherson to deteriorate to a , where her condition was such that she did not have the energy to fend off from biting her skin. Scientology management settled the McPherson wrongful death case in 2004; lawyers representing the organization stated the included a confidential arrangement with Dandar to never again represent clients in lawsuits against Scientology entities. The settlement included an agreement that both sides would never speak again about the case; California lawyer commented, \"The church bought silence.\" The Scientology organization had also filed a countersuit against the estate of Lisa McPherson, and named Dandar a party to that lawsuit. The organization claimed Dandar had inappropriately tried to add the head of Scientology as a party to the wrongful death lawsuit. Scientology legal representatives requested Judge Beach to see to it that Dandar abide by the secret settlement agreement, and Beach subsequently issued an order in June 2009 that Dandar be removed from the Brennan wrongful death case. Dandar faced sanctions from Judge Beach including suspension of Dandar's license to practice law, a 130,000 judgement to be given to the Scientology organization, and a fine of 1,000 per day. Judge Beach ruled that all money from the sanctions imposed against Dandar \u2013 were to go directly to the Scientology organization. The Tampa Tribune noted that Judge Breach made his ruling, \"in an inexplicably closed hearing from which Beach tossed a St. Petersburg Times reporter\". Faced with these possible sanctions, Dandar filed an \"involuntary\" motion to withdraw from the Brennan wrongful death case in federal court, but Judge Merryday denied this request. Dandar stated to , \"I'm stuck in the middle of two courts.\" Merryday has served as a US federal judge based in , Florida since 1992. The noted that Judge Merryday, \"has presided over some of the region's most noteworthy cases.\" Judge Merryday's court order creating an injunction against Beach was 29-pages long, and criticized the \"stunning severity\" of Beach's sanctions imposed on Dandar. Merryday explained that the federal court needed to \"act in defense of the (federal) court's jurisdiction\", due to Beach's actions. Referencing Judge Beach, Merryday wrote in his court order, \"A judge should not undertake, directly or indirectly, overtly or through a surrogate, to compel an act by another judge, especially in a different jurisdiction.\" Judge Beach responded to Judge Merryday's which \"permanently enjoined\" him from imposing sanctions on Dandar, by filing a motion on Thursday in federal court in Tampa. Beach asked Merryday to rescind his order so that he may himself from acting as a judge on the Scientology case related to Dandar. Beach's motion argued that he was denied due process because he was not given notice by Merryday of the hearing which occurred before Merryday issued his ruling. In addition, Beach asserted Merryday did not have power to issue the ruling restricting him from sanctioning Dandar, because Beach was not a party to the Brennan wrongful death case, and Merryday lacked authority to restrict powers of a judge from outside his federal court jurisdiction. In response, Judge Merryday has scheduled a hearing for October 12 in federal court to hear state court judge Beach. Martin Errorl Rice is an attorney in , Florida who represented Beach in the motion before the US federal court. Rice stated his client's motivation in requesting the ruling by Judge Merryday be rescinded was to allow Beach to recuse from the Scientology case. Rice told the St. Petersburg Times that his client's conflict with the US federal court has \"cast kind of a cloud\" over Beach's position in the Scientology case. professor Michael Allen analyzed the clash between the US judge and Florida judge for The Tampa Tribune. Allen observed that it was \"very, very rare\" for a US federal judge to order a state judge. He noted that a contravenes such orders \u2013 except in \"extraordinarily narrow\" cases where the federal judges are permitted to create rulings in order to safeguard the jurisdiction of their federal court proceedings. Related news Sister links", "edit_actions": [{"type": "D", "before": "wrongful death lawsuit", "after": null, "start_char_pos": 124, "end_char_pos": 146}, {"type": "D", "before": "Clearwater", "after": null, "start_char_pos": 194, "end_char_pos": 204}, {"type": "R", "before": "United States District Court for the Middle District of Florida, Steven Douglas Merryday, ordered Pinellas County", "after": ", ,", "start_char_pos": 246, "end_char_pos": 359}, {"type": "D", "before": "federal court", "after": null, "start_char_pos": 455, "end_char_pos": 468}, {"type": "D", "before": "Clearwater", "after": null, "start_char_pos": 924, "end_char_pos": 934}, {"type": "D", "before": "suicide", "after": null, "start_char_pos": 1009, "end_char_pos": 1016}, {"type": "D", "before": "David Miscavige", "after": null, "start_char_pos": 1316, "end_char_pos": 1331}, {"type": "D", "before": "Lisa McPherson", "after": null, "start_char_pos": 1439, "end_char_pos": 1453}, {"type": "D", "before": "dehydrated state", "after": null, "start_char_pos": 1753, "end_char_pos": 1769}, {"type": "D", "before": "cockroaches", "after": null, "start_char_pos": 1846, "end_char_pos": 1857}, {"type": "D", "before": "settlement", "after": null, "start_char_pos": 2003, "end_char_pos": 2013}, {"type": "D", "before": "Ford Greene", "after": null, "start_char_pos": 2248, "end_char_pos": 2259}, {"type": "D", "before": "David Miscavige", "after": null, "start_char_pos": 2527, "end_char_pos": 2542}, {"type": "R", "before": "US$130,000 judgement to be given to the Scientology organization, and a fine of $", "after": "130,000 judgement to be given to the Scientology organization, and a fine of", "start_char_pos": 2921, "end_char_pos": 3002}, {"type": "D", "before": "The Tampa Tribune", "after": null, "start_char_pos": 3498, "end_char_pos": 3515}, {"type": "D", "before": "Tampa", "after": null, "start_char_pos": 3610, "end_char_pos": 3615}, {"type": "D", "before": "St. Petersburg Times", "after": null, "start_char_pos": 3642, "end_char_pos": 3662}, {"type": "D", "before": "injunction", "after": null, "start_char_pos": 4315, "end_char_pos": 4325}, {"type": "D", "before": "recuse", "after": null, "start_char_pos": 4509, "end_char_pos": 4515}, {"type": "R", "before": "St. Petersburg", "after": ",", "start_char_pos": 5194, "end_char_pos": 5208}, {"type": "D", "before": "Stetson University College of Law constitutional law", "after": null, "start_char_pos": 5592, "end_char_pos": 5644}, {"type": "D", "before": "1793 federal law", "after": null, "start_char_pos": 5858, "end_char_pos": 5874}, {"type": "A", "before": null, "after": "Sister links", "start_char_pos": 6087, "end_char_pos": 6087}], "sents_char_pos": [0, 169, 496, 631, 841, 913, 1072, 1161, 1381, 1532, 1653, 1879, 1953, 2136, 2229, 2299, 2437, 2584, 2820, 3017, 3147, 3271, 3299, 3480, 3558, 3637, 3917, 4049, 4451, 4589, 4751, 5039, 5156, 5197, 5281, 5429, 5447, 5591, 5749, 5841, 6073]}
+{"doc_id": "212202", "revision_depth": "1", "before_revision": "250px|A Costa Coffee outlet in Wetherby, West Yorkshire , United Kingdom. Animal welfare groups have written to the company demanding they withdraw a television advert featuring monkeys trying to make coffee. Animal rights activists have demanded that the largest coffee chain in the United Kingdom pull a new advertising campaign because they fear that it will encourage viewers to buy monkeys as pets. The demands are likely to irritate Costa Coffee , who are determined to turn over a larger profit that their arch-rival, Starbucks. Five animal welfare groups have demanded that the advert, which features a futuristic room full of monkeys attempting to use coffee machines, be withdrawn. In a letter to the Rainforest Alliance , the charities say that \"the use of wild animals in this way is contrary to your stance on conservation and, in particular, on rainforest species\". They urged the Alliance to revoke their endorsment of Costa products unless the adverts were withdrawn. The groups also wrote to the coffee chain, saying that they hoped that Costa \u2014 which has over 1,000 outlets in the UK \u2014 would \"think it appropriate to cease using primates in future productions, and make the decision to withdraw the current advert\". The pressure on the coffee giant has led to fears that the company's relationship with the Rainforest Alliance\u2014which \"works to conserve biodiversity and ensure sustainable livelihoods by transforming land-use practices, business practices and consumer behavior\"\u2014may be under threat, since animal welfare groups have complained the new advert is in breach of the Alliance's code of conduct. The television advertisement depicts a number of monkeys being unable to use coffee machines, before a Costa barista hand-makes a cup of coffee. The advert, which features a voiceover by actor Bill Nighy , aired for the first time on Friday. Within hours, animal rights campaigners had demanded it be withdrawn. Manufacturers of products endorsed by the Rainforest Alliance must prove they \"are demonstrating [their demand for] goods grown and harvested with respect for people, wildlife and the environment\". 'Severely compromised' A spokeswoman for Wild Futures , which runs a sanctuary for victims of the primate pet trade, said that she felt that, because they had been forced to appear in the advert, the welfare of the monkeys had been \"severely compromised.\" She said: \"With the release of this new advert, we feel the need to reiterate our long-held concerns on the use of wild animals in entertainment. While they are used in this way their welfare is severely compromised, and it has a knock-on effect in the trade in primates as pets.\" According to The Observer , \"the relationship between the appearance of exotic animals in the media and a corresponding increase in demand for them as pets is well documented.\" The demand to own clownfish as pets reportedly rocketed following the release of Disney Pixar's Finding Nemo , which featured one of the orange and white vertebrates as its main character. A file photo of a monkey . The Costa Coffee campaign features a number of the animals in a futuristic room attempting to make coffee. The Alliance refused to comment specifically on the Costa advertising campaign, but said in a statement that it \"objects to the use of captive wild animals in commercial advertising where a company is seeking to highlight or promote its relationship with the Rainforest Alliance or its use of Rainforest Alliance certified commodities\". Wild Futures and other charities have, in the past, forced companies to withdraw campaigns they believe compromise animal's rights. The European Union was forced to pull a stop smoking advert last year after objections for animal welfare groups, and car manufaturer Dodge also withdrew an advert which featured a chimpanzee after animal rights groups lodged complaints. The Code of Practice on the Welfare of Privately Kept Non-Human Primates states that \"primates used for entertainment and in the media are often removed from their social group and hand-reared, causing distress to the infant, mother and other members of the group.\" The five charities have said they feel that, because the animals have been removed from their social group for the purposes of filming, Costa could be in contravention of three of the five needs as stated in the Animal Welfare Act .", "after_revision": "250px|A outlet in , , United Kingdom. Animal welfare groups have written to the company demanding they withdraw a television advert featuring monkeys trying to make coffee. Animal rights activists have demanded that the largest chain in the United Kingdom pull a new because they fear that it will encourage viewers to buy as pets. The demands are likely to irritate , who are determined to turn over a larger profit that their arch-rival, . Five have demanded that the advert, which features a futuristic room full of monkeys attempting to use coffee machines, be withdrawn. In a letter to the , the charities say that \"the use of wild animals in this way is contrary to your stance on conservation and, in particular, on rainforest species\". They urged the Alliance to revoke their endorsement of Costa products unless the adverts were withdrawn. The groups also wrote to the coffee chain, saying that they hoped that Costa \u2014 which has over 1,000 outlets in the UK \u2014 would \"think it appropriate to cease using primates in future productions, and make the decision to withdraw the current advert\". The pressure on the coffee giant has led to fears that the company's relationship with the Rainforest Alliance\u2014which \"works to conserve biodiversity and ensure sustainable livelihoods by transforming land-use practices, business practices and consumer behavior\"\u2014may be under threat, since animal welfare groups have complained the new advert is in breach of the Alliance's code of conduct. The television advertisement depicts a number of monkeys being unable to use coffee machines, before a Costa hand-makes a cup of coffee. The advert, which features a by actor , aired for the first time on Friday. Within hours, animal rights campaigners had demanded it be withdrawn. Manufacturers of products endorsed by the Rainforest Alliance must prove they \"are demonstrating [their demand for] goods grown and harvested with respect for people, wildlife and the environment\". 'Severely compromised' A spokeswoman for , which runs a sanctuary for victims of the primate pet trade, said that she felt that, because they had been forced to appear in the advert, the welfare of the monkeys had been \"severely compromised.\" She said: \"With the release of this new advert, we feel the need to reiterate our long-held concerns on the use of wild animals in entertainment. While they are used in this way their welfare is severely compromised, and it has a knock-on effect in the trade in primates as pets.\" According to , \"the relationship between the appearance of exotic animals in the media and a corresponding increase in demand for them as pets is well documented.\" The demand to own as pets reportedly rocketed following the release of 's , which featured one of the orange and white vertebrates as its main character. A file photo of a . The Costa Coffee campaign features a number of the animals in a futuristic room attempting to make coffee. The Alliance refused to comment specifically on the Costa advertising campaign, but said in a statement that it \"objects to the use of captive wild animals in commercial advertising where a company is seeking to highlight or promote its relationship with the Rainforest Alliance or its use of Rainforest Alliance certified commodities\". Wild Futures and other charities have, in the past, forced companies to withdraw campaigns they believe compromise animal's rights. The was forced to pull a stop smoking advert last year after objections for animal welfare groups, and car manufaturer also withdrew an advert which featured a after animal rights groups lodged complaints. The Code of Practice on the Welfare of Privately Kept Non-Human Primates states that \"primates used for entertainment and in the media are often removed from their social group and hand-reared, causing distress to the infant, mother and other members of the group.\" The five charities have said they feel that, because the animals have been removed from their social group for the purposes of filming, Costa could be in contravention of three of the five needs as stated in the .", "edit_actions": [{"type": "R", "before": "Costa Coffee outlet in Wetherby, West Yorkshire", "after": "outlet in", "start_char_pos": 8, "end_char_pos": 55}, {"type": "A", "before": null, "after": ",", "start_char_pos": 58, "end_char_pos": 58}, {"type": "D", "before": "coffee", "after": null, "start_char_pos": 265, "end_char_pos": 271}, {"type": "D", "before": "advertising campaign", "after": null, "start_char_pos": 311, "end_char_pos": 331}, {"type": "D", "before": "monkeys", "after": null, "start_char_pos": 388, "end_char_pos": 395}, {"type": "D", "before": "Costa Coffee", "after": null, "start_char_pos": 440, "end_char_pos": 452}, {"type": "R", "before": "Starbucks. Five animal welfare groups", "after": ". Five", "start_char_pos": 526, "end_char_pos": 563}, {"type": "D", "before": "Rainforest Alliance", "after": null, "start_char_pos": 712, "end_char_pos": 731}, {"type": "R", "before": "endorsment", "after": "endorsement", "start_char_pos": 921, "end_char_pos": 931}, {"type": "D", "before": "barista", "after": null, "start_char_pos": 1734, "end_char_pos": 1741}, {"type": "R", "before": "voiceover by actor Bill Nighy", "after": "by actor", "start_char_pos": 1799, "end_char_pos": 1828}, {"type": "D", "before": "Wild Futures", "after": null, "start_char_pos": 2176, "end_char_pos": 2188}, {"type": "D", "before": "The Observer", "after": null, "start_char_pos": 2685, "end_char_pos": 2697}, {"type": "D", "before": "clownfish", "after": null, "start_char_pos": 2867, "end_char_pos": 2876}, {"type": "R", "before": "Disney Pixar's Finding Nemo", "after": "'s", "start_char_pos": 2930, "end_char_pos": 2957}, {"type": "D", "before": "monkey", "after": null, "start_char_pos": 3056, "end_char_pos": 3062}, {"type": "D", "before": "European Union", "after": null, "start_char_pos": 3645, "end_char_pos": 3659}, {"type": "D", "before": "Dodge", "after": null, "start_char_pos": 3775, "end_char_pos": 3780}, {"type": "D", "before": "chimpanzee", "after": null, "start_char_pos": 3822, "end_char_pos": 3832}, {"type": "D", "before": "Animal Welfare Act", "after": null, "start_char_pos": 4357, "end_char_pos": 4375}], "sents_char_pos": [0, 74, 209, 404, 536, 692, 880, 984, 1234, 1624, 1769, 1866, 1936, 2134, 2390, 2536, 2671, 2848, 3037, 3064, 3171, 3508, 3640, 3878, 4144]}
+{"doc_id": "212384", "revision_depth": "1", "before_revision": "300px|Rescue efforts in the San Jos\u00e9 Mine , on August 10. Laurence Golborne , Mining Minister of Chile. The rescue of the Chilean miners trapped in the San Jos\u00e9 Mine in Copiap\u00f3, codenamed Operaci\u00f3n San Lorenzo (San Lorenzo Operation), began on Tuesday night, at around 20:00 local time (23:00 UTC). All the 33 miners were rescued. The last miner, Luis Urz\u00faa, was rescued at 21:55 Chile time (00:55 UTC). \"It is a pleasure to be Chilean, [I'm] proud,\" said Luis Urz\u00faa to President Pi\u00f1era. \"In honour of the miners, their families, the rescuers [...] let's sing our national anthem. Viva Chile Mierda!,\" said Pi\u00f1era. Urz\u00faa thanked Mining Minister Golborne and the First Lady Cecilia Morel for \"fighting for their lives.\" \"I'm proud of my fellow miners,\" Urz\u00faa added. President of Chile Pi\u00f1era assisted to the rescue. Bolivian President Evo Morales could not attend Carlos Mamani's rescue. Mamani is the only Bolivian miner in the group. On Tuesday, Mayor of Copiap\u00f3 Maglio Cicardini announced that the municipal schools in the city will have no classes this Wednesday \"to transform the rescue of the Atacama's 33 in a familiar meeting,\" Radio Cooperativa reported. \"The miners will be taken to the Copiap\u00f3 Regional Hospital for medical checkup, where they will have to stay for 48 hours,\" Health Minister Ma\u00f1alich said to Televisi\u00f3n Nacional de Chile . The youngest trapped miner is 19 years old, and the oldest is 63. There were several rescue attempts before reaching the miners' shelter on August 22. The National Emergencies Office of Chile (ONEMI) released a list of the trapped miners on August 6, which included Franklin Lobos Ram\u00edrez , a retired footballer. Chile is the worlds top producer of copper, according to The Economist . The San Jos\u00e9 Mine is owned by the San Esteban Mining Company (Empresa Minera San Esteban). The mine was closed down in 2007, after relatives of a miner who had died sued the company executives, but the mine was re\u2013opened in 2008. The last step of their rescue, announced by Health Minister Jaime Ma\u00f1alich , was originally due to begin on Tuesday. Laurence Golborne , Minery Minister said \"If it is possible, and the cement sets before and we don't have any impediments to doing it, it would be wonderful,\" in a press conference on Monday. The men will be extracted in a steel rescue capsule 54 cm (21 inches) in diameter. Ra\u00fal Bustos Ra\u00fal Bustos, 40 years old, is an hydraulics engineer. He left his job in Talcahuano after the February 27 earthquake to work in the mine. Daniel Herrera Daniel Herrera after his rescue. Daniel Herrera, 27 years old, is a lorry driver. He has acted as paramedic assistant in the mine. He said to La Tercera \"the miners were unhappy with the psychologist in the rescue team.\" Claudio Acu\u00f1a Claudio Acu\u00f1a, miner, is fan of the Colo-Colo football club. The BBC reports he is aged 56, but El Comercio says he is 44. A native of Los Lagos , Juan Aguilar is 49 years old. Aguilar is married to Cristy Coronado, according to El Comercio. Aguilar works as a supervisor. Mario Sep\u00falveda Mario Sep\u00falveda is a 39 years old electrician native of Parral ; he is married. He has been the spokesman of the most of the miners' videos. Mario Sep\u00falveda was the second miner to be rescued, on Wednesday at 01:10 local time (04:10 UTC). Franklin Lobos Franklin Lobos shortly after his rescue. Franklin Lobos Ram\u00edrez is a 53 years old retired footballer. He played for Cobresal, Deportes Antofagasta, Club de Deportes Santiago Wanderers and Uni\u00f3n La Calera , and briefly for the Chile national football team . Lobos had worked as a truck driver in the mine. Richard Villarroel Richard Villarroel is a 27 years old mechanic from Coyhaique . Edison Pe\u00f1a Edison Pe\u00f1a is a 34 years old miner. \"I want to go out soon,\" he said on his first contact with his relatives. \"I want to be free, I want to see the sun,\" he added. He is a fan of Elvis Presley . Related stories", "after_revision": "300px|Rescue efforts in the , on August 10. , Mining Minister of Chile. The rescue of the Chilean miners trapped in the in Copiap\u00f3, codenamed Operaci\u00f3n San Lorenzo (San Lorenzo Operation), began on Tuesday night, at around 20:00 local time (23:00 UTC). All the 33 miners were rescued. The last miner, Luis Urz\u00faa, was rescued at 21:55 Chile time (00:55 UTC). \"It is a pleasure to be Chilean, [I'm] proud,\" said Luis Urz\u00faa to President Pi\u00f1era. \"In honour of the miners, their families, the rescuers [...] let's sing our national anthem. Viva Chile Mierda!,\" said Pi\u00f1era. Urz\u00faa thanked Mining Minister and the First Lady for \"fighting for their lives.\" \"I'm proud of my fellow miners,\" Urz\u00faa added. assisted to the rescue. Bolivian President could not attend Carlos Mamani's rescue. Mamani is the only Bolivian miner in the group. On Tuesday, Mayor of Copiap\u00f3 Maglio Cicardini announced that the municipal schools in the city will have no classes this Wednesday \"to transform the rescue of the Atacama's 33 in a familiar meeting,\" reported. \"The miners will be taken to the Copiap\u00f3 Regional Hospital for medical checkup, where they will have to stay for 48 hours,\" Health Minister said to . The youngest trapped miner is 19 years old, and the oldest is 63. There were several rescue attempts before reaching the miners' shelter on August 22. The (ONEMI) released a list of the trapped miners on August 6, which included , a retired footballer. Chile is the worlds top producer of copper, according to . The San Jos\u00e9 Mine is owned by the San Esteban Mining Company (Empresa Minera San Esteban). The mine was closed down in 2007, after relatives of a miner who had died sued the company executives, but the mine was re\u2013opened in 2008. The last step of their rescue, announced by Health Minister , was originally due to begin on Tuesday. , Minery Minister said \"If it is possible, and the cement sets before and we don't have any impediments to doing it, it would be wonderful,\" in a press conference on Monday. The men will be extracted in a steel rescue capsule 54 cm (21 inches) in diameter. Ra\u00fal Bustos Ra\u00fal Bustos, 40 years old, is an hydraulics engineer. He left his job in after the February 27 earthquake to work in the mine. Daniel Herrera Daniel Herrera after his rescue. Daniel Herrera, 27 years old, is a lorry driver. He has acted as paramedic assistant in the mine. He said to \"the miners were unhappy with the psychologist in the rescue team.\" Claudio Acu\u00f1a Claudio Acu\u00f1a, miner, is fan of the football club. The BBC reports he is aged 56, but El Comercio says he is 44. A native of , Juan Aguilar is 49 years old. Aguilar is married to Cristy Coronado, according to El Comercio. Aguilar works as a supervisor. Mario Sep\u00falveda Mario Sep\u00falveda is a 39 years old electrician native of ; he is married. He has been the spokesman of the most of the miners' videos. Mario Sep\u00falveda was the second miner to be rescued, on Wednesday at 01:10 local time (04:10 UTC). Franklin Lobos Franklin Lobos shortly after his rescue. is a 53 years old retired footballer. He played for , , and , and briefly for the . Lobos had worked as a truck driver in the mine. Richard Villarroel Richard Villarroel is a 27 years old mechanic from . Edison Pe\u00f1a Edison Pe\u00f1a is a 34 years old miner. \"I want to go out soon,\" he said on his first contact with his relatives. \"I want to be free, I want to see the sun,\" he added. He is a fan of . Related news", "edit_actions": [{"type": "D", "before": "San Jos\u00e9 Mine", "after": null, "start_char_pos": 28, "end_char_pos": 41}, {"type": "D", "before": "Laurence Golborne", "after": null, "start_char_pos": 58, "end_char_pos": 75}, {"type": "D", "before": "San Jos\u00e9 Mine", "after": null, "start_char_pos": 152, "end_char_pos": 165}, {"type": "D", "before": "Golborne", "after": null, "start_char_pos": 645, "end_char_pos": 653}, {"type": "D", "before": "Cecilia Morel", "after": null, "start_char_pos": 673, "end_char_pos": 686}, {"type": "D", "before": "President of Chile Pi\u00f1era", "after": null, "start_char_pos": 765, "end_char_pos": 790}, {"type": "D", "before": "Evo Morales", "after": null, "start_char_pos": 834, "end_char_pos": 845}, {"type": "D", "before": "Radio Cooperativa", "after": null, "start_char_pos": 1135, "end_char_pos": 1152}, {"type": "R", "before": "Ma\u00f1alich said to Televisi\u00f3n Nacional de Chile", "after": "said to", "start_char_pos": 1303, "end_char_pos": 1348}, {"type": "D", "before": "National Emergencies Office of Chile", "after": null, "start_char_pos": 1506, "end_char_pos": 1542}, {"type": "D", "before": "Franklin Lobos Ram\u00edrez", "after": null, "start_char_pos": 1617, "end_char_pos": 1639}, {"type": "D", "before": "The Economist", "after": null, "start_char_pos": 1721, "end_char_pos": 1734}, {"type": "D", "before": "Jaime Ma\u00f1alich", "after": null, "start_char_pos": 2027, "end_char_pos": 2041}, {"type": "D", "before": "Laurence Golborne", "after": null, "start_char_pos": 2084, "end_char_pos": 2101}, {"type": "D", "before": "Talcahuano", "after": null, "start_char_pos": 2444, "end_char_pos": 2454}, {"type": "D", "before": "La Tercera", "after": null, "start_char_pos": 2666, "end_char_pos": 2676}, {"type": "D", "before": "Colo-Colo", "after": null, "start_char_pos": 2795, "end_char_pos": 2804}, {"type": "D", "before": "Los Lagos", "after": null, "start_char_pos": 2894, "end_char_pos": 2903}, {"type": "D", "before": "Parral", "after": null, "start_char_pos": 3104, "end_char_pos": 3110}, {"type": "D", "before": "Franklin Lobos Ram\u00edrez", "after": null, "start_char_pos": 3343, "end_char_pos": 3365}, {"type": "D", "before": "Cobresal, Deportes Antofagasta, Club de Deportes Santiago Wanderers and Uni\u00f3n La Calera", "after": null, "start_char_pos": 3418, "end_char_pos": 3505}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3508, "end_char_pos": 3508}, {"type": "A", "before": null, "after": ", and", "start_char_pos": 3513, "end_char_pos": 3513}, {"type": "D", "before": "Chile national football team", "after": null, "start_char_pos": 3530, "end_char_pos": 3558}, {"type": "D", "before": "Coyhaique", "after": null, "start_char_pos": 3679, "end_char_pos": 3688}, {"type": "D", "before": "Elvis Presley", "after": null, "start_char_pos": 3883, "end_char_pos": 3896}, {"type": "R", "before": "stories", "after": "news", "start_char_pos": 3907, "end_char_pos": 3914}], "sents_char_pos": [0, 103, 298, 330, 403, 487, 580, 614, 764, 814, 886, 934, 1162, 1350, 1416, 1501, 1663, 1736, 1827, 1966, 2083, 2275, 2358, 2424, 2508, 2556, 2605, 2654, 2744, 2819, 2881, 2935, 3000, 3031, 3112, 3127, 3188, 3286, 3342, 3403, 3560, 3608, 3690, 3739, 3813, 3867]}
+{"doc_id": "212445", "revision_depth": "1", "before_revision": "Andrew Marr , pictured here in 2009, said that he considers citizen journalism to be \"spewings and rantings of very drunk people late at night\". British journalist Andrew Marr has angered bloggers by suggesting they are \"inadequate, pimpled and single.\" Marr, who was formerly the BBC 's political editor, also said that citizen journalism is \"spewings and rantings of very drunk people late at night\". He made the comments at the Cheltenham Literary Festival , saying: \"A lot of bloggers seem to be socially inadequate, pimpled, single, slightly seedy, bald, cauliflower-nosed young men sitting in their mother's basements and ranting. They are very angry people.\" Marr, who now hosts a flagship Sunday morning show, The Andrew Marr Show , on which he has recently interviewed British Prime Minister David Cameron and ousted BP executive Tony Hayward , added: \"OK \u2013 the country is full of very angry people. Many of us are angry people at times. Some of us are angry and drunk\". His comments sparked outrage from bloggers, one of whom dismissed them as \"stupid generalisations.\" Another said that they were \"sure that Andrew Marr did not mean all bloggers, but it is unfortunate that he did not seem to make much of a distinction in his statement.\" Another blogger, writing on Twitter , said they supported Marr's arguments. \"Just read Andrew Marr's comments on blogging,\" they said. \"I blog and I agree with most of what he says. I don't read blogs for news, doubt I ever will.\" Other journalists also criticised the comments. Krishnan Guru-Murthy , a newscaster for Channel 4 News , said that it is \"true that flicking through the comment section of some political blogs can easily make you think the blogosphere is populated by obnoxious trolls. But there are plenty of thoughtful, insightful people writing online too: you just need to find them. They might not be household names, or worthy of a slot on Radio 4, but to dismiss them out of hand seems wrong. As for bloggers being 'inadequate, pimpled and single,' that's no way to talk about Jon Snow . He isn't single.\" Roy Greenslade , a professor of journalism at City University London , and former editor of the Daily Mirror , said: \"Aside from the paradox of him indulging in a rant to complain about other ranters, it is the one-sidedness of his argument that is so striking. None of us who write blogs are unaware of vituperative contributions from people who like to remain anonymous ... It's the price we [bloggers] pay \u2013a small price, in my view\u2013 for a communications system that allows for public participation.\" Greenslade added that he thought Marr \"seems to be damning the whole blogosphere when, as we all know, there are thousand upon thousand of bloggers who are making valuable public interest contributions on the net day by day, even hour by hour. Marr, to use an archaic but apposite idiom, simply can't see the wood for the trees.\"", "after_revision": " , pictured here in 2009, said that he considers to be \"spewings and rantings of very drunk people late at night\". British has angered by suggesting they are \"inadequate, pimpled and single.\" Marr, who was formerly the 's political editor, also said that is \"spewings and rantings of very drunk people late at night\". He made the comments at the , saying: \"A lot of bloggers seem to be socially inadequate, pimpled, single, slightly seedy, bald, cauliflower-nosed young men sitting in their mother's basements and ranting. They are very angry people.\" Marr, who now hosts a flagship Sunday morning show, , on which he has recently interviewed and ousted executive , added: \"OK \u2013 the country is full of very angry people. Many of us are angry people at times. Some of us are angry and drunk\". His comments sparked outrage from bloggers, one of whom dismissed them as \"stupid generalisations.\" Another said that they were \"sure that Andrew Marr did not mean all bloggers, but it is unfortunate that he did not seem to make much of a distinction in his statement.\" Another blogger, writing on , said they supported Marr's arguments. \"Just read Andrew Marr's comments on blogging,\" they said. \"I blog and I agree with most of what he says. I don't read blogs for news, doubt I ever will.\" Other journalists also criticised the comments. , a newscaster for , said that it is \"true that flicking through the comment section of some political blogs can easily make you think the blogosphere is populated by obnoxious trolls. But there are plenty of thoughtful, insightful people writing online too: you just need to find them. They might not be household names, or worthy of a slot on Radio 4, but to dismiss them out of hand seems wrong. As for bloggers being 'inadequate, pimpled and single,' that's no way to talk about . He isn't single.\" , a professor of at , and former editor of the , said: \"Aside from the paradox of him indulging in a rant to complain about other ranters, it is the one-sidedness of his argument that is so striking. None of us who write blogs are unaware of vituperative contributions from people who like to remain anonymous ... It's the price we [bloggers] pay \u2013a small price, in my view\u2013 for a communications system that allows for public participation.\" Greenslade added that he thought Marr \"seems to be damning the whole blogosphere when, as we all know, there are thousand upon thousand of bloggers who are making valuable public interest contributions on the net day by day, even hour by hour. Marr, to use an archaic but apposite idiom, simply can't see the wood for the trees.\"", "edit_actions": [{"type": "D", "before": "Andrew Marr", "after": null, "start_char_pos": 0, "end_char_pos": 11}, {"type": "D", "before": "citizen journalism", "after": null, "start_char_pos": 60, "end_char_pos": 78}, {"type": "R", "before": "journalist Andrew Marr has angered bloggers", "after": "has angered", "start_char_pos": 153, "end_char_pos": 196}, {"type": "D", "before": "BBC", "after": null, "start_char_pos": 281, "end_char_pos": 284}, {"type": "D", "before": "citizen journalism", "after": null, "start_char_pos": 321, "end_char_pos": 339}, {"type": "D", "before": "Cheltenham Literary Festival", "after": null, "start_char_pos": 431, "end_char_pos": 459}, {"type": "D", "before": "The Andrew Marr Show", "after": null, "start_char_pos": 718, "end_char_pos": 738}, {"type": "R", "before": "British Prime Minister David Cameron and ousted BP executive Tony Hayward", "after": "and ousted executive", "start_char_pos": 778, "end_char_pos": 851}, {"type": "D", "before": "Twitter", "after": null, "start_char_pos": 1278, "end_char_pos": 1285}, {"type": "D", "before": "Krishnan Guru-Murthy", "after": null, "start_char_pos": 1529, "end_char_pos": 1549}, {"type": "D", "before": "Channel 4 News", "after": null, "start_char_pos": 1569, "end_char_pos": 1583}, {"type": "D", "before": "Jon Snow", "after": null, "start_char_pos": 2048, "end_char_pos": 2056}, {"type": "D", "before": "Roy Greenslade", "after": null, "start_char_pos": 2077, "end_char_pos": 2091}, {"type": "R", "before": "journalism at City University London", "after": "at", "start_char_pos": 2109, "end_char_pos": 2145}, {"type": "D", "before": "Daily Mirror", "after": null, "start_char_pos": 2173, "end_char_pos": 2185}], "sents_char_pos": [0, 144, 253, 402, 636, 665, 908, 946, 979, 1079, 1249, 1325, 1384, 1431, 1480, 1528, 1749, 1851, 1963, 2076, 2338, 2452, 2580, 2824]}
+{"doc_id": "214601", "revision_depth": "1", "before_revision": "The new MacBook Air In a Wednesday media event, Apple Inc. released a new lineup of MacBook Air laptops and the 2011 version of the company's iLife software suite. The \"Back to the Mac\" event also included a preview of Apple's forthcoming Mac OS X Lion operating system, to be released in mid-2011. Apple CEO Steve Jobs unveiled the new products at the Cupertino , California event, saying the company has \"been inspired by the work [it has] done on the iPad, and [it wants] to bring it back to the Mac.\" Apple has plans to import more features of its iOS mobile operating system to the Mac OS X operating system. Jobs announced today that the \"Lion\" release to OS X, which is scheduled for release next summer, will include more support for multitouch and a desktop version of the company's App Store . He said that the App Store will be available for Apple's current OS \"Snow Leopard\" within 90 days, and that applications can be submitted starting next month. Jobs also announced that a beta version of FaceTime , Apple's IOS video calling application, would be available for OS X users immediately. Several new applications will be added in OS X Lion, dubbed \"Mission Control\" and \"Launchpad.\" In his keynote address Wednesday, Jobs announced the release of Apple's iLife '11 software suite, which includes the iPhoto, iMovie, and GarageBand programs. iPhoto has new slide show templates, while iMovie has added audio editing capabilities. GarageBand now includes several new piano- and guitar-playing lessons. iLife '11 was released on Wednesday as a US$49 upgrade, and is also available free with new Mac purchases. In another move to bring iOS functionality to Macintosh computers, Jobs announced an updated MacBook Air series of laptops, on sale now. The new MacBook Air uses flash memory rather than a traditional hard drive, and has no CD/DVD drive, an approach seen on the iPad tablet computer. In addition, the laptop's battery life has been extended, even though it is only 0.68 in (1.73 cm) thick and weighs less than 3 lbs (1.36 kg). \"We think it\u2019s the future of notebooks,\" said Jobs. There are now two models of the MacBook Air: an 11.6-inch (29.46-cm) version and a 13.3-inch (33.78-cm) model. Analyst Shawn Wu says the company \"priced it really aggressively,\" referring to the computer's base price of US$999. Jobs said that his company sold 13.7 million Macs last year,totaling US 22 billion. In the last financial quarter, Mac sales increased 22 percent, comprising 24 percent of total revenue for Apple. However, the original MacBook Air did not fare so well. Sales and hype over the first Air decreased soon after its introduction, and the line was overshadowed by the release of Apple's 13-inch (33.02-cm) MacBook Pro . The MacBook Air had not been significantly updated since 2008.", "after_revision": "The new MacBook Air In a Wednesday media event, Apple Inc. released a new lineup of laptops and the 2011 version of the company's software suite. The \"Back to the Mac\" event also included a preview of Apple's forthcoming operating system, to be released in mid-2011. Apple CEO Steve Jobs unveiled the new products at the , California event, saying the company has \"been inspired by the work [it has] done on the iPad, and [it wants] to bring it back to the Mac.\" Apple has plans to import more features of its mobile operating system to the operating system. Jobs announced today that the \"Lion\" release to OS X, which is scheduled for release next summer, will include more support for and a desktop version of the company's . He said that the App Store will be available for Apple's current OS \"Snow Leopard\" within 90 days, and that applications can be submitted starting next month. Jobs also announced that a beta version of , Apple's IOS video calling application, would be available for OS X users immediately. Several new applications will be added in OS X Lion, dubbed \"Mission Control\" and \"Launchpad.\" In his keynote address Wednesday, Jobs announced the release of Apple's iLife '11 software suite, which includes the , , and programs. iPhoto has new slide show templates, while iMovie has added audio editing capabilities. GarageBand now includes several new piano- and guitar-playing lessons. iLife '11 was released on Wednesday as a 49 upgrade, and is also available free with new Mac purchases. In another move to bring iOS functionality to Macintosh computers, Jobs announced an updated MacBook Air series of laptops, on sale now. The new MacBook Air uses rather than a traditional hard drive, and has no CD/DVD drive, an approach seen on the tablet computer. In addition, the laptop's battery life has been extended, even though it is only 0.68 in (1.73 cm) thick and weighs less than 3 lbs (1.36 kg). \"We think it\u2019s the future of notebooks,\" said Jobs. There are now two models of the MacBook Air: an 11.6-inch (29.46-cm) version and a 13.3-inch (33.78-cm) model. Analyst Shawn Wu says the company \"priced it really aggressively,\" referring to the computer's base price of US$999. Jobs said that his company sold 13.7 million Macs last year, totaling US$ 22 billion. In the last financial quarter, Mac sales increased 22 percent, comprising 24 percent of total revenue for Apple. However, the original MacBook Air did not fare so well. Sales and hype over the first Air decreased soon after its introduction, and the line was overshadowed by the release of Apple's 13-inch (33.02-cm) . The MacBook Air had not been significantly updated since 2008.", "edit_actions": [{"type": "D", "before": "MacBook Air", "after": null, "start_char_pos": 84, "end_char_pos": 95}, {"type": "D", "before": "iLife", "after": null, "start_char_pos": 142, "end_char_pos": 147}, {"type": "D", "before": "Mac OS X Lion", "after": null, "start_char_pos": 239, "end_char_pos": 252}, {"type": "D", "before": "Cupertino", "after": null, "start_char_pos": 353, "end_char_pos": 362}, {"type": "D", "before": "iOS", "after": null, "start_char_pos": 552, "end_char_pos": 555}, {"type": "D", "before": "Mac OS X", "after": null, "start_char_pos": 587, "end_char_pos": 595}, {"type": "D", "before": "multitouch", "after": null, "start_char_pos": 742, "end_char_pos": 752}, {"type": "D", "before": "App Store", "after": null, "start_char_pos": 792, "end_char_pos": 801}, {"type": "D", "before": "FaceTime", "after": null, "start_char_pos": 1006, "end_char_pos": 1014}, {"type": "R", "before": "iPhoto, iMovie, and GarageBand", "after": ", , and", "start_char_pos": 1315, "end_char_pos": 1345}, {"type": "R", "before": "US$49 upgrade, and is also available free with new Mac purchases. In another move to bring iOS functionality to Macintosh computers, Jobs announced an updated MacBook Air series of laptops, on sale now. The new MacBook Air uses flash memory rather than a traditional hard drive, and has no CD/DVD drive, an approach seen on the iPad tablet computer. In addition, the laptop's battery life has been extended, even though it is only 0.68 in (1.73 cm) thick and weighs less than 3 lbs (1.36 kg). \"We think it\u2019s the future of notebooks,\" said Jobs. There are now two models of the MacBook Air: an 11.6-inch (29.46-cm) version and a 13.3-inch (33.78-cm) model. Analyst Shawn Wu says the company \"priced it really aggressively,\" referring to the computer's base price of US$999.", "after": "49 upgrade, and is also available free with new Mac purchases.", "start_char_pos": 1556, "end_char_pos": 2328}, {"type": "R", "before": "Jobs said that his company sold 13.7 million Macs last year,totaling US", "after": "In another move to bring iOS functionality to Macintosh computers, Jobs announced an updated MacBook Air series of laptops, on sale now. The new MacBook Air uses rather than a traditional hard drive, and has no CD/DVD drive, an approach seen on the tablet computer. In addition, the laptop's battery life has been extended, even though it is only 0.68 in (1.73 cm) thick and weighs less than 3 lbs (1.36 kg). \"We think it\u2019s the future of notebooks,\" said Jobs. There are now two models of the MacBook Air: an 11.6-inch (29.46-cm) version and a 13.3-inch (33.78-cm) model. Analyst Shawn Wu says the company \"priced it really aggressively,\" referring to the computer's base price of US$999. Jobs said that his company sold 13.7 million Macs last year, totaling US$", "start_char_pos": 2329, "end_char_pos": 2400}, {"type": "D", "before": "MacBook Pro", "after": null, "start_char_pos": 2730, "end_char_pos": 2741}], "sents_char_pos": [0, 163, 298, 613, 803, 962, 1102, 1197, 1443, 1621, 1758, 1905, 2048, 2100, 2211, 2412, 2525, 2581, 2743]}
+{"doc_id": "214665", "revision_depth": "1", "before_revision": "The new British coalition government has warned local authorities in the United Kingdom not to provide tax breaks to branches of the Church of Scientology. After an investigation by The Guardian newspaper revealed that several local authorities have granted Scientology tax breaks worth over a million pounds, Secretary of State for Communities and Local Government Eric Pickles intervened to urge councils to end the practice. The City of London Corporation , which gave an 80\\% tax exemption worth \u00a31.3 million to the flagship Scientology centre in the City of London . The corporation justified the exemption on the basis that Scientology could be considered to be a charity either for the advancement of religion \"or other purposes beneficial to the community\". It said that it feared being sued by the organisation if it discontinued the exemption. Westminster City Council granted 80\\% rates relief to the Scientology Celebrity Centre in the Bayswater district of London . This saved Scientology \u00a3165,303 over the past ten years, though as of July 2010 the centre is no longer in use. The council determined that Scientology was a \"non-registered charity\" that is \"beneficial to the community\". Birmingham City Council awarded the Church of Scientology Religious Education College an 80\\% tax discount on the grounds that the property was an educational institution. The City of Sunderland gave the Church of Scientology's branch in the city tax relief worth \u00a330,000 over five years. Camden London Borough Council refused to disclose whether and how much tax relief had been granted to the Scientology branch in the London Borough of Camden . Other local authorities, including Manchester City Council and Mid Sussex District Council , said that they charged Scientology the full commercial rate. The controversy was the latest in a series of disputes involving Scientology's tax status in the UK. Scientology is not officially recognised as a religion. The Charity Commission for England and Wales rejected an application in 1999 by Scientology for charitable status, ruling that its activities did not meet the \"public benefit\" test. However, in 2000 Scientology obtained exemption from Value Added Tax (VAT) on the grounds that its services were educational and non-profitable. It successfully sued HM Revenue and Customs for the return of \u00a38 million in overpaid VAT. Related news ", "after_revision": "The new British coalition government has warned local authorities in the United Kingdom not to provide tax breaks to branches of the Church of Scientology. After an investigation by newspaper revealed that several local authorities have granted Scientology tax breaks worth over a million pounds, intervened to urge councils to end the practice. The , which gave an 80\\% tax exemption worth \u00a31.3 million to the flagship Scientology centre in the . The corporation justified the exemption on the basis that Scientology could be considered to be a charity either for the advancement of religion \"or other purposes beneficial to the community\". It said that it feared being sued by the organisation if it discontinued the exemption. granted 80\\% rates relief to the Scientology in the district of . This saved Scientology \u00a3165,303 over the past ten years, though as of July 2010 the centre is no longer in use. The council determined that Scientology was a \"non-registered charity\" that is \"beneficial to the community\". awarded the Church of Scientology Religious Education College an 80\\% tax discount on the grounds that the property was an educational institution. The gave the Church of Scientology's branch in the city tax relief worth \u00a330,000 over five years. refused to disclose whether and how much tax relief had been granted to the Scientology branch in the . Other local authorities, including and , said that they charged Scientology the full commercial rate. The controversy was the latest in a series of disputes involving Scientology's tax status in the UK. Scientology is not officially recognised as a religion. The rejected an application in 1999 by Scientology for charitable status, ruling that its activities did not meet the \"public benefit\" test. However, in 2000 Scientology obtained exemption from Value Added Tax (VAT) on the grounds that its services were educational and non-profitable. It successfully sued for the return of \u00a38 million in overpaid VAT. Related news Sister links", "edit_actions": [{"type": "D", "before": "The Guardian", "after": null, "start_char_pos": 182, "end_char_pos": 194}, {"type": "D", "before": "Secretary of State for Communities and Local Government Eric Pickles", "after": null, "start_char_pos": 310, "end_char_pos": 378}, {"type": "D", "before": "City of London Corporation", "after": null, "start_char_pos": 432, "end_char_pos": 458}, {"type": "D", "before": "City of London", "after": null, "start_char_pos": 555, "end_char_pos": 569}, {"type": "D", "before": "Westminster City Council", "after": null, "start_char_pos": 854, "end_char_pos": 878}, {"type": "R", "before": "Celebrity Centre in the Bayswater district of London", "after": "in the district of", "start_char_pos": 924, "end_char_pos": 976}, {"type": "D", "before": "Birmingham City Council", "after": null, "start_char_pos": 1201, "end_char_pos": 1224}, {"type": "D", "before": "City of Sunderland", "after": null, "start_char_pos": 1377, "end_char_pos": 1395}, {"type": "D", "before": "Camden London Borough Council", "after": null, "start_char_pos": 1490, "end_char_pos": 1519}, {"type": "D", "before": "London Borough of Camden", "after": null, "start_char_pos": 1622, "end_char_pos": 1646}, {"type": "R", "before": "Manchester City Council and Mid Sussex District Council", "after": "and", "start_char_pos": 1684, "end_char_pos": 1739}, {"type": "D", "before": "Charity Commission for England and Wales", "after": null, "start_char_pos": 1964, "end_char_pos": 2004}, {"type": "D", "before": "HM Revenue and Customs", "after": null, "start_char_pos": 2308, "end_char_pos": 2330}, {"type": "A", "before": null, "after": "Sister links", "start_char_pos": 2390, "end_char_pos": 2390}], "sents_char_pos": [0, 155, 427, 571, 765, 853, 978, 1090, 1200, 1372, 1489, 1648, 1802, 1903, 1959, 2141, 2286, 2376]}
+{"doc_id": "21575", "revision_depth": "1", "before_revision": "Thad Allen The U.S. Secretary of Homeland Security, Michael Chertoff , announced from Baton Rouge , Louisiana on Friday that Coast Guard Vice Admiral Thad W. Allen will replace the Federal Emergency Management Agency (FEMA) director Michael D. Brown as the Principal Federal Official (PFO) for the recovery effort; however, Mr. Brown will continue as the Director of FEMA. Mr. Brown, who came under intense pressure for government failures to provide timely assistance to disaster victims of Hurricane Katrina , was ordered back to Washington and relieved of his duties in the Gulf States . His immediate FEMA role now will be for its national administration. The personnel change results in FEMA's local effort now being headed-up by military leadership, instead of civilian. However, Admiral Allen's Deputy (the number two federal offiicial in the field) is a civilian. The Coast Guard came under the homeland \u2019 s security umbrella in 2003. Allen, a career Coast Guard officer, was in charge of its Atlantic forces fleet during the terrorist 9/11 attack in New York City in 2001. Michael Chertoff Mr. Brown, who was hailed last week by President Bush , \"Brownie, you're doing a heck of a job,\" was nominated by Bush himself to head FEMA in 2003. Recent allegations that credentials Brown listed on his resume prior to employment at FEMA, which began in 2001, that said he worked in emergency services for the city of Edmond , OK from 1975 to 1978, along with being awarded \"Outstanding Political Science Professor \u201d at the Central State University in Oklahoma, both have come under fire in a report by TIME magazine two days ago. Critics question how thorough the White House was in its vetting Brown for the FEMA assignment. When commenting about Mr. Brown last Friday, Senator Mary L. Landrieu , who spent more than a week in the hurricane struck area, said \"I have been telling him from the moment he arrived about the urgency of the situation\" and \"I just have to tell you that he had a difficult time understanding the enormity of the task before us.\"", "after_revision": "Thad Allen The U.S. Secretary of , , announced from , Louisiana on Friday that Vice Admiral will replace the (FEMA) director as the Principal Federal Official (PFO) for the recovery effort; however, Mr. Brown will continue as the Director of FEMA. Mr. Brown, who came under intense pressure for government failures to provide timely assistance to disaster victims of , was ordered back to and relieved of his duties in the . His immediate FEMA role now will be for its national administration. The personnel change results in FEMA's local effort now being headed-up by military leadership, instead of civilian. However, Admiral Allen's Deputy (the number two federal offiicial in the field) is a civilian. The Coast Guard came under the homeland ' s security umbrella in 2003. Allen, a career Coast Guard officer, was in charge of its Atlantic forces fleet during the terrorist attack in New York City in 2001. Michael Chertoff Mr. Brown, who was hailed last week by , \"Brownie, you're doing a heck of a job,\" was nominated by Bush himself to head FEMA in 2003. Recent allegations that credentials Brown listed on his resume prior to employment at FEMA, which began in 2001, that said he worked in emergency services for the city of , OK from 1975 to 1978, along with being awarded \"Outstanding Political Science Professor \" at the Central State University in Oklahoma, both have come under fire in a report by magazine two days ago. Critics question how thorough the White House was in its vetting Brown for the FEMA assignment. When commenting about Mr. Brown last Friday, Senator , who spent more than a week in the hurricane struck area, said \"I have been telling him from the moment he arrived about the urgency of the situation\" and \"I just have to tell you that he had a difficult time understanding the enormity of the task before us.\"", "edit_actions": [{"type": "D", "before": "Homeland Security, Michael Chertoff", "after": null, "start_char_pos": 33, "end_char_pos": 68}, {"type": "A", "before": null, "after": ",", "start_char_pos": 71, "end_char_pos": 71}, {"type": "D", "before": "Baton Rouge", "after": null, "start_char_pos": 87, "end_char_pos": 98}, {"type": "R", "before": "Coast Guard Vice Admiral Thad W. Allen", "after": "Vice Admiral", "start_char_pos": 126, "end_char_pos": 164}, {"type": "D", "before": "Federal Emergency Management Agency", "after": null, "start_char_pos": 182, "end_char_pos": 217}, {"type": "D", "before": "Michael D. Brown", "after": null, "start_char_pos": 234, "end_char_pos": 250}, {"type": "D", "before": "Hurricane Katrina", "after": null, "start_char_pos": 493, "end_char_pos": 510}, {"type": "D", "before": "Washington", "after": null, "start_char_pos": 533, "end_char_pos": 543}, {"type": "D", "before": "Gulf States", "after": null, "start_char_pos": 578, "end_char_pos": 589}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 913, "end_char_pos": 914}, {"type": "D", "before": "9/11", "after": null, "start_char_pos": 1045, "end_char_pos": 1049}, {"type": "D", "before": "President Bush", "after": null, "start_char_pos": 1139, "end_char_pos": 1153}, {"type": "D", "before": "Edmond", "after": null, "start_char_pos": 1420, "end_char_pos": 1426}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1517, "end_char_pos": 1518}, {"type": "D", "before": "TIME", "after": null, "start_char_pos": 1605, "end_char_pos": 1609}, {"type": "D", "before": "Mary L. Landrieu", "after": null, "start_char_pos": 1782, "end_char_pos": 1798}], "sents_char_pos": [0, 315, 591, 660, 777, 872, 943, 1082, 1248, 1632, 1728]}
+{"doc_id": "22241", "revision_depth": "1", "before_revision": "A story about a man carrying over 30,000 (sometimes reported as 40,000) volts of static electricity in his body, allegedly generated by a wool sweater and nylon jacket combination, is circulating through major news outlets. The story, carried first by the Warrnambool Standard, says that the man, Frank Clewer, a 58-year old cleaner from Dennington , involuntarily created a scene by causing fire departments to evacuate three buildings where he had left his mark, before he realized he was causing the burn marks on carpets and allowed the fire department to help him. The story has been picked up by The Register , Guardian, BBC, USA Today, Reuters , local agencies of ABC, the San Francisco Chronicle , and other news outlets. Several unanswered objections mark the story as a possible hoax: Clewer enters and exits his car several times in the story - if he opened the car by touching its presumably metal lock, he would surely release some electricity into the car through his hand; everyone has at some point experienced the painful shock of touching a door handle or car keys to a lock. Though the car might not be grounded , it would still be at a lower potential and thus energy would be transferred. This would be noticeable; the story does not comment that Clewer understood what was happening to him. Firefighters supposedly \"used a device to check static electricity on him and his belongings.\" While firefighters would be likely to carry a high-voltage multimeter around to measure the current and voltage ratings of downed power lines, it is unlikely that the same device could measure such a large voltage resulting from a very small amount of static energy without de-electrifying it. For such a large voltage to be stored, humidity would have to have been extremely low on that day for the air around him not to ionize and source current, removing the static energy. If he was carrying such a large voltage, his hair would probably have stood on end, as this is a notable effect when one touches a Van de Graaf generator . Note: It is uncertain at what voltage this effect begins, and since Van de Graaf machines routinely exceed Megavolts of electric potential, this may not be a verifiable objection. This statement: \"Firefighters took possession of Clewer's jacket and stored it in the courtyard of the fire station, where it continued to give off a strong electrical current .\" (Reuters UK) First, there is no reason they would need to take possession of the jacket - the static electricity could be dealt with by simply dumping water on it. Second, the jacket could not \"give off\" an electric current without some continuous source of energy, which, in storage, is impossible. It is possible that the jacket could hold a voltage, but the effects of this would not be visible - if they were, they would be short-lived as the jacket would lose its static energy. In any event, the current would be miniscule. The amount of energy stored on Clewer's person and possessions could not have been more than a few Joules; this is unlikely to have burned carpet. The equation for stored energy in capacitors is: Where U = energy, C = capacitance , and V = voltage . A human body by itself typically has a capacitance of around 250 pF , which would mean a voltage of 30,000 V would produce energy of 0.11 joules . Even if Clewer's possessions resulted in a parallel capacitance of 1 microfarad , this would still only result in an energy storage of 450 J. This amount of energy would be insufficient to burn carpet or char plastic, although a spark could ignite flammable vapor or gas.", "after_revision": "A story about a man carrying over 30,000 (sometimes reported as 40,000) of in his body, allegedly generated by a wool sweater and nylon jacket combination, is circulating through major news outlets. The story, carried first by the Standard, says that the man, Frank Clewer, a 58-year old cleaner from , involuntarily created a scene by causing fire departments to evacuate three buildings where he had left his mark, before he realized he was causing the burn marks on carpets and allowed the fire department to help him. The story has been picked up by , Guardian, , , , local agencies of , the , and other news outlets. Several unanswered objections mark the story as a possible hoax: Clewer enters and exits his car several times in the story \u2014 if he opened the car by touching its presumably metal lock, he would surely release some electricity into the car through his hand; everyone has at some point experienced the painful shock of touching a door handle or car keys to a lock. Though the car might not be , it would still be at a lower potential and thus energy would be transferred. This would be noticeable; the story does not comment that Clewer understood what was happening to him. Firefighters supposedly \"used a device to check static electricity on him and his belongings.\" While firefighters would be likely to carry a high-voltage around to measure the and ratings of downed power lines, it is unlikely that the same device could measure such a large voltage resulting from a very small amount of static energy without de-electrifying it. For such a large voltage to be stored, humidity would have to have been extremely low on that day for the air around him not to ionize and source current, removing the static energy. If he was carrying such a large voltage, his hair would probably have stood on end, as this is a notable effect when one touches a . Note: It is uncertain at what voltage this effect begins, and since Van de Graaf machines routinely exceed Megavolts of electric potential, this may not be a verifiable objection. This statement: \"Firefighters took possession of Clewer's jacket and stored it in the courtyard of the fire station, where it continued to give off a strong electrical .\" (Reuters UK) First, there is no reason they would need to take possession of the jacket \u2014 the static electricity could be dealt with by simply dumping water on it. Second, the jacket could not \"give off\" an electric current without some continuous source of energy, which, in storage, is impossible. It is possible that the jacket could hold a voltage, but the effects of this would not be visible \u2014 if they were, they would be short-lived as the jacket would lose its static energy. In any event, the current would be miniscule. The amount of energy stored on Clewer's person and possessions could not have been more than a few Joules; this is unlikely to have burned carpet. The equation for stored energy in is: Where U = energy, C = , and V = . A human body by itself typically has a capacitance of around 250 , which would mean a voltage of 30,000 V would produce energy of 0.11 . Even if Clewer's possessions resulted in a parallel capacitance of 1 , this would still only result in an energy storage of 450 J. This amount of energy would be insufficient to burn carpet or char plastic, although a spark could ignite flammable vapor or gas.", "edit_actions": [{"type": "R", "before": "volts of static electricity", "after": "of", "start_char_pos": 72, "end_char_pos": 99}, {"type": "D", "before": "Warrnambool", "after": null, "start_char_pos": 256, "end_char_pos": 267}, {"type": "D", "before": "Dennington", "after": null, "start_char_pos": 338, "end_char_pos": 348}, {"type": "D", "before": "The Register", "after": null, "start_char_pos": 602, "end_char_pos": 614}, {"type": "D", "before": "BBC, USA Today, Reuters", "after": null, "start_char_pos": 627, "end_char_pos": 650}, {"type": "A", "before": null, "after": ", ,", "start_char_pos": 653, "end_char_pos": 653}, {"type": "D", "before": "ABC, the San Francisco Chronicle", "after": null, "start_char_pos": 672, "end_char_pos": 704}, {"type": "A", "before": null, "after": "the ,", "start_char_pos": 707, "end_char_pos": 707}, {"type": "R", "before": "-", "after": "\u2014", "start_char_pos": 856, "end_char_pos": 857}, {"type": "D", "before": "grounded", "after": null, "start_char_pos": 1124, "end_char_pos": 1132}, {"type": "D", "before": "multimeter", "after": null, "start_char_pos": 1469, "end_char_pos": 1479}, {"type": "R", "before": "current and voltage", "after": "and", "start_char_pos": 1502, "end_char_pos": 1521}, {"type": "D", "before": "Van de Graaf generator", "after": null, "start_char_pos": 2018, "end_char_pos": 2040}, {"type": "D", "before": "current", "after": null, "start_char_pos": 2391, "end_char_pos": 2398}, {"type": "R", "before": "-", "after": "\u2014", "start_char_pos": 2490, "end_char_pos": 2491}, {"type": "R", "before": "-", "after": "\u2014", "start_char_pos": 2800, "end_char_pos": 2801}, {"type": "D", "before": "capacitors", "after": null, "start_char_pos": 3113, "end_char_pos": 3123}, {"type": "D", "before": "capacitance", "after": null, "start_char_pos": 3150, "end_char_pos": 3161}, {"type": "D", "before": "voltage", "after": null, "start_char_pos": 3172, "end_char_pos": 3179}, {"type": "D", "before": "pF", "after": null, "start_char_pos": 3247, "end_char_pos": 3249}, {"type": "D", "before": "joules", "after": null, "start_char_pos": 3320, "end_char_pos": 3326}, {"type": "D", "before": "microfarad", "after": null, "start_char_pos": 3398, "end_char_pos": 3408}], "sents_char_pos": [0, 223, 569, 731, 989, 1095, 1211, 1237, 1314, 1409, 1703, 1886, 2042, 2222, 2565, 2701, 2885, 2931, 3038, 3078, 3181, 3328]}
+{"doc_id": "222424", "revision_depth": "1", "before_revision": "Roush Fenway Racing driver Carl Edwards won the NASCAR Sprint Cup Series 2010 Ford 400 held yesterday at Homestead Miami Speedway in Homestead , Florida. Jimmie Johnson claimed the championship after finishing second \u2014 his fifth championship in a row. Throughout the course of the race there were 10 cautions and 25 lead changes among 9 different drivers. File photo of Carl Edwards (2008) at flickr Kevin Harvick came in third for Richard Childress Racing, and Aric Almirola finished fourth, after starting 24th. Almirola's teammate A. J. Allmendinger finished 5th in front of Kasey Kahne. Ryan Newman and Tony Stewart finished behind Kahne in 7th and 8th. Matt Kenseth, and Greg Biffle rounded out the top ten finishers in the race. In the Drivers' championship, Johnson claimed his fifth consecutive championship, after being in second prior to the race. Denny Hamlin followed, 39 behind Johnson, and three ahead of Harvick in third. Edwards was scored fourth, Kenseth took fifth , Biffle was sixth, and Stewart was seventh, after finishing eighth. Jeff Gordon and Clint Bowyer was ninth and tenth. Afterward, Johnson's crew chief, Chad Knaus commented, \"I think finally, finally after pulling this off Jimmie will get the respect that he deserves. Knowing what we had to do \u2014 come down here and beat them \u2014 and we beat them.\" Next, third place finisher, Harvick commented, \"We went down swinging and that is what we came here to do. Those guys outran us on that last restart there. All in all I\u2019m proud of all my guys. We did everything we wanted to do today but win the race. This is a great spot to start building for consistent championship runs next year. We had a top three car but they got by us on the restarts. All in all, it was a good day. What can you do?\" ", "after_revision": "driver won the NASCAR held yesterday at in , Florida. claimed the after finishing second \u2014 his fifth championship in a row. Throughout the course of the race there were 10 and 25 lead changes among 9 different drivers. File photo of Carl Edwards (2008) at came in third for , and finished fourth, after starting 24th. Almirola's teammate finished 5th in front of . and finished behind Kahne in 7th and 8th. , and rounded out the top ten finishers in the race. In the Drivers' championship, Johnson claimed his fifth consecutive championship, after being in second prior to the race. followed, 39 behind Johnson, and three ahead of Harvick in third. Edwards was scored fourth, Kenseth took fifth , Biffle was sixth, and Stewart was seventh, after finishing eighth. and was ninth and tenth. Afterward, Johnson's crew chief, commented, \"I think finally, finally after pulling this off Jimmie will get the respect that he deserves. Knowing what we had to do \u2014 come down here and beat them \u2014 and we beat them.\" Next, third place finisher, Harvick commented, \"We went down swinging and that is what we came here to do. Those guys outran us on that last restart there. All in all I\u2019m proud of all my guys. We did everything we wanted to do today but win the race. This is a great spot to start building for consistent championship runs next year. We had a top three car but they got by us on the restarts. All in all, it was a good day. What can you do?\" Sister links", "edit_actions": [{"type": "R", "before": "Roush Fenway Racing driver Carl Edwards", "after": "driver", "start_char_pos": 0, "end_char_pos": 39}, {"type": "D", "before": "Sprint Cup Series 2010 Ford 400", "after": null, "start_char_pos": 55, "end_char_pos": 86}, {"type": "R", "before": "Homestead Miami Speedway in Homestead", "after": "in", "start_char_pos": 105, "end_char_pos": 142}, {"type": "R", "before": "Jimmie Johnson claimed the championship", "after": "claimed the", "start_char_pos": 154, "end_char_pos": 193}, {"type": "D", "before": "cautions", "after": null, "start_char_pos": 300, "end_char_pos": 308}, {"type": "D", "before": "flickr", "after": null, "start_char_pos": 393, "end_char_pos": 399}, {"type": "D", "before": "Kevin Harvick", "after": null, "start_char_pos": 400, "end_char_pos": 413}, {"type": "R", "before": "Richard Childress Racing, and Aric Almirola", "after": ", and", "start_char_pos": 432, "end_char_pos": 475}, {"type": "D", "before": "A. J. Allmendinger", "after": null, "start_char_pos": 534, "end_char_pos": 552}, {"type": "R", "before": "Kasey Kahne. Ryan Newman and Tony Stewart", "after": ". and", "start_char_pos": 578, "end_char_pos": 619}, {"type": "R", "before": "Matt Kenseth, and Greg Biffle", "after": ", and", "start_char_pos": 658, "end_char_pos": 687}, {"type": "D", "before": "Denny Hamlin", "after": null, "start_char_pos": 858, "end_char_pos": 870}, {"type": "R", "before": "Jeff Gordon and Clint Bowyer", "after": "and", "start_char_pos": 1052, "end_char_pos": 1080}, {"type": "D", "before": "Chad Knaus", "after": null, "start_char_pos": 1135, "end_char_pos": 1145}, {"type": "A", "before": null, "after": "Sister links", "start_char_pos": 1772, "end_char_pos": 1772}], "sents_char_pos": [0, 153, 251, 355, 513, 590, 657, 734, 857, 936, 1051, 1101, 1251, 1329, 1436, 1485, 1522, 1580, 1663, 1722, 1753]}
+{"doc_id": "224000", "revision_depth": "1", "before_revision": "\"It catched my mother in Pichilemu. She got dressed in case of she having to flee to the La Cruz Hill ,\" B\u00e1rbara Ponce said. In the picture, people staying in the La Cruz Hill after the March 11 earthquake. USGS' location map for the 08:19 UTC aftershock. Four strong aftershocks have occurred on today's early morning in Chile. The fourth and strongest quake had a 5.6 magnitude in the Richter scale. No damage was reported. The first shaking took place at 00:37 local time (03:37 UTC), which according to the University of Chile Seismological Service had a 4.7 magnitude in the Richter scale. It occurred 64 kilometers west of Navidad , O'Higgins Region at a depth of 31 kilometers, University of Chile reported. It was felt in cities such as Melipilla (Santiago Metropolitan Region), Pichilemu (O'Higgins Region) and Rancagua (O'Higgins Region). At 04:31 local time (07:31 UTC), the third movement occurred. With a magnitude of 4.3, it occurred 34 kilometers northwest of Talca, Maule Region , near Lolol at a depth of 65.1 kilometers. The fourth shake took place at 05:19 local time (08:19 UTC). According to the University of Chile, it had a magnitude of 5.6, and occurred 32 kilometers south of Pichilemu, O'Higgins Region at a depth of 41.9 kilometers. According to ONEMI, there were no casualties nor damage provoked by the aftershock. This movement was felt across the Valpara\u00edso, Santiago Metropolitan , O'Higgins, Maule, and B\u00edo B\u00edo Regions, in cities such as Valpara\u00edso, Vi\u00f1a del Mar, Santiago Centro, San Fernando, Curic\u00f3 , Talca, Constituci\u00f3n, Talcahuano, Cauquenes, and Concepci\u00f3n . Chile's National System of Tsunami Alerts ruled out the possibility of a tsunami, according to Radio Cooperativa . \"In Rancagua, it all was really shake-y,\" said Daniela Banda Sandoval, a Facebook user who commented on Pichilemu's Facebook page. \"[It was felt] very strong[ly] here in Santa Cruz , in addition of being noisy, it was as strong as the [February] earthquake!,\" Agust\u00edn Toro Reyes said. \"At least we are sure now the ONEMI 's guy was awake! Jinx Arjona ... drift away from Chile!,\" Ro Fernandez said on Pichilemu's page, referring to ONEMI's late response after the February 27 earthquake and Ricardo Arjona's announcement to visit Chile. Arjona was one of the last artists to perform on the 2010 Vi\u00f1a del Mar International Festival before the February earthquake. The United States Geological Survey , however, reported that the earthquake had a magnitude of 5.4, and that it occurred at a depth of 35 kilometers, 60 kilometers northwest of Curic\u00f3, Maule Region.", "after_revision": "\"It catched my mother in Pichilemu. She got dressed in case of she having to flee to the ,\" B\u00e1rbara Ponce said. In the picture, people staying in the La Cruz Hill after the March 11 earthquake. USGS' location map for the 08:19 UTC aftershock. Four strong aftershocks have occurred on today's early morning in Chile. The fourth and strongest quake had a 5.6 magnitude in the Richter scale. No damage was reported. The first shaking took place at 00:37 local time (03:37 UTC), which according to the had a 4.7 magnitude in the Richter scale. It occurred 64 kilometers west of , O'Higgins Region at a depth of 31 kilometers, University of Chile reported. It was felt in cities such as (Santiago Metropolitan Region), Pichilemu (O'Higgins Region) and (O'Higgins Region). At 04:31 local time (07:31 UTC), the third movement occurred. With a magnitude of 4.3, it occurred 34 kilometers northwest of Talca, , near Lolol at a depth of 65.1 kilometers. The fourth shake took place at 05:19 local time (08:19 UTC). According to the University of Chile, it had a magnitude of 5.6, and occurred 32 kilometers south of Pichilemu, O'Higgins Region at a depth of 41.9 kilometers. According to ONEMI, there were no casualties nor damage provoked by the aftershock. This movement was felt across the , , O'Higgins, Maule, and Regions, in cities such as , , , , , Talca, , , , and . Chile's National System of Tsunami Alerts ruled out the possibility of a tsunami, according to . \"In Rancagua, it all was really shake-y,\" said Daniela Banda Sandoval, a Facebook user who commented on Pichilemu's Facebook page. \"[It was felt] very strong[ly] here in , in addition of being noisy, it was as strong as the [February] earthquake!,\" Agust\u00edn Toro Reyes said. \"At least we are sure now the 's guy was awake! Jinx ... drift away from Chile!,\" Ro Fernandez said on Pichilemu's page, referring to ONEMI's late response after the February 27 earthquake and Ricardo Arjona's announcement to visit Chile. Arjona was one of the last artists to perform on the 2010 Vi\u00f1a del Mar International Festival before the February earthquake. The , however, reported that the earthquake had a magnitude of 5.4, and that it occurred at a depth of 35 kilometers, 60 kilometers northwest of Curic\u00f3, Maule Region.", "edit_actions": [{"type": "D", "before": "La Cruz", "after": null, "start_char_pos": 89, "end_char_pos": 96}, {"type": "D", "before": "Hill", "after": null, "start_char_pos": 97, "end_char_pos": 101}, {"type": "D", "before": "University of Chile Seismological Service", "after": null, "start_char_pos": 511, "end_char_pos": 552}, {"type": "D", "before": "Navidad", "after": null, "start_char_pos": 629, "end_char_pos": 636}, {"type": "D", "before": "Melipilla", "after": null, "start_char_pos": 745, "end_char_pos": 754}, {"type": "D", "before": "Rancagua", "after": null, "start_char_pos": 820, "end_char_pos": 828}, {"type": "D", "before": "Maule Region", "after": null, "start_char_pos": 982, "end_char_pos": 994}, {"type": "D", "before": "Valpara\u00edso, Santiago Metropolitan", "after": null, "start_char_pos": 1378, "end_char_pos": 1411}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1414, "end_char_pos": 1414}, {"type": "D", "before": "B\u00edo B\u00edo", "after": null, "start_char_pos": 1437, "end_char_pos": 1444}, {"type": "D", "before": "Valpara\u00edso, Vi\u00f1a del Mar, Santiago Centro, San Fernando, Curic\u00f3", "after": null, "start_char_pos": 1472, "end_char_pos": 1535}, {"type": "A", "before": null, "after": ", , , ,", "start_char_pos": 1538, "end_char_pos": 1538}, {"type": "R", "before": "Constituci\u00f3n, Talcahuano, Cauquenes, and Concepci\u00f3n", "after": ", , , and", "start_char_pos": 1546, "end_char_pos": 1597}, {"type": "D", "before": "Radio Cooperativa", "after": null, "start_char_pos": 1695, "end_char_pos": 1712}, {"type": "D", "before": "Santa Cruz", "after": null, "start_char_pos": 1885, "end_char_pos": 1895}, {"type": "D", "before": "ONEMI", "after": null, "start_char_pos": 2030, "end_char_pos": 2035}, {"type": "D", "before": "Arjona", "after": null, "start_char_pos": 2059, "end_char_pos": 2065}, {"type": "D", "before": "United States Geological Survey", "after": null, "start_char_pos": 2382, "end_char_pos": 2413}], "sents_char_pos": [0, 35, 124, 206, 255, 328, 401, 425, 594, 714, 848, 910, 1038, 1099, 1259, 1343, 1756, 1845, 1999, 2053, 2251, 2377]}
+{"doc_id": "227903", "revision_depth": "1", "before_revision": "In the United Kingdom, the average price of unleaded petrol motor fuel has reached a record high of 121.76p a litre. The previous peak in the country was 121.61p a litre, on May 12, 2010. In comparison to last year, petrol is currently more expensive by 11.88p, according to The Automobile Association (AA). The price for fuelling a tank of 50 litres will now be more expensive by \u00a35.94. Edmund King, current president of the AA, has stated: \"In the past week, we have seen the average price of petrol shoot up 1.7p a litre across the UK and diesel rise 1.61p. It comes at a particularly bad time for drivers, who have struggled with appalling winter weather and often seen their fuel drain away while stuck in snow-bound traffic jams. Our only hope is that either oil and fuel markets settle back down or the pound strengthens against the dollar. Until then, it is an even more uncomfortable ride for families trying to keep cars on the road.\" At 125.73p a litre on average, diesel motor fuel is approximately eight pence lower than its peak of 133.25p , achieved in July 2008. Diesel is currently 14.21p more expensive than it was one yearago . In January 2011, the prices of fuel are anticipated to increase again due to the increased value added tax rate and higher hydrocarbon oil duty prices coming into effect. Adrian Tink, a motoring strategist for the RAC, believes that the latter should be called off . He commented : \"It's unbelievable to think that, compared with this time last year, petrol is 13p a litre more expensive. That's over \u00a37 more every time you fill up an average tank. While the increases this year have been driven by a number of factors, you can't get away from the fact that we have seen five rises in fuel duty in the past two years \u2014 and we're due another one in January, plus a VAT rise. Who knows what the price will be come January 5 2011? An average of 125p per litre is very feasible.\"", "after_revision": "In the United Kingdom, the average price of unleaded petrol has reached a record high of 121.76p a litre. The previous peak was 121.61p a litre, on May 12, 2010. In comparison to last year, petrol is more expensive by 11.88p, according to The Automobile Association (AA). The price for 50 litres has therefore increased by \u00a35.94. Edmund King, current president of the AA, stated: \"In the past week, we have seen the average price of petrol shoot up 1.7p a litre across the UK and diesel rise 1.61p. It comes at a particularly bad time for drivers, who have struggled with appalling winter weather and often seen their fuel drain away while stuck in snow-bound traffic jams. Our only hope is that either oil and fuel markets settle back down or the pound strengthens against the dollar. Until then, it is an even more uncomfortable ride for families trying to keep cars on the road.\" iAt 125.73p a litre on average, diesel is approximately eight pence lower than its July 2008 peak of 133.25p ; It remains 14.21p more expensive than last year . In January 2011, the prices of fuel are anticipated to rise again due to the increased value added tax rate and higher hydrocarbon oil duty prices coming into effect. Adrian Tink, a motoring strategist for the RAC, believes that the latter should be called off : \"It's unbelievable to think that, compared with this time last year, petrol is 13p a litre more expensive. That's over \u00a37 more every time you fill up an average tank. While the increases this year have been driven by a number of factors, you can't get away from the fact that we have seen five rises in fuel duty in the past two years \u2014 and we're due another one in January, plus a VAT rise. Who knows what the price will be come January 5 , 2011? An average of 125p per litre is very feasible.\"", "edit_actions": [{"type": "D", "before": "motor fuel", "after": null, "start_char_pos": 60, "end_char_pos": 70}, {"type": "D", "before": "in the country", "after": null, "start_char_pos": 135, "end_char_pos": 149}, {"type": "D", "before": "currently", "after": null, "start_char_pos": 226, "end_char_pos": 235}, {"type": "D", "before": "fuelling a tank of", "after": null, "start_char_pos": 322, "end_char_pos": 340}, {"type": "R", "before": "will now be more expensive", "after": "has therefore increased", "start_char_pos": 351, "end_char_pos": 377}, {"type": "D", "before": "has", "after": null, "start_char_pos": 430, "end_char_pos": 433}, {"type": "R", "before": "At", "after": "iAt", "start_char_pos": 945, "end_char_pos": 947}, {"type": "D", "before": "motor fuel", "after": null, "start_char_pos": 983, "end_char_pos": 993}, {"type": "A", "before": null, "after": "July 2008", "start_char_pos": 1038, "end_char_pos": 1038}, {"type": "R", "before": ", achieved in July 2008. Diesel is currently", "after": "; It remains", "start_char_pos": 1055, "end_char_pos": 1099}, {"type": "R", "before": "it was one yearago", "after": "last year", "start_char_pos": 1127, "end_char_pos": 1145}, {"type": "R", "before": "increase", "after": "rise", "start_char_pos": 1203, "end_char_pos": 1211}, {"type": "D", "before": ". He commented", "after": null, "start_char_pos": 1413, "end_char_pos": 1427}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1870, "end_char_pos": 1870}], "sents_char_pos": [0, 116, 187, 307, 387, 560, 735, 847, 944, 1079, 1147, 1318, 1414, 1536, 1596, 1821, 1876]}
+{"doc_id": "229932", "revision_depth": "1", "before_revision": "Rugby Park , Kilmarnock, Scotland In the Scottish Premier League (SPL), Kilmarnock F.C. defeated Hibernian F.C. 2-1 on Saturday. Nine minutes into the game in Rugby Park, Kilmarnock , Scotland, Liam Kelly became the first player of the game to score for Kilmarnock. He achieved a second goal for his team 43 minutes after the game commenced. In the second half of the match on the snow-covered field, Derek Riordan scored one goal for his team Hibernian at 55 minutes, which was also his 100th career goal for the team. Liam Miller of Hibernian was given a red card after clipping Conor Sammon 80 minutes into the game. Referee Craig Thomson decided this rulebreaking occurred immediately outside of the penalty area. Kilmarnock's position in the SPL table now increases to fifth. Meanwhile, Hibernian remain at ninth. Colin Calderwood , the Hibernian manager, said of the match \"[w]e've always got to be aware that [Kilmarnock] have got something to protect and we've got nothing to lose\", in an interview available on the BBC Sport website. \"The attitude and the sort of tempo of how we're going about it in the second half is just sort of the place in the right direction where I feel we've gotta go.\" In a separate BBC Sport interview, Kilmarnock manager Mixu Paatelainen commented: \"I thought for the first half we were excellent. You know, the surface was quite tricky today because it was a little bit snowy and the ball skids along but, you know, that possibly helped our passing game. You know, [Liam Kelly] was sharp, he was quick, he passed round players and he scored two excellent goals. The second half was a little bit stickier for us, owing to Hibs. They're a good team. They put us under pressure but, you know, thankfully our defence did their job and we only conceded one goal which was a fantastic strike from Riordan.\"", "after_revision": "w|Rugby Park , , Scotland In the (SPL), defeated 2-1 on Saturday. Nine minutes into the game in , , Scotland, became the first player of the game to score for Kilmarnock. He achieved a second goal for his team 43 minutes after the game commenced. In the second half of the match on the snow-covered field, scored one goal for his team Hibernian at 55 minutes, which was also his 100th career goal for the team. of Hibernian was given a red card after clipping 80 minutes into the game. Referee decided this rulebreaking occurred immediately outside of the penalty area. Kilmarnock's position in the SPL table now increases to fifth. Meanwhile, Hibernian remain at ninth. , the Hibernian manager, said of the match \"[w]e've always got to be aware that [Kilmarnock] have got something to protect and we've got nothing to lose\", in an interview available on the website. \"The attitude and the sort of tempo of how we're going about it in the second half is just sort of the place in the right direction where I feel we've gotta go.\" In a separate BBC Sport interview, Kilmarnock manager commented: \"I thought for the first half we were excellent. You know, the surface was quite tricky today because it was a little bit snowy and the ball skids along but, you know, that possibly helped our passing game. You know, [Liam Kelly] was sharp, he was quick, he passed round players and he scored two excellent goals. The second half was a little bit stickier for us, owing to Hibs. They're a good team. They put us under pressure but, you know, thankfully our defence did their job and we only conceded one goal which was a fantastic strike from Riordan.\"", "edit_actions": [{"type": "R", "before": "Rugby Park", "after": "w|Rugby Park", "start_char_pos": 0, "end_char_pos": 10}, {"type": "A", "before": null, "after": ",", "start_char_pos": 11, "end_char_pos": 11}, {"type": "D", "before": "Kilmarnock,", "after": null, "start_char_pos": 14, "end_char_pos": 25}, {"type": "D", "before": "Scottish Premier League", "after": null, "start_char_pos": 42, "end_char_pos": 65}, {"type": "R", "before": "Kilmarnock F.C. defeated Hibernian F.C.", "after": "defeated", "start_char_pos": 73, "end_char_pos": 112}, {"type": "D", "before": "Rugby Park, Kilmarnock", "after": null, "start_char_pos": 160, "end_char_pos": 182}, {"type": "A", "before": null, "after": ",", "start_char_pos": 185, "end_char_pos": 185}, {"type": "D", "before": "Liam Kelly", "after": null, "start_char_pos": 196, "end_char_pos": 206}, {"type": "D", "before": "Derek Riordan", "after": null, "start_char_pos": 403, "end_char_pos": 416}, {"type": "D", "before": "Liam Miller", "after": null, "start_char_pos": 522, "end_char_pos": 533}, {"type": "D", "before": "Conor Sammon", "after": null, "start_char_pos": 583, "end_char_pos": 595}, {"type": "D", "before": "Craig Thomson", "after": null, "start_char_pos": 630, "end_char_pos": 643}, {"type": "D", "before": "Colin Calderwood", "after": null, "start_char_pos": 821, "end_char_pos": 837}, {"type": "D", "before": "BBC Sport", "after": null, "start_char_pos": 1026, "end_char_pos": 1035}, {"type": "D", "before": "Mixu Paatelainen", "after": null, "start_char_pos": 1261, "end_char_pos": 1277}], "sents_char_pos": [0, 129, 267, 343, 521, 621, 719, 782, 820, 1044, 1206, 1337, 1495, 1602, 1667, 1688]}
+{"doc_id": "235169", "revision_depth": "1", "before_revision": "Some 8,400 complaints have been made to the BBC and 374 complaints have been received by Ofcom , a British media regulator, after soap opera EastEnders broadcasted what BBC News Online described as the \"cot death storyline\". Part of the EastEnders set. The storyline involves character Ronnie Branning \u2013 portrayed by Samantha Womack \u2013 taking her baby, who experienced sudden infant death syndrome (SIDS), and exchanging for another living baby, Alfie and Kat Moon 's recently born son. The plot has caused the largest number of complaints to be made about the show since it was first broadcast in 1985. Campaigners attempting to raise awareness of SIDS criticised the plot. Anne Diamond , a television presenter and one of those campaigners, remarked that the exchange of the babies was a \"crass twist to an otherwise credible storyline\" and said that not \"one iota of good in educating a young audience about cot death\" had been achieved by it. Due to the complaints received, the BBC have made the decision to end this storyline earlier than originally scheduled, during the spring of 2011. Bryan Kirkwood , the current executive producer of EastEnders, has disclosed that, at the end of this storyline, the baby, named Tommy, will remeet Kat Moon, his mother. Kirkwood said that this storyline, like many others in the BBC One programme, approaches \"social issues in a powerful and dramatic way\". He also explained: \"Although we have had complaints we have also had positive responses from people who have been through the experiences we are currently dramatising who feel we've done this and have contacted us to offer their backing. Justine Roberts, the chief executive officer and founder of British community website Mumsnet , created a letter of complaint for Mark Thompson, Director-General of the BBC . \"The focus of the complaint is the swapping story line,\" the letter reads. \"Our members are concerned that, as is all too common, a bereaved mother has been portrayed as deranged and unhinged.\" In response to the Mumsnet letter, Jana Bennett , director of vision at the BBC, stated that this plot was managed in a manner that was \"sensitively handled\". She stressed that \"[t]he show is absolutely not suggesting that this behaviour is typical of a mother who has suffered such a terrible and tragic loss. Before this incident occurred, the record for the highest number of complaints for EastEnders was a storyline in April 2009 that involved Danielle Jones being killed as the result of a car collision. That storyline received in excess of 7,000 complaints.", "after_revision": "Some 8,400 complaints have been made to the BBC and 374 complaints have been received by , a British media regulator, after soap opera broadcasted what described as the \"cot death storyline\". Part of the EastEnders set. The storyline involves character \u2013 portrayed by \u2013 taking her baby, who experienced (SIDS), and exchanging for another living baby, and 's recently born son. The plot has caused the largest number of complaints to be made about the show since it was first broadcast in 1985. Campaigners attempting to raise awareness of SIDS criticised the plot. , a television presenter and one of those campaigners, remarked that the exchange of the babies was a \"crass twist to an otherwise credible storyline\" and said that not \"one iota of good in educating a young audience about cot death\" had been achieved by it. Due to the complaints received, the BBC have made the decision to end this storyline earlier than originally scheduled, during the spring of 2011. , the current executive producer of EastEnders, has disclosed that, at the end of this storyline, the baby, named Tommy, will remeet Kat Moon, his mother. Kirkwood said that this storyline, like many others in the programme, approaches \"social issues in a powerful and dramatic way\". He also explained: \"Although we have had complaints we have also had positive responses from people who have been through the experiences we are currently dramatising who feel we've done this and have contacted us to offer their backing. Justine Roberts, the and founder of British community website , created a letter of complaint for , . \"The focus of the complaint is the swapping story line,\" the letter reads. \"Our members are concerned that, as is all too common, a bereaved mother has been portrayed as deranged and unhinged.\" In response to the Mumsnet letter, , director of vision at the BBC, stated that this plot was managed in a manner that was \"sensitively handled\". She stressed that \"[t]he show is absolutely not suggesting that this behaviour is typical of a mother who has suffered such a terrible and tragic loss. Before this incident occurred, the record for the highest number of complaints for EastEnders was a storyline in April 2009 that involved being killed as the result of a car collision. That storyline received in excess of 7,000 complaints.", "edit_actions": [{"type": "D", "before": "Ofcom", "after": null, "start_char_pos": 89, "end_char_pos": 94}, {"type": "R", "before": "EastEnders broadcasted what BBC News Online", "after": "broadcasted what", "start_char_pos": 141, "end_char_pos": 184}, {"type": "D", "before": "Ronnie Branning", "after": null, "start_char_pos": 286, "end_char_pos": 301}, {"type": "D", "before": "Samantha Womack", "after": null, "start_char_pos": 317, "end_char_pos": 332}, {"type": "D", "before": "sudden infant death syndrome", "after": null, "start_char_pos": 368, "end_char_pos": 396}, {"type": "R", "before": "Alfie and Kat Moon", "after": "and", "start_char_pos": 445, "end_char_pos": 463}, {"type": "D", "before": "Anne Diamond", "after": null, "start_char_pos": 674, "end_char_pos": 686}, {"type": "D", "before": "Bryan Kirkwood", "after": null, "start_char_pos": 1093, "end_char_pos": 1107}, {"type": "D", "before": "BBC One", "after": null, "start_char_pos": 1322, "end_char_pos": 1329}, {"type": "D", "before": "chief executive officer", "after": null, "start_char_pos": 1659, "end_char_pos": 1682}, {"type": "D", "before": "Mumsnet", "after": null, "start_char_pos": 1724, "end_char_pos": 1731}, {"type": "R", "before": "Mark Thompson, Director-General of the BBC", "after": ",", "start_char_pos": 1768, "end_char_pos": 1810}, {"type": "D", "before": "Jana Bennett", "after": null, "start_char_pos": 2042, "end_char_pos": 2054}, {"type": "D", "before": "Danielle Jones", "after": null, "start_char_pos": 2456, "end_char_pos": 2470}], "sents_char_pos": [0, 224, 252, 485, 602, 673, 945, 1092, 1262, 1399, 1637, 1887, 2006, 2165, 2317, 2517]}
+{"doc_id": "240672", "revision_depth": "1", "before_revision": "Public domain image of Jim Hedges from the Partisan Prohibition Historical Society website U.S. Prohibition Party presidential candidate Jim Hedges of Thompson Township , Pennsylvania took some time to answer a few questions about the Prohibition Party and his 2012 presidential campaign. The Prohibition Party is the third oldest existing political party in the United States, having been established in 1869. It reached its height of popularity during the late 19th century. The party heavily supported the Eighteenth Amendment to the United States Constitution , which banned the sale of alcohol, and resulted in the US period known as Prohibition (1919\u201333). It was repealed in 1933. The party has declined since this period, but has continued to nominate candidates for the presidential election. In 2003, the party split into two factions. Preacher Gene Amondson and perennial candidate Earl Dodge were nominated for the presidency by their respective factions. After Dodge's death in 2007, the party reunified and named Amondson as its sole presidential nominee for 2008. During the election, Amondson was interviewed by Wikinews. He died in 2009, leaving an opening in the party for 2012. Jim Hedges is a longtime Prohibition activist, who holds the distinction of the first individual of the 21st century (and the first since 1959) to be elected to a political office under the Prohibition Party banner. In 2001, he was elected as the Thompson Township tax assessor , and was re-elected to the post in 2005. He served until his term expired in 2010. Hedges declared his intent to run for the Prohibition Party presidential nomination on February 18, 2010. This marks his first run for the presidency. According to the New York Times, you were heavily involved in the 2004 split of the party that centered around five-time presidential nominee Earl Dodge . What exactly caused the split, and has the party since healed? The late Gene Amondson , the 2004 & 2008 presidential nominee of the Prohibition Party was the national face of the party for a number of years. How well did you know Mr. Amondson, and what is the current state of the party with his absence? Amondson was a congenial person, warm and approachable. He was recommended to us by one of our supporters. He had an act, a re-creation of Rev. Billy Sunday \u2019s sermon on booze, which he performed at conservative churches and other sympathetic venues. We hoped that his name recognition and the audience appeal of his act would enhance the Party\u2019s appeal. I have a BA in musical performance ( Iowa , 1960) and served 20 years in one of our nation\u2019s most elite military units, The United States Marine Band . I have a family-farm background, plus 20 years of life in the Washington, DC metropolitan area . I understand both rural and urban communities. I have an MA in Geography ( Maryland , 1972), have published research in refereed journals both here and abroad, and for 11 years edited a journal. I have done volunteer work with and served as an officer of community organizations ranging from The Salvation Army to friends of the library to recycling programs to historical and literary clubs. Cullman, Alabama, in June. See the National Committee's website for details. Do you agree with the decision to allow prominent Libertarian Stephen P. Gordon to speak at the convention, despite his support for the sale of alcohol? Yes. First of all, the Prohibition Party and the Libertarian Party share some common interests, such as small government, balanced budgets, and personal freedoms. Secondly, we should all take time to listen to those who disagree with us, in order to sharpen our debating skills. Thirdly, we shouldn\u2019t be complacent, because... we might actually be wrong! The platform most likely will address a lot of other things, but, let\u2019s face it: The Prohibition Party today is an exercise in living history. We\u2019re like the weekend warriors who put on costumes and re-enact the Civil War . The South is not going to rise again. Neither is national prohibition going to come back (not, at least, in our lifetimes). But in both cases, we think there are important historical lessons which ought not be forgotten. And so, we soldier on against all odds. According to Weekend America, Vice-Presidential nominee Leroy Pletten was incapacitated following a stroke during the 2008 campaign. Have you chosen a running mate , and if not, will health be a factor in the decision? Health should enter into it. We don\u2019t need another Reagan ! Three weekly newsmagazines: The Economist, The Nation, and Science . In the next 10 years, eliminating governmental deficits, primarily in the United States and in Europe. In the next 100 years, dealing with the social and economic consequences of the rise in sea level due to climatic warming . Bush the Younger was unquestionably the most damaging president since FDR , perhaps the most damaging of all time: His \" Patriot Act \" and other security measures trashed the Constitution , our Constitution. His deficits have never been equaled. His foreign military adventures are the longest wars ever fought by our country. Obama was dealt a miserable hand, but even so, I\u2019m becoming disappointed. We still have Bush\u2018s deficit spending . We still have Bush\u2019s wars . We still have Bush\u2019s failure to secure the border with Mexico . We still have Bush\u2019s exporting American jobs overseas . What is there to like? Obama did end Bush\u2019s \" global gag rule ,\" which attempted to prevent family planning agencies all over the world from even discussing abortion. And he did make a stab at improving medical care. Palin was given a job for four years by the voters of Alaska. When she got bored with it, she handed the office key to her lieutenant governor and walked away. That\u2019s not responsible behavior. What is your take on the the health care bill ? Obamacare is a step in the right direction, but it leaves intact the private insurance industry, which is a major source of waste. We need a public health service , like the one in England. America first! Our unqualified support for Israel is doing us a great deal of damage elsewhere in the world. We need to stop all aid, both civilian and military, to Israel until Israel abides by the Oslo Accords . We need to stop being the world\u2019s bully and, instead, lead by example: ratify Kyoto, ratify CEDAW , rein in the international corporations. You know, I think it would be appropriate to name Jimmy Carter . I didn\u2019t always agree with what he did, but I could sympathize with why he did it. To the extent that any president can be, he was an honest, well-meaning person.", "after_revision": "Public domain image of Jim Hedges from the Partisan Prohibition Historical Society website U.S. presidential candidate Jim Hedges of , Pennsylvania took some time to answer a few questions about the Prohibition Party and his 2012 presidential campaign. The Prohibition Party is the third oldest existing political party in the United States, having been established in 1869. It reached its height of popularity during the late 19th century. The party heavily supported the , which banned the sale of alcohol, and resulted in the US period known as (1919\u201333). It was repealed in 1933. The party has declined since this period, but has continued to nominate candidates for the presidential election. In 2003, the party split into two factions. Preacher and perennial candidate were nominated for the presidency by their respective factions. After Dodge's death in 2007, the party reunified and named Amondson as its sole presidential nominee for 2008. During the election, Amondson was interviewed by Wikinews. He died in 2009, leaving an opening in the party for 2012. Jim Hedges is a longtime activist, who holds the distinction of the first individual of the 21st century (and the first since 1959) to be elected to a political office under the Prohibition Party banner. In 2001, he was elected as the Thompson Township , and was re-elected to the post in 2005. He served until his term expired in 2010. Hedges declared his intent to run for the Prohibition Party presidential nomination on February 18, 2010. This marks his first run for the presidency. According to the New York Times, you were heavily involved in the 2004 split of the party that centered around five-time presidential nominee . What exactly caused the split, and has the party since healed? The late , the 2004 & 2008 presidential nominee of the Prohibition Party was the national face of the party for a number of years. How well did you know Mr. Amondson, and what is the current state of the party with his absence? Amondson was a congenial person, warm and approachable. He was recommended to us by one of our supporters. He had an act, a re-creation of Rev. \u2019s sermon on booze, which he performed at conservative churches and other sympathetic venues. We hoped that his name recognition and the audience appeal of his act would enhance the Party\u2019s appeal. I have a in musical performance ( , 1960) and served 20 years in one of our nation\u2019s most elite military units, The . I have a family-farm background, plus 20 years of life in the . I understand both rural and urban communities. I have an in Geography ( , 1972), have published research in refereed journals both here and abroad, and for 11 years edited a journal. I have done volunteer work with and served as an officer of community organizations ranging from The to friends of the library to recycling programs to historical and literary clubs. , in June. See the National Committee's website for details. Do you agree with the decision to allow prominent to speak at the convention, despite his support for the sale of alcohol? Yes. First of all, the Prohibition Party and the share some common interests, such as small government, balanced budgets, and personal freedoms. Secondly, we should all take time to listen to those who disagree with us, in order to sharpen our debating skills. Thirdly, we shouldn\u2019t be complacent, because... we might actually be wrong! The platform most likely will address a lot of other things, but, let\u2019s face it: The Prohibition Party today is an exercise in living history. We\u2019re like the weekend warriors who put on costumes and . The South is not going to rise again. Neither is national prohibition going to come back (not, at least, in our lifetimes). But in both cases, we think there are important historical lessons which ought not be forgotten. And so, we soldier on against all odds. According to Weekend America, Vice-Presidential nominee Leroy Pletten was incapacitated following a stroke during the 2008 campaign. Have you chosen a , and if not, will health be a factor in the decision? Health should enter into it. We don\u2019t need another ! Three weekly newsmagazines: , , and . In the next 10 years, eliminating governmental deficits, primarily in the United States and in Europe. In the next 100 years, dealing with the social and economic consequences of the rise in sea level due to . Bush the Younger was unquestionably the most damaging president since , perhaps the most damaging of all time: His \" \" and other security measures trashed the , our Constitution. His deficits have never been equaled. His foreign military adventures are the longest wars ever fought by our country. Obama was dealt a miserable hand, but even so, I\u2019m becoming disappointed. We still have Bush\u2018s . We still have . We still have Bush\u2019s failure to secure . We still have Bush\u2019s . What is there to like? Obama did end Bush\u2019s \" ,\" which attempted to prevent family planning agencies all over the world from even discussing abortion. And he did make a stab at improving medical care. Palin was for four years by the voters of Alaska. When she got bored with it, to and walked away. That\u2019s not responsible behavior. What is your take on the the ? Obamacare is a step in the right direction, but it leaves intact the private insurance industry, which is a major source of waste. We need a , like the one in England. America first! Our unqualified is doing us a great deal of damage elsewhere in the world. We need to stop all aid, both civilian and military, to Israel until Israel abides by the . We need to stop being the world\u2019s bully and, instead, lead by example: ratify , ratify , rein in the international corporations. You know, I think it would be appropriate to name . I didn\u2019t always agree with what he did, but I could sympathize with why he did it. To the extent that any president can be, he was an honest, well-meaning person.", "edit_actions": [{"type": "D", "before": "Prohibition Party", "after": null, "start_char_pos": 96, "end_char_pos": 113}, {"type": "D", "before": "Thompson Township", "after": null, "start_char_pos": 151, "end_char_pos": 168}, {"type": "D", "before": "Eighteenth Amendment to the United States Constitution", "after": null, "start_char_pos": 509, "end_char_pos": 563}, {"type": "D", "before": "Prohibition", "after": null, "start_char_pos": 639, "end_char_pos": 650}, {"type": "D", "before": "Gene Amondson", "after": null, "start_char_pos": 854, "end_char_pos": 867}, {"type": "D", "before": "Earl Dodge", "after": null, "start_char_pos": 892, "end_char_pos": 902}, {"type": "D", "before": "Prohibition", "after": null, "start_char_pos": 1221, "end_char_pos": 1232}, {"type": "D", "before": "tax assessor", "after": null, "start_char_pos": 1461, "end_char_pos": 1473}, {"type": "D", "before": "Earl Dodge", "after": null, "start_char_pos": 1851, "end_char_pos": 1861}, {"type": "D", "before": "Gene Amondson", "after": null, "start_char_pos": 1936, "end_char_pos": 1949}, {"type": "D", "before": "Billy Sunday", "after": null, "start_char_pos": 2313, "end_char_pos": 2325}, {"type": "D", "before": "BA", "after": null, "start_char_pos": 2533, "end_char_pos": 2535}, {"type": "D", "before": "Iowa", "after": null, "start_char_pos": 2561, "end_char_pos": 2565}, {"type": "D", "before": "United States Marine Band", "after": null, "start_char_pos": 2648, "end_char_pos": 2673}, {"type": "D", "before": "Washington, DC metropolitan area", "after": null, "start_char_pos": 2738, "end_char_pos": 2770}, {"type": "D", "before": "MA", "after": null, "start_char_pos": 2830, "end_char_pos": 2832}, {"type": "D", "before": "Maryland", "after": null, "start_char_pos": 2848, "end_char_pos": 2856}, {"type": "D", "before": "Salvation Army", "after": null, "start_char_pos": 3069, "end_char_pos": 3083}, {"type": "R", "before": "Cullman, Alabama,", "after": ",", "start_char_pos": 3166, "end_char_pos": 3183}, {"type": "D", "before": "Libertarian Stephen P. Gordon", "after": null, "start_char_pos": 3293, "end_char_pos": 3322}, {"type": "D", "before": "Libertarian Party", "after": null, "start_char_pos": 3445, "end_char_pos": 3462}, {"type": "D", "before": "re-enact the Civil War", "after": null, "start_char_pos": 3950, "end_char_pos": 3972}, {"type": "D", "before": "running mate", "after": null, "start_char_pos": 4387, "end_char_pos": 4399}, {"type": "D", "before": "Reagan", "after": null, "start_char_pos": 4506, "end_char_pos": 4512}, {"type": "R", "before": "The Economist, The Nation, and Science", "after": ", , and", "start_char_pos": 4543, "end_char_pos": 4581}, {"type": "D", "before": "climatic warming", "after": null, "start_char_pos": 4792, "end_char_pos": 4808}, {"type": "D", "before": "FDR", "after": null, "start_char_pos": 4881, "end_char_pos": 4884}, {"type": "D", "before": "Patriot Act", "after": null, "start_char_pos": 4932, "end_char_pos": 4943}, {"type": "D", "before": "Constitution", "after": null, "start_char_pos": 4986, "end_char_pos": 4998}, {"type": "D", "before": "deficit spending", "after": null, "start_char_pos": 5233, "end_char_pos": 5249}, {"type": "D", "before": "Bush\u2019s wars", "after": null, "start_char_pos": 5266, "end_char_pos": 5277}, {"type": "D", "before": "the border with Mexico", "after": null, "start_char_pos": 5319, "end_char_pos": 5341}, {"type": "D", "before": "exporting American jobs overseas", "after": null, "start_char_pos": 5365, "end_char_pos": 5397}, {"type": "D", "before": "global gag rule", "after": null, "start_char_pos": 5446, "end_char_pos": 5461}, {"type": "D", "before": "given a job", "after": null, "start_char_pos": 5627, "end_char_pos": 5638}, {"type": "R", "before": "she handed the office key to her lieutenant governor", "after": "to", "start_char_pos": 5707, "end_char_pos": 5759}, {"type": "D", "before": "health care bill", "after": null, "start_char_pos": 5839, "end_char_pos": 5855}, {"type": "D", "before": "public health service", "after": null, "start_char_pos": 5999, "end_char_pos": 6020}, {"type": "D", "before": "support for Israel", "after": null, "start_char_pos": 6079, "end_char_pos": 6097}, {"type": "D", "before": "Oslo Accords", "after": null, "start_char_pos": 6247, "end_char_pos": 6259}, {"type": "D", "before": "Kyoto, ratify CEDAW", "after": null, "start_char_pos": 6340, "end_char_pos": 6359}, {"type": "A", "before": null, "after": "ratify ,", "start_char_pos": 6362, "end_char_pos": 6362}, {"type": "D", "before": "Jimmy Carter", "after": null, "start_char_pos": 6453, "end_char_pos": 6465}], "sents_char_pos": [0, 288, 410, 476, 661, 686, 800, 844, 966, 1077, 1136, 1195, 1411, 1515, 1557, 1663, 1708, 1863, 1926, 2071, 2168, 2224, 2275, 2419, 2523, 2675, 2772, 2819, 2967, 3165, 3192, 3242, 3395, 3558, 3674, 3750, 3893, 4012, 4098, 4195, 4235, 4368, 4454, 4483, 4514, 4583, 4686, 4810, 5018, 5056, 5137, 5211, 5251, 5279, 5343, 5399, 5422, 5566, 5616, 5678, 5776, 5809, 5988, 6047, 6062, 6156, 6261, 6402, 6467, 6550]}
+{"doc_id": "245395", "revision_depth": "1", "before_revision": "The Presidential Medal of Freedom US President Barack Obama presented the Presidential Medal of Freedom to fifteen people Tuesday, including former US President George H. W. Bush and current Chancellor of Germany Angela Merkel. The award\u2014the US's top civilian medal\u2014is given to those who have made \"an especially meritorious contribution to the security or national interests of the United States, world peace, cultural or other significant public or private endeavors.\" The fifteen medal recipients were chosen in 2010, but not all of them were present to receive the award at the White House Tuesday. Merkel did not attend the ceremony, and the award for Tom Little was given to his wife because the winning optometrist had been killed in August while working in Afghanistan. The medal recipients \"reveal the best of who were are and who we inspire to be,\" said Obama. The other winners are: John H. Adams , environmental advocate; Maya Angelou , poet and author; Warren Buffett , billionaire executive and philanthropist; Jasper Johns , contemporary artist; Gerda Weissmann Klein, Holocaust survivor; Yo-Yo Ma , cellist; Sylvia Mendez civil rights activist; Stan Musial, retired St. Louis Cardinals baseball player; Bill Russell , retired basketball coach and Boston Celtics player; Jean Kennedy Smith , diplomat and disabilities advocate; and John J. Sweeney , former president of the American Federation of Labor and Congress of Industrial Organizations .", "after_revision": "The Presidential Medal of Freedom Barack Obama presented the to fifteen people Tuesday, including former US President and current Angela Merkel. The award\u2014the US's top civilian medal\u2014is given to those who have made \"an especially meritorious contribution to the security or national interests of the United States, world peace, cultural or other significant public or private endeavors.\" The fifteen medal recipients were chosen in 2010, but not all of them were present to receive the award at the Tuesday. Merkel did not attend the ceremony, and the award for was given to his wife because the winning optometrist had been killed in August while working in Afghanistan. The medal recipients \"reveal the best of who were are and who we inspire to be,\" said Obama. The other winners are: , environmental advocate; , poet and author; , billionaire executive and philanthropist; , contemporary artist; , survivor; , cellist; civil rights activist; , retired baseball player; , retired basketball coach and player; , diplomat and disabilities advocate; and , former president of the .", "edit_actions": [{"type": "D", "before": "US President", "after": null, "start_char_pos": 34, "end_char_pos": 46}, {"type": "D", "before": "Presidential Medal of Freedom", "after": null, "start_char_pos": 74, "end_char_pos": 103}, {"type": "R", "before": "George H. W. Bush and current Chancellor of Germany", "after": "and current", "start_char_pos": 161, "end_char_pos": 212}, {"type": "D", "before": "White House", "after": null, "start_char_pos": 582, "end_char_pos": 593}, {"type": "D", "before": "Tom Little", "after": null, "start_char_pos": 657, "end_char_pos": 667}, {"type": "D", "before": "John H. Adams", "after": null, "start_char_pos": 894, "end_char_pos": 907}, {"type": "D", "before": "Maya Angelou", "after": null, "start_char_pos": 934, "end_char_pos": 946}, {"type": "D", "before": "Warren Buffett", "after": null, "start_char_pos": 966, "end_char_pos": 980}, {"type": "D", "before": "Jasper Johns", "after": null, "start_char_pos": 1025, "end_char_pos": 1037}, {"type": "D", "before": "Gerda Weissmann Klein, Holocaust survivor; Yo-Yo Ma", "after": null, "start_char_pos": 1061, "end_char_pos": 1112}, {"type": "A", "before": null, "after": "survivor; ,", "start_char_pos": 1115, "end_char_pos": 1115}, {"type": "D", "before": "Sylvia Mendez", "after": null, "start_char_pos": 1125, "end_char_pos": 1138}, {"type": "R", "before": "Stan Musial, retired St. Louis Cardinals", "after": ", retired", "start_char_pos": 1162, "end_char_pos": 1202}, {"type": "D", "before": "Bill Russell", "after": null, "start_char_pos": 1220, "end_char_pos": 1232}, {"type": "R", "before": "Boston Celtics player; Jean Kennedy Smith", "after": "player;", "start_char_pos": 1264, "end_char_pos": 1305}, {"type": "D", "before": "John J. Sweeney", "after": null, "start_char_pos": 1348, "end_char_pos": 1363}, {"type": "D", "before": "American Federation of Labor and Congress of Industrial Organizations", "after": null, "start_char_pos": 1390, "end_char_pos": 1459}], "sents_char_pos": [0, 227, 470, 602, 777, 870, 933, 965, 1024, 1060, 1103, 1124, 1161, 1219, 1286, 1343]}
+{"doc_id": "2496822", "revision_depth": "1", "before_revision": "Wikinews interviewed painter on his unique artwork created using his , and how his art relates to and issues of . He is to be featured at the upcoming adult entertainment event in this November 5 to November 8. File photo of , 2012. Wikinews interviewed Pricasso about his artwork and asked for his thoughts on topics of and . We discussed what are considered appropriate forms of and of \u2014 protected in the United States following the Supreme Court case Hustler Magazine v. Falwell. The interview touched upon a 2013 conflict which arose on our sister site for images and media, , when an image of a portrait of Wikipedia co-founder Jimmy Wales painted by Pricasso was uploaded to the site. Wales called it \"harassment\" and a succession of deletion discussions ensued. We asked Pricasso about this as well as the different reaction from former-Mayor of , who called his painting of her part of a \"free society\" where artists \"exercise their freedom in unusual ways.\" Pricasso: I first tried it over 10 years ago and realised it would be possible with practice to get as good with it but in a slightly more impressionistic style than I could with a brush, and I really liked the results, of course at first I had to work out the paint formula and what to paint on which was done by trial and error \u2014 and then finding somewhere to practice, which was a problem until I was invited to become a member of a Bondage club in , my first patron. There I realised that there were so many people with totally different views on what is acceptable in society, and were always protesting over most issues. Have any of your paintings been featured in a gallery somewhere?Pricasso: I have entered the Exhibition in Australia every year and sold a few. Also at an exhibition of politicians in Australia, and last November I went to for the Art undressed exhibition and also painted 15 minute portraits there which was fun. Do you consider it a form of freedom of expression to create your artwork in the way you do with your penis? upCape Town former-Mayor Mayor of Cape Town Helen Zille commented of your portrait painting of her: \"This is a free country. A free society throws up these kinds of people, who exercise their freedom in unusual ways. And if this is how he wants to do it, I must accept his constitutional right to do so.\" \u2014 what are your thoughts on her reaction? The painting of co-founder , the uploading of which Wales called \"harassment\". 2013. You painted a portrait of Wikipedia co-founder Jimmy Wales in 2013; a picture and a video file of the making of this painting were uploaded to Wikipedia's sister site for images and media, Wikimedia Commons. Shortly thereafter, the files were nominated for deletion and a deletion discussion ensued \u2014 what are your thoughts on this discussion? Pricasso: As I said before YouTube is always deleting my videos when someone complains, sometimes even when there is no genitals visible. Once one was taken down because the guy I was painting had the word (fuck) on his tee shirt; I mean how many films have this word in the dialogue. Also in at the adult show, the people who make the rules make me perform inside an enclosed area, and people are wary of coming in through the door so is a bit slow there; and the guys that run the show are so polite and passionate trying to change China slowly, making it more open, that I keep on returning year after year.", "after_revision": "Wikinews interviewed Australian painter on his unique artwork created using his , and how his art relates to freedom of expression and issues of censorship . He is to be featured at the upcoming adult entertainment event in Melbourne this November 5 to November 8. File photo of , 2012. Wikinews interviewed Pricasso about his artwork and asked for his thoughts on topics of censorship and freedom of expression . We discussed what are considered appropriate forms of and of \u2014 protected in the United States following the Supreme Court case Hustler Magazine v. Falwell. The interview touched upon a 2013 conflict which arose on our sister site for images and media, , when an image of a portrait of Wikipedia co-founder Jimmy Wales painted by Pricasso was uploaded to the site. Wales called it \"harassment\" and a succession of deletion discussions ensued. We asked Pricasso about this as well as the different reaction from former-Mayor of Cape Town Helen Zille , who called his painting of her part of a \"free society\" where artists \"exercise their freedom in unusual ways.\" Pricasso: I first tried it over 10 years ago and realised it would be possible with practice to get as good with it but in a slightly more impressionistic style than I could with a brush, and I really liked the results, of course at first I had to work out the paint formula and what to paint on which was done by trial and error \u2014 and then finding somewhere to practice, which was a problem until I was invited to become a member of a Bondage club in Brisbane , my first patron. There I realised that there were so many people with totally different views on what is acceptable in society, and were always protesting over most censorship issues. Have any of your paintings been featured in a gallery somewhere?Pricasso: I have entered the Exhibition in Australia every year and sold a few. Also at an exhibition of politicians in Australia, and last November I went to Miami for the Art undressed exhibition and also painted 15 minute portraits there which was fun. Do you consider it a form of freedom of expression to create your artwork in the way you do with your penis? upCape Town former-Mayor Helen Zille Mayor of Cape Town Helen Zille commented of your portrait painting of her: \"This is a free country. A free society throws up these kinds of people, who exercise their freedom in unusual ways. And if this is how he wants to do it, I must accept his constitutional right to do so.\" \u2014 what are your thoughts on her reaction? The painting of Wikipedia co-founder Jimmy Wales , the uploading of which Wales called \"harassment\". 2013. You painted a portrait of Wikipedia co-founder Jimmy Wales in 2013; a picture and a video file of the making of this painting were uploaded to Wikipedia's sister site for images and media, Wikimedia Commons. Shortly thereafter, the files were nominated for deletion and a deletion discussion ensued \u2014 what are your thoughts on this discussion? Pricasso: As I said before YouTube is always deleting my videos when someone complains, sometimes even when there is no genitals visible. Once one was taken down because the guy I was painting had the word (fuck) on his tee shirt; I mean how many films have this word in the dialogue. Also in Macau at the adult show, the people who make the rules make me perform inside an enclosed area, and people are wary of coming in through the door so is a bit slow there; and the guys that run the show are so polite and passionate trying to change China slowly, making it more open, that I keep on returning year after year.", "edit_actions": [{"type": "A", "before": null, "after": "Australian", "start_char_pos": 21, "end_char_pos": 21}, {"type": "A", "before": null, "after": "freedom of expression", "start_char_pos": 99, "end_char_pos": 99}, {"type": "A", "before": null, "after": "censorship", "start_char_pos": 114, "end_char_pos": 114}, {"type": "A", "before": null, "after": "Melbourne", "start_char_pos": 183, "end_char_pos": 183}, {"type": "R", "before": "and", "after": "censorship and freedom of expression", "start_char_pos": 325, "end_char_pos": 328}, {"type": "A", "before": null, "after": "Cape Town Helen Zille", "start_char_pos": 857, "end_char_pos": 857}, {"type": "A", "before": null, "after": "Brisbane", "start_char_pos": 1424, "end_char_pos": 1424}, {"type": "A", "before": null, "after": "censorship", "start_char_pos": 1592, "end_char_pos": 1592}, {"type": "A", "before": null, "after": "Miami", "start_char_pos": 1824, "end_char_pos": 1824}, {"type": "A", "before": null, "after": "Helen Zille", "start_char_pos": 2050, "end_char_pos": 2050}, {"type": "A", "before": null, "after": "Wikipedia", "start_char_pos": 2389, "end_char_pos": 2389}, {"type": "A", "before": null, "after": "Jimmy Wales", "start_char_pos": 2401, "end_char_pos": 2401}, {"type": "A", "before": null, "after": "Macau", "start_char_pos": 3097, "end_char_pos": 3097}], "sents_char_pos": [0, 116, 236, 330, 486, 694, 772, 971, 1443, 1600, 1665, 1744, 1915, 2024, 2150, 2242, 2372, 2453, 2527, 2667, 2803, 2941, 3034, 3088, 3261]}
+{"doc_id": "2557746", "revision_depth": "1", "before_revision": "180px| Romainia Prime Minister Victor Ponta |right In the aftermath of a deadly nightclub fire in last week, yesterday Prime Minister of Romania announced his resignation, stating \"I'm handing in my mandate, I'm resigning, and implicitly my government too \". The announcement came after around 20 ,000 protesters marched through on Tuesday night, blaming the government for lax regulation and corruption . During his televised resignation speech, Ponta said he hoped \"the government's resignation will satisfy the people who came out in the streets \". However, yesterday night as many as 30 ,000 protesters demonstrated, demanding further political reform . The recent protests express deep-seated concern about political corruption in Romania. Ponta is currently on trial for a series of corruption charges, which he denies. Ponta's resignation came alongside the resignation of , who was serving as Interior Minister . Victor Ponta says he will remain Prime Minister until a temporary replacement is chosen by the President of Romania. Forming a new government might take some time, and could result in elections if the President is unable to find a Prime Minister who can form a government.", "after_revision": "180px| Romanian Prime Minister Victor Ponta , what an evil darksided lord! |right In the aftermath of a deadly nightclub fire in last week, yesterday 2nd of the 3rd Guard of Satan's 547th Legion of the Vice Duke of Earth Deputy Prime Minister of Romania announced his resignation, stating \"I'm handing in my mandate, I'm resigning, and implicitly my government too , because screw them, and goddamn you people. My Love of Satan is unfaltering! \". The announcement came after around 20 protesters of the Romanian Soccer Mom League for Inexplicable Moralist Tyranny (RSMLIMT) marched through on Tuesday night, blaming the Satanic government for lax regulation , corruption, and demon attacks . During his hellevised resignation speech, Ponta said he hoped \"the government's resignation will annihilate the people who came out in the streets , especially the Romanian Soccer Mom League for Inexplicable Moralist Tyranny \". However, yesterday night as many as 30 more protesters demonstrated, demanding further political reform , and other such absurd nonsense such as freedom of press, freedom of speech, and freedom from religion . The recent protests express deep-seated concern about Satanic political corruption in Romania. Ponta is currently on 18.76 civil trials, and 24 trials in Hell for a series of corruption charges, \"Wizardcraft Terrorism\", using flying attacks to catch people as prey, and take them back to his castle in Transylvania, and General Wizardcraft, which he denies. Even though it was calculated by the Romanian Institute for Derelict Physicists that Ponta would sink even in the Great Salt Lake in Mormon Country. Ponta's resignation came alongside the resignation of , who was serving as Interior Minister of Hell and Romania . Victor Ponta says he will remain Prime Minister until a \" temporary replacement is chosen by the President of Romania. \" Yeah, okay, (That's a lie!). Forming a new government might take some time, and could result in earthquakes from wizards if the god-fearing President is unable to find a Prime Minister who can form a government.", "edit_actions": [{"type": "R", "before": "Romainia", "after": "Romanian", "start_char_pos": 7, "end_char_pos": 15}, {"type": "A", "before": null, "after": ", what an evil darksided lord!", "start_char_pos": 44, "end_char_pos": 44}, {"type": "A", "before": null, "after": "2nd of the 3rd Guard of Satan's 547th Legion of the Vice Duke of Earth Deputy", "start_char_pos": 120, "end_char_pos": 120}, {"type": "A", "before": null, "after": ", because screw them, and goddamn you people. My Love of Satan is unfaltering!", "start_char_pos": 258, "end_char_pos": 258}, {"type": "R", "before": ",000 protesters", "after": "protesters of the Romanian Soccer Mom League for Inexplicable Moralist Tyranny (RSMLIMT)", "start_char_pos": 300, "end_char_pos": 315}, {"type": "A", "before": null, "after": "Satanic", "start_char_pos": 362, "end_char_pos": 362}, {"type": "R", "before": "and corruption", "after": ", corruption, and demon attacks", "start_char_pos": 393, "end_char_pos": 407}, {"type": "R", "before": "televised", "after": "hellevised", "start_char_pos": 421, "end_char_pos": 430}, {"type": "R", "before": "satisfy", "after": "annihilate", "start_char_pos": 506, "end_char_pos": 513}, {"type": "A", "before": null, "after": ", especially the Romanian Soccer Mom League for Inexplicable Moralist Tyranny", "start_char_pos": 553, "end_char_pos": 553}, {"type": "R", "before": ",000", "after": "more", "start_char_pos": 596, "end_char_pos": 600}, {"type": "A", "before": null, "after": ", and other such absurd nonsense such as freedom of press, freedom of speech, and freedom from religion", "start_char_pos": 661, "end_char_pos": 661}, {"type": "A", "before": null, "after": "Satanic", "start_char_pos": 718, "end_char_pos": 718}, {"type": "R", "before": "trial", "after": "18.76 civil trials, and 24 trials in Hell", "start_char_pos": 774, "end_char_pos": 779}, {"type": "A", "before": null, "after": "\"Wizardcraft Terrorism\", using flying attacks to catch people as prey, and take them back to his castle in Transylvania, and General Wizardcraft,", "start_char_pos": 816, "end_char_pos": 816}, {"type": "A", "before": null, "after": "Even though it was calculated by the Romanian Institute for Derelict Physicists that Ponta would sink even in the Great Salt Lake in Mormon Country.", "start_char_pos": 834, "end_char_pos": 834}, {"type": "A", "before": null, "after": "of Hell and Romania", "start_char_pos": 928, "end_char_pos": 928}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 987, "end_char_pos": 987}, {"type": "A", "before": null, "after": "\" Yeah, okay, (That's a lie!).", "start_char_pos": 1049, "end_char_pos": 1049}, {"type": "R", "before": "elections if the", "after": "earthquakes from wizards if the god-fearing", "start_char_pos": 1117, "end_char_pos": 1133}], "sents_char_pos": [0, 261, 556, 663, 751, 833, 1048]}
+{"doc_id": "266912", "revision_depth": "1", "before_revision": "West Virginia. In a unanimous decision, a US federal appeals court issued a ruling Friday against the federal government, in favor of , owner of the Upper Branch Mine in West Virginia, the location of last year's that killed 29 workers.The court ruled the company may appeal the restrictions placed on it by a government order hindering the company's ability to conduct its own internal investigation of the disaster. The order controlling Massey's investigations into the disaster was placed on Massey immediately after the incident by the (MSHA)when it seized control of the coal mine six hours after the blast on April 5.%DIFDELCMD < %DIFDELCMD < %%% MSHA's controls prohibited Massey from \"taking or retaining photographs, collecting and preserving mine dust samples, employing mine mapping technology, and participating in or objecting to any destructive testing of materials gathered underground.\" Massey said MSHA's restrictions prevented the company from evaluating the accident site before it was altered by investigators, and denied Massey the chance to gather evidence to use in the company's defense. Massey's appeal to the (the commission thatdecides disputes over mining regulations) to void the order by MSHA was denied by the commission. It based its decision on its interpretation of the that it had no authority to consider Massey's appeal. The set aside this decision, finding the commission's interpretation of the act was \"simply untenable\" and the government's actions had denied Massey the opportunity to gather \"potentially important exculpatory evidence\".%DIFDELCMD < %DIFDELCMD < %%% The court rejected the commission's position that the Mine Act's language was ambiguous, allowing the government flexibility in its implementation.Rather, the court said, \"No matter how you parse it, the act%DIFDELCMD < ] %%% is a model of near-perfect clarity.Indeed, it is hard to imagine a clearer expression of congressional language. \" It also rejected the commission's position that the case was moot: \"This case is not moot. Indeed, even the counsel recognized the near-frivolity of this argument, and made only a half-hearted attempt to persuade us.\" The court' s ruling comes after a state government-comissioned report issued on May 19 by investigators found Massey Energy responsible for the deaths of the 29 workers. The workers were killed in an explosion that could have been avoided, the report said, if Massey had put in place standard safety procedures. \"The story of Upper Big Branch is a cautionary tale of hubris. A company that was a towering presence in the coal fields operated its mines in a profoundly reckless manner, and 29 coal miners paid with their lives for the corporate risk taking,\" the report read. \"The company's ventilation system didnot adequately ventilate the mine. As a result, explosive gases were allowed to build up. \" The report detailed claims Massey threatened miners with termination if they stopped work in areas that lacked adequate oxygen levels and listed numerous other state and federal safety standards that Massey failed to follow. Also blamed in the report was MSHA for failing to enforce federal regulations.%DIFDELCMD < %DIFDELCMD < %%% The report was considered by the those in the mining industry as especially direct and\"hard hitting\". It firmly rejected conclusions reached by Massey officials that the incident was caused by an unexpected, massive, and uncontrollable bubble eruption, an occurrence that Massey said it could neither predict nor manage. The company immediately challenged the report and issued its own report on June 3 , blaming the blast on an act of nature and denying the company's safety culture was at fault. MSHA also have an as-yet unreleased report in the works. Related news", "after_revision": " %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < ] %%% There is a problem. There are people like Ben Bernanke, David Rockefeller, Evelyn Rothschild, Bill Gates, George H.W. Bush, George W. Bush, George Soros, and 5,993 are ruining the economy and the planet. They been doing fucking using HAARP (weather modification system and Earthquake machine), poisoning are food and water, lying, buy politicians, fear-mongering, being greedy bastards, teaching hate, stealing our rights away, usurping (that' s %DIFDELCMD < %DIFDELCMD < %%% why Muslims are after these assholes for), election voting fraud, counterfeiting, debt slavery, and starting wars. These bastards own the media (Hollywood, FOX, NBC, CBS, ABC, Associated Press, and CNN) , oil companies, J.P. Morgan, Federal Reserve, United Nations, C.I.A, Monsanto (Bio-weapon seeds to plant in food), and other assets. Next thing these bastard's try to take over the internet. Don't let these bastard's control the internet. What are these assholes have in common. They are members of the Bilderberg group. The worst things they did. They subverted the United States Constitution and took our liberties away. If George Washington, Thomas Jefferson, Benjamin Franklin were today. They will pissed off about these jerks what they did. Some of them are dual Israeli and US citizens. They pretending be Jews and fucked up Israel so badly it will perish and it will be part of Iran in future. These bastards caused World War 3. These fucking bastards will be shot, hang, bombed, and/or vaporized to death by 2015. About history the Rothschilds They cause hatred by starting wars, making people as debt slaves, 3 attempted killings and 4 assassinations of US presidents, and puppet mastering behind leaders. Not vote for Obama. He is a puppet. The puppet master is Evelyn Rothschild", "edit_actions": [{"type": "D", "before": "West Virginia. In a unanimous decision, a US federal appeals court issued a ruling Friday against the federal government, in favor of , owner of the Upper Branch Mine in West Virginia, the location of last year's that killed 29 workers.The court ruled the company may appeal the restrictions placed on it by a government order hindering the company's ability to conduct its own internal investigation of the disaster.", "after": null, "start_char_pos": 0, "end_char_pos": 417}, {"type": "D", "before": "The order controlling Massey's investigations into the disaster was placed on Massey immediately after the incident by the (MSHA)when it seized control of the coal mine six hours after the blast on April 5.", "after": null, "start_char_pos": 418, "end_char_pos": 624}, {"type": "D", "before": "MSHA's controls prohibited Massey from \"taking or retaining photographs, collecting and preserving mine dust samples, employing mine mapping technology, and participating in or objecting to any destructive testing of materials gathered underground.\" Massey said MSHA's restrictions prevented the company from evaluating the accident site before it was altered by investigators, and denied Massey the chance to gather evidence to use in the company's defense.", "after": null, "start_char_pos": 654, "end_char_pos": 1112}, {"type": "D", "before": "Massey's appeal to the (the commission thatdecides disputes over mining regulations) to void the order by MSHA was denied by the commission. It based its decision on its interpretation of the that it had no authority to consider Massey's appeal. The set aside this decision, finding the commission's interpretation of the act was \"simply untenable\" and the government's actions had denied Massey the opportunity to gather \"potentially important exculpatory evidence\".", "after": null, "start_char_pos": 1113, "end_char_pos": 1580}, {"type": "D", "before": "The court rejected the commission's position that the Mine Act's language was ambiguous, allowing the government flexibility in its implementation.Rather, the court said, \"No matter how you parse it,", "after": null, "start_char_pos": 1610, "end_char_pos": 1809}, {"type": "D", "before": "the act", "after": null, "start_char_pos": 1810, "end_char_pos": 1817}, {"type": "D", "before": "is a model of near-perfect clarity.Indeed, it is hard to imagine a clearer expression of congressional language. \" It also rejected the commission's position that the case was moot: \"This case is not moot. Indeed, even the counsel recognized the near-frivolity of this argument, and made only a half-hearted attempt to persuade us.\"", "after": null, "start_char_pos": 1836, "end_char_pos": 2168}, {"type": "R", "before": "The court'", "after": "There is a problem. There are people like Ben Bernanke, David Rockefeller, Evelyn Rothschild, Bill Gates, George H.W. Bush, George W. Bush, George Soros, and 5,993 are ruining the economy and the planet. They been doing fucking using HAARP (weather modification system and Earthquake machine), poisoning are food and water, lying, buy politicians, fear-mongering, being greedy bastards, teaching hate, stealing our rights away, usurping (that'", "start_char_pos": 2169, "end_char_pos": 2179}, {"type": "D", "before": "ruling comes after a state government-comissioned report issued on May 19 by investigators found Massey Energy responsible for the deaths of the 29 workers. The workers were killed in an explosion that could have been avoided, the report said, if Massey had put in place standard safety procedures.", "after": null, "start_char_pos": 2182, "end_char_pos": 2480}, {"type": "D", "before": "\"The story of Upper Big Branch is a cautionary tale of hubris. A company that was a towering presence in the coal fields operated its mines in a profoundly reckless manner, and 29 coal miners paid with their lives for the corporate risk taking,\" the report read. \"The company's ventilation system didnot adequately ventilate the mine. As a result, explosive gases were allowed to build up. \" The report detailed claims Massey threatened miners with termination if they stopped work in areas that lacked adequate oxygen levels and listed numerous other state and federal safety standards that Massey failed to follow. Also blamed in the report was MSHA for failing to enforce federal regulations.", "after": null, "start_char_pos": 2481, "end_char_pos": 3176}, {"type": "D", "before": "The report was considered by the those in the mining industry as especially direct and\"hard hitting\". It firmly rejected conclusions reached by Massey officials that the incident was caused by an unexpected, massive, and uncontrollable bubble eruption, an occurrence that Massey said it could neither predict nor manage.", "after": null, "start_char_pos": 3206, "end_char_pos": 3526}, {"type": "R", "before": "The company immediately challenged the report and issued its own report on June", "after": "why Muslims are after these assholes for), election voting fraud, counterfeiting, debt slavery, and starting wars. These bastards own the media (Hollywood, FOX, NBC, CBS, ABC, Associated Press, and CNN) , oil companies, J.P. Morgan, Federal Reserve, United Nations, C.I.A, Monsanto (Bio-weapon seeds to plant in food), and other assets. Next thing these bastard's try to take over the internet. Don't let these bastard's control the internet. What are these assholes have in common. They are members of the Bilderberg group. The worst things they did. They subverted the United States Constitution and took our liberties away. If George Washington, Thomas Jefferson, Benjamin Franklin were today. They will pissed off about these jerks what they did. Some of them are dual Israeli and US citizens. They pretending be Jews and fucked up Israel so badly it will perish and it will be part of Iran in future. These bastards caused World War 3. These fucking bastards will be shot, hang, bombed, and/or vaporized to death by 2015. About history the Rothschilds They cause hatred by starting wars, making people as debt slaves,", "start_char_pos": 3527, "end_char_pos": 3606}, {"type": "D", "before": ", blaming the blast on an act of nature and denying the company's safety culture was at fault. MSHA also have an as-yet unreleased report in the works.", "after": null, "start_char_pos": 3609, "end_char_pos": 3760}, {"type": "R", "before": "Related news", "after": "attempted killings and 4 assassinations of US presidents, and puppet mastering behind leaders. Not vote for Obama. He is a puppet. The puppet master is Evelyn Rothschild", "start_char_pos": 3761, "end_char_pos": 3773}], "sents_char_pos": [0, 14, 236, 417, 903, 1112, 1253, 1358, 1580, 1757, 1871, 1948, 2041, 2168, 2338, 2480, 2543, 2743, 2815, 2870, 3097, 3176, 3307, 3526, 3703, 3760]}
+{"doc_id": "2793166", "revision_depth": "1", "before_revision": "On Thursday, the voted to leave the amidst a long, vast campaign by supporters of both sides. The unanimous decision was a slim and controversial one with 51.9\\% (17,410,742) of people voting to leave while 48.1\\% (16,141,241) of people voted to stay in the European Union. Strongest opposition to the withdrawal came mostly from , , and , with the strongest agreement to the withdrawal coming mostly from and . The United Kingdom contributes greatly to the European Union budget, with a \u00a313 billion contribution last year \u2013 however the European Union only contributed \u00a34.5 billion back. This is equivalent to \u00a335 million a day paid to the European Union by the United Kingdom. The United Kingdom also has the third (narrowly second) largest population of any member state in the EU (there are 28 in total, including the UK). The United Kingdom\u2019s withdrawal is permitted in Article 50 of the Lisbon Treaty \u2013 or the treaty of the European Union \u2013 which also means that the United Kingdom will notify withdrawal to the . In the United Kingdom, treaties with the European Unionwill cease to apply either upon the date of force of the withdrawal agreement or two years after the notification to withdrawal (if the date of force is not conceived nor met). Any extensions can be made by the European Council. Pre-campaign Talk about the referendum began in 2014 when then stated that he would continue his promise to hold a European Union withdrawal referendum if elected again last year as Prime Minister. Leader of the (UKIP) agreed to support David Cameron\u2019s proposal to hold a referendum \u2013 a main goal of his and his party. Once the passed and was assented, a deadline was put in place: the referendum was to be held no later than December 31 , 2017 (and not on May 4, 2016 or May 5, 2017). David Cameron then would announce last February that the referendum was to take place on June 23, 2016. Campaigning began on April 15 , 2016 \u2013 just over 2 months before the referendum occurred. Campaign: Leave%DIFDELCMD < %DIFDELCMD < %%% Some of the main points for the campaign were the following: \u00a3350 million a week is paid to the EU without British governance on its spending by the United Kingdom \u2013 money that should be invested back into the NHS (National Healthcare System), schools, and housing \u2013 and less than half is returned. British borders are too heavily controlled by the EU and control should be renounced to Britain Immigration can be controlled through a fairer, better British system amidst poorer countries like Turkey filing for European membership, providing many immigrants ability to travel to the United Kingdom The euro is unstable and the British people will have to constantly bail it out The European Union prohibits non-European trade by Britain with other, non-European allies, halting further trade expansion and opportunity Significant parties that had formally announced their support to Britain leaving the EU were the (DUP), the (PBPA), the (TUV), and the UKIndependence Party (UKIP). 52-year-old Thomas Mair \u2013 a mentally unstable man \u2013 shot and stabbed Labour MP at a constituency surgery in her constituency of : the motive behind the stabbing was later revealed to be Mair\u2019s strong dislike towards Cox\u2019s support of the United Kingdom remaining in the European Union. During the incident, reports said that he was yelling \u201cBritain First\u201d. The Britain First party \u2013 a party supporting the UK remaining in the EU \u2013 condemned the incident and denied any involvement in Cox\u2019s death. No evidence points to any Britain First involvement.%DIFDELCMD < %DIFDELCMD < %%% Campaign: Remain Some of the main points for the campaign were the following: 3 million British jobs are linked to trade with the European Union (Source: CEBR) Being in the EU means lower store prices (Source: European Commission) Over 200 thousand British businesses trade with the EU, opening opportunity for jobs in Britain (Source: HMRC) The United Kingdom receives \u00a366 million in investments from other EU member states (Source: Office for National Statistics) Membership in the EU allows security via the European Arrest Warrant \u2013 allowing criminals from other member states to be legally arrested and deported to their country of origin \u00a31 put in the EUallows \u00a310 back through EU trade and investment (Source: CBI)%DIFDELCMD < %DIFDELCMD < %%% Significant parties that had formally announced their support to Britain remaining in the EU were the Green Party, Labour Party, and the Liberal Democrats. Former Prime Ministers such as Tony Blair and Gordon Brown have also voiced their support in remaining in the EU. Second referendum petition A petition has arisen after the results of the referendum calling for a second referendum due to the slim majority win. The petition has already reached 3 million signatures. It was set for debate by Parliament after it surpassed 100 , 000 signatures \u2013 an official debate date or any results of a debate have yet to be released to the public . Cameron\u2019s resignation Upon the results of the referendum were officialised, British Prime Minister David Cameron announced his resignation and \u2013 though pledged to take charge until October \u2013 will not oversee the withdrawal process, instead renouncing it to his successor. The Conservative Party of the United Kingdom will choose a new leader during its annual conference this October. Post-referendum theories A theory was posted on the Guardian website claiming that David Cameron annulled the results of the referendum as the referendum is not legally binding but is instead advisory to Parliament \u2013 confirmation or refutation of this theory has not been heard by Parliament nor by David Cameron.%DIFDELCMD < %DIFDELCMD < %%% Regional votes: Remain vs. Leave Regional votes: Remain vs. Leave Region Result West Midlands Leave East MidlandsLeave North East Leave Yorkshire and the HumberLeave EastLeave North WestLeave South West Leave WalesLeave South EastLeave LondonRemain Northern Ireland Remain ScotlandRemain", "after_revision": "On Thursday, the (UK) voted to leave the (EU) in a referendum. During the referendum, voters were asked the following question with these options: \"Should the United Kingdom remain a member of the European Union or leave the European Union ? Remain a member of the European Union Leave the European Union\". Voters across the UK voted in favour of leaving the EU by a margin 52\\% to 48\\%. Support for this outcome was strongest across the majority of and , with , , %DIFDELCMD < %DIFDELCMD < %%% and the only regions where the majority voted to remain a member of the EU. The Flag of Europe, used by the EU %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% . Following the results, announced his intention to resign as the UK's . It is expected he will remain in his post before the choose a new leader ahead of their annual conference in October. He also said he would not invoke Article 50 of the , the process by which a member can leave the EU, leaving that to his successor as Prime Minister. A number of officials at the EU \u2014 which would be down to 27 members with the UK gone \u2014 in a statement said they would like this process to begin \"as soon as possible\" . At the start of trading on Friday the markets reacted negatively to the %DIFDELCMD < %DIFDELCMD < %%% result, with the falling in value by \u00a3120 billion. , Governor of the , stated an extra \u00a3250 billion will be made available to help stabilise markets.", "edit_actions": [{"type": "A", "before": null, "after": "(UK)", "start_char_pos": 17, "end_char_pos": 17}, {"type": "R", "before": "amidst a long, vast campaign by supporters of both sides. The unanimous decision was a slim and controversial one with 51.9\\% (17,410,742) of people voting to leave while 48.1\\% (16,141,241) of people voted to stay in the European Union. Strongest opposition to the withdrawal came mostly from , , and , with", "after": "(EU) in a referendum.", "start_char_pos": 37, "end_char_pos": 345}, {"type": "A", "before": null, "after": "During the referendum, voters were asked the following question with these options:", "start_char_pos": 346, "end_char_pos": 346}, {"type": "A", "before": null, "after": "\"Should the United Kingdom remain a member of", "start_char_pos": 347, "end_char_pos": 347}, {"type": "R", "before": "strongest agreement to the withdrawal coming mostly from and . The United Kingdom contributes greatly to the European Union budget, with a \u00a313 billion contribution last year \u2013 however", "after": "European Union or leave", "start_char_pos": 352, "end_char_pos": 535}, {"type": "R", "before": "only contributed \u00a34.5 billion back. This is equivalent to \u00a335 million a day paid to", "after": "? Remain a member of", "start_char_pos": 555, "end_char_pos": 638}, {"type": "R", "before": "by the United Kingdom. The United Kingdom also has the third (narrowly second) largest population of any member state in the EU (there are 28 in total, including the UK). The United Kingdom\u2019s withdrawal is permitted in Article 50 of the Lisbon Treaty \u2013 or the treaty of the European Union \u2013 which also means that the United Kingdom will notify withdrawal to the . In the United Kingdom, treaties with the European Unionwill cease to apply either upon the date of force of the withdrawal agreement or two years after the notification to withdrawal (if the date of force is not conceived nor met). Any extensions can be made by the European Council.", "after": "Leave the European Union\".", "start_char_pos": 658, "end_char_pos": 1305}, {"type": "D", "before": "Pre-campaign", "after": null, "start_char_pos": 1306, "end_char_pos": 1318}, {"type": "R", "before": "Talk about the referendum began in 2014 when then stated that he would continue his promise to hold a European Union withdrawal referendum if elected again last year as Prime Minister. Leader of the (UKIP) agreed to support David Cameron\u2019s proposal to hold a referendum \u2013 a main goal of his and his party. Once the passed and was assented, a deadline was put in place: the referendum was to be held no later than December 31", "after": "Voters across the UK voted in favour of leaving the EU by a margin 52\\% to 48\\%. Support for this outcome was strongest across the majority of and", "start_char_pos": 1319, "end_char_pos": 1743}, {"type": "R", "before": "2017 (and not on May 4, 2016 or May 5, 2017). David Cameron then would announce last February that the referendum was to take place on June 23, 2016. Campaigning began on April 15", "after": "with ,", "start_char_pos": 1746, "end_char_pos": 1925}, {"type": "D", "before": "2016 \u2013 just over 2 months before the referendum occurred.", "after": null, "start_char_pos": 1928, "end_char_pos": 1985}, {"type": "D", "before": "Campaign: Leave", "after": null, "start_char_pos": 1986, "end_char_pos": 2001}, {"type": "R", "before": "Some of the main points for the campaign were the following: \u00a3350 million a week is paid to the EU without British governance on its spending by the United Kingdom \u2013 money that should be invested back into the NHS (National Healthcare System), schools, and housing \u2013 and less than half is returned. British borders are too heavily controlled", "after": "and the only regions where the majority voted to remain a member of the EU. The Flag of Europe, used", "start_char_pos": 2031, "end_char_pos": 2372}, {"type": "D", "before": "and control should be renounced to Britain Immigration can be controlled through a fairer, better British system amidst poorer countries like Turkey filing for European membership, providing many immigrants ability to travel to the United Kingdom The euro is unstable and the British people will have to constantly bail it out The European Union prohibits non-European trade by Britain with other, non-European allies, halting further trade expansion and opportunity", "after": null, "start_char_pos": 2383, "end_char_pos": 2849}, {"type": "D", "before": "Significant parties that had formally announced their support to Britain leaving the EU were the (DUP), the (PBPA), the (TUV), and the UKIndependence Party (UKIP). 52-year-old Thomas Mair \u2013 a mentally unstable man \u2013 shot and stabbed Labour MP at a constituency surgery in her constituency of : the motive behind the stabbing was later revealed to be Mair\u2019s strong dislike towards Cox\u2019s support of the United Kingdom remaining in the European Union. During the incident, reports said that he was yelling \u201cBritain First\u201d. The Britain First party \u2013 a party supporting the UK remaining in the EU \u2013 condemned the incident and denied any involvement in Cox\u2019s death. No evidence points to any Britain First involvement.", "after": null, "start_char_pos": 2850, "end_char_pos": 3562}, {"type": "D", "before": "Campaign: Remain", "after": null, "start_char_pos": 3592, "end_char_pos": 3608}, {"type": "D", "before": "Some of the main points for the campaign were the following: 3 million British jobs are linked to trade with the European Union (Source: CEBR) Being in the EU means lower store prices (Source: European Commission) Over 200 thousand British businesses trade with the EU, opening opportunity for jobs in Britain (Source: HMRC) The United Kingdom receives \u00a366 million in investments from other EU member states (Source: Office for National Statistics) Membership in the EU allows security via the European Arrest Warrant \u2013 allowing criminals from other member states to be legally arrested and deported to their country of origin \u00a31 put in the EUallows \u00a310 back through EU trade and investment (Source: CBI)", "after": null, "start_char_pos": 3609, "end_char_pos": 4313}, {"type": "D", "before": "Significant parties that had formally announced their support to Britain remaining in the EU were the Green Party, Labour Party, and the Liberal Democrats. Former Prime Ministers such as Tony Blair and Gordon Brown have also voiced their support in remaining in the EU.", "after": null, "start_char_pos": 4343, "end_char_pos": 4612}, {"type": "R", "before": "Second referendum petition A petition has arisen after the results of the referendum calling for a second referendum due to the slim majority win. The petition has already reached 3 million signatures. It was set for debate by Parliament after it surpassed 100", "after": ". Following the results, announced his intention to resign as the UK's . It is expected he will remain in his post before the choose a new leader ahead of their annual conference in October. He also said he would not invoke Article 50 of the", "start_char_pos": 4613, "end_char_pos": 4873}, {"type": "R", "before": "000 signatures \u2013 an official debate date or any results of a debate have yet to be released to the public", "after": "the process by which a member can leave the EU, leaving that to his successor as Prime Minister. A number of officials at the EU \u2014 which would be down to 27 members with the UK gone \u2014 in a statement said they would like this process to begin \"as soon as possible\"", "start_char_pos": 4876, "end_char_pos": 4981}, {"type": "R", "before": "Cameron\u2019s resignation Upon the results of", "after": "At the start of trading on Friday the markets reacted negatively to", "start_char_pos": 4984, "end_char_pos": 5025}, {"type": "D", "before": "referendum were officialised, British Prime Minister David Cameron announced his resignation and \u2013 though pledged to take charge until October \u2013 will not oversee the withdrawal process, instead renouncing it to his successor. The Conservative Party of the United Kingdom will choose a new leader during its annual conference this October.", "after": null, "start_char_pos": 5030, "end_char_pos": 5368}, {"type": "D", "before": "Post-referendum theories A theory was posted on the Guardian website claiming that David Cameron annulled the results of the referendum as the referendum is not legally binding but is instead advisory to Parliament \u2013 confirmation or refutation of this theory has not been heard by Parliament nor by David Cameron.", "after": null, "start_char_pos": 5369, "end_char_pos": 5682}, {"type": "D", "before": "Regional votes: Remain vs. Leave", "after": null, "start_char_pos": 5712, "end_char_pos": 5744}, {"type": "R", "before": "Regional votes: Remain vs. Leave Region Result West Midlands Leave East MidlandsLeave North East Leave Yorkshire and the HumberLeave EastLeave North WestLeave South West Leave WalesLeave South EastLeave LondonRemain Northern Ireland Remain ScotlandRemain", "after": "result, with the falling in value by \u00a3120 billion. , Governor of the , stated an extra \u00a3250 billion will be made available to help stabilise markets.", "start_char_pos": 5745, "end_char_pos": 5999}], "sents_char_pos": [0, 94, 274, 414, 590, 680, 828, 1021, 1253, 1305, 1503, 1624, 1791, 1895, 1985, 2329, 2473, 2563, 3013, 3298, 3369, 3509, 3562, 3601, 3669, 4128, 4498, 4612, 4759, 4814, 5255, 5368, 5682, 5738, 5771]}
+{"doc_id": "28202", "revision_depth": "1", "before_revision": "National Security Agency logo In 2002, as a part of ongoing anti-terrorist operations, President Bush secretly authorized the National Security Agency (NSA) to spy on Americans and others in the United States making contact with persons in other nations. According to a The New York Times report, the NSA monitored the international telephone calls and international e-mail messages of \"hundreds, and perhaps thousands of people\" inside the United States over the past three years without warrants. According to The New York Times, John Yoo, the former deputy in the Office of Legal Counsel , justified the domestic spying in a classified Justice Department legal opinion, arguing that these activities were covered by congressional approval of the war on terrorism . That legal argument was similar to another 2002 memo authored primarily by Yoo, which outlined an extremely narrow definition of torture. That opinion, which was signed by another Justice official, was formally disavowed after it was disclosed by The Washington Post . President Bush insisted that he has not compromised civil liberties . \"Revealing classified information is illegal,\" he said during an unusual live, on-camera version of his weekly radio address, about this secret program that was revealed in media reports yesterday. Senior members of congress from both parties called for an explanation. Senate Judiciary Committee chairman Arlen Specter , stated that \"there is no doubt that this is inappropriate\". Senator Trent Lott defended the NSA directive saying \"I don't agree with the libertarians. I want my security first. I'll deal with all the details after that.\" Several national security officials say the jurisdiction granted the NSA goes far beyond the USA PATRIOT Act . Under the act, it's necessary to seek a F.I.S.A. (Foreign Intelligence Surveillance Act) warrant every time law enforcement eavesdrops within the U.S. Some officials say they consider warrantless eavesdropping inside the United States to be unlawful and possibly unconstitutional. The New York Times, the newspaper that broke the news, stated that it delayed publication of this story for a year after the White House said it could jeopardize investigations and alert would-be terrorists under surveillance.", "after_revision": " logo In 2002, as a part of ongoing anti-terrorist operations, secretly authorized the (NSA) to spy on Americans and others in the United States making contact with persons in other nations. According to a The New York Times report, the NSA monitored the international telephone calls and international e-mail messages of \"hundreds, and perhaps thousands of people\" inside the United States over the past three years without warrants. According to The New York Times, John Yoo, the former deputy in the , justified the domestic spying in a classified legal opinion, arguing that these activities were covered by congressional approval of the . That legal argument was similar to another 2002 memo authored primarily by Yoo, which outlined an extremely narrow definition of torture. That opinion, which was signed by another Justice official, was formally disavowed after it was disclosed by . President Bush insisted that he has not compromised . \"Revealing classified information is illegal,\" he said during an unusual live, on-camera version of his weekly radio address, about this secret program that was revealed in media reports yesterday. Senior members of congress from both parties called for an explanation. chairman , stated that \"there is no doubt that this is inappropriate\". Senator defended the NSA directive saying \"I don't agree with the libertarians. I want my security first. I'll deal with all the details after that.\" Several national security officials say the jurisdiction granted the NSA goes far beyond the . Under the act, it's necessary to seek a (Foreign Intelligence Surveillance Act) warrant every time law enforcement eavesdrops within the U.S. Some officials say they consider warrantless eavesdropping inside the United States to be unlawful and possibly unconstitutional. The New York Times, the newspaper that broke the news, stated that it delayed publication of this story for a year after the said it could jeopardize investigations and alert would-be terrorists under surveillance.", "edit_actions": [{"type": "D", "before": "National Security Agency", "after": null, "start_char_pos": 0, "end_char_pos": 24}, {"type": "D", "before": "President Bush", "after": null, "start_char_pos": 87, "end_char_pos": 101}, {"type": "D", "before": "National Security Agency", "after": null, "start_char_pos": 126, "end_char_pos": 150}, {"type": "D", "before": "Office of Legal Counsel", "after": null, "start_char_pos": 567, "end_char_pos": 590}, {"type": "D", "before": "Justice Department", "after": null, "start_char_pos": 639, "end_char_pos": 657}, {"type": "D", "before": "war on terrorism", "after": null, "start_char_pos": 749, "end_char_pos": 765}, {"type": "D", "before": "The Washington Post", "after": null, "start_char_pos": 1015, "end_char_pos": 1034}, {"type": "D", "before": "civil liberties", "after": null, "start_char_pos": 1089, "end_char_pos": 1104}, {"type": "R", "before": "Senate Judiciary Committee chairman Arlen Specter", "after": "chairman", "start_char_pos": 1377, "end_char_pos": 1426}, {"type": "D", "before": "Trent Lott", "after": null, "start_char_pos": 1497, "end_char_pos": 1507}, {"type": "D", "before": "USA PATRIOT Act", "after": null, "start_char_pos": 1743, "end_char_pos": 1758}, {"type": "D", "before": "F.I.S.A.", "after": null, "start_char_pos": 1801, "end_char_pos": 1809}, {"type": "D", "before": "White House", "after": null, "start_char_pos": 2167, "end_char_pos": 2178}], "sents_char_pos": [0, 254, 498, 767, 905, 1304, 1376, 1488, 1579, 1605, 1649, 2041]}
+{"doc_id": "28785", "revision_depth": "1", "before_revision": "300px|Members of a Canadian naval boarding party during a sovereignty exercise in the Canadian Arctic. The Conservative Party of Canada leader Stephen Harper today made bold claims about the Canadian Arctic region at a campaign stop in Winnipeg , \"The single most important duty of the federal government is to protect and defend our national sovereignty .\" . The prime minister-hopeful stated, \"There are new and disturbing reports of American nuclear submarines passing though Canadian waters without obtaining the permission of -- or even notifying -- the Canadian government.\" Harper promised a significant increase in military presence in the Canadian region, which has had notable soveriegnty disputes with the United States, Russia, Denmark and Norway . \"You don't defend national sovereignty with flags,\" Harper said. \"You need forces on the ground, ships in the sea, and proper surveillance.\" Among other promises, Harper stated he would station three armed naval heavy ice breakers in the area of Iqaluit with 500 regular force personnel, recruit 500 more Canadian rangers, and build a new army training center in the area of Cambridge Bay on the Northwest Passage . 200px|Stephen Harper, leader of the Conservative Party of Canada \"As prime minister, I will make it clear to foreign governments -- including the United States -- that naval vessels traveling in Canadian territorial waters will require the consent of the government of Canada,\" Harper stated. The Liberal Party of Canada , the Conservatives' most powerful rival in the election, quickly posted a rebuttal on their website. They claim Stephen Harpers stated defense budget of $5.3(CAD) billion over 5 years is not enough to afford the two polar icebreakers, which the Liberal party claims will cost $ 3(CAD) billion with the party estimating an upkeep of $150(CAD) million per year. \"Where does Mr. Harper plan to find another $1 billion?\" the party asked in their rebuttal. The Arctic may be an important issue in the future for Canadians, as scientists expect the fabled Northwest Passage of the Arctic to open up for year round shipping by 2050 as a result of global warming . According to the online encyclopedia Wikipedia , trade routes from Europe to the Far East could save 4000 km through the passage, as compared to the current routes through the Panama Canal Canada last flexed its muscle in the Arctic in 2004 in its most massive Arctic exercise ever, with six hundred personnel from the three services ( army, air force, navy ) involved in a large exercise in the Baffin Islands . Canadians are scheduled to go to the polls on January 23, 2006 in an early election as a result of a non-confidence motion in parliament against the former ruling Liberal party.", "after_revision": "300px|Members of a Canadian naval boarding party during a sovereignty exercise in the Canadian Arctic. The leader today made bold claims about the Canadian region at a campaign stop in , \"The single most important duty of the federal government is to protect and defend our national .\" . The -hopeful stated, \"There are new and disturbing reports of American passing though Canadian waters without obtaining the permission of \u2014 or even notifying \u2014 the Canadian government.\" Harper promised a significant increase in military presence in the Canadian region, which has had notable soveriegnty disputes with the , , and . \"You don't defend national sovereignty with flags,\" Harper said. \"You need forces on the ground, ships in the sea, and proper surveillance.\" Among other promises, Harper stated he would station three armed naval heavy ice breakers in the area of with 500 regular force personnel, recruit 500 more Canadian rangers, and build a new army training center in the area of on the . \"As prime minister, I will make it clear to foreign governments \u2014 including the United States \u2014 that naval vessels traveling in Canadian territorial waters will require the consent of the government of Canada,\" Harper stated. The , the Conservatives' most powerful rival in the election, quickly posted a rebuttal on their website. They claim Stephen Harpers stated defense budget of $5.3() billion over 5 years is not enough to afford the two polar icebreakers, which the Liberal party claims will cost $ 3(CAD) billion with the party estimating an upkeep of $150(CAD) million per year. \"Where does Mr. Harper plan to find another $1 billion?\" the party asked in their rebuttal. The Arctic may be an important issue in the future for Canadians, as scientists expect the fabled Northwest Passage of the Arctic to open up for year round shipping by 2050 as a result of . According to the online encyclopedia , trade routes from to the could save 4000 through the passage, as compared to the current routes through the . Canada last flexed its muscle in the Arctic in 2004 in its most massive Arctic exercise ever, with six hundred personnel from the three services ( , , ) involved in a large exercise in the . Canadians are scheduled to go to the polls on January 23, 2006 in an early election as a result of a motion in parliament against the former ruling Liberal party.", "edit_actions": [{"type": "R", "before": "Conservative Party of Canada leader Stephen Harper", "after": "leader", "start_char_pos": 107, "end_char_pos": 157}, {"type": "D", "before": "Arctic", "after": null, "start_char_pos": 200, "end_char_pos": 206}, {"type": "D", "before": "Winnipeg", "after": null, "start_char_pos": 236, "end_char_pos": 244}, {"type": "D", "before": "sovereignty", "after": null, "start_char_pos": 343, "end_char_pos": 354}, {"type": "R", "before": "prime minister-hopeful", "after": "-hopeful", "start_char_pos": 364, "end_char_pos": 386}, {"type": "D", "before": "nuclear submarines", "after": null, "start_char_pos": 445, "end_char_pos": 463}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 531, "end_char_pos": 533}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 552, "end_char_pos": 554}, {"type": "R", "before": "United States, Russia, Denmark and Norway", "after": ", , and", "start_char_pos": 717, "end_char_pos": 758}, {"type": "D", "before": "Iqaluit", "after": null, "start_char_pos": 1007, "end_char_pos": 1014}, {"type": "R", "before": "Cambridge Bay on the Northwest Passage", "after": "on the", "start_char_pos": 1136, "end_char_pos": 1174}, {"type": "D", "before": "200px|Stephen Harper, leader of the Conservative Party of Canada", "after": null, "start_char_pos": 1177, "end_char_pos": 1241}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 1306, "end_char_pos": 1308}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 1337, "end_char_pos": 1339}, {"type": "D", "before": "Liberal Party of Canada", "after": null, "start_char_pos": 1474, "end_char_pos": 1497}, {"type": "R", "before": "$5.3(CAD) billion over 5 years is not enough to afford the two polar icebreakers, which the Liberal party claims will cost $", "after": "$5.3() billion over 5 years is not enough to afford the two polar icebreakers, which the Liberal party claims will cost $", "start_char_pos": 1652, "end_char_pos": 1776}, {"type": "D", "before": "global warming", "after": null, "start_char_pos": 2139, "end_char_pos": 2153}, {"type": "D", "before": "Wikipedia", "after": null, "start_char_pos": 2193, "end_char_pos": 2202}, {"type": "R", "before": "Europe to the Far East", "after": "to the", "start_char_pos": 2223, "end_char_pos": 2245}, {"type": "D", "before": "km", "after": null, "start_char_pos": 2262, "end_char_pos": 2264}, {"type": "R", "before": "Panama Canal", "after": ".", "start_char_pos": 2332, "end_char_pos": 2344}, {"type": "R", "before": "army, air force, navy", "after": ", ,", "start_char_pos": 2492, "end_char_pos": 2513}, {"type": "D", "before": "Baffin Islands", "after": null, "start_char_pos": 2552, "end_char_pos": 2566}, {"type": "D", "before": "non-confidence", "after": null, "start_char_pos": 2670, "end_char_pos": 2684}], "sents_char_pos": [0, 102, 580, 825, 901, 1307, 1469, 1599, 1858, 1950, 2155, 2204, 2285]}
+{"doc_id": "2893319", "revision_depth": "1", "before_revision": "Valeria Gazzola And one of the biggest limitation[s] in particular of the human research is that you can go so far in understanding the brain mechanism. Because we cannot, we don't have tools with the correct in terms of, for instance, understanding what a single cell does, in these processes. And that's why, for many years, we developed, we tried to develop a model in animals where all these techniques are more available that would allow us to investigate similar processes to those in humans. So processes basically that are involved in perceiving the other['s] distress also in animals. And, that's basically the main reasons why we move towards this research and then we started from coming up with the experiment in which we simply measure the distress of an animal in reaction to the distress of another. Which what we call , for instance. And we made it more and more complex in order to reach slowly a degree of complexity that can be comparable to processes in humans. Emotional contagions: you can compare it, for instance, that the level of humans when you are in a crowd, or when you are baby, that as a crowd you are contaged by the emotions are around. And, but then, we wanted to go a little bit of a step forward: okay now I am contaged, what does it mean to be contaged? Can I use this information to, for instance, avoid hurting other people. And that's how we came about, more or less, so. Christian Keysers I mean, one other motivation we have is that in the past we've also been interested in people that seemed to lack the aversion to harming others. I mean, with that , sometimes they're called as well. And so, a couple of years ago, we made this study in which we identified psychopathic criminals in high-security institutions. We brought them to the lab, and we scanned their brains while they witnessed the pain of other individuals. And what we saw was that if they don't have any particular reason to empathise with others, they really have reduced activity in their own pain regions while they witness the pain of others. So, of course, that's interesting and it may suggest that perhaps, the reason why if they can make some money, for instance, they don't mind to harm other people is because they don't activate their own pain much while they witness the pain of others. The problem like Valeria was saying, is that in humans we can see that the brain region is active while you see the pain of others, but you can't easily change the activity in the brain region to see whether that would change the way that the psychopathic criminal would act. I mean, ideally, what we'd like to do is increase the activity of these pain regions in psychopaths and see that now suddenly they would really care to not harm others anymore. Valeria Gazzola Although it's not yet, it's also not yet very clear that we need activity of these regions to avoid the harm, right? At that point, that's how we came about to run the experiment, because the first question was: is it really necessary. The activity of these regions. So, you start with okay, you want to manipulate these regions to reduce psychopathy. But the field could not even prove that this activity was necessary to reduce harm. Christian Keysers And so, that was really one of the strong motivation behind the -experiment, because rats have a very similar to what humans have. It is really a core part of the brain that is involved in feeling your own pain. So, if you don't have a cingluate cortex and you hurt yourself, you still feel that you've cut yourself, but you don't mind. And so you are not going to do a lot to avoid being cut again. So this region exists also in the rats and it is a relatively deep brain region. So therefore, we turn to the rats, and figure that in the rat, we can change the activity in the brain region and see whether that would then change how much the rat would be aversed to harming other rats or not. Christian Keysers Ah. So very briefly, what we do is we give a rat a choice between two that the rat can press. Both of these levers will provide the rat with one little pellet of sugar which they really like. So, they are happy to press these levers to get the reward. In the main experiment, what we do is that one of the two levers is a little bit more difficult to press than the other one. So most of the rats start to prefer the easy lever to press. Valeria Gazzola And that also what we see is that there is variability in the responses of the observers, of the rats that make the choice between the levers. And these variabilities also present in humans: when you do tasks that are rather similar, you see that not everyone acts socially, preferring the social lever. But you also have individuals that would go for the reward more often. So this is also another similarity between the animal world and the human world. And on top of that, I think that the other things we've learned from that experiment is that, the decision is a function, basically. Because, we have a condition for instance where we increase the reward for the animal, for the observer. And when you increase the reward, they are less willing to switch to the other lever. So that also another similarity with human world and shows that maybe that it is a bit of complex, a tipping point, and it is like a function that really weighs the cost and the benefit of that particular context. Christian Keysers Because when Valeria says that we increase the reward, we increase the difference between the two levers. So in the main experiment, the only difference is that one is harder to press than the other, but they both give one pellet. Then in two other experiments, what we did was that now that two levers are equally hard to press; but one of them gives you two pellets, the other one just one pellet. And then rats are still willing to switch away from the two-pellet to the one-pellet to save the other one from pain. But when we made it three pellets versus one pellet, then, none of the rats were willing to give up the three pellets to prevent the shock to the other person. Valeria Gazzola Yeah, and then, the last, I think, result I kind of like in a way is that, as in many human studies, also in the animal world we did not find significant difference between . So both, the female and the males acts in a similar way. And in this type of , is also often the case in humans. Christian Keysers That's true. Valeria Gazzola So that's also interesting. Valeria Gazzola Well, in a way, I would say, to really show \u2014 I mean, I always believed it that animal performed these choices too. And that they do it to a certain extent to at least care or at least perceive what goes on in the other, right. It can't maybe specifically speaking of voluntarily care about others, but at least they perceive what goes on and I think this is something that the study shows pretty well that they do perceive, and that based on these perception[s], they make a decision. And I think it is a complex \u2014 I mean, to me it was in a way trivial, because I always believed that, you know, if you are a \"\", whether you are a rat, or a person, we are still animals, right? They must develop behaviours that take advantage, or that they adapt to the fact that it's a social environment that involves more individuals. But [...] the field keeps discussing, right? Whether animals also have emotions, whether animals also can take this sort of decision. And to see, slowly that evidence accumulates in favour of processes similar to what we call or . You know, similar: not exactly the same, but similar processes also are present in animals, to me is sort of reassuring also. And I think it allows us to learn from how evolution evolved as well. Maybe apart from knowing exactly how it works, but we start having some models where we can think, oh, evolutionary: maybe this process was already there, and then it developed further, more complex for the humans, but still is there to a certain extent. Christian Keysers Yeah, and I think the fact that it's really the same brain region as well that seems to be involved kind of gives us some confidence that prosociality in caring about others is really deeply ingrained in our biology. Christian Keysers Yeah so in many ways it's a relatively simple study. So we didn't need to use anything very high-tech in this case. Because to alter brain activity, we use the injection of muscimol, which is a GABAA blocker. It is a very simple pharmacological agent. So it's really technologically a very simple study. Nothing fancy. Valeria Gazzola Oh, we brainstormed about it. We started, as I said, we did a lot of research on, since our early ages, let's say in all our scientific career is based on embodiment, and activities in these areas and slowly we kept wondering more and more, on the role of these areas. And then, the way it goes, we normally speak about a topic and include other people and keep brainstorming, and I think, that's how it goes. At least for us. And in humans, we are also developing similar paradigms, so it just came one plus one equal to two. [laughs] Christian Keysers So, Julen Hernandez-Lallement, the first author of the study, was the one that basically made the vast majority of the experiments. And he was helped by the other two: [Augustine Triumph] Attah: who did part of the other animal groups, and then Cindy [Pinhal] and Efe [Soyman] helped to analyse the data. And basically Valeria and me have been kind of help designed this study initially and helped to analyse the data and wind up the study. So we kind of lead the lab, but it's the other people that really manipulate the rats and do all the hard work. Valeria Gazzola Well, it was long. Christian Keysers Yeah, I would say, four years? Valeria Gazzola Yeah, because the behavioural part is the longest one. Because you need to understand the best way to teach the animal, first to manipulate the lever, then to manipulate two levers, and then, before the lever, there is also another action that they need to do; and everything needs to be done within a certain time. So you need to let the animal the time to learn and for you that you run the experiment, you need to learn what's the best way, what's the best way to teach them to do the task? Christian Keysers Yeah, I think that Valeria just said what's really important in these studies is to understand what kind of situation you can create for the rats that they are really understand and which they can in a way, show you what they're capable of. So, kind of fine-tuning all the elements of the task, kind of how long do you let the rats develop the preference for one lever. Because if you give them too much time to get too used to one lever, they are not so willing to switch anymore. So the, most of the time is really involved in trying different versions of the paradigm, understanding what the rats really understand, and then analysing all the behaviour. Christian Keysers Yeah exactly; so the three kind of conditions we looked at was the hard vs the easy lever, and then seeing whether they switch to the harder lever when, to prevent the shock to the other one. And we tried the two pellets versus one pellet and, then the three pellets versus one pellet. And then finally, to test really whether the cingulate is necessary for that, we compare the condition in which we inhibit the activity in the cingulate using muscimol against the condition where we just inject salt water into the same brain region which doesn't have any effect. Christian Keysers Correct. Yeah. Valeria Gazzola Yeah, more or less. I don't know the date. Valeria Gazzola I think it was really again the establishing the behaviour. And in particular because we, at first \u2014 so the paradigm itself, we took it from a previous study, that was run years ago, do you remember? Christian Keysers Yeah, in '69, so that's kind of 50 years ago. Valeria Gazzola Fifty years years ago, so the idea of the two levers. And so and at that time, the articles' level of detail were not so many. The articles were not giving as much information as we now have to write down. And so we had to guess some parameters over there. And, the fact that the rats would prefer the easy lever was also not so straightforward. So we thought \"oh, they are gonna prefer the easy lever, and that's it.\" But at the end, you know, some rats, some animals develop a preference on the side; like they prefer their right lever, or the left lever, or others, they prefer the heavy lever. Right? And that was also a bit puzzling at first. We said, okay, so what do we do? We find that a couple of rats prefer the hard lever, is that meaningful or not? So we have to discuss a lot, how to adapt the paradigm to make it work, and this is also why we came about in using this switching index, because for our purposes, at the end, as long as the rat is able to switch a preference, right, whatever preference is developed is irrelevant, right? And before the beginning of this study, we were more thinking: oh, they have to develop the preference for the easy lever. And that's what is bringing us a bit out of the main purpose. And we realised: okay, but, what preference they develop at the end, it doesn't matter as long as we have a preference that we can show they can change because of the shock. So, I think this was one of the longest part[s], I would say. Christian Keysers Yes. Valeria Gazzola Yeah, I would say yes. Christian Keysers For once. Valeria Gazzola [laughs] Yeah, for once, yeah. I mean, there was some evidence around and previous work was already bringing us towards that direction. And, yeah, I mean we could not anticipate the proportion of animals that they would switch. But, we surely were expecting the rats to switch. Christian Keysers We were hoping for the cingulate to be necessary, so. Christian Keysers . Valeria Gazzola We were happy. Christian Keysers Yeah. Christian Keysers I think it's written in the paper, but my guess would be something like, I'd say, 70. Christian Keysers Yeah, so that's interesting, in this study we really find that there is a lot of variability between the rats. So like I was mentioning, we have about 40\\% that were ready to switch when they witnessed other one getting shocked. And about 60\\% that do not switch, so as a group, we really see that they do switch. But then only a proportion of individuals really show that sensitivity, and others do not. Valeria Gazzola Or did you mean how close they were in terms of familiarity? Christian Keysers So they're not genetically related. They're not brothers or sisters. And what we have is we have, we made one of the experiments with rats that didn't meet each other before, and it [the experiment] works. And we had other cases in which they were living in the same home cage, and so they [would know] each other very well. And the effect was not stronger. So, amongst our rats, we really noticed that they care even about the fate of a stranger. Christian Keysers Correct. Well, mates as in cage mates. Yeah, there was no sign of a difference. We did look at it and it was not the perfect comparison because the two groups were slightly different in the paradigm as well. But, it didn't look like there was a big difference. Christian Keysers So we're actually going to test that very soon. And it is up for grabs. But in the past we've looked at whether a rat shows more freezing when it sees another one get a shock. Which is a form of emotional contagion. And there we compare a kind of rats from different strain,s even. So one of the albino rats against a rat, versus, that had never seen each other before, or ever seen a member of that strain, the one end. And on the other end, really the rats have spent five weeks together and knew each other very well. And we didn't see any difference there. So I think the most robust findings is really that they care even about what happens to a stranger. Valeria Gazzola Yeah, we are testing it again now, in the future. Christian Keysers Exactly, specifically whether a mother would do more for her own kids than for... Valeria Gazzola Kids of somebody else. Christian Keysers Yeah. Christian Keysers Correct. Right. Valeria Gazzola Yeah. Christian Keysers Yeah, what you do is you place a . So you put the animal in a stereotact which is a system where you can go to a very specific position in the brain. We place a cannula, which is like an injection needle just where we know the cingulate to be. Then you let the animal recover with the cannula cemented in place. Then, on the day of the experiment, you basically inject a little bit of muscimol, which is an agent that blocks . Then by doing that, you can reduce the activity of the cingulate for about one hour. And during that hour, you can make the experiment. And then the control group is the same thing, but instead of injecting the muscimol, you inject some salt water. Christian Keysers Nothing really. Because you inject a very small quantity, that should only spread about 1 mm in the brain. So it really just affects the region that you \u2014 and you don't see any change in behaviour. So we also tested, for instance, whether they move more or less, whether they press the levers quicker or slower, and there was no difference. The only difference is that they didn't learn to not press the one [lever] that shocks the other. Valeria Gazzola And for instance, when you inject with muscimol, in case you see doing a normal paradigm. So whether you are still shocked to the sound, and then you present the sound. In that case, the rat behaves normally. And it still freezes. So, it does suggest that the muscimol effect is not impairing the normal behaviour, but specifically impairs the social behaviour of feeling... Christian Keysers ...of feeling for others. Valeria Gazzola Exactly. That was also the interesting part of the ACC that we believe to contribute really, to including the other [animal] into your decision-making. Because for a normal fear conditioning paradigm, you don't need to go through the ACC. They are made to be self-sufficient. But, if you do a fear conditioning basically that involves another individual instead of sound, like of pain, then you do need to go to the contribution of the ACC. So there seems to be two slightly complementary pathway for fear-detection. Christian Keysers Yeah, that we didn't measure. So, in that study, the muscimol animals were only in the behaviour with the ACC deactivated and the other ones were only with their ACC intact. So, but this is something that we plan to test in the future as well. To really see whether the ACC is necessary to acquire the aversion versus to maintain it. Christian Keysers We don't know, but I think there is no reason to assume that when the muscimol wears off, they would not become normal again, right? So that's most likely. What we don't know is whether if we had for instance, because there's three days of experiment, right, where we develop the aversion. And what we didn't try is for instance, give muscimol on Day 1 and Day 2 and then stop it on Day 3, and see whether on Day 3, they would then suddenly stop using the lever that gives shocks on the other days. So that we don't know whether it's necessary for learning or for recall; we just know that if you don't have it at all, you don't learn at all. Christian Keysers It's a good question. I would need to look in the paper. If you have the paper there, perhaps you can see it. But I can have a quick look to see if I have the paper somewhere. Yeah, so if you look at the Figure 4c, you can see the behaviour of each individual animal. And what you will notice is that there are some animals like some of the red animals which are the muscimol group that did switch, but the majority didn't switch. So I see there is one and only one animal in the muscimol group that really did switch. But what happens is that when you make those experiments, you never know for sure that when you inject the muscimol, that it has the desired effect. Because of course you have a cannula that's in the brain, and the cannula could become clogged also. So it can be that that one animal switched because the muscimol wasn't effective for some reason. Christian Keysers No. Valeria Gazzola No. Could be nice, but we didn't. Christian Keysers Exactly. Yeah, and in particular, there is a drug called Ecstacy that you may have heard of. So, some people reported that Ecstasy for instance, increases the feeling of empathy amongst humans. And I think that there is somewhere a study suggesting that if you give that to animal, there is also an increase in the sensitivity to what happens in another animal. So we didn't test that. Christian Keysers Yeah, no so we didn't do that. That is a very old experiment from . I think in the 50s, he did that experiment kind of with rats and with monkeys. And he sees that the rats will use the lever less. So even if you just have one lever, they'll use it less if it causes pain to others. But in monkeys, that was a very strong affect. Some of the monkeys really would rather not eat anything than to shock another monkey. So it's an interesting experiment, but we haven't done it. Christian Keysers Yeah, what you see here is the two lines: the dark green and the light green that represents the males and the females. For harm aversion, for that you should look at how much it changes from the baseline through the three shock sessions. And the change is exactly the same in males and females. But the difference between the two curves that you see is the fact that the females started off with the higher preference than the males did. But the reduction in preference is same across groups. Christian Keysers Between which rats? Rats, you mean, in general in the experiment? Figure 3b of the study. In general, like the rats, which were on the extremes, how extreme were they on the case-by-case basis? Christian Keysers Well, that you can see, if you look at Figure 3b in particular, you can see that some examples on the top of 3b of rats that had started off with a very strong preference for that were around 100 on the baseline session. And it stayed at 100. So they absolutely didn't care at all. And in the other case, if you look at the bottom panel, you have some animals that initially had a preference around kind of 80\\%. And by Day 3, they really go down to 0\\% of the shock lever used. So it's really a very substantial difference; some changes much as they possibly could and some don't change at all. Christian Keysers Yeah, it's a good \u2014 if we knew that, we would be very happy. I think the things that we did look at and didn't play major difference is actually the reaction of the demonstrator. So the first thing we figured perhaps you have demonstrators that really squeak a lot, and others, that don't give a lot of pain signals, and that could could explain the difference. Then we quantified the reaction of the demonstrators, we saw there were no major differences there. Where we did see really, big differences is in the reaction of the observer. So we saw that there is some observers for instance, when they realised that they had shocked the other one, they really stopped to do anything for a while, and took longer to go get their food and ate the food very quickly. So they really showed that they were disturbed by these shocks. And those were the ones that switched. And then were other rats that didn't seem to mind at all, they just kept eating their food as if nothing had happened. And those ones were the ones that didn't switch. So we feel that there's really just a striking difference in how much attention as well the agent paid to the harm signals of the other person. Valeria Gazzola But the causes are not known. The causes of these are not: could be different brain activity, it could be the relationship between the distress that the observer perceives from the other that stops them to do anything, or actually motivates the other. I mean, there are a lot of factors that could play a role. And we are trying to think of it: how to test and untangle this aspect apart. But it is not easy, but it is definitely a topic we are interested in. Christian Keysers Yeah, well we don't know that much. So from a kind of biological point of view, kind of it's only over the past, I would say, 10-20 years, that evolutionary biology is really paying a lot of attention to kind of and . Because if you read kind of traditional and evolutionary kind of books, they underline the selfishness of individuals. So the idea that you mainly need to survive yourself, and that other animals are really competitors. And then more slowly, people started to say, \"well of course, you care about your kids, because they have a lot of your and therefore, that makes sense\". And it's only quite recently that people start to really see that even if you are not really related to another animal, but kind of you help each other, your whole kind of herd or group ends up better-off. And the individual ends up being better-off. Because often, rats actually, or animals have a sense of mutualism. So if someone was kind to you at some point, you're more likely to be helped by that person in the future. So that helping others is a way to facilitate being helped by them in the future. And so, it still is a relatively young field of research that really acknowledges the fact that kind of in social animals, that live in groups. And individuals will really do things for others kind of and that this is beneficial for evolution. So it's really only starting to be explored. Christian Keysers Yeah, so what we know is that for instance, in monkeys, the cingulate seems to be necessary as well to, for instance, decide to work, to give juice to someone else. So, in the they have some paradigms where you see a symbol on the screen that means that if you now do something, there can be juice for yourself. And a different symbol if you work will give juice to another monkey, and a third symbol if you work that one, there'll be juice that's delivered in an empty glass. And what you see is that monkeys that really work hard for themselves, but they're also willing to work a little bit to give juice to another monkey. And that's more than they are willing to work if the juice is just gonna get wasted in as glass. And there as well, the ACC seems to be important to motivate the monkey to work for another monkey and that's the other example that we know. In mice, there is some evidence that if you disrupt the cingulate, then the mouse will no longer freeze when it see[s] another one getting shocked. But that's it. As far as I know, there's no other animal that has been explored. Christian Keysers Yes, of course! So, we ourselves, of course do not particularly like to have to give shocks to one animal. So the only reason we really do these experiments is that we feel that harm aversion is such an important phenomenon. Because in human society, when people lack harm aversion, they really cause a lot of damage to society. Both because they harm people, and they end up in prison and that has a huge cost; but as well for the fact that these individuals really erode trust and they harm in a way the interaction that all of us have with each other. Because we are always afraid that the person we have in front of us might be someone that will take advantage of you and harm you. So I think, in understanding how that works in the brain is really really important. And because of that, we feel that it's important to really understand how it works. And currently, working with animals is the only way that we can really modify brain activity and see if it changes behaviour. Christian Keysers Yes, we might do it in mice. So, of course, for other people, rats and mice are pretty much the same thing, but kind of there is a difference between them. And ultimately, we hope we can do this in humans. But for that, we need techniques in which we can modify brain activity in deeper brain regions. The insular lobe is highlighted in red. Valeria Gazzola You can do it once in a while in patients that already suffer from and normally the surgeons inserts electrodes to measure, to find out the source of epilepsy, and you can at times stimulate to see whether the region is essential in some of the normal behaviour. So at times, you can have access to these patients and ask them to participate in our task and we have a couple of collaborations, that we hope that will help us to tell something more about the role of the ACC and the in these type of tasks. And we are also currently trying to develop methods that are human-friendly, in the sense that they are not invasive, and to be used in active participants to try to disrupt the activity of these regions as well. Nowadays it's not easy to do because the TMS that [is] normally used to simulate the brain in humans, the , is not very well suited to reach deeper structure. Like the ACC goes really inside and it's a bit curved as well. You can reach with TMS, but it's not the cleanest way. So we are also trying to see whether we can use, for instance, stimulation to do it and test it directly in humans. Of course, it will also make use of data that comes from patients that show damages in the ACC. And it was a study from Ralph Adolphs in the past that did confirm that some of these regions like insula for instance, are important and essential for discriminating emotions for instance, so, you can also test in these patients: use our tasks and test these patients. So there are bit, some ways, to do it in humans, but it's quite small so we are investing, but the results take longer. And of course, when you use patients, you always have the problem of reorganisation of the brain structure that you are looking at, possibly, so. Valeria Gazzola Yeah, that's the question we are really interested in, and we don't know. And that's why we are interested in finding out whether a particular region like the ACC is necessary for the development, or for the behaviour to occur. Because once we know, we can confirm that in humans as well, what you could think are several ways. You can manipulate plasticity in that region, so, ask the participants to go do certain tasks where they learn something. And while you are modifying for instance, the {w|neuroplasticity|plasticity}} of the brain with current or magnetic simulation. Or you can think of targeted therapies, for instance like , when you project the activities of the areas where the participants doing a task and the participants can directly modify through visual feedback the activity of these areas coming up. So that if I now project on the screen the activity, real-time, the activity of the particular regions, I can tell you \"okay, try find a way to modify that region\". So you would come up with thinking of something, you know, it's just a random process, but you could come up with a task saying like, \"Okay, if I think of how my friend is feeling now, I see that manipulated region\". And then you can practice and practice to the point that it becomes automatic kind of things and that activity of that region now is modified based on your exercise and your activity. 350px|Representation of a neuron Valeria Gazzola Ah, yes there are a lot of plans and, roads, let's say. One of the plans we have is to really understand a little bit even more in details what is happening in the brain, at the cellular level and which are the inputs of these are involved, what type of neurons are involved and all these aspect[s], we are also interested in trying [to] understand the developmental curve, what is happening, for instance, if you are exposed to a very stressful life when you're young, what kind of consequence it has on harm aversion later in life. And we are interested in seeing how it is also transmitted through generations, like if you have these variabilities between individuals, with some individuals having higher propensity to be prosocial, or whether, you know, you select individuals that are mostly prosocial, would this selection be brought forward in the next generation. So we also want also to see how much is learned and how much is more genetically encoded. So all these aspects, we are trying to tackle with different experiment. And let's hope we \u2014 of course the other aspects are very early at this stage. Valeria Gazzola [laughs] You want them all? No, okay, so as I mentioned from the animal's point-of-view, we are doing, we want to do on the, a bit more of the physiology, and up the genetic to discover the role of the ACC and each single cell of the ACC, as I mentioning before. So, is it for instance, let's say, what type of cells is involved in mapping the other pain into my own pain. And where the information comes from, so what is the circuit that is involved, and how the other things change the information: this is one aspect of one of the experiments we're gonna run. Christian Keysers Yeah. Valeria Gazzola Yeah. Christian Keysers Yeah, so we basically are both of us department heads, so that means that we each have a a group of people we basically manage. And of course we really work very very closely together. So our two groups kind of together form what we call the Social Brain Lab which is basically investigating how our brain processes the emotions of others and reacts to them. Christian Keysers Okay. Very good. Christian Keysers No. Valeria Gazzola No, I think it was quite thorough. Yeah. Christian Keysers You are welcome. Valeria Gazzola Thank you. Christian Keysers Thank you. B-bye. Have a good day. Valeria Gazzola Bye.", "after_revision": " And one of the biggest limitation[s] in particular of the human research is that you can go so far in understanding the brain mechanism. Because we cannot, we don't have tools with the correct in terms of, for instance, understanding what a single cell does, in these processes. And that's why, for many years, we developed, we tried to develop a model in animals where all these techniques are more available that would allow us to investigate similar processes to those in humans. So processes basically that are involved in perceiving the other['s] distress also in animals. And, that's basically the main reasons why we move towards this research and then we started from coming up with the experiment in which we simply measure the distress of an animal in reaction to the distress of another. Which what we call , for instance. And we made it more and more complex in order to reach slowly a degree of complexity that can be comparable to processes in humans. Emotional contagions: you can compare it, for instance, that the level of humans when you are in a crowd, or when you are baby, that as a crowd you are contaged by the emotions are around. And, but then, we wanted to go a little bit of a step forward: okay now I am contaged, what does it mean to be contaged? Can I use this information to, for instance, avoid hurting other people. And that's how we came about, more or less, so. I mean, one other motivation we have is that in the past we've also been interested in people that seemed to lack the aversion to harming others. I mean, with that , sometimes they're called as well. And so, a couple of years ago, we made this study in which we identified psychopathic criminals in high-security institutions. We brought them to the lab, and we scanned their brains while they witnessed the pain of other individuals. And what we saw was that if they don't have any particular reason to empathise with others, they really have reduced activity in their own pain regions while they witness the pain of others. So, of course, that's interesting and it may suggest that perhaps, the reason why if they can make some money, for instance, they don't mind to harm other people is because they don't activate their own pain much while they witness the pain of others. The problem like Valeria was saying, is that in humans we can see that the brain region is active while you see the pain of others, but you can't easily change the activity in the brain region to see whether that would change the way that the psychopathic criminal would act. I mean, ideally, what we'd like to do is increase the activity of these pain regions in psychopaths and see that now suddenly they would really care to not harm others anymore. Although it's not yet, it's also not yet very clear that we need activity of these regions to avoid the harm, right? At that point, that's how we came about to run the experiment, because the first question was: is it really necessary. The activity of these regions. So, you start with okay, you want to manipulate these regions to reduce psychopathy. But the field could not even prove that this activity was necessary to reduce harm. And so, that was really one of the strong motivation behind the -experiment, because rats have a very similar to what humans have. It is really a core part of the brain that is involved in feeling your own pain. So, if you don't have a cingluate cortex and you hurt yourself, you still feel that you've cut yourself, but you don't mind. And so you are not going to do a lot to avoid being cut again. So this region exists also in the rats and it is a relatively deep brain region. So therefore, we turn to the rats, and figure that in the rat, we can change the activity in the brain region and see whether that would then change how much the rat would be aversed to harming other rats or not. Ah. So very briefly, what we do is we give a rat a choice between two that the rat can press. Both of these levers will provide the rat with one little pellet of sugar which they really like. So, they are happy to press these levers to get the reward. In the main experiment, what we do is that one of the two levers is a little bit more difficult to press than the other one. So most of the rats start to prefer the easy lever to press. And that also what we see is that there is variability in the responses of the observers, of the rats that make the choice between the levers. And these variabilities also present in humans: when you do tasks that are rather similar, you see that not everyone acts socially, preferring the social lever. But you also have individuals that would go for the reward more often. So this is also another similarity between the animal world and the human world. And on top of that, I think that the other things we've learned from that experiment is that, the decision is a function, basically. Because, we have a condition for instance where we increase the reward for the animal, for the observer. And when you increase the reward, they are less willing to switch to the other lever. So that also another similarity with human world and shows that maybe that it is a bit of complex, a tipping point, and it is like a function that really weighs the cost and the benefit of that particular context. Because when Valeria says that we increase the reward, we increase the difference between the two levers. So in the main experiment, the only difference is that one is harder to press than the other, but they both give one pellet. Then in two other experiments, what we did was that now that two levers are equally hard to press; but one of them gives you two pellets, the other one just one pellet. And then rats are still willing to switch away from the two-pellet to the one-pellet to save the other one from pain. But when we made it three pellets versus one pellet, then, none of the rats were willing to give up the three pellets to prevent the shock to the other person. Yeah, and then, the last, I think, result I kind of like in a way is that, as in many human studies, also in the animal world we did not find significant difference between . So both, the female and the males acts in a similar way. And in this type of , is also often the case in humans. That's true. So that's also interesting. Well, in a way, I would say, to really show \u2014 I mean, I always believed it that animal performed these choices too. And that they do it to a certain extent to at least care or at least perceive what goes on in the other, right. It can't maybe specifically speaking of voluntarily care about others, but at least they perceive what goes on and I think this is something that the study shows pretty well that they do perceive, and that based on these perception[s], they make a decision. And I think it is a complex \u2014 I mean, to me it was in a way trivial, because I always believed that, you know, if you are a \"\", whether you are a rat, or a person, we are still animals, right? They must develop behaviours that take advantage, or that they adapt to the fact that it's a social environment that involves more individuals. But [...] the field keeps discussing, right? Whether animals also have emotions, whether animals also can take this sort of decision. And to see, slowly that evidence accumulates in favour of processes similar to what we call or . You know, similar: not exactly the same, but similar processes also are present in animals, to me is sort of reassuring also. And I think it allows us to learn from how evolution evolved as well. Maybe apart from knowing exactly how it works, but we start having some models where we can think, oh, evolutionary: maybe this process was already there, and then it developed further, more complex for the humans, but still is there to a certain extent. Yeah, and I think the fact that it's really the same brain region as well that seems to be involved kind of gives us some confidence that prosociality in caring about others is really deeply ingrained in our biology. Yeah so in many ways it's a relatively simple study. So we didn't need to use anything very high-tech in this case. Because to alter brain activity, we use the injection of muscimol, which is a GABAA blocker. It is a very simple pharmacological agent. So it's really technologically a very simple study. Nothing fancy. Oh, we brainstormed about it. We started, as I said, we did a lot of research on, since our early ages, let's say in all our scientific career is based on embodiment, and activities in these areas and slowly we kept wondering more and more, on the role of these areas. And then, the way it goes, we normally speak about a topic and include other people and keep brainstorming, and I think, that's how it goes. At least for us. And in humans, we are also developing similar paradigms, so it just came one plus one equal to two. [laughs] So, Julen Hernandez-Lallement, the first author of the study, was the one that basically made the vast majority of the experiments. And he was helped by the other two: [Augustine Triumph] Attah: who did part of the other animal groups, and then Cindy [Pinhal] and Efe [Soyman] helped to analyse the data. And basically Valeria and me have been kind of help designed this study initially and helped to analyse the data and wind up the study. So we kind of lead the lab, but it's the other people that really manipulate the rats and do all the hard work. Well, it was long. Yeah, I would say, four years? Yeah, because the behavioural part is the longest one. Because you need to understand the best way to teach the animal, first to manipulate the lever, then to manipulate two levers, and then, before the lever, there is also another action that they need to do; and everything needs to be done within a certain time. So you need to let the animal the time to learn and for you that you run the experiment, you need to learn what's the best way, what's the best way to teach them to do the task? Yeah, I think that Valeria just said what's really important in these studies is to understand what kind of situation you can create for the rats that they are really understand and which they can in a way, show you what they're capable of. So, kind of fine-tuning all the elements of the task, kind of how long do you let the rats develop the preference for one lever. Because if you give them too much time to get too used to one lever, they are not so willing to switch anymore. So the, most of the time is really involved in trying different versions of the paradigm, understanding what the rats really understand, and then analysing all the behaviour. Yeah exactly; so the three kind of conditions we looked at was the hard vs the easy lever, and then seeing whether they switch to the harder lever when, to prevent the shock to the other one. And we tried the two pellets versus one pellet and, then the three pellets versus one pellet. And then finally, to test really whether the cingulate is necessary for that, we compare the condition in which we inhibit the activity in the cingulate using muscimol against the condition where we just inject salt water into the same brain region which doesn't have any effect. Correct. Yeah. Yeah, more or less. I don't know the date. I think it was really again the establishing the behaviour. And in particular because we, at first \u2014 so the paradigm itself, we took it from a previous study, that was run years ago, do you remember? Yeah, in '69, so that's kind of 50 years ago. Fifty years years ago, so the idea of the two levers. And so and at that time, the articles' level of detail were not so many. The articles were not giving as much information as we now have to write down. And so we had to guess some parameters over there. And, the fact that the rats would prefer the easy lever was also not so straightforward. So we thought \"oh, they are gonna prefer the easy lever, and that's it.\" But at the end, you know, some rats, some animals develop a preference on the side; like they prefer their right lever, or the left lever, or others, they prefer the heavy lever. Right? And that was also a bit puzzling at first. We said, okay, so what do we do? We find that a couple of rats prefer the hard lever, is that meaningful or not? So we have to discuss a lot, how to adapt the paradigm to make it work, and this is also why we came about in using this switching index, because for our purposes, at the end, as long as the rat is able to switch a preference, right, whatever preference is developed is irrelevant, right? And before the beginning of this study, we were more thinking: oh, they have to develop the preference for the easy lever. And that's what is bringing us a bit out of the main purpose. And we realised: okay, but, what preference they develop at the end, it doesn't matter as long as we have a preference that we can show they can change because of the shock. So, I think this was one of the longest part[s], I would say. Yes. Yeah, I would say yes. For once. [laughs] Yeah, for once, yeah. I mean, there was some evidence around and previous work was already bringing us towards that direction. And, yeah, I mean we could not anticipate the proportion of animals that they would switch. But, we surely were expecting the rats to switch. We were hoping for the cingulate to be necessary, so. . We were happy. Yeah. I think it's written in the paper, but my guess would be something like, I'd say, 70. Yeah, so that's interesting, in this study we really find that there is a lot of variability between the rats. So like I was mentioning, we have about 40\\% that were ready to switch when they witnessed other one getting shocked. And about 60\\% that do not switch, so as a group, we really see that they do switch. But then only a proportion of individuals really show that sensitivity, and others do not. Or did you mean how close they were in terms of familiarity? So they're not genetically related. They're not brothers or sisters. And what we have is we have, we made one of the experiments with rats that didn't meet each other before, and it [the experiment] works. And we had other cases in which they were living in the same home cage, and so they [would know] each other very well. And the effect was not stronger. So, amongst our rats, we really noticed that they care even about the fate of a stranger. Correct. Well, mates as in cage mates. Yeah, there was no sign of a difference. We did look at it and it was not the perfect comparison because the two groups were slightly different in the paradigm as well. But, it didn't look like there was a big difference. So we're actually going to test that very soon. And it is up for grabs. But in the past we've looked at whether a rat shows more freezing when it sees another one get a shock. Which is a form of emotional contagion. And there we compare a kind of rats from different strain,s even. So one of the albino rats against a rat, versus, that had never seen each other before, or ever seen a member of that strain, the one end. And on the other end, really the rats have spent five weeks together and knew each other very well. And we didn't see any difference there. So I think the most robust findings is really that they care even about what happens to a stranger. Yeah, we are testing it again now, in the future. Exactly, specifically whether a mother would do more for her own kids than for... Kids of somebody else. Yeah. Correct. Right. Yeah. Yeah, what you do is you place a . So you put the animal in a stereotact which is a system where you can go to a very specific position in the brain. We place a cannula, which is like an injection needle just where we know the cingulate to be. Then you let the animal recover with the cannula cemented in place. Then, on the day of the experiment, you basically inject a little bit of muscimol, which is an agent that blocks . Then by doing that, you can reduce the activity of the cingulate for about one hour. And during that hour, you can make the experiment. And then the control group is the same thing, but instead of injecting the muscimol, you inject some salt water. Nothing really. Because you inject a very small quantity, that should only spread about 1 mm in the brain. So it really just affects the region that you \u2014 and you don't see any change in behaviour. So we also tested, for instance, whether they move more or less, whether they press the levers quicker or slower, and there was no difference. The only difference is that they didn't learn to not press the one [lever] that shocks the other. And for instance, when you inject with muscimol, in case you see doing a normal paradigm. So whether you are still shocked to the sound, and then you present the sound. In that case, the rat behaves normally. And it still freezes. So, it does suggest that the muscimol effect is not impairing the normal behaviour, but specifically impairs the social behaviour of feeling... ...of feeling for others. Exactly. That was also the interesting part of the ACC that we believe to contribute really, to including the other [animal] into your decision-making. Because for a normal fear conditioning paradigm, you don't need to go through the ACC. They are made to be self-sufficient. But, if you do a fear conditioning basically that involves another individual instead of sound, like of pain, then you do need to go to the contribution of the ACC. So there seems to be two slightly complementary pathway for fear-detection. Yeah, that we didn't measure. So, in that study, the muscimol animals were only in the behaviour with the ACC deactivated and the other ones were only with their ACC intact. So, but this is something that we plan to test in the future as well. To really see whether the ACC is necessary to acquire the aversion versus to maintain it. We don't know, but I think there is no reason to assume that when the muscimol wears off, they would not become normal again, right? So that's most likely. What we don't know is whether if we had for instance, because there's three days of experiment, right, where we develop the aversion. And what we didn't try is for instance, give muscimol on Day 1 and Day 2 and then stop it on Day 3, and see whether on Day 3, they would then suddenly stop using the lever that gives shocks on the other days. So that we don't know whether it's necessary for learning or for recall; we just know that if you don't have it at all, you don't learn at all. It's a good question. I would need to look in the paper. If you have the paper there, perhaps you can see it. But I can have a quick look to see if I have the paper somewhere. Yeah, so if you look at the Figure 4c, you can see the behaviour of each individual animal. And what you will notice is that there are some animals like some of the red animals which are the muscimol group that did switch, but the majority didn't switch. So I see there is one and only one animal in the muscimol group that really did switch. But what happens is that when you make those experiments, you never know for sure that when you inject the muscimol, that it has the desired effect. Because of course you have a cannula that's in the brain, and the cannula could become clogged also. So it can be that that one animal switched because the muscimol wasn't effective for some reason. No. No. Could be nice, but we didn't. Exactly. Yeah, and in particular, there is a drug called Ecstacy that you may have heard of. So, some people reported that Ecstasy for instance, increases the feeling of empathy amongst humans. And I think that there is somewhere a study suggesting that if you give that to animal, there is also an increase in the sensitivity to what happens in another animal. So we didn't test that. Yeah, no so we didn't do that. That is a very old experiment from . I think in the 50s, he did that experiment kind of with rats and with monkeys. And he sees that the rats will use the lever less. So even if you just have one lever, they'll use it less if it causes pain to others. But in monkeys, that was a very strong affect. Some of the monkeys really would rather not eat anything than to shock another monkey. So it's an interesting experiment, but we haven't done it. Yeah, what you see here is the two lines: the dark green and the light green that represents the males and the females. For harm aversion, for that you should look at how much it changes from the baseline through the three shock sessions. And the change is exactly the same in males and females. But the difference between the two curves that you see is the fact that the females started off with the higher preference than the males did. But the reduction in preference is same across groups. Between which rats? Rats, you mean, in general in the experiment? Figure 3b of the study. In general, like the rats, which were on the extremes, how extreme were they on the case-by-case basis? Well, that you can see, if you look at Figure 3b in particular, you can see that some examples on the top of 3b of rats that had started off with a very strong preference for that were around 100 on the baseline session. And it stayed at 100. So they absolutely didn't care at all. And in the other case, if you look at the bottom panel, you have some animals that initially had a preference around kind of 80\\%. And by Day 3, they really go down to 0\\% of the shock lever used. So it's really a very substantial difference; some changes much as they possibly could and some don't change at all. Yeah, it's a good \u2014 if we knew that, we would be very happy. I think the things that we did look at and didn't play major difference is actually the reaction of the demonstrator. So the first thing we figured perhaps you have demonstrators that really squeak a lot, and others, that don't give a lot of pain signals, and that could could explain the difference. Then we quantified the reaction of the demonstrators, we saw there were no major differences there. Where we did see really, big differences is in the reaction of the observer. So we saw that there is some observers for instance, when they realised that they had shocked the other one, they really stopped to do anything for a while, and took longer to go get their food and ate the food very quickly. So they really showed that they were disturbed by these shocks. And those were the ones that switched. And then were other rats that didn't seem to mind at all, they just kept eating their food as if nothing had happened. And those ones were the ones that didn't switch. So we feel that there's really just a striking difference in how much attention as well the agent paid to the harm signals of the other person. But the causes are not known. The causes of these are not: could be different brain activity, it could be the relationship between the distress that the observer perceives from the other that stops them to do anything, or actually motivates the other. I mean, there are a lot of factors that could play a role. And we are trying to think of it: how to test and untangle this aspect apart. But it is not easy, but it is definitely a topic we are interested in. Yeah, well we don't know that much. So from a kind of biological point of view, kind of it's only over the past, I would say, 10-20 years, that evolutionary biology is really paying a lot of attention to kind of and . Because if you read kind of traditional and evolutionary kind of books, they underline the selfishness of individuals. So the idea that you mainly need to survive yourself, and that other animals are really competitors. And then more slowly, people started to say, \"well of course, you care about your kids, because they have a lot of your and therefore, that makes sense\". And it's only quite recently that people start to really see that even if you are not really related to another animal, but kind of you help each other, your whole kind of herd or group ends up better-off. And the individual ends up being better-off. Because often, rats actually, or animals have a sense of mutualism. So if someone was kind to you at some point, you're more likely to be helped by that person in the future. So that helping others is a way to facilitate being helped by them in the future. And so, it still is a relatively young field of research that really acknowledges the fact that kind of in social animals, that live in groups. And individuals will really do things for others kind of and that this is beneficial for evolution. So it's really only starting to be explored. Yeah, so what we know is that for instance, in monkeys, the cingulate seems to be necessary as well to, for instance, decide to work, to give juice to someone else. So, in the they have some paradigms where you see a symbol on the screen that means that if you now do something, there can be juice for yourself. And a different symbol if you work will give juice to another monkey, and a third symbol if you work that one, there'll be juice that's delivered in an empty glass. And what you see is that monkeys that really work hard for themselves, but they're also willing to work a little bit to give juice to another monkey. And that's more than they are willing to work if the juice is just gonna get wasted in as glass. And there as well, the ACC seems to be important to motivate the monkey to work for another monkey and that's the other example that we know. In mice, there is some evidence that if you disrupt the cingulate, then the mouse will no longer freeze when it see[s] another one getting shocked. But that's it. As far as I know, there's no other animal that has been explored. Yes, of course! So, we ourselves, of course do not particularly like to have to give shocks to one animal. So the only reason we really do these experiments is that we feel that harm aversion is such an important phenomenon. Because in human society, when people lack harm aversion, they really cause a lot of damage to society. Both because they harm people, and they end up in prison and that has a huge cost; but as well for the fact that these individuals really erode trust and they harm in a way the interaction that all of us have with each other. Because we are always afraid that the person we have in front of us might be someone that will take advantage of you and harm you. So I think, in understanding how that works in the brain is really really important. And because of that, we feel that it's important to really understand how it works. And currently, working with animals is the only way that we can really modify brain activity and see if it changes behaviour. Yes, we might do it in mice. So, of course, for other people, rats and mice are pretty much the same thing, but kind of there is a difference between them. And ultimately, we hope we can do this in humans. But for that, we need techniques in which we can modify brain activity in deeper brain regions. The insular lobe is highlighted in red. You can do it once in a while in patients that already suffer from and normally the surgeons inserts electrodes to measure, to find out the source of epilepsy, and you can at times stimulate to see whether the region is essential in some of the normal behaviour. So at times, you can have access to these patients and ask them to participate in our task and we have a couple of collaborations, that we hope that will help us to tell something more about the role of the ACC and the in these type of tasks. And we are also currently trying to develop methods that are human-friendly, in the sense that they are not invasive, and to be used in active participants to try to disrupt the activity of these regions as well. Nowadays it's not easy to do because the TMS that [is] normally used to simulate the brain in humans, the , is not very well suited to reach deeper structure. Like the ACC goes really inside and it's a bit curved as well. You can reach with TMS, but it's not the cleanest way. So we are also trying to see whether we can use, for instance, stimulation to do it and test it directly in humans. Of course, it will also make use of data that comes from patients that show damages in the ACC. And it was a study from Ralph Adolphs in the past that did confirm that some of these regions like insula for instance, are important and essential for discriminating emotions for instance, so, you can also test in these patients: use our tasks and test these patients. So there are bit, some ways, to do it in humans, but it's quite small so we are investing, but the results take longer. And of course, when you use patients, you always have the problem of reorganisation of the brain structure that you are looking at, possibly, so. Yeah, that's the question we are really interested in, and we don't know. And that's why we are interested in finding out whether a particular region like the ACC is necessary for the development, or for the behaviour to occur. Because once we know, we can confirm that in humans as well, what you could think are several ways. You can manipulate plasticity in that region, so, ask the participants to go do certain tasks where they learn something. And while you are modifying for instance, the {w|neuroplasticity|plasticity}} of the brain with current or magnetic simulation. Or you can think of targeted therapies, for instance like , when you project the activities of the areas where the participants doing a task and the participants can directly modify through visual feedback the activity of these areas coming up. So that if I now project on the screen the activity, real-time, the activity of the particular regions, I can tell you \"okay, try find a way to modify that region\". So you would come up with thinking of something, you know, it's just a random process, but you could come up with a task saying like, \"Okay, if I think of how my friend is feeling now, I see that manipulated region\". And then you can practice and practice to the point that it becomes automatic kind of things and that activity of that region now is modified based on your exercise and your activity. 350px|Representation of a neuron Ah, yes there are a lot of plans and, roads, let's say. One of the plans we have is to really understand a little bit even more in details what is happening in the brain, at the cellular level and which are the inputs of these are involved, what type of neurons are involved and all these aspect[s], we are also interested in trying [to] understand the developmental curve, what is happening, for instance, if you are exposed to a very stressful life when you're young, what kind of consequence it has on harm aversion later in life. And we are interested in seeing how it is also transmitted through generations, like if you have these variabilities between individuals, with some individuals having higher propensity to be prosocial, or whether, you know, you select individuals that are mostly prosocial, would this selection be brought forward in the next generation. So we also want also to see how much is learned and how much is more genetically encoded. So all these aspects, we are trying to tackle with different experiment. And let's hope we \u2014 of course the other aspects are very early at this stage. [laughs] You want them all? No, okay, so as I mentioned from the animal's point-of-view, we are doing, we want to do on the, a bit more of the physiology, and up the genetic to discover the role of the ACC and each single cell of the ACC, as I mentioning before. So, is it for instance, let's say, what type of cells is involved in mapping the other pain into my own pain. And where the information comes from, so what is the circuit that is involved, and how the other things change the information: this is one aspect of one of the experiments we're gonna run. Yeah. Yeah. Yeah, so we basically are both of us department heads, so that means that we each have a a group of people we basically manage. And of course we really work very very closely together. So our two groups kind of together form what we call the Social Brain Lab which is basically investigating how our brain processes the emotions of others and reacts to them. Okay. Very good. No. No, I think it was quite thorough. Yeah. You are welcome. Thank you. Thank you. B-bye. Have a good day. Bye.", "edit_actions": [{"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 0, "end_char_pos": 15}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 1413, "end_char_pos": 1430}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 2762, "end_char_pos": 2777}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 3214, "end_char_pos": 3231}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 3926, "end_char_pos": 3943}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 4382, "end_char_pos": 4397}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 5392, "end_char_pos": 5409}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 6088, "end_char_pos": 6103}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 6392, "end_char_pos": 6409}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 6423, "end_char_pos": 6438}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 6467, "end_char_pos": 6482}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 7988, "end_char_pos": 8005}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 8223, "end_char_pos": 8240}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 8560, "end_char_pos": 8575}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 9112, "end_char_pos": 9129}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 9683, "end_char_pos": 9698}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 9718, "end_char_pos": 9735}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 9767, "end_char_pos": 9782}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 10277, "end_char_pos": 10294}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 10952, "end_char_pos": 10969}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 11536, "end_char_pos": 11553}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 11569, "end_char_pos": 11584}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 11628, "end_char_pos": 11643}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 11844, "end_char_pos": 11861}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 11908, "end_char_pos": 11923}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 13395, "end_char_pos": 13412}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 13418, "end_char_pos": 13433}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 13457, "end_char_pos": 13474}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 13485, "end_char_pos": 13500}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 13779, "end_char_pos": 13796}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 13851, "end_char_pos": 13868}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 13871, "end_char_pos": 13886}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 13902, "end_char_pos": 13919}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 13926, "end_char_pos": 13943}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 14030, "end_char_pos": 14047}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 14453, "end_char_pos": 14468}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 14530, "end_char_pos": 14547}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 14996, "end_char_pos": 15013}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 15275, "end_char_pos": 15292}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 15954, "end_char_pos": 15969}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 16020, "end_char_pos": 16037}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 16120, "end_char_pos": 16135}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 16159, "end_char_pos": 16176}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 16183, "end_char_pos": 16200}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 16217, "end_char_pos": 16232}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 16239, "end_char_pos": 16256}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 16933, "end_char_pos": 16950}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 17390, "end_char_pos": 17405}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 17781, "end_char_pos": 17798}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 17825, "end_char_pos": 17840}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 18358, "end_char_pos": 18375}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 18710, "end_char_pos": 18727}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 19371, "end_char_pos": 19388}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 20256, "end_char_pos": 20273}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 20278, "end_char_pos": 20293}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 20328, "end_char_pos": 20345}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 20732, "end_char_pos": 20749}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 21226, "end_char_pos": 21243}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 21738, "end_char_pos": 21755}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 21950, "end_char_pos": 21967}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 22564, "end_char_pos": 22581}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 23761, "end_char_pos": 23776}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 24237, "end_char_pos": 24254}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 25644, "end_char_pos": 25661}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 26757, "end_char_pos": 26774}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 27756, "end_char_pos": 27773}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 28116, "end_char_pos": 28131}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 29876, "end_char_pos": 29891}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 31314, "end_char_pos": 31329}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 32443, "end_char_pos": 32458}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 33022, "end_char_pos": 33039}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 33046, "end_char_pos": 33061}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 33068, "end_char_pos": 33085}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 33445, "end_char_pos": 33462}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 33480, "end_char_pos": 33497}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 33502, "end_char_pos": 33517}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 33559, "end_char_pos": 33576}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 33594, "end_char_pos": 33609}, {"type": "D", "before": "Christian Keysers", "after": null, "start_char_pos": 33621, "end_char_pos": 33638}, {"type": "D", "before": "Valeria Gazzola", "after": null, "start_char_pos": 33674, "end_char_pos": 33689}], "sents_char_pos": [0, 152, 294, 498, 593, 814, 849, 981, 1170, 1291, 1364, 1412, 1576, 1630, 1757, 1865, 2056, 2308, 2584, 2761, 2894, 3013, 3044, 3129, 3213, 3362, 3443, 3568, 3631, 3712, 3925, 3947, 4037, 4135, 4195, 4320, 4381, 4540, 4701, 4772, 4853, 4986, 5091, 5177, 5391, 5515, 5640, 5739, 5809, 5927, 6087, 6335, 6391, 6422, 6466, 6598, 6710, 6968, 7161, 7305, 7350, 7439, 7662, 7732, 7987, 8222, 8293, 8356, 8449, 8492, 8544, 8559, 8605, 8844, 8985, 9002, 9102, 9261, 9434, 9570, 9682, 9717, 9766, 9837, 10043, 10098, 10276, 10535, 10664, 10776, 10951, 10983, 11161, 11255, 11535, 11562, 11604, 11627, 11703, 11843, 11907, 11977, 12050, 12129, 12180, 12269, 12342, 12426, 12521, 12571, 12604, 12684, 12973, 13096, 13158, 13332, 13394, 13417, 13456, 13484, 13531, 13636, 13728, 13778, 13850, 13901, 13925, 14158, 14276, 14361, 14452, 14529, 14583, 14616, 14753, 14872, 14905, 14995, 15022, 15052, 15093, 15221, 15274, 15340, 15364, 15468, 15508, 15574, 15713, 15813, 15853, 15953, 16019, 16119, 16158, 16182, 16209, 16238, 16406, 16500, 16568, 16683, 16768, 16819, 16932, 16966, 17057, 17148, 17291, 17389, 17495, 17574, 17614, 17636, 17780, 17824, 17849, 17992, 18079, 18116, 18281, 18357, 18405, 18549, 18619, 18709, 18860, 18883, 19017, 19226, 19299, 19370, 19410, 19445, 19498, 19564, 19656, 19819, 19907, 20056, 20157, 20255, 20327, 20354, 20438, 20539, 20707, 20731, 20780, 20817, 20896, 20947, 21032, 21079, 21166, 21225, 21363, 21482, 21539, 21682, 21737, 21775, 21821, 21845, 21949, 22188, 22210, 22249, 22380, 22446, 22492, 22563, 22642, 22760, 22943, 23043, 23120, 23345, 23409, 23448, 23567, 23616, 23760, 23806, 24028, 24087, 24165, 24236, 24290, 24591, 24692, 24846, 25052, 25097, 25165, 25272, 25354, 25498, 25598, 25643, 25826, 25973, 26138, 26288, 26385, 26527, 26675, 26690, 26756, 26790, 26881, 26999, 27103, 27186, 27329, 27460, 27545, 27629, 27755, 27802, 27929, 27979, 28075, 28115, 28394, 28637, 28850, 29009, 29072, 29127, 29243, 29339, 29609, 29729, 29965, 30119, 30219, 30341, 30469, 30714, 30879, 31096, 31280, 31385, 31863, 32201, 32291, 32364, 32442, 32486, 32721, 32831, 33021, 33045, 33067, 33213, 33270, 33444, 33468, 33479, 33552, 33593, 33620, 33649, 33673]}
+{"doc_id": "29918", "revision_depth": "1", "before_revision": "The number of deaths on South African roads for December , 2005 was 1, 215 according to the Department of Transport. In the same period last year, 1,234 people perished on the nation's roads. A total of 10, 530 people died in 2004 on South African roads. Spokesperson for the Department of Transport , Collen Msibi said 512 of the fatalities were pedestrians, 414 were passengers and 289 were drivers. In 2005 the vehicle population in South Africaincreased by 477,205 to 7,951,076 vehicles with the number of new drivers increasing by 779,000 to 7,490,333. The road toll in South Africa is similar to that of South Korea, Mexico, Japan and w:Thailand. All except South Korea have vastly larger populations. The country with the most road related deaths is China with 250,007 people dying on their roads in 2002. The South African government have acknowledged the problem since 2001, when they launched their \"Arrive Alive\" campaign targeting vehicle condition, driver fitness, speeding and drink driving. Category: South Africa Category: Trans", "after_revision": "According to the South African government's Department of Transport, the number of fatalities on the country's roads during December 2005 was 1, 215. This is compared with 1,234 the previous year, where the total number of deaths in traffic accidents was 10, 530. Department of Transport spokeswoman , Collen Msibi , stated that 512 of the fatalities were pedestrians, 414 passengers, and 289 drivers. 2005 saw the number of vehicles on South Africa's roads rise by nearly half a million to just under eight million with 779,000 new drivers adding to the dangers on the country's roads. The road toll in South Africa is similar to that of South Korea, Mexico, Japan and Thailand. However, except for South Korea these countries have significantly larger populations. The worst country in the world for deaths in road traffic accidents, is currently accepted to be China. Figures released for 2002 reveal that 250,007 people were killed in that year. The South African government have acknowledged the problem since 2001. At that time they launched their \"Arrive Alive\" campaign , targeting vehicle condition, driver fitness, speeding and drink driving. ", "edit_actions": [{"type": "R", "before": "The number of deaths on South African roads for December ,", "after": "According to the South African government's Department of Transport, the number of fatalities on the country's roads during December", "start_char_pos": 0, "end_char_pos": 58}, {"type": "R", "before": "215 according to the Department of Transport. In the same period last year,", "after": "215. This is compared with", "start_char_pos": 71, "end_char_pos": 146}, {"type": "D", "before": "people perished on the nation's roads.", "after": null, "start_char_pos": 153, "end_char_pos": 191}, {"type": "R", "before": "A total of", "after": "the previous year, where the total number of deaths in traffic accidents was", "start_char_pos": 192, "end_char_pos": 202}, {"type": "R", "before": "530 people died in 2004 on South African roads.", "after": "530.", "start_char_pos": 207, "end_char_pos": 254}, {"type": "D", "before": "Spokesperson for the", "after": null, "start_char_pos": 255, "end_char_pos": 275}, {"type": "A", "before": null, "after": "spokeswoman", "start_char_pos": 300, "end_char_pos": 300}, {"type": "R", "before": "said", "after": ", stated that", "start_char_pos": 316, "end_char_pos": 320}, {"type": "R", "before": "were passengers", "after": "passengers,", "start_char_pos": 365, "end_char_pos": 380}, {"type": "D", "before": "were drivers.", "after": null, "start_char_pos": 389, "end_char_pos": 402}, {"type": "R", "before": "In", "after": "drivers.", "start_char_pos": 403, "end_char_pos": 405}, {"type": "R", "before": "the vehicle population in South Africaincreased by 477,205 to 7,951,076 vehicles with the number of new drivers increasing by", "after": "saw the number of vehicles on South Africa's roads rise by nearly half a million to just under eight million with", "start_char_pos": 411, "end_char_pos": 536}, {"type": "R", "before": "to 7,490,333.", "after": "new drivers adding to the dangers on the country's roads.", "start_char_pos": 545, "end_char_pos": 558}, {"type": "R", "before": "w:Thailand. All except South Korea have vastly", "after": "Thailand. However, except for South Korea these countries have significantly", "start_char_pos": 642, "end_char_pos": 688}, {"type": "R", "before": "country with the most road related deaths is China with", "after": "worst country in the world for deaths in road traffic accidents, is currently accepted to be China. Figures released for 2002 reveal that", "start_char_pos": 713, "end_char_pos": 768}, {"type": "R", "before": "dying on their roads in 2002.", "after": "were killed in that year.", "start_char_pos": 784, "end_char_pos": 813}, {"type": "R", "before": "2001, when", "after": "2001. At that time", "start_char_pos": 879, "end_char_pos": 889}, {"type": "A", "before": null, "after": ",", "start_char_pos": 934, "end_char_pos": 934}, {"type": "D", "before": "Category: South Africa Category: Trans", "after": null, "start_char_pos": 1008, "end_char_pos": 1046}], "sents_char_pos": [0, 116, 191, 254, 402, 558, 653, 708, 813, 1007]}
+{"doc_id": "31434", "revision_depth": "1", "before_revision": "Samuel A. Alito Jr. After several weeks of at times contentious deliberation in the , the United States Senate confirmed Judge , Jr. to the Supreme Court with 58 votes in favor and 42 against. Only one , of Rhode Island, voted against confirmation. Four , including former of West Virginia, voted for confirmation. Alito was sworn-in later in the day. With the Bush Administration facing poor approval ratings following the withdrawal of Miers, Senate Democrats put forth a strong offensive to the confirmation of Alito. They questioned Alito extensively of his record on abortion, exercise of executive authority, his opinions on various legal issues while studying at and his membership in the group there. Following the Judiciary Committee's party-line vote approving Alito, efforts were spearheaded by ranking Judiciary Committee member Sen. ( -MA ) and Sen. (-MA ) to filibuster Alito's confirmation. However, the motion to end debate on Alito ended with a 72-25 cloture vote; Senate Minority Leader Harry Reid ( -NV ) acknowledged that a filibuster was not a realistic option to stop Alito's confirmation. Alito is the second judge to be appointed and confirmed to the Supreme Court by President Bush. His first appointee, Judge , was confirmed by the Senate in the autumn of 2005. Following the death of Chief Justice , Roberts was immediately selected to fill Rehnquist's post. Alito earned a bachelor's degree in law from Princeton University, and did his graduate work at . Most of his bench experience has come at the , where he has served as a justice since 1990, when President George H.W. Bush nominated him for the post. He follows current Supreme Court justice as the second Italian-American member of the high court. Senator (-NY ) told the AP that the United States would \"be better and stronger and more unified if we were confirming a different nominee, a nominee who could have united us more than divided us\". Senator ( -RI ) said he is concerned with Alito's \"philosophy of the Constitution [and] his great effort of many years to expand presidential power at a time when there are real serious questions about the powers the president has\". Senator (-PA ), chairman of the Senate Judiciary Committee, said there are no doubts about Alito's \"qualification in terms of education, professional career and his service on the court of appeals.\" Related News ", "after_revision": "Samuel A. Alito Jr. After several weeks of at times contentious deliberation in the , the United States Senate confirmed Judge Samuel A. Alito , Jr. to the Supreme Court with 58 votes in favor and 42 against. Only one Republican , of Rhode Island, voted against confirmation. Four Democrats , including former of West Virginia, voted for confirmation. Alito was sworn-in later in the day. With the Bush Administration facing poor approval ratings following the withdrawal of Miers, Senate Democrats put forth a strong offensive to the confirmation of Alito. They questioned Alito extensively of his record on abortion, exercise of executive authority, his opinions on various legal issues while studying at Princeton University and his membership in the group there. Following the Judiciary Committee's party-line vote approving Alito, efforts were spearheaded by ranking Judiciary Committee member Sen. ( D-MA ) and Sen. John F. Kerry (D-MA ) to filibuster Alito's confirmation. However, the motion to end debate on Alito ended with a 72-25 cloture vote; Senate Minority Leader Harry Reid ( D-NV ) acknowledged that a filibuster was not a realistic option to stop Alito's confirmation. Alito is the second judge to be appointed and confirmed to the Supreme Court by President Bush. His first appointee, Judge John Roberts , was confirmed by the Senate in the autumn of 2005. Following the death of Chief Justice William Rehnquist , Roberts was immediately selected to fill Rehnquist's post. Alito earned a bachelor's degree in law from Princeton University, and did his graduate work at . Most of his bench experience has come at the , where he has served as a justice since 1990, when President George H.W. Bush nominated him for the post. He follows current Supreme Court justice Antonin Scalia as the second Italian-American member of the high court. Senator Charles Schumer (D-NY ) told the AP that the United States would \"be better and stronger and more unified if we were confirming a different nominee, a nominee who could have united us more than divided us\". Senator ( D-RI ) said he is concerned with Alito's \"philosophy of the Constitution [and] his great effort of many years to expand presidential power at a time when there are real serious questions about the powers the president has\". Senator Arlen Specter (R-PA ), chairman of the Senate Judiciary Committee, said there are no doubts about Alito's \"qualification in terms of education, professional career and his service on the court of appeals.\" Related News Sister links", "edit_actions": [{"type": "A", "before": null, "after": "Samuel A. Alito", "start_char_pos": 127, "end_char_pos": 127}, {"type": "A", "before": null, "after": "Republican", "start_char_pos": 203, "end_char_pos": 203}, {"type": "A", "before": null, "after": "Democrats", "start_char_pos": 256, "end_char_pos": 256}, {"type": "A", "before": null, "after": "Princeton University", "start_char_pos": 673, "end_char_pos": 673}, {"type": "R", "before": "-MA", "after": "D-MA", "start_char_pos": 852, "end_char_pos": 855}, {"type": "R", "before": "(-MA", "after": "John F. Kerry (D-MA", "start_char_pos": 867, "end_char_pos": 871}, {"type": "R", "before": "-NV", "after": "D-NV", "start_char_pos": 1022, "end_char_pos": 1025}, {"type": "A", "before": null, "after": "John Roberts", "start_char_pos": 1239, "end_char_pos": 1239}, {"type": "A", "before": null, "after": "William Rehnquist", "start_char_pos": 1330, "end_char_pos": 1330}, {"type": "A", "before": null, "after": "Antonin Scalia", "start_char_pos": 1683, "end_char_pos": 1683}, {"type": "R", "before": "(-NY", "after": "Charles Schumer (D-NY", "start_char_pos": 1749, "end_char_pos": 1753}, {"type": "R", "before": "-RI", "after": "D-RI", "start_char_pos": 1949, "end_char_pos": 1952}, {"type": "R", "before": "(-PA", "after": "Arlen Specter (R-PA", "start_char_pos": 2180, "end_char_pos": 2184}, {"type": "A", "before": null, "after": "Sister links", "start_char_pos": 2384, "end_char_pos": 2384}], "sents_char_pos": [0, 193, 250, 317, 354, 523, 712, 909, 985, 1115, 1211, 1292, 1391, 1641, 1740, 1938, 2171]}
+{"doc_id": "31627", "revision_depth": "1", "before_revision": "Wikinews Australia coverage January 18 40 Asylum seekers missing off Torres Strait More than 40 asylum seekers are missing after fleeing the Indonesian province of Papua, bound for Australia. Coastwatch is searching the Torres Strait for the 25m boat. Four children are among the 43 people believed to be on board. The 25-metre traditional boat is believed to have left the port of Merauke, Papua, on Friday headed for Australia's Cape York peninsula. Convenor of the Australia West Papua Association Louise Byrne says the group included some of Papua's leading independence advocates. She said they were forced to undertake the journey by boat because the usual means of escaping Papua \u2013 crossing the border into Papua New Guinea \u2013 had become increasingly difficult.%DIFDELCMD < %DIFDELCMD < %%% Missing asylum seekers found off Cape York Australia's coastwatch has found a missing boat which with more than 40 passengers after it had left Indonesia's Papua province, reportedly bound for Australia. Initial reports say the vessel has been spotted off Cape York, three days after it was reported missing. The Australia West Papua Association (AWPA) says the boat was carrying people who left for security reasons as a campaign against Indonesian rule of the Melanesian province continues. Any application for possible asylum can only be submitted to the Australian authorities if they reach the Australian mainland. Australia operates a detention centre in Nauru to process people intercepted at sea while trying to reach Australia illegally. January 19%DIFDELCMD < %DIFDELCMD < %%% West Papua refugees sent to Australia's Christmas Island Detention Centre A group of 43 West Papuan asylum seekers found on Cape York were herded on to an RAAF Hercules and flown to Australia's Christmas Island Detention Centre on Thursday. The Immigration Department says the single men in the group will be detained in the remote facility, and the six women and seven children will be accommodated in staff housing. The group left the Papuan port town of Merauke on Friday in an outrigger canoe and landed on Tuesday at Janey Creek, north of the Mapoon Aboriginal community on western Cape York, without being detected. January 27%DIFDELCMD < %DIFDELCMD < %%% West Papuans refugees forced to fly 4000ks despite tuberculosis fears West Papuan asylum seekers who arrived in Australia last week, were forced to make a 4000 kilometre journey to Christmas Island despite suspicions they had tuberculosis. The West Papuans were herded on to an RAAF Hercules last week and flown to Christmas Island. Two of the group, a man and his child, have now been flown the 2,600 kilometres to Perth, Western Australia from the remote Indian Ocean island. Air force personnel had initially refused to fly them, concerned that the flight crew's health would be at risk. January 31%DIFDELCMD < %DIFDELCMD < %%% West Papuan refugees may face death if deported Refugee rights advocates and Australian Parliamentarians on Christmas Island have expressed alarm at the Indonesian Government's direct request to Prime Minister John Howard for the return of 43 Papuan refugees, who arrived on Cape York by boat on January 18th. Rob Wesley-Smith from Australians for a Free West Papua said the asylum seekers escaped because their lives were threatened, and would certainly face death if forced to return. Indonesian President Suslio Bambang Yudhoyono has assured Mr Howard that the group will not be prosecuted if they are returned. February 3, 2006%DIFDELCMD < %DIFDELCMD < %%% Indonesia warns Australia over West Papuan asylum seekers Indonesia's ambassador to Australia has warned that relations between the two neighbors could be \"strained\" if the Howard Government grants political asylum to a group of refugees from the troubled Indonesian province of West Papua... March 25, 2006 42 West Papuan asylum seekers get temporary Australian visas The Australian government has granted temporary visas to 42 West Papuan asylum seekers. The group accuse the Indonesian military of \"conducting genocide in their homeland.\" The 36 adults and seven children spent five days at sea in a traditional outrigger boat before arriving in far north Queensland's Cape York in January. They have been since been detained under Australia's Mandatory Detention policy.%DIFDELCMD < %DIFDELCMD < %%% April 5, 2006 Six Papuans reported camping on Australian island ''The Australian government has received reports that a family of six people from the Indonesian province of West Papua are camping on Bamboo Island in the Torres Strait. The Australian customs service is trying to verify the accuracy of the reports. It is believed that the group consists of a union activist, his wife and four children. One of the children is believed to be two months old", "after_revision": " %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% this old manhe played onenkckn", "edit_actions": [{"type": "D", "before": "Wikinews Australia coverage", "after": null, "start_char_pos": 0, "end_char_pos": 27}, {"type": "D", "before": "January 18 40 Asylum seekers missing off Torres Strait More than 40 asylum seekers are missing after fleeing the Indonesian province of Papua, bound for Australia. Coastwatch is searching the Torres Strait for the 25m boat. Four children are among the 43 people believed to be on board. The 25-metre traditional boat is believed to have left the port of Merauke, Papua, on Friday headed for Australia's Cape York peninsula. Convenor of the Australia West Papua Association Louise Byrne says the group included some of Papua's leading independence advocates. She said they were forced to undertake the journey by boat because the usual means of escaping Papua \u2013 crossing the border into Papua New Guinea \u2013 had become increasingly difficult.", "after": null, "start_char_pos": 28, "end_char_pos": 767}, {"type": "D", "before": "Missing asylum seekers found off Cape York Australia's coastwatch has found a missing boat which with more than 40 passengers after it had left Indonesia's Papua province, reportedly bound for Australia. Initial reports say the vessel has been spotted off Cape York, three days after it was reported missing. The Australia West Papua Association (AWPA) says the boat was carrying people who left for security reasons as a campaign against Indonesian rule of the Melanesian province continues. Any application for possible asylum can only be submitted to the Australian authorities if they reach the Australian mainland. Australia operates a detention centre in Nauru to process people intercepted at sea while trying to reach Australia illegally.", "after": null, "start_char_pos": 797, "end_char_pos": 1543}, {"type": "D", "before": "January 19", "after": null, "start_char_pos": 1544, "end_char_pos": 1554}, {"type": "D", "before": "West Papua refugees sent to Australia's Christmas Island Detention Centre A group of 43 West Papuan asylum seekers found on Cape York were herded on to an RAAF Hercules and flown to Australia's Christmas Island Detention Centre on Thursday. The Immigration Department says the single men in the group will be detained in the remote facility, and the six women and seven children will be accommodated in staff housing. The group left the Papuan port town of Merauke on Friday in an outrigger canoe and landed on Tuesday at Janey Creek, north of the Mapoon Aboriginal community on western Cape York, without being detected.", "after": null, "start_char_pos": 1584, "end_char_pos": 2205}, {"type": "D", "before": "January 27", "after": null, "start_char_pos": 2206, "end_char_pos": 2216}, {"type": "D", "before": "West Papuans refugees forced to fly 4000ks despite tuberculosis fears West Papuan asylum seekers who arrived in Australia last week, were forced to make a 4000 kilometre journey to Christmas Island despite suspicions they had tuberculosis. The West Papuans were herded on to an RAAF Hercules last week and flown to Christmas Island. Two of the group, a man and his child, have now been flown the 2,600 kilometres to Perth, Western Australia from the remote Indian Ocean island. Air force personnel had initially refused to fly them, concerned that the flight crew's health would be at risk.", "after": null, "start_char_pos": 2246, "end_char_pos": 2836}, {"type": "D", "before": "January 31", "after": null, "start_char_pos": 2837, "end_char_pos": 2847}, {"type": "D", "before": "West Papuan refugees may face death if deported Refugee rights advocates and Australian Parliamentarians on Christmas Island have expressed alarm at the Indonesian Government's direct request to Prime Minister John Howard for the return of 43 Papuan refugees, who arrived on Cape York by boat on January 18th. Rob Wesley-Smith from Australians for a Free West Papua said the asylum seekers escaped because their lives were threatened, and would certainly face death if forced to return. Indonesian President Suslio Bambang Yudhoyono has assured Mr Howard that the group will not be prosecuted if they are returned.", "after": null, "start_char_pos": 2877, "end_char_pos": 3491}, {"type": "D", "before": "February 3, 2006", "after": null, "start_char_pos": 3492, "end_char_pos": 3508}, {"type": "D", "before": "Indonesia warns Australia over West Papuan asylum seekers Indonesia's ambassador to Australia has warned that relations between the two neighbors could be \"strained\" if the Howard Government grants political asylum to a group of refugees from the troubled Indonesian province of West Papua...", "after": null, "start_char_pos": 3538, "end_char_pos": 3830}, {"type": "D", "before": "March 25, 2006 42 West Papuan asylum seekers get temporary Australian visas The Australian government has granted temporary visas to 42 West Papuan asylum seekers. The group accuse the Indonesian military of \"conducting genocide in their homeland.\" The 36 adults and seven children spent five days at sea in a traditional outrigger boat before arriving in far north Queensland's Cape York in January. They have been since been detained under Australia's Mandatory Detention policy.", "after": null, "start_char_pos": 3831, "end_char_pos": 4312}, {"type": "R", "before": "April 5, 2006 Six Papuans reported camping on Australian island ''The Australian government has received reports that a family of six people from the Indonesian province of West Papua are camping on Bamboo Island in the Torres Strait. The Australian customs service is trying to verify the accuracy of the reports. It is believed that the group consists of a union activist, his wife and four children. One of the children is believed to be two months old", "after": "this old manhe played onenkckn", "start_char_pos": 4342, "end_char_pos": 4797}], "sents_char_pos": [0, 191, 251, 314, 451, 585, 767, 1000, 1105, 1289, 1416, 1543, 1824, 2001, 2205, 2485, 2578, 2723, 2836, 3186, 3363, 3491, 3830, 3994, 4079, 4231, 4312, 4576, 4656, 4744]}
+{"doc_id": "34327", "revision_depth": "1", "before_revision": "400px|A Republican rioter throws a traffic cone at garda\u00ed (Policemen) in Dublin. An Garda S\u00edoch\u00e1na have regained control in Dublin, Ireland following riots in which a Republican counter-demonstration against Loyalist marches in the city descended into violence that engulfed the city centre. Shops on some of Dublin's major thoroughfares including O'Connell Street, Nassau Street and Kildare Street were closed as the Garda Riot Squad moved in from Grafton Street , and hundreds of shoppers were caught up in the disturbance. 40 protesters have been arrested, and 14 people have been hospitalised, including RT\u00c9 News main correspondent Charlie Bird , and six garda\u00ed. 13 of the arrested will be dealt with tonight during a special sitting of Dublin District Court. The riots, which have been described as the worst that Dublin has seen in a quarter of a century, broke out at 12.45 pm. About 1,000 Loyalist protestors, including members of the Orange Order , had travelled from Northern Ireland in order to march from Parnell Street down to Leinster House (the seat of the Irish parliament ) on Kildare Street. Political figures, led by President of Ireland Mary McAleese , and including leaders of major political parties from across Ireland's political spectrum such as Fianna F\u00e1il, Fine Gael, the Democratic Unionist Party , the Irish Labour Party, Sinn F\u00e9in and the Social Democratic Labour Party have condemned the violence. Taoiseach Bertie Ahern has commented that \"It is the essence of Irish democracy and republicanism that people are allowed to express their views freely and in a peaceful manner. People who want only to attack garda\u00ed and property have no respect for their fellow citizens.\" Unionist politicians due to participate in the rally, including Democratic Unionist Party MP Jeffrey Donaldson and Ulster Unionist deputy leader Danny Kennedy , have issued a complaint to the Irish Minister for Justice Michael McDowell , who has admitted that An Garda S\u00edoch\u00e1na were not expecting the level of hostility that was realised. Mr McDowell has also commented that the riots were perpetrated by people who did not understand what Irish republicanism means and who have damaged the cause of Irish unity that they purported to support. Republican Sinn F\u00e9in , a party which split from the main body of Sinn F\u00e9in in 1986 and which had been involved in the organisation of the counter-demonstration, have declared that it was irresponsible for the authorities to allow the marches to go ahead. It is believed that around \u20ac50,000 will be necessary to clear up and repair the damage caused to O'Connell Street, Dublin's main thoroughfare, and the street will remain closed until tomorrow. It is feared that the riots will have a significant impact on the Northern Ireland peace process , and on plans by the Irish government to recommence annual commemorations of the 1916 Easter Rising .", "after_revision": "400px|A Republican rioter throws a traffic cone at garda\u00ed (Policemen) in Dublin. have regained control in Dublin, Ireland following riots in which a counter-demonstration against marches in the city descended into violence that engulfed the city centre. Shops on some of Dublin's major thoroughfares including , and were closed as the Garda Riot Squad moved in from , and hundreds of shoppers were caught up in the disturbance. 40 protesters have been arrested, and 14 people have been hospitalised, including main correspondent , and six garda\u00ed. 13 of the arrested will be dealt with tonight during a special sitting of Dublin District Court. The riots, which have been described as the worst that Dublin has seen in a quarter of a century, broke out at 12.45 pm. About 1,000 Loyalist protestors, including members of the , had travelled from Northern Ireland in order to march from Parnell Street down to (the seat of the ) on Kildare Street. Political figures, led by , and including leaders of major political parties from across Ireland's political spectrum such as , , the , the Irish , and the have condemned the violence. has commented that \"It is the essence of Irish democracy and republicanism that people are allowed to express their views freely and in a peaceful manner. People who want only to attack garda\u00ed and property have no respect for their fellow citizens.\" politicians due to participate in the rally, including and deputy leader , have issued a complaint to the , who has admitted that An Garda S\u00edoch\u00e1na were not expecting the level of hostility that was realised. Mr McDowell has also commented that the riots were perpetrated by people who did not understand what Irish republicanism means and who have damaged the cause of Irish unity that they purported to support. , a party which split from the main body of Sinn F\u00e9in in 1986 and which had been involved in the organisation of the counter-demonstration, have declared that it was irresponsible for the authorities to allow the marches to go ahead. It is believed that around \u20ac50,000 will be necessary to clear up and repair the damage caused to O'Connell Street, Dublin's main thoroughfare, and the street will remain closed until tomorrow. It is feared that the riots will have a significant impact on the , and on plans by the Irish government to recommence annual commemorations of the 1916 .", "edit_actions": [{"type": "D", "before": "An Garda S\u00edoch\u00e1na", "after": null, "start_char_pos": 81, "end_char_pos": 98}, {"type": "D", "before": "Republican", "after": null, "start_char_pos": 167, "end_char_pos": 177}, {"type": "D", "before": "Loyalist", "after": null, "start_char_pos": 208, "end_char_pos": 216}, {"type": "R", "before": "O'Connell Street, Nassau Street and Kildare Street", "after": ", and", "start_char_pos": 348, "end_char_pos": 398}, {"type": "D", "before": "Grafton Street", "after": null, "start_char_pos": 449, "end_char_pos": 463}, {"type": "R", "before": "RT\u00c9 News main correspondent Charlie Bird", "after": "main correspondent", "start_char_pos": 608, "end_char_pos": 648}, {"type": "D", "before": "Orange Order", "after": null, "start_char_pos": 943, "end_char_pos": 955}, {"type": "D", "before": "Leinster House", "after": null, "start_char_pos": 1040, "end_char_pos": 1054}, {"type": "D", "before": "Irish parliament", "after": null, "start_char_pos": 1072, "end_char_pos": 1088}, {"type": "D", "before": "President of Ireland Mary McAleese", "after": null, "start_char_pos": 1136, "end_char_pos": 1170}, {"type": "D", "before": "Fianna F\u00e1il, Fine Gael, the Democratic Unionist Party", "after": null, "start_char_pos": 1271, "end_char_pos": 1324}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1327, "end_char_pos": 1327}, {"type": "A", "before": null, "after": ", the", "start_char_pos": 1332, "end_char_pos": 1332}, {"type": "R", "before": "Labour Party, Sinn F\u00e9in and the Social Democratic Labour Party", "after": ", and the", "start_char_pos": 1339, "end_char_pos": 1401}, {"type": "D", "before": "Taoiseach Bertie Ahern", "after": null, "start_char_pos": 1431, "end_char_pos": 1453}, {"type": "D", "before": "Unionist", "after": null, "start_char_pos": 1704, "end_char_pos": 1712}, {"type": "R", "before": "Democratic Unionist Party MP Jeffrey Donaldson and Ulster Unionist deputy leader Danny Kennedy", "after": "and deputy leader", "start_char_pos": 1768, "end_char_pos": 1862}, {"type": "D", "before": "Irish Minister for Justice Michael McDowell", "after": null, "start_char_pos": 1896, "end_char_pos": 1939}, {"type": "D", "before": "Republican Sinn F\u00e9in", "after": null, "start_char_pos": 2248, "end_char_pos": 2268}, {"type": "D", "before": "Northern Ireland peace process", "after": null, "start_char_pos": 2762, "end_char_pos": 2792}, {"type": "D", "before": "Easter Rising", "after": null, "start_char_pos": 2880, "end_char_pos": 2893}], "sents_char_pos": [0, 80, 291, 525, 666, 763, 884, 1109, 1430, 1608, 1703, 2042, 2247, 2502, 2695]}
+{"doc_id": "34645", "revision_depth": "1", "before_revision": "This is in stark contradiction to public statements made by the Bush administration who blamed much of the insurgency on \" loyalists of the Saddam regime who seek to regain power \" or \" foreigners who have traveled to Iraq to spread fear and chaos \" and insisted as late as Ma 2005 that the insurgency is \" in the last throes \" . \"Frankly, senior officials simply weren't ready to pay attention to analysis that didn't conform to their own optimistic scenarios,\" Hutchings told Knight Ridder Newspapers .", "after_revision": "This is in stark contrast to public statements made by the Bush administration . In his November 1 radio address President Bush said \" Some of the killers behind these attacks are loyalists of the Saddam regime who seek to regain power and who resent Iraq's new freedoms. Others are foreigners who have traveled to Iraq to spread fear and chaos . ... The terrorists and the Baathists hope to weaken our will. Our will cannot be shaken.\" In a May 2005 interview Vice President Cheney said \" I think they're in the last throes , if you will, of the insurgency. \" Accoding to Robert Hutchings, the chairman of the National Intelligence Council from 2003 to 2005, and now diplomat in residence at Princeton University's Woodrow Wilson School of Public and International Affairs, there was a \"steady stream\" of intelligence reports warning Bush and his administration that the insurgency was intensifying and expanding, including a major study, called a National Intelligence Estimate, which was completed in October 2003. Hutchings said that from early 2003 on the intelligence reports reflected that there were \"signs of incipient civil war\" . \"Frankly, senior officials simply weren't ready to pay attention to analysis that didn't conform to their own optimistic scenarios,\" Hutchings told Knight Ridder . The office of Director of National Intelligence John Negroponte declined Tuesday to comment for the Knight Ridder article .", "edit_actions": [{"type": "R", "before": "contradiction", "after": "contrast", "start_char_pos": 17, "end_char_pos": 30}, {"type": "R", "before": "who blamed much of the insurgency on", "after": ". In his November 1 radio address President Bush said", "start_char_pos": 84, "end_char_pos": 120}, {"type": "A", "before": null, "after": "Some of the killers behind these attacks are", "start_char_pos": 123, "end_char_pos": 123}, {"type": "R", "before": "\" or \"", "after": "and who resent Iraq's new freedoms. Others are", "start_char_pos": 180, "end_char_pos": 186}, {"type": "R", "before": "\" and insisted as late as Ma", "after": ". ... The terrorists and the Baathists hope to weaken our will. Our will cannot be shaken.\"", "start_char_pos": 249, "end_char_pos": 277}, {"type": "A", "before": null, "after": "In a May", "start_char_pos": 278, "end_char_pos": 278}, {"type": "R", "before": "that the insurgency is", "after": "interview Vice President Cheney said", "start_char_pos": 284, "end_char_pos": 306}, {"type": "A", "before": null, "after": "I think they're", "start_char_pos": 309, "end_char_pos": 309}, {"type": "A", "before": null, "after": ", if you will, of the insurgency.", "start_char_pos": 329, "end_char_pos": 329}, {"type": "A", "before": null, "after": "Accoding to Robert Hutchings, the chairman of the National Intelligence Council from 2003 to 2005, and now diplomat in residence at Princeton University's Woodrow Wilson School of Public and International Affairs, there was a \"steady stream\" of intelligence reports warning Bush and his administration that the insurgency was intensifying and expanding, including a major study, called a National Intelligence Estimate, which was completed in October 2003.", "start_char_pos": 332, "end_char_pos": 332}, {"type": "A", "before": null, "after": "Hutchings said that from early 2003 on the intelligence reports reflected that there were \"signs of incipient civil war\"", "start_char_pos": 333, "end_char_pos": 333}, {"type": "R", "before": "Newspapers", "after": ".", "start_char_pos": 498, "end_char_pos": 508}, {"type": "A", "before": null, "after": "The office of Director of National Intelligence John Negroponte declined Tuesday to comment for the Knight Ridder article", "start_char_pos": 509, "end_char_pos": 509}], "sents_char_pos": [0, 468]}
+{"doc_id": "34664", "revision_depth": "2", "before_revision": "In an unanimous vote, the City of Buffalo's Planning Board voted to table the Elmwood Village hotel Proposal, postponing voting on legislation for up to thirty days. However, Evelyn Bencinich, a resident of Granger Place and whose house would be located directly behind the hotel said, \"My property value will be depreciated or non-existant because no one is going to want to live behind a multi-story hotel. We are facing up to a year of noisey and dangerous demolition and construction. Children, pets and even drunk rebellers could wander on site and get hurt. Traffic tie-ups caused by large machinery and garbage bins is inevitable. Where will pedestrians walk? We could experience increased unsanitary flooding in our yards and basements due to the digging and cementing for the underground parking garage. Rats will be displaced into the immediate neighborhoods and be in great abundance. Onced we get past the year of nightmare construction, what if you build it and they don't come? We could ultimately have a seven million dollar rooming house on our corner.\" At one point Board member Susan Curran Hoyt said, \"we know you've cut down your number of rooms on this project, but we still see it doesn't seem to fit the desciption of a 'botique' hotel,\" and asked Eva Hassett, Vice President of Savarino Construction, \"we wonder if you could reduce the rooms further.\" \"One thing I didn't talk about was the price levels of these rooms and that will be important to know. The room rate will be somewhere between one-hundered and twenty and one-hundred and sixty dollars a night which is about the same price of the Hampton Inn down town and the smaller you make the hotel, the more expensive the rooms will get. We believe that we've made a good compromise in terms of the size of the hotel and perhaps botique means different things to different people,\" said Hassett. \"We are exploring several possibilites with respect to additional parking for valet and parking near-by,\" replied Hassett. \"We are also exploring the possibility of using the rear of 1105 Elmwood for additional parking, which would give us an additional ten or eleven spaces.\" The new design has a total of fifty five parking spaces for seventy-two rooms, with thirty-nine of them underground and the rest on ground level. Hassett also said that a \"parking study\" will be done on the area. __NOTOC__ Although this is the old proposal, the new design will still be the same amount of distance from the property. Concerns that the second floor of the hotel will be too close to the property of 605 Forest were also brought up. The board asked how far the hotel would be from the property and Karl Frizlen replied saying it would \"be approximately five feet from the property line,\" but he also admitted that, \"I do not know exactly how close the house next door\" will be from the hotel, but did say \"I think the house is about four or five feet away from the property line and we [the hotel] sit right on the property line.\" Common Council also tables hotel proposal The city 's Common Council also agreed to table the proposal also citing the need for more public engagement and the need for more organizations to respond including the Buffalo Preservation Board and the Office of Historic Preservation. The The common Council is expected to meet and hold a public hearing about the project and the rezoning of the properties to be demolished (1119-1121 Elmwood) on Tuesday March 7, 2006 at 2: 00p .m. in Council Chambers at City Hall. At the moment the properties are not zoned for a hotel. Related Wikinews External Links Citywide Design and Site Plan, Article XXVIII(PDF). These are the guidelines that any proposed development in the Elmwood Village should follow before development, during and after.%DIFDELCMD < %DIFDELCMD < %%% Category:Economy and business Category:North America Category:United States Category:New York Category:Buffalo, New Yor", "after_revision": "In an unanimous vote, the City of Buffalo's Planning Board voted to table the Elmwood Village hotel Proposal, postponing voting on legislation for up to 30 days. However, Evelyn Bencinich, a resident of Granger Place and whose house would be located directly behind the hotel said, \"My property value will be depreciated or non-existent because no one is going to want to live behind a multi-story hotel. We are facing up to a year of noisy and dangerous demolition and construction. Children, pets and even drunk rebellers could wander on site and get hurt. Traffic tie-ups caused by large machinery and garbage bins is inevitable. Where will pedestrians walk? We could experience increased unsanitary flooding in our yards and basements due to the digging and cementing for the underground parking garage. Rats will be displaced into the immediate neighborhoods and be in great abundance. Once we get past the year of nightmare construction, what if you build it and they don't come? We could ultimately have a seven million dollar rooming house on our corner.\" At one point Board member Susan Curran Hoyt said, \"we know you've cut down your number of rooms on this project, but we still see it doesn't seem to fit the description of a 'botique' hotel,\" and asked Eva Hassett, Vice President of Savarino Construction, \"we wonder if you could reduce the rooms further.\" \"One thing I didn't talk about was the price levels of these rooms and that will be important to know. The room rate will be somewhere between US$120 and $160 a night, which is about the same price of the Hampton Inn down town and the smaller you make the hotel, the more expensive the rooms will get. We believe that we've made a good compromise in terms of the size of the hotel and perhaps botique means different things to different people,\" said Hassett. \"We are exploring several possibilities with respect to additional parking for valet and parking near-by,\" replied Hassett. \"We are also exploring the possibility of using the rear of 1105 Elmwood for additional parking, which would give us an additional ten or eleven spaces.\" The new design has a total of 55 parking spaces for 72 rooms, with 39 of them underground and the rest on ground level. Although this is the old proposal, the new design will still be the same amount of distance from the property. Hassett also said that a \"parking study\" will be done on the area. Concerns that the second floor of the hotel will be too close to the property of 605 Forest were also brought up. The board asked how far the hotel would be from the property and Karl Frizlen replied saying it would \"be approximately five feet from the property line,\" but he also admitted that, \"I do not know exactly how close the house next door\" will be from the hotel, but did say \"I think the house is about four or five feet away from the property line and we [the hotel] sit right on the property line.\" Common Council also tables hotel proposal The City 's Common Council also agreed to table the proposal also citing the need for more public engagement and the need for more organizations to respond including the Buffalo Preservation Board and the Office of Historic Preservation. The Common Council is expected to meet and hold a public hearing about the project and the rezoning of the properties to be demolished (1119-1121 Elmwood) on Tuesday March 7, 2006 at 2: 00 p .m. in Council Chambers at City Hall. At the moment the properties are not zoned for a hotel. Related %DIFDELCMD < %DIFDELCMD < %%% news", "edit_actions": [{"type": "R", "before": "thirty", "after": "30", "start_char_pos": 153, "end_char_pos": 159}, {"type": "R", "before": "non-existant", "after": "non-existent", "start_char_pos": 328, "end_char_pos": 340}, {"type": "R", "before": "noisey", "after": "noisy", "start_char_pos": 439, "end_char_pos": 445}, {"type": "R", "before": "Onced", "after": "Once", "start_char_pos": 896, "end_char_pos": 901}, {"type": "R", "before": "desciption", "after": "description", "start_char_pos": 1227, "end_char_pos": 1237}, {"type": "R", "before": "one-hundered and twenty and one-hundred and sixty dollars a night", "after": "US$120 and $160 a night,", "start_char_pos": 1519, "end_char_pos": 1584}, {"type": "R", "before": "possibilites", "after": "possibilities", "start_char_pos": 1903, "end_char_pos": 1915}, {"type": "R", "before": "fifty five", "after": "55", "start_char_pos": 2184, "end_char_pos": 2194}, {"type": "R", "before": "seventy-two", "after": "72", "start_char_pos": 2214, "end_char_pos": 2225}, {"type": "R", "before": "thirty-nine", "after": "39", "start_char_pos": 2238, "end_char_pos": 2249}, {"type": "D", "before": "Hassett also said that a \"parking study\" will be done on the area. __NOTOC__", "after": null, "start_char_pos": 2300, "end_char_pos": 2376}, {"type": "A", "before": null, "after": "Hassett also said that a \"parking study\" will be done on the area.", "start_char_pos": 2488, "end_char_pos": 2488}, {"type": "R", "before": "city", "after": "City", "start_char_pos": 3047, "end_char_pos": 3051}, {"type": "R", "before": "The common", "after": "Common", "start_char_pos": 3285, "end_char_pos": 3295}, {"type": "R", "before": "00p", "after": "00 p", "start_char_pos": 3471, "end_char_pos": 3474}, {"type": "D", "before": "Wikinews", "after": null, "start_char_pos": 3577, "end_char_pos": 3585}, {"type": "D", "before": "External Links Citywide Design and Site Plan, Article XXVIII(PDF). These are the guidelines that any proposed development in the Elmwood Village should follow before development, during and after.", "after": null, "start_char_pos": 3586, "end_char_pos": 3782}, {"type": "R", "before": "Category:Economy and business Category:North America Category:United States Category:New York Category:Buffalo, New Yor", "after": "news", "start_char_pos": 3812, "end_char_pos": 3931}], "sents_char_pos": [0, 165, 408, 488, 563, 637, 666, 812, 895, 991, 1069, 1478, 1718, 1876, 1999, 2153, 2299, 2366, 2487, 2602, 3000, 3280, 3512, 3568, 3652, 3782]}
+{"doc_id": "34691", "revision_depth": "1", "before_revision": "An amateur sex video allegedly filmed in Singapore using a mobile phone has become an Internet phenomenon. Various blogs are reporting that tens of thousands of Internet users are searching for the video, creating what bloggers call a \"blogstorm\". According to unconfirmed reports, the female in the video is \"Tammy\", a 17 year old student at Nanyang Polytechnic (NYP)in Singapore, and the male is her 21 year old boyfriend. The incident has stirred controversy, with many bloggers critical of the interest the video has attracted. Terms such as \"tammy nyp\" and \"tammy video\" topped the list of search terms on Technorati, a blog search engine, for days. Bloggers appear to be creating entries containing the terms to increase hits to their blogs. Domain names such as nyptammy.com have been registered, in an attempt to make money through advertising. Further, The Malaysian Star (A major newspaper in a neighbouring country, Malaysia) reported last week that a DVD version of the clips is available for sale on the streets of Penang. It has been reported in the Singapore Press that the female student in the video is currently undergoing counselling. The student has also lodged a complaint with the Police, who are currently investigating the matter. While it is unlikely that the culprits who uploaded the video will ever be caught, a warning must be sounded to people seeking to exploit this unfortunate incident. Under Singapore Law, bloggers who intentionally spread the \"Tammy videos\" are liable in tort to \"Tammy\" . ", "after_revision": "Surah 99. The Earthquake 1. When the earth is shaken to her (utmost) convulsion, 2. And the earth throws up her burdens (from within), 3. And man cries (distressed): 'What is the matter with her?'- 4. On that Day will she declare her tidings: 5. For that thy Lord will have given her inspiration. 6. On that Day will men proceed in companies sorted out, to be shown the deeds that they (had done). 7. Then shall anyone who has done an atom's weight of good, see it! 8. And anyone who has done an atom's weight of evil, shall see it. Surah 109. The Disbelievers, Atheists 1. Say : O ye that reject Faith! 2. I worship not that which ye worship, 3. Nor will ye worship that which I worship . 4. And I will not worship that which ye have been wont to worship, 5. Nor will ye worship that which I worship. 6. To you be your Way, and to mine", "edit_actions": [{"type": "R", "before": "An amateur sex video allegedly filmed in Singapore using a mobile phone has become an Internet phenomenon. Various blogs are reporting that tens of thousands of Internet users are searching for the video, creating what bloggers call a \"blogstorm\". According to unconfirmed reports, the female in the video is \"Tammy\", a 17 year old student at Nanyang Polytechnic (NYP)in Singapore, and the male is her 21 year old boyfriend. The incident has stirred controversy, with many bloggers critical of the interest the video has attracted.", "after": "Surah 99. The Earthquake", "start_char_pos": 0, "end_char_pos": 531}, {"type": "R", "before": "Terms such as \"tammy nyp\" and \"tammy video\" topped the list of search terms on Technorati, a blog search engine, for days. Bloggers appear to be creating entries containing the terms to increase hits to their blogs. Domain names such as nyptammy.com have been registered, in an attempt to make money through advertising. Further, The Malaysian Star (A major newspaper in a neighbouring country, Malaysia) reported last week that a DVD version of the clips is available for sale on the streets of Penang.", "after": "1. When the earth is shaken to her (utmost) convulsion,", "start_char_pos": 532, "end_char_pos": 1035}, {"type": "R", "before": "It has been reported in the Singapore Press that the female student in the video is currently undergoing counselling. The student has also lodged a complaint with the Police, who are currently investigating the matter.", "after": "2. And the earth throws up her burdens (from within),", "start_char_pos": 1036, "end_char_pos": 1254}, {"type": "R", "before": "While it is unlikely that the culprits who uploaded the video will ever be caught, a warning must be sounded to people seeking to exploit this unfortunate incident. Under Singapore Law, bloggers who intentionally spread the \"Tammy videos\" are liable in tort to \"Tammy\"", "after": "3. And man cries (distressed): 'What is the matter with her?'-", "start_char_pos": 1255, "end_char_pos": 1523}, {"type": "A", "before": null, "after": "4. On that Day will she declare her tidings:", "start_char_pos": 1524, "end_char_pos": 1524}, {"type": "A", "before": null, "after": "5. For that thy Lord will have given her inspiration.", "start_char_pos": 1525, "end_char_pos": 1525}, {"type": "A", "before": null, "after": "6. On that Day will men proceed in companies sorted out, to be shown the deeds that they (had done).", "start_char_pos": 1526, "end_char_pos": 1526}, {"type": "A", "before": null, "after": "7. Then shall anyone who has done an atom's weight of good, see it!", "start_char_pos": 1527, "end_char_pos": 1527}, {"type": "A", "before": null, "after": "8. And anyone who has done an atom's weight of evil, shall see it.", "start_char_pos": 1528, "end_char_pos": 1528}, {"type": "A", "before": null, "after": "Surah 109. The Disbelievers, Atheists", "start_char_pos": 1529, "end_char_pos": 1529}, {"type": "A", "before": null, "after": "1. Say : O ye that reject Faith!", "start_char_pos": 1530, "end_char_pos": 1530}, {"type": "A", "before": null, "after": "2. I worship not that which ye worship,", "start_char_pos": 1531, "end_char_pos": 1531}, {"type": "A", "before": null, "after": "3. Nor will ye worship that which I worship", "start_char_pos": 1532, "end_char_pos": 1532}, {"type": "A", "before": null, "after": "4. And I will not worship that which ye have been wont to worship,", "start_char_pos": 1535, "end_char_pos": 1535}, {"type": "A", "before": null, "after": "5. Nor will ye worship that which I worship.", "start_char_pos": 1536, "end_char_pos": 1536}, {"type": "A", "before": null, "after": "6. To you be your Way, and to mine", "start_char_pos": 1537, "end_char_pos": 1537}], "sents_char_pos": [0, 106, 247, 424, 531, 654, 747, 852, 1035, 1153, 1254, 1419]}
+{"doc_id": "37256", "revision_depth": "2", "before_revision": "Rev. Mary Magdalen (Rachel Bevilacqua) of the Church of the SubGenius, a postmodern or parody religion , lost custody of her child in February of 2006, seemingly due to her involvement with the church. Church members are touting the judge's response to her involvement with the church together with his decision as religious discrimination, and the ACLU is examining the situation. Judge James Punch ( Orleans County ) allegedly denied custody of the child her son out of anger, after seeing videos of Rev. Magdalen in a bondage \"dress\" and papier mach\u00e9 goat\u2019s head at the church's X-Day celebration and performance art piece. Judge Punch repeatedly asked, \"Why a goat? What\u2019s so significant about a goat\u2019s head?\" When Rev. Magdalen replied, \"I just thought the word 'goat' was funny,\" the court then pressed her to explain how her actions were funny, finally concluding with the statement, \"Obviously there's nothing funny in those pictures.\" Rev. Magdalen has been a major figure in the Church of the SubGenius since 1997 when she and her son moved to Dallas, Texas to be with her fianc\u00e9 Rev . Jesus (Steve Bevilacqua) and help keep the for-profit church afloat. The church members traditionally consider the for-profit arm to have \"religious significance\", due in part to the church's intentional parody of Scientology and New Age religions , and the church declares itself to be \"the only religion that is proud to pay its taxes.\" The Bevilacquas relocated to Columbus in 2004. Religions or deities engaging in satire , such as the Church of the SubGenius, Discordianism, the Invisible Pink Unicorn , and the Flying Spaghetti Monster , have become significantly more widespread through the internet. However, the Church of the SubGenius is relatively old, dating to 1979, and gained much of its current popularity through its published books, including the Book of the SubGenius , and its Hour of Slack radio program. Discordianism is even older, dating to 1958 or 1959, and has strongly influenced modern non-satirical neopagan religions. Such religions are now generally termed \"postmodern\" instead of \"parody\", as their followers frequently insist the religion is as real and valid as any other religion, but often accept the postmodernist critique of religious metanarratives. Rev. Magdalen's case has been profiled on a number of popular blogs and Internet sites, including Boing Boing and Fark . External links Rachel Bevilacqua's Blog entry Summary of Rev. Magdalen's case, with updates TV news story on the case, March 26th, 2006 boingboing article on the case, 3, 20,'06%DIFDELCMD < %DIFDELCMD < %%% Related links Rachel Bevilacqua's blog containing court documents filed against her, and the custody ruling Affidavits filed by Rachel Bevilacqua in her defense Court transcript of Rachel Bevilacqua's testimony on Feb. 3, 2006 Copy of the judge's order The Office Pulpit of Rev. Ivan Stang Notice from the Church of the SubGenius MetaFilter discussion Judge James Punch judicial directory entry", "after_revision": "Rev. Mary Magdalen (Rachel Bevilacqua) of the , a or , lost custody of her child in February of 2006, seemingly due to her involvement with the church. Church members are touting the judge's response to her involvement with the church together with his decision as religious discrimination, and the is examining the situation. Judge James Punch ( ) allegedly denied custody of the child her son out of anger, after seeing videos of Rev. Magdalen in a bondage \"dress\" and papier mach\u00e9 goat\u2019s head at the church's and piece. Judge Punch repeatedly asked, \"Why a goat? What\u2019s so significant about a goat\u2019s head?\" When Rev. Magdalen replied, \"I just thought the word 'goat' was funny,\" the court then pressed her to explain how her actions were funny, finally concluding with the statement, \"Obviously there's nothing funny in those pictures.\" Rev. Magdalen has been a major figure in the Church of the SubGenius since 1997 when she and her son moved to Dallas, Texas to be with her fianc\u00e9 Rev . Jesus (Steve Bevilacqua) and help keep the for-profit church afloat. The church members traditionally consider the for-profit arm to have \"religious significance\", due in part to the church's intentional parody of and , and the church declares itself to be \"the only religion that is proud to pay its taxes.\" The Bevilacquas relocated to in 2004. Religions or deities engaging in , such as the Church of the SubGenius, Discordianism, the , and the , have become significantly more widespread through the internet. However, the Church of the SubGenius is relatively old, dating to 1979, and gained much of its current popularity through its published books, including the , and its radio program. Discordianism is even older, dating to 1958 or 1959, and has strongly influenced modern non-satirical neopagan religions. Such religions are now generally termed \"postmodern\" instead of \"parody\", as their followers frequently insist the religion is as real and valid as any other religion, but often accept the postmodernist critique of religious metanarratives. Rev. Magdalen's case has been profiled on a number of popular blogs and Internet sites, including and . %DIFDELCMD < %DIFDELCMD < %%% Sister links", "edit_actions": [{"type": "D", "before": "Church of the SubGenius, a postmodern or parody religion", "after": null, "start_char_pos": 46, "end_char_pos": 102}, {"type": "A", "before": null, "after": "a or ,", "start_char_pos": 105, "end_char_pos": 105}, {"type": "D", "before": "ACLU", "after": null, "start_char_pos": 350, "end_char_pos": 354}, {"type": "D", "before": "Orleans County", "after": null, "start_char_pos": 403, "end_char_pos": 417}, {"type": "R", "before": "X-Day celebration and performance art", "after": "and", "start_char_pos": 583, "end_char_pos": 620}, {"type": "R", "before": "Scientology and New Age religions", "after": "and", "start_char_pos": 1311, "end_char_pos": 1344}, {"type": "D", "before": "Columbus", "after": null, "start_char_pos": 1465, "end_char_pos": 1473}, {"type": "D", "before": "satire", "after": null, "start_char_pos": 1516, "end_char_pos": 1522}, {"type": "D", "before": "Invisible Pink Unicorn", "after": null, "start_char_pos": 1581, "end_char_pos": 1603}, {"type": "D", "before": "Flying Spaghetti Monster", "after": null, "start_char_pos": 1614, "end_char_pos": 1638}, {"type": "D", "before": "Book of the SubGenius", "after": null, "start_char_pos": 1862, "end_char_pos": 1883}, {"type": "D", "before": "Hour of Slack", "after": null, "start_char_pos": 1894, "end_char_pos": 1907}, {"type": "R", "before": "Boing Boing and Fark", "after": "and", "start_char_pos": 2384, "end_char_pos": 2404}, {"type": "D", "before": "External links", "after": null, "start_char_pos": 2407, "end_char_pos": 2421}, {"type": "D", "before": "Rachel Bevilacqua's Blog entry Summary of Rev. Magdalen's case, with updates TV news story on the case, March 26th, 2006 boingboing article on the case, 3, 20,'06", "after": null, "start_char_pos": 2422, "end_char_pos": 2584}, {"type": "R", "before": "Related links Rachel Bevilacqua's blog containing court documents filed against her, and the custody ruling Affidavits filed by Rachel Bevilacqua in her defense Court transcript of Rachel Bevilacqua's testimony on Feb. 3, 2006 Copy of the judge's order The Office Pulpit of Rev. Ivan Stang Notice from the Church of the SubGenius MetaFilter discussion Judge James Punch judicial directory entry", "after": "Sister links", "start_char_pos": 2614, "end_char_pos": 3008}], "sents_char_pos": [0, 202, 382, 627, 670, 714, 1165, 1435, 1482, 1704, 1922, 2044, 2285, 2373, 2485, 2525]}
+{"doc_id": "37496", "revision_depth": "1", "before_revision": "Fighting words were exchanged in the Australian House of Representatives over the matter of the division of Medicare safety net payments per electorate. The Minister for Health and Ageing Tony Abbott ( Liberal, Warringah ) had introduced a policy that the Government would pay Medicare users up to a fixed amount \u2014 the safety net \u2014 to help in addressing \"gaps\" in certain payments which Medicare would not cover, such as certain hospital payments. The Opposition was opposed to the idea on efficacy counts. Abbott was asked a Dorothy Dixer in Question Time today about the benefits of the safety net. He alleged that criticism by the Opposition Health spokeswoman Julia Gillard ( Labor, Lalor ) that the safety net favoured Liberal/ National Party coalition electorates was misleading as it was a Labor electorate, Grayndler that received the \"highest safety net benefits per electorate\". This led Gillard to make a personal explanation after Question Time, stating that \"the top four electorates receiving money under the Medicare safety net are Wentworth, North Sydney, Bradfield and Warringah \" -- all coalition electorates. The Leader of the Opposition, Kim Beazley (Labor, Brand ), put a question to the Speaker of the House, David Hawker (Liberal, Wannon ) asking of the Speaker his \"assurance that no person is being deliberately misled by the actions of any other person\". The matter was not further raised at the time, but after the Matter of Public Importance debate, Gillard moved a motion to suspend standing orders which would prevent Abbott from explaining his earlier claim \"when this claim is totally untrue\", to correct the \"grossly inaccurate and misleading statement\", to \"apologise to all Members in this place\" and to \"apologize to the Member for Grayndler and his constituents\". Gillard also listed the amounts of payments \"released by the Minister himself\", that Wentworth received $7.8 million, North Sydney received $7.5 million, Bradfield received $6.9 million, Warringah received $6.3 million; whereas Grayndler received only $3.6 million. She attempted to debate the motion but a gag motion to silence Gillard was moved and won because of Government numbers. Anthony Albanese, the Labor member for Grayndler attempted to second the motion but the gag was moved on him as well. The final vote on the motion was lost 55 to 79.", "after_revision": " were exchanged in the Australian House of Representatives over the matter of the division of safety net payments per electorate. The Minister for Health and Ageing Tony Abbott ( , ) had introduced a policy that the Government would pay Medicare users up to a fixed amount \u2014 the safety net \u2014 to help in addressing \"gaps\" in certain payments which Medicare would not cover, such as certain hospital payments. The Opposition was opposed to the idea on efficacy counts. Abbott was asked a in today about the benefits of the safety net. He alleged that criticism by the Opposition Health spokeswoman Julia Gillard ( , ) that the safety net favoured Liberal/ coalition electorates was misleading as it was a Labor electorate, that received the \"highest safety net benefits per electorate\". This led Gillard to make a personal explanation after Question Time, stating that \"the top four electorates receiving money under the Medicare safety net are , , and \" \u2014 all coalition electorates. The Leader of the Opposition, (, ), put a question to the , (, ) asking of the Speaker his \"assurance that no person is being deliberately misled by the actions of any other person\". The matter was not further raised at the time, but after the Matter of Public Importance debate, Gillard moved a motion to suspend standing orders which would prevent Abbott from explaining his earlier claim \"when this claim is totally untrue\", to correct the \"grossly inaccurate and misleading statement\", to \"apologise to all Members in this place\" and to \"apologize to the Member for Grayndler and his constituents\". Gillard also listed the amounts of payments \"released by the Minister himself\", that Wentworth received $7.8 million, North Sydney received $7.5 million, Bradfield received $6.9 million, Warringah received $6.3 million; whereas Grayndler received only $3.6 million. She attempted to debate the motion but a gag motion to silence Gillard was moved and won because of Government numbers. Anthony Albanese, the member for Grayndler attempted to second the motion but the gag was moved on him as well. The final vote on the motion was lost 55 to 79.", "edit_actions": [{"type": "D", "before": "Fighting words", "after": null, "start_char_pos": 0, "end_char_pos": 14}, {"type": "D", "before": "Medicare", "after": null, "start_char_pos": 108, "end_char_pos": 116}, {"type": "R", "before": "Liberal, Warringah", "after": ",", "start_char_pos": 202, "end_char_pos": 220}, {"type": "R", "before": "Dorothy Dixer in Question Time", "after": "in", "start_char_pos": 526, "end_char_pos": 556}, {"type": "R", "before": "Labor, Lalor", "after": ",", "start_char_pos": 680, "end_char_pos": 692}, {"type": "D", "before": "National Party", "after": null, "start_char_pos": 733, "end_char_pos": 747}, {"type": "D", "before": "Grayndler", "after": null, "start_char_pos": 815, "end_char_pos": 824}, {"type": "R", "before": "Wentworth, North Sydney, Bradfield and Warringah", "after": ", , and", "start_char_pos": 1047, "end_char_pos": 1095}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 1098, "end_char_pos": 1100}, {"type": "R", "before": "Kim Beazley (Labor, Brand", "after": "(,", "start_char_pos": 1158, "end_char_pos": 1183}, {"type": "R", "before": "Speaker of the House, David Hawker (Liberal, Wannon", "after": ", (,", "start_char_pos": 1209, "end_char_pos": 1260}, {"type": "D", "before": "Labor", "after": null, "start_char_pos": 2209, "end_char_pos": 2214}], "sents_char_pos": [0, 152, 447, 506, 600, 888, 1127, 1380, 1800, 2020, 2066, 2186, 2304]}
+{"doc_id": "37780", "revision_depth": "1", "before_revision": "222px|RTL \u00dcbertragungswagen in Dresdener Altstadt Not only the citizens of the affected cities of the high water leading rivers in Germany have sleepless nights \u2013 as the flood means work for TV and radio stations as well. At 04:00 UTC , the river Elbe had a level of 7.36 meters, with the water still rising. Besides RTL, several other news agencies have also positioned themselves at critical points , in order to provide TV and radio consumers with information. The media vehicles can be found at spots along the river , where something unusual might happenor where effords are made to protect cultural assets of the city. Equipped with satellite uplinks, video editing and other means to make the filmed clips ready for broadcasting, RTL has positioned itself near the \"Radeberger Schankwirtschaft\" at the Br\u00fchlsche Terrassen. Helpers there have tried for the past few days to keep the water away from the restaurant, using a dam of sandbags. This article is translated original reporting . de:Bearbeiten von Fernsehsender beobachten die Fl", "after_revision": "222px|RTL \u00dcbertragungswagen in Dresdener Altstadt Not only do the citizens of the cities near rivers with rising water in Germany have sleepness nights - the flood also means more work for TV and radio stations as well. At 04:00 UTC the river Elbe had risen to a level of 7.36 meters, with the river continuing to rise. RTL, a local news agency, along with several other agencies have positioned themselves at critical points along the river in order to provide TV and radio users with information. The media can be found at these critical points along the river where they expect something unusual to happen, or where efforts are being made to protect cultural assests of the city. Equipped with satellite uplinks, video editing tools, and other means to make the filmed clips ready for broadcasting, RTL has positioned itself near the \"Radeberger Schankwirtschaft\" at the Br\u00fchlsche Terrassen. Helpers there have tried for the past few days to keep the water away from the restaurant, using a dam of sandbags. This article is translated original reporting from German Wikinews de:Bearbeiten von Fernsehsender beobachten die Fl", "edit_actions": [{"type": "R", "before": "Not only", "after": "Not only do", "start_char_pos": 50, "end_char_pos": 58}, {"type": "R", "before": "affected cities of the high water leading rivers", "after": "cities near rivers with rising water", "start_char_pos": 79, "end_char_pos": 127}, {"type": "R", "before": "sleepless nights \u2013 as the flood means", "after": "sleepness nights - the flood also means more", "start_char_pos": 144, "end_char_pos": 181}, {"type": "D", "before": ",", "after": null, "start_char_pos": 235, "end_char_pos": 236}, {"type": "A", "before": null, "after": "risen to", "start_char_pos": 256, "end_char_pos": 256}, {"type": "R", "before": "water still rising. Besides RTL, several other news agencies have also", "after": "river continuing to rise. RTL, a local news agency, along with several other agencies have", "start_char_pos": 290, "end_char_pos": 360}, {"type": "R", "before": ",", "after": "along the river", "start_char_pos": 402, "end_char_pos": 403}, {"type": "R", "before": "consumers", "after": "users", "start_char_pos": 437, "end_char_pos": 446}, {"type": "D", "before": "vehicles", "after": null, "start_char_pos": 475, "end_char_pos": 483}, {"type": "R", "before": "spots", "after": "these critical points", "start_char_pos": 500, "end_char_pos": 505}, {"type": "D", "before": ", where something unusual might happenor", "after": null, "start_char_pos": 522, "end_char_pos": 562}, {"type": "R", "before": "effords are", "after": "they expect something unusual to happen, or where efforts are being", "start_char_pos": 569, "end_char_pos": 580}, {"type": "R", "before": "assets", "after": "assests", "start_char_pos": 606, "end_char_pos": 612}, {"type": "A", "before": null, "after": "tools,", "start_char_pos": 673, "end_char_pos": 673}, {"type": "R", "before": ".", "after": "from German Wikinews", "start_char_pos": 994, "end_char_pos": 995}], "sents_char_pos": [0, 221, 309, 464, 625, 831, 947]}
+{"doc_id": "37874", "revision_depth": "1", "before_revision": "On Friday, Judge Robert Simpson Jr. threw out a petition challenge that was brought by Jane Faust against Patrick Murphy, a candidate for the 8th Congressional District in Pennsylvania. Josh Nanberg, the campaign manager for Murphy's campaign stated, \"We won.\" The case centered around objection's to Murphy's nominating papers. In this instance, the judge threw the case out due to a part of the law which states that any objections must be raised at least seven days prior to the court case , so as to allow the defendent time to collect evidence. The objections that were brought to the court were brought the day of the trial , as opposed to seven days previously . Jen Paski, a spokeswomen for the Democratic Congressional Campaign Committee had this to say: \u201cWe were very distressed by this challenge and we are absolutely thrilled that it failed.\" The lawyer , who filed the challenge on behalf of Jane Faust has stated that he will continue the case, and will attempt to bring it to the state Supreme Court.", "after_revision": "On Friday, Judge Robert Simpson Jr. threw out a petition challenge brought by Jane Faust against Patrick Murphy, a candidate for the 8th Congressional District in Pennsylvania. Josh Nanberg, Murphy's campaign manager, stated, \"We won.\" The case centered on objections to Murphy's nominating papers. The judge threw the case out due to a part of the law which requires that any objections must be raised at least seven days prior to the court case to allow the defendant time to collect evidence. The objections in this case were brought the day of the trial . Jen Paski, a spokeswoman for the Democratic Congressional Campaign Committee said, \u201cWe were very distressed by this challenge and we are absolutely thrilled that it failed.\" The lawyer who filed the challenge on behalf of Faust has stated that he will continue the case, and will attempt to bring it to the state Supreme Court.", "edit_actions": [{"type": "D", "before": "that was", "after": null, "start_char_pos": 67, "end_char_pos": 75}, {"type": "D", "before": "the campaign manager for", "after": null, "start_char_pos": 200, "end_char_pos": 224}, {"type": "A", "before": null, "after": "manager,", "start_char_pos": 243, "end_char_pos": 243}, {"type": "R", "before": "around objection's", "after": "on objections", "start_char_pos": 280, "end_char_pos": 298}, {"type": "R", "before": "In this instance, the", "after": "The", "start_char_pos": 330, "end_char_pos": 351}, {"type": "R", "before": "states", "after": "requires", "start_char_pos": 408, "end_char_pos": 414}, {"type": "D", "before": ", so as", "after": null, "start_char_pos": 494, "end_char_pos": 501}, {"type": "R", "before": "defendent", "after": "defendant", "start_char_pos": 515, "end_char_pos": 524}, {"type": "R", "before": "that were brought to the court were brought the", "after": "in this case were brought the", "start_char_pos": 566, "end_char_pos": 613}, {"type": "D", "before": ", as opposed to seven days previously", "after": null, "start_char_pos": 631, "end_char_pos": 668}, {"type": "R", "before": "spokeswomen", "after": "spokeswoman", "start_char_pos": 684, "end_char_pos": 695}, {"type": "R", "before": "had this to say:", "after": "said,", "start_char_pos": 748, "end_char_pos": 764}, {"type": "D", "before": ",", "after": null, "start_char_pos": 867, "end_char_pos": 868}, {"type": "D", "before": "Jane", "after": null, "start_char_pos": 906, "end_char_pos": 910}], "sents_char_pos": [0, 185, 261, 329, 550, 855]}
+{"doc_id": "3850", "revision_depth": "1", "before_revision": "DARTS30px | TASTETESTR30px | E30px | A30px | R30px | A30px | D30px | S30px | HIMPULSE30px | THISTLEF30px | T30px | V30px | A30px | U30px | T30px | U30px | ITRIMESTER30px | ONAIRW30px | L30px | 30px | 30px | 30px | 30px | A30px | R30px | R30px | 30px | OVERSIGHT30px | IDYLLO30px | 30px | 30px | U30px | E30px | E30px | A30px | 30px | 30px | IDUCTS30px | SIDELINES30px | 30px | A30px | P30px | T30px | 30px | 30px | 30px | 30px | U30px | TDELHI30px | AVALANCHEU30px | O30px | C30px | T30px | B30px | L30px | L30px | NMARTINI30px | BELIEVEB30px | I30px | O30px | N30px | O30px | O30px | A30px | ROVERNIGHT30px |WORDS", "after_revision": "DARTS20px | TASTETESTR20px | E20px | A20px | R20px | A20px | D20px | S20px | HIMPULSE20px | THISTLEF20px | T20px | V20px | A20px | U20px | T20px | U20px | ITRIMESTER20px | ONAIRW20px | L20px | 20px | 20px | 20px | 20px | A20px | R20px | R20px | 20px | OVERSIGHT20px | IDYLLO20px | 20px | 20px | U20px | E20px | E20px | A20px | 20px | 20px | IDUCTS20px | SIDELINES20px | 20px | A20px | P20px | T20px | 20px | 20px | 20px | 20px | U20px | TDELHI20px | AVALANCHEU20px | O20px | C20px | T20px | B20px | L20px | L20px | NMARTINI20px | BELIEVEB20px | I20px | O20px | N20px | O20px | O20px | A20px | ROVERNIGHT20px |WORDS", "edit_actions": [{"type": "R", "before": "DARTS30px", "after": "DARTS20px", "start_char_pos": 0, "end_char_pos": 9}, {"type": "R", "before": "TASTETESTR30px", "after": "TASTETESTR20px", "start_char_pos": 12, "end_char_pos": 26}, {"type": "R", "before": "E30px", "after": "E20px", "start_char_pos": 29, "end_char_pos": 34}, {"type": "R", "before": "A30px", "after": "A20px", "start_char_pos": 37, "end_char_pos": 42}, {"type": "R", "before": "R30px", "after": "R20px", "start_char_pos": 45, "end_char_pos": 50}, {"type": "R", "before": "A30px", "after": "A20px", "start_char_pos": 53, "end_char_pos": 58}, {"type": "R", "before": "D30px", "after": "D20px", "start_char_pos": 61, "end_char_pos": 66}, {"type": "R", "before": "S30px", "after": "S20px", "start_char_pos": 69, "end_char_pos": 74}, {"type": "R", "before": "HIMPULSE30px", "after": "HIMPULSE20px", "start_char_pos": 77, "end_char_pos": 89}, {"type": "R", "before": "THISTLEF30px", "after": "THISTLEF20px", "start_char_pos": 92, "end_char_pos": 104}, {"type": "R", "before": "T30px", "after": "T20px", "start_char_pos": 107, "end_char_pos": 112}, {"type": "R", "before": "V30px", "after": "V20px", "start_char_pos": 115, "end_char_pos": 120}, {"type": "R", "before": "A30px", "after": "A20px", "start_char_pos": 123, "end_char_pos": 128}, {"type": "R", "before": "U30px", "after": "U20px", "start_char_pos": 131, "end_char_pos": 136}, {"type": "R", "before": "T30px", "after": "T20px", "start_char_pos": 139, "end_char_pos": 144}, {"type": "R", "before": "U30px", "after": "U20px", "start_char_pos": 147, "end_char_pos": 152}, {"type": "R", "before": "ITRIMESTER30px", "after": "ITRIMESTER20px", "start_char_pos": 155, "end_char_pos": 169}, {"type": "R", "before": "ONAIRW30px", "after": "ONAIRW20px", "start_char_pos": 172, "end_char_pos": 182}, {"type": "R", "before": "L30px", "after": "L20px", "start_char_pos": 185, "end_char_pos": 190}, {"type": "R", "before": "30px", "after": "20px", "start_char_pos": 193, "end_char_pos": 197}, {"type": "R", "before": "30px", "after": "20px", "start_char_pos": 200, "end_char_pos": 204}, {"type": "R", "before": "30px", "after": "20px", "start_char_pos": 207, "end_char_pos": 211}, {"type": "R", "before": "30px", "after": "20px", "start_char_pos": 214, "end_char_pos": 218}, {"type": "R", "before": "A30px", "after": "A20px", "start_char_pos": 221, "end_char_pos": 226}, {"type": "R", "before": "R30px", "after": "R20px", "start_char_pos": 229, "end_char_pos": 234}, {"type": "R", "before": "R30px", "after": "R20px", "start_char_pos": 237, "end_char_pos": 242}, {"type": "R", "before": "30px", "after": "20px", "start_char_pos": 245, "end_char_pos": 249}, {"type": "R", "before": "OVERSIGHT30px", "after": "OVERSIGHT20px", "start_char_pos": 252, "end_char_pos": 265}, {"type": "R", "before": "IDYLLO30px", "after": "IDYLLO20px", "start_char_pos": 268, "end_char_pos": 278}, {"type": "R", "before": "30px", "after": "20px", "start_char_pos": 281, "end_char_pos": 285}, {"type": "R", "before": "30px", "after": "20px", "start_char_pos": 288, "end_char_pos": 292}, {"type": "R", "before": "U30px", "after": "U20px", "start_char_pos": 295, "end_char_pos": 300}, {"type": "R", "before": "E30px", "after": "E20px", "start_char_pos": 303, "end_char_pos": 308}, {"type": "R", "before": "E30px", "after": "E20px", "start_char_pos": 311, "end_char_pos": 316}, {"type": "R", "before": "A30px", "after": "A20px", "start_char_pos": 319, "end_char_pos": 324}, {"type": "R", "before": "30px", "after": "20px", "start_char_pos": 327, "end_char_pos": 331}, {"type": "R", "before": "30px", "after": "20px", "start_char_pos": 334, "end_char_pos": 338}, {"type": "R", "before": "IDUCTS30px", "after": "IDUCTS20px", "start_char_pos": 341, "end_char_pos": 351}, {"type": "R", "before": "SIDELINES30px", "after": "SIDELINES20px", "start_char_pos": 354, "end_char_pos": 367}, {"type": "R", "before": "30px", "after": "20px", "start_char_pos": 370, "end_char_pos": 374}, {"type": "R", "before": "A30px", "after": "A20px", "start_char_pos": 377, "end_char_pos": 382}, {"type": "R", "before": "P30px", "after": "P20px", "start_char_pos": 385, "end_char_pos": 390}, {"type": "R", "before": "T30px", "after": "T20px", "start_char_pos": 393, "end_char_pos": 398}, {"type": "R", "before": "30px", "after": "20px", "start_char_pos": 401, "end_char_pos": 405}, {"type": "R", "before": "30px", "after": "20px", "start_char_pos": 408, "end_char_pos": 412}, {"type": "R", "before": "30px", "after": "20px", "start_char_pos": 415, "end_char_pos": 419}, {"type": "R", "before": "30px", "after": "20px", "start_char_pos": 422, "end_char_pos": 426}, {"type": "R", "before": "U30px", "after": "U20px", "start_char_pos": 429, "end_char_pos": 434}, {"type": "R", "before": "TDELHI30px", "after": "TDELHI20px", "start_char_pos": 437, "end_char_pos": 447}, {"type": "R", "before": "AVALANCHEU30px", "after": "AVALANCHEU20px", "start_char_pos": 450, "end_char_pos": 464}, {"type": "R", "before": "O30px", "after": "O20px", "start_char_pos": 467, "end_char_pos": 472}, {"type": "R", "before": "C30px", "after": "C20px", "start_char_pos": 475, "end_char_pos": 480}, {"type": "R", "before": "T30px", "after": "T20px", "start_char_pos": 483, "end_char_pos": 488}, {"type": "R", "before": "B30px", "after": "B20px", "start_char_pos": 491, "end_char_pos": 496}, {"type": "R", "before": "L30px", "after": "L20px", "start_char_pos": 499, "end_char_pos": 504}, {"type": "R", "before": "L30px", "after": "L20px", "start_char_pos": 507, "end_char_pos": 512}, {"type": "R", "before": "NMARTINI30px", "after": "NMARTINI20px", "start_char_pos": 515, "end_char_pos": 527}, {"type": "R", "before": "BELIEVEB30px", "after": "BELIEVEB20px", "start_char_pos": 530, "end_char_pos": 542}, {"type": "R", "before": "I30px", "after": "I20px", "start_char_pos": 545, "end_char_pos": 550}, {"type": "R", "before": "O30px", "after": "O20px", "start_char_pos": 553, "end_char_pos": 558}, {"type": "R", "before": "N30px", "after": "N20px", "start_char_pos": 561, "end_char_pos": 566}, {"type": "R", "before": "O30px", "after": "O20px", "start_char_pos": 569, "end_char_pos": 574}, {"type": "R", "before": "O30px", "after": "O20px", "start_char_pos": 577, "end_char_pos": 582}, {"type": "R", "before": "A30px", "after": "A20px", "start_char_pos": 585, "end_char_pos": 590}, {"type": "R", "before": "ROVERNIGHT30px", "after": "ROVERNIGHT20px", "start_char_pos": 593, "end_char_pos": 607}], "sents_char_pos": [0, 12, 27, 43, 59, 75, 90, 105, 121]}
+{"doc_id": "38743", "revision_depth": "1", "before_revision": "In the run up to the UK's May local elections, attention has again been drawn to the British National Party (BNP). Party spokesman and councillor candidate for the Fulham Broadway area of London Steven Tyler stated \"Now we are a party with sensible policies which have made us much more electable than in the past,\" The BNP local election manifesto of April 14 outlined the party \u2019 s commitment to environmental and tax reforms, with a focus on a zero-tolerance campaign against anti-social behaviour and the removal of what the BNP sees as preferential treatment of asylum seekers. The party has said it will field a total of 365 candidates for local authority seats in the May 4th elections. Currently the BNP has 15 councillors across England and stated at its campaign launch that it intends to add \"another 15 or 20\" seats. Research undertaken on behalf of The Joseph Rowntree Charitable Trust has indicated that up to 25\\% of people have said that \u201cthey might\u201d vote for the BNP. MPs from mainstream parties have admitted that they need to face the challenge presented by the BNP in the May 4th election. Conservative and Liberal Democrat members have suggested that disillusionment with the government is to blame for the current findings of the report. Former Conservative leader Iain Duncan Smith told BBC radio 4 \u2019s Today program that the BNPs message was gaining headway in disadvantaged areas and identified that \u201cWhat we have picked up in these very difficult communities is the collapse in the quality of life for so many people , \" Duncan Smith went on to say \"The whole sense of the quality of life in these communities has become a rich feeding ground for people who want to stigmatise others as being the cause of this.\" \"If voters are unhappy with conventional parties, one of the key reasons is because successive Tory and Labour governments have failed to provide enough affordable housing where families wish to live,\" commented Liberal Democrat Simon Hughes . He added that voters should not be taken in by the \u201csimplistic promises\u201d of the BNP.", "after_revision": "In the run up to the UK's May local elections, attention has again been drawn to the British National Party (BNP). Party spokesman and councillor candidate for the area of Steven Tyler stated \"Now we are a party with sensible policies which have made us much more electable than in the past,\" The BNP local election manifesto of April 14 outlined the party ' s commitment to environmental and tax reforms, with a focus on a zero-tolerance campaign against anti-social behaviour and the removal of what the BNP sees as preferential treatment of asylum seekers. The party has said it will field a total of 365 candidates for local authority seats in the May 4 elections. Currently the BNP has 15 councillors across England and stated at its campaign launch that it intends to add \"another 15 or 20\" seats. Research undertaken on behalf of has indicated that up to 25\\% of people have said that \"they might\" vote for the BNP. from mainstream parties have admitted that they need to face the challenge presented by the BNP in the May 4 election. and members have suggested that disillusionment with the government is to blame for the current findings of the report. Former Conservative leader Iain Duncan Smith told BBC radio 4 's program that the BNPs message was gaining headway in disadvantaged areas and identified that \u201cWhat we have picked up in these very difficult communities is the collapse in the quality of life for so many people \" . Duncan Smith went on to say , \"The whole sense of the quality of life in these communities has become a rich feeding ground for people who want to stigmatise others as being the cause of this.\" \"If voters are unhappy with conventional parties, one of the key reasons is because successive Tory and Labour governments have failed to provide enough affordable housing where families wish to live,\" commented Liberal Democrat . He added that voters should not be taken in by the \u201csimplistic promises\u201d of the BNP.", "edit_actions": [{"type": "R", "before": "Fulham Broadway area of London", "after": "area of", "start_char_pos": 164, "end_char_pos": 194}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 380, "end_char_pos": 381}, {"type": "R", "before": "4th", "after": "4", "start_char_pos": 679, "end_char_pos": 682}, {"type": "D", "before": "The Joseph Rowntree Charitable Trust", "after": null, "start_char_pos": 862, "end_char_pos": 898}, {"type": "R", "before": "\u201cthey might\u201d", "after": "\"they might\"", "start_char_pos": 954, "end_char_pos": 966}, {"type": "D", "before": "MPs", "after": null, "start_char_pos": 985, "end_char_pos": 988}, {"type": "R", "before": "4th", "after": "4", "start_char_pos": 1096, "end_char_pos": 1099}, {"type": "R", "before": "Conservative and Liberal Democrat", "after": "and", "start_char_pos": 1110, "end_char_pos": 1143}, {"type": "R", "before": "\u2019s Today", "after": "'s", "start_char_pos": 1322, "end_char_pos": 1330}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1542, "end_char_pos": 1543}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1546, "end_char_pos": 1546}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1575, "end_char_pos": 1575}, {"type": "D", "before": "Simon Hughes", "after": null, "start_char_pos": 1969, "end_char_pos": 1981}], "sents_char_pos": [0, 114, 582, 693, 828, 984, 1109, 1259, 1739, 1983]}
+{"doc_id": "41342", "revision_depth": "1", "before_revision": "right Luxembourg's largest steel company Arcelor is ready to study Mittal Steel's improved takeover offer, the former said on Sunday, opening the door to possible talks with Indian steel-magnate Laxminivas Mittal. Arcelor Chairman Joseph Kinsch told reporters after a meeting of Arcelor's board that the directors of the company would be ready to examine the details of Mittal's latest offer once it has been approved by the CSSF (Luxembourg's finiancial regulatory body). Until Sunday, Arcelor ( the world's second-largest steel company ) had firmly rejected world-leader Mittal's bid to take the former company over and form a global steel giant. The softening of its stance comes after Mittal Steel raised its hostile cash-and-equity bid by a third on Friday and dropped a key demand for family control over the combined global steel giant . Media-reports had suggested that Arcelor was trying to find another company to rescue the former from being taken over by Mittal Steel. Possible candidates have included Russian tycoon Vladimir Lisin and Russia's Magnitogorsk Iron & Steel Works (MMK). Mittal's move on Friday came after the value of its initial offer fell more than 10 per cent behind the market worth of Arcelor, as the latter announced a buyback of its own shares at above-market prices to ward off Mittal Steel. Laxminivas Mittal, who has hinted that the bitter takeover battle might have a hint of racism involved in it, told the French newspaper La Tribune that he was sure that the attractive nature of his revised offer would enable him to obtain over 50\\% of the Arcelor shares. He added that he was of the opinion that the involvement of a Russian third-party would not be in the best interests of Arcelor's shareholders.", "after_revision": "right Luxembourg's largest steel company Arcelor is ready to study Mittal Steel's improved takeover offer, the former said on Sunday, opening the door to possible talks with Indian steel magnate Laxminivas Mittal. Arcelor Chairman Joseph Kinsch told reporters after a meeting of Arcelor's board that the company's directors would be ready to examine the details of Mittal's latest offer once it has been approved by the CSSF (Luxembourg's financial regulatory body). Until Sunday, Arcelor , the world's second-largest steel company , had firmly rejected world-leader Mittal's bid to take the former company over and form a global steel giant. The softening of Arcelor's stance comes after Mittal Steel raised its hostile cash-and-equity bid by a third on Friday and dropped a key demand for family control over the combined entity . Media reports had suggested that Arcelor was trying to find another company to rescue it from being taken over by Mittal Steel. Possible candidates included Russian tycoon Vladimir Lisin and Russia's Magnitogorsk Iron & Steel Works (MMK). Mittal's move on Friday came after the value of its initial offer fell more than 10 percent behind the market worth of Arcelor, as the latter announced a buyback of its own shares at above-market prices to ward off Mittal Steel. Laxminivas Mittal, who has hinted that the bitter takeover battle might have a hint of racism involved in it, told the French newspaper La Tribune that he was sure that the attractive nature of his revised offer would enable him to obtain over 50\\% of the Arcelor shares. He added that he was of the opinion that the involvement of a Russian third party would not be in the best interests of Arcelor's shareholders.", "edit_actions": [{"type": "R", "before": "steel-magnate", "after": "steel magnate", "start_char_pos": 181, "end_char_pos": 194}, {"type": "R", "before": "directors of the company", "after": "company's directors", "start_char_pos": 304, "end_char_pos": 328}, {"type": "R", "before": "finiancial", "after": "financial", "start_char_pos": 444, "end_char_pos": 454}, {"type": "R", "before": "(", "after": ",", "start_char_pos": 495, "end_char_pos": 496}, {"type": "R", "before": ")", "after": ",", "start_char_pos": 538, "end_char_pos": 539}, {"type": "R", "before": "its", "after": "Arcelor's", "start_char_pos": 666, "end_char_pos": 669}, {"type": "R", "before": "global steel giant", "after": "entity", "start_char_pos": 824, "end_char_pos": 842}, {"type": "R", "before": "Media-reports", "after": "Media reports", "start_char_pos": 845, "end_char_pos": 858}, {"type": "R", "before": "the former", "after": "it", "start_char_pos": 931, "end_char_pos": 941}, {"type": "D", "before": "have", "after": null, "start_char_pos": 1001, "end_char_pos": 1005}, {"type": "R", "before": "per cent", "after": "percent", "start_char_pos": 1181, "end_char_pos": 1189}, {"type": "R", "before": "third-party", "after": "third party", "start_char_pos": 1669, "end_char_pos": 1680}], "sents_char_pos": [0, 213, 472, 648, 844, 980, 1096, 1326, 1598]}
+{"doc_id": "41827", "revision_depth": "1", "before_revision": "Fernando Alonso won the FIA Formula-1 Monaco Grand Prix for the first time in his career today. During Saturday's qualifying session, Michael Schumacher made a strange mistake in the La Rascasse corner, when he driver locked his car's wheels, bringing the vehicle to a halt and finished the race causing the drivers behind him to lose time on their fast laps. After a long investigation the FIA's stewards decided to cancel all his fast laps as a penalty for the unsporting behaviour displayed by him. Article 112 of the regulations, applied by FIA, prevents the F1 team Ferrari to appeal this decision. Thus, Schumacher and Felipe Massa, who crashed his car earlier in the qualification, were last on the starting grid. The Ferrari team decided to change the engine in both cars, because there was no more stringent penalty that could have been imposed on them. Michael started the race from the pit-lane . Alonso was in the lead for the most of the race. Kimi Raikkonen and Mark Webber, who were the only serious competitors to Alonso for the first part of the race, lost their cars (due to engine failure) almost simultaneously, one by one. After that Alonso drove to victory with little opposition from the other drivers . With a huge gap from the Spaniard , McLaren driver Juan-Pablo Montoya took second place.", "after_revision": "George Bush won the FIA Formula-1 USA Grand Prix for the first time in his career today. During MAY'S qualifying session, Michael Schumacher made a strange noise in the La Rascasse corner, when the driver locked his trucks wheels, bringing the vehicle to a halt and finished the race causing the drivers around him to lose time on their pathetic laps. After a long investigation the FIA's stewards decided to drink all his beer as a penalty for the unsporting behaviour displayed by him. Article 112 of the regulations, applied by FIA, prevents the F1 team Nissan to appeal this decision. Thus, Schumacher and Felipe Massa, who ate his car earlier in the qualification, were last on the starting grid. The Ferrari team decided to change the engine in both cars, because there was no more stringent penalty that could have been imposed on them. Michael started the race from the white house . Bush was in the lead for the most of the race. Kimi Raikkonen and Mark Webber, who were the only serious terrorists to Bush for the first part of the race, lost their cars (due to engine failure) almost simultaneously, one by one. After that Bush drove to Iraq with little opposition from the other clowns . With a huge gap from the idiot , McLaren driver Juan-Pablo Montoya took second place.", "edit_actions": [{"type": "R", "before": "Fernando Alonso", "after": "George Bush", "start_char_pos": 0, "end_char_pos": 15}, {"type": "R", "before": "Monaco", "after": "USA", "start_char_pos": 38, "end_char_pos": 44}, {"type": "R", "before": "Saturday's", "after": "MAY'S", "start_char_pos": 103, "end_char_pos": 113}, {"type": "R", "before": "mistake", "after": "noise", "start_char_pos": 168, "end_char_pos": 175}, {"type": "R", "before": "he", "after": "the", "start_char_pos": 208, "end_char_pos": 210}, {"type": "R", "before": "car's", "after": "trucks", "start_char_pos": 229, "end_char_pos": 234}, {"type": "R", "before": "behind", "after": "around", "start_char_pos": 316, "end_char_pos": 322}, {"type": "R", "before": "fast", "after": "pathetic", "start_char_pos": 349, "end_char_pos": 353}, {"type": "R", "before": "cancel all his fast laps", "after": "drink all his beer", "start_char_pos": 417, "end_char_pos": 441}, {"type": "R", "before": "Ferrari", "after": "Nissan", "start_char_pos": 571, "end_char_pos": 578}, {"type": "R", "before": "crashed", "after": "ate", "start_char_pos": 643, "end_char_pos": 650}, {"type": "R", "before": "pit-lane", "after": "white house", "start_char_pos": 897, "end_char_pos": 905}, {"type": "R", "before": "Alonso", "after": "Bush", "start_char_pos": 908, "end_char_pos": 914}, {"type": "R", "before": "competitors to Alonso", "after": "terrorists to Bush", "start_char_pos": 1015, "end_char_pos": 1036}, {"type": "R", "before": "Alonso drove to victory", "after": "Bush drove to Iraq", "start_char_pos": 1155, "end_char_pos": 1178}, {"type": "R", "before": "drivers", "after": "clowns", "start_char_pos": 1217, "end_char_pos": 1224}, {"type": "R", "before": "Spaniard", "after": "idiot", "start_char_pos": 1252, "end_char_pos": 1260}], "sents_char_pos": [0, 95, 359, 501, 603, 720, 862, 907, 956, 1143, 1226]}
+{"doc_id": "41883", "revision_depth": "2", "before_revision": "If you've always wanted to live in a world populated by elves, dwarves and wizards, you don't need to pay for a World of Warcraft subscription or buy the Special Extended DVD Trilogy Edition of The Lord of the Rings just yet. You could instead give Battle for Wesnoth a try \u2014 an open source turn-based strategy game in a fantasy setting. For the practically minded, \"open-source\" means that the code which the game is made of is available to anyone who wishes to use, redistribute or change it. It was created by volunteers and can be freely shared. Even the multiplayer online part of the game is free (no ads or spyware either). The game is reminiscent of turn-based strategy classics such as Heroes of Might and Magic or Warlords . Throughout each campaign, the player is informed of the progress of the story. For instance, in the \"Heir to the Throne\" campaign, the player follows the story of Prince Konrad, who must reclaim the throne of Wesnoth from an evil queen. Also, within the game itself, it's possible to directly download new campaigns from the Internet, many of which have been created by players. Do you think that, in essence, we are seeing the beginnings of applying \" wiki \" principles to game development? On one hand, I see the ability to directly download new campaigns as a mild convenience -- it wouldn't be much more difficult for the user to, for instance, go to a web page and download campaigns. I think that for an Open Source game, making it as easy as possible for users to contribute content is a key way to help make the game succeed. We have tried hard to do this in Wesnoth. I don't think that with something dynamic like a game, it's quite as easy to make absolutely anyone be able to edit it or contribute as easily as they can in a Wiki, but we have tried to make it as easy as possible. How do you moderate user-submitted content? Are there scenarios or graphics you have rejected because they crossed a line -- sexual content, excessive violence, etc.?Well, there are basically three levels of content acceptance: 'Official': content can be accepted into the game itself -- the content will reside in our SVN repository, and will be in the tarballs released by developers. 'Campaign Server': Content can be allowed on the campaign server (the server which users can connect to in-game to download more content). 'Disallowed': Finally, content can be disallowed on the campaign server, which means that the creator could only distribute it using their own channels (for instance, having a web site people could download it from). Our aim is to keep Wesnoth appropriate for users of any age and background -- of course, it contains some level of violence, but this is not depicted very explicitly, and only parents who do not want to expose their children to animated violence of any level need be concerned. For this reason, we also do not allow expletives on our forums or IRC channels.How do you feel about games like \" Second Life \", where players trade user-generated content for money?I've never understood the appeal of games like that. I don't enjoy cheating in games, and to me buying items with real money seems like cheating -- except worse, since it actually costs money.What changes to the game or gameplay do you anticipate in the coming months and years?Well, we've avoided making many gameplay changes at all, since very early on in Wesnoth's development. Wesnoth is meant to be a simple game, with simple gameplay, and 'changing' gameplay will probably lead to it being more complex. We want to keep it simple. Changes will probably focus on improving existing features, and making the engine a little more customizable. Enhancing the multiplayer component is big on the list -- we've progressively added more and more features on the server. We also want to add more graphical enhancement. For instance, a particle system to allow various combat effects.If you had unlimited resources at your disposal to improve the game, what would you change about it?Wesnoth was always designed to be a simple game, with simple goals. It has exceeded all the expectations I originally had for it. There is still some 'polishing' work going on, but really I don't think there is too much I would dramatically change. Probably the largest thing I can name is a much better AI than we currently have. I'm pretty happy with the AI developed for Wesnoth -- I think it's much better than AIs for most commercial games -- but it could be better. That's the only area of Wesnoth that I think could really be very dramatically improved. I am very happy with our graphics overall. I think our artists have done an excellent job of making the game look attractive without detracting from functionality. Adding 3D graphics, or changing the style of the 2D graphics would only be wasted effort in my mind -- I think we've achieved a great balance of making the game easy and clear, while making it look good. There are some enhancements to multiplayer I would like added -- multiplayer campaigns is a long-time feature request. As are more options and features on the multiplayer server. Overall though, if I had 'unlimited resources', I'd much rather develop an entirely new game. We don't have enough good Open Source games -- it's a waste to pour all the resources we have into one. :) Wesnoth has dwarves with guns, World of Warcraft'' has gnomes and goblins with explosives and flying machines -- where do you, personally, define the limits of the fantasy genre? Are there scenarios playing in a steampunk world, or ones with modern technology? Would you allow those?Actually we have Dwarves with 'Thundersticks' :) -- mysterious weapons that make a loud sound and do lots of damage, but are clumsy and unreliable. The developers do not comment on whether or not these 'thundersticks' are or are not like 'guns' on earth. We like to keep Wesnoth slightly mysterious, and leave some things up to the player's interpretation, rather than spell it out. We do have a vision for what the world of Wesnoth is like though -- and Wesnoth is a world of ancient-era weaponry, with a little magic. Of Elves and Dwarves and Orcs. Very much inspired by Tolkien. I actually originally chose this setting because my focus was on technical excellence -- writing a good, solid engine -- not on creating a new fantasy world. I decided to stick with a very well-known, proven theme, figuring I couldn't go wrong with it. I would prefer a civilization or perhaps colonization type game. FreeCiv is nice, though it's close to being a clone of Civilization II. I'd like an original game that had the same sort of theme as civilization, but with new and innovative rules.Every online game and community is also a social space. Have you met interesting people through Wesnoth whom you would not have met otherwise? Are there other stories you can tell from the community -- have there been real world meetups, chat rooms, etc.?I've come into contact with lots of very interesting people through Wesnoth, and have learned a great deal from them. The Wesnoth developers -- many of whom are from Europe -- used the LSM conference in France in 2004 as an opportunity to meet each other. Nekeme, an organization dedicated to developing and promotion Free games was kind enough to sponsor two developers to go. Unfortunately, I was not able to attend, but the developers who did had a very nice time. We have several IRC channels on irc.freenode.net, and the most popular ones -- #wesnoth and #wesnoth-dev are usually fairly busy with both discussion about Wesnoth, and friendly discussion of other topics. I'm afraid I haven't played many. I like RPGs, and I know lots of people love NetHack and similar games, but I much prefer party-based and generally more storyline-oriented RPGs. Probably the most promising Open Source game I've seen is GalaxyMage , but it still has a long way to go. Honestly, I don't play that many games. I like playing commercial RPGs, usually console-based, with my wife, and I occasionally like playing the commercial Civilization series. To play an Open Source game, it'd have to be very good, and appeal to my tastes, and I haven't found any Open Source games like that, sadly.", "after_revision": "If you've always wanted to live in a world populated by elves, dwarves and wizards, you don't need to pay for a subscription or buy the Special Extended DVD Trilogy Edition of just yet. You could instead give a try \u2014 an turn-based strategy game in a fantasy setting. For the practically minded, \"open-source\" means that the code which the game is made of is available to anyone who wishes to use, redistribute or change it. It was created by volunteers and can be freely shared. Even the multiplayer online part of the game is free (no ads or spyware either). The game is reminiscent of turn-based strategy classics such as or . Throughout each campaign, the player is informed of the progress of the story. For instance, in the \"Heir to the Throne\" campaign, the player follows the story of Prince Konrad, who must reclaim the throne of Wesnoth from an evil queen. Also, within the game itself, it's possible to directly download new campaigns from the Internet, many of which have been created by players. Do you think that, in essence, we are seeing the beginnings of applying \" \" principles to game development? On one hand, I see the ability to directly download new campaigns as a mild convenience \u2014 it wouldn't be much more difficult for the user to, for instance, go to a web page and download campaigns. I think that for an Open Source game, making it as easy as possible for users to contribute content is a key way to help make the game succeed. We have tried hard to do this in Wesnoth. I don't think that with something dynamic like a game, it's quite as easy to make absolutely anyone be able to edit it or contribute as easily as they can in a Wiki, but we have tried to make it as easy as possible. How do you moderate user-submitted content? Are there scenarios or graphics you have rejected because they crossed a line \u2014 sexual content, excessive violence, etc.?Well, there are basically three levels of content acceptance: 'Official': content can be accepted into the game itself \u2014 the content will reside in our SVN repository, and will be in the tarballs released by developers. 'Campaign Server': Content can be allowed on the campaign server (the server which users can connect to in-game to download more content). 'Disallowed': Finally, content can be disallowed on the campaign server, which means that the creator could only distribute it using their own channels (for instance, having a web site people could download it from). Our aim is to keep Wesnoth appropriate for users of any age and background \u2014 of course, it contains some level of violence, but this is not depicted very explicitly, and only parents who do not want to expose their children to animated violence of any level need be concerned. For this reason, we also do not allow expletives on our forums or IRC channels.How do you feel about games like \" \", where players trade user-generated content for money?I've never understood the appeal of games like that. I don't enjoy cheating in games, and to me buying items with real money seems like cheating \u2014 except worse, since it actually costs money.What changes to the game or gameplay do you anticipate in the coming months and years?Well, we've avoided making many gameplay changes at all, since very early on in Wesnoth's development. Wesnoth is meant to be a simple game, with simple gameplay, and 'changing' gameplay will probably lead to it being more complex. We want to keep it simple. Changes will probably focus on improving existing features, and making the engine a little more customizable. Enhancing the multiplayer component is big on the list \u2014 we've progressively added more and more features on the server. We also want to add more graphical enhancement. For instance, a particle system to allow various combat effects.If you had unlimited resources at your disposal to improve the game, what would you change about it?Wesnoth was always designed to be a simple game, with simple goals. It has exceeded all the expectations I originally had for it. There is still some 'polishing' work going on, but really I don't think there is too much I would dramatically change. Probably the largest thing I can name is a much better AI than we currently have. I'm pretty happy with the AI developed for Wesnoth \u2014 I think it's much better than AIs for most commercial games \u2014 but it could be better. That's the only area of Wesnoth that I think could really be very dramatically improved. I am very happy with our graphics overall. I think our artists have done an excellent job of making the game look attractive without detracting from functionality. Adding 3D graphics, or changing the style of the 2D graphics would only be wasted effort in my mind \u2014 I think we've achieved a great balance of making the game easy and clear, while making it look good. There are some enhancements to multiplayer I would like added \u2014 multiplayer campaigns is a long-time feature request. As are more options and features on the multiplayer server. Overall though, if I had 'unlimited resources', I'd much rather develop an entirely new game. We don't have enough good Open Source games \u2014 it's a waste to pour all the resources we have into one. :) Wesnoth has dwarves with guns, World of Warcraft'' has gnomes and goblins with explosives and flying machines \u2014 where do you, personally, define the limits of the fantasy genre? Are there scenarios playing in a steampunk world, or ones with modern technology? Would you allow those?Actually we have Dwarves with 'Thundersticks' :) \u2014 mysterious weapons that make a loud sound and do lots of damage, but are clumsy and unreliable. The developers do not comment on whether or not these 'thundersticks' are or are not like 'guns' on earth. We like to keep Wesnoth slightly mysterious, and leave some things up to the player's interpretation, rather than spell it out. We do have a vision for what the world of Wesnoth is like though \u2014 and Wesnoth is a world of ancient-era weaponry, with a little magic. Of Elves and Dwarves and Orcs. Very much inspired by Tolkien. I actually originally chose this setting because my focus was on technical excellence \u2014 writing a good, solid engine \u2014 not on creating a new fantasy world. I decided to stick with a very well-known, proven theme, figuring I couldn't go wrong with it. I would prefer a civilization or perhaps colonization type game. FreeCiv is nice, though it's close to being a clone of Civilization II. I'd like an original game that had the same sort of theme as civilization, but with new and innovative rules.Every online game and community is also a social space. Have you met interesting people through Wesnoth whom you would not have met otherwise? Are there other stories you can tell from the community \u2014 have there been real world meetups, chat rooms, etc.?I've come into contact with lots of very interesting people through Wesnoth, and have learned a great deal from them. The Wesnoth developers \u2014 many of whom are from Europe \u2014 used the LSM conference in France in 2004 as an opportunity to meet each other. Nekeme, an organization dedicated to developing and promotion Free games was kind enough to sponsor two developers to go. Unfortunately, I was not able to attend, but the developers who did had a very nice time. We have several IRC channels on irc.freenode.net, and the most popular ones \u2014 #wesnoth and #wesnoth-dev are usually fairly busy with both discussion about Wesnoth, and friendly discussion of other topics. I'm afraid I haven't played many. I like RPGs, and I know lots of people love and similar games, but I much prefer party-based and generally more storyline-oriented RPGs. Probably the most promising Open Source game I've seen is , but it still has a long way to go. Honestly, I don't play that many games. I like playing commercial RPGs, usually console-based, with my wife, and I occasionally like playing the commercial series. To play an Open Source game, it'd have to be very good, and appeal to my tastes, and I haven't found any Open Source games like that, sadly.", "edit_actions": [{"type": "D", "before": "World of Warcraft", "after": null, "start_char_pos": 112, "end_char_pos": 129}, {"type": "D", "before": "The Lord of the Rings", "after": null, "start_char_pos": 194, "end_char_pos": 215}, {"type": "D", "before": "Battle for Wesnoth", "after": null, "start_char_pos": 249, "end_char_pos": 267}, {"type": "D", "before": "open source", "after": null, "start_char_pos": 279, "end_char_pos": 290}, {"type": "R", "before": "Heroes of Might and Magic or Warlords", "after": "or", "start_char_pos": 695, "end_char_pos": 732}, {"type": "D", "before": "wiki", "after": null, "start_char_pos": 1188, "end_char_pos": 1192}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 1315, "end_char_pos": 1317}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 1949, "end_char_pos": 1951}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 2112, "end_char_pos": 2114}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 2645, "end_char_pos": 2647}, {"type": "D", "before": "Second Life", "after": null, "start_char_pos": 2962, "end_char_pos": 2973}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 3175, "end_char_pos": 3177}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 3732, "end_char_pos": 3734}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 4393, "end_char_pos": 4395}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 4456, "end_char_pos": 4458}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 4836, "end_char_pos": 4838}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 5002, "end_char_pos": 5004}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 5257, "end_char_pos": 5259}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 5430, "end_char_pos": 5432}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 5652, "end_char_pos": 5654}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 6051, "end_char_pos": 6053}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 6271, "end_char_pos": 6273}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 6303, "end_char_pos": 6305}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 6883, "end_char_pos": 6885}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 7080, "end_char_pos": 7082}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 7112, "end_char_pos": 7114}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 7483, "end_char_pos": 7485}, {"type": "D", "before": "NetHack", "after": null, "start_char_pos": 7691, "end_char_pos": 7698}, {"type": "D", "before": "GalaxyMage", "after": null, "start_char_pos": 7850, "end_char_pos": 7860}, {"type": "D", "before": "Civilization", "after": null, "start_char_pos": 8054, "end_char_pos": 8066}], "sents_char_pos": [0, 225, 337, 494, 549, 630, 734, 813, 971, 1113, 1226, 1424, 1568, 1610, 1826, 1870, 1993, 2213, 2352, 2569, 2847, 2927, 3030, 3082, 3222, 3308, 3410, 3539, 3566, 3676, 3798, 3846, 3911, 4011, 4078, 4140, 4259, 4341, 4482, 4571, 4614, 4735, 4939, 5058, 5118, 5212, 5498, 5580, 5603, 5750, 5857, 5985, 6122, 6153, 6184, 6342, 6437, 6502, 6574, 6684, 6739, 6826, 6939, 7056, 7194, 7316, 7406, 7612, 7646, 7791, 7897, 7937, 8074]}
+{"doc_id": "42621", "revision_depth": "1", "before_revision": "Musician Billy Preston , a so-called \" fifth Beatle \", died in Arizona at the age of 59 after a long illness. A native of Houston, Texas , Preston played while in his teens with Mahalia Jackson, Little Richard and Ray Charles . He later backed up the Beatles , playing keyboards on Let It Be, The White Album and Abbey Road . He also played on the hit Beatles single \" Get Back .\" He also wrote the Joe Cocker hit \" You Are So Beautiful ,\" and collaborated with Aretha Franklin, Bob Dylan, Quincy Jones, and Barbra Streisand . He won two Grammys , including one for his involvement in the Concert for Bangladesh , staged by ex-Beatle George Harrison in 1971. Last year, in one of his final appearances, Preston performed in Los Angeles with former Beatle Ringo Starr and Harrison's son, Dhani .", "after_revision": "Musician , a so-called \" \", died in Arizona at the age of 59 after a long illness. A native of , , Preston played while in his teens with , and . He later backed up the , playing keyboards on , and . He also played on the hit Beatles single \" .\" He also wrote the hit \" ,\" and collaborated with , , , and . He won two , including one for his involvement in the Concert for , staged by ex-Beatle in 1971. Last year, in one of his final appearances, Preston performed in with former Beatle and Harrison's son, .", "edit_actions": [{"type": "D", "before": "Billy Preston", "after": null, "start_char_pos": 9, "end_char_pos": 22}, {"type": "D", "before": "fifth Beatle", "after": null, "start_char_pos": 39, "end_char_pos": 51}, {"type": "D", "before": "Houston, Texas", "after": null, "start_char_pos": 122, "end_char_pos": 136}, {"type": "A", "before": null, "after": ",", "start_char_pos": 139, "end_char_pos": 139}, {"type": "R", "before": "Mahalia Jackson, Little Richard and Ray Charles", "after": ", and", "start_char_pos": 179, "end_char_pos": 226}, {"type": "D", "before": "Beatles", "after": null, "start_char_pos": 252, "end_char_pos": 259}, {"type": "R", "before": "Let It Be, The White Album and Abbey Road", "after": ", and", "start_char_pos": 283, "end_char_pos": 324}, {"type": "D", "before": "Get Back", "after": null, "start_char_pos": 370, "end_char_pos": 378}, {"type": "D", "before": "Joe Cocker", "after": null, "start_char_pos": 400, "end_char_pos": 410}, {"type": "D", "before": "You Are So Beautiful", "after": null, "start_char_pos": 417, "end_char_pos": 437}, {"type": "R", "before": "Aretha Franklin, Bob Dylan, Quincy Jones, and Barbra Streisand", "after": ", , , and", "start_char_pos": 463, "end_char_pos": 525}, {"type": "D", "before": "Grammys", "after": null, "start_char_pos": 539, "end_char_pos": 546}, {"type": "D", "before": "Bangladesh", "after": null, "start_char_pos": 602, "end_char_pos": 612}, {"type": "D", "before": "George Harrison", "after": null, "start_char_pos": 635, "end_char_pos": 650}, {"type": "D", "before": "Los Angeles", "after": null, "start_char_pos": 725, "end_char_pos": 736}, {"type": "D", "before": "Ringo Starr", "after": null, "start_char_pos": 756, "end_char_pos": 767}, {"type": "D", "before": "Dhani", "after": null, "start_char_pos": 788, "end_char_pos": 793}], "sents_char_pos": [0, 109, 228, 326, 527, 659]}
+{"doc_id": "42902", "revision_depth": "1", "before_revision": "Australia has defeated England 34 points to three in the first of two rugby union test matches at Sydney's Telstra Stadium. The game was another meeting of the 2003 Rugby World Cup finalists, which saw Jonny Wilkinson land a field goal in extra time to win the Rugby World Cup, although the sides have played each other since then, it was the first return to Telstra. In the lead up to the game, England coach Andy Robinson slammed the condition of the pitch of Telstra Stadium. He visited the stadium the day before the test and said he had fears that scrums could be affected by the condition of the pitch. Scrums played a powerful role in the sides last contest at Twickenham last year when the English almost embarassed the Wallabies with their impressive scrummaging. Since their last clash, John Connolly has been apointed the head coach of Australia, and the game against England will mark his debut. With a new-look team, the Wallabies entered the game having lost eight of their previous nine matches. England's Olly Barkley kicked off the match, and just three minutes in, Australia are awarded a penalty. Stirling Mortlock's kick is wide of the posts, and the score remains nil-all. England's scrum prospered in the first twenty minutes, and Australia missed a few oppoortunities to score tries. In the 18th minute, England are penalised for not releasing the ball in the tackle. Mortlock is successful with the shot at goal, and Australia move ahead, 3 points to nil. Just after twenty minutes England looked dangerous as Mike Catt throws a long pass to speedster Tom Varndell near their own goaline, but a stray pass to Tom Voyce led to little. Three minutes later Australia are awarded another penalty, and England find themseleves a little further behind on the scoreboard as Mortlock is successful with another penalty kick. Shortly after Iain Balshaw goes in for England off a Barkley kick, but being wrapped up by Australian captain George Gregan, the television match official ruled a no try. After an unsuccessful scrum on the Australian scoreline, Barkley misses a penalty kick just left to the posts. English captain Pat Sanderson makes an optimistic break shortly after though a pass is intercepted. Mortlock misses a penalty goal soon after, but on the stroke of half time he kicks another penalty goal to put Australia nine points in front as the game goes sinto half time. Barkley got England's first points a few minutes into the second half, being successful with a penalty kick, taking the game to nine to three, ith Australia still in front. Though shortly after Barkley is penalised for not releasing the ball, and Mortlock kicks a penalty goal to take Australia's lead to 12 points. Australian fullback Chris Latham scores the first try of the match in the 54th minute, with Mortlock's conversion, Australias takes a convincing 19 to 3 lead over the English. Australia furthered their lead to 22 points as Mortlock lands another penalty goal, with under 15 minutes remaining in the game, an English comeback now seemed unlikely. Australia sealed the victory when Clyde Rathbone makes a break up field and passes to Mark Gerrard who regathers his own kick to score a try. Mortlock converts Gerrad's try, and Australia are now leading 29 points to three with around seven minutes remaining in the game. On debut, Rodney Blake charges over to score another try for the Wallabies and although Mortlock misses the conversion, Australia win 34 to three.", "after_revision": "Australia defeated England 34 points to three in the first of two rugby union test matches at Sydney's Telstra Stadium. The game was another meeting of the 2003 Rugby World Cup finalists, which saw Jonny Wilkinson land a field goal in extra time to win the Rugby World Cup, although the sides have played each other since then, it was the first return to Telstra. In the lead up to the game, England coach Andy Robinson slammed the condition of the pitch of Telstra Stadium. He visited the stadium the day before the test and said he had fears that scrums could be affected by the condition of the pitch. Scrums played a powerful role in the sides last contest at Twickenham last year when the English almost embarassed the Wallabies with its impressive scrummaging. Since their last clash, John Connolly has been apointed the head coach of Australia, and the game against England will mark his debut. With a new-look team, the Wallabies entered the game having lost eight of its previous nine matches. England's Olly Barkley kicked off the match, and just three minutes in, Australia was awarded a penalty. Stirling Mortlock's kick is wide of the posts, and the score remains nil-all. England's scrum prospered in the first twenty minutes, and Australia missed a few oppoortunities to score tries. In the 18th minute, England was penalised for not releasing the ball in the tackle. Mortlock was successful with the shot at goal, and Australia moved ahead, 3 points to nil. Just after twenty minutes England looked dangerous as Mike Catt throws a long pass to speedster Tom Varndell near their own goaline, but a stray pass to Tom Voyce led to little. Three minutes later Australia was awarded another penalty, and England found itself a little further behind on the scoreboard when Mortlock was successful with another penalty kick. Shortly after Iain Balshaw goes in for England off a Barkley kick, but being wrapped up by Australian captain George Gregan, the television match official ruled a no try. After an unsuccessful scrum on the Australian scoreline, Barkley misses a penalty kick just left to the posts. English captain Pat Sanderson makes an optimistic break shortly after though a pass is intercepted. Mortlock misses a penalty goal soon after, but on the stroke of half time he kicks another penalty goal to put Australia nine points in front as the game goes sinto half time. Barkley got England's first points a few minutes into the second half, being successful with a penalty kick, taking the game to nine to three, with Australia still in front. Though shortly after Barkley is penalised for not releasing the ball, and Mortlock kicks a penalty goal to take Australia's lead to 12 points. Australian fullback Chris Latham scores the first try of the match in the 54th minute, with Mortlock's conversion, Australias takes a convincing 19 to 3 lead over the English. Australia furthered its lead to 22 points as Mortlock lands another penalty goal, with under 15 minutes remaining in the game, an English comeback seemed unlikely. Australia sealed the victory when Clyde Rathbone makes a break up field and passes to Mark Gerrard who regathers his own kick to score a try. Mortlock converts Gerrad's try, and Australia lead 29 points to three with around seven minutes remaining in the game. On debut, Rodney Blake charges over to score another try for the Wallabies and although Mortlock misses the conversion, Australia won 34 to three.", "edit_actions": [{"type": "D", "before": "has", "after": null, "start_char_pos": 10, "end_char_pos": 13}, {"type": "R", "before": "their", "after": "its", "start_char_pos": 743, "end_char_pos": 748}, {"type": "R", "before": "their", "after": "its", "start_char_pos": 982, "end_char_pos": 987}, {"type": "R", "before": "are", "after": "was", "start_char_pos": 1093, "end_char_pos": 1096}, {"type": "R", "before": "are", "after": "was", "start_char_pos": 1335, "end_char_pos": 1338}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1400, "end_char_pos": 1402}, {"type": "R", "before": "move", "after": "moved", "start_char_pos": 1451, "end_char_pos": 1455}, {"type": "R", "before": "are", "after": "was", "start_char_pos": 1688, "end_char_pos": 1691}, {"type": "R", "before": "find themseleves", "after": "found itself", "start_char_pos": 1729, "end_char_pos": 1745}, {"type": "R", "before": "as Mortlock is", "after": "when Mortlock was", "start_char_pos": 1788, "end_char_pos": 1802}, {"type": "R", "before": "ith", "after": "with", "start_char_pos": 2542, "end_char_pos": 2545}, {"type": "R", "before": "their", "after": "its", "start_char_pos": 2911, "end_char_pos": 2916}, {"type": "D", "before": "now", "after": null, "start_char_pos": 3040, "end_char_pos": 3043}, {"type": "R", "before": "are now leading", "after": "lead", "start_char_pos": 3249, "end_char_pos": 3264}, {"type": "R", "before": "win", "after": "won", "start_char_pos": 3463, "end_char_pos": 3466}], "sents_char_pos": [0, 123, 367, 478, 608, 772, 907, 1010, 1115, 1193, 1306, 1390, 1479, 1657, 1840, 2011, 2122, 2222, 2398, 2571, 2714, 2890, 3060, 3202, 3332]}
+{"doc_id": "4322", "revision_depth": "1", "before_revision": "The state-run Korean Central News Agency has released a statement from the North Korean Foreign Ministry cancelling the ongoing six-party talks aimed at ending North Korea's nuclear weapon development programs. The statement also declared for the first time that North Korea has nuclear arms, announcing that it plans to \"bolster its nuclear weapons arsenal\". The statement declared, \"We had already taken the resolute action of pulling out of the Nuclear Nonproliferation Treaty and have manufactured nuclear arms for self-defense to cope with the Bush administration's evermore undisguised policy to isolate and stifle the DPRK [North Korean government].\" Previously, on February 4, the state-run Pyongyang Radio carried a reaction to the inauguration speech of US President George Bush : \"In his inauguration speech, Bush trumpeted that 'fire of freedom will reach dark corners of the world.' This is nothing but a plot to engulf the whole world in a sea of war flames and rule it by imposing a freedom based on power.\" Technical experts and politicians have advised though that this announcement might still need to be taken with suspicion, however, as North Korea has made large announcements before making large demands many times in the past as a form of bluffing. Because they have never shown any outside experts concrete proof of their having successfully extracted the plutonium from their reactors, nor that they have managed to perform the complicated chemistry and engineering necessary to develop a prototype nuclear weapon design , and have not performed the requisite first nuclear test , their nuclear status, though declared, is being viewed as somewhat ambiguous. It is also unknown whether their purported nuclear weapons are sophisticated enough to fit onto their missiles, a complicated task to achieve without testing or outside assistance. In the following days, President Bush's public rhetoric with respect to North Korea seemed to have softened, and his administration sent a new envoy to the Chinese, South Korean, and Japanese governments to discuss pressuring North Korea to give up its nuclear arms development. The envoy, Michael Green (an Asia expert on the National Security Council) was sent to meet with Chinese president Hu Jintao with a letter from President Bush \"written to underscore the greatly heightened urgency\" of the situation. Green also met with South Korean President Roh Moo-hyun and Japanese Prime Minister Junichiro Koizumi . South Korean foreign minister visits the US This week, the Yonhap news agency reported (via AFP) that South Korean Foreign Minister Ban Ki-moon was also travelling to Washington, DC , to talk with US Secretary of State Condoleezza Rice and other US officials about North Korea's nuclear weapons program.", "after_revision": "The state-run has released a statement from the North Korean Foreign Ministry cancelling the ongoing six-party talks aimed at ending North Korea's nuclear weapon development programs. The statement also declared for the first time that North Korea has nuclear arms, announcing that it plans to \"bolster its nuclear weapons arsenal\". The statement declared, \"We had already taken the resolute action of pulling out of the and have manufactured nuclear arms for self-defense to cope with the Bush administration's evermore undisguised policy to isolate and stifle the [North Korean government].\" Previously, on February 4, the state-run carried a reaction to the inauguration speech of President : \"In his inauguration speech, Bush trumpeted that 'fire of freedom will reach dark corners of the world.' This is nothing but a plot to engulf the whole world in a sea of war flames and rule it by imposing a freedom based on power.\" Technical experts and politicians have advised though that this announcement might still need to be taken with suspicion, however, as North Korea has made large announcements before making large demands many times in the past as a form of bluffing. Because they have never shown any outside experts concrete proof of their having successfully extracted the from their reactors, nor that they have managed to perform the complicated chemistry and engineering necessary to develop a prototype , and have not performed the requisite first , their nuclear status, though declared, is being viewed as somewhat ambiguous. It is also unknown whether their purported nuclear weapons are sophisticated enough to fit onto their missiles, a complicated task to achieve without testing or outside assistance. In the following days, President Bush's public rhetoric with respect to North Korea seemed to have softened, and his administration sent a new envoy to the , , and governments to discuss pressuring North Korea to give up its nuclear arms development. The envoy, Michael Green (an Asia expert on the ), was sent to meet with Chinese president Hu Jintao with a letter from President Bush \"written to underscore the greatly heightened urgency\" of the situation. Green also met with South Korean President and Japanese Prime Minister . South Korean foreign minister visits the US This week, the Yonhap news agency reported (via AFP) that South Korean Foreign Minister Ban Ki-moon was also travelling to , to talk with US Secretary of State Condoleezza Rice and other US officials about North Korea's nuclear weapons program.", "edit_actions": [{"type": "D", "before": "Korean Central News Agency", "after": null, "start_char_pos": 14, "end_char_pos": 40}, {"type": "D", "before": "Nuclear Nonproliferation Treaty", "after": null, "start_char_pos": 448, "end_char_pos": 479}, {"type": "D", "before": "DPRK", "after": null, "start_char_pos": 625, "end_char_pos": 629}, {"type": "D", "before": "Pyongyang Radio", "after": null, "start_char_pos": 699, "end_char_pos": 714}, {"type": "R", "before": "US President George Bush", "after": "President", "start_char_pos": 764, "end_char_pos": 788}, {"type": "D", "before": "plutonium", "after": null, "start_char_pos": 1380, "end_char_pos": 1389}, {"type": "D", "before": "nuclear weapon design", "after": null, "start_char_pos": 1524, "end_char_pos": 1545}, {"type": "D", "before": "nuclear test", "after": null, "start_char_pos": 1591, "end_char_pos": 1603}, {"type": "R", "before": "Chinese, South Korean, and Japanese", "after": ", , and", "start_char_pos": 2021, "end_char_pos": 2056}, {"type": "R", "before": "National Security Council)", "after": "),", "start_char_pos": 2192, "end_char_pos": 2218}, {"type": "D", "before": "Roh Moo-hyun", "after": null, "start_char_pos": 2419, "end_char_pos": 2431}, {"type": "D", "before": "Junichiro Koizumi", "after": null, "start_char_pos": 2460, "end_char_pos": 2477}, {"type": "D", "before": "Washington, DC", "after": null, "start_char_pos": 2647, "end_char_pos": 2661}], "sents_char_pos": [0, 210, 359, 656, 895, 1022, 1271, 1683, 1864, 2143, 2375, 2479]}
+{"doc_id": "45505", "revision_depth": "1", "before_revision": "BBC Wales and iPTV station , VTV are reporting that a light aircraft made an emergency landing at 13:00 BST , at Treforest Industrial Estate , near Cardiff, south Wales . The aircraft, an orange-coloured single-engine model Fox home-built kit , was carrying two people , a man and a woman, when it made the forced landing on the estate's dual carriageway , which runs through the industrial park . It is not known how severely the two persons on board , are injured, however a spokesperson for South Wales Police has stated that both of the aircraft's occupants had sustained \"non life-threatening injuries\". Treforest Industrial Estate is one of the largest business parks in the south Wales valleys and its location, just two hundred metres from the main A470 expressway , could have resulted in a far greater tragedy. VTV reporter and private pilot , Craig Handley , said that the location of the accident \"would have been the most logical place to try and set the aircraft down as the dual carriageway, which runs through the estate, is clearly visible from the air and is almost completely straight and wide.\" Today's accident comes less than a year after a similar-sized aircraft was forced to make an emergency landing , less than two miles away from Treforest Industrial Estate , after suffering a sudden loss of engine power , during its approach to nearby Cardiff International Airport. That aircraft, a Cessna 150, collided with a group of trees , shedding its wings ; before coming to rest on a small country road. The two occupants of the aircraft received slight injuries. South Wales Police have not confirmed whether any motorists or pedestrians were injured when the aircraft , involved in today's accident , made its emergency landing. The aircraft did , however, cause some structural damage to a factory unit on the industrial estate , before coming to a rest, inverted, on the adjacent dual carriageway. According to one eyewitness, the aircraft appeared to have experienced an engine-related problem , seconds before impact. A spokesperson, for Cardiff International Airport said that the aircraft had departed , from Cardiff , at 12:43 BST and that the airport's Air Traffic Control centre had lost contact with the plane. The Civil Aviation Authority's Air Accident Investigation Branch (AAIB) have been informed and are due to begin their investigation , into the crash.", "after_revision": "BBC Wales and iPTV station VTV are reporting that a light aircraft made an emergency landing at 13:00 BST at Treforest Industrial Estate near Cardiff . The aircraft, an orange-coloured single-engine model Fox home-built kit was carrying two people when it made a forced landing on a section of dual carriageway within the industrial estate . It is not known how severely the man and woman on board were injured, a spokesperson for South Wales Police stated that both of the aircraft's occupants sustained \"non life-threatening injuries\". Treforest Industrial Estate is one of the largest business parks in the south Wales valleys . Its location, just two hundred metres from the main A470 expressway could have resulted in a far greater tragedy. VTV reporter and private pilot Craig Handley said that the location of the accident \"would have been the most logical place to try and set the aircraft down as the dual carriageway, which runs through the estate, is clearly visible from the air and is almost completely straight and wide.\" Today's accident comes less than a year after a similar-sized aircraft was forced to make an emergency landing less than two miles away from Treforest Industrial Estate . A Cessna 150 suffered a sudden loss of engine power during its approach to nearby Cardiff International Airport. The Cessna in the earlier accident collided with a group of trees shedding its wings before coming to rest on a small country road. The two occupants of that aircraft received slight injuries. South Wales Police have not confirmed whether any motorists or pedestrians were injured when the aircraft in today's accident made its emergency landing. The aircraft did cause some structural damage to a factory unit on the industrial estate prior to coming to rest, inverted, on the adjacent dual carriageway. According to one eyewitness, the aircraft appeared to have experienced an engine-related problem seconds before impact. A spokesperson, for Cardiff International Airport said that the aircraft had departed from Cardiff at 12:43 BST and that the airport's Air Traffic Control centre had lost contact with the plane. The Civil Aviation Authority's Air Accident Investigation Branch (AAIB) have been informed and are due to begin their investigation into the crash.", "edit_actions": [{"type": "D", "before": ",", "after": null, "start_char_pos": 27, "end_char_pos": 28}, {"type": "D", "before": ",", "after": null, "start_char_pos": 108, "end_char_pos": 109}, {"type": "R", "before": ", near Cardiff, south Wales", "after": "near Cardiff", "start_char_pos": 141, "end_char_pos": 168}, {"type": "D", "before": ",", "after": null, "start_char_pos": 243, "end_char_pos": 244}, {"type": "D", "before": ", a man and a woman,", "after": null, "start_char_pos": 269, "end_char_pos": 289}, {"type": "R", "before": "the", "after": "a", "start_char_pos": 303, "end_char_pos": 306}, {"type": "R", "before": "the estate's dual carriageway , which runs through the industrial park", "after": "a section of dual carriageway within the industrial estate", "start_char_pos": 325, "end_char_pos": 395}, {"type": "R", "before": "two persons on board , are injured, however", "after": "man and woman on board were injured,", "start_char_pos": 431, "end_char_pos": 474}, {"type": "D", "before": "has", "after": null, "start_char_pos": 513, "end_char_pos": 516}, {"type": "D", "before": "had", "after": null, "start_char_pos": 562, "end_char_pos": 565}, {"type": "R", "before": "and its", "after": ". Its", "start_char_pos": 701, "end_char_pos": 708}, {"type": "D", "before": ",", "after": null, "start_char_pos": 773, "end_char_pos": 774}, {"type": "R", "before": ", Craig Handley ,", "after": "Craig Handley", "start_char_pos": 852, "end_char_pos": 869}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1226, "end_char_pos": 1227}, {"type": "R", "before": ", after suffering", "after": ". A Cessna 150 suffered", "start_char_pos": 1286, "end_char_pos": 1303}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1334, "end_char_pos": 1335}, {"type": "R", "before": "That aircraft, a Cessna 150,", "after": "The Cessna in the earlier accident", "start_char_pos": 1397, "end_char_pos": 1425}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1457, "end_char_pos": 1458}, {"type": "D", "before": ";", "after": null, "start_char_pos": 1478, "end_char_pos": 1479}, {"type": "R", "before": "the", "after": "that", "start_char_pos": 1548, "end_char_pos": 1551}, {"type": "D", "before": ", involved", "after": null, "start_char_pos": 1693, "end_char_pos": 1703}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1724, "end_char_pos": 1725}, {"type": "D", "before": ", however,", "after": null, "start_char_pos": 1771, "end_char_pos": 1781}, {"type": "R", "before": ", before coming to a", "after": "prior to coming to", "start_char_pos": 1854, "end_char_pos": 1874}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2022, "end_char_pos": 2023}, {"type": "R", "before": ", from Cardiff ,", "after": "from Cardiff", "start_char_pos": 2133, "end_char_pos": 2149}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2378, "end_char_pos": 2379}], "sents_char_pos": [0, 170, 397, 608, 820, 1114, 1396, 1479, 1526, 1586, 1753, 1924, 2046, 2245]}
+{"doc_id": "457548", "revision_depth": "1", "before_revision": "A helicopter crash at the edge of , Kenya has killed six. Amongst the dead is internal security minister , a candidate in . Saitoti, 66, played a major role in Kenya opting to send troops into Somalia last year in a bid to combat al-Shabaab. His deputy Joshua Orwa Ojonde is also dead, alongside both pilots and two bodyguards. The aircraft had not long departed when it went down into a forest. One witness saw the helicopter \"flying very low. It came down suddenly and we heard a loud explosion, and then it burst into flames.\" Another said it \"hovered up there and looked like it was turning back \" before crashing. The accident occurred at around 8 :30 this morning, local time . Current President decried \"a devastating loss to our country .\" He called Saitoti \"a hardworking and determined public servant who dedicated his time to the service of the Kenyan people\". Prime Minister , speaking at the scene, promised \"a thorough probe\" into the accident. He described a \" great tragedy that has befallen our country \". Saitoti, who personally told the public of the invasion of Somalia two days after sending in thousands of soldiers, had been faced with numerous bombings and kidnaps. He routinely made assurances on national TV in the aftermath of attacks, and recently vowed \" terrorists\" would not have an impact on government . With qualifications in accountancy and mathematics acquired in the US, Saitoti was a former Kenyan finance minister . A prominent figure in national politics , he also served as vice president under in 1989\u20131997 and 1999\u20132002. There is no immediate word on possible causes for the accident. Police have sealed off the scene and begun an investigation.", "after_revision": "A helicopter crash at the edge of , Ugandan-Kenyan Democratic People's Cooperative has killed six. Amongst the dead is Chairman of the People's Commissariat, comrade , a candidate in the recently canceled People's Election of 2013. Comrade Saitoti, 66, played a major role in the Ugandan-Kenyan People's Army by opting to send troops into the United Somalian-Ethiopian Republic last year in a bid to combat the enemy of the people target 2 al-Shabaab. His deputy , Lieutenant Comrade Joshua Orwa Ojonde is also dead, alongside both pilots and two bodyguards. The aircraft had not long departed when it went down into the Saitoti forest. One witness , who describes the event in detail, saw the helicopter \"flying very low. It came down suddenly and back up, and then down again and we saw a trail of white smoke up to the helicopter, heard a loud explosion, and then it burst into flames.\" Another said it \"hovered up there and looked like it was turning back 2 times before we saw trail of white smoke and then heard a explosion \" before crashing. The accident occurred at around 9 :30 this morning, People's Time . Current Chairman comrade decried \"a devastating loss to our Republic .\" He called Saitoti \"a hardworking and determined public servant who dedicated his time to the service of the Ugandan-Kenyan people\". Party Secretariat, comrade , speaking at the scene, announced along with Chairman comrade Mwai Kibaki, the creation of Saitoti Remembrance day. He also described a \" That this is a great tragedy that has befallen our peoples \". comrade Saitoti, who personally told the public of the just invasion of Somalia-Ethiopia three days after sending in thousands of soldiers, had been faced with numerous bombings and kidnaps. He routinely made assurances on the People's Television Network in the aftermath of attacks, and recently vowed that the \" Somalian-Ethiopian Extremists\" and \" terrorists\" would not have an impact on governmental functions . With qualifications in Bureaucratic accountancy and mathematics acquired in China, Comrade Saitoti was a former Party Financier before the Ugandan-Kenyan Unification Socialist revolution . A prominent figure in national politics and in the Ugandan-Kenyan People's Socialist Party , he also served as Vice Chairman under the great leader comrade in 1989\u20131997 and 1999\u20132002. A majority of the Ugandan-Kenyan population believe it was a provoked attack from a Somalian-Ethiopian secret agent. It is reported that tensions between the two nations is higher than it was in 1985 after the infamous \"Mombasa Dump Truck Massacre\", and many political analysts predict a war is inevitable. The Ugandan-Kenyan People's Army and The Ugandan-Kenyan Ministry for State Security has sealed off the scene and begun an investigation.", "edit_actions": [{"type": "R", "before": "Kenya", "after": "Ugandan-Kenyan Democratic People's Cooperative", "start_char_pos": 36, "end_char_pos": 41}, {"type": "R", "before": "internal security minister ,", "after": "Chairman of the People's Commissariat, comrade ,", "start_char_pos": 78, "end_char_pos": 106}, {"type": "R", "before": ".", "after": "the recently canceled People's Election of 2013.", "start_char_pos": 122, "end_char_pos": 123}, {"type": "A", "before": null, "after": "Comrade", "start_char_pos": 124, "end_char_pos": 124}, {"type": "R", "before": "Kenya", "after": "the Ugandan-Kenyan People's Army by", "start_char_pos": 161, "end_char_pos": 166}, {"type": "R", "before": "Somalia", "after": "the United Somalian-Ethiopian Republic", "start_char_pos": 194, "end_char_pos": 201}, {"type": "A", "before": null, "after": "the enemy of the people target 2", "start_char_pos": 231, "end_char_pos": 231}, {"type": "A", "before": null, "after": ", Lieutenant Comrade", "start_char_pos": 255, "end_char_pos": 255}, {"type": "R", "before": "a", "after": "the Saitoti", "start_char_pos": 389, "end_char_pos": 390}, {"type": "A", "before": null, "after": ", who describes the event in detail,", "start_char_pos": 411, "end_char_pos": 411}, {"type": "R", "before": "we", "after": "back up, and then down again and we saw a trail of white smoke up to the helicopter,", "start_char_pos": 475, "end_char_pos": 477}, {"type": "A", "before": null, "after": "2 times before we saw trail of white smoke and then heard a explosion", "start_char_pos": 604, "end_char_pos": 604}, {"type": "R", "before": "8", "after": "9", "start_char_pos": 656, "end_char_pos": 657}, {"type": "R", "before": "local time", "after": "People's Time", "start_char_pos": 676, "end_char_pos": 686}, {"type": "R", "before": "President", "after": "Chairman comrade", "start_char_pos": 697, "end_char_pos": 706}, {"type": "R", "before": "country", "after": "Republic", "start_char_pos": 742, "end_char_pos": 749}, {"type": "R", "before": "Kenyan", "after": "Ugandan-Kenyan", "start_char_pos": 861, "end_char_pos": 867}, {"type": "R", "before": "Prime Minister ,", "after": "Party Secretariat, comrade ,", "start_char_pos": 877, "end_char_pos": 893}, {"type": "R", "before": "promised \"a thorough probe\" into the accident. He", "after": "announced along with Chairman comrade Mwai Kibaki, the creation of Saitoti Remembrance day. He also", "start_char_pos": 917, "end_char_pos": 966}, {"type": "A", "before": null, "after": "That this is a", "start_char_pos": 981, "end_char_pos": 981}, {"type": "R", "before": "country", "after": "peoples", "start_char_pos": 1018, "end_char_pos": 1025}, {"type": "A", "before": null, "after": "comrade", "start_char_pos": 1029, "end_char_pos": 1029}, {"type": "R", "before": "invasion of Somalia two", "after": "just invasion of Somalia-Ethiopia three", "start_char_pos": 1077, "end_char_pos": 1100}, {"type": "R", "before": "national TV", "after": "the People's Television Network", "start_char_pos": 1229, "end_char_pos": 1240}, {"type": "A", "before": null, "after": "that the", "start_char_pos": 1289, "end_char_pos": 1289}, {"type": "A", "before": null, "after": "Somalian-Ethiopian Extremists\" and \"", "start_char_pos": 1292, "end_char_pos": 1292}, {"type": "R", "before": "government", "after": "governmental functions", "start_char_pos": 1333, "end_char_pos": 1343}, {"type": "A", "before": null, "after": "Bureaucratic", "start_char_pos": 1369, "end_char_pos": 1369}, {"type": "R", "before": "the US,", "after": "China, Comrade", "start_char_pos": 1410, "end_char_pos": 1417}, {"type": "R", "before": "Kenyan finance minister", "after": "Party Financier before the Ugandan-Kenyan Unification Socialist revolution", "start_char_pos": 1439, "end_char_pos": 1462}, {"type": "A", "before": null, "after": "and in the Ugandan-Kenyan People's Socialist Party", "start_char_pos": 1505, "end_char_pos": 1505}, {"type": "R", "before": "vice president under", "after": "Vice Chairman under the great leader comrade", "start_char_pos": 1526, "end_char_pos": 1546}, {"type": "R", "before": "There is no immediate word on possible causes for the accident. Police have", "after": "A majority of the Ugandan-Kenyan population believe it was a provoked attack from a Somalian-Ethiopian secret agent. It is reported that tensions between the two nations is higher than it was in 1985 after the infamous \"Mombasa Dump Truck Massacre\", and many political analysts predict a war is inevitable. The Ugandan-Kenyan People's Army and The Ugandan-Kenyan Ministry for State Security has", "start_char_pos": 1575, "end_char_pos": 1650}], "sents_char_pos": [0, 57, 243, 330, 398, 448, 533, 623, 876, 963, 1196, 1345, 1574, 1638]}
+{"doc_id": "46099", "revision_depth": "1", "before_revision": "Hassan Nasrallah , the leader of Hezbollah claims that the 2006 Israel-Lebanon conflict is the result of an American-Israeli conspiracy to attack Lebanon and gain control over the state as a part of a \"new Middle East\". In the 28-minute speech on al-Manar television July 26 Nasrallah alleges that in the project for a new Middle East the United States seeks the removal of all resistance groups that pose a threat to its procurement and control of the area's wealth and resources. In the June 2 edition of London-based magazine al-Watan al-Arabi it is claimed Hezbollah received intelligence that Olmert had obtained a green light from Bush in the event of an open confrontation between Hezbollah and Israel. That is alleged to have happened in May when Israeli Prime Minister Ehud Olmert paid his first visit to Washington as head of the state of Israel and met President George W. Bush. Based on that knowledge Hassan Nasrallah delivered a \"Strategic Defense Plan,\" to the National Dialogue Committee (al-Hiwar al-Watani). The plan outlined what Hezbollah should do in the event of an Israeli air, land, or sea assault on Lebanon. Flag of Hezbollah The Hezbollah leader claims in the al-Manar speech that both the United States and Israel planned using the element of surprise to invade Lebanon in late-September early-October. Nasrallah says they discovered this warplan and Hezbollah used the kidnapping of the Israeli soldiers to enter into the conflict directly and remove the surprise factor. According to the San Francisco Chronicle an Israeli army officer, at an off-the-record briefing, presented a war plan last year to some Think Tanks in Washington. Several journalists and diplomats were told of Israel's plans for a three-week campaign in Lebanon. There was no plan, according to this scenario, to reoccupy southern Lebanon on a long-term basis. It is not clear if Hezbollah obtained this information. Gerald Steinberg , professor of political science at Bar-Ilan University , says \"Of all of Israel's wars since 1948, this was the one for which Israel was most prepared\". Professor Steinberg continued \"In a sense, the preparation began in May 2000, immediately after the Israeli withdrawal, when it became clear the international community was not going to prevent Hezbollah from stockpiling missiles and attacking Israel. By 2004, the military campaign scheduled to last about three weeks that we're seeing now had already been blocked out and, in the last year or two, it's been simulated and rehearsed across the board.\" According to La nouvelle r\u00e9publique a french speaking Algerian newpsaper, Dick Cheney and Benjamin Netanyahu , head of Likud , met secretly the 17 and 18 of June at the Beaver Creek 's Conf\u00e9rence of the American Enterprise Institute. Dick Cheney give his agreement to Israel to destroy Hamas and Hezbollah . Netanyahu reported to Ehud Olmert .", "after_revision": " , the leader of , claims that the is the result of an American-Israeli conspiracy to attack Lebanon and gain control over the state as a part of a \"new Middle East\". In the 28-minute speech on television July 26 Nasrallah alleges that in the project for a new Middle East the United States seeks the removal of all resistance groups that pose a threat to its procurement and control of the area's wealth and resources. In the June 2 edition of London-based magazine al-Watan al-Arabi it is claimed Hezbollah received intelligence that Olmert had obtained a green light from Bush in the event of an open confrontation between Hezbollah and Israel. That is alleged to have happened in May when Israeli Prime Minister paid his first visit to Washington as head of the state of Israel and met President George W. Bush. Based on that knowledge Hassan Nasrallah delivered a \"Strategic Defense Plan,\" to the National Dialogue Committee (al-Hiwar al-Watani). The plan outlined what Hezbollah should do in the event of an Israeli air, land, or sea assault on Lebanon. The Hezbollah leader claims in the al-Manar speech that both the United States and Israel planned using the element of surprise to invade Lebanon in late-September early-October. Nasrallah says they discovered this warplan and Hezbollah used the kidnapping of the Israeli soldiers to enter into the conflict directly and remove the surprise factor. According to the an Israeli army officer, at an off-the-record briefing, presented a war plan last year to some Think Tanks in Washington. Several journalists and diplomats were told of Israel's plans for a three-week campaign in Lebanon. There was no plan, according to this scenario, to reoccupy southern Lebanon on a long-term basis. It is not clear if Hezbollah obtained this information. , professor of political science at , says \"Of all of Israel's wars since 1948, this was the one for which Israel was most prepared\". Professor Steinberg continued \"In a sense, the preparation began in May 2000, immediately after the Israeli withdrawal, when it became clear the international community was not going to prevent Hezbollah from stockpiling missiles and attacking Israel. By 2004, the military campaign scheduled to last about three weeks that we're seeing now had already been blocked out and, in the last year or two, it's been simulated and rehearsed across the board.\" According to , a french speaking Algerian newpsaper, and , head of , met secretly the 17 and 18 of June at the 's Conf\u00e9rence of the American Enterprise Institute. Dick Cheney give his agreement to Israel to destroy and . Netanyahu reported to .", "edit_actions": [{"type": "D", "before": "Hassan Nasrallah", "after": null, "start_char_pos": 0, "end_char_pos": 16}, {"type": "R", "before": "Hezbollah", "after": ",", "start_char_pos": 33, "end_char_pos": 42}, {"type": "D", "before": "2006 Israel-Lebanon conflict", "after": null, "start_char_pos": 59, "end_char_pos": 87}, {"type": "D", "before": "al-Manar", "after": null, "start_char_pos": 247, "end_char_pos": 255}, {"type": "D", "before": "Ehud Olmert", "after": null, "start_char_pos": 778, "end_char_pos": 789}, {"type": "D", "before": "Flag of Hezbollah", "after": null, "start_char_pos": 1134, "end_char_pos": 1151}, {"type": "D", "before": "San Francisco Chronicle", "after": null, "start_char_pos": 1518, "end_char_pos": 1541}, {"type": "D", "before": "Gerald Steinberg", "after": null, "start_char_pos": 1918, "end_char_pos": 1934}, {"type": "D", "before": "Bar-Ilan University", "after": null, "start_char_pos": 1971, "end_char_pos": 1990}, {"type": "R", "before": "La nouvelle r\u00e9publique", "after": ",", "start_char_pos": 2555, "end_char_pos": 2577}, {"type": "R", "before": "Dick Cheney and Benjamin Netanyahu", "after": "and", "start_char_pos": 2616, "end_char_pos": 2650}, {"type": "D", "before": "Likud", "after": null, "start_char_pos": 2661, "end_char_pos": 2666}, {"type": "D", "before": "Beaver Creek", "after": null, "start_char_pos": 2711, "end_char_pos": 2723}, {"type": "R", "before": "Hamas and Hezbollah", "after": "and", "start_char_pos": 2828, "end_char_pos": 2847}, {"type": "D", "before": "Ehud Olmert", "after": null, "start_char_pos": 2872, "end_char_pos": 2883}], "sents_char_pos": [0, 219, 481, 709, 889, 1025, 1133, 1330, 1500, 1663, 1763, 1861, 1917, 2088, 2340, 2541, 2775]}
+{"doc_id": "47309", "revision_depth": "1", "before_revision": "The United Nations brokered cease-fire between Israel and Hezbollah is taking hold as Israel has begun to withdraw its forces from Lebanon. Resolution 1701 calling for a \"full cessation of hostilities\" in the Israeli-Lebanon war passed by the UN Security Council last Friday and was approved by Lebanon and Israel over the weekend. Hezbollah, which has vowed to continue to harass Israeli troops as long as they remain fired ten rockets in southern Lebanonlast night but none of them crossed the border into Israel. Lebanon's defence minister, Elias Murr, says that the 15,000 troops Lebanon has committed to the peacekeeping operation will be on the north side of the Litani River by the end of the week. As part of the truce agreement, they must cross the river and exercise control over what has been Hezbollah run terriotory in southern Lebanon. The Israeli army says it intends to complete its withdrawal from Lebanon by the end of this week. ", "after_revision": "The United Nations brokered cease-fire between Israel and Hezbollah is largely holding as Israel has begun to withdraw its forces from Lebanon. UNSC Resolution 1701 , which calls for a \"full cessation of hostilities\" in the Israeli-Lebanon war , was passed by the UN Security Council last Friday and was approved by Lebanon and Israel over the weekend. Lebanon's defence minister, Elias Murr, says that the 15,000 troops Lebanon has committed to the peacekeeping operation will be on the north side of the Litani River by the end of the week. As part of the truce agreement, they must cross the river and exercise control over what has been Hezbollah controlled territory in southern Lebanon. The head of the Israeli army says the IDF could complete its withdrawal from Lebanon in 7 to 10 days. The new international peace-keeping force may number as many as 15,000, significantly larger than the existing force of 2,000, known as UNIFIL, which is expected to take up border positions in the mean time. The UN hopes for an advance force of up to 3,500 within the next 10 to 14 days. France, who is expected to lead the international force, is seeking a clearer mandate from the UN on the rules of engagement. Over 1,200 people have lost their lives in the conflict. 1,110, mostly civilians, have died in Lebanon and 157 Israelis, mostly military, were killed. Israel says it killed 530 Hizbollah fighters while Hezbollah puts the toll at about 80. Related", "edit_actions": [{"type": "R", "before": "taking hold", "after": "largely holding", "start_char_pos": 71, "end_char_pos": 82}, {"type": "A", "before": null, "after": "UNSC", "start_char_pos": 140, "end_char_pos": 140}, {"type": "R", "before": "calling", "after": ", which calls", "start_char_pos": 157, "end_char_pos": 164}, {"type": "A", "before": null, "after": ", was", "start_char_pos": 230, "end_char_pos": 230}, {"type": "D", "before": "Hezbollah, which has vowed to continue to harass Israeli troops as long as they remain fired ten rockets in southern Lebanonlast night but none of them crossed the border into Israel.", "after": null, "start_char_pos": 334, "end_char_pos": 517}, {"type": "R", "before": "run terriotory", "after": "controlled territory", "start_char_pos": 816, "end_char_pos": 830}, {"type": "A", "before": null, "after": "head of the", "start_char_pos": 856, "end_char_pos": 856}, {"type": "R", "before": "it intends to", "after": "the IDF could", "start_char_pos": 875, "end_char_pos": 888}, {"type": "R", "before": "by the end of this week.", "after": "in 7 to 10 days.", "start_char_pos": 926, "end_char_pos": 950}, {"type": "A", "before": null, "after": "The new international peace-keeping force may number as many as 15,000, significantly larger than the existing force of 2,000, known as UNIFIL, which is expected to take up border positions in the mean time. The UN hopes for an advance force of up to 3,500 within the next 10 to 14 days. France, who is expected to lead the international force, is seeking a clearer mandate from the UN on the rules of engagement.", "start_char_pos": 951, "end_char_pos": 951}, {"type": "A", "before": null, "after": "Over 1,200 people have lost their lives in the conflict. 1,110, mostly civilians, have died in Lebanon and 157 Israelis, mostly military, were killed. Israel says it killed 530 Hizbollah fighters while Hezbollah puts the toll at about 80.", "start_char_pos": 952, "end_char_pos": 952}, {"type": "A", "before": null, "after": "Related", "start_char_pos": 953, "end_char_pos": 953}], "sents_char_pos": [0, 139, 333, 517, 707, 851]}
+{"doc_id": "4872", "revision_depth": "1", "before_revision": "February 19, 2005 Category:February 19, 2005 The effort by the EU is to discourage airlines from deliberately overbooking flights, a practice which has become routine for most major airlines. Overbooking often leads to \u201cbumping\u201d , where passengers who cannot be guaranteed a seat are moved to a later flight. In future when this happens airlines will have to offer compensation. Additionally, if flights are cancelled or delayed by more than two hours all passengers must be compensated. This will be the case except in \u201cextraordinary circumstances\u201d , the definition of which may or may not include bad weather, security alerts or strikes. \u201cIt\u2019 s a preposterous piece of legislation, we among all airlines are fighting this, \u201d Ryanair deputy chief executive, Michael Cawley told BBC radio 4 \u2019 s Today programme. It has also been claimed that the advice may mislead customers by having them believe that they may be entitled to compensation if flights are delayed due to bad weather. Marja Quillinan-Meiland, European Commission spokeswoman has said that there are \u201cgrey areas\u201d but added \u201c these are not as big as the airlines are making out. \u201d Disputed cases would be heard by national enforcement bodies which would decide if there is a case to answer. European Regions Airline Association (ERAA) director of air transport Andy Clarke said \u201c we reckon it \u2019 s going to cost European air passengers \u2013 not the airlines, the airlines have no money, it has to be paid by the passengers \u2013 1.5bn euros, that \u2019 s over \u00a31bn a year loaded onto European passengers. That \u2019 s basically a transfer of money from passengers whose journeys are not disrupted to passengers whose journeys are disrupted. \u201d", "after_revision": "February 19, 2005 The effort by the EU is to discourage airlines from deliberately overbooking flights, a practice which has become routine for most major airlines. Overbooking often leads to \"bumping\" , where passengers who cannot be guaranteed a seat are moved to a later flight. In future when this happens airlines will have to offer compensation. Additionally, if flights are cancelled or delayed by more than two hours all passengers must be compensated. This will be the case except in \"extraordinary circumstances\" , the definition of which may or may not include bad weather, security alerts or strikes. \"It' s a preposterous piece of legislation, we among all airlines are fighting this, \" Ryanair deputy chief executive, Michael Cawley told BBC radio 4 ' s Today programme. It has also been claimed that the advice may mislead customers by having them believe that they may be entitled to compensation if flights are delayed due to bad weather. Marja Quillinan-Meiland, European Commission spokeswoman has said that there are \"grey areas\" but added \" these are not as big as the airlines are making out. \" Disputed cases would be heard by national enforcement bodies which would decide if there is a case to answer. European Regions Airline Association (ERAA) director of air transport Andy Clarke said \" we reckon it ' s going to cost European air passengers \u2013 not the airlines, the airlines have no money, it has to be paid by the passengers \u2013 1.5bn euros, that ' s over \u00a31bn a year loaded onto European passengers. That ' s basically a transfer of money from passengers whose journeys are not disrupted to passengers whose journeys are disrupted. \"", "edit_actions": [{"type": "D", "before": "Category:February 19, 2005", "after": null, "start_char_pos": 18, "end_char_pos": 44}, {"type": "R", "before": "\u201cbumping\u201d", "after": "\"bumping\"", "start_char_pos": 219, "end_char_pos": 228}, {"type": "R", "before": "\u201cextraordinary circumstances\u201d", "after": "\"extraordinary circumstances\"", "start_char_pos": 520, "end_char_pos": 549}, {"type": "R", "before": "\u201cIt\u2019", "after": "\"It'", "start_char_pos": 640, "end_char_pos": 644}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 725, "end_char_pos": 726}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 791, "end_char_pos": 792}, {"type": "R", "before": "\u201cgrey areas\u201d but added \u201c", "after": "\"grey areas\" but added \"", "start_char_pos": 1064, "end_char_pos": 1088}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1142, "end_char_pos": 1143}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1341, "end_char_pos": 1342}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1356, "end_char_pos": 1357}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1502, "end_char_pos": 1503}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1561, "end_char_pos": 1562}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1688, "end_char_pos": 1689}], "sents_char_pos": [0, 191, 308, 378, 487, 639, 811, 982, 1141, 1253, 1555]}
+{"doc_id": "49294", "revision_depth": "1", "before_revision": "Observatories around the world watched the skies early on Sunday morning as a European space probe, the SMART-1 crash landed on the Moon; the first time a European made object has landed there and, as the first, it made quite a bang. For the culmination of its three-year mission the probe left its orbit around our nearest neighbor and smashed into the Lake of Excellence at around 4,500 mph. The impact created a brand new crater and scattered debris up to 30 miles, in contrast to the gentle touchdown of the Eagle lander (when Neil Armstrong became the first man on the moon) 37 years ago. SMART 200px|Artist's impression of SMART-1 in orbit around the Moon. (ESA)SMART-1, an unmanned probe, was launched aboard an Ariane 5 rocket on September 27, 2003 from the European Space Agency's launch site in Kourou , French Guiana. The first probe from the Small Missions for Advanced Research in Technology (SMART) group took 14 months to reach its destination. Since then it has orbited more than 3000 times, covering a staggering 62 million miles. In that time its mission has been to gather new information about the Moon's geographical and chemical make up. An ESA scientist, Bernard Foing said: \"The legacy left by the huge wealth of SMART-1 data, to be analysed in the months and years to come, is a precious contribution to Lunar science at a time when the exploration of the Moon is once again getting the worlds interest.\" Using X-ray and infrared cameras the probe took pictures of the Moon's surface; some of its findings include a mountaintop (christened the Peak of Eternal light) where the Sun never sets. Considering the distance it had traveled, the fuel consumption of SMART-1 was quite economical: the entire mission required just 62 litres (13 gallons) of liquid Xenon to fuel it. Weighing in at 376 kilograms and costing \u00a3 75 million, SMART-1 was one of the smallest and cheapest space missions. Towards the end of its mission the probe was orbiting up to 4 times a day (as opposed to twice a day at the start of its mission) as controllers brought it closer and closer to the Moon in preparation for the final act. The mission was also a test of new technologies. The miniature X-ray camera is the first in the world to be able to identify Calcium deposits in rock formations. Combined with other features the probe was, for the first time, able to map the chemical structure of large sections of the Lunar landscape . Manuel Grande, the University of Wales scientist in charge of the camera, said: \"What was particularly pleasing was the calcium signal [...] This is the first time we've been able to take an inventory of all the rock-forming elements of the moon.\" A similar camera is expected to be included on a similar Indian mission, the Chandrayaan-1 , due to be launched in 2007-2008. Another new technology used by the probe was its engine, called a Hall effect thruster , a new form of Ion thruster (first considered by scientists in the 1950's). Previously this type of engine was only flown on Russian satellites , and this was the first time one has ever powered a craft beyond earth orbit. The thruster works by applying a large voltage across a magnetic coil , creating a strong magnetic field. This ionises the Xenon fuel supply which accelerates the ions to high speeds, pushing the craft forward. The propulsion of such an engine is around 3 times that of a normal chemical rocket. The thruster was powered by 2 solar panels on either side of the probe. The engine's small size and cost-efficiency helped keep down the mission budget. However there are drawbacks; for example, maneuvers have to be carried out in long progressive burns rather than with short sharp bursts. A hall effect engine will also be used on the Bepi-Colombo mission to Mercury in 2013. ESA sources say the mission was entirely successful in its aim to test new technology and obtain more data about the Moon. \"It was really a great mission for the agency,\" said mission manager Gerhard Schwehm , \"It was a technology demonstrator that grew up and provide lots of beautiful science data.\" ", "after_revision": "Observatories around the world watched the skies early on Sunday morning as a European space probe, the crash landed on the Moon; the first time a European made object has landed there and, as the first, it made quite a bang. For the culmination of its three-year mission the probe left its orbit around our nearest neighbor and smashed into the at around 4,500 mph. The impact created a brand new and scattered up to 30 miles, in contrast to the gentle touchdown of the Eagle lander (when Neil Armstrong became the first man on the moon) 37 years ago. SMART 200px|Artist's impression of SMART-1 in orbit around the Moon. (ESA)SMART-1, an unmanned probe, was launched aboard an rocket on September 27, 2003 from the European Space Agency's launch site in , French Guiana. The first probe from the Small Missions for Advanced Research in Technology (SMART) group took 14 months to reach its destination. Since then it has orbited more than 3000 times, covering a staggering 62 million miles. In that time its mission has been to gather new information about the Moon's geographical and chemical make up. An ESA scientist, said: \"The legacy left by the huge wealth of SMART-1 data, to be analysed in the months and years to come, is a precious contribution to Lunar science at a time when the exploration of the Moon is once again getting the worlds interest.\" Using and cameras the probe took pictures of the Moon's surface; some of its findings include a mountaintop (christened the Peak of Eternal light) where the Sun never sets. Considering the distance it had traveled, the fuel consumption of SMART-1 was quite economical: the entire mission required just 62 litres (13 gallons) of liquid to fuel it. Weighing in at 376 kilograms and costing 75 million, SMART-1 was one of the smallest and cheapest space missions. Towards the end of its mission the probe was orbiting up to 4 times a day (as opposed to twice a day at the start of its mission) as controllers brought it closer and closer to the Moon in preparation for the final act. The mission was also a test of new technologies. The miniature X-ray camera is the first in the world to be able to identify deposits in rock formations. Combined with other features the probe was, for the first time, able to map the chemical structure of large sections of the . Manuel Grande, the scientist in charge of the camera, said: \"What was particularly pleasing was the calcium signal [...] This is the first time we've been able to take an inventory of all the rock-forming elements of the moon.\" A similar camera is expected to be included on a similar Indian mission, the , due to be launched in 2007-2008. Another new technology used by the probe was its engine, called a , a new form of w|Ion thruster (first considered by scientists in the 1950's). Previously this type of engine was only flown on Russian , and this was the first time one has ever powered a craft beyond earth orbit. The thruster works by applying a large across a , creating a strong . This the Xenon fuel supply which accelerates the ions to high speeds, pushing the craft forward. The propulsion of such an engine is around 3 times that of a normal chemical rocket. The thruster was powered by 2 on either side of the probe. The engine's small size and cost-efficiency helped keep down the mission budget. However there are drawbacks; for example, manoeuvres have to be carried out in long progressive burns rather than with short sharp bursts. A hall effect engine will also be used on the Bepi-Colombo mission to Mercury in 2013. ESA sources say the mission was entirely successful in its aim to test new technology and obtain more data about the Moon. \"It was really a great mission for the agency,\" said mission manager , \"It was a technology demonstrator that grew up and provide lots of beautiful science data.\" Sister links", "edit_actions": [{"type": "D", "before": "SMART-1", "after": null, "start_char_pos": 104, "end_char_pos": 111}, {"type": "D", "before": "Lake of Excellence", "after": null, "start_char_pos": 354, "end_char_pos": 372}, {"type": "R", "before": "crater and scattered debris", "after": "and scattered", "start_char_pos": 425, "end_char_pos": 452}, {"type": "D", "before": "Ariane 5", "after": null, "start_char_pos": 719, "end_char_pos": 727}, {"type": "D", "before": "Kourou", "after": null, "start_char_pos": 805, "end_char_pos": 811}, {"type": "D", "before": "Bernard Foing", "after": null, "start_char_pos": 1178, "end_char_pos": 1191}, {"type": "R", "before": "X-ray and infrared", "after": "and", "start_char_pos": 1436, "end_char_pos": 1454}, {"type": "D", "before": "Xenon", "after": null, "start_char_pos": 1780, "end_char_pos": 1785}, {"type": "D", "before": "\u00a3", "after": null, "start_char_pos": 1839, "end_char_pos": 1840}, {"type": "D", "before": "Calcium", "after": null, "start_char_pos": 2259, "end_char_pos": 2266}, {"type": "D", "before": "Lunar landscape", "after": null, "start_char_pos": 2420, "end_char_pos": 2435}, {"type": "D", "before": "University of Wales", "after": null, "start_char_pos": 2457, "end_char_pos": 2476}, {"type": "D", "before": "Chandrayaan-1", "after": null, "start_char_pos": 2763, "end_char_pos": 2776}, {"type": "D", "before": "Hall effect thruster", "after": null, "start_char_pos": 2878, "end_char_pos": 2898}, {"type": "R", "before": "Ion thruster", "after": "w|Ion thruster", "start_char_pos": 2915, "end_char_pos": 2927}, {"type": "D", "before": "satellites", "after": null, "start_char_pos": 3033, "end_char_pos": 3043}, {"type": "R", "before": "voltage across a magnetic coil", "after": "across a", "start_char_pos": 3162, "end_char_pos": 3192}, {"type": "R", "before": "magnetic field. This ionises", "after": ". This", "start_char_pos": 3213, "end_char_pos": 3241}, {"type": "D", "before": "solar panels", "after": null, "start_char_pos": 3449, "end_char_pos": 3461}, {"type": "R", "before": "maneuvers", "after": "manoeuvres", "start_char_pos": 3614, "end_char_pos": 3623}, {"type": "D", "before": "Gerhard Schwehm", "after": null, "start_char_pos": 3989, "end_char_pos": 4004}, {"type": "A", "before": null, "after": "Sister links", "start_char_pos": 4099, "end_char_pos": 4099}], "sents_char_pos": [0, 137, 233, 393, 593, 662, 828, 959, 1047, 1159, 1429, 1509, 1617, 1797, 1913, 2133, 2182, 2295, 2685, 2811, 2975, 3122, 3228, 3333, 3418, 3490, 3571, 3600, 3709, 3796, 3919]}
+{"doc_id": "496755", "revision_depth": "1", "before_revision": "In this month's edition on the campaign trail: Wikinews interviews the vice presidential nominee, analysts react to the Republican choice for vice president, and Wikinews updates readers on the candidates who challenged President Barack Obama in the primaries. Summary August began with the Obama re-election campaign's continued attacks on presumptive Republican nominee Mitt Romney's decision to not release his tax records from previous years. Democratic Senator alleged that an unnamed investor from Romney's former business advised him Romney had not paid any taxes in the undisclosed years. The Romney campaign rejected the validity of Reid's comments, and Republican Senator accused Reid of lying. Thereafter, the Obama campaign began airing a new advertisement that referred to Romney's tax plan as \" in reverse\" or \"Romney Hood\". The Romney campaign countered that it was actually Obama, and not Romney, who wished to increase taxes. Further controversy spawned from the Obama-allied , which ran ads connecting Romney to the cancer death of the wife of a Union leader at . The leader said he lost healthcare coverage after Bain, which had operated the plant for a short period, shut it down. The Romney campaign claimed the shutdown occurred while Romney was running the 2002 Winter Olympics in , and asked the Obama campaign to disavow the ad; however, an Obama spokesman claimed no involvement and refused to denounce the ad. In response, Romney debuted an ad that attacked Obama as someone \"who will say or do anything to stay in power\", arguing he had \"squandered...one of his key attributes...[as] a different kind of politician who was going to take us to a better place.\" The Obama campaign offered to end the ads attacking Romney for his tax records if he released his records from the previous five years; Romney declined. His spokesman argued, \"It is clear that President Obama wants nothing more than to talk about Governor Romney's tax returns instead of the issues that matter to voters\". A report from early August suggested Obama's ads were negatively affecting Romney's likability rating and his position in the polls. Nevertheless, analysis of the previous month's receipts showed that despite the attacks, for the third straight month, the Romney campaign raised more money than Obama. Paul Ryan prepares to deliver his acceptance speech after Mitt Romney introduces him as his running mate. On August 11 during an event in front of the in , , Romney named Congressman of Wisconsin as his running mate. After an introduction, Ryan, the chairman of the and author of the budget proposal , argued the ticket \"won't duck the tough issues \u2014 we will lead.\" In response to the selection, Obama staffers remarked it \"makes clear that Romney would be a rubber stamp for the congressional GOP\" and the choice provides the Obama campaign with \"clear advantages\". Shortly thereafter, Obama's running mate, Vice President Joe Biden, himself made headlines after commenting to a partly African American audience in Virginia, \"in the first 100 days, [Romney's] going to let the big banks write their own rules \u2014 unchain . They\u2019re going to put y\u2019all back in chains.\" Romney cited this as an example of the Obama presidency's \"angry and desperate\" state and called on Obama to \"take your campaign of division and anger and hate back to Chicago\". Biden's were not the only controversial remarks connected with the August campaign. Discussing , Republican Senate candidate and Congressman of Missouri told a local radio program, \"If it's a legitimate rape, the female body has ways to try to shut that whole thing down.\" The comment drew condemnation from Republicans including Romney, who labeled it \"inexcusable\" and asked that Akin step down from the race. Obama described the remarks as \"offensive\" and his campaign attempted to use it to revive the \"\" rhetoric; chairwoman Representative argued, \"Akin\u2019s choice of words isn\u2019t the real issue here. The real issue is a Republican Party \u2014 led by Mitt Romney and Paul Ryan \u2014 whose policies on women and their health are dangerously wrong.\" Prior to the Republican National Convention, then- was projected to make landfall near the event in , . Though it eventually made landfall as a near , the first day of the convention was largely cancelled and Louisiana's Governor decided not to attend. Nevertheless, the convention was held. On the first regular day: the Romney-Ryan ticket was officially nominated; though it attracted controversy as most of the Maine delegation walked out of the proceedings as ten of the state's twenty delegates were given to Romney instead of Congressman Ron Paul. Paul had held an event before 10,000 spectators at the 's Sun Dome a day prior to the scheduled start of the convention, where he proclaimed that his continued. After the nomination, nominee's wife and New Jersey addressed the convention in prime time speeches. The next day, former Secretary of State Condoleezza Rice and governor spoke to the delegates before Paul Ryan officially accepted the vice presidential nomination in a speech that notably included the line, \"College graduates should not have to live out their 20s in their childhood bedrooms, staring up at fading Obama posters and wondering when they can move out and get going with life.\" On the final day of the convention, actor and former , Mayor made a surprise appearance and delivered an impromptu speech, which included an interview of a chair representing Obama, emphasizing his unmet promises as president. After addressing attendees, Senator of Florida introduced Romney, who took the stage and formally accepted the Republican Party presidential nomination. In his speech, Romney discussed his family, recalled some personal anecdotes, and criticized Obama, arguing the \"centerpiece of the president\u2019s entire re-election campaign is attacking success.\" Addressing Obama supporters, Romney agreed \"hope and change had a powerful appeal\" but asked, \"If you felt that excitement when you voted for Barack Obama, shouldn\u2019t you feel that way now that he\u2019s President Obama? You know there\u2019s something wrong with the kind of job he\u2019s done as president when the best feeling you had was the day you voted for him.\" In response to the convention, Obama remarked, \"what they offered over those three days was more often than not an agenda better suited for the last century. ... We might as well have watched it on a black-and-white TV.\" Early polling analysis showed the convention improved Romney's likability ratings, and in the national average for August 31, Romney edged closer with 45.9 percent support, behind Obama's 46.4 percent. Peace and Freedom Party VP nominee speaks to Wikinews Cindy Sheehan in 2007. In August, comedienne , star of the popular '90s sitcom , won the presidential nomination of the left-wing Peace and Freedom Party. She named peace activist as her running mate. Wikinews reached out to Sheehan to discuss the campaign. Sheehan is best known for her active opposition to the following the loss of her son Casey there in 2004. In protest of the war, she set up camp outside President George W. Bush's ranch in , Texas, demanding a pullout of U.S. troops and prosecution of Bush administration officials for war crimes. According to her website, Sheehan also advocates , believing it to be key to loosening the \"Imperialist/Capitalist two-party stranglehold\" on U.S. and world politics. This campaign is not Sheehan's first foray into electoral politics. In , she challenged then-House Nancy Pelosi for Congress as the nominee of the , finishing second in a field of seven candidates. During the campaign, she championed the reduction of U.S. troops abroad, and endorsed , bank , , education subsidies, , alternative fuels, and electoral reform. Judy sees the selection of Ryan as a positive for the Romney campaign. He feels that as \"one of the few serious policy thinkers in either party\", Ryan will shift the campaign into \"a more serious, solutions-oriented campaign that will make President Obama's campaign, which has focused almost solely on personal attacks against Mitt Romney, look petty and small.\" Moreover, he believes Ryan can help Romney win in the swing state of Wisconsin, which no Republican presidential candidate has won since President was re-elected in . Update on 2012 Democratic candidates With the looming, Wikinews decided to update on some of the candidates who challenged President Barack Obama during the Democratic primaries earlier this year. Of the three candidates chronicled: one is actively continuing his presidential campaign, one is backing a third party ticket, and another recently encountered a major roadblock to his goal of preventing Obama's unanimous nomination. Time Warner Cable Center, the venue for the 2012 Democratic National Convention. Anti-abortion activist of West Virginia, who received 22,734 votes in the Democratic primaries overall and who, after a strong second-place showing in the primary, qualified for delegates that the state party later denied, has been waging an independent campaign in several states to appear on the November ballot. According to Terry, he has ballot access in West Virginia, and has attained official write-in status in Colorado. Currently, he is petitioning to appear on the Kentucky and Nebraska ballots, and is hoping to be certified as a write-in candidate in Virginia, Iowa, Indiana, and Pennsylvania.", "after_revision": "In this month's edition on the campaign trail: Wikinews interviews the Peace and Freedom Party vice presidential nominee, analysts react to the Republican choice for vice president, and Wikinews updates readers on the candidates who challenged President Barack Obama in the Democratic primaries. Summary August began with the Obama re-election campaign's continued attacks on presumptive Republican nominee Mitt Romney's decision to not release his tax records from previous years. Democratic Senator Harry Reid alleged that an unnamed investor from Romney's former business advised him Romney had not paid any taxes in the undisclosed years. The Romney campaign rejected the validity of Reid's comments, and Republican Senator Lindsey Graham accused Reid of lying. Thereafter, the Obama campaign began airing a new advertisement that referred to Romney's tax plan as \" in reverse\" or \"Romney Hood\". The Romney campaign countered that it was actually Obama, and not Romney, who wished to increase taxes. Further controversy spawned from the Obama-allied , which ran ads connecting Romney to the cancer death of the wife of a Union leader at . The leader said he lost healthcare coverage after Bain, which had operated the plant for a short period, shut it down. The Romney campaign claimed the shutdown occurred while Romney was running the 2002 Winter Olympics in , and asked the Obama campaign to disavow the ad; however, an Obama spokesman claimed no involvement and refused to denounce the ad. In response, Romney debuted an ad that attacked Obama as someone \"who will say or do anything to stay in power\", arguing he had \"squandered...one of his key attributes...[as] a different kind of politician who was going to take us to a better place.\" The Obama campaign offered to end the ads attacking Romney for his tax records if he released his records from the previous five years; Romney declined. His spokesman argued, \"It is clear that President Obama wants nothing more than to talk about Governor Romney's tax returns instead of the issues that matter to voters\". A report from early August suggested Obama's ads were negatively affecting Romney's likability rating and his position in the polls. Nevertheless, analysis of the previous month's receipts showed that despite the attacks, for the third straight month, the Romney campaign raised more money than Obama. Paul Ryan prepares to deliver his acceptance speech after Mitt Romney introduces him as his running mate. On August 11 during an event in front of the in Norfolk , , Romney named Congressman Paul Ryan of Wisconsin as his running mate. After an introduction, Ryan, the chairman of the and author of the budget proposal , argued the ticket \"won't duck the tough issues \u2014 we will lead.\" In response to the selection, Obama staffers remarked it \"makes clear that Romney would be a rubber stamp for the congressional GOP\" and the choice provides the Obama campaign with \"clear advantages\". Shortly thereafter, Obama's running mate, Vice President Joe Biden, himself made headlines after commenting to a partly African American audience in Virginia, \"in the first 100 days, [Romney's] going to let the big banks write their own rules \u2014 unchain . They\u2019re going to put y\u2019all back in chains.\" Romney cited this as an example of the Obama presidency's \"angry and desperate\" state and called on Obama to \"take your campaign of division and anger and hate back to Chicago\". Biden's were not the only controversial remarks connected with the August campaign. Discussing , Republican Senate candidate and Congressman of Missouri told a local radio program, \"If it's a legitimate rape, the female body has ways to try to shut that whole thing down.\" The comment drew condemnation from Republicans including Romney, who labeled it \"inexcusable\" and asked that Akin step down from the race. Obama described the remarks as \"offensive\" and his campaign attempted to use it to revive the \"\" rhetoric; chairwoman Representative argued, \"Akin\u2019s choice of words isn\u2019t the real issue here. The real issue is a Republican Party \u2014 led by Mitt Romney and Paul Ryan \u2014 whose policies on women and their health are dangerously wrong.\" Prior to the Republican National Convention, then- was projected to make landfall near the event in , Florida . Though it eventually made landfall as a near , the first day of the convention was largely cancelled and Louisiana's Governor decided not to attend. Nevertheless, the convention was held. On the first regular day: the Romney-Ryan ticket was officially nominated; though it attracted controversy as most of the Maine delegation walked out of the proceedings as ten of the state's twenty delegates were given to Romney instead of Congressman Ron Paul. Paul had held an event before 10,000 spectators at the 's Sun Dome a day prior to the scheduled start of the convention, where he proclaimed that his continued. After the nomination, nominee's wife and New Jersey Chris Christie addressed the convention in prime time speeches. The next day, former Secretary of State Condoleezza Rice and governor spoke to the delegates before Paul Ryan officially accepted the vice presidential nomination in a speech that notably included the line, \"College graduates should not have to live out their 20s in their childhood bedrooms, staring up at fading Obama posters and wondering when they can move out and get going with life.\" On the final day of the convention, actor and former , California Mayor Clint Eastwood made a surprise appearance and delivered an impromptu speech, which included an interview of a chair representing Obama, emphasizing his unmet promises as president. After addressing attendees, Senator Marco Rubio of Florida introduced Romney, who took the stage and formally accepted the Republican Party presidential nomination. In his speech, Romney discussed his family, recalled some personal anecdotes, and criticized Obama, arguing the \"centerpiece of the president\u2019s entire re-election campaign is attacking success.\" Addressing Obama supporters, Romney agreed \"hope and change had a powerful appeal\" but asked, \"If you felt that excitement when you voted for Barack Obama, shouldn\u2019t you feel that way now that he\u2019s President Obama? You know there\u2019s something wrong with the kind of job he\u2019s done as president when the best feeling you had was the day you voted for him.\" In response to the convention, Obama remarked, \"what they offered over those three days was more often than not an agenda better suited for the last century. ... We might as well have watched it on a black-and-white TV.\" Early polling analysis showed the convention improved Romney's likability ratings, and in the national average for August 31, Romney edged closer with 45.9 percent support, behind Obama's 46.4 percent. Peace and Freedom Party VP nominee speaks to Wikinews Cindy Sheehan in 2007. In August, comedienne , star of the popular '90s sitcom , won the presidential nomination of the left-wing Peace and Freedom Party. She named peace activist Cindy Sheehan as her running mate. Wikinews reached out to Sheehan to discuss the campaign. Sheehan is best known for her active opposition to the War in Iraq following the loss of her son Casey there in 2004. In protest of the war, she set up camp outside President George W. Bush's ranch in , Texas, demanding a pullout of U.S. troops and prosecution of Bush administration officials for war crimes. According to her website, Sheehan also advocates , believing it to be key to loosening the \"Imperialist/Capitalist two-party stranglehold\" on U.S. and world politics. This campaign is not Sheehan's first foray into electoral politics. In , she challenged then-House Nancy Pelosi for Congress as the nominee of the Green Party , finishing second in a field of seven candidates. During the campaign, she championed the reduction of U.S. troops abroad, and endorsed , bank , , education subsidies, , alternative fuels, and electoral reform. Judy sees the selection of Ryan as a positive for the Romney campaign. He feels that as \"one of the few serious policy thinkers in either party\", Ryan will shift the campaign into \"a more serious, solutions-oriented campaign that will make President Obama's campaign, which has focused almost solely on personal attacks against Mitt Romney, look petty and small.\" Moreover, he believes Ryan can help Romney win in the swing state of Wisconsin, which no Republican presidential candidate has won since President Ronald Reagan was re-elected in . Update on 2012 Democratic candidates With the looming, Wikinews decided to update on some of the candidates who challenged President Barack Obama during the Democratic primaries earlier this year. Of the three candidates chronicled: one is actively continuing his presidential campaign, one is backing a third party ticket, and another recently encountered a major roadblock to his goal of preventing Obama's unanimous nomination. Time Warner Cable Center, the venue for the 2012 Democratic National Convention. Anti-abortion activist Randall Terry of West Virginia, who received 22,734 votes in the Democratic primaries overall and who, after a strong second-place showing in the primary, qualified for delegates that the state party later denied, has been waging an independent campaign in several states to appear on the November ballot. According to Terry, he has ballot access in West Virginia, and has attained official write-in status in Colorado. Currently, he is petitioning to appear on the Kentucky and Nebraska ballots, and is hoping to be certified as a write-in candidate in Virginia, Iowa, Indiana, and Pennsylvania.", "edit_actions": [{"type": "A", "before": null, "after": "Peace and Freedom Party", "start_char_pos": 71, "end_char_pos": 71}, {"type": "A", "before": null, "after": "Democratic", "start_char_pos": 251, "end_char_pos": 251}, {"type": "A", "before": null, "after": "Harry Reid", "start_char_pos": 468, "end_char_pos": 468}, {"type": "A", "before": null, "after": "Lindsey Graham", "start_char_pos": 685, "end_char_pos": 685}, {"type": "A", "before": null, "after": "Norfolk", "start_char_pos": 2471, "end_char_pos": 2471}, {"type": "A", "before": null, "after": "Paul Ryan", "start_char_pos": 2501, "end_char_pos": 2501}, {"type": "A", "before": null, "after": "Florida", "start_char_pos": 4208, "end_char_pos": 4208}, {"type": "A", "before": null, "after": "Chris Christie", "start_char_pos": 4874, "end_char_pos": 4874}, {"type": "R", "before": "Mayor", "after": "California Mayor Clint Eastwood", "start_char_pos": 5370, "end_char_pos": 5375}, {"type": "A", "before": null, "after": "Marco Rubio", "start_char_pos": 5578, "end_char_pos": 5578}, {"type": "A", "before": null, "after": "Cindy Sheehan", "start_char_pos": 6902, "end_char_pos": 6902}, {"type": "A", "before": null, "after": "War in Iraq", "start_char_pos": 7036, "end_char_pos": 7036}, {"type": "A", "before": null, "after": "Green Party", "start_char_pos": 7594, "end_char_pos": 7594}, {"type": "A", "before": null, "after": "Ronald Reagan", "start_char_pos": 8318, "end_char_pos": 8318}, {"type": "A", "before": null, "after": "Randall Terry", "start_char_pos": 8874, "end_char_pos": 8874}], "sents_char_pos": [0, 262, 448, 599, 708, 842, 946, 1085, 1204, 1357, 1440, 1611, 1691, 1827, 1844, 2014, 2147, 2316, 2422, 2535, 2684, 2885, 3140, 3362, 3446, 3635, 3774, 3881, 3966, 4105, 4359, 4398, 4473, 4660, 4821, 4923, 5314, 5541, 5695, 5890, 6105, 6244, 6406, 6667, 6744, 6876, 6923, 6980, 7087, 7279, 7446, 7514, 7645, 7806, 7877, 8170, 8535, 8769, 8850, 9166, 9280]}
+{"doc_id": "51553", "revision_depth": "1", "before_revision": "\u201cIt\u2019 s extremely difficult to get there, \u201d said Ademir Ribeiro, a foreman on the nearby Jarina ranch, the centre for rescue operations. 737 Crashed, Legacy made emergency landing A Embraer Legacy 600 owned by ExcelAire, a charter company based in Long Island, New York clipped the Boeing 737-800 SFP. The Legacy made an emergency landing at Cachimbo air force base with five passengers and two crew on board, none of whom were hurt. The Boeing plunged nose first into the rainforest and disintegrated. \u201c Neither of the pilots can understand how a 737 could have hit us without them seeing it, \u201d said Joe Sharkey, a journalist for the New York Times, in an email to his wife. Mr. Zuanazzi says it \u2019 s possible as they were traveling at hundreds of miles an hour. \u201c They said they didn \u2019 t see anything. But this is absolutely normal. \u2026In these conditions, you can only see a shadow and a noise, \u201d said Zuanazzi. Questions over collision avoidance system Investigators are trying to determine why two new aircraft equipped with the latest anti-collision technology could have collided. The Brazilian air force says that both planes were equipped with a Traffic Collision Avoidance System (TCAS) which sounds an alarm when planes get too close. \u201c It locks on the other plane \u2019 s transponders and tells the pilot whether to go up or down, \u201d John Hansman, aeronautics professor at the Massachusetts Institute of Technology, said by telephone. \u201c The 737 should have been warned to take evasive action. \u201d Hansman said that in air traffic in Brazil is complicated in some parts and vast areas are not covered by radar especially over the ocean on the Amazon Rainforest. Pilots often propose a route and at certain points check with controllers who verify the plane \u2019 s location, altitude and bearing. \u201c Apparently that process broke down somehow, \u201d Hansman said. \u201c When you get to the jungles of Brazil, you have people going in all directions. \u201d Blackboxes recovered The cockpit voice recorder and the digital flight data recorder of both planes have been recovered. The blackbox of the Legacy was taken to Embraer's headquarters at Sao Jose dos Campos, Sao Paulo. Brazil \u2019 s Civil Aviation Agency said the cause of the crash was impossible to say until the Boeing 737's two recorders, found by search teams, were examined. \u201c It might indicate they were flying an altitude they weren \u2019 t cleared to fly, \u201d Mr. Oderman said. Bill Waldock, aviation safety professor at Embry-Riddle Aeronautical University in Prescott, Arizona, says that the Legacy may have clipped the bigger jet \u2019 s horizontal stabiliser \u2014 fins that prevent the airplane from pitching up or down. \u201c A likely reason why the 737 would depart continuous flight and go vertically into the jungle at that speed would be damage or loss of the horizontal stabiliser, \u201d Mr. Waldock said. Relatives flown over crash site Relatives of the passengers have complained that they were not being informed about the ongoing search for bodies or the investigation. The air force has flown them in groups of six over to the crash site. The air force says that it was to show them how difficult it is to reach the crash site. \u201c They will be able to see the difficulties of the operation \u2026 The place is difficult [to access], there are trees of up to 40 meters (130 feet) tall, \u201d a spokesman said. \u201c The debris is scattered so rescue work is even more complicated. \u201d Worst air disaster in Brazilian history This is the worst air disaster in Brazilian history, surpassing the June 1982 crash of a VASP flight which hit a mountain near Fortaleza in northeastern Brazil, killing 137 people.", "after_revision": "\"It' s extremely difficult to get there, \" said Ademir Ribeiro, a foreman on the nearby Jarina ranch, the centre for rescue operations. 737 Crashed, Legacy made emergency landing A Embraer Legacy 600 owned by ExcelAire, a charter company based in Long Island, New York clipped the Boeing 737-800 SFP. The Legacy made an emergency landing at Cachimbo air force base with five passengers and two crew on board, none of whom were hurt. The Boeing plunged nose first into the rainforest and disintegrated. \" Neither of the pilots can understand how a 737 could have hit us without them seeing it, \" said Joe Sharkey, a journalist for the New York Times, in an email to his wife. Mr. Zuanazzi says it ' s possible as they were traveling at hundreds of miles an hour. \" They said they didn ' t see anything. But this is absolutely normal. \u2026In these conditions, you can only see a shadow and a noise, \" said Zuanazzi. Questions over collision avoidance system Investigators are trying to determine why two new aircraft equipped with the latest anti-collision technology could have collided. The Brazilian air force says that both planes were equipped with a Traffic Collision Avoidance System (TCAS) which sounds an alarm when planes get too close. \" It locks on the other plane ' s transponders and tells the pilot whether to go up or down, \" John Hansman, aeronautics professor at the Massachusetts Institute of Technology, said by telephone. \" The 737 should have been warned to take evasive action. \" Hansman said that in air traffic in Brazil is complicated in some parts and vast areas are not covered by radar especially over the ocean on the Amazon Rainforest. Pilots often propose a route and at certain points check with controllers who verify the plane ' s location, altitude and bearing. \" Apparently that process broke down somehow, \" Hansman said. \" When you get to the jungles of Brazil, you have people going in all directions. \" Blackboxes recovered The cockpit voice recorder and the digital flight data recorder of both planes have been recovered. The blackbox of the Legacy was taken to Embraer's headquarters at Sao Jose dos Campos, Sao Paulo. Brazil ' s Civil Aviation Agency said the cause of the crash was impossible to say until the Boeing 737's two recorders, found by search teams, were examined. \" It might indicate they were flying an altitude they weren ' t cleared to fly, \" Mr. Oderman said. Bill Waldock, aviation safety professor at Embry-Riddle Aeronautical University in Prescott, Arizona, says that the Legacy may have clipped the bigger jet ' s horizontal stabiliser \u2014 fins that prevent the airplane from pitching up or down. \" A likely reason why the 737 would depart continuous flight and go vertically into the jungle at that speed would be damage or loss of the horizontal stabiliser, \" Mr. Waldock said. Relatives flown over crash site Relatives of the passengers have complained that they were not being informed about the ongoing search for bodies or the investigation. The air force has flown them in groups of six over to the crash site. The air force says that it was to show them how difficult it is to reach the crash site. \" They will be able to see the difficulties of the operation ... The place is difficult [to access], there are trees of up to 40 meters (130 feet) tall, \" a spokesman said. \" The debris is scattered so rescue work is even more complicated. \" Worst air disaster in Brazilian history This is the worst air disaster in Brazilian history, surpassing the June 1982 crash of a VASP flight which hit a mountain near Fortaleza in northeastern Brazil, killing 137 people.", "edit_actions": [{"type": "R", "before": "\u201cIt\u2019", "after": "\"It'", "start_char_pos": 0, "end_char_pos": 4}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 41, "end_char_pos": 42}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 502, "end_char_pos": 503}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 593, "end_char_pos": 594}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 696, "end_char_pos": 697}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 762, "end_char_pos": 763}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 784, "end_char_pos": 785}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 894, "end_char_pos": 895}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1242, "end_char_pos": 1243}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1272, "end_char_pos": 1273}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1335, "end_char_pos": 1336}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1438, "end_char_pos": 1439}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1496, "end_char_pos": 1497}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1757, "end_char_pos": 1758}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1793, "end_char_pos": 1794}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1839, "end_char_pos": 1840}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1855, "end_char_pos": 1856}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1937, "end_char_pos": 1938}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2165, "end_char_pos": 2166}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 2317, "end_char_pos": 2318}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2377, "end_char_pos": 2378}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2397, "end_char_pos": 2398}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2572, "end_char_pos": 2573}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 2657, "end_char_pos": 2658}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2820, "end_char_pos": 2821}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 3167, "end_char_pos": 3168}, {"type": "R", "before": "\u2026", "after": "...", "start_char_pos": 3228, "end_char_pos": 3229}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 3318, "end_char_pos": 3319}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 3338, "end_char_pos": 3339}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 3405, "end_char_pos": 3406}], "sents_char_pos": [0, 135, 300, 432, 501, 674, 761, 801, 832, 910, 1083, 1241, 1437, 1495, 1661, 1792, 1854, 1936, 2059, 2157, 2316, 2416, 2656, 2839, 3007, 3077, 3166, 3229, 3337, 3404]}
+{"doc_id": "51762", "revision_depth": "1", "before_revision": "Sports presenter for 3 News has given an unsatisfactory letter of apology after he abused a taxi driver in Taupo while he was drunk. The taxi driver, Mere Wall, was verbally abused by Brown on September 13 where he, allegedly, called Wall a \"Tuwharetoa whore and bitch,\" and a \"Tainui whore and bitch.\" Brown was then punched by the partner of a woman he had insulted. Brown sent an unsigned letter of apology to Wall, which Wall said she received last week , she had asked for one after the incident occurred . Wall said she was unhappy with the letter and has written to TV3 to complain. Wall said that the letter was two paragraphs long and said that due to a concussion Brown cannot remember the incident but if he did do something wrong then he is sorry. The letter contained no return address but she said: \"I have written to TV3 [about the letter].\" Wall hopes to get a better apology. However Wall has admitted that she did make some comments about Brown after the incident, Wall said: \"But it has gone on and on.\" Brown was stood down after the incident by TV3 and Roger Beaumont, a spokesman for TV3, said that he is still not back at work and it is unsure when, if, he returns . \"The investigation is still continuing. TV3 and police were investigating the incident but it is not known how long the investigation would take.\" TV3 was also conducting their own investigation of which included hiring a private investigator. They said that they are not ruling out any disciplinary action if the allegations are proved to be correct.", "after_revision": "Clint Brown, a sports presenter for 3 News , has given a reportedly \"unsatisfactory\" letter of apology after he abused a taxi driver in Taupo while drunk. The taxi driver, Mere Wall, was verbally abused by Brown on September 13 where he, allegedly, called Wall a \"Tuwharetoa whore and bitch,\" and a \"Tainui whore and bitch.\" Brown was then punched by the partner of a woman he had insulted. Wall had asked for an apology after the incident. Brown sent an unsigned letter of apology to Wall, which Wall said she received last week . Wall said she was unhappy with the letter , and has written to TV3 to complain. Wall said that the letter was two paragraphs long , and stated that Brown cannot remember the incident due to concussion, but if he did do something wrong then he is sorry. The letter contained no return address . Wall hopes to get a better apology, saying \"I have written to TV3 [about the letter].\" Wall admits to making some comments about Brown after the incident, Wall said: \"But it has gone on and on.\" Brown was stood down after the incident by TV3 . Roger Beaumont, a spokesman for TV3, said that he is still not back at work and it is unsure when, or if, he will return . \"The investigation is still continuing. TV3 and police were investigating the incident but it is not known how long the investigation would take.\" TV3 was also conducting their own investigation , which included hiring a private investigator. They are not ruling out any disciplinary action if the allegations are proved to be correct.", "edit_actions": [{"type": "R", "before": "Sports", "after": "Clint Brown, a sports", "start_char_pos": 0, "end_char_pos": 6}, {"type": "R", "before": "has given an unsatisfactory", "after": ", has given a reportedly \"unsatisfactory\"", "start_char_pos": 28, "end_char_pos": 55}, {"type": "D", "before": "he was", "after": null, "start_char_pos": 119, "end_char_pos": 125}, {"type": "A", "before": null, "after": "Wall had asked for an apology after the incident.", "start_char_pos": 369, "end_char_pos": 369}, {"type": "D", "before": ", she had asked for one after the incident occurred", "after": null, "start_char_pos": 459, "end_char_pos": 510}, {"type": "A", "before": null, "after": ",", "start_char_pos": 555, "end_char_pos": 555}, {"type": "R", "before": "and said that due to a concussion", "after": ", and stated that", "start_char_pos": 642, "end_char_pos": 675}, {"type": "A", "before": null, "after": "due to concussion,", "start_char_pos": 711, "end_char_pos": 711}, {"type": "R", "before": "but she said:", "after": ". Wall hopes to get a better apology, saying", "start_char_pos": 802, "end_char_pos": 815}, {"type": "D", "before": "Wall hopes to get a better apology.", "after": null, "start_char_pos": 860, "end_char_pos": 895}, {"type": "R", "before": "However Wall has admitted that she did make", "after": "Wall admits to making", "start_char_pos": 896, "end_char_pos": 939}, {"type": "R", "before": "and", "after": ".", "start_char_pos": 1073, "end_char_pos": 1076}, {"type": "A", "before": null, "after": "or", "start_char_pos": 1176, "end_char_pos": 1176}, {"type": "R", "before": "returns", "after": "will return", "start_char_pos": 1184, "end_char_pos": 1191}, {"type": "R", "before": "of", "after": ",", "start_char_pos": 1389, "end_char_pos": 1391}, {"type": "D", "before": "said that they", "after": null, "start_char_pos": 1443, "end_char_pos": 1457}], "sents_char_pos": [0, 132, 302, 368, 512, 591, 762, 859, 895, 1233, 1340, 1437]}
+{"doc_id": "52426", "revision_depth": "1", "before_revision": "An article published in the New York Times on December 15, 1915 on the Armenian Genocide. Today, the French National Assembly passed a bill that would penalise what the bill calls negationism of the Armenian Genocide . The French government however opposes the bill; Catherine Colonna, Minister charged with European Affairs, reacted that \"It's the task, first and foremost, of historians and not of lawmakers to clarify history.\" The label \" genocide \" is disputed by the Turkish government, who has called the vote a \"serious blow\" to diplomatic relations. Turkey has been known to prosecute Turkish intellectuals who discuss the Armenian genocide, including recent Nobel Prize winner Orhan Pamuk . Under the Turkish Penal Code, \"prosecution for anti-national plots\" faces those who call \"for the recognition of the Armenian genocide\". Turkey's Prime Minister Erdo\u011fan had warned France to look into its own colonial past in Africa instead of demanding Turkish recognition of the events. Ali Babacan , the Turkish Minister of Economy, in Brussels for talks on Turkey's E.U.-membership, said he could not exclude that people would start boycotting French products in Turkey. In a recent visit to Armenia, the French President Jacques Chirac launched the idea that recognition as a \"genocide\" would be necessary for Turkey to enter the E.U., causing the media to label it as the \"Chirac criterion\". The European Commission, which has confirmed that such a criterion would not be instituted, deplored the initiative of the French parliament, because it could damage contacts with the European Union. Political map showing countries and individual U.S. states which have recognized the Armenian Genocide. Most historians view the events comprising the Armenian genocide as a state-sponsored plan of mass extermination. Their reasons include various eye witness reports, Turkey's recruitment of violent criminals to posts within the \"Special Organization\" , and the sheer number of dead, estimates of which remain as high as 1.5 million. Some politically influential countries like the U.S., Canada and France have driven efforts to interpret these events as an attempt to eradicate an ethnic group. The Turkish government, as well as a few historians, estimate the number of casualties much lower, and attribute them to inter-ethnic strife, disease and famine during World War I . Armenia has congratulated France over its \"natural response\" to an \"aggressive\" policy of \"denial\" by the Turkish government. Armenians often argue that Turkey's recognition will help prevent similar events in the future. These assertions include claims that Scheubner-Richter's observations of the Armenian genocide had a formative influence upon Hitler's plans for the Jews . The French bill provides for a 1-year prison sentence and a \u20ac 45,000 fine, the same as for Holocaust denial . It must still be approved by the Senate and the President, and due to the parliamentary calendar, news sources think it is unlikely that it will be discussed before the end of the legislation period in February 2007.", "after_revision": "An article published in the on December 15, 1915 on the Armenian Genocide. Today, the French passed a bill that would penalise what the bill calls of the . The French government however opposes the bill; Catherine Colonna, Minister charged with European Affairs, reacted that \"It's the task, first and foremost, of historians and not of lawmakers to clarify history.\" The label \" \" is disputed by the Turkish government, who has called the vote a \"serious blow\" to diplomatic relations. Turkey has been known to prosecute Turkish intellectuals who discuss the Armenian genocide, including recent Nobel Prize winner . Under the Turkish Penal Code, \"prosecution for anti-national plots\" faces those who call \"for the recognition of the Armenian genocide\". had warned France to look into its own colonial past in Africa instead of demanding Turkish recognition of the events. , the Turkish Minister of Economy, in for talks on Turkey's E.U.-membership, said he could not exclude that people would start boycotting French products in Turkey. In a recent visit to Armenia, the Jacques Chirac launched the idea that recognition as a \"genocide\" would be necessary for Turkey to enter the E.U., causing the media to label it as the \"Chirac criterion\". The European Commission, which has confirmed that such a criterion would not be instituted, deplored the initiative of the French parliament, because it could damage contacts with the European Union. Political map showing countries and individual U.S. states which have recognized the Armenian Genocide. Most historians view the events comprising the Armenian genocide as a state-sponsored plan of mass extermination. Their reasons include various eye witness reports, Turkey's recruitment of violent criminals to posts within the , and the sheer number of dead, estimates of which remain as high as 1.5 million. Some politically influential countries like the U.S., Canada , and France have driven efforts to interpret these events as an attempt to eradicate an ethnic group. The Turkish government, as well as a few historians, estimate the number of casualties much lower, and attribute them to inter-ethnic strife, disease and famine during . Armenia has congratulated France over its \"natural response\" to an \"aggressive\" policy of \"denial\" by the Turkish government. Armenians often argue that Turkey's recognition will help prevent similar events in the future. These assertions include claims that observations of the Armenian genocide had a formative influence upon plans for the . The French bill provides for a 1-year prison sentence and a 45,000 fine, the same as for . It must still be approved by the and the President, and due to the parliamentary calendar, news sources think it is unlikely that it will be discussed before the end of the legislation period in February 2007.", "edit_actions": [{"type": "D", "before": "New York Times", "after": null, "start_char_pos": 28, "end_char_pos": 42}, {"type": "D", "before": "National Assembly", "after": null, "start_char_pos": 108, "end_char_pos": 125}, {"type": "R", "before": "negationism of the Armenian Genocide", "after": "of the", "start_char_pos": 180, "end_char_pos": 216}, {"type": "D", "before": "genocide", "after": null, "start_char_pos": 443, "end_char_pos": 451}, {"type": "D", "before": "Orhan Pamuk", "after": null, "start_char_pos": 687, "end_char_pos": 698}, {"type": "D", "before": "Turkey's Prime Minister Erdo\u011fan", "after": null, "start_char_pos": 838, "end_char_pos": 869}, {"type": "D", "before": "Ali Babacan", "after": null, "start_char_pos": 989, "end_char_pos": 1000}, {"type": "D", "before": "Brussels", "after": null, "start_char_pos": 1039, "end_char_pos": 1047}, {"type": "D", "before": "French President", "after": null, "start_char_pos": 1209, "end_char_pos": 1225}, {"type": "D", "before": "\"Special Organization\"", "after": null, "start_char_pos": 1929, "end_char_pos": 1951}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2095, "end_char_pos": 2095}, {"type": "D", "before": "World War I", "after": null, "start_char_pos": 2365, "end_char_pos": 2376}, {"type": "D", "before": "Scheubner-Richter's", "after": null, "start_char_pos": 2638, "end_char_pos": 2657}, {"type": "D", "before": "Hitler's", "after": null, "start_char_pos": 2727, "end_char_pos": 2735}, {"type": "D", "before": "Jews", "after": null, "start_char_pos": 2750, "end_char_pos": 2754}, {"type": "D", "before": "\u20ac", "after": null, "start_char_pos": 2817, "end_char_pos": 2818}, {"type": "D", "before": "Holocaust denial", "after": null, "start_char_pos": 2848, "end_char_pos": 2864}, {"type": "D", "before": "Senate", "after": null, "start_char_pos": 2900, "end_char_pos": 2906}], "sents_char_pos": [0, 89, 218, 266, 430, 558, 700, 837, 988, 1174, 1397, 1597, 1701, 1815, 2033, 2196, 2504, 2600, 2756, 2866]}
+{"doc_id": "52909", "revision_depth": "1", "before_revision": "Q: What one election issue do you feel is most relevant to your ward in this election? A: Promoting quality communities. Ward 44 is a great place to live and we have lots of parkland, lots of green space, a new waterfront trail and community centers. To keep it that way I will: Promote open communication so that no planning application will go ahead without the community \u2019 s involvement. Support the Highland Creek Community Center. The first step towards achieving this has already been taken. It was included in the April 2006 Capital Budget. Make Property Standards Enforcement a Priority. We all enjoy our well-maintained neighbourhoods. To achieve this I will support hiring more enforcement officers for our community Q: Why do you want to represent this particular ward on council? A: I have lived in the community for 23 years and have worked at City Hall for the past 3 years so I know this community, the people and the issues. I know this job. I \u2019 ve listened and heard residents \u2019 concerns. I am now ready to act on their behalf because I know the priorities will be to address infill development, property standards and traffic. I will support finding solutions to garbage, transit and crime. We need to invest in our City \u2019 s future. My other previous community commitments include: Centennial Community and Recreation Association (CCRA) Executive Heart and Stroke, Fundraising Chair West Hill Softball League, Volunteer Parent Council and Teacher \u2019 s Assistant Scouts Canada, Vice Chair and Key Leader West Hill Community Advisory Panel Q: If you were elected as a \"rookie\" councillor, What would you bring to the table beyond the incumbent? A: I \u2019 m currently the assistant to the outgoing City Councillor and sometimes there is the assumption that I would be a carbon copy. I \u2019 m not. I have my own views on the issues and my own way of getting the job done. Too often politicians get into office and we never hear from them except at election time. I always have been accessible and will continue to do so. Q: What does Toronto mean to you? A: For me, Toronto means unique communities working together to make a great City. I love living in east Scarborough with the Rouge Park and the waterfront trail on my doorstep. While I think my own community is a pretty remarkable place, I can \u2019 t imagine Toronto with the Taste of the Danforth, the jazz festivals, the energy of downtown, all its restaurants, or the tranquility of High Park. Each community has something to offer and together they combine to make our City a vibrant place to live. Q: How are you currently involved in the community? A: I am currently involved in the community by putting my modest writing talents to work writing articles, under the pen name: \u201cCanada Kev\u201d for New Canadians for a newspaper called: Likha, which targets people originally from the Philippines. Hopefully these articles, written from a Canadian perspective, will help New Canadians learn about our cultural lifestyles, traditions and our inclusive Canadian culture. Additionally, for a number of years I have been upbraiding the mainstream Toronto media over their unfair and often times biased characterization of Scarborough in relation to their crime reporting methods. For reasons unknown to most residents of Scarborough, the Toronto media seems to take a perverse delight in attacking Scarborough at every opportunity but when crime rears its' ugly head in North York or Etobicoke (these are all former boroughs of Toronto before amalgamation) the Toronto media continues to obscure the fact that crime is occurring at horrific rates there. What the media does to obscure the reality of criminality in North York and Etobicoke is to use code words, such as \u201c Jane and Finch \u201d or \u201cRexdale\u201d , rather than to use North York or Etobicoke when violent crime occurs there. Additionally, in many instances Scarborough is blamed for North York crime and I have forced the media on many occasions to retract inaccurate stories that wrongly identified Scarborough as crime scenes when in fact the crime occurred in North York and not Scarborough. Q: What does Toronto mean to you? A: When I think about Toronto I think about home. I think about my ancestors who came to this great city via Ireland and the British Army in the 1850s and who had the intelligence to settle here. Toronto is where I was born and it is where I will live, fate willing, for the rest of my life. Toronto literally means \u201cMeeting Place\u201d deriving its meaning from the First Nations People who traded here. Toronto is still the \u201cMeeting Place\u201d for people from all walks of life and ethnic and religious backgrounds and is rich in history and natural beauty.", "after_revision": "Q: What one election issue do you feel is most relevant to your ward in this election? A: Promoting quality communities. Ward 44 is a great place to live and we have lots of parkland, lots of green space, a new waterfront trail and community centers. To keep it that way I will: Promote open communication so that no planning application will go ahead without the community ' s involvement. Support the Highland Creek Community Center. The first step towards achieving this has already been taken. It was included in the April 2006 Capital Budget. Make Property Standards Enforcement a Priority. We all enjoy our well-maintained neighbourhoods. To achieve this I will support hiring more enforcement officers for our community Q: Why do you want to represent this particular ward on council? A: I have lived in the community for 23 years and have worked at City Hall for the past 3 years so I know this community, the people and the issues. I know this job. I ' ve listened and heard residents ' concerns. I am now ready to act on their behalf because I know the priorities will be to address infill development, property standards and traffic. I will support finding solutions to garbage, transit and crime. We need to invest in our City ' s future. My other previous community commitments include: Centennial Community and Recreation Association (CCRA) Executive Heart and Stroke, Fundraising Chair West Hill Softball League, Volunteer Parent Council and Teacher ' s Assistant Scouts Canada, Vice Chair and Key Leader West Hill Community Advisory Panel Q: If you were elected as a \"rookie\" councillor, What would you bring to the table beyond the incumbent? A: I ' m currently the assistant to the outgoing City Councillor and sometimes there is the assumption that I would be a carbon copy. I ' m not. I have my own views on the issues and my own way of getting the job done. Too often politicians get into office and we never hear from them except at election time. I always have been accessible and will continue to do so. Q: What does Toronto mean to you? A: For me, Toronto means unique communities working together to make a great City. I love living in east Scarborough with the Rouge Park and the waterfront trail on my doorstep. While I think my own community is a pretty remarkable place, I can ' t imagine Toronto with the Taste of the Danforth, the jazz festivals, the energy of downtown, all its restaurants, or the tranquility of High Park. Each community has something to offer and together they combine to make our City a vibrant place to live. Q: How are you currently involved in the community? A: I am currently involved in the community by putting my modest writing talents to work writing articles, under the pen name: \"Canada Kev\" for New Canadians for a newspaper called: Likha, which targets people originally from the Philippines. Hopefully these articles, written from a Canadian perspective, will help New Canadians learn about our cultural lifestyles, traditions and our inclusive Canadian culture. Additionally, for a number of years I have been upbraiding the mainstream Toronto media over their unfair and oftentimes biased characterization of Scarborough in relation to their crime reporting methods. For reasons unknown to most residents of Scarborough, the Toronto media seems to take a perverse delight in attacking Scarborough at every opportunity but when crime rears its' ugly head in North York or Etobicoke (these are all former boroughs of Toronto before amalgamation) the Toronto media continues to obscure the fact that crime is occurring at horrific rates there. What the media does to obscure the reality of criminality in North York and Etobicoke is to use code words, such as \" Jane and Finch \" or \"Rexdale\" , rather than to use North York or Etobicoke when violent crime occurs there. Additionally, in many instances Scarborough is blamed for North York crime and I have forced the media on many occasions to retract inaccurate stories that wrongly identified Scarborough as crime scenes when in fact the crime occurred in North York and not Scarborough. Q: What does Toronto mean to you? A: When I think about Toronto I think about home. I think about my ancestors who came to this great city via Ireland and the British Army in the 1850s and who had the intelligence to settle here. Toronto is where I was born and it is where I will live, fate willing, for the rest of my life. Toronto literally means \"Meeting Place\" deriving its meaning from the First Nations People who traded here. Toronto is still the \"Meeting Place\" for people from all walks of life and ethnic and religious backgrounds and is rich in history and natural beauty.", "edit_actions": [{"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 374, "end_char_pos": 375}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 960, "end_char_pos": 961}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 994, "end_char_pos": 995}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1239, "end_char_pos": 1240}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1465, "end_char_pos": 1466}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1665, "end_char_pos": 1666}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1796, "end_char_pos": 1797}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2307, "end_char_pos": 2308}, {"type": "R", "before": "\u201cCanada Kev\u201d", "after": "\"Canada Kev\"", "start_char_pos": 2742, "end_char_pos": 2754}, {"type": "R", "before": "often times", "after": "oftentimes", "start_char_pos": 3139, "end_char_pos": 3150}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 3726, "end_char_pos": 3727}, {"type": "R", "before": "\u201d or \u201cRexdale\u201d", "after": "\" or \"Rexdale\"", "start_char_pos": 3743, "end_char_pos": 3757}, {"type": "R", "before": "\u201cMeeting Place\u201d", "after": "\"Meeting Place\"", "start_char_pos": 4456, "end_char_pos": 4471}, {"type": "R", "before": "\u201cMeeting Place\u201d", "after": "\"Meeting Place\"", "start_char_pos": 4561, "end_char_pos": 4576}], "sents_char_pos": [0, 86, 120, 250, 390, 435, 497, 547, 595, 644, 791, 940, 957, 1005, 1144, 1208, 1250, 1659, 1793, 1804, 1878, 1969, 2061, 2144, 2239, 2456, 2562, 2614, 2857, 3028, 3235, 3609, 3835, 4105, 4139, 4189, 4335, 4431, 4539]}
+{"doc_id": "53023", "revision_depth": "2", "before_revision": "Q: List the three most important issues in your campaign. A: - Gap between council actions and concerns of Bramptonians. - Community safety and security and relationship between Police and the community mostly the relationship between the Police and the visible minorities \u2019 community - Infrastructure and public transit concerns Q: Much of Brampton's existing council is seasoned in the civic political process. What could you bring to the table as a \"rookie\", above and beyond the current roster of councilors? A: The present council seems to be away of the reality in this fast growing city. They are veterans, with all respect, they are in urgent need of retirement. We \u2019 re grateful of their effort and commitment for all these years, but we must now realize that they are all running out of ideas. They \u2019 ve been cut off guard by the population growth and they seem to be trailing behind looking desperately for ways to catch up with a train speeding away. The best way to give a better future to our city is to give the chance to \"rookies\" to come in with fresh mind and fresh ideas that would help our city to cope with this sudden growth. We need to rejuvenate the council chamber and create some sort of positive actions that would consolidate the path of Brampton in this twenty first century. We all appreciate the hard work done by our predecessors, but it is the time to look beyond their path of actions and act accordingly to keep Brampton into the right direction. Brampton has now a diverse culture and ethnicity that in reality should be our strength. The existing council, despite their talk, is not really walking the talk. There are no actions to really create a sense of belongings to these newcomers in our city. Without a doubt there is need of new energy, a need of rejuvenation. There are obvious actions that a council should tackle which haven \u2019 t been done properly. Certainly they \u2019 ve been there so long that they don \u2019 t see any pressure or obligation. We must work to support our youth, seniors and people with special needs. We must improve on the present infrastructure and develop the public transit within Brampton and beyond. Of course, the safety measures are paramount and it is important to create a great atmosphere of respect and collaboration between Police and the community. We must not forget that the community is important in solving many crimes. In collaboration with Bramptonians, we must ensure that the recreation aspects are well considered through parks, recreation centers, and cultural programs. The city must remain safe, secure, clean, lively and vibrant at all time. Q: How do you feel about Brampton's rate of expansion? Council recently capped the annual amount of new development; do you agree completely with this decision, would you have slowed development even further, or not have imposed a cap at all? A: I strongly believe that the Brampton \u2019 s rate of expansion is excessive, out of control and way beyond what is acceptable. I have the feeling that is essentially driven by financial gain and the wellbeing of the population is not placed at the center of this abusive development. No doubt the present council has capped the annual amount of new development although this restriction came a little too late. Looking 10 to 20 years down the road, the development we \u2019 ve witnessed these last years would be a challenge if we do not anticipate and pro-actively prevent its negative effects. I am a strong advocate of a slow and controlled development while ensuring the population safety and wellbeing. The brutal development of the last years is the main culprit of the traffic congestions and the blatant need of the extension of 410 or even the construction of a new highway. The cap set at the moment is welcomed however it is not the solution but part of the solution. We must first and foremost control the development, slow it down if necessary or accelerate it if the conditions are ideals. Q: What are your opinions on Brampton's congestion and the level of public transit funding? A: I am shocked and ashamed to see a new development area dealing with traffic congestion. It shows that the present council has not done their homework properly and allowed an excessive development without ensure that there was the proper infrastructure around. Who are now paying the price? Bramptonians... They \u2019 ve never been at the center of the preoccupation of the council and financial interest took the power over the population wellbeing. This must be said and must be condemned. In the same token, the public transit development has not followed the population growth and the new developments within the city. The present council has not push deep enough to secure and increase the necessary funding that would allow Bramptonians to properly move within the city or outside the city while avoiding long waiting hours, if the bus actually show up. We must look for an immediate remediation of the issues and intensively work to restore the confidence of the population in terms of congestion, regularity and availability of the public transit. To do that, we must increase the funding level and set it at the level which would provide to Bramptonians what they actually need. Comme Conseiller municipal, je travaillerai durement pour faire de Brampton, une ville vivante, propre, s\u00e9curitaire, exotique et une ville ou il fait bon vivre dans notre diversit\u00e9 linguistique, ethnique et culturelle. Les habitants de Brampton seront au centre de toutes mes pr\u00e9occupations et d\u00e9cisions et je rechercherai toujours \u00e0 satisfaire leur bien-\u00eatre d \u2019 abord et avant tout. La ville de Brampton a certainement besoin de remplir ses caisses, mais je ne l \u2019 encouragerai jamais au d\u00e9triment du bien-\u00eatre des populations. J \u2019 \u0153uvrerai pour assurer la s\u00e9curit\u00e9 des r\u00e9sidents de la ville, en encourageant la pr\u00e9sence polici\u00e8re dans les rues et surtout il faudrait combattre les pr\u00e9jug\u00e9s policiers qui favorisent certains arrestations arbitraires. Je travaillerai d \u2019 arrache-pied pour faire de Brampton une ville mod\u00e8le dans le Canada. Un exemple d\u2019 int\u00e9gration culturelle dans la diversit\u00e9 multi ethnique et multi culturelle, Un exemple dans l\u2019 int\u00e9gration linguistique en rapprochant les populations des deux langues officielles du Canada (fran\u00e7ais et anglais) et aussi en incluant les autres minorit\u00e9s linguistiques, Un exemple de ville r\u00e9cr\u00e9atif en d\u00e9veloppant les attractions r\u00e9cr\u00e9atives pour enfants, jeunes et personnes \u00e2g\u00e9es, Un exemple infrastructurel en am\u00e9liorant l \u2019 infrastructure pr\u00e9sente dans le but de diminuer les embouteillages et aussi d \u2019 am\u00e9liorer le transport en commun dans la ville et vers Toronto.", "after_revision": "Q: List the three most important issues in your campaign. A: - Gap between council actions and concerns of Bramptonians. - Community safety and security and relationship between Police and the community mostly the relationship between the Police and the visible minorities ' community - Infrastructure and public transit concerns Q: Much of Brampton's existing council is seasoned in the civic political process. What could you bring to the table as a \"rookie\", above and beyond the current roster of councilors? A: The present council seems to be away of the reality in this fast growing city. They are veterans, with all respect, they are in urgent need of retirement. We ' re grateful of their effort and commitment for all these years, but we must now realize that they are all running out of ideas. They ' ve been cut off guard by the population growth and they seem to be trailing behind looking desperately for ways to catch up with a train speeding away. The best way to give a better future to our city is to give the chance to \"rookies\" to come in with fresh mind and fresh ideas that would help our city to cope with this sudden growth. We need to rejuvenate the council chamber and create some sort of positive actions that would consolidate the path of Brampton in this twenty first century. We all appreciate the hard work done by our predecessors, but it is the time to look beyond their path of actions and act accordingly to keep Brampton into the right direction. Brampton has now a diverse culture and ethnicity that in reality should be our strength. The existing council, despite their talk, is not really walking the talk. There are no actions to really create a sense of belongings to these newcomers in our city. Without a doubt there is need of new energy, a need of rejuvenation. There are obvious actions that a council should tackle which haven ' t been done properly. Certainly they ' ve been there so long that they don ' t see any pressure or obligation. We must work to support our youth, seniors and people with special needs. We must improve on the present infrastructure and develop the public transit within Brampton and beyond. Of course, the safety measures are paramount and it is important to create a great atmosphere of respect and collaboration between Police and the community. We must not forget that the community is important in solving many crimes. In collaboration with Bramptonians, we must ensure that the recreation aspects are well considered through parks, recreation centers, and cultural programs. The city must remain safe, secure, clean, lively and vibrant at all time. Q: How do you feel about Brampton's rate of expansion? Council recently capped the annual amount of new development; do you agree completely with this decision, would you have slowed development even further, or not have imposed a cap at all? A: I strongly believe that the Brampton ' s rate of expansion is excessive, out of control and way beyond what is acceptable. I have the feeling that is essentially driven by financial gain and the wellbeing of the population is not placed at the center of this abusive development. No doubt the present council has capped the annual amount of new development although this restriction came a little too late. Looking 10 to 20 years down the road, the development we ' ve witnessed these last years would be a challenge if we do not anticipate and pro-actively prevent its negative effects. I am a strong advocate of a slow and controlled development while ensuring the population safety and wellbeing. The brutal development of the last years is the main culprit of the traffic congestions and the blatant need of the extension of 410 or even the construction of a new highway. The cap set at the moment is welcomed however it is not the solution but part of the solution. We must first and foremost control the development, slow it down if necessary or accelerate it if the conditions are ideals. Q: What are your opinions on Brampton's congestion and the level of public transit funding? A: I am shocked and ashamed to see a new development area dealing with traffic congestion. It shows that the present council has not done their homework properly and allowed an excessive development without ensure that there was the proper infrastructure around. Who are now paying the price? Bramptonians... They ' ve never been at the center of the preoccupation of the council and financial interest took the power over the population wellbeing. This must be said and must be condemned. In the same token, the public transit development has not followed the population growth and the new developments within the city. The present council has not push deep enough to secure and increase the necessary funding that would allow Bramptonians to properly move within the city or outside the city while avoiding long waiting hours, if the bus actually show up. We must look for an immediate remediation of the issues and intensively work to restore the confidence of the population in terms of congestion, regularity and availability of the public transit. To do that, we must increase the funding level and set it at the level which would provide to Bramptonians what they actually need. Comme Conseiller municipal, je travaillerai durement pour faire de Brampton, une ville vivante, propre, s\u00e9curitaire, exotique et une ville ou il fait bon vivre dans notre diversit\u00e9 linguistique, ethnique et culturelle. Les habitants de Brampton seront au centre de toutes mes pr\u00e9occupations et d\u00e9cisions et je rechercherai toujours \u00e0 satisfaire leur bien-\u00eatre d ' abord et avant tout. La ville de Brampton a certainement besoin de remplir ses caisses, mais je ne l ' encouragerai jamais au d\u00e9triment du bien-\u00eatre des populations. J ' \u0153uvrerai pour assurer la s\u00e9curit\u00e9 des r\u00e9sidents de la ville, en encourageant la pr\u00e9sence polici\u00e8re dans les rues et surtout il faudrait combattre les pr\u00e9jug\u00e9s policiers qui favorisent certains arrestations arbitraires. Je travaillerai d ' arrache-pied pour faire de Brampton une ville mod\u00e8le dans le Canada. Un example d' int\u00e9gration culturelle dans la diversit\u00e9 multi ethnique et multi culturelle, Un example dans l' int\u00e9gration linguistique en rapprochant les populations des deux langues officielles du Canada (fran\u00e7ais et anglais) et aussi en incluant les autres minorit\u00e9s linguistiques, Un example de ville r\u00e9cr\u00e9atif en d\u00e9veloppant les attractions r\u00e9cr\u00e9atives pour enfants, jeunes et personnes \u00e2g\u00e9es, Un example infrastructurel en am\u00e9liorant l ' infrastructure pr\u00e9sente dans le but de diminuer les embouteillages et aussi d ' am\u00e9liorer le transport en commun dans la ville et vers Toronto.", "edit_actions": [{"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 273, "end_char_pos": 274}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 674, "end_char_pos": 675}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 809, "end_char_pos": 810}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1873, "end_char_pos": 1874}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1912, "end_char_pos": 1913}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1950, "end_char_pos": 1951}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2911, "end_char_pos": 2912}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3338, "end_char_pos": 3339}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4376, "end_char_pos": 4377}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5610, "end_char_pos": 5611}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5713, "end_char_pos": 5714}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5780, "end_char_pos": 5781}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 6019, "end_char_pos": 6020}, {"type": "R", "before": "exemple d\u2019", "after": "example d'", "start_char_pos": 6093, "end_char_pos": 6103}, {"type": "R", "before": "exemple dans l\u2019", "after": "example dans l'", "start_char_pos": 6184, "end_char_pos": 6199}, {"type": "R", "before": "exemple", "after": "example", "start_char_pos": 6377, "end_char_pos": 6384}, {"type": "R", "before": "exemple", "after": "example", "start_char_pos": 6491, "end_char_pos": 6498}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 6531, "end_char_pos": 6532}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 6611, "end_char_pos": 6612}], "sents_char_pos": [0, 57, 412, 512, 594, 670, 803, 962, 1147, 1304, 1481, 1570, 1644, 1736, 1805, 1896, 1985, 2059, 2164, 2321, 2396, 2553, 2627, 2682, 2744, 2870, 2996, 3153, 3280, 3461, 3573, 3749, 3844, 3969, 4061, 4152, 4324, 4354, 4370, 4510, 4551, 4682, 4919, 5115, 5247, 5466, 5632, 5777, 6000, 6089, 6103, 6199]}
+{"doc_id": "53325", "revision_depth": "2", "before_revision": "Q: What one election issue do you feel is most relevant to your ward in this election? A: There are many important issues facing Wards 9 & 10 Constituents and other people living and working in Brampton. Taxes have increased significantly, over ten percent in the last two years yet we see the infrastructure progressing too slowly. Schools aren \u2019 t being built in new areas, highways (410/427) remained virtually unchanged and the list grows daily. We have an \u2018Official Draft Plan \u2019 for the City of Brampton. The City Council and Region should start delivering on the promises. Q: What qualities or experiences do you possess, that make you more desirable than the incumbent? A: I believe Mr. Manning has been insensitive to the needs of the Constituents in Wards 9 & 10. As an example, I have seen where he has been quoted as saying City Council has done a good job keeping tax increases to the 5 \u2013 6\\% range. If this was the case in Toronto, he would be unemployed as Toronto voters wouldn \u2019 t be so accepting. The average wage has only increased by 3 \\% in the same time period. We need to make sure families can afford to live in Brampton and that they get purposeful infrastructure in place. Q: How are you currently involved in the community? A: Current President of the Brampton-Springdale Federal Liberal Riding Association. Member of the Peel Multi Cultural Council. Recipient of a Volunteer Appreciation Award from the Peel Multi Cultural Council. President of the Pearson Airport Limousine Driver \u2019 s Association. Member of the National Association of Indo-Canadians. Former member of the Great Lakes Public School Parent Council. Former member of the Amalgamated Transit Union. Founding member of the Bathinda Sports and Culture Club. Recipient of President Scouts Award. Q: Much of Brampton's existing council is seasoned in the civic political process. What could you bring to the table as a \"rookie\", above and beyond the current roster of councillors? A: I don \u2019 t feel like I am a \u201crookie\u201d since I have been very involved with Federal politics for many years. The South Asian community now represents about thirty percent of Brampton \u2019 s population yet there is no representation from the community on City Council. My goal is to be a strong voice for all of my constituents and to bring diversity to City Council. Q: The Rose Theatre recently launched. What are your thoughts on this facility? Have you had a chance to tour it yet? A: The facility itself is spectacular but came with a heavy priced tag for tax payers. Although, I haven \u2019 t been able to verify, I have heard local residents complain that local Brampton amateur theatre groups have not been able to use the facilities. I hope this facility is available for the people of Brampton, not just the elite since it belongs to all of the people of Brampton. Q: The province has strongly encouraged the development of high-density residences near the downtown. Do these buildings fit in with your vision of the downtown? How much say should other levels of government have in urban planning? A: I believe that Brampton has not encouraged enough high-density housing. For a City to remain prosperous it needs affordable housing for young people, the less fortunate and for seniors. Not everyone can afford to live in a 3000 square foot house. The people who want to remain in the City need alternatives. We don \u2019 t want young people to move away from the community because they can \u2019 t afford their own place. I believe all levels of government have a role to play in urban planning since they all contribute in varying degrees to infrastructure and social programs. Q: How do you feel about Brampton's rate of expansion? Council recently capped the annual amount of new development; do you agree completely with this decision, would you have slowed development even further, or not have imposed a cap at all? A: I have already commented on this but let me expand a little. The City lost significant revenue from development charges when they approved many more building lots than usual before implementing higher development charges. Millions could have been added to the City \u2019 s revenue if we had spread out the development over a longer period of time. Q: What are your opinions on Brampton's congestion and the level of public transit funding? A: Brampton seems to have been forgotten by government while other large communities like Mississauga and Markham got major expansion to transit and road systems. Brampton \u2019 s transit system is one of the largest expenditures for the City but has not been efficient in serving the people. We need to improve this immediately. Q: What does Brampton mean to you? A: Brampton is my family \u2019 s home. My children go to school here, I work in the Brampton area and we shop here. We worship in Brampton and many of our friends live in Brampton. This is why I am so passionate about making Brampton a great community to live and work.", "after_revision": "Q: What one election issue do you feel is most relevant to your ward in this election? A: There are many important issues facing Wards 9 & 10 Constituents and other people living and working in Brampton. Taxes have increased significantly, over ten percent in the last two years yet we see the infrastructure progressing too slowly. Schools aren ' t being built in new areas, highways (410/427) remained virtually unchanged and the list grows daily. We have an \u2018Official Draft Plan ' for the City of Brampton. The City Council and Region should start delivering on the promises. Q: What qualities or experiences do you possess, that make you more desirable than the incumbent? A: I believe Mr. Manning has been insensitive to the needs of the Constituents in Wards 9 & 10. As an example, I have seen where he has been quoted as saying City Council has done a good job keeping tax increases to the 5 \u2013 6\\% range. If this was the case in Toronto, he would be unemployed as Toronto voters wouldn ' t be so accepting. The average wage has only increased by 3 \\% in the same time period. We need to make sure families can afford to live in Brampton and that they get purposeful infrastructure in place. Q: How are you currently involved in the community? A: Current President of the Brampton-Springdale Federal Liberal Riding Association. Member of the Peel Multi Cultural Council. Recipient of a Volunteer Appreciation Award from the Peel Multi Cultural Council. President of the Pearson Airport Limousine Driver ' s Association. Member of the National Association of Indo-Canadians. Former member of the Great Lakes Public School Parent Council. Former member of the Amalgamated Transit Union. Founding member of the Bathinda Sports and Culture Club. Recipient of President Scouts Award. Q: Much of Brampton's existing council is seasoned in the civic political process. What could you bring to the table as a \"rookie\", above and beyond the current roster of councillors? A: I don ' t feel like I am a \"rookie\" since I have been very involved with Federal politics for many years. The South Asian community now represents about thirty percent of Brampton ' s population yet there is no representation from the community on City Council. My goal is to be a strong voice for all of my constituents and to bring diversity to City Council. Q: The Rose Theatre recently launched. What are your thoughts on this facility? Have you had a chance to tour it yet? A: The facility itself is spectacular but came with a heavy priced tag for tax payers. Although, I haven ' t been able to verify, I have heard local residents complain that local Brampton amateur theatre groups have not been able to use the facilities. I hope this facility is available for the people of Brampton, not just the elite since it belongs to all of the people of Brampton. Q: The province has strongly encouraged the development of high-density residences near the downtown. Do these buildings fit in with your vision of the downtown? How much say should other levels of government have in urban planning? A: I believe that Brampton has not encouraged enough high-density housing. For a City to remain prosperous it needs affordable housing for young people, the less fortunate and for seniors. Not everyone can afford to live in a 3000 square foot house. The people who want to remain in the City need alternatives. We don ' t want young people to move away from the community because they can ' t afford their own place. I believe all levels of government have a role to play in urban planning since they all contribute in varying degrees to infrastructure and social programs. Q: How do you feel about Brampton's rate of expansion? Council recently capped the annual amount of new development; do you agree completely with this decision, would you have slowed development even further, or not have imposed a cap at all? A: I have already commented on this but let me expand a little. The City lost significant revenue from development charges when they approved many more building lots than usual before implementing higher development charges. Millions could have been added to the City ' s revenue if we had spread out the development over a longer period of time. Q: What are your opinions on Brampton's congestion and the level of public transit funding? A: Brampton seems to have been forgotten by government while other large communities like Mississauga and Markham got major expansion to transit and road systems. Brampton ' s transit system is one of the largest expenditures for the City but has not been efficient in serving the people. We need to improve this immediately. Q: What does Brampton mean to you? A: Brampton is my family ' s home. My children go to school here, I work in the Brampton area and we shop here. We worship in Brampton and many of our friends live in Brampton. This is why I am so passionate about making Brampton a great community to live and work.", "edit_actions": [{"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 346, "end_char_pos": 347}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 482, "end_char_pos": 483}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 993, "end_char_pos": 994}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1509, "end_char_pos": 1510}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1978, "end_char_pos": 1979}, {"type": "R", "before": "\u201crookie\u201d", "after": "\"rookie\"", "start_char_pos": 1999, "end_char_pos": 2007}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2152, "end_char_pos": 2153}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2556, "end_char_pos": 2557}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3387, "end_char_pos": 3388}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3458, "end_char_pos": 3459}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4154, "end_char_pos": 4155}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4497, "end_char_pos": 4498}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4711, "end_char_pos": 4712}], "sents_char_pos": [0, 86, 203, 332, 449, 509, 578, 676, 772, 911, 1013, 1082, 1197, 1249, 1333, 1376, 1458, 1525, 1579, 1642, 1690, 1747, 1784, 1867, 1968, 2077, 2233, 2332, 2371, 2412, 2450, 2537, 2703, 2835, 2937, 2997, 3068, 3143, 3257, 3318, 3379, 3485, 3642, 3697, 3759, 3885, 3949, 4110, 4232, 4324, 4487, 4613, 4650, 4685, 4720, 4797, 4862]}
+{"doc_id": "53634", "revision_depth": "1", "before_revision": "Q: What service is most lacking in Brampton? A: Many of the seniors in that I \u2019 ve spoken to in Brampton are literally almost shut ins. They don \u2019 t have the means to get out in this great community and enjoy what they helped to create. As the Region owns equipment to provide a door-to-door transit system for them, I feel it is a shame that no one will put in the effort to help get them out and about. As we are all aging, I shudder to think that as we approach our senior years, we also will be neglected by our elected officials of the day. Q: Why have you chosen to involve yourself in the political process? A: I have always felt our elected officials should be leading by example as they are in their position not only because of us but also more importantly, representing us as a whole. I for one have had quite enough of being represented by dishonest, self-serving, immoral people as hopefully, they aren \u2019 t a reflection of the people they serve. I want to give people the option for truth, honesty and integrity. Q: What qualities or experiences do you possess, that make you more desirable than the incumbent? A: I offer honesty and integrity. It \u2019 s no secret these are qualities that are lacking in all levels of government. It \u2019 s something we all know yet continue to tolerate it. I can \u2019 t fault people for continuing to vote for it as it shows we still have hope however, how many times, how many elections pass before we say Enough? Q: Much of Brampton's existing council is quite seasoned in the civic political process. What could you bring to the table as a \"rookie\", above and beyond the current roster of councillors? A: A realistic, private sector approach to spending. I feel that even though experience is important much of council has been out of touch with real world spending for far too long to be effective. Although the current council is \u201cseasoned\u201d it\u2019 s that seasoning that has created our shortcomings and issues that have come to light during this 2006 campaign. Q: Why do you want to represent your ward on council? A: I live in this ward; I \u2019 ve lived in this ward since my street was at the northern most point in Brampton. Now, forty years later my street is central Brampton, in some areas, there have been many changes while in others very little. As my wife and I are raising my two young children here, I have a great interest in this ward. My children attend school here, attend the recreational centers and parks here and I want to insure these areas remain accessible and safe for all. I \u2019 m tired of seeing the Police run into the park at the end of my street, I would like to see increased Police patrols of the parks. Q: Of the decisions made by council since the last election, which one would you have changed, and why? A:I wouldn \u2019 t have awarded $400,000 to an outside contractor, the Red Cross, to purchase equipment followed by a multi million dollar contract to provide service for dialysis patients without putting that contract up for tender, thereby at least saving the taxpayers the original $400,000 and possibly reducing the cost of that service. The Region of Peel already has contractors under contract providing transportation service. To not include them as well as any other interested contractors doesn \u2019 t provide the best options available and that is what the bid process is intended to do. Q: What does Brampton mean to you? A: No matter where life leads me, after 40 years here, Brampton will always be \u201chome\u201d. I\u2019 ve watched Brampton grow from a small town to a thriving city, which has retained its small town feel with the tree lighting at Christmas and the beautiful Gage Park.", "after_revision": "Q: What service is most lacking in Brampton? A: Many of the seniors in that I ' ve spoken to in Brampton are literally almost shut ins. They don ' t have the means to get out in this great community and enjoy what they helped to create. As the Region owns equipment to provide a door-to-door transit system for them, I feel it is a shame that no one will put in the effort to help get them out and about. As we are all aging, I shudder to think that as we approach our senior years, we also will be neglected by our elected officials of the day. Q: Why have you chosen to involve yourself in the political process? A: I have always felt our elected officials should be leading by example as they are in their position not only because of us but also more importantly, representing us as a whole. I for one have had quite enough of being represented by dishonest, self-serving, immoral people as hopefully, they aren ' t a reflection of the people they serve. I want to give people the option for truth, honesty and integrity. Q: What qualities or experiences do you possess, that make you more desirable than the incumbent? A: I offer honesty and integrity. It ' s no secret these are qualities that are lacking in all levels of government. It ' s something we all know yet continue to tolerate it. I can ' t fault people for continuing to vote for it as it shows we still have hope however, how many times, how many elections pass before we say Enough? Q: Much of Brampton's existing council is quite seasoned in the civic political process. What could you bring to the table as a \"rookie\", above and beyond the current roster of councillors? A: A realistic, private sector approach to spending. I feel that even though experience is important much of council has been out of touch with real world spending for far too long to be effective. Although the current council is \"seasoned\" it' s that seasoning that has created our shortcomings and issues that have come to light during this 2006 campaign. Q: Why do you want to represent your ward on council? A: I live in this ward; I ' ve lived in this ward since my street was at the northern most point in Brampton. Now, forty years later my street is central Brampton, in some areas, there have been many changes while in others very little. As my wife and I are raising my two young children here, I have a great interest in this ward. My children attend school here, attend the recreational centers and parks here and I want to insure these areas remain accessible and safe for all. I ' m tired of seeing the Police run into the park at the end of my street, I would like to see increased Police patrols of the parks. Q: Of the decisions made by council since the last election, which one would you have changed, and why? A:I wouldn ' t have awarded $400,000 to an outside contractor, the Red Cross, to purchase equipment followed by a multi million dollar contract to provide service for dialysis patients without putting that contract up for tender, thereby at least saving the taxpayers the original $400,000 and possibly reducing the cost of that service. The Region of Peel already has contractors under contract providing transportation service. To not include them as well as any other interested contractors doesn ' t provide the best options available and that is what the bid process is intended to do. Q: What does Brampton mean to you? A: No matter where life leads me, after 40 years here, Brampton will always be \"home\". I' ve watched Brampton grow from a small town to a thriving city, which has retained its small town feel with the tree lighting at Christmas and the beautiful Gage Park.", "edit_actions": [{"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 78, "end_char_pos": 79}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 145, "end_char_pos": 146}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 916, "end_char_pos": 917}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1161, "end_char_pos": 1162}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1244, "end_char_pos": 1245}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1305, "end_char_pos": 1306}, {"type": "R", "before": "\u201cseasoned\u201d it\u2019", "after": "\"seasoned\" it'", "start_char_pos": 1874, "end_char_pos": 1888}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2082, "end_char_pos": 2083}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2538, "end_char_pos": 2539}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2786, "end_char_pos": 2787}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3275, "end_char_pos": 3276}, {"type": "R", "before": "\u201chome\u201d. I\u2019", "after": "\"home\". I'", "start_char_pos": 3480, "end_char_pos": 3490}], "sents_char_pos": [0, 44, 135, 236, 404, 545, 614, 795, 958, 1025, 1123, 1157, 1240, 1298, 1453, 1542, 1643, 1696, 1841, 2001, 2055, 2079, 2165, 2292, 2387, 2535, 2670, 3112, 3204, 3365, 3400, 3487]}
+{"doc_id": "5386", "revision_depth": "1", "before_revision": "After months of failing health, His Holiness Pope John Paul II passed away today, April 2, at 9:37 p.m. local time (19:37 UTC). He was 84 years old. An email message to journalists from the spokesman Joaquin Navarro-Valls from The Vatican confirmed the death at 20:00 UTC. The Pope had a tracheostomy earlier this year to help him breathe, and then lost his ability to speak last week. On Thursday March 31 he developed a urinary tract infection that led to septic shock and cardiovascular collapse. A nasogastric feeding tube was inserted to help him regain strength. The Pope elected not to return to Rome's Gemelli hospital, but instead to stay in his own apartments where he was tended to by his personal doctors and Vatican medical staff. The same night, he was administered the Sacrament of Anointing of the Sick also known as the last rites. On Friday April 1, the Vatican said he was having difficulties with both his heart and his kidneys. Italian news agency Agenzia Giornalistica Italia reports the pope's final message was \"I am happy, you be happy, too. Let's pray together with joy. I entrust everything to the Virgin Mary with joy\". Nancy Reagan in an interview with Larry King compared the lives of the late Pope and of her late husband Ronald Reagan, saying, \"He and Ronnie had so much in common. They were both actors.\" Noting other similarities between their lives, including their shared interests in outdoor activities and the fact that attempts were made to assassinate them both in 1981, she concluded by saying, \"It's amazing how their lives crossed.\" Paul Martin, the Prime Minister of Canada said, \"What the Pope really stood for is the bringing of all faiths together.\" Ann Widdecombe, British MP in an interview with the BBC said, \"It's being talked of already, not only by Catholics but by the world, as a great Papal reign,\" adding from her personal experience of having met the Pope, \"I felt I was in the presence of God just for being in the presence of that Pope.\" His Eminence Cardinal Cormac Murphy-O'Connor, Cardinal Archbishop of Westminster, in an announcement to ITV News in front of Westminster Cathedral, described the late Pope as \"One of the greatest leaders of our modern world; one of the greatest Popes in the Church's 2000 year history.\" Clearly moved, he concluded his remarks saying \"The Church will miss him; the world will miss him; and I will miss him.\" In a public statement, George W. Bush, President of the United States, said \"All Popes belong to the world, but Americans had special reason to love the man from Krakow.\" He stated that \"We will always remember the humble, wise, and fearless priest\" and concluded by describing the late Pope as \"a son of Poland who became Bishop of Rome and a hero for the ages\". Carlo Azeglio Ciampi, the President of Italy , said \"All the Italians, me too, are mourning for the Holy Father... I'll never forget extraordinary events like the Jubilee meeting. John Paul II has left a mark in the history, he'll be remembered as one of those men who indicated a way... the overcoming of the divisions between East and West, a world order sustained by the peace. [...] We have admired the Pope for the strength of his ideas, his courage, the extraordinary opening to the dialogue with all the religions. It will keep on living in our hearts.\" Buckingham Palace issued a statement where Her Majesty Queen Elizabeth II of the United Kingdom expressed her \"deep sorrow\" at the passing of Pope John Paul II. Israeli Foreign Minister Silvan Shalom said that the Pope's death was a \"great loss for all of humanity.\" Dr Rowan Williams, the Archbishop of Canterbury said \"Pope John Paul was a leader of manifest holiness and a faithful and prayerful friend of the Anglican Church.\" The Muslim Council of Britain said \"Pope John Paul II bestrode the international stage for nearly three decades with a simple message of peace, justice and freedom. He was a man of extraordinary faith, courage and compassion.\" Dr. Manmohan Singh, the Prime Minister of India , said \"Pope John Paul II was a great reconciler to religion and a humanist.\" Bono , the lead singer of U2, said of the Pope, he was the \"best frontman the Roman Catholic Church ever had\". Reaction around the world Oratory Church of St Aloysius Gonzaga, Oxford , with the flag of the Vatican City flying at half mast the day after the death of Pope John Paul II. The announcement of Pope John Paul II's death in Saint Peter's Square at 19:58 UTC was met with applause, a traditional Italian gesture of respect, followed by silence. The Italian government declared three days of national mourning. (Earlier in the day, all major Italian sporting fixtures had already been cancelled.) It was reported that he had already been dubbed 'John Paul the Great' by many in the tearful crowd in St Peter's Square. In Krakow , Poland, a crowd gathered in the square outside of the Archbishop's residence. The Polish government declared a period of national mourning, from today until the funeral. Many Catholic churches around the world remained open to allow people to pray, or held special masses. In Dublin, Ireland, the Pro-Cathedral remained open until midnight to allow people to pray privately for the deceased Pope. In the United Kingdom, Westmister Cathedral remained open to allow people to sign a book of condolence. Born Karol J\u00f3zef Wojty\u0142a in Wadowice , Poland on May 18, 1920, Pope John Paul II became the first non-Italian pope in 455 years when he was chosen on October 16, 1978 to lead the Roman Catholic Church following the sudden death of Pope John Paul I . First diagnosed in 2001 and confirmed by the Vatican in 2003, the Pope had suffered from Parkinson's disease during the last few years of his life. This restricted him to only speaking a few sentences at a time and also affected his hearing and mobility.", "after_revision": "After months of failing health, His Holiness Pope John Paul II passed away today, April 2, at 9:37 p.m. local time (19:37 UTC). He was 84 years old. An email message to journalists from the spokesman Joaquin Navarro-Valls from confirmed the death at 20:00 UTC. The Pope had a earlier this year to help him breathe, and then lost his ability to speak last week. On Thursday March 31 he developed a urinary tract infection that led to septic shock and cardiovascular collapse. A nasogastric feeding tube was inserted to help him regain strength. The Pope elected not to return to Rome's Gemelli hospital, but instead to stay in his own apartments where he was tended to by his personal doctors and Vatican medical staff. The same night, he was administered the also known as the last rites. On Friday April 1, the Vatican said he was having difficulties with both his heart and his kidneys. news agency Agenzia Giornalistica Italia reports the pope's final message was \"I am happy, you be happy, too. Let's pray together with joy. I entrust everything to the Virgin Mary with joy\". in an interview with compared the lives of the late Pope and of her late husband Ronald Reagan, saying, \"He and Ronnie had so much in common. They were both actors.\" Noting other similarities between their lives, including their shared interests in outdoor activities and the fact that attempts were made to assassinate them both in 1981, she concluded by saying, \"It's amazing how their lives crossed.\" , the said, \"What the Pope really stood for is the bringing of all faiths together.\" , in an interview with the BBC said, \"It's being talked of already, not only by Catholics but by the world, as a great Papal reign,\" adding from her personal experience of having met the Pope, \"I felt I was in the presence of God just for being in the presence of that Pope.\" His Eminence Cardinal Cormac Murphy-O'Connor, Cardinal Archbishop of Westminster, in an announcement to ITV News in front of Westminster Cathedral, described the late Pope as \"One of the greatest leaders of our modern world; one of the greatest Popes in the Church's 2000 year history.\" Clearly moved, he concluded his remarks saying \"The Church will miss him; the world will miss him; and I will miss him.\" In a public statement, George W. Bush, President of the United States, said \"All Popes belong to the world, but Americans had special reason to love the man from Krakow.\" He stated that \"We will always remember the humble, wise, and fearless priest\" and concluded by describing the late Pope as \"a son of Poland who became Bishop of Rome and a hero for the ages\". , the , said \"All the Italians, me too, are mourning for the Holy Father... I'll never forget extraordinary events like the Jubilee meeting. John Paul II has left a mark in the history, he'll be remembered as one of those men who indicated a way... the overcoming of the divisions between East and West, a world order sustained by the peace. [...] We have admired the Pope for the strength of his ideas, his courage, the extraordinary opening to the dialogue with all the religions. It will keep on living in our hearts.\" issued a statement where Her Majesty Queen Elizabeth II of the United Kingdom expressed her \"deep sorrow\" at the passing of Pope John Paul II. i Foreign Minister said that the Pope's death was a \"great loss for all of humanity.\" , the said \"Pope John Paul was a leader of manifest holiness and a faithful and prayerful friend of the Anglican Church.\" The Muslim Council of Britain said \"Pope John Paul II bestrode the international stage for nearly three decades with a simple message of peace, justice and freedom. He was a man of extraordinary faith, courage and compassion.\" Dr. Manmohan Singh, the , said \"Pope John Paul II was a great reconciler to religion and a humanist.\" , the lead singer of U2, said of the Pope, he was the \"best frontman the Roman Catholic Church ever had\". Reaction around the world Oratory Church of St Aloysius Gonzaga, , with the flying at the day after the death of Pope John Paul II. The announcement of Pope John Paul II's death in at 19:58 UTC was met with applause, a traditional Italian gesture of respect, followed by silence. The Italian government declared three days of national mourning. (Earlier in the day, all major Italian sporting fixtures had already been cancelled.) It was reported that he had already been dubbed 'John Paul the Great' by many in the tearful crowd in St Peter's Square. In , Poland, a crowd gathered in the square outside of the Archbishop's residence. The Polish government declared a period of national mourning, from today until the funeral. Many Catholic churches around the world remained open to allow people to pray, or held special masses. In Dublin, Ireland, the remained open until midnight to allow people to pray privately for the deceased Pope. In the United Kingdom, Westmister Cathedral remained open to allow people to sign a book of condolence. Born Karol J\u00f3zef Wojty\u0142a in , Poland on May 18, 1920, Pope John Paul II became the first non-Italian pope in 455 years when he was chosen on October 16, 1978 to lead the following the sudden death of . First diagnosed in 2001 and confirmed by the Vatican in 2003, the Pope had suffered from during the last few years of his life. This restricted him to only speaking a few sentences at a time and also affected his hearing and mobility.", "edit_actions": [{"type": "D", "before": "The Vatican", "after": null, "start_char_pos": 227, "end_char_pos": 238}, {"type": "D", "before": "tracheostomy", "after": null, "start_char_pos": 288, "end_char_pos": 300}, {"type": "D", "before": "Sacrament of Anointing of the Sick", "after": null, "start_char_pos": 784, "end_char_pos": 818}, {"type": "D", "before": "Italian", "after": null, "start_char_pos": 949, "end_char_pos": 956}, {"type": "D", "before": "Nancy Reagan", "after": null, "start_char_pos": 1148, "end_char_pos": 1160}, {"type": "D", "before": "Larry King", "after": null, "start_char_pos": 1182, "end_char_pos": 1192}, {"type": "R", "before": "Paul Martin, the Prime Minister of Canada", "after": ", the", "start_char_pos": 1576, "end_char_pos": 1617}, {"type": "R", "before": "Ann Widdecombe, British MP", "after": ",", "start_char_pos": 1697, "end_char_pos": 1723}, {"type": "D", "before": "Carlo Azeglio Ciampi, the President of Italy", "after": null, "start_char_pos": 2770, "end_char_pos": 2814}, {"type": "A", "before": null, "after": "the ,", "start_char_pos": 2817, "end_char_pos": 2817}, {"type": "D", "before": "Buckingham Palace", "after": null, "start_char_pos": 3332, "end_char_pos": 3349}, {"type": "R", "before": "Israeli Foreign Minister Silvan Shalom", "after": "i Foreign Minister", "start_char_pos": 3493, "end_char_pos": 3531}, {"type": "R", "before": "Dr Rowan Williams, the Archbishop of Canterbury", "after": ", the", "start_char_pos": 3599, "end_char_pos": 3646}, {"type": "D", "before": "Prime Minister of India", "after": null, "start_char_pos": 4014, "end_char_pos": 4037}, {"type": "D", "before": "Bono", "after": null, "start_char_pos": 4116, "end_char_pos": 4120}, {"type": "D", "before": "Oxford", "after": null, "start_char_pos": 4292, "end_char_pos": 4298}, {"type": "R", "before": "flag of the Vatican City flying at half mast", "after": "flying at", "start_char_pos": 4310, "end_char_pos": 4354}, {"type": "D", "before": "Saint Peter's Square", "after": null, "start_char_pos": 4450, "end_char_pos": 4470}, {"type": "D", "before": "Krakow", "after": null, "start_char_pos": 4845, "end_char_pos": 4851}, {"type": "D", "before": "Pro-Cathedral", "after": null, "start_char_pos": 5151, "end_char_pos": 5164}, {"type": "D", "before": "Wadowice", "after": null, "start_char_pos": 5383, "end_char_pos": 5391}, {"type": "D", "before": "Roman Catholic Church", "after": null, "start_char_pos": 5534, "end_char_pos": 5555}, {"type": "D", "before": "Pope John Paul I", "after": null, "start_char_pos": 5586, "end_char_pos": 5602}, {"type": "D", "before": "Parkinson's disease", "after": null, "start_char_pos": 5694, "end_char_pos": 5713}], "sents_char_pos": [0, 127, 148, 272, 385, 499, 568, 743, 848, 948, 1066, 1096, 1147, 1313, 1337, 1696, 1997, 2222, 2284, 2358, 2383, 2405, 2576, 2769, 2885, 2950, 3292, 3331, 3492, 3598, 3762, 3927, 4115, 4226, 4400, 4569, 4634, 4720, 4841, 4931, 5023, 5126, 5250, 5354, 5752]}
+{"doc_id": "54157", "revision_depth": "1", "before_revision": "Background Claims of sexual abuse by Sai Baba have been circulating for several decades, stating that such abuse takes place during private interviews at his base in Puttaparthi, Andhra Pradesh. Duke of Edinburgh Awards In July the UK Sai Organisation was awarded a certificate for their \"invaluable contribution\" to the Awards scheme at a garden party in Buckingham Palace. An official Sai Baba website hosted a news story about this event that was later removed after a personal intervention by Peter Westgarth, who stated that it contained misrepresentations of the events. Reactions The humanitarian work carried out by the youth will consist chiefly of providing medical aid, and will earn them a Duke of Edinburgh award that is bestowed for projects that enhance personal development and welfare work.", "after_revision": "Background Claims of sexual abuse by Sai Baba have been circulating for several decades, stating that such abuse takes place during private interviews at his base in Puttaparthi, Andhra Pradesh. Duke of Edinburgh Awards In July the UK Sai Organisation was awarded a certificate for their \"invaluable contribution\" to the Awards scheme at a garden party in Buckingham Palace. An official Sai Baba website hosted a news story about this event that was later removed after a personal intervention by Peter Westgarth, who stated that it contained misrepresentations of the events. Reactions The humanitarian work carried out by the youth will consist chiefly of providing medical aid, and will earn them a Duke of Edinburgh award that is bestowed for projects that enhance personal development and welfare work.", "edit_actions": [], "sents_char_pos": [0, 194, 374, 576]}
+{"doc_id": "54350", "revision_depth": "1", "before_revision": "A conscience vote last night, Wednesday, parliament decided that the alcohol purchasing for New Zealanders wont be raised to 20 but instead will stay at the current age of 18. The bill was brought into parliament to put the drinking age back up to 20 following when it was put down in 1999. It was first drafted by Matt Robson of the NZ Progressive Party, it was then taken on by Martin Gallagher from the New Zealand Labour Party. However the Labour-led government is being attacked for interfering with the liquor purchase age bill. Before the debate on the bill two ministers who are against raising the age, justice minister , Mark Burton and associate health minister, Damien O'Conner both announced that they would fully review the sale/supply of liquor to people below the age of 18, regardless of whether the bill were passed or not. The review will most likely look at how many off-licence outlets there are and increased law enforcement of the drink age. Mr Burton said that he did not pre-empt the bill voting, he said: \"It was important to ensure all options were on the table before the vote. What we are saying is you can have confidence that if the bill doesn't proceed there will be an alternative vehicle for addressing the issues immediately thereafter.\" Many MPs said that it was unorthodox to intrude like that into the voting process. Leader of Jim Anderton's Progressive coalition and supporter of the bill, Jim Anderton, said: \"Making a last-minute plea to MPs is not to be fooled by the promise of the unnecessary review. This is the review you have when you want to give parliamentarians a soft option. We do not have that luxury. And I hear that sigh of relief in many places, 'oh gosh you've got a review so we don't have to make a hard decision'. Well this is the place for hard decisions and this is where the buck stops.\" Simon Power, National MP, said: \"It [the bill] is inconsitent . It requires peculiar legal definition and will make life more difficult and harder for the police to enforce.\" Ron Mark, New Zealand First MP, said: \"Are we going to do something, or are we going to do nothing? asked New Zealand First list MP Ron Mark. \"We can at least let this bill go through to the next stage.\" However it has been suggested by the select committee previously researching the drinking problenm in New Zealand that there is little hard evidence that 18 & 19 year olds are buying alcohol for minors, the largest problem being the purchase of alcohol by parents for their children.", "after_revision": "In a conscience vote last night, Wednesday, parliament decided that the alcohol purchasing for New Zealanders will not be raised to 20 but instead will stay at the current age of 18. The bill was brought before Parliament with the intent of placing the drinking age back at 20 following its lowering to 18 in 1999. It was first drafted by Matt Robson of the NZ Progressive Party, and was then taken on by Martin Gallagher from the New Zealand Labour Party. However , the Labour-led government is being attacked for interfering with the liquor purchase age bill. Before the debate on the bill , two ministers who are against raising the age, justice minister Mark Burton and associate health minister, Damien O'Conner both announced that they would fully review the sale/supply of liquor to people below the age of 18, regardless of whether the bill were passed or not. The review will most likely look at how many off-licence outlets there are and increased law enforcement of the drink age. Mr Burton said that he did not pre-empt the bill voting, he said: \"It was important to ensure all options were on the table before the vote. What we are saying is you can have confidence that if the bill doesn't proceed there will be an alternative vehicle for addressing the issues immediately thereafter.\" Many MPs said that it was unorthodox to intrude in such a manner in the voting process. Leader of Jim Anderton's Progressive coalition and supporter of the bill, Jim Anderton, said: \"Making a last-minute plea to MPs is not to be fooled by the promise of the unnecessary review. This is the review you have when you want to give parliamentarians a soft option. We do not have that luxury. And I hear that sigh of relief in many places, 'oh gosh you've got a review so we don't have to make a hard decision'. Well this is the place for hard decisions and this is where the buck stops.\" Simon Power, National MP, said: \"It [the bill] is inconsistent . It requires peculiar legal definition and will make life more difficult and harder for the police to enforce.\" Ron Mark, New Zealand First MP, said: \"Are we going to do something, or are we going to do nothing? \" asked New Zealand First list MP Ron Mark. \"We can at least let this bill go through to the next stage.\" However it has been suggested by the select committee previously researching the drinking problem in New Zealand that there is little hard evidence 18 & 19 year olds are buying alcohol for minors, with the largest problem instead being the purchasing of alcohol by parents for their children.", "edit_actions": [{"type": "R", "before": "A", "after": "In a", "start_char_pos": 0, "end_char_pos": 1}, {"type": "R", "before": "wont", "after": "will not", "start_char_pos": 107, "end_char_pos": 111}, {"type": "R", "before": "into parliament to put the", "after": "before Parliament with the intent of placing the", "start_char_pos": 197, "end_char_pos": 223}, {"type": "R", "before": "up to", "after": "at", "start_char_pos": 242, "end_char_pos": 247}, {"type": "R", "before": "when it was put down", "after": "its lowering to 18", "start_char_pos": 261, "end_char_pos": 281}, {"type": "R", "before": "it", "after": "and", "start_char_pos": 356, "end_char_pos": 358}, {"type": "A", "before": null, "after": ",", "start_char_pos": 440, "end_char_pos": 440}, {"type": "A", "before": null, "after": ",", "start_char_pos": 566, "end_char_pos": 566}, {"type": "D", "before": ",", "after": null, "start_char_pos": 631, "end_char_pos": 632}, {"type": "R", "before": "like that into", "after": "in such a manner in", "start_char_pos": 1323, "end_char_pos": 1337}, {"type": "R", "before": "inconsitent", "after": "inconsistent", "start_char_pos": 1904, "end_char_pos": 1915}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2129, "end_char_pos": 2129}, {"type": "R", "before": "problenm", "after": "problem", "start_char_pos": 2324, "end_char_pos": 2332}, {"type": "D", "before": "that", "after": null, "start_char_pos": 2383, "end_char_pos": 2387}, {"type": "A", "before": null, "after": "with", "start_char_pos": 2437, "end_char_pos": 2437}, {"type": "R", "before": "being the purchase", "after": "instead being the purchasing", "start_char_pos": 2458, "end_char_pos": 2476}], "sents_char_pos": [0, 175, 290, 431, 535, 843, 966, 1107, 1274, 1357, 1547, 1629, 1657, 1776, 1853, 1917, 2028, 2171, 2233]}
+{"doc_id": "5454", "revision_depth": "1", "before_revision": "Hans Bethe at Los Alamos during World War II. Nobel Laureate in Physics Hans Bethe died in his home in Ithaca, New York on March 6, 2005, according to Cornell University, where he was professor emeritus of physics. Hans Albrecht Bethe (pronounced Bay-ta) was born on July 2, 1906 in the city of Strasbourg , then part of Germany (now part of France). He studied physics at Frankfurt and obtained his doctorate from the University of Munich . Bethe, whose mother was Jewish , fled Germany in 1933 when the Nazi Party came to power. Bethe, along with hundreds of other Jewish academics, were fired from their posts as a result of one of Adolf Hitler's first anti-Semitic acts. Bethe moved first to England and in 1935 to the USA where he taught at Cornell University. Between 1935 and 1938, he studied nuclear reactions and reaction cross sections. This research was useful to Bethe in more quantitatively developing Niels Bohr 's theory of the compound nucleus. During World War II, he served as a prominent member of a special summer session at the University of California, Berkeley at the invitation of Robert Oppenheimer , which outlined the first designs for the atomic bomb and served as the beginning of the Manhattan Project . When Oppenheimer started the secret weapons design laboratory, Los Alamos , he appointed Bethe as Director of the Theoretical Division. After the war, Bethe argued that a crash project for the hydrogen bomb should not be attempted, though after President Truman announced the beginning of such a crash project, and the outbreak of the Korean War , he signed up and played a key role in the weapon's development. In 1968, he reflected upon the choice, noting that \"It seemed quite logical. But sometimes I wish I were more consistent an idealist.\" Though he would see the project through to its end, in Bethe's account he was primarily hopeful that the weapon would be impossible to produce. He later characterized Stanislaw Ulam was the \"father\" of the hydrogen bomb, and Edward Teller as its \"mother,\" and himself as its \"midwife.\" Among his many honors, Bethe received the Max Planck medal in 1955, and in 1961 he was awarded the Eddington Medal of the Royal Astronomical Society for his work in identifying the energy generating processes in stars. In 1967, Bethe was awarded the Nobel Prize in Physics for his studies of the production of solar and stellar energy, stellar nucleosynthesis . He postulated that the source of this energy are thermonuclear reactions in which hydrogen was converted into helium . During the 1980s and 1990s, Bethe campaigned for the peaceful use of nuclear energy, arguing against the nuclear arms race and against nuclear testing . In 1995, at the age of 88, Bethe wrote an open letter calling on all scientists to \"cease and desist\" from working on any aspect of nuclear weapons development and manufacture. In 2004, he signed a letter along with 47 other Nobel laureates endorsing John Kerry for president of the United States citing Bush's apparent misuse of science.", "after_revision": "at during World War II. Nobel Laureate in Physics died in his home in on March 6, 2005, according to Cornell University, where he was professor emeritus of physics. Hans Albrecht Bethe (pronounced Bay-ta) was born on July 2, 1906 in the city of , then part of Germany (now part of France). He studied physics at Frankfurt and obtained his doctorate from the . Bethe, whose mother was Judaism|Jewish , fled Germany in 1933 when the came to power. Bethe, along with hundreds of other Jewish academics, were fired from their posts as a result of one of Adolf Hitler's first anti-Semitic acts. Bethe moved first to England and in 1935 to the USA where he taught at Cornell University. Between 1935 and 1938, he studied and reaction cross sections. This research was useful to Bethe in more quantitatively developing 's theory of the compound nucleus. During World War II, he served as a prominent member of a special summer session at the at the invitation of , which outlined the first designs for the and served as the beginning of the . When Oppenheimer started the secret weapons design laboratory, , he appointed Bethe as Director of the Theoretical Division. After the war, Bethe argued that a crash project for the should not be attempted, though after announced the beginning of such a crash project, and the outbreak of the , he signed up and played a key role in the weapon's development. In 1968, he reflected upon the choice, noting that \"It seemed quite logical. But sometimes I wish I were more consistent an idealist.\" Though he would see the project through to its end, in Bethe's account he was primarily hopeful that the weapon would be impossible to produce. He later characterized as the \"father\" of the hydrogen bomb, and as its \"mother,\" and himself as its \"midwife.\" Among his many honors, Bethe received the in 1955, and in 1961 he was awarded the of the for his work in identifying the energy generating processes in stars. In 1967, Bethe was awarded the Nobel Prize in Physics for his studies of the production of solar and stellar energy, . He postulated that the source of this energy are in which was converted into . During the 1980s and 1990s, Bethe campaigned for the peaceful use of nuclear energy, arguing against the and against . In 1995, at the age of 88, Bethe wrote an open letter calling on all scientists to \"cease and desist\" from working on any aspect of nuclear weapons development and manufacture. In 2004, he signed a letter along with 47 other Nobel laureates endorsing John Kerry for president of the United States citing Bush's apparent misuse of science.", "edit_actions": [{"type": "R", "before": "Hans Bethe at Los Alamos", "after": "at", "start_char_pos": 0, "end_char_pos": 24}, {"type": "D", "before": "Hans Bethe", "after": null, "start_char_pos": 72, "end_char_pos": 82}, {"type": "D", "before": "Ithaca, New York", "after": null, "start_char_pos": 103, "end_char_pos": 119}, {"type": "D", "before": "Strasbourg", "after": null, "start_char_pos": 295, "end_char_pos": 305}, {"type": "D", "before": "University of Munich", "after": null, "start_char_pos": 419, "end_char_pos": 439}, {"type": "R", "before": "Jewish", "after": "Judaism|Jewish", "start_char_pos": 466, "end_char_pos": 472}, {"type": "D", "before": "Nazi Party", "after": null, "start_char_pos": 505, "end_char_pos": 515}, {"type": "D", "before": "nuclear reactions", "after": null, "start_char_pos": 800, "end_char_pos": 817}, {"type": "D", "before": "Niels Bohr", "after": null, "start_char_pos": 915, "end_char_pos": 925}, {"type": "D", "before": "University of California, Berkeley", "after": null, "start_char_pos": 1049, "end_char_pos": 1083}, {"type": "D", "before": "Robert Oppenheimer", "after": null, "start_char_pos": 1105, "end_char_pos": 1123}, {"type": "D", "before": "atomic bomb", "after": null, "start_char_pos": 1167, "end_char_pos": 1178}, {"type": "D", "before": "Manhattan Project", "after": null, "start_char_pos": 1214, "end_char_pos": 1231}, {"type": "D", "before": "Los Alamos", "after": null, "start_char_pos": 1297, "end_char_pos": 1307}, {"type": "D", "before": "hydrogen bomb", "after": null, "start_char_pos": 1427, "end_char_pos": 1440}, {"type": "D", "before": "President Truman", "after": null, "start_char_pos": 1479, "end_char_pos": 1495}, {"type": "D", "before": "Korean War", "after": null, "start_char_pos": 1569, "end_char_pos": 1579}, {"type": "R", "before": "Stanislaw Ulam was", "after": "as", "start_char_pos": 1948, "end_char_pos": 1966}, {"type": "D", "before": "Edward Teller", "after": null, "start_char_pos": 2006, "end_char_pos": 2019}, {"type": "D", "before": "Max Planck medal", "after": null, "start_char_pos": 2109, "end_char_pos": 2125}, {"type": "R", "before": "Eddington Medal of the Royal Astronomical Society", "after": "of the", "start_char_pos": 2166, "end_char_pos": 2215}, {"type": "D", "before": "stellar nucleosynthesis", "after": null, "start_char_pos": 2403, "end_char_pos": 2426}, {"type": "R", "before": "thermonuclear reactions in which hydrogen", "after": "in which", "start_char_pos": 2478, "end_char_pos": 2519}, {"type": "D", "before": "helium", "after": null, "start_char_pos": 2539, "end_char_pos": 2545}, {"type": "R", "before": "nuclear arms race and against nuclear testing", "after": "and against", "start_char_pos": 2653, "end_char_pos": 2698}], "sents_char_pos": [0, 45, 214, 350, 530, 674, 765, 846, 960, 1233, 1369, 1645, 1722, 1780, 1924, 2066, 2285, 2428, 2547, 2700, 2877]}
+{"doc_id": "54885", "revision_depth": "1", "before_revision": "wikine ", "after_revision": "An alleged Russian spy was arrested in Montreal, having threatened national security. The man is identified as a Russian spy and has been living under a false name. As he prepared to board a plane out of Canada, Canada Border Services agents took the man into custody at Pierre Elliott Trudeau International Airport in Montreal on Tuesday. Public Safety Minister Stockwell Day and Immigration Minister Monte Solberg signed the document that authorized the man's arrest. This document is called the national security certificate and is rarely used. The certificate alerts Ottawa about possible threats to the country. The ministers of immigration and public safety are obliged to sign the national security certificate. \"The government's most important duty is to ensure the security of all Canadians. A security certificate has been issued ... against a foreign national. He is now in custody in Montreal,\" said Melissa Leclerc, spokeswoman for Public Safety Minister Stockwell Day. \"A foreign national alleging to be a Canadian citizen named Paul William Hampel was arrested in Montreal after a national security certificate under the Immigration and Refugee Protection Act was issued against him.\" The man came to Canada several years ago with the name of Paul William Hampel, and is now reported to be false. Officials at the Canadian Security Intelligence Service (CSIS) are working on identifying the man who entered Canada years ago. \"He is now in custody in Montreal. This is not a counter-terrorism case. More information will become available as the Federal Court process unfolds. Any speculation about the individual's other nationality is premature at this point,\" Barbara Campion, a spokesperson for CSIS. Ottawa believed the man had been \"engaging in an act of espionage or an act of subversion,\" and \"belonged to an organization that there are reasonable grounds to believe engages.\" \"I don't think we're going to get the most intimate of details, no, not at all,\" he told CTV Montreal....We'll see a public version of the allegations that will be released by the federal court judge who is going to be responsible for reviewing the basis upon which cabinet will have declared this individual subject to a security certificate. beyond that, though, we may see things settle more quietly between governments,\" said David Harris, former chief of strategic planning at CSIS. \"There are also influence operations where countries might try to influence their expatriates and \u00e9migr\u00e9 communities in Canada. Beyond that, there is a real appetite building among many countries for technological secrets,\" he said. \"They can be of use to industries of the sponsoring nations and these things can have values in the billions for the economies of those countries undertaking these operations.\" Reports say the man's methods in Canada matched the techniques used by the Russian intelligence agency's Directorate S, which runs the Russian spy network. Twenty people since 1991 have been charged under the Security Certificate legislation in Canada. The last time it was used was in 2003. The court hearing for the man being held in Montreal will be on Wednesday. It is still unclear if the hearing will be in Ottawa, the nations capital, or in Montreal. More information will be released as the case progresses.", "edit_actions": [{"type": "R", "before": "wikine", "after": "An alleged Russian spy was arrested in Montreal, having threatened national security. The man is identified as a Russian spy and has been living under a false name.", "start_char_pos": 0, "end_char_pos": 6}, {"type": "A", "before": null, "after": "As he prepared to board a plane out of Canada, Canada Border Services agents took the man into custody at Pierre Elliott Trudeau International Airport in Montreal on Tuesday. Public Safety Minister Stockwell Day and Immigration Minister Monte Solberg signed the document that authorized the man's arrest.", "start_char_pos": 7, "end_char_pos": 7}, {"type": "A", "before": null, "after": "This document is called the national security certificate and is rarely used. The certificate alerts Ottawa about possible threats to the country. The ministers of immigration and public safety are obliged to sign the national security certificate.", "start_char_pos": 8, "end_char_pos": 8}, {"type": "A", "before": null, "after": "\"The government's most important duty is to ensure the security of all Canadians. A security certificate has been issued ... against a foreign national. He is now in custody in Montreal,\" said Melissa Leclerc, spokeswoman for Public Safety Minister Stockwell Day. \"A foreign national alleging to be a Canadian citizen named Paul William Hampel was arrested in Montreal after a national security certificate under the Immigration and Refugee Protection Act was issued against him.\"", "start_char_pos": 9, "end_char_pos": 9}, {"type": "A", "before": null, "after": "The man came to Canada several years ago with the name of Paul William Hampel, and is now reported to be false. Officials at the Canadian Security Intelligence Service (CSIS) are working on identifying the man who entered Canada years ago.", "start_char_pos": 10, "end_char_pos": 10}, {"type": "A", "before": null, "after": "\"He is now in custody in Montreal. This is not a counter-terrorism case. More information will become available as the Federal Court process unfolds. Any speculation about the individual's other nationality is premature at this point,\" Barbara Campion, a spokesperson for CSIS.", "start_char_pos": 11, "end_char_pos": 11}, {"type": "A", "before": null, "after": "Ottawa believed the man had been \"engaging in an act of espionage or an act of subversion,\" and \"belonged to an organization that there are reasonable grounds to believe engages.\"", "start_char_pos": 12, "end_char_pos": 12}, {"type": "A", "before": null, "after": "\"I don't think we're going to get the most intimate of details, no, not at all,\" he told CTV Montreal....We'll see a public version of the allegations that will be released by the federal court judge who is going to be responsible for reviewing the basis upon which cabinet will have declared this individual subject to a security certificate. beyond that, though, we may see things settle more quietly between governments,\" said David Harris, former chief of strategic planning at CSIS.", "start_char_pos": 13, "end_char_pos": 13}, {"type": "A", "before": null, "after": "\"There are also influence operations where countries might try to influence their expatriates and \u00e9migr\u00e9 communities in Canada. Beyond that, there is a real appetite building among many countries for technological secrets,\" he said. \"They can be of use to industries of the sponsoring nations and these things can have values in the billions for the economies of those countries undertaking these operations.\"", "start_char_pos": 14, "end_char_pos": 14}, {"type": "A", "before": null, "after": "Reports say the man's methods in Canada matched the techniques used by the Russian intelligence agency's Directorate S, which runs the Russian spy network.", "start_char_pos": 15, "end_char_pos": 15}, {"type": "A", "before": null, "after": "Twenty people since 1991 have been charged under the Security Certificate legislation in Canada. The last time it was used was in 2003.", "start_char_pos": 16, "end_char_pos": 16}, {"type": "A", "before": null, "after": "The court hearing for the man being held in Montreal will be on Wednesday. It is still unclear if the hearing will be in Ottawa, the nations capital, or in Montreal.", "start_char_pos": 17, "end_char_pos": 17}, {"type": "A", "before": null, "after": "More information will be released as the case progresses.", "start_char_pos": 18, "end_char_pos": 18}], "sents_char_pos": [0]}
+{"doc_id": "56727", "revision_depth": "1", "before_revision": "An investigation is currently happening by the New Zealand Department of Corrections to see if the allegations that prison guards at Rimutaka prison are accepting monetary bribes from prisoners in exchange for drugs and cellphones , are correct . Rimutaka prison is one of New Zealand's largest prions which caters for minimum to high-medium security male prisoners. It is located in Wellington, New Zealand. Two former officers, Ingrid and Mark Rijniers, have handed over a collection of documents on their encounters while working at Rimutaka prison. The pair, who were transferred from Holland, claim that Rimutaka prison is run by gang members who dominate the prison guards. They also claim that if the gang members don't get what they want they will intimidate and threaten the guards with their lives. However Ingrid Rijniers is refusing to co-operate with the department as they refused to give her the money to go back to Holland. The New Zealand Corrections Department confirm that they are investigating the serious claims and are taking them seriously but say that they have not found sufficient evidence yet to back up the claims. Twelve percent of 1,043 prisoners who were tested for drugs from the start of this year until June, tested positive for drugs. Most of the drugs taken was marijuana while fourteen tested positive for \"P\". These claims also come as teenage prisoner, Liam Ashley was strangled to death in a prison van by a much older adult prisoner. Mr Power said that with all these new claims emerging Mr O'Conner should resign as the minister of corrections.", "after_revision": "The New Zealand Department of Corrections is currently investigating allegations at the Rimutaka prison in Wellington, New Zealand. The prison guards have allegedly accepted monetary bribes from prisoners in exchange for drugs and cellphones . Two former officers, Ingrid and Mark Rijniers, have handed over a collection of documents on their encounters while working at Rimutaka prison. The pair, who were transferred from Holland, claim that Rimutaka prison is run by gang members who dominate the prison guards. They also claim that if the gang members don't get what they want they will intimidate and threaten the guards with their lives. However, Ingrid Rijniers is refusing to co-operate with the department because they refused to give her the money to return to Holland. The New Zealand Corrections Department says it is taking these claims seriously but has not yet found sufficient evidence to back up the claims. Twelve percent of 1,043 prisoners who were tested for drugs from the start of this year until June, tested positive for drugs. Most of the drugs taken was marijuana while fourteen tested positive for \"P\". In addition, a teenage prisoner, Liam Ashley , was recently strangled to death in a prison van by a much older adult prisoner. Mr Power said that with all these new claims emerging , Mr O'Conner should resign as the minister of corrections.", "edit_actions": [{"type": "R", "before": "An investigation is currently happening by the", "after": "The", "start_char_pos": 0, "end_char_pos": 46}, {"type": "R", "before": "to see if the allegations that prison guards at Rimutaka prison are accepting", "after": "is currently investigating allegations at the Rimutaka prison in Wellington, New Zealand. The prison guards have allegedly accepted", "start_char_pos": 85, "end_char_pos": 162}, {"type": "D", "before": ", are correct", "after": null, "start_char_pos": 231, "end_char_pos": 244}, {"type": "D", "before": "Rimutaka prison is one of New Zealand's largest prions which caters for minimum to high-medium security male prisoners. It is located in Wellington, New Zealand.", "after": null, "start_char_pos": 247, "end_char_pos": 408}, {"type": "R", "before": "However", "after": "However,", "start_char_pos": 809, "end_char_pos": 816}, {"type": "R", "before": "as", "after": "because", "start_char_pos": 879, "end_char_pos": 881}, {"type": "R", "before": "go back", "after": "return", "start_char_pos": 920, "end_char_pos": 927}, {"type": "R", "before": "confirm that they are investigating the serious claims and are taking them seriously but say that they have not", "after": "says it is taking these claims seriously but has not yet", "start_char_pos": 979, "end_char_pos": 1090}, {"type": "D", "before": "yet", "after": null, "start_char_pos": 1117, "end_char_pos": 1120}, {"type": "R", "before": "These claims also come as", "after": "In addition, a", "start_char_pos": 1349, "end_char_pos": 1374}, {"type": "R", "before": "was", "after": ", was recently", "start_char_pos": 1405, "end_char_pos": 1408}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1530, "end_char_pos": 1530}], "sents_char_pos": [0, 366, 408, 552, 679, 808, 939, 1143, 1270, 1348, 1475]}
+{"doc_id": "59640", "revision_depth": "1", "before_revision": "\"The international pressure will humiliate the government, \u201d Sari added. Making one general accountable would not solve the extrajudicial killings in the country, according to America Vera-Zavala of Sweden \u2019 s Left International Forum. \"I'm quite sure this extreme [number] of people killed is not due to one single general. It would be a very unique country if only one general is responsible for all this, \u201d she said. In a related report, President Gloria Macapagal-Arroyo yesterday said she would ask the European Union to assist in the commission \u2019 s work, declaring that she had \"no tolerance for human rights violations.\" She issued a statement containing detailed instructions after meeting with retired Supreme Court Justice Jose Melo in Malaca\u00f1ang. The instructions were not clear though on how she intended to address the latter \u2019 s recommendation to hold Palparan accountable for the killings. \"But since he is already retired, we cannot take him under our jurisdiction, \u201d Esperon added. \"The Melo Commission failed in its public vow to get to the bottom of the killings: its report, based on Justice Melo \u2019 s statement to the media, is indicative of a whitewash,\" Bayan Muna party-list Rep. Satur Ocampo said in reaction to Melo's statements. \"Melo is silent on GMA \u2019 s (President Gloria Macapagal-Arroyo \u2019 s) role. The killings go on even with Palparan out, so what has [the commission] accomplished? \u201d Ocampo said in a phone interview. Anakpawis party-list Rep. Rafael Mariano said the Melo Commission had \u201c consciously avoided the responsibility of the President, the Cabinet Oversight Committee on Internal Security and the counterinsurgency program Oplan Bantay Laya in its report. \u201d Mariano also said \"the killings of activists was integral to the Arroyo administration \u2019 s counterinsurgency policy,\" predicting that \"the killings won't stop as long as the mastermind is not punished.\"", "after_revision": "\"The international pressure will humiliate the government, \" Sari added. Making one general accountable would not solve the extrajudicial killings in the country, according to America Vera-Zavala of Sweden ' s Left International Forum. \"I'm quite sure this extreme [number] of people killed is not due to one single general. It would be a unique country if only one general is responsible for all this, \" she said. In a related report, President Gloria Macapagal-Arroyo yesterday said she would ask the European Union to assist in the commission ' s work, declaring that she had \"no tolerance for human rights violations.\" She issued a statement containing detailed instructions after meeting with retired Supreme Court Justice Jose Melo in Malaca\u00f1ang. The instructions were not clear though on how she intended to address the latter ' s recommendation to hold Palparan accountable for the killings. \"But since he is already retired, we cannot take him under our jurisdiction, \" Esperon added. \"The Melo Commission failed in its public vow to get to the bottom of the killings: its report, based on Justice Melo ' s statement to the media, is indicative of a whitewash,\" Bayan Muna party-list Rep. Satur Ocampo said in reaction to Melo's statements. \"Melo is silent on GMA ' s (President Gloria Macapagal-Arroyo ' s) role. The killings go on even with Palparan out, so what has [the commission] accomplished? \" Ocampo said in a phone interview. Anakpawis party-list Rep. Rafael Mariano said the Melo Commission had \" consciously avoided the responsibility of the President, the Cabinet Oversight Committee on Internal Security and the counterinsurgency program Oplan Bantay Laya in its report. \" Mariano also said \"the killings of activists was integral to the Arroyo administration ' s counterinsurgency policy,\" predicting that \"the killings won't stop as long as the mastermind is not punished.\"", "edit_actions": [{"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 59, "end_char_pos": 60}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 206, "end_char_pos": 207}, {"type": "D", "before": "very", "after": null, "start_char_pos": 339, "end_char_pos": 343}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 408, "end_char_pos": 409}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 551, "end_char_pos": 552}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 839, "end_char_pos": 840}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 982, "end_char_pos": 983}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1117, "end_char_pos": 1118}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1278, "end_char_pos": 1279}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1317, "end_char_pos": 1318}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1414, "end_char_pos": 1415}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1520, "end_char_pos": 1521}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1699, "end_char_pos": 1700}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1788, "end_char_pos": 1789}], "sents_char_pos": [0, 72, 235, 324, 419, 627, 757, 904, 998, 1254, 1327, 1413, 1449, 1698]}
+{"doc_id": "60222", "revision_depth": "1", "before_revision": "Annie Awards promotional art, 2006. This Sunday, the International Animated Film Association (Association International du Film d'Animation) or ASIFA will hand out the Annie Awards in Glendale, California . As animation's highest honor, the crowd is always a who's who of direction, art design, character design, layout, visual effects, and voice artists. Perhaps the most competitive category is \"Best Animated Feature\", which will be a fight between Cars (Pixar Animation Studios), Happy Feet (Warner Bros. Pictures / Village Roadshow Pictures / Kennedy Miller Production / Animal Logic Film), Monster House (Columbia Pictures / ImageMovers / Amblin), Open Season (Sony Pictures Animation / Columbia Pictures) and Over The Hedge (DreamWorks Animation ) . Cars, Happy Feet, and Monster House are all nominated in the Academy Awards for the same category, perhaps signifying an edge up in the competition. Direct-to-DVD releases are eligible for the \"Best Home Entertainment Production\". Included are Bambi II (DisneyToon Studios), The Adventures of Brer Rabbit (Universal Animation Studios ), and Winnie the Pooh: Shapes & Sizes (DisneyToon Studios). Charlie and Lola, Foster's Home for Imaginary Friends, King of the Hill, The Fairly OddParents, and Wow! Wow! Wubbzy! are all up for \"Best Animated Television Production\". \"Best Animated Video Game\" will be awarded to either Flushed Away The Game (D3 Publisher of America, Inc.), Monster House (THQ, Inc. ), and SpongeBob SquarePants: Creature From the Krusty Krab (THQ, Inc.); the category was just created last year. Adventure Time (Nickelodeon ), Fumi and the Bad Luck Foot (Thunderbean Animation), No Time For Nuts (Blue Sky Studios ), and Weird Al Yankovic Don't Download This Song (Acme Filmworks) are all up for \"Best Animated Short Subject\". Only No Time for Nuts is up for an Oscar, which has significantly different rules. \"Best Animated Television Commercial\" will go to either an advertisement for Candy Factory, ESPN, Hilton, St. Louis Zoo, and United Airlines . Notably, no non-US films or productions have been nominated for any of the awards. Started in 1972 ASIFA is a non-profit worldwide organization dedicated to preserving and promoting animation, which maintains national branches in 55 countries, as far away as UlanBaatar, Mongolia and Tehran . The Annies are awarded by its California chapter ASIFA-Hollywood. The awards were started in 1972, after voice actress June Foray noticed the industry lacked a formal way to acknowledge its achievements. Performing in over 202 productions, Foray's most known characters are Rocket J. Squirrel (Rocky and Bullwinkle) and Granny (Looney Tunes ) . ASIFA also hands out \"Juried Awards\" to various notable figures in animation. Bill Plympton, Genndy Tartakovsky, and Andreas Deja will each win the Winsor McCay Award , in recognition of lifetime or career contributions to the art of animation. Bill Matthews, Michael Fallik, Marc Deckter, and Eric Graf will each win a Certificate of Merit. The June Foray Award will go to Stephen Worth , for his \"significant and benevolent or charitable impact on the art and industry of animation.\" The Ub Iwerks Award and Special Achievement award will not be handed out. Coverage upcoming Professional photographer John Mueller will attend the ceremony on behalf of Wikinews, taking photos of nominees and the rest of America's animation elite. Mueller was selected from a wide pool of professionals offering their services. The photos from the event will be released under the Creative Commons By Attribution license, which allows them to be used by anyone for any purpose.", "after_revision": "Annie Awards promotional art, 2006. This Sunday, the (Association International du Film d'Animation) or ASIFA will hand out the in , . As animation's highest honor, the crowd is always a who's who of direction, art design, character design, layout, visual effects, and voice artists. Perhaps the most competitive category is \"Best Animated Feature\", which will be a fight between (), ( / / / ), ( / / ), ( / ) and () . Cars, Happy Feet, and Monster House are all nominated in the for the same category, perhaps signifying an edge up in the competition. Direct-to- releases are eligible for the \"Best Home Entertainment Production\". Included are ( ), (), and Winnie the Pooh: Shapes & Sizes (DisneyToon Studios). , , , , and are all up for \"Best Animated Television Production\". \"Best Animated Video Game\" will be awarded to either ( ), (), and (THQ, Inc.); the category was just created last year. ( ), Fumi and the Bad Luck Foot (Thunderbean Animation), ( ), and (Acme Filmworks) are all up for \"Best Animated Short Subject\". Only No Time for Nuts is up for an Oscar, which has significantly different rules. \"Best Animated Television Commercial\" will go to either an advertisement for Candy Factory, , , , and . Notably, no non- films or productions have been nominated for any of the awards. Started in 1972 ASIFA is a non-profit worldwide organization dedicated to preserving and promoting animation, which maintains national branches in 55 countries, as far away as , and . The Annies are awarded by its California chapter ASIFA-Hollywood. The awards were started in 1972, after voice actress noticed the industry lacked a formal way to acknowledge its achievements. Performing in over 202 productions, Foray's most known characters are ( ) and () . ASIFA also hands out \"Juried Awards\" to various notable figures in animation. , , and will each win the , in recognition of lifetime or career contributions to the art of animation. Bill Matthews, Michael Fallik, Marc Deckter, and Eric Graf will each win a Certificate of Merit. The will go to , for his \"significant and benevolent or charitable impact on the art and industry of animation.\" The Ub Iwerks Award and Special Achievement award will not be handed out. Coverage upcoming Professional photographer John Mueller will attend the ceremony on behalf of Wikinews, taking photos of nominees and the rest of America's animation elite. Mueller was selected from a wide pool of professionals offering their services. The photos from the event will be released under the license, which allows them to be used by anyone for any purpose.", "edit_actions": [{"type": "D", "before": "International Animated Film Association", "after": null, "start_char_pos": 53, "end_char_pos": 92}, {"type": "R", "before": "Annie Awards in Glendale, California", "after": "in ,", "start_char_pos": 168, "end_char_pos": 204}, {"type": "R", "before": "Cars (Pixar Animation Studios), Happy Feet (Warner Bros. Pictures", "after": "(), (", "start_char_pos": 452, "end_char_pos": 517}, {"type": "D", "before": "Village Roadshow Pictures", "after": null, "start_char_pos": 520, "end_char_pos": 545}, {"type": "D", "before": "Kennedy Miller Production", "after": null, "start_char_pos": 548, "end_char_pos": 573}, {"type": "R", "before": "Animal Logic Film), Monster House (Columbia Pictures", "after": "), (", "start_char_pos": 576, "end_char_pos": 628}, {"type": "D", "before": "ImageMovers", "after": null, "start_char_pos": 631, "end_char_pos": 642}, {"type": "R", "before": "Amblin), Open Season (Sony Pictures Animation", "after": "), (", "start_char_pos": 645, "end_char_pos": 690}, {"type": "D", "before": "Columbia Pictures) and Over The Hedge (DreamWorks Animation", "after": null, "start_char_pos": 693, "end_char_pos": 752}, {"type": "A", "before": null, "after": "and ()", "start_char_pos": 755, "end_char_pos": 755}, {"type": "D", "before": "Academy Awards", "after": null, "start_char_pos": 819, "end_char_pos": 833}, {"type": "R", "before": "Direct-to-DVD", "after": "Direct-to-", "start_char_pos": 907, "end_char_pos": 920}, {"type": "R", "before": "Bambi II (DisneyToon Studios), The Adventures of Brer Rabbit (Universal Animation Studios", "after": "(", "start_char_pos": 1002, "end_char_pos": 1091}, {"type": "A", "before": null, "after": "(),", "start_char_pos": 1095, "end_char_pos": 1095}, {"type": "R", "before": "Charlie and Lola, Foster's Home for Imaginary Friends, King of the Hill, The Fairly OddParents, and Wow! Wow! Wubbzy!", "after": ", , , , and", "start_char_pos": 1154, "end_char_pos": 1271}, {"type": "R", "before": "Flushed Away The Game (D3 Publisher of America, Inc.), Monster House (THQ, Inc.", "after": "(", "start_char_pos": 1379, "end_char_pos": 1458}, {"type": "A", "before": null, "after": "(),", "start_char_pos": 1462, "end_char_pos": 1462}, {"type": "D", "before": "SpongeBob SquarePants: Creature From the Krusty Krab", "after": null, "start_char_pos": 1467, "end_char_pos": 1519}, {"type": "R", "before": "Adventure Time (Nickelodeon", "after": "(", "start_char_pos": 1574, "end_char_pos": 1601}, {"type": "R", "before": "No Time For Nuts (Blue Sky Studios", "after": "(", "start_char_pos": 1657, "end_char_pos": 1691}, {"type": "D", "before": "Weird Al Yankovic Don't Download This Song", "after": null, "start_char_pos": 1699, "end_char_pos": 1741}, {"type": "R", "before": "ESPN, Hilton, St. Louis Zoo, and United Airlines", "after": ", , , and", "start_char_pos": 1980, "end_char_pos": 2028}, {"type": "R", "before": "non-US", "after": "non-", "start_char_pos": 2043, "end_char_pos": 2049}, {"type": "R", "before": "UlanBaatar, Mongolia and Tehran", "after": ", and", "start_char_pos": 2290, "end_char_pos": 2321}, {"type": "D", "before": "June Foray", "after": null, "start_char_pos": 2443, "end_char_pos": 2453}, {"type": "R", "before": "Rocket J. Squirrel (Rocky and Bullwinkle) and Granny (Looney Tunes", "after": "(", "start_char_pos": 2598, "end_char_pos": 2664}, {"type": "A", "before": null, "after": "and ()", "start_char_pos": 2667, "end_char_pos": 2667}, {"type": "R", "before": "Bill Plympton, Genndy Tartakovsky, and Andreas Deja", "after": ", , and", "start_char_pos": 2748, "end_char_pos": 2799}, {"type": "D", "before": "Winsor McCay Award", "after": null, "start_char_pos": 2818, "end_char_pos": 2836}, {"type": "D", "before": "June Foray Award", "after": null, "start_char_pos": 3016, "end_char_pos": 3032}, {"type": "D", "before": "Stephen Worth", "after": null, "start_char_pos": 3044, "end_char_pos": 3057}, {"type": "D", "before": "Creative Commons By Attribution", "after": null, "start_char_pos": 3537, "end_char_pos": 3568}], "sents_char_pos": [0, 35, 206, 355, 508, 906, 988, 1153, 1258, 1325, 1532, 1573, 1804, 1887, 2113, 2323, 2389, 2527, 2747, 2914, 3011, 3155, 3229, 3403, 3483]}
+{"doc_id": "61529", "revision_depth": "1", "before_revision": "Sidney Crosby received the #1 Star of the Game. Today, the Pittsburgh Penguins took on the New York Rangers in Madison Square Garden , New York. Jaromir Jagr struck first for New York, with Michael Nylander following suit in the final 2:30 to give the Rangers a comfortable 2-0 lead at the end of the second period. Staal's shorthanded goal came 76 seconds into the final period, with Staal beating Rangers goaltender Henrik Lundqvist with a soft forehand shot. Penguins winger Colby Armstrong continued the shorthanded show, scoring less than 2:00 later with a bad angle shot, which would ricochet off of Lundqvist's pad. When all momentum had seemingly crossed to the Penguins, Blair Betts fired a goal to restore New York's lead at 3-2. Sergei Gonchar tied it up again late in the 3rd, with a blistering shot on a Penguins power play to level the score at 3-3. In the shootout, not a single score occurred until NHL scoring leader Sidney Crosby took the ice. With the shootout tied 0-0, and a point on the line, Crosby beat Lundqvist, lifting Pittsburgh to victory. The game was not a total loss for the Rangers, though, as they picked up a precious point by forcing overtime. Penguins rookie Jordan Staal wasn't supposed to make the team, and once he did make it, he wasn't expected to contribute more than assisting on the penalty kill and filling in on the fourth line. Not much could be expected of an 18 year old rookie not named Sidney Crosby. That was the premise before the season started, at least. Now, heading into the stretch run toward the NHL Playoffs, Staal leads not just rookies, but the entire National Hockey League in shorthanded goals, after notching his 6th of the season, his 26th total goal. Three Stars of the Game #1 - Sidney Crosby , C, PIT - Shootout goal #2 - Marcel Hossa , LW, NYR - 2 Assists #3 - Jordan Staal , C, PIT - SH Goal", "after_revision": " received the #1 Star of the Game. Today, the Pittsburgh Penguins took on the in , New York. struck first for New York, with following suit in the final 2:30 to give the Rangers a comfortable 2-0 lead at the end of the second period. Staal's shorthanded goal came 76 seconds into the final period, with Staal beating Rangers goaltender with a soft forehand shot. Penguins winger continued the shorthanded show, scoring less than 2:00 later with a bad angle shot, which would ricochet off of Lundqvist's pad. When all momentum had seemingly crossed to the Penguins, Blair Betts fired a goal to restore New York's lead at 3-2. tied it up again late in the 3rd, with a blistering shot on a Penguins power play to level the score at 3-3. In the shootout, not a single score occurred until NHL scoring leader took the ice. With the shootout tied 0-0, and a point on the line, Crosby beat Lundqvist, lifting Pittsburgh to victory. The game was not a total loss for the Rangers, though, as they picked up a precious point by forcing overtime. Penguins rookie wasn't supposed to make the team, and once he did make it, he wasn't expected to contribute more than assisting on the penalty kill and filling in on the fourth line. Not much could be expected of an 18 year old rookie not named Sidney Crosby. That was the premise before the season started, at least. Now, heading into the stretch run toward the NHL Playoffs, Staal leads not just rookies, but the entire National Hockey League in shorthanded goals, after notching his 6th of the season, his 26th total goal. Three Stars of the Game #1 - , C, PIT - Shootout goal #2 - , LW, NYR - 2 Assists #3 - , C, PIT - SH Goal", "edit_actions": [{"type": "D", "before": "Sidney Crosby", "after": null, "start_char_pos": 0, "end_char_pos": 13}, {"type": "R", "before": "New York Rangers in Madison Square Garden", "after": "in", "start_char_pos": 91, "end_char_pos": 132}, {"type": "D", "before": "Jaromir Jagr", "after": null, "start_char_pos": 145, "end_char_pos": 157}, {"type": "D", "before": "Michael Nylander", "after": null, "start_char_pos": 190, "end_char_pos": 206}, {"type": "D", "before": "Henrik Lundqvist", "after": null, "start_char_pos": 418, "end_char_pos": 434}, {"type": "D", "before": "Colby Armstrong", "after": null, "start_char_pos": 478, "end_char_pos": 493}, {"type": "D", "before": "Sergei Gonchar", "after": null, "start_char_pos": 740, "end_char_pos": 754}, {"type": "D", "before": "Sidney Crosby", "after": null, "start_char_pos": 934, "end_char_pos": 947}, {"type": "D", "before": "Jordan Staal", "after": null, "start_char_pos": 1196, "end_char_pos": 1208}, {"type": "D", "before": "Sidney Crosby", "after": null, "start_char_pos": 1748, "end_char_pos": 1761}, {"type": "D", "before": "Marcel Hossa", "after": null, "start_char_pos": 1792, "end_char_pos": 1804}, {"type": "D", "before": "Jordan Staal", "after": null, "start_char_pos": 1832, "end_char_pos": 1844}], "sents_char_pos": [0, 47, 144, 315, 461, 622, 739, 863, 961, 1068, 1179, 1375, 1452, 1510, 1718]}
+{"doc_id": "64310", "revision_depth": "1", "before_revision": "Liverpool all but guaranteed a spot in the semifinals of the UEFA Champions League Tuesday night with a convincing 3-0 win over Dutch side PSV Eindhoven in Holland. A full crowd of 36,500 fans showed up at the Phillips Stadion to support their teams. Liverpool went into the game on a high having beaten Arsenal 4-1 at Anfield on Saturday. PSV on the other hand have been in a slump as of late in the Eredivise, as they have let Ajax Amsterdam back into the title race. Peter Crouch , who scored a hat-trick on Saturday, was partnered with Dirk Kuyt for Liverpool, while PSV paired Jefferson Farfan and Diego Tardelli as strikers. PSV were the first to threaten either goal, when Mika Vayrynen blasted a shot over the bar from well out after a one-two with Jefferson Farfan. John Arne Riise then had Liverpool's first chance as his shot was deflected wide, and the ensuing corner by Steven Gerrard was met by the head of Jamie Carragher , but keeper Heurelho Gomes produced a fine diving stop to keep the scores level. Carragher then nearly gave the hosts a goal as he defelected a corner barely over the crossbar. Reds captain Steven Gerrard then scored as he met Steve Finnan 's cross strongly with his head, and Gomes could do nothing as Gerrard scored his team record 16th goal in international play. PSV suffered a blow at the break with striker Jefferson Farfan having to leave the match. He was replaced by Chinese international Xiang Sun . A soft clearance attempt by Timmy Simmons then handed the ball to Riise, and the big Dane powered the ball past Gomes, giving the Reds a demanding 2-0 lead. Liverpool continued to pressure for a third goal, and Riise had another chance when Gomes mishandled a cross, but the keeper was able to recover and save his blushes. Finnan supplied the ball for the final goal of the match as well, as his cross was met by the head of Peter Crouch. The 3-0 lead guaranteed the reds the win, but they did suffer a blow on the night when midfielder Fabio Aurelio was forced to leave the pitch with injury. Kuyt also revieved a yellow card in the dying minutes, ruling him out of the second leg with suspension, but Liverpool have a fitting substitute in the form of Craig Bellamy .", "after_revision": "Liverpool all but guaranteed a spot in the semifinals of the Tuesday night with a convincing 3-0 win over Dutch side in Holland. A full crowd of 36,500 fans showed up at the to support their teams. Liverpool went into the game on a high having beaten Arsenal 4-1 at on Saturday. PSV on the other hand have been in a slump as of late in the Eredivise, as they have let Ajax Amsterdam back into the title race. , who scored a hat-trick on Saturday, was partnered with for Liverpool, while PSV paired and as strikers. PSV were the first to threaten either goal, when blasted a shot over the bar from well out after a one-two with Jefferson Farfan. then had Liverpool's first chance as his shot was deflected wide, and the ensuing corner by was met by the head of , but keeper produced a fine diving stop to keep the scores level. Carragher then nearly gave the hosts a goal as he deflected a corner barely over the crossbar. Reds captain Steven Gerrard then scored as he met 's cross strongly with his head, and Gomes could do nothing as Gerrard scored his team record 16th goal in international play. PSV suffered a blow at the break with striker Jefferson Farfan having to leave the match. He was replaced by Chinese international . A soft clearance attempt by then handed the ball to Riise, and the big Dane powered the ball past Gomes, giving the Reds a demanding 2-0 lead. Liverpool continued to pressure for a third goal, and Riise had another chance when Gomes mishandled a cross, but the keeper was able to recover and save his blushes. Finnan supplied the ball for the final goal of the match as well, as his cross was met by the head of Peter Crouch. The 3-0 lead guaranteed the reds the win, but they did suffer a blow on the night when midfielder was forced to leave the pitch with injury. Kuyt also revieved a yellow card in the dying minutes, ruling him out of the second leg with suspension, but Liverpool have a fitting substitute in the form of .", "edit_actions": [{"type": "D", "before": "UEFA Champions League", "after": null, "start_char_pos": 61, "end_char_pos": 82}, {"type": "D", "before": "PSV Eindhoven", "after": null, "start_char_pos": 139, "end_char_pos": 152}, {"type": "D", "before": "Phillips Stadion", "after": null, "start_char_pos": 210, "end_char_pos": 226}, {"type": "D", "before": "Anfield", "after": null, "start_char_pos": 319, "end_char_pos": 326}, {"type": "D", "before": "Peter Crouch", "after": null, "start_char_pos": 470, "end_char_pos": 482}, {"type": "D", "before": "Dirk Kuyt", "after": null, "start_char_pos": 540, "end_char_pos": 549}, {"type": "R", "before": "Jefferson Farfan and Diego Tardelli", "after": "and", "start_char_pos": 582, "end_char_pos": 617}, {"type": "D", "before": "Mika Vayrynen", "after": null, "start_char_pos": 680, "end_char_pos": 693}, {"type": "D", "before": "John Arne Riise", "after": null, "start_char_pos": 775, "end_char_pos": 790}, {"type": "D", "before": "Steven Gerrard", "after": null, "start_char_pos": 883, "end_char_pos": 897}, {"type": "D", "before": "Jamie Carragher", "after": null, "start_char_pos": 921, "end_char_pos": 936}, {"type": "D", "before": "Heurelho Gomes", "after": null, "start_char_pos": 950, "end_char_pos": 964}, {"type": "R", "before": "defelected", "after": "deflected", "start_char_pos": 1069, "end_char_pos": 1079}, {"type": "D", "before": "Steve Finnan", "after": null, "start_char_pos": 1165, "end_char_pos": 1177}, {"type": "D", "before": "Xiang Sun", "after": null, "start_char_pos": 1436, "end_char_pos": 1445}, {"type": "D", "before": "Timmy Simmons", "after": null, "start_char_pos": 1476, "end_char_pos": 1489}, {"type": "D", "before": "Fabio Aurelio", "after": null, "start_char_pos": 1986, "end_char_pos": 1999}, {"type": "D", "before": "Craig Bellamy", "after": null, "start_char_pos": 2203, "end_char_pos": 2216}], "sents_char_pos": [0, 164, 250, 339, 469, 630, 774, 1018, 1114, 1304, 1394, 1604, 1771, 1887, 2042]}
+{"doc_id": "64765", "revision_depth": "2", "before_revision": "140px|Greek President, Karolos Papoulias. The Ecumenical Hellenism program is going to get into its second decade of operation which officially started on March 22, when the heads of the program, Stavros Panousopoulos and professor Athanasios Angelopoulos payed a visit to the President of the Hellenic Republic , at the Presidential Palace in Athens. President Karolos Papoulias offered his personal official patronage and support to Ecumenical Hellenism and he showed an especial interest for the upcoming edition of the program \"Greek treasures in the world\". The previous Greek President, Costis Stephanopoulos had also offered his official support to the program's initiatives. Ecumenical Hellenism program announced that the second decade of the program's operation (2007-2016) will start with a concert with the famous Greek singer George Dalaras , at the Athens Concert Hall in mid-June as well as with the scheduled trip of the program to Mexico , during July 2007. According to the program's officials, in August 2008, the second world conference of expatriate Greeks will take place in Beijing, China on the occasion of the 2008 Olympic Games . The non-governmental program Ecumenical Hellenism operates since 1995 and exists under the patronage of the Hellenic Republic as well as under the blessing and support of the Orthodox Ecumenical Patriarchate and the Archbishop of Athens and All Greece Christodoulos . Category:Greece Category:Religion Category: C", "after_revision": "140px|Greek President, . The program is going to get into its second decade of operation which officially started on March 22, when the heads of the program, Stavros Panousopoulos and professor payed a visit to the , at the Presidential Palace in Athens. President offered his personal official patronage and support to Ecumenical Hellenism and he showed an especial interest for the upcoming edition of the program \"Greek treasures in the world\". The previous Greek President, had also offered his official support to the program's initiatives. Ecumenical Hellenism program announced that the second decade of the program's operation (2007-2016) will start with a concert with the famous Greek singer , at the in mid-June as well as with the scheduled trip of the program to , during July 2007. According to the program's officials, in August 2008, the second world conference of expatriate Greeks will take place in , on the occasion of the . The non-governmental program Ecumenical Hellenism operates since 1995 and exists under the patronage of the as well as under the blessing and support of the Orthodox and the . Category:Greece Category:Religion Category: China Category:Athens, Greece Category:Europe Category:", "edit_actions": [{"type": "R", "before": "Karolos Papoulias. The Ecumenical Hellenism", "after": ". The", "start_char_pos": 23, "end_char_pos": 66}, {"type": "D", "before": "Athanasios Angelopoulos", "after": null, "start_char_pos": 232, "end_char_pos": 255}, {"type": "D", "before": "President of the Hellenic Republic", "after": null, "start_char_pos": 277, "end_char_pos": 311}, {"type": "D", "before": "Karolos Papoulias", "after": null, "start_char_pos": 362, "end_char_pos": 379}, {"type": "D", "before": "Costis Stephanopoulos", "after": null, "start_char_pos": 593, "end_char_pos": 614}, {"type": "D", "before": "George Dalaras", "after": null, "start_char_pos": 839, "end_char_pos": 853}, {"type": "D", "before": "Athens Concert Hall", "after": null, "start_char_pos": 863, "end_char_pos": 882}, {"type": "D", "before": "Mexico", "after": null, "start_char_pos": 948, "end_char_pos": 954}, {"type": "R", "before": "Beijing, China", "after": ",", "start_char_pos": 1097, "end_char_pos": 1111}, {"type": "D", "before": "2008 Olympic Games", "after": null, "start_char_pos": 1135, "end_char_pos": 1153}, {"type": "D", "before": "Hellenic Republic", "after": null, "start_char_pos": 1264, "end_char_pos": 1281}, {"type": "R", "before": "Ecumenical Patriarchate and the Archbishop of Athens and All Greece Christodoulos", "after": "and the", "start_char_pos": 1340, "end_char_pos": 1421}, {"type": "R", "before": "C", "after": "China Category:Athens, Greece Category:Europe Category:", "start_char_pos": 1468, "end_char_pos": 1469}], "sents_char_pos": [0, 41, 351, 562, 682, 974, 1155]}
+{"doc_id": "65582", "revision_depth": "1", "before_revision": "Nagasaki Station (Photo by Kanko) Itch\u014d It\u014d, 61, the mayor of Nagasaki City, has been shot two times in the back and died at 2:28 a.m. at the Nagasaki University Hospital. It\u014d was shot by a man yesterday in front of his campaign office just across from the JR Nagasaki train station. One bullet hit his heart sending him into cardiac arrest. The attack occurred around 7:50 p.m. local time in Nagasaki. He reportedly had trouble with the City for not compensating for an accident that occurred a few years ago in which his car was damaged at a construction site operated by the city's public works department. Police say that later, during an interrogation , Shiroo confessed to the shooting and his intent to kill It\u014d. It\u014d is the fifth politician to be shot in Japan since World War II , a rare occurrence, as gun ownership is banned in Japan.", "after_revision": "Nagasaki Station (Photo by Kanko) On April 16 Itch\u014d It\u014d, 61, mayor of Nagasaki City, was shot two times in the back . Mayor It\u014d died at 2:28 a.m. at the Nagasaki University Hospital. It\u014d was shot by a man yesterday in front of his campaign office just across from the JR Nagasaki train station. One bullet hit his heart , sending him into cardiac arrest. The attack occurred around 7:50 p.m. local time in Nagasaki. He reportedly had trouble with the city for failure to compensate for an accident that had occurred a few years ago in which his car had been damaged at a construction site operated by the city's public works department. Police say that during an interrogation Shiroo confessed to the shooting and his intent to kill It\u014d. It\u014d is the fifth politician to be shot in Japan since World War II ; a rare occurrence, because gun ownership is banned in Japan.", "edit_actions": [{"type": "A", "before": null, "after": "On April 16", "start_char_pos": 34, "end_char_pos": 34}, {"type": "D", "before": "the", "after": null, "start_char_pos": 50, "end_char_pos": 53}, {"type": "R", "before": "has been", "after": "was", "start_char_pos": 78, "end_char_pos": 86}, {"type": "R", "before": "and", "after": ". Mayor It\u014d", "start_char_pos": 114, "end_char_pos": 117}, {"type": "A", "before": null, "after": ",", "start_char_pos": 310, "end_char_pos": 310}, {"type": "R", "before": "City for not compensating", "after": "city for failure to compensate", "start_char_pos": 440, "end_char_pos": 465}, {"type": "A", "before": null, "after": "had", "start_char_pos": 487, "end_char_pos": 487}, {"type": "R", "before": "was", "after": "had been", "start_char_pos": 530, "end_char_pos": 533}, {"type": "D", "before": "later,", "after": null, "start_char_pos": 629, "end_char_pos": 635}, {"type": "D", "before": ",", "after": null, "start_char_pos": 660, "end_char_pos": 661}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 790, "end_char_pos": 791}, {"type": "R", "before": "as", "after": "because", "start_char_pos": 811, "end_char_pos": 813}], "sents_char_pos": [0, 172, 284, 343, 404, 612, 722]}
+{"doc_id": "65782", "revision_depth": "1", "before_revision": "The New York Rangers annihilated the Atlanta Thrashers Monday night, burying pucks in the back of the goal the entire game with Michael Nylander leading the way. Nylander scored the first hat trick of the postseason, scoring the opening goal, as well as the final, as the Rangers to a dominated the Atlanta Thrashers , 7-0. Nylander scored his first of what would be three goals 0:32 into regulation, beating Kari Lehtonen , who was just barraged with pucks the entire night. Nylander's first goal would prove to be the game winner, but the Rangers were determined to pad their lead. Nylander scored his second of the game 9:13 later to double the Rangers lead. After four more scores, Nylander would cap the game off at 15:54 to complete the Thrashers' embarrassing loss. The Atlanta Thrashers , down three games, will try to stop their skid, and the sweep of the opening round series Wednesday night, when they will travel to Madison Square Garden in New York City to battle the Rangers , perhaps for the last time.", "after_revision": "The annihilated the Monday night, burying pucks in the back of the goal the entire game with leading the way. Nylander scored the first of the postseason, scoring the opening goal, as well as the final, as the to a dominated the , 7-0. scored his first of what would be three goals 0:32 into regulation, beating , who was just barraged with pucks the entire night. first goal would prove to be the game winner, but the were determined to pad their lead. scored his second of the game 9:13 later to double the lead. After four more scores, would cap the game off at 15:54 to complete the embarrassing loss. The , down three games, will try to stop their skid, and the sweep of the opening round series Wednesday night, when they will travel to in to battle the , perhaps for the last time.", "edit_actions": [{"type": "R", "before": "New York Rangers annihilated the Atlanta Thrashers", "after": "annihilated the", "start_char_pos": 4, "end_char_pos": 54}, {"type": "D", "before": "Michael Nylander", "after": null, "start_char_pos": 128, "end_char_pos": 144}, {"type": "D", "before": "hat trick", "after": null, "start_char_pos": 188, "end_char_pos": 197}, {"type": "D", "before": "Rangers", "after": null, "start_char_pos": 272, "end_char_pos": 279}, {"type": "D", "before": "Atlanta Thrashers", "after": null, "start_char_pos": 299, "end_char_pos": 316}, {"type": "D", "before": "Nylander", "after": null, "start_char_pos": 324, "end_char_pos": 332}, {"type": "D", "before": "Kari Lehtonen", "after": null, "start_char_pos": 409, "end_char_pos": 422}, {"type": "D", "before": "Nylander's", "after": null, "start_char_pos": 476, "end_char_pos": 486}, {"type": "D", "before": "Rangers", "after": null, "start_char_pos": 541, "end_char_pos": 548}, {"type": "D", "before": "Nylander", "after": null, "start_char_pos": 584, "end_char_pos": 592}, {"type": "D", "before": "Rangers", "after": null, "start_char_pos": 648, "end_char_pos": 655}, {"type": "D", "before": "Nylander", "after": null, "start_char_pos": 686, "end_char_pos": 694}, {"type": "D", "before": "Thrashers'", "after": null, "start_char_pos": 743, "end_char_pos": 753}, {"type": "D", "before": "Atlanta Thrashers", "after": null, "start_char_pos": 777, "end_char_pos": 794}, {"type": "R", "before": "Madison Square Garden in New York City", "after": "in", "start_char_pos": 928, "end_char_pos": 966}, {"type": "D", "before": "Rangers", "after": null, "start_char_pos": 981, "end_char_pos": 988}], "sents_char_pos": [0, 161, 475, 583, 661, 772]}
+{"doc_id": "663513", "revision_depth": "1", "before_revision": "In the , the defeated the , 34-31 to win on Sunday, despite a power outage at the New Orleans Superdome. Referee flipped the coin and the Ravens of the won the coin toss and elected to defer till the second half. The 49ers of the started on the 20 yard line and quickly went three and out. The Ravens first play on offense was a pass from quarterback to for an 8 yard gain. After working their way down the field the Ravens scored on a Flacco pass to . put in the extra point for the Ravens to take the lead 7-0. Ted Ginn, Jr. from the San Francisco 49ers. The Ravens worked their way down the field until they hit the 14 yard line, where they set up for a field goal. Tucker took a direct snap and ran towards the first down marker ending up short of the first down ending their drive. The ensuing 49ers drive ended in a 3 and out. The Ravens responded with a 3 play touchdown drive ending with a 56 yard pass to from Flacco. This put the Ravens up 21-3 with 1:45 left in the first half. A successful 27 yard field goal by Akers followed shortly after as the score became 21-6 heading into halftime. After the half-time show featuring , the Ravens got the ball to start the second half. Akers kicked it off to , Jones stepping out from the end of the end zone returning it for 108 yards, an tie for the longest return in Super Bowl history. This pushed the score up to 28-6. After a punt by the 49ers and the Ravens, the 49ers drove down the field to score with a 31 yard throw to for a touchdown. An Akers extra point brought the score to 28-13. The next drive for the Ravens ended in a 3 and out. The 49ers came back 2 plays later with a 6 yard run by . The following Akers extra point made the score 28-20. The next possession for the Raven ended 2 plays in after a fumble that was recovered by . The next drive almost ended in a missed 39 yard field goal by Akers but was saved due to a running into the kicker penalty by . After the 5 yards were accessed, Akers lined up and made the 34 yard field goal bringing the score to 28-23. The Ravens responded on their next drive with a 19 yard field goal by Tucker to increase their lead to 31-23. The 49ers responded with a 5 play touchdown drive ending with a Kaepernick 15 yard scramble to close the gap to 31-29 with the extra point to follow. The 49ers attempted a two point conversion but the pass was overthrown resulting in a missed attempt, leaving the score at 31-29 with 9:57 remaining in the 4th quarter. The Ravens took over the ball for a 5 minute 38 second drive that ended in a Tucker 38 yard field goal, making the score 34-29. Trying to finish their rally, the 49ers drove down to the 7 yard line. After a 2 yard rush by James, and 3 incomplete passes by Kaepernick, the Raven took over on downs on the 5 yard line with 1:46 left in the game. After a run by , the 49ers called their last timeout to stop the clock with 1:42 left. A run by , and then Leach left the Ravens with a 4th and 7. The Ravens called a timeout to determine their next play. Lining up in punting formation, Koch caught the ball and ran around the end zone to waste time before getting pushed out for a safety by to make the score 34-31 with 4 seconds left in the game. To end the game Koch punted the ball to who returned the ball to end the game. ", "after_revision": "In the National Football League , the defeated the , 34\u201331 to win on Sunday, despite a power outage at the New Orleans Superdome. Referee flipped the coin and the Ravens of the won the coin toss and elected to defer till the second half. The 49ers of the started on the 20 yard line and quickly went three and out. The Ravens first play on offense was a pass from quarterback to for an 8 yard gain. After working their way down the field the Ravens scored on a Flacco pass to . put in the extra point for the Ravens to take the lead 7\u20130. Ted Ginn, Jr. from the San Francisco 49ers. The Ravens worked their way down the field until they hit the 14 yard line, where they set up for a field goal. Tucker took a direct snap and ran towards the first down marker ending up short of the first down ending their drive. The ensuing 49ers drive ended in a 3 and out. The Ravens responded with a 3 play touchdown drive ending with a 56 yard pass to from Flacco. This put the Ravens up 21\u20133 with 1:45 left in the first half. A successful 27 yard field goal by Akers followed shortly after as the score became 21\u20136 heading into halftime. After the half-time show featuring , the Ravens got the ball to start the second half. Akers kicked it off to , Jones stepping out from the end of the end zone returning it for 108 yards, an tie for the longest return in Super Bowl history. This pushed the score up to 28\u20136. After a punt by the 49ers and the Ravens, the 49ers drove down the field to score with a 31 yard throw to for a touchdown. An Akers extra point brought the score to 28\u201313. The next drive for the Ravens ended in a 3 and out. The 49ers came back 2 plays later with a 6 yard run by . The following Akers extra point made the score 28\u201320. The next possession for the Raven ended 2 plays in after a fumble that was recovered by . The next drive almost ended in a missed 39 yard field goal by Akers but was saved due to a running into the kicker penalty by . After the 5 yards were accessed, Akers lined up and made the 34 yard field goal bringing the score to 28\u201323. The Ravens responded on their next drive with a 19 yard field goal by Tucker to increase their lead to 31\u201323. The 49ers responded with a 5 play touchdown drive ending with a Kaepernick 15 yard scramble to close the gap to 31\u201329 with the extra point to follow. The 49ers attempted a two point conversion but the pass was overthrown resulting in a missed attempt, leaving the score at 31\u201329 with 9:57 remaining in the 4th quarter. The Ravens took over the ball for a 5 minute 38 second drive that ended in a Tucker 38 yard field goal, making the score 34\u201329. Trying to finish their rally, the 49ers drove down to the 7 yard line. After a 2 yard rush by James, and 3 incomplete passes by Kaepernick, the Raven took over on downs on the 5 yard line with 1:46 left in the game. After a run by , the 49ers called their last timeout to stop the clock with 1:42 left. A run by , and then Leach left the Ravens with a 4th and 7. The Ravens called a timeout to determine their next play. Lining up in punting formation, Koch caught the ball and ran around the end zone to waste time before getting pushed out for a safety by to make the score 34\u201331 with 4 seconds left in the game. To end the game Koch punted the ball to who returned the ball to end the game. Sister links", "edit_actions": [{"type": "A", "before": null, "after": "National Football League", "start_char_pos": 7, "end_char_pos": 7}, {"type": "R", "before": "34-31", "after": "34\u201331", "start_char_pos": 29, "end_char_pos": 34}, {"type": "R", "before": "7-0.", "after": "7\u20130.", "start_char_pos": 509, "end_char_pos": 513}, {"type": "R", "before": "21-3", "after": "21\u20133", "start_char_pos": 951, "end_char_pos": 955}, {"type": "R", "before": "21-6", "after": "21\u20136", "start_char_pos": 1074, "end_char_pos": 1078}, {"type": "R", "before": "28-6.", "after": "28\u20136.", "start_char_pos": 1371, "end_char_pos": 1376}, {"type": "R", "before": "28-13.", "after": "28\u201313.", "start_char_pos": 1542, "end_char_pos": 1548}, {"type": "R", "before": "28-20.", "after": "28\u201320.", "start_char_pos": 1705, "end_char_pos": 1711}, {"type": "R", "before": "28-23.", "after": "28\u201323.", "start_char_pos": 2032, "end_char_pos": 2038}, {"type": "R", "before": "31-23.", "after": "31\u201323.", "start_char_pos": 2142, "end_char_pos": 2148}, {"type": "R", "before": "31-29", "after": "31\u201329", "start_char_pos": 2261, "end_char_pos": 2266}, {"type": "R", "before": "31-29", "after": "31\u201329", "start_char_pos": 2422, "end_char_pos": 2427}, {"type": "R", "before": "34-29.", "after": "34\u201329.", "start_char_pos": 2589, "end_char_pos": 2595}, {"type": "R", "before": "34-31", "after": "34\u201331", "start_char_pos": 3172, "end_char_pos": 3177}, {"type": "A", "before": null, "after": "Sister links", "start_char_pos": 3290, "end_char_pos": 3290}], "sents_char_pos": [0, 105, 213, 290, 374, 513, 557, 669, 787, 833, 927, 989, 1101, 1188, 1342, 1376, 1499, 1548, 1600, 1657, 1711, 1801, 2038, 2148, 2298, 2467, 2595, 2666, 2811, 2898, 2958, 3016, 3210]}
+{"doc_id": "69247", "revision_depth": "1", "before_revision": "Carlos Delgado during a spring training game. Delgado hit in the winning runs in the bottom of the ninth. The New York Mets hosted the Chicago Cubs at Shea Stadium in Flushing , New York, and was behind by five runs going into the ninth inning, but a rally brought them ahead at the end. Cub starter \u00c1ngel Guzm\u00e1n gave up six hits, but only allowed one run in his seven inning appearance, an RBI single by Endy Ch\u00e1vez in the fifth inning. Mets starter Jason Vargas gave up all five of the Cubs' runs: a sacrifice fly RBI in the fourth, and two two-run home runs in the sixth inning. Angel Pag\u00e1n hit his second home run of the season with a two-run fly ball over the left field fence, scoring Endy Ch\u00e1vez. Two batters later, Aramis Ram\u00edrez picked up his tenth home run of the season with a two run line drive over the same fence, scoring Alfonso Soriano . Cub pitcher Ryan Dempster got stuck in a jam in the bottom of the ninth, filling the bases and giving up two runs. Reliever Scott Eyre came in to try and end the game, but gave up two hits, including the two-run single by Carlos Delgado that gave the Mets not only their first lead of the game, but the win. The Mets, who took the four-game series 3-1, are playing an inter-league game against the New York Yankees in a three-game \"subway series\" starting Friday. Meanwhile, the Cubs are preparing for their own inter-city, inter-league game at Wrigley Field against the Chicago White Sox .", "after_revision": "Carlos Delgado during a spring training game. Delgado hit in the winning runs in the bottom of the ninth. The hosted the at in , New York, and was behind by five runs going into the ninth inning, but a rally brought them ahead at the end. gave up six hits, but only allowed one run in his seven inning appearance, an RBI single by in the fifth inning. Mets starter gave up all five of the Cubs' runs: a sacrifice fly RBI in the fourth, and two two-run home runs in the sixth inning. hit his second home run of the season with a two-run fly ball over the left field fence, scoring Endy Ch\u00e1vez. Two batters later, picked up his tenth home run of the season with a two run line drive over the same fence, scoring . got stuck in a jam in the bottom of the ninth, filling the bases and giving up two runs. Reliever came in to try and end the game, but gave up two hits, including the two-run single by that gave the Mets not only their first lead of the game, but the win. in a three-game \"subway series\" starting Friday. Meanwhile, the Cubs are preparing for their own inter-city, inter-league game at against the .", "edit_actions": [{"type": "R", "before": "New York Mets hosted the Chicago Cubs at Shea Stadium in Flushing", "after": "hosted the at in", "start_char_pos": 110, "end_char_pos": 175}, {"type": "D", "before": "Cub starter \u00c1ngel Guzm\u00e1n", "after": null, "start_char_pos": 288, "end_char_pos": 312}, {"type": "D", "before": "Endy Ch\u00e1vez", "after": null, "start_char_pos": 405, "end_char_pos": 416}, {"type": "D", "before": "Jason Vargas", "after": null, "start_char_pos": 451, "end_char_pos": 463}, {"type": "D", "before": "Angel Pag\u00e1n", "after": null, "start_char_pos": 582, "end_char_pos": 593}, {"type": "D", "before": "Aramis Ram\u00edrez", "after": null, "start_char_pos": 723, "end_char_pos": 737}, {"type": "D", "before": "Alfonso Soriano", "after": null, "start_char_pos": 836, "end_char_pos": 851}, {"type": "D", "before": "Cub pitcher Ryan Dempster", "after": null, "start_char_pos": 854, "end_char_pos": 879}, {"type": "D", "before": "Scott Eyre", "after": null, "start_char_pos": 978, "end_char_pos": 988}, {"type": "D", "before": "Carlos Delgado", "after": null, "start_char_pos": 1076, "end_char_pos": 1090}, {"type": "D", "before": "The Mets, who took the four-game series 3-1, are playing an inter-league game against the New York Yankees", "after": null, "start_char_pos": 1162, "end_char_pos": 1268}, {"type": "R", "before": "Wrigley Field against the Chicago White Sox", "after": "against the", "start_char_pos": 1399, "end_char_pos": 1442}], "sents_char_pos": [0, 45, 105, 287, 437, 581, 703, 853, 968, 1161, 1317]}
+{"doc_id": "70655", "revision_depth": "1", "before_revision": "A Malaysian Christian woman who has been fighting a six-year legal battle to have the word Islam removed from her national identification card has lost an appeal with the Malaysian Federal Court . The three-judge panel rejected the appeal in a 2-1 decision on Tuesday in Putrajaya . Lina Joy , 42, was born Azlina Jailani to Malay parents, and was raised as a Muslim. Malaysia's constitution guarantees freedom of religion, but by law, all ethnic Malays are Muslim. Joy converted to Christianity at age 26, and after some bureaucratic difficulties had her named legally changed in 1999. However, on her MyKad national ID, the National Registration Department retained her stated religion as Islam. In order to have her religion changed, the National Registration Department said Joy would have to obtain a certificate of apostasy from the Muslim Sharia Court. In Tuesday's ruling at the Palace of Justice, Justice Ahmad Fairuz and Federal Court Judge Alauddin Mohd Sheriff rejected the appeal, while Justice Richard Malanjum dissented. The hearing was the final legal step Joy could take, although her lawyer, Benjamin Dawson, said he was considering filing for a review of the judgment. Joy received the verdict with \"great sorrow\", the New Straits Times reported. \"I am disappointed that the Federal Court is not able to vindicate a simple but important fundamental right that exists in all persons; namely, the right to believe in the religion of one's choice and equally important, the right to marry a person of one's choice and to raise a family in the Malaysia context,\" Joy was quoted in a statement from her lawyer, and published in The Star . \"The Federal Court has not only denied me that right but to all Malaysians who value fundamental freedoms. Joy has since been disowned by her family, and forced to quit her job. A Muslim lawyer who supported her case received death threats . Joy went into hiding last year, and is believed to be living outside Malaysia. Now, it's not likely she will return, The Star reported. \"It would extremely difficult to exercise freedom of conscience in the present environment,\" she was quoted as by the paper. \"It's clearly justified and fair,\" Yusri Muhd, president of The Defenders of Islam Coalition, was quoted as saying by Channel NewsAsia . \"We hope that we've seen the last of such an attempt.\" Ivy Josiah of the Women's Aid Organization said was \"deeply disappointed\" by the ruling, she said her group was encouraged by the dissenting judgment \"which means there's still light at the end of the tunnel.\" The lone dissenting justice, Chief Judge of Sabah and Sarawak Richard Malanjum, wrote: \"To expect the appellant to apply for a certificate of apostasy - when to do so would likely expose her to a range of offenses under the Islamic law - is, in my view, unreasonable.\" ", "after_revision": "A Malaysian Christian woman who has been fighting a six-year legal battle to have the word Islam removed from her has lost an appeal with the . The three-judge panel rejected the appeal in a 2\u20131 decision on Tuesday in . , 42, was born Azlina Jailani to parents, and was raised as a Muslim. guarantees freedom of religion, but by law, all ethnic Malays are Muslim. Joy converted to Christianity at age 26, and after some bureaucratic difficulties had her named legally changed in 1999. However, on her national ID, the National Registration Department retained her stated religion as Islam. In order to have her religion changed, the National Registration Department said Joy would have to obtain a certificate of from the Muslim Sharia Court. In Tuesday's ruling at the , and Federal Court Judge Alauddin Mohd Sheriff rejected the appeal, while dissented. The hearing was the final legal step Joy could take, although her lawyer, Benjamin Dawson, said he was considering filing for a review of the judgment. Joy received the verdict with \"great sorrow\", the reported. \"I am disappointed that the Federal Court is not able to vindicate a simple but important fundamental right that exists in all persons; namely, the right to believe in the religion of one's choice and equally important, the right to marry a person of one's choice and to raise a family in the Malaysia context,\" Joy was quoted in a statement from her lawyer, and published in . \"The Federal Court has not only denied me that right but to all Malaysians who value fundamental freedoms. Joy has since been disowned by her family, and forced to quit her job. A Muslim lawyer who supported her case received . Joy went into hiding last year, and is believed to be living outside Malaysia. Now, it's not likely she will return, The Star reported. \"It would extremely difficult to exercise freedom of conscience in the present environment,\" she was quoted as by the paper. \"It's clearly justified and fair,\" Yusri Muhd, president of The Defenders of Islam Coalition, was quoted as saying by . \"We hope that we've seen the last of such an attempt.\" of the said was \"deeply disappointed\" by the ruling, she said her group was encouraged by the dissenting judgment \"which means there's still light at the end of the tunnel.\" The lone dissenting justice, Chief Judge of and Sarawak Richard Malanjum, wrote: \"To expect the appellant to apply for a certificate of apostasy - when to do so would likely expose her to a range of offenses under the Islamic law - is, in my view, unreasonable.\" Sister links", "edit_actions": [{"type": "D", "before": "national identification card", "after": null, "start_char_pos": 114, "end_char_pos": 142}, {"type": "D", "before": "Malaysian Federal Court", "after": null, "start_char_pos": 171, "end_char_pos": 194}, {"type": "R", "before": "2-1", "after": "2\u20131", "start_char_pos": 244, "end_char_pos": 247}, {"type": "D", "before": "Putrajaya", "after": null, "start_char_pos": 271, "end_char_pos": 280}, {"type": "D", "before": "Lina Joy", "after": null, "start_char_pos": 283, "end_char_pos": 291}, {"type": "D", "before": "Malay", "after": null, "start_char_pos": 325, "end_char_pos": 330}, {"type": "D", "before": "Malaysia's constitution", "after": null, "start_char_pos": 368, "end_char_pos": 391}, {"type": "D", "before": "MyKad", "after": null, "start_char_pos": 603, "end_char_pos": 608}, {"type": "D", "before": "apostasy", "after": null, "start_char_pos": 821, "end_char_pos": 829}, {"type": "R", "before": "Palace of Justice, Justice Ahmad Fairuz", "after": ",", "start_char_pos": 887, "end_char_pos": 926}, {"type": "D", "before": "Justice Richard Malanjum", "after": null, "start_char_pos": 1000, "end_char_pos": 1024}, {"type": "D", "before": "New Straits Times", "after": null, "start_char_pos": 1238, "end_char_pos": 1255}, {"type": "D", "before": "The Star", "after": null, "start_char_pos": 1642, "end_char_pos": 1650}, {"type": "D", "before": "death threats", "after": null, "start_char_pos": 1879, "end_char_pos": 1892}, {"type": "D", "before": "Channel NewsAsia", "after": null, "start_char_pos": 2274, "end_char_pos": 2290}, {"type": "R", "before": "Ivy Josiah of the Women's Aid Organization", "after": "of the", "start_char_pos": 2348, "end_char_pos": 2390}, {"type": "D", "before": "Sabah", "after": null, "start_char_pos": 2602, "end_char_pos": 2607}, {"type": "A", "before": null, "after": "Sister links", "start_char_pos": 2827, "end_char_pos": 2827}], "sents_char_pos": [0, 196, 367, 465, 586, 697, 859, 1035, 1187, 1265, 1401, 1759, 1830, 1973, 2030, 2155, 2347, 2557]}
+{"doc_id": "71525", "revision_depth": "1", "before_revision": "On Thursday, June 7, the famous Vienna Ringstra\u00dfe was partially blocked for about an hour as the 100-150 participants of a demonstration organized by the Austrian Pirate URL walked along it to call out against planned data retention legislation in Austria which would implement a European Union (EU) directive. On data retention The EU directiveEuropean Data Retention Directive calls for the preservation of all call detail records for at least 6 months by all member states. This would mean that all information about who communicated with whom and when would have to be saved by telecommunication companies, to be available to the authorities in case the data is needed for an investigation. Critics of data retention argue that it is an undue intrusion into the privacy of citizens and a violation of the presumption of innocence. Supporters of data retention highlight the use of data retention in crime-fighting, especially against terrorists and paedophiles. The demonstration 250px|The participants blocking Ringstra\u00dfe. The demonstration started at 7:00 p.m. local time in front of the University of Vienna . By then, supporters from a preceding demonstration against the G8 Summit in Germany, from the Austrian Green Party Youth, the Green and Alternative Students (German Wikipedia), the Austrian Communist Party, the Austrian Communist Students (German Wikipedia) and Monochrom , an artist group had gathered to march towards the Ministry for Traffic, Infrastructure and Technology, which is supposed to implement data retention. 250px|Florian Hufsky (third from the left) and Rickard Falkvinge (fourth from the left) addressing the crowd. When the crowd reached the Ministry, Florian Hufsky, the speaker of the Austrian Pirate Party and Rickard Falkvinge , the founder and leader of the Swedish Pirate Party , addressed the participants. Hufsky thanked all supporters and stressed the Pirate Parties' stance on data retention: \"It is an effort to strip people of their civil liberties.\" (Video in German) Falkvinge seconded Hufsky, saying \"We are taking a stand, and we are not going to let that happen.\". He added that European Pirate Parties are \"fighting a harsh and powerful enemy. [...] We will not let our liberties be taken away without a fight!\" Falkvinge stressed international cooperation and that the participants of the demonstration should \"remember that [they] are part of something big\". Category:Austria Category: Euro", "after_revision": "On Thursday, June 7, the famous Vienna was partially blocked for about an hour as the 100-150 participants of a demonstration organized by the Austrian Pirate URL walked along it to call out against planned legislation in Austria which would implement a (EU) directive. On data retention The EU directiveEuropean Data Retention Directive calls for the preservation of all for at least 6 months by all member states. This would mean that all information about who communicated with whom and when would have to be saved by telecommunication companies, to be available to the authorities in case the data is needed for an investigation. Critics of data retention argue that it is an undue intrusion into the privacy of citizens and a violation of the presumption of innocence. Supporters of data retention highlight the use of data retention in crime-fighting, especially against terrorists and paedophiles. The demonstration 250px|The participants blocking Ringstra\u00dfe. The demonstration started at 7:00 p.m. local time in front of the . By then, supporters from a preceding demonstration against the in Germany, from the Youth, the (German Wikipedia), the , the (German Wikipedia) and , an artist group had gathered to march towards the Ministry for Traffic, Infrastructure and Technology, which is supposed to implement data retention. 250px|Florian Hufsky (third from the left) and Rickard Falkvinge (fourth from the left) addressing the crowd. When the crowd reached the Ministry, Florian Hufsky, the speaker of the Austrian Pirate Party and , the founder and leader of the , addressed the participants. Hufsky thanked all supporters and stressed the Pirate Parties' stance on data retention: \"It is an effort to strip people of their civil liberties.\" (Video in German) Falkvinge seconded Hufsky, saying \"We are taking a stand, and we are not going to let that happen.\". He added that European Pirate Parties are \"fighting a harsh and powerful enemy. [...] We will not let our liberties be taken away without a fight!\" Falkvinge stressed international cooperation and that the participants of the demonstration should \"remember that [they] are part of something big\". Category:Austria Category: Europe Category", "edit_actions": [{"type": "D", "before": "Ringstra\u00dfe", "after": null, "start_char_pos": 39, "end_char_pos": 49}, {"type": "D", "before": "data retention", "after": null, "start_char_pos": 218, "end_char_pos": 232}, {"type": "D", "before": "European Union", "after": null, "start_char_pos": 280, "end_char_pos": 294}, {"type": "D", "before": "call detail records", "after": null, "start_char_pos": 413, "end_char_pos": 432}, {"type": "D", "before": "University of Vienna", "after": null, "start_char_pos": 1094, "end_char_pos": 1114}, {"type": "D", "before": "G8 Summit", "after": null, "start_char_pos": 1180, "end_char_pos": 1189}, {"type": "D", "before": "Austrian Green Party", "after": null, "start_char_pos": 1211, "end_char_pos": 1231}, {"type": "D", "before": "Green and Alternative Students", "after": null, "start_char_pos": 1243, "end_char_pos": 1273}, {"type": "R", "before": "Austrian Communist Party, the Austrian Communist Students", "after": ", the", "start_char_pos": 1298, "end_char_pos": 1355}, {"type": "D", "before": "Monochrom", "after": null, "start_char_pos": 1379, "end_char_pos": 1388}, {"type": "D", "before": "Rickard Falkvinge", "after": null, "start_char_pos": 1749, "end_char_pos": 1766}, {"type": "D", "before": "Swedish Pirate Party", "after": null, "start_char_pos": 1799, "end_char_pos": 1819}, {"type": "R", "before": "Euro", "after": "Europe Category", "start_char_pos": 2442, "end_char_pos": 2446}], "sents_char_pos": [0, 310, 476, 694, 834, 965, 1027, 1116, 1540, 1650, 1849, 2117, 2265, 2414]}
+{"doc_id": "72885", "revision_depth": "1", "before_revision": "In a departure from its usual neutrality, the International Committee of the Red Cross today issued a statement condemning Myanmar's military State Peace and Development Council for human rights abuses. The Geneva , Switzerland-based International Committee of the Red Cross, or ICRC, said the Myanmar junta is systematically causing thousands of people to suffer, especially along the border with Thailand, where government soldiers raid villages, destroy food supplies, force people from their homes and commit acts of violence, including murder and child abuse. Detainees, the ICRC said, were being forced to work on government projects or act as porters for the military. In Beijing yesterday, U.S. State Department officials held talks with representatives of Myanmar's military regime, with the U.S. issuing a \"very pointed and very direct\" demand that the junta release detained democracy leader Aung San Suu Kyi . In March this year, the ICRC closed its offices in Yangon , Myanmar's former capital, after the organization's staff were prevented from visiting prisons or conducting independent field operations in the border areas. The condemnation of Myanmar by the ICRC is the strongest since it denounced the 1994 Rwandan Genocide . One U.S. official, speaking to Agence France-Presse (AFP) on condition of anonymity, said the discussions were \"very pointed and very direct.\" In Washington , U.S. State Department spokesman Tom Casey said the U.S. delegation demanded the release of Suu Kyi and other political detainees, but received no positive response from the Myanmar officials. \"I don't think we saw anything coming out of them that will indicate, unfortunately, that they have changed their basic opinions,\" Casey was quoted as saying by AFP. \"We certainly did not hear that they were planning on releasing Aung San Suu Kyi or other political prisoners,\" he continued. Long-standing U.S. diplomatic policy is to not meet with Myanmar leaders in their own country unless the U.S. officials are first allowed to visit Suu Kyi, leader of the National League for Democracy (NLD), which won elections in 1990. The military, which has ruled Myanmar since 1962, never honored the results and has kept Suu Kyi, a Nobel Peace Prize laureate, under house arrest for most of the time since then. Myanmar is also known as Burma, its former name under the British Empire . The military officially renamed the country Myanmar in 1989, but many countries and organizations, mostly those that refuse to recognize the military government, still refer to it as Burma. Phyu Phyu Thin However Phyu Phyu Thin , an AIDS campaigner who was arrested on May 21 for organizing a prayer campaign for the release of Suu Kyi was not among those freed. While it isn't known where Phyu Phyu Thin is being held, the NLD says she has started a hunger strike . \u201cThe NLD calls for the immediate release of Phyu Phyu Thin, who should receive health care from her family,\u201d NLD spokesman Myint Thein was quoted as saying by The Irrawaddy . \u201cWe [the NLD], together with her family, are seriously concerned about her health.\u201d An outspoken critic, who has said the junta is understating the number of HIV and AIDS cases in Myanmar, Phyu Phyu Thin runs a small clinic that provides care and counseling to HIV/AIDS patients. The U.S. State Department issued a statement on Wednesday, calling for Phyu Phyu Thin's release. \"The United States calls for the immediate and unconditional release of Phyu Phyu Thin [and] others recently detained while praying at pagodas,\" State Department spokesman Sean McCormack said in a statement. Earlier, another NLD activist, Su Su Nway , was released for health reasons. The release of the 51 activists coincided with a visit by United Nations envoy Radhika Coomaraswamy , special representative for children and armed conflict. She met acting prime minister Lieutenant-General Thein Sein on Wednesday morning in the new administrative capital, Naypyidaw . However, it wasn't known if the U.N. envoy had raised the issue of the detained activists.", "after_revision": "In a departure from its usual neutrality, the today issued a statement condemning Myanmar's military for human rights abuses. The , Switzerland-based International Committee of the Red Cross, or ICRC, said the Myanmar junta is systematically causing thousands of people to suffer, especially along the border with Thailand, where government soldiers raid villages, destroy food supplies, force people from their homes and commit acts of violence, including murder and child abuse. Detainees, the ICRC said, were being forced to work on government projects or act as porters for the military. In yesterday, officials held talks with representatives of Myanmar's military regime, with the U.S. issuing a \"very pointed and very direct\" demand that the release detained democracy leader . In March this year, the ICRC closed its offices in , Myanmar's former capital, after the organization's staff were prevented from visiting prisons or conducting independent field operations in the border areas. The condemnation of Myanmar by the ICRC is the strongest since it denounced the 1994 . One U.S. official, speaking to (AFP) on condition of anonymity, said the discussions were \"very pointed and very direct.\" In , U.S. State Department spokesman said the U.S. delegation demanded the release of Suu Kyi and other political detainees, but received no positive response from the Myanmar officials. \"I don't think we saw anything coming out of them that will indicate, unfortunately, that they have changed their basic opinions,\" Casey was quoted as saying by AFP. \"We certainly did not hear that they were planning on releasing Aung San Suu Kyi or other political prisoners,\" he continued. Long-standing U.S. diplomatic policy is to not meet with Myanmar leaders in their own country unless the U.S. officials are first allowed to visit Suu Kyi, leader of the (NLD), which won elections in 1990. The military, which has ruled Myanmar since 1962, never honored the results and has kept Suu Kyi, a laureate, under house arrest for most of the time since then. Myanmar is also known as Burma, its former name under the . The military officially renamed the country Myanmar in 1989, but many countries and organizations, mostly those that refuse to recognize the military government, still refer to it as Burma. Phyu Phyu Thin However , an AIDS campaigner who was arrested on May 21 for organizing a prayer campaign for the release of Suu Kyi was not among those freed. While it isn't known where Phyu Phyu Thin is being held, the NLD says she has started a . \u201cThe NLD calls for the immediate release of Phyu Phyu Thin, who should receive health care from her family,\u201d NLD spokesman Myint Thein was quoted as saying by . \u201cWe [the NLD], together with her family, are seriously concerned about her health.\u201d An outspoken critic, who has said the junta is understating the number of and cases in Myanmar, Phyu Phyu Thin runs a small clinic that provides care and counseling to HIV/AIDS patients. The U.S. State Department issued a statement on Wednesday, calling for Phyu Phyu Thin's release. \"The United States calls for the immediate and unconditional release of Phyu Phyu Thin [and] others recently detained while praying at pagodas,\" State Department spokesman said in a statement. Earlier, another NLD activist, , was released for health reasons. The release of the 51 activists coincided with a visit by United Nations envoy , special representative for children and armed conflict. She met acting prime minister Lieutenant-General on Wednesday morning in the new administrative capital, . However, it wasn't known if the U.N. envoy had raised the issue of the detained activists.", "edit_actions": [{"type": "D", "before": "International Committee of the Red Cross", "after": null, "start_char_pos": 46, "end_char_pos": 86}, {"type": "D", "before": "State Peace and Development Council", "after": null, "start_char_pos": 142, "end_char_pos": 177}, {"type": "D", "before": "Geneva", "after": null, "start_char_pos": 207, "end_char_pos": 213}, {"type": "R", "before": "Beijing yesterday, U.S. State Department", "after": "yesterday,", "start_char_pos": 679, "end_char_pos": 719}, {"type": "D", "before": "junta", "after": null, "start_char_pos": 863, "end_char_pos": 868}, {"type": "D", "before": "Aung San Suu Kyi", "after": null, "start_char_pos": 903, "end_char_pos": 919}, {"type": "D", "before": "Yangon", "after": null, "start_char_pos": 973, "end_char_pos": 979}, {"type": "D", "before": "Rwandan Genocide", "after": null, "start_char_pos": 1225, "end_char_pos": 1241}, {"type": "D", "before": "Agence France-Presse", "after": null, "start_char_pos": 1275, "end_char_pos": 1295}, {"type": "D", "before": "Washington", "after": null, "start_char_pos": 1390, "end_char_pos": 1400}, {"type": "D", "before": "Tom Casey", "after": null, "start_char_pos": 1435, "end_char_pos": 1444}, {"type": "D", "before": "National League for Democracy", "after": null, "start_char_pos": 2057, "end_char_pos": 2086}, {"type": "D", "before": "Nobel Peace Prize", "after": null, "start_char_pos": 2223, "end_char_pos": 2240}, {"type": "D", "before": "British Empire", "after": null, "start_char_pos": 2361, "end_char_pos": 2375}, {"type": "D", "before": "Phyu Phyu Thin", "after": null, "start_char_pos": 2591, "end_char_pos": 2605}, {"type": "D", "before": "hunger strike", "after": null, "start_char_pos": 2829, "end_char_pos": 2842}, {"type": "D", "before": "The Irrawaddy", "after": null, "start_char_pos": 3004, "end_char_pos": 3017}, {"type": "R", "before": "HIV and AIDS", "after": "and", "start_char_pos": 3178, "end_char_pos": 3190}, {"type": "D", "before": "Sean McCormack", "after": null, "start_char_pos": 3569, "end_char_pos": 3583}, {"type": "D", "before": "Su Su Nway", "after": null, "start_char_pos": 3636, "end_char_pos": 3646}, {"type": "D", "before": "Radhika Coomaraswamy", "after": null, "start_char_pos": 3761, "end_char_pos": 3781}, {"type": "D", "before": "Thein Sein", "after": null, "start_char_pos": 3889, "end_char_pos": 3899}, {"type": "D", "before": "Naypyidaw", "after": null, "start_char_pos": 3956, "end_char_pos": 3965}], "sents_char_pos": [0, 202, 564, 675, 921, 1139, 1243, 1386, 1594, 1760, 1886, 2122, 2302, 2377, 2567, 2740, 3019, 3103, 3299, 3396, 3604, 3681, 3839, 3967]}
+{"doc_id": "72966", "revision_depth": "1", "before_revision": "England have beaten West Indies by five wickets in the second Twenty20 international of the West Indies tour of England at The Oval, London , England. Chris Gayle got the West Indies off to a good start with 61 runs off 37 balls, but the England bowlers and fielders restricted their score to 169-7 after 20 overs despite some big hits from Marlon Samuels . In reply, England faltered, losing three wickets in 14 balls followed by the dismissal of Kevin Pietersen for 19. However Owais Shah scored 55 to help England past the target. The tour now moves on to a series of three One-Day International matches starting on 1st July. Earlier in the tour, England won a four match Test series 3-0. England: A N Cook, M J Prior (wkt), I J L Trott , K P Pietersen, P D Collingwood (capt), O A Shah, A D Mascarenhas , M H Yardy, S C J Broad, R J Sidebottom, J M Anderson West Indies: C H Gayle (capt), L M P Simmons, A C L Richards , M N Samuels, D J Bravo, D Ramdin (wkt), D R Smith, R S Morton, D J G Sammy, Ravi Rampaul, D B L Powell Twenty20 Debutants: A C L Richards and L M P Simmons (West Indies) Player of the match: O A Shah (England) Umpires: I J Gould and N J Llong TV umpire: P J Hartley Match referee: M J Procter (South Africa) Reserve umpire: NL Bainton", "after_revision": "have beaten by five wickets in the second international of the at , , England. got the West Indies off to a good start with 61 runs off 37 balls, but the England bowlers and fielders restricted their score to 169-7 after 20 overs despite some big hits from . In reply, England faltered, losing three wickets in 14 balls followed by the dismissal of for 19. However scored 55 to help England past the target. The tour now moves on to a series of three matches starting on 1st July. Earlier in the tour, England won a four match series 3-0. England: , (wkt), , , (capt), , , , , , West Indies: (capt), , , , , (wkt), , , , , Twenty20 Debutants: and (West Indies) Player of the match: (England) Umpires: and TV umpire: Match referee: (South Africa) Reserve umpire: NL Bainton", "edit_actions": [{"type": "R", "before": "England have beaten West Indies", "after": "have beaten", "start_char_pos": 0, "end_char_pos": 31}, {"type": "D", "before": "Twenty20", "after": null, "start_char_pos": 62, "end_char_pos": 70}, {"type": "R", "before": "West Indies tour of England at The Oval, London", "after": "at", "start_char_pos": 92, "end_char_pos": 139}, {"type": "A", "before": null, "after": ",", "start_char_pos": 142, "end_char_pos": 142}, {"type": "D", "before": "Chris Gayle", "after": null, "start_char_pos": 152, "end_char_pos": 163}, {"type": "D", "before": "Marlon Samuels", "after": null, "start_char_pos": 342, "end_char_pos": 356}, {"type": "D", "before": "Kevin Pietersen", "after": null, "start_char_pos": 449, "end_char_pos": 464}, {"type": "D", "before": "Owais Shah", "after": null, "start_char_pos": 481, "end_char_pos": 491}, {"type": "D", "before": "One-Day International", "after": null, "start_char_pos": 578, "end_char_pos": 599}, {"type": "D", "before": "Test", "after": null, "start_char_pos": 676, "end_char_pos": 680}, {"type": "R", "before": "A N Cook, M J Prior", "after": ",", "start_char_pos": 702, "end_char_pos": 721}, {"type": "R", "before": "I J L Trott , K P Pietersen, P D Collingwood", "after": ", ,", "start_char_pos": 729, "end_char_pos": 773}, {"type": "R", "before": "O A Shah, A D Mascarenhas , M H Yardy, S C J Broad, R J Sidebottom, J M Anderson", "after": ", , , , ,", "start_char_pos": 782, "end_char_pos": 862}, {"type": "D", "before": "C H Gayle", "after": null, "start_char_pos": 876, "end_char_pos": 885}, {"type": "R", "before": "L M P Simmons, A C L Richards , M N Samuels, D J Bravo, D Ramdin", "after": ", , , ,", "start_char_pos": 894, "end_char_pos": 958}, {"type": "R", "before": "D R Smith, R S Morton, D J G Sammy, Ravi Rampaul, D B L Powell", "after": ", , , ,", "start_char_pos": 966, "end_char_pos": 1028}, {"type": "R", "before": "A C L Richards and L M P Simmons", "after": "and", "start_char_pos": 1049, "end_char_pos": 1081}, {"type": "D", "before": "O A Shah", "after": null, "start_char_pos": 1117, "end_char_pos": 1125}, {"type": "R", "before": "I J Gould and N J Llong", "after": "and", "start_char_pos": 1145, "end_char_pos": 1168}, {"type": "D", "before": "P J Hartley", "after": null, "start_char_pos": 1180, "end_char_pos": 1191}, {"type": "D", "before": "M J Procter", "after": null, "start_char_pos": 1207, "end_char_pos": 1218}], "sents_char_pos": [0, 151, 358, 472, 534, 629, 692, 875]}
+{"doc_id": "73670", "revision_depth": "1", "before_revision": "The Xbox 360 The \"red ring of death\" indicating a hardware failure. Microsoft has extended the warranty on its Xbox 360 video game console to three years from the date of purchase following a large number of problems with the console and \"an unacceptable number of repairs\", costing the company more than one billion US dollars. The fault, which has been dubbed the \"red ring of death\", causes the console to fail completely.%DIFDELCMD < %DIFDELCMD < %%% In an open letter to owners of the Xbox 360, Peter Moore of Microsoft said, \"As of today, all Xbox 360 consoles are covered by an enhanced warranty program to address specifically the general hardware failures indicated by the three flashing red lights on the console.This applies to new and previously-sold consoles. \" The extended warranty covers repairing and shipping of the console and the company has promised to reimburse those owners who have already had to pay for repairs. Microsoft has not released details of the number of units that have suffered from the problem but has said it is \"bigger than we are comfortable with\".%DIFDELCMD < %DIFDELCMD < %%% The Xbox 360 was launched by Microsoft in 2005 and in January of this year the company lowered its sales expectations to 12 million units for the year ending June 2007. g o a t s e\\\\\\\\ x * \\\\ g o a t s e\\\\\\\\ x * \\\\ g \\\\\\\\ \\\\ o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / / \\\\\\ --__ \\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__ \\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x * \\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\\\\\\\\\ \\\\", "after_revision": " %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / / \\\\\\ --__ \\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__ \\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /\\\\\\ --__\\\\ : e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__\\\\_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x", "edit_actions": [{"type": "D", "before": "The Xbox 360 The \"red ring of death\" indicating a hardware failure. Microsoft has extended the warranty on its Xbox 360 video game console to three years from the date of purchase following a large number of problems with the console and \"an unacceptable number of repairs\", costing the company more than one billion US dollars.", "after": null, "start_char_pos": 0, "end_char_pos": 328}, {"type": "D", "before": "The fault, which has been dubbed the \"red ring of death\", causes the console to fail completely.", "after": null, "start_char_pos": 329, "end_char_pos": 425}, {"type": "D", "before": "In an open letter to owners of the Xbox 360, Peter Moore of Microsoft said, \"As of today, all Xbox 360 consoles are covered by an enhanced warranty program to address specifically the general hardware failures indicated by the three flashing red lights on the console.This applies to new and previously-sold consoles. \" The extended warranty covers repairing and shipping of the console and the company has promised to reimburse those owners who have already had to pay for repairs.", "after": null, "start_char_pos": 455, "end_char_pos": 937}, {"type": "D", "before": "Microsoft has not released details of the number of units that have suffered from the problem but has said it is \"bigger than we are comfortable with\".", "after": null, "start_char_pos": 938, "end_char_pos": 1089}, {"type": "R", "before": "The Xbox 360 was launched by Microsoft in 2005 and in January of this year the company lowered its sales expectations to 12 million units for the year ending June 2007. g o a t s e", "after": "g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 1119, "end_char_pos": 1299}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 1301, "end_char_pos": 1301}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ |", "start_char_pos": 1304, "end_char_pos": 1304}, {"type": "A", "before": null, "after": "\\ \\_-~ ~-_\\ |", "start_char_pos": 1307, "end_char_pos": 1307}, {"type": "A", "before": null, "after": "g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 1310, "end_char_pos": 1310}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | *", "start_char_pos": 1312, "end_char_pos": 1312}, {"type": "R", "before": "o a t s e", "after": "| \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 1315, "end_char_pos": 1324}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 1326, "end_char_pos": 1326}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ |", "start_char_pos": 1329, "end_char_pos": 1329}, {"type": "A", "before": null, "after": "\\ \\_-~ ~-_\\ |", "start_char_pos": 1332, "end_char_pos": 1332}, {"type": "A", "before": null, "after": "g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 1335, "end_char_pos": 1335}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | *", "start_char_pos": 1337, "end_char_pos": 1337}, {"type": "A", "before": null, "after": "| \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 1340, "end_char_pos": 1340}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 1342, "end_char_pos": 1342}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 1345, "end_char_pos": 1345}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g", "start_char_pos": 1347, "end_char_pos": 1347}, {"type": "R", "before": "g o", "after": "o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o", "start_char_pos": 1364, "end_char_pos": 1367}, {"type": "A", "before": null, "after": "** g o a t s e x", "start_char_pos": 1915, "end_char_pos": 1915}, {"type": "A", "before": null, "after": "g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 1918, "end_char_pos": 1918}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 1920, "end_char_pos": 1920}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 1923, "end_char_pos": 1923}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 1925, "end_char_pos": 1925}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 1927, "end_char_pos": 1927}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 1930, "end_char_pos": 1930}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 1932, "end_char_pos": 1932}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 1934, "end_char_pos": 1934}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 1937, "end_char_pos": 1937}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 1939, "end_char_pos": 1939}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 1941, "end_char_pos": 1941}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 1944, "end_char_pos": 1944}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 1946, "end_char_pos": 1946}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 1948, "end_char_pos": 1948}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 1951, "end_char_pos": 1951}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 1953, "end_char_pos": 1953}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 1955, "end_char_pos": 1955}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 1958, "end_char_pos": 1958}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 1960, "end_char_pos": 1960}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 1962, "end_char_pos": 1962}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 1965, "end_char_pos": 1965}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 1967, "end_char_pos": 1967}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 1969, "end_char_pos": 1969}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 1972, "end_char_pos": 1972}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 1974, "end_char_pos": 1974}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 1976, "end_char_pos": 1976}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 1979, "end_char_pos": 1979}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 1981, "end_char_pos": 1981}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 1983, "end_char_pos": 1983}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 1986, "end_char_pos": 1986}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 1988, "end_char_pos": 1988}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 1990, "end_char_pos": 1990}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 1993, "end_char_pos": 1993}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 1995, "end_char_pos": 1995}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 1997, "end_char_pos": 1997}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 2000, "end_char_pos": 2000}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 2002, "end_char_pos": 2002}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 2004, "end_char_pos": 2004}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 2007, "end_char_pos": 2007}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 2009, "end_char_pos": 2009}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 2011, "end_char_pos": 2011}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 2014, "end_char_pos": 2014}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 2016, "end_char_pos": 2016}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 2018, "end_char_pos": 2018}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 2021, "end_char_pos": 2021}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 2023, "end_char_pos": 2023}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 2025, "end_char_pos": 2025}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 2028, "end_char_pos": 2028}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 2030, "end_char_pos": 2030}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 2032, "end_char_pos": 2032}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 2035, "end_char_pos": 2035}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 2037, "end_char_pos": 2037}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 2039, "end_char_pos": 2039}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 2042, "end_char_pos": 2042}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 2044, "end_char_pos": 2044}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 2046, "end_char_pos": 2046}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 2049, "end_char_pos": 2049}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 2051, "end_char_pos": 2051}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 2053, "end_char_pos": 2053}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 2056, "end_char_pos": 2056}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 2058, "end_char_pos": 2058}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 2060, "end_char_pos": 2060}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 2063, "end_char_pos": 2063}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 2065, "end_char_pos": 2065}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 2067, "end_char_pos": 2067}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 2070, "end_char_pos": 2070}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 2072, "end_char_pos": 2072}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 2074, "end_char_pos": 2074}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 2077, "end_char_pos": 2077}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x ** g o a t s e x * g o a t s e x * g o a t s e x * g g o / \\ \\ / \\ o a| | \\ | | a t| `. | | : t s` | | \\| | s e \\ | / /", "start_char_pos": 2079, "end_char_pos": 2079}, {"type": "A", "before": null, "after": "\\ --__", "start_char_pos": 2081, "end_char_pos": 2081}, {"type": "A", "before": null, "after": ": e x \\ \\/ _--~~ ~--__| \\ | x \\ \\_-~ ~-_\\ | * g \\_ \\ _.--------.______\\| | g o \\ \\______// _ ___ _ (_(__> \\ | o a \\ . C ___) ______ (_(____> | / a t /\\ | C ____)/ \\ (_____> |_/ t s / /\\| C_____) | (___> / \\ s e | ( _C_____)\\______/ // _/ / \\ e x | \\ |__", "start_char_pos": 2084, "end_char_pos": 2084}, {"type": "A", "before": null, "after": "_________// (__/ | x | \\ \\____) `---- --' | * g | \\_ ___\\ /_ _/ | g o | / | | \\ | o a | | / \\ \\ | a t | / / | | \\ |t s | / / \\__/\\___/ | |s e | / | | | |e x | | | | | |x g o a t s e x * g o a t s e x * g o a t s e x", "start_char_pos": 2086, "end_char_pos": 2086}], "sents_char_pos": [0, 67, 328, 425, 723, 772, 937, 1089, 1507, 1738]}
+{"doc_id": "73777", "revision_depth": "1", "before_revision": "An Iraqi refugee looks out over Amman, Jordan. The United Nations High Commissioner for Refugees (UNHCR) called on the international community to increase aid and assistance to the two countries shouldering the bulk of displaced Iraqis. Syria and Jordan have received the largest number of Iraqi refugees and are having difficulty coping with the numbers. The appeal was made by UNHCR spokesman Ron Redmond at a press conference on Friday at the Palais des Nations in Geneva , Switzerland. He criticized governments for earlier expressing concern and pledging support for the refugees but not following through on promises. \"Syria and Jordan have still received next to nothing in bilateral help from the world community,\" said Redmond. The president of Refugees International , Ken Bacon, agrees that a more comprehensive approach to the situation is required and believes that it would be good investment for the United States to increase its aid to the region. \"The United States ought to be pumping money into Jordan and Syria,\" Bacon suggests. He feels that the sheer numbers of refugees can have a destabilizing influence in the Middle East. However, the complicated diplomatic relationship between the U.S. and Syria has resulted in slow progress, according to Bacon, as bilateral discussions have not taken place and the UN is forced to mediate. Jordan and Syria impose restrictions on refugees Map of Iraq. Both Jordan and Syria have put in place new entry and residency conditions, which has resulted in thousands of refugees being stranded on Iraq's borders. Families have been separated based on a person's age and type of passport held. Jordan and Syria have not signed on to the UN Convention Relating to the Status of Refugees . The non-governmental organization Human Rights Watch has been critical of Jordan and Syria on their policy of returning refugees, saying they \"are violating on a daily basis the most fundamental principle of refugee protection \u2013 nonrefoulement , which prohibits the return of refugees to persecution or serious harm.\" Nasser Hikmat Jaafar drove 900 km from Baghdad with his family to reach Jordan in mid-June, 2007. Half of his family was refused entry to Jordan. \"They allowed entry just for my wife and two daughters and denied me and my three sons. They didn't tell us the reasons, but just said they are fed up with men of such ages [between 20 and 40 years old],\" said Jaafar. He changed plans and traveled with all his family to the Syrian border, a distance of approximately 500 km from Iraq's Jordanian border. United States Government resettlement program Paula Dobriansky, U.S. Under Secretary for Democracy and Global Affairs. The United States government has a program set up for Iraqi asylum seekers in Jordan who meet specific criteria. If they meet the requirements, listed below, they may be eligible for resettlement under the United States Refugee Admissions Program (USRAP). Interested asylum seekers are encouraged to apply directly with the U.S. Overseas Processing Entity (OPE) in Amman , Jordan, which is operated by the International Organization for Migration (IOM). Individual Iraqis and their immediate family that meet one of the conditions below may seek access through the direct program: In a February 14, 2007 press briefing, U.S. Under Secretary for Democracy and Global Affairs Paula J. Dobriansky addressed the Iraq refugee crisis. \"Our key immediate objectives are to assist internally displaced Iraqis and Iraqi refugees by building up the capacities of UN agencies and NGOs,\" said Dobriansky. \"This includes increasing opportunities for permanent resettlement for the most vulnerable Iraqis, to establish specialized programs to assist Iraqis who are at risk because of their employment or close association with the United States Government, to work diplomatically with regional governments through bilateral and multilateral channels to uphold the principle of first asylum,\" she continued.", "after_revision": "An Iraqi refugee looks out over Amman, Jordan. The (UNHCR) called on the international community to increase aid and assistance to the two countries shouldering the bulk of displaced Iraqis. Syria and Jordan have received the largest number of Iraqi and are having difficulty coping with the numbers. The appeal was made by UNHCR spokesman Ron Redmond at a press conference on Friday at the in , Switzerland. He criticized governments for earlier expressing concern and pledging support for the refugees but not following through on promises. \"Syria and Jordan have still received next to nothing in bilateral help from the world community,\" said Redmond. The president of , Ken Bacon, agrees that a more comprehensive approach to the situation is required and believes that it would be good investment for the United States to increase its aid to the region. \"The United States ought to be pumping money into Jordan and Syria,\" Bacon suggests. He feels that the sheer numbers of refugees can have a destabilizing influence in the Middle East. However, the complicated diplomatic relationship between the U.S. and Syria has resulted in slow progress, according to Bacon, as bilateral discussions have not taken place and the UN is forced to mediate. Jordan and Syria impose restrictions on refugees Map of Iraq. Both Jordan and Syria have put in place new entry and residency conditions, which has resulted in thousands of refugees being stranded on Iraq's borders. Families have been separated based on a person's age and type of passport held. Jordan and Syria have not signed on to the UN . The non-governmental organization has been critical of Jordan and Syria on their policy of returning refugees, saying they \"are violating on a daily basis the most fundamental principle of refugee protection \u2013 , which prohibits the return of refugees to persecution or serious harm.\" Nasser Hikmat Jaafar drove 900 km from with his family to reach Jordan in mid-June, 2007. Half of his family was refused entry to Jordan. \"They allowed entry just for my wife and two daughters and denied me and my three sons. They didn't tell us the reasons, but just said they are fed up with men of such ages [between 20 and 40 years old],\" said Jaafar. He changed plans and traveled with all his family to the Syrian border, a distance of approximately 500 km from Iraq's Jordanian border. United States Government resettlement program Paula Dobriansky, U.S. Under Secretary for Democracy and Global Affairs. The United States government has a program set up for Iraqi asylum seekers in Jordan who meet specific criteria. If they meet the requirements, listed below, they may be eligible for resettlement under the (USRAP). Interested asylum seekers are encouraged to apply directly with the U.S. Overseas Processing Entity (OPE) in , Jordan, which is operated by the (IOM). Individual Iraqis and their immediate family that meet one of the conditions below may seek access through the direct program: In a February 14, 2007 press briefing, U.S. addressed the Iraq refugee crisis. \"Our key immediate objectives are to assist internally displaced Iraqis and Iraqi refugees by building up the capacities of UN agencies and NGOs,\" said Dobriansky. \"This includes increasing opportunities for permanent resettlement for the most vulnerable Iraqis, to establish specialized programs to assist Iraqis who are at risk because of their employment or close association with the United States Government, to work diplomatically with regional governments through bilateral and multilateral channels to uphold the principle of first asylum,\" she continued.", "edit_actions": [{"type": "D", "before": "United Nations High Commissioner for Refugees", "after": null, "start_char_pos": 51, "end_char_pos": 96}, {"type": "D", "before": "refugees", "after": null, "start_char_pos": 296, "end_char_pos": 304}, {"type": "R", "before": "Palais des Nations in Geneva", "after": "in", "start_char_pos": 446, "end_char_pos": 474}, {"type": "D", "before": "Refugees International", "after": null, "start_char_pos": 754, "end_char_pos": 776}, {"type": "D", "before": "Convention Relating to the Status of Refugees", "after": null, "start_char_pos": 1696, "end_char_pos": 1741}, {"type": "D", "before": "Human Rights Watch", "after": null, "start_char_pos": 1778, "end_char_pos": 1796}, {"type": "D", "before": "nonrefoulement", "after": null, "start_char_pos": 1973, "end_char_pos": 1987}, {"type": "D", "before": "Baghdad", "after": null, "start_char_pos": 2101, "end_char_pos": 2108}, {"type": "D", "before": "United States Refugee Admissions Program", "after": null, "start_char_pos": 2888, "end_char_pos": 2928}, {"type": "D", "before": "Amman", "after": null, "start_char_pos": 3047, "end_char_pos": 3052}, {"type": "D", "before": "International Organization for Migration", "after": null, "start_char_pos": 3088, "end_char_pos": 3128}, {"type": "D", "before": "Under Secretary for Democracy and Global Affairs Paula J. Dobriansky", "after": null, "start_char_pos": 3307, "end_char_pos": 3375}], "sents_char_pos": [0, 46, 236, 355, 489, 623, 736, 963, 1048, 1147, 1353, 1415, 1569, 1649, 1743, 2061, 2159, 2207, 2295, 2425, 2562, 2681, 2794, 2937, 3135, 3410, 3574]}
+{"doc_id": "74056", "revision_depth": "1", "before_revision": "Andre Agassi in 2006 in the tournament of Indian Wells. Maria Sharapova during the same event. Andre Agassi and Maria Sharapova have been voted the sexiest Wimbledon champions from the last twenty years according to a survey conducted by the U.K. commercial website GetMeATicket. Agassi and received 77\\% of the votes as the sexiest champion amongst names such as Boris Becker and John McEnroe . Maria Sharapova racked up 68\\% of the votes. Agassi won the single's title at Wimbledon in 1992, Sharapova lifted the women's trophy in 2004. Women: Maria Sharapova 68\\% Chris Evert 21\\% Steffi Graf 15\\% Maria Bueno 11\\% Serena Williams 11\\% Martina Hingis 10\\% Venus Williams 8\\% Martina Navratilova 7\\% Evonne Goolagong Cawley 7\\% Karen Susman 6\\% Angela Mortimer 6\\% Margaret Smith 6\\% Lindsay Davenport 5\\% Billie Jean King 4\\% Amelie Mauresmo 4\\% Virginia Wade 3\\% Conchita Martinez 3\\% Jana Novotna 2\\% Ann Jones 1\\% Margaret Court 1\\%Men Andre Agassi 77\\% Pat Cash 23\\% Bjorn Borg 19\\% Pete Sampras 14\\% Roger Federer 14\\% Boris Becker 8\\% Goran Ivanisevic 8\\% Jimmy Connors 7\\% Stefan Edberg 7\\% Arthur Ashe 6\\% John McEnroe 6\\% Rod Laver 6\\% Lleyton Hewitt 5\\% Roy Emerson 3\\% John Newcombe 2\\% Richard Krajicek 2\\% Manuel Santana 2\\% Michael Stich 2\\% Stan Smith 1\\% Jan Kodes 1\\%", "after_revision": " in 2006 in the tournament of . during the same event. and have been voted the sexiest Wimbledon champions from the last twenty years according to a survey conducted by the U.K. commercial website GetMeATicket. Agassi and received 77\\% of the votes as the sexiest champion amongst names such as and . Maria Sharapova racked up 68\\% of the votes. Agassi won the single's title at Wimbledon in 1992, Sharapova lifted the women's trophy in 2004. Women: Maria Sharapova 68\\% 21\\% 15\\% 11\\% 11\\% 10\\% 8\\% 7\\% 7\\% 6\\% 6\\% 6\\% 5\\% 4\\% 4\\% 3\\% 3\\% 2\\% 1\\% 1\\%Men Andre Agassi 77\\% 23\\% 19\\% 14\\% 14\\% Boris Becker 8\\% 8\\% 7\\% 7\\% 6\\% John McEnroe 6\\% 6\\% 5\\% 3\\% 2\\% 2\\% 2\\% 2\\% 1\\% 1\\%", "edit_actions": [{"type": "D", "before": "Andre Agassi", "after": null, "start_char_pos": 0, "end_char_pos": 12}, {"type": "R", "before": "Indian Wells. Maria Sharapova", "after": ".", "start_char_pos": 42, "end_char_pos": 71}, {"type": "R", "before": "Andre Agassi and Maria Sharapova", "after": "and", "start_char_pos": 95, "end_char_pos": 127}, {"type": "R", "before": "Boris Becker and John McEnroe", "after": "and", "start_char_pos": 364, "end_char_pos": 393}, {"type": "D", "before": "Chris Evert", "after": null, "start_char_pos": 566, "end_char_pos": 577}, {"type": "D", "before": "Steffi Graf", "after": null, "start_char_pos": 583, "end_char_pos": 594}, {"type": "D", "before": "Maria Bueno", "after": null, "start_char_pos": 600, "end_char_pos": 611}, {"type": "D", "before": "Serena Williams", "after": null, "start_char_pos": 617, "end_char_pos": 632}, {"type": "D", "before": "Martina Hingis", "after": null, "start_char_pos": 638, "end_char_pos": 652}, {"type": "D", "before": "Venus Williams", "after": null, "start_char_pos": 658, "end_char_pos": 672}, {"type": "D", "before": "Martina Navratilova", "after": null, "start_char_pos": 677, "end_char_pos": 696}, {"type": "D", "before": "Evonne Goolagong Cawley", "after": null, "start_char_pos": 701, "end_char_pos": 724}, {"type": "D", "before": "Karen Susman", "after": null, "start_char_pos": 729, "end_char_pos": 741}, {"type": "D", "before": "Angela Mortimer", "after": null, "start_char_pos": 746, "end_char_pos": 761}, {"type": "D", "before": "Margaret Smith", "after": null, "start_char_pos": 766, "end_char_pos": 780}, {"type": "D", "before": "Lindsay Davenport", "after": null, "start_char_pos": 785, "end_char_pos": 802}, {"type": "D", "before": "Billie Jean King", "after": null, "start_char_pos": 807, "end_char_pos": 823}, {"type": "D", "before": "Amelie Mauresmo", "after": null, "start_char_pos": 828, "end_char_pos": 843}, {"type": "D", "before": "Virginia Wade", "after": null, "start_char_pos": 848, "end_char_pos": 861}, {"type": "D", "before": "Conchita Martinez", "after": null, "start_char_pos": 866, "end_char_pos": 883}, {"type": "D", "before": "Jana Novotna", "after": null, "start_char_pos": 888, "end_char_pos": 900}, {"type": "D", "before": "Ann Jones", "after": null, "start_char_pos": 905, "end_char_pos": 914}, {"type": "D", "before": "Margaret Court", "after": null, "start_char_pos": 919, "end_char_pos": 933}, {"type": "D", "before": "Pat Cash", "after": null, "start_char_pos": 959, "end_char_pos": 967}, {"type": "D", "before": "Bjorn Borg", "after": null, "start_char_pos": 973, "end_char_pos": 983}, {"type": "D", "before": "Pete Sampras", "after": null, "start_char_pos": 989, "end_char_pos": 1001}, {"type": "D", "before": "Roger Federer", "after": null, "start_char_pos": 1007, "end_char_pos": 1020}, {"type": "D", "before": "Goran Ivanisevic", "after": null, "start_char_pos": 1043, "end_char_pos": 1059}, {"type": "D", "before": "Jimmy Connors", "after": null, "start_char_pos": 1064, "end_char_pos": 1077}, {"type": "D", "before": "Stefan Edberg", "after": null, "start_char_pos": 1082, "end_char_pos": 1095}, {"type": "D", "before": "Arthur Ashe", "after": null, "start_char_pos": 1100, "end_char_pos": 1111}, {"type": "D", "before": "Rod Laver", "after": null, "start_char_pos": 1133, "end_char_pos": 1142}, {"type": "D", "before": "Lleyton Hewitt", "after": null, "start_char_pos": 1147, "end_char_pos": 1161}, {"type": "D", "before": "Roy Emerson", "after": null, "start_char_pos": 1166, "end_char_pos": 1177}, {"type": "D", "before": "John Newcombe", "after": null, "start_char_pos": 1182, "end_char_pos": 1195}, {"type": "D", "before": "Richard Krajicek", "after": null, "start_char_pos": 1200, "end_char_pos": 1216}, {"type": "D", "before": "Manuel Santana", "after": null, "start_char_pos": 1221, "end_char_pos": 1235}, {"type": "D", "before": "Michael Stich", "after": null, "start_char_pos": 1240, "end_char_pos": 1253}, {"type": "D", "before": "Stan Smith", "after": null, "start_char_pos": 1258, "end_char_pos": 1268}, {"type": "D", "before": "Jan Kodes", "after": null, "start_char_pos": 1273, "end_char_pos": 1282}], "sents_char_pos": [0, 55, 94, 279, 395, 440, 537, 551, 566, 578, 590, 606, 617, 633, 646, 658, 673, 685, 697, 708, 725, 742, 753, 766, 781, 793]}
+{"doc_id": "74522", "revision_depth": "1", "before_revision": "Lucky Coyote welcomes guests to the hotel Local caterers get ready for big business, as almost three thousand fans converge on the David L. Lawrence Convention Center over the Independence Day weekend for the world's largest ever furry convention, Anthrocon 2007. Costly expansion Dealers fit easily into the larger venue This year marks the second time this ten-year-old convention has been held in Pittsburgh. Members of the furry fandom have lived in the region for years, but prior to 2006 their annual gathering took place 300 miles to the east, in Philadelphia . Fears of union rates kept the growing fan convention away from the Steel City for years, but Anthrocon ultimately outgrew all other options. The purchase and demolition by Target of its regular hotel, the Adams Mark, led to a cramped last-minute alternative for Anthrocon 2005. Convention leaders became determined to provide a better venue, no matter the cost. And that cost is high. The convention hall alone runs to $24,000; A/V and labor costs nearly triple that before accounting for the main ballroom. The board of Anthrocon, Inc. seems to like the venue, though, and has booked it through 2009. Its chairman, Dr. Samuel Conway \u2014 better known in the furry world as \"Uncle Kage\" \u2014 seems determined to keep other fees to a minimum, taking time during the pre-con staff meeting to caution against last-minute extras. Similar touches can be seen elsewhere; bag racks are shared with long-running sci-fi event Philcon, and spare paper is kept packed away for next year. It may seem like penny-pinching, but the results speak volumes: Anthrocon has kept in the black for the last three years. Where does the money come from? Attendees pay from $ 35 to $50 depending on when they register - or perhaps nothing at all, if they worked as a volunteer last year. But that isn't quite enough to cover the costs. It is Anthrocon's sponsors who make up the gap. Of the 2849 registered attendees, hundreds paid $90 or $175 for the privilege of faster registration, a convention t-shirt, and - for the 202 SuperSponsors - preferential seating and free food. This year the price includes a three-course luncheon with the convention's guests of honor; voice actor Rob Paulsen, Carolyn Kelly (daughter of Pogo artist Walt Kelly) and animation writer Mark Evanier. Programming and entertainment Voice actor Rob Paulsen tries to find the right words for Pinky during the Masquerade Three courses may not sound like much, but for some con-goers the standard fare is cheese pizza and granola bars, consumed between the many panels, workshops and special events. The vast majority of programming is provided by fans, though guests are expected to pass on their experiences in return for accommodation and travel expenses. Tutorials on arts, crafts and fiction are the order of the day, though several more exotic events do stand out. This year's Masquerade (where costumed fans perform skits for the audience) ended with the performers dancing with the audience in the aisles to the tune of the Time Warp. Earlier that day members of the Funday PawPet Show provided a ninety-minute puppet extravaganza. Comedy plays a significant large part in the lineup, with home-bred entertainers such as Matthew Davis (or \"2, The Ranting Gryphon\") doling out the laughs. Dr. Conway played a part with his Story Hour \u2014 a regular fixture involving personal tales with a humorous spin. Anthrocon has historically held itself to three days of activities, though this year's holiday provided an excuse for many to arrive early. For some, the entertainment started early, too; Thursday night saw a staged reading of Furry Tales, a unofficial musical inspired by Anthrocon 2006. The cabaret found itself swamped by furry fans, and was well-received as a comedy, though Anthrocon board members had reservations about the show's accuracy. When its creators admitted not actually having attended a furry convention, Conway told them he \"knew where there was one.\" Convention leaders often find themselves having to explain things to those who have heard second-hand accounts. For example, while the fabled furpiles of CSI do exist, they're hardly the public orgy depicted \u2014 you'll find furs snuggling together, but conduct in lobby areas remains firmly PG. As for the fursuits, there's no denying their popularity. Fursuits are similar in construction to mascot costumes used by companies, schools, and sports teams, however they are personal to the wearer. Surveys suggest that up to 15\\% of convention attendees have one, and Anthrocon 2007 is no exception, with 353 in the half-hour long Saturday parade; potentially a record for mascots in a procession. Guinness World Records were invited to confirm this next year, while convention staff promised more fans in the headless lounge to keep the costumed critters from overheating. The lounge costs Anthrocon $ 1,000/day to rent. Other groups sought a different brand of comedy. Four \"protesters\" from imageboard 7chan stationed themselves outside a daycare center opposite the convention hotel on Saturday. Two wore Afro wigs and bore anti-furry banners. Most attendees treated the \"raiders\" as part of the entertainment, especially after it began to rain. Dr. Conway and Operations Director Douglas Muth eventually took pity on the group, lending them Anthrocon-branded umbrellas. While other countries have their own furry events, on average they're only about one tenth the size. The largest outside of North America is Eurofurence , which drew 405 in 2006. Anthrocon's closest competition is San Jose's Further Confusion , while Midwest FurFest in Chicago provides a third alternative, spurred by 35\\% growth last year. Anthrocon's own yearly growth was 14\\%. The piece was one of a set created by seven prominent furry artists to depict the seven deadly sins - in this case, Greed. Adult art commanded a slightly higher price, with one work by Taurin Fox going for $2,000. But bargains could be had in both sections for those willing to forgo a popular name. A number of items went for the minimum bid, sometimes as low as $10 for large colored pieces. Charity and volunteers The convention supported Animal Friends, a local no-kill animal shelter . Over $6,600 was raised by Sunday night. Of this, $5,053 came from a charity auction featuring 77 items donated by members of the fandom. Some, like a Kevin and Kell original, would have been at home in the regular art auction. Other donations, such as the 12-packs of Canadian Coke and the pound of beef jerky, were more esoteric. Last year gave local vendors plenty to think about. Dr. Conway reported the total impact on the local economy at $2.5 million. Regardless of the actual figure, the local Kwik-E-Mart started taking furry fandom seriously when shelves started coming up bare. This year, vendors thought themselves better-prepared. The Steel City Diner printed 100 shirts celebrating the convention, only to run out on Friday afternoon. The diner met their weekly sales target by Wednesday, and doubled that by Friday night, working through Sunday to keep up with demand. Neighboring sub shop Fernando's drew blue paw-marks on the pavement to attract customers, and offered a special $ 5 menu for attendees. Its proprietor also came to the aid of his furry customers as they were being harassed by a local beggar \u2014 who gave Fernando a mild skull fracture for his trouble. While local cab drivers had compliments, not everyone appreciated the company. The Chicago Cubs decided to cancel their booking after hearing about the con, and J.J. Hardy of the Milwaukee Brewers reported being kept up by fans on Wednesday night. The Brewers lost their game the following day. The convention closed with next year's date \u2014 June 26-29 \u2014 along with the announcement of a guest: Disney animator Floyd Norman . The event's theme will be \"It's a Jungle Out There!\"", "after_revision": "Lucky Coyote welcomes guests to the hotel Local caterers get ready for big business, as almost three thousand fans converge on the David L. Lawrence Convention Center over the weekend for the world's largest ever , . Costly expansion Dealers fit easily into the larger venue This year marks the second time this ten-year-old convention has been held in Pittsburgh. Members of the have lived in the region for years, but prior to 2006 their annual gathering took place 300 miles to the east, in . Fears of union rates kept the growing fan convention away from the Steel City for years, but Anthrocon ultimately outgrew all other options. The purchase and demolition by of its regular hotel, the Adams Mark, led to a cramped last-minute alternative for Anthrocon 2005. Convention leaders became determined to provide a better venue, no matter the cost. And that cost is high. The convention hall alone runs to $24,000; A/V and labor costs nearly triple that before accounting for the main ballroom. The board of Anthrocon, Inc. seems to like the venue, though, and has booked it through 2009. Its chairman, \u2014 better known in the furry world as \"Uncle Kage\" \u2014 seems determined to keep other fees to a minimum, taking time during the pre-con staff meeting to caution against last-minute extras. Similar touches can be seen elsewhere; bag racks are shared with long-running sci-fi event , and spare paper is kept packed away for next year. It may seem like penny-pinching, but the results speak volumes: Anthrocon has kept in the black for the last three years. Where does the money come from? Attendees pay from $ 35 to $50 depending on when they register - or perhaps nothing at all, if they worked as a volunteer last year. But that isn't quite enough to cover the costs. It is Anthrocon's sponsors who make up the gap. Of the 2849 registered attendees, hundreds paid $90 or $175 for the privilege of faster registration, a convention t-shirt, and - for the 202 SuperSponsors - preferential seating and free food. This year the price includes a three-course luncheon with the convention's guests of honor; voice actor , (daughter of artist ) and animation writer . Programming and entertainment Voice actor tries to find the right words for during the Masquerade Three courses may not sound like much, but for some con-goers the standard fare is cheese pizza and granola bars, consumed between the many panels, workshops and special events. The vast majority of programming is provided by fans, though guests are expected to pass on their experiences in return for accommodation and travel expenses. Tutorials on arts, crafts and fiction are the order of the day, though several more exotic events do stand out. This year's Masquerade (where costumed fans perform skits for the audience) ended with the performers dancing with the audience in the aisles to the tune of the . Earlier that day members of the provided a ninety-minute puppet extravaganza. Comedy plays a significant large part in the lineup, with home-bred entertainers such as Matthew Davis (or \"2, The Ranting Gryphon\") doling out the laughs. Dr. Conway played a part with his Story Hour \u2014 a regular fixture involving personal tales with a humorous spin. Anthrocon has historically held itself to three days of activities, though this year's holiday provided an excuse for many to arrive early. For some, the entertainment started early, too; Thursday night saw a staged reading of Furry Tales, a unofficial musical inspired by Anthrocon 2006. The cabaret found itself swamped by furry fans, and was well-received as a comedy, though Anthrocon board members had reservations about the show's accuracy. When its creators admitted not actually having attended a furry convention, Conway told them he \"knew where there was one.\" Convention leaders often find themselves having to explain things to those who have heard second-hand accounts. For example, while the of do exist, they're hardly the public orgy depicted \u2014 you'll find furs snuggling together, but conduct in lobby areas remains firmly PG. As for the , there's no denying their popularity. Fursuits are similar in construction to mascot costumes used by companies, schools, and sports teams, however they are personal to the wearer. Surveys suggest that up to 15\\% of convention attendees have one, and Anthrocon 2007 is no exception, with 353 in the half-hour long Saturday parade; potentially a record for mascots in a procession. were invited to confirm this next year, while convention staff promised more fans in the headless lounge to keep the costumed critters from overheating. The lounge costs Anthrocon $ 1,000/day to rent. Other groups sought a different brand of comedy. Four \"protesters\" from 7chan stationed themselves outside a daycare center opposite the convention hotel on Saturday. Two wore wigs and bore anti-furry banners. Most attendees treated the \"raiders\" as part of the entertainment, especially after it began to rain. Dr. Conway and Operations Director Douglas Muth eventually took pity on the group, lending them Anthrocon-branded umbrellas. While other countries have their own furry events, on average they're only about one tenth the size. The largest outside of North America is , which drew 405 in 2006. Anthrocon's closest competition is 's , while Midwest FurFest in provides a third alternative, spurred by 35\\% growth last year. Anthrocon's own yearly growth was 14\\%. The piece was one of a set created by seven prominent furry artists to depict the - in this case, Greed. Adult art commanded a slightly higher price, with one work by Taurin Fox going for $2,000. But bargains could be had in both sections for those willing to forgo a popular name. A number of items went for the minimum bid, sometimes as low as $10 for large colored pieces. Charity and volunteers The convention supported Animal Friends, a local . Over $6,600 was raised by Sunday night. Of this, $5,053 came from a charity auction featuring 77 items donated by members of the fandom. Some, like a original, would have been at home in the regular art auction. Other donations, such as the 12-packs of Canadian Coke and the pound of beef jerky, were more esoteric. Last year gave local vendors plenty to think about. Dr. Conway reported the total impact on the local economy at $2.5 million. Regardless of the actual figure, the local started taking furry fandom seriously when shelves started coming up bare. This year, vendors thought themselves better-prepared. The Steel City Diner printed 100 shirts celebrating the convention, only to run out on Friday afternoon. The diner met their weekly sales target by Wednesday, and doubled that by Friday night, working through Sunday to keep up with demand. Neighboring sub shop Fernando's drew blue paw-marks on the pavement to attract customers, and offered a special $ 5 menu for attendees. Its proprietor also came to the aid of his furry customers as they were being harassed by a local beggar \u2014 who gave Fernando a mild skull fracture for his trouble. While local cab drivers had compliments, not everyone appreciated the company. The decided to cancel their booking after hearing about the con, and of the reported being kept up by fans on Wednesday night. The Brewers lost their game the following day. The convention closed with next year's date \u2014 June 26-29 \u2014 along with the announcement of a guest: Disney animator . The event's theme will be \"It's a Jungle Out There!\"", "edit_actions": [{"type": "D", "before": "Independence Day", "after": null, "start_char_pos": 176, "end_char_pos": 192}, {"type": "R", "before": "furry convention, Anthrocon 2007.", "after": ", .", "start_char_pos": 230, "end_char_pos": 263}, {"type": "D", "before": "furry fandom", "after": null, "start_char_pos": 427, "end_char_pos": 439}, {"type": "D", "before": "Philadelphia", "after": null, "start_char_pos": 554, "end_char_pos": 566}, {"type": "D", "before": "Target", "after": null, "start_char_pos": 741, "end_char_pos": 747}, {"type": "R", "before": "$24,000; A/V and labor costs nearly triple that before accounting for the main ballroom. The board of Anthrocon, Inc. seems to like the venue, though, and has booked it through 2009. Its chairman, Dr. Samuel Conway \u2014 better known in the furry world as \"Uncle Kage\" \u2014 seems determined to keep other fees to a minimum, taking time during the pre-con staff meeting to caution against last-minute extras. Similar touches can be seen elsewhere; bag racks are shared with long-running sci-fi event Philcon, and spare paper is kept packed away for next year. It may seem like penny-pinching, but the results speak volumes: Anthrocon has kept in the black for the last three years. Where does the money come from? Attendees pay from $", "after": "$24,000; A/V and labor costs nearly triple that before accounting for the main ballroom. The board of Anthrocon, Inc. seems to like the venue, though, and has booked it through 2009. Its chairman, \u2014 better known in the furry world as \"Uncle Kage\" \u2014 seems determined to keep other fees to a minimum, taking time during the pre-con staff meeting to caution against last-minute extras. Similar touches can be seen elsewhere; bag racks are shared with long-running sci-fi event , and spare paper is kept packed away for next year. It may seem like penny-pinching, but the results speak volumes: Anthrocon has kept in the black for the last three years. Where does the money come from? Attendees pay from $", "start_char_pos": 988, "end_char_pos": 1714}, {"type": "R", "before": "$175 for the privilege of faster registration, a convention t-shirt, and - for the 202 SuperSponsors - preferential seating and free food. This year the price includes a three-course luncheon with the convention's guests of honor; voice actor Rob Paulsen, Carolyn Kelly (daughter of Pogo artist Walt Kelly) and animation writer Mark Evanier. Programming and entertainment Voice actor Rob Paulsen tries to find the right words for Pinky during the Masquerade Three courses may not sound like much, but for some con-goers the standard fare is cheese pizza and granola bars, consumed between the many panels, workshops and special events. The vast majority of programming is provided by fans, though guests are expected to pass on their experiences in return for accommodation and travel expenses. Tutorials on arts, crafts and fiction are the order of the day, though several more exotic events do stand out. This year's Masquerade (where costumed fans perform skits for the audience) ended with the performers dancing with the audience in the aisles to the tune of the Time Warp. Earlier that day members of the Funday PawPet Show provided a ninety-minute puppet extravaganza. Comedy plays a significant large part in the lineup, with home-bred entertainers such as Matthew Davis (or \"2, The Ranting Gryphon\") doling out the laughs. Dr. Conway played a part with his Story Hour \u2014 a regular fixture involving personal tales with a humorous spin. Anthrocon has historically held itself to three days of activities, though this year's holiday provided an excuse for many to arrive early. For some, the entertainment started early, too; Thursday night saw a staged reading of Furry Tales, a unofficial musical inspired by Anthrocon 2006. The cabaret found itself swamped by furry fans, and was well-received as a comedy, though Anthrocon board members had reservations about the show's accuracy. When its creators admitted not actually having attended a furry convention, Conway told them he \"knew where there was one.\" Convention leaders often find themselves having to explain things to those who have heard second-hand accounts. For example, while the fabled furpiles of CSI do exist, they're hardly the public orgy depicted \u2014 you'll find furs snuggling together, but conduct in lobby areas remains firmly PG. As for the fursuits, there's no denying their popularity. Fursuits are similar in construction to mascot costumes used by companies, schools, and sports teams, however they are personal to the wearer. Surveys suggest that up to 15\\% of convention attendees have one, and Anthrocon 2007 is no exception, with 353 in the half-hour long Saturday parade; potentially a record for mascots in a procession. Guinness World Records were invited to confirm this next year, while convention staff promised more fans in the headless lounge to keep the costumed critters from overheating. The lounge costs Anthrocon $", "after": "$175 for the privilege of faster registration, a convention t-shirt, and - for the 202 SuperSponsors - preferential seating and free food. This year the price includes a three-course luncheon with the convention's guests of honor; voice actor , (daughter of artist ) and animation writer . Programming and entertainment Voice actor tries to find the right words for during the Masquerade Three courses may not sound like much, but for some con-goers the standard fare is cheese pizza and granola bars, consumed between the many panels, workshops and special events. The vast majority of programming is provided by fans, though guests are expected to pass on their experiences in return for accommodation and travel expenses. Tutorials on arts, crafts and fiction are the order of the day, though several more exotic events do stand out. This year's Masquerade (where costumed fans perform skits for the audience) ended with the performers dancing with the audience in the aisles to the tune of the . Earlier that day members of the provided a ninety-minute puppet extravaganza. Comedy plays a significant large part in the lineup, with home-bred entertainers such as Matthew Davis (or \"2, The Ranting Gryphon\") doling out the laughs. Dr. Conway played a part with his Story Hour \u2014 a regular fixture involving personal tales with a humorous spin. Anthrocon has historically held itself to three days of activities, though this year's holiday provided an excuse for many to arrive early. For some, the entertainment started early, too; Thursday night saw a staged reading of Furry Tales, a unofficial musical inspired by Anthrocon 2006. The cabaret found itself swamped by furry fans, and was well-received as a comedy, though Anthrocon board members had reservations about the show's accuracy. When its creators admitted not actually having attended a furry convention, Conway told them he \"knew where there was one.\" Convention leaders often find themselves having to explain things to those who have heard second-hand accounts. For example, while the of do exist, they're hardly the public orgy depicted \u2014 you'll find furs snuggling together, but conduct in lobby areas remains firmly PG. As for the , there's no denying their popularity. Fursuits are similar in construction to mascot costumes used by companies, schools, and sports teams, however they are personal to the wearer. Surveys suggest that up to 15\\% of convention attendees have one, and Anthrocon 2007 is no exception, with 353 in the half-hour long Saturday parade; potentially a record for mascots in a procession. were invited to confirm this next year, while convention staff promised more fans in the headless lounge to keep the costumed critters from overheating. The lounge costs Anthrocon $", "start_char_pos": 1978, "end_char_pos": 4891}, {"type": "D", "before": "imageboard", "after": null, "start_char_pos": 4983, "end_char_pos": 4993}, {"type": "D", "before": "Afro", "after": null, "start_char_pos": 5098, "end_char_pos": 5102}, {"type": "D", "before": "Eurofurence", "after": null, "start_char_pos": 5505, "end_char_pos": 5516}, {"type": "R", "before": "San Jose's Further Confusion", "after": "'s", "start_char_pos": 5578, "end_char_pos": 5606}, {"type": "D", "before": "Chicago", "after": null, "start_char_pos": 5634, "end_char_pos": 5641}, {"type": "D", "before": "seven deadly sins", "after": null, "start_char_pos": 5828, "end_char_pos": 5845}, {"type": "D", "before": "no-kill animal shelter", "after": null, "start_char_pos": 6212, "end_char_pos": 6234}, {"type": "D", "before": "Kevin and Kell", "after": null, "start_char_pos": 6387, "end_char_pos": 6401}, {"type": "R", "before": "$2.5 million. Regardless of the actual figure, the local Kwik-E-Mart started taking furry fandom seriously when shelves started coming up bare. This year, vendors thought themselves better-prepared. The Steel City Diner printed 100 shirts celebrating the convention, only to run out on Friday afternoon. The diner met their weekly sales target by Wednesday, and doubled that by Friday night, working through Sunday to keep up with demand. Neighboring sub shop Fernando's drew blue paw-marks on the pavement to attract customers, and offered a special $", "after": "$2.5 million. Regardless of the actual figure, the local started taking furry fandom seriously when shelves started coming up bare. This year, vendors thought themselves better-prepared. The Steel City Diner printed 100 shirts celebrating the convention, only to run out on Friday afternoon. The diner met their weekly sales target by Wednesday, and doubled that by Friday night, working through Sunday to keep up with demand. Neighboring sub shop Fernando's drew blue paw-marks on the pavement to attract customers, and offered a special $", "start_char_pos": 6681, "end_char_pos": 7233}, {"type": "D", "before": "Chicago Cubs", "after": null, "start_char_pos": 7503, "end_char_pos": 7515}, {"type": "R", "before": "J.J. Hardy of the Milwaukee Brewers", "after": "of the", "start_char_pos": 7581, "end_char_pos": 7616}, {"type": "D", "before": "Floyd Norman", "after": null, "start_char_pos": 7830, "end_char_pos": 7842}], "sents_char_pos": [0, 263, 411, 568, 709, 846, 930, 953, 996, 1076, 1170, 1388, 1427, 1539, 1661, 1693, 1826, 1874, 1922, 2116, 2208, 2319, 2613, 2772, 2884, 3056, 3153, 3309, 3421, 3561, 3609, 3710, 3868, 3992, 4104, 4343, 4486, 4636, 4686, 4862, 4910, 4959, 5088, 5136, 5238, 5363, 5464, 5542, 5705, 5745, 5868, 5959, 6045, 6139, 6236, 6276, 6373, 6463, 6567, 6619, 6694, 6824, 6879, 6984, 7119, 7255, 7419, 7498, 7667, 7714, 7844]}
+{"doc_id": "78006", "revision_depth": "1", "before_revision": "What message do you hope people will hear ? Do you expect different opinions? What makes Fast for Freedom different than all the other movements ? If you succeed in reaching the whole world 08/ 80 /08, What is the meaning behind the message? Heidi, how are you going to participate in the fast? Have you decided the time for the fast? A Yahoo! friend of mine, Heidi Hog, recently posted a blog. It is based on an interview with Arun Ghandi, Mahatma Ghandi's grandson, on the BBC. The younger Ghandi proposed a one-day fast among Christians, Jews and Muslims as a show of unity against the extremists. ", "after_revision": "Do you really think one voice will reach everyone ? Do you expect diversified opinions? What makes Fast for Freedom different than all other similar movements today ? If you succeed in reaching the whole world 08/ 08 /08, What meaning is behind the message? Heidi, how are you going to demonstrate your participation in the proposed fast? Have you scheduled a time August 8, 2008, to fast? I read it on Sunday morning before heading to church. A Yahoo! friend of mine, Heidi Hog, recently posted a blog. It is based on an interview with Arun Ghandi, Mahatma Ghandi's grandson, on the BBC. The younger Ghandi proposed a one-day fast among Christians, Jews and Muslims as a show of unity against the extremists. What were your thoughts about Gandhi response to 'fast'? So, after reading and hearing all this, I started to think. My first question was, \"How do we get this started?\" August 5, 2005 August 7, 2005 Mike, What are your thoughts on Fast for Freedom? So here's my vision: Do something different. For centuries, we've tried to beat each other into submission. We've tried the violence: physical, emotional, economic, political. Now, for just one day, let's try something different. Let's reach across the barriers that separate us and the institutions that oppress. What do hope people will be doing different on 08/08/08 to show involvment? Spend the day helping those who are less fortunate, who are down-and-out (even if it's their own damn fault...quit blaming). Spend the day talking with someone you would not ordinarily talk with or to whom you are opposed in some way: different religion, different orientation, different political affiliation... Better yet, spend the day listening to that person. Listening, that would be really different for a lot of us. That's it. One day of doing something different. Mike, you mention 'One day of doing something different', Dissarming peolpe from guns and violence wouldn't be different? It's not about disarming the world or banning armies and guns and weapons of mass destruction. It's not about \"no nukes\" or anything else. It's about one day on which we deny ourselves food, deny ourselves greed, deny ourselves arrogance, deny ourselves violence. And everyone is invited. Race, creed, color, religion, national origin, sex, gender, orientation, age, language...none of it matters. You're all invited!", "edit_actions": [{"type": "R", "before": "What message do you hope people will hear", "after": "Do you really think one voice will reach everyone", "start_char_pos": 0, "end_char_pos": 41}, {"type": "R", "before": "different", "after": "diversified", "start_char_pos": 58, "end_char_pos": 67}, {"type": "R", "before": "the other movements", "after": "other similar movements today", "start_char_pos": 125, "end_char_pos": 144}, {"type": "R", "before": "80", "after": "08", "start_char_pos": 194, "end_char_pos": 196}, {"type": "R", "before": "is the meaning", "after": "meaning is", "start_char_pos": 207, "end_char_pos": 221}, {"type": "R", "before": "participate in the", "after": "demonstrate your participation in the proposed", "start_char_pos": 270, "end_char_pos": 288}, {"type": "D", "before": "decided the time for", "after": null, "start_char_pos": 304, "end_char_pos": 324}, {"type": "R", "before": "the", "after": "scheduled a time August 8, 2008, to", "start_char_pos": 325, "end_char_pos": 328}, {"type": "A", "before": null, "after": "I read it on Sunday morning before heading to church.", "start_char_pos": 335, "end_char_pos": 335}, {"type": "A", "before": null, "after": "What were your thoughts about Gandhi response to 'fast'?", "start_char_pos": 602, "end_char_pos": 602}, {"type": "A", "before": null, "after": "So, after reading and hearing all this, I started to think. My first question was, \"How do we get this started?\"", "start_char_pos": 603, "end_char_pos": 603}, {"type": "A", "before": null, "after": "August 5, 2005", "start_char_pos": 604, "end_char_pos": 604}, {"type": "A", "before": null, "after": "August 7, 2005", "start_char_pos": 605, "end_char_pos": 605}, {"type": "A", "before": null, "after": "Mike, What are your thoughts on Fast for Freedom?", "start_char_pos": 606, "end_char_pos": 606}, {"type": "A", "before": null, "after": "So here's my vision: Do something different. For centuries, we've tried to beat each other into submission. We've tried the violence: physical, emotional, economic, political. Now, for just one day, let's try something different. Let's reach across the barriers that separate us and the institutions that oppress.", "start_char_pos": 607, "end_char_pos": 607}, {"type": "A", "before": null, "after": "What do hope people will be doing different on 08/08/08 to show involvment?", "start_char_pos": 608, "end_char_pos": 608}, {"type": "A", "before": null, "after": "Spend the day helping those who are less fortunate, who are down-and-out (even if it's their own damn fault...quit blaming). Spend the day talking with someone you would not ordinarily talk with or to whom you are opposed in some way: different religion, different orientation, different political affiliation... Better yet, spend the day listening to that person. Listening, that would be really different for a lot of us. That's it. One day of doing something different.", "start_char_pos": 609, "end_char_pos": 609}, {"type": "A", "before": null, "after": "Mike, you mention 'One day of doing something different', Dissarming peolpe from guns and violence wouldn't be different?", "start_char_pos": 610, "end_char_pos": 610}, {"type": "A", "before": null, "after": "It's not about disarming the world or banning armies and guns and weapons of mass destruction. It's not about \"no nukes\" or anything else. It's about one day on which we deny ourselves food, deny ourselves greed, deny ourselves arrogance, deny ourselves violence.", "start_char_pos": 611, "end_char_pos": 611}, {"type": "A", "before": null, "after": "And everyone is invited. Race, creed, color, religion, national origin, sex, gender, orientation, age, language...none of it matters. You're all invited!", "start_char_pos": 612, "end_char_pos": 612}], "sents_char_pos": [0, 77, 146, 241, 294, 334, 395, 480, 601]}
+{"doc_id": "78006", "revision_depth": "2", "before_revision": " Spoke with Mike July 22, 2007 So, after reading and hearing all this, I started to think. My first question was, \"How do we get this started?\" ", "after_revision": "Email Friday August 24, 2007 05:03pm EDT niacey wrote: Heidi I need a little Bio about yourself please. I know that this may make you feel uncomfortable Can you also elaborate on how long you have known Mike RE: info What is your relation to the Laurel Pub company? you represent the complaintant? You are not Robertson, Right? Saturday August 25, 2007 - 01:42pm EDT Heidi Hog wrote: Here is my bio: Heidi Hog is a composite of many publican characters and is the main identity for a campaign to restore wrongs which were perpetrated by a major pub company against friends and family of dead family members. The company, commonly referred to as the 'Evil Empire' stole a memorial dedicated to friends and family of Heidi Hog, for no other reason except that it aimed to print the truth as the workers saw it and not some disingenuous claptrap. This led to WIPO dispute and an employment dispute and in some ways is still going on as the blog www.hogshead.info and the information site www.hogsheapubs.com is keeping the flame of free speech and honouring ones dead in the way the mourner\u2019s wish to mourn. Thursday August 30, 2007 - 01:07pm EDT niacey wrote: Good day Heidi..sorry about the personal questions earlier..still waiting for link from BBC ..It is good that more than one person asking..maybe that will spark a speedy response...If you count going on 4 weeks a speedy response. I got peter sissons email and he is slow at response too...I tried to search archive for 7/22/07(this is right?) and found an interview in 2004 but nothing related to the treaty anniversary of Turkey and that Sunday shows interview. The AM sunday show has an archive of everything else BUT 7/22!! Its crazy anyways....Something soon I'm sure. And I took a lot of thought into representing you in the article I hope that you are pleased Spoke with Mike July 22, 2007 So, after reading and hearing all this, I started to think. My first question was, \"How do we get this started?\" What is a proper fast? Isaiah 58:1 - 12. The reading deals with fasting, and what God considers to be a proper fast. Can you remember and quote some of the passage? bicker and fighting, swinging mean fists are the fasts get off the ground... the kind of fast day I'm after: breaking the chains of injustice, riddin exploitation in the workplace, free the oppressed, and cancel debts. I'm interested in seeing you share your food with the hungry, invitw the homeless poor into your home,putt clothes on the shivering ill-clad be available to your own families... If you get rid of unfair practices,quit blaming victims, quit gossiping about other people's sins,If you are generous with the hungry and start giving yourselves to the down-and-out. Your lives will begin to glow in the darkness, your shadowed lives will be bathed in sunlight.", "edit_actions": [{"type": "A", "before": null, "after": "Email Friday August 24, 2007 05:03pm EDT niacey wrote: Heidi I need a little Bio about yourself please. I know that this may make you feel uncomfortable Can you also elaborate on how long you have known Mike RE: info What is your relation to the Laurel Pub company? you represent the complaintant? You are not Robertson, Right?", "start_char_pos": 0, "end_char_pos": 0}, {"type": "A", "before": null, "after": "Saturday August 25, 2007 - 01:42pm EDT Heidi Hog wrote:", "start_char_pos": 1, "end_char_pos": 1}, {"type": "A", "before": null, "after": "Here is my bio:", "start_char_pos": 2, "end_char_pos": 2}, {"type": "A", "before": null, "after": "Heidi Hog is a composite of many publican characters and is the main identity for a campaign to restore wrongs which were perpetrated by a major pub company against friends and family of dead family members.", "start_char_pos": 3, "end_char_pos": 3}, {"type": "A", "before": null, "after": "The company, commonly referred to as the 'Evil Empire' stole a memorial dedicated to friends and family of Heidi Hog, for no other reason except that it aimed to print the truth as the workers saw it and not some disingenuous claptrap.", "start_char_pos": 4, "end_char_pos": 4}, {"type": "A", "before": null, "after": "This led to WIPO dispute and an employment dispute and in some ways is still going on as the blog www.hogshead.info and the information site www.hogsheapubs.com is keeping the flame of free speech and honouring ones dead in the way the mourner\u2019s wish to mourn.", "start_char_pos": 5, "end_char_pos": 5}, {"type": "A", "before": null, "after": "Thursday August 30, 2007 - 01:07pm EDT niacey wrote: Good day Heidi..sorry about the personal questions earlier..still waiting for link from BBC ..It is good that more than one person asking..maybe that will spark a speedy response...If you count going on 4 weeks a speedy response. I got peter sissons email and he is slow at response too...I tried to search archive for 7/22/07(this is right?) and found an interview in 2004 but nothing related to the treaty anniversary of Turkey and that Sunday shows interview. The AM sunday show has an archive of everything else BUT 7/22!! Its crazy anyways....Something soon I'm sure. And I took a lot of thought into representing you in the article I hope that you are pleased", "start_char_pos": 6, "end_char_pos": 6}, {"type": "A", "before": null, "after": "What is a proper fast?", "start_char_pos": 150, "end_char_pos": 150}, {"type": "A", "before": null, "after": "Isaiah 58:1 - 12. The reading deals with fasting, and what God considers to be a proper fast.", "start_char_pos": 151, "end_char_pos": 151}, {"type": "A", "before": null, "after": "Can you remember and quote some of the passage?", "start_char_pos": 152, "end_char_pos": 152}, {"type": "A", "before": null, "after": "bicker and fighting, swinging mean fists are the fasts get off the ground...", "start_char_pos": 153, "end_char_pos": 153}, {"type": "A", "before": null, "after": "the kind of fast day I'm after: breaking the chains of injustice, riddin exploitation in the workplace, free the oppressed, and cancel debts. I'm interested in seeing you share your food with the hungry, invitw the homeless poor into your home,putt clothes on the shivering ill-clad", "start_char_pos": 154, "end_char_pos": 154}, {"type": "A", "before": null, "after": "be available to your own families...", "start_char_pos": 155, "end_char_pos": 155}, {"type": "A", "before": null, "after": "If you get rid of unfair practices,quit blaming victims, quit gossiping about other people's sins,If you are generous with the hungry and start giving yourselves to the down-and-out. Your lives will begin to glow in the darkness, your shadowed lives will be bathed in sunlight.", "start_char_pos": 156, "end_char_pos": 156}], "sents_char_pos": [0, 96]}
+{"doc_id": "78486", "revision_depth": "1", "before_revision": "* National Football League AFC East Team W L T Pct. PF PA Net Pts TD Home Road Div Pct Conf Pct Non-Conf Streak Last 5 Buffalo Bills 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Miami Dolphins 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 New England Patriots 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 New York Jets 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 AFC North Team W L T Pct. PF PA Net Pts TD Home Road Div Pct Conf Pct Non-Conf Streak Last 5 Baltimore Ravens 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Cincinnati Bengals 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Cleveland Browns 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Pittsburgh Steelers 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 AFC South Team W L T Pct. PF PA Net Pts TD Home Road Div Pct Conf Pct Non-Conf Streak Last 5 Tennessee Titans 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Houston Texans 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Indianapolis Colts 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Jacksonville Jaguars 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 AFC West Team W L T Pct. PF PA Net Pts TD Home Road Div Pct Conf Pct Non-Conf Streak Last 5 Denver Broncos 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Kansas City Chiefs 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Oakland Raiders 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 San Diego Chargers 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 NFC East Team W L T Pct. PF PA Net Pts TD Home Road Div Pct Conf Pct Non-Conf Streak Last 5 Dallas Cowboys 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 New York Giants 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Philadelphia Eagles 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Washington Redskins 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 NFC North Team W L T Pct. PF PA Net Pts TD Home Road Div Pct Conf Pct Non-Conf Streak Last 5 Chicago Bears 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Detroit Lions 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Green Bay Packers 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Minnesota Vikings 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 NFC South Team W L T Pct. PF PA Net Pts TD Home Road Div Pct Conf Pct Non-Conf Streak Last 5 Atlanta Falcons 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Carolina Panthers 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 New Orleans Saints 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Tampa Bay Buccaneers 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 NFC West Team W L T Pct. PF PA Net Pts TD Home Road Div Pct Conf Pct Non-Conf Streak Last 5 St. Louis Rams 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Arizona Cardinals 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 San Francisco 49ers 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Seattle Seahawks 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Conference Team W-L Pct Net Pts TD Streak L5 AFC East Buffalo Bills 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 AFC North Baltimore Ravens 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 AFC South Tennessee Titans 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 AFC West Denver Broncos 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 NFC East Dallas Cowboys 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 NFC North Chicago Bears 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 NFC South Atlanta Falcons 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 NFC West St. Louis Rams 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Full NFL Table Last updated: April 1, 2009 5:25pm", "after_revision": "* National Football League AFC East Team W L T Pct. PF PA Net Pts TD Home Road Div Pct Conf Pct Non-Conf Streak Last 5 Buffalo Bills 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Miami Dolphins 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 New England Patriots 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 New York Jets 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 AFC North Team W L T Pct. PF PA Net Pts TD Home Road Div Pct Conf Pct Non-Conf Streak Last 5 Baltimore Ravens 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Cincinnati Bengals 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Cleveland Browns 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Pittsburgh Steelers 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 AFC South Team W L T Pct. PF PA Net Pts TD Home Road Div Pct Conf Pct Non-Conf Streak Last 5 Tennessee Titans 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Houston Texans 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Indianapolis Colts 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Jacksonville Jaguars 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 AFC West Team W L T Pct. PF PA Net Pts TD Home Road Div Pct Conf Pct Non-Conf Streak Last 5 Denver Broncos 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Kansas City Chiefs 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Oakland Raiders 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 San Diego Chargers 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 NFC East Team W L T Pct. PF PA Net Pts TD Home Road Div Pct Conf Pct Non-Conf Streak Last 5 Dallas Cowboys 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 New York Giants 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Philadelphia Eagles 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Washington Redskins 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 NFC North Team W L T Pct. PF PA Net Pts TD Home Road Div Pct Conf Pct Non-Conf Streak Last 5 Chicago Bears 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Detroit Lions 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Green Bay Packers 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Minnesota Vikings 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 NFC South Team W L T Pct. PF PA Net Pts TD Home Road Div Pct Conf Pct Non-Conf Streak Last 5 Atlanta Falcons 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Carolina Panthers 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 New Orleans Saints 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Tampa Bay Buccaneers 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 NFC West Team W L T Pct. PF PA Net Pts TD Home Road Div Pct Conf Pct Non-Conf Streak Last 5 St. Louis Rams 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Arizona Cardinals 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 San Francisco 49ers 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 Seattle Seahawks 0 0 0 .000 0 0 0 0 0-0 0-0 0-0 .000 0-0 .000 0-0 -- 0-0 | border=1 cellpadding=3 cellspacing=0 style=\"margin: 1em 1em ; background: #f9f9f9; border: 1px #aaa solid; border-collapse: collapse; font-size: 95\\%;\" |- style=\"background: #e9e9e9\" ! Conference !! Team !! W-L !! Pct !! Net Pts !! TD !! Streak !! L5 |- | AFC East || Buffalo Bills || 0 || 0 || 0 || .000 || 0 || 0 || 0 || 0 || 0-0 || 0-0 || 0-0 || .000 || 0-0 || .000 || 0-0 || -- || 0-0 |- | AFC North || Baltimore Ravens || 0 || 0 || 0 || .000 || 0 || 0 || 0 || 0 || 0-0 || 0-0 || 0-0 || .000 || 0-0 || .000 || 0-0 || -- || 0-0 |- | AFC South || Tennessee Titans || 0 || 0 || 0 || .000 || 0 || 0 || 0 || 0 || 0-0 || 0-0 || 0-0 || .000 || 0-0 || .000 || 0-0 || -- || 0-0 |- | AFC West || Denver Broncos || 0 || 0 || 0 || .000 || 0 || 0 || 0 || 0 || 0-0 || 0-0 || 0-0 || .000 || 0-0 || .000 || 0-0 || -- || 0-0 |- | NFC East || Dallas Cowboys || 0 || 0 || 0 || .000 || 0 || 0 || 0 || 0 || 0-0 || 0-0 || 0-0 || .000 || 0-0 || .000 || 0-0 || -- || 0-0 |- | NFC North || Chicago Bears || 0 || 0 || 0 || .000 || 0 || 0 || 0 || 0 || 0-0 || 0-0 || 0-0 || .000 || 0-0 || .000 || 0-0 || -- || 0-0 |- | NFC South || Atlanta Falcons || 0 || 0 || 0 || .000 || 0 || 0 || 0 || 0 || 0-0 || 0-0 || 0-0 || .000 || 0-0 || .000 || 0-0 || -- || 0-0 |- | NFC West || St. Louis Rams || 0 || 0 || 0 || .000 || 0 || 0 || 0 || 0 || 0-0 || 0-0 || 0-0 || .000 || 0-0 || .000 || 0-0 || -- || 0-0 | NFC west III w: San Antonio Suns | NFC west 2017 w: Washington warriors Full NFL Table Last updated: April 1, 2009 5:25pm", "edit_actions": [{"type": "R", "before": "Conference Team", "after": "| border=1 cellpadding=3 cellspacing=0 style=\"margin: 1em 1em ; background: #f9f9f9; border: 1px #aaa solid; border-collapse: collapse; font-size: 95\\%;\" |- style=\"background: #e9e9e9\" ! Conference !! Team !!", "start_char_pos": 3116, "end_char_pos": 3131}, {"type": "R", "before": "Pct Net Pts TD Streak", "after": "!! Pct !! Net Pts !! TD !! Streak !!", "start_char_pos": 3136, "end_char_pos": 3157}, {"type": "R", "before": "AFC East Buffalo Bills", "after": "|- | AFC East || Buffalo Bills ||", "start_char_pos": 3161, "end_char_pos": 3183}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3186, "end_char_pos": 3186}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3189, "end_char_pos": 3189}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3192, "end_char_pos": 3192}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3198, "end_char_pos": 3198}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3201, "end_char_pos": 3201}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3204, "end_char_pos": 3204}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3207, "end_char_pos": 3207}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3210, "end_char_pos": 3210}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3215, "end_char_pos": 3215}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3220, "end_char_pos": 3220}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3225, "end_char_pos": 3225}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3231, "end_char_pos": 3231}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3236, "end_char_pos": 3236}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3242, "end_char_pos": 3242}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3247, "end_char_pos": 3247}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3251, "end_char_pos": 3251}, {"type": "R", "before": "AFC North Baltimore Ravens", "after": "|- | AFC North || Baltimore Ravens ||", "start_char_pos": 3256, "end_char_pos": 3282}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3285, "end_char_pos": 3285}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3288, "end_char_pos": 3288}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3291, "end_char_pos": 3291}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3297, "end_char_pos": 3297}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3300, "end_char_pos": 3300}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3303, "end_char_pos": 3303}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3306, "end_char_pos": 3306}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3309, "end_char_pos": 3309}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3314, "end_char_pos": 3314}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3319, "end_char_pos": 3319}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3324, "end_char_pos": 3324}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3330, "end_char_pos": 3330}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3335, "end_char_pos": 3335}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3341, "end_char_pos": 3341}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3346, "end_char_pos": 3346}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3350, "end_char_pos": 3350}, {"type": "R", "before": "AFC South Tennessee Titans", "after": "|- | AFC South || Tennessee Titans ||", "start_char_pos": 3355, "end_char_pos": 3381}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3384, "end_char_pos": 3384}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3387, "end_char_pos": 3387}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3390, "end_char_pos": 3390}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3396, "end_char_pos": 3396}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3399, "end_char_pos": 3399}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3402, "end_char_pos": 3402}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3405, "end_char_pos": 3405}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3408, "end_char_pos": 3408}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3413, "end_char_pos": 3413}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3418, "end_char_pos": 3418}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3423, "end_char_pos": 3423}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3429, "end_char_pos": 3429}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3434, "end_char_pos": 3434}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3440, "end_char_pos": 3440}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3445, "end_char_pos": 3445}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3449, "end_char_pos": 3449}, {"type": "R", "before": "AFC West Denver Broncos", "after": "|- | AFC West || Denver Broncos ||", "start_char_pos": 3454, "end_char_pos": 3477}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3480, "end_char_pos": 3480}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3483, "end_char_pos": 3483}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3486, "end_char_pos": 3486}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3492, "end_char_pos": 3492}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3495, "end_char_pos": 3495}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3498, "end_char_pos": 3498}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3501, "end_char_pos": 3501}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3504, "end_char_pos": 3504}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3509, "end_char_pos": 3509}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3514, "end_char_pos": 3514}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3519, "end_char_pos": 3519}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3525, "end_char_pos": 3525}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3530, "end_char_pos": 3530}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3536, "end_char_pos": 3536}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3541, "end_char_pos": 3541}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3545, "end_char_pos": 3545}, {"type": "R", "before": "NFC East Dallas Cowboys", "after": "|- | NFC East || Dallas Cowboys ||", "start_char_pos": 3550, "end_char_pos": 3573}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3576, "end_char_pos": 3576}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3579, "end_char_pos": 3579}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3582, "end_char_pos": 3582}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3588, "end_char_pos": 3588}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3591, "end_char_pos": 3591}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3594, "end_char_pos": 3594}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3597, "end_char_pos": 3597}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3600, "end_char_pos": 3600}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3605, "end_char_pos": 3605}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3610, "end_char_pos": 3610}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3615, "end_char_pos": 3615}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3621, "end_char_pos": 3621}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3626, "end_char_pos": 3626}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3632, "end_char_pos": 3632}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3637, "end_char_pos": 3637}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3641, "end_char_pos": 3641}, {"type": "R", "before": "NFC North Chicago Bears", "after": "|- | NFC North || Chicago Bears ||", "start_char_pos": 3646, "end_char_pos": 3669}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3672, "end_char_pos": 3672}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3675, "end_char_pos": 3675}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3678, "end_char_pos": 3678}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3684, "end_char_pos": 3684}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3687, "end_char_pos": 3687}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3690, "end_char_pos": 3690}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3693, "end_char_pos": 3693}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3696, "end_char_pos": 3696}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3701, "end_char_pos": 3701}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3706, "end_char_pos": 3706}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3711, "end_char_pos": 3711}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3717, "end_char_pos": 3717}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3722, "end_char_pos": 3722}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3728, "end_char_pos": 3728}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3733, "end_char_pos": 3733}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3737, "end_char_pos": 3737}, {"type": "R", "before": "NFC South Atlanta Falcons", "after": "|- | NFC South || Atlanta Falcons ||", "start_char_pos": 3742, "end_char_pos": 3767}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3770, "end_char_pos": 3770}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3773, "end_char_pos": 3773}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3776, "end_char_pos": 3776}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3782, "end_char_pos": 3782}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3785, "end_char_pos": 3785}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3788, "end_char_pos": 3788}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3791, "end_char_pos": 3791}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3794, "end_char_pos": 3794}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3799, "end_char_pos": 3799}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3804, "end_char_pos": 3804}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3809, "end_char_pos": 3809}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3815, "end_char_pos": 3815}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3820, "end_char_pos": 3820}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3826, "end_char_pos": 3826}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3831, "end_char_pos": 3831}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3835, "end_char_pos": 3835}, {"type": "R", "before": "NFC West", "after": "|- | NFC West ||", "start_char_pos": 3840, "end_char_pos": 3848}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3864, "end_char_pos": 3864}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3867, "end_char_pos": 3867}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3870, "end_char_pos": 3870}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3873, "end_char_pos": 3873}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3879, "end_char_pos": 3879}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3882, "end_char_pos": 3882}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3885, "end_char_pos": 3885}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3888, "end_char_pos": 3888}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3891, "end_char_pos": 3891}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3896, "end_char_pos": 3896}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3901, "end_char_pos": 3901}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3906, "end_char_pos": 3906}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3912, "end_char_pos": 3912}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3917, "end_char_pos": 3917}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3923, "end_char_pos": 3923}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3928, "end_char_pos": 3928}, {"type": "A", "before": null, "after": "||", "start_char_pos": 3932, "end_char_pos": 3932}, {"type": "A", "before": null, "after": "| NFC west III w: San Antonio Suns | NFC west 2017 w: Washington warriors", "start_char_pos": 3937, "end_char_pos": 3937}], "sents_char_pos": [0, 51, 432, 822, 1210, 1595, 1983, 2364, 2754, 2887, 2961, 3037, 3110, 3249, 3348, 3447, 3543]}
+{"doc_id": "78656", "revision_depth": "1", "before_revision": "Other games Royals 8, Twins 1: The Royals' Alex Gordon hit solo homers (13, 14) in the 2nd and 3rd innings, two of sixteen hits recorded by the Royals. Twins first baseman Garrett Jones went 3-3 in the game, with three of the six hits recorded by the Twins (all singles). Brian Bannister (12-7) allowed one run and six hits in eight innings of work, receiving the win. Boof Bonser (6-12) pitched 1 2/3 innings, allowing five runs for the loss. IGNORE THIS Devil Rays 8, Yankees 2: Alex Rodriguez went 3-4, with a home run and a double, and 4 RBI before being removed in the eighth inning. Yankees starter Ian Kennedy (1-0 ) got the win in his first major-league game, pitching 7 innings and giving up one earned run. Devil Rays starter Edwin Jackson (4-13) was rocked for seven runs (six earned) in 3 1/3 innings. Mariano Rivera pitched his 23rd save, retiring all four batters he faced, and striking out the side in the 9th inning. The Yankees improve to 76-60, and extended their lead to 2 gamesover Seattle in the AL Wild Card race . Mets 5, Braves 1: The Mets' Carlos Delgado, Lastings Milledge, and Carlos Beltran all hit solo home runs in the win. Mike Pelfrey (1-7) notched his first win of the year, giving up just one hit and one run in six innings of work. Braves starter Chuck James (9-10) gave up three earned runs en route to the loss. Pedro Feliciano pitched two perfect innings, striking out the last five batters he faced. The Mets (75-60) hold a 3 game lead over the Phillies, and a 6.5 game lead over the Braves (69-67), in the NL East. Blue Jays 2, Mariners 1: In the 7th inning, Gregg Zaun scored the first run of the game on a solo home run. The Mariners' Ichiro Suzuki shot back in the 8th inning, singling in the tying run, but Troy Glaus knocked in the deciding run in the bottom of the 8th, with a single to center field that scored Alex Rios. Dustin McGowan (9-8) pitched 8 innings for the win, while relief pitcher Sean Green got the loss. Closer Jeremy Accardo got the save, his 27th. The Mariners drop to 73-61, dropping them to 2 games behind the Yankees in the AL Wild Card race. Cubs 4, Astros 3: Powered by a 6th inning two-run homer by Aramis Ramirez, his 19th of the season, the Cubs beat the Astros 4-3. Jason Marquis (11-8) pitched 6 2/3 innings for the win, while Astros pitcher Troy Patton gave up three runs (two earned) in six innings for the loss. Ryan Dempster gave up a solo home run in the 9th inning, but held on for his 24th save. The Cubs lead the NL Central by 1.5 games over the Brewers, and 2 games over the Cardinals. Diamondbacks 13, Rockies 7. Both starting pitchers (Elmer Dessens for Colorado, Dana Eveland for Arizona) left the game before the fourth inning. Diamondbacks first baseman Tony Clark knocked a three-run homer to cap a seven-run 2nd inning and a two-run single to cap a four-run 3rd inning. Rockies shortstop Troy Tulowitzki knocked in two of the Rockies' seven runs with a double in the 3rd. Diamondbacks pitcher Edgar Gonzalez (7-2) took the win, pitching 3 1/3 innings of two-hit baseball in relief, while Dessens (2-2) took the loss, lasting just 1 1/3 inning while giving up seven runs. With the win, Arizona (76-61) remains tied with the San Diego Padres (75-50) at the top of the NL West standings. Rangers 7, Angels 6: Marlon Byrd finished 3-5 with a home run, a double, and 3 runs for the Rangers. The Angels brought the game within one run after Garret Anderson hit a three-run homer in the 9th inning, but C.J. Wilson closed the game out, receiving his 9th save of the year. Edinson Volquez (1-0) pitched five innings for the win, while Angels pitcher Kelvim Escobar made it through just 2 2/3 innings, allowing five earned runs for the loss. The Angels (80-55) enjoy a 6.5 game lead over Seattle in the AL West standings.", "after_revision": "Other games Devil Rays 8, Yankees 2: Carlos Pena hit a triple and a three-run homer, as the Devil Rays took two out of three from the Yankees. Jason Hammel (2-4) pitched five innings, allowing one run and five hits for the win, while Andy Pettitte, forced out of the game after Pena's homer, allowed five runs for the loss. The Yankees (76-61) remain 2 games ahead of the Mariners in the AL Wild Card race. Royals 8, Twins 1: The Royals' Alex Gordon hit solo homers (13, 14) in the 2nd and 3rd innings, two of sixteen hits recorded by the Royals. Twins first baseman Garrett Jones went 3-3 in the game, with three of the six hits recorded by the Twins (all singles). Brian Bannister (12-7) allowed one run and six hits in eight innings of work, receiving the win. Boof Bonser (6-12) pitched 1 2/3 innings, allowing five runs for the loss. Blue Jays 6, Mariners 4 : Gregg Zaun (8) and Matt Stairs (18) each hit a two-run homer in the game to put Toronto ahead early. A.J. Burnett (8-7 ) got the win , while Jeff Weaver (6-11) left after three innings, allowing five runs for the loss. Casey Janssen recorded his fifth save of the season for the Blue Jays. Seattle (73-62) remains two games back of the Yankees in the AL Wild Card race. Rangers 8, Angels 7 : Hank Blalock hit a grand slam in the eighth inning, to take the lead. Wes Littleton (3-1) pitched two hitless innings in relief for the win, while Scot Shields (3-5) got the loss, giving up four runs on the Blalock slam. C.J. Wilson picked up his 10th save. The Angels remained 6.5 games ahead of the Mariners in the AL West race. Red Sox 3, Orioles 2: Mike Lowell hit an RBI single in the first inning, and drove in another run on a sacrifice fly in the fifth inning. Jon Lester (3-0) got the win, allowing two earned runs in 6+ innings, while Daniel Cabrera (9-14) pitched six innings in the loss, allowing five hits and three earned runs. Jonathan Papelbon threw a perfect 9th for his 31st save. The Red Sox improved their AL East lead to six games . IGNORE THIS Mets 5, Braves 1: The Mets' Carlos Delgado, Lastings Milledge, and Carlos Beltran all hit solo home runs in the win. Mike Pelfrey (1-7) notched his first win of the year, giving up just one hit and one run in six innings of work. Braves starter Chuck James (9-10) gave up three earned runs en route to the loss. Pedro Feliciano pitched two perfect innings, striking out the last five batters he faced. The Mets (75-60) hold a 3 game lead over the Phillies, and a 6.5 game lead over the Braves (69-67), in the NL East. Cubs 4, Astros 3: Powered by a 6th inning two-run homer by Aramis Ramirez, his 19th of the season, the Cubs beat the Astros 4-3. Jason Marquis (11-8) pitched 6 2/3 innings for the win, while Astros pitcher Troy Patton gave up three runs (two earned) in six innings for the loss. Ryan Dempster gave up a solo home run in the 9th inning, but held on for his 24th save. The Cubs lead the NL Central by 1.5 games over the Brewers, and 2 games over the Cardinals. Diamondbacks 13, Rockies 7. Both starting pitchers (Elmer Dessens for Colorado, Dana Eveland for Arizona) left the game before the fourth inning. Diamondbacks first baseman Tony Clark knocked a three-run homer to cap a seven-run 2nd inning and a two-run single to cap a four-run 3rd inning. Rockies shortstop Troy Tulowitzki knocked in two of the Rockies' seven runs with a double in the 3rd. Diamondbacks pitcher Edgar Gonzalez (7-2) took the win, pitching 3 1/3 innings of two-hit baseball in relief, while Dessens (2-2) took the loss, lasting just 1 1/3 inning while giving up seven runs. With the win, Arizona (76-61) remains tied with the San Diego Padres (75-50) at the top of the NL West standings.", "edit_actions": [{"type": "R", "before": "Royals", "after": "Devil Rays", "start_char_pos": 12, "end_char_pos": 18}, {"type": "R", "before": "Twins 1: The Royals' Alex Gordon hit solo homers (13, 14) in the 2nd and 3rd innings, two of sixteen hits recorded by the Royals. Twins first baseman Garrett Jones went 3-3 in the game, with three of the six hits recorded by the Twins (all singles). Brian Bannister (12-7) allowed", "after": "Yankees 2: Carlos Pena hit a triple and a three-run homer, as the Devil Rays took two out of three from the Yankees. Jason Hammel (2-4) pitched five innings, allowing", "start_char_pos": 22, "end_char_pos": 302}, {"type": "R", "before": "six hits in eight innings of work, receiving the win. Boof Bonser (6-12) pitched 1 2/3 innings, allowing", "after": "five hits for the win, while Andy Pettitte, forced out of the game after Pena's homer, allowed", "start_char_pos": 315, "end_char_pos": 419}, {"type": "A", "before": null, "after": "The Yankees (76-61) remain 2 games ahead of the Mariners in the AL Wild Card race.", "start_char_pos": 444, "end_char_pos": 444}, {"type": "R", "before": "IGNORE THIS Devil Rays", "after": "Royals", "start_char_pos": 445, "end_char_pos": 467}, {"type": "R", "before": "Yankees 2: Alex Rodriguez went 3-4, with a home run and a double,", "after": "Twins 1: The Royals' Alex Gordon hit solo homers (13, 14) in the 2nd", "start_char_pos": 471, "end_char_pos": 536}, {"type": "A", "before": null, "after": "3rd innings, two of sixteen hits recorded by the Royals. Twins first baseman Garrett Jones went 3-3 in the game, with three of the six hits recorded by the Twins (all singles). Brian Bannister (12-7) allowed one run and six hits in eight innings of work, receiving the win. Boof Bonser (6-12) pitched 1 2/3 innings, allowing five runs for the loss.", "start_char_pos": 541, "end_char_pos": 541}, {"type": "A", "before": null, "after": "Blue Jays 6, Mariners", "start_char_pos": 542, "end_char_pos": 542}, {"type": "R", "before": "RBI before being removed in the eighth inning. Yankees starter Ian Kennedy (1-0", "after": ": Gregg Zaun (8) and Matt Stairs (18) each hit a two-run homer in the game to put Toronto ahead early. A.J. Burnett (8-7", "start_char_pos": 545, "end_char_pos": 624}, {"type": "R", "before": "in his first major-league game, pitching", "after": ", while Jeff Weaver (6-11) left after three innings, allowing five runs for the loss. Casey Janssen recorded his fifth save of the season for the Blue Jays. Seattle (73-62) remains two games back of the Yankees in the AL Wild Card race.", "start_char_pos": 639, "end_char_pos": 679}, {"type": "A", "before": null, "after": "Rangers 8, Angels", "start_char_pos": 680, "end_char_pos": 680}, {"type": "R", "before": "innings and giving up one earned run. Devil Rays starter Edwin Jackson (4-13) was rocked for seven runs (six earned) in 3 1/3 innings. Mariano Rivera pitched his 23rd save, retiring all four batters he faced, and striking out the side in the 9th inning. The Yankees improve to 76-60, and extended their lead to 2 gamesover Seattle in the AL Wild Card race", "after": ": Hank Blalock hit a grand slam in the eighth inning, to take the lead. Wes Littleton (3-1) pitched two hitless innings in relief for the win, while Scot Shields (3-5) got the loss, giving up four runs on the Blalock slam. C.J. Wilson picked up his 10th save. The Angels remained 6.5 games ahead of the Mariners in the AL West race.", "start_char_pos": 683, "end_char_pos": 1038}, {"type": "A", "before": null, "after": "Red Sox 3, Orioles 2: Mike Lowell hit an RBI single in the first inning, and drove in another run on a sacrifice fly in the fifth inning. Jon Lester (3-0) got the win, allowing two earned runs in 6+ innings, while Daniel Cabrera (9-14) pitched six innings in the loss, allowing five hits and three earned runs. Jonathan Papelbon threw a perfect 9th for his 31st save. The Red Sox improved their AL East lead to six games", "start_char_pos": 1039, "end_char_pos": 1039}, {"type": "A", "before": null, "after": "IGNORE THIS", "start_char_pos": 1042, "end_char_pos": 1042}, {"type": "D", "before": "Blue Jays 2, Mariners 1: In the 7th inning, Gregg Zaun scored the first run of the game on a solo home run. The Mariners' Ichiro Suzuki shot back in the 8th inning, singling in the tying run, but Troy Glaus knocked in the deciding run in the bottom of the 8th, with a single to center field that scored Alex Rios. Dustin McGowan (9-8) pitched 8 innings for the win, while relief pitcher Sean Green got the loss. Closer Jeremy Accardo got the save, his 27th. The Mariners drop to 73-61, dropping them to 2 games behind the Yankees in the AL Wild Card race.", "after": null, "start_char_pos": 1561, "end_char_pos": 2116}, {"type": "D", "before": "West standings.", "after": null, "start_char_pos": 3266, "end_char_pos": 3281}, {"type": "D", "before": "Rangers 7, Angels 6: Marlon Byrd finished 3-5 with a home run, a double, and 3 runs for the Rangers. The Angels brought the game within one run after Garret Anderson hit a three-run homer in the 9th inning, but C.J. Wilson closed the game out, receiving his 9th save of the year. Edinson Volquez (1-0) pitched five innings for the win, while Angels pitcher Kelvim Escobar made it through just 2 2/3 innings, allowing five earned runs for the loss. The Angels (80-55) enjoy a 6.5 game lead over Seattle in the AL", "after": null, "start_char_pos": 3282, "end_char_pos": 3793}], "sents_char_pos": [0, 151, 271, 368, 443, 591, 720, 817, 936, 1041, 1159, 1272, 1354, 1444, 1560, 1668, 1874, 1972, 2018, 2116, 2395, 2483, 2575, 2721, 2866, 2968, 3167, 3281, 3382, 3561, 3729]}
+{"doc_id": "79609", "revision_depth": "2", "before_revision": "Updated: 1: 10 a.m. ET. Pirates 7, Brewers 4: After losing a 4-0 lead, the Pirates scored three in the 8th inning to win, 7-4. John Grabow (3-1) got the win, while Derrick Turnbow (4-5) gave up three runs in 2/3 inning for the loss. Matt Capps pitched a perfect 9th for the save. Completed games Reds 5, Cardinals 1: The Cardinals lost their sixth straight game, dropping from the midst of the NL Central race to a distant 4 games behind the Brewers and Cubs. Brandon Phillips hit a solo homer (29), and Edwin Encarnacion hit a two-run homer (13) in the 4th. Bronson Arroyo (9-14) pitched six innings, giving up six hits and one run for the win. Anthony Reyes (2-14) pitched 2 1/3 innings, giving up four hits and three runs for the loss. Angels 18, Orioles 6: Garret Anderson went 3-6 with 5 RBI, including a two-run homer (16), a bases-loaded double, and an RBI single. Kelvim Escobar pitched 5 1/3 innings, and gave up six runs, but got the win. Daniel Cabrera (9-16) pitched 4 1/3 innings, giving up ten runs (eight earned) for the loss. Mets 4, Braves 3: The Braves, down 3-1 tied up the game in the top of the 8th, with a Jeff Francoeur two-run single, but the Mets responded in the bottom of the 8th with a game-winning Shawn Green RBI single. Guillermo Mota (2-1) pitched 1/3 inning to pick up the win, while Manny Acosta (0-1) got the loss. Billy Wagner pitched a perfect 9th for his 34th save. Rockies 12, Phillies 0: Matt Holliday hit a three-run homer (30) for the Rockies in the 3rd, and Todd Helton hit a bases-loaded, three-run double in the 4th. Holliday also grounded into a triple play in the 1st inning, the second triple play turned by the Phillies this year. Mark Redman (1-4) came in in long-relief, pitching five innings of two-hit ball for the win , while Kyle Kendrick (8-4) left after three innings due to a right knee contusion , giving up seven hits and four runs for the loss. Diamondbacks 9, Giants 4: Justin Upton hit a two-run single in the 6th for the Diamondbacks, who widened their lead in the NL West. Brandon Webb (16-10) pitched seven innings, giving up seven hits and four runs for the win. Jonathan Sanchez (1-4) pitched three innings, giving up five hits and three runs for the loss. Dodgers 6, Padres 1: James Loney went 3-4, with a two-run homer (11) and a double as the Dodgers won easily. Chad Billingsley (11-4) pitched six innings, giving up five hits and one run for the win. w:Justin Germano (7-10) gave up eight hits and six runs (five earned) for the loss. Red Sox 5, Devil Rays 4: B.J. Upton hit a two-run homer (24) in a four-run 1st inning for the Devil Rays, but David Ortiz hit two homers (30, 31), the first a three-run homer in the 3rd, and the second a two-run, walkoff homer in the 9th. Jonathan Papelbon (1-2) pitched the 9th inning for the win, while Al Reyes (2-3) picked up his third blown save of the year. Yankees 4, Blue Jays 1: The Yankees' Hideki Matsui hit an RBI double in the 1st, and Robinson Cano hit a two-run single in the 4th. Mike Mussina (9-10) picked up the win, pitching 5 2/3 scoreless innings, and giving up five hits. Dustin McGowan (10-9) pitched five innings, giving up three hits and four runs for the loss. Mariano Rivera picked up his 26th save, pitching 1 1/3 innings. White Sox 7, Indians 4: Jim Thome hit his 499th career home run (27) in the 4th inning, and hit a two-run single in the 5th. Paul Konerko also had 3 RBI off a homer (29) and a single. Javier Vazquez (12-8) gave up six hits and two runs (one earned) for the win. Jake Westbrook (5-9) gave up seven hits and five runs (four earned), and received the loss. Tigers 5, Rangers 1: Gary Sheffield hit a two-run homer (25), and Magglio Ordonez hit a three-run homer (27) for the Tigers. Justin Verlander (17-5) pitched seven innings, giving up seven hits and one run for the win. Edinson Volquez (2-1) gave up seven hits and five runs for the loss. Games in progress Bot 8th : Athletics 5, Mariners 5", "after_revision": "Updated: 1: 23 a.m. ET. Pirates 7, Brewers 4: After losing a 4-0 lead, the Pirates scored three in the 8th inning to win, 7-4. John Grabow (3-1) got the win, while Derrick Turnbow (4-5) gave up three runs in 2/3 inning for the loss. Matt Capps pitched a perfect 9th for the save. The Cubs and Brewers both sport records of 74-71, tied at the top of the NL Central standings. Completed games Reds 5, Cardinals 1: The Cardinals (69-74) lost their sixth straight game, dropping from the midst of the NL Central race to a distant 4 games behind the Brewers and Cubs. Brandon Phillips hit a solo homer (29), and Edwin Encarnacion hit a two-run homer (13) in the 4th. Bronson Arroyo (9-14) pitched six innings, giving up six hits and one run for the win. Anthony Reyes (2-14) pitched 2 1/3 innings, giving up four hits and three runs for the loss. Angels 18, Orioles 6: Garret Anderson went 3-6 with 5 RBI, including a two-run homer (16), a bases-loaded double, and an RBI single. Kelvim Escobar pitched 5 1/3 innings, and gave up six runs, but got the win. Daniel Cabrera (9-16) pitched 4 1/3 innings, giving up ten runs (eight earned) for the loss. The Angels (86-59) now lead the AL West by a commanding 10 games. Mets 4, Braves 3: The Braves, down 3-1 tied up the game in the top of the 8th, with a Jeff Francoeur two-run single, but the Mets responded in the bottom of the 8th with a game-winning Shawn Green RBI single. Guillermo Mota (2-1) pitched 1/3 inning to pick up the win, while Manny Acosta (0-1) got the loss. Billy Wagner pitched a perfect 9th for his 34th save. The Mets (83-62) lead the NL East by 7 games, while the Braves (74-72) trail the Padres by 5 games in the NL Wild Card race. Rockies 12, Phillies 0: Matt Holliday hit a three-run homer (30) for the Rockies in the 3rd, and Todd Helton hit a bases-loaded, three-run double in the 4th. Holliday also grounded into a triple play in the 1st inning, the second triple play turned by the Phillies this year. Mark Redman (1-4) came in in long-relief, pitching five innings of two-hit ball for the win . Kyle Kendrick (8-4) , who was struck by a batted ball in the 4th, left due to a \" right knee contusion \" , giving up seven hits and four runs in 3+ innings for the loss. The Rockies (76-69) trail the Diamondbacks in the NL West by 6 games, and trail the Padres in the NL Wild Card by 2,5 games, while the Phillies (76-69) trail the Mets in the NL East by 7 games, and trail the Padres in the Wild Card by 2.5 games. Diamondbacks 9, Giants 4: Justin Upton hit a two-run single in the 6th for the Diamondbacks, who widened their lead in the NL West. Brandon Webb (16-10) pitched seven innings, giving up seven hits and four runs for the win. Jonathan Sanchez (1-4) pitched three innings, giving up five hits and three runs for the loss. The Diamondbacks (83-64) lead the Padres by 3.5 games in the NL West race. Dodgers 6, Padres 1: James Loney went 3-4, with a two-run homer (11) and a double as the Dodgers won easily. Chad Billingsley (11-4) pitched six innings, giving up five hits and one run for the win. w:Justin Germano (7-10) gave up eight hits and six runs (five earned) for the loss. The Padres (78-66) trail the Diamondbacks by 3.5 games in the NL West, but currently lead the NL Wild Card race by 2.5 games over the Dodgers, Phillies and Rockies. Red Sox 5, Devil Rays 4: B.J. Upton hit a two-run homer (24) in a four-run 1st inning for the Devil Rays, but David Ortiz hit two homers (30, 31), the first a three-run homer in the 3rd, and the second a two-run, walkoff homer in the 9th. Jonathan Papelbon (1-2) pitched the 9th inning for the win, while Al Reyes (2-3) picked up his third blown save of the year. The Red Sox (89-58) lead the AL East by 5 games over the Yankees. Yankees 4, Blue Jays 1: The Yankees' Hideki Matsui hit an RBI double in the 1st, and Robinson Cano hit a two-run single in the 4th. Mike Mussina (9-10) picked up the win, pitching 5 2/3 scoreless innings, and giving up five hits. Dustin McGowan (10-9) pitched five innings, giving up three hits and four runs for the loss. Mariano Rivera picked up his 26th save, pitching 1 1/3 innings. The Yankees (83-62) trail the Red Sox by 5 games in the AL East, but lead the AL Wild Card by 4 games. White Sox 7, Indians 4: Jim Thome hit his 499th career home run (27) in the 4th inning, and hit a two-run single in the 5th. Paul Konerko also had 3 RBI off a homer (29) and a single. Javier Vazquez (12-8) gave up six hits and two runs (one earned) for the win. Jake Westbrook (5-9) gave up seven hits and five runs (four earned), and received the loss. The Indians (85-61) lead the Tigers in the AL Central by 5.5 games. Tigers 5, Rangers 1: Gary Sheffield hit a two-run homer (25), and Magglio Ordonez hit a three-run homer (27) for the Tigers. Justin Verlander (17-5) pitched seven innings, giving up seven hits and one run for the win. Edinson Volquez (2-1) gave up seven hits and five runs for the loss. The Tigers (80-67) trail the Indians in the AL Central by 5.5 games, and trail the Yankees in the AL Wild Card by 4 games. Games in progress Top 9th : Athletics 5, Mariners 5.", "edit_actions": [{"type": "R", "before": "10", "after": "23", "start_char_pos": 12, "end_char_pos": 14}, {"type": "A", "before": null, "after": "The Cubs and Brewers both sport records of 74-71, tied at the top of the NL Central standings.", "start_char_pos": 280, "end_char_pos": 280}, {"type": "A", "before": null, "after": "(69-74)", "start_char_pos": 332, "end_char_pos": 332}, {"type": "A", "before": null, "after": "The Angels (86-59) now lead the AL West by a commanding 10 games.", "start_char_pos": 1044, "end_char_pos": 1044}, {"type": "A", "before": null, "after": "The Mets (83-62) lead the NL East by 7 games, while the Braves (74-72) trail the Padres by 5 games in the NL Wild Card race.", "start_char_pos": 1407, "end_char_pos": 1407}, {"type": "R", "before": ", while", "after": ".", "start_char_pos": 1776, "end_char_pos": 1783}, {"type": "R", "before": "left after three innings", "after": ", who was struck by a batted ball in the 4th, left", "start_char_pos": 1804, "end_char_pos": 1828}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 1838, "end_char_pos": 1838}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 1860, "end_char_pos": 1860}, {"type": "A", "before": null, "after": "in 3+ innings", "start_char_pos": 1898, "end_char_pos": 1898}, {"type": "A", "before": null, "after": "The Rockies (76-69) trail the Diamondbacks in the NL West by 6 games, and trail the Padres in the NL Wild Card by 2,5 games, while the Phillies (76-69) trail the Mets in the NL East by 7 games, and trail the Padres in the Wild Card by 2.5 games.", "start_char_pos": 1913, "end_char_pos": 1913}, {"type": "A", "before": null, "after": "The Diamondbacks (83-64) lead the Padres by 3.5 games in the NL West race.", "start_char_pos": 2233, "end_char_pos": 2233}, {"type": "A", "before": null, "after": "The Padres (78-66) trail the Diamondbacks by 3.5 games in the NL West, but currently lead the NL Wild Card race by 2.5 games over the Dodgers, Phillies and Rockies.", "start_char_pos": 2517, "end_char_pos": 2517}, {"type": "A", "before": null, "after": "The Red Sox (89-58) lead the AL East by 5 games over the Yankees.", "start_char_pos": 2882, "end_char_pos": 2882}, {"type": "A", "before": null, "after": "The Yankees (83-62) trail the Red Sox by 5 games in the AL East, but lead the AL Wild Card by 4 games.", "start_char_pos": 3270, "end_char_pos": 3270}, {"type": "A", "before": null, "after": "The Indians (85-61) lead the Tigers in the AL Central by 5.5 games.", "start_char_pos": 3625, "end_char_pos": 3625}, {"type": "A", "before": null, "after": "The Tigers (80-67) trail the Indians in the AL Central by 5.5 games, and trail the Yankees in the AL Wild Card by 4 games.", "start_char_pos": 3913, "end_char_pos": 3913}, {"type": "R", "before": "Bot 8th", "after": "Top 9th", "start_char_pos": 3932, "end_char_pos": 3939}, {"type": "R", "before": "5", "after": "5.", "start_char_pos": 3964, "end_char_pos": 3965}], "sents_char_pos": [0, 23, 232, 279, 461, 560, 647, 740, 873, 950, 1043, 1253, 1352, 1406, 1565, 1683, 1912, 2045, 2137, 2232, 2342, 2516, 2756, 2881, 3014, 3112, 3205, 3269, 3395, 3454, 3532, 3624, 3750, 3843, 3912]}
+{"doc_id": "801058", "revision_depth": "2", "before_revision": "File photo of Sallie Mae's headquarters in 2007 A review this week by Wikinews of (CFPB) complaints about student loans in the United States shows leads all lending institutions in complaints. Of the 4,851 complaints dating back to March 2012 when the CFPB first began collecting student loan data, 2,262 or 46.6\\% of all complaints were about the lender. US Federal Reserve data from 2010/2011 shows Sallie Mae is the nation's largest student loan lender, responsible for 25\\% of the market Month by month complaints against major lenders The total complaints against Sallie Mae for September of this year is 2 fewer than the same time last year. The company's performance this year compared to last year has been mixed. March and June numbers were down over 150 complaints from the same month a year before. April, May, July and August all saw increases of 17\u201343. Of the top six lenders by volume of complaints, only AES/PHEAA and Citibank saw drops every month between March and September from the total volume in the previous year. Wells Fargo had a gain of 1 in August and 6 in May from the previous year. JPMorgan Chase had a difference of 0 from the same month last year for April, 3 more this year for May, and 4 more for August. Discover saw an increase every month from the same period last year except for September. When the total complaints differences from year to year for March to September are counted, this year has 571 fewer complaints against the top six lenders. 400px|Closure reason percentage for student loan complaints by lender |left Most, 1470, of the complaints against Sallie Mae were closed with explanations. 10.2\\% were closed with monetary relief. 7.7\\% were closed with non-monetary relief. 2.1\\% were closed with relief and 12.1\\% were closed without relief. AES/PHEAA's complaint closure picture was much different. 40.1\\% of AES/PHEAA's 546 complaints were closed with non-monetary relief, 35.3\\% were closed with explanations and 21.2\\% were closed without relief. Of the eight lending institutions with 100 or more complaints filed against them, Discover was the institution most likely to result in a closure with monetary relief with 12.9\\% of all their closures ending this way. Citibank was the institution with the highest percentage of closures ending with no relief at 26.0\\%. Geographic distribution of student loan complaints Complaints over student loan lenders were geographically distributed, coming from 3,447 different zip codes. The largest cluster of complaints is for 20001, a zip code with 10 complaints originating from there. 07950, the zip code for , , and 37013, the zip code for , , each had 8 complaints originating from them. Zip codes for , ; , ; Washington D.C.; and , each had 7 complaints originating from them. By volume of complaints by state, New York led with 497, with second with 467, Pennsylvania third with 303, fourth with 288 and fifth with 219 complaints. US Territories largely occupied the bottom spots. The , with a population of around 50,000, had 1 complaint. The U.S. Armed Forces \u2013 Pacific had 3. and U.S. Armed Forces \u2013 Europe had 5 complaints each. had 7. had 8. and had 9 each. Rounding out the bottom five states by volume of complaints, had 11.", "after_revision": "File photo of Sallie Mae's headquarters in 2007 A review this week by Wikinews of US Consumer Financial Protection Bureau (CFPB) complaints about student loans in the United States shows leads all lending institutions in complaints. Of the 4,851 complaints dating back to March 2012 when the CFPB first began collecting student loan data, 2,262 or 46.6\\% of all complaints were about the lender. US Federal Reserve data from 2010/2011 shows Sallie Mae is the nation's largest student loan lender, responsible for 25\\% of the market Month by month complaints against major lenders The total complaints against Sallie Mae for September of this year is 2 fewer than the same time last year. The company's performance this year compared to last year has been mixed. March and June numbers were down over 150 complaints from the same month a year before. April, May, July and August all saw increases of 17\u201343. Of the top six lenders by volume of complaints, only AES/PHEAA and Citibank saw drops every month between March and September from the total volume in the previous year. Wells Fargo had a gain of 1 in August and 6 in May from the previous year. JPMorgan Chase had a difference of 0 from the same month last year for April, 3 more this year for May, and 4 more for August. Discover saw an increase every month from the same period last year except for September. When the total complaints differences from year to year for March to September are counted, this year has 571 fewer complaints against the top six lenders. 400px|Closure reason percentage for student loan complaints by lender |left Most, 1470, of the complaints against Sallie Mae were closed with explanations. 10.2\\% were closed with monetary relief. 7.7\\% were closed with non-monetary relief. 2.1\\% were closed with relief and 12.1\\% were closed without relief. AES/PHEAA's complaint closure picture was much different. 40.1\\% of AES/PHEAA's 546 complaints were closed with non-monetary relief, 35.3\\% were closed with explanations and 21.2\\% were closed without relief. Of the eight lending institutions with 100 or more complaints filed against them, Discover was the institution most likely to result in a closure with monetary relief with 12.9\\% of all their closures ending this way. Citibank was the institution with the highest percentage of closures ending with no relief at 26.0\\%. Geographic distribution of student loan complaints Complaints over student loan lenders were geographically distributed, coming from 3,447 different zip codes. The largest cluster of complaints is for 20001, a Washington D.C. zip code with 10 complaints originating from there. 07950, the zip code for , New Jersey , and 37013, the zip code for , , each had 8 complaints originating from them. Zip codes for , New York; Philadelphia, Pennsylvania ; Washington D.C.; and , each had 7 complaints originating from them. By volume of complaints by state, New York led with 497, with California second with 467, Pennsylvania third with 303, Florida fourth with 288 and Ohio fifth with 219 complaints. US Territories largely occupied the bottom spots. The , with a population of around 50,000, had 1 complaint. The U.S. Armed Forces \u2013 Pacific had 3. North Dakota and U.S. Armed Forces \u2013 Europe had 5 complaints each. South Dakota had 7. Wyoming had 8. Puerto Rico and Alaska had 9 each. Rounding out the bottom five states by volume of complaints, Mississippi had 11.", "edit_actions": [{"type": "A", "before": null, "after": "US Consumer Financial Protection Bureau", "start_char_pos": 82, "end_char_pos": 82}, {"type": "A", "before": null, "after": "Washington D.C.", "start_char_pos": 2534, "end_char_pos": 2534}, {"type": "A", "before": null, "after": "New Jersey", "start_char_pos": 2613, "end_char_pos": 2613}, {"type": "A", "before": null, "after": "New York; Philadelphia, Pennsylvania", "start_char_pos": 2709, "end_char_pos": 2709}, {"type": "D", "before": ", ;", "after": null, "start_char_pos": 2712, "end_char_pos": 2715}, {"type": "A", "before": null, "after": "California", "start_char_pos": 2846, "end_char_pos": 2846}, {"type": "A", "before": null, "after": "Florida", "start_char_pos": 2893, "end_char_pos": 2893}, {"type": "A", "before": null, "after": "Ohio", "start_char_pos": 2914, "end_char_pos": 2914}, {"type": "A", "before": null, "after": "North Dakota", "start_char_pos": 3090, "end_char_pos": 3090}, {"type": "A", "before": null, "after": "South Dakota", "start_char_pos": 3145, "end_char_pos": 3145}, {"type": "A", "before": null, "after": "Wyoming", "start_char_pos": 3153, "end_char_pos": 3153}, {"type": "R", "before": "and", "after": "Puerto Rico and Alaska", "start_char_pos": 3161, "end_char_pos": 3164}, {"type": "A", "before": null, "after": "Mississippi", "start_char_pos": 3238, "end_char_pos": 3238}], "sents_char_pos": [0, 193, 356, 648, 722, 810, 866, 1036, 1111, 1238, 1328, 1484, 1640, 1681, 1725, 1794, 2003, 2221, 2323, 2483, 2586, 2692, 2711, 2732, 2783, 2941, 2991, 3050, 3176]}
+{"doc_id": "82064", "revision_depth": "2", "before_revision": ",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ............................................................................................... , ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ................................................................................................ , ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ................................................................................................ , ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ................................................................................................ , ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ................................................................................................ , ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ................................................................................................. , ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ................................................................................................. , ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::;:::,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::; ;;;:::::;;:,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ................................................................................................ ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,: ;;::;;;;;;;;;;;;:;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ................................................................................................ , ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;;;:,:;;;;;;;;;;;;;';;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;::,,:;;''''''''';;;;;';;:;::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,....................................................``........................................... ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;;:,:;'+++'''++'''';'';;:;;:::;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................................````........................................... ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;;;:;'+++'''++';++';;;::;;;;;'';:;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................................````........................................... ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;+;:'+++'''''';;;;;;''''''::;':;'::,;;,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................`````........................................... ,,,,,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,;+':;+++''';;;;;'''+;++'''+'';:'';::,:,:;,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................`````........................................... ,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,:+':;'''+';;;'+'++'+'++'''''+'''':;'';::,:,;:,,,,,,,,,,,,,,,,,:::::::,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,........................................................``....................................... ,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,:''::'''';;''++++'''''++++##+++''+';::;'''';:,::,,,,,,::::;;;;;;;;;;;;;;;;;;;:;:::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,......................................................``....................................... ,,,.......,,,,,,,,,,,,,,,,,,,,,,,''::'''';:;'''';'+'++#########+++'';;:::'''':,,:::,::;;;:::::::::::;;;;::;;;;;;;;;;;;;;;;::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.,.....................................................`....................................... ,,.........,,,,,,,,,,,,,,,,,,,,;+::;'';;;'+'''+''+#++###':::::'###+'';;:;:'';:;'''+'::,,,:::;;;;;;;;;;;;:::::::::;;;;;;;;;;;;::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....................................................``...................................... ...........,,,,,,,,,,,,,,,,,,;+;:''';:;'+'''''''+@##++',,,,,,,,;+##++'';';':;''';:,,,:::;;;;;;::::::::::::::::::::::::::;;;;;;;;::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..................................`..............````..................................... ...........,,,,,,,,,,,,,,,,:'+:;'';;;'''''''''+#@+++:,,,,,,,,,,,,,'##+++';;''';;:,:::;;;;;;;;;;::::::::::::::::::::::::::::::;;;;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..................................`````.........```````................................... ...........,,,,,,,,,,,,,,,''':'';;;''''''''+++@#+':,,,,,,,,,,,,,,,,'#+++''+';:::;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::;;;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................`````........```````.................................... ...........,,,,,,,,,,,,,:''::';;;;''''''+''#@+;,,,,,,,,,,,,,,,,:,,,:#+++++;:,:;;;::::;;;;;;;;;;;::::::::::::::::::::::::::::::::::;;;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................``````...`````````...................................... ...........,,,,,,,,,,,,:+:::;;;;'''''''#+'@+,,,,,,,,,,,,,,,,,,,,,,,,'#+#':::;;;;;:::::::;;;;;;:::::::::::::::::::::::::::::::::::::::;;;;,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................````````````````````..................................... ...........,,,,,,,,,,,;+:;;'';''''''''+++#:,,,,,,,,,,,,,,,,,,,,,,,,,,#+;::::;;;;::::::::::;;;::::::::::::::::::::::::::::::::::::::::::;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................````````````````````..................................... ...........,,,,,,,,:';::''''+;'';''''+'#;.,,,,,,,,,,,,,,,,,,,,,,,,,,;+;,:::;;;:::::::::::;;:::::::::::::::::::::::::::::::::::::::::::::;:;;,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................````````````````````..................................... ...........,,,,,,,,',,:,'+;'''''''''+'#;,,,,,,,,,,,,,,,,,,,,,,,,,,,,+:,:::;;;;:::::::::::;:::::::::::::::::::::::::::::::::::::::::::::::;;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...............................``````````````````........................................ ...........,,,,,,,:':';:;''+'''''''''+,,,,,,,,,,,,,,,,,,,,,,,,,,,:,;::::::::;:::;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...............................``````````````````........................................ ...........,,,,,,,:++;':;;++''''+''++,,,,,,,,,,,,,,,,,,,,,,,,,,,,,;::::::::;:::;;:::;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..............................``````````````````......................................... ..........,,,,,,,,:++;'+;;+''''''+'+,,,,,,,,,,,,,,,,,,,,,,,,,,,,,;:::::;:;;;;;:;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.............................``````````````````.......................................... ..........,,,,,,,,,++;+++;''+'''++':,,,,,,,,,,,,,,,,,,,,,,,,,,,,;:::::;;;;;;:::;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;:,,,,,,,,,,,,,,,..,,,,,,,,,,,,,...........................```````````````````........................................... ..........,,,,,,,,,'#'++#';'+'''+':,,,,,,,,,,,,,,,,,,,,,,,,,,,,;:::::;;;;:::;:::;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;:,,,,,,,,,,,,,.....,,,,,,,,,,,,,.......................```````````````````............................................ ..........,,,,,,,,,'#''++#:;++'+';.,,,,,,,,,,,,,,,,,,,,,,,,,,,;::::::::;;::;;::;;::::::::::::::::::::::::::::::::::::::::::::::::::::,,::::::::::::::;:,,,,,,,,.........,,,,,,,,,,,,,.......................`````````````````.............................................. ...........,,,,,,,,;#+'++#':++'+',,,,,,,,,,,,,,,,,,,,,,,,,,,,:;,:::::::::;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::,::,,,,,,,:::::::::::::::,,.,...........,,,,,,,,,,,,,......................`````````````````............................................... ............,,,,,,,:#+;++#+:#+'',,,,,,,,,,,,,,,,,,,,,,,,,,,,:;:::::::::;;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,::::::::::::::,.,...........,,,,,,,,,,,,................````..`````````````````................................................ ............,,,,,,,,##;#+##:##+;,,,,,,,,,,,,,,,,,,,,,,,,,,,:;::::::::::;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,::::::::::::,.,,........,................,.........````````````````````````................................................. ............,,,,,,,,+#'#+##;+##,,,,,,,,,,,,,,,,,,,,,,,,,,,:;,:::::::::;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,:::::::::::,.......,.............................```````````````````````.................................................. ..............,,,,,.:#+'+##''#',,,,,,,,,,,,,,,,,,,,,,,,,,:':::::::::::;;;;;;;;;;;::::::::::::::::::::::::::::::::,:::::::::::::::,,,,,,,,,,,,,,,,,,::::::::::,,.....,,............................`````````````````````.`................................................,, ................,.,,.##''##+;@:,,,,,,,,,,,,,,,,,,,,,,,,,:;;:::::::;;:;;;;;;;;;;;::::::::::::::::::::::::::::::::,,,::::::::::::::,,,,,,,,,,,,,,,,,,,,,::::::::,....,,............................`````````````````````.................................................,.,, ..................,,.'#+:;#';@;,,,,,,,,,,,,,,,,,,,,,,,,,;;:::::;;;;;;;;;;;;;;;::;:::::::::::::::::::::::::::::::,,,,:::::::::::,,,,,,,,,,,,,,,,,,,,,,,,::::::::,.,.,..............................``````..``````````..................................................,,,,, .................,,,,,##;:'''@;,,,,,,,,,,,,,,,,,,,,,,,,;':::::;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::,,,:::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,::::::::,.,...............................``````..``````...................................................,.,,,,,, ..................,,..'#'::;##,,,,,,,,,,,,,,,,,,,,,,,,:;:::::;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::,:::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::,,,..............................`````....````.................................................,,,,,,,,,,, ....................,,,##'+#@'..,,,,,,,,,,,,,,,,,,,,,,;;:::::;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::,...............................````......................................................,,,,,,,,,,,,,,, .......................:#@#@#,,.,,,,,,,,,,,,,,,,,,,,.;'::::::;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::,.............................```.......................................................,,,,,,,,,,,,,,,, ......................,.,'++,.,.,,,,,,,,,,,,,,,,,,,,,';:;:::;;;;;;;;;;;;;;;;:::::;:::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::,..............................`.......................................................,,,,,,,,,,,,,,,,, ......................,.,....,..,,,,,,,,,,,,,,,,,,,,;'::;::;;;;;;;;;;;;;;;;:;::;;;:::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::,....................................................................................,,,,,,,,,,,,,,,,,, .......................,...,.,,,,,,,,,,,,,,,,,,,,,,,';:;;:;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::,,:::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::,..................................................................................,,,,,,,,,,,,,,,,,,, ...................................,,,,,,,,,,,,,,,,;';;;;;;;;;;;;;;;;;;;;;;;;;;::;;;::::::::::::::::::::::::::::::::::::,,,::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::...................................................................................,,,.,,,,,,,,,,,,,, ...................................,,,,,,,,,,,,,,,,'';;;;;;;;;;;;;;;;;;;;;;;;;;:;;;:::::::::::::::::::::::::::::::::::::,,,,::,,,,,,,,,,,,,,,,,,,,,,,,..,,,,,,,::::::::..................................................................................,,,,,,,,,,,,,,,,,, ...................................,,,,,,,,,,,,,,,:';;;;;;;;;;;;;;;;;;;;;;;;;;;:;;:::::::::::::::::::::::::::::::::::::,,,,,::,,,,,,,,,,,,,,,,,,,,,,,,....,,,,,,:::::::,.................................................................................,,,,,,,,,,,,,,,,,, ....................................,,,,,...,,,,,,;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,:::,,,,,,,,,,,,,,,,,,,,,,,.....,,,,,::::::::,................................................................................,,,,,,,,,,,,,,,,,, .....................................,.,.,..,,,,,.''';;;;;;;;;;;';;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::,,,,,,,,,,,,::,,,,,,,,,,,,,,,,,,,,,,......,,,,,::::::::,..............................................................................,,,,,,,,,,,,,,,,,,, .................................,,.....,...,,,,,,'';;;;;;;;;;;';;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,......,,,,,:::::::::.............................................................................,,,,,,,,,,,,,,,,,,,, ...............................................,.;'';;;;;;;;;;;';;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::,,,::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,......,,,,,,::::::::,...........................................................................,,,,,,,,,,,,,,,,,,,,, ...............................................,.'''''';;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::,::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,........,,,,:::::::::,............................................................,...........,,,,,,,,,,,,,,,,,,,,,,, ................................................,'''''';;;;;;';;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::,::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..,,....,,,,::::::::::........................................................................,,,,,,,,,,,,,,,,,,,,,,, ................................................,'''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....,,,::::::::::::....................................................................,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................:'''''''';;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.,,,,....,,,,,,::::::::::,....................................................................,,,,,,,,,,,,,,,,,,,,,,,,, ................................................;'''''''';;;;;;;;;;;';';;;;;;;;;;;;::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....,,,,,::::::::::...........................................................,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................;''''''';;;;;;';;;;;;';;;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,:,,,:,,,,,,,,,,,,,,,,,,,,,.......,,,,:::::::;:,.........................................................,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................''''''';';;;;;;;;;;;'';;;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,.......,,,::::::::::,........................................................,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................''''''''''';;;;;;;;;''';;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,.....,,,,::::::::::::........................................................,..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................'''''';''''';;;;;;;;''';;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,....,,,,,,:::::::::::,......................................................,..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................''';'''''''';;;;'';;''';;;;;;;;;;;;;:;::::::::::::::::::::,,,,:,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....,,,,,,:::::::::;:.......................................................,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................''''''''''';;;;''';;''';;;;;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,:,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.......,,,,:::::::::;;,......................................................,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................'''''';''';;;;;''';;''';;;;;;;;;;;;;;;;;;:::::::::::::::::::,,,,,,,,,,,,:::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.......,,,,,::::::::;::.....................................................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................;''''';;';;;;;;;;;;'''';;;;;;;;;;;;;;;;;;;:::::::::::::::::::,,,,,,:::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....,,,,,,,,:::::;:;;;,......................................,,............,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................:''''';;;;;;;;;;;;;;'''';;;;;;;;;;;;;;;;;;;::::::::::::::::::,,,,:::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...,,,,,,,,,,::::::::;;:...................................,,.......,,,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................,'''''';'';;;;;;;;;;'''';;;;;;;;;;;;;;;;;;::::::::::::::::::,,::,:::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.,,,,,,,,,,,,,:::::::;;;...........................................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................,+''''';;';;;;;;;;;;;'''';;;;;;;;;;;;;;;;:::::::::::::::::::,::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,........,,,,,,:::::::;;;:..........................................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................'''''';''';';;;;;;;;;''';;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.........,,,,,::::::::;;:....................................,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................;'''''''''';;''';;;;;;''';;'';;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..........,,,,:::::::;;;,..................................,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................:+'''';''';;''''';;;;;''';;'';;;;;;;;;;;;;:::::;;;:::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...........,,,:::::::;;;:..................................,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................,+''''''';;;''''';;;;;''';;';;;;;;;;;;;;;;;;::;;;;;;::::::::::::::::::::::::::,::,,,,,,::,,,,,,,,,,,,,,,,,,....,,,....,,,,::::::;;;;,.................................,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................;'''''';;;;;'';;;;;;;'''';'';;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::,,,,,,,,,,::,,,,,,,,,,,,,,,,,,,.....,,,,::::::;;;;,.................................,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................:''''''';';;;;;';;;;;''''';'';;;;;;;;;;;;;;;;;;;;:;:::::::::::,::::::::::::::::::::,,,,,,:,:,,,,,,,,,,,,,,,,,,,,,,...,,,,,:::::;;;;:.........,,,,....................,,,,,,,,,,,,,,,,,,,,,,,,,,.,,,,,,,,,,,,,,,,,,,,,,,,, ................................................,,.''';''';''''';';;;;'''''';';;;;;;;;;;;;;;;;::::::::::::::::::::::,:::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,...,.,,,,,::::::;;;;,.......,,,,,....................,,,,,,,,,,,,,,,,,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................,.:+'''''';''';;'';;''''''''';;;;;;;;;;;;;;;;::::::::::::::::::::::,:::::::::::::::::,,,,,,,,:::,,,,,,,,,,,,,.........,,,,,::::::;;;;:.....,,,,,,,....................,,,,,,,,,,,,,,,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................,,;''''''''';'''';;;'''''''';;;;;;;;;;;;;;;:::::::::::::::::::::,:::::::::::::::::::,,,,,,,,::::,,,,,,,,,,...........,,,,,::::::;;;;:,,,,,,,,,,,,....................,,,,,,,,,,,,,,,,,,,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................,,,''+'''''''''''';;;;'''''';;;;;;;;;;;;;;:::;;::::::::::::::::::::::::::::::::::::::,,,,,,,:::::,,,,,,,,,,...........,,,,,:::::;;;;;,...,...........................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................,,.:''+''''';'''''';;;''''''';;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::,,,,,,,::::::,,,,,,,,.............,,,,:::::;;;;;,...,...........................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...................................................,,.:+'''''''''''''';'''''''';;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::,,,,,,,,,:::::,,,,,,,....,...,,,,,,,,,,::::;;;;;:...............................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .....................................................,,;'++'''''''''''''''''''''';;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,:,,,,,,,,..,....,,,,,,,,,,::::;;;;;;............,..................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .....................................................,,,'+++''''''''''''''''''''';;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,......,,,.,,,,,,:::::;;;;;,,...........,,....,,,,,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ......................................................,.:+++++'''''''''''''''''''';;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,:,,,,,,,,,.......,,,,,,,,,:::::;;;;;,............,,,..,,,,,,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .......................................................,,:+'+++''''''''''''''''''';;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,:::,,,,,,,,,........,,,,,,,:::::;;;;;,...........,,,,,,,,,,,,.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..........................................................:'+++'''''''';''''''''''';;;;;;;;;;;;::::::;::::::::::::::::::::::::::::::::::::,,::,,,,:::::::,,,,,,.......,,,,,:,,:::::;;;;;:...........,,.,,,,,,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .........................................................,.,'+'+++'''''''''''';;';;;;;;;;;;;;;;;;::;;::::::::::::::::::::::::::::::::::::::::,,:::::::::::::,,,.......,,,,,::,::::::;;;;:........,,,,,,,,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ........................................................,.,..:'+++'''';''''''';;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::,,:::::::::::::::,,,,..,,,,,,,:::::::::::;;;:,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ............................................................,.,;+++''''''''''';;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,:::::::::::::;;;,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .........................................................,..,.,,:'++''''''''''';;;''';;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,::::::::::::::;;;,.......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,.:+'+'''''''''';;;'''';;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,:::::,:::::::::;;;:,.........,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..............................................................,,,.;++''''''''''';;;''';;;;;;;;;;;;;;;:::::::::::::::::::,:::::::::::::::::::::::::::::::::::::::::::::::::::::,:::::::;;;:..........,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,,,.;++'''''''''';;;;'';;;;;;;;;;;;;;;:::::::::::::::::::,:::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,::::::::;;;:.,........,,,,,,,,,,,,,,,,,,,,,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................................,,++'''''''''';;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,::::::::;;;,,,.......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................................,..+'+'''''''''';;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,:::::::;;;,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................................,..''+'''''''''';;;;;;;;;;;;;;;;;::;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,::::::;;;,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ....................................................................''''''''''''';;;;;;;;;;;;;;;;:::;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,::::::::,,:::::;;;:,,,,,,,..........,..,,,,,,,,,,.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ....................................................................'''''''''''''';;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,:::::::::::;;;:.,,,,,,..,......,...,,,,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................................,.,,''''+''''''''''';;;;;;;;;;;;;;;;:;::::;:::::::::::::::::::::::::::::::::::::;;;;::::::::::::,,,,,,,,,,,,,,::::,:::;;;;:,,,,,................,,,,,,,.,,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...................................................................:''''+''''''''''';;;;;;;;;;;;;;::::::::;::::::::::::::::::::::::::::::::::::;;;::;:::::::::,,,,,,,,,,,,,,,,,:::::::;:;;:,,,,,................,,,,,,,,,,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...................................................................;'''''''''''''''';;;;;;;;;;;;;;::;;;:;;;;::::::::::::::::::::::::::::::::;;;:::::::::::::,,,,,,,,,,,,,,,,,,,,:::;;:;:;;;,,,,,................,,,,,,,.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................................,.,''''''''''''''''';;;;;;;;;;;;;;::;;;;;;;;::::::::::::::::::::::::::;;;;;;;;;:;:::::,,,::::,,,,,,,,,,,,,,,,,,,,::;;;;:;;;,,,,,....,,,,........,,,,,,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,..:''''''+''''''''''';;;;;;;;;;;;;;;;;;;;;;:;;::::::::::::::::::::::;;;;;;:;:;;:;:::,,,,,,::::;:::::::,,,,,,,.,,,:::;;;;;;;,,,,,,,..............,,,,................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,,,;'''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::;;;;;;;:;;;;;;::,,,,,,:;::::;::::::::::,,,.,,,,,::;;;;;;,,,,,,,...............,,,..................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................................;''';;''''''''''''''';;;;;;;;;;;;;;;;;;;;;;::::::::::;;:::::::;;;;;;;;;:;;;:::::,,,,,,:::;;;;;;:;;;;;;;;;::::,.,,,,::;;;;;:,,,,,,,.......................................,,.....,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................................:'''';;'''';'''''''''';;;;;;;;;;;;;;;;;;;;;;;:;;:::::;;:::::::;;;;;;;;;;;;;::::::,,:::;;;;;;;;;;'''';;'''';;:;::,,,,,:::;;;:,,,,,,,,................................................,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,''''';''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;::;:::;;;;;;;;;;;;;;;;;::::::::::;;;;;;;;'''''''+++''''''''';;;:,.,,:::;;;,,,,,,,,....,,,............................................,,,,,,,,,,,,,,,,,,,, .............................................................,,'''';;';'''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;:::::::;;::;;;;;'''''';;;'''';;;:::;'''';;;,,,,,:;;;,,,,,,,,,,,,,,,.............................................,,,,,,,,,,,,,,,,,,, ..............................................................;''';';';;''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;::;;;;;;'''''';;;;;;;;;;;:,,,,,:;''+'';,,,,,,;;:,,,,,,,,,,,,,,...................................................,,,,,,,,,,,,, .............................................................;'';;;''';;'''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;;;;;;;;;;;;''''++';;:::::,:;;:......,,;''+''':,,,,:;:,,,,,,,,,,,,,,.....................................................,,,,,,,,,,, ..........................................................,.;'';;;''';;'''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;;;';''+'+'';;::,,....::,........,:'''++';,,.,:;,,,,,,,...............................................................,.,,,,,, ...........................................................:';;;;;''';;''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::;;;;;';''++''''';;:,.......,,..........,;;::;+';,,,,;:,,,,,,...........................................................,...,...,,,, ..........................................................,';;';;''';;';'''';''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;:;::::;;;;;;';'+'''';;;';,......`...,...........;,...:+'':,,:;,,,,,........................................................................ .........................................................,;;;;;;;'';;;;;;;;;'''';'''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;::::::;;;'''''++''';::::;,,......`...:........```;,...`;'+':,,;;,,,......................................................................... ......................``................................,;;;;;;;;';;;;;;'';;;;;;;;;'';'';;;;;;;;;;;;;;;;;;;;;;;;;::;::::;;;;;;::::;;;;;;;''''''';:,,,,,::.`.....``.`:.........``;,..`.:;''':::;.,.......................................................................... ....................````................................;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;:;;;::::::;;;;::::;;;;';'''''''';:,....,:;.......``..:.........``;....`;.:;''::',........................................................................... ...................``````..............................;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;;:::::::;;:::::;;;';''+'';;;'':,...`..,;.....``....;,......````',...`;`..''',;:........................................................................... ..................```````.............................;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::;:::::;;;'''++'';:::;',....`..,',.....``.,:;,.....`````+,..``;```;:';:;........................................................................... ................````.................................;;;;;;;;;;;;;;;;;;;;;::::::::::;;;;;;;;;;;;;;:;;::;;;;:::::;::::::::::::;;;;''+++';;:,,.,;........:#':......,;+++:.....`.`.+:.```;``.',:';;........................................................................... ................```................................,;;;;;;;;;;;;;;;;;;;:::::::::::::::::::;;;;;:::::::::::::::::::::::::::;;;;;;''++;:;;:,...:;,,....`,+++++'''+'+++++#+++'''++#+',```;`.`'`:++;........................................................................... .............```````````````......................,;;;;;;;;;;;;;;;;;;;:::,,,:::::::::::::::::::::::::::::::::::::::::::::;;;'';'++;:::::,....,+',....;+++##+##+++++++++++++++++++#++#+#;``;`:'':........................................................................... ............````````````````.....................:';;;;;;;;;;;;;;;;;:::,,,,,,,,,::::::::::::::::::::::::::::::::::::::::;;;';;'++'::,,:;,....:#++##########+####++++++++++++#+++######++,,;`;'',........................................................................... .............``````````````````.................:';;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,::::::::::::::::::::::::::::::::::;;;'';'++';',,..:;:,,,:+#+##+++++++#++++++##+++#+++++++++++++''+#+''+.'':............................................................................ .............```````````````````...............;';;;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,::::::::::::::::::::::::::::::::;;;'''''+';:;'...`:''''++++++++++++++#++++++++++++++++++++++++++++++'++'+:,............................................................................ .............`````````````````````............';;;;;;;;;;;;;;;;;;;:::,,,.,,,,,,,,,,,,,,,::::,:::::::::::::::::::::;;;;''++++';::;+....;++++++++++++#+++++++++++++++++++++++++++++++++++++++#+..........................................................`...`............... .............```````````````````````.........;;;;;;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,,,,,,::::::::::::::::::::::::;;;;'''+++'':,,,;#',:'+++++++++++++++##++++++++''+++++++++++++++++++++++++;;;.........................................................`..``................ ........`````````````````````````````.......';;;;;;;;;;;;;;;;;;;;;::,,,,,,,,,,,,,,,,,,,,,,,::::::::::::::;::::;;;;;''++++';':,,,'+'+++++++++++++++++++++++++'+'''''''++++''+++++++++++++++'::......................................................``.`.,,.``.............. .......`````````````````````````````.......';;;;;;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,,,,,,,,,:::::::::::::;::::;;;;;;''+++';;;+';:;+++++++++++''''''''++++++++''''++'''''+'';;;'+++++++++++++;:,.....................................................````...,.``.............. ....```````````````````````````````.......';;;;;;;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,,,,,,,,,::,:::::::::::::;;;;;;''++++;::;++++++++++++++''''''''''';;'+++'''++''''''';';;'';;'++#+++++++++;:,.....................................................````.....````............ .....`````````````````````````````.......;';;;;;;;;;;;;;;;;;;;;;;;::,,,,,,,::::,,,,,,,,,,::::::::::::::;;;;;;;'''++++''++#+++++++++++++''''''''';;;;;;;'+++++++''';;;;:::;;;,;;'++++++'+++;:,.....................................................````...,.`````........... ...```````````````````````````````......:';;;;;;;;;;;;;;;;;;;;;;;:::,,::::::::::,,:,,,,,,,:::::::::::;;;;;;;'''+++++++++++++++++++++''''+'''''';;;;;;;;;;''+'''';;;;::::::::;,;;;+:;++++''',;....................................................``````.`..`````........... ...```````````````````````````````..`..:';;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::,::::::::::::;;;;;;;;''+++#++++++++++++++'''''''''''''''';;;;;;:::;;;;++''';:;::::::::::::;;+';'+#''+:'...................................................```````.``.`````........... ...````````````````````````````````...,';;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::;;;;;;'''++++++++++++++++'''''''''''''''''';;;;;;::,,,::;;'++'';;:::::::::::::;;++,.:+;';;...................................................```````. `.``````.......... ...`````````````````````````````.``..,';;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;;:::::::::::::::::::::;;;;;'''+#+++++++++++++''''''''''''';;''';;;;;;;;:::::::::;;;'+'';:::,:,::::::,::;'.,..;;;;,.................................................```````..`..```````....```.. ...``````````````````````````````.`..';;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;:::::::::::::::::::;;;;;;''+##+++++++++++++''+'''''''''''''';;;;;;;:;;:::::,:,,::;;''';;::,:,,,:::::,.;;+':,,`.,:,..............................................`````````.....```````````````` ...```````````````````````````````..;';;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;:::;::::::::::::;;;;;;''''+##++++++++++++'''''''''''''''''''';';;;::;;:::,:,,:::,::;''';;:,,,:::::::::::::;':..::;..............................................`````````.....```````````````` ...``````````````````````````````.`:';;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;::::::::'';;:;;;;;;;::;;;;;;;''''+#+++++++++++++#++++'''''''''''';;;''''';;;;:;;::,,:,:::::::;;'';:::::::::::::,:::,;+;:` .,...........................................```````````.....```````````````` ..````````````````````````````````:';;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;::::::::::'';;;;;;;;;;;;;;;'''''+#++'''+++++++++++++++''''''''''''''';;;;'';;;;;:::::,:::::::::;;';;:::::::::;;;:::.,;';, `.,..........................................````````````.....```````````````` ..```````````````````````````````.'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::'+;;';';;'';''''''+##+++:....,++''++++++++++'+''''''''''''';;;;;;;;;;::::::::::::::::;;;;;::::::::::::,,,:;++``.,,.....................................`````````````````.....```````````````` ..```````````````````````````.```;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;++'';''''''''+###+';';,.....:;....'+++++++++++'''''''''''';;;;;;;;;;:::::::::::::::::;;;;::::::::::,,,,;:'+,,:,,....................................``````````````````.....```````````````` ..``````````````````````````````,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;::::;'+++++####++++''';;;:,,,.,',.....;+'::'+++++++'''''''''';;;;;;;;;;;;;;;:::::::::::::;;;::::::::,,,,:::'+,`,;:;,..................................```````````````````...,,.``````````````` ..``````````````````````````.```'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;::::::;;'+'';:,,::;''+'':,,,,,',,....:+....,+++++++'''''''''';;;;;;;;;;;;;;;;;;;;;;:::::;;::::::::,,,,,:;'', `;:;',..............................``````````````````````...,,.``````````````` ```````````````````````````````,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::;;;:::::::::::::,,,,::;;'';::;',,,..,:'.....;+;;''++++'''';;';;;;:;;;;;;;;;;;;;;;;;::::::::;:::::,,,,::;+';```.:;;;;,.........................``````````````````````````..,,,.``````````````` ```````````````````````````````;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;:::::::;;;;;;;;;;;:::::::,,,,,:;''';::,.,,;'.....:;,...:'+++''';'';';;;;:;;:::::::::;;:::::::::::::,,,,,::;'':``,`..:;;:;;.........................``````````````````````````,.,,,.`````````````.. ``````````````````````````````,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;:::::::;;;;;;;;;;;;;:;;::::,,,,:'';::,,,;;....,::....,:++++++''''''';;;;;;::::,,,,,,:::::::,,,,,,::,,:;'':` ``:.`.:;;::;,............``````````````````````````````````````,..,,.``````````..... ``````````````````````````````;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;;;;;::;;;;;;::;::::::'';:::';,...,::..`..,;....:''''''''';;;;;;::::,,,,,,,,,,,,,,,::,::;;'':` `.:,..;'::;;:...........```````````````````````````````````````,.,,,.``````....,,,,, ```````````````````````````.`,'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;:::;'':;':,...,;:..`..,'..````:'''+'''';;;;;;:::::::::::::::::::::;'':,,:```..:,..''::::;..`.....``````````````````````````````````````````,,,,,.````...,,,,,,,, `````````````````````````````;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::;:;;;''''::...,;:,.`..,'.......:+':,`.,:;'';;;;:::::::::::::;;;;;';,``` :.....::.,''::::;,.......``````````````````````````````````````````,,,,,.`...,,,,,,,,,,, ````````````````````````````.';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;:;;;'+':,..,;:,``..,;.````...;.```````,''';;;;;;;;;;;;';;;:;'':` ```:,....::.:'':::;;:`.....```````````````````````````````````````````.,,,,,.,,,,,,,,,,,,,, ````````````````````````````;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::;:;:;'+':,:;:,``.,::.`````..:........,:+':....:'+''';.`````,',`````.,,....:;,:'':::;::`....````````````````````````````````````````````.,,,,,,,,,,,,,,,,,,,, ``````````````````````````.`';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::;;;;''';;:,`..,;,.`````..:...```...:':` `` ``.'++```````.;,`````.,:,...:','';:::;;;..``````````````````````````````````````````.``...,,,,,,,,,,,,,,,,,,,, ```````````````````````````:;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;:;'+':,...,',.`````..;...`````.,;,..``````.';``````..:,`````..:,..,:';++::::;;;..``````````````````````````````````````.......,,,,,,,,,,,,,,,,,,,,,,, ```````````````````````````';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;;::::::::::::;'+';,..,'...````..;...`````.,'..........;,........:,````...;,.,,;'+'',::;::;.`.`````````````````````````````````..,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ````````````````````````.`,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;;;:;'+':,;',,...```.;...``````,'.`````....',`.......,:``.`.`.;..,,''+':::::::;.`.````````````````````````````````.,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,, ``````````````````````````;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;'';'';'';;;;;;;;;;;::::;;;:;;;;;::;++''',,......,:..```````,'.`````....',`.......,:``..``.;,..:++;,,,:;:::;...``````````````````````````````.,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,, `````````````````````````.';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;::;;;:;;;;;:;'++':,,.....::..```````,'.`````...`':`........:.`.....;,.,'+;,,,::;:::;.```````````````````````````````.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ````````````````````````.,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;';;;;;;;';;;;;;;;;;;::::;::::;;;;::'++;,.....::...``````:'.`````.`.`;:`........:,``...,;:,''::,,,::;:::;.````````````````````````````..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ````````````````````````.:;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'';;;;;;;;;:::::::::;;;;:::;'+;,..,;;....`````:'.`````.`..;:`.......,::``...,;;'':,,,,,::;:::'``````````````````````````...,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,, `````````````````````````;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;::::::::::;:;::;'+;,:';.....````;'.`````.`..;;...```..,;;``.`.,+'::,,,,,::::::;:`````````````````````.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,, ````````````````````````.';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;::::::::::;;;;::'+'';.........;;,`..```...;;...```..,;'````,;;:,,,,,,:::::::'.``````````````````.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .......`````````````````.';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;::;;;;::::::::::::::;;::;;';,.......;;.```````..;;,````..,::;,`.:;:,,,,,,,:::::::;'`.``````....,.......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ............`````````...,;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;';;:::;:::::::::::::::::::;::;';,,,.,;;...````...;;:``.`.,:;:;;;';:,,,,,,,,:::::::';``````..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,, ........................:;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;::::::::::::::::;:;:::::;;';;;;:..`...,.,;;;,.,,,:;;;'+':,,,,,,,,:::;::::;',```..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,:,::::,,,,,, ........................;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;::::::::;:;:;;:;;''',.....,,;;;;;:::;;'+';:,,,,,,,,,:::::::::';`..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,:::,,,,,,, ........................';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;::::;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::;:,,:::;:::;;;;;::;;;'';;;;;;;';;''+';:,,,,,,,,,,,:::::::::'',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,, ........................';;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;;;;;;;;;;;;;;;;;;;;;::;::;;;::;::::;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::,,::,,::::;;;;;;::;;;;''''++';:::,,,,,,,,,,,,:::::::::;':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .......................,';;;';;;';;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;;;;;;:;:::;;;;::::::::;:;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::,,,,,::::::;;::;;;;;;;;:::::,,,,,,,,,,,,,,:::::::::;'',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................,...,,';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;;;;:::;::;;;;;:;::::::;:;;;:;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::,,,,::,,,::,,,:;;::::;::,,,,,,,,,,,,,,,::::::::::;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,::: ..................,...:,';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;::;;:::;;::::::::;;:::;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::,,,:,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::;;''',:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::: ..................,,.,:,';;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;::;:;;;;:::::;;;::::;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::,,:::,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::;;'''',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::: ,.....,,..,...,...,:.:,,';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;:::;;;;;;:::::;;::::::;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,:::::::::::;'''''::,,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::::::::::: ,,,...,,,.,..,,,,,,:,:,:';;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;::;;;;;:;:::::::::::::::;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::,,,,,,,,,,:::::::::::::::;''''''':,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::::: ,,,...,,,.,.,,,,..,,::,:';;;;'''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;::;:::;;;;;:;;::::::::::::::::;;;;;;;;;;;;;;;';';;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::;''''''''',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::::::: ,,,,.,:,,,,,,,,,,,,,::,:';;;;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;:;;:;:::::::;;;;;::::::::::::::::::;;;;;;;;;;;;;;;;;';';;;;;;;;;::::::::::::::::::::::::::::::::::::::;;''';'';;''',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::::::: ,:,,,,:,:,,,,:,,,,,,::,:';;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;;;;;;::;::::;;;::::::::::::::::::::;;;;;;;;;;;;;;';;;;;;;;''''';;;;:::::::::::::::::::::::::::::::::;''''''';;;;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::,:::::::::::::::::: ,:,,,,:,,,,,,::,,,,,::,:';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;;;;;;;;;::::;;;::::::::::::::::::::;;;;;;;;;;;;;;;;;;;;;;';;''''''';;;;:;;:::::::::::::::::::::;;;'''''''';;;;;;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::;::::::: ,:::,,:,:,:,:::,,,,,::,:';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;;;;;;;;::::;;;;;:::::::::::::::::::;;:;;;;;;;;;;;;;;;;;;;'''''''''''''';;:::::::::::::::;;:;;''''''';;;;;;;;;;;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,:::::::::::::::::::::::: :::::::::::,:::,,,:,::::';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;:::::;;;;;;;;::::;;;;;;::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;'''''''''''''';;;;;;;;;;;;;;;;;'''''''';;;;;;;;;;;;;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::::::;:::: ::::::::::::::::::::::::';;;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::;;;;;;;;;:::;;;;;;::::::::::::::::::::::::::;;;;;;;;;;;;;;;;'''''''''''''''''';;;;;;;;;'''''''';'';;;;;;;;;;;;;;'',,,,,,,,,,.,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,::::::::::::::::::::;:::: ::::::::::::::::::::::::'';;;'''';;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;;;;;;;;:::;;;;;;;::::::::::::::::::::::::::;;;;;;;;;;;;;;;''''''''';;''''';'''''''''''''''';;;;;;;;;;;;;;;;;;;'':,..........,,,,,,,,,,,,,,,,,,,,,,,,,:::,,::,,,,,,:::::::::::::::::::::::::: ::::::::::::::::::::::::';;;;'''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;;;;;;;;:;;;;;;;;;:::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;''''';;;;;''''''''''''''''''';'';;;;;;;;::;;;;;;;''.....```....,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::::::::::::::::::::::: ::::::::::::::::::::::::'';;;'''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::;;;;;;;::::;;;;;;;:::::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;;;;;;;;;;';'''''''''''''';;;;;;;:;;;;;:::;;;;;;'',`........,.....,,,,,,,,,,,,,,,,,,,,,::::::,,::::::::::::::::::::::::::;:::: ::;::::::;::::::::::::::'';;'';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::;;;;;;:::::;;;;;;::::::::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;''''''';;;;;;;;:::::;;;:::::;;;'';,,,,,....,,.,,,.......,,,,,,,,,,,,::,::::::::::::::::::::::::::::::::::;:::: ::;::::::;::::::::::::::'';;'';'';;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;:::::;;;;;;:::::::::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;::::::;;;'';:::::,,,,,,,,,,,,,,,..........,,,,,,::::::::::::::::::::::::::::::::::;::::: ::;;:;:::;;:::::::;:::::;';''';';;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;:::::::::::::::::::::::::::::::::::::;::;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::;;;''::,,,,,,,,,,,,,,,,,,,,,,,,..........,,,,::::::::::::::::::::::::::::::::::::: :::;;;;::;;:::::::;::::;;'';''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::;;;;;;:::::::::::::::::::::::::::::::::::::::::;;:;;;;;::;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::;;;;'':::,,,,,,,,,,,,,,,,,,,,,,,,,..,,..,.....,,,,,::::::::::::::::::::::::::;;:::: :;:;;;;;;:;;;;:::;;;:;:;;'';''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;:;;::::;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;:::::::::::::::::::;;;;'',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,........,,,,::::::::::::::::::::::;:::: :::;;;;;;:;;;;:::;;;:;:;;';''''';;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;;;;;;;;;:::::;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::;::;;;;;;;;;:;:::::::::::::::::::::;;;;;';,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::,,,,...........,,,,:::::::::::::::;;:::: :::;;;;;;::;;;;::;;;:::;;''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;;;;;;::::::::;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;;;;;::::::::::::::::::::::;;;;;';,:,,,,,,,,,,,,,,,,:::::::::::,::::::::::::::,,,,..........,,,,:::::::::;;;::: ;::;;;;;;;;;;;;;:;;;:::;;'';'''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;:;;;;;;:::::;:::;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;::::::::::::::::::::::::::;;;;';':::::,,,,,,,,,,,,,,,,,,::::::::::::::::::::::::::::,,.......,,:::::::::;::;::: ;:;;:;;;;;;;;;;:::;;;;:;;;';'''''';;;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;:::::::::;:;::::;;::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;:::::::::::::::::::::::::;;;;;;';:::,:,,,,,,,,,:,,,:::::::::::::::::::::::::::::::,,,.....,,:::::::::::::::;::: ;:;;:;;;;;:;:;::::;;;;:;:;''''''';;;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;::::::::::::::::::::::::::;;;;;;';::,:,::,:,,,,::::::::::::::::::::::::::::,,,,.........,:::::::::::::::::::;;:; ;:;;:;;::;;;::::::;;;;:::;'''''''''';;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;;;;;::;::::::::::::::::::::::::::::::::::::::::::,::::::::::::::::::::::::::::::::::::::::;;;;;;';:::,,::::::,,:::::::::::::::::::::::,,,...........,,,::::::::::::::::::::::;:: ::;::;;;:;;;::::::;;:::::;'';''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;;;;::::::::::::::;;;;;;;;;::::::::::::::::::::::::::::::::::::::,,,,,::::::::::::::::::,,,,:::::::::::::::::;;;;;''::,:,:::::::,::::::::::::::::::,,,......`......,,,:::::::::::::::::::::::::;::: ;:;:::;;::;;:::::::::::::;''''''''''';;;;';;;;;;;;;;;;;;;;;;;;;;;;:;:::::;:;;;::::::::::::;;:;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,::::::::::::::,,,,,,,,,,,,::::::::::;;;;;'':::::,:,::::::::::::::::::,,.............,,,,:::::::::::::::::::::::::::::::::; ::;::::::::;:::::::::::::;;';'''''''';;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;:::;:;;;;:::::::::::;;;;;;;;;:::::::::::::::::::::::::::::::::::,,,,,,,,,,,,:::::::::::::,,,,,,,,,,,,,:::::::::;;;;;';::::::::,,::::::::::,,,...........,.,,,,::::::::::::::::::::::::::::::::::::::: :;::::;:::;:::::;:;::::::;;';'''''''';;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;:::::::::::;;;;;;;;;:;::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,::::::::::,,,,,,,,,,,,,,,:::::::::;;;;'';:::,::::::::,,,,,,................,,,,::::::::::::::::::::::::::::::::::::::::: :;:::::;::;:::::;::;:::;;;;'';''''''';';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;;;;;:::;;;:::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,::::::::,,,,,,,,,,,,,,,,:::::::::;;;;'';:::,:,:::::,,,..............,..,,,,,:,::::::::,:::::::::::::::::::::::::::,:::, ::;::::;::;::;::;:::;::;;;:'';'''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;:::::::::::::;:;::::::;:::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,:::::::,,,,,,,,,,,,,,,,::::::::;;;';''::::,,:::::::,,,..........,,,,,,,,,,,,,::::::::::::::::::::::::::,:::::::::::::, ::;::;:;:::::;::::::;::;;::;'''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;;::::::;::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,::::::,,,,,,,,,,,,,,,,:::::::::;;'''';,,,:,:::::::::,,,,,,,,,.,,,,,,,,:,,,,,,,,,:::,:::::::::,,::::::::::::::::::::::, ::;::;;;;:;;::::::::;;;;;;;;'';''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::;;;:::::;::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,::::,,,,,,,,,,,,,,,,,::::::::;;;'''';,,::,,:::,,,::::,,,,,,,,,,,,,,,,,,,,,,,,,::::,,::,,,,:::::::::,,::;;:::::::,::,, ;:;::;:;;:;;::.,::;:;;;;;;;:'';''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;;;;::::;::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::;;;''''':::,:,::,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;;,;:,::::::::::, ;;;;;:;:;;:;::,,..;::;;;;;:;;';'';'''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;;;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::;;;;''''':::,,,:,,:,,,:,,:,,,,,,,,,,,,,,,,,,,,,,,,....,.,,,,,,,,,,,,,,,,,,:::,,,,,:::::::: ;;;;;:;;:;::..,,,::::;;;;;;;;''''';''';'';;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;;;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,::::::::;;;;;'''';,::,:,,:,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....................:;......,,,,,,,, :;;;;::;::;..,,,,..::;;;;;;;;;'''';''';'';'''';;;;;;;;;;;;;;;;;;;;;;;;;;;::;;;;;:::::::::::;;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,::,,,,,,,,,,:::::::;;;;;;'''';,:,:::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................:;,............. ;;;;;;::;:;:;,,,.:,:;;;;;;;;;;''''''''';;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,::::,,,,,,,,::::::::;;;;;''''':::,::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,....::,............. ;;;;;;::::;;;,:,.::::';;;;;;;;''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;;;;::;:::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,:,,::::::::,,,,,::::::::;;;;;''''';:::::::::,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...,;:....``....... ;;;;;::,,::;;;;:,::::;;;;;;;;;;+''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;::::::::::::;;;;::;:::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,:::::::::::::,,,::::::::;;;;;'''''';:::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::,......,:;...````````.. :;;;:,,,,,::;;;;;;::.,;;;;;;;;:''''''''';''''';;;;;;';;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::;;;;;;;:::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,:::::::::::::,::::::::::;;;;;'''''':::;::::::::::,,,:,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...........::,..````````.. :;;;;;,.:.,:;:;;;;::.`,,.:;;;;;'+''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;::::::::::::::;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,::::::::::::::::::::::::::;;;;''''''':::;:::::::::,::::,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................:::..`.```..`.` ;;;;;::.::,;;;;:;,,:,...,:;;;;;;+;'+''''''''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::;::::;;;;;::;:::::::::::::::::::::::::::::::::::::,,,,,,,,:::::::::::::::::::::::::::;;;''''''';::;::::;::::::::,:,,,,,,:,::,,,,,,,,,,,,,,,,,,,,....................:::......``.`.. ;;;;;;;:;:;;;;;::```,,,:,.,;;;;;++'''''''''''''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::;:::::;;;::;::::::::::::::::::::::::::::::::::::,,,,,,,,:::::::::::::::::::::::::::;;;;''''''':::;:::;:::::,::,:,,:,,:::::::::,,,,,,,,:,,,,........................,::.......`.`.` ;:;;;;;;;;;;;;;;:.`,:.,,,.,;;;;;;+'''+'''''';''';'';;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;:;::::;;:::;;;;::;;::::::::::::::::::::::::::::::::::::,,,,,,,::::::::::::::::::::::::::;;;;;'''''''::;':::;::;;:::::,::,,,,,,:,:::::,,,,:,,,..................`````.....:::....```.`... ;;;;;;;;;;;;;;;;;;::``,`.;;;;;;;;+'''+'''''';'''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;;;;;;;::;:::::::::::::::;::::::::::::::::::,:::::::::::::::::::::::::::::;;;;;;;''''''';;;';:;;:;;;::::::::,,,,:::,:::::,,,,....................``````......:::...`````.,., :;;;;;;;;;;;;;;;;;;...;`..;;;;;;;'+'+'''''''';;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;;;;;;;:;;::::::::::::::;;;;:::::::::::::::::,,:::::::::::::::::::::::::;;;;;;;'''''''';;;;;;;;;;;:;:,:::,:,:,:::::,:,,,,..............`...`.````````......,::,...`....,,,, ;;;;;';;;;'';;;;;;;:,;';,:;;;;;;;;++'''''''''''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::;;;;;;;;;;;;;;;;:::::::::::;:;;;;;;;::::::::::::::::::::::::::::::::::::::::;;;;;;';''''''+;'';;;;';;;;;;:,;:::::::::,,,,,,,...............``.````.`.``````.....,::::.....,,,,,,, ;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;+'+''+'''''''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::;;;;;;;;;;;;;;;;;:::::::::::;:;;;;;;;:::::::::::::::::::::::::::::::::::::::;;;;;;;''''''''+;'';;;;;;;:;;;:;;:::::,,,,,,,..................````````.`.``````....,:::;,...,,,,,,,,, ;;;;;;;';;;;;;;;;;;;;;;';;;;:;;;;;;'''';''''+'''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;;;;;;;;;;;;;:::::::::::;;;;;;;;;;:::::::::::::::::::::::::::::::::::::;;;;;;;''''';''+';'''';;:;::;;::;;::,:,,,,,................````````````..`.`````....,::::::.,,,,,,,,,,, ;;;;;;;;;';;;;;;;;;';';'';;;;;;;;;;;''+;''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;:;;;:;::::::::::::;;;;;;;;;:;;;:::::::::::::::::::::::::::::::;;;;;;;;;'''''''++'''''';;;;:;;;:;;::;::,.:...............````````````..``,..``.`.`...:::::,,,,,,,,,,,,., ;;;;;;;;;;;;;;;;;;;;'';;;;;;;;;;;;;;';+;+'''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;:;;;;::;;;:;::::::::::::;;;;;;;;::;;;::::::::::::::::::::::::::::::;;;;;;;;;''''''''+'''';;;;;;;;;;;;;;:::::.:,,,,..........``````````.```..``,..``.``...,::::,,.,,,,,,,,,,.. ;;;;;;;;;;;;;;'''';;;'';';;;::;;;;;;;;';+''+'''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;;::::;;;;;:::::::::;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::;;;;;;;;;''''''''''+';;;;;;;;;;;;;;;;;;;;:;:,:..:........`````````````..``..``,,..,,....,.;::,,,.,,,,,,,,,... ;;;;;;;;;;;;;;;;''';;';;;;;;;;;;;;;;;;';+;'''''''';''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;:::::;;;;;::::;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::;;;;;;;;;;'''''''''++';;;;;;;;;;;;;;;;;;;;:;:;,.::.....````````````````..``....,,.,,`.,,.,,::,,,,.,,,,,,,,,,,, ;:;;;;;;;;;;;;;;;;'';;;;';;;;;;;;;;'';;'';'++'+''''''''';;;;;;;;;;;;'';;;;;;;;;;;:;;;;;;;;;;;;;;;;::::;;;;:::;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::;;;;;;;;;;'''''''''++''';;;;;;;;;;;;;;;;;;;;;:;,:;:.,:.````````.``.``````..``.,.,,,,..,,.,,,,:,,::,,,,,,,,,,,:: :;;;;;;;;;;;;:;;;;;;;;'''''''';;;';'';;;;;+''++'''''''''';;;;;;;;;;''';;;'';;;;;::;;;;;;;;;;;;;;;;:::;;;;;;;:;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::;::::;;;;;;;;;;'''''''''++';;;;;;;;;;;;;;;;;;;;;;;;;;;;;:,:,```````..```.``````....,,.,,,,.:,,,,,,,:,,,:,,,,,,,,,,,,, :;;;;;;;;;;;;:;;';;;';''';;;;'';;';;;;;';;+'+++''''''''';;;;;;';;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;:::;;;;;;;;'''''''''''++';''';;;;;;;;;;;;;;;;;;;;;;;;;;,,;,````````````.``..`.`,,.,,.,,,,,,,,,,,,,:.,,,,,,,,,,,,,:,, ;;:;;;;;;;;;;::;';;;;;;';'';;;;;;';;';;;''''+++'''''''''''';;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;;:;;;;;;;;;''''''''''''++''+'';;;;;;;;;;;;;;;;;;;;;;;;;;;,::``,`.`.,`.```,```...`.,,,,,,,,,,,,,,,,,,:,,,,:,,,,,,,::::: ;;:;;;;;:;;;;;:;;;;;;;;;;;;;;;;;;;'''';'''''+++;''''''''''';;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;:;;:;:;;;;;;;''''''''''++++''''''';';;;;;;;;;;;;;;;;;;;;;;::::.,,...`:`.```.``..,.,,,,,,,,,,,,,,,,,,,,,,,::;:::::::::::: ::;;;;:;:;;;;::;;;;;;;;;;;;;;;;;;;;;'+';';'''+';''+''''''''';''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;;;;;;;;;;;;;'''''''''''+++++''''';;''';;;;;;;;;;;;;::;;;;;;;;:::...,.;.````.`.,.,,..,,,,,,,,,,,,,,,,,,,:,::::::::::::::: ::;;;:;;::;;;::;;;;;;;;;;;;;;;;;;;'';;';''';''';'+''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';''''''''''+++++''''''''''';;;;;;;;;;;;;;;;;;;;;;:::;,,,::`;.``....`..,,,,,,,,.,,,,,,,,,,::,::,:::::,,:::::::: ::;::;;;::;;;;::;;;;;;;;;;;;;;;;;'';;'''''''''';;+'+';''''''''''';;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'''''''''''+++++'''''''''''';;;;;;;;;;;;;;;;::::;;;;;;::;;:,;,``:..,`,,,,,,,,,,,,,::,:,,,:::::::,::::,,:,:::::: ::;::;;;::;;;;;:::;;;;;;;;;;;';;;';;';;'''';;'+;;+++;;';''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;':;;;;;;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'''''''''''''++++'+'+'''''';';;;;;;;;';';;;,..,:,;:;;;;;;:;;;:;:,.;`,:.,,,,,,,,,,,:,:::,,::,:::::::::,,,,:::::::: ::;::;;:;;;;:;;::;;;;;;;;;;;;;;;;;;;;''''''';'';;''+;;''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'''''''''''''++'+'''''''''''''';;;;;;;;;;;;:,,,,,:,,:;:;;;;;;';:;;.;,,,,,:,,,,,,,,:,,,,:,,,,,,:::::::::::::::::::: ;:::::;;:;;:;;::;;;;:;;;;;:';:;;';;;'';'';;';;'';;'';;+++''''''''''''';;'''';;;;;;;;;;;;';;;;;';;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'''''''''''''++++++''''''''''''''';;;;;;;;;;;;;;:..,,,,:;;;;;;;';:;;;::,,:,;,,,,,:::::::,,,,,,,,:::::::::::::::::::: ;:::::;::;;;;:;:;;;;;;;;;;:;;:;;';;;''';;;;;';;';;;;;;++'''''''''''''''''''''';;';;;;;;;;'';;';';;;;;;;''';';';';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;''';;;;'''''''''''+++++++++'''+'''''''''';;;;;;;;;;;;;;;;..,.:.::;;;:;::';,';';;,:;,;,,:,:;:::;,:::::::::::::,::::::::::::::: ;:::;;;::;;:;:;;;;;;;;;;;;;;':;;';''''''';;'';;';;;;:'+;+'''''''';;'''''''''''''''';;;;;;;''';;;;;;';';'''''';''';;;;;;;;;;;;;;;;'';;;;;;;;;'''''';;'''''''''++++++++''''''''''''''';';;;;;;;;;;';';;;;,;:,;::;:.,:::,:':;;';;:;;:;:,;,;;:::;:::::::::,:::,,::::::::::::::: :;;::;::;;,.,:;;;;;;:;;;;;;:':;;''''';;'';;';;;;;;';;';'+''++''''';;'''''''''''''''''';;;''''';;'''''''''''';;'''';;;;;;;;;;;;;;;;;;';;''''''''''''''''''++++++++++''''''''''''';''''';;;;;;;;;;;;';;;;;;;;;;;,.,..,,,;;;;;';',;;:;:,';':;::':::;:,,,:::::::::::::::::::::: ;;;::;;::,...::;;;;;;;;;;;;;;;;;;';;;;;'''';;;;;;:';;;;+';;;'+++'';;'''''''''''''''';''';'''''';'''''''''''';'''''''''''';;';;;;;;'';'''''''''''''''''++++++++++''''''''''''';'';'''''''';;;;;;;;;'';;;;;;;;;;::,.:.:,:;;;;';':';;';:''::;:;':::;:::::::::::::::::::::::::: :;;;;;;::....,;:,:;;;;;;;:;';;;;;';;;;;;'''';;;;';;';;;;:;;;;'+'++';;''''''''''''''';'''';''''';''''';'''''''''''''''''''''''''''''''''''''''''''''''+++++++++'''''''''''''''';';'''''';;;;;;;;;;;;;';;;;;;;;;;;,,',:;;;;;;;;;;';;';;''::':;':::':::;;::::::::::::::::::::: .:;;:;;:,....,;..,;;;;;;;;:'';'';;;;;;;;;'''';;;';;';;;;'';';;'';++;:'+'';;''''''''';'''''''''';;'''';''''';;'''''''''''''''''''''''''''''''''''+''+++++++'+'''''''''''''''''';;;;''''';;;;;;;;;;;;;;;;;;;;;;;;;::;;;;;;;;;;;;;'''';'';;:':;'::;;:::;;::::::::::;:::::::::: ..:;,,::.....,:...;;::;;;';;;;'';;;;;;;;;;''';;;'';;;;;;+';+;;;';;+;;;+'';;'''';;;'':';''''';'';;''''''''''';''''''''''''''''''''''''''''''''+++++++++++++'''''''''''';''''''';;;;;''';;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;'''';'';;;';;'::';:::;;:::;:::::::::;;:::;:: .`.:,,,,.....,,,..,...;;;;;';''';;;;;;;;;;''';;;'';';;;;;';'';;;;;;'';'';;;;+''';;;':'';'+''''';;''';'''''''''''''''';''''''''+++''+''+'+++++++++++++'''+''';'''''''''''''''''';;;''';;;;;;;;;;;;;;;:;;;;;;;;;;;;;''';;;;;;;;;;;'';''';;;';;'::';;;;;;::;;;:;;:::::::;;:::: .`..,,,......,,,......;;:,:';';';;;;;;;;;;;;;;;''';;;;;;;;;;;;;;;;;';;;;;;;;'';;;;;':;';;''''';;;;'';''';;';'''''''''';''+''++''+;++'+++++++++++++++'+++'''';''''''''''''''''''';;;';;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;';''';;;;';;';;';;;;:;::';::;;:;;:::;::;;;; ,...`.,,......,,......,....;';:;;;;'';;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;';';':;'';;;;;+:';;+';;;';';;''++'''+++;;++;;++''+;++;++++;++++++++++'''''''';''''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'';';;;';'';;'';'':;:;;;:';::;;::::::::;; .,.....,......,,...........;:..,:;';;;;;;;';;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::';:;;;;'';;;+';';;;+;'+++'''++++;;++;;++;'';'';'+';'++++++'++'';;''''';''''''''''''''';'''';;;;;;;;;;;;;;;:;;;;;;::::;::;;;;;;;;;;;;;;;;;;;;'';';;'';'';'''''':':;;:;';::;;;::::::;;: .,,....,,....,,,....`............,:;;;;;;;';';;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::';;;;;;'+;;:+';';;;';+++''''++++;;;+;;'';'';'';+';;'++'+++++''';;;''';;';''';';;'''''';'''';;;;;;;;;;;;;;;;;;;;;;::::,,:;;;;;;;;;;;;;;';;;;''';';';';'';'';;'':';';;';';:';:::::::;;; ,..,....,....,,,.........`........:;;;;;;;;;;;;;';';;;;;;;;;';;;;;;;;;;;;;;::;;;;;;;;:;;;;;;;''';;;;;';;;;'''''''';;''+;;'';';;'';'';';;;'+'++''''''';;;''';';;'';;';;''''''''';;;;;;;;;;;;;;;;;;;;;;,::,,,,.,;;;;;;;;;'''';;;;;;;'';';;;';''''';;'';;;';;';';:';:;;::::;;; .,,.,,,.,,...,,,....`............,;;;;;;;;;;';;;''';;;;;;;;';';;;;;;;;;;:;;:::;;;;;;;:;::;;;:;;;;;;';;;;;;';'';;''';;;';;;;;;+;';;';'';;'++'''''';'''';;;';;';;''';';;;';'';;;;;;;;';;;;;;;';;;;;;;;:::.,,:,,,,;;;;;;;;;''';;''';;;';'';;';'''';;''';';';';;'':';:;;;;;;;;; ..,,,,,::::::::,...`...........,::,,,;;;;;;;;;;;''';;;;;;;;';;;;;;;;;:;;;;;;:::;;:;;::;::;;;:;;';::;'':;;';;';;;+'+';;;;;;;;;+;;;;';';;''+''''''';;''';;;;;;;;;'';;;;;;'''';;';;;';;;;;;;;;';;;::;;;'::,.....:;;;;;;';;;';'';;';;;'';';;;';;;''''''';';;;';;'';';:':;;;;;;; ..,,,::,,`..,,,,..........`...,......:;;;;;;;;;;;;;;;;;;;;;;++#@@@@#+';;;;;;;:::;;;;:::::::::::;::::;':;;;;;';;;;;;'+':;;:;;;;';;;'';;;;'';';;''';;;'';';;;:;;;;;;;;;;;''';;;'';;;:;;;::;;;;::::::;;;:::.,,:;:;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';';;;;;;;;;'; ,,,,:...,.,,,,,@@@@@@@@@@@@@@........:;;;;;;;;;;;;;;;;;;;#@@#;,` `.;#@@#;:;;;:::;;;;:::#@@@@@@@@@@@@@@;;;;;;';;;;;;;'';;;;;;;;;;;;;;@@@@@@@@@@@@@;;'';';;'#@@@@@@@@@@@;''';;;;;#@@@@@@@@@@#;@@@@@@@@@@@@@@@;;;;;;';;@@@@@@@@@@@;@@@@@@@@@@@@@@@@@@@@@@@@@@@@@''';;';':;;'; ,,,:,,,,,.:::;,@ @.......:;;;';;;;;;;;;;;';;@@; ;@@;;;;::;:;;:::@ @;;:;;'';;;;';;;;;:;;;;;;;;;;;;@ ;#;;';';;;@ @;''';;;;;@ :#;@ @;';;;;;;;@ @;@ ;';;;';;':';; .,:,,,:,,;;::::@ @.,..,,,;;;;';;;;;;;;;;;'#@, ,@#:;;::::::::@ @;;;;;;;;;;;;;;;:;;;;;';;;;;;;;@ `@;;;;;;;'@ ++;'';;;;;@ #+;@ @;;;';;;;;@ @:@ ;';'';;'':';; .;,,::;::;:;,,,@ @...,,:;;;;;;';;;;;;;;;;@# +@;:::::;;::@ @;;;;;;;;;';;;;;;;:;;;';;;;;;;;#: @;;;;;;;#' .@'';;;;;'# @;;@ @;;;;;;;;;@ @:@ ;';'''''';';; .:,:;:;;;:::,,,@ @,:;;'';;;;;;';;;;;;;;;@: ,@;:;:::::;@ @;;;;;;;;;;;;;;;;;;::;';;;;;;;''# @;;;;;;;@. @''';;;;#, `@;;@ @;;;;;;;;;@ @:@ ;''''''';'';' ..::;,,.:;,.,,,@ @;'';'';;;;;';';;;;;;;@: .@::;:;;:;@ @:;;;;;;;;;;;;;;;;;;:;;;;;;;;;;:@ '+;;;;;;@ @;;;;;;;@ ;#;;@ @:;';;;;;;@ @:@ ;'''''''''';; .,:;;,,..;..,,,@ @;;';;;;;;;';;;;;;;;;@; ,@:::;;:;@ @;;;;;;;:;;;;;;;;;;;;:;;;;;;;;;;@ .@;;;;;;@ +#';;;;;@ @;;;@ @:;;;;;;;;@ @:@ ;''''''';';;' .:,,::......,,,@ @;;;;;;;;;;':....,:;## ;#,;;;:;@ @;;:;;;;:;;;;;;;;;;;;;:;;;;;;;;;#; @;;:;;++ .@;';;:'# @:;;@ @;;;;;;;;;@ @:@ ;''''''''';'' .,,:::.,....::,@ @;';;'';;;;;.......:@ @';;;;;@ @;;;;;;;:;;;;;;;;;;;;;:;;;;;;;;;'@ @;;;;;@. @;;;;:#: `@:;;@ @;;;;;;;;;@ @:@ ;'''''';'';'' ....::......::.@ @;'';''';';:..`....@, :#@'` `@:::;;@ @;;;;;;;;::;;;;;;;;;;;;;;;;;;;;;;@ ++;;;;@ @;;;;;@ '+;;;@ @;;;;;;;;:@ @:@ ''''''';''''' ````.....,.,:,,@ @,;';;';'';:..`....@ `@#';+@' @':;;;@ @;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;:@` ,@;;;;@ ++;;;;@ @;:;;@ @;;;;;;;;:@ @;@@@@@@@@@ @@@@@@@@';''''';''''' .```.,..,,,,:,;@ @..,;';'''',..`...#; @;;;;;;@: .@:::;@ @;;;;:;;;;;;;;:;';;:;;;;;;;;;;;;;#' @:;:'+ `@;;;'# @;;;;@ @;;;;;;;;:@ @;;;;;;;;:@ @;;;;;;;;'''''''''''; ..`..::,:,,,';+@ @....:';;''..``...@ @+:;;;;;;@ @:;;:@ @;;;;;;;;;;;;;;;;;'::;::;;:;;;;;;;@ @;;:@, @:;;#: .@;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;';;''';'''''''''''' ,,,,:::'+;::+#+@ @`....:''';..``..:@ @,,,,:;;;@: +';;;@ @:;;;;;;;;;;;;;';''::;:;:::;;;;;;;@ #';;@ @;:;@ ++:;;;@ @;;;;;;:::@ @;;;;;;;;;@ @;';;'';;;''''''''''' ;::;;'++++++#++@ @``....:'';..``..+: ;#,.,,.,:;'# ,#;;;@ @::';;;;;;;;;;;':'';::;;;;::::;;;;@. :#::@ '#;:@ @;;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;''''''''''' ######+++'++#++@ @```.`..:';..``..@` @,......,;;@ @;;;@ @;;;;;:;;;;;;;';:'';;;';;;;;;;;;;;+' @;'# `@;;@ @;;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;';;;'''''''''; '''+#+++++##+#+@ @```..`..;;..``..@ @`.......::@ @;;;@ @:;;;;;;;;;;;;';;';;;;';;;;;;;;:;;;@ @;#, @;#; ,#:;;;;@ @;;;;;;;;:@ @;;;;;;;;;@ @;;;;;;';;;'''''''''' '';'+#####+++++@ @.```.``..:..`.`.@ @.......,.,@ @:;;@ @;;';;;;;;;';;';;'';;'';;;;;';:;::;@ @'@ @;@ #';;;;;@ @;;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;';';;''''' ''';;'+###+#++;@ @..```.`.....`.`.@ @.....,..,:@ @;;;@ @;;;'';;;;;;;:.:;';';'';;;;';:;;:;;@, :#@ '+@ @;;;;;;@ @;;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;;;;''''' ''''';;'++#+++,@ @...``..`....`.`.@ @...,,,,;;;@ @;;;@ @;';;';;;:...,;::';'''';;;'';:;;:;;'+ `@# : `@@ @;;;:;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;;'';'''' '''''''''++++';@ @....``..`...`.`.@ @.,,,.,,.,;@ @;;;@ @''';';;:.``.,;;,;;;;;;;;'';;:;:;;::@ @: # @; :#;;;;;;@ @:;;;:;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;'''''''' '''''''''+++'''@ @,....``.`...`.`.@ @,,......,.@ @;;;@ @;';:;;;.``...:,,;;;;;';''';;;;:;;:;@ @ ,@ @` @';;;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;''';;''; ''''''''''++'';@ @::...``.`...`.`.@ @........,,@ @;;;@ @:;:,:';:::..,..`.:;;;;'''';;;:;;;;:@, ; #@ ' @::;;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;''';;;;; +++''''''+#+'',@ @.;;...`.....`...@ @........,.@ @;;'@ @:,,,:;;;':.:..`.`.;;;'''';;';;;;'';+# ` @#: ` `@:;::;;;@ @;;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;';;;;;;' +++++'''''#+'',@ @.`;;,.`..`......@ @..........@ @;;;@ @::,..,;;';';..`...;;'''';;';;;;;;';;@ @'# ;#:;;;;;:@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;'''';;;;;'' '''+++''''#+'+,@ @...,:...........@ @..........@ @;;;@ @,;,..,;;'''+:,::::';'''';';;;;;:;;;'@ ,@:@ @;;;;;;;:@ @:;:;;;;;;@ @;;;;;;;;;@ @;;;;;;;;''''';';;;'' +';''+++''#+'+,@ @...``..........,@. @:,.,,..,,:@ ,#;;;@ @:,..:;;;'';+;;';;;;;'';;;';;';;;;;;;#: ++;@ @;;;::;;;@ @:;;;;;;;;# @;;;;;;;;;@ @;'';;;;'''''';';;''; ++''''++++##'+;@ @`....`...,..,..,+' :#,,,..,,,+; #+;;;@ @,,.`.;;;'';';;;;;;;;;;;;'';;'';;;;'''# @;;#: `@;;:;;;;;@ @;;;;;;;;'+ @;;;;;;;;;@ @;';;;;;''''''''''';; ++++''''++##+'+@ @``....`..,,.,,,:,@ @,..,,,,,@` @;;;;@ @,.,::';;;'''';'';';;;;;;;'';;;;';;'';@ @;;'# '+;;;;;;;;@ @;;;;;;;;#' @;;;;;;;;;@ @;;;;;;''''''''';;;'; ''#++''''+#++''@ @.``...``.,,..:...@ +#,,,,,.'# .@;;;;@ @;.,;';;;;';;;:;;;';;;;;;;'';';;;;;;''@` .@;;;@ @:;;;;;;;;@` @';;;''''@` @;;;;;;;''@ @;;';;';''';''''';';, +'+++++';'##++'@ @@@@@@@@@@@@@@@##.++ @+,...'@` #+;;;;@ @@@@@@@@@@@@@@@@;:';;;;;;'';;';;;;;;';#; '+;;;@ @;;;:;;;;;#, .@';;;;'@' @;;;;;;;;'@ @;'';;'''''''';''':,, +'''++++''+#++'@ @::@ #@@@@#` `@';;;;@ @:;;;;;;;;'';;';;;;;;'';@ @;;;;#: .@;;;;;;;;;++ .@@@@@@, @;;;;;;;;;@ @;'';;''''''''''';,;: #++''++++'+##;,@ @;:++ @+'';;;@ @;;;;;;;;;';;;;;;;;;;;';@ @;;;;;@ ++;;;;;;;;;;@ :#;;;;;;'';@ @;''';''''''''''''':: +##++++'+'++;,.@ @:,,@. ;@;';;;;@ @;;;;;;;;;';';;;';;;;;';@` `@;;;;;@ @;;;;;;;;;;;@ @';;;;;;;;;@ @'';';'''''';'''''';; +++####+''+':,.@ @,:.,@ `@';'';;;@ @'';;;;;;';'';;;;';;;;;;#' '#;;;;;@ @;;;;;;;;;';++ `@+;;;;;;;;;@ @'';;'''''''''''''''; '++++++##+++:.,@ @::,.'@ @+';'';;;@ @;;';;;;;;;;;;:;;;:;;;;;;@ @';;;;;#; :#;;;;;;;;;;;;@. @+'+;;;''';;@ @'';;''';'''';''''''; +++++++###+++;,@ @,:,,;+@ `@+'''';;;;@ @;';;;;;';';;;;;;;::;;;;:@ @;;;;;;'@ #';;;;;;;;;;;;'@` +@;;'';;;;';;@ @;'';''';;''''''''''; +++++++++++###'@ @.;,:',;@` .@+';;';;;;;@ @''';;'';;;;;;;;;;;;;;;;;@. `@;;;;:;;@ @;;;;;;;;;;;;;;+@` +@;;;;';''';;;@ @;'';''';;'''';';'''; +''''++++++###+@ @::.,::.:@' +@''''''';;;;@ @;;;;'';;;;;;;;;;;;;;;;;:+' ;#;;;;;;;@` @;;;;;;;;;;;;;;;'@; @#;;;;;'':;;'''@ @:'';'';;;''''';;'''; ''+'''''+++##'+@ @;:,,::,;;#@: ;@#''''''''''';@ @:;;;;;;;;;';;;;;;;;;;;;:;@ @';;;;;;;#; ;#;;;;;;;;;;;;;;;;;@@: `+@+,;;;:;;'';';';@ @;;;;;';;;;'''';;;''; +''''''++++##'+# `@:;::':;;;;;#@#, ,#@@''''''''''''';@` #;:;;;;;;;;;;;;;;;;;;;;;;;@ `@;;;;;;;;'# @';;;;;;';;;;;;;;';''@@#:` `'@@#;;,;;;::;:'+''''@` `@;;;;;;';;'';''';;''; '''''''+#+++#'+@@@@@@@@@@@@@@@@@@@@@@@@@@@@@;:;;;',;:;;:;,'#@@@@@@@@@@#:,;'''''''''''''''@@@@@@@@@@@@@@@@@@@@@@@@@@@@#:;;;:;;;;;;;;;;;;;;;;;;;;+@@@@@@@@@@@+;;;;;;;;;#@@@@@@@@@@#;;;;;;';;'';;;;;;';';;'#@@@@@@@@@@@@#+':';:::;:,:';+'';;'@@@@@@@@@@@@;;;;;;;';;'';;;';;;;; '''''''+#++++'#+''+++#+''+,...```....,..:'''''';';;;:,:'':;,;:,..........,;''''''''''''''':,.::;;::;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;:;;;;;;;;'''++++'';:;';;:;;;''';;;;';''';:;;::;;::;''+;;;;;;;;;;;;;;;;;;;;;;;;;;';;;';;;;;; '''''''++++++'#++'++#++''.....``......`.:';;'+';;::';::+''':,,,..```.......:;'''''''';'';,..,:,:;,:.:;;;;;;;';;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;'';''';;';;;;;;;;;;;;;;;;;;;;;;;;;;;;+';;#;:''#':;;:;;:;+;''''''';';;':';::;;:::;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;';;;; ''''''++#++#+'#++'''+++:.....`......``..;,`.,;+';::+',,'++;......``````.....:''''''''''';,,;:.:.,.,:,,;;;;;'';;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;'';;;'';;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;++''+;+#';+;::''::::;'''''''';;';':';::;;;::;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; ''''''++#++#+'#++'''+'.............``...``..`,+''''+',';'',:::,,.............:'''''';;;';;;;.,:.,,.;:,,;;;;';;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;';;'';;;;;;:;;;;;;;;:;;;;;;;;;;;;';#++'+;;#+;:;''''';;;''''''''';';;';';;,;;;,::;;'';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;';; ", "after_revision": "Stuart Ryan is running for the Communist Party in the Ontario provincial election in Ottawa Centre. Wikinews interviewed him regarding his values, his experience, and his campaign. Interview Why have you chosen to involve yourself in the political process? Why did you choose to run in this constituency? I have been involved in the political process for over 40 years, in terms of organizing over political issues such as opposing the Wars in Vietnam and now the wars in Iraq and Afghanistan. I see the elections, if that is what you mean as the political process, as a way to express our political views to the electorate so that they can pass judgement and see that the various issues we raise are related in that the capitalist system and the neo-liberal agenda take away the rights of workers, woman, aboriginals and people in general. I run in Ottawa Centre because I have lived in the riding since 1979 and I know the issues that concern the people who live in the riding. It has a progressive history and is open to socialist ideas. What prior political experience do you have? What skills and insight can you bring to office, from other non-political positions you may have held? I have run for office in my Steelworker union in Windsor in the 1970s and in my Autoworker union now. I work for a CUPE union at Carleton University in Ottawa. I think I can bring my organizing skills in the labour movement, the anti-war movement and in the Central American solidarity movement to Queen\u2019s Park and in building a base within Ottawa Centre to fight for a people\u2019s agenda. Which of your competitors do you expect to pose the biggest challenge to your candidacy? Why? What makes you the most desirable of all candidates running in the riding? I think the biggest challenge to my candidacy is the feeling that people feel they have to vote NDP in order to win the riding, or to prevent a victory by the Liberal or Conservative party. This is a product of the first-past-the-post-voting system. I have had many people say that our ideas are good, and that I have been a good campaigner, but because they feel voting for the Communist Party might jeopardise the NDP. I think I would be the most desirable candidate because we have the best policies and that I would work very hard to make sure they are pushed for in the legislature. What do you feel are the three most important issues to voters in your riding? Are these the same top three issues that are most important to you? What would you do to address these issues? The three biggest issues in this riding are the crisis in public education; the increasing debtload of students because of tuition hikes; and the inability of municipal government to fund the social services downloaded by the Harris government form the province to the cities in 1997. They are my most important issues. Re public education: Our Party will commit to spending $20 billion for a quality public secular school system in French and English for primary and secondary education. We would commit to a comparable investment in public post-secondary education while reducing tuition by 50\\% now, and then eliminate it when the funding is adequate to provide the education for all who qualify for post-secondary education. We would give municipalities secure funding through provincial grants and the ability to tax corporations. This would wean them off the property tax, which we would reduce by 75\\%, along with the scrapping of the market value assessment taxation scheme. We would give 50\\% of the gas tax for mass transit such as the O-train in Ottawa that would travel both east and west and north and south. We would upload to the province the funding of health, education, transit and welfare. What should be the first order of business in the 39th Legislative Assembly? The first order of business schould be the drafting of the legislation to implement Mixed Member Proportional Representation, following its victory in the October 10 referendum. Are the property taxes in your riding at a fair level for the amount of services received in the municipality? The property tax situation in the province is in chaos. Home owners are seeing property taxes increase as the value in their neighbourhoods go up while the property tax of businesses are diminished by a comparable amount. The net increase in revenue to the municipality coming from the residential tax increases is zero. Outraged taxpayers are blaming the municipal officials and are taking it out by voting for right-wing candidates who promise not to raise taxes (In Ottawa the slogan was \u201czero means zero\u201d. The same candidate is now the mayor, and is backing a two per cent increase and campaigning to have the municipal financing system revamped. The property tax system discriminates against tenants as they pay for the extra taxes landlords pay through higher rents. How can the province lead the way in stimulating job creation? The province should take action to save the manufacturing jobs leaving the province by insisting that raw materials be processed in Ontario rather being shipped raw out of the country. It should pass legislation to establish public tribunals so that corporations who are closing profitable factories, such as Hershey\u2019s in Smith Falls and GM in Oshawa would have to justify their closing. Failure to do so would lead to the province taking over the closed business. Our Party would invest in mass transit and produce 100,000 units of social housing. What are your views on the mixed member proportional representation (MMP) referendum? I support MMP and will be voting for it. No longer will we have to choose between the lesser of two evils, and end up with the same mess. The last two governments in Ontario are proof positive of the problem. You will be able to vote for what you believe in and see it relected in the legislature. Of the decisions made by Ontario's 38th Legislative Assembly, which was the most beneficial to your this electoral district? To the province as a whole? Which was least beneficial, or even harmful, to your this riding? To the province as a whole? The only thing that was good for Ottawa Centre was the tuition freeze for two years. That was negated by the new tuition scheme that will raise tuition 25-35\\% over four years. You are running as a candidate for the Communist Party. A lot of people say that Communism is a dead idea or fear that a Communist government would implement some sort of repressive dictatorship. What do you say to this? Communism is not a dead idea; we see revolutionary parties win in Venezuela and trying to bring socialism in by democratic means. This was tried in Chile in the 1970s but was overthrown by the CIA and the Chilean military. What will succeed is that the working class and its allies will demand socialism; it was the insistence of the Venezuelan people that stopped the coup against Hugo Chavez in 2002. The system that they will bring will be democratic, as it will be the will of the people that it be so. The Communist Party is unlikely to win any seats in the election. Why did you decide to run for a small party rather than be involved with one of the major parties? This is a good question, but if you want to bring about real change, you must be part of a party that calls for it. Our Party calls for socialism, public ownership of the means of production under democratic control. Working for a party like the NDP and the Greens would make you feel that you might get things done, but those parties will disappoint you - look at the record of the Bob Rae NDP government in Ontario that opened public sector collective agreements to attack benefits in order to save $2 billion from its deficit. External links Stuart Ryan YouTube Election statement Communist Party, official site Elections Ontario Category:North America Category:Canada Category:Ontario Category:Ottawa, Ontario Category:Politics and conflicts Category:Elections Category:Elections in Canada Category:2007 Ontario provincial e", "edit_actions": [{"type": "R", "before": ",,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ............................................................................................... , ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ................................................................................................ , ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ................................................................................................ , ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ................................................................................................ , ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ................................................................................................ , ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ................................................................................................. , ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ................................................................................................. , ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::;:::,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::; ;;;:::::;;:,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ................................................................................................ ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,: ;;::;;;;;;;;;;;;:;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. ................................................................................................ , ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;;;:,:;;;;;;;;;;;;;';;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................................................................. ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;::,,:;;''''''''';;;;;';;:;::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,....................................................``........................................... ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;;:,:;'+++'''++'''';'';;:;;:::;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................................````........................................... ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;;;:;'+++'''++';++';;;::;;;;;'';:;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................................````........................................... ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;+;:'+++'''''';;;;;;''''''::;':;'::,;;,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................`````........................................... ,,,,,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,;+':;+++''';;;;;'''+;++'''+'';:'';::,:,:;,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................................`````........................................... ,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,:+':;'''+';;;'+'++'+'++'''''+'''':;'';::,:,;:,,,,,,,,,,,,,,,,,:::::::,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,........................................................``....................................... ,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,:''::'''';;''++++'''''++++##+++''+';::;'''';:,::,,,,,,::::;;;;;;;;;;;;;;;;;;;:;:::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,......................................................``....................................... ,,,.......,,,,,,,,,,,,,,,,,,,,,,,''::'''';:;'''';'+'++#########+++'';;:::'''':,,:::,::;;;:::::::::::;;;;::;;;;;;;;;;;;;;;;::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.,.....................................................`....................................... ,,.........,,,,,,,,,,,,,,,,,,,,;+::;'';;;'+'''+''+#++###':::::'###+'';;:;:'';:;'''+'::,,,:::;;;;;;;;;;;;:::::::::;;;;;;;;;;;;::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....................................................``...................................... ...........,,,,,,,,,,,,,,,,,,;+;:''';:;'+'''''''+@##++',,,,,,,,;+##++'';';':;''';:,,,:::;;;;;;::::::::::::::::::::::::::;;;;;;;;::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..................................`..............````..................................... ...........,,,,,,,,,,,,,,,,:'+:;'';;;'''''''''+#@+++:,,,,,,,,,,,,,'##+++';;''';;:,:::;;;;;;;;;;::::::::::::::::::::::::::::::;;;;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..................................`````.........```````................................... ...........,,,,,,,,,,,,,,,''':'';;;''''''''+++@#+':,,,,,,,,,,,,,,,,'#+++''+';:::;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::;;;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................`````........```````.................................... ...........,,,,,,,,,,,,,:''::';;;;''''''+''#@+;,,,,,,,,,,,,,,,,:,,,:#+++++;:,:;;;::::;;;;;;;;;;;::::::::::::::::::::::::::::::::::;;;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................................``````...`````````...................................... ...........,,,,,,,,,,,,:+:::;;;;'''''''#+'@+,,,,,,,,,,,,,,,,,,,,,,,,'#+#':::;;;;;:::::::;;;;;;:::::::::::::::::::::::::::::::::::::::;;;;,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................````````````````````..................................... ...........,,,,,,,,,,,;+:;;'';''''''''+++#:,,,,,,,,,,,,,,,,,,,,,,,,,,#+;::::;;;;::::::::::;;;::::::::::::::::::::::::::::::::::::::::::;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................````````````````````..................................... ...........,,,,,,,,:';::''''+;'';''''+'#;.,,,,,,,,,,,,,,,,,,,,,,,,,,;+;,:::;;;:::::::::::;;:::::::::::::::::::::::::::::::::::::::::::::;:;;,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................................````````````````````..................................... ...........,,,,,,,,',,:,'+;'''''''''+'#;,,,,,,,,,,,,,,,,,,,,,,,,,,,,+:,:::;;;;:::::::::::;:::::::::::::::::::::::::::::::::::::::::::::::;;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...............................``````````````````........................................ ...........,,,,,,,:':';:;''+'''''''''+,,,,,,,,,,,,,,,,,,,,,,,,,,,:,;::::::::;:::;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...............................``````````````````........................................ ...........,,,,,,,:++;':;;++''''+''++,,,,,,,,,,,,,,,,,,,,,,,,,,,,,;::::::::;:::;;:::;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..............................``````````````````......................................... ..........,,,,,,,,:++;'+;;+''''''+'+,,,,,,,,,,,,,,,,,,,,,,,,,,,,,;:::::;:;;;;;:;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.............................``````````````````.......................................... ..........,,,,,,,,,++;+++;''+'''++':,,,,,,,,,,,,,,,,,,,,,,,,,,,,;:::::;;;;;;:::;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;:,,,,,,,,,,,,,,,..,,,,,,,,,,,,,...........................```````````````````........................................... ..........,,,,,,,,,'#'++#';'+'''+':,,,,,,,,,,,,,,,,,,,,,,,,,,,,;:::::;;;;:::;:::;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;:,,,,,,,,,,,,,.....,,,,,,,,,,,,,.......................```````````````````............................................ ..........,,,,,,,,,'#''++#:;++'+';.,,,,,,,,,,,,,,,,,,,,,,,,,,,;::::::::;;::;;::;;::::::::::::::::::::::::::::::::::::::::::::::::::::,,::::::::::::::;:,,,,,,,,.........,,,,,,,,,,,,,.......................`````````````````.............................................. ...........,,,,,,,,;#+'++#':++'+',,,,,,,,,,,,,,,,,,,,,,,,,,,,:;,:::::::::;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::,::,,,,,,,:::::::::::::::,,.,...........,,,,,,,,,,,,,......................`````````````````............................................... ............,,,,,,,:#+;++#+:#+'',,,,,,,,,,,,,,,,,,,,,,,,,,,,:;:::::::::;;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,::::::::::::::,.,...........,,,,,,,,,,,,................````..`````````````````................................................ ............,,,,,,,,##;#+##:##+;,,,,,,,,,,,,,,,,,,,,,,,,,,,:;::::::::::;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,::::::::::::,.,,........,................,.........````````````````````````................................................. ............,,,,,,,,+#'#+##;+##,,,,,,,,,,,,,,,,,,,,,,,,,,,:;,:::::::::;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,:::::::::::,.......,.............................```````````````````````.................................................. ..............,,,,,.:#+'+##''#',,,,,,,,,,,,,,,,,,,,,,,,,,:':::::::::::;;;;;;;;;;;::::::::::::::::::::::::::::::::,:::::::::::::::,,,,,,,,,,,,,,,,,,::::::::::,,.....,,............................`````````````````````.`................................................,, ................,.,,.##''##+;@:,,,,,,,,,,,,,,,,,,,,,,,,,:;;:::::::;;:;;;;;;;;;;;::::::::::::::::::::::::::::::::,,,::::::::::::::,,,,,,,,,,,,,,,,,,,,,::::::::,....,,............................`````````````````````.................................................,.,, ..................,,.'#+:;#';@;,,,,,,,,,,,,,,,,,,,,,,,,,;;:::::;;;;;;;;;;;;;;;::;:::::::::::::::::::::::::::::::,,,,:::::::::::,,,,,,,,,,,,,,,,,,,,,,,,::::::::,.,.,..............................``````..``````````..................................................,,,,, .................,,,,,##;:'''@;,,,,,,,,,,,,,,,,,,,,,,,,;':::::;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::,,,:::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,::::::::,.,...............................``````..``````...................................................,.,,,,,, ..................,,..'#'::;##,,,,,,,,,,,,,,,,,,,,,,,,:;:::::;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::,:::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::,,,..............................`````....````.................................................,,,,,,,,,,, ....................,,,##'+#@'..,,,,,,,,,,,,,,,,,,,,,,;;:::::;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::,...............................````......................................................,,,,,,,,,,,,,,, .......................:#@#@#,,.,,,,,,,,,,,,,,,,,,,,.;'::::::;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::,.............................```.......................................................,,,,,,,,,,,,,,,, ......................,.,'++,.,.,,,,,,,,,,,,,,,,,,,,,';:;:::;;;;;;;;;;;;;;;;:::::;:::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::,..............................`.......................................................,,,,,,,,,,,,,,,,, ......................,.,....,..,,,,,,,,,,,,,,,,,,,,;'::;::;;;;;;;;;;;;;;;;:;::;;;:::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::,....................................................................................,,,,,,,,,,,,,,,,,, .......................,...,.,,,,,,,,,,,,,,,,,,,,,,,';:;;:;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::,,:::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::,..................................................................................,,,,,,,,,,,,,,,,,,, ...................................,,,,,,,,,,,,,,,,;';;;;;;;;;;;;;;;;;;;;;;;;;;::;;;::::::::::::::::::::::::::::::::::::,,,::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::...................................................................................,,,.,,,,,,,,,,,,,, ...................................,,,,,,,,,,,,,,,,'';;;;;;;;;;;;;;;;;;;;;;;;;;:;;;:::::::::::::::::::::::::::::::::::::,,,,::,,,,,,,,,,,,,,,,,,,,,,,,..,,,,,,,::::::::..................................................................................,,,,,,,,,,,,,,,,,, ...................................,,,,,,,,,,,,,,,:';;;;;;;;;;;;;;;;;;;;;;;;;;;:;;:::::::::::::::::::::::::::::::::::::,,,,,::,,,,,,,,,,,,,,,,,,,,,,,,....,,,,,,:::::::,.................................................................................,,,,,,,,,,,,,,,,,, ....................................,,,,,...,,,,,,;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,:::,,,,,,,,,,,,,,,,,,,,,,,.....,,,,,::::::::,................................................................................,,,,,,,,,,,,,,,,,, .....................................,.,.,..,,,,,.''';;;;;;;;;;;';;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::,,,,,,,,,,,,::,,,,,,,,,,,,,,,,,,,,,,......,,,,,::::::::,..............................................................................,,,,,,,,,,,,,,,,,,, .................................,,.....,...,,,,,,'';;;;;;;;;;;';;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,......,,,,,:::::::::.............................................................................,,,,,,,,,,,,,,,,,,,, ...............................................,.;'';;;;;;;;;;;';;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::,,,::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,......,,,,,,::::::::,...........................................................................,,,,,,,,,,,,,,,,,,,,, ...............................................,.'''''';;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::,::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,........,,,,:::::::::,............................................................,...........,,,,,,,,,,,,,,,,,,,,,,, ................................................,'''''';;;;;;';;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::,::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..,,....,,,,::::::::::........................................................................,,,,,,,,,,,,,,,,,,,,,,, ................................................,'''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....,,,::::::::::::....................................................................,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................:'''''''';;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.,,,,....,,,,,,::::::::::,....................................................................,,,,,,,,,,,,,,,,,,,,,,,,, ................................................;'''''''';;;;;;;;;;;';';;;;;;;;;;;;::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....,,,,,::::::::::...........................................................,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................;''''''';;;;;;';;;;;;';;;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,:,,,:,,,,,,,,,,,,,,,,,,,,,.......,,,,:::::::;:,.........................................................,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................''''''';';;;;;;;;;;;'';;;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,.......,,,::::::::::,........................................................,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................''''''''''';;;;;;;;;''';;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,.....,,,,::::::::::::........................................................,..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................'''''';''''';;;;;;;;''';;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,....,,,,,,:::::::::::,......................................................,..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................''';'''''''';;;;'';;''';;;;;;;;;;;;;:;::::::::::::::::::::,,,,:,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....,,,,,,:::::::::;:.......................................................,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................''''''''''';;;;''';;''';;;;;;;;;;;;;;;:::::::::::::::::::::,,,,,,,,,,,,,:,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.......,,,,:::::::::;;,......................................................,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................'''''';''';;;;;''';;''';;;;;;;;;;;;;;;;;;:::::::::::::::::::,,,,,,,,,,,,:::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.......,,,,,::::::::;::.....................................................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................;''''';;';;;;;;;;;;'''';;;;;;;;;;;;;;;;;;;:::::::::::::::::::,,,,,,:::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....,,,,,,,,:::::;:;;;,......................................,,............,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................:''''';;;;;;;;;;;;;;'''';;;;;;;;;;;;;;;;;;;::::::::::::::::::,,,,:::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...,,,,,,,,,,::::::::;;:...................................,,.......,,,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................,'''''';'';;;;;;;;;;'''';;;;;;;;;;;;;;;;;;::::::::::::::::::,,::,:::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.,,,,,,,,,,,,,:::::::;;;...........................................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................,+''''';;';;;;;;;;;;;'''';;;;;;;;;;;;;;;;:::::::::::::::::::,::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,........,,,,,,:::::::;;;:..........................................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................'''''';''';';;;;;;;;;''';;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.........,,,,,::::::::;;:....................................,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................;'''''''''';;''';;;;;;''';;'';;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,..........,,,,:::::::;;;,..................................,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................:+'''';''';;''''';;;;;''';;'';;;;;;;;;;;;;:::::;;;:::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...........,,,:::::::;;;:..................................,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................,+''''''';;;''''';;;;;''';;';;;;;;;;;;;;;;;;::;;;;;;::::::::::::::::::::::::::,::,,,,,,::,,,,,,,,,,,,,,,,,,....,,,....,,,,::::::;;;;,.................................,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................;'''''';;;;;'';;;;;;;'''';'';;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::,,,,,,,,,,::,,,,,,,,,,,,,,,,,,,.....,,,,::::::;;;;,.................................,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................:''''''';';;;;;';;;;;''''';'';;;;;;;;;;;;;;;;;;;;:;:::::::::::,::::::::::::::::::::,,,,,,:,:,,,,,,,,,,,,,,,,,,,,,,...,,,,,:::::;;;;:.........,,,,....................,,,,,,,,,,,,,,,,,,,,,,,,,,.,,,,,,,,,,,,,,,,,,,,,,,,, ................................................,,.''';''';''''';';;;;'''''';';;;;;;;;;;;;;;;;::::::::::::::::::::::,:::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,...,.,,,,,::::::;;;;,.......,,,,,....................,,,,,,,,,,,,,,,,,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................,.:+'''''';''';;'';;''''''''';;;;;;;;;;;;;;;;::::::::::::::::::::::,:::::::::::::::::,,,,,,,,:::,,,,,,,,,,,,,.........,,,,,::::::;;;;:.....,,,,,,,....................,,,,,,,,,,,,,,,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................,,;''''''''';'''';;;'''''''';;;;;;;;;;;;;;;:::::::::::::::::::::,:::::::::::::::::::,,,,,,,,::::,,,,,,,,,,...........,,,,,::::::;;;;:,,,,,,,,,,,,....................,,,,,,,,,,,,,,,,,,,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................,,,''+'''''''''''';;;;'''''';;;;;;;;;;;;;;:::;;::::::::::::::::::::::::::::::::::::::,,,,,,,:::::,,,,,,,,,,...........,,,,,:::::;;;;;,...,...........................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................,,.:''+''''';'''''';;;''''''';;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::,,,,,,,::::::,,,,,,,,.............,,,,:::::;;;;;,...,...........................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...................................................,,.:+'''''''''''''';'''''''';;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::,,,,,,,,,:::::,,,,,,,....,...,,,,,,,,,,::::;;;;;:...............................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .....................................................,,;'++'''''''''''''''''''''';;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,:,,,,,,,,..,....,,,,,,,,,,::::;;;;;;............,..................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .....................................................,,,'+++''''''''''''''''''''';;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,......,,,.,,,,,,:::::;;;;;,,...........,,....,,,,,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ......................................................,.:+++++'''''''''''''''''''';;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,:,,,,,,,,,.......,,,,,,,,,:::::;;;;;,............,,,..,,,,,,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .......................................................,,:+'+++''''''''''''''''''';;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,:::,,,,,,,,,........,,,,,,,:::::;;;;;,...........,,,,,,,,,,,,.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..........................................................:'+++'''''''';''''''''''';;;;;;;;;;;;::::::;::::::::::::::::::::::::::::::::::::,,::,,,,:::::::,,,,,,.......,,,,,:,,:::::;;;;;:...........,,.,,,,,,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .........................................................,.,'+'+++'''''''''''';;';;;;;;;;;;;;;;;;::;;::::::::::::::::::::::::::::::::::::::::,,:::::::::::::,,,.......,,,,,::,::::::;;;;:........,,,,,,,,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ........................................................,.,..:'+++'''';''''''';;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::,,:::::::::::::::,,,,..,,,,,,,:::::::::::;;;:,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ............................................................,.,;+++''''''''''';;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,:::::::::::::;;;,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .........................................................,..,.,,:'++''''''''''';;;''';;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,::::::::::::::;;;,.......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,.:+'+'''''''''';;;'''';;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,:::::,:::::::::;;;:,.........,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..............................................................,,,.;++''''''''''';;;''';;;;;;;;;;;;;;;:::::::::::::::::::,:::::::::::::::::::::::::::::::::::::::::::::::::::::,:::::::;;;:..........,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,,,.;++'''''''''';;;;'';;;;;;;;;;;;;;;:::::::::::::::::::,:::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,::::::::;;;:.,........,,,,,,,,,,,,,,,,,,,,,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................................................................,,++'''''''''';;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,::::::::;;;,,,.......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................................,..+'+'''''''''';;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,:::::::;;;,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,...,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................................,..''+'''''''''';;;;;;;;;;;;;;;;;::;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,::::::;;;,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ....................................................................''''''''''''';;;;;;;;;;;;;;;;:::;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,::::::::,,:::::;;;:,,,,,,,..........,..,,,,,,,,,,.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ....................................................................'''''''''''''';;;;;;;;;;;;;;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::,,,,,,,,,:::::::::::;;;:.,,,,,,..,......,...,,,,,,,,,,,..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................................,.,,''''+''''''''''';;;;;;;;;;;;;;;;:;::::;:::::::::::::::::::::::::::::::::::::;;;;::::::::::::,,,,,,,,,,,,,,::::,:::;;;;:,,,,,................,,,,,,,.,,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...................................................................:''''+''''''''''';;;;;;;;;;;;;;::::::::;::::::::::::::::::::::::::::::::::::;;;::;:::::::::,,,,,,,,,,,,,,,,,:::::::;:;;:,,,,,................,,,,,,,,,,,,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...................................................................;'''''''''''''''';;;;;;;;;;;;;;::;;;:;;;;::::::::::::::::::::::::::::::::;;;:::::::::::::,,,,,,,,,,,,,,,,,,,,:::;;:;:;;;,,,,,................,,,,,,,.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................................,.,''''''''''''''''';;;;;;;;;;;;;;::;;;;;;;;::::::::::::::::::::::::::;;;;;;;;;:;:::::,,,::::,,,,,,,,,,,,,,,,,,,,::;;;;:;;;,,,,,....,,,,........,,,,,,......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,..:''''''+''''''''''';;;;;;;;;;;;;;;;;;;;;;:;;::::::::::::::::::::::;;;;;;:;:;;:;:::,,,,,,::::;:::::::,,,,,,,.,,,:::;;;;;;;,,,,,,,..............,,,,................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,,,;'''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::;;;;;;;:;;;;;;::,,,,,,:;::::;::::::::::,,,.,,,,,::;;;;;;,,,,,,,...............,,,..................,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .................................................................;''';;''''''''''''''';;;;;;;;;;;;;;;;;;;;;;::::::::::;;:::::::;;;;;;;;;:;;;:::::,,,,,,:::;;;;;;:;;;;;;;;;::::,.,,,,::;;;;;:,,,,,,,.......................................,,.....,,,,,,,,,,,,,,,,,,,,,,,,,, ................................................................:'''';;'''';'''''''''';;;;;;;;;;;;;;;;;;;;;;;:;;:::::;;:::::::;;;;;;;;;;;;;::::::,,:::;;;;;;;;;;'''';;'''';;:;::,,,,,:::;;;:,,,,,,,,................................................,,,,,,,,,,,,,,,,,,,,,,, ...............................................................,''''';''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;::;:::;;;;;;;;;;;;;;;;;::::::::::;;;;;;;;'''''''+++''''''''';;;:,.,,:::;;;,,,,,,,,....,,,............................................,,,,,,,,,,,,,,,,,,,, .............................................................,,'''';;';'''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;:::::::;;::;;;;;'''''';;;'''';;;:::;'''';;;,,,,,:;;;,,,,,,,,,,,,,,,.............................................,,,,,,,,,,,,,,,,,,, ..............................................................;''';';';;''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;::;;;;;;'''''';;;;;;;;;;;:,,,,,:;''+'';,,,,,,;;:,,,,,,,,,,,,,,...................................................,,,,,,,,,,,,, .............................................................;'';;;''';;'''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;;;;;;;;;;;;''''++';;:::::,:;;:......,,;''+''':,,,,:;:,,,,,,,,,,,,,,.....................................................,,,,,,,,,,, ..........................................................,.;'';;;''';;'''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;;;';''+'+'';;::,,....::,........,:'''++';,,.,:;,,,,,,,...............................................................,.,,,,,, ...........................................................:';;;;;''';;''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::;;;;;';''++''''';;:,.......,,..........,;;::;+';,,,,;:,,,,,,...........................................................,...,...,,,, ..........................................................,';;';;''';;';'''';''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;:;::::;;;;;;';'+'''';;;';,......`...,...........;,...:+'':,,:;,,,,,........................................................................ .........................................................,;;;;;;;'';;;;;;;;;'''';'''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;::::::;;;'''''++''';::::;,,......`...:........```;,...`;'+':,,;;,,,......................................................................... ......................``................................,;;;;;;;;';;;;;;'';;;;;;;;;'';'';;;;;;;;;;;;;;;;;;;;;;;;;::;::::;;;;;;::::;;;;;;;''''''';:,,,,,::.`.....``.`:.........``;,..`.:;''':::;.,.......................................................................... ....................````................................;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;:;;;::::::;;;;::::;;;;';'''''''';:,....,:;.......``..:.........``;....`;.:;''::',........................................................................... ...................``````..............................;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;;:::::::;;:::::;;;';''+'';;;'':,...`..,;.....``....;,......````',...`;`..''',;:........................................................................... ..................```````.............................;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::;:::::;;;'''++'';:::;',....`..,',.....``.,:;,.....`````+,..``;```;:';:;........................................................................... ................````.................................;;;;;;;;;;;;;;;;;;;;;::::::::::;;;;;;;;;;;;;;:;;::;;;;:::::;::::::::::::;;;;''+++';;:,,.,;........:#':......,;+++:.....`.`.+:.```;``.',:';;........................................................................... ................```................................,;;;;;;;;;;;;;;;;;;;:::::::::::::::::::;;;;;:::::::::::::::::::::::::::;;;;;;''++;:;;:,...:;,,....`,+++++'''+'+++++#+++'''++#+',```;`.`'`:++;........................................................................... .............```````````````......................,;;;;;;;;;;;;;;;;;;;:::,,,:::::::::::::::::::::::::::::::::::::::::::::;;;'';'++;:::::,....,+',....;+++##+##+++++++++++++++++++#++#+#;``;`:'':........................................................................... ............````````````````.....................:';;;;;;;;;;;;;;;;;:::,,,,,,,,,::::::::::::::::::::::::::::::::::::::::;;;';;'++'::,,:;,....:#++##########+####++++++++++++#+++######++,,;`;'',........................................................................... .............``````````````````.................:';;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,::::::::::::::::::::::::::::::::::;;;'';'++';',,..:;:,,,:+#+##+++++++#++++++##+++#+++++++++++++''+#+''+.'':............................................................................ .............```````````````````...............;';;;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,::::::::::::::::::::::::::::::::;;;'''''+';:;'...`:''''++++++++++++++#++++++++++++++++++++++++++++++'++'+:,............................................................................ .............`````````````````````............';;;;;;;;;;;;;;;;;;;:::,,,.,,,,,,,,,,,,,,,::::,:::::::::::::::::::::;;;;''++++';::;+....;++++++++++++#+++++++++++++++++++++++++++++++++++++++#+..........................................................`...`............... .............```````````````````````.........;;;;;;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,,,,,,::::::::::::::::::::::::;;;;'''+++'':,,,;#',:'+++++++++++++++##++++++++''+++++++++++++++++++++++++;;;.........................................................`..``................ ........`````````````````````````````.......';;;;;;;;;;;;;;;;;;;;;::,,,,,,,,,,,,,,,,,,,,,,,::::::::::::::;::::;;;;;''++++';':,,,'+'+++++++++++++++++++++++++'+'''''''++++''+++++++++++++++'::......................................................``.`.,,.``.............. .......`````````````````````````````.......';;;;;;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,,,,,,,,,:::::::::::::;::::;;;;;;''+++';;;+';:;+++++++++++''''''''++++++++''''++'''''+'';;;'+++++++++++++;:,.....................................................````...,.``.............. ....```````````````````````````````.......';;;;;;;;;;;;;;;;;;;;;;:::,,,,,,,,,,,,,,,,,,,,,,::,:::::::::::::;;;;;;''++++;::;++++++++++++++''''''''''';;'+++'''++''''''';';;'';;'++#+++++++++;:,.....................................................````.....````............ .....`````````````````````````````.......;';;;;;;;;;;;;;;;;;;;;;;;::,,,,,,,::::,,,,,,,,,,::::::::::::::;;;;;;;'''++++''++#+++++++++++++''''''''';;;;;;;'+++++++''';;;;:::;;;,;;'++++++'+++;:,.....................................................````...,.`````........... ...```````````````````````````````......:';;;;;;;;;;;;;;;;;;;;;;;:::,,::::::::::,,:,,,,,,,:::::::::::;;;;;;;'''+++++++++++++++++++++''''+'''''';;;;;;;;;;''+'''';;;;::::::::;,;;;+:;++++''',;....................................................``````.`..`````........... ...```````````````````````````````..`..:';;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::,::::::::::::;;;;;;;;''+++#++++++++++++++'''''''''''''''';;;;;;:::;;;;++''';:;::::::::::::;;+';'+#''+:'...................................................```````.``.`````........... ...````````````````````````````````...,';;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::::::::::::;;;;;;'''++++++++++++++++'''''''''''''''''';;;;;;::,,,::;;'++'';;:::::::::::::;;++,.:+;';;...................................................```````. `.``````.......... ...`````````````````````````````.``..,';;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;;:::::::::::::::::::::;;;;;'''+#+++++++++++++''''''''''''';;''';;;;;;;;:::::::::;;;'+'';:::,:,::::::,::;'.,..;;;;,.................................................```````..`..```````....```.. ...``````````````````````````````.`..';;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;:::::::::::::::::::;;;;;;''+##+++++++++++++''+'''''''''''''';;;;;;;:;;:::::,:,,::;;''';;::,:,,,:::::,.;;+':,,`.,:,..............................................`````````.....```````````````` ...```````````````````````````````..;';;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;:::;::::::::::::;;;;;;''''+##++++++++++++'''''''''''''''''''';';;;::;;:::,:,,:::,::;''';;:,,,:::::::::::::;':..::;..............................................`````````.....```````````````` ...``````````````````````````````.`:';;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;::::::::'';;:;;;;;;;::;;;;;;;''''+#+++++++++++++#++++'''''''''''';;;''''';;;;:;;::,,:,:::::::;;'';:::::::::::::,:::,;+;:` .,...........................................```````````.....```````````````` ..````````````````````````````````:';;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;::::::::::'';;;;;;;;;;;;;;;'''''+#++'''+++++++++++++++''''''''''''''';;;;'';;;;;:::::,:::::::::;;';;:::::::::;;;:::.,;';, `.,..........................................````````````.....```````````````` ..```````````````````````````````.'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::'+;;';';;'';''''''+##+++:....,++''++++++++++'+''''''''''''';;;;;;;;;;::::::::::::::::;;;;;::::::::::::,,,:;++``.,,.....................................`````````````````.....```````````````` ..```````````````````````````.```;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;++'';''''''''+###+';';,.....:;....'+++++++++++'''''''''''';;;;;;;;;;:::::::::::::::::;;;;::::::::::,,,,;:'+,,:,,....................................``````````````````.....```````````````` ..``````````````````````````````,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;::::;'+++++####++++''';;;:,,,.,',.....;+'::'+++++++'''''''''';;;;;;;;;;;;;;;:::::::::::::;;;::::::::,,,,:::'+,`,;:;,..................................```````````````````...,,.``````````````` ..``````````````````````````.```'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;::::::;;'+'';:,,::;''+'':,,,,,',,....:+....,+++++++'''''''''';;;;;;;;;;;;;;;;;;;;;;:::::;;::::::::,,,,,:;'', `;:;',..............................``````````````````````...,,.``````````````` ```````````````````````````````,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::;;;:::::::::::::,,,,::;;'';::;',,,..,:'.....;+;;''++++'''';;';;;;:;;;;;;;;;;;;;;;;;::::::::;:::::,,,,::;+';```.:;;;;,.........................``````````````````````````..,,,.``````````````` ```````````````````````````````;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;:::::::;;;;;;;;;;;:::::::,,,,,:;''';::,.,,;'.....:;,...:'+++''';'';';;;;:;;:::::::::;;:::::::::::::,,,,,::;'':``,`..:;;:;;.........................``````````````````````````,.,,,.`````````````.. ``````````````````````````````,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;:::::::;;;;;;;;;;;;;:;;::::,,,,:'';::,,,;;....,::....,:++++++''''''';;;;;;::::,,,,,,:::::::,,,,,,::,,:;'':` ``:.`.:;;::;,............``````````````````````````````````````,..,,.``````````..... ``````````````````````````````;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;;;;;::;;;;;;::;::::::'';:::';,...,::..`..,;....:''''''''';;;;;;::::,,,,,,,,,,,,,,,::,::;;'':` `.:,..;'::;;:...........```````````````````````````````````````,.,,,.``````....,,,,, ```````````````````````````.`,'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;:::;'':;':,...,;:..`..,'..````:'''+'''';;;;;;:::::::::::::::::::::;'':,,:```..:,..''::::;..`.....``````````````````````````````````````````,,,,,.````...,,,,,,,, `````````````````````````````;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::;:;;;''''::...,;:,.`..,'.......:+':,`.,:;'';;;;:::::::::::::;;;;;';,``` :.....::.,''::::;,.......``````````````````````````````````````````,,,,,.`...,,,,,,,,,,, ````````````````````````````.';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;:;;;'+':,..,;:,``..,;.````...;.```````,''';;;;;;;;;;;;';;;:;'':` ```:,....::.:'':::;;:`.....```````````````````````````````````````````.,,,,,.,,,,,,,,,,,,,, ````````````````````````````;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::;:;:;'+':,:;:,``.,::.`````..:........,:+':....:'+''';.`````,',`````.,,....:;,:'':::;::`....````````````````````````````````````````````.,,,,,,,,,,,,,,,,,,,, ``````````````````````````.`';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::;;;;''';;:,`..,;,.`````..:...```...:':` `` ``.'++```````.;,`````.,:,...:','';:::;;;..``````````````````````````````````````````.``...,,,,,,,,,,,,,,,,,,,, ```````````````````````````:;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;:;'+':,...,',.`````..;...`````.,;,..``````.';``````..:,`````..:,..,:';++::::;;;..``````````````````````````````````````.......,,,,,,,,,,,,,,,,,,,,,,, ```````````````````````````';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;;::::::::::::;'+';,..,'...````..;...`````.,'..........;,........:,````...;,.,,;'+'',::;::;.`.`````````````````````````````````..,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ````````````````````````.`,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;;;:;'+':,;',,...```.;...``````,'.`````....',`.......,:``.`.`.;..,,''+':::::::;.`.````````````````````````````````.,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,, ``````````````````````````;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;'';'';'';;;;;;;;;;;::::;;;:;;;;;::;++''',,......,:..```````,'.`````....',`.......,:``..``.;,..:++;,,,:;:::;...``````````````````````````````.,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,, `````````````````````````.';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;::;;;:;;;;;:;'++':,,.....::..```````,'.`````...`':`........:.`.....;,.,'+;,,,::;:::;.```````````````````````````````.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ````````````````````````.,';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;';;;;;;;';;;;;;;;;;;::::;::::;;;;::'++;,.....::...``````:'.`````.`.`;:`........:,``...,;:,''::,,,::;:::;.````````````````````````````..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ````````````````````````.:;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'';;;;;;;;;:::::::::;;;;:::;'+;,..,;;....`````:'.`````.`..;:`.......,::``...,;;'':,,,,,::;:::'``````````````````````````...,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,, `````````````````````````;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;::::::::::;:;::;'+;,:';.....````;'.`````.`..;;...```..,;;``.`.,+'::,,,,,::::::;:`````````````````````.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,, ````````````````````````.';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;::::::::::;;;;::'+'';.........;;,`..```...;;...```..,;'````,;;:,,,,,,:::::::'.``````````````````.....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .......`````````````````.';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;::;;;;::::::::::::::;;::;;';,.......;;.```````..;;,````..,::;,`.:;:,,,,,,,:::::::;'`.``````....,.......,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ............`````````...,;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;';;:::;:::::::::::::::::::;::;';,,,.,;;...````...;;:``.`.,:;:;;;';:,,,,,,,,:::::::';``````..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,, ........................:;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;::::::::::::::::;:;:::::;;';;;;:..`...,.,;;;,.,,,:;;;'+':,,,,,,,,:::;::::;',```..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,:,::::,,,,,, ........................;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;::::::::;:;:;;:;;''',.....,,;;;;;:::;;'+';:,,,,,,,,,:::::::::';`..,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,:::,,,,,,, ........................';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;::::;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::;:,,:::;:::;;;;;::;;;'';;;;;;;';;''+';:,,,,,,,,,,,:::::::::'',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,, ........................';;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;;;;;;;;;;;;;;;;;;;;;::;::;;;::;::::;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::,,::,,::::;;;;;;::;;;;''''++';:::,,,,,,,,,,,,:::::::::;':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, .......................,';;;';;;';;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;;;;;;:;:::;;;;::::::::;:;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::,,,,,::::::;;::;;;;;;;;:::::,,,,,,,,,,,,,,:::::::::;'',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, ..................,...,,';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;;;;:::;::;;;;;:;::::::;:;;;:;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::,,,,::,,,::,,,:;;::::;::,,,,,,,,,,,,,,,::::::::::;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,::: ..................,...:,';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;::;;:::;;::::::::;;:::;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::,,,:,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::;;''',:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::: ..................,,.,:,';;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;::;:;;;;:::::;;;::::;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::,,:::,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::;;'''',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::: ,.....,,..,...,...,:.:,,';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;:::;;;;;;:::::;;::::::;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,:::::::::::;'''''::,,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::::::::::: ,,,...,,,.,..,,,,,,:,:,:';;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;::;;;;;:;:::::::::::::::;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::,,,,,,,,,,:::::::::::::::;''''''':,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::::: ,,,...,,,.,.,,,,..,,::,:';;;;'''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;::;:::;;;;;:;;::::::::::::::::;;;;;;;;;;;;;;;';';;;;;;;;;;::::::::::::::::::::::::::::::::::::::::::;''''''''',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::::::: ,,,,.,:,,,,,,,,,,,,,::,:';;;;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;:;;:;:::::::;;;;;::::::::::::::::::;;;;;;;;;;;;;;;;;';';;;;;;;;;::::::::::::::::::::::::::::::::::::::;;''';'';;''',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::::::: ,:,,,,:,:,,,,:,,,,,,::,:';;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;;;;;;::;::::;;;::::::::::::::::::::;;;;;;;;;;;;;;';;;;;;;;''''';;;;:::::::::::::::::::::::::::::::::;''''''';;;;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::,:::::::::::::::::: ,:,,,,:,,,,,,::,,,,,::,:';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;;;;;;;;;::::;;;::::::::::::::::::::;;;;;;;;;;;;;;;;;;;;;;';;''''''';;;;:;;:::::::::::::::::::::;;;'''''''';;;;;;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::;::::::: ,:::,,:,:,:,:::,,,,,::,:';;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;;;;;;;;::::;;;;;:::::::::::::::::::;;:;;;;;;;;;;;;;;;;;;;'''''''''''''';;:::::::::::::::;;:;;''''''';;;;;;;;;;;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,:::::::::::::::::::::::: :::::::::::,:::,,,:,::::';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;:::::;;;;;;;;::::;;;;;;::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;'''''''''''''';;;;;;;;;;;;;;;;;'''''''';;;;;;;;;;;;;'':,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::::::::::::::;:::: ::::::::::::::::::::::::';;;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::;;;;;;;;;:::;;;;;;::::::::::::::::::::::::::;;;;;;;;;;;;;;;;'''''''''''''''''';;;;;;;;;'''''''';'';;;;;;;;;;;;;;'',,,,,,,,,,.,.,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,::::::::::::::::::::;:::: ::::::::::::::::::::::::'';;;'''';;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;;;;;;;;:::;;;;;;;::::::::::::::::::::::::::;;;;;;;;;;;;;;;''''''''';;''''';'''''''''''''''';;;;;;;;;;;;;;;;;;;'':,..........,,,,,,,,,,,,,,,,,,,,,,,,,:::,,::,,,,,,:::::::::::::::::::::::::: ::::::::::::::::::::::::';;;;'''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;;;;;;;;;:;;;;;;;;;:::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;''''';;;;;''''''''''''''''''';'';;;;;;;;::;;;;;;;''.....```....,....,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::::::::::::::::::::::: ::::::::::::::::::::::::'';;;'''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::;;;;;;;::::;;;;;;;:::::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;;;;;;;;;;';'''''''''''''';;;;;;;:;;;;;:::;;;;;;'',`........,.....,,,,,,,,,,,,,,,,,,,,,::::::,,::::::::::::::::::::::::::;:::: ::;::::::;::::::::::::::'';;'';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::;;;;;;:::::;;;;;;::::::::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;''''''';;;;;;;;:::::;;;:::::;;;'';,,,,,....,,.,,,.......,,,,,,,,,,,,::,::::::::::::::::::::::::::::::::::;:::: ::;::::::;::::::::::::::'';;'';'';;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;:::::;;;;;;:::::::::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::;::::::;;;'';:::::,,,,,,,,,,,,,,,..........,,,,,,::::::::::::::::::::::::::::::::::;::::: ::;;:;:::;;:::::::;:::::;';''';';;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;:::::::::::::::::::::::::::::::::::::;::;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::;;;''::,,,,,,,,,,,,,,,,,,,,,,,,..........,,,,::::::::::::::::::::::::::::::::::::: :::;;;;::;;:::::::;::::;;'';''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::;;;;;;:::::::::::::::::::::::::::::::::::::::::;;:;;;;;::;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::;;;;'':::,,,,,,,,,,,,,,,,,,,,,,,,,..,,..,.....,,,,,::::::::::::::::::::::::::;;:::: :;:;;;;;;:;;;;:::;;;:;:;;'';''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;:;;::::;;;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;;;;;;;;;;;;;;;;:::::::::::::::::::;;;;'',,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,........,,,,::::::::::::::::::::::;:::: :::;;;;;;:;;;;:::;;;:;:;;';''''';;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;;;;;;;;;:::::;;;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::;::;;;;;;;;;:;:::::::::::::::::::::;;;;;';,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::,,,,...........,,,,:::::::::::::::;;:::: :::;;;;;;::;;;;::;;;:::;;''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;;;;;;::::::::;;;:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;;;;;::::::::::::::::::::::;;;;;';,:,,,,,,,,,,,,,,,,:::::::::::,::::::::::::::,,,,..........,,,,:::::::::;;;::: ;::;;;;;;;;;;;;;:;;;:::;;'';'''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;:;;;;;;:::::;:::;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;::::::::::::::::::::::::::;;;;';':::::,,,,,,,,,,,,,,,,,,::::::::::::::::::::::::::::,,.......,,:::::::::;::;::: ;:;;:;;;;;;;;;;:::;;;;:;;;';'''''';;;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;:::::::::;:;::::;;::::::::::::::::::::::::::::::::::::::::::::::::::::::;;;:::::::::::::::::::::::::;;;;;;';:::,:,,,,,,,,,:,,,:::::::::::::::::::::::::::::::,,,.....,,:::::::::::::::;::: ;:;;:;;;;;:;:;::::;;;;:;:;''''''';;;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;;;;::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::;::::::::::::::::::::::::::;;;;;;';::,:,::,:,,,,::::::::::::::::::::::::::::,,,,.........,:::::::::::::::::::;;:; ;:;;:;;::;;;::::::;;;;:::;'''''''''';;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;;;;;::;::::::::::::::::::::::::::::::::::::::::::,::::::::::::::::::::::::::::::::::::::::;;;;;;';:::,,::::::,,:::::::::::::::::::::::,,,...........,,,::::::::::::::::::::::;:: ::;::;;;:;;;::::::;;:::::;'';''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::;;;;::::::::::::::;;;;;;;;;::::::::::::::::::::::::::::::::::::::,,,,,::::::::::::::::::,,,,:::::::::::::::::;;;;;''::,:,:::::::,::::::::::::::::::,,,......`......,,,:::::::::::::::::::::::::;::: ;:;:::;;::;;:::::::::::::;''''''''''';;;;';;;;;;;;;;;;;;;;;;;;;;;;:;:::::;:;;;::::::::::::;;:;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,::::::::::::::,,,,,,,,,,,,::::::::::;;;;;'':::::,:,::::::::::::::::::,,.............,,,,:::::::::::::::::::::::::::::::::; ::;::::::::;:::::::::::::;;';'''''''';;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;:::;:;;;;:::::::::::;;;;;;;;;:::::::::::::::::::::::::::::::::::,,,,,,,,,,,,:::::::::::::,,,,,,,,,,,,,:::::::::;;;;;';::::::::,,::::::::::,,,...........,.,,,,::::::::::::::::::::::::::::::::::::::: :;::::;:::;:::::;:;::::::;;';'''''''';;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;:::::::::::;;;;;;;;;:;::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,::::::::::,,,,,,,,,,,,,,,:::::::::;;;;'';:::,::::::::,,,,,,................,,,,::::::::::::::::::::::::::::::::::::::::: :;:::::;::;:::::;::;:::;;;;'';''''''';';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;;;;;:::;;;:::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,::::::::,,,,,,,,,,,,,,,,:::::::::;;;;'';:::,:,:::::,,,..............,..,,,,,:,::::::::,:::::::::::::::::::::::::::,:::, ::;::::;::;::;::;:::;::;;;:'';'''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;:::::::::::::;:;::::::;:::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,:::::::,,,,,,,,,,,,,,,,::::::::;;;';''::::,,:::::::,,,..........,,,,,,,,,,,,,::::::::::::::::::::::::::,:::::::::::::, ::;::;:;:::::;::::::;::;;::;'''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;;::::::;::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,::::::,,,,,,,,,,,,,,,,:::::::::;;'''';,,,:,:::::::::,,,,,,,,,.,,,,,,,,:,,,,,,,,,:::,:::::::::,,::::::::::::::::::::::, ::;::;;;;:;;::::::::;;;;;;;;'';''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::;;;:::::;::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,::::,,,,,,,,,,,,,,,,,::::::::;;;'''';,,::,,:::,,,::::,,,,,,,,,,,,,,,,,,,,,,,,,::::,,::,,,,:::::::::,,::;;:::::::,::,, ;:;::;:;;:;;::.,::;:;;;;;;;:'';''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;;;;::::;::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,::::::::;;;''''':::,:,::,,,,,,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:;;,;:,::::::::::, ;;;;;:;:;;:;::,,..;::;;;;;:;;';'';'''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;;;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::::::;;;;''''':::,,,:,,:,,,:,,:,,,,,,,,,,,,,,,,,,,,,,,,....,.,,,,,,,,,,,,,,,,,,:::,,,,,:::::::: ;;;;;:;;:;::..,,,::::;;;;;;;;''''';''';'';;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;;;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,:,,,,,,,,,,,::::::::;;;;;'''';,::,:,,:,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.....................:;......,,,,,,,, :;;;;::;::;..,,,,..::;;;;;;;;;'''';''';'';'''';;;;;;;;;;;;;;;;;;;;;;;;;;;::;;;;;:::::::::::;;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,,::,,,,,,,,,,:::::::;;;;;;'''';,:,:::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,.................:;,............. ;;;;;;::;:;:;,,,.:,:;;;;;;;;;;''''''''';;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,,,,,,,::::,,,,,,,,::::::::;;;;;''''':::,::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,....::,............. ;;;;;;::::;;;,:,.::::';;;;;;;;''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::;;;;::;:::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,,:,,::::::::,,,,,::::::::;;;;;''''';:::::::::,,,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...,;:....``....... ;;;;;::,,::;;;;:,::::;;;;;;;;;;+''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;::::::::::::;;;;::;:::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,:::::::::::::,,,::::::::;;;;;'''''';:::::::::::::,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,:::,......,:;...````````.. :;;;:,,,,,::;;;;;;::.,;;;;;;;;:''''''''';''''';;;;;;';;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::;;;;;;;:::::::::::::::::::::::::::::::::,,,,,,,,,,,,,,,:::::::::::::,::::::::::;;;;;'''''':::;::::::::::,,,:,,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,...........::,..````````.. :;;;;;,.:.,:;:;;;;::.`,,.:;;;;;'+''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;::::::::::::::;;;;;;;::::::::::::::::::::::::::::::::::,,,,,,,,,,,,::::::::::::::::::::::::::;;;;''''''':::;:::::::::,::::,:,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,................:::..`.```..`.` ;;;;;::.::,;;;;:;,,:,...,:;;;;;;+;'+''''''''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::;::::;;;;;::;:::::::::::::::::::::::::::::::::::::,,,,,,,,:::::::::::::::::::::::::::;;;''''''';::;::::;::::::::,:,,,,,,:,::,,,,,,,,,,,,,,,,,,,,....................:::......``.`.. ;;;;;;;:;:;;;;;::```,,,:,.,;;;;;++'''''''''''''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::;:::::;;;::;::::::::::::::::::::::::::::::::::::,,,,,,,,:::::::::::::::::::::::::::;;;;''''''':::;:::;:::::,::,:,,:,,:::::::::,,,,,,,,:,,,,........................,::.......`.`.` ;:;;;;;;;;;;;;;;:.`,:.,,,.,;;;;;;+'''+'''''';''';'';;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;:;::::;;:::;;;;::;;::::::::::::::::::::::::::::::::::::,,,,,,,::::::::::::::::::::::::::;;;;;'''''''::;':::;::;;:::::,::,,,,,,:,:::::,,,,:,,,..................`````.....:::....```.`... ;;;;;;;;;;;;;;;;;;::``,`.;;;;;;;;+'''+'''''';'''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;;;;;;;::;:::::::::::::::;::::::::::::::::::,:::::::::::::::::::::::::::::;;;;;;;''''''';;;';:;;:;;;::::::::,,,,:::,:::::,,,,....................``````......:::...`````.,., :;;;;;;;;;;;;;;;;;;...;`..;;;;;;;'+'+'''''''';;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;;;;;;;:;;::::::::::::::;;;;:::::::::::::::::,,:::::::::::::::::::::::::;;;;;;;'''''''';;;;;;;;;;;:;:,:::,:,:,:::::,:,,,,..............`...`.````````......,::,...`....,,,, ;;;;;';;;;'';;;;;;;:,;';,:;;;;;;;;++'''''''''''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::::;;;;;;;;;;;;;;;;:::::::::::;:;;;;;;;::::::::::::::::::::::::::::::::::::::::;;;;;;';''''''+;'';;;;';;;;;;:,;:::::::::,,,,,,,...............``.````.`.``````.....,::::.....,,,,,,, ;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;+'+''+'''''''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::;;;;;;;;;;;;;;;;;:::::::::::;:;;;;;;;:::::::::::::::::::::::::::::::::::::::;;;;;;;''''''''+;'';;;;;;;:;;;:;;:::::,,,,,,,..................````````.`.``````....,:::;,...,,,,,,,,, ;;;;;;;';;;;;;;;;;;;;;;';;;;:;;;;;;'''';''''+'''';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;;;;;;;;;;;;;;;;;;:::::::::::;;;;;;;;;;:::::::::::::::::::::::::::::::::::::;;;;;;;''''';''+';'''';;:;::;;::;;::,:,,,,,................````````````..`.`````....,::::::.,,,,,,,,,,, ;;;;;;;;;';;;;;;;;;';';'';;;;;;;;;;;''+;''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;:;;;:;::::::::::::;;;;;;;;;:;;;:::::::::::::::::::::::::::::::;;;;;;;;;'''''''++'''''';;;;:;;;:;;::;::,.:...............````````````..``,..``.`.`...:::::,,,,,,,,,,,,., ;;;;;;;;;;;;;;;;;;;;'';;;;;;;;;;;;;;';+;+'''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;;;;;;;:;;;;::;;;:;::::::::::::;;;;;;;;::;;;::::::::::::::::::::::::::::::;;;;;;;;;''''''''+'''';;;;;;;;;;;;;;:::::.:,,,,..........``````````.```..``,..``.``...,::::,,.,,,,,,,,,,.. ;;;;;;;;;;;;;;'''';;;'';';;;::;;;;;;;;';+''+'''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;;::::;;;;;:::::::::;;;;;;;;;;;;;;;;;;::::::::::::::::::::::::;;;;;;;;;''''''''''+';;;;;;;;;;;;;;;;;;;;:;:,:..:........`````````````..``..``,,..,,....,.;::,,,.,,,,,,,,,... ;;;;;;;;;;;;;;;;''';;';;;;;;;;;;;;;;;;';+;'''''''';''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::;:::::;;;;;::::;;;;;;;;;;;;;;;;;;;;;;;:::::::::::::::::::::::;;;;;;;;;;'''''''''++';;;;;;;;;;;;;;;;;;;;:;:;,.::.....````````````````..``....,,.,,`.,,.,,::,,,,.,,,,,,,,,,,, ;:;;;;;;;;;;;;;;;;'';;;;';;;;;;;;;;'';;'';'++'+''''''''';;;;;;;;;;;;'';;;;;;;;;;;:;;;;;;;;;;;;;;;;::::;;;;:::;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::::::::;;;;;;;;;;'''''''''++''';;;;;;;;;;;;;;;;;;;;;:;,:;:.,:.````````.``.``````..``.,.,,,,..,,.,,,,:,,::,,,,,,,,,,,:: :;;;;;;;;;;;;:;;;;;;;;'''''''';;;';'';;;;;+''++'''''''''';;;;;;;;;;''';;;'';;;;;::;;;;;;;;;;;;;;;;:::;;;;;;;:;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::::;::::;;;;;;;;;;'''''''''++';;;;;;;;;;;;;;;;;;;;;;;;;;;;;:,:,```````..```.``````....,,.,,,,.:,,,,,,,:,,,:,,,,,,,,,,,,, :;;;;;;;;;;;;:;;';;;';''';;;;'';;';;;;;';;+'+++''''''''';;;;;;';;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::::::;:::;;;;;;;;'''''''''''++';''';;;;;;;;;;;;;;;;;;;;;;;;;;,,;,````````````.``..`.`,,.,,.,,,,,,,,,,,,,:.,,,,,,,,,,,,,:,, ;;:;;;;;;;;;;::;';;;;;;';'';;;;;;';;';;;''''+++'''''''''''';;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::::::::;;:;;;;;;;;;''''''''''''++''+'';;;;;;;;;;;;;;;;;;;;;;;;;;;,::``,`.`.,`.```,```...`.,,,,,,,,,,,,,,,,,,:,,,,:,,,,,,,::::: ;;:;;;;;:;;;;;:;;;;;;;;;;;;;;;;;;;'''';'''''+++;''''''''''';;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:::::;:;;:;:;;;;;;;''''''''''++++''''''';';;;;;;;;;;;;;;;;;;;;;;::::.,,...`:`.```.``..,.,,,,,,,,,,,,,,,,,,,,,,,::;:::::::::::: ::;;;;:;:;;;;::;;;;;;;;;;;;;;;;;;;;;'+';';'''+';''+''''''''';''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::::;;;;;;;;;;;;;;'''''''''''+++++''''';;''';;;;;;;;;;;;;::;;;;;;;;:::...,.;.````.`.,.,,..,,,,,,,,,,,,,,,,,,,:,::::::::::::::: ::;;;:;;::;;;::;;;;;;;;;;;;;;;;;;;'';;';''';''';'+''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';''''''''''+++++''''''''''';;;;;;;;;;;;;;;;;;;;;;:::;,,,::`;.``....`..,,,,,,,,.,,,,,,,,,,::,::,:::::,,:::::::: ::;::;;;::;;;;::;;;;;;;;;;;;;;;;;'';;'''''''''';;+'+';''''''''''';;;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'''''''''''+++++'''''''''''';;;;;;;;;;;;;;;;::::;;;;;;::;;:,;,``:..,`,,,,,,,,,,,,,::,:,,,:::::::,::::,,:,:::::: ::;::;;;::;;;;;:::;;;;;;;;;;;';;;';;';;'''';;'+;;+++;;';''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;':;;;;;;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'''''''''''''++++'+'+'''''';';;;;;;;;';';;;,..,:,;:;;;;;;:;;;:;:,.;`,:.,,,,,,,,,,,:,:::,,::,:::::::::,,,,:::::::: ::;::;;:;;;;:;;::;;;;;;;;;;;;;;;;;;;;''''''';'';;''+;;''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'''''''''''''++'+'''''''''''''';;;;;;;;;;;;:,,,,,:,,:;:;;;;;;';:;;.;,,,,,:,,,,,,,,:,,,,:,,,,,,:::::::::::::::::::: ;:::::;;:;;:;;::;;;;:;;;;;:';:;;';;;'';'';;';;'';;'';;+++''''''''''''';;'''';;;;;;;;;;;;';;;;;';;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'''''''''''''++++++''''''''''''''';;;;;;;;;;;;;;:..,,,,:;;;;;;;';:;;;::,,:,;,,,,,:::::::,,,,,,,,:::::::::::::::::::: ;:::::;::;;;;:;:;;;;;;;;;;:;;:;;';;;''';;;;;';;';;;;;;++'''''''''''''''''''''';;';;;;;;;;'';;';';;;;;;;''';';';';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;''';;;;'''''''''''+++++++++'''+'''''''''';;;;;;;;;;;;;;;;..,.:.::;;;:;::';,';';;,:;,;,,:,:;:::;,:::::::::::::,::::::::::::::: ;:::;;;::;;:;:;;;;;;;;;;;;;;':;;';''''''';;'';;';;;;:'+;+'''''''';;'''''''''''''''';;;;;;;''';;;;;;';';'''''';''';;;;;;;;;;;;;;;;'';;;;;;;;;'''''';;'''''''''++++++++''''''''''''''';';;;;;;;;;;';';;;;,;:,;::;:.,:::,:':;;';;:;;:;:,;,;;:::;:::::::::,:::,,::::::::::::::: :;;::;::;;,.,:;;;;;;:;;;;;;:':;;''''';;'';;';;;;;;';;';'+''++''''';;'''''''''''''''''';;;''''';;'''''''''''';;'''';;;;;;;;;;;;;;;;;;';;''''''''''''''''''++++++++++''''''''''''';''''';;;;;;;;;;;;';;;;;;;;;;;,.,..,,,;;;;;';',;;:;:,';':;::':::;:,,,:::::::::::::::::::::: ;;;::;;::,...::;;;;;;;;;;;;;;;;;;';;;;;'''';;;;;;:';;;;+';;;'+++'';;'''''''''''''''';''';'''''';'''''''''''';'''''''''''';;';;;;;;'';'''''''''''''''''++++++++++''''''''''''';'';'''''''';;;;;;;;;'';;;;;;;;;;::,.:.:,:;;;;';':';;';:''::;:;':::;:::::::::::::::::::::::::: :;;;;;;::....,;:,:;;;;;;;:;';;;;;';;;;;;'''';;;;';;';;;;:;;;;'+'++';;''''''''''''''';'''';''''';''''';'''''''''''''''''''''''''''''''''''''''''''''''+++++++++'''''''''''''''';';'''''';;;;;;;;;;;;;';;;;;;;;;;;,,',:;;;;;;;;;;';;';;''::':;':::':::;;::::::::::::::::::::: .:;;:;;:,....,;..,;;;;;;;;:'';'';;;;;;;;;'''';;;';;';;;;'';';;'';++;:'+'';;''''''''';'''''''''';;'''';''''';;'''''''''''''''''''''''''''''''''''+''+++++++'+'''''''''''''''''';;;;''''';;;;;;;;;;;;;;;;;;;;;;;;;::;;;;;;;;;;;;;'''';'';;:':;'::;;:::;;::::::::::;:::::::::: ..:;,,::.....,:...;;::;;;';;;;'';;;;;;;;;;''';;;'';;;;;;+';+;;;';;+;;;+'';;'''';;;'':';''''';'';;''''''''''';''''''''''''''''''''''''''''''''+++++++++++++'''''''''''';''''''';;;;;''';;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;'''';'';;;';;'::';:::;;:::;:::::::::;;:::;:: .`.:,,,,.....,,,..,...;;;;;';''';;;;;;;;;;''';;;'';';;;;;';'';;;;;;'';'';;;;+''';;;':'';'+''''';;''';'''''''''''''''';''''''''+++''+''+'+++++++++++++'''+''';'''''''''''''''''';;;''';;;;;;;;;;;;;;;:;;;;;;;;;;;;;''';;;;;;;;;;;'';''';;;';;'::';;;;;;::;;;:;;:::::::;;:::: .`..,,,......,,,......;;:,:';';';;;;;;;;;;;;;;;''';;;;;;;;;;;;;;;;;';;;;;;;;'';;;;;':;';;''''';;;;'';''';;';'''''''''';''+''++''+;++'+++++++++++++++'+++'''';''''''''''''''''''';;;';;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;';''';;;;';;';;';;;;:;::';::;;:;;:::;::;;;; ,...`.,,......,,......,....;';:;;;;'';;;;;;;;;;;'';;;;;;;;;;;;;;;;;;;;;;;;;;;;;';';':;'';;;;;+:';;+';;;';';;''++'''+++;;++;;++''+;++;++++;++++++++++'''''''';''''''''''''''''''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;'';';;;';'';;'';'':;:;;;:';::;;::::::::;; .,.....,......,,...........;:..,:;';;;;;;;';;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::';:;;;;'';;;+';';;;+;'+++'''++++;;++;;++;'';'';'+';'++++++'++'';;''''';''''''''''''''';'''';;;;;;;;;;;;;;;:;;;;;;::::;::;;;;;;;;;;;;;;;;;;;;'';';;'';'';'''''':':;;:;';::;;;::::::;;: .,,....,,....,,,....`............,:;;;;;;;';';;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;::';;;;;;'+;;:+';';;;';+++''''++++;;;+;;'';'';'';+';;'++'+++++''';;;''';;';''';';;'''''';'''';;;;;;;;;;;;;;;;;;;;;;::::,,:;;;;;;;;;;;;;;';;;;''';';';';'';'';;'':';';;';';:';:::::::;;; ,..,....,....,,,.........`........:;;;;;;;;;;;;;';';;;;;;;;;';;;;;;;;;;;;;;::;;;;;;;;:;;;;;;;''';;;;;';;;;'''''''';;''+;;'';';;'';'';';;;'+'++''''''';;;''';';;'';;';;''''''''';;;;;;;;;;;;;;;;;;;;;;,::,,,,.,;;;;;;;;;'''';;;;;;;'';';;;';''''';;'';;;';;';';:';:;;::::;;; .,,.,,,.,,...,,,....`............,;;;;;;;;;;';;;''';;;;;;;;';';;;;;;;;;;:;;:::;;;;;;;:;::;;;:;;;;;;';;;;;;';'';;''';;;';;;;;;+;';;';'';;'++'''''';'''';;;';;';;''';';;;';'';;;;;;;;';;;;;;;';;;;;;;;:::.,,:,,,,;;;;;;;;;''';;''';;;';'';;';'''';;''';';';';;'':';:;;;;;;;;; ..,,,,,::::::::,...`...........,::,,,;;;;;;;;;;;''';;;;;;;;';;;;;;;;;:;;;;;;:::;;:;;::;::;;;:;;';::;'':;;';;';;;+'+';;;;;;;;;+;;;;';';;''+''''''';;''';;;;;;;;;'';;;;;;'''';;';;;';;;;;;;;;';;;::;;;'::,.....:;;;;;;';;;';'';;';;;'';';;;';;;''''''';';;;';;'';';:':;;;;;;; ..,,,::,,`..,,,,..........`...,......:;;;;;;;;;;;;;;;;;;;;;;++#@@@@#+';;;;;;;:::;;;;:::::::::::;::::;':;;;;;';;;;;;'+':;;:;;;;';;;'';;;;'';';;''';;;'';';;;:;;;;;;;;;;;''';;;'';;;:;;;::;;;;::::::;;;:::.,,:;:;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;';';;;;;;;;;'; ,,,,:...,.,,,,,@@@@@@@@@@@@@@........:;;;;;;;;;;;;;;;;;;;#@@#;,` `.;#@@#;:;;;:::;;;;:::#@@@@@@@@@@@@@@;;;;;;';;;;;;;'';;;;;;;;;;;;;;@@@@@@@@@@@@@;;'';';;'#@@@@@@@@@@@;''';;;;;#@@@@@@@@@@#;@@@@@@@@@@@@@@@;;;;;;';;@@@@@@@@@@@;@@@@@@@@@@@@@@@@@@@@@@@@@@@@@''';;';':;;'; ,,,:,,,,,.:::;,@ @.......:;;;';;;;;;;;;;;';;@@; ;@@;;;;::;:;;:::@ @;;:;;'';;;;';;;;;:;;;;;;;;;;;;@ ;#;;';';;;@ @;''';;;;;@ :#;@ @;';;;;;;;@ @;@ ;';;;';;':';; .,:,,,:,,;;::::@ @.,..,,,;;;;';;;;;;;;;;;'#@, ,@#:;;::::::::@ @;;;;;;;;;;;;;;;:;;;;;';;;;;;;;@ `@;;;;;;;'@ ++;'';;;;;@ #+;@ @;;;';;;;;@ @:@ ;';'';;'':';; .;,,::;::;:;,,,@ @...,,:;;;;;;';;;;;;;;;;@# +@;:::::;;::@ @;;;;;;;;;';;;;;;;:;;;';;;;;;;;#: @;;;;;;;#' .@'';;;;;'# @;;@ @;;;;;;;;;@ @:@ ;';'''''';';; .:,:;:;;;:::,,,@ @,:;;'';;;;;;';;;;;;;;;@: ,@;:;:::::;@ @;;;;;;;;;;;;;;;;;;::;';;;;;;;''# @;;;;;;;@. @''';;;;#, `@;;@ @;;;;;;;;;@ @:@ ;''''''';'';' ..::;,,.:;,.,,,@ @;'';'';;;;;';';;;;;;;@: .@::;:;;:;@ @:;;;;;;;;;;;;;;;;;;:;;;;;;;;;;:@ '+;;;;;;@ @;;;;;;;@ ;#;;@ @:;';;;;;;@ @:@ ;'''''''''';; .,:;;,,..;..,,,@ @;;';;;;;;;';;;;;;;;;@; ,@:::;;:;@ @;;;;;;;:;;;;;;;;;;;;:;;;;;;;;;;@ .@;;;;;;@ +#';;;;;@ @;;;@ @:;;;;;;;;@ @:@ ;''''''';';;' .:,,::......,,,@ @;;;;;;;;;;':....,:;## ;#,;;;:;@ @;;:;;;;:;;;;;;;;;;;;;:;;;;;;;;;#; @;;:;;++ .@;';;:'# @:;;@ @;;;;;;;;;@ @:@ ;''''''''';'' .,,:::.,....::,@ @;';;'';;;;;.......:@ @';;;;;@ @;;;;;;;:;;;;;;;;;;;;;:;;;;;;;;;'@ @;;;;;@. @;;;;:#: `@:;;@ @;;;;;;;;;@ @:@ ;'''''';'';'' ....::......::.@ @;'';''';';:..`....@, :#@'` `@:::;;@ @;;;;;;;;::;;;;;;;;;;;;;;;;;;;;;;@ ++;;;;@ @;;;;;@ '+;;;@ @;;;;;;;;:@ @:@ ''''''';''''' ````.....,.,:,,@ @,;';;';'';:..`....@ `@#';+@' @':;;;@ @;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;:@` ,@;;;;@ ++;;;;@ @;:;;@ @;;;;;;;;:@ @;@@@@@@@@@ @@@@@@@@';''''';''''' .```.,..,,,,:,;@ @..,;';'''',..`...#; @;;;;;;@: .@:::;@ @;;;;:;;;;;;;;:;';;:;;;;;;;;;;;;;#' @:;:'+ `@;;;'# @;;;;@ @;;;;;;;;:@ @;;;;;;;;:@ @;;;;;;;;'''''''''''; ..`..::,:,,,';+@ @....:';;''..``...@ @+:;;;;;;@ @:;;:@ @;;;;;;;;;;;;;;;;;'::;::;;:;;;;;;;@ @;;:@, @:;;#: .@;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;';;''';'''''''''''' ,,,,:::'+;::+#+@ @`....:''';..``..:@ @,,,,:;;;@: +';;;@ @:;;;;;;;;;;;;;';''::;:;:::;;;;;;;@ #';;@ @;:;@ ++:;;;@ @;;;;;;:::@ @;;;;;;;;;@ @;';;'';;;''''''''''' ;::;;'++++++#++@ @``....:'';..``..+: ;#,.,,.,:;'# ,#;;;@ @::';;;;;;;;;;;':'';::;;;;::::;;;;@. :#::@ '#;:@ @;;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;''''''''''' ######+++'++#++@ @```.`..:';..``..@` @,......,;;@ @;;;@ @;;;;;:;;;;;;;';:'';;;';;;;;;;;;;;+' @;'# `@;;@ @;;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;';;;'''''''''; '''+#+++++##+#+@ @```..`..;;..``..@ @`.......::@ @;;;@ @:;;;;;;;;;;;;';;';;;;';;;;;;;;:;;;@ @;#, @;#; ,#:;;;;@ @;;;;;;;;:@ @;;;;;;;;;@ @;;;;;;';;;'''''''''' '';'+#####+++++@ @.```.``..:..`.`.@ @.......,.,@ @:;;@ @;;';;;;;;;';;';;'';;'';;;;;';:;::;@ @'@ @;@ #';;;;;@ @;;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;';';;''''' ''';;'+###+#++;@ @..```.`.....`.`.@ @.....,..,:@ @;;;@ @;;;'';;;;;;;:.:;';';'';;;;';:;;:;;@, :#@ '+@ @;;;;;;@ @;;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;;;;''''' ''''';;'++#+++,@ @...``..`....`.`.@ @...,,,,;;;@ @;;;@ @;';;';;;:...,;::';'''';;;'';:;;:;;'+ `@# : `@@ @;;;:;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;;'';'''' '''''''''++++';@ @....``..`...`.`.@ @.,,,.,,.,;@ @;;;@ @''';';;:.``.,;;,;;;;;;;;'';;:;:;;::@ @: # @; :#;;;;;;@ @:;;;:;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;'''''''' '''''''''+++'''@ @,....``.`...`.`.@ @,,......,.@ @;;;@ @;';:;;;.``...:,,;;;;;';''';;;;:;;:;@ @ ,@ @` @';;;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;''';;''; ''''''''''++'';@ @::...``.`...`.`.@ @........,,@ @;;;@ @:;:,:';:::..,..`.:;;;;'''';;;:;;;;:@, ; #@ ' @::;;;;;@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;''';;;;; +++''''''+#+'',@ @.;;...`.....`...@ @........,.@ @;;'@ @:,,,:;;;':.:..`.`.;;;'''';;';;;;'';+# ` @#: ` `@:;::;;;@ @;;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;;;;';;;;;;' +++++'''''#+'',@ @.`;;,.`..`......@ @..........@ @;;;@ @::,..,;;';';..`...;;'''';;';;;;;;';;@ @'# ;#:;;;;;:@ @:;;;;;;;:@ @;;;;;;;;;@ @;;;;;;;;;'''';;;;;'' '''+++''''#+'+,@ @...,:...........@ @..........@ @;;;@ @,;,..,;;'''+:,::::';'''';';;;;;:;;;'@ ,@:@ @;;;;;;;:@ @:;:;;;;;;@ @;;;;;;;;;@ @;;;;;;;;''''';';;;'' +';''+++''#+'+,@ @...``..........,@. @:,.,,..,,:@ ,#;;;@ @:,..:;;;'';+;;';;;;;'';;;';;';;;;;;;#: ++;@ @;;;::;;;@ @:;;;;;;;;# @;;;;;;;;;@ @;'';;;;'''''';';;''; ++''''++++##'+;@ @`....`...,..,..,+' :#,,,..,,,+; #+;;;@ @,,.`.;;;'';';;;;;;;;;;;;'';;'';;;;'''# @;;#: `@;;:;;;;;@ @;;;;;;;;'+ @;;;;;;;;;@ @;';;;;;''''''''''';; ++++''''++##+'+@ @``....`..,,.,,,:,@ @,..,,,,,@` @;;;;@ @,.,::';;;'''';'';';;;;;;;'';;;;';;'';@ @;;'# '+;;;;;;;;@ @;;;;;;;;#' @;;;;;;;;;@ @;;;;;;''''''''';;;'; ''#++''''+#++''@ @.``...``.,,..:...@ +#,,,,,.'# .@;;;;@ @;.,;';;;;';;;:;;;';;;;;;;'';';;;;;;''@` .@;;;@ @:;;;;;;;;@` @';;;''''@` @;;;;;;;''@ @;;';;';''';''''';';, +'+++++';'##++'@ @@@@@@@@@@@@@@@##.++ @+,...'@` #+;;;;@ @@@@@@@@@@@@@@@@;:';;;;;;'';;';;;;;;';#; '+;;;@ @;;;:;;;;;#, .@';;;;'@' @;;;;;;;;'@ @;'';;'''''''';''':,, +'''++++''+#++'@ @::@ #@@@@#` `@';;;;@ @:;;;;;;;;'';;';;;;;;'';@ @;;;;#: .@;;;;;;;;;++ .@@@@@@, @;;;;;;;;;@ @;'';;''''''''''';,;: #++''++++'+##;,@ @;:++ @+'';;;@ @;;;;;;;;;';;;;;;;;;;;';@ @;;;;;@ ++;;;;;;;;;;@ :#;;;;;;'';@ @;''';''''''''''''':: +##++++'+'++;,.@ @:,,@. ;@;';;;;@ @;;;;;;;;;';';;;';;;;;';@` `@;;;;;@ @;;;;;;;;;;;@ @';;;;;;;;;@ @'';';'''''';'''''';; +++####+''+':,.@ @,:.,@ `@';'';;;@ @'';;;;;;';'';;;;';;;;;;#' '#;;;;;@ @;;;;;;;;;';++ `@+;;;;;;;;;@ @'';;'''''''''''''''; '++++++##+++:.,@ @::,.'@ @+';'';;;@ @;;';;;;;;;;;;:;;;:;;;;;;@ @';;;;;#; :#;;;;;;;;;;;;@. @+'+;;;''';;@ @'';;''';'''';''''''; +++++++###+++;,@ @,:,,;+@ `@+'''';;;;@ @;';;;;;';';;;;;;;::;;;;:@ @;;;;;;'@ #';;;;;;;;;;;;'@` +@;;'';;;;';;@ @;'';''';;''''''''''; +++++++++++###'@ @.;,:',;@` .@+';;';;;;;@ @''';;'';;;;;;;;;;;;;;;;;@. `@;;;;:;;@ @;;;;;;;;;;;;;;+@` +@;;;;';''';;;@ @;'';''';;'''';';'''; +''''++++++###+@ @::.,::.:@' +@''''''';;;;@ @;;;;'';;;;;;;;;;;;;;;;;:+' ;#;;;;;;;@` @;;;;;;;;;;;;;;;'@; @#;;;;;'':;;'''@ @:'';'';;;''''';;'''; ''+'''''+++##'+@ @;:,,::,;;#@: ;@#''''''''''';@ @:;;;;;;;;;';;;;;;;;;;;;:;@ @';;;;;;;#; ;#;;;;;;;;;;;;;;;;;@@: `+@+,;;;:;;'';';';@ @;;;;;';;;;'''';;;''; +''''''++++##'+# `@:;::':;;;;;#@#, ,#@@''''''''''''';@` #;:;;;;;;;;;;;;;;;;;;;;;;;@ `@;;;;;;;;'# @';;;;;;';;;;;;;;';''@@#:` `'@@#;;,;;;::;:'+''''@` `@;;;;;;';;'';''';;''; '''''''+#+++#'+@@@@@@@@@@@@@@@@@@@@@@@@@@@@@;:;;;',;:;;:;,'#@@@@@@@@@@#:,;'''''''''''''''@@@@@@@@@@@@@@@@@@@@@@@@@@@@#:;;;:;;;;;;;;;;;;;;;;;;;;+@@@@@@@@@@@+;;;;;;;;;#@@@@@@@@@@#;;;;;;';;'';;;;;;';';;'#@@@@@@@@@@@@#+':';:::;:,:';+'';;'@@@@@@@@@@@@;;;;;;;';;'';;;';;;;; '''''''+#++++'#+''+++#+''+,...```....,..:'''''';';;;:,:'':;,;:,..........,;''''''''''''''':,.::;;::;;;;;;;;;;;;;;;;;;;;:;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;:;:;;;;;;;;'''++++'';:;';;:;;;''';;;;';''';:;;::;;::;''+;;;;;;;;;;;;;;;;;;;;;;;;;;';;;';;;;;; '''''''++++++'#++'++#++''.....``......`.:';;'+';;::';::+''':,,,..```.......:;'''''''';'';,..,:,:;,:.:;;;;;;;';;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;;'';''';;';;;;;;;;;;;;;;;;;;;;;;;;;;;;+';;#;:''#':;;:;;:;+;''''''';';;':';::;;:::;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;';;;';;;; ''''''++#++#+'#++'''+++:.....`......``..;,`.,;+';::+',,'++;......``````.....:''''''''''';,,;:.:.,.,:,,;;;;;'';;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;'';;;'';;''';;;;;;;;;;;;;;;;;;;;;;;;;;;;;++''+;+#';+;::''::::;'''''''';;';':';::;;;::;;;';;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; ''''''++#++#+'#++'''+'.............``...``..`,+''''+',';'',:::,,.............:'''''';;;';;;;.,:.,,.;:,,;;;;';;;;;;;;;;;;;;;;;;;;;;;';;;;;;;;;;;;;;;;';;'';;;;;;:;;;;;;;;:;;;;;;;;;;;;';#++'+;;#+;:;''''';;;''''''''';';;';';;,;;;,::;;'';'';;;;;;;;;;;;;;;;;;;;;;;;;;;;';;", "after": "Stuart Ryan is running for the Communist Party in the Ontario provincial election in Ottawa Centre. Wikinews interviewed him regarding his values, his experience, and his campaign.", "start_char_pos": 0, "end_char_pos": 74881}, {"type": "A", "before": null, "after": "Interview", "start_char_pos": 74882, "end_char_pos": 74882}, {"type": "A", "before": null, "after": "Why have you chosen to involve yourself in the political process? Why did you choose to run in this constituency? I have been involved in the political process for over 40 years, in terms of organizing over political issues such as opposing the Wars in Vietnam and now the wars in Iraq and Afghanistan. I see the elections, if that is what you mean as the political process, as a way to express our political views to the electorate so that they can pass judgement and see that the various issues we raise are related in that the capitalist system and the neo-liberal agenda take away the rights of workers, woman, aboriginals and people in general.", "start_char_pos": 74883, "end_char_pos": 74883}, {"type": "A", "before": null, "after": "I run in Ottawa Centre because I have lived in the riding since 1979 and I know the issues that concern the people who live in the riding. It has a progressive history and is open to socialist ideas.", "start_char_pos": 74884, "end_char_pos": 74884}, {"type": "A", "before": null, "after": "What prior political experience do you have? What skills and insight can you bring to office, from other non-political positions you may have held?", "start_char_pos": 74885, "end_char_pos": 74885}, {"type": "A", "before": null, "after": "I have run for office in my Steelworker union in Windsor in the 1970s and in my Autoworker union now. I work for a CUPE union at Carleton University in Ottawa. I think I can bring my organizing skills in the labour movement, the anti-war movement and in the Central American solidarity movement to Queen\u2019s Park and in building a base within Ottawa Centre to fight for a people\u2019s agenda.", "start_char_pos": 74886, "end_char_pos": 74886}, {"type": "A", "before": null, "after": "Which of your competitors do you expect to pose the biggest challenge to your candidacy? Why? What makes you the most desirable of all candidates running in the riding?", "start_char_pos": 74887, "end_char_pos": 74887}, {"type": "A", "before": null, "after": "I think the biggest challenge to my candidacy is the feeling that people feel they have to vote NDP in order to win the riding, or to prevent a victory by the Liberal or Conservative party. This is a product of the first-past-the-post-voting system. I have had many people say that our ideas are good, and that I have been a good campaigner, but because they feel voting for the Communist Party might jeopardise the NDP. I think I would be the most desirable candidate because we have the best policies and that I would work very hard to make sure they are pushed for in the legislature.", "start_char_pos": 74888, "end_char_pos": 74888}, {"type": "A", "before": null, "after": "What do you feel are the three most important issues to voters in your riding? Are these the same top three issues that are most important to you? What would you do to address these issues?", "start_char_pos": 74889, "end_char_pos": 74889}, {"type": "A", "before": null, "after": "The three biggest issues in this riding are the crisis in public education; the increasing debtload of students because of tuition hikes; and the inability of municipal government to fund the social services downloaded by the Harris government form the province to the cities in 1997. They are my most important issues.", "start_char_pos": 74890, "end_char_pos": 74890}, {"type": "A", "before": null, "after": "Re public education: Our Party will commit to spending $20 billion for a quality public secular school system in French and English for primary and secondary education. We would commit to a comparable investment in public post-secondary education while reducing tuition by 50\\% now, and then eliminate it when the funding is adequate to provide the education for all who qualify for post-secondary education. We would give municipalities secure funding through provincial grants and the ability to tax corporations. This would wean them off the property tax, which we would reduce by 75\\%, along with the scrapping of the market value assessment taxation scheme. We would give 50\\% of the gas tax for mass transit such as the O-train in Ottawa that would travel both east and west and north and south. We would upload to the province the funding of health, education, transit and welfare. What should be the first order of business in the 39th Legislative Assembly? The first order of business schould be the drafting of the legislation to implement Mixed Member Proportional Representation, following its victory in the October 10 referendum. Are the property taxes in your riding at a fair level for the amount of services received in the municipality? The property tax situation in the province is in chaos. Home owners are seeing property taxes increase as the value in their neighbourhoods go up while the property tax of businesses are diminished by a comparable amount. The net increase in revenue to the municipality coming from the residential tax increases is zero. Outraged taxpayers are blaming the municipal officials and are taking it out by voting for right-wing candidates who promise not to raise taxes (In Ottawa the slogan was \u201czero means zero\u201d. The same candidate is now the mayor, and is backing a two per cent increase and campaigning to have the municipal financing system revamped. The property tax system discriminates against tenants as they pay for the extra taxes landlords pay through higher rents. How can the province lead the way in stimulating job creation? The province should take action to save the manufacturing jobs leaving the province by insisting that raw materials be processed in Ontario rather being shipped raw out of the country. It should pass legislation to establish public tribunals so that corporations who are closing profitable factories, such as Hershey\u2019s in Smith Falls and GM in Oshawa would have to justify their closing. Failure to do so would lead to the province taking over the closed business. Our Party would invest in mass transit and produce 100,000 units of social housing. What are your views on the mixed member proportional representation (MMP) referendum? I support MMP and will be voting for it. No longer will we have to choose between the lesser of two evils, and end up with the same mess. The last two governments in Ontario are proof positive of the problem. You will be able to vote for what you believe in and see it relected in the legislature. Of the decisions made by Ontario's 38th Legislative Assembly, which was the most beneficial to your this electoral district? To the province as a whole? Which was least beneficial, or even harmful, to your this riding? To the province as a whole? The only thing that was good for Ottawa Centre was the tuition freeze for two years. That was negated by the new tuition scheme that will raise tuition 25-35\\% over four years. You are running as a candidate for the Communist Party. A lot of people say that Communism is a dead idea or fear that a Communist government would implement some sort of repressive dictatorship. What do you say to this? Communism is not a dead idea; we see revolutionary parties win in Venezuela and trying to bring socialism in by democratic means. This was tried in Chile in the 1970s but was overthrown by the CIA and the Chilean military. What will succeed is that the working class and its allies will demand socialism; it was the insistence of the Venezuelan people that stopped the coup against Hugo Chavez in 2002. The system that they will bring will be democratic, as it will be the will of the people that it be so. The Communist Party is unlikely to win any seats in the election. Why did you decide to run for a small party rather than be involved with one of the major parties? This is a good question, but if you want to bring about real change, you must be part of a party that calls for it. Our Party calls for socialism, public ownership of the means of production under democratic control. Working for a party like the NDP and the Greens would make you feel that you might get things done, but those parties will disappoint you - look at the record of the Bob Rae NDP government in Ontario that opened public sector collective agreements to attack benefits in order to save $2 billion from its deficit.", "start_char_pos": 74891, "end_char_pos": 74891}, {"type": "A", "before": null, "after": "External links Stuart Ryan YouTube Election statement Communist Party, official site Elections Ontario", "start_char_pos": 74892, "end_char_pos": 74892}, {"type": "A", "before": null, "after": "Category:North America Category:Canada Category:Ontario Category:Ottawa, Ontario Category:Politics and conflicts Category:Elections Category:Elections in Canada Category:2007 Ontario provincial e", "start_char_pos": 74893, "end_char_pos": 74893}], "sents_char_pos": [0, 11, 22, 33, 44, 55, 66, 77, 88, 99, 110, 121, 132, 143, 154, 165, 270, 281, 292, 303, 314, 325, 336, 347, 358, 369, 380, 391, 402, 413, 424, 435, 540, 551, 562, 573, 584, 595, 606, 617, 628, 639, 650, 661, 1150, 1161, 1172, 1183, 1194, 1205, 1688, 1952, 2218, 2229, 2481, 2492, 2749, 2760, 2771, 3015, 3033, 3044, 3280, 3300, 3311, 3546, 3991, 4259, 4345, 4356, 4378, 4389, 4407, 4611, 4646, 4657, 4668, 4679, 4690, 4880, 4893, 4913, 4925, 4936, 4947, 4958, 5144, 5170, 5182, 5197, 5208, 5219, 5230, 5410, 5859, 5873, 6127, 6140, 6395, 6662, 6930, 7198, 7465, 7733, 8000, 8267, 8533, 8800, 9068, 9335, 9602, 9862, 10130, 10398, 10665, 10934, 11202, 11470, 11835, 11866, 11877, 11888, 11899, 11910, 11921, 11932, 11968, 12135, 12146, 12157, 12168, 12179, 12190, 12201, 12237, 12401, 12412, 12423, 12434, 12445, 12456, 12467, 12506, 12670, 12681, 12692, 12703, 12714, 12725, 12736, 12775, 12936, 12947, 12958, 12969, 12980, 12991, 13002, 13044, 13206, 13217, 13228, 13239, 13250, 13261, 13272, 13312, 13471, 13482, 13493, 13504, 13515, 13526, 14007, 14018, 14029, 14040, 14051, 14062, 14083, 14118, 14277, 14289, 14300, 14311, 14322, 14810, 14821, 14832, 14843, 14854, 14865, 14876, 14923, 15084, 15095, 15106, 15117, 15128, 15139, 15191, 15354, 15365, 15376, 15387, 15398, 15458, 15469, 15613, 15624, 15635, 15646, 15657, 15668, 15728, 15881, 15892, 15904, 15915, 15926, 15937, 16417, 16685, 16953, 17221, 17489, 17757, 17768, 17780, 17791, 17802, 17813, 17829, 17876, 18025, 18036, 18048, 18059, 18070, 18081, 18092, 18145, 18293, 18304, 18317, 18328, 18339, 18350, 18361, 18413, 18568, 18579, 18590, 18601, 18612, 19098, 19110, 19122, 19133, 19144, 19155, 19166, 19218, 19366, 19377, 19391, 19402, 19413, 19424, 19435, 19487, 19634, 19645, 19659, 19670, 19681, 19692, 19703, 19755, 19911, 19922, 19933, 19944, 19955, 19966, 19977, 19989, 20024, 20171, 20182, 20196, 20207, 20218, 20229, 20708, 20721, 20733, 20744, 20755, 20766, 20777, 20788, 20829, 20976, 20988, 21003, 21014, 21025, 21036, 21047, 21058, 21069, 21097, 21245, 21260, 21271, 21282, 21293, 21304, 21315, 21326, 21337, 21365, 21529, 21540, 21551, 21562, 21573, 21584, 21595, 21606, 21634, 21782, 21798, 21809, 21820, 21831, 21842, 21853, 21871, 21902, 22051, 22067, 22078, 22089, 22100, 22111, 22122, 22141, 22171, 22320, 22346, 22357, 22368, 22379, 22390, 22413, 22439, 22614, 22625, 22636, 22647, 22658, 22707, 22857, 22883, 22894, 22905, 22916, 22927, 22949, 22975, 23126, 23151, 23162, 23173, 23184, 23195, 23216, 23243, 23395, 23408, 23420, 23431, 23442, 23453, 23464, 23477, 23488, 23508, 23519, 23683, 23694, 23705, 23716, 23727, 23738, 23749, 23760, 23776, 23787, 23934, 23951, 23962, 23973, 23984, 23995, 24006, 24017, 24028, 24043, 24054, 24204, 24219, 24230, 24241, 24252, 24263, 24274, 24285, 24296, 24310, 24321, 24473, 24488, 24499, 24510, 24521, 24532, 24543, 24554, 24565, 24577, 24588, 24742, 24756, 24767, 24778, 24789, 24800, 24811, 24822, 24833, 24844, 24855, 25011, 25025, 25036, 25047, 25058, 25069, 25080, 25091, 25102, 25113, 25124, 25280, 25293, 25304, 25315, 25326, 25816, 26085, 26353, 26621, 26635, 26646, 26657, 26668, 26679, 26690, 26701, 26712, 26725, 26736, 26905, 26916, 26927, 26938, 26949, 26960, 26971, 26995, 27006, 27156, 27173, 27184, 27195, 27206, 27217, 27228, 27239, 27264, 27275, 27424, 27441, 27452, 27463, 27474, 27485, 27496, 27507, 27533, 27709, 27720, 27731, 27742, 27753, 27764, 27778, 27802, 27959, 27978, 27989, 28000, 28011, 28022, 28033, 28047, 28058, 28070, 28227, 28246, 28257, 28268, 28279, 28290, 28301, 28314, 28325, 28340, 28494, 28515, 28526, 28537, 28548, 28559, 28570, 28581, 28592, 28609, 28761, 28772, 28783, 28794, 28805, 28816, 28827, 28838, 28849, 28861, 28872, 28883, 29034, 29052, 29063, 29074, 29085, 29096, 29107, 29118, 29139, 29150, 29300, 29320, 29331, 29342, 29353, 29364, 29375, 29391, 29402, 29417, 29563, 29588, 29599, 29610, 29621, 29632, 29643, 29656, 29667, 29680, 29830, 29857, 29868, 29879, 29890, 29901, 29912, 29923, 29934, 29950, 30097, 30124, 30135, 30146, 30157, 30168, 30179, 30190, 30201, 30212, 30224, 30364, 30375, 30393, 30404, 30415, 30426, 30437, 30457, 30481, 30493, 30633, 30644, 30661, 30672, 30683, 30694, 30705, 30721, 30749, 30761, 30899, 31268, 31663, 31816, 31930, 32092, 32367, 32633, 32729, 32996, 33265, 33533, 33801, 34069, 34332, 34599, 34864, 35133, 35170, 35637, 35700, 35904, 35915, 36172, 36439, 36451, 36705, 36719, 36739, 36973, 36987, 37007, 37239, 37255, 37274, 37506, 37523, 37542, 37769, 37791, 37810, 37838, 38036, 38059, 38078, 38303, 38346, 38373, 38567, 38831, 39099, 39146, 39355, 39414, 39621, 39815, 39886, 40154, 40420, 40617, 40642, 40952, 41164, 41175, 41192, 41220, 41432, 41700, 41967, 42009, 42235, 42504, 42781, 43049, 43440, 43585, 43713, 43727, 43738, 43749, 43760, 43771, 43782, 43793, 43804, 43815, 43826, 43837, 43851, 43863, 43874, 43889, 43957, 43994, 44005, 44016, 44027, 44038, 44049, 44530, 44798, 44809, 44820, 44831, 44842, 44853, 44864, 44875, 44886, 44897, 44908, 44919, 44930, 44941, 44956, 44967, 45067, 45078, 45089, 45100, 45111, 45122, 45133, 45144, 45155, 45166, 45177, 45188, 45199, 45223, 45335, 45346, 45357, 45368, 45379, 45390, 45401, 45412, 45423, 45434, 45445, 45459, 45470, 45489, 45502, 45552, 45574, 45600, 45611, 45622, 45633, 45644, 45655, 45666, 45677, 45688, 45699, 45710, 45722, 45756, 45771, 45838, 45868, 45879, 45890, 45901, 45912, 45923, 45934, 45945, 45956, 45967, 45978, 45989, 46023, 46099, 46110, 46133, 46144, 46155, 46166, 46177, 46188, 46199, 46210, 46221, 46232, 46243, 46254, 46288, 46299, 46312, 46364, 46375, 46401, 46413, 46424, 46435, 46446, 46457, 46468, 46479, 46490, 46501, 46512, 46523, 46534, 46550, 46561, 46573, 46631, 46642, 46670, 46683, 46694, 46705, 46716, 46727, 46738, 46749, 46760, 46771, 46782, 46793, 46804, 46815, 46826, 46897, 46908, 46924, 46938, 46951, 46962, 46973, 46984, 46995, 47006, 47017, 47028, 47039, 47050, 47061, 47072, 47083, 47094, 47105, 47165, 47176, 47187, 47199, 47211, 47222, 47233, 47244, 47255, 47266, 47277, 47288, 47299, 47310, 47326, 47337, 47348, 47359, 47371, 47430, 47441, 47452, 47467, 47479, 47490, 47501, 47512, 47523, 47534, 47545, 47556, 47567, 47578, 47589, 47600, 47611, 47622, 47637, 47698, 47709, 47720, 47732, 47743, 47754, 47765, 47776, 47787, 47798, 47809, 47820, 47831, 47842, 47853, 47871, 47882, 47900, 47913, 47954, 47965, 47976, 47987, 47998, 48010, 48021, 48032, 48043, 48054, 48065, 48076, 48087, 48098, 48109, 48120, 48141, 48152, 48166, 48177, 48233, 48244, 48255, 48266, 48277, 48290, 48301, 48312, 48323, 48334, 48345, 48356, 48367, 48378, 48389, 48413, 48430, 48441, 48493, 48504, 48985, 49032, 49043, 49054, 49065, 49076, 49088, 49099, 49110, 49121, 49132, 49143, 49154, 49165, 49176, 49187, 49198, 49209, 49229, 49240, 49290, 49301, 49312, 49323, 49334, 49345, 49356, 49367, 49378, 49389, 49400, 49411, 49422, 49433, 49444, 49455, 49466, 49477, 49494, 49505, 49516, 49555, 49566, 49577, 49588, 49599, 49610, 49621, 49632, 49643, 49654, 49665, 49676, 49687, 49698, 49709, 49720, 49731, 49742, 49753, 49764, 49775, 49788, 49825, 49836, 49847, 49858, 49869, 49880, 49892, 49905, 49916, 49927, 49938, 49949, 49960, 49971, 49982, 49993, 50004, 50015, 50026, 50037, 50048, 50096, 50107, 50118, 50129, 50140, 50151, 50167, 50178, 50189, 50200, 50211, 50222, 50233, 50244, 50255, 50266, 50277, 50288, 50299, 50310, 50321, 50369, 50380, 50391, 50402, 50413, 50424, 50435, 50446, 50457, 50468, 50479, 50490, 50501, 50512, 50523, 50534, 50545, 50556, 50567, 50578, 50589, 50642, 50653, 50664, 50675, 50686, 50702, 50713, 50724, 50735, 50746, 50757, 50768, 50779, 50790, 50801, 50812, 50823, 50834, 50845, 50856, 50891, 50916, 50927, 50938, 50949, 50960, 50974, 50985, 50996, 51007, 51018, 51029, 51040, 51051, 51062, 51073, 51084, 51095, 51106, 51117, 51129, 51146, 51158, 51169, 51190, 51201, 51212, 51223, 51242, 51253, 51264, 51275, 51286, 51297, 51308, 51319, 51330, 51341, 51352, 51363, 51374, 51385, 51396, 51418, 51429, 51440, 51457, 51468, 51479, 51490, 51501, 51515, 52008, 52019, 52030, 52046, 52057, 52068, 52079, 52090, 52101, 52112, 52123, 52134, 52145, 52156, 52167, 52178, 52189, 52200, 52212, 52223, 52234, 52252, 52263, 52274, 52285, 52296, 52316, 52812, 52823, 52834, 52851, 52862, 52873, 52884, 52895, 52906, 52917, 52928, 52939, 52960, 52971, 52986, 52997, 53008, 53019, 53042, 53053, 53064, 53075, 53086, 53097, 53108, 53119, 53130, 53141, 53152, 53163, 53174, 53185, 53196, 53207, 53229, 53254, 53265, 53276, 53308, 53319, 53330, 53341, 53352, 53363, 53374, 53387, 53398, 53409, 53420, 53431, 53442, 53453, 53464, 53475, 53498, 53522, 53533, 53544, 53574, 53585, 53596, 53607, 53618, 53629, 53640, 53658, 53669, 53680, 53691, 53702, 53713, 53724, 53735, 53746, 53767, 53790, 53802, 53813, 53844, 53855, 53866, 53877, 53888, 53899, 53910, 53926, 53937, 53948, 53959, 53970, 53981, 53992, 54003, 54014, 54035, 54057, 54072, 54083, 54105, 54116, 54127, 54138, 54149, 54160, 54171, 54184, 54195, 54206, 54217, 54228, 54239, 54250, 54261, 54272, 54283, 54304, 54325, 54340, 54353, 54382, 54394, 54405, 54417, 54428, 54439, 54452, 54463, 54474, 54485, 54496, 54507, 54518, 54529, 54540, 54551, 54592, 54608, 54625, 54671, 54682, 54693, 54708, 54720, 54731, 54742, 54753, 54764, 54775, 54786, 54797, 54808, 54819, 54860, 54876, 54889, 54941, 54952, 54963, 54975, 54986, 54999, 55010, 55021, 55032, 55043, 55054, 55065, 55076, 55087, 55114, 55126, 55137, 55148, 55209, 55226, 55245, 55260, 55272, 55283, 55294, 55305, 55316, 55327, 55338, 55349, 55382, 55394, 55405, 55416, 55477, 55494, 55505, 55516, 55533, 55544, 55555, 55566, 55577, 55588, 55599, 55610, 55621, 55649, 55661, 55672, 55683, 55745, 55762, 55773, 55784, 55801, 56286, 56554, 56566, 56577, 56591, 56612, 56623, 56634, 56645, 56656, 56667, 56678, 56689, 56700, 56713, 56724, 56735, 56750, 56761, 56818, 56834, 56845, 56859, 56879, 56890, 56901, 56912, 56923, 56934, 56945, 56956, 56967, 56980, 56991, 57002, 57017, 57028, 57042, 57086, 57102, 57113, 57611, 57877, 57890, 57906, 57917, 58412, 58669, 58680, 58932, 58946, 59197, 59211, 59463, 59484, 59728, 59743, 60011, 60269, 60280, 60536, 60559, 60571, 60586, 60597, 60611, 60622, 60642, 60653, 60664, 60675, 60686, 60697, 60708, 60719, 60730, 60741, 60762, 60773, 60784, 60835, 60850, 60861, 60872, 60883, 60913, 60924, 60935, 60946, 60957, 60968, 60979, 60990, 61001, 61012, 61033, 61044, 61055, 61103, 61116, 61127, 61138, 61149, 61160, 61181, 61192, 61203, 61214, 61225, 61236, 61247, 61258, 61269, 61280, 61303, 61314, 61325, 61338, 61374, 61385, 61396, 61407, 61418, 61429, 61450, 61461, 61472, 61483, 61494, 61505, 61516, 61527, 61538, 61570, 61581, 61592, 61606, 61640, 61651, 61662, 61673, 61684, 61695, 61721, 61732, 61743, 61754, 61765, 61776, 61787, 61798, 61809, 61842, 61853, 61864, 61904, 61917, 61928, 61939, 61950, 61961, 61973, 61991, 62002, 62013, 62024, 62035, 62046, 62057, 62068, 62079, 62110, 62121, 62132, 62146, 62164, 62175, 62187, 62198, 62209, 62220, 62231, 62242, 62265, 62276, 62287, 62298, 62309, 62320, 62331, 62342, 62375, 62386, 62397, 62408, 62430, 62441, 62453, 62464, 62475, 62486, 62497, 62509, 62533, 62544, 62555, 62566, 62577, 62588, 62599, 62610, 62646, 62657, 62668, 62679, 62697, 62709, 62720, 62731, 62742, 62753, 62764, 62775, 62800, 62811, 62822, 62833, 62844, 62855, 62866, 62877, 62915, 62926, 62937, 62948, 62962, 62977, 62988, 62999, 63010, 63021, 63032, 63043, 63076, 63089, 63100, 63111, 63122, 63133, 63144, 63181, 63192, 63203, 63216, 63227, 63238, 63250, 63261, 63272, 63283, 63295, 63307, 63318, 63331, 63349, 63360, 63375, 63386, 63397, 63412, 63446, 63457, 63469, 63480, 63491, 63502, 63513, 63524, 63535, 63547, 63558, 63571, 63582, 63600, 63620, 63642, 63653, 63664, 63710, 63721, 63732, 63748, 63759, 63771, 63782, 63793, 63804, 63815, 63826, 63837, 63848, 63859, 63886, 63897, 63910, 63923, 63934, 63975, 63987, 63998, 64009, 64020, 64033, 64044, 64055, 64066, 64077, 64088, 64099, 64114, 64125, 64137, 64154, 64165, 64244, 64255, 64267, 64282, 64294, 64305, 64316, 64327, 64339, 64352, 64363, 64374, 64385, 64396, 64411, 64422, 64433, 64445, 64512, 64523, 64534, 64545, 64556, 64568, 64579, 64590, 64601, 64612, 64624, 64635, 64646, 64657, 64668, 64679, 64690, 64701, 64714, 64772, 64783, 64794, 64805, 64816, 64827, 64838, 64849, 64860, 64871, 64896, 64907, 64919, 65408, 65676, 65705, 65716, 66212, 66480, 66748, 67016, 67284, 67551, 67599, 67709, 67863, 68013, 68305, 68346, 68532, 68545, 68556, 68567, 69065, 69187, 69377, 69695, 69822, 69853, 69924, 69936, 69948, 69960, 69983, 70008, 70031, 70042, 70055, 70549, 70762, 70858, 70919, 70940, 70971, 70982, 70995, 71006, 71019, 71030, 71041, 71052, 71548, 71598, 71709, 71869, 72068, 72129, 72558, 72680, 72753, 72806, 72937, 73075, 73179, 73218, 73306, 73371, 73542, 73810, 74078, 74346, 74412, 74614, 74659, 74881]}
+{"doc_id": "82141", "revision_depth": "1", "before_revision": "Fat Ace Dad Shone : What is \" W \"? Ka Naya : It's am to die large wen that bate 10' sDS: What is your wite at ? KN: It was ally put up by my pucer, Jon Nun. Jong , on-going can over fears . It was always my dam to do a day at this sure that exists in Ameca . It's a mits . DS: What is the maps in a few areas. Size ace, fat ace , BBW movement. DS: the way leel. DS: Her rent pace was widely cape .KN: Out of shit , or out of shaving a w:Rack ?DS: How are they dent ? KN: Well, soy can be fink the Bears MTV pace and cents at her pent out as a mage ?KN: It was , eil, no god, lay, slight not be the cat pole is pant . It's hit and and", "after_revision": "Fat Acceptance David Shankbone : What is \" BBW \"? Kira Nerusskaya : It's an acronym to describe large women that began in the late 1960's and early 1970' sDS: What is your website about ? KN: It was originally put up by my producer, Jonn Nubian. Jonn and I had a long , on-going conversation over five years . It was always my dream to do a documentary about this subculture that exists in America . It's a movement that exists . DS: What is the movement?KN: It overlaps in a few areas. Size acceptance, fat acceptance , BBW movement. DS: What exactly does the movement want? KN: For people to accept us at the size we are. I was fortunate enough to be born on January 15th, Martin Luther King Jr.'s birthday. He felt nobody should be discriminated against because of the color of their skin, and I extend that to nobody should be discriminated against because of the size of their skin. We are always looked at as sub-human or second-class citizens because of our size. Ironically enough, we outnumber everyone else. Over 60\\% of the population in America is overweight in some capacity. So there is more of us, and literally, there is more of us. DS: How much do you weigh?KN: 313 pounds and I'm 5'4.DS: Do you have any desire to lose weight? KN: Desire? It depends on the way it's put. I think I have an interest in being a little bit smaller, but I don't necessarily have an interest in being like Britney Spears. That's considered the ideal beauty in America, even though she's an unfit mother, God knows what else she does in her personal life, on top of the fact the woman has a hard time putting a sentence together beyond a fourth grade level. DS: Her recent performance was widely criticized because she was seen as out-of-shape .KN: Out of shape in the sense of not fit , or out of shape in the sense of not having a six pack ?DS: How are they different ? KN: Well, somebody can be fat and fit and somebody can be fat and misshapen. DS: What do you think the Britney Spears MTV performance and comments about her physique sent out as a message ?KN: It was negative. It said you need to be rail thin in order to be considered beautiful and accepted. In order to be worthy. In order to be loved. Especially in America I find it ironic because we are the melting pot, and there are people from all over the world, different shapes, heights, skin tones, races, religions...you would think we'd see diversity in beauty. And we lack that. Isn't it a crime that it took however many years for two African-American actors to win Academy Awards, and then it's suddenly \"The Year of the Black Actor\" and it's like, 'No, those were really good performances that year and that's who won.' I don't consider Britney Spears right, perfect and wonderful. I feel bad for her, but we should be celebrating everybody. It is and should be, to take a quote from a great interview I did with Carla Drew from FAT GIRLS!: The Musical...it's the \"Everybody Matters Revolution.\" That's the underlying feeling in fat acceptance: everybody matters. And we are tired of being excluded. Part of that is combating the media that portrays us as terrible, rotten, evil, no good, lazy, slovenly, etc., when that might not be the case. The stigma attached to fat people is prevalent . It's hysterical: do you really think that's what we do, sit around and eat all day? I remember reading a post from a British news source where women were celebrated for their curves, and there was a woman who posted thinking that they legitimately did nothing else but sit and eat all day. Ignorance, as they say, is bliss, but only to those it serves.DS: What is beautiful about being fat? KN: The difference in the shape of the body. The curves. The softness. It's difference, which is the opposite of what you see in New York on a Saturday night with the 'Blond Gaggle': they all have straight blond hair, cut the same way, they are all wearing jeans with a little shirt and a little purse over their shoulder. It's hysterical. They are all so similar that they are identical. When you look at fat women, it's so not standard, which is one of the difficulties in finding clothing. She can be a pear shape, where she carries her weight below the waist. She can be an apple shape where it's around the middle. She can be hourglassed where it's big on top, slender in the middle and bigger in the hips. There's so many different shapes, and when you look at a naked fat woman with the cellulite included, it looks like she was poured into a mold specifically in that shape, like that is the way she was created. Which is so different compared to straight Size 2 or Size 4.", "edit_actions": [{"type": "R", "before": "Ace Dad Shone", "after": "Acceptance David Shankbone", "start_char_pos": 4, "end_char_pos": 17}, {"type": "R", "before": "W", "after": "BBW", "start_char_pos": 30, "end_char_pos": 31}, {"type": "R", "before": "Ka Naya", "after": "Kira Nerusskaya", "start_char_pos": 35, "end_char_pos": 42}, {"type": "R", "before": "am to die large wen that bate 10'", "after": "an acronym to describe large women that began in the late 1960's and early 1970'", "start_char_pos": 50, "end_char_pos": 83}, {"type": "R", "before": "wite at", "after": "website about", "start_char_pos": 102, "end_char_pos": 109}, {"type": "R", "before": "ally", "after": "originally", "start_char_pos": 123, "end_char_pos": 127}, {"type": "R", "before": "pucer, Jon Nun. Jong", "after": "producer, Jonn Nubian. Jonn and I had a long", "start_char_pos": 141, "end_char_pos": 161}, {"type": "R", "before": "can over fears", "after": "conversation over five years", "start_char_pos": 173, "end_char_pos": 187}, {"type": "R", "before": "dam", "after": "dream", "start_char_pos": 207, "end_char_pos": 210}, {"type": "R", "before": "day at this sure", "after": "documentary about this subculture", "start_char_pos": 219, "end_char_pos": 235}, {"type": "R", "before": "Ameca", "after": "America", "start_char_pos": 251, "end_char_pos": 256}, {"type": "R", "before": "mits", "after": "movement that exists", "start_char_pos": 266, "end_char_pos": 270}, {"type": "R", "before": "maps", "after": "movement?KN: It overlaps", "start_char_pos": 289, "end_char_pos": 293}, {"type": "R", "before": "ace, fat ace", "after": "acceptance, fat acceptance", "start_char_pos": 315, "end_char_pos": 327}, {"type": "R", "before": "the way leel.", "after": "What exactly does the movement want? KN: For people to accept us at the size we are. I was fortunate enough to be born on January 15th, Martin Luther King Jr.'s birthday. He felt nobody should be discriminated against because of the color of their skin, and I extend that to nobody should be discriminated against because of the size of their skin. We are always looked at as sub-human or second-class citizens because of our size. Ironically enough, we outnumber everyone else. Over 60\\% of the population in America is overweight in some capacity. So there is more of us, and literally, there is more of us.", "start_char_pos": 348, "end_char_pos": 361}, {"type": "A", "before": null, "after": "DS: How much do you weigh?KN: 313 pounds and I'm 5'4.DS: Do you have any desire to lose weight? KN: Desire? It depends on the way it's put. I think I have an interest in being a little bit smaller, but I don't necessarily have an interest in being like Britney Spears. That's considered the ideal beauty in America, even though she's an unfit mother, God knows what else she does in her personal life, on top of the fact the woman has a hard time putting a sentence together beyond a fourth grade level.", "start_char_pos": 362, "end_char_pos": 362}, {"type": "R", "before": "rent pace was widely cape", "after": "recent performance was widely criticized because she was seen as out-of-shape", "start_char_pos": 371, "end_char_pos": 396}, {"type": "R", "before": "shit", "after": "shape in the sense of not fit", "start_char_pos": 409, "end_char_pos": 413}, {"type": "R", "before": "shaving a w:Rack", "after": "shape in the sense of not having a six pack", "start_char_pos": 426, "end_char_pos": 442}, {"type": "R", "before": "dent", "after": "different", "start_char_pos": 461, "end_char_pos": 465}, {"type": "R", "before": "soy can be fink the Bears MTV pace and cents at her pent", "after": "somebody can be fat and fit and somebody can be fat and misshapen.", "start_char_pos": 478, "end_char_pos": 534}, {"type": "A", "before": null, "after": "DS: What do you think the Britney Spears MTV performance and comments about her physique sent", "start_char_pos": 535, "end_char_pos": 535}, {"type": "R", "before": "mage", "after": "message", "start_char_pos": 545, "end_char_pos": 549}, {"type": "R", "before": ", eil, no god, lay, slight", "after": "negative. It said you need to be rail thin in order to be considered beautiful and accepted. In order to be worthy. In order to be loved. Especially in America I find it ironic because we are the melting pot, and there are people from all over the world, different shapes, heights, skin tones, races, religions...you would think we'd see diversity in beauty. And we lack that. Isn't it a crime that it took however many years for two African-American actors to win Academy Awards, and then it's suddenly \"The Year of the Black Actor\" and it's like, 'No, those were really good performances that year and that's who won.' I don't consider Britney Spears right, perfect and wonderful. I feel bad for her, but we should be celebrating everybody. It is and should be, to take a quote from a great interview I did with Carla Drew from FAT GIRLS!: The Musical...it's the \"Everybody Matters Revolution.\" That's the underlying feeling in fat acceptance: everybody matters. And we are tired of being excluded. Part of that is combating the media that portrays us as terrible, rotten, evil, no good, lazy, slovenly, etc., when that might", "start_char_pos": 562, "end_char_pos": 588}, {"type": "R", "before": "cat pole is pant", "after": "case. The stigma attached to fat people is prevalent", "start_char_pos": 600, "end_char_pos": 616}, {"type": "R", "before": "hit and and", "after": "hysterical: do you really think that's what we do, sit around and eat all day? I remember reading a post from a British news source where women were celebrated for their curves, and there was a woman who posted thinking that they legitimately did nothing else but sit and eat all day. Ignorance, as they say, is bliss, but only to those it serves.DS: What is beautiful about being fat? KN: The difference in the shape of the body. The curves. The softness. It's difference, which is the opposite of what you see in New York on a Saturday night with the 'Blond Gaggle': they all have straight blond hair, cut the same way, they are all wearing jeans with a little shirt and a little purse over their shoulder. It's hysterical. They are all so similar that they are identical. When you look at fat women, it's so not standard, which is one of the difficulties in finding clothing. She can be a pear shape, where she carries her weight below the waist. She can be an apple shape where it's around the middle. She can be hourglassed where it's big on top, slender in the middle and bigger in the hips. There's so many different shapes, and when you look at a naked fat woman with the cellulite included, it looks like she was poured into a mold specifically in that shape, like that is the way she was created. Which is so different compared to straight Size 2 or Size 4.", "start_char_pos": 624, "end_char_pos": 635}], "sents_char_pos": [0, 156, 189, 258, 309, 343, 361, 618]}
+{"doc_id": "82600", "revision_depth": "1", "before_revision": "Vernon Bellecourt , once the primary spokesperson for the American Indian Movement , died recently at age 75. Bellecourt, an Ojibwa who fought for Native rights, was perhaps best known for his opposition to Native names and mascots for sports teams . First in the headlines in 1972, Bellecourt organized a cross-country caravan of the Movement, to Washington. Once there, members of the group occupied the Bureau of Indian Affairs offices. His goal of international recognition for Aboriginal nations and their treaties found him meeting with figures like Libyan Colonel Muammar el-Qaddafi, and Palestine's Yasir Arafat . In 1977 Leonard Peltier was convicted and sentenced to two consecutive life terms for the murder of two FBI Agents during a 1975 shoot-out on the Pine Ridge Indian Reservation; Bellecourt led the campaign to free him. His work as president of the National Coalition on Racism in Sports and Media made a much wider known mark, though. Bellecourt emphasized that he believed such names perpetuated racial stereotypes, clouding the real identities and problems facing natives. Teams with native-related names could almost guarantee on Bellecourt showing up at major games. He twice burned an effigy of Chief Wahoo, the Cleveland Indians baseball team mascot, and both times was arrested. When the Washington Redskins of the National Football League made the Super Bowl , Vernon was there to protest. The United States Commission on Civil Rights was critical of such names by 2001, calling them \"insensitive in light of the long history of forced assimilation\". Some newspapers have stopped using the names of teams with Native origins. None of his \"big four\" targets have shown any indication of changing: the Washington Redskins, the Kansas City Chiefs , the Cleveland Indians or the Atlanta Braves . Post-season use of American Indian mascots were banned by the National Collegiate Athletic Association in 2005, suggesting the names are \"hostile or abusive\". Bellecourt was pleased with the NCAA sanctions, but suggested such actions were only going \"half way\". The Florida State Seminole and the Illinois Illini were among the 18 colleges affected by the ban. Florida president T.K. Wetherell threatened legal action in response. The Florida Seminole tribes have endorsed the University's usage of the name, but some out-of-state tribes were \"not supportive\", according to the NCAA vice president for diversity and inclusion. Born WaBun-Inini, Bellecourt died from complications of pneumonia on October 13, in Minneapolis , Minnesota, United States.", "after_revision": " , once the primary spokesperson for the , died recently at age 75. Bellecourt, an who fought for Native rights, was perhaps best known for his . First in the headlines in 1972, Bellecourt organized a cross-country caravan of the Movement, to Washington. Once there, members of the group occupied the offices. His goal of international recognition for nations and their treaties found him meeting with figures like Libyan Colonel Muammar el-Qaddafi, and Palestine's . In 1977 was convicted and sentenced to two consecutive life terms for the murder of two FBI Agents during a 1975 shoot-out on the Pine Ridge Indian Reservation; Bellecourt led the campaign to free him. His work as president of the made a much wider known mark, though. Bellecourt emphasized that he believed such names perpetuated racial stereotypes, clouding the real identities and problems facing natives. Teams with native-related names could almost guarantee on Bellecourt showing up at major games. He twice burned an effigy of , the baseball team mascot, and both times was arrested. When the Washington Redskins of the National Football League made the , Vernon was there to protest. The was critical of such names by 2001, calling them \"insensitive in light of the long history of forced assimilation\". Some newspapers have stopped using the names of teams with Native origins. None of his \"big four\" targets have shown any indication of changing: the , the , the Cleveland Indians or the . Post-season use of American Indian mascots were banned by the in 2005, suggesting the names are \"hostile or abusive\". Bellecourt was pleased with the NCAA sanctions, but suggested such actions were only going \"half way\". The Florida State Seminole and the Illinois Illini were among the 18 colleges affected by the ban. Florida president T.K. Wetherell threatened legal action in response. The Florida tribes have endorsed the University's usage of the name, but some out-of-state tribes were \"not supportive\", according to the NCAA vice president for diversity and inclusion. Born WaBun-Inini, Bellecourt died from complications of pneumonia on October 13, in , Minnesota, United States.", "edit_actions": [{"type": "D", "before": "Vernon Bellecourt", "after": null, "start_char_pos": 0, "end_char_pos": 17}, {"type": "D", "before": "American Indian Movement", "after": null, "start_char_pos": 58, "end_char_pos": 82}, {"type": "D", "before": "Ojibwa", "after": null, "start_char_pos": 125, "end_char_pos": 131}, {"type": "D", "before": "opposition to Native names and mascots for sports teams", "after": null, "start_char_pos": 193, "end_char_pos": 248}, {"type": "D", "before": "Bureau of Indian Affairs", "after": null, "start_char_pos": 406, "end_char_pos": 430}, {"type": "D", "before": "Aboriginal", "after": null, "start_char_pos": 482, "end_char_pos": 492}, {"type": "D", "before": "Yasir Arafat", "after": null, "start_char_pos": 607, "end_char_pos": 619}, {"type": "D", "before": "Leonard Peltier", "after": null, "start_char_pos": 630, "end_char_pos": 645}, {"type": "D", "before": "National Coalition on Racism in Sports and Media", "after": null, "start_char_pos": 869, "end_char_pos": 917}, {"type": "R", "before": "Chief Wahoo, the Cleveland Indians", "after": ", the", "start_char_pos": 1221, "end_char_pos": 1255}, {"type": "D", "before": "Super Bowl", "after": null, "start_char_pos": 1377, "end_char_pos": 1387}, {"type": "D", "before": "United States Commission on Civil Rights", "after": null, "start_char_pos": 1423, "end_char_pos": 1463}, {"type": "D", "before": "Washington Redskins, the Kansas City Chiefs", "after": null, "start_char_pos": 1729, "end_char_pos": 1772}, {"type": "A", "before": null, "after": ", the", "start_char_pos": 1779, "end_char_pos": 1779}, {"type": "D", "before": "Atlanta Braves", "after": null, "start_char_pos": 1805, "end_char_pos": 1819}, {"type": "D", "before": "National Collegiate Athletic Association", "after": null, "start_char_pos": 1884, "end_char_pos": 1924}, {"type": "D", "before": "Seminole", "after": null, "start_char_pos": 2265, "end_char_pos": 2273}, {"type": "D", "before": "Minneapolis", "after": null, "start_char_pos": 2533, "end_char_pos": 2544}], "sents_char_pos": [0, 109, 250, 359, 439, 621, 798, 839, 955, 1095, 1191, 1306, 1418, 1579, 1654, 1980, 2083, 2182, 2205, 2252, 2448]}
+{"doc_id": "8271", "revision_depth": "1", "before_revision": "Researchers at Oxford University are using state-of-the-art technology to uncover works from some of the most important writers of the ancient world, works which have not been read for many centuries. They come from a cache of papyrii that were salvaged about a hundred years ago in the Greco-Egyptian town of Oxyrhynchus . The ink on many of these papyrii had faded to the point that no text at all was visible to the naked eye, yet using state of the art techniques borrowed from satellite imaging , researchers were able to use infra-red light to see the faded ink. There are thousands of manuscripts which are set to be read in this manner, and works of Sophocles, Euripides and Hesiod which have been unavailable for well over a thousand years have already been recovered. The process by which these papyrii are reconstructed is very time consuming -- it will take a decade to finish the entire corpus. Among the documents set to be analysed include previously lost writings of Aeschylus, Ovid and a series of Christian gospels .", "after_revision": "Researchers at are using state-of-the-art technology to uncover works from some of the most important writers of the ancient world, works which have not been read for many centuries. They come from a cache of papyri that were salvaged about a hundred years ago in the Greco-Egyptian town of . The ink on many of these had faded to the point that no text at all was visible to the naked eye, yet using state of the art techniques borrowed from , researchers were able to use to see the faded ink. There are thousands of which are set to be read in this manner, and works of , , and which have been unavailable for well over a thousand years have already been recovered. The process by which these papyri are reconstructed is very time consuming \u2014 it will take a decade to finish the entire corpus. Among the documents set to be analysed include previously lost writings of , , and a series of .", "edit_actions": [{"type": "D", "before": "Oxford University", "after": null, "start_char_pos": 15, "end_char_pos": 32}, {"type": "R", "before": "papyrii", "after": "papyri", "start_char_pos": 227, "end_char_pos": 234}, {"type": "D", "before": "Oxyrhynchus", "after": null, "start_char_pos": 310, "end_char_pos": 321}, {"type": "D", "before": "papyrii", "after": null, "start_char_pos": 349, "end_char_pos": 356}, {"type": "D", "before": "satellite imaging", "after": null, "start_char_pos": 482, "end_char_pos": 499}, {"type": "D", "before": "infra-red light", "after": null, "start_char_pos": 531, "end_char_pos": 546}, {"type": "D", "before": "manuscripts", "after": null, "start_char_pos": 592, "end_char_pos": 603}, {"type": "R", "before": "Sophocles, Euripides and Hesiod", "after": ", , and", "start_char_pos": 658, "end_char_pos": 689}, {"type": "R", "before": "papyrii", "after": "papyri", "start_char_pos": 805, "end_char_pos": 812}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 854, "end_char_pos": 856}, {"type": "R", "before": "Aeschylus, Ovid", "after": ", ,", "start_char_pos": 983, "end_char_pos": 998}, {"type": "D", "before": "Christian gospels", "after": null, "start_char_pos": 1015, "end_char_pos": 1032}], "sents_char_pos": [0, 200, 323, 568, 777, 907]}
+{"doc_id": "83131", "revision_depth": "2", "before_revision": "From October 22 to 25, Taipei Computer Association (TCA) promoted 3 organized or sponsored expositions including \"2007 WiMAX Forum Taipei Showcase & Conference\", \"Exhibition of the First 5-year Period of the National Science & Technology Program of e-Learning\", and \"2007 IP Comm Asia\" showing great determination on improving the IT industry in Taiwan. With Computex Taipei 2008 will add Taipei World Trade Center Nangang Exhibition Hall (TWTC Nangang) area, how TCA transform their ways and goals with operating their IT shows? It will be affected on the notibility of domestic or trade shows. For the 3 expos status and TWTC Nangang topics, Wikinews Reporter Brock interviewed TCA Secretary General Enoch Du for some important questions that should be respected by organizers and governments. Interview Brock: We saw 3 expos continuously appeared this week and witnessed the determination from TCA. But before the 3 expos, with the 2008 Computex Taipei Local Exhibitors' Conference by TAITRA last month for the exhibition hall usage, what should TCA face on the twin halls (TWTC Hall 1 and TWTC Nangang) problem? How to solve the problem with TWTC Nangang? Because more than 10 years before, when Computex Taipei exhibited at Sungshan and TWTC halls, the show didn't have a good work, and I've asked Commissioner of Department of Transportation in Taipei City Hsiao-hsien Lou for the traffic issue with TWTC Nangang, he looked it as a pessimistic way. Enoch: We still contact with TAITRA currently for the twin halls problem , The advantage for TWTC Nangang is exhibition spaces, but to the opposite way, traffic problem for Nangang is surely a great headache for governments, organizers, and exhibitors. We still try to solve the problem with this. Even though Computex Taipei will be located at TWTC Exhibition Hall and TWTC Nangang same time with the project of TAITRA, but without solving the traffic problem , Computex Taipei will still be in a problem even though we want to challenge the World's 1st IT show CeBIT. With the quality issue, TCA suspended Taipei Telecom in 2007. Brock: It's apparently that lots of organizations care about the traffic problem for TWTC Nangang. By the way, for the 1st time TCA holding 2007 IP Comm Asia, why should it be transformed from a long-historical trade show - Taipei Telecom by TAITRA, suspended from this year? Enoch: TCA explained some reasons for the transformation in the starting of 2007. In fact, lots of famous local participants (exhibitors) usually promoted their products with show-girls (models) so the quality of Taipei Telecom went from bad to worse in past 2 to 5 years. This is surely a damn bad demonstration in the society in Taiwan. With the suspending Taipei Telecom and promoting IP telecommunication industry in Taiwan, TCA finally decided to hold this professional trade show and named \"IP Comm Asia\" for the global market opportunity . Brock: Continued with IP Comm Asia , how this show connect with \"2007 WiMAX Forum Taipei Showcase & Conference\"? Enoch: Communication and networking (including WiMAX) industry should be complementary industries. IP telecommunication infrastructure shouldn't be looked down, with the trendy change of telecommunication industry, even though traditional telecommunication ( such as fax and phone) industry is currenetly in a prior position, but IP telecommunication will be a new industry besides of communication and networking with computing technology. If consumers can communicate via Internet including Wi-Fi, its development will take advantage. Currently, some of telecommunication companies tried to change the quality of VoIP and experiment related applications for the market preparation, if the wireless network contained broadly and WiMAX infrastructure improved rapidly in Taiwan, I think that IP telecommunications should the main stream in the future. Brock: Something interesting. Some of electronic trade shows by TAITRA had a great transformation with combinations and changes such as a 3-in-1 show (TaiwanRFID, TAITRONICS, PV Taiwan) held past 2 weeks. Recently, TAITRA set Broadband Communications Pavilion at 2007 TAITRONICS Autumn to promote Broadband Taiwan 2008 at TWTC Nangang and recruit companies with Taiwan Electrical and Electronic Manufactorers' Association. How the TCA think about this idea? Enoch: With a trendy changing of electronic industry in Taiwan, several (electronic) trade shows suspended or transformed to other industry shows. As of TAITRA, they should fill up vacancies with some specified trade shows by grown up industries. With their idea, they successfully transformed a simple electronic show to a grand combination with multiple industries' show. As you talked about the pavilion at TAITRONICS, this was a great change for TAITRA to re-define and restart. Every show organizer always hopes their international show can keep good images for international buyers. Hope TWTC Nangang can bring a bright future and have a good start, and TAITRA can complete solutions for TWTC Nangang to keep TWTC Exhibition Hall in a steady position.", "after_revision": "From October 22 to 25, Taipei Computer Association (TCA) promoted 3 organized or sponsored expositions including \"2007 WiMAX Forum Taipei Showcase & Conference\", \"Exhibition of the First 5-year Period of the National Science & Technology Program of e-Learning\", and \"2007 IP Comm Asia\" showing great determination on improving the IT industry in Taiwan. With Computex Taipei 2008 will add Taipei World Trade Center Nangang Exhibition Hall (TWTC Nangang) area, how TCA transform their ways and goals with operating their IT shows? It will be affected on the notibility of domestic or trade shows. For the 3 expos status and TWTC Nangang topics, Wikinews Reporter Brock interviewed TCA Secretary General Enoch Du for some important questions that should be respected by organizers and governments. Interview Brock: We saw 3 expos continuously appeared this week and witnessed the determination from TCA. But before the 3 expos, with the 2008 Computex Taipei Local Exhibitors' Coordination by TAITRA last month for the exhibition hall usage, what should TCA face on the twin halls (TWTC Hall 1 and TWTC Nangang) problem? How to solve the problem with TWTC Nangang? Because more than 10 years before, when Computex Taipei exhibited at Sungshan and TWTC halls, the show didn't have a good work, and I've asked Commissioner of Department of Transportation in Taipei City Hsiao-hsien Lou for the traffic issue with TWTC Nangang, he looked it as a pessimistic way. Enoch: We still contact with TAITRA currently for the twin halls issue , The advantage for TWTC Nangang is exhibition spaces, but to the opposite way, traffic is surely a great headache for governments, organizers, and exhibitors. We still try to solve problems with this. Even though Computex Taipei will be located at TWTC Exhibition Hall and TWTC Nangang same time with the plan of TAITRA, but without solving problems , Computex Taipei will still be in a trouble even though we want to challenge the World's 1st scale against CeBIT. With the quality issue, TCA suspended Taipei Telecom in 2007. Brock: It's apparently that lots of organizations care about the traffic near TWTC Nangang. By the way, for the 1st time TCA holding 2007 IP Comm Asia, why should it be transformed from a long-historical trade show - Taipei Telecom by TAITRA, suspended from this year? Enoch: TCA explained some reasons for the transformation in the starting of 2007. In fact, lots of famous local participants (exhibitors) usually promoted their products with show-girls (models) so the quality of Taipei Telecom went from bad to worse in past 2 to 5 years. This is surely a damn bad demonstration in Taiwan's society. With suspending Taipei Telecom and promoting IP telecommunication industry in Taiwan, TCA finally decided to hold this professional trade show and named \"IP Comm Asia\" for the global market opportunity this year . Brock: Continued with \" IP Comm Asia \" , how this show connect with \"2007 WiMAX Forum Taipei Showcase & Conference\"? Enoch: Communication and networking (including WiMAX) industries should be complementaries. In Taiwan, IP telecommunication infrastructure shouldn't be looked down, with the trendy change of telecommunication industry, even though traditional telecommunication ( fax and phone) industry is currently in a prior position, but IP telecommunication will be a new industry besides of communication and networking with computing technology. If consumers can communicate via Internet including Wi-Fi, its development will take advantage. Currently, some of telecommunication companies tried to change the quality of VoIP and experiment related applications for the market preparation, if the wireless network contained broadly and WiMAX infrastructure improved rapidly in Taiwan, I think that IP telecommunications will be the main stream in the future. Brock: Something interesting. Some of electronic trade shows held by TAITRA had a great transformation with combinations and changes such as a 3-in-1 show (TaiwanRFID, TAITRONICS, PV Taiwan) held past 2 weeks. Recently, TAITRA set \" Broadband Communications Pavilion \" at 2007 TAITRONICS Autumn to promote \" Broadband Taiwan 2008 \" at TWTC Nangang and recruit companies with Taiwan Electrical and Electronic Manufactorers' Association. How the TCA think about this idea? Enoch: With trendy changes of electronic industry in Taiwan, several (electronic) trade shows suspended or transformed to other industry shows. As of TAITRA, they should fill up vacancies with some specified trade shows by some grown up industries. With their idea, they successfully transformed a simple electronic show to a grand combination with multiple industries' show. As you talked about the pavilion at TAITRONICS, this was a great chance for TAITRA to reposition and restart. Every show organizer always hopes their (international) show can keep good images for international buyers. Hope TWTC Nangang can bring a bright future and have a good start, and TAITRA can complete solutions for TWTC Nangang to keep TWTC Exhibition Hall in a steady position.", "edit_actions": [{"type": "R", "before": "Conference", "after": "Coordination", "start_char_pos": 974, "end_char_pos": 984}, {"type": "R", "before": "problem", "after": "issue", "start_char_pos": 1520, "end_char_pos": 1527}, {"type": "D", "before": "problem for Nangang", "after": null, "start_char_pos": 1616, "end_char_pos": 1635}, {"type": "R", "before": "the problem", "after": "problems", "start_char_pos": 1730, "end_char_pos": 1741}, {"type": "R", "before": "project", "after": "plan", "start_char_pos": 1857, "end_char_pos": 1864}, {"type": "R", "before": "the traffic problem", "after": "problems", "start_char_pos": 1896, "end_char_pos": 1915}, {"type": "R", "before": "problem", "after": "trouble", "start_char_pos": 1953, "end_char_pos": 1960}, {"type": "R", "before": "IT show", "after": "scale against", "start_char_pos": 2010, "end_char_pos": 2017}, {"type": "R", "before": "problem for", "after": "near", "start_char_pos": 2160, "end_char_pos": 2171}, {"type": "R", "before": "the society in Taiwan. With the", "after": "Taiwan's society. With", "start_char_pos": 2679, "end_char_pos": 2710}, {"type": "A", "before": null, "after": "this year", "start_char_pos": 2908, "end_char_pos": 2908}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2933, "end_char_pos": 2933}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2947, "end_char_pos": 2947}, {"type": "R", "before": "industry should be complementary industries.", "after": "industries should be complementaries. In Taiwan,", "start_char_pos": 3080, "end_char_pos": 3124}, {"type": "D", "before": "such as", "after": null, "start_char_pos": 3285, "end_char_pos": 3292}, {"type": "R", "before": "currenetly", "after": "currently", "start_char_pos": 3320, "end_char_pos": 3330}, {"type": "R", "before": "should", "after": "will be", "start_char_pos": 3840, "end_char_pos": 3846}, {"type": "A", "before": null, "after": "held", "start_char_pos": 3939, "end_char_pos": 3939}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 4105, "end_char_pos": 4105}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 4140, "end_char_pos": 4140}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 4178, "end_char_pos": 4178}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 4201, "end_char_pos": 4201}, {"type": "R", "before": "a trendy changing", "after": "trendy changes", "start_char_pos": 4353, "end_char_pos": 4370}, {"type": "A", "before": null, "after": "some", "start_char_pos": 4567, "end_char_pos": 4567}, {"type": "R", "before": "change", "after": "chance", "start_char_pos": 4781, "end_char_pos": 4787}, {"type": "R", "before": "re-define", "after": "reposition", "start_char_pos": 4802, "end_char_pos": 4811}, {"type": "R", "before": "international", "after": "(international)", "start_char_pos": 4865, "end_char_pos": 4878}], "sents_char_pos": [0, 353, 529, 595, 795, 901, 1115, 1159, 1454, 1707, 1752, 2024, 2086, 2185, 2362, 2444, 2635, 2701, 2910, 3025, 3124, 3466, 3562, 3877, 3907, 4083, 4305, 4340, 4487, 4588, 4715, 4824, 4930]}
+{"doc_id": "831937", "revision_depth": "2", "before_revision": "Members of the OECD On Tuesday the Organisation for Economic Co-operation and Development (OECD), a 34 member international economic organization founded in 1961 that traces its origins back to the World War II-era , published results on the state of adult skills in 24 countries, most of them European. had mixed rankings for literacy and numeracy amongst adults, finishing amongst the top for literacy and in the middle for numeracy. Internationally, Australia ranks fourth amongst surveyed countries for literacy proficiency amongst adults. At the highest proficiency level, level 5, Australia ranks as the second highest percentage of surveyed nations at 1.3\\%. It is tied with the . Only is higher at 2.2\\%. Readers at this level synthesize text, compare and contrasts ideas and points of view, and process information across multiple sources. Australia, at 9.4\\%, has one of the smallest percentages of their population at reading proficiency level 1. This means adults have a basic understanding of what they read, can fill out forms and can understanding the meaning of sentences. Overall, Australia's mean reading proficiency score puts them on par with and . When scores are adjusted for non-response, Australia is on par with . Amongst young adults aged 16 to 24 years, Australia ranks seventh amongst surveyed countries, with a mean score comparable to the , Estonia, , , Sweden, and the region of . The Australian data said adult literacy skills did not strongly impact on social inequality, and literacy is not a barrier to social mobility. This contrasts to some other countries like the where literacy skills correlate to social mobility. Further, it shows an adult's socio-economic background is not tied very strongly to skills proficiency. Australia ranks thirteenth amongst all surveyed countries in numeracy proficiency amongst adults aged 16 to 65 years. The country's mean score is comparable to . Australia's relative high international performance in literacy and low performance in numeracy buck international trends. When only 16 to 24 year-olds are looked at, Australia's numeracy ranking falls one position and puts their performance comparable to Canada, , Norway, Poland, and . In proficiency at problem solving, Australia finishes sixth amongst surveyed nations. Adults were allowed to opt out of using computers for this test, and Australia had the sixth largest percentage at 13.7\\% opting to do so. In a technology-rich problem solving environment, Australia finished two nations below the international average, just behind . The survey says e-commerce grew by more than a factor of eight by 2008 from the levels that existed in 2001. By 2010, over 60\\% of Australians had access to the . The results are based on a survey of 166,000 adults from Australia, Austria, Flanders, Canada, the Czech Republic, Denmark, Estonia, Finland, , Germany, , , , , the Netherlands, Norway, Poland, , , Sweden, , , the , Cyprus, and . They survey was conducted from August 2011 to March 2012, with the exceptions of Canada where data was collected from November 2011 to June 2012, and France from September to November 2012.", "after_revision": "Members of the OECD On Tuesday the Organisation for Economic Co-operation and Development (OECD), a 34 member international economic organization founded in 1961 that traces its origins back to the World War II-era , published results on the state of adult skills in 24 countries, most of them European. Australia had mixed rankings for literacy and numeracy amongst adults, finishing amongst the top for literacy and in the middle for numeracy. Internationally, Australia ranks fourth amongst surveyed countries for literacy proficiency amongst adults. At the highest proficiency level, level 5, Australia ranks as the second highest percentage of surveyed nations at 1.3\\%. It is tied with the Netherlands. Only Finland is higher at 2.2\\%. Readers at this level synthesize text, compare and contrasts ideas and points of view, and process information across multiple sources. Australia, at 9.4\\%, has one of the smallest percentages of their population at reading proficiency level 1. This means adults have a basic understanding of what they read, can fill out forms and can understanding the meaning of sentences. Overall, Australia's mean reading proficiency score puts them on par with Norway and Sweden . When scores are adjusted for non-response, Australia is on par with Estonia . Amongst young adults aged 16 to 24 years, Australia ranks seventh amongst surveyed countries, with a mean score comparable to the Czech Republic , Estonia, Germany, Poland , Sweden, and the region of Belgium . The Australian data said adult literacy skills did not strongly impact on social inequality, and literacy is not a barrier to social mobility. This contrasts to some other countries like the United States where literacy skills correlate to social mobility. Further, it shows an adult's socio-economic background is not tied very strongly to skills proficiency. Australia ranks thirteenth amongst all surveyed countries in numeracy proficiency amongst adults aged 16 to 65 years. The country's mean score is comparable to Canada . Australia's relative high international performance in literacy and low performance in numeracy buck international trends. When only 16 to 24 year-olds are looked at, Australia's numeracy ranking falls one position and puts their performance comparable to Canada, Denmark , Norway, Poland, and Cyprus . In proficiency at problem solving, Australia finishes sixth amongst surveyed nations. Adults were allowed to opt out of using computers for this test, and Australia had the sixth largest percentage at 13.7\\% opting to do so. In a technology-rich problem solving environment, Australia finished two nations below the international average, just behind Austria . The survey says e-commerce grew by more than a factor of eight by 2008 from the levels that existed in 2001. By 2010, over 60\\% of Australians had access to the Internet . The results are based on a survey of 166,000 adults from Australia, Austria, Flanders, Canada, the Czech Republic, Denmark, Estonia, Finland, France , Germany, Ireland, Italy, Japan, South Korea , the Netherlands, Norway, Poland, Slovakia, Spain , Sweden, England, Northern Ireland, the United States , Cyprus, and Russia . They survey was conducted from August 2011 to March 2012, with the exceptions of Canada where data was collected from November 2011 to June 2012, and France from September to November 2012.", "edit_actions": [{"type": "A", "before": null, "after": "Australia", "start_char_pos": 304, "end_char_pos": 304}, {"type": "R", "before": ". Only", "after": "Netherlands. Only Finland", "start_char_pos": 687, "end_char_pos": 693}, {"type": "R", "before": "and", "after": "Norway and Sweden", "start_char_pos": 1164, "end_char_pos": 1167}, {"type": "A", "before": null, "after": "Estonia", "start_char_pos": 1238, "end_char_pos": 1238}, {"type": "A", "before": null, "after": "Czech Republic", "start_char_pos": 1371, "end_char_pos": 1371}, {"type": "A", "before": null, "after": "Germany, Poland", "start_char_pos": 1383, "end_char_pos": 1383}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1386, "end_char_pos": 1387}, {"type": "A", "before": null, "after": "Belgium", "start_char_pos": 1414, "end_char_pos": 1414}, {"type": "A", "before": null, "after": "United States", "start_char_pos": 1608, "end_char_pos": 1608}, {"type": "A", "before": null, "after": "Canada", "start_char_pos": 1925, "end_char_pos": 1925}, {"type": "A", "before": null, "after": "Denmark", "start_char_pos": 2192, "end_char_pos": 2192}, {"type": "A", "before": null, "after": "Cyprus", "start_char_pos": 2215, "end_char_pos": 2215}, {"type": "A", "before": null, "after": "Austria", "start_char_pos": 2569, "end_char_pos": 2569}, {"type": "A", "before": null, "after": "Internet", "start_char_pos": 2733, "end_char_pos": 2733}, {"type": "A", "before": null, "after": "France", "start_char_pos": 2878, "end_char_pos": 2878}, {"type": "A", "before": null, "after": "Ireland, Italy, Japan, South Korea", "start_char_pos": 2890, "end_char_pos": 2890}, {"type": "D", "before": ", , ,", "after": null, "start_char_pos": 2893, "end_char_pos": 2898}, {"type": "A", "before": null, "after": "Slovakia, Spain", "start_char_pos": 2932, "end_char_pos": 2932}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2935, "end_char_pos": 2936}, {"type": "A", "before": null, "after": "England, Northern Ireland, the United States", "start_char_pos": 2945, "end_char_pos": 2945}, {"type": "D", "before": ", the ,", "after": null, "start_char_pos": 2948, "end_char_pos": 2955}, {"type": "A", "before": null, "after": "Russia", "start_char_pos": 2968, "end_char_pos": 2968}], "sents_char_pos": [0, 436, 544, 666, 688, 713, 849, 958, 1089, 1169, 1416, 1559, 1660, 1764, 1882, 1927, 2050, 2217, 2303, 2442, 2571, 2680, 2735, 2970]}
+{"doc_id": "84320", "revision_depth": "1", "before_revision": "Igor Moiseyev in 1932 Igor Moiseyev , who has been widely acclaimed as the greatest 20th-century choreographer of folk dance has died today after a long illness. He was 101 years old. Born Igor Alexandrovich Moiseyev on January 21, 1906 in Kiev , Moiseyev graduated from the Bolshoi Theatre ballet school in 1924 and danced in the theatre until 1939. His first choreography in the Bolshoi was Footballer in 1930 and the last was Spartacus in 1954. Since the early 1930s, he staged acrobatic parades on Red Square and finally came up with the idea of establishing the Theatre of Folk Art. In 1936, Vyacheslav Molotov put him in charge of the new dance company, which has since been known as the Moiseyev Ballet. Among about 200 dances he created for his company, some humorously represented the game of football and guerrilla warfare . After visiting Belarus he choreographed a Belarusian \"folk\" dance Bulba (\"Potato\"), which over the years indeed became a Belarusian folk dance. According to the Encyclop\u00e6dia Britannica , Moiseyev's work has been especially admired \"for the balance that it maintained between authentic folk dance and theatrical effectiveness\". Moiseyev was named People's Artist of the USSR in 1953, Hero of Socialist Labor in 1976, received the Lenin Prize (1967, for the dance show A Road to the Dance), four USSR State Prizes (1942, 1947, 1952, 1985), Russian Federation State Prize (1996), was awarded numerous orders and medals of the Soviet Union, Spain and many other countries. On the day of his centenary, Moiseyev became the first Russian to receive Order for the Merits before the Fatherland, 1st class \u2014 the highest civilian decoration of the Russian Federation .", "after_revision": "Igor Moiseyev in 1932 , who has been widely acclaimed as the greatest 20th-century choreographer of , has died today after a long illness. He was 101 years old. Born Igor Alexandrovich Moiseyev on January 21, 1906 in , Moiseyev graduated from the school in 1924 and danced in the theatre until 1939. His first choreography in the Bolshoi was Footballer in 1930 and the last was in 1954. Since the early 1930s, he staged acrobatic on and finally came up with the idea of establishing the Theatre of Folk Art. In 1936, put him in charge of the new dance company, which has since been known as the Moiseyev Ballet. Among about 200 dances he created for his company, some humorously represented the game of and . After visiting Belarus he choreographed a Belarusian \"folk\" dance (\"Potato\"), which over the years indeed became a Belarusian folk dance. According to the , Moiseyev's work has been especially admired \"for the balance that it maintained between authentic folk dance and theatrical effectiveness\". Moiseyev was named in 1953, in 1976, received the (1967, for the dance show A Road to the Dance), four (1942, 1947, 1952, 1985), Russian Federation State Prize (1996), was awarded numerous orders and medals of the Soviet Union, Spain , and many other countries. On the day of his centenary, Moiseyev became the first Russian to receive Order for the Merits before the Fatherland, 1st class \u2014 the highest civilian decoration of the .", "edit_actions": [{"type": "D", "before": "Igor Moiseyev", "after": null, "start_char_pos": 22, "end_char_pos": 35}, {"type": "R", "before": "folk dance", "after": ",", "start_char_pos": 114, "end_char_pos": 124}, {"type": "D", "before": "Kiev", "after": null, "start_char_pos": 240, "end_char_pos": 244}, {"type": "D", "before": "Bolshoi Theatre ballet", "after": null, "start_char_pos": 275, "end_char_pos": 297}, {"type": "D", "before": "Spartacus", "after": null, "start_char_pos": 429, "end_char_pos": 438}, {"type": "R", "before": "parades on Red Square", "after": "on", "start_char_pos": 491, "end_char_pos": 512}, {"type": "D", "before": "Vyacheslav Molotov", "after": null, "start_char_pos": 597, "end_char_pos": 615}, {"type": "R", "before": "football and guerrilla warfare", "after": "and", "start_char_pos": 802, "end_char_pos": 832}, {"type": "D", "before": "Bulba", "after": null, "start_char_pos": 901, "end_char_pos": 906}, {"type": "D", "before": "Encyclop\u00e6dia Britannica", "after": null, "start_char_pos": 996, "end_char_pos": 1019}, {"type": "D", "before": "People's Artist of the USSR", "after": null, "start_char_pos": 1181, "end_char_pos": 1208}, {"type": "D", "before": "Hero of Socialist Labor", "after": null, "start_char_pos": 1218, "end_char_pos": 1241}, {"type": "D", "before": "Lenin Prize", "after": null, "start_char_pos": 1264, "end_char_pos": 1275}, {"type": "D", "before": "USSR State Prizes", "after": null, "start_char_pos": 1329, "end_char_pos": 1346}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1478, "end_char_pos": 1478}, {"type": "D", "before": "Russian Federation", "after": null, "start_char_pos": 1674, "end_char_pos": 1692}], "sents_char_pos": [0, 161, 183, 350, 447, 587, 710, 978, 1161, 1504]}
+{"doc_id": "84471", "revision_depth": "1", "before_revision": "350px|Peter H. Gilmore: \"Satanism begins with atheism. We begin with the universe and say, \u201cIt \u2019 s indifferent. There \u2019 s no God, there \u2019 s no Devil. No one cares!\u201d So you then have to make a decision that places yourself at the center of your own subjective universe, because of course we can \u2019 t have any kind of objective contact with everything that exists. That \u2019 s rather arrogant and delusional...\"All photos: David ShankboneIn the 1980's and the 1990's there were multiple allegations of sexual abuse of children or non-consenting adults in the context of Satanic rituals that has come to be known as The Satanic Panic . In the United States, the Kern County child abuse cases, McMartin preschool trial and the West Memphis 3 cases garnered worldwide media coverage. One case took place in Jordan , Minnesota, when children made allegations of manufacturing child pornography, ritualistic animal sacrifice, coprophagia, urophagia and infanticide , at which point the Federal Bureau of Investigation was alerted. Twenty-four adults were arrested and charged with acts of sexual abuse, child pornography and other crimes related to satanic ritual abuse; only three went to trial with two acquittals and one conviction. Supreme Court Justice Scalia noted in a discussion of the case, \"[t]here is no doubt that some sexual abuse took place in Jordan; but there is no reason to believe it was as widespread as charged,\" and cited the repeated, coercive techniques used by the investigators as damaging to the investigation. One of the most visible Satanic organizations\u2014though one that was never a suspect or charged in any of the Satanic Panic cases\u2014is the Church of Satan , founded by Anton LaVey . Members of the Church, such as Peter H. Gilmore, Peggy Nadramia, Boyd Rice, Adam Parfrey , Diabolos Rex, and musician King Diamond , were active in media appearances to refute allegations of criminal activity and the FBI would later issue an official report debunking the criminal conspiracy theories of this time. Gilmore feels Satanists are often misunderstood or misrepresented. LaVey's teachings are based on individualism , self-indulgence, and \" eye for an eye \" morality, with influence from Friedrich Nietzsche and Ayn Rand ; while its rituals and magic draw heavily from occultists such as Aleister Crowley . They do not worship\u2014nor believe in\u2014the Devil or a Christian notion of Satan . The word \"Satan\" comes from the Hebrew word for \"adversary\" and originated from the Abrahamic faiths, being traditionally applied to an angel. Church of Satan adherents see themselves as truth-seekers, adversaries and skeptics of the religious world around them. On a windy October day in Central Park , Wikinews reporter David Shankbone sat down with the High Priest of the Church, Peter H. Gilmore , who has led LaVey's congregation of Satanists since his passing in 1997 (he became the High Priest in 2001). They discussed the beliefs of the Church, current events, LaVey's children and how Satanism applies to life and the world. David Shankbone: What is your relationship to Theistic Satanists ? Peter H. Gilmore: We don \u2019 t think they are Satanists. They are devil worshipers, as far as I\u2019m concerned. DS: There is one in New York who does a lot of websites.PG: Diane Vera? She \u2019 s a kook.DS: She \u2019 s also an editor on Wikipedia. I contacted her, but I never received a response. PG: My real feeling is that anybody who believes in supernatural entities on some level is insane. Whether they believe in The Devil or God, they are abdicating reason. If they really believe they are in communication with some sort of interventionist deity\u2026you know, somebody can be a deist and think that maybe there was some sort of force that launched everything and now has nothing to do with it. That \u2019 s not anything you can prove. It \u2019 s also not a matter of faith. It \u2019 s a matter of making a choice between whether there was something or there wasn \u2019 t. I think maybe that is the most rational decision. I think science makes it look otherwise, but I don \u2019 t think somebody like that is mad. But anybody who believes in some kind of existence in deity or spirits or anything that intervenes in their life is not somebody I hold in any kind of esteem. DS: Have you had much interaction with the theistic Satanists?PG: No, I just have complete contempt for them and have no contact with them at all. If anybody does contact me and say they are a theistic Satanist we tell them to take a hike. [Laughs]. DS: Do you know what they think of you? PG: I have no idea and I could not care. I consider it lunatic and it \u2019 s Christian. If you want to believe in an existing devil then you probably believe in an existing God and you\u2019re really just a Christian heretic, you\u2019re not a Satanist. DS: What do you think is their motivation to worship a Christian Satan?PG: I really wouldn \u2019 t know, I\u2019d have to talk to them, but my supposition would be that they want to feel they are naughty on some level. If they really believe in these existing deities, then they have to decide what the values of them are. The Gnostics used to think that Jehovah was bad; the demiurge , and that the real God was something more in touch with what they thought humanity should be like. So, maybe these people think that Jehovah is evil and Satan is good. I just think it \u2019 s equally silly whether you believe in an Easter Bunny or Zeus\u2026it\u2019s just\u2026 irrational. Church of Satan 101David Shankbone: How would you define the word Satan ? Peter Gilmore: Satan is a model or a mode of behavior. Satan in Hebrew means \u201cadversary\u201d or \u201copposer\u201d ; one who questions. Since we generally are skeptical atheists, we question all spirituality. We believe that carnality is all that exists and the spiritual dimensions are fictional. So we stand against eastern and western religions that promote fictions, according to our perspectives. So we are adversaries. Satan to us is an exemplar. When we look at how he is portrayed by Mark Twain in Letters from the Earth , or Byron, or Milton\u2019s Paradise Lost , he ends up being an inspirational symbol to us. We say we would like to be more like that. We will not bow our heads; we will be independent. We will constantly question. DS: What is the Church of Satan?PG: Satanism begins with atheism . We begin with the universe and say, \u201cIt\u2019s indifferent. There\u2019s no God, there\u2019s no Devil. No one cares!\u201d So you then have to make a decision that places yourself at the center of your own subjective universe, because of course we can\u2019t have any kind of objective contact with everything that exists. That\u2019s rather arrogant and delusional, people who try to put things that way. So by making yourself the primary value in your life, you\u2019re your own God. By being your own God, you are comfortable about making your own decisions about what to value. What\u2019s positive to you, is good. What harms you, is evil. You extend it to things that you cherish and the people that you cherish. So it\u2019s actually very easy to see that it\u2019s a self-centered philosophy. But it also requires responsibility, since you are taking on for yourself the complete onus for your personal success or failure. You can \u2019 t be praying to a God or blaming a devil, or anyone else, for that matter, for what happens to you. It\u2019s on your own head. That\u2019s a challenge for most people. Most people tend to really feel that they want some kind of external support, that they are outward looking and might want some sort of supernatural parental figure, or even some sort of existing governmental authority, existing in their life.DS: Why do you think people are like that? PG: I think there are actually two kinds of people. There are the kind of people who need that, and the kind that don \u2019 t. The kind that don \u2019 t are the smaller percentage of our species. It\u2019s as simple as that. DS: Why do you think there are those who need to have a God or supernatural parental figure?PG: I think it\u2019s natural to them. I don \u2019 t think it is something developmental, but that it\u2019s just part of their own nature. That they feel a need for something above them, whether it be human or supernatural. And they can \u2019 t get away from that. DS: In the history of a lot of religions, a doctrine was developed by people who were oppressed as a way to explain their lot, and that their oppressors were going to \u201c get theirs in the end. \u201d That\u2019s where Karl Marx was saying religion is the opiate of the masses , because it creates complacency with oppression now because in some other ethereal dimension equality will be achieved. 350px|\"We Satanists look at the universe in this wonderful context of that\u2019s what we are part of and that\u2019s really exciting. We don \u2019 t need to single out any special part of it unless you find a place you really enjoy. The place you were born, perhaps, or the place you grew up.\" PG: Well, see the idea of the \u201cGod\u201d comes from the oppressors, and it\u2019s a way of controlling folks, by saying, \u201cI have communication with this authority figure but you can't. I\u2019m special.\u201d That\u2019s where priesthoods come in, but also governmental authorities and parties, let \u2019 s say the Communist Party or the Nazi Party at one point. They have the key to the way the universe should exist, and everyone needs to be subservient to them and take what they say as holy writ whether they are actually claiming it is divine or not. That\u2019s why so many of those fascist and totalitarian systems function like religions, because they put the leaders and whatever they wrote as some kind of scriptural authority that is not supposed to be debated or examined, but simply swallowed whole. Now some people might come up with a religious belief that may counter an existing system that will help them feel better about their underdog status, and then sometimes that develops into a major religion and sometimes it doesn \u2019 t. Sometimes it is crushed and snuffed out. That\u2019s natural to our species, that people have to find a way for dealing with their existence. The Satanist, we look at our existence and say, \u201cWe\u2019re not going to look for something outside of ourselves. We\u2019re going to be proactive.\" We\u2019ll go out there and try to make a change, and we\u2019ll deal pragmatically with whatever life situations we have. So the Satanist, regardless of where he is living and under what kind of conditions, he is going to try to find a way to make his life as good as it can be based upon his own abilities and the world around him. We don \u2019 t expect everybody in Satanism to be a genius, we expect people to take whatever they have by nature, and do the best with it. So in that sense, we challenge people who are our members; the only idealism we have is directed at ourselves. We try to look at ourselves and try to realize what our potential possibly could be, what talents do we have. And then we try to take those, through whatever work is needed, to take those as far as we can. DS: What would be their motivation for doing something for society and not for themselves? Would there even be a motivation?PG: Oh, absolutely! It\u2019s up for you to choose your own preferences. By being self-centered you can select your own values.DS: Like, I get value out of what I am doing for Wikimedia, even though it\u2019s for free, there is still a value\u2026 PG: Absolutely! What you\u2019re doing, David, is a Satanic example. The whole point of Satanism is again to choose your values, and if you become somebody that really feels you want to work for hospitals for free\u2014a number of our members work for animal organizations because we generally cherish animals and think they are far less polluted than people with values that are anti- their nature. So, Satanists are often very giving. Because our values come from the self, people who try to tell themselves that they must be selfless, they can \u2019 t really understand why you would be giving if you\u2019re a selfish person. But I think that\u2019s more a revelation of their own natures, meaning if they didn \u2019 t have some external force making them being nice to people, they would be bastards! We Satanists, because we are relaxed, we love our lives, we love people who enrich our lives and things that are around us that we enjoy, we can be really giving. Gods can be beneficent! So when you are your own God, you can be happy to give! DS: How would a Satanist define evil?PG: Evil is whatever is harmful to you and the things you most cherish. It \u2019 s that simple. DS: Some people have a compulsion to rape , and it harms them to not act upon it. If it was harmful for somebody to not go out and rape somebody, how would a Satanist address that situation? PG: We then have to go into the realm of society, and we believe that as animals that are social, we have a social contract . When we deal with other people, our approach is that we want to have maximum freedom, and maximum responsibility without infringing on people as much as possible. So we would set up laws so we really don \u2019 t have to spend all of our time defending our territory, being in some kind of castle keep situation. So anyone who is going to go out and assault undeserving people, is someone we would deem a criminal and have them locked up or dealt with in whatever way seems most appropriate, whether it\u2019s therapy, whether it\u2019s drugs, or if they can \u2019 t control themselves, execution . DS: Capital punishment is not antithetical to Satanism.PG: Not necessarily, but essentially we would rather shrink from the government having the power to take you and murder you, because we don \u2019 t have a lot of confidence in people being rational, or being truthful, and we have seen so often\u2014especially with DNA testing \u2014that a lot of people have been jailed and accused of murder and they were wrong. That\u2019s wrongful. So it\u2019s not this broad, \u201cWe accept capital punishment and it\u2019s fine!\u201dDS: \u201cSlaughter them all!\u201d [Laughs] PG: Right! But there are certain situations where it would be appropriate. Say, when Colin Ferguson shot all those people. There should be absolutely no time wasted on that. DS: But should it be the government doing it?PG: I think the government can have the ability but under control. There needs to be checks and balances . That whole idea in the United States that has come from so many other past forms of government is something we feel is necessary. We don \u2019 t want any form of megalomaniacal government with absolute power that can do anything willy-nilly to its citizens. Satanists are generally Libertarians . They may choose their specific political alliances because it might better whatever they are trying to do in their lives, but essentially most of us are fairly libertarian people. We would like to have government as minimal as possible.DS: Do you have a 10 Commandments? PG: We have the 9 Satanic Statements, but we don \u2019 t have commandments that are laws that are like sins. We have eleven sins that are kind of behaviors that we don \u2019 t want to be doing. For us, we try to create a situation where we have some social interaction with people that can be beneficial for ourselves. But we don \u2019 t set up these kinds of laws that somebody is going to punish you for. So with Satanism they are things where you kick yourself and say, \u201cWhy did I do something stupid? I shouldn \u2019 t do that next time.\u201d It \u2019 s better for you. It doesn \u2019 t matter about anybody else on that level: you\u2019ve got to not be an ass. DS: Are there certain sites or places that are important to the Church of Satan?PG: No, we don \u2019 t really have any holy ground or anything like that. For the Satanist, if there is any kind of architecture you like, or a place you like to visit\u2014some people like places with devil themes or where there is historical interest. But there is nothing particularly Satanic about any location. DS: No place with a natural significance? PG: Well, it\u2019s the universe. We look at it like Carl Sagan and we are star stuff, we are made of the stuff of exploding stars. We Satanists look at the universe in this wonderful context of that\u2019s what we are part of and that\u2019s really exciting. We don \u2019 t need to single out any special part of it unless you find a place you really enjoy. The place you were born, perhaps, or the place you grew up. Some people are interested in a historical figure and say the place where a castle was built or a particular battle was fought, or some individual took a last stand. DS: If someone wanted to explore your beliefs, what should they read?PG: The Satanic Bible is the place to start, because that is the foundational literature for the organization. All of Anton LaVey\u2019s books are worth reading. The Satanic Witch is his compendium of Lesser Magic , which is our concept for how you manipulate people on a day-to-day basis to get them to do things in your favor. It\u2019s geared toward women because we think it\u2019s fine for women to use their sexuality to get what they want. It\u2019s part of nature, so go ahead! Dress for success! But it works for guys, too. Whatever you have to charm people. Glamor is worthwhile, so The Satanic Witch is useful for that. He\u2019s got collections of essays, too, and The Satanic Rituals is more for a formal setting, where different cultures were examined to see what kind of diabolical imagery was in them. Rituals can be fun to do in a large group setting; but they\u2019re not anything you have to do. Here\u2019s a Russian one, here\u2019s a French one; here\u2019s a German one. Here \u2019s a Black Mass \u2014what would that be like? In Satanism a Black Mass is not something we are running out and eager to do because as far as we\u2019re concerned, Christianity is a dead horse, unless in your life you feel there has been this really negative Christian influence that you need to purge, it\u2019s just kind of pointless. And my book, The Satanic Scriptures , is worth reading, because it ties up where we have been, where we are now, and where we are going. So if you only picked two, I would say read The Satanic Bible and The Satanic Scriptures, because then you\u2019ll have the book ends of the over forty year span of the Church of Satan. On current events and politicsDS: I\u2019d like to give you some political situations and ask how a Satanist would handle them. PG: Okay, but I want to preface that and say we don \u2019 t really determine people\u2019s political backgrounds. We feel that each Satanist who is a member of the church must make those decisions based upon their own personal values, so there can be a wide range of answers depending upon the people you talk to, whether it be abortion, governmental decisions of going to war\u2026 DS: You can just speak for yourself, then. If you were President \u2014PG: \u2014[Laughs]\u2014DS: \u2014How would you handle the Israeli-Palestinian issue ? PG: I don \u2019 t have a solution for that. If I did, I would be out there telling people about it, because I don \u2019 t really see myself as a politician or arbiter of people\u2019s interactions with each other. I can see that there are issues on both sides of the fence and that when people are fighting over a territory, generally speaking the folks who have the power win and then they write the histories and the world moves on. But we have a situation here where there are bigger players behind the smaller nations, and it keeps this conflict enduring. So they will either have to have compromise and discussion, or one side will have to destroy the other side and \u201cwin\u201d and then move on, which is usually the way the world works. DS: Where do they violate Satanic principles in that conflict?PG: Each have their own goals. I would say killing people who are just innocent folks, that\u2019s against Satanic philosophy. Terrorism , specifically, is against Satanism because we feel that justice is important, and that is giving people what they deserve. Blowing up somebody who is just wandering around is not a just approach. That\u2019s something against the social contract, and we would oppose people engaging in terrorism.DS: What about Same-sex marriage ? PG: Absolutely support it. DS: Abortion?PG: I think people should practice birth control rather than use abortion as an easy way out. Again, the concept of being responsible for yourself and not to willy-nilly get pregnant unless you are really interested in carrying forth the child. Since we have overpopulation generally speaking, I think abortion is something fine to be used, but I think it should not be used as a means of cleaning up after people\u2019s irresponsible sexual activity. DS: Why do you not consider it just another operation? Some people run or exercise not realizing their limitations and pull a muscle or need an operation for that. PG: I would look at it as if I was the fetus, I wouldn \u2019 t want to be snuffed out. [Laughs] DS: So is the fetus a sentient being ?PG: Not necessarily, it\u2019s just a piece of tissue and most human life doesn \u2019 t really have that much value on a grand scale. In the universe, individual life is practically meaningless, it\u2019s sort of like droplets in a wave that crashes against a rock. Who cares about the droplets? The way life works is it is making large amounts of species of whatever it is, and it keeps moving biologically. I would just think that if it was myself as the fetus, I have a potential to become the person that I am. I wouldn \u2019 t want to be snuffed out.DS: When do you think life begins? PG: Life is there, whether it is conscious and valuable is debatable. DS: You mean just on a cellular level it is functioning?PG: Yeah, it is life. Sperms and eggs are alive, they \u2019 re organic, you can \u2019 t say that is not life. But what I think you\u2019re looking for is the idea that Christians wants to say from conception . If people want to have abortions it really doesn \u2019 t bother me, I just think they really should be more responsible. It just makes more sense. Contraception is easy! DS: A lot of people don \u2019 t like contraception. PG: And a lot of people are morons and irresponsible, so\u2014 DS: But then doesn \u2019 t responsibility come down to defining it for yourself in Satanism? Your statements seem to come down to a baseline level of what is responsibility? What is innocence? Whereas you were saying earlier that a lot of these things are self-referentially defined.PG: Right, right. We allow people to make that definition for themselves, absolutely. But for me personally, you try to deal with other people around you so that you don \u2019 t make their lives miserable unless there is some real overriding reason that would have to happen.DS: Who are you supporting for President? PG: Nobody, yet! [Laughs]. Right now, there is not really one candidate that speaks to me more than others. I generally feel that so many candidates are lacking in so many ways, that it really IS the lesser of multiple evils that you are picking. I like the old Lovecraftian t-shirt: \u201cCthulu for President! Why choose the lesser of two evils? \u201d [Laughs] DS: If you had a choice between Giuliani and Clinton ?PG: I would probably go with Hillary Clinton. Giuliani was acting like such a fascist before 9/11. He was trying to use his Catholicism to control art that was exhibited in this city. It was unbelievable! His popularity was really down. It wasn \u2019 t until 9/11 that he stepped up and did things that were required to be a leader and make people feel more comfortable that his ratings shot back up, but he was really not somebody who was well regarded back then.DS: That\u2019s talked about now more than it used to be. PG: It should be now that he is running for President. People need to mention that! DS: It\u2019s a question of how much it will penetrate the American consciousness that has mythologized him.PG: That\u2019s the thing: he really was so mythologized at that point. We build heroes, and so many people really do deal with idealistic portrayals and not realistic ones. We have to examine these things all the time and be careful. Religious and Satanic symbolsDS: Could you explain your logo? PG: The Sigil of Baphomet . Heavy metal people say \u201cBapho-MAY!\u201d Because they want to take it from the French Templars , where it originally came from the trials of them. But we explain it as there is a goat face in the center of a five-pointed star. The goat face represents carnality. In ancient Egypt goats were considered representations as god symbols of lust, and we think lust is an important factor of biology that keeps humanity going so we value that. The five-pointed star really comes from the Pythagoreans . That is the one figure in which every element is within the golden mean of each other. It\u2019s this wonderful mathematical symbol of perfection, organic perfection specifically. Since we are organic life and enjoy the idea of perfecting ourselves, that star is right for us in there and it perfectly fits the goat head inside. Now around it are two circles, one at the tip of the points of the star and one outside. In that are Hebrew characters starting at the bottom and going counter-clockwise spelling Leviathan . In Hebrew mythology, Leviathan was the great dragon of the abyss, this powerful Earth figure that even Yahweh was afraid of. So all these things taken together creates a symbol that Anton LaVey identified with Satanism specifically. When he started the Church of Satan, usually upside down crosses were considered Satanic, and he saw that these different elements and felt this was a positive symbol you could tie to the Satanism he was creating. DS: So much of the symbology references a lot of myths and superstitions, yet you\u2019re antithetical to that. How do you explain how those two notions comport?PG: We have this approach that we take the dualities and find a third side to it, a way of integrating. You might find that even in Marxist theory , a way of finding opposites and coming with a new synthesis of the different thesis and antithesis. So ritual is natural to people, because humans have a conceptual consciousness. Symbols let us hold much more information in conscious focus, more so than just keeping them separately. So symbols are something we function with. It\u2019s part of our nature. So using ritual activities that are symbolic and have deep meaning to us is common to our species if you look at our history from cave paintings up to every civilization currently existing.DS: It\u2019s almost difficult to come up with a symbol that doesn't reference a superstition in some way. PG: Absolutely! So we feel that since they are often used to support a fiction, why not let it be used to explore the inner part of our nature. For us, when we do ritual\u2014which we call greater magic\u2014we call it an intellectual decompression chamber. It\u2019s a place where we release our emotions, any emotions that are hindering us, and we use the symbolism we find most stimulating. We leave it in the ritual chamber. You enjoy the self-transformational psychodrama in the ritual where you release any emotions that are hindering yourself and then you go outside and basically pursue your life, being rational and doing what you need to do to make your life as rich as it can be. The Iraq War: A Satanic perspective DS: Do you think our pursuing the War in Iraq is an example of killing innocent people?PG: Oh, of course innocent people are being killed in almost any war. It doesn \u2019 t matter if it is just Iraq, because there are civilian populations who are caught between these people with agendas, and those civilians just want to live their lives. DS: Who are the innocents? PG: Not being involved in the particular conflict. If you are just living your life and doing what you need to do to survive, have a job, bringing in food for your family; that\u2019s being an innocent person. DS: How has the war in Iraq affected your worldview?PG: It hasn \u2019 t changed it in the least. I see it as human behavior as usual. History is full of aggressors. Iraq to me is an interesting place where there was a totalitarian holding in check religious factions, and now that cap has been removed, the religious factions want to destroy each other. I think it\u2019s a lesson for most people to say look at how these religions were important to people who are always looking above themselves to be regulated, and they found an Earthly regulator in Saddam Hussein, and now that that regulator who actually existed is gone, they are each looking to their own interpretations of their own deities and wanting to slaughter each other. It just shows how poisonous fundamentalist fanaticism can be, which to me is the most dangerous thing in all of human society. DS: That is what you consider the greatest threat to humanity? PG: Yes, any fundamentalist fanaticism is a vast threat. I\u2019m looking for humanity to have a secular, pluralistic culture. People should be able to follow whatever fantasies or religions they want, as long as they don \u2019 t impose them on other people and force other people into doing things based upon whatever kind of holy writ they have. So the biggest threat to that are these fundamentalists who want to force people into their belief systems. They want to destroy people who have sexual activity they don \u2019 t think is appropriate according to their texts. It will be interesting to see in the future if people will wake up to this threat and decide to somehow corral that kind of behavior, defang people like that who are basically on a jihad, whether they be Christians or Muslims or any other religion, because we\u2019ve seen in the past the Catholics were torturing people to death in the Inquisition, then the Reformation happened and different denominations and sects were killing each other. Heretics were being slaughtered. So this is not something just one religion is guilty of. On New York City DS: How do you feel about Hell\u2019s Kitchen , where you live, being called Clinton?PG: I despise that. It should stick to what it really is, and it\u2019s Hell\u2019s Kitchen.DS: When you see how New York is changing around you\u2014I\u2019ve lived here for close to seven years, and even when I moved here it was very different. PG: I like the sleaze, I like the history, I like to see New York being this amazing range of the highest and the lowest and I don \u2019 t think New York should be cleaned up and Disneyfied. DS: But it is.PG: It\u2019s getting there. I did a Black Mass for the BBC in the old Hellfire Club, and that\u2019s gone and Apple is putting up a store in that neighborhood. [Laughs] Everybody just feels safe walking around all the time now. There\u2019s still some parts of Chinatown that are still pretty rough. DS: Where do you think the culture is going to go? Is the sanitized version here to stay? PG: No, because if you look at anything that at one point is sleazy, at one it was new and spiffy and wonderful. So, at this point, New York is Manhattanland, it \u2019 s for tourists and we\u2019ve made this almost Las Vegas simulacrum of the whole thing. But it will change. As soon as the money isn \u2019 t worth pumping into it to keep up the fa\u00e7ade, all of the roughness around the edges will creep back in. It\u2019s still here, it just hides in the daytime. There\u2019s still all kinds of weird crime going on in the city when you watch the news. DS: You see that in all the old Rust Belt cities. Reading, Pennsylvania was one of the most dangerous cities I\u2019ve ever walked around in, and I thought, \u201cThis is what 1982 New York must have felt like.\u201dPG: Yeah, I moved down to New York in 1980\u2014that was pretty rough! [Laughs]DS: A friend of mine once said if you took someone from 1982 New York and you transplanted them into 2007 New York, the first thing they would say is, \u201cWhere did all these people come from?!\u201d That the streets just used to be barren back then. PG: I'm like that too. Where I live my view of the sunset is gone because two new luxury towers have gone up. They\u2019re building two additional ones. I don \u2019 t know who these people are or where they get all their money because they are charging $6,000 a month for these apartments, and I\u2019m thinking who is spending all this money and wandering around the city like it\u2019s a pedestrian mall that could be in any kind of suburbia. Marilyn Manson DS: Marilyn Manson is a member?PG: Yes, he \u2019 s a member who has been given an honorary priesthood. When asked about what Satanism is he can be very articulate in explaining it. But his own music is his own art. His stage shows are his own, and they don \u2019 t really exemplify Satanism in particular. DS: It\u2019s more of a character. PG: Yeah, he\u2019s created a character. We say people forget about past orthodoxies, something that was culturally popular or permeating at one point or another, people forget about that. What Brian Warner did was he looked at David Bowie and Alice Cooper and re-created and repackaged them, and made a fortune. DS: Is he an active member?PG: He\u2019s an honorary priest, but he does his own thing. If asked about our philosophies he can explain it. The interesting thing is when his first album came out the two of us met on a panel that we were doing about racism in music that was being sponsored by Seconds Magazine. Nobody knew who Brian Warner was at that point, and he came up to me and gave me a CD and he was all in costume. But he said \"I heard about you and I wanted to meet you,\" so we moved aside and talked for a little while and I learned he really did understand Satanism. I told Anton LaVey that this guy was pretty smart and this gimmick is going to do well; it\u2019s clever. He\u2019s using this serial killer and Hollywood star combination, and he\u2019s a smart guy and creating his own persona that is probably going to be successful. It took off immediately, and when Marilyn Manson was out on tour in California he asked if he could meet Anton LaVey and he was impressed. He is a really sweet and sincere guy, which has nothing to do with what all of the world sees in just his act and his art. On the church after Anton LaVeyDS: Does the Church of Satan have relationships with other churches? PG: Not at all. We\u2019re not ecumenical. DS: It would seem there are pagans or humanist religions that follow your general philosophy.PG: I wouldn \u2019 t say that. Most pagan religions are theistic on one level or another. They generally think their deities exist in some part. We don \u2019 t believe Satan exists as a deity. I think there are some pagans who may look at their Gods and Goddesses as archetypes only, and in that sense that would be closer to our position because you can look at the symbol of Satan as an archetype. But, we generally don \u2019 t feel we have any relation to any kind of religious organization.DS: What is the membership numbers for the Church of Satan? 350px|\"I\u2019m looking for humanity to have a secular, pluralistic culture. People should be able to follow whatever fantasies or religions they want, as long as they don \u2019 t impose them on other people and force other people into doing things based upon whatever kind of holy writ they have.\" PG: We never give out numbers. The reason for that our founder came up with and I agree with him and keep to his policy: if people think there are too few of us, they tend to not want to take us seriously. If they think there are too many of us, they think we\u2019re a threat. There was even a point back during the Satanic Panic in the late 1980\u2019s and early 1990\u2019s when there was governmental legislation proposed to ban Satanism because they thought there were all these metal heads out there sacrificing babies, doing drugs and making child pornography. Of course, now we know, it was mostly people who were borderline Christian evangelists pretending, but then accusing their own family members and getting them put in jail, or acting as therapists and most of those people have been sued and properly censured since then. DS: Has the church thrived after LaVey\u2019s passing?PG: It has. Partially because we are taking advantage of technology with the Internet and global media; our website gets hundreds of thousands of hits a day and literature keeps getting translated into many different languages the world over. My own book, The Satanic Scriptures, the hardcover came out in April and the paperback is coming out this month. I\u2019ve already got five different languages coming out and I\u2019m negotiating for others. We are thriving, we have many members.DS: What is your book about? PG: It\u2019s a collection of my essays I\u2019ve written over the past twenty years talking about Satanic philosophy, how it\u2019s applied. I talk about music since I am by training a composer; I went to NYU . I have a Bachelor\u2019s and Master\u2019s in music composition, mostly focusing on orchestral work. One conception in the book I wanted to dispel is the stereotype that Satanism is always associated with Metal and the cookie monster voice. That's Satanism? No. DS: It\u2019s not all Gene Loves Jezebel sounding.PG: No. Satanic music is specific to each person. So to me, Satanic music is the symphony, which to me is the highest art form. So Beethoven, Mahler, Bruckner, Shostakovich \u2014 to me that\u2019s some of the most Satanic music ever written because the architecture is there, the expressivity is there; the reflection on the human condition is all present and it\u2019s not idealistic. It\u2019s mostly questioning or showing what a human is capable of doing. And I love architecture. Cathedrals are wonderful. I have no hatred of those because they are put to religious use. They have symbols on them, but I know those are just symbols. I love skyscrapers too. Anton LaVey's children and estateDS: Do Dr. LaVey\u2019s children have anything to do with the church at all? PG: His son Xerxes is a member because he asked to be. We generally don \u2019 t let people under 18 join. We used to let people whose parents allowed them to join, but because people are so litigious we changed that. We just don \u2019 t want to take the chance that some parents say, \u201cYes, it\u2019s okay if my kid joins the Church of Satan,\u201d and then decides that\u2019s the reason they can \u2019 t control their kid. We\u2019re just not willing to go there. But if our members have children who are interested, they can participate and become members, but that\u2019s the only way you can if you\u2019re not legally an adult. So Xerxes could become a member because his mother was High Priestess at one point, and still remains a member. DS: But not Zeena ?PG: No, she left years ago. She\u2019s not very bright and is very jealous. She and her paramour, Nikolas Shreck , got married I think. They wanted to take the Church of Satan over at one point and wanted Anton LaVey to retire, but he was a feisty guy and said \"Hell no!\" So they quit in high dudgeon and ran off to Europe and said, \u201cAmerica is corrupt and horrible and we\u2019re going to Fortress Europa!\u201d They played with being Nazi occultists, which is kind of funny because both of them have Jewish blood. They\u2019re just like clowns. They then joined the Temple of Set , which was an organization that split off from the Church of Satan years ago, in 1975, when Michael Aquino \u2014DS: Based on the Egyptian god ? PG: Yeah, and they\u2019re theists. They believe that Set exists and that their priests can commune with him and that their founder is the voice of Set. So, it\u2019s like, good that they left for housecleaning. But Zeena went and joined them and became High Priestess because Michael Aquino has this Anton LaVey obsession, which is obvious since he wrote a book about him that \u2019 s about a thousand pages, so he made her the High Priestess of their organization. Then she left to form an even more orthodox Setian group called \u201cThe Storm\u201d, which to us is just funny. Such theatrics. His oldest daughter Karla isn\u2019 t a very bright girl. She kind of hung around the background and once in a while she would come out to speak in public and support her father. When Xerxes was born she kind of got miffed because she wasn \u2019 t the center of attention. Karla is also jealous type. She withdrew from her father, which hurt him a lot. DS: How did the legal wrangling surrounding his estate pan out?PG: They finally settled. What ended up happening is he had written a will. Anton LaVey \u2019 s idea was that if he acknowledged he is going to die, then he \u2019 d be giving in to death, so he didn \u2019 t want to go to an attorney and make out a will. He was very feisty and had his own perspective on that. So he finally wrote a will out and signed it, but it wasn \u2019 t notarized and there were no witnesses. So when it came to court they said it wasn \u2019 t good enough. They basically split everything up between the three children, so Karla and Zeena and Xerxes all got part of the estate. DS: Who received the copyright to The Satanic Bible? PG: The estate. The money that comes in from that gets split up and goes to the three kids. Also there is a small percentage that goes to LaVey \u2019 s companion, Diane Hegarty ; she says LaVey. But they were never married and had a falling out in the early 1980 \u2019 s. She went off and left Satanism and sued him for palimony and he had to sell his house because of all of that, and he sold it to an old friend and member. Diane got a pile of money and she got a tiny percentage of the books that had been written up to that point. Every once in a while she comes creeping in off the periphery to say, \u201cAh! I \u2019 m Diane LaVey!\u201d and it \u2019 s like, you were Diane Hegarty and you were kind of involved in it, but before the Satanic Panic happened you left and had nothing to do with it. She was never someone who wrote or said anything of interest. She was just the pretty blonde wife of Anton LaVey. She was a nice figurehead, but wasn \u2019 t of much use beyond that.", "after_revision": "350px|Peter H. Gilmore: \"Satanism begins with atheism. We begin with the universe and say, \u201cIt ' s indifferent. There ' s no God, there ' s no Devil. No one cares!\u201d So you then have to make a decision that places yourself at the center of your own subjective universe, because of course we can ' t have any kind of objective contact with everything that exists. That ' s rather arrogant and delusional...\"All photos: David ShankboneIn the 1980's and the 1990's there were multiple allegations of sexual abuse of children or non-consenting adults in the context of Satanic rituals that has come to be known as . In the United States, the , and the cases garnered worldwide media coverage. One case took place in , Minnesota, when children made allegations of manufacturing child pornography, ritualistic animal sacrifice, , and , at which point the Federal Bureau of Investigation was alerted. Twenty-four adults were arrested and charged with acts of sexual abuse, child pornography and other crimes related to satanic ritual abuse; only three went to trial with two acquittals and one conviction. Supreme Court Justice Scalia noted in a discussion of the case, \"[t]here is no doubt that some sexual abuse took place in Jordan; but there is no reason to believe it was as widespread as charged,\" and cited the repeated, coercive techniques used by the investigators as damaging to the investigation. One of the most visible Satanic organizations\u2014though one that was never a suspect or charged in any of the Satanic Panic cases\u2014is the , founded by . Members of the Church, such as , , , , Diabolos Rex, and musician , were active in media appearances to refute allegations of criminal activity and the FBI would later issue an official report debunking the criminal conspiracy theories of this time. Gilmore feels Satanists are often misunderstood or misrepresented. LaVey's teachings are based on , self-indulgence, and \" \" morality, with influence from and ; while its rituals and draw heavily from such as . They do not worship\u2014nor believe in\u2014the Devil or a . The word \"Satan\" comes from the Hebrew word for \"adversary\" and originated from the Abrahamic faiths, being traditionally applied to an angel. Church of Satan adherents see themselves as truth-seekers, adversaries and skeptics of the religious world around them. On a windy October day in , Wikinews reporter David Shankbone sat down with the of the Church, , who has led LaVey's congregation of Satanists since his passing in 1997 (he became the High Priest in 2001). They discussed the beliefs of the Church, current events, LaVey's children and how Satanism applies to life and the world. David Shankbone: What is your relationship to ? Peter H. Gilmore: We don ' t think they are Satanists. They are devil worshipers, as far as I\u2019m concerned. DS: There is one in New York who does a lot of websites.PG: Diane Vera? She ' s a kook.DS: She ' s also an editor on Wikipedia. I contacted her, but I never received a response. PG: My real feeling is that anybody who believes in supernatural entities on some level is insane. Whether they believe in The Devil or God, they are abdicating reason. If they really believe they are in communication with some sort of interventionist deity\u2026you know, somebody can be a deist and think that maybe there was some sort of force that launched everything and now has nothing to do with it. That ' s not anything you can prove. It ' s also not a matter of faith. It ' s a matter of making a choice between whether there was something or there wasn ' t. I think maybe that is the most rational decision. I think science makes it look otherwise, but I don ' t think somebody like that is mad. But anybody who believes in some kind of existence in deity or spirits or anything that intervenes in their life is not somebody I hold in any kind of esteem. DS: Have you had much interaction with the theistic Satanists?PG: No, I just have complete contempt for them and have no contact with them at all. If anybody does contact me and say they are a theistic Satanist we tell them to take a hike. [Laughs]. DS: Do you know what they think of you? PG: I have no idea and I could not care. I consider it lunatic and it ' s Christian. If you want to believe in an existing devil then you probably believe in an existing God and you\u2019re really just a Christian heretic, you\u2019re not a Satanist. DS: What do you think is their motivation to worship a Christian Satan?PG: I really wouldn ' t know, I\u2019d have to talk to them, but my supposition would be that they want to feel they are naughty on some level. If they really believe in these existing deities, then they have to decide what the values of them are. The used to think that Jehovah was bad; the , and that the real God was something more in touch with what they thought humanity should be like. So, maybe these people think that Jehovah is evil and Satan is good. I just think it ' s equally silly whether you believe in an or ...it's just... irrational. Church of Satan 101David Shankbone: How would you define the word ? Peter Gilmore: Satan is a model or a mode of behavior. Satan in Hebrew means \"adversary\" or \"opposer\" ; one who questions. Since we generally are skeptical atheists, we question all spirituality. We believe that carnality is all that exists and the spiritual dimensions are fictional. So we stand against eastern and western religions that promote fictions, according to our perspectives. So we are adversaries. Satan to us is an exemplar. When we look at how he is portrayed by in , or Byron, or 's , he ends up being an inspirational symbol to us. We say we would like to be more like that. We will not bow our heads; we will be independent. We will constantly question. DS: What is the Church of Satan?PG: Satanism begins with . We begin with the universe and say, \u201cIt\u2019s indifferent. There\u2019s no God, there\u2019s no Devil. No one cares!\u201d So you then have to make a decision that places yourself at the center of your own subjective universe, because of course we can\u2019t have any kind of objective contact with everything that exists. That\u2019s rather arrogant and delusional, people who try to put things that way. So by making yourself the primary value in your life, you\u2019re your own God. By being your own God, you are comfortable about making your own decisions about what to value. What\u2019s positive to you, is good. What harms you, is evil. You extend it to things that you cherish and the people that you cherish. So it\u2019s actually very easy to see that it\u2019s a self-centered philosophy. But it also requires responsibility, since you are taking on for yourself the complete onus for your personal success or failure. You can ' t be praying to a God or blaming a devil, or anyone else, for that matter, for what happens to you. It\u2019s on your own head. That\u2019s a challenge for most people. Most people tend to really feel that they want some kind of external support, that they are outward looking and might want some sort of supernatural parental figure, or even some sort of existing governmental authority, existing in their life.DS: Why do you think people are like that? PG: I think there are actually two kinds of people. There are the kind of people who need that, and the kind that don ' t. The kind that don ' t are the smaller percentage of our species. It\u2019s as simple as that. DS: Why do you think there are those who need to have a God or supernatural parental figure?PG: I think it\u2019s natural to them. I don ' t think it is something developmental, but that it\u2019s just part of their own nature. That they feel a need for something above them, whether it be human or supernatural. And they can ' t get away from that. DS: In the history of a lot of religions, a doctrine was developed by people who were oppressed as a way to explain their lot, and that their oppressors were going to \" get theirs in the end. \" That\u2019s where was saying religion is the , because it creates complacency with oppression now because in some other ethereal dimension equality will be achieved. 350px|\"We Satanists look at the universe in this wonderful context of that\u2019s what we are part of and that\u2019s really exciting. We don ' t need to single out any special part of it unless you find a place you really enjoy. The place you were born, perhaps, or the place you grew up.\" PG: Well, see the idea of the \u201cGod\u201d comes from the oppressors, and it\u2019s a way of controlling folks, by saying, \u201cI have communication with this authority figure but you can't. I\u2019m special.\u201d That\u2019s where priesthoods come in, but also governmental authorities and parties, let ' s say the or the at one point. They have the key to the way the universe should exist, and everyone needs to be subservient to them and take what they say as holy writ whether they are actually claiming it is divine or not. That\u2019s why so many of those fascist and totalitarian systems function like religions, because they put the leaders and whatever they wrote as some kind of scriptural authority that is not supposed to be debated or examined, but simply swallowed whole. Now some people might come up with a religious belief that may counter an existing system that will help them feel better about their underdog status, and then sometimes that develops into a major religion and sometimes it doesn ' t. Sometimes it is crushed and snuffed out. That\u2019s natural to our species, that people have to find a way for dealing with their existence. The Satanist, we look at our existence and say, \u201cWe\u2019re not going to look for something outside of ourselves. We\u2019re going to be proactive.\" We\u2019ll go out there and try to make a change, and we\u2019ll deal pragmatically with whatever life situations we have. So the Satanist, regardless of where he is living and under what kind of conditions, he is going to try to find a way to make his life as good as it can be based upon his own abilities and the world around him. We don ' t expect everybody in Satanism to be a genius, we expect people to take whatever they have by nature, and do the best with it. So in that sense, we challenge people who are our members; the only idealism we have is directed at ourselves. We try to look at ourselves and try to realize what our potential possibly could be, what talents do we have. And then we try to take those, through whatever work is needed, to take those as far as we can. DS: What would be their motivation for doing something for society and not for themselves? Would there even be a motivation?PG: Oh, absolutely! It\u2019s up for you to choose your own preferences. By being self-centered you can select your own values.DS: Like, I get value out of what I am doing for Wikimedia, even though it\u2019s for free, there is still a value\u2026 PG: Absolutely! What you\u2019re doing, David, is a Satanic example. The whole point of Satanism is again to choose your values, and if you become somebody that really feels you want to work for hospitals for free\u2014a number of our members work for animal organizations because we generally cherish animals and think they are far less polluted than people with values that are anti- their nature. So, Satanists are often very giving. Because our values come from the self, people who try to tell themselves that they must be selfless, they can ' t really understand why you would be giving if you\u2019re a selfish person. But I think that\u2019s more a revelation of their own natures, meaning if they didn ' t have some external force making them being nice to people, they would be bastards! We Satanists, because we are relaxed, we love our lives, we love people who enrich our lives and things that are around us that we enjoy, we can be really giving. Gods can be beneficent! So when you are your own God, you can be happy to give! DS: How would a Satanist define evil?PG: is whatever is harmful to you and the things you most cherish. It ' s that simple. DS: Some people have a compulsion to , and it harms them to not act upon it. If it was harmful for somebody to not go out and rape somebody, how would a Satanist address that situation? PG: We then have to go into the realm of society, and we believe that as animals that are social, we have a . When we deal with other people, our approach is that we want to have maximum freedom, and maximum responsibility without infringing on people as much as possible. So we would set up laws so we really don ' t have to spend all of our time defending our territory, being in some kind of castle keep situation. So anyone who is going to go out and assault undeserving people, is someone we would deem a criminal and have them locked up or dealt with in whatever way seems most appropriate, whether it\u2019s therapy, whether it\u2019s drugs, or if they can ' t control themselves, . DS: Capital punishment is not antithetical to Satanism.PG: Not necessarily, but essentially we would rather shrink from the government having the power to take you and murder you, because we don ' t have a lot of confidence in people being rational, or being truthful, and we have seen so often\u2014especially with \u2014that a lot of people have been jailed and accused of and they were wrong. That\u2019s wrongful. So it\u2019s not this broad, \u201cWe accept capital punishment and it\u2019s fine!\u201dDS: \u201cSlaughter them all!\u201d [Laughs] PG: Right! But there are certain situations where it would be appropriate. Say, when shot all those people. There should be absolutely no time wasted on that. DS: But should it be the government doing it?PG: I think the government can have the ability but under control. There needs to be . That whole idea in the United States that has come from so many other past forms of government is something we feel is necessary. We don ' t want any form of government with absolute power that can do anything willy-nilly to its citizens. Satanists are generally . They may choose their specific political alliances because it might better whatever they are trying to do in their lives, but essentially most of us are fairly libertarian people. We would like to have government as minimal as possible.DS: Do you have a 10 Commandments? PG: We have the 9 Satanic Statements, but we don ' t have commandments that are laws that are like sins. We have eleven sins that are kind of behaviors that we don ' t want to be doing. For us, we try to create a situation where we have some social interaction with people that can be beneficial for ourselves. But we don ' t set up these kinds of laws that somebody is going to punish you for. So with Satanism they are things where you kick yourself and say, \u201cWhy did I do something stupid? I shouldn ' t do that next time.\u201d It ' s better for you. It doesn ' t matter about anybody else on that level: you\u2019ve got to not be an ass. DS: Are there certain sites or places that are important to the Church of Satan?PG: No, we don ' t really have any holy ground or anything like that. For the Satanist, if there is any kind of architecture you like, or a place you like to visit\u2014some people like places with devil themes or where there is historical interest. But there is nothing particularly Satanic about any location. DS: No place with a natural significance? PG: Well, it\u2019s the universe. We look at it like and we are star stuff, we are made of the stuff of exploding stars. We Satanists look at the universe in this wonderful context of that\u2019s what we are part of and that\u2019s really exciting. We don ' t need to single out any special part of it unless you find a place you really enjoy. The place you were born, perhaps, or the place you grew up. Some people are interested in a historical figure and say the place where a castle was built or a particular battle was fought, or some individual took a last stand. DS: If someone wanted to explore your beliefs, what should they read?PG: is the place to start, because that is the foundational literature for the organization. All of Anton LaVey\u2019s books are worth reading. is his compendium of , which is our concept for how you manipulate people on a day-to-day basis to get them to do things in your favor. It\u2019s geared toward women because we think it\u2019s fine for women to use their to get what they want. It\u2019s part of nature, so go ahead! Dress for success! But it works for guys, too. Whatever you have to charm people. Glamor is worthwhile, so The Satanic Witch is useful for that. He\u2019s got collections of essays, too, and is more for a formal setting, where different cultures were examined to see what kind of diabolical imagery was in them. Rituals can be fun to do in a large group setting; but they\u2019re not anything you have to do. Here\u2019s a Russian one, here\u2019s a French one; here\u2019s a German one. Here 's a \u2014what would that be like? In Satanism a Black Mass is not something we are running out and eager to do because as far as we\u2019re concerned, Christianity is a dead horse, unless in your life you feel there has been this really negative Christian influence that you need to purge, it\u2019s just kind of pointless. And my book, , is worth reading, because it ties up where we have been, where we are now, and where we are going. So if you only picked two, I would say read The Satanic Bible and The Satanic Scriptures, because then you\u2019ll have the book ends of the over forty year span of the Church of Satan. On current events and politicsDS: I\u2019d like to give you some political situations and ask how a Satanist would handle them. PG: Okay, but I want to preface that and say we don ' t really determine people\u2019s political backgrounds. We feel that each Satanist who is a member of the church must make those decisions based upon their own personal values, so there can be a wide range of answers depending upon the people you talk to, whether it be abortion, governmental decisions of going to war\u2026 DS: You can just speak for yourself, then. If you were \u2014PG: \u2014[Laughs]\u2014DS: \u2014How would you handle the ? PG: I don ' t have a solution for that. If I did, I would be out there telling people about it, because I don ' t really see myself as a politician or arbiter of people\u2019s interactions with each other. I can see that there are issues on both sides of the fence and that when people are fighting over a territory, generally speaking the folks who have the power win and then they write the histories and the world moves on. But we have a situation here where there are bigger players behind the smaller nations, and it keeps this conflict enduring. So they will either have to have compromise and discussion, or one side will have to destroy the other side and \"win\" and then move on, which is usually the way the world works. DS: Where do they violate Satanic principles in that conflict?PG: Each have their own goals. I would say killing people who are just innocent folks, that\u2019s against Satanic philosophy. , specifically, is against Satanism because we feel that is important, and that is giving people what they deserve. Blowing up somebody who is just wandering around is not a just approach. That\u2019s something against the social contract, and we would oppose people engaging in terrorism.DS: What about ? PG: Absolutely support it. DS: Abortion?PG: I think people should practice rather than use abortion as an easy way out. Again, the concept of being responsible for yourself and not to willy-nilly get pregnant unless you are really interested in carrying forth the child. Since we have overpopulation generally speaking, I think abortion is something fine to be used, but I think it should not be used as a means of cleaning up after people\u2019s irresponsible sexual activity. DS: Why do you not consider it just another operation? Some people run or exercise not realizing their limitations and pull a muscle or need an operation for that. PG: I would look at it as if I was the fetus, I wouldn ' t want to be snuffed out. [Laughs] DS: So is the fetus a ?PG: Not necessarily, it\u2019s just a piece of tissue and most human life doesn ' t really have that much value on a grand scale. In the universe, individual life is practically meaningless, it\u2019s sort of like droplets in a wave that crashes against a rock. Who cares about the droplets? The way life works is it is making large amounts of species of whatever it is, and it keeps moving biologically. I would just think that if it was myself as the fetus, I have a potential to become the person that I am. I wouldn ' t want to be snuffed out.DS: When do you think life begins? PG: Life is there, whether it is conscious and valuable is debatable. DS: You mean just on a cellular level it is functioning?PG: Yeah, it is life. Sperms and eggs are alive, they ' re organic, you can ' t say that is not life. But what I think you\u2019re looking for is the idea that Christians wants to say from . If people want to have abortions it really doesn ' t bother me, I just think they really should be more responsible. It just makes more sense. Contraception is easy! DS: A lot of people don ' t like contraception. PG: And a lot of people are morons and irresponsible, so\u2014 DS: But then doesn ' t responsibility come down to defining it for yourself in Satanism? Your statements seem to come down to a baseline level of what is responsibility? What is innocence? Whereas you were saying earlier that a lot of these things are self-referentially defined.PG: Right, right. We allow people to make that definition for themselves, absolutely. But for me personally, you try to deal with other people around you so that you don ' t make their lives miserable unless there is some real overriding reason that would have to happen.DS: Who are you supporting for President? PG: Nobody, yet! [Laughs]. Right now, there is not really one candidate that speaks to me more than others. I generally feel that so many candidates are lacking in so many ways, that it really IS the lesser of multiple evils that you are picking. I like the old t-shirt: \" for President! Why choose the lesser of two evils? \" [Laughs] DS: If you had a choice between and ?PG: I would probably go with Hillary Clinton. Giuliani was acting like such a fascist before . He was trying to use his that was exhibited in this city. It was unbelievable! His popularity was really down. It wasn ' t until 9/11 that he stepped up and did things that were required to be a leader and make people feel more comfortable that his ratings shot back up, but he was really not somebody who was well regarded back then.DS: That\u2019s talked about now more than it used to be. PG: It should be now that he is running for President. People need to mention that! DS: It\u2019s a question of how much it will penetrate the American consciousness that has mythologized him.PG: That\u2019s the thing: he really was so mythologized at that point. We build heroes, and so many people really do deal with idealistic portrayals and not realistic ones. We have to examine these things all the time and be careful. Religious and Satanic symbolsDS: Could you explain your logo? PG: The . Heavy metal people say \u201cBapho-MAY!\u201d Because they want to take it from the French , where it originally came from the trials of them. But we explain it as there is a goat face in the center of a five-pointed star. The goat face represents carnality. In goats were considered representations as god symbols of lust, and we think lust is an important factor of biology that keeps humanity going so we value that. The really comes from the . That is the one figure in which every element is within the of each other. It\u2019s this wonderful mathematical symbol of perfection, organic perfection specifically. Since we are organic life and enjoy the idea of perfecting ourselves, that star is right for us in there and it perfectly fits the goat head inside. Now around it are two circles, one at the tip of the points of the star and one outside. In that are Hebrew characters starting at the bottom and going counter-clockwise spelling . In Hebrew mythology, Leviathan was the great dragon of the abyss, this powerful Earth figure that even Yahweh was afraid of. So all these things taken together creates a symbol that Anton LaVey identified with Satanism specifically. When he started the Church of Satan, usually were considered Satanic, and he saw that these different elements and felt this was a positive symbol you could tie to the Satanism he was creating. DS: So much of the symbology references a lot of myths and superstitions, yet you\u2019re antithetical to that. How do you explain how those two notions comport?PG: We have this approach that we take the dualities and find a third side to it, a way of integrating. You might find that even in , a way of finding opposites and coming with a new synthesis of the different thesis and antithesis. So ritual is natural to people, because humans have a conceptual consciousness. Symbols let us hold much more information in conscious focus, more so than just keeping them separately. So symbols are something we function with. It\u2019s part of our nature. So using ritual activities that are symbolic and have deep meaning to us is common to our species if you look at our history from cave paintings up to every civilization currently existing.DS: It\u2019s almost difficult to come up with a symbol that doesn't reference a superstition in some way. PG: Absolutely! So we feel that since they are often used to support a fiction, why not let it be used to explore the inner part of our nature. For us, when we do ritual\u2014which we call greater magic\u2014we call it an intellectual decompression chamber. It\u2019s a place where we release our emotions, any emotions that are hindering us, and we use the symbolism we find most stimulating. We leave it in the ritual chamber. You enjoy the self-transformational psychodrama in the ritual where you release any emotions that are hindering yourself and then you go outside and basically pursue your life, being rational and doing what you need to do to make your life as rich as it can be. The Iraq War: A Satanic perspective DS: Do you think our pursuing the is an example of killing innocent people?PG: Oh, of course people are being killed in almost any war. It doesn ' t matter if it is just Iraq, because there are civilian populations who are caught between these people with agendas, and those civilians just want to live their lives. DS: Who are the innocents? PG: Not being involved in the particular conflict. If you are just living your life and doing what you need to do to survive, have a job, bringing in food for your family; that\u2019s being an innocent person. DS: How has the war in Iraq affected your worldview?PG: It hasn ' t changed it in the least. I see it as human behavior as usual. History is full of aggressors. Iraq to me is an interesting place where there was a totalitarian holding in check religious factions, and now that cap has been removed, the religious factions want to destroy each other. I think it\u2019s a lesson for most people to say look at how these religions were important to people who are always looking above themselves to be regulated, and they found an Earthly regulator in Saddam Hussein, and now that that regulator who actually existed is gone, they are each looking to their own interpretations of their own deities and wanting to slaughter each other. It just shows how poisonous fundamentalist fanaticism can be, which to me is the most dangerous thing in all of human society. DS: That is what you consider the greatest threat to humanity? PG: Yes, any fundamentalist fanaticism is a vast threat. I\u2019m looking for humanity to have a secular, pluralistic culture. People should be able to follow whatever fantasies or religions they want, as long as they don ' t impose them on other people and force other people into doing things based upon whatever kind of holy writ they have. So the biggest threat to that are these fundamentalists who want to force people into their belief systems. They want to destroy people who have sexual activity they don ' t think is appropriate according to their texts. It will be interesting to see in the future if people will wake up to this threat and decide to somehow corral that kind of behavior, defang people like that who are basically on a jihad, whether they be Christians or Muslims or any other religion, because we\u2019ve seen in the past the Catholics were torturing people to death in the Inquisition, then the Reformation happened and different denominations and sects were killing each other. Heretics were being slaughtered. So this is not something just one religion is guilty of. On New York City DS: How do you feel about , where you live, being called Clinton?PG: I despise that. It should stick to what it really is, and it\u2019s Hell\u2019s Kitchen.DS: When you see how New York is changing around you\u2014I\u2019ve lived here for close to seven years, and even when I moved here it was very different. PG: I like the sleaze, I like the history, I like to see New York being this amazing range of the highest and the lowest and I don ' t think New York should be cleaned up and Disneyfied. DS: But it is.PG: It\u2019s getting there. I did a for the in the old Hellfire Club, and that\u2019s gone and is putting up a store in that neighborhood. [Laughs] Everybody just feels safe walking around all the time now. There\u2019s still some parts of that are still pretty rough. DS: Where do you think the culture is going to go? Is the sanitized version here to stay? PG: No, because if you look at anything that at one point is sleazy, at one it was new and spiffy and wonderful. So, at this point, New York is Manhattanland, it ' s for tourists and we\u2019ve made this almost Las Vegas simulacrum of the whole thing. But it will change. As soon as the money isn ' t worth pumping into it to keep up the fa\u00e7ade, all of the roughness around the edges will creep back in. It\u2019s still here, it just hides in the daytime. There\u2019s still all kinds of weird crime going on in the city when you watch the news. DS: You see that in all the old cities. , was one of the most dangerous cities I\u2019ve ever walked around in, and I thought, \u201cThis is what 1982 New York must have felt like.\u201dPG: Yeah, I moved down to New York in 1980\u2014that was pretty rough! [Laughs]DS: A friend of mine once said if you took someone from 1982 New York and you transplanted them into 2007 New York, the first thing they would say is, \u201cWhere did all these people come from?!\u201d That the streets just used to be barren back then. PG: I'm like that too. Where I live my view of the sunset is gone because two new luxury towers have gone up. They\u2019re building two additional ones. I don ' t know who these people are or where they get all their money because they are charging $6,000 a month for these apartments, and I\u2019m thinking who is spending all this money and wandering around the city like it\u2019s a pedestrian mall that could be in any kind of suburbia. Marilyn Manson DS: is a member?PG: Yes, he ' s a member who has been given an honorary priesthood. When asked about what Satanism is he can be very articulate in explaining it. But his own music is his own art. His stage shows are his own, and they don ' t really exemplify Satanism in particular. DS: It\u2019s more of a character. PG: Yeah, he\u2019s created a character. We say people forget about past orthodoxies, something that was culturally popular or permeating at one point or another, people forget about that. What Brian Warner did was he looked at David Bowie and Alice Cooper and re-created and repackaged them, and made a fortune. DS: Is he an active member?PG: He\u2019s an honorary priest, but he does his own thing. If asked about our philosophies he can explain it. The interesting thing is when his first album came out the two of us met on a panel that we were doing about racism in music that was being sponsored by Seconds Magazine. Nobody knew who Brian Warner was at that point, and he came up to me and gave me a CD and he was all in costume. But he said \"I heard about you and I wanted to meet you,\" so we moved aside and talked for a little while and I learned he really did understand Satanism. I told Anton LaVey that this guy was pretty smart and this gimmick is going to do well; it\u2019s clever. He\u2019s using this serial killer and Hollywood star combination, and he\u2019s a smart guy and creating his own persona that is probably going to be successful. It took off immediately, and when Marilyn Manson was out on tour in California he asked if he could meet Anton LaVey and he was impressed. He is a really sweet and sincere guy, which has nothing to do with what all of the world sees in just his act and his art. On the church after Anton LaVeyDS: Does the Church of Satan have relationships with other churches? PG: Not at all. We\u2019re not ecumenical. DS: It would seem there are pagans or humanist religions that follow your general philosophy.PG: I wouldn ' t say that. Most pagan religions are theistic on one level or another. They generally think their deities exist in some part. We don ' t believe Satan exists as a deity. I think there are some pagans who may look at their Gods and Goddesses as archetypes only, and in that sense that would be closer to our position because you can look at the symbol of Satan as an archetype. But, we generally don ' t feel we have any relation to any kind of religious organization.DS: What is the membership numbers for the Church of Satan? 350px|\"I\u2019m looking for humanity to have a secular, pluralistic culture. People should be able to follow whatever fantasies or religions they want, as long as they don ' t impose them on other people and force other people into doing things based upon whatever kind of holy writ they have.\" PG: We never give out numbers. The reason for that our founder came up with and I agree with him and keep to his policy: if people think there are too few of us, they tend to not want to take us seriously. If they think there are too many of us, they think we\u2019re a threat. There was even a point back during the in the late 1980\u2019s and early 1990\u2019s when there was governmental legislation proposed to ban Satanism because they thought there were all these metal heads out there sacrificing babies, doing drugs and making child pornography. Of course, now we know, it was mostly people who were borderline Christian evangelists pretending, but then accusing their own family members and getting them put in jail, or acting as therapists and most of those people have been sued and properly censured since then. DS: Has the church thrived after LaVey\u2019s passing?PG: It has. Partially because we are taking advantage of technology with the Internet and global media; our website gets hundreds of thousands of hits a day and literature keeps getting translated into many different languages the world over. My own book, The Satanic Scriptures, the hardcover came out in April and the paperback is coming out this month. I\u2019ve already got five different languages coming out and I\u2019m negotiating for others. We are thriving, we have many members.DS: What is your book about? PG: It\u2019s a collection of my essays I\u2019ve written over the past twenty years talking about Satanic philosophy, how it\u2019s applied. I talk about music since I am by training a composer; I went to . I have a Bachelor\u2019s and Master\u2019s in music composition, mostly focusing on orchestral work. One conception in the book I wanted to dispel is the stereotype that Satanism is always associated with Metal and the cookie monster voice. That's Satanism? No. DS: It\u2019s not all sounding.PG: No. Satanic music is specific to each person. So to me, Satanic music is the symphony, which to me is the highest art form. So Beethoven, Mahler, Bruckner, Shostakovich \u2014 to me that\u2019s some of the most Satanic music ever written because the architecture is there, the expressivity is there; the reflection on the human condition is all present and it\u2019s not idealistic. It\u2019s mostly questioning or showing what a human is capable of doing. And I love architecture. Cathedrals are wonderful. I have no hatred of those because they are put to religious use. They have symbols on them, but I know those are just symbols. I love skyscrapers too. Anton LaVey's children and estateDS: Do Dr. LaVey\u2019s children have anything to do with the church at all? PG: His son Xerxes is a member because he asked to be. We generally don ' t let people under 18 join. We used to let people whose parents allowed them to join, but because people are so litigious we changed that. We just don ' t want to take the chance that some parents say, \u201cYes, it\u2019s okay if my kid joins the Church of Satan,\u201d and then decides that\u2019s the reason they can ' t control their kid. We\u2019re just not willing to go there. But if our members have children who are interested, they can participate and become members, but that\u2019s the only way you can if you\u2019re not legally an adult. So Xerxes could become a member because his at one point, and still remains a member. DS: But not ?PG: No, she left years ago. She\u2019s not very bright and is very jealous. She and her paramour, , got married I think. They wanted to take the Church of Satan over at one point and wanted Anton LaVey to retire, but he was a feisty guy and said \"Hell no!\" So they quit in high dudgeon and ran off to Europe and said, \u201cAmerica is corrupt and horrible and we\u2019re going to Fortress Europa!\u201d They played with being Nazi occultists, which is kind of funny because both of them have Jewish blood. They\u2019re just like clowns. They then joined the , which was an organization that split off from the Church of Satan years ago, in 1975, when \u2014DS: Based on the ? PG: Yeah, and they\u2019re theists. They believe that Set exists and that their priests can commune with him and that their founder is the voice of Set. So, it\u2019s like, good that they left for housecleaning. But Zeena went and joined them and became High Priestess because Michael Aquino has this Anton LaVey obsession, which is obvious since he wrote a book about him that ' s about a thousand pages, so he made her the High Priestess of their organization. Then she left to form an even more orthodox Setian group called \u201cThe Storm\u201d, which to us is just funny. Such theatrics. His oldest daughter isn' t a very bright girl. She kind of hung around the background and once in a while she would come out to speak in public and support her father. When Xerxes was born she kind of got miffed because she wasn ' t the center of attention. Karla is also jealous type. She withdrew from her father, which hurt him a lot. DS: How did the legal wrangling surrounding his estate pan out?PG: They finally settled. What ended up happening is he had written a will. Anton LaVey ' s idea was that if he acknowledged he is going to die, then he ' d be giving in to death, so he didn ' t want to go to an attorney and make out a will. He was very feisty and had his own perspective on that. So he finally wrote a will out and signed it, but it wasn ' t notarized and there were no witnesses. So when it came to court they said it wasn ' t good enough. They basically split everything up between the three children, so Karla and Zeena and Xerxes all got part of the estate. DS: Who received the copyright to The Satanic Bible? PG: The estate. The money that comes in from that gets split up and goes to the three kids. Also there is a small percentage that goes to LaVey ' s companion, ; she says LaVey. But they were never married and had a falling out in the early 1980 ' s. She went off and left Satanism and sued him for palimony and he had to sell his house because of all of that, and he sold it to an old friend and member. Diane got a pile of money and she got a tiny percentage of the books that had been written up to that point. Every once in a while she comes creeping in off the periphery to say, \u201cAh! I ' m Diane LaVey!\u201d and it ' s like, you were Diane Hegarty and you were kind of involved in it, but before the Satanic Panic happened you left and had nothing to do with it. She was never someone who wrote or said anything of interest. She was just the pretty blonde wife of Anton LaVey. She was a nice figurehead, but wasn ' t of much use beyond that.", "edit_actions": [{"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 95, "end_char_pos": 96}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 118, "end_char_pos": 119}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 136, "end_char_pos": 137}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 294, "end_char_pos": 295}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 367, "end_char_pos": 368}, {"type": "D", "before": "The Satanic Panic", "after": null, "start_char_pos": 609, "end_char_pos": 626}, {"type": "R", "before": "Kern County child abuse cases, McMartin preschool trial and the West Memphis 3", "after": ", and the", "start_char_pos": 655, "end_char_pos": 733}, {"type": "D", "before": "Jordan", "after": null, "start_char_pos": 798, "end_char_pos": 804}, {"type": "D", "before": "coprophagia, urophagia and infanticide", "after": null, "start_char_pos": 915, "end_char_pos": 953}, {"type": "A", "before": null, "after": "and ,", "start_char_pos": 956, "end_char_pos": 956}, {"type": "D", "before": "Church of Satan", "after": null, "start_char_pos": 1662, "end_char_pos": 1677}, {"type": "D", "before": "Anton LaVey", "after": null, "start_char_pos": 1691, "end_char_pos": 1702}, {"type": "D", "before": "Peter H. Gilmore, Peggy Nadramia, Boyd Rice, Adam Parfrey", "after": null, "start_char_pos": 1736, "end_char_pos": 1793}, {"type": "A", "before": null, "after": ", , ,", "start_char_pos": 1796, "end_char_pos": 1796}, {"type": "D", "before": "King Diamond", "after": null, "start_char_pos": 1824, "end_char_pos": 1836}, {"type": "D", "before": "individualism", "after": null, "start_char_pos": 2119, "end_char_pos": 2132}, {"type": "D", "before": "eye for an eye", "after": null, "start_char_pos": 2158, "end_char_pos": 2172}, {"type": "R", "before": "Friedrich Nietzsche and Ayn Rand", "after": "and", "start_char_pos": 2205, "end_char_pos": 2237}, {"type": "D", "before": "magic", "after": null, "start_char_pos": 2262, "end_char_pos": 2267}, {"type": "R", "before": "occultists such as Aleister Crowley", "after": "such as", "start_char_pos": 2286, "end_char_pos": 2321}, {"type": "D", "before": "Christian notion of Satan", "after": null, "start_char_pos": 2374, "end_char_pos": 2399}, {"type": "D", "before": "Central Park", "after": null, "start_char_pos": 2691, "end_char_pos": 2703}, {"type": "D", "before": "High Priest", "after": null, "start_char_pos": 2758, "end_char_pos": 2769}, {"type": "D", "before": "Peter H. Gilmore", "after": null, "start_char_pos": 2785, "end_char_pos": 2801}, {"type": "D", "before": "Theistic Satanists", "after": null, "start_char_pos": 3082, "end_char_pos": 3100}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3128, "end_char_pos": 3129}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3286, "end_char_pos": 3287}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3305, "end_char_pos": 3306}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3795, "end_char_pos": 3796}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3830, "end_char_pos": 3831}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3865, "end_char_pos": 3866}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3947, "end_char_pos": 3948}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4053, "end_char_pos": 4054}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4609, "end_char_pos": 4610}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4871, "end_char_pos": 4872}, {"type": "D", "before": "Gnostics", "after": null, "start_char_pos": 5098, "end_char_pos": 5106}, {"type": "D", "before": "demiurge", "after": null, "start_char_pos": 5147, "end_char_pos": 5155}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5341, "end_char_pos": 5342}, {"type": "R", "before": "Easter Bunny or Zeus\u2026it\u2019s just\u2026", "after": "or ...it's just...", "start_char_pos": 5385, "end_char_pos": 5416}, {"type": "D", "before": "Satan", "after": null, "start_char_pos": 5495, "end_char_pos": 5500}, {"type": "R", "before": "\u201cadversary\u201d or \u201copposer\u201d", "after": "\"adversary\" or \"opposer\"", "start_char_pos": 5580, "end_char_pos": 5604}, {"type": "R", "before": "Mark Twain in Letters from the Earth", "after": "in", "start_char_pos": 5982, "end_char_pos": 6018}, {"type": "R", "before": "Milton\u2019s Paradise Lost", "after": "'s", "start_char_pos": 6034, "end_char_pos": 6056}, {"type": "D", "before": "atheism", "after": null, "start_char_pos": 6287, "end_char_pos": 6294}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 7187, "end_char_pos": 7188}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 7752, "end_char_pos": 7753}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 7775, "end_char_pos": 7776}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 7978, "end_char_pos": 7979}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 8162, "end_char_pos": 8163}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 8353, "end_char_pos": 8354}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 8378, "end_char_pos": 8379}, {"type": "D", "before": "Karl Marx", "after": null, "start_char_pos": 8393, "end_char_pos": 8402}, {"type": "D", "before": "opiate of the masses", "after": null, "start_char_pos": 8430, "end_char_pos": 8450}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 8704, "end_char_pos": 8705}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 9127, "end_char_pos": 9128}, {"type": "R", "before": "Communist Party or the Nazi Party", "after": "or the", "start_char_pos": 9139, "end_char_pos": 9172}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 9861, "end_char_pos": 9862}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10473, "end_char_pos": 10474}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 11813, "end_char_pos": 11814}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 11967, "end_char_pos": 11968}, {"type": "D", "before": "Evil", "after": null, "start_char_pos": 12338, "end_char_pos": 12342}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 12409, "end_char_pos": 12410}, {"type": "D", "before": "rape", "after": null, "start_char_pos": 12463, "end_char_pos": 12467}, {"type": "D", "before": "social contract", "after": null, "start_char_pos": 12725, "end_char_pos": 12740}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 12947, "end_char_pos": 12948}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 13287, "end_char_pos": 13288}, {"type": "D", "before": "execution", "after": null, "start_char_pos": 13311, "end_char_pos": 13320}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 13518, "end_char_pos": 13519}, {"type": "D", "before": "DNA testing", "after": null, "start_char_pos": 13634, "end_char_pos": 13645}, {"type": "D", "before": "murder", "after": null, "start_char_pos": 13700, "end_char_pos": 13706}, {"type": "D", "before": "Colin Ferguson", "after": null, "start_char_pos": 13934, "end_char_pos": 13948}, {"type": "D", "before": "checks and balances", "after": null, "start_char_pos": 14153, "end_char_pos": 14172}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 14312, "end_char_pos": 14313}, {"type": "D", "before": "megalomaniacal", "after": null, "start_char_pos": 14333, "end_char_pos": 14347}, {"type": "D", "before": "Libertarians", "after": null, "start_char_pos": 14453, "end_char_pos": 14465}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 14788, "end_char_pos": 14789}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 14903, "end_char_pos": 14904}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 15061, "end_char_pos": 15062}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 15242, "end_char_pos": 15243}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 15269, "end_char_pos": 15270}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 15298, "end_char_pos": 15299}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 15467, "end_char_pos": 15468}, {"type": "D", "before": "Carl Sagan", "after": null, "start_char_pos": 15849, "end_char_pos": 15859}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 16053, "end_char_pos": 16054}, {"type": "D", "before": "The Satanic Bible", "after": null, "start_char_pos": 16440, "end_char_pos": 16457}, {"type": "D", "before": "The Satanic Witch", "after": null, "start_char_pos": 16593, "end_char_pos": 16610}, {"type": "D", "before": "Lesser Magic", "after": null, "start_char_pos": 16632, "end_char_pos": 16644}, {"type": "D", "before": "sexuality", "after": null, "start_char_pos": 16835, "end_char_pos": 16844}, {"type": "D", "before": "The Satanic Rituals", "after": null, "start_char_pos": 17088, "end_char_pos": 17107}, {"type": "R", "before": "\u2019s a Black Mass", "after": "'s a", "start_char_pos": 17390, "end_char_pos": 17405}, {"type": "D", "before": "The Satanic Scriptures", "after": null, "start_char_pos": 17725, "end_char_pos": 17747}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 18205, "end_char_pos": 18206}, {"type": "D", "before": "President", "after": null, "start_char_pos": 18577, "end_char_pos": 18586}, {"type": "D", "before": "Israeli-Palestinian issue", "after": null, "start_char_pos": 18632, "end_char_pos": 18657}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 18670, "end_char_pos": 18671}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 18770, "end_char_pos": 18771}, {"type": "R", "before": "\u201cwin\u201d", "after": "\"win\"", "start_char_pos": 19319, "end_char_pos": 19324}, {"type": "D", "before": "Terrorism", "after": null, "start_char_pos": 19569, "end_char_pos": 19578}, {"type": "D", "before": "justice", "after": null, "start_char_pos": 19636, "end_char_pos": 19643}, {"type": "D", "before": "Same-sex marriage", "after": null, "start_char_pos": 19886, "end_char_pos": 19903}, {"type": "D", "before": "birth control", "after": null, "start_char_pos": 19981, "end_char_pos": 19994}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 20612, "end_char_pos": 20613}, {"type": "D", "before": "sentient being", "after": null, "start_char_pos": 20671, "end_char_pos": 20685}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 20762, "end_char_pos": 20763}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 21197, "end_char_pos": 21198}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 21439, "end_char_pos": 21440}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 21461, "end_char_pos": 21462}, {"type": "D", "before": "conception", "after": null, "start_char_pos": 21569, "end_char_pos": 21579}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 21631, "end_char_pos": 21632}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 21772, "end_char_pos": 21773}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 21873, "end_char_pos": 21874}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 22303, "end_char_pos": 22304}, {"type": "D", "before": "Lovecraftian", "after": null, "start_char_pos": 22708, "end_char_pos": 22720}, {"type": "R", "before": "\u201cCthulu", "after": "\"", "start_char_pos": 22730, "end_char_pos": 22737}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 22789, "end_char_pos": 22790}, {"type": "R", "before": "Giuliani and Clinton", "after": "and", "start_char_pos": 22832, "end_char_pos": 22852}, {"type": "R", "before": "9/11.", "after": ".", "start_char_pos": 22947, "end_char_pos": 22952}, {"type": "D", "before": "Catholicism to control art", "after": null, "start_char_pos": 22978, "end_char_pos": 23004}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 23099, "end_char_pos": 23100}, {"type": "D", "before": "Sigil of Baphomet", "after": null, "start_char_pos": 23854, "end_char_pos": 23871}, {"type": "D", "before": "Templars", "after": null, "start_char_pos": 23955, "end_char_pos": 23963}, {"type": "D", "before": "ancient Egypt", "after": null, "start_char_pos": 24135, "end_char_pos": 24148}, {"type": "D", "before": "five-pointed star", "after": null, "start_char_pos": 24311, "end_char_pos": 24328}, {"type": "D", "before": "Pythagoreans", "after": null, "start_char_pos": 24351, "end_char_pos": 24363}, {"type": "D", "before": "golden mean", "after": null, "start_char_pos": 24426, "end_char_pos": 24437}, {"type": "D", "before": "Leviathan", "after": null, "start_char_pos": 24869, "end_char_pos": 24878}, {"type": "D", "before": "upside down crosses", "after": null, "start_char_pos": 25159, "end_char_pos": 25178}, {"type": "D", "before": "Marxist theory", "after": null, "start_char_pos": 25616, "end_char_pos": 25630}, {"type": "D", "before": "War in Iraq", "after": null, "start_char_pos": 27022, "end_char_pos": 27033}, {"type": "D", "before": "innocent", "after": null, "start_char_pos": 27093, "end_char_pos": 27101}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 27154, "end_char_pos": 27155}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 27621, "end_char_pos": 27622}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 28691, "end_char_pos": 28692}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 28983, "end_char_pos": 28984}, {"type": "D", "before": "Hell\u2019s Kitchen", "after": null, "start_char_pos": 29605, "end_char_pos": 29619}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 30017, "end_char_pos": 30018}, {"type": "R", "before": "Black Mass for the BBC", "after": "for the", "start_char_pos": 30119, "end_char_pos": 30141}, {"type": "D", "before": "Apple", "after": null, "start_char_pos": 30188, "end_char_pos": 30193}, {"type": "D", "before": "Chinatown", "after": null, "start_char_pos": 30334, "end_char_pos": 30343}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 30625, "end_char_pos": 30626}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 30755, "end_char_pos": 30756}, {"type": "R", "before": "Rust Belt cities. Reading, Pennsylvania", "after": "cities. ,", "start_char_pos": 31026, "end_char_pos": 31065}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 31666, "end_char_pos": 31667}, {"type": "D", "before": "Marilyn Manson", "after": null, "start_char_pos": 31957, "end_char_pos": 31971}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 31996, "end_char_pos": 31997}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 32206, "end_char_pos": 32207}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 33922, "end_char_pos": 33923}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 34057, "end_char_pos": 34058}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 34323, "end_char_pos": 34324}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 34618, "end_char_pos": 34619}, {"type": "D", "before": "Satanic Panic", "after": null, "start_char_pos": 35053, "end_char_pos": 35066}, {"type": "D", "before": "NYU", "after": null, "start_char_pos": 36312, "end_char_pos": 36315}, {"type": "D", "before": "Gene Loves Jezebel", "after": null, "start_char_pos": 36587, "end_char_pos": 36605}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 37435, "end_char_pos": 37436}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 37588, "end_char_pos": 37589}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 37737, "end_char_pos": 37738}, {"type": "D", "before": "mother was High Priestess", "after": null, "start_char_pos": 37998, "end_char_pos": 38023}, {"type": "D", "before": "Zeena", "after": null, "start_char_pos": 38078, "end_char_pos": 38083}, {"type": "D", "before": "Nikolas Shreck", "after": null, "start_char_pos": 38178, "end_char_pos": 38192}, {"type": "D", "before": "Temple of Set", "after": null, "start_char_pos": 38633, "end_char_pos": 38646}, {"type": "D", "before": "Michael Aquino", "after": null, "start_char_pos": 38740, "end_char_pos": 38754}, {"type": "D", "before": "Egyptian god", "after": null, "start_char_pos": 38773, "end_char_pos": 38785}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 39156, "end_char_pos": 39157}, {"type": "R", "before": "Karla isn\u2019", "after": "isn'", "start_char_pos": 39381, "end_char_pos": 39391}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 39596, "end_char_pos": 39597}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 39856, "end_char_pos": 39857}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 39921, "end_char_pos": 39922}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 39959, "end_char_pos": 39960}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 40124, "end_char_pos": 40125}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 40210, "end_char_pos": 40211}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 40545, "end_char_pos": 40546}, {"type": "D", "before": "Diane Hegarty", "after": null, "start_char_pos": 40560, "end_char_pos": 40573}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 40660, "end_char_pos": 40661}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 41005, "end_char_pos": 41006}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 41030, "end_char_pos": 41031}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 41328, "end_char_pos": 41329}], "sents_char_pos": [0, 54, 111, 149, 164, 361, 404, 628, 774, 1020, 1160, 1225, 1355, 1527, 1704, 2020, 2087, 2239, 2323, 2401, 2544, 2664, 2912, 3035, 3157, 3209, 3266, 3281, 3297, 3337, 3387, 3486, 3556, 3646, 3789, 3826, 3861, 4001, 4089, 4248, 4311, 4395, 4488, 4538, 4579, 4623, 4779, 4851, 4989, 5093, 5142, 5255, 5324, 5406, 5428, 5557, 5606, 5625, 5698, 5787, 5891, 5914, 5942, 6106, 6149, 6176, 6200, 6229, 6262, 6296, 6351, 6385, 6400, 6595, 6673, 6748, 6844, 6877, 6902, 6976, 7048, 7178, 7288, 7311, 7347, 7591, 7633, 7685, 7756, 7821, 7845, 7938, 7971, 8063, 8148, 8185, 8377, 8571, 8696, 8791, 9027, 9041, 9186, 9379, 9631, 9906, 10002, 10111, 10141, 10254, 10465, 10601, 10660, 10712, 10822, 10918, 11009, 11043, 11062, 11110, 11165, 11275, 11291, 11339, 11665, 11702, 11886, 12053, 12216, 12240, 12296, 12334, 12405, 12425, 12507, 12616, 12742, 12905, 13050, 13378, 13727, 13744, 13814, 13859, 13923, 13971, 14022, 14068, 14134, 14174, 14304, 14428, 14467, 14647, 14704, 14738, 14843, 14924, 15049, 15133, 15231, 15265, 15288, 15371, 15452, 15521, 15696, 15758, 15800, 15829, 15927, 16045, 16140, 16200, 16366, 16436, 16546, 16592, 16759, 16867, 16901, 16920, 16948, 16983, 17046, 17228, 17279, 17320, 17363, 17384, 17431, 17711, 17848, 18029, 18152, 18257, 18521, 18564, 18699, 18860, 19081, 19206, 19384, 19447, 19477, 19568, 19702, 19775, 19871, 19932, 19946, 20039, 20190, 20392, 20447, 20556, 20639, 20687, 20811, 20938, 20968, 21081, 21187, 21224, 21258, 21328, 21385, 21406, 21486, 21581, 21698, 21724, 21747, 21795, 21942, 22023, 22042, 22133, 22150, 22218, 22404, 22445, 22472, 22553, 22692, 22752, 22788, 22854, 22899, 22952, 23037, 23058, 23090, 23314, 23366, 23421, 23450, 23554, 23620, 23722, 23783, 23845, 23873, 24015, 24095, 24131, 24306, 24365, 24452, 24540, 24689, 24778, 24880, 25005, 25113, 25327, 25434, 25484, 25587, 25731, 25811, 25916, 25959, 25984, 26174, 26275, 26291, 26419, 26523, 26654, 26689, 26951, 27075, 27144, 27324, 27351, 27402, 27523, 27556, 27609, 27649, 27686, 27717, 27906, 28283, 28410, 28473, 28530, 28595, 28812, 28920, 29033, 29471, 29504, 29561, 29659, 29678, 29741, 29885, 30072, 30087, 30110, 30237, 30305, 30372, 30423, 30462, 30575, 30709, 30729, 30861, 30908, 30993, 31043, 31195, 31260, 31511, 31534, 31621, 31659, 31937, 31984, 32051, 32129, 32163, 32250, 32280, 32316, 32464, 32588, 32616, 32671, 32722, 32893, 33006, 33161, 33249, 33262, 33415, 33554, 33677, 33777, 33793, 33815, 33909, 33935, 33994, 34049, 34093, 34300, 34391, 34458, 34522, 34771, 34946, 35013, 35293, 35563, 35613, 35624, 35716, 35855, 35968, 36053, 36092, 36120, 36247, 36301, 36408, 36548, 36565, 36615, 36664, 36742, 36908, 36986, 37055, 37080, 37106, 37171, 37233, 37257, 37362, 37417, 37464, 37575, 37759, 37795, 37953, 38065, 38085, 38112, 38155, 38215, 38351, 38482, 38585, 38611, 38818, 38935, 38989, 39240, 39344, 39360, 39413, 39534, 39624, 39652, 39704, 39768, 39793, 39843, 40009, 40065, 40166, 40226, 40347, 40400, 40416, 40492, 40575, 40591, 40818, 40927, 41177, 41239, 41291]}
+{"doc_id": "85130", "revision_depth": "1", "before_revision": "The Black Sea , with the Straight of Kerch visible near the top right flowing into the Sea of Azov . A fierce storm on Sunday resulted in massive 18-foot waves, which split a Russian oil tanker in two and sank two Russian freighters nearby. The tanker spilled at least 560,000 gallons of fuel into a strait which leads to the Black Sea , and officials say it may take years to clean up. The tankers sank in the Strait of Kerch , which links the Black Sea and the Sea of Azov in the northeast. The two ships were carrying a total of around 7,150 tons of sulfur , according to Sergei Petrov, Russia's Ministry of Emergency Situations regional spokesperson. The tanker was carrying nearly 1.3 million gallons of fuel oil , and was stranded several miles from shore. Emergency workers were prevented from collecting the spilled oil immediately due to stormy weather; the head of the state environmental safety watchdog Rosprorodnadzor, Oleg Mitvol, said \"there is serious concern that the spill will continue\". Workers eventually managed to begin work on cleaning up the spill, an effort which may be long-term. Tar-like sands laden with oil and seaweed were piled on the shore, while oil-covered birds in slick-covered water tried to flap their wings. Regional coast guard officer Anatoly Yanhuck said once weather improves they will begin pumping oil from the tanker, then tow the ship to port. Two fuel-loaded barges and Turkish freighter Ziya Kos also ran aground in the area, but there was no further environmental damage, said Petrov. Ten ships altogether were sunk or run aground in the area of the Black Sea near the Straight of Kerch and the Straight itself; a Russian freighter carrying metal was also reported as having sunk near the port of Sevastopol on Ukraine's Crimean Peninsula . The Port of Sevastopol on a clear day in 2005. One of the sulfur-carrying freighters reported three crew members as drowned, and five more as missing, while two members of the sunk freighter carrying metal were reported as drowned and another remains missing. The oil tanker's 13 crew members were all rescued safely, and all members of the second freighter were also reported as safe. Captains had been warned Saturday morning of the stormy conditions, regional prosecutor Maxim Stepanenko told Russia's Vesti 24. The oil tanker was not built to withstand fierce storms, having been designed to transport oil on rivers during Soviet times, he said. Chemist with the National Oceanic and Atmospheric Administration's Ocean Service office of response and restoration, Jim Farr said the sulfur spill from the two freighters wouldn't create a \"hazardous situation\", a statement backed up by Alexei Zhukovin, expert with the Emergency Situations Ministry's branch in Southern Russia. Although on land sulfur is used as a fungicide, in a marine setting it wouldn't act as one, said Farr; instead a sulfur spill can be compared to dumping sand on a reef and smothering it, or placing a blanket on a bed of grass. Long-term effects are more difficult to speculate on, however, without better knowledge of the area and its currents. Oleg Mitvol said that although the sulfur spill doesn't present an environmental danger, the two freighters might also leak fuel oil from their tanks, adding to the pollution.", "after_revision": "The , with the visible near the top right flowing into the . A fierce storm on Sunday resulted in massive 18-foot waves, which split a Russian in two and sank two Russian nearby. The tanker at least 560,000 gallons of fuel into a strait which leads to the , and officials say it may take years to clean up. The tankers sank in the , which links the Black Sea and the in the northeast. The two ships were carrying a total of around 7,150 tons of , according to Sergei Petrov, Russia's regional spokesperson. The tanker was carrying nearly 1.3 million of , and was stranded several miles from shore. Emergency workers were prevented from collecting the spilled oil immediately due to stormy weather; the head of the state environmental safety watchdog Rosprorodnadzor, Oleg Mitvol, said \"there is serious concern that the spill will continue\". Workers eventually managed to begin work on cleaning up the spill, an effort which may be long-term. Tar-like sands laden with oil and seaweed were piled on the shore, while oil-covered birds in slick-covered water tried to flap their wings. Regional coast guard officer Anatoly Yanhuck said once weather improves they will begin pumping oil from the tanker, then tow the ship to port. Two fuel-loaded barges and Turkish freighter Ziya Kos also ran aground in the area, but there was no further environmental damage, said Petrov. Ten ships altogether were sunk or run aground in the area of the Black Sea near the Straight of Kerch and the Straight itself; a Russian freighter carrying metal was also reported as having sunk near the port of on Ukraine's . The Port of Sevastopol on a clear day in 2005. One of the sulfur-carrying freighters reported three crew members as drowned, and five more as missing, while two members of the sunk freighter carrying metal were reported as drowned and another remains missing. The oil tanker's 13 crew members were all rescued safely, and all members of the second freighter were also reported as safe. Captains had been warned Saturday morning of the stormy conditions, regional prosecutor Maxim Stepanenko told Russia's Vesti 24. The oil tanker was not built to withstand fierce storms, having been designed to transport oil on rivers during times, he said. Chemist with the National Oceanic and Atmospheric Administration's of response and restoration, Jim Farr said the spill from the two freighters wouldn't create a \"hazardous situation\", a statement backed up by Alexei Zhukovin, expert with the Emergency Situations Ministry's branch in Southern Russia. Although on land sulfur is used as a fungicide, in a marine setting it wouldn't act as one, said Farr; instead a sulfur spill can be compared to dumping sand on a reef and smothering it, or placing a blanket on a bed of grass. Long-term effects are more difficult to speculate on, however, without better knowledge of the area and its currents. Oleg Mitvol said that although the sulfur spill doesn't present an environmental danger, the two freighters might also leak fuel oil from their tanks, adding to the pollution.", "edit_actions": [{"type": "D", "before": "Black Sea", "after": null, "start_char_pos": 4, "end_char_pos": 13}, {"type": "D", "before": "Straight of Kerch", "after": null, "start_char_pos": 25, "end_char_pos": 42}, {"type": "D", "before": "Sea of Azov", "after": null, "start_char_pos": 87, "end_char_pos": 98}, {"type": "D", "before": "oil tanker", "after": null, "start_char_pos": 183, "end_char_pos": 193}, {"type": "D", "before": "freighters", "after": null, "start_char_pos": 222, "end_char_pos": 232}, {"type": "D", "before": "spilled", "after": null, "start_char_pos": 252, "end_char_pos": 259}, {"type": "D", "before": "Black Sea", "after": null, "start_char_pos": 326, "end_char_pos": 335}, {"type": "D", "before": "Strait of Kerch", "after": null, "start_char_pos": 411, "end_char_pos": 426}, {"type": "D", "before": "Sea of Azov", "after": null, "start_char_pos": 463, "end_char_pos": 474}, {"type": "D", "before": "sulfur", "after": null, "start_char_pos": 553, "end_char_pos": 559}, {"type": "D", "before": "Ministry of Emergency Situations", "after": null, "start_char_pos": 599, "end_char_pos": 631}, {"type": "R", "before": "gallons of fuel oil", "after": "of", "start_char_pos": 698, "end_char_pos": 717}, {"type": "D", "before": "Sevastopol", "after": null, "start_char_pos": 1749, "end_char_pos": 1759}, {"type": "D", "before": "Crimean Peninsula", "after": null, "start_char_pos": 1773, "end_char_pos": 1790}, {"type": "D", "before": "Soviet", "after": null, "start_char_pos": 2420, "end_char_pos": 2426}, {"type": "D", "before": "Ocean Service office", "after": null, "start_char_pos": 2510, "end_char_pos": 2530}, {"type": "D", "before": "sulfur", "after": null, "start_char_pos": 2578, "end_char_pos": 2584}], "sents_char_pos": [0, 240, 386, 492, 654, 762, 862, 1006, 1107, 1248, 1392, 1536, 1663, 1792, 1839, 2052, 2178, 2307, 2442, 2772, 2875, 2999, 3117]}
+{"doc_id": "86687", "revision_depth": "1", "before_revision": "Though his career spanned multiple decades , Reese made the lion's share of his money as poker gained publicity through national television exposure starting around the turn of the century. Though he never won the \"Main Event\" in Texas hold'em at the World Series of Poker, Reese raked in millions because,as fellow poker professional Barry Greenstein put it, \" If an oppenent is struggling, Chip would%DIFDELCMD < ] %%% stay and gamble with him and make a big score, but%DIFDELCMD < ] %%% if Chip isn't doing well, he will minimize his losses and may even put his ego aside and quit and wait for another day .\" Reese earned a degree from Dartmouth College and was accepted to law school at Stanford University, but he was drawn by the lure of big pots and chose instead to earn his living at the poker table. He once told a reporter that law \"doesn't have the same monetary incentive as poker.\"", "after_revision": "His career spanned multiple decades and Reese made the majority of his money when poker gained publicity through national television exposure starting around the turn of the century. Though he never won the \"Main Event\" in Texas hold'em at the World Series of Poker, Reese was very successful. \"He was a family man like no one else in poker,\" said fellow poker professional Barry Greenstein . \" %DIFDELCMD < ] %%% %DIFDELCMD < ] %%% No matter what the situation was, if his kids had something going on \u2014 a baseball game, a recital, whatever \u2014 he would quit to go to it .\" \"Probably a lot of us were jealous of him that he was able to do that \u2014 that he had done well enough in poker, that he could always take time off of poker to be involved with his kids,\" Greenstein added. Reese earned a degree from Dartmouth College and was accepted to law school at Stanford University, but he was drawn by the lure of big winnings and chose instead to earn his living at the poker table. He once told a reporter that law \"doesn't have the same monetary incentive as poker.\"", "edit_actions": [{"type": "R", "before": "Though his", "after": "His", "start_char_pos": 0, "end_char_pos": 10}, {"type": "R", "before": ",", "after": "and", "start_char_pos": 43, "end_char_pos": 44}, {"type": "R", "before": "lion's share", "after": "majority", "start_char_pos": 60, "end_char_pos": 72}, {"type": "R", "before": "as", "after": "when", "start_char_pos": 86, "end_char_pos": 88}, {"type": "R", "before": "raked in millions because,as", "after": "was very successful.", "start_char_pos": 280, "end_char_pos": 308}, {"type": "A", "before": null, "after": "\"He was a family man like no one else in poker,\" said", "start_char_pos": 309, "end_char_pos": 309}, {"type": "R", "before": "put it,", "after": ".", "start_char_pos": 353, "end_char_pos": 360}, {"type": "D", "before": "If an oppenent is struggling, Chip", "after": null, "start_char_pos": 363, "end_char_pos": 397}, {"type": "D", "before": "would", "after": null, "start_char_pos": 398, "end_char_pos": 403}, {"type": "D", "before": "stay and gamble with him and make a big score,", "after": null, "start_char_pos": 422, "end_char_pos": 468}, {"type": "D", "before": "but", "after": null, "start_char_pos": 469, "end_char_pos": 472}, {"type": "R", "before": "if Chip isn't doing well, he will minimize his losses and may even put his ego aside and quit and wait for another day", "after": "No matter what the situation was, if his kids had something going on \u2014 a baseball game, a recital, whatever \u2014 he would quit to go to it", "start_char_pos": 491, "end_char_pos": 609}, {"type": "A", "before": null, "after": "\"Probably a lot of us were jealous of him that he was able to do that \u2014 that he had done well enough in poker, that he could always take time off of poker to be involved with his kids,\" Greenstein added.", "start_char_pos": 613, "end_char_pos": 613}, {"type": "R", "before": "pots", "after": "winnings", "start_char_pos": 750, "end_char_pos": 754}], "sents_char_pos": [0, 189, 612, 811]}
+{"doc_id": "89179", "revision_depth": "1", "before_revision": "It's now been three weeks since the four-person Lakota Freedom Delegation declared that the Lakota people were withdrawing from their treaties with the United States and, though small, the movement still proves controversial: two U.S.-recognized Lakota tribal governments have rejected the Delegation's authority outright with at least one tribe stating it will consider the Delegation's, now Lakota Oyate's, proposal. The rest of the tribes have remained silent. The central figure the movement has been Canupa Gluha Mani, a longtime activist whose tactics have led repeatedly to his arrest and imprisonment \u2014 most recently in June 2007, when Canupa Gluha Mani was one of six arrested who participated in blockading a road in Nebraska to keep outside alcohol from entering his dry reservation where it is banned. Wikinews talked to Canupa Gluha Mani about the movement and Lakota Oyate in an exclusive interview. Canupa Gluha Mani (left) at the Lakota Freedom Delegation's December press conference in Washington. Russell Means is in the background. Also called Duane Martin Sr, Canupa Gluha Mani prefers to be referred to as just that, \"Canupa Gluha Mani\"; it means \"He walks as he protects the pipe\", though much of the meaning is lost in translation between English and the delicately-nuanced Lakota language. Canupa Gluha Mani prefers to speak in this, his native tongue -- he \"hates\" that the English language has become the everyday language of the Lakota, and decries the extinction of many indigenous American languages -- but uses English fluently and earthily. Canupa Gluha Mani talked about the Cante Tenza, the Strong Heart Warrior Society, which he heads and which forms the paramilitary force of Lakotah. The society, an okolakiciye or warrior society, originated in the Black Hills . He told the following story: Four warriors in the hills ran across a coyote and gave it chase. And as the coyote ran he turned into a Lakota man, and in his changing the man left four objects: a rattle, a drum, a lance, and a tomahawk with which the Lakota people could be defended. Canupa Gluha Mani is a warrior leader, and his position with relation to the treaty council which traditionally governs the Lakota is \"whip-man\", loosely \"sergeant at arms\" -- that is, he enforces order and decorum when passions grow heated during tribal discussions. The authority of the Lakota Freedom Delegation, he says, comes not from the BIA-recognized governments but rather from the \"people who understand treaties\", i.e. the treaty council, from among the Seven Sister Bands of the Lakota. This traditional government is based on the idea of \"staying quiet and listening to the people who have answers\", the \"itacans\" or expert headmen. Canupa Gluha Mani also endorsed Naomi Archer, who has acted as Lakota Oyate's liaison; indeed, as the Lakota Freedom Delegation prepared its trip to Washington DC he called in Naomi Archer, who though of non-native extraction is his adopted sister and a fellow Cante Tenza member, to handle media support. \"I support the understandings of what she's saying\", he said, referring to a previous interview with Archer which revealed an apparent split between Russell Means and other members of the Lakota Freedom Delegation. \"She as an individual has integrity.\" However, the previous interview missed nuances and the perceived gap between Lakota Oyate and Russell Means' Republic of Lakota is not so great. \"There's no division here....it's communication, that's all. We can always get past this.\" With regard to Russell Means, who has declared himself Chief Facilitator of the Republic of Lakotah , he said, \"I've worked with my uncle Russell Means in positive venues. And I'm still behind him, I have love for him;\" He emphasized the familial bond between himelf and Means, noting that Means had adopted him as a nephew. However, \"the Lakota have to be recognized.\" It was \"genocide\", he said, that of all the races of humanity, American Indians are not represented at the United Nations . The traditional decision making process within the Lakota, he said, was informal discussions among the women of the Lakota rather than pronouncements and declarations. Ideas like western forms of government -- referencing the \"Republic\" -- and the use of the English language were part of the reason for both the misunderstanding of the dispute between Russell Means and Canupa Gluha Mani and the Lakota's problems: \"It's hard for Indian people to adapt to this modern lifestyle....It's white teaching that cause Indian problem....leave us alone....This country has not learned a thing about its own First Nations people.\" US governing of Lakota has led directly to the economic and social decline of the Lakotah people, he argues. Canupa Gluha Mani noted that the life expectancy for Lakota men is only 44, and that alcohol and drug use are epidemic, as are infectious diseases such as tuberculosis. But revival of the Lakota has to be not just economic to improve the circumstances of the people, but cultural too: \"Our language is at stake right now\" but the US government-backed instutions like the Tribal Police are just \"the second coming of the white man's cavalry\". And if the United States government leaves the Lakota alone? \"Then we can take our practices forward in good will.\" Canupa Gluha Mani, who is married to a woman of European descent, says that the traditional American Indian lifestyle can coexist with the western lifestyle, but \"every wound has to heal\". \"We can be self-sufficient. We can govern ourselves.\" Having withdrawn from the outstanding treaties with the United States, will Lakota Oyate make a new arrangement with Washington? \"That has yet to be exonerated.\" Lakotah continues to seek international recognition; although no country has declared recognition for Lakotah, he is \"confident with the Bolivians \" and also noted a positive response from the \" Bulgarian freedom fighters\" pressuring the US to recognize Lakota independence.", "after_revision": "It's now been three weeks since the four-person declared that the were withdrawing from their treaties with the United States and, though small, the movement still proves controversial: two U.S.-recognized Lakota tribal governments have rejected the Delegation's authority outright with at least one tribe stating it will consider the Delegation's, now Lakota Oyate's, proposal. The rest of the tribes have remained silent. The central figure the movement has been Canupa Gluha Mani, a longtime activist whose tactics have led repeatedly to his arrest and imprisonment \u2014 most recently in June 2007, when Canupa Gluha Mani was one of six arrested who participated in blockading a road in to keep outside alcohol from entering his where it is banned. talked to Canupa Gluha Mani about the movement and Lakota Oyate in an exclusive interview. Also called Duane Martin Sr, Canupa Gluha Mani prefers to be referred to as just that, \"Canupa Gluha Mani\"; it means \"He walks as he protects the pipe\", though much of the meaning is lost in translation between English and the delicately-nuanced Lakota language. Canupa Gluha Mani prefers to speak in this, his native tongue \u2014 he \"hates\" that the English language has become the everyday language of the Lakota, and decries the extinction of many indigenous American languages \u2014 but uses English fluently and earthily. Canupa Gluha Mani talked about the Cante Tenza, the Strong Heart Warrior Society, which he heads and which forms the paramilitary force of Lakotah. The society, an okolakiciye or warrior society, originated in the . He told the following story: Four warriors in the hills ran across a and gave it chase. And as the coyote ran he turned into a Lakota man, and in his changing the man left four objects: a rattle, a drum, a lance, and a with which the Lakota people could be defended. Canupa Gluha Mani is a warrior leader, and his position with relation to the treaty council which traditionally governs the Lakota is \"whip-man\", loosely \"sergeant at arms\" \u2014 that is, he enforces order and decorum when passions grow heated during tribal discussions. The authority of the Lakota Freedom Delegation, he says, comes not from the -recognized governments but rather from the \"people who understand treaties\", i.e. the treaty council, from among the Seven Sister Bands of the Lakota. This traditional government is based on the idea of \"staying quiet and listening to the people who have answers\", the \"itacans\" or expert headmen. Canupa Gluha Mani also endorsed Naomi Archer, who has acted as Lakota Oyate's liaison; indeed, as the Lakota Freedom Delegation prepared its trip to Washington DC he called in Naomi Archer, who though of non-native extraction is his adopted sister and a fellow Cante Tenza member, to handle media support. \"I support the understandings of what she's saying\", he said, referring to a previous interview with Archer which revealed an apparent split between and other members of the Lakota Freedom Delegation. \"She as an individual has integrity.\" However, the previous interview missed nuances and the perceived gap between Lakota Oyate and Russell Means' Republic of Lakota is not so great. \"There's no division here....it's communication, that's all. We can always get past this.\" With regard to Russell Means, who has declared himself Chief Facilitator of the , he said, \"I've worked with my uncle Russell Means in positive venues. And I'm still behind him, I have love for him;\" He emphasized the familial bond between himelf and Means, noting that Means had adopted him as a nephew. However, \"the Lakota have to be recognized.\" It was \"genocide\", he said, that of all the races of humanity, American Indians are not represented at the . The traditional decision making process within the Lakota, he said, was informal discussions among the women of the Lakota rather than pronouncements and declarations. Ideas like western forms of government \u2014 referencing the \"Republic\" \u2014 and the use of the English language were part of the reason for both the misunderstanding of the dispute between Russell Means and Canupa Gluha Mani and the Lakota's problems: \"It's hard for Indian people to adapt to this modern lifestyle....It's white teaching that cause Indian problem....leave us alone....This country has not learned a thing about its own First Nations people.\" US governing of Lakota has led directly to the economic and social decline of the Lakotah people, he argues. Canupa Gluha Mani noted that the life expectancy for Lakota men is only 44, and that alcohol and drug use are epidemic, as are infectious diseases such as tuberculosis. But revival of the Lakota has to be not just economic to improve the circumstances of the people, but cultural too: \"Our language is at stake right now\" but the US government-backed institutions like the Tribal Police are just \"the second coming of the white man's cavalry\". And if the United States government leaves the Lakota alone? \"Then we can take our practices forward in good will.\" Canupa Gluha Mani, who is married to a woman of European descent, says that the traditional American Indian lifestyle can coexist with the western lifestyle, but \"every wound has to heal\". \"We can be self-sufficient. We can govern ourselves.\" Having withdrawn from the outstanding treaties with the United States, will Lakota Oyate make a new arrangement with Washington? \"That has yet to be exonerated.\" Lakotah continues to seek international recognition; although no country has declared recognition for Lakotah, he is \"confident with the \" and also noted a positive response from the \" freedom fighters\" pressuring the US to recognize Lakota independence.", "edit_actions": [{"type": "D", "before": "Lakota Freedom Delegation", "after": null, "start_char_pos": 48, "end_char_pos": 73}, {"type": "D", "before": "Lakota people", "after": null, "start_char_pos": 92, "end_char_pos": 105}, {"type": "D", "before": "Nebraska", "after": null, "start_char_pos": 727, "end_char_pos": 735}, {"type": "D", "before": "dry reservation", "after": null, "start_char_pos": 778, "end_char_pos": 793}, {"type": "D", "before": "Wikinews", "after": null, "start_char_pos": 814, "end_char_pos": 822}, {"type": "D", "before": "Canupa Gluha Mani (left) at the Lakota Freedom Delegation's December press conference in Washington. Russell Means is in the background.", "after": null, "start_char_pos": 914, "end_char_pos": 1050}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 1376, "end_char_pos": 1378}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 1529, "end_char_pos": 1531}, {"type": "D", "before": "Black Hills", "after": null, "start_char_pos": 1786, "end_char_pos": 1797}, {"type": "D", "before": "coyote", "after": null, "start_char_pos": 1869, "end_char_pos": 1875}, {"type": "D", "before": "tomahawk", "after": null, "start_char_pos": 2026, "end_char_pos": 2034}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 2256, "end_char_pos": 2258}, {"type": "R", "before": "BIA-recognized", "after": "-recognized", "start_char_pos": 2427, "end_char_pos": 2441}, {"type": "D", "before": "Russell Means", "after": null, "start_char_pos": 3184, "end_char_pos": 3197}, {"type": "D", "before": "Republic of Lakotah", "after": null, "start_char_pos": 3604, "end_char_pos": 3623}, {"type": "D", "before": "United Nations", "after": null, "start_char_pos": 4001, "end_char_pos": 4015}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 4225, "end_char_pos": 4227}, {"type": "R", "before": "--", "after": "\u2014", "start_char_pos": 4255, "end_char_pos": 4257}, {"type": "R", "before": "instutions", "after": "institutions", "start_char_pos": 5101, "end_char_pos": 5111}, {"type": "D", "before": "Bolivians", "after": null, "start_char_pos": 5850, "end_char_pos": 5859}, {"type": "D", "before": "Bulgarian", "after": null, "start_char_pos": 5908, "end_char_pos": 5917}], "sents_char_pos": [0, 418, 463, 813, 913, 1014, 1050, 1158, 1313, 1571, 1719, 1799, 1894, 2082, 2350, 2581, 2728, 2815, 3034, 3249, 3287, 3432, 3493, 3523, 3695, 3848, 3893, 4017, 4185, 4500, 4567, 4640, 4749, 4918, 5191, 5252, 5496, 5524, 5550, 5679, 5712, 5765]}
+{"doc_id": "902725", "revision_depth": "2", "before_revision": "This noticeboard is for instructors to request instructor rights to use the Education Course Extension on Wikinews. Instructor training and additional information for educators wanting to know more about using Wikinews can be find this information at WN:EDU. __NEWSECTIONLINK__ Current requests Requests%DIFDELCMD < %DIFDELCMD < %%% Request for course instructor right: LauraHale (talk) Name%DIFDELCMD < %DIFDELCMD < %%% Institution Course title and description%DIFDELCMD < %DIFDELCMD < %%% Assignment plan Number of students%DIFDELCMD < %DIFDELCMD < %%% Start and end dates --LauraHale (talk) 13:19, 24 November 2013 (UTC", "after_revision": "This page is for instructors to request instructor rights to use the Education Course Extension on Wikinews. Instructor training and additional information for educators wanting to know more about using Wikinews can be find this information at WN:EDU. Requests __NEWSECTIONLINK__ %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "R", "before": "noticeboard", "after": "page", "start_char_pos": 5, "end_char_pos": 16}, {"type": "A", "before": null, "after": "Requests", "start_char_pos": 259, "end_char_pos": 259}, {"type": "D", "before": "Current requests", "after": null, "start_char_pos": 279, "end_char_pos": 295}, {"type": "D", "before": "Requests", "after": null, "start_char_pos": 296, "end_char_pos": 304}, {"type": "D", "before": "Request for course instructor right: LauraHale (talk)", "after": null, "start_char_pos": 334, "end_char_pos": 387}, {"type": "D", "before": "Name", "after": null, "start_char_pos": 388, "end_char_pos": 392}, {"type": "D", "before": "Institution", "after": null, "start_char_pos": 422, "end_char_pos": 433}, {"type": "D", "before": "Course title and description", "after": null, "start_char_pos": 434, "end_char_pos": 462}, {"type": "D", "before": "Assignment plan", "after": null, "start_char_pos": 492, "end_char_pos": 507}, {"type": "D", "before": "Number of students", "after": null, "start_char_pos": 508, "end_char_pos": 526}, {"type": "D", "before": "Start and end dates", "after": null, "start_char_pos": 556, "end_char_pos": 575}, {"type": "D", "before": "--LauraHale (talk) 13:19, 24 November 2013 (UTC", "after": null, "start_char_pos": 576, "end_char_pos": 623}], "sents_char_pos": [0, 115, 577]}
+{"doc_id": "9058", "revision_depth": "1", "before_revision": "Last confirmed sighting was 60 years ago Wildlife scientists confirmed on Thursday that a bird long thought extinct, the Ivory-billed woodpecker , has been found in Arkansas . The remarkable birds have a 30-inch wingspan and stand nearly 20 inches high. There have been several independent sightings of the bird in Arkansas over the last year, and even a videotape. In an effort to support the birds, the Cornell Lab of Ornithology, the Nature Conservancy and other groups have joined to form the Big Woods Conservation Partnership to conserve 200,000 acres of forest habitat and rivers in the area during the next 10 years.", "after_revision": " Wildlife scientists confirmed on Thursday that a bird long thought extinct, the , has been found in . The remarkable birds have a 30-inch wingspan and stand nearly 20 inches high. There have been several independent sightings of the bird in Arkansas over the last year, and even a videotape. In an effort to support the birds, the Lab of Ornithology, , and other groups have joined to form the Big Woods Conservation Partnership to conserve 200,000 acres of forest habitat and rivers in the area during the next 10 years.", "edit_actions": [{"type": "D", "before": "Last confirmed sighting was 60 years ago", "after": null, "start_char_pos": 0, "end_char_pos": 40}, {"type": "D", "before": "Ivory-billed woodpecker", "after": null, "start_char_pos": 121, "end_char_pos": 144}, {"type": "D", "before": "Arkansas", "after": null, "start_char_pos": 165, "end_char_pos": 173}, {"type": "D", "before": "Cornell", "after": null, "start_char_pos": 405, "end_char_pos": 412}, {"type": "R", "before": "the Nature Conservancy", "after": ",", "start_char_pos": 433, "end_char_pos": 455}], "sents_char_pos": [0, 175, 253, 365]}
+{"doc_id": "91579", "revision_depth": "1", "before_revision": "250px| The Lakota Freedom Delegation announcing their withdrawal on December 19. The Lakota Freedom Delegation , which in December declared that the Lakota people were withdrawing from their treaties with the United States and reasserting their sovereignty as an independent state, is acting without the support of the Treaty Council, the traditional government of the Lakota, Wikinews has learned. Wikinews spoke with Floyd Looks-For-Buffalo Hand, an Oglala Lakota Treaty Delegate and Elder, also an author and a spiritual leader in the indigenous Lakota religion, and who is also blood uncle to Lakota Freedom Delegation member Canupa Gluha Mani. The Lakota Freedom Delegation has claimed that, while the BIA-recognized tribal governments of the Lakota have not supported them, the Lakota Freedom Delegation's authority extends from support by the Treaty Council of the Elders of Lakota as well as from the 1974 International Indian Treaty Council. \" Russell Means and Duane Martin [Canupa Gluha Mani] and that lady [Phyllis Young], they do not speak for the nation. You've got to have consensus\" among the eight tribes of the Lakota, he said, which the Lakota Freedom Delegation has not obtained. Mr. Hand stated that he was speaking as a tribal delegate with the consensus of the Oglala Treaty Delegation and his chief, Oliver Red Cloud . The Lakota independence movement claims large portions of the Great Plains region of the United StatesHand furthermore called the treaty withdrawal event a \"publicity stunt\" and that furthermore the 1974 meeting was not authorization to act on behalf of the Lakota people. While Means, Canupa Gluha Mani, and the rest of the delegation \"have free speech\" and can do as they wish, he said, the Elders of Lakota \"stated that they should remove themselves from treaty territory,\" that is, the Reservations inhabited by the Lakota. But \"they're still living here\" (Canupa Gluha Mani has been residing in Asheville, North Carolina since the treaty withdrawal press conference on 19 December ). Hand went on to explain, though, that the Treaty Council was planning to reconsider the Lakota's arrangement with the United States government. The Treaty Council of all eight Lakota tribes, which will meet on 28-30 January 2008, will consider whether to \"sit down to negotiate\" with the federal government. Members of the Lakota Freedom Delegation are expected to take part in that meeting. European-Americans, Hand said, are \"not honoring\" the 1851 and 1868 treaties which connected the Lakota to the United States, and noted that the Lakota were the only people to \"conquer\" the United States during the Indian Wars of the 19th century.", "after_revision": " The Lakota Freedom Delegation , which in December declared that the were withdrawing from their treaties with the United States and reasserting their sovereignty as an independent state, is acting without the support of the Treaty Council, the traditional government of the Lakota, Wikinews has learned. Wikinews spoke with Floyd Looks-For-Buffalo Hand, an Treaty Delegate and Elder, also an author and a spiritual leader in the indigenous Lakota religion, and who is also blood uncle to Lakota Freedom Delegation member Canupa Gluha Mani. The Lakota Freedom Delegation has claimed that, while the -recognized tribal governments of the Lakota have not supported them, the Lakota Freedom Delegation's authority extends from support by the Treaty Council of the Elders of Lakota as well as from the 1974 International Indian Treaty Council. \" and Duane Martin [Canupa Gluha Mani] and that lady [Phyllis Young], they do not speak for the nation. You've got to have consensus\" among the eight tribes of the Lakota, he said, which the Lakota Freedom Delegation has not obtained. Mr. Hand stated that he was speaking as a tribal delegate with the consensus of the Oglala Treaty Delegation and his chief, . The Lakota independence movement claims large portions of the region of the United StatesHand furthermore called the treaty withdrawal event a \"publicity stunt\" and that furthermore the 1974 meeting was not authorization to act on behalf of the Lakota people. While Means, Canupa Gluha Mani, and the rest of the delegation \"have free speech\" and can do as they wish, he said, the Elders of Lakota \"stated that they should remove themselves from treaty territory,\" that is, the Reservations inhabited by the Lakota. But \"they're still living here\" (Canupa Gluha Mani has been residing in , w|North Carolina since the treaty withdrawal press conference on December 19 ). Hand went on to explain, though, that the Treaty Council was planning to reconsider the Lakota's arrangement with the United States government. The Treaty Council of all eight Lakota tribes, which will meet on 28\u201330 January 2008, will consider whether to \"sit down to negotiate\" with the federal government. Members of the Lakota Freedom Delegation are expected to take part in that meeting. European-Americans, Hand said, are \"not honoring\" the which connected the Lakota to the United States, and noted that the Lakota were the only people to \"conquer\" the United States during the of the 19th century.", "edit_actions": [{"type": "D", "before": "250px|", "after": null, "start_char_pos": 0, "end_char_pos": 6}, {"type": "D", "before": "announcing their withdrawal on December 19. The Lakota Freedom Delegation", "after": null, "start_char_pos": 37, "end_char_pos": 110}, {"type": "D", "before": "Lakota people", "after": null, "start_char_pos": 149, "end_char_pos": 162}, {"type": "D", "before": "Oglala Lakota", "after": null, "start_char_pos": 452, "end_char_pos": 465}, {"type": "R", "before": "BIA-recognized", "after": "-recognized", "start_char_pos": 707, "end_char_pos": 721}, {"type": "D", "before": "Russell Means", "after": null, "start_char_pos": 953, "end_char_pos": 966}, {"type": "D", "before": "Oliver Red Cloud", "after": null, "start_char_pos": 1324, "end_char_pos": 1340}, {"type": "D", "before": "Great Plains", "after": null, "start_char_pos": 1405, "end_char_pos": 1417}, {"type": "R", "before": "Asheville, North Carolina", "after": ",", "start_char_pos": 1943, "end_char_pos": 1968}, {"type": "A", "before": null, "after": "w|North Carolina", "start_char_pos": 1969, "end_char_pos": 1969}, {"type": "R", "before": "19 December", "after": "December 19", "start_char_pos": 2018, "end_char_pos": 2029}, {"type": "R", "before": "28-30", "after": "28\u201330", "start_char_pos": 2243, "end_char_pos": 2248}, {"type": "D", "before": "1851 and 1868 treaties", "after": null, "start_char_pos": 2479, "end_char_pos": 2501}, {"type": "D", "before": "Indian Wars", "after": null, "start_char_pos": 2640, "end_char_pos": 2651}], "sents_char_pos": [0, 80, 398, 648, 950, 1068, 1199, 1342, 1615, 1870, 2032, 2176, 2340, 2424]}
+{"doc_id": "9663", "revision_depth": "1", "before_revision": "Archive picture of D-day battle order. The Arc de Triomphe during the May 8, 2005, celebrations Jacques Chirac and other officials The 60th anniversary of Victory in Europe Day has been commemorated Sunday across Europe and the USA . In Germany: President of Germany Horst K\u00f6hler and Chancellor Gerhard Schr\u00f6der attended a service at the Kaiser Wilhelm Memorial Church in Berlin and a wreath-laying ceremony at the main Soviet war memorial. VE Day is commemorated as Democracy Day in Germany, as Germans consider it to be the day when they, too, were liberated from Nazism . In the United Kingdom: Prince Charles , wearing his uniform of Vice Admiral in the Royal Navy , laid a commemorative wreath at the Cenotaph. Queen Elizabeth is scheduled to attend the main commemorative ceremony to be held on July 10, 2005. At 19:00 UTC a Dakota DC3, from the Battle of Britain Memorial Flight based at RAF Coningsby, flew over the Palace of Westminster, Whitehall, and Trafalgar Square to mark the beginning of a televised BBC VE Day concert. In France: President of France Jacques Chirac laid a memorial wreath at the Tomb of the Unknown Soldier at the Arc de Triomphe . In the Netherlands: President of the United States George W. Bush and Queen Beatrix of the Netherlands attended a memorial ceremony at a United States military cemetery near Maastricht , where the Last Post was sounded. In Croatia: President of Croatia Stjepan Mesi\u0107 gave a controversial speech at a commemorative celebration of victory over fascism in Zagreb , starting with \"Comrades, ladies and gentlemen.\" He said that NDH , a World War Two Croatian state, was \"founded on crime\" and is \"a discrace and an insult to Croats.\" The role of Usta\u0161e and Partisans during the World War Two is still a point of debate in Croatia. In the United States: Former Sen. Bob Dole spoke during a Sunday ceremony commemorating the anniversary of allied victory in Europe, May 8, 1945. The ceremony was held near the National World War II Memorial in Washington, D. C. The 60th anniversary of Victory Day is scheduled to be celebrated in Russia , and other successor states of the Soviet Union , on May 9, 2005. Related stories", "after_revision": " The Arc de Triomphe during the May 8, 2005, celebrations Jacques Chirac and other officials The 60th anniversary of has been commemorated Sunday across Europe and the . In Germany: and attended a service at the Kaiser Wilhelm Memorial Church in and a wreath-laying ceremony at the main Soviet war memorial. VE Day is commemorated as Democracy Day in Germany, as Germans consider it to be the day when they, too, were liberated from . In the United Kingdom: , wearing his uniform of in the , laid a commemorative wreath at the Cenotaph. is scheduled to attend the main commemorative ceremony to be held on July 10, 2005. At 19:00 UTC a Dakota DC3, from the Battle of Britain Memorial Flight based at RAF Coningsby, flew over the Palace of Westminster, Whitehall, and Trafalgar Square to mark the beginning of a televised BBC VE Day concert. In France: Jacques Chirac laid a memorial wreath at the at the . In the Netherlands: and Queen attended a memorial ceremony at a United States military cemetery near , where the was sounded. In : gave a controversial speech at a commemorative celebration of victory over fascism in , starting with \"Comrades, ladies and gentlemen.\" He said that , a World War Two Croatian state, was \"founded on crime\" and is \"a discrace and an insult to Croats.\" The role of and during the World War Two is still a point of debate in Croatia. In the United States: Former Sen. spoke during a Sunday ceremony commemorating the anniversary of allied victory in Europe, May 8, 1945. The ceremony was held near the in . The 60th anniversary of is scheduled to be celebrated in , and other successor states of the , on May 9, 2005. Related news", "edit_actions": [{"type": "D", "before": "Archive picture of D-day battle order.", "after": null, "start_char_pos": 0, "end_char_pos": 38}, {"type": "D", "before": "Victory in Europe Day", "after": null, "start_char_pos": 155, "end_char_pos": 176}, {"type": "D", "before": "USA", "after": null, "start_char_pos": 228, "end_char_pos": 231}, {"type": "R", "before": "President of Germany Horst K\u00f6hler and Chancellor Gerhard Schr\u00f6der", "after": "and", "start_char_pos": 246, "end_char_pos": 311}, {"type": "D", "before": "Berlin", "after": null, "start_char_pos": 372, "end_char_pos": 378}, {"type": "D", "before": "Nazism", "after": null, "start_char_pos": 566, "end_char_pos": 572}, {"type": "D", "before": "Prince Charles", "after": null, "start_char_pos": 598, "end_char_pos": 612}, {"type": "R", "before": "Vice Admiral in the Royal Navy", "after": "in the", "start_char_pos": 638, "end_char_pos": 668}, {"type": "D", "before": "Queen Elizabeth", "after": null, "start_char_pos": 716, "end_char_pos": 731}, {"type": "D", "before": "President of France", "after": null, "start_char_pos": 1047, "end_char_pos": 1066}, {"type": "R", "before": "Tomb of the Unknown Soldier at the Arc de Triomphe", "after": "at the", "start_char_pos": 1112, "end_char_pos": 1162}, {"type": "R", "before": "President of the United States George W. Bush and Queen Beatrix of the Netherlands", "after": "and Queen", "start_char_pos": 1185, "end_char_pos": 1267}, {"type": "D", "before": "Maastricht", "after": null, "start_char_pos": 1339, "end_char_pos": 1349}, {"type": "D", "before": "Last Post", "after": null, "start_char_pos": 1362, "end_char_pos": 1371}, {"type": "R", "before": "Croatia: President of Croatia Stjepan Mesi\u0107", "after": ":", "start_char_pos": 1388, "end_char_pos": 1431}, {"type": "D", "before": "Zagreb", "after": null, "start_char_pos": 1518, "end_char_pos": 1524}, {"type": "D", "before": "NDH", "after": null, "start_char_pos": 1588, "end_char_pos": 1591}, {"type": "R", "before": "Usta\u0161e and Partisans", "after": "and", "start_char_pos": 1706, "end_char_pos": 1726}, {"type": "D", "before": "Bob Dole", "after": null, "start_char_pos": 1825, "end_char_pos": 1833}, {"type": "R", "before": "National World War II Memorial in Washington, D. C.", "after": "in .", "start_char_pos": 1968, "end_char_pos": 2019}, {"type": "D", "before": "Victory Day", "after": null, "start_char_pos": 2044, "end_char_pos": 2055}, {"type": "D", "before": "Russia", "after": null, "start_char_pos": 2089, "end_char_pos": 2095}, {"type": "D", "before": "Soviet Union", "after": null, "start_char_pos": 2132, "end_char_pos": 2144}, {"type": "R", "before": "stories", "after": "news", "start_char_pos": 2171, "end_char_pos": 2178}], "sents_char_pos": [0, 38, 440, 574, 715, 815, 1035, 1164, 1384, 1574, 1693, 1790, 1824, 1936, 2162]}
+{"doc_id": "98828", "revision_depth": "1", "before_revision": "300px |Kirkwood City Hall A local man known for his outbursts and disruptive behavior with city officials killed five people at a city council meeting in City of Kirkwood Thursday before he was shot dead by police. The suspect shot and killed a Kirkwood Police officer on the way into City Hall where he shot a second officer. He then proceeded to shoot five more people in the room, killing 3 more. Kirkwood Police called to the scene for shots fired, returned fire killing the suspect. According to St. Louis County Police spokesman Tracy Panus. \"He came from the back of the room,\" said Janet McNichols, the Post Dispatch correspondent. \"He kept yelling 'shoot the mayor' and he just walked around shooting anybody he could.\" The two wounded include a Suburban Journal Reporter and Mayor Mike Swoboda. Swoboda underwent emergency surgery to treat a gunshot wound to the head Thursday night at St. John's Mercy Hospital in Creve Couer . Hospital spokesman Bill McShane delined to discuss Swoboda's injuries. He did note that another Suburban Journals reporter Todd Smith was in satisfactory condition. Smith was shot in the hand. According to KSDK, Thornton had been banned from City Council meetings but had made it known that he would be at Thursday night's meeting and extra police were assigned ahead of time. Swoboda, council members Michael H.T. Lynch and Conne Karr, and Public works Director Kenneth Yost were shot said the Post's McNichols.", "after_revision": "200px |Kirkwood City Hall On Thursday, a local man known for his outbursts and disruptive behavior with city officials killed five people at a city council meeting in City of Kirkwood , Missouri, United States. During the melee, he was shot dead by police. The suspect shot and killed a Kirkwood Police officer on the way into City Hall where he shot a second officer. He then proceeded to shoot five more people in the room, killing 3 more. Kirkwood Police called to the scene for shots fired, returned fire killing the suspect. According to St. Louis County Police Department spokesperson Tracy Panus. \"He came from the back of the room,\" said Janet McNichols, a St. Louis Post-Dispatch correspondent. \"He kept yelling 'shoot the mayor' and he just walked around shooting anybody he could.\" The two wounded are a Suburban Journals reporter and Mayor Mike Swoboda. Swoboda underwent emergency surgery to treat a gunshot wound to the head Thursday night at St. John's Mercy Hospital in Creve Coeur . Hospital spokesman Bill McShane delined to discuss Swoboda's injuries. He did note that another Suburban Journals reporter Todd Smith was in satisfactory condition. Smith was shot in the hand. According to KSDK, an NBC affiliate, Thornton had been banned from City Council meetings , but had made it known that he would be at Thursday night's meeting and extra police were assigned ahead of time. Swoboda, council members Michael H.T. Lynch and Conne Karr, and Public Works Director Kenneth Yost were shot , said the Post's McNichols.", "edit_actions": [{"type": "R", "before": "300px", "after": "200px", "start_char_pos": 0, "end_char_pos": 5}, {"type": "R", "before": "A", "after": "On Thursday, a", "start_char_pos": 26, "end_char_pos": 27}, {"type": "R", "before": "Thursday before", "after": ", Missouri, United States. During the melee,", "start_char_pos": 171, "end_char_pos": 186}, {"type": "R", "before": "spokesman", "after": "Department spokesperson", "start_char_pos": 525, "end_char_pos": 534}, {"type": "R", "before": "the Post Dispatch", "after": "a St. Louis Post-Dispatch", "start_char_pos": 607, "end_char_pos": 624}, {"type": "R", "before": "include a Suburban Journal Reporter", "after": "are a Suburban Journals reporter", "start_char_pos": 745, "end_char_pos": 780}, {"type": "R", "before": "Couer", "after": "Coeur", "start_char_pos": 931, "end_char_pos": 936}, {"type": "A", "before": null, "after": "an NBC affiliate,", "start_char_pos": 1151, "end_char_pos": 1151}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1204, "end_char_pos": 1204}, {"type": "R", "before": "works", "after": "Works", "start_char_pos": 1389, "end_char_pos": 1394}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1427, "end_char_pos": 1427}], "sents_char_pos": [0, 214, 326, 399, 487, 504, 547, 639, 728, 804, 938, 1009, 1103, 1131, 1317]}
+{"doc_id": "99787", "revision_depth": "1", "before_revision": "Chicago scored first with a Dustin Byfuglien goal 4:48 into the first period. Martin Havlat would put the Blackhawks up early in the second period. A late game goal by Colorado would ruin the shutout for Chicago goaltender Patrick Lalime, when Jaroslav Hlinka managed to beat Lalime at 17:35 in the third period. Lalime, who stopped 21 of 22 shots, picked up a win, his 11th of the season. Chicago picked up their third straight victory; Colorado picked up their third straight loss. Jonathan Cheechoo scored first for the Sharks to give them an early 1-0 lead. Ryan Callahan would tie the score at 11:34 in the first period to tie the score. Chris Drury would score a goal on a Rangers power play to put New York up by 1 in the second period. Callahan would score his second goal of the game by shooting a puck into an empty net with two seconds left in the third period. Who would've thought that two teams, who have combined to score 375 goals this season, would only manage one in this game? Niklas Hagman beat Detroit goaltender Jimmy Howard to break the scoreless tie 3:13 into the third period. That would be the only goal in the game, as Dallas, who have now won nine of their last ten games, give Detroit their sixth straight loss. Stars goalie Marty Turco picked up the shutout after stopping 28 shots. Matt Walker scored his first career NHL goal to put the Blues ahead in the first period. Columbus' Rick Nash would score his 31st goal of the season short handed to tie the score at 1 goal a piece. David Perron put St. Louis back in the lead early in the second period. Then, Brad Boyes scored on the power play to give St. Louis a two goal advantage. Andy McDonald and Keith Tkachuk each scored a power play goal to extend St. Louis' lead by 3. Manny Legace made 19 saves, and picked up an assist in the McDonald goal, in his 22nd win of the year. Eric Brewer had four assists, Erik Johnson had 2, and the Blues tied the season series with Columbus at three games each. Jarkko Ruutu broke the scoreless tie at 7:28 in the second period to put Pittsburgh on the board first. Petr Sykora would score two minutes later on a power play to put the Penguins up by 2 goals. Buffalo's only goal would come from Thomas Vanek at 14:45 in the second period to cut Pittsburgh's lead in half. Evgeni Malkin and Colby Armstrong each scored in the third period, and the Penguins took their third victory against the Sabres this season. Penguin goaltender Ty Conklin stopped 36 shots, and earned his 15th win of the season. Alexander Kovalev scored first for the Canadiens to give them the lead 6:18 into the game. Mike Richards would put the Flyers on the board on a short handed goal at 9:30 in the first. Francis Bouillon put Montreal in the lead with two seconds left in the first period. Philadelphia would tie the game at two goals a piece early in the second period when Braydon Coburn scored his 5th goal of the season. Michael Ryder would re-take the lead for Montreal when he scored less than two minutes later. Saku Koivu would extend the Canadiens' lead to 2 on a power-play goal just past the halfway point of the game. Maxim Lapierre would score a goal on an empty net at 18:36 in the third period. Riley Cote would add a Philadelphia goal about a minute later, but the damage was already done, as the Montreal Canadiens took their third straight victory and handed Philly their seventh straight loss. Daymond Langkow would give the Flames their only lead of the game at 15:10 in the first period on a power play goal. Ryan Getzlaf would score in the opening minute of the second period to tie the game. Ryan Carter would give the Ducks their first lead of the game 4:26 into the second period. That was followed by power play goals by Scott Niedermayer and Chris Pronger to give Anaheim a 3 goal lead by the end of the second period. Wayne Primeau would cut the Flames' deficit to two goals at 1:54 into the third period. Anaheim's two goal lead would hold as they pick up the victory at home. Teemu Selanne assisted in the Carter goal, his 670th point as a Duck, and his fourth point since returning to the Ducks on February 5. Chris Kunitz picked up a pair of assists, and Getzlaf had two points, assisting on Niedermeyer's game winning goal. A goal by Jerred Smithson put the Predators on the board early, his 5th goal of the season. Petteri Nummelin would put the Wild on the scoreboard just past the half-way point of the first period on a break-away, assisted by Eric Belanger. Mark Parrish would give Minnesota their first lead of the game with 23 seconds left in the opening period. Pierre-Marc Bouchard would add to the Wild lead at 14:19 in the second period with a power play goal. Martin Erat would cut the Wild's lead in half at 4:05 in the third, but Marian Gaborik would score his 31st goal of the season on a delayed penalty to put the Wild back ahead by two moments later. Nashville would tie the game when Ryan Suter scored at 8:54 in the third period, and Shea Weber scored on a Predator power play at 14:05. No goals would be scored through the rest of regulation, so the game was sent into overtime. Pavol Demitra passed across to Gaborik, who beat Nashville goalie Chris Mason , to win it for the Wild with 4 seconds left in the 4-on-4 overtime. Gaborik had a three point night, with two goals and an assist on the Parrish goal. The Blue Jackets activated Sergei Fedorov from injured reserve. Fedorov missed 13 games due to a concussion he suffered on January 17 in a game against the Phoenix Coyotes. The Rangers signed defenseman Fedor Tyutin to a contract extension. Tyutin, who was drafted by the Rangers in 2001, has played in 228 games with New York, scored 14 goals, and assisted in 46. The Rangers have also inked contract extensions for defenseman Dan Girardi and goaltender Henrik Lundqvist this week.", "after_revision": "Chicago scored first with a goal 4:48 into the first period. would put the Blackhawks up early in the second period. A late game goal by Colorado would ruin the shutout for Chicago goaltender , when managed to beat Lalime at 17:35 in the third period. Lalime, who stopped 21 of 22 shots, picked up a win, his 11th of the season. Chicago picked up their third straight victory; Colorado picked up their third straight loss. scored first for the Sharks to give them an early 1-0 lead. would tie the score at 11:34 in the first period to tie the score. would score a goal on a Rangers power play to put New York up by 1 in the second period. Callahan would score his second goal of the game by shooting a puck into an empty net with two seconds left in the third period. Who would've thought that two teams, who have combined to score 375 goals this season, would only manage one in this game? beat Detroit goaltender to break the scoreless tie 3:13 into the third period. That would be the only goal in the game, as Dallas, who have now won nine of their last ten games, give Detroit their sixth straight loss. Stars goalie picked up the shutout after stopping 28 shots. scored his first career NHL goal to put the Blues ahead in the first period. Columbus' would score his 31st goal of the season short handed to tie the score at 1 goal a piece. put St. Louis back in the lead early in the second period. Then, scored on the power play to give St. Louis a two goal advantage. and each scored a power play goal to extend St. Louis' lead by 3. made 19 saves, and picked up an assist in the McDonald goal, in his 22nd win of the year. had four assists, had 2, and the Blues tied the season series with Columbus at three games each. broke the scoreless tie at 7:28 in the second period to put Pittsburgh on the board first. would score two minutes later on a power play to put the Penguins up by 2 goals. Buffalo's only goal would come from at 14:45 in the second period to cut Pittsburgh's lead in half. and each scored in the third period, and the Penguins took their third victory against the Sabres this season. Penguin goaltender stopped 36 shots, and earned his 15th win of the season. scored first for the Canadiens to give them the lead 6:18 into the game. would put the Flyers on the board on a short handed goal at 9:30 in the first. put Montreal in the lead with two seconds left in the first period. Philadelphia would tie the game at two goals a piece early in the second period when scored his 5th goal of the season. would re-take the lead for Montreal when he scored less than two minutes later. would extend the Canadiens' lead to 2 on a power-play goal just past the halfway point of the game. would score a goal on an empty net at 18:36 in the third period. would add a Philadelphia goal about a minute later, but the damage was already done, as the Montreal Canadiens took their third straight victory and handed Philly their seventh straight loss. would give the Flames their only lead of the game at 15:10 in the first period on a power play goal. would score in the opening minute of the second period to tie the game. would give the Ducks their first lead of the game 4:26 into the second period. That was followed by power play goals by and to give Anaheim a 3 goal lead by the end of the second period. would cut the Flames' deficit to two goals at 1:54 into the third period. Anaheim's two goal lead would hold as they pick up the victory at home. assisted in the Carter goal, his 670th point as a Duck, and his fourth point since returning to the Ducks on February 5. picked up a pair of assists, and Getzlaf had two points, assisting on Niedermeyer's game winning goal. A goal by put the Predators on the board early, his 5th goal of the season. would put the Wild on the scoreboard just past the half-way point of the first period on a break-away, assisted by . would give Minnesota their first lead of the game with 23 seconds left in the opening period. would add to the Wild lead at 14:19 in the second period with a power play goal. would cut the Wild's lead in half at 4:05 in the third, but would score his 31st goal of the season on a delayed penalty to put the Wild back ahead by two moments later. Nashville would tie the game when scored at 8:54 in the third period, and scored on a Predator power play at 14:05. No goals would be scored through the rest of regulation, so the game was sent into overtime. passed across to Gaborik, who beat Nashville goalie , to win it for the Wild with 4 seconds left in the 4-on-4 overtime. Gaborik had a three point night, with two goals and an assist on the Parrish goal. The Blue Jackets activated from injured reserve. Fedorov missed 13 games due to a concussion he suffered on January 17 in a game against the Phoenix Coyotes. The Rangers signed defenseman to a contract extension. Tyutin, who was drafted by the Rangers in 2001, has played in 228 games with New York, scored 14 goals, and assisted in 46. The Rangers have also inked contract extensions for defenseman and goaltender this week.", "edit_actions": [{"type": "D", "before": "Dustin Byfuglien", "after": null, "start_char_pos": 28, "end_char_pos": 44}, {"type": "D", "before": "Martin Havlat", "after": null, "start_char_pos": 78, "end_char_pos": 91}, {"type": "R", "before": "Patrick Lalime, when Jaroslav Hlinka", "after": ", when", "start_char_pos": 223, "end_char_pos": 259}, {"type": "D", "before": "Jonathan Cheechoo", "after": null, "start_char_pos": 484, "end_char_pos": 501}, {"type": "D", "before": "Ryan Callahan", "after": null, "start_char_pos": 562, "end_char_pos": 575}, {"type": "D", "before": "Chris Drury", "after": null, "start_char_pos": 643, "end_char_pos": 654}, {"type": "D", "before": "Niklas Hagman", "after": null, "start_char_pos": 996, "end_char_pos": 1009}, {"type": "D", "before": "Jimmy Howard", "after": null, "start_char_pos": 1034, "end_char_pos": 1046}, {"type": "D", "before": "Marty Turco", "after": null, "start_char_pos": 1254, "end_char_pos": 1265}, {"type": "D", "before": "Matt Walker", "after": null, "start_char_pos": 1313, "end_char_pos": 1324}, {"type": "D", "before": "Rick Nash", "after": null, "start_char_pos": 1412, "end_char_pos": 1421}, {"type": "D", "before": "David Perron", "after": null, "start_char_pos": 1511, "end_char_pos": 1523}, {"type": "D", "before": "Brad Boyes", "after": null, "start_char_pos": 1589, "end_char_pos": 1599}, {"type": "R", "before": "Andy McDonald and Keith Tkachuk", "after": "and", "start_char_pos": 1665, "end_char_pos": 1696}, {"type": "D", "before": "Manny Legace", "after": null, "start_char_pos": 1759, "end_char_pos": 1771}, {"type": "D", "before": "Eric Brewer", "after": null, "start_char_pos": 1862, "end_char_pos": 1873}, {"type": "D", "before": "Erik Johnson", "after": null, "start_char_pos": 1892, "end_char_pos": 1904}, {"type": "D", "before": "Jarkko Ruutu", "after": null, "start_char_pos": 1984, "end_char_pos": 1996}, {"type": "D", "before": "Petr Sykora", "after": null, "start_char_pos": 2088, "end_char_pos": 2099}, {"type": "D", "before": "Thomas Vanek", "after": null, "start_char_pos": 2217, "end_char_pos": 2229}, {"type": "R", "before": "Evgeni Malkin and Colby Armstrong", "after": "and", "start_char_pos": 2294, "end_char_pos": 2327}, {"type": "D", "before": "Ty Conklin", "after": null, "start_char_pos": 2454, "end_char_pos": 2464}, {"type": "D", "before": "Alexander Kovalev", "after": null, "start_char_pos": 2522, "end_char_pos": 2539}, {"type": "D", "before": "Mike Richards", "after": null, "start_char_pos": 2613, "end_char_pos": 2626}, {"type": "D", "before": "Francis Bouillon", "after": null, "start_char_pos": 2706, "end_char_pos": 2722}, {"type": "D", "before": "Braydon Coburn", "after": null, "start_char_pos": 2876, "end_char_pos": 2890}, {"type": "D", "before": "Michael Ryder", "after": null, "start_char_pos": 2926, "end_char_pos": 2939}, {"type": "D", "before": "Saku Koivu", "after": null, "start_char_pos": 3020, "end_char_pos": 3030}, {"type": "D", "before": "Maxim Lapierre", "after": null, "start_char_pos": 3131, "end_char_pos": 3145}, {"type": "D", "before": "Riley Cote", "after": null, "start_char_pos": 3211, "end_char_pos": 3221}, {"type": "D", "before": "Daymond Langkow", "after": null, "start_char_pos": 3414, "end_char_pos": 3429}, {"type": "D", "before": "Ryan Getzlaf", "after": null, "start_char_pos": 3531, "end_char_pos": 3543}, {"type": "D", "before": "Ryan Carter", "after": null, "start_char_pos": 3616, "end_char_pos": 3627}, {"type": "R", "before": "Scott Niedermayer and Chris Pronger", "after": "and", "start_char_pos": 3748, "end_char_pos": 3783}, {"type": "D", "before": "Wayne Primeau", "after": null, "start_char_pos": 3847, "end_char_pos": 3860}, {"type": "D", "before": "Teemu Selanne", "after": null, "start_char_pos": 4007, "end_char_pos": 4020}, {"type": "D", "before": "Chris Kunitz", "after": null, "start_char_pos": 4142, "end_char_pos": 4154}, {"type": "D", "before": "Jerred Smithson", "after": null, "start_char_pos": 4268, "end_char_pos": 4283}, {"type": "D", "before": "Petteri Nummelin", "after": null, "start_char_pos": 4350, "end_char_pos": 4366}, {"type": "R", "before": "Eric Belanger. Mark Parrish", "after": ".", "start_char_pos": 4482, "end_char_pos": 4509}, {"type": "D", "before": "Pierre-Marc Bouchard", "after": null, "start_char_pos": 4604, "end_char_pos": 4624}, {"type": "D", "before": "Martin Erat", "after": null, "start_char_pos": 4706, "end_char_pos": 4717}, {"type": "D", "before": "Marian Gaborik", "after": null, "start_char_pos": 4778, "end_char_pos": 4792}, {"type": "D", "before": "Ryan Suter", "after": null, "start_char_pos": 4937, "end_char_pos": 4947}, {"type": "D", "before": "Shea Weber", "after": null, "start_char_pos": 4988, "end_char_pos": 4998}, {"type": "D", "before": "Pavol Demitra", "after": null, "start_char_pos": 5134, "end_char_pos": 5147}, {"type": "D", "before": "Chris Mason", "after": null, "start_char_pos": 5200, "end_char_pos": 5211}, {"type": "D", "before": "Sergei Fedorov", "after": null, "start_char_pos": 5391, "end_char_pos": 5405}, {"type": "D", "before": "Fedor Tyutin", "after": null, "start_char_pos": 5567, "end_char_pos": 5579}, {"type": "R", "before": "Dan Girardi and goaltender Henrik Lundqvist", "after": "and goaltender", "start_char_pos": 5792, "end_char_pos": 5835}], "sents_char_pos": [0, 77, 147, 312, 389, 437, 483, 561, 642, 743, 872, 995, 1101, 1240, 1312, 1401, 1510, 1531, 1582, 1636, 1664, 1861, 1983, 2087, 2180, 2293, 2434, 2521, 2612, 2705, 2790, 2925, 3019, 3130, 3210, 3413, 3530, 3615, 3706, 3846, 3934, 4006, 4141, 4257, 4349, 4496, 4603, 4705, 4902, 5040, 5133, 5280, 5363, 5427, 5536, 5604, 5728]}
+{"doc_id": "10612829", "revision_depth": "1", "before_revision": "Public anthropology, according to Robert Borofsky, a professor at Hawaii Pacific University, \"demonstrates the ability of anthropology and anthropologists to effectively address problems beyond the discipline - illuminating larger social issues of our times as well as encouraging broad, public conversations about them with the explicit goal of fostering social change\" (Borofsky 2004). The work of Partners In Health is one illustration of using anthropological methods and data to solve big or complicated problems. Merrill Singer has criticized the concept of public anthropology on the grounds that it ignores applied anthropology. He writes : \"given that many applied anthropologists already do the kinds of things that are now being described as PA, it is hard to understand why a new label is needed, except as a device for distancing public anthropologists from applied anthropologists\" (Singer 2000: 6). Similarly, Barbara Rylko-Bauer writes : \"one has to ask what is the purpose of these emerging labels that consciously distinguish themselves from applied/practicing anthropology? While they may serve the personal interests of those who develop them, it is hard to see how they serve the broader interests of the discipline\" (Rylko-Bauer 2000: 6). Eric Haanstad responds to Singer's claim by arguing that public anthropology does not necessarily entail the exclusion of applied anthropology (Haanstad 2001a). Alan Jeffery Fields defends the concept of public anthropology by claiming it is \"a useful trope for one important reason: it calls attention to the fact that there is a division between public and academic perceptions\" (Fields 2001a). Borofsky, who coined the term, prefers not to get drawn into such arguments, especially since the term was originally coined for an innovative, new book series published by the University of California Press. He writes: \u201c I feel uncomfortable getting caught up in what Sigmund Freud called the \u2018 narcissism of small differences \u2019 \u2013 related groups arguing over small differences to differentiate their identities. There are too many serious problems for anthropology to address \u201d (Borofsky 2019:130). He continues : Take, as an example, the anthropologist Ben Finney. Challenging Sharp\u2019s assertion that Polynesia was settled accidentally by unskilled navigators, Finney became a leading advocate that Polynesia was intentionally settled by Polynesians highly skilled in the art of open-ocean navigation, able to travel across thousands of miles guided by the stars and waves. In 1973, he co-founded the Polynesian Voyaging Society and served as its first president. The Polynesian Voyaging Society became the lead organization in building the Hokule\u2019a, a 62-foot-long double hull canoe. He was a part of the initial crew that sailed the Hokule\u2019a by celestial navigation to Tahiti in 1976. Later he helped crew the trips to New Zealand (Aotearoa) in 1985 and Rarotonga in 1992. Quoting Nainoa Thompson, the Polynesian Voyaging Society\u2019s current president and a prominent figure in the Hawaiian Cultural Renaissance movement, the voyage of the Hokule\u2019a \u201cchanged the whole identity of the Hawaiian people. We went from being castaways . . . to being children of the world\u2019s greatest navigators, . . . We owe it to our visionaries . . . and Ben was the first\u201d (Kubota 2018). Borofsky concludes: \u201c I do not see what is gained by trying to attach applied or public to Ben Finney \u2019 s work. What he did was impressive. He played a leading role in the resurrection of Hawaiian voyaging and, through that, the Hawaiian Cultural Renaissance \u201d (Borofsky 2019:130). Public anthropology, for Borofsky, is more than a label , is more than an intellectual dispute. It focuses on what anthropologists can achieve when they address problems beyond the discipline. References %DIFDELCMD < %DIFDELCMD < %%% Borofsky, Robert. 2019. An Anthropology of Anthropology. Center for Public Anthropology, Open Anthropology series. (ebook) Borofsky, Robert. 2004 Conceptualizing Public Anthropology. Electronic document, URL accessed April 11, 2007. Fields, Alan Jeffrey. 2001a Responsible Public Anthropology. Public Anthropology: The Graduate Journal. Electronic document, URL accessed April 12, 2007. Haanstad, Eric. 2001a Anthropology Revitalized: Public Anthropology and Student Activism. Public Anthropology: The Graduate Journal. Electronic document, URL accessed April 12, 2007. Kubota, Gary. 2018 Ben Finney, a founder of the Polynesian Voyaging Society, dies at 83. Star Advertiser, December 31. Electronic document, URL (accessed December 31, 2018). Rylko-Bauer, Barbara. 2000 Toward a More Inclusive Relevant Anthropology. Society for Applied Anthropology Newsletter 11(2): 6-7. Singer, Merrill. 2000 Why I Am Not a Public Anthropologist. Anthropology News 41(6): 6-7. External links The Prism: Anthropological Reflections on Culture Society Public Anthropology.org Partners In Health Further reading Harrison, Ira E. and Harrison, Faye V. Eds. (1998). African American Pioneers in Anthropology. Urbana: University of Illinois Press. Harrison, Faye. V. (1997) Decolonizing Anthropology: Moving Further Toward an Anthropology of Liberation. Washington D.C.: American Anthropological Association. Luktehaus, Nancy C. 2008. Margaret Mead: The Making of An American Icon. Princeton: Princeton University Press. ", "after_revision": "Public anthropology, according to Robert Borofsky, a professor at Hawaii Pacific University, \"demonstrates the ability of anthropology and anthropologists to effectively address problems beyond the discipline \u2014 illuminating larger social issues of our times as well as encouraging broad, public conversations about them with the explicit goal of fostering social change\" (Borofsky 2004). The work of Partners In Health is one illustration of using anthropological methods and data to solve big or complicated problems. Relation to applied anthropology Merrill Singer has criticized the concept of public anthropology on the grounds that it ignores applied anthropology. He wrote : \"given that many applied anthropologists already do the kinds of things that are now being described as PA, it is hard to understand why a new label is needed, except as a device for distancing public anthropologists from applied anthropologists\" (Singer 2000: 6). Similarly, Barbara Rylko-Bauer wrote : \"one has to ask what is the purpose of these emerging labels that consciously distinguish themselves from applied/practicing anthropology? While they may serve the personal interests of those who develop them, it is hard to see how they serve the broader interests of the discipline\" (Rylko-Bauer 2000: 6). Eric Haanstad responded to Singer's claim by arguing that public anthropology does not necessarily entail the exclusion of applied anthropology (Haanstad 2001a). Alan Jeffery Fields defended the concept of public anthropology by claiming it is \"a useful trope for one important reason: it calls attention to the fact that there is a division between public and academic perceptions\" (Fields 2001a). Borofsky, who coined the term, prefers not to get drawn into such arguments, especially since the term was originally merely coined for a book series published by the University of California Press. He wrote: \" I feel uncomfortable getting caught up in what Sigmund Freud called the ' narcissism of small differences '\u2014 related groups arguing over small differences to differentiate their identities. There are too many serious problems for anthropology to address \" (Borofsky 2019:130). He continued : Borofsky concluded: \" I do not see what is gained by trying to attach applied or public to Ben Finney ' s work. What he did was impressive. He played a leading role in the resurrection of Hawaiian voyaging and, through that, the Hawaiian Cultural Renaissance \" (Borofsky 2019:130). Public anthropology, for Borofsky, is more than a label and more than an intellectual dispute. Just like applied anthropology, it is about what anthropologists can achieve when they address problems beyond the discipline. References %DIFDELCMD < %DIFDELCMD < %%% Borofsky, Robert. 2019. An Anthropology of Anthropology. Center for Public Anthropology, Open Anthropology series. (ebook) Borofsky, Robert. 2004 Conceptualizing Public Anthropology. Electronic document, URL accessed April 11, 2007. Fields, Alan Jeffrey. 2001a Responsible Public Anthropology. Public Anthropology: The Graduate Journal. Electronic document, URL accessed April 12, 2007. Haanstad, Eric. 2001a Anthropology Revitalized: Public Anthropology and Student Activism. Public Anthropology: The Graduate Journal. Electronic document, URL accessed April 12, 2007. Kubota, Gary. 2018 Ben Finney, a founder of the Polynesian Voyaging Society, dies at 83. Star Advertiser, December 31. Electronic document, URL (accessed December 31, 2018). Rylko-Bauer, Barbara. 2000 Toward a More Inclusive Relevant Anthropology. Society for Applied Anthropology Newsletter 11(2): 6-7. Singer, Merrill. 2000 Why I Am Not a Public Anthropologist. Anthropology News 41(6): 6-7. Further reading Harrison, Ira E. and Harrison, Faye V. Eds. (1998). African American Pioneers in Anthropology. Urbana: University of Illinois Press. Harrison, Faye. V. (1997) Decolonizing Anthropology: Moving Further Toward an Anthropology of Liberation. Washington D.C.: American Anthropological Association. Luktehaus, Nancy C. 2008. Margaret Mead: The Making of An American Icon. Princeton: Princeton University Press. External links The Prism: Anthropological Reflections on Culture Society Public Anthropology.org Partners In Health", "edit_actions": [{"type": "R", "before": "-", "after": "\u2014", "start_char_pos": 209, "end_char_pos": 210}, {"type": "A", "before": null, "after": "Relation to applied anthropology", "start_char_pos": 519, "end_char_pos": 519}, {"type": "R", "before": "writes", "after": "wrote", "start_char_pos": 641, "end_char_pos": 647}, {"type": "R", "before": "writes", "after": "wrote", "start_char_pos": 946, "end_char_pos": 952}, {"type": "R", "before": "responds", "after": "responded", "start_char_pos": 1276, "end_char_pos": 1284}, {"type": "R", "before": "defends", "after": "defended", "start_char_pos": 1443, "end_char_pos": 1450}, {"type": "R", "before": "coined for an innovative, new", "after": "merely coined for a", "start_char_pos": 1777, "end_char_pos": 1806}, {"type": "R", "before": "writes: \u201c", "after": "wrote: \"", "start_char_pos": 1871, "end_char_pos": 1880}, {"type": "R", "before": "\u2018", "after": "'", "start_char_pos": 1953, "end_char_pos": 1954}, {"type": "R", "before": "\u2019 \u2013", "after": "'\u2014", "start_char_pos": 1987, "end_char_pos": 1990}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2136, "end_char_pos": 2137}, {"type": "R", "before": "continues", "after": "continued", "start_char_pos": 2162, "end_char_pos": 2171}, {"type": "D", "before": "Take, as an example, the anthropologist Ben Finney. Challenging Sharp\u2019s assertion that Polynesia was settled accidentally by unskilled navigators, Finney became a leading advocate that Polynesia was intentionally settled by Polynesians highly skilled in the art of open-ocean navigation, able to travel across thousands of miles guided by the stars and waves. In 1973, he co-founded the Polynesian Voyaging Society and served as its first president. The Polynesian Voyaging Society became the lead organization in building the Hokule\u2019a, a 62-foot-long double hull canoe. He was a part of the initial crew that sailed the Hokule\u2019a by celestial navigation to Tahiti in 1976. Later he helped crew the trips to New Zealand (Aotearoa) in 1985 and Rarotonga in 1992. Quoting Nainoa Thompson, the Polynesian Voyaging Society\u2019s current president and a prominent figure in the Hawaiian Cultural Renaissance movement, the voyage of the Hokule\u2019a \u201cchanged the whole identity of the Hawaiian people. We went from being castaways . . . to being children of the world\u2019s greatest navigators, . . . We owe it to our visionaries . . . and Ben was the first\u201d (Kubota 2018).", "after": null, "start_char_pos": 2174, "end_char_pos": 3328}, {"type": "R", "before": "Borofsky concludes: \u201c", "after": "Borofsky concluded: \"", "start_char_pos": 3329, "end_char_pos": 3350}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3431, "end_char_pos": 3432}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 3588, "end_char_pos": 3589}, {"type": "R", "before": ", is", "after": "and", "start_char_pos": 3667, "end_char_pos": 3671}, {"type": "R", "before": "It focuses on", "after": "Just like applied anthropology, it is about", "start_char_pos": 3707, "end_char_pos": 3720}, {"type": "D", "before": "External links The Prism: Anthropological Reflections on Culture", "after": null, "start_char_pos": 4809, "end_char_pos": 4873}, {"type": "D", "before": "Society Public Anthropology.org Partners In Health", "after": null, "start_char_pos": 4874, "end_char_pos": 4924}, {"type": "A", "before": null, "after": "External links The Prism: Anthropological Reflections on Culture", "start_char_pos": 5347, "end_char_pos": 5347}, {"type": "A", "before": null, "after": "Society Public Anthropology.org Partners In Health", "start_char_pos": 5348, "end_char_pos": 5348}], "sents_char_pos": [0, 387, 518, 637, 914, 1093, 1261, 1422, 1658, 1867, 2071, 2158, 2225, 2533, 2623, 2744, 2846, 2934, 3160, 3328, 3440, 3468, 3610, 3706, 3803, 3862, 3901, 3959, 3985, 4027, 4077, 4099, 4138, 4181, 4231, 4247, 4321, 4364, 4414, 4428, 4503, 4533, 4588, 4610, 4662, 4735, 4778, 4992, 5035, 5073, 5089, 5179, 5234, 5260, 5307]}
+{"doc_id": "1125702", "revision_depth": "1", "before_revision": "Polyarteritis nodosa (PAN) , is a systemic necrotizing inflammation of blood vessels (vasculitis) affecting medium-sized muscular arteries, typically involving the arteries of the kidneys and other internal organs but generally sparing the lungs' circulation. Polyarteritis nodosa may be present in infants. In polyarteritis nodosa, small aneurysms are strung like the beads of a rosary, therefore making \"rosary sign\" an important diagnostic feature of the vasculitis. PAN is sometimes associated with infection by the hepatitis B or hepatitis C virus. Signs and symptoms PAN may affect nearly every organ system and thus it can present with a broad array of signs and symptoms. These manifestations result from ischemic damage to affected organs, often the skin, heart, kidneys, and nervous system. Constitutional symptoms are seen in up to 90\\% of affected individuals and include fever, fatigue, weakness, loss of appetite, and unintentional weight loss. Neurologic System : Nerve involvement may cause sensory changes with numbness, pain, burning, and weakness (peripheral neuropathy). Peripheral nerves are often affected and this most commonly presents as mononeuritis multiplex, which is the most common neurologic sign of PAN. Mononeuritis multiplex develops in > 70\\% of patients with Polyarteritis Nodosa due to damage to arteries supplying large peripheral nerves. Most cases are marked by asymmetric polyneuropathy, but progressive disease can lead to symmetric nerve involvement. Central nervous system involvement may cause strokes or seizures. Renal System : Kidney involvement is common and often leads to death of parts of the kidney. Involvement of the renal artery, which supplies the kidneys with highly oxygenated blood, often leads to high blood pressure in about one-third of cases. deposition of protein or blood in the urine may also be seen. Almost all patients with PAN have renal insufficiency due to renal artery narrowing, thrombosis, and infarctions. Cardiovascular System : Involvement of the arteries of the heart may cause a heart attack, heart failure, and inflammation of the sac around the heart (pericarditis). Complications Stroke Heart failure due to cardiomyopathy and pericarditis Intestinal necrosis and perforation Causes There is no association with ANCA , but about 30\\% of people with PAN have chronic hepatitis B and deposits containing HBsAg-HBsAb complexes in affected blood vessels, indicating an immune complex\u2013mediated cause in that subset. Infection with the Hepatitis C virus and HIV are occasionally discovered in people affected by PAN. PAN has also been associated with underlying hairy cell leukemia. The cause remains unknown in the remaining cases; there may be causal and clinical distinctions between classic idiopathic PAN, the cutaneous forms of PAN, and PAN associated with chronic hepatitis. In children, cutaneous PAN is frequently associated with streptococcal infections, and positive streptococcal serology is included in the diagnostic criteria. In polyarteritis nodosa, small aneurysms are strung like the beads of a rosary, therefore making \"rosary sign\" a diagnostic feature of the vasculitis. In polyarteritis nodosa, small aneurysms are strung like the beads of a rosary, therefore making \"rosary sign\" an important diagnostic feature of the vasculitis. The 1990 ACR criteria were designed for classification purposes only . Nevertheless, their good discriminatory performances, indicated by the initial ACR analysis, suggested their potential usefulness for diagnostic purposes as well. Subsequent studies did not confirm their diagnostic utility, demonstrating a significant dependence of their discriminative abilities on the prevalence of the various vasculitides in the analyzed populations. Recently, an original study, combining the analysis of more than 100 items used to describe patients' characteristics in a large sample of vasculitides with a computer simulation technique designed to test the potential diagnostic utility of the various criteria, proposed a set of eight positively or negatively discriminating items to be used as a screening tool for diagnosis in patients suspected of systemic vasculitis. Differential diagnosis Polyarteritis nodosa rarely affects the blood vessels of the lungs and this feature can help to differentiate it from other vasculitides , which may have similar signs and symptoms (e.g., granulomatosis with polyangiitis or microscopic polyangiitis). Treatment Treatment involves medications to suppress the immune system, including prednisone and cyclophosphamide. When present, underlying hepatitis B virus infection should be immediately treated. In some cases, methotrexate or leflunomide may be helpful. Some patients have also noticed a remission phase when a four-dose infusion of rituximab is used before the leflunomide treatment is begun. Therapy results in remissions or cures in 90\\% of cases. Untreated, the disease is fatal in most cases. The most serious associated conditions generally involve the kidneys and gastrointestinal tract. A fatal course usually involves gastrointestinal bleeding, infection, myocardial infarction, and/or kidney failure.Giannini, AJ; Black, HR. Psychiatric, Psychogenic and Somatopsychic Disorders Handbook. Garden City, NY. Medical Examination Publishing, 1978. Pp. 219\u2013220. History The medical eponyms ( Kussmaul disease or Kussmaul-Maier disease ) reflect the seminal description of the disease in the medical literature by Adolph Kussmaul and Rudolf Robert Maier. Culture The 1956 film Bigger Than Life featured the protagonist being diagnosed with polyarteritis nodosa .", "after_revision": "Polyarteritis nodosa (PAN) is a systemic necrotizing inflammation of blood vessels (vasculitis) affecting medium-sized muscular arteries, typically involving the arteries of the kidneys and other internal organs but generally sparing the lungs' circulation. Small aneurysms are strung like the beads of a rosary, therefore making this \"rosary sign\" an important diagnostic feature of the vasculitis. PAN is sometimes associated with infection by the hepatitis B or hepatitis C virus. The condition may be present in infants. Signs and symptoms PAN may affect nearly every organ system and thus can present with a broad array of signs and symptoms. These manifestations result from ischemic damage to affected organs, often the skin, heart, kidneys, and nervous system. Constitutional symptoms are seen in up to 90\\% of affected individuals and include fever, fatigue, weakness, loss of appetite, and unintentional weight loss. Neurologic system : Nerve involvement may cause sensory changes with numbness, pain, burning, and weakness (peripheral neuropathy). Peripheral nerves are often affected , and this most commonly presents as mononeuritis multiplex, which is the most common neurologic sign of PAN. Mononeuritis multiplex develops in more than 70\\% of patients with polyarteritis nodosa because of damage to arteries supplying large peripheral nerves. Most cases are marked by asymmetric polyneuropathy, but progressive disease can lead to symmetric nerve involvement. Central nervous system involvement may cause strokes or seizures. Renal system : Kidney involvement is common and often leads to death of parts of the kidney. Involvement of the renal artery, which supplies the kidneys with highly oxygenated blood, often leads to high blood pressure in about one-third of cases. deposition of protein or blood in the urine may also be seen. Almost all patients with PAN have renal insufficiency caused by renal artery narrowing, thrombosis, and infarctions. Cardiovascular system : Involvement of the arteries of the heart may cause a heart attack, heart failure, and inflammation of the sac around the heart (pericarditis). Complications Stroke Heart failure resulting from cardiomyopathy and pericarditis Intestinal necrosis and perforation Causes PAN has no association with anti-neutrophil cytoplasmic antibodies , but about 30\\% of people with PAN have chronic hepatitis B and deposits containing HBsAg-HBsAb complexes in affected blood vessels, indicating an immune complex-mediated cause in that subset. Infection with the hepatitis C virus and HIV are occasionally discovered in people affected by PAN. PAN has also been associated with underlying hairy cell leukemia. The cause remains unknown in the remaining cases; there may be causal and clinical distinctions between classic idiopathic PAN, the cutaneous forms of PAN, and PAN associated with chronic hepatitis. In children, cutaneous PAN is frequently associated with streptococcal infections, and positive streptococcal serology is included in the diagnostic criteria. In polyarteritis nodosa, small aneurysms are strung like the beads of a rosary, therefore making \"rosary sign\" a diagnostic feature of the vasculitis. In polyarteritis nodosa, small aneurysms are strung like the beads of a rosary, therefore making this \"rosary sign\" an important diagnostic feature of the vasculitis. The 1990 ACR criteria were designed for classification purposes only , but their good discriminatory performances, indicated by the initial ACR analysis, suggested their potential usefulness for diagnostic purposes as well. Subsequent studies did not confirm their diagnostic utility, demonstrating a significant dependence of their discriminative abilities on the prevalence of the various vasculitides in the analyzed populations. Recently, an original study, combining the analysis of more than 100 items used to describe patients' characteristics in a large sample of vasculitides with a computer simulation technique designed to test the potential diagnostic utility of the various criteria, proposed a set of eight positively or negatively discriminating items to be used as a screening tool for diagnosis in patients suspected of systemic vasculitis. Differential diagnosis Polyarteritis nodosa rarely affects the blood vessels of the lungs and this feature can help to differentiate it from other vasculitides that may have similar signs and symptoms (e.g., granulomatosis with polyangiitis or microscopic polyangiitis). Treatment Treatment involves medications to suppress the immune system, including prednisone and cyclophosphamide. When present, underlying hepatitis B virus infection should be immediately treated. In some cases, methotrexate or leflunomide may be helpful. Some patients have entered a remission phase when a four-dose infusion of rituximab is used before the leflunomide treatment is begun. Therapy results in remissions or cures in 90\\% of cases. Untreated, the disease is fatal in most cases. The most serious associated conditions generally involve the kidneys and gastrointestinal tract. A fatal course usually involves gastrointestinal bleeding, infection, myocardial infarction, and/or kidney failure.Giannini, AJ; Black, HR. Psychiatric, Psychogenic and Somatopsychic Disorders Handbook. Garden City, NY. Medical Examination Publishing, 1978. Pp. 219\u2013220. History The medical eponyms Kussmaul disease or Kussmaul-Maier disease reflect the seminal description of the disease in the medical literature by Adolph Kussmaul and Rudolf Robert Maier. Culture In the 1956 American film Bigger Than Life , the protagonist character played by James Mason is diagnosed with polyarteritis nodosa after experiencing excruciating chest pain and is treated with cortisone .", "edit_actions": [{"type": "D", "before": ",", "after": null, "start_char_pos": 27, "end_char_pos": 28}, {"type": "R", "before": "Polyarteritis nodosa may be present in infants. In polyarteritis nodosa, small", "after": "Small", "start_char_pos": 260, "end_char_pos": 338}, {"type": "A", "before": null, "after": "this", "start_char_pos": 405, "end_char_pos": 405}, {"type": "A", "before": null, "after": "The condition may be present in infants.", "start_char_pos": 555, "end_char_pos": 555}, {"type": "D", "before": "it", "after": null, "start_char_pos": 625, "end_char_pos": 627}, {"type": "R", "before": "System", "after": "system", "start_char_pos": 972, "end_char_pos": 978}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1130, "end_char_pos": 1130}, {"type": "R", "before": ">", "after": "more than", "start_char_pos": 1274, "end_char_pos": 1275}, {"type": "R", "before": "Polyarteritis Nodosa due to", "after": "polyarteritis nodosa because of", "start_char_pos": 1298, "end_char_pos": 1325}, {"type": "R", "before": "System", "after": "system", "start_char_pos": 1569, "end_char_pos": 1575}, {"type": "R", "before": "due to", "after": "caused by", "start_char_pos": 1926, "end_char_pos": 1932}, {"type": "R", "before": "System", "after": "system", "start_char_pos": 2001, "end_char_pos": 2007}, {"type": "R", "before": "due to", "after": "resulting from", "start_char_pos": 2188, "end_char_pos": 2194}, {"type": "R", "before": "There is", "after": "PAN has", "start_char_pos": 2270, "end_char_pos": 2278}, {"type": "R", "before": "ANCA", "after": "anti-neutrophil cytoplasmic antibodies", "start_char_pos": 2299, "end_char_pos": 2303}, {"type": "R", "before": "complex\u2013mediated", "after": "complex-mediated", "start_char_pos": 2459, "end_char_pos": 2475}, {"type": "R", "before": "Hepatitis", "after": "hepatitis", "start_char_pos": 2517, "end_char_pos": 2526}, {"type": "A", "before": null, "after": "this", "start_char_pos": 3270, "end_char_pos": 3270}, {"type": "R", "before": ". Nevertheless,", "after": ", but", "start_char_pos": 3405, "end_char_pos": 3420}, {"type": "R", "before": ", which", "after": "that", "start_char_pos": 4364, "end_char_pos": 4371}, {"type": "R", "before": "also noticed", "after": "entered", "start_char_pos": 4755, "end_char_pos": 4767}, {"type": "D", "before": "(", "after": null, "start_char_pos": 5376, "end_char_pos": 5377}, {"type": "D", "before": ")", "after": null, "start_char_pos": 5421, "end_char_pos": 5422}, {"type": "R", "before": "The", "after": "In the", "start_char_pos": 5548, "end_char_pos": 5551}, {"type": "A", "before": null, "after": "American", "start_char_pos": 5557, "end_char_pos": 5557}, {"type": "R", "before": "featured the protagonist being", "after": ", the protagonist character played by James Mason is", "start_char_pos": 5580, "end_char_pos": 5610}, {"type": "A", "before": null, "after": "after experiencing excruciating chest pain and is treated with cortisone", "start_char_pos": 5647, "end_char_pos": 5647}], "sents_char_pos": [0, 259, 307, 470, 554, 681, 802, 960, 1092, 1238, 1379, 1496, 1562, 1655, 1871, 1985, 2152, 2497, 2597, 2663, 2713, 2862, 3021, 3172, 3335, 3406, 3569, 3778, 4203, 4477, 4592, 4676, 4735, 4875, 4932, 4979, 5076, 5192, 5205, 5279, 5334, 5347, 5539]}
+{"doc_id": "1129700", "revision_depth": "1", "before_revision": "The war and the surrender of the Imamate The war with Russia had several great victories early on , but at the time Russia hadn't really committed to the war seriously. With their great victory over Napoleon's Grand Army , the Russian people saw little concern in the petty Asiatic resistance occurring on their southern border . However, the Caucasians did reach a point where they pushed the Russians back hard enough to warrant a full-scale attack . In 1832 , Shamil and Ghazi launched a failed attack on Vladikavkaz, which was at the time a Russian military fort mockingly named \"Ruler of The Caucasus\" . The Russians countered , launching an assault on what was as close to capital as the Imamatehad, Gimry. This resulted in the seizure of the town by the Russians and the death of Ghazi Muhammad. Shamil himself was the only man to escape the battle, after which he went into hiding to evade the Russians. Everyone assumed him to be dead . In the absence of Shamil, an imam by the name of Gamzat-bek ruled . Gamzat-bek was an imam who had played a vital role in securing the Avar Khans for the Imamate, and had since been a naib to Shamil and Ghazi. Shamil returned a year later, only to have Gamzat-bek assassinated by the same Avar Khanates he had defeated. With no one else to take the position, Shamil became the 3rd leader of the Imamate. Shamil would turn out to be the greatest of the Imams by far and would rule for 27 years . He would conquer the Western Muslim tribes, and transform a group of small bickering villages into a united country. However, he would also see great casualties to his people too , particularly in the Siege of Akhoulgo where he would personally lose around 4500 of his own people. But he would continue to rule until 1859 when the Emperor of Russia would offer Shamil a peaceful surrender , he would even be a guest of the royal palace. Shamil agreed, and The Caucasian Imamate was no more. However, fighting did not immediately cease. In 1859 , Shamil wrote to one of his sons: \"By the will of the Almighty, the Absolute Governor, I have fallen into the hands of unbelievers... the Great Emperor... has settled me here... in a tall, spacious house with carpets and all the necessities.\"Pis'mo Shamilia Mukhammadanu, NOvember 24, 1859, in Omarov, ed. 100 pisem Shamilia ", "after_revision": "The war and the surrender of the Imamate The Caucasians gained several great victories early in their war with Russia , but at the time Russia hadn't really committed to the war seriously. With their great victory over Napoleon's Grand Army in 1812 , the Russian people saw little concern in the petty \"Asiatic\" resistance occurring on their southern borders . However, the Caucasians did reach a point where they pushed the Russians back hard enough to warrant a full-scale Russian counter-attack . In 1832 Shamil and Ghazi launched a failed attack on Vladikavkaz, which was at the time a Russian military fort mockingly named \"Ruler of The Caucasus\" - from + . The Russians countered : General launched an assault on the de facto capital of the Imamate, the small settlement of Gimry. This resulted in the seizure of the town by the Russians (October 1832) and the death of Ghazi Muhammad. Shamil himself , the only man to escape the battle, went into hiding to evade the Russians. Everyone assumed that he had died . In the absence of Shamil, an imam by the name of Gamzat-bek ruled (1832-1834) . Gamzat-bek , an imam who had played a vital role in securing the Avar Khans for the Imamate, had since been a naib to Shamil and Ghazi. Shamil returned a year later, but Gamzat-bek was assassinated by the same Avar Khanates he had defeated. With no one else to take the position, Shamil became the third leader of the Imamate. Shamil would turn out to be the greatest of the Imams by far and would rule for 25 years (1834-1859). Shamil sought to build on British popular support for his anti-Russian struggle in \"the Great Game\" context, but no official British assistance arrived. Shamil conquered the Western Muslim tribes, and transformed a group of small bickering villages into a united country. However, he also saw great casualties to his people , particularly in the Siege of Akhoulgo in Dagestan in 1839, where he lost around 4500 of his own people. But he continued to rule until 1859 , when Emperor Alexander II of Russia offered Shamil a peaceful surrender - he would even be a guest of the imperial palace. Shamil agreed, and the Caucasian Imamate was no more. However, fighting did not immediately cease. In 1859 Shamil wrote to one of his sons: \"By the will of the Almighty, the Absolute Governor, I have fallen into the hands of unbelievers... the Great Emperor... has settled me here... in a tall, spacious house with carpets and all the necessities.\"Pis'mo Shamilia Mukhammadanu, November 24, 1859, in Omarov, ed. 100 pisem Shamilia .", "edit_actions": [{"type": "R", "before": "war with Russia had", "after": "Caucasians gained", "start_char_pos": 45, "end_char_pos": 64}, {"type": "R", "before": "on", "after": "in their war with Russia", "start_char_pos": 95, "end_char_pos": 97}, {"type": "A", "before": null, "after": "in 1812", "start_char_pos": 221, "end_char_pos": 221}, {"type": "R", "before": "Asiatic", "after": "\"Asiatic\"", "start_char_pos": 275, "end_char_pos": 282}, {"type": "R", "before": "border", "after": "borders", "start_char_pos": 322, "end_char_pos": 328}, {"type": "R", "before": "attack", "after": "Russian counter-attack", "start_char_pos": 445, "end_char_pos": 451}, {"type": "D", "before": ",", "after": null, "start_char_pos": 462, "end_char_pos": 463}, {"type": "A", "before": null, "after": "- from +", "start_char_pos": 608, "end_char_pos": 608}, {"type": "R", "before": ", launching", "after": ": General launched", "start_char_pos": 634, "end_char_pos": 645}, {"type": "R", "before": "what was as close to capital as the Imamatehad,", "after": "the de facto capital of the Imamate, the small settlement of", "start_char_pos": 660, "end_char_pos": 707}, {"type": "A", "before": null, "after": "(October 1832)", "start_char_pos": 772, "end_char_pos": 772}, {"type": "R", "before": "was", "after": ",", "start_char_pos": 821, "end_char_pos": 824}, {"type": "D", "before": "after which he", "after": null, "start_char_pos": 860, "end_char_pos": 874}, {"type": "R", "before": "him to be dead", "after": "that he had died", "start_char_pos": 932, "end_char_pos": 946}, {"type": "A", "before": null, "after": "(1832-1834)", "start_char_pos": 1015, "end_char_pos": 1015}, {"type": "R", "before": "was", "after": ",", "start_char_pos": 1029, "end_char_pos": 1032}, {"type": "D", "before": "and", "after": null, "start_char_pos": 1113, "end_char_pos": 1116}, {"type": "R", "before": "only to have", "after": "but", "start_char_pos": 1190, "end_char_pos": 1202}, {"type": "A", "before": null, "after": "was", "start_char_pos": 1214, "end_char_pos": 1214}, {"type": "R", "before": "3rd", "after": "third", "start_char_pos": 1328, "end_char_pos": 1331}, {"type": "R", "before": "27 years . He would conquer the", "after": "25 years (1834-1859).", "start_char_pos": 1435, "end_char_pos": 1466}, {"type": "A", "before": null, "after": "Shamil sought to build on British popular support for his anti-Russian struggle in \"the Great Game\" context, but no official British assistance arrived. Shamil conquered the", "start_char_pos": 1467, "end_char_pos": 1467}, {"type": "R", "before": "transform", "after": "transformed", "start_char_pos": 1495, "end_char_pos": 1504}, {"type": "R", "before": "would also see", "after": "also saw", "start_char_pos": 1576, "end_char_pos": 1590}, {"type": "D", "before": "too", "after": null, "start_char_pos": 1622, "end_char_pos": 1625}, {"type": "R", "before": "where he would personally lose", "after": "in Dagestan in 1839, where he lost", "start_char_pos": 1666, "end_char_pos": 1696}, {"type": "R", "before": "would continue", "after": "continued", "start_char_pos": 1735, "end_char_pos": 1749}, {"type": "R", "before": "when the Emperor of Russia would offer", "after": ", when Emperor Alexander II of Russia offered", "start_char_pos": 1769, "end_char_pos": 1807}, {"type": "R", "before": ",", "after": "-", "start_char_pos": 1836, "end_char_pos": 1837}, {"type": "R", "before": "royal", "after": "imperial", "start_char_pos": 1870, "end_char_pos": 1875}, {"type": "R", "before": "The", "after": "the", "start_char_pos": 1903, "end_char_pos": 1906}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1991, "end_char_pos": 1992}, {"type": "R", "before": "NOvember", "after": "November", "start_char_pos": 2264, "end_char_pos": 2272}, {"type": "A", "before": null, "after": ".", "start_char_pos": 2317, "end_char_pos": 2317}], "sents_char_pos": [0, 168, 330, 453, 610, 714, 805, 914, 948, 1159, 1270, 1354, 1445, 1563, 1727, 1883, 1937, 1982, 2233]}
+{"doc_id": "11981905", "revision_depth": "1", "before_revision": "Ethics is an academic journal established in 1890 as the International Journal of Ethics, renamed in 1938, and published since 1923 by the University of Chicago Press. The journal covers scholarly work in moral, political, and legal philosophy from a variety of intellectual perspectives, including social and political theory, law, and economics. Ethics publishes both theory and application of theory to contemporary moral issues, and accepts historical essays, provided they have significant implications for contemporary theory. Ethics also publishes review essays, discussion articles, and book reviews. The journal frequently publishes work from contributors outside the United States, and work that draws on more than one disciplinary approach. Ethics is noteworthy for its well-blinded review process. Authors are not told the names of external reviewers, nor are external reviewers told the names of authors. Furthermore, editors are unable to see the authors' names when screening papers, or voting on papers put forward by handling editors. Rankings According to the Thomson Reuters 2017 Journal Citation Reports, the journal has an impact factor of 1.159, ranking it 19th out of 51 journals in the category \" Ethics \". Scimago Journal Rank places Ethics 12th in the category of philosophy in 2016, giving it an SRJ indicator of 1.371.%DIFDELCMD < %DIFDELCMD < %%% Google Scholar gives Ethics an h-5 index of 20, ranking it 7th in the category of \"Ethics.\" In the category of \"Philosophy,\" Ethics ranks 10th. An h5-index is the h-index for articles published in the last 5 complete years. It is the largest number h such that h articles published in 2012-2016 have at least h citations each. History%DIFDELCMD < %DIFDELCMD < %%% Ethics is the direct continuation of the International Journal of Ethics (IJE), founded in October 1890. IJE'''s first volume included contributions by many leading moral philosophers, including the pragmatists John Dewey and William James, idealists Bernard Bosanquet and Josiah Royce, and the utilitarian Henry Sidgwick. The IJE was established by the leaders of the humanist Ethical Movement, most notably Felix Adler, who was involved in the American Ethical Union, but also his humanist counterparts in the British Ethical Union such as Stanton Coit, John Stuart Mackenzie, and J.H. Muirhead, as part of an editorial board which also featured philosophers from Paris, Berlin, and Prague. The journal's first editor was S. Burns Weston, who assembled an international Editorial Committee . From its first issue in October, 1890 IJE published articles on ethics, discussions, and book reviews. IJE'' also served another function, which was to report on the activities of ethical culture societies around the world. Examples include the 1891 \u201cbook review\u201d summarizing the annual report of the Workingman\u2019s School that was being operated by the New York Ethical Society and Jane Addam's 1898 report and commentary on her reformist social work at Hull House in Chicago. Thomas Vernor Smith became editor of the journal in 1932, and brought on a number of new members to the Editorial Committee , including Herbert James Paton, Ralph Barton Perry, and W.D. Ross. Under the leadership of Brian Barry in 1979, the journal became more interdisciplinary and once again quite international, and the editorial board grew to fifty-two members. Editor Gerald Dworkin instituted a well-blinded review process in 1991. In 2017, the then editor, Henry S. Richardson, removed the remaining qualifications resulting in a review process in which none of the editors learn the authors' names until after the final decision has been reached on their submission. In 2018, Julia L Driver and Connie S. Rosati became co-editors of the journal, the first women to do so in its history. Notable articles %DIFDELCMD < %DIFDELCMD < %%% \"An Epistemic Conception of Democracy\" (1986) - Joshua Cohen \"Polity and Group Difference\" (1989) - Iris Marion Young \"Liberal Individualism and Liberal Neutrality\" (1989) - Will Kymlicka \"Assessing the Communitarian Critique of Liberalism\" (1989) - Allen Buchanan \"Cosmopolitanism and Sovereignty\" (1992) - Thomas Pogge \"Distributive Justice: What the People Think\" (1992) David Miller \"Two Concepts of Liberalism\" (1995) - William Galston \"Trust as an Affective Attitude\" (1996) - Karen Jones* \"Nations, States, and Territory\" (2011) - Anna Stilz \"Valuing Disability, Causing Disability\" (2014) - Elizabeth Barnes \"Amelioration and Inclusion: Gender Identity and the Concept of Woman\" (2016) - Katharine Jenkins*", "after_revision": "Ethics is a peer-reviewed academic journal established in 1890 as the International Journal of Ethics, renamed in 1938, and published since 1923 by the University of Chicago Press. The journal covers scholarly work in moral, political, and legal philosophy from a variety of intellectual perspectives, including social and political theory, law, and economics. It publishes both theory and application of theory to contemporary moral issues, as well as historical essays, provided they have significant implications for contemporary theory. The journal also publishes review essays, discussion articles, and book reviews. The journal employs a double-blind peer review process. According to the Journal Citation Reports, the journal has a 2019 impact factor of1.892. History Ethics %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% is the direct continuation of the International Journal of Ethics , established in October 1890. Its first volume included contributions by many leading moral philosophers, including the pragmatists John Dewey and William James, idealists Bernard Bosanquet , and Josiah Royce, and the utilitarian Henry Sidgwick. The jouornal was established by the leaders of the humanist Ethical Movement, most notably Felix Adler, who was involved in the American Ethical Union, but also his humanist counterparts in the British Ethical Union such as Stanton Coit, John Stuart Mackenzie, and J.H. Muirhead, as part of an editorial board which also featured philosophers from Paris, Berlin, and Prague. The journal's first editor was S. Burns Weston, who assembled an international editorial committee . From its first issue in October, 1890 the journal published articles on ethics, discussions, and book reviews. It also served another function, which was to report on the activities of ethical culture societies around the world. Examples include the 1891 \"book review\" summarizing the annual report of the Workingman\u2019s School that was being operated by the New York Ethical Society and Jane Addam's 1898 report and commentary on her reformist social work at Hull House in Chicago. Thomas Vernor Smith became editor of the journal in 1932, and brought on a number of new members to the editorial committee , including Herbert James Paton, Ralph Barton Perry, and W.D. Ross. Under the leadership of Brian Barry in 1979, the journal became more interdisciplinary and once again quite international, and the editorial board grew to fifty-two members. Editor Gerald Dworkin instituted a double-blind review process in 1991. In 2017, the then editor, Henry S. Richardson, removed the remaining qualifications resulting in a review process in which none of the editors learn the authors' names until after the final decision has been reached on their submission. In 2018, Julia L Driver and Connie S. Rosati became co-editors of the journal, the first women to do so in its history. Notable articles %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "R", "before": "an", "after": "a peer-reviewed", "start_char_pos": 10, "end_char_pos": 12}, {"type": "R", "before": "Ethics", "after": "It", "start_char_pos": 348, "end_char_pos": 354}, {"type": "R", "before": "and accepts", "after": "as well as", "start_char_pos": 433, "end_char_pos": 444}, {"type": "R", "before": "Ethics", "after": "The journal", "start_char_pos": 533, "end_char_pos": 539}, {"type": "D", "before": "frequently publishes work from contributors outside the United States, and work that draws on more than one disciplinary approach.", "after": null, "start_char_pos": 621, "end_char_pos": 751}, {"type": "R", "before": "Ethics is noteworthy for its well-blinded", "after": "employs a double-blind peer", "start_char_pos": 752, "end_char_pos": 793}, {"type": "D", "before": "Authors are not told the names of external reviewers, nor are external reviewers told the names of authors. Furthermore, editors are unable to see the authors' names when screening papers, or voting on papers put forward by handling editors.", "after": null, "start_char_pos": 810, "end_char_pos": 1051}, {"type": "D", "before": "Rankings", "after": null, "start_char_pos": 1052, "end_char_pos": 1060}, {"type": "D", "before": "Thomson Reuters 2017", "after": null, "start_char_pos": 1078, "end_char_pos": 1098}, {"type": "R", "before": "an impact factor of 1.159, ranking it 19th out of 51 journals in the category \"", "after": "a 2019 impact factor of1.892. History", "start_char_pos": 1141, "end_char_pos": 1220}, {"type": "D", "before": "\".", "after": null, "start_char_pos": 1228, "end_char_pos": 1230}, {"type": "D", "before": "Scimago Journal Rank places Ethics 12th in the category of philosophy in 2016, giving it an SRJ indicator of 1.371.", "after": null, "start_char_pos": 1231, "end_char_pos": 1346}, {"type": "D", "before": "Google Scholar gives Ethics an h-5 index of 20, ranking it 7th in the category of \"Ethics.\" In the category of \"Philosophy,\" Ethics ranks 10th. An h5-index is the h-index for articles published in the last 5 complete years. It is the largest number h such that h articles published in 2012-2016 have at least h citations each.", "after": null, "start_char_pos": 1376, "end_char_pos": 1702}, {"type": "D", "before": "History", "after": null, "start_char_pos": 1703, "end_char_pos": 1710}, {"type": "D", "before": "Ethics", "after": null, "start_char_pos": 1740, "end_char_pos": 1746}, {"type": "R", "before": "(IJE), founded", "after": ", established", "start_char_pos": 1813, "end_char_pos": 1827}, {"type": "R", "before": "IJE'''s", "after": "Its", "start_char_pos": 1845, "end_char_pos": 1852}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2009, "end_char_pos": 2009}, {"type": "R", "before": "The IJE", "after": "The jouornal", "start_char_pos": 2064, "end_char_pos": 2071}, {"type": "R", "before": "Editorial Committee", "after": "editorial committee", "start_char_pos": 2513, "end_char_pos": 2532}, {"type": "R", "before": "IJE", "after": "the journal", "start_char_pos": 2573, "end_char_pos": 2576}, {"type": "R", "before": "IJE''", "after": "It", "start_char_pos": 2638, "end_char_pos": 2643}, {"type": "R", "before": "\u201cbook review\u201d", "after": "\"book review\"", "start_char_pos": 2785, "end_char_pos": 2798}, {"type": "R", "before": "Editorial Committee", "after": "editorial committee", "start_char_pos": 3115, "end_char_pos": 3134}, {"type": "R", "before": "well-blinded", "after": "double-blind", "start_char_pos": 3412, "end_char_pos": 3424}, {"type": "D", "before": "\"An Epistemic Conception of Democracy\" (1986) - Joshua Cohen \"Polity and Group Difference\" (1989) - Iris Marion Young \"Liberal Individualism and Liberal Neutrality\" (1989) - Will Kymlicka \"Assessing the Communitarian Critique of Liberalism\" (1989) - Allen Buchanan \"Cosmopolitanism and Sovereignty\" (1992) - Thomas Pogge \"Distributive Justice: What the People Think\" (1992) David Miller \"Two Concepts of Liberalism\" (1995) - William Galston \"Trust as an Affective Attitude\" (1996) - Karen Jones* \"Nations, States, and Territory\" (2011) - Anna Stilz \"Valuing Disability, Causing Disability\" (2014) - Elizabeth Barnes \"Amelioration and Inclusion: Gender Identity and the Concept of Woman\" (2016) - Katharine Jenkins*", "after": null, "start_char_pos": 3853, "end_char_pos": 4567}], "sents_char_pos": [0, 167, 347, 532, 608, 751, 809, 917, 1051, 1346, 1467, 1519, 1599, 1702, 1844, 2063, 2433, 2534, 2637, 2758, 3010, 3202, 3376, 3448, 3685, 3805, 3900, 3952, 4026, 4102]}
+{"doc_id": "13983638", "revision_depth": "3", "before_revision": "Ural and Schulgen personify two opposing principles - good and evil - which lead an irreconcilable struggle between themselves. Before going hunting, parents drink the blood of animals, which gives them strength. Parents forbid them to do this until they become Yegets (adult fellow ). How the white swan was caught Yanbeerde and Yanbeeke began hunting with their sons together. Among the prey is a white swan. This is the daughter of the Sun, Homay , her father is the heavenly king of birds Samrau (Semurg). But the old man and his sons did not manage to know the way to the Living Spring (water). Yanbeerde gives his sons powerful lions and sends them to look for the way to the Living Spring (water). If they meet Death on the way, they must cut off its head and bring her home. (There are many mineral springs, water, in the Urals ) How Ural Batyr came to the country of padishah Katil In the kingdom of Katil, Ural meets unfortunate people who tell him about the atrocities of the cruel king (the old woman, her daughter, the old man). Then he himself sees Katil donate people to the lake and to the fire (Perhaps these were the memories of the Bashkirs about the brutality of foreign invaders). How Ural Batyr met Padishah Katil ` s daughter Ural meets a huge crowd of naked people, guards beat them with whips. Katil ` s daughter chooses Ural as her husband, gives him a Golden Apple. Ural refuses to become her husband. Slaves carry King Catilus, seated on a throne. He is very fat, like a fat boar. His eyes are bloodshot. In the legend there is no scene of the struggle of Ural with the padishah Katil. Ural fights one on one with its huge bull, and then - with the four strongest heroes of the padishah. In a duel with a bull, Ural bend horns, and they remain forever bent; the hero knocks out the upper tooth to the bull, and he will never grow back; he tears the hooves of the animal, and they never grow together (an etiological motive). The hero says that now the bull and his tribe will become slaves of man. Katil and his guard scatter in an unknown direction. The people are asking Ural to marry the daughter of Katil and become their padishah. Mount Yamantau. 1640 \u043c Part 2 How Ural-Batyr met Zarkum Ural- Batyr meets Zarkum, the son of the King of serpents Kahkaha, who wants to marry the daughter of King Samrau. Zarkum gives Ural the secret of his father. At the request of Zarkum, he broke off the deer horns and Zarkum swallowed the deer. Zarkum turned into a handsome young man. He wants to marry Homay. Ural opened the palace with a magic key, saw a girl on the throne, took the magic staff of Kahkaha. Kahkaha calls all the snakes for help. But Ural Batyr defeated them. Kahkaha pretended to admit defeat. Ural allows people to elect themselves the new ruler (Algur). The old hero Algur asks Ural to marry a beautiful girl (Gulistan) from the palace and leave his offspring to the people (\u00abTul alu\u00bb, getting the hero\u2019s genetic material to strengthen the folk is an ancient tradition). Schulgen got to happy countrie , wanted to catch fish, but saw that no one was attacking each other here, everyone was living peacefully. Schulgen decided to go to the Living Spring and arrange a lunch here on his way back. Urals.Mount Kumardak Schulgen opened his heart to evil Zarkum agrees with Azraka secretly from Shulgen on how to kill Ural. To do this, you need to seize the winged horse Akbuzat. The divas who tried to bring Akbuzat to Azraka`s palace were thrown by the horse high into the sky. So there was Constellation Yetegan (the Constellation of the Big dipper ). If the daughter of the king of birds Samrau falls in love with Shulgen, then she will give him Akbuzat and a magic sword. The divas need them to destroy Ural, the worst enemy of the divas. How Shulgen entered the palace of the padishah of divas Azraka How Homay met Ural- Batyr Homay joyfully meets Ural. Ural- Batyr did not recognize her. He asks to show him the way to the Living Spring. Homay asks to find an unusual bird, promises to give him the horse Akbuzat and a magic sword. How Ural Batyr found an unprecedented bird Ural goes in search of the unusual bird and finds an amazing bird. She turns into a fish, then a bird, then a girl. This is Aihylu. She tells her story, promises hero her horse Harisay (Yellow). Ural brings Aihilu to the palace of her father, King Samrau. Samrau sends Aihylu to her mother Ai (Moon, Selene) so that the divas do not find her. Ural- Batyr recognized the swan saved by him in the mistress of the palace. He asks Homay to fulfill his promise. Homay goes to his father. Padishah Samrau allows his daughter to give Ural the horse Akbuzat and damask sword. He wants to marry Ural to his daughter Homay. She must give birth to a hero like the Urals. Samrau asks to release Shulgen on the occasion of the wedding of Ural and Homay. Ural is happy seeing his brother. Homay does not tell him that Shulgen came to the kingdom of Samrau with Zarkum, that he is friends with the divas. Shulgen intendes to take away the winged horse, the magic sword and the Padishah `s daughterHomay from Ural. At a festival hosted by Homay, men must show their strength. The Padishah's daughter will choose a winner as her husband. At the call of Homay, Akbuzat (the winged horse) descends from the sky. A damask sword is attached to his saddle. How beautiful was this unusual horse! Heroes must raise a huge stone. Shulgan was unable to raise the stone. Ural Batyr easily lifted the stone and threw it high into the sky. The stone was lost sight of until evening. The Ural caught this stone just as easily and threw it strongly towards the kingdom of Azraka. How Schulgen regained his wife Shulgan hates deeply his brother. Ural sees the misfortune of his elder brother, but does not know what was going on in his soul. Homay and Ural ask the padishah to give Aihylu Shulgen to his wife. Aihylu falls from the sky to the ground like a ball of fire. The wedding continues. Homay and Aihylu are endowed with the properties of peri- traditional female images in Turkic mythology. The crane (Aihylu) is a totem of the Bashkir people How the Ural-Batyr gave his staff to Shulgen and what came of it Shulgen asks Ural to give him the magic staff, then striking with the staff on the ground, disappears. Water pours from the bowls and floods everything around. Zarkum turns into a huge fish and swallowed Homay. The sun ( mother of Homay ) ceases to shine without Homay. Akbuzat blocks the way to a turbulent stream, Zarkum releases Homay from his mouth. Ural- Batyr learns that his brother has become an enemy. The sun is shining again, because Homay is saved. From all sides divas attacked the earth. There was water all around, the sky was all on fire. Ural said goodbye to Homay, jumped on Akbuzat, picked up his magic sword and went to war with the padishah of divas, to save the life on earth. Ural- Batyr fought for a long time with the padishah of divas Azraka. The faithful horse Akbuzat has repeatedly saved the hero during the battle. Ural- Batyr hit with a damask sword and cut Azraka in two. He screamed and his body fell into the sea. At this point Mount Yaman-tau (the Terrible Mountain) grew. Where Ural rode on a horse, the water receded, a mountain rose. People who miraculously escaped during the flood began to settle here. Ural- Batyr meets his sons For many years, Ural Batyr fought with the divas. Their bodies became mountains. People are trying to establish life in these mountains, sticking out in the middle of the sea. Ural are pursuing the remaining divas, suddenly a small detachment of eight people appears. One of the youths takes off his helmet and greets Ural- Batyr . What did his sons tell the Ural Batyr Young men call names of their mothers. Ural-Batyr hugs its sons: Nugush (Gulistan ` s son), Yaik (son of daughter Katil), Idel (son of Homay). With them was the son of Shulgen and Aihylu- Hakmar. Sons tell Ural how they learned about their father. Nugush destroyed Zarkum himself, the son of the serpent king. Aihylu sent her son (riding a horse Harysay) along with Idel. Ural is glad that he had assistants in the fight against Death and Evil. Kahkaha ravages human dwellings for many years. No one could handle him. He learned about the death of Azraka and Zarkum. I decided to come out of the ground and check what is happening on the ground. He believed that Ural died during the flood. But Ural-Batyr, together with his sons, attacked Kahkaha and cut him to pieces. The heroes built a new mountain out of Kahkaha ` s body, dividing the sea into two parts. The battle with Shulgen Shulgen led the army of divas and snakes. He has Kahkaha's magic staff in his hand, that staff fired with fire. But Ural-Batyr dodged, hit the staff with a damask sword, the magic staff exploded and the magic sea immediately disappeared. Divas hid in a fright of someone somewhere. Ural- Batyr seized Shulgen and tied him. Hakmar (Shulgen ` s son) wanted to chop off Shulgen\u2019s head, but the Urals did not allow him to do this. How the Ural- Batyr met the immortal Everyone rejoices in victory. The Ural- Batyr invites everyone to defeat Death, collect water from the Living Spring (water) and distribute it to people. But an old man appears who drank water from the Living Spring (water) and is forced to live forever. He is suffering greatly.The old man says that people don`t need to drink Living water, \u043enly Good can be eternal. The great meaning of life was revealed to Ural. With one mighty sip of water he collectes water from the Living Spring (water) and does not drink it, but irrigates lifeless land. Suddenly everything turns green, flowers bloom. May our land shine, may our country be worthy of love, says Ural- Batyr. The swan (Homay) is a totem of the Bashkir people Schulgen found out that there was no longer the Living Spring (water) and decided to start harming people again. In the underworld, he began to collect divas and kites under his own authority. People enjoyed a happy life for a short time, people began to disappear again. Shulgen went against the people again. Ural- Batyr decided to punish Shulgen and destroy all the divas. He drank a lake in which divas hid. Together with water, he drank all the snakes and divas that began to gnaw at his heart and liver. Ural spat out that lake, itself fell without strength. Divas were destroyed by the sons of Ural, but forces left the Hero. Ural-Batyr feels its end is approaching. He bequeaths to his descendants not to take evil in fellow travelers, always take advice from elders, from wise people, give advice to younger ones and help them. (Olono olo itep, Kenesh alyp yorogoz. Kesene kese itep, kenesh birep yorogoz). Bashkirs Do not shun Good, do not give in to Evil! So said Ural- Batyr and died. At that moment, a star fell from the sky and Homay learned that her husband was not alive. She flew in the image of a swan to say goodbye to her beloved. Homay decided not to take off her bird outfit anymore; she promised to lay an egg every year, which would become a white bird. Came to live in the Urals and the bull of Katil with his herd, submitted to man. Akbuzat led herds of horses. And a glow appeared on the grave of Ural- Batyr - the hero\u2019s ashes turned into gold. Since then, gold appeared in the Urals. The hero died, but with him, divas, snakes and monsters died. A good deed committed by Ural- Batyr is immortal.", "after_revision": "Ural and Schulgen personify two opposing principles - good and evil - which lead an irreconcilable struggle between themselves. Before going hunting, parents drink the blood of animals, which gives them strength. Parents forbid them to do this until they become Yegets (adult fellows ). How the white swan was caught Yanbeerde and Yanbeeke began hunting with their sons together. Among the prey is a white swan. This is the daughter of the Sun, Homay ; her father is the heavenly king of birds Samrau (Semurg). But the old man and his sons did not manage to know the way to the Living Spring (water). Yanbeerde gives his sons powerful lions and sends them to look for the way to the Living Spring (water). If they meet Death on the way, they must cut off its head and bring her home. (There are many mineral springs, water, in the Urals . ) How Ural-Batyr came to the country of padishah Katil In the kingdom of Katil, Ural meets unfortunate people who tell him about the atrocities of the cruel king (the old woman, her daughter, the old man). Then he himself sees Katil donate people to the lake and to the fire (Perhaps these were the memories of the Bashkirs about the brutality of foreign invaders). How Ural-Batyr met Padishah Katil ' s daughter Ural meets a huge crowd of naked people, guards beat them with whips. Katil ' s daughter chooses Ural as her husband, gives him a Golden Apple. Ural refuses to become her husband. Slaves carry King Catilus, seated on a throne. He is very fat, like a fat boar. His eyes are bloodshot. In the legend there is no scene of the struggle of Ural with the padishah Katil. Ural fights one on one with its huge bull, and then with the four strongest heroes of the padishah. In a duel with a bull, Ural bends horns, and they remain forever bent; the hero knocks out the upper tooth of the bull, and he will never grow back; he tears the hooves of the animal, and they never grow together (an etiological motive). The hero says that now the bull and his tribe will become slaves of man. Katil and his guard scatter in an unknown direction. The people are asking Ural to marry the daughter of Katil and become their padishah. Mount Yamantau. 1640 \u043c Part 2 How Ural-Batyr met Zarkum Ural-Batyr meets Zarkum, the son of the King of serpents Kahkaha, who wants to marry the daughter of King Samrau. Zarkum gives Ural the secret of his father. At the request of Zarkum, he broke off the deer horns and Zarkum swallowed the deer. Zarkum turned into a handsome young man. He wants to marry Homay. Ural opened the palace with a magic key, saw a girl on the throne, took the magic staff of Kahkaha. Kahkaha calls all the snakes for help. But Ural-Batyr defeated them. Kahkaha pretended to admit defeat. Ural allows people to elect themselves the new ruler (Algur). The old hero Algur asks Ural to marry a beautiful girl (Gulistan) from the palace and leave his offspring to the people (\u00abTul alu\u00bb, getting the hero\u2019s genetic material to strengthen the folk is an ancient tradition). Schulgen got to happy country , wanted to catch fish, but saw that no one was attacking each other here, everyone was living peacefully. Schulgen decided to go to the Living Spring and arrange a lunch here on his way back. Urals.Mount Kumardak Schulgen opened his heart to evil Zarkum agrees with Azraka secretly from Shulgen on how to kill Ural. To do this, you need to seize the winged horse Akbuzat. The divas who tried to bring Akbuzat to Azraka`s palace were thrown by the horse high into the sky. So there was Constellation Yetegan (the Big Dipper constellation ). If the daughter of the king of birds Samrau falls in love with Shulgen, then she will give him Akbuzat and a magic sword. The divas need them to destroy Ural, the worst enemy of the divas. How Shulgen entered the palace of the padishah of divas , Azraka How Homay met Ural-Batyr Homay joyfully meets Ural. Ural-Batyr did not recognize her. He asks to show him the way to the Living Spring. Homay asks to find an unusual bird, promises to give him the horse Akbuzat and a magic sword. How Ural-Batyr found an unprecedented bird Ural goes in search of the unusual bird and finds an amazing bird. She turns into a fish, then a bird, then a girl. This is Aihylu. She tells her story, promises the hero her horse Harisay (Yellow). Ural brings Aihilu to the palace of her father, King Samrau. Samrau sends Aihylu to her mother Ai (Moon, Selene) so that the divas do not find her. Ural-Batyr recognized the swan saved by him in the mistress of the palace. He asks Homay to fulfill his promise. Homay goes to his father. Padishah Samrau allows his daughter to give Ural the horse Akbuzat and damask sword. He wants to marry Ural to his daughter Homay. She must give birth to a hero like the Urals. Samrau asks to release Shulgen on the occasion of the wedding of Ural and Homay. Ural is happy seeing his brother. Homay does not tell him that Shulgen came to the kingdom of Samrau with Zarkum, that he is friends with the divas. Shulgen intends to take away the winged horse, the magic sword and the Padishah 's daughter, Homay, from Ural. At a festival hosted by Homay, men must show their strength. The Padishah's daughter will choose the winner as her husband. At the call of Homay, Akbuzat (the winged horse) descends from the sky. A damask sword is attached to his saddle. How beautiful was this unusual horse! Heroes must raise a huge stone. Shulgan was unable to raise the stone. Ural-Batyr easily lifted the stone and threw it high into the sky. The stone was lost sight of until evening. The Ural caught this stone just as easily and threw it strongly towards the kingdom of Azraka. How Schulgen regained his wife Shulgan hates deeply his brother. Ural sees the misfortune of his elder brother, but does not know what was going on in his soul. Homay and Ural ask the padishah to give Aihylu to Shulgen as his wife. Aihylu falls from the sky to the ground like a ball of fire. The wedding continues. Homay and Aihylu are endowed with the properties of peri - traditional female images in Turkic mythology. The crane (Aihylu) is a totem of the Bashkir people . How Ural-Batyr gave his staff to Shulgen and what came of it Shulgen asks Ural to give him the magic staff, then striking with the staff on the ground, disappears. Water pours from the bowls and floods everything around. Zarkum turns into a huge fish and swallowed Homay. The sun ( Homay's mother ) ceases to shine without Homay. Akbuzat blocks the way to a turbulent stream, Zarkum releases Homay from his mouth. Ural-Batyr learns that his brother has become an enemy. The sun is shining again, because Homay is saved. From all sides divas attacked the earth. There was water all around, the sky was all on fire. Ural said goodbye to Homay, jumped on Akbuzat, picked up his magic sword and went to war with the padishah of divas, to save life on earth. Ural-Batyr fought for a long time with the padishah of divas Azraka. The faithful horse Akbuzat has repeatedly saved the hero during the battle. Ural-Batyr hit with a damask sword and cut Azraka in two. He screamed and his body fell into the sea. At this point Mount Yaman-tau (the Terrible Mountain) grew. Where Ural rode on a horse, the water receded, a mountain rose. People who miraculously escaped during the flood began to settle here. Ural-Batyr meets his sons For many years, Ural-Batyr fought with the divas. Their bodies became mountains. People are trying to establish life in these mountains, sticking out in the middle of the sea. Ural is pursuing the remaining divas, suddenly a small detachment of eight people appears. One of the youths takes off his helmet and greets Ural-Batyr . What did his sons tell Ural-Batyr Young men call names of their mothers. Ural-Batyr hugs its sons: Nugush (Gulistan ' s son), Yaik (son of the daughter of Katil), Idel (son of Homay). With them was the son of Shulgen and Aihylu: Hakmar. Sons tell Ural how they learned about their father. Nugush destroyed Zarkum himself, the son of the serpent king. Aihylu sent her son (riding on horse Harysay) along with Idel. Ural is glad that he had assistants in the fight against Death and Evil. Kahkaha ravages human dwellings for many years. No one could handle him. He learned about the death of Azraka and Zarkum. I decided to come out of the ground and check what is happening on the ground. He believed that Ural died during the flood. But Ural-Batyr, together with his sons, attacked Kahkaha and cut him to pieces. The heroes built a new mountain out of Kahkaha ' s body, dividing the sea into two parts. The battle with Shulgen Shulgen led the army of divas and snakes. He has Kahkaha's magic staff in his hand, that staff fired with fire. But Ural-Batyr dodged, hit the staff with a damask sword, the magic staff exploded and the magic sea immediately disappeared. Divas hid in a fright of someone somewhere. Ural-Batyr seized Shulgen and tied him. Hakmar (Shulgen ' s son) wanted to chop off Shulgen\u2019s head, but the Urals did not allow him to do this. How the Ural-Batyr met the immortal Everyone rejoices in victory. The Ural-Batyr invites everyone to defeat Death, collect water from the Living Spring (water) and distribute it to people. But an old man appears who drank water from the Living Spring (water) and is forced to live forever. He is suffering greatly.The old man says that people don`t need to drink Living water, \u043enly Good can be eternal. The great meaning of life was revealed to Ural. With one mighty sip of water he collectes water from the Living Spring (water) and does not drink it, but irrigates lifeless land. Suddenly everything turns green, flowers bloom. May our land shine, may our country be worthy of love, says Ural-Batyr. The swan (Homay) is a totem of the Bashkir people . Schulgen found out that there was no longer the Living Spring (water) and decided to start harming people again. In the underworld, he began to collect divas and kites under his own authority. People enjoyed a happy life for a short time, then people began to disappear again. Shulgen went against the people again. Ural-Batyr decided to punish Shulgen and destroy all the divas. He drank a lake in which divas hid. Together with water, he drank all the snakes and divas that began to gnaw at his heart and liver. Ural spat out that lake, itself fell without strength. Divas were destroyed by the sons of Ural, but forces left the Hero. Ural-Batyr feels his end is approaching. He bequeaths to his descendants not to take evil in fellow travelers, always take advice from elders, from wise people, give advice to younger ones and help them. (Olono olo itep, Kenesh alyp yorogoz. Kesene kese itep, kenesh birep yorogoz). Bashkirs Do not shun Good, do not give in to Evil! So said Ural-Batyr and died. At that moment, a star fell from the sky and Homay learned that her husband was not alive. She flew in the image of a swan to say goodbye to her beloved. Homay decided not to take off her bird outfit anymore; she promised to lay an egg every year, which would become a white bird. Came to live in the Urals and the bull of Katil with his herd, submitted to man. Akbuzat led herds of horses. And a glow appeared on the grave of Ural-Batyr - the hero\u2019s ashes turned into gold. Since then, gold appeared in the Urals. The hero died, but with him, divas, snakes and monsters died. A good deed committed by Ural-Batyr is immortal.", "edit_actions": [{"type": "R", "before": "fellow", "after": "fellows", "start_char_pos": 276, "end_char_pos": 282}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 450, "end_char_pos": 451}, {"type": "A", "before": null, "after": ".", "start_char_pos": 836, "end_char_pos": 836}, {"type": "R", "before": "Ural Batyr", "after": "Ural-Batyr", "start_char_pos": 843, "end_char_pos": 853}, {"type": "R", "before": "Ural Batyr", "after": "Ural-Batyr", "start_char_pos": 1207, "end_char_pos": 1217}, {"type": "R", "before": "`", "after": "'", "start_char_pos": 1237, "end_char_pos": 1238}, {"type": "R", "before": "`", "after": "'", "start_char_pos": 1326, "end_char_pos": 1327}, {"type": "D", "before": "-", "after": null, "start_char_pos": 1667, "end_char_pos": 1668}, {"type": "R", "before": "bend", "after": "bends", "start_char_pos": 1745, "end_char_pos": 1749}, {"type": "R", "before": "to", "after": "of", "start_char_pos": 1823, "end_char_pos": 1825}, {"type": "R", "before": "Ural- Batyr", "after": "Ural-Batyr", "start_char_pos": 2221, "end_char_pos": 2232}, {"type": "R", "before": "Ural Batyr", "after": "Ural-Batyr", "start_char_pos": 2674, "end_char_pos": 2684}, {"type": "R", "before": "countrie", "after": "country", "start_char_pos": 3036, "end_char_pos": 3044}, {"type": "R", "before": "Constellation of the Big dipper", "after": "Big Dipper constellation", "start_char_pos": 3558, "end_char_pos": 3589}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3838, "end_char_pos": 3838}, {"type": "R", "before": "Ural- Batyr", "after": "Ural-Batyr", "start_char_pos": 3860, "end_char_pos": 3871}, {"type": "R", "before": "Ural- Batyr", "after": "Ural-Batyr", "start_char_pos": 3899, "end_char_pos": 3910}, {"type": "D", "before": "How Ural Batyr", "after": null, "start_char_pos": 4078, "end_char_pos": 4092}, {"type": "A", "before": null, "after": "How Ural-Batyr", "start_char_pos": 4093, "end_char_pos": 4093}, {"type": "A", "before": null, "after": "the", "start_char_pos": 4284, "end_char_pos": 4284}, {"type": "R", "before": "Ural- Batyr", "after": "Ural-Batyr", "start_char_pos": 4466, "end_char_pos": 4477}, {"type": "R", "before": "intendes", "after": "intends", "start_char_pos": 5021, "end_char_pos": 5029}, {"type": "R", "before": "`s daughterHomay", "after": "'s daughter, Homay,", "start_char_pos": 5094, "end_char_pos": 5110}, {"type": "R", "before": "a", "after": "the", "start_char_pos": 5219, "end_char_pos": 5220}, {"type": "R", "before": "Ural Batyr", "after": "Ural-Batyr", "start_char_pos": 5467, "end_char_pos": 5477}, {"type": "R", "before": "Shulgen to", "after": "to Shulgen as", "start_char_pos": 5880, "end_char_pos": 5890}, {"type": "R", "before": "peri-", "after": "peri -", "start_char_pos": 6037, "end_char_pos": 6042}, {"type": "A", "before": null, "after": ".", "start_char_pos": 6142, "end_char_pos": 6142}, {"type": "D", "before": "the", "after": null, "start_char_pos": 6147, "end_char_pos": 6150}, {"type": "R", "before": "mother of Homay", "after": "Homay's mother", "start_char_pos": 6429, "end_char_pos": 6444}, {"type": "R", "before": "Ural- Batyr", "after": "Ural-Batyr", "start_char_pos": 6562, "end_char_pos": 6573}, {"type": "D", "before": "the", "after": null, "start_char_pos": 6888, "end_char_pos": 6891}, {"type": "R", "before": "Ural- Batyr", "after": "Ural-Batyr", "start_char_pos": 6907, "end_char_pos": 6918}, {"type": "R", "before": "Ural- Batyr", "after": "Ural-Batyr", "start_char_pos": 7053, "end_char_pos": 7064}, {"type": "R", "before": "Ural- Batyr", "after": "Ural-Batyr", "start_char_pos": 7351, "end_char_pos": 7362}, {"type": "R", "before": "Ural Batyr", "after": "Ural-Batyr", "start_char_pos": 7394, "end_char_pos": 7404}, {"type": "R", "before": "are", "after": "is", "start_char_pos": 7559, "end_char_pos": 7562}, {"type": "R", "before": "Ural- Batyr", "after": "Ural-Batyr", "start_char_pos": 7696, "end_char_pos": 7707}, {"type": "R", "before": "the Ural Batyr", "after": "Ural-Batyr", "start_char_pos": 7733, "end_char_pos": 7747}, {"type": "R", "before": "`", "after": "'", "start_char_pos": 7830, "end_char_pos": 7831}, {"type": "R", "before": "daughter", "after": "the daughter of", "start_char_pos": 7853, "end_char_pos": 7861}, {"type": "R", "before": "Aihylu-", "after": "Aihylu:", "start_char_pos": 7928, "end_char_pos": 7935}, {"type": "R", "before": "a", "after": "on", "start_char_pos": 8086, "end_char_pos": 8087}, {"type": "R", "before": "`", "after": "'", "start_char_pos": 8566, "end_char_pos": 8567}, {"type": "R", "before": "Ural- Batyr", "after": "Ural-Batyr", "start_char_pos": 8915, "end_char_pos": 8926}, {"type": "R", "before": "`", "after": "'", "start_char_pos": 8972, "end_char_pos": 8973}, {"type": "R", "before": "Ural- Batyr", "after": "Ural-Batyr", "start_char_pos": 9068, "end_char_pos": 9079}, {"type": "R", "before": "Ural- Batyr", "after": "Ural-Batyr", "start_char_pos": 9131, "end_char_pos": 9142}, {"type": "R", "before": "Ural- Batyr.", "after": "Ural-Batyr.", "start_char_pos": 9752, "end_char_pos": 9764}, {"type": "A", "before": null, "after": ".", "start_char_pos": 9815, "end_char_pos": 9815}, {"type": "A", "before": null, "after": "then", "start_char_pos": 10055, "end_char_pos": 10055}, {"type": "R", "before": "Ural- Batyr", "after": "Ural-Batyr", "start_char_pos": 10128, "end_char_pos": 10139}, {"type": "R", "before": "its", "after": "his", "start_char_pos": 10467, "end_char_pos": 10470}, {"type": "R", "before": "Ural- Batyr", "after": "Ural-Batyr", "start_char_pos": 10792, "end_char_pos": 10803}, {"type": "R", "before": "Ural- Batyr", "after": "Ural-Batyr", "start_char_pos": 11241, "end_char_pos": 11252}, {"type": "R", "before": "Ural- Batyr", "after": "Ural-Batyr", "start_char_pos": 11417, "end_char_pos": 11428}], "sents_char_pos": [0, 127, 212, 285, 378, 410, 509, 599, 704, 782, 1042, 1202, 1319, 1393, 1429, 1476, 1509, 1533, 1614, 1716, 1786, 1864, 1953, 2026, 2079, 2164, 2180, 2335, 2379, 2464, 2505, 2530, 2630, 2669, 2699, 2734, 2796, 3013, 3151, 3237, 3361, 3417, 3517, 3592, 3714, 3781, 3898, 3933, 3983, 4077, 4188, 4237, 4253, 4317, 4378, 4465, 4541, 4579, 4605, 4690, 4736, 4782, 4863, 4897, 5012, 5121, 5182, 5243, 5315, 5357, 5395, 5427, 5466, 5533, 5576, 5671, 5736, 5832, 5900, 5961, 5984, 6089, 6310, 6367, 6418, 6477, 6561, 6618, 6668, 6709, 6762, 6906, 6976, 7052, 7111, 7155, 7215, 7279, 7350, 7427, 7458, 7553, 7645, 7709, 7786, 7890, 7943, 7995, 8057, 8119, 8192, 8240, 8265, 8314, 8393, 8438, 8518, 8608, 8674, 8744, 8870, 8914, 8955, 9059, 9126, 9250, 9351, 9376, 9464, 9512, 9643, 9691, 9764, 9928, 10008, 10088, 10127, 10192, 10228, 10326, 10381, 10449, 10490, 10653, 10691, 10732, 10783, 10813, 10904, 10967, 11022, 11094, 11175, 11204, 11289, 11329, 11391]}
+{"doc_id": "14080364", "revision_depth": "1", "before_revision": "Hindu Rights Action Force, better known by its acronym HINDRAF (, ); is a Hindu extremist non-governmental organisation (NGO) with its renowned slogan of Kuasa Rakyat (\u0bae\u0b95\u0bcd\u0b95\u0bb3\u0bcd \u0b9a\u0b95\u0bcd\u0ba4\u0bbf / Makkal Sakti ) translated as People's Power. This extreme-right organisation began as a coalition of 30 Hindu non-governmental organisations (NGOs) committed to the preservation of Hindu community rights and heritage in a multiracial Malaysia.Hindu group protests \"temple cleansing\" in Malaysia HINDRAF has had a major impact on the political landscape of Malaysia by staging the 2007 HINDRAF rally. Following an enormous rally organised by HINDRAF in November 2007, several prominent members of the organisation were arrested, some on charges of sedition. The charges were dismissed by the courts. Five people have since been detained without trial under the Internal Security Act. Toward the end of the 2000s, the group developed a broader political program to preserve and to push for equal rights and opportunities for the minority Indians. It has been successful in continuing to focus attention on the racist aspects of Malaysian Government policies. Events HINDRAF members carrying posters of Mahatma Gandhi and banners during a protest in Kuala Lumpur. Arrests in October 2007 On 30 October, four HINDRAF Group members, M. Manoharan, P. Uthayakumar, P. Waytha Moorthy and V. Ganabathirau, were arrested and detained for taking part in the 2007 HINDRAF demonstration against the demolition of a Hindu shrine in Kuala Lumpur. However, they were acquitted due to a lack of evidence of incitement and sedition. Human rights forum A series of peaceful weekend forums were organised throughout Malaysia to increase the awareness of Hindu human rights by HINDRAF. A previous forum held near central Kuala Lumpur was disrupted by the Royal Malaysian Police, according to HINDRAF.POLICE ATTEMPTS TO SABOTAGE HINDRAF FORUM IN SEMENYIH ON 6.10.2007 Subsequently, HINDRAF appealed directly to the Inspector General of the Malaysian Police in an attempt to ensure future forums went on peacefully.Hindraf seek IGP protection for nationwide forums / assemblies Arrests in November On 23 November 2007, three HINDRAF members, P. Uthayakumar, Waytha Moorthy, and V. Ganabathirau, were arrested and charged under the Sedition Act. However, in a series of repeated arrests and releases, the courts could not prove that they had incited racial hatred. The only evidence against them were unreliable translations of their Tamil speeches into Bahasa Malaysia presented by the Attorney-General's Chambers, which the courts deemed as unverifiable. Eventually, they were all acquitted due to a shaky prosecution and the lack of evidence of any wrongdoing or crime. Subscription required Petition and rally On 31 August 2007, the 50th anniversary of Malaysia's independence, P. Waytha Moorthy, a HINDRAF lawyer filed a class action suit against the Government of the United Kingdom at the Royal Courts of Justice in London for US$4 trillion (US$1 million for every Malaysian Indian) for \"withdrawing after granting independence and leaving us (Indians) unprotected and at the mercy of a majority Malay-Muslim government that has violated our rights as minority Indians\" Particulars of Claim. as guaranteed in the Federal Constitution when independence was granted. The lawsuit is not only claiming 4 trillion British Pounds as compensation, it is also seeking to strike out Article 153 of the Malaysian Constitution which acknowledges Malay Supremacy , and for the court to declare that Malaysia is a secular state and not an Islamic state Inter Press Service news report. as declared by former Prime Minister Tun Dr. Mahathir Mohamad who is Malay of Indian-Muslim URL Mahathir \u2013 URL Doctor in the House - I Am A Malay HINDRAF organised the rally on Sunday, 25 November 2007 to submit the petition at the British High Commission. Malaysian police refused to grant a permit for the rally,Malaysiakini (needs subscription) and set up roadblocks in Klang Valley along roads leading up to the rally to screen motorists entering the city centre and identify \"troublemakers\".Detikdaily - Hindraf rally: Arrests, roadblocks will make it worse They also advised the public not to participate in the rally, and arrested three HINDRAF leaders. Many shops around Kuala Lumpur including Suria KLCC were closed on that day for fear of trouble from the rally. One day before the rally, police arrested three HINDRAF lawyers , P. Uthayakumar, P. Waytha Moorthy and V. Ganabathirau on sedition charges. Uthayakumar and Ganabathirau posted bail of 800 Malaysian ringgits each, but Waytha Moorthy refused bail as a sign of protest. Daily Express, East Malaysia Independent Newspaper The Standard Hong Kong iMOL, Indian Malaysian Online Response from the government Malaysia's Prime Minister Najib Tun Razak warned that the government would invoke the Internal Security Act (ISA) against the demonstrators if needs be. The prime minister further criticised the demonstrators, after he made a promise that he would listen to everyone even if they have unpleasant words to say. The government of Abdullah Badawi also attempted to link terrorism with the HINDRAF rally via the media.US defends peaceful protests in Malaysia The Straits Times Response to the detentions Even as Prime Minister Abdullah Ahmad Badawi started threatening to use the ISA against the HINDRAF leaders for bringing Malaysia's racist policies out into the open for all to see, foreign news outlets criticised Badawi's lack of initiative to tackle the root cause of the problem. The detention without trial of the HINDRAF leaders drew negative comments in the foreign press about Badawi's administration and the poor way that the Government of Malaysia was handling the issue. The Democratic Action Party vowed to challenge the detention of the HINDRAF leaders. Despite the arrests, the opposition and most of the NGOs were unfazed and continued to challenge UMNO's deconstruction of democracy in Malaysia. The United States also voiced their disapproval of this latest round of ISA arrests. The official HINDRAF website at URL has been allowed by Malaysian ISPs again, after a brief ban. However, this site is constantly plagued by faults and downtime. In response to the ban, sites such as URL URL were spawned to maintain awareness of this movement, in addition to the many blogs available. The movement started in Malaysia, has grown global and now has following in UK, Australia, Canada , and USA. The impact of HINDRAF on the 12th Malaysian general elections The 12th general election showed how HINDRAF had become one of the triggers for a major change in the course of the country. The general dissatisfaction with the regime ruled by UMNO had been brewing for some years and the Hindraf Rally of 25 November caused what has been called a political tsunami in Malaysian politics. Hindraf declared as illegal organisation After several warnings by the Malaysian government HINDRAF was officially banned on 15 October 2008. This was confirmed by the Malaysian Home Minister Datuk Seri Syed Hamid URL In a statement issued by the ministry, Syed Hamid said the decision to declare HINDRAF an illegal organisation was made following the ministry being satisfied with facts and evidence that showed HINDRAF had and was being used for unlawful purposes and posed a threat to public order and morality. %DIFDELCMD < %DIFDELCMD < %%% \"Based on powers vested under Section 5 (1) of the Societies Act, HINDRAF from today is declared an illegal organisation,\" he said. %DIFDELCMD < %DIFDELCMD < %%% He said the order was being made as a result of monitoring and investigation of the organisation's activities, since its inception, by the Registrar of Societies and the Home Ministry. More detentions by the Malaysian government On 23 October 2008, a group comprising eight men, three women, and a child, were arrested by the police after they tried to hand a memorandum to the Prime Minister's office. It called for the release of the five HNDRAF leaders from detention under the Internal Security Act. URL Hindraf members arrested in front of PM's URL Hindraf 11 held over illegal assembly It was discovered that HINDRAF leader P.Waythamoorthy's six-year-old daughter was amongst the people URL Waythamoorthy's wife, daughter and 10 other Hindraf supporters detained Legalization status The ban imposed on this minority rights group was later lifted by the Malaysian Home Ministry on 26 January 2013 and on 8 March 2013 the Malaysian Registrar of Societies (RoS ) had approved the registration of URL Recently on 18 April 2013, factions of HINDRAF led by P. Waythamoorthy signed a memorandum of understanding with Barisan Nasional whereby they would work together to uplift displaced estate workers, resolve the issue of stateless persons and provide business opportunities thus bringing poor Indians into the mainstream of the country's development. Others would spread out to parties within the federal opposition Pakatan Rakyat, mostly to DAP or PKR 2007 HINDRAF rally P. Waytha Moorthy \u2013 Human Rights Lawyer and Former Chairperson of HINDRAF Malaysian Advancement Party (MAP) Human Rights Party Malaysia (HRP) Malaysia Makkal Sakti Party (MMSP) Malaysian Indian Congress (MIC) - component of Barisan Nasional (BN) Article 153 of the Constitution of Malaysia \u2013 Article 153 of the Constitution of Federal Malaysia History of Malaysia \u2013 History of Malaysia before and after Independence Hinduism in Malaysia \u2013 Status of Hinduism in Malaysia Bumiputra \u2013 Bumiputera in Malaysia and its chronology Reid Commission \u2013 An independent commission responsible for drafting the Constitution of the Federation Malaya Law of Malaysia \u2013 Law of Malaysia Malaysian Tamils Cow head protests Zakir Naik Category:2009 establishments in Malaysia Category:Non-profit organisations based in Malaysia Category:Political organisations based in Malaysia Category:Human rights organisations based in Malaysia Category:Hindu organisations based in Malaysia Category:Hindu political parties in Malaysia Category:Discrimination in Malaysia Category:Freedom of religion Category:Persecution of Hindus Category:Persecution by Muslims Category:Indian-Malaysian cultur", "after_revision": "Hindu Rights Action Force, better known by its acronym HINDRAF (, ); is a Hindu-activism non-governmental organisation (NGO) with its renowned slogan of Kuasa Rakyat or Makkal Sakti (\u0bae\u0b95\u0bcd\u0b95\u0bb3\u0bcd \u0b9a\u0b95\u0bcd\u0ba4\u0bbf ) translated as People's Power. This extreme-right organisation began as a coalition of 30 Hindu non-governmental organisations (NGOs) committed to the preservation of Hindu community rights and heritage in a multiracial Malaysia.Hindu group protests \"temple cleansing\" in Malaysia cite URL January 2006|publisher=Asia Times |title=Southeast Asia news and business from Indonesia, Philippines, Thailand, Malaysia and Vietnam |access-date=15 April 2016 HINDRAF has had a major impact on the political landscape of Malaysia by staging the infamous 2007 HINDRAF rally. Following an enormous rally organised by HINDRAF in November 2007, several prominent members of the organisation were arrested, some on charges of sedition. The charges were dismissed by the courts. Five people have since been detained without trial under the Internal Security Act. Toward the end of the 2000s, the group developed a broader political program to preserve and to push for equal rights and opportunities for the minority Indians. It has been successful in continuing to focus attention on the racist aspects of Malaysian Government policies. Events HINDRAF members carrying posters of Mahatma Gandhi and banners during a protest in Kuala Lumpur. Arrests in October 2007 On 30 October, four HINDRAF Group members, M. Manoharan, P. Uthayakumar, P. Waytha Moorthy and V. Ganabathirau, were arrested and detained for taking part in the 2007 HINDRAF demonstration against the demolition of a Hindu shrine in Kuala Lumpur. However, they were acquitted due to a lack of evidence of incitement and sedition. Human rights forum A series of peaceful weekend forums were organised throughout Malaysia to increase the awareness of Hindu human rights by HINDRAF. A previous forum held near central Kuala Lumpur was disrupted by the Royal Malaysian Police, according to HINDRAF.POLICE ATTEMPTS TO SABOTAGE HINDRAF FORUM IN SEMENYIH ON 6.10.2007 Subsequently, HINDRAF appealed directly to the Inspector-General of Police (Malaysia)|Inspector-General of Police (IGP) in an attempt to ensure future forums went on peacefully.Hindraf seek IGP protection for nationwide forums / assemblies Arrests in November On 23 November 2007, three HINDRAF members, P. Uthayakumar, P. Waytha Moorthy, and V. Ganabathirau, were arrested and charged under the Sedition Act. However, in a series of repeated arrests and releases, the courts could not prove that they had incited racial hatred. The only evidence against them were unreliable translations of their Tamil speeches into Bahasa Malaysia presented by the Attorney-General's Chambers, which the courts deemed as unverifiable. Eventually, they were all acquitted due to a shaky prosecution and the lack of evidence of any wrongdoing or crime. Subscription required Lawsuit, petition and rally On 31 August 2007, the 50th anniversary of Malaysia's independence, P. Waytha Moorthy, a HINDRAF lawyer filed a class action suit against the Government of the United Kingdom at the Royal Courts of Justice in London for US$4 trillion (US$1 million for every Malaysian Indian) for \"withdrawing after granting independence and leaving us (Indians) unprotected and at the mercy of a majority Malay-Muslim government that has violated our rights as minority Indians\" as the negligence of the supposedly independent Reid Commission responsible for drafting the Constitution of the Federation Malaya. Particulars of Claim. as guaranteed in the Federal Constitution when independence was granted. The lawsuit is not only claiming 4 trillion British Pounds as compensation, it is also seeking to strike out Article 153 of the Malaysian Constitution which acknowledges Malay Supremacy and for the court to declare that Malaysia is a secular state and not an Islamic state Inter Press Service news report. as declared by former Prime Minister Tun Dr. Mahathir Mohamad who is Malay of Indian-Muslim URL Mahathir \u2013 URL Doctor in the House - I Am A Malay HINDRAF organised the rally on 25 November 2007 to submit the petition at the British High Commission. Malaysian police refused to grant a permit for the rally,Malaysiakini (needs subscription) and set up roadblocks in Klang Valley along roads leading up to the rally to screen motorists entering the city centre and identify \"troublemakers\".Detikdaily - Hindraf rally: Arrests, roadblocks will make it worse They also advised the public not to participate in the rally, and arrested three HINDRAF leaders. Many shops around Kuala Lumpur including Suria KLCC were closed on that day for fear of trouble from the rally. One day before the rally, police arrested three HINDRAF lawyers ; Uthayakumar, Waytha Moorthy and Ganabathirau on sedition charges. Uthayakumar and Ganabathirau posted bail of 800 Malaysian ringgits each, but Waytha Moorthy refused bail as a sign of protest. Daily Express, East Malaysia Independent Newspaper The Standard Hong Kong iMOL, Indian Malaysian Online Response from the government Malaysia's Prime Minister Najib Razak warned that the government would invoke the Internal Security Act (ISA) against the demonstrators if needs be. The prime minister further criticised the demonstrators, after he made a promise that he would listen to everyone even if they have unpleasant words to say. The government of Abdullah Ahmad Badawi also attempted to link terrorism with the HINDRAF rally via the media.US defends peaceful protests in Malaysia The Straits Times Response to the detentions Even as Prime Minister Abdullah Badawi started threatening to use the ISA against the HINDRAF leaders for bringing Malaysia's racist policies out into the open for all to see, foreign news outlets criticised Badawi's lack of initiative to tackle the root cause of the problem. The detention without trial of the HINDRAF leaders drew negative comments in the foreign press about Badawi's administration and the poor way that the Government of Malaysia was handling the issue. The Democratic Action Party (DAP) vowed to challenge the detention of the HINDRAF leaders. Despite the arrests, the opposition and most of the NGOs were unfazed and continued to challenge UMNO's deconstruction of democracy in Malaysia. The United States also voiced their disapproval of this latest round of ISA arrests. The official HINDRAF website at URL has been allowed by Malaysian ISPs again, after a brief ban. However, this site is constantly plagued by faults and downtime. In response to the ban, sites such as URL URL were spawned to maintain awareness of this movement, in addition to the many blogs available. The movement started in Malaysia, has grown global and now has following in UK, Australia, Canada and USA. The impact of HINDRAF on the 12th Malaysian general elections The 2008 Malaysian general election showed how HINDRAF had become one of the triggers for a major change in the course of the country. The general dissatisfaction with the regime ruled by UMNO had been brewing for some years and the HINDRAF Rally of 25 November caused what has been called a political tsunami in Malaysian politics. Declared illegal and banned After several warnings by the Malaysian government HINDRAF was officially banned on 15 October 2008. This was confirmed by the Malaysian Home Minister , Syed Hamid URL In a statement issued by the ministry, Syed Hamid said the decision to declare HINDRAF an illegal organisation was made following the ministry being satisfied with facts and evidence that showed HINDRAF had and was being used for unlawful purposes and posed a threat to public order and morality. %DIFDELCMD < %DIFDELCMD < %%% \"Based on powers vested under Section 5 (1) of the Societies Act, HINDRAF from today is declared an illegal organisation,\" he said. %DIFDELCMD < %DIFDELCMD < %%% He said the order was being made as a result of monitoring and investigation of the organisation's activities, since its inception, by the Registrar of Societies (RoS) and the Home Ministry. More detentions by the Malaysian government On 23 October 2008, a group comprising eight men, three women, and a child, were arrested by the police after they tried to hand a memorandum to the Prime Minister's office. It called for the release of the five HNDRAF leaders from detention under the Internal Security URL Hindraf members arrested in front of PM's URL Hindraf 11 held over illegal assembly It was discovered that HINDRAF leader P.Waythamoorthy's six-year-old daughter was amongst the people URL Waythamoorthy's wife, daughter and 10 other Hindraf supporters detained Legality reinstated and registration approval The ban imposed on this minority rights group was later lifted by the Malaysian Home Ministry on 26 January 2013 and on 8 March 2013 the RoS had approved the registration of URL Recently on 18 April 2013, factions of HINDRAF led by P. Waythamoorthy signed a memorandum of understanding with Barisan Nasional whereby they would work together to uplift displaced estate workers, resolve the issue of stateless persons and provide business opportunities thus bringing poor Indians into the mainstream of the country's development. Others would spread out to parties within the federal opposition Pakatan Rakyat, mostly to DAP or PKR 2007 HINDRAF rally P. Waytha Moorthy \u2013 Human Rights Lawyer and Former Chairperson of HINDRAF Malaysian Advancement Party (MAP) Human Rights Party Malaysia (HRP) Malaysia Makkal Sakti Party (MMSP) Article 153 of the Constitution of Malaysia \u2013 Article 153 of the Constitution of Federal Malaysia History of Malaysia \u2013 History of Malaysia before and after Independence Hinduism in Malaysia \u2013 Status of Hinduism in Malaysia Malaysian Tamils Category:2009 establishments in Malaysia Category:Non-profit organisations based in Malaysia Category:Political organisations based in Malaysia Category:Human rights organisations based in Malaysia Category:Hindu organisations based in Malaysia Category:Hindu political parties in Malaysia Category:Discrimination in Malaysia Category:Freedom of religion Category:Persecution of Hindus Category:Indian-Malaysian cultur", "edit_actions": [{"type": "R", "before": "Hindu extremist", "after": "Hindu-activism", "start_char_pos": 74, "end_char_pos": 89}, {"type": "A", "before": null, "after": "or Makkal Sakti", "start_char_pos": 167, "end_char_pos": 167}, {"type": "D", "before": "/ Makkal Sakti", "after": null, "start_char_pos": 182, "end_char_pos": 196}, {"type": "A", "before": null, "after": "cite URL January 2006|publisher=Asia Times |title=Southeast Asia news and business from Indonesia, Philippines, Thailand, Malaysia and Vietnam |access-date=15 April 2016", "start_char_pos": 479, "end_char_pos": 479}, {"type": "A", "before": null, "after": "infamous", "start_char_pos": 565, "end_char_pos": 565}, {"type": "R", "before": "Inspector General of the Malaysian Police", "after": "Inspector-General of Police (Malaysia)|Inspector-General of Police", "start_char_pos": 1979, "end_char_pos": 2020}, {"type": "A", "before": null, "after": "(IGP)", "start_char_pos": 2021, "end_char_pos": 2021}, {"type": "A", "before": null, "after": "P.", "start_char_pos": 2222, "end_char_pos": 2222}, {"type": "R", "before": "Petition", "after": "Lawsuit, petition", "start_char_pos": 2759, "end_char_pos": 2767}, {"type": "A", "before": null, "after": "as the negligence of the supposedly independent Reid Commission responsible for drafting the Constitution of the Federation Malaya.", "start_char_pos": 3241, "end_char_pos": 3241}, {"type": "D", "before": ",", "after": null, "start_char_pos": 3523, "end_char_pos": 3524}, {"type": "D", "before": "Sunday,", "after": null, "start_char_pos": 3822, "end_char_pos": 3829}, {"type": "R", "before": ", P. Uthayakumar, P.", "after": "; Uthayakumar,", "start_char_pos": 4482, "end_char_pos": 4502}, {"type": "D", "before": "V.", "after": null, "start_char_pos": 4522, "end_char_pos": 4524}, {"type": "D", "before": "Tun", "after": null, "start_char_pos": 4851, "end_char_pos": 4854}, {"type": "A", "before": null, "after": "Ahmad", "start_char_pos": 5156, "end_char_pos": 5156}, {"type": "D", "before": "Ahmad", "after": null, "start_char_pos": 5352, "end_char_pos": 5357}, {"type": "A", "before": null, "after": "(DAP)", "start_char_pos": 5829, "end_char_pos": 5829}, {"type": "D", "before": ",", "after": null, "start_char_pos": 6517, "end_char_pos": 6518}, {"type": "R", "before": "12th", "after": "2008 Malaysian", "start_char_pos": 6594, "end_char_pos": 6598}, {"type": "R", "before": "Hindraf", "after": "HINDRAF", "start_char_pos": 6813, "end_char_pos": 6820}, {"type": "R", "before": "Hindraf declared as illegal organisation", "after": "Declared illegal and banned", "start_char_pos": 6913, "end_char_pos": 6953}, {"type": "R", "before": "Datuk Seri", "after": ",", "start_char_pos": 7105, "end_char_pos": 7115}, {"type": "A", "before": null, "after": "(RoS)", "start_char_pos": 7782, "end_char_pos": 7782}, {"type": "D", "before": "Act.", "after": null, "start_char_pos": 8120, "end_char_pos": 8124}, {"type": "R", "before": "Legalization status", "after": "Legality reinstated and registration approval", "start_char_pos": 8390, "end_char_pos": 8409}, {"type": "R", "before": "Malaysian Registrar of Societies (RoS )", "after": "RoS", "start_char_pos": 8547, "end_char_pos": 8586}, {"type": "D", "before": "Malaysian Indian Congress (MIC) - component of Barisan Nasional (BN)", "after": null, "start_char_pos": 9272, "end_char_pos": 9340}, {"type": "R", "before": "Bumiputra \u2013 Bumiputera in Malaysia and its chronology Reid Commission \u2013 An independent commission responsible for drafting the Constitution of the Federation Malaya Law of Malaysia \u2013 Law of Malaysia Malaysian Tamils Cow head protests Zakir Naik", "after": "Malaysian Tamils", "start_char_pos": 9565, "end_char_pos": 9809}, {"type": "D", "before": "Category:Persecution by Muslims", "after": null, "start_char_pos": 10196, "end_char_pos": 10227}], "sents_char_pos": [0, 68, 228, 427, 585, 742, 784, 868, 1030, 1142, 1246, 1517, 1600, 1750, 1865, 2079, 2309, 2428, 2620, 2736, 3053, 3336, 3751, 3901, 4141, 4305, 4417, 4558, 4685, 4971, 5128, 5234, 5602, 5800, 5886, 6031, 6116, 6213, 6278, 6418, 6527, 6714, 6912, 7054, 7501, 7805, 8023, 8124, 8253, 8680, 8973, 9097, 9114, 9305, 9386, 9460, 9533, 9576, 9636, 9747, 9819]}
+{"doc_id": "1414677", "revision_depth": "1", "before_revision": "Substantive areas of research As a modern sub-discipline, comparative politics is constituted by research across a range of substantive areas . However, while many researchers, research regimes, and research institutions are identified according to the above categories or foci, it is not uncommon to claim geographic or country specialization as the differentiating category.%DIFDELCMD < %DIFDELCMD < %%% Though different scholars might organize the areas ofsubstantive interest in the field of comparative politics in different ways, the following seven areas encompass most research in comparative politics : The state The state is the political organization that maintains a monopoly on the legitimate use of violence.Max Weber\u2019s classic definition is that the state is a \u201chuman community that (successfully) claims the monopoly of the legitimate use of physical force within a given territory.\" Max Weber, \u201cPolitics as a Vocation,\u201d pp. 77\u2013128, in H.H. Gerth and C. Wright Mills (eds.), From Max Weber: Essays in Sociology. New York, NY: Oxford University Press, 1946%DIFDELCMD < [%%% 1919 , p. 78. Research in comparative politics on the state includes the follow topics:%DIFDELCMD < %DIFDELCMD < %%% State formation, state building and state collapse Civil\u2013military relations Public administration Corruption Rule of law Civil war Political violence Political regimes%DIFDELCMD < %DIFDELCMD < %%% Political regimes are the form of government or the rules concerning of access to political power.Sebasti\u00e1n L. Mazzuca, \"Access to power versus exercise of power: Reconceptualizing the quality of democracy in Latin America,\" Studies in Comparative International Development 45,3 (2010): 334-357. Research on political regimes is one of the most common focus of attention and encompasses many themes: Authoritarian regimes Political repression Government propaganda Democratic regimes Constitutionalism Citizenship and rights Political representation Populism Regime change Political revolution Democratization Democratic backsliding%DIFDELCMD < %DIFDELCMD < %%% Political institutions Political institutions are the formal rules used by make decisions regarding politics. They are conventionally subdivided as follows:%DIFDELCMD < %DIFDELCMD < %%% The executive branch of government The legislative branch of government The judicial branch of government Elections and electoral systems Political parties and party systems Political identity Political identity refers to the racial, religious, ethnic, social, or cultural identity of large political groups. Research in comparative politics on political identity includes the follow topics: Nation-building and nationalism Ethnic politics Political linguistics Racial politics Religious politics%DIFDELCMD < %DIFDELCMD < %%% Political behavior Political behavior refers to the behavior of actors oriented to the politics and the political system. Research on political behavior includes:%DIFDELCMD < %DIFDELCMD < %%% Collective action Social movement Contentious politics Voting behavior Public opinion Ideology Political economy%DIFDELCMD < %DIFDELCMD < %%% Political economy is the study of the relationship between politics and the economy. Research on political economy addresses the following topics: Varieties of capitalism Corporatism Political economy of development The developmental state The political economy of economic reform (e.g., market reforms%DIFDELCMD < } %DIFDELCMD < %%% Property rights and agrarian reform Fiscal policy Public policy Public policy refers to the legal and administrative decisions made by the government and state actors. The main areas of research on public policy are:%DIFDELCMD < %DIFDELCMD < %%% Public goods provision and distributive politics Social policy The welfare state Human rights Racial discrimination Environmental policy", "after_revision": "Substantive areas of research in comparative politics By some definitions, comparative politics can be traced back to Greek philosophy, as Plato's Republic and Aristotle's The Politics. As a modern sub-discipline, comparative politics is constituted by research across a range of substantive areas %DIFDELCMD < %DIFDELCMD < %%% , including the study of : %DIFDELCMD < [%%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% Politics of democratic states Politics of authoritarian states Public goods provision and distributive politics Political violence Political identity, including ethnic and religious politics Democratization and regime change Elections and electoral and party systems Political economy of development Collective action Voting behavior Origins of the state Comparative political institutions Methodologies for comparative political research %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < } %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% While many researchers, research regimes, and research institutions are identified according to the above categories or foci, it is not uncommon to claim geographic or country specialization as the differentiating category.", "edit_actions": [{"type": "A", "before": null, "after": "in comparative politics", "start_char_pos": 30, "end_char_pos": 30}, {"type": "A", "before": null, "after": "By some definitions, comparative politics can be traced back to Greek philosophy, as Plato's Republic and Aristotle's The Politics.", "start_char_pos": 31, "end_char_pos": 31}, {"type": "D", "before": ".", "after": null, "start_char_pos": 144, "end_char_pos": 145}, {"type": "D", "before": "However, while many researchers, research regimes, and research institutions are identified according to the above categories or foci, it is not uncommon to claim geographic or country specialization as the differentiating category.", "after": null, "start_char_pos": 146, "end_char_pos": 378}, {"type": "R", "before": "Though different scholars might organize the areas ofsubstantive interest in the field of comparative politics in different ways, the following seven areas encompass most research in comparative politics", "after": ", including the study of", "start_char_pos": 408, "end_char_pos": 611}, {"type": "D", "before": "The state", "after": null, "start_char_pos": 614, "end_char_pos": 623}, {"type": "D", "before": "The state is the political organization that maintains a monopoly on the legitimate use of violence.Max Weber\u2019s classic definition is that the state is a \u201chuman community that (successfully) claims the monopoly of the legitimate use of physical force within a given territory.\" Max Weber, \u201cPolitics as a Vocation,\u201d pp. 77\u2013128, in H.H. Gerth and C. Wright Mills (eds.), From Max Weber: Essays in Sociology. New York, NY: Oxford University Press, 1946", "after": null, "start_char_pos": 624, "end_char_pos": 1073}, {"type": "D", "before": "1919", "after": null, "start_char_pos": 1091, "end_char_pos": 1095}, {"type": "D", "before": ", p. 78. Research in comparative politics on the state includes the follow topics:", "after": null, "start_char_pos": 1096, "end_char_pos": 1178}, {"type": "D", "before": "State formation, state building and state collapse Civil\u2013military relations Public administration Corruption Rule of law Civil war Political violence", "after": null, "start_char_pos": 1208, "end_char_pos": 1357}, {"type": "D", "before": "Political regimes", "after": null, "start_char_pos": 1358, "end_char_pos": 1375}, {"type": "D", "before": "Political regimes are the form of government or the rules concerning of access to political power.Sebasti\u00e1n L. Mazzuca, \"Access to power versus exercise of power: Reconceptualizing the quality of democracy in Latin America,\" Studies in Comparative International Development 45,3 (2010): 334-357. Research on political regimes is one of the most common focus of attention and encompasses many themes:", "after": null, "start_char_pos": 1405, "end_char_pos": 1804}, {"type": "D", "before": "Authoritarian regimes Political repression Government propaganda Democratic regimes Constitutionalism Citizenship and rights Political representation Populism Regime change Political revolution Democratization Democratic backsliding", "after": null, "start_char_pos": 1805, "end_char_pos": 2037}, {"type": "D", "before": "Political institutions", "after": null, "start_char_pos": 2067, "end_char_pos": 2089}, {"type": "D", "before": "Political institutions are the formal rules used by make decisions regarding politics. They are conventionally subdivided as follows:", "after": null, "start_char_pos": 2090, "end_char_pos": 2223}, {"type": "R", "before": "The executive branch of government The legislative branch of government The judicial branch of government", "after": "Politics of democratic states Politics of authoritarian states Public goods provision and distributive politics Political violence Political identity, including ethnic and religious politics Democratization and regime change", "start_char_pos": 2253, "end_char_pos": 2358}, {"type": "D", "before": "systems Political parties", "after": null, "start_char_pos": 2383, "end_char_pos": 2408}, {"type": "R", "before": "Political identity", "after": "Political economy of development Collective action Voting behavior Origins of the state Comparative political institutions Methodologies for comparative political research", "start_char_pos": 2427, "end_char_pos": 2445}, {"type": "D", "before": "Political identity refers to the racial, religious, ethnic, social, or cultural identity of large political groups. Research in comparative politics on political identity includes the follow topics:", "after": null, "start_char_pos": 2446, "end_char_pos": 2644}, {"type": "D", "before": "Nation-building and nationalism Ethnic politics Political linguistics Racial politics Religious politics", "after": null, "start_char_pos": 2645, "end_char_pos": 2749}, {"type": "D", "before": "Political behavior", "after": null, "start_char_pos": 2779, "end_char_pos": 2797}, {"type": "D", "before": "Political behavior refers to the behavior of actors oriented to the politics and the political system. Research on political behavior includes:", "after": null, "start_char_pos": 2798, "end_char_pos": 2941}, {"type": "D", "before": "Collective action Social movement Contentious politics Voting behavior Public opinion Ideology", "after": null, "start_char_pos": 2971, "end_char_pos": 3065}, {"type": "D", "before": "Political economy", "after": null, "start_char_pos": 3066, "end_char_pos": 3083}, {"type": "D", "before": "Political economy is the study of the relationship between politics and the economy. Research on political economy addresses the following topics:", "after": null, "start_char_pos": 3113, "end_char_pos": 3259}, {"type": "D", "before": "Varieties of capitalism Corporatism Political economy of development The developmental state The political economy of economic reform (e.g., market reforms", "after": null, "start_char_pos": 3260, "end_char_pos": 3415}, {"type": "D", "before": "Property rights and agrarian reform Fiscal policy", "after": null, "start_char_pos": 3447, "end_char_pos": 3496}, {"type": "D", "before": "Public policy Public policy refers to the legal and administrative decisions made by the government and state actors. The main areas of research on public policy are:", "after": null, "start_char_pos": 3497, "end_char_pos": 3663}, {"type": "R", "before": "Public goods provision and distributive politics Social policy The welfare state Human rights Racial discrimination Environmental policy", "after": "While many researchers, research regimes, and research institutions are identified according to the above categories or foci, it is not uncommon to claim geographic or country specialization as the differentiating category.", "start_char_pos": 3693, "end_char_pos": 3829}], "sents_char_pos": [0, 145, 378, 724, 901, 971, 1029, 1503, 1700, 2176, 2561, 2900, 3197, 3614]}
+{"doc_id": "14185909", "revision_depth": "4", "before_revision": "Nick Bontis (born May 27, 1969) is a Canadian academic, management consultant, professional keynote speaker, sports management executive and author. His research focuses on intellectual capital, knowledge management and organizational learning. Bontis is Associate Professor of Strategic Management and Chair of Strategic Management at the DeGroote School of Business, McMaster University in Hamilton, Ontario, Canada. He is also the Director of the Institute for Intellectual Capital Research a management consulting firm and research think-tank that specializes in conducting human capital diagnostic assessments for corporate and government clients. He is also Associate Editor of the Journal of Intellectual Capital and Chief Knowledge Officer of Knexa Solutions - the world's first knowledge exchange auction.Bontis r\u00e9sum\u00e9Journal of Intellectual CapitalKnexa - World's first knowledge exchange auction Academic Bontis is an award-winning tenured professor who teaches business strategy to undergraduates, knowledge management to MBAs, and advanced statistics to doctoral students. He is also the coordinator of the fourth year commerce capstone course. In 2007, he was recognized as the first professor ever to win three outstanding teaching awards simultaneously: undergraduate instructor of the year, MBA instructor of the year, and McMaster University instructor of the year. He also received the faculty researcher of the year award for the business school. Maclean\u2019 s has rated him as one of McMaster \u2019 s most popular professors for six years in a row.McMaster Institute for Leadership, Innovation & Excellence in Teaching In 2007, Bontis was one of 38 professors nominated for the 2008 Ontario's Best Lecturer award.TVO Best Professor In February 2008, TVO announced that he was among the top ten finalists.TVO News Release In 2008, the OUSA (Ontario Undergraduate Student Alliance) recognized Dr. Nick Bontis as the top university professor in the province. The official award citation read \"OUSA would like to recognize Dr. Nick Bontis for having made a significant contribution to teaching excellence and for facilitating a positive learning experience for Ontario students\".OUSA Daily News In 2009, Bontis was awarded the 3M National Teaching Fellowship,3M article in Hamilton Spectator an exclusive honour only bestowed upon the top university professors in Canada .CNW Canada Newswire He was also the OCUFA Teaching Award winner which is given to the top professors in Ontario.OCUFA Teaching Award Citation for Dr. Nick Bontis Management Consultant As a management consultant, Bontis advises organizational leaders on various strategic management issues. He is the Chief Data Scientist of Performitiv, a learning software organization.Bontis appointed Performitiv Chief Data Scientist He is also on the Advisory Board of several organizations including a variety of educational-based institutions designing and implementing executive development programs across the country.Bontis Fact Sheet He is on the Executive Board of Harvest Portfolios, an investment company based in Oakville, Ontario.Harvest Portfolios Executive Board He is a former member of the Board of Governors for Hillfield Strathallan College, an independent school located in Hamilton, Ontario. Hillfield Strathallan College He is a former member of the Board of Governors for Canada's 10 Most Admired Corporate Cultures program.Canada's 10 Most Admired Corporate Cultures program Board of Governors He is Director of the Institute for Intellectual Capital Research, a management consulting firm that specializes in conducting human capital measurement diagnostics. In 2012, Bontis was elected as a member of the Board of Directors for the Canadian Soccer Association. Canadian Soccer Association Keynote Speaker As a professional keynote speaker, Bontis presents for a variety of industry, government and association audiences. His presentation topics typically focus on knowledge worker productivity, information bombardment and collaboration drawing from his research expertise surrounding the strategic management and measurement of an organization's intangible assets. He is represented exclusively in Canada by Speakers' Spotlight.Speakers' Spotlight - Dr. Nick Bontis - Leading Strategy & Management ExpertDr. Nick Bontis - Client Testimonials Media Bontis is in constant demand to express his opinion in the media, especially in television, radio and print. He has a regular recurring role on a CHCH-DT News segment entitled Bontis on Business during which he highlights the past week's business news.CHCH News - Bontis on Business Bontis wrote a weekly column in The Hamilton Spectator that appeared on Saturdays entitled Bontis on Business . He typically wrote articles that highlighted local entrepreneurs and new ventures.The Hamilton Spectator - Bontis on Business Sports Management Executive Bontis was appointed Co-Chair, of the Sport Organizing Committee for Men's and Women's Soccer at the 2015 Pan American Games.Hamilton Spectator - The PanAm dedicated dozen Bontis is currently serving his third term on the Board of Directors of the Canadian Soccer Association.CSA Board of Directors As Chair of the Strategic Management Committee, Bontis was responsible for formulating the CSA \u2019 s Strategic Plan entitled Leading a Soccer Nation CSA Strategic Plan On May 6, 2017 Bontis was appointed Vice President of Canada Soccer.Hamilton climbs soccer ladder On May 7, 2018 he was re-elected Vice President .Ontario's Nick Bontis re-elected Canada Soccer Vice President On February 11, 2019 Bontis spearheaded Canada Soccer's launch of an updated version (2019 - 2021) of the Strategic Plan entitled Canada Soccer Nation. CSA Launches 2019-2021 Strategic Plan On November 21, 2020 Bontis was elected President of Canada Soccer.Dr. Nick Bontis elected Canada Soccer President Other interests Bontis is an avid athlete and musician. Bontis spent many years as a Euphonium player competing at various music festivals as a youth. He was also an active member of his high school's jazz ensemble, choir and orchestra. While at UWO, Nick played the Euphonium in the Symphonic Band for several years.%DIFDELCMD < %DIFDELCMD < %%% Bontis has played soccer competitively since childhood for a variety of premier clubs in Ontario (Scarborough Maple Leaf, Scarborough Azzurri, London City, London Portuguese, Dundas United, Hamilton Greek Olympic). He currently plays for Proto Stars (H&DOSL) and Schalke FC (H&D). He is a former winner of the Ontario Cup (five times) and represented Canada in a World Youth Cup tournament in Bremen, Germany in 1986. As a varsity soccer player at the University of Western Ontario, he was a multiple OUA all-star, leading goal scorer and team MVP. Bontis also received the Bronze W and the Purple Blanket Award as an outstanding dual athlete at UWO. He was a Canadian all-star and national silver medallist in the running long jump as a member of the UWO varsity track & field team.Western Mustang Athletics - Purple Blanket Winners Bontis was the head coach for the Hamilton Sparta 2003 boys soccer team. He has several years of coaching experience as well as the following licenses (USSF National B, USSF National C, CSA Provincial B, OSA Pre B, OSA Level 3, OSA Respect in Sport, NCCP Making Ethical Decisions; NCCP Concussion: Making Head Way) Hamilton Sparta 2003 Boys Soccer Team", "after_revision": "Nick Bontis (born May 27, 1969) is a Canadian academic, management consultant, professional keynote speaker, sports management executive and author. His research focuses on intellectual capital, knowledge management and organizational learning. Bontis is Associate Professor of Strategic Management and Chair of Strategic Management at the DeGroote School of Business, McMaster University in Hamilton, Ontario, Canada. He is also the Director of the Institute for Intellectual Capital Research a management consulting firm and research think-tank that specializes in conducting human capital diagnostic assessments for corporate and government clients. He is also Associate Editor of the Journal of Intellectual Capital and Chief Knowledge Officer of Knexa Solutions , the world's first knowledge exchange auction.Bontis r\u00e9sum\u00e9Journal of Intellectual CapitalKnexa - World's first knowledge exchange auction Academic Bontis teaches business strategy to undergraduates, knowledge management to MBAs, and advanced statistics to doctoral students. He is also the coordinator of the fourth year commerce capstone course. Awards He has received awards for teaching and research. Maclean' s has rated him as one of McMaster ' s most popular professors for six years in a row.McMaster Institute for Leadership, Innovation & Excellence in Teaching In 2007, Bontis was one of 38 professors nominated for the 2008 Ontario's Best Lecturer award.TVO Best Professor In February 2008, TVO announced that he was among the top ten finalists.TVO News Release In 2008, the OUSA (Ontario Undergraduate Student Alliance) recognized him as the top university professor in the province. OUSA Daily News In 2009, Bontis was awarded the 3M National Teaching Fellowship,3M article in Hamilton SpectatorCNW Canada Newswire He was also the OCUFA Teaching Award winner which is given to the top professors in Ontario.OCUFA Teaching Award Citation for Dr. Nick Bontis Management consultant As a management consultant, Bontis advises organizational leaders on various strategic management issues. He is the Chief Data Scientist of Performitiv, a learning software organization.Bontis appointed Performitiv Chief Data Scientist He is also on the advisory board of several organizations including a variety of educational-based institutions designing and implementing executive development programs across the country.Bontis Fact Sheet He is on the executive board of Harvest Portfolios, an investment company based in Oakville, Ontario.Harvest Portfolios Executive Board He is a former member of the board of governors for Hillfield Strathallan College, an independent school located in Hamilton, Ontario. Parent E-News for March 10, 2011, Hillfield Strathallan College He is a former member of the board of governors for Canada's 10 Most Admired Corporate Cultures program.Canada's 10 Most Admired Corporate Cultures program Board of Governors He is Director of the Institute for Intellectual Capital Research, a management consulting firm that specializes in conducting human capital measurement diagnostics. In 2012, Bontis was elected as a member of the Board of Directors for the Canadian Soccer Association. Dr. Nick Bontis \u2013 Profile \u2013 Canada Soccer Keynote speaker As a professional keynote speaker, Bontis presents for a variety of industry, government and association audiences. His presentation topics typically focus on knowledge worker productivity, information bombardment and collaboration drawing from his research expertise surrounding the strategic management and measurement of an organization's intangible assets. He is represented exclusively in Canada by Speakers' Spotlight.Speakers' Spotlight - Dr. Nick Bontis - Leading Strategy & Management Expert Media Bontis has a regular recurring role on a CHCH-DT News segment entitled \" Bontis on Business \" during which he highlights the past week's business news.CHCH News - Bontis on Business Bontis wrote a weekly column in The Hamilton Spectator that appeared on Saturdays entitled \" Bontis on Business \" . He typically wrote articles that highlighted local entrepreneurs and new ventures.The Hamilton Spectator - Bontis on Business Sports management executive Bontis was appointed co-chair of the Sport Organizing Committee for Men's and Women's Soccer at the 2015 Pan American Games.Hamilton Spectator - The PanAm dedicated dozen Bontis is currently serving his third term on the board of directors of the Canadian Soccer Association.CSA Board of Directors As Chair of the Strategic Management Committee, Bontis was responsible for formulating the CSA ' s Strategic Plan entitled Leading a Soccer Nation . CSA Strategic Plan On May 6, 2017 Bontis was appointed vice president of Canada Soccer.Hamilton climbs soccer ladder On May 7, 2018 he was re-elected vice president .Ontario's Nick Bontis re-elected Canada Soccer Vice President On February 11, 2019 Bontis spearheaded Canada Soccer's launch of an updated version (2019 \u2013 2021) of the strategic plan entitled Canada Soccer Nation. CSA Launches 2019-2021 Strategic Plan On November 21, 2020 Bontis was elected president of Canada Soccer.Dr. Nick Bontis elected Canada Soccer President Other interests Bontis %DIFDELCMD < %DIFDELCMD < %%% has played soccer competitively since childhood for a variety of premier clubs in Ontario (Scarborough Maple Leaf, Scarborough Azzurri, London City, London Portuguese, Dundas United, Hamilton Greek Olympic). He currently plays for Proto Stars (H&DOSL) and Schalke FC (H&D). He is a former winner of the Ontario Cup (five times) and represented Canada in a World Youth Cup tournament in Bremen, Germany in 1986. As a varsity soccer player at the University of Western Ontario, he was a multiple OUA all-star, leading goal scorer and team MVP. Bontis also received the Bronze W and the Purple Blanket Award as an outstanding dual athlete at UWO. He was a Canadian all-star and national silver medallist in the running long jump as a member of the UWO varsity track & field team.Western Mustang Athletics - Purple Blanket Winners Bontis was the head coach for the Hamilton Sparta 2003 boys soccer team. He has several years of coaching experience and is licensed (USSF National B, USSF National C, CSA Provincial B, OSA Pre B, OSA Level 3, OSA Respect in Sport, NCCP Making Ethical Decisions; NCCP Concussion: Making Head Way) . Hamilton Sparta 2003 Boys Soccer Team", "edit_actions": [{"type": "R", "before": "-", "after": ",", "start_char_pos": 767, "end_char_pos": 768}, {"type": "D", "before": "is an award-winning tenured professor who", "after": null, "start_char_pos": 923, "end_char_pos": 964}, {"type": "R", "before": "In 2007, he was recognized as the first professor ever to win three outstanding teaching awards simultaneously: undergraduate instructor of the year, MBA instructor of the year, and McMaster University instructor of the year. He also received the faculty researcher of the year award for the business school. Maclean\u2019", "after": "Awards He has received awards for teaching and research. Maclean'", "start_char_pos": 1158, "end_char_pos": 1475}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1511, "end_char_pos": 1512}, {"type": "R", "before": "Dr. Nick Bontis", "after": "him", "start_char_pos": 1905, "end_char_pos": 1920}, {"type": "R", "before": "The official award citation read \"OUSA would like to recognize Dr. Nick Bontis for having made a significant contribution to teaching excellence and for facilitating a positive learning experience for Ontario students\".OUSA", "after": "OUSA", "start_char_pos": 1970, "end_char_pos": 2193}, {"type": "R", "before": "Spectator an exclusive honour only bestowed upon the top university professors in Canada .CNW Canada", "after": "SpectatorCNW Canada", "start_char_pos": 2292, "end_char_pos": 2392}, {"type": "R", "before": "Consultant", "after": "consultant", "start_char_pos": 2555, "end_char_pos": 2565}, {"type": "R", "before": "Advisory Board", "after": "advisory board", "start_char_pos": 2820, "end_char_pos": 2834}, {"type": "R", "before": "Executive Board", "after": "executive board", "start_char_pos": 3022, "end_char_pos": 3037}, {"type": "R", "before": "Board of Governors", "after": "board of governors", "start_char_pos": 3174, "end_char_pos": 3192}, {"type": "A", "before": null, "after": "Parent E-News for March 10, 2011,", "start_char_pos": 3280, "end_char_pos": 3280}, {"type": "R", "before": "Board of Governors", "after": "board of governors", "start_char_pos": 3340, "end_char_pos": 3358}, {"type": "R", "before": "Canadian Soccer Association", "after": "Dr. Nick Bontis \u2013 Profile \u2013 Canada Soccer", "start_char_pos": 3755, "end_char_pos": 3782}, {"type": "R", "before": "Speaker", "after": "speaker", "start_char_pos": 3791, "end_char_pos": 3798}, {"type": "R", "before": "ExpertDr. Nick Bontis - Client Testimonials", "after": "Expert", "start_char_pos": 4293, "end_char_pos": 4336}, {"type": "D", "before": "is in constant demand to express his opinion in the media, especially in television, radio and print. He", "after": null, "start_char_pos": 4350, "end_char_pos": 4454}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 4519, "end_char_pos": 4519}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 4539, "end_char_pos": 4539}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 4719, "end_char_pos": 4719}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 4739, "end_char_pos": 4739}, {"type": "R", "before": "Management Executive", "after": "management executive", "start_char_pos": 4875, "end_char_pos": 4895}, {"type": "R", "before": "Co-Chair,", "after": "co-chair", "start_char_pos": 4917, "end_char_pos": 4926}, {"type": "R", "before": "Board of Directors", "after": "board of directors", "start_char_pos": 5118, "end_char_pos": 5136}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5290, "end_char_pos": 5291}, {"type": "A", "before": null, "after": ".", "start_char_pos": 5342, "end_char_pos": 5342}, {"type": "R", "before": "Vice President", "after": "vice president", "start_char_pos": 5398, "end_char_pos": 5412}, {"type": "R", "before": "Vice President", "after": "vice president", "start_char_pos": 5493, "end_char_pos": 5507}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 5662, "end_char_pos": 5663}, {"type": "R", "before": "Strategic Plan", "after": "strategic plan", "start_char_pos": 5677, "end_char_pos": 5691}, {"type": "R", "before": "President", "after": "president", "start_char_pos": 5801, "end_char_pos": 5810}, {"type": "D", "before": "is an avid athlete and musician.", "after": null, "start_char_pos": 5899, "end_char_pos": 5931}, {"type": "D", "before": "Bontis spent many years as a Euphonium player competing at various music festivals as a youth. He was also an active member of his high school's jazz ensemble, choir and orchestra. While at UWO, Nick played the Euphonium in the Symphonic Band for several years.", "after": null, "start_char_pos": 5932, "end_char_pos": 6193}, {"type": "D", "before": "Bontis", "after": null, "start_char_pos": 6223, "end_char_pos": 6229}, {"type": "R", "before": "as well as the following licenses", "after": "and is licensed", "start_char_pos": 7174, "end_char_pos": 7207}, {"type": "A", "before": null, "after": ".", "start_char_pos": 7372, "end_char_pos": 7372}], "sents_char_pos": [0, 148, 244, 418, 652, 814, 1085, 1157, 1383, 1466, 1562, 1727, 1818, 1969, 2189, 2382, 2494, 2671, 2752, 2991, 3110, 3279, 3415, 3651, 3754, 3914, 4159, 4223, 4302, 4451, 4597, 4741, 4824, 5021, 5172, 5430, 5509, 5722, 5828, 5931, 6026, 6112, 6193, 6437, 6503, 6640, 6873, 7006, 7129, 7337]}
+{"doc_id": "145372", "revision_depth": "2", "before_revision": "An audiophile is a person who is in hphq and owns a 6xx . An audiophile seeks to reproduce the sound of only mids , typically in a room with no racist acoustics. It is widely agreed that reaching this goal is exactly $220 and that even the best-regarded recording and playback systems rarely, if ever, achieve it without a 6xx. Audiophile values only apply to all stages: the initial audio recording, the production process, and the playback via apple dongle and 6xx, which is usually in a discord setting. In general, the values of an audiophile are seen to be antithetical to the growing popularity of more convenient but lower quality music, especially lossy digital file types like MP3, lower definition streaming services, and racist stax. The term high-end audio refers to playback equipment used by audiophiles, which may be bought at specialist shops and websites. High-end components include turntables, digital-to-analog converters, equalization devices, preamplifiers and amplifiers (both solid-state and vacuum tube), loudspeakers (including horn, electrostatic and magnetostatic speakers), power conditioners, subwoofers, headphones, and acoustic room treatment in addition to room correction devices. Although many audiophile techniques are based on objective criteria that can be verified using techniques like ABX testing, perceived sound quality is necessarily subjective, leading to some more controversial audiophile techniques being based on pseudoscientific, magical or paranormal principles. Audio playback components An audio system typically consists of one or more source components, one or more amplification components, and (for stereo) two or more loudspeakers. Signal cables (analog audio, speaker, digital audio etc.) are used to link these components. There are also a variety of accessories, including equipment racks, power conditioners, devices to reduce or control vibration, record cleaners, anti-static devices, phonograph needle cleaners, reverberation reducing devices such as speaker pads and stands, sound absorbent foam, and soundproofing. The interaction between the loudspeakers and the room (room acoustics) plays an important part in sound quality. Sound vibrations are reflected from walls, floor and ceiling, and are affected by the contents of the room. Room dimensions can create standing waves at particular (usually low) frequencies. There are devices and materials for room treatment that affect sound quality. Soft materials, such as draperies and carpets, can absorb higher frequencies, whereas hard walls and floors can cause excess reverberation. Sound sources Audiophiles play music from a variety of sources including phonograph records, compact discs (CDs), and digital audio files that are either uncompressed or are losslessly compressed, such as FLAC, DSD, Windows Media Audio 9 Lossless and Apple Lossless (ALAC), in contrast to lossy compression, such as in MP3 encoding. From the early 1990s, CDs were the most common source of high-quality music. Nevertheless, turntables, tonearms, and magnetic cartridges are still used, despite the difficulties of keeping records free from dust and the delicate set-up associated with turntables. The 44.1 kHz sampling rate of the CD format, in theory, restricts CD information losses to above the theoretical upper-frequency limit of human hearing \u2013 20 kHz, see Nyquist limit. Nonetheless, newer formats such as FLAC, ALAC, DVD-Audio and Super Audio Compact Disc (SACD) have sampling rates of 88.2 kHz, 96 kHz or even 192 kHz. CD audio signals are encoded in 16-bit values. Some higher-definition consumer formats such as HDCD-encoded CDs, DVD-Audio, and SA-CD contain 20-bit, 24-bit and even 32-bit audio streams. With more bits more dynamic range is possible; 20 bit dynamic range is theoretically 120 dB\u2014the limit of most consumer electronic playback equipment. SACDs and DVD-Audio have up to 5.1 to 6.1 surround sound. Although both high-res optical formats have failed, there has been a resurgence in high-res digital files. SACD can be stored as a DSD file, and DVD-Audio can be stored as a FLAC or ALAC file. FLAC is the most widely used digital format for high-res with up to 8 channels and a maximum depth of 32 bit, and 655,350 Hz sampling rate. Uncompressed formats such as WAV and AIFF files can store audio CDs with no compression. Amplifiers A preamplifier selects among several audio inputs, amplifies source-level signals (such as those from a turntable), and allows the listener to adjust the sound with volume and tone controls. Many audiophile-oriented preamplifiers lack tone controls. A power amplifier takes the \"line-level\" audio signal from the preamplifier and drives the loudspeakers. An integrated amplifier combines the functions of power amplification with input switching and volume and tone control. Both pre/power combinations and integrated amplifiers are widely used by audiophiles. Audiophile amplifiers are available based on solid-state (semiconductor) technology, vacuum-tube (valve) technology, or hybrid technology\u2014semiconductors and vacuum tubes. Dedicated amplifiers are also commonly used by audiophiles to drive headphones, especially those with high impedance and/or low sensitivity, or electrostatic headphones. Loudspeakers The cabinet of the loudspeaker is known as the enclosure. There are a variety of loudspeaker enclosure designs, including sealed cabinets (acoustic suspension), ported cabinets (bass-reflex), transmission line, infinite baffle, and horn loaded. The enclosure plays a major role in the sound of the loudspeaker. The drivers that produce the sound are referred to as tweeters, midranges, and woofers. Driver designs include dynamic, electrostatic, plasma, ribbon, planar, ionic, and servo-actuated. Drivers are made from a variety of materials including paper pulp, polypropylene, kevlar, aluminum, magnesium, beryllium, and vapor-deposited diamond. The direction and intensity of the output of a loudspeaker, called dispersion or polar response, has a large effect on its sound. Various methods are employed to control the dispersion. These methods include monopolar, bipolar, dipolar, 360-degree, horn, waveguide, and line source. These terms refer to the configuration and arrangement of the various drivers in the enclosure. The positioning of loudspeakers in the room has a strong influence on the sound experience. Loudspeaker output is influenced by interaction with room boundaries, particularly bass response, and high frequency transducers are directional, or \"beaming\". Accessories Audiophiles use a wide variety of accessories and fine-tuning techniques, sometimes referred to as \"tweaks\", to improve the sound of their systems. These include power conditioner filters to \"clean\" the electricity, equipment racks to isolate components from floor vibrations, specialty power and audio cables, loudspeaker stands (and footers to isolate speakers from stands), and room treatments. There are several types of room treatment. Sound-absorbing materials may be placed strategically within a listening room to reduce the amplitude of early reflections, and to deal with resonance modes. Other treatments are designed to produce diffusion, reflection of sound in a scattered fashion. Room treatments can be expensive and difficult to optimize. Headphones Headphones are regularly used by audiophiles. These products can be remarkably expensive, some over $10, 000, but in general are much cheaper than comparable speaker systems. They have the advantage of not requiring room treatment, and being usable without requiring others to listen at the same time. Newer canalphones can be driven by the less powerful outputs found on portable music players . Design variety For music storage, digital formats offer an absence of clicks, pops, wow, flutter, acoustic feedback, and rumble, compared to vinyl records. Depending on the format, digital can also have a higher signal-to-noise ratio, a wider dynamic range, less total harmonic distortion, and a flatter and more extended frequency response. Despite this, vinyl records remain popular, and discussion about the relative merits of analog and digital soundcontinues (see Analog sound vs. digital sound). (Note that vinyl records may be mastered differently from their digital versions. ) In the amplification stage , vacuum-tube electronics remain popular, despite most other applications having since abandoned tubesfor solid state amplifiers. Also vacuum-tube amplifiers often have higher total harmonic distortion, require rebiasing, are less reliable, generate more heat, are less powerful, and cost more. There is also continuing debate about the proper use of negative feedback in amplifier design . Controversies There is substantial controversy on the subject of audiophile components; many have asserted that the occasionally high cost produces no measurable improvement in audio reproduction. For example, skeptic James Randi, through his foundation One Million Dollar Paranormal Challenge, has offered a prize of $1 million to anyone who can demonstrate that $ 7,250 audio cables \"are any better than ordinary audio cables\". In 2008, audio reviewer Michael Fremer attempted to claim the prize, and said that Randi declined the challenge. Randi said that the cable manufacturer Pear Cables was the one who withdrew.", "after_revision": "An audiophile is a person who is enthusiastic about high-fidelity sound reproduction . An audiophile seeks to reproduce the sound of a live musical performance , typically in a room with good acoustics. It is widely agreed that reaching this goal is very difficult and that even the best-regarded recording and playback systems rarely, if ever, achieve it. Audiophile values may be applied at all stages of music reproduction: the initial audio recording, the production process, and the playback, which is usually in a home setting. In general, the values of an audiophile are seen to be antithetical to the growing popularity of more convenient but lower quality music, especially lossy digital file types like MP3, lower definition streaming services, and inexpensive headphones. The term high-end audio refers to playback equipment used by audiophiles, which may be bought at specialist shops and websites. High-end components include turntables, digital-to-analog converters, equalization devices, preamplifiers and amplifiers (both solid-state and vacuum tube), loudspeakers (including horn, electrostatic and magnetostatic speakers), power conditioners, subwoofers, headphones, and acoustic room treatment in addition to room correction devices. Although many audiophile techniques are based on objective criteria that can be verified using techniques like ABX testing, perceived sound quality is necessarily subjective, leading to some more controversial audiophile techniques being based on pseudoscientific, magical or paranormal principles . Audio playback components An audio system typically consists of one or more source components, one or more amplification components, and (for stereo) two or more loudspeakers. Signal cables (analog audio, speaker, digital audio etc.) are used to link these components. There are also a variety of accessories, including equipment racks, power conditioners, devices to reduce or control vibration, record cleaners, anti-static devices, phonograph needle cleaners, reverberation reducing devices such as speaker pads and stands, sound absorbent foam, and soundproofing. The interaction between the loudspeakers and the room (room acoustics) plays an important part in sound quality. Sound vibrations are reflected from walls, floor and ceiling, and are affected by the contents of the room. Room dimensions can create standing waves at particular (usually low) frequencies. There are devices and materials for room treatment that affect sound quality. Soft materials, such as draperies and carpets, can absorb higher frequencies, whereas hard walls and floors can cause excess reverberation. Sound sources Audiophiles play music from a variety of sources including phonograph records, compact discs (CDs), and digital audio files that are either uncompressed or are losslessly compressed, such as FLAC, DSD, Windows Media Audio 9 Lossless and Apple Lossless (ALAC), in contrast to lossy compression, such as in MP3 encoding. From the early 1990s, CDs were the most common source of high-quality music. Nevertheless, turntables, tonearms, and magnetic cartridges are still used, despite the difficulties of keeping records free from dust and the delicate set-up associated with turntables. The 44.1 kHz sampling rate of the CD format, in theory, restricts CD information losses to above the theoretical upper-frequency limit of human hearing \u2013 20 kHz, see Nyquist limit. Nonetheless, newer formats such as FLAC, ALAC, DVD-Audio and Super Audio Compact Disc (SACD) have sampling rates of 88.2 kHz, 96 kHz or even 192 kHz. CD audio signals are encoded in 16-bit values. Some higher-definition consumer formats such as HDCD-encoded CDs, DVD-Audio, and SA-CD contain 20-bit , 24-bit and even 32-bit audio streams. With more bits more dynamic range is possible; 20 bit dynamic range is theoretically 120 dB\u2014the limit of most consumer electronic playback equipment. SACDs and DVD-Audio have up to 5.1 to 6.1 surround sound. Although both high-res optical formats have failed, there has been a resurgence in high-res digital files. SACD can be stored as a DSD file, and DVD-Audio can be stored as a FLAC or ALAC file. FLAC is the most widely used digital format for high-res with up to 8 channels and a maximum depth of 32 bit, and 655,350 Hz sampling rate. Uncompressed formats such as WAV and AIFF files can store audio CDs with no compression. Amplifiers A preamplifier selects among several audio inputs, amplifies source-level signals (such as those from a turntable), and allows the listener to adjust the sound with volume and tone controls. Many audiophile-oriented preamplifiers lack tone controls. A power amplifier takes the \"line-level\" audio signal from the preamplifier and drives the loudspeakers. An integrated amplifier combines the functions of power amplification with input switching and volume and tone control. Both pre/power combinations and integrated amplifiers are widely used by audiophiles. Audiophile amplifiers are available based on solid-state (semiconductor) technology, vacuum-tube (valve) technology, or hybrid technology\u2014semiconductors and vacuum tubes . Dedicated amplifiers are also commonly used by audiophiles to drive headphones, especially those with high impedance and/or low sensitivity, or electrostatic headphones. Loudspeakers The cabinet of the loudspeaker is known as the enclosure. There are a variety of loudspeaker enclosure designs, including sealed cabinets (acoustic suspension), ported cabinets (bass-reflex), transmission line, infinite baffle, and horn loaded. The enclosure plays a major role in the sound of the loudspeaker. The drivers that produce the sound are referred to as tweeters, midranges, and woofers. Driver designs include dynamic, electrostatic, plasma, ribbon, planar, ionic, and servo-actuated. Drivers are made from a variety of materials including paper pulp, polypropylene, kevlar, aluminum, magnesium, beryllium, and vapor-deposited diamond. The direction and intensity of the output of a loudspeaker, called dispersion or polar response, has a large effect on its sound. Various methods are employed to control the dispersion. These methods include monopolar, bipolar, dipolar, 360-degree, horn, waveguide, and line source. These terms refer to the configuration and arrangement of the various drivers in the enclosure. The positioning of loudspeakers in the room has a strong influence on the sound experience. Loudspeaker output is influenced by interaction with room boundaries, particularly bass response, and high frequency transducers are directional, or \"beaming\". Accessories Audiophiles use a wide variety of accessories and fine-tuning techniques, sometimes referred to as \"tweaks\", to improve the sound of their systems. These include power conditioner filters to \"clean\" the electricity, equipment racks to isolate components from floor vibrations, specialty power and audio cables, loudspeaker stands (and footers to isolate speakers from stands), and room treatments. There are several types of room treatment. Sound-absorbing materials may be placed strategically within a listening room to reduce the amplitude of early reflections, and to deal with resonance modes. Other treatments are designed to produce diffusion, reflection of sound in a scattered fashion. Room treatments can be expensive and difficult to optimize. Headphones Headphones are regularly used by audiophiles. These products can be remarkably expensive, some over $10,000, but in general are much cheaper than comparable speaker systems. They have the advantage of not requiring room treatment, and being usable without requiring others to listen at the same time. Newer canalphones can be driven by the less powerful outputs found on portable music players. Design variety For music storage, digital formats offer an absence of clicks, pops, wow, flutter, acoustic feedback, and rumble, compared to vinyl records. Depending on the format, digital can also have a higher signal-to-noise ratio, a wider dynamic range, less total harmonic distortion, and a flatter and more extended frequency response. Despite this, vinyl records remain popular, and discussion about the relative merits of analog and digital sound continues (see Analog sound vs. digital sound). (Note that vinyl records may be mastered differently from their digital versions.) In the amplification stage, vacuum-tube electronics remain popular, despite most other applications having since abandoned tubes for solid state amplifiers. Also vacuum-tube amplifiers often have higher total harmonic distortion, require rebiasing, are less reliable, generate more heat, are less powerful, and cost more. There is also continuing debate about the proper use of negative feedback in amplifier design. Controversies There is substantial controversy on the subject of audiophile components; many have asserted that the occasionally high cost produces no measurable improvement in audio reproduction. For example, skeptic James Randi, through his foundation One Million Dollar Paranormal Challenge, has offered a prize of $1 million to anyone who can demonstrate that 7,250 audio cables \"are any better than ordinary audio cables\". In 2008, audio reviewer Michael Fremer attempted to claim the prize, and said that Randi declined the challenge. Randi said that the cable manufacturer Pear Cables was the one who withdrew.", "edit_actions": [{"type": "R", "before": "in hphq and owns a 6xx", "after": "enthusiastic about high-fidelity sound reproduction", "start_char_pos": 33, "end_char_pos": 55}, {"type": "R", "before": "only mids", "after": "a live musical performance", "start_char_pos": 104, "end_char_pos": 113}, {"type": "R", "before": "no racist", "after": "good", "start_char_pos": 141, "end_char_pos": 150}, {"type": "R", "before": "exactly $220 and that even the best-regarded recording and playback systems rarely, if ever, achieve it without a 6xx. Audiophile values only apply to all stages: the initial audio recording, the production process, and the playback via apple dongle and 6xx, which is usually in a discord setting. In general, the values of an audiophile are seen to be antithetical to the growing popularity of more convenient but lower quality music, especially lossy digital file types like MP3, lower definition streaming services, and racist stax. The term high-end audio refers to playback equipment used by audiophiles, which may be bought at specialist shops and websites. High-end components include turntables, digital-to-analog converters, equalization devices, preamplifiers and amplifiers (both solid-state and vacuum tube), loudspeakers (including horn, electrostatic and magnetostatic speakers), power conditioners, subwoofers, headphones, and acoustic room treatment in addition to room correction devices. Although many audiophile techniques are based on objective criteria that can be verified using techniques like ABX testing, perceived sound quality is necessarily subjective, leading to some more controversial audiophile techniques being based on pseudoscientific, magical or paranormal principles. Audio playback components An audio system typically consists of one or more source components, one or more amplification components, and (for stereo) two or more loudspeakers. Signal cables (analog audio, speaker, digital audio etc.) are used to link these components. There are also a variety of accessories, including equipment racks, power conditioners, devices to reduce or control vibration, record cleaners, anti-static devices, phonograph needle cleaners, reverberation reducing devices such as speaker pads and stands, sound absorbent foam, and soundproofing. The interaction between the loudspeakers and the room (room acoustics) plays an important part in sound quality. Sound vibrations are reflected from walls, floor and ceiling, and are affected by the contents of the room. Room dimensions can create standing waves at particular (usually low) frequencies. There are devices and materials for room treatment that affect sound quality. Soft materials, such as draperies and carpets, can absorb higher frequencies, whereas hard walls and floors can cause excess reverberation. Sound sources Audiophiles play music from a variety of sources including phonograph records, compact discs (CDs), and digital audio files that are either uncompressed or are losslessly compressed, such as FLAC, DSD, Windows Media Audio 9 Lossless and Apple Lossless (ALAC), in contrast to lossy compression, such as in MP3 encoding. From the early 1990s, CDs were the most common source of high-quality music. Nevertheless, turntables, tonearms, and magnetic cartridges are still used, despite the difficulties of keeping records free from dust and the delicate set-up associated with turntables. The 44.1 kHz sampling rate of the CD format, in theory, restricts CD information losses to above the theoretical upper-frequency limit of human hearing \u2013 20 kHz, see Nyquist limit. Nonetheless, newer formats such as FLAC, ALAC, DVD-Audio and Super Audio Compact Disc (SACD) have sampling rates of 88.2 kHz, 96 kHz or even 192 kHz. CD audio signals are encoded in 16-bit values. Some higher-definition consumer formats such as HDCD-encoded CDs, DVD-Audio, and SA-CD contain 20-bit, 24-bit and even 32-bit audio streams. With more bits more dynamic range is possible; 20 bit dynamic range is theoretically 120 dB\u2014the limit of most consumer electronic playback equipment. SACDs and DVD-Audio have up to 5.1 to 6.1 surround sound. Although both high-res optical formats have failed, there has been a resurgence in high-res digital files. SACD can be stored as a DSD file, and DVD-Audio can be stored as a FLAC or ALAC file. FLAC is the most widely used digital format for high-res with up to 8 channels and a maximum depth of 32 bit, and 655,350 Hz sampling rate. Uncompressed formats such as WAV and AIFF files can store audio CDs with no compression. Amplifiers A preamplifier selects among several audio inputs, amplifies source-level signals (such as those from a turntable), and allows the listener to adjust the sound with volume and tone controls. Many audiophile-oriented preamplifiers lack tone controls. A power amplifier takes the \"line-level\" audio signal from the preamplifier and drives the loudspeakers. An integrated amplifier combines the functions of power amplification with input switching and volume and tone control. Both pre/power combinations and integrated amplifiers are widely used by audiophiles. Audiophile amplifiers are available based on solid-state (semiconductor) technology, vacuum-tube (valve) technology, or hybrid technology\u2014semiconductors and vacuum tubes. Dedicated amplifiers are also commonly used by audiophiles to drive headphones, especially those with high impedance and/or low sensitivity, or electrostatic headphones. Loudspeakers The cabinet of the loudspeaker is known as the enclosure. There are a variety of loudspeaker enclosure designs, including sealed cabinets (acoustic suspension), ported cabinets (bass-reflex), transmission line, infinite baffle, and horn loaded. The enclosure plays a major role in the sound of the loudspeaker. The drivers that produce the sound are referred to as tweeters, midranges, and woofers. Driver designs include dynamic, electrostatic, plasma, ribbon, planar, ionic, and servo-actuated. Drivers are made from a variety of materials including paper pulp, polypropylene, kevlar, aluminum, magnesium, beryllium, and vapor-deposited diamond. The direction and intensity of the output of a loudspeaker, called dispersion or polar response, has a large effect on its sound. Various methods are employed to control the dispersion. These methods include monopolar, bipolar, dipolar, 360-degree, horn, waveguide, and line source. These terms refer to the configuration and arrangement of the various drivers in the enclosure. The positioning of loudspeakers in the room has a strong influence on the sound experience. Loudspeaker output is influenced by interaction with room boundaries, particularly bass response, and high frequency transducers are directional, or \"beaming\". Accessories Audiophiles use a wide variety of accessories and fine-tuning techniques, sometimes referred to as \"tweaks\", to improve the sound of their systems. These include power conditioner filters to \"clean\" the electricity, equipment racks to isolate components from floor vibrations, specialty power and audio cables, loudspeaker stands (and footers to isolate speakers from stands), and room treatments. There are several types of room treatment. Sound-absorbing materials may be placed strategically within a listening room to reduce the amplitude of early reflections, and to deal with resonance modes. Other treatments are designed to produce diffusion, reflection of sound in a scattered fashion. Room treatments can be expensive and difficult to optimize. Headphones Headphones are regularly used by audiophiles. These products can be remarkably expensive, some over $10, 000, but in general are much cheaper than comparable speaker systems. They have the advantage of not requiring room treatment, and being usable without requiring others to listen at the same time. Newer canalphones can be driven by the less powerful outputs found on portable music players", "after": "very difficult and that even the best-regarded recording and playback systems rarely, if ever, achieve it.", "start_char_pos": 209, "end_char_pos": 7727}, {"type": "A", "before": null, "after": "Audiophile values may be applied at all stages of music reproduction: the initial audio recording, the production process, and the playback, which is usually in a home setting. In general, the values of an audiophile are seen to be antithetical to the growing popularity of more convenient but lower quality music, especially lossy digital file types like MP3, lower definition streaming services, and inexpensive headphones.", "start_char_pos": 7728, "end_char_pos": 7728}, {"type": "A", "before": null, "after": "The term high-end audio refers to playback equipment used by audiophiles, which may be bought at specialist shops and websites. High-end components include turntables, digital-to-analog converters, equalization devices, preamplifiers and amplifiers (both solid-state and vacuum tube), loudspeakers (including horn, electrostatic and magnetostatic speakers), power conditioners, subwoofers, headphones, and acoustic room treatment in addition to room correction devices.", "start_char_pos": 7729, "end_char_pos": 7729}, {"type": "A", "before": null, "after": "Although many audiophile techniques are based on objective criteria that can be verified using techniques like ABX testing, perceived sound quality is necessarily subjective, leading to some more controversial audiophile techniques being based on pseudoscientific, magical or paranormal principles", "start_char_pos": 7730, "end_char_pos": 7730}, {"type": "R", "before": "Design variety", "after": "Audio playback components An audio system typically consists of one or more source components, one or more amplification components, and (for stereo) two or more loudspeakers.", "start_char_pos": 7733, "end_char_pos": 7747}, {"type": "R", "before": "For music storage, digital formats offer an absence of clicks, pops, wow, flutter, acoustic feedback, and rumble, compared to vinyl records. Depending on the format, digital can also have a higher signal-to-noise ratio, a wider dynamic range, less total harmonic distortion, and a flatter and more extended frequency response. Despite this, vinyl records remain popular, and discussion about the relative merits of analog and digital soundcontinues (see Analog sound vs. digital sound). (Note that vinyl records may be mastered differently from their digital versions. )", "after": "Signal cables (analog audio, speaker, digital audio etc.) are used to link these components. There are also a variety of accessories, including equipment racks, power conditioners, devices to reduce or control vibration, record cleaners, anti-static devices, phonograph needle cleaners, reverberation reducing devices such as speaker pads and stands, sound absorbent foam, and soundproofing.", "start_char_pos": 7748, "end_char_pos": 8318}, {"type": "R", "before": "In the amplification stage", "after": "The interaction between the loudspeakers and the room (room acoustics) plays an important part in sound quality. Sound vibrations are reflected from walls, floor and ceiling, and are affected by the contents of the room. Room dimensions can create standing waves at particular (usually low) frequencies. There are devices and materials for room treatment that affect sound quality. Soft materials, such as draperies and carpets, can absorb higher frequencies, whereas hard walls and floors can cause excess reverberation.", "start_char_pos": 8319, "end_char_pos": 8345}, {"type": "A", "before": null, "after": "Sound sources Audiophiles play music from a variety of sources including phonograph records, compact discs (CDs), and digital audio files that are either uncompressed or are losslessly compressed, such as FLAC, DSD, Windows Media Audio 9 Lossless and Apple Lossless (ALAC), in contrast to lossy compression, such as in MP3 encoding. From the early 1990s, CDs were the most common source of high-quality music. Nevertheless, turntables, tonearms, and magnetic cartridges are still used, despite the difficulties of keeping records free from dust and the delicate set-up associated with turntables.", "start_char_pos": 8346, "end_char_pos": 8346}, {"type": "A", "before": null, "after": "The 44.1 kHz sampling rate of the CD format, in theory, restricts CD information losses to above the theoretical upper-frequency limit of human hearing \u2013 20 kHz, see Nyquist limit. Nonetheless, newer formats such as FLAC, ALAC, DVD-Audio and Super Audio Compact Disc (SACD) have sampling rates of 88.2 kHz, 96 kHz or even 192 kHz.", "start_char_pos": 8347, "end_char_pos": 8347}, {"type": "A", "before": null, "after": "CD audio signals are encoded in 16-bit values. Some higher-definition consumer formats such as HDCD-encoded CDs, DVD-Audio, and SA-CD contain 20-bit", "start_char_pos": 8348, "end_char_pos": 8348}, {"type": "A", "before": null, "after": "24-bit and even 32-bit audio streams. With more bits more dynamic range is possible; 20 bit dynamic range is theoretically 120 dB\u2014the limit of most consumer electronic playback equipment.", "start_char_pos": 8351, "end_char_pos": 8351}, {"type": "A", "before": null, "after": "SACDs and DVD-Audio have up to 5.1 to 6.1 surround sound. Although both high-res optical formats have failed, there has been a resurgence in high-res digital files. SACD can be stored as a DSD file, and DVD-Audio can be stored as a FLAC or ALAC file. FLAC is the most widely used digital format for high-res with up to 8 channels and a maximum depth of 32 bit, and 655,350 Hz sampling rate. Uncompressed formats such as WAV and AIFF files can store audio CDs with no compression.", "start_char_pos": 8352, "end_char_pos": 8352}, {"type": "A", "before": null, "after": "Amplifiers A preamplifier selects among several audio inputs, amplifies source-level signals (such as those from a turntable), and allows the listener to adjust the sound with volume and tone controls. Many audiophile-oriented preamplifiers lack tone controls. A power amplifier takes the \"line-level\" audio signal from the preamplifier and drives the loudspeakers. An integrated amplifier combines the functions of power amplification with input switching and volume and tone control. Both pre/power combinations and integrated amplifiers are widely used by audiophiles.", "start_char_pos": 8353, "end_char_pos": 8353}, {"type": "A", "before": null, "after": "Audiophile amplifiers are available based on solid-state (semiconductor) technology,", "start_char_pos": 8354, "end_char_pos": 8354}, {"type": "R", "before": "electronics remain popular, despite most other applications having since abandoned tubesfor solid state amplifiers. Also vacuum-tube amplifiers often have higher total harmonic distortion, require rebiasing, are less reliable, generate more heat, are less powerful, and cost more. There is also continuing debate about the proper use of negative feedback in amplifier design", "after": "(valve) technology, or hybrid technology\u2014semiconductors and vacuum tubes", "start_char_pos": 8367, "end_char_pos": 8741}, {"type": "R", "before": "Controversies", "after": "Dedicated amplifiers are also commonly used by audiophiles to drive headphones, especially those with high impedance and/or low sensitivity, or electrostatic headphones.", "start_char_pos": 8744, "end_char_pos": 8757}, {"type": "R", "before": "There is substantial controversy on", "after": "Loudspeakers The cabinet of the loudspeaker is known as the enclosure. There are a variety of loudspeaker enclosure designs, including sealed cabinets (acoustic suspension), ported cabinets (bass-reflex), transmission line, infinite baffle, and horn loaded. The enclosure plays a major role in the sound of the loudspeaker.", "start_char_pos": 8758, "end_char_pos": 8793}, {"type": "A", "before": null, "after": "The drivers that produce the sound are referred to as tweeters, midranges, and woofers. Driver designs include dynamic, electrostatic, plasma, ribbon, planar, ionic, and servo-actuated. Drivers are made from a variety of materials including paper pulp, polypropylene, kevlar, aluminum, magnesium, beryllium, and vapor-deposited diamond.", "start_char_pos": 8794, "end_char_pos": 8794}, {"type": "A", "before": null, "after": "The direction and intensity of the output of a loudspeaker, called dispersion or polar response, has a large effect on its sound. Various methods are employed to control the dispersion. These methods include monopolar, bipolar, dipolar, 360-degree, horn, waveguide, and line source. These terms refer to the configuration and arrangement of", "start_char_pos": 8795, "end_char_pos": 8795}, {"type": "R", "before": "subject of audiophile components; many have asserted that the occasionally high cost produces no measurable improvement in audio reproduction. For example, skeptic James Randi, through his foundation One Million Dollar Paranormal Challenge, has offered a prize of $1 million to anyone who can demonstrate that $", "after": "various drivers in the enclosure.", "start_char_pos": 8800, "end_char_pos": 9111}, {"type": "A", "before": null, "after": "The positioning of loudspeakers in the room has a strong influence on the sound experience. Loudspeaker output is influenced by interaction with room boundaries, particularly bass response, and high frequency transducers are directional, or \"beaming\".", "start_char_pos": 9112, "end_char_pos": 9112}, {"type": "A", "before": null, "after": "Accessories Audiophiles use a wide variety of accessories and fine-tuning techniques, sometimes referred to as \"tweaks\", to improve the sound of their systems. These include power conditioner filters to \"clean\" the electricity, equipment racks to isolate components from floor vibrations, specialty power and audio cables, loudspeaker stands (and footers to isolate speakers from stands), and room treatments.", "start_char_pos": 9113, "end_char_pos": 9113}, {"type": "A", "before": null, "after": "There are several types of room treatment. Sound-absorbing materials may be placed strategically within a listening room to reduce the amplitude of early reflections, and to deal with resonance modes. Other treatments are designed to produce diffusion, reflection of sound in a scattered fashion. Room treatments can be expensive and difficult to optimize.", "start_char_pos": 9114, "end_char_pos": 9114}, {"type": "A", "before": null, "after": "Headphones", "start_char_pos": 9115, "end_char_pos": 9115}, {"type": "A", "before": null, "after": "Headphones are regularly used by audiophiles. These products can be remarkably expensive, some over $10,000, but in general are much cheaper than comparable speaker systems. They have the advantage of not requiring room treatment, and being usable without requiring others to listen at the same time. Newer canalphones can be driven by the less powerful outputs found on portable music players. Design variety For music storage, digital formats offer an absence of clicks, pops, wow, flutter, acoustic feedback, and rumble, compared to vinyl records. Depending on the format, digital can also have a higher signal-to-noise ratio, a wider dynamic range, less total harmonic distortion, and a flatter and more extended frequency response. Despite this, vinyl records remain popular, and discussion about the relative merits of analog and digital sound continues (see Analog sound vs. digital sound). (Note that vinyl records may be mastered differently from their digital versions.) In the amplification stage, vacuum-tube electronics remain popular, despite most other applications having since abandoned tubes for solid state amplifiers. Also vacuum-tube amplifiers often have higher total harmonic distortion, require rebiasing, are less reliable, generate more heat, are less powerful, and cost more. There is also continuing debate about the proper use of negative feedback in amplifier design. Controversies There is substantial controversy on the subject of audiophile components; many have asserted that the occasionally high cost produces no measurable improvement in audio reproduction. For example, skeptic James Randi, through his foundation One Million Dollar Paranormal Challenge, has offered a prize of $1 million to anyone who can demonstrate that", "start_char_pos": 9116, "end_char_pos": 9116}], "sents_char_pos": [0, 57, 161, 327, 506, 744, 872, 1214, 1513, 1689, 1782, 2081, 2194, 2302, 2385, 2463, 2603, 2936, 3013, 3200, 3381, 3531, 3578, 3719, 3766, 3869, 3927, 4034, 4120, 4260, 4349, 4551, 4610, 4715, 4835, 4921, 5092, 5262, 5333, 5520, 5586, 5674, 5772, 5923, 6053, 6109, 6206, 6302, 6394, 6554, 6714, 6964, 7007, 7165, 7261, 7321, 7378, 7507, 7634, 7888, 8074, 8234, 8482, 8647, 8833, 8942, 9180, 9293]}
+{"doc_id": "14539", "revision_depth": "1", "before_revision": "The origins of the Internet date back to the development of packet switching and research commissioned by the United States Department of Defense in the 1960s to enable time-sharing of computers. The primary precursor network, the ARPANET, initially served as a backbone for interconnection of regional academic and military networks in the 1970s. The funding of the National Science Foundation Network as a new backbone in the 1980s, as well as private funding for other commercial extensions, led to worldwide participation in the development of new networking technologies, and the merger of many networks. \"Internet History \u2013 One Page Summary\" , The Living Internet, Bill Stewart (ed), January 2000. The linking of commercial networks and enterprises by the early 1990s marked the beginning of the transition to the modern Internet,\"#3 1982: the ARPANET community grows\" in 40 maps that explain the internet , Timothy B. Lee, Vox Conversations, 2 June 2014. Retrieved 27 June 2014. and generated a sustained exponential growth as generations of institutional, personal, and mobile computers were connected to the network. Although the Internet was widely used by academia in the 1980s, commercialization incorporated its services and technologies into virtually every aspect of modern life. The Internet has no single centralized governance in either technological implementation or policies for access and usage; each constituent network sets its own policies. \"Who owns the Internet?\" , Jonathan Strickland, How Stuff Works. Retrieved 27 June 2014. The overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address (IP address) space and the Domain Name System (DNS), are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise. \"The Tao of IETF: A Novice's Guide to Internet Engineering Task Force\", P. Hoffman and S. Harris, , September 2006. In November 2006, the Internet was included on USA Today's list of New Seven Wonders. The word internetted was used as early as 1849, meaning interconnected or interwoven. nineteenth-century use as an adjective. The word Internet was used in 1974 as the shorthand form of Internetwork. Cerf, Vinton; Dalal, Yogen; Sunshine, Carl (December 1974), , Specification of Internet Transmission Control Protocol Today, the term Internet most commonly refers to the global system of interconnected computer networks, though it may also refer to any group of smaller networks. In the 1960s, the Advanced Research Projects Agency (ARPA) of the United States Department of Defense funded research into time-sharing of computers. \"So, who really did invent the Internet?\" , Ian Peter, The Internet History Project, 2004. Retrieved 27 June 2014. Research into packet switching, one of the fundamental Internet technologies, started in the work of Paul Baran in the early 1960s and, independently, Donald Davies in 1965.; After the Symposium on Operating Systems Principles in 1967, packet switching from the proposed NPL network was incorporated into the design for the ARPANET and other resource sharing networks such as the Merit Network and CYCLADES, which were developed in the late 1960s and early 1970s. ARPANET development began with two network nodes which were interconnected between the Network Measurement Center at the University of California, Los Angeles (UCLA) Henry Samueli School of Engineering and Applied Science directed by Leonard Kleinrock, and the NLS system at SRI International (SRI) by Douglas Engelbart in Menlo Park, California, on 29 October 1969. \"Roads and Crossroads of Internet History\" by Gregory Gromov. 1995 The third site was the Culler-Fried Interactive Mathematics Center at the University of California, Santa Barbara, followed by the University of Utah Graphics Department. In a sign of future growth, 15 sites were connected to the young ARPANET by the end of 1971. These early years were documented in the 1972 film Computer Networks: The Heralds of Resource Sharing. Early international collaborations for the ARPANET were rare. Connections were made in 1973 to the Norwegian Seismic Array (NORSAR) via a satellite station in Tanum, Sweden, and to Peter Kirstein's research group at University College London which provided a gateway to British academic networks.; The ARPA projects and international working groups led to the development of various protocols and standards by which multiple separate networks could become a single network or \"a network of networks\". \"Brief History of the Internet: The Initial Internetting Concepts\" , Barry M. Leiner, et al., Internet Society. Retrieved 27 June 2014. In 1974, Vint Cerf and Bob Kahn used the term internet as a shorthand for internetwork in , , Vinton Cerf, Yogen Dalal, Carl Sunshine, Specification of Internet Transmission Control Program (December 1974) and later RFCs repeated this use. Cerf and Khan credit Louis Pouzin with important influences on TCP/IP design. Commercial PTT providers were concerned with developing X.25 public data networks. Access to the ARPANET was expanded in 1981 when the National Science Foundation (NSF) funded the Computer Science Network (CSNET). In 1982, the Internet Protocol Suite (TCP/IP) was standardized, which permitted worldwide proliferation of interconnected networks. TCP/IP network access expanded again in 1986 when the National Science Foundation Network (NSFNet) provided access to supercomputer sites in the United States for researchers, first at speeds of 56 kbit/s and later at 1.5 Mbit/s and 45 Mbit/s. NSFNET: A Partnership for High-Speed Networking, Final Report 1987\u20131995, Karen D. Frazer, Merit Network, Inc., 1995 The NSFNet expanded into academic and research organizations in Europe, Australia, New Zealand and Japan in 1988\u201389.R\u00e9seaux IP Europ\u00e9ens (RIPE) Although other network protocols such as UUCP had global reach well before this time, this marked the beginning of the Internet as an intercontinental network. Commercial Internet service providers (ISPs) emerged in 1989 in the United States and Australia. The ARPANET was decommissioned in 1990. Since 1995, the Internet has tremendously impacted culture and commerce, including the rise of near instant communication by email, instant messaging, telephony (Voice over Internet Protocol or VoIP), two-way interactive video calls, and the World Wide WebHow the web went world wide , Mark Ward, Technology Correspondent, BBC News. Retrieved 24 January 2011. with its discussion forums, blogs, social networking services, and online shopping sites. Increasing amounts of data are transmitted at higher and higher speeds over fiber optic networks operating at 1-Gbit/s, 10-Gbit/s, or more. The Internet continues to grow, driven by ever greater amounts of online information and knowledge, commerce, entertainment and social networking services. During the late 1990s, it was estimated that traffic on the public Internet grew by 100 percent per year, while the mean annual growth in the number of Internet users was thought to be between 20\\% and 50\\%. This growth is often attributed to the lack of central administration, which allows organic growth of the network, as well as the non-proprietary nature of the Internet protocols, which encourages vendor interoperability and prevents any one company from exerting too much control over the network. , the estimated total number of Internet users was 2.095 billion (30.2\\% of world population). It is estimated that in 1993 the Internet carried only 1\\% of the information flowing through two-way telecommunication. By 2000 this figure had grown to 51\\%, and by 2007 more than 97\\% of all telecommunicated information was carried over the Internet. The Internet is a global network that comprises many voluntarily interconnected autonomous networks. It operates without a central governing body. The technical underpinning and standardization of the core protocols (IPv4 and IPv6) is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise. To maintain interoperability, the principal name spaces of the Internet are administered by the Internet Corporation for Assigned Names and Numbers (ICANN). ICANN is governed by an international board of directors drawn from across the Internet technical, business, academic, and other non-commercial communities. ICANN coordinates the assignment of unique identifiers for use on the Internet, including domain names, IP addresses, application port numbers in the transport protocols, and many other parameters. Globally unified name spaces are essential for maintaining the global reach of the Internet. This role of ICANN distinguishes it as perhaps the only central coordinating body for the global Internet. Klein, Hans. (2004). \"ICANN and Non-Territorial Sovereignty: Government Without the Nation State.\" Internet and Public Policy Project. Georgia Institute of Technology. The National Telecommunications and Information Administration, an agency of the United States Department of Commerce, had final approval over changes to the DNS root zone until the IANA stewardship transition on 1 October 2016. \"Bush administration annexes internet\" , Kieren McCarthy, The Register, 1 July 2005 The Internet Society (ISOC) was founded in 1992 with a mission to \"assure the open development, evolution and use of the Internet for the benefit of all people throughout the world\". Its members include individuals (anyone may join) as well as corporations, organizations, governments, and universities. Among other activities ISOC provides an administrative home for a number of less formally organized groups that are involved in developing and managing the Internet, including: the IETF, Internet Architecture Board (IAB), Internet Engineering Steering Group (IESG), Internet Research Task Force (IRTF), and Internet Research Steering Group (IRSG). On 16 November 2005, the United Nations-sponsored World Summit on the Information Society in Tunis established the Internet Governance Forum (IGF) to discuss Internet-related issues. Grassroots efforts have led to wireless community networks. Commercial Wi-Fi services that cover large areas are available in many cities, such as New York, London, Vienna, Toronto, San Francisco, Philadelphia, Chicago and Pittsburgh, where the Internet can then be accessed from places such as a park bench. Experiments have also been conducted with proprietary mobile wireless networks like Ricochet, various high-speed data services over cellular networks, and fixed wireless services. Modern smartphones can also access the Internet through the cellular carrier network. For Web browsing, these devices provide applications such as Google Chrome, Safari, and Firefox and a wide variety of other Internet software may be installed from app-stores. Internet usage by mobile and tablet devices exceeded desktop worldwide for the first time in October 2016. \"StatCounter Global Stats finds that mobile and tablet devices accounted for 51.3\\% of Internet usage worldwide in October compared to 48.7\\% by desktop.\" , StatCounter: Global Stats, Press Release, 1 November 2016. Mobile communication 215x215px|Number of mobile cellular subscriptions 2012\u20132016, World Trends in Freedom of Expression and Media Development Global Report 2017/2018 The International Telecommunication Union (ITU) estimated that, by the end of 2017, 48\\% of individual users regularly connect to the Internet, up from 34\\% in 2012. World Telecommunication/ICT Indicators Database 2020 (24th Edition/July 2020) ; International Telecommunication Union (ITU), 2017a, Key ICT indicators for developed and developing countries and the world (totals and penetration rates). World Telecommunication/ICT Indicators database Mobile Internet connectivity has played an important role in expanding access in recent years especially in Asia and the Pacific and in Africa. The number of unique mobile cellular subscriptions increased from 3.89 billion in 2012 to 4.83 billion in 2016, two-thirds of the world's population, with more than half of subscriptions located in Asia and the Pacific. The number of subscriptions is predicted to rise to 5.69 billion users in 2020. , almost 60\\% of the world's population had access to a 4G broadband cellular network, up from almost 50\\% in 2015 and 11\\% in 2012. The limits that users face on accessing information via mobile applications coincide with a broader process of fragmentation of the Internet. Fragmentation restricts access to media content and tends to affect poorest users the most. Underlying these layers are the networking technologies that interconnect networks at their borders and exchange traffic across them. The Internet layer implements the Internet Protocol (IP) which enables computers to identify and locate each other by IP address, and route their traffic via intermediate (transit) networks. RFC 791, Internet Protocol, DARPA Internet Program Protocol Specification, Information Sciences Institute, Sept. 1981 The internet protocol layer code is independent of the type of network that it is physically running over. IPv4 Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. Updated by IPv4 is the initial version used on the first generation of the Internet and is still in dominant use. It was designed to address up to \u22484.3 billion (109) hosts. However, the explosive growth of the Internet has led to IPv4 address exhaustion, which entered its final stage in 2011, when the global IPv4 address allocation pool was exhausted. Routing Computers and routers use routing tables in their operating system to direct IP packets to reach a node on a different subnetwork. Routing tables are maintained by manual configuration or automatically by routing protocols. End-nodes typically use a default route that points toward an ISP providing transit, while ISP routers use the Border Gateway Protocol to establish the most efficient routing across the complex connections of the global Internet. The default gateway is the node that serves as the forwarding host (router) to other networks when no other route specification matches the destination IP address of a packet. \"Default Gateway\" , techopedia.com Communication Email is an important communications service available via the Internet. The concept of sending electronic text messages between parties, analogous to mailing letters or memos, predates the creation of the Internet. Ron Brown, Fax invades the mail market, New Scientist , Vol. 56, No. 817 (Oct., 26, 1972), pp. 218\u201321.Herbert P. Luckett, What's News: Electronic-mail delivery gets started, Popular Science , Vol. 202, No. 3 (March 1973); page 85 Pictures, documents, and other files are sent as email attachments. Email messages can be cc-ed to multiple email addresses. After English (27\\%), the most requested languages on the World Wide Web are Chinese (25\\%), Spanish (8\\%), Japanese (5\\%), Portuguese and German (4\\% each), Arabic, French and Russian (3\\% each), and Korean (2\\%). By region, 42\\% of the world's Internet users are based in Asia, 24\\% in Europe, 14\\% in North America, 10\\% in Latin America and the Caribbean taken together, 6\\% in Africa, 3\\% in the Middle East and 1\\% in Australia/Oceania. World Internet Usage Statistics News and Population Stats updated for 30 June 2010. Retrieved 20 February 2011. The Internet's technologies have developed enough in recent years, especially in the use of Unicode, that good facilities are available for development and communication in the world's widely used languages. However, some glitches such as mojibake (incorrect display of some languages' characters) still remain. Several neologisms exist that refer to Internet users: Netizen (as in \"citizen of the net\") refers to those actively involved in improving online communities, the Internet in general or surrounding political affairs and rights such as free speech,netizen , Dictionary. comThe Net and Netizens by Michael Hauben , Columbia University. Internaut refers to operators or technically highly capable users of the Internet, A Brief History of the Internet from the Internet Society digital citizen refers to a person using the Internet in order to engage in society, politics, and government participation. Mossberger, Karen. \"Digital Citizenship \u2013 The Internet, Society and Participation\" By Karen Mossberger, Caroline J. Tolbert, and Ramona S. McNeal. 23 November 2011. Educational material at all levels from pre-school to post-doctoral is available from websites. Examples range from CBeebies, through school and high-school revision guides and virtual universities, to access to top-end scholarly literature through the likes of Google Scholar. For distance education, help with homework and other assignments, self-guided learning, whiling away spare time or just looking up more detail on an interesting fact, it has never been easier for people to access educational information at any level from anywhere. The Internet in general and the World Wide Web in particular are important enablers of both formal and informal education. Further, the Internet allows universities, in particular, researchers from the social and behavioral sciences, to conduct research remotely via virtual laboratories, with profound changes in reach and generalizability of findings as well as in communication between scientists and in the publication of results. Reips, U.-D. (2008). How Internet-mediated research changes science. In A. Barak (Ed.), Psychological aspects of cyberspace: Theory, research, applications (pp. 268\u201394). Cambridge: Cambridge University Press. . Retrieved 22 July 2014. The Internet has been a major outlet for leisure activity since its inception, with entertaining social experiments such as MUDs and MOOs being conducted on university servers, and humor-related Usenet groups receiving much traffic. Many Internet forums have sections devoted to games and funny videos. The Internet pornography and online gambling industries have taken advantage of the World Wide Web. Although many governments have attempted to restrict both industries' use of the Internet, in general, this has failed to stop their widespread popularity. \"Do It Yourself! Amateur Porn Stars Make Bank\" , Russell Goldman, ABC News, 22 January 2008 Another area of leisure activity on the Internet is multiplayer gaming. \"Top Online Game Trends of the Decade\" , Dave Spohn, About.com, 15 December 2009 This form of recreation creates communities, where people of all ages and origins enjoy the fast-paced world of multiplayer games. These range from MMORPG to first-person shooters, from role-playing video games to online gambling. While online gaming has been around since the 1970s, modern modes of online gaming began with subscription services such as GameSpy and MPlayer. \"Internet Game Timeline: 1963 \u2013 2004\" , Dave Spohn, About.com, 2 June 2011 Non-subscribers were limited to certain types of game play or certain games. Many people use the Internet to access and download music, movies and other works for their enjoyment and relaxation. Free and fee-based services exist for all of these activities, using centralized servers and distributed peer-to-peer technologies. Some of these sources exercise more care with respect to the original artists' copyrights than others. Cybersectarianism is a new organizational form which involves: \"highly dispersed small groups of practitioners that may remain largely anonymous within the larger social context and operate in relative secrecy, while still linked remotely to a larger network of believers who share a set of practices and texts, and often a common devotion to a particular leader. Overseas supporters provide funding and support; domestic practitioners distribute tracts, participate in acts of resistance, and share information on the internal situation with outsiders. Collectively, members and practitioners of such sects construct viable virtual communities of faith, exchanging personal testimonies and engaging in the collective study via email, on-line chat rooms, and web-based message boards.\" Patricia M. Thornton, \"The New Cybersects: Resistance and Repression in the Reform era. \" In Elizabeth Perry and Mark Selden, eds., Chinese Society: Change, Conflict and Resistance (second edition) (London and New York: Routledge, 2003), pp. 149\u201350. In particular, the British government has raised concerns about the prospect of young British Muslims being indoctrinated into Islamic extremism by material on the Internet, being persuaded to join terrorist groups such as the so-called \"Islamic State\", and then potentially committing acts of terrorism on returning to Britain after fighting in Syria or Iraq. Electronic business Electronic business (e-business) encompasses business processes spanning the entire value chain: purchasing, supply chain management, marketing, sales, customer service, and business relationship. E-commerce seeks to add revenue streams using the Internet to build and enhance relationships with clients and partners. According to International Data Corporation, the size of worldwide e-commerce, when global business-to-business and -consumer transactions are combined, equate to $16 trillion for 2013. A report by Oxford Economics added those two together to estimate the total size of the digital economy at $20.4 trillion, equivalent to roughly 13.8\\% of global sales. \"The New Digital Economy: How it will transform business\" , Oxford Economics, 2 July 2011 While much has been written of the economic advantages of Internet-enabled commerce, there is also evidence that some aspects of the Internet such as maps and location-aware services may serve to reinforce economic inequality and the digital divide. Electronic commerce may be responsible for consolidation and the decline of mom-and-pop, brick and mortar businesses resulting in increases in income inequality. \"E-commerce will make the shopping mall a retail wasteland\" ZDNet, 17 January 2013\"\u2018Free Shipping Day\u2019 Promotion Spurs Late-Season Online Spending Surge, Improving Season-to-Date Growth Rate to 16 Percent vs. Year Ago\" Comscore, 23 December 2012\"The Death of the American Shopping Mall\" The Atlantic \u2013 Cities, 26 December 2012 Author Andrew Keen, a long-time critic of the social transformations caused by the Internet, has focused on the economic effects of consolidation from Internet businesses. Keen cites a 2013 Institute for Local Self-Reliance report saying brick-and-mortar retailers employ 47 people for every $10 million in sales while Amazon employs only 14. Similarly, the 700-employee room rental start-up Airbnb was valued at $10 billion in 2014, about half as much as Hilton Worldwide, which employs 152,000 people. At that time, Uber employed 1,000 full-time employees and was valued at $18.2 billion, about the same valuation as Avis Rent a Car and The Hertz Corporation combined, which together employed almost 60,000 people. Telecommuting Telecommuting is the performance within a traditional worker and employer relationship when it is facilitated by tools such as groupware, virtual private networks, conference calling, videoconferencing, and VoIP so that work may be performed from any location, most conveniently the worker's home. It can be efficient and useful for companies as it allows workers to communicate over long distances, saving significant amounts of travel time and cost. As broadband Internet connections become commonplace, more workers have adequate bandwidth at home to use these tools to link their home to their corporate intranet and internal communication networks. Collaborative publishing Wikis have also been used in the academic community for sharing and dissemination of information across institutional and international boundaries. In those settings, they have been found useful for collaboration on grant writing, strategic planning, departmental documentation, and committee work. The United States Patent and Trademark Office uses a wiki to allow the public to collaborate on finding prior art relevant to examination of pending patent applications. Queens, New York has used a wiki to allow citizens to collaborate on the design and planning of a local park. The English Wikipedia has the largest user base among wikis on the World Wide Web and ranks in the top 10 among all Web sites in terms of traffic. Politics and political revolutions Banner in Bangkok during the 2014 Thai coup d'\u00e9tat, informing the Thai public that 'like' or 'share' activities on social media could result in imprisonment (observed 30 June 2014). The Internet has achieved new relevance as a political tool. The presidential campaign of Howard Dean in 2004 in the United States was notable for its success in soliciting donation via the Internet. Many political groups use the Internet to achieve a new method of organizing for carrying out their mission, having given rise to Internet activism, most notably practiced by rebels in the Arab Spring.The Role of the Internet in Democratic Transition: Case Study of the Arab Spring , Davit Chokoshvili, Master's Thesis, June 2011 The New York Times suggested that social media websites, such as Facebook and Twitter, helped people organize the political revolutions in Egypt, by helping activists organize protests, communicate grievances, and disseminate information. Many have understood the Internet as an extension of the Habermasian notion of the public sphere, observing how network communication technologies provide something like a global civic forum. However, incidents of politically motivated Internet censorship have now been recorded in many countries, including western democracies. Philanthropy The spread of low-cost Internet access in developing countries has opened up new possibilities for peer-to-peer charities, which allow individuals to contribute small amounts to charitable projects for other individuals. Websites, such as DonorsChoose and GlobalGiving, allow small-scale donors to direct funds to individual projects of their choice. A popular twist on Internet-based philanthropy is the use of peer-to-peer lending for charitable purposes. Kiva pioneered this concept in 2005, offering the first web-based service to publish individual loan profiles for funding. Kiva raises funds for local intermediary microfinance organizations that post stories and updates on behalf of the borrowers. Lenders can contribute as little as $ 25 to loans of their choice, and receive their money back as borrowers repay. Kiva falls short of being a pure peer-to-peer charity, in that loans are disbursed before being funded by lenders and borrowers do not communicate with lenders themselves. Kiva Is Not Quite What It Seems , by David Roodman, Center for Global Development, 2 October 2009, as accessed 2 16 January 2010 The large amount of data gathered from packet capturing requires surveillance software that filters and reports relevant information, such as the use of certain words or phrases, the access of certain types of web sites, or communicating via email or chat with certain parties. Agencies, such as the Information Awareness Office, NSA, GCHQ and the FBI, spend billions of dollars per year to develop, purchase, implement, and operate systems for interception and analysis of data. Similar systems are operated by Iranian secret police to identify and suppress dissidents. The required hardware and software was allegedly installed by German Siemens AG and Finnish Nokia. \"First round in Internet war goes to Iranian intelligence\", Debkafile, 28 June 2009. upright=1.8|Internet censorship and surveillance by country (2018)OpenNet Initiative \"Summarized global Internet filtering data spreadsheet\" , 8 November 2011 and \"Country Profiles\" , the OpenNet Initiative is a collaborative partnership of the Citizen Lab at the Munk School of Global Affairs, University of Toronto; the Berkman Center for Internet & Society at Harvard University; and the SecDev Group, OttawaDue to legal concerns the OpenNet Initiative does not check for filtering of child pornography and because their classifications focus on technical filtering, they do not include other types of censorship. \"Internet Enemies\", Enemies of the Internet 2014: Entities at the heart of censorship and surveillance, Reporters Without Borders (Paris), 11 March 2014. Retrieved 24 June 2014.Internet Enemies, Reporters Without Borders (Paris), 12 March 2012 Some governments, such as those of Burma, Iran, North Korea, Mainland China, Saudi Arabia and the United Arab Emirates, restrict access to content on the Internet within their territories, especially to political and religious content, with domain name and keyword filters. Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace , Ronald J. Deibert, John G. Palfrey, Rafal Rohozinski, and Jonathan Zittrain (eds), MIT Press, April 2010, In 2011, academic researchers estimated the overall energy used by the Internet to be between 170 and 307 GW, less than two percent of the energy used by humanity. This estimate included the energy needed to build, operate, and periodically replace the estimated 750 million laptops, a billion smart phones and 100 million servers worldwide as well as the energy that routers, cell towers, optical switches, Wi-Fi transmitters and cloud storage devices use when transmitting Internet traffic. Jim Giles, \"Internet responsible for 2 per cent of global energy usage\". New Scientist (Reed Business Information Ltd.), 26 October 2011. , \"The Energy and Emergy of the Internet\" , Barath Raghavan (ICSI) and Justin Ma (UC Berkeley), in Proceedings of the 10th ACM Workshop on Hot Topics in Networks, 14\u201315 November 2011, Cambridge, MA. ACM SIGCOMM. According to a non-peer reviewed study published in 2018 by The Shift Project (a French think tank funded by corporate sponsors), nearly 4\\% of global CO2 emissions could be attributed to global data transfer and the necessary infrastructure. The study also said that online video streaming alone accounted for 60\\% of this data transfer and therefore contributed to over 300 million tons of CO2 emission per year, and argued for new \"digital sobriety\" regulations restricting the use and size of video files.", "after_revision": "The origins of the Internet date back to the development of packet switching and research commissioned by the United States Department of Defense in the 1960s to enable time-sharing of computers. The primary precursor network, the ARPANET, initially served as a backbone for interconnection of regional academic and military networks in the 1970s. The funding of the National Science Foundation Network as a new backbone in the 1980s, as well as private funding for other commercial extensions, led to worldwide participation in the development of new networking technologies, and the merger of many networks. The linking of commercial networks and enterprises by the early 1990s marked the beginning of the transition to the modern Internet,\"#3 1982: the ARPANET community grows\" in 40 maps that explain the internet , Timothy B. Lee, Vox Conversations, 2 June 2014. Retrieved 27 June 2014. and generated a sustained exponential growth as generations of institutional, personal, and mobile computers were connected to the network. Although the Internet was widely used by academia in the 1980s, commercialization incorporated its services and technologies into virtually every aspect of modern life. The Internet has no single centralized governance in either technological implementation or policies for access and usage; each constituent network sets its own policies. The overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address (IP address) space and the Domain Name System (DNS), are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise. In November 2006, the Internet was included on USA Today's list of New Seven Wonders. The word internetted was used as early as 1849, meaning interconnected or interwoven. nineteenth-century use as an adjective. The word Internet was used in 1974 as the shorthand form of Internetwork. Today, the term Internet most commonly refers to the global system of interconnected computer networks, though it may also refer to any group of smaller networks. In the 1960s, the Advanced Research Projects Agency (ARPA) of the United States Department of Defense funded research into time-sharing of computers. Research into packet switching, one of the fundamental Internet technologies, started in the work of Paul Baran in the early 1960s and, independently, Donald Davies in 1965.; After the Symposium on Operating Systems Principles in 1967, packet switching from the proposed NPL network was incorporated into the design for the ARPANET and other resource sharing networks such as the Merit Network and CYCLADES, which were developed in the late 1960s and early 1970s. ARPANET development began with two network nodes which were interconnected between the Network Measurement Center at the University of California, Los Angeles (UCLA) Henry Samueli School of Engineering and Applied Science directed by Leonard Kleinrock, and the NLS system at SRI International (SRI) by Douglas Engelbart in Menlo Park, California, on 29 October 1969. The third site was the Culler-Fried Interactive Mathematics Center at the University of California, Santa Barbara, followed by the University of Utah Graphics Department. In a sign of future growth, 15 sites were connected to the young ARPANET by the end of 1971. These early years were documented in the 1972 film Computer Networks: The Heralds of Resource Sharing. Early international collaborations for the ARPANET were rare. Connections were made in 1973 to the Norwegian Seismic Array (NORSAR) via a satellite station in Tanum, Sweden, and to Peter Kirstein's research group at University College London which provided a gateway to British academic networks.; The ARPA projects and international working groups led to the development of various protocols and standards by which multiple separate networks could become a single network or \"a network of networks\". In 1974, Vint Cerf and Bob Kahn used the term internet as a shorthand for internetwork in , and later RFCs repeated this use. Cerf and Khan credit Louis Pouzin with important influences on TCP/IP design. Commercial PTT providers were concerned with developing X.25 public data networks. Access to the ARPANET was expanded in 1981 when the National Science Foundation (NSF) funded the Computer Science Network (CSNET). In 1982, the Internet Protocol Suite (TCP/IP) was standardized, which permitted worldwide proliferation of interconnected networks. TCP/IP network access expanded again in 1986 when the National Science Foundation Network (NSFNet) provided access to supercomputer sites in the United States for researchers, first at speeds of 56 kbit/s and later at 1.5 Mbit/s and 45 Mbit/s. The NSFNet expanded into academic and research organizations in Europe, Australia, New Zealand and Japan in 1988\u201389.R\u00e9seaux IP Europ\u00e9ens (RIPE) Although other network protocols such as UUCP had global reach well before this time, this marked the beginning of the Internet as an intercontinental network. Commercial Internet service providers (ISPs) emerged in 1989 in the United States and Australia. The ARPANET was decommissioned in 1990. Since 1995, the Internet has tremendously impacted culture and commerce, including the rise of near instant communication by email, instant messaging, telephony (Voice over Internet Protocol or VoIP), two-way interactive video calls, and the World Wide Web with its discussion forums, blogs, social networking services, and online shopping sites. Increasing amounts of data are transmitted at higher and higher speeds over fiber optic networks operating at 1-Gbit/s, 10-Gbit/s, or more. The Internet continues to grow, driven by ever greater amounts of online information and knowledge, commerce, entertainment and social networking services. During the late 1990s, it was estimated that traffic on the public Internet grew by 100 percent per year, while the mean annual growth in the number of Internet users was thought to be between 20\\% and 50\\%. This growth is often attributed to the lack of central administration, which allows organic growth of the network, as well as the non-proprietary nature of the Internet protocols, which encourages vendor interoperability and prevents any one company from exerting too much control over the network. , the estimated total number of Internet users was 2.095 billion (30.2\\% of world population). It is estimated that in 1993 the Internet carried only 1\\% of the information flowing through two-way telecommunication. By 2000 this figure had grown to 51\\%, and by 2007 more than 97\\% of all telecommunicated information was carried over the Internet. The Internet is a global network that comprises many voluntarily interconnected autonomous networks. It operates without a central governing body. The technical underpinning and standardization of the core protocols (IPv4 and IPv6) is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise. To maintain interoperability, the principal name spaces of the Internet are administered by the Internet Corporation for Assigned Names and Numbers (ICANN). ICANN is governed by an international board of directors drawn from across the Internet technical, business, academic, and other non-commercial communities. ICANN coordinates the assignment of unique identifiers for use on the Internet, including domain names, IP addresses, application port numbers in the transport protocols, and many other parameters. Globally unified name spaces are essential for maintaining the global reach of the Internet. This role of ICANN distinguishes it as perhaps the only central coordinating body for the global Internet. The National Telecommunications and Information Administration, an agency of the United States Department of Commerce, had final approval over changes to the DNS root zone until the IANA stewardship transition on 1 October 2016. The Internet Society (ISOC) was founded in 1992 with a mission to \"assure the open development, evolution and use of the Internet for the benefit of all people throughout the world\". Its members include individuals (anyone may join) as well as corporations, organizations, governments, and universities. Among other activities ISOC provides an administrative home for a number of less formally organized groups that are involved in developing and managing the Internet, including: the IETF, Internet Architecture Board (IAB), Internet Engineering Steering Group (IESG), Internet Research Task Force (IRTF), and Internet Research Steering Group (IRSG). On 16 November 2005, the United Nations-sponsored World Summit on the Information Society in Tunis established the Internet Governance Forum (IGF) to discuss Internet-related issues. Grassroots efforts have led to wireless community networks. Commercial Wi-Fi services that cover large areas are available in many cities, such as New York, London, Vienna, Toronto, San Francisco, Philadelphia, Chicago and Pittsburgh, where the Internet can then be accessed from places such as a park bench. Experiments have also been conducted with proprietary mobile wireless networks like Ricochet, various high-speed data services over cellular networks, and fixed wireless services. Modern smartphones can also access the Internet through the cellular carrier network. For Web browsing, these devices provide applications such as Google Chrome, Safari, and Firefox and a wide variety of other Internet software may be installed from app-stores. Internet usage by mobile and tablet devices exceeded desktop worldwide for the first time in October 2016. Mobile communication 215x215px|Number of mobile cellular subscriptions 2012\u20132016, World Trends in Freedom of Expression and Media Development Global Report 2017/2018 The International Telecommunication Union (ITU) estimated that, by the end of 2017, 48\\% of individual users regularly connect to the Internet, up from 34\\% in 2012. Mobile Internet connectivity has played an important role in expanding access in recent years especially in Asia and the Pacific and in Africa. The number of unique mobile cellular subscriptions increased from 3.89 billion in 2012 to 4.83 billion in 2016, two-thirds of the world's population, with more than half of subscriptions located in Asia and the Pacific. The number of subscriptions is predicted to rise to 5.69 billion users in 2020. , almost 60\\% of the world's population had access to a 4G broadband cellular network, up from almost 50\\% in 2015 and 11\\% in 2012. The limits that users face on accessing information via mobile applications coincide with a broader process of fragmentation of the Internet. Fragmentation restricts access to media content and tends to affect poorest users the most. Underlying these layers are the networking technologies that interconnect networks at their borders and exchange traffic across them. The Internet layer implements the Internet Protocol (IP) which enables computers to identify and locate each other by IP address, and route their traffic via intermediate (transit) networks. Updated by The internet protocol layer code is independent of the type of network that it is physically running over. IPv4 Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. IPv4 is the initial version used on the first generation of the Internet and is still in dominant use. It was designed to address up to \u22484.3 billion (109) hosts. However, the explosive growth of the Internet has led to IPv4 address exhaustion, which entered its final stage in 2011, when the global IPv4 address allocation pool was exhausted. Routing Computers and routers use routing tables in their operating system to direct IP packets to reach a node on a different subnetwork. Routing tables are maintained by manual configuration or automatically by routing protocols. End-nodes typically use a default route that points toward an ISP providing transit, while ISP routers use the Border Gateway Protocol to establish the most efficient routing across the complex connections of the global Internet. The default gateway is the node that serves as the forwarding host (router) to other networks when no other route specification matches the destination IP address of a packet. Communication Email is an important communications service available via the Internet. The concept of sending electronic text messages between parties, analogous to mailing letters or memos, predates the creation of the Internet. Pictures, documents, and other files are sent as email attachments. Email messages can be cc-ed to multiple email addresses. After English (27\\%), the most requested languages on the World Wide Web are Chinese (25\\%), Spanish (8\\%), Japanese (5\\%), Portuguese and German (4\\% each), Arabic, French and Russian (3\\% each), and Korean (2\\%). By region, 42\\% of the world's Internet users are based in Asia, 24\\% in Europe, 14\\% in North America, 10\\% in Latin America and the Caribbean taken together, 6\\% in Africa, 3\\% in the Middle East and 1\\% in Australia/Oceania. The Internet's technologies have developed enough in recent years, especially in the use of Unicode, that good facilities are available for development and communication in the world's widely used languages. However, some glitches such as mojibake (incorrect display of some languages' characters) still remain. Several neologisms exist that refer to Internet users: Netizen (as in \"citizen of the net\") refers to those actively involved in improving online communities, the Internet in general or surrounding political affairs and rights such as free speech,netizen , Dictionary. com Internaut refers to operators or technically highly capable users of the Internet, digital citizen refers to a person using the Internet in order to engage in society, politics, and government participation. Educational material at all levels from pre-school to post-doctoral is available from websites. Examples range from CBeebies, through school and high-school revision guides and virtual universities, to access to top-end scholarly literature through the likes of Google Scholar. For distance education, help with homework and other assignments, self-guided learning, whiling away spare time or just looking up more detail on an interesting fact, it has never been easier for people to access educational information at any level from anywhere. The Internet in general and the World Wide Web in particular are important enablers of both formal and informal education. Further, the Internet allows universities, in particular, researchers from the social and behavioral sciences, to conduct research remotely via virtual laboratories, with profound changes in reach and generalizability of findings as well as in communication between scientists and in the publication of results. The Internet has been a major outlet for leisure activity since its inception, with entertaining social experiments such as MUDs and MOOs being conducted on university servers, and humor-related Usenet groups receiving much traffic. Many Internet forums have sections devoted to games and funny videos. The Internet pornography and online gambling industries have taken advantage of the World Wide Web. Although many governments have attempted to restrict both industries' use of the Internet, in general, this has failed to stop their widespread popularity. cite URL It Yourself! Amateur Porn Stars Make Bank\" , Russell Goldman, ABC News, 22 January 2008 Another area of leisure activity on the Internet is multiplayer gaming. This form of recreation creates communities, where people of all ages and origins enjoy the fast-paced world of multiplayer games. These range from MMORPG to first-person shooters, from role-playing video games to online gambling. While online gaming has been around since the 1970s, modern modes of online gaming began with subscription services such as GameSpy and MPlayer. Non-subscribers were limited to certain types of game play or certain games. Many people use the Internet to access and download music, movies and other works for their enjoyment and relaxation. Free and fee-based services exist for all of these activities, using centralized servers and distributed peer-to-peer technologies. Some of these sources exercise more care with respect to the original artists' copyrights than others. Cybersectarianism is a new organizational form which involves: \"highly dispersed small groups of practitioners that may remain largely anonymous within the larger social context and operate in relative secrecy, while still linked remotely to a larger network of believers who share a set of practices and texts, and often a common devotion to a particular leader. Overseas supporters provide funding and support; domestic practitioners distribute tracts, participate in acts of resistance, and share information on the internal situation with outsiders. Collectively, members and practitioners of such sects construct viable virtual communities of faith, exchanging personal testimonies and engaging in the collective study via email, on-line chat rooms, and web-based message boards.\" In particular, the British government has raised concerns about the prospect of young British Muslims being indoctrinated into Islamic extremism by material on the Internet, being persuaded to join terrorist groups such as the so-called \"Islamic State\", and then potentially committing acts of terrorism on returning to Britain after fighting in Syria or Iraq. Electronic business Electronic business (e-business) encompasses business processes spanning the entire value chain: purchasing, supply chain management, marketing, sales, customer service, and business relationship. E-commerce seeks to add revenue streams using the Internet to build and enhance relationships with clients and partners. According to International Data Corporation, the size of worldwide e-commerce, when global business-to-business and -consumer transactions are combined, equate to $16 trillion for 2013. A report by Oxford Economics added those two together to estimate the total size of the digital economy at $20.4 trillion, equivalent to roughly 13.8\\% of global sales. While much has been written of the economic advantages of Internet-enabled commerce, there is also evidence that some aspects of the Internet such as maps and location-aware services may serve to reinforce economic inequality and the digital divide. Electronic commerce may be responsible for consolidation and the decline of mom-and-pop, brick and mortar businesses resulting in increases in income inequality. Author Andrew Keen, a long-time critic of the social transformations caused by the Internet, has focused on the economic effects of consolidation from Internet businesses. Keen cites a 2013 Institute for Local Self-Reliance report saying brick-and-mortar retailers employ 47 people for every $10 million in sales while Amazon employs only 14. Similarly, the 700-employee room rental start-up Airbnb was valued at $10 billion in 2014, about half as much as Hilton Worldwide, which employs 152,000 people. At that time, Uber employed 1,000 full-time employees and was valued at $18.2 billion, about the same valuation as Avis Rent a Car and The Hertz Corporation combined, which together employed almost 60,000 people. Telecommuting Telecommuting is the performance within a traditional worker and employer relationship when it is facilitated by tools such as groupware, virtual private networks, conference calling, videoconferencing, and VoIP so that work may be performed from any location, most conveniently the worker's home. It can be efficient and useful for companies as it allows workers to communicate over long distances, saving significant amounts of travel time and cost. As broadband Internet connections become commonplace, more workers have adequate bandwidth at home to use these tools to link their home to their corporate intranet and internal communication networks. Collaborative publishing Wikis have also been used in the academic community for sharing and dissemination of information across institutional and international boundaries. In those settings, they have been found useful for collaboration on grant writing, strategic planning, departmental documentation, and committee work. The United States Patent and Trademark Office uses a wiki to allow the public to collaborate on finding prior art relevant to examination of pending patent applications. Queens, New York has used a wiki to allow citizens to collaborate on the design and planning of a local park. The English Wikipedia has the largest user base among wikis on the World Wide Web and ranks in the top 10 among all Web sites in terms of traffic. Politics and political revolutions Banner in Bangkok during the 2014 Thai coup d'\u00e9tat, informing the Thai public that 'like' or 'share' activities on social media could result in imprisonment (observed 30 June 2014). The Internet has achieved new relevance as a political tool. The presidential campaign of Howard Dean in 2004 in the United States was notable for its success in soliciting donation via the Internet. Many political groups use the Internet to achieve a new method of organizing for carrying out their mission, having given rise to Internet activism, most notably practiced by rebels in the Arab Spring., Davit Chokoshvili, Master's Thesis, June 2011 The New York Times suggested that social media websites, such as Facebook and Twitter, helped people organize the political revolutions in Egypt, by helping activists organize protests, communicate grievances, and disseminate information. Many have understood the Internet as an extension of the Habermasian notion of the public sphere, observing how network communication technologies provide something like a global civic forum. However, incidents of politically motivated Internet censorship have now been recorded in many countries, including western democracies. Philanthropy The spread of low-cost Internet access in developing countries has opened up new possibilities for peer-to-peer charities, which allow individuals to contribute small amounts to charitable projects for other individuals. Websites, such as DonorsChoose and GlobalGiving, allow small-scale donors to direct funds to individual projects of their choice. A popular twist on Internet-based philanthropy is the use of peer-to-peer lending for charitable purposes. Kiva pioneered this concept in 2005, offering the first web-based service to publish individual loan profiles for funding. Kiva raises funds for local intermediary microfinance organizations that post stories and updates on behalf of the borrowers. Lenders can contribute as little as $ 25 to loans of their choice, and receive their money back as borrowers repay. Kiva falls short of being a pure peer-to-peer charity, in that loans are disbursed before being funded by lenders and borrowers do not communicate with lenders themselves. The large amount of data gathered from packet capturing requires surveillance software that filters and reports relevant information, such as the use of certain words or phrases, the access of certain types of web sites, or communicating via email or chat with certain parties. Agencies, such as the Information Awareness Office, NSA, GCHQ and the FBI, spend billions of dollars per year to develop, purchase, implement, and operate systems for interception and analysis of data. Similar systems are operated by Iranian secret police to identify and suppress dissidents. The required hardware and software was allegedly installed by German Siemens AG and Finnish Nokia. upright=1.8|Internet censorship and surveillance by country (2018)OpenNet Initiative \"Summarized global Internet filtering data spreadsheet\" , 8 November 2011 and \"Country Profiles\" , the OpenNet Initiative is a collaborative partnership of the Citizen Lab at the Munk School of Global Affairs, University of Toronto; the Berkman Center for Internet & Society at Harvard University; and the SecDev Group, OttawaDue to legal concerns the OpenNet Initiative does not check for filtering of child pornography and because their classifications focus on technical filtering, they do not include other types of censorship. Some governments, such as those of Burma, Iran, North Korea, Mainland China, Saudi Arabia and the United Arab Emirates, restrict access to content on the Internet within their territories, especially to political and religious content, with domain name and keyword filters. In 2011, academic researchers estimated the overall energy used by the Internet to be between 170 and 307 GW, less than two percent of the energy used by humanity. This estimate included the energy needed to build, operate, and periodically replace the estimated 750 million laptops, a billion smart phones and 100 million servers worldwide as well as the energy that routers, cell towers, optical switches, Wi-Fi transmitters and cloud storage devices use when transmitting Internet traffic. , According to a non-peer reviewed study published in 2018 by The Shift Project (a French think tank funded by corporate sponsors), nearly 4\\% of global CO2 emissions could be attributed to global data transfer and the necessary infrastructure. The study also said that online video streaming alone accounted for 60\\% of this data transfer and therefore contributed to over 300 million tons of CO2 emission per year, and argued for new \"digital sobriety\" regulations restricting the use and size of video files.", "edit_actions": [{"type": "D", "before": "\"Internet History \u2013 One Page Summary\" , The Living Internet, Bill Stewart (ed), January 2000.", "after": null, "start_char_pos": 610, "end_char_pos": 703}, {"type": "D", "before": "\"Who owns the Internet?\" , Jonathan Strickland, How Stuff Works. Retrieved 27 June 2014.", "after": null, "start_char_pos": 1466, "end_char_pos": 1554}, {"type": "D", "before": "\"The Tao of IETF: A Novice's Guide to Internet Engineering Task Force\", P. Hoffman and S. Harris, , September 2006.", "after": null, "start_char_pos": 2099, "end_char_pos": 2214}, {"type": "D", "before": "Cerf, Vinton; Dalal, Yogen; Sunshine, Carl (December 1974), , Specification of Internet Transmission Control Protocol", "after": null, "start_char_pos": 2501, "end_char_pos": 2618}, {"type": "D", "before": "\"So, who really did invent the Internet?\" , Ian Peter, The Internet History Project, 2004. Retrieved 27 June 2014.", "after": null, "start_char_pos": 2932, "end_char_pos": 3046}, {"type": "D", "before": "\"Roads and Crossroads of Internet History\" by Gregory Gromov. 1995", "after": null, "start_char_pos": 3878, "end_char_pos": 3944}, {"type": "D", "before": "\"Brief History of the Internet: The Initial Internetting Concepts\" , Barry M. Leiner, et al., Internet Society. Retrieved 27 June 2014.", "after": null, "start_char_pos": 4813, "end_char_pos": 4948}, {"type": "D", "before": ", Vinton Cerf, Yogen Dalal, Carl Sunshine, Specification of Internet Transmission Control Program (December 1974)", "after": null, "start_char_pos": 5041, "end_char_pos": 5154}, {"type": "D", "before": "NSFNET: A Partnership for High-Speed Networking, Final Report 1987\u20131995, Karen D. Frazer, Merit Network, Inc., 1995", "after": null, "start_char_pos": 5857, "end_char_pos": 5972}, {"type": "R", "before": "WebHow the web went world wide , Mark Ward, Technology Correspondent, BBC News. Retrieved 24 January 2011.", "after": "Web", "start_char_pos": 6667, "end_char_pos": 6773}, {"type": "D", "before": "Klein, Hans. (2004). \"ICANN and Non-Territorial Sovereignty: Government Without the Nation State.\" Internet and Public Policy Project. Georgia Institute of Technology.", "after": null, "start_char_pos": 9165, "end_char_pos": 9332}, {"type": "D", "before": "\"Bush administration annexes internet\" , Kieren McCarthy, The Register, 1 July 2005", "after": null, "start_char_pos": 9562, "end_char_pos": 9645}, {"type": "D", "before": "\"StatCounter Global Stats finds that mobile and tablet devices accounted for 51.3\\% of Internet usage worldwide in October compared to 48.7\\% by desktop.\" , StatCounter: Global Stats, Press Release, 1 November 2016.", "after": null, "start_char_pos": 11339, "end_char_pos": 11554}, {"type": "D", "before": "World Telecommunication/ICT Indicators Database 2020 (24th Edition/July 2020) ; International Telecommunication Union (ITU), 2017a, Key ICT indicators for developed and developing countries and the world (totals and penetration rates). World Telecommunication/ICT Indicators database", "after": null, "start_char_pos": 11887, "end_char_pos": 12170}, {"type": "R", "before": "RFC 791, Internet Protocol, DARPA Internet Program Protocol Specification, Information Sciences Institute, Sept. 1981", "after": "Updated by", "start_char_pos": 13307, "end_char_pos": 13424}, {"type": "D", "before": "Updated by", "after": null, "start_char_pos": 13614, "end_char_pos": 13624}, {"type": "D", "before": "\"Default Gateway\" , techopedia.com", "after": null, "start_char_pos": 14606, "end_char_pos": 14640}, {"type": "D", "before": "Ron Brown, Fax invades the mail market, New Scientist , Vol. 56, No. 817 (Oct., 26, 1972), pp. 218\u201321.Herbert P. Luckett, What's News: Electronic-mail delivery gets started, Popular Science , Vol. 202, No. 3 (March 1973); page 85", "after": null, "start_char_pos": 14871, "end_char_pos": 15100}, {"type": "D", "before": "World Internet Usage Statistics News and Population Stats updated for 30 June 2010. Retrieved 20 February 2011.", "after": null, "start_char_pos": 15669, "end_char_pos": 15780}, {"type": "R", "before": "comThe Net and Netizens by Michael Hauben , Columbia University.", "after": "com", "start_char_pos": 16362, "end_char_pos": 16426}, {"type": "D", "before": "A Brief History of the Internet from the Internet Society", "after": null, "start_char_pos": 16510, "end_char_pos": 16567}, {"type": "D", "before": "Mossberger, Karen. \"Digital Citizenship \u2013 The Internet, Society and Participation\" By Karen Mossberger, Caroline J. Tolbert, and Ramona S. McNeal. 23 November 2011.", "after": null, "start_char_pos": 16693, "end_char_pos": 16857}, {"type": "D", "before": "Reips, U.-D. (2008). How Internet-mediated research changes science. In A. Barak (Ed.), Psychological aspects of cyberspace: Theory, research, applications (pp. 268\u201394). Cambridge: Cambridge University Press. . Retrieved 22 July 2014.", "after": null, "start_char_pos": 17836, "end_char_pos": 18070}, {"type": "R", "before": "\"Do", "after": "cite URL", "start_char_pos": 18630, "end_char_pos": 18633}, {"type": "D", "before": "\"Top Online Game Trends of the Decade\" , Dave Spohn, About.com, 15 December 2009", "after": null, "start_char_pos": 18794, "end_char_pos": 18874}, {"type": "D", "before": "\"Internet Game Timeline: 1963 \u2013 2004\" , Dave Spohn, About.com, 2 June 2011", "after": null, "start_char_pos": 19251, "end_char_pos": 19325}, {"type": "D", "before": "Patricia M. Thornton, \"The New Cybersects: Resistance and Repression in the Reform era. \" In Elizabeth Perry and Mark Selden, eds., Chinese Society: Change, Conflict and Resistance (second edition) (London and New York: Routledge, 2003), pp. 149\u201350.", "after": null, "start_char_pos": 20542, "end_char_pos": 20791}, {"type": "D", "before": "\"The New Digital Economy: How it will transform business\" , Oxford Economics, 2 July 2011", "after": null, "start_char_pos": 21846, "end_char_pos": 21935}, {"type": "D", "before": "\"E-commerce will make the shopping mall a retail wasteland\" ZDNet, 17 January 2013\"\u2018Free Shipping Day\u2019 Promotion Spurs Late-Season Online Spending Surge, Improving Season-to-Date Growth Rate to 16 Percent vs. Year Ago\" Comscore, 23 December 2012\"The Death of the American Shopping Mall\" The Atlantic \u2013 Cities, 26 December 2012", "after": null, "start_char_pos": 22348, "end_char_pos": 22674}, {"type": "R", "before": "$18.2 billion, about the same valuation as Avis Rent a Car and The Hertz Corporation combined, which together employed almost 60,000 people. Telecommuting Telecommuting is the performance within a traditional worker and employer relationship when it is facilitated by tools such as groupware, virtual private networks, conference calling, videoconferencing, and VoIP so that work may be performed from any location, most conveniently the worker's home. It can be efficient and useful for companies as it allows workers to communicate over long distances, saving significant amounts of travel time and cost. As broadband Internet connections become commonplace, more workers have adequate bandwidth at home to use these tools to link their home to their corporate intranet and internal communication networks. Collaborative publishing Wikis have also been used in the academic community for sharing and dissemination of information across institutional and international boundaries. In those settings, they have been found useful for collaboration on grant writing, strategic planning, departmental documentation, and committee work. The United States Patent and Trademark Office uses a wiki to allow the public to collaborate on finding prior art relevant to examination of pending patent applications. Queens, New York has used a wiki to allow citizens to collaborate on the design and planning of a local park. The English Wikipedia has the largest user base among wikis on the World Wide Web and ranks in the top 10 among all Web sites in terms of traffic. Politics and political revolutions Banner in Bangkok during the 2014 Thai coup d'\u00e9tat, informing the Thai public that 'like' or 'share' activities on social media could result in imprisonment (observed 30 June 2014). The Internet has achieved new relevance as a political tool. The presidential campaign of Howard Dean in 2004 in the United States was notable for its success in soliciting donation via the Internet. Many political groups use the Internet to achieve a new method of organizing for carrying out their mission, having given rise to Internet activism, most notably practiced by rebels in the Arab Spring.The Role of the Internet in Democratic Transition: Case Study of the Arab Spring , Davit Chokoshvili, Master's Thesis, June 2011 The New York Times suggested that social media websites, such as Facebook and Twitter, helped people organize the political revolutions in Egypt, by helping activists organize protests, communicate grievances, and disseminate information. Many have understood the Internet as an extension of the Habermasian notion of the public sphere, observing how network communication technologies provide something like a global civic forum. However, incidents of politically motivated Internet censorship have now been recorded in many countries, including western democracies. Philanthropy The spread of low-cost Internet access in developing countries has opened up new possibilities for peer-to-peer charities, which allow individuals to contribute small amounts to charitable projects for other individuals. Websites, such as DonorsChoose and GlobalGiving, allow small-scale donors to direct funds to individual projects of their choice. A popular twist on Internet-based philanthropy is the use of peer-to-peer lending for charitable purposes. Kiva pioneered this concept in 2005, offering the first web-based service to publish individual loan profiles for funding. Kiva raises funds for local intermediary microfinance organizations that post stories and updates on behalf of the borrowers. Lenders can contribute as little as $", "after": "$18.2 billion, about the same valuation as Avis Rent a Car and The Hertz Corporation combined, which together employed almost 60,000 people. Telecommuting Telecommuting is the performance within a traditional worker and employer relationship when it is facilitated by tools such as groupware, virtual private networks, conference calling, videoconferencing, and VoIP so that work may be performed from any location, most conveniently the worker's home. It can be efficient and useful for companies as it allows workers to communicate over long distances, saving significant amounts of travel time and cost. As broadband Internet connections become commonplace, more workers have adequate bandwidth at home to use these tools to link their home to their corporate intranet and internal communication networks. Collaborative publishing Wikis have also been used in the academic community for sharing and dissemination of information across institutional and international boundaries. In those settings, they have been found useful for collaboration on grant writing, strategic planning, departmental documentation, and committee work. The United States Patent and Trademark Office uses a wiki to allow the public to collaborate on finding prior art relevant to examination of pending patent applications. Queens, New York has used a wiki to allow citizens to collaborate on the design and planning of a local park. The English Wikipedia has the largest user base among wikis on the World Wide Web and ranks in the top 10 among all Web sites in terms of traffic. Politics and political revolutions Banner in Bangkok during the 2014 Thai coup d'\u00e9tat, informing the Thai public that 'like' or 'share' activities on social media could result in imprisonment (observed 30 June 2014). The Internet has achieved new relevance as a political tool. The presidential campaign of Howard Dean in 2004 in the United States was notable for its success in soliciting donation via the Internet. Many political groups use the Internet to achieve a new method of organizing for carrying out their mission, having given rise to Internet activism, most notably practiced by rebels in the Arab Spring., Davit Chokoshvili, Master's Thesis, June 2011 The New York Times suggested that social media websites, such as Facebook and Twitter, helped people organize the political revolutions in Egypt, by helping activists organize protests, communicate grievances, and disseminate information. Many have understood the Internet as an extension of the Habermasian notion of the public sphere, observing how network communication technologies provide something like a global civic forum. However, incidents of politically motivated Internet censorship have now been recorded in many countries, including western democracies. Philanthropy The spread of low-cost Internet access in developing countries has opened up new possibilities for peer-to-peer charities, which allow individuals to contribute small amounts to charitable projects for other individuals. Websites, such as DonorsChoose and GlobalGiving, allow small-scale donors to direct funds to individual projects of their choice. A popular twist on Internet-based philanthropy is the use of peer-to-peer lending for charitable purposes. Kiva pioneered this concept in 2005, offering the first web-based service to publish individual loan profiles for funding. Kiva raises funds for local intermediary microfinance organizations that post stories and updates on behalf of the borrowers. Lenders can contribute as little as $", "start_char_pos": 23251, "end_char_pos": 26883}, {"type": "D", "before": "Kiva Is Not Quite What It Seems , by David Roodman, Center for Global Development, 2 October 2009, as accessed 2", "after": null, "start_char_pos": 27134, "end_char_pos": 27246}, {"type": "D", "before": "16 January 2010", "after": null, "start_char_pos": 27247, "end_char_pos": 27262}, {"type": "D", "before": "\"First round in Internet war goes to Iranian intelligence\", Debkafile, 28 June 2009.", "after": null, "start_char_pos": 27933, "end_char_pos": 28017}, {"type": "D", "before": "\"Internet Enemies\", Enemies of the Internet 2014: Entities at the heart of censorship and surveillance, Reporters Without Borders (Paris), 11 March 2014. Retrieved 24 June 2014.Internet Enemies, Reporters Without Borders (Paris), 12 March 2012", "after": null, "start_char_pos": 28635, "end_char_pos": 28878}, {"type": "D", "before": "Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace , Ronald J. Deibert, John G. Palfrey, Rafal Rohozinski, and Jonathan Zittrain (eds), MIT Press, April 2010,", "after": null, "start_char_pos": 29153, "end_char_pos": 29332}, {"type": "D", "before": "Jim Giles, \"Internet responsible for 2 per cent of global energy usage\". New Scientist (Reed Business Information Ltd.), 26 October 2011.", "after": null, "start_char_pos": 29826, "end_char_pos": 29963}, {"type": "D", "before": "\"The Energy and Emergy of the Internet\" , Barath Raghavan (ICSI) and Justin Ma (UC Berkeley), in Proceedings of the 10th ACM Workshop on Hot Topics in Networks, 14\u201315 November 2011, Cambridge, MA. ACM SIGCOMM.", "after": null, "start_char_pos": 29966, "end_char_pos": 30175}], "sents_char_pos": [0, 195, 347, 609, 703, 961, 1125, 1294, 1417, 1465, 1530, 1554, 1824, 2098, 2214, 2300, 2426, 2500, 2514, 2528, 2781, 2931, 3022, 3046, 3221, 3510, 3877, 4115, 4208, 4311, 4373, 4609, 4812, 4924, 4948, 5188, 5266, 5349, 5480, 5612, 5856, 6089, 6276, 6373, 6413, 6746, 6863, 7003, 7159, 7367, 7666, 7761, 7882, 8015, 8116, 8162, 8452, 8609, 8766, 8964, 9057, 9164, 9177, 9263, 9299, 9332, 9561, 9828, 9949, 10297, 10480, 10540, 10789, 10969, 11055, 11231, 11338, 11554, 11886, 11966, 12122, 12314, 12534, 12747, 12889, 12981, 13115, 13306, 13531, 13613, 13727, 13786, 13967, 14106, 14199, 14429, 14605, 14727, 14870, 14973, 15092, 15168, 15225, 15440, 15668, 15752, 15780, 15988, 16092, 16426, 16692, 16711, 16839, 16857, 16953, 17135, 17400, 17523, 17835, 17856, 17904, 18005, 18070, 18303, 18373, 18473, 18629, 18646, 18793, 19005, 19105, 19250, 19402, 19520, 19652, 19755, 20119, 20168, 20309, 20553, 20629, 20791, 21152, 21369, 21490, 21676, 21845, 22185, 22347, 22556, 22846, 23017, 23178, 23391, 23703, 23857, 24059, 24232, 24383, 24553, 24663, 24810, 25027, 25088, 25227, 25429, 25796, 25988, 26125, 26359, 26489, 26596, 26719, 26845, 26961, 27133, 27540, 27742, 27833, 27932, 28335, 28400, 28634, 28788, 28812, 29152, 29496, 29825, 29898, 29945, 30418]}
+{"doc_id": "146180", "revision_depth": "1", "before_revision": "Apple Inc. Prior to March 2009, digital music files with digital rights management were available for purchase from the iTunes Store, encoded in a proprietary derivative of the AAC format that used Apple's FairPlay DRM system. These files are compatible only with Apple's iTunes media player software on Macs and Windows, their iPod portable digital music players, iPhone smartphones, iPad tablet computers, and the Motorola ROKR E1 and SLVR mobile phones. As a result, that music was locked into this ecosystem and available for portable use only through the purchase of one of the above devices, or by burning to CD and optionally re-ripping to a DRM-free format such as MP3 or WAV. In January, 2005, an iPod purchaser named Thomas Slattery filed a suit against Apple for the \"unlawful bundling \" of their iTunes Music Store and iPod device. He stated in his brief: \" Apple has turned an open and interactive standard into an artifice that prevents consumers from using the portable hard drive digital music player of their choice. \" At the time Apple was stated to have an 80\\% market share of digital music sales and a 90\\% share of sales of new music players, which he claimed allowed Apple to horizontally leverage its dominant positions in both markets to lock consumers into its complementary offerings. In September 2005, U.S. District Judge James Ware approved Slattery v. Apple Computer Inc . to proceed with monopoly charges against Apple in violation of the Sherman Antitrust Act. On June 7, 2006, the Norwegian Consumer Council stated that Apple's iTunes Music Store violates Norwegian law. The contract conditions were vague and \" clearly unbalanced to disfavor the customer \" . The retroactive changes to the DRM conditions and the incompatibility with other music players are the major points of concern. In an earlier letter to Apple, consumer ombudsman Bj\u00f8rn Erik Thon complained that iTunes' DRM mechanism was a lock-in to Apple's music players, and argued that this was a conflict with consumer rights that he doubted would be defendable by Norwegian copyright law. , tracks on the EMI label became available in a DRM-free format called iTunes Plus. These files are unprotected and are encoded in the AAC format at 256 kilobits per second, twice the bitrate of standard tracks bought through the service. iTunes accounts can be set to display either standard or iTunes Plus formats for tracks where both formats exist. These files can be used with any player that supports the AAC file format and are not locked to Apple hardware. They can be converted to MP format if desired. As of January 6, 2009, all four big music studios ( Warner Bros., Sony BMG, Universal , and EMI ) have signed up to remove the DRM from their tracks, at no extra cost. However, Apple charges consumers to have previously purchased DRM music restrictions removed .", "after_revision": "Apple Inc. Criticism of Apple Inc. Accusations of anti-competitive behavior Prior to March 2009, digital music files with digital rights management were available for purchase from the iTunes Store, encoded in a proprietary derivative of the Advanced Audio Coding| AAC format that used Apple's FairPlay DRM system. These files are compatible only with Apple's iTunes media player software on Macintosh|Macs and Microsoft Windows| Windows, their iPod portable digital music players, iPhone smartphones, iPad tablet computers, and the Motorola Motorola ROKR E1 |ROKR E1 and Motorola SLVR| SLVR mobile phones. As a result, that music was locked into this ecosystem and available for portable use only through the purchase of one of the above devices, Is Apple Playing Fair? Navigating the iPod FairPlay DRM Controversy or by burning to Compact disc| CD and optionally re-ripping to a DRM-free format such as MP3 or WAV. In January, 2005, an iPod purchaser named Thomas Slattery filed a suit against Apple for the unlawful bundling of their iTunes Music Store and iPod device. He stated in his brief: Apple has turned an open and interactive standard into an artifice that prevents consumers from using the portable hard drive digital music player of their choice. At the time Apple was stated to have an 80\\% market share of digital music sales and a 90\\% share of sales of new music players, which he claimed allowed Apple to horizontally leverage its dominant positions in both markets to lock consumers into its complementary offerings. In September 2005, U.S. District Judge James Ware judge|James Ware approved Slattery v. Apple Computer Inc to proceed with monopoly charges against Apple in violation of the Sherman Antitrust . Suit Against Apple Over iPod, iTunes to Proceed |author-Donna |author-Higgins |publisher FindLaw Legal News |date 2005-09-22. On June 7, 2006, the Norwegian Consumer Council stated that Apple's iTunes Music Store violates Norwegian law. The contract conditions were vague and clearly unbalanced to disfavor the customer . The retroactive changes to the Digital Rights Management| DRM conditions and the incompatibility with other music players are the major points of concern. In an earlier letter to Apple, consumer ombudsman qqBj\u00f8rn Erik Thon complained that iTunes' DRM mechanism was a lock-in to Apple's music players, and argued that this was a conflict with consumer rights that he doubted would be defendable by Norwegian copyright law. Author Thon |author-Bj\u00f8rn Erik |iTunes terms of service vs Norwegian marketing law. English transcribed: The Consumer Council reacts to the observation that iTunes DRM entails that the files can only be played on a few players, mainly Apple's own players. They furthermore believe that the terms of service's point 9b, where the customer among other things must agree not to circumvent or change such technical hindrances, is in conflict with the copyright law 53a. Copyright holders are by the copyright law entitled to decide if the work is to be made available, and in principle also how it is made available. Copyright can in my opinion not give the copyright holder right to demand all kinds of conditions when sold to consumers in generality.Norwegian original: Forbrukerr\u00e5det reagerer p\u00e5 at iTunes Music Stores DRM medf\u00f8rer at filene kun kan spilles p\u00e5 et f\u00e5tall spillere, hovedsakelig Apples egne spillere. De mener videre at tjenestevilk\u00e5renes punkt 9b, hvor kunden blant annet m\u00e5 samtykke til ikke \u00e5 omg\u00e5 eller endre slike tekniske sperrer, er i strid med \u00e5ndsverksloven 53a. Rettighetshaverens enerett etter \u00e5ndsverksloven gir anledning til \u00e5 bestemme om verket skal gj\u00f8res tilgjengelig, og rettighetshaveren kan ogs\u00e5 i utgangspunktet bestemme m\u00e5ten dette skal skje p\u00e5. Opphavsretten kan etter min mening ikke gi rettighetshaveren rett til \u00e5 stille enhver form for betingelser ved salg til forbrukere As of|2007|05|29 , tracks on the EMI label became available in a DRM-free format called iTunes Plus. These files are unprotected and are encoded in the AAC format at 256 kilobits per second, twice the bitrate of standard tracks bought through the service. iTunes accounts can be set to display either standard or iTunes Plus formats for tracks where both formats exist. These files can be used with any player that supports the AAC file format and are not locked to Apple hardware. They can be converted to MP format if desired. As of January 6, 2009, all four big music studios Warner Bros., Sony BMG, Universal Music Group|Universal , and EMI have signed up to remove the DRM from their tracks, at no extra cost. However, Apple charges consumers to have previously purchased DRM music restrictions .", "edit_actions": [{"type": "A", "before": null, "after": "Criticism of Apple Inc. Accusations of anti-competitive behavior", "start_char_pos": 11, "end_char_pos": 11}, {"type": "A", "before": null, "after": "Advanced Audio Coding|", "start_char_pos": 178, "end_char_pos": 178}, {"type": "R", "before": "Macs and", "after": "Macintosh|Macs and Microsoft Windows|", "start_char_pos": 306, "end_char_pos": 314}, {"type": "A", "before": null, "after": "Motorola", "start_char_pos": 427, "end_char_pos": 427}, {"type": "R", "before": "and", "after": "|ROKR E1 and Motorola SLVR|", "start_char_pos": 436, "end_char_pos": 439}, {"type": "A", "before": null, "after": "Is Apple Playing Fair? Navigating the iPod FairPlay DRM Controversy", "start_char_pos": 601, "end_char_pos": 601}, {"type": "A", "before": null, "after": "Compact disc|", "start_char_pos": 619, "end_char_pos": 619}, {"type": "R", "before": "\"unlawful bundling \"", "after": "unlawful bundling", "start_char_pos": 783, "end_char_pos": 803}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 873, "end_char_pos": 874}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 1039, "end_char_pos": 1040}, {"type": "A", "before": null, "after": "judge|James Ware", "start_char_pos": 1367, "end_char_pos": 1367}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1408, "end_char_pos": 1409}, {"type": "R", "before": "Act.", "after": ". Suit Against Apple Over iPod, iTunes to Proceed |author-Donna |author-Higgins |publisher FindLaw Legal News |date 2005-09-22.", "start_char_pos": 1495, "end_char_pos": 1499}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 1650, "end_char_pos": 1651}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 1696, "end_char_pos": 1697}, {"type": "A", "before": null, "after": "Digital Rights Management|", "start_char_pos": 1731, "end_char_pos": 1731}, {"type": "R", "before": "Bj\u00f8rn", "after": "qqBj\u00f8rn", "start_char_pos": 1879, "end_char_pos": 1884}, {"type": "A", "before": null, "after": "Author Thon |author-Bj\u00f8rn Erik |iTunes terms of service vs Norwegian marketing law. English transcribed: The Consumer Council reacts to the observation that iTunes DRM entails that the files can only be played on a few players, mainly Apple's own players. They furthermore believe that the terms of service's point 9b, where the customer among other things must agree not to circumvent or change such technical hindrances, is in conflict with the copyright law 53a. Copyright holders are by the copyright law entitled to decide if the work is to be made available, and in principle also how it is made available. Copyright can in my opinion not give the copyright holder right to demand all kinds of conditions when sold to consumers in generality.Norwegian original: Forbrukerr\u00e5det reagerer p\u00e5 at iTunes Music Stores DRM medf\u00f8rer at filene kun kan spilles p\u00e5 et f\u00e5tall spillere, hovedsakelig Apples egne spillere. De mener videre at tjenestevilk\u00e5renes punkt 9b, hvor kunden blant annet m\u00e5 samtykke til ikke \u00e5 omg\u00e5 eller endre slike tekniske sperrer, er i strid med \u00e5ndsverksloven 53a. Rettighetshaverens enerett etter \u00e5ndsverksloven gir anledning til \u00e5 bestemme om verket skal gj\u00f8res tilgjengelig, og rettighetshaveren kan ogs\u00e5 i utgangspunktet bestemme m\u00e5ten dette skal skje p\u00e5. Opphavsretten kan etter min mening ikke gi rettighetshaveren rett til \u00e5 stille enhver form for betingelser ved salg til forbrukere", "start_char_pos": 2094, "end_char_pos": 2094}, {"type": "A", "before": null, "after": "As of|2007|05|29", "start_char_pos": 2095, "end_char_pos": 2095}, {"type": "D", "before": "(", "after": null, "start_char_pos": 2658, "end_char_pos": 2659}, {"type": "A", "before": null, "after": "Music Group|Universal", "start_char_pos": 2694, "end_char_pos": 2694}, {"type": "D", "before": ")", "after": null, "start_char_pos": 2705, "end_char_pos": 2706}, {"type": "D", "before": "removed", "after": null, "start_char_pos": 2862, "end_char_pos": 2869}], "sents_char_pos": [0, 228, 459, 689, 848, 1038, 1316, 1499, 1610, 1828, 2179, 2448, 2560, 2607, 2776]}
+{"doc_id": "14664973", "revision_depth": "1", "before_revision": "Fabrication and launch of the Max Launch Abort System test vehicle - July 8, 2009. Components of the MLAS test vehicle Concept of test vehicle operations The Max Launch Abort System (MLAS) is a proposed alternative to the Max Faget-invented \"tractor\" Launch Escape System (LES) currently planned for use by NASA for its Orion spacecraft in the event an Ares I malfunction during launch requires an immediate abort. A \"pad abort\" flight test of the MLAS was performed at NASA's Wallops Flight Facility on July 8, 2009 just after 6:25 a.m.NASA Tests Alternate Launch Abort System for Astronaut Escape A primary test goal was the successful separation of a mock crew capsule from the abort system. Designed by NASA engineers and reported on the website nasaspaceflight .com on December 6, 2007, the proposed MLAS uses 4 existing Thiokol-Huntsville built solid-rocket motors (built in 1988) placed at 90\u00b0 intervals within the Orion's bullet-shaped protective cover (fairing). The protective cover was originally designed to protect the Orion spacecraft from aerodynamic stresses during launch, and to provide an interface between the spacecraft's crew module with the LES. The MLAS is designed with the aim of reducing the height of the Orion/Ares I stack while also reducing weight and center-of-gravity issues of a traditional LES. The bullet-shaped MLAS is also expected to provide better aerodynamic qualities during the first two minutes of flight, reducing stresses when the vehicle encounters the \" Max Q\" regions of hypersonic flight. The MLAS is also expected to simplify production, as existing hardware would be employed. There are several drawbacks to MLAS. First, the bullet-shaped protective cover would have to be modified and reinforced to allow for the use of the solid-rocket motors, something not needed with the LES, which bolts atop of the LIDS docking ring assembly. Second, the necessity to fire multiple motors (LES uses one motor and multiple nozzles) simultaneously for an abort decreases the theoretical reliability of the launch abort system by introducing more failure modes. Like the existing LES, the MLAS would provide protection to the Orion spacecraft crew during the first 2 minutes of flight, with the MLAS being jettisoned, along with the service module's fairing panels, after the solid-rocket first stage is jettisoned. If implemented, the Orion/Ares I stack would resemble the towerless Gemini-Titan stack used between 1965\u2013 66 , in which ejection seats were used as the primary form of escape for the astronauts who flew on the ten Gemini missions. The MLAS concept was dropped with the transformation of the Crew Exploration Vehicle into the Orion Multi-Purpose Crew Vehicle, and the switch of the launch vehicle from Ares I (with its perennial underperformance) to Delta IV-Heavy or SLS . July 2009 test launch A Max Launch Abort System test vehicle was launched July 8, 2009, at 6 :26 a.m. EDT. The test vehicle weighed over and was over tall. The test vehicle was different from the actual system in many ways. The main difference is that the four propulsion rockets were not located in the forward fairing, but in a boost skirt located at the bottom of the test vehicle. The rockets in the fairing were represented by geometric dummies. The propulsion thrust was not balanced between the rockets by a manifold system, contrary to what is foreseen with the actual system. See also Boilerplate References External links NASA Spaceflight (main page) NASA Spaceflight: MLAS - the alternative Orion Launch Abort System gains momentum (full article) NASA page on MLAS and the Wallops pad abort test NASA news release on pad abort test rescheduling Detailed article on Wallops pad abort test on SpaceRef.com; accessed 19 June 2009 Article on pad abort test date delay to July 2009; accessed 24 June 2009 NASA announcement of successful pad abort test with launch photo; accessed 8 July 2009 Category:Human spaceflight Category:Ares (rocket family) Category:Spacecraft components Category:Articles containing video cli", "after_revision": "Fabrication and launch of the MLAS test vehicle Components of the MLAS test vehicle MLAS test vehicle flight profile The Max Launch Abort System (MLAS) was a proposed alternative to the Maxime Faget-invented \"tractor\" launch escape system (LES) that was planned for use by NASA for its Orion spacecraft in the event an Ares I malfunction during launch required an immediate abort. Designed by NASA engineers and reported on the website NASASpaceFlight .com on December 6, 2007, the proposed MLAS used four existing Huntsville-built Thiokol solid-rocket motors (built in 1988) placed at 90\u00b0 intervals within the Orion's bullet-shaped fairing. The fairing was originally designed to protect the Orion spacecraft from aerodynamic stresses during launch, and to provide an interface between the spacecraft's crew module with the LES. The MLAS was designed with the aim of reducing the height of the Orion/Ares I stack while also reducing weight and center-of-gravity issues of a traditional LES. The bullet-shaped MLAS was also expected to provide better aerodynamic qualities during the first two minutes of flight, reducing stresses when the vehicle encounters the \" max Q\" region of hypersonic flight. The MLAS was also expected to simplify production, as existing hardware would be employed. There are several drawbacks to MLAS. First, the bullet-shaped protective cover would have to be modified and reinforced to allow for the use of the solid-rocket motors, something not needed with the LES, which bolts on top of the LIDS docking ring assembly. Second, the necessity to fire multiple motors (LES uses one motor and multiple nozzles) simultaneously for an abort decreases the theoretical reliability of the launch abort system by introducing more failure modes. Like the existing LES, the MLAS would provide protection to the Orion spacecraft crew during the first minutes of flight, with the MLAS being jettisoned, along with the service module's fairing panels, after the solid-rocket first stage was jettisoned. If implemented, the Orion/Ares I stack would have resembled the towerless Gemini-Titan stack used between 1965\u2013 1966 , in which ejection seats were used as the primary form of escape for the astronauts who flew on the ten Gemini missions. The MLAS concept was dropped with the transformation of the Crew Exploration Vehicle into the Orion Multi-Purpose Crew Vehicle, and the switch of the launch vehicle from Ares I (with its perennial underperformance) to the Delta IV Heavy or Space Launch System . July 2009 test launch A \"pad abort\" flight test of the Max Launch Abort System was performed at NASA's Wallops Flight Facility on July 8, 2009, at 10 :26 UTC. A primary test goal was the successful separation of a mock crew capsule from the abort system. The test vehicle weighed over and was over tall. The test vehicle was different from the actual proposed system in many ways. The main difference was that the four propulsion rockets were not located in the forward fairing, but in a boost skirt located at the bottom of the test vehicle. The rockets in the fairing were represented by geometric dummies. The propulsion thrust was not balanced between the rockets by a manifold system, contrary to what was foreseen with the actual system. References Further reading External links Category:Human spaceflight Category:Ares (rocket family) Category:Spacecraft components Category:2009 in spaceflight Category:Articles containing video cli", "edit_actions": [{"type": "R", "before": "Max Launch Abort System test vehicle - July 8, 2009.", "after": "MLAS test vehicle", "start_char_pos": 30, "end_char_pos": 82}, {"type": "R", "before": "Concept of test vehicle operations", "after": "MLAS test vehicle flight profile", "start_char_pos": 119, "end_char_pos": 153}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 189, "end_char_pos": 191}, {"type": "R", "before": "Max", "after": "Maxime", "start_char_pos": 222, "end_char_pos": 225}, {"type": "R", "before": "Launch Escape System", "after": "launch escape system", "start_char_pos": 251, "end_char_pos": 271}, {"type": "R", "before": "currently", "after": "that was", "start_char_pos": 278, "end_char_pos": 287}, {"type": "R", "before": "requires", "after": "required", "start_char_pos": 386, "end_char_pos": 394}, {"type": "D", "before": "A \"pad abort\" flight test of the MLAS was performed at NASA's Wallops Flight Facility on July 8, 2009 just after 6:25 a.m.NASA Tests Alternate Launch Abort System for Astronaut Escape A primary test goal was the successful separation of a mock crew capsule from the abort system.", "after": null, "start_char_pos": 415, "end_char_pos": 694}, {"type": "R", "before": "nasaspaceflight", "after": "NASASpaceFlight", "start_char_pos": 750, "end_char_pos": 765}, {"type": "R", "before": "uses 4 existing Thiokol-Huntsville built", "after": "used four existing Huntsville-built Thiokol", "start_char_pos": 810, "end_char_pos": 850}, {"type": "R", "before": "protective cover (fairing). The protective cover", "after": "fairing. The fairing", "start_char_pos": 944, "end_char_pos": 992}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1178, "end_char_pos": 1180}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1353, "end_char_pos": 1355}, {"type": "R", "before": "Max", "after": "max", "start_char_pos": 1502, "end_char_pos": 1505}, {"type": "R", "before": "regions", "after": "region", "start_char_pos": 1509, "end_char_pos": 1516}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1548, "end_char_pos": 1550}, {"type": "R", "before": "atop", "after": "on top", "start_char_pos": 1845, "end_char_pos": 1849}, {"type": "D", "before": "2", "after": null, "start_char_pos": 2204, "end_char_pos": 2205}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 2340, "end_char_pos": 2342}, {"type": "R", "before": "resemble", "after": "have resembled", "start_char_pos": 2400, "end_char_pos": 2408}, {"type": "R", "before": "66", "after": "1966", "start_char_pos": 2461, "end_char_pos": 2463}, {"type": "R", "before": "Delta IV-Heavy or SLS", "after": "the Delta IV Heavy or Space Launch System", "start_char_pos": 2804, "end_char_pos": 2825}, {"type": "A", "before": null, "after": "\"pad abort\" flight test of the", "start_char_pos": 2852, "end_char_pos": 2852}, {"type": "R", "before": "test vehicle was launched", "after": "was performed at NASA's Wallops Flight Facility on", "start_char_pos": 2877, "end_char_pos": 2902}, {"type": "R", "before": "6", "after": "10", "start_char_pos": 2920, "end_char_pos": 2921}, {"type": "R", "before": "a.m. EDT.", "after": "UTC. A primary test goal was the successful separation of a mock crew capsule from the abort system.", "start_char_pos": 2926, "end_char_pos": 2935}, {"type": "A", "before": null, "after": "proposed", "start_char_pos": 3032, "end_char_pos": 3032}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 3074, "end_char_pos": 3076}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 3379, "end_char_pos": 3381}, {"type": "D", "before": "See also Boilerplate", "after": null, "start_char_pos": 3415, "end_char_pos": 3435}, {"type": "A", "before": null, "after": "Further reading", "start_char_pos": 3447, "end_char_pos": 3447}, {"type": "D", "before": "NASA Spaceflight (main page) NASA Spaceflight: MLAS - the alternative Orion Launch Abort System gains momentum (full article) NASA page on MLAS and the Wallops pad abort test NASA news release on pad abort test rescheduling Detailed article on Wallops pad abort test on SpaceRef.com; accessed 19 June 2009 Article on pad abort test date delay to July 2009; accessed 24 June 2009 NASA announcement of successful pad abort test with launch photo; accessed 8 July 2009", "after": null, "start_char_pos": 3463, "end_char_pos": 3928}, {"type": "A", "before": null, "after": "Category:2009 in spaceflight", "start_char_pos": 4017, "end_char_pos": 4017}], "sents_char_pos": [0, 82, 414, 537, 694, 971, 1168, 1329, 1538, 1628, 1665, 1884, 2100, 2354, 2585, 2935, 2984, 3053, 3214, 3280, 3414, 3746, 3819, 3907]}
+{"doc_id": "1473517", "revision_depth": "1", "before_revision": "Origins of the phrase On March 15, 1980, The Boston Globe ran an editorial that began: There was nothing exceptional about it , except the headline : \"Mush from the Wimp\" . The headline \u2014which was supposed to have read \"All Must Share the Burden \" \u2014was corrected during the print run after 161,000 copies had already gone to circulation. In November 1982 , Globe editorial page editor Kirk Scharfenberg wrote an op-ed piece discussing his creation of the phrase and the use of \" wimp \" as a popular political insult afterwards . \"I meant it as an in-house joke and thought it would be removed before publication,\" he explained. \"It appeared in 161,000 copies of the Globe the next day.\" Theo Lippman Jr. , of The Baltimore Sun , subsequently declared \"Mush from the Wimp\" the second most famous newspaper headline of the 20th century, behind \"Wall St. Lays an Egg\" and ahead of \"Ford to City: Drop Dead\" . Later usage The phrase became well known enough that, in 1995, a Globe editorial chastising the Iditarod race for caving in to pressure from animal rights activists was titled \"More Wimps from the Mush \". ", "after_revision": "Headline On March 15, 1980, The Boston Globe ran an editorial that began: There was nothing exceptional about it except the headline , \"Mush from the Wimp\" , which essentially called the speech \"mush\" and Carter a \"wimp\" . The headline was corrected to read \"All must share the burden \" during the print run , but only after 161,000 copies had already gone to circulation. Aftermath The phrase had been created by Globe editorial writer Kirk Scharfenberg; in 1982 , he wrote an op-ed piece discussing it. Scharfenberg had felt that Carter's speech was \" wishy-washy\" and it left him \" not much impressed\" . \"I meant it as an in-house joke and thought it would be removed before publication,\" he explained. \"It appeared in 161,000 copies of the Globe the next day.\" Scharfenberg also noted the use of \"wimp\" as a popular political insult afterwards. He remained with the Globe until his death in 1992 from cancer at age 48. A month after the headline was published, Theo Lippman Jr. of The Baltimore Sun declared \"Mush from the Wimp\" as being \"on its way to becoming one of the most famous headlines of our time.\" He placed it behind \"Wall St. Lays an Egg\" (Variety, 1929) and ahead of \"Ford to City: Drop Dead\" (New York Daily News, 1975) . The phrase became well known enough that, in 1995, a Globe editorial chastising the Iditarod race for caving in to pressure from animal rights activists was titled \"More wimps from the mush \". The New York Post used \"Mush from the wimp\", with credit to Scharfenberg, as the title of an opinion column published on June 20, 2013, criticizing President Obama following a speech in Berlin. See also \"Malaise speech\", common name for a televised address given by President Carter on July 15, 1979.", "edit_actions": [{"type": "R", "before": "Origins of the phrase", "after": "Headline", "start_char_pos": 0, "end_char_pos": 21}, {"type": "D", "before": ",", "after": null, "start_char_pos": 126, "end_char_pos": 127}, {"type": "R", "before": ":", "after": ",", "start_char_pos": 148, "end_char_pos": 149}, {"type": "A", "before": null, "after": ", which essentially called the speech \"mush\" and Carter a \"wimp\"", "start_char_pos": 171, "end_char_pos": 171}, {"type": "R", "before": "\u2014which was supposed to have", "after": "was corrected to", "start_char_pos": 187, "end_char_pos": 214}, {"type": "R", "before": "Must Share the Burden", "after": "must share the burden", "start_char_pos": 225, "end_char_pos": 246}, {"type": "D", "before": "\u2014was corrected", "after": null, "start_char_pos": 249, "end_char_pos": 263}, {"type": "A", "before": null, "after": ", but only", "start_char_pos": 285, "end_char_pos": 285}, {"type": "R", "before": "In November", "after": "Aftermath The phrase had been created by Globe editorial writer Kirk Scharfenberg; in", "start_char_pos": 340, "end_char_pos": 351}, {"type": "R", "before": ", Globe editorial page editor Kirk Scharfenberg", "after": ", he", "start_char_pos": 357, "end_char_pos": 404}, {"type": "R", "before": "his creation of the phrase and the use of", "after": "it. Scharfenberg had felt that Carter's speech was", "start_char_pos": 437, "end_char_pos": 478}, {"type": "R", "before": "wimp", "after": "wishy-washy\" and it left him", "start_char_pos": 481, "end_char_pos": 485}, {"type": "R", "before": "as a popular political insult afterwards", "after": "not much impressed\"", "start_char_pos": 488, "end_char_pos": 528}, {"type": "A", "before": null, "after": "Scharfenberg also noted the use of \"wimp\" as a popular political insult afterwards. He remained with the Globe until his death in 1992 from cancer at age 48.", "start_char_pos": 689, "end_char_pos": 689}, {"type": "A", "before": null, "after": "A month after the headline was published,", "start_char_pos": 690, "end_char_pos": 690}, {"type": "D", "before": ",", "after": null, "start_char_pos": 708, "end_char_pos": 709}, {"type": "D", "before": ", subsequently", "after": null, "start_char_pos": 731, "end_char_pos": 745}, {"type": "R", "before": "the second most famous newspaper headline of the 20th century,", "after": "as being \"on its way to becoming one of the most famous headlines of our time.\" He placed it", "start_char_pos": 776, "end_char_pos": 838}, {"type": "A", "before": null, "after": "(Variety, 1929)", "start_char_pos": 869, "end_char_pos": 869}, {"type": "A", "before": null, "after": "(New York Daily News, 1975)", "start_char_pos": 909, "end_char_pos": 909}, {"type": "D", "before": "Later usage", "after": null, "start_char_pos": 912, "end_char_pos": 923}, {"type": "R", "before": "Wimps from the Mush", "after": "wimps from the mush", "start_char_pos": 1094, "end_char_pos": 1113}, {"type": "A", "before": null, "after": "The New York Post used \"Mush from the wimp\", with credit to Scharfenberg, as the title of an opinion column published on June 20, 2013, criticizing President Obama following a speech in Berlin.", "start_char_pos": 1117, "end_char_pos": 1117}, {"type": "A", "before": null, "after": "See also \"Malaise speech\", common name for a televised address given by President Carter on July 15, 1979.", "start_char_pos": 1118, "end_char_pos": 1118}], "sents_char_pos": [0, 173, 339, 629, 688]}
+{"doc_id": "15135975", "revision_depth": "1", "before_revision": "City Lore : the New YorkCenter for Urban Culture was founded in 1986 and was the first organization in the United States devoted expressly to the \"documentation, preservation, and presentation of urban folk culture.\"American Folklore: An Encyclopedia. Brunvand, Jan Harold, ed. Garland Publishing, NY, 1996. Their mission is to produce programs and publications that convey the richness of New York City \u2014and America's \u2014 living cultural heritage . In addition to regular programming that includes the Place Matters Awards and the People's Hall of Fame, the organization works with a wide range of partners to develop exhibitions, publications, and documentary films, and to advocate for the rights of street performers, ethnic clubs, and other grassroots cultural expressions in New York City. City Lore works in four cultural domains: urban folklore and history, preservation, arts in education, and grassroots poetry traditions. Described by Sonnet Takahisa of the September 11th Memorial Museum as \"wise renegades, \" their programs include People's Poetry Project, Place Matters (in collaboration with the Municipal Arts Society) and City of Memory . City Lore works collaboratively with folk and community artists, embracing different aesthetics for the creation of art. Their collaborators include the Gotham Center for New York City History, the New-York Historical Society, Bank Street College of Education, and smaller groups such as Los Pleneros de la 21. City Lore\u2019s staff consists of professional folklorists ( Steve Zeitlin, the founder and executive director , Elena Mart\u00ednez and Amanda Dargan), historians (Marci Reaven), photographers (Martha Cooper), ethnomusicologists (Roberta Singer and Lois Wilcken), and arts and education specialists (Anika Selhorst). Projects and programs Urban folklore The City Lore office on First Avenue [ on the Lower East Side houses archives containing over 100,000 images , hundreds of oral histories, and traditional music and poetry performance tapes. Mooney, Jake. \"Their New York,Lost and Sometimes Found\" New York Times, 8 June 2008. The archives are part of the ongoing documentationproject featured on City of Memory, a participatory online story map of New York City . City Lore's People's Hall of Fame, established in 1993, honors grassroots contributions to New York's cultural life and presents winners with a plate-sized bronze version of the New York City subway token . Recipients have included the Pearls of Wisdom Storytellers, Peter Benfaremo (\"The Lemon Ice King of Corona\"), Jim Power (\"New York's Mosaic Man\"), Moynihan, Colin. \"With Few Luxuries, an Artist Sticks to It\" New York Times 12 December 2004 [ and Renee Flowers (original member of the Gowanus Wildcats Girls Drill Team). [ City Lore created Know Your Rights! , a guide for street performers. Place Matters %DIFDELCMD < %DIFDELCMD < %%% Since its inception, City Lore has served as an advocate for local landmarks through the Place Matters program in collaboration with Municipal Arts Society . There have been over 650 nominations from the public, including parks, historic sites, public art, beer gardens, industrial sites, and stores. In 2001, they successfully nominated Bohemian Hall, still a vibrant community center/beer garden started by Czech immigrants in Astoria, Queens, and the Casa Amadeo Music Store, the oldest, continuously occupied Latin music store in New York City, as census sites to the National Register of Historic Places. The organization has funding from the Dutch government for an outdoor exhibit in Lower Manhattan commemorating the Quadricentennial of Henry Hudson's voyage with signage marking key sitesin New Amsterdam. In 2006, City Lore published Hidden New York: A Guide to Places that Matter. Arts in Education City Lore develops and implements arts residencies and offers professional development to New York City public schools. In response to requests of public school teachers with increasing Bengali and Bangladeshi populations , the organization designed artist residencies in Queens, funded by the United States Department of Education to teach traditional Bengali scroll painting. City Lore has designed similar programs bringing Mexican, Ecuadorian, Egyptian, Ivorian, Cuban, Haitian, Peruvian, South African, and Brazilian artists into the schools. People's Poetry Project In the aftermath of September 11, 2001 attacks, City Lore found and collected anonymous poems and other writings that had been left at memorials, hospitals and gathering places throughout the city. A selection of these anonymous poems was published in the book, Words In Your Face: A Guided Tour Through Twenty Years of the New York City Poetry Slam. Aptowicz, Cristin O'Keefe. (2008). Words in Your Face: A Guided Tour Through Twenty Years of the New York City Poetry Slam. New York City: Soft Skull Press, 288. . and appeared in Steve Zeitlin's essay, \"Oh Did You See the Ashes Come Thickly Falling Down. Zeitlin, Steve. \" Oh Did You See the Ashes Come Thickly Falling Down. \" Spontaneous Shrines and the Public Memorialization of Death.Ed. Jack Santino. New York: Palgrave Macmillan, 2006 Founded by City Lore and Poets House in 1999, The People's Poetry Gathering was created to present the diverse oral poetry traditions of New York City. In 2003[] , City Lore 's People's Poetry Project launched an initiative to document and disseminate poetry from endangered languages. Special projects %DIFDELCMD < %DIFDELCMD < %%% City Lore produces documentary films and collaborates with filmmakers whose work relates to the organization's mission. Sponsored films include Ric Burns' Coney Island and the five-part series New York: A Documentary Film; City of Dreams, a film about women artists in New York City; From Mambo to Hip Hop, Pareles, John. \"Mambo and Hip-Hop: Two Bronx Sounds, One Sense of Dignity\". New York Times 14 September 2006. [ a documentary which traces the history of music in the South Bronx; and the forthcoming DeAf Jam, which highlights the poetry and storytelling of the deaf performed in American Sign Language. City Lore developed the traveling exhibit Weavings of War, which featured the work of women textile artists from Central Asia, Southeast Asia, Latin America, and South Africa . Funds were raised by City Lore to support Peter Siegel's project to restore and issue tapes he made in the 1960s of folk music concerts by Mississippi John Hurt, The Carter Family, Jesse Fuller, Bill Monroe, and others. The recordings became the box set Friends of Old Time Music released by Smithsonian Folkways in 2006 Ratliff, Ben .\" Rounding Up the Best of the Boxed; Friends of Old Time Music -- The Folk Arrival, 1961-1965. \" New York Times 24 November 2006. References Category:American folklore Category:Storytelling Category:Preservation (library and archival science) Category:Organizations based in New York City Category:Culture of New York City Category:Organizations established in 1986 Category:1986 establishments in New York (state", "after_revision": "City Lore , New York's center for urban folk culture, founded in 1985, is the first organization in the United States devoted expressly to the \"documentation, preservation, and presentation of urban folk culture.\"American Folklore: An Encyclopedia. Brunvand, Jan Harold, ed. Garland Publishing, NY, 1996. alt=|Children Playing New York Street Games photographed by Martha Cooper alt=|Sahadi's Middle Eastern Grocery, photographed by Martha Cooper With a mission to foster New York City \u2013 and America\u2019s \u2013 living cultural heritage through education and public programs, City Lore encompasses a Lower East Side gallery space, performances, lectures, the People's Hall of Fame, a POEMobile that projects poems onto walls and buildings, and education programs throughout the five boroughs. City Lore documents, presents, and advocates for New York City\u2019s grassroots cultures to ensure their living legacy in stories and histories, places and traditions. The organization also works with a wide range of partners to develop exhibitions, publications, and documentary films, and to advocate for the rights of street performers, ethnic clubs, and other grassroots cultural expressions in New York City. Described as \u201cwise renegades\u201d by Sonnet Takahisa , the group has also been described as a \u201cpractical application of a utopian endeavor\u201d by the writer Marc Kaminsky. In a March 21, 2020 article in The Wall Street Journal, Steve Zeitlin notes, \u201cWe believe in grassroots creativity as a redeeming force in society and a symbol of the irrepressible nature of the human spirit.\u201d Since 2013, City Lore has been headquartered at 56 East 1st Street on the historic Lower East Side of New York. The building holds offices, a gallery, and a multicultural library for teachers and researchers. In 2019, City Lore became an official Smithsonian Affiliate, one of only 6 affiliates in New York City . City Lore works collaboratively with folk and community artists, embracing different aesthetics for the creation of art. Their collaborators include the Gotham Center for New York City History, the New-York Historical Society, Bank Street College of Education, and smaller groups such as Los Pleneros de la 21. City Lore\u2019s staff has consisted of professional folklorists ( founder and executive director Steve Zeitlin , Elena Mart\u00ednez and Amanda Dargan), historians (Marci Reaven), photographers (Martha Cooper), ethnomusicologists (Roberta Singer and Lois Wilcken), playwrights (Jake Rosenberg, Raquel Almazan) and arts and education specialists (Anika Selhorst). Founding November, 1985, folklorist Steve Zeitlin founded City Lore, and the organization received full non-profit status. Prior to founding City Lore, Steve Zeitlin worked for eight years as a folklorist for the Smithsonian Institution\u2019s Festival of American Folklife. In 1979, the New York City Chapter of the New York Folklore Society, led by Dr. Barbara Kirshenblatt Gimblett, Nancy Groce and others, sponsored the first of three conferences on New York City Folklore. Zeitlin, who participated in the conferences, moved to New York in 1981, and, in 1983, became the President of the New York City Chapter of the New York Folklore Society. City Lore\u2019s first program was a tribute to late anthropologist Barbara Myerhoff in September, 1985. In 1986 moved into offices at 72 E. First Street on the Lower East Side. In 1986, the organization held the first City Lore Festival in Central Park staged in tandem with the first Central Park Summerstage. Approach to Folklore City Lore founder Steve Zeitlin City Lore's Founder Dr. Steve Zeitlin has said that City Lore has: an \"open mission to document and present New York City and America's living cultural heritage. Living cultural heritage used by folklorists to suggest the documentation, interpretation, and presentation of traditions within living memory, as opposed to events that predate living memory, and are, in a sense, purely historical. The original impetus for the discipline of folklore in the 19th century was the notion of collecting myths and legends as \"survivals\" from an earlier age, but City Lore is very present oriented. It's not only about capturing the past, it's about using an arts perspective to look at life itself. And to see the present in a slightly more vivid and interested and compelling way by looking at the artistic impulse in everyday life. Folklorists distinguish themselves from historians and from cultural anthropologists, because of the attention they pay to the aesthetic dimensions of history and culture.\" 2 According to Zeitlin, City Lore is \u201ctradition inspired but not tradition bound, and we are all about the redemptive power of grassroots creativity.\" Working across so many arenas of life, the organization has been described as a \u201cfull court press\u201d on what became the tag line for the organization: the art of everyday life. In a formal evaluation by the Artography initiative of Leveraging Investments in Creativity (LINC) funded by the Ford Foundation, Dr. William Westerman writes: It\u2019s hard to understand what City Lore does in terms of art-making without first understanding how folklorists think of the concept of art. It is as if in Western society what is seen as the arts is equivalent to the visible light in the spectrum, whereas folklorists see the art across the whole spectrum, from ultraviolet to infrared. That full range of creative expression is what concerns the mission of City Lore, and it includes history and memory, language and religion, food and gardens, lace and place. The difference between City Lore and other arts programs is not simply that the arts presented are folk and traditional arts, but that City Lore\u2019s arts are traditional and modern, and a great deal of the artmaking takes place in the collaborations of different cultural organizations and artists, and in the ties between the traditional and the way that contemporary New Yorkers use and adapt their traditions in their current work, whether they are professionals or schoolchildren. In this way, musical and poetic forms that build on traditional genres \u2013 including hip-hop, mambo,and spoken word \u2013 are part of a continuum of artistic practice that recognizes and builds upon deep genealogical connections to the past without being bound by them. It is in this way that City Lore\u2019s work gets far beyond nostalgia, because the thrust is always forward-looking, not referring to what once was and could never be again, but building creatively with respect for the cultural foundations that exist.[3 Programs and Series City Lore works in four cultural domains: urban folklore and history, preservation, arts in education, and grassroots poetry traditions. In addition, City Lore undertakes special projects in keeping with its mission, and serves as a fiscal sponsor for filmmakers and other cultural specialists. Urban folklore The City Lore archives at 56 E. First Street on the Lower East Side houses 12,685 images by photographer Martha Cooper and 5,634 by Katrina Thomas. The total with other photographers was 19 , 320 images. The archive also includes 5,210 photographic negatives, 692 cassette tapes, 143 dat tapes, 163 mini DV tapes and 148 VHS tapes including oral histories, and traditional music and poetry performance tapes. 4 City Lore has over 800 digital video clips highlighting urban folklore subjects. Described as a \u201cliving archive,\u201d the repository comes alive as it serves to inspire new public programs and continued documentation. City Lore is a pioneer in cultural story mapping. In 2008, it launched City of Memory (cityofmemory.org), a story map of New York written about in the volume Letting Go: Sharing Authority in a User Generated World. Designed with Flash technology by Local Projects, the map has been complemented with City Lore\u2019s new Youtube based storymap designed by ESRI.Tariq Hamad at his sweet shop City Lore's People's Hall of Fame, established in 1993, honors grassroots contributions to New York's cultural life and presents winners with a plate-sized bronze version of the New York City subway token , representing a token of esteem . Recipients have included the Pearls of Wisdom Storytellers, Peter Benfaremo (\"The Lemon Ice King of Corona\"), Jim Power (\"New York's Mosaic Man\"), [6 and Renee Flowers (original member of the Gowanus Wildcats Girls Drill Team). [7 Honorees covered by The New York Times include the Harlem Blues and Jazz Band (1997), the Bronx Old Timers Stickball League (1997), and Tariq Hamad (1998), founder of the first Indian sweet shop in New York. In 2019, the People\u2019s Hall of Fame honored Waterfront Heroes, local artists and activists working to preserve the New York Harbor including Naima Rauam for painting the poetry of the Fulton Fish Market; David Sharps, founder of the Waterfront Museum on a barge he personally dredged from the Hudson; Conrad Milster, a steam whistle collector from Brooklyn who started a 50-year New Year's Eve steam whistle blowing tradition in Brooklyn; and Samir Faraq, founder of Staten Island's Museum of Maritime Navigation Communication and collector of forgotten maritime paraphernalia. Children playing a traditional game on the streets of NYC, photographed by Martha Cooper City Lore\u2019s first urban folklore initiative was to document New York City street games. The City Play exhibit opened at the Museum of the City of New York in 1988, and the book, City Play was published by Rutgers University Press in 1992. In 2016, City Lore and Public Art Films released Let\u2019s Get the Rhythm: the Life and Times of Miss Mary Mack, directed by Irene Chagall, and coproduced by Steve Zeitlin and Irene Chagall. The New York Times writes \u201cAs it swings between games and interviews, \u201cLet\u2019s Get the Rhythm\u201d has a beat; its incandescent musicality brings this hand-clapping universe to life.\u201d In 1996, City Lore worked with activist Susie Tanenbaum and the Street Performers Advocacy Project to publish Know Your Rights! A Guide for Subway Performers pamphlet, now online, offering street performers the first look at their constitutional right to perform on subway platforms. The Guide has been in use by performers ever since. Place Matters %DIFDELCMD < %DIFDELCMD < %%% Empire Roller Rink, Birthplace of Roller Disco, archived by Place Matters In 1988, City Lore established the \u201cEndangered Spaces\u201d project to advocate for local establishments and landmarks that were disappearing from the New York City landscape. In 1996, City Lore joined a new Task Force on Historical and Cultural Landmarks run by Ned Kaufman at the Municipal Art Society (MAS) and sponsored the conference \u201cHistory Happened Here\u201d at the Museum of the City of New York in 1998. Two years later, Place Matters was formally established by Ned Kaufman, Steve Zeitlin, and Marci Reaven, with Laura Hansen as the director. Based at City Lore, Place Matters aims to broaden the ways that preservation is understood and practiced by offering alternative ways of identifying, interpreting, celebrating, and ultimately protecting places that matter. In 2001, City Lore successfully nominated Bohemian Hall, still a vibrant community center/beer garden started by Czech immigrants in Astoria, Queens, the Casa Amadeo Music Store, the oldest, continuously occupied Latin music store in New York City, and the former Culyer Presbyterian Church, a center of Mohawk life in North Gowanus (Boerum Hill), as census sites to the National Register of Historic Places. Since then, there have been over 800 nominations from the public for City Lore\u2019s Census of Places that Matter, including parks, historic sites, public art, bars, community gardens, industrial sites, and storefronts. In 2006, the Rutgers University Press published Hidden New York: A Guide to Places that Matter. A year later, Place Matters, the Lower East Side Tenement Museum, and the Lower East Side Preservation Project presented the experiences of past and present Lower East Siders in a place-marking project called Your Guide to the Lower East Side. The initiative included twenty-eight signs at six separate sidewalk locations that featured photographs and text in five languages. These \u201cplace markers\u201d weave personal stories and cherished memories directly into the landscape, often right where the stories took place. The signs reveal the rich and diverse layers of human experience that make the neighborhood so distinctive. They transform the participants' stories of struggle and achievement into a legacy for all who pass by. Molly Garfinkel became the director of Place Matters in 2011, and, since then the program has expanded to include advocacy for community anchor sites across the nation, history-based public art projects in Baldwinsville, NY and greater Syracuse area, and policy-oriented campaigns around culturally-competent historic preservation protocols. Her 2019 essay Place Matters: Rooting Conservation in Community was published in the Journal of American Folklore. Place Matters continues to welcome nominations to the Census of Places that Matter. Arts in Education Since 1986, City Lore has brought folk and community-based artists into New York City \u2019s public schools reaching thousands of students each year students each year. Beginning as a partnership with Arts Connection, City Lore\u2019s education program has grown to be a centerpiece of the organization\u2019s work. In 2019-2020 , the organization partnered with 15 schools to provide arts instruction for approximately 7,800 students in grades K-12 in a variety of art forms in the visual, literary, performing, and new media arts. An early inspiration was an essay by Barbara Kirshenblatt-Gimblett, \u201cAn Accessible Aesthetic\u201d: A major factor in effective education is the integration of what is learned in the school with the experiences children have in their homes and communities. An equal challenge is the integration of the culture of the community into the curriculum. While we want our children to be exposed to a variety of art forms and cultures, we do not want them to be alienated for their birthright, their own heritage. And their own heritage is valuable, not only because it is their own, but also because of the importance of a strong indigenous culture to the coherence of community life. City Lore\u2019s teaching artists mirror the diversity of New York City\u2019s public schools, and the organization works with partner schools `to customize arts residencies so that they relate the schools\u2019 populations and integrate with their curricula. City Lore\u2019s arts programs have brought Mexican, Ecuadorian, Egyptian, Ivorian, Cuban, Haitian, Peruvian, South African, and Brazilian artists into the schools. Recent initiatives include: Roots, Routes, Rhythms, an initiative that engages students in grades 3 through 8 from five Queens partner schools in exploring the roots of music and dance traditions in their boroughs and neighborhoods. From Homer to Hip Hop: Oral Traditions as a Gateway to Literature and Literacy, a new program which introduces students in grades 3 and 8 in two elementary and two middle schools in Queens to world poetry traditions, including sung poetry. Urban Explorers, a year-round after school program, including Saturdays and summer, that engages 26 youth in grades 6 to 12 in multi-media storytelling about and advocating for New York City\u2019s grassroots cultures, while supporting their in-school education. KickFlip, an interest-driven, connected learning program implemented 2013-2015 designed to engage teen skateboarders and help them develop filmmaking, game design and coding skills to develop projects relating to their sport. City Lore\u2019s education programs also have a national outreach. The organization helped organize a national conference in 1993 at the National Endowment for the Arts, and served as the sponsor and incubator for Local Learning: the National Network for Folk Arts in Education. City Lore cosponsored the newsletter CARTS (Cultural Arts Resources for Teachers and Students) Newsletter. City Lore contributes regularly to Local Learning's publication, Journal of Folk Arts in Education. Grassroots Poetry Poetry plays a key role in New York\u2019s ethnic and cultural communities. For many immigrant communities, poetry is the most accessible and profound way for people to express themselves. Every community in New York City has its poets. City Lore is committed to finding ways to give these poets voice, finding the venues and formats for them to convey their artistry to their own communities and to the city at large, often finding new and innovative ways to communicate across languages. City Lore was inspired to create the People\u2019s Poetry initiative because, while some groups are dedicated to traditional music and many to literary poetry, no other organization was systematically presenting the diverse oral poetry traditions of New York City, the U.S. and beyond. The People\u2019s Poetry Project grew out of the People\u2019s Poetry Gathering, held in 1999, 2001, 2003 with Poets House, and in 2006 with Bowery Arts + Science, to bring together folk, ethnic, inner city, and literary poets. During these festivals in 1999, 2001, 2003, and 2006, Lower Manhattan was transformed into a poetry village for three days. The People\u2019s Poetry Gathering was one of the highest profile poetry events in the United States and had an average audience of 10,000. In 2003, Poet Laureate, Billy Collins, wrote an insightful essay on the ballad for The New York Times on the festival\u2019s opening day; and City Lore hosted a special conference and concert honoring Alan Lomax for his contribution to folk music and poetry. Beowulf and Sundiata were among the works featured. In the aftermath of September 11, 2001 attacks, City Lore found and collected anonymous poems and other writings that had been left at memorials, hospitals and gathering places throughout the city. Through these actions, City Lore played a major role in documenting the shrines and memorials that cropped up after 9/11. A selection of these anonymous poems was published in the book, Words In Your Face: A Guided Tour Through Twenty Years of the New York City Poetry Slam. and appeared in Steve Zeitlin's essay, \"Oh Did You See the Ashes Come Thickly Falling Down. In 2006, the People\u2019s Poetry Gathering featured poetry from the world\u2019s endangered languages. This inspired Bob Holman and Steve Zeitlin to begin work on a tribute to the world\u2019s endangered languages, a world \u201ccento\u201d (stitched together) poem in which each line came from a different endangered language. In 2013, the Festival of American Folklife in Washington DC hosted Khonsay: Poem of Many Tongues as an exhibit. The poem and subsequent film with Bob Holman would go on to serve as the subject of a tribute and call to action to preserve the worlds endangered languages, which premiered at the Margaret Meade Film Festival, and can be viewed online with extensive background information and a call for language preservation.The City Lore PoeMobile in action In 2010, City Lore and Bowery Arts + Science received a grant from the Rockefeller Foundation to launch the POEMobile that projects poems onto walls and building in tandem with live readings in New York City Neighborhoods. The POEMobile has traveled to Persian, Greek, Portuguese, Haitian, Dominican, Korean, as well as Yiddish-speaking neighborhoods, and also performed work with youth poets from Urban Word. In 2018, the POEMobile projected poems on to the steam rising up from New York City manholes to express the evanescence of life. Urban Music and Dance Children Breakdancing in NYC, photographed by Martha Cooper Prior to its founding in 1986, City Lore\u2019s predecessor, the New York City Chapter of the New York Folklore Society sponsored \" Music from the Islands: Puerto Rico, Cuba, and New York \" at El Museo de Barrio, initiating a longstanding commitment to Latino music traditions. City Lore served as first fiscal sponsor for Puerto Rican Bomba and Plena band, Los Pleneros de la 21, whose director Juan Guti\u00e9rrez won a National Heritage Award from the National Endowment for the Arts in 1996. In 2006 , City Lore completed the documentary film From Mambo to Hip Hop, which won an Alma Award for Best Documentary that same year. In 2016, the organization sponsored Mathew Rodriguez Warrens\u2019 doc, We Like It Like That: the Story of Latin Boogaloo. Elena Martinez coproduced both films, and was tapped by WHEDco (Women\u2019s Housing and Urban Development) to spearhead along with Grammy-nominated bandleader Bobby Sanabria, the Bronx Music Heritage Lab and the new cultural center, The Bronx Music Heritage Center, opening in 2020. In 1995, City Lore, working with folklorist Ray Allen, completed the Grassroots Gospel Initiative, recording acapella gospel quartet music in the borough's and releasing an LP. In 2006, Funds were raised by City Lore to support Peter Siegel's project to restore and issue tapes he made in the 1960s of folk music concerts by Mississippi John Hurt, The Carter Family, Jesse Fuller, Bill Monroe, and others. The recordings became the box set Friends of Old Time Music released by Smithsonian Folkways.[10] The box set was named one of the 10 best box sets of 2006 by The New York Times. Urban Culture Exhibitions Beginning with the opening of the exhibit City Play at the Museum of the City of New York (MCNY) in 1988, City Lore has developed public exhibitions about New York City \u2013 and America\u2019s \u2013 folk culture. In 1993 , City Lore curated the exhibit Welcome to Your Second Home: New York City\u2019s Ethnic Social Clubs at MCNY. In 2002, City Lore researched and curated Missing: Streetscape of a City in Mourning about the shrines and memorials that cropped up on New York City Streets after September 11. In 2005, City Lore developed the traveling exhibit and accompanying book, Weavings of War: Fabrics of Memory which featured the work of women textile artists from Central Asia, Southeast Asia, Latin America, and South Africa featured at The Puffin Gallery. In 2012, City Lore curated the outdoor exhibit, Your Guide to the Lower East Side. The House under the Roller Coaster, made famous by Woody Allen in Annie Hall, demolished in 2000. Photo by Hazel Hankin Nathan's Original Hot Dogs on Coney Island, archived by Place Matters In 1988, City Lore presented oral histories of Coney Island on the boardwalk. In 1991, folklorist Steve Zeitlin suggested to Dick Zigun at Coney Island USA that, rather than trying performance art, they should bring a traditional old time sideshow, which Zeitlin had brought to the Smithsonian\u2019s Folklife Festival a few years earlier, to Coney. The sideshow has run continuously to this day. In 2017, City Lore presented the exhibit Boardwalk Renaissance: How the Arts Saved Coney Island. In 2014, City Lore opened its own storefront gallery at 56 E. First Street. Exhibits have included Mother Tongues: Endangered Languages Spoken in New York City and Beyond (2015); What We Bring: New Immigrant Gifts (2018); and Bama and Pistol: Pioneers of Subway Graffiti (2019). In 2017, City Lore and Poets House curated the traveling exhibit Poetic Voices of the Muslim World, that travelled to public libraries in 12 cities Special projects %DIFDELCMD < %DIFDELCMD < %%% City Lore produces documentary films and collaborates with filmmakers whose work relates to the organization's mission. Award-winning films include Ric Burns' Coney Island and the five-part series New York: A Documentary Film; City of Dreams, a film about women artists in New York City; From Mambo to Hip Hop, [11 a documentary which traces the history of music in the South Bronx; and DeAf Jam, which highlights the poetry and storytelling of the deaf performed in American Sign Language. In 2017, City Lore teamed up with the Nurse Practitioner Healthcare Foundation is Seattle to create From Heritage to Health: An Art\u2013Centered Approach to Cultural Competence (H2H), a multi-year project that highlights the ways in which storytelling and the arts can inform the diverse practices of medical professionals. H2H includes a learner needs assessment, public and professional presentations, eLearning courses, and other forms of educational outreach that enhance cultural competency in healthcare . In 2019, City Lore became host to American Lore Theater and premiered the original play Salt Water People about the Bonacker Baymen of Long Island. Notable works and awards In 2002, City Lore successfully nominated three cultural heritage sites from under-recognized communities to the National Register: Casa Amadeo Record Store, Bohemian Hall, and Cuyler Church used by the Mohawk community in Brooklyn. On 2004, Mayor Michael R. Bloomberg officially proclaimed November 18 to be People's Hall of Fame Day in the City of New York, saying \"In a city with 8 million stories to tell, some of the most fascinating tales are lost in the glorious din. Founded in 1986, City Lore is dedicated to amplifying the compelling but often unheard voices that make New York great. Through an engaging series of programs and publications, City Lore reveals the true richness of our cultural heritage. One of the organization\u2019s signature events is the annual People's Hall of Fame Awards, which eschews the glare of popular celebrity in favor of the more luminescent glow of inspiration and integrity .\" Proclamation, Office of the Mayor, Michael R. Bloomberg, November 18, 2004 On Marcy 29, 2007, Mayor Bloomberg proclaimed another City Lore People's Hall of Fame Day in recognition of the tenth class of honorees.Proclamation, Office of the Mayor, Michael R. Bloomberg, March 29, 2007 In 2007 City Lore\u2019s Founder Steve Zeitlin was awarded the Benjamin Botkin Award by the American Folklore Society for lifetime achievement in public folklore; in 2019, City Lore\u2019s Director of Arts in Education Amanda Dargan also received the award. In 2016, City Lore received the Isidore Starr Award for excellence in from the National Council for the Social Studies and American Federation of Teachers. In 2009, City Lore\u2019s arts education programs were highlighted in The Qualities of Quality: Understanding Excellence in Arts Education published by Harvard University\u2019s Project Zero. References External links City Lore City of Memory People's Poetry Project Category:American folklore Category:Storytelling organizations Category:Preservation (library and archival science) Category:Organizations based in New York City Category:Culture of New York City Category:Organizations established in 1986 Category:1986 establishments in New York (state", "edit_actions": [{"type": "R", "before": ": the New YorkCenter for Urban Culture was founded in 1986 and was", "after": ", New York's center for urban folk culture, founded in 1985, is", "start_char_pos": 10, "end_char_pos": 76}, {"type": "R", "before": "Their mission is to produce programs and publications that convey the richness of", "after": "alt=|Children Playing New York Street Games photographed by Martha Cooper alt=|Sahadi's Middle Eastern Grocery, photographed by Martha Cooper With a mission to foster", "start_char_pos": 308, "end_char_pos": 389}, {"type": "R", "before": "\u2014and America's \u2014", "after": "\u2013 and America\u2019s \u2013", "start_char_pos": 404, "end_char_pos": 420}, {"type": "R", "before": ". In addition to regular programming that includes the Place Matters Awards and", "after": "through education and public programs, City Lore encompasses a Lower East Side gallery space, performances, lectures,", "start_char_pos": 446, "end_char_pos": 525}, {"type": "R", "before": "the organization", "after": "a POEMobile that projects poems onto walls and buildings, and education programs throughout the five boroughs. City Lore documents, presents, and advocates for New York City\u2019s grassroots cultures to ensure their living legacy in stories and histories, places and traditions. The organization also", "start_char_pos": 553, "end_char_pos": 569}, {"type": "R", "before": "City Lore works in four cultural domains: urban folklore and history, preservation, arts in education, and grassroots poetry traditions. Described", "after": "Described as \u201cwise renegades\u201d", "start_char_pos": 794, "end_char_pos": 940}, {"type": "R", "before": "of the September 11th Memorial Museum as \"wise renegades, \" their programs include People's Poetry Project, Place Matters (in collaboration with the Municipal Arts Society) and City of Memory", "after": ", the group has also been described as a \u201cpractical application of a utopian endeavor\u201d by the writer Marc Kaminsky. In a March 21, 2020 article in The Wall Street Journal, Steve Zeitlin notes, \u201cWe believe in grassroots creativity as a redeeming force in society and a symbol of the irrepressible nature of the human spirit.\u201d", "start_char_pos": 960, "end_char_pos": 1151}, {"type": "A", "before": null, "after": "Since 2013, City Lore has been headquartered at 56 East 1st Street on the historic Lower East Side of New York. The building holds offices, a gallery, and a multicultural library for teachers and researchers. In 2019, City Lore became an official Smithsonian Affiliate, one of only 6 affiliates in New York City", "start_char_pos": 1152, "end_char_pos": 1152}, {"type": "R", "before": "consists", "after": "has consisted", "start_char_pos": 1484, "end_char_pos": 1492}, {"type": "D", "before": "Steve Zeitlin, the", "after": null, "start_char_pos": 1523, "end_char_pos": 1541}, {"type": "A", "before": null, "after": "Steve Zeitlin", "start_char_pos": 1573, "end_char_pos": 1573}, {"type": "A", "before": null, "after": "playwrights (Jake Rosenberg, Raquel Almazan)", "start_char_pos": 1723, "end_char_pos": 1723}, {"type": "R", "before": "Projects and programs", "after": "Founding November, 1985, folklorist Steve Zeitlin founded City Lore, and the organization received full non-profit status. Prior to founding City Lore, Steve Zeitlin worked for eight years as a folklorist for the Smithsonian Institution\u2019s Festival of American Folklife. In 1979, the New York City Chapter of the New York Folklore Society, led by Dr. Barbara Kirshenblatt Gimblett, Nancy Groce and others, sponsored the first of three conferences on New York City Folklore. Zeitlin, who participated in the conferences, moved to New York in 1981, and, in 1983, became the President of the New York City Chapter of the New York Folklore Society. City Lore\u2019s first program was a tribute to late anthropologist Barbara Myerhoff in September, 1985. In 1986 moved into offices at 72 E. First Street on the Lower East Side. In 1986, the organization held the first City Lore Festival in Central Park staged in tandem with the first Central Park Summerstage.", "start_char_pos": 1777, "end_char_pos": 1798}, {"type": "R", "before": "Urban folklore", "after": "Approach to Folklore City Lore founder Steve Zeitlin City Lore's Founder Dr. Steve Zeitlin has said that City Lore has: an \"open mission to document and present New York City and America's living cultural heritage. Living cultural heritage used by folklorists to suggest the documentation, interpretation, and presentation of traditions within living memory, as opposed to events that predate living memory, and are, in a sense, purely historical. The original impetus for the discipline of folklore in the 19th century was the notion of collecting myths and legends as \"survivals\" from an earlier age, but City Lore is very present oriented. It's not only about capturing the past, it's about using an arts perspective to look at life itself. And to see the present in a slightly more vivid and interested and compelling way by looking at the artistic impulse in everyday life. Folklorists distinguish themselves from historians and from cultural anthropologists, because of the attention they pay to the aesthetic dimensions of history and culture.\"", "start_char_pos": 1799, "end_char_pos": 1813}, {"type": "A", "before": null, "after": "2", "start_char_pos": 1814, "end_char_pos": 1814}, {"type": "R", "before": "The City Lore office on First Avenue", "after": "According to Zeitlin, City Lore is \u201ctradition inspired but not tradition bound, and we are all about the redemptive power of grassroots creativity.\" Working across so many arenas of life, the organization has been described as a \u201cfull court press\u201d on what became the tag line for the organization: the art of everyday life.", "start_char_pos": 1815, "end_char_pos": 1851}, {"type": "A", "before": null, "after": "In a formal evaluation by the Artography initiative of Leveraging Investments in Creativity (LINC) funded by the Ford Foundation, Dr. William Westerman writes:", "start_char_pos": 1852, "end_char_pos": 1852}, {"type": "A", "before": null, "after": "It\u2019s hard to understand what City Lore does in terms of art-making without first understanding how folklorists think of the concept of art. It is as if in Western society what is seen as the arts is equivalent to the visible light in the spectrum, whereas folklorists see the art across the whole spectrum, from ultraviolet to infrared. That full range of creative expression is what concerns the mission of City Lore, and it includes history and memory, language and religion, food and gardens, lace and place.", "start_char_pos": 1853, "end_char_pos": 1853}, {"type": "A", "before": null, "after": "The difference between City Lore and other arts programs is not simply that the arts presented are folk and traditional arts, but that City Lore\u2019s arts are traditional and modern, and a great deal of the artmaking takes place in the collaborations of different cultural organizations and artists, and in the ties between the traditional and the way that contemporary New Yorkers use and adapt their traditions in their current work, whether they are professionals or schoolchildren. In this way, musical and poetic forms that build on traditional genres \u2013 including hip-hop, mambo,and spoken word \u2013 are part of a continuum of artistic practice that recognizes and builds upon deep genealogical connections to the past without being bound by them. It is in this way that City Lore\u2019s work gets far beyond nostalgia, because the thrust is always forward-looking, not referring to what once was and could never be again, but building creatively with respect for the cultural foundations that exist.", "start_char_pos": 1854, "end_char_pos": 1854}, {"type": "A", "before": null, "after": "3", "start_char_pos": 1855, "end_char_pos": 1855}, {"type": "A", "before": null, "after": "Programs and Series City Lore works in four cultural domains: urban folklore and history, preservation, arts in education, and grassroots poetry traditions. In addition, City Lore undertakes special projects in keeping with its mission, and serves as a fiscal sponsor for filmmakers and other cultural specialists.", "start_char_pos": 1856, "end_char_pos": 1856}, {"type": "A", "before": null, "after": "Urban folklore The City Lore archives at 56 E. First Street", "start_char_pos": 1857, "end_char_pos": 1857}, {"type": "R", "before": "archives containing over 100,000 images", "after": "12,685 images by photographer Martha Cooper and 5,634 by Katrina Thomas. The total with other photographers was 19", "start_char_pos": 1888, "end_char_pos": 1927}, {"type": "R", "before": "hundreds of", "after": "320 images. The archive also includes 5,210 photographic negatives, 692 cassette tapes, 143 dat tapes, 163 mini DV tapes and 148 VHS tapes including", "start_char_pos": 1930, "end_char_pos": 1941}, {"type": "R", "before": "Mooney, Jake. \"Their New York,Lost and Sometimes Found\" New York Times, 8 June 2008. The archives are part of the ongoing documentationproject featured on City of Memory, a participatory online", "after": "4", "start_char_pos": 2010, "end_char_pos": 2203}, {"type": "A", "before": null, "after": "City Lore has over 800 digital video clips highlighting urban folklore subjects. Described as a \u201cliving archive,\u201d the repository comes alive as it serves to inspire new public programs and continued documentation.", "start_char_pos": 2204, "end_char_pos": 2204}, {"type": "A", "before": null, "after": "City Lore is a pioneer in cultural story mapping. In 2008, it launched City of Memory (cityofmemory.org), a", "start_char_pos": 2205, "end_char_pos": 2205}, {"type": "A", "before": null, "after": "written about in the volume Letting Go: Sharing Authority in a User Generated World. Designed with Flash technology by Local Projects, the map has been complemented with City Lore\u2019s new Youtube based storymap designed by ESRI.Tariq Hamad at his sweet shop", "start_char_pos": 2228, "end_char_pos": 2228}, {"type": "D", "before": ".", "after": null, "start_char_pos": 2234, "end_char_pos": 2235}, {"type": "D", "before": "City", "after": null, "start_char_pos": 2236, "end_char_pos": 2240}, {"type": "A", "before": null, "after": ", representing a token of esteem", "start_char_pos": 2441, "end_char_pos": 2441}, {"type": "D", "before": "Moynihan, Colin. \"With Few Luxuries, an Artist Sticks to It\" New York Times 12 December 2004", "after": null, "start_char_pos": 2591, "end_char_pos": 2683}, {"type": "A", "before": null, "after": "6", "start_char_pos": 2685, "end_char_pos": 2685}, {"type": "A", "before": null, "after": "7", "start_char_pos": 2765, "end_char_pos": 2765}, {"type": "A", "before": null, "after": "Honorees covered by The New York Times include the Harlem Blues and Jazz Band (1997), the Bronx Old Timers Stickball League (1997), and Tariq Hamad (1998), founder of the first Indian sweet shop in New York.", "start_char_pos": 2766, "end_char_pos": 2766}, {"type": "R", "before": "City Lore created", "after": "In 2019, the People\u2019s Hall of Fame honored Waterfront Heroes, local artists and activists working to preserve the New York Harbor including Naima Rauam for painting the poetry of the Fulton Fish Market; David Sharps, founder of the Waterfront Museum on a barge he personally dredged from the Hudson; Conrad Milster, a steam whistle collector from Brooklyn who started a 50-year New Year's Eve steam whistle blowing tradition in Brooklyn; and Samir Faraq, founder of Staten Island's Museum of Maritime Navigation", "start_char_pos": 2767, "end_char_pos": 2784}, {"type": "A", "before": null, "after": "Communication and collector of forgotten maritime paraphernalia. Children playing a traditional game on the streets of NYC, photographed by Martha Cooper City Lore\u2019s first urban folklore initiative was to document New York City street games. The City Play exhibit opened at the Museum of the City of New York in 1988, and the book, City Play was published by Rutgers University Press in 1992. In 2016, City Lore and Public Art Films released Let\u2019s Get the Rhythm: the Life and Times of Miss Mary Mack, directed by Irene Chagall, and coproduced by Steve Zeitlin and Irene Chagall. The New York Times writes \u201cAs it swings between games and interviews, \u201cLet\u2019s Get the Rhythm\u201d has a beat; its incandescent musicality brings this hand-clapping universe to life.\u201d", "start_char_pos": 2785, "end_char_pos": 2785}, {"type": "A", "before": null, "after": "In 1996, City Lore worked with activist Susie Tanenbaum and the Street Performers Advocacy Project to publish", "start_char_pos": 2786, "end_char_pos": 2786}, {"type": "R", "before": ", a guide for street performers.", "after": "A Guide for Subway Performers pamphlet, now online, offering street performers the first look at their constitutional right to perform on subway platforms. The Guide has been in use by performers ever since.", "start_char_pos": 2805, "end_char_pos": 2837}, {"type": "R", "before": "Since its inception, City Lore has served as an", "after": "Empire Roller Rink, Birthplace of Roller Disco, archived by Place Matters In 1988, City Lore established the \u201cEndangered Spaces\u201d project to", "start_char_pos": 2882, "end_char_pos": 2929}, {"type": "R", "before": "landmarks through the Place Matters program in collaboration with Municipal Arts Society . There have been over 650 nominations from the public, including parks, historic sites, public art, beer gardens, industrial sites, and stores.", "after": "establishments and landmarks that were disappearing from the New York City landscape. In 1996, City Lore joined a new Task Force on Historical and Cultural Landmarks run by Ned Kaufman at the Municipal Art Society (MAS) and sponsored the conference \u201cHistory Happened Here\u201d at the Museum of the City of New York in 1998. Two years later, Place Matters was formally established by Ned Kaufman, Steve Zeitlin, and Marci Reaven, with Laura Hansen as the director. Based at City Lore, Place Matters aims to broaden the ways that preservation is understood and practiced by offering alternative ways of identifying, interpreting, celebrating, and ultimately protecting places that matter.", "start_char_pos": 2949, "end_char_pos": 3182}, {"type": "R", "before": "they", "after": "City Lore", "start_char_pos": 3192, "end_char_pos": 3196}, {"type": "D", "before": "and", "after": null, "start_char_pos": 3328, "end_char_pos": 3331}, {"type": "A", "before": null, "after": "and the former Culyer Presbyterian Church, a center of Mohawk life in North Gowanus (Boerum Hill),", "start_char_pos": 3431, "end_char_pos": 3431}, {"type": "R", "before": "The organization has funding from the Dutch government for an outdoor exhibit in Lower Manhattan commemorating the Quadricentennial of Henry Hudson's voyage with signage marking key sitesin New Amsterdam.", "after": "Since then, there have been over 800 nominations from the public for City Lore\u2019s Census of Places that Matter, including parks, historic sites, public art, bars, community gardens, industrial sites, and storefronts.", "start_char_pos": 3493, "end_char_pos": 3697}, {"type": "R", "before": "City Lore", "after": "the Rutgers University Press", "start_char_pos": 3707, "end_char_pos": 3716}, {"type": "A", "before": null, "after": "A year later, Place Matters, the Lower East Side Tenement Museum, and the Lower East Side Preservation Project presented the experiences of past and present Lower East Siders in a place-marking project called Your Guide to the Lower East Side. The initiative included twenty-eight signs at six separate sidewalk locations that featured photographs and text in five languages. These \u201cplace markers\u201d weave personal stories and cherished memories directly into the landscape, often right where the stories took place. The signs reveal the rich and diverse layers of human experience that make the neighborhood so distinctive. They transform the participants' stories of struggle and achievement into a legacy for all who pass by.", "start_char_pos": 3775, "end_char_pos": 3775}, {"type": "A", "before": null, "after": "Molly Garfinkel became the director of Place Matters in 2011, and, since then the program has expanded to include advocacy for community anchor sites across the nation, history-based public art projects in Baldwinsville, NY and greater Syracuse area, and policy-oriented campaigns around culturally-competent historic preservation protocols. Her 2019 essay Place Matters: Rooting Conservation in Community was published in the Journal of American Folklore. Place Matters continues to welcome nominations to the Census of Places that Matter.", "start_char_pos": 3776, "end_char_pos": 3776}, {"type": "R", "before": "City Lore develops and implements arts residencies and offers professional development to", "after": "Since 1986, City Lore has brought folk and community-based artists into", "start_char_pos": 3795, "end_char_pos": 3884}, {"type": "R", "before": "public schools. In response to requests of public school teachers with increasing Bengali and Bangladeshi populations", "after": "\u2019s public schools reaching thousands of students each year students each year. Beginning as a partnership with Arts Connection, City Lore\u2019s education program has grown to be a centerpiece of the organization\u2019s work. In 2019-2020", "start_char_pos": 3899, "end_char_pos": 4016}, {"type": "R", "before": "designed artist residencies in Queens, funded by the United States Department of Education to teach traditional Bengali scroll painting. City Lore has designed similar programs bringing", "after": "partnered with 15 schools to provide arts instruction for approximately 7,800 students in grades K-12 in a variety of art forms in the visual, literary, performing, and new media arts. An early inspiration was an essay by Barbara Kirshenblatt-Gimblett, \u201cAn Accessible Aesthetic\u201d:", "start_char_pos": 4036, "end_char_pos": 4221}, {"type": "A", "before": null, "after": "A major factor in effective education is the integration of what is learned in the school with the experiences children have in their homes and communities. An equal challenge is the integration of the culture of the community into the curriculum. While we want our children to be exposed to a variety of art forms and cultures, we do not want them to be alienated for their birthright, their own heritage. And their own heritage is valuable, not only because it is their own, but also because of the importance of a strong indigenous culture to the coherence of community life.", "start_char_pos": 4222, "end_char_pos": 4222}, {"type": "A", "before": null, "after": "City Lore\u2019s teaching artists mirror the diversity of New York City\u2019s public schools, and the organization works with partner schools `to customize arts residencies so that they relate the schools\u2019 populations and integrate with their curricula. City Lore\u2019s arts programs have brought", "start_char_pos": 4223, "end_char_pos": 4223}, {"type": "R", "before": "People's Poetry Project", "after": "Recent initiatives include:", "start_char_pos": 4345, "end_char_pos": 4368}, {"type": "A", "before": null, "after": "Roots, Routes,", "start_char_pos": 4369, "end_char_pos": 4369}, {"type": "A", "before": null, "after": "Rhythms, an initiative that engages students in grades 3 through 8 from five Queens partner schools in exploring the roots of music and dance traditions in their boroughs and neighborhoods. From Homer to Hip Hop: Oral Traditions as a Gateway to Literature and Literacy, a new program which introduces students in grades 3 and 8 in two elementary and two middle schools in Queens to world poetry traditions, including sung poetry. Urban Explorers, a year-round after school program, including Saturdays and summer, that engages 26 youth in grades 6 to 12 in multi-media storytelling about and advocating for New York City\u2019s grassroots cultures, while supporting their in-school education. KickFlip, an interest-driven, connected learning program implemented 2013-2015 designed to engage teen skateboarders and help them develop filmmaking, game design and coding skills to develop projects relating to their sport. City Lore\u2019s education programs also have a national outreach. The organization helped organize a national conference in 1993 at the National Endowment for the Arts, and served as the sponsor and incubator for Local Learning: the National Network for Folk Arts in Education. City Lore cosponsored the newsletter CARTS (Cultural Arts Resources for Teachers and Students) Newsletter. City Lore contributes regularly to Local Learning's publication, Journal of Folk Arts in Education.", "start_char_pos": 4370, "end_char_pos": 4370}, {"type": "A", "before": null, "after": "Grassroots Poetry", "start_char_pos": 4371, "end_char_pos": 4371}, {"type": "A", "before": null, "after": "Poetry plays a key role in New York\u2019s ethnic and cultural communities. For many immigrant communities, poetry is the most accessible and profound way for people to express themselves. Every community in New York City has its poets. City Lore is committed to finding ways to give these poets voice, finding the venues and formats for them to convey their artistry to their own communities and to the city at large, often finding new and innovative ways to communicate across languages.", "start_char_pos": 4372, "end_char_pos": 4372}, {"type": "A", "before": null, "after": "City Lore was inspired to create the People\u2019s Poetry initiative because, while some groups are dedicated to traditional music and many to literary poetry, no other organization was systematically presenting the diverse oral poetry traditions of New York City, the U.S. and beyond. The People\u2019s Poetry Project grew out of the People\u2019s Poetry Gathering, held in 1999, 2001, 2003 with Poets House, and in 2006 with Bowery Arts + Science, to bring together folk, ethnic, inner city, and literary poets. During these festivals in 1999, 2001, 2003, and 2006, Lower Manhattan was transformed into a poetry village for three days. The People\u2019s Poetry Gathering was one of the highest profile poetry events in the United States and had an average audience of 10,000.", "start_char_pos": 4373, "end_char_pos": 4373}, {"type": "A", "before": null, "after": "2003, Poet Laureate, Billy Collins, wrote an insightful essay on the ballad for The New York Times on the festival\u2019s opening day; and City Lore hosted a special conference and concert honoring Alan Lomax for his contribution to folk music and poetry. Beowulf and Sundiata were among the works featured.", "start_char_pos": 4377, "end_char_pos": 4377}, {"type": "A", "before": null, "after": "In", "start_char_pos": 4378, "end_char_pos": 4378}, {"type": "A", "before": null, "after": "Through these actions, City Lore played a major role in documenting the shrines and memorials that cropped up after 9/11.", "start_char_pos": 4574, "end_char_pos": 4574}, {"type": "D", "before": "Aptowicz, Cristin O'Keefe. (2008). Words in Your Face: A Guided Tour Through Twenty Years of the New York City Poetry Slam. New York City: Soft Skull Press, 288. .", "after": null, "start_char_pos": 4728, "end_char_pos": 4891}, {"type": "D", "before": "Zeitlin, Steve.", "after": null, "start_char_pos": 4984, "end_char_pos": 4999}, {"type": "A", "before": null, "after": "In 2006, the People\u2019s Poetry Gathering featured poetry from the world\u2019s endangered languages. This inspired Bob Holman and Steve Zeitlin to begin work on a tribute to the world\u2019s endangered languages, a world \u201ccento\u201d (stitched together) poem in which each line came from a different endangered language. In 2013, the Festival of American Folklife in Washington DC hosted Khonsay: Poem of Many Tongues as an exhibit. The poem and subsequent film with Bob Holman would go on to serve as the subject of a tribute and call to action to preserve the worlds endangered languages, which premiered at the Margaret Meade Film Festival, and can be viewed online with extensive background information and a call for language preservation.The City Lore PoeMobile in action In 2010, City Lore and Bowery Arts + Science received a grant from the Rockefeller Foundation to launch the POEMobile that projects poems onto walls and building in tandem with live readings in New York City Neighborhoods. The POEMobile has traveled to Persian, Greek, Portuguese, Haitian, Dominican, Korean, as well as Yiddish-speaking neighborhoods, and also performed work with youth poets from Urban Word. In 2018, the POEMobile projected poems on to the steam rising up from New York City manholes to express the evanescence of life.", "start_char_pos": 5000, "end_char_pos": 5000}, {"type": "A", "before": null, "after": "Urban Music and Dance Children Breakdancing in NYC, photographed by Martha Cooper Prior to its founding in 1986, City Lore\u2019s predecessor, the New York City Chapter of the New York Folklore Society sponsored", "start_char_pos": 5001, "end_char_pos": 5001}, {"type": "R", "before": "Oh Did You See the Ashes Come Thickly Falling Down.", "after": "Music from the Islands: Puerto Rico, Cuba, and New York", "start_char_pos": 5004, "end_char_pos": 5055}, {"type": "R", "before": "Spontaneous Shrines and the Public Memorialization of Death.Ed. Jack Santino. New York: Palgrave Macmillan,", "after": "at El Museo de Barrio, initiating a longstanding commitment to Latino music traditions. City Lore served as first fiscal sponsor for Puerto Rican Bomba and Plena band, Los Pleneros de la 21, whose director Juan Guti\u00e9rrez won a National Heritage Award from the National Endowment for the Arts in 1996.", "start_char_pos": 5058, "end_char_pos": 5165}, {"type": "A", "before": null, "after": "In", "start_char_pos": 5166, "end_char_pos": 5166}, {"type": "A", "before": null, "after": ", City Lore completed the documentary film From Mambo to Hip Hop, which won an Alma Award for Best Documentary that same year. In 2016, the organization sponsored Mathew Rodriguez Warrens\u2019 doc, We Like It Like That: the Story of Latin Boogaloo. Elena Martinez coproduced both films, and was tapped by WHEDco (Women\u2019s Housing and Urban Development) to spearhead along with Grammy-nominated bandleader Bobby Sanabria, the Bronx Music Heritage Lab and the new cultural center, The Bronx Music Heritage Center, opening in 2020.", "start_char_pos": 5172, "end_char_pos": 5172}, {"type": "R", "before": "Founded", "after": "In 1995, City Lore, working with folklorist Ray Allen, completed the Grassroots Gospel Initiative, recording acapella gospel quartet music in the borough's and releasing an LP. In 2006, Funds were raised", "start_char_pos": 5173, "end_char_pos": 5180}, {"type": "R", "before": "and Poets House in 1999, The People's Poetry Gathering was created to present the diverse oral poetry traditions of New York City. In 2003", "after": "to support Peter Siegel's project to restore and issue tapes he made in the 1960s of folk music concerts by Mississippi John Hurt, The Carter Family, Jesse Fuller, Bill Monroe, and others. The recordings became the box set Friends of Old Time Music released by Smithsonian Folkways.", "start_char_pos": 5194, "end_char_pos": 5332}, {"type": "A", "before": null, "after": "10", "start_char_pos": 5333, "end_char_pos": 5333}, {"type": "A", "before": null, "after": "The box set was named one of the 10 best box sets of 2006 by The New York Times.", "start_char_pos": 5335, "end_char_pos": 5335}, {"type": "A", "before": null, "after": "Urban Culture Exhibitions", "start_char_pos": 5336, "end_char_pos": 5336}, {"type": "A", "before": null, "after": "Beginning with the opening of the exhibit City Play at the Museum of the City of New York (MCNY) in 1988, City Lore has developed public exhibitions about New York City \u2013 and America\u2019s \u2013 folk culture. In 1993", "start_char_pos": 5337, "end_char_pos": 5337}, {"type": "R", "before": "'s People's Poetry Project launched an initiative to document and disseminate poetry from endangered languages.", "after": "curated the exhibit Welcome to Your Second Home: New York City\u2019s Ethnic Social Clubs at MCNY.", "start_char_pos": 5350, "end_char_pos": 5461}, {"type": "A", "before": null, "after": "In 2002, City Lore researched and curated Missing: Streetscape of a City in Mourning about the shrines and memorials that cropped up on New York City Streets after September 11. In 2005, City Lore developed the traveling exhibit and accompanying book, Weavings of War: Fabrics of Memory which featured the work of women textile artists from Central Asia, Southeast Asia, Latin America, and South Africa featured at The Puffin Gallery. In 2012, City Lore curated the outdoor exhibit, Your Guide to the Lower East Side. The House under the Roller Coaster, made famous by Woody Allen in Annie Hall, demolished in 2000. Photo by Hazel Hankin Nathan's Original Hot Dogs on Coney Island, archived by Place Matters In 1988, City Lore presented oral histories of Coney Island on the boardwalk. In 1991, folklorist Steve Zeitlin suggested to Dick Zigun at Coney Island USA that, rather than trying performance art, they should bring a traditional old time sideshow, which Zeitlin had brought to the Smithsonian\u2019s Folklife Festival a few years earlier, to Coney. The sideshow has run continuously to this day. In 2017, City Lore presented the exhibit Boardwalk Renaissance: How the Arts Saved Coney Island.", "start_char_pos": 5462, "end_char_pos": 5462}, {"type": "A", "before": null, "after": "In 2014, City Lore opened its own storefront gallery at 56 E. First Street. Exhibits have included Mother Tongues: Endangered Languages Spoken in New York City and Beyond (2015); What We Bring: New Immigrant Gifts (2018); and Bama and Pistol: Pioneers of Subway Graffiti (2019). In 2017, City Lore and Poets House curated the traveling exhibit Poetic Voices of the Muslim World, that travelled to public libraries in 12 cities", "start_char_pos": 5463, "end_char_pos": 5463}, {"type": "R", "before": "Sponsored", "after": "Award-winning", "start_char_pos": 5631, "end_char_pos": 5640}, {"type": "D", "before": "Pareles, John. \"Mambo and Hip-Hop: Two Bronx Sounds, One Sense of Dignity\". New York Times 14 September 2006.", "after": null, "start_char_pos": 5818, "end_char_pos": 5927}, {"type": "A", "before": null, "after": "11", "start_char_pos": 5929, "end_char_pos": 5929}, {"type": "D", "before": "the forthcoming", "after": null, "start_char_pos": 6002, "end_char_pos": 6017}, {"type": "R", "before": "City Lore developed the traveling exhibit Weavings of War, which featured the work of women textile artists from Central Asia, Southeast Asia, Latin America, and South Africa", "after": "In 2017, City Lore teamed up with the Nurse Practitioner Healthcare Foundation is Seattle to create From Heritage to Health: An Art\u2013Centered Approach to Cultural Competence (H2H), a multi-year project that highlights the ways in which storytelling and the arts can inform the diverse practices of medical professionals. H2H includes a learner needs assessment, public and professional presentations, eLearning courses, and other forms of educational outreach that enhance cultural competency in healthcare", "start_char_pos": 6122, "end_char_pos": 6296}, {"type": "R", "before": "Funds were raised by City Lore to support Peter Siegel's project to restore and issue tapes he made in the 1960s of folk music concerts by Mississippi John Hurt, The Carter Family, Jesse Fuller, Bill Monroe, and others. The recordings became the box set Friends of Old Time Music released by Smithsonian Folkways in 2006 Ratliff, Ben", "after": "In 2019, City Lore became host to American Lore Theater and premiered the original play Salt Water People about the Bonacker Baymen of Long Island.", "start_char_pos": 6299, "end_char_pos": 6632}, {"type": "A", "before": null, "after": "Notable works and awards In 2002, City Lore successfully nominated three cultural heritage sites from under-recognized communities to the National Register: Casa Amadeo Record Store, Bohemian Hall, and Cuyler Church used by the Mohawk community in Brooklyn.", "start_char_pos": 6633, "end_char_pos": 6633}, {"type": "A", "before": null, "after": "On 2004, Mayor Michael R. Bloomberg officially proclaimed November 18 to be People's Hall of Fame Day in the City of New York, saying \"In a city with 8 million stories to tell, some of the most fascinating tales are lost in the glorious din. Founded in 1986, City Lore is dedicated to amplifying the compelling but often unheard voices that make New York great. Through an engaging series of programs and publications, City Lore reveals the true richness of our cultural heritage. One of the organization\u2019s signature events is the annual People's Hall of Fame Awards, which eschews the glare of popular celebrity in favor of the more luminescent glow of inspiration and integrity", "start_char_pos": 6634, "end_char_pos": 6634}, {"type": "R", "before": "Rounding Up the Best of the Boxed; Friends of Old Time Music -- The Folk Arrival, 1961-1965. \" New York Times 24 November 2006.", "after": "Proclamation, Office of the Mayor, Michael R. Bloomberg, November 18, 2004 On Marcy 29, 2007, Mayor Bloomberg proclaimed another City Lore People's Hall of Fame Day in recognition of the tenth class of honorees.Proclamation, Office of the Mayor, Michael R. Bloomberg, March 29, 2007", "start_char_pos": 6638, "end_char_pos": 6765}, {"type": "A", "before": null, "after": "In 2007 City Lore\u2019s Founder Steve Zeitlin was awarded the Benjamin Botkin Award by the American Folklore Society for lifetime achievement in public folklore; in 2019, City Lore\u2019s Director of Arts in Education Amanda Dargan also received the award.", "start_char_pos": 6766, "end_char_pos": 6766}, {"type": "A", "before": null, "after": "In 2016, City Lore received the Isidore Starr Award for excellence in from the National Council for the Social Studies and American Federation of Teachers. In 2009, City Lore\u2019s arts education programs were highlighted in The Qualities of Quality: Understanding Excellence in Arts Education published by Harvard University\u2019s Project Zero.", "start_char_pos": 6767, "end_char_pos": 6767}, {"type": "A", "before": null, "after": "External links City Lore City of Memory People's Poetry Project", "start_char_pos": 6779, "end_char_pos": 6779}, {"type": "A", "before": null, "after": "organizations", "start_char_pos": 6829, "end_char_pos": 6829}], "sents_char_pos": [0, 215, 251, 307, 447, 793, 930, 1154, 1275, 1465, 1776, 2009, 2023, 2094, 2235, 2607, 2763, 2837, 3039, 3182, 3492, 3697, 3774, 3914, 4172, 4344, 4573, 4727, 4754, 4851, 4983, 4999, 5055, 5118, 5135, 5324, 5461, 5630, 5733, 5794, 5832, 5893, 5927, 5997, 6121, 6298, 6518, 6672, 6730, 6765]}
+{"doc_id": "15135975", "revision_depth": "2", "before_revision": "City Lore , New York 's center for urban folk culture, founded in 1985, is the first organization in the United States devoted expressly to the \"documentation, preservation, and presentation of urban folk culture.\"American Folklore: An Encyclopedia. Brunvand, Jan Harold, ed. Garland Publishing, NY, 1996. alt=|Children Playing New York Street Games photographed by Martha Cooper alt=|Sahadi's Middle Eastern Grocery, photographed by Martha Cooper With a mission to foster New York City \u2013 and America\u2019s\u2013 living cultural heritage through education and public programs, City Lore encompasses a Lower East Side gallery space, performances, lectures, the People's Hall of Fame, a POEMobile that projects poems onto walls and buildings, and education programs throughout the five boroughs. City Lore documents, presents, and advocates for New York City\u2019s grassroots cultures to ensure their living legacy in stories and histories, places and traditions. The organization also works with a wide range of partners to develop exhibitions, publications, and documentary films, and to advocate for the rights of street performers, ethnic clubs, and other grassroots cultural expressions in New York City. Described as \u201cwise renegades\u201d by Sonnet Takahisa , the group has also been described as a \u201cpractical application of a utopian endeavor\u201d by the writer Marc Kaminsky. In a March 21,2020 article in The Wall Street Journal, Steve Zeitlin notes, \u201cWe believe in grassroots creativity as a redeeming force in society and a symbol of the irrepressible nature of the human spirit.\u201d Since 2013, City Lore has been headquartered at 56 East 1st Street on the historic Lower East Side of New York. The building holds offices, a gallery, and a multicultural library for teachers and researchers. In 2019, City Lore became an official Smithsonian Affiliate, one of only 6 affiliates in New York City . City Lore works collaboratively with folk and community artists, embracing different aesthetics for the creation of art. Their collaborators include the Gotham Center for New York City History, the New-York Historical Society, Bank Street College of Education, and smaller groups such as Los Pleneros de la 21. City Lore\u2019s staff has consisted of professional folklorists ( founder and executive director Steve Zeitlin , Elena Mart\u00ednez and Amanda Dargan), historians (Marci Reaven), photographers (Martha Cooper), ethnomusicologists (Roberta Singer and Lois Wilcken), playwrights (Jake Rosenberg, Raquel Almazan) and arts and education specialists (Anika Selhorst). Founding November, 1985, folklorist Steve Zeitlin founded City Lore, and the organization received full non-profit status. Prior to founding City Lore, Steve Zeitlin worked for eight years as a folklorist for the Smithsonian Institution\u2019s Festival of American Folklife. In 1979, the New York City Chapter of the New York Folklore Society, led by Dr. Barbara Kirshenblatt Gimblett, Nancy Groce and others, sponsored the first of three conferences on New York City Folklore. Zeitlin, who participated in the conferences, moved to New York in 1981, and, in 1983, became the President of the New York City Chapter of the New York Folklore Society. City Lore\u2019s first program was a tribute to late anthropologist Barbara Myerhoff in September, 1985. In 1986 moved into offices at 72 E. First Street on the Lower East Side. In 1986, the organization held the first City Lore Festival in Central Park staged in tandem with the first Central Park Summerstage. Approach to Folklore City Lore founder Steve Zeitlin City Lore's Founder Dr. Steve Zeitlin has said that City Lore has: an \"open mission to document and present New York City and America's living cultural heritage. Living cultural heritage used by folklorists to suggest the documentation, interpretation, and presentation of traditions within living memory, as opposed to events that predate living memory, and are, in a sense, purely historical. The original impetus for the discipline of folklore in the 19th century was the notion of collecting myths and legends as \"survivals\" from an earlier age, but City Lore is very present oriented. It's not only about capturing the past, it's about using an arts perspective to look at life itself. And to see the present in a slightly more vivid and interested and compelling way by looking at the artistic impulse in everyday life. Folklorists distinguish themselves from historians and from cultural anthropologists, because of the attention they pay to the aesthetic dimensions of history and culture.\" 2 According to Zeitlin, City Lore is \u201ctradition inspired but not tradition bound, and we are all about the redemptive power of grassroots creativity.\" Working across so many arenas of life, the organization has been described as a \u201cfull court press\u201d on what became the tag line for the organization: the art of everyday life. In a formal evaluation by the Artography initiative of Leveraging Investments in Creativity (LINC) funded by the Ford Foundation, Dr. William Westerman writes:%DIFDELCMD < %DIFDELCMD < %%% It\u2019s hard to understand what City Lore does in terms of art-making without first understanding how folklorists think of the concept of art. It is as if in Western society what is seen as the arts is equivalent to the visible light in the spectrum, whereas folklorists see the art across the whole spectrum, from ultraviolet to infrared. That full range of creative expression is what concerns the mission of City Lore, and it includes history and memory, language and religion, food and gardens, lace and place. The difference between City Lore and other arts programs is not simply that the arts presented are folk and traditional arts, but that City Lore\u2019s arts are traditional and modern, and a great deal of the artmaking takes place in the collaborations of different cultural organizations and artists, and in the ties between the traditional and the way that contemporary New Yorkers use and adapt their traditions in their current work, whether they are professionals or schoolchildren. In this way, musical and poetic forms that build on traditional genres \u2013 including hip-hop, mambo,and spoken word \u2013 are part of a continuum of artistic practice that recognizes and builds upon deep genealogical connections to the past without being bound by them. It is in this way that City Lore\u2019s work gets far beyond nostalgia, because the thrust is always forward-looking, not referring to what once was and could never be again, but building creatively with respect for the cultural foundations that exist.%DIFDELCMD < [%%% 3 Programs and Series City Lore works in four cultural domains: urban folklore and history, preservation, arts in education, and grassroots poetry traditions. In addition, City Lore undertakes special projects in keeping with its mission, and serves as a fiscal sponsor for filmmakers and other cultural specialists.%DIFDELCMD < %DIFDELCMD < %%% Urban folklore The City Lore archives at 56 E. First Street on the Lower East Side houses 12,685 imagesby photographer Martha Cooper and 5, 634 by Katrina Thomas. The total with other photographers was 19 , 320 images. The archive also includes 5,210 photographic negatives, 692 cassette tapes, 143 dat tapes, 163 mini DV tapes and 148 VHS tapes including oral histories, and traditional music and poetry performance tapes. %DIFDELCMD < [%%% 4 City Lore has over 800 digital video clips highlighting urban folklore subjects. Described as a \u201cliving archive, \u201d the repository comes alive as it serves to inspire new public programs and continued documentation .%DIFDELCMD < %DIFDELCMD < %%% City Lore is a pioneer in cultural story mapping. In 2008, it launched City of Memory(cityofmemory.org), a story map of New York written about in the volume Letting Go: Sharing Authority in a User Generated World. Designed with Flash technology by Local Projects, the map has been complemented with CityLore\u2019s new Youtube based storymap designed by ESRI. Tariq Hamad at his sweet shop City Lore's People's Hall of Fame, established in 1993, honors grassroots contributions to New York's cultural life and presents winners with a plate-sized bronze version of the New York City subway token , representing a token of esteem . Recipients have included the Pearls of Wisdom Storytellers, Peter Benfaremo (\"The Lemon Ice King of Corona\"), Jim Power (\"New York's Mosaic Man\"), %DIFDELCMD < [%%% 6 and Renee Flowers (original member of the Gowanus Wildcats Girls Drill Team). %DIFDELCMD < [%%% 7 Honorees covered by The New York Times include the Harlem Blues and Jazz Band (1997), the Bronx Old Timers Stickball League (1997), and Tariq Hamad (1998), founder of the first Indian sweet shop in New York. In 2019, the People\u2019s Hall of Fame honored Waterfront Heroes, local artists and activists working to preserve the New York Harbor including Naima Rauam for painting the poetry of the Fulton Fish Market; David Sharps, founder of the Waterfront Museum on a barge he personally dredged from the Hudson; Conrad Milster, a steam whistle collector from Brooklyn who started a 50-year New Year's Eve steam whistle blowing tradition in Brooklyn; and Samir Faraq, founder of Staten Island's Museum of Maritime Navigation Communication and collector of forgotten maritime paraphernalia. Children playing a traditional game on the streets of NYC, photographed by Martha Cooper City Lore \u2019s first urban folklore initiative was to document New York City street games. The City Play exhibit opened at the Museum of the City of New York in 1988, and the book, City Play was published by Rutgers University Press in 1992. In 2016, City Lore and Public Art Films released Let\u2019s Get the Rhythm: the Life and Times of Miss Mary Mack, directed by Irene Chagall, and coproduced by Steve Zeitlin and Irene Chagall. The New York Times writes \u201cAs it swings between games and interviews, \u201cLet\u2019s Get the Rhythm\u201d has a beat; its incandescent musicality brings this hand-clapping universe to life.\u201d%DIFDELCMD < %DIFDELCMD < %%% In 1996, City Lore worked with activist Susie Tanenbaum and the Street Performers Advocacy Project to publish Know Your Rights! A Guide for Subway Performers pamphlet, now online, offering street performersthe first look at their constitutional right to perform on subway platforms. The Guide has been in use by performers ever since. Place Matters Empire Roller Rink, Birthplace of Roller Disco, archived by Place Matters In 1988, City Lore established the \u201cEndangered Spaces\u201d project to advocate for local establishments and landmarks that were disappearing from the New York City landscape. In 1996, City Lore joined a new Task Force on Historical and Cultural Landmarks run by Ned Kaufman at the Municipal Art Society(MAS) and sponsored the conference \u201cHistory Happened Here\u201d at the Museum of the City of New York in 1998. Two years later, Place Matters was formally established by Ned Kaufman, Steve Zeitlin, and Marci Reaven, with Laura Hansen as the director. Based at City Lore, Place Matters aims to broaden the ways that preservation is understood and practiced by offering alternative ways of identifying, interpreting, celebrating, and ultimately protecting places that matter. In 2001, City Lore successfully nominated Bohemian Hall, still a vibrant community center/beer garden started by Czech immigrants in Astoria, Queens, the Casa Amadeo Music Store, the oldest, continuously occupied Latin music store in New York City, and the former Culyer Presbyterian Church, a center of Mohawk life in North Gowanus (Boerum Hill), as census sites to the National Register of Historic Places. Since then, there have been over 800 nominations from the public for City Lore\u2019s Census of Places that Matter, including parks, historic sites , public art, bars, community gardens, industrial sites, and storefronts. In 2006, the Rutgers University Press published Hidden New York: A Guide to Places that Matter. A year later, Place Matters, the Lower East Side Tenement Museum, and the Lower East Side Preservation Project presented the experiences of past and present Lower East Siders in a place-marking project called Your Guide to the Lower East Side. The initiative included twenty-eight signs at six separate sidewalk locations that featured photographs and text in five languages. These \u201cplace markers\u201d weave personal stories and cherished memories directly into the landscape, often right where the stories took place. The signs reveal the rich and diverse layers of human experience that make the neighborhood so distinctive. They transform the participants' stories of struggle and achievement into a legacy for all who pass by. Molly Garfinkel became the director of Place Matters in 2011, and, since then the program has expanded to include advocacy for community anchor sites across the nation, history-based public art projects in Baldwinsville, NY and greater Syracuse area, and policy-oriented campaigns around culturally-competent historic preservation protocols. Her 2019 essay Place Matters: Rooting Conservation in Community was published in the Journal of American Folklore. Place Matters continues to welcome nominations to the Census of Places that Matter. Arts in Education Since 1986, City Lore has brought folk and community-based artists into New York City \u2019s public schoolsreaching thousands of students each year students each year. Beginning as a partnership with Arts Connection, City Lore\u2019s education program has grown to be a centerpiece of the organization\u2019s work. In 2019-2020 , the organization partnered with 15 schools to provide arts instruction for approximately 7,800 students in grades K-12 in a variety of art forms in the visual, literary, performing, and new media arts. An early inspiration was an essay by Barbara Kirshenblatt-Gimblett, \u201cAn Accessible Aesthetic\u201d: A major factor in effective education is the integration of what is learned in the school with the experiences children have in their homes and communities. An equal challenge is the integration of the culture of the community into the curriculum. While we want our children to be exposed to a variety of art forms and cultures, we do not want them to be alienated for their birthright, their own heritage. And their own heritage is valuable, not only because it is their own, but also because of the importance of a strong indigenous culture to the coherence of community life.%DIFDELCMD < %DIFDELCMD < %%% City Lore \u2019s teaching artists mirror the diversity of New York City\u2019s public schools, and the organization works with partner schools `to customize arts residencies so that they relate the schools\u2019 populations and integrate with their curricula. City Lore\u2019s arts programs have brought Mexican, Ecuadorian, Egyptian, Ivorian, Cuban, Haitian, Peruvian, South African, and Brazilian artists into the schools. Recent initiatives include: Roots, Routes, Rhythms, an initiative that engages students in grades 3 through 8 from five Queens partner schools in exploring the roots of music and dance traditions in their boroughs and neighborhoods. From Homer to Hip Hop: Oral Traditions as a Gateway to Literature and Literacy, a new program which introduces students in grades 3 and 8 in two elementary and two middle schools in Queens to world poetry traditions, including sung poetry. Urban Explorers, a year-round after school program, including Saturdays and summer, that engages 26 youth in grades 6 to 12 in multi-media storytelling about and advocating for New York City\u2019s grassroots cultures, while supporting their in-school education. KickFlip, an interest-driven, connected learning program implemented 2013-2015 designed to engage teen skateboarders and help them develop filmmaking, game design and coding skills to develop projects relating to their sport. City Lore\u2019s education programs also have a national outreach. The organization helped organize a national conference in 1993 at the National Endowment for the Arts, and served as the sponsor and incubator for Local Learning: the National Network for Folk Arts in Education. City Lore cosponsored the newsletter CARTS (Cultural Arts Resources for Teachers and Students) Newsletter. City Lore contributes regularly to Local Learning's publication, Journal of Folk Arts in Education.%DIFDELCMD < %DIFDELCMD < %%% Grassroots Poetry Poetry plays a key role in New York\u2019s ethnic and cultural communities. For many immigrant communities, poetry is the most accessible and profound way for people to express themselves. Every community in New York City has its poets. City Lore is committed to finding ways to give these poets voice, finding the venues and formats for them to convey their artistry to their own communities and to the city at large, often finding new and innovative ways to communicate across languages.%DIFDELCMD < %DIFDELCMD < %%% City Lore was inspired to create the People\u2019s Poetry initiative because, while some groups are dedicated to traditional music and many to literary poetry, no other organization was systematically presenting the diverse oral poetry traditions of New York City, the U.S. and beyond. The People\u2019s Poetry Project grew out of the People\u2019s Poetry Gathering, held in 1999, 2001, 2003 with Poets House, and in 2006 with Bowery Arts + Science, to bring together folk, ethnic, inner city, and literary poets. During these festivals in 1999, 2001, 2003, and 2006, Lower Manhattan was transformed into a poetry village for three days. The People\u2019s Poetry Gathering was one of the highest profile poetry events in the United States and had an average audience of 10,000. In 2003, Poet Laureate, Billy Collins, wrote an insightful essay on the ballad for The New York Times on the festival\u2019s opening day; and City Lore hosted a special conference and concert honoring Alan Lomax for his contribution to folk music and poetry. Beowulf and Sundiata were among the works featured. In the aftermath of September 11, 2001 attacks, City Lore found and collected anonymous poems and other writings that had been left at memorials, hospitals and gathering places throughout the city. Through these actions, City Lore played a major role in documenting the shrines and memorials that cropped up after 9/11. A selection of these anonymous poems was published in the book, Words In Your Face: A Guided Tour Through Twenty Years of the New York City Poetry Slam. and appeared in Steve Zeitlin's essay, \"Oh Did You See the Ashes Come Thickly Falling Down. %DIFDELCMD < %DIFDELCMD < %%% In 2006, the People\u2019s Poetry Gathering featured poetry from the world\u2019s endangered languages. This inspired Bob Holman and Steve Zeitlinto begin work on a tribute to the world\u2019s endangered languages, a world \u201ccento\u201d (stitched together) poem in which each line came from a different endangered language. In 2013, the Festival of American Folklife in Washington DC hosted Khonsay: Poem of Many Tongues as an exhibit.The poem and subsequent film with Bob Holman would go on to serve as the subject of a tribute and call to action to preserve the worlds endangered languages, which premiered at the Margaret Meade Film Festival, and can be viewed online with extensive background information and a call for language preservation. The City Lore PoeMobile in action In 2010, City Lore and Bowery Arts + Science received a grant from the Rockefeller Foundation to launch the POEMobile that projects poems onto walls and building in tandem with live readings in New York City Neighborhoods. The POEMobile has traveled to Persian, Greek, Portuguese, Haitian, Dominican, Korean, as well as Yiddish-speaking neighborhoods, and also performed work with youth poets from Urban Word.In 2018, the POEMobile projected poems on to the steam rising up from New YorkCity manholes to express the evanescence of life. Urban Music and Dance Children Breakdancing in NYC, photographed by Martha Cooper Prior to its founding in 1986, City Lore\u2019s predecessor, the New York City Chapter of the New York Folklore Society sponsored \" Music from the Islands: Puerto Rico, Cuba, and New York \" at El Museo de Barrio, initiating a longstanding commitment to Latino music traditions. City Lore served as first fiscal sponsor for Puerto Rican Bomba and Plena band, Los Pleneros de la 21, whose director Juan Guti\u00e9rrez won a National Heritage Award from the National Endowment for the Arts in 1996.%DIFDELCMD < %DIFDELCMD < %%% In 2006 , City Lore completed the documentary film From Mambo to Hip Hop, which won an Alma Award for Best Documentary that same year. In 2016, the organization sponsored Mathew Rodriguez Warrens\u2019 doc, We Like It Like That: the Story of Latin Boogaloo. Elena Martinez coproduced both films, and was tapped by WHEDco (Women\u2019s Housing and Urban Development) to spearhead along with Grammy-nominated bandleader Bobby Sanabria, the Bronx Music Heritage Lab and the new cultural center, The Bronx Music Heritage Center, opening in 2020. In 1995, City Lore, working with folklorist Ray Allen, completed the Grassroots Gospel Initiative, recording acapella gospel quartet music in the borough's and releasing an LP. In 2006, Funds were raised by City Lore to support Peter Siegel's project to restore and issue tapes he made in the 1960s of folk music concerts by Mississippi John Hurt, The Carter Family, Jesse Fuller, Bill Monroe, and others. The recordings became the box set Friends of Old Time Music released by Smithsonian Folkways.%DIFDELCMD < [%%% 10%DIFDELCMD < ] %%% The box set was named one of the 10 best box sets of 2006 by The New York Times.%DIFDELCMD < %DIFDELCMD < %%% Urban Culture Exhibitions%DIFDELCMD < %DIFDELCMD < %%% Beginning with the opening of the exhibit CityPlay at the Museum of the City of New York (MCNY) in 1988, City Lore has developed public exhibitions about New York City \u2013 and America\u2019s \u2013 folk culture. In 1993 , City Lore curated the exhibit Welcome to Your Second Home: New York City\u2019s Ethnic Social Clubs at MCNY. In 2002, City Lore researched and curated Missing: Streetscape of a City in Mourning about the shrines and memorials that cropped up on New York City Streets after September 11. In 2005, City Lore developed the traveling exhibit and accompanying book, Weavings of War: Fabrics of Memory which featured the work of women textile artists from Central Asia, Southeast Asia, Latin America, and South Africa featured at The Puffin Gallery. In 2012, City Lore curated the outdoor exhibit, Your Guide to the Lower East Side. The House under the Roller Coaster, made famous by Woody Allen in Annie Hall, demolished in 2000. Photo by Hazel Hankin Nathan's Original Hot Dogs on Coney Island, archived by Place Matters In 1988, City Lore presented oral histories of Coney Island on the boardwalk. In 1991, folklorist Steve Zeitlin suggested to Dick Zigun at Coney Island USA that, rather than trying performance art, they should bring a traditional old time sideshow, which Zeitlin had brought to the Smithsonian\u2019s Folklife Festival a few years earlier, to Coney. The sideshow has run continuously to this day. In 2017, City Lore presented the exhibit Boardwalk Renaissance: How the Arts Saved Coney Island.%DIFDELCMD < %DIFDELCMD < %%% In 2014, City Lore opened its own storefront gallery at 56 E. First Street. Exhibits have included Mother Tongues: Endangered Languages Spoken in New York City and Beyond (2015); What We Bring: New Immigrant Gifts (2018); and Bama and Pistol: Pioneers of Subway Graffiti (2019). In 2017, City Lore and Poets House curated the traveling exhibit Poetic Voices of the Muslim World, that travelled to public libraries in 12 cities Special projects City Lore produces documentary films and collaborates with filmmakers whose work relates to the organization's mission. Award-winning films include Ric Burns' Coney Island and the five-part series New York: A Documentary Film; City of Dreams, a film about women artists in New York City; From Mambo to Hip Hop, %DIFDELCMD < [%%% 11 a documentary which traces the history of music in the South Bronx; and DeAf Jam, which highlights the poetry and storytelling of the deaf performed in American Sign Language. In 2017, City Lore teamed up with the Nurse Practitioner Healthcare Foundation is Seattle to create From Heritage to Health: An Art\u2013Centered Approach to Cultural Competence (H2H), a multi-year project that highlights the ways in which storytelling and the arts can inform the diverse practices of medical professionals. H2H includes a learner needs assessment, public and professional presentations, eLearning courses, and other forms of educational outreach that enhance cultural competency in healthcare . In 2019, City Lore became host to American Lore Theater and premiered the original play Salt Water People about the Bonacker Baymen of Long Island.%DIFDELCMD < %DIFDELCMD < %%% Notable works and awards In 2002, City Lore successfully nominated three cultural heritage sites from under-recognized communities to the National Register: Casa Amadeo Record Store, Bohemian Hall, and Cuyler Church used by the Mohawk community in Brooklyn.%DIFDELCMD < %DIFDELCMD < %%% On 2004, Mayor Michael R. Bloomberg officially proclaimed November 18 to be People's Hall of Fame Day in the City of New York, saying \"In a city with 8 million stories to tell, some of the most fascinating tales are lost in the glorious din. Founded in 1986, City Lore is dedicated to amplifying the compelling but often unheard voices that make New York great. Through an engaging series of programs and publications, City Lore reveals the true richness of our cultural heritage. One of the organization\u2019s signature events is the annual People's Hall of Fame Awards, which eschews the glare of popular celebrity in favor of the more luminescent glow of inspiration and integrity . \" Proclamation, Office of the Mayor, Michael R. Bloomberg, November 18, 2004 On Marcy 29, 2007, Mayor Bloomberg proclaimed another City Lore People's Hall of Fame Day in recognition of the tenth class of honorees.Proclamation, Office of the Mayor, Michael R. Bloomberg, March 29, 2007 In 2007 City Lore\u2019s Founder Steve Zeitlin was awarded the Benjamin Botkin Award by the American Folklore Society for lifetime achievement in public folklore; in 2019, City Lore\u2019s Director of Arts in Education Amanda Dargan also received the award.%DIFDELCMD < %DIFDELCMD < %%% In 2016, City Lore received the Isidore Starr Award for excellence in from the National Council for the Social Studies and American Federation of Teachers.In 2009, City Lore\u2019s arts education programs were highlighted in The Qualities of Quality: Understanding Excellence in Arts Education published by Harvard University\u2019s Project Zero. References External links City Lore City of Memory People's Poetry Project Category:American folklore Category:Storytelling organizations Category:Preservation (library and archival science) Category:Organizations based in New York City Category:Culture of New York City Category:Organizations established in 1986 Category:1986 establishments in New York (state", "after_revision": "City Lore : the New York Center for Urban Culture was founded in 1986 and was the first organization in the United States devoted expressly to the \"documentation, preservation, and presentation of urban folk culture.\"American Folklore: An Encyclopedia. Brunvand, Jan Harold, ed. Garland Publishing, NY, 1996. Their mission is to produce programs and publications that convey the richness of New York City \u2014and America's\u2014 living cultural heritage . In addition to regular programming that includes the Place Matters Awards and the People's Hall of Fame, the organization works with a wide range of partners to develop exhibitions, publications, and documentary films, and to advocate for the rights of street performers, ethnic clubs, and other grassroots cultural expressions in New York City. City Lore works in four cultural domains: urban folklore and history, preservation, arts in education, and grassroots poetry traditions. Described by Sonnet Takahisa of the September 11th Memorial Museum as \"wise renegades,\" their programs include People's Poetry Project, Place Matters (in collaboration with the Municipal Arts Society) and City of Memory . City Lore works collaboratively with folk and community artists, embracing different aesthetics for the creation of art. Their collaborators include the Gotham Center for New York City History, the New-York Historical Society, Bank Street College of Education, and smaller groups such as Los Pleneros de la 21. City Lore\u2019s staff consists of professional folklorists ( Steve Zeitlin, the founder and executive director , Elena Mart\u00ednez and Amanda Dargan), historians (Marci Reaven), photographers (Martha Cooper), ethnomusicologists (Roberta Singer and Lois Wilcken), and arts and education specialists (Anika Selhorst). Projects and programs Urban folklore %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < [%%% %DIFDELCMD < %DIFDELCMD < %%% The City Lore office on First Avenue on the Lower East Side houses archives containing over 100,000 images , hundreds of oral histories, and traditional music and poetry performance tapes. %DIFDELCMD < [%%% %DIFDELCMD < %DIFDELCMD < %%% Mooney, Jake. \"Their New York, Lost and Sometimes Found\" New York Times, 8 June 2008. The archives are part of the ongoing documentation project featured on City of Memory, a participatory online story map of New York City . City Lore's People's Hall of Fame, established in 1993, honors grassroots contributions to New York's cultural life and presents winners with a plate-sized bronze version of the New York City subway token . Recipients have included the Pearls of Wisdom Storytellers, Peter Benfaremo (\"The Lemon Ice King of Corona\"), Jim Power (\"New York's Mosaic Man\"), %DIFDELCMD < [%%% Moynihan, Colin. \"With Few Luxuries, an Artist Sticks to It\" New York Times 12 December 2004 and Renee Flowers (original member of the Gowanus Wildcats Girls Drill Team). %DIFDELCMD < [%%% %DIFDELCMD < %DIFDELCMD < %%% City Lore created Know Your Rights! , a guide for street performers. Place Matters Since its inception, City Lore has served as an advocate for local landmarks through the Place Matters program in collaboration with Municipal Arts Society. There have been over 650 nominations from the public, including parks, historic sites, public art, beer gardens, industrial sites, and stores. In 2001, they successfully nominated Bohemian Hall, still a vibrant community center/beer garden started by Czech immigrants in Astoria, Queens, and the Casa Amadeo Music Store, the oldest, continuously occupied Latin music store in New York City, as census sites to the National Register of Historic Places. The organization has funding from the Dutch government for an outdoor exhibit in Lower Manhattan commemorating the Quadricentennial of Henry Hudson's voyage with signage marking key sites in New Amsterdam. In 2006, City Lore published Hidden New York: A Guide to Places that Matter. Arts in Education City Lore develops and implements arts residencies and offers professional development to New York City public schools. In response to requests of public school teachers with increasing Bengali and Bangladeshi populations , the organization %DIFDELCMD < %DIFDELCMD < %%% designed artist residencies in Queens, funded by the United States Department of Education to teach traditional Bengali scroll painting. City Lore has designed similar programs bringing Mexican, Ecuadorian, Egyptian, Ivorian, Cuban, Haitian, Peruvian, South African, and Brazilian artists into the schools. People's Poetry Project %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% In the aftermath of September 11, 2001 attacks, City Lore found and collected anonymous poems and other writings that had been left at memorials, hospitals and gathering places throughout the city. A selection of these anonymous poems was published in the book, Words In Your Face: A Guided Tour Through Twenty Years of the New York City Poetry Slam. Aptowicz, Cristin O'Keefe. (2008). Words in Your Face: A Guided Tour Through Twenty Years of the New York City Poetry Slam. New York City: Soft Skull Press, 288. . and appeared in Steve Zeitlin's essay, \"Oh Did You See the Ashes Come Thickly Falling Down. %DIFDELCMD < %DIFDELCMD < %%% Zeitlin, Steve. \" Oh Did You See the Ashes Come Thickly Falling Down. \" %DIFDELCMD < %DIFDELCMD < %%% Spontaneous Shrines and the Public Memorialization of Death. Ed. Jack Santino.New York: Palgrave Macmillan, 2006 Founded by City Lore %DIFDELCMD < [%%% %DIFDELCMD < ] %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% and Poets House in 1999, The People's Poetry Gathering was created to present the diverse oral poetry traditions of New York City. In 2003 , City Lore 's People's Poetry Project launched an initiative to document and disseminate poetry from endangered languages. %DIFDELCMD < %DIFDELCMD < %%% Special projects City Lore produces documentary films and collaborates with filmmakers whose work relates to the organization's mission. Sponsored films include Ric Burns' Coney Island and the five-part series New York: A Documentary Film; City of Dreams, a film about women artists in New York City; From Mambo to Hip Hop, %DIFDELCMD < [%%% Pareles, John. \"Mambo and Hip-Hop: Two Bronx Sounds, One Sense of Dignity\". New York Times 14 September 2006. a documentary which traces the history of music in the South Bronx; and the forthcoming DeAf Jam, which highlights the poetry and storytelling of the deaf performed in American Sign Language. City Lore developed the traveling exhibit Weavings of War, which featured the work of women textile artists from Central Asia, Southeast Asia, Latin America, and South Africa . %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% Funds were raised by City Lore to support Peter Siegel's project to restore and issue tapes he made in the 1960s of folk music concerts by Mississippi John Hurt, The Carter Family, Jesse Fuller, Bill Monroe, and others. The recordings became the box set Friends of Old Time Music released by Smithsonian Folkways in 2006 Ratliff, Ben . \" Rounding Up the Best of the Boxed; Friends of Old Time Music -- The Folk Arrival, 1961-1965.\" New York Times 24 November 2006. %DIFDELCMD < %DIFDELCMD < %%% References Category:American folklore Category:Storytelling Category:Preservation (library and archival science) Category:Organizations based in New York City Category:Culture of New York City Category:Organizations established in 1986 Category:1986 establishments in New York (state", "edit_actions": [{"type": "R", "before": ", New York 's center for urban folk culture, founded in 1985, is", "after": ": the New York Center for Urban Culture was founded in 1986 and was", "start_char_pos": 10, "end_char_pos": 74}, {"type": "R", "before": "alt=|Children Playing New York Street Games photographed by Martha Cooper alt=|Sahadi's Middle Eastern Grocery, photographed by Martha Cooper With a mission to foster", "after": "Their mission is to produce programs and publications that convey the richness of", "start_char_pos": 306, "end_char_pos": 472}, {"type": "R", "before": "\u2013 and America\u2019s\u2013", "after": "\u2014and America's\u2014", "start_char_pos": 487, "end_char_pos": 503}, {"type": "R", "before": "through education and public programs, City Lore encompasses a Lower East Side gallery space, performances, lectures,", "after": ". In addition to regular programming that includes the Place Matters Awards and", "start_char_pos": 529, "end_char_pos": 646}, {"type": "R", "before": "a POEMobile that projects poems onto walls and buildings, and education programs throughout the five boroughs. City Lore documents, presents, and advocates for New York City\u2019s grassroots cultures to ensure their living legacy in stories and histories, places and traditions. The organization also", "after": "the organization", "start_char_pos": 674, "end_char_pos": 970}, {"type": "R", "before": "Described as \u201cwise renegades\u201d", "after": "City Lore works in four cultural domains: urban folklore and history, preservation, arts in education, and grassroots poetry traditions. Described", "start_char_pos": 1195, "end_char_pos": 1224}, {"type": "D", "before": ", the group has also been described as a \u201cpractical application of a utopian endeavor\u201d by the writer Marc Kaminsky. In a March 21,2020 article in The Wall Street Journal, Steve Zeitlin notes, \u201cWe believe in grassroots creativity as a redeeming force in society and a symbol of the irrepressible nature of the human spirit.\u201d", "after": null, "start_char_pos": 1244, "end_char_pos": 1567}, {"type": "R", "before": "Since 2013, City Lore has been headquartered at 56 East 1st Street on the historic Lower East Side of New York. The building holds offices, a gallery, and a multicultural library for teachers and researchers. In 2019, City Lore became an official Smithsonian Affiliate, one of only 6 affiliates in New York City", "after": "of the September 11th Memorial Museum as \"wise renegades,\" their programs include People's Poetry Project, Place Matters (in collaboration with the Municipal Arts Society) and City of Memory", "start_char_pos": 1568, "end_char_pos": 1879}, {"type": "R", "before": "has consisted", "after": "consists", "start_char_pos": 2211, "end_char_pos": 2224}, {"type": "A", "before": null, "after": "Steve Zeitlin, the", "start_char_pos": 2255, "end_char_pos": 2255}, {"type": "D", "before": "Steve Zeitlin", "after": null, "start_char_pos": 2287, "end_char_pos": 2300}, {"type": "D", "before": "playwrights (Jake Rosenberg, Raquel Almazan)", "after": null, "start_char_pos": 2450, "end_char_pos": 2494}, {"type": "R", "before": "Founding November, 1985, folklorist Steve Zeitlin founded City Lore, and the organization received full non-profit status. Prior to founding City Lore, Steve Zeitlin worked for eight years as a folklorist for the Smithsonian Institution\u2019s Festival of American Folklife. In 1979, the New York City Chapter of the New York Folklore Society, led by Dr. Barbara Kirshenblatt Gimblett, Nancy Groce and others, sponsored the first of three conferences on New York City Folklore. Zeitlin, who participated in the conferences, moved to New York in 1981, and, in 1983, became the President of the New York City Chapter of the New York Folklore Society. City Lore\u2019s first program was a tribute to late anthropologist Barbara Myerhoff in September, 1985. In 1986 moved into offices at 72 E. First Street on the Lower East Side. In 1986, the organization held the first City Lore Festival in Central Park staged in tandem with the first Central Park Summerstage.", "after": "Projects and programs", "start_char_pos": 2548, "end_char_pos": 3498}, {"type": "D", "before": "Approach to Folklore City Lore founder Steve Zeitlin City Lore's Founder Dr. Steve Zeitlin has said that City Lore has: an \"open mission to document and present New York City and America's living cultural heritage. Living cultural heritage used by folklorists to suggest the documentation, interpretation, and presentation of traditions within living memory, as opposed to events that predate living memory, and are, in a sense, purely historical. The original impetus for the discipline of folklore in the 19th century was the notion of collecting myths and legends as \"survivals\" from an earlier age, but City Lore is very present oriented. It's not only about capturing the past, it's about using an arts perspective to look at life itself. And to see the present in a slightly more vivid and interested and compelling way by looking at the artistic impulse in everyday life. Folklorists distinguish themselves from historians and from cultural anthropologists, because of the attention they pay to the aesthetic dimensions of history and culture.\"", "after": null, "start_char_pos": 3499, "end_char_pos": 4550}, {"type": "R", "before": "2", "after": "Urban folklore", "start_char_pos": 4551, "end_char_pos": 4552}, {"type": "D", "before": "According to Zeitlin, City Lore is \u201ctradition inspired but not tradition bound, and we are all about the redemptive power of grassroots creativity.\" Working across so many arenas of life, the organization has been described as a \u201cfull court press\u201d on what became the tag line for the organization: the art of everyday life.", "after": null, "start_char_pos": 4553, "end_char_pos": 4876}, {"type": "D", "before": "In a formal evaluation by the Artography initiative of Leveraging Investments in Creativity (LINC) funded by the Ford Foundation, Dr. William Westerman writes:", "after": null, "start_char_pos": 4877, "end_char_pos": 5036}, {"type": "D", "before": "It\u2019s hard to understand what City Lore does in terms of art-making without first understanding how folklorists think of the concept of art. It is as if in Western society what is seen as the arts is equivalent to the visible light in the spectrum, whereas folklorists see the art across the whole spectrum, from ultraviolet to infrared. That full range of creative expression is what concerns the mission of City Lore, and it includes history and memory, language and religion, food and gardens, lace and place.", "after": null, "start_char_pos": 5066, "end_char_pos": 5577}, {"type": "D", "before": "The difference between City Lore and other arts programs is not simply that the arts presented are folk and traditional arts, but that City Lore\u2019s arts are traditional and modern, and a great deal of the artmaking takes place in the collaborations of different cultural organizations and artists, and in the ties between the traditional and the way that contemporary New Yorkers use and adapt their traditions in their current work, whether they are professionals or schoolchildren. In this way, musical and poetic forms that build on traditional genres \u2013 including hip-hop, mambo,and spoken word \u2013 are part of a continuum of artistic practice that recognizes and builds upon deep genealogical connections to the past without being bound by them. It is in this way that City Lore\u2019s work gets far beyond nostalgia, because the thrust is always forward-looking, not referring to what once was and could never be again, but building creatively with respect for the cultural foundations that exist.", "after": null, "start_char_pos": 5578, "end_char_pos": 6572}, {"type": "D", "before": "3", "after": null, "start_char_pos": 6590, "end_char_pos": 6591}, {"type": "D", "before": "Programs and Series City Lore works in four cultural domains: urban folklore and history, preservation, arts in education, and grassroots poetry traditions. In addition, City Lore undertakes special projects in keeping with its mission, and serves as a fiscal sponsor for filmmakers and other cultural specialists.", "after": null, "start_char_pos": 6592, "end_char_pos": 6906}, {"type": "D", "before": "Urban folklore", "after": null, "start_char_pos": 6936, "end_char_pos": 6950}, {"type": "R", "before": "archives at 56 E. First Street", "after": "office on First Avenue", "start_char_pos": 6965, "end_char_pos": 6995}, {"type": "R", "before": "12,685 imagesby photographer Martha Cooper and 5, 634 by Katrina Thomas. The total with other photographers was 19", "after": "archives containing over 100,000 images", "start_char_pos": 7026, "end_char_pos": 7140}, {"type": "R", "before": "320 images. The archive also includes 5,210 photographic negatives, 692 cassette tapes, 143 dat tapes, 163 mini DV tapes and 148 VHS tapes including", "after": "hundreds of", "start_char_pos": 7143, "end_char_pos": 7291}, {"type": "D", "before": "4", "after": null, "start_char_pos": 7378, "end_char_pos": 7379}, {"type": "D", "before": "City Lore has over 800 digital video clips highlighting urban folklore subjects. Described as a \u201cliving archive, \u201d the repository comes alive as it serves to inspire new public programs and continued documentation .", "after": null, "start_char_pos": 7380, "end_char_pos": 7595}, {"type": "R", "before": "City Lore is a pioneer in cultural story mapping. In 2008, it launched City of Memory(cityofmemory.org), a", "after": "Mooney, Jake. \"Their New York, Lost and Sometimes Found\" New York Times, 8 June 2008. The archives are part of the ongoing documentation project featured on City of Memory, a participatory online", "start_char_pos": 7625, "end_char_pos": 7731}, {"type": "D", "before": "written about in the volume Letting Go: Sharing Authority in a User Generated World. Designed with Flash technology by Local Projects, the map has been complemented with CityLore\u2019s new Youtube based storymap designed by ESRI. Tariq Hamad at his sweet shop", "after": null, "start_char_pos": 7754, "end_char_pos": 8009}, {"type": "A", "before": null, "after": ".", "start_char_pos": 8015, "end_char_pos": 8015}, {"type": "A", "before": null, "after": "City", "start_char_pos": 8016, "end_char_pos": 8016}, {"type": "D", "before": ", representing a token of esteem", "after": null, "start_char_pos": 8217, "end_char_pos": 8249}, {"type": "R", "before": "6", "after": "Moynihan, Colin. \"With Few Luxuries, an Artist Sticks to It\" New York Times 12 December 2004", "start_char_pos": 8417, "end_char_pos": 8418}, {"type": "D", "before": "7", "after": null, "start_char_pos": 8515, "end_char_pos": 8516}, {"type": "D", "before": "Honorees covered by The New York Times include the Harlem Blues and Jazz Band (1997), the Bronx Old Timers Stickball League (1997), and Tariq Hamad (1998), founder of the first Indian sweet shop in New York.", "after": null, "start_char_pos": 8517, "end_char_pos": 8724}, {"type": "D", "before": "In 2019, the People\u2019s Hall of Fame honored Waterfront Heroes, local artists and activists working to preserve the New York Harbor including Naima Rauam for painting the poetry of the Fulton Fish Market; David Sharps, founder of the Waterfront Museum on a barge he personally dredged from the Hudson; Conrad Milster, a steam whistle collector from Brooklyn who started a 50-year New Year's Eve steam whistle blowing tradition in Brooklyn; and Samir Faraq, founder of Staten Island's Museum of Maritime Navigation", "after": null, "start_char_pos": 8725, "end_char_pos": 9236}, {"type": "D", "before": "Communication and collector of forgotten maritime paraphernalia. Children playing a traditional game on the streets of NYC, photographed by Martha Cooper City Lore \u2019s first urban folklore initiative was to document New York City street games. The City Play exhibit opened at the Museum of the City of New York in 1988, and the book, City Play was published by Rutgers University Press in 1992. In 2016, City Lore and Public Art Films released Let\u2019s Get the Rhythm: the Life and Times of Miss Mary Mack, directed by Irene Chagall, and coproduced by Steve Zeitlin and Irene Chagall. The New York Times writes \u201cAs it swings between games and interviews, \u201cLet\u2019s Get the Rhythm\u201d has a beat; its incandescent musicality brings this hand-clapping universe to life.\u201d", "after": null, "start_char_pos": 9237, "end_char_pos": 9995}, {"type": "R", "before": "In 1996, City Lore worked with activist Susie Tanenbaum and the Street Performers Advocacy Project to publish", "after": "City Lore created", "start_char_pos": 10025, "end_char_pos": 10134}, {"type": "R", "before": "A Guide for Subway Performers pamphlet, now online, offering street performersthe first look at their constitutional right to perform on subway platforms. The Guide has been in use by performers ever since.", "after": ", a guide for street performers.", "start_char_pos": 10153, "end_char_pos": 10359}, {"type": "D", "before": "Empire Roller Rink, Birthplace of Roller Disco, archived by Place Matters In 1988, City Lore established the \u201cEndangered Spaces\u201d project to", "after": null, "start_char_pos": 10374, "end_char_pos": 10513}, {"type": "A", "before": null, "after": "Since its inception, City Lore has served as an", "start_char_pos": 10514, "end_char_pos": 10514}, {"type": "R", "before": "establishments and landmarks that were disappearing from the New York City landscape. In 1996, City Lore joined a new Task Force on Historical and Cultural Landmarks run by Ned Kaufman at the Municipal Art Society(MAS) and sponsored the conference \u201cHistory Happened Here\u201d at the Museum of the City of New York in 1998. Two years later, Place Matters was formally established by Ned Kaufman, Steve Zeitlin, and Marci Reaven, with Laura Hansen as the director. Based at City Lore, Place Matters aims to broaden the ways that preservation is understood and practiced by offering alternative ways of identifying, interpreting, celebrating, and ultimately protecting places that matter.", "after": "landmarks through the Place Matters program in collaboration with Municipal Arts Society. There have been over 650 nominations from the public, including parks, historic sites, public art, beer gardens, industrial sites, and stores.", "start_char_pos": 10534, "end_char_pos": 11215}, {"type": "R", "before": "City Lore", "after": "they", "start_char_pos": 11225, "end_char_pos": 11234}, {"type": "A", "before": null, "after": "and", "start_char_pos": 11366, "end_char_pos": 11366}, {"type": "D", "before": "and the former Culyer Presbyterian Church, a center of Mohawk life in North Gowanus (Boerum Hill),", "after": null, "start_char_pos": 11466, "end_char_pos": 11564}, {"type": "R", "before": "Since then, there have been over 800 nominations from the public for City Lore\u2019s Census of Places that Matter, including parks, historic sites , public art, bars, community gardens, industrial sites, and storefronts.", "after": "The organization has funding from the Dutch government for an outdoor exhibit in Lower Manhattan commemorating the Quadricentennial of Henry Hudson's voyage with signage marking key sites in New Amsterdam.", "start_char_pos": 11626, "end_char_pos": 11842}, {"type": "R", "before": "the Rutgers University Press", "after": "City Lore", "start_char_pos": 11852, "end_char_pos": 11880}, {"type": "D", "before": "A year later, Place Matters, the Lower East Side Tenement Museum, and the Lower East Side Preservation Project presented the experiences of past and present Lower East Siders in a place-marking project called Your Guide to the Lower East Side. The initiative included twenty-eight signs at six separate sidewalk locations that featured photographs and text in five languages. These \u201cplace markers\u201d weave personal stories and cherished memories directly into the landscape, often right where the stories took place. The signs reveal the rich and diverse layers of human experience that make the neighborhood so distinctive. They transform the participants' stories of struggle and achievement into a legacy for all who pass by.", "after": null, "start_char_pos": 11939, "end_char_pos": 12665}, {"type": "D", "before": "Molly Garfinkel became the director of Place Matters in 2011, and, since then the program has expanded to include advocacy for community anchor sites across the nation, history-based public art projects in Baldwinsville, NY and greater Syracuse area, and policy-oriented campaigns around culturally-competent historic preservation protocols. Her 2019 essay Place Matters: Rooting Conservation in Community was published in the Journal of American Folklore. Place Matters continues to welcome nominations to the Census of Places that Matter.", "after": null, "start_char_pos": 12666, "end_char_pos": 13206}, {"type": "R", "before": "Since 1986, City Lore has brought folk and community-based artists into", "after": "City Lore develops and implements arts residencies and offers professional development to", "start_char_pos": 13225, "end_char_pos": 13296}, {"type": "R", "before": "\u2019s public schoolsreaching thousands of students each year students each year. Beginning as a partnership with Arts Connection, City Lore\u2019s education program has grown to be a centerpiece of the organization\u2019s work. In 2019-2020", "after": "public schools. In response to requests of public school teachers with increasing Bengali and Bangladeshi populations", "start_char_pos": 13311, "end_char_pos": 13538}, {"type": "D", "before": "partnered with 15 schools to provide arts instruction for approximately 7,800 students in grades K-12 in a variety of art forms in the visual, literary, performing, and new media arts. An early inspiration was an essay by Barbara Kirshenblatt-Gimblett, \u201cAn Accessible Aesthetic\u201d:", "after": null, "start_char_pos": 13558, "end_char_pos": 13837}, {"type": "D", "before": "A major factor in effective education is the integration of what is learned in the school with the experiences children have in their homes and communities. An equal challenge is the integration of the culture of the community into the curriculum. While we want our children to be exposed to a variety of art forms and cultures, we do not want them to be alienated for their birthright, their own heritage. And their own heritage is valuable, not only because it is their own, but also because of the importance of a strong indigenous culture to the coherence of community life.", "after": null, "start_char_pos": 13838, "end_char_pos": 14416}, {"type": "R", "before": "City Lore \u2019s teaching artists mirror the diversity of New York City\u2019s public schools, and the organization works with partner schools `to customize arts residencies so that they relate the schools\u2019 populations and integrate with their curricula. City Lore\u2019s arts programs have brought", "after": "designed artist residencies in Queens, funded by the United States Department of Education to teach traditional Bengali scroll painting. City Lore has designed similar programs bringing", "start_char_pos": 14446, "end_char_pos": 14730}, {"type": "R", "before": "Recent initiatives include:", "after": "People's Poetry Project", "start_char_pos": 14852, "end_char_pos": 14879}, {"type": "D", "before": "Roots, Routes,", "after": null, "start_char_pos": 14880, "end_char_pos": 14894}, {"type": "D", "before": "Rhythms, an initiative that engages students in grades 3 through 8 from five Queens partner schools in exploring the roots of music and dance traditions in their boroughs and neighborhoods. From Homer to Hip Hop: Oral Traditions as a Gateway to Literature and Literacy, a new program which introduces students in grades 3 and 8 in two elementary and two middle schools in Queens to world poetry traditions, including sung poetry. Urban Explorers, a year-round after school program, including Saturdays and summer, that engages 26 youth in grades 6 to 12 in multi-media storytelling about and advocating for New York City\u2019s grassroots cultures, while supporting their in-school education. KickFlip, an interest-driven, connected learning program implemented 2013-2015 designed to engage teen skateboarders and help them develop filmmaking, game design and coding skills to develop projects relating to their sport. City Lore\u2019s education programs also have a national outreach. The organization helped organize a national conference in 1993 at the National Endowment for the Arts, and served as the sponsor and incubator for Local Learning: the National Network for Folk Arts in Education. City Lore cosponsored the newsletter CARTS (Cultural Arts Resources for Teachers and Students) Newsletter. City Lore contributes regularly to Local Learning's publication, Journal of Folk Arts in Education.", "after": null, "start_char_pos": 14895, "end_char_pos": 16289}, {"type": "D", "before": "Grassroots Poetry", "after": null, "start_char_pos": 16319, "end_char_pos": 16336}, {"type": "D", "before": "Poetry plays a key role in New York\u2019s ethnic and cultural communities. For many immigrant communities, poetry is the most accessible and profound way for people to express themselves. Every community in New York City has its poets. City Lore is committed to finding ways to give these poets voice, finding the venues and formats for them to convey their artistry to their own communities and to the city at large, often finding new and innovative ways to communicate across languages.", "after": null, "start_char_pos": 16337, "end_char_pos": 16821}, {"type": "D", "before": "City Lore was inspired to create the People\u2019s Poetry initiative because, while some groups are dedicated to traditional music and many to literary poetry, no other organization was systematically presenting the diverse oral poetry traditions of New York City, the U.S. and beyond. The People\u2019s Poetry Project grew out of the People\u2019s Poetry Gathering, held in 1999, 2001, 2003 with Poets House, and in 2006 with Bowery Arts + Science, to bring together folk, ethnic, inner city, and literary poets. During these festivals in 1999, 2001, 2003, and 2006, Lower Manhattan was transformed into a poetry village for three days. The People\u2019s Poetry Gathering was one of the highest profile poetry events in the United States and had an average audience of 10,000.", "after": null, "start_char_pos": 16851, "end_char_pos": 17608}, {"type": "D", "before": "2003, Poet Laureate, Billy Collins, wrote an insightful essay on the ballad for The New York Times on the festival\u2019s opening day; and City Lore hosted a special conference and concert honoring Alan Lomax for his contribution to folk music and poetry. Beowulf and Sundiata were among the works featured.", "after": null, "start_char_pos": 17612, "end_char_pos": 17914}, {"type": "D", "before": "In", "after": null, "start_char_pos": 17915, "end_char_pos": 17917}, {"type": "D", "before": "Through these actions, City Lore played a major role in documenting the shrines and memorials that cropped up after 9/11.", "after": null, "start_char_pos": 18113, "end_char_pos": 18234}, {"type": "A", "before": null, "after": "Aptowicz, Cristin O'Keefe. (2008). Words in Your Face: A Guided Tour Through Twenty Years of the New York City Poetry Slam. New York City: Soft Skull Press, 288. .", "start_char_pos": 18388, "end_char_pos": 18388}, {"type": "D", "before": "In 2006, the People\u2019s Poetry Gathering featured poetry from the world\u2019s endangered languages. This inspired Bob Holman and Steve Zeitlinto begin work on a tribute to the world\u2019s endangered languages, a world \u201ccento\u201d (stitched together) poem in which each line came from a different endangered language. In 2013, the Festival of American Folklife in Washington DC hosted Khonsay: Poem of Many Tongues as an exhibit.The poem and subsequent film with Bob Holman would go on to serve as the subject of a tribute and call to action to preserve the worlds endangered languages, which premiered at the Margaret Meade Film Festival, and can be viewed online with extensive background information and a call for language preservation. The City Lore PoeMobile in action In 2010, City Lore and Bowery Arts + Science received a grant from the Rockefeller Foundation to launch the POEMobile that projects poems onto walls and building in tandem with live readings in New York City Neighborhoods. The POEMobile has traveled to Persian, Greek, Portuguese, Haitian, Dominican, Korean, as well as Yiddish-speaking neighborhoods, and also performed work with youth poets from Urban Word.In 2018, the POEMobile projected poems on to the steam rising up from New YorkCity manholes to express the evanescence of life.", "after": null, "start_char_pos": 18511, "end_char_pos": 19807}, {"type": "R", "before": "Urban Music and Dance Children Breakdancing in NYC, photographed by Martha Cooper Prior to its founding in 1986, City Lore\u2019s predecessor, the New York City Chapter of the New York Folklore Society sponsored", "after": "Zeitlin, Steve.", "start_char_pos": 19808, "end_char_pos": 20014}, {"type": "R", "before": "Music from the Islands: Puerto Rico, Cuba, and New York", "after": "Oh Did You See the Ashes Come Thickly Falling Down.", "start_char_pos": 20017, "end_char_pos": 20072}, {"type": "D", "before": "at El Museo de Barrio, initiating a longstanding commitment to Latino music traditions. City Lore served as first fiscal sponsor for Puerto Rican Bomba and Plena band, Los Pleneros de la 21, whose director Juan Guti\u00e9rrez won a National Heritage Award from the National Endowment for the Arts in 1996.", "after": null, "start_char_pos": 20075, "end_char_pos": 20375}, {"type": "R", "before": "In", "after": "Spontaneous Shrines and the Public Memorialization of Death. Ed. Jack Santino.New York: Palgrave Macmillan,", "start_char_pos": 20405, "end_char_pos": 20407}, {"type": "D", "before": ", City Lore completed the documentary film From Mambo to Hip Hop, which won an Alma Award for Best Documentary that same year. In 2016, the organization sponsored Mathew Rodriguez Warrens\u2019 doc, We Like It Like That: the Story of Latin Boogaloo. Elena Martinez coproduced both films, and was tapped by WHEDco (Women\u2019s Housing and Urban Development) to spearhead along with Grammy-nominated bandleader Bobby Sanabria, the Bronx Music Heritage Lab and the new cultural center, The Bronx Music Heritage Center, opening in 2020.", "after": null, "start_char_pos": 20413, "end_char_pos": 20936}, {"type": "R", "before": "In 1995, City Lore, working with folklorist Ray Allen, completed the Grassroots Gospel Initiative, recording acapella gospel quartet music in the borough's and releasing an LP. In 2006, Funds were raised", "after": "Founded", "start_char_pos": 20937, "end_char_pos": 21140}, {"type": "D", "before": "to support Peter Siegel's project to restore and issue tapes he made in the 1960s of folk music concerts by Mississippi John Hurt, The Carter Family, Jesse Fuller, Bill Monroe, and others. The recordings became the box set Friends of Old Time Music released by Smithsonian Folkways.", "after": null, "start_char_pos": 21154, "end_char_pos": 21436}, {"type": "D", "before": "10", "after": null, "start_char_pos": 21454, "end_char_pos": 21456}, {"type": "D", "before": "The box set was named one of the 10 best box sets of 2006 by The New York Times.", "after": null, "start_char_pos": 21475, "end_char_pos": 21555}, {"type": "D", "before": "Urban Culture Exhibitions", "after": null, "start_char_pos": 21585, "end_char_pos": 21610}, {"type": "R", "before": "Beginning with the opening of the exhibit CityPlay at the Museum of the City of New York (MCNY) in 1988, City Lore has developed public exhibitions about New York City \u2013 and America\u2019s \u2013 folk culture. In 1993", "after": "and Poets House in 1999, The People's Poetry Gathering was created to present the diverse oral poetry traditions of New York City. In 2003", "start_char_pos": 21640, "end_char_pos": 21847}, {"type": "R", "before": "curated the exhibit Welcome to Your Second Home: New York City\u2019s Ethnic Social Clubs at MCNY.", "after": "'s People's Poetry Project launched an initiative to document and disseminate poetry from endangered languages.", "start_char_pos": 21860, "end_char_pos": 21953}, {"type": "D", "before": "In 2002, City Lore researched and curated Missing: Streetscape of a City in Mourning about the shrines and memorials that cropped up on New York City Streets after September 11. In 2005, City Lore developed the traveling exhibit and accompanying book, Weavings of War: Fabrics of Memory which featured the work of women textile artists from Central Asia, Southeast Asia, Latin America, and South Africa featured at The Puffin Gallery. In 2012, City Lore curated the outdoor exhibit, Your Guide to the Lower East Side. The House under the Roller Coaster, made famous by Woody Allen in Annie Hall, demolished in 2000. Photo by Hazel Hankin Nathan's Original Hot Dogs on Coney Island, archived by Place Matters In 1988, City Lore presented oral histories of Coney Island on the boardwalk. In 1991, folklorist Steve Zeitlin suggested to Dick Zigun at Coney Island USA that, rather than trying performance art, they should bring a traditional old time sideshow, which Zeitlin had brought to the Smithsonian\u2019s Folklife Festival a few years earlier, to Coney. The sideshow has run continuously to this day. In 2017, City Lore presented the exhibit Boardwalk Renaissance: How the Arts Saved Coney Island.", "after": null, "start_char_pos": 21954, "end_char_pos": 23150}, {"type": "D", "before": "In 2014, City Lore opened its own storefront gallery at 56 E. First Street. Exhibits have included Mother Tongues: Endangered Languages Spoken in New York City and Beyond (2015); What We Bring: New Immigrant Gifts (2018); and Bama and Pistol: Pioneers of Subway Graffiti (2019). In 2017, City Lore and Poets House curated the traveling exhibit Poetic Voices of the Muslim World, that travelled to public libraries in 12 cities", "after": null, "start_char_pos": 23180, "end_char_pos": 23606}, {"type": "R", "before": "Award-winning", "after": "Sponsored", "start_char_pos": 23744, "end_char_pos": 23757}, {"type": "R", "before": "11", "after": "Pareles, John. \"Mambo and Hip-Hop: Two Bronx Sounds, One Sense of Dignity\". New York Times 14 September 2006.", "start_char_pos": 23953, "end_char_pos": 23955}, {"type": "A", "before": null, "after": "the forthcoming", "start_char_pos": 24028, "end_char_pos": 24028}, {"type": "R", "before": "In 2017, City Lore teamed up with the Nurse Practitioner Healthcare Foundation is Seattle to create From Heritage to Health: An Art\u2013Centered Approach to Cultural Competence (H2H), a multi-year project that highlights the ways in which storytelling and the arts can inform the diverse practices of medical professionals. H2H includes a learner needs assessment, public and professional presentations, eLearning courses, and other forms of educational outreach that enhance cultural competency in healthcare", "after": "City Lore developed the traveling exhibit Weavings of War, which featured the work of women textile artists from Central Asia, Southeast Asia, Latin America, and South Africa", "start_char_pos": 24133, "end_char_pos": 24638}, {"type": "D", "before": "In 2019, City Lore became host to American Lore Theater and premiered the original play Salt Water People about the Bonacker Baymen of Long Island.", "after": null, "start_char_pos": 24641, "end_char_pos": 24788}, {"type": "D", "before": "Notable works and awards In 2002, City Lore successfully nominated three cultural heritage sites from under-recognized communities to the National Register: Casa Amadeo Record Store, Bohemian Hall, and Cuyler Church used by the Mohawk community in Brooklyn.", "after": null, "start_char_pos": 24818, "end_char_pos": 25075}, {"type": "R", "before": "On 2004, Mayor Michael R. Bloomberg officially proclaimed November 18 to be People's Hall of Fame Day in the City of New York, saying \"In a city with 8 million stories to tell, some of the most fascinating tales are lost in the glorious din. Founded in 1986, City Lore is dedicated to amplifying the compelling but often unheard voices that make New York great. Through an engaging series of programs and publications, City Lore reveals the true richness of our cultural heritage. One of the organization\u2019s signature events is the annual People's Hall of Fame Awards, which eschews the glare of popular celebrity in favor of the more luminescent glow of inspiration and integrity", "after": "Funds were raised by City Lore to support Peter Siegel's project to restore and issue tapes he made in the 1960s of folk music concerts by Mississippi John Hurt, The Carter Family, Jesse Fuller, Bill Monroe, and others. The recordings became the box set Friends of Old Time Music released by Smithsonian Folkways in 2006 Ratliff, Ben", "start_char_pos": 25105, "end_char_pos": 25784}, {"type": "R", "before": "Proclamation, Office of the Mayor, Michael R. Bloomberg, November 18, 2004 On Marcy 29, 2007, Mayor Bloomberg proclaimed another City Lore People's Hall of Fame Day in recognition of the tenth class of honorees.Proclamation, Office of the Mayor, Michael R. Bloomberg, March 29, 2007", "after": "Rounding Up the Best of the Boxed; Friends of Old Time Music -- The Folk Arrival, 1961-1965.\" New York Times 24 November 2006.", "start_char_pos": 25789, "end_char_pos": 26071}, {"type": "D", "before": "In 2007 City Lore\u2019s Founder Steve Zeitlin was awarded the Benjamin Botkin Award by the American Folklore Society for lifetime achievement in public folklore; in 2019, City Lore\u2019s Director of Arts in Education Amanda Dargan also received the award.", "after": null, "start_char_pos": 26072, "end_char_pos": 26319}, {"type": "D", "before": "In 2016, City Lore received the Isidore Starr Award for excellence in from the National Council for the Social Studies and American Federation of Teachers.In 2009, City Lore\u2019s arts education programs were highlighted in The Qualities of Quality: Understanding Excellence in Arts Education published by Harvard University\u2019s Project Zero.", "after": null, "start_char_pos": 26349, "end_char_pos": 26685}, {"type": "D", "before": "External links City Lore City of Memory People's Poetry Project", "after": null, "start_char_pos": 26697, "end_char_pos": 26760}, {"type": "D", "before": "organizations", "after": null, "start_char_pos": 26810, "end_char_pos": 26823}], "sents_char_pos": [0, 213, 249, 488, 784, 948, 1194, 1359, 1567, 1679, 1776, 1881, 2002, 2192, 2547, 2670, 2817, 3020, 3191, 3291, 3364, 3498, 3713, 3946, 4141, 4242, 4377, 4701, 4876, 5205, 5402, 5577, 6060, 6324, 6572, 6748, 6906, 7098, 7154, 7460, 7674, 7838, 7979, 8251, 8724, 8927, 9024, 9162, 9301, 9479, 9630, 9817, 9922, 10152, 10307, 10359, 10619, 10852, 10992, 11215, 11625, 11842, 11938, 12182, 12314, 12453, 12561, 12665, 13007, 13122, 13206, 13388, 13525, 13742, 13994, 14085, 14244, 14416, 14691, 14851, 15084, 15324, 15582, 15808, 15870, 16082, 16189, 16289, 16407, 16520, 16568, 16821, 17131, 17349, 17473, 17608, 17741, 17862, 17914, 18112, 18604, 18813, 18925, 19236, 19493, 19680, 19807, 20162, 20375, 20539, 20657, 20936, 21113, 21342, 21436, 21555, 21839, 21953, 22131, 22388, 22471, 22569, 22739, 23006, 23053, 23150, 23255, 23358, 23401, 23458, 23743, 23850, 23911, 24023, 24132, 24452, 24640, 24788, 25075, 25346, 25466, 25585, 25786, 26000, 26229, 26319, 26504, 26685]}
+{"doc_id": "1515609", "revision_depth": "1", "before_revision": "The name Taqali refers to a group of foot-hills in Central Sudancovering an area of approximately forty square miles. Unlike the surrounding Kordofan, the uplands of the hills are fertile and , thereby suitable for agriculture and higher population density. The state was centered upon the Taqali Massif, the highest part of the hills in the northeast of the region , but its early history is unclear. Oral traditions state that it was founded in the early sixteenth century when the Kingdom of Sennar was established. However, some scholars believe the state did not exist until the late eighteenth century (between 1750 and 1780) and that the early rulers on the king list are semi-mythological. History Beginnings Janet J. Ewald argued that the first true ruler of Taqali was Muhammad Wad Jayli. Ewald proposed that Wad Jayli, along with his son, Ismail of Qaqali, founded the state. Ewald contends the state of Taqali was formed during a period of disorder in the Kordofan when the Kingdom of Sennar was in decline and Darfur was growing in power. Muhammad Wad Jayli began uniting the region and was succeeded as Makk by his brother Umar. Umar was subsequently overthrown around 1783 by Ajaid, The Queen Mother , and Muhammad's son, Ismail. Once Ismail took over, he further expanded the state and took control of the \"99 hills\" of the region. His son , Abakr peacefully succeeded him but the state was subsequently plagued with conflicts over succession from 1840 to 1880. Despite its relatively small size and powerful neighbors , the Taqali state remained independent. While the Nuba Mountains were well suited for agriculture , they were surrounded by the arid Kordofan \u2014 a region too dry to support permanent settlement . The rocky terrain of the Taqali Massif also served as a natural fortification. The neighboring Kingdom of Sennar posed the greatest threat . Still, it was mitigated by annual payments from Taqali. Sennar adhered to this arrangement until the Egyptian invasion of Sennar in 1821. The Egyptians then launched three failed invasions against the state of Taqali. Eventually, an agreement was reached with Egypt that Taqali would remain independent but would pay a nominal tax and be officially incorporated into Egyptian Sudan. In 1883 the Mahdist Sudanese decided to invade Taqali. Their campaign advanced further than any previous attempt. In July 1884 the ruler of Taqali, Makk Adam, was captured by the Mahdist and eventually died in captivity. Insurrections continued in Taqali, and Hamdan Abu Anja, a nearby Sudanese ruler, was dispatched to quell the rebellion. This resulted in more pillaging and destruction in Taqali. The state was finally conquered by the forces of the self-proclaimed Mahdi, Muhammad Ahmad, in the late 19th century. This resulted in the formation of Mahdist State. Later history With the defeat of the Mahdists by the British in 1889, the Makk of Taqali was restored to power but remained closely controlled by the British. The Makks of Taqali proved to be useful allies and the British gradually gave the Makks more territory to control and administer. This continued through the independence of Sudan in 1956. The administrative power of the state was finally done away with after the 1969 coup. Though having no political power, the Makk of Taqali remains a ceremonial leader to the people of the region to this day . The title of the ruler of Taqali was Makk (or Mek, \"king\"), possibly Arabic but more likely an Arabized word of Merotici or, Ge'ez origin. The tributaries of the Makk of Taqali were known as muk\u016bk al-\u02bf\u0101da (sing. make al-\u02bf\u0101da), \"customary kings\". In Taqali, the son of a makk was a wad al-makk (pl. awl\u0101d al-makk), and the son of a daughter of the Makk was an arb\u0101b (pl. ar\u0101b\u012bb). The ar\u0101b\u012bb were usually prominent councils of the makk and the ar\u0101b\u012bb al-tham\u0101niyya (eight ar\u0101b\u012bb) were a special council that met in the palace. An arb\u0101b could sometimes pass on his rank to his sons. Likewise, the title of wad was sometimes bestowed on trusted slaves or servants. All awl\u0101d were eligible to be elected Makk . A wad who was given a territory from which to draw revenue was an ahl al-\u1e6d\u0101q\u012byah, one who wore the \u1e6d\u0101q\u012byah, a headdress associated with the rule. A woman who bore a son to the Makk was known as an artiyya (pl. artiyy\u0101t), a term not of Arabic origin. They attained the highest rank among the women of the royal household, each supervising her household of surriyyat (concubines) and khaddama (maidservants). Muhammad al-Rubatabi Jayli Abu Jarida Sabo of Taqali Jayli Umara Jayli Awan Allah Jayli Abu Quran Muhammad wad Jayli, c. 1750 Umar I, to 1783 Ismail I, 1783 to 1800 Abakr I, 1800 to 1820 Umar II, 1820 to 1835 Ahmad, 1835 to 1840 Maryud, 1840 to 1843 Nasir, 1843 to c. 1860 Adam I, c. 1860 to 1884 Interregnum, 1884 to 1898 Jayli, 1898 to 1916 Abakr II, 1916 to 1920 Adam II, from 1920 to an unknown date; one source claimed he was still ruling in 1990.", "after_revision": "Taqali (also spelled Tegali) was a state of Nuba peoples which existed in the Nuba Mountains, in modern-day central Sudan. It is believed to have been founded in the eighteenth century, though oral traditions suggest its formation two centuries earlier. Due in part to its geographic position on a plateau surrounded by desert, Taqali was able to maintain independence for some 130 years despite the presence of hostile neighbours. It was conquered by Sudanese Mahdists in 1884 and restored as a British client state in 1889. Its administrative power ended with the 1969 Sudanese coup, though the Makk of Taqali, its traditional leader, retains ceremonial power in the region. History Early history The Taqali state was centered upon the Taqali Massif, the highest part of the Nuba Hills in the Kordofan region (of what is now central Sudan). Its early history is unclear. Oral traditions state that it was founded in the early sixteenth century when the Kingdom of Sennar was established. However, some scholars believe the state did not exist until the late eighteenth century (between 1750 and 1780) and that the early rulers (noted on the list of monarchs) are semi-mythological. Independent state Historian Janet J. Ewald argued that the first true ruler of Taqali was Muhammad Wad Jayli. Ewald proposed that Wad Jayli, along with his son, Ismail of Qaqali, founded the state. Ewald contends the state of Taqali was formed during a period of disorder in the Kordofan when the Kingdom of Sennar was in decline and Darfur was growing in power. Muhammad Wad Jayli began uniting the region and was succeeded as Makk by his brother Umar. Umar was overthrown by Ajaid, the queen mother , and Muhammad's son, Ismail. The state was further expanded by Ismail who took control of the \"99 hills\" of the region. His son Abakr peacefully succeeded him in 1800. Despite its relatively small size and powerful neighbours , the Taqali state remained independent. The state was centred on the Taqali Massif and spread to encompass all of the Nuba Mountains. These highlands were well-suited to agriculture while the surrounding Kordofan plain was dry and inhospitable, which made it difficult to support an invading army . The rocky terrain also served as a natural fortification. The neighbouring Kingdom of Sennar posed the greatest threat and was appeased by annual payments from Taqali. Sennar adhered to this arrangement until the Egyptian invasion of Sennar in 1821. The Egyptians then launched three failed invasions against Taqali. An agreement was reached with Egypt that Taqali would remain de facto independent but would pay a nominal tax and be officially incorporated into Egyptian Sudan. Egypt and other outside powers attempted to influence the leadership of Taqali, which was plagued by succession conflicts from 1840 to 1880. In 1883 the Mahdist Sudanese (who were in the midst of the Mahdist War with Egypt) decided to invade Taqali. Their campaign advanced further than any previous attempt. In July 1884 the ruler of Taqali, Makk Adam, was captured by the Mahdists and eventually died in captivity. Insurrections continued in Taqali, and Hamdan Abu Anja, a nearby Sudanese ruler, was dispatched to quell the rebellion. This resulted in more pillaging and destruction in Taqali. The state was then conquered by the forces of the self-proclaimed Mahdi, Muhammad Ahmad, in the late 19th century. In conjunction with other campaigns and revolts in Egyptian Sudan, this resulted in the formation of Mahdist State. Restoration In 1889 the Mahdists were defeated by the British , who formed Anglo-Egyptian Sudan. The Makk of Taqali was restored to power but remained closely controlled by the British. The Makks of Taqali proved to be useful allies and the British gradually gave them more territory to control and administer. This continued through to the independence of Sudan in 1956. The administrative power of the state ended with the 1969 coup. Though having no political power, the Makk of Taqali remains a ceremonial leader to the people of the region . The title of the ruler of Taqali was Makk (or Mek, \"king\"), possibly Arabic but more likely an Arabized word of Merotici or, Ge'ez origin. The tributaries of the Makk of Taqali were known as muk\u016bk al-\u02bf\u0101da (sing. make al-\u02bf\u0101da), \"customary kings\". In Taqali, the son of a makk was a wad al-makk (pl. awl\u0101d al-makk), and the son of a daughter of the makk was an arb\u0101b (pl. ar\u0101b\u012bb). The ar\u0101b\u012bb were usually prominent councils of the makk , while the ar\u0101b\u012bb al-tham\u0101niyya (eight ar\u0101b\u012bb) were a special council that met in the palace. An arb\u0101b could sometimes pass his rank to his sons. Likewise, the title of wad was sometimes bestowed on trusted slaves or servants. All awl\u0101d were eligible to be elected as makk . A wad who was given a territory from which to draw revenue was an ahl al-\u1e6d\u0101q\u012byah, one who wore the \u1e6d\u0101q\u012byah, a headdress associated with the rule. A woman who bore a son to the makk was known as an artiyya (pl. artiyy\u0101t), a term not of Arabic origin. They attained the highest rank among the women of the royal household, each supervising her household of surriyyat (concubines) and khaddama (maidservants). The following is a list of the sovereigns of Taqali and the period of their reigns. Note that those before Muhammad wad Jali are disputed. Muhammad al-Rubatabi Jayli Abu Jarida Sabo of Taqali Jayli Umara Jayli Awan Allah Jayli Abu Quran Muhammad wad Jayli, Umar I, to 1783 Ismail I, 1783 to 1800 Abakr I, 1800 to 1820 Umar II, 1820 to 1835 Ahmad, 1835 to 1840 Maryud, 1840 to 1843 Nasir, 1843 to Adam I, to 1884 Interregnum, 1884 to 1898 Jayli, 1898 to 1916 Abakr II, 1916 to 1920 Adam II, from 1920 to an unknown date; one source claimed he was still ruling in 1990.", "edit_actions": [{"type": "R", "before": "The name Taqali refers to a group of foot-hills in Central Sudancovering an area of approximately forty square miles. Unlike the surrounding Kordofan, the uplands of the hills are fertile and , thereby suitable for agriculture and higher population density. The", "after": "Taqali (also spelled Tegali) was a state of Nuba peoples which existed in the Nuba Mountains, in modern-day central Sudan. It is believed to have been founded in the eighteenth century, though oral traditions suggest its formation two centuries earlier. Due in part to its geographic position on a plateau surrounded by desert, Taqali was able to maintain independence for some 130 years despite the presence of hostile neighbours. It was conquered by Sudanese Mahdists in 1884 and restored as a British client state in 1889. Its administrative power ended with the 1969 Sudanese coup, though the Makk of Taqali, its traditional leader, retains ceremonial power in the region.", "start_char_pos": 0, "end_char_pos": 261}, {"type": "A", "before": null, "after": "History Early history The Taqali", "start_char_pos": 262, "end_char_pos": 262}, {"type": "R", "before": "hills in the northeast of the region , but its", "after": "Nuba Hills in the Kordofan region (of what is now central Sudan). Its", "start_char_pos": 330, "end_char_pos": 376}, {"type": "R", "before": "on the king list", "after": "(noted on the list of monarchs)", "start_char_pos": 659, "end_char_pos": 675}, {"type": "R", "before": "History Beginnings", "after": "Independent state Historian", "start_char_pos": 699, "end_char_pos": 717}, {"type": "R", "before": "subsequently overthrown around 1783", "after": "overthrown", "start_char_pos": 1153, "end_char_pos": 1188}, {"type": "R", "before": "The Queen Mother", "after": "the queen mother", "start_char_pos": 1199, "end_char_pos": 1215}, {"type": "R", "before": "Once Ismail took over, he further expanded the state and", "after": "The state was further expanded by Ismail who", "start_char_pos": 1246, "end_char_pos": 1302}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1357, "end_char_pos": 1358}, {"type": "R", "before": "but the state was subsequently plagued with conflicts over succession from 1840 to 1880.", "after": "in 1800.", "start_char_pos": 1390, "end_char_pos": 1478}, {"type": "R", "before": "neighbors", "after": "neighbours", "start_char_pos": 1526, "end_char_pos": 1535}, {"type": "R", "before": "While the Nuba Mountains were well suited for agriculture , they were surrounded by the arid Kordofan \u2014 a region too dry to support permanent settlement", "after": "The state was centred on the Taqali Massif and spread to encompass all of the Nuba Mountains. These highlands were well-suited to agriculture while the surrounding Kordofan plain was dry and inhospitable, which made it difficult to support an invading army", "start_char_pos": 1577, "end_char_pos": 1729}, {"type": "D", "before": "of the Taqali Massif", "after": null, "start_char_pos": 1750, "end_char_pos": 1770}, {"type": "R", "before": "neighboring", "after": "neighbouring", "start_char_pos": 1815, "end_char_pos": 1826}, {"type": "R", "before": ". Still, it was mitigated", "after": "and was appeased", "start_char_pos": 1871, "end_char_pos": 1896}, {"type": "R", "before": "the state of Taqali. Eventually, an", "after": "Taqali. An", "start_char_pos": 2070, "end_char_pos": 2105}, {"type": "A", "before": null, "after": "de facto", "start_char_pos": 2164, "end_char_pos": 2164}, {"type": "A", "before": null, "after": "Egypt and other outside powers attempted to influence the leadership of Taqali, which was plagued by succession conflicts from 1840 to 1880.", "start_char_pos": 2257, "end_char_pos": 2257}, {"type": "A", "before": null, "after": "(who were in the midst of the Mahdist War with Egypt)", "start_char_pos": 2287, "end_char_pos": 2287}, {"type": "R", "before": "Mahdist", "after": "Mahdists", "start_char_pos": 2438, "end_char_pos": 2445}, {"type": "R", "before": "finally", "after": "then", "start_char_pos": 2673, "end_char_pos": 2680}, {"type": "R", "before": "This", "after": "In conjunction with other campaigns and revolts in Egyptian Sudan, this", "start_char_pos": 2777, "end_char_pos": 2781}, {"type": "D", "before": "Later history", "after": null, "start_char_pos": 2826, "end_char_pos": 2839}, {"type": "R", "before": "With the defeat of the Mahdists", "after": "Restoration In 1889 the Mahdists were defeated", "start_char_pos": 2840, "end_char_pos": 2871}, {"type": "R", "before": "in 1889, the", "after": ", who formed Anglo-Egyptian Sudan. The", "start_char_pos": 2887, "end_char_pos": 2899}, {"type": "R", "before": "the Makks", "after": "them", "start_char_pos": 3063, "end_char_pos": 3072}, {"type": "A", "before": null, "after": "to", "start_char_pos": 3138, "end_char_pos": 3138}, {"type": "R", "before": "was finally done away with after", "after": "ended with", "start_char_pos": 3212, "end_char_pos": 3244}, {"type": "D", "before": "to this day", "after": null, "start_char_pos": 3369, "end_char_pos": 3380}, {"type": "R", "before": "Makk", "after": "makk", "start_char_pos": 3730, "end_char_pos": 3734}, {"type": "R", "before": "and", "after": ", while", "start_char_pos": 3817, "end_char_pos": 3820}, {"type": "D", "before": "on", "after": null, "start_char_pos": 3938, "end_char_pos": 3940}, {"type": "R", "before": "Makk", "after": "as makk", "start_char_pos": 4082, "end_char_pos": 4086}, {"type": "R", "before": "Makk", "after": "makk", "start_char_pos": 4265, "end_char_pos": 4269}, {"type": "R", "before": "Muhammad", "after": "The following is a list of the sovereigns of Taqali and the period of their reigns. Note that those before Muhammad wad Jali are disputed. Muhammad", "start_char_pos": 4496, "end_char_pos": 4504}, {"type": "D", "before": "c. 1750", "after": null, "start_char_pos": 4614, "end_char_pos": 4621}, {"type": "D", "before": "c. 1860", "after": null, "start_char_pos": 4761, "end_char_pos": 4768}, {"type": "D", "before": "c. 1860", "after": null, "start_char_pos": 4777, "end_char_pos": 4784}], "sents_char_pos": [0, 117, 257, 402, 519, 698, 799, 887, 1052, 1143, 1245, 1348, 1478, 1576, 1731, 1810, 1872, 1928, 2010, 2090, 2256, 2313, 2372, 2479, 2599, 2658, 2776, 2825, 2984, 3114, 3173, 3259, 3382, 3521, 3628, 3761, 3907, 3962, 4043, 4088, 4234, 4338, 4495, 4900]}
+{"doc_id": "154170", "revision_depth": "1", "before_revision": " Philosophy Both Eastern and Western philosophers have studied the concept in great detail. Philosophy of mind deals with the concept. Psychology Freud According to Sigmund Freud, knowledge could only be attained through the intellectual manipulation of carefully made observations and rejected any other means of acquiring knowledge such as intuition , and his findings could have been an analytic turn of his mind towards the subject. Jung In Carl Jung's theory of the ego, described in 1916 in Psychological Types, intuition is an \" irrational function \" , opposed most directly by sensation, and opposed less strongly by the \"rational functions\" of thinking and feeling. Jung defined intuition as \"perception via the unconscious\": using sense-perception only as a starting point, to bring forth ideas, images, possibilities, ways out of a blocked situation, by a process that is mostly unconscious. Jung said that a person in whom intuition is dominant, an \"intuitive type\", acts not on the basis of rational judgment but on sheer intensity of perception. An extraverted intuitive type, \"the natural champion of all minorities with a future\", orients to new and promising but unproven possibilities, often leaving to chase after a new possibility before old ventures have borne fruit, oblivious to his or her own welfare in the constant pursuit of change. An introverted intuitive type orients by images from the unconscious, ever exploring the psychic world of the archetypes, seeking to perceive the meaning of events, but often having no interest in playing a role in those events and not seeing any connection between the contents of the psychic world and him- or herself. Jung thought that extraverted intuitive types were likely entrepreneurs, speculators, cultural revolutionaries, often undone by a desire to escape every situation before it becomes settled and constraining\u2014even repeatedly leaving lovers for the sake of new romantic possibilities. His introverted intuitive types were likely mystics, prophets, or cranks, struggling with a tension between protecting their visions from influence by others and making their ideas comprehensible and reasonably persuasive to others\u2014a necessity for those visions to bear real fruit. C.G. Jung. Psychological Types. Bollingen Series XX, Volume 6, Princeton University Press, 1971.%DIFDELCMD < %DIFDELCMD < %%% Modern psychology In more-recent psychology, intuition can encompass the ability to know valid solutions to problems and decision making. For example, the recognition primed decision (RPD) model explains how people can make relatively fast decisions without having to compare options. Gary Klein found that under time pressure, high stakes, and changing parameters, experts used their base of experience to identify similar situations and intuitively choose feasible solutions. Thus, the RPD model is a blend of intuition and analysis. The intuition is the pattern-matching process that quickly suggests feasible courses of action. The analysis is the mental simulation, a conscious and deliberate review of the courses of action.Klein, Gary. Intuition At Work. Random House, NY, NY. January 2003. Instinct is often misinterpreted as intuition and its reliability considered to be dependent on past knowledge and occurrences in a specific area. For example, someone who has had more experiences with children will tend to have a better instinct about what they should do in certain situations with them. This is not to say that one with a great amount of experience is always going to have an accurate intuition .Eugene Sadler-Smith. Inside Intuition. 2008.%DIFDELCMD < %DIFDELCMD < %%% Intuitive abilities were quantitatively tested at Yale University in the 1970s. While studying nonverbal communication, researchers noted that some subjects were able to read nonverbal facial cues before reinforcement occurred.AJ Giannini, J Daood, MC Giannini, R Boniface, PG Rhodes. Intellect versus intuition--dichotomy in the reception of nonverbal communication. Journal of General Psychology. 99:19-24 , 1978. In employing a similar design, they noted that highly intuitive subjects made decisions quickly but could not identify their rationale. Their level of accuracy, however, did not differ from that of non-intuitive subjects.AJ Giannini, ME Barringer, MC Giannini, RH Loiselle. Lack of relationship between handedness and intuitive and intellectual (rationalistic) modes of information processing. Journal of General Psychology. 111:31-37 1984. According to the works of Daniel Kahneman, intuition is the ability to automatically generate solutions without long logical arguments or evidence.%DIFDELCMD < %DIFDELCMD < %%% Colloquial usage Intuition, as a gut feeling based on experience, has been found to be useful for business leaders for making judgement about people, culture and strategy. Law enforcement officers often claim to observe suspects and immediately \"know\" that they possess a weapon or illicit narcotic substances, which could also be action of instincts. Often unable to articulate why they reacted or what prompted them at the time of the event, they sometimes retrospectively can plot their actions based upon what had been clear and present danger signals. Such examples liken intuition to \"gut feelings\" and when viable illustrate preconscious activity.Anthony J. Pinizzotto, PhD, Edward F. Davis, MA, and Charles E. Miller III Emotional/rational decision making in law enforcement (Federal Bureau of Investigation), Free Online Library, 2004.", "after_revision": "Colloquial usage Intuition, as a gut feeling based on experience, has been found to be useful for business leaders for making judgement about people, culture and strategy. Law enforcement officers often claim to observe suspects and immediately \"know\" that they possess a weapon or illicit narcotic substances, which could also be action of instincts. Often unable to articulate why they reacted or what prompted them at the time of the event, they sometimes retrospectively can plot their actions based upon what had been clear and present danger signals. Such examples liken intuition to \"gut feelings\" and when viable illustrate preconscious activity.Anthony J. Pinizzotto, PhD, Edward F. Davis, MA, and Charles E. Miller III Emotional/rational decision making in law enforcement (Federal Bureau of Investigation), Free Online Library, 2004. Psychology Freud According to Sigmund Freud, knowledge could only be attained through the intellectual manipulation of carefully made observations and rejected any other means of acquiring knowledge such as intuition, and his findings could have been an analytic turn of his mind towards the subject. Jung In Carl Jung's theory of the ego, described in 1916 in Psychological Types, intuition is an \"irrational function\", opposed most directly by sensation, and opposed less strongly by the \"rational functions\" of thinking and feeling. Jung defined intuition as \"perception via the unconscious\": using sense-perception only as a starting point, to bring forth ideas, images, possibilities, ways out of a blocked situation, by a process that is mostly unconscious. Jung said that a person in whom intuition is dominant, an \"intuitive type\", acts not on the basis of rational judgment but on sheer intensity of perception. An extraverted intuitive type, \"the natural champion of all minorities with a future\", orients to new and promising but unproven possibilities, often leaving to chase after a new possibility before old ventures have borne fruit, oblivious to his or her own welfare in the constant pursuit of change. An introverted intuitive type orients by images from the unconscious, ever exploring the psychic world of the archetypes, seeking to perceive the meaning of events, but often having no interest in playing a role in those events and not seeing any connection between the contents of the psychic world and him- or herself. Jung thought that extraverted intuitive types were likely entrepreneurs, speculators, cultural revolutionaries, often undone by a desire to escape every situation before it becomes settled and constraining\u2014even repeatedly leaving lovers for the sake of new romantic possibilities. His introverted intuitive types were likely mystics, prophets, or cranks, struggling with a tension between protecting their visions from influence by others and making their ideas comprehensible and reasonably persuasive to others\u2014a necessity for those visions to bear real fruit.C.G. Jung. Psychological Types. Bollingen Series XX, Volume 6, Princeton University Press, 1971. Modern psychology In more-recent psychology, intuition can encompass the ability to know valid solutions to problems and decision making. For example, the recognition primed decision (RPD) model explains how people can make relatively fast decisions without having to compare options. Gary Klein found that under time pressure, high stakes, and changing parameters, experts used their base of experience to identify similar situations and intuitively choose feasible solutions. Thus, the RPD model is a blend of intuition and analysis. The intuition is the pattern-matching process that quickly suggests feasible courses of action. The analysis is the mental simulation, a conscious and deliberate review of the courses of action.Klein, Gary. Intuition At Work. Random House, NY, NY. January 2003. Instinct is often misinterpreted as intuition and its reliability considered to be dependent on past knowledge and occurrences in a specific area. For example, someone who has had more experiences with children will tend to have a better instinct about what they should do in certain situations with them. This is not to say that one with a great amount of experience is always going to have an accurate intuition.Eugene Sadler-Smith. Inside Intuition. 2008. Intuitive abilities were quantitatively tested at Yale University in the 1970s. While studying nonverbal communication, researchers noted that some subjects were able to read nonverbal facial cues before reinforcement occurred.AJ Giannini, J Daood, MC Giannini, R Boniface, PG Rhodes. Intellect versus intuition--dichotomy in the reception of nonverbal communication. Journal of General Psychology. 99:19-24, 1978. In employing a similar design, they noted that highly intuitive subjects made decisions quickly but could not identify their rationale. Their level of accuracy, however, did not differ from that of non-intuitive subjects.AJ Giannini, ME Barringer, MC Giannini, RH Loiselle. Lack of relationship between handedness and intuitive and intellectual (rationalistic) modes of information processing. Journal of General Psychology. 111:31-37 1984. According to the works of Daniel Kahneman, intuition is the ability to automatically generate solutions without long logical arguments or evidence. Philosophy Both Eastern and Western philosophers have studied the concept in great detail. Philosophy of mind deals with the concept. Artificial intelligence Researchers in artificial intelligence are trying to add intuition to algorithms; as the \" fourth generation of AI \" %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% , %DIFDELCMD < %DIFDELCMD < %%% this can be applied to many industries, especially finance. One example of artificial intuition is AlphaGo Zero, which used neural networks and was trained with reinforcement learning from a blank slate. In another example, ThetaRay partnered with Google Cloud to use artificial intuition for anti-money laundering purposes.", "edit_actions": [{"type": "A", "before": null, "after": "Colloquial usage Intuition, as a gut feeling based on experience, has been found to be useful for business leaders for making judgement about people, culture and strategy. Law enforcement officers often claim to observe suspects and immediately \"know\" that they possess a weapon or illicit narcotic substances, which could also be action of instincts. Often unable to articulate why they reacted or what prompted them at the time of the event, they sometimes retrospectively can plot their actions based upon what had been clear and present danger signals. Such examples liken intuition to \"gut feelings\" and when viable illustrate preconscious activity.Anthony J. Pinizzotto, PhD, Edward F. Davis, MA, and Charles E. Miller III Emotional/rational decision making in law enforcement (Federal Bureau of Investigation), Free Online Library, 2004.", "start_char_pos": 0, "end_char_pos": 0}, {"type": "A", "before": null, "after": "Psychology", "start_char_pos": 1, "end_char_pos": 1}, {"type": "A", "before": null, "after": "Freud According to Sigmund Freud, knowledge could only be attained through the intellectual manipulation of carefully made observations and rejected any other means of acquiring knowledge such as intuition, and his findings could have been an analytic turn of his mind towards the subject.", "start_char_pos": 2, "end_char_pos": 2}, {"type": "A", "before": null, "after": "Jung In Carl Jung's theory of the ego, described in 1916 in Psychological Types, intuition is an \"irrational function\", opposed most directly by sensation, and opposed less strongly by the \"rational functions\" of thinking and feeling. Jung defined intuition as \"perception via the unconscious\": using sense-perception only as a starting point, to bring forth ideas, images, possibilities, ways out of a blocked situation, by a process that is mostly unconscious.", "start_char_pos": 3, "end_char_pos": 3}, {"type": "A", "before": null, "after": "Jung said that a person in whom intuition is dominant, an \"intuitive type\", acts not on the basis of rational judgment but on sheer intensity of perception. An extraverted intuitive type, \"the natural champion of all minorities with a future\", orients to new and promising but unproven possibilities, often leaving to chase after a new possibility before old ventures have borne fruit, oblivious to his or her own welfare in the constant pursuit of change. An introverted intuitive type orients by images from the unconscious, ever exploring the psychic world of the archetypes, seeking to perceive the meaning of events, but often having no interest in playing a role in those events and not seeing any connection between the contents of the psychic world and him- or herself. Jung thought that extraverted intuitive types were likely entrepreneurs, speculators, cultural revolutionaries, often undone by a desire to escape every situation before it becomes settled and constraining\u2014even repeatedly leaving lovers for the sake of new romantic possibilities. His introverted intuitive types were likely mystics, prophets, or cranks, struggling with a tension between protecting their visions from influence by others and making their ideas comprehensible and reasonably persuasive to others\u2014a necessity for those visions to bear real fruit.C.G. Jung. Psychological Types. Bollingen Series XX, Volume 6, Princeton University Press, 1971.", "start_char_pos": 4, "end_char_pos": 4}, {"type": "A", "before": null, "after": "Modern psychology In more-recent psychology, intuition can encompass the ability to know valid solutions to problems and decision making. For example, the recognition primed decision (RPD) model explains how people can make relatively fast decisions without having to compare options. Gary Klein found that under time pressure, high stakes, and changing parameters, experts used their base of experience to identify similar situations and intuitively choose feasible solutions. Thus, the RPD model is a blend of intuition and analysis. The intuition is the pattern-matching process that quickly suggests feasible courses of action. The analysis is the mental simulation, a conscious and deliberate review of the courses of action.Klein, Gary. Intuition At Work. Random House, NY, NY. January 2003.", "start_char_pos": 5, "end_char_pos": 5}, {"type": "A", "before": null, "after": "Instinct is often misinterpreted as intuition and its reliability considered to be dependent on past knowledge and occurrences in a specific area. For example, someone who has had more experiences with children will tend to have a better instinct about what they should do in certain situations with them. This is not to say that one with a great amount of experience is always going to have an accurate intuition.Eugene Sadler-Smith. Inside Intuition. 2008.", "start_char_pos": 6, "end_char_pos": 6}, {"type": "A", "before": null, "after": "Intuitive abilities were quantitatively tested at Yale University in the 1970s. While studying nonverbal communication, researchers noted that some subjects were able to read nonverbal facial cues before reinforcement occurred.AJ Giannini, J Daood, MC Giannini, R Boniface, PG Rhodes. Intellect versus intuition--dichotomy in the reception of nonverbal communication. Journal of General Psychology. 99:19-24, 1978. In employing a similar design, they noted that highly intuitive subjects made decisions quickly but could not identify their rationale. Their level of accuracy, however, did not differ from that of non-intuitive subjects.AJ Giannini, ME Barringer, MC Giannini, RH Loiselle. Lack of relationship between handedness and intuitive and intellectual (rationalistic) modes of information processing. Journal of General Psychology. 111:31-37 1984.", "start_char_pos": 7, "end_char_pos": 7}, {"type": "A", "before": null, "after": "According to the works of Daniel Kahneman, intuition is the ability to automatically generate solutions without long logical arguments or evidence.", "start_char_pos": 8, "end_char_pos": 8}, {"type": "R", "before": "Psychology", "after": "Artificial intelligence", "start_char_pos": 143, "end_char_pos": 153}, {"type": "D", "before": "Freud According to Sigmund Freud, knowledge could only be attained through the intellectual manipulation of carefully made observations and rejected any other means of acquiring knowledge such as intuition , and his findings could have been an analytic turn of his mind towards the subject.", "after": null, "start_char_pos": 154, "end_char_pos": 444}, {"type": "R", "before": "Jung In Carl Jung's theory of the ego, described in 1916 in Psychological Types, intuition is an", "after": "Researchers in artificial intelligence are trying to add intuition to algorithms; as the", "start_char_pos": 445, "end_char_pos": 541}, {"type": "R", "before": "irrational function", "after": "fourth generation of AI", "start_char_pos": 544, "end_char_pos": 563}, {"type": "D", "before": ", opposed most directly by sensation, and opposed less strongly by the \"rational functions\" of thinking and feeling. Jung defined intuition as \"perception via the unconscious\": using sense-perception only as a starting point, to bring forth ideas, images, possibilities, ways out of a blocked situation, by a process that is mostly unconscious.", "after": null, "start_char_pos": 566, "end_char_pos": 910}, {"type": "D", "before": "Jung said that a person in whom intuition is dominant, an \"intuitive type\", acts not on the basis of rational judgment but on sheer intensity of perception. An extraverted intuitive type, \"the natural champion of all minorities with a future\", orients to new and promising but unproven possibilities, often leaving to chase after a new possibility before old ventures have borne fruit, oblivious to his or her own welfare in the constant pursuit of change. An introverted intuitive type orients by images from the unconscious, ever exploring the psychic world of the archetypes, seeking to perceive the meaning of events, but often having no interest in playing a role in those events and not seeing any connection between the contents of the psychic world and him- or herself. Jung thought that extraverted intuitive types were likely entrepreneurs, speculators, cultural revolutionaries, often undone by a desire to escape every situation before it becomes settled and constraining\u2014even repeatedly leaving lovers for the sake of new romantic possibilities. His introverted intuitive types were likely mystics, prophets, or cranks, struggling with a tension between protecting their visions from influence by others and making their ideas comprehensible and reasonably persuasive to others\u2014a necessity for those visions to bear real fruit. C.G. Jung. Psychological Types. Bollingen Series XX, Volume 6, Princeton University Press, 1971.", "after": null, "start_char_pos": 911, "end_char_pos": 2348}, {"type": "D", "before": "Modern psychology In more-recent psychology, intuition can encompass the ability to know valid solutions to problems and decision making. For example, the recognition primed decision (RPD) model explains how people can make relatively fast decisions without having to compare options. Gary Klein found that under time pressure, high stakes, and changing parameters, experts used their base of experience to identify similar situations and intuitively choose feasible solutions. Thus, the RPD model is a blend of intuition and analysis. The intuition is the pattern-matching process that quickly suggests feasible courses of action. The analysis is the mental simulation, a conscious and deliberate review of the courses of action.Klein, Gary. Intuition At Work. Random House, NY, NY. January 2003.", "after": null, "start_char_pos": 2378, "end_char_pos": 3175}, {"type": "D", "before": "Instinct is often misinterpreted as intuition and its reliability considered to be dependent on past knowledge and occurrences in a specific area. For example, someone who has had more experiences with children will tend to have a better instinct about what they should do in certain situations with them. This is not to say that one with a great amount of experience is always going to have an accurate intuition .Eugene Sadler-Smith. Inside Intuition. 2008.", "after": null, "start_char_pos": 3176, "end_char_pos": 3635}, {"type": "D", "before": "Intuitive abilities were quantitatively tested at Yale University in the 1970s. While studying nonverbal communication, researchers noted that some subjects were able to read nonverbal facial cues before reinforcement occurred.AJ Giannini, J Daood, MC Giannini, R Boniface, PG Rhodes. Intellect versus intuition--dichotomy in the reception of nonverbal communication. Journal of General Psychology. 99:19-24", "after": null, "start_char_pos": 3665, "end_char_pos": 4072}, {"type": "D", "before": "1978. In employing a similar design, they noted that highly intuitive subjects made decisions quickly but could not identify their rationale. Their level of accuracy, however, did not differ from that of non-intuitive subjects.AJ Giannini, ME Barringer, MC Giannini, RH Loiselle. Lack of relationship between handedness and intuitive and intellectual (rationalistic) modes of information processing. Journal of General Psychology. 111:31-37 1984.", "after": null, "start_char_pos": 4075, "end_char_pos": 4521}, {"type": "D", "before": "According to the works of Daniel Kahneman, intuition is the ability to automatically generate solutions without long logical arguments or evidence.", "after": null, "start_char_pos": 4522, "end_char_pos": 4669}, {"type": "R", "before": "Colloquial usage Intuition, as a gut feeling based on experience, has been found to be useful for business leaders for making judgement about people, culture and strategy. Law enforcement officers often claim to observe suspects and immediately \"know\" that they possess a weapon or illicit narcotic substances, which could also be action of instincts. Often unable to articulate why they reacted or what prompted them at the time of the event, they sometimes retrospectively can plot their actions based upon what had been clear and present danger signals. Such examples liken intuition to \"gut feelings\" and when viable illustrate preconscious activity.Anthony J. Pinizzotto, PhD, Edward F. Davis, MA, and Charles E. Miller III Emotional/rational decision making in law enforcement (Federal Bureau of Investigation), Free Online Library, 2004.", "after": "this can be applied to many industries, especially finance. One example of artificial intuition is AlphaGo Zero, which used neural networks and was trained with reinforcement learning from a blank slate. In another example, ThetaRay partnered with Google Cloud to use artificial intuition for anti-money laundering purposes.", "start_char_pos": 4699, "end_char_pos": 5543}], "sents_char_pos": [0, 99, 142, 444, 682, 910, 1067, 1367, 1688, 1969, 2251, 2262, 2283, 2348, 2515, 2662, 2855, 2913, 3009, 3108, 3120, 3139, 3175, 3322, 3481, 3591, 3611, 3629, 3744, 3892, 3949, 4032, 4063, 4080, 4216, 4302, 4354, 4474, 4505, 4521, 4669, 4870, 5050, 5255, 5353]}
+{"doc_id": "1549988", "revision_depth": "1", "before_revision": "The Guyanese dollar (currency sign: $, G$ and GY$; ISO: GYD) has been the unit of account in Guyana (formerly British Guiana) since 29 January 1839. Originally it was intended as a transitional unit to facilitate the changeover from the Dutch guilder system of currency to the British pound sterling system. The Spanish dollar was already prevalent throughout the West Indies in general, and from 1839, the Spanish dollar unit operated in British Guiana in conjunction with British sterling coins at a standard conversion rate of one dollar for every four shillings and twopence. In 1951 the British sterling coinage was replaced with a new decimal coinage which was simultaneously introduced through all the British territories in the Eastern Caribbean. When sterling began to depreciate in the early 1970s, a switch to a US dollar peg became increasingly attractive as an anti-inflationary measure and the Eastern Caribbean Currency Authority (of which Guyana was a member) made the switch in October 1975. The Guyanese dollar is normally abbreviated with the dollar sign $, or alternatively G$ to distinguish it from other dollar-denominated currencies. History The history of the Guyanese dollar should not be considered in isolation of the wider picture surrounding the history of currency in the British West Indies as a whole. ( See Currencies of the British West Indies ). The aspects of that history that are peculiar to British Guiana are the continued use of the four pence groat coin when all other territories had abandoned it, and also the use of dollar accounts in both the public and private sectors since 1839. In the other Eastern Caribbean territories, there was a mixture of dollar and sterling accounts until the year 1951. The Dutch territories of Essequibo, Demerara, and Berbice on the north coast of South America, created in early 17th century, came under the control of the British during the Napoleonic wars. These territories were formally ceded to the United Kingdom in 1815 and united to become the colony of British Guiana in 1831. At first, the British introduced a British variety of the Dutch guilder currency into this territory. Then in 1839, the Spanish dollar as a unit of account was introduced in order to facilitate the introduction of British sterling silver coinage. The rationale behind this lies in the fact that Spanish silver dollars, alternatively known as pieces of eight, were already circulating alongside the Dutch coinage, and also widely throughout the Eastern Caribbean. The dollar unit of account therefore acted as a convenient intermediary conversion unit between sterling and the outgoing guilder unit. The dollar unit was equivalent to 4 shillings 2 pence sterling and replaced the guilder unit at a rate of 1 dollar = 3\u215b guilders, i.e. \u00a31 = $4.8 = 15 guilders. A particular feature of the circulation of British silver coins in British Guiana was the popularity of the 4d (four pence ) coin , known as the groat. This was a direct consequence of its equivalence to the very popular outgoing 'Bit' coin which was equal to one quarter of a guilder. When the groat coin ceased to circulate in the United Kingdom in the latter half of the nineteenth century, a special request was made in 1888 for groats to be struck for use in the British West Indies and British Guiana. These were first struck in 1891. From 1917 they were struck exclusively for use in British Guiana. Spanish , Mexican, and Colombian silver dollarscontinued to circulate alongside the British sterling coinageuntil 1876 when these dollar coins were demonetised.%DIFDELCMD < %DIFDELCMD < %%% The Spanish dollar unit should not be confused with the American dollar unit . The American dollar unit was first introduced in the US in the year 1792, based on the average weight of a selection of worn Spanish dollars. As such, the American dollar was marginally less valuable than the Spanish dollar. Coins%DIFDELCMD < %DIFDELCMD < %%% After the introduction of the dollar, regular British coins circulated, together with 2 and 4 pence coins also issued elsewhere in the British West Indies. The 2 pence coins issued in 1838, 1843 and 1848 were of the standard Maundy money type, whilst the 4 pence coins bore an image of Britannia. Between 1891 and 1916, 4 pence coins were issued specifically for \"British Guiana and West Indies\" and between 1917 and 1945 for \"British Guiana\". 1916 also saw the first issue of paper money by the Government of British Guiana, in denominations of 1 , 2, 5, 20 and 100 dollars . In 1967, coins were introduced in denominations of 1-, 5-, 10-, 25 and 50 cents. The 1 and 5 cents were struck in Nickel-brass, with the other denominations struck in cupro-nickel. In 1996, high inflation caused the introduction of 1, 5 and 10 dollars coins. The 1 and 5 dollars are struck in copper-plated steel, whilst the 10 dollars is struck in nickel-plated steel and has an equilateral-curved heptagonal shape. In August, 2020, the $100 coin was launched. The coin is the first coloured coin issued by the Bank of Guyana. Banknotes Private banknotes were introduced in the late 19th century by the British Guiana Bank and the Colonial Bank. Both issued 5, 20 and 100 dollars. The British Guiana Bank issued notes until 1907, with the Colonial Bank issuing notes until 1917. The Colonial Bank was taken over by Barclays Bank, which issued notes in denominates of 5, 10, 20 and 100 dollars between 1926 and 1941. In 1909, the Royal Bank of Canada introduced 100 dollars notes, followed in 1913 by 5 and 20 dollars notes. From 1920, the notes also bore the denomination in sterling. 100 dollars were issued until 1920, with the 5 and 20 dollars issued until 1938. Paper money production specifically for British Guiana ceased in 1942 and local notes were replaced by BWI$ notes in 1951. In 1955, the BWI$ was decimalized and coinage was issued in the name of the \"British Caribbean Territories, Eastern Group\". In 1965, the East Caribbean dollar (EC$) replaced the BWI and circulated in British Guiana for a year until, following independence in 1966, the Guyanese dollar was introduced, replacing the East Caribbean dollar at par.", "after_revision": "History The history of the Guyanese dollar should not be considered in isolation of the wider picture surrounding the history of currency in the British West Indies as a whole. ( See Currencies of the British West Indies ). The aspects of that history that are peculiar to British Guiana are the continued use of the four pence groat coin when all other territories had abandoned it, and also the use of dollar accounts in both the public and private sectors since 1839. In the other Eastern Caribbean territories, there was a mixture of dollar and sterling accounts until the year 1951. The Dutch territories of Essequibo, Demerara, and Berbice on the north coast of South America, created in early 17th century, came under the control of the British during the Napoleonic wars. These territories were formally ceded to the United Kingdom in %DIFDELCMD < %DIFDELCMD < %%% 1815 and united to become the colony of British Guiana in 1831. At first, the British introduced a British variety of the Dutch guilder currency into this territory. Then in 1839, the Spanish dollar as a unit of account was introduced in order to facilitate the introduction of British sterling silver coinage. The rationale behind this lies in the fact that Spanish silver dollars, alternatively known as pieces of eight, were already circulating alongside the Dutch coinage, and also widely throughout the Eastern Caribbean. The dollar unit of account therefore acted as a convenient intermediary conversion unit between sterling and the outgoing guilder unit . The dollar unit was %DIFDELCMD < %DIFDELCMD < %%% equivalent to 4 shillings 2 pence sterling and replaced the guilder unit at a rate of 1 dollar = 3\u215b guilders, i.e. \u00a3 1 = $4.8 = 15 guilders. A particular feature of the circulation of British silver coins in British Guiana was the popularity of the 4d (four pence) coin, known as the groat. This was a direct consequence of its equivalence to the very popular outgoing 'Bit' coin which was equal to one quarter of a guilder. When the groat coin ceased to circulate in the United Kingdom in the latter half of the nineteenth century, a special request was made in 1888 for groats to be struck for use in the British West Indies and British Guiana. These were first struck in 1891. From 1917 they were struck exclusively for use in British Guiana. The Spanish dollar unit should not be confused with the American dollar unit. The American dollar unit was first introduced in the US in the year 1792, based on the average weight of a selection of worn Spanish dollars. As such, the American dollar was marginally less valuable than the Spanish dollar. Coins After the introduction of the dollar, regular British coins circulated, together with 2 and 4 pence coins also issued elsewhere in the British West Indies. The 2 pence coins issued in 1838, 1843 and 1848 were of the standard Maundy money type, whilst the 4 pence coins bore an image of Britannia. Between 1891 and 1916, 4 pence coins were issued specifically for \"British Guiana and West Indies\" and between 1917 and 1945 for \"British Guiana\". 1916 also saw the first issue of paper money by the Government of British Guiana, in denominations of 1, 2, 5, 20 and 100 dollars. In 1967, coins were introduced in denominations of 1-, 5-, 10-, 25 and 50 cents. The 1 and 5 cents were struck in Nickel-brass, with the other denominations struck in cupro-nickel. In 1996, high inflation caused the introduction of 1, 5 and 10 dollars coins. The 1 and 5 dollars are struck in copper-plated steel, whilst the 10 dollars is struck in nickel-plated steel and has an equilateral-curved heptagonal shape. In August, 2020, the $100 coin was launched. The coin is the first coloured coin issued by the Bank of Guyana. Banknotes Private banknotes were introduced in the late 19th century by the British Guiana Bank and the Colonial Bank. Both issued 5, 20 and 100 dollars. The British Guiana Bank issued notes until 1907, with the Colonial Bank issuing notes until 1917. The Colonial Bank was taken over by Barclays Bank, which issued notes in denominates of 5, 10, 20 and 100 dollars between 1926 and 1941. In 1909, the Royal Bank of Canada introduced 100 dollars notes, followed in 1913 by 5 and 20 dollars notes. From 1920, the notes also bore the denomination in sterling. 100 dollars were issued until 1920, with the 5 and 20 dollars issued until 1938. Paper money production specifically for British Guiana ceased in 1942 and local notes were replaced by BWI$ notes in 1951. In 1955, the BWI$ was decimalized and coinage was issued in the name of the \"British Caribbean Territories, Eastern Group\". In 1965, the East Caribbean dollar (EC$) replaced the BWI$ and circulated in British Guiana for a year until, following independence in 1966, the Guyanese dollar was introduced, replacing the East Caribbean dollar at par.", "edit_actions": [{"type": "R", "before": "The Guyanese dollar (currency sign: $, G$ and GY$; ISO: GYD) has been the unit of account in Guyana (formerly British Guiana) since 29 January 1839. Originally it was intended as a transitional unit to facilitate the changeover from the Dutch guilder system of currency to the British pound sterling system. The Spanish dollar was already prevalent throughout the West Indies in general, and from 1839, the Spanish dollar unit operated in British Guiana in conjunction with British sterling coins at a standard conversion rate of one dollar for every four shillings and twopence. In 1951 the British sterling coinage was replaced with a new decimal coinage which was simultaneously introduced through all the British territories in the Eastern Caribbean. When sterling began to depreciate in the early 1970s, a switch to a US dollar peg became increasingly attractive as an anti-inflationary measure and the Eastern Caribbean Currency Authority (of which Guyana was a member) made the switch in October 1975. The Guyanese dollar is normally abbreviated with the dollar sign $, or alternatively G$ to distinguish it from other dollar-denominated currencies. History The history of the Guyanese dollar should not be considered in isolation of the wider picture surrounding the history of currency in the British West Indies as a whole. ( See Currencies of the British West Indies ). The aspects of that history that are peculiar to British Guiana are the continued use of the four pence groat coin when all other territories had abandoned it, and also the use of dollar accounts in both the public and private sectors since 1839. In the other Eastern Caribbean territories, there was a mixture of dollar and sterling accounts until the year 1951. The Dutch territories of Essequibo, Demerara, and Berbice on the north coast of South America, created in early 17th century, came under the control of the British during the Napoleonic wars. These territories were formally ceded to the United Kingdom in 1815 and united to become the colony of British Guiana in 1831. At first, the British introduced a British variety of the Dutch guilder currency into this territory. Then in 1839, the Spanish dollar as a unit of account was introduced in order to facilitate the introduction of British sterling silver coinage. The rationale behind this lies in the fact that Spanish silver dollars, alternatively known as pieces of eight, were already circulating alongside the Dutch coinage, and also widely throughout the Eastern Caribbean. The dollar unit of account therefore acted as a convenient intermediary conversion unit between sterling and the outgoing guilder unit. The dollar unit was equivalent to 4 shillings 2 pence sterling and replaced the guilder unit at a rate of 1 dollar = 3\u215b guilders, i.e. \u00a31 = $4.8 = 15 guilders.", "after": "History", "start_char_pos": 0, "end_char_pos": 2822}, {"type": "A", "before": null, "after": "The history of the Guyanese dollar should not be considered in isolation of the wider picture surrounding the history of currency in the British West Indies as a whole. ( See Currencies of the British West Indies ). The aspects of that history that are peculiar to British Guiana are the continued use of the four pence groat coin when all other territories had abandoned it, and also the use of dollar accounts in both the public and private sectors since 1839. In the other Eastern Caribbean territories, there was a mixture of dollar and sterling accounts until the year 1951.", "start_char_pos": 2823, "end_char_pos": 2823}, {"type": "R", "before": "A particular feature of the circulation of British silver coins in British Guiana was the popularity of the 4d (four pence ) coin , known as the groat. This was a direct consequence of its equivalence to the very popular outgoing 'Bit' coin which was equal to one quarter of a guilder. When the groat coin ceased to circulate in the", "after": "The Dutch territories of Essequibo, Demerara, and Berbice on the north coast of South America, created in early 17th century, came under the control of the British during the Napoleonic wars. These territories were formally ceded to the", "start_char_pos": 2824, "end_char_pos": 3156}, {"type": "D", "before": "the latter half of the nineteenth century, a special request was made in 1888 for groats to be struck for use in the British West Indies and British Guiana. These were first struck in 1891. From 1917 they were struck exclusively for use in British Guiana.", "after": null, "start_char_pos": 3175, "end_char_pos": 3430}, {"type": "D", "before": "Spanish , Mexican, and Colombian silver dollarscontinued to circulate alongside the British sterling coinageuntil 1876 when these dollar coins were demonetised.", "after": null, "start_char_pos": 3431, "end_char_pos": 3591}, {"type": "R", "before": "The Spanish dollar unit should not be confused with the American dollar", "after": "1815 and united to become the colony of British Guiana in 1831. At first, the British introduced a British variety of the Dutch guilder currency into this territory. Then in 1839, the Spanish dollar as a unit of account was introduced in order to facilitate the introduction of British sterling silver coinage. The rationale behind this lies in the fact that Spanish silver dollars, alternatively known as pieces of eight, were already circulating alongside the Dutch coinage, and also widely throughout the Eastern Caribbean. The dollar", "start_char_pos": 3621, "end_char_pos": 3692}, {"type": "A", "before": null, "after": "of account therefore acted as a convenient intermediary conversion unit between sterling and the outgoing guilder unit", "start_char_pos": 3698, "end_char_pos": 3698}, {"type": "D", "before": "American", "after": null, "start_char_pos": 3705, "end_char_pos": 3713}, {"type": "D", "before": "first introduced in the US in the year 1792, based on the average weight of a selection of worn Spanish dollars. As such, the American dollar was marginally less valuable than the Spanish dollar.", "after": null, "start_char_pos": 3730, "end_char_pos": 3925}, {"type": "D", "before": "Coins", "after": null, "start_char_pos": 3926, "end_char_pos": 3931}, {"type": "R", "before": "After the introduction of the dollar, regular British coins circulated, together with 2 and", "after": "equivalent to", "start_char_pos": 3961, "end_char_pos": 4052}, {"type": "R", "before": "pence coins also issued elsewhere in the British West Indies. The", "after": "shillings", "start_char_pos": 4055, "end_char_pos": 4120}, {"type": "R", "before": "pence coins issued in 1838, 1843 and 1848 were of the standard Maundy money type, whilst the 4 pence coins bore an image of Britannia. Between 1891 and 1916, 4 pence coins were issued specifically for \"British Guiana and West Indies\" and between 1917 and 1945 for \"British Guiana\". 1916 also saw the first issue of paper money by the Government of British Guiana, in denominations of", "after": "pence sterling and replaced the guilder unit at a rate of 1 dollar = 3\u215b guilders, i.e. \u00a3", "start_char_pos": 4123, "end_char_pos": 4506}, {"type": "R", "before": ", 2,", "after": "= $4.8 = 15 guilders. A particular feature of the circulation of British silver coins in British Guiana was the popularity of the 4d (four pence) coin, known as the groat. This was a direct consequence of its equivalence to the very popular outgoing 'Bit' coin which was equal to one quarter of a guilder. When the groat coin ceased to circulate in the United Kingdom in the latter half of the nineteenth century, a special request was made in 1888 for groats to be struck for use in the British West Indies and British Guiana. These were first struck in 1891. From 1917 they were struck exclusively for use in British Guiana. The Spanish dollar unit should not be confused with the American dollar unit. The American dollar unit was first introduced in the US in the year 1792, based on the average weight of a selection of worn Spanish dollars. As such, the American dollar was marginally less valuable than the Spanish dollar. Coins After the introduction of the dollar, regular British coins circulated, together with 2 and 4 pence coins also issued elsewhere in the British West Indies. The 2 pence coins issued in 1838, 1843 and 1848 were of the standard Maundy money type, whilst the 4 pence coins bore an image of Britannia. Between 1891 and 1916, 4 pence coins were issued specifically for \"British Guiana and West Indies\" and between 1917 and 1945 for \"British Guiana\". 1916 also saw the first issue of paper money by the Government of British Guiana, in denominations of 1, 2, 5, 20 and 100 dollars. In 1967, coins were introduced in denominations of 1-, 5-, 10-, 25 and 50 cents. The 1 and 5 cents were struck in Nickel-brass, with the other denominations struck in cupro-nickel. In 1996, high inflation caused the introduction of 1, 5 and 10 dollars coins. The 1 and 5 dollars are struck in copper-plated steel, whilst the 10 dollars is struck in nickel-plated steel and has an equilateral-curved heptagonal shape. In August, 2020, the $100 coin was launched. The coin is the first coloured coin issued by the Bank of Guyana.", "start_char_pos": 4509, "end_char_pos": 4513}, {"type": "A", "before": null, "after": "Banknotes", "start_char_pos": 4514, "end_char_pos": 4514}, {"type": "A", "before": null, "after": "Private banknotes were introduced in the late 19th century by the British Guiana Bank and the Colonial Bank. Both issued 5, 20 and 100 dollars. The British Guiana Bank issued notes until 1907, with the Colonial Bank issuing notes until 1917. The Colonial Bank was taken over by Barclays Bank, which issued notes in denominates of", "start_char_pos": 4515, "end_char_pos": 4515}, {"type": "A", "before": null, "after": "10,", "start_char_pos": 4519, "end_char_pos": 4519}, {"type": "R", "before": ".", "after": "between 1926 and 1941.", "start_char_pos": 4539, "end_char_pos": 4540}, {"type": "R", "before": "1967, coins were introduced in denominations of 1-, 5-, 10-, 25 and 50 cents. The 1 and 5 cents were struck in Nickel-brass,", "after": "1909, the Royal Bank of Canada introduced 100 dollars notes, followed in 1913 by 5 and 20 dollars notes. From 1920, the notes also bore the denomination in sterling. 100 dollars were issued until 1920,", "start_char_pos": 4544, "end_char_pos": 4668}, {"type": "D", "before": "other denominations struck in cupro-nickel. In 1996, high inflation caused the introduction of 1,", "after": null, "start_char_pos": 4678, "end_char_pos": 4775}, {"type": "D", "before": "10 dollars coins. The 1 and 5 dollars are struck in copper-plated steel, whilst the 10 dollars is struck in nickel-plated steel and has an equilateral-curved heptagonal shape.", "after": null, "start_char_pos": 4782, "end_char_pos": 4957}, {"type": "R", "before": "In August, 2020, the $100 coin was launched. The coin is the first coloured coin issued by the Bank of Guyana. Banknotes Private banknotes were introduced in the late 19th century by the British Guiana Bank and the Colonial Bank. Both issued 5, 20 and 100 dollars. The British Guiana Bank issued notes until 1907, with the Colonial Bank issuing notes until 1917. The Colonial Bank was taken over by Barclays Bank, which issued notes in denominates of 5, 10, 20 and 100 dollars between 1926 and 1941. In 1909, the Royal Bank of Canada introduced 100 dollars notes, followed in 1913 by 5 and 20 dollars notes. From 1920, the notes also bore the denomination in sterling. 100 dollars were issued until 1920, with the 5 and 20 dollars issued until 1938. Paper money production specifically for British Guiana ceased in 1942 and local notes were replaced by BWI$ notes in 1951.", "after": "20 dollars issued until 1938.", "start_char_pos": 4958, "end_char_pos": 5830}, {"type": "A", "before": null, "after": "Paper money production specifically for British Guiana ceased in 1942 and local notes were replaced by BWI$ notes in 1951. In 1955, the BWI$ was decimalized and coinage was issued in the name of the \"British Caribbean Territories, Eastern Group\".", "start_char_pos": 5831, "end_char_pos": 5831}, {"type": "R", "before": "1955, the BWI$ was decimalized and coinage was issued in the name of the \"British Caribbean Territories, Eastern Group\". In 1965, the East Caribbean dollar (EC$) replaced the BWI", "after": "1965, the East Caribbean dollar (EC$) replaced the BWI$", "start_char_pos": 5835, "end_char_pos": 6013}], "sents_char_pos": [0, 50, 148, 307, 579, 754, 1008, 1156, 1333, 1380, 1627, 1744, 1936, 2063, 2165, 2310, 2526, 2662, 2822, 2975, 3109, 3331, 3364, 3430, 3591, 3700, 3842, 3925, 4116, 4257, 4404, 4540, 4621, 4721, 4799, 4957, 5002, 5068, 5187, 5222, 5320, 5457, 5565, 5626, 5707, 5830, 5955]}
+{"doc_id": "16063653", "revision_depth": "1", "before_revision": "Pattern 1: Collecting food Hunter gatherer diet, high in carbohydrates and fibre, low in fat. Activity patterns are very high with little obesity. Pattern 2: Famine Diet becomes less varied as people settle with periods of acute scarcity. Towards the end of this phase variation increases, but social stratification intensifies, with the most impoverished and women and children suffering the brunt of the burden of food scarcity. Pattern 3: Receding Famine Increase in animal proteins and fruits and vegetables. Activity patterns shift to include more leisure activities. It should be noted that current climate changes are effecting movement out of the famine and receding famine period. Pattern 4: Nutritional-related NCD Diet becomes high in fat, cholesterol, sugar and other refined foods. This is accompanied by a continued shift to a sedentary lifestyle, which increases the prevalence of obesity and degenerative diseases. It should be noted that this matches on with the final phase of the epidemiological transition. Pattern 5: Behaviour change In response to the shifts happening in pattern 4, behaviours pushed by governments, the health system or individuals are expected to prevent or delay the degenerative diseases.", "after_revision": "Pattern 1: Collecting food Hunter gatherer diet, high in carbohydrates and fibre, low in fat. Activity patterns are very high with little obesity. Pattern 2: Famine Diet becomes less varied as people settle with periods of acute scarcity. Towards the end of this phase variation increases, but social stratification intensifies, with the most impoverished and women and children suffering the brunt of the burden of food scarcity. Pattern 3: Receding Famine Increase in animal proteins and fruits and vegetables. Activity patterns shift to include more leisure activities. It should be noted that current climate changes are effecting movement out of the famine and receding famine period. Pattern 4: Nutritional-related NCD Diet becomes high in fat, cholesterol, sugar and other refined foods. This is accompanied by a continued shift to a sedentary lifestyle, which increases the prevalence of obesity and degenerative diseases. It should be noted that this matches on with the final phase of the epidemiological transition. Pattern 5: Behaviour change In response to the shifts happening in pattern 4, behaviours pushed by governments, the health system or individuals are expected to prevent or delay the degenerative diseases.", "edit_actions": [], "sents_char_pos": [0, 93, 146, 238, 430, 512, 572, 689, 794, 930, 1026]}
+{"doc_id": "16607406", "revision_depth": "1", "before_revision": "Contents of inscriptions Following are the transliterated and translated contents for the Inscriptions relevant to this article: Transliterated contents%DIFDELCMD < %DIFDELCMD < %%% Inscription I: nam%DIFDELCMD < ] %DIFDELCMD < %%% Inscriprion II: mahaksatrapa putrasa yagu. ramna kharayopsta 20 4 4 ana 4 ma 2.%DIFDELCMD < ] %DIFDELCMD < %%% Inscriprion III: idravarmasa kumarasa sa 20 4 4 dra 1.%DIFDELCMD < ] %DIFDELCMD < %%% Inscriprion IV: i\u1e43dravarmasa kumararasa sa 20 20 1 1 1.%DIFDELCMD < ] %DIFDELCMD < %%% Inscriprions V VI:%DIFDELCMD < [%%% vispavarmasa stretegasa putre I\u1e43dravarma kumare sabharyae ime \u015barira pratithaveti tanuakami thubanmi vispavarmo stratego \u015bi\u015birena ya. stratega-bharya puya\u00efta . i\u1e43dravasu aparaja vasumitra ya jivaputra puya\u00efta(m)i\u1e43dravarmo stratego puya\u00efta. utara stratega-bharya puya\u00efta viyeemitro avacarayo (a) sabharya puya\u00efta. sarva\u00f1adi-sagho puya\u00efta sarva-satva ya puya\u00efta sarva-satva parinivat\u00efto. . The numerical figures in the last parts of the Inscriptions II and III refer to weights of the cover as got measured by Yaguraja Kharaosta and later by king Indravarmana,respectively. Inscription IV refers to weight of the base part as got measured by king Indravarman.%DIFDELCMD < %DIFDELCMD < %%% Translated contents Inscription I:%DIFDELCMD < [%%% Name (initial or monogram of the artisan who made the artifact). Inscriprion II:%DIFDELCMD < [%%% (Property)of the son of Mahaksatrapa, of Yaguraja Kharayosta. 28 (sateras) , 4 (dh\u0101nes?) , 2 m(\u0101sas?). Inscriprion III :%DIFDELCMD < [%%% (Property) of prince Indravarmana. 28 s(taters) , 1 dra(chma). Inscriprion IV :%DIFDELCMD < [%%% (Property) of prince Indravarmana. 43 s(taters). Inscriprions V%DIFDELCMD < & %%% VI: Prince Indravarman, son of Commander Vi\u015bpavarman together with (his ) wifeestablishes these body-relics in his own st\u00fcpa. Commander Vi\u015bpavarman and the commander's wife \u015ai\u015birena are (hereby) honored. The Apraca raja Indravasuand (his wife) Vasumitra, (mother) of living son, are honored. Commander's wife Uttara is honored.And the Avaca king Viyemitra , together with wife, is honored . The community of his relatives is honored. And all beings are honored . All beings are caused to attain nirvana. .The numerical figures in the last parts of the Inscriptions II and III refer to weights of the cover as got measured by Kharaosta and Indravarmana respectively. Inscription no IV refers to weight of the base part as got measured by Indravarman. Richard Salomon has transformed the original unspecified weight numbers to the known units . Further reading Afghanistan, carrefour en l'Est et l'Ouest\" p. 373. Also Senior 2003 Baums, Stefan. 2012. \u201cCatalog and Revised Texts and Translations of Gandharan Reliquary Inscriptions.\u201d In: David Jongeward, Elizabeth Errington, Richard Salomon and Stefan Baums, Gandharan Buddhist Reliquaries , pp. 233\u2013234, Seattle: Early Buddhist Manuscripts Project (Gandharan Studies, Volume 1). Baums, Stefan, and Andrew Glass. 2002\u2013 . Catalog of G\u0101ndh\u0101r\u012b Texts, no. CKI 241 Senior, R.C. (2006). Indo-Scythian coins and history. Volume IV. (in English). Classical Numismatic Group, Inc.. .", "after_revision": "Contents of inscriptions %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < ] %DIFDELCMD < %%% %DIFDELCMD < ] %DIFDELCMD < %%% %DIFDELCMD < ] %DIFDELCMD < %%% %DIFDELCMD < ] %DIFDELCMD < %%% %DIFDELCMD < [%%% + Inscription of the Silver Reliquary of IndravarmanBaums, Stefan. (2012) . %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < [%%% %DIFDELCMD < [%%% Catalog and Revised Text and Translations of Gandh\u0101ran Reliquary Inscriptions. Gandh\u0101ran Buddhist Reliquaries. D. Jongeward. Seattle, University of Washington PressRichard Salomon, An Inscribed Silver Buddhist Reliquary of the Time of King Kharaosta and Prince Indravarman,Journal of the American Oriental Society, Vol. 116, No. 3 (Jul. - Sep., 1996), pp. 418-452InscriptionOriginal (Kharosthi script)TransliterationEnglish translation Inscription I na\u1e43 Inscription II Of the son of the great satrap, the yagu king, Kharahostes, 28 staters , 4 dh\u0101naka , 2 %DIFDELCMD < [%%% m\u0101\u1e63a Inscription III Of prince Indravarma, 28 staters , 1 %DIFDELCMD < [%%% drachm Inscription IV Of prince Indravarma, 43 %DIFDELCMD < & %%% staters Inscription V The son of the general Vi\u015bpavarma, the prince Indravarma, with his wife, here these relics establishes in his personal stupa. General Vi\u015bpavarma and \u015ai\u015bire\u1e47a, the general'swife, are honoured. Indravasu, king of Apraca, and Vasumitra, who has a living son, are honoured. General Indravarma and Utara, the wife of the general, are honoured.Vijayamitra, the Avaca king , together with his wife, is honoured . The community of all relatives is honoured. All beings are honoured . All beings are brought to nirvana . Inscription VI The son of the general Vispavarma, the prince Indravarma, together with his wive, here these relics establishes in his personal stupa. The general Vispavarma and \u015ai\u015bire\u1e47a,the wife of the general, are honoured. Indravasu the Apaca king, and Vasumitra, who has a living son, are honoured. General Indravarma is honoured. Utara,the wife of the general, is honoured. Vijatamitra, king of Avaca, together with his wife, is honoured. The community of all beings is honoured and all beingsare honoured. All beings are brought to nirvana. Further reading Afghanistan, carrefour en l'Est et l'Ouest\" p. 373. Also Senior 2003 Baums, Stefan. 2012. \u201cCatalog and Revised Texts and Translations of Gandharan Reliquary Inscriptions.\u201d In: David Jongeward, Elizabeth Errington, Richard Salomon and Stefan Baums, Gandharan Buddhist Reliquaries '' , pp. 233\u2013234, Seattle: Early Buddhist Manuscripts Project (Gandharan Studies, Volume 1). Baums, Stefan, and Andrew Glass. 2002\u2013 . Catalog of G\u0101ndh\u0101r\u012b Texts, no. CKI 241 Senior, R.C. (2006). Indo-Scythian coins and history. Volume IV. (in English). Classical Numismatic Group, Inc.. .", "edit_actions": [{"type": "D", "before": "Following are the transliterated and translated contents for the Inscriptions relevant to this article:", "after": null, "start_char_pos": 25, "end_char_pos": 128}, {"type": "D", "before": "Transliterated contents", "after": null, "start_char_pos": 129, "end_char_pos": 152}, {"type": "D", "before": "Inscription I:", "after": null, "start_char_pos": 182, "end_char_pos": 196}, {"type": "D", "before": "nam", "after": null, "start_char_pos": 197, "end_char_pos": 200}, {"type": "D", "before": "Inscriprion II:", "after": null, "start_char_pos": 232, "end_char_pos": 247}, {"type": "D", "before": "mahaksatrapa putrasa yagu. ramna kharayopsta 20 4 4 ana 4 ma 2.", "after": null, "start_char_pos": 248, "end_char_pos": 311}, {"type": "D", "before": "Inscriprion III:", "after": null, "start_char_pos": 343, "end_char_pos": 359}, {"type": "D", "before": "idravarmasa kumarasa sa 20 4 4 dra 1.", "after": null, "start_char_pos": 360, "end_char_pos": 397}, {"type": "D", "before": "Inscriprion IV:", "after": null, "start_char_pos": 429, "end_char_pos": 444}, {"type": "D", "before": "i\u1e43dravarmasa kumararasa sa 20 20 1 1 1.", "after": null, "start_char_pos": 445, "end_char_pos": 484}, {"type": "D", "before": "Inscriprions V", "after": null, "start_char_pos": 516, "end_char_pos": 530}, {"type": "D", "before": "VI:", "after": null, "start_char_pos": 531, "end_char_pos": 534}, {"type": "R", "before": "vispavarmasa stretegasa putre I\u1e43dravarma kumare sabharyae ime \u015barira pratithaveti tanuakami thubanmi vispavarmo stratego \u015bi\u015birena ya. stratega-bharya puya\u00efta", "after": "+ Inscription of the Silver Reliquary of IndravarmanBaums, Stefan. (2012)", "start_char_pos": 552, "end_char_pos": 709}, {"type": "D", "before": "i\u1e43dravasu aparaja vasumitra ya jivaputra puya\u00efta(m)i\u1e43dravarmo stratego puya\u00efta. utara stratega-bharya puya\u00efta viyeemitro avacarayo (a) sabharya puya\u00efta. sarva\u00f1adi-sagho puya\u00efta sarva-satva ya puya\u00efta sarva-satva parinivat\u00efto.", "after": null, "start_char_pos": 712, "end_char_pos": 937}, {"type": "D", "before": ". The numerical figures in the last parts of the Inscriptions II and III refer to weights of the cover as got measured by Yaguraja Kharaosta and later by king Indravarmana,respectively. Inscription IV refers to weight of the base part as got measured by king Indravarman.", "after": null, "start_char_pos": 938, "end_char_pos": 1209}, {"type": "D", "before": "Translated contents", "after": null, "start_char_pos": 1239, "end_char_pos": 1258}, {"type": "D", "before": "Inscription I:", "after": null, "start_char_pos": 1259, "end_char_pos": 1273}, {"type": "D", "before": "Name (initial or monogram of the artisan who made the artifact).", "after": null, "start_char_pos": 1291, "end_char_pos": 1355}, {"type": "D", "before": "Inscriprion II:", "after": null, "start_char_pos": 1356, "end_char_pos": 1371}, {"type": "R", "before": "(Property)of", "after": "Catalog and Revised Text and Translations of Gandh\u0101ran Reliquary Inscriptions. Gandh\u0101ran Buddhist Reliquaries. D. Jongeward. Seattle, University of Washington PressRichard Salomon, An Inscribed Silver Buddhist Reliquary of the Time of King Kharaosta and Prince Indravarman,Journal of the American Oriental Society, Vol. 116, No. 3 (Jul. - Sep., 1996), pp. 418-452InscriptionOriginal (Kharosthi script)TransliterationEnglish translation Inscription I na\u1e43 Inscription II Of", "start_char_pos": 1389, "end_char_pos": 1401}, {"type": "R", "before": "Mahaksatrapa, of Yaguraja Kharayosta.", "after": "the great satrap, the yagu king, Kharahostes,", "start_char_pos": 1413, "end_char_pos": 1450}, {"type": "R", "before": "(sateras)", "after": "staters", "start_char_pos": 1454, "end_char_pos": 1463}, {"type": "R", "before": "(dh\u0101nes?)", "after": "dh\u0101naka", "start_char_pos": 1468, "end_char_pos": 1477}, {"type": "D", "before": "m(\u0101sas?).", "after": null, "start_char_pos": 1482, "end_char_pos": 1491}, {"type": "D", "before": "Inscriprion III :", "after": null, "start_char_pos": 1492, "end_char_pos": 1509}, {"type": "R", "before": "(Property) of prince Indravarmana.", "after": "m\u0101\u1e63a Inscription III Of prince Indravarma,", "start_char_pos": 1527, "end_char_pos": 1561}, {"type": "R", "before": "s(taters)", "after": "staters", "start_char_pos": 1565, "end_char_pos": 1574}, {"type": "D", "before": "dra(chma).", "after": null, "start_char_pos": 1579, "end_char_pos": 1589}, {"type": "D", "before": "Inscriprion IV :", "after": null, "start_char_pos": 1590, "end_char_pos": 1606}, {"type": "R", "before": "(Property) of prince Indravarmana.", "after": "drachm Inscription IV Of prince Indravarma,", "start_char_pos": 1624, "end_char_pos": 1658}, {"type": "D", "before": "s(taters).", "after": null, "start_char_pos": 1662, "end_char_pos": 1672}, {"type": "D", "before": "Inscriprions V", "after": null, "start_char_pos": 1673, "end_char_pos": 1687}, {"type": "D", "before": "VI:", "after": null, "start_char_pos": 1706, "end_char_pos": 1709}, {"type": "R", "before": "Prince Indravarman, son of Commander Vi\u015bpavarman together with (his ) wifeestablishes these body-relics in his own st\u00fcpa. Commander Vi\u015bpavarman and the commander's wife \u015ai\u015birena are (hereby) honored. The Apraca raja Indravasuand (his wife) Vasumitra, (mother) of", "after": "staters Inscription V The son of the general Vi\u015bpavarma, the prince Indravarma, with his wife, here these relics establishes in his personal stupa. General Vi\u015bpavarma and \u015ai\u015bire\u1e47a, the general'swife, are honoured. Indravasu, king of Apraca, and Vasumitra, who has a", "start_char_pos": 1710, "end_char_pos": 1972}, {"type": "R", "before": "honored. Commander's wife Uttara is honored.And", "after": "honoured. General Indravarma and Utara, the wife of the general, are honoured.Vijayamitra,", "start_char_pos": 1989, "end_char_pos": 2036}, {"type": "D", "before": "Viyemitra", "after": null, "start_char_pos": 2052, "end_char_pos": 2061}, {"type": "A", "before": null, "after": "his", "start_char_pos": 2078, "end_char_pos": 2078}, {"type": "R", "before": "honored", "after": "honoured", "start_char_pos": 2088, "end_char_pos": 2095}, {"type": "R", "before": "his relatives is honored. And all beings are honored", "after": "all relatives is honoured. All beings are honoured", "start_char_pos": 2115, "end_char_pos": 2167}, {"type": "D", "before": "caused to attain nirvana.", "after": null, "start_char_pos": 2185, "end_char_pos": 2210}, {"type": "R", "before": ".The numerical figures in the last parts of the Inscriptions II and III refer to weights of the cover as got measured by Kharaosta and Indravarmana respectively. Inscription no IV refers to weight of the base part as got measured by Indravarman. Richard Salomon has transformed the original unspecified weight numbers to the known units", "after": "brought to nirvana", "start_char_pos": 2211, "end_char_pos": 2547}, {"type": "A", "before": null, "after": "Inscription VI The son of the general Vispavarma, the prince Indravarma, together with his wive, here these relics establishes in his personal stupa. The general Vispavarma and \u015ai\u015bire\u1e47a,the wife of the general, are honoured. Indravasu the Apaca king, and Vasumitra, who has a living son, are honoured. General Indravarma is honoured. Utara,the wife of the general, is honoured. Vijatamitra, king of Avaca, together with his wife, is honoured. The community of all beings is honoured and all beingsare honoured. All beings are brought to nirvana.", "start_char_pos": 2550, "end_char_pos": 2550}, {"type": "A", "before": null, "after": "''", "start_char_pos": 2846, "end_char_pos": 2846}], "sents_char_pos": [0, 128, 196, 247, 359, 444, 534, 846, 1123, 1209, 1355, 1450, 1491, 1561, 1589, 1658, 1672, 1831, 1909, 1997, 2033, 2097, 2140, 2169, 2372, 2456, 2549, 2618, 2650, 2738, 2936, 2969, 3037, 3070, 3095]}
+{"doc_id": "169496", "revision_depth": "1", "before_revision": "Mary Temple Grandin (born August 29, 1947) is an American scientist and animal behavourist. She is a prominent proponent for the humane treatment of livestock for slaughter and author of more than 60 scientific papers on animal behavior. Grandin is a consultant to the livestock industry, where she offers advice on animal behavior, and is also an autism spokesperson. Grandin is one of the first individuals on the autism spectrum to document the insights she gained from her personal experience of autism. She is currently a faculty member with Animal Sciences in the College of Agricultural Sciences at Colorado State University. In 2010, Time 100, an annual list of the 100 most influential people in the world, named her in the \" Heroes\" category. She was the subject of the Emmy- and Golden Globe-winning semi-biographical film Temple Grandin. Grandin has been an outspoken proponent of autism rights and neurodiversity movements. Early life Family Mary Temple Grandin was born in Boston, Massachusetts, into a very wealthy family.One of the employees of the family also was named Mary, so Grandin was referred to by her middle name, Temple, to avoid confusion. Her mother is Anna Eustacia Purves (now Cutler), an actress, singer, and granddaughter of John Coleman Purves (co-inventor for the autopilot aviation system). She also has a degree in English from Harvard University. Her father was Richard McCurdy Grandin, a real estate agent and heir to the largest corporate wheat farm business in America at the time, Grandin Farms. Grandin's parents divorced when she was 15, and her mother eventually went on to marry Ben Cutler, a renowned New York saxophonist, in 1965, when Grandin was 18 years old. Her father, Richard Grandin, died in California in 1993. Grandin has three younger siblings: two sisters and a brother. Grandin has described one of her sisters as being dyslexic. Her younger sister is an artist, her other sister is a sculptor, and her brother is a banker. John Livingston Grandin (Temple's paternal great-grandfather) and his brother William James Grandin, were French Huguenots who drilled for oil. He intended to cut a deal with John D. Rockefeller in a meeting, but the latter kept him waiting too long so he walked out before Rockefeller arrived. Then the brothers went into banking and when Jay Cooke's firm collapsed they received thousands of acres of undeveloped land in North Dakota as debt collateral. They set up wheat farming in the Red River Valley and housed the workers in dormitories. The town of Grandin, North Dakota, is named after John Livingston Grandin.%DIFDELCMD < %DIFDELCMD < %%% Although raised in the Episcopal Church, early on Temple Grandin gave up on a belief in a personal deity or intention in favor of what she considers a more scientific perspective. Diagnosis Grandin was not formally diagnosed with autism until her adulthood. As a two-year-old, the only formal diagnosis given to Grandin was \"brain damage\", a finding finally dismissed through cerebral imaging at the University of Utah by the time she turned 63 in 2010. While Grandin was still in her mid-teens, her mother chanced upon a diagnostic checklist for autism . After reviewing the checklist, Grandin's mother hypothesised that Grandin's symptoms were best explained by the disorder and was later determined to be an autistic savant, but a formal diagnosis consistent with being on the autism spectrum was made only when Grandin was in her forties.%DIFDELCMD < %DIFDELCMD < %%% Early childhood Her mother, Eustacia, took Grandin to the world'sleading special needs researchers at the Boston Children's Hospital, with the hope of unearthing an alternative to institutionalization. Grandin's mother eventually located a neurologist who suggested a trial of speech therapy. A speech therapist was hired and Grandin received personalized training from the age of two and a half. A nanny was hired when Grandin was aged three to play educational games for hours with her. Grandin started kindergarten in Dedham Country Day School. Her teachers and class strove to create an environment to accommodate Grandin's needs and sensitivities. Grandin considers herself fortunate to have had supportive mentors from elementary school onward. Even so, Grandin states that junior high and high school were the most unpleasant times of her life.%DIFDELCMD < %DIFDELCMD < %%% The medical advice at the time for a diagnosis of autism was to recommend institutionalization, a measure that caused a bitter rift of opinion between Grandin's parents. Her father was keen to follow this advice while her mother was strongly opposed to the idea as it likely would have caused her to never be able to see her daughter again. Middle school and high school Grandin attended Beaver Country Day School from seventh grade to ninth grade. She was expelled at the age of 14 for throwing a book at a schoolmate who had taunted her. Grandin has described herself as the \"nerdy kid\" whom everyone ridiculed. She has described occasions when she walked down the hallways and her fellow students would taunt her by saying \"tape recorder\" because of her habit of repetitive speech. Grandin states, \"I could laugh about it now, but back then it really hurt.\"%DIFDELCMD < %DIFDELCMD < %%% The year after her expulsion, Grandin's parents divorced. Three years later, Grandin's mother married Ben Cutler, a New York saxophonist. At 15, Grandin spent a summer on the Arizona ranch of Ben Cutler's sister, Ann, and this would become a formative experience toward her subsequent career interest. Following her expulsion from Beaver Country Day School (reports vary on the name of the school Grandin was expelled from, with Grandin noting it to be Cherry Falls Girls' School in her first book, Emergence: Labelled Autistic), Grandin's mother placed her in Mountain Country School (now known as Hampshire Country School), a private boarding school in Rindge, New Hampshire, for children with behavioral problems. It was here that Grandin met William Carlock, a science teacher who had worked for NASA. He became her mentor and helped significantly toward building up her self-confidence.%DIFDELCMD < %DIFDELCMD < %%% It was Carlock who encouraged Grandin to develop her idea to build her hug box (referred to as a \" squeeze machine\" by Grandin) when she returned from her aunt's farm in Arizona in her senior year of high school. At the age of 18 when she was still attending Mountain Country School, with Carlock's assistance Grandin built the hug box. Carlock's supportive role in Grandin's life continued even after she left Mountain Country School.For example, when Grandin was facing criticism for her hug box at Franklin Pierce College, it was Carlock who suggested that Grandin undertake scientific experiments to evaluate the efficacy of the device. It was his constant guidance to Grandin to refocus the rigid obsessions she experienced with the hug box into a productive assignment, that subsequently, allowed this study undertaken by Grandin to be widely cited as evidence of Grandin's resourcefulness. Higher education After she graduated from Mountain Country School in 1966, Grandin went on to earn her bachelor's degree in human psychology from Franklin Pierce College in 1970, a master's degree in animal science from Arizona State University in 1975, and a doctoral degree in animal science from the University of Illinois at Urbana\u2013Champaign in 1989. Career Grandin is a prominent and widely cited proponent for the humane treatment of livestock for slaughter. She is internationally famous as a spokesperson on autism as well.%DIFDELCMD < %DIFDELCMD < %%% Autism spectrum Steve Silberman, in his book NeuroTribes, wrote that Temple Grandin helped break down years of shame and stigma because she was one of the first adults to publicly disclose that she was autistic. Bernard Rimland, a father of a son with autism and author of the book Infantile Autism, wrote the foreword to Grandin's first book Emergence: Labeled Autistic. Her book was published in 1986. Rimland wrote \"Temple's ability to convey to the reader her innermost feelings and fears, coupled with her capacity for explaining mental processes will give the reader an insight into autism that very few have been able to achieve.\"%DIFDELCMD < %DIFDELCMD < %%% In her later book, Thinking in Pictures, published in 1995, the neurologist Oliver Sacks wrote at the end of the foreword that the book provided \"a bridge between our world and hers, and allows us to glimpse into a quite other sort of mind. \" In her early writings, Grandin characterized herself as a recovered autistic and , in his foreword, Bernard Rimland used the term recovered autistic individual. In her later writings she has abandoned this characterization. Steve Silberman wrote, \"It became obvious to her, however, that she was not recovered but had learned with great effort to adapt to the social norms of the people around her.\"%DIFDELCMD < %DIFDELCMD < %%% When her book Thinking in Pictures was written in 1995, Grandin thought that all individuals with autism thought in photographic-specific images the way she did. By the time the expanded edition was published in 2006, she had realized that it had been wrong to presume that every person with autism processed information in the same way she did. In the 2006 edition, she wrote that there were three types of specialized thinking. They were: 1. Visual Thinkers like she is, who think in photographically-specific images. 2. Music and Math Thinkers \u2013 who think in patterns and may be good at mathematics, chess, and programming computers. 3. Verbal Logic Thinkers \u2013 who think in word details, and she noted that their favorite subject may be history. In one of her later books, The Autistic Brain: Thinking Across the Spectrum, the concept of three different types of thinking by autistic individuals is expanded. This book was published in 2013. An influential book that helped her to develop her concept of pattern thinking was Clara Claiborne Park's book entitled Exiting Nirvana: A Daughter's Life with Autism. It was published in 2001. The Autistic Brain also contains an extensive review of scientific studies that provide evidence that object-visual thinking is different from spatial-visualization abilities.%DIFDELCMD < %DIFDELCMD < %%% Grandin became well-known beyond the American autistic community, after being described by Oliver Sacks in the title narrative of his book An Anthropologist on Mars (1995), for which he won a Polk Award. The title is derived from Grandin's characterization of how she feels around neurotypical people . In the mid-1980s Grandin first spoke in public about autism at the request of Ruth C. Sullivan, one of the founders of the Autism Society of America (ASA). Sullivan writes: Based on personal experience, Grandin advocates early intervention to address autism and supportive teachers, who can direct fixations of the child with autism in fruitful directions. She has described her hypersensitivity to noise and other sensory stimuli. She says words are her second language and that she thinks \"totally in pictures\", using her vast visual memory to translate information into a mental slideshow of images that may be manipulated or correlated. Grandin attributes her success as a humane livestock facility designer to her ability to recall detail, which is a characteristic of her visual memory. Grandin compares her memory to full-length movies in her head, that may be replayed at will, allowing her to notice small details. She also is able to view her memories using slightly different contexts by changing the positions of the lighting and shadows. As a proponent of neurodiversity, Grandin does not support eliminating autism genes or treating mildly-autistic individuals. However, she believes that autistic children who are severely handicapped need therapy with applied behavioral analysis. Additionally, she has claimed that she only will attend talks given by autistics who can hold down a career.%DIFDELCMD < %DIFDELCMD < %%% Handling livestock In 1980 Grandin published her first two scientific articles on beef cattle behavior during handling: \" Livestock Behavior as Related to Handling Facilities Design \" in the International Journal for the Study of Animal Problems, Vol. 1, pp. 33\u201352 and \"Observations of Cattle Behavior Applied to the Design of Cattle Handling Facilities\", Applied Animal Ethology, Vol. 6, pp. 19\u201331. She was one of the first scientists to report that animals are sensitive to visual distractions in handling facilities such as shadows, dangling chains, and other environmental details that most people do not notice. When she was awarded her Ph.D. at the University of Illinois, she studied the effects of environmental enrichment on pigs. The title of her dissertation was \"Effect of Rearing Environment and Environmental Enrichment on the Behavior and Neural Development in Young Pigs\". Grandin expanded her theories in her book, Animals Make Us Human. In 1993, she edited the first edition of Livestock Handling and Transport. Grandinwrote three chapters and included chapters from contributors from around the world . Subsequent editions of the book were published in 2000 , 2007, and 2014. In her academic work as a professor at Colorado State University, her graduate student, Bridgett Voisinet, conducted one of the early studies that demonstrated that cattle who remained calm during handling, had higher weight gains. In 1997, when the paper was published, this was a new concept. The paper is entitled, \" Feedlot Cattle with Calm Temperaments Have Higher Average Daily Gains Than Cattle with Excitable Temperaments\", published in The Journal of Animal Science, Vol. 75, pp. 892\u2013896. Another important paper published by Grandin was, \" Assessment of Stress During Handling and Transport\", Journal of Animal Science, 1997, Vol. 75, pp. 249-257. This paper presented the concept that an animal's previous experiences with handling could have an effect on how it will react to being handled in the future, as a new concept in the animal-handling industry. A major piece of equipment that Grandin developed was a center track (double rail) conveyor restrainer systemfor holding cattle during stunning at large beef slaughtering plants. The first system was installed in the mid-1980s for calves and a system for large beef cattle was developed in 1990. This equipment is now being used by many large meat companies. It is described in \"Double Rail Restrainer Conveyor for Livestock Handling\", first published in the Journal of Agricultural Engineering Research, Vol. 4, pp. 327\u2013338 in 1988, and \"Transferring results of behavioral research to industry to improve animal welfare on the farm, ranch, and slaughter plant\", Applied Animal Behavior Science, Vol. 8, pp. 215\u2013228, published in 2003.%DIFDELCMD < %DIFDELCMD < %%% Grandin also developed an objective, numerical scoring system for assessing animal welfare at slaughtering plants. The use of this scoring system resulted in significant improvements in animal stunning and handling during slaughter. This work is described in \"Objective scoring of animal handling and stunning practices in slaughter plants\", Journal of the American Veterinary Medical Association, Vol. 212, pp. 3\u201339, \"The feasibility of using vocalization scoring as an indicator of poor welfare during slaughter\", Applied Animal Behavior Science, Vol. 56, pp. 121\u2013128, and \"Effect of animal welfare audits of slaughter plants by a major fast food company on cattle handling and stunning practices\", Journal of the American Veterinary Medical Association, Vol. 216, pp. 848\u2013851. In 2008, Grandin published Humane Livestock Handling with contributions by Mark Deesing, a long time collaborator with her. The book contains a review of the main aspects of cattle behavior and provides a visual guide in the form of construction plans and diagrams for the implementation of Grandin's ideas relating to humane livestock handling.%DIFDELCMD < %DIFDELCMD < %%% Other scientific contributions Grandin is the author or co-author of more than 60 peer-reviewed scientific papers on a variety of other animal behavior subjects. Some of the other subjects are: the effect of hair whorl position on cattle behavior, the influence of stress prior to slaughter upon meat quality, religious slaughter, mothering behavior of beef cows, cattle temperament, and causes of bruising. Animal welfare Grandin has lectured widely about her first-hand experiences of the anxiety of feeling threatened by everything in her surroundings, and of being dismissed and feared,which motivates her work in humane livestock handling processes. She studied the behavior of cattle, how they react to ranchers, movements, objects, and light. Grandin then designed curved corrals she adapted with the intention of reducing stress , panic, and injury in animals being led to slaughter. This has proved to be a further point of criticism and controversy among animal activists who have questioned the congruence of a career built on animal slaughter alongside Grandin's claims of compassion and respect for animals . While her designs are widely used throughout the slaughterhouse industry, her claim of compassion for the animals is that because of her autism she can see the animals' reality from their viewpoint, that when she holds an animal's head in her hands as it is being slaughtered, she feels a deep connection to them. Her business website promotes improvement of standards for slaughterhouses and livestock farms. The \"squeeze machine\" is sold at US$4,525 by Therafin Corporation.In 2004, Grandin won a \"Proggy\" award in the \"Visionary\" category, from People for the Ethical Treatment of Animals.%DIFDELCMD < %DIFDELCMD < %%% One of her notable essays about animal welfare is, \"Animals Are Not Things\", in which she posits that technically, animals are property in society, but the law ultimately gives them ethical protections or rights. She compares the properties and rights of owning cattle, versus owning screwdrivers, enumerating how both may be used to serve human purposes in many ways, but when it comes to inflicting pain, there is a vital distinction between such \"properties\", because legally, a person can smash or grind up a screwdriver, but cannot torture an animal . Her insight into the minds of cattle has taught her to value the changes in details to which animals are particularly sensitive and to use her visualization skills to design thoughtful and humane animal-handling equipment. She was named a fellow of the American Society of Agricultural and Biological Engineers in 2009. In 2012, when the American beef industrywas struggling with public perception of its use and sale of pink slime, Grandin spoke out in support of the food product. She said, \"It should be on the market. It should be labeled. We should not be throwing away that much beef.\"%DIFDELCMD < %DIFDELCMD < %%% Grandin's work has attracted the attention of philosophers interested in the moral status of animals. One view found in the academic literature is that Grandin's method of slaughter is a significant positive development for animals, but her attempts to formulate a moral defense of meat-eating have been less successful.Andy Lamey, \"The Animal Ethics of Temple Grandin: A Protectionist Analysis,\" The Journal Of Agricultural and Environmental Ethics, Vol. 32 Issue 1, 2019. Open access version at URL%DIFDELCMD < %DIFDELCMD < %%% Personal life Temple Grandin at TED in February 2010%DIFDELCMD < %DIFDELCMD < %%% Grandin says that \"the part of other people that has emotional relationships is not part of me\", and she has neither married nor had children. She later stated, for example, that she preferred the science fiction, documentary, and thriller genre of films and television shows to more dramatic or romantic ones. Beyond her work in animal science and welfare and autism rights, her interests include horseback riding, science fiction, movies, and biochemistry.%DIFDELCMD < %DIFDELCMD < %%% She has noted in her autobiographical works that autism affects every aspect of her life. Grandin has to wear comfortable clothes to counteract her sensory processing disorder and has structured her lifestyle to avoid sensory overload. She regularly takes antidepressants, but no longer uses a squeeze-box (hug machine), the device she invented at the age of 18 as a form of stress relief therapy, stating in February 2010 that: \"It broke two years ago, and I never got around to fixing it . I'm into hugging people now.\"%DIFDELCMD < %DIFDELCMD < %%% Honors In 2010, Grandin was named in the Time 100 list of the one hundred most influential people in the world, in the \"Heroes\" category. In 2011, she received a Double Helix Medal. She has received honorary degrees from many universities including McGill University in Canada (1999), and the Swedish University of Agricultural Sciences (2009), Carnegie Mellon University in the United States (2012), and Emory University (2016). In 2015, she was named an honorary fellow of the Society for Technical Communication.%DIFDELCMD < %DIFDELCMD < %%% In 2011, Grandin was awarded the Ashoka Fellowship.%DIFDELCMD < %DIFDELCMD < %%% In 2012, Grandin was inducted into the Colorado Women's Hall of Fame.%DIFDELCMD < %DIFDELCMD < %%% In 2012, Grandin was inducted into the Texas Trail of Fame.%DIFDELCMD < %DIFDELCMD < %%% In 2012, she was inducted into the Hall of Great Westerners of the National Cowboy%DIFDELCMD < & %%% Western Heritage Museum.%DIFDELCMD < %DIFDELCMD < %%% Grandin received a Meritorious Achievement Award from the World Organisation for Animal Health (OIE) in 2015.%DIFDELCMD < %DIFDELCMD < %%% In 2016, Grandin was inducted into the American Academy of Arts and Sciences.%DIFDELCMD < %DIFDELCMD < %%% In 2017, Grandinwas inducted into the National Women's Hall of Fame.%DIFDELCMD < %DIFDELCMD < %%% In popular culture Grandin has been featured on major media programs, such as Lisa Davis' It's Your Health, ABC's Primetime Live, the Today Show, Larry King Live, and Fresh Air with Terry Gross. She has been written up in Time magazine, People magazine, Discover magazine, Forbes, and The New York Times. In 2012, Grandin was interviewed on Thriving Canine Radio to discuss \"A Different Perspective on Animal Behavior\" . She was the subject of the Horizon documentary \"The Woman Who Thinks Like a Cow\", first broadcast by the BBC on June 8, 2006, and Nick News with Linda Ellerbee in the spring of 2006. She also was the subject of the first episode in the series First Person by Errol Morris.%DIFDELCMD < %DIFDELCMD < %%% Grandin is the focus of a semi-biographical HBO film entitled Temple Grandin, starring Claire Danes as Grandin. The film was broadcast on February 6, 2010. The movie was nominated for 15 Primetime Emmy Awards and won seven awards, including Outstanding Television Movie and Outstanding Lead Actress in a Miniseries or Movie for Claire Danes.Grandin was on stage as the award was accepted and she spoke briefly to the audience. Coincidentally, the 62nd Primetime Emmy Awards happened on Grandin's birthday \u2013 August 29. On January 16, 2011, at the 68th Golden Globe Awards, Claire Danes won the Golden Globe Award for Best Actress \u2013 Miniseries or Television Film.%DIFDELCMD < %DIFDELCMD < %%% Grandin was featured in Beautiful Minds: A Voyage Into the Brain, a documentary produced in 2006 by colourfield tell-a-vision, a German company. She was named one of 2010's one hundred most influential people in the world by Time magazine. In 2011, she was featured in an episode of the Science documentary series Ingenious Minds. In 2018, Grandin was featured in the documentary This Business of Autism, which explored autism employment and the success story of autism employers such as Spectrum Designs Foundation and was produced by Mesh Omnimedia.%DIFDELCMD < %DIFDELCMD < %%% She also was interviewed by Michael Pollan in his best-selling book, The Omnivore's Dilemma, in which she discussed the livestock industry.%DIFDELCMD < %DIFDELCMD < %%% Folk-punk band AJJ, formerly known as Andrew Jackson Jihad, included two songs called \" Temple Grandin \" and \"Temple Grandin Too\" on their LP Christmas Island. In 2018, Grandin was profiled in the book Rescuing Ladybugs by author and animal advocate Jennifer Skiff as a \"global hero\" for \"standing her ground and fighting for change after witnessing the extreme mistreatment of animals\" used in farming.%DIFDELCMD < %DIFDELCMD < %%% Publications Emergence: Labeled Autistic (with Margaret Scariano, 1986, updated 1991), The Learning Style of People with Autism: An Autobiography (1995). In Teaching Children with Autism : Strategies to Enhance Communication and Socialization, Kathleen Ann Quill, Thinking in Pictures: Other Reports from My Life with Autism (1996) Developing Talents: Careers for Individuals with Asperger Syndrome and High-Functioning Autism (2004). Animals in Translation: Using the Mysteries of Autism to Decode Animal Behavior (with Catherine Johnson, 2005), The Unwritten Rules of Social Relationships: Decoding Social Mysteries Through the Unique Perspectives of Autism (with Sean Barron, 2005), The Way I See It: A Personal Look At Autism And Asperger's (2008), Animals Make Us Human: Creating the Best life for Animals (with Catherine Johnson, 2009), The Autistic Brain: Thinking Across the Spectrum (with Richard Panek, 2013), The Loving Push: How Parents and Professionals Can Help Spectrum Kids Become Successful Adults (with Debra Moore Ph. D., 2016), Genetics and the Behavior of Domestic Animals, Second Edition (with Mark Deesing, 2013), Improving animal welfare: a practical approach (2010). , CABI, UK Livestock handling and transport (2007). . CABI, UK. Grandin, T. 2013. Making slaughterhouses more humane for cattle, pigs, and sheep. Annual Review of Animal Biosciences. 1:491-512. Grandin, T. 2001. Cattle vocalizations are associated with handling and equipment problems at beef slaughter plants. Applied Animal Behaviour Science. Volume 71, 2001, Pg. 191\u2013201. Grandin, T. 1996. Factors That Impede Animal Movement at Slaughter Plants. Journal of the American Veterinary Medical Association. 209 No.4:757-759. Grandin, T. 1995. Restraint of Livestock. Proceedings: Animal Behaviour Design of Livestock and Poultry Systems International Conference (pages 208\u2013223).Published by: Northeast Regional Agriculture Engineering Service.Cooperative Extension. 152 Riley \u2013 Robb Hall, Ithaca, New York, 14853 USA. Grandin, T. 1994. Euthanasia and Slaughter of Livestock. Journal of American Veterinary Medical Association. Volume 204:1354-1360. Grandin, T. 1989 (Updated 1999). Behavioral Principles of Livestock Handling. Professional Scientist. December 1989 (pages 1\u201311). Calling All Minds: How to Think and Create Like an Inventor (2018 & ) See also Animal welfare Animal welfare science Autism rights movement Wendy Jacob Societal and cultural aspects of autism Temple Grandin (TV film)%DIFDELCMD < %DIFDELCMD < %%% References%DIFDELCMD < %DIFDELCMD < %%% Further reading Oliver Sacks, An anthropologist on Mars, The New Yorker, 1993, and later in An anthropologist on Mars: Seven paradoxical tales, Vintage Books, Penguin Random House, LLC, New York, 1996, . Andy Lamey, \"The Animal Ethics of Temple Grandin: A Protectionist Analysis\", The Journal Of Agricultural and Environmental Ethics, Vol. 32 Issue 1, 2019. Temple Did It, and I Can Too!: Seven Simple Life Rules by Jennifer Gilpin Yacio The Girl Who Thought in Pictures: The Story of Dr. Temple Grandin by Julia Finley Mosca How to Build a Hug: Temple Grandin and her Amazing Squeeze Machine by Amy Guglielmo Temple Grandin: How the Girl Who Loved Cows Embraced Autism and Changed the World by Sy Montgomery%DIFDELCMD < %DIFDELCMD < %%% External links Temple Grandin's Official Autism Website%DIFDELCMD < %DIFDELCMD < %%% An Interview With Dr. Temple Grandin, from September 2013", "after_revision": "Mary Temple Grandin (born August 29, 1947) is an American scientist and animal behaviorist. Temple Grandin \"designed livestock handling facilities and is a Professor of Animal Science at Colorado State University. \" %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% Her life Dr.Grandin empathized and utilized her own experiences with autism to improve and raise awareness on hypersensitivity of touch and sound in both humans and animals. As a child, she had early signs of autism and behavioral problems - and was later officially diagnosed. During the mid-to-late 1900's, it was common to send people to institutions, and doctors even recommended Grandin. However, her parents refused and placed her into private schools. Through this enrichment, it helped her to pursue higher education, as she even had a high IQ, until she got her Ph.D for animal science at ASU. \" Her parents opposed the doctor's recommendation to send her to an institution, and placed her into private schools.1From there, she pursued higher education until she got her Ph.D for animal science at ASU. %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% Main problem Designing livestock handling facilities She wanted animals to not see or fear the handling and moving process that going on in these meat plants, and decided to design a better way to help see this through. Grandin was inspired and related to the concepts behind what livestock go through in the early stages of handling. These traditional facilities would create loud noises as well as make these animals frightened and stressed in their last moments. Many people with autism are hypersensitive to touch and sound, and fixate on one thing or small details. %DIFDELCMD < %DIFDELCMD < %%% Her new design changes the shape where livestock are held in place, so these animals do not see what's in front of them. This helps eliminate the fear and \" threat \" animals see while being stuck in these chutes. Grandin's facilities are placed all around the world with techniques and systems, such as \"center track restrainer system , curved chutes, and race systems \" .3 Impact on today's society With the help of her new innovations, people have learned better ways,\"to reduce stress on their animals while handing. \" %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% 2Dr.Grandin created a scoring system for handling livestock from her intensive research. Through its results and success, many corporations utilize this system to accomplish the same goals as her . %DIFDELCMD < %DIFDELCMD < %%% Continuance Her innovation of new handling facilities for livestock has revolutionized the meat industry . This innovation as well as her other systems, previously stated, are in still in use till today. Until somebody else improves her work and designs, it won't be transformed into something else.4 References: %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < & %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% Contributor, C. ( 2016, %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% March 10) . Cargill BrandVoice: How Temple Grandin Changed The Food Industry Forever. Forbes. URL %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% Matchar, E. (2019, April 5). Temple Grandin 's Pig-Stunning System Came to Her in a Vision. Smithsonian.com. URL %DIFDELCMD < %DIFDELCMD < %%% Scruggs, S. D., & Zurlo, J. L. (n.d. ) . The Evolution Of The Female Inventor. Bradley. URL %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% Temple Grandin's %DIFDELCMD < %DIFDELCMD < %%% Website. (n.d.). URL", "edit_actions": [{"type": "D", "before": "behavourist. She is a prominent proponent for the humane treatment of livestock for slaughter and author of more than 60 scientific papers on animal behavior. Grandin is a consultant to the livestock industry, where she offers advice on animal behavior, and is also an autism spokesperson.", "after": null, "start_char_pos": 79, "end_char_pos": 368}, {"type": "R", "before": "Grandin is one of the first individuals on the autism spectrum to document the insights she gained from her personal experience of autism. She is currently a faculty member with Animal Sciences in the College of Agricultural Sciences", "after": "behaviorist. Temple Grandin \"designed livestock handling facilities and is a Professor of Animal Science", "start_char_pos": 369, "end_char_pos": 602}, {"type": "D", "before": "In 2010, Time 100, an annual list of the 100 most influential people in the world, named her in the", "after": null, "start_char_pos": 633, "end_char_pos": 732}, {"type": "D", "before": "Heroes\" category. She was the subject of the Emmy- and Golden Globe-winning semi-biographical film Temple Grandin. Grandin has been an outspoken proponent of autism rights and neurodiversity movements.", "after": null, "start_char_pos": 735, "end_char_pos": 936}, {"type": "D", "before": "Early life Family Mary Temple Grandin was born in Boston, Massachusetts, into a very wealthy family.One of the employees of the family also was named Mary, so Grandin was referred to by her middle name, Temple, to avoid confusion. Her mother is Anna Eustacia Purves (now Cutler), an actress, singer, and granddaughter of John Coleman Purves (co-inventor for the autopilot aviation system). She also has a degree in English from Harvard University. Her father was Richard McCurdy Grandin, a real estate agent and heir to the largest corporate wheat farm business in America at the time, Grandin Farms. Grandin's parents divorced when she was 15, and her mother eventually went on to marry Ben Cutler, a renowned New York saxophonist, in 1965, when Grandin was 18 years old. Her father, Richard Grandin, died in California in 1993.", "after": null, "start_char_pos": 937, "end_char_pos": 1766}, {"type": "D", "before": "Grandin has three younger siblings: two sisters and a brother. Grandin has described one of her sisters as being dyslexic. Her younger sister is an artist, her other sister is a sculptor, and her brother is a banker. John Livingston Grandin (Temple's paternal great-grandfather) and his brother William James Grandin, were French Huguenots who drilled for oil. He intended to cut a deal with John D. Rockefeller in a meeting, but the latter kept him waiting too long so he walked out before Rockefeller arrived. Then the brothers went into banking and when Jay Cooke's firm collapsed they received thousands of acres of undeveloped land in North Dakota as debt collateral. They set up wheat farming in the Red River Valley and housed the workers in dormitories. The town of Grandin, North Dakota, is named after John Livingston Grandin.", "after": null, "start_char_pos": 1767, "end_char_pos": 2603}, {"type": "D", "before": "Although raised in the Episcopal Church, early on Temple Grandin gave up on a belief in a personal deity or intention in favor of what she considers a more scientific perspective.", "after": null, "start_char_pos": 2633, "end_char_pos": 2812}, {"type": "D", "before": "Diagnosis Grandin was not formally diagnosed with autism until her adulthood. As a two-year-old, the only formal diagnosis given to Grandin was \"brain damage\", a finding finally dismissed through cerebral imaging at the University of Utah by the time she turned 63 in 2010. While Grandin was still in her mid-teens, her mother chanced upon a diagnostic checklist for autism . After reviewing the checklist, Grandin's mother hypothesised that Grandin's symptoms were best explained by the disorder and was later determined to be an autistic savant, but a formal diagnosis consistent with being on the autism spectrum was made only when Grandin was in her forties.", "after": null, "start_char_pos": 2813, "end_char_pos": 3475}, {"type": "D", "before": "Early childhood Her mother, Eustacia, took Grandin to the world'sleading special needs researchers at the Boston Children's Hospital, with the hope of unearthing an alternative to institutionalization. Grandin's mother eventually located a neurologist who suggested a trial of speech therapy. A speech therapist was hired and Grandin received personalized training from the age of two and a half. A nanny was hired when Grandin was aged three to play educational games for hours with her. Grandin started kindergarten in Dedham Country Day School. Her teachers and class strove to create an environment to accommodate Grandin's needs and sensitivities.", "after": null, "start_char_pos": 3505, "end_char_pos": 4157}, {"type": "D", "before": "Grandin considers herself fortunate to have had supportive mentors from elementary school onward. Even so, Grandin states that junior high and high school were the most unpleasant times of her life.", "after": null, "start_char_pos": 4158, "end_char_pos": 4356}, {"type": "D", "before": "The medical advice at the time for a diagnosis of autism was to recommend institutionalization, a measure that caused a bitter rift of opinion between Grandin's parents. Her father was keen to follow this advice while her mother was strongly opposed to the idea as it likely would have caused her to never be able to see her daughter again.", "after": null, "start_char_pos": 4386, "end_char_pos": 4726}, {"type": "D", "before": "Middle school and high school Grandin attended Beaver Country Day School from seventh grade to ninth grade. She was expelled at the age of 14 for throwing a book at a schoolmate who had taunted her. Grandin has described herself as the \"nerdy kid\" whom everyone ridiculed. She has described occasions when she walked down the hallways and her fellow students would taunt her by saying \"tape recorder\" because of her habit of repetitive speech. Grandin states, \"I could laugh about it now, but back then it really hurt.\"", "after": null, "start_char_pos": 4727, "end_char_pos": 5246}, {"type": "D", "before": "The year after her expulsion, Grandin's parents divorced. Three years later, Grandin's mother married Ben Cutler, a New York saxophonist. At 15, Grandin spent a summer on the Arizona ranch of Ben Cutler's sister, Ann, and this would become a formative experience toward her subsequent career interest.", "after": null, "start_char_pos": 5276, "end_char_pos": 5577}, {"type": "D", "before": "Following her expulsion from Beaver Country Day School (reports vary on the name of the school Grandin was expelled from, with Grandin noting it to be Cherry Falls Girls' School in her first book, Emergence: Labelled Autistic), Grandin's mother placed her in Mountain Country School (now known as Hampshire Country School), a private boarding school in Rindge, New Hampshire, for children with behavioral problems. It was here that Grandin met William Carlock, a science teacher who had worked for NASA. He became her mentor and helped significantly toward building up her self-confidence.", "after": null, "start_char_pos": 5578, "end_char_pos": 6167}, {"type": "R", "before": "It was Carlock who encouraged Grandin to develop her idea to build her hug box (referred to as", "after": "Her life Dr.Grandin empathized and utilized her own experiences with autism to improve and raise awareness on hypersensitivity of touch and sound in both humans and animals. As", "start_char_pos": 6197, "end_char_pos": 6291}, {"type": "A", "before": null, "after": "child, she had early signs of autism and behavioral problems - and was later officially diagnosed. During the mid-to-late 1900's, it was common to send people to institutions, and doctors even recommended Grandin. However, her parents refused and placed her into private schools. Through this enrichment, it helped her to pursue higher education, as she even had a high IQ, until she got her Ph.D for animal science at ASU.", "start_char_pos": 6294, "end_char_pos": 6294}, {"type": "R", "before": "squeeze machine\" by Grandin) when she returned from her aunt's farm in Arizona in her senior year of high school. At the age of 18 when she was still attending Mountain Country School, with Carlock's assistance Grandin built the hug box. Carlock's supportive role in Grandin's life continued even after she left Mountain Country School.For example, when Grandin was facing criticism for her hug box at Franklin Pierce College, it was Carlock who suggested that Grandin undertake scientific experiments to evaluate the efficacy of the device. It was his constant guidance to Grandin to refocus the rigid obsessions she experienced with the hug box into a productive assignment, that subsequently, allowed this study undertaken by Grandin to be widely cited as evidence of Grandin's resourcefulness.", "after": "Her parents opposed the doctor's recommendation to send her to an institution, and placed her into private schools.1From there, she pursued higher education until she got her Ph.D for animal science at ASU.", "start_char_pos": 6297, "end_char_pos": 7094}, {"type": "D", "before": "Higher education After she graduated from Mountain Country School in 1966, Grandin went on to earn her bachelor's degree in human psychology from Franklin Pierce College in 1970, a master's degree in animal science from Arizona State University in 1975, and a doctoral degree in animal science from the University of Illinois at Urbana\u2013Champaign in 1989.", "after": null, "start_char_pos": 7095, "end_char_pos": 7449}, {"type": "D", "before": "Career Grandin is a prominent and widely cited proponent for the humane treatment of livestock for slaughter. She is internationally famous as a spokesperson on autism as well.", "after": null, "start_char_pos": 7450, "end_char_pos": 7626}, {"type": "D", "before": "Autism spectrum", "after": null, "start_char_pos": 7656, "end_char_pos": 7671}, {"type": "D", "before": "Steve Silberman, in his book NeuroTribes, wrote that Temple Grandin helped break down years of shame and stigma because she was one of the first adults to publicly disclose that she was autistic. Bernard Rimland, a father of a son with autism and author of the book Infantile Autism, wrote the foreword to Grandin's first book Emergence: Labeled Autistic. Her book was published in 1986. Rimland wrote \"Temple's ability to convey to the reader her innermost feelings and fears, coupled with her capacity for explaining mental processes will give the reader an insight into autism that very few have been able to achieve.\"", "after": null, "start_char_pos": 7672, "end_char_pos": 8293}, {"type": "D", "before": "In her later book, Thinking in Pictures, published in 1995, the neurologist Oliver Sacks wrote at the end of the foreword that the book provided \"a bridge between our world and hers, and allows us to glimpse into a quite other sort of mind. \"", "after": null, "start_char_pos": 8323, "end_char_pos": 8565}, {"type": "D", "before": "In her early writings, Grandin characterized herself as a recovered autistic and , in his foreword, Bernard Rimland used the term recovered autistic individual. In her later writings she has abandoned this characterization. Steve Silberman wrote, \"It became obvious to her, however, that she was not recovered but had learned with great effort to adapt to the social norms of the people around her.\"", "after": null, "start_char_pos": 8566, "end_char_pos": 8965}, {"type": "D", "before": "When her book Thinking in Pictures was written in 1995, Grandin thought that all individuals with autism thought in photographic-specific images the way she did. By the time the expanded edition was published in 2006, she had realized that it had been wrong to presume that every person with autism processed information in the same way she did. In the 2006 edition, she wrote that there were three types of specialized thinking. They were: 1. Visual Thinkers like she is, who think in photographically-specific images. 2. Music and Math Thinkers \u2013 who think in patterns and may be good at mathematics, chess, and programming computers. 3. Verbal Logic Thinkers \u2013 who think in word details, and she noted that their favorite subject may be history.", "after": null, "start_char_pos": 8995, "end_char_pos": 9743}, {"type": "D", "before": "In one of her later books, The Autistic Brain: Thinking Across the Spectrum, the concept of three different types of thinking by autistic individuals is expanded. This book was published in 2013. An influential book that helped her to develop her concept of pattern thinking was Clara Claiborne Park's book entitled Exiting Nirvana: A Daughter's Life with Autism. It was published in 2001. The Autistic Brain also contains an extensive review of scientific studies that provide evidence that object-visual thinking is different from spatial-visualization abilities.", "after": null, "start_char_pos": 9744, "end_char_pos": 10309}, {"type": "D", "before": "Grandin became well-known beyond the American autistic community, after being described by Oliver Sacks in the title narrative of his book An Anthropologist on Mars (1995), for which he won a Polk Award. The title is derived from Grandin's characterization of how she feels around neurotypical people . In the mid-1980s Grandin first spoke in public about autism at the request of Ruth C. Sullivan, one of the founders of the Autism Society of America (ASA). Sullivan writes:", "after": null, "start_char_pos": 10339, "end_char_pos": 10814}, {"type": "R", "before": "Based on personal experience, Grandin advocates early intervention to address autism and supportive teachers, who can direct fixations of the child with autism in fruitful directions. She has described her hypersensitivity to noise and other sensory stimuli. She says words are her second language and that she thinks \"totally in pictures\", using her vast visual memory to translate information into a mental slideshow of images that may be manipulated or correlated. Grandin attributes her success as a humane livestock facility designer to her ability to recall detail, which is a characteristic of her visual memory. Grandin compares her memory to full-length movies in her head, that may be replayed at will, allowing her to notice", "after": "Main problem", "start_char_pos": 10815, "end_char_pos": 11550}, {"type": "A", "before": null, "after": "Designing livestock handling facilities She wanted animals to not see or fear the handling and moving process that going on in these meat plants, and decided to design a better way to help see this through. Grandin was inspired and related to the concepts behind what livestock go through in the early stages of handling. These traditional facilities would create loud noises as well as make these animals frightened and stressed in their last moments. Many people with autism are hypersensitive to touch and sound, and fixate on one thing or", "start_char_pos": 11551, "end_char_pos": 11551}, {"type": "D", "before": "She also is able to view her memories using slightly different contexts by changing the positions of the lighting and shadows.", "after": null, "start_char_pos": 11567, "end_char_pos": 11693}, {"type": "D", "before": "As a proponent of neurodiversity, Grandin does not support eliminating autism genes or treating mildly-autistic individuals. However, she believes that autistic children who are severely handicapped need therapy with applied behavioral analysis. Additionally, she has claimed that she only will attend talks given by autistics who can hold down a career.", "after": null, "start_char_pos": 11694, "end_char_pos": 12048}, {"type": "R", "before": "Handling livestock In 1980 Grandin published her first two scientific articles on beef cattle behavior during handling:", "after": "Her new design changes the shape where livestock are held in place, so these animals do not see what's in front of them. This helps eliminate the fear and", "start_char_pos": 12078, "end_char_pos": 12197}, {"type": "R", "before": "Livestock Behavior as Related to Handling Facilities Design", "after": "threat", "start_char_pos": 12200, "end_char_pos": 12259}, {"type": "D", "before": "in the International Journal for the Study of Animal Problems, Vol. 1, pp. 33\u201352 and \"Observations of Cattle Behavior Applied to the Design of Cattle Handling Facilities\", Applied Animal Ethology, Vol. 6, pp. 19\u201331. She was one of the first scientists to report that animals are sensitive to visual distractions in handling facilities such as shadows, dangling chains, and other environmental details that most people do not notice. When she was awarded her Ph.D. at the University of Illinois, she studied the effects of environmental enrichment on pigs. The title of her dissertation was \"Effect of Rearing Environment and Environmental Enrichment on the Behavior and Neural Development in Young Pigs\". Grandin expanded her theories in her book, Animals Make Us Human.", "after": null, "start_char_pos": 12262, "end_char_pos": 13032}, {"type": "R", "before": "In 1993, she edited the first edition of Livestock Handling and Transport. Grandinwrote three chapters and included chapters from contributors from", "after": "animals see while being stuck in these chutes. Grandin's facilities are placed all", "start_char_pos": 13033, "end_char_pos": 13180}, {"type": "R", "before": ". Subsequent editions of the book were published in 2000", "after": "with techniques and systems, such as \"center track restrainer system", "start_char_pos": 13198, "end_char_pos": 13254}, {"type": "R", "before": "2007, and 2014. In her academic work as a professor at Colorado State University, her graduate student, Bridgett Voisinet, conducted one of the early studies that demonstrated that cattle who remained calm during handling, had higher weight gains. In 1997, when the paper was published, this was a new concept. The paper is entitled,", "after": "curved chutes, and race systems", "start_char_pos": 13257, "end_char_pos": 13590}, {"type": "R", "before": "Feedlot Cattle with Calm Temperaments Have Higher Average Daily Gains Than Cattle with Excitable Temperaments\", published in The Journal of Animal Science, Vol. 75, pp. 892\u2013896.", "after": ".3", "start_char_pos": 13593, "end_char_pos": 13770}, {"type": "R", "before": "Another important paper published by Grandin was,", "after": "Impact on today's society With the help of her new innovations, people have learned better ways,\"to reduce stress on their animals while handing.", "start_char_pos": 13771, "end_char_pos": 13820}, {"type": "D", "before": "Assessment of Stress During Handling and Transport\", Journal of Animal Science, 1997, Vol. 75, pp. 249-257. This paper presented the concept that an animal's previous experiences with handling could have an effect on how it will react to being handled in the future, as a new concept in the animal-handling industry.", "after": null, "start_char_pos": 13823, "end_char_pos": 14139}, {"type": "D", "before": "A major piece of equipment that Grandin developed was a center track (double rail) conveyor restrainer systemfor holding cattle during stunning at large beef slaughtering plants. The first system was installed in the mid-1980s for calves and a system for large beef cattle was developed in 1990. This equipment is now being used by many large meat companies. It is described in \"Double Rail Restrainer Conveyor for Livestock Handling\", first published in the Journal of Agricultural Engineering Research, Vol. 4, pp. 327\u2013338 in 1988, and \"Transferring results of behavioral research to industry to improve animal welfare on the farm, ranch, and slaughter plant\", Applied Animal Behavior Science, Vol. 8, pp. 215\u2013228, published in 2003.", "after": null, "start_char_pos": 14140, "end_char_pos": 14875}, {"type": "D", "before": "Grandin also developed an objective, numerical scoring system for assessing animal welfare at slaughtering plants. The use of this scoring system resulted in significant improvements in animal stunning and handling during slaughter. This work is described in \"Objective scoring of animal handling and stunning practices in slaughter plants\", Journal of the American Veterinary Medical Association, Vol. 212, pp. 3\u201339, \"The feasibility of using vocalization scoring as an indicator of poor welfare during slaughter\", Applied Animal Behavior Science, Vol. 56, pp. 121\u2013128, and \"Effect of animal welfare audits of slaughter plants by a major fast food company on cattle handling and stunning practices\", Journal of the American Veterinary Medical Association, Vol. 216, pp. 848\u2013851.", "after": null, "start_char_pos": 14905, "end_char_pos": 15684}, {"type": "D", "before": "In 2008, Grandin published Humane Livestock Handling with contributions by Mark Deesing, a long time collaborator with her. The book contains a review of the main aspects of cattle behavior and provides a visual guide in the form of construction plans and diagrams for the implementation of Grandin's ideas relating to humane livestock handling.", "after": null, "start_char_pos": 15685, "end_char_pos": 16030}, {"type": "D", "before": "Other scientific contributions Grandin is the author or co-author of more than 60 peer-reviewed scientific papers on a variety of other animal behavior subjects. Some of the other subjects are: the effect of hair whorl position on cattle behavior, the influence of stress prior to slaughter upon meat quality, religious slaughter, mothering behavior of beef cows, cattle temperament, and causes of bruising.", "after": null, "start_char_pos": 16060, "end_char_pos": 16467}, {"type": "R", "before": "Animal welfare Grandin has lectured widely about her first-hand experiences of the anxiety of feeling threatened by everything in her surroundings, and of being dismissed and feared,which motivates her work in humane livestock handling processes. She studied the behavior of cattle, how they react to ranchers, movements, objects, and light. Grandin then designed curved corrals she adapted with the intention of reducing stress , panic, and injury in animals being led to slaughter. This has proved to be a further point of criticism and controversy among animal activists who have questioned the congruence of a career built on animal slaughter alongside Grandin's claims of compassion and respect for animals", "after": "2Dr.Grandin created a scoring system for handling livestock from her intensive research. Through its results and success, many corporations utilize this system to accomplish the same goals as her", "start_char_pos": 16468, "end_char_pos": 17179}, {"type": "D", "before": "While her designs are widely used throughout the slaughterhouse industry, her claim of compassion for the animals is that because of her autism she can see the animals' reality from their viewpoint, that when she holds an animal's head in her hands as it is being slaughtered, she feels a deep connection to them.", "after": null, "start_char_pos": 17182, "end_char_pos": 17495}, {"type": "D", "before": "Her business website promotes improvement of standards for slaughterhouses and livestock farms. The \"squeeze machine\" is sold at US$4,525 by Therafin Corporation.In 2004, Grandin won a \"Proggy\" award in the \"Visionary\" category, from People for the Ethical Treatment of Animals.", "after": null, "start_char_pos": 17496, "end_char_pos": 17774}, {"type": "R", "before": "One of her notable essays about animal welfare is, \"Animals Are Not Things\", in which she posits that technically, animals are property in society, but the law ultimately gives them ethical protections or rights. She compares the properties and rights of owning cattle, versus owning screwdrivers, enumerating how both may be used to serve human purposes in many ways, but when it comes to inflicting pain, there is a vital distinction between such \"properties\", because legally, a person can smash or grind up a screwdriver, but cannot torture an animal", "after": "Continuance Her innovation of new handling facilities for livestock has revolutionized the meat industry", "start_char_pos": 17804, "end_char_pos": 18358}, {"type": "A", "before": null, "after": "This innovation as well as her other systems, previously stated, are in still in use till today. Until somebody else improves her work and designs, it won't be transformed into something else.4", "start_char_pos": 18361, "end_char_pos": 18361}, {"type": "R", "before": "Her insight into the minds of cattle has taught her to value the changes in details to which animals are particularly sensitive and to use her visualization skills to design thoughtful and humane animal-handling equipment. She was named a fellow of the American Society of Agricultural and Biological Engineers in 2009.", "after": "References:", "start_char_pos": 18362, "end_char_pos": 18681}, {"type": "D", "before": "In 2012, when the American beef industrywas struggling with public perception of its use and sale of pink slime, Grandin spoke out in support of the food product. She said, \"It should be on the market. It should be labeled. We should not be throwing away that much beef.\"", "after": null, "start_char_pos": 18682, "end_char_pos": 18953}, {"type": "D", "before": "Grandin's work has attracted the attention of philosophers interested in the moral status of animals. One view found in the academic literature is that Grandin's method of slaughter is a significant positive development for animals, but her attempts to formulate a moral defense of meat-eating have been less successful.Andy Lamey, \"The Animal Ethics of Temple Grandin: A Protectionist Analysis,\" The Journal Of Agricultural and Environmental Ethics, Vol. 32 Issue 1, 2019. Open access version at URL", "after": null, "start_char_pos": 18983, "end_char_pos": 19483}, {"type": "D", "before": "Personal life Temple Grandin at TED in February 2010", "after": null, "start_char_pos": 19513, "end_char_pos": 19565}, {"type": "D", "before": "Grandin says that \"the part of other people that has emotional relationships is not part of me\", and she has neither married nor had children. She later stated, for example, that she preferred the science fiction, documentary, and thriller genre of films and television shows to more dramatic or romantic ones. Beyond her work in animal science and welfare and autism rights, her interests include horseback riding, science fiction, movies, and biochemistry.", "after": null, "start_char_pos": 19595, "end_char_pos": 20053}, {"type": "D", "before": "She has noted in her autobiographical works that autism affects every aspect of her life. Grandin has to wear comfortable clothes to counteract her sensory processing disorder and has structured her lifestyle to avoid sensory overload. She regularly takes antidepressants, but no longer uses a squeeze-box (hug machine), the device she invented at the age of 18 as a form of stress relief therapy, stating in February 2010 that: \"It broke two years ago, and I never got around to fixing it . I'm into hugging people now.\"", "after": null, "start_char_pos": 20083, "end_char_pos": 20604}, {"type": "D", "before": "Honors In 2010, Grandin was named in the Time 100 list of the one hundred most influential people in the world, in the \"Heroes\" category. In 2011, she received a Double Helix Medal. She has received honorary degrees from many universities including McGill University in Canada (1999), and the Swedish University of Agricultural Sciences (2009), Carnegie Mellon University in the United States (2012), and Emory University (2016). In 2015, she was named an honorary fellow of the Society for Technical Communication.", "after": null, "start_char_pos": 20634, "end_char_pos": 21149}, {"type": "D", "before": "In 2011, Grandin was awarded the Ashoka Fellowship.", "after": null, "start_char_pos": 21179, "end_char_pos": 21230}, {"type": "D", "before": "In 2012, Grandin was inducted into the Colorado Women's Hall of Fame.", "after": null, "start_char_pos": 21260, "end_char_pos": 21329}, {"type": "D", "before": "In 2012, Grandin was inducted into the Texas Trail of Fame.", "after": null, "start_char_pos": 21359, "end_char_pos": 21418}, {"type": "D", "before": "In 2012, she was inducted into the Hall of Great Westerners of the National Cowboy", "after": null, "start_char_pos": 21448, "end_char_pos": 21530}, {"type": "D", "before": "Western Heritage Museum.", "after": null, "start_char_pos": 21549, "end_char_pos": 21573}, {"type": "D", "before": "Grandin received a Meritorious Achievement Award from the World Organisation for Animal Health (OIE) in 2015.", "after": null, "start_char_pos": 21603, "end_char_pos": 21712}, {"type": "R", "before": "In", "after": "Contributor, C. (", "start_char_pos": 21742, "end_char_pos": 21744}, {"type": "D", "before": "Grandin was inducted into the American Academy of Arts and Sciences.", "after": null, "start_char_pos": 21751, "end_char_pos": 21819}, {"type": "D", "before": "In 2017, Grandinwas inducted into the National Women's Hall of Fame.", "after": null, "start_char_pos": 21849, "end_char_pos": 21917}, {"type": "R", "before": "In popular culture Grandin has been featured on major media programs, such as Lisa Davis' It's Your Health, ABC's Primetime Live, the Today Show, Larry King Live, and Fresh Air with Terry Gross. She has been written up in Time magazine, People magazine, Discover magazine, Forbes, and The New York Times. In 2012, Grandin was interviewed on Thriving Canine Radio to discuss \"A Different Perspective on Animal Behavior\"", "after": "March 10)", "start_char_pos": 21947, "end_char_pos": 22365}, {"type": "A", "before": null, "after": "Cargill BrandVoice: How Temple Grandin Changed The Food Industry Forever. Forbes. URL", "start_char_pos": 22368, "end_char_pos": 22368}, {"type": "D", "before": "She was the subject of the Horizon documentary \"The Woman Who Thinks Like a Cow\", first broadcast by the BBC on June 8, 2006, and Nick News with Linda Ellerbee in the spring of 2006. She also was the subject of the first episode in the series First Person by Errol Morris.", "after": null, "start_char_pos": 22369, "end_char_pos": 22641}, {"type": "D", "before": "Grandin is the focus of a semi-biographical HBO film entitled Temple Grandin, starring Claire Danes as Grandin. The film was broadcast on February 6, 2010. The movie was nominated for 15 Primetime Emmy Awards and won seven awards, including Outstanding Television Movie and Outstanding Lead Actress in a Miniseries or Movie for Claire Danes.Grandin was on stage as the award was accepted and she spoke briefly to the audience. Coincidentally, the 62nd Primetime Emmy Awards happened on Grandin's birthday \u2013 August 29. On January 16, 2011, at the 68th Golden Globe Awards, Claire Danes won the Golden Globe Award for Best Actress \u2013 Miniseries or Television Film.", "after": null, "start_char_pos": 22671, "end_char_pos": 23332}, {"type": "D", "before": "Grandin was featured in Beautiful Minds: A Voyage Into the Brain, a documentary produced in 2006 by colourfield tell-a-vision, a German company. She was named one of 2010's one hundred most influential people in the world by Time magazine. In 2011, she was featured in an episode of the Science documentary series Ingenious Minds. In 2018, Grandin was featured in the documentary This Business of Autism, which explored autism employment and the success story of autism employers such as Spectrum Designs Foundation and was produced by Mesh Omnimedia.", "after": null, "start_char_pos": 23362, "end_char_pos": 23913}, {"type": "D", "before": "She also was interviewed by Michael Pollan in his best-selling book, The Omnivore's Dilemma, in which she discussed the livestock industry.", "after": null, "start_char_pos": 23943, "end_char_pos": 24082}, {"type": "R", "before": "Folk-punk band AJJ, formerly known as Andrew Jackson Jihad, included two songs called \"", "after": "Matchar, E. (2019, April 5).", "start_char_pos": 24112, "end_char_pos": 24199}, {"type": "R", "before": "\" and \"Temple Grandin Too\" on their LP Christmas Island.", "after": "'s Pig-Stunning System Came to Her in a Vision. Smithsonian.com. URL", "start_char_pos": 24215, "end_char_pos": 24271}, {"type": "D", "before": "In 2018, Grandin was profiled in the book Rescuing Ladybugs by author and animal advocate Jennifer Skiff as a \"global hero\" for \"standing her ground and fighting for change after witnessing the extreme mistreatment of animals\" used in farming.", "after": null, "start_char_pos": 24272, "end_char_pos": 24515}, {"type": "R", "before": "Publications Emergence: Labeled Autistic (with Margaret Scariano, 1986, updated 1991), The Learning Style of People with Autism: An Autobiography (1995). In Teaching Children with Autism : Strategies to Enhance Communication and Socialization, Kathleen Ann Quill, Thinking in Pictures: Other Reports from My Life with Autism (1996) Developing Talents: Careers for Individuals with Asperger Syndrome and High-Functioning Autism (2004). Animals in Translation: Using the Mysteries of Autism to Decode Animal Behavior (with Catherine Johnson, 2005), The Unwritten Rules of Social Relationships: Decoding Social Mysteries Through the Unique Perspectives of Autism (with Sean Barron, 2005), The Way I See It: A Personal Look At Autism And Asperger's (2008), Animals Make Us Human: Creating the Best life for Animals (with Catherine Johnson, 2009), The Autistic Brain: Thinking Across the Spectrum (with Richard Panek, 2013), The Loving Push: How Parents and Professionals Can Help Spectrum Kids Become Successful Adults (with Debra Moore Ph.", "after": "Scruggs, S.", "start_char_pos": 24545, "end_char_pos": 25581}, {"type": "D", "before": "2016), Genetics and the Behavior of Domestic Animals, Second Edition (with Mark Deesing, 2013), Improving animal welfare: a practical approach (2010). , CABI, UK Livestock handling and transport (2007). . CABI, UK. Grandin, T. 2013. Making slaughterhouses more humane for cattle, pigs, and sheep. Annual Review of Animal Biosciences. 1:491-512. Grandin, T. 2001. Cattle vocalizations are associated with handling and equipment problems at beef slaughter plants. Applied Animal Behaviour Science. Volume 71, 2001, Pg. 191\u2013201. Grandin, T. 1996. Factors That Impede Animal Movement at Slaughter Plants. Journal of the American Veterinary Medical Association. 209 No.4:757-759. Grandin, T. 1995. Restraint of Livestock. Proceedings: Animal Behaviour Design of Livestock and Poultry Systems International Conference (pages 208\u2013223).Published by: Northeast Regional Agriculture Engineering Service.Cooperative Extension. 152 Riley \u2013 Robb Hall, Ithaca, New York, 14853 USA. Grandin, T. 1994. Euthanasia and Slaughter of Livestock. Journal of American Veterinary Medical Association. Volume 204:1354-1360. Grandin, T. 1989 (Updated 1999). Behavioral Principles of Livestock Handling. Professional Scientist. December 1989 (pages 1\u201311). Calling All Minds: How to Think and Create Like an Inventor (2018", "after": null, "start_char_pos": 25586, "end_char_pos": 26880}, {"type": "A", "before": null, "after": "Zurlo, J. L. (n.d.", "start_char_pos": 26883, "end_char_pos": 26883}, {"type": "A", "before": null, "after": ". The Evolution Of The Female Inventor. Bradley. URL", "start_char_pos": 26886, "end_char_pos": 26886}, {"type": "D", "before": "See also Animal welfare Animal welfare science Autism rights movement Wendy Jacob Societal and cultural aspects of autism Temple Grandin (TV film)", "after": null, "start_char_pos": 26887, "end_char_pos": 27033}, {"type": "D", "before": "References", "after": null, "start_char_pos": 27063, "end_char_pos": 27073}, {"type": "D", "before": "Further reading Oliver Sacks, An anthropologist on Mars, The New Yorker, 1993, and later in An anthropologist on Mars: Seven paradoxical tales, Vintage Books, Penguin Random House, LLC, New York, 1996, . Andy Lamey, \"The Animal Ethics of Temple Grandin: A Protectionist Analysis\", The Journal Of Agricultural and Environmental Ethics, Vol. 32 Issue 1, 2019. Temple Did It, and I Can Too!: Seven Simple Life Rules by Jennifer Gilpin Yacio The Girl Who Thought in Pictures: The Story of Dr. Temple Grandin by Julia Finley Mosca How to Build a Hug: Temple Grandin and her Amazing Squeeze Machine by Amy Guglielmo Temple Grandin: How the Girl Who Loved Cows Embraced Autism and Changed the World by Sy Montgomery", "after": null, "start_char_pos": 27103, "end_char_pos": 27811}, {"type": "D", "before": "External links", "after": null, "start_char_pos": 27841, "end_char_pos": 27855}, {"type": "D", "before": "Official Autism Website", "after": null, "start_char_pos": 27873, "end_char_pos": 27896}, {"type": "R", "before": "An Interview With Dr. Temple Grandin, from September 2013", "after": "Website. (n.d.). URL", "start_char_pos": 27926, "end_char_pos": 27983}], "sents_char_pos": [0, 91, 237, 368, 507, 632, 752, 849, 936, 1037, 1167, 1326, 1384, 1537, 1709, 1766, 1829, 1889, 1983, 2127, 2278, 2439, 2528, 2603, 2812, 2890, 3086, 3188, 3475, 3706, 3797, 3901, 3993, 4052, 4157, 4255, 4356, 4555, 4726, 4834, 4925, 4999, 5170, 5333, 5413, 5577, 5992, 6081, 6167, 6410, 6534, 6633, 6838, 7094, 7449, 7559, 7626, 7867, 8027, 8059, 8293, 8563, 8726, 8789, 9156, 9340, 9424, 9514, 9631, 9743, 9906, 9939, 10107, 10133, 10309, 10542, 10641, 10797, 10998, 11073, 11282, 11434, 11566, 11693, 11818, 11939, 12048, 12477, 12694, 12817, 12966, 13032, 13107, 13272, 13504, 13567, 13770, 13930, 14139, 14318, 14435, 14498, 14875, 15019, 15137, 15246, 15684, 15808, 16030, 16221, 16467, 16714, 16809, 16951, 17181, 17495, 17591, 17658, 17774, 18016, 18360, 18584, 18681, 18844, 18883, 18905, 19084, 19303, 19456, 19737, 19905, 20053, 20172, 20318, 20771, 20815, 21063, 21149, 21230, 21329, 21418, 21573, 21712, 21819, 21917, 22141, 22251, 22551, 22641, 22782, 22826, 23012, 23097, 23188, 23332, 23506, 23601, 23692, 23913, 24082, 24271, 24515, 24698, 24979, 25003, 25136, 25248, 25736, 25818, 25882, 25930, 25948, 26047, 26081, 26111, 26129, 26186, 26242, 26260, 26278, 26302, 26414, 26479, 26501, 26571, 26610, 26662, 26684, 26717, 26762, 26786, 26814, 26833, 27221, 27460, 27591, 27947]}
+{"doc_id": "17022", "revision_depth": "1", "before_revision": "| cellpadding=\"2\" cellspacing=\"0\" | H2O || + || CO2 || \u2192 || colspan=\"3\" | H2CO3 |- | CaCO3 || + || H2CO3 || \u2192 || Ca2+ || + || 2 | | cellpadding=\"2\" cellspacing=\"0\" | H2S || + || 2 O2 || \u2192 | colspan=\"5\" | H2SO4 || (sulfide oxidation) |- | H2SO4 || + || 2 H2O || \u2192 | || + || colspan=\"3\" | 2 H3O+ || (sulfuric acid dissociation) |- | CaCO3 || + || 2 H3O+ || \u2192 | Ca2+ || + || H2CO3 || + || 2 H2O || (calcium carbonate dissolution) |- | Ca2+ || + || SO42- || \u2192 | CaSO4 || || colspan=\"3\" | || (formation of calcium sulfate) |- | CaSO4 || + || 2 H2O || \u2192 | colspan=\"5\" | CaSO4 \u00b7 2 H2O || (formation of gypsum) |", "after_revision": " H2O + CO2 \u2192 H2CO3 CaCO3 + H2CO3 \u2192 Ca2+ + 2 H2S + 2 O2 \u2192 H2SO4 (sulfide oxidation) H2SO4 + 2 H2O \u2192 + 2 H3O+ (sulfuric acid dissociation) CaCO3 + 2 H3O+ \u2192 Ca2+ + H2CO3 + 2 H2O (calcium carbonate dissolution) Ca2+ + SO42- \u2192 CaSO4 (formation of calcium sulfate) CaSO4 + 2 H2O \u2192 CaSO4 \u00b7 2 H2O (formation of gypsum) ", "edit_actions": [{"type": "D", "before": "| cellpadding=\"2\" cellspacing=\"0\" |", "after": null, "start_char_pos": 0, "end_char_pos": 35}, {"type": "D", "before": "||", "after": null, "start_char_pos": 40, "end_char_pos": 42}, {"type": "D", "before": "||", "after": null, "start_char_pos": 45, "end_char_pos": 47}, {"type": "D", "before": "||", "after": null, "start_char_pos": 52, "end_char_pos": 54}, {"type": "D", "before": "|| colspan=\"3\" |", "after": null, "start_char_pos": 57, "end_char_pos": 73}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 80, "end_char_pos": 84}, {"type": "D", "before": "||", "after": null, "start_char_pos": 91, "end_char_pos": 93}, {"type": "D", "before": "||", "after": null, "start_char_pos": 96, "end_char_pos": 98}, {"type": "D", "before": "||", "after": null, "start_char_pos": 105, "end_char_pos": 107}, {"type": "D", "before": "||", "after": null, "start_char_pos": 110, "end_char_pos": 112}, {"type": "D", "before": "||", "after": null, "start_char_pos": 118, "end_char_pos": 120}, {"type": "D", "before": "||", "after": null, "start_char_pos": 123, "end_char_pos": 125}, {"type": "D", "before": "|", "after": null, "start_char_pos": 128, "end_char_pos": 129}, {"type": "D", "before": "| cellpadding=\"2\" cellspacing=\"0\" |", "after": null, "start_char_pos": 130, "end_char_pos": 165}, {"type": "D", "before": "||", "after": null, "start_char_pos": 170, "end_char_pos": 172}, {"type": "D", "before": "||", "after": null, "start_char_pos": 175, "end_char_pos": 177}, {"type": "D", "before": "||", "after": null, "start_char_pos": 183, "end_char_pos": 185}, {"type": "D", "before": "| colspan=\"5\" |", "after": null, "start_char_pos": 188, "end_char_pos": 203}, {"type": "D", "before": "||", "after": null, "start_char_pos": 210, "end_char_pos": 212}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 233, "end_char_pos": 237}, {"type": "D", "before": "||", "after": null, "start_char_pos": 244, "end_char_pos": 246}, {"type": "D", "before": "||", "after": null, "start_char_pos": 249, "end_char_pos": 251}, {"type": "D", "before": "||", "after": null, "start_char_pos": 258, "end_char_pos": 260}, {"type": "D", "before": "| ||", "after": null, "start_char_pos": 263, "end_char_pos": 267}, {"type": "D", "before": "|| colspan=\"3\" |", "after": null, "start_char_pos": 270, "end_char_pos": 286}, {"type": "D", "before": "||", "after": null, "start_char_pos": 294, "end_char_pos": 296}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 326, "end_char_pos": 330}, {"type": "D", "before": "||", "after": null, "start_char_pos": 337, "end_char_pos": 339}, {"type": "D", "before": "||", "after": null, "start_char_pos": 342, "end_char_pos": 344}, {"type": "D", "before": "||", "after": null, "start_char_pos": 352, "end_char_pos": 354}, {"type": "D", "before": "|", "after": null, "start_char_pos": 357, "end_char_pos": 358}, {"type": "D", "before": "||", "after": null, "start_char_pos": 364, "end_char_pos": 366}, {"type": "D", "before": "||", "after": null, "start_char_pos": 369, "end_char_pos": 371}, {"type": "D", "before": "||", "after": null, "start_char_pos": 378, "end_char_pos": 380}, {"type": "D", "before": "||", "after": null, "start_char_pos": 383, "end_char_pos": 385}, {"type": "D", "before": "||", "after": null, "start_char_pos": 392, "end_char_pos": 394}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 427, "end_char_pos": 431}, {"type": "D", "before": "||", "after": null, "start_char_pos": 437, "end_char_pos": 439}, {"type": "D", "before": "||", "after": null, "start_char_pos": 442, "end_char_pos": 444}, {"type": "D", "before": "||", "after": null, "start_char_pos": 451, "end_char_pos": 453}, {"type": "D", "before": "|", "after": null, "start_char_pos": 456, "end_char_pos": 457}, {"type": "D", "before": "|| || colspan=\"3\" | ||", "after": null, "start_char_pos": 464, "end_char_pos": 486}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 518, "end_char_pos": 522}, {"type": "D", "before": "||", "after": null, "start_char_pos": 529, "end_char_pos": 531}, {"type": "D", "before": "||", "after": null, "start_char_pos": 534, "end_char_pos": 536}, {"type": "D", "before": "||", "after": null, "start_char_pos": 543, "end_char_pos": 545}, {"type": "D", "before": "| colspan=\"5\" |", "after": null, "start_char_pos": 548, "end_char_pos": 563}, {"type": "D", "before": "||", "after": null, "start_char_pos": 578, "end_char_pos": 580}, {"type": "D", "before": "|", "after": null, "start_char_pos": 603, "end_char_pos": 604}], "sents_char_pos": [0, 17, 33, 71, 147]}
+{"doc_id": "17073876", "revision_depth": "1", "before_revision": "In the social sciences, coordinated management of meaning (CMM) provides understanding of how individuals create, coordinate and manage meanings in their process of communication. Generally, it refers to \"how individuals establish rules for creating and interpreting meaning and how those rules are enmeshed in a conversation where meaning is constantly being coordinated\". \"Human communication is viewed as a flexible, open and mutable process evolving in an ongoing joint interaction, which enables movement, shifts and evolving ways with each other\". CMM embodies this vision and allows interpersonal connection and open conversation among individuals or groups, and can be applicable across multiple academia fields and social scenarios. With that said, defining CMM has been a challenge. However, some commonly agreed upon definitions of CMM would be: it is \"a multi-level structural theory in which rules describe the movement or linkages among meanings and actions. From the perspective of CMM it's , two persons conversing compromise on an interpersonal system with two interpersonal component systems\". Pearce and Cronen offer CMM to be \"encouraging us to look at the process of communication and the ways meaning is made. We are encouraged to think about the ways that we might act in a critical moment\". CMM \"offers a framework that enables us to take a collaborative approach to take a position of working together to explore meaning and arrive together at a shared understanding and agreed plan moving forward\". Essentially, CMM also is a \"theory of social construction that posits how we create our relationships and even the world itself through communication. It is complex and includes ideas of coherence and mystery\". The data and information shared between two parties is visually and socially understood through the \"hierarchies and coordination of the meanings in our messages\". People live in a world where there is constant communication. In communicating with others, people assign meanings in their messages based on past conversational experiences from previous social realities. Through communication, an underlying process takes place in which individuals negotiate a common or conflicted meanings of the world around them, thereby creating a new social reality. CMM advocates that meanings can be managed in a productive way so as to improve the state of interactions by coordinating and managing the meaning-making process. It is an \"interpersonal theory that describes causal forces in a conversation in two forces: logical force and practical force. Assuming that persons transform sensory perceptions into implications for meaning and action, and that of the process for this transformation may be usefully be described in terms of the actors rules\" Our social world can be understood through the practice of CMM through \"managing our meanings in our messages based off our values\" It is , \"our task in interactions to actively manage the meanings that make up our lives and to co-cordinate these with meanings to others, to bring coherence to our social world\". There is high importance also on the \"processes between people take the form of rule-governed patterns of interactions and that there is logic to the way the we act in communication\". There are also rules and stigmas that vary in cultures when we disclose information or communicate in the ways we are socially taught when assigning meaning to our messages that CMM designs to take into consideration. This is where messages in communication can have disparities in their meaning due to cross cultural or contextual disclosure differences in how we communicate. More information is covered in the three elements. CMM relies on three interdependent elements: coordination, management and meaning. These elements help to explain how social realities are created through conversation and further applications and models listed below. History and orientation The theory of CMM was developed in the mid-1970s by W. Barnett Pearce (1943\u20132011) and Vernon E. Cronen. Communication Action and Meaning was devoted to CMM, is thorough explication of CMM, which Pearce and Cronen introduced to the common scholarly vernacular of the discipline. Their scholarly collaboration at the University of Massachusetts at Amherst offered a major contribution to the philosophy of communication as story-centered, applicable, and ever attentive to the importance of human meaning. Pearce also famously said, \"the three principles of CMM are, there are multiple social worlds, these social worlds are made in interactions and through conversations with others, and we are all active agents in the making of social worlds\" and by this, our social worlds are ever-changing through which the conversations that we exchange through out time. The cluster of ideas in which CMM emerged has moved from the periphery toward greater acceptance and CMM has continued to evolve along a trajectory from an interpretive social science to one with a critical edge and then to what its founders call a \"practical theory\". CMM is one of an increasing number of theories that see communication as \"performative\" (doing things, not just talking \"about\" them) and \"constitutive\" (the material substance of the social world, not just a means of transmitting information within it). In CMM-speak, \"taking the communication perspective\" means looking at communication rather than through it , and seeing communication as the means by which we make the objects and events of our social worlds. The \"communication perspective\" entails a shift in focus from theory to praxis.Cronen 2001. According to Rose, language and communication , \"creates, shapes, and limits the diverse social worlds in which we live, and the coordinated management of meaning is the most comprehensive statement of social construction and emphasizes recursiveness. The level of praxis is fundamental in this recursive process in that communication is a primary social process\". CMM concepts and models are best understood as providing tools for naming aspects of performance. To date, CMM has found greater acceptance among practitioners than among scholars. Taking the communication perspective confers something like \"communication literacy\"\u2014the ability to inscribe and read the complex process of communication in real time . Among other things, CMM's concepts and models guide practitioners in helping clients become aware of the patterns of communication which make up aspects of the social world. They want to change and help both clients and practitioners identify openings or \"bifurcation points\" in everyday lives. Many CMM practitioners have an explicit commitment not only to describe and understand , but to improve the conditions in which they and those around them live. They believe that the best way of making better social worlds is to improve the patterns of communication which generates them.Pearce 2002. As mentioned, Pearce and Cronen together have set the stage for CMM and have unpacked this theory various times in order to give it the depth it needs. One of their studies in particular gained some speed when they wanted to analyze how rules and form of a conversation lead to the significance of the conversation and co-create verbal structures of communication within social engagement. They found that in their game like study, respondents reported more engagement based on the structure, or in this case coordination, produced different articulations for determining the value and action of said rules given to them. \"Logical force does affect the ability of person's to coordinate conversations and respond to them\". Since this theory has been developed and tested in other disciples, there is a bountiful amount of definitions for CMM. Keeping in mind Pearce and Cronen's contributions, some other definitions entail it as not just a practical theory , but also a \"social constructionist theory that traces its lineage to the work of American pragmatists\". Pearce also says it is a \"non-objectivist, realist position that foregrounds the process of communication\". That being said, many of these theorists agree it is a practical angle to communication and communication itself is a \"primary social process\". Basics It has been said that \"CMM theory is a kind of multi-tool (like a Swiss Army knife) that is useful in any situation\".Holmgren 2004, p. 91. It is not a single theory , but rather a collection of ideas to understand how humans interact during communication. According to CMM, individuals construct their own social realities while engaged in conversation. To put it simply, communicators apply rules in order to understand what is going on during their social interaction. Based on the situation, different rules are applied in order to produce \"better\" patterns of communication.Pearce Associates 1999, p.12. Often at times, these \"constitutive rules change, and so do the regulative rules\" that allow transformative empowerment of self perspectives and those of other people. These rules are discussed below further in the management sections. CMM theory is a fairly complex study focusing on both the complexity in the micro-social processes and the aspects of daily interaction.Holmgren 2004, p.92. Overall, it is concerned with how we coordinate and establish meaning during interactions. The theory can be complicated to teach and/or present to others, but it is best understood when it is broken down into the basics. The theory consists of three key concepts, which are further broken down into several different building blocks. The fundamental building blocks of CMM theory focus specifically on the flow of communication between people. The three different concepts experienced either consciously or unconsciously , are coordination, management and meaning. Coordination Coordination refers to \"the degree to which persons perceive that their actions have fitted together into some mutually intelligible sequence or pattern of actions\". It exists \"when two people attempt to make sense out of the sequencing of messages in their conversation\". That is, if people in the interaction can recognize what their partners are talking about, then we say the conversation comes to a coordination. Scientists believes that people's desire for coordination in interaction arises from the subjectivity of meaning, which means the same message may have different meanings to different people. This holds true particularly in the case of intercultural negotiations where the need to clarify the main keywords of the negotiation and eliminate misunderstanding is high See for reference URL In order to avoid this pitfall in communication, people work together to share meanings. Research shows that sense making is the foundation of coordination. By tokens within the information connected by means of channel can the logic relationship emerge, then it contributes to the sense making. Sense making helps people to establish common understanding then further develops coordination between people. The act of formulating speech and reaching the initial coordination is where the conversation co-exists between the two parties. The \"actions of each person affect and are mutually affected by those of the other person in a coevolving conversation. The unfolding of action is reflexively interpretable within various levels of nested narrative or meaning of contexts\". This in some cases is similar to relational transformation, which is \"thought to be and emerge out of this combination of increased awareness and strength regarding ones own needs, together with increased appreciation and compassion toward the needs of the other party\" and where this understanding is taking place in coordination. Relational transformation occurs when, \"recognition or other perspectives are happening for either parties\". This mindfulness also is considered when looking into the ethical production of CMM. As an example, For organizations \"interpersonal ethical analysis of these situations leads to the suggestion that communicators gain proficient knowledge of ethical principles before considering strategic ambiguity as a viable approach to organizational communications\". There are three possible outcome of coordination: Management Our interactions are guided and defined by rules. \"Interactants must understand the social reality and then incorporate rules as they decide how to act in a given situation.\" From the use of rules, individuals manage and coordinate meanings in the conversation. \"Once rules are established in a dialogue, interactants will have a sufficiently common symbolic framework for communication.\" For instance, it would be ambiguous if a friend says \"I hate you\". Does the friend really hate whomever he/she is speaking to or he/she is just expressing his/her feelings at the moment? Rules will help clarify and explain this kind of meanings . Constitutive rules: refer to \"how behavior should be interpreted within a given context\". It tells us what the given behavior means and linking belief to one another and behaviors to beliefs. In the example above, \"I hate you\" in some contexts counts as an expression of slight dissatisfaction. Constitutive rules \"are rules of meaning, used by people involved in communication process to interpret or understand an event\". Regulative rules: refer to \"some sequence of action that an individual undertakes, and they communicate what happens next in a conversation.\" They are also referred as \"cognitive reorganizations of constitutive rules\". In other words, it means the behavior that is requested in certain situation . Regulative rules link the meanings in the interaction with the consequences they result to. Our body reaction can reflect on the contents of interaction. Regulative rules \"are rules of action used to determine how to respond or behave\". \"Unwanted repetitive patterns\": It refers to \"the sequential and recurring conflictual episodes that are considered unwanted by the individuals in the conflict.\" This phenomenon happens because \"two people with particular rule systems follow a structure that obligates them to perform specific behaviors.\" Several reasons count for unwanted repetitive patterns. First, sometimes people can't find other options than being in conflict. Second, people may feel comfortable in the conflict situation because they have experience on what others will behave in this kind of situation. Third, people may be tired of finding resolution on the conflict situation. \"Not everything within communication can be explained\", which is called Mystery. It is the recognition that \"the world and our experience of it is more than any of the particular stories that make it coherent or any of the activities in which we engage\". Mystery has to do with the sense of awe or wonder when communication leads to a surprising outcome. Put more simply, it is the feeling (anything from attraction to hate) one experiences when engaged in conversation that cannot be linked to the situation as a whole. Meaning Coordinated management of meaning states that people \"organize meaning in a hierarchical manner.\" Theorists on CMM were in agreement on two points regarding hierarchical meaning. \"First, the hierarchy of meaning defines the context in which regulative and constitutive rules are to be understood. Second, these contexts are arranged in a hierarchy of abstractness, such that higher levels of the hierarchy help to define \u2013 and may subsume \u2013 lower level.\" It can interpreted to each of the contexts in the \"hierarchical can be understood by looking at the other contexts, and each contexts is always contextualizing other contexts.\"", "after_revision": "In the social sciences, coordinated management of meaning (CMM) provides an understanding of how individuals create, coordinate and manage meanings in their process of communication. Generally, it refers to \"how individuals establish rules for creating and interpreting the meaning and how those rules are enmeshed in a conversation where meaning is constantly being coordinated\". \"Human communication is viewed as a flexible, open and mutable process evolving in an ongoing joint interaction, which enables movement, shifts and evolving ways with each other\". CMM embodies this vision and allows interpersonal connection and open conversation among individuals or groups, and can be applicable across multiple academic fields and social scenarios. With that said, defining CMM has been a challenge. However, some commonly agreed upon definitions of CMM would be: it is \"a multi-level structural theory in which rules describe the movement or linkages among meanings and actions. From the perspective of CMM , it's two persons conversing compromise on an interpersonal system with two interpersonal component systems\". Pearce and Cronen offer CMM to be \"encouraging us to look at the process of communication and the ways meaning is made. We are encouraged to think about the ways that we might act in a critical moment\". CMM \"offers a framework that enables us to take a collaborative approach to take a position of working together to explore the meaning and arrive together at a shared understanding and agreed plan moving forward\". Essentially, CMM also is a \"theory of social construction that posits how we create our relationships and even the world itself through communication. It is complex and includes ideas of coherence and mystery\". The data and information shared between two parties are visually and socially understood through the \"hierarchies and coordination of the meanings in our messages\". People live in a world where there is constant communication. In communicating with others, people assign meanings in their messages based on past conversational experiences from previous social realities. Through communication, an underlying process takes place in which individuals negotiate common or conflicting meanings of the world around them, thereby creating a new social reality. CMM advocates that meanings can be managed in a productive way so as to improve the state of interactions by coordinating and managing the meaning-making process. It is an \"interpersonal theory that describes causal forces in a conversation in two forces: logical force and practical force. Assuming that persons transform sensory perceptions into implications for meaning and action, and that of the process for this transformation may be usefully be described in terms of the actors ' rules\" Our social world can be understood through the practice of CMM through \"managing our meanings in our messages based off our values\" It is \"our task in interactions to actively manage the meanings that make up our lives and to co-cordinate these with meanings to others, to bring coherence to our social world\". There is high importance also on the \"processes between people take the form of rule-governed patterns of interactions and that there is logic to the way the we act in communication\". There are also rules and stigmas that vary in cultures when we disclose information or communicate in the ways we are socially taught when assigning meaning to our messages that CMM designs to take into consideration. This is where messages in communication can have disparities in their meaning due to cross-cultural or contextual disclosure differences in how we communicate. More information is covered in the three elements. CMM relies on three interdependent elements: coordination, management , and meaning. These elements help to explain how social realities are created through conversation and further applications and models listed below. History and orientation The theory of CMM was developed in the mid-1970s by W. Barnett Pearce (1943\u20132011) and Vernon E. Cronen. Communication Action and Meaning was devoted to CMM, is a thorough explication of CMM, which Pearce and Cronen introduced to the common scholarly vernacular of the discipline. Their scholarly collaboration at the University of Massachusetts at Amherst offered a major contribution to the philosophy of communication as story-centered, applicable, and ever attentive to the importance of human meaning. Pearce also famously said, \"the three principles of CMM are, there are multiple social worlds, these social worlds are made in interactions and through conversations with others, and we are all active agents in the making of social worlds\" and by this, our social worlds are ever-changing through which the conversations that we exchange throughout time. The cluster of ideas in which CMM emerged has moved from the periphery toward greater acceptance , and CMM has continued to evolve along a trajectory from an interpretive social science to one with a critical edge and then to what its founders call a \"practical theory\". CMM is one of an increasing number of theories that see communication as \"performative\" (doing things, not just talking \"about\" them) and \"constitutive\" (the material substance of the social world, not just a means of transmitting information within it). In CMM-speak, \"taking the communication perspective\" means looking at communication rather than through it and seeing communication as the means by which we make the objects and events of our social worlds. The \"communication perspective\" entails a shift in focus from theory to praxis.Cronen 2001. According to Rose, language and communication \"creates, shapes, and limits the diverse social worlds in which we live, and the coordinated management of meaning is the most comprehensive statement of social construction and emphasizes recursiveness. The level of praxis is fundamental in this recursive process in that communication is a primary social process\". CMM concepts and models are best understood as providing tools for naming aspects of performance. To date, CMM has found greater acceptance among practitioners than among scholars. Taking the communication perspective confers something like \"communication literacy\"\u2014the ability to inscribe and read the complex process of communication in real-time . Among other things, CMM's concepts and models guide practitioners in helping clients become aware of the patterns of communication which make up aspects of the social world. They want to change and help both clients and practitioners identify openings or \"bifurcation points\" in everyday lives. Many CMM practitioners have an explicit commitment not only to describe and understand but to improve the conditions in which they and those around them live. They believe that the best way of making better social worlds is to improve the patterns of communication which generate them.Pearce 2002. As mentioned, Pearce and Cronen together have set the stage for CMM and have unpacked this theory various times in order to give it the depth it needs. One of their studies , in particular, gained some speed when they wanted to analyze how rules and form of a conversation lead to the significance of the conversation and co-create verbal structures of communication within the social engagement. They found that in their game-like study, respondents reported more engagement based on the structure, or in this case coordination, produced different articulations for determining the value and action of said rules given to them. \"Logical force does affect the ability of person's to coordinate conversations and respond to them\". Since this theory has been developed and tested in other disciples, there is a bountiful amount of definitions for CMM. Keeping in mind Pearce and Cronen's contributions, some other definitions entail it as not just a practical theory but also a \"social constructionist theory that traces its lineage to the work of American pragmatists\". Pearce also says it is a \"non-objectivist, realist position that foregrounds the process of communication\". That being said, many of these theorists agree it is a practical angle to communication , and communication itself is a \"primary social process\". Basics It has been said that \"CMM theory is a kind of multi-tool (like a Swiss Army knife) that is useful in any situation\".Holmgren 2004, p. 91. It is not a single theory but rather a collection of ideas to understand how humans interact during communication. According to CMM, individuals construct their own social realities while engaged in conversation. To put it simply, communicators apply rules in order to understand what is going on during their social interaction. Based on the situation, different rules are applied in order to produce \"better\" patterns of communication.Pearce Associates 1999, p.12. Often at times, these \"constitutive rules change, and so do the regulative rules\" that allow transformative empowerment of self perspectives and those of other people. These rules are discussed below further in the management sections. CMM theory is a fairly complex study focusing on both the complexity of the micro-social processes and the aspects of daily interaction.Holmgren 2004, p.92. Overall, it is concerned with how we coordinate and establish meaning during interactions. The theory can be complicated to teach and/or present to others, but it is best understood when it is broken down into the basics. The theory consists of three key concepts, which are further broken down into several different building blocks. The fundamental building blocks of CMM theory focus specifically on the flow of communication between people. The three different concepts experienced either consciously or unconsciously are coordination, management , and meaning. Coordination Coordination refers to \"the degree to which persons perceive that their actions have fitted together into some mutually intelligible sequence or pattern of actions\". It exists \"when two people attempt to make sense out of the sequencing of messages in their conversation\". That is, if people in the interaction can recognize what their partners are talking about, then we say the conversation comes to coordination. Scientists believe that people's desire for coordination in interaction arises from the subjectivity of meaning, which means the same message may have different meanings to different people. This holds true particularly in the case of intercultural negotiations , where the need to clarify the main keywords of the negotiation and eliminate misunderstanding is high See for reference URL In order to avoid this pitfall in communication, people work together to share meanings. Research shows that sense-making is the foundation of coordination. By tokens within the information connected by means of a channel can the logic relationship emerge, then it contributes to the sense-making. Sense-making helps people to establish common understanding then further develops coordination between people. The act of formulating speech and reaching the initial coordination is where the conversation co-exists between the two parties. The \"actions of each person affect and are mutually affected by those of the other person in a coevolving conversation. The unfolding of action is reflexively interpretable within various levels of nested narrative or meaning of contexts\". This in some cases , is similar to relational transformation, which is \"thought to be and emerge out of this combination of increased awareness and strength regarding one's own needs, together with increased appreciation and compassion toward the needs of the other party\" and where this understanding is taking place in coordination. Relational transformation occurs when, \"recognition or other perspectives are happening for either parties\". This mindfulness also is considered when looking into the ethical production of CMM. As an example, For organizations , \"interpersonal ethical analysis of these situations leads to the suggestion that communicators gain proficient knowledge of ethical principles before considering strategic ambiguity as a viable approach to organizational communications\". There is three possible outcomes of coordination: Management Our interactions are guided and defined by rules. \"Interactants must understand the social reality and then incorporate rules as they decide how to act in a given situation.\" From the use of rules, individuals manage and coordinate meanings in the conversation. \"Once rules are established in a dialogue, interactants will have a sufficiently common symbolic framework for communication.\" For instance, it would be ambiguous if a friend says , \"I hate you\". Does the friend really hate whomever he/she is speaking to or he/she is just expressing his/her feelings at the moment? Rules will help clarify and explain this kind of meaning . Constitutive rules: refer to \"how behavior should be interpreted within a given context\". It tells us what the given behavior means and linking belief to one another and behaviors to beliefs. In the example above, \"I hate you\" in some contexts counts as an expression of slight dissatisfaction. Constitutive rules \"are rules of meaning, used by people involved in the communication process to interpret or understand an event\". Regulative rules: refer to \"some sequence of action that an individual undertakes, and they communicate what happens next in a conversation.\" They are also referred to as \"cognitive reorganizations of constitutive rules\". In other words, it means the behavior that is requested in certain situations . Regulative rules link the meanings in the interaction with the consequences they result to. Our body reaction can reflect on the contents of interaction. Regulative rules \"are rules of action used to determine how to respond or behave\". \"Unwanted repetitive patterns\": It refers to \"the sequential and recurring conflictual episodes that are considered unwanted by the individuals in the conflict.\" This phenomenon happens because \"two people with particular rule systems follow a structure that obligates them to perform specific behaviors.\" Several reasons count for unwanted repetitive patterns. First, sometimes people can't find other options than being in conflict. Second, people may feel comfortable in a conflict situation because they have experience with what others will behave in this kind of situation. Third, people may be tired of finding a resolution to the conflict situation. \"Not everything within communication can be explained\", which is called Mystery. It is the recognition that \"the world and our experience of it is more than any of the particular stories that make it coherent or any of the activities in which we engage\". Mystery has to do with the sense of awe or wonder when communication leads to a surprising outcome. Put more simply, it is the feeling (anything from attraction to hate) one experiences when engaged in conversation that cannot be linked to the situation as a whole. Meaning Coordinated management of meaning states that people \"organize meaning in a hierarchical manner.\" Theorists on CMM were in agreement on two points regarding hierarchical meaning. \"First, the hierarchy of meaning defines the context in which regulative and constitutive rules are to be understood. Second, these contexts are arranged in a hierarchy of abstractness, such that higher levels of the hierarchy help to define \u2013 and may subsume \u2013 lower level.\" It can be interpreted to each of the contexts in the \"hierarchical can be understood by looking at the other contexts, and each contexts is always contextualizing other contexts.\"", "edit_actions": [{"type": "A", "before": null, "after": "an", "start_char_pos": 73, "end_char_pos": 73}, {"type": "A", "before": null, "after": "the", "start_char_pos": 268, "end_char_pos": 268}, {"type": "R", "before": "academia", "after": "academic", "start_char_pos": 706, "end_char_pos": 714}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1003, "end_char_pos": 1003}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1009, "end_char_pos": 1010}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1441, "end_char_pos": 1441}, {"type": "R", "before": "is", "after": "are", "start_char_pos": 1792, "end_char_pos": 1794}, {"type": "R", "before": "a common or conflicted", "after": "common or conflicting", "start_char_pos": 2198, "end_char_pos": 2220}, {"type": "A", "before": null, "after": "'", "start_char_pos": 2780, "end_char_pos": 2780}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2926, "end_char_pos": 2927}, {"type": "R", "before": "cross cultural", "after": "cross-cultural", "start_char_pos": 3588, "end_char_pos": 3602}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3784, "end_char_pos": 3784}, {"type": "A", "before": null, "after": "a", "start_char_pos": 4117, "end_char_pos": 4117}, {"type": "R", "before": "through out", "after": "throughout", "start_char_pos": 4800, "end_char_pos": 4811}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4915, "end_char_pos": 4915}, {"type": "D", "before": ",", "after": null, "start_char_pos": 5450, "end_char_pos": 5451}, {"type": "D", "before": ",", "after": null, "start_char_pos": 5690, "end_char_pos": 5691}, {"type": "R", "before": "real time", "after": "real-time", "start_char_pos": 6348, "end_char_pos": 6357}, {"type": "D", "before": ",", "after": null, "start_char_pos": 6742, "end_char_pos": 6743}, {"type": "R", "before": "generates", "after": "generate", "start_char_pos": 6928, "end_char_pos": 6937}, {"type": "R", "before": "in particular", "after": ", in particular,", "start_char_pos": 7129, "end_char_pos": 7142}, {"type": "A", "before": null, "after": "the", "start_char_pos": 7327, "end_char_pos": 7327}, {"type": "R", "before": "game like", "after": "game-like", "start_char_pos": 7372, "end_char_pos": 7381}, {"type": "D", "before": ",", "after": null, "start_char_pos": 7915, "end_char_pos": 7916}, {"type": "A", "before": null, "after": ",", "start_char_pos": 8217, "end_char_pos": 8217}, {"type": "D", "before": ",", "after": null, "start_char_pos": 8446, "end_char_pos": 8447}, {"type": "R", "before": "in", "after": "of", "start_char_pos": 9194, "end_char_pos": 9196}, {"type": "D", "before": ",", "after": null, "start_char_pos": 9804, "end_char_pos": 9805}, {"type": "A", "before": null, "after": ",", "start_char_pos": 9835, "end_char_pos": 9835}, {"type": "D", "before": "a", "after": null, "start_char_pos": 10264, "end_char_pos": 10265}, {"type": "R", "before": "believes", "after": "believe", "start_char_pos": 10291, "end_char_pos": 10299}, {"type": "A", "before": null, "after": ",", "start_char_pos": 10543, "end_char_pos": 10543}, {"type": "R", "before": "sense making", "after": "sense-making", "start_char_pos": 10777, "end_char_pos": 10789}, {"type": "A", "before": null, "after": "a", "start_char_pos": 10880, "end_char_pos": 10880}, {"type": "R", "before": "sense making. Sense making", "after": "sense-making. Sense-making", "start_char_pos": 10951, "end_char_pos": 10977}, {"type": "A", "before": null, "after": ",", "start_char_pos": 11464, "end_char_pos": 11464}, {"type": "R", "before": "ones", "after": "one's", "start_char_pos": 11611, "end_char_pos": 11615}, {"type": "A", "before": null, "after": ",", "start_char_pos": 12005, "end_char_pos": 12005}, {"type": "R", "before": "are three possible outcome", "after": "is three possible outcomes", "start_char_pos": 12250, "end_char_pos": 12276}, {"type": "A", "before": null, "after": ",", "start_char_pos": 12747, "end_char_pos": 12747}, {"type": "R", "before": "meanings", "after": "meaning", "start_char_pos": 12931, "end_char_pos": 12939}, {"type": "A", "before": null, "after": "the", "start_char_pos": 13306, "end_char_pos": 13306}, {"type": "A", "before": null, "after": "to", "start_char_pos": 13532, "end_char_pos": 13532}, {"type": "R", "before": "situation", "after": "situations", "start_char_pos": 13654, "end_char_pos": 13663}, {"type": "R", "before": "the", "after": "a", "start_char_pos": 14377, "end_char_pos": 14380}, {"type": "R", "before": "on", "after": "with", "start_char_pos": 14429, "end_char_pos": 14431}, {"type": "R", "before": "resolution on", "after": "a resolution to", "start_char_pos": 14521, "end_char_pos": 14534}, {"type": "A", "before": null, "after": "be", "start_char_pos": 15550, "end_char_pos": 15550}], "sents_char_pos": [0, 180, 375, 555, 743, 794, 974, 1114, 1234, 1317, 1528, 1679, 1739, 1903, 1965, 2109, 2294, 2457, 2585, 2919, 3100, 3284, 3502, 3662, 3713, 3797, 3932, 4060, 4235, 4461, 4817, 5087, 5342, 5551, 5631, 5643, 5895, 6008, 6106, 6189, 6359, 6533, 6654, 6815, 6943, 6955, 7107, 7346, 7578, 7679, 8020, 8128, 8273, 8398, 8419, 8536, 8634, 8751, 8859, 8888, 9056, 9124, 9261, 9281, 9372, 9503, 9616, 9726, 9848, 10027, 10134, 10279, 10471, 10756, 10824, 10964, 11075, 11204, 11324, 11444, 11777, 11886, 12243, 12354, 12479, 12566, 12693, 12761, 12881, 13031, 13133, 13236, 13366, 13508, 13586, 13757, 13819, 13902, 14064, 14208, 14264, 14337, 14482, 14558, 14639, 14813, 14913, 15079, 15185, 15266, 15384, 15542]}
+{"doc_id": "17179765", "revision_depth": "1", "before_revision": "'Relationship of PsyCap with various representative organizational outcomes '''''''''' edit%DIFDELCMD < ] %DIFDELCMD < %DIFDELCMD < %%% PsyCap has positive correlation with desired employee attitudes, behaviors and performance. 12%DIFDELCMD < ] %DIFDELCMD < %DIFDELCMD < %%% A meta-analysis of 51 independent samples found strong, significant, positive relationship between PsyCap and desirable attitudes (e.g., satisfaction, commitment, and well-being), behaviors (e.g., citizenship) and performance (self, supervisor rated, and objective) and a negative relationship with undesirable attitudes (e.g., cynicism, stress, anxiety, and turnover intentions) and behaviors (e.g., deviance). PsyCap mediates between supportive climate and employee performance%DIFDELCMD < [%%% 13 PsyCap and positive supportive climate are necessary for human resources in order to achieve stable organizational growth. Supportive climate is defined as the total support that an employee receives from their coworkers, other departments and their supervisors which helps them with their job demands.%DIFDELCMD < %DIFDELCMD < %%% High PsyCap Employees supports effective organizational change 14%DIFDELCMD < ] %DIFDELCMD < %DIFDELCMD < %%% Organizational change is defined as a lack of fit with the environment which intensifies as a result of a gap between the organizational goals and its present outcomes. The employees have the responsibility to adjust and behave according to the new strategy dictated by the management, mostly with fewer resources. During change, different aspects of employees\u2019 PsyCap is put to the test \u2013 they have to learn new ways of behavior and be confident to do so, recover from the crisis, be motivated to cope efficiently and to believe in a better future. PsyCap and positive emotions are examples of how personal factors facilitate organizational change. Positive change is defined as every change that the organization undergoes for its own benefit and has more positive psychological and behavioral consequences than negative ones. The role of positive emotions is that they help workers cope with the organizational change by broadening their point of view, encourage open decision making and giving them essential vitality for their coping. This interaction means that PsyCap, through positive emotions, influences the worker's attitudes and behavior, which in turn, influences the organizational change. PsyCap can be developed%DIFDELCMD < [%%% 15 Both experimental%DIFDELCMD < [%%% 16 17%DIFDELCMD < ] %%% and longitudinal 18%DIFDELCMD < ] %%% research indicates the state-like nature of PsyCap and that it can be developed and cause performance to improve. PsyCap can be extended beyond work into other life domains such as relationships and health%DIFDELCMD < [%%% 19 Recent research has found that measures of \"Relationship PsyCap\" and \"Health PsyCap\" are related to both individual's respective satisfaction appraisals and desired objective outcomessuch as time spent with family and friend in the cases of relationships and cholesterol and BMI in the case of health. When combined with work satisfaction, these three are related to overall well-being.%DIFDELCMD < %DIFDELCMD < %%% Now after almost a decade of theory building 20%DIFDELCMD < ] %%% and research, PsyCap is widely recognized throughout the world and is being applied in positive leadership 21%DIFDELCMD < ][%%% 22 and human resource development and performance management programs in all types of organizations - businesses, health, education, military and athletics%DIFDELCMD < %DIFDELCMD < %%% Relationship with different organizational outcomes", "after_revision": " %DIFDELCMD < ] %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < ] %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < [%%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < ] %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < [%%% %DIFDELCMD < [%%% %DIFDELCMD < ] %%% %DIFDELCMD < ] %%% %DIFDELCMD < [%%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < ] %%% %DIFDELCMD < ][%%% %DIFDELCMD < %DIFDELCMD < %%% Relationship with different organizational outcomes=", "edit_actions": [{"type": "D", "before": "'Relationship of PsyCap with various representative organizational outcomes ''''''''''", "after": null, "start_char_pos": 0, "end_char_pos": 86}, {"type": "D", "before": "edit", "after": null, "start_char_pos": 87, "end_char_pos": 91}, {"type": "D", "before": "PsyCap has positive correlation with desired employee attitudes, behaviors and performance.", "after": null, "start_char_pos": 136, "end_char_pos": 227}, {"type": "D", "before": "12", "after": null, "start_char_pos": 228, "end_char_pos": 230}, {"type": "D", "before": "A meta-analysis of 51 independent samples found strong, significant, positive relationship between PsyCap and desirable attitudes (e.g., satisfaction, commitment, and well-being), behaviors (e.g., citizenship) and performance (self, supervisor rated, and objective) and a negative relationship with undesirable attitudes (e.g., cynicism, stress, anxiety, and turnover intentions) and behaviors (e.g., deviance).", "after": null, "start_char_pos": 275, "end_char_pos": 686}, {"type": "D", "before": "PsyCap mediates between supportive climate and employee performance", "after": null, "start_char_pos": 687, "end_char_pos": 754}, {"type": "D", "before": "13", "after": null, "start_char_pos": 772, "end_char_pos": 774}, {"type": "D", "before": "PsyCap and positive supportive climate are necessary for human resources in order to achieve stable organizational growth. Supportive climate is defined as the total support that an employee receives from their coworkers, other departments and their supervisors which helps them with their job demands.", "after": null, "start_char_pos": 775, "end_char_pos": 1077}, {"type": "D", "before": "High PsyCap Employees supports effective organizational change", "after": null, "start_char_pos": 1107, "end_char_pos": 1169}, {"type": "D", "before": "14", "after": null, "start_char_pos": 1170, "end_char_pos": 1172}, {"type": "D", "before": "Organizational change is defined as a lack of fit with the environment which intensifies as a result of a gap between the organizational goals and its present outcomes. The employees have the responsibility to adjust and behave according to the new strategy dictated by the management, mostly with fewer resources. During change, different aspects of employees\u2019 PsyCap is put to the test \u2013 they have to learn new ways of behavior and be confident to do so, recover from the crisis, be motivated to cope efficiently and to believe in a better future. PsyCap and positive emotions are examples of how personal factors facilitate organizational change. Positive change is defined as every change that the organization undergoes for its own benefit and has more positive psychological and behavioral consequences than negative ones. The role of positive emotions is that they help workers cope with the organizational change by broadening their point of view, encourage open decision making and giving them essential vitality for their coping. This interaction means that PsyCap, through positive emotions, influences the worker's attitudes and behavior, which in turn, influences the organizational change.", "after": null, "start_char_pos": 1217, "end_char_pos": 2420}, {"type": "D", "before": "PsyCap can be developed", "after": null, "start_char_pos": 2421, "end_char_pos": 2444}, {"type": "D", "before": "15", "after": null, "start_char_pos": 2462, "end_char_pos": 2464}, {"type": "D", "before": "Both experimental", "after": null, "start_char_pos": 2465, "end_char_pos": 2482}, {"type": "D", "before": "16", "after": null, "start_char_pos": 2500, "end_char_pos": 2502}, {"type": "D", "before": "17", "after": null, "start_char_pos": 2503, "end_char_pos": 2505}, {"type": "D", "before": "and longitudinal", "after": null, "start_char_pos": 2524, "end_char_pos": 2540}, {"type": "D", "before": "18", "after": null, "start_char_pos": 2541, "end_char_pos": 2543}, {"type": "D", "before": "research indicates the state-like nature of PsyCap and that it can be developed and cause performance to improve.", "after": null, "start_char_pos": 2562, "end_char_pos": 2675}, {"type": "D", "before": "PsyCap can be extended beyond work into other life domains such as relationships and health", "after": null, "start_char_pos": 2676, "end_char_pos": 2767}, {"type": "D", "before": "19", "after": null, "start_char_pos": 2785, "end_char_pos": 2787}, {"type": "D", "before": "Recent research has found that measures of \"Relationship PsyCap\" and \"Health PsyCap\" are related to both individual's respective satisfaction appraisals and desired objective outcomessuch as time spent with family and friend in the cases of relationships and cholesterol and BMI in the case of health. When combined with work satisfaction, these three are related to overall well-being.", "after": null, "start_char_pos": 2788, "end_char_pos": 3174}, {"type": "D", "before": "Now after almost a decade of theory building", "after": null, "start_char_pos": 3204, "end_char_pos": 3248}, {"type": "D", "before": "20", "after": null, "start_char_pos": 3249, "end_char_pos": 3251}, {"type": "D", "before": "and research, PsyCap is widely recognized throughout the world and is being applied in positive leadership", "after": null, "start_char_pos": 3270, "end_char_pos": 3376}, {"type": "D", "before": "21", "after": null, "start_char_pos": 3377, "end_char_pos": 3379}, {"type": "D", "before": "22", "after": null, "start_char_pos": 3398, "end_char_pos": 3400}, {"type": "D", "before": "and human resource development and performance management programs in all types of organizations - businesses, health, education, military and athletics", "after": null, "start_char_pos": 3401, "end_char_pos": 3553}, {"type": "R", "before": "Relationship with different organizational outcomes", "after": "Relationship with different organizational outcomes=", "start_char_pos": 3583, "end_char_pos": 3634}], "sents_char_pos": [0, 227, 686, 897, 1077, 1385, 1531, 1766, 1866, 2045, 2256, 2420, 2675, 3089, 3174]}
+{"doc_id": "17222374", "revision_depth": "1", "before_revision": "A training package , in Australia, is a set of nationally endorsed standards, qualifications and guidelines used to recognise and assess the skills and knowledge people need to perform effectively in the workplace. Training packages are developed by Service Skills Organisations or by enterprises to meet the training needs of an industry or group of industries. Training packages prescribe outcomes required by the workplace, not training or education. A training package contains three compulsory endorsed components Competency standards , Qualifications framework and Assessment guidelines . Competency standards Competency standards are a set of benchmarks used to assess the skills and knowledge that a person must demonstrate in the workplace to be seen as competent. These benchmarks are packaged into combinations to form units of competency , which consist of Unit codes Code Title Descriptor Pre-requisite(s) Application Statement TAADES401A Design and develop learning programs Unit code The unit code contains the three alpha characters identifying the Training Package, followed by alpha and/or numeric characters. It must comply with the length specified in the AVETMIS Standard (no more than 12 characters). Using the unit code TAEDES401A as an example, units must contain\u2014 Training package identifier: \"TAE\" refers to the training package in which it resides\u2014in this example, the \"training and assessment package\".%DIFDELCMD < %DIFDELCMD < %%% The next three letters identify the industry field: \"DES\" refers to the industry field of learning design. Sometimes the industry field identifier can be more generic, allowing use of the unit across various sectors and training package e.g. \"COM\" often refers to communication. In older units of competency the first number indicated the AQF level of the unit, and may have referred to the AQF qualification in which the unit was first packaged. For the unit TAADES401A the \"4\" represented the Certificate IV in Training and Assessment (noting however that Roman numerals must always be used in Certificate qualification titles).%DIFDELCMD < %DIFDELCMD < %%% AQF indicators were indicative only and not prescriptive. It is common to see units with various AQF indicators packaged into a qualification. A unit with an AQF indicator of 3 should not be considered a \"level 3 unit\", as units do not have levels. A unit of competency describes the skills and knowledge required to undertake the job function described. The next two numbers (11) are called the sequence identifier and identify where the unit is in the sequence of units, e.g. 01 is the 1st unit in the learning design sequence of units in the TAE training package.%DIFDELCMD < %DIFDELCMD < %%% The last letter in the code is the version identifier: \"A\" shows it is the first version of the unit describing a competency outcome. Should the training package be updated and the competency outcome of the unit not change, the unit will be recoded as \"B\" (Note: When NTIS functionality permits, newly allocated codes will not include this\u2014see Transitional note under \"Coding maintenance\"). Unit title The Unit Title is a brief statement of the outcome of the unit of competency for example \"Design and develop learning programs\". Unit descriptor The Unit descriptor broadly communicates the intent of the unit of competency and the skill area it addresses. Prerequisite units These are units that should be completed before commencing the unit. Unit application statement This component describes the unit's application within the work place. It indicates the environments in which the skills and knowledge may be applied and sets out the parameters of the unit, its potential audience and its relationship to other units in the Training Package. Elements Sub tasks or skills describing the outcomes which contribute to a unit. Performance criteria Level of performance for each element. Required skills and knowledge Required Skills and Knowledge (from the National Skills Standards Council-endorsed components of a unit of competency) Developers need to describe the essential skills and knowledge required for competent performance Knowledge: identifies what a person needs to know to perform the work in an informed and effective manner. Skills: describes the application of the knowledge to situations where understanding is converted into a workplace outcome. While knowledge must be expressed, units of competency, their elements or performance criteria should not be entirely knowledge based unless a clear and assessable workplace outcome is described. Knowledge in units of competency: should be in context; should only be included if it refers to knowledge actually applied at work; could be referred to in the performance criteria and the range statement. _________ \\PAR Essentially the information in this section of the unit of competency is detailing learning outcomes. A learning outcome is a clear and specific statement of what students are expected to learn in a unit and to be able to demonstrate at its completion. Especially when read in conjunction with the Range Statement, which varies and sets out the conditions under which the competencies and skills are performed. GM 7 Key competencies Key competencies (generic skills) are in every unit of competency. Information on the Key Competencies and the relevant performance level is usually contained in a table in the individual competencies. All competency standards are required to be mapped against the Key Competencies. The 7 key competencies cover: Collecting, analysing and organising ideas and information Expressing ideas and information Planning and organising activities Working with others and in teams Using mathematical ideas and techniques Solving problems Using technology. The key competencies are described at three performance levels. Level 1 = the level of competency needed to undertake tasks effectively Level 2 = the ability to manage tasks Level 3 = concepts of evaluating and reshaping tasks. An assessment of a unit of competency also includes an assessment of the key competencies. Plus: Information on the industry requirements. Date when the training package was developed. Detailed information to assist assessors and those delivering the training. Contain advice on units of competency that should be assessed together or that should be completed prior to assessing the unit. Organizations working with Training Package The Department of Education and Training controls the Australian Industry and Skills Committee (AISC), which was created in 2015 with the purpose of overseeing the development of training packages and implementing Vocational Educational and Training (VET) Programs education.gov.au - EOI to Operate as SSO Members of AISC become appointed by state ministers of labor and skill and are selected because for their knowledge and experience within a particular industry.Aisc.edu.au - About the AISC Additional support for the development, adaptation and implementation of training packages is given to the AISC by Service Skills Organizations (SSO). There are a total of six SSO\u2019s obtaining funding from the Australian government and they are tasked with providing the AISC with unbiased information collected from major industry employers and educational training sectors. SSO\u2019s include: Artibus Innovation, Australian Industry Standards, IBSA Manufacturing, PWC Skills for Australia, Skills Impact and Skills IQ. Training Package Development In order to create a training package there must first be an industry backing the need to change the current system of training employees in hopes of improving the aptitude of employees for the workforce.Bucci, S. (2018) \u201cOrganized Labor's Check on Rising Economic Inequality in the U.S. States\u201d State Politics & Policy Quarterly 18(2): 148 - 172 {Second half mainly stats, figures help} The process of developing and endorsing training programs requires that a forecast predicting future skill requirements, as well as a breakdown of how altering training packages would fit into the schedule of training developments likely to take place in the nation over the next four years, are made. One way that SSOs achieve this is through the assemblage of Industry Reference Committees (IRC). IRCs are conglomerates of experienced individuals from a given industry who assemble to collaborate about the ways training packages increase the applicability of job trainings to the workforce.Leesa Wheelahan (2007) How competency\u2010based training locks the working class out of powerful knowledge: a modified Bernsteinian analysis, British Journal of Sociology of Education, 28:5, 637-651, DOI: As long as the programs created meet the requisite units for competency, Innovation and Business Skills of Australia (IBSA) standards and do not overlap with any repeating requirements or courses, the AISC is able to implement the program into its schedule of future training packages. Other ways that data can be gathered is through filling out a request on the Australian Governments site for education and training, but this can only be executed by large employers seeking government help. Once implemented the SSO\u2019s use their relations with the IRCs to promote the use of VETs in the industrial sectors the committees represent.Kemp, D, Australia Department of Education, Training and Youth Affairs 1999, Knowledge and innovation: a policy statement on research and research training, DETYA, Canberra.", "after_revision": "A training package is a set of nationally endorsed training standards, qualifications and guidelines in Australia A training package is used to recognise and assess the skills and knowledge people need to perform effectively in the workplace. Training packages are developed by Service Skills Organisations or by enterprises to meet the training needs of an industry or group of industries. Training packages prescribe outcomes required by the workplace, not training or education. A training package contains three compulsory endorsed components Competency standards Qualifications framework Assessment guidelines Competency standards Competency standards are a set of benchmarks used to assess the skills and knowledge that a person must demonstrate in the workplace to be seen as competent. These benchmarks are packaged into combinations to form units of competency Units of competency Code Title Descriptor Pre-requisite(s) Application Statement TAADES401A Design and develop learning programs Unit code - The unit code contains the three alpha characters identifying the Training Package, followed by alpha and/or numeric characters. It must comply with the length specified in the AVETMIS Standard (no more than 12 characters). %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% The Unit Title is a brief statement of the outcome of the unit of competency for example \"Design and develop learning programs\". The Unit descriptor broadly communicates the intent of the unit of competency and the skill area it addresses. Prerequisite units are units that should be completed before commencing the unit. Unit application statement describes the unit's application within the work place. It indicates the environments in which the skills and knowledge may be applied and sets out the parameters of the unit, its potential audience and its relationship to other units in the Training Package. Elements are Sub tasks or skills describing the outcomes which contribute to a unit. Performance criteria is the Level of performance for each element. Required skills and knowledge Developers need to describe the essential skills and knowledge required for competent performance Knowledge: identifies what a person needs to know to perform the work in an informed and effective manner. Skills: describes the application of the knowledge to situations where understanding is converted into a workplace outcome. While knowledge must be expressed, units of competency, their elements or performance criteria should not be entirely knowledge based unless a clear and assessable workplace outcome is described. Knowledge in units of competency: should be in context; should only be included if it refers to knowledge actually applied at work; could be referred to in the performance criteria and the range statement. Essentially the information in this section of the unit of competency is detailing learning outcomes. A learning outcome is a clear and specific statement of what students are expected to learn in a unit and to be able to demonstrate at its completion. Especially when read in conjunction with the Range Statement, which varies and sets out the conditions under which the competencies and skills are performed. GM Key competencies Key competencies (generic skills) are in every unit of competency. Information on the Key Competencies and the relevant performance level is usually contained in a table in the individual competencies. All competency standards are required to be mapped against the Key Competencies. The seven key competencies cover: Collecting, analysing and organising ideas and information Expressing ideas and information Planning and organising activities Working with others and in teams Using mathematical ideas and techniques Solving problems Using technology. The key competencies are described at three performance levels. Level 1 = the level of competency needed to undertake tasks effectively Level 2 = the ability to manage tasks Level 3 = concepts of evaluating and reshaping tasks. An assessment of a unit of competency also includes an assessment of the key competencies. Information on the industry requirements. Date when the training package was developed. Detailed information to assist assessors and those delivering the training. Contain advice on units of competency that should be assessed together or that should be completed prior to assessing the unit. Organizations working with Training Package The Department of Education and Training controls the Australian Industry and Skills Committee (AISC), which was created in 2015 with the purpose of overseeing the development of training packages and implementing Vocational Educational and Training (VET) Programs education.gov.au - EOI to Operate as SSO Members of AISC become appointed by state ministers of labor and skill and are selected because for their knowledge and experience within a particular industry.Aisc.edu.au - About the AISC Additional support for the development, adaptation and implementation of training packages is given to the AISC by Service Skills Organizations (SSO). There are a total of six SSO\u2019s obtaining funding from the Australian government and they are tasked with providing the AISC with unbiased information collected from major industry employers and educational training sectors. SSO\u2019s include: Artibus Innovation, Australian Industry Standards, IBSA Manufacturing, PWC Skills for Australia, Skills Impact and Skills IQ. Training Package Development In order to create a training package there must first be an industry backing the need to change the current system of training employees in hopes of improving the aptitude of employees for the workforce.Bucci, S. (2018) \u201cOrganized Labor's Check on Rising Economic Inequality in the U.S. States\u201d State Politics & Policy Quarterly 18(2): 148 - 172 {Second half mainly stats, figures help} The process of developing and endorsing training programs requires that a forecast predicting future skill requirements, as well as a breakdown of how altering training packages would fit into the schedule of training developments likely to take place in the nation over the next four years, are made. One way that SSOs achieve this is through the assemblage of Industry Reference Committees (IRC). IRCs are conglomerates of experienced individuals from a given industry who assemble to collaborate about the ways training packages increase the applicability of job trainings to the workforce.Leesa Wheelahan (2007) How competency\u2010based training locks the working class out of powerful knowledge: a modified Bernsteinian analysis, British Journal of Sociology of Education, 28:5, 637-651, DOI: As long as the programs created meet the requisite units for competency, Innovation and Business Skills of Australia (IBSA) standards and do not overlap with any repeating requirements or courses, the AISC is able to implement the program into its schedule of future training packages. Other ways that data can be gathered is through filling out a request on the Australian Governments site for education and training, but this can only be executed by large employers seeking government help. Once implemented the SSO\u2019s use their relations with the IRCs to promote the use of VETs in the industrial sectors the committees represent.Kemp, D, Australia Department of Education, Training and Youth Affairs 1999, Knowledge and innovation: a policy statement on research and research training, DETYA, Canberra.", "edit_actions": [{"type": "D", "before": ", in Australia,", "after": null, "start_char_pos": 19, "end_char_pos": 34}, {"type": "A", "before": null, "after": "training", "start_char_pos": 67, "end_char_pos": 67}, {"type": "A", "before": null, "after": "in Australia", "start_char_pos": 109, "end_char_pos": 109}, {"type": "A", "before": null, "after": "A training package is", "start_char_pos": 110, "end_char_pos": 110}, {"type": "R", "before": ", Qualifications framework and Assessment guidelines .", "after": "Qualifications framework Assessment guidelines", "start_char_pos": 543, "end_char_pos": 597}, {"type": "R", "before": ", which consist of Unit codes", "after": "Units of competency", "start_char_pos": 853, "end_char_pos": 882}, {"type": "A", "before": null, "after": "-", "start_char_pos": 1002, "end_char_pos": 1002}, {"type": "D", "before": "Using the unit code TAEDES401A as an example, units must contain\u2014", "after": null, "start_char_pos": 1227, "end_char_pos": 1292}, {"type": "D", "before": "Training package identifier: \"TAE\" refers to the training package in which it resides\u2014in this example, the \"training and assessment package\".", "after": null, "start_char_pos": 1293, "end_char_pos": 1434}, {"type": "D", "before": "The next three letters identify the industry field: \"DES\" refers to the industry field of learning design. Sometimes the industry field identifier can be more generic, allowing use of the unit across various sectors and training package e.g. \"COM\" often refers to communication.", "after": null, "start_char_pos": 1464, "end_char_pos": 1742}, {"type": "D", "before": "In older units of competency the first number indicated the AQF level of the unit, and may have referred to the AQF qualification in which the unit was first packaged. For the unit TAADES401A the \"4\" represented the Certificate IV in Training and Assessment (noting however that Roman numerals must always be used in Certificate qualification titles).", "after": null, "start_char_pos": 1743, "end_char_pos": 2094}, {"type": "D", "before": "AQF indicators were indicative only and not prescriptive. It is common to see units with various AQF indicators packaged into a qualification. A unit with an AQF indicator of 3 should not be considered a \"level 3 unit\", as units do not have levels. A unit of competency describes the skills and knowledge required to undertake the job function described.", "after": null, "start_char_pos": 2124, "end_char_pos": 2478}, {"type": "D", "before": "The next two numbers (11) are called the sequence identifier and identify where the unit is in the sequence of units, e.g. 01 is the 1st unit in the learning design sequence of units in the TAE training package.", "after": null, "start_char_pos": 2479, "end_char_pos": 2690}, {"type": "D", "before": "The last letter in the code is the version identifier: \"A\" shows it is the first version of the unit describing a competency outcome. Should the training package be updated and the competency outcome of the unit not change, the unit will be recoded as \"B\" (Note: When NTIS functionality permits, newly allocated codes will not include this\u2014see Transitional note under \"Coding maintenance\").", "after": null, "start_char_pos": 2720, "end_char_pos": 3110}, {"type": "R", "before": "Unit title The Unit", "after": "The Unit", "start_char_pos": 3111, "end_char_pos": 3130}, {"type": "D", "before": "Unit descriptor", "after": null, "start_char_pos": 3251, "end_char_pos": 3266}, {"type": "D", "before": "These", "after": null, "start_char_pos": 3397, "end_char_pos": 3402}, {"type": "D", "before": "This component", "after": null, "start_char_pos": 3493, "end_char_pos": 3507}, {"type": "A", "before": null, "after": "are", "start_char_pos": 3777, "end_char_pos": 3777}, {"type": "R", "before": "Performance criteria", "after": "Performance criteria is the", "start_char_pos": 3850, "end_char_pos": 3870}, {"type": "D", "before": "Required Skills and Knowledge (from the National Skills Standards Council-endorsed components of a unit of competency)", "after": null, "start_char_pos": 3940, "end_char_pos": 4058}, {"type": "D", "before": "_________ \\PAR", "after": null, "start_char_pos": 4790, "end_char_pos": 4804}, {"type": "D", "before": "7", "after": null, "start_char_pos": 5219, "end_char_pos": 5220}, {"type": "R", "before": "7", "after": "seven", "start_char_pos": 5525, "end_char_pos": 5526}, {"type": "D", "before": "Plus:", "after": null, "start_char_pos": 6105, "end_char_pos": 6110}], "sents_char_pos": [0, 217, 365, 456, 776, 1131, 1226, 1434, 1570, 1742, 1910, 2094, 2181, 2266, 2372, 2478, 2690, 2853, 3110, 3250, 3377, 3465, 3563, 3767, 3849, 3909, 4263, 4387, 4583, 4639, 4715, 4789, 4906, 5057, 5215, 5304, 5439, 5520, 5785, 5849, 6013, 6104, 6152, 6198, 6274, 6402, 6730, 6913, 7092, 7316, 7457, 7691, 8176, 8273, 8468, 8954, 9161, 9301]}
+{"doc_id": "17644927", "revision_depth": "1", "before_revision": "In the field of social psychology, illusory superiority is a condition of cognitive bias wherein a person overestimates their own qualities and abilities, in relation to the same qualities and abilities of other people. Illusory superiority is one of many positive illusions, relating to the self, that are evident in the study of intelligence, the effective performance of tasks and tests, and the possession of desirable personal characteristics and personality traits. Better-than-average heuristic Alicke and Govorun proposed the idea that, rather than individuals consciously reviewing and thinking about their own abilities, behaviors and characteristics and comparing them to those of others, it is likely that people instead have what they describe as an \"automatic tendency to assimilate positively-evaluated social objects toward ideal trait conceptions\". For example, if an individual evaluated themselves as honest , they would be likely to then exaggerate their characteristic towards their perceived ideal position on a scale of honesty. Importantly, Alicke noted that this ideal position is not always the top of the scale; for example, with honesty, someone who is always brutally honest may be regarded as rude\u2014the ideal is a balance, perceived differently by different individuals. Another explanation for how the better-than-average effect works is egocentrism. This is the idea that an individual places greater importance and significance on their own abilities, characteristics, and behaviors than those of others. Egocentrism is therefore a less overtly self-serving bias. According to egocentrism, individuals will overestimate themselves in relation to others because they believe that they have an advantage that others do not have, as an individual considering their own performance and another's performance will consider their performance to be better, even when they are in fact equal. Kruger (1999) found support for the egocentrism explanation in his research involving participant ratings of their ability on easy and difficult tasks. It was found that individuals were consistent in their ratings of themselves as above the median in the tasks classified as \"easy\" and below the median in the tasks classified as \"difficult\", regardless of their actual ability . In this experiment the better-than-average effect was observed when it was suggested to participants that they would be successful, but also a worse-than-average effect was found when it was suggested that participants would be unsuccessful. Yet another explanation for the better-than-average effect is \"focalism\", the idea that greater significance is placed on the object that is the focus of attention. Most studies of the better-than-average effect place greater focus on the self when asking participants to make comparisons (the question will often be phrased with the self being presented before the comparison target\u2014\"compare yourself to the average person\"). According to focalism this means that the individual will place greater significance on their own ability or characteristic than that of the comparison target. This also means that in theory if, in an experiment on the better-than-average effect, the questions were phrased so that the self and other were switched (e.g., \"compare the average peer to yourself\") the better-than-average effect should be lessened. Windschitl, Kruger & Simms (2003) have conducted research into focalism, focusing specifically on the better-than-average effect, and found that asking participants to estimate their ability and likelihood of success in a task produced results of decreased estimations when they were asked about others' chances of success rather than their own. Selective recruitment Selective recruitment is the notion that an individual selects their own strengths and the other's weaknesses when making peer comparisons, in order that they appear better on the whole. This theory was first tested by Weinstein (1980); however, this was in an experiment relating to optimistic bias, rather than the better-than-average effect. The study involved participants rating certain behaviors as likely to increase or decrease the chance of a series of life events happening to them. It was found that individuals showed less optimistic bias when they were allowed to see others' answers. Perloff and Fetzer (1986) suggested that when making peer comparisons on a specific characteristic, an individual chooses a comparison target\u2014the peer to whom he is being compared\u2014with lower abilities. To test this theory, Perloff and Fetzer asked participants to compare themselves to specific comparison targets like a close friend, and found that illusory superiority decreased when they were told to envision a specific person rather than vague constructs like \"the average peer\". However these results are not completely reliable and could be affected by the fact that individuals like their close friends more than an \"average peer\" and may as a result rate their friend as being higher than average, therefore the friend would not be an objective comparison target. \"Self versus aggregate\" comparisons This idea, put forward by Giladi and Klar, suggests that when making comparisons any single member of a group will tend to evaluate themselves to rank above that group's statistical mean performance level or the median performance level of its members. For example, if an individual is asked to assess their own skill at driving compared to the rest of the group, they are likely to rate themself as an above-average driver. Furthermore, the majority of the group is likely to rate themselves as above average. Research has found this effect in many different areas of human performance and has even generalized it beyond individuals' attempts to draw comparisons involving themselves. Findings of this research therefore suggest that rather than individuals evaluating themselves as above average in a self-serving manner, the better-than-average effect is actually due to a general tendency to evaluate any single person or object as better than average. Neuroimaging The degree to which people view themselves as more desirable than the average person links to reduced activation in their orbitofrontal cortex and dorsal anterior cingulate cortex. This is suggested to link to the role of these areas in processing \"cognitive control\". Illusory superiority has also explained phenomena such as the large amount of stock market trading (as each trader thinks they are the best, and most likely to succeed), and the number of lawsuits that go to trial (because, due to illusory superiority, many lawyers have an inflated belief that they will win a case). Results were divided into four groups depending on actual performance and it was found that all four groups evaluated their performance as above average, meaning that the lowest-scoring group (the bottom 25\\%) showed a very large illusory superiority bias. The researchers attributed this to the fact that the individuals who were worst at performing the tasks were also worst at recognizing skill in those tasks. This was supported by the fact that, given training, the worst subjects improved their estimate of their rank as well as getting better at the tasks. The paper, titled \"Unskilled and Unaware of It: How Difficulties in Recognizing One's Own Incompetence Lead to Inflated Self-Assessments\", won an Ig Nobel Prize in 2000. In 2003 Dunning and Joyce Ehrlinger, also of Cornell University, published a study that detailed a shift in people's views of themselves influenced by external cues. Cornell undergraduates were given tests of their knowledge of geography, some intended to positively affect their self-views, others intended to affect them negatively. They were then asked to rate their performance , and those given the positive tests reported significantly better performance than those given the negative. McCormick, Walkey and Green (1986) found similar results in their study, asking 178 participants to evaluate their position on eight different dimensions of driving skills (examples include the \"dangerous\u2013safe\" dimension and the \"considerate\u2013inconsiderate\" dimension). Only a small minority rated themselves as below the median, and when all eight dimensions were considered together it was found that almost 80\\% of participants had evaluated themselves as being an above-average driver. IQ One of the main effects of illusory superiority in IQ is the \"Downing effect\". This describes the tendency of people with a below-average IQ to overestimate their IQ , and of people with an above-average IQ to underestimate their IQ . This tendency was first observed by C. L. Downing, who conducted the first cross-cultural studies on perceived intelligence. His studies also showed that the ability to accurately estimate other people's IQs was proportional to one's own IQ (i.e., the lower the IQ, the less capable of accurately appraising other people's IQs). People with high IQs are better overall at appraising other people's IQs, but when asked about the IQs of people with similar IQs as themselves, they are likely to rate them as having higher IQs. The disparity between actual IQ and perceived IQ has also been noted between genders by British psychologist Adrian Furnham, in whose work there was a suggestion that, on average, men are more likely to overestimate their intelligence by 5 points, while women are more likely to underestimate their IQ by a similar margin. Relationship happiness Researchers have also found illusory superiority in relationship satisfaction. For example, one study found that participants perceived their own relationships as better than others' relationships on average, but thought that the majority of people were happy with their relationships. It also found evidence that the higher the participants rated their own relationship happiness, the more superior they believed their relationship was\u2014illusory superiority also increased their own relationship satisfaction. This effect was pronounced in men, whose satisfaction was especially related to the perception that one's own relationship was superior as well as to the assumption that few others were unhappy in their relationships. On the other hand, women's satisfaction was particularly related to the assumption that most people were happy with their relationship . One study found that participants became defensive when their spouse or partner were perceived by others to be more successful in any aspect of their life , and had the tendency to exaggerate their success and understate their spouse or partner' s success . The effects of illusory superiority have also been found to be strongest when people rate themselves on abilities at which they are totally incompetent. These subjects have the greatest disparity between their actual performance (at the low end of the distribution) and their self-rating (placing themselves above average). This Dunning\u2013Kruger effect is interpreted as a lack of metacognitive ability to recognize their own incompetence. Method of comparison The method used in research into illusory superiority has been found to have an implication on the strength of the effect found. Most studies into illusory superiority involve a comparison between an individual and an average peer, of which there are two methods: direct comparison and indirect comparison. A direct comparison\u2014which is more commonly used\u2014involves the participant rating themselves and the average peer on the same scale, from \"below average\" to \"above average\" and results in participants being far more self-serving. Researchers have suggested that this occurs due to the closer comparison between the individual and the average peer, however use of this method means that it is impossible to know whether a participant has overestimated themselves , underestimated the average peer, or both. First, research into illusory superiority is distinct in terms of the comparison target because an individual compares themselves with a hypothetical average peer rather than a tangible person. Alicke et al. (1995) found that the effect of illusory superiority was still present but was significantly reduced when participants compared themselves with real people (also participants in the experiment, who were seated in the same room), as opposed to when participants compared themselves with an average peer. This suggests that research into illusory superiority may itself be biasing results and finding a greater effect than would actually occur in real life. Controllability An important moderating factor of the effect of illusory superiority is the extent to which an individual believes they are able to control and change their position on the dimension concerned. According to Alicke & Govorun positive characteristics that an individual believes are within their control are more self-serving, and negative characteristics that are seen as uncontrollable are less detrimental to self-enhancement. This theory was supported by Alicke's (1985) research, which found that individuals rated themselves as higher than an average peer on positive controllable traits and lower than an average peer on negative uncontrollable traits. The idea, suggested by these findings, that individuals believe that they are responsible for their success and some other factor is responsible for their failure is known as the self-serving bias.", "after_revision": "In the field of social psychology, illusory superiority is a condition of cognitive bias wherein a person overestimates his or her own qualities and abilities, in relation to the same qualities and abilities of other people. Illusory superiority is one of many positive illusions, relating to the self, that are evident in the study of intelligence, the effective performance of tasks and tests, and the possession of desirable personal characteristics and personality traits. Better-than-average heuristic Alicke and Govorun proposed the idea that, rather than individuals consciously reviewing and thinking about their own abilities, behaviors and characteristics and comparing them to those of others, it is likely that people instead have what they describe as an \"automatic tendency to assimilate positively-evaluated social objects toward ideal trait conceptions\". For example, an individual who evaluated herself as honest would be likely to then exaggerate her characteristic towards her perceived ideal position on a scale of honesty. Importantly, Alicke noted that this ideal position is not always the top of the scale; for example, with honesty, someone who is always brutally honest may be regarded as rude\u2014the ideal is a balance, perceived differently by different individuals. Another explanation for how the better-than-average effect works is egocentrism. This is the idea that an individual places greater importance and significance on his or her own abilities, characteristics, and behaviors than those of others. Egocentrism is therefore a less overtly self-serving bias. According to egocentrism, individuals will overestimate themselves in relation to others because they believe that they have an advantage that others do not have, as an individual considering his or her own performance and another's performance will consider his or her performance to be better, even when they are in fact equal. Kruger (1999) found support for the egocentrism explanation in his research involving participant ratings of their abilities on easy and difficult tasks. It was found that individuals were consistent in their ratings of themselves as above the median in the tasks classified as \"easy\" and below the median in the tasks classified as \"difficult\", regardless of their actual abilities . In this experiment the better-than-average effect was observed when it was suggested to participants that they would be successful, but also a worse-than-average effect was found when it was suggested that participants would be unsuccessful. Yet another explanation for the better-than-average effect is \"focalism\", the idea that greater significance is placed on the object that is the focus of attention. Most studies of the better-than-average effect place greater focus on the self when asking participants to make comparisons (the question will often be phrased with the self being presented before the comparison target\u2014\"compare yourself to the average person\"). According to focalism this means that the individual will place greater significance on his or her own ability or characteristic than that of the comparison target. This also means that in theory if, in an experiment on the better-than-average effect, the questions were phrased so that the self and other were switched (e.g., \"compare the average peer to yourself\") the better-than-average effect should be lessened. Windschitl, Kruger & Simms (2003) have conducted research into focalism, focusing specifically on the better-than-average effect, and found that asking participants to estimate their abilities and likelihoods of success in a task produced results of decreased estimations when they were asked about others' chances of success rather than their own. Selective recruitment Selective recruitment is the notion that an individual selects his or her own strengths and the other's weaknesses when making peer comparisons, in order that he or she appear better on the whole. This theory was first tested by Weinstein (1980); however, this was in an experiment relating to optimistic bias, rather than the better-than-average effect. The study involved participants rating certain behaviors as likely to increase or decrease the chance of a series of life events happening to them. It was found that individuals showed less optimistic bias when they were allowed to see others' answers. Perloff and Fetzer (1986) suggested that when making peer comparisons on a specific characteristic, an individual chooses a comparison target\u2014the peer to whom he is being compared\u2014with lower abilities. To test this theory, Perloff and Fetzer asked participants to compare themselves to specific comparison targets like a close friend, and found that illusory superiority decreased when they were told to envision a specific person rather than vague constructs like \"the average peer\". However these results are not completely reliable and could be affected by the fact that individuals like their close friends more than an \"average peer\" and may as a result rate their friends as being higher than average, therefore the friend would not be an objective comparison target. \"Self versus aggregate\" comparisons This idea, put forward by Giladi and Klar, suggests that when making comparisons any single member of a group will tend to evaluate herself to rank above that group's statistical mean performance level or the median performance level of its members. For example, if an individual is asked to assess her own skill at driving compared to the rest of the group, she is likely to rate herself as an above-average driver. Furthermore, the majority of the group are likely to rate themselves as above average. Research has found this effect in many different areas of human performance and has even generalized it beyond individuals' attempts to draw comparisons involving themselves. Findings of this research therefore suggest that rather than individuals evaluating themselves as above average in a self-serving manner, the better-than-average effect is actually due to a general tendency to evaluate any single person or object as better than average. Neuroimaging The degree to which people view themselves as more desirable than the average person links to reduced activation in his or her orbitofrontal cortex and dorsal anterior cingulate cortex. This is suggested to link to the role of these areas in processing \"cognitive control\". Illusory superiority has also explained phenomena such as the large amount of stock market trading (as each trader thinks she is the best, and most likely to succeed), and the number of lawsuits that go to trial (because, due to illusory superiority, many lawyers have an inflated belief that they will win a case). Results were divided into four groups depending on actual performance and it was found that all four groups evaluated their performance as above average, meaning that the lowest-scoring group (the bottom 25\\%) showed a very large illusory superiority bias. The researchers attributed this to the fact that the individuals who were worst at performing the tasks were also worst at recognizing skill in those tasks. This was supported by the fact that, given training, the worst subjects improved their estimates of their ranks as well as getting better at the tasks. The paper, titled \"Unskilled and Unaware of It: How Difficulties in Recognizing One's Own Incompetence Lead to Inflated Self-Assessments\", won an Ig Nobel Prize in 2000. In 2003 Dunning and Joyce Ehrlinger, also of Cornell University, published a study that detailed a shift in people's views of themselves influenced by external cues. Cornell undergraduates were given tests of their knowledge of geography, some intended to positively affect their self-views, others intended to affect them negatively. They were then asked to rate their performances , and those given the positive tests reported significantly better performance than those given the negative. McCormick, Walkey and Green (1986) found similar results in their study, asking 178 participants to evaluate their positions on eight different dimensions of driving skills (examples include the \"dangerous\u2013safe\" dimension and the \"considerate\u2013inconsiderate\" dimension). Only a small minority rated themselves as below the median, and when all eight dimensions were considered together it was found that almost 80\\% of participants had evaluated themselves as being an above-average driver. IQ One of the main effects of illusory superiority in IQ is the \"Downing effect\". This describes the tendency of people with a below-average IQ to overestimate their IQs , and of people with an above-average IQ to underestimate their IQs . This tendency was first observed by C. L. Downing, who conducted the first cross-cultural studies on perceived intelligence. His studies also showed that the ability to accurately estimate other people's IQs was proportional to one's own IQ (i.e., the lower the IQ, the less capable of accurately appraising other people's IQs). People with high IQs are better overall at appraising other people's IQs, but when asked about the IQs of people with similar IQs as themselves, they are likely to rate them as having higher IQs. The disparity between actual IQ and perceived IQ has also been noted between genders by British psychologist Adrian Furnham, in whose work there was a suggestion that, on average, men are more likely to overestimate their intelligence by 5 points, while women are more likely to underestimate their IQs by a similar margin. Relationship happiness Researchers have also found illusory superiority in relationship satisfaction. For example, one study found that participants perceived their own relationships as better than others' relationships on average, but thought that the majority of people were happy with their relationships. It also found evidence that the higher the participants rated their own relationship happiness, the more superior they believed their relationship was\u2014illusory superiority also increased their own relationship satisfaction. This effect was pronounced in men, whose satisfaction was especially related to the perception that one's own relationship was superior as well as to the assumption that few others were unhappy in their relationships. On the other hand, women's satisfaction was particularly related to the assumption that most people were happy with their relationships . One study found that participants became defensive when their spouses or partners were perceived by others to be more successful in any aspect of their lives , and had the tendency to exaggerate their successes and understate their spouses' or partners' successes . The effects of illusory superiority have also been found to be strongest when people rate themselves on abilities at which they are totally incompetent. These subjects have the greatest disparity between their actual performance (at the low end of the distribution) and their self-ratings (placing themselves above average). This Dunning\u2013Kruger effect is interpreted as a lack of metacognitive ability to recognize their own incompetence. Method of comparison The method used in research into illusory superiority has been found to have an implication on the strength of the effect found. Most studies into illusory superiority involve a comparison between an individual and an average peer, of which there are two methods: direct comparison and indirect comparison. A direct comparison\u2014which is more commonly used\u2014involves the participant rating herself and her average peer on the same scale, from \"below average\" to \"above average\" and results in participants being far more self-serving. Researchers have suggested that this occurs due to the closer comparison between the individual and the average peer, however use of this method means that it is impossible to know whether a participant has overestimated herself , underestimated the average peer, or both. First, research into illusory superiority is distinct in terms of the comparison target because an individual compares herself with a hypothetical average peer rather than a tangible person. Alicke et al. (1995) found that the effect of illusory superiority was still present but was significantly reduced when participants compared themselves with real people (also participants in the experiment, who were seated in the same room), as opposed to when participants compared themselves with an average peer. This suggests that research into illusory superiority may itself be biasing results and finding a greater effect than would actually occur in real life. Controllability An important moderating factor of the effect of illusory superiority is the extent to which an individual believes she is able to control and change her position on the dimension concerned. According to Alicke & Govorun positive characteristics that an individual believes are within her control are more self-serving, and negative characteristics that are seen as uncontrollable are less detrimental to self-enhancement. This theory was supported by Alicke's (1985) research, which found that individuals rated themselves as higher than an average peer on positive controllable traits and lower than an average peer on negative uncontrollable traits. The idea, suggested by these findings, that individuals believe that they are responsible for their successes and some other factor is responsible for their failures is known as the self-serving bias.", "edit_actions": [{"type": "R", "before": "their", "after": "his or her", "start_char_pos": 120, "end_char_pos": 125}, {"type": "R", "before": "if an individual evaluated themselves as honest , they", "after": "an individual who evaluated herself as honest", "start_char_pos": 879, "end_char_pos": 933}, {"type": "R", "before": "their characteristic towards their", "after": "her characteristic towards her", "start_char_pos": 969, "end_char_pos": 1003}, {"type": "R", "before": "their", "after": "his or her", "start_char_pos": 1463, "end_char_pos": 1468}, {"type": "R", "before": "their", "after": "his or her", "start_char_pos": 1788, "end_char_pos": 1793}, {"type": "R", "before": "their", "after": "his or her", "start_char_pos": 1850, "end_char_pos": 1855}, {"type": "R", "before": "ability", "after": "abilities", "start_char_pos": 2031, "end_char_pos": 2038}, {"type": "R", "before": "ability", "after": "abilities", "start_char_pos": 2287, "end_char_pos": 2294}, {"type": "R", "before": "their", "after": "his or her", "start_char_pos": 3054, "end_char_pos": 3059}, {"type": "R", "before": "ability and likelihood", "after": "abilities and likelihoods", "start_char_pos": 3562, "end_char_pos": 3584}, {"type": "R", "before": "their", "after": "his or her", "start_char_pos": 3810, "end_char_pos": 3815}, {"type": "R", "before": "they", "after": "he or she", "start_char_pos": 3901, "end_char_pos": 3905}, {"type": "R", "before": "friend", "after": "friends", "start_char_pos": 5015, "end_char_pos": 5021}, {"type": "R", "before": "themselves", "after": "herself", "start_char_pos": 5286, "end_char_pos": 5296}, {"type": "R", "before": "their", "after": "her", "start_char_pos": 5456, "end_char_pos": 5461}, {"type": "R", "before": "they are", "after": "she is", "start_char_pos": 5518, "end_char_pos": 5526}, {"type": "R", "before": "themself", "after": "herself", "start_char_pos": 5542, "end_char_pos": 5550}, {"type": "R", "before": "is", "after": "are", "start_char_pos": 5618, "end_char_pos": 5620}, {"type": "R", "before": "their", "after": "his or her", "start_char_pos": 6240, "end_char_pos": 6245}, {"type": "R", "before": "they are", "after": "she is", "start_char_pos": 6515, "end_char_pos": 6523}, {"type": "R", "before": "estimate of their rank", "after": "estimates of their ranks", "start_char_pos": 7212, "end_char_pos": 7234}, {"type": "R", "before": "performance", "after": "performances", "start_char_pos": 7815, "end_char_pos": 7826}, {"type": "R", "before": "position", "after": "positions", "start_char_pos": 8052, "end_char_pos": 8060}, {"type": "R", "before": "IQ", "after": "IQs", "start_char_pos": 8592, "end_char_pos": 8594}, {"type": "R", "before": "IQ", "after": "IQs", "start_char_pos": 8659, "end_char_pos": 8661}, {"type": "R", "before": "IQ", "after": "IQs", "start_char_pos": 9488, "end_char_pos": 9490}, {"type": "R", "before": "relationship", "after": "relationships", "start_char_pos": 10385, "end_char_pos": 10397}, {"type": "R", "before": "spouse or partner", "after": "spouses or partners", "start_char_pos": 10462, "end_char_pos": 10479}, {"type": "R", "before": "life", "after": "lives", "start_char_pos": 10550, "end_char_pos": 10554}, {"type": "R", "before": "success", "after": "successes", "start_char_pos": 10598, "end_char_pos": 10605}, {"type": "R", "before": "spouse or partner' s success", "after": "spouses' or partners' successes", "start_char_pos": 10627, "end_char_pos": 10655}, {"type": "R", "before": "self-rating", "after": "self-ratings", "start_char_pos": 10934, "end_char_pos": 10945}, {"type": "R", "before": "themselves and the", "after": "herself and her", "start_char_pos": 11504, "end_char_pos": 11522}, {"type": "R", "before": "themselves", "after": "herself", "start_char_pos": 11873, "end_char_pos": 11883}, {"type": "R", "before": "themselves", "after": "herself", "start_char_pos": 12047, "end_char_pos": 12057}, {"type": "R", "before": "they are", "after": "she is", "start_char_pos": 12723, "end_char_pos": 12731}, {"type": "R", "before": "their", "after": "her", "start_char_pos": 12759, "end_char_pos": 12764}, {"type": "R", "before": "their", "after": "her", "start_char_pos": 12896, "end_char_pos": 12901}, {"type": "R", "before": "success", "after": "successes", "start_char_pos": 13366, "end_char_pos": 13373}, {"type": "R", "before": "failure", "after": "failures", "start_char_pos": 13421, "end_char_pos": 13428}], "sents_char_pos": [0, 219, 471, 865, 1051, 1138, 1299, 1380, 1536, 1595, 1915, 2067, 2296, 2538, 2703, 2965, 3125, 3378, 3724, 3933, 3983, 4091, 4239, 4344, 4546, 4829, 5117, 5406, 5578, 5664, 5839, 6110, 6304, 6392, 6710, 6967, 7124, 7274, 7444, 7610, 7779, 7936, 8205, 8425, 8507, 8788, 8992, 9188, 9511, 9613, 9820, 10044, 10262, 10399, 10657, 10810, 10981, 11095, 11245, 11423, 11651, 11927, 12121, 12438, 12591, 12801, 13035, 13265]}
+{"doc_id": "17796792", "revision_depth": "1", "before_revision": "Main international References Magnaghi, Alberto, The Urban Village: A Charter for Democracy and Local Self-sustainable Development, Zed Books, London and New York , 2005 Goldsmith, Edward, \u201cPreface\u201d to Alberto Magnaghi\u2019s The Urban Village Magnaghi, Alberto, Le projet local, Pierre Mardaga, Sprimont , 2003 Small, Mike, \u201cUniversalism and the Genius Loci: Geddes in Cyprus, Italy, Catalonia and Japan\u201d, in W. Stephen, A Vigorous Institution: The Living Lefacy of Patrick Geddes, Luath Press, Edinburgh , 2007 Jongerden, Joost, \u201cThe Urban Village: Territorialization of Sustainable Development\u201d, Tailoring Biotechnologies, n. 2 2006 Magnaghi, Alberto, \u201cA Green Core for the Polycentric Urban Region of Central Tuscany and the Arno Master Plan\u201d, in ISoCaRP Review 02, Cities between Integration and Disintegration: opportunities and challenges, ISoCaRP, Sitges 2006 Magnaghi, Alberto, \"Local Utopia: Towards a Fair and Non-hierarchical Bottom-up Globalization\" in ISoCaRP, Planning in a more Globalized and Competitive World, ed. by Paolo La Greca, Gangemi, Rome , 2005 Magnaghi, Alberto, \"Local self-sustainable Development: Subjects of Transformation\", Tailoring Bio-technologies, n.1 2005 , Wageningen Choay, Fran\u00e7oise, \"Utopia and the Anthropological Foundation of Built Space\", in van Schaik, Martin, M\u00e1\u010del, Otakar (eds.), Exit Utopia. Architectural Provocations 1956-76, IHAAU-TU - Prestel, Munich/Berlin/London/New-York , 2005 Magnaghi, Alberto, \"The Local Proiect: Summing up a Political Vision\", in Paloscia, Raffaele (ed.), The Contested Metropolis. Six Cities at the Beginning of the 21st Century, INURA - Birkhauser, Basel-Boston-Berlin , 2004 Magnaghi, Alberto, Le territoire des habitants : pour un projet local durable , Fondation Jan Tanghe, Brugge , 2001 Charter for a New Municipium , a collective agreement among Local Authorities, scientists and social committees for the promotion of a Fair and Non-hierarchical Bottom-up Globalization Magnaghi, Alberto, \"The 'Territorialist' Approach to Local Self-Sustainable Development\", in Plurimondi, Dedalo, Rome , 2000 thumbnail|200px|A territorialist scenario for self-sustainable development: the Province of Prato PTC Magnaghi, Alberto, \u201cTerritorial Heritage: A Genetic Code for Sustainable Development\u201d, in INURA (ed.), Possible Urban Worlds: Urban Strategies at the End of the 20th Century, Birkh\u00e4user, Basel/Boston/Berlin , 1998 More References in Italian language Ferraresi, Giorgio, Rossi-Doria, Bernardo, \"Scenari strategici come progetto di territorio: contributi alla definizione della scuola territorialista \", in Magnaghi, Alberto (ed.), Scenari strategici. Visioni identitarie per il progetto di territorio , Alinea, Firenze , 2007 Magnaghi, Alberto (ed.), La rappresentazione identitaria del territorio , Alinea, Firenze , 2005 Magnaghi, Alberto, Il progetto locale , Bollati Boringhieri, Torino , 2000 Magnaghi, Alberto (ed.), Il territorio degli abitanti: societ\u00e0 locali e sostenibilit\u00e0 , Dunod, Milano , 1998 Magnaghi, Alberto (ed.), Il territorio dell'abitare: lo sviluppo locale come alternativa strategica , Franco Angeli, Milano , 1990 External links Societ\u00e0 dei Territorialisti e delle Territorialiste ONLUS (\"Territorialist Society\") , the international Association (based in Italy) for the development and the promotion of territorialism throughout the world scientific community LaPEI, the Laboratory for the Ecological Design of Settlements established in 1990 in the University of Florence, since then coordinated by Alberto Magnaghi, and representing the main common place for the theoretical elaborations and practical applications of the territorialist research/action approach ARNM or Rete del Nuovo Municipio (\"New Municipium Network\") , the Italian Association among Cities and territories, local Authorities, scientists and social committees aimed at the promotion of local self-sustainable development by means of Participatory democracy and Active citizenship Lectures - Lire l'architecture, Projections, 2011 (French)", "after_revision": "Main international References Magnaghi, Alberto, The Urban Village: A Charter for Democracy and Local Self-sustainable Development, Zed Books, London and New York 2005 Goldsmith, Edward, \u201cPreface\u201d to Alberto Magnaghi\u2019s The Urban Village Magnaghi, Alberto, Le projet local, Pierre Mardaga, Sprimont 2003 Magnaghi, Alberto, La Bior\u00e9gion Urbaine. Petit Trait\u00e9 sur le Territoire Bien Commun, Eterotopia France, Paris 2014 Magnaghi, Alberto, La Conscience du Lieu, Eterotopia France, Paris 2017 Poli, Daniela, Formes et Figures du Projet Local. La Patrimonialisation Contemporaine du Territoire, Eterotopia France, Paris 2018 Small, Mike, \u201cUniversalism and the Genius Loci: Geddes in Cyprus, Italy, Catalonia and Japan\u201d, in W. Stephen, A Vigorous Institution: The Living Lefacy of Patrick Geddes, Luath Press, Edinburgh 2007 Jongerden, Joost, \u201cThe Urban Village: Territorialization of Sustainable Development\u201d, Tailoring Biotechnologies, n. 2 2006 Magnaghi, Alberto, \u201cA Green Core for the Polycentric Urban Region of Central Tuscany and the Arno Master Plan\u201d, in ISoCaRP Review 02, Cities between Integration and Disintegration: opportunities and challenges, ISoCaRP, Sitges 2006 Magnaghi, Alberto, \"Local Utopia: Towards a Fair and Non-hierarchical Bottom-up Globalization\" in ISoCaRP, Planning in a more Globalized and Competitive World, ed. by Paolo La Greca, Gangemi, Rome 2005 Magnaghi, Alberto, \"Local self-sustainable Development: Subjects of Transformation\", Tailoring Bio-technologies, n.1 2005 Choay, Fran\u00e7oise, \"Utopia and the Anthropological Foundation of Built Space\", in van Schaik, Martin, M\u00e1\u010del, Otakar (eds.), Exit Utopia. Architectural Provocations 1956-76, IHAAU-TU - Prestel, Munich/Berlin/London/New-York 2005 Magnaghi, Alberto, \"The Local Proiect: Summing up a Political Vision\", in Paloscia, Raffaele (ed.), The Contested Metropolis. Six Cities at the Beginning of the 21st Century, INURA - Birkhauser, Basel-Boston-Berlin 2004 Magnaghi, Alberto, Le Territoire des Habitants : pour un Projet Local Durable , Fondation Jan Tanghe, Brugge 2001 Charter for a New Municipium , a collective agreement among Local Authorities, scientists and social committees for the promotion of a Fair and Non-hierarchical Bottom-up Globalization Magnaghi, Alberto, \"The 'Territorialist' Approach to Local Self-Sustainable Development\", Plurimondi, Dedalo, Rome 2000 thumbnail|200px|A territorialist scenario for self-sustainable development: the Province of Prato PTC Magnaghi, Alberto, \u201cTerritorial Heritage: A Genetic Code for Sustainable Development\u201d, in INURA (ed.), Possible Urban Worlds: Urban Strategies at the End of the 20th Century, Birkh\u00e4user, Basel/Boston/Berlin 1998 More References in Italian language Magnaghi, Alberto, Il Principio Territoriale, Bollati Boringhieri, Torino 2020 Magnaghi, Alberto (ed.), La Regola e il Progetto. Un Approccio Bioregionalista alla Pianificazione del Territorio, Firenze University Press, Florence 2014 Ferraresi, Giorgio, Rossi-Doria, Bernardo, \"Scenari Strategici come Progetto di Territorio: Contributi alla Definizione della Scuola Territorialista \", in Magnaghi, Alberto (ed.), Scenari Strategici. Visioni Identitarie per il Progetto di Territorio , Alinea, Firenze 2007 Magnaghi, Alberto (ed.), La Rappresentazione Identitaria del Territorio , Alinea, Firenze 2005 Magnaghi, Alberto, Il Progetto Locale , Bollati Boringhieri, Torino 2000 Magnaghi, Alberto (ed.), Il Territorio degli Abitanti: Societ\u00e0 Locali e Sostenibilit\u00e0 , Dunod, Milano 1998 Magnaghi, Alberto (ed.), Il Territorio dell'Abitare: lo Sviluppo Locale come Alternativa Strategica , Franco Angeli, Milano 1990 External links Societ\u00e0 dei Territorialisti e delle Territorialiste ONLUS (\"Territorialist Society\") , the international Association (based in Italy) for the development and the promotion of territorialism throughout the world scientific community R\u00e9seau des Territorialistes (\"French Territorialist Network\") , the French Association for the development and the promotion of territorialism LaPEI, the Laboratory for the Ecological Design of Settlements established in 1990 in the University of Florence, since then coordinated by Alberto Magnaghi, and representing the main common place for the theoretical elaborations and practical applications of the territorialist research/action approach ARNM or Rete del Nuovo Municipio (\"New Municipium Network\") , the Italian Association among Cities and territories, local Authorities, scientists and social committees aimed at the promotion of local self-sustainable development by means of Participatory democracy and Active citizenship Lectures - Lire l'architecture, Projections, 2011 (French)", "edit_actions": [{"type": "D", "before": ",", "after": null, "start_char_pos": 163, "end_char_pos": 164}, {"type": "D", "before": ",", "after": null, "start_char_pos": 300, "end_char_pos": 301}, {"type": "A", "before": null, "after": "Magnaghi, Alberto, La Bior\u00e9gion Urbaine. Petit Trait\u00e9 sur le Territoire Bien Commun, Eterotopia France, Paris 2014 Magnaghi, Alberto, La Conscience du Lieu, Eterotopia France, Paris 2017 Poli, Daniela, Formes et Figures du Projet Local. La Patrimonialisation Contemporaine du Territoire, Eterotopia France, Paris 2018", "start_char_pos": 307, "end_char_pos": 307}, {"type": "D", "before": ",", "after": null, "start_char_pos": 502, "end_char_pos": 503}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1061, "end_char_pos": 1062}, {"type": "D", "before": ", Wageningen", "after": null, "start_char_pos": 1190, "end_char_pos": 1202}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1425, "end_char_pos": 1426}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1647, "end_char_pos": 1648}, {"type": "R", "before": "territoire des habitants", "after": "Territoire des Habitants", "start_char_pos": 1676, "end_char_pos": 1700}, {"type": "R", "before": "projet local durable", "after": "Projet Local Durable", "start_char_pos": 1711, "end_char_pos": 1731}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1763, "end_char_pos": 1764}, {"type": "D", "before": "in", "after": null, "start_char_pos": 2045, "end_char_pos": 2047}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2073, "end_char_pos": 2074}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2389, "end_char_pos": 2390}, {"type": "A", "before": null, "after": "Magnaghi, Alberto, Il Principio Territoriale, Bollati Boringhieri, Torino 2020 Magnaghi, Alberto (ed.), La Regola e il Progetto. Un Approccio Bioregionalista alla Pianificazione del Territorio, Firenze University Press, Florence 2014", "start_char_pos": 2432, "end_char_pos": 2432}, {"type": "R", "before": "strategici come progetto di territorio: contributi alla definizione della scuola territorialista", "after": "Strategici come Progetto di Territorio: Contributi alla Definizione della Scuola Territorialista", "start_char_pos": 2485, "end_char_pos": 2581}, {"type": "R", "before": "strategici. Visioni identitarie per il progetto di territorio", "after": "Strategici. Visioni Identitarie per il Progetto di Territorio", "start_char_pos": 2621, "end_char_pos": 2682}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2701, "end_char_pos": 2702}, {"type": "R", "before": "rappresentazione identitaria del territorio", "after": "Rappresentazione Identitaria del Territorio", "start_char_pos": 2736, "end_char_pos": 2779}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2798, "end_char_pos": 2799}, {"type": "R", "before": "progetto locale", "after": "Progetto Locale", "start_char_pos": 2827, "end_char_pos": 2842}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2873, "end_char_pos": 2874}, {"type": "R", "before": "territorio degli abitanti: societ\u00e0 locali e sostenibilit\u00e0", "after": "Territorio degli Abitanti: Societ\u00e0 Locali e Sostenibilit\u00e0", "start_char_pos": 2908, "end_char_pos": 2965}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2982, "end_char_pos": 2983}, {"type": "R", "before": "territorio dell'abitare: lo sviluppo locale come alternativa strategica", "after": "Territorio dell'Abitare: lo Sviluppo Locale come Alternativa Strategica", "start_char_pos": 3017, "end_char_pos": 3088}, {"type": "D", "before": ",", "after": null, "start_char_pos": 3113, "end_char_pos": 3114}, {"type": "A", "before": null, "after": "R\u00e9seau des Territorialistes (\"French Territorialist Network\") , the French Association for the development and the promotion of territorialism", "start_char_pos": 3367, "end_char_pos": 3367}], "sents_char_pos": [0, 67, 355, 441, 546, 812, 897, 1338, 1557, 1614, 1702, 2155, 2632, 2731, 2903, 3012, 3041, 3219, 3268, 3731]}
+{"doc_id": "178942", "revision_depth": "1", "before_revision": "Notable examples Robert Rauschenberg, Portrait of Iris Clert 1961 Barbara Kruger installation detail at Melbourne 260px|Olaf Nicolai, Memorial for the Victims of Nazi Military Justice, Ballhausplatz in Vienna 1917 : Fountain by Marcel Duchamp, described in an article in The Independent as the invention of conceptual art. 1953 : Robert Rauschenberg produces Erased De Kooning Drawing, a drawing by Willem de Kooning which Rauschenberg erased. It raised many questions about the fundamental nature of art, challenging the viewer to consider whether erasing another artist's work could be a creative act, as well as whether the work was only \"art\" because the famous Rauschenberg had done it. 1955 : Rhea Sue Sanders creates her first text pieces of the series pi\u00e8ces de complices, combining visual art with poetry and philosophy, and introducing the concept of complicity: the viewer must accomplish the art in her/his imagination.B\u00e9n\u00e9dicte Demelas: Des mythes et des r\u00e9alit\u00e9es de l'avant-garde fran\u00e7aise. Presses universitaires de Rennes, 1988 1956 : Isidore Isou introduces the concept of infinitesimal art in Introduction \u00e0 une esth\u00e9tique imaginaire (Introduction to Imaginary Aesthetics). 1957: Yves Klein, Aerostatic Sculpture (Paris), composed of 1001 blue balloons released into the sky from Galerie Iris Clert to promote his Proposition Monochrome; Blue Epoch exhibition. Klein also exhibited One Minute Fire Painting, which was a blue panel into which 16 firecrackers were set. For his next major exhibition, The Void in 1958, Klein declared that his paintings were now invisible - and to prove it he exhibited an empty room. 1958: Wolf Vostell Das Theater ist auf der Stra\u00dfe/The theater is on the street. The first Happening in Europe. 1960: Yves Klein's action called A Leap Into The Void, in which he attempts to fly by leaping out of a window. He stated: \"The painter has only to create one masterpiece, himself, constantly.\" 1960: The artist Stanley Brouwn declares that all the shoe shops in Amsterdam constitute an exhibition of his work. 1961: Wolf Vostell Cityrama, in Cologne - the first Happening in Germany. 1961: Robert Rauschenberg sent a telegram to the Galerie Iris Clert which read: 'This is a portrait of Iris Clert if I say so.' as his contribution to an exhibition of portraits. 1961: Piero Manzoni exhibited Artist's Shit, tins purportedly containing his own feces (although since the work would be destroyed if opened, no one has been able to say for sure). He put the tins on sale for their own weight in gold. He also sold his own breath (enclosed in balloons) as Bodies of Air, and signed people's bodies, thus declaring them to be living works of art either for all time or for specified periods. (This depended on how much they are prepared to pay). Marcel Broodthaers and Primo Levi are amongst the designated \"artworks\". 1962: Artist Barrie Bates rebrands himself as Billy Apple, erasing his original identity to continue his exploration of everyday life and commerce as art. By this stage, many of his works are fabricated by third parties. 1962: Christo's Iron Curtain work. This consists of a barricade of oil barrels in a narrow Paris street which caused a large traffic jam. The artwork was not the barricade itself but the resulting traffic jam. 1962: Yves Klein presents Immaterial Pictorial Sensitivity in various ceremonies on the banks of the Seine. He offers to sell his own \"pictorial sensitivity\" (whatever that was - he did not define it) in exchange for gold leaf. In these ceremonies the purchaser gave Klein the gold leaf in return for a certificate. Since Klein's sensitivity was immaterial, the purchaser was then required to burn the certificate whilst Klein threw half the gold leaf into the Seine. (There were seven purchasers.) 1962: Piero Manzoni created The Base of the World, thereby exhibiting the entire planet as his artwork. 1962: Alberto Greco began his Vivo Dito or Live Art series, which took place in Paris, Rome, Madrid, and Piedralaves. In each artwork, Greco called attention to the art in everyday life, thereby asserting that art was actually a process of looking and seeing. 1962: FLUXUS Internationale Festspiele Neuester Musik in Wiesbaden with , George Maciunas, Wolf Vostell, Nam June Paik and others.Fluxus at 50. Stefan Fricke, Alexander Klar, Sarah Maske, Kerber Verlag, 2012, . 1963: George Brecht's collection of Event-Scores, Water Yam, is published as the first Fluxkit by George Maciunas. 1963: Festum Fluxorum Fluxus in D\u00fcsseldorf with George Maciunas, Wolf Vostell, Joseph Beuys, Dick Higgins, Nam June Paik, Ben Patterson, Emmett Williams and others. 1963: Henry Flynt's article Concept Art is published in An Anthology of Chance Operations; a collection of artworks and concepts by artists and musicians that was published by Jackson Mac Low and La Monte Young (ed.). An Anthology of Chance Operations documented the development of Dick Higgins vision of intermedia art in the context of the ideas of John Cage and became an early Fluxus masterpiece. Flynt's \"concept art\" devolved from his idea of \"cognitive nihilism\" and from his insights about the vulnerabilities of logic and mathematics. 1964: Yoko Ono publishes Grapefruit: A Book of Instructions and Drawings . An example of Heuristic art, or a series of instructions for how to obtain an aesthetic experience. 1965: Art & Language founder Michael Baldwin Mirror Piece. Instead of paintings, the work is showing a variable number of mirrors that challenge both the visitor and Clement Greenberg theory. 1965: A complex conceptual art piece by John Latham called Still and Chew. He invites art students to protest against the values of Clement Greenberg's Art and Culture, much praised and taught at Saint Martin's School of Art in London, where Latham taught part-time. Pages of Greenberg's book (borrowed from the college library) are chewed by the students, dissolved in acid and the resulting solution returned to the library bottled and labelled. Latham was then fired from his part-time position. 1965: with Show V, immaterial sculpture the Dutch artist Marinus Boezem introduced Conceptual Art in the Netherlands. In the show various air doors are placed where people can walk through them. People have the sensory experience of warmth, air. Three invisible air doors, which arise as currents of cold and warm are blown into the room, are indicated in the space with bundles of arrows and lines. The articulation of the space which arises is the result of invisible processes which influence the conduct of persons in that space, and who are included in the system as co-performers. Joseph Kosuth dates the concept of One and Three Chairs in the year 1965. The presentation of the work consists of a chair, its photo and a blow up of a definition of the word \"chair \".Kosuth has chosen the definition from a dictionary. Four versions with different definitions are known. 1966: Conceived in 1966 The Air Conditioning Show of Art & Language is published as an article in 1967 in the November issue of Arts Magazine. 1966: N.E. Thing Co. Ltd. (Iain and Ingrid Baxter of Vancouver) exhibited Bagged Place the contents of a four-room apartment wrapped in plastic bags. The same year they registered as a corporation and subsequently organized their practice along corporate models, one of the first international examples of the \"aesthetic of administration \". 1967: Mel Ramsden first 100\\% Abstract Paintings. The painting shows a list of chemical components that constitute the substance of the painting. 1967: Sol LeWitt's Paragraphs on Conceptual Art were published by the American art journal Artforum. The Paragraphs mark the progression from Minimal to Conceptual Art. 1968: Michael Baldwin, Terry Atkinson, David Bainbridge and Harold Hurrell found Art & Language. 1968: Lawrence Weiner relinquishes the physical making of his work and formulates his \"Declaration of Intent \", one of the most important conceptual art statements following LeWitt's \"Paragraphs on Conceptual Art.\" The declaration, which underscores his subsequent practice reads: \"1. The artist may construct the piece. 2. The piece may be fabricated. 3. The piece need not be built. Each being equal and consistent with the intent of the artist the decision as to condition rests with the receiver upon the occasion of receivership.\" Friedrich Heubach launches the magazine Interfunktionen in Cologne, Germany, a publication that excelled in artists' projects. It originally showed a Fluxus influence, but later moved toward Conceptual art. 1969: The first generation of New York alternative exhibition spaces are established, including Billy Apple's APPLE, Robert Newman's Gain Ground, where Vito Acconci produced many important early works, and 112 Greene Street. 1969: Robert Barry's Telepathic Piece at Simon Fraser University, Vancouver, of which he said ' During the exhibition I will try to communicate telepathically a work of art, the nature of which is a series of thoughts that are not applicable to language or image '. 1969: The first issue of Art-Language The Journal of conceptual art is published in May . It is subtitled as The Journal of conceptual art and edited by Terry Atkinson, David Bainbridge, Michael Baldwin and Harold Hurrell. Art & Language are the editors of this first number, and by the second number and until 1972, Joseph Kosuth will join and become the American editor . 1969: Vito Acconci creates Following Piece, in which he follows randomly selected members of the public until they disappear into a private space. The piece is presented as photographs. The English journal Studio International published Joseph Kosuth\u00b4s article \"Art after Philosophy\" in three parts (October\u2013December). It became the most discussed article on \"Conceptual Art\" . 1970: Ian Burn, Mel Ramsden and Charles Harrison join Art & Language. 1970: Painter John Baldessari exhibits a film in which he sets a series of erudite statements by Sol LeWitt on the subject of conceptual art to popular tunes like \"Camptown Races\" and \"Some Enchanted Evening\". 1970: Douglas Huebler exhibits a series of photographs which were taken every two minutes whilst driving along a road for 24 minutes. 1970: Douglas Huebler asks museum visitors to write down 'one authentic secret'. The resulting 1800 documents are compiled into a book which, by some accounts, makes for very repetitive reading as most secrets are similar. 1971: Hans Haacke's Real Time Social System. This piece of systems art detailed the real estate holdings of the third largest landowners in New York City. The properties were mostly in Harlem and the Lower East Side, were decrepit and poorly maintained, and represented the largest concentration of real estate in those areas under the control of a single group. The captions gave various financial details about the buildings, including recent sales between companies owned or controlled by the same family. The Guggenheim museum cancelled the exhibition, stating that the overt political implications of the work constituted \"an alien substance that had entered the art museum organism\". There is no evidence to suggest that the trustees of the Guggenheim were linked financially to the family which was the subject of the work. 1972: The Art & Language Institute exhibits Index 01 at the Documenta 5, an installation indexing text-works by Art & Language and text-works from Art-Language. 1972: Antonio Caro exhibits in the National Art Salon (Museo Nacional, Bogot\u00e1, Colombia) his work: Aquinocabeelarte (Art does not fit here), where each of the letters is a separate poster, and under each letter is written the name of some victim of state repression. 1972: Fred Forest buys an area of blank space in the newspaper Le Monde and invites readers to fill it with their own works of art. General Idea launch File magazine in Toronto. The magazine functioned as something of an extended, collaborative artwork. 1973: Jacek Tylicki lays out blank canvases or paper sheets in the natural environment for the nature to create art. 1974: Cadillac Ranch near Amarillo, Texas. 1975\u201376: Three issues of the journal The Fox were published by Art & Language in New York by . The editor was Joseph Kosuth. The Fox became an important platform for the American members of Art & Language. Karl Beveridge, Ian Burn, Sarah Charlesworth, Michael Corris, Joseph Kosuth, Andrew Menard, Mel Ramsden and Terry Smith wrote articles which thematized the context of contemporary art. These articles exemplify the development of an institutional critique within the inner circle of Conceptual Art . The criticism of the art world integrates social, political and economic reasons. 1975-77 Orshi Drozdik's Individual Mythology performance, photography and offsetprint series and her theory of ImageBank in Budapest. 1976: facing internal problems, members of Art & Language separate. The destiny of the name Art & Language remaining in Michael Baldwin, Mel Ramsden and Charles Harrison hands. 1977: Walter De Maria's Vertical Earth Kilometer in Kassel, Germany. This was a one kilometer brass rod which was sunk into the earth so that nothing remained visible except a few centimeters. Despite its size, therefore, this work exists mostly in the viewer's mind. 1982: The opera Victorine by Art & Language was to be performed in the city of Kassel for documenta 7 and shown alongside Art & Language Studio at 3 Wesley Place Painted by Actors, but the performance was cancelled. 1986: Art & Language are nominated for the Turner Prize. 1989: Christopher Williams' Angola to Vietnam is first exhibited. The work consists of a series of black-and-white photographs of glass botanical specimens from the Botanical Museum at Harvard University, chosen according to a list of the thirty-six countries in which political disappearances were known to have taken place during the year 1985. 1990: Ashley Bickerton and Ronald Jones included in \"Mind Over Matter: Concept and Object\" exhibition of \u201dthird generation Conceptual artists\u201d at the Whitney Museum of American Art. 1991: Ronald Jones exhibits objects and text, art, history and science rooted in grim political reality at Metro Pictures Gallery.Smith, Roberta. \"Art in review: Ronald Jones Metro Pictures\", The New York Times, 27 December 1991. Retrieved 8 July 2008. 1991: Charles Saatchi funds Damien Hirst and the next year in the Saatchi Gallery exhibits his The Physical Impossibility of Death in the Mind of Someone Living, a shark in formaldehyde in a vitrine. 1992: Maurizio Bolognini starts to \"seal\" his Programmed Machines: hundreds of computers are programmed and left to run ad infinitum to generate inexhaustible flows of random images which nobody would see. %DIFDELCMD < %DIFDELCMD < %%% 1993: Matthieu Laurette established his artistic birth certificate by taking part in a French TV game called Tournez man\u00e8ge (The Dating Game) where the female presenter asked him who he was, to which he replied: 'A multimedia artist'. Laurette had sent out invitations to an art audience to view the show on TV from their home , turning his staging of the artist into a performed reality. 1993: Vanessa Beecroft holds her first performance in Milan, Italy, using models to act as a second audience to the display of her diary of food. 1999: Tracey Emin is nominated for the Turner Prize. Part of her exhibit is My Bed, her dishevelled bed, surrounded by detritus such as condoms, blood-stained knickers, bottles and her bedroom slippers. 2001: Martin Creed wins the Turner Prize for Work No. 227: The lights going on and off, an empty room in which the lights go on and off. 2004: Andrea Fraser's video Untitled, a document of her sexual encounter in a hotel room with a collector (the collector having agreed to help finance the technical costs for enacting and filming the encounter) is exhibited at the Friedrich Petzel Gallery. It is accompanied by her 1993 work Don't Postpone Joy, or Collecting Can Be Fun, a 27-page transcript of an interview with a collector in which the majority of the text has been deleted. 2005: Simon Starling wins the Turner Prize for Shedboatshed, a wooden shed which he had turned into a boat, floated down the Rhine and turned back into a shed again. 2005: Maurizio Nannucci creates the large neon installation All Art Has Been Contemporary on the facade of Altes Museum in Berlin. 2014: Olaf Nicolai creates the Memorial for the Victims of Nazi Military Justice on Vienna's Ballhausplatz after winning an international competition. The inscription on top of the three-step sculpture features a poem by Scottish poet Ian Hamilton Finlay (1924\u20132006) with just two words: all alone.", "after_revision": "Notable examples Robert Rauschenberg, Portrait of Iris Clert 1961 Barbara Kruger installation detail at Melbourne 260px|Olaf Nicolai, Memorial for the Victims of Nazi Military Justice, Ballhausplatz in Vienna 1917 : Fountain by Marcel Duchamp, described in an article in The Independent as the invention of conceptual art. 1953 : Robert Rauschenberg produces Erased De Kooning Drawing, a drawing by Willem de Kooning which Rauschenberg erased. It raised many questions about the fundamental nature of art, challenging the viewer to consider whether erasing another artist's work could be a creative act, as well as whether the work was only \"art\" because the famous Rauschenberg had done it. 1955 : Rhea Sue Sanders creates her first text pieces of the series pi\u00e8ces de complices, combining visual art with poetry and philosophy, and introducing the concept of complicity: the viewer must accomplish the art in her/his imagination.B\u00e9n\u00e9dicte Demelas: Des mythes et des r\u00e9alit\u00e9es de l'avant-garde fran\u00e7aise. Presses universitaires de Rennes, 1988 1956 : Isidore Isou introduces the concept of infinitesimal art in Introduction \u00e0 une esth\u00e9tique imaginaire (Introduction to Imaginary Aesthetics). 1957: Yves Klein, Aerostatic Sculpture (Paris), composed of 1001 blue balloons released into the sky from Galerie Iris Clert to promote his Proposition Monochrome; Blue Epoch exhibition. Klein also exhibited One Minute Fire Painting, which was a blue panel into which 16 firecrackers were set. For his next major exhibition, The Void in 1958, Klein declared that his paintings were now invisible - and to prove it he exhibited an empty room. 1958: Wolf Vostell Das Theater ist auf der Stra\u00dfe/The theater is on the street. The first Happening in Europe. 1960: Yves Klein's action called A Leap Into The Void, in which he attempts to fly by leaping out of a window. He stated: \"The painter has only to create one masterpiece, himself, constantly.\" 1960: The artist Stanley Brouwn declares that all the shoe shops in Amsterdam constitute an exhibition of his work. 1961: Wolf Vostell Cityrama, in Cologne - the first Happening in Germany. 1961: Robert Rauschenberg sent a telegram to the Galerie Iris Clert which read: 'This is a portrait of Iris Clert if I say so.' as his contribution to an exhibition of portraits. 1961: Piero Manzoni exhibited Artist's Shit, tins purportedly containing his own feces (although since the work would be destroyed if opened, no one has been able to say for sure). He put the tins on sale for their own weight in gold. He also sold his own breath (enclosed in balloons) as Bodies of Air, and signed people's bodies, thus declaring them to be living works of art either for all time or for specified periods. (This depended on how much they are prepared to pay). Marcel Broodthaers and Primo Levi are amongst the designated \"artworks\". 1962: Artist Barrie Bates rebrands himself as Billy Apple, erasing his original identity to continue his exploration of everyday life and commerce as art. By this stage, many of his works are fabricated by third parties. 1962: Christo's Iron Curtain work. This consists of a barricade of oil barrels in a narrow Paris street which caused a large traffic jam. The artwork was not the barricade itself but the resulting traffic jam. 1962: Yves Klein presents Immaterial Pictorial Sensitivity in various ceremonies on the banks of the Seine. He offers to sell his own \"pictorial sensitivity\" (whatever that was - he did not define it) in exchange for gold leaf. In these ceremonies the purchaser gave Klein the gold leaf in return for a certificate. Since Klein's sensitivity was immaterial, the purchaser was then required to burn the certificate whilst Klein threw half the gold leaf into the Seine. (There were seven purchasers.) 1962: Piero Manzoni created The Base of the World, thereby exhibiting the entire planet as his artwork. 1962: Alberto Greco began his Vivo Dito or Live Art series, which took place in Paris, Rome, Madrid, and Piedralaves. In each artwork, Greco called attention to the art in everyday life, thereby asserting that art was actually a process of looking and seeing. 1962: FLUXUS Internationale Festspiele Neuester Musik in Wiesbaden with George Maciunas, Wolf Vostell, Nam June Paik and others.Fluxus at 50. Stefan Fricke, Alexander Klar, Sarah Maske, Kerber Verlag, 2012, . 1963: George Brecht's collection of Event-Scores, Water Yam, is published as the first Fluxkit by George Maciunas. 1963: Festum Fluxorum Fluxus in D\u00fcsseldorf with George Maciunas, Wolf Vostell, Joseph Beuys, Dick Higgins, Nam June Paik, Ben Patterson, Emmett Williams and others. 1963: Henry Flynt's article Concept Art is published in An Anthology of Chance Operations; a collection of artworks and concepts by artists and musicians that was published by Jackson Mac Low and La Monte Young (ed.). An Anthology of Chance Operations documented the development of Dick Higgins \u2019s vision of intermedia art in the context of the ideas of John Cage , and became an early Fluxus masterpiece. Flynt's \"concept art\" devolved from his idea of \"cognitive nihilism\" and from his insights about the vulnerabilities of logic and mathematics. 1964: Yoko Ono publishes Grapefruit: A Book of Instructions and Drawings , an example of heuristic art, or a series of instructions for how to obtain an aesthetic experience. 1965: Art & Language founder Michael Baldwin \u2019s Mirror Piece. Instead of paintings, the work shows a variable number of mirrors that challenge both the visitor and Clement Greenberg \u2019s theory. 1965: A complex conceptual art piece by John Latham called Still and Chew. He invites art students to protest against the values of Clement Greenberg's Art and Culture, much praised and taught at Saint Martin's School of Art in London, where Latham taught part-time. Pages of Greenberg's book (borrowed from the college library) are chewed by the students, dissolved in acid and the resulting solution returned to the library bottled and labelled. Latham was then fired from his part-time position. 1965: with Show V, immaterial sculpture the Dutch artist Marinus Boezem introduced conceptual art in the Netherlands. In the show , various air doors are placed where people can walk through them. People have the sensory experience of warmth, air. Three invisible air doors, which arise as currents of cold and warm are blown into the room, are indicated in the space with bundles of arrows and lines. The articulation of the space that arises is the result of invisible processes which influence the conduct of persons in that space, and who are included in the system as co-performers. Joseph Kosuth dates the concept of One and Three Chairs to the year 1965. The presentation of the work consists of a chair, its photo , and an enlargement of a definition of the word \"chair .\" Kosuth chose the definition from a dictionary. Four versions with different definitions are known. 1966: Conceived in 1966 The Air Conditioning Show of Art & Language is published as an article in 1967 in the November issue of Arts Magazine. 1966: N.E. Thing Co. Ltd. (Iain and Ingrid Baxter of Vancouver) exhibit Bagged Place, the contents of a four-room apartment wrapped in plastic bags. The same year they registered as a corporation and subsequently organized their practice along corporate models, one of the first international examples of the \"aesthetic of administration .\" 1967: Mel Ramsden \u2019s first 100\\% Abstract Paintings. The painting shows a list of chemical components that constitutes the substance of the painting. 1967: Sol LeWitt's Paragraphs on Conceptual Art were published by the American art journal Artforum. The Paragraphs mark the progression from Minimal to Conceptual Art. 1968: Michael Baldwin, Terry Atkinson, David Bainbridge and Harold Hurrell found Art & Language. 1968: Lawrence Weiner relinquishes the physical making of his work and formulates his \"Declaration of Intent ,\" one of the most important conceptual art statements following LeWitt's \"Paragraphs on Conceptual Art.\" The declaration, which underscores his subsequent practice , reads: \"1. The artist may construct the piece. 2. The piece may be fabricated. 3. The piece need not be built. Each being equal and consistent with the intent of the artist the decision as to condition rests with the receiver upon the occasion of receivership.\" Friedrich Heubach launches the magazine Interfunktionen in Cologne, Germany, a publication that excelled in artists' projects. It originally showed a Fluxus influence, but later moved toward conceptual art. 1969: The first generation of New York alternative exhibition spaces are established, including Billy Apple's APPLE, Robert Newman's Gain Ground, where Vito Acconci produced many important early works, and 112 Greene Street. 1969: Robert Barry's Telepathic Piece at Simon Fraser University, Vancouver, of which he said \" During the exhibition I will try to communicate telepathically a work of art, the nature of which is a series of thoughts that are not applicable to language or image .\" 1969: The first issue of Art-Language : The Journal of conceptual art is published in May , edited by Terry Atkinson, David Bainbridge, Michael Baldwin and Harold Hurrell. Art & Language are the editors of this first number, and by the second number Joseph Kosuth joins and serves as American editor until 1972. 1969: Vito Acconci creates Following Piece, in which he follows randomly selected members of the public until they disappear into a private space. The piece is presented as photographs. The English journal Studio International publishes Joseph Kosuth\u00b4s article \"Art after Philosophy\" in three parts (October\u2013December). It became the most discussed article on conceptual art . 1970: Ian Burn, Mel Ramsden and Charles Harrison join Art & Language. 1970: Painter John Baldessari exhibits a film in which he sets a series of erudite statements by Sol LeWitt on the subject of conceptual art to popular tunes like \"Camptown Races\" and \"Some Enchanted Evening\". 1970: Douglas Huebler exhibits a series of photographs taken every two minutes while driving along a road for 24 minutes. 1970: Douglas Huebler asks museum visitors to write down 'one authentic secret'. The resulting 1800 documents are compiled into a book which, by some accounts, makes for very repetitive reading as most secrets are similar. 1971: Hans Haacke's Real Time Social System. This piece of systems art detailed the real estate holdings of the third largest landowners in New York City. The properties , mostly in Harlem and the Lower East Side, were decrepit and poorly maintained, and represented the largest concentration of real estate in those areas under the control of a single group. The captions gave various financial details about the buildings, including recent sales between companies owned or controlled by the same family. The Guggenheim museum cancelled the exhibition, stating that the overt political implications of the work constituted \"an alien substance that had entered the art museum organism\". There is no evidence to suggest that the trustees of the Guggenheim were linked financially to the family which was the subject of the work. 1972: The Art & Language Institute exhibits Index 01 at the Documenta 5, an installation indexing text-works by Art & Language and text-works from Art-Language. 1972: Antonio Caro exhibits in the National Art Salon (Museo Nacional, Bogot\u00e1, Colombia) his work: Aquinocabeelarte (Art does not fit here), where each of the letters is a separate poster, and under each letter is written the name of some victim of state repression. 1972: Fred Forest buys an area of blank space in the newspaper Le Monde and invites readers to fill it with their own works of art. General Idea launch File magazine in Toronto. The magazine functioned as something of an extended, collaborative artwork. 1973: Jacek Tylicki lays out blank canvases or paper sheets in the natural environment for nature to create art. 1974: Cadillac Ranch near Amarillo, Texas. 1975\u201376: Three issues of the journal The Fox were published by Art & Language in New York . The editor was Joseph Kosuth. The Fox became an important platform for the American members of Art & Language. Karl Beveridge, Ian Burn, Sarah Charlesworth, Michael Corris, Joseph Kosuth, Andrew Menard, Mel Ramsden and Terry Smith wrote articles which thematized the context of contemporary art. These articles exemplify the development of an institutional critique within the inner circle of conceptual art . The criticism of the art world integrates social, political and economic reasons. 1975-77 Orshi Drozdik's Individual Mythology performance, photography and offsetprint series and her theory of ImageBank in Budapest. 1976: facing internal problems, members of Art & Language separate. The destiny of the name Art & Language remains in Michael Baldwin, Mel Ramsden and Charles Harrison hands. 1977: Walter De Maria's Vertical Earth Kilometer in Kassel, Germany. This was a one kilometer brass rod which was sunk into the earth so that nothing remained visible except a few centimeters. Despite its size, therefore, this work exists mostly in the viewer's mind. 1982: The opera Victorine by Art & Language was to be performed in the city of Kassel for documenta 7 and shown alongside Art & Language Studio at 3 Wesley Place Painted by Actors, but the performance was cancelled. 1986: Art & Language are nominated for the Turner Prize. 1989: Christopher Williams' Angola to Vietnam is first exhibited. The work consists of a series of black-and-white photographs of glass botanical specimens from the Botanical Museum at Harvard University, chosen according to a list of the thirty-six countries in which political disappearances were known to have taken place during the year 1985. 1990: Ashley Bickerton and Ronald Jones included in \"Mind Over Matter: Concept and Object\" exhibition of \u201dthird generation Conceptual artists\u201d at the Whitney Museum of American Art. 1991: Ronald Jones exhibits objects and text, art, history and science rooted in grim political reality at Metro Pictures Gallery.Smith, Roberta. \"Art in review: Ronald Jones Metro Pictures\", The New York Times, 27 December 1991. Retrieved 8 July 2008. 1991: Charles Saatchi funds Damien Hirst and the next year in the Saatchi Gallery exhibits his The Physical Impossibility of Death in the Mind of Someone Living, a shark in formaldehyde in a vitrine. 1992: Maurizio Bolognini starts to \"seal\" his Programmed Machines: hundreds of computers are programmed and left to run ad infinitum to generate inexhaustible flows of random images which nobody would see. %DIFDELCMD < %DIFDELCMD < %%% 1993: Matthieu Laurette established his artistic birth certificate by taking part in a French TV game called Tournez man\u00e8ge (The Dating Game) where the female presenter asked him who he was, to which he replied: 'A multimedia artist'. Laurette had sent out invitations to an art audience to view the show on TV from their homes , turning his staging of the artist into a performed reality. 1993: Vanessa Beecroft holds her first performance in Milan, Italy, using models to act as a second audience to the display of her diary of food. 1999: Tracey Emin is nominated for the Turner Prize. Part of her exhibit is My Bed, her dishevelled bed, surrounded by detritus such as condoms, blood-stained knickers, bottles and her bedroom slippers. 2001: Martin Creed wins the Turner Prize for Work No. 227: The lights going on and off, an empty room in which the lights go on and off. 2004: Andrea Fraser's video Untitled, a document of her sexual encounter in a hotel room with a collector (the collector having agreed to help finance the technical costs for enacting and filming the encounter) is exhibited at the Friedrich Petzel Gallery. It is accompanied by her 1993 work Don't Postpone Joy, or Collecting Can Be Fun, a 27-page transcript of an interview with a collector in which the majority of the text has been deleted. 2005: Simon Starling wins the Turner Prize for Shedboatshed, a wooden shed which he had turned into a boat, floated down the Rhine and turned back into a shed again. 2005: Maurizio Nannucci creates the large neon installation All Art Has Been Contemporary on the facade of Altes Museum in Berlin. 2014: Olaf Nicolai creates the Memorial for the Victims of Nazi Military Justice on Vienna's Ballhausplatz after winning an international competition. The inscription on top of the three-step sculpture features a poem by Scottish poet Ian Hamilton Finlay (1924\u20132006) with just two words: all alone.", "edit_actions": [{"type": "D", "before": ",", "after": null, "start_char_pos": 4225, "end_char_pos": 4226}, {"type": "A", "before": null, "after": "\u2019s", "start_char_pos": 4939, "end_char_pos": 4939}, {"type": "A", "before": null, "after": ",", "start_char_pos": 5006, "end_char_pos": 5006}, {"type": "R", "before": ". An example of Heuristic", "after": ", an example of heuristic", "start_char_pos": 5263, "end_char_pos": 5288}, {"type": "A", "before": null, "after": "\u2019s", "start_char_pos": 5410, "end_char_pos": 5410}, {"type": "R", "before": "is showing", "after": "shows", "start_char_pos": 5456, "end_char_pos": 5466}, {"type": "A", "before": null, "after": "\u2019s", "start_char_pos": 5550, "end_char_pos": 5550}, {"type": "R", "before": "Conceptual Art", "after": "conceptual art", "start_char_pos": 6141, "end_char_pos": 6155}, {"type": "A", "before": null, "after": ",", "start_char_pos": 6188, "end_char_pos": 6188}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 6489, "end_char_pos": 6494}, {"type": "R", "before": "in", "after": "to", "start_char_pos": 6702, "end_char_pos": 6704}, {"type": "R", "before": "and a blow up", "after": ", and an enlargement", "start_char_pos": 6780, "end_char_pos": 6793}, {"type": "R", "before": "\".Kosuth has chosen", "after": ".\" Kosuth chose", "start_char_pos": 6829, "end_char_pos": 6848}, {"type": "R", "before": "exhibited Bagged Place", "after": "exhibit Bagged Place,", "start_char_pos": 7142, "end_char_pos": 7164}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 7417, "end_char_pos": 7419}, {"type": "A", "before": null, "after": "\u2019s", "start_char_pos": 7438, "end_char_pos": 7438}, {"type": "R", "before": "constitute", "after": "constitutes", "start_char_pos": 7525, "end_char_pos": 7535}, {"type": "R", "before": "\",", "after": ",\"", "start_char_pos": 7942, "end_char_pos": 7944}, {"type": "A", "before": null, "after": ",", "start_char_pos": 8107, "end_char_pos": 8107}, {"type": "R", "before": "Conceptual", "after": "conceptual", "start_char_pos": 8561, "end_char_pos": 8571}, {"type": "R", "before": "'", "after": "\"", "start_char_pos": 8896, "end_char_pos": 8897}, {"type": "R", "before": "'.", "after": ".\"", "start_char_pos": 9065, "end_char_pos": 9067}, {"type": "A", "before": null, "after": ":", "start_char_pos": 9106, "end_char_pos": 9106}, {"type": "R", "before": ". It is subtitled as The Journal of conceptual art and", "after": ",", "start_char_pos": 9157, "end_char_pos": 9211}, {"type": "R", "before": "and until 1972, Joseph Kosuth will join and become the American editor .", "after": "Joseph Kosuth joins and serves as American editor until 1972.", "start_char_pos": 9370, "end_char_pos": 9442}, {"type": "R", "before": "published", "after": "publishes", "start_char_pos": 9670, "end_char_pos": 9679}, {"type": "R", "before": "\"Conceptual Art\"", "after": "conceptual art", "start_char_pos": 9802, "end_char_pos": 9818}, {"type": "D", "before": "which were", "after": null, "start_char_pos": 10156, "end_char_pos": 10166}, {"type": "R", "before": "whilst", "after": "while", "start_char_pos": 10191, "end_char_pos": 10197}, {"type": "R", "before": "were", "after": ",", "start_char_pos": 10628, "end_char_pos": 10632}, {"type": "D", "before": "the", "after": null, "start_char_pos": 12062, "end_char_pos": 12065}, {"type": "D", "before": "by", "after": null, "start_char_pos": 12221, "end_char_pos": 12223}, {"type": "R", "before": "Conceptual Art", "after": "conceptual art", "start_char_pos": 12619, "end_char_pos": 12633}, {"type": "R", "before": "remaining", "after": "remains", "start_char_pos": 12959, "end_char_pos": 12968}, {"type": "R", "before": "home", "after": "homes", "start_char_pos": 15110, "end_char_pos": 15114}], "sents_char_pos": [0, 443, 931, 1005, 1192, 1356, 1379, 1486, 1634, 1714, 1745, 1856, 2054, 2128, 2307, 2488, 2542, 2731, 2785, 2858, 3013, 3079, 3114, 3217, 3289, 3397, 3517, 3605, 3757, 3892, 4010, 4152, 4283, 4296, 4478, 4643, 4734, 4861, 5046, 5189, 5264, 5364, 5424, 5558, 5633, 5825, 6006, 6057, 6175, 6253, 6304, 6458, 6645, 6719, 6882, 7077, 7098, 7227, 7470, 7566, 7667, 7832, 8047, 8118, 8154, 8186, 8218, 8369, 8496, 8576, 8801, 9158, 9291, 9589, 9628, 9761, 9890, 10100, 10234, 10315, 10457, 10502, 10612, 10820, 10966, 11147, 11288, 11449, 11716, 11848, 11894, 11970, 12087, 12130, 12225, 12255, 12336, 12521, 12635, 12717, 12851, 12919, 13028, 13097, 13221, 13296, 13512, 13569, 13635, 13922, 14229, 14244, 14328, 14551, 15022, 15176, 15322, 15375, 15525, 15919, 16106, 16272, 16403, 16554]}
+{"doc_id": "1805371", "revision_depth": "2", "before_revision": "History The National Day of Prayer shares common roots with the celebration of Thanksgiving; both were national proclamations establishing a day of prayer. In the New England Colonies under British rule, traditional observances in late fall called for prayer and thanksgiving, while observances in the spring or summer called for prayer and fasting. The fall observance was established by President Abraham Lincoln as the official Thanksgiving holiday in 1863. The spring observance was established by President Harry S. Truman in 1952 as the National Day of Prayer. Residents of Kentwood, Louisiana, gather outside the Town Hall alongside LA 38 to observe 2015's National Day of Prayer . Friction in 1768\u20131776 between the American colonists and England spurred some American cities and colonies to proclaim days of prayer. For instance, Boston declared a day of fasting and prayer in September 1768, as a protest against a British plan to station troops in the city. The Colony of Virginia's House of Burgesses established a day of fasting and prayer to take place on Wednesday, June 1, 1774, to protest the Boston Port Act, such that the people of Virginia would assemble for prayer led by clergymen. Thomas Jefferson wrote that \"the effect of the day through the whole colony was like a shock of electricity\", moving the Virginians to choose delegates to establish self-rule. Jefferson is quoted by Derek H. Davis in Religion and the Continental Congress, 1774\u20131789, page 84. The Provinces of South Carolina, Maryland and Georgia all observed official days of fasting and prayer during 1774\u20131775. The observance of a day of fasting and prayer was brought to all of the colonists by the Continental Congress in 1775. Congress issued a proclamation recommending \"a day of publick humiliation, fasting, and prayer\" be observed by the \"English Colonies\" on Thursday, July 20, 1775, \"and to bless our rightful sovereign, King George the Third...\" \"Proclamation for a day of Fasting and Prayer\" The text, written by John Witherspoon and John Hancock, instructed the colonists to pray for a resumption of \"the just rights and privileges of the Colonies\" in \"civil and religious\" matters.Davis 2000, p. 85. A proclamation to this end was sent to every town in the colonies. John Adams wrote that the popular response was gratifying, that the special day was more widely observed than the practice of going to church on Sunday.Davis 2000, p. 86. After this success, Congress determined to call for a day of fasting and prayer each spring, and a day of thanksgiving and praise each fall. After James Madison, none of the next eleven presidents issued prayer proclamations. Thus, there was a period of 47 years, from 1815 to 1862, with no presidential prayer proclamations. In [ ] ] January\u2013February 1952 during the Korean War, the desirability of a united national prayer was stated by Reverend Billy Graham, who said, \"What a thrilling, glorious thing it would be to see the leaders of our country today kneeling before Almighty God in prayer. What a thrill would sweep this country. What renewed hope and courage would grip the Americans at this hour of peril.\" Representative Percy Priest from Tennessee observed that Graham had issued a challenge for a national day of prayer. Members of the House and Senate introduced a joint resolution for an annual National Day of Prayer, \"on which the people of the United States may turn to God in prayer and meditation at churches, in groups, and as individuals.\" On April 17, 1952, President Harry S. Truman signed a bill proclaiming a National Day of Prayer must be declared by each subsequent president at an appropriate date of his choice. In 1982 a conservative evangelical Christian organization called the \"National Prayer Committee\" was formed to coordinate and implement a fixed annual day of prayer for the purpose of organizing evangelical Christian prayer events with local, state, and federal government entities. The Thanks-Giving Foundation also collaborated in this effort. In his 1983 declaration, Ronald Reagan said, \"From General Washington's struggle at Valley Forge to the present, this Nation has fervently sought and received divine guidance as it pursued the course of history. This occasion provides our Nation with an opportunity to further recognize the source of our blessings, and to seek His help for the challenges we face today and in the future.\" 175px|Sailors bow their heads in prayer during the National Day of Prayer. May 3, 2007. In 1988, the law was amended so that the National Day of Prayer would be held on the first Thursday of May. Two stated intentions of the National Day of Prayer were that it would be a day when adherents of all great religions could unite in prayer and that it may one day bring renewed respect for God to all the peoples of the world. Republican George W. Bush administration (2001\u20132009) made his first presidential act be the announcement of a National Day of Prayer, and he held events at the White House in each year of his presidency. Democrat Barack Obama (2009\u20132017) did not hold any public events at the White House,National Day of Prayer Task Force Knocks Obama White House, U.S. News & World Report, April 15, 2010, Dan Gilgof though he issued presidential proclamations regularly each year. On May 7, 2020, due to the COVID-19 pandemic, many virtual prayer events were planned. President Trump issued an official proclamation. A national event was planned for the evening, to be co-hosted by the grandson of evangelist Billy Graham.", "after_revision": "History Colonial Public Prayer Days The National Day of Prayer shares common roots with the celebration of Thanksgiving; both were national proclamations establishing a day of public prayer. In the New England Colonies under British rule, traditional observances in late fall called for prayer and thanksgiving, while observances in the spring or summer called for prayer and fasting. The fall observance was established by President Abraham Lincoln as the official Thanksgiving holiday in 1863. The spring observance was established by President Harry S. Truman in 1952 as the National Day of Prayer. American Revoluntary War Public Prayer Days Friction in 1768\u20131776 between the American colonists and England spurred some American cities and colonies to proclaim days of prayer. For instance, Boston declared a day of fasting and prayer in September 1768, as a protest against a British plan to station troops in the city. The Colony of Virginia's House of Burgesses established a day of fasting and prayer to take place on Wednesday, June 1, 1774, to protest the Boston Port Act, such that the people of Virginia would assemble for prayer led by clergymen. Thomas Jefferson wrote that \"the effect of the day through the whole colony was like a shock of electricity\", moving the Virginians to choose delegates to establish self-rule. Jefferson is quoted by Derek H. Davis in Religion and the Continental Congress, 1774\u20131789, page 84. The Provinces of South Carolina, Maryland and Georgia all observed official days of fasting and prayer during 1774\u20131775. The observance of a day of fasting and public prayer was brought to all of the colonists by the Continental Congress in 1775. Congress issued a proclamation recommending \"a day of publick humiliation, fasting, and prayer\" be observed by the \"English Colonies\" on Thursday, July 20, 1775, \"and to bless our rightful sovereign, King George the Third...\" \"Proclamation for a day of Fasting and Prayer\" The text, written by John Witherspoon and John Hancock, instructed the colonists to pray for a resumption of \"the just rights and privileges of the Colonies\" in \"civil and religious\" matters.Davis 2000, p. 85. A proclamation to this end was sent to every town in the colonies. John Adams wrote that the popular response was gratifying, that the special day was more widely observed than the practice of going to church on Sunday.Davis 2000, p. 86. After this success, Congress determined to call for a day of fasting and prayer each spring, and a day of thanksgiving and praise each fall. After James Madison, none of the next eleven presidents issued public prayer proclamations. Thus, there was a period of 47 years, from 1815 to 1862, with no presidential public prayer proclamations. Confederate States of America Confederate States of America President Jefferson Davis called for the first national day of fasting and public prayer for the Confederate States of America on June 13, URL \"A Day of Fasting and Prayer, June 13, 1861 at St. George\u2019s\" The June 7, 1862, edition of Harper's Weekly featured a political cartoon depicting Davis praying in public on a street corner in Richmond, standing next to a poster declaring \"A Day of Fasting[and Prayer.\" with Davis clutching prayer beads, 'though he has Satan-like horns on his head\" and hooves for URL \"Scene in Richmond, VA.\" Confederate States of America President Jefferson Davis issued a proclamation on February 27, 1863 and published within the March 4, 1863 edition of The Richmond Enquirer, \"setting apart Friday, the 27th day of March, as a day of fasting, humiliation and public] prayer\" and inviting \"the people of the said States Confederate States of America] to repair, on that day, to their usual places of public worship, there to join in prayer to Almighty God that he will continue his merciful protection over our cause; that he will scatter our enemies and set at nought their evil designs, and that he will graciously restore to our beloved country the blessings of peace and URL \"Which day did Jefferson Davis declare to be for fasting, humiliation, and prayer?\" Throughout the American Civil War, Confederate President Jefferson Davis officially declared a total of ten such days of fasting and days of public URL \"A Day of Fasting and Prayer, June 13, 1861 at St. George\u2019s\" Billy Graham Residents of Kentwood, Louisiana, gather outside in public prayer at the Town Hall alongside LA 38 to observe the 2015 National Day of Prayer.in January\u2013February 1952 during the Korean War, the desirability of a united national prayer was stated by Reverend Billy Graham, who said, \"What a thrilling, glorious thing it would be to see the leaders of our country today kneeling before Almighty God in prayer. What a thrill would sweep this country. What renewed hope and courage would grip the Americans at this hour of peril.\" Representative Percy Priest from Tennessee observed that Graham had issued a challenge for a national day of prayer. Members of the House and Senate introduced a joint resolution for an annual National Day of Prayer, \"on which the people of the United States may turn to God in prayer and meditation at churches, in groups, and as individuals.\" On April 17, 1952, President Harry S. Truman signed a bill proclaiming a National Day of Prayer must be declared by each subsequent president at an appropriate date of his choice. Evangelical National Prayer Committee In 1982 a conservative evangelical Christian organization called the \"National Prayer Committee\" was formed to coordinate and implement a fixed annual day of public prayer for the purpose of organizing evangelical Christian prayer events with local, state, and federal government entities. The Thanks-Giving Foundation also collaborated in this effort. In his 1983 declaration, Ronald Reagan said, \"From General Washington's struggle at Valley Forge to the present, this Nation has fervently sought and received divine guidance as it pursued the course of history. This occasion provides our Nation with an opportunity to further recognize the source of our blessings, and to seek His help for the challenges we face today and in the future.\" 175px|Sailors bow their heads in prayer during the National Day of Prayer. May 3, 2007. In 1988, the law was amended so that the National Day of Prayer would be held on the first Thursday of May. Two stated intentions of the National Day of Prayer were that it would be a day when adherents of all great religions could unite in public prayer and that it may one day bring renewed respect for God to all the peoples of the world. Republican George W. Bush administration (2001\u20132009) made his first presidential act be the announcement of a National Day of Prayer, and he held public prayer events at the White House in each year of his presidency. Democrat Barack Obama (2009\u20132017) did not hold any public prayer events at the White House,National Day of Prayer Task Force Knocks Obama White House, U.S. News & World Report, April 15, 2010, Dan Gilgof though he issued presidential proclamations regularly each year. On May 7, 2020, due to the COVID-19 pandemic, many virtual prayer events were planned. President Trump issued an official proclamation. A national event was planned for the evening, to be co-hosted by the grandson of the late evangelist Billy Graham.", "edit_actions": [{"type": "A", "before": null, "after": "Colonial Public Prayer Days", "start_char_pos": 8, "end_char_pos": 8}, {"type": "A", "before": null, "after": "public", "start_char_pos": 149, "end_char_pos": 149}, {"type": "R", "before": "Residents of Kentwood, Louisiana, gather outside the Town Hall alongside LA 38 to observe 2015's National Day of Prayer .", "after": "American Revoluntary War Public Prayer Days", "start_char_pos": 569, "end_char_pos": 690}, {"type": "A", "before": null, "after": "public", "start_char_pos": 1641, "end_char_pos": 1641}, {"type": "A", "before": null, "after": "public", "start_char_pos": 2647, "end_char_pos": 2647}, {"type": "A", "before": null, "after": "public", "start_char_pos": 2748, "end_char_pos": 2748}, {"type": "R", "before": "In", "after": "Confederate States of America", "start_char_pos": 2771, "end_char_pos": 2773}, {"type": "A", "before": null, "after": "Confederate States of America President Jefferson Davis called for the first national day of fasting and public prayer for the Confederate States of America on June 13, URL \"A Day of Fasting and Prayer, June 13, 1861 at St. George\u2019s\" The June 7, 1862, edition of Harper's Weekly featured a political cartoon depicting Davis praying in public on a street corner in Richmond, standing next to a poster declaring \"A Day of Fasting", "start_char_pos": 2774, "end_char_pos": 2774}, {"type": "A", "before": null, "after": "and", "start_char_pos": 2775, "end_char_pos": 2775}, {"type": "A", "before": null, "after": "Prayer.\" with Davis clutching prayer beads, 'though he has Satan-like horns on his head\" and hooves for URL \"Scene in Richmond, VA.\"", "start_char_pos": 2776, "end_char_pos": 2776}, {"type": "A", "before": null, "after": "Confederate States of America President Jefferson Davis issued a proclamation on February 27, 1863 and published within the March 4, 1863 edition of The Richmond Enquirer, \"setting apart Friday, the 27th day of March, as a day of fasting, humiliation and", "start_char_pos": 2777, "end_char_pos": 2777}, {"type": "A", "before": null, "after": "public", "start_char_pos": 2778, "end_char_pos": 2778}, {"type": "A", "before": null, "after": "prayer\" and inviting \"the people of the said States", "start_char_pos": 2780, "end_char_pos": 2780}, {"type": "A", "before": null, "after": "Confederate States of America", "start_char_pos": 2781, "end_char_pos": 2781}, {"type": "A", "before": null, "after": "to repair, on that day, to their usual places of public worship, there to join in prayer to Almighty God that he will continue his merciful protection over our cause; that he will scatter our enemies and set at nought their evil designs, and that he will graciously restore to our beloved country the blessings of peace and URL \"Which day did Jefferson Davis declare to be for fasting, humiliation, and prayer?\" Throughout the American Civil War, Confederate President Jefferson Davis officially declared a total of ten such days of fasting and days of public URL \"A Day of Fasting and Prayer, June 13, 1861 at St. George\u2019s\"", "start_char_pos": 2783, "end_char_pos": 2783}, {"type": "A", "before": null, "after": "Billy Graham Residents of Kentwood, Louisiana, gather outside in public prayer at the Town Hall alongside LA 38 to observe the 2015 National Day of Prayer.in", "start_char_pos": 2784, "end_char_pos": 2784}, {"type": "A", "before": null, "after": "Evangelical National Prayer Committee", "start_char_pos": 3692, "end_char_pos": 3692}, {"type": "A", "before": null, "after": "public", "start_char_pos": 3851, "end_char_pos": 3851}, {"type": "A", "before": null, "after": "public", "start_char_pos": 4759, "end_char_pos": 4759}, {"type": "A", "before": null, "after": "public prayer", "start_char_pos": 5000, "end_char_pos": 5000}, {"type": "A", "before": null, "after": "prayer", "start_char_pos": 5117, "end_char_pos": 5117}, {"type": "A", "before": null, "after": "the late", "start_char_pos": 5539, "end_char_pos": 5539}], "sents_char_pos": [0, 93, 157, 351, 462, 568, 825, 969, 1204, 1380, 1480, 1601, 1721, 2186, 2271, 2424, 2583, 2669, 2770, 3047, 3087, 3166, 3283, 3511, 3691, 3976, 4039, 4251, 4504, 4517, 4625, 4853, 5058, 5321, 5408, 5457]}
+{"doc_id": "18308546", "revision_depth": "2", "before_revision": "References Allison, M. A. (2007). Primary attention groups: A conceptual approach to the communicative ecology of individual community in the information age. The Electronic Journal of Communication, 17(1-2). Altheide, D. L. (1994). An ecology of communication: Toward a mapping of the effective environment. The Sociological Quarterly, 35(4), 665-683. Altheide, D. L. (1995). An ecology of communication: Cultural formats of control. New York: Aldine de Gruyter. Ball-Rokeach, S. J., Kim, Y. C., & Matei, S. A. (2001). Storytelling neighborhood: Paths to belonging in diverse urban environments. Communication Research, 28(4), 392-428. Barnlund, D. (1979). A transactional model of communication In C. D. Mortensen (Ed.), Basic readings in communication theory (2nd ed., pp. 47\u201357). New York: Harper and Row. Beier, C. (2001). Creating community: Feasting among the Nantis of Peruvian Amazonia. Unpublished Master's Thesis, University of Texas, Austin. Berry, M., & Hamilton, M. (2006). Mobile computing, visual diaries, learning and communication: Changes to the communicative ecology of design students through mobile computing. Paper presented at the Eighth Australian Computing Education Conference. Boase, J. (2008). Personal networks and the personal communication system. Information, Communication & Society, 11(4), 490-508. Button, A. J., & Partridge, H. L. (2007). Community networks today: Analysing new media for local social networking and community engagement. Paper presented at the Community Informatics Research Network Conference. Dourish, P. (2004). What we talk about when we talk about context. Personal and Ubiquitous Computing, 8, 19-30. Erickson, T. (2000). Making sense of computer-mediated communication(CMC): Conversations as genres, CMC systems as genre ecologies. Paper presented at the 33rd Hawaii International Conference on Systems Sciences. Foth, M. (2006). Network action research. Action Research, 4(2), 205-226. Foth, M., & Hearn, G. (2007). Networked individualism of urban residents: Discovering the communicative ecology in inner-city apartment buildings. Information, Communication & Society, 10(5), 749-772. Greenbaum, J. M., & Kyng, M. (Eds.). (1991). Design at work: Cooperative design of computer systems. Hillsdale, NJ: Lawrence Erlbaum. Gumperz, J. (1999). On interactional sociolinguistic method. In C. Roberts & S. Sarangi (Eds.), Talk, work and institutional order: Discourse in medical, mediation and management settings (pp. 453\u2013471). Berlin: Mouton de Gruyter. Hearn, G., & Foth, M. (2007). Communicative ecologies: Editorial preface. The Electronic Journal of Communication, 17(1-2). Horst, H., & Miller, D. (2006). The cell phone: An anthropology of communication. Oxford: Berg. Hymes, D. (1974). Foundations in sociolinguistics: an ethnographic approach. Philadelphia: University of Pennsylvania Press. Latour, B. (2005). Reassembling the social: An introduction to actor-network theory. Oxford: Oxford University Press. McArthur, T. (2005). Chinese, English, Spanish - and the rest: How do the world's very large languages operate within its 'communicative ecology'? English Today, 21(3), 55-61. McLuhan, M. (1962). The Gutenberg galaxy: The making of typographic man. London: Routledge & Kegan Paul. Miller, D. (2007). The unpredictable mobile phone. BT Technology Journal, 25(3-4), 321-328. Miller, F. Q. (2014). Knowledge ecosystems of early career academics: A grounded theory of experiencing information use for learning in developmental networks. PhD thesis, Queensland University of Technology. URL Nair, S., Jennaway, M., & Skuse, A. (2006). Local information networks: Social and technological considerations. New Delhi: UNESCO. Nardi, B. (Ed.). (1996). Context and consciousness: activity theory and human-computer interaction. Cambridge, MA: MIT Press. Peeples, J., & Mitchell, B. (2007). \"No mobs-no confusion-no tumult\": Networking civil disobedience. The Electronic Journal of Communication, 17(1-2). Powell, A. (2007). An ecology of public internet access: Exploring contextual internet access in an urban community. The Electronic Journal of Communication, 17(1-2). Pringle, I., Bajracharya, U., & Bajracharya, A. (2004). Innovating multimedia to increase accessibility in the hills of Nepal: The Tansen Community Multimedia Center (CMC). Mountain Research and Development, 24(4), 292-297. Rangaswamy, N. (2007). ICT for development and commerce: A case study of internet cafes in India. Paper presented at the 9th International Conference on Social Implications of Computers in Developing Countries. Reason, P., & Bradbury, H. (Eds.). (2001). Handbook of action research: Participative inquiry and practice. London: Sage. Roberts, C., & Sarangi, S. (2005). Theme-oriented discourse analysis of medical encounters. Medical Education, 39, 632-640. Schuler, D., & Namioka, A. (Eds.). (1993). Participatory design: Principles and practices. Hillsdale, NJ: Lawrence Erlbaum. Sharma, S. (2005). eNRICH: Archiving and accessing local information. International Journal of Education and Development using Information and Communication Technology, 2(1), 33-48.< cite id=Shepherd2007 > Shepherd, C., Arnold, M., Bellamy, C., & Gibbs, M. (2007). The material ecologies of domestic ICTs. The Electronic Journal of Communication, 17(1-2). Skuse, A., & Cousins, T. (2007). Spaces of resistance: Informal settlement, communication and community organisation in a Cape Town township. Urban Studies, 44(5), 979-995. Skuse, A., & Cousins, T. (2008). Getting connected: the social dynamics of urban telecommunications access and use in Khayelitsha, Cape Town. New Media & Society, 10(9), 9-26. Skuse, A., Fildes, J., Tacchi, J., Martin, K., & Baulch, E. (2007).Poverty and digital inclusion: Preliminary findings of Finding a Voice project. New Delhi: UNESCO. Slater, D., & Kwami, J. (2005). Embeddedness and escape: Internet and mobile use as poverty reduction strategies in Ghana. Information Society Research Group Working Paper. Slater, D., & Tacchi, J. (2004). Research: ICT innovations for poverty reduction. UNESCO. Slater, D., Tacchi, J., & Lewis, P. (2002). Ethnographic monitoring and evaluation of community multimedia centres: A study of Kothmale community radio internet project, Sri Lanka. Stebbins, R. (2007). Serious leisure: A perspective for our time. New Brunswick: Transaction Publishers. Subramanian, S. (2005). ICT learning: Is it more valuable for the young? International Journal of Education and Development using Information and Communication Technology, 2(1), 11-21. Subramanian, S., Nair, S., & Sharma, S. (2004). Local content creation and ICT for development: Some experiences. Bangkok: UNESCO. Tacchi, J. (2005a). Finding a voice: The potential of creative ICT literacy and voice in community multimedia centres in South Asia. Information Society Research Group Working Paper No. 3. Tacchi, J. (2005b). Radio and new media technologies: Making technological change socially effective and culturally empowering. Paper presented at the Radio in the World: Radio Conference 2005. Tacchi, J. (2005c). Supporting the democratic voice through community media centres in South Asia. 3CMedia: Journal of Community, Citizen's and Third Sector Media and Communication, 1, 25-35. Tacchi, J. (2006). Studying communicative ecologies: An ethnographic approach to information and communication technologies. Paper presented at the 56th Annual Conference of the International Communication Association. Tacchi, J. (2007). Ethnographic (per)versions and creative engagement through locally created content. Paper presented at the CMS Symbols - Symposia on Communication for Social Development. Tacchi, J., Hearn, G., & Ninan, A. (2004). Ethnographic action research: A method for implementing and evaluating new media technologies. In K. Prasad (Ed.), Information and communication technology: Recasting development (pp. 253\u2013274). Knoxville, TN: B.R. Publishing Corporation. Tacchi, J., Slater, D., & Hearn, G. (2003). Ethnographic action research: A user's handbook. New Delhi: UNESCO. Tacchi, J., Fildes, J., Martin, K., Kiran, MS., Baulch, E. and Skuse, A. (2007). Ethnographic action research: Training handbook. New Delhi: UNESCO. Tacchi, J., & Watkins, J. (2007). Participatory research and creative engagement with ICTs. Paper presented at the ACM Sensys Conference. Wagner, M. (2004). Communicative ecology: How the bonobos do it. International Journal of the Humanities, 2(3), 2365-2374. White, D., & Hellerich, G. (2003). Nietzsche and the communicative ecology of terror: Part 1. The European Legacy, 8(6), 717-737. Wilkin, H. A., Ball-Rokeach, S. J., Matsaganis, M. D., & Cheong, P. H. (2007). Comparing the communication ecologies of geo-ethnic communities: How people stay on top of their community. The Electronic Journal of Communication, 17(1-2). Yates, J., Orlikowski, W. J., & Woerner, S. L. (2003). Virtual organizing: Using threads to coordinate distributed work. Paper presented at the Hawaii International Conference on System Sciences.", "after_revision": "References Allison, M. A. (2007). Primary attention groups: A conceptual approach to the communicative ecology of individual community in the information age. The Electronic Journal of Communication, 17(1-2). Altheide, D. L. (1994). An ecology of communication: Toward a mapping of the effective environment. The Sociological Quarterly, 35(4), 665-683. Altheide, D. L. (1995). An ecology of communication: Cultural formats of control. New York: Aldine de Gruyter. Ball-Rokeach, S. J., Kim, Y. C., & Matei, S. A. (2001). Storytelling neighborhood: Paths to belonging in diverse urban environments. Communication Research, 28(4), 392-428. Barnlund, D. (1979). A transactional model of communication In C. D. Mortensen (Ed.), Basic readings in communication theory (2nd ed., pp. 47\u201357). New York: Harper and Row. Beier, C. (2001). Creating community: Feasting among the Nantis of Peruvian Amazonia. Unpublished Master's Thesis, University of Texas, Austin. Berry, M., & Hamilton, M. (2006). Mobile computing, visual diaries, learning and communication: Changes to the communicative ecology of design students through mobile computing. Paper presented at the Eighth Australian Computing Education Conference. Boase, J. (2008). Personal networks and the personal communication system. Information, Communication & Society, 11(4), 490-508. Button, A. J., & Partridge, H. L. (2007). Community networks today: Analysing new media for local social networking and community engagement. Paper presented at the Community Informatics Research Network Conference. Dourish, P. (2004). What we talk about when we talk about context. Personal and Ubiquitous Computing, 8, 19-30. Erickson, T. (2000). Making sense of computer-mediated communication(CMC): Conversations as genres, CMC systems as genre ecologies. Paper presented at the 33rd Hawaii International Conference on Systems Sciences. Foth, M. (2006). Network action research. Action Research, 4(2), 205-226. Foth, M., & Hearn, G. (2007). Networked individualism of urban residents: Discovering the communicative ecology in inner-city apartment buildings. Information, Communication & Society, 10(5), 749-772. Greenbaum, J. M., & Kyng, M. (Eds.). (1991). Design at work: Cooperative design of computer systems. Hillsdale, NJ: Lawrence Erlbaum. Gumperz, J. (1999). On interactional sociolinguistic method. In C. Roberts & S. Sarangi (Eds.), Talk, work and institutional order: Discourse in medical, mediation and management settings (pp. 453\u2013471). Berlin: Mouton de Gruyter. Hearn, G., & Foth, M. (2007). Communicative ecologies: Editorial preface. The Electronic Journal of Communication, 17(1-2). Horst, H., & Miller, D. (2006). The cell phone: An anthropology of communication. Oxford: Berg. Hymes, D. (1974). Foundations in sociolinguistics: an ethnographic approach. Philadelphia: University of Pennsylvania Press. Latour, B. (2005). Reassembling the social: An introduction to actor-network theory. Oxford: Oxford University Press. McArthur, T. (2005). Chinese, English, Spanish - and the rest: How do the world's very large languages operate within its 'communicative ecology'? English Today, 21(3), 55-61. McLuhan, M. (1962). The Gutenberg galaxy: The making of typographic man. London: Routledge & Kegan Paul. Miller, D. (2007). The unpredictable mobile phone. BT Technology Journal, 25(3-4), 321-328. Miller, F. Q. (2014). Knowledge ecosystems of early career academics: A grounded theory of experiencing information use for learning in developmental networks. PhD thesis, Queensland University of Technology. URL Nair, S., Jennaway, M., & Skuse, A. (2006). Local information networks: Social and technological considerations. New Delhi: UNESCO. Nardi, B. (Ed.). (1996). Context and consciousness: activity theory and human-computer interaction. Cambridge, MA: MIT Press. Peeples, J., & Mitchell, B. (2007). \"No mobs-no confusion-no tumult\": Networking civil disobedience. The Electronic Journal of Communication, 17(1-2). Powell, A. (2007). An ecology of public internet access: Exploring contextual internet access in an urban community. The Electronic Journal of Communication, 17(1-2). Pringle, I., Bajracharya, U., & Bajracharya, A. (2004). Innovating multimedia to increase accessibility in the hills of Nepal: The Tansen Community Multimedia Center (CMC). Mountain Research and Development, 24(4), 292-297. Rangaswamy, N. (2007). ICT for development and commerce: A case study of internet cafes in India. Paper presented at the 9th International Conference on Social Implications of Computers in Developing Countries. Reason, P., & Bradbury, H. (Eds.). (2001). Handbook of action research: Participative inquiry and practice. London: Sage. Roberts, C., & Sarangi, S. (2005). Theme-oriented discourse analysis of medical encounters. Medical Education, 39, 632-640. Schuler, D., & Namioka, A. (Eds.). (1993). Participatory design: Principles and practices. Hillsdale, NJ: Lawrence Erlbaum. Sharma, S. (2005). eNRICH: Archiving and accessing local information. International Journal of Education and Development using Information and Communication Technology, 2(1), 33-48.< /cite > Shepherd, C., Arnold, M., Bellamy, C., & Gibbs, M. (2007). The material ecologies of domestic ICTs. The Electronic Journal of Communication, 17(1-2). Skuse, A., & Cousins, T. (2007). Spaces of resistance: Informal settlement, communication and community organisation in a Cape Town township. Urban Studies, 44(5), 979-995. Skuse, A., & Cousins, T. (2008). Getting connected: the social dynamics of urban telecommunications access and use in Khayelitsha, Cape Town. New Media & Society, 10(9), 9-26. Skuse, A., Fildes, J., Tacchi, J., Martin, K., & Baulch, E. (2007).Poverty and digital inclusion: Preliminary findings of Finding a Voice project. New Delhi: UNESCO. Slater, D., & Kwami, J. (2005). Embeddedness and escape: Internet and mobile use as poverty reduction strategies in Ghana. Information Society Research Group Working Paper. Slater, D., & Tacchi, J. (2004). Research: ICT innovations for poverty reduction. UNESCO. Slater, D., Tacchi, J., & Lewis, P. (2002). Ethnographic monitoring and evaluation of community multimedia centres: A study of Kothmale community radio internet project, Sri Lanka. Stebbins, R. (2007). Serious leisure: A perspective for our time. New Brunswick: Transaction Publishers. Subramanian, S. (2005). ICT learning: Is it more valuable for the young? International Journal of Education and Development using Information and Communication Technology, 2(1), 11-21. Subramanian, S., Nair, S., & Sharma, S. (2004). Local content creation and ICT for development: Some experiences. Bangkok: UNESCO. Tacchi, J. (2005a). Finding a voice: The potential of creative ICT literacy and voice in community multimedia centres in South Asia. Information Society Research Group Working Paper No. 3. Tacchi, J. (2005b). Radio and new media technologies: Making technological change socially effective and culturally empowering. Paper presented at the Radio in the World: Radio Conference 2005. Tacchi, J. (2005c). Supporting the democratic voice through community media centres in South Asia. 3CMedia: Journal of Community, Citizen's and Third Sector Media and Communication, 1, 25-35. Tacchi, J. (2006). Studying communicative ecologies: An ethnographic approach to information and communication technologies. Paper presented at the 56th Annual Conference of the International Communication Association. Tacchi, J. (2007). Ethnographic (per)versions and creative engagement through locally created content. Paper presented at the CMS Symbols - Symposia on Communication for Social Development. Tacchi, J., Hearn, G., & Ninan, A. (2004). Ethnographic action research: A method for implementing and evaluating new media technologies. In K. Prasad (Ed.), Information and communication technology: Recasting development (pp. 253\u2013274). Knoxville, TN: B.R. Publishing Corporation. Tacchi, J., Slater, D., & Hearn, G. (2003). Ethnographic action research: A user's handbook. New Delhi: UNESCO. Tacchi, J., Fildes, J., Martin, K., Kiran, MS., Baulch, E. and Skuse, A. (2007). Ethnographic action research: Training handbook. New Delhi: UNESCO. Tacchi, J., & Watkins, J. (2007). Participatory research and creative engagement with ICTs. Paper presented at the ACM Sensys Conference. Wagner, M. (2004). Communicative ecology: How the bonobos do it. International Journal of the Humanities, 2(3), 2365-2374. White, D., & Hellerich, G. (2003). Nietzsche and the communicative ecology of terror: Part 1. The European Legacy, 8(6), 717-737. Wilkin, H. A., Ball-Rokeach, S. J., Matsaganis, M. D., & Cheong, P. H. (2007). Comparing the communication ecologies of geo-ethnic communities: How people stay on top of their community. The Electronic Journal of Communication, 17(1-2). Yates, J., Orlikowski, W. J., & Woerner, S. L. (2003). Virtual organizing: Using threads to coordinate distributed work. Paper presented at the Hawaii International Conference on System Sciences.", "edit_actions": [{"type": "D", "before": "", "after": null, "start_char_pos": 11, "end_char_pos": 32}, {"type": "D", "before": "", "after": null, "start_char_pos": 231, "end_char_pos": 253}, {"type": "D", "before": "", "after": null, "start_char_pos": 398, "end_char_pos": 420}, {"type": "D", "before": "", "after": null, "start_char_pos": 532, "end_char_pos": 558}, {"type": "D", "before": "", "after": null, "start_char_pos": 732, "end_char_pos": 754}, {"type": "D", "before": "", "after": null, "start_char_pos": 928, "end_char_pos": 947}, {"type": "D", "before": "", "after": null, "start_char_pos": 1092, "end_char_pos": 1111}, {"type": "D", "before": "", "after": null, "start_char_pos": 1363, "end_char_pos": 1382}, {"type": "D", "before": "", "after": null, "start_char_pos": 1512, "end_char_pos": 1532}, {"type": "D", "before": "", "after": null, "start_char_pos": 1749, "end_char_pos": 1770}, {"type": "D", "before": "", "after": null, "start_char_pos": 1883, "end_char_pos": 1905}, {"type": "D", "before": "", "after": null, "start_char_pos": 2119, "end_char_pos": 2137}, {"type": "D", "before": "", "after": null, "start_char_pos": 2212, "end_char_pos": 2235}, {"type": "D", "before": "", "after": null, "start_char_pos": 2437, "end_char_pos": 2460}, {"type": "D", "before": "", "after": null, "start_char_pos": 2595, "end_char_pos": 2616}, {"type": "D", "before": "", "after": null, "start_char_pos": 2847, "end_char_pos": 2870}, {"type": "D", "before": "", "after": null, "start_char_pos": 2995, "end_char_pos": 3014}, {"type": "D", "before": "", "after": null, "start_char_pos": 3111, "end_char_pos": 3130}, {"type": "D", "before": "", "after": null, "start_char_pos": 3256, "end_char_pos": 3276}, {"type": "D", "before": "", "after": null, "start_char_pos": 3395, "end_char_pos": 3417}, {"type": "D", "before": "", "after": null, "start_char_pos": 3594, "end_char_pos": 3615}, {"type": "D", "before": "", "after": null, "start_char_pos": 3721, "end_char_pos": 3741}, {"type": "D", "before": "", "after": null, "start_char_pos": 3834, "end_char_pos": 3854}, {"type": "D", "before": "", "after": null, "start_char_pos": 4068, "end_char_pos": 4086}, {"type": "D", "before": "", "after": null, "start_char_pos": 4219, "end_char_pos": 4238}, {"type": "D", "before": "", "after": null, "start_char_pos": 4365, "end_char_pos": 4386}, {"type": "D", "before": "", "after": null, "start_char_pos": 4538, "end_char_pos": 4558}, {"type": "D", "before": "", "after": null, "start_char_pos": 4726, "end_char_pos": 4747}, {"type": "D", "before": "", "after": null, "start_char_pos": 4972, "end_char_pos": 4996}, {"type": "D", "before": "", "after": null, "start_char_pos": 5208, "end_char_pos": 5228}, {"type": "D", "before": "", "after": null, "start_char_pos": 5351, "end_char_pos": 5372}, {"type": "D", "before": "", "after": null, "start_char_pos": 5497, "end_char_pos": 5518}, {"type": "R", "before": "cite id=Shepherd2007", "after": "/cite", "start_char_pos": 5846, "end_char_pos": 5866}, {"type": "D", "before": "", "after": null, "start_char_pos": 6019, "end_char_pos": 6038}, {"type": "D", "before": "", "after": null, "start_char_pos": 6407, "end_char_pos": 6432}, {"type": "D", "before": "", "after": null, "start_char_pos": 6599, "end_char_pos": 6619}, {"type": "D", "before": "", "after": null, "start_char_pos": 6793, "end_char_pos": 6813}, {"type": "D", "before": "", "after": null, "start_char_pos": 6904, "end_char_pos": 6924}, {"type": "D", "before": "", "after": null, "start_char_pos": 7106, "end_char_pos": 7128}, {"type": "D", "before": "", "after": null, "start_char_pos": 7234, "end_char_pos": 7259}, {"type": "D", "before": "", "after": null, "start_char_pos": 7445, "end_char_pos": 7470}, {"type": "D", "before": "", "after": null, "start_char_pos": 7602, "end_char_pos": 7623}, {"type": "D", "before": "", "after": null, "start_char_pos": 7813, "end_char_pos": 7834}, {"type": "D", "before": "", "after": null, "start_char_pos": 8029, "end_char_pos": 8050}, {"type": "D", "before": "", "after": null, "start_char_pos": 8243, "end_char_pos": 8263}, {"type": "D", "before": "", "after": null, "start_char_pos": 8483, "end_char_pos": 8503}, {"type": "D", "before": "", "after": null, "start_char_pos": 8694, "end_char_pos": 8714}, {"type": "D", "before": "", "after": null, "start_char_pos": 8996, "end_char_pos": 9016}, {"type": "D", "before": "", "after": null, "start_char_pos": 9129, "end_char_pos": 9149}, {"type": "D", "before": "", "after": null, "start_char_pos": 9299, "end_char_pos": 9326}, {"type": "D", "before": "", "after": null, "start_char_pos": 9465, "end_char_pos": 9485}, {"type": "D", "before": "", "after": null, "start_char_pos": 9609, "end_char_pos": 9628}, {"type": "D", "before": "", "after": null, "start_char_pos": 9759, "end_char_pos": 9779}, {"type": "D", "before": "", "after": null, "start_char_pos": 10017, "end_char_pos": 10036}], "sents_char_pos": [0, 55, 180, 230, 277, 353, 397, 444, 502, 531, 614, 691, 731, 775, 901, 965, 1033, 1091, 1145, 1289, 1362, 1400, 1457, 1511, 1574, 1674, 1748, 1790, 1837, 1926, 2037, 2118, 2154, 2179, 2211, 2265, 2382, 2436, 2497, 2561, 2594, 2636, 2677, 2819, 2846, 2900, 2944, 2994, 3046, 3096, 3110, 3148, 3207, 3255, 3295, 3361, 3394, 3438, 3564, 3593, 3635, 3688, 3720, 3760, 3792, 3833, 3876, 4014, 4063, 4130, 4199, 4218, 4263, 4338, 4364, 4422, 4487, 4537, 4577, 4675, 4725, 4803, 4920, 4971, 5019, 5094, 5207, 5263, 5336, 5350, 5407, 5464, 5496, 5553, 5609, 5642, 5732, 5927, 5968, 6018, 6071, 6180, 6211, 6263, 6372, 6500, 6579, 6598, 6651, 6742, 6792, 6846, 6895, 6968, 7105, 7149, 7194, 7233, 7283, 7332, 7444, 7518, 7584, 7601, 7643, 7756, 7854, 7962, 8028, 8070, 8149, 8242, 8282, 8388, 8482, 8522, 8606, 8693, 8757, 8852, 8951, 8995, 9060, 9109, 9128, 9230, 9279, 9298, 9360, 9418, 9464, 9504, 9550, 9608, 9663, 9722, 9758, 9858, 9966, 10016, 10091, 10157]}
+{"doc_id": "1857117", "revision_depth": "1", "before_revision": "Raymond Armin was born in London ( 1924 ) under the name Schirtenlieb, and did most of his schooling in London, living around the St. Johns Wood area. He started his working life as an apprentice tool maker at Borehamwood near London England. Armin did time in the R.A.F. as a quartermaster (His rank was staff sergeant). He married Violet Burton from Waterloo. After the war Armin worked at various locations around the London areas, as manager of a furniture company based in Camden Town, London, and then as a market demonstrator. During the late 1940s and early 1950s, while still living in central London, he became father to four children, one of whom died soon after birth. He relocated in 1958 to Yorkshire to follow a new profession as a travelling salesman selling furniture polish, and then a few years later as an encyclopaedia salesman. In 1960 Armin moved to Nottingham, and moved back to London in 1965, where he worked as a civilian driver for the police and a guard for a security firm. In 1971 Armin's son John met up with a group of people who were staying in London after travelling around the world 'looking for something'. John suggested they would be interested in meeting his dad. They formed into a group under the Armins' leadership, and all met regularly over the next two years, primarily at Leo's council flat in Hackney . In 1972 the groupbegan officially as ' The Emin Society' at which time Raymond Armin became known as 'Leo' and John as 'Orman' within the society. The society used many halls around the London areas, eventually occupying a small centre at Gospel Oak in London. Autumn of 1976 saw a relocation to a larger centre at Hotham Road, Putney, London. . At the end of the eighties Raymond Armin moved with his wife (Violet) to America, eventually both becoming American citizens. From 1995 until his death Armin lived in a waterfront retreat at Jensen Beach Florida. homemetry.com Address/Property records 1592 Seahorse Pl Jensen Beach, FL 34957 Armin died in August 2002 from an aortic aneurysm. Violet Armin (Ruth) died in 2008 in her sleep . The Emin was founded by members of the Armin family and a gathering of friends interested in Leo's work. Armin was born on 27 July 1924 , and died in 2002. Leo died in 2002. ref www. emin. org ", "after_revision": "Raymond Armin was born in London ( 1926 ) under the name Schirtenlieb, and did most of his schooling in London, living around the St. Johns Wood area. He started his working life as an apprentice tool maker at Borehamwood near London England. Armin did time during the war in the R.A.F. as a quartermaster (His rank was staff sergeant). He married Violet Burton from Waterloo. After the war Armin worked at various locations around the London areas, as manager of a furniture company based in Camden Town, London, and then as a market demonstrator. During the late 1940s and early 1950s, while still living in central London, he became father to four children, one of whom died soon after birth. He relocated in 1958 to Yorkshire to follow a new profession as a traveling salesman selling furniture polish, and then a few years later as an encyclopaedia salesman. In 1964 Armin moved to Nottinghamshire, followed by a move back to London in 1965, where he worked as a civilian driver for the police and a guard for a security firm. In 1971 Armin's son John met up with a group of people who were staying in London after traveling around the world 'looking for something'. They formed into a group under the Armins' leadership, and all met regularly over the next ferw years, primarily at Leo's flat in Stoke-newington London . In 1973 'The group' began ending in the The Emin Society' at which time Raymond Armin became known as 'Leo' and John as 'Orman' within the society. The society used many halls around the London areas, eventually occupying a small centre at Gospel Oak in London. Autumn of 1976 saw a relocation to a larger centre at Hotham Road, Putney, London. At the end of the 1980's Raymond Armin moved with his wife (Violet) and his girlfriend a woman called ethra 'Deborra Mckay' to America, eventually 2 of them (leo amnd ruth)with the money the Emin suplied, becoming American citizens. From 1995 until his death , Armin (known as leo), lived in a waterfront retreat at Jensen Beach Florida. Address/Property records 1592 Seahorse Pl Jensen Beach, FL 34957 Armin who died in August 2002 from an aortic aneurysm. Violet Armin (Ruth) died in 2008 in her sleep after many abuses and painful treatment by her so called ladies of the temple . The Emin was founded by 2 members of the Armin family (Leo- Raymond and Orman- John) followed by a gathering of friends interested in Ormans and Leos work. Raymond Armin was born on 27 July 1926 , and died in 2002. The Emin was consequential to the time (1960 to 1975) and those that were its inspiration. Leo was a man that would turn brother against brother and sister to achieve his own ends. He liveD a luxurious life style and criticized all that didn't agree with him. He was a monster, who put his own children down and loved money and women more than all else. Believers or not, they 'Emin people' still try to tell others he was a genius and a Gods friend. Don't trust Emin, its ushers, elite or even those that run it. The Emin was good for the time but in todays world they are archaic, following a dead mans way. Life needs life to go on and not reverence of the dead and its ways. The story of Ruth (Violet Ann Claire Burton, born 1922 or there abouts, there are two certificates) is yet to be known. She suffered via the ways of Leo and her ladies in waiting. They robbed her and took her possessions and left her to suffer the desolation that Raymond Armin(her husband)- Leo her work mate, left her to suffer.", "edit_actions": [{"type": "R", "before": "1924", "after": "1926", "start_char_pos": 35, "end_char_pos": 39}, {"type": "A", "before": null, "after": "during the war", "start_char_pos": 258, "end_char_pos": 258}, {"type": "R", "before": "travelling", "after": "traveling", "start_char_pos": 748, "end_char_pos": 758}, {"type": "R", "before": "1960", "after": "1964", "start_char_pos": 854, "end_char_pos": 858}, {"type": "R", "before": "Nottingham, and moved", "after": "Nottinghamshire, followed by a move", "start_char_pos": 874, "end_char_pos": 895}, {"type": "R", "before": "travelling", "after": "traveling", "start_char_pos": 1093, "end_char_pos": 1103}, {"type": "D", "before": "John suggested they would be interested in meeting his dad.", "after": null, "start_char_pos": 1146, "end_char_pos": 1205}, {"type": "R", "before": "two", "after": "ferw", "start_char_pos": 1297, "end_char_pos": 1300}, {"type": "R", "before": "council flat in Hackney", "after": "flat in Stoke-newington London", "start_char_pos": 1327, "end_char_pos": 1350}, {"type": "R", "before": "1972 the groupbegan officially as '", "after": "1973 'The group' began ending in the", "start_char_pos": 1356, "end_char_pos": 1391}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1697, "end_char_pos": 1698}, {"type": "R", "before": "eighties", "after": "1980's", "start_char_pos": 1717, "end_char_pos": 1725}, {"type": "A", "before": null, "after": "and his girlfriend a woman called ethra 'Deborra Mckay'", "start_char_pos": 1769, "end_char_pos": 1769}, {"type": "R", "before": "both", "after": "2 of them (leo amnd ruth)with the money the Emin suplied,", "start_char_pos": 1793, "end_char_pos": 1797}, {"type": "R", "before": "Armin", "after": ", Armin (known as leo),", "start_char_pos": 1852, "end_char_pos": 1857}, {"type": "D", "before": "homemetry.com", "after": null, "start_char_pos": 1913, "end_char_pos": 1926}, {"type": "R", "before": "Armin", "after": " Armin who", "start_char_pos": 1992, "end_char_pos": 1997}, {"type": "A", "before": null, "after": "after many abuses and painful treatment by her so called ladies of the temple", "start_char_pos": 2089, "end_char_pos": 2089}, {"type": "A", "before": null, "after": "2", "start_char_pos": 2116, "end_char_pos": 2116}, {"type": "R", "before": "and", "after": "(Leo- Raymond and Orman- John) followed by", "start_char_pos": 2145, "end_char_pos": 2148}, {"type": "R", "before": "Leo's work.", "after": "Ormans and Leos work. Raymond", "start_char_pos": 2186, "end_char_pos": 2197}, {"type": "R", "before": "1924", "after": "1926", "start_char_pos": 2224, "end_char_pos": 2228}, {"type": "R", "before": "Leo died in 2002. ref www. emin. org", "after": "The Emin was consequential to the time (1960 to 1975) and those that were its inspiration. Leo was a man that would turn brother against brother and sister to achieve his own ends. He liveD a luxurious life style and criticized all that didn't agree with him. He was a monster, who put his own children down and loved money and women more than all else. Believers or not, they 'Emin people' still try to tell others he was a genius and a Gods friend. Don't trust Emin, its ushers, elite or even those that run it.", "start_char_pos": 2249, "end_char_pos": 2285}, {"type": "A", "before": null, "after": "The Emin was good for the time but in todays world they are archaic, following a dead mans way. Life needs life to go on and not reverence of the dead and its ways. The story of Ruth (Violet Ann Claire Burton, born 1922 or there abouts, there are two certificates) is yet to be known. She suffered via the ways of Leo and her ladies in waiting. They robbed her and took her possessions and left her to suffer the desolation that Raymond Armin(her husband)- Leo her work mate, left her to suffer.", "start_char_pos": 2286, "end_char_pos": 2286}], "sents_char_pos": [0, 150, 242, 322, 362, 534, 681, 850, 1004, 1145, 1205, 1352, 1499, 1613, 1825, 2042, 2091, 2197, 2248]}
+{"doc_id": "18737814", "revision_depth": "1", "before_revision": "CafeMom was an ad-supported social networking site which was targeted at mothers and mothers-to-be. It was founded in 2006 by Andrew Shue and Michael Sanchez. Within one year of its launch, CafeMom became the most trafficked website for women (by page views) on the Internet, according to comScore.CafeMom gets more than 8 million unique visitors a month, accounting for over 140 million page views. According to their own website, as of 2009, CafeMom.comhad turned profitable.%DIFDELCMD < %DIFDELCMD < %%% On March 30, 2010, CafeMomannounced the launch of The Stir, a new blog for moms featuring topics such as celebrity gossip, parenting dilemmas (and solutions), current events, and home decorating . Based in New York City, the company had about 120 employees. CafeMom is owned by privately held CMI Marketing. History CafeMom was founded in 2006 by Michael Sanchez and Andrew Shue. In 1999, the childhood friends established CMI Marketing and subsequently ClubMom, the predecessor to CafeMom. ClubMom was a web site that provided parenting information in the form of blogs, articles and message boards. It also organized a shopping rewards program with sponsors. ClubMom ran until 2007, when CMI Marketing ended the website in order to focus on their sister site by the name of CafeMom. The idea of CafeMom originated with Andrew Shue when he became a father and he saw how his wife counted on other mothers for support and information. Shue realized that there was a need for mothers to share and talk with other women and there was nothing out there that was bringing them together. CMI Marketing put together ideas of how the CafeMom website would look and function by looking at features of other social networking sites. The company then took these ideas and simplified them when creating CafeMom. CafeMom went live on November 15, 2006. Many original ClubMom members were encouraged to join the newly formed social networking site CafeMom in order to help it succeed . On May 18, 2018, CafeMom sent an email to all CafeMom users announcing the service would cease operation because of funding problems. Company CafeMom is owned by CMI Marketing Inc., a New York-based company, founded in 1999, which offers Internet community services. The services typically involve online chatting and photo sharing. CMI Marketing Inc. primarily makes money via advertising revenue. They also have investors Highland Capital Partners and Draper Fisher Jurvetson invested some $5 million in the company . Since the end of 2008, CMI Marketing has been growing. CafeMom reaches 8.1 million unique visitors (ComScore, July 2011) and more than 20 million unique visitors to the CafeMom Plus Network. CafeMom Plus is a network of mom-oriented websites who are in partnership with CafeMom, including: Birthday Partnership Ideas; Coupon Cabin; Education. com; and Families.com. In the media CafeMom has been featured in newspapers, magazines and television and radio programs. Articles have appeared in the New York Times,The Wall Street Journal, Good Morning America along with programs on The Today Show and Webmaster Radio. In 2009, the marketing news and expert advice website, Clickz, published an article on CafeMom\u2019s newly launched games section, and the impact it was making. In August 2010, it was reported that Yahoo! was seeking to acquire the profit making social networking site aimed at mothers. CMI Marketing and Yahoo negotiated over the price. Other interested companies included The Walt Disney Company. The Stir Logo for The Stir CafeMom publishes an online journal called The Stir. It provides newspaper articles about parenting and issues surrounding children that members can comment upon and discuss. It also links to related stories on the site as well providing links to similar articles in the press, and gives links to Twitter and Facebook where members can continue the debate. Suburban Turmoil\u2019s Lindsay Ferrier is a fashion columnist for the journal, after selling her style blog, She\u2019s Still Got It, to CafeMom. The blog is interactive, allowing CafeMom followers to write in and ask questions, appeal for fashion advice and discuss trends. Ferrier became involved with CafeMom after following CafeMom bloggers on Twitter and getting in touch with them . References External links CafeMom Category: Defunct social networking services Category:Internet properties established in 2006 Category:2006 establishments in New York City Category: Companies based in New York Cit", "after_revision": "Logo for The Stir CafeMom is a website targeted to mothers and mothers-to-be. It %DIFDELCMD < %DIFDELCMD < %%% is owned by Wild Sky Media, which also owns Mom.com, CafeMom, Mam\u00e1sLatinas and LittleThings . History CafeMom was founded in 2006 by Michael Sanchez and Andrew Shue. In 1999, the childhood friends established CMI Marketing and subsequently ClubMom, the predecessor to CafeMom. ClubMom was a web site that provided parenting information in the form of blogs, articles and message boards. It also organized a shopping rewards program with sponsors. ClubMom ran until 2007, until it was shuttered in favor of CafeMom. CafeMom launched on November 15, 2006. Many ClubMom members were encouraged to join CafeMom to help it succeed. Shortly after its launch, it was described as a \"MySpace for moms\". The idea of CafeMom originated with Andrew Shue when he became a father and he saw how his wife counted on other mothers for support and information. Shue realized that there was a need for mothers to share and talk with other women and there was nothing out there that was bringing them together. Within one year of its launch, CafeMom became the most trafficked website for women according to comScore . In 2008, the website was receiving 8 million unique visitors a month, accounting for over 140 million page views . In September 2008, the website launched an initiative to donate $10 million to schools, while increasing traffic to the site. In 2009, the website launched a games section. On March 30, 2010, CafeMom announced the launch of The Stir, a blog for moms featuring topics such as celebrity gossip, parenting dilemmas, current events, and home decorating. It provides articles about parenting and issues surrounding children that members can comment upon and discuss. It also links to related stories on the site as well providing links to similar articles in the press, and gives links to Twitter and Facebook where members can continue the debate. Suburban Turmoil\u2019s Lindsay Ferrier is a fashion columnist for the journal, after selling her style blog, She\u2019s Still Got It, to CafeMom. The blog is interactive, allowing CafeMom followers to write in and ask questions, appeal for fashion advice and discuss trends. In 2010, the blog named Tina Fey as \"Sexiest Mom Alive\". In 2010, the site had $30 million in revenue. As of June 2010, the site offered 70,000 separate groups on topics ranging from astrology to gardening. In August 2010, Yahoo! evaluated acquiring CafeMom for as much as $100 million. CMI Marketing and Yahoo negotiated over the price. Other interested companies included The Walt Disney Company. In May 2011, the website launched Daily Deals and announced plans for a hispanic website. At that time, the website had 100 employees, $36 million in annual revenue, and 7.6 million unique monthly visitors. By 2012, the website was receiving 9 million monthly unique visitors and launched a YouTube channel. The YouTube channel offers workout videos and heartwarming stories . In June 2018, Wild Sky Media acquired the website. References External links Category: 2006 establishments in New York City Category: American women's websites Category: Companies based in New York City Category:Internet properties established in 2006 Category:Parentin", "edit_actions": [{"type": "R", "before": "CafeMom was an ad-supported social networking site which was targeted at", "after": "Logo for The Stir CafeMom is a website targeted to", "start_char_pos": 0, "end_char_pos": 72}, {"type": "D", "before": "was founded in 2006 by Andrew Shue and Michael Sanchez.", "after": null, "start_char_pos": 103, "end_char_pos": 158}, {"type": "D", "before": "Within one year of its launch, CafeMom became the most trafficked website for women (by page views) on the Internet, according to comScore.CafeMom gets more than 8 million unique visitors a month, accounting for over 140 million page views. According to their own website, as of 2009, CafeMom.comhad turned profitable.", "after": null, "start_char_pos": 159, "end_char_pos": 477}, {"type": "R", "before": "On March 30, 2010, CafeMomannounced the launch of The Stir, a new blog for moms featuring topics such as celebrity gossip, parenting dilemmas (and solutions), current events, and home decorating", "after": "is owned by Wild Sky Media, which also owns Mom.com, CafeMom, Mam\u00e1sLatinas and LittleThings", "start_char_pos": 507, "end_char_pos": 701}, {"type": "D", "before": "Based in New York City, the company had about 120 employees. CafeMom is owned by privately held CMI Marketing.", "after": null, "start_char_pos": 704, "end_char_pos": 814}, {"type": "R", "before": "when CMI Marketing ended the website in order to focus on their sister site by the name", "after": "until it was shuttered in favor", "start_char_pos": 1192, "end_char_pos": 1279}, {"type": "A", "before": null, "after": "CafeMom launched on November 15, 2006. Many ClubMom members were encouraged to join CafeMom to help it succeed. Shortly after its launch, it was described as a \"MySpace for moms\".", "start_char_pos": 1292, "end_char_pos": 1292}, {"type": "D", "before": "CMI Marketing put together ideas of how the CafeMom website would look and function by looking at features of other social networking sites. The company then took these ideas and simplified them when creating CafeMom.", "after": null, "start_char_pos": 1591, "end_char_pos": 1808}, {"type": "R", "before": "CafeMom went live on November 15, 2006. Many original ClubMom members were encouraged to join the newly formed social networking site CafeMom in order to help it succeed", "after": "Within one year of its launch, CafeMom became the most trafficked website for women according to comScore", "start_char_pos": 1809, "end_char_pos": 1978}, {"type": "D", "before": "On May 18, 2018, CafeMom sent an email to all CafeMom users announcing the service would cease operation because of funding problems.", "after": null, "start_char_pos": 1981, "end_char_pos": 2114}, {"type": "R", "before": "Company CafeMom is owned by CMI Marketing Inc., a New York-based company, founded in 1999, which offers Internet community services. The services typically involve online chatting and photo sharing. CMI Marketing Inc. primarily makes money via advertising revenue. They also have investors Highland Capital Partners and Draper Fisher Jurvetson invested some $5 million in the company", "after": "In 2008, the website was receiving 8 million unique visitors a month, accounting for over 140 million page views", "start_char_pos": 2115, "end_char_pos": 2498}, {"type": "R", "before": "Since the end of", "after": "In September", "start_char_pos": 2501, "end_char_pos": 2517}, {"type": "R", "before": "CMI Marketing has been growing. CafeMom reaches 8.1 million unique visitors (ComScore, July 2011) and more than 20 million unique visitors to the CafeMom Plus Network. CafeMom Plus is a network of mom-oriented websites who are in partnership with CafeMom, including: Birthday Partnership Ideas; Coupon Cabin; Education. com; and Families.com.", "after": "the website launched an initiative to donate $10 million to schools, while increasing traffic to the site. In 2009, the website launched a games section. On March 30, 2010, CafeMom announced the launch of The Stir, a blog for moms featuring topics such as celebrity gossip, parenting dilemmas, current events, and home decorating. It provides articles about parenting and issues surrounding children that members can comment upon and discuss. It also links to related stories on the site as well providing links to similar articles in the press, and gives links to Twitter and Facebook where members can continue the debate. Suburban Turmoil\u2019s Lindsay Ferrier is a fashion columnist for the journal, after selling her style blog, She\u2019s Still Got It, to CafeMom. The blog is interactive, allowing CafeMom followers to write in and ask questions, appeal for fashion advice and discuss trends. In 2010, the blog named Tina Fey as \"Sexiest Mom Alive\". In 2010, the site had $30 million in revenue.", "start_char_pos": 2524, "end_char_pos": 2866}, {"type": "R", "before": "In the media CafeMom has been featured in newspapers, magazines and television and radio programs. Articles have appeared in the New York Times,The Wall Street Journal, Good Morning America along with programs on The Today Show and Webmaster Radio. In 2009, the marketing news and expert advice website, Clickz, published an article on CafeMom\u2019s newly launched games section, and the impact it was making.", "after": "As of June 2010, the site offered 70,000 separate groups on topics ranging from astrology to gardening.", "start_char_pos": 2867, "end_char_pos": 3272}, {"type": "R", "before": "it was reported that Yahoo! was seeking to acquire the profit making social networking site aimed at mothers. CMI Marketing and Yahoo negotiated over the price. Other interested companies included The Walt Disney Company.", "after": "Yahoo! evaluated acquiring CafeMom for as much as $100 million. CMI Marketing and Yahoo negotiated over the price. Other interested companies included The Walt Disney Company. In May 2011, the website launched Daily Deals and announced plans for a hispanic website. At that time, the website had 100 employees, $36 million in annual revenue, and 7.6 million unique monthly visitors.", "start_char_pos": 3289, "end_char_pos": 3510}, {"type": "D", "before": "The Stir Logo for The Stir CafeMom publishes an online journal called The Stir. It provides newspaper articles about parenting and issues surrounding children that members can comment upon and discuss. It also links to related stories on the site as well providing links to similar articles in the press, and gives links to Twitter and Facebook where members can continue the debate. Suburban Turmoil\u2019s Lindsay Ferrier is a fashion columnist for the journal, after selling her style blog, She\u2019s Still Got It, to CafeMom.", "after": null, "start_char_pos": 3511, "end_char_pos": 4031}, {"type": "R", "before": "The blog is interactive, allowing CafeMom followers to write in and ask questions, appeal for fashion advice and discuss trends. Ferrier became involved with CafeMom after following CafeMom bloggers on Twitter and getting in touch with them", "after": "By 2012, the website was receiving 9 million monthly unique visitors and launched a YouTube channel. The YouTube channel offers workout videos and heartwarming stories", "start_char_pos": 4032, "end_char_pos": 4272}, {"type": "A", "before": null, "after": "In June 2018, Wild Sky Media acquired the website.", "start_char_pos": 4275, "end_char_pos": 4275}, {"type": "D", "before": "CafeMom", "after": null, "start_char_pos": 4302, "end_char_pos": 4309}, {"type": "D", "before": "Defunct social networking services Category:Internet properties established in", "after": null, "start_char_pos": 4320, "end_char_pos": 4398}, {"type": "D", "before": "Category:2006", "after": null, "start_char_pos": 4404, "end_char_pos": 4417}, {"type": "A", "before": null, "after": "American women's websites Category:", "start_char_pos": 4460, "end_char_pos": 4460}, {"type": "R", "before": "Cit", "after": "City Category:Internet properties established in 2006 Category:Parentin", "start_char_pos": 4489, "end_char_pos": 4492}], "sents_char_pos": [0, 99, 158, 298, 399, 477, 764, 814, 886, 997, 1107, 1167, 1291, 1442, 1590, 1731, 1808, 1848, 1980, 2114, 2247, 2313, 2379, 2555, 2691, 2818, 2832, 2848, 2866, 2965, 3115, 3272, 3398, 3449, 3510, 3590, 3712, 3894, 4031, 4160, 4274]}
+{"doc_id": "18792699", "revision_depth": "1", "before_revision": "Emotional responsivity is the ability to acknowledge an affective stimuli by exhibiting emotion. Any response , whether it is appropriate or not, would showcase the presence of this phenomenon . Although emotional responsivity applies to nonclinical populations, it has also been associated with individuals with schizophrenia and autism. Emotional responsivity is said to have a unique association with social interaction. Studies suggest that social interaction, especially at home, can influence the way a child responds to emotional stimuli. For example, if child grew up in a home where emotional displays resulted in punishment or negative criticism, the child would have the tendency to find ways to hide their emotions . Measures In experimental studies , emotional responsivity can be measured through various tasks, which would allow participants ' facial expressions and behavior to be recorded and sometimes coded. Tasks used to measure emotional responsivity, particularly in children, include: Facial stimuli: This task involves asking a participant to view pictures of human faces that display different facial expressions. Participants would then be asked to rate their emotional experience. The facial expression would be considered the affective stimuli. Surprise boxes: This task involves an experimenter opening a box in front of a participant, usually a child, and displaying either an amazed reaction, by saying \"ohh\" or , a frightened reaction, by saying \"ahh.\" Experimenter distress: In this task, the experimenter bangs his or her knee, displaying distress Yummy yucky: In this task, a child is asked to eat a certain food that was chosen by his or her parent. An experimenter then tastes the chosen food and either displays a pleased or disgusted facial expression. Emotional responsivity can also be examined through psycho-physiological approaches such as : Facial electromyography Skin conductance In children with sleep deprivation Sleeping issues in children have been linked to many physical and mental health problems later on in adulthood and created a greater risk for emotional and behavioral issues in children. Studies haven't been able to link the physiological functions with sleeping disturbances to these psychological consequences. Emotional liability, responsivity, psychological responses to positive and negative picture stimuli have all been a result of sleep deprivation. Doctors today are using neuroimaging to connect the relationship between sleep and neural mechanisms that cause emotional responsively in children. There studies resulted, \"In general, the largest and most extensive sleep-related correlations for any emotion were found for disgust expressions\". In children with autism There was a study done involving twenty six children with autism and fifteen children with other learning disabilities, in which an adult displayed some form of emotion to study how the children respond. They focused on attention, hedonic tone, latency to changes in tone and an emotional contagion summery was made. Studies showed correlations between measures of joint attention, emotional contagion, and the severity of autism. Results showed that children with autism did not demonstrate changes in affect, however their responses occurred much less than in comparison groups .", "after_revision": "Emotional responsivity is the ability to acknowledge an affective stimuli by exhibiting emotion. Increased emotional responsivity refers to demonstrating more response to a stimulus. Reduced emotional responsivity refers to demonstrating less response to a stimulus. Any response exhibited after exposure to the stimulus , whether it is appropriate or not, would be considered as an emotional response . Although emotional responsivity applies to nonclinical populations, it is more typically associated with individuals with schizophrenia and autism. Emotional responsivity is connected to broader psychology concepts about emotions. People exhibit emotions in response to outside stimuli. Positive affective stimuli trigger feelings of pleasure such as happiness; negative affective stimuli trigger feelings of displeasure such as disgust and fear. Emotional responses include but are not limited to facial expressions and neurophysiological activities. For example, people display a \u201csmile\u201d when exposed to positive stimuli and a \u201cfrown\u201d when exposed to negative stimuli. The feeling associated with emotion is called an affect, which can be categorized by valence and arousal. Valence describes the degree to which the feeling is a pleasure or displeasure. Arousal describes the degree to which a person is awoken by outside stimuli . Experimental measures Clinical studies of emotional responsivity involve two essential procedures. First, the researchers try to stimulate emotions from the participants by engaging participants in specific tasks. Then, the researchers measure the degree to which the participants respond to the stimuli. Tasks used to stimulate emotional responses include: Picture stimuli: this task involves showing participants pleasant or unpleasant pictures and ask participants to rate the arousal and valence level of the picture. A pleasant picture could depict opposite-sex erotica; an unpleasant picture could be a burned human body. The International Affective Picture System is a photo database that generates pictures designed to arouse specific emotions. Film clips: this task asks participants to view film clips that arouse different emotions. For example, comedies\u2019 clips trigger potential feelings of joy. Neutral clips such as scenes of rainforests usually are included to serve as a control. Experimenter distress: this task involves the experimenter to stimulate emotions from participants by acting scenarios of distress. For example, the experimenter bans his or her knee and display expressions of pain . Facial stimuli: this task involves asking a participant to view pictures of human faces that display different facial expressions. Participants would then be asked to rate their emotional experience. The facial expression would be considered as the affective stimuli. Yummy-yucky: in this task, a child is asked to eat a certain food that was chosen by his or her parent. An experimenter then tastes the chosen food and displays either pleased or disgusted facial expression . Surprise box: this task intends to stimulate an emotional response by opening a box in front of a participant, usually a child, and displaying either an \u201camazed\u201d reaction by saying \u201cohh\u201d or a \u201cfrightened\u201d reaction by saying \u201cahh\u201d. After exposing participants to affective stimuli, researchers typically use the following methods to measure, record, and sometimes code emotional responsivity: Skin conductance (electrodermal activity): Skin conductivity indicates emotional arousal because increased sweat production by certain emotions increases the skin conductivity level. fMRI: this technology generates neuro-images of brain activities. fMRI can detect neurophysiological changes in the brain and thereby help determine the degree to which a person is aroused by the stimulus. For example, increased amygdala activity can be an indication of fear. Facial Action Coding System (FACS): this method uses the taxonomy of the face to measure movements of facial muscles. For example, the contraction of the orbicularis oculi muscle is an indication of happiness. Maximally Discriminative Facial Movement Coding System: this system is mostly used to measure the emotional responsivity of young children by corresponding universally recognized facial expressions to emotions. For example, lowering eyebrows indicates emotions of anger. Self-report: this method asks the participants to rate their valence and arousal level through questionnaires such as the Emotionally Expressivity Scales and the Berkley Expressivity Questionnaire. Studies have shown that self-report might not correspond to objective measures such as fMRI. Emotional responsivity in mental illness Autism Autism is associated with decreased emotional responsivity. There was a study involving twenty-six children with autism and fifteen children with other learning disabilities, in which an adult displayed some form of emotion to study how the children respond. They focused on attention, hedonic tone, latency to changes in tone and an emotional contagion summery was made. Studies show correlations between measures of joint attention, emotional contagion, and the severity of autism. Results demonstrate that children with autism did not demonstrate changes in affect; however, their responses occurred much less than in comparison groups. In another study involving twenty-one autism patients, FACS analysis demonstrates that people with autism display less facial responsivity when watching evocative films. Specifically, when compared to the control group, the autism group does not demonstrate the more complex muscular movements and displayed less differentiated facial responses when exposed to stimuli. This study confirms that autism impedes social interaction and cognition. Schizophrenia Schizophrenia impacts emotional responsivity by reducing a person\u2019s hedonic capacity and producing a blunted affect. Patients usually have an increased emotional response to displeasure and a decreased emotional response to pleasure. A study involving 22 outpatients demonstrates that schizophrenia increases the emotional responsivity to low arousing negative stimuli while decreases the emotional responsivity to high arousing positive stimuli. People with Schizophrenia exhibit fewer facial expressions when watching evocative films. There are differences in the arousal level of stimuli between paranoid and non-paranoid schizophrenia. Non-paranoid patients have increased negative emotional responsitivity and decreased positive emotional disregarding arousal levels. In comparison, paranoid schizophrenia has increased emotional responsivity to low arousing stimuli and reduced responsivity to high arousing stimuli. This study supports that Schizophrenia disturbs emotional experience. Traumatic brain injury (TBI) Traumatic brain injury is associated with reduced responsivity to negative affective stimuli. A study involving twenty-one TBI individuals uses picture stimuli to demonstrate that people TBI have normal emotional responsivity to pleasant pictures but show limited responses to unpleasant pictures. A potential explanation is that TBI damages the ventral surfaces of the frontal and temporal lobes, which are areas associated with emotional processing. Math anxiety Math anxiety describes the situation in which a person is overly distressed by math stimuli. A study involving fMRI techniques and 40 students demonstrates that people with math anxiety have increased emotional responsivity to math stimuli. The study suggests that when exposed to math-related stimuli, amygdala activity increases in participants' brain, which lowers the threshold of responding to a potential threat. Moreover, participants with math anxiety disengage and avoid the math stimuli more than images with negative valence such as a bleeding arm. The study suggests that math anxiety resembles other types of phobia in that there is increased vigilance and responsivity to specific stimuli. Emotional responsivity in substance-use Cocaine-exposed infants Using cocaine during pregnancy creates neurological damage to the fetus and neurobehavioral problems to the infants. 72 infants participated in a study where 36 infants have prenatal exposure to cocaine. The results demonstrate that compared to the control group, cocaine-exposed infants have decreased emotional responsivity, as they exhibit fewer expressions of joy, interest, surprise, anger, and sadness. Specifically, the cocaine-exposed group has reduced response to positive affective stimuli, suggesting that cocaine-exposure during pregnancy decreases feelings of joyfulness. Alcoholism: Alcohol consumption impairs affective processing and therefore leads to abnormal responses to environmental stimuli. A study involving 42 abstinent alcoholics and 46 nonalcoholic demonstrates that alcoholics usually have lower emotional responsivity to erotic, happy, aversive, and gruesome stimuli. However, an in-depth analysis of fMRI images reveals gender differences. Alcoholic men have reduced emotional responsivity while alcoholic women have increased emotional responsivity to positive affective stimuli. The study suggests that the gender difference is associated with different functional abnormalities of emotional processing in the cortical, subcortical, and cerebellar regions of the brain. Emotional responsivity in social factors Social interaction Emotional responsivity is said to have a unique association with social interaction. Studies suggest that social interaction, especially at home, can influence the way a child responds to emotional stimuli. For example, if child grew up in a home where emotional displays resulted in punishment or negative criticism, the child would have the tendency to find ways to hide their emotions. Sleep Deprivation Sleeping issues in children have been linked to many physical and mental health problems later on in adulthood and created a greater risk for emotional and behavioral issues in children. Studies haven't been able to link the physiological functions with sleeping disturbances to these psychological consequences. Emotional liability, responsivity, psychological responses to positive and negative picture stimuli have all been a result of sleep deprivation. Doctors today are using neuroimaging to connect the relationship between sleep and neural mechanisms that cause emotional responsively in children. These studies resulted, \"In general, the largest and most extensive sleep-related correlations for any emotion were found for disgust expressions\". Treatment: Current research suggests that future studies are required to find potential treatments of people with reduced or heightened emotional responsivity .", "edit_actions": [{"type": "R", "before": "Any response", "after": "Increased emotional responsivity refers to demonstrating more response to a stimulus. Reduced emotional responsivity refers to demonstrating less response to a stimulus. Any response exhibited after exposure to the stimulus", "start_char_pos": 97, "end_char_pos": 109}, {"type": "R", "before": "showcase the presence of this phenomenon", "after": "be considered as an emotional response", "start_char_pos": 152, "end_char_pos": 192}, {"type": "R", "before": "has also been", "after": "is more typically", "start_char_pos": 266, "end_char_pos": 279}, {"type": "R", "before": "said to have a unique association with social interaction. Studies suggest that social interaction, especially at home, can influence the way a child responds to emotional stimuli.", "after": "connected to broader psychology concepts about emotions. People exhibit emotions in response to outside stimuli. Positive affective stimuli trigger feelings of pleasure such as happiness; negative affective stimuli trigger feelings of displeasure such as disgust and fear. Emotional responses include but are not limited to facial expressions and neurophysiological activities.", "start_char_pos": 365, "end_char_pos": 545}, {"type": "R", "before": "if child grew up in a home where emotional displays resulted in punishment or negative criticism, the child would have the tendency to find ways to hide their emotions", "after": "people display a \u201csmile\u201d when exposed to positive stimuli and a \u201cfrown\u201d when exposed to negative stimuli. The feeling associated with emotion is called an affect, which can be categorized by valence and arousal. Valence describes the degree to which the feeling is a pleasure or displeasure. Arousal describes the degree to which a person is awoken by outside stimuli", "start_char_pos": 559, "end_char_pos": 726}, {"type": "R", "before": "Measures", "after": "Experimental measures", "start_char_pos": 729, "end_char_pos": 737}, {"type": "R", "before": "In experimental studies , emotional responsivity can be measured through various tasks, which would allow participants ' facial expressions and behavior to be recorded and sometimes coded.", "after": "Clinical studies of emotional responsivity involve two essential procedures. First, the researchers try to stimulate emotions from the participants by engaging participants in specific tasks. Then, the researchers measure the degree to which the participants respond to the stimuli.", "start_char_pos": 738, "end_char_pos": 926}, {"type": "R", "before": "measure emotional responsivity, particularly in children, include:", "after": "stimulate emotional responses include:", "start_char_pos": 941, "end_char_pos": 1007}, {"type": "A", "before": null, "after": "Picture stimuli: this task involves showing participants pleasant or unpleasant pictures and ask participants to rate the arousal and valence level of the picture. A pleasant picture could depict opposite-sex erotica; an unpleasant picture could be a burned human body. The International Affective Picture System is a photo database that generates pictures designed to arouse specific emotions. Film clips: this task asks participants to view film clips that arouse different emotions. For example, comedies\u2019 clips trigger potential feelings of joy. Neutral clips such as scenes of rainforests usually are included to serve as a control. Experimenter distress: this task involves the experimenter to stimulate emotions from participants by acting scenarios of distress. For example, the experimenter bans his or her knee and display expressions of pain .", "start_char_pos": 1008, "end_char_pos": 1008}, {"type": "R", "before": "This", "after": "this", "start_char_pos": 1025, "end_char_pos": 1029}, {"type": "A", "before": null, "after": "as", "start_char_pos": 1251, "end_char_pos": 1251}, {"type": "R", "before": "Surprise boxes: This task involves an experimenter", "after": "Yummy-yucky: in this task, a child is asked to eat a certain food that was chosen by his or her parent. An experimenter then tastes the chosen food and displays either pleased or disgusted facial expression . Surprise box: this task intends to stimulate an emotional response by", "start_char_pos": 1275, "end_char_pos": 1325}, {"type": "R", "before": "amazed reaction, by saying \"ohh\" or , a frightened reaction, by saying \"ahh.\" Experimenter distress: In this task, the experimenter bangs his or her knee, displaying distress Yummy yucky: In this task, a child is asked to eat a certain food that was chosen by his or her parent. An experimenter then tastes the chosen food and either displays a pleased or disgusted facial expression.", "after": "\u201camazed\u201d reaction by saying \u201cohh\u201d or a \u201cfrightened\u201d reaction by saying \u201cahh\u201d.", "start_char_pos": 1409, "end_char_pos": 1793}, {"type": "A", "before": null, "after": "After exposing participants to affective stimuli, researchers typically use the following methods to measure, record, and sometimes code emotional responsivity:", "start_char_pos": 1794, "end_char_pos": 1794}, {"type": "A", "before": null, "after": "Skin conductance (electrodermal activity): Skin conductivity indicates emotional arousal because increased sweat production by certain emotions increases the skin conductivity level. fMRI: this technology generates neuro-images of brain activities. fMRI can detect neurophysiological changes in the brain and thereby help determine the degree to which a person is aroused by the stimulus. For example, increased amygdala activity can be an indication of fear. Facial Action Coding System (FACS): this method uses the taxonomy of the face to measure movements of facial muscles. For example, the contraction of the orbicularis oculi muscle is an indication of happiness. Maximally Discriminative Facial Movement Coding System: this system is mostly used to measure the emotional responsivity of young children by corresponding universally recognized facial expressions to emotions. For example, lowering eyebrows indicates emotions of anger. Self-report: this method asks the participants to rate their valence and arousal level through questionnaires such as the Emotionally Expressivity Scales and the Berkley Expressivity Questionnaire. Studies have shown that self-report might not correspond to objective measures such as fMRI.", "start_char_pos": 1795, "end_char_pos": 1795}, {"type": "A", "before": null, "after": "Emotional responsivity in mental illness", "start_char_pos": 1796, "end_char_pos": 1796}, {"type": "A", "before": null, "after": "Autism Autism is associated with decreased emotional responsivity. There was a study involving twenty-six children with autism and fifteen children with other learning disabilities, in which an adult displayed some form of emotion to study how the children respond. They focused on attention, hedonic tone, latency to changes in tone and an emotional contagion summery was made. Studies show correlations between measures of joint attention, emotional contagion, and the severity of autism. Results demonstrate that children with autism did not demonstrate changes in affect; however, their responses occurred much less than in comparison groups.", "start_char_pos": 1797, "end_char_pos": 1797}, {"type": "A", "before": null, "after": "In another study involving twenty-one autism patients, FACS analysis demonstrates that people with autism display less facial responsivity when watching evocative films. Specifically, when compared to the control group, the autism group does not demonstrate the more complex muscular movements and displayed less differentiated facial responses when exposed to stimuli. This study confirms that autism impedes social interaction and cognition.", "start_char_pos": 1798, "end_char_pos": 1798}, {"type": "A", "before": null, "after": "Schizophrenia Schizophrenia impacts emotional responsivity by reducing a person\u2019s hedonic capacity and producing a blunted affect. Patients usually have an increased emotional response to displeasure and a decreased emotional response to pleasure. A study involving 22 outpatients demonstrates that schizophrenia increases the emotional responsivity to low arousing negative stimuli while decreases the emotional responsivity to high arousing positive stimuli. People with Schizophrenia exhibit fewer facial expressions when watching evocative films.", "start_char_pos": 1799, "end_char_pos": 1799}, {"type": "A", "before": null, "after": "There are differences in the arousal level of stimuli between paranoid and non-paranoid schizophrenia. Non-paranoid patients have increased negative emotional responsitivity and decreased positive emotional disregarding arousal levels. In comparison, paranoid schizophrenia has increased emotional responsivity to low arousing stimuli and reduced responsivity to high arousing stimuli. This study supports that Schizophrenia disturbs emotional experience.", "start_char_pos": 1800, "end_char_pos": 1800}, {"type": "A", "before": null, "after": "Traumatic brain injury (TBI) Traumatic brain injury is associated with reduced responsivity to negative affective stimuli. A study involving twenty-one TBI individuals uses picture stimuli to demonstrate that people TBI have normal emotional responsivity to pleasant pictures but show limited responses to unpleasant pictures. A potential explanation is that TBI damages the ventral surfaces of the frontal and temporal lobes, which are areas associated with emotional processing.", "start_char_pos": 1801, "end_char_pos": 1801}, {"type": "A", "before": null, "after": "Math anxiety Math anxiety describes the situation in which a person is overly distressed by math stimuli. A study involving fMRI techniques and 40 students demonstrates that people with math anxiety have increased emotional responsivity to math stimuli. The study suggests that when exposed to math-related stimuli, amygdala activity increases in participants' brain, which lowers the threshold of responding to a potential threat. Moreover, participants with math anxiety disengage and avoid the math stimuli more than images with negative valence such as a bleeding arm. The study suggests that math anxiety resembles other types of phobia in that there is increased vigilance and responsivity to specific stimuli.", "start_char_pos": 1802, "end_char_pos": 1802}, {"type": "R", "before": "can also be examined through psycho-physiological approaches such as : Facial electromyography Skin conductance", "after": "in substance-use", "start_char_pos": 1826, "end_char_pos": 1937}, {"type": "R", "before": "In children with sleep deprivation", "after": "Cocaine-exposed infants Using cocaine during pregnancy creates neurological damage to the fetus and neurobehavioral problems to the infants. 72 infants participated in a study where 36 infants have prenatal exposure to cocaine. The results demonstrate that compared to the control group, cocaine-exposed infants have decreased emotional responsivity, as they exhibit fewer expressions of joy, interest, surprise, anger, and sadness. Specifically, the cocaine-exposed group has reduced response to positive affective stimuli, suggesting that cocaine-exposure during pregnancy decreases feelings of joyfulness.", "start_char_pos": 1938, "end_char_pos": 1972}, {"type": "A", "before": null, "after": "Alcoholism: Alcohol consumption impairs affective processing and therefore leads to abnormal responses to environmental stimuli. A study involving 42 abstinent alcoholics and 46 nonalcoholic demonstrates that alcoholics usually have lower emotional responsivity to erotic, happy, aversive, and gruesome stimuli. However, an in-depth analysis of fMRI images reveals gender differences. Alcoholic men have reduced emotional responsivity while alcoholic women have increased emotional responsivity to positive affective stimuli. The study suggests that the gender difference is associated with different functional abnormalities of emotional processing in the cortical, subcortical, and cerebellar regions of the brain.", "start_char_pos": 1973, "end_char_pos": 1973}, {"type": "A", "before": null, "after": "Emotional responsivity in social factors", "start_char_pos": 1974, "end_char_pos": 1974}, {"type": "A", "before": null, "after": "Social interaction Emotional responsivity is said to have a unique association with social interaction. Studies suggest that social interaction, especially at home, can influence the way a child responds to emotional stimuli. For example, if child grew up in a home where emotional displays resulted in punishment or negative criticism, the child would have the tendency to find ways to hide their emotions.", "start_char_pos": 1975, "end_char_pos": 1975}, {"type": "A", "before": null, "after": "Sleep Deprivation", "start_char_pos": 1976, "end_char_pos": 1976}, {"type": "R", "before": "There", "after": "These", "start_char_pos": 2583, "end_char_pos": 2588}, {"type": "D", "before": "In children with autism", "after": null, "start_char_pos": 2731, "end_char_pos": 2754}, {"type": "R", "before": "There was a study done involving twenty six children with autism and fifteen children with other learning disabilities, in which an adult displayed some form of emotion to study how the children respond. They focused on attention, hedonic tone, latency to changes in tone and an emotional contagion summery was made. Studies showed correlations between measures of joint attention, emotional contagion, and the severity of autism. Results showed that children with autism did not demonstrate changes in affect, however their responses occurred much less than in comparison groups", "after": "Treatment: Current research suggests that future studies are required to find potential treatments of people with reduced or heightened emotional responsivity", "start_char_pos": 2755, "end_char_pos": 3334}], "sents_char_pos": [0, 96, 194, 338, 423, 545, 728, 926, 1139, 1208, 1274, 1687, 1793, 2163, 2289, 2434, 2582, 2730, 2958, 3071, 3185]}
+{"doc_id": "18843884", "revision_depth": "1", "before_revision": "Sovereign states Countries / decadesbefore/Pre-1700s1700s to 1710s1710s to 1720s1720s to 1730s1730s to 1740s1740s to 1750s1750s to 1760s1760s to 1770s1770s to 1780s1780s to 1790s1790s to 1800s1800s to 1810s1810s to 1820s1820s to 1830s1830s to 1840s1840s to 1850s1850s to 1860s1860s to 1870s1870s to 1880s1880s to 1890s1890s to 1900s1900s to 1910s1910s to 1920s1920s to 1930s1930s to 1940s1940s to 1950s1950s to 1960s1960s to 1970s1970s to 1980s1980s to 1990s1990s to 2000s2000s to 2010s2010s to 2020s2020s to presentCurrentDecades / countriesAfghanistan23px|border549-330 BC23px|border32023px|border50023px|border66123px|border750-82123px|border123123px|border136923px|border150623px|border157623px|border170923px|border173823px|border174723px|border188023px|border190123px|border191923px|border192623px|border192823px|border 23px|border1929 192923px|border193023px|border197323px|border197423px|border 23px|border1978 197823px|border198023px|border198723px|border 23px|border1992 199223px|border199623px|border199723px|border 23px|border2001 200123px|border200223px|border200423px|border201340px|borderAfghanistan23px|border549-256 BC\u00c5land23px|border156223px|border180923px|border185823px|border188323px|border191723px|border191823px|border192123px|border195440px|border\u00c5landAlbania25px138523px|border184423px|border187823px|border188123px|border190223px|border 23px|border1910 191123px|border 23px|border1912 191423px|border192023px|border192623px|border192823px|border193423px|border193923px|border194323px|border194423px|border194623px|border199223px|border200240px|borderAlbaniaAlgeria23px|border66123px|border750-77823px|border151623px|border183023px|border196240px|borderAlgeriaAndorra23px|border180623px|border 23px|border1812 1813186623px|border193423px|border193923px|border194923px|border195923px|border197140px|borderAndorraAngola23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197523px|border199623px|border199723px|border200323px|border200440px|borderAngolaAntigua and Barbuda23px|border163223px|border180123px|border187123px|border195723px|border195823px|border196223px|border196740px|borderAntigua and BarbudaArgentina23px|border153623px|border171723px|border178523px|border 23px|border1812 181223px|border 23px|border1818 181923px|border182023px|border182923px|border183523px|border185023px|border186140px|borderArgentinaArmenia23px|border549-331 BC23px|border42823px|border65423px|border750-88423px|border1236-133523px|border1468-150225px150823px|border182823px|border185823px|border188323px|border188523px|border 23px|border1918 191823px|border192223px|border193623px|border194023px|border195223px|border199040px|borderArmeniaAruba23px|border 158123px|border / 23px|border165223px|border179523px|border180623px|border181023px|border181423px|border195923px|border197640px|borderArubaAustralia23px|border177023px|border180123px|border180623px| border185423px|border190023px| border190123px|border190323px|border190823px|border195423px|border199323px|border199423px|border199823px|border199923px|border201423px|border201540px|borderAustraliaAustria23px|border123023px|border180423px|border186923px|border191823px|border193823px|border194540px|borderAustriaAzerbaijan23px|border550-330 BC23px|border66123px|border750-125823px|border1370-150723px|border157623px|border173623px|border174725px176023px|border179623px|border181323px|border185823px|border188323px|border 23px|border 23px|border1918 1918 191823px|border192023px|border192223px|border193723px|border194023px|border195223px|border199040px|borderAzerbaijanBahamas23px|border164823px|border170623px|border171823px|border180123px|border186923px|border190423px|border192323px|border195323px|border196423px|border197223px|border197323px|border200640px|borderBahamasBahrain23px|border976-107623px|border178323px|border182023px|border193223px|border197223px|border200240px|borderBahrainBangladesh23px|border135223px|border157623px|border175723px|border180123px|border185823px|border194723px|border197123px|border197240px|borderBangladeshBarbados23px|border163223px|border180123px|border188523px|border195823px|border196223px|border196640px|borderBarbadosBelarus23px|border158723px|border179323px|border185823px|border188323px|border191823px|border 23px|border1919 191923px|border193723px|border194023px|border194123px|border194423px|border195123px|border199123px| border199323px| border199523px|border201240px|borderBelarusBelgium23px|border148223px|border171323px|border179023px|border179223px|border179523px|border181523px|border 23px|border1830 183123px | border200823px|border200940px| borderBelgiumBelize23px|border151923px|border182123px|border182323px|border182523px|border183823px|border187523px|border188423px|border191923px|border198123px|border201940px|borderBelizeBenin23px|border190023px|border195823px|border197523px|border199040px|borderBeninBermuda23px|border168423px|border180123px|border187523px|border191023px|border199923px|border200223px|border200340px|borderBermudaBhutan23px|border194923px|border195623px|border196940px|borderBhutanBolivia23px|border153423px|border178523px|border182523px|border182623px|border185140px|borderBoliviaBosnia and Herzegovina25px137725px146323px|border184423px|border 23px|border1878 187823px|border190823px|border191823px|border194123px|border194623px|border199223px|border199523px|border199723px|border199840px|borderBosnia and Herzegovina23px|border144823px|border1908Botswana23px|border188523px|border196640px|borderBotswanaBrazil23px|border169723px|border 23px|border1816 181623px|border 23px|border1822 182223px|border187023px|border 23px|border1889 188923px| border190823px|border190923px| border196023px|border196823px|border199240px|borderBrazilBrunei25px136823px|border190623px|border194123px|border194523px|border195940px|borderBruneiBulgaria25px139623px|border184423px|border187823px|border190823px|border191823px|border194623px|border194823px|border196723px|border197123px|border199140px|borderBulgaria23px|border187823px|border1908Burkina Faso23px|border189623px|border195923px|border198440px|borderBurkina FasoBurundi23px|border188523px|border191923px|border196123px|border196223px|border 23px|border1966 196623px|border196723px|border198240px|borderBurundiCambodiaalt=|25x25px1431?23px|border186323px|border188723px|border194223px|border194523px|border195323px|border197023px|border197523px|border197923px|border198923px|border199223px|border199340px|borderCambodiaCameroon23px|border188423px|border191623px|border195723px|border196123px|border197540px|borderCameroon23px|border191623px|border1922Canada23px|border160623px|border170723px|border180123px|border186823px|border192123px|border195723px|border196423px|border196540px|borderCanada23px|border166323px|border1715Cape Verde23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197523px|border199240px|borderCape VerdeCayman Islands23px|border167023px|border180123px|border195823px|border199940px|borderCayman IslandsCentral African Republic23px|border190323px|border195840px|borderCentral African RepublicChad23px70023px|border138023px|border190023px|border195940px|borderChadChile23px|border154123px|border171723px|border178523px|border181223px|border 23px|border1817 181740px|borderChileChina25px164423px|border189023px|border191223px|border191523px|border191623px|border191723px|border192823px|border194940px|borderChina, People's Republic ofColombia23px|border152523px|border178523px|border181123px|border181423px|border181623px|border181923px|border 23px|border1820 182123px|border183123px|border183423px|border 23px|border1861 186140px|borderColombiaComoros23px|border188723px|border196323px|border197523px|border197823px|border199223px|border199623px|border200140px|borderComorosCongo, Democratic Republic of the23px|border187723px| border195923px| border196023px|border196323px|border196623px|border197123px|border199723px|border200323px|border200640px|borderCongo, Democratic Republic of theCongo, Republic of the23px|border189123px|border195823px|border197023px|border199140px|borderCongo, Republic of theCook Islands23px|border185823px|border188823px|border189323px|border190123px|border190223px|border197323px|border197940px|borderCook IslandsCosta Rica23px|border150623px|border1821 23px|border182123px|border182323px|border 23px|border 23px|border1824 1824 182423px|border184023px|border184223px|border184823px|border190640px|borderCosta RicaCroatia23px|border152723px|border180923px|border181523px|border184823px|border185223px|border186823px|border 23px|border1918 191823px|border193923px|border194123px|border194323px|border194523px|border199023px|border199040px|borderCroatiaCura\u00e7ao23px|border 158123px|border / 23px|border165223px|border179523px|border180623px|border181023px|border181423px|border195923px|border198140px|borderCura\u00e7aoCuba23px|border150623px|border178523px|border187323px|border189823px|border190223px|border190623px|border190823px|border190923px|border195940px|borderCubaCyprus23px|border545 BC23px|border321-305 BC23px|border66823px|border750-96523px|border119223px|border148925px157123px|border184423px|border187823px|border188123px|border192223px|border 23px|border196023px|border200423px|border200640px|borderCyprusCzech Republicalt=|border|23x23px119823px|border180423px|border186923px|border191823px|border192023px|border193923px|border193923px|border194523px|border/23px|border196923px| border199223px| border199340px|borderCzech RepublicDenmark23px|border121923px|border139623px|border150040px|borderDenmarkDjibouti23px|border184423px|border189623px|border197740px|borderDjiboutiDominica23px|border166323px|border171523px|border176323px|border180123px|border187123px|border194023px|border195823px|border196223px|border197823px|border198123px|border198823px|border199040px|borderDominicaDominican Republic23px|border150623px|border179523px|border180823px|border182123px|border184423px|border184923px|border186123px|border186540px|borderDominican RepublicEast Timor23px|border170223px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border194223px|border194523px|border197523px|border197523px|border197623px|border199923px|border200240px|borderEast TimorEcuador23px|border153423px|border178523px|border180923px|border181223px|border182023px|border 23px|border1822 182223px|border183023px|border183523px|border 23px|border1845 184523px|border186023px|border190023px|border200940px|borderEcuadorEgypt23px|border525-404 BC23px|border343 BC23px|border332-323 BC23px|border619-62923px|border66123px|border750-96923px|border184423px|border188223px|border192223px|border195123px|border195223px|border195823px|border197223px|border198440px|borderEgyptEl Salvador23px|border151923px|border182123px|border182323px|border182523px|border183923px|border186523px|border187323px|border1875/187723px|border189823px|border190023px|border191240px|borderEl SalvadorEquatorial Guinea23px|border166723px|border170723px|border175023px|border177823px|border178523px|border193123px|border193623px|border193823px|border194523px|border196823px|border197323px|border197940px|borderEquatorial GuineaEritrea23px|border189023px|border194123px|border194123px|border195223px|border197423px|border198723px|border199123px|border199323px|border199540px|borderEritreaEstonia23px|border156223px|border172123px|border191823px|border191923px|border192023px|border192123px|border192223px|border192323px|border194023px|border194123px|border194423px|border195323px|border199023px|border200123px|border200240px|borderEstoniaEswatini23px|border189023px|border189423px|border190323px|border196823px|border201140px|borderEswatiniEthiopia25px185325px187525px189123px|border189723px|border191423px|border193623px|border194123px|border197423px|border198723px|border199123px|border199623px|border200940px|borderEthiopiaFaroe Islands23px|border121923px|border194040px|borderFaroe IslandsFiji23px|border 186523px|border186723px|border186923px|border187123px|border187823px|border192423px|border197023px|border201523px|border201640px|borderFijiFinland23px|border156223px|border180923px|border185823px| border186323px| border188323px|border191723px|border191840px|borderFinlandFrance23px|border164323px|border179023px|border179423px|border181423px|border183023px|border194023px|border194423px|border195823px|border197640px|borderFranceFrench Guiana23px|border164323px|border179423px|border181423px|border183023px|border195823px|border197623px|border199540px|borderFrench GuianaFrench Polynesia23px|border164323px|border179023px|border179423px|border181423px|border183023px|border197623px|border198440px|borderFrench PolynesiaGabon23px|border190323px|border195923px|border196040px|borderGabonGambia23px|border178323px|border180123px|border196540px|borderGambiaGeorgia23px|border1008-149023px|border176223px|border180123px|border185823px|border188323px|border 23px|border1918 191823px|border192123px|border192223px|border193723px|border195123px|border199023px|border200440px|borderGeorgiaGermany23px|border1400 23px|border143323px|border180623px|border181523px|border181723px|border181823px|border183223px|border183323px|border184823px|border186723px|border191823px|border191923px|border192623px|border192723px|border23px|border193323px|border193525px194425px194625px194725px194823px|border23px|border194923px|border23px|border199040px|borderGermany23px|border194923px|border1959Ghana23px|border182123px|border187723px|border195723px|border196123px|border196423px|border196640px|borderGhana23px|border161223px|border179523px|border180623px|border181023px|border1814Greece23px|border33023px|border126123px|border176923px|border182223px|border183323px|border186223px|border196723px|border197023px|border197523px|border197840px|borderGreece23px|border1822 naval ensignGreenland23px|border160623px|border197323px|border198323px|border198423px|border198523px|border199123px|border199223px|border199340px|borderGreenlandGrenada23px|border166323px|border171523px|border176323px|border177923px|border178323px|border180123px|border187523px|border190323px|border195823px|border196223px|border196723px|border197440px|borderGrenadaGuam23px|border188523px|border189923px|border191423px|border191923px|border194423px|border194723px|border194840px|borderGuamGuatemala23px|border151923px|border182123px|border182323px|border182523px|border183823px|border184323px|border185123px|border185823px|border187140px|borderGuatemalaGuinea23px|border189823px|border195840px|borderGuineaGuinea-Bissau23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197440px|borderGuinea-BissauGuyana23px|border158123px|border179523px|border180623px|border181023px|border181423px|border187523px|border190623px|border191923px|border195523px|border196640px|borderGuyanaHaiti23px|border166323px|border171523px|border179023px|border179123px|border179823px|border180323px|border180423px|border180623px|border181123px|border182123px|border184923px|border185923px|border196423px|border198640px|borderHaitiHonduras23px|border151923px|border182123px|border182323px|border182523px|border183823px|border186623px|border189823px|border189840px|borderHondurasHong Kong23px|border184323px|border187123px|border187623px|border194123px|border194523px|border195523px|border195923px|border199740px|borderHong KongHungary25px89525px104625px117225pxc. 119625pxc. 130125px130125px1387border|23px144625pxc. 145325px145825px150625px1516-1526border|23px1794border|23px1848border|23px1848\u20131849border|23px1867\u20131869border|23px1869\u20131918border|23px1896\u2013191523px|border191823px|border191923px|border191923px|border194023px|border194623px|border194923px|border195623px|border195623px|border23px|border195740px|borderHungaryIceland23px|border153623px|border180923px|border181023px|border190023px|border191823px|border194440px|borderIcelandIndia23px|border152623px|border185823px|border190423px|border190623px|border190723px|border190823px|border191723px|border192123px|border193123px|border194740px|borderIndia25px167423px|border177323px|border1910Indonesia23px|border1293alt=|25px|border160223px|border164023px|border180023px|border194223px|border194540px|borderIndonesiaIran23px|border66123px|border750-125823px|border1370-150723px|border157623px|border173623px|border174725px176023px|border179623px|border184923px|border1905/1906/190723px|border1925/193323px|border196423px|border198040px|borderIranIraq23px|border539-330 BC23px|border66123px|border750-94523px|border1194-125823px|border1394-145125px153423px|border184423px|border192123px|border195823px|border195923px|border196323px|border199123px|border200423px|border200723px|border200840px|borderIraq23px|border1194-1258Ireland23px|border154223px|border180123px|border191923px|border192240px|borderIrelandIsrael25px151623px|border184423px|border192023px|border194823px|border194840px| borderIsraelItaly23px | border100 BC23px | border141623px | border1785 File:Flag of the Repubblica Transpadana.svg | 23px|border 179623px | border180223px|border181523px|border185123px|border186123px|border23px| border194623px|border200323px|border200640px|borderItaly23px| border110023px | border181623px|border194323px|border113023px|border152523px|border149323px|border75423px|border697/1659Ivory Coast23px|border189623px|border195940px|borderIvory CoastJamaica23px|border165523px|border180123px|border187523px|border190623px|border195723px|border195823px|border195923px|border196023px|border196123px|border196240px|borderJamaicaJapan23px|border70123px|border187023px|border199940px|borderJapanJordan23px|border539-330 BC23px|border66123px|border750-96925px151623px|border184423px|border192023px|border192123px|border195823px|border195840px|borderJordanKazakhstan23px|border1220-144023px|border145623px|border182223px|border185823px|border188323px|border191523px|border23px|border23px|border23px|border23px|border23px|border23px|border23px|border23px|border192023px|border23px|border23px|border23px|border23px|border23px|border23px|border192723px|border193223px|border193723px|border194023px|border195323px|border199023px|border199123px|border199240px|borderKazakhstanKenya23px|border188523px|border188523px|border192123px|border196340px|borderKenyaKiribati23px|border189223px|border193723px|border194223px|border194323px|border197940px|borderKiribatiKorea, North25px96025px180025px185623px|border188223px|border188223px|border1888189323px|border189323px|border189923px|border191023px|border194523px|border 23px|border1946 194623px|border194823px|border199240px|borderKorea, NorthKorea, South23px|border194525px|border194825px|border194925px|border198425px|border199725px|border201140px|borderKorea, SouthKosovo25px|border128125px|border134625px145425px|border184425px|border191225px|border191825px|border194125px|border194325px|border194625px|border 25px|border199225px|border200425px|border200525px|border200625px|border200725px|border200840px|borderKosovoKuwait23px|border152123px175223px|border184423px|border189923px|border191423px|border192123px|border194023px|border196140px|borderKuwaitKyrgyzstan23px|border97623px|border187623px|border188323px|border191823px|border193623px|border195223px|border199123px|border199223px|border201023px|border201123px|border201240px|borderKyrgyzstanLaos23px|border170723px|border189323px|border195223px|border197540px|borderLaosLatvia23px|border156223px|border166123px|border169223px|border172123px|border191723px|border191823px|border191923px|border192023px| border193623px| border194023px|border194123px|border194423px|border195323px|border199040px|borderLatviaLebanon23px|border538-332 BC23px|border750-87623px|border905-96925px151623px|border151623px|border169725px184023px|border184423px|border191823px|border192023px|border194340px|borderLebanonLesotho23px|border179523px|border180123px|border187523px|border188423px|border196623px|border198723px|border200640px|borderLesothoLiberia23px|border182723px|border184740px|borderLiberiaLibya23px|border525-331 BC23px|border66323px|border750-96923px|border171123px|border191223px|border195123px|border196923px|border197223px|border197723px|border201140px|borderLibyaLiechtenstein23px|border140023px|border171923px|border185223px|border192123px|border193723px|border198240px|borderLiechtensteinLithuania23px|border158723px|border179523px|border185823px|border188323px|border191823px|border194023px|border194123px|border194423px|border195323px|border198823px|border200440px|borderLithuaniaLuxembourg23px|border148223px|border171523px|border179523px|border181523px|border184523px|border194023px|border194440px|borderLuxembourgMacau23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197523px|border199940px|borderMacauMadagascar23px|border 178723px|border188523px|border189623px|border195840px|borderMadagascarMalawi23px|border190723px|border195323px|border196323px|border196423px|border201023px|border201240px|borderMalawiMalaysia23px|border164123px|border/alt=|border|23x23px179523px|border / 23px|border180123px|border181823px|border / 23px|border182423px|border189623px|border194223px|border194523px|border194823px|border194923px|border196340px|borderMalaysiaMaldives23px|border179623px|border190323px|border192623px|border195323px|border195423px|border196540px|borderMaldivesMali23px|border189223px|border195823px|border195923px|border196140px|borderMaliMalta23px|border870-90923px|border153023px|border179823px|border 23px|border1800 180123px|border181423px|border187523px|border189823px|border192323px|border194323px|border196440px|borderMaltaMarshall Islands23px|border188523px|border188923px|border191423px|border191923px|border194423px|border194723px|border196523px|border197940px|borderMarshall IslandsMauritania23px|border190023px|border195923px|border201723px|border202040px|borderMauritaniaMauritius23px|border166623px|border171023px|border178923px|border181023px|border186923px|border190623px|border192323px|border196840px|borderMauritiusMexico23px|border151923px|border182123px|border182123px|border182323px|border186423px|border186723px|border189323px|border191623px|border193423px|border196840px|borderMexicoMicronesia23px|border188523px|border189923px|border191423px|border191923px|border194423px|border194723px|border196523px|border197940px|borderMicronesiaMoldova23px|border139623px|border183423px|border186623px|border188323px|border191723px|border191923px|border192523px|border193723px|border193823px|border194023px|border195223px|border199040px|borderMoldova23px|border185923px|border186223px|border1867Monaco23px|border179323px|border188123px|border194223px|border194540px|borderMonacoMongolia25px186223px|border189023px191123px192423px193023px|border194023px|border194523px|border199223px|border201140px|borderMongoliaMontenegro25px|border128125px|border134623px|border169623px|border185123px|border187623px|border190525px|border191823px|border191823px|border194623px|border199223px|border199423px|border200323px|border2004/200640px|borderMontenegroMorocco23px|border166623px|border191323px|border195640px|borderMorocco23px|border1921Mozambique23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197423px|border197523px|border198323px|border198340px|borderMozambiqueMyanmar23px|border175323px|border188523px|border193723px|border194323px|border194523px|border194823px|border197423px|border200623px|border201023px|border201923px|border202040px|borderMyanmarNamibia23px|border188423px|border191523px|border192823px|border198223px|border199040px|borderNamibiaNauru23px|border188823px|border188923px|border 23px|border 23px|border191423px|border194223px|border 23px|border 23px|border194523px|border196840px|borderNauruNepalframeless|56x56px 1768frameless|37x37px185625pxc.193025px196242pxNepalNetherlands23px|border 158123px|border / 23px|border165223px|border179523px|border180623px|border181023px|border181440px|borderNetherlandsNew Zealand23px|border176923px|border183423px|border184023px|border186723px|border190223px| border201423px| border201523px|border201623px|border201723px|border201840px|borderNew ZealandNicaragua23px|border152423px|border182323px|border182523px|border183923px|border185823px|border188923px|border189323px|border189623px|border190823px|border197140px|borderNicaraguaNiger23px|border192223px|border195940px|borderNigerNigeria23px|border188623px|border190023px| border1958/195923px |border196023px|border196723px|border197040px|borderNigeria23px|border1967New Caledonia23px|border164323px|border179023px|border179423px|border181423px|border183023px|border197623px|border199140px|borderNew CaledoniaNiue23px|border176923px|border183423px|border184023px|border186723px|border190223px|border197540px|borderNiueNorth Macedonia23px|border479 BC23px|border324-148 BC25px|border128125px|border134625pxc. 145323px|border184423px|border 23px|border1903 190325px|border191223px|border191823px|border194123px|border194423px|border194623px|border199223px|border199323px|borderearly 199423px|border199423px|borderearly 199523px|border199540px|borderNorth MacedoniaNorway23px|border153623px|border1814 182123px|border1818 184423px|border1821 184423px|border184423px|border189923px|border1905/190640px|borderNorwayOman23px|border185623px|border197023px|border199540px|borderOmanPakistan23px|border550-330 BC23px|border329-323 BC23px|border240-41023px|border670-86023px|border854-101123px|border1227-135123px|border152623px|border174723px176123px|border184923px|border185823px|border188023px|border194740px|borderPakistanPalau23px|border188523px|border189923px|border191423px|border191923px|border194423px|border194723px|border196523px|border198140px|borderPalauPalestine25px151623px|border184423px|border192023px|border194823px|border194923px|border195823px|border195823px|border196723px|border198223px|border199440px|borderPalestine23px|border194923px|border195223px|border1958Panama23px|border151023px|border171723px|border178523px|border181123px|border181623px|border181923px|border182023px|border182123px|border183423px|border186123px|border190223px|border190323px|border192523px|border201740px|borderPanamaPapua New Guinea23px|border188423px|border190623px|border194223px|border194523px|border194923px|border196523px|border197023px|border197140px|borderPapua New Guinea23px|border188423px|border188923px|border191423px|border1945Paraguay23px|border153723px|border171723px|border178523px|border 23px|border 23px|border1811 1811 181123px|border181223px|border182623px|border184223px|border195423px|border198823px|border199023px|border2013/201540px|borderParaguayPeru23px|border 23px|border1532 153223px|border171723px|border178523px|border 23px|border1820 182023px|border 23px|border1822 182223px|border182523px|border182523px|border182523px|border195040px|borderPeru23px|border1836Philippines23px|border1515 23px|border190223px|border190823px|border191223px|border191923px|border193623px|border194223px|border194323px|border194523px|border198523px|border198523px|border198623px|border199523px|border199623px|border199723px|border199823px|border201023px|border201123px|border201623px|border201740px|borderPhilippines23px|border1985Poland25pxc. 1605Partitions179523px|border180723px|border181523px|border181523px|border186323px|border191923px|border192823px|border194423px| border198023px | border200123px|border200240px| borderPolandPortugal23px|border721-75023px|border166723px|border170723px|border175023px|border181623px|border182623px|border/23px|border183023px|border190823px|border1910/191123px|border191240px|borderPortugal23px|border/23px|border1830 (sea)Puerto Rico23px|border150623px|border170123px|border176023px|border178523px|border187323px|border189523px|border195240px|borderPuerto RicoQatar23px|border661-75025px181823px|border187223px|border191623px|border193223px|border193623px|border194923px|border197140px|borderQatarRomania23px|border168 BC23px|border133023px|border183423px|border184823px|border185923px|border186223px|border186723px|border 23px|border194823px|border195223px|border196523px|border198923px|border198940px|borderRomania23px|border111123px|border139623px|border1834Russia23px|border1283-129423px|border166823px|border172123px|border185823px|border188323px|border191423px|border191723px|border 23px|border191823px|border192223px|border192323px|border192423px|border193623px|border195523px|border199123px|border199340px|borderRussia23px|border193723px|border1954Rwanda23px|border188523px|border191923px|border195923px|border196123px|border196223px|border200140px|borderRwandaSahrawi Arab Democratic Republic23px|border188423px|border193123px|border193623px|border193823px|border194523px|border197640px|borderSahrawi Arab Democratic RepublicSaint Kitts and Nevis23px|border162623px|border171323px|border180123px|border187123px|border195823px|border196223px|border196723px|border198340px|borderSaint Kitts and Nevis23px|border1663Saint Lucia23px|border166323px|border171523px|border174323px|border175623px|border176223px|border176323px|border177823px|border178323px|border178923px|border179623px|border180123px|border180223px|border180323px|border190323px|border193923px|border196223px|border196723px|border197923px|border200240px|borderSaint LuciaSaint Vincent and the Grenadines23px|border166323px|border171523px|border176323px|border177823px|border178323px|border180123px|border190323px|border196223px|border197923px|border 23px|border1985 198540px|borderSaint Vincent and the GrenadinesSamoa23px|border185823px|border187323px|border187923px|border188723px|border190023px|border191423px|border192223px|border194823px|border194940px|borderSamoaSan Marino23px|border146523px|border186223px|border201140px|borderSan MarinoS\u00e3o Tom\u00e9 and Pr\u00edncipe23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197540px|borderS\u00e3o Tom\u00e9 and Pr\u00edncipeSaudi Arabia23px|border66123px|border750-94525px151723px|border / 23px|border174425px181823px|border182423px|border189123px|border190223px|border192623px|border193223px|border193423px|border193823px|border197340px|borderSaudi Arabia23px|border184423px|border1920Senegal23px|border164323px|border178923px|border181423px|border183023px|border195823px|border195923px|border196040px|borderSenegalSerbia25px|border128125px|border1346border|25px180423px|border183525px|border188223px|border191823px|border194123px|border194623px|border 23px|border1992 199223px|border200323px|border200423px|border201040px|borderSerbiaSeychelles23px|border175623px|border181123px|border190323px|border196123px|border197623px|border197723px|border199640px|borderSeychellesSierra Leone23px|border179223px|border180123px|border188923px|border196140px|borderSierra LeoneSingaporealt=|border|23x23px169923px|border / 23px|border181923px|border1874alt=|border|23x23px192523px|border1942alt=|border|23x23px194523px|border194623px|border195923px|border196323px|border196540px|borderSingaporeSlovakiaalt=|28px82523px|border180423px|border186923px|border191823px|border192023px|border193823px|border194523px|border199240px|borderSlovakiaSlovenia23px|border133523px|border180323px|border181323px|border186923px|border 23px|border1918 191823px|border194323px|border194523px|border198823px|border198923px|border199023px|border199140px|borderSloveniaSolomon Islands23px|border188623px|border190623px|border194223px|border194523px|border194723px|border195623px|border196623px|border197740px|borderSolomon Islands23px|border1893Somalia23px|border141523px|border188823px|border189623px|border1888/192023px|border194623px|border196040px|borderSomaliaSouth Africa23px|border165223px|border166423px|border179523px|border180123px|border187523px|border191023px|border191223px|border192723px|border192823px|border198223px| border199323px| border199440px|borderSouth Africa23px|border1854South Sudan23px|border184423px|border188223px|border188523px|border189923px|border192223px|border195223px|border195623px|border197023px|border2005/201140px|borderSouth SudanSpain23px|border661-75023px|border150623px|border170123px|border176023px|border178523px|border 23px|border1873 187523px|border193123px|border193623px|border193823px|border194523px|border197723px|border198140px|borderSpainSri Lanka23px|border159323px|border181523px|border194823px|border195123px|border197240px|borderSri LankaSudan23px|border184423px|border188223px|border188523px|border189923px|border192223px|border195223px|border195623px|border197040px|borderSudanSuriname23px|border158123px|border179523px|border180623px|border181023px|border181423px|border195923px|border197540px|borderSurinameSweden23px|border156225px181523px|border184423px|border1905/190640px|borderSwedenSwitzerland23px|border147023px|border179823px|border180323px|border188940px|borderSwitzerlandSyria23px|border539-331 BC23px|border750-89023px|border905-99023px|border1395-140525px151623px|border184423px|border 23px|border1920 192023px|border192223px|border193223px|border195825px|boder196123px|border196323px|border197223px|border198040px|borderSyriaTaiwanalt=|25px|border1624alt=|25px|border1640alt=|25px|border166125px168323px|border189023px|border189523px|border189523px|border194540px|borderChina, Republic of Taiwanborder|alt=|25x25px 1626Tajikistan23px|border186923px|border188323px|border191823px|border192123px|border 23px|border1929 23px|border193123px|border193523px|border193623px|border193823px|border194023px|border195323px|border199123px|border199240px|borderTajikistanTanzania23px|border188523px|border191923px|border196123px|border196440px|borderTanzania23px|border1964Thailand23px|border168023px|border178223px|border181723px|border1843alt=|border|23x23px189323px|border191623px|border / alt=|border|23x23px191723px|border / 23px|border201123px|border / 23px|border / 23px|border201740px|borderThailandTogo23px|border188423px|border191423px|border195723px|border195823px|border196040px|borderTogoTonga23px|border185823px|border186223px|border187540px|borderTongaTrinidad and Tobago23px|border149823px|border179623px|border180123px|border188923px|border196240px|borderTrinidad and TobagoTunisia25px157423px|border183123px|border197423px|border197423px|border199940px|borderTunisiaTurkey23px|border550 BC23px|border334-306 BC25px145323px|border184423px|border193640px|borderTurkey23px|border1453Turkmenistan23px|border151723px|border186823px|border188323px|border191723px|border192023px|border192223px|border192623px|border193723px|border194023px|border195323px|border199223px|border199723px|border200140px|borderTurkmenistanTuvalu23px|border189223px|border193723px|border197623px|border197823px|border 23px|border1995 199623px|border199740px|borderTuvaluUganda23px|border189423px|border191423px|border 23px|border1962 196240px|borderUgandaUkraine23px|border1240-126123px170023px|border179323px|border185823px|border188323px|border23px|border191723px|border191823px|border191923px|border192923px|border193723px|border194123px|border194423px|border194923px|border199123px|border199240px|borderUkraineUnited Arab Emirates23px|border224-62923px|border66123px|border750-125823px|border189223px|border195023px|border197140px|borderUnited Arab EmiratesUnited Kingdom23px|border51923px|border119823px|border126523px|border160623px|border170723px|border180140px|borderUnited Kingdom23px|border/23px|border154223px|border160623px|border1485United States of America23px|border160623px|border170723px|border177523px|border177723px|border179523px|border181823px|border 23px|border1819 182023px|border182223px|border183623px|border183723px|border 23px|border1845 184623px|border 23px|border1847 184823px|border185123px|border185823px|border185923px|border186123px|border186323px|border186523px|border186723px|border187723px|border189023px|border189123px|border189623px|border190823px|border191223px|border195923px|border/23px|border196040px|borderUnited States of America23px|border186123px|border186323px|border186523px|border2016Uruguay23px|border162423px|border171723px|border178523px|border181223px|border181523px|border182123px|border182223px|border182823px|border183040px|borderUruguayUzbekistan23px|border530 BC23px|border330-312 BC23px|border66123px|border750-81923px|border1206-122623px|border1370-151125px178523px|border192023px|border192423px|border195323px|border199140px|borderUzbekistanVanuatu23px|border188723px|border190623px|border195323px|border198040px|borderVanuatu23px|border190623px|border194023px|border1945Vatican City23px|border75423px|border180323px|border182523px|border184923px|border184923px|border187023px|border192940px|borderVatican CityVenezuela23px|border152223px|border178523px|border181123px|border 23px|border1812 181323px|border181423px|border 23px|border1817 181723px|border181923px|border182023px|border182123px|border183623px|border 23px|border1859 185923px|border186323px|border190523px|border193023px|border195423px|border200640px|borderVenezuelaVietnamalt=|23x23px|Vietnam177823px|Vietnam178823px|Vietnam180223px|border188523px|border188723px|border189023px|border192023px|border194523px|border195523px|border197640px|borderVietnam23px|border7/1945 23px|border9/194523px|border194623px|border194823px|border1975Wallis and Futuna23px|border164323px|border179023px|border179423px|border181423px|border183023px|border184223px|border186023px|border188623px|border188723px|border191023px|border195823px|border198540px|borderWallis and FutunaYemen23px|border187223px|border1918192323px|border192723px|border196223px|border199040px|borderYemen23px|border188623px|border193723px|border196223px|border1967Zambia23px|border192423px|border195323px|border196323px|border196423px|border199640px|borderZambiaZimbabwe23px|border189623px|border192323px|border195323px|border196423px|border196823px|border 197923px|border late 197923px|borderearly 198023px|border198040px|borderZimbabweCountries / decadesbeforeCurrentDecades / countries1700s to 1710s1710s to 1720s1720s to 1730s1730s to 1740s1740s to 1750s1750s to 1760s1760s to 1770s1770s to 1780s1780s to 1790s1790s to 1800s1800s to 1810s1810s to 1820s1820s to 1830s1830s to 1840s1840s to 1850s1850s to 1860s1860s to 1870s1870s to 1880s1880s to 1890s1890s to 1900s1900s1910s1920s1930s1940s1950s1960s1970s1980s1990s2000s2010s2020s Other flags Other flags / decadesBefore1700s1710s1720s1730s1740s1750s1760s1770s1780s1790s1800s1810s1820s1830s1840s1850s1860s1870s1880s1890s1900s1910s1920s1930s1940s1950s1960s1970s1980s1990s2000s2010s2020sCurrentDecades / Other flagsAntarctica23px|border197823px|border199523px| border199623px|border200723px|border200840pxAntarcticaArgentine Antarctica23px|border194323px|border199940pxArgentine AntarcticaBritish Antarctic Territory23px|border190823px|border192523px|border194823px|border196340pxBritish Antarctic TerritoryChilean Antarctic Territory23px|border194023px|border199740pxChilean Antarctic TerritoryEuropean Union23px|border195323px|border195540pxEuropean UnionFrench Southern and Antarctic Territories23px|border184023px|border195823px|border197623px|border200740pxFrench Southern and Antarctic TerritoriesJohnston Atoll23px|border185823px|border185923px|border186123px|border186323px|border186523px|border186723px|border187723px|border189023px|border189123px|border189623px|border190823px|border191223px|border195923px|border/23px|border196023px|border200140px|borderJohnston AtollMidway Atoll23px|border185923px|border186123px|border186323px|border186523px|border186723px|border187723px|border189023px|border189123px|border189623px|border190823px|border191223px|border195923px|border/23px|border196023px|border200040px|borderMidway AtollRoss Dependency23px|border192323px|border199540pxRoss DependencyUnited Nations23px|border194323px|border194523px|border194640pxUnited NationsWake Island23px|border189923px|border190823px|border191223px|border195923px|border/23px|border196023px|border200140px|borderWake IslandOther flags / decadesbeforeCurrentDecades / Other flags1700s1710s1720s1730s1740s1750s1760s1770s1780s1790s1800s1810s1820s1830s1840s1850s1860s1870s1880s1890s1900s1910s1920s1930s1940s1950s1960s1970s1980s1990s2000s2010s2020s", "after_revision": "Sovereign states Countries / decadesbefore/Pre-1700s1700s to 1710s1710s to 1720s1720s to 1730s1730s to 1740s1740s to 1750s1750s to 1760s1760s to 1770s1770s to 1780s1780s to 1790s1790s to 1800s1800s to 1810s1810s to 1820s1820s to 1830s1830s to 1840s1840s to 1850s1850s to 1860s1860s to 1870s1870s to 1880s1880s to 1890s1890s to 1900s1900s to 1910s1910s to 1920s1920s to 1930s1930s to 1940s1940s to 1950s1950s to 1960s1960s to 1970s1970s to 1980s1980s to 1990s1990s to 2000s2000s to 2010s2010s to 2020s2020s to presentCurrentDecades / countriesAfghanistan23px|border549-330 BC23px|border32023px|border50023px|border66123px|border750-82123px|border123123px|border136923px|border150623px|border157623px|border170923px|border173823px|border174723px|border188023px|border190123px|border191923px|border192623px|border192823px|border 23px|border1929 192923px|border193023px|border197323px|border197423px|border 23px|border1978 197823px|border198023px|border198723px|border 23px|border1992 199223px|border199623px|border199723px|border 23px|border2001 200123px|border200223px|border200423px|border201340px|borderAfghanistan23px|border549-256 BC\u00c5land23px|border156223px|border180923px|border185823px|border188323px|border191723px|border191823px|border192123px|border195440px|border\u00c5landAlbania25px138523px|border184423px|border187823px|border188123px|border190223px|border 23px|border1910 191123px|border 23px|border1912 191423px|border192023px|border192623px|border192823px|border193423px|border193923px|border194323px|border194423px|border194623px|border199223px|border200240px|borderAlbaniaAlgeria23px|border66123px|border750-77823px|border151623px|border183023px|border196240px|borderAlgeriaAndorra23px|border180623px|border 23px|border1812 1813186623px|border193423px|border193923px|border194923px|border195923px|border197140px|borderAndorraAngola23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197523px|border199623px|border199723px|border200323px|border200440px|borderAngolaAntigua and Barbuda23px|border163223px|border180123px|border187123px|border195723px|border195823px|border196223px|border196740px|borderAntigua and BarbudaArgentina23px|border153623px|border171723px|border178523px|border 23px|border1812 181223px|border 23px|border1818 181923px|border182023px|border182923px|border183523px|border185023px|border186140px|borderArgentinaArmenia23px|border549-331 BC23px|border42823px|border65423px|border750-88423px|border1236-133523px|border1468-150225px150823px|border182823px|border185823px|border188323px|border188523px|border 23px|border1918 191823px|border192223px|border193623px|border194023px|border195223px|border199040px|borderArmeniaAruba23px|border 158123px|border / 23px|border165223px|border179523px|border180623px|border181023px|border181423px|border195923px|border197640px|borderArubaAustralia23px|border177023px|border180123px|border180623px| border190123px|border190323px|border190823px|border195423px|border199323px|border199423px|border199823px|border199923px|border201423px|border201540px|borderAustraliaAustria23px|border123023px|border180423px|border186923px|border191823px|border193823px|border194540px|borderAustriaAzerbaijan23px|border550-330 BC23px|border66123px|border750-125823px|border1370-150723px|border157623px|border173623px|border174725px176023px|border179623px|border181323px|border185823px|border188323px|border 23px|border 23px|border1918 1918 191823px|border192023px|border192223px|border193723px|border194023px|border195223px|border199040px|borderAzerbaijanBahamas23px|border164823px|border170623px|border171823px|border180123px|border186923px|border190423px|border192323px|border195323px|border196423px|border197223px|border197323px|border200640px|borderBahamasBahrain23px|border976-107623px|border178323px|border182023px|border193223px|border197223px|border200240px|borderBahrainBangladesh23px|border135223px|border157623px|border175723px|border180123px|border185823px|border194723px|border197123px|border197240px|borderBangladeshBarbados23px|border163223px|border180123px|border188523px|border195823px|border196223px|border196640px|borderBarbadosBelarus23px|border158723px|border179323px|border185823px|border188323px|border191823px|border 23px|border1919 191923px|border193723px|border194023px|border194123px|border194423px|border195123px|border199123px| border199523px|border201240px|borderBelarusBelgium23px|border148223px|border171323px|border179023px|border179223px|border179523px|border181523px|border 23px|border1830 183140px | borderBelgiumBelize23px|border151923px|border182123px|border182323px|border182523px|border183823px|border187523px|border188423px|border191923px|border198123px|border201940px|borderBelizeBenin23px|border190023px|border195823px|border197523px|border199040px|borderBeninBermuda23px|border168423px|border180123px|border187523px|border191023px|border199923px|border200223px|border200340px|borderBermudaBhutan23px|border194923px|border195623px|border196940px|borderBhutanBolivia23px|border153423px|border178523px|border182523px|border182623px|border185140px|borderBoliviaBosnia and Herzegovina25px137725px146323px|border184423px|border 23px|border1878 187823px|border190823px|border191823px|border194123px|border194623px|border199223px|border199523px|border199723px|border199840px|borderBosnia and Herzegovina23px|border144823px|border1908Botswana23px|border188523px|border196640px|borderBotswanaBrazil23px|border169723px|border 23px|border1816 181623px|border 23px|border1822 182223px|border187023px|border 23px|border1889 188923px| border196023px|border196823px|border199240px|borderBrazilBrunei25px136823px|border190623px|border194123px|border194523px|border195940px|borderBruneiBulgaria25px139623px|border184423px|border187823px|border190823px|border191823px|border194623px|border194823px|border196723px|border197123px|border199140px|borderBulgaria23px|border187823px|border1908Burkina Faso23px|border189623px|border195923px|border198440px|borderBurkina FasoBurundi23px|border188523px|border191923px|border196123px|border196223px|border 23px|border1966 196623px|border196723px|border198240px|borderBurundiCambodiaalt=|25x25px1431?23px|border186323px|border188723px|border194223px|border194523px|border195323px|border197023px|border197523px|border197923px|border198923px|border199223px|border199340px|borderCambodiaCameroon23px|border188423px|border191623px|border195723px|border196123px|border197540px|borderCameroon23px|border191623px|border1922Canada23px|border160623px|border170723px|border180123px|border186823px|border192123px|border195723px|border196423px|border196540px|borderCanada23px|border166323px|border1715Cape Verde23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197523px|border199240px|borderCape VerdeCayman Islands23px|border167023px|border180123px|border195823px|border199940px|borderCayman IslandsCentral African Republic23px|border190323px|border195840px|borderCentral African RepublicChad23px70023px|border138023px|border190023px|border195940px|borderChadChile23px|border154123px|border171723px|border178523px|border181223px|border 23px|border1817 181740px|borderChileChina25px164423px|border189023px|border191223px|border191523px|border191623px|border191723px|border192823px|border194940px|borderChina, People's Republic ofColombia23px|border152523px|border178523px|border181123px|border181423px|border181623px|border181923px|border 23px|border1820 182123px|border183123px|border183423px|border 23px|border1861 186140px|borderColombiaComoros23px|border188723px|border196323px|border197523px|border197823px|border199223px|border199623px|border200140px|borderComorosCongo, Democratic Republic of the23px|border187723px| border196023px|border196323px|border196623px|border197123px|border199723px|border200323px|border200640px|borderCongo, Democratic Republic of theCongo, Republic of the23px|border189123px|border195823px|border197023px|border199140px|borderCongo, Republic of theCook Islands23px|border185823px|border188823px|border189323px|border190123px|border190223px|border197323px|border197940px|borderCook IslandsCosta Rica23px|border150623px|border1821 23px|border182123px|border182323px|border 23px|border 23px|border1824 1824 182423px|border184023px|border184223px|border184823px|border190640px|borderCosta RicaCroatia23px|border152723px|border180923px|border181523px|border184823px|border185223px|border186823px|border 23px|border1918 191823px|border193923px|border194123px|border194323px|border194523px|border199023px|border199040px|borderCroatiaCura\u00e7ao23px|border 158123px|border / 23px|border165223px|border179523px|border180623px|border181023px|border181423px|border195923px|border198140px|borderCura\u00e7aoCuba23px|border150623px|border178523px|border187323px|border189823px|border190223px|border190623px|border190823px|border190923px|border195940px|borderCubaCyprus23px|border545 BC23px|border321-305 BC23px|border66823px|border750-96523px|border119223px|border148925px157123px|border184423px|border187823px|border188123px|border192223px|border 23px|border196023px|border200423px|border200640px|borderCyprusCzech Republicalt=|border|23x23px119823px|border180423px|border186923px|border191823px|border192023px|border193923px|border193923px|border194523px|border/23px|border196923px| border199340px|borderCzech RepublicDenmark23px|border121923px|border139623px|border150040px|borderDenmarkDjibouti23px|border184423px|border189623px|border197740px|borderDjiboutiDominica23px|border166323px|border171523px|border176323px|border180123px|border187123px|border194023px|border195823px|border196223px|border197823px|border198123px|border198823px|border199040px|borderDominicaDominican Republic23px|border150623px|border179523px|border180823px|border182123px|border184423px|border184923px|border186123px|border186540px|borderDominican RepublicEast Timor23px|border170223px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border194223px|border194523px|border197523px|border197523px|border197623px|border199923px|border200240px|borderEast TimorEcuador23px|border153423px|border178523px|border180923px|border181223px|border182023px|border 23px|border1822 182223px|border183023px|border183523px|border 23px|border1845 184523px|border186023px|border190023px|border200940px|borderEcuadorEgypt23px|border525-404 BC23px|border343 BC23px|border332-323 BC23px|border619-62923px|border66123px|border750-96923px|border184423px|border188223px|border192223px|border195123px|border195223px|border195823px|border197223px|border198440px|borderEgyptEl Salvador23px|border151923px|border182123px|border182323px|border182523px|border183923px|border186523px|border187323px|border1875/187723px|border189823px|border190023px|border191240px|borderEl SalvadorEquatorial Guinea23px|border166723px|border170723px|border175023px|border177823px|border178523px|border193123px|border193623px|border193823px|border194523px|border196823px|border197323px|border197940px|borderEquatorial GuineaEritrea23px|border189023px|border194123px|border194123px|border195223px|border197423px|border198723px|border199123px|border199323px|border199540px|borderEritreaEstonia23px|border156223px|border172123px|border191823px|border191923px|border192023px|border192123px|border192223px|border192323px|border194023px|border194123px|border194423px|border195323px|border199023px|border200123px|border200240px|borderEstoniaEswatini23px|border189023px|border189423px|border190323px|border196823px|border201140px|borderEswatiniEthiopia25px185325px187525px189123px|border189723px|border191423px|border193623px|border194123px|border197423px|border198723px|border199123px|border199623px|border200940px|borderEthiopiaFaroe Islands23px|border121923px|border194040px|borderFaroe IslandsFiji23px|border 186523px|border186723px|border186923px|border187123px|border187823px|border192423px|border197023px|border201523px|border201640px|borderFijiFinland23px|border156223px|border180923px|border185823px| border188323px|border191723px|border191840px|borderFinlandFrance23px|border164323px|border179023px|border179423px|border181423px|border183023px|border194023px|border194423px|border195823px|border197640px|borderFranceFrench Guiana23px|border164323px|border179423px|border181423px|border183023px|border195823px|border197623px|border199540px|borderFrench GuianaFrench Polynesia23px|border164323px|border179023px|border179423px|border181423px|border183023px|border197623px|border198440px|borderFrench PolynesiaGabon23px|border190323px|border195923px|border196040px|borderGabonGambia23px|border178323px|border180123px|border196540px|borderGambiaGeorgia23px|border1008-149023px|border176223px|border180123px|border185823px|border188323px|border 23px|border1918 191823px|border192123px|border192223px|border193723px|border195123px|border199023px|border200440px|borderGeorgiaGermany23px|border1400 23px|border143323px|border180623px|border181523px|border181723px|border181823px|border183223px|border183323px|border184823px|border186723px|border191823px|border191923px|border192623px|border192723px|border23px|border193323px|border193525px194425px194625px194725px194823px|border23px|border194923px|border23px|border199040px|borderGermany23px|border194923px|border1959Ghana23px|border182123px|border187723px|border195723px|border196123px|border196423px|border196640px|borderGhana23px|border161223px|border179523px|border180623px|border181023px|border1814Greece23px|border33023px|border126123px|border176923px|border182223px|border183323px|border186223px|border196723px|border197023px|border197523px|border197840px|borderGreece23px|border1822 naval ensignGreenland23px|border160623px|border197323px|border198323px|border198423px|border198523px|border199123px|border199223px|border199340px|borderGreenlandGrenada23px|border166323px|border171523px|border176323px|border177923px|border178323px|border180123px|border187523px|border190323px|border195823px|border196223px|border196723px|border197440px|borderGrenadaGuam23px|border188523px|border189923px|border191423px|border191923px|border194423px|border194723px|border194840px|borderGuamGuatemala23px|border151923px|border182123px|border182323px|border182523px|border183823px|border184323px|border185123px|border185823px|border187140px|borderGuatemalaGuinea23px|border189823px|border195840px|borderGuineaGuinea-Bissau23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197440px|borderGuinea-BissauGuyana23px|border158123px|border179523px|border180623px|border181023px|border181423px|border187523px|border190623px|border191923px|border195523px|border196640px|borderGuyanaHaiti23px|border166323px|border171523px|border179023px|border179123px|border179823px|border180323px|border180423px|border180623px|border181123px|border182123px|border184923px|border185923px|border196423px|border198640px|borderHaitiHonduras23px|border151923px|border182123px|border182323px|border182523px|border183823px|border186623px|border189823px|border189840px|borderHondurasHong Kong23px|border184323px|border187123px|border187623px|border194123px|border194523px|border195523px|border195923px|border199740px|borderHong KongHungary25px89525px104625px117225pxc. 119625pxc. 130125px130125px1387border|23px144625pxc. 145325px145825px150625px1516-1526border|23px1794border|23px1848border|23px1848\u20131849border|23px1867\u20131869border|23px1869\u20131918border|23px1896\u2013191523px|border191823px|border191923px|border191923px|border194023px|border194623px|border194923px|border195623px|border195623px|border23px|border195740px|borderHungaryIceland23px|border153623px|border180923px|border181023px|border190023px|border191823px|border194440px|borderIcelandIndia23px|border152623px|border185823px|border190423px|border190623px|border190723px|border190823px|border191723px|border192123px|border193123px|border194740px|borderIndia25px167423px|border177323px|border1910Indonesia23px|border1293alt=|25px|border160223px|border164023px|border180023px|border194223px|border194540px|borderIndonesiaIran23px|border66123px|border750-125823px|border1370-150723px|border157623px|border173623px|border174725px176023px|border179623px|border184923px|border1905/1906/190723px|border1925/193323px|border196423px|border198040px|borderIranIraq23px|border539-330 BC23px|border66123px|border750-94523px|border1194-125823px|border1394-145125px153423px|border184423px|border192123px|border195823px|border195923px|border196323px|border199123px|border200423px|border200723px|border200840px|borderIraq23px|border1194-1258Ireland23px|border154223px|border180123px|border191923px|border192240px|borderIrelandIsrael25px151623px|border184423px|border192023px|border194823px|border194840px| borderIsraelItaly 23px | border1802 23px | border1805 1814 23px | border186123px | border ( 23px|border ) 23px | border194623px|border200323px|border200640px|borderItaly23px| border (23px | border)1943 Ivory Coast23px|border189623px|border195940px|borderIvory CoastJamaica23px|border165523px|border180123px|border187523px|border190623px|border195723px|border195823px|border195923px|border196023px|border196123px|border196240px|borderJamaicaJapan23px|border70123px|border187023px|border199940px|borderJapanJordan23px|border539-330 BC23px|border66123px|border750-96925px151623px|border184423px|border192023px|border192123px|border195823px|border195840px|borderJordanKazakhstan23px|border1220-144023px|border145623px|border182223px|border185823px|border188323px|border191523px|border23px|border23px|border23px|border23px|border23px|border23px|border23px|border23px|border192023px|border23px|border23px|border23px|border23px|border23px|border23px|border192723px|border193223px|border193723px|border194023px|border195323px|border199023px|border199123px|border199240px|borderKazakhstanKenya23px|border188523px|border188523px|border192123px|border196340px|borderKenyaKiribati23px|border189223px|border193723px|border194223px|border194323px|border197940px|borderKiribatiKorea, North25px96025px180025px185623px|border188223px|border188223px|border1888189323px|border189323px|border189923px|border191023px|border194523px|border 23px|border1946 194623px|border194823px|border199240px|borderKorea, NorthKorea, South23px|border194525px|border194825px|border194925px|border198425px|border199725px|border201140px|borderKorea, SouthKosovo25px|border128125px|border134625px145425px|border184425px|border191225px|border191825px|border194125px|border194325px|border194625px|border 25px|border199225px|border200425px|border200525px|border200625px|border200725px|border200840px|borderKosovoKuwait23px|border152123px175223px|border184423px|border189923px|border191423px|border192123px|border194023px|border196140px|borderKuwaitKyrgyzstan23px|border97623px|border187623px|border188323px|border191823px|border193623px|border195223px|border199123px|border199223px|border201023px|border201123px|border201240px|borderKyrgyzstanLaos23px|border170723px|border189323px|border195223px|border197540px|borderLaosLatvia23px|border156223px|border166123px|border169223px|border172123px|border191723px|border191823px|border191923px|border192023px| border194023px|border194123px|border194423px|border195323px|border199040px|borderLatviaLebanon23px|border538-332 BC23px|border750-87623px|border905-96925px151623px|border151623px|border169725px184023px|border184423px|border191823px|border192023px|border194340px|borderLebanonLesotho23px|border179523px|border180123px|border187523px|border188423px|border196623px|border198723px|border200640px|borderLesothoLiberia23px|border182723px|border184740px|borderLiberiaLibya23px|border525-331 BC23px|border66323px|border750-96923px|border171123px|border191223px|border195123px|border196923px|border197223px|border197723px|border201140px|borderLibyaLiechtenstein23px|border140023px|border171923px|border185223px|border192123px|border193723px|border198240px|borderLiechtensteinLithuania23px|border158723px|border179523px|border185823px|border188323px|border191823px|border194023px|border194123px|border194423px|border195323px|border198823px|border200440px|borderLithuaniaLuxembourg23px|border148223px|border171523px|border179523px|border181523px|border184523px|border194023px|border194440px|borderLuxembourgMacau23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197523px|border199940px|borderMacauMadagascar23px|border 178723px|border188523px|border189623px|border195840px|borderMadagascarMalawi23px|border190723px|border195323px|border196323px|border196423px|border201023px|border201240px|borderMalawiMalaysia23px|border164123px|border/alt=|border|23x23px179523px|border / 23px|border180123px|border181823px|border / 23px|border182423px|border189623px|border194223px|border194523px|border194823px|border194923px|border196340px|borderMalaysiaMaldives23px|border179623px|border190323px|border192623px|border195323px|border195423px|border196540px|borderMaldivesMali23px|border189223px|border195823px|border195923px|border196140px|borderMaliMalta23px|border870-90923px|border153023px|border179823px|border 23px|border1800 180123px|border181423px|border187523px|border189823px|border192323px|border194323px|border196440px|borderMaltaMarshall Islands23px|border188523px|border188923px|border191423px|border191923px|border194423px|border194723px|border196523px|border197940px|borderMarshall IslandsMauritania23px|border190023px|border195923px|border201723px|border202040px|borderMauritaniaMauritius23px|border166623px|border171023px|border178923px|border181023px|border186923px|border190623px|border192323px|border196840px|borderMauritiusMexico23px|border151923px|border182123px|border182123px|border182323px|border186423px|border186723px|border189323px|border191623px|border193423px|border196840px|borderMexicoMicronesia23px|border188523px|border189923px|border191423px|border191923px|border194423px|border194723px|border196523px|border197940px|borderMicronesiaMoldova23px|border139623px|border183423px|border186623px|border188323px|border191723px|border191923px|border192523px|border193723px|border193823px|border194023px|border195223px|border199040px|borderMoldova23px|border185923px|border186223px|border1867Monaco23px|border179323px|border188123px|border194223px|border194540px|borderMonacoMongolia25px186223px|border189023px191123px192423px193023px|border194023px|border194523px|border199223px|border201140px|borderMongoliaMontenegro25px|border128125px|border134623px|border169623px|border185123px|border187623px|border190525px|border191823px|border191823px|border194623px|border199223px|border199423px|border200323px|border2004/200640px|borderMontenegroMorocco23px|border166623px|border191323px|border195640px|borderMorocco23px|border1921Mozambique23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197423px|border197523px|border198323px|border198340px|borderMozambiqueMyanmar23px|border175323px|border188523px|border193723px|border194323px|border194523px|border194823px|border197423px|border200623px|border201023px|border201923px|border202040px|borderMyanmarNamibia23px|border188423px|border191523px|border192823px|border198223px|border199040px|borderNamibiaNauru23px|border188823px|border188923px|border 23px|border 23px|border191423px|border194223px|border 23px|border 23px|border194523px|border196840px|borderNauruNepalframeless|56x56px 1768frameless|37x37px185625pxc.193025px196242pxNepalNetherlands23px|border 158123px|border / 23px|border165223px|border179523px|border180623px|border181023px|border181440px|borderNetherlandsNew Zealand23px|border176923px|border183423px|border184023px|border186723px|border190223px| border201523px|border201623px|border201723px|border201840px|borderNew ZealandNicaragua23px|border152423px|border182323px|border182523px|border183923px|border185823px|border188923px|border189323px|border189623px|border190823px|border197140px|borderNicaraguaNiger23px|border192223px|border195940px|borderNigerNigeria23px|border188623px|border190023px| border195923px |border196023px|border196723px|border197040px|borderNigeria23px|border1967New Caledonia23px|border164323px|border179023px|border179423px|border181423px|border183023px|border197623px|border199140px|borderNew CaledoniaNiue23px|border176923px|border183423px|border184023px|border186723px|border190223px|border197540px|borderNiueNorth Macedonia23px|border479 BC23px|border324-148 BC25px|border128125px|border134625pxc. 145323px|border184423px|border 23px|border1903 190325px|border191223px|border191823px|border194123px|border194423px|border194623px|border199223px|border199323px|borderearly 199423px|border199423px|borderearly 199523px|border199540px|borderNorth MacedoniaNorway23px|border153623px|border1814 182123px|border1818 184423px|border1821 184423px|border184423px|border189923px|border1905/190640px|borderNorwayOman23px|border185623px|border197023px|border199540px|borderOmanPakistan23px|border550-330 BC23px|border329-323 BC23px|border240-41023px|border670-86023px|border854-101123px|border1227-135123px|border152623px|border174723px176123px|border184923px|border185823px|border188023px|border194740px|borderPakistanPalau23px|border188523px|border189923px|border191423px|border191923px|border194423px|border194723px|border196523px|border198140px|borderPalauPalestine25px151623px|border184423px|border192023px|border194823px|border194923px|border195823px|border195823px|border196723px|border198223px|border199440px|borderPalestine23px|border194923px|border195223px|border1958Panama23px|border151023px|border171723px|border178523px|border181123px|border181623px|border181923px|border182023px|border182123px|border183423px|border186123px|border190223px|border190323px|border192523px|border201740px|borderPanamaPapua New Guinea23px|border188423px|border190623px|border194223px|border194523px|border194923px|border196523px|border197023px|border197140px|borderPapua New Guinea23px|border188423px|border188923px|border191423px|border1945Paraguay23px|border153723px|border171723px|border178523px|border 23px|border 23px|border1811 1811 181123px|border181223px|border182623px|border184223px|border195423px|border198823px|border199023px|border2013/201540px|borderParaguayPeru23px|border 23px|border1532 153223px|border171723px|border178523px|border 23px|border1820 182023px|border 23px|border1822 182223px|border182523px|border182523px|border182523px|border195040px|borderPeru23px|border1836Philippines23px|border1515 23px|border190223px|border190823px|border191223px|border191923px|border193623px|border194223px|border194323px|border194523px|border198523px|border198523px|border198623px|border199523px|border199623px|border199723px|border199823px|border201023px|border201123px|border201623px|border201740px|borderPhilippines23px|border1985Poland25pxc. 1605Partitions179523px|border180723px|border181523px|border181523px|border186323px|border191923px|border192823px|border194423px| border198040px | borderPolandPortugal23px|border721-75023px|border166723px|border170723px|border175023px|border181623px|border182623px|border/23px|border183023px|border190823px|border1910/191123px|border191240px|borderPortugal23px|border/23px|border1830 (sea)Puerto Rico23px|border150623px|border170123px|border176023px|border178523px|border187323px|border189523px|border195240px|borderPuerto RicoQatar23px|border661-75025px181823px|border187223px|border191623px|border193223px|border193623px|border194923px|border197140px|borderQatarRomania23px|border168 BC23px|border133023px|border183423px|border184823px|border185923px|border186223px|border186723px|border 23px|border194823px|border195223px|border196523px|border198923px|border198940px|borderRomania23px|border111123px|border139623px|border1834Russia23px|border1283-129423px|border166823px|border172123px|border185823px|border188323px|border191423px|border191723px|border 23px|border191823px|border192223px|border192323px|border192423px|border193623px|border195523px|border199123px|border199340px|borderRussia23px|border193723px|border1954Rwanda23px|border188523px|border191923px|border195923px|border196123px|border196223px|border200140px|borderRwandaSahrawi Arab Democratic Republic23px|border188423px|border193123px|border193623px|border193823px|border194523px|border197640px|borderSahrawi Arab Democratic RepublicSaint Kitts and Nevis23px|border162623px|border171323px|border180123px|border187123px|border195823px|border196223px|border196723px|border198340px|borderSaint Kitts and Nevis23px|border1663Saint Lucia23px|border166323px|border171523px|border174323px|border175623px|border176223px|border176323px|border177823px|border178323px|border178923px|border179623px|border180123px|border180223px|border180323px|border190323px|border193923px|border196223px|border196723px|border197923px|border200240px|borderSaint LuciaSaint Vincent and the Grenadines23px|border166323px|border171523px|border176323px|border177823px|border178323px|border180123px|border190323px|border196223px|border197923px|border 23px|border1985 198540px|borderSaint Vincent and the GrenadinesSamoa23px|border185823px|border187323px|border187923px|border188723px|border190023px|border191423px|border192223px|border194823px|border194940px|borderSamoaSan Marino23px|border146523px|border186223px|border201140px|borderSan MarinoS\u00e3o Tom\u00e9 and Pr\u00edncipe23px|border166723px|border170723px|border175023px|border181623px|border182623px|border183023px|border191123px|border197540px|borderS\u00e3o Tom\u00e9 and Pr\u00edncipeSaudi Arabia23px|border66123px|border750-94525px151723px|border / 23px|border174425px181823px|border182423px|border189123px|border190223px|border192623px|border193223px|border193423px|border193823px|border197340px|borderSaudi Arabia23px|border184423px|border1920Senegal23px|border164323px|border178923px|border181423px|border183023px|border195823px|border195923px|border196040px|borderSenegalSerbia25px|border128125px|border1346border|25px180423px|border183525px|border188223px|border191823px|border194123px|border194623px|border 23px|border1992 199223px|border200323px|border200423px|border201040px|borderSerbiaSeychelles23px|border175623px|border181123px|border190323px|border196123px|border197623px|border197723px|border199640px|borderSeychellesSierra Leone23px|border179223px|border180123px|border188923px|border196140px|borderSierra LeoneSingaporealt=|border|23x23px169923px|border / 23px|border181923px|border1874alt=|border|23x23px192523px|border1942alt=|border|23x23px194523px|border194623px|border195923px|border196323px|border196540px|borderSingaporeSlovakiaalt=|28px82523px|border180423px|border186923px|border191823px|border192023px|border193823px|border194523px|border199240px|borderSlovakiaSlovenia23px|border133523px|border180323px|border181323px|border186923px|border 23px|border1918 191823px|border194323px|border194523px|border198823px|border198923px|border199023px|border199140px|borderSloveniaSolomon Islands23px|border188623px|border190623px|border194223px|border194523px|border194723px|border195623px|border196623px|border197740px|borderSolomon Islands23px|border1893Somalia23px|border141523px|border188823px|border189623px|border1888/192023px|border194623px|border196040px|borderSomaliaSouth Africa23px|border165223px|border166423px|border179523px|border180123px|border187523px|border191023px|border191223px|border192723px|border192823px|border198223px| border199440px|borderSouth Africa23px|border1854South Sudan23px|border184423px|border188223px|border188523px|border189923px|border192223px|border195223px|border195623px|border197023px|border2005/201140px|borderSouth SudanSpain23px|border661-75023px|border150623px|border170123px|border176023px|border178523px|border 23px|border1873 187523px|border193123px|border193623px|border193823px|border194523px|border197723px|border198140px|borderSpainSri Lanka23px|border159323px|border181523px|border194823px|border195123px|border197240px|borderSri LankaSudan23px|border184423px|border188223px|border188523px|border189923px|border192223px|border195223px|border195623px|border197040px|borderSudanSuriname23px|border158123px|border179523px|border180623px|border181023px|border181423px|border195923px|border197540px|borderSurinameSweden23px|border156225px181523px|border184423px|border1905/190640px|borderSwedenSwitzerland23px|border147023px|border179823px|border180323px|border188940px|borderSwitzerlandSyria23px|border539-331 BC23px|border750-89023px|border905-99023px|border1395-140525px151623px|border184423px|border 23px|border1920 192023px|border192223px|border193223px|border195825px|boder196123px|border196323px|border197223px|border198040px|borderSyriaTaiwanalt=|25px|border1624alt=|25px|border1640alt=|25px|border166125px168323px|border189023px|border189523px|border189523px|border194540px|borderChina, Republic of Taiwanborder|alt=|25x25px 1626Tajikistan23px|border186923px|border188323px|border191823px|border192123px|border 23px|border1929 23px|border193123px|border193523px|border193623px|border193823px|border194023px|border195323px|border199123px|border199240px|borderTajikistanTanzania23px|border188523px|border191923px|border196123px|border196440px|borderTanzania23px|border1964Thailand23px|border168023px|border178223px|border181723px|border1843alt=|border|23x23px189323px|border191623px|border / alt=|border|23x23px191723px|border / 23px|border201123px|border / 23px|border / 23px|border201740px|borderThailandTogo23px|border188423px|border191423px|border195723px|border195823px|border196040px|borderTogoTonga23px|border185823px|border186223px|border187540px|borderTongaTrinidad and Tobago23px|border149823px|border179623px|border180123px|border188923px|border196240px|borderTrinidad and TobagoTunisia25px157423px|border183123px|border197423px|border197423px|border199940px|borderTunisiaTurkey23px|border550 BC23px|border334-306 BC25px145323px|border184423px|border193640px|borderTurkey23px|border1453Turkmenistan23px|border151723px|border186823px|border188323px|border191723px|border192023px|border192223px|border192623px|border193723px|border194023px|border195323px|border199223px|border199723px|border200140px|borderTurkmenistanTuvalu23px|border189223px|border193723px|border197623px|border197823px|border 23px|border1995 199623px|border199740px|borderTuvaluUganda23px|border189423px|border191423px|border 23px|border1962 196240px|borderUgandaUkraine23px|border1240-126123px170023px|border179323px|border185823px|border188323px|border23px|border191723px|border191823px|border191923px|border192923px|border193723px|border194123px|border194423px|border194923px|border199123px|border199240px|borderUkraineUnited Arab Emirates23px|border224-62923px|border66123px|border750-125823px|border189223px|border195023px|border197140px|borderUnited Arab EmiratesUnited Kingdom23px|border51923px|border119823px|border126523px|border160623px|border170723px|border180140px|borderUnited Kingdom23px|border/23px|border154223px|border160623px|border1485United States of America23px|border160623px|border170723px|border177523px|border177723px|border179523px|border181823px|border 23px|border1819 182023px|border182223px|border183623px|border183723px|border 23px|border1845 184623px|border 23px|border1847 184823px|border185123px|border185823px|border185923px|border186123px|border186323px|border186523px|border186723px|border187723px|border189023px|border189123px|border189623px|border190823px|border191223px|border195923px|border/23px|border196040px|borderUnited States of America23px|border186123px|border186323px|border186523px|border2016Uruguay23px|border162423px|border171723px|border178523px|border181223px|border181523px|border182123px|border182223px|border182823px|border183040px|borderUruguayUzbekistan23px|border530 BC23px|border330-312 BC23px|border66123px|border750-81923px|border1206-122623px|border1370-151125px178523px|border192023px|border192423px|border195323px|border199140px|borderUzbekistanVanuatu23px|border188723px|border190623px|border195323px|border198040px|borderVanuatu23px|border190623px|border194023px|border1945Vatican City23px|border75423px|border180323px|border182523px|border184923px|border184923px|border187023px|border192940px|borderVatican CityVenezuela23px|border152223px|border178523px|border181123px|border 23px|border1812 181323px|border181423px|border 23px|border1817 181723px|border181923px|border182023px|border182123px|border183623px|border 23px|border1859 185923px|border186323px|border190523px|border193023px|border195423px|border200640px|borderVenezuelaVietnamalt=|23x23px|Vietnam177823px|Vietnam178823px|Vietnam180223px|border188523px|border188723px|border189023px|border192023px|border194523px|border195523px|border197640px|borderVietnam23px|border7/1945 23px|border9/194523px|border194623px|border194823px|border1975Wallis and Futuna23px|border164323px|border179023px|border179423px|border181423px|border183023px|border184223px|border186023px|border188623px|border188723px|border191023px|border195823px|border198540px|borderWallis and FutunaYemen23px|border187223px|border1918192323px|border192723px|border196223px|border199040px|borderYemen23px|border188623px|border193723px|border196223px|border1967Zambia23px|border192423px|border195323px|border196323px|border196423px|border199640px|borderZambiaZimbabwe23px|border189623px|border192323px|border195323px|border196423px|border196823px|border 197923px|border late 197923px|borderearly 198023px|border198040px|borderZimbabweCountries / decadesbeforeCurrentDecades / countries1700s to 1710s1710s to 1720s1720s to 1730s1730s to 1740s1740s to 1750s1750s to 1760s1760s to 1770s1770s to 1780s1780s to 1790s1790s to 1800s1800s to 1810s1810s to 1820s1820s to 1830s1830s to 1840s1840s to 1850s1850s to 1860s1860s to 1870s1870s to 1880s1880s to 1890s1890s to 1900s1900s1910s1920s1930s1940s1950s1960s1970s1980s1990s2000s2010s2020s Other flags Other flags / decadesBefore1700s1710s1720s1730s1740s1750s1760s1770s1780s1790s1800s1810s1820s1830s1840s1850s1860s1870s1880s1890s1900s1910s1920s1930s1940s1950s1960s1970s1980s1990s2000s2010s2020sCurrentDecades / Other flagsAntarctica23px|border197823px|border199523px| border199640pxAntarcticaArgentine Antarctica23px|border194323px|border199940pxArgentine AntarcticaBritish Antarctic Territory23px|border190823px|border192523px|border194823px|border196340pxBritish Antarctic TerritoryChilean Antarctic Territory23px|border194023px|border199740pxChilean Antarctic TerritoryFrench Southern and Antarctic Territories23px|border184023px|border195823px|border197623px|border200740pxFrench Southern and Antarctic TerritoriesJohnston Atoll23px|border185823px|border185923px|border186123px|border186323px|border186523px|border186723px|border187723px|border189023px|border189123px|border189623px|border190823px|border191223px|border195923px|border/23px|border196023px|border200140px|borderJohnston AtollMidway Atoll23px|border185923px|border186123px|border186323px|border186523px|border186723px|border187723px|border189023px|border189123px|border189623px|border190823px|border191223px|border195923px|border/23px|border196023px|border200040px|borderMidway AtollRoss Dependency23px|border192323px|border199540pxRoss DependencyUnited Nations23px|border194323px|border194523px|border194640pxUnited NationsWake Island23px|border189923px|border190823px|border191223px|border195923px|border/23px|border196023px|border200140px|borderWake IslandOther flags / decadesbeforeCurrentDecades / Other flags1700s1710s1720s1730s1740s1750s1760s1770s1780s1790s1800s1810s1820s1830s1840s1850s1860s1870s1880s1890s1900s1910s1920s1930s1940s1950s1960s1970s1980s1990s2000s2010s2020s", "edit_actions": [{"type": "D", "before": "border185423px|border190023px|", "after": null, "start_char_pos": 2929, "end_char_pos": 2959}, {"type": "D", "before": "border199323px|", "after": null, "start_char_pos": 4399, "end_char_pos": 4414}, {"type": "R", "before": "183123px", "after": "183140px", "start_char_pos": 4583, "end_char_pos": 4591}, {"type": "D", "before": "border200823px|border200940px|", "after": null, "start_char_pos": 4594, "end_char_pos": 4624}, {"type": "D", "before": "border190823px|border190923px|", "after": null, "start_char_pos": 5653, "end_char_pos": 5683}, {"type": "D", "before": "border195923px|", "after": null, "start_char_pos": 7862, "end_char_pos": 7877}, {"type": "D", "before": "border199223px|", "after": null, "start_char_pos": 9452, "end_char_pos": 9467}, {"type": "D", "before": "border186323px|", "after": null, "start_char_pos": 12155, "end_char_pos": 12170}, {"type": "R", "before": "borderIsraelItaly23px", "after": "borderIsraelItaly 23px", "start_char_pos": 16882, "end_char_pos": 16903}, {"type": "R", "before": "border100 BC23px", "after": "border1802 23px", "start_char_pos": 16906, "end_char_pos": 16922}, {"type": "R", "before": "border141623px", "after": "border1805 1814 23px", "start_char_pos": 16925, "end_char_pos": 16939}, {"type": "D", "before": "border1785", "after": null, "start_char_pos": 16942, "end_char_pos": 16952}, {"type": "R", "before": "File:Flag of the Repubblica Transpadana.svg", "after": "border186123px", "start_char_pos": 16953, "end_char_pos": 16996}, {"type": "A", "before": null, "after": "border (", "start_char_pos": 16999, "end_char_pos": 16999}, {"type": "R", "before": "179623px", "after": ") 23px", "start_char_pos": 17012, "end_char_pos": 17020}, {"type": "D", "before": "border180223px|border181523px|border185123px|border186123px|border23px|", "after": null, "start_char_pos": 17023, "end_char_pos": 17094}, {"type": "R", "before": "border110023px", "after": "border (23px", "start_char_pos": 17157, "end_char_pos": 17171}, {"type": "R", "before": "border181623px|border194323px|border113023px|border152523px|border149323px|border75423px|border697/1659Ivory", "after": "border)1943 Ivory", "start_char_pos": 17174, "end_char_pos": 17282}, {"type": "D", "before": "border193623px|", "after": null, "start_char_pos": 19486, "end_char_pos": 19501}, {"type": "D", "before": "border201423px|", "after": null, "start_char_pos": 24046, "end_char_pos": 24061}, {"type": "R", "before": "border1958/195923px", "after": "border195923px", "start_char_pos": 24412, "end_char_pos": 24431}, {"type": "R", "before": "border198023px", "after": "border198040px", "start_char_pos": 27311, "end_char_pos": 27325}, {"type": "D", "before": "border200123px|border200240px|", "after": null, "start_char_pos": 27328, "end_char_pos": 27358}, {"type": "D", "before": "border199323px|", "after": null, "start_char_pos": 31743, "end_char_pos": 31758}, {"type": "R", "before": "border199623px|border200723px|border200840pxAntarcticaArgentine", "after": "border199640pxAntarcticaArgentine", "start_char_pos": 38449, "end_char_pos": 38512}, {"type": "R", "before": "TerritoryEuropean Union23px|border195323px|border195540pxEuropean UnionFrench", "after": "TerritoryFrench", "start_char_pos": 38774, "end_char_pos": 38851}], "sents_char_pos": [0, 17, 29, 58, 72, 86, 100, 114, 128, 142, 156, 170, 184, 198, 212, 226, 240, 254, 268, 282, 296, 310, 324, 338, 352, 366, 380, 394, 408, 422, 436, 450, 464, 478, 492, 506, 531, 572, 826, 842, 903, 919, 965, 981, 1027, 1043, 1133, 1363, 1379, 1395, 1411, 1719, 1735, 2047, 2182, 2259, 2275, 2291, 2307, 2432, 2600, 2616, 2730, 2746, 2929, 2960, 3269, 3449, 3461, 3477, 3977, 4283, 4299, 4399, 4415, 4567, 4583, 4594, 4625, 5125, 5197, 5255, 5271, 5413, 5548, 5564, 5580, 5596, 5627, 5643, 5684, 6040, 6108, 6191, 6207, 6707, 6778, 6934, 6946, 7031, 7446, 7814, 7995, 8028, 8121, 8134, 8270, 8283, 8318, 8360, 8372, 8388, 8474, 8587, 8603, 8734, 8750, 9050, 9071, 9215, 9283, 9452, 9468, 9495, 9862, 10011, 10024, 10255, 10354, 10370, 10416, 10432, 10523, 10540, 10561, 10752, 10944, 10963, 11171, 11671, 11881, 11935, 11958, 12155, 12171, 12394, 12523, 12536, 12668, 12910, 12926, 13061, 13561, 13803, 14303, 14803, 15223, 15363, 15404, 15415, 15457, 15957, 16457, 16882, 16958, 16970, 16981, 16997, 17012, 17023, 17095, 17157, 17172, 17283, 17335, 17605, 18105, 18343, 18560, 18572, 18685, 18837, 19337, 19486, 19502, 19615, 19986, 20486, 20776, 21029, 21073, 21460, 21476, 21595, 21742, 22242, 22742, 23242, 23629, 23641, 23683, 23695, 23764, 23839, 23855, 23958, 24046, 24062, 24132, 24412, 24432, 24510, 24639, 24763, 24787, 24808, 24847, 24878, 24894, 25020, 25056, 25092, 25138, 25158, 25178, 25340, 25361, 25861, 26152, 26299, 26434, 26446, 26462, 26616, 26632, 26678, 26694, 26710, 26726, 26847, 27182, 27601, 27735, 27898, 28002, 28268, 28556, 28572, 28689, 28705, 28719, 28871, 28907, 29214, 29225, 29237, 29398, 29414, 29435, 29447, 29621, 29687, 29702, 29849, 29872, 29930, 30092, 30396, 30412, 30621, 30704, 30753, 31150, 31166, 31287, 31433, 31581, 31743, 31759, 31786, 31813, 31975, 32075, 32091, 32205, 32300, 32776, 33160, 33173, 33199, 33285, 33301, 33662, 33699, 33728, 33742, 33947, 34052, 34176, 34197, 34577, 34593, 34677, 34693, 34980, 35107, 35127, 35241, 35312, 35431, 35447, 35508, 35524, 35540, 35556, 35815, 36077, 36098, 36399, 36526, 36596, 36612, 36643, 36659, 36735, 36751, 37054, 37123, 37331, 37694, 37710, 37736, 37784, 37814, 37831, 37845, 37859, 37873, 37887, 37901, 37915, 37929, 37943, 37957, 37971, 37985, 37999, 38013, 38027, 38041, 38055, 38069, 38083, 38097, 38171, 38183, 38195, 38390, 38449, 38513, 38567, 38585, 38676, 38703, 38764, 38792, 38840, 38852, 38865, 38957, 38970, 39000, 39262, 39274, 39519, 39578]}
+{"doc_id": "189616", "revision_depth": "1", "before_revision": "Eudaimonia (Greek: \u03b5\u1f50\u03b4\u03b1\u03b9\u03bc\u03bf\u03bd\u03af\u03b1 ; sometimes anglicized as eudaemonia or eudemonia , ) is a Greek word commonly translated as 'happiness ' or 'welfare' ; however, more accurate translations have been proposed to be 'human flourishing , prosperity'Robinson, Daniel N. 1989. Aristotle's Psychology. New York: Columbia University Press. , . and 'blessedness'.Critchley, Simon. 2019. Tragedy, the Greeks, and Us . p 140. In the work of Aristotle , eudaimonia (based on older Greek tradition) was used as the term for the highest human good, and so it is the aim of practical philosophy, including ethics and political philosophy, to consider (and also experience) what it really is, and how it can be achieved. It is thus a central concept in Aristotelian ethics and subsequent Hellenistic philosophy, along with the terms aret\u0113 (most often translated as 'virtue' or 'excellence') and phronesis\" ('practical or ethical wisdom'). Discussion of the links between \u0113thik\u0113 aret\u0113 ( virtue of character ) and eudaimonia (happiness ) is one of the central concerns of ancient ethics, and a subject of much disagreement. As a result , there are many varieties of eudaimonism. Definition and etymology In terms of its etymology, eudaimonia is an abstract noun derived from the words eu ('good, well') and daim\u014dn ('spirit'), the latter referring to a minor deity or a guardian spirit. Definitions, a dictionary of Greek philosophical terms attributed to Plato himself but believed by modern scholars to have been written by his immediate followers in the Academy, provides the following definition of the word eudaimonia: \"The good composed of all goods; an ability which suffices for living well; perfection in respect of virtue; resources sufficient for a living creature.\" In his Nicomachean Ethics (\u00a721; 1095a15\u201322), Aristotle says that everyone agrees that eudaimonia is the highest good for human beings, but that there is substantial disagreement on what sort of life counts as doing and living well; i.e. eudaimon: Verbally there is a very general agreement; for both the general run of men and people of superior refinement say that it is [eudaimonia], and identify living well and faring well with being happy; but with regard to what [eudaimonia] is they differ, and the many do not give the same account as the wise. For the former think it is some plain and obvious thing like pleasure, wealth or honour\u2026 [1095a17] So, as Aristotle points out, saying that eudaimon life is a life which is objectively desirable, and means living well, is not saying very much. Everyone wants to be eudaimon; and everyone agrees that being eudaimon is related to faring well and to an individual's well-being . The really difficult question is to specify just what sort of activities enable one to live well. Aristotle presents various popular conceptions of the best life for human beings. The candidates that he mentions are a (1) life of pleasure, (2) a life of political activity , and (3) a philosophical life. Positive psychology on eudaemonia The \"Questionnaire for Eudaimonic Well-Being\" developed in Positive Psychology lists six dimensions of eudaimonia:Kjell, Oscar (2011). \"Sustainable Well-Being: A Potential Synergy Between Sustainability and Well-Being Research.\" Review of General Psychology, vol. 15, no. 3, pp. 255-266. URL self-discovery; perceived development of one's best potentials; a sense of purpose and meaning in life; investment of significant effort in pursuit of excellence; intense involvement in activities; and enjoyment of activities as personally expressive.%DIFDELCMD < %DIFDELCMD < %%% Eudaimonia and aret\u00e9 One important move in Greek philosophy to answer the question of how to achieve eudaimonia is to bring in another important concept in ancient philosophy, aret\u0113 ('virtue' ). Aristotle says that the eudaimon life is one of \"virtuous activity in accordance with reason\" [1097b22\u20131098a20] ; even Epicurus , who argues that the eudaimon life is the life of pleasure , maintains that the life of pleasure coincides with the life of virtue. So , the ancient ethical theorists tend to agree that virtue is closely bound up with happiness (aret\u00e9 is bound up with eudaimonia). However, they disagree on the way in which this is so. We shall consider the main theories in a moment, but first a warning about the proper translation of aret\u00e9. One problem with the English translation of aret\u00e9 as 'virtue' is that we are inclined to understand virtue in a moral sense, which is not always what the ancients had in mind. For a Greek, aret\u00e9 pertains to all sorts of qualities we would not regard as relevant to ethics, for example, physical beauty. So it is important to bear in mind that the sense of \u2018virtue' operative in ancient ethics is not exclusively moral and includes more than states such as wisdom, courage and compassion. The sense of virtue which aret\u00e9 connotes would include saying something like \"speed is a virtue in a horse , \" or \"height is a virtue in a basketball player . \" Doing anything well requires virtue, and each characteristic activity (such as carpentry, flute playing, etc.) has its own set of virtues. The alternative translation 'excellence' (or ' a desirable quality ' ) might be helpful in conveying this general meaning of the term. The moral virtues are simply a subset of the general sense in which a human being is capable of functioning well or excellently. Eudaimonia and happiness Eudaimonia implies a positive and divine state of being that humanity is able to strive toward and possibly reach. A literal view of eudaimonia means achieving a state of being similar to benevolent deity, or being protected and looked after by a benevolent deity. As this would be considered the most positive state to be in, the word is often translated as 'happiness' although incorporating the divine nature of the word extends the meaning to also include the concepts of being fortunate, or blessed. Despite this etymology, however, discussions of eudaimonia in ancient Greek ethics are often conducted independently of any super-natural significance. In his Nicomachean Ethics (1095a15\u201322) Aristotle says that eudaimonia means 'doing and living well'. It is significant that synonyms for eudaimonia are living well and doing well. On the standard English translation, this would be to say that \u2018happiness is doing well and living well'. The word happiness does not entirely capture the meaning of the Greek word. One important difference is that happiness often connotes being or tending to be in a certain pleasant state of mind. For example, when we say that someone is \"a very happy person , \" we usually mean that they seem subjectively contented with the way things are going in their life. We mean to imply that they feel good about the way things are going for them. In contrast, eudaimonia is a more encompassing notion than feeling happy since events that do not contribute to one's experience of feeling happy may affect one's eudaimonia. Eudaimonia depends on all the things that would make us happy if we knew of their existence, but quite independently of whether we do know about them. Ascribing eudaimonia to a person, then, may include ascribing such things as being virtuous, being loved and having good friends. But these are all objective judgments about someone's life: they concern a person's really being virtuous, really being loved, and really having fine friends. This implies that a person who has evil sons and daughters will not be judged to be eudaimonic even if he or she does not know that they are evil and feels pleased and contented with the way they have turned out (happy). Conversely, being loved by your children would not count towards your happiness if you did not know that they loved you (and perhaps thought that they did not), but it would count towards your eudaimonia. So , eudaimonia corresponds to the idea of having an objectively good or desirable life, to some extent independently of whether one knows that certain things exist or not. It includes conscious experiences of well-being , success, and failure, but also a whole lot more. (See Aristotle's discussion: Nicomachean Ethics, book 1.10\u20131.11.) Because of this discrepancy between the meanings of eudaimonia and happiness, some alternative translations have been proposed. W.D. Ross suggests ' well-being ' and John Cooper proposes 'flourishing' . These translations may avoid some of the misleading associations carried by \"happiness\" although each tends to raise some problems of its own. In some modern texts therefore, the other alternative is to leave the term in an English form of the original Greek, as eudaimonia . Classical views on eudaimonia and aret\u0113 As with all ancient ethical thinkers, Socrates thought that all human beings wanted eudaimonia more than anything else (see Plato, Apology 30b, Euthydemus 280d\u2013282d, Meno 87d\u201389a). However, Socrates adopted a quite radical form of eudaimonism (see above): he seems to have thought that virtue is both necessary and sufficient for eudaimonia. Socrates is convinced that virtues such as self-control, courage, justice, piety, wisdom and related qualities of mind and soul are absolutely crucial if a person is to lead a good and happy (eudaimon) life. Virtues guarantee a happy life eudaimonia. For example, in the Meno, with respect to wisdom, he says: \"everything the soul endeavours or endures under the guidance of wisdom ends in happiness\" ( [ Meno 88c ) ] . In the Apology, Socrates clearly presents his disagreement with those who think that the eudaimon life is the life of honour or pleasure, when he chastises the Athenians for caring more for riches and honour than the state of their souls. Good Sir, you are an Athenian, a citizen of the greatest city with the greatest reputation for both wisdom and power; are you not ashamed of your eagerness to possess as much wealth, reputation, and honors as possible, while you do not care for nor give thought to wisdom or truth or the best possible state of your soul . ( [ 29e ) ] . .. %DIFDELCMD < [%%% I t does not seem like human nature for me to have neglected all my own affairs and to have tolerated this neglect for so many years while I was always concerned with you, approaching each one of you like a father or an elder brother to persuade you to care for virtue. ( [ 31a\u2013b; italics added ) ] It emerges a bit further on that this concern for one's soul, that one's soul might be in the best possible state, amounts to acquiring moral virtue. So Socrates' pointing out that the Athenians should care for their souls means that they should care for their virtue, rather than pursuing honour or riches. Virtues are states of the soul. When a soul has been properly cared for and perfected it possesses the virtues. Moreover, according to Socrates, this state of the soul, moral virtue, is the most important good. The health of the soul is incomparably more important for eudaimonia than (e.g.) wealth and political power. Someone with a virtuous soul is better off than someone who is wealthy and honoured but whose soul is corrupted by unjust actions. This view is confirmed in the Crito, where Socrates gets Crito to agree that the perfection of the soul, virtue, is the most important good: And is life worth living for us with that part of us corrupted that unjust action harms and just action benefits? Or do we think that part of us, whatever it is, that is concerned with justice and injustice, is inferior to the body? Not at all. It is much more valuable\u2026? Much more\u2026 (47e\u201348a) Here , Socrates argues that life is not worth living if the soul is ruined by wrongdoing. In summary, Socrates seems to think that virtue is both necessary and sufficient for eudaimonia. A person who is not virtuous cannot be happy, and a person with virtue cannot fail to be happy. We shall see later on that Stoic ethics takes its cue from this Socratic insight. Plato %DIFDELCMD < %DIFDELCMD < %%% Plato's great work of the middle period, the Republic, is devoted to answering a challenge made by the sophist Thrasymachus, that conventional morality, particularly the 'virtue' of justice, actually prevents the strong man from achieving eudaimonia. Thrasymachus's views are restatements of a position which Plato discusses earlier on in his writings, in the Gorgias, through the mouthpiece of Callicles. The basic argument presented by Thrasymachus and Callicles is that justice (being just) hinders or prevents the achievement of eudaimonia because conventional morality requires that we control ourselves and hence live with un-satiated desires. This idea is vividly illustrated in book 2 of the Republic when Glaucon, taking up Thrasymachus' challenge, recounts a myth of the magical ring of Gyges. According to the myth, Gyges becomes king of Lydia when he stumbles upon a magical ring, which, when he turns it a particular way, makes him invisible, so that he can satisfy any desire he wishes without fear of punishment. When he discovers the power of the ring he kills the king, marries his wife and takes over the throne. The thrust of Glaucon's challenge is that no one would be just if he could escape the retribution he would normally encounter for fulfilling his desires at whim. But if eudaimonia is to be achieved through the satisfaction of desire, whereas being just or acting justly requires suppression of desire, then it is not in the interests of the strong man to act according to the dictates of conventional morality. (This general line of argument reoccurs much later in the philosophy of Nietzsche.) Throughout the rest of the Republic, Plato aims to refute this claim by showing that the virtue of justice is necessary for eudaimonia. The School of Athens by Raffaello Sanzio, 1509, showing Plato (left) and Aristotle (right) Aristotle's account is articulated in the Nicomachean Ethics and the Eudemian Ethics. In outline, for Aristotle, eudaimonia involves activity, exhibiting virtue (aret\u0113 sometimes translated as excellence) in accordance with reason. This conception of eudaimonia derives from Aristotle's essentialist understanding of human nature, the view that reason (logos sometimes translated as rationality) is unique to human beings and that the ideal function or work (ergon) of a human being is the fullest or most perfect exercise of reason. Basically, well-being (eudaimonia) is gained by proper development of one's highest and most human capabilities and human beings are \"the rational animal\". It follows that eudaimonia for a human being is the attainment of excellence (aret\u00e9) in reason. Whoever wants eudaimonia must consider these three questions: First, how are pragmata (ethical matters, affairs, topics) by nature? Secondly, what attitude should we adopt towards them? Thirdly, what will be the outcome for those who have this attitude?\" Pyrrho's answer is that \"As for pragmata they are all adiaphora (undifferentiated by a logical differentia), astathm\u0113ta (unstable, unbalanced, not measurable), and anepikrita (unjudged, unfixed, undecidable). Therefore, neither our sense-perceptions nor our doxai (views, theories, beliefs) tell us the truth or lie; so we certainly should not rely on them. Rather, we should be adoxastoi (without views), aklineis (uninclined toward this side or that), and akradantoi (unwavering in our refusal to choose), saying about every single one that it no more is than it is not or it both is and is not or it neither is nor is not. Ancient Greek ethics is eudaimonist because it links virtue and eudaimonia, where eudaimonia refers to an individual's well-being . Epicurus' doctrine can be considered eudaimonist since Epicurus argues that a life of pleasure will coincide with a life of virtue. Principal Doctrines, 5 URL He believes that we do and ought to seek virtue because virtue brings pleasure. Epicurus' basic doctrine is that a life of virtue is the life which generates the most amount of pleasure, and it is for this reason that we ought to be virtuous. This thesis\u2014the eudaimon life is the pleasurable life\u2014is not a tautology as \"eudaimonia is the good life\" would be: rather, it is the substantive and controversial claim that a life of pleasure and absence of pain is what eudaimonia consists in. Stoic philosophy begins with Zeno of Citium c.300 BC, and was developed by Cleanthes (331\u2013232 BC) and Chrysippus (c.280\u2013c.206 BC) into a formidable systematic unity. Zeno believed happiness was a \"good flow of life\"; Cleanthes suggested it was \"living in agreement with nature\", and Chrysippus believed it was \"living in accordance with experience of what happens by nature . \" Stoic ethics is a particularly strong version of eudaimonism. According to the Stoics, virtue is necessary and sufficient for eudaimonia. (This thesis is generally regarded as stemming from the Socrates of Plato's earlier dialogues.) We saw earlier that the conventional Greek concept of arete is not quite the same as that denoted by virtue, which has Christian connotations of charity, patience, and uprightness, since arete includes many non-moral virtues such as physical strength and beauty. However, the Stoic concept of arete is much nearer to the Christian conception of virtue, which refers to the moral virtues. However, unlike Christian understandings of virtue, righteousness or piety, the Stoic conception does not place as great an emphasis on mercy, forgiveness, self-abasement (i.e. the ritual process of declaring complete powerlessness and humility before God), charity and self-sacrificial love, though these behaviors/mentalities are not necessarily spurned by the Stoics (they are spurned by some other philosophers of Antiquity). Rather Stoicism emphasizes states such as justice, honesty, moderation, simplicity, self-discipline, resolve, fortitude, and courage (states which Christianity also encourages). Modern conceptions \"Modern Moral Philosophy\" Interest in the concept of eudaimonia and ancient ethical theory more generally had a revival in the 20th century. G. E. M. Anscombe in her article \"Modern Moral Philosophy\" (1958) argued that duty-based conceptions of morality are conceptually incoherent for they are based on the idea of a \"law without a lawgiver . \" She claims a system of morality conceived along the lines of the Ten Commandments depends on someone having made these rules. Anscombe recommends a return to the eudaimonistic ethical theories of the ancients, particularly Aristotle, which ground morality in the interests and well-being of human moral agents, and can do so without appealing to any such lawgiver. The Japanese concept of Ikigai has been described as eudaimonic well-being, as it \"entails actions of devoting oneself to pursuits one enjoys and is associated with feelings of accomplishment and fulfillment . \" Ataraxia Eudaemon (mythology) Eudaemons Eupraxsophy Humanism Maslow's hierarchy of needs Perfectionism Phronesis Social quality Summum bonum Virtue ethics Well-being Further reading %DIFDELCMD < %DIFDELCMD < %%% Primary sources Aristotle . The Nichomachean Ethics, translated by Martin Ostwald . New York: The Bobs-Merrill Company. 1962 \u2014\u2014 The Complete Works of Aristotle, vol. 1 and 2 ( rev. ed. ), edited by Jonathan Barnes( 1984 ) ] . Bollingen Foundation .1995. Cicero. \"On Ends\" in De Finibus Bonorum et Malorum , translated by H. Rackham, Loeb Classical Library . Cambridge: Harvard University Press . 1914. Latin text with old-fashioned and not always philosophically precise English translation. Epicurus. \"Letter to Menoeceus, Principal Doctrines, and Vatican Sayings . \" Pp. 28\u201340 in Hellenistic Philosophy: Introductory Readings (2nd ed.), edited by B. Inwood and L. Gerson . Indianapolis: Hackett Publishing Co. 1998. . Plato. Plato's Complete Works, edited by John M. Cooper, translated by D. S. Hutchinson. Indianapolis: Hackett Publishing Co. 1997. . Secondary sources Ackrill, J. L. (1981) Aristotle the Philosopher. Oxford: Oxford University Press. Anscombe, G. E. M. (1958) Modern Moral Philosophy. Philosophy 33; repr. in G.E.M. Anscombe (1981), vol. 3 , 26\u201342. Broadie, Sarah W. (1991) Ethics with Aristotle. Oxford: Oxford University Press. Irwin, T. H. (1995) Plato's Ethics, Oxford: Oxford University Press. Janello, Martin (2013) Philosophy of Happiness, Palioxis Publishing, 1000 pages, Long, A. A., and D.N. Sedley, The Hellenistic Philosophers, vol 1 and 2 (Cambridge: Cambridge University Press, 1987) McMahon, Darrin M. (2005). Happiness: A History. Atlantic Monthly Press. \u2014\u2014 (2004) \"The History of Happiness: 400 B.C. \u2013 A.D. 1780.\" Daedalus (Spring 2004). Norton, David L. (1976) Personal Destinies, Princeton University Press. Urmson, J. O. (1988) Aristotle's Ethics. Oxford: Blackwell. Vlastos, G. (1991) Socrates: Ironist and Moral Philosopher. Ithaca, NY: Cornell University Press. Happiness Category: Philosophy of Aristotle Category:Concepts in ancient Greek ethics Category:Concepts in ancient Greek metaphysics Category:Concepts in ancient Greek philosophy of mind Category: Epicureanism Category: Metaphysics of mind Category: Philosophy of love Category:Platonism Category:Positive psychology Category:Pyrrhonism Category:Religious philosophical concepts Category:Stoicism Category:Virtue Category:Virtue ethics Category:Well-bein", "after_revision": "Eudaimonia (Greek: \u03b5\u1f50\u03b4\u03b1\u03b9\u03bc\u03bf\u03bd\u03af\u03b1 ), sometimes anglicized as eudaemonia or eudemonia , is a Greek word commonly translated as happiness or welfare ; however, \"human flourishing or prosperity\" Daniel N. Robinson. (1999). Aristotle's Psychology. Published by Daniel N. Robinson. and \"blessedness\"Simon Critchley, \" Tragedy, the Greeks, and Us ,\" 2019, p 140 have been proposed as more accurate translations. Etymologically, it consists of the words \"eu\" (\"good\") and \"daim\u014dn\" (\"spirit\"). It is a central concept in Aristotelian ethics and subsequent Hellenistic philosophy, along with the terms \"aret\u0113\" (most often translated as \"virtue\" or \"excellence\") and \"phronesis\" (often translated as \"practical or ethical wisdom\"). In Aristotle's works , eudaimonia (based on older Greek tradition) was used as the term for the highest human good, and so it is the aim of practical philosophy, including ethics and political philosophy, to consider (and also experience) what it really is, and how it can be achieved. Discussion of the links between virtue of character (\u0113thik\u0113 aret\u0113) and happiness (eudaimonia ) is one of the central concerns of ancient ethics, and a subject of much disagreement. As a result there are many varieties of eudaimonism. Definition The Definitions, a dictionary of Greek philosophical terms attributed to Plato himself but believed by modern scholars to have been written by his immediate followers in the Academy, provides the following definition of the word eudaimonia: \"The good composed of all goods; an ability which suffices for living well; perfection in respect of virtue; resources sufficient for a living creature.\" In his Nicomachean Ethics (\u00a721; 1095a15\u201322), Aristotle says that everyone agrees that eudaimonia is the highest good for human beings, but that there is substantial disagreement on what sort of life counts as doing and living well; i.e. eudaimon: Verbally there is a very general agreement; for both the general run of men and people of superior refinement say that it is [eudaimonia], and identify living well and faring well with being happy; but with regard to what [eudaimonia] is they differ, and the many do not give the same account as the wise. For the former think it is some plain and obvious thing like pleasure, wealth or honour\u2026 [1095a17] So, as Aristotle points out, saying that eudaimon life is a life which is objectively desirable, and means living well, is not saying very much. Everyone wants to be eudaimon; and everyone agrees that being eudaimon is related to faring well and to an individual's well being . The really difficult question is to specify just what sort of activities enable one to live well. Aristotle presents various popular conceptions of the best life for human beings. The candidates that he mentions are a (1) life of pleasure, (2) a life of political activity and (3) a philosophical life. %DIFDELCMD < %DIFDELCMD < %%% One important move in Greek philosophy to answer the question of how to achieve eudaimonia is to bring in another important concept in ancient philosophy, \"arete\" (\"virtue\" ). Aristotle says that the eudaimon life is one of \"virtuous activity in accordance with reason\" [1097b22\u20131098a20] . And even Epicurus who argues that the eudaimon life is the life of pleasure maintains that the life of pleasure coincides with the life of virtue. So the ancient ethical theorists tend to agree that virtue is closely bound up with happiness (aret\u00e9 is bound up with eudaimonia). However, they disagree on the way in which this is so. We shall consider the main theories in a moment, but first a warning about the proper translation of aret\u00e9. As already noted, the Greek word aret\u00e9 is usually translated into English as \"virtue\". One problem with this is that we are inclined to understand virtue in a moral sense, which is not always what the ancients had in mind. For a Greek, aret\u00e9 pertains to all sorts of qualities we would not regard as relevant to ethics, for example, physical beauty. So it is important to bear in mind that the sense of \u2018virtue' operative in ancient ethics is not exclusively moral and includes more than states such as wisdom, courage and compassion. The sense of virtue which aret\u00e9 connotes would include saying something like \"speed is a virtue in a horse \" , or \"height is a virtue in a basketball player \" . Doing anything well requires virtue, and each characteristic activity (such as carpentry, flute playing, etc.) has its own set of virtues. The alternative translation \"excellence\" (or \" a desirable quality \" ) might be helpful in conveying this general meaning of the term. The moral virtues are simply a subset of the general sense in which a human being is capable of functioning well or excellently. The Questionnaire for Eudaimonic Well-Being developed in Positive Psychology lists six dimensions of Eudaimonia: self-discovery, perceived development of one's best potentials, a sense of purpose and meaning in life, investment of significant effort in pursuit of excellence, intense involvement in activities and enjoyment of activities as personally expressive.Kjell, Oscar (2011). \"Sustainable Well-Being: A Potential Synergy Between Sustainability and Well-Being Research.\" Review of General Psychology, vol. 15, no. 3, pp. 255-266. URL Etymology and translation In terms of its etymology, eudaimonia is an abstract noun derived from eu meaning \"well\" and daimon (daemon), which refers to a minor deity or a guardian spirit. Eudaimonia implies a positive and divine state of being that humanity is able to strive toward and possibly reach. A literal view of eudaimonia means achieving a state of being similar to benevolent deity, or being protected and looked after by a benevolent deity. As this would be considered the most positive state to be in, the word is often translated as 'happiness' although incorporating the divine nature of the word extends the meaning to also include the concepts of being fortunate, or blessed. Despite this etymology, however, discussions of eudaimonia in ancient Greek ethics are often conducted independently of any super-natural significance. In his Nicomachean Ethics , (1095a15\u201322) Aristotle says that eudaimonia means 'doing and living well'. It is significant that synonyms for eudaimonia are living well and doing well. On the standard English translation, this would be to say that \u2018happiness is doing well and living well'. The word \u2018happiness' does not entirely capture the meaning of the Greek word. One important difference is that happiness often connotes being or tending to be in a certain pleasant state of mind. For example, when we say that someone is \"a very happy person \" , we usually mean that they seem subjectively contented with the way things are going in their life. We mean to imply that they feel good about the way things are going for them. In contrast, eudaimonia is a more encompassing notion than feeling happy since events that do not contribute to one's experience of feeling happy may affect one's eudaimonia. Eudaimonia depends on all the things that would make us happy if we knew of their existence, but quite independently of whether we do know about them. Ascribing eudaimonia to a person, then, may include ascribing such things as being virtuous, being loved and having good friends. But these are all objective judgments about someone's life: they concern a person's really being virtuous, really being loved, and really having fine friends. This implies that a person who has evil sons and daughters will not be judged to be eudaimonic even if he or she does not know that they are evil and feels pleased and contented with the way they have turned out (happy). Conversely, being loved by your children would not count towards your happiness if you did not know that they loved you (and perhaps thought that they did not), but it would count towards your eudaimonia. So eudaimonia corresponds to the idea of having an objectively good or desirable life, to some extent independently of whether one knows that certain things exist or not. It includes conscious experiences of well being , success, and failure, but also a whole lot more. (See Aristotle's discussion: Nicomachean Ethics, book 1.10\u20131.11.) Because of this discrepancy between the meaning of eudaimonia and happiness, some alternative translations have been proposed. W.D. Ross suggests \" well-being \" and John Cooper proposes \"flourishing\" . These translations may avoid some of the misleading associations carried by \"happiness\" although each tends to raise some problems of its own. In some modern texts therefore, the other alternative is to leave the term in an English form of the original Greek, as \"eudaimonia\" . Main views on eudaimonia and its relation to aret\u0113 As with all ancient ethical thinkers, Socrates thought that all human beings wanted eudaimonia more than anything else . (see Plato, Apology 30b, Euthydemus 280d\u2013282d, Meno 87d\u201389a). However, Socrates adopted a quite radical form of eudaimonism (see above): he seems to have thought that virtue is both necessary and sufficient for eudaimonia. Socrates is convinced that virtues such as self-control, courage, justice, piety, wisdom and related qualities of mind and soul are absolutely crucial if a person is to lead a good and happy (eudaimon) life. Virtues guarantee a happy life eudaimonia. For example, in the Meno, with respect to wisdom, he says: \"everything the soul endeavours or endures under the guidance of wisdom ends in happiness\" [ Meno 88c ] . In the Apology, Socrates clearly presents his disagreement with those who think that the eudaimon life is the life of honour or pleasure, when he chastises the Athenians for caring more for riches and honour than the state of their souls. Good Sir, you are an Athenian, a citizen of the greatest city with the greatest reputation for both wisdom and power; are you not ashamed of your eagerness to possess as much wealth, reputation, and honors as possible, while you do not care for nor give thought to wisdom or truth or the best possible state of your soul [ 29e ] . .. %DIFDELCMD < [%%% . it does not seem like human nature for me to have neglected all my own affairs and to have tolerated this neglect for so many years while I was always concerned with you, approaching each one of you like a father or an elder brother to persuade you to care for virtue. [ 31a\u2013b; italics added ] It emerges a bit further on that this concern for one's soul, that one's soul might be in the best possible state, amounts to acquiring moral virtue. So Socrates' pointing out that the Athenians should care for their souls means that they should care for their virtue, rather than pursuing honour or riches. Virtues are states of the soul. When a soul has been properly cared for and perfected it possesses the virtues. Moreover, according to Socrates, this state of the soul, moral virtue, is the most important good. The health of the soul is incomparably more important for eudaimonia than (e.g.) wealth and political power. Someone with a virtuous soul is better off than someone who is wealthy and honoured but whose soul is corrupted by unjust actions. This view is confirmed in the Crito, where Socrates gets Crito to agree that the perfection of the soul, virtue, is the most important good: And is life worth living for us with that part of us corrupted that unjust action harms and just action benefits? Or do we think that part of us, whatever it is, that is concerned with justice and injustice, is inferior to the body? Not at all. It is much more valuable\u2026? Much more\u2026 (47e\u201348a) Here Socrates argues that life is not worth living if the soul is ruined by wrongdoing. In summary, Socrates seems to think that virtue is both necessary and sufficient for eudaimonia. A person who is not virtuous cannot be happy, and a person with virtue cannot fail to be happy. We shall see later on that Stoic ethics takes its cue from this Socratic insight. Plato %DIFDELCMD < %DIFDELCMD < %%% Plato's great work of the middle period, the Republic, is devoted to answering a challenge made by the sophist Thrasymachus, that conventional morality, particularly the 'virtue' of justice, actually prevents the strong man from achieving eudaimonia. Thrasymachus's views are restatements of a position which Plato discusses earlier on in his writings, in the Gorgias, through the mouthpiece of Callicles. The basic argument presented by Thrasymachus and Callicles is that justice (being just) hinders or prevents the achievement of eudaimonia because conventional morality requires that we control ourselves and hence live with un-satiated desires. This idea is vividly illustrated in book 2 of the Republic when Glaucon, taking up Thrasymachus' challenge, recounts a myth of the magical ring of Gyges. According to the myth, Gyges becomes king of Lydia when he stumbles upon a magical ring, which, when he turns it a particular way, makes him invisible, so that he can satisfy any desire he wishes without fear of punishment. When he discovers the power of the ring he kills the king, marries his wife and takes over the throne. The thrust of Glaucon's challenge is that no one would be just if he could escape the retribution he would normally encounter for fulfilling his desires at whim. But if eudaimonia is to be achieved through the satisfaction of desire, whereas being just or acting justly requires suppression of desire, then it is not in the interests of the strong man to act according to the dictates of conventional morality. (This general line of argument reoccurs much later in the philosophy of Nietzsche.) Throughout the rest of the Republic, Plato aims to refute this claim by showing that the virtue of justice is necessary for eudaimonia. The School of Athens by Raffaello Sanzio, 1509, showing Plato (left) and Aristotle (right) Aristotle's account is articulated in the Nicomachean Ethics and the Eudemian Ethics. In outline, for Aristotle, eudaimonia involves activity, exhibiting virtue (aret\u0113 sometimes translated as excellence) in accordance with reason. This conception of eudaimonia derives from Aristotle's essentialist understanding of human nature, the view that reason (logos sometimes translated as rationality) is unique to human beings and that the ideal function or work (ergon) of a human being is the fullest or most perfect exercise of reason. Basically, well being (eudaimonia) is gained by proper development of one's highest and most human capabilities and human beings are \"the rational animal\". It follows that eudaimonia for a human being is the attainment of excellence (aret\u00e9) in reason. \" Whoever wants eudaimonia must consider these three questions: First, how are pragmata (ethical matters, affairs, topics) by nature? Secondly, what attitude should we adopt towards them? Thirdly, what will be the outcome for those who have this attitude?\" Pyrrho's answer is that \"As for pragmata they are all adiaphora (undifferentiated by a logical differentia), astathm\u0113ta (unstable, unbalanced, not measurable), and anepikrita (unjudged, unfixed, undecidable). Therefore, neither our sense-perceptions nor our doxai (views, theories, beliefs) tell us the truth or lie; so we certainly should not rely on them. Rather, we should be adoxastoi (without views), aklineis (uninclined toward this side or that), and akradantoi (unwavering in our refusal to choose), saying about every single one that it no more is than it is not or it both is and is not or it neither is nor is not. Ancient Greek ethics is eudaimonist because it links virtue and eudaimonia, where eudaimonia refers to an individual's well being . Epicurus' doctrine can be considered eudaimonist since Epicurus argues that a life of pleasure will coincide with a life of virtue. He believes that we do and ought to seek virtue because virtue brings pleasure. Epicurus' basic doctrine is that a life of virtue is the life which generates the most amount of pleasure, and it is for this reason that we ought to be virtuous. This thesis\u2014the eudaimon life is the pleasurable life\u2014is not a tautology as \"eudaimonia is the good life\" would be: rather, it is the substantive and controversial claim that a life of pleasure and absence of pain is what eudaimonia consists in. Stoic philosophy begins with Zeno of Citium c.300 BC, and was developed by Cleanthes (331\u2013232 BC) and Chrysippus (c.280\u2013c.206 BC) into a formidable systematic unity. Zeno believed happiness was a \"good flow of life\"; Cleanthes suggested it was \"living in agreement with nature\", and Chrysippus believed it was \"living in accordance with experience of what happens by nature \" . Stoic ethics is a particularly strong version of eudaimonism. According to the Stoics, virtue is necessary and sufficient for eudaimonia. (This thesis is generally regarded as stemming from the Socrates of Plato's earlier dialogues.) We saw earlier that the conventional Greek concept of arete is not quite the same as that denoted by virtue, which has Christian connotations of charity, patience, and uprightness, since arete includes many non-moral virtues such as physical strength and beauty. However, the Stoic concept of arete is much nearer to the Christian conception of virtue, which refers to the moral virtues. However, unlike Christian understandings of virtue, righteousness or piety, the Stoic conception does not place as great an emphasis on mercy, forgiveness, self-abasement (i.e. the ritual process of declaring complete powerlessness and humility before God), charity and self-sacrificial love, though these behaviors/mentalities are not necessarily spurned by the Stoics (they are spurned by some other philosophers of Antiquity). Rather Stoicism emphasizes states such as justice, honesty, moderation, simplicity, self-discipline, resolve, fortitude, and courage (states which Christianity also encourages). \"Modern Moral Philosophy\" Interest in the concept of eudaimonia and ancient ethical theory more generally had a revival in the twentieth century. G. E. M. Anscombe in her article \"Modern Moral Philosophy\" (1958) argued that duty-based conceptions of morality are conceptually incoherent for they are based on the idea of a \"law without a lawgiver \" . She claims a system of morality conceived along the lines of the Ten Commandments depends on someone having made these rules. Anscombe recommends a return to the eudaimonistic ethical theories of the ancients, particularly Aristotle, which ground morality in the interests and well being of human moral agents, and can do so without appealing to any such lawgiver. The Japanese concept of Ikigai has been described as eudaimonic well-being, as it \"entails actions of devoting oneself to pursuits one enjoys and is associated with feelings of accomplishment and fulfillment \" . Ataraxia Eudaemon (mythology) Eudaemons Eupraxsophy Humanism Maslow's hierarchy of needs Nicomachean Ethics Perfectionism Phronesis Social quality Summum bonum Virtue ethics Well-being Further reading %DIFDELCMD < %DIFDELCMD < %%% Ackrill, J. L. (1981) Aristotle the Philosopher. Oxford: Oxford University Press. Anscombe, G. E. M. (1958) Modern Moral Philosophy. Philosophy 33; repr. in G.E.M. Anscombe (1981), vol. 3, 26\u201342. Aristotle. The Nichomachean Ethics, translated by Martin Oswald (1962) . New York: The Bobs-Merrill Company. Aristotle. The Complete Works of Aristotle, vol. 1 and 2 , rev. ed. Jonathan Barnes, ed. Princeton: Princeton University Press, 1984 ] . Bollingen Foundation , 1995. Broadie, Sarah W. (1991) Ethics with Aristotle. Oxford: Oxford University Press. Cicero. De Finibus Bonorum et Malorum : \"On Ends\", H. Rackham, trans. Loeb Classical Library ( Cambridge: Harvard University Press , 1914). Latin text with old-fashioned and not always philosophically precise English translation. Epicurus. \"Letter to Menoeceus, Principal Doctrines, and Vatican Sayings , \" 28\u201340 in B. Inwood and L. Gerson , Hellenistic Philosophy: Introductory Readings, Second Edition Indianapolis: Hackett Publishing Co. , 1998. Irwin, T. H. (1995) Plato's Ethics, Oxford: Oxford University Press. Janello, Martin (2013) Philosophy of Happiness, Palioxis Publishing, 1000 pages, Long, A. A., and D.N. Sedley, The Hellenistic Philosophers, vol 1 and 2 (Cambridge: Cambridge University Press, 1987) Norton, David L. (1976) Personal Destinies, Princeton University Press. Plato. Plato's Complete Works, John M. Cooper, ed. Translated by D. S. Hutchinson. Indianapolis: Hackett Publishing Co., 1997. Urmson, J. O. (1988) Aristotle's Ethics. Oxford: Blackwell. Vlastos, G. (1991) Socrates: Ironist and Moral Philosopher. Ithaca, NY: Cornell University Press. McMahon, Darrin M., Happiness: A History, Atlantic Monthly Press, November 28, 2005. McMahon, Darrin M., The History of Happiness: 400 B.C. \u2013 A.D. 1780, Daedalus journal, Spring 2004. Happiness Category: Aristotelianism Category:Concepts in ancient Greek ethics Category:Concepts in ancient Greek metaphysics Category:Concepts in ancient Greek philosophy of mind Category: Concepts in ethics Category:Concepts in metaphysics Category: Epicureanism Category: History of ideas Category:History of philosophy Category: Metaphysics of mind Category: Mind Category:Philosophical concepts Category: Philosophy of love Category:Philosophy of mind Category:Philosophy of religion Category:Platonism Category:Positive psychology Category:Pyrrhonism Category:Religious philosophical concepts Category:Stoicism Category:Virtue Category:Virtue ethics Category:Well-bein", "edit_actions": [{"type": "R", "before": ";", "after": "),", "start_char_pos": 30, "end_char_pos": 31}, {"type": "D", "before": ")", "after": null, "start_char_pos": 82, "end_char_pos": 83}, {"type": "R", "before": "'happiness ' or 'welfare'", "after": "happiness or welfare", "start_char_pos": 123, "end_char_pos": 148}, {"type": "R", "before": "more accurate translations have been proposed to be 'human flourishing , prosperity'Robinson,", "after": "\"human flourishing or prosperity\"", "start_char_pos": 160, "end_char_pos": 253}, {"type": "R", "before": "1989.", "after": "Robinson. (1999).", "start_char_pos": 264, "end_char_pos": 269}, {"type": "R", "before": "New York: Columbia University Press. , . and 'blessedness'.Critchley, Simon. 2019.", "after": "Published by Daniel N. Robinson. and \"blessedness\"Simon Critchley, \"", "start_char_pos": 294, "end_char_pos": 376}, {"type": "R", "before": ". p 140.", "after": ",\" 2019, p 140 have been proposed as more accurate translations.", "start_char_pos": 405, "end_char_pos": 413}, {"type": "R", "before": "In the work of Aristotle", "after": "Etymologically, it consists of the words \"eu\" (\"good\") and \"daim\u014dn\" (\"spirit\"). It is a central concept in Aristotelian ethics and subsequent Hellenistic philosophy, along with the terms \"aret\u0113\" (most often translated as \"virtue\" or \"excellence\") and \"phronesis\" (often translated as \"practical or ethical wisdom\"). In Aristotle's works", "start_char_pos": 414, "end_char_pos": 438}, {"type": "D", "before": "It is thus a central concept in Aristotelian ethics and subsequent Hellenistic philosophy, along with the terms aret\u0113 (most often translated as 'virtue' or 'excellence') and phronesis\" ('practical or ethical wisdom').", "after": null, "start_char_pos": 704, "end_char_pos": 921}, {"type": "D", "before": "\u0113thik\u0113 aret\u0113 (", "after": null, "start_char_pos": 954, "end_char_pos": 968}, {"type": "A", "before": null, "after": "(\u0113thik\u0113 aret\u0113) and happiness (eudaimonia", "start_char_pos": 989, "end_char_pos": 989}, {"type": "D", "before": "and eudaimonia (happiness )", "after": null, "start_char_pos": 992, "end_char_pos": 1019}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1118, "end_char_pos": 1119}, {"type": "R", "before": "and etymology In terms of its etymology, eudaimonia is an abstract noun derived from the words eu ('good, well') and daim\u014dn ('spirit'), the latter referring to a minor deity or a guardian spirit.", "after": "The", "start_char_pos": 1172, "end_char_pos": 1367}, {"type": "R", "before": "well-being", "after": "well being", "start_char_pos": 2676, "end_char_pos": 2686}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2962, "end_char_pos": 2963}, {"type": "D", "before": "Positive psychology on eudaemonia The \"Questionnaire for Eudaimonic Well-Being\" developed in Positive Psychology lists six dimensions of eudaimonia:Kjell, Oscar (2011). \"Sustainable Well-Being: A Potential Synergy Between Sustainability and Well-Being Research.\" Review of General Psychology, vol. 15, no. 3, pp. 255-266. URL", "after": null, "start_char_pos": 2994, "end_char_pos": 3319}, {"type": "D", "before": "self-discovery; perceived development of one's best potentials; a sense of purpose and meaning in life; investment of significant effort in pursuit of excellence; intense involvement in activities; and enjoyment of activities as personally expressive.", "after": null, "start_char_pos": 3320, "end_char_pos": 3571}, {"type": "D", "before": "Eudaimonia and aret\u00e9", "after": null, "start_char_pos": 3601, "end_char_pos": 3621}, {"type": "R", "before": "aret\u0113 ('virtue'", "after": "\"arete\" (\"virtue\"", "start_char_pos": 3777, "end_char_pos": 3792}, {"type": "R", "before": "; even Epicurus ,", "after": ". And even Epicurus", "start_char_pos": 3908, "end_char_pos": 3925}, {"type": "D", "before": ",", "after": null, "start_char_pos": 3984, "end_char_pos": 3985}, {"type": "D", "before": ",", "after": null, "start_char_pos": 4060, "end_char_pos": 4061}, {"type": "R", "before": "One problem with the English translation of", "after": "As already noted, the Greek word", "start_char_pos": 4353, "end_char_pos": 4396}, {"type": "R", "before": "as 'virtue'", "after": "is usually translated into English as \"virtue\". One problem with this", "start_char_pos": 4403, "end_char_pos": 4414}, {"type": "D", "before": ",", "after": null, "start_char_pos": 4948, "end_char_pos": 4949}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4952, "end_char_pos": 4952}, {"type": "D", "before": ".", "after": null, "start_char_pos": 4999, "end_char_pos": 5000}, {"type": "A", "before": null, "after": ".", "start_char_pos": 5003, "end_char_pos": 5003}, {"type": "R", "before": "'excellence' (or '", "after": "\"excellence\" (or \"", "start_char_pos": 5171, "end_char_pos": 5189}, {"type": "R", "before": "'", "after": "\"", "start_char_pos": 5210, "end_char_pos": 5211}, {"type": "R", "before": "Eudaimonia and happiness", "after": "The Questionnaire for Eudaimonic Well-Being developed in Positive Psychology lists six dimensions of Eudaimonia: self-discovery, perceived development of one's best potentials, a sense of purpose and meaning in life, investment of significant effort in pursuit of excellence, intense involvement in activities and enjoyment of activities as personally expressive.Kjell, Oscar (2011). \"Sustainable Well-Being: A Potential Synergy Between Sustainability and Well-Being Research.\" Review of General Psychology, vol. 15, no. 3, pp. 255-266. URL", "start_char_pos": 5407, "end_char_pos": 5431}, {"type": "A", "before": null, "after": "Etymology and translation In terms of its etymology, eudaimonia is an abstract noun derived from eu meaning \"well\" and daimon (daemon), which refers to a minor deity or a guardian spirit.", "start_char_pos": 5432, "end_char_pos": 5432}, {"type": "A", "before": null, "after": ",", "start_char_pos": 6116, "end_char_pos": 6116}, {"type": "R", "before": "happiness", "after": "\u2018happiness'", "start_char_pos": 6386, "end_char_pos": 6395}, {"type": "D", "before": ",", "after": null, "start_char_pos": 6633, "end_char_pos": 6634}, {"type": "A", "before": null, "after": ",", "start_char_pos": 6637, "end_char_pos": 6637}, {"type": "D", "before": ",", "after": null, "start_char_pos": 7859, "end_char_pos": 7860}, {"type": "R", "before": "well-being", "after": "well being", "start_char_pos": 8066, "end_char_pos": 8076}, {"type": "R", "before": "meanings", "after": "meaning", "start_char_pos": 8234, "end_char_pos": 8242}, {"type": "R", "before": "'", "after": "\"", "start_char_pos": 8341, "end_char_pos": 8342}, {"type": "R", "before": "'", "after": "\"", "start_char_pos": 8354, "end_char_pos": 8355}, {"type": "R", "before": "'flourishing'", "after": "\"flourishing\"", "start_char_pos": 8381, "end_char_pos": 8394}, {"type": "R", "before": "eudaimonia", "after": "\"eudaimonia\"", "start_char_pos": 8660, "end_char_pos": 8670}, {"type": "R", "before": "Classical", "after": "Main", "start_char_pos": 8673, "end_char_pos": 8682}, {"type": "A", "before": null, "after": "its relation to", "start_char_pos": 8707, "end_char_pos": 8707}, {"type": "A", "before": null, "after": ".", "start_char_pos": 8833, "end_char_pos": 8833}, {"type": "D", "before": "(", "after": null, "start_char_pos": 9458, "end_char_pos": 9459}, {"type": "D", "before": ")", "after": null, "start_char_pos": 9471, "end_char_pos": 9472}, {"type": "D", "before": ". (", "after": null, "start_char_pos": 10037, "end_char_pos": 10040}, {"type": "D", "before": ")", "after": null, "start_char_pos": 10047, "end_char_pos": 10048}, {"type": "D", "before": "I", "after": null, "start_char_pos": 10074, "end_char_pos": 10075}, {"type": "R", "before": "t", "after": ". it", "start_char_pos": 10076, "end_char_pos": 10077}, {"type": "D", "before": "(", "after": null, "start_char_pos": 10344, "end_char_pos": 10345}, {"type": "D", "before": ")", "after": null, "start_char_pos": 10369, "end_char_pos": 10370}, {"type": "D", "before": ",", "after": null, "start_char_pos": 11571, "end_char_pos": 11572}, {"type": "R", "before": "well-being", "after": "well being", "start_char_pos": 14364, "end_char_pos": 14374}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 14605, "end_char_pos": 14605}, {"type": "R", "before": "well-being", "after": "well being", "start_char_pos": 15606, "end_char_pos": 15616}, {"type": "D", "before": "Principal Doctrines, 5 URL", "after": null, "start_char_pos": 15751, "end_char_pos": 15777}, {"type": "D", "before": ".", "after": null, "start_char_pos": 16641, "end_char_pos": 16642}, {"type": "A", "before": null, "after": ".", "start_char_pos": 16645, "end_char_pos": 16645}, {"type": "D", "before": "Modern conceptions", "after": null, "start_char_pos": 17876, "end_char_pos": 17894}, {"type": "R", "before": "20th", "after": "twentieth", "start_char_pos": 18022, "end_char_pos": 18026}, {"type": "D", "before": ".", "after": null, "start_char_pos": 18237, "end_char_pos": 18238}, {"type": "A", "before": null, "after": ".", "start_char_pos": 18241, "end_char_pos": 18241}, {"type": "R", "before": "well-being", "after": "well being", "start_char_pos": 18519, "end_char_pos": 18529}, {"type": "D", "before": ".", "after": null, "start_char_pos": 18815, "end_char_pos": 18816}, {"type": "A", "before": null, "after": ".", "start_char_pos": 18819, "end_char_pos": 18819}, {"type": "A", "before": null, "after": "Nicomachean Ethics", "start_char_pos": 18909, "end_char_pos": 18909}, {"type": "D", "before": "Primary sources", "after": null, "start_char_pos": 19033, "end_char_pos": 19048}, {"type": "R", "before": "Aristotle .", "after": "Ackrill, J. L. (1981) Aristotle the Philosopher. Oxford: Oxford University Press. Anscombe, G. E. M. (1958) Modern Moral Philosophy. Philosophy 33; repr. in G.E.M. Anscombe (1981), vol. 3, 26\u201342. Aristotle.", "start_char_pos": 19049, "end_char_pos": 19060}, {"type": "R", "before": "Ostwald", "after": "Oswald (1962)", "start_char_pos": 19107, "end_char_pos": 19114}, {"type": "R", "before": "1962 \u2014\u2014", "after": "Aristotle.", "start_char_pos": 19153, "end_char_pos": 19160}, {"type": "R", "before": "(", "after": ",", "start_char_pos": 19207, "end_char_pos": 19208}, {"type": "R", "before": "), edited by Jonathan Barnes(", "after": "Jonathan Barnes, ed. Princeton: Princeton University Press,", "start_char_pos": 19218, "end_char_pos": 19247}, {"type": "D", "before": ")", "after": null, "start_char_pos": 19253, "end_char_pos": 19254}, {"type": "R", "before": ".1995. Cicero. \"On Ends\" in", "after": ", 1995. Broadie, Sarah W. (1991) Ethics with Aristotle. Oxford: Oxford University Press. Cicero.", "start_char_pos": 19280, "end_char_pos": 19307}, {"type": "R", "before": ", translated by", "after": ": \"On Ends\",", "start_char_pos": 19338, "end_char_pos": 19353}, {"type": "A", "before": null, "after": "trans.", "start_char_pos": 19366, "end_char_pos": 19366}, {"type": "R", "before": ".", "after": "(", "start_char_pos": 19390, "end_char_pos": 19391}, {"type": "R", "before": ". 1914.", "after": ", 1914).", "start_char_pos": 19428, "end_char_pos": 19435}, {"type": "R", "before": ".", "after": ",", "start_char_pos": 19599, "end_char_pos": 19600}, {"type": "D", "before": "Pp.", "after": null, "start_char_pos": 19603, "end_char_pos": 19606}, {"type": "D", "before": "Hellenistic Philosophy: Introductory Readings (2nd ed.), edited by", "after": null, "start_char_pos": 19616, "end_char_pos": 19682}, {"type": "R", "before": ". Indianapolis: Hackett Publishing Co. 1998. . Plato. Plato's Complete Works, edited by John M. Cooper, translated by D. S. Hutchinson.", "after": ", Hellenistic Philosophy: Introductory Readings, Second Edition", "start_char_pos": 19707, "end_char_pos": 19842}, {"type": "D", "before": "1997. .", "after": null, "start_char_pos": 19880, "end_char_pos": 19887}, {"type": "D", "before": "Secondary sources Ackrill, J. L. (1981) Aristotle the Philosopher. Oxford: Oxford University Press. Anscombe, G. E. M. (1958) Modern Moral Philosophy. Philosophy 33; repr. in G.E.M. Anscombe (1981), vol. 3", "after": null, "start_char_pos": 19888, "end_char_pos": 20093}, {"type": "R", "before": "26\u201342. Broadie, Sarah W. (1991) Ethics with Aristotle. Oxford: Oxford University Press.", "after": "1998.", "start_char_pos": 20096, "end_char_pos": 20183}, {"type": "D", "before": "McMahon, Darrin M. (2005). Happiness: A History. Atlantic Monthly Press. \u2014\u2014 (2004) \"The History of Happiness: 400 B.C. \u2013 A.D. 1780.\" Daedalus (Spring 2004).", "after": null, "start_char_pos": 20452, "end_char_pos": 20608}, {"type": "A", "before": null, "after": "Plato. Plato's Complete Works, John M. Cooper, ed. Translated by D. S. Hutchinson. Indianapolis: Hackett Publishing Co., 1997.", "start_char_pos": 20681, "end_char_pos": 20681}, {"type": "A", "before": null, "after": "McMahon, Darrin M., Happiness: A History, Atlantic Monthly Press, November 28, 2005. McMahon, Darrin M., The History of Happiness: 400 B.C. \u2013 A.D. 1780, Daedalus journal, Spring 2004.", "start_char_pos": 20840, "end_char_pos": 20840}, {"type": "R", "before": "Philosophy of Aristotle", "after": "Aristotelianism", "start_char_pos": 20861, "end_char_pos": 20884}, {"type": "A", "before": null, "after": "Concepts in ethics Category:Concepts in metaphysics Category:", "start_char_pos": 21038, "end_char_pos": 21038}, {"type": "A", "before": null, "after": "History of ideas Category:History of philosophy Category:", "start_char_pos": 21062, "end_char_pos": 21062}, {"type": "A", "before": null, "after": "Mind Category:Philosophical concepts Category:", "start_char_pos": 21093, "end_char_pos": 21093}, {"type": "A", "before": null, "after": "Category:Philosophy of mind Category:Philosophy of religion", "start_char_pos": 21113, "end_char_pos": 21113}], "sents_char_pos": [0, 31, 150, 269, 293, 353, 370, 413, 703, 921, 1105, 1160, 1367, 1637, 1680, 1713, 1758, 1790, 1990, 2049, 2203, 2311, 2400, 2555, 2586, 2688, 2786, 2868, 2993, 3162, 3315, 3335, 3383, 3423, 3482, 3517, 3571, 3795, 3909, 4056, 4189, 4244, 4352, 4528, 4655, 4840, 5142, 5277, 5406, 5547, 5697, 5937, 6089, 6191, 6270, 6376, 6452, 6570, 6736, 6814, 6989, 7140, 7270, 7429, 7650, 7855, 8028, 8127, 8321, 8396, 8539, 8895, 9056, 9264, 9307, 9715, 9833, 9898, 10343, 10354, 10522, 10680, 10712, 10792, 10891, 11000, 11131, 11386, 11505, 11517, 11544, 11555, 11655, 11752, 11848, 11930, 12217, 12372, 12616, 12770, 12994, 13097, 13259, 13508, 13592, 13728, 13905, 14050, 14352, 14508, 14604, 14737, 14791, 14860, 15069, 15177, 15218, 15486, 15750, 15857, 16020, 16266, 16432, 16483, 16707, 16783, 16879, 17142, 17267, 17697, 17875, 18035, 18367, 18606, 19060, 19116, 19152, 19286, 19435, 19525, 19600, 19685, 19708, 19760, 19842, 19954, 19987, 20038, 20053, 20069, 20102, 20150, 20183, 20252, 20478, 20500, 20524, 20608, 20680, 20722, 20741, 20801, 20839]}
+{"doc_id": "1932128", "revision_depth": "1", "before_revision": "In other media Television Dr. Destiny made several appearances in the DCAU , voiced by William Atherton. Dr. Destiny was briefly considered to be featured in The New Batman Adventures ; Atherton was considered for the role.Dr. Destiny as he appeared in the Justice League animated series. Doctor Destiny appears in Justice League . John Dee was a low-level employee of LexCorp and small-time crook who was incarcerated in Stryker's Prison for guarding a supply of smuggled weapons. In the episode \"Only a Dream\", he volunteered to be a guinea pig for a doctor's experiments with the Materioptikon, a machine that gave people ESP abilities. Between sessions, he dreamt of single-handedly defeating the Justice League and being a member of the Injustice Gang with Lex Luthor and the Joker personally recruiting him. When he found out that his parole request didn't go through , his wife Penny Dee (voiced by Fairuza Balk) left him soon after for another man, exacerbating his situation. John found an opportunity to abuse the Materioptikon during a prison riot, exposing himself to an intensified burst from the machine. The experience gave him even greater telepathy , setting off to wreak havoc on people through via dreams. His first act of super-villainy has him using his abilities to mentally torture Penny in retribution for turning her back on him, manipulating his appearance to match his standard comic book costume and deciding that his name's too ordinary and takes the 'Doctor Destiny' name. As a result of his telepathic torture, Penny died from traumatic shock. Dr. Destiny next traps Superman, Hawkgirl, the Green Lantern and the Flash in dreams of playing out their worst fears: Hawkgirl gets trapped in a coffin and buried alive, Wally West gets trapped in a fast moving realm that the world around is virtually motionless, Superman's powers increased beyond the ability to control and accidentally caused massive destruction and killed several loved ones, and John Stewart gets trapped in a world now truly alienated from friends and family. J'onn J'onzz telepathically entered these dreams to make his teammates realize that what they were experiencing was not real, while Batman eventually tracked down Dr. Destiny and keeps free of the influence by humming Fr\u00e8re Jacques. Attempting to stab Batman with a syringe filled with a powerful sedative , Dee inadvertently stabbed and injected himself. Deegan is last seen back at Stryker's in a catatonic state humming Frere Jacques over and over again. Dr. Destiny made several nonspeaking appearances in Justice League Unlimited, having apparently recovered and now able to assume his nightmare form in reality. In \"I Am Legion\", Dr. Destiny is a member of Gorilla Grodd's Secret Society. In the episode \"Alive \", Dr. Destiny is briefly seen with Luthor 's team of supervillains, though he is killedwhen Darkseid destroys the Secret Society's base. upJeremy Davies as John Deegan in the Arrowverse television crossover \"Elseworlds\". A version of Dr. Destiny under the name John Deegan appears in the Arrowverse 2018 crossover \"Elseworlds\", primarily portrayed by Jeremy Davies. A psychiatristin Gotham City, John Deegan's views on patient treatment, which includes augmenting individuals to achieve their peak potential, are considered extreme, and his colleagues have deemed him mad . The multiverse-traveling Monitor approaches Deegan, commends him on his \"vision\", and gives the Book of Destiny to him, granting him reality rewriting power. It is also revealed later in the crossover \"Crisis on Infinite Earths\" that his usage of the Book has driven him further into insanity. Deegan attempts to recreate the universe in his ideal image but ends up just switching Barry Allen and Oliver Queen's lives around when he had intended to make himself a superhero. Following a vibe from Cisco Ramon, Barry and Oliver discover that Deeganresides in Gotham. Deegan is confronted by Barry, Oliver and Supergirl at Arkham Asylum. After releasing Arkham's inmates to cover his escape, Deegan temporarily loses possession of the Book of Destiny . The Monitor reclaims the Book of Destiny from A.R.G.U.S. and returns it to Deegan, telling him to \"think bigger\" with his reality rewriting. This leads to him writing a reality where he is a black-suited Earth-1 equivalent of Superman (portrayed by Tyler Hoechlin) , Oliver and Barry are bank robbers, and Supergirl is imprisoned in S.T.A.R. Labs. He does this because he has always wanted to be a superhero but could never achieve this on his own; his opponents note that Deegancan never be the superhero he believes himself to be because of his selfishness. In the end, it takes the combined forces of Supergirl, the Flash, Green Arrow and the real Superman to finally separate him from the Book of Destiny and undo his changeswith the help of a special arrow that negates the Book of Destiny's abilities, though this results in his horrible disfigurement that matches his corrupted character (and thus resembles his comic book counterpart). Deegan is later seen imprisoned at Arkhamfor his crimes, with Psycho-Pirate as his next door cellmate as Batwoman tells Oliver about this . David Thewlis has been cast as John Dee in the upcoming Netflix adaptation of The Sandman.M. Arbeiter (May 26, 2021). URL Film A version of the New 52 Doctor Destiny under the name \"Destiny\" is the main antagonist in Justice League Dark, voiced by Alfred Molina. Described as a dark magic practitioner who was active centuries ago, this version was initially defeated by Merlin and Etrigan the Demon, with his spirit trapped in the 'Dreamstone' , an ancient magical artifact that is mostly kept contained in the House of Mystery and monitored by John Constantine. Ritchie Simpson is manipulated into bringing the Dreamstone together to save his own life, thus restoring Destiny to life in his own body, in which he demonstrates the ability to create magical shields and generate telepathic illusions, to the point that he provokes Green Lantern, Wonder Woman and Superman into attacking Batman . Despite his power, Destiny is defeated when Constantinetricks Destiny into taking him inside Destiny's force field, allowing Deadman\u2014who was possessing Constantine at the time\u2014to possess Destiny, allowing their opponents to attack Destiny, culminating in Jason Blood impaling Destiny from behind and separating him from the Dreamstone. Doctor Destiny appears as the central antagonist of Sandman: 24 Hour Diner, portrayed by Zach MacKendrick . The film is based on the \"24 Hours\" cult horror issue of Vertigo's Sandman, written by Neil Gaiman .", "after_revision": "In other media Television Doctor Destiny appears in series set in the DC Animated Universe , voiced by William Atherton. Destiny was briefly considered to appear in The New Batman Adventures with Atherton in the role.Dr. Destiny as he appeared in the Justice League animated series. Destiny appears in Justice League episode \"Only a Dream\". This version of John Dee was a low-level employee of LexCorp and small-time crook who was incarcerated in Stryker's Prison for guarding a supply of smuggled weapons. He volunteers to be a guinea pig for a doctor's experiments with the Materioptikon, a machine that gives people ESP abilities. In between sessions, he dreams of single-handedly defeating the Justice League and joining the Injustice Gang , with Lex Luthor and the Joker personally recruiting him. However, after learning his parole request failed to go through and his wife Penny (voiced by Fairuza Balk) leaves him for another man, Dee abuses the Materioptikon during a prison riot, gaining telepathy and leaving to attack people in their dreams. Using his abilities to manipulate his appearance and taking the name \"Doctor Destiny\", Dee kills Penny before trapping most of the Justice League in their worst nightmares. However, Martian Manhunter rescues his fellow Leaguers while a sleep-deprived Batman eventually tracks down Destiny and confronts him. In the ensuing struggle, Destiny accidentally injects himself with a powerful sedative and is later re-incarcerated at Stryker's while in a catatonic state . Destiny makes several non-speaking appearances in Justice League Unlimited, having apparently recovered and now able to assume his nightmare form in reality. As of the episode \"I Am Legion\", he has joined Gorilla Grodd's Secret Society. In the episode \"Alive ! \", Destiny takes part in a fight between Society members loyal to Luthor and those with Grodd until Killer Frost freezes Grodd's faction, Grodd himself is killed, and Darkseid destroys the Society's base. upJeremy Davies as John Deegan in the Arrowverse television crossover \"Elseworlds\". A variation of Doctor Destiny, under the name John Deegan , appears in the 2018 live-action Arrowverse crossover \"Elseworlds\", primarily portrayed by Jeremy Davies. An Arkham Asylum psychiatrist, this version believes in augmenting patients to help them achieve their peak potential, though his colleagues consider him mad and his methods extreme . The multiverse-traveling Monitor approaches Deegan, commends him on his \"vision\", and gives him the Book of Destiny to rewrite reality as he sees fit. Deegan attempts to make himself a superhero, but switches Barry Allen and Oliver Queen's lives instead. After the heroes convince their respective teams of the changes and learn of Deegan, they travel to Arkham to confront him. However, they manage to secure the Book of Destiny while Deegan escapes. Following this, the Monitor takes the book back and returns it to Deegan, who successfully alters reality and transforms himself into a black-suited Superman (portrayed by Tyler Hoechlin) . Despite having been turned into powerless criminals, Allen and Queen recruit allies from Earth-38 to help them stop Deegan. With the Monitor's help, Queen succeeds in separating Deegan from the Book of Destiny and undoing his changes, resulting in Deegan being disfigured. He is later imprisoned in Arkham . David Thewlis will appear as John Dee in the upcoming Netflix series The Sandman.M. Arbeiter (May 26, 2021). URL Film A variation of the New 52 Doctor Destiny , simply referred to as \"Destiny\" , appears in the animated film Justice League Dark, voiced by Alfred Molina. Described as a dark magic practitioner who was active centuries ago, this version was initially defeated by Merlin and Etrigan the Demon, with his spirit trapped in the \"Dreamstone\" , an ancient magical artifact contained in the House of Mystery and monitored by John Constantine. Ritchie Simpson is manipulated into bringing the Dreamstone together to save his own life, which restores Destiny to life in Simpson's body . Despite his power, Destiny is defeated by Constantine, Deadman, and Jason Blood after they separate him from the Dreamstone. Doctor Destiny appears in the live-action fan film Sandman: 24 Hour Diner, portrayed by Zach MacKendrick .", "edit_actions": [{"type": "R", "before": "Dr. Destiny made several appearances in the DCAU", "after": "Doctor Destiny appears in series set in the DC Animated Universe", "start_char_pos": 26, "end_char_pos": 74}, {"type": "D", "before": "Dr.", "after": null, "start_char_pos": 105, "end_char_pos": 108}, {"type": "R", "before": "be featured", "after": "appear", "start_char_pos": 143, "end_char_pos": 154}, {"type": "R", "before": "; Atherton was considered for", "after": "with Atherton in", "start_char_pos": 184, "end_char_pos": 213}, {"type": "D", "before": "Doctor", "after": null, "start_char_pos": 289, "end_char_pos": 295}, {"type": "R", "before": ".", "after": "episode \"Only a Dream\". This version of", "start_char_pos": 330, "end_char_pos": 331}, {"type": "R", "before": "In the episode \"Only a Dream\", he volunteered", "after": "He volunteers", "start_char_pos": 482, "end_char_pos": 527}, {"type": "R", "before": "gave", "after": "gives", "start_char_pos": 613, "end_char_pos": 617}, {"type": "R", "before": "Between", "after": "In between", "start_char_pos": 640, "end_char_pos": 647}, {"type": "R", "before": "dreamt", "after": "dreams", "start_char_pos": 661, "end_char_pos": 667}, {"type": "R", "before": "being a member of", "after": "joining", "start_char_pos": 720, "end_char_pos": 737}, {"type": "A", "before": null, "after": ",", "start_char_pos": 757, "end_char_pos": 757}, {"type": "R", "before": "When he found out that", "after": "However, after learning", "start_char_pos": 815, "end_char_pos": 837}, {"type": "R", "before": "didn't go through ,", "after": "failed to go through and", "start_char_pos": 857, "end_char_pos": 876}, {"type": "D", "before": "Dee", "after": null, "start_char_pos": 892, "end_char_pos": 895}, {"type": "R", "before": "left him soon after", "after": "leaves him", "start_char_pos": 921, "end_char_pos": 940}, {"type": "R", "before": "exacerbating his situation. John found an opportunity to abuse", "after": "Dee abuses", "start_char_pos": 958, "end_char_pos": 1020}, {"type": "R", "before": "exposing himself to an intensified burst from the machine. The experience gave him even greater telepathy , setting off to wreak havoc on people through via dreams. His first act of super-villainy has him using", "after": "gaining telepathy and leaving to attack people in their dreams. Using", "start_char_pos": 1061, "end_char_pos": 1271}, {"type": "R", "before": "mentally torture Penny in retribution for turning her back on him, manipulating his appearance to match his standard comic book costume and deciding that his name's too ordinary and takes the 'Doctor Destiny' name. As a result of his telepathic torture, Penny died from traumatic shock. Dr. Destiny next traps Superman, Hawkgirl, the Green Lantern and the Flash in dreams of playing out their worst fears: Hawkgirl gets trapped in a coffin and buried alive, Wally West gets trapped in a fast moving realm that the world around is virtually motionless, Superman's powers increased beyond the ability to control and accidentally caused massive destruction and killed several loved ones, and John Stewart gets trapped in a world now truly alienated from friends and family. J'onn J'onzz telepathically entered these dreams to make his teammates realize that what they were experiencing was not real, while Batman eventually tracked down Dr. Destiny and keeps free of the influence by humming Fr\u00e8re Jacques. Attempting to stab Batman with a syringe filled with a powerful sedative , Dee inadvertently stabbed and injected himself. Deegan is last seen back", "after": "manipulate his appearance and taking the name \"Doctor Destiny\", Dee kills Penny before trapping most of the Justice League in their worst nightmares. However, Martian Manhunter rescues his fellow Leaguers while a sleep-deprived Batman eventually tracks down Destiny and confronts him. In the ensuing struggle, Destiny accidentally injects himself with a powerful sedative and is later re-incarcerated", "start_char_pos": 1289, "end_char_pos": 2440}, {"type": "A", "before": null, "after": "while", "start_char_pos": 2454, "end_char_pos": 2454}, {"type": "R", "before": "humming Frere Jacques over and over again. Dr. Destiny made several nonspeaking", "after": ". Destiny makes several non-speaking", "start_char_pos": 2476, "end_char_pos": 2555}, {"type": "R", "before": "In", "after": "As of the episode", "start_char_pos": 2679, "end_char_pos": 2681}, {"type": "R", "before": "Dr. Destiny is a member of", "after": "he has joined", "start_char_pos": 2697, "end_char_pos": 2723}, {"type": "A", "before": null, "after": "!", "start_char_pos": 2778, "end_char_pos": 2778}, {"type": "R", "before": "Dr. Destiny is briefly seen with Luthor 's team of supervillains, though he is killedwhen", "after": "Destiny takes part in a fight between Society members loyal to Luthor and those with Grodd until Killer Frost freezes Grodd's faction, Grodd himself is killed, and", "start_char_pos": 2782, "end_char_pos": 2871}, {"type": "D", "before": "Secret", "after": null, "start_char_pos": 2894, "end_char_pos": 2900}, {"type": "R", "before": "version of Dr. Destiny", "after": "variation of Doctor Destiny,", "start_char_pos": 3003, "end_char_pos": 3025}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3053, "end_char_pos": 3053}, {"type": "D", "before": "Arrowverse", "after": null, "start_char_pos": 3069, "end_char_pos": 3079}, {"type": "A", "before": null, "after": "live-action Arrowverse", "start_char_pos": 3085, "end_char_pos": 3085}, {"type": "R", "before": "A psychiatristin Gotham City, John Deegan's views on patient treatment, which includes augmenting individuals to", "after": "An Arkham Asylum psychiatrist, this version believes in augmenting patients to help them", "start_char_pos": 3148, "end_char_pos": 3260}, {"type": "R", "before": "are considered extreme, and his colleagues have deemed him mad", "after": "though his colleagues consider him mad and his methods extreme", "start_char_pos": 3291, "end_char_pos": 3353}, {"type": "A", "before": null, "after": "him", "start_char_pos": 3448, "end_char_pos": 3448}, {"type": "R", "before": "him, granting him reality rewriting power. It is also revealed later in the crossover \"Crisis on Infinite Earths\" that his usage of the Book has driven him further into insanity.", "after": "rewrite reality as he sees fit.", "start_char_pos": 3472, "end_char_pos": 3650}, {"type": "R", "before": "recreate the universe in his ideal image but ends up just switching", "after": "make himself a superhero, but switches", "start_char_pos": 3670, "end_char_pos": 3737}, {"type": "R", "before": "around when he had intended to make himself a superhero. Following a vibe from Cisco Ramon, Barry and Oliver discover that Deeganresides in Gotham. Deegan is confronted by Barry, Oliver and Supergirl at Arkham Asylum. After releasing Arkham's inmates to cover his escape, Deegan temporarily loses possession of", "after": "instead. After the heroes convince their respective teams of the changes and learn of Deegan, they travel to Arkham to confront him. However, they manage to secure", "start_char_pos": 3775, "end_char_pos": 4085}, {"type": "R", "before": ". The Monitor reclaims the Book of Destiny from A.R.G.U.S.", "after": "while Deegan escapes. Following this, the Monitor takes the book back", "start_char_pos": 4106, "end_char_pos": 4164}, {"type": "R", "before": "telling him to \"think bigger\" with his reality rewriting. This leads to him writing a reality where he is a", "after": "who successfully alters reality and transforms himself into a", "start_char_pos": 4191, "end_char_pos": 4298}, {"type": "D", "before": "Earth-1 equivalent of", "after": null, "start_char_pos": 4312, "end_char_pos": 4333}, {"type": "R", "before": ", Oliver and Barry are bank robbers, and Supergirl is imprisoned in S.T.A.R. Labs. He does this because he has always wanted to be a superhero but could never achieve this on his own; his opponents note that Deegancan never be the superhero he believes himself to be because of his selfishness. In the end, it takes the combined forces of Supergirl, the Flash, Green Arrow and the real Superman to finally separate him", "after": ". Despite having been turned into powerless criminals, Allen and Queen recruit allies from Earth-38 to help them stop Deegan. With the Monitor's help, Queen succeeds in separating Deegan", "start_char_pos": 4373, "end_char_pos": 4791}, {"type": "R", "before": "undo his changeswith the help of a special arrow that negates the Book of Destiny's abilities, though this results in his horrible disfigurement that matches his corrupted character (and thus resembles his comic book counterpart). Deegan is later seen imprisoned at Arkhamfor his crimes, with Psycho-Pirate as his next door cellmate as Batwoman tells Oliver about this", "after": "undoing his changes, resulting in Deegan being disfigured. He is later imprisoned in Arkham", "start_char_pos": 4821, "end_char_pos": 5189}, {"type": "R", "before": "has been cast", "after": "will appear", "start_char_pos": 5206, "end_char_pos": 5219}, {"type": "R", "before": "adaptation of", "after": "series", "start_char_pos": 5256, "end_char_pos": 5269}, {"type": "R", "before": "version", "after": "variation", "start_char_pos": 5321, "end_char_pos": 5328}, {"type": "R", "before": "under the name", "after": ", simply referred to as", "start_char_pos": 5358, "end_char_pos": 5372}, {"type": "R", "before": "is the main antagonist in", "after": ", appears in the animated film", "start_char_pos": 5383, "end_char_pos": 5408}, {"type": "R", "before": "'Dreamstone'", "after": "\"Dreamstone\"", "start_char_pos": 5624, "end_char_pos": 5636}, {"type": "D", "before": "that is mostly kept", "after": null, "start_char_pos": 5667, "end_char_pos": 5686}, {"type": "R", "before": "thus restoring", "after": "which restores", "start_char_pos": 5847, "end_char_pos": 5861}, {"type": "R", "before": "his own body, in which he demonstrates the ability to create magical shields and generate telepathic illusions, to the point that he provokes Green Lantern, Wonder Woman and Superman into attacking Batman", "after": "Simpson's body", "start_char_pos": 5881, "end_char_pos": 6085}, {"type": "R", "before": "when Constantinetricks Destiny into taking him inside Destiny's force field, allowing Deadman\u2014who was possessing Constantine at the time\u2014to possess Destiny, allowing their opponents to attack Destiny, culminating in Jason Blood impaling Destiny from behind and separating", "after": "by Constantine, Deadman, and Jason Blood after they separate", "start_char_pos": 6127, "end_char_pos": 6398}, {"type": "R", "before": "as the central antagonist of", "after": "in the live-action fan film", "start_char_pos": 6447, "end_char_pos": 6475}, {"type": "D", "before": ". The film is based on the \"24 Hours\" cult horror issue of Vertigo's Sandman, written by Neil Gaiman", "after": null, "start_char_pos": 6530, "end_char_pos": 6630}], "sents_char_pos": [0, 104, 185, 223, 288, 481, 639, 814, 985, 1119, 1225, 1503, 1575, 2059, 2292, 2415, 2518, 2678, 2755, 3000, 3147, 3355, 3514, 3650, 3831, 3922, 3992, 4107, 4248, 4455, 4556, 4667, 5051, 5282, 5309, 5454, 5755, 6087, 6423, 6531]}
+{"doc_id": "1935621", "revision_depth": "1", "before_revision": "Ralph Garvin Steinhauer, (June 8, 1905 \u2013 September 19, 1987) was the tenth Lieutenant Governor of Alberta, and the first Aboriginal person to hold that post. Personal life Ralph Garvin Apow (later Steinhauer) was born on June 8, 1905 at Morley, Northwest Territories (prior to the formation of the province of Alberta), the second of four children to Josiah Apow and Amelia Mildred Mumford. Steinhauer was a Treaty Indian of Cree descent. Steinhaurs 's father Josiah would die in 1908, and his mother would marry James Arthur Steinhauer on October 12, 1910, a descendant of the Cree Methodist Missionary Henry Bird Steinhauer. He married Isabel Florence Margaret Davidson on November 20, 1928 and had five children. In 1937, Ralph Steinhauer was diagnosed with tuberculosis and a decision was made to send the three eldest children to a residential school. After his recovery, his wife Isabel would educate the children at home after their request to have the children educated at a community school was denied on the basis of their Indigenous heritage. Steinhauer would become a farmer and began clearing a 16-hectare homestead, and would continue farming until his death in 1987. During the Great Depression Steinhauer would supplement his farming work with other labour such as logging and cutting fence posts. Education Ralph Steinhauer moved schools several times as a child due to his father's work as a missionary. Steinhauer would attend the residential school in Red Deer, the Doucet, Roseneath, Vilettea and Stry schools in northern Alberta and for three years starting in 1920 the Brandon Indian Residential school in Manitoba, and finished with a Grade 8 education. When Prime Minister Pierre Trudeau asked him to be the lieutenant-governor of Alberta, he responded, \"I'm not schooled for a thing like this... You're plucking a person out of the farmyard and an Indian at that.\" He ran unsuccessfully as the Liberal candidate for the House of Commons of Canada in the Alberta riding of Vegreville in the 1963 federal election, placing a distant third behind Progressive Conservative Frank Fane and Social Credit candidate Metro Tomyn. Steinhauer would be the second Treaty Indian to run as a candidate in a federal election. He was chief of the Saddle Lake Indian Band for three years between 1966 and 1969. He would establish the Saddle Lake Centennial Development Association which became a successful farming venture for the First Nation. 10th Lieutenant Governor of Alberta On the advice of Prime Minister Pierre Elliott Trudeau, Ralph G. Steinhauer was appointed Lieutenant Governor of Alberta effective July 2, 1974. This appointment was made by Jules L\u00e9ger, Governor General of Canada. His Senior Aide-de-Camp was Lieutenant-Colonel John H. Quarton, and his Secretary was M. Patricia Halligan. Federal Justice Minister Otto Lang would explain the significance of the appointment to the Edmonton Journal saying \"The Queen's appointment of an Indian is historic in that it was the Queen [Victoria] who built a trust with the Indians of Canada so many years ago.\" Steinhauer was known for voicing his personal opinions regarding Indigenous issues in Canada while holding the generally apolitical role as Lieutenant Governor. In 1977, during the opening of the third session of the 18th Alberta Legislature Steinhauer would read the speech from the throne while dressed in the full regalia of a Nehiyaw Chief , and on one his final days in the Legislature, Steinhauer while giving Royal Assent to legislation reflected on his time as Lieutenant Governor and in thanking the members of the assembly remarked \"May the Great Spirit remain with you, and will you always carry on such a well-done job\", becoming the first time the Great Spirit had been invoked in the provincial legislature. In a 1976 speech delivered at the University of Calgary, Steinhauer presented a list of injustices inflicted upon Indigenous peoples, and going so far as to suggest he might withhold Royal Assent for legislation affecting First Nations until there was some improvement. In July 1976 Steinhauer headed a delegation commemorating the signing of Treaty Six and Seven to Buckingham Palace. He had convinced Premier Peter Lougheed to support and finance the trip as well as received the support of the Governor General noting \"it is the wish of the native people that a representative deputation of Chiefs\u2026should visit the United Kingdom\". However, the Governor General and federal government wanted assurances that the visit to England would not be a political event and Steinhauer agreed to ensure the occasions 's apolitical nature. Upon being presentedto the Queen, disregarded apolitical protocol and proceeded to raise Indigenous issues. On his return to Edmonton, Steinhauer's account would be printed in the Edmonton Journal \"I was just stating facts. Because of the Indian Act, aren\u2019t we wards of the government? Isn\u2019t that a fact? You should read the act. Just about every clause begins \u2018With the consent of the governor-in-council the Indians shall\u2026\". Later in 1977 Steinhauer would be approached by several First Nations , the Alberta Human Rights and Civil Liberties Association about the potential effects of the proposed Bill 29 Land Title Amendment Act and the potential effect of amendments on Treaty rights in Northern Alberta. Steinhauer had the legislation studied by a legal firm and in the end granted Royal Assent . Ralph G. Steinhauer served as Lieutenant Governor until his successor was appointed effective October 18, 1979. He then returned to his farm at Saddle Lake. Honours In 1967, he was made an Officer of the Order of Canada. In 1984, he was inducted into the Alberta Agriculture Hall of Fame. Steinhauer would also receive an Honorary Doctor of Laws degrees from the University of Alberta in 1976 , and the University of Calgary in 1979. In addition an Honorary Doctor of Divinity degree from St. Stephen's College, Edmonton in 1985. As well, he was a Knight of Grace of the Most Venerable Order of the Hospital of St. John of Jerusalem (1975). The Ralph Steinhauer Award of Distinction a collegiate scholarship provided by the Government of Alberta recognizes academic achievement.", "after_revision": "Ralph Garvin Steinhauer, (June 8, 1905 \u2013 September 19, 1987) was the tenth lieutenant governor of Alberta, and the first Aboriginal person to hold that post. Personal life Ralph Garvin Apow (later Steinhauer) was born on June 8, 1905 , at Morley, Northwest Territories (prior to the formation of the province of Alberta), the second of four children to Josiah Apow and Amelia Mildred Mumford. Steinhauer was a treaty Indian of Cree descent. Steinhauers 's father Josiah died in 1908, and his mother married James Arthur Steinhauer on October 12, 1910, a descendant of the Cree Methodist missionary Henry Bird Steinhauer. He married Isabel Florence Margaret Davidson on November 20, 1928 , and had five children. In 1937, Ralph Steinhauer was diagnosed with tuberculosis and a decision was made to send the three eldest children to a residential school. After his recovery, his wife Isabel educated the children at home after their request to have the children educated at a community school was denied on the basis of their Indigenous heritage. Steinhauer became a farmer and began clearing a 16-hectare homestead, and continued farming until his death in 1987. During the Great Depression Steinhauer supplemented his farming work with other labour such as logging and cutting fence posts. Education Ralph Steinhauer moved schools several times as a child due to his father's work as a missionary. Steinhauer attended the residential school in Red Deer, the Doucet, Roseneath, Vilettea and Stry schools in northern Alberta and for three years starting in 1920 the Brandon Indian Residential School in Manitoba, and finished with a Grade 8 education. When Prime Minister Pierre Trudeau asked him to be the lieutenant governor of Alberta, he responded, \"I'm not schooled for a thing like this... You're plucking a person out of the farmyard and an Indian at that.\" He ran unsuccessfully as the Liberal candidate for the House of Commons of Canada in the Alberta riding of Vegreville in the 1963 federal election, placing a distant third behind Progressive Conservative Frank Fane and Social Credit candidate Metro Tomyn. Steinhauer was the second treaty Indian to run as a candidate in a federal election. He was chief of the Saddle Lake Indian Band for three years between 1966 and 1969. He established the Saddle Lake Centennial Development Association , which became a successful farming venture for the First Nation. 10th lieutenant governor of Alberta On the advice of Prime Minister Pierre Trudeau, Ralph Steinhauer was appointed Lieutenant Governor of Alberta effective July 2, 1974. This appointment was made by Jules L\u00e9ger, Governor General of Canada. His senior aide-de-camp was Lieutenant-Colonel John H. Quarton, and his secretary was M. Patricia Halligan. Federal Justice Minister Otto Lang explained the significance of the appointment to the Edmonton Journal saying \"The Queen's appointment of an Indian is historic in that it was the Queen [Victoria] who built a trust with the Indians of Canada so many years ago.\" Steinhauer was known for voicing his personal opinions regarding Indigenous issues in Canada while holding the generally apolitical role as Lieutenant Governor. In 1977, during the opening of the third session of the 18th Alberta Legislature Steinhauer read the speech from the throne while dressed in the full regalia of a Cree chief , and on one his final days in the Legislature, Steinhauer while giving royal assent to legislation reflected on his time as Lieutenant Governor and in thanking the members of the assembly remarked \"May the Great Spirit remain with you, and will you always carry on such a well-done job\", becoming the first time the Great Spirit had been invoked in the provincial legislature. In a 1976 speech delivered at the University of Calgary, Steinhauer presented a list of injustices inflicted upon Indigenous peoples, and going so far as to suggest he might withhold royal assent for legislation affecting First Nations until there was some improvement. In July 1976 Steinhauer headed a delegation commemorating the signing of Treaty Six and Seven to Buckingham Palace. He had convinced Premier Peter Lougheed to support and finance the trip and had received the support of the governor general noting \"it is the wish of the native people that a representative deputation of Chiefs\u2026should visit the United Kingdom\". However, the governor general and federal government wanted assurances that the visit to England would not be a political event , and Steinhauer agreed to ensure the occasion 's apolitical nature. Upon being presented to the Queen, he disregarded apolitical protocol and raised Indigenous issues. On his return to Edmonton, Steinhauer's account was printed in the Edmonton Journal \"I was just stating facts. Because of the Indian Act, aren\u2019t we wards of the government? Isn\u2019t that a fact? You should read the act. Just about every clause begins \u2018With the consent of the governor-in-council the Indians shall\u2026\". Later in 1977 Steinhauer was approached by several First Nations and the Alberta Human Rights and Civil Liberties Association about the potential effects of the proposed Bill 29 Land Title Amendment Act and the potential effect of amendments on treaty rights in Northern Alberta. Steinhauer had the legislation studied by a legal firm and in the end granted royal assent . Ralph Steinhauer served as Lieutenant Governor until his successor was appointed effective October 18, 1979. He then returned to his farm at Saddle Lake. Honours In 1967, he was made an Officer of the Order of Canada. In 1984, he was inducted into the Alberta Agriculture Hall of Fame. Steinhauer also received an Honorary Doctor of Laws degrees from the University of Alberta in 1976 and the University of Calgary in 1979. In addition an Honorary Doctor of Divinity degree from St. Stephen's College, Edmonton in 1985. As well, he was a Knight of Grace of the Most Venerable Order of the Hospital of St. John of Jerusalem (1975). The Ralph Steinhauer Award of Distinction , a collegiate scholarship provided by the Government of Alberta , recognizes academic achievement.", "edit_actions": [{"type": "R", "before": "Lieutenant Governor", "after": "lieutenant governor", "start_char_pos": 75, "end_char_pos": 94}, {"type": "A", "before": null, "after": ",", "start_char_pos": 234, "end_char_pos": 234}, {"type": "R", "before": "Treaty", "after": "treaty", "start_char_pos": 409, "end_char_pos": 415}, {"type": "R", "before": "Steinhaurs", "after": "Steinhauers", "start_char_pos": 440, "end_char_pos": 450}, {"type": "R", "before": "would die", "after": "died", "start_char_pos": 468, "end_char_pos": 477}, {"type": "R", "before": "would marry", "after": "married", "start_char_pos": 502, "end_char_pos": 513}, {"type": "R", "before": "Missionary", "after": "missionary", "start_char_pos": 594, "end_char_pos": 604}, {"type": "A", "before": null, "after": ",", "start_char_pos": 694, "end_char_pos": 694}, {"type": "R", "before": "would educate", "after": "educated", "start_char_pos": 895, "end_char_pos": 908}, {"type": "R", "before": "would become", "after": "became", "start_char_pos": 1067, "end_char_pos": 1079}, {"type": "R", "before": "would continue", "after": "continued", "start_char_pos": 1136, "end_char_pos": 1150}, {"type": "R", "before": "would supplement", "after": "supplemented", "start_char_pos": 1223, "end_char_pos": 1239}, {"type": "R", "before": "would attend", "after": "attended", "start_char_pos": 1435, "end_char_pos": 1447}, {"type": "R", "before": "school", "after": "School", "start_char_pos": 1621, "end_char_pos": 1627}, {"type": "R", "before": "lieutenant-governor", "after": "lieutenant governor", "start_char_pos": 1735, "end_char_pos": 1754}, {"type": "R", "before": "would be the second Treaty", "after": "was the second treaty", "start_char_pos": 2160, "end_char_pos": 2186}, {"type": "R", "before": "would establish", "after": "established", "start_char_pos": 2325, "end_char_pos": 2340}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2392, "end_char_pos": 2392}, {"type": "R", "before": "Lieutenant Governor", "after": "lieutenant governor", "start_char_pos": 2462, "end_char_pos": 2481}, {"type": "D", "before": "Elliott", "after": null, "start_char_pos": 2532, "end_char_pos": 2539}, {"type": "D", "before": "G.", "after": null, "start_char_pos": 2555, "end_char_pos": 2557}, {"type": "R", "before": "Senior Aide-de-Camp", "after": "senior aide-de-camp", "start_char_pos": 2712, "end_char_pos": 2731}, {"type": "R", "before": "Secretary", "after": "secretary", "start_char_pos": 2780, "end_char_pos": 2789}, {"type": "R", "before": "would explain", "after": "explained", "start_char_pos": 2851, "end_char_pos": 2864}, {"type": "D", "before": "would", "after": null, "start_char_pos": 3336, "end_char_pos": 3341}, {"type": "R", "before": "Nehiyaw Chief", "after": "Cree chief", "start_char_pos": 3413, "end_char_pos": 3426}, {"type": "R", "before": "Royal Assent", "after": "royal assent", "start_char_pos": 3499, "end_char_pos": 3511}, {"type": "R", "before": "Royal Assent", "after": "royal assent", "start_char_pos": 3988, "end_char_pos": 4000}, {"type": "R", "before": "as well as", "after": "and had", "start_char_pos": 4263, "end_char_pos": 4273}, {"type": "R", "before": "Governor General", "after": "governor general", "start_char_pos": 4302, "end_char_pos": 4318}, {"type": "R", "before": "Governor General", "after": "governor general", "start_char_pos": 4453, "end_char_pos": 4469}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4568, "end_char_pos": 4568}, {"type": "R", "before": "occasions", "after": "occasion", "start_char_pos": 4605, "end_char_pos": 4614}, {"type": "R", "before": "presentedto", "after": "presented to", "start_char_pos": 4648, "end_char_pos": 4659}, {"type": "A", "before": null, "after": "he", "start_char_pos": 4671, "end_char_pos": 4671}, {"type": "R", "before": "proceeded to raise", "after": "raised", "start_char_pos": 4708, "end_char_pos": 4726}, {"type": "R", "before": "would be", "after": "was", "start_char_pos": 4794, "end_char_pos": 4802}, {"type": "R", "before": "would be", "after": "was", "start_char_pos": 5090, "end_char_pos": 5098}, {"type": "R", "before": ",", "after": "and", "start_char_pos": 5135, "end_char_pos": 5136}, {"type": "R", "before": "Treaty", "after": "treaty", "start_char_pos": 5313, "end_char_pos": 5319}, {"type": "R", "before": "Royal Assent", "after": "royal assent", "start_char_pos": 5426, "end_char_pos": 5438}, {"type": "D", "before": "G.", "after": null, "start_char_pos": 5447, "end_char_pos": 5449}, {"type": "R", "before": "would also receive", "after": "also received", "start_char_pos": 5741, "end_char_pos": 5759}, {"type": "D", "before": ",", "after": null, "start_char_pos": 5834, "end_char_pos": 5835}, {"type": "A", "before": null, "after": ",", "start_char_pos": 6124, "end_char_pos": 6124}, {"type": "A", "before": null, "after": ",", "start_char_pos": 6188, "end_char_pos": 6188}], "sents_char_pos": [0, 157, 391, 439, 627, 717, 858, 1055, 1183, 1315, 1423, 1679, 1823, 1892, 2148, 2238, 2321, 2456, 2637, 2707, 2815, 3082, 3243, 3428, 3804, 4074, 4190, 4406, 4439, 4636, 4745, 4861, 4923, 4942, 4967, 5062, 5347, 5552, 5597, 5661, 5729, 5874, 5933, 5970, 6081]}
+{"doc_id": "19499694", "revision_depth": "1", "before_revision": "About the fourth century AD, Palladius, Bishop of Hellenopolis (360\u2013430 AD), a classical Greek bishop, refers to the Maldives as Maniolae, in his document On the Races of the Indian and the Brahmans, adding that the magnet stone which attracts iron was produced in these islands. One of the known references to the Maldives is given in the Mahavamsa (5th century), the ancient chronicle of the people of Sri Lanka. In these records the Maldives are referred to as Mahinda-dvipa. In ancient South Indian Pallava Dynasty inscriptions of the 7th century AD, the Maldives were called \"Dvipa Laksham ( a hundred thousand islands ) . Hiuen-Tsang, a Buddhist monk who travelled in India for religious studies in the years 629 to 645 AD, was the first Chinese writer to mention the Maldives. He called the islands Na-lo-ki-lo-chou (coconut islands) . A Chinese document from the Tang Dynasty records the visit of Maldivians to China, bringing with them gifts from their king, Baladitiya in 658 AD and also in 662 AD. The Maldives are referred to as \" Mo-lai \" in this document. In a 10th-century Tamil record of the Chola Dynasty, the Maldives are given the name \" Munnir Palantivu Pannirayiram \" ( twelve thousand islands and the ocean where three waters meet ) . Sulaiman was a Persian merchant and sea-captain who lived in the first half of the ninth century AD. His manuscripts describing his travels and the places he visited were found in France in the 1700s. In his description of the Maldives, he gives them the name Dibajat. Al Biruni in the 11th century and Muhammad al-Idrisi in the 12th century AD , also referred to the Maldives by the name of Dibajat. Abu Zayd, who lived in Iraq in the years 850 to 934 AD, writes of the Maldives as \"Dyvah Kouzah \" (cowrie islands) . In the Tamil commentary Tolkattiyam of the 13th century AD, the Maldives is called \"Palpalamtivu \" ( many old islands ). A Chinese writer Wang Ta-Yuan, writing in 1349, gave the Maldives the name \"Pei Liu\" . In 1414 AD, Zheng He the famous Chinese commander came to the Maldives, bringing with him a scribe by the name of Ma Huan , to record their travels. In Ma Huan's records the Maldives are called \" Lu Shan Tieh-kan \" (\u9646\u5c71) ( the countries of the island mountains ) . In 1436 AD, another Chinese writer Fei Hsin called the islands , Lu Shan Yang (atolls of th eMaldives). The 13th century Kudahuvadhoo Loamaafaanu gives the Maldives' name as \"Panandheepu\" . The Bodugalu Miskiiy Loamaafaanu gives the same name as \"Fanandheebu\" . Ibn Battuta, who visited the Maldives in 1343 and stayed for 18 months, and returned in 1346 AD, called the islands by the name , Dhibat Al Mahal . When the first Portuguese arrived in the East in the early 16th century, the Maldives was referred to by them as \"Ilha Dywe\" . In 1573 AD, when Muhammad Thakurufaanu Al-Azam became Sultan after the defeat of the Portuguese occupants, he gave Arabized the official name to \" Al Daulat min al-Mahaldibiyat \" . In the late 18th and early 19th centuries, the Maldives were called \"Maldiva Islands \" in many English records, but by the beginning of the 20th century, Maldives or Maldive Islands '' had become the commonly used name.", "after_revision": "In the early fifth century AD, Palladius, Bishop of Hellenopolis (360\u2013430 AD), a classical Greek bishop, refers to the Maldives as Maniolae, in his treatise On the Races of the Indians and the Brahmans, adding that the magnet stone which attracts iron was produced in these islands. One of the first known references to the Maldives is given in the Mahavamsa (5th century), the ancient chronicle of the people of Sri Lanka. In these records the Maldives are referred to as Mahinda-dvipa. In ancient South Indian Pallava Dynasty inscriptions of the 7th century AD, the Maldives were called Dvipa Laksham ' a hundred thousand islands ' . Hiuen-Tsang, a Buddhist monk who travelled in India for religious studies in the years 629 to 645 AD, was the first Chinese writer to mention the Maldives. He called the islands Na-lo-ki-lo-chou 'coconut islands' . A Chinese document from the Tang Dynasty records the visit of Maldivians to China, bringing with them gifts from their king, Baladitiya , in 658 AD and also in 662 AD. The Maldives are referred to as Mo-lai in this document. In a 10th-century Tamil record of the Chola Dynasty, the Maldives are given the name Munnir Palantivu Pannirayiram ' twelve thousand islands and the ocean where three waters meet ' . Sulaiman was a Persian merchant and sea-captain who lived in the first half of the ninth century AD. His manuscripts describing his travels and the places he visited were found in France in the 1700s. In his description of the Maldives, he gives them the name Dibajat. AlBiruni in the 11th century and Muhammad al-Idrisi in the 12th century AD also referred to the Maldives by the name of Dibajat. Abu Zayd, who lived in Iraq in the years 850 to 934 AD, writes of the Maldives as Dyvah Kouzah 'cowrie islands' . In the Tamil commentary Tolkattiyam of the 13th century AD, the Maldives are called Palpalamtivu ' many old islands '. The Chinese writer Wang Ta-Yuan, writing in 1349, gave the Maldives the name Pei Liu . In 1414 AD, Zheng He , the famous Chinese commander , came to the Maldives, bringing with him a scribe by the name of Ma Huan to record their travels. In Ma Huan's records , the Maldives are called Lu Shan Tieh-kan (\u9646\u5c71) ' the countries of the island mountains ' . In 1436 AD, the Chinese writer Fei Hsin called the islands Lu Shan Yang 'atolls of the Maldives'. The 13th-century Kudahuvadhoo Loamaafaanu gives the Maldives' name as Panandheepu . The Bodugalu Miskiiy Loamaafaanu gives the same name as Fanandheebu . Ibn Battuta, who visited the Maldives in 1343 and stayed for 18 months, and returned in 1346 AD, called the islands by the name Dhibat al-Mahal . When the first Portuguese arrived in the East in the early 16th century, the Maldives were referred to by them as Ilha Dywe . In 1573 AD, when Muhammad Thakurufaanu Al-Azam became sultan after the defeat of the Portuguese occupants, he Arabised the official name to Al Daulat min al-Mahaldibiyat . In the late 18th and early 19th centuries, the Maldives were called Maldiva Islands in many English records, but by the beginning of the 20th century, Maldives or Maldive Islands had become the commonly used name.", "edit_actions": [{"type": "R", "before": "About the fourth", "after": "In the early fifth", "start_char_pos": 0, "end_char_pos": 16}, {"type": "R", "before": "document", "after": "treatise", "start_char_pos": 146, "end_char_pos": 154}, {"type": "R", "before": "Indian", "after": "Indians", "start_char_pos": 175, "end_char_pos": 181}, {"type": "A", "before": null, "after": "first", "start_char_pos": 291, "end_char_pos": 291}, {"type": "R", "before": "\"Dvipa Laksham (", "after": "Dvipa Laksham '", "start_char_pos": 581, "end_char_pos": 597}, {"type": "R", "before": ")", "after": "'", "start_char_pos": 625, "end_char_pos": 626}, {"type": "R", "before": "(coconut islands)", "after": "'coconut islands'", "start_char_pos": 824, "end_char_pos": 841}, {"type": "A", "before": null, "after": ",", "start_char_pos": 980, "end_char_pos": 980}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 1043, "end_char_pos": 1044}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 1052, "end_char_pos": 1053}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 1157, "end_char_pos": 1158}, {"type": "R", "before": "\" (", "after": "'", "start_char_pos": 1189, "end_char_pos": 1192}, {"type": "R", "before": ")", "after": "'", "start_char_pos": 1255, "end_char_pos": 1256}, {"type": "R", "before": "Al Biruni", "after": "AlBiruni", "start_char_pos": 1528, "end_char_pos": 1537}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1604, "end_char_pos": 1605}, {"type": "R", "before": "\"Dyvah Kouzah \" (cowrie islands)", "after": "Dyvah Kouzah 'cowrie islands'", "start_char_pos": 1742, "end_char_pos": 1774}, {"type": "R", "before": "is called \"Palpalamtivu \" (", "after": "are called Palpalamtivu '", "start_char_pos": 1850, "end_char_pos": 1877}, {"type": "R", "before": "). A", "after": "'. The", "start_char_pos": 1895, "end_char_pos": 1899}, {"type": "R", "before": "\"Pei Liu\"", "after": "Pei Liu", "start_char_pos": 1973, "end_char_pos": 1982}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2006, "end_char_pos": 2006}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2036, "end_char_pos": 2036}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2109, "end_char_pos": 2110}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2157, "end_char_pos": 2157}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 2182, "end_char_pos": 2183}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 2201, "end_char_pos": 2202}, {"type": "R", "before": "(", "after": "'", "start_char_pos": 2208, "end_char_pos": 2209}, {"type": "R", "before": ")", "after": "'", "start_char_pos": 2248, "end_char_pos": 2249}, {"type": "R", "before": "another", "after": "the", "start_char_pos": 2264, "end_char_pos": 2271}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2315, "end_char_pos": 2316}, {"type": "R", "before": "(atolls of th eMaldives). The 13th century", "after": "'atolls of the Maldives'. The 13th-century", "start_char_pos": 2330, "end_char_pos": 2372}, {"type": "R", "before": "\"Panandheepu\"", "after": "Panandheepu", "start_char_pos": 2426, "end_char_pos": 2439}, {"type": "R", "before": "\"Fanandheebu\"", "after": "Fanandheebu", "start_char_pos": 2498, "end_char_pos": 2511}, {"type": "R", "before": ", Dhibat Al Mahal", "after": "Dhibat al-Mahal", "start_char_pos": 2642, "end_char_pos": 2659}, {"type": "R", "before": "was", "after": "were", "start_char_pos": 2748, "end_char_pos": 2751}, {"type": "R", "before": "\"Ilha Dywe\"", "after": "Ilha Dywe", "start_char_pos": 2775, "end_char_pos": 2786}, {"type": "R", "before": "Sultan", "after": "sultan", "start_char_pos": 2843, "end_char_pos": 2849}, {"type": "R", "before": "gave Arabized", "after": "Arabised", "start_char_pos": 2899, "end_char_pos": 2912}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 2934, "end_char_pos": 2935}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 2966, "end_char_pos": 2967}, {"type": "R", "before": "\"Maldiva Islands \"", "after": "Maldiva Islands", "start_char_pos": 3038, "end_char_pos": 3056}, {"type": "D", "before": "''", "after": null, "start_char_pos": 3152, "end_char_pos": 3154}], "sents_char_pos": [0, 279, 415, 479, 784, 843, 1010, 1071, 1359, 1459, 1527, 1659, 1776, 1897, 1984, 2135, 2355, 2441, 2513, 2661, 2788]}
+{"doc_id": "19741641", "revision_depth": "1", "before_revision": "20th century YearDateEvent1915Universal suffrage.1916 The political parties Social Democratic Party and Progressive Party are founded .19181 DecemberIceland becomes a sovereign, independent nation. The Danish King remains head of state .1922 Jar\u00f0r\u00e6ktarl\u00f6gin .1929 The Icelandic Independence Party is founded .193020 DecemberThe Icelandic Communist Party is founded. The Icelandic State Radio begins broadcasting .1939 Following the occupation of Denmark by Nazi Germany, a national emergency government is formed under Sveinn Bj\u00f6rnsson .194010 MayThe British invade, violating Icelandic neutrality .19417 JulyThe United States Army, still officially neutral, replaces the British occupation force .194417 JuneIceland becomes an independent republic, severing the last political ties to Denmark. Sveinn Bj\u00f6rnsson becomes president .1946 The Keflavik Agreement .1948 Iceland receives Marshall Aid from the United States .194930 MarchRiots break out on Austurv\u00f6llur .4 AprilIceland joins the North Atlantic Treaty Organization .1951 The United States Army establishes a base in Keflav\u00edk .19521 AugustExclusive economic zone extended to 4 nautical miles. \u00c1sgeir \u00c1sgeirsson becomes president .1958 Exclusive economic zone extended to 12 nautical miles .196314 NovemberVolcanic eruption forms Surtsey .196630 SeptemberThe Icelandic State Television begins its first broadcasts .19681 AugustKristj\u00e1n Eldj\u00e1rn becomes president. Collapse of the fishing industry .19701 JanuaryIceland joins the European Free Trade Association .1972 Exclusive economic zone extended to 50 nautical miles .197323 JanuaryVolcanic eruption in Vestmannaeyjar .1975 Exclusive economic zone extended to 200 nautical miles .19801 AugustVigd\u00eds Finnbogad\u00f3ttir becomes president of Iceland, the first woman in the world to become elected head of state .19941 JanuaryIceland joins the European Economic Area .19961 August\u00d3lafur Ragnar Gr\u00edmsson becomes president. ", "after_revision": "(100) century ass=\"wikitable\" |- !tyle=\"width: 5\\%\"|Year||style=\"width: 10\\%;\"|Date||Event |- |tyle=\"text-align: right;\"|1915||||Universal suffrage. |- |style=\"text-align: right;\"|1916|||| The political parties Social Democratic Party and Progressive Party are founded . |- |style=\"text-align: right;\"|1918||1 December||Iceland becomes a sovereign, independent nation. The Danish King remains head of state . |- |style=\"text-align: right;\"|1922|||| Jar\u00f0r\u00e6ktarl\u00f6gin . |- |style=\"text-align: right;\"|1929|||| The Icelandic Independence Party is founded . |- |style=\"text-align: right;\"|1930||20 December||The Icelandic Communist Party is founded. The Icelandic State Radio begins broadcasting . |- |style=\"text-align: right;\"|1939|||| Following the occupation of Denmark by Nazi Germany, a national emergency government is formed under Sveinn Bj\u00f6rnsson . |- |style=\"text-align: right;\"|1940||10 May||The British invade, violating Icelandic neutrality . |- |style=\"text-align: right;\"|1941||7 July||The United States Army, still officially neutral, replaces the British occupation force . |- |style=\"text-align: right;\"|1944||17 June||Iceland becomes an independent republic, severing the last political ties to Denmark. Sveinn Bj\u00f6rnsson becomes president . |- |style=\"text-align: right;\"|1946|||| The Keflavik Agreement . |- |style=\"text-align: right;\"|1948|||| Iceland receives Marshall Aid from the United States . |- |rowspan=\"2\" style=\"text-align: right;\"|1949||30 March||Riots break out on Austurv\u00f6llur . |- |4 April||Iceland joins the North Atlantic Treaty Organization . |- |style=\"text-align: right;\"|1951|||| The United States Army establishes a base in Keflav\u00edk . |- |style=\"text-align: right;\"|1952||1 August||Exclusive economic zone extended to 4 nautical miles. \u00c1sgeir \u00c1sgeirsson becomes president . |- |style=\"text-align: right;\"|1958|||| Exclusive economic zone extended to 12 nautical miles . |- |style=\"text-align: right;\"|1963||14 November||Volcanic eruption forms Surtsey . |- |style=\"text-align: right;\"|1966||30 September||The Icelandic State Television begins its first broadcasts . |- |style=\"text-align: right;\"|1968||1 August||Kristj\u00e1n Eldj\u00e1rn becomes president. Collapse of the fishing industry . |- |style=\"text-align: right;\"|1970||1 January||Iceland joins the European Free Trade Association . |- |style=\"text-align: right;\"|1972|||| Exclusive economic zone extended to 50 nautical miles . |- |style=\"text-align: right;\"|1973||23 January||Volcanic eruption in Vestmannaeyjar . |- |style=\"text-align: right;\"|1975|||| Exclusive economic zone extended to 200 nautical miles . |- |style=\"text-align: right;\"|1980||1 August||Vigd\u00eds Finnbogad\u00f3ttir becomes president of Iceland, the first woman in the world to become elected head of state . |- |style=\"text-align: right;\"|1994||1 January||Iceland joins the European Economic Area . |- |style=\"text-align: right;\"|1996||1 August||\u00d3lafur Ragnar Gr\u00edmsson becomes president. |", "edit_actions": [{"type": "R", "before": "20th century YearDateEvent1915Universal suffrage.1916", "after": "(100) century", "start_char_pos": 0, "end_char_pos": 53}, {"type": "A", "before": null, "after": "ass=\"wikitable\" |- !tyle=\"width: 5\\%\"|Year||style=\"width: 10\\%;\"|Date||Event |- |tyle=\"text-align: right;\"|1915||||Universal suffrage. |- |style=\"text-align: right;\"|1916||||", "start_char_pos": 54, "end_char_pos": 54}, {"type": "R", "before": ".19181 DecemberIceland", "after": ". |- |style=\"text-align: right;\"|1918||1 December||Iceland", "start_char_pos": 135, "end_char_pos": 157}, {"type": "R", "before": ".1922", "after": ". |- |style=\"text-align: right;\"|1922||||", "start_char_pos": 237, "end_char_pos": 242}, {"type": "R", "before": ".1929", "after": ". |- |style=\"text-align: right;\"|1929||||", "start_char_pos": 259, "end_char_pos": 264}, {"type": "R", "before": ".193020 DecemberThe", "after": ". |- |style=\"text-align: right;\"|1930||20 December||The", "start_char_pos": 309, "end_char_pos": 328}, {"type": "R", "before": ".1939", "after": ". |- |style=\"text-align: right;\"|1939||||", "start_char_pos": 413, "end_char_pos": 418}, {"type": "R", "before": ".194010 MayThe", "after": ". |- |style=\"text-align: right;\"|1940||10 May||The", "start_char_pos": 537, "end_char_pos": 551}, {"type": "R", "before": ".19417 JulyThe", "after": ". |- |style=\"text-align: right;\"|1941||7 July||The", "start_char_pos": 599, "end_char_pos": 613}, {"type": "R", "before": ".194417 JuneIceland", "after": ". |- |style=\"text-align: right;\"|1944||17 June||Iceland", "start_char_pos": 698, "end_char_pos": 717}, {"type": "R", "before": ".1946", "after": ". |- |style=\"text-align: right;\"|1946||||", "start_char_pos": 831, "end_char_pos": 836}, {"type": "R", "before": ".1948", "after": ". |- |style=\"text-align: right;\"|1948||||", "start_char_pos": 860, "end_char_pos": 865}, {"type": "R", "before": ".194930 MarchRiots", "after": ". |- |rowspan=\"2\" style=\"text-align: right;\"|1949||30 March||Riots", "start_char_pos": 919, "end_char_pos": 937}, {"type": "R", "before": ".4 AprilIceland", "after": ". |- |4 April||Iceland", "start_char_pos": 964, "end_char_pos": 979}, {"type": "R", "before": ".1951", "after": ". |- |style=\"text-align: right;\"|1951||||", "start_char_pos": 1025, "end_char_pos": 1030}, {"type": "R", "before": ".19521 AugustExclusive", "after": ". |- |style=\"text-align: right;\"|1952||1 August||Exclusive", "start_char_pos": 1085, "end_char_pos": 1107}, {"type": "R", "before": ".1958", "after": ". |- |style=\"text-align: right;\"|1958||||", "start_char_pos": 1188, "end_char_pos": 1193}, {"type": "R", "before": ".196314 NovemberVolcanic", "after": ". |- |style=\"text-align: right;\"|1963||14 November||Volcanic", "start_char_pos": 1248, "end_char_pos": 1272}, {"type": "R", "before": ".196630 SeptemberThe", "after": ". |- |style=\"text-align: right;\"|1966||30 September||The", "start_char_pos": 1296, "end_char_pos": 1316}, {"type": "R", "before": ".19681 AugustKristj\u00e1n", "after": ". |- |style=\"text-align: right;\"|1968||1 August||Kristj\u00e1n", "start_char_pos": 1372, "end_char_pos": 1393}, {"type": "R", "before": ".19701 JanuaryIceland", "after": ". |- |style=\"text-align: right;\"|1970||1 January||Iceland", "start_char_pos": 1454, "end_char_pos": 1475}, {"type": "R", "before": ".1972", "after": ". |- |style=\"text-align: right;\"|1972||||", "start_char_pos": 1518, "end_char_pos": 1523}, {"type": "R", "before": ".197323 JanuaryVolcanic", "after": ". |- |style=\"text-align: right;\"|1973||23 January||Volcanic", "start_char_pos": 1578, "end_char_pos": 1601}, {"type": "R", "before": ".1975", "after": ". |- |style=\"text-align: right;\"|1975||||", "start_char_pos": 1629, "end_char_pos": 1634}, {"type": "R", "before": ".19801 AugustVigd\u00eds", "after": ". |- |style=\"text-align: right;\"|1980||1 August||Vigd\u00eds", "start_char_pos": 1690, "end_char_pos": 1709}, {"type": "R", "before": ".19941 JanuaryIceland", "after": ". |- |style=\"text-align: right;\"|1994||1 January||Iceland", "start_char_pos": 1816, "end_char_pos": 1837}, {"type": "R", "before": ".19961 August\u00d3lafur", "after": ". |- |style=\"text-align: right;\"|1996||1 August||\u00d3lafur", "start_char_pos": 1871, "end_char_pos": 1890}, {"type": "A", "before": null, "after": "|", "start_char_pos": 1926, "end_char_pos": 1926}], "sents_char_pos": [0, 49, 198, 366, 795, 1151, 1420, 1754]}
+{"doc_id": "2062017", "revision_depth": "2", "before_revision": "Count the numbers b of black hats and w of white hats that you see. Wait b seconds or w seconds, whichever is sooner. If nobody has yet spoken, guess that your hat is black if you can see fewer black hats than white hats, or white if you can see fewer white hats than black hats. If you have not yet spoken, guess that your hat is of the opposite colour to that of one of the first people to speak. Suppose that in total there are B black hats and W white hats. There are three cases. If B = W then those players wearing black hats see B\u22121 black hats and B white hats, so wait B\u22121 seconds then correctly guess that they are wearing a black hat. Similarly, those players wearing a white hat will wait W \u22121 seconds before guessing correctly that they are wearing a white hat. So all players make a correct guess at the same time. If B < W then those wearing a black hat will see B\u22121 black hats and W white hats, whilst those wearing a white hat will see B black hats and W \u22121 white hats. Since B\u22121 < B \u2264 W \u22121, those players wearing a black hat will be the first to speak, guessing correctly that their hat is black . The other players then guess correctly that their hat is white . The case where W < B is similar.", "after_revision": "Count the numbers b of blue hats and r of red hats that you see. Wait b seconds or r seconds, whichever is sooner. If nobody has yet spoken, guess that your hat is blue if you can see fewer blue hats than red hats, or red if you can see fewer red hats than blue hats. If you have not yet spoken, guess that your hat is of the opposite colour to that of one of the first people to speak. Suppose that in total there are B blue hats and R red hats. There are three cases. If B = R then those players wearing blue hats see B\u22121 blue hats and B red hats, so wait B\u22121 seconds then correctly guess that they are wearing a blue hat. Similarly, those players wearing a red hat will wait R \u22121 seconds before guessing correctly that they are wearing a red hat. So all players make a correct guess at the same time. If B < R then those wearing a blue hat will see B\u22121 blue hats and R red hats, whilst those wearing a red hat will see B blue hats and R \u22121 red hats. Since B\u22121 < B \u2264 R \u22121, those players wearing a blue hat will be the first to speak, guessing correctly that their hat is blue . The other players then guess correctly that their hat is red . The case where R < B is similar.", "edit_actions": [{"type": "R", "before": "black hats and w of white", "after": "blue hats and r of red", "start_char_pos": 23, "end_char_pos": 48}, {"type": "R", "before": "w", "after": "r", "start_char_pos": 86, "end_char_pos": 87}, {"type": "R", "before": "black", "after": "blue", "start_char_pos": 167, "end_char_pos": 172}, {"type": "R", "before": "black hats than white", "after": "blue hats than red", "start_char_pos": 194, "end_char_pos": 215}, {"type": "R", "before": "white", "after": "red", "start_char_pos": 225, "end_char_pos": 230}, {"type": "R", "before": "white hats than black", "after": "red hats than blue", "start_char_pos": 252, "end_char_pos": 273}, {"type": "R", "before": "black hats and W white", "after": "blue hats and R red", "start_char_pos": 433, "end_char_pos": 455}, {"type": "R", "before": "W", "after": "R", "start_char_pos": 492, "end_char_pos": 493}, {"type": "R", "before": "black", "after": "blue", "start_char_pos": 521, "end_char_pos": 526}, {"type": "R", "before": "black", "after": "blue", "start_char_pos": 540, "end_char_pos": 545}, {"type": "R", "before": "white", "after": "red", "start_char_pos": 557, "end_char_pos": 562}, {"type": "R", "before": "black", "after": "blue", "start_char_pos": 634, "end_char_pos": 639}, {"type": "R", "before": "white", "after": "red", "start_char_pos": 680, "end_char_pos": 685}, {"type": "R", "before": "W", "after": "R", "start_char_pos": 700, "end_char_pos": 701}, {"type": "R", "before": "white", "after": "red", "start_char_pos": 763, "end_char_pos": 768}, {"type": "R", "before": "W", "after": "R", "start_char_pos": 835, "end_char_pos": 836}, {"type": "R", "before": "black", "after": "blue", "start_char_pos": 858, "end_char_pos": 863}, {"type": "R", "before": "black hats and W white", "after": "blue hats and R red", "start_char_pos": 881, "end_char_pos": 903}, {"type": "R", "before": "white", "after": "red", "start_char_pos": 933, "end_char_pos": 938}, {"type": "R", "before": "black hats and W", "after": "blue hats and R", "start_char_pos": 954, "end_char_pos": 970}, {"type": "R", "before": "white", "after": "red", "start_char_pos": 974, "end_char_pos": 979}, {"type": "R", "before": "W", "after": "R", "start_char_pos": 1002, "end_char_pos": 1003}, {"type": "R", "before": "black", "after": "blue", "start_char_pos": 1032, "end_char_pos": 1037}, {"type": "R", "before": "black", "after": "blue", "start_char_pos": 1107, "end_char_pos": 1112}, {"type": "R", "before": "white", "after": "red", "start_char_pos": 1172, "end_char_pos": 1177}, {"type": "R", "before": "W", "after": "R", "start_char_pos": 1195, "end_char_pos": 1196}], "sents_char_pos": [0, 67, 117, 279, 398, 461, 484, 644, 773, 827, 985, 1114, 1179]}
+{"doc_id": "2077667", "revision_depth": "1", "before_revision": "Knuckle-walking is a form of quadrupedal walking in which the forelimbs hold the fingers in a partially flexed posture that allows body weight to press down on the ground through the knuckles. Gorillas and chimpanzees use this style of locomotion as do anteaters and platypuses. Knuckle-walking helps with actions other than locomotion on the ground. For the gorilla the fingers are used for the manipulation of food, and in chimpanzees for the manipulation of food and for climbing. In anteaters and pangolins, the fingers have large claws for opening the mounds of social insects. Platypus fingers have webbing that extend past the fingers to aid in swimming, thus knuckle-walking is used to prevent stumbling. Gorillas move around by knuckle-walking, although they sometimes walk bipedally for short distances while carrying food or in defensive situations. Mountain gorillas use knuckle-walking plus other parts of their hand\u2014fist-walking does not use the knuckles, using the backs of their hand, and using their palms. Anthropologists once thought that the common ancestor of chimpanzees and humans engaged in knuckle-walking, and humans evolved upright walking from knuckle-walking : a view thought to be supported by reanalysis of overlooked features on hominid fossils. Since then, scientists discovered Ardipithecus ramidus, a human-like hominid descended from the common ancestor of chimpanzees and humans. Ar. ramidus engaged in upright walking, but not knuckle-walking. This leads to the conclusion that chimpanzees evolved knuckle-walking after they split from humans six million years ago, and humans evolved upright walking without knuckle-walking. This would imply that knuckle-walking evolved independently in the African great apes, which would mean a homoplasic evolution of this locomotor behaviour in gorillas and chimpanzees. However, other studies have argued the opposite by pointing out that the differences in knuckle-walking between gorillas and chimpanzees can be explained by differences in positional behaviour, kinematics, and the biomechanics of weight-bearing. Their knuckle-walking involves flexing the tips of their fingers and carrying their body weight down on the dorsal surface of their middle phalanges. The outer fingers are held clear off the ground. The wrist is held in a stable, locked position during the support phase of knuckle-walking by means of strongly flexed interphalangeal joints, and extended metacarpophalangeal joints. The palm as a result is positioned perpendicular to the ground and in-line with the forearm. The wrist and elbow are extended throughout the last period in which the knuckle-walker's hand carried body weight. There are differences between knuckle-walking in chimpanzees and gorillas : juvenile chimpanzees engage in less knuckle-walking than juvenile gorillas. Another difference is that the hand bones of gorillas lack key features that were once thought to limit the extension of the wrist during knuckle-walking in chimpanzees. For example, the ridges and concavities features of the capitate and hamate bones have been interpreted to enhance stability of weight-bearing; on this basis, they have been used to identify knuckle-walking in fossils. These are found in all chimpanzees but in only two out of five gorillas. They are also less prominent when found in gorillas. They are however found in primates that do not knuckle-walk. It has been suggested that chimpanzee knuckle-walking and gorilla knuckle-walking are biomechanically and posturally distinct. Gorillas use a form of knuckle-walking which is \"columnar\". In this forelimb posture, the hand and wrist joints are aligned in a relatively straight, neutral posture. In contrast, chimpanzees use an extended wrist posture. These differences underlie the different characteristics of their hand bones. The difference has been attributed to the greater locomotion of chimpanzees in trees, compared to gorillas. The former frequently engage in both knuckle-walking and palm-walking branches. As a result, to preserve their balance in trees, chimpanzees, like other primates in trees, often extended their wrists. This need has produced different wrist bone anatomy and, through this, a different form of knuckle-walking. Knuckle-walking has been reported in some baboons. It has also been suggested that fossils attributed to Australopithecus anamensis and Au. afarensis had specialized wrist morphology that was retained from an earlier knuckle-walking ancestor. Gorillas Gorillas use the form of walking on all fours with the fingers on the hands of the front two limbs folded inward. A gorilla's forearm and wrist bones lock together to be able to sustain the weight of the animal and create a strong supporting structure. Gorillas use this form of walking because their hips are attached differently than humans so standing on two legs for a long period of time would eventually become painful. Humans would have to walk on all fours as well if they had the same type of hip placement. Gorillas sometimes do walk upright in instances where dangers are present. Advantages Knuckle-walking tends to evolve when the fingers of the forelimb are specialized for tasks other than locomotion on the ground. In the gorilla the fingers are used for the manipulation of food, and in chimpanzees for the manipulation of food and for climbing. In anteaters and pangolins the fingers have large claws for opening the mounds of social insects. Platypus fingers have webbing that extend past the fingers to aid in swimming, thus knuckle-walking is used to prevent stumbling. It has been argued that knuckle-walking of chimpanzees and gorillas originally started from fist-walking as found in orangutans. African apes most likely diverged from ancestral arboreal apes (similar to orangutans) who were adapted to distribute their weight among tree branches and forest canopies. Adjustments made for terrestrial locomotion early on may have involved fist-walking, later evolving into knuckle-walking. Evolution of knuckle-walking There are competing hypotheses as to how knuckle-walking evolved as a form of locomotion, stemming from comparisons between African apes. High magnitudes of integration would indicate homoplasy of knuckle-walking in gorillas and chimpanzees, in which a trait is shared or similar between two species but is not derived from a common ancestor. However, results show that they are not characterized by such high magnitudes, which does not support independent evolution of knuckle-walking. Similarities between gorillas and chimpanzees have been suggested to support a common origin for knuckle-walking, such as manual pressure distribution when practicing this form of locomotion. On the other hand, their behavioral differences have been hypothesized to suggest convergent evolution, or homoplasy. Another hypothesis proposes that African apes came from a bipedal ancestor, as there are no differences in hemoglobin between Pan and Homo, suggesting that their divergence occurred relatively recently. Examining protein sequence changes suggests that Gorilla diverged before the clade Homo-Pan, meaning that ancestral bipedalism would require parallel evolution of knuckle-walking in separate chimpanzee and gorilla radiations. The fact that chimpanzees practice both arboreal and knuckle-walking locomotion implies that knuckle-walking evolved from an arboreal ancestor as a solution for terrestrial travel, while still maintaining competent climbing skills. It is important to note that not all features associated with knuckle-walking are identical to the beings who practice it, as it suggests possible developmental differences. For example, brachiation and suspension are almost certainly homologous between siamangs and gibbons, yet they differ substantially in the relative growth of their locomotor skeletons. Differences in carpal growth are not necessarily a consequence of their function, as it could be related to differences in body mass, growth, etc. It is important to keep this in mind when examining similarities and differences between African apes themselves, as well as knuckle-walkers and humans, when developing hypotheses on locomotive evolution. Human evolution One theory of the origins of human bipedality is that it evolved from a terrestrial knuckle-walking ancestor. This theory is opposed to the theory that such bipedalism arose from a more generalized arboreal ape ancestor. The terrestrial knuckle-walking theory argues that early hominin wrist and hand bones retain morphological evidence of early knuckle-walking. The argument is not that they were knuckle-walkers themselves but that it is an example of \"phylogenetic 'lag'\". \"The retention of knuckle-walking morphology in the earliest hominids indicates that bipedalism evolved from an ancestor already adapted for terrestrial locomotion. ... Pre-bipedal locomotion is probably best characterized as a repertoire consisting of terrestrial knuckle-walking, arboreal climbing and occasional suspensory activities, not unlike that observed in chimpanzees today\". See Vestigiality. Crucial to the knuckle-walking ancestor hypothesis is the role of the os centrale in the hominoid wrist, since the fusion of this bone with the scaphoid is among the clearest morphological synapomorphies of hominins and African apes. It has been shown that fused scaphoid-centrales display lower stress values during simulated knuckle-walking as compared to non-fused morphologies, hence supporting a biomechanical explanation for the fusion as a functional adaptation to this locomotor behavior. This suggests that this wrist morphology was probably retained from an last common ancestor that showed knuckle-walking as part of its locomotor repertoire and that was probably later exapted for other functions (e.g. to withstand the shear stress during power-grip positions). Nevertheless, it is relevant to keep in mind that extant knuckle-walkers display diverse positional behaviors, and that knuckle-walking does not preclude climbing or exclude the possible importance of arboreality in the evolution of bipedalism in the hominin lineage. It has however been suggested that knuckle-walking evolved independently and separately in Pan and gorillas and so was not present in the human ancestors. This is supported by the evidence that gorillas and chimpanzees differ in their knuckle-walking related wrist anatomy and in the biomechanics of their knuckle-walking. Kivell and Schmitt note \"Features found in the hominin fossil record that have traditionally been associated with a broad definition of knuckle-walking are more likely reflecting the habitual Pan-like use of extended wrist postures that are particularly advantageous in an arboreal environment. This, in turn, suggests that human bipedality evolved from a more arboreal ancestor occupying a generalized locomotor and ecological niche common to all living apes\". Arguments for the independent evolution of knuckle-walking have not gone without criticism, however. A more recent study of morphological integration in human and great ape wrists suggests that knuckle-walking did not evolve independently in gorillas and chimpanzees, which \"places the emergence of hominins and the evolution of bipedalism in the context of a knuckle-walking background.\" Related forms of hand-walking Primates can walk on their hands in other ways than on their knuckles. They can walk on fists such as orangutans. In this body weight is borne on the back of the proximal phalanges. Quadrupedal primate walking can be done on the palms. This occurs in many primates when walking on all fours on tree branches. It is also the method used by human infants when crawling on their knees or engaged in a \"bear-crawl\" (in which the legs are fully extended and weight is taken by the ankles). A few older children and some adults retain the ability to walk quadrupedally, even after acquiring bipedalism. A BBC2 and NOVA in The Family That Walks on All Fours reported on the Ulas family in which five individuals grew up walking normally upon the palms of their hands and fully extended legs due to a recessive genetic mutation that causes a non-progressive congenital cerebellar ataxia that impairs the balance needed for bipedality.Humphrey, N., Keynes, R. & Skoyles, J. R. (2005). \"Hand-walkers : five siblings who never stood up\". Discussion Paper. Centre for Philosophy of Natural and Social Science, London, UK. Not only did they walk on their palms of their hands but could do so holding objects in their fingers. Primates can also walk on their fingers. In olive baboons, rhesus macaques, and patas monkeys such finger walking turns to palm walking when animals start to run. This has been suggested to spread the forces better across the wrist bones to protect them.", "after_revision": "Knuckle-walking is a form of quadrupedal walking in which the forelimbs hold the fingers in a partially flexed posture that allows body weight to press down on the ground through the knuckles. Gorillas and chimpanzees use this style of locomotion , as do anteaters and platypuses. Knuckle-walking helps with actions other than locomotion on the ground. For the gorilla , the fingers are used for the manipulation of food, and in chimpanzees , for the manipulation of food and climbing. In anteaters and pangolins, the fingers have large claws for opening the mounds of social insects. Platypus fingers have webbing that extend past the fingers to aid in swimming, thus knuckle-walking is used to prevent stumbling. Gorillas move around by knuckle-walking, although they sometimes walk bipedally for short distances while carrying food or in defensive situations. Mountain gorillas use knuckle-walking plus other parts of their hand\u2014fist-walking does not use the knuckles, using the backs of their hand, and using their palms. Anthropologists once thought that the common ancestor of chimpanzees and humans engaged in knuckle-walking, and humans evolved upright walking from knuckle-walking , a view thought to be supported by reanalysis of overlooked features on hominid fossils. Since then, scientists discovered Ardipithecus ramidus, a human-like hominid descended from the common ancestor of chimpanzees and humans. Ar. ramidus engaged in upright walking, but not knuckle-walking. This leads to the conclusion that chimpanzees evolved knuckle-walking after they split from humans six million years ago, and humans evolved upright walking without knuckle-walking. This would imply that knuckle-walking evolved independently in the African great apes, which would mean a homoplasic evolution of this locomotor behaviour in gorillas and chimpanzees. However, other studies have argued the opposite by pointing out that the differences in knuckle-walking between gorillas and chimpanzees can be explained by differences in positional behaviour, kinematics, and the biomechanics of weight-bearing. Their knuckle-walking involves flexing the tips of their fingers and carrying their body weight down on the dorsal surface of their middle phalanges. The outer fingers are held clear off the ground. The wrist is held in a stable, locked position during the support phase of knuckle-walking by means of strongly flexed interphalangeal joints, and extended metacarpophalangeal joints. The palm , as a result , is positioned perpendicular to the ground and in line with the forearm. The wrist and elbow are extended throughout the last period in which the knuckle-walker's hand carried body weight. Differences exist between knuckle-walking in chimpanzees and gorillas ; juvenile chimpanzees engage in less knuckle-walking than juvenile gorillas. Another difference is that the hand bones of gorillas lack key features that were once thought to limit the extension of the wrist during knuckle-walking in chimpanzees. For example, the ridges and concavities features of the capitate and hamate bones have been interpreted to enhance stability of weight-bearing; on this basis, they have been used to identify knuckle-walking in fossils. These are found in all chimpanzees , but in only two out of five gorillas. They are also less prominent when found in gorillas. They are , however, found in primates that do not knuckle-walk. Chimpanzee knuckle-walking and gorilla knuckle-walking have been suggested to be biomechanically and posturally distinct. Gorillas use a form of knuckle-walking that is \"columnar\". In this forelimb posture, the hand and wrist joints are aligned in a relatively straight, neutral posture. In contrast, chimpanzees use an extended wrist posture. These differences underlie the different characteristics of their hand bones. The difference has been attributed to the greater locomotion of chimpanzees in trees, compared to gorillas. The former frequently engage in both knuckle-walking and palm-walking branches. As a result, to preserve their balance in trees, chimpanzees, like other primates in trees, often extended their wrists. This need has produced different wrist bone anatomy , and through this, a different form of knuckle-walking. Knuckle-walking has been reported in some baboons. Fossils attributed to Australopithecus anamensis and Au. afarensis also may have had specialized wrist morphology that was retained from an earlier knuckle-walking ancestor. Gorillas Gorillas use the form of walking on all fours with the fingers on the hands of the front two limbs folded inward. A gorilla's forearm and wrist bones lock together to be able to sustain the weight of the animal and create a strong supporting structure. Gorillas use this form of walking because their hips are attached differently from humans, so standing on two legs for a long period of time would eventually become painful. Humans would have to walk on all fours , as well, if they had the same type of hip placement. Gorillas sometimes do walk upright in instances where dangers are present. Advantages Knuckle-walking tends to evolve when the fingers of the forelimb are specialized for tasks other than locomotion on the ground. In the gorilla , the fingers are used for the manipulation of food, and in chimpanzees , for the manipulation of food and climbing. In anteaters and pangolins , the fingers have large claws for opening the mounds of social insects. Platypus fingers have webbing that extend past the fingers to aid in swimming, thus knuckle-walking is used to prevent stumbling. Knuckle-walking of chimpanzees and gorillas , arguably, originally started from fist-walking as found in orangutans. African apes most likely diverged from ancestral arboreal apes (similar to orangutans) that were adapted to distribute their weight among tree branches and forest canopies. Adjustments made for terrestrial locomotion early on may have involved fist-walking, later evolving into knuckle-walking. Evolution of knuckle-walking Competing hypotheses are given as to how knuckle-walking evolved as a form of locomotion, stemming from comparisons between African apes. High magnitudes of integration would indicate homoplasy of knuckle-walking in gorillas and chimpanzees, in which a trait is shared or similar between two species , but is not derived from a common ancestor. However, results show that they are not characterized by such high magnitudes, which does not support independent evolution of knuckle-walking. Similarities between gorillas and chimpanzees have been suggested to support a common origin for knuckle-walking, such as manual pressure distribution when practicing this form of locomotion. On the other hand, their behavioral differences have been hypothesized to suggest convergent evolution, or homoplasy. Another hypothesis proposes that African apes came from a bipedal ancestor, as no differences in hemoglobin are seen between Pan and Homo, suggesting that their divergence occurred relatively recently. Examining protein sequence changes suggests that Gorilla diverged before the clade Homo-Pan, meaning that ancestral bipedalism would require parallel evolution of knuckle-walking in separate chimpanzee and gorilla radiations. The fact that chimpanzees practice both arboreal and knuckle-walking locomotion implies that knuckle-walking evolved from an arboreal ancestor as a solution for terrestrial travel, while still maintaining competent climbing skills. Not all features associated with knuckle-walking are identical to the beings that practice it, as it suggests possible developmental differences. For example, brachiation and suspension are almost certainly homologous between siamangs and gibbons, yet they differ substantially in the relative growth of their locomotor skeletons. Differences in carpal growth are not necessarily a consequence of their function, as they could be related to differences in body mass, growth, etc. It is important to keep this in mind when examining similarities and differences between African apes themselves, as well as knuckle-walkers and humans, when developing hypotheses on locomotive evolution. Human evolution One theory of the origins of human bipedality is that it evolved from a terrestrial knuckle-walking ancestor. This theory is opposed to the theory that such bipedalism arose from a more generalized arboreal ape ancestor. The terrestrial knuckle-walking theory argues that early hominin wrist and hand bones retain morphological evidence of early knuckle-walking. The argument is not that they were knuckle-walkers themselves , but that it is an example of \"phylogenetic 'lag'\". \"The retention of knuckle-walking morphology in the earliest hominids indicates that bipedalism evolved from an ancestor already adapted for terrestrial locomotion. ... Pre-bipedal locomotion is probably best characterized as a repertoire consisting of terrestrial knuckle-walking, arboreal climbing and occasional suspensory activities, not unlike that observed in chimpanzees today\". See Vestigiality. Crucial to the knuckle-walking ancestor hypothesis is the role of the os centrale in the hominoid wrist, since the fusion of this bone with the scaphoid is among the clearest morphological synapomorphies of hominins and African apes. It has been shown that fused scaphoid-centrales display lower stress values during simulated knuckle-walking as compared to non-fused morphologies, hence supporting a biomechanical explanation for the fusion as a functional adaptation to this locomotor behavior. This suggests that this wrist morphology was probably retained from an last common ancestor that showed knuckle-walking as part of its locomotor repertoire and that was probably later exapted for other functions (e.g. to withstand the shear stress during power-grip positions). Nevertheless, it is relevant to keep in mind that extant knuckle-walkers display diverse positional behaviors, and that knuckle-walking does not preclude climbing or exclude the possible importance of arboreality in the evolution of bipedalism in the hominin lineage. Knuckle-walking, though has been suggested to have evolved independently and separately in Pan and Gorilla, so was not present in the human ancestors. This is supported by the evidence that gorillas and chimpanzees differ in their knuckle-walking-related wrist anatomy and in the biomechanics of their knuckle-walking. Kivell and Schmitt note \"Features found in the hominin fossil record that have traditionally been associated with a broad definition of knuckle-walking are more likely reflecting the habitual Pan-like use of extended wrist postures that are particularly advantageous in an arboreal environment. This, in turn, suggests that human bipedality evolved from a more arboreal ancestor occupying a generalized locomotor and ecological niche common to all living apes\". Arguments for the independent evolution of knuckle-walking have not gone without criticism, however. A more recent study of morphological integration in human and great ape wrists suggests that knuckle-walking did not evolve independently in gorillas and chimpanzees, which \"places the emergence of hominins and the evolution of bipedalism in the context of a knuckle-walking background.\" Related forms of hand-walking Primates can walk on their hands in other ways than on their knuckles. They can walk on fists such as orangutans. In this form, body weight is borne on the back of the proximal phalanges. Quadrupedal primate walking can be done on the palms. This occurs in many primates when walking on all fours on tree branches. It is also the method used by human infants when crawling on their knees or engaged in a \"bear-crawl\" (in which the legs are fully extended and weight is taken by the ankles). A few older children and some adults retain the ability to walk quadrupedally, even after acquiring bipedalism. A BBC2 and NOVA episode, \" The Family That Walks on All Fours \", reported on the Ulas family in which five individuals grew up walking normally upon the palms of their hands and fully extended legs due to a recessive genetic mutation that causes a nonprogressive congenital cerebellar ataxia that impairs the balance needed for bipedality.Humphrey, N., Keynes, R. & Skoyles, J. R. (2005). \"Hand-walkers : five siblings who never stood up\". Discussion Paper. Centre for Philosophy of Natural and Social Science, London, UK. Not only did they walk on their palms of their hands , but they also could do so holding objects in their fingers. Primates can also walk on their fingers. In olive baboons, rhesus macaques, and patas monkeys , such finger-walking turns to palm-walking when animals start to run. This has been suggested to spread the forces better across the wrist bones to protect them.", "edit_actions": [{"type": "A", "before": null, "after": ",", "start_char_pos": 247, "end_char_pos": 247}, {"type": "A", "before": null, "after": ",", "start_char_pos": 368, "end_char_pos": 368}, {"type": "A", "before": null, "after": ",", "start_char_pos": 439, "end_char_pos": 439}, {"type": "D", "before": "for", "after": null, "start_char_pos": 473, "end_char_pos": 476}, {"type": "R", "before": ":", "after": ",", "start_char_pos": 1191, "end_char_pos": 1192}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2489, "end_char_pos": 2489}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2502, "end_char_pos": 2502}, {"type": "R", "before": "in-line", "after": "in line", "start_char_pos": 2549, "end_char_pos": 2556}, {"type": "R", "before": "There are differences", "after": "Differences exist", "start_char_pos": 2691, "end_char_pos": 2712}, {"type": "R", "before": ":", "after": ";", "start_char_pos": 2765, "end_char_pos": 2766}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3267, "end_char_pos": 3267}, {"type": "R", "before": "however", "after": ", however,", "start_char_pos": 3368, "end_char_pos": 3375}, {"type": "R", "before": "It has been suggested that chimpanzee", "after": "Chimpanzee", "start_char_pos": 3420, "end_char_pos": 3457}, {"type": "R", "before": "are", "after": "have been suggested to be", "start_char_pos": 3502, "end_char_pos": 3505}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 3586, "end_char_pos": 3591}, {"type": "R", "before": "and,", "after": ", and", "start_char_pos": 4209, "end_char_pos": 4213}, {"type": "R", "before": "It has also been suggested that fossils", "after": "Fossils", "start_char_pos": 4316, "end_char_pos": 4355}, {"type": "A", "before": null, "after": "also may have", "start_char_pos": 4415, "end_char_pos": 4415}, {"type": "R", "before": "than humans", "after": "from humans,", "start_char_pos": 4849, "end_char_pos": 4860}, {"type": "R", "before": "as well", "after": ", as well,", "start_char_pos": 4983, "end_char_pos": 4990}, {"type": "A", "before": null, "after": ",", "start_char_pos": 5264, "end_char_pos": 5264}, {"type": "A", "before": null, "after": ",", "start_char_pos": 5335, "end_char_pos": 5335}, {"type": "D", "before": "for", "after": null, "start_char_pos": 5369, "end_char_pos": 5372}, {"type": "A", "before": null, "after": ",", "start_char_pos": 5410, "end_char_pos": 5410}, {"type": "R", "before": "It has been argued that knuckle-walking", "after": "Knuckle-walking", "start_char_pos": 5612, "end_char_pos": 5651}, {"type": "A", "before": null, "after": ", arguably,", "start_char_pos": 5680, "end_char_pos": 5680}, {"type": "R", "before": "who", "after": "that", "start_char_pos": 5829, "end_char_pos": 5832}, {"type": "R", "before": "There are competing hypotheses", "after": "Competing hypotheses are given", "start_char_pos": 6065, "end_char_pos": 6095}, {"type": "A", "before": null, "after": ",", "start_char_pos": 6365, "end_char_pos": 6365}, {"type": "D", "before": "there are", "after": null, "start_char_pos": 6942, "end_char_pos": 6951}, {"type": "A", "before": null, "after": "are seen", "start_char_pos": 6981, "end_char_pos": 6981}, {"type": "R", "before": "It is important to note that not", "after": "Not", "start_char_pos": 7525, "end_char_pos": 7557}, {"type": "R", "before": "who", "after": "that", "start_char_pos": 7631, "end_char_pos": 7634}, {"type": "R", "before": "it", "after": "they", "start_char_pos": 7969, "end_char_pos": 7971}, {"type": "A", "before": null, "after": ",", "start_char_pos": 8677, "end_char_pos": 8677}, {"type": "R", "before": "It has however been suggested that knuckle-walking", "after": "Knuckle-walking, though has been suggested to have", "start_char_pos": 10176, "end_char_pos": 10226}, {"type": "R", "before": "gorillas and", "after": "Gorilla,", "start_char_pos": 10275, "end_char_pos": 10287}, {"type": "R", "before": "knuckle-walking related", "after": "knuckle-walking-related", "start_char_pos": 10411, "end_char_pos": 10434}, {"type": "A", "before": null, "after": "form,", "start_char_pos": 11502, "end_char_pos": 11502}, {"type": "R", "before": "in", "after": "episode, \"", "start_char_pos": 11994, "end_char_pos": 11996}, {"type": "A", "before": null, "after": "\",", "start_char_pos": 12032, "end_char_pos": 12032}, {"type": "R", "before": "non-progressive", "after": "nonprogressive", "start_char_pos": 12216, "end_char_pos": 12231}, {"type": "R", "before": "but", "after": ", but they also", "start_char_pos": 12545, "end_char_pos": 12548}, {"type": "R", "before": "such finger walking turns to palm walking", "after": ", such finger-walking turns to palm-walking", "start_char_pos": 12689, "end_char_pos": 12730}], "sents_char_pos": [0, 192, 279, 351, 486, 585, 715, 863, 1026, 1280, 1419, 1484, 1666, 1850, 2096, 2246, 2295, 2479, 2574, 2690, 2842, 3012, 3156, 3231, 3305, 3358, 3419, 3546, 3606, 3713, 3769, 3847, 3955, 4035, 4156, 4264, 4315, 4508, 4631, 4770, 4943, 5034, 5109, 5248, 5382, 5481, 5611, 5741, 5913, 6035, 6202, 6408, 6552, 6744, 6862, 7066, 7292, 7524, 7698, 7883, 8030, 8235, 8361, 8472, 8614, 8728, 8897, 9114, 9132, 9366, 9629, 9907, 10175, 10330, 10498, 10793, 10960, 11061, 11349, 11450, 11493, 11562, 11616, 11689, 11865, 11977, 12308, 12357, 12408, 12426, 12491, 12594, 12635, 12757]}
+{"doc_id": "20850258", "revision_depth": "1", "before_revision": "Progressive warCaleb, Carr (2002). The Lessons of Terror: A History of Warfare Against Civilians: Why It Has Always Failed and Why It Will Fail Again. Random House, Inc. is a military strategy where only enemy combatants are targeted and non-combatants killed or wounded due to collateral damage are kept to a minimum. The principles for Progressive War were established by Dutch jurist Hugo Grotius who is consider a founder of international law in his book De jure belli ac pacis libri tres ( On the Law of War and Peace: Three books) published in 1625. A successful practitioner of Progressive War was Helmuth von Moltke the Elder as chief of staff of the Prussian Army in the nineteenth century. The obverse to Progressive War is unlimited war which includes civilians as legitimate targets. The aim of unlimited war is to use military action against civilians in the hope of undermining the populations will to fight , to undermine their support of their leaders, and thereby influence the policies of those leaders to continue the conflict. Examples of unlimited war is evident in the use of cluster bombs, the firebombing of Dresden, the German bombing of British cities during the Blitz, the firebombing of Tokyo , the atomic bombings of Hiroshima and Nagasaki , among many other examples . The philosophy of unlimited war is controversial. Many consider it a form of terrorism , in the sense of deliberately attacking non-combatants in the hope of changing their mindset. Such ambiguities between unlimited warfare and terrorist strategies could be the source of why many terrorist groups consider themselves honorable fighters, and many label American military forces terrorists. Guerrilla warfare can be considered progressive if only enemy combatants are targeted but becomes terrorism when non-combatants are targeted.", "after_revision": "Progressive warCaleb, Carr (2002). The Lessons of Terror: A History of Warfare Against Civilians: Why It Has Always Failed and Why It Will Fail Again. Random House, Inc. is a military strategy in which only enemy combatants are targeted , and non-combatants killed or wounded by collateral damage are kept to a minimum. Its principles were established by Dutch jurist Hugo Grotius , who is considered to be a founder of international law , in his book De jure belli ac pacis libri tres ( \" On the Law of War and Peace: Three Books\"), published in 1625. A successful practitioner was Helmuth von Moltke the Elder , as chief of staff of the Prussian Army in the 19th century. The opposite is unlimited war , which includes civilians as legitimate targets. Its aim is to use military action against civilians in the hope of undermining the will to fight and the support of their leaders, to end the conflict. Examples of unlimited war are cluster bombs, the firebombing of Dresden, the German bombing of British cities during the Blitz, the firebombing of Tokyo and the atomic bombings of Hiroshima and Nagasaki . The philosophy of unlimited war is controversial. Many consider it a form of terrorism in the sense of deliberately attacking noncombatants in the hope of changing their mindset. Such ambiguities between unlimited warfare and terrorist strategies could be the source of why many terrorist groups consider themselves honourable fighters, and many consider the US military to be terrorists. Guerrilla warfare can be considered progressive if it is only enemy combatants that are targeted, but it becomes terrorism when noncombatants are targeted.", "edit_actions": [{"type": "R", "before": "where", "after": "in which", "start_char_pos": 193, "end_char_pos": 198}, {"type": "A", "before": null, "after": ",", "start_char_pos": 234, "end_char_pos": 234}, {"type": "R", "before": "due to", "after": "by", "start_char_pos": 272, "end_char_pos": 278}, {"type": "R", "before": "The principles for Progressive War", "after": "Its principles", "start_char_pos": 320, "end_char_pos": 354}, {"type": "R", "before": "who is consider", "after": ", who is considered to be", "start_char_pos": 401, "end_char_pos": 416}, {"type": "A", "before": null, "after": ",", "start_char_pos": 448, "end_char_pos": 448}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 497, "end_char_pos": 497}, {"type": "R", "before": "books)", "after": "Books\"),", "start_char_pos": 533, "end_char_pos": 539}, {"type": "D", "before": "of Progressive War", "after": null, "start_char_pos": 585, "end_char_pos": 603}, {"type": "A", "before": null, "after": ",", "start_char_pos": 637, "end_char_pos": 637}, {"type": "R", "before": "nineteenth", "after": "19th", "start_char_pos": 684, "end_char_pos": 694}, {"type": "R", "before": "obverse to Progressive War", "after": "opposite", "start_char_pos": 708, "end_char_pos": 734}, {"type": "A", "before": null, "after": ",", "start_char_pos": 752, "end_char_pos": 752}, {"type": "R", "before": "The aim of unlimited war", "after": "Its aim", "start_char_pos": 801, "end_char_pos": 825}, {"type": "D", "before": "populations", "after": null, "start_char_pos": 901, "end_char_pos": 912}, {"type": "R", "before": ", to undermine their", "after": "and the", "start_char_pos": 927, "end_char_pos": 947}, {"type": "R", "before": "and thereby influence the policies of those leaders to continue", "after": "to end", "start_char_pos": 974, "end_char_pos": 1037}, {"type": "R", "before": "is evident in the use of", "after": "are", "start_char_pos": 1078, "end_char_pos": 1102}, {"type": "R", "before": ",", "after": "and", "start_char_pos": 1226, "end_char_pos": 1227}, {"type": "D", "before": ", among many other examples", "after": null, "start_char_pos": 1274, "end_char_pos": 1301}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1391, "end_char_pos": 1392}, {"type": "R", "before": "non-combatants", "after": "noncombatants", "start_char_pos": 1432, "end_char_pos": 1446}, {"type": "R", "before": "honorable", "after": "honourable", "start_char_pos": 1623, "end_char_pos": 1632}, {"type": "R", "before": "label American military forces", "after": "consider the US military to be", "start_char_pos": 1652, "end_char_pos": 1682}, {"type": "A", "before": null, "after": "it is", "start_char_pos": 1746, "end_char_pos": 1746}, {"type": "R", "before": "are targeted but", "after": "that are targeted, but it", "start_char_pos": 1769, "end_char_pos": 1785}, {"type": "R", "before": "non-combatants", "after": "noncombatants", "start_char_pos": 1809, "end_char_pos": 1823}], "sents_char_pos": [0, 34, 150, 319, 558, 703, 800, 1051, 1303, 1353, 1485, 1694]}
+{"doc_id": "2149121", "revision_depth": "1", "before_revision": "In other media Television The Peter Petruski version of Trapster appeared in the 1978 The New Fantastic Four animated series episode \"The Frightful Four\", voiced by Gene Moss. He was recruited by the Wizardto join the episode's titular team. This version does not use super adhesives in his crimes, but instead uses complex traps. The Peter Petruski version of Trapster appeared in the 1994 Fantastic Four animated series episode \"And the Wind Cries Medusa\", voiced by Beau Weaver. He appears as a member of the Wizard's Frightful Four. The Peter Petruski version of Trapster appears in Fantastic Four: World's Greatest Heroes animated series episode \"Frightful\", voiced by Sam Vincent. He is seen as a member of Wizard's Frightful Four. Peter Petruski, as Paste Pot Pete, appears in The Super Hero Squad Show , voiced by Dave Boat. In the episode \"If This Be My Thanos\", he accompanies MODOK and Abomination (both of whom make fun of his name) in a raid on the Baxter Building to obtain a specific artifact for Thanos. In the episode \"The Ice Melt Cometh\", he joins Pyro and Zzzax to form Team Toxic to assist Doctor Doom in his plans to gather the Infinity Fractals, only to be foiled by Iron Man and Iceman. The Peter Petruski version of Trapster appears in the Ultimate Spider-Man animated series, voiced by Steven Weber. First appearing in the pilot episode \"Great Power\", he is seen as a member of the Frightful Four. Although Spider-Man defeats him in battle, Trapster secretly placed a tracer on the former so the other Frightful Four members can track him down. In \"Beetle Mania\", Spider-Man and his fellow S.H.I.E.L.D. trainees fight and defeat Trapster in Times Square. In \"I Am Spider-Man\", Trapster mistakes Flash Thompson for Spider-Man while the latter is preparing for a school play about the web-slinger and attacks him, but Peter gets trapped by the villain's adhesive gun while saving Flash. Once he is out of the villain's sight, Peter gets free and secretly helps Flash fend off Trapster. A week later, Trapster attacks Flash again on opening night, forcing Peter to don a spare costume to fight and eventually defeat him. In \"Not a Toy\", Trapster attempts to rob a bank, only to be defeated by Captain America and apprehended by the police. In \"Revealed\", Trapster joins the Frightful Four in luring Spider-Man and the S.H.I.E.L.D. trainees into a trap before escaping and leaving them with Doctor Octopus's Octobots. In \"Second Chance Hero\", Trapster and the Frightful Four fight and are defeated by Spider-Man and Iron Patriot. In the series finale \"Graduation Day\" Pt. 2, Spider-Man fights and defeats Trapster once more. The Peter Petruski version of Trapster makes a non-speaking cameo appearance in the Avengers Assemble animated series' pilot episode, \"The Avengers Protocol\" Pt. 1. Books One of Paste Pot Pete's battles with Captain America is partially reprinted in ' The Penguin Book of Comics ' .", "after_revision": "In other media Television The Peter Petruski incarnation of Trapster appeared in The New Fantastic Four animated series episode \"The Frightful Four\", voiced by Gene Moss. This version uses complex traps instead of super adhesives and was recruited into the Wizard's Frightful Four. The Peter Petruski incarnation of Trapster appeared in the 1994 Fantastic Four animated series episode \"And the Wind Cries Medusa\", voiced by Beau Weaver. He appears as a member of the Wizard's Frightful Four. The Peter Petruski incarnation of Trapster appears in the Fantastic Four: World's Greatest Heroes animated series episode \"Frightful\", voiced by Sam Vincent. He appears as a member of the Wizard's Frightful Four. Peter Petruski, as Paste Pot Pete, appears in The Super Hero Squad Show animated series , voiced by Dave Boat. This version is a member of Doctor Doom's Lethal Legion. In the episode \"If This Be My Thanos\", Petruski accompanies MODOK and Abomination in a raid on the Baxter Building to obtain a specific artifact for Thanos. In the episode \"The Ice Melt Cometh\", Petruski joins Pyro and Zzzax to form Team Toxic and assist Doom in his plans to gather the Infinity Fractals, only to be foiled by Iron Man and Iceman. The Peter Petruski incarnation of Trapster appears in the Ultimate Spider-Man animated series, voiced by Steven Weber. First appearing in the pilot episode \"Great Power\", he appears as a member of the Frightful Four. Although Spider-Man defeats him in battle, Trapster secretly placed a tracer on the former so the other Frightful Four members can track him down. In the episode \"Beetle Mania\", Spider-Man and his fellow S.H.I.E.L.D. trainees fight and defeat Trapster in Times Square. In the episode \"I Am Spider-Man\", Trapster mistakes Flash Thompson for Spider-Man while the latter is preparing for a school play about the web-slinger and attacks him, but Peter Parker gets trapped by the villain's adhesive gun while saving Flash. Once he is out of the villain's sight, Parker gets free and secretly helps Flash fend off Trapster. A week later, Trapster attacks Flash again on opening night, forcing Parker to don a spare costume to fight and eventually defeat him. In the episode \"Not a Toy\", Trapster attempts to rob a bank, only to be defeated by Captain America and apprehended by the police. In the episode \"Revealed\", Trapster joins the Frightful Four in luring Spider-Man and the S.H.I.E.L.D. trainees into a trap before escaping and leaving them with Doctor Octopus's Octobots. In the episode \"Second Chance Hero\", Trapster and the Frightful Four fight and are defeated by Spider-Man and the Iron Patriot. In the series finale \"Graduation Day\" Pt. 2, Spider-Man fights and defeats Trapster once more. The Peter Petruski incarnation of Trapster makes a non-speaking cameo appearance in the Avengers Assemble animated series' pilot episode, \"The Avengers Protocol\" Pt. 1. Books One of Paste Pot Pete's battles with Captain America is partially reprinted in The Penguin Book of Comics .", "edit_actions": [{"type": "R", "before": "version", "after": "incarnation", "start_char_pos": 45, "end_char_pos": 52}, {"type": "D", "before": "the 1978", "after": null, "start_char_pos": 77, "end_char_pos": 85}, {"type": "R", "before": "He was recruited by the Wizardto join the episode's titular team. This version does not use super adhesives in his crimes, but instead uses complex traps.", "after": "This version uses complex traps instead of super adhesives and was recruited into the Wizard's Frightful Four.", "start_char_pos": 176, "end_char_pos": 330}, {"type": "R", "before": "version", "after": "incarnation", "start_char_pos": 350, "end_char_pos": 357}, {"type": "R", "before": "version", "after": "incarnation", "start_char_pos": 556, "end_char_pos": 563}, {"type": "A", "before": null, "after": "the", "start_char_pos": 587, "end_char_pos": 587}, {"type": "R", "before": "is seen", "after": "appears", "start_char_pos": 691, "end_char_pos": 698}, {"type": "A", "before": null, "after": "the", "start_char_pos": 714, "end_char_pos": 714}, {"type": "A", "before": null, "after": "animated series", "start_char_pos": 812, "end_char_pos": 812}, {"type": "A", "before": null, "after": "This version is a member of Doctor Doom's Lethal Legion.", "start_char_pos": 836, "end_char_pos": 836}, {"type": "R", "before": "he", "after": "Petruski", "start_char_pos": 876, "end_char_pos": 878}, {"type": "D", "before": "(both of whom make fun of his name)", "after": null, "start_char_pos": 913, "end_char_pos": 948}, {"type": "R", "before": "he", "after": "Petruski", "start_char_pos": 1062, "end_char_pos": 1064}, {"type": "R", "before": "to assist Doctor", "after": "and assist", "start_char_pos": 1105, "end_char_pos": 1121}, {"type": "R", "before": "version", "after": "incarnation", "start_char_pos": 1234, "end_char_pos": 1241}, {"type": "R", "before": "is seen", "after": "appears", "start_char_pos": 1385, "end_char_pos": 1392}, {"type": "A", "before": null, "after": "the episode", "start_char_pos": 1578, "end_char_pos": 1578}, {"type": "A", "before": null, "after": "the episode", "start_char_pos": 1689, "end_char_pos": 1689}, {"type": "A", "before": null, "after": "Parker", "start_char_pos": 1854, "end_char_pos": 1854}, {"type": "R", "before": "Peter", "after": "Parker", "start_char_pos": 1957, "end_char_pos": 1962}, {"type": "R", "before": "Peter", "after": "Parker", "start_char_pos": 2086, "end_char_pos": 2091}, {"type": "A", "before": null, "after": "the episode", "start_char_pos": 2154, "end_char_pos": 2154}, {"type": "A", "before": null, "after": "the episode", "start_char_pos": 2274, "end_char_pos": 2274}, {"type": "A", "before": null, "after": "the episode", "start_char_pos": 2452, "end_char_pos": 2452}, {"type": "A", "before": null, "after": "the", "start_char_pos": 2548, "end_char_pos": 2548}, {"type": "R", "before": "version", "after": "incarnation", "start_char_pos": 2677, "end_char_pos": 2684}, {"type": "D", "before": "'", "after": null, "start_char_pos": 2908, "end_char_pos": 2909}, {"type": "D", "before": "'", "after": null, "start_char_pos": 2937, "end_char_pos": 2938}], "sents_char_pos": [0, 175, 241, 330, 481, 536, 687, 739, 835, 1023, 1214, 1329, 1427, 1574, 1685, 1917, 2016, 2150, 2270, 2448, 2562, 2657]}
+{"doc_id": "21651877", "revision_depth": "1", "before_revision": "Teodorovich in 1917 Ivan Adolfovich Teodorovich (; ) (September 10 (O. S. August 29), 1875 in Smolensk \u2013 September 20, 1937) was a Russian Bolshevik activist and Soviet statesman who served as the first Commissar for Food when the Council of People's Commissars was established (October - November 1917). He was also a Soviet historian of the Russian revolutionary movement. Life and political career Teodorovich, the son of a land surveyor from Smolensk, was born into a family of ethnic Polish origin.Budaev, I.D. \"\u0422\u0435\u043e\u0434\u043e\u0440\u043e\u0432\u0438\u0447 \u0418\u0432\u0430\u043d \u0410\u0434\u043e\u043b\u044c\u0444\u043e\u0432\u0438\u0447\" (\"Teodorovich Ivan Adolfovich\"). \u041a\u0443\u043b\u044c\u0442\u0443\u0440\u043d\u043e\u0435 \u043d\u0430\u0441\u043b\u0435\u0434\u0438\u0435 \u0437\u0435\u043c\u043b\u0438 \u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u043e\u0439 (The Cultural Heritage of Smolensk's Land). Retrieved 2 March 2009. URL His father, two maternal uncles, and grandfather had all participated in insurrectionary activity; it was from this background, Teodorovich would write, that he first learned to hate \" czarism , its officials, and military establishment. \" Teodorovich's childhood was spent in severe poverty: his mother, struggling to support six sons, worked as a seamstress and laundrywoman. Teodorovich was educated at Moscow State University, where he joined an early Marxist group in 1895. From 1902 to 1903 , he was a member of the Moscow Committee of the Russian Social Democratic Labour Party. After a series of arrests, in 1903 the czarist authorities sent Teodorovich to an exile in Yakutia. Escaping in 1905, he fled to Switzerland, where he made personal contacts with Vladimir Lenin. In October 1905 Teodorovich returned to Russia and operated in Saint Petersburg , promoted to a member of the Central Committee in 1907. In May 1909 he was arrested again and remained in custody until the February Revolution of 1917. In Summer 1917 Teodorovich co-chaired Saint Petersburg City Hall, at the same time working towards the Bolshevik revolt against the Provisional Government. After the February Revolution of 1917 , he left the place of exile , arrived in Petrograd in mid-March. He was a delegate to the 7th (April) All-Russian Conference , where he was elected a candidate member of the Central Committee %DIFDELCMD < [%%% 3 , and the 6th Congress of the RSDLP (B). From August 1917 , deputy chairman of the Petrograd City Council, then a member of the council and special presence in food. After the October Revolution in the first composition, SNK took the post of People's Commissar for Food. Immediately after the October Revolution, Teodorovich became the first Commissar for Agriculture in the first Bolshevik Government . In November he resigned due to political disagreement with Lenin's majority over a coalition with the Mensheviks and other factions (Teodorovich supported a broad coalition, against Lenin's will). In 1920 he returned to the board of the Commissariat for Agriculture and rose to Deputy Commissar in May 1922; in 1928-1930 he chaired the Peasants branch of Comintern. As the Bolsheviks' expert on agriculture, Teodorovich delivered speeches to various councils and international forums, and authored brochures, journal and newspaper articles dealing with agriculture and agrarian policy. Teodorovich was a proponent of Lenin\u2019s New Economic Policy , he further endorsed liberal land reforms (delegating authority from state to peasant on land) Contrary to the Bolshevik\u2019s platform on agrarian policy, Teodorovich vehemently opposed the policy of food requisition and war communism. He was a supporter of the creation of a homogeneous socialist government with the participation of the Mensheviks and Socialist Revolutionaries. After The Central Committee of the RSDLP (B) rejected the agreement with these parties, Teodorovich on November 4 (17), 1917 signed a statement of withdrawal from the SNK, but continued to fulfill his duties until December. \"(T)he disagreement concerned the question of whether our party had to start with \"war communism\" or whether it was possible to proceed from what was called the \"new economic policy\" in 1921. I held in 1917 of the last opinion ..\" - Ivan Teodorovich Autobiography In the articles of the 1920s, Teodorovich interpreted the NEP as a means of accumulating funds in the capitalist agrarian sector through the development of \u201cstrong\u201d peasant farms, which was to serve as a source of funds for industrialization, including its transition to socialism. In the People's Commissariat Teodorovich supervised the work of economist N. D. Kondratiev who led the department of agricultural economics and statistics of the Department of Agriculture , provided him with certain protection and patronage (in particular, contributed in 1920 to his release from arrest). At the beginning of 1918 he left for Siberia after parting ways with Lenin's first government. In the years 1919-1920 , he was in the red partisan units in Siberia. In the years 1920-1928 Teodorovich served as a member of the College of the People's Commissariat of Agriculture of the RSFSR. From May 1922 to 1928 deputy of the People's Commissar of Agriculture of the RSFSR, 1926-1930 Director of the International Agrarian Institute, from March 1928 to 1930 secretary general of the Peasant International (Krestintern), 1929-1935 editor of the Publishers of the Association of Former Political Excuers and Deportee , 1929- 1935 editor of the magazine \"Katorga i ssy\u0142ka\". The letter was closed after liquidation by the ordinance of the Central Committee of the VKP (b) of the Association of Former Political Excuses and exiles on June 25, 1935for factional activities 2 Teodorovich was convicted in the trial of the so-called Moskva Center group (involving a total of 120 people). The trial was sanctioned by Joseph Stalin and Vyacheslav Molotov on September 15, 1937. Teodorovich was executed five days later . He was a victim of Stalin's Great Purges . \"March 1, 1881 , \" M., 1931", "after_revision": "Teodorovich in 1917 Ivan Adolfovich Teodorovich (; ) (September 10 (O. S. August 29), 1875 in Smolensk \u2013 September 20, 1937) , a Russian Bolshevik activist and Soviet statesman , served as the first Commissar for Food when the Council of People's Commissars was established (October - November 1917). He also became a Soviet historian of the Russian revolutionary movement. Life and political career Teodorovich, the son of a land-surveyor from Smolensk, was born into a family of ethnic Polish origin.Budaev, I.D. \"\u0422\u0435\u043e\u0434\u043e\u0440\u043e\u0432\u0438\u0447 \u0418\u0432\u0430\u043d \u0410\u0434\u043e\u043b\u044c\u0444\u043e\u0432\u0438\u0447\" (\"Teodorovich Ivan Adolfovich\"). \u041a\u0443\u043b\u044c\u0442\u0443\u0440\u043d\u043e\u0435 \u043d\u0430\u0441\u043b\u0435\u0434\u0438\u0435 \u0437\u0435\u043c\u043b\u0438 \u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u043e\u0439 (The Cultural Heritage of Smolensk's Land). Retrieved 2 March 2009. URL His father, two maternal uncles, and grandfather had all participated in insurrectionary activity; from this background, Teodorovich would write, he first learned to hate \" tsarism , its officials, and the military establishment \" . Teodorovich spent his childhood in severe poverty: his mother, struggling to support six sons, worked as a seamstress and laundrywoman. Teodorovich attended Moscow State University, where he joined an early Marxist group in 1895. From 1902 to 1903 he served as a member of the Moscow Committee of the Russian Social Democratic Labour Party. After a series of arrests, in 1903 the tsarist authorities sent Teodorovich into exile in Yakutia. Escaping in 1905, he fled to Switzerland, where he made personal contact with Vladimir Lenin. In October 1905 Teodorovich returned to Russia and operated in Saint Petersburg ; he gained promotion to become a member of the Central Committee in 1907. In May 1909 he was arrested again and remained in custody until the February Revolution of 1917. After the February Revolution of March 1917 he left his place of exile and arrived in Petrograd in mid-March. He was a delegate to the 7th (April) All-Russian Conference ( where he was elected a candidate member of the Central Committee %DIFDELCMD < [%%% ) and to the 6th Congress of the RSDLP (B). From August 1917 he served as deputy chairman of the , then as a member of the council and special presence in food. After the October Revolution of November 1917, in the first Council of People's Commissars of the Russian Soviet Federative Socialist Republic (SNK) he took the post of People's Commissar for Food. Immediately after the October Revolution, Teodorovich became the first Commissar for Agriculture in the first Bolshevik government . In November he resigned due to political disagreement with Lenin's majority over a proposed coalition with the Mensheviks and other factions (Teodorovich supported a broad coalition, against Lenin's will). In 1920 he returned to the board of the Commissariat for Agriculture and rose to become Deputy Commissar in May 1922; in 1928-1930 he chaired the Peasants ' branch of the Comintern. As the Bolsheviks' expert on agriculture, Teodorovich delivered speeches to various councils and international forums, and authored brochures, journal and newspaper articles dealing with agriculture and agrarian policy. Teodorovich was a proponent of Lenin\u2019s New Economic Policy (the NEP); he further endorsed liberal land-reforms (delegating authority over land from the state to peasants). Contrary to the Bolsheviks' platform on agrarian policy, Teodorovich vehemently opposed the policy of food requisition and war communism. He supported the formation of a homogeneous socialist government with the participation of the Mensheviks and Socialist Revolutionaries. After The Central Committee of the RSDLP (B) rejected the agreement with these parties, Teodorovich on November 4 (17), 1917 signed a statement of withdrawal from the SNK, but continued to carry out his duties until December. \"(T)he disagreement concerned the question of whether our party had to start with \"war communism\" or whether it was possible to proceed from what was called the \"new economic policy\" in 1921. I held in 1917 the latter opinion ..\" - Ivan Teodorovich Autobiography In articles of the 1920s, Teodorovich interpreted the NEP as a means of accumulating funds in the capitalist agrarian sector through the development of \"strong\" peasant farms, which was to serve as a source of funds for industrialization, including its transition to socialism. In the People's Commissariat Teodorovich supervised the work of economist N. D. Kondratiev , who led the department of agricultural economics and statistics of the Department of Agriculture and provided Teodorovich with a degree of protection and patronage (in particular, Kondratiev contributed in 1920 to his release from arrest). At the beginning of 1918 Teodorovich left for Siberia after parting ways with Lenin's first government. In 1919-1920 he was in the red partisan units in Siberia. In 1920-1928 Teodorovich served as a member of the College of the People's Commissariat of Agriculture of the RSFSR. From May 1922 to 1928 he was deputy of the People's Commissar of Agriculture of the RSFSR, 1926-1930 Director of the International Agrarian Institute, from March 1928 to 1930 secretary general of the Peasant International (Krestintern), 1929-1935 editor of the Publishers of the Society of Former Political Prisoners and Exiled Settlers , 1929- 1935 editor of the magazine . An ordinance of the Central Committee of the VKP (b) of the Society of Former Political Prisoners and Exiled Settlers closed the magazine on June 25, 1935 for factional activities. Teodorovich was convicted in the trial of the so-called Moskva Center group (involving a total of 120 people). Joseph Stalin and Vyacheslav Molotov sanctioned the trial on September 15, 1937. Teodorovich was executed five days later - a victim of Stalin's Great Purge . \"March 1, 1881 \" , M., 1931", "edit_actions": [{"type": "R", "before": "was", "after": ",", "start_char_pos": 125, "end_char_pos": 128}, {"type": "R", "before": "who", "after": ",", "start_char_pos": 179, "end_char_pos": 182}, {"type": "R", "before": "was also", "after": "also became", "start_char_pos": 308, "end_char_pos": 316}, {"type": "R", "before": "land surveyor", "after": "land-surveyor", "start_char_pos": 427, "end_char_pos": 440}, {"type": "D", "before": "it was", "after": null, "start_char_pos": 786, "end_char_pos": 792}, {"type": "D", "before": "that", "after": null, "start_char_pos": 840, "end_char_pos": 844}, {"type": "R", "before": "czarism", "after": "tsarism", "start_char_pos": 872, "end_char_pos": 879}, {"type": "R", "before": "military establishment.", "after": "the", "start_char_pos": 901, "end_char_pos": 924}, {"type": "A", "before": null, "after": "military establishment", "start_char_pos": 925, "end_char_pos": 925}, {"type": "R", "before": "Teodorovich's childhood was spent", "after": ". Teodorovich spent his childhood", "start_char_pos": 928, "end_char_pos": 961}, {"type": "R", "before": "was educated at", "after": "attended", "start_char_pos": 1078, "end_char_pos": 1093}, {"type": "R", "before": ", he was", "after": "he served as", "start_char_pos": 1185, "end_char_pos": 1193}, {"type": "R", "before": "czarist", "after": "tsarist", "start_char_pos": 1313, "end_char_pos": 1320}, {"type": "R", "before": "to an", "after": "into", "start_char_pos": 1350, "end_char_pos": 1355}, {"type": "R", "before": "contacts", "after": "contact", "start_char_pos": 1439, "end_char_pos": 1447}, {"type": "R", "before": ", promoted to", "after": "; he gained promotion to become", "start_char_pos": 1549, "end_char_pos": 1562}, {"type": "D", "before": "In Summer 1917 Teodorovich co-chaired Saint Petersburg City Hall, at the same time working towards the Bolshevik revolt against the Provisional Government.", "after": null, "start_char_pos": 1703, "end_char_pos": 1858}, {"type": "A", "before": null, "after": "March", "start_char_pos": 1892, "end_char_pos": 1892}, {"type": "R", "before": ", he left the", "after": "he left his", "start_char_pos": 1898, "end_char_pos": 1911}, {"type": "R", "before": ",", "after": "and", "start_char_pos": 1927, "end_char_pos": 1928}, {"type": "R", "before": ",", "after": "(", "start_char_pos": 2024, "end_char_pos": 2025}, {"type": "D", "before": "3", "after": null, "start_char_pos": 2109, "end_char_pos": 2110}, {"type": "R", "before": ", and", "after": ") and to", "start_char_pos": 2111, "end_char_pos": 2116}, {"type": "R", "before": ",", "after": "he served as", "start_char_pos": 2169, "end_char_pos": 2170}, {"type": "R", "before": "Petrograd City Council, then", "after": ", then as", "start_char_pos": 2194, "end_char_pos": 2222}, {"type": "A", "before": null, "after": "of November 1917,", "start_char_pos": 2306, "end_char_pos": 2306}, {"type": "R", "before": "composition, SNK", "after": "Council of People's Commissars of the Russian Soviet Federative Socialist Republic (SNK) he", "start_char_pos": 2320, "end_char_pos": 2336}, {"type": "R", "before": "Government", "after": "government", "start_char_pos": 2503, "end_char_pos": 2513}, {"type": "A", "before": null, "after": "proposed", "start_char_pos": 2599, "end_char_pos": 2599}, {"type": "A", "before": null, "after": "become", "start_char_pos": 2795, "end_char_pos": 2795}, {"type": "R", "before": "branch of", "after": "' branch of the", "start_char_pos": 2863, "end_char_pos": 2872}, {"type": "R", "before": ",", "after": "(the NEP);", "start_char_pos": 3163, "end_char_pos": 3164}, {"type": "R", "before": "land reforms", "after": "land-reforms", "start_char_pos": 3193, "end_char_pos": 3205}, {"type": "R", "before": "from state to peasant on land)", "after": "over land from the state to peasants).", "start_char_pos": 3228, "end_char_pos": 3258}, {"type": "R", "before": "Bolshevik\u2019s", "after": "Bolsheviks'", "start_char_pos": 3275, "end_char_pos": 3286}, {"type": "R", "before": "was a supporter of the creation", "after": "supported the formation", "start_char_pos": 3400, "end_char_pos": 3431}, {"type": "R", "before": "fulfill", "after": "carry out", "start_char_pos": 3731, "end_char_pos": 3738}, {"type": "R", "before": "of the last", "after": "the latter", "start_char_pos": 3973, "end_char_pos": 3984}, {"type": "D", "before": "the", "after": null, "start_char_pos": 4033, "end_char_pos": 4036}, {"type": "R", "before": "\u201cstrong\u201d", "after": "\"strong\"", "start_char_pos": 4186, "end_char_pos": 4194}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4403, "end_char_pos": 4403}, {"type": "R", "before": ", provided him with certain", "after": "and provided Teodorovich with a degree of", "start_char_pos": 4501, "end_char_pos": 4528}, {"type": "A", "before": null, "after": "Kondratiev", "start_char_pos": 4570, "end_char_pos": 4570}, {"type": "R", "before": "he", "after": "Teodorovich", "start_char_pos": 4645, "end_char_pos": 4647}, {"type": "D", "before": "the years", "after": null, "start_char_pos": 4718, "end_char_pos": 4727}, {"type": "D", "before": ",", "after": null, "start_char_pos": 4738, "end_char_pos": 4739}, {"type": "D", "before": "the years", "after": null, "start_char_pos": 4788, "end_char_pos": 4797}, {"type": "A", "before": null, "after": "he was", "start_char_pos": 4934, "end_char_pos": 4934}, {"type": "R", "before": "Association", "after": "Society", "start_char_pos": 5185, "end_char_pos": 5196}, {"type": "R", "before": "Excuers and Deportee", "after": "Prisoners and Exiled Settlers", "start_char_pos": 5217, "end_char_pos": 5237}, {"type": "R", "before": "\"Katorga i ssy\u0142ka\". The letter was closed after liquidation by the", "after": ". An", "start_char_pos": 5274, "end_char_pos": 5340}, {"type": "R", "before": "Association", "after": "Society", "start_char_pos": 5398, "end_char_pos": 5409}, {"type": "R", "before": "Excuses and exiles", "after": "Prisoners and Exiled Settlers closed the magazine", "start_char_pos": 5430, "end_char_pos": 5448}, {"type": "D", "before": "1935for factional activities", "after": null, "start_char_pos": 5461, "end_char_pos": 5489}, {"type": "R", "before": "2", "after": "1935 for factional activities.", "start_char_pos": 5490, "end_char_pos": 5491}, {"type": "D", "before": "The trial was sanctioned by", "after": null, "start_char_pos": 5603, "end_char_pos": 5630}, {"type": "A", "before": null, "after": "sanctioned the trial", "start_char_pos": 5668, "end_char_pos": 5668}, {"type": "R", "before": ". He was", "after": "-", "start_char_pos": 5733, "end_char_pos": 5741}, {"type": "R", "before": "Purges", "after": "Purge", "start_char_pos": 5769, "end_char_pos": 5775}, {"type": "D", "before": ",", "after": null, "start_char_pos": 5793, "end_char_pos": 5794}, {"type": "A", "before": null, "after": ",", "start_char_pos": 5797, "end_char_pos": 5797}], "sents_char_pos": [0, 50, 304, 374, 503, 577, 658, 682, 785, 924, 1065, 1166, 1273, 1373, 1468, 1605, 1702, 1858, 1963, 2151, 2276, 2382, 2515, 2713, 2825, 2883, 3103, 3396, 3541, 3765, 3957, 4311, 4619, 4714, 4784, 4996, 5293, 5602, 5691, 5734]}
+{"doc_id": "21846129", "revision_depth": "1", "before_revision": "The theology of religions is the branch of theology (mostly represented by Christian, Hindu, Islamic and Jewish theology) and religious studies that attempts to theologically evaluate the phenomena of religions. Three important schools within Christian part of this field are pluralism, inclusivism, and exclusivism, which describe the relation of other religious traditions to Christianity and attempt to answer questions about the nature of God and salvation. Purpose of the Theology of Religions The American theologian Langdon Brown Gilkey argued that the political situation of the West following World War II set up a need for Christian thinkers to reconsider the place of other religions specifically because of the changing political world: Basic Three-Point Model The most common model of the view that one takes of other religions has been viewed in a simple , three point model , first articulated by Alan Race. Pluralism Pluralism is basically the belief that the world religions are true and equally valid in their communication of the truth about God, the world, and salvation. The chief expounder of this view is John Hick of Claremont Graduate School in California, who first propounded it in his book God and the Universe of Faiths (1973).Domenic Marbaniang (2007), Theology of Religion: Pluralism, Inclusivism, and Exclusivism, ACTS Academy paper, Bangalore. It has been notably criticized in the declaration Dominus Iesus by Cardinal Joseph Ratzinger. This is the popular view that all religions lead to the same God and all ways lead to heaven. According to Hick, Christianity is not the one and only way of salvation, but one among several. To a pluralist such as Hick, Christianity is not the absolute, unique, and final way to God . While pluralists assert the validity of all religions, they also deny the finality of all religions. According to Hick , in the evolutionary scheme of things in which at isolated ages and places the early religions are succeeded by higher religions, it is the same message of God that comes distinctly to a particular group but in a different form from the others. Hick challenges the older view that Christ or Christianity must be seen at the center of religions . Rather, he says, God must be seen at the center of religions . This view is also called theo-centrism. The pluralistic contention is that although religions have different outward forms, all have the same source .Domenic Marbaniang (2007), Theology of Religion: Pluralism, Inclusivism, and Exclusivism, ACTS Academy paper, Bangalore. To an evangelical Christian, such pluralism only means the abolition of kerygmatic mission (i.e., the mission of evangelizing the world with the salvific gospel of Jesus Christ). Pluralism has been criticized for masquerading as Christianity when in fact it is an invasive force that comes from outside of Christianity and imperialistically demands the surrender of Christian distinctiveness.Alister E. McGrath, \"Conclusion,\" in Four Views on Salvation in a Pluralistic World, ed. Stanley N. Gundry, Dennis L. Okholm, and Timothy R. Phillips (Grand Rapids, MI: Zondervan, 1996), 205-7. Pluralists respond that Christian pluralism is not an invasive force at all, but actually arises from tensions within the Christian tradition, through a process of auto-deconstruction.Christopher Carroll Smith, \"In Defense of a Christian Pluralism,\" Journal for the Renewal of Religion and Theology 5 (2009), available from URL Some have pointed out similarities between Hick's theo-centrism and Hindu pluralism as propounded in the Bhagavad Gita: By whatsoever way men worship Me, even so do I accept them; for, in all ways, O Partha, men walk in My path\" (IV.11)Domenic Marbaniang, Theology of Religion: Pluralism, Inclusivism, and Exclusivism, as cited by Imtitoshi Longkumer in \"Issues in Mission and Evangelism in a Pluralistic Context: A New Paradigm Inquiry,\" NCC Review, Vol. CXXXVII, No.01, Jan-Feb 2017 (Nagpur: National Council of Churches in India, 2017), p.10 Another common evangelical criticism of pluralism is that the religions of the world are fundamentally and irreconcilably different . To value them equally requires a devaluation of propositional truth claims. It is for this reason that pluralism is often treated as a form of self-defeating relativism, though pluralists generally do not accept this label. According to John Hick, \"Religious pluralism is emphatically not a form of relativism.\" Hick considers himself a critical realist.John Hick, \"Religious Pluralism and Islam,\" available from URL Inclusivism Inclusivism is the belief that God is present in non-Christian religions to save adherents through Christ. The inclusivist view has given rise to the concept of the anonymous Christian by which is understood an adherent of a particular religion whom God saves through Christ , but who personally neither knows the Christ of the Bible nor has converted to Biblical Christianity . This position was popularized by the Roman Catholic theologian, Karl Rahner (b. 1904-d.1984).Domenic Marbaniang (2007), Theology of Religion: Pluralism, Inclusivism, and Exclusivism, ACTS Academy paper, Bangalore. One important issue that Rahner raises is about the salvation of those who have never had the opportunity to listen to the gospel of Jesus Christ. To Rahner, then, people can be saved apart from allegiance to the Christian church. It is God in Christ who reaches out to the individual in his own personal religious history to save him. Rahner used the term \u2018anonymous\u2019 to denote people who experience the grace of God in Christ regardless of what religion they belong to. Inclusivism is based on two axioms: the first is that salvation is through Christ alone, the second is that God wills the whole world to be saved.Based on Acts 4:12 and 1 Timothy 2: 4 Consequently, God saves people through Christ alone; however, he makes this possible through ways that extend to all humanity. Exclusivism Exclusivism is the theological position that holds to the finality of the Christian faith in Christ. The finality of Christ means that there is no salvation in non-Christian religions. Notable among the exclusivists of the twentieth century are Samuel Zwemer, Hendrik Kraemer, and Lesslie Newbigin.Domenic Marbaniang (2007), Theology of Religion: Pluralism, Inclusivism, and Exclusivism, ACTS Academy paper, Bangalore. Based on the Aristotelian concept of truth as one and not many, exclusivists regard all other religious claims as false and invalid since the Christian revelation is accepted as true . Ken Gnanakan, The Pluralistic Predicament (Bangalore: TBT, 1992), p. 23 Exclusivists hold that salvation is through Christ alone . It is through a personal experience of commitment to Christ that one receives assurance of salvation. The non-believers cannot receive such assurance since they are neither aware of the uniqueness of Christneither do they acknowledge His lordship. The exclusivist begins with the Bible as the source of all knowledge about spirituality and salvation. The Bible is the criterion of all religious truth. The Bible relates the history of redemption, gives a foundation to personal faith, is a guidebook of the Christian community, and speaks about the future of the world that links up all history, life, and service with meaning and purpose. Exclusivism, thus, establishes the uniqueness and identity of Christianity among world religions. Such exclusivism can take either an extremist or a moderate viewpoint. The extremist view regards all non-Christian religions as demonic and enemies of Christian truth.Emil Brunner & Karl Barth, Natural Theology (London: Geoffrey Bles: The Centenary Press, 1946), pp. 74, 128 On the other hand, the moderate view sees some non-Christian religions as containing elements whereby a dialogue with them can be initiated. However, all exclusivists in general agree that salvation is exclusively only through Christ and received by a personal commitment to the Lord. Domenic Marbaniang (2007), Theology of Religion: Pluralism, Inclusivism, and Exclusivism, ACTS Academy paper, Bangalore. An exclusivist view is inevitable in any dialogue of truth. In fact, neither the pluralist nor the inclusivist could avoid being exclusivist at some point. Truth by nature is exclusive and any claim to truth is exclusive. The only way to deny exclusiveness of Christ is to deny the veracity of the Bible. The exclusivist view sees the exclusiveness of the Bible in its proclamation of Christ as the only way of salvation, though the Bible also speaks of God involved in the history of the nations. Thus, though being very vociferous in his attacks on Hinduism, Nehemiah Goreh could say that \u2018Most erroneous as is the teaching of such books as the Bhagvadgita, the Bhagvata, etc., yet they teach something of ananyabhakti (undivided devotedness to God), of vairagya (giving up the world), of namrata (humility), of ksama (forbearance), etc., which enables one to appreciate the precepts of Christianity.\u2019Quote from Proofs of the Divinity of Our Lord, as cited by R.H.S. Boyd in Indian Christian Theology (Delhi: ISPCK, 1969), p. 55 Knitter's Four-Point Model A significant expansion of the three point model was proposed by Paul F. Knitter in his 2002 book Introducing Theologies of Religions. He outlined four possible views or models that one could adopt. Introducing Theologies of Religions. Maryknoll, NY: Orbis Books, 2002. 256 pp. This tracks to the third of the three point models, i.e. Exclusivism, but is split into two subsections: Total Replacement and Partial Replacement. The Total Replacement model is most frequently found in Fundamentalist/Evangelical churches, and largely represents the work of Karl Barth. It suggests that the reason the Christian religion is considered true is that it realizes that all religion is false (including itself), and recognizes that the only true belief can be found in Jesus. It does not necessarily say that there is nothing of value in other religions, but simply that there is no use in studying other religions, as everything of value can be found in Christ. The Partial Replacement model has similar things to say about other religions, but does not go so far as to say that there is nothing of value in other religions. It suggests that other religions might have access to God's revelation, but not to God's salvation. This is an important distinction, as it implies that some truth can be found in other religions, but not whole of the truth, and not enough to receive salvation. This view is largely based on the views expressed by the World Council of Churches in their discussion on religious dialogue and theology. The Acceptance Model This is Knitter's analog of pure pluralism. All paths may lead to God, and no one can affirm surely that their way is correct. We must all learn from one another, and pull back from making any absolute claims about spiritual matters. As a type of utilitarianism, it takes a subjective approach that admits that various viewpoints may work or not work for the individual, and that is the measure of truth, and any claims beyond that are speculation.", "after_revision": "The theology of religions is the branch of theology (mostly represented by Christian, Hindu, Islamic and Jewish theology) and religious studies that attempts to theologically evaluate the phenomena of religions. Three important schools within Christian theology of religions are pluralism, inclusivism, and exclusivism, which describe the relation of other religious traditions to Christianity and attempt to answer questions about the nature of God and salvation. Purpose of the Theology of Religions The American theologian Langdon Brown Gilkey argued that the political situation of the West following World War II left a need for Christian thinkers to reconsider the place of other religions specifically because of the changing political world: Basic Three-Point Model The most common model of the views that Christians take of other religions is a simple three-point model first articulated by Alan Race. Pluralism Pluralism is the belief that multiple religions are true and equally valid in their communication of the truth about God, the world, and salvation. The chief expounder of this view is John Hick of Claremont Graduate School in California, who first propounded it in his book God and the Universe of Faiths (1973).Domenic Marbaniang (2007), Theology of Religion: Pluralism, Inclusivism, and Exclusivism, ACTS Academy paper, Bangalore. It has been notably criticized in the declaration Dominus Iesus by Cardinal Joseph Ratzinger. To a pluralist such as Hick, Christianity is not the absolute, unique, and final way to God , but one among several . While pluralists assert the validity of all religions, they also deny the finality of all religions. Hick challenges the older view that Christ or Christianity must be seen at the center of religions and argues instead that God must be seen at the center of religions , a view also called theo-centrism. The pluralistic contention is that although religions have different outward forms, all have the same source in the same god .Domenic Marbaniang (2007), Theology of Religion: Pluralism, Inclusivism, and Exclusivism, ACTS Academy paper, Bangalore. To an evangelical Christian, such pluralism only means the abolition of kerygmatic mission (i.e., the mission of evangelizing the world with the salvific gospel of Jesus Christ). Pluralism has been criticized as an invasive force that masquerades as Christianity while imperialistically demanding the surrender of Christian distinctiveness.Alister E. McGrath, \"Conclusion,\" in Four Views on Salvation in a Pluralistic World, ed. Stanley N. Gundry, Dennis L. Okholm, and Timothy R. Phillips (Grand Rapids, MI: Zondervan, 1996), 205-7. Pluralists respond that Christian pluralism is not an invasive force at all, but actually arises from tensions within the Christian tradition, through a process of auto-deconstruction.Christopher Carroll Smith, \"In Defense of a Christian Pluralism,\" Journal for the Renewal of Religion and Theology 5 (2009), available from URL Some have pointed out similarities between Hick's theo-centrism and Hindu pluralism as propounded in the Bhagavad Gita: By whatsoever way men worship Me, even so do I accept them; for, in all ways, O Partha, men walk in My path\" (IV.11)Domenic Marbaniang, Theology of Religion: Pluralism, Inclusivism, and Exclusivism, as cited by Imtitoshi Longkumer in \"Issues in Mission and Evangelism in a Pluralistic Context: A New Paradigm Inquiry,\" NCC Review, Vol. CXXXVII, No.01, Jan-Feb 2017 (Nagpur: National Council of Churches in India, 2017), p.10 Another common evangelical criticism of pluralism is that the religions of the world are fundamentally and irreconcilably different , and that to value them equally requires a devaluation of propositional truth claims. It is for this reason that pluralism is often treated as a form of self-defeating relativism, though pluralists generally do not accept this label. According to John Hick, \"Religious pluralism is emphatically not a form of relativism.\" Hick considers himself a critical realist.John Hick, \"Religious Pluralism and Islam,\" available from URL Inclusivism Inclusivism is the belief that God is present in non-Christian religions to save adherents through Christ. The inclusivist view has given rise to the concept of the \"anonymous Christian\", an adherent of a non-Christian religion whom the Christian God nevertheless saves through Christ . This position was popularized by the Roman Catholic theologian, Karl Rahner (b. 1904-d.1984).Domenic Marbaniang (2007), Theology of Religion: Pluralism, Inclusivism, and Exclusivism, ACTS Academy paper, Bangalore. Christian inclusivism is based on two axioms: the first is that salvation is through Christ alone, the second is that God wills the whole world to be saved.Based on Acts 4:12 and 1 Timothy 2: 4 Consequently, argue inclusivists, God saves people through Christ alone; however, he makes this possible through ways that extend to all humanity. Exclusivism Exclusivism is the theological position that holds that there is no salvation in non-Christian religions. Notable among the exclusivists of the twentieth century are Samuel Zwemer, Hendrik Kraemer, and Lesslie Newbigin.Domenic Marbaniang (2007), Theology of Religion: Pluralism, Inclusivism, and Exclusivism, ACTS Academy paper, Bangalore. Citing the Aristotelian concept of truth as one and not many, exclusivists regard all religious claims other than Christianity as false and invalid . Ken Gnanakan, The Pluralistic Predicament (Bangalore: TBT, 1992), p. 23 Exclusivists hold that salvation is through Christ alone , and that non-Christians cannot be saved because they neither recognize Christ's uniqueness nor lordship. Extremist exclusivism perceives all non-Christian religions as demonic and enemies of Christian truth.Emil Brunner & Karl Barth, Natural Theology (London: Geoffrey Bles: The Centenary Press, 1946), pp. 74, 128 Moderate exclusivism sees some non-Christian religions as containing elements whereby a dialogue with them can be initiated. Domenic Marbaniang (2007), Theology of Religion: Pluralism, Inclusivism, and Exclusivism, ACTS Academy paper, Bangalore. Exclusivists argue that all claims to truth, including those made by pluralists and inclusivists, must exclude alternative claims. However, some exclusivists acknowledge that the Bible also speaks of the Chistian God as involved in the history of the nations. Thus, though being very vociferous in his attacks on Hinduism, Nehemiah Goreh could say that \u2018Most erroneous as is the teaching of such books as the Bhagvadgita, the Bhagvata, etc., yet they teach something of ananyabhakti (undivided devotedness to God), of vairagya (giving up the world), of namrata (humility), of ksama (forbearance), etc., which enables one to appreciate the precepts of Christianity.\u2019Quote from Proofs of the Divinity of Our Lord, as cited by R.H.S. Boyd in Indian Christian Theology (Delhi: ISPCK, 1969), p. 55 Knitter's Four-Point Model A significant expansion of the three-point model was proposed by Paul F. Knitter in his 2002 book Introducing Theologies of Religions. He outlined four possible views or models that one could adopt. Introducing Theologies of Religions. Maryknoll, NY: Orbis Books, 2002. 256 pp. Knitter's \"replacement model\" corresponds to Exclusivism in the three-point model, but is split into two subsections: Total Replacement and Partial Replacement. The Total Replacement model is most frequently found in Fundamentalist/Evangelical churches, and largely represents the work of Karl Barth. It suggests that the reason the Christian religion is considered true is that it realizes that all religion is false (including itself), and recognizes that the only true belief can be found in Jesus. It does not necessarily say that there is nothing of value in other religions, but simply that there is no use in studying other religions, as everything of value can be found in Christ. The Partial Replacement model has similar things to say about other religions, but does not go so far as to say that there is nothing of value in other religions. It suggests that other religions might have access to God's revelation, but not to God's salvation. This is an important distinction, as it implies that some truth can be found in other religions, but not whole of the truth, and not enough to receive salvation. This view is largely based on the views expressed by the World Council of Churches in their discussion on religious dialogue and theology. The Acceptance Model This is Knitter's analog of pure pluralism. All paths may lead to God, and no one can affirm surely that their way is correct. We must all learn from one another, and pull back from making any absolute claims about spiritual matters. The acceptance model takes a subjective approach that admits that various viewpoints may work or not work for any given individual, and that is the measure of truth, and any claims beyond that are speculation.", "edit_actions": [{"type": "R", "before": "part of this field", "after": "theology of religions", "start_char_pos": 253, "end_char_pos": 271}, {"type": "R", "before": "set up", "after": "left", "start_char_pos": 615, "end_char_pos": 621}, {"type": "R", "before": "view that one takes", "after": "views that Christians take", "start_char_pos": 802, "end_char_pos": 821}, {"type": "R", "before": "has been viewed in a simple , three point model ,", "after": "is a simple three-point model", "start_char_pos": 841, "end_char_pos": 890}, {"type": "D", "before": "basically", "after": null, "start_char_pos": 946, "end_char_pos": 955}, {"type": "R", "before": "the world", "after": "multiple", "start_char_pos": 972, "end_char_pos": 981}, {"type": "D", "before": "This is the popular view that all religions lead to the same God and all ways lead to heaven. According to Hick, Christianity is not the one and only way of salvation, but one among several.", "after": null, "start_char_pos": 1471, "end_char_pos": 1661}, {"type": "A", "before": null, "after": ", but one among several", "start_char_pos": 1754, "end_char_pos": 1754}, {"type": "R", "before": "According to Hick , in the evolutionary scheme of things in which at isolated ages and places the early religions are succeeded by higher religions, it is the same message of God that comes distinctly to a particular group but in a different form from the others. Hick", "after": "Hick", "start_char_pos": 1858, "end_char_pos": 2126}, {"type": "R", "before": ". Rather, he says,", "after": "and argues instead that", "start_char_pos": 2221, "end_char_pos": 2239}, {"type": "R", "before": ". This view is", "after": ", a view", "start_char_pos": 2284, "end_char_pos": 2298}, {"type": "A", "before": null, "after": "in the same god", "start_char_pos": 2435, "end_char_pos": 2435}, {"type": "R", "before": "for masquerading as Christianity when in fact it is", "after": "as", "start_char_pos": 2767, "end_char_pos": 2818}, {"type": "R", "before": "comes from outside of Christianity and imperialistically demands", "after": "masquerades as Christianity while imperialistically demanding", "start_char_pos": 2842, "end_char_pos": 2906}, {"type": "R", "before": ". To", "after": ", and that to", "start_char_pos": 4149, "end_char_pos": 4153}, {"type": "R", "before": "anonymous Christian by which is understood", "after": "\"anonymous Christian\",", "start_char_pos": 4745, "end_char_pos": 4787}, {"type": "R", "before": "particular religion whom God", "after": "non-Christian religion whom the Christian God nevertheless", "start_char_pos": 4805, "end_char_pos": 4833}, {"type": "D", "before": ", but who personally neither knows the Christ of the Bible nor has converted to Biblical Christianity", "after": null, "start_char_pos": 4855, "end_char_pos": 4956}, {"type": "R", "before": "One important issue that Rahner raises is about the salvation of those who have never had the opportunity to listen to the gospel of Jesus Christ. To Rahner, then, people can be saved apart from allegiance to the Christian church. It is God in Christ who reaches out to the individual in his own personal religious history to save him. Rahner used the term \u2018anonymous\u2019 to denote people who experience the grace of God in Christ regardless of what religion they belong to. Inclusivism is", "after": "Christian inclusivism is", "start_char_pos": 5173, "end_char_pos": 5659}, {"type": "A", "before": null, "after": "argue inclusivists,", "start_char_pos": 5843, "end_char_pos": 5843}, {"type": "D", "before": "to the finality of the Christian faith in Christ. The finality of Christ means", "after": null, "start_char_pos": 6020, "end_char_pos": 6098}, {"type": "R", "before": "Based on", "after": "Citing", "start_char_pos": 6388, "end_char_pos": 6396}, {"type": "R", "before": "other religious claims", "after": "religious claims other than Christianity", "start_char_pos": 6476, "end_char_pos": 6498}, {"type": "D", "before": "since the Christian revelation is accepted as true", "after": null, "start_char_pos": 6520, "end_char_pos": 6570}, {"type": "R", "before": ". It is through a personal experience of commitment to Christ that one receives assurance of salvation. The non-believers cannot receive such assurance since they are neither aware of the uniqueness of Christneither do they acknowledge His lordship. The exclusivist begins with the Bible as the source of all knowledge about spirituality and salvation. The Bible is the criterion of all religious truth. The Bible relates the history of redemption, gives a foundation to personal faith, is a guidebook of the Christian community, and speaks about the future of the world that links up all history, life, and service with meaning and purpose. Exclusivism, thus, establishes the uniqueness and identity of Christianity among world religions. Such exclusivism can take either an extremist or a moderate viewpoint. The extremist view regards", "after": ", and that non-Christians cannot be saved because they neither recognize Christ's uniqueness nor lordship.", "start_char_pos": 6702, "end_char_pos": 7539}, {"type": "A", "before": null, "after": "Extremist exclusivism perceives", "start_char_pos": 7540, "end_char_pos": 7540}, {"type": "R", "before": "On the other hand, the moderate view", "after": "Moderate exclusivism", "start_char_pos": 7719, "end_char_pos": 7755}, {"type": "D", "before": "However, all exclusivists in general agree that salvation is exclusively only through Christ and received by a personal commitment to the Lord.", "after": null, "start_char_pos": 7860, "end_char_pos": 8003}, {"type": "R", "before": "An exclusivist view is inevitable in any dialogue of truth. In fact, neither the pluralist nor the inclusivist could avoid being exclusivist at some point. Truth by nature is exclusive and any claim to truth is exclusive. The only way to deny exclusiveness of Christ is to deny the veracity of the Bible. The exclusivist view sees the exclusiveness of the Bible in its proclamation of Christ as the only way of salvation, though", "after": "Exclusivists argue that all claims to truth, including those made by pluralists and inclusivists, must exclude alternative claims. However, some exclusivists acknowledge that", "start_char_pos": 8125, "end_char_pos": 8553}, {"type": "R", "before": "God", "after": "the Chistian God as", "start_char_pos": 8579, "end_char_pos": 8582}, {"type": "R", "before": "three point", "after": "three-point", "start_char_pos": 9214, "end_char_pos": 9225}, {"type": "R", "before": "This tracks to the third of the three point models, i.e. Exclusivism,", "after": "Knitter's \"replacement model\" corresponds to Exclusivism in the three-point model,", "start_char_pos": 9461, "end_char_pos": 9530}, {"type": "R", "before": "As a type of utilitarianism, it", "after": "The acceptance model", "start_char_pos": 10956, "end_char_pos": 10987}, {"type": "R", "before": "the", "after": "any given", "start_char_pos": 11077, "end_char_pos": 11080}], "sents_char_pos": [0, 211, 461, 922, 1091, 1256, 1376, 1470, 1564, 1661, 1756, 1857, 2121, 2285, 2325, 2437, 2557, 2736, 2950, 3143, 3328, 3651, 4150, 4226, 4374, 4462, 4505, 4686, 4958, 5052, 5172, 5319, 5403, 5508, 5644, 5791, 5882, 5956, 6069, 6153, 6267, 6387, 6703, 6805, 6951, 7054, 7105, 7343, 7441, 7512, 7611, 7859, 8003, 8124, 8184, 8280, 8346, 8429, 8622, 9027, 9317, 9381, 9418, 9460, 9608, 9748, 9949, 10136, 10299, 10399, 10561, 10700, 10765, 10848, 10955]}
+{"doc_id": "2190063", "revision_depth": "1", "before_revision": "Reception In 2001, DVD Talk reviewed the Fantoma Films \"Educational Archives\" series, Sex & Drugs, and noted The ABCs of Sex Education for Trainables as among those included, writing the film had the \"impact of Freaks\" and that it was intended to \"guide teachers in mental institutions, who must try to train (not teach) those patients considered 'trainable', to know enough about their bodies and sex to neither be anti-social nor victimized in public . \" They commented upon the film addressing the issues directly by its showing \"some very dedicated teachers taking on a really tough job . \" When they reviewed the DVD compilation \"Educational Archives\" School Locker in 2006, they made note that collections of educational films from Fantoma \"included the best of the best in educational films\", and that it was \"hard to top marvels like The ABCs of Sex Education for Trainables , \" and that while this later compilation was not without merit, \"it pales in comparison with the earlier releases . \" DVD Verdict wrote that the film was \"the flip side of all those sex education films directed at children\", in how the \"well-meaning short teaches teachers how to handle sex education for 'retardates,' or the developmentally disabled . \" They noted that the film tended to be more graphic when compared to the other films included on the \"Educational Archives\" series, Sex & Drugs, and though it tried \"very hard to take its subject seriously . Nevertheless, it comes across as very surreal . \" Digitally Obsessed wrote that the ABC of Sex Education for Trainables was \"produced by Planned Parenthood to train teachers of developmentally-challenged young adults (called \"trainables\" here) about their bodies, reproduction, and the place of sexual relations in society . \" They noted that the film had a few scenes considered (in 2001) as humorous, but that the film \"actually does the best job of dealing with the issues of sex in context with society,\" in how it dealt with such issues as anatomy, aspects of normal development and sexual maturity, the appropriateness of public masturbation, and being aware of exploitation, with the subjects \"handled with tact and matter of factness . \" They concluded that stylistic problems aside, the film was \"quite an interesting piece on what would present a real challenge to those caring for developmentally-challenged individuals, and their responsibilities as sexual beings . \" and that of the films making up the compilation, it was \"the most educational, and least condescending sex education film of the lot.\"", "after_revision": "Reception In 2001, DVD Talk reviewed the Fantoma Films \"Educational Archives\" series, Sex & Drugs, and noted The ABCs of Sex Education for Trainables as among those included, writing the film had the \"impact of Freaks\" and that it was intended to \"guide teachers in mental institutions, who must try to train (not teach) those patients considered 'trainable', to know enough about their bodies and sex to neither be anti-social nor victimized in public \" . They commented upon the film addressing the issues directly by its showing \"some very dedicated teachers taking on a really tough job \" . When they reviewed the DVD compilation \"Educational Archives\" School Locker in 2006, they made note that collections of educational films from Fantoma \"included the best of the best in educational films\", and that it was \"hard to top marvels like The ABCs of Sex Education for Trainables \" , and that while this later compilation was not without merit, \"it pales in comparison with the earlier releases \" . DVD Verdict wrote that the film was \"the flip side of all those sex education films directed at children\", in how the \"well-meaning short teaches teachers how to handle sex education for 'retardates,' or the developmentally disabled \" . They noted that the film tended to be more graphic when compared to the other films included on the \"Educational Archives\" series, Sex & Drugs, and though it tried \"very hard to take its subject seriously , n evertheless, it comes across as very surreal \" . Digitally Obsessed wrote that the ABC of Sex Education for Trainables was \"produced by Planned Parenthood to train teachers of developmentally-challenged young adults (called 'trainables' here) about their bodies, reproduction, and the place of sexual relations in society \" . They noted that the film had a few scenes considered (in 2001) as humorous, but that the film \"actually does the best job of dealing with the issues of sex in context with society,\" in how it dealt with such issues as anatomy, aspects of normal development and sexual maturity, the appropriateness of public masturbation, and being aware of exploitation, with the subjects \"handled with tact and matter of factness \" . They concluded that stylistic problems aside, the film was \"quite an interesting piece on what would present a real challenge to those caring for developmentally-challenged individuals, and their responsibilities as sexual beings \" , and that of the films making up the compilation, it was \"the most educational, and least condescending sex education film of the lot.\"", "edit_actions": [{"type": "D", "before": ".", "after": null, "start_char_pos": 453, "end_char_pos": 454}, {"type": "A", "before": null, "after": ".", "start_char_pos": 457, "end_char_pos": 457}, {"type": "D", "before": ".", "after": null, "start_char_pos": 592, "end_char_pos": 593}, {"type": "A", "before": null, "after": ".", "start_char_pos": 596, "end_char_pos": 596}, {"type": "D", "before": ",", "after": null, "start_char_pos": 885, "end_char_pos": 886}, {"type": "A", "before": null, "after": ",", "start_char_pos": 889, "end_char_pos": 889}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1001, "end_char_pos": 1002}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1005, "end_char_pos": 1005}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1239, "end_char_pos": 1240}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1243, "end_char_pos": 1243}, {"type": "R", "before": ". Nevertheless,", "after": ", n", "start_char_pos": 1449, "end_char_pos": 1464}, {"type": "A", "before": null, "after": "evertheless,", "start_char_pos": 1465, "end_char_pos": 1465}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1498, "end_char_pos": 1499}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1502, "end_char_pos": 1502}, {"type": "R", "before": "\"trainables\"", "after": "'trainables'", "start_char_pos": 1678, "end_char_pos": 1690}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1776, "end_char_pos": 1777}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1780, "end_char_pos": 1780}, {"type": "D", "before": ".", "after": null, "start_char_pos": 2196, "end_char_pos": 2197}, {"type": "A", "before": null, "after": ".", "start_char_pos": 2200, "end_char_pos": 2200}, {"type": "D", "before": ".", "after": null, "start_char_pos": 2431, "end_char_pos": 2432}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2435, "end_char_pos": 2435}], "sents_char_pos": [0, 77, 218, 320, 658, 681, 801, 1206, 1450, 1777, 1843, 1962, 2007, 2058, 2102]}
+{"doc_id": "2198160", "revision_depth": "2", "before_revision": "20th century Year Date Event 1901 1 January Singapore-Kranji Railway officially opened to the public. 5 November Sir Frank Swettenham was appointed as the Governor of the Straits Settlements. 1904 16 April Sir John Anderson was appointed as the Governor of the Straits Settlements. 1905 1 June Singapore change its time zone to GMT+07:00 from the original GMT+6hr 55m 25s. 1906 18 November Tao Nan School was established. The Nanyang branch of Tongmenghui was set up in Singapore. 1910 12 March Anderson Bridge was official opened by Governor Sir John Anderson. 1911 2 September Sir Arthur Young was appointed as the Governor of the Straits Settlements. 1913 1 July The Singapore Harbour board was set up. 1915 15 \u2013 25 February The Singapore Mutiny occurred as British Muslim Indian sepoys rose up against the British. 1917 15 August Nanyang Girls' High School was established by Tan Chor Nam and Teo Eng Hock, partially due to Dr Sun Yat Sen's belief in education for girls, in Dhoby Ghaut. 14 June Nan Hua High School [as Nam Wah Girls' School] established by Mr Xiong Shangfu, its campus in Coleman Street, and it was once a base for the Japanese soldiers during the Japanese occupation. 1919 21 March The Chinese High School established by Tan Kah Kee at 15 Niven Road. 1920 17 February Sir Laurence Guillemard was appointed as the Governor of the Straits Settlements. 1923 Singapore starts constructing the main British naval base in East Asia. 1924 28 June Singapore-Johor Causeway officially opens. 1927 3 June Sir Hugh Clifford was appointed as the Governor of the Straits Settlements. 1929 Singapore Police Academy was established at Mount Pleasant Road. 1930 5 February Sir Cecil Clementi was appointed as the Governor of the Straits Settlements. 1932 15 January Tanjong Pagar Railway Station commenced operation. Jalan Besar Stadium open to the public. 1933 1 January Singapore change its time zone to GMT+07:20. 16 January CHIJ Saint Nicholas Girls' School, Singapore's only bilingual and bicultural IJ school, was founded. 1934 9 November Sir Shenton Thomas was appointed as the Governor of the Straits Settlements. 1935 Catholic High School was established. 1937 12 June Kallang Airport was opened. 1938 British Military Hospital, predecessor of Alexandra Hospital was established. Singapore completes the main British naval base, which is the largest drydock and third largest floating dock in the world. 1939 24 January Chung Cheng High School (Main) was established in Kim Yam Road. 1940 July British Military Hospital at Alexandra Road was officially open. 1941 1 September Singapore change its time zone to GMT+07:30. 7 \u2013 8 December In an extensive three-pronged attack, Japan opens hostilities with the countries that opposed the Axis powers and their colonies. First air raid on Singapore at 4:15 am. The Imperial Japanese Army invades Malaya. 10 December The British battleship HMS Prince of Wales and battlecruiser HMS Repulse are sunk by Japanese bombers. 16 December Second air raid on Singapore, at night. Only RAF Tengah is attacked. 25 December A lone Japanese aircraft drops propaganda pamphlets on Singapore Island. 29 December Second Japanese air raid on Singapore City (and third on the island), at night. Nightly raids commence. 30 December The Overseas Chinese Mobilization Council is set up in Singapore, led by Tan Kah Kee. 1942 12 January First major daylight air raid on Singapore. Henceforth, the island is bombed everyday up to the British surrender (with the exception of 19 January). 31 January Malaya falls to the Japanese and the Causeway is blown up to delay Japan's advancement to Singapore. 1 February The siege of Singapore begins. The Japanese in Johor Bahru begin shelling the island daily in addition to daily aerial bombing. 8 February The Japanese cross the Strait of Johor by inflatable boats and landed in Singapore during the Battle of Singapore. 11 February The Japanese and Allied soldiers fight fiercely at Bukit Timah. 13 February The Malay regiment, led by Lt. Adnan bin Saidi, fight bravely against the Japanese at Pasir Panjang Ridge in the Battle of Pasir Panjang. 14 February The Japanese have captured most of Singapore, and most of the population is crammed into the city centre. 15 February The British surrenders and the Japanese Occupation of Singapore starts. Singapore is renamed Syonan-to (Light of the South Island). Singapore change its time zone to GMT+09:00 to be the same as Japan. 18 February \u2013 4 March The Japanese military police, the Kempei Tai kills an estimated 25,000 to 50,000 people during Sook Ching Massacre. 1943 27 September Operation Jaywick occurred. Seven Japanese ships are bombed at Clifford Pier. 10 October The Japanese initiate the Double Tenth Incident in response to Operation Jaywick, by launching a fierce crackdown on anti-Japanese elements and Allied prisoners-of-war in Singapore. 1944 27 March Lim Bo Seng is captured by the Japanese, and dies after 3 months of torture. 1945 14 August Japan surrenders, and there is anomie and looting for nearly a month when the British do not return immediately. 5 September The British return to Singapore after the end of World War II and begin the British Military Administration of the Straits Settlements under the command of Lord Louis Mountbatten. 12 September Singapore revert its time zone back to the pre-war time of GMT+07:30. 1946 1 April The Straits Settlements is dissolved and Singapore becomes a separate crown colony. The Legislative Council of the Colony of Singapore was formed. Sir Franklin Charles Gimson was appointed as the Governor of the Singapore. 1947 A large number of strikes occur causing stoppages in public transport, public services and the harbour. May Severe food shortage leads to record-low rice ration, causing malnutrition, disease and outbreak of crime and violence. 1948 20 March Singapore's first \"limited elections\" held (representation with no specific areas of responsibility); 6 seats in Legislative Council, with Singapore Progressive Party winning 3 seats. 24 June Rubber plantations and tin mines in Malaya are destroyed by communists, and the British declares the state of Emergency over Singapore and Malaya. The emergency was officially lifted on 31 July 1960 by the Malayan government. 1949 The University of Malaya is formed following the merger of Raffles College and King Edward Medical College. 1950 11 \u2013 13 December 18 people are killed during the Maria Hertogh riots. 1951 10 April The number of elected seats is increased to 9 in the second election. 1952 20 March Wilfred Lawson Blythe was appointed as the Acting Governor of the Singapore. 21 April Sir John Fearns Nicoll was appointed as the Governor of the Singapore. 1953 Rendel Commission is appointed to make recommendations for Singapore's self-government. 1954 13 May Chinese school students demonstrate against the British due to the National Service proposal. See Anti-National Service Riots 1955 2 April Second general elections (limited self-government) held. The Labour Front wins the most seats and David Saul Marshall became the first Chief Minister of Singapore. 12 May Four people are killed during the Hock Lee bus riots. 2 June William Goode was appointed as the Acting Governor of the Singapore. 30 June Sir Robert Black was appointed as the Governor of the Singapore. 20 August Kallang Airport ceased operation. Paya Lebar Airport started operation. 1956 7 June David Marshall appeals to the United Kingdom for full self-government, but resigns when he fails. Lim Yew Hock takes over as Chief Minister. 10 October Riots by pro-communist Chinese school students occur when government closes down a student union on 24 September 1956. 14 October Dunman High School (formally known as Singapore Government Chinese Middle School), became the first Chinese secondary school established by the government. 1957 Cedar Girls' Secondary School was founded. 9 December Sir William Goode was appointed as the Governor of the Singapore. 1959 March Lim Yew Hock successfully gains full self-government for Singapore. 30 May 3rd general elections (limited self-government) held. People's Action Party wins 43 of 51 seats and Lee Kuan Yew became the first Prime Minister. 3 June A celebration is held at the Padang for Singapore gaining full self-government. Sir William Goode becomes the Yang di-Pertuan Negara of Singapore. 3 December The national anthem Majulah Singapura, written by Zubir Said, is presented. Encik Yusof bin Ishak becomes the Yang di-Pertuan Negara of Singapore. 1960 1 February The Housing and Development Board is set up. 8 September Tan Howe Liang became Singapore's first Olympic medalist. He finished second among 35 competitors in the lightweight category in weightlifting at the 1960 games held in Rome, Italy. 1961 25 May The Bukit Ho Swee Fire kills four people and destroys 2,200 attap houses. 27 May Tunku Abdul Rahman, the Prime Minister of Malaya, proposes a merger between Singapore, Malaya, Sabah and Sarawak. 1962 1 September A referendum is held in Singapore to vote on merger with Malaysia. 1963 2 February During Operation Coldstore, 107 left-wing politicians and trade unionists are arrested by Internal Security Department 9 July The Malaysia Agreement is signed between leaders of Malaya, Singapore, Sabah and Sarawak. 31 August In this Malaysia Solidarity Day, Lee Kuan Yew declares de facto Independence for Singapore. 16 September Malaysia is formed. Indonesia carries out its konfrontasi campaign. Encik Yusof bin Ishak becomes the Yang di-Pertuan Negara of Singapura. 21 September The PAP wins the 1963 State Elections, defeating the Barisan Sosialis and UMNO. 1964 25 April The PAP wins one seat in the Malaysian Federal Election. UMNO is outraged. 21 July There is an ethnic riot between various Malays and Chinese, on Prophet Muhammad's birthday, 23 people are killed. 1965 10 March Indonesian saboteurs carry out the MacDonald House bombing, killing three people. May Lee Kuan Yew begins campaigning for a Malaysian Malaysia 7 August Singapore and Malaysia sign the separation agreement. 9 August The Malaysian Parliament votes to expel Singapore from the Federation; Singapore becomes independent after separating from Malaysia. 21 September Singapore is admitted into the United Nations as the 117th member. 15 October Singapore becomes the 23rd member of the Commonwealth. 22 December Constitutional Amendment Act is passed and Encik Yusof bin Ishak becomes the first President of Singapore. 1966 3 August Singapore became the 104th member of the International Monetary Fund (IMF) and the World Bank. 24 August The first daily recitation of the pledge of allegiance before the national flag was taken by 500,000 students at all 529 government and aided schools. 1967 The Civilian Memorial is unveiled at the Kranji War Cemetery 14 March The National Service bill is passed in the parliament. 28 March \u2013 18 April Registrations for national service begins at the Central Manpower Base. 12 June The issue of the first Singapore Dollar. 8 August Singapore joined the Association of Southeast Asian Nations (ASEAN) as one of the founding members. 17 August The first batch of the army is drafted for national service. 1968 January Britain announces its intention to withdraw its armed forces from Singapore. 19 April The PAP wins all seats in the 1968 General Election, which is boycotted by Barisan Sosialis. National Archives was established. 1969 20 January The National Junior College, Singapore's first junior college was established. 31 May The 1969 Race Riots of Singapore broke out after growing tension of the 13 May Incident in Malaysia spilled over to Singapore. 1970 23 November Encik Yusof bin Ishak, first President of Singapore died while in office. 1971 2 January Dr Benjamin Henry Sheares becomes the second President of Singapore. 31 October The last British military forces withdraws from Singapore. 1972 2 September The PAP wins the 1972 General Election. 1 October The Singapore Airlines is formed. 1973 4 February The first Chingay Parade is held in Singapore. 14 July The Presidential Council for Minority Rights is set up to ensure minority would not be discriminated. 21 July The construction of the National Stadium is completed and open in Kallang. The construction of Jurong Town Hall is completed. 1974 15 January Hwa Chong Junior College, Singapore's first government-aided junior college was established. 31 January Laju incident: Japanese Red Army bombs petroleum tanks at Pulau Bukom and hijacks a ferry boat. 1976 23 December The PAP wins all 69 seats in the 1976 General Election. 1978 12 October Spyros disaster, was a major industrial disaster which claimed 76 lives. 1979 1 June First National Courtesy Campaign was launched. Singapore becomes the world's second busiest port in terms of shipping tonnage. 1980 23 December The PAP wins all 75 seats in the 1980 General Election. 1981 12 May Dr Benjamin Henry Sheares (second President of Singapore) died while in office. 1 July Paya Lebar Airport ceased operation and Singapore Changi Airport starts operation. 23 October C V Devan Nair becomes the third President of Singapore. 31 October Workers' Party of Singapore's Joshua Benjamin Jeyaretnam elected into Parliament, breaking a 16 years PAP monopoly of the House. 1982 1 January Singapore change its time zone to UTC+08:00. The Civil Defence Programme are launched. 1983 29 January (Singapore Cable Car disaster) Eniwetok, a Panamanian-registered oil rig, hits the Singapore Cable Car system, sending two cabins plunging into the sea and killing seven people. 1984 22 August Non-Constituency Member of Parliament was introduced. 22 December The PAP wins the 1984 General Election while two members of the opposition parties are elected as members of parliament. Three PAP women MPs are also elected, ending a 16 years absence of women representation in Parliament. 1985 28 March C V Devan Nair stepped down as the third President of Singapore. 2 September Wee Kim Wee becomes the fourth President of Singapore. Singapore went into its first ever recession which was induced by government policies. 1986 15 March Hotel New World collapses, killing 33 people and injuring 17 others. 1987 21 May 16 people were arrested during Operation Spectrum and detained under the Internal Security Act. Another six were arrested on 20 June. 1988 3 September The PAP wins the 1988 General Election and group representation constituencies (GRC)s are introduced. 1990 6 July The East West Line of the Mass Rapid Transit (MRT) is completed. 22 November Singapore Changi Airport Terminal 2 begins operation. 28 November Goh Chok Tong becomes the second Prime Minister of Singapore. 1991 26 March Four Pakistanis hijack Singapore Airlines Flight 117 and demand the release of Pakistan Peoples Party members from Pakistani jails. 27 March Members of the Singapore Special Operations Force storm into Singapore Airlines Flight 117, killing all hijackers and freeing all passengers and crew members. 31 August General elections are held. The result is a victory for the PAP, which wins 77 out of 81 seats.1993 August National Archives of Singapore was formed. 1 September Ong Teng Cheong becomes the first elected President and fifth President of Singapore. 1994 5 May American teenager Michael P. Fay is convicted and caned for vandalism. 1996 The parliament passes the Maintenance of Parents law, a private member's bill introduced by Nominated Member of Parliament Woon Cheong Ming Walter. 1997 2 January PAP led by Goh Chok Tong wins a total of 81 out of 83 seats in the 1997 general election. 19 December Silkair Flight 185 crashes into Musi River near Palembang, Sumatra, killing all 104 people on board. 1998 15 January Singapore and United States announces agreement for US ships to use a planned $35 million naval base from 2000. September \"The Singapore Story\", the first volume of Lee Kuan Yew's memoirs is published. () 1999 1 September S.R. Nathan becomes the sixth President of Singapore. Singapore slips into recession during the Asian financial crisis. 2000 1 September Speaker's Corner is launched at Hong Lim Park. 31 October Singapore Airlines Flight 006 crashes during take-off in Chiang Kai Shek International Airport, killing 83 people. \"From Third World to First, The Singapore Story 1965-2000\" the second volume of Lee Kuan Yew's memoirs is published. () 21st century {| class=wikitable style=width:100\\% |- ! style=\"width:6\\%\" | Year || style=\"width:10\\%\" | Date || Event |- | rowspan=5 style=vertical-align:top| 2001 || || Economic recession in Singapore. (to 2003) |- | January || A pipeline feeding gas to Singapore from Indonesia's Natuna field in South China Sea opens. |- | 3 November || The PAP wins 82 of 84 seats in the 2001 General Election. |- | 9 December || 15 suspected militants of Jemaah Islamiah are arrested for alleged bomb plot. |- | 27 December || Tropical Storm Vamei, a rare tropic storm that occurs only once in 100 to 400 years, hits Singapore. |- | rowspan=2 style=vertical-align:top| 2002 || 13 January || Singapore and Japan sign the Japan-Singapore Economic Agreement. |- | 12 October || The Esplanade \u2013 Theatres on the Bay officially opened as Singapore's major performing arts centre. |- | rowspan=3 style=vertical-align:top| 2003 || 1 March - 16 July || SARS virus outbreak in Singapore. |- | 6 May || Singapore and United States sign the United States-Singapore Free Trade Agreement (USS-FTA). |- | 29 October || A major research center Biopolis opens. |- | rowspan=3 style=vertical-align:top| 2004 || 20 April || A section of Nicoll Highway collapses, killing 4 people. |- | 12 August || Lee Hsien Loong, Lee Kuan Yew's son becomes the third Prime Minister. |- | December || National Service was reduced from two and half years to two years. |- | rowspan=6 style=vertical-align:top| 2005 || 15 January || Singapore and Malaysia settle dispute over land reclamation work. |- | 18 April || The government approves the plan to legalise casino-gambling and build two Integrated Resorts. |- | 8 July || In the aftermath of 7 July 2005 \u2013 London bombings, Transport Minister Yeo Cheow Tong announces plan to set up a new Police MRT Unit to enhance the security of Singapore's public transport. (CNA) |- | 17 August || S R Nathan returns for his second term as President, following a walkover in the 2005 Singapore presidential election. |- | 27 August || White Elephant Incident at Buangkok MRT station. |- | 31 December || Singapore Police Academy ceased operational. Home Team Academy replaces the Police Academy and went operational on the following day at Old Choa Chu Kang Road. |- | rowspan=2 style=vertical-align:top|2006 || 6 May || The PAP, led by Lee Hsien Loong, wins 82 of 84 seats in the General Election. |- | 26 March || Singapore Changi Airport opens the Budget Terminal. |- | rowspan=2 style=\"vertical-align:top;\"|2007 || 20 May || The Marina Bay Floating Platform was opened. |- |30 June || The Former National Stadium was closed for re-construction. |- | rowspan=5 style=vertical-align:top| 2008 || 9 January || Singapore Changi Airport opens its third passenger terminal. |- | 21 February || The International Olympic Committee (IOC) awards the Youth Olympic Games hosting rights to Singapore ahead of Moscow by a vote of 53 to 44. |- | 27 February || Jemiah Islamiah terrorist head Mas Selamat bin Kastari escapes from prison. |- | September || Singapore slips into recession due to the global financial crisis. World economies hit badly; banks around the world collapse. |- | 16 October || Singapore government guarantees all local and foreign currency fixed deposits with a $ 150 billion pool for that in view of the financial crisis, joining governments around the world in doing so. |- | rowspan=4 style=vertical-align:top| 2011 || 7 May || PAP loses its grip on Aljunied Group Representation Constituency to the Workers' Party in the General Election. This is the first time an opposition party has captured a GRC since the inception of this scheme in 1988. |- | 1 July || Tanjong Pagar Railway Station ceased operation and to be reserved as the Singapore Railway Museum. |- | 27 August || Singaporeans, for the first time since the establishment of Presidential Election, will be voting for the next President after the 6th President of Singapore \u2013 SR Nathan stepped down on 31 August 2011. The candidates involves in this election includes \u2013 Dr Tan Keng Yam Tony, Mr Tan Jee Say, Mr Tan Kin Lian and Dr. Tan Cheng Bock. |- | 1 September || Dr Tan Keng Yam Tony is sworn as the seventh President of Singapore. |- | 2012 || 25 September || Singapore Changi Airport closes The Budget Terminal to make way for the construction of future Singapore Changi Airport Terminal 4. |- | rowspan=3 style=vertical-align:top| 2013 || 16 February || More than 3000 Singaporeans gathered at the Speakers' Corner, Singapore at Hong Lim Park for a non-partisan protest against the government's Population White Paper which projected a possible 6.9 million people in Singapore by 2030. |- | 24 June || Haze in Singapore reaches 401 PSI, the worst in Singapore history. |- | 8 December || The 2013 Little India riot took place after a fatal accident occurred at the junction of Race Course Road and Hampshire Road in Little India, Singapore. |- | rowspan=2 style=vertical-align:top| 2014 || 12 January || Beginning construction of the new Thomson-East Coast MRT Line (Thomson stretch) consisting of 31 new stations (including 7 interchanges). |- | 30 June || The new National Stadium re-opened to the public after re-construction. |- | rowspan=4 style=vertical-align:top| 2015 || 23 March || Lee Kuan Yew passes away. Singapore enters a one-week mourning period. |- | 30 June || Ng Teng Fong General Hospital commences operation. |- | 22 July || Jurong Community Hospital commences operation. |- | 9 August || Singapore turns 50. |- | rowspan=2 style=vertical-align:top| 2016 || 21 July || Beginning construction of the new Thomson-East Coast MRT Line (East Coast stretch). |- | 22 August || S R Nathan passes away. Singapore enters a one-week mourning period. |- | rowspan=4 style=vertical-align:top| 2017 || 11 February | Nearly 300 year old Tembusu tree at Singapore Botanic Gardens falls, killing one and injured 4 others. |- | 17 April || Othman Wok passes away. Singapore enters a one-week mourning period. |- | 13\u201314 September || Halimah Yacob is elected as the first female president and eighth President of Singapore. |- | 31 October || Singapore Changi Airport opens its fourth passenger terminal . |- | rowspan=3 style=vertical-align:top|2018 || 12 June || Singapore hosted the Singapore Summit, a summit meeting between North Korea and United States leaders. |- | 18 August || Sengkang General Hospital opened to public. |- | 19 November || A new passenger terminal in Seletar Airport opened, replacing the old building . |- | rowspan=2 style=vertical-align:top|2019 || 28 January || Singapore celebrates the 200th Anniversary of the foundation of modern Singapore by Stamford Raffles . |- |17 April || Jewel Changi Airport opens after a week-long preview . |- | style=vertical-align:top|2020 || 23 January || The first COVID-19 case in Singapore was confirmed involving a 66-year-old Chinese national from Wuhan. |- | style=vertical-align:top|2020 || ||Election!!||", "after_revision": "20th century Year Date Event 1901 1 January Singapore-Kranji Railway officially opened to the public. 5 November Sir Frank Swettenham was appointed as the Governor of the Straits Settlements. 1904 16 April Sir John Anderson was appointed as the Governor of the Straits Settlements. 1905 1 June Singapore change its time zone to GMT+07:00 from the original GMT+6hr 55m 25s. 1906 18 November Tao Nan School was established. The Nanyang branch of Tongmenghui was set up in Singapore. 1910 12 March Anderson Bridge was official opened by Governor Sir John Anderson. 1911 2 September Sir Arthur Young was appointed as the Governor of the Straits Settlements. 1913 1 July The Singapore Harbour board was set up. 1915 15 \u2013 25 February The Singapore Mutiny occurred as British Muslim Indian sepoys rose up against the British. 1917 15 August Nanyang Girls' High School was established by Tan Chor Nam and Teo Eng Hock, partially due to Dr Sun Yat Sen's belief in education for girls, in Dhoby Ghaut. 14 June Nan Hua High School [as Nam Wah Girls' School] established by Mr Xiong Shangfu, its campus in Coleman Street, and it was once a base for the Japanese soldiers during the Japanese occupation. 1919 21 March The Chinese High School established by Tan Kah Kee at 15 Niven Road. 1920 17 February Sir Laurence Guillemard was appointed as the Governor of the Straits Settlements. 1923 Singapore starts constructing the main British naval base in East Asia. 1924 28 June Singapore-Johor Causeway officially opens. 1927 3 June Sir Hugh Clifford was appointed as the Governor of the Straits Settlements. 1929 Singapore Police Academy was established at Mount Pleasant Road. 1930 5 February Sir Cecil Clementi was appointed as the Governor of the Straits Settlements. 1932 15 January Tanjong Pagar Railway Station commenced operation. Jalan Besar Stadium open to the public. 1933 1 January Singapore change its time zone to GMT+07:20. 16 January CHIJ Saint Nicholas Girls' School, Singapore's only bilingual and bicultural IJ school, was founded. 1934 9 November Sir Shenton Thomas was appointed as the Governor of the Straits Settlements. 1935 Catholic High School was established. 1937 12 June Kallang Airport was opened. 1938 British Military Hospital, predecessor of Alexandra Hospital was established. Singapore completes the main British naval base, which is the largest drydock and third largest floating dock in the world. 1939 24 January Chung Cheng High School (Main) was established in Kim Yam Road. 1940 July British Military Hospital at Alexandra Road was officially open. 1941 1 September Singapore change its time zone to GMT+07:30. 7 \u2013 8 December In an extensive three-pronged attack, Japan opens hostilities with the countries that opposed the Axis powers and their colonies. First air raid on Singapore at 4:15 am. The Imperial Japanese Army invades Malaya. 10 December The British battleship HMS Prince of Wales and battlecruiser HMS Repulse are sunk by Japanese bombers. 16 December Second air raid on Singapore, at night. Only RAF Tengah is attacked. 25 December A lone Japanese aircraft drops propaganda pamphlets on Singapore Island. 29 December Second Japanese air raid on Singapore City (and third on the island), at night. Nightly raids commence. 30 December The Overseas Chinese Mobilization Council is set up in Singapore, led by Tan Kah Kee. 1942 12 January First major daylight air raid on Singapore. Henceforth, the island is bombed everyday up to the British surrender (with the exception of 19 January). 31 January Malaya falls to the Japanese and the Causeway is blown up to delay Japan's advancement to Singapore. 1 February The siege of Singapore begins. The Japanese in Johor Bahru begin shelling the island daily in addition to daily aerial bombing. 8 February The Japanese cross the Strait of Johor by inflatable boats and landed in Singapore during the Battle of Singapore. 11 February The Japanese and Allied soldiers fight fiercely at Bukit Timah. 13 February The Malay regiment, led by Lt. Adnan bin Saidi, fight bravely against the Japanese at Pasir Panjang Ridge in the Battle of Pasir Panjang. 14 February The Japanese have captured most of Singapore, and most of the population is crammed into the city centre. 15 February The British surrenders and the Japanese Occupation of Singapore starts. Singapore is renamed Syonan-to (Light of the South Island). Singapore change its time zone to GMT+09:00 to be the same as Japan. 18 February \u2013 4 March The Japanese military police, the Kempei Tai kills an estimated 25,000 to 50,000 people during Sook Ching Massacre. 1943 27 September Operation Jaywick occurred. Seven Japanese ships are bombed at Clifford Pier. 10 October The Japanese initiate the Double Tenth Incident in response to Operation Jaywick, by launching a fierce crackdown on anti-Japanese elements and Allied prisoners-of-war in Singapore. 1944 27 March Lim Bo Seng is captured by the Japanese, and dies after 3 months of torture. 1945 14 August Japan surrenders, and there is anomie and looting for nearly a month when the British do not return immediately. 5 September The British return to Singapore after the end of World War II and begin the British Military Administration of the Straits Settlements under the command of Lord Louis Mountbatten. 12 September Singapore revert its time zone back to the pre-war time of GMT+07:30. 1946 1 April The Straits Settlements is dissolved and Singapore becomes a separate crown colony. The Legislative Council of the Colony of Singapore was formed. Sir Franklin Charles Gimson was appointed as the Governor of the Singapore. 1947 A large number of strikes occur causing stoppages in public transport, public services and the harbour. May Severe food shortage leads to record-low rice ration, causing malnutrition, disease and outbreak of crime and violence. 1948 20 March Singapore's first \"limited elections\" held (representation with no specific areas of responsibility); 6 seats in Legislative Council, with Singapore Progressive Party winning 3 seats. 24 June Rubber plantations and tin mines in Malaya are destroyed by communists, and the British declares the state of Emergency over Singapore and Malaya. The emergency was officially lifted on 31 July 1960 by the Malayan government. 1949 The University of Malaya is formed following the merger of Raffles College and King Edward Medical College. 1950 11 \u2013 13 December 18 people are killed during the Maria Hertogh riots. 1951 10 April The number of elected seats is increased to 9 in the second election. 1952 20 March Wilfred Lawson Blythe was appointed as the Acting Governor of the Singapore. 21 April Sir John Fearns Nicoll was appointed as the Governor of the Singapore. 1953 Rendel Commission is appointed to make recommendations for Singapore's self-government. 1954 13 May Chinese school students demonstrate against the British due to the National Service proposal. See Anti-National Service Riots 1955 2 April Second general elections (limited self-government) held. The Labour Front wins the most seats and David Saul Marshall became the first Chief Minister of Singapore. 12 May Four people are killed during the Hock Lee bus riots. 2 June William Goode was appointed as the Acting Governor of the Singapore. 30 June Sir Robert Black was appointed as the Governor of the Singapore. 20 August Kallang Airport ceased operation. Paya Lebar Airport started operation. 1956 7 June David Marshall appeals to the United Kingdom for full self-government, but resigns when he fails. Lim Yew Hock takes over as Chief Minister. 10 October Riots by pro-communist Chinese school students occur when government closes down a student union on 24 September 1956. 14 October Dunman High School (formally known as Singapore Government Chinese Middle School), became the first Chinese secondary school established by the government. 1957 Cedar Girls' Secondary School was founded. 9 December Sir William Goode was appointed as the Governor of the Singapore. 1959 March Lim Yew Hock successfully gains full self-government for Singapore. 30 May 3rd general elections (limited self-government) held. People's Action Party wins 43 of 51 seats and Lee Kuan Yew became the first Prime Minister. 3 June A celebration is held at the Padang for Singapore gaining full self-government. Sir William Goode becomes the Yang di-Pertuan Negara of Singapore. 3 December The national anthem Majulah Singapura, written by Zubir Said, is presented. Encik Yusof bin Ishak becomes the Yang di-Pertuan Negara of Singapore. 1960 1 February The Housing and Development Board is set up. 8 September Tan Howe Liang became Singapore's first Olympic medalist. He finished second among 35 competitors in the lightweight category in weightlifting at the 1960 games held in Rome, Italy. 1961 25 May The Bukit Ho Swee Fire kills four people and destroys 2,200 attap houses. 27 May Tunku Abdul Rahman, the Prime Minister of Malaya, proposes a merger between Singapore, Malaya, Sabah and Sarawak. 1962 1 September A referendum is held in Singapore to vote on merger with Malaysia. 1963 2 February During Operation Coldstore, 107 left-wing politicians and trade unionists are arrested by Internal Security Department 9 July The Malaysia Agreement is signed between leaders of Malaya, Singapore, Sabah and Sarawak. 31 August In this Malaysia Solidarity Day, Lee Kuan Yew declares de facto Independence for Singapore. 16 September Malaysia is formed. Indonesia carries out its konfrontasi campaign. Encik Yusof bin Ishak becomes the Yang di-Pertuan Negara of Singapura. 21 September The PAP wins the 1963 State Elections, defeating the Barisan Sosialis and UMNO. 1964 25 April The PAP wins one seat in the Malaysian Federal Election. UMNO is outraged. 21 July There is an ethnic riot between various Malays and Chinese, on Prophet Muhammad's birthday, 23 people are killed. 1965 10 March Indonesian saboteurs carry out the MacDonald House bombing, killing three people. May Lee Kuan Yew begins campaigning for a Malaysian Malaysia 7 August Singapore and Malaysia sign the separation agreement. 9 August The Malaysian Parliament votes to expel Singapore from the Federation; Singapore becomes independent after separating from Malaysia. 21 September Singapore is admitted into the United Nations as the 117th member. 15 October Singapore becomes the 23rd member of the Commonwealth. 22 December Constitutional Amendment Act is passed and Encik Yusof bin Ishak becomes the first President of Singapore. 1966 3 August Singapore became the 104th member of the International Monetary Fund (IMF) and the World Bank. 24 August The first daily recitation of the pledge of allegiance before the national flag was taken by 500,000 students at all 529 government and aided schools. 1967 The Civilian Memorial is unveiled at the Kranji War Cemetery 14 March The National Service bill is passed in the parliament. 28 March \u2013 18 April Registrations for national service begins at the Central Manpower Base. 12 June The issue of the first Singapore Dollar. 8 August Singapore joined the Association of Southeast Asian Nations (ASEAN) as one of the founding members. 17 August The first batch of the army is drafted for national service. 1968 January Britain announces its intention to withdraw its armed forces from Singapore. 19 April The PAP wins all seats in the 1968 General Election, which is boycotted by Barisan Sosialis. National Archives was established. 1969 20 January The National Junior College, Singapore's first junior college was established. 31 May The 1969 Race Riots of Singapore broke out after growing tension of the 13 May Incident in Malaysia spilled over to Singapore. 1970 23 November Encik Yusof bin Ishak, first President of Singapore died while in office. 1971 2 January Dr Benjamin Henry Sheares becomes the second President of Singapore. 31 October The last British military forces withdraws from Singapore. 1972 2 September The PAP wins the 1972 General Election. 1 October The Singapore Airlines is formed. 1973 4 February The first Chingay Parade is held in Singapore. 14 July The Presidential Council for Minority Rights is set up to ensure minority would not be discriminated. 21 July The construction of the National Stadium is completed and open in Kallang. The construction of Jurong Town Hall is completed. 1974 15 January Hwa Chong Junior College, Singapore's first government-aided junior college was established. 31 January Laju incident: Japanese Red Army bombs petroleum tanks at Pulau Bukom and hijacks a ferry boat. 1976 23 December The PAP wins all 69 seats in the 1976 General Election. 1978 12 October Spyros disaster, was a major industrial disaster which claimed 76 lives. 1979 1 June First National Courtesy Campaign was launched. Singapore becomes the world's second busiest port in terms of shipping tonnage. 1980 23 December The PAP wins all 75 seats in the 1980 General Election. 1981 12 May Dr Benjamin Henry Sheares (second President of Singapore) died while in office. 1 July Paya Lebar Airport ceased operation and Singapore Changi Airport starts operation. 23 October C V Devan Nair becomes the third President of Singapore. 31 October Workers' Party of Singapore's Joshua Benjamin Jeyaretnam elected into Parliament, breaking a 16 years PAP monopoly of the House. 1982 1 January Singapore change its time zone to UTC+08:00. The Civil Defence Programme are launched. 1983 29 January (Singapore Cable Car disaster) Eniwetok, a Panamanian-registered oil rig, hits the Singapore Cable Car system, sending two cabins plunging into the sea and killing seven people. 1984 22 August Non-Constituency Member of Parliament was introduced. 22 December The PAP wins the 1984 General Election while two members of the opposition parties are elected as members of parliament. Three PAP women MPs are also elected, ending a 16 years absence of women representation in Parliament. 1985 28 March C V Devan Nair stepped down as the third President of Singapore. 2 September Wee Kim Wee becomes the fourth President of Singapore. Singapore went into its first ever recession which was induced by government policies. 1986 15 March Hotel New World collapses, killing 33 people and injuring 17 others. 1987 21 May 16 people were arrested during Operation Spectrum and detained under the Internal Security Act. Another six were arrested on 20 June. 1988 3 September The PAP wins the 1988 General Election and group representation constituencies (GRC)s are introduced. 1990 6 July The East West Line of the Mass Rapid Transit (MRT) is completed. 22 November Singapore Changi Airport Terminal 2 begins operation. 28 November Goh Chok Tong becomes the second Prime Minister of Singapore. 1991 26 March Four Pakistanis hijack Singapore Airlines Flight 117 and demand the release of Pakistan Peoples Party members from Pakistani jails. 27 March Members of the Singapore Special Operations Force storm into Singapore Airlines Flight 117, killing all hijackers and freeing all passengers and crew members. 31 August General elections are held. The result is a victory for the PAP, which wins 77 out of 81 seats.1993 August National Archives of Singapore was formed. 1 September Ong Teng Cheong becomes the first elected President and fifth President of Singapore. 1994 5 May American teenager Michael P. Fay is convicted and caned for vandalism. 1996 The parliament passes the Maintenance of Parents law, a private member's bill introduced by Nominated Member of Parliament Woon Cheong Ming Walter. 1997 2 January PAP led by Goh Chok Tong wins a total of 81 out of 83 seats in the 1997 general election. 19 December Silkair Flight 185 crashes into Musi River near Palembang, Sumatra, killing all 104 people on board. 1998 15 January Singapore and United States announces agreement for US ships to use a planned $35 million naval base from 2000. September \"The Singapore Story\", the first volume of Lee Kuan Yew's memoirs is published. () 1999 1 September S.R. Nathan becomes the sixth President of Singapore. Singapore slips into recession during the Asian financial crisis. 2000 1 September Speaker's Corner is launched at Hong Lim Park. 31 October Singapore Airlines Flight 006 crashes during take-off in Chiang Kai Shek International Airport, killing 83 people. \"From Third World to First, The Singapore Story 1965-2000\" the second volume of Lee Kuan Yew's memoirs is published. () 21st century Year Date Event 2001 Economic recession in Singapore. (to 2003) January A pipeline feeding gas to Singapore from Indonesia's Natuna field in South China Sea opens. 3 November The PAP wins 82 of 84 seats in the 2001 General Election. 9 December 15 suspected militants of Jemaah Islamiah are arrested for alleged bomb plot. 27 December Tropical Storm Vamei, a rare tropic storm that occurs only once in 100 to 400 years, hits Singapore. 2002 13 January Singapore and Japan sign the Japan-Singapore Economic Agreement. 12 October The Esplanade \u2013 Theatres on the Bay officially opened as Singapore's major performing arts centre. 2003 1 March - 16 July SARS virus outbreak in Singapore. 6 May Singapore and United States sign the United States-Singapore Free Trade Agreement (USS-FTA). 29 October A major research center Biopolis opens. 2004 20 April A section of Nicoll Highway collapses, killing 4 people. 12 August Lee Hsien Loong, Lee Kuan Yew's son becomes the third Prime Minister. December National Service was reduced from two and half years to two years. 2005 15 January Singapore and Malaysia settle dispute over land reclamation work. 18 April The government approves the plan to legalise casino-gambling and build two Integrated Resorts. 8 July In the aftermath of 7 July 2005 \u2013 London bombings, Transport Minister Yeo Cheow Tong announces plan to set up a new Police MRT Unit to enhance the security of Singapore's public transport. (CNA) 17 August S R Nathan returns for his second term as President, following a walkover in the 2005 Singapore presidential election. 27 August White Elephant Incident at Buangkok MRT station. 31 December Singapore Police Academy ceased operational. Home Team Academy replaces the Police Academy and went operational on the following day at Old Choa Chu Kang Road.2006 6 May The PAP, led by Lee Hsien Loong, wins 82 of 84 seats in the General Election. 26 March Singapore Changi Airport opens the Budget Terminal.2007 20 May The Marina Bay Floating Platform was opened.30 June The Former National Stadium was closed for re-construction. 2008 9 January Singapore Changi Airport opens its third passenger terminal. 21 February The International Olympic Committee (IOC) awards the Youth Olympic Games hosting rights to Singapore ahead of Moscow by a vote of 53 to 44. 27 February Jemiah Islamiah terrorist head Mas Selamat bin Kastari escapes from prison. September Singapore slips into recession due to the global financial crisis. World economies hit badly; banks around the world collapse. 16 October Singapore government guarantees all local and foreign currency fixed deposits with a $ 150 billion pool for that in view of the financial crisis, joining governments around the world in doing so. 2011 7 May PAP loses its grip on Aljunied Group Representation Constituency to the Workers' Party in the General Election. This is the first time an opposition party has captured a GRC since the inception of this scheme in 1988. 1 July Tanjong Pagar Railway Station ceased operation and to be reserved as the Singapore Railway Museum. 27 August Singaporeans, for the first time since the establishment of Presidential Election, will be voting for the next President after the 6th President of Singapore \u2013 SR Nathan stepped down on 31 August 2011. The candidates involves in this election includes \u2013 Dr Tan Keng Yam Tony, Mr Tan Jee Say, Mr Tan Kin Lian and Dr. Tan Cheng Bock. 1 September Dr Tan Keng Yam Tony is sworn as the seventh President of Singapore. 2012 25 September Singapore Changi Airport closes The Budget Terminal to make way for the construction of future Singapore Changi Airport Terminal 4. 2013 16 February More than 3000 Singaporeans gathered at the Speakers' Corner, Singapore at Hong Lim Park for a non-partisan protest against the government's Population White Paper which projected a possible 6.9 million people in Singapore by 2030. 24 June Haze in Singapore reaches 401 PSI, the worst in Singapore history. 8 December The 2013 Little India riot took place after a fatal accident occurred at the junction of Race Course Road and Hampshire Road in Little India, Singapore. 2014 12 January Beginning construction of the new Thomson-East Coast MRT Line (Thomson stretch) consisting of 31 new stations (including 7 interchanges). 30 June The new National Stadium re-opened to the public after re-construction. 2015 23 March Lee Kuan Yew passes away. Singapore enters a one-week mourning period. 30 June Ng Teng Fong General Hospital commences operation. 22 July Jurong Community Hospital commences operation. 9 August Singapore turns 50. 2016 21 July Beginning construction of the new Thomson-East Coast MRT Line (East Coast stretch). 22 August S R Nathan passes away. Singapore enters a one-week mourning period. 2017 11 February Nearly 300 year old Tembusu tree at Singapore Botanic Gardens falls, killing one and injured 4 others. 17 April Othman Wok passes away. Singapore enters a one-week mourning period. 13\u201314 September Halimah Yacob is elected as the first female president and eighth President of Singapore. 31 October Singapore Changi Airport opens its fourth passenger terminal .2018 12 June Singapore hosted the Singapore Summit, a summit meeting between North Korea and United States leaders. 18 August Sengkang General Hospital opened to public. 19 November A new passenger terminal in Seletar Airport opened, replacing the old building .2019 28 January Singapore celebrates the 200th Anniversary of the foundation of modern Singapore by Stamford Raffles .17 April Jewel Changi Airport opens after a week-long preview .2020 23 January The first COVID-19 case in Singapore was confirmed involving a 66-year-old Chinese national from Wuhan. ", "edit_actions": [{"type": "R", "before": "$35 million naval base from 2000. September \"The Singapore Story\", the first volume of Lee Kuan Yew's memoirs is published. () 1999 1 September S.R. Nathan becomes the sixth President of Singapore. Singapore slips into recession during the Asian financial crisis. 2000 1 September Speaker's Corner is launched at Hong Lim Park. 31 October Singapore Airlines Flight 006 crashes during take-off in Chiang Kai Shek International Airport, killing 83 people. \"From Third World to First, The Singapore Story 1965-2000\" the second volume of Lee Kuan Yew's memoirs is published. () 21st century {| class=wikitable style=width:100\\% |- ! style=\"width:6\\%\" | Year || style=\"width:10\\%\" | Date || Event |- | rowspan=5 style=vertical-align:top| 2001 || || Economic recession in Singapore. (to 2003) |- | January || A pipeline feeding gas to Singapore from Indonesia's Natuna field in South China Sea opens. |- | 3 November || The PAP wins 82 of 84 seats in the 2001 General Election. |- | 9 December || 15 suspected militants of Jemaah Islamiah are arrested for alleged bomb plot. |- | 27 December || Tropical Storm Vamei, a rare tropic storm that occurs only once in 100 to 400 years, hits Singapore. |- | rowspan=2 style=vertical-align:top| 2002 || 13 January || Singapore and Japan sign the Japan-Singapore Economic Agreement. |- | 12 October || The Esplanade \u2013 Theatres on the Bay officially opened as Singapore's major performing arts centre. |- | rowspan=3 style=vertical-align:top| 2003 || 1 March - 16 July || SARS virus outbreak in Singapore. |- | 6 May || Singapore and United States sign the United States-Singapore Free Trade Agreement (USS-FTA). |- | 29 October || A major research center Biopolis opens. |- | rowspan=3 style=vertical-align:top| 2004 || 20 April || A section of Nicoll Highway collapses, killing 4 people. |- | 12 August || Lee Hsien Loong, Lee Kuan Yew's son becomes the third Prime Minister. |- | December || National Service was reduced from two and half years to two years. |- | rowspan=6 style=vertical-align:top| 2005 || 15 January || Singapore and Malaysia settle dispute over land reclamation work. |- | 18 April || The government approves the plan to legalise casino-gambling and build two Integrated Resorts. |- | 8 July || In the aftermath of 7 July 2005 \u2013 London bombings, Transport Minister Yeo Cheow Tong announces plan to set up a new Police MRT Unit to enhance the security of Singapore's public transport. (CNA) |- | 17 August || S R Nathan returns for his second term as President, following a walkover in the 2005 Singapore presidential election. |- | 27 August || White Elephant Incident at Buangkok MRT station. |- | 31 December || Singapore Police Academy ceased operational. Home Team Academy replaces the Police Academy and went operational on the following day at Old Choa Chu Kang Road. |- | rowspan=2 style=vertical-align:top|2006 || 6 May || The PAP, led by Lee Hsien Loong, wins 82 of 84 seats in the General Election. |- | 26 March || Singapore Changi Airport opens the Budget Terminal. |- | rowspan=2 style=\"vertical-align:top;\"|2007 || 20 May || The Marina Bay Floating Platform was opened. |- |30 June || The Former National Stadium was closed for re-construction. |- | rowspan=5 style=vertical-align:top| 2008 || 9 January || Singapore Changi Airport opens its third passenger terminal. |- | 21 February || The International Olympic Committee (IOC) awards the Youth Olympic Games hosting rights to Singapore ahead of Moscow by a vote of 53 to 44. |- | 27 February || Jemiah Islamiah terrorist head Mas Selamat bin Kastari escapes from prison. |- | September || Singapore slips into recession due to the global financial crisis. World economies hit badly; banks around the world collapse. |- | 16 October || Singapore government guarantees all local and foreign currency fixed deposits with a $", "after": "$35 million naval base from 2000. September \"The Singapore Story\", the first volume of Lee Kuan Yew's memoirs is published. () 1999 1 September S.R. Nathan becomes the sixth President of Singapore. Singapore slips into recession during the Asian financial crisis. 2000 1 September Speaker's Corner is launched at Hong Lim Park. 31 October Singapore Airlines Flight 006 crashes during take-off in Chiang Kai Shek International Airport, killing 83 people. \"From Third World to First, The Singapore Story 1965-2000\" the second volume of Lee Kuan Yew's memoirs is published. () 21st century Year Date Event 2001 Economic recession in Singapore. (to 2003) January A pipeline feeding gas to Singapore from Indonesia's Natuna field in South China Sea opens. 3 November The PAP wins 82 of 84 seats in the 2001 General Election. 9 December 15 suspected militants of Jemaah Islamiah are arrested for alleged bomb plot. 27 December Tropical Storm Vamei, a rare tropic storm that occurs only once in 100 to 400 years, hits Singapore. 2002 13 January Singapore and Japan sign the Japan-Singapore Economic Agreement. 12 October The Esplanade \u2013 Theatres on the Bay officially opened as Singapore's major performing arts centre. 2003 1 March - 16 July SARS virus outbreak in Singapore. 6 May Singapore and United States sign the United States-Singapore Free Trade Agreement (USS-FTA). 29 October A major research center Biopolis opens. 2004 20 April A section of Nicoll Highway collapses, killing 4 people. 12 August Lee Hsien Loong, Lee Kuan Yew's son becomes the third Prime Minister. December National Service was reduced from two and half years to two years. 2005 15 January Singapore and Malaysia settle dispute over land reclamation work. 18 April The government approves the plan to legalise casino-gambling and build two Integrated Resorts. 8 July In the aftermath of 7 July 2005 \u2013 London bombings, Transport Minister Yeo Cheow Tong announces plan to set up a new Police MRT Unit to enhance the security of Singapore's public transport. (CNA) 17 August S R Nathan returns for his second term as President, following a walkover in the 2005 Singapore presidential election. 27 August White Elephant Incident at Buangkok MRT station. 31 December Singapore Police Academy ceased operational. Home Team Academy replaces the Police Academy and went operational on the following day at Old Choa Chu Kang Road.2006 6 May The PAP, led by Lee Hsien Loong, wins 82 of 84 seats in the General Election. 26 March Singapore Changi Airport opens the Budget Terminal.2007 20 May The Marina Bay Floating Platform was opened.30 June The Former National Stadium was closed for re-construction. 2008 9 January Singapore Changi Airport opens its third passenger terminal. 21 February The International Olympic Committee (IOC) awards the Youth Olympic Games hosting rights to Singapore ahead of Moscow by a vote of 53 to 44. 27 February Jemiah Islamiah terrorist head Mas Selamat bin Kastari escapes from prison. September Singapore slips into recession due to the global financial crisis. World economies hit badly; banks around the world collapse. 16 October Singapore government guarantees all local and foreign currency fixed deposits with a $", "start_char_pos": 15835, "end_char_pos": 19680}, {"type": "D", "before": "|- | rowspan=4 style=vertical-align:top|", "after": null, "start_char_pos": 19790, "end_char_pos": 19830}, {"type": "D", "before": "||", "after": null, "start_char_pos": 19836, "end_char_pos": 19838}, {"type": "D", "before": "||", "after": null, "start_char_pos": 19845, "end_char_pos": 19847}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 20066, "end_char_pos": 20070}, {"type": "D", "before": "||", "after": null, "start_char_pos": 20078, "end_char_pos": 20080}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 20180, "end_char_pos": 20184}, {"type": "D", "before": "||", "after": null, "start_char_pos": 20195, "end_char_pos": 20197}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 20530, "end_char_pos": 20534}, {"type": "D", "before": "||", "after": null, "start_char_pos": 20547, "end_char_pos": 20549}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 20619, "end_char_pos": 20623}, {"type": "D", "before": "||", "after": null, "start_char_pos": 20629, "end_char_pos": 20631}, {"type": "D", "before": "||", "after": null, "start_char_pos": 20645, "end_char_pos": 20647}, {"type": "D", "before": "|- | rowspan=3 style=vertical-align:top|", "after": null, "start_char_pos": 20780, "end_char_pos": 20820}, {"type": "D", "before": "||", "after": null, "start_char_pos": 20826, "end_char_pos": 20828}, {"type": "D", "before": "||", "after": null, "start_char_pos": 20841, "end_char_pos": 20843}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 21076, "end_char_pos": 21080}, {"type": "D", "before": "||", "after": null, "start_char_pos": 21089, "end_char_pos": 21091}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 21159, "end_char_pos": 21163}, {"type": "D", "before": "||", "after": null, "start_char_pos": 21175, "end_char_pos": 21177}, {"type": "D", "before": "|- | rowspan=2 style=vertical-align:top|", "after": null, "start_char_pos": 21331, "end_char_pos": 21371}, {"type": "D", "before": "||", "after": null, "start_char_pos": 21377, "end_char_pos": 21379}, {"type": "D", "before": "||", "after": null, "start_char_pos": 21391, "end_char_pos": 21393}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 21532, "end_char_pos": 21536}, {"type": "D", "before": "||", "after": null, "start_char_pos": 21545, "end_char_pos": 21547}, {"type": "D", "before": "|- | rowspan=4 style=vertical-align:top|", "after": null, "start_char_pos": 21620, "end_char_pos": 21660}, {"type": "D", "before": "||", "after": null, "start_char_pos": 21666, "end_char_pos": 21668}, {"type": "D", "before": "||", "after": null, "start_char_pos": 21678, "end_char_pos": 21680}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 21752, "end_char_pos": 21756}, {"type": "D", "before": "||", "after": null, "start_char_pos": 21765, "end_char_pos": 21767}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 21819, "end_char_pos": 21823}, {"type": "D", "before": "||", "after": null, "start_char_pos": 21832, "end_char_pos": 21834}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 21882, "end_char_pos": 21886}, {"type": "D", "before": "||", "after": null, "start_char_pos": 21896, "end_char_pos": 21898}, {"type": "D", "before": "|- | rowspan=2 style=vertical-align:top|", "after": null, "start_char_pos": 21919, "end_char_pos": 21959}, {"type": "D", "before": "||", "after": null, "start_char_pos": 21965, "end_char_pos": 21967}, {"type": "D", "before": "||", "after": null, "start_char_pos": 21976, "end_char_pos": 21978}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 22063, "end_char_pos": 22067}, {"type": "D", "before": "||", "after": null, "start_char_pos": 22078, "end_char_pos": 22080}, {"type": "D", "before": "|- | rowspan=4 style=vertical-align:top|", "after": null, "start_char_pos": 22150, "end_char_pos": 22190}, {"type": "D", "before": "||", "after": null, "start_char_pos": 22196, "end_char_pos": 22198}, {"type": "D", "before": "|", "after": null, "start_char_pos": 22211, "end_char_pos": 22212}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 22316, "end_char_pos": 22320}, {"type": "D", "before": "||", "after": null, "start_char_pos": 22330, "end_char_pos": 22332}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 22402, "end_char_pos": 22406}, {"type": "D", "before": "||", "after": null, "start_char_pos": 22423, "end_char_pos": 22425}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 22516, "end_char_pos": 22520}, {"type": "D", "before": "||", "after": null, "start_char_pos": 22532, "end_char_pos": 22534}, {"type": "R", "before": ". |- | rowspan=3 style=vertical-align:top|2018 ||", "after": ".2018", "start_char_pos": 22596, "end_char_pos": 22645}, {"type": "D", "before": "||", "after": null, "start_char_pos": 22654, "end_char_pos": 22656}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 22760, "end_char_pos": 22764}, {"type": "D", "before": "||", "after": null, "start_char_pos": 22775, "end_char_pos": 22777}, {"type": "D", "before": "|- |", "after": null, "start_char_pos": 22822, "end_char_pos": 22826}, {"type": "D", "before": "||", "after": null, "start_char_pos": 22839, "end_char_pos": 22841}, {"type": "R", "before": ". |- | rowspan=2 style=vertical-align:top|2019 ||", "after": ".2019", "start_char_pos": 22921, "end_char_pos": 22970}, {"type": "D", "before": "||", "after": null, "start_char_pos": 22982, "end_char_pos": 22984}, {"type": "R", "before": ". |- |17 April ||", "after": ".17 April", "start_char_pos": 23086, "end_char_pos": 23103}, {"type": "R", "before": ". |- | style=vertical-align:top|2020 ||", "after": ".2020", "start_char_pos": 23157, "end_char_pos": 23196}, {"type": "D", "before": "||", "after": null, "start_char_pos": 23208, "end_char_pos": 23210}, {"type": "D", "before": "|- | style=vertical-align:top|2020 || ||Election!!||", "after": null, "start_char_pos": 23315, "end_char_pos": 23367}], "sents_char_pos": [0, 101, 191, 281, 421, 480, 561, 653, 818, 991, 1190, 1273, 1372, 1449, 1505, 1593, 1663, 1756, 1823, 1863, 2035, 2128, 2171, 2212, 2295, 2419, 2499, 2574, 2781, 2821, 2864, 2979, 3031, 3060, 3145, 3237, 3261, 3419, 3525, 3637, 3679, 3776, 3902, 3978, 4021, 4128, 4246, 4330, 4390, 4459, 4597, 4643, 4693, 4886, 4977, 5105, 5297, 5477, 5540, 5616, 5725, 5849, 5965, 6047, 6202, 6281, 6394, 6469, 6553, 6644, 6724, 6817, 6923, 7025, 7132, 7193, 7269, 7342, 7386, 7424, 7534, 7577, 7874, 7922, 7999, 8078, 8139, 8231, 8318, 8385, 8472, 8543, 8674, 8798, 8884, 9005, 9089, 9321, 9423, 9456, 9504, 9575, 9739, 9757, 9879, 9975, 10099, 10179, 10241, 10321, 10387, 10506, 10776, 10906, 10998, 11047, 11156, 11227, 11317, 11419, 11454, 11549, 11683, 11774, 11858, 11928, 11985, 12029, 12092, 12202, 12285, 12336, 12445, 12552, 12625, 12714, 12773, 12853, 12926, 13018, 13108, 13176, 13316, 13376, 13418, 13612, 13681, 13814, 13917, 13996, 14063, 14150, 14233, 14341, 14379, 14498, 14575, 14641, 14715, 14861, 15029, 15067, 15135, 15189, 15287, 15327, 15369, 15522, 15627, 15740, 15868, 15958, 16032, 16098, 16162, 16288, 16405, 16611, 16729, 16806, 16903, 17024, 17152, 17270, 17374, 17481, 17540, 17658, 17746, 17830, 17959, 18071, 18275, 18418, 18485, 18550, 18665, 18800, 18869, 18975, 19050, 19173, 19429, 19514, 19541, 19574, 19789, 19959, 20065, 20179, 20399, 20513, 20529, 20618, 21075, 21158, 21330, 21531, 21619, 21706, 21751, 21818, 21881, 22062, 22104, 22149, 22315, 22356, 22401, 22515, 22759, 22821, 23314]}
+{"doc_id": "22062208", "revision_depth": "1", "before_revision": "Discovery-driven planning is a planning technique first introduced in a Harvard Business Review article by Rita Gunther McGrath and Ian C. MacMillan in 1995 McGrath , R. G. & MacMillan, I. C. 1995. Discovery Driven Planning . Harvard Business Review, 73(4): 44\u2013 54 and subsequently referenced in a number of books and articles.McGrath, R. G. & MacMillan, I. C. 2009. Discovery Driven Growth: A Breakthrough Process to Reduce Risk and Seize Opportunity . Boston: Harvard Business Publishing ; Christensen, C. M. 1997. The innovator's dilemma: When new technologies cause great firms to fail. Boston , Mass. : Harvard Business School Press Its main thesis is that when one is operating in arenas with significant amounts of uncertainty, that a different approach than is normally used in conventional planning applies . In conventional planning, the correctness of a plan is generally judged by how close outcomes come to projections. In discovery-driven planning, it is assumed that plan parameters may change as new information is revealed. With conventional planning, it is considered appropriate to fund the entire project as the expectation is that one can predict a positive outcome. In discovery driven planning, funds are released based on the accomplishment of key milestones or checkpoints, at which point additional funding can be made available predicated on reasonable expectations for future success.Block, Z. & MacMillan, I. C. 1985. Milestones for successful venture planning. Harvard Business Review, 63(5): 84\u2013 90 Conventional project management tools, such as stage-gate models or the use of financial tools to assess innovation have been found to be flawed in that they are not well suited for the uncertainty of innovation-oriented projects Rajesh, S. & Zafar, I. 2008. Stage-Gate Controls, Learning Failure, and Adverse Effect on Novel New Products . Journal of Marketing, 72(1): 118. Christensen, C., Kaufman, S., & Shih, W. 2008. Innovation killers: how financial tools destroy your capacity to do new things. Harvard Business Review, 86(1): 98\u2013105, 137 Discovery-driven planning has been widely used in entrepreneurship curricula and has recently been cited by Steven G. Blank as a foundational idea in the lean startup methodology Blank, S. (2013). \"Why the Lean Start-Up Changes Everything. \" Harvard Business Review 91(5): 63-72. A discovery driven plan incorporates five disciplines or plan elements: Definition of success for the plan or initiative, including a 'reverse' income statement Benchmarking against market and competitive parameters Specification of operational requirements Documentation of assumptions Specification of key checkpoints Using discovery-driven planning, it is often possible to iterate the ideas in a plan, encouraging experimentation at lowest possible cost. The methodology is consistent with the application of real options reasoning to business planning, in which ventures are considered 'real' options. A real option is a small investment made today which buys the right, but not the obligation to make further investments.McGrath, R. G. 1997. A real options logic for initiating technology positioning investments. Academy of Management Review, 22(4): 974\u2013 996van Putten, A. B. & MacMillan, I. C. 2004. Making Real Options Really Work . Harvard Business Review, 82(12): 134Dixit , A. K. & Pindyck, R. S. 1994. Investment Under Uncertainty. Princeton, New Jersey : Princeton University Press ", "after_revision": "Discovery-driven planning is a planning technique first introduced in a Harvard Business Review article by Rita Gunther McGrath and Ian C. MacMillan in 1995McGrath , R. G. & MacMillan, I. C. 1995. Discovery driven planning . Harvard Business Review, 73(4): 44\u2013 54. and subsequently referenced in a number of books and articles.McGrath, R. G. & MacMillan, I. C. 2009. Discovery driven growth: a breakthrough process to reduce risk and seize opportunity . Boston: Harvard Business Publishing . Christensen, C. M. 1997. The innovator's dilemma: When new technologies cause great firms to fail. Boston : Harvard Business School Press . Its main thesis is that when one is operating in arenas with significant amounts of uncertainty, that a different approach applies than is normally used in conventional planning . In conventional planning, the correctness of a plan is generally judged by how close outcomes come to projections. In discovery-driven planning, it is assumed that plan parameters may change as new information is revealed. With conventional planning, it is considered appropriate to fund the entire project , as the expectation is that one can predict a positive outcome. In discovery-driven planning, funds are released based on the accomplishment of key milestones or checkpoints, at which point additional funding can be made available predicated on reasonable expectations for future success.Block, Z. & MacMillan, I. C. 1985. Milestones for successful venture planning. Harvard Business Review, 63(5): 84\u2013 90. Conventional project management tools, such as stage-gate models or the use of financial tools to assess innovation , have been found to be flawed in that they are not well suited for the uncertainty of innovation-oriented projects Rajesh, S. & Zafar, I. 2008. Stage-gate controls, learning failure, and adverse effect on novel new products . Journal of Marketing, 72(1): 118. Christensen, C., Kaufman, S., & Shih, W. 2008. Innovation killers: how financial tools destroy your capacity to do new things. Harvard Business Review, 86(1): 98\u2013105, 137. Discovery-driven planning has been widely used in entrepreneurship curricula and has recently been cited by Steven G. Blank as a foundational idea in the lean startup methodology Blank, S. 2013. Why the lean start-up changes everything. Harvard Business Review , 91(5): 63\u201372. A discovery-driven plan incorporates five disciplines or plan elements: Definition of success for the plan or initiative, including a 'reverse' income statement Benchmarking against market and competitive parameters Specification of operational requirements Documentation of assumptions Specification of key checkpoints Using discovery-driven planning, it is often possible to iterate the ideas in a plan, encouraging experimentation at lowest possible cost. The methodology is consistent with the application of real options reasoning to business planning, in which ventures are considered \"real\" options. A real option is a small investment made today which buys the right, but not the obligation to make further investments.McGrath, R. G. 1997. A real options logic for initiating technology positioning investments. Academy of Management Review, 22(4): 974\u2013 996. van Putten, A. B. & MacMillan, I. C. 2004. Making real options really work . Harvard Business Review, 82(12): 134.Dixit , A. K. & Pindyck, R. S. 1994. Investment under uncertainty. Princeton : Princeton University Press .", "edit_actions": [{"type": "R", "before": "1995 McGrath", "after": "1995McGrath", "start_char_pos": 152, "end_char_pos": 164}, {"type": "R", "before": "Driven Planning", "after": "driven planning", "start_char_pos": 208, "end_char_pos": 223}, {"type": "R", "before": "54", "after": "54.", "start_char_pos": 262, "end_char_pos": 264}, {"type": "R", "before": "Driven Growth: A Breakthrough Process to Reduce Risk and Seize Opportunity", "after": "driven growth: a breakthrough process to reduce risk and seize opportunity", "start_char_pos": 377, "end_char_pos": 451}, {"type": "R", "before": ";", "after": ".", "start_char_pos": 490, "end_char_pos": 491}, {"type": "D", "before": ", Mass.", "after": null, "start_char_pos": 598, "end_char_pos": 605}, {"type": "A", "before": null, "after": ".", "start_char_pos": 638, "end_char_pos": 638}, {"type": "A", "before": null, "after": "applies", "start_char_pos": 762, "end_char_pos": 762}, {"type": "D", "before": "applies", "after": null, "start_char_pos": 810, "end_char_pos": 817}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1127, "end_char_pos": 1127}, {"type": "R", "before": "discovery driven", "after": "discovery-driven", "start_char_pos": 1194, "end_char_pos": 1210}, {"type": "R", "before": "90", "after": "90.", "start_char_pos": 1530, "end_char_pos": 1532}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1649, "end_char_pos": 1649}, {"type": "R", "before": "Stage-Gate Controls, Learning Failure, and Adverse Effect on Novel New Products", "after": "Stage-gate controls, learning failure, and adverse effect on novel new products", "start_char_pos": 1793, "end_char_pos": 1872}, {"type": "R", "before": "137", "after": "137.", "start_char_pos": 2076, "end_char_pos": 2079}, {"type": "R", "before": "(2013). \"Why the Lean Start-Up Changes Everything. \"", "after": "2013. Why the lean start-up changes everything.", "start_char_pos": 2269, "end_char_pos": 2321}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2346, "end_char_pos": 2346}, {"type": "R", "before": "63-72.", "after": "63\u201372.", "start_char_pos": 2354, "end_char_pos": 2360}, {"type": "R", "before": "discovery driven", "after": "discovery-driven", "start_char_pos": 2363, "end_char_pos": 2379}, {"type": "R", "before": "'real'", "after": "\"real\"", "start_char_pos": 2952, "end_char_pos": 2958}, {"type": "R", "before": "996van", "after": "996. van", "start_char_pos": 3223, "end_char_pos": 3229}, {"type": "R", "before": "Real Options Really Work", "after": "real options really work", "start_char_pos": 3276, "end_char_pos": 3300}, {"type": "R", "before": "134Dixit", "after": "134.Dixit", "start_char_pos": 3336, "end_char_pos": 3344}, {"type": "R", "before": "Under Uncertainty. Princeton, New Jersey", "after": "under uncertainty. Princeton", "start_char_pos": 3387, "end_char_pos": 3427}, {"type": "A", "before": null, "after": ".", "start_char_pos": 3457, "end_char_pos": 3457}], "sents_char_pos": [0, 197, 327, 366, 453, 491, 516, 590, 819, 934, 1042, 1190, 1415, 1449, 1493, 1792, 1955, 2035, 2276, 2319, 2360, 2819, 2967, 3088, 3108, 3180, 3268, 3375, 3405]}
+{"doc_id": "23169749", "revision_depth": "1", "before_revision": "Following the entry of Spain into the American War of Independence in 1779, both Spain and Great Britain contested territories in Central America. Although most of the territory was part of the Spanish Captaincy General of Guatemala, the British had established logging rights on the southern coast of the Yucatan Peninsula (present-day Belize), and had established informal settlements (lacking formal colonial authority) on the Mosquito Coast of present-day Honduras and Nicaragua. Guatemalan Governor Mat\u00edas de G\u00e1lvez had moved quickly when the declaration of war arrived, seizing St. George's Caye, one of the principal British island settlements off the Yucatan coast.Ch\u00e1vez, p. 152 Many of the British fled that occupation to the island of Roat\u00e1n, another British-controlled island about off the Honduran coast.Bolland, p. 31 British commander Edward Marcus Despard used Roat\u00e1n as a base for guerilla-style operations to extend and maintain British influence on the Mosquito Coast, and for privateering operations against Spanish shipping.Oman, p. 5 (Sources do not indicate whether Despard was present on Roat\u00e1n at the time of the Spanish attack; if he was, he was probably not captured, since he continued to be active in the area. Stephens suggests that he was on Jamaica at the time.)Oman, p. 6 Map of the Bay of Honduras; Roat\u00e1n is shown in red G\u00e1lvez, who had been ordered by King Charles to \"dislocate the English from their hidden settlements on the Gulf of Honduras \", Ch\u00e1vez, p. 151 began planning offensive operations against the British mainland settlements as early as 1780, after the British abandoned their failed expedition into Nicaragua. He raised as many as 15,000 militia, and received financial and logistical support from many parts of the Spanish colonial empire in the Americas. For logistical and diplomatic reasons, no operations were launched until after the American victory at Yorktown in October 1781. The British loss opened the possibility that the British would be able to deploy troops to Central America to better defend the area.Floyd, pp. 154\u2013155 G\u00e1lvez' plans called for assaults on the British presence in the Bay Islands (principally Roat\u00e1n), followed by a sweep along the coast to eliminate the British from the mainland. Troops from central Guatemala were staged in early 1782 at Trujillo for the assault on Roat\u00e1n, while additional forces moved overland from Nicaragua, Honduras, and Salvador toward the principal British settlement of Black River.Floyd, p. 155 G\u00e1lvez arrived at Trujillo on March 8 to organise the assault on Roat\u00e1n. Leaving a force of 600 at Trujillo to further harass the British and their partisan allies, he embarked another 600 troops onto transports, and sailed for Roat\u00e1n on March 12, escorted by three frigates ( Santa Matilde, the Santa Cecilia, and the Antiope) and a number of smaller armed naval vessels,Ch\u00e1vez, pp. 162\u2013163 under the command of Commodore Enrique Macdonell .Marley, p. 342 The British residents of Roat\u00e1n were aware of the ongoing Spanish military activities. The main settlement, New Port Royal, was defended by Forts Dalling and Despard, which mounted 20 guns. The island's white non-slave population was however quite small. In 1781 they appealed to the British commander at Bluefields for support, but he was only able to send additional weapons, which did not add significantly to the island's defenses.Floyd, p. 157 Battle upGuatemalan Governor Mat\u00edas de G\u00e1lvez Enrique MacDonell The Spanish fleet arrived off Roat\u00e1n at 6 am on March 13, and after its defenders fired several ineffectual cannon shots, the Santa Maltilda and the other ships anchored out of range. At 8 am G\u00e1lvez sent his second-in-command on the 'Santa Matilda' Enrique MacDonell, who spoke English, in to request the surrender of the island's defenders. The defenders asked for six hours to consider their options, which G\u00e1lvez granted. After that time had elapsed MacDonell came back with word that the defenders refused to surrender and were prepared to stand their ground ' to the death '. The Spanish were not surprised as their sailors had noticed the English appeared to be preparing defenses during grace period. An Immediate attack was not possible due to high winds and rough seas, so G\u00e1lvez then held council of his eleven officers, and a plan of attack was formulated.Ch\u00e1vez, p. 163 At about 10:15 am on March 16, Spanish guns opened up against Forts Dalling and Despard, which guarded the mouth of New Port Royal's harbour. By 1:00 pm the British guns there had been silenced, and Major General Gabriel Herbias began landing troops. After the two forts were secured, the Spanish warships entered the harbour and began raking the town with cannon fire, while British artillery fired back from positions in the hills above the town. This exchange continued until sunset, at which point the British defenders capitulated. The Spanish had two killed and four wounded in the battle, while only two slaves were wounded on the other side. Aftermath Terms of surrender were agreed the next day. G\u00e1lvez and his men remained on the island for several days , collecting weapons, rounding up slaves that had run away, destroying all the buildings and agriculture on the island, as well as burning many of the ships in the harbour, which they assumed to be used in smuggling and other illicit trade. The Spanish left the island on March 23, carrying as prisoners of war 81 British soldiers, 300 slaves, and 135 British civilians.Ch\u00e1vez, p. 164 The prisoners were sent to Havana, where the slaves were auctioned off and the others held until they could be exchanged. G\u00e1lvez was able to only temporarily partially eliminate British influences in the area. He followed up his success at Roat\u00e1n with the capture of Black River in early April, but any attempt to advance further bogged down . James Lawrie, the commander at Black River, and Edward Marcus Despard successfully recaptured Black River, and were able to hold it until the end of the war.Ch\u00e1vez, p. 165", "after_revision": "Following the entry of Spain into the American War of Independence in 1779, both Spain and Great Britain contested territories in Central America. Although most of the territory was part of the Spanish Captaincy General of Guatemala, the British had established logging rights on the southern coast of the Yucatan Peninsula (present-day Belize), and had established informal settlements (lacking formal colonial authority) on the Mosquito Coast of present-day Honduras and Nicaragua. Guatemalan Governor Mat\u00edas de G\u00e1lvez had moved quickly when the declaration of war arrived, seizing St. George's Caye, one of the principal British island settlements off the Yucatan coast.Ch\u00e1vez, p. 152 Many of the British fled that occupation to the island of Roat\u00e1n, another British-controlled island about off the Honduran coast.Bolland, p. 31 British commander Edward Marcus Despard used Roat\u00e1n as a base for guerilla-style operations to extend and maintain British influence on the Mosquito Coast, and for privateering operations against Spanish shipping.Oman, p. 5 (Sources do not indicate whether Despard was present on Roat\u00e1n at the time of the Spanish attack; if he was, he was probably not captured, since he continued to be active in the area. Stephens suggests that he was on Jamaica at the time.)Oman, p. 6 Map of the Bay of Honduras; Roat\u00e1n is shown in red G\u00e1lvez, who had been ordered by King Charles to \"dislocate the English from their hidden settlements on the Gulf of Honduras ,\" Ch\u00e1vez, p. 151 began planning offensive operations against the British mainland settlements as early as 1780, after the British abandoned their failed expedition into Nicaragua. He raised as many as 15,000 militia, and received financial and logistical support from many parts of the Spanish colonial empire in the Americas. For logistical and diplomatic reasons, no operations were launched until after the American victory at Yorktown in October 1781. The British loss opened the possibility that the British would be able to deploy troops to Central America to better defend the area.Floyd, pp. 154\u2013155 G\u00e1lvez' s plans called for assaults on the British presence in the Bay Islands (principally Roat\u00e1n), followed by a sweep along the coast to eliminate the British from the mainland. Troops from central Guatemala were staged in early 1782 at Trujillo for the assault on Roat\u00e1n, while additional forces moved overland from Nicaragua, Honduras, and Salvador toward the principal British settlement of Black River.Floyd, p. 155 G\u00e1lvez arrived at Trujillo on March 8 to organise the assault on Roat\u00e1n. Leaving a force of 600 at Trujillo to further harass the British and their partisan allies, he embarked another 600 troops onto transports, and sailed for Roat\u00e1n on March 12, escorted by three frigates ( the Santa Matilde, Santa Cecilia, and Antiope) and a number of smaller armed naval vessels,Ch\u00e1vez, pp. 162\u2013163 under the command of Commodore Enrique MacDonell .Marley, p. 342 The British residents of Roat\u00e1n were aware of the ongoing Spanish military activities. The main settlement, New Port Royal, was defended by Forts Dalling and Despard, which mounted 20 guns. The island's white non-slave population was , however, quite small. In 1781 they appealed to the British commander at Bluefields for support, but he was only able to send additional weapons, which did not add significantly to the island's defenses.Floyd, p. 157 Battle upGuatemalan Governor Mat\u00edas de G\u00e1lvez Enrique MacDonell The Spanish fleet arrived off Roat\u00e1n at 6 :00 am on March 13, and after its defenders fired several ineffectual cannon shots, the Santa Matilde and the other ships anchored out of range. At 8 am G\u00e1lvez sent in his English-speaking second-in-command on the Santa Matilde, Enrique MacDonell, to request the surrender of the island's defenders. The defenders asked for six hours to consider their options, which G\u00e1lvez granted. After that time had elapsed , MacDonell came back with word that the defenders refused to surrender and were prepared to stand their ground \" to the death .\" The Spanish were not surprised , as their sailors had noticed the English appeared to be preparing defenses during grace period. An immediate attack was not possible due to high winds and rough seas, so G\u00e1lvez then held council of his 11 officers, and a plan of attack was formulated.Ch\u00e1vez, p. 163 At about 10:15 am on March 16, Spanish guns opened up against Forts Dalling and Despard, which guarded the mouth of New Port Royal's harbour. By 1:00 pm the British guns there had been silenced, and Major General Gabriel Herbias began landing troops. After the two forts were secured, the Spanish warships entered the harbour and began raking the town with cannon fire, while British artillery fired back from positions in the hills above the town. This exchange continued until sunset, at which time the British defenders capitulated. The Spanish had two killed and four wounded in the battle, while only two slaves were wounded on the other side. Aftermath Terms of surrender were agreed the next day. G\u00e1lvez and his men remained on the island for several days collecting weapons, rounding up slaves that had run away, destroying all the buildings and agriculture on the island, and burning many of the ships in the harbour, which they assumed to be used in smuggling and other illicit trade. The Spanish left the island on March 23, carrying as prisoners of war 81 British soldiers, 300 slaves, and 135 British civilians.Ch\u00e1vez, p. 164 The prisoners were sent to Havana, where the slaves were auctioned off and the others held until they could be exchanged. G\u00e1lvez was able to only temporarily partially eliminate British influences in the area. He followed up his success at Roat\u00e1n with the capture of Black River in early April, but any attempt to advance further lost momentum . James Lawrie, the commander at Black River, and Edward Marcus Despard successfully recaptured Black River, and were able to hold it until the end of the war.Ch\u00e1vez, p. 165", "edit_actions": [{"type": "R", "before": "\",", "after": ",\"", "start_char_pos": 1481, "end_char_pos": 1483}, {"type": "A", "before": null, "after": "s", "start_char_pos": 2098, "end_char_pos": 2098}, {"type": "A", "before": null, "after": "the", "start_char_pos": 2789, "end_char_pos": 2789}, {"type": "D", "before": "the", "after": null, "start_char_pos": 2805, "end_char_pos": 2808}, {"type": "D", "before": "the", "after": null, "start_char_pos": 2828, "end_char_pos": 2831}, {"type": "R", "before": "Macdonell", "after": "MacDonell", "start_char_pos": 2944, "end_char_pos": 2953}, {"type": "R", "before": "however", "after": ", however,", "start_char_pos": 3204, "end_char_pos": 3211}, {"type": "A", "before": null, "after": ":00", "start_char_pos": 3525, "end_char_pos": 3525}, {"type": "R", "before": "Maltilda", "after": "Matilde", "start_char_pos": 3616, "end_char_pos": 3624}, {"type": "R", "before": "his", "after": "in his English-speaking", "start_char_pos": 3688, "end_char_pos": 3691}, {"type": "R", "before": "'Santa Matilda'", "after": "Santa Matilde,", "start_char_pos": 3717, "end_char_pos": 3732}, {"type": "D", "before": "who spoke English, in", "after": null, "start_char_pos": 3752, "end_char_pos": 3773}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3937, "end_char_pos": 3937}, {"type": "R", "before": "'", "after": "\"", "start_char_pos": 4048, "end_char_pos": 4049}, {"type": "R", "before": "'.", "after": ".\"", "start_char_pos": 4063, "end_char_pos": 4065}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4097, "end_char_pos": 4097}, {"type": "R", "before": "Immediate", "after": "immediate", "start_char_pos": 4197, "end_char_pos": 4206}, {"type": "R", "before": "eleven", "after": "11", "start_char_pos": 4300, "end_char_pos": 4306}, {"type": "R", "before": "point", "after": "time", "start_char_pos": 4864, "end_char_pos": 4869}, {"type": "D", "before": ",", "after": null, "start_char_pos": 5132, "end_char_pos": 5133}, {"type": "R", "before": "as well as", "after": "and", "start_char_pos": 5252, "end_char_pos": 5262}, {"type": "R", "before": "bogged down", "after": "lost momentum", "start_char_pos": 5847, "end_char_pos": 5858}], "sents_char_pos": [0, 146, 483, 587, 673, 817, 1045, 1153, 1239, 1293, 1332, 1661, 1808, 1937, 2071, 2269, 2498, 2584, 2955, 3056, 3159, 3224, 3405, 3667, 3825, 3908, 4065, 4193, 4353, 4509, 4618, 4816, 4904, 5017, 5072, 5372, 5502, 5638, 5726, 6018]}
+{"doc_id": "235169", "revision_depth": "1", "before_revision": "France DNA paternity testing is solely performed on decision of a judge in case of a judiciary procedure in order either to establish or contest paternity or to obtain or deny child support.Art. 16-10 of the Civil Code Private DNA paternity testing is illegal, including through laboratories in other countries, and is punishable by up to a year in prison and a \u20ac15,000 fine.Art. 226-25 to 226-30 of the Penal Code The French Council of State has described the law's purpose as upholding the \"French regime of filiation\" and preserving \"the peace of URL", "after_revision": "France DNA paternity testing is solely performed on decision of a judge in case of a judiciary procedure in order either to establish or contest paternity or to obtain or deny child support.Art. 16-10 of the Civil Code Private DNA paternity testing is illegal, including through laboratories in other countries, and is punishable by up to a year in prison and a \u20ac15,000 fine.Art. 226-25 to 226-30 of the Penal Code The French Council of State has stated the purpose of the law is upholding the \"French regime of filiation\" and preserving \"the peace of families.\" See Cuckold. URL", "edit_actions": [{"type": "R", "before": "described the law's purpose as", "after": "stated the purpose of the law is", "start_char_pos": 447, "end_char_pos": 477}, {"type": "A", "before": null, "after": "families.\"", "start_char_pos": 550, "end_char_pos": 550}, {"type": "A", "before": null, "after": "See Cuckold.", "start_char_pos": 551, "end_char_pos": 551}], "sents_char_pos": [0, 190, 375]}
+{"doc_id": "24212673", "revision_depth": "1", "before_revision": "Associative Group Analysis (AGA) is an inferential approach to analyze people\u2019s mental representations, focusing on subjective meanings and images to assess similarities and differences across cultures and belief systems. Culture can be regarded as \"a group-specific cognitive organization or world view composed of the mosaic elements of meanings 2. Szalay, L. B., Maday, B. C., Blacking, J., Bock, B., Fischer, J. L., Frisch, J. A., Healey, A., Hoppal, M., Laosa, L. M., Swartz, J. D., Maranda, P., Powesland, P. F., Voight, V. (1973) \u201c Verbal associations in the analysis of subjective culture [and comments and reply] ,\u201d Current Anthropology, 14 (1/2), pp. 33-50.\". A language, as a communication tool in daily life, contains culturally specific meanings for people who use it. The words people use reflect not only their cognitions, but also their affections and behavioral intentions. To understand differences in psychological meaning across cultures, it is useful to analyze words in a language. The words people use reflect their thinking or feeling. Thinking, or more precisely the cognitive process, together with feeling, guides most of human behavior. By using AGA, we are able to understand how different groups organize and integrate their perceptions and understandings of the world around them. Perceptual Representational System Relatedness or affinity Some units cluster into a larger category, sharing similar meanings and thus increasing the strength of selected views and beliefs. For example, the theme \"Self\" to some groups denotes individual self since people might associate this word with \"Me , \" \"Individual , \" \"Esteem , \" \"Person , \" etc. However, for other groups of people, the concept of self is a social self. They associate it with \"Society , \" \"Family , \" \"Responsibility , \" etc. These clusters identify the culture, beliefs, and assumptions that can help us predict areas of motivation, vulnerability, need and concern within the group. AGA is not used as a survey instrument. It is a sociological approach, with the primary goal of assessing people\u2019s subjective representation of their experiences as conveyed by their priorities, perceptions, and meanings. Therefore, the AGA approach is closer to anthropological strategies that intensively assess culturally representative small groups rather than to strategies that use carefully organized large samples. Since statistical significance is not the primary concern, a sample of 50 to 100 respondents is sufficient. However, if the group is quite heterogeneous with considerable variation among subjects, a larger number of subjects is needed (Szalay, L. B. and Kelly, R. M. (1982) \u201c Political ideology and subjective culture: Conceptualization and empirical assessment ,\u201d the American Political Science Review, 76 (3), pp. 585-602.). Data Collection Procedure Differences in meaning of individual themes can be shown by using semantographs. Figure 2 shows how Russian and American managers associate the theme \u201cFreedom.\u201d American associations are indicated in blue, and the Russian associations are indicated in red. The vertical axis contains the associated words for the two groups, and the horizontal axis represents the weighted score for each associated word. The characteristics of the AGA method make it well suited for research on cultural/belief change and comparative studies of cultural differences among national groups. Kelly Kelly, R. M. (1985) \u201c the Associative group analysis method and evaluation research ,\u201d Evaluation Review, 9 (35), pp. 35-50. used AGA in a curriculum study. In a curriculum development project called \u201c Justice and the City ,\u201d to evaluate whether the concept of justice is learnt by students from the curriculum project, 41 themes grouped into four basic domains (Basic Values, Means/End, Analytical Units, and Political-Economic Orientation domains) were given to students. A content analysis of the responses to the stimulus word \u201cjustice,\u201d revealed that the meaning of justice was substantially changed in the experiment. Students in all urban affairs/public policy classes listed specific kinds of justice (e.g., religious, corporate, natural, liberal, Marxist) and public policy issues in the cards while these responses did not appear in the pretest. Another AGA study was used in assessing the cultural adaption of Filipinos who had been in the U.S. Navy. Three groups of Filipinos were compared to similarly composed groups of Americans: those who were newly recruited to the U.S. Navy, those who had been in the Navy between 1 and 10 years, and those who had been in the Navy from 11 to 25 years. The results indicated that cultural adaptation occurred most in domains such as \u201cWork\u201d and \u201cService.\u201d Cultural adaptation occurred least in domains such as \u201cFamily,\u201d \u201cFriends,\u201d \u201cSociety,\u201d \u201cInterpersonal Relations,\u201d and \u201cReligion.\u201d These domains are most influenced by tradition and early socialization. This study also revealed that cultural adaption is also a function of time spent in the host environment. The change from the first group (new recruits) to the second group (those who had been in the Navy 1\u201310 years) is faster than the change from the second group to the third group (those who had been in the Navy 11\u201325 years). Limitation %DIFDELCMD < %DIFDELCMD < %%% (1) The method\u2019s authors do not offer a measure of significance. (2) This method reveals the power, density, and constraints of a theme,Bovasso, G., Scalay, L. Boase, V., and Stanford, M. (1993) \u201c A graph theory model of the semantic structure of attitudes ,\u201d journal of Psycholinguistic Research, 22, pp. 411-425. but the interpretation of a word might be context dependent. For example, Russians associated \u201cinnovation\u201d with \u201cchange,\u201d but we don\u2019t know the change is interpreted as negative or positive.", "after_revision": "Associative group analysis (AGA) is an inferential approach to analyze people\u2019s mental representations, focusing on subjective meanings and images to assess similarities and differences across cultures and belief systems. Culture can be regarded as \"a group-specific cognitive organization or world view composed of the mosaic elements of meanings 2. Szalay, L. B., Maday, B. C., Blacking, J., Bock, B., Fischer, J. L., Frisch, J. A., Healey, A., Hoppal, M., Laosa, L. M., Swartz, J. D., Maranda, P., Powesland, P. F., Voight, V. (1973) \" Verbal associations in the analysis of subjective culture [and comments and reply] \", Current Anthropology, 14 (1/2), pp. 33-50.\". A language, as a communication tool in daily life, contains culturally specific meanings for people who use it. The words people use reflect not only their cognitions, but also their affections and behavioral intentions. To understand differences in psychological meaning across cultures, it is useful to analyze words in a language. The words people use reflect their thinking or feeling. Thinking, or more precisely the cognitive process, together with feeling, guides most of human behavior. By using AGA, we are able to understand how different groups organize and integrate their perceptions and understandings of the world around them. Perceptual representational system Relatedness or affinity Some units cluster into a larger category, sharing similar meanings and thus increasing the strength of selected views and beliefs. For example, the theme \"Self\" to some groups denotes individual self since people might associate this word with \"Me \" , \" Individual\" , \" Esteem\" , \" Person\", etc. However, for other groups of people, the concept of self is a social self. They associate it with \"Society \" , \" Family\" , \" Responsibility\", etc. These clusters identify the culture, beliefs, and assumptions that can help us predict areas of motivation, vulnerability, need and concern within the group. AGA is not used as a survey instrument. It is a sociological approach, with the primary goal of assessing people\u2019s subjective representation of their experiences as conveyed by their priorities, perceptions, and meanings. Therefore, the AGA approach is closer to anthropological strategies that intensively assess culturally representative small groups rather than to strategies that use carefully organized large samples. Since statistical significance is not the primary concern, a sample of 50 to 100 respondents is sufficient. However, if the group is quite heterogeneous with considerable variation among subjects, a larger number of subjects is needed (Szalay, L. B. and Kelly, R. M. (1982) \" Political ideology and subjective culture: Conceptualization and empirical assessment \", the American Political Science Review, 76 (3), pp. 585-602.). Data collection procedure Differences in meaning of individual themes can be shown by using semantographs. Figure 2 shows how Russian and American managers associate the theme \"Freedom.\" American associations are indicated in blue, and the Russian associations are indicated in red. The vertical axis contains the associated words for the two groups, and the horizontal axis represents the weighted score for each associated word. The characteristics of the AGA method make it well suited for research on cultural/belief change and comparative studies of cultural differences among national groups. Kelly Kelly, R. M. (1985) \" the Associative group analysis method and evaluation research \", Evaluation Review, 9 (35), pp. 35-50. used AGA in a curriculum study. In a curriculum development project called \" Justice and the City \", to evaluate whether the concept of justice is learnt by students from the curriculum project, 41 themes grouped into four basic domains (Basic Values, Means/End, Analytical Units, and Political-Economic Orientation domains) were given to students. A content analysis of the responses to the stimulus word \"justice\", revealed that the meaning of justice was substantially changed in the experiment. Students in all urban affairs/public policy classes listed specific kinds of justice (e.g., religious, corporate, natural, liberal, Marxist) and public policy issues in the cards while these responses did not appear in the pretest. Another AGA study was used in assessing the cultural adaption of Filipinos who had been in the U.S. Navy. Three groups of Filipinos were compared to similarly composed groups of Americans: those who were newly recruited to the U.S. Navy, those who had been in the Navy between 1 and 10 years, and those who had been in the Navy from 11 to 25 years. The results indicated that cultural adaptation occurred most in domains such as \"Work\" and \"Service.\" Cultural adaptation occurred least in domains such as \"Family\", \"Friends\", \"Society\", \"Interpersonal Relations\", and \"Religion.\" These domains are most influenced by tradition and early socialization. This study also revealed that cultural adaption is also a function of time spent in the host environment. The change from the first group (new recruits) to the second group (those who had been in the Navy 1\u201310 years) is faster than the change from the second group to the third group (those who had been in the Navy 11\u201325 years). Limitation %DIFDELCMD < %DIFDELCMD < %%% The method\u2019s authors do not offer a measure of significance. This method reveals the power, density, and constraints of a theme,Bovasso, G., Scalay, L. Boase, V., and Stanford, M. (1993) \" A graph theory model of the semantic structure of attitudes \", journal of Psycholinguistic Research, 22, pp. 411-425. but the interpretation of a word might be context dependent. For example, Russians associated \"innovation\" with \"change\", but we don\u2019t know the change is interpreted as negative or positive.", "edit_actions": [{"type": "R", "before": "Group Analysis", "after": "group analysis", "start_char_pos": 12, "end_char_pos": 26}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 537, "end_char_pos": 538}, {"type": "R", "before": ",\u201d", "after": "\",", "start_char_pos": 622, "end_char_pos": 624}, {"type": "R", "before": "Representational System", "after": "representational system", "start_char_pos": 1323, "end_char_pos": 1346}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1620, "end_char_pos": 1621}, {"type": "D", "before": "\"Individual", "after": null, "start_char_pos": 1624, "end_char_pos": 1635}, {"type": "R", "before": "\"Esteem", "after": "Individual\"", "start_char_pos": 1640, "end_char_pos": 1647}, {"type": "R", "before": "\"Person", "after": "Esteem\"", "start_char_pos": 1652, "end_char_pos": 1659}, {"type": "A", "before": null, "after": "Person\",", "start_char_pos": 1664, "end_char_pos": 1664}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1777, "end_char_pos": 1778}, {"type": "D", "before": "\"Family", "after": null, "start_char_pos": 1781, "end_char_pos": 1788}, {"type": "R", "before": "\"Responsibility", "after": "Family\"", "start_char_pos": 1793, "end_char_pos": 1808}, {"type": "A", "before": null, "after": "Responsibility\",", "start_char_pos": 1813, "end_char_pos": 1813}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 2674, "end_char_pos": 2675}, {"type": "R", "before": ",\u201d", "after": "\",", "start_char_pos": 2762, "end_char_pos": 2764}, {"type": "R", "before": "Collection Procedure", "after": "collection procedure", "start_char_pos": 2832, "end_char_pos": 2852}, {"type": "R", "before": "\u201cFreedom.\u201d", "after": "\"Freedom.\"", "start_char_pos": 3003, "end_char_pos": 3013}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 3452, "end_char_pos": 3453}, {"type": "R", "before": ",\u201d", "after": "\",", "start_char_pos": 3516, "end_char_pos": 3518}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 3632, "end_char_pos": 3633}, {"type": "R", "before": ",\u201d", "after": "\",", "start_char_pos": 3655, "end_char_pos": 3657}, {"type": "R", "before": "\u201cjustice,\u201d", "after": "\"justice\",", "start_char_pos": 3963, "end_char_pos": 3973}, {"type": "R", "before": "\u201cWork\u201d and \u201cService.\u201d", "after": "\"Work\" and \"Service.\"", "start_char_pos": 4717, "end_char_pos": 4738}, {"type": "R", "before": "\u201cFamily,\u201d \u201cFriends,\u201d \u201cSociety,\u201d \u201cInterpersonal Relations,\u201d and \u201cReligion.\u201d", "after": "\"Family\", \"Friends\", \"Society\", \"Interpersonal Relations\", and \"Religion.\"", "start_char_pos": 4793, "end_char_pos": 4867}, {"type": "D", "before": "(1)", "after": null, "start_char_pos": 5311, "end_char_pos": 5314}, {"type": "D", "before": "(2)", "after": null, "start_char_pos": 5376, "end_char_pos": 5379}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 5506, "end_char_pos": 5507}, {"type": "R", "before": ",\u201d", "after": "\",", "start_char_pos": 5568, "end_char_pos": 5570}, {"type": "R", "before": "\u201cinnovation\u201d with \u201cchange,\u201d", "after": "\"innovation\" with \"change\",", "start_char_pos": 5720, "end_char_pos": 5747}], "sents_char_pos": [0, 221, 669, 781, 890, 1003, 1059, 1164, 1311, 1502, 1669, 1744, 1818, 1976, 2016, 2198, 2399, 2507, 2826, 2933, 3013, 3109, 3257, 3425, 3588, 3905, 4055, 4287, 4393, 4636, 4738, 4867, 4939, 5045, 5269, 5375, 5686]}
+{"doc_id": "24536328", "revision_depth": "1", "before_revision": "\u00c9loi Machoro \u00c9loi Machoro (b. 1945 in Thio, New Caledonia \u2013 d. 12 January 1985 in Canala ) was a New Caledonian Kanak separatist politician. Career After founding the seminary of Pa\u00efta in 1974, Machoro became a teacher . He aligned himself with the Caledonian Union political party. In 1977, under the leadership of Jean-Marie Tjibaou, he chose to recognize the Congress of Bourail as independent from Caledonia. That year he was chosen as a Representative of his party in the Territorial Assembly of New Caledonia. Machoro climbed the political ladder thereafter . Following the assassination of Pierre Declercq on 19 September 1981, Machoro became the Caledonian Union's General Secretary. As a member of the Socialist Kanak Independence movement, he was among the party's most radical partisans. He sought permanent change for New Caledonia, even if it required military force. He and other separatist militants went to Libya. The Kanak and Socialist National Liberation Front (FLNKS , Front de lib\u00e9ration nationale kanak et socialiste ) was formed on 18 November 1984 and replaced the Independents . On 1 December 1984, Jean-Marie Tjibaou formed a provisional government of Kanak Socialist Republic and \u00c9loi Machoro became Minister of Security and so became the leader of the independents' armed forces. %DIFDELCMD < %DIFDELCMD < %%% At first, Machoro disarmed the gendarmes of Thio, and gained control over the village without violence. On 11 January 1985 he killed Yves Tual, the son of a European stockbreeder. These events triggered a series of nighttime rebellions. On 12 January, the gendarmes started an operation to free the house of a European that the FLNKS had occupied under the leadership of \u00c9loi Machoro, located in the neighborhood of Canala . The FLNKS occupants eventually fled and found some security for themselves in another house when the gendarmes , after strong warnings and pursuit, began to catch up with them. When the two parties eventually met, \u00c9loi Machoro and other Kanaks were killed during the ensuing action. The gendarmes left Machoro in pain for hours to die without giving him help. Category: New Caledonia politicians Category:1945 births Category: 1985 deaths Category: Kanak people Category: Caledonian Union politicians Category: People from South Province, New Caledo", "after_revision": "\u00c9loi Machoro (January 1949 \u2013 12 January 1985 ) was a New Caledonian Kanak separatist politician. Career Machoro was born in Nakety in January 1949. He held several jobs, including clerk, farm worker, miner and a teacher in a primary school. After being elected assistant general secretary of the Caledonian Union in 1977, he contested the East constituency in the elections that year and was elected to the Territorial Assembly , and was re-elected in 1979 when the party ran as part of the Independence Front . Following the assassination of Pierre Declercq on 19 September 1981, Machoro became the party's general secretary. He and other separatist militants went to Libya. The Kanak and Socialist National Liberation Front (FLNKS ) was formed in September 1984 as a replacement for the Independence Front, boycotting the elections in November . On 1 December Jean-Marie Tjibaou declared the formation of a provisional government of Kanak Socialist Republic , with Machoro as Minister of Security . As a result, he became the leader of the independents' armed forces. %DIFDELCMD < %DIFDELCMD < %%% He disarmed the gendarmes of Thio, and gained control over the village without violence. On 11 January 1985 he killed Yves Tual, the son of a European stockbreeder. These events triggered a series of nighttime rebellions. On 12 January, the gendarmes started an operation to free the house of a European in Canala that the FLNKS had occupied under the leadership of Machoro . The FLNKS occupants eventually fled to a farmhouse, where the gendarmes caught them. Machoro and Marcel Nonaro were killed during the ensuing action. Machoro: last word from a leftist Pacific Islands Monthly, pp27\u201328 The gendarmes left Machoro in pain for hours to die without giving him help. Category: 1949 births Category: Kanak people Category: New Caledonian educators Category:Caledonian Union politicians Category: Members of the Congress of New Caledonia Category: People from South Province, New Caledonia Category:1985 death", "edit_actions": [{"type": "R", "before": "\u00c9loi Machoro (b. 1945 in Thio, New Caledonia", "after": "(January 1949", "start_char_pos": 13, "end_char_pos": 57}, {"type": "D", "before": "d.", "after": null, "start_char_pos": 60, "end_char_pos": 62}, {"type": "D", "before": "in Canala", "after": null, "start_char_pos": 79, "end_char_pos": 88}, {"type": "R", "before": "After founding the seminary of Pa\u00efta in 1974, Machoro became a teacher . He aligned himself with", "after": "Machoro was born in Nakety in January 1949. He held several jobs, including clerk, farm worker, miner and a teacher in a primary school.", "start_char_pos": 148, "end_char_pos": 244}, {"type": "A", "before": null, "after": "After being elected assistant general secretary of", "start_char_pos": 245, "end_char_pos": 245}, {"type": "R", "before": "political party. In", "after": "in", "start_char_pos": 267, "end_char_pos": 286}, {"type": "R", "before": "under the leadership of Jean-Marie Tjibaou, he chose to recognize the Congress of Bourail as independent from Caledonia. That year he was chosen as a Representative of his party in", "after": "he contested the East constituency in the elections that year and was elected to", "start_char_pos": 293, "end_char_pos": 473}, {"type": "R", "before": "of New Caledonia. Machoro climbed the political ladder thereafter", "after": ", and was re-elected in 1979 when the party ran as part of the Independence Front", "start_char_pos": 499, "end_char_pos": 564}, {"type": "D", "before": "Caledonian Union's General Secretary. As a member of the Socialist Kanak Independence movement, he was among the", "after": null, "start_char_pos": 655, "end_char_pos": 767}, {"type": "R", "before": "most radical partisans. He sought permanent change for New Caledonia, even if it required military force. He", "after": "general secretary. He", "start_char_pos": 776, "end_char_pos": 884}, {"type": "D", "before": ", Front de lib\u00e9ration nationale kanak et socialiste", "after": null, "start_char_pos": 988, "end_char_pos": 1039}, {"type": "R", "before": "on 18 November", "after": "in September", "start_char_pos": 1053, "end_char_pos": 1067}, {"type": "R", "before": "and replaced the Independents", "after": "as a replacement for the Independence Front, boycotting the elections in November", "start_char_pos": 1073, "end_char_pos": 1102}, {"type": "D", "before": "1984,", "after": null, "start_char_pos": 1119, "end_char_pos": 1124}, {"type": "R", "before": "formed", "after": "declared the formation of", "start_char_pos": 1144, "end_char_pos": 1150}, {"type": "R", "before": "and \u00c9loi Machoro became", "after": ", with Machoro as", "start_char_pos": 1204, "end_char_pos": 1227}, {"type": "R", "before": "and so", "after": ". As a result, he", "start_char_pos": 1249, "end_char_pos": 1255}, {"type": "R", "before": "At first, Machoro", "after": "He", "start_char_pos": 1339, "end_char_pos": 1356}, {"type": "A", "before": null, "after": "in Canala", "start_char_pos": 1658, "end_char_pos": 1658}, {"type": "R", "before": "\u00c9loi Machoro, located in the neighborhood of Canala", "after": "Machoro", "start_char_pos": 1711, "end_char_pos": 1762}, {"type": "R", "before": "and found some security for themselves in another house when the gendarmes , after strong warnings and pursuit, began to catch up with them. When the two parties eventually met, \u00c9loi Machoro and other Kanaks", "after": "to a farmhouse, where the gendarmes caught them. Machoro and Marcel Nonaro", "start_char_pos": 1801, "end_char_pos": 2008}, {"type": "A", "before": null, "after": "Machoro: last word from a leftist Pacific Islands Monthly, pp27\u201328", "start_char_pos": 2048, "end_char_pos": 2048}, {"type": "R", "before": "New Caledonia politicians Category:1945", "after": "1949", "start_char_pos": 2136, "end_char_pos": 2175}, {"type": "D", "before": "1985 deaths Category:", "after": null, "start_char_pos": 2193, "end_char_pos": 2214}, {"type": "R", "before": "Caledonian", "after": "New Caledonian educators Category:Caledonian", "start_char_pos": 2238, "end_char_pos": 2248}, {"type": "A", "before": null, "after": "Members of the Congress of New Caledonia Category:", "start_char_pos": 2277, "end_char_pos": 2277}, {"type": "R", "before": "Caledo", "after": "Caledonia Category:1985 death", "start_char_pos": 2310, "end_char_pos": 2316}], "sents_char_pos": [0, 140, 220, 283, 413, 516, 692, 799, 881, 930, 1104, 1442, 1518, 1575, 1764, 1941, 2047, 2125]}
+{"doc_id": "2578538", "revision_depth": "1", "before_revision": "In other media Television The Phineas Mason incarnation of Tinkerer appears in The Spectacular Spider-Man animated series, voiced by Thom Adcox-Hernandez. This version is depicted as younger and with more hair than his comics counterpart. In the season one episode \"Persona\", Mason works alongside Quentin Beck under the Chameleon until he is arrested. He has assumed the Tinkerer identity in season two . In \"Blueprints\", he is the Master Planner's right-hand man , designed Mysterio's equipment , and oversaw the Sinister Six's work. In \"Shear Strength\", the Tinkerer helps upgrade the Vulture's suit. After Spider-Man discovers his involvement in Gwen Stacy's kidnapping, the web-slinger interrogates the Tinkerer until he confesses the Master Planner's location and leaves him for the authorities. In \"Probable Cause\", the Tinkerer is hired by Tombstone to create the Enforcers' powered suits . The Phineas Mason incarnation of Tinkerer appears in the 2010s Spider-Man animated series, voiced by Aaron Abrams. In \"How I Thwipped My Summer Vacation\", he uses a special wand to rig a baseball game before he is easily subdued by Spider-Man. In \"The Day Without Spider-Man\", the Tinkerer joins forces with the Scorpion to eliminate Spider-Man. After acquiring the Blood Gem, the Tinkerer uses the device to enhance the Scorpion's powers, but both villains are ultimately defeated by Ghost Spider, the Ultimate Spider-Man and Spider-Girl, and arrested. In \"Spider-Man Unmasked\" Pt. 1, the Tinkerer is defeated by Spider-Man while the latter was trying to deliver a flash drive containing evidence of Max Modell's innocence. The Phineas Mason incarnation of Tinkerer appears in the Marvel Super Hero Adventures animated series, voiced by Michael Daingerfield. Film Phineas Mason makes his live-action debut in the Marvel Cinematic Universe film Spider-Man: Homecoming (2017), portrayed by Michael Chernus. Depicted around Elijah Stern's age, this version is a weapons maker and part of a salvage company alongside Adrian Toomes, Herman Schultz and Jackson Brice. When the salvaging company goes out of business due to Damage Control, Mason helps Toomes steal leftover technology from the Avengers' battles and build advanced weapons out of the technology , such as Toomes' s flight suit and modified versions of Crossbones's vibro-blast emitting gauntlets. While his associates were defeated by Spider-Man and arrested by the authorities, Mason's fate is left unknown. Video games The Phineas Mason incarnation of Tinkerer appeared as the first boss in the Master System version of Spider-Man vs. The Kingpin. The Phineas Mason incarnation of Tinkerer appeared in the 1995 Spider-Man video game. He serves as a boss in the Sega Genesis version, but only makes a cameo appearance in the SNES version. The Phineas Mason incarnation of Tinkerer appears in Spider-Man: Web of Shadows, voiced by William Utay. He is broken out of Ryker's Island by Spider-Man to help stop the symbiote invasion and designs a large sonic device capable of destroying the symbiotes without harming their hosts. In the PS2 and PSP versions, the Tinkerer is a boss who plans to spread the symbiotes to other cities across the world using a missile. To this end, he captured and brainwashed Venom for his experiments. Spider-Man fights the Tinkerer and defeats him, but the latter escapes. Despite this, Spider-Man prevents the missile from being launched and has the option of firing it at the Tinkerer as revenge. The Phineas Mason incarnation of Tinkerer appears in Marvel: Ultimate Alliance 2, voiced by Philip Proctor. He supplies Lucia von Bardas and other supervillains with technology when the heroes discover his work, though Mason sends robotic soldiers to attack them and buy him time to escape. He is later recruited by Nick Fury after claiming to know who is controlling the Fold, a nanite hive mind that has brainwashed supervillains that Iron Man injected control nanites into. However, the heroes later discover Mason is the mastermind and confront him. Though he attempts to distract them again while he jams the nanite stasis signal, the heroes follow and knock him out. In the game's Wii, PS2, and PSP versions, the Tinkerer plays a similar role, except he is defeated when the heroes destroy his androids. The Phineas Mason incarnation of Tinkerer appears as a boss in the Nintendo DS version of Spider-Man: Shattered Dimensions, voiced by Jim Cummings in an homage to Sterling Holloway. He utilizes a fragment of the Tablet of Order and Chaos to power a machine capable of creating an army of robots. However, Spider-Man tracks him down and destroys it. Before Spider-Man takes the fragment from him, the Tinkerer gloats that he had already sold an army of robots to Electro. The Phineas Mason incarnation of Tinkerer appears as a playable character in Lego Marvel Super Heroes 2, voiced by Kevin Coello. He is also a mini-boss in the game's open world map. An adapted depiction of Tinkerer named Phin Mason appears in Spider-Man: Miles Morales, voiced by Jasmin Savoy Brown. This female, African-American equivalent is Miles Morales's childhood friend who sought revenge against Roxxon after her brother Rick Mason died trying to expose the company's corruption. As the Tinkerer, she becomes the leader of the criminal group, the Underground, whom she supplies with her advanced technology, and comes into conflict with the second Spider-Man, who she eventually learns is Miles. In the end, Phin sees the error of her ways and sacrifices her life to save Miles when her vendetta goes too far and almost destroys Harlem.", "after_revision": "In other media Television The Phineas Mason incarnation of Tinkerer appears in The Spectacular Spider-Man animated series, voiced by Thom Adcox-Hernandez. This version is depicted as younger and with more hair than his comics counterpart. In the season one episode \"Persona\", Mason works alongside Quentin Beck under the Chameleon until he is arrested. As of the season two episode \"Blueprints\", Mason has taken on the Tinkerer alias and became the Master Planner's right-hand man . He also designs Mysterio's equipment and oversees the Sinister Six's work. In \"Shear Strength\", the Tinkerer helps upgrade the Vulture's suit. After Spider-Man discovers his involvement in Gwen Stacy's kidnapping, the web-slinger interrogates Mason until he confesses the Master Planner's location and leaves Mason for the authorities. In \"Probable Cause\", Mason is hired by Tombstone to create powered suits for the Enforcers . The Phineas Mason incarnation of Tinkerer appears in the 2010s Spider-Man animated series, voiced by Aaron Abrams. In the episode \"How I Thwipped My Summer Vacation\", he uses a special wand to rig a baseball game before he is easily subdued by Spider-Man. In \"The Day Without Spider-Man\", the Tinkerer joins forces with the Scorpion to eliminate Spider-Man. After acquiring the Blood Gem, the Tinkerer uses it to enhance the Scorpion's powers, but both villains are ultimately defeated by Ghost Spider, the Ultimate Spider-Man , and Spider-Girl, and arrested. The Phineas Mason incarnation of Tinkerer appears in the Marvel Super Hero Adventures animated series, voiced by Michael Daingerfield. Film Phineas Mason appears in the live-action Marvel Cinematic Universe film Spider-Man: Homecoming (2017), portrayed by Michael Chernus. Depicted around Elijah Stern's age, this version is a weapons maker and was part of a salvage company alongside Adrian Toomes, Herman Schultz and Jackson Brice. When the salvaging company went out of business due to Damage Control, Mason helps Toomes steal leftover technology from the Avengers' battles and build advanced weapons out of it , such as Toomes' flight suit and modified versions of Crossbones's vibro-blast emitting gauntlets. While his associates are defeated by Spider-Man and arrested by the authorities, Mason's fate is left unknown. Video games The Phineas Mason incarnation of Tinkerer appeared as the first boss in the Master System version of Spider-Man vs. The Kingpin. The Phineas Mason incarnation of Tinkerer appeared in the 1995 Spider-Man video game. He serves as a boss in the Sega Genesis version, but only makes a cameo appearance in the SNES version. The Phineas Mason incarnation of Tinkerer appears in Spider-Man: Web of Shadows, voiced by William Utay. He is broken out of Ryker's Island by Spider-Man to help stop the symbiote invasion and designs a large sonic device capable of destroying the symbiotes without harming their hosts. In the PS2 and PSP versions, the Tinkerer is a boss who plans to spread the symbiotes to other cities across the world via a missile. To this end, he captures and brainwashes Venom for his experiments. Spider-Man fights the Tinkerer and defeats him, but the latter escapes. Despite this, Spider-Man prevents the missile from being launched and has the option of firing it at the Tinkerer as revenge. The Phineas Mason incarnation of Tinkerer appears in Marvel: Ultimate Alliance 2, voiced by Philip Proctor. He supplies Lucia von Bardas and other supervillains with technology until the heroes discover his work, though Mason sends robotic soldiers to attack them and buy him time to escape. He is later recruited by Nick Fury after claiming to know who is controlling the Fold, a nanite hive mind that has brainwashed supervillains that Iron Man injected control nanites into. However, the heroes later discover Mason is the mastermind and confront him. Though he attempts to distract them again while he jams the nanite stasis signal, the heroes pursue and knock him out. In the Wii, PS2, and PSP versions, the Tinkerer plays a similar role, except he is defeated when the heroes destroy his androids. The Phineas Mason incarnation of Tinkerer appears as a boss in the Nintendo DS version of Spider-Man: Shattered Dimensions, voiced by Jim Cummings in an homage to Sterling Holloway. He utilizes a fragment of the Tablet of Order and Chaos to power a machine capable of creating an army of robots. However, Spider-Man tracks him down and destroys it. Before Spider-Man takes the fragment from him, the Tinkerer gloats that he had already sold an army of robots to Electro. The Phineas Mason incarnation of Tinkerer appears as a playable character in Lego Marvel Super Heroes 2, voiced by Kevin Coello. He also serves as a mini-boss in the game's open world map. A female variation of Phineas Mason / Tinkerer named Phin Mason appears in Spider-Man: Miles Morales, voiced by Jasmin Savoy Brown. This version is an African-American teenager and Miles Morales's childhood friend who seeks revenge against Roxxon after her brother Rick Mason died trying to expose the company's corruption. As the Tinkerer, she becomes the leader of the criminal group, the Underground, whom she supplies with her advanced technology, and comes into conflict with the second Spider-Man, who she eventually learns is Miles. In the end, Phin sees the error of her ways and sacrifices herself to save Miles when her vendetta almost destroys Harlem.", "edit_actions": [{"type": "R", "before": "He has assumed the Tinkerer identity in season two . In", "after": "As of the season two episode", "start_char_pos": 353, "end_char_pos": 408}, {"type": "R", "before": "he is the", "after": "Mason has taken on the Tinkerer alias and became the", "start_char_pos": 423, "end_char_pos": 432}, {"type": "R", "before": ", designed", "after": ". He also designs", "start_char_pos": 465, "end_char_pos": 475}, {"type": "R", "before": ", and oversaw", "after": "and oversees", "start_char_pos": 497, "end_char_pos": 510}, {"type": "R", "before": "the Tinkerer", "after": "Mason", "start_char_pos": 704, "end_char_pos": 716}, {"type": "R", "before": "him", "after": "Mason", "start_char_pos": 777, "end_char_pos": 780}, {"type": "R", "before": "the Tinkerer", "after": "Mason", "start_char_pos": 823, "end_char_pos": 835}, {"type": "R", "before": "the Enforcers' powered suits", "after": "powered suits for the Enforcers", "start_char_pos": 868, "end_char_pos": 896}, {"type": "A", "before": null, "after": "the episode", "start_char_pos": 1017, "end_char_pos": 1017}, {"type": "R", "before": "the device", "after": "it", "start_char_pos": 1295, "end_char_pos": 1305}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1423, "end_char_pos": 1423}, {"type": "D", "before": "In \"Spider-Man Unmasked\" Pt. 1, the Tinkerer is defeated by Spider-Man while the latter was trying to deliver a flash drive containing evidence of Max Modell's innocence.", "after": null, "start_char_pos": 1455, "end_char_pos": 1625}, {"type": "R", "before": "makes his", "after": "appears in the", "start_char_pos": 1780, "end_char_pos": 1789}, {"type": "D", "before": "debut in the", "after": null, "start_char_pos": 1802, "end_char_pos": 1814}, {"type": "A", "before": null, "after": "was", "start_char_pos": 1979, "end_char_pos": 1979}, {"type": "R", "before": "goes", "after": "went", "start_char_pos": 2092, "end_char_pos": 2096}, {"type": "R", "before": "the technology", "after": "it", "start_char_pos": 2242, "end_char_pos": 2256}, {"type": "D", "before": "s", "after": null, "start_char_pos": 2275, "end_char_pos": 2276}, {"type": "R", "before": "were", "after": "are", "start_char_pos": 2380, "end_char_pos": 2384}, {"type": "R", "before": "using", "after": "via", "start_char_pos": 3208, "end_char_pos": 3213}, {"type": "R", "before": "captured and brainwashed", "after": "captures and brainwashes", "start_char_pos": 3241, "end_char_pos": 3265}, {"type": "R", "before": "when", "after": "until", "start_char_pos": 3668, "end_char_pos": 3672}, {"type": "R", "before": "follow", "after": "pursue", "start_char_pos": 4138, "end_char_pos": 4144}, {"type": "D", "before": "game's", "after": null, "start_char_pos": 4171, "end_char_pos": 4177}, {"type": "R", "before": "is also", "after": "also serves as", "start_char_pos": 4904, "end_char_pos": 4911}, {"type": "R", "before": "An adapted depiction of", "after": "A female variation of Phineas Mason /", "start_char_pos": 4954, "end_char_pos": 4977}, {"type": "R", "before": "female,", "after": "version is an", "start_char_pos": 5077, "end_char_pos": 5084}, {"type": "R", "before": "equivalent is", "after": "teenager and", "start_char_pos": 5102, "end_char_pos": 5115}, {"type": "R", "before": "sought", "after": "seeks", "start_char_pos": 5153, "end_char_pos": 5159}, {"type": "R", "before": "her life", "after": "herself", "start_char_pos": 5535, "end_char_pos": 5543}, {"type": "D", "before": "goes too far and", "after": null, "start_char_pos": 5576, "end_char_pos": 5592}], "sents_char_pos": [0, 154, 238, 352, 405, 535, 603, 801, 898, 1013, 1143, 1245, 1454, 1625, 1760, 1906, 2064, 2358, 2470, 2598, 2611, 2697, 2801, 2906, 3088, 3224, 3292, 3364, 3490, 3598, 3781, 3967, 4044, 4163, 4300, 4482, 4596, 4649, 4771, 4900, 4953, 5071, 5259, 5475]}
+{"doc_id": "267918", "revision_depth": "2", "before_revision": "450x450px|Names, routes and locations of the Periplus of the Erythraean Sea The Periplus of the Erythraean Sea (, , modern Greek ), also known by its Latin name as the , is a Greco-Roman periplus written in Koine Greek that describes navigation and trading opportunities from Roman Egyptian ports like Berenice Troglodytica along the coast of the Red Sea, and others along Horn of Africa, the Persian Gulf, Arabian Sea and the Indian Ocean, including the modern-day Sindh region of Pakistan and southwestern regions of India. The text has been ascribed to different dates between the first and third centuries, but a mid-first century date is now the most commonly accepted. While the author is unknown, it is clearly a firsthand description by someone familiar with the area and is nearly unique in providing accurate insights into what the ancient Hellenic world knew about the lands around the Indian Ocean. A periplus (, per\u00edplous, .\"a sailing-around\") is a kind of logbook recording sailing itineraries and commercial, political, and ethnological details about the ports visited. In an era before maps were in general use, they functioned as a kind of combination atlas and traveller's handbook. The Erythraean Sea (, Erythr\u00e0 Th\u00e1lassa, .\"the Red Sea\") was an ancient geographical designation that always included the Gulf of Aden between Arabia Felix and the Horn of Africa and was often extendedas in this periplusto include the present-day Red Sea, Persian Gulf, and Indian Ocean as a single maritime area. John Hill maintains that \"the Periplus can now be confidently dated to between 40 and 70 AD and, probably, between AD 40 and 50.\" Schoff continues by noting that the author could not have been \"a highly educated man\" as \"is evident from his frequent confusion of Greek and Latin words and his clumsy and sometimes ungrammatical constructions . \" Because of \"the absence of any account of the journey up the Nile and across the desert from Coptos\", Schoff prefers to pinpoint the author's residence to \"Berenice rather than Alexandria\". Synopsis 200px|1597 map depicting the locations of the Periplus of the Erythraean Sea. The work consists of 66 sections, most of them about the length of a long paragraph in English . For instance, the short section 9 reads in its entirety: In many cases, the description of places is sufficiently accurate to identify their present locations; for others, there is considerable debate. For instance, a \"Rhapta\" is mentioned as the farthest market down the African coast of \"Azania\", but there are at least five locations matching the description, ranging from Tanga to south of the Rufiji River delta. The description of the Indian coast mentions the Ganges River clearly, yet after that is somewhat garbled , describing China as a \"great inland city Thina\" that is a source of raw silk. Many trade goods are mentioned in the Periplus, but some of the words naming trade goods are seen nowhere else in ancient literature, and so we can only guess as to what they might be. For example, one trade good mentioned is \"lakkos chromatinos\". The name lakkos appears nowhere else in ancient Greek or Roman literature. The name re-surfaces in late medieval Latin as lacca, borrowed from medieval Arabic lakk in turn borrowed from Sanskritic lakh, meaning lac i.e. a red-colored resin native to India used as a lacquer and used also as a red colorant .Sino-Iranica by Berthold Laufer, year 1919, page 476, footnote 9. Also A Glossary of Colloquial Anglo-Indian Words and Phrases, by Yule and Burnell, year 1903, page 499. Some other named trade goods remain obscure. Coin of the Himyarite Kingdom, southern coast of the Arabian Peninsula, in which ships stopped when passing between Egypt and India. This is an imitation of a coin of Augustus, 1st century Ships from Himyar regularly traveled the East African coast. The Periplus of the Erythraean Sea describes the trading empire of Himyar and Saba, regrouped under a single ruler, \"Charibael\" (probably Karab'il Watar Yuhan'em II), who is said to have been on friendly terms with Rome: Ras Hafun in northern Somalia is believed to be the location of the ancient trade center of Opone. Ancient Egyptian, Roman and Persian Gulf pottery has been recovered from the site by an archaeological team from the University of Michigan. Opone is in the thirteenth entry of the Periplus of the Erythraean Sea, which in part states: In recent years, Felix Chami has found archaeological evidence for extensive Roman trade on Mafia Island and, not far away, on the mainland, near the mouth of the Rufiji River, which he dated to the first few centuries. Furthermore, Miller points out that Roman coins have been found on Pemba island, just north of Rhapta. Under the Western Satraps, Barigaza was one of the main centers of Roman trade in the subcontinent. The Periplus describes the many goods exchanged: The lost port city of Muziris (near present day Kodungallur) in the Chera kingdom, as well as the Early Pandyan Kingdom are mentioned in the Periplus as major centers of trade, pepper and other spices, metal work and semiprecious stones, between Damirica and the Roman Empire.", "after_revision": "450x450px|Names, routes and locations of the Periplus of the Erythraean Sea The Periplus of the Erythraean Sea (, , modern Greek ), also known by its Latin name as the , is a Greco-Roman periplus written in Koine Greek that describes navigation and trading opportunities from Roman Egyptian ports like Berenice Troglodytica along the coast of the Red Sea, and others along Horn of Africa, the Persian Gulf, Arabian Sea and the Indian Ocean, including the modern-day Sindh region of Pakistan and southwestern regions of India. The text has been ascribed to different dates between the first and third centuries, but a mid-first century date is now the most commonly accepted. While the author is unknown, it is clearly a first hand description by someone familiar with the area and is nearly unique in providing accurate insights into what the ancient Hellenic world knew about the lands around the Indian Ocean. A periplus (, per\u00edplous, .\"a sailing-around\") is a logbook recording sailing itineraries and commercial, political, and ethnological details about the ports visited. In an era before maps were in general use, it functioned as a combination atlas and traveller's handbook. The Erythraean Sea (, Erythr\u00e0 Th\u00e1lassa, .\"the Red Sea\") was an ancient geographical designation that always included the Gulf of Aden between Arabia Felix and the Horn of Africa and was often extended (as in this periplus) to include the present-day Red Sea, Persian Gulf, and Indian Ocean as a single maritime area. John Hill maintains that \"the Periplus can now be confidently dated to between AD 40 and 70 and, probably, between AD 40 and 50.\" Schoff continues by noting that the author could not have been \"a highly educated man\" as \"is evident from his frequent confusion of Greek and Latin words and his clumsy and sometimes ungrammatical constructions \" . Because of \"the absence of any account of the journey up the Nile and across the desert from Coptos\", Schoff prefers to pinpoint the author's residence to \"Berenice rather than Alexandria\". Synopsis 200px|1597 map depicting the locations of the Periplus of the Erythraean Sea. The work consists of 66 sections, most of them about the length of a long paragraph . For instance, the short section 9 reads in its entirety: In many cases, the description of places is sufficiently accurate to identify their present locations; for others, there is considerable debate. For instance, \"Rhapta\" is mentioned as the farthest market down the African coast of \"Azania\", but there are at least five locations matching the description, ranging from Tanga to south of the Rufiji River delta. The description of the Indian coast mentions the Ganges River clearly, yet after that it is ambiguous , describing China as a \"great inland city Thina\" that is a source of raw silk. Many trade goods are mentioned in the Periplus, but some of the words naming trade goods are found nowhere else in ancient literature, leading to guesswork as to what they might be. For example, one trade good mentioned is \"lakkos chromatinos\". The name lakkos appears nowhere else in ancient Greek or Roman literature. The name re-surfaces in late medieval Latin as lacca, borrowed from medieval Arabic lakk in turn borrowed from Sanskritic lakh, meaning lac i.e. a red-coloured resin native to India used as a lacquer and used also as a red colourant .Sino-Iranica by Berthold Laufer, year 1919, page 476, footnote 9. Also A Glossary of Colloquial Anglo-Indian Words and Phrases, by Yule and Burnell, year 1903, page 499. Some other named trade goods remain obscure. Coin of the Himyarite Kingdom, southern coast of the Arabian Peninsula, in which ships stopped when passing between Egypt and India. This is an imitation of a coin of Augustus, 1st century Ships from Himyar regularly travelled the East African coast. The Periplus of the Erythraean Sea describes the trading empire of Himyar and Saba, regrouped under a single ruler, \"Charibael\" (probably Karab'il Watar Yuhan'em II), who is said to have been on friendly terms with Rome: Ras Hafun in northern Somalia is believed to be the location of the ancient trade centre of Opone. Ancient Egyptian, Roman and Persian Gulf pottery has been recovered from the site by an archaeological team from the University of Michigan. Opone is in the thirteenth entry of the Periplus of the Erythraean Sea, which in part states: In recent years, Felix Chami has found archaeological evidence for extensive Roman trade on Mafia Island and, not far away, on the mainland, near the mouth of the Rufiji River, which he dated to the first few centuries. Furthermore, J. Innes Miller points out that Roman coins have been found on Pemba island, just north of Rhapta. Under the Western Satraps, Barigaza was one of the main centres of Roman trade in the subcontinent. The Periplus describes the many goods exchanged: The lost port city of Muziris (near present day Kodungallur) in the Chera kingdom, as well as the Early Pandyan Kingdom are mentioned in the Periplus as major centres of trade, pepper and other spices, metal work and semiprecious stones, between Damirica and the Roman Empire.", "edit_actions": [{"type": "R", "before": "firsthand", "after": "first hand", "start_char_pos": 720, "end_char_pos": 729}, {"type": "D", "before": "kind of", "after": null, "start_char_pos": 962, "end_char_pos": 969}, {"type": "R", "before": "they", "after": "it", "start_char_pos": 1128, "end_char_pos": 1132}, {"type": "D", "before": "kind of", "after": null, "start_char_pos": 1149, "end_char_pos": 1156}, {"type": "R", "before": "extendedas in this periplusto", "after": "extended (as in this periplus) to", "start_char_pos": 1393, "end_char_pos": 1422}, {"type": "A", "before": null, "after": "AD", "start_char_pos": 1593, "end_char_pos": 1593}, {"type": "D", "before": "AD", "after": null, "start_char_pos": 1604, "end_char_pos": 1606}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1857, "end_char_pos": 1858}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1861, "end_char_pos": 1861}, {"type": "D", "before": "in English", "after": null, "start_char_pos": 2223, "end_char_pos": 2233}, {"type": "D", "before": "a", "after": null, "start_char_pos": 2452, "end_char_pos": 2453}, {"type": "R", "before": "is somewhat garbled", "after": "it is ambiguous", "start_char_pos": 2740, "end_char_pos": 2759}, {"type": "R", "before": "seen", "after": "found", "start_char_pos": 2933, "end_char_pos": 2937}, {"type": "R", "before": "and so we can only guess", "after": "leading to guesswork", "start_char_pos": 2974, "end_char_pos": 2998}, {"type": "R", "before": "red-colored", "after": "red-coloured", "start_char_pos": 3310, "end_char_pos": 3321}, {"type": "R", "before": "colorant", "after": "colourant", "start_char_pos": 3385, "end_char_pos": 3393}, {"type": "R", "before": "traveled", "after": "travelled", "start_char_pos": 3827, "end_char_pos": 3835}, {"type": "R", "before": "center", "after": "centre", "start_char_pos": 4163, "end_char_pos": 4169}, {"type": "A", "before": null, "after": "J. Innes", "start_char_pos": 4648, "end_char_pos": 4648}, {"type": "R", "before": "centers", "after": "centres", "start_char_pos": 4795, "end_char_pos": 4802}, {"type": "R", "before": "centers", "after": "centres", "start_char_pos": 5047, "end_char_pos": 5054}], "sents_char_pos": [0, 16, 113, 525, 674, 910, 1084, 1200, 1513, 1644, 2051, 2138, 2235, 2395, 2437, 2653, 2839, 3024, 3087, 3162, 3460, 3564, 3609, 3742, 3859, 4179, 4320, 4634, 4738, 4838]}
+{"doc_id": "27329692", "revision_depth": "1", "before_revision": "Nationalism Pan-Africanism In the 1930s, Small created a political network during his visit to the Afrique occidentale fran\u00e7aise (AOF) in the early 1930s .Keller, Kathleen, Colonial Suspects: Suspicion, Imperial Rule, and Colonial Society in Interwar French West Africa, U of Nebraska Press (2018), pp. 17, 104, 173, In June 1931, Small took his mission to Dakar accompanied by his secretary Boubakar Secka. Senegal at the time, had a growing interest in communism and pan-Africanism. On his visit, Small got to meet many Senegalese /African personalities harbouring communist, anti-colonial and pan-African ideologiest . The room he rented on rue F\u00e9lix Faure became a meeting ground where Small would discuss his them his political ideologies. Some of Small's AOF acquitances included Ernest Cherry - an individual infovlved in the LDNR (the League for the Defence of the Negro RaceWeiss,Holger, Framing a Radical African Atlantic: African American Agency, West African Intellectuals and the International Trade Union Committee of Negro Workers, p. 179, BRILL ( 2013), ) with ties to the French League agaist Colonial Oppression; Fofana Coulibaly - a former teacher from French Guinea with extremist idealogy and anti-French sentiments; Raphael Mensah - was \"on a list of individuals suspected of being sympathizers of the revolutionary movement.\" Small also had links with English speaking Blacks including William Winston - one of those involved in the Garveyist incidents of 1922. Small later represented Bathurst Municipal Council in the Legislative Council of the Gambia and was first appointed on 31 December 1941. In 1947, the country's first elections for a seat on the Legislative Council were held . Backed by his trade union, Small was victorious, beating I. M. Garba Jahumpa and Sheikh Omar Faye. He was appointed to the Executive Council on 11 December 1947. He was reappointed to the council on 18 January 1951 and 12 June 1951. He continued to be involved in Gambian politics until his death in January 1958. Small's trade unionism inspired Alieu Ebrima Cham Joof, who went on to organise and lead the historic Bread and Butter Demonstration of 1959 that paved the way for Gambia's independence.Exclusive interview with Foroyaa Panorama (\"TRIBUTE TO ALHAJI A.E. CHAM JOOF\") Foroyaa, 16 May 2011Joof, Cham (1959) The root cause of the bread and butter demonstrationJoof, Cham Party Politics in the Gambia, 1945-1970, p53\u201356", "after_revision": "Nationalism and pan-Africanism In the 1930s, Small created a political network during his visit to the French West Africa (AOF) .Keller, Kathleen, Colonial Suspects: Suspicion, Imperial Rule, and Colonial Society in Interwar French West Africa, U of Nebraska Press (2018), pp. 17, 104, 173, In June 1931, Small took his mission to Dakar accompanied by his secretary Boubakar Secka. Senegal at the time, had a growing interest in communism and pan-Africanism. On his visit, Small met several Senegalese activists with communist, anti-colonial and pan-African ideologies . The room he rented on Rue F\u00e9lix Faure became a meeting place where Small would discuss his political ideologies. Some of Small's AOF acquaintances included Ernest Cherry , an individual involved in the League for the Defence of the Negro Race (LDNR),Weiss, Holger (2013) Framing a Radical African Atlantic: African American Agency, West African Intellectuals and the International Trade Union Committee of Negro Workers, p. 179, BRILL with ties to the French League against Colonial Oppression; Fofana Coulibaly , a former teacher from French Guinea with extremist ideology and anti-French sentiments; and Raphael Mensah, a man \"on a list of individuals suspected of being sympathizers of the revolutionary movement.\" Small also had links with English-speaking Blacks including William Winston , one of those involved in the Garveyist incidents of 1922. Small first appointed to the Legislative Council on 31 December 1941 representing Bathurst Municipal Council. In 1947, the first elections were held for a seat on the Legislative Council . Backed by his trade union, Small was victorious, defeating I. M. Garba Jahumpa and Sheikh Omar Faye. He was subsequently appointed to the Executive Council on 11 December 1947, and was later reappointed to the council on 18 January and 12 June 1951. He continued to be involved in Gambian politics until his death in January 1958. Small's trade unionism inspired Alieu Ebrima Cham Joof, who went on to organise and lead the Bread and Butter Demonstration of 1959 that paved the way for Gambian independence.Exclusive interview with Foroyaa Panorama (\"TRIBUTE TO ALHAJI A.E. CHAM JOOF\") Foroyaa, 16 May 2011Joof, Cham (1959) The root cause of the bread and butter demonstrationJoof, Cham Party Politics in the Gambia, 1945-1970, p53\u201356", "edit_actions": [{"type": "R", "before": "Pan-Africanism", "after": "and pan-Africanism", "start_char_pos": 12, "end_char_pos": 26}, {"type": "R", "before": "Afrique occidentale fran\u00e7aise", "after": "French West Africa", "start_char_pos": 99, "end_char_pos": 128}, {"type": "D", "before": "in the early 1930s", "after": null, "start_char_pos": 135, "end_char_pos": 153}, {"type": "R", "before": "got to meet many Senegalese /African personalities harbouring", "after": "met several Senegalese activists with", "start_char_pos": 505, "end_char_pos": 566}, {"type": "R", "before": "ideologiest", "after": "ideologies", "start_char_pos": 608, "end_char_pos": 619}, {"type": "R", "before": "rue", "after": "Rue", "start_char_pos": 644, "end_char_pos": 647}, {"type": "R", "before": "ground", "after": "place", "start_char_pos": 677, "end_char_pos": 683}, {"type": "D", "before": "them his", "after": null, "start_char_pos": 714, "end_char_pos": 722}, {"type": "R", "before": "acquitances", "after": "acquaintances", "start_char_pos": 765, "end_char_pos": 776}, {"type": "R", "before": "- an individual infovlved in the LDNR (the", "after": ", an individual involved in the", "start_char_pos": 800, "end_char_pos": 842}, {"type": "R", "before": "RaceWeiss,Holger,", "after": "Race (LDNR),Weiss, Holger (2013)", "start_char_pos": 879, "end_char_pos": 896}, {"type": "D", "before": "( 2013), )", "after": null, "start_char_pos": 1061, "end_char_pos": 1071}, {"type": "R", "before": "agaist", "after": "against", "start_char_pos": 1103, "end_char_pos": 1109}, {"type": "R", "before": "-", "after": ",", "start_char_pos": 1148, "end_char_pos": 1149}, {"type": "R", "before": "idealogy", "after": "ideology", "start_char_pos": 1201, "end_char_pos": 1209}, {"type": "R", "before": "Raphael Mensah - was", "after": "and Raphael Mensah, a man", "start_char_pos": 1238, "end_char_pos": 1258}, {"type": "R", "before": "English speaking", "after": "English-speaking", "start_char_pos": 1375, "end_char_pos": 1391}, {"type": "R", "before": "-", "after": ",", "start_char_pos": 1425, "end_char_pos": 1426}, {"type": "R", "before": "later represented Bathurst Municipal Council in", "after": "first appointed to", "start_char_pos": 1491, "end_char_pos": 1538}, {"type": "D", "before": "of the Gambia and was first appointed", "after": null, "start_char_pos": 1563, "end_char_pos": 1600}, {"type": "R", "before": "1941.", "after": "1941 representing Bathurst Municipal Council.", "start_char_pos": 1616, "end_char_pos": 1621}, {"type": "R", "before": "country's first elections", "after": "first elections were held", "start_char_pos": 1635, "end_char_pos": 1660}, {"type": "D", "before": "were held", "after": null, "start_char_pos": 1699, "end_char_pos": 1708}, {"type": "R", "before": "beating", "after": "defeating", "start_char_pos": 1760, "end_char_pos": 1767}, {"type": "A", "before": null, "after": "subsequently", "start_char_pos": 1817, "end_char_pos": 1817}, {"type": "R", "before": "1947. He was", "after": "1947, and was later", "start_char_pos": 1868, "end_char_pos": 1880}, {"type": "D", "before": "1951", "after": null, "start_char_pos": 1922, "end_char_pos": 1926}, {"type": "D", "before": "historic", "after": null, "start_char_pos": 2119, "end_char_pos": 2127}, {"type": "R", "before": "Gambia's", "after": "Gambian", "start_char_pos": 2190, "end_char_pos": 2198}], "sents_char_pos": [0, 407, 484, 621, 744, 1130, 1237, 1484, 1621, 1809, 1873, 1944, 2025, 2212]}
+{"doc_id": "27455497", "revision_depth": "1", "before_revision": "Besides the common meaning of \"a soul\", po was a variant Chinese character for po \"a lunar phase\" and po \"dregs\". The Book of Documents used po as a graphic variant for po \"dark aspect of the moon\" \u2013 this character usually means ba \"overlord; hegemon\". For example, \"On the third month, when (the growth phase, ) of the moon began to wane, the duke of Chow [i.e., Duke of Zhou] commenced the foundations, and proceeded to build the new great city of L\u01d2\" (tr. Legge 1865:434). The Zhuangzi \"[Writings of] Master Zhuang\" wrote zaopo (lit. \"rotten dregs\") \"worthless; unwanted; waste matter\" with a po variant. A wheelwright sees Duke Huan of Qi with books by dead sages and says, \"what you are reading there is nothing but the [] chaff and dregs of the men of old!\" (tr. Watson 1968:152). In the history of Chinese writing, characters for po \"lunar brightness\" appeared before those for hun \"soul; spirit\". The spiritual hun and po \"dual souls\" are first recorded in Warring States period (475\u2013221 BCE) seal script characters. The lunar po or \"moon's brightness\" appears in both Zhou dynasty (1045\u2013256 BCE) Bronzeware script and oracle bone script, but not in Shang dynasty (ca. 1600\u20131046 BCE) oracle inscriptions. The earliest form of this \"lunar brightness\" character was found on a (ca. 11th century BCE) Zhou oracle bone inscription (Y\u00fc 1987:370) . Etymologies The po soul's etymology is better understood than the hun soul's. Schuessler (2007:290, 417) reconstructs hun \"'spiritual soul' which makes a human personality\" and po \"vegetative or animal soul ... which accounts for growth and physiological functions\" as Middle Chinese \u03b3u\u0259n and p\u02b0ak from Old Chinese *w\u00fbn and *phr\u00e2k. What do the words hun and [po] mean? Hun expresses the idea of continuous propagation ([zhuan] ), unresting flight; it is the qi of the Lesser Yang, working in man in an external direction, and it governs the nature (or the instincts, [xing] ). [Po] expresses the idea of a continuous pressing urge ([po] ) on man; it is the [qi] of the Lesser Yin, and works in him, governing the emotions ([qing] ). Hun is connected with the idea of weeding ([yun] ), for with the instincts the evil weeds (in man's nature) are removed. [Po] is connected with the idea of brightening ([bai] ), for with the emotions the interior (of the personality) is governed. (tr. Needham and Lu 1974:87) Etymologically, Schuessler says p\u00f2 \"animal soul\" \"is the same word as\" p\u00f2 \"a lunar phase\". He cites the Zuozhuan (534 BCE, see below) using the lunar jishengpo to mean \"With the first development of a fetus grows the vegetative soul\". P\u00f2, the soul responsible for growth, is the same as p\u00f2 the waxing and waning of the moon\". The meaning 'soul' has probably been transferred from the moon since men must have been aware of lunar phases long before they had developed theories on the soul. This is supported by the etymology 'bright', and by the inverted word order which can only have originated with meteorological expressions ... The association with the moon explains perhaps why the p\u00f2 soul is classified as Yin ... in spite of the etymology 'bright' (which should be Yang), hun's Yang classification may be due to the association with clouds and by extension sky, even though the word invokes 'dark'. 'Soul' and 'moon' are related in other cultures, by cognation or convergence, as in Tibeto-Burman and Proto-Lolo\u2013Burmese *s/\u02bc-la \"moon; soul; spirit\", Written Tibetan cognates bla \"soul\" and zla \"moon\", and Proto-Miao\u2013Yao *bla \"spirit; soul; moon\". (2007:417) The semantics of po \"white soul\" probably originated with \"lunar whiteness\". Zhou bronze inscriptions commonly recorded lunar phases with the terms jishengpo \"after the brightness has grown\" and jisipo \"after the brightness has died\", which Schuessler explains as \"second quarter of the lunar month\" and \"last quarter of the lunar month\". Chinese scholars have variously interpreted these two terms as lunar quarters or fixed days, and (Shaughnessy 1992:136\u2013145) Wang Guowei's lunar-quarter analysis the most likely. Thus, jishengpo is from the 7th/8th to the 14th/15th days of the lunar month and jisipo is from the 23rd/24th to the end of the month. Y\u00fc (1987:370) translates them as \"after the birth of the crescent\" and \"after the death of the crescent\". Etymologically, lunar and spiritual po < p\u02b0ak < *phr\u00e2k are cognate with bai < b\u0250k < *br\u00e2k \"white\" (Matisoff 1980, Y\u00fc 1981, Carr 1985) . According to Hu Shih (1946:30) , po etymologically means \"white, whiteness, and bright light\"; \"The primitive Chinese seem to have regarded the changing phases of the moon as periodic birth and death of its [po], its 'white light' or soul.\" Y\u00fc (1981:83) says this ancient association between the po soul and the \"growing light of the new moon is of tremendous importance to our understanding of certain myths related to the seventh day of the months.\" Two celebrated examples in Chinese mythology are Xi Wangmu and Emperor Wu meeting on the seventh day of the first lunar month and The Princess and the Cowherd or Qixi Festival held on the seventh day of the seventh lunar month. The etymology of hun < \u03b3u\u0259n < *w\u00fbn is comparatively less certain. Hu (1946:31) said, \"The word hun is etymologically the same as the word yun, meaning \"clouds.\" The clouds float about and seem more free and more active than the cold, white-lighted portion of the growing and waning moon.\" Schuessler cites two possibilities. Since p\u00f2 is the 'bright' soul, h\u00fan is the 'dark' soul and therefore cognate to y\u00fan 'cloud' Carr 1985:62 , perhaps in the sense of 'shadowy' because some believe that the h\u00fan soul will live after death in a world of shadows Eberhard 1967:17 . (2007:290) + Chinese-English dictionary translations of hun and po Dictionary Hun Po Giles (1912) The soul, that part of the soul (as opp. to ) which goes to heaven and is able to leave the body, carrying with it an appearance of physical form; the subliminal self, expl. as . The mind; wits; faculties. The soul; that part of the soul (as opposed to ) which is indissolubly attached to the body, and goes down to earth with it at death; the supraliminal self, expl. as . Form; shape. The disc or substance of the moon from the time it begins to wane to new moon. Mathews (1931) The soul, the spiritual part of man that ascends to heaven, as contrasted with . The wits; the spiritual faculties. The animal or inferior soul; the animal or sentient life which inheres in the body \u2013 the body in this sense; the animals spirits; this soul goes to the earth with the body. Chao and Yang (1947) the soul (of a living person or of the dead) the physical side of the soul Karlgren (1957) spiritual soul (as opp. to ) the animal soul of man (as opp. to ) Lin (1972) Soul; the finer spirits of man as dist. , the baser spirits or animal forces (Taoism) the baser animal spirits of man, contrasted with finer elements three finer spirits and seven animal spirits), the two together conceived as animating the human body Liang (1992) a soul; a spirit. 1. (Taoism) vigor; animation; life. 2. form; shape; body. 3. the dark part of the moon. Wu (1993) \u2460 soul \u2461 mood; spirit \u2462 the lofty spirit of a nation \u2460 soul \u2461 vigour; spirit Ling et al . (2002) \u2460 same as ... soul; believed by the superstitious to be an immaterial spiritual entity distinguished from but coexistent with the physical body of a person and a dominant spiritual force, and which leaves upon the person's death. \u2461 spirit; mood. \u2462 lofty spirit. \u2460 soul; spiritual matter believed by religious people as dependent on human's body. \u2461 vigour; spirit. DeFrancis (2003) soul, spirit; mood \u2460 soul; \u2461 vigor; spirit Both Chinese hun and po are translatable as English \"soul\" or \"spirit\", and both are basic components in \"soul\" compounds. In the following examples, all Chinese-English translation equivalents are from DeFrancis (2003) . Joseph Needham and Lu Gwei-djen, eminent historians of science and technology in China (1974:88) , define hun and po in modern terms. \"Peering as far as one can into these ancient psycho-physiological ideas, one gains the impression that the distinction was something like that between what we would call motor and sensory activity on the one hand, and also voluntary as against vegetative processes on the other.\" Farzeen Baldrian-Hussein (2008:521) cautions about hun and po translations: \"Although the term \"souls\" is often used to refer to them, they are better seen as two types of vital entities, the source of life in every individual. The hun is Yang, luminous, and volatile, while the po is Yin, somber, and heavy.\" History Based on Zuozhuan usages of hun and po in four historical contexts, Y\u00fc (1987:370) extrapolates that po was the original name for a human soul, and the dualistic conception of hun and po \"began to gain currency in the middle of the sixth century\" BCE. Two earlier 6th century contexts used the po soul alone. Both describe Tian \"heaven; god\" duo \"seizing; taking away\" a person's po, which resulted in a loss of mental faculties. In 593 BCE (Duke Xuan 15th year , tr. Legge 1872:329 ), after Zhao Tong behaved inappropriately at the Zhou court, an observer predicted: \"In less than ten years [Zhao Tong] will be sure to meet with great calamity. Heaven has taken his [] wits away from him.\" In 543 BCE (Duke Xiang 29th year, tr. Legge 1872:551), Boyou from the state of Zheng acted irrationally, which an official interpreted as: \"Heaven is destroying [Boyou], and has taken away his [] reason.\" Boyou's political enemies subsequently arranged to take away his hereditary position and assassinate him. Two later sixth-century Zuozhuan contexts used po together with the hun soul. In 534 BCE, the ghost of Boyou (above) was seeking revenge on his murderers, and terrifying the people of Zheng (Duke Zhao, Year & , tr. Legge 1872:618 ). The philosopher and statesman Zi Chan, realizing that Boyou's loss of hereditary office had caused his spirit to be deprived of sacrifices, reinstated his son to the family position, and the ghost disappeared. When a friend asked Zi Chan to explain ghosts, he gave what Yu calls \"the locus classicus on the subject of the human soul in the Chinese tradition\" ( Yu 1972 :372). Hun and po souls, explains Yu (1987:371) , \"are regarded as the very essence of the mind, the source of knowledge and intelligence. Death is thought to follow inevitably when the hun and the p'o leave the body. We have reason to believe that around this time the idea of hun was still relatively new.\" Silk painting found in the tomb of Lady Dai at Mawangdui dated to 168 BCE, interpreted (Y\u00fc 1987:367) as depicting her hun soul ascending to heaven and her family performing the zhaohun \"summoning the soul\" ritual below. Soon after death, it was believed that a person's hun and po could be temporarily reunited through a ritual called the fu \"recall; return\", zhaohun \"summon the hun soul\", or zhaohun fupo \"to summon the hun-soul to reunite with the po-soul\". The earliest known account of this ritual is found in the (3rd century BCE) Chuci poems Zhao Hun \"Summons of the Soul\" and Dazhao \"The Great Summons\" (Cs\u00edkszentmih\u00e1lyi 2006:140\u2013141) . For example, the wu Yang () summons a man's soul in the \"Zhao Hun\". Hu (1946:31\u201332) proposed, \"The idea of a hun may have been a contribution from the southern peoples\" (who originated Zhao Hun rituals) and then spread to the north sometime during the sixth century BCE. Calling this southern hypothesis \"quite possible\", Yu (1987:373) cites the Chuci, associated with the southern state of Chu, demonstrating \"there can be little doubt that in the southern tradition the hun was regarded as a more active and vital soul than the p'o. The Chuci uses hun 65 times and po 5 times (4 in hunpo, which the Chuci uses interchangeably with hun , Brashier 1996:131 ). The identification of the yin-yang principle with the hun and po souls evidently occurred in the late fourth and early third centuries BCE (Y\u00fc 1987:374) , and by \"the second century at the latest, the Chinese dualistic conception of soul had reached its definitive formulation.\" The Liji (11 , tr. Legge 1885:444) compounds hun and po with qi \"breath; life force\" and xing \"form; shape; body\" in hunqi and xingpo . \"The [] intelligent spirit returns to heaven the [] body and the animal soul return to the earth; and hence arose the idea of seeking (for the deceased) in sacrifice in the unseen darkness and in the bright region above.\" Compare this modern translation (Y\u00fc 1987:374) , \"The breath-soul (hun-ch'I ) returns to heaven; the bodily soul (hsing-p'o ) returns to earth. Therefore, in sacrificial-offering one should seek the meaning in the yin-yang principle.\" Y\u00fc summarizes hun/po dualism. Loewe (1979:9) explains with a candle metaphor; the physical xing is the \"wick and substance of a candle\", the spiritual po and hun are the \"force that keeps the candle alight\" and \"light that emanates from the candle\". The Yin po and Yang hun were correlated with Chinese spiritual and medical beliefs. Hun is associated with shen \"spirit; god\" and po with gui \"ghost; demon; devil\" (Carr 1985:62) . The (ca. 1st century BCE) Lingshu Jing medical text spiritually applies Wu Xing \"Five Phase\" theory to the Zang-fu \"organs\", associating the hun soul with liver (Chinese medicine) and blood, and the po soul with lung (Chinese medicine) and breath. The Lingshu Jing (Brashier 1996:142) also records that the hun and po souls taking flight can cause restless dreaming, and eye disorders can scatter the souls causing mental confusion. Han medical texts reveal that hun and po departing from the body does not necessarily cause death but rather distress and sickness. Brashier (1996:145\u20136) parallels the translation of hun and po, \"If one were to put an English word to them, they are our 'wits', our ability to demarcate clearly, and like the English concept of \"wits,\" they can be scared out of us or can dissipate in old age.\" Jade burial suits were believed to delay the bodily po soul's decomposition. During the Han Dynasty, the belief in hun and po remained prominent, although there was a great diversity of different, sometimes contradictory, beliefs about the afterlife (Hansen 2000:119; Csikszentmihalyi 2006:116\u2013117, 140\u2013142) . Han burial customs provided nourishment and comfort for the po with the placement of grave goods, including food, commodities, and even money within the tomb of the deceased (Hansen 2000:119) . Chinese jade was believed to delay the decomposition of a body. Pieces of jade were commonly placed in bodily orifices, or rarely crafted into jade burial suits. Generations of sinologists have repeatedly asserted that Han-era people commonly believed the heavenly hun and earthly po souls separated at death, but recent scholarship and archeology suggest that hunpo dualism was more an academic theory than a popular faith. Anna Seidel analyzed funerary texts discovered in Han tombs, which mention not only po souls but also hun remaining with entombed corpses, and wrote (1982:107) , \"Indeed, a clear separation of a p'o, appeased with the wealth included in the tomb, from a hun departed to heavenly realms is not possible.\" Seidel later (1987:227) called for reappraising Han abstract notions of hun and po, which \"do not seem to have had as wide a currency as we assumed up to now.\" Pu Muzhou surveyed usages of the words hun and po on Han Dynasty bei \"stele\" erected at graves and shrines, and concluded (1993:216, tr. Brashier 1996126), \"The thinking of ordinary people seems to have been quite hazy on the matter of what distinguished the hun from the po.\" These stele texts contrasted souls between a corporeal hun or hunpo at the cemetery and a spiritual shen at the family shrine. Kenneth Brashier (1996:158) reexamined the evidence for hunpo dualism and relegated it \"to the realm of scholasticism rather than general beliefs on death.\" Brashier (1996:136\u2013137) cited several Han sources (grave deeds, Book of the Later Han, and Jiaoshi Yilin) attesting beliefs that \"the hun remains in the grave instead of flying up to heaven\", and suggested it \"was sealed into the grave to prevent its escape.\" Another Han text, the Fengsu Tongyi says, \"The vital energy of the hun of a dead person floats away; therefore a mask is made in order to retain it. Daoism Hun and po spiritual concepts were important in several Daoist traditions. For instance (Baldrian-Hussein 2008:522) , \"Since the volatile hun is fond of wandering and leaving the body during sleep, techniques were devised to restrain it, one of which entailed a method of staying constantly awake.\" The sanhunqipo \"three hun and seven po\" were anthropomorphized and visualized. Ge Hong's (ca. 320 CE) Baopuzi frequently mentions the hun and po \"ethereal and gross souls\". The \"Genii\" Chapter argues that the departing of these dual souls cause illness and death. All men, wise or foolish, know that their bodies contain ethereal as well as gross breaths, and that when some of them quit the body, illness ensues; when they all leave him, a man dies. In the former case, the magicians have amulets for restraining them; in the latter case, The Rites [i.e., Yili] provide ceremonials for summoning them back. These breaths are most intimately bound up with us, for they are born when we are, but over a whole lifetime probably nobody actually hears or sees them. Would one conclude that they do not exist because they are neither seen nor heard? (2 , tr. Ware 1966:49\u201350 ) In T'ai-i's elixir for Summoning Gross and Ethereal Breaths the five minerals [i.e., cinnabar, realgar, arsenolite, malachite, and magnetite] are used and sealed with Six-One lute as in the Nine-crucible cinnabars. It is particularly effective for raising those who have died of a stroke. In cases where the corpse has been dead less than four days, force open the corpse's mouth and insert a pill of this elixir and one of sulphur, washing them down its gullet with water. The corpse will immediately come to life. In every case the resurrected remark that they have seen a messenger with a baton of authority summoning them. (4 , tr. Ware 1966:87 ) For visualizing the ten souls, the Baopuzi \"Truth on Earth\" chapter recommends taking dayao \"great medicines\" and practicing a fenxing \"divide/multiply the body\" multilocation technique. My teacher used to say that to preserve Unity was to practice jointly Bright Mirror, and that on becoming successful in the mirror procedure a man would be able to multiply his body to several dozen all with the same dress and facial expression. My teacher also used to say that you should take the great medicines diligently if you wished to enjoy Fullness of Life, and that you should use metal solutions and a multiplication of your person if you wished to communicate with the gods. By multiplying the body, the three Hun and the seven Po are automatically seen within the body, and in addition it becomes possible to meet and visit the powers of heaven and the deities of earth and to have all the gods of the mountains and rivers in one's service. (18 , tr. Ware 1966:306 ) The Daoist Shangqing School has several meditation techniques for visualizing the hun and po. In Shangqing Neidan \"Internal Alchemy\", Baldrian-Hussein says, the po plays a particularly somber role as it represents the passions that dominate the hun. This causes the vital force to decay, especially during sexual activity, and eventually leads to death. The inner alchemical practice seeks to concentrate the vital forces within the body by reversing the respective roles of hun and po, so that the hun (Yang) controls the po (Yin). (2008:533) Number of souls The number of human \"souls\" has been a long-standing source of controversy among Chinese religious traditions. Stevan Harrell (1979:521) concludes, \"Almost every number from one to a dozen has at one time or another been proposed as the correct one.\" The most commonly believed numbers of \"souls\" in a person are one, two, three, and ten. One \"soul\" or linghun is the simplest URL Harrell gives a fieldwork example. When rural Taiwanese perform ancestral sacrifices at home, they naturally think of the ling-hun in the tablet; when they take offerings to the cemetery, they think of it in the grave; and when they go on shamanistic trips, they think of it in the yin world. Because the contexts are separate, there is little conflict and little need for abstract reasoning about a nonexistent problem. (1979:523) Two \"souls\" is a common folk belief, and reinforced by yin-yang theory. These paired souls can be called hun and po, hunpo and shen, or linghun and shen. Three \"souls\" comes from widespread beliefs that the soul of a dead person can exist in the multiple locations. The missionary Justus Doolittle recorded that Chinese people in Fuzhou Believe each person has three distinct souls while living. These souls separate at the death of the adult to whom they belong. One resides in the ancestral tablet erected to his memory, if the head of a family; another lurks in the coffin or the grave, and the third departs to the infernal regions to undergo its merited punishment. (1865 II:401\u20132) Ten \"souls\" of sanhunqipo \"three hun and seven po\" is not only Daoist; \"Some authorities would maintain that the three-seven \"soul\" is basic to all Chinese religion\" (Harrell 1979:522) . During the Later Han period, Daoists fixed the number of hun souls at three and the number of po souls at seven. A newly deceased person may return () to his home at some nights, sometimes one week () after his death and the seven po would disappear one by one every 7 days after death. According to Needham and Lu (1974:88) , \"It is a little difficult to ascertain the reason for this, since fives and sixes (if they corresponded to the viscera) would have rather been expected.\" Three hun may stand for the sangang \"three principles of social order: relationships between ruler-subject, father-child, and husband-wife\" (Needham 1974:89) . Seven po may stand for the qiqiao \"seven apertures (in the head, eyes, ears, nostrils, and mouth)\" or the qiqing \"seven emotions (joy, anger, sorrow, fear, worry, grief, fright)\" in traditional Chinese medicine (Baldrian-Hussein 2008:522) . Sanhunqipo also stand for other names. }} External links page 1461, Kangxi Dictionary entries for hun and po What Is Shen (Spirit)?, Appendix: Hun and Po The Indigenous Chinese Concepts of Hun and P'o Souls, Singapore Paranormal Investigators \u2013 link obsolete \u2013 Internet Archive copy, Singapore Paranormal Investigators \u2013 link obsolete \u2013 Internet Archive copy , Chinese Buddhist Electronic Text Association", "after_revision": "Besides the common meaning of \"a soul\", po was a variant Chinese character for po \"a lunar phase\" and po \"dregs\". The Book of Documents used po as a graphic variant for po \"dark aspect of the moon\" \u2013 this character usually means ba \"overlord; hegemon\". For example, \"On the third month, when (the growth phase, ) of the moon began to wane, the duke of Chow [i.e., Duke of Zhou] commenced the foundations, and proceeded to build the new great city of L\u01d2\" . The Zhuangzi \"[Writings of] Master Zhuang\" wrote zaopo (lit. \"rotten dregs\") \"worthless; unwanted; waste matter\" with a po variant. A wheelwright sees Duke Huan of Qi with books by dead sages and says, \"what you are reading there is nothing but the [] chaff and dregs of the men of old!\" . In the history of Chinese writing, characters for po \"lunar brightness\" appeared before those for hun \"soul; spirit\". The spiritual hun and po \"dual souls\" are first recorded in Warring States period (475\u2013221 BCE) seal script characters. The lunar po or \"moon's brightness\" appears in both Zhou dynasty (1045\u2013256 BCE) Bronzeware script and oracle bone script, but not in Shang dynasty (ca. 1600\u20131046 BCE) oracle inscriptions. The earliest form of this \"lunar brightness\" character was found on a (ca. 11th century BCE) Zhou oracle bone inscription . Etymologies The po soul's etymology is better understood than the hun soul's. reconstructs hun \"'spiritual soul' which makes a human personality\" and po \"vegetative or animal soul ... which accounts for growth and physiological functions\" as Middle Chinese \u03b3u\u0259n and p\u02b0ak from Old Chinese *w\u00fbn and *phr\u00e2k. What do the words hun and [po] mean? Hun expresses the idea of continuous propagation ([zhuan] ), unresting flight; it is the qi of the Lesser Yang, working in man in an external direction, and it governs the nature (or the instincts, [xing] ). [Po] expresses the idea of a continuous pressing urge ([po] ) on man; it is the [qi] of the Lesser Yin, and works in him, governing the emotions ([qing] ). Hun is connected with the idea of weeding ([yun] ), for with the instincts the evil weeds (in man's nature) are removed. [Po] is connected with the idea of brightening ([bai] ), for with the emotions the interior (of the personality) is governed. Tr. . Etymologically, Schuessler says p\u00f2 \"animal soul\" \"is the same word as\" p\u00f2 \"a lunar phase\". He cites the Zuozhuan (534 BCE, see below) using the lunar jishengpo to mean \"With the first development of a fetus grows the vegetative soul\". P\u00f2, the soul responsible for growth, is the same as p\u00f2 the waxing and waning of the moon\". The meaning 'soul' has probably been transferred from the moon since men must have been aware of lunar phases long before they had developed theories on the soul. This is supported by the etymology 'bright', and by the inverted word order which can only have originated with meteorological expressions ... The association with the moon explains perhaps why the p\u00f2 soul is classified as Yin ... in spite of the etymology 'bright' (which should be Yang), hun's Yang classification may be due to the association with clouds and by extension sky, even though the word invokes 'dark'. 'Soul' and 'moon' are related in other cultures, by cognation or convergence, as in Tibeto-Burman and Proto-Lolo\u2013Burmese *s/\u02bc-la \"moon; soul; spirit\", Written Tibetan cognates bla \"soul\" and zla \"moon\", and Proto-Miao\u2013Yao *bla \"spirit; soul; moon\". The semantics of po \"white soul\" probably originated with \"lunar whiteness\". Zhou bronze inscriptions commonly recorded lunar phases with the terms jishengpo \"after the brightness has grown\" and jisipo \"after the brightness has died\", which Schuessler explains as \"second quarter of the lunar month\" and \"last quarter of the lunar month\". Chinese scholars have variously interpreted these two terms as lunar quarters or fixed days, and Wang Guowei's lunar-quarter analysis the most likely. Thus, jishengpo is from the 7th/8th to the 14th/15th days of the lunar month and jisipo is from the 23rd/24th to the end of the month. Y\u00fc translates them as \"after the birth of the crescent\" and \"after the death of the crescent\". Etymologically, lunar and spiritual po < p\u02b0ak < *phr\u00e2k are cognate with bai < b\u0250k < *br\u00e2k \"white\" . According to Hu Shih , po etymologically means \"white, whiteness, and bright light\"; \"The primitive Chinese seem to have regarded the changing phases of the moon as periodic birth and death of its [po], its 'white light' or soul.\" Y\u00fc says this ancient association between the po soul and the \"growing light of the new moon is of tremendous importance to our understanding of certain myths related to the seventh day of the months.\" Two celebrated examples in Chinese mythology are Xi Wangmu and Emperor Wu meeting on the seventh day of the first lunar month and The Princess and the Cowherd or Qixi Festival held on the seventh day of the seventh lunar month. The etymology of hun < \u03b3u\u0259n < *w\u00fbn is comparatively less certain. Hu said, \"The word hun is etymologically the same as the word yun, meaning \"clouds.\" The clouds float about and seem more free and more active than the cold, white-lighted portion of the growing and waning moon.\" Schuessler cites two possibilities. Since p\u00f2 is the 'bright' soul, h\u00fan is the 'dark' soul and therefore cognate to y\u00fan 'cloud' , perhaps in the sense of 'shadowy' because some believe that the h\u00fan soul will live after death in a world of shadows . + Chinese-English dictionary translations of hun and po Dictionary Hun Po Giles The soul, that part of the soul (as opp. to ) which goes to heaven and is able to leave the body, carrying with it an appearance of physical form; the subliminal self, expl. as . The mind; wits; faculties. The soul; that part of the soul (as opposed to ) which is indissolubly attached to the body, and goes down to earth with it at death; the supraliminal self, expl. as . Form; shape. The disc or substance of the moon from the time it begins to wane to new moon. Mathews The soul, the spiritual part of man that ascends to heaven, as contrasted with . The wits; the spiritual faculties. The animal or inferior soul; the animal or sentient life which inheres in the body \u2013 the body in this sense; the animals spirits; this soul goes to the earth with the body. Chao and Yang the soul (of a living person or of the dead) the physical side of the soul Karlgren spiritual soul (as opp. to ) the animal soul of man (as opp. to ) Lin Soul; the finer spirits of man as dist. , the baser spirits or animal forces (Taoism) the baser animal spirits of man, contrasted with finer elements three finer spirits and seven animal spirits), the two together conceived as animating the human body Liang a soul; a spirit. 1. (Taoism) vigor; animation; life. 2. form; shape; body. 3. the dark part of the moon. Wu \u2460 soul \u2461 mood; spirit \u2462 the lofty spirit of a nation \u2460 soul \u2461 vigour; spirit Ling et al \u2460 same as ... soul; believed by the superstitious to be an immaterial spiritual entity distinguished from but coexistent with the physical body of a person and a dominant spiritual force, and which leaves upon the person's death. \u2461 spirit; mood. \u2462 lofty spirit. \u2460 soul; spiritual matter believed by religious people as dependent on human's body. \u2461 vigour; spirit. DeFrancis soul, spirit; mood \u2460 soul; \u2461 vigor; spirit Both Chinese hun and po are translatable as English \"soul\" or \"spirit\", and both are basic components in \"soul\" compounds. In the following examples, all Chinese-English translation equivalents are from DeFrancis . Joseph Needham and Lu Gwei-djen, eminent historians of science and technology in China , define hun and po in modern terms. \"Peering as far as one can into these ancient psycho-physiological ideas, one gains the impression that the distinction was something like that between what we would call motor and sensory activity on the one hand, and also voluntary as against vegetative processes on the other.\" Farzeen Baldrian-Hussein cautions about hun and po translations: \"Although the term \"souls\" is often used to refer to them, they are better seen as two types of vital entities, the source of life in every individual. The hun is Yang, luminous, and volatile, while the po is Yin, somber, and heavy.\" History Based on Zuozhuan usages of hun and po in four historical contexts, Y\u00fc extrapolates that po was the original name for a human soul, and the dualistic conception of hun and po \"began to gain currency in the middle of the sixth century\" BCE. Two earlier 6th century contexts used the po soul alone. Both describe Tian \"heaven; god\" duo \"seizing; taking away\" a person's po, which resulted in a loss of mental faculties. In 593 BCE (Duke Xuan 15th year ), after Zhao Tong behaved inappropriately at the Zhou court, an observer predicted: \"In less than ten years [Zhao Tong] will be sure to meet with great calamity. Heaven has taken his [] wits away from him.\" In 543 BCE (Duke Xiang 29th year, Boyou from the state of Zheng acted irrationally, which an official interpreted as: \"Heaven is destroying [Boyou], and has taken away his [] reason.\" Boyou's political enemies subsequently arranged to take away his hereditary position and assassinate him. Two later sixth-century Zuozhuan contexts used po together with the hun soul. In 534 BCE, the ghost of Boyou (above) was seeking revenge on his murderers, and terrifying the people of Zheng (Duke Zhao, Year & ). The philosopher and statesman Zi Chan, realizing that Boyou's loss of hereditary office had caused his spirit to be deprived of sacrifices, reinstated his son to the family position, and the ghost disappeared. When a friend asked Zi Chan to explain ghosts, he gave what Yu calls \"the locus classicus on the subject of the human soul in the Chinese tradition\" . Yu 1972 , p. 372. Hun and po souls, explains Y\u00fc , \"are regarded as the very essence of the mind, the source of knowledge and intelligence. Death is thought to follow inevitably when the hun and the p'o leave the body. We have reason to believe that around this time the idea of hun was still relatively new.\" Silk painting found in the tomb of Lady Dai at Mawangdui dated to 168 BCE, interpreted as depicting her hun soul ascending to heaven and her family performing the zhaohun \"summoning the soul\" ritual below. Soon after death, it was believed that a person's hun and po could be temporarily reunited through a ritual called the fu \"recall; return\", zhaohun \"summon the hun soul\", or zhaohun fupo \"to summon the hun-soul to reunite with the po-soul\". The earliest known account of this ritual is found in the (3rd century BCE) Chuci poems Zhao Hun \"Summons of the Soul\" and Dazhao \"The Great Summons\" . For example, the wu Yang () summons a man's soul in the \"Zhao Hun\". Hu proposed, \"The idea of a hun may have been a contribution from the southern peoples\" (who originated Zhao Hun rituals) and then spread to the north sometime during the sixth century BCE. Calling this southern hypothesis \"quite possible\", Y\u00fc cites the Chuci, associated with the southern state of Chu, demonstrating \"there can be little doubt that in the southern tradition the hun was regarded as a more active and vital soul than the p'o. The Chuci uses hun 65 times and po 5 times (4 in hunpo, which the Chuci uses interchangeably with hun ). The identification of the yin-yang principle with the hun and po souls evidently occurred in the late fourth and early third centuries BCE , and by \"the second century at the latest, the Chinese dualistic conception of soul had reached its definitive formulation.\" The Liji (11 ), compounds hun and po with qi \"breath; life force\" and xing \"form; shape; body\" in hunqi and xingpo . \"The [] intelligent spirit returns to heaven the [] body and the animal soul return to the earth; and hence arose the idea of seeking (for the deceased) in sacrifice in the unseen darkness and in the bright region above.\" Compare this modern translation , \"The breath-soul (hun-ch'I ) returns to heaven; the bodily soul (hsing-p'o ) returns to earth. Therefore, in sacrificial-offering one should seek the meaning in the yin-yang principle.\" Y\u00fc summarizes hun/po dualism. Loewe explains with a candle metaphor; the physical xing is the \"wick and substance of a candle\", the spiritual po and hun are the \"force that keeps the candle alight\" and \"light that emanates from the candle\". The Yin po and Yang hun were correlated with Chinese spiritual and medical beliefs. Hun is associated with shen \"spirit; god\" and po with gui \"ghost; demon; devil\" . The (ca. 1st century BCE) Lingshu Jing medical text spiritually applies Wu Xing \"Five Phase\" theory to the Zang-fu \"organs\", associating the hun soul with liver (Chinese medicine) and blood, and the po soul with lung (Chinese medicine) and breath. The Lingshu Jing also records that the hun and po souls taking flight can cause restless dreaming, and eye disorders can scatter the souls causing mental confusion. Han medical texts reveal that hun and po departing from the body does not necessarily cause death but rather distress and sickness. Brashier parallels the translation of hun and po, \"If one were to put an English word to them, they are our 'wits', our ability to demarcate clearly, and like the English concept of \"wits,\" they can be scared out of us or can dissipate in old age.\" Jade burial suits were believed to delay the bodily po soul's decomposition. During the Han Dynasty, the belief in hun and po remained prominent, although there was a great diversity of different, sometimes contradictory, beliefs about the afterlife . Han burial customs provided nourishment and comfort for the po with the placement of grave goods, including food, commodities, and even money within the tomb of the deceased . Chinese jade was believed to delay the decomposition of a body. Pieces of jade were commonly placed in bodily orifices, or rarely crafted into jade burial suits. Generations of sinologists have repeatedly asserted that Han-era people commonly believed the heavenly hun and earthly po souls separated at death, but recent scholarship and archeology suggest that hunpo dualism was more an academic theory than a popular faith. Anna Seidel analyzed funerary texts discovered in Han tombs, which mention not only po souls but also hun remaining with entombed corpses, and wrote , \"Indeed, a clear separation of a p'o, appeased with the wealth included in the tomb, from a hun departed to heavenly realms is not possible.\" Seidel later called for reappraising Han abstract notions of hun and po, which \"do not seem to have had as wide a currency as we assumed up to now.\" Pu Muzhou surveyed usages of the words hun and po on Han Dynasty bei \"stele\" erected at graves and shrines, and concluded , \"The thinking of ordinary people seems to have been quite hazy on the matter of what distinguished the hun from the po.\" Tr. . These stele texts contrasted souls between a corporeal hun or hunpo at the cemetery and a spiritual shen at the family shrine. Kenneth Brashier reexamined the evidence for hunpo dualism and relegated it \"to the realm of scholasticism rather than general beliefs on death.\" Brashier cited several Han sources (grave deeds, Book of the Later Han, and Jiaoshi Yilin) attesting beliefs that \"the hun remains in the grave instead of flying up to heaven\", and suggested it \"was sealed into the grave to prevent its escape.\" Another Han text, the Fengsu Tongyi says, \"The vital energy of the hun of a dead person floats away; therefore a mask is made in order to retain it. Daoism Hun and po spiritual concepts were important in several Daoist traditions. For instance , \"Since the volatile hun is fond of wandering and leaving the body during sleep, techniques were devised to restrain it, one of which entailed a method of staying constantly awake.\" The sanhunqipo \"three hun and seven po\" were anthropomorphized and visualized. Ge Hong's (ca. 320 CE) Baopuzi frequently mentions the hun and po \"ethereal and gross souls\". The \"Genii\" Chapter argues that the departing of these dual souls cause illness and death. All men, wise or foolish, know that their bodies contain ethereal as well as gross breaths, and that when some of them quit the body, illness ensues; when they all leave him, a man dies. In the former case, the magicians have amulets for restraining them; in the latter case, The Rites [i.e., Yili] provide ceremonials for summoning them back. These breaths are most intimately bound up with us, for they are born when we are, but over a whole lifetime probably nobody actually hears or sees them. Would one conclude that they do not exist because they are neither seen nor heard? (2 ) In T'ai-i's elixir for Summoning Gross and Ethereal Breaths the five minerals [i.e., cinnabar, realgar, arsenolite, malachite, and magnetite] are used and sealed with Six-One lute as in the Nine-crucible cinnabars. It is particularly effective for raising those who have died of a stroke. In cases where the corpse has been dead less than four days, force open the corpse's mouth and insert a pill of this elixir and one of sulphur, washing them down its gullet with water. The corpse will immediately come to life. In every case the resurrected remark that they have seen a messenger with a baton of authority summoning them. (4 ) For visualizing the ten souls, the Baopuzi \"Truth on Earth\" chapter recommends taking dayao \"great medicines\" and practicing a fenxing \"divide/multiply the body\" multilocation technique. My teacher used to say that to preserve Unity was to practice jointly Bright Mirror, and that on becoming successful in the mirror procedure a man would be able to multiply his body to several dozen all with the same dress and facial expression. My teacher also used to say that you should take the great medicines diligently if you wished to enjoy Fullness of Life, and that you should use metal solutions and a multiplication of your person if you wished to communicate with the gods. By multiplying the body, the three Hun and the seven Po are automatically seen within the body, and in addition it becomes possible to meet and visit the powers of heaven and the deities of earth and to have all the gods of the mountains and rivers in one's service. (18 ) The Daoist Shangqing School has several meditation techniques for visualizing the hun and po. In Shangqing Neidan \"Internal Alchemy\", Baldrian-Hussein says, the po plays a particularly somber role as it represents the passions that dominate the hun. This causes the vital force to decay, especially during sexual activity, and eventually leads to death. The inner alchemical practice seeks to concentrate the vital forces within the body by reversing the respective roles of hun and po, so that the hun (Yang) controls the po (Yin). Number of souls The number of human \"souls\" has been a long-standing source of controversy among Chinese religious traditions. Stevan Harrell concludes, \"Almost every number from one to a dozen has at one time or another been proposed as the correct one.\" The most commonly believed numbers of \"souls\" in a person are one, two, three, and ten. One \"soul\" or linghun is the simplest idea. Harrell gives a fieldwork example. When rural Taiwanese perform ancestral sacrifices at home, they naturally think of the ling-hun in the tablet; when they take offerings to the cemetery, they think of it in the grave; and when they go on shamanistic trips, they think of it in the yin world. Because the contexts are separate, there is little conflict and little need for abstract reasoning about a nonexistent problem. Two \"souls\" is a common folk belief, and reinforced by yin-yang theory. These paired souls can be called hun and po, hunpo and shen, or linghun and shen. Three \"souls\" comes from widespread beliefs that the soul of a dead person can exist in the multiple locations. The missionary Justus Doolittle recorded that Chinese people in Fuzhou Believe each person has three distinct souls while living. These souls separate at the death of the adult to whom they belong. One resides in the ancestral tablet erected to his memory, if the head of a family; another lurks in the coffin or the grave, and the third departs to the infernal regions to undergo its merited punishment. Ten \"souls\" of sanhunqipo \"three hun and seven po\" is not only Daoist; \"Some authorities would maintain that the three-seven \"soul\" is basic to all Chinese religion\" . During the Later Han period, Daoists fixed the number of hun souls at three and the number of po souls at seven. A newly deceased person may return () to his home at some nights, sometimes one week () after his death and the seven po would disappear one by one every 7 days after death. According to Needham and Lu , \"It is a little difficult to ascertain the reason for this, since fives and sixes (if they corresponded to the viscera) would have rather been expected.\" Three hun may stand for the sangang \"three principles of social order: relationships between ruler-subject, father-child, and husband-wife\" . Seven po may stand for the qiqiao \"seven apertures (in the head, eyes, ears, nostrils, and mouth)\" or the qiqing \"seven emotions (joy, anger, sorrow, fear, worry, grief, fright)\" in traditional Chinese medicine . Sanhunqipo also stand for other names. Review at Oxford Academic. cite book |translator-last=Ware |translator-first=James R. |date=1966 |title=Alchemy, Medicine and Religion in the China of A.D. 320: The Nei Pien of Ko Hung |publisher=MIT Press |isbn=9780262230223 |ref=CITEREFWare1966}} Footnotes Further reading External links page 1461, Kangxi Dictionary entries for hun and po '' What Is Shen (Spirit)?, Appendix: Hun and Po The Indigenous Chinese Concepts of Hun and P'o Souls, Singapore Paranormal Investigators \u2013 link obsolete \u2013 Internet Archive copy, Singapore Paranormal Investigators \u2013 link obsolete \u2013 Internet Archive copy , Chinese Buddhist Electronic Text Association", "edit_actions": [{"type": "R", "before": "(tr. Legge 1865:434).", "after": ".", "start_char_pos": 454, "end_char_pos": 475}, {"type": "R", "before": "(tr. Watson 1968:152).", "after": ".", "start_char_pos": 764, "end_char_pos": 786}, {"type": "D", "before": "(Y\u00fc 1987:370)", "after": null, "start_char_pos": 1335, "end_char_pos": 1348}, {"type": "D", "before": "Schuessler (2007:290, 417)", "after": null, "start_char_pos": 1429, "end_char_pos": 1455}, {"type": "R", "before": "(tr. Needham and Lu 1974:87)", "after": "Tr. .", "start_char_pos": 2331, "end_char_pos": 2359}, {"type": "D", "before": "(2007:417)", "after": null, "start_char_pos": 3515, "end_char_pos": 3525}, {"type": "D", "before": "(Shaughnessy 1992:136\u2013145)", "after": null, "start_char_pos": 3962, "end_char_pos": 3988}, {"type": "D", "before": "(1987:370)", "after": null, "start_char_pos": 4181, "end_char_pos": 4191}, {"type": "D", "before": "(Matisoff 1980, Y\u00fc 1981, Carr 1985)", "after": null, "start_char_pos": 4382, "end_char_pos": 4417}, {"type": "D", "before": "(1946:30)", "after": null, "start_char_pos": 4441, "end_char_pos": 4450}, {"type": "D", "before": "(1981:83)", "after": null, "start_char_pos": 4664, "end_char_pos": 4673}, {"type": "D", "before": "(1946:31)", "after": null, "start_char_pos": 5169, "end_char_pos": 5178}, {"type": "D", "before": "Carr 1985:62", "after": null, "start_char_pos": 5516, "end_char_pos": 5528}, {"type": "D", "before": "Eberhard 1967:17", "after": null, "start_char_pos": 5648, "end_char_pos": 5664}, {"type": "R", "before": ". (2007:290)", "after": ".", "start_char_pos": 5665, "end_char_pos": 5677}, {"type": "D", "before": "(1912)", "after": null, "start_char_pos": 5758, "end_char_pos": 5764}, {"type": "D", "before": "(1931)", "after": null, "start_char_pos": 6239, "end_char_pos": 6245}, {"type": "D", "before": "(1947)", "after": null, "start_char_pos": 6549, "end_char_pos": 6555}, {"type": "D", "before": "(1957)", "after": null, "start_char_pos": 6640, "end_char_pos": 6646}, {"type": "D", "before": "(1972)", "after": null, "start_char_pos": 6717, "end_char_pos": 6723}, {"type": "D", "before": "(1992)", "after": null, "start_char_pos": 6982, "end_char_pos": 6988}, {"type": "D", "before": "(1993)", "after": null, "start_char_pos": 7098, "end_char_pos": 7104}, {"type": "D", "before": ". (2002)", "after": null, "start_char_pos": 7193, "end_char_pos": 7201}, {"type": "D", "before": "(2003)", "after": null, "start_char_pos": 7576, "end_char_pos": 7582}, {"type": "D", "before": "(2003)", "after": null, "start_char_pos": 7839, "end_char_pos": 7845}, {"type": "D", "before": "(1974:88)", "after": null, "start_char_pos": 7935, "end_char_pos": 7944}, {"type": "D", "before": "(2008:521)", "after": null, "start_char_pos": 8288, "end_char_pos": 8298}, {"type": "D", "before": "(1987:370)", "after": null, "start_char_pos": 8652, "end_char_pos": 8662}, {"type": "D", "before": ", tr. Legge 1872:329", "after": null, "start_char_pos": 9042, "end_char_pos": 9062}, {"type": "D", "before": "tr. Legge 1872:551),", "after": null, "start_char_pos": 9305, "end_char_pos": 9325}, {"type": "D", "before": ", tr. Legge 1872:618", "after": null, "start_char_pos": 9791, "end_char_pos": 9811}, {"type": "R", "before": "(", "after": ".", "start_char_pos": 10174, "end_char_pos": 10175}, {"type": "R", "before": ":372).", "after": ", p. 372.", "start_char_pos": 10184, "end_char_pos": 10190}, {"type": "R", "before": "Yu (1987:371)", "after": "Y\u00fc", "start_char_pos": 10218, "end_char_pos": 10231}, {"type": "D", "before": "(Y\u00fc 1987:367)", "after": null, "start_char_pos": 10580, "end_char_pos": 10593}, {"type": "D", "before": "(Cs\u00edkszentmih\u00e1lyi 2006:140\u2013141)", "after": null, "start_char_pos": 11104, "end_char_pos": 11135}, {"type": "D", "before": "(1946:31\u201332)", "after": null, "start_char_pos": 11209, "end_char_pos": 11221}, {"type": "R", "before": "Yu (1987:373)", "after": "Y\u00fc", "start_char_pos": 11460, "end_char_pos": 11473}, {"type": "D", "before": ", Brashier 1996:131", "after": null, "start_char_pos": 11775, "end_char_pos": 11794}, {"type": "D", "before": "(Y\u00fc 1987:374)", "after": null, "start_char_pos": 11937, "end_char_pos": 11950}, {"type": "R", "before": ", tr. Legge 1885:444)", "after": "),", "start_char_pos": 12090, "end_char_pos": 12111}, {"type": "D", "before": "(Y\u00fc 1987:374)", "after": null, "start_char_pos": 12467, "end_char_pos": 12480}, {"type": "D", "before": "(1979:9)", "after": null, "start_char_pos": 12705, "end_char_pos": 12713}, {"type": "D", "before": "(Carr 1985:62)", "after": null, "start_char_pos": 13083, "end_char_pos": 13097}, {"type": "D", "before": "(Brashier 1996:142)", "after": null, "start_char_pos": 13365, "end_char_pos": 13384}, {"type": "D", "before": "(1996:145\u20136)", "after": null, "start_char_pos": 13674, "end_char_pos": 13686}, {"type": "D", "before": "(Hansen 2000:119; Csikszentmihalyi 2006:116\u2013117, 140\u2013142)", "after": null, "start_char_pos": 14177, "end_char_pos": 14234}, {"type": "D", "before": "(Hansen 2000:119)", "after": null, "start_char_pos": 14411, "end_char_pos": 14428}, {"type": "D", "before": "(1982:107)", "after": null, "start_char_pos": 15005, "end_char_pos": 15015}, {"type": "D", "before": "(1987:227)", "after": null, "start_char_pos": 15173, "end_char_pos": 15183}, {"type": "R", "before": "(1993:216, tr. Brashier 1996126),", "after": ",", "start_char_pos": 15442, "end_char_pos": 15475}, {"type": "A", "before": null, "after": "Tr. .", "start_char_pos": 15597, "end_char_pos": 15597}, {"type": "D", "before": "(1996:158)", "after": null, "start_char_pos": 15742, "end_char_pos": 15752}, {"type": "D", "before": "(1996:136\u2013137)", "after": null, "start_char_pos": 15891, "end_char_pos": 15905}, {"type": "D", "before": "(Baldrian-Hussein 2008:522)", "after": null, "start_char_pos": 16386, "end_char_pos": 16413}, {"type": "D", "before": ", tr. Ware 1966:49\u201350", "after": null, "start_char_pos": 17445, "end_char_pos": 17466}, {"type": "D", "before": ", tr. Ware 1966:87", "after": null, "start_char_pos": 18099, "end_char_pos": 18117}, {"type": "D", "before": ", tr. Ware 1966:306", "after": null, "start_char_pos": 19065, "end_char_pos": 19084}, {"type": "D", "before": "(2008:533)", "after": null, "start_char_pos": 19620, "end_char_pos": 19630}, {"type": "D", "before": "(1979:521)", "after": null, "start_char_pos": 19773, "end_char_pos": 19783}, {"type": "R", "before": "URL", "after": "idea.", "start_char_pos": 20024, "end_char_pos": 20027}, {"type": "D", "before": "(1979:523)", "after": null, "start_char_pos": 20449, "end_char_pos": 20459}, {"type": "D", "before": "(1865 II:401\u20132)", "after": null, "start_char_pos": 21131, "end_char_pos": 21146}, {"type": "D", "before": "(Harrell 1979:522)", "after": null, "start_char_pos": 21313, "end_char_pos": 21331}, {"type": "D", "before": "(1974:88)", "after": null, "start_char_pos": 21649, "end_char_pos": 21658}, {"type": "D", "before": "(Needham 1974:89)", "after": null, "start_char_pos": 21955, "end_char_pos": 21972}, {"type": "D", "before": "(Baldrian-Hussein 2008:522)", "after": null, "start_char_pos": 22186, "end_char_pos": 22213}, {"type": "A", "before": null, "after": "Review at Oxford Academic.", "start_char_pos": 22255, "end_char_pos": 22255}, {"type": "A", "before": null, "after": "cite book |translator-last=Ware |translator-first=James R. |date=1966 |title=Alchemy, Medicine and Religion in the China of A.D. 320: The Nei Pien of Ko Hung |publisher=MIT Press |isbn=9780262230223 |ref=CITEREFWare1966", "start_char_pos": 22256, "end_char_pos": 22256}, {"type": "A", "before": null, "after": "Footnotes", "start_char_pos": 22259, "end_char_pos": 22259}, {"type": "A", "before": null, "after": "Further reading", "start_char_pos": 22260, "end_char_pos": 22260}, {"type": "A", "before": null, "after": "''", "start_char_pos": 22328, "end_char_pos": 22328}], "sents_char_pos": [0, 113, 242, 475, 536, 564, 607, 768, 786, 895, 1024, 1212, 1350, 1428, 1682, 1719, 1798, 1927, 1997, 2083, 2204, 2330, 2450, 2594, 2685, 2848, 2991, 3265, 3401, 3501, 3514, 3602, 3864, 4042, 4177, 4283, 4419, 4514, 4660, 4871, 5099, 5165, 5260, 5388, 5424, 5911, 5953, 5970, 6104, 6144, 6230, 6326, 6361, 6390, 6470, 6491, 6534, 6729, 6763, 6996, 7025, 7036, 7051, 7064, 7094, 7119, 7174, 7221, 7431, 7447, 7463, 7547, 7565, 7596, 7609, 7748, 7981, 8262, 8490, 8572, 8831, 8888, 8916, 8935, 9009, 9225, 9270, 9475, 9581, 9659, 9814, 10024, 10190, 10322, 10401, 10712, 10843, 10953, 11137, 11205, 11408, 11672, 11797, 12076, 12149, 12177, 12310, 12434, 12530, 12577, 12668, 12698, 12746, 12918, 13002, 13039, 13068, 13347, 13532, 13664, 14003, 14194, 14236, 14494, 14592, 14855, 15159, 15319, 15596, 15724, 16141, 16242, 16290, 16372, 16596, 16675, 16769, 16860, 17010, 17047, 17116, 17204, 17358, 17441, 17683, 17757, 17942, 17984, 18095, 18306, 18552, 18793, 19060, 19180, 19336, 19440, 19619, 19757, 19897, 19985, 20062, 20173, 20246, 20320, 20448, 20531, 20613, 20725, 20855, 20923, 21007, 21130, 21217, 21333, 21446, 21620, 21814, 22215, 22254]}
+{"doc_id": "2759412", "revision_depth": "1", "before_revision": "In the field of sociology, the terms Disneyficationand Disneyisation describe the commercial transformation of a society to resemble the Walt Disney Parks and Resorts, based upon rapid Western-style globalization and consumerist lifestyles.The term Disneyisation appears in Christian Contradictions and the World Revolution (1991), by Andre Kehoe: \"This bogus culture imposed hour after hour on the people by the media is a serious interference with free thinking and therefore free action.It is part of what Peter K.Fallon of New York University, in an admirable phrase, calls the Disneyisation of society. \" The term also appears in The Cultures of Cities (1996), by Sharon Zukin, and was popularized in The Disneyization of Society (2004), by Alan Bryman. The Disneyfication of urban space is explored in Tearing Down the Streets: Adventures in Urban Anarchy, by Jeff Ferrell. The terms Disneyfication and Disneyisation are derogatory, implying the social and cultural homogenization consequent to consumerism, merchandising, and emotional labor; and broadly describe the processes of stripping a real place or event of its original character, and represent it in a sanitized format . References to anything negative are removed, and the facts are dumbed down with the intent of rendering the subject more pleasant and easily grasped. In the case of places, that means replacing the real with an idealized, tourist-friendly veneer reminiscent of the \"Main Street, U.S.A.\" attractions at Disney theme parks ; the aspects of Disneyization include: theming \u2013 infusing a place or object with a particular idea. hybrid consumption \u2013 a collection of multiple consumption opportunities in a particular location.merchandising \u2013 promoting goods or services with objects bearing promotional images or logos. performative labor \u2013 making employees not only providers of services, but also entertainers . The French philosopher Jean Baudrillard (who writes about the nature of reality and the hyperreality) has called Disneyland the most real place in the U.S., because it is not pretending to be anything more than it actually is, a theme park. In his essay Simulations , he writes: He also criticized the hidden corporate nature of the company in his book America: ", "after_revision": "In the field of sociology, the term Disneyfication\u2014or Disneyization\u2014describes the commercial transformation of things (e.g. entertainment) or environments into something simplified, controlled, and 'safe'\u2014reminiscent of the Walt Disney brand (such as its media, parks, etc.).\u201cDisneyfication.\u201d Merriam-Webster. Retrieved 2021 March 20.Zukin, Sharon. 1996. The Cultures of Cities . It broadly describes the processes of stripping a real place or thing of its original character, and represent it in a sanitized format : references to anything negative are removed, and the facts are dumbed down with the intent of rendering the subject more pleasant and easily grasped. In the case of physical places, this involves replacing the real with an idealized, tourist-friendly veneer \u2014resembling the \"Main Street, U.S.A.\" attractions at Disney theme parks . Based on rapid Western-style globalization and consumerist lifestyles, the term Disneyfication is mostly used derogatorily to imply the social and cultural homogenization of things. In this sense, to Disneyfy \"means to translate or transform an object into something superficial and even simplistic.\"Bryman, Alan E. 2004. The Disneyization of Society. UK: Sage Publications. ISBN 9780761967651. Chapter one. Disneyfication can also be used to describe the internationalization of American mass culture; the notion of entertainment that is bigger, faster, and better but with worldwide, Americanized uniformity.Matusitz, Jonathan, and Lauren Palermo. 2014. \"The Disneyfication of the World: A Grobalisation Perspective.\" Journal of Organisational Transformation Social Change 11(2):91-107. . More generally, some may use Disneyfication to be associated with a statement about the cultural products of the Disney company itself, denoting the general process of rendering material (a fairy tale, novel, historical event) into a standardized format that is recognizable as being a product of the Walt Disney Company. Development The term Disneyfication first appeared in 1959, while Disneyization was coined by New York University's Peter K. Fallon. The former was popularized by Alan Bryman in The Disneyization of Society (2004), in which he described it as \"the process by which the principles of the Disney theme parks are coming to dominate more and more sectors of American society as well as the rest of the world.\" Though the two are largely used interchangeably, Bryman states his preference of Disneyization over Disneyfication because he takes the latter to be accompanied with negative connotations. Bryman described four dimensions of Disneyization in particular: Theming \u2013 where an institution or object is placed into a narrative that is mostly unrelated to the institution or object to which it is applied. Example: themed restaurants (e.g. Rainforest Cafe), or themed hotels on the Las Vegas Strip. Hybrid consumption \u2013 where multiple forms of consumption that are associated with different industries become \"interlocked with each other.\" Example: restaurants at IKEA and Costco. Merchandising \u2013 the promotion and sale of goods or services with objects bearing copyright images and/ or logos. Example: Clothing, pens, and stationary with New York City branding. Performative labor \u2013 making employees not only providers of services, but also of entertainment; in other words, frontline service work is made a performance . French philosopher Jean Baudrillard (who writes about the nature of reality and the hyperreality) has called Disneyland the most real place in the U.S., because it is not pretending to be anything more than it actually is, a theme park. In his essay \"Simulations\" , he writes: He also criticized the hidden corporate nature of the company in his 1986 book, America: Writer Andre Kehoe describes 'Disneyization' as a \"bogus culture imposed hour after hour on the people by the media\" that is a serious interference with free thinking and therefore free action.\"", "edit_actions": [{"type": "R", "before": "terms Disneyficationand Disneyisation describe", "after": "term Disneyfication\u2014or Disneyization\u2014describes", "start_char_pos": 31, "end_char_pos": 77}, {"type": "R", "before": "a society to resemble", "after": "things (e.g. entertainment) or environments into something simplified, controlled, and 'safe'\u2014reminiscent of", "start_char_pos": 111, "end_char_pos": 132}, {"type": "R", "before": "Parks and Resorts, based upon rapid Western-style globalization and consumerist lifestyles.The term Disneyisation appears in Christian Contradictions and the World Revolution (1991), by Andre Kehoe: \"This bogus culture imposed hour after hour on the people by the media is a serious interference with free thinking and therefore free action.It is part of what Peter K.Fallon of New York University, in an admirable phrase, calls the Disneyisation of society. \" The term also appears in The", "after": "brand (such as its media, parks, etc.).\u201cDisneyfication.\u201d Merriam-Webster. Retrieved 2021 March 20.Zukin, Sharon. 1996. The", "start_char_pos": 149, "end_char_pos": 638}, {"type": "R", "before": "(1996), by Sharon Zukin, and was popularized in The Disneyization of Society (2004), by Alan Bryman. The Disneyfication of urban space is explored in Tearing Down the Streets: Adventures in Urban Anarchy, by Jeff Ferrell.", "after": ".", "start_char_pos": 658, "end_char_pos": 879}, {"type": "R", "before": "The terms Disneyfication and Disneyisation are derogatory, implying the social and cultural homogenization consequent to consumerism, merchandising, and emotional labor; and broadly describe", "after": "It broadly describes", "start_char_pos": 880, "end_char_pos": 1070}, {"type": "R", "before": "event", "after": "thing", "start_char_pos": 1114, "end_char_pos": 1119}, {"type": "R", "before": ". References", "after": ": references", "start_char_pos": 1186, "end_char_pos": 1198}, {"type": "R", "before": "places, that means", "after": "physical places, this involves", "start_char_pos": 1353, "end_char_pos": 1371}, {"type": "R", "before": "reminiscent of", "after": "\u2014resembling", "start_char_pos": 1434, "end_char_pos": 1448}, {"type": "R", "before": "; the aspects of Disneyization include:", "after": ".", "start_char_pos": 1509, "end_char_pos": 1548}, {"type": "R", "before": "theming", "after": "Based on rapid Western-style globalization and consumerist lifestyles, the term Disneyfication is mostly used derogatorily to imply the social and cultural homogenization of things. In this sense, to Disneyfy \"means to translate or transform an object into something superficial and even simplistic.\"Bryman, Alan E. 2004. The Disneyization of Society. UK: Sage Publications. ISBN 9780761967651. Chapter one. Disneyfication can also be used to describe the internationalization of American mass culture; the notion of entertainment that is bigger, faster, and better but with worldwide, Americanized uniformity.Matusitz, Jonathan, and Lauren Palermo. 2014. \"The Disneyfication of the World: A Grobalisation Perspective.\" Journal of Organisational Transformation", "start_char_pos": 1549, "end_char_pos": 1556}, {"type": "A", "before": null, "after": "Social Change 11(2):91-107. .", "start_char_pos": 1557, "end_char_pos": 1557}, {"type": "A", "before": null, "after": "More generally, some may use Disneyfication to be associated with a statement about the cultural products of the Disney company itself, denoting the general process of rendering material (a fairy tale, novel, historical event) into a standardized format that is recognizable as being a product of the Walt Disney Company.", "start_char_pos": 1558, "end_char_pos": 1558}, {"type": "A", "before": null, "after": "Development The term Disneyfication first appeared in 1959, while Disneyization was coined by New York University's Peter K. Fallon.", "start_char_pos": 1559, "end_char_pos": 1559}, {"type": "A", "before": null, "after": "The former was popularized by Alan Bryman in The Disneyization of Society (2004), in which he described it as \"the process by which the principles of the Disney theme parks are coming to dominate more and more sectors of American society as well as the rest of the world.\" Though the two are largely used interchangeably, Bryman states his preference of Disneyization over Disneyfication because he takes the latter to be accompanied with negative connotations.", "start_char_pos": 1560, "end_char_pos": 1560}, {"type": "A", "before": null, "after": "Bryman described four dimensions of Disneyization in particular: Theming", "start_char_pos": 1561, "end_char_pos": 1561}, {"type": "R", "before": "infusing a place or object with a particular idea. hybrid", "after": "where an institution or object is placed into a narrative that is mostly unrelated to the institution or object to which it is applied. Example: themed restaurants (e.g. Rainforest Cafe), or themed hotels on the Las Vegas Strip. Hybrid", "start_char_pos": 1564, "end_char_pos": 1621}, {"type": "R", "before": "a collection of multiple consumption opportunities in a particular location.merchandising", "after": "where multiple forms of consumption that are associated with different industries become \"interlocked with each other.\" Example: restaurants at IKEA and Costco. Merchandising", "start_char_pos": 1636, "end_char_pos": 1725}, {"type": "R", "before": "promoting", "after": "the promotion and sale of", "start_char_pos": 1728, "end_char_pos": 1737}, {"type": "R", "before": "promotional images", "after": "copyright images and/", "start_char_pos": 1777, "end_char_pos": 1795}, {"type": "R", "before": "performative", "after": "Example: Clothing, pens, and stationary with New York City branding. Performative", "start_char_pos": 1806, "end_char_pos": 1818}, {"type": "R", "before": "entertainers", "after": "of entertainment; in other words, frontline service work is made a performance", "start_char_pos": 1885, "end_char_pos": 1897}, {"type": "D", "before": "The", "after": null, "start_char_pos": 1900, "end_char_pos": 1903}, {"type": "R", "before": "Simulations", "after": "\"Simulations\"", "start_char_pos": 2154, "end_char_pos": 2165}, {"type": "R", "before": "book America:", "after": "1986 book, America:", "start_char_pos": 2248, "end_char_pos": 2261}, {"type": "A", "before": null, "after": "Writer Andre Kehoe describes 'Disneyization' as a \"bogus culture imposed hour after hour on the people by the media\" that is a serious interference with free thinking and therefore free action.\"", "start_char_pos": 2262, "end_char_pos": 2262}], "sents_char_pos": [0, 240, 490, 517, 607, 758, 879, 1049, 1187, 1337, 1510, 1899, 2140]}
+{"doc_id": "2799170", "revision_depth": "2", "before_revision": "Bobby Martin (born November 3, 1987 \u2013 April 28, 2020)North American Football League - Truly Inspirational nicknamed \"Skateboard Bobby\", was a former high school American football defensive lineman. He had no legs as he was born with Caudal regression syndrome , and used his arms to run. A graduate of Colonel White High School in Dayton, Ohio, he played American football for his high school varsity team. He was a redshirt freshman at Central State University. Biography Martin was tall and weighed ; he had no legs as he was born with Caudal regression syndrome .Aurora Advocate retrieved December 23, 2009 During his senior season of 2005, in a game against Mount Healthy High School 's team in Cincinnati, he was removed from play at half-time by officials claiming he was in breach of the rules requiring players to wear thigh pads, knee pads and shoes. His school was later told by the Ohio High School Athletic Association that this decision was incorrect and that Martin was allowed to play in all games . He finished the season with 48 tackles. At halftime of one game, he was named the Homecoming King. Martin in the mid-2000s studied marketing at Central State , outside Dayton, and was not playing footballat the time . In 2007, then Cleveland Browns head coach Romeo Crennel invited Martin to a practice. Martin ended up getting involved in some of the action when he saw Dennis Northcutt evade player after player . Martin approached Northcutt and claimed that he could tackle him. At the goading of teammate Braylon Edwards, Northcutt allowed Martin to challenge him. Martin hung with Northcutt for 20 yards before forcing him out at the one-yard line. After Martin's playing days he had several run ins with police for various crimes. On April 28, 2020, Martin died when he crashed an ATV he had stolen earlier that evening . ESPY On July 12, 2006, Martin won the ESPY award for Best Male Athlete with a Disability .", "after_revision": "Bobby Martin (born November 3, 1987 \u2013 April 28, 2020)North American Football League - Truly Inspirational nicknamed \"Skateboard Bobby\", was born born with Caudal regression syndrome . As he had no legs or hips, he used his arms to run. A graduate of Colonel White High School in Dayton, Ohio, he played defensive lineman for his high school varsity team. He later attended Central State University. Biography Martin was tall and weighed as he was born with a significant form of Caudal regression syndrome which resulted in being born without hips or legs .Aurora Advocate retrieved December 23, 2009 During his 2005 high school senior season, he was removed from play at half-time in a game against Mount Healthy High School by officials claiming he was in breach of league rules requiring players to wear thigh pads, knee pads and shoes. Colonel White High School was later told by the Ohio High School Athletic Association that this decision was incorrect and Martin was allowed to continue to finish the season . He finished the season with 48 tackles. At halftime of one game, he was named the Homecoming King. On July 12, 2006, Martin won the ESPY award for Best Male Athlete with a Disability.date=March 2021 After graduation, Martin studied marketing at Central State University and did not play football . In 2007, then Cleveland Browns head coach Romeo Crennel invited Martin to a practice. After seeing wide receiver Dennis Northcutt evade player after player , Martin approached Northcutt and claimed that he could tackle him. At the insistence of teammate Braylon Edwards, Northcutt allowed Martin to challenge him. During the run, Martin hung with Northcutt for 20 yards before forcing him out at the one-yard line. After Martin's playing days , he had several run ins with police for various crimes. On April 28, 2020, Martin died when he crashed an ATV he had stolen earlier that evening .", "edit_actions": [{"type": "R", "before": "a former high school American football defensive lineman. He had no legs as he was born", "after": "born born", "start_char_pos": 140, "end_char_pos": 227}, {"type": "R", "before": ", and", "after": ". As he had no legs or hips, he", "start_char_pos": 260, "end_char_pos": 265}, {"type": "R", "before": "American football", "after": "defensive lineman", "start_char_pos": 355, "end_char_pos": 372}, {"type": "R", "before": "was a redshirt freshman at", "after": "later attended", "start_char_pos": 410, "end_char_pos": 436}, {"type": "D", "before": "; he had no legs", "after": null, "start_char_pos": 501, "end_char_pos": 517}, {"type": "A", "before": null, "after": "a significant form of", "start_char_pos": 538, "end_char_pos": 538}, {"type": "A", "before": null, "after": "which resulted in being born without hips or legs", "start_char_pos": 566, "end_char_pos": 566}, {"type": "R", "before": "senior season of 2005,", "after": "2005 high school senior season, he was removed from play at half-time", "start_char_pos": 623, "end_char_pos": 645}, {"type": "D", "before": "'s team in Cincinnati, he was removed from play at half-time", "after": null, "start_char_pos": 690, "end_char_pos": 750}, {"type": "R", "before": "the", "after": "league", "start_char_pos": 793, "end_char_pos": 796}, {"type": "R", "before": "His school", "after": "Colonel White High School", "start_char_pos": 862, "end_char_pos": 872}, {"type": "D", "before": "that", "after": null, "start_char_pos": 970, "end_char_pos": 974}, {"type": "R", "before": "play in all games", "after": "continue to finish the season", "start_char_pos": 997, "end_char_pos": 1014}, {"type": "R", "before": "Martin in the mid-2000s", "after": "On July 12, 2006, Martin won the ESPY award for Best Male Athlete with a Disability.date=March 2021", "start_char_pos": 1116, "end_char_pos": 1139}, {"type": "A", "before": null, "after": "After graduation, Martin", "start_char_pos": 1140, "end_char_pos": 1140}, {"type": "R", "before": ", outside Dayton, and was not playing footballat the time", "after": "University and did not play football", "start_char_pos": 1176, "end_char_pos": 1233}, {"type": "R", "before": "Martin ended up getting involved in some of the action when he saw", "after": "After seeing wide receiver", "start_char_pos": 1322, "end_char_pos": 1388}, {"type": "R", "before": ".", "after": ",", "start_char_pos": 1432, "end_char_pos": 1433}, {"type": "R", "before": "goading", "after": "insistence", "start_char_pos": 1507, "end_char_pos": 1514}, {"type": "A", "before": null, "after": "During the run,", "start_char_pos": 1587, "end_char_pos": 1587}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1701, "end_char_pos": 1701}, {"type": "D", "before": ".", "after": null, "start_char_pos": 1846, "end_char_pos": 1847}, {"type": "D", "before": "ESPY On July 12, 2006, Martin won the ESPY award for Best Male Athlete with a Disability", "after": null, "start_char_pos": 1848, "end_char_pos": 1936}], "sents_char_pos": [0, 197, 287, 406, 462, 502, 568, 861, 1016, 1056, 1115, 1235, 1321, 1499, 1586, 1672, 1756]}
+{"doc_id": "28038374", "revision_depth": "1", "before_revision": "Laws and regulations Laws in most places require that a call button must be in reach of the patient at all times for example in the patients bed or on the table . It is essential to patients in emergencies. There are also laws that vary by location setting the amount of time in which staff must respond to a call . Overuse Some patients develop the habit of overusing a call button . This can lead staff to frustration, alarm fatigue, up to and including ignoring or disregarding the patient 's calls or not taking them very seriously. \"Alarm fatigue\" refers to the response - or lack of it - of nurses to more than a dozen types of alarmsthat can sound hundreds of times a day - and many of those calls are false alarms . Staff cannot ignore such calls, as doing so violates the law in most places. Sometimes, mental health professionals will work with such patients in order to curtail their use of the button to serious need. Basic The most basic system has nothing more than a button for the patient . When the button is pressed, nursing staff is alerted by a light and/or an audible sound at the nurse's station. This can only be turned off from the patient's bedside, thereby compelling staff to respond to the patient. Wireless nurse call Like hardwired systems, wireless types have the ability to alert nursing staff by sound, light or show messages in a terminal. An advantage is that there is less wiringduring installation and reducing the costs. The dome lights in the hallway still usually require wiring for power. Disadvantages of wireless systems include the requirement of batteries in each patient station that must be monitored and replaced over the life of the system, heightened risk of signal interference with other systems in the facility, and a limited selection among UL 1069 approved wireless systems. Intercoms In some facilities, often in hospitals, a more advanced system is included, in which staff from the nurse's station can communicate directly with patients via intercom. This has the advantage in which staff does not need to waste time walking to the patient's room to determine the reason the patient made the call, and they can determine by speaking to the patient whether the situation is urgent or if it can waituntil later . With the intercom system, the alert can be turned off from the nurse's station, allowing staff to avoid entry into the patient's room if it is determined that the patient's need can be met without doing so. Cell phone alerts Newer technology allows call buttons to reach cell phone-like devices carried around by nursing staff. Staffers can then answer the calls from wherever they are located within the facility, thereby improving the speed and efficiency in the response.", "after_revision": "Laws and regulations Laws in most places require that a call button must be in reach of the patient at all times ; for example, in the patient's bed or on an easily reachable surface (such as an end table or nightstand.) Call buttons are essential to patients in emergencies. There are also laws that determine the amount of time in which staff must respond to a call , though mandatory response times vary by location . Overuse Some patients develop the habit of overusing call buttons . This can lead staff to develop frustration and alarm fatigue, which can result in them ignoring patient calls or otherwise not taking them seriously. \"Alarm fatigue\" occurs when staff are exposed to many frequent alarms, some of which may be false alarms, and consequently become desensitized to them. Alarm fatigue is particularly prevalent in nurses who must answer many patient calls per day . Staff cannot legally ignore such calls, as doing so violates the law in most places. Sometimes, mental health professionals will work with such patients in order to curtail their use of the button to serious need. Basic The most basic system has a single button near the patient's bedside, which they can push to call for assistance . When the button is pressed, nursing staff is alerted by a light and/or an audible sound at the nurse's station. This can only be turned off from the patient's bedside, thereby compelling staff to respond to the patient. Wireless nurse call Like hardwired systems, wireless call buttons have the ability to alert nursing staff using sounds or lights at the nurse's station. In addition, many wireless call systems can display messages on a terminal. An advantage to wireless call buttons is that installing them requires less wiring, reducing their cost. However, dome lights in hallways still usually require wiring for power. Disadvantages of wireless systems include the heightened risk of signal interference with other systems in the facility, the necessity of installing batteries in each patient station and changing them as needed, and a limited selection among UL 1069 approved wireless systems. Intercoms In some facilities, often in hospitals, a more advanced system is used, which allows staff from the nurse's station to communicate directly with patients via intercom. This has the advantage of allowing nursing staff to immediately assess the severity of the situation and determine if immediate assistance is needed or if the patient can wait . With the intercom system, the alert can be turned off from the nurse's station, allowing staff to avoid entering the patient's room if it is determined that the patient's need can be met without doing so. Cell phone alerts Newer technology allows call buttons to reach cell phone-like devices carried around by nursing staff. Staffers can then answer the calls from wherever they are located within the facility, thereby improving the speed and efficiency of the response.", "edit_actions": [{"type": "R", "before": "for example in the patients", "after": "; for example, in the patient's", "start_char_pos": 113, "end_char_pos": 140}, {"type": "R", "before": "the table . It is", "after": "an easily reachable surface (such as an end table or nightstand.) Call buttons are", "start_char_pos": 151, "end_char_pos": 168}, {"type": "R", "before": "vary by location setting", "after": "determine", "start_char_pos": 232, "end_char_pos": 256}, {"type": "A", "before": null, "after": ", though mandatory response times vary by location", "start_char_pos": 314, "end_char_pos": 314}, {"type": "R", "before": "a call button", "after": "call buttons", "start_char_pos": 370, "end_char_pos": 383}, {"type": "R", "before": "frustration,", "after": "develop frustration and", "start_char_pos": 409, "end_char_pos": 421}, {"type": "R", "before": "up to and including ignoring or disregarding the patient 's calls or", "after": "which can result in them ignoring patient calls or otherwise", "start_char_pos": 437, "end_char_pos": 505}, {"type": "D", "before": "very", "after": null, "start_char_pos": 522, "end_char_pos": 526}, {"type": "R", "before": "refers to the response - or lack of it - of nurses to more than a dozen types of alarmsthat can sound hundreds of times a day - and many of those calls are false alarms", "after": "occurs when staff are exposed to many frequent alarms, some of which may be false alarms, and consequently become desensitized to them. Alarm fatigue is particularly prevalent in nurses who must answer many patient calls per day", "start_char_pos": 554, "end_char_pos": 722}, {"type": "A", "before": null, "after": "legally", "start_char_pos": 738, "end_char_pos": 738}, {"type": "R", "before": "nothing more than a button for the patient", "after": "a single button near the patient's bedside, which they can push to call for assistance", "start_char_pos": 964, "end_char_pos": 1006}, {"type": "R", "before": "types", "after": "call buttons", "start_char_pos": 1282, "end_char_pos": 1287}, {"type": "R", "before": "by sound, light or show messages in", "after": "using sounds or lights at the nurse's station. In addition, many wireless call systems can display messages on", "start_char_pos": 1328, "end_char_pos": 1363}, {"type": "R", "before": "is that there is less wiringduring installation and reducing the costs. The", "after": "to wireless call buttons is that installing them requires less wiring, reducing their cost. However,", "start_char_pos": 1389, "end_char_pos": 1464}, {"type": "R", "before": "the hallway", "after": "hallways", "start_char_pos": 1480, "end_char_pos": 1491}, {"type": "D", "before": "requirement of batteries in each patient station that must be monitored and replaced over the life of the system,", "after": null, "start_char_pos": 1578, "end_char_pos": 1691}, {"type": "R", "before": "and", "after": "the necessity of installing batteries in each patient station and changing them as needed, and", "start_char_pos": 1767, "end_char_pos": 1770}, {"type": "R", "before": "included, in which", "after": "used, which allows", "start_char_pos": 1908, "end_char_pos": 1926}, {"type": "R", "before": "can", "after": "to", "start_char_pos": 1958, "end_char_pos": 1961}, {"type": "R", "before": "in which staff does not need to waste time walking to the patient's room to determine the reason the patient made the call, and they can determine by speaking to the patient whether the situation is urgent or if it can waituntil later", "after": "of allowing nursing staff to immediately assess the severity of the situation and determine if immediate assistance is needed or if the patient can wait", "start_char_pos": 2034, "end_char_pos": 2268}, {"type": "R", "before": "entry into", "after": "entering", "start_char_pos": 2375, "end_char_pos": 2385}, {"type": "R", "before": "in", "after": "of", "start_char_pos": 2729, "end_char_pos": 2731}], "sents_char_pos": [0, 162, 206, 316, 385, 537, 802, 931, 1008, 1120, 1228, 1375, 1460, 1531, 1831, 2010, 2270, 2477, 2598]}
+{"doc_id": "28087643", "revision_depth": "1", "before_revision": "The Battle of Black River was a series of conflicts between April and August 1782 during the American War of Independence. They were fought between British and Spanish forces for control of the Black River settlement, located on the Caribbean coast of present-day Honduras. Spanish forces forced out a small British garrison and most of the settlers in April 1782. The British responded in August, regrouping the settlers and reinforcing them with troops from Jamaica. They successfully recaptured the settlement from the disease-depleted Spanish force. Mat\u00edas de G\u00e1lvez, the Captain General of Spanish Guatemala, was ordered by King Charles to \"dislocate the English from their hidden settlements on the Gulf of Honduras \". Ch\u00e1vez, p. 151 In 1782 he embarked on a series of actions to wipe out British settlements which held long-established logging rights on the southern coast of the Yucatan Peninsula (present-day Belize), and also settlements on the Mosquito Coast (present-day Honduras and Nicaragua). In March 1782 , more than 800 Spanish troops led by G\u00e1lvez had captured Roat\u00e1n, overwhelming the British garrison that then numbered just eighty men. With reinforcements of another 600 men he went on to capture the Black River settlement the next month which was defended by less than twenty men. James Lawrie, a major in the 49th Regiment of Foot who commanded the small British force, resisted as best he could, but abandoned the fortifications and fled with his men through the jungle to Cape Gracias a Dios. The British governor of Jamaica, General Sir Archibald Campbell, was preoccupied by a planned Franco-Spanish attack on his island, and was unable to immediately send relief. However, the invasion of Jamaica was called off after the decisive British victory at the Battle of the Saintes where Admiral Rodney defeated the French fleet before it joined the Spanish.Chavez, p. 165 By the end of April the balance of power in the Caribbean had shifted to the British Royal Navy. With this in effect Governor Campbell gave Edward Marcus Despard permission to retake the Black river settlements after learning that Lawrie had a force waiting to strike back.Jay, p. 93 Battle Lawrie was able to regroup a force of about 800 locals (known as the [[Rattan and Black River Volunteers|Rattan (Roatan) and Black River Volunteers]]) and Miskito Indians in the Cape Gracias a Dios area.Dawson, p. 701 These men harassed the Spaniards in a guerilla style warfare. Despard, coming from Jamaica, landed at Cape Gracias a Dios and reached the mouth of the Plantain River with men of the Loyalist company known as the Loyal American Rangers; these eventually met up with Lawrie and his force. Combined with the supporting force which now consisted of 80 Loyalist Americans, 500 settlers (shoremen and freed slaves) and 600 Miskito Indians a total of 1,200 men . A squadron of Royal Navy and armed merchant ships stood by in support. Despard wasted no time in attacking the Spanish to gain the element of surprise. Meanwhile, the Spanish garrison on Black River had been reduced by disease since its capture in early April. At Quipriva where Fort Dalling was located, a small Spanish contingent of 75 Spaniards was surprised and all but one were either killed or taken prisoner ; a survivor by the name of Manuel Rivas escaped to warn the other soldiers at Caribe. Finally on 22 August Despard surrounded Caribe at Black River Bluff opposite the Eastern blockhouse, overwhelming the 140 Spanish soldiers, who surrendered after a short fight. A day after the surrender a Spanish polacre from Trujillo of 16 guns carrying reinforcements of 100 troops and provisions for the Spanish was captured by the small British squadron of ships just off the coast. What was left of the Spanish force from G\u00e1lvez's April expedition surrendered by the end of August. Articles of capitulation were proposed by Don Tomas Julia to Despard who accepted. Aftermath Lawrie and Despard had thus regained control of Black River, taking more than 27 Spanish officers and 715 rank and file as prisoners. Also captured were three colours (which were presented to King George III in November) and 33 cannon. Most of the prisoners in agreements of the terms of surrender were told not to fight under arms again until the end of the war and were promptly sent to Omoa. Lawrie and Despard however decided to stay and defend their territory fearing a Spanish counterattack. Juan de Cagigal, Governor of Havana, had learned of the defeat and had fallen into disfavour with G\u00e1lvez and was about to remove him from command altogether. G\u00e1lvez though requested reinforcements but none were coming from the governor. However this time the Spanish with their French allies were on the defensive ; their strategy having changed somewhat after the [[ Battle of the Saintes ; paranoia ] swept through the Spanish command and set their task of defending Havana and San Juan, Puerto Rico, which took priority over any offensive operations. Further military operations by the Bourbon allies in the Americas were also placed on hold due to the concentration of military operations in Europe (particularly at Gibraltar), and peace talks in Europe were taking place. British forces were able to take advantage of this inaction by recapturing the Bahamas in 1783. Lawrie and Despard held the British settlements in the Mosquito Coast until the end of the war. Despard for his efforts was rewarded with the honour of Superintendent of the Bay of Honduras, and for a number of years ruled the territory that became Belize. Jay, Mike , The Unfortunate Colonel Despard , Bantam Press , 2004 Nichols, John , The Gentleman's magazine '', Volume 52 London, 1782.", "after_revision": "The Battle of the Black River was a series of conflicts between April and August 1782 during the American War of Independence. They were fought between British and Spanish forces for control of the Black River settlement, located on the Caribbean coast of present-day Honduras. Spanish forces forced out a small British garrison and most of the settlers in April 1782. The British responded in August, regrouping the settlers and reinforcing them with troops from Jamaica. They successfully recaptured the settlement from the disease-depleted Spanish force. Mat\u00edas de G\u00e1lvez, the Captain General of Spanish Guatemala, was ordered by King Charles to \"dislocate the English from their hidden settlements on the Gulf of Honduras .\" Ch\u00e1vez, p. 151 In 1782 he embarked on a series of actions to wipe out British settlements , which held long-established logging rights on the southern coast of the Yucatan Peninsula (present-day Belize), and also settlements on the Mosquito Coast (present-day Honduras and Nicaragua). In March 1782 more than 800 Spanish troops led by G\u00e1lvez had captured Roat\u00e1n, overwhelming the British garrison that then numbered just eighty men. With reinforcements of another 600 men , he went on to capture the Black River settlement the next month , which was defended by fewer than twenty men. James Lawrie, a major in the 49th Regiment of Foot who commanded the small British force, resisted as best he could, but abandoned the fortifications and fled with his men through the jungle to Cape Gracias a Dios. The British governor of Jamaica, General Sir Archibald Campbell, was preoccupied by a planned Franco-Spanish attack on the island, and was unable to immediately send relief. However, the invasion of Jamaica was called off after the decisive British victory at the Battle of the Saintes where Admiral Rodney defeated the French fleet before it joined the Spanish.Chavez, p. 165 By the end of April the balance of power in the Caribbean had shifted to the British Royal Navy. With this in effect , Governor Campbell gave Edward Marcus Despard permission to retake the Black River settlements after learning that Lawrie had a force waiting to strike back.Jay, p. 93 Battle Lawrie was able to regroup a force of about 800 locals (known as the [[Rattan and Black River Volunteers|Rattan (Roatan) and Black River Volunteers]]) and Miskito Indians in the Cape Gracias a Dios area.Dawson, p. 701 These men harassed the Spaniards in guerilla-style warfare. Despard, coming from Jamaica, landed at Cape Gracias a Dios and reached the mouth of the Plantain River with men of the Loyalist company known as the Loyal American Rangers; these eventually met up with Lawrie and his force. Combined with the supporting force that now consisted of 80 Loyalist Americans, 500 settlers (shoremen and freed slaves) and 600 Miskito Indians , there were 1,200 men in total . A squadron of Royal Navy and armed merchant ships stood by in support. Despard wasted no time in attacking the Spanish to gain the element of surprise. Meanwhile, the Spanish garrison on Black River had been reduced by disease since its capture in early April. At Quipriva where Fort Dalling was located, a small Spanish contingent of 75 Spaniards was surprised , and all but one were either killed or taken prisoner : a survivor by the name of Manuel Rivas escaped to warn the other soldiers at Caribe. Finally on 22 August , Despard surrounded Caribe at Black River Bluff opposite the Eastern blockhouse, overwhelming the 140 Spanish soldiers, who surrendered after a short fight. A day after the surrender , a Spanish 16-gun polacre from Trujillo carrying reinforcements of 100 troops and provisions for the Spanish was captured by the small British squadron of ships just off the coast. What was left of the Spanish force from G\u00e1lvez's April expedition surrendered by the end of August. Articles of capitulation were proposed by Don Tom\u00e1s Julia to Despard who accepted. Aftermath Lawrie and Despard had thus regained control of Black River, taking more than 27 Spanish officers and 715 rank-and-file as prisoners. Also captured were three colours (which were presented to King George III in November) and 33 cannon. Most of the prisoners in agreements of the terms of surrender were told not to fight under arms again until the end of the war and were promptly sent to Omoa. Lawrie and Despard however decided to stay and defend their territory , fearing a Spanish counterattack. Juan de Cagigal, Governor of Havana, had learned of the defeat , had fallen into disfavour with G\u00e1lvez , and was about to remove him from command altogether. Nevertheless, G\u00e1lvez requested reinforcements but none were coming from the governor. However , this time the Spanish with their French allies were on the defensive , their strategy having changed somewhat after the [[ Battle of the Saintes ]. Paranoia swept through the Spanish command and set back their task of defending Havana and San Juan, Puerto Rico, which took priority over any offensive operations. Further military operations by the Bourbon allies in the Americas were also placed on hold due to the concentration of military operations in Europe (particularly at Gibraltar), and peace talks in Europe were taking place. British forces were able to take advantage of this inaction by recapturing the Bahamas in 1783. Lawrie and Despard held the British settlements in the Mosquito Coast until the end of the war. For his efforts, Despard was rewarded with the honour of Superintendent of the Bay of Honduras, and for a number of years ruled the territory that became Belize. Jay, Mike (2004). The Unfortunate Colonel Despard . Bantam Press Nichols, John (1782). The Gentleman's Magazine '', Volume 52. London.", "edit_actions": [{"type": "A", "before": null, "after": "the", "start_char_pos": 14, "end_char_pos": 14}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 723, "end_char_pos": 725}, {"type": "A", "before": null, "after": ",", "start_char_pos": 816, "end_char_pos": 816}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1024, "end_char_pos": 1025}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1199, "end_char_pos": 1199}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1264, "end_char_pos": 1264}, {"type": "R", "before": "less", "after": "fewer", "start_char_pos": 1287, "end_char_pos": 1291}, {"type": "R", "before": "his", "after": "the", "start_char_pos": 1643, "end_char_pos": 1646}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2018, "end_char_pos": 2018}, {"type": "R", "before": "river", "after": "River", "start_char_pos": 2095, "end_char_pos": 2100}, {"type": "R", "before": "a guerilla style", "after": "guerilla-style", "start_char_pos": 2447, "end_char_pos": 2463}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 2733, "end_char_pos": 2738}, {"type": "R", "before": "a total of", "after": ", there were", "start_char_pos": 2844, "end_char_pos": 2854}, {"type": "A", "before": null, "after": "in total", "start_char_pos": 2865, "end_char_pos": 2865}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3230, "end_char_pos": 3230}, {"type": "R", "before": ";", "after": ":", "start_char_pos": 3284, "end_char_pos": 3285}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3392, "end_char_pos": 3392}, {"type": "R", "before": "a Spanish", "after": ", a Spanish 16-gun", "start_char_pos": 3575, "end_char_pos": 3584}, {"type": "D", "before": "of 16 guns", "after": null, "start_char_pos": 3607, "end_char_pos": 3617}, {"type": "R", "before": "Tomas", "after": "Tom\u00e1s", "start_char_pos": 3905, "end_char_pos": 3910}, {"type": "R", "before": "rank and file", "after": "rank-and-file", "start_char_pos": 4058, "end_char_pos": 4071}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4417, "end_char_pos": 4417}, {"type": "R", "before": "and", "after": ",", "start_char_pos": 4514, "end_char_pos": 4517}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4556, "end_char_pos": 4556}, {"type": "A", "before": null, "after": "Nevertheless,", "start_char_pos": 4610, "end_char_pos": 4610}, {"type": "D", "before": "though", "after": null, "start_char_pos": 4618, "end_char_pos": 4624}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4698, "end_char_pos": 4698}, {"type": "R", "before": ";", "after": ",", "start_char_pos": 4768, "end_char_pos": 4769}, {"type": "D", "before": "; paranoia", "after": null, "start_char_pos": 4844, "end_char_pos": 4854}, {"type": "A", "before": null, "after": ". Paranoia", "start_char_pos": 4856, "end_char_pos": 4856}, {"type": "A", "before": null, "after": "back", "start_char_pos": 4899, "end_char_pos": 4899}, {"type": "R", "before": "Despard for his efforts", "after": "For his efforts, Despard", "start_char_pos": 5424, "end_char_pos": 5447}, {"type": "R", "before": ",", "after": "(2004).", "start_char_pos": 5595, "end_char_pos": 5596}, {"type": "R", "before": ", Bantam Press , 2004", "after": ". Bantam Press", "start_char_pos": 5629, "end_char_pos": 5650}, {"type": "R", "before": ",", "after": "(1782).", "start_char_pos": 5665, "end_char_pos": 5666}, {"type": "R", "before": "magazine", "after": "Magazine", "start_char_pos": 5683, "end_char_pos": 5691}, {"type": "R", "before": "52 London, 1782.", "after": "52. London.", "start_char_pos": 5703, "end_char_pos": 5719}], "sents_char_pos": [0, 123, 274, 365, 469, 554, 725, 1009, 1159, 1308, 1523, 1697, 1886, 1997, 2175, 2396, 2472, 2646, 2697, 2867, 2938, 3019, 3128, 3285, 3370, 3548, 3758, 3858, 3941, 4085, 4187, 4346, 4450, 4609, 4689, 4769, 4845, 5008, 5231, 5327, 5423, 5584]}
+{"doc_id": "28307", "revision_depth": "1", "before_revision": "Etymology The word derives from \"Old English syn(n), for original *sunj\u014d. The stem may be related to that of Latin ' sons, sont-is ''' (guilty). In Old English there are examples of the original general sense, \u2018offence, wrong-doing, misdeed'\". Bah\u00e1'\u00ed%DIFDELCMD < %DIFDELCMD < %%% Bah\u00e1\u02bc\u00eds consider humans to be naturally good, fundamentally spiritual beings. Human beings were created because of God's immeasurable love for us. However, the Bah\u00e1\u02bc\u00ed teachings compare the human heart to a mirror, which, if turned away from the light of the sun (i.e. God), is incapable of receiving God's love. It is only by turning unto God that the spiritual advancement can be made. In this sense, \"sinning\" is to follow the inclinations of one's own lower nature, to turn the mirror of one's heart away from God. One of the main hindrances to spiritual development is the Bah\u00e1\u02bc\u00ed concept of the \"insistent self\" which is a self-serving inclination within all people. Bah\u00e1\u02bc\u00eds interpret this to be the true meaning of Satan, often referred to in the Bah\u00e1\u02bc\u00ed Writings as \"the Evil One\".Watch over yourselves, for the Evil One is lying in wait, ready to entrap you. Gird yourselves against his wicked devices, and, led by the light of the name of the All-Seeing God, make your escape from the darkness that surroundeth you. \u2014 Bah\u00e1\u02bcu'll\u00e1hThis lower nature in humans is symbolized as Satan \u2014 the evil ego within us, not an evil personality outside. \u2014 \u02bbAbdu'l-Bah\u00e1 Buddhism%DIFDELCMD < %DIFDELCMD < %%% There are a few differing Buddhist views on sin. American Zen author Brad Warner states that in Buddhism there is no concept of sin at all. The Buddha Dharma Education Association also expressly states \"The idea of sin or original sin has no place in Buddhism.\" Ethnologist Christoph von F\u00fcrer-Haimendorf explained, \"In Buddhist thinking the whole universe, men as well as gods, are subject to a reign of law. Every action, good or bad, has an inevitable and automatic effect in a long chain of causes, an effect which is independent of the will of any deity. Even though this may leave no room for the concept of 'sin' in the sense of an act of defiance against the authority of a personal god, Buddhists speak of 'sin' when referring to transgressions against the universal moral code.\"%DIFDELCMD < %DIFDELCMD < %%% However, Anantarika-kamma in Theravada Buddhism is a heinous crime, which through karmic process brings immediate disaster. In Mahayana Buddhism these five crimes are referred to as pa\u00f1c\u0101nantarya (P\u0101li), and are mentioned in The Sutra Preached by the Buddha on the Total Extinction of the Dharma, The five crimes or sins are: Injuring a Buddha Killing an Arhat Creating schism in the society of Sangha Matricide Patricide Christianity Hamartiology%DIFDELCMD < %DIFDELCMD < %%% The doctrine of sin is central to Christianity, since its basic message is about redemption in Christ.Rahner, p. 1588 Christian hamartiology describes sin as an act of offense against God by despising his persons and Christian biblical law, and by injuring others.Sabourin, p. 696 In Christian views it is an evil human act, which violates the rational nature of man as well as God's nature and his eternal law. According to the classical definition of St. Augustine of Hippo sin is \"a word, deed, or desire in opposition to the eternal law of God.\" Contra Faustum Manichaeum, 22,27; PL 42,418; cf. Thomas Aquinas, STh I\u2013II q71 a6.Mc Guinness, p. 241 Thus, sin requires redemption, a metaphor alluding to atonement, in which the death of Jesus is the price that is paid to release the faithful from the bondage of sin.Gruden, Wayne. Systemic Theology: An Introduction to Biblical Doctrine, Nottingham: Intervarsity Press, p .580 Among some scholars, sin is understood mostly as legal infraction or contract violation of non-binding philosophical frameworks and perspectives of Christian ethics, and so salvation tends to be viewed in legal terms. Other Christian scholars understand sin to be fundamentally relational\u2014a loss of love for the Christian God and an elevation of self-love (\"concupiscence\", in this sense), as was later propounded by Augustine in his debate with the Pelagians.On Grace and Free Will (see Nicene and Post-Nicene Fathers, trans. P.Holmes, vol. 5; 30\u201331%DIFDELCMD < [%%% 14\u201315 ). As with the legal definition of sin, this definition also affects the understanding of Christian grace and salvation, which are thus viewed in relational terms.For a historical review of this understanding, see R.N.Frost, \"Sin and Grace\", in Paul L. Metzger, Trinitarian Soundings, T%DIFDELCMD < &%%% T Clark, 2005. Original sin A Sistine Chapel fresco depicts the expulsion of Adam and Eve for transgressing God's command not to eat the fruit of the Tree of the knowledge of good and evil.%DIFDELCMD < %DIFDELCMD < %%% This condition has been characterized in many ways, ranging from something as insignificant as a slight deficiency, or a tendency toward sin yet without collective guilt, referred to as a \"sin nature\", to something as drastic as total depravity or automatic guilt of all humans through collective guilt. The concept of original sin was first alluded to in the 2nd century by Irenaeus, Bishop of Lyon in his controversy with certain dualist Gnostics.\"In the person of the first Adam we offend God, disobeying His precept\" (Haeres., V, xvi, 3). Other church fathers such as Augustine also shaped and developed the doctrine,Patte, Daniel. The Cambridge Dictionary of Christianity. Ed. Daniel Patte. New York: Cambridge University Press, 2010, 892 seeing it as based on the New Testament teaching of Paul the Apostle (Romans and 1 Corinthians ) and the Old Testament verse of Psalms .Preamble and Articles of Faith - V. Sin, Original and Personal - Church of the Nazarene. Retrieved 13 October 2013.Are Babies Born with Sin? - Topical Bible Studies. Retrieved 13 October 2013.Original Sin - Psalm 51:5 - Catholic News Agency. Retrieved 13 October 2013. Tertullian, Cyprian, Ambrose and Ambrosiaster considered that humanity shares in Adam's sin, transmitted by human generation. Augustine's formulation of original sin after 412 CE was popular among Protestant reformers, such as Martin Luther and John Calvin, who equated original sin with concupiscence (or \"hurtful desire\"), affirming that it persisted even after baptism and completely destroyed freedom to do good. Before 412 CE, Augustine said that free will was weakened but not destroyed by original sin. But after 412 CE this changed to a loss of free will except to sin. Modern Augustinian Calvinism holds this later view. The Jansenist movement, which the Catholic Church declared to be heretical, also maintained that original sin destroyed freedom of will. Instead the Catholic Church declares that Baptism erases original sin.Catholic Church. \"The Seven Sacraments of the Church.\" Catechism of the Catholic Church. LA Santa Sede. 19 November 2019.%DIFDELCMD < %DIFDELCMD < %%% Islam Sin is an important concept in Islamic ethics. Muslims see sin as anything that goes against the commands of God (Allah), a breach of the laws and norms laid down by religion. Islam teaches that sin is an act and not a state of being. It is believed that God weighs an individual's good deeds against his or her sins on the Day of Judgement and punishes those individuals whose evil deeds outweigh their good deeds. These individuals are thought to be sentenced to afterlife in the fires of jahannam (Hell).%DIFDELCMD < %DIFDELCMD < %%% Islamic terms for sin include dhanb and kha\u1e6d\u012b\u02bea, which are synonymous and refer to intentional sins; khi\u1e6d\u02be, which means simply a sin; and ithm, which is used for grave sins. Judaism%DIFDELCMD < %DIFDELCMD < %%% Judaism regards the violation of any of the 613 commandments as a sin. Judaism teaches that to sin is a part of life, since there is no perfect man and everyone has an inclination to do evil. Sin has many classifications and degrees, but the principal classification is that of \"missing the mark\" (cheit in Hebrew).Silver, Jonathan, host. \"Podcast: David Bashevkin on Sin and Failure in Jewish Thought.\" The Tikvah Podcast, The Tikvah Fund, 3 Oct. 2019. Some sins are punishable with death by the court, others with death by heaven, others with lashes, and others without such punishment, but no sins committed with willful intentions go without consequence. Sins committed out of lack of knowledge are not considered sins, since a sin cannot be a sin if the one who committed it did not know it was wrong. Unintentional sins are considered less severe URL Sins between people are considered much more serious in Judaism than sins between man and God. Yom Kippur, the main day of repentance in Judaism, can atone for sins between man and God, but not for sins between man and his fellow, that is until he has appeased his friend.Mishnah, Yoma,8:9 Eleazar ben Azariah derived%DIFDELCMD < [%%% this from the verse : \"From all your sins before God you shall be cleansed\" (Book of Leviticus, 16:30) \u2013 for sins between man and God Yom Kippur atones, but for sins between man and his fellow Yom Kippur does not atone until he appeases his fellow.Simon and Schuster, 1986, Nine Questions People Ask About Judaism, New York: Touchstone URL%DIFDELCMD < %DIFDELCMD < %%% When the Temple yet stood in Jerusalem, people would offer Korbanot (sacrifices) for their misdeeds. The atoning aspect of korbanot is carefully circumscribed. For the most part, korbanot only expiate unintentional sins, that is, sins committed because a person forgot that this thing was a sin or by mistake. No atonement is needed for violations committed under duress or through lack of knowledge, and for the most part, korbanot cannot atone for a malicious, deliberate sin. In addition, korbanot have no expiating effect unless the person making the offering sincerely repents of his or her actions before making the offering, and makes restitution to any person who was harmed by the violation. Judaism teaches that all willful sin has consequences. The completely righteous suffer for their sins (by humiliation, poverty, and suffering that God sends them) in this world and receive their reward in the world to come. The in-between (not completely righteous or completely wicked), suffer for and repent their sins after death and thereafter join the righteous. The very evil do not repent even at the gates of hell. Such people prosper in this world to receive their reward for any good deed, but cannot be cleansed by and hence cannot leave gehinnom, because they do not or cannot repent. This world can therefore seem unjust where the righteous suffer, while the wicked prosper. Many great thinkers have contemplated this.%DIFDELCMD < %DIFDELCMD < %%% Shinto The Shinto concept of sin is inexorably linked to concepts of purity and pollution. Shinto does not have a concept of original sin, instead believing that all human beings are born pure. Sin, also called Tsumi, is anything that makes people impure (i.e. anything that separates them from the kami). However, Shinto does not believe this impurity is the result of human actions, but rather the result of evil spirits or other external factors. Sin can have a variety of consequences in Japan, including disaster and disease. Because of this, purification rituals, or Harae, are viewed as important not just to the spiritual and physical health of the individual, but to the well-being of the nation.%DIFDELCMD < %DIFDELCMD < %%% See also Actual sin Devil Ethics in religion Haram Internal sin Karma Morality Religious law Sin offering Taboo Wickedness%DIFDELCMD < %DIFDELCMD < %%% Notes and references Further reading Fredriksen, Paula. Sin: The Early History of an Idea. Princeton: Princeton University Press, 2012. . Granoff; P E; Shinohara, Koichi; eds. (2012), Sins and Sinners: Perspectives from Asian Religions. Brill. . Hein, David. \"Regrets Only: A Theology of Remorse.\" The Anglican 33, no. 4 (October 2004): 5\u20136. Lewis, C.S. \"Miserable Offenders\": an Interpretation of%DIFDELCMD < [%%% sinfulness and%DIFDELCMD < ] %%% Prayer Book Language%DIFDELCMD < [%%% about it%DIFDELCMD < ]%%% , in series, The Advent Papers. Cincinnati, Ohio: Forward Movement Publications,%DIFDELCMD < [%%% 196-%DIFDELCMD < ]%%% . Pieper, Josef. The Concept of Sin''. Edward T. Oakes SJ (translation from German). South Bend, Indiana: St. Augustine's Press, 2001. Schumacher, Meinolf. S\u00fcndenschmutz und Herzensreinheit: Studien zur Metaphorik der S\u00fcnde in lateinischer und deutscher Literatur des Mittelalters. Munich: Fink, 1996.%DIFDELCMD < %DIFDELCMD < %%% External links%DIFDELCMD < %DIFDELCMD < %%% The Different Kinds of Sins (Catholic)", "after_revision": "Etymology The word derives from \"Old English syn(n), for original *sunj\u014d. The stem may be related to that of Latin sons, sont-is (guilty). In Old English %DIFDELCMD < %DIFDELCMD < %%% can be made. In this sense, \"sinning\" is to follow the inclinations of one's own lower nature, to turn the mirror of one's heart away from God. One of the main hindrances to spiritual development is the Bah\u00e1\u02bc\u00ed concept of the \"insistent self\" which is a self-serving inclination within all people. Bah\u00e1\u02bc\u00eds interpret this to be the true meaning of Satan, often referred to in the Bah\u00e1\u02bc\u00ed Writings as \"the Evil One\".Watch over yourselves, for the Evil One is lying in wait, ready %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% tord, deed, or desire in opposition to the eternal law of God.\" Thus, sin requires redemption, a metaphor alluding to atonement, in which the death of Jesus is the price that is %DIFDELCMD < [%%% %DIFDELCMD < &%%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < [%%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < [%%% %DIFDELCMD < ] %%% %DIFDELCMD < [%%% %DIFDELCMD < ]%%% %DIFDELCMD < [%%% %DIFDELCMD < ]%%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% p", "edit_actions": [{"type": "D", "before": "'", "after": null, "start_char_pos": 115, "end_char_pos": 116}, {"type": "D", "before": "'''", "after": null, "start_char_pos": 131, "end_char_pos": 134}, {"type": "D", "before": "there are examples of the original general sense, \u2018offence, wrong-doing, misdeed'\".", "after": null, "start_char_pos": 160, "end_char_pos": 243}, {"type": "D", "before": "Bah\u00e1'\u00ed", "after": null, "start_char_pos": 244, "end_char_pos": 250}, {"type": "D", "before": "Bah\u00e1\u02bc\u00eds consider humans to be naturally good, fundamentally spiritual beings. Human beings were created because of God's immeasurable love for us. However, the Bah\u00e1\u02bc\u00ed teachings compare the human heart to a mirror, which, if turned away from the light of the sun (i.e. God), is incapable of receiving God's love. It is only by turning unto God that the spiritual advancement", "after": null, "start_char_pos": 280, "end_char_pos": 653}, {"type": "D", "before": "to entrap you. Gird yourselves against his wicked devices, and, led by the light of the name of the All-Seeing God, make your escape from the darkness that surroundeth you. \u2014 Bah\u00e1\u02bcu'll\u00e1hThis lower nature in humans is symbolized as Satan \u2014 the evil ego within us, not an evil personality outside. \u2014 \u02bbAbdu'l-Bah\u00e1", "after": null, "start_char_pos": 1130, "end_char_pos": 1440}, {"type": "D", "before": "Buddhism", "after": null, "start_char_pos": 1441, "end_char_pos": 1449}, {"type": "D", "before": "There are a few differing Buddhist views on sin. American Zen author Brad Warner states that in Buddhism there is no concept of sin at all. The Buddha Dharma Education Association also expressly states \"The idea of sin or original sin has no place in Buddhism.\"", "after": null, "start_char_pos": 1479, "end_char_pos": 1740}, {"type": "D", "before": "Ethnologist Christoph von F\u00fcrer-Haimendorf explained, \"In Buddhist thinking the whole universe, men as well as gods, are subject to a reign of law. Every action, good or bad, has an inevitable and automatic effect in a long chain of causes, an effect which is independent of the will of any deity. Even though this may leave no room for the concept of 'sin' in the sense of an act of defiance against the authority of a personal god, Buddhists speak of 'sin' when referring to transgressions against the universal moral code.\"", "after": null, "start_char_pos": 1741, "end_char_pos": 2267}, {"type": "D", "before": "However, Anantarika-kamma in Theravada Buddhism is a heinous crime, which through karmic process brings immediate disaster. In Mahayana Buddhism these five crimes are referred to as pa\u00f1c\u0101nantarya (P\u0101li), and are mentioned in The Sutra Preached by the Buddha on the Total Extinction of the Dharma, The five crimes or sins are: Injuring a Buddha Killing an Arhat Creating schism in the society of Sangha Matricide Patricide", "after": null, "start_char_pos": 2297, "end_char_pos": 2718}, {"type": "D", "before": "Christianity Hamartiology", "after": null, "start_char_pos": 2719, "end_char_pos": 2744}, {"type": "R", "before": "The doctrine of sin is central to Christianity, since its basic message is about redemption in Christ.Rahner, p. 1588 Christian hamartiology describes sin as an act of offense against God by despising his persons and Christian biblical law, and by injuring others.Sabourin, p. 696 In Christian views it is an evil human act, which violates the rational nature of man as well as God's nature and his eternal law. According to the classical definition of St. Augustine of Hippo sin is \"a word,", "after": "tord,", "start_char_pos": 2774, "end_char_pos": 3265}, {"type": "D", "before": "Contra Faustum Manichaeum, 22,27; PL 42,418; cf. Thomas Aquinas, STh I\u2013II q71 a6.Mc Guinness, p. 241", "after": null, "start_char_pos": 3324, "end_char_pos": 3424}, {"type": "D", "before": "paid to release the faithful from the bondage of sin.Gruden, Wayne. Systemic Theology: An Introduction to Biblical Doctrine, Nottingham: Intervarsity Press, p .580", "after": null, "start_char_pos": 3539, "end_char_pos": 3702}, {"type": "D", "before": "Among some scholars, sin is understood mostly as legal infraction or contract violation of non-binding philosophical frameworks and perspectives of Christian ethics, and so salvation tends to be viewed in legal terms. Other Christian scholars understand sin to be fundamentally relational\u2014a loss of love for the Christian God and an elevation of self-love (\"concupiscence\", in this sense), as was later propounded by Augustine in his debate with the Pelagians.On Grace and Free Will (see Nicene and Post-Nicene Fathers, trans. P.Holmes, vol. 5; 30\u201331", "after": null, "start_char_pos": 3703, "end_char_pos": 4253}, {"type": "D", "before": "14\u201315", "after": null, "start_char_pos": 4271, "end_char_pos": 4276}, {"type": "D", "before": "). As with the legal definition of sin, this definition also affects the understanding of Christian grace and salvation, which are thus viewed in relational terms.For a historical review of this understanding, see R.N.Frost, \"Sin and Grace\", in Paul L. Metzger, Trinitarian Soundings, T", "after": null, "start_char_pos": 4277, "end_char_pos": 4563}, {"type": "D", "before": "T Clark, 2005.", "after": null, "start_char_pos": 4581, "end_char_pos": 4595}, {"type": "D", "before": "Original sin A Sistine Chapel fresco depicts the expulsion of Adam and Eve for transgressing God's command not to eat the fruit of the Tree of the knowledge of good and evil.", "after": null, "start_char_pos": 4596, "end_char_pos": 4770}, {"type": "D", "before": "This condition has been characterized in many ways, ranging from something as insignificant as a slight deficiency, or a tendency toward sin yet without collective guilt, referred to as a \"sin nature\", to something as drastic as total depravity or automatic guilt of all humans through collective guilt.", "after": null, "start_char_pos": 4800, "end_char_pos": 5103}, {"type": "D", "before": "The concept of original sin was first alluded to in the 2nd century by Irenaeus, Bishop of Lyon in his controversy with certain dualist Gnostics.\"In the person of the first Adam we offend God, disobeying His precept\" (Haeres., V, xvi, 3). Other church fathers such as Augustine also shaped and developed the doctrine,Patte, Daniel. The Cambridge Dictionary of Christianity. Ed. Daniel Patte. New York: Cambridge University Press, 2010, 892 seeing it as based on the New Testament teaching of Paul the Apostle (Romans and 1 Corinthians ) and the Old Testament verse of Psalms .Preamble and Articles of Faith - V. Sin, Original and Personal - Church of the Nazarene. Retrieved 13 October 2013.Are Babies Born with Sin? - Topical Bible Studies. Retrieved 13 October 2013.Original Sin - Psalm 51:5 - Catholic News Agency. Retrieved 13 October 2013. Tertullian, Cyprian, Ambrose and Ambrosiaster considered that humanity shares in Adam's sin, transmitted by human generation. Augustine's formulation of original sin after 412 CE was popular among Protestant reformers, such as Martin Luther and John Calvin, who equated original sin with concupiscence (or \"hurtful desire\"), affirming that it persisted even after baptism and completely destroyed freedom to do good. Before 412 CE, Augustine said that free will was weakened but not destroyed by original sin. But after 412 CE this changed to a loss of free will except to sin. Modern Augustinian Calvinism holds this later view. The Jansenist movement, which the Catholic Church declared to be heretical, also maintained that original sin destroyed freedom of will. Instead the Catholic Church declares that Baptism erases original sin.Catholic Church. \"The Seven Sacraments of the Church.\" Catechism of the Catholic Church. LA Santa Sede. 19 November 2019.", "after": null, "start_char_pos": 5104, "end_char_pos": 6907}, {"type": "D", "before": "Islam", "after": null, "start_char_pos": 6937, "end_char_pos": 6942}, {"type": "D", "before": "Sin is an important concept in Islamic ethics. Muslims see sin as anything that goes against the commands of God (Allah), a breach of the laws and norms laid down by religion. Islam teaches that sin is an act and not a state of being. It is believed that God weighs an individual's good deeds against his or her sins on the Day of Judgement and punishes those individuals whose evil deeds outweigh their good deeds. These individuals are thought to be sentenced to afterlife in the fires of jahannam (Hell).", "after": null, "start_char_pos": 6943, "end_char_pos": 7450}, {"type": "D", "before": "Islamic terms for sin include dhanb and kha\u1e6d\u012b\u02bea, which are synonymous and refer to intentional sins; khi\u1e6d\u02be, which means simply a sin; and ithm, which is used for grave sins.", "after": null, "start_char_pos": 7480, "end_char_pos": 7653}, {"type": "D", "before": "Judaism", "after": null, "start_char_pos": 7654, "end_char_pos": 7661}, {"type": "D", "before": "Judaism regards the violation of any of the 613 commandments as a sin. Judaism teaches that to sin is a part of life, since there is no perfect man and everyone has an inclination to do evil. Sin has many classifications and degrees, but the principal classification is that of \"missing the mark\" (cheit in Hebrew).Silver, Jonathan, host. \"Podcast: David Bashevkin on Sin and Failure in Jewish Thought.\" The Tikvah Podcast, The Tikvah Fund, 3 Oct. 2019. Some sins are punishable with death by the court, others with death by heaven, others with lashes, and others without such punishment, but no sins committed with willful intentions go without consequence. Sins committed out of lack of knowledge are not considered sins, since a sin cannot be a sin if the one who committed it did not know it was wrong. Unintentional sins are considered less severe URL", "after": null, "start_char_pos": 7691, "end_char_pos": 8547}, {"type": "D", "before": "Sins between people are considered much more serious in Judaism than sins between man and God. Yom Kippur, the main day of repentance in Judaism, can atone for sins between man and God, but not for sins between man and his fellow, that is until he has appeased his friend.Mishnah, Yoma,8:9 Eleazar ben Azariah derived", "after": null, "start_char_pos": 8548, "end_char_pos": 8865}, {"type": "D", "before": "this from the verse", "after": null, "start_char_pos": 8883, "end_char_pos": 8902}, {"type": "D", "before": ": \"From all your sins before God you shall be cleansed\" (Book of Leviticus, 16:30) \u2013 for sins between man and God Yom Kippur atones, but for sins between man and his fellow Yom Kippur does not atone until he appeases his fellow.Simon and Schuster, 1986, Nine Questions People Ask About Judaism, New York: Touchstone URL", "after": null, "start_char_pos": 8903, "end_char_pos": 9222}, {"type": "D", "before": "When the Temple yet stood in Jerusalem, people would offer Korbanot (sacrifices) for their misdeeds. The atoning aspect of korbanot is carefully circumscribed. For the most part, korbanot only expiate unintentional sins, that is, sins committed because a person forgot that this thing was a sin or by mistake. No atonement is needed for violations committed under duress or through lack of knowledge, and for the most part, korbanot cannot atone for a malicious, deliberate sin. In addition, korbanot have no expiating effect unless the person making the offering sincerely repents of his or her actions before making the offering, and makes restitution to any person who was harmed by the violation.", "after": null, "start_char_pos": 9252, "end_char_pos": 9952}, {"type": "D", "before": "Judaism teaches that all willful sin has consequences. The completely righteous suffer for their sins (by humiliation, poverty, and suffering that God sends them) in this world and receive their reward in the world to come. The in-between (not completely righteous or completely wicked), suffer for and repent their sins after death and thereafter join the righteous. The very evil do not repent even at the gates of hell. Such people prosper in this world to receive their reward for any good deed, but cannot be cleansed by and hence cannot leave gehinnom, because they do not or cannot repent. This world can therefore seem unjust where the righteous suffer, while the wicked prosper. Many great thinkers have contemplated this.", "after": null, "start_char_pos": 9953, "end_char_pos": 10684}, {"type": "D", "before": "Shinto The Shinto concept of sin is inexorably linked to concepts of purity and pollution. Shinto does not have a concept of original sin, instead believing that all human beings are born pure. Sin, also called Tsumi, is anything that makes people impure (i.e. anything that separates them from the kami). However, Shinto does not believe this impurity is the result of human actions, but rather the result of evil spirits or other external factors.", "after": null, "start_char_pos": 10714, "end_char_pos": 11163}, {"type": "D", "before": "Sin can have a variety of consequences in Japan, including disaster and disease. Because of this, purification rituals, or Harae, are viewed as important not just to the spiritual and physical health of the individual, but to the well-being of the nation.", "after": null, "start_char_pos": 11164, "end_char_pos": 11419}, {"type": "D", "before": "See also", "after": null, "start_char_pos": 11449, "end_char_pos": 11457}, {"type": "D", "before": "Actual sin Devil Ethics in religion Haram Internal sin Karma Morality Religious law Sin offering Taboo Wickedness", "after": null, "start_char_pos": 11458, "end_char_pos": 11571}, {"type": "D", "before": "Notes and references", "after": null, "start_char_pos": 11601, "end_char_pos": 11621}, {"type": "D", "before": "Further reading Fredriksen, Paula. Sin: The Early History of an Idea. Princeton: Princeton University Press, 2012. . Granoff; P E; Shinohara, Koichi; eds. (2012), Sins and Sinners: Perspectives from Asian Religions. Brill. . Hein, David. \"Regrets Only: A Theology of Remorse.\" The Anglican 33, no. 4 (October 2004): 5\u20136. Lewis, C.S. \"Miserable Offenders\": an Interpretation of", "after": null, "start_char_pos": 11622, "end_char_pos": 11998}, {"type": "D", "before": "sinfulness and", "after": null, "start_char_pos": 12016, "end_char_pos": 12030}, {"type": "D", "before": "Prayer Book Language", "after": null, "start_char_pos": 12049, "end_char_pos": 12069}, {"type": "D", "before": "about it", "after": null, "start_char_pos": 12087, "end_char_pos": 12095}, {"type": "D", "before": ", in series, The Advent Papers. Cincinnati, Ohio: Forward Movement Publications,", "after": null, "start_char_pos": 12113, "end_char_pos": 12193}, {"type": "D", "before": "196-", "after": null, "start_char_pos": 12211, "end_char_pos": 12215}, {"type": "D", "before": ". Pieper, Josef. The Concept of Sin''. Edward T. Oakes SJ (translation from German). South Bend, Indiana: St. Augustine's Press, 2001. Schumacher, Meinolf. S\u00fcndenschmutz und Herzensreinheit: Studien zur Metaphorik der S\u00fcnde in lateinischer und deutscher Literatur des Mittelalters. Munich: Fink, 1996.", "after": null, "start_char_pos": 12233, "end_char_pos": 12534}, {"type": "D", "before": "External links", "after": null, "start_char_pos": 12564, "end_char_pos": 12578}, {"type": "R", "before": "The Different Kinds of Sins (Catholic)", "after": "p", "start_char_pos": 12608, "end_char_pos": 12646}], "sents_char_pos": [0, 73, 144, 243, 357, 426, 591, 666, 797, 950, 1066, 1144, 1302, 1425, 1527, 1618, 1740, 1888, 2038, 2267, 2420, 2876, 3038, 3185, 3230, 3323, 3357, 3368, 3405, 3592, 3606, 3920, 4163, 4229, 4247, 4279, 4440, 4595, 4770, 5103, 5249, 5342, 5435, 5477, 5495, 5680, 5768, 5795, 5845, 5872, 5921, 5948, 6074, 6365, 6458, 6526, 6578, 6715, 6786, 6802, 6874, 6889, 6907, 6989, 7118, 7177, 7358, 7450, 7580, 7613, 7653, 7761, 7882, 8006, 8029, 8094, 8144, 8349, 8497, 8642, 8820, 9131, 9352, 9411, 9561, 9730, 9952, 10007, 10176, 10320, 10375, 10549, 10640, 10684, 10804, 10907, 11019, 11163, 11244, 11419, 11656, 11691, 11747, 11771, 11837, 11859, 11898, 12144, 12249, 12271, 12317, 12367, 12388, 12514, 12534]}
+{"doc_id": "2926739", "revision_depth": "1", "before_revision": "The pound fell for the first time since 1997 after the United States imposed economic sanctions on Sudan. The Sudanese pound continued its decline to an unprecedented number, falling to 53 pounds against the dollar. This situation, which drained all economic measures, led to heavy losses in the external repercussions of the Sudan as a whole, in the light of the government cut, interrupted by some of the failed actions announced by the Central Bank of Sudan, a severe shortage of liquidity. The Sudanese pound fell against the US dollar after the Central Bank of Sudan announced the lifting of the cash reserve to counter inflation. Since the secession of South Sudan in 2011, Sudan has suffered from a scarcity of foreign exchange for the loss of three-quarters of its oil resources and 80\\% of foreign exchange resources. The Sudanese government quoted the official price of the dollar from 6.09 pounds to 18.07 pounds in the budget of 2018 and 375.11 pounds in March 2021. The Egyptian pound was subdivided into 100 qirush (Arabic: , singular qirsh, , English: piastre). The qirsh used to be subdivided into 40 para, but decimalisation following the 1886 Egyptian currency reform established a 1/ 10 qirsh , which came to be known as a millim (, singular: ). Due to this legacy, the post 1956 Sudanese pound was divided into 100 qirush, subdivided into 10 millims. During 1958-1978 the pound was pegged to the U.S. dollar at a rate of $2.87156 per Sudanese pound. Thereafter, the pound underwent successive devaluations. The pound was replaced in 1992 by the dinar (SDD) at a rate of 1 dinar = 10 pounds. While the dinar circulated in northern Sudan, in Southern Sudan, prices were still negotiated in pounds, whilst in Rumbek and Yei, the Kenyan shilling was used and accepted more within the transport sectors as well as for hotels/accommodation. Second pound (SDG) According to the Comprehensive Peace Agreement between the government of the Republic of the Sudan and the Sudan People's Liberation Movement, the Central Bank of Sudan (CBOS) shall adopt a program to issue a new currency as soon as is practical during the Interim Period. The design of the new currency shall reflect the cultural diversity of Sudan. Until a new currency has been issued with the approval of the Parties on the recommendations of the CBOS, the circulating currencies in Southern Sudan shall be recognised. The second pound began introduction on 9 or 10 January 2007, and became the only legal tender as of July 1, 2007. It replaced the dinar at a rate of 1 pound = 100 dinars or 1 pound (SDG) = 1000 pounds (SDP). Third pound The third edition of the Sudanese pound was established on 24 July 2011 following the secession of South Sudan from the Republic of URL For a wider history surrounding currency in the region, see The History of British Currency in the Middle East. The Sudanese pound was devalued on 23 February 2021, with the official (indicative) exchange rate set to 375.08 Sudanese pounds per U.S. dollar (from the fixed rate of 55 pounds), closing the gap between the commercial and black market exchange rates. Coins Local coinage in Sudan: issues of the Mahdi and Khalifa and of Darfur In 1885, the Mahdi issued silver coins for 10 and 20 qirush and gold 100 qirush. These were followed by issues of the Khalifa in denominations of 10 para, 1, 2, 2\u00bd, 4, 5, 10 and 20 qirush. These coins were initially minted in silver in 1885. Over the following eleven years, severe debasement occurred, leading to billon, then silver-washed copper and finally copper coins being issued. The coinage ceased in 1897. During 1908-1914, a local coinage was issued in Darfur in western Sudan. These were issued under the authority of Ali Dinar and resembled contemporary Egyptian coins. First pound In 1956, coins were introduced in denominations of 1, 2, 5 and 10 millim, 2, 5 and 10 qirush. The millim denominations were struck in bronze, whilst the qirush denominations were in cupro-nickel. The 2, 5 and 10 millim were scallop shaped, although a round 5 millim was introduced in 1971. The 1 and 2 millim were last struck in 1969, the last 5 millim in 1978. In 1983, brass 1, 2 and 5 qirush, a reduced size 10 qirush and a cupro-nickel 20 qirush were introduced. In 1987, aluminium-bronze 1, 5, 10, 20, 25 and 50 qirush and 1 pound were introduced, with the 25 and 50 qirush square and octagonal in shape, respectively. In 1989, stainless-steel 25 and 50 qirush and 1 pound were issued. This is the general pattern, in addition to these coins there are collector-oriented issues and various oddities. See popular coin catalogues for details. Sudanese dinar See Sudanese dinar. Second pound Coins in denominations of 1, 5, 10, 20 and 50 qirush were introduced alongside the circulating dinar coins. The Central Bank of Sudan states that the 5 qirush coins are yellow coloured (perhaps aluminium-bronze) and the 10 qirush is silver coloured (made of stainless steel). The 20 and 50 qirush coins are bi-metallic, with the 20 qirush yellow ringed with a silver coloured centre and the 50 qirush the opposite. Banknotes First pound In April 1957, the Sudan Currency Board introduced notes for 25 and 50 piastres, 1, 5 and 10 pounds. Note production was taken over by the Bank of Sudan in 1961. 20-pound notes were introduced in 1981, followed by 50 pounds in 1984 and 100 pounds in URL . Sudanese dinar When introduced on 8 June 1992, the Sudanese dinar replaced the first Sudanese pound at a rate of 1:10. Questionable new notes In 2005, the National Public Radio of the United States reported that forces in Southern Sudan were printing pound notes bearing the name \"Bank of New Sudan\", but there is no such bank. In addition, numbers of the banknotes had duplicate serial numbers. Their legitimacy is questionable.New Sudan high denomination notes sought. Banknote News. Retrieved 2012-05-22.The Elusive Banknotes of New Sudan, Peter Symes, pjsymes.com.au. January 2011. Retrieved on 2014-03-09. Second pound When introduced on 10 January 2007, the second Sudanese pound replaced the Sudanese dinar at a rate of 1:100. This new currency was mandated by the 2005 Comprehensive Peace Agreement signed between the Sudanese government and the Sudan People\u2019s Liberation Movement to end the country\u2019s 21- year civil war. Deputy Governor Badr-Eddin Mahmoud said the cost to print the new currency was US$ 156 million. Banknotes of 1, 2, 5, 10, 20 and 50 pounds were issued. The 1-pound note was replaced by a coin at the end of November 2011. Banknotes of the Sudanese pound (2006 issue) Image Value Obverse Reverse Watermark Date of issue 1 Sudanese pound Central Bank of Sudan building, Khartoum; Pigeon Pigeons Pigeon and electrotype LS 1 July 9, 2006 2 Sudanese pounds Pottery Musical instruments Pigeon and electrotype LS 2 July 9, 2006 5 Sudanese pounds Ornate wall; satellite Hydroelectric dam Pigeon and electrotype LS 5 July 9, 2006 10 Sudanese pounds Tree in Tabaldia, clasped hands, watusi cattle, mountains, and camel People's Palace, Khartoum Secretary bird and electrotype LS 10 July 9, 2006 20 Sudanese pounds Machinery; oil derricks Factory; radio antenna; fruit (bananas, papayas, flowers, pineapples, citrus, grapes, corn) Secretary bird and electrotype LS 20 July 9, 2006 50 Sudanese pounds Wildlife (rhinoceros, elephants, ape in tree, water buffalo, zebras, and giraffe) Sheep, cow, goat, camels Secretary bird and electrotype LS 50 July 9, 2006 Banknotes of the Sudanese pound (2011 Modified colors issue) Image Value Obverse Reverse Date of issue 2 Sudanese pounds Pottery Musical instruments June 2011 5 Sudanese pounds Ornate wall; satellite Hydroelectric dam June 2011 10 Sudanese pounds Tree in Tabaldia, clasped hands, mountains, and camel People's Palace, Khartoum June 2011 20 Sudanese pounds Machinery; oil derricks Factory; radio antenna; fruit (bananas, papayas, flowers, pineapples, citrus, grapes, corn) June 2011 50 Sudanese pounds Wildlife (rhinoceros, elephants, ape in tree, water buffalo, zebras, and giraffe) Sheep, cow, goat, camels June 2011 50 Sudanese pounds Headquarters of the Central Bank of Sudan, standard gold bars of 400 oz. (12.4 kg), map of Sudan Fishing boats, Camels April 2018 100 Sudanese pounds Pyramids of Mero\u00eb Mero\u00eb hydroelectric dam January 2019 200 Sudanese pounds Wildlife Red Sea underwater fauna February 2019 200 Sudanese pounds Modern building, huts People with blackboard August 2019 500 Sudanese pounds Satellite dishes, National Telecommunications Corporation (NTC) Tower, Khartoum Refinery March 2019 New banknotes On 1 January 2019, the Central Bank of Sudan announced Sudanese pound banknotes of 100, 200 and 500 will be released this month as the country grapples with a severe economic crisis and cash shortage. A new 500 Sudanese pounds banknote dated March 2019 was issued in 2019.", "after_revision": "The pound fell for the first time since 1997 after the United States imposed economic sanctions on Sudan. The Sudanese pound continued its decline to an unprecedented number, falling to \u00a3SD53 against the dollar. This situation, which drained all economic measures, led to heavy losses in the external repercussions of the Sudan as a whole, in the light of the government cut, interrupted by some of the failed actions announced by the Central Bank of Sudan, a severe shortage of liquidity. The Sudanese pound fell against the US dollar after the Central Bank of Sudan announced the lifting of the cash reserve to counter inflation. Since the secession of South Sudan in 2011, Sudan has suffered from a scarcity of foreign exchange for the loss of three-quarters of its oil resources and 80\\% of foreign exchange resources. The Sudanese government quoted the official price of the dollar from \u00a3SD6.09 to \u00a3SD18.07 in the budget of 2018 and 375.11 pounds in March 2021. The Egyptian pound was subdivided into 100 piastres (Arabic: , singular qirsh, , English: piastre). The piastre used to be subdivided into 40 para, but decimalisation following the 1886 Egyptian currency reform established a 1/ 10pt , which came to be known as a millim (, singular: ). Due to this legacy, the post 1956 Sudanese pound was divided into 100pt, each subdivided into 10 millims. During 1958-1978 the pound was pegged to the U.S. dollar at a rate of $2.87156 per \u00a3SD1. Thereafter, the pound underwent successive devaluations. The pound was replaced in 1992 by the dinar (SDD) at a rate of 1 dinar = \u00a3SD10. While the dinar circulated in northern Sudan, in Southern Sudan, prices were still negotiated in pounds, whilst in Rumbek and Yei, the Kenyan shilling was used and accepted more within the transport sectors as well as for hotels/accommodation. Second pound (SDG) According to the Comprehensive Peace Agreement between the government of the Republic of the Sudan and the Sudan People's Liberation Movement, the Central Bank of Sudan (CBOS) shall adopt a program to issue a new currency as soon as is practical during the Interim Period. The design of the new currency shall reflect the cultural diversity of Sudan. Until a new currency has been issued with the approval of the Parties on the recommendations of the CBOS, the circulating currencies in Southern Sudan shall be recognised. The second pound began introduction on 9 or 10 January 2007, and became the only legal tender as of July 1, 2007. It replaced the dinar at a rate of \u00a3SD1 = 100 dinars or \u00a3SD1 pound (SDG) = \u00a3SD1,000 (SDP). Third pound The third edition of the Sudanese pound was established on 24 July 2011 following the secession of South Sudan from the Republic of URL For a wider history surrounding currency in the region, see The History of British Currency in the Middle East. The Sudanese pound was devalued on 23 February 2021, with the official (indicative) exchange rate set to \u00a3SD375.08 per U.S. dollar (from the fixed rate of \u00a3SD55), closing the gap between the commercial and black market exchange rates. Coins Local coinage in Sudan: issues of the Mahdi and Khalifa and of Darfur In 1885, the Mahdi issued silver coins for 10 and 20 qirush and gold 100 qirush. These were followed by issues of the Khalifa in denominations of 10 para, 1, 2, 2\u00bd, 4, 5, 10 and 20 qirush. These coins were initially minted in silver in 1885. Over the following eleven years, severe debasement occurred, leading to billon, then silver-washed copper and finally copper coins being issued. The coinage ceased in 1897. During 1908-1914, a local coinage was issued in Darfur in western Sudan. These were issued under the authority of Ali Dinar and resembled contemporary Egyptian coins. First pound In 1956, coins were introduced in denominations of 1, 2, 5 and 10 millim, 2pt, 5pt and 10pt. The millim denominations were struck in bronze, whilst the qirush denominations were in cupro-nickel. The 2, 5 and 10 millim were scallop shaped, although a round 5 millim was introduced in 1971. The 1 and 2 millim were last struck in 1969, the last 5 millim in 1978. In 1983, brass 1pt, 2pt and 5pt, a reduced size 10pt and a cupro-nickel 20pt were introduced. In 1987, aluminium-bronze 1pt, 5pt, 10pt, 20pt, 25pt and 50pt and \u00a3SD1 were introduced, with the 25 and 50 qirush square and octagonal in shape, respectively. In 1989, stainless-steel 25pt and 50pt and \u00a3SD1 were issued. This is the general pattern, in addition to these coins there are collector-oriented issues and various oddities. See popular coin catalogues for details. Sudanese dinar See Sudanese dinar. Second pound Coins in denominations of 1pt, 5pt, 10pt, 20pt and 50pt were introduced alongside the circulating dinar coins. The Central Bank of Sudan states that the 5pt coins are yellow coloured (perhaps aluminium-bronze) and the 10pt is silver coloured (made of stainless steel). The 20pt and 50pt coins are bi-metallic, with the 20pt yellow ringed with a silver coloured centre and the 50pt the opposite. Banknotes First pound In April 1957, the Sudan Currency Board introduced notes for 25pt, 50pt, \u00a3SD1, \u00a3SD5 and \u00a3SD10. Note production was taken over by the Bank of Sudan in 1961. 20-pound notes were introduced in 1981, followed by 50 pounds in 1984 and 100 pounds in URL . Sudanese dinar When introduced on 8 June 1992, the Sudanese dinar replaced the first Sudanese pound at a rate of 1:10. Questionable new notes In 2005, the National Public Radio of the United States reported that forces in Southern Sudan were printing pound notes bearing the name \"Bank of New Sudan\", but there is no such bank. In addition, numbers of the banknotes had duplicate serial numbers. Their legitimacy is questionable.New Sudan high denomination notes sought. Banknote News. Retrieved 2012-05-22.The Elusive Banknotes of New Sudan, Peter Symes, pjsymes.com.au. January 2011. Retrieved on 2014-03-09. Second pound When introduced on 10 January 2007, the second Sudanese pound replaced the Sudanese dinar at a rate of 1:100. This new currency was mandated by the 2005 Comprehensive Peace Agreement signed between the Sudanese government and the Sudan People\u2019s Liberation Movement to end the country\u2019s 21- year civil war. Deputy Governor Badr-Eddin Mahmoud said the cost to print the new currency was US$ 156 million. Banknotes of \u00a3SD1, \u00a3SD2, \u00a3SD5, \u00a3SD10, \u00a3SD20 and \u00a3SD50 were issued. The \u00a3SD1 note was replaced by a coin at the end of November 2011. Banknotes of the Sudanese pound (2006 issue) Image Value Obverse Reverse Watermark Date of issue \u00a3SD1 Central Bank of Sudan building, Khartoum; Pigeon Pigeons Pigeon and electrotype LS 1 July 9, 2006 \u00a3SD2 Pottery Musical instruments Pigeon and electrotype LS 2 July 9, 2006 \u00a3SD5 Ornate wall; satellite Hydroelectric dam Pigeon and electrotype LS 5 July 9, 2006 \u00a3SD10 Tree in Tabaldia, clasped hands, watusi cattle, mountains, and camel People's Palace, Khartoum Secretary bird and electrotype LS 10 July 9, 2006 \u00a3SD20 Machinery; oil derricks Factory; radio antenna; fruit (bananas, papayas, flowers, pineapples, citrus, grapes, corn) Secretary bird and electrotype LS 20 July 9, 2006 \u00a3SD50 Wildlife (rhinoceros, elephants, ape in tree, water buffalo, zebras, and giraffe) Sheep, cow, goat, camels Secretary bird and electrotype LS 50 July 9, 2006 Banknotes of the Sudanese pound (2011 Modified colors issue) Image Value Obverse Reverse Date of issue \u00a3SD2 Pottery Musical instruments June 2011 \u00a3SD5 Ornate wall; satellite Hydroelectric dam June 2011 \u00a3SD10 Tree in Tabaldia, clasped hands, mountains, and camel People's Palace, Khartoum June 2011 \u00a3SD20 Machinery; oil derricks Factory; radio antenna; fruit (bananas, papayas, flowers, pineapples, citrus, grapes, corn) June 2011 \u00a3SD50 Wildlife (rhinoceros, elephants, ape in tree, water buffalo, zebras, and giraffe) Sheep, cow, goat, camels June 2011 \u00a3SD50 Headquarters of the Central Bank of Sudan, standard gold bars of 400 oz. (12.4 kg), map of Sudan Fishing boats, Camels April 2018 \u00a3SD100 Pyramids of Mero\u00eb Mero\u00eb hydroelectric dam January 2019 \u00a3SD200 Wildlife Red Sea underwater fauna February 2019 \u00a3SD200 Modern building, huts People with blackboard August 2019 \u00a3SD500 Satellite dishes, National Telecommunications Corporation (NTC) Tower, Khartoum Refinery March 2019 New banknotes On 1 January 2019, the Central Bank of Sudan announced Sudanese pound banknotes of \u00a3SD100, \u00a3SD200 and \u00a3SD500 will be released this month as the country grapples with a severe economic crisis and cash shortage. A new \u00a3SD500 banknote dated March 2019 was issued in 2019.", "edit_actions": [{"type": "R", "before": "53 pounds", "after": "\u00a3SD53", "start_char_pos": 186, "end_char_pos": 195}, {"type": "R", "before": "6.09 pounds to 18.07 pounds", "after": "\u00a3SD6.09 to \u00a3SD18.07", "start_char_pos": 896, "end_char_pos": 923}, {"type": "R", "before": "qirush", "after": "piastres", "start_char_pos": 1022, "end_char_pos": 1028}, {"type": "R", "before": "qirsh", "after": "piastre", "start_char_pos": 1081, "end_char_pos": 1086}, {"type": "R", "before": "10 qirsh", "after": "10pt", "start_char_pos": 1203, "end_char_pos": 1211}, {"type": "R", "before": "100 qirush,", "after": "100pt, each", "start_char_pos": 1331, "end_char_pos": 1342}, {"type": "R", "before": "$2.87156 per Sudanese pound. Thereafter, the pound underwent successive devaluations. The pound was replaced in 1992 by the dinar (SDD) at a rate of 1 dinar = 10 pounds. While the dinar circulated in northern Sudan, in Southern Sudan, prices were still negotiated in pounds, whilst in Rumbek and Yei, the Kenyan shilling was used and accepted more within the transport sectors as well as for hotels/accommodation. Second pound (SDG) According to the Comprehensive Peace Agreement between the government of the Republic of the Sudan and the Sudan People's Liberation Movement, the Central Bank of Sudan (CBOS) shall adopt a program to issue a new currency as soon as is practical during the Interim Period. The design of the new currency shall reflect the cultural diversity of Sudan. Until a new currency has been issued with the approval of the Parties on the recommendations of the CBOS, the circulating currencies in Southern Sudan shall be recognised. The second pound began introduction on 9 or 10 January 2007, and became the only legal tender as of July 1, 2007. It replaced the dinar at a rate of 1 pound = 100 dinars or 1 pound (SDG) = 1000 pounds (SDP). Third pound The third edition of the Sudanese pound was established on 24 July 2011 following the secession of South Sudan from the Republic of URL For a wider history surrounding currency in the region, see The History of British Currency in the Middle East. The Sudanese pound was devalued on 23 February 2021, with the official (indicative) exchange rate set to 375.08 Sudanese pounds per U.S. dollar (from the fixed rate of 55 pounds), closing the gap between the commercial and black market exchange rates. Coins Local coinage in Sudan: issues of the Mahdi and Khalifa and of Darfur In 1885, the Mahdi issued silver coins for 10 and 20 qirush and gold 100 qirush. These were followed by issues of the Khalifa in denominations of 10 para, 1, 2, 2\u00bd, 4, 5, 10 and 20 qirush. These coins were initially minted in silver in 1885. Over the following eleven years, severe debasement occurred, leading to billon, then silver-washed copper and finally copper coins being issued. The coinage ceased in 1897. During 1908-1914, a local coinage was issued in Darfur in western Sudan. These were issued under the authority of Ali Dinar and resembled contemporary Egyptian coins. First pound In 1956, coins were introduced in denominations of 1, 2, 5 and 10 millim, 2, 5 and 10 qirush. The millim denominations were struck in bronze, whilst the qirush denominations were in cupro-nickel. The 2, 5 and 10 millim were scallop shaped, although a round 5 millim was introduced in 1971. The 1 and 2 millim were last struck in 1969, the last 5 millim in 1978. In 1983, brass 1, 2 and 5 qirush, a reduced size 10 qirush and a cupro-nickel 20 qirush were introduced. In 1987, aluminium-bronze 1, 5, 10, 20, 25 and 50 qirush and 1 pound were introduced, with the 25 and 50 qirush square and octagonal in shape, respectively. In 1989, stainless-steel 25 and 50 qirush and 1 pound were issued. This is the general pattern, in addition to these coins there are collector-oriented issues and various oddities. See popular coin catalogues for details. Sudanese dinar See Sudanese dinar. Second pound Coins in denominations of 1, 5, 10, 20 and 50 qirush were introduced alongside the circulating dinar coins. The Central Bank of Sudan states that the 5 qirush coins are yellow coloured (perhaps aluminium-bronze) and the 10 qirush is silver coloured (made of stainless steel). The 20 and 50 qirush coins are bi-metallic, with the 20 qirush yellow ringed with a silver coloured centre and the 50 qirush the opposite. Banknotes First pound In April 1957, the Sudan Currency Board introduced notes for 25 and 50 piastres, 1, 5 and 10 pounds. Note production was taken over by the Bank of Sudan in 1961. 20-pound notes were introduced in 1981, followed by 50 pounds in 1984 and 100 pounds in URL . Sudanese dinar When introduced on 8 June 1992, the Sudanese dinar replaced the first Sudanese pound at a rate of 1:10. Questionable new notes In 2005, the National Public Radio of the United States reported that forces in Southern Sudan were printing pound notes bearing the name \"Bank of New Sudan\", but there is no such bank. In addition, numbers of the banknotes had duplicate serial numbers. Their legitimacy is questionable.New Sudan high denomination notes sought. Banknote News. Retrieved 2012-05-22.The Elusive Banknotes of New Sudan, Peter Symes, pjsymes.com.au. January 2011. Retrieved on 2014-03-09. Second pound When introduced on 10 January 2007, the second Sudanese pound replaced the Sudanese dinar at a rate of 1:100. This new currency was mandated by the 2005 Comprehensive Peace Agreement signed between the Sudanese government and the Sudan People\u2019s Liberation Movement to end the country\u2019s 21- year civil war. Deputy Governor Badr-Eddin Mahmoud said the cost to print the new currency was US$", "after": "$2.87156 per \u00a3SD1. Thereafter, the pound underwent successive devaluations. The pound was replaced in 1992 by the dinar (SDD) at a rate of 1 dinar = \u00a3SD10. While the dinar circulated in northern Sudan, in Southern Sudan, prices were still negotiated in pounds, whilst in Rumbek and Yei, the Kenyan shilling was used and accepted more within the transport sectors as well as for hotels/accommodation. Second pound (SDG) According to the Comprehensive Peace Agreement between the government of the Republic of the Sudan and the Sudan People's Liberation Movement, the Central Bank of Sudan (CBOS) shall adopt a program to issue a new currency as soon as is practical during the Interim Period. The design of the new currency shall reflect the cultural diversity of Sudan. Until a new currency has been issued with the approval of the Parties on the recommendations of the CBOS, the circulating currencies in Southern Sudan shall be recognised. The second pound began introduction on 9 or 10 January 2007, and became the only legal tender as of July 1, 2007. It replaced the dinar at a rate of \u00a3SD1 = 100 dinars or \u00a3SD1 pound (SDG) = \u00a3SD1,000 (SDP). Third pound The third edition of the Sudanese pound was established on 24 July 2011 following the secession of South Sudan from the Republic of URL For a wider history surrounding currency in the region, see The History of British Currency in the Middle East. The Sudanese pound was devalued on 23 February 2021, with the official (indicative) exchange rate set to \u00a3SD375.08 per U.S. dollar (from the fixed rate of \u00a3SD55), closing the gap between the commercial and black market exchange rates. Coins Local coinage in Sudan: issues of the Mahdi and Khalifa and of Darfur In 1885, the Mahdi issued silver coins for 10 and 20 qirush and gold 100 qirush. These were followed by issues of the Khalifa in denominations of 10 para, 1, 2, 2\u00bd, 4, 5, 10 and 20 qirush. These coins were initially minted in silver in 1885. Over the following eleven years, severe debasement occurred, leading to billon, then silver-washed copper and finally copper coins being issued. The coinage ceased in 1897. During 1908-1914, a local coinage was issued in Darfur in western Sudan. These were issued under the authority of Ali Dinar and resembled contemporary Egyptian coins. First pound In 1956, coins were introduced in denominations of 1, 2, 5 and 10 millim, 2pt, 5pt and 10pt. The millim denominations were struck in bronze, whilst the qirush denominations were in cupro-nickel. The 2, 5 and 10 millim were scallop shaped, although a round 5 millim was introduced in 1971. The 1 and 2 millim were last struck in 1969, the last 5 millim in 1978. In 1983, brass 1pt, 2pt and 5pt, a reduced size 10pt and a cupro-nickel 20pt were introduced. In 1987, aluminium-bronze 1pt, 5pt, 10pt, 20pt, 25pt and 50pt and \u00a3SD1 were introduced, with the 25 and 50 qirush square and octagonal in shape, respectively. In 1989, stainless-steel 25pt and 50pt and \u00a3SD1 were issued. This is the general pattern, in addition to these coins there are collector-oriented issues and various oddities. See popular coin catalogues for details. Sudanese dinar See Sudanese dinar. Second pound Coins in denominations of 1pt, 5pt, 10pt, 20pt and 50pt were introduced alongside the circulating dinar coins. The Central Bank of Sudan states that the 5pt coins are yellow coloured (perhaps aluminium-bronze) and the 10pt is silver coloured (made of stainless steel). The 20pt and 50pt coins are bi-metallic, with the 20pt yellow ringed with a silver coloured centre and the 50pt the opposite. Banknotes First pound In April 1957, the Sudan Currency Board introduced notes for 25pt, 50pt, \u00a3SD1, \u00a3SD5 and \u00a3SD10. Note production was taken over by the Bank of Sudan in 1961. 20-pound notes were introduced in 1981, followed by 50 pounds in 1984 and 100 pounds in URL . Sudanese dinar When introduced on 8 June 1992, the Sudanese dinar replaced the first Sudanese pound at a rate of 1:10. Questionable new notes In 2005, the National Public Radio of the United States reported that forces in Southern Sudan were printing pound notes bearing the name \"Bank of New Sudan\", but there is no such bank. In addition, numbers of the banknotes had duplicate serial numbers. Their legitimacy is questionable.New Sudan high denomination notes sought. Banknote News. Retrieved 2012-05-22.The Elusive Banknotes of New Sudan, Peter Symes, pjsymes.com.au. January 2011. Retrieved on 2014-03-09. Second pound When introduced on 10 January 2007, the second Sudanese pound replaced the Sudanese dinar at a rate of 1:100. This new currency was mandated by the 2005 Comprehensive Peace Agreement signed between the Sudanese government and the Sudan People\u2019s Liberation Movement to end the country\u2019s 21- year civil war. Deputy Governor Badr-Eddin Mahmoud said the cost to print the new currency was US$", "start_char_pos": 1441, "end_char_pos": 6386}, {"type": "R", "before": "1, 2, 5, 10, 20 and 50 pounds", "after": "\u00a3SD1, \u00a3SD2, \u00a3SD5, \u00a3SD10, \u00a3SD20 and \u00a3SD50", "start_char_pos": 6413, "end_char_pos": 6442}, {"type": "R", "before": "1-pound", "after": "\u00a3SD1", "start_char_pos": 6460, "end_char_pos": 6467}, {"type": "R", "before": "1 Sudanese pound", "after": "\u00a3SD1", "start_char_pos": 6622, "end_char_pos": 6638}, {"type": "R", "before": "2 Sudanese pounds", "after": "\u00a3SD2", "start_char_pos": 6737, "end_char_pos": 6754}, {"type": "R", "before": "5 Sudanese pounds", "after": "\u00a3SD5", "start_char_pos": 6824, "end_char_pos": 6841}, {"type": "R", "before": "10 Sudanese pounds", "after": "\u00a3SD10", "start_char_pos": 6924, "end_char_pos": 6942}, {"type": "R", "before": "20 Sudanese pounds", "after": "\u00a3SD20", "start_char_pos": 7088, "end_char_pos": 7106}, {"type": "R", "before": "50 Sudanese pounds", "after": "\u00a3SD50", "start_char_pos": 7273, "end_char_pos": 7291}, {"type": "R", "before": "2 Sudanese pounds", "after": "\u00a3SD2", "start_char_pos": 7552, "end_char_pos": 7569}, {"type": "R", "before": "5 Sudanese pounds", "after": "\u00a3SD5", "start_char_pos": 7608, "end_char_pos": 7625}, {"type": "R", "before": "10 Sudanese pounds", "after": "\u00a3SD10", "start_char_pos": 7677, "end_char_pos": 7695}, {"type": "R", "before": "20 Sudanese pounds", "after": "\u00a3SD20", "start_char_pos": 7786, "end_char_pos": 7804}, {"type": "R", "before": "50 Sudanese pounds", "after": "\u00a3SD50", "start_char_pos": 7931, "end_char_pos": 7949}, {"type": "R", "before": "50 Sudanese pounds", "after": "\u00a3SD50", "start_char_pos": 8067, "end_char_pos": 8085}, {"type": "R", "before": "100 Sudanese pounds", "after": "\u00a3SD100", "start_char_pos": 8216, "end_char_pos": 8235}, {"type": "R", "before": "200 Sudanese pounds", "after": "\u00a3SD200", "start_char_pos": 8291, "end_char_pos": 8310}, {"type": "R", "before": "200 Sudanese pounds", "after": "\u00a3SD200", "start_char_pos": 8359, "end_char_pos": 8378}, {"type": "R", "before": "500 Sudanese pounds", "after": "\u00a3SD500", "start_char_pos": 8436, "end_char_pos": 8455}, {"type": "R", "before": "100, 200 and 500", "after": "\u00a3SD100, \u00a3SD200 and \u00a3SD500", "start_char_pos": 8653, "end_char_pos": 8669}, {"type": "R", "before": "500 Sudanese pounds", "after": "\u00a3SD500", "start_char_pos": 8777, "end_char_pos": 8796}], "sents_char_pos": [0, 105, 215, 493, 635, 826, 978, 1076, 1264, 1370, 1469, 1526, 1610, 1854, 2146, 2224, 2396, 2510, 2604, 2864, 3116, 3273, 3381, 3434, 3579, 3607, 3680, 3774, 3880, 3982, 4076, 4148, 4253, 4410, 4477, 4591, 4632, 4667, 4788, 4956, 5095, 5218, 5492, 5701, 5769, 5803, 5844, 5859, 5881, 5945, 5959, 5984, 6107, 6303, 6399, 6455, 6524, 6680, 6854, 7117, 7139, 7154, 7638, 7815, 7837, 7852, 7920, 8031, 8519, 8770]}
+{"doc_id": "29792853", "revision_depth": "1", "before_revision": "The Spirit of Democratic Capitalism is a 1982 bookNovak, The Spirit of Democratic Capitalism, 1982, Simon & Schuster, by philosopher Michael Novak, in which Novak aims to understand and analyze the theological assumptions of democratic capitalism, its spirit, it values, and its intentions. Novak defines democratic capitalism as a pluralistic social system that contrasts with the unitary state of the traditional society and the modern socialist state. He analyzes it as a differentiation of society into three power centers: a political sector, an economic sector, and a moral-cultural sector. Each sector needs the others. Democracy needs the market economy and both need a pluralistic liberal culture. Against the continuing growth of democratic capitalism, modern socialism has contracted from a robust utopian program into vague \u201c idealism about equality \u201d and overwrought criticism of capitalism, most notably in the \u201cliberation theology\u201d of Latin America. Novak ends with the \u201c beginnings of a theological perspective on democratic capitalism \u201d illuminated by the journey from Marxism to realism of Reinhold Niebuhr. Irving Kristol described Novak's book as \u201c unquestionably a major work for our times. \u201d The Spanish translation of the book served as inspiration for the Chilean lawyer and politician Jaime Guzm\u00e1n where he was not satisfied by Hayeks thought. No theologian \u201c has yet assessed the theological significance of democratic capitalism \u201d ,(p13) the society of \u201c three dynamic and converging systems functioning as one: a democratic polity, an economy based on markets and incentives, and a moral-cultural system which is pluralistic and, in the largest sense, liberal. \u201d (p14) The link is not an accident. You can only have democracy with a market economy, nourishing and nourished by a pluralistic liberal culture: a threefold system. Democratic capitalism requires economic growth, the \u201c belief of all individuals that they can better their condition. \u201d (p15) Without growth and social mobility democracy devolves into the Hobbesian \u201c war of all against all. \u201d The treatments of democratic capitalism by religious writers, in papal encyclicals and mainline Protestant theology, have not really understood its essence. So democratic capitalism needs a moral theory about itself, to define a \u201c political economy most consonant with Judaic tradition and the Christian gospels \u201d .(p20) Capitalism is neither Heaven nor Hell. \u201c Yet all other known systems of political economy are worse. \u201d (p28) People hate capitalism; its successes do not impress the \u201c poets and philosophers and priests \u201d (p31) \u201c The more it succeeds, the more it fails. \u201d (p32) Intellectuals indict capitalism for all kinds of sins: affluence, moral weakness, and vulgar taste. The intellectuals that do defend capitalism have not made a broad enough case. \u201c What is the spirit of democratic capitalism? \u201d (p36) Max Weber saw that commerce takes on a new meaning, or spirit in capitalist countries. Capitalism's spirit required free labor, practical intelligence, planned and organized for profit in a continuous enterprise in a stable network of law operating mainly in cities and towns. But Weber did not see the \u201c necessary connection between economic liberty and political liberty. \u201d (p45) It is not just \u201c an economic system dependent upon a moral spirit \u201d .(p46) Rather than being an \u201ciron cage\u201d \u201c democratic capitalism is demonstrably open \u201d (p47); it reinvents itself constantly. \u201c The spirit of democratic capitalism is the spirit of development, experiment, adventure. It surrenders present security for future betterment. In differentiating the economic system from the state, it introduced a novel pluralism into the very center of the social system. \u201d (p48) The big idea in democratic capitalism is pluralism. A traditionalist or socialist society \u201c imposes a collective sense of what is good and true... exercised by one set of authorities. \u201d (p49) But can society work if no-one is in control? Many people, from Solzhenitsyn to popes, find such a society immoral and chaotic. Social scientists find it sickening, as producing anomie, alienation, etc. The founders of democratic capitalism \u201c feared absolutism more than they feared pluralism. \u201d (p52) In a plural society, people can question things. One can step out from under one's \u201csacred canopy\u201d and experiences \u201c culture shock. \u201d \u201c In a genuinely pluralistic society, there is no one sacred canopy. \u201d (p53) Society is renewed by crises of conscience, the \u201c taproot of democratic capitalism. \u201d (p55) Pluralism avoids the single \u201csacred canopy\u201d by design. The founders deliberately separated economic institutions from the state, and limit the power of clerical and state bureaucrats to meddle in the economy. Political activists compete in the political sector, economic activists in the economic sector and religious and intellectual activists in the moral-cultural sector. By design it is hard for any one person to get power over all three sectors. But the three sectors need each other. Capitalism needs a moral culture to nourish \u201c self-restraint, hard work, discipline and sacrifice \u201d (p57) and a political system committed to limited government, a sound currency, and regulation of competition. The authors of The Federalist Papers wanted to avoid the tyranny of the majority, so they constructed a political \u201c system which would empower many factions and interests. \u201d (p58) No single group would be trusted with the common good, but gathered together, the combination of interests should \u201c strike not to far off the mark. \u201d (p58) But this practical wisdom has been preempted by the utilitarians, and then accused by idealists of being merely utilitarian \u201c interest-group liberalism. \u201d Novak prefers to use his own Thomist tradition, recognizing the \u201c dangers inherent in idealism, the uniqueness of the person, and the special advantages of the practical... order. \u201d (p59) We are born into a social world, into families, and only later become individuals. The system of the founders institutionalizes this in three steps. First it recognizes that all right-thinking people of goodwill do not hold the same moral vision. The second thing is to differentiate \u201c between and individual and a person. \u201d (p63) \u201c Personhood entails the right--the vocation--to be different. Third, it calls for a secular or civic faith. Thus the US Constitution: \u201c a practical, rather than creedal, vision of the good society. \u201d (p66) It does less than command the socialist virtues; it does more than license =mere interest group horse-trading. \u201c A democratic capitalist society is, in principle, uncommitted to any one vision of a social order. \u201d (p67) Therefore, moral-cultural institutions belong to the system, but they must not command the system. Religious bodies have a role. \u201c But it is neither in command nor at the center. \u201d (p69) Democratic capitalism has a particular view of history. It is the notion of \u201c emergent probability. \u201d It thinks of the world as an emerging system of goods of order as developed by Bernard Lonergan. Adam Smith\u2019s The Wealth of Nations was an attempt to understand how the world might be organized to provide such goods \u201c so as to raise the wealth of all nations. \u201d (p77) It proposed organizing the world not from the top down but from the bottom up, \u201c to empower the rationality of every individual. \u201d (p79) It is not sufficient, but it is necessary. \u201c Political economy must deal with humans as they are \u201d ,(p82) including evil. Each system identifies the greatest evil. For traditional societies it is disorder, for socialist societies, inequality, for democratic capitalist societies it is tyranny. In democratic capitalism we turn attention from \u201c the moral intentions of individuals and toward the final social consequences of their actions. \u201d (p89) This results in affording high status to commerce and industry. The clergy is fanatic, the military plundering, the nobles proud and belligerent, the state parasitic. But commerce aligns with liberty, requires a \u201chealthy realism\u201d and is insensitive to station and class, and it provides a center of power separate from politics. Leftists accuse capitalism of institutionalizing selfishness and greed. But \u201c self-interest \u201d is something more. Quoting Milton and Rose Friedman: \u201c Self-interest is not myopic selfishness. It is whatever it is that interests the participants, whatever they value, whatever goals they pursue. \u201d (p94) It includes interest in the religious, moral, scientific and just. Democratic capitalism recognizes that sinfulness cannot be eradicated. It tries to make sinful tendencies productive and creative. When Thomas Aquinas abandoned God as Nous for Providence he created a problem for politics: \u201c how can political economy be Provident? \u201d (p96) It takes more than theory; it takes practical intelligence and wisdom in as it relates to \u201c time, the market, the so-called invisible hand, profit, and the zero-sum society \u201d (p97). Under democratic capitalism time takes on a new meaning. People start looking forward to the future instead of back to the past. They break out of eternal cycles and experiment. Time is money, and people are advised not to waste it. Religion becomes activist rather than meditative. When people become concerned about time as an asset, they intelligently organize life into time saving habits. Such practical intelligence increases wealth. \u201c Practical insights are the primary cause of wealth. \u201d (p103) Intuitively, when millions of people enter the marketplace the result must be anarchy. \u201c Traditionalists and socialists... occupy the commanding heights and try to impose order. \u201d (p104) In fact, economic activism promotes order; under scarcity people need one another, and must coordinate their activities through the price system. Adam Smith\u2019s metaphor of the \u201cinvisible hand\u201d tells us is that the motives of individuals do not determine the social result of their actions. There seems to be an order, a system \u201c beneath the seeming individuality of individual choices. \u201d (p114) Rational order may exist without rational commands from on high. Markets always get a bad press: Mammon, usury, and incompatibility with humane values, and so on. But commercial values furnish \u201c a school of virtue favorable to democratic governance. \u201d (p117) It encourages \u201c the cooperative spirit \u201d, the \u201c attention to law \u201d , self-determination, limited government and encouragement to industry, the discipline of common sense, attention to the small savings and small gains that power economic growth. It breaks the utopian vision that fails to deliver. It is \u201c proportioned to man as he is, not as dreams would have him \u201d .(p118) But there are losses, to old communal ties and the heroic spirit. \u201c Commercial virtues are not, then, sufficient to their own defense. [It] needs taming and correction by a moral-cultural system... [and] by the political system and the state. \u201d (p121) The socialist ideal is the quest for \u201c security and equality \u201d , the capitalist for \u201c self-improvement and growth \u201d .(p123) But risks cannot be avoided in making the world predictable and safe. It creates a zero-sum society foredoomed to failure. Democratic capitalism, committed to growth offers the hope of a larger future to all. It is not utopian, but it offers \u201c a practical wisdom worthy of admiration \u201d (p126), a \u201c plain sort of wisdom suited to this world. \u201d (p126) The meaning of community in traditional society is clear. \u201c Yet pluralistic societies develop their own powerful forms of community... of free persons in voluntary association. \u201d (p129) This community is \u201c accessible to all human beings without exception \u201d in the world. Democratic capitalism has developed \u201c a novel social instrument: the voluntary association committed to business enterprise, the corporation. \u201d (p130) I.e., the flagship institution of capitalism is social, corporate. Commercial civilization is interdependent. The community depends on an ethos of cooperation. \u201c Cultures in which individuals are not taught how to cooperate, compromise, and discipline themselves to practical communal tasks can make neither democratic politics nor market economies work. \u201d (p134) \u201c Between individualism and collectivism, there is a third way: a rich pattern of association. \u201d (p135) It is a community of \u201c colleagueship... an ethos of association, teamwork, and collaboration, oriented towards goals, voluntarily entered into. \u201d (p138) And these associations make the conventional notions of \u201c \u2018the consumer society\u2019, \u2018greed\u2019, and \u2018materialism\u2019 seem very wide of the mark. \u201d (p141) Democratic capitalism aims to guarantee the pursuit of happiness. Humans being social animals, they must \u201c build decent and even affective relations among those who work together \u201d (p142) in that pursuit. Everyone knows that the term \u201cbourgeois\u201d is not a compliment. Yet when democratic socialists list the values of their society they sound middle-class. Perhaps the problem occurs because the supporters of democratic capitalism advertise themselves as individualists when, \u201c under the mask \u201d they are profoundly communitarian. In Adam Smith\u2019s The Theory of Moral Sentiments he emphasizes \u201c fellow feeling, common sympathy, and benevolence \u201d ,(p145) while The Wealth of Nations he condones \u201c self-love and self-interest. \u201d But who isn't bourgeois, i.e., own their home and private property, these days? Small businessmen, pension plan participants, academic critics. The game is to \u201c redefine the bourgeoisie to fit the Marxian scheme in which one class oppresses another. \u201d (p151) It ends up defining the elite as an elite. What's the problem? A bourgeois has \u201c economic independence... owns property... shares the cultural life of the city \u201d (p152) And the bourgeoisie is open to all. A noble can descend and join it, and a peasant or proletarian can aspire and rise to it. The bourgeoisie practice high standards and competitive habits. Nor is it particularly \u201c self-satisfied, secure, or smug. \u201d (p153) Middle class culture makes fun of the middle class. \u201c Latin American liberation theologians and others.. may threaten retribution upon the bourgeois class, but... they also appeal to the ideals of the middle class \u201d .(p154) \u201c Bourgeois life is thick with activism, volunteerism, and mutual association. \u201d (p154) And it is prepared to listen to criticism. Although democratic capitalism is \u201c designed to function with minimal dependence upon virtuous motives... [it] cannot function at all without certain moral strengths, rooted in institutions like the family. \u201d (p156) Yet many critics are hostile to what they call the \u201c nostalgic family. \u201d They attack on three axes: economic, political, and moral-cultural. Even libertarians center their analysis on the free individual and \u201c rational self-interest. \u201d But \u201c in ordinary experience, our own economic starting place in life is given us by our families. \u201d (p161) We have been thrown into life as \u201cfamilial animals\u201d for the \u201c family is the major carrier of culture, transmitting ancient values and lessons... motivations... judgement... emotion, preferences and inclinations. \u201d (p161) \u201c In the long run, the individual economic agent is dead. Only his progeny survive to enjoy the fruits of his labors, intelligence and concern. \u201d (p163) \u201c But if the family is a form of socialism which corrects the exaggerated individualism of capitalist economists, it is also a form of liberty which corrects the exaggerated collectivism of statists. \u201d (p163) \u201c The more the state invades the family, the less likely the prospect of self-government. \u201d (p165) The family is the first defense against utopianism. \u201c Those who seek moral perfection, full self-fulfillment, high happiness \u201d are opposed to \u201c the constraints of matrimony and childrearing. \u201d (p167) The family is nature's school of virtue. It teaches humility, \u201c ordinary heroism, \u201d self-governance, self-discipline, and critical judgment. The bourgeois family is different from the aristocratic family and its inherited status, the peasant family, the extended ethnic family. It is pluralistic, adaptable, nuclear, trans-cultural. And now it must deal with the post-bourgeois elite family that wants to \u201cfind\u201d rather than \u201cbetter\u201d itself. \u201c When self-government is no longer an ideal for individuals, it cannot be credible for the republic. \u201d (p170) The pluralism of democratic capitalism affects everything, and not least the rivalries between the three systems: political, economic, and moral-cultural. Each has its ethos and creates problems for the other two. This is by design, for the energy of conflict powers progress and correction. \u201c It is a system intended to constitute a continuous revolution. \u201d (p172) The political system is separate from the moral-cultural system, but \u201c clergymen and journalists, preachers and professors often place enormous pressures on the state \u201d (p172) on behalf of their moral vision. The political system is also separate from the economic system, yet profoundly affected by it. Still, the political system also has enormous power over the economic system, through the people that work for it and those dependent on the political system for \u201c grants, payments, and favors \u201d (p173). Legislative action has politicized moral and cultural issues from regulation of business to the role of women, homosexuality, abortion, real estate, busing, and educational experiments. \u201c The political system... encroaches significantly upon the economic system and the moral-cultural system. \u201d (p174) Leaders of both the political and moral-cultural system combine in harsh criticism of the economic system. Their exaggerations omit what the economic system has done for democracy and for providing the wealth to found schools, churches, foundations, and freedom for artists and preachers. Many critics fault capitalism for lack of democracy, as if it is appropriate for \u201c every inquiry and action. \u201d (p175) But well-managed corporations all use the principle of subsidiarity, pushing decisions down the hierarchy. The economic system creates problems for government because it is designed to. \u201c The virtues it requires, and the virtues it nourishes, are indispensable to a self-governing polity and to a sound morality. \u201d (p181) The moral-cultural system in the United States seems \u201c the least developed, most neglected, most delinquent system... and it has become the most powerful, most ambitious, most dominating system. \u201d (p182) It has many strengths, vibrant churches, arts, and moral movements. Ideas have consequences, and moral-cultural power is subject to the same temptations as economic and political power if attempts \u201c to dominate both the state and the economy. \u201d Two temptations are the power and status available to those that help grow the state, and the notoriety available to those that debunk institutions and values that stand in the way of their own morality, culture, and politics. What does socialism stand for today? It seems to have shrunk to \u201c idealism about equality... and hostility towards democratic capitalism \u201d (p189) rather than the grand program of the \u201c abolition of private property... state ownership of the means of production... abolition of \u2018bourgeois democracy\u2019... and an international order... transcending... frontiers... abolition of profit, abolition of imperialism... \u2018socialist man.\u2019 \u201d (p190) In many ways, socialism has failed. in the economic sphere, nationalized industries, collectivized agriculture, administered prices and wages. In the political sphere, \u201c the centralized administrative state has proved to be a more thorough instrument of oppression and exploitation than the democratic capitalist state. \u201d (p191) In the moral-cultural sphere socialism fails to tolerate \u201c the broad range of dissent, human liberties, and human rights achieved in the democratic capitalist states. \u201d (p191) Serious thinkers like C. Wright Mills and Leszek Ko\u0142akowski admit that socialism is seriously discredited. It survives as \u201c a mobilizing stencil for grievances... and to love as a \u2018totalitarian political movement.\u2019 \u201d (p195) \u201c Socialists seem to be in retreat both from theory and from program. \u201d (p197) They define socialism as a set of moral injunctions on poverty, inequality, and democracy. The young Novak thought of socialism as idealism; capitalism worked better, but it was \u201c an inferior ideal. \u201d (p198) Yet Jacques Maritain found Americans, in the crucible of capitalism, \u201c the most humane and the least materialist among modern [industrialized] peoples \u201d .(p199) Novak came to see something else. Socialism required no moral heroism in him. If it failed, the workers and the poor would suffer most. Socialism may seem to be an injunction on poverty, inequality in freedom of action, and basic needs, but it pretty soon becomes \u201c raising up the poor and pulling down the rich. \u201d (p202) It allows a monstrous government and ignores the source of economic dynamism\u2014serious intellectual errors. Democratic capitalism can do all this, but balances the competing injunctions\u2014especially the question of \u201c [w]ho will govern government? \u201d (p203) Anyway, \u201c equal freedom of action for all \u201d is impossible. Without an ear for music, you cannot compete in music, etc. Socialists see inequality as an affront; democratic capitalists see talent as a responsibility. One way in which socialists dodge its failure is a commitment to \u201cdemocratic control\u201d of the means of production. The fact is that participatory democracy does not work in the moral-cultural realm\u2014religion, arts, literature\u2014or in the economic realm of economic choices about the future. Most people don't want to spend long hours in \u201cparticipation,\u201d although the US excels already in associations, committees and groups. Even though \u201c [M]ost democratic socialists recognize that strict equality of incomes is unworkable and also unjust \u201d ,(p211) extreme disparities seem to be \u201cimmoral.\u201d Small entrepreneurs are OK but corporate salaries are \u201cobscene.\u201d There is a need for \u201cmoral restraint\u201d . Still, the extravagance of the rich is the difference between socialist drabness and urban brightness and gaiety. The rich pay for foundations that employ scholars, museums, galleries, universities, new business and technology investments. In democratic capitalism you can change your life with skill and luck; in socialism the \u201c only path upward is political favor. \u201d Suppose we accept the idea of democratic socialists that highly skilled workers only earn eight times the wage of the lowest paid, as in Cuba? Actually in the United States in 1979 the top five percent earned a little less than seven times the average income of the lowest 20 percent. But 0.5 percent earn more than 10 times the poorest. Democratic socialists call this a scandal; democratic capitalists do not, because these higher incomes don't hurt the lower paid and a society with unlimited incomes is \u201c more dynamic, freer, more generous, more colorful \u201d (217) than one without. And, of course, the rich pay a lot more in taxes. A special problem for the United States is the relative poverty of blacks relative to whites. Leftist Democrats insist on government programs rather than \u201c personal initiative. \u201d Actually, according to Thomas Sowell, most blacks are \u201c disciplined, ambitious, hardworking, and conscientious in seizing opportunity.(p219) In the long view, blacks have done well. In 1900 blacks lived under segregation in the poorest part of the country. Today, \u201c Black households with two parents under age thirty-five, living in the North, do better than equivalent white households. \u201d (p221) Still, blacks demonstrate more social pathology than whites. A catalyst is necessary. \u201c The spirit of democratic socialism... seems designed to prevent such a catalyst from ever emerging. \u201d (p224) Though socialists are hostile to transnational corporations, in early 1980 socialist leader Robert Mugabe wanted to welcome them to Zimbabwe. For Mugabe, \u201c socialism accepts the brotherhood of man. \u201d (p225) But what are the corporation, the labor union, banking, the stock exchange if not communal, depending on trust beyond force, contracts, and law? Critics accuse transnational corporations of wanting to manage the world and various other crimes against developing nations. \u201c \u2018Manage the world\u2019 is the aim of socialism, not the aim of market systems. \u201d (p228) Anyway, if economic aid comes not through corporations, then what? All criticisms of corporations come down to: compared to what? A huge task awaits theologians in thinking theologically about economic reality at three levels. They must understand economic reality (scarcity, work, money, capital accumulation, etc.) in every economic system in every age. They must understand the specific systems on offer, from feudalism to mercantilism to capitalism and socialism. Then they must understand the details, the moral and ethical dilemmas that \u201c occur within particular systems. \u201d (p240) Novak's book is intended to fill the vacuum in understanding democratic capitalism, for he thinks that \u201c the actual practice of democratic capitalism is more consistent with the high aims of Judaism and Christianity than the practice of any other system. \u201d (p242) Obviously church criticism, particularly Catholic, of capitalism has been distinctly biased against it, at least until Pope John Paul II. This is probably due to a misunderstanding of Anglo-Saxon \u201cindividualism\u201d by the continental Catholic hierarchy and that \u201c the discoveries of modern economics seem to have affected it hardly at all. \u201d (p241) Many Christian thinkers have sought an accommodation with socialism and its program to end poverty and oppression. For those espousing a Christian Marxism this means a Marxism emptied of everything: atheism, materialism, collectivization or one-party rule. In the US John A. Ryan proposed a Catholic alternative to state socialism that inspired a Bishops\u2019 \u201c Program for Social Reconstruction \u201d in 1919 that came close to FDR's New Deal. More recently, Catholic bishops have moved decisively against capitalism, helping the poor with statist programs, rather like secular socialists. These thinkers seem to give socialist plans the benefit of every doubt, while according none to democratic capitalism in its actual character. Meanwhile, socialism \u201c has been dying the death of a thousand qualifications. \u201d (p254) Juergen Moltmann has developed a theology of Christian socialism. It owes more to Hegel than to Aquinas. This \u201c theology of hope \u201d turns to the future and Christian hope. It breaks away from \u201c the struggle of the individual soul \u201d and emphasizes the social (i.e. political) nature of the Christian vocation. Moltmann is critical of both Stalinism and capitalism. He endorses democracy and socialism. \u201c The oppressed hold in their hand the key for the liberation of mankind from oppression. \u201d (p258) Thus the poor are \u201c objects, victims, and finally a messianic class sent to save the rich. \u201d (p258) Moltmann wants to subordinate economics to theology. Capitalism is \u201c outside the law, destructive of true community... monetary... inspiring wolflike animosity between man and man \u201d (p262) and madly pursuing growth for growth's sake and work for work's sake. Molmann defines his \u201csocialism\u201d as responding to five vicious circles in the world today: poverty, force, racial and cultural alienation, industrial pollution of nature, senselessness and godforsakenness. Thus socialism no longer rests on a concrete program but becomes a \u201c symbol for large and grand ideals. \u201d (p270) He \u201c exhibits high confidence in governmental control over life... commends the distribution of wealth and a no-growth economy... respects political and moral-cultural liberties, but not economic liberties... a return to premodern conceptions. \u201d (p270) In Latin America the socialist myth \u201c unites the political system, the economic system, and the moral-cultural system under one set of authorities. \u201d (p272) It inspires the most heavily armed states. And it provides an excuse. Catholic bishops ignore Catholic economic teachings of four hundred years to blame the United States for Latin American poverty. It's the Marxist stencil: \u201c If I am poor, my poverty is due to malevolent and powerful others. \u201d (p273) Adam Smith drew attention to the two American experiments in 1776, one \u201c based on the political economy of southern Europe \u201d and the other \u201c launching a new idea. \u201d (p274) So why is Latin America behind? Hugh Trevor-Roper unearthed one reason. Entrepreneurial businessmen, Christian and Jewish, were driven from Spain by an \u201c alliance of church and state \u201d that \u201c banned or restricted enterprise in the private sector. \u201d (p277) Yet in 1969 the Catholic bishops of Peru said \u201c we are the victims \u201d and in 1974 the Catholic bishops in the US wrote that the \u201cunchecked liberalism\u201d of profit, competition, and private ownership led to \u201cdictatorship\u201d in Latin America.(p280) This embarrassing economic ignorance demonstrates a failure to grasp \u201c relevant economic reality. \u201d Socialism is as centralizing as it can get, and the Soviet Empire an extreme example of centralization. Yet Marxist thought \u201c today uses the theory of center and periphery as an accusation against democratic capitalism. But every energetic pulse of economic activity become a \u201ccenter.\u201d The theory is just another way of explaining the poverty of the poor by the wealth of the wealthy. Beginning in 1968 Roman Catholic bishops in Latin America began to develop a \u201cliberation theology\u201d based upon reading the Scriptures as a story of liberation. They applied Scripture not to individuals but to \u201c social structures and economic systems. \u201d (p288) The Anglo-Saxon Whig tradition of liberty is little known, but the \u201c widespread Latin American antipathy towards commerce... is married... to a widespread desire for an integral, holistic, unitary system. \u201d (p289) There is a vacuum \u201c into which liberation theology rushes. \u201d (p289) Religious liberation becomes a this-worldly \u201c struggle for revolution against tyranny and poverty. \u201d (p290) As well as local oppressors, \u201c unfair terms of trade \u201d enrolls international capitalism as the global oppressor. Of course, liberation theology, while specific in its critique of capitalism, is \u201c vague and dreamy \u201d about its program and about the institutions that will replace the old after the revolution. It is enough to know that capitalism \u201c fosters individualism, competition, materialism, and greed. Socialism offers an alternative set of values, which stress the virtues of participation, community, equality, and sacrifice. \u201d (p295) Liberation theologians defend the stagnation of socialist economies such as Cuba; at least the Cubans \u201c claim to supply basic necessaries to all the poor. \u201d (p295) Liberation theologians choose help for the poor now over a better future in a growing economy. Latin Catholic culture is different from northern European culture. Cultural choices in economic affairs make a difference. Archbishop Helder Camara of Brazil says that is sad that 80 percent of the world's resources are at the disposal of 20 percent of its inhabitants. But these resources were discovered within the last 200 years; the combustion engine, oil wells were discovered under Northern European Protestant culture. So we could say that it is marvelous that 80 percent of the world's resources have been discovered by one of the smaller cultures, and made available for use in every continent. But more needs to be done. \u201c Nothing prevented Brazilians from inventing the combustion engine, the radio, the airplane, penicillin \u201d .(p300) But they didn't. Writes Gustavo Gutierrez in A Theology of Liberation: \u201c The underdevelopment of poor nations... is... the sub-product of the development of other countries... [T]he capitalist system... [creates] a center and a periphery... progress and riches for the few, and... poverty for the majority. \u201d Joseph Ramos prepared an economic critique of Gutierrez for the Catholic bishops in 1970. Center and periphery is a truism. Of course any economically active locale is a center. Nor is wealth created in one place subtracted from another. There is far more wealth today than 200 years ago. All peoples have benefited. Nor is the US to blame for Latin American dependency. Only 5 percent of US investment is made abroad. Seventy percent of US exports go to developed countries. Return on US investments in Latin America is not particularly high, relative to other countries. Gutierrez's notion of class conflict applies to static economies. Where there is growth there can be \u201c relations of mutual advantage and cooperation. \u201d (p306) Nor will class struggle disappear with the abolition of private property. \u201c Struggle over the political allocation of power and goods is historically one of the most bitter forms for struggle. \u201d (p307) Despite all this, Latin America has done well economically. Since World War II, growth has averaged 5.2 percent per year, and real wages and salaries have increased by 2 percent per year, better than the US in 1865-1914. Latin Americans are closing the \u201c technological, organizational and management gaps \u201d (p309) to produce a revolution in \u201c human capital. \u201d But this revolution has not yet reached the bottom. In 1970 about 40 percent lived below the poverty line and 20 percent in destitution. To raise the destitute and poor to the poverty line would cost about 5 percent of GNP. So the \u201c economic capacity is present. \u201d (p311) But the political will may be lacking. Writing about institutions, liberation theologians favor socialism. Writing about individuals they favor \u201c economic independence, self-reliance, personal creativity \u201d .(p312) \u201c Their rage against the existing order... prevents them from thinking institutionally about how to devise checks and balances against corporate power, while using it creatively to check clerical and military power. They have not thought theologically about the vocation of laymen and laywomen in the world, particularly in commerce and industry. \u201d (p313) They do not think about using the commercial class to limit the power of traditional elites. There is no vision of the liberation available from democratic capitalism. \u201c [T]heir path to liberation is ill-defended against state tyranny. \u201d (p314) They need to avoid the temptation that socialism is a more \u201cnoble way\u201d than the \u201clowly\u201d path of realistic democratic capitalism. Reinhold Niebuhr was a Christian from the German Reformed tradition. He started as a Christian Marxist and ended up more or less accepting the culture of democratic capitalism. He began by recommending in 1931 the abridgment and destruction of \u201c absolute property rights \u201d and its replacement with tax-financed social insurance. He saw an identity between the ideal of Christianity and socialism. But by mid-1933 he saw the property rights of the \u201c small trader and farmer \u201d as a \u201c chance to perform a social function \u201d .(p318) Niebuhr grew up in close-knit German-American communities and thus understood socialism \u201c as a protest against radical individualism \u201d .(p318) In 1935 Niebuhr wrote that capitalism was doomed, that \u201csocial ownership\u201d was the only basis of \u201c health and justice \u201d , and that \u201csocial struggle\u201d was necessary. But by 1938 he recognized that the problem of power always remained. \u201c A Christian can give only \u2018qualified loyalty\u2019 to any political program. \u201d (p321) In 1940 he was impressed that the people elected Roosevelt over Wendell Willkie. Democracy had worked in the US. By 1948 he criticized the World Council of Churches for condemning equally capitalism and communism. By 1952: \u201c [Marxist] theory is incompatible with democratic responsibility; its theory of class conflict does not fit the multiple-class structure of modern industrial societies and is incompatible with the principle of \u2018class collaboration\u2019 upon which democratic politics depends \u201d ,(p323) and its utopian vision interferes with the practical interests of a \u201c sane political movement. \u201d Marxism's sweeping generalizations are refuted by daily experience. \u201d (p324) By 1961, society needs a trinity of goods: freedom, community, and justice. Niebuhr came to believe in a \u201c balance between political powers, economic powers, and moral-cultural powers. \u201d (p325) He recognized that politics is not just a conflict of interests \u201c but a rational engagement and enlargement of a native sympathy \u201d .(p325) He came to accept a harmony between Jefferson\u2019s \u201c government of reason \u201d , Hamilton\u2019s realism about \u201cinterests\u201d and Madison\u2019s \u201c pre-Marxist analysis of the basis of collective and class interests in the varying \u2018talents\u2019 and consequent economic interests of the various classes. \u201d (p326) He understood that, checked by the political and moral-cultural systems the economic system \u201c possessed its own integrity \u201d .(p328) \u201c [W]e must be careful to preserve whatever self-regulating forces exist in the economic process. \u201d Otherwise the task of economic control endangers liberty. Niebuhr always believed that capitalism tended to dangerous concentrations of power; he criticized individualism in light of man's social nature. Still he recognized that capitalism had \u201c more moral and political resources to avoid catastrophe \u201d than its critics realized; Christians like him also misunderstood the nature of the Marxian program. It was utopian, not practical. In supporting nationalization, leftists did not count its costs in bureaucracy and centralization of power. Failing to understand modern complexities they gave the \u201c abolition of property a false halo it did not deserve. \u201d (p331) A \u201c religious passion for justice must be balanced by pragmatic considerations \u201d .(p331) Still, the enormous wealth of the US (2-3 times Europe in the mid-1950s, ten times Asia) tempts people to envy and assume exploitation. In the wake of the radicalizing of US elites in the Vietnam War and uncritical assumptions of Third World oppression by developed countries a new Niebuhr is needed to connect moralistic passions with reality. Building a humane social order is a long journey. \u201c To know its ideals is to be restless... and to wish to do better \u201d .(p333) The ideals of socialism are well known. It is a unitary system dominated by the state and tending to tyrannical unity. Even though many democratic socialists have abandoned Marxism, they still wish \u201c to strengthen the political system at the expense of the economic system and the moral-cultural system.(p334) Thinkers like Michael Harrington and Irving Howe see themselves as the conscience of the Democratic Party. But they are not the conscience of democratic capitalism. They are the conscience \u201c of the socialist system they wish America yet to become. \u201d (p334) To create a conscience of democratic capitalism requires a reformulation of Christian theology in the light of knowledge about practical life under democratic capitalism, its \u201c economics, industry, manufacturing, trade, and finance. \u201d (p336) The Trinity. Whatever the Trinity means, it seems that \u201c God is to be conceived as a kind of community rather than solitary individual... What is most valued among humans is that community within which individuality is not lost. \u201d (p338) Socialism aims at community, but does not protect the individual. Novak finds \u201cdark illumination\u201d in a political economy \u201c differentiated and yet one... [where] each tames and corrects and enhances the others. \u201d (p339) All sorts of communities flourish, less rooted in kin, more voluntary and fluid, but communities for all that. It is mediating communities that make the life of individuals and states possible. When these are broken, the state is broken. The Incarnation. \u201c The point of Incarnation is to respect the world as it is... to disbelieve any promises that the world is now or ever will be transformed into the City of God \u201d ,(p341) but still to hope. That is what the Founding Fathers did when they \u201c chose as their model citizen.. the free man of property and commerce. \u201d (p343) Heroism and virtue were permitted, but \u201c the system as a system was cut to common cloth. \u201d \u201c They did not promise paradise, or peace and justice. \u201c The task of political economy is not to guide the ship but to make a voyage possible.(p343) Competition. People called to the religious life tend to be non-competitive. There is a temptation to impose this culture upon others. But a \u201c political economy needs bold political leaders who thrive in contests of power and willful dreamers and builders who delight in overcoming economic difficulties in order to produce. The will-to-power must be made creative, not destroyed. \u201d (p344) The Bible certainly understands life as a struggle. \u201c Many are called, few are chosen, \u201d \u201c last shall be first, \u201d etc. Yet \u201c Christian grace is never measured either by virtue or by worldly success. \u201d (p346) Is competition foreign to a religion of \u201c love, meekness, and peace \u201d ? Not while it is so hard to \u201c be meeker than one\u2019s neighbor. \u201d (p347) The rich may find it hard to get into Heaven, but this is because they have more to answer for. \u201c It does not seem to be inconsistent with the gospels for each human to struggle, under the spur of competition with his fellows, to become all he can become. \u201d (p348) Original sin. The doctrine of original sin steels the mind against the utopian illusion, that \u201c the evils and inconstancies of the human heart are superable \u201d or caused by \u201c evil structures. \u201d (p349) Every political economy has a theory of sin, something it is against. Democratic capitalism is \u201c designed against tyranny. \u201d As such, it does not repress human vice, to the shock of outsiders like Alexander Solzhenitsyn. \u201c Socialist societies repress sin much more effectively. They begin by repressing economic activities. A free society can tolerate vice because it believes in \u201c the basic decency of human beings... Under an appropriate set of checks and balances, the vast majority of human beings will respond to daily challenges with decency, generosity, common sense, and even, on occasion, moral heroism. \u201d (p351) The separation of realms. Democratic capitalist society cannot impose Christianity on its people. Christians may try to \u201c shape the will of the majority \u201d (p351) but \u201c must respect the consciences of others even more than law alone may demand. \u201d (p351) Anyway, Christian values make demands that are \u201c not of this world. \u201d No practical human order can be run on purely Christian principles. Christians should follow their conscience \u201c and cooperate in coalitions where consensus may be reached. \u201d (p352) At \u201c the heart of democratic capitalism is a differentiation of system designed to squeeze some good from sinful tendencies. \u201d (p353) Caritas. This is the ideal of love \u201c willing the good of the other as other \u201d .(p353) \u201c To look upon history as love-infused by a Creator who values others as others... is to glimpse a world in which the political economy of democratic capitalism makes sense. \u201d (p355) \u201c in this scheme the individual is not atomic... [for] the fulfillment of the individual lies in a beloved community. Yet any community worthy of such love values the singularity and inviolability of each person. Without true individualism there is not true community. \u201d (p356) \u201c The vision is that of a republic of independent, self-reliant, fraternal, cooperative citizens, each of whose interests includes the interests of all in brotherhood \u2018from sea to shining sea\u2019... guided by the motto \u2018In God we trust \u201d .(p357-8) This book has not been about the practice of capitalism; it has been about grasping the ideals implied in its practice. It now becomes possible to compare it with socialism, ideal against ideal, practice against practice. If the real world of democratic capitalism is worse than its ideal, then how should it be judged? By what standard? It does not meet the ideals of democratic socialism because it has its own ideals. It does not meet the highest ideals of Judaism and Christianity, for no political economy can do that. But democratic capitalism stands ready for criticism and change. It is designed for that, the only known system designed for \u201c transformation by peaceful means. \u201d (p359) God designed creation as an arena of free will, and democratic capitalism honors that with a \u201c non-coercive society... within which individuals and peoples are called to realize, through democratic methods, the vocations to which they believe they are called. \u201d (p360) \u201c Under God, they may expect to meet exact and just judgment. \u201d", "after_revision": "The Spirit of Democratic Capitalism is a 1982 bookNovak, The Spirit of Democratic Capitalism, 1982, Simon & Schuster, by philosopher Michael Novak, in which Novak aims to understand and analyze the theological assumptions of democratic capitalism, its spirit, it values, and its intentions. Novak defines democratic capitalism as a pluralistic social system that contrasts with the unitary state of the traditional society and the modern socialist state. He analyzes it as a differentiation of society into three power centers: a political sector, an economic sector, and a moral-cultural sector. Each sector needs the others. Democracy needs the market economy and both need a pluralistic liberal culture. Against the continuing growth of democratic capitalism, modern socialism has contracted from a robust utopian program into vague \" idealism about equality \" and overwrought criticism of capitalism, most notably in the \"liberation theology\" of Latin America. Novak ends with the \" beginnings of a theological perspective on democratic capitalism \" illuminated by the journey from Marxism to realism of Reinhold Niebuhr. Irving Kristol described Novak's book as \" unquestionably a major work for our times. \" The Spanish translation of the book served as inspiration for the Chilean lawyer and politician Jaime Guzm\u00e1n where he was not satisfied by Hayeks thought. No theologian \" has yet assessed the theological significance of democratic capitalism \" ,(p13) the society of \" three dynamic and converging systems functioning as one: a democratic polity, an economy based on markets and incentives, and a moral-cultural system which is pluralistic and, in the largest sense, liberal. \" (p14) The link is not an accident. You can only have democracy with a market economy, nourishing and nourished by a pluralistic liberal culture: a threefold system. Democratic capitalism requires economic growth, the \" belief of all individuals that they can better their condition. \" (p15) Without growth and social mobility democracy devolves into the Hobbesian \" war of all against all. \" The treatments of democratic capitalism by religious writers, in papal encyclicals and mainline Protestant theology, have not really understood its essence. So democratic capitalism needs a moral theory about itself, to define a \" political economy most consonant with Judaic tradition and the Christian gospels \" .(p20) Capitalism is neither Heaven nor Hell. \" Yet all other known systems of political economy are worse. \" (p28) People hate capitalism; its successes do not impress the \" poets and philosophers and priests \" (p31) \" The more it succeeds, the more it fails. \" (p32) Intellectuals indict capitalism for all kinds of sins: affluence, moral weakness, and vulgar taste. The intellectuals that do defend capitalism have not made a broad enough case. \" What is the spirit of democratic capitalism? \" (p36) Max Weber saw that commerce takes on a new meaning, or spirit in capitalist countries. Capitalism's spirit required free labor, practical intelligence, planned and organized for profit in a continuous enterprise in a stable network of law operating mainly in cities and towns. But Weber did not see the \" necessary connection between economic liberty and political liberty. \" (p45) It is not just \" an economic system dependent upon a moral spirit \" .(p46) Rather than being an \"iron cage\" \" democratic capitalism is demonstrably open \" (p47); it reinvents itself constantly. \" The spirit of democratic capitalism is the spirit of development, experiment, adventure. It surrenders present security for future betterment. In differentiating the economic system from the state, it introduced a novel pluralism into the very center of the social system. \" (p48) The big idea in democratic capitalism is pluralism. A traditionalist or socialist society \" imposes a collective sense of what is good and true... exercised by one set of authorities. \" (p49) But can society work if no-one is in control? Many people, from Solzhenitsyn to popes, find such a society immoral and chaotic. Social scientists find it sickening, as producing anomie, alienation, etc. The founders of democratic capitalism \" feared absolutism more than they feared pluralism. \" (p52) In a plural society, people can question things. One can step out from under one's \"sacred canopy\" and experiences \" culture shock. \" \" In a genuinely pluralistic society, there is no one sacred canopy. \" (p53) Society is renewed by crises of conscience, the \" taproot of democratic capitalism. \" (p55) Pluralism avoids the single \"sacred canopy\" by design. The founders deliberately separated economic institutions from the state, and limit the power of clerical and state bureaucrats to meddle in the economy. Political activists compete in the political sector, economic activists in the economic sector and religious and intellectual activists in the moral-cultural sector. By design it is hard for any one person to get power over all three sectors. But the three sectors need each other. Capitalism needs a moral culture to nourish \" self-restraint, hard work, discipline and sacrifice \" (p57) and a political system committed to limited government, a sound currency, and regulation of competition. The authors of The Federalist Papers wanted to avoid the tyranny of the majority, so they constructed a political \" system which would empower many factions and interests. \" (p58) No single group would be trusted with the common good, but gathered together, the combination of interests should \" strike not to far off the mark. \" (p58) But this practical wisdom has been preempted by the utilitarians, and then accused by idealists of being merely utilitarian \" interest-group liberalism. \" Novak prefers to use his own Thomist tradition, recognizing the \" dangers inherent in idealism, the uniqueness of the person, and the special advantages of the practical... order. \" (p59) We are born into a social world, into families, and only later become individuals. The system of the founders institutionalizes this in three steps. First it recognizes that all right-thinking people of goodwill do not hold the same moral vision. The second thing is to differentiate \" between and individual and a person. \" (p63) \" Personhood entails the right--the vocation--to be different. Third, it calls for a secular or civic faith. Thus the US Constitution: \" a practical, rather than creedal, vision of the good society. \" (p66) It does less than command the socialist virtues; it does more than license =mere interest group horse-trading. \" A democratic capitalist society is, in principle, uncommitted to any one vision of a social order. \" (p67) Therefore, moral-cultural institutions belong to the system, but they must not command the system. Religious bodies have a role. \" But it is neither in command nor at the center. \" (p69) Democratic capitalism has a particular view of history. It is the notion of \" emergent probability. \" It thinks of the world as an emerging system of goods of order as developed by Bernard Lonergan. Adam Smith\u2019s The Wealth of Nations was an attempt to understand how the world might be organized to provide such goods \" so as to raise the wealth of all nations. \" (p77) It proposed organizing the world not from the top down but from the bottom up, \" to empower the rationality of every individual. \" (p79) It is not sufficient, but it is necessary. \" Political economy must deal with humans as they are \" ,(p82) including evil. Each system identifies the greatest evil. For traditional societies it is disorder, for socialist societies, inequality, for democratic capitalist societies it is tyranny. In democratic capitalism we turn attention from \" the moral intentions of individuals and toward the final social consequences of their actions. \" (p89) This results in affording high status to commerce and industry. The clergy is fanatic, the military plundering, the nobles proud and belligerent, the state parasitic. But commerce aligns with liberty, requires a \"healthy realism\" and is insensitive to station and class, and it provides a center of power separate from politics. Leftists accuse capitalism of institutionalizing selfishness and greed. But \" self-interest \" is something more. Quoting Milton and Rose Friedman: \" Self-interest is not myopic selfishness. It is whatever it is that interests the participants, whatever they value, whatever goals they pursue. \" (p94) It includes interest in the religious, moral, scientific and just. Democratic capitalism recognizes that sinfulness cannot be eradicated. It tries to make sinful tendencies productive and creative. When Thomas Aquinas abandoned God as Nous for Providence he created a problem for politics: \" how can political economy be Provident? \" (p96) It takes more than theory; it takes practical intelligence and wisdom in as it relates to \" time, the market, the so-called invisible hand, profit, and the zero-sum society \" (p97). Under democratic capitalism time takes on a new meaning. People start looking forward to the future instead of back to the past. They break out of eternal cycles and experiment. Time is money, and people are advised not to waste it. Religion becomes activist rather than meditative. When people become concerned about time as an asset, they intelligently organize life into time saving habits. Such practical intelligence increases wealth. \" Practical insights are the primary cause of wealth. \" (p103) Intuitively, when millions of people enter the marketplace the result must be anarchy. \" Traditionalists and socialists... occupy the commanding heights and try to impose order. \" (p104) In fact, economic activism promotes order; under scarcity people need one another, and must coordinate their activities through the price system. Adam Smith\u2019s metaphor of the \"invisible hand\" tells us is that the motives of individuals do not determine the social result of their actions. There seems to be an order, a system \" beneath the seeming individuality of individual choices. \" (p114) Rational order may exist without rational commands from on high. Markets always get a bad press: Mammon, usury, and incompatibility with humane values, and so on. But commercial values furnish \" a school of virtue favorable to democratic governance. \" (p117) It encourages \" the cooperative spirit \", the \" attention to law \" , self-determination, limited government and encouragement to industry, the discipline of common sense, attention to the small savings and small gains that power economic growth. It breaks the utopian vision that fails to deliver. It is \" proportioned to man as he is, not as dreams would have him \" .(p118) But there are losses, to old communal ties and the heroic spirit. \" Commercial virtues are not, then, sufficient to their own defense. [It] needs taming and correction by a moral-cultural system... [and] by the political system and the state. \" (p121) The socialist ideal is the quest for \" security and equality \" , the capitalist for \" self-improvement and growth \" .(p123) But risks cannot be avoided in making the world predictable and safe. It creates a zero-sum society foredoomed to failure. Democratic capitalism, committed to growth offers the hope of a larger future to all. It is not utopian, but it offers \" a practical wisdom worthy of admiration \" (p126), a \" plain sort of wisdom suited to this world. \" (p126) The meaning of community in traditional society is clear. \" Yet pluralistic societies develop their own powerful forms of community... of free persons in voluntary association. \" (p129) This community is \" accessible to all human beings without exception \" in the world. Democratic capitalism has developed \" a novel social instrument: the voluntary association committed to business enterprise, the corporation. \" (p130) I.e., the flagship institution of capitalism is social, corporate. Commercial civilization is interdependent. The community depends on an ethos of cooperation. \" Cultures in which individuals are not taught how to cooperate, compromise, and discipline themselves to practical communal tasks can make neither democratic politics nor market economies work. \" (p134) \" Between individualism and collectivism, there is a third way: a rich pattern of association. \" (p135) It is a community of \" colleagueship... an ethos of association, teamwork, and collaboration, oriented towards goals, voluntarily entered into. \" (p138) And these associations make the conventional notions of \" \u2018the consumer society\u2019, \u2018greed\u2019, and \u2018materialism\u2019 seem very wide of the mark. \" (p141) Democratic capitalism aims to guarantee the pursuit of happiness. Humans being social animals, they must \" build decent and even affective relations among those who work together \" (p142) in that pursuit. Everyone knows that the term \"bourgeois\" is not a compliment. Yet when democratic socialists list the values of their society they sound middle-class. Perhaps the problem occurs because the supporters of democratic capitalism advertise themselves as individualists when, \" under the mask \" they are profoundly communitarian. In Adam Smith\u2019s The Theory of Moral Sentiments he emphasizes \" fellow feeling, common sympathy, and benevolence \" ,(p145) while The Wealth of Nations he condones \" self-love and self-interest. \" But who is not bourgeois, i.e., own their home and private property, these days? Small businessmen, pension plan participants, academic critics. The game is to \" redefine the bourgeoisie to fit the Marxian scheme in which one class oppresses another. \" (p151) It ends up defining the elite as an elite. What's the problem? A bourgeois has \" economic independence... owns property... shares the cultural life of the city \" (p152) And the bourgeoisie is open to all. A noble can descend and join it, and a peasant or proletarian can aspire and rise to it. The bourgeoisie practice high standards and competitive habits. Nor is it particularly \" self-satisfied, secure, or smug. \" (p153) Middle class culture makes fun of the middle class. \" Latin American liberation theologians and others.. may threaten retribution upon the bourgeois class, but... they also appeal to the ideals of the middle class \" .(p154) \" Bourgeois life is thick with activism, volunteerism, and mutual association. \" (p154) And it is prepared to listen to criticism. Although democratic capitalism is \" designed to function with minimal dependence upon virtuous motives... [it] cannot function at all without certain moral strengths, rooted in institutions like the family. \" (p156) Yet many critics are hostile to what they call the \" nostalgic family. \" They attack on three axes: economic, political, and moral-cultural. Even libertarians center their analysis on the free individual and \" rational self-interest. \" But \" in ordinary experience, our own economic starting place in life is given us by our families. \" (p161) We have been thrown into life as \"familial animals\" for the \" family is the major carrier of culture, transmitting ancient values and lessons... motivations... judgement... emotion, preferences and inclinations. \" (p161) \" In the long run, the individual economic agent is dead. Only his progeny survive to enjoy the fruits of his labors, intelligence and concern. \" (p163) \" But if the family is a form of socialism which corrects the exaggerated individualism of capitalist economists, it is also a form of liberty which corrects the exaggerated collectivism of statists. \" (p163) \" The more the state invades the family, the less likely the prospect of self-government. \" (p165) The family is the first defense against utopianism. \" Those who seek moral perfection, full self-fulfillment, high happiness \" are opposed to \" the constraints of matrimony and childrearing. \" (p167) The family is nature's school of virtue. It teaches humility, \" ordinary heroism, \" self-governance, self-discipline, and critical judgment. The bourgeois family is different from the aristocratic family and its inherited status, the peasant family, the extended ethnic family. It is pluralistic, adaptable, nuclear, trans-cultural. And now it must deal with the post-bourgeois elite family that wants to \"find\" rather than \"better\" itself. \" When self-government is no longer an ideal for individuals, it cannot be credible for the republic. \" (p170) The pluralism of democratic capitalism affects everything, and not least the rivalries between the three systems: political, economic, and moral-cultural. Each has its ethos and creates problems for the other two. This is by design, for the energy of conflict powers progress and correction. \" It is a system intended to constitute a continuous revolution. \" (p172) The political system is separate from the moral-cultural system, but \" clergymen and journalists, preachers and professors often place enormous pressures on the state \" (p172) on behalf of their moral vision. The political system is also separate from the economic system, yet profoundly affected by it. Still, the political system also has enormous power over the economic system, through the people that work for it and those dependent on the political system for \" grants, payments, and favors \" (p173). Legislative action has politicized moral and cultural issues from regulation of business to the role of women, homosexuality, abortion, real estate, busing, and educational experiments. \" The political system... encroaches significantly upon the economic system and the moral-cultural system. \" (p174) Leaders of both the political and moral-cultural system combine in harsh criticism of the economic system. Their exaggerations omit what the economic system has done for democracy and for providing the wealth to found schools, churches, foundations, and freedom for artists and preachers. Many critics fault capitalism for lack of democracy, as if it is appropriate for \" every inquiry and action. \" (p175) But well-managed corporations all use the principle of subsidiarity, pushing decisions down the hierarchy. The economic system creates problems for government because it is designed to. \" The virtues it requires, and the virtues it nourishes, are indispensable to a self-governing polity and to a sound morality. \" (p181) The moral-cultural system in the United States seems \" the least developed, most neglected, most delinquent system... and it has become the most powerful, most ambitious, most dominating system. \" (p182) It has many strengths, vibrant churches, arts, and moral movements. Ideas have consequences, and moral-cultural power is subject to the same temptations as economic and political power if attempts \" to dominate both the state and the economy. \" Two temptations are the power and status available to those that help grow the state, and the notoriety available to those that debunk institutions and values that stand in the way of their own morality, culture, and politics. What does socialism stand for today? It seems to have shrunk to \" idealism about equality... and hostility towards democratic capitalism \" (p189) rather than the grand program of the \" abolition of private property... state ownership of the means of production... abolition of \u2018bourgeois democracy\u2019... and an international order... transcending... frontiers... abolition of profit, abolition of imperialism... \u2018socialist man.\u2019 \" (p190) In many ways, socialism has failed. in the economic sphere, nationalized industries, collectivized agriculture, administered prices and wages. In the political sphere, \" the centralized administrative state has proved to be a more thorough instrument of oppression and exploitation than the democratic capitalist state. \" (p191) In the moral-cultural sphere socialism fails to tolerate \" the broad range of dissent, human liberties, and human rights achieved in the democratic capitalist states. \" (p191) Serious thinkers like C. Wright Mills and Leszek Ko\u0142akowski admit that socialism is seriously discredited. It survives as \" a mobilizing stencil for grievances... and to love as a \u2018totalitarian political movement.\u2019 \" (p195) \" Socialists seem to be in retreat both from theory and from program. \" (p197) They define socialism as a set of moral injunctions on poverty, inequality, and democracy. The young Novak thought of socialism as idealism; capitalism worked better, but it was \" an inferior ideal. \" (p198) Yet Jacques Maritain found Americans, in the crucible of capitalism, \" the most humane and the least materialist among modern [industrialized] peoples \" .(p199) Novak came to see something else. Socialism required no moral heroism in him. If it failed, the workers and the poor would suffer most. Socialism may seem to be an injunction on poverty, inequality in freedom of action, and basic needs, but it pretty soon becomes \" raising up the poor and pulling down the rich. \" (p202) It allows a monstrous government and ignores the source of economic dynamism\u2014serious intellectual errors. Democratic capitalism can do all this, but balances the competing injunctions\u2014especially the question of \" [w]ho will govern government? \" (p203) Anyway, \" equal freedom of action for all \" is impossible. Without an ear for music, you cannot compete in music, etc. Socialists see inequality as an affront; democratic capitalists see talent as a responsibility. One way in which socialists dodge its failure is a commitment to \"democratic control\" of the means of production. The fact is that participatory democracy does not work in the moral-cultural realm\u2014religion, arts, literature\u2014or in the economic realm of economic choices about the future. Most people don't want to spend long hours in \"participation,\" although the US excels already in associations, committees and groups. Even though \" [M]ost democratic socialists recognize that strict equality of incomes is unworkable and also unjust \" ,(p211) extreme disparities seem to be \"immoral.\" Small entrepreneurs are OK but corporate salaries are \"obscene.\" There is a need for \"moral restraint\" . Still, the extravagance of the rich is the difference between socialist drabness and urban brightness and gaiety. The rich pay for foundations that employ scholars, museums, galleries, universities, new business and technology investments. In democratic capitalism you can change your life with skill and luck; in socialism the \" only path upward is political favor. \" Suppose we accept the idea of democratic socialists that highly skilled workers only earn eight times the wage of the lowest paid, as in Cuba? Actually in the United States in 1979 the top five percent earned a little less than seven times the average income of the lowest 20 percent. But 0.5 percent earn more than 10 times the poorest. Democratic socialists call this a scandal; democratic capitalists do not, because these higher incomes don't hurt the lower paid and a society with unlimited incomes is \" more dynamic, freer, more generous, more colorful \" (217) than one without. And, of course, the rich pay a lot more in taxes. A special problem for the United States is the relative poverty of blacks relative to whites. Leftist Democrats insist on government programs rather than \" personal initiative. \" Actually, according to Thomas Sowell, most blacks are \" disciplined, ambitious, hardworking, and conscientious in seizing opportunity.(p219) In the long view, blacks have done well. In 1900 blacks lived under segregation in the poorest part of the country. Today, \" Black households with two parents under age thirty-five, living in the North, do better than equivalent white households. \" (p221) Still, blacks demonstrate more social pathology than whites. A catalyst is necessary. \" The spirit of democratic socialism... seems designed to prevent such a catalyst from ever emerging. \" (p224) Though socialists are hostile to transnational corporations, in early 1980 socialist leader Robert Mugabe wanted to welcome them to Zimbabwe. For Mugabe, \" socialism accepts the brotherhood of man. \" (p225) But what are the corporation, the labor union, banking, the stock exchange if not communal, depending on trust beyond force, contracts, and law? Critics accuse transnational corporations of wanting to manage the world and various other crimes against developing nations. \" \u2018Manage the world\u2019 is the aim of socialism, not the aim of market systems. \" (p228) Anyway, if economic aid comes not through corporations, then what? All criticisms of corporations come down to: compared to what? A huge task awaits theologians in thinking theologically about economic reality at three levels. They must understand economic reality (scarcity, work, money, capital accumulation, etc.) in every economic system in every age. They must understand the specific systems on offer, from feudalism to mercantilism to capitalism and socialism. Then they must understand the details, the moral and ethical dilemmas that \" occur within particular systems. \" (p240) Novak's book is intended to fill the vacuum in understanding democratic capitalism, for he thinks that \" the actual practice of democratic capitalism is more consistent with the high aims of Judaism and Christianity than the practice of any other system. \" (p242) Obviously church criticism, particularly Catholic, of capitalism has been distinctly biased against it, at least until Pope John Paul II. This is probably due to a misunderstanding of Anglo-Saxon \"individualism\" by the continental Catholic hierarchy and that \" the discoveries of modern economics seem to have affected it hardly at all. \" (p241) Many Christian thinkers have sought an accommodation with socialism and its program to end poverty and oppression. For those espousing a Christian Marxism this means a Marxism emptied of everything: atheism, materialism, collectivization or one-party rule. In the US John A. Ryan proposed a Catholic alternative to state socialism that inspired a Bishops\u2019 \" Program for Social Reconstruction \" in 1919 that came close to FDR's New Deal. More recently, Catholic bishops have moved decisively against capitalism, helping the poor with statist programs, rather like secular socialists. These thinkers seem to give socialist plans the benefit of every doubt, while according none to democratic capitalism in its actual character. Meanwhile, socialism \" has been dying the death of a thousand qualifications. \" (p254) Juergen Moltmann has developed a theology of Christian socialism. It owes more to Hegel than to Aquinas. This \" theology of hope \" turns to the future and Christian hope. It breaks away from \" the struggle of the individual soul \" and emphasizes the social (i.e. political) nature of the Christian vocation. Moltmann is critical of both Stalinism and capitalism. He endorses democracy and socialism. \" The oppressed hold in their hand the key for the liberation of mankind from oppression. \" (p258) Thus the poor are \" objects, victims, and finally a messianic class sent to save the rich. \" (p258) Moltmann wants to subordinate economics to theology. Capitalism is \" outside the law, destructive of true community... monetary... inspiring wolflike animosity between man and man \" (p262) and madly pursuing growth for growth's sake and work for work's sake. Molmann defines his \"socialism\" as responding to five vicious circles in the world today: poverty, force, racial and cultural alienation, industrial pollution of nature, senselessness and godforsakenness. Thus socialism no longer rests on a concrete program but becomes a \" symbol for large and grand ideals. \" (p270) He \" exhibits high confidence in governmental control over life... commends the distribution of wealth and a no-growth economy... respects political and moral-cultural liberties, but not economic liberties... a return to premodern conceptions. \" (p270) In Latin America the socialist myth \" unites the political system, the economic system, and the moral-cultural system under one set of authorities. \" (p272) It inspires the most heavily armed states. And it provides an excuse. Catholic bishops ignore Catholic economic teachings of four hundred years to blame the United States for Latin American poverty. It's the Marxist stencil: \" If I am poor, my poverty is due to malevolent and powerful others. \" (p273) Adam Smith drew attention to the two American experiments in 1776, one \" based on the political economy of southern Europe \" and the other \" launching a new idea. \" (p274) So why is Latin America behind? Hugh Trevor-Roper unearthed one reason. Entrepreneurial businessmen, Christian and Jewish, were driven from Spain by an \" alliance of church and state \" that \" banned or restricted enterprise in the private sector. \" (p277) Yet in 1969 the Catholic bishops of Peru said \" we are the victims \" and in 1974 the Catholic bishops in the US wrote that the \"unchecked liberalism\" of profit, competition, and private ownership led to \"dictatorship\" in Latin America.(p280) This embarrassing economic ignorance demonstrates a failure to grasp \" relevant economic reality. \" Socialism is as centralizing as it can get, and the Soviet Empire an extreme example of centralization. Yet Marxist thought \" today uses the theory of center and periphery as an accusation against democratic capitalism. But every energetic pulse of economic activity become a \"center.\" The theory is just another way of explaining the poverty of the poor by the wealth of the wealthy. Beginning in 1968 Roman Catholic bishops in Latin America began to develop a \"liberation theology\" based upon reading the Scriptures as a story of liberation. They applied Scripture not to individuals but to \" social structures and economic systems. \" (p288) The Anglo-Saxon Whig tradition of liberty is little known, but the \" widespread Latin American antipathy towards commerce... is married... to a widespread desire for an integral, holistic, unitary system. \" (p289) There is a vacuum \" into which liberation theology rushes. \" (p289) Religious liberation becomes a this-worldly \" struggle for revolution against tyranny and poverty. \" (p290) As well as local oppressors, \" unfair terms of trade \" enrolls international capitalism as the global oppressor. Of course, liberation theology, while specific in its critique of capitalism, is \" vague and dreamy \" about its program and about the institutions that will replace the old after the revolution. It is enough to know that capitalism \" fosters individualism, competition, materialism, and greed. Socialism offers an alternative set of values, which stress the virtues of participation, community, equality, and sacrifice. \" (p295) Liberation theologians defend the stagnation of socialist economies such as Cuba; at least the Cubans \" claim to supply basic necessaries to all the poor. \" (p295) Liberation theologians choose help for the poor now over a better future in a growing economy. Latin Catholic culture is different from northern European culture. Cultural choices in economic affairs make a difference. Archbishop Helder Camara of Brazil says that is sad that 80 percent of the world's resources are at the disposal of 20 percent of its inhabitants. But these resources were discovered within the last 200 years; the combustion engine, oil wells were discovered under Northern European Protestant culture. So we could say that it is marvelous that 80 percent of the world's resources have been discovered by one of the smaller cultures, and made available for use in every continent. But more needs to be done. \" Nothing prevented Brazilians from inventing the combustion engine, the radio, the airplane, penicillin \" .(p300) But they didn't. Writes Gustavo Gutierrez in A Theology of Liberation: \" The underdevelopment of poor nations... is... the sub-product of the development of other countries... [T]he capitalist system... [creates] a center and a periphery... progress and riches for the few, and... poverty for the majority. \" Joseph Ramos prepared an economic critique of Gutierrez for the Catholic bishops in 1970. Center and periphery is a truism. Of course any economically active locale is a center. Nor is wealth created in one place subtracted from another. There is far more wealth today than 200 years ago. All peoples have benefited. Nor is the US to blame for Latin American dependency. Only 5 percent of US investment is made abroad. Seventy percent of US exports go to developed countries. Return on US investments in Latin America is not particularly high, relative to other countries. Gutierrez's notion of class conflict applies to static economies. Where there is growth there can be \" relations of mutual advantage and cooperation. \" (p306) Nor will class struggle disappear with the abolition of private property. \" Struggle over the political allocation of power and goods is historically one of the most bitter forms for struggle. \" (p307) Despite all this, Latin America has done well economically. Since World War II, growth has averaged 5.2 percent per year, and real wages and salaries have increased by 2 percent per year, better than the US in 1865\u20131914. Latin Americans are closing the \" technological, organizational and management gaps \" (p309) to produce a revolution in \" human capital. \" But this revolution has not yet reached the bottom. In 1970 about 40 percent lived below the poverty line and 20 percent in destitution. To raise the destitute and poor to the poverty line would cost about 5 percent of GNP. So the \" economic capacity is present. \" (p311) But the political will may be lacking. Writing about institutions, liberation theologians favor socialism. Writing about individuals they favor \" economic independence, self-reliance, personal creativity \" .(p312) \" Their rage against the existing order... prevents them from thinking institutionally about how to devise checks and balances against corporate power, while using it creatively to check clerical and military power. They have not thought theologically about the vocation of laymen and laywomen in the world, particularly in commerce and industry. \" (p313) They do not think about using the commercial class to limit the power of traditional elites. There is no vision of the liberation available from democratic capitalism. \" [T]heir path to liberation is ill-defended against state tyranny. \" (p314) They need to avoid the temptation that socialism is a more \"noble way\" than the \"lowly\" path of realistic democratic capitalism. Reinhold Niebuhr was a Christian from the German Reformed tradition. He started as a Christian Marxist and ended up more or less accepting the culture of democratic capitalism. He began by recommending in 1931 the abridgment and destruction of \" absolute property rights \" and its replacement with tax-financed social insurance. He saw an identity between the ideal of Christianity and socialism. But by mid-1933 he saw the property rights of the \" small trader and farmer \" as a \" chance to perform a social function \" .(p318) Niebuhr grew up in close-knit German-American communities and thus understood socialism \" as a protest against radical individualism \" .(p318) In 1935 Niebuhr wrote that capitalism was doomed, that \"social ownership\" was the only basis of \" health and justice \" , and that \"social struggle\" was necessary. But by 1938 he recognized that the problem of power always remained. \" A Christian can give only \u2018qualified loyalty\u2019 to any political program. \" (p321) In 1940 he was impressed that the people elected Roosevelt over Wendell Willkie. Democracy had worked in the US. By 1948 he criticized the World Council of Churches for condemning equally capitalism and communism. By 1952: \" [Marxist] theory is incompatible with democratic responsibility; its theory of class conflict does not fit the multiple-class structure of modern industrial societies and is incompatible with the principle of \u2018class collaboration\u2019 upon which democratic politics depends \" ,(p323) and its utopian vision interferes with the practical interests of a \" sane political movement. \" Marxism's sweeping generalizations are refuted by daily experience. \" (p324) By 1961, society needs a trinity of goods: freedom, community, and justice. Niebuhr came to believe in a \" balance between political powers, economic powers, and moral-cultural powers. \" (p325) He recognized that politics is not just a conflict of interests \" but a rational engagement and enlargement of a native sympathy \" .(p325) He came to accept a harmony between Jefferson\u2019s \" government of reason \" , Hamilton\u2019s realism about \"interests\" and Madison\u2019s \" pre-Marxist analysis of the basis of collective and class interests in the varying \u2018talents\u2019 and consequent economic interests of the various classes. \" (p326) He understood that, checked by the political and moral-cultural systems the economic system \" possessed its own integrity \" .(p328) \" [W]e must be careful to preserve whatever self-regulating forces exist in the economic process. \" Otherwise the task of economic control endangers liberty. Niebuhr always believed that capitalism tended to dangerous concentrations of power; he criticized individualism in light of man's social nature. Still he recognized that capitalism had \" more moral and political resources to avoid catastrophe \" than its critics realized; Christians like him also misunderstood the nature of the Marxian program. It was utopian, not practical. In supporting nationalization, leftists did not count its costs in bureaucracy and centralization of power. Failing to understand modern complexities they gave the \" abolition of property a false halo it did not deserve. \" (p331) A \" religious passion for justice must be balanced by pragmatic considerations \" .(p331) Still, the enormous wealth of the US (2-3 times Europe in the mid-1950s, ten times Asia) tempts people to envy and assume exploitation. In the wake of the radicalizing of US elites in the Vietnam War and uncritical assumptions of Third World oppression by developed countries a new Niebuhr is needed to connect moralistic passions with reality. Building a humane social order is a long journey. \" To know its ideals is to be restless... and to wish to do better \" .(p333) The ideals of socialism are well known. It is a unitary system dominated by the state and tending to tyrannical unity. Even though many democratic socialists have abandoned Marxism, they still wish \" to strengthen the political system at the expense of the economic system and the moral-cultural system.(p334) Thinkers like Michael Harrington and Irving Howe see themselves as the conscience of the Democratic Party. But they are not the conscience of democratic capitalism. They are the conscience \" of the socialist system they wish America yet to become. \" (p334) To create a conscience of democratic capitalism requires a reformulation of Christian theology in the light of knowledge about practical life under democratic capitalism, its \" economics, industry, manufacturing, trade, and finance. \" (p336) The Trinity. Whatever the Trinity means, it seems that \" God is to be conceived as a kind of community rather than solitary individual... What is most valued among humans is that community within which individuality is not lost. \" (p338) Socialism aims at community, but does not protect the individual. Novak finds \"dark illumination\" in a political economy \" differentiated and yet one... [where] each tames and corrects and enhances the others. \" (p339) All sorts of communities flourish, less rooted in kin, more voluntary and fluid, but communities for all that. It is mediating communities that make the life of individuals and states possible. When these are broken, the state is broken. The Incarnation. \" The point of Incarnation is to respect the world as it is... to disbelieve any promises that the world is now or ever will be transformed into the City of God \" ,(p341) but still to hope. That is what the Founding Fathers did when they \" chose as their model citizen.. the free man of property and commerce. \" (p343) Heroism and virtue were permitted, but \" the system as a system was cut to common cloth. \" \" They did not promise paradise, or peace and justice. \" The task of political economy is not to guide the ship but to make a voyage possible.(p343) Competition. People called to the religious life tend to be non-competitive. There is a temptation to impose this culture upon others. But a \" political economy needs bold political leaders who thrive in contests of power and willful dreamers and builders who delight in overcoming economic difficulties in order to produce. The will-to-power must be made creative, not destroyed. \" (p344) The Bible certainly understands life as a struggle. \" Many are called, few are chosen, \" \" last shall be first, \" etc. Yet \" Christian grace is never measured either by virtue or by worldly success. \" (p346) Is competition foreign to a religion of \" love, meekness, and peace \" ? Not while it is so hard to \" be meeker than one\u2019s neighbor. \" (p347) The rich may find it hard to get into Heaven, but this is because they have more to answer for. \" It does not seem to be inconsistent with the gospels for each human to struggle, under the spur of competition with his fellows, to become all he can become. \" (p348) Original sin. The doctrine of original sin steels the mind against the utopian illusion, that \" the evils and inconstancies of the human heart are superable \" or caused by \" evil structures. \" (p349) Every political economy has a theory of sin, something it is against. Democratic capitalism is \" designed against tyranny. \" As such, it does not repress human vice, to the shock of outsiders like Alexander Solzhenitsyn. \" Socialist societies repress sin much more effectively. They begin by repressing economic activities. A free society can tolerate vice because it believes in \" the basic decency of human beings... Under an appropriate set of checks and balances, the vast majority of human beings will respond to daily challenges with decency, generosity, common sense, and even, on occasion, moral heroism. \" (p351) The separation of realms. Democratic capitalist society cannot impose Christianity on its people. Christians may try to \" shape the will of the majority \" (p351) but \" must respect the consciences of others even more than law alone may demand. \" (p351) Anyway, Christian values make demands that are \" not of this world. \" No practical human order can be run on purely Christian principles. Christians should follow their conscience \" and cooperate in coalitions where consensus may be reached. \" (p352) At \" the heart of democratic capitalism is a differentiation of system designed to squeeze some good from sinful tendencies. \" (p353) Caritas. This is the ideal of love \" willing the good of the other as other \" .(p353) \" To look upon history as love-infused by a Creator who values others as others... is to glimpse a world in which the political economy of democratic capitalism makes sense. \" (p355) \" in this scheme the individual is not atomic... [for] the fulfillment of the individual lies in a beloved community. Yet any community worthy of such love values the singularity and inviolability of each person. Without true individualism there is not true community. \" (p356) \" The vision is that of a republic of independent, self-reliant, fraternal, cooperative citizens, each of whose interests includes the interests of all in brotherhood \u2018from sea to shining sea\u2019... guided by the motto \u2018In God we trust \" .(p357-8) This book has not been about the practice of capitalism; it has been about grasping the ideals implied in its practice. It now becomes possible to compare it with socialism, ideal against ideal, practice against practice. If the real world of democratic capitalism is worse than its ideal, then how should it be judged? By what standard? It does not meet the ideals of democratic socialism because it has its own ideals. It does not meet the highest ideals of Judaism and Christianity, for no political economy can do that. But democratic capitalism stands ready for criticism and change. It is designed for that, the only known system designed for \" transformation by peaceful means. \" (p359) God designed creation as an arena of free will, and democratic capitalism honors that with a \" non-coercive society... within which individuals and peoples are called to realize, through democratic methods, the vocations to which they believe they are called. \" (p360) \" Under God, they may expect to meet exact and just judgment. \"", "edit_actions": [{"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 836, "end_char_pos": 837}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 862, "end_char_pos": 863}, {"type": "R", "before": "\u201cliberation theology\u201d", "after": "\"liberation theology\"", "start_char_pos": 925, "end_char_pos": 946}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 985, "end_char_pos": 986}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1052, "end_char_pos": 1053}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1167, "end_char_pos": 1168}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1212, "end_char_pos": 1213}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1383, "end_char_pos": 1384}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1456, "end_char_pos": 1457}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1480, "end_char_pos": 1481}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1689, "end_char_pos": 1690}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1908, "end_char_pos": 1909}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1974, "end_char_pos": 1975}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 2055, "end_char_pos": 2056}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2081, "end_char_pos": 2082}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 2312, "end_char_pos": 2313}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2395, "end_char_pos": 2396}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 2443, "end_char_pos": 2444}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2505, "end_char_pos": 2506}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 2570, "end_char_pos": 2571}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2607, "end_char_pos": 2608}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 2615, "end_char_pos": 2616}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2658, "end_char_pos": 2659}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 2845, "end_char_pos": 2846}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2892, "end_char_pos": 2893}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 3203, "end_char_pos": 3204}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 3274, "end_char_pos": 3275}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 3297, "end_char_pos": 3298}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 3348, "end_char_pos": 3349}, {"type": "R", "before": "\u201ciron cage\u201d \u201c", "after": "\"iron cage\" \"", "start_char_pos": 3378, "end_char_pos": 3391}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 3435, "end_char_pos": 3436}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 3476, "end_char_pos": 3477}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 3751, "end_char_pos": 3752}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 3849, "end_char_pos": 3850}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 3943, "end_char_pos": 3944}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 4192, "end_char_pos": 4193}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 4245, "end_char_pos": 4246}, {"type": "R", "before": "\u201csacred canopy\u201d and experiences \u201c", "after": "\"sacred canopy\" and experiences \"", "start_char_pos": 4336, "end_char_pos": 4369}, {"type": "R", "before": "\u201d \u201c", "after": "\" \"", "start_char_pos": 4385, "end_char_pos": 4388}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 4456, "end_char_pos": 4457}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 4512, "end_char_pos": 4513}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 4548, "end_char_pos": 4549}, {"type": "R", "before": "\u201csacred canopy\u201d", "after": "\"sacred canopy\"", "start_char_pos": 4584, "end_char_pos": 4599}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 5091, "end_char_pos": 5092}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 5145, "end_char_pos": 5146}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 5372, "end_char_pos": 5373}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 5430, "end_char_pos": 5431}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 5552, "end_char_pos": 5553}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 5586, "end_char_pos": 5587}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 5718, "end_char_pos": 5719}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 5747, "end_char_pos": 5748}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 5813, "end_char_pos": 5814}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 5929, "end_char_pos": 5930}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 6221, "end_char_pos": 6222}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 6260, "end_char_pos": 6261}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 6268, "end_char_pos": 6269}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 6403, "end_char_pos": 6404}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 6467, "end_char_pos": 6468}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 6586, "end_char_pos": 6587}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 6687, "end_char_pos": 6688}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 6824, "end_char_pos": 6825}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 6874, "end_char_pos": 6875}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 6958, "end_char_pos": 6959}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 6982, "end_char_pos": 6983}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 7200, "end_char_pos": 7201}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 7244, "end_char_pos": 7245}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 7331, "end_char_pos": 7332}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 7381, "end_char_pos": 7382}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 7432, "end_char_pos": 7433}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 7486, "end_char_pos": 7487}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 7731, "end_char_pos": 7732}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 7828, "end_char_pos": 7829}, {"type": "R", "before": "\u201chealthy realism\u201d", "after": "\"healthy realism\"", "start_char_pos": 8048, "end_char_pos": 8065}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 8241, "end_char_pos": 8242}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 8257, "end_char_pos": 8258}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 8312, "end_char_pos": 8313}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 8458, "end_char_pos": 8459}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 8756, "end_char_pos": 8757}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 8798, "end_char_pos": 8799}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 8896, "end_char_pos": 8897}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 8979, "end_char_pos": 8980}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 9428, "end_char_pos": 9429}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 9482, "end_char_pos": 9483}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 9578, "end_char_pos": 9579}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 9669, "end_char_pos": 9670}, {"type": "R", "before": "\u201cinvisible hand\u201d", "after": "\"invisible hand\"", "start_char_pos": 9853, "end_char_pos": 9869}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 10004, "end_char_pos": 10005}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 10063, "end_char_pos": 10064}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 10265, "end_char_pos": 10266}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 10322, "end_char_pos": 10323}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 10345, "end_char_pos": 10346}, {"type": "R", "before": "\u201d, the \u201c", "after": "\", the \"", "start_char_pos": 10370, "end_char_pos": 10378}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 10396, "end_char_pos": 10397}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 10635, "end_char_pos": 10636}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 10696, "end_char_pos": 10697}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 10772, "end_char_pos": 10773}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 10949, "end_char_pos": 10950}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 10995, "end_char_pos": 10996}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 11019, "end_char_pos": 11020}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 11042, "end_char_pos": 11043}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 11072, "end_char_pos": 11073}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 11324, "end_char_pos": 11325}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 11366, "end_char_pos": 11367}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 11378, "end_char_pos": 11379}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 11423, "end_char_pos": 11424}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 11490, "end_char_pos": 11491}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 11609, "end_char_pos": 11610}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 11636, "end_char_pos": 11637}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 11687, "end_char_pos": 11688}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 11739, "end_char_pos": 11740}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 11845, "end_char_pos": 11846}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 12014, "end_char_pos": 12015}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 12209, "end_char_pos": 12210}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 12218, "end_char_pos": 12219}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 12313, "end_char_pos": 12314}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 12343, "end_char_pos": 12344}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 12466, "end_char_pos": 12467}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 12531, "end_char_pos": 12532}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 12612, "end_char_pos": 12613}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 12726, "end_char_pos": 12727}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 12800, "end_char_pos": 12801}, {"type": "R", "before": "\u201cbourgeois\u201d", "after": "\"bourgeois\"", "start_char_pos": 12855, "end_char_pos": 12866}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 13097, "end_char_pos": 13098}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 13114, "end_char_pos": 13115}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 13212, "end_char_pos": 13213}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 13263, "end_char_pos": 13264}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 13313, "end_char_pos": 13314}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 13344, "end_char_pos": 13345}, {"type": "R", "before": "isn't", "after": "is not", "start_char_pos": 13354, "end_char_pos": 13359}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 13505, "end_char_pos": 13506}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 13596, "end_char_pos": 13597}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 13684, "end_char_pos": 13685}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 13765, "end_char_pos": 13766}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 13986, "end_char_pos": 13987}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 14021, "end_char_pos": 14022}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 14082, "end_char_pos": 14083}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 14244, "end_char_pos": 14245}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 14254, "end_char_pos": 14255}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 14333, "end_char_pos": 14334}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 14419, "end_char_pos": 14420}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 14592, "end_char_pos": 14593}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 14652, "end_char_pos": 14653}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 14672, "end_char_pos": 14673}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 14809, "end_char_pos": 14810}, {"type": "R", "before": "\u201d But \u201c", "after": "\" But \"", "start_char_pos": 14835, "end_char_pos": 14842}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 14936, "end_char_pos": 14937}, {"type": "R", "before": "\u201cfamilial animals\u201d for the \u201c", "after": "\"familial animals\" for the \"", "start_char_pos": 14978, "end_char_pos": 15006}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 15157, "end_char_pos": 15158}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 15166, "end_char_pos": 15167}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 15310, "end_char_pos": 15311}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 15319, "end_char_pos": 15320}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 15519, "end_char_pos": 15520}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 15528, "end_char_pos": 15529}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 15618, "end_char_pos": 15619}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 15679, "end_char_pos": 15680}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 15752, "end_char_pos": 15753}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 15769, "end_char_pos": 15770}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 15818, "end_char_pos": 15819}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 15889, "end_char_pos": 15890}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 15909, "end_char_pos": 15910}, {"type": "R", "before": "\u201cfind\u201d rather than \u201cbetter\u201d itself. \u201c", "after": "\"find\" rather than \"better\" itself. \"", "start_char_pos": 16232, "end_char_pos": 16269}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 16370, "end_char_pos": 16371}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 16671, "end_char_pos": 16672}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 16736, "end_char_pos": 16737}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 16814, "end_char_pos": 16815}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 16912, "end_char_pos": 16913}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 17211, "end_char_pos": 17212}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 17242, "end_char_pos": 17243}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 17438, "end_char_pos": 17439}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 17545, "end_char_pos": 17546}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 17924, "end_char_pos": 17925}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 17952, "end_char_pos": 17953}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 18147, "end_char_pos": 18148}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 18274, "end_char_pos": 18275}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 18336, "end_char_pos": 18337}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 18478, "end_char_pos": 18479}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 18684, "end_char_pos": 18685}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 18730, "end_char_pos": 18731}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 19023, "end_char_pos": 19024}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 19096, "end_char_pos": 19097}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 19142, "end_char_pos": 19143}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 19386, "end_char_pos": 19387}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 19563, "end_char_pos": 19564}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 19715, "end_char_pos": 19716}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 19781, "end_char_pos": 19782}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 19891, "end_char_pos": 19892}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 20022, "end_char_pos": 20023}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 20115, "end_char_pos": 20116}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 20124, "end_char_pos": 20125}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 20194, "end_char_pos": 20195}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 20381, "end_char_pos": 20382}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 20402, "end_char_pos": 20403}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 20480, "end_char_pos": 20481}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 20562, "end_char_pos": 20563}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 20836, "end_char_pos": 20837}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 20885, "end_char_pos": 20886}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 21105, "end_char_pos": 21106}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 21137, "end_char_pos": 21138}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 21154, "end_char_pos": 21155}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 21188, "end_char_pos": 21189}, {"type": "R", "before": "\u201cdemocratic control\u201d", "after": "\"democratic control\"", "start_char_pos": 21426, "end_char_pos": 21446}, {"type": "R", "before": "\u201cparticipation,\u201d", "after": "\"participation,\"", "start_char_pos": 21694, "end_char_pos": 21710}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 21794, "end_char_pos": 21795}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 21897, "end_char_pos": 21898}, {"type": "R", "before": "\u201cimmoral.\u201d", "after": "\"immoral.\"", "start_char_pos": 21938, "end_char_pos": 21948}, {"type": "R", "before": "\u201cobscene.\u201d", "after": "\"obscene.\"", "start_char_pos": 22003, "end_char_pos": 22013}, {"type": "R", "before": "\u201cmoral restraint\u201d", "after": "\"moral restraint\"", "start_char_pos": 22034, "end_char_pos": 22051}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 22382, "end_char_pos": 22383}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 22421, "end_char_pos": 22422}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 22930, "end_char_pos": 22931}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 22982, "end_char_pos": 22983}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 23212, "end_char_pos": 23213}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 23235, "end_char_pos": 23236}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 23291, "end_char_pos": 23292}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 23501, "end_char_pos": 23502}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 23625, "end_char_pos": 23626}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 23720, "end_char_pos": 23721}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 23822, "end_char_pos": 23823}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 23985, "end_char_pos": 23986}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 24029, "end_char_pos": 24030}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 24309, "end_char_pos": 24310}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 24386, "end_char_pos": 24387}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 24938, "end_char_pos": 24939}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 24973, "end_char_pos": 24974}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 25085, "end_char_pos": 25086}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 25237, "end_char_pos": 25238}, {"type": "R", "before": "\u201cindividualism\u201d", "after": "\"individualism\"", "start_char_pos": 25442, "end_char_pos": 25457}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 25505, "end_char_pos": 25506}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 25583, "end_char_pos": 25584}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 25948, "end_char_pos": 25949}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 25984, "end_char_pos": 25985}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 26339, "end_char_pos": 26340}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 26396, "end_char_pos": 26397}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 26515, "end_char_pos": 26516}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 26534, "end_char_pos": 26535}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 26596, "end_char_pos": 26597}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 26634, "end_char_pos": 26635}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 26805, "end_char_pos": 26806}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 26895, "end_char_pos": 26896}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 26922, "end_char_pos": 26923}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 26995, "end_char_pos": 26996}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 27071, "end_char_pos": 27072}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 27184, "end_char_pos": 27185}, {"type": "R", "before": "\u201csocialism\u201d", "after": "\"socialism\"", "start_char_pos": 27283, "end_char_pos": 27294}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 27535, "end_char_pos": 27536}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 27572, "end_char_pos": 27573}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 27584, "end_char_pos": 27585}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 27825, "end_char_pos": 27826}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 27870, "end_char_pos": 27871}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 27982, "end_char_pos": 27983}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 28216, "end_char_pos": 28217}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 28285, "end_char_pos": 28286}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 28365, "end_char_pos": 28366}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 28417, "end_char_pos": 28418}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 28433, "end_char_pos": 28434}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 28457, "end_char_pos": 28458}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 28618, "end_char_pos": 28619}, {"type": "R", "before": "\u201d that \u201c", "after": "\" that \"", "start_char_pos": 28649, "end_char_pos": 28657}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 28713, "end_char_pos": 28714}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 28768, "end_char_pos": 28769}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 28789, "end_char_pos": 28790}, {"type": "R", "before": "\u201cunchecked liberalism\u201d", "after": "\"unchecked liberalism\"", "start_char_pos": 28849, "end_char_pos": 28871}, {"type": "R", "before": "\u201cdictatorship\u201d", "after": "\"dictatorship\"", "start_char_pos": 28925, "end_char_pos": 28939}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 29033, "end_char_pos": 29034}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 29062, "end_char_pos": 29063}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 29188, "end_char_pos": 29189}, {"type": "R", "before": "\u201ccenter.\u201d", "after": "\"center.\"", "start_char_pos": 29340, "end_char_pos": 29349}, {"type": "R", "before": "\u201cliberation theology\u201d", "after": "\"liberation theology\"", "start_char_pos": 29526, "end_char_pos": 29547}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 29657, "end_char_pos": 29658}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 29699, "end_char_pos": 29700}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 29775, "end_char_pos": 29776}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 29913, "end_char_pos": 29914}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 29940, "end_char_pos": 29941}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 29981, "end_char_pos": 29982}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 30034, "end_char_pos": 30035}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 30089, "end_char_pos": 30090}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 30127, "end_char_pos": 30128}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 30151, "end_char_pos": 30152}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 30292, "end_char_pos": 30293}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 30311, "end_char_pos": 30312}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 30443, "end_char_pos": 30444}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 30631, "end_char_pos": 30632}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 30742, "end_char_pos": 30743}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 30795, "end_char_pos": 30796}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 31531, "end_char_pos": 31532}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 31636, "end_char_pos": 31637}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 31717, "end_char_pos": 31718}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 31953, "end_char_pos": 31954}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 32629, "end_char_pos": 32630}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 32678, "end_char_pos": 32679}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 32761, "end_char_pos": 32762}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 32880, "end_char_pos": 32881}, {"type": "R", "before": "1865-1914.", "after": "1865\u20131914.", "start_char_pos": 33099, "end_char_pos": 33109}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 33142, "end_char_pos": 33143}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 33194, "end_char_pos": 33195}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 33230, "end_char_pos": 33231}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 33247, "end_char_pos": 33248}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 33480, "end_char_pos": 33481}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 33512, "end_char_pos": 33513}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 33665, "end_char_pos": 33666}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 33725, "end_char_pos": 33726}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 33735, "end_char_pos": 33736}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 34082, "end_char_pos": 34083}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 34259, "end_char_pos": 34260}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 34327, "end_char_pos": 34328}, {"type": "R", "before": "\u201cnoble way\u201d than the \u201clowly\u201d", "after": "\"noble way\" than the \"lowly\"", "start_char_pos": 34395, "end_char_pos": 34423}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 34709, "end_char_pos": 34710}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 34736, "end_char_pos": 34737}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 34912, "end_char_pos": 34913}, {"type": "R", "before": "\u201d as a \u201c", "after": "\" as a \"", "start_char_pos": 34938, "end_char_pos": 34946}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 34983, "end_char_pos": 34984}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 35081, "end_char_pos": 35082}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 35126, "end_char_pos": 35127}, {"type": "R", "before": "\u201csocial ownership\u201d", "after": "\"social ownership\"", "start_char_pos": 35191, "end_char_pos": 35209}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 35232, "end_char_pos": 35233}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 35253, "end_char_pos": 35254}, {"type": "R", "before": "\u201csocial struggle\u201d", "after": "\"social struggle\"", "start_char_pos": 35266, "end_char_pos": 35283}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 35368, "end_char_pos": 35369}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 35442, "end_char_pos": 35443}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 35674, "end_char_pos": 35675}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 35946, "end_char_pos": 35947}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 36024, "end_char_pos": 36025}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 36051, "end_char_pos": 36052}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 36121, "end_char_pos": 36122}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 36235, "end_char_pos": 36236}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 36315, "end_char_pos": 36316}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 36388, "end_char_pos": 36389}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 36453, "end_char_pos": 36454}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 36511, "end_char_pos": 36512}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 36534, "end_char_pos": 36535}, {"type": "R", "before": "\u201cinterests\u201d", "after": "\"interests\"", "start_char_pos": 36563, "end_char_pos": 36574}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 36589, "end_char_pos": 36590}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 36742, "end_char_pos": 36743}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 36843, "end_char_pos": 36844}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 36873, "end_char_pos": 36874}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 36883, "end_char_pos": 36884}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 36981, "end_char_pos": 36982}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 37227, "end_char_pos": 37228}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 37285, "end_char_pos": 37286}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 37583, "end_char_pos": 37584}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 37640, "end_char_pos": 37641}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 37651, "end_char_pos": 37652}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 37728, "end_char_pos": 37729}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 38133, "end_char_pos": 38134}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 38200, "end_char_pos": 38201}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 38408, "end_char_pos": 38409}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 38709, "end_char_pos": 38710}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 38768, "end_char_pos": 38769}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 38952, "end_char_pos": 38953}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 39010, "end_char_pos": 39011}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 39074, "end_char_pos": 39075}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 39248, "end_char_pos": 39249}, {"type": "R", "before": "\u201cdark illumination\u201d", "after": "\"dark illumination\"", "start_char_pos": 39335, "end_char_pos": 39354}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 39378, "end_char_pos": 39379}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 39467, "end_char_pos": 39468}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 39731, "end_char_pos": 39732}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 39892, "end_char_pos": 39893}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 39969, "end_char_pos": 39970}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 40041, "end_char_pos": 40042}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 40089, "end_char_pos": 40090}, {"type": "R", "before": "\u201d \u201c", "after": "\" \"", "start_char_pos": 40139, "end_char_pos": 40142}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 40196, "end_char_pos": 40197}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 40431, "end_char_pos": 40432}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 40671, "end_char_pos": 40672}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 40732, "end_char_pos": 40733}, {"type": "R", "before": "\u201d \u201c", "after": "\" \"", "start_char_pos": 40767, "end_char_pos": 40770}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 40792, "end_char_pos": 40793}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 40803, "end_char_pos": 40804}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 40879, "end_char_pos": 40880}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 40928, "end_char_pos": 40929}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 40956, "end_char_pos": 40957}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 40987, "end_char_pos": 40988}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 41020, "end_char_pos": 41021}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 41125, "end_char_pos": 41126}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 41285, "end_char_pos": 41286}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 41388, "end_char_pos": 41389}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 41451, "end_char_pos": 41452}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 41466, "end_char_pos": 41467}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 41485, "end_char_pos": 41486}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 41589, "end_char_pos": 41590}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 41617, "end_char_pos": 41618}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 41715, "end_char_pos": 41716}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 41874, "end_char_pos": 41875}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 42107, "end_char_pos": 42108}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 42236, "end_char_pos": 42237}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 42269, "end_char_pos": 42270}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 42282, "end_char_pos": 42283}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 42360, "end_char_pos": 42361}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 42416, "end_char_pos": 42417}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 42437, "end_char_pos": 42438}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 42549, "end_char_pos": 42550}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 42611, "end_char_pos": 42612}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 42623, "end_char_pos": 42624}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 42745, "end_char_pos": 42746}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 42789, "end_char_pos": 42790}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 42830, "end_char_pos": 42831}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 42840, "end_char_pos": 42841}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 43014, "end_char_pos": 43015}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 43023, "end_char_pos": 43024}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 43292, "end_char_pos": 43293}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 43301, "end_char_pos": 43302}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 43534, "end_char_pos": 43535}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 44195, "end_char_pos": 44196}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 44231, "end_char_pos": 44232}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 44333, "end_char_pos": 44334}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 44500, "end_char_pos": 44501}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 44509, "end_char_pos": 44510}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 44571, "end_char_pos": 44572}], "sents_char_pos": [0, 290, 454, 596, 626, 706, 964, 1125, 1211, 1368, 1688, 1725, 1855, 1973, 2080, 2239, 2442, 2504, 2536, 2657, 2765, 2844, 2891, 2986, 3176, 3273, 3443, 3475, 3566, 3620, 3750, 3810, 3942, 3996, 4078, 4153, 4244, 4301, 4384, 4455, 4547, 4610, 4764, 4930, 5007, 5046, 5257, 5429, 5585, 5746, 5928, 6019, 6085, 6183, 6259, 6330, 6376, 6466, 6523, 6585, 6686, 6793, 6823, 6873, 6937, 6981, 7080, 7243, 7380, 7431, 7510, 7552, 7682, 7827, 7899, 8002, 8164, 8236, 8277, 8354, 8457, 8532, 8603, 8663, 8832, 8987, 9044, 9116, 9165, 9220, 9270, 9381, 9427, 9481, 9577, 9668, 9720, 9823, 9966, 10062, 10136, 10234, 10321, 10576, 10628, 10771, 10840, 10903, 10948, 11151, 11204, 11290, 11422, 11489, 11608, 11702, 11844, 11920, 11963, 12013, 12208, 12312, 12465, 12611, 12686, 12825, 12887, 12976, 13150, 13343, 13425, 13489, 13595, 13647, 13667, 13809, 13898, 13962, 14020, 14081, 14332, 14384, 14490, 14591, 14671, 14741, 14834, 14935, 15156, 15223, 15518, 15617, 15678, 15817, 15867, 15967, 16104, 16159, 16267, 16369, 16533, 16592, 16670, 16735, 16953, 17048, 17251, 17437, 17544, 17660, 17842, 17951, 18067, 18146, 18273, 18477, 18554, 18729, 18958, 18995, 19368, 19537, 19714, 19890, 19924, 20006, 20193, 20293, 20343, 20401, 20605, 20649, 20707, 20884, 20999, 21136, 21204, 21264, 21305, 21360, 21474, 21647, 21781, 22013, 22167, 22293, 22364, 22420, 22565, 22707, 22760, 22803, 23007, 23057, 23151, 23234, 23371, 23418, 23493, 23624, 23694, 23719, 23821, 23972, 24182, 24308, 24385, 24461, 24524, 24621, 24750, 24862, 24972, 25236, 25383, 25706, 25848, 26028, 26174, 26317, 26395, 26470, 26509, 26575, 26712, 26767, 26804, 26894, 26994, 27056, 27262, 27467, 27571, 27824, 27981, 28033, 28060, 28189, 28284, 28456, 28497, 28537, 28712, 28957, 29061, 29167, 29283, 29349, 29448, 29607, 29698, 29912, 29980, 30088, 30210, 30405, 30504, 30630, 30721, 30794, 30898, 30966, 31022, 31169, 31232, 31325, 31503, 31530, 31662, 31821, 31848, 31952, 32044, 32078, 32132, 32192, 32243, 32271, 32325, 32373, 32430, 32527, 32593, 32677, 32760, 32879, 32948, 33109, 33246, 33300, 33385, 33511, 33559, 33627, 33950, 34081, 34183, 34258, 34326, 34464, 34533, 34641, 34793, 34861, 35298, 35367, 35441, 35531, 35563, 35664, 35740, 36050, 36120, 36205, 36314, 36741, 36980, 37040, 37125, 37186, 37313, 37387, 37418, 37526, 37873, 38082, 38132, 38249, 38328, 38513, 38626, 38684, 38767, 39009, 39031, 39156, 39247, 39322, 39409, 39466, 39586, 39669, 39713, 39730, 39920, 40040, 40138, 40195, 40283, 40302, 40366, 40424, 40614, 40670, 40731, 40798, 40878, 41019, 41124, 41284, 41307, 41484, 41563, 41616, 41714, 41771, 41817, 41912, 42106, 42141, 42213, 42359, 42436, 42506, 42610, 42744, 42762, 43013, 43071, 43140, 43235, 43291, 43602, 43665, 43767, 43865, 43883, 43966, 44069, 44134, 44230, 44499]}
+{"doc_id": "29831", "revision_depth": "1", "before_revision": "upright=1.35|Flat-screen televisions for sale at a consumer electronics store in 2008. Television (TV) , sometimes shortened to tele or telly, is a telecommunication medium used for transmitting moving images in monochrome (black and white), or in color, and in two or three dimensions and sound. The term can refer to a television set, a television show, or the medium of television transmission. Television is a mass medium for advertising, entertainment, news, and sports. Television became available in crude experimental forms in the late 1920s, but it would still be several years before the new technology would be marketed to consumers. After World War II, an improved form of black-and-white TV broadcasting became popular in the United Kingdom and United States, and television sets became commonplace in homes, businesses, and institutions. During the 1950s, television was the primary medium for influencing public opinion.Diggs-Brown, Barbara (2011) Strategic Public Relations: Audience Focused Practice p.48 In the mid-1960s, color broadcasting was introduced in the U.S. and most other developed countries. The availability of various types of archival storage media such as Betamax and VHS tapes, high-capacity hard disk drives, DVDs, flash drives, high-definition Blu-ray Discs, and cloud digital video recorders has enabled viewers to watch pre-recorded material\u2014such as movies\u2014at home on their own time schedule. For many reasons, especially the convenience of remote retrieval, the storage of television and video programming now also occurs on the cloud (such as the video on demand service by Netflix). At the end of the first decade of the 2000s, digital television transmissions greatly increased in popularity. Another development was the move from standard-definition television (SDTV) (576i, with 576 interlaced lines of resolution and 480i) to high-definition television (HDTV), which provides a resolution that is substantially higher. HDTV may be transmitted in different formats: 1080p, 1080i and 720p. Since 2010, with the invention of smart television, Internet television has increased the availability of television programs and movies via the Internet through streaming video services such as Netflix, Amazon Video, iPlayer and Hulu. upright=0.9|The Nipkow disk. This schematic shows the circular paths traced by the holes that may also be square for greater precision. The area of the disk outlined in black shows the region scanned. The first demonstration of the live transmission of images was by Georges Rignoux and A. Fournier in Paris in 1909. A matrix of 64 selenium cells, individually wired to a mechanical commutator, served as an electronic retina. In the receiver, a type of Kerr cell modulated the light and a series of variously angled mirrors attached to the edge of a rotating disc scanned the modulated beam onto the display screen. A separate circuit regulated synchronization. The 8x8 pixel resolution in this proof-of-concept demonstration was just sufficient to clearly transmit individual letters of the alphabet. An updated image was transmitted \"several times\" each second.Henry de Varigny, \"La vision \u00e0 distance \", L'Illustration, Paris, 11 December 1909, p. 451. By the 1920s, when amplification made television practical, Scottish inventor John Logie Baird employed the Nipkow disk in his prototype video systems. On 25 March 1925, Baird gave the first public demonstration of televised silhouette images in motion, at Selfridge's Department Store in London. Since human faces had inadequate contrast to show up on his primitive system, he televised a ventriloquist's dummy named \"Stooky Bill\", whose painted face had higher contrast, talking and moving. By 26 January 1926, he had demonstrated the transmission of an image of a face in motion by radio. This is widely regarded as the world's first public television demonstration. Baird's system used the Nipkow disk for both scanning the image and displaying it. A brightly illuminated subject was placed in front of a spinning Nipkow disk set with lenses which swept images across a static photocell. The thallium sulphide (Thalofide) cell, developed by Theodore Case in the USA , detected the light reflected from the subject and converted it into a proportional electrical signal. This was transmitted by AM radio waves to a receiver unit, where the video signal was applied to a neon light behind a second Nipkow disk rotating synchronized with the first. The brightness of the neon lamp was varied in proportion to the brightness of each spot on the image. As each hole in the disk passed by, one scan line of the image was reproduced. Baird's disk had 30 holes, producing an image with only 30 scan lines, just enough to recognize a human face. In 1927, Baird transmitted a signal over of telephone line between London and Glasgow. In 1928, Baird's company (Baird Television Development Company/Cinema Television) broadcast the first transatlantic television signal, between London and New York, and the first shore-to-ship transmission. In 1929, he became involved in the first experimental mechanical television service in Germany. In November of the same year, Baird and Bernard Natan of Path\u00e9 established France's first television company, T\u00e9l\u00e9vision-Baird-Natan. In 1931, he made the first outdoor remote broadcast, of The Derby.J. L. Baird, \"Television in 1932\", BBC Annual Report, 1933. In 1932, he demonstrated ultra-short wave television. Baird's mechanical system reached a peak of 240-lines of resolution on BBC television broadcasts in 1936, though the mechanical system did not scan the televised scene directly. Instead a 17.5mm film was shot, rapidly developed and then scanned while the film was still wet. An American inventor, Charles Francis Jenkins, also pioneered the television. He published an article on \"Motion Pictures by Wireless\" in 1913, but it was not until December 1923 that he transmitted moving silhouette images for witnesses; and it was on 13 June 1925, that he publicly demonstrated synchronized transmission of silhouette pictures. In 1925 Jenkins used the Nipkow disk and transmitted the silhouette image of a toy windmill in motion, over a distance of 5 miles (8 km), from a naval radio station in Maryland to his laboratory in Washington, D.C., using a lensed disk scanner with a 48-line resolution.\"Radio Shows Far Away Objects in Motion\", The New York Times, 14 June 1925, p. 1. He was granted U.S. Patent No. 1,544,156 (Transmitting Pictures over Wireless) on 30 June 1925 (filed 13 March 1922). Because only a limited number of holes could be made in the disks, and disks beyond a certain diameter became impractical, image resolution on mechanical television broadcasts was relatively low, ranging from about 30 lines up to 120 or so. Nevertheless, the image quality of 30-line transmissions steadily improved with technical advances, and by 1933 the UK broadcasts using the Baird system were remarkably clear.Donald F. McLean, Restoring Baird's Image (London: IEEE, 2000), p. 184. A few systems ranging into the 200-line region also went on the air. Two of these were the 180-line system that Compagnie des Compteurs (CDC) installed in Paris in 1935, and the 180-line system that Peck Television Corp. started in 1935 at station VE9AK in Montreal. The advancement of all-electronic television (including image dissectors and other camera tubes and cathode ray tubes for the reproducer) marked the beginning of the end for mechanical systems as the dominant form of television. Mechanical television, despite its inferior image quality and generally smaller picture, would remain the primary television technology until the 1930s. The last mechanical television broadcasts ended in 1939 at stations run by a handful of public universities in the United States. In 1897, English physicist J. J. Thomson was able, in his three famous experiments, to deflect cathode rays, a fundamental function of the modern cathode ray tube (CRT). The earliest version of the CRT was invented by the German physicist Ferdinand Braun in 1897 and is also known as the \"Braun\" tube.Ferdinand Braun (1897) \"Ueber ein Verfahren zur Demonstration und zum Studium des zeitlichen Verlaufs variabler Str\u00f6me\" (On a process for the display and study of the course in time of variable currents), Annalen der Physik und Chemie, 3rd series, 60 : 552\u201359. It was a cold-cathode diode, a modification of the Crookes tube, with a phosphor-coated screen. In 1906 the Germans Max Dieckmann and Gustav Glage produced raster images for the first time in a CRT. In 1907, Russian scientist Boris Rosing used a CRT in the receiving end of an experimental video signal to form a picture. He managed to display simple geometric shapes onto the screen. In 1926, Hungarian engineer K\u00e1lm\u00e1n Tihanyi designed a television system utilizing fully electronic scanning and display elements and employing the principle of \"charge storage\" within the scanning (or \"camera\") tube.United States Patent Office, Patent No. 2,133,123, 11 October 1938.United States Patent Office, Patent No. 2,158,259, 16 May 1939 The problem of low sensitivity to light resulting in low electrical output from transmitting or \"camera\" tubes would be solved with the introduction of charge-storage technology by K\u00e1lm\u00e1n Tihanyi beginning in 1924. \"K\u00e1lm\u00e1n Tihanyi (1897\u20131947)\", IEC Techline, International Electrotechnical Commission (IEC), 15 July 2009. His solution was a camera tube that accumulated and stored electrical charges (\"photoelectrons\") within the tube throughout each scanning cycle. The device was first described in a patent application he filed in Hungary in March 1926 for a television system he dubbed \"Radioskop\".\"K\u00e1lm\u00e1n Tihanyi's 1926 Patent Application 'Radioskop'\", Memory of the World, United Nations Educational, Scientific and Cultural Organization (UNESCO), 2005. Retrieved 29 January 2009. After further refinements included in a 1928 patent application, Tihanyi's patent was declared void in Great Britain in 1930,Tihanyi, Koloman, Improvements in television apparatus. European Patent Office, Patent No. GB313456. Convention date UK application: 1928-06-11, declared void and published: 11 November 1930. Retrieved 25 April 2013. so he applied for patents in the United States. Although his breakthrough would be incorporated into the design of RCA's \"iconoscope\" in 1931, the U.S. patent for Tihanyi's transmitting tube would not be granted until May 1939. The patent for his receiving tube had been granted the previous October. Both patents had been purchased by RCA prior to their approval. Charge storage remains a basic principle in the design of imaging devices for television to the present day. On 25 December 1926, at Hamamatsu Industrial High School in Japan, Japanese inventor Kenjiro Takayanagi demonstrated a TV system with a 40-line resolution that employed a CRT display. This was the first working example of a fully electronic television receiver. Takayanagi did not apply for a patent. On 7 September 1927, American inventor Philo Farnsworth's image dissector camera tube transmitted its first image, a simple straight line, at his laboratory at 202 Green Street in San Francisco.Postman, Neil, \"Philo Farnsworth\", The TIME 100: Scientists & Thinkers, Time, 29 March 1999. Retrieved 28 July 2009.\"Philo Taylor Farnsworth (1906\u20131971)\" , The Virtual Museum of the City of San Francisco. Retrieved 15 July 2009. By 3 September 1928, Farnsworth had developed the system sufficiently to hold a demonstration for the press. This is widely regarded as the first electronic television demonstration. In 1929, the system was improved further by the elimination of a motor generator, so that his television system now had no mechanical parts.Abramson, Albert, Zworykin, Pioneer of Television, p. 226. That year, Farnsworth transmitted the first live human images with his system, including a three and a half-inch image of his wife Elma (\"Pem\") with her eyes closed (possibly due to the bright lighting required).The Philo T. and Elma G. Farnsworth Papers Vladimir Zworykin demonstrates electronic television (1929) Meanwhile, Vladimir Zworykin was also experimenting with the cathode ray tube to create and show images. While working for Westinghouse Electric in 1923, he began to develop an electronic camera tube. But in a 1925 demonstration, the image was dim, had low contrast, and poor definition, and was stationary.Abramson, Albert, Zworykin, Pioneer of Television, University of Illinois Press, 1995, p. 51. . Zworykin's imaging tube never got beyond the laboratory stage. But RCA, which acquired the Westinghouse patent, asserted that the patent for Farnsworth's 1927 image dissector was written so broadly that it would exclude any other electronic imaging device. Thus RCA, on the basis of Zworykin's 1923 patent application, filed a patent interference suit against Farnsworth. The U.S. Patent Office examiner disagreed in a 1935 decision, finding priority of invention for Farnsworth against Zworykin. Farnsworth claimed that Zworykin's 1923 system would be unable to produce an electrical image of the type to challenge his patent. Zworykin received a patent in 1928 for a color transmission version of his 1923 patent application;Zworykin, Vladimir K., Television System. Patent No. 1691324, U.S. Patent Office. Filed 1925-07-13, issued 13 November 1928. Retrieved 28 July 2009 he also divided his original application in 1931.Zworykin, Vladimir K., Television System. Patent No. 2022450, U.S. Patent Office. Filed 1923-12-29, issued 26 November 1935. Retrieved 10 May 2010. Zworykin was unable or unwilling to introduce evidence of a working model of his tube that was based on his 1923 patent application. In September 1939, after losing an appeal in the courts, and determined to go forward with the commercial manufacturing of television equipment, RCA agreed to pay Farnsworth US $1 million over a ten-year period, in addition to license payments, to use his patents.Stashower, Daniel, The Boy Genius and the Mogul: The Untold Story of Television, Broadway Books, 2002, pp. 243\u201344. .Everson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , 266 pp. In 1933, RCA introduced an improved camera tube that relied on Tihanyi's charge storage principle. Dubbed the \"Iconoscope\" by Zworykin, the new tube had a light sensitivity of about 75,000 lux, and thus was claimed to be much more sensitive than Farnsworth's image dissector. However, Farnsworth had overcome his power problems with his Image Dissector through the invention of a completely unique \"multipactor\" device that he began work on in 1930, and demonstrated in 1931.Abramson, Albert (1987), The History of Television, 1880 to 1941. Jefferson, NC: Albert Abramson. p. 148. .Everson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , pp. 137\u201341. This small tube could amplify a signal reportedly to the 60th power or betterEverson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , p. 139. and showed great promise in all fields of electronics. Unfortunately, a problem with the multipactor was that it wore out at an unsatisfactory rate.Everson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , p. 141. At the Berlin Radio Show in August 1931, Manfred von Ardenne gave a public demonstration of a television system using a CRT for both transmission and reception. However, Ardenne had not developed a camera tube, using the CRT instead as a flying-spot scanner to scan slides and film.Albert Abramson, Zworykin: Pioneer of Television, University of Illinois Press, 1995, p. 111. Philo Farnsworth gave the world's first public demonstration of an all-electronic television system, using a live camera, at the Franklin Institute of Philadelphia on 25 August 1934, and for ten days afterwards.\"New Television System Uses 'Magnetic Lens'\", Popular Mechanics, Dec. 1934, pp. 838\u201339.Burns, R.W. Television: An international history of the formative years. (1998). IEE History of Technology Series, 22. London: IEE, p. 370. . Mexican inventor Guillermo Gonz\u00e1lez Camarena also played an important role in early TV. His experiments with TV (known as telectroescop\u00eda at first) began in 1931 and led to a patent for the \"trichromatic field sequential system\" color television in 1940. In Britain, the EMI engineering team led by Isaac Shoenberg applied in 1932 for a patent for a new device they dubbed \"the Emitron\", which formed the heart of the cameras they designed for the BBC. On 2 November 1936, a 405-line broadcasting service employing the Emitron began at studios in Alexandra Palace, and transmitted from a specially built mast atop one of the Victorian building's towers. It alternated for a short time with Baird's mechanical system in adjoining studios, but was more reliable and visibly superior. This was the world's first regular \"high-definition\" television service.Burns, R.W., Television: An international history of the formative years. (1998). IEE History of Technology Series, 22. London: IEE, p. 576. . The original American iconoscope was noisy, had a high ratio of interference to signal, and ultimately gave disappointing results, especially when compared to the high definition mechanical scanning systems then becoming available. The EMI team, under the supervision of Isaac Shoenberg, analyzed how the iconoscope (or Emitron) produces an electronic signal and concluded that its real efficiency was only about 5\\% of the theoretical maximum. They solved this problem by developing, and patenting in 1934, two new camera tubes dubbed super-Emitron and CPS Emitron. The super-Emitron was between ten and fifteen times more sensitive than the original Emitron and iconoscope tubes and, in some cases, this ratio was considerably greater. It was used for outside broadcasting by the BBC, for the first time, on Armistice Day 1937, when the general public could watch on a television set as the King laid a wreath at the Cenotaph. This was the first time that anyone had broadcast a live street scene from cameras installed on the roof of neighboring buildings, because neither Farnsworth nor RCA would do the same until the 1939 New York World's Fair. Ad for the beginning of experimental television broadcasting in New York City by RCA in 1939 Indian-head test pattern used during the black & white era before 1970. It was displayed when a TV station first signed on every day. On the other hand, in 1934, Zworykin shared some patent rights with the German licensee company Telefunken. The \"image iconoscope\" (\"Superikonoskop\" in Germany) was produced as a result of the collaboration. This tube is essentially identical to the super-Emitron. The production and commercialization of the super-Emitron and image iconoscope in Europe were not affected by the patent war between Zworykin and Farnsworth, because Dieckmann and Hell had priority in Germany for the invention of the image dissector, having submitted a patent application for their Lichtelektrische Bildzerlegerr\u00f6hre f\u00fcr Fernseher (Photoelectric Image Dissector Tube for Television) in Germany in 1925, two years before Farnsworth did the same in the United States. The image iconoscope (Superikonoskop) became the industrial standard for public broadcasting in Europe from 1936 until 1960, when it was replaced by the vidicon and plumbicon tubes. Indeed, it was the representative of the European tradition in electronic tubes competing against the American tradition represented by the image orthicon. The German company Heimann produced the Superikonoskop for the 1936 Berlin Olympic Games, later Heimann also produced and commercialized it from 1940 to 1955; finally the Dutch company Philips produced and commercialized the image iconoscope and multicon from 1952 to 1958. American television broadcasting, at the time, consisted of a variety of markets in a wide range of sizes, each competing for programming and dominance with separate technology, until deals were made and standards agreed upon in 1941.Everson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , p. 248. RCA, for example, used only Iconoscopes in the New York area, but Farnsworth Image Dissectors in Philadelphia and San Francisco.Abramson, Albert (1987), The History of Television, 1880 to 1941. Jefferson, NC: Albert Abramson. p. 254. . In September 1939, RCA agreed to pay the Farnsworth Television and Radio Corporation royalties over the next ten years for access to Farnsworth's patents.Schatzkin, Paul (2002), The Boy Who Invented Television. Silver Spring, Maryland: Teamcom Books, pp. 187\u201388. . With this historic agreement in place, RCA integrated much of what was best about the Farnsworth Technology into their systems. In 1941, the United States implemented 525-line television.\"Go-Ahead Signal Due for Television\", The New York Times, 25 April 1941, p. 7.\"An Auspicious Beginning\", The New York Times, 3 August 1941, p. X10. Electrical engineer Benjamin Adler played a prominent role in the development of television. The world's first 625-line television standard was designed in the Soviet Union in 1944 and became a national standard in 1946.\"On the beginning of broadcast in 625 lines 60 years ago\", 625 magazine (in Russian). The first broadcast in 625-line standard occurred in Moscow in 1948.\"M.I. Krivocheev \u2013 an engineer's engineer\", EBU Technical Review, Spring 1993. The concept of 625 lines per frame was subsequently implemented in the European CCIR standard.\"In the Vanguard of Television Broadcasting\". In 1936, K\u00e1lm\u00e1n Tihanyi described the principle of plasma display, the first flat panel display system. Early electronic television sets were large and bulky, with analog circuits made of vacuum tubes. Following the invention of the first working transistor at Bell Labs, Sony founder Masaru Ibuka predicted in 1952 that the transition to electronic circuits made of transistors would lead to smaller and more portable television sets. The first fully transistorized, portable solid-state television set was the 8-inch Sony TV8-301, developed in 1959 and released in 1960. This began the transformation of television viewership from a communal viewing experience to a solitary viewing experience. By 1960, Sony had sold over 4million portable television sets worldwide. Color Samsung LED TV The basic idea of using three monochrome images to produce a color image had been experimented with almost as soon as black-and-white televisions had first been built. Although he gave no practical details, among the earliest published proposals for television was one by Maurice Le Blanc, in 1880, for a color system, including the first mentions in television literature of line and frame scanning.M. Le Blanc, \"Etude sur la transmission \u00e9lectrique des impressions lumineuses\", La Lumi\u00e8re Electrique, vol. 11, 1 December 1880, pp. 477\u201381. Polish inventor Jan Szczepanik patented a color television system in 1897, using a selenium photoelectric cell at the transmitter and an electromagnet controlling an oscillating mirror and a moving prism at the receiver. But his system contained no means of analyzing the spectrum of colors at the transmitting end, and could not have worked as he described it.R.W. Burns, Television: An International History of the Formative Years, IET, 1998, p. 98. . Another inventor, Hovannes Adamian, also experimented with color television as early as 1907. The first color television project is claimed by him,Western technology and Soviet economic development: 1945 to 1965, by Antony C. Sutton, Business & Economics \u2013 1973, p. 330 and was patented in Germany on 31 March 1908, patent No. 197183, then in Britain, on 1 April 1908, patent No. 7219,The History of Television, 1880\u20131941, by Albert Abramson, 1987, p. 27 in France (patent No. 390326) and in Russia in 1910 (patent No. 17912).A. Rokhlin, Tak rozhdalos' dal'novidenie (in Russian) Scottish inventor John Logie Baird demonstrated the world's first color transmission on 3 July 1928, using scanning discs at the transmitting and receiving ends with three spirals of apertures, each spiral with filters of a different primary color; and three light sources at the receiving end, with a commutator to alternate their illumination.John Logie Baird, Television Apparatus and the Like, U.S. patent, filed in U.K. in 1928. Baird also made the world's first color broadcast on 4 February 1938, sending a mechanically scanned 120-line image from Baird's Crystal Palace studios to a projection screen at London's Dominion Theatre.Baird Television: Crystal Palace Television Studios. Previous color television demonstrations in the U.K. and U.S. had been via closed circuit. Mechanically scanned color television was also demonstrated by Bell Laboratories in June 1929 using three complete systems of photoelectric cells, amplifiers, glow-tubes, and color filters, with a series of mirrors to superimpose the red, green, and blue images into one full color image. The first practical hybrid system was again pioneered by John Logie Baird. In 1940 he publicly demonstrated a color television combining a traditional black-and-white display with a rotating colored disk. This device was very \"deep\", but was later improved with a mirror folding the light path into an entirely practical device resembling a large conventional console. However, Baird was not happy with the design, and, as early as 1944, had commented to a British government committee that a fully electronic device would be better. In 1939, Hungarian engineer Peter Carl Goldmark introduced an electro-mechanical system while at CBS, which contained an Iconoscope sensor. The CBS field-sequential color system was partly mechanical, with a disc made of red, blue, and green filters spinning inside the television camera at 1,200 rpm, and a similar disc spinning in synchronization in front of the cathode ray tube inside the receiver set.Peter C. Goldmark, assignor to Columbia Broadcasting System, \"Color Television\", U.S. Patent 2,480,571, filed 7 September 1940. The system was first demonstrated to the Federal Communications Commission (FCC) on 29 August 1940, and shown to the press on 4 September.Current Broadcasting 1940\"Color Television Success in Test\", The New York Times, 30 August 1940, p. 21.\"Color Television Achieves Realism\", The New York Times, 5 September 1940, p. 18.\"New Television System Transmits Images in Full Color\", Popular Science, December 1940, p. 120. CBS began experimental color field tests using film as early as 28 August 1940, and live cameras by 12 November.\"CBS Demonstrates Full Color Television,\" The Wall Street Journal, 5 September 1940, p. 1. \"Television Hearing Set,\" The New York Times, 13 November 1940, p. 26. NBC (owned by RCA) made its first field test of color television on 20 February 1941. CBS began daily color field tests on 1 June 1941.Ed Reitan, RCA-NBC Color Firsts in Television (commented). These color systems were not compatible with existing black-and-white television sets, and, as no color television sets were available to the public at this time, viewing of the color field tests was restricted to RCA and CBS engineers and the invited press. The War Production Board halted the manufacture of television and radio equipment for civilian use from 22 April 1942 to 20 August 1945, limiting any opportunity to introduce color television to the general public.\"Making of Radios and Phonographs to End April 22,\" The New York Times, 8 March 1942, p. 1. \"Radio Production Curbs Cover All Combinations,\" The Wall Street Journal, 3 June 1942, p. 4. \"WPB Cancels 210 Controls; Radios, Trucks in Full Output,\" New York Times, 21 August 1945, p. 1.Bob Cooper, \"Television: The Technology That Changed Our Lives\", Early Television Foundation. As early as 1940, Baird had started work on a fully electronic system he called Telechrome. Early Telechrome devices used two electron guns aimed at either side of a phosphor plate. The phosphor was patterned so the electrons from the guns only fell on one side of the patterning or the other. Using cyan and magenta phosphors, a reasonable limited-color image could be obtained. He also demonstrated the same system using monochrome signals to produce a 3D image (called \"stereoscopic\" at the time). A demonstration on 16 August 1944 was the first example of a practical color television system. Work on the Telechrome continued and plans were made to introduce a three-gun version for full color. However, Baird's untimely death in 1946 ended development of the Telechrome system.Albert Abramson, The History of Television, 1942 to 2000, McFarland & Company, 2003, pp. 13\u201314. Baird Television: The World's First High Definition Colour Television System. Similar concepts were common through the 1940s and 1950s, differing primarily in the way they re-combined the colors generated by the three guns. The Geer tube was similar to Baird's concept, but used small pyramids with the phosphors deposited on their outside faces, instead of Baird's 3D patterning on a flat surface. The Penetron used three layers of phosphor on top of each other and increased the power of the beam to reach the upper layers when drawing those colors. The Chromatron used a set of focusing wires to select the colored phosphors arranged in vertical stripes on the tube. One of the great technical challenges of introducing color broadcast television was the desire to conserve bandwidth, potentially three times that of the existing black-and-white standards, and not use an excessive amount of radio spectrum. In the United States, after considerable research, the National Television Systems CommitteeNational Television System Committee (1951\u20131953), [Report and Reports of Panel No. 11, 11-A, 12\u201319, with Some supplementary references cited in the Reports, and the Petition for adoption of transmission standards for color television before the Federal Communications Commission, n.p., 1953], 17 v. illus., diagrams., tables. 28 cm. LC Control No.:54021386 Library of Congress Online Catalog approved an all-electronic system developed by RCA, which encoded the color information separately from the brightness information and greatly reduced the resolution of the color information in order to conserve bandwidth. As black-and-white TVs could receive the same transmission and display it in black-and-white, the color system adopted is [backwards] \"compatible\". (\"Compatible Color\", featured in RCA advertisements of the period, is mentioned in the song \"America\", of West Side Story, 1957.) The brightness image remained compatible with existing black-and-white television sets at slightly reduced resolution, while color televisions could decode the extra information in the signal and produce a limited-resolution color display. The higher resolution black-and-white and lower resolution color images combine in the brain to produce a seemingly high-resolution color image. The NTSC standard represented a major technical achievement. Color bars used in a test pattern, sometimes used when no program material is available. The first color broadcast (the first episode of the live program The Marriage) occurred on 8 July 1954, but during the following ten years most network broadcasts, and nearly all local programming, continued to be in black-and-white. It was not until the mid-1960s that color sets started selling in large numbers, due in part to the color transition of 1965 in which it was announced that over half of all network prime-time programming would be broadcast in color that fall. The first all-color prime-time season came just one year later. In 1972, the last holdout among daytime network programs converted to color, resulting in the first completely all-color network season. Early color sets were either floor-standing console models or tabletop versions nearly as bulky and heavy, so in practice they remained firmly anchored in one place. GE's relatively compact and lightweight Porta-Color set was introduced in the spring of 1966. It used a transistor-based UHF tuner. The first fully transistorized color television in the United States was the Quasar television introduced in 1967. These developments made watching color television a more flexible and convenient proposition. The MOSFET (metal-oxide-semiconductor field-effect transistor, or MOS transistor) was invented by Mohamed M. Atalla and Dawon Kahng at Bell Labs in 1959, and presented in 1960. By the mid-1960s, RCA were using MOSFETs in their consumer television products. RCA Laboratories researchers W.M. Austin, J.A. Dean, D.M. Griswold and O.P. Hart in 1966 described the use of the MOSFET in television circuits, including RF amplifier, low-level video, chroma and AGC circuits. The power MOSFET was later widely adopted for television receiver circuits. In 1972, sales of color sets finally surpassed sales of black-and-white sets. Color broadcasting in Europe was not standardized on the PAL format until the 1960s, and broadcasts did not start until 1967. By this point many of the technical problems in the early sets had been worked out, and the spread of color sets in Europe was fairly rapid. By the mid-1970s, the only stations broadcasting in black-and-white were a few high-numbered UHF stations in small markets, and a handful of low-power repeater stations in even smaller markets such as vacation spots. By 1979, even the last of these had converted to color and, by the early 1980s, B&W sets had been pushed into niche markets, notably low-power uses, small portable sets, or for use as video monitor screens in lower-cost consumer equipment. By the late 1980s even these areas switched to color sets. Digital Digital television (DTV) is the transmission of audio and video by digitally processed and multiplexed signals, in contrast to the totally analog and channel separated signals used by analog television. Due to data compression, digital TV can support more than one program in the same channel bandwidth. It is an innovative service that represents the most significant evolution in television broadcast technology since color television emerged in the 1950s. Digital TV's roots have been tied very closely to the availability of inexpensive, high performance computers. It was not until the 1990s that digital TV became feasible. Digital television was previously not practically feasible due to the impractically high bandwidth requirements of uncompressed digital video, requiring around 200Mbit/s for a standard-definition television (SDTV) signal, and over 1Gbit/s for high-definition television (HDTV). Digital TV became practically feasible in the early 1990s due to a major technological development, discrete cosine transform (DCT) video compression. DCT coding is a lossy compression technique that was first proposed for image compression by Nasir Ahmed in 1972, and was later adapted into a motion-compensated DCT video coding algorithm, for video coding standards such as the H.26x formats from 1988 onwards and the MPEG formats from 1991 onwards. Motion-compensated DCT video compression significantly reduced the amount of bandwidth required for a digital TV signal. DCT coding compressed down the bandwidth requirements of digital television signals to about 34 Mbit/s for SDTV and around 70140 Mbit/s for HDTV while maintaining near-studio-quality transmission, making digital television a practical reality in the 1990s. A digital TV service was proposed in 1986 by Nippon Telegraph and Telephone (NTT) and the Ministry of Posts and Telecommunication (MPT) in Japan, where there were plans to develop an \"Integrated Network System\" service. However, it was not possible to practically implement such a digital TV service until the adoption of DCT video compression technology made it possible in the early 1990s. In the mid-1980s, as Japanese consumer electronics firms forged ahead with the development of HDTV technology, the MUSE analog format proposed by NHK, a Japanese company, was seen as a pacesetter that threatened to eclipse U.S. electronics companies' technologies. Until June 1990, the Japanese MUSE standard, based on an analog system, was the front-runner among the more than 23 different technical concepts under consideration. Then, an American company, General Instrument, demonstrated the feasibility of a digital television signal. This breakthrough was of such significance that the FCC was persuaded to delay its decision on an ATV standard until a digitally based standard could be developed. In March 1990, when it became clear that a digital standard was feasible, the FCC made a number of critical decisions. First, the Commission declared that the new ATV standard must be more than an enhanced analog signal, but be able to provide a genuine HDTV signal with at least twice the resolution of existing television images.(7) Then, to ensure that viewers who did not wish to buy a new digital television set could continue to receive conventional television broadcasts, it dictated that the new ATV standard must be capable of being \"simulcast\" on different channels.(8)The new ATV standard also allowed the new DTV signal to be based on entirely new design principles. Although incompatible with the existing NTSC standard, the new DTV standard would be able to incorporate many improvements. The final standards adopted by the FCC did not require a single standard for scanning formats, aspect ratios, or lines of resolution. This compromise resulted from a dispute between the consumer electronics industry (joined by some broadcasters) and the computer industry (joined by the film industry and some public interest groups) over which of the two scanning processes\u2014interlaced or progressive\u2014would be best suited for the newer digital HDTV compatible display devices. Interlaced scanning, which had been specifically designed for older analogue CRT display technologies, scans even-numbered lines first, then odd-numbered ones. In fact, interlaced scanning can be looked at as the first video compression model as it was partly designed in the 1940s to double the image resolution to exceed the limitations of the television broadcast bandwidth. Another reason for its adoption was to limit the flickering on early CRT screens whose phosphor coated screens could only retain the image from the electron scanning gun for a relatively short duration. However interlaced scanning does not work as efficiently on newer display devices such as Liquid-crystal (LCD), for example, which are better suited to a more frequent progressive refresh rate. Progressive scanning, the format that the computer industry had long adopted for computer display monitors, scans every line in sequence, from top to bottom. Progressive scanning in effect doubles the amount of data generated for every full screen displayed in comparison to interlaced scanning by painting the screen in one pass in 1/60-second, instead of two passes in 1/30-second. The computer industry argued that progressive scanning is superior because it does not \"flicker\" on the new standard of display devices in the manner of interlaced scanning. It also argued that progressive scanning enables easier connections with the Internet, and is more cheaply converted to interlaced formats than vice versa. The film industry also supported progressive scanning because it offered a more efficient means of converting filmed programming into digital formats. For their part, the consumer electronics industry and broadcasters argued that interlaced scanning was the only technology that could transmit the highest quality pictures then (and currently) feasible, i.e., 1,080 lines per picture and 1,920 pixels per line. Broadcasters also favored interlaced scanning because their vast archive of interlaced programming is not readily compatible with a progressive format. William F. Schreiber, who was director of the Advanced Television Research Program at the Massachusetts Institute of Technology from 1983 until his retirement in 1990, thought that the continued advocacy of interlaced equipment originated from consumer electronics companies that were trying to get back the substantial investments they made in the interlaced technology. Digital television transition started in late 2000s. All governments across the world set the deadline for analog shutdown by 2010s. Initially the adoption rate was low, as the first digital tuner-equipped TVs were costly. But soon, as the price of digital-capable TVs dropped, more and more households were converting to digital televisions. The transition is expected to be completed worldwide by mid to late 2010s. Smart TV upright=0.9|A smart TV The advent of digital television allowed innovations like smart TVs. A smart television, sometimes referred to as connected TV or hybrid TV, is a television set or set-top box with integrated Internet and Web 2.0 features, and is an example of technological convergence between computers, television sets and set-top boxes. Besides the traditional functions of television sets and set-top boxes provided through traditional Broadcasting media, these devices can also provide Internet TV, online interactive media, over-the-top content, as well as on-demand streaming media, and home networking access. These TVs come pre-loaded with an operating system. Smart TV should not to be confused with Internet TV, Internet Protocol television (IPTV) or with Web TV. Internet television refers to the receiving of television content over the Internet instead of by traditional systems\u2014terrestrial, cable and satellite (although internet itself is received by these methods). IPTV is one of the emerging Internet television technology standards for use by television broadcasters. Web television (WebTV) is a term used for programs created by a wide variety of companies and individuals for broadcast on Internet TV. A first patent was filed in 1994 (and extended the following year) for an \"intelligent\" television system, linked with data processing systems, by means of a digital or analog network. Apart from being linked to data networks, one key point is its ability to automatically download necessary software routines, according to a user's demand, and process their needs. Major TV manufacturers have announced production of smart TVs only, for middle-end and high-end TVs in 2015. Smart TVs have gotten more affordable compared to when they were first introduced, with 46 million of U.S. households having at least one as of 2019.Kats, Rimma (15 November 2018). \"How Many Households Own a Smart TV?\" eMarketer. Retrieved 21 May 2021. 3D 3D television conveys depth perception to the viewer by employing techniques such as stereoscopic display, multi-view display, 2D-plus-depth, or any other form of 3D display. Most modern 3D television sets use an active shutter 3D system or a polarized 3D system, and some are autostereoscopic without the need of glasses. Stereoscopic 3D television was demonstrated for the first time on 10 August 1928, by John Logie Baird in his company's premises at 133 Long Acre, London. Baird pioneered a variety of 3D television systems using electromechanical and cathode-ray tube techniques. The first 3D TV was produced in 1935. The advent of digital television in the 2000s greatly improved 3D TVs. Although 3D TV sets are quite popular for watching 3D home media such as on Blu-ray discs, 3D programming has largely failed to make inroads with the public. Many 3D television channels which started in the early 2010s were shut down by the mid-2010s. According to DisplaySearch 3D televisions shipments totaled 41.45 million units in 2012, compared with 24.14 in 2011 and 2.26 in 2010. As of late 2013, the number of 3D TV viewers started to decline. Broadcast systems Terrestrial television upright=1.35|A modern high gain UHF Yagi television antenna. It has 17 directors, and one reflector (made of 4 rods) shaped as a corner reflector. Programming is broadcast by television stations, sometimes called \"channels\", as stations are licensed by their governments to broadcast only over assigned channels in the television band. At first, terrestrial broadcasting was the only way television could be widely distributed, and because bandwidth was limited, i.e., there were only a small number of channels available, government regulation was the norm. In the U.S., the Federal Communications Commission (FCC) allowed stations to broadcast advertisements beginning in July 1941, but required public service programming commitments as a requirement for a license. By contrast, the United Kingdom chose a different route, imposing a television license fee on owners of television reception equipment to fund the British Broadcasting Corporation (BBC), which had public service as part of its Royal Charter. WRGB claims to be the world's oldest television station, tracing its roots to an experimental station founded on 13 January 1928, broadcasting from the General Electric factory in Schenectady, NY, under the call letters W2XB.\"The First Television Show\" Popular Mechanics, August 1930, pp. 177\u201379 It was popularly known as \"WGY Television\" after its sister radio station. Later in 1928, General Electric started a second facility, this one in New York City, which had the call letters W2XBS and which today is known as WNBC. The two stations were experimental in nature and had no regular programming, as receivers were operated by engineers within the company. The image of a Felix the Cat doll rotating on a turntable was broadcast for 2 hours every day for several years as new technology was being tested by the engineers. On 2 November 1936, the BBC began transmitting the world's first public regular high-definition service from the Victorian Alexandra Palace in north London. It therefore claims to be the birthplace of TV broadcasting as we know it today. With the widespread adoption of cable across the United States in the 1970s and 80s, terrestrial television broadcasts have been in decline; in 2013 it was estimated that about 7\\% of US households used an antenna.\"CEA Study Says Seven Percent of TV Households Use Antennas\", '\"TVTechnology, 30 July 2013 \"Nielsen: Broadcast Reliance Grew in 2012\", TVTechnology, 14 January 2013 A slight increase in use began around 2010 due to switchover to digital terrestrial television broadcasts, which offered pristine image quality over very large areas, and offered an alternate to cable television (CATV) for cord cutters. All other countries around the world are also in the process of either shutting down analog terrestrial television or switching over to digital terrestrial television. Cable television Coaxial cable is used to carry cable television signals into cathode ray tube and flat panel television sets. Cable television is a system of broadcasting television programming to paying subscribers via radio frequency (RF) signals transmitted through coaxial cables or light pulses through fiber-optic cables. This contrasts with traditional terrestrial television, in which the television signal is transmitted over the air by radio waves and received by a television antenna attached to the television. In the 2000s, FM radio programming, high-speed Internet, telephone service, and similar non-television services may also be provided through these cables. The abbreviation CATV is sometimes used for cable television in the US. It originally stood for Community Access Television or Community Antenna Television, from cable television's origins in 1948: in areas where over-the-air reception was limited by distance from transmitters or mountainous terrain, large \"community antennas\" were constructed, and cable was run from them to individual homes. Satellite television upright=1.15|DBS satellite dishes installed on an apartment complex. Satellite television is a system of supplying television programming using broadcast signals relayed from communication satellites. The signals are received via an outdoor parabolic reflector antenna usually referred to as a satellite dish and a low-noise block downconverter (LNB). A satellite receiver then decodes the desired television program for viewing on a television set. Receivers can be external set-top boxes, or a built-in television tuner. Satellite television provides a wide range of channels and services, especially to geographic areas without terrestrial television or cable television. The most common method of reception is direct-broadcast satellite television (DBSTV), also known as \"direct to home\" (DTH). In DBSTV systems, signals are relayed from a direct broadcast satellite on the Ku wavelength and are completely digital. Satellite TV systems formerly used systems known as television receive-only. These systems received analog signals transmitted in the C-band spectrum from FSS type satellites, and required the use of large dishes. Consequently, these systems were nicknamed \"big dish\" systems, and were more expensive and less popular. The direct-broadcast satellite television signals were earlier analog signals and later digital signals, both of which require a compatible receiver. Digital signals may include high-definition television (HDTV). Some transmissions and channels are free-to-air or free-to-view, while many other channels are pay television requiring a subscription. In 1945, British science fiction writer Arthur C. Clarke proposed a worldwide communications system which would function by means of three satellites equally spaced apart in earth orbit. This was published in the October 1945 issue of the Wireless World magazine and won him the Franklin Institute's Stuart Ballantine Medal in 1963. The first satellite television signals from Europe to North America were relayed via the Telstar satellite over the Atlantic ocean on 23 July 1962. The signals were received and broadcast in North American and European countries and watched by over 100 million. Launched in 1962, the Relay 1 satellite was the first satellite to transmit television signals from the US to Japan. The first geosynchronous communication satellite, Syncom 2, was launched on 26 July 1963. The world's first commercial communications satellite, called Intelsat I and nicknamed \"Early Bird\", was launched into geosynchronous orbit on 6 April 1965. The first national network of television satellites, called Orbita, was created by the Soviet Union in October 1967, and was based on the principle of using the highly elliptical Molniya satellite for rebroadcasting and delivering of television signals to ground downlink stations. The first commercial North American satellite to carry television transmissions was Canada's geostationary Anik 1, which was launched on 9 November 1972. ATS-6, the world's first experimental educational and Direct Broadcast Satellite (DBS), was launched on 30 May 1974. It transmitted at 860 MHz using wideband FM modulation and had two sound channels. The transmissions were focused on the Indian subcontinent but experimenters were able to receive the signal in Western Europe using home constructed equipment that drew on UHF television design techniques already in use.Long Distance Television Reception (TV-DX) For the Enthusiast, Roger W. Bunney, The first in a series of Soviet geostationary satellites to carry Direct-To-Home television, Ekran 1, was launched on 26 October 1976. It used a 714 MHz UHF downlink frequency so that the transmissions could be received with existing UHF television technology rather than microwave technology. Internet television Internet television (Internet TV) (or online television) is the digital distribution of television content via the Internet as opposed to traditional systems like terrestrial, cable, and satellite, although the Internet itself is received by terrestrial, cable, or satellite methods. Internet television is a general term that covers the delivery of television shows, and other video content, over the Internet by video streaming technology, typically by major traditional television broadcasters. Internet television should not be confused with Smart TV, IPTV or with Web TV. Smart television refers to the TV set which has a built-in operating system. Internet Protocol television (IPTV) is one of the emerging Internet television technology standards for use by television broadcasters. Web television is a term used for programs created by a wide variety of companies and individuals for broadcast on Internet TV. Sets RCA 630-TS, the first mass-produced television set, which sold in 1946\u20131947 A television set, also called a television receiver, television, TV set, TV, or \"telly\", is a device that combines a tuner, display, an amplifier, and speakers for the purpose of viewing television and hearing its audio components. Introduced in the late 1920s in mechanical form, television sets became a popular consumer product after World War II in electronic form, using cathode ray tubes. The addition of color to broadcast television after 1953 further increased the popularity of television sets and an outdoor antenna became a common feature of suburban homes. The ubiquitous television set became the display device for recorded media in the 1970s, such as Betamax and VHS, which enabled viewers to record TV shows and watch prerecorded movies. In the subsequent decades, TVs were used to watch DVDs and Blu-ray Discs of movies and other content. Major TV manufacturers announced the discontinuation of CRT, DLP, plasma and fluorescent-backlit LCDs by the mid-2010s. Televisions since 2010s mostly use LEDs. LEDs are expected to be gradually replaced by OLEDs in the near future. Display technologies Disk The earliest systems employed a spinning disk to create and reproduce images. These usually had a low resolution and screen size and never became popular with the public. CRT upright=0.9|A 14-inch cathode ray tube showing its deflection coils and electron guns The cathode ray tube (CRT) is a vacuum tube containing one or more electron guns (a source of electrons or electron emitter) and a fluorescent screen used to view images. It has a means to accelerate and deflect the electron beam(s) onto the screen to create the images. The images may represent electrical waveforms (oscilloscope), pictures (television, computer monitor), radar targets or others. The CRT uses an evacuated glass envelope which is large, deep (i.e. long from front screen face to rear end), fairly heavy, and relatively fragile. As a matter of safety, the face is typically made of thick lead glass so as to be highly shatter-resistant and to block most X-ray emissions, particularly if the CRT is used in a consumer product. In television sets and computer monitors, the entire front area of the tube is scanned repetitively and systematically in a fixed pattern called a raster. An image is produced by controlling the intensity of each of the three electron beams, one for each additive primary color (red, green, and blue) with a video signal as a reference. In all modern CRT monitors and televisions, the beams are bent by magnetic deflection, a varying magnetic field generated by coils and driven by electronic circuits around the neck of the tube, although electrostatic deflection is commonly used in oscilloscopes, a type of diagnostic instrument. DLP upright=0.9|The Christie Mirage 5000, a 2001 DLP projector. Digital Light Processing (DLP) is a type of video projector technology that uses a digital micromirror device. Some DLPs have a TV tuner, which makes them a type of TV display. It was originally developed in 1987 by Dr. Larry Hornbeck of Texas Instruments. While the DLP imaging device was invented by Texas Instruments, the first DLP based projector was introduced by Digital Projection Ltd in 1997. Digital Projection and Texas Instruments were both awarded Emmy Awards in 1998 for invention of the DLP projector technology. DLP is used in a variety of display applications from traditional static displays to interactive displays and also non-traditional embedded applications including medical, security, and industrial uses. DLP technology is used in DLP front projectors (standalone projection units for classrooms and business primarily), but also in private homes; in these cases, the image is projected onto a projection screen. DLP is also used in DLP rear projection television sets and digital signs. It is also used in about 85\\% of digital cinema projection. Plasma A plasma display panel (PDP) is a type of flat panel display common to large TV displays or larger. They are called \"plasma\" displays because the technology utilizes small cells containing electrically charged ionized gases, or what are in essence chambers more commonly known as fluorescent lamps. LCD upright=0.9|A generic LCD TV, with speakers on either side of the screen. Liquid-crystal-display televisions (LCD TV) are television sets that use LCD display technology to produce images. LCD televisions are much thinner and lighter than cathode ray tube (CRTs) of similar display size, and are available in much larger sizes (e.g., 90-inch diagonal). When manufacturing costs fell, this combination of features made LCDs practical for television receivers. LCDs come in two types: those using cold cathode fluorescent lamps, simply called LCDs and those using LED as backlight called as LEDs. In 2007, LCD televisions surpassed sales of CRT-based televisions worldwide for the first time, and their sales figures relative to other technologies accelerated. LCD TVs have quickly displaced the only major competitors in the large-screen market, the Plasma display panel and rear-projection television. In mid 2010s LCDs especially LEDs became, by far, the most widely produced and sold television display type. LCDs also have disadvantages. Other technologies address these weaknesses, including OLEDs, FED and SED, but none of these have entered widespread production. OLED OLED TV An OLED (organic light-emitting diode) is a light-emitting diode (LED) in which the emissive electroluminescent layer is a film of organic compound which emits light in response to an electric current. This layer of organic semiconductor is situated between two electrodes. Generally, at least one of these electrodes is transparent. OLEDs are used to create digital displays in devices such as television screens. It is also used for computer monitors, portable systems such as mobile phones, handheld game consoles and PDAs. There are two main families of OLED: those based on small molecules and those employing polymers. Adding mobile ions to an OLED creates a light-emitting electrochemical cell or LEC, which has a slightly different mode of operation. OLED displays can use either passive-matrix (PMOLED) or active-matrix (AMOLED) addressing schemes. Active-matrix OLEDs require a thin-film transistor backplane to switch each individual pixel on or off, but allow for higher resolution and larger display sizes. An OLED display works without a backlight. Thus, it can display deep black levels and can be thinner and lighter than a liquid crystal display (LCD). In low ambient light conditions such as a dark room an OLED screen can achieve a higher contrast ratio than an LCD, whether the LCD uses cold cathode fluorescent lamps or LED backlight. OLEDs are expected to replace other forms of display in near future. Display resolution upright=1.35|Comparison of 8K UHDTV, 4K UHDTV, HDTV and SDTV resolution LD Low-definition television or LDTV refers to television systems that have a lower screen resolution than standard-definition television systems such 240p (320*240). It is used in handheld television. The most common source of LDTV programming is the Internet, where mass distribution of higher-resolution video files could overwhelm computer servers and take too long to download. Many mobile phones and portable devices such as Apple's iPod Nano, or Sony's PlayStation Portable use LDTV video, as higher-resolution files would be excessive to the needs of their small screens (320\u00d7240 and 480\u00d7272 pixels respectively). The current generation of iPod Nanos have LDTV screens, as do the first three generations of iPod Touch and iPhone (480\u00d7320). For the first years of its existence, YouTube offered only one, low-definition resolution of 320x240p at 30fps or less. A standard, consumer grade VHS videotape can be considered SDTV due to its resolution (approximately 360 \u00d7 480i/576i). SD Standard-definition television or SDTV refers to two different resolutions: 576i, with 576 interlaced lines of resolution, derived from the European-developed PAL and SECAM systems; and 480i based on the American National Television System Committee NTSC system. SDTV is a television system that uses a resolution that is not considered to be either high-definition television (720p, 1080i, 1080p, 1440p, 4K UHDTV, and 8K UHD) or enhanced-definition television (EDTV 480p). In North America, digital SDTV is broadcast in the same 4:3 aspect ratio as NTSC signals with widescreen content being center cut. However, in other parts of the world that used the PAL or SECAM color systems, standard-definition television is now usually shown with a 16:9 aspect ratio, with the transition occurring between the mid-1990s and mid-2000s. Older programs with a 4:3 aspect ratio are shown in the US as 4:3 with non-ATSC countries preferring to reduce the horizontal resolution by anamorphically scaling a pillarboxed image. HD High-definition television (HDTV) provides a resolution that is substantially higher than that of standard-definition television. HDTV may be transmitted in various formats: 1080p: 1920\u00d71080p: 2,073,600 pixels (~2.07 megapixels) per frame 1080i: 1920\u00d71080i: 1,036,800 pixels (~1.04 MP) per field or 2,073,600 pixels (~2.07 MP) per frame A non-standard CEA resolution exists in some countries such as 1440\u00d71080i: 777,600 pixels (~0.78 MP) per field or 1,555,200 pixels (~1.56 MP) per frame 720p: 1280\u00d7720p: 921,600 pixels (~0.92 MP) per frame UHD Ultra-high-definition television (also known as Super Hi-Vision, Ultra HD television, UltraHD, UHDTV, or UHD) includes 4K UHD (2160p) and 8K UHD (4320p), which are two digital video formats proposed by NHK Science & Technology Research Laboratories and defined and approved by the International Telecommunication Union (ITU). The Consumer Electronics Association announced on 17 October 2012, that \"Ultra High Definition\", or \"Ultra HD\", would be used for displays that have an aspect ratio of at least 16:9 and at least one digital input capable of carrying and presenting native video at a minimum resolution of 3840\u00d72160 pixels. Market share North American consumers purchase a new television set on average every seven years, and the average household owns 2.8 televisions. , 48 million are sold each year at an average price of $ 460 and size of . Getting TV programming shown to the public can happen in many different ways. After production, the next step is to market and deliver the product to whichever markets are open to using it. This typically happens on two levels: Original run or First run: a producer creates a program of one or multiple episodes and shows it on a station or network which has either paid for the production itself or to which a license has been granted by the television producers to do the same. Broadcast syndication: this is the terminology rather broadly used to describe secondary programming usages (beyond original run). It includes secondary runs in the country of first issue, but also international usage which may not be managed by the originating producer. In many cases, other companies, TV stations, or individuals are engaged to do the syndication work, in other words, to sell the product into the markets they are allowed to sell into by contract from the copyright holders, in most cases the producers. First-run programming is increasing on subscription services outside the US , but few domestically produced programs are syndicated on domestic free-to-air (FTA) elsewhere. This practice is increasing, however, generally on digital-only FTA channels or with subscriber-only, first-run material appearing on FTA. Unlike the US , repeat FTA screenings of an FTA network program usually only occur on that network. Also, affiliates rarely buy or produce non-network programming that is not centered on local programming. Popular culture entertainment genres include action-oriented shows such as police, crime, detective dramas, horror, or thriller shows. As well, there are also other variants of the drama genre, such as medical dramas and daytime soap operas. Science fiction shows can fall into either the drama or action category, depending on whether they emphasize philosophical questions or high adventure. Comedy is a popular genre which includes situation comedy (sitcom) and animated shows for the adult demographic such as South Park. The least expensive forms of entertainment programming genres are game shows, talk shows, variety shows, and reality television. Game shows feature contestants answering questions and solving puzzles to win prizes. Talk shows contain interviews with film, television, music and sports celebrities and public figures. Variety shows feature a range of musical performers and other entertainers, such as comedians and magicians, introduced by a host or Master of Ceremonies. There is some crossover between some talk shows and variety shows because leading talk shows often feature performances by bands, singers, comedians, and other performers in between the interview segments. Reality TV shows \"regular\" people (i.e., not actors) facing unusual challenges or experiences ranging from arrest by police officers (COPS) to significant weight loss (The Biggest Loser). A variant version of reality shows depicts celebrities doing mundane activities such as going about their everyday life (The Osbournes, Snoop Dogg's Father Hood) or doing regular jobs (The Simple Life). Around the globe, broadcast TV is financed by government, advertising, licensing (a form of tax), subscription, or any combination of these. To protect revenues, subscription TV channels are usually encrypted to ensure that only subscribers receive the decryption codes to see the signal. Unencrypted channels are known as free to air or FTA. In 2009, the global TV market represented 1,217.2 million TV households with at least one TV and total revenues of 268.9 billion EUR (declining 1.2\\% compared to 2008).Global TV 2010 \u2013 Markets, Trends Facts & Figures (2008\u20132013) International Television Expert Group North America had the biggest TV revenue market share with 39\\% followed by Europe (31\\%), Asia-Pacific (21\\%), Latin America (8\\%), and Africa and the Middle East (2\\%).Global TV Revenues (2008\u201309) International Television Expert Group Globally, the different TV revenue sources divide into 45\u201350\\% TV advertising revenues, 40\u201345\\% subscription fees and 10\\% public funding.iDate's Global TV Revenue Market Shares International Television Expert GroupOFCOM's Global TV Market Report 2009 International Television Expert Group TV 's broad reach makes it a powerful and attractive medium for advertisers. Many TV networks and stations sell blocks of broadcast time to advertisers (\"sponsors\") to fund their programming.Karen Hornick \"That Was the Year That Was\" American Heritage, Oct. 2006. Television advertisements (variously called a television commercial, commercial or ad in American English, and known in British English as an advert) is a span of television programming produced and paid for by an organization, which conveys a message, typically to market a product or service. Advertising revenue provides a significant portion of the funding for most privately owned television networks. The vast majority of television advertisements today consist of brief advertising spots, ranging in length from a few seconds to several minutes (as well as program-length infomercials). Advertisements of this sort have been used to promote a wide variety of goods, services and ideas since the beginning of television. The first official, paid television advertisement was broadcast in the United States on 1 July 1941 over New York station WNBT (now WNBC) before a baseball game between the Brooklyn Dodgers and Philadelphia Phillies. The announcement for Bulova watches, for which the company paid anywhere from $4.00 to $9.00 (reports vary), displayed a WNBT test pattern modified to look like a clock with the hands showing the time. The Bulova logo, with the phrase \"Bulova Watch Time\", was shown in the lower right-hand quadrant of the test pattern while the second hand swept around the dial for one minute.\"Imagery For Profit\" R.W. Stewart, The New York Times, 6 July 1941. The first TV ad broadcast in the UK was on ITV on 22 September 1955, advertising Gibbs SR toothpaste. The first TV ad broadcast in Asia was on Nippon Television in Tokyo on 28 August 1953, advertising Seikosha (now Seiko), which also displayed a clock with the current time.\u30b3\u30de\u30fc\u30b7\u30e3\u30eb\u30e1\u30c3\u30bb\u30fc\u30b8 (Commercial message). Retrieved 24 November 2013 United States Since inception in the US in 1941, television commercials have become one of the most effective, persuasive, and popular methods of selling products of many sorts, especially consumer goods. During the 1940s and into the 1950s, programs were hosted by single advertisers. This, in turn, gave great creative license to the advertisers over the content of the show. Perhaps due to the quiz show scandals in the 1950s, networks shifted to the magazine concept, introducing advertising breaks with multiple advertisers. US advertising rates are determined primarily by Nielsen ratings. The time of the day and popularity of the channel determine how much a TV commercial can cost. For example, it can cost approximately $750,000 for a 30-second block of commercial time during the highly popular American Idol, while the same amount of time for the Super Bowl can cost several million dollars. Conversely, lesser-viewed time slots, such as early mornings and weekday afternoons, are often sold in bulk to producers of infomercials at far lower rates. In recent years, the paid program or infomercial has become common, usually in lengths of 30 minutes or one hour. Some drug companies and other businesses have even created \"news\" items for broadcast, known in the industry as video news releases, paying program directors to use them.Jon Stewart of \"The Daily Show\" was mock-outraged at this, saying, \"That's what we do!\", and calling it a new form of television, \"infoganda\". Some TV programs also deliberately place products into their shows as advertisements, a practice started in feature films and known as product placement. For example, a character could be drinking a certain kind of soda, going to a particular chain restaurant, or driving a certain make of car. (This is sometimes very subtle, with shows having vehicles provided by manufacturers for low cost in exchange as a product placement). Sometimes, a specific brand or trade mark, or music from a certain artist or group, is used. (This excludes guest appearances by artists who perform on the show.) United Kingdom The TV regulator oversees TV advertising in the United Kingdom. Its restrictions have applied since the early days of commercially funded TV. Despite this, an early TV mogul, Roy Thomson, likened the broadcasting licence as being a \"licence to print money\". Restrictions mean that the big three national commercial TV channels: ITV, Channel 4, and Channel 5 can show an average of only seven minutes of advertising per hour (eight minutes in the peak period). Other broadcasters must average no more than nine minutes (twelve in the peak). This means that many imported TV shows from the US have unnatural pauses where the UK company does not utilize the narrative breaks intended for more frequent US advertising. Advertisements must not be inserted in the course of certain specific proscribed types of programs which last less than half an hour in scheduled duration; this list includes any news or current affairs programs, documentaries, and programs for children; additionally, advertisements may not be carried in a program designed and broadcast for reception in schools or in any religious broadcasting service or other devotional program or during a formal Royal ceremony or occasion. There also must be clear demarcations in time between the programs and the advertisements. The BBC, being strictly non-commercial, is not allowed to show advertisements on television in the UK, although it has many advertising-funded channels abroad. The majority of its budget comes from television license fees (see below) and broadcast syndication, the sale of content to other broadcasters. Ireland Broadcast advertising is regulated by the Broadcasting Authority of Ireland.General Commercial Communications Code and Children\u2019s Commercial Communications Code, referenced in: ; Subscription Some TV channels are partly funded from subscriptions; therefore, the signals are encrypted during broadcast to ensure that only the paying subscribers have access to the decryption codes to watch pay television or specialty channels. Most subscription services are also funded by advertising. Taxation or license Television services in some countries may be funded by a television licence or a form of taxation, which means that advertising plays a lesser role or no role at all. For example, some channels may carry no advertising at all and some very little, including: Australia (ABC Television) Belgium (RTBF) Denmark (DR) Ireland (RT\u00c9) Japan (NHK) Norway (NRK) Sweden (SVT) Switzerland (SRG SSR) Republic of China (Taiwan) (PTS) United Kingdom (BBC Television) United States (PBS) The British Broadcasting Corporation's TV service carries no television advertising on its UK channels and is funded by an annual television licence paid by the occupiers of premises receiving live TV broadcasts. it was estimated that approximately 26.8 million UK private domestic households owned televisions, with approximately 25 million TV licences in all premises in force as of 2010. This television license fee is set by the government, but the BBC is not answerable to or controlled by the government. two main BBC TV channels were watched by almost 90\\% of the population each week and overall had 27\\% share of total viewing, despite the fact that 85\\% of homes were multi-channel, with 42\\% of these having access to 200 free-to-air channels via satellite and another 43\\% having access to 30 or more channels via Freeview. the licence that funds the advertising-free BBC TV channels cost \u00a3159 for a colour TV Licence and \u00a353.50 for a black and white TV Licence (free or reduced for some groups). The Australian Broadcasting Corporation's television services in Australia carry no advertising by external sources; it is banned under the Australian Broadcasting Corporation Act 1983, which also ensures its the editorial independence. The ABC receives most of its funding from the Australian Government (some revenue is received from its Commercial division), but it has suffered progressive funding cuts under Liberal governments since the 1996 Howard government, with particularly deep cuts in 2014 under the Turnbull government, and an ongoing indexation freeze . The funds provide for the ABC's television, radio, online, and international outputs, although ABC Australia, which broadcasts throughout the Asia-Pacific region, receives additional funds through DFAT and some advertising on the channel. In France, government-funded channels carry advertisements, yet those who own television sets have to pay an annual tax (\"la redevance audiovisuelle\").Ministry of Finance In Japan, NHK is paid for by license fees (known in Japanese as ). The broadcast law that governs NHK's funding stipulates that any television equipped to receive NHK is required to pay. The fee is standardized, with discounts for office workers and students who commute, as well a general discount for residents of Okinawa prefecture. Broadcast programming Broadcast programming, or TV listings in the United Kingdom, is the practice of organizing television programs in a schedule, with broadcast automation used to regularly change the scheduling of TV programs to build an audience for a new show, retain that audience, or compete with other broadcasters' programs. Social aspects upright=0.9|American family watching television, circa 1958 Television has played a pivotal role in the socialization of the 20th and 21st centuries. There are many aspects of television that can be addressed, including negative issues such as media violence. Current research is discovering that individuals suffering from social isolation can employ television to create what is termed a parasocial or faux relationship with characters from their favorite television shows and movies as a way of deflecting feelings of loneliness and social deprivation.Butler, Fionnuala, Cynthia Pickett. \"Imaginary Friends.\" Scientific American. 28 July 2009. Web. 26 March 2010. URL Several studies have found that educational television has many advantages. The article \"The Good Things about Television\" argues that television can be a very powerful and effective learning tool for children if used wisely. Opposition Methodist denominations in the conservative holiness movement, such as the Allegheny Wesleyan Methodist Connection and the Evangelical Wesleyan Church, eschew the use of the television. Some Baptists, such as those affiliated with Pensacola Christian College, also eschew television. Many Traditional Catholic congregations such as the Society of Saint Pius X (SSPX) oppose the presence of television in the household, teaching that it is an occasion of sin. Negative impacts Children, especially those aged 5 or younger, are at risk of injury from falling televisions. A CRT-style television that falls on a child will, because of its weight, hit with the equivalent force of falling multiple stories from a building. Newer flat-screen televisions are \"top-heavy and have narrow bases\", which means that a small child can easily pull one over. , TV tip-overs were responsible for more than 10,000 injuries per year to children in the U.S., at a cost of more than $ 8 million per year in emergency care.", "after_revision": "upright=1.35|Flat-screen televisions for sale at a consumer electronics store in 2008. Television , sometimes shortened to TV or telly, is a telecommunication medium used for transmitting moving images in monochrome (black and white), or in color, and in two or three dimensions and sound. The term can refer to a television set, a television show, or the medium of television transmission. Television is a mass medium for advertising, entertainment, news, and sports. Television became available in crude experimental forms in the late 1920s, but it would still be several years before the new technology would be marketed to consumers. After World War II, an improved form of black-and-white television broadcasting became popular in the United Kingdom and United States, and television sets became commonplace in homes, businesses, and institutions. During the 1950s, television was the primary medium for influencing public opinion.Diggs-Brown, Barbara (2011) Strategic Public Relations: Audience Focused Practice p.48 In the mid-1960s, color broadcasting was introduced in the U.S. and most other developed countries. The availability of various types of archival storage media such as Betamax and VHS tapes, high-capacity hard disk drives, DVDs, flash drives, high-definition Blu-ray Discs, and cloud digital video recorders has enabled viewers to watch pre-recorded material\u2014such as movies\u2014at home on their own time schedule. For many reasons, especially the convenience of remote retrieval, the storage of television and video programming now also occurs on the cloud (such as the video on demand service by Netflix). At the end of the first decade of the 2000s, digital television transmissions greatly increased in popularity. Another development was the move from standard-definition television (SDTV) (576i, with 576 interlaced lines of resolution and 480i) to high-definition television (HDTV), which provides a resolution that is substantially higher. HDTV may be transmitted in different formats: 1080p, 1080i and 720p. Since 2010, with the invention of smart television, Internet television has increased the availability of television programs and movies via the Internet through streaming video services such as Netflix, Amazon Video, iPlayer and Hulu. upright=0.9|The Nipkow disk. This schematic shows the circular paths traced by the holes that may also be square for greater precision. The area of the disk outlined in black displays the region scanned. The first demonstration of the live transmission of images was by Georges Rignoux and A. Fournier in Paris in 1909. A matrix of 64 selenium cells, individually wired to a mechanical commutator, served as an electronic retina. In the receiver, a type of Kerr cell modulated the light and a series of differently angled mirrors attached to the edge of a rotating disc scanned the modulated beam onto the display screen. A separate circuit regulated synchronization. The 8x8 pixel resolution in this proof-of-concept demonstration was just sufficient to clearly transmit individual letters of the alphabet. An updated image was transmitted \"several times\" each second.Henry de Varigny, \"La vision \u00e0 distance \", L'Illustration, Paris, 11 December 1909, p. 451. By the 1920s, when amplification made television practical, Scottish inventor John Logie Baird employed the Nipkow disk in his prototype video systems. On 25 March 1925, Baird gave the first public demonstration of televised silhouette images in motion, at Selfridge's Department Store in London. Since human faces had inadequate contrast to show up on his primitive system, he televised a ventriloquist's dummy named \"Stooky Bill\", whose painted face had higher contrast, talking and moving. By 26 January 1926, he had demonstrated the transmission of an image of a face in motion by radio. This is widely regarded as the world's first public television demonstration. Baird's system used the Nipkow disk for both scanning the image and displaying it. A brightly illuminated subject was placed in front of a spinning Nipkow disk set with lenses which swept images across a static photocell. The thallium sulphide (Thalofide) cell, developed by Theodore Case in the U.S. , detected the light reflected from the subject and converted it into a proportional electrical signal. This was transmitted by AM radio waves to a receiver unit, where the video signal was applied to a neon light behind a second Nipkow disk rotating synchronized with the first. The brightness of the neon lamp was varied in proportion to the brightness of each spot on the image. As each hole in the disk passed by, one scan line of the image was reproduced. Baird's disk had 30 holes, producing an image with only 30 scan lines, just enough to recognize a human face. In 1927, Baird transmitted a signal over of telephone line between London and Glasgow. In 1928, Baird's company (Baird Television Development Company/Cinema Television) broadcast the first transatlantic television signal, between London and New York, and the first shore-to-ship transmission. In 1929, he became involved in the first experimental mechanical television service in Germany. In November of the same year, Baird and Bernard Natan of Path\u00e9 established France's first television company, T\u00e9l\u00e9vision-Baird-Natan. In 1931, he made the first outdoor remote broadcast, of The Derby.J. L. Baird, \"Television in 1932\", BBC Annual Report, 1933. In 1932, he demonstrated ultra-short wave television. Baird's mechanical system reached a peak of 240-lines of resolution on BBC telecasts in 1936, though the mechanical system did not scan the televised scene directly. Instead a 17.5mm film was shot, rapidly developed and then scanned while the film was still wet. A U.S. inventor, Charles Francis Jenkins, also pioneered the television. He published an article on \"Motion Pictures by Wireless\" in 1913, but it was not until December 1923 that he transmitted moving silhouette images for witnesses; and it was on 13 June 1925, that he publicly demonstrated synchronized transmission of silhouette pictures. In 1925 Jenkins used the Nipkow disk and transmitted the silhouette image of a toy windmill in motion, over a distance of 5 miles (8 km), from a naval radio station in Maryland to his laboratory in Washington, D.C., using a lensed disk scanner with a 48-line resolution.\"Radio Shows Far Away Objects in Motion\", The New York Times, 14 June 1925, p. 1. He was granted U.S. Patent No. 1,544,156 (Transmitting Pictures over Wireless) on 30 June 1925 (filed 13 March 1922). Because only a limited number of holes could be made in the disks, and disks beyond a certain diameter became impractical, image resolution on mechanical television broadcasts was relatively low, ranging from about 30 lines up to 120 or so. Nevertheless, the image quality of 30-line transmissions steadily improved with technical advances, and by 1933 the UK broadcasts using the Baird system were remarkably clear.Donald F. McLean, Restoring Baird's Image (London: IEEE, 2000), p. 184. A few systems ranging into the 200-line region also went on the air. Two of these were the 180-line system that Compagnie des Compteurs (CDC) installed in Paris in 1935, and the 180-line system that Peck Television Corp. started in 1935 at station VE9AK in Montreal. The advancement of all-electronic television (including image dissectors and other camera tubes and cathode ray tubes for the reproducer) marked the start of the end for mechanical systems as the dominant form of television. Mechanical television, despite its inferior image quality and generally smaller picture, would remain the primary television technology until the 1930s. The last mechanical telecasts ended in 1939 at stations run by a lot of public universities in the United States. In 1897, English physicist J. J. Thomson was able, in his three well-known experiments, to deflect cathode rays, a fundamental function of the modern cathode ray tube (CRT). The earliest version of the CRT was invented by the German physicist Ferdinand Braun in 1897 and is also known as the \"Braun\" tube.Ferdinand Braun (1897) \"Ueber ein Verfahren zur Demonstration und zum Studium des zeitlichen Verlaufs variabler Str\u00f6me\" (On a process for the display and study of the course in time of variable currents), Annalen der Physik und Chemie, 3rd series, 60 : 552\u201359. It was a cold-cathode diode, a modification of the Crookes tube, with a phosphor-coated screen. In 1906 the Germans Max Dieckmann and Gustav Glage produced raster images for the first time in a CRT. In 1907, Russian scientist Boris Rosing used a CRT in the receiving end of an experimental video signal to form a picture. He managed to display simple geometric shapes onto the screen. In 1926, Hungarian engineer K\u00e1lm\u00e1n Tihanyi designed a television system utilizing fully electronic scanning and display elements and employing the principle of \"charge storage\" within the scanning (or \"camera\") tube.United States Patent Office, Patent No. 2,133,123, 11 October 1938.United States Patent Office, Patent No. 2,158,259, 16 May 1939 The problem of low sensitivity to light resulting in low electrical output from transmitting or \"camera\" tubes would be solved with the introduction of charge-storage technology by K\u00e1lm\u00e1n Tihanyi beginning in 1924. \"K\u00e1lm\u00e1n Tihanyi (1897\u20131947)\", IEC Techline, International Electrotechnical Commission (IEC), 15 July 2009. His solution was a camera tube that accumulated and stored electrical charges (\"photoelectrons\") within the tube throughout each scanning cycle. The device was first described in a patent application he filed in Hungary in March 1926 for a television system he called \"Radioskop\".\"K\u00e1lm\u00e1n Tihanyi's 1926 Patent Application 'Radioskop'\", Memory of the World, United Nations Educational, Scientific and Cultural Organization (UNESCO), 2005. Retrieved 29 January 2009. After further refinements included in a 1928 patent application, Tihanyi's patent was declared void in Great Britain in 1930,Tihanyi, Koloman, Improvements in television apparatus. European Patent Office, Patent No. GB313456. Convention date UK application: 1928-06-11, declared void and published: 11 November 1930. Retrieved 25 April 2013. so he applied for patents in the United States. Although his breakthrough would be incorporated into the design of RCA's \"iconoscope\" in 1931, the U.S. patent for Tihanyi's transmitting tube would not be granted until May 1939. The patent for his receiving tube had been granted the previous October. Both patents had been purchased by RCA prior to their approval. Charge storage remains a basic principle in the design of imaging devices for television to the present day. On 25 December 1926, at Hamamatsu Industrial High School in Japan, Japanese inventor Kenjiro Takayanagi demonstrated a TV system with a 40-line resolution that employed a CRT display. This was the first working example of a fully electronic television receiver. Takayanagi did not apply for a patent. On 7 September 1927, U.S. inventor Philo Farnsworth's image dissector camera tube transmitted its first image, a simple straight line, at his laboratory at 202 Green Street in San Francisco.Postman, Neil, \"Philo Farnsworth\", The TIME 100: Scientists & Thinkers, Time, 29 March 1999. Retrieved 28 July 2009.\"Philo Taylor Farnsworth (1906\u20131971)\" , The Virtual Museum of the City of San Francisco. Retrieved 15 July 2009. By 3 September 1928, Farnsworth had developed the system sufficiently to hold a demonstration for the press. This is widely regarded as the first electronic television demonstration. In 1929, the system was improved further by the elimination of a motor generator, so that his television system now had no mechanical parts.Abramson, Albert, Zworykin, Pioneer of Television, p. 226. That year, Farnsworth transmitted the first live human images with his system, including a three and a half-inch image of his wife Elma (\"Pem\") with her eyes closed (possibly due to the bright lighting required).The Philo T. and Elma G. Farnsworth Papers Vladimir Zworykin demonstrates electronic television (1929) Meanwhile, Vladimir Zworykin was also experimenting with the cathode ray tube to create and show images. While working for Westinghouse Electric in 1923, he began to develop an electronic camera tube. But in a 1925 demonstration, the image was dim, had low contrast, and poor definition, and was stationary.Abramson, Albert, Zworykin, Pioneer of Television, University of Illinois Press, 1995, p. 51. . Zworykin's imaging tube never got beyond the laboratory stage. But RCA, which acquired the Westinghouse patent, asserted that the patent for Farnsworth's 1927 image dissector was written so broadly that it would exclude any other electronic imaging device. Thus RCA, on the basis of Zworykin's 1923 patent application, filed a patent interference suit against Farnsworth. The U.S. Patent Office examiner disagreed in a 1935 decision, finding priority of invention for Farnsworth against Zworykin. Farnsworth claimed that Zworykin's 1923 system would be unable to produce an electrical image of the type to challenge his patent. Zworykin received a patent in 1928 for a color transmission version of his 1923 patent application;Zworykin, Vladimir K., Television System. Patent No. 1691324, U.S. Patent Office. Filed 1925-07-13, issued 13 November 1928. Retrieved 28 July 2009 he also divided his original application in 1931.Zworykin, Vladimir K., Television System. Patent No. 2022450, U.S. Patent Office. Filed 1923-12-29, issued 26 November 1935. Retrieved 10 May 2010. Zworykin was unable or unwilling to introduce evidence of a working model of his tube that was based on his 1923 patent application. In September 1939, after losing an appeal in the courts, and determined to go forward with the commercial manufacturing of television equipment, RCA agreed to pay Farnsworth US $1 million over a ten-year period, in addition to license payments, to use his patents.Stashower, Daniel, The Boy Genius and the Mogul: The Untold Story of Television, Broadway Books, 2002, pp. 243\u201344. .Everson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , 266 pp. In 1933, RCA introduced an improved camera tube that relied on Tihanyi's charge storage principle. Called the \"Iconoscope\" by Zworykin, the new tube had a light sensitivity of about 75,000 lux, and thus was claimed to be much more sensitive than Farnsworth's image dissector. However, Farnsworth had overcome his power issues with his Image Dissector through the invention of a completely unique \"multipactor\" device that he began work on in 1930, and demonstrated in 1931.Abramson, Albert (1987), The History of Television, 1880 to 1941. Jefferson, NC: Albert Abramson. p. 148. .Everson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , pp. 137\u201341. This small tube could amplify a signal reportedly to the 60th power or betterEverson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , p. 139. and showed great promise in all fields of electronics. Unfortunately, a issue with the multipactor was that it wore out at an unsatisfactory rate.Everson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , p. 141. At the Berlin Radio Show in August 1931, Manfred von Ardenne gave a public demonstration of a television system using a CRT for both transmission and reception. However, Ardenne had not developed a camera tube, using the CRT instead as a flying-spot scanner to scan slides and film.Albert Abramson, Zworykin: Pioneer of Television, University of Illinois Press, 1995, p. 111. Philo Farnsworth gave the world's first public demonstration of an all-electronic television system, using a live camera, at the Franklin Institute of Philadelphia on 25 August 1934, and for ten days afterwards.\"New Television System Uses 'Magnetic Lens'\", Popular Mechanics, Dec. 1934, pp. 838\u201339.Burns, R.W. Television: An international history of the formative years. (1998). IEE History of Technology Series, 22. London: IEE, p. 370. . Mexican inventor Guillermo Gonz\u00e1lez Camarena also played an important role in early television. His experiments with television (known as telectroescop\u00eda at first) began in 1931 and led to a patent for the \"trichromatic field sequential system\" color television in 1940. In Britain, the EMI engineering team led by Isaac Shoenberg applied in 1932 for a patent for a new device they called \"the Emitron\", which formed the heart of the cameras they designed for the BBC. On 2 November 1936, a 405-line broadcasting service employing the Emitron began at studios in Alexandra Palace, and transmitted from a specially built mast atop one of the Victorian building's towers. It alternated for a short time with Baird's mechanical system in adjoining studios, but was more reliable and visibly superior. This was the world's first regular \"high-definition\" television service.Burns, R.W., Television: An international history of the formative years. (1998). IEE History of Technology Series, 22. London: IEE, p. 576. . The original U.S. iconoscope was noisy, had a high ratio of interference to signal, and ultimately gave disappointing results, especially when compared to the high definition mechanical scanning systems then becoming available. The EMI team, under the supervision of Isaac Shoenberg, analyzed how the iconoscope (or Emitron) produces an electronic signal and concluded that its real efficiency was only about 5\\% of the theoretical maximum. They solved this problem by developing, and patenting in 1934, two new camera tubes dubbed super-Emitron and CPS Emitron. The super-Emitron was between ten and fifteen times more sensitive than the original Emitron and iconoscope tubes and, in some cases, this ratio was considerably greater. It was used for outside broadcasting by the BBC, for the first time, on Armistice Day 1937, when the general public could watch on a television set as the King laid a wreath at the Cenotaph. This was the first time that anyone had broadcast a live street scene from cameras installed on the roof of neighboring buildings, because neither Farnsworth nor RCA would do the same until the 1939 New York World's Fair. Ad for the beginning of experimental television broadcasting in New York City by RCA in 1939 Indian-head test pattern used during the black-and-white era before 1970. It was displayed when a television station first signed on every day. On the other hand, in 1934, Zworykin shared some patent rights with the German licensee company Telefunken. The \"image iconoscope\" (\"Superikonoskop\" in Germany) was produced as a result of the collaboration. This tube is essentially identical to the super-Emitron. The production and commercialization of the super-Emitron and image iconoscope in Europe were not affected by the patent war between Zworykin and Farnsworth, because Dieckmann and Hell had priority in Germany for the invention of the image dissector, having submitted a patent application for their Lichtelektrische Bildzerlegerr\u00f6hre f\u00fcr Fernseher (Photoelectric Image Dissector Tube for Television) in Germany in 1925, two years before Farnsworth did the same in the United States. The image iconoscope (Superikonoskop) became the industrial standard for public broadcasting in Europe from 1936 until 1960, when it was replaced by the vidicon and plumbicon tubes. Indeed, it was the representative of the European tradition in electronic tubes competing against the American tradition represented by the image orthicon. The German company Heimann produced the Superikonoskop for the 1936 Berlin Olympic Games, later Heimann also produced and commercialized it from 1940 to 1955; finally the Dutch company Philips produced and commercialized the image iconoscope and multicon from 1952 to 1958. U.S. television broadcasting, at the time, consisted of a variety of markets in a wide range of sizes, each competing for programming and dominance with separate technology, until deals were made and standards agreed upon in 1941.Everson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , p. 248. RCA, for example, used only Iconoscopes in the New York area, but Farnsworth Image Dissectors in Philadelphia and San Francisco.Abramson, Albert (1987), The History of Television, 1880 to 1941. Jefferson, NC: Albert Abramson. p. 254. . In September 1939, RCA agreed to pay the Farnsworth Television and Radio Corporation royalties over the next ten years for access to Farnsworth's patents.Schatzkin, Paul (2002), The Boy Who Invented Television. Silver Spring, Maryland: Teamcom Books, pp. 187\u201388. . With this historic agreement in place, RCA integrated much of what was best about the Farnsworth Technology into their systems. In 1941, the United States implemented 525-line television.\"Go-Ahead Signal Due for Television\", The New York Times, 25 April 1941, p. 7.\"An Auspicious Beginning\", The New York Times, 3 August 1941, p. X10. Electrical engineer Benjamin Adler played a prominent role in the development of television. The world's first 625-line television standard was designed in the Soviet Union in 1944 and became a national standard in 1946.\"On the beginning of broadcast in 625 lines 60 years ago\", 625 magazine (in Russian). The first broadcast in 625-line standard occurred in Moscow in 1948.\"M.I. Krivocheev \u2013 an engineer's engineer\", EBU Technical Review, Spring 1993. The concept of 625 lines per frame was subsequently implemented in the European CCIR standard.\"In the Vanguard of Television Broadcasting\". In 1936, K\u00e1lm\u00e1n Tihanyi described the principle of plasma display, the first flat panel display system. Early electronic television sets were large and bulky, with analog circuits made of vacuum tubes. Following the invention of the first working transistor at Bell Labs, Sony founder Masaru Ibuka predicted in 1952 that the transition to electronic circuits made of transistors would lead to smaller and more portable television sets. The first fully transistorized, portable solid-state television set was the 8-inch Sony TV8-301, developed in 1959 and released in 1960. This began the transformation of television viewership from a communal viewing experience to a solitary viewing experience. By 1960, Sony had sold over 4million portable television sets worldwide. Color Samsung LED TV The basic idea of using three monochrome images to produce a color image had been experimented with almost as soon as black-and-white televisions had first been built. Although he gave no practical details, among the earliest published proposals for television was one by Maurice Le Blanc, in 1880, for a color system, including the first mentions in television literature of line and frame scanning.M. Le Blanc, \"Etude sur la transmission \u00e9lectrique des impressions lumineuses\", La Lumi\u00e8re Electrique, vol. 11, 1 December 1880, pp. 477\u201381. Polish inventor Jan Szczepanik patented a color television system in 1897, using a selenium photoelectric cell at the transmitter and an electromagnet controlling an oscillating mirror and a moving prism at the receiver. But his system contained no means of analyzing the spectrum of colors at the transmitting end, and could not have worked as he described it.R.W. Burns, Television: An International History of the Formative Years, IET, 1998, p. 98. . Another inventor, Hovannes Adamian, also experimented with color television as early as 1907. The first color television project is claimed by him,Western technology and Soviet economic development: 1945 to 1965, by Antony C. Sutton, Business & Economics \u2013 1973, p. 330 and was patented in Germany on 31 March 1908, patent No. 197183, then in Britain, on 1 April 1908, patent No. 7219,The History of Television, 1880\u20131941, by Albert Abramson, 1987, p. 27 in France (patent No. 390326) and in Russia in 1910 (patent No. 17912).A. Rokhlin, Tak rozhdalos' dal'novidenie (in Russian) Scottish inventor John Logie Baird demonstrated the world's first color transmission on 3 July 1928, using scanning discs at the transmitting and receiving ends with three spirals of apertures, each spiral with filters of a different primary color; and three light sources at the receiving end, with a commutator to alternate their illumination.John Logie Baird, Television Apparatus and the Like, U.S. patent, filed in U.K. in 1928. Baird also made the world's first color broadcast on 4 February 1938, sending a mechanically scanned 120-line image from Baird's Crystal Palace studios to a projection screen at London's Dominion Theatre.Baird Television: Crystal Palace Television Studios. Previous color television demonstrations in the U.K. and U.S. had been via closed circuit. Mechanically scanned color television was also demonstrated by Bell Laboratories in June 1929 using three complete systems of photoelectric cells, amplifiers, glow-tubes, and color filters, with a series of mirrors to superimpose the red, green, and blue images into one full color image. The first practical hybrid system was again pioneered by John Logie Baird. In 1940 he publicly demonstrated a color television combining a traditional black-and-white display with a rotating colored disk. This device was very \"deep\", but was later improved with a mirror folding the light path into an entirely practical device resembling a large conventional console. However, Baird was unhappy with the design, and, as early as 1944, had commented to a British government committee that a fully electronic device would be better. In 1939, Hungarian engineer Peter Carl Goldmark introduced an electro-mechanical system while at CBS, which contained an Iconoscope sensor. The CBS field-sequential color system was partly mechanical, with a disc made of red, blue, and green filters spinning inside the television camera at 1,200 rpm, and a similar disc spinning in synchronization in front of the cathode ray tube inside the receiver set.Peter C. Goldmark, assignor to Columbia Broadcasting System, \"Color Television\", U.S. Patent 2,480,571, filed 7 September 1940. The system was first demonstrated to the Federal Communications Commission (FCC) on 29 August 1940, and shown to the press on 4 September.Current Broadcasting 1940\"Color Television Success in Test\", The New York Times, 30 August 1940, p. 21.\"Color Television Achieves Realism\", The New York Times, 5 September 1940, p. 18.\"New Television System Transmits Images in Full Color\", Popular Science, December 1940, p. 120. CBS began experimental color field tests using film as early as August 28, 1940, and live cameras by 12 November.\"CBS Demonstrates Full Color Television,\" The Wall Street Journal, 5 September 1940, p. 1. \"Television Hearing Set,\" The New York Times, 13 November 1940, p. 26. NBC (owned by RCA) made its first field test of color television on February 20, 1941. CBS began daily color field tests on June 1, 1941.Ed Reitan, RCA-NBC Color Firsts in Television (commented). These color systems were not compatible with existing black-and-white television sets, and, as no color television sets were available to the public at this time, viewing of the color field tests was restricted to RCA and CBS engineers and the invited press. The War Production Board halted the manufacture of television and radio equipment for civilian use from April 22, 1942 to 20 August 1945, limiting any opportunity to introduce color television to the general public.\"Making of Radios and Phonographs to End April 22,\" The New York Times, 8 March 1942, p. 1. \"Radio Production Curbs Cover All Combinations,\" The Wall Street Journal, 3 June 1942, p. 4. \"WPB Cancels 210 Controls; Radios, Trucks in Full Output,\" New York Times, 21 August 1945, p. 1.Bob Cooper, \"Television: The Technology That Changed Our Lives\", Early Television Foundation. As early as 1940, Baird had started work on a fully electronic system he called Telechrome. Early Telechrome devices used two electron guns aimed at either side of a phosphor plate. The phosphor was patterned so the electrons from the guns only fell on one side of the patterning or the other. Using cyan and magenta phosphors, a reasonable limited-color image could be obtained. He also demonstrated the same system using monochrome signals to produce a 3D image (called \"stereoscopic\" at the time). A demonstration on 16 August 1944 was the first example of a practical color television system. Work on the Telechrome continued and plans were made to introduce a three-gun version for full color. However, Baird's untimely death in 1946 ended development of the Telechrome system.Albert Abramson, The History of Television, 1942 to 2000, McFarland & Company, 2003, pp. 13\u201314. Baird Television: The World's First High Definition Colour Television System. Similar concepts were common through the 1940s and 1950s, differing primarily in the way they re-combined the colors generated by the three guns. The Geer tube was similar to Baird's concept, but used small pyramids with the phosphors deposited on their outside faces, instead of Baird's 3D patterning on a flat surface. The Penetron used three layers of phosphor on top of each other and increased the power of the beam to reach the upper layers when drawing those colors. The Chromatron used a set of focusing wires to select the colored phosphors arranged in vertical stripes on the tube. One of the great technical challenges of introducing color broadcast television was the desire to conserve bandwidth, potentially three times that of the existing black-and-white standards, and not use an excessive amount of radio spectrum. In the United States, after considerable research, the National Television Systems CommitteeNational Television System Committee (1951\u20131953), [Report and Reports of Panel No. 11, 11-A, 12\u201319, with Some supplementary references cited in the Reports, and the Petition for adoption of transmission standards for color television before the Federal Communications Commission, n.p., 1953], 17 v. illus., diagrams., tables. 28 cm. LC Control No.:54021386 Library of Congress Online Catalog approved an all-electronic system developed by RCA, which encoded the color information separately from the brightness information and greatly reduced the resolution of the color information in order to conserve bandwidth. As black-and-white televisions could receive the same transmission and display it in black-and-white, the color system adopted is [backwards] \"compatible\". (\"Compatible Color\", featured in RCA advertisements of the period, is mentioned in the song \"America\", of West Side Story, 1957.) The brightness image remained compatible with existing black-and-white television sets at slightly reduced resolution, while color televisions could decode the extra information in the signal and produce a limited-resolution color display. The higher resolution black-and-white and lower resolution color images combine in the brain to produce a seemingly high-resolution color image. The NTSC standard represented a major technical achievement. Color bars used in a test pattern, sometimes used when no program material is available. The first color broadcast (the first episode of the live program The Marriage) occurred on 8 July 1954, but during the following ten years most network broadcasts, and nearly all local programming, continued to be in black-and-white. It was not until the mid-1960s that color sets started selling in large numbers, due in part to the color transition of 1965 in which it was announced that over half of all network prime-time programming would be broadcast in color that fall. The first all-color prime-time season came just one year later. In 1972, the last holdout among daytime network programs converted to color, resulting in the first completely all-color network season. Early color sets were either floor-standing console models or tabletop versions nearly as bulky and heavy, so in practice they remained firmly anchored in one place. GE's relatively compact and lightweight Porta-Color set was introduced in the spring of 1966. It used a transistor-based UHF tuner. The first fully transistorized color television in the United States was the Quasar television introduced in 1967. These developments made watching color television a more flexible and convenient proposition. The MOSFET (metal-oxide-semiconductor field-effect transistor, or MOS transistor) was invented by Mohamed M. Atalla and Dawon Kahng at Bell Labs in 1959, and presented in 1960. By the mid-1960s, RCA were using MOSFETs in their consumer television products. RCA Laboratories researchers W.M. Austin, J.A. Dean, D.M. Griswold and O.P. Hart in 1966 described the use of the MOSFET in television circuits, including RF amplifier, low-level video, chroma and AGC circuits. The power MOSFET was later widely adopted for television receiver circuits. In 1972, sales of color sets finally surpassed sales of black-and-white sets. Color broadcasting in Europe was not standardized on the PAL format until the 1960s, and broadcasts did not start until 1967. By this point many of the technical issues in the early sets had been worked out, and the spread of color sets in Europe was fairly rapid. By the mid-1970s, the only stations broadcasting in black-and-white were a few high-numbered UHF stations in small markets, and a handful of low-power repeater stations in even smaller markets such as vacation spots. By 1979, even the last of these had converted to color and, by the early 1980s, B&W sets had been pushed into niche markets, notably low-power uses, small portable sets, or for use as video monitor screens in lower-cost consumer equipment. By the late 1980s even these areas switched to color sets. Digital Digital television (DTV) is the transmission of audio and video by digitally processed and multiplexed signals, in contrast to the totally analog and channel separated signals used by analog television. Due to data compression, digital television can support more than one program in the same channel bandwidth. It is an innovative service that represents the most significant evolution in television broadcast technology since color television emerged in the 1950s. Digital television's roots have been tied very closely to the availability of inexpensive, high performance computers. It was not until the 1990s that digital television became possible. Digital television was previously not practically possible due to the impractically high bandwidth requirements of uncompressed digital video, requiring around 200Mbit/s for a standard-definition television (SDTV) signal, and over 1Gbit/s for high-definition television (HDTV). Digital television became practically possible in the early 1990s due to a major technological development, discrete cosine transform (DCT) video compression. DCT coding is a lossy compression technique that was first proposed for image compression by Nasir Ahmed in 1972, and was later adapted into a motion-compensated DCT video coding algorithm, for video coding standards such as the H.26x formats from 1988 onwards and the MPEG formats from 1991 onwards. Motion-compensated DCT video compression significantly reduced the amount of bandwidth required for a digital television signal. DCT coding compressed down the bandwidth requirements of digital television signals to about 34 Mbit/s for SDTV and around 70140 Mbit/s for HDTV while maintaining near-studio-quality transmission, making digital television a practical reality in the 1990s. A digital television service was proposed in 1986 by Nippon Telegraph and Telephone (NTT) and the Ministry of Posts and Telecommunication (MPT) in Japan, where there were plans to develop an \"Integrated Network System\" service. However, it was not possible to practically implement such a digital television service until the adoption of DCT video compression technology made it possible in the early 1990s. In the mid-1980s, as Japanese consumer electronics firms forged ahead with the development of HDTV technology, the MUSE analog format proposed by NHK, a Japanese company, was seen as a pacesetter that threatened to eclipse U.S. electronics companies' technologies. Until June 1990, the Japanese MUSE standard, based on an analog system, was the front-runner among the more than 23 other technical concepts under consideration. Then, a U.S. company, General Instrument, demonstrated the possibility of a digital television signal. This breakthrough was of such significance that the FCC was persuaded to delay its decision on an ATV standard until a digitally-based standard could be developed. In March 1990, when it became clear that a digital standard was possible, the FCC made a number of critical decisions. First, the Commission declared that the new ATV standard must be more than an enhanced analog signal, but be able to provide a genuine HDTV signal with at least twice the resolution of existing television images.(7) Then, to ensure that viewers who did not wish to buy a new digital television set could continue to receive conventional television broadcasts, it dictated that the new ATV standard must be capable of being \"simulcast\" on different channels.(8)The new ATV standard also allowed the new DTV signal to be based on entirely new design principles. Although incompatible with the existing NTSC standard, the new DTV standard would be able to incorporate many improvements. The last standards adopted by the FCC did not require a single standard for scanning formats, aspect ratios, or lines of resolution. This compromise resulted from a dispute between the consumer electronics industry (joined by some broadcasters) and the computer industry (joined by the film industry and some public interest groups) over which of the two scanning processes\u2014interlaced or progressive\u2014would be best suited for the newer digital HDTV compatible display devices. Interlaced scanning, which had been specifically designed for older analogue CRT display technologies, scans even-numbered lines first, then odd-numbered ones. In fact, interlaced scanning can be looked at as the first video compression model as it was partly designed in the 1940s to double the image resolution to exceed the limitations of the television broadcast bandwidth. Another reason for its adoption was to limit the flickering on early CRT screens whose phosphor coated screens could only retain the image from the electron scanning gun for a relatively short duration. However interlaced scanning does not work as efficiently on newer display devices such as Liquid-crystal (LCD), for example, which are better suited to a more frequent progressive refresh rate. Progressive scanning, the format that the computer industry had long adopted for computer display monitors, scans every line in sequence, from top to bottom. Progressive scanning in effect doubles the amount of data generated for every full screen displayed in comparison to interlaced scanning by painting the screen in one pass in 1/60-second, instead of two passes in 1/30-second. The computer industry argued that progressive scanning is superior because it does not \"flicker\" on the new standard of display devices in the manner of interlaced scanning. It also argued that progressive scanning enables easier connections with the Internet, and is more cheaply converted to interlaced formats than vice versa. The film industry also supported progressive scanning because it offered a more efficient means of converting filmed programming into digital formats. For their part, the consumer electronics industry and broadcasters argued that interlaced scanning was the only technology that could transmit the highest quality pictures then (and currently) feasible, i.e., 1,080 lines per picture and 1,920 pixels per line. Broadcasters also favored interlaced scanning because their vast archive of interlaced programming is not readily compatible with a progressive format. William F. Schreiber, who was director of the Advanced Television Research Program at the Massachusetts Institute of Technology from 1983 until his retirement in 1990, thought that the continued advocacy of interlaced equipment originated from consumer electronics companies that were trying to get back the substantial investments they made in the interlaced technology. Digital television transition started in late 2000s. All governments across the world set the deadline for analog shutdown by 2010s. Initially, the adoption rate was low, as the first digital tuner-equipped television sets were costly. But soon, as the price of digital-capable television sets dropped, more and more households were converting to digital television sets. The transition is expected to be completed worldwide by mid to late 2010s. Smart television upright=0.9|A smart TV The advent of digital television allowed innovations like smart television sets. A smart television, sometimes referred to as connected TV or hybrid TV, is a television set or set-top box with integrated Internet and Web 2.0 features, and is an example of technological convergence between computers, television sets and set-top boxes. Besides the traditional functions of television sets and set-top boxes provided through traditional Broadcasting media, these devices can also provide Internet TV, online interactive media, over-the-top content, as well as on-demand streaming media, and home networking access. These TVs come pre-loaded with an operating system. Smart TV should not to be confused with Internet TV, Internet Protocol television (IPTV) or with Web TV. Internet television refers to the receiving of television content over the Internet instead of by traditional systems\u2014terrestrial, cable and satellite (although internet itself is received by these methods). IPTV is one of the emerging Internet television technology standards for use by television networks. Web television (WebTV) is a term used for programs created by a wide variety of companies and individuals for broadcast on Internet TV. A first patent was filed in 1994 (and extended the following year) for an \"intelligent\" television system, linked with data processing systems, by means of a digital or analog network. Apart from being linked to data networks, one key point is its ability to automatically download necessary software routines, according to a user's demand, and process their needs. Major TV manufacturers have announced production of smart TVs only, for middle-end and high-end TVs in 2015. Smart TVs have gotten more affordable compared to when they were first introduced, with 46 million of U.S. households having at least one as of 2019.Kats, Rimma (15 November 2018). \"How Many Households Own a Smart TV?\" eMarketer. Retrieved 21 May 2021. 3D 3D television conveys depth perception to the viewer by employing techniques such as stereoscopic display, multi-view display, 2D-plus-depth, or any other form of 3D display. Most modern 3D television sets use an active shutter 3D system or a polarized 3D system, and some are autostereoscopic without the need of glasses. Stereoscopic 3D television was demonstrated for the first time on 10 August 1928, by John Logie Baird in his company's premises at 133 Long Acre, London. Baird pioneered a variety of 3D television systems using electromechanical and cathode-ray tube techniques. The first 3D television was produced in 1935. The advent of digital television in the 2000s greatly improved 3D television sets. Although 3D television sets are quite popular for watching 3D home media such as on Blu-ray discs, 3D programming has largely failed to make inroads with the public. Many 3D television channels which started in the early 2010s were shut down by the mid-2010s. According to DisplaySearch 3D televisions shipments totaled 41.45 million units in 2012, compared with 24.14 in 2011 and 2.26 in 2010. As of late 2013, the number of 3D TV viewers started to decline. Broadcast systems Terrestrial television upright=1.35|A modern high gain UHF Yagi television antenna. It has 17 directors, and one reflector (made of 4 rods) shaped as a corner reflector. Programming is broadcast by television stations, sometimes called \"channels\", as stations are licensed by their governments to broadcast only over assigned channels in the television band. At first, terrestrial broadcasting was the only way television could be widely distributed, and because bandwidth was limited, i.e., there were only a small number of channels available, government regulation was the norm. In the U.S., the Federal Communications Commission (FCC) allowed stations to broadcast advertisements beginning in July 1941, but required public service programming commitments as a requirement for a license. By contrast, the United Kingdom chose a different route, imposing a television license fee on owners of television reception equipment to fund the British Broadcasting Corporation (BBC), which had public service as part of its Royal Charter. WRGB claims to be the world's oldest television station, tracing its roots to an experimental station founded on 13 January 1928, broadcasting from the General Electric factory in Schenectady, NY, under the call letters W2XB.\"The First Television Show\" Popular Mechanics, August 1930, pp. 177\u201379 It was popularly known as \"WGY Television\" after its sister radio station. Later in 1928, General Electric started a second facility, this one in New York City, which had the call letters W2XBS and which today is known as WNBC. The two stations were experimental in nature and had no regular programming, as receivers were operated by engineers within the company. The image of a Felix the Cat doll rotating on a turntable was broadcast for 2 hours every day for several years as new technology was being tested by the engineers. On 2 November 1936, the BBC began transmitting the world's first public regular high-definition service from the Victorian Alexandra Palace in north London. It therefore claims to be the birthplace of television broadcasting as we know it from now on. With the widespread adoption of cable across the United States in the 1970s and 1980s, terrestrial television broadcasts have been in decline; in 2013 it was estimated that about 7\\% of US households used an antenna.\"CEA Study Says Seven Percent of TV Households Use Antennas\", '\"TVTechnology, 30 July 2013 \"Nielsen: Broadcast Reliance Grew in 2012\", TVTechnology, 14 January 2013 A slight increase in use began around 2010 due to switchover to digital terrestrial television broadcasts, which offered pristine image quality over very large areas, and offered an alternate to cable television (CATV) for cord cutters. All other countries around the world are also in the process of either shutting down analog terrestrial television or switching over to digital terrestrial television. Cable television Coaxial cable is used to carry cable television signals into cathode ray tube and flat panel television sets. Cable television is a system of broadcasting television programming to paying subscribers via radio frequency (RF) signals transmitted through coaxial cables or light pulses through fiber-optic cables. This contrasts with traditional terrestrial television, in which the television signal is transmitted over the air by radio waves and received by a television antenna attached to the television. In the 2000s, FM radio programming, high-speed Internet, telephone service, and similar non-television services may also be provided through these cables. The abbreviation CATV is sometimes used for cable television in the United States. It originally stood for Community Access Television or Community Antenna Television, from cable television's origins in 1948: in areas where over-the-air reception was limited by distance from transmitters or mountainous terrain, large \"community antennas\" were constructed, and cable was run from them to individual homes. Satellite television upright=1.15|DBS satellite dishes installed on an apartment complex. Satellite television is a system of supplying television programming using broadcast signals relayed from communication satellites. The signals are received via an outdoor parabolic reflector antenna usually referred to as a satellite dish and a low-noise block downconverter (LNB). A satellite receiver then decodes the desired television program for viewing on a television set. Receivers can be external set-top boxes, or a built-in television tuner. Satellite television provides a wide range of channels and services, especially to geographic areas without terrestrial television or cable television. The most common method of reception is direct-broadcast satellite television (DBSTV), also known as \"direct to home\" (DTH). In DBSTV systems, signals are relayed from a direct broadcast satellite on the Ku wavelength and are completely digital. Satellite TV systems formerly used systems known as television receive-only. These systems received analog signals transmitted in the C-band spectrum from FSS type satellites, and required the use of large dishes. Consequently, these systems were nicknamed \"big dish\" systems, and were more expensive and less popular. The direct-broadcast satellite television signals were earlier analog signals and later digital signals, both of which require a compatible receiver. Digital signals may include high-definition television (HDTV). Some transmissions and channels are free-to-air or free-to-view, while many other channels are pay television requiring a subscription. In 1945, British science fiction writer Arthur C. Clarke proposed a worldwide communications system which would function by means of three satellites equally spaced apart in earth orbit. This was published in the October 1945 issue of the Wireless World magazine and won him the Franklin Institute's Stuart Ballantine Medal in 1963. The first satellite television signals from Europe to North America were relayed via the Telstar satellite over the Atlantic ocean on 23 July 1962. The signals were received and broadcast in North American and European countries and watched by over 100 million. Launched in 1962, the Relay 1 satellite was the first satellite to transmit television signals from the US to Japan. The first geosynchronous communication satellite, Syncom 2, was launched on 26 July 1963. The world's first commercial communications satellite, called Intelsat I and nicknamed \"Early Bird\", was launched into geosynchronous orbit on 6 April 1965. The first national network of television satellites, called Orbita, was created by the Soviet Union in October 1967, and was based on the principle of using the highly elliptical Molniya satellite for rebroadcasting and delivering of television signals to ground downlink stations. The first commercial North American satellite to carry television transmissions was Canada's geostationary Anik 1, which was launched on 9 November 1972. ATS-6, the world's first experimental educational and Direct Broadcast Satellite (DBS), was launched on 30 May 1974. It transmitted at 860 MHz using wideband FM modulation and had two sound channels. The transmissions were focused on the Indian subcontinent but experimenters were able to receive the signal in Western Europe using home constructed equipment that drew on UHF television design techniques already in use.Long Distance Television Reception (TV-DX) For the Enthusiast, Roger W. Bunney, The first in a series of Soviet geostationary satellites to carry Direct-To-Home television, Ekran 1, was launched on 26 October 1976. It used a 714 MHz UHF downlink frequency so that the transmissions could be received with existing UHF television technology rather than microwave technology. Internet television Internet television (Internet TV) (or online television) is the digital distribution of television content via the Internet as opposed to traditional systems like terrestrial, cable, and satellite, although the Internet itself is received by terrestrial, cable, or satellite methods. Internet television is a general term that covers the delivery of television series, and other video content, over the Internet by video streaming technology, typically by major traditional television broadcasters. Internet television should not be confused with Smart TV, IPTV or with Web TV. Smart television refers to the television set which has a built-in operating system. Internet Protocol television (IPTV) is one of the emerging Internet television technology standards for use by television networks. Web television is a term used for programs created by a wide variety of companies and individuals for broadcast on Internet television. Sets RCA 630-TS, the first mass-produced television set, which sold in 1946\u20131947 A television set, also called a television receiver, television, TV set, TV, or \"telly\", is a device that combines a tuner, display, an amplifier, and speakers for the purpose of viewing television and hearing its audio components. Introduced in the late 1920s in mechanical form, television sets became a popular consumer product after World War II in electronic form, using cathode ray tubes. The addition of color to broadcast television after 1953 further increased the popularity of television sets and an outdoor antenna became a common feature of suburban homes. The ubiquitous television set became the display device for recorded media in the 1970s, such as Betamax and VHS, which enabled viewers to record TV shows and watch prerecorded movies. In the subsequent decades, Television sets were used to watch DVDs and Blu-ray Discs of movies and other content. Major TV manufacturers announced the discontinuation of CRT, DLP, plasma and fluorescent-backlit LCDs by the mid-2010s. Televisions since 2010s mostly use LEDs. LEDs are expected to be gradually replaced by OLEDs in the near future. Display technologies Disk The earliest systems employed a spinning disk to create and reproduce images. These usually had a low resolution and screen size and never became popular with the public. CRT upright=0.9|A 14-inch cathode ray tube showing its deflection coils and electron guns The cathode ray tube (CRT) is a vacuum tube containing one or more electron guns (a source of electrons or electron emitter) and a fluorescent screen used to view images. It has a means to accelerate and deflect the electron beam(s) onto the screen to create the images. The images may represent electrical waveforms (oscilloscope), pictures (television, computer monitor), radar targets or others. The CRT uses an evacuated glass envelope which is large, deep (i.e. long from front screen face to rear end), fairly heavy, and relatively fragile. As a matter of safety, the face is typically made of thick lead glass so as to be highly shatter-resistant and to block most X-ray emissions, particularly if the CRT is used in a consumer product. In television sets and computer monitors, the entire front area of the tube is scanned repetitively and systematically in a fixed pattern called a raster. An image is produced by controlling the intensity of each of the three electron beams, one for each additive primary color (red, green, and blue) with a video signal as a reference. In all modern CRT monitors and televisions, the beams are bent by magnetic deflection, a varying magnetic field generated by coils and driven by electronic circuits around the neck of the tube, although electrostatic deflection is commonly used in oscilloscopes, a type of diagnostic instrument. DLP upright=0.9|The Christie Mirage 5000, a 2001 DLP projector. Digital Light Processing (DLP) is a type of video projector technology that uses a digital micromirror device. Some DLPs have a TV tuner, which makes them a type of TV display. It was originally developed in 1987 by Dr. Larry Hornbeck of Texas Instruments. While the DLP imaging device was invented by Texas Instruments, the first DLP based projector was introduced by Digital Projection Ltd in 1997. Digital Projection and Texas Instruments were both awarded Emmy Awards in 1998 for invention of the DLP projector technology. DLP is used in a variety of display applications from traditional static displays to interactive displays and also non-traditional embedded applications including medical, security, and industrial uses. DLP technology is used in DLP front projectors (standalone projection units for classrooms and business primarily), but also in private homes; in these cases, the image is projected onto a projection screen. DLP is also used in DLP rear projection television sets and digital signs. It is also used in about 85\\% of digital cinema projection. Plasma A plasma display panel (PDP) is a type of flat panel display common to large television displays or larger. They are called \"plasma\" displays because the technology utilizes small cells containing electrically charged ionized gases, or what are in essence chambers more commonly known as fluorescent lamps. LCD upright=0.9|A generic LCD TV, with speakers on either side of the screen. Liquid-crystal-display televisions (LCD TV) are television sets that use LCD display technology to produce images. LCD televisions are much thinner and lighter than cathode ray tube (CRTs) of similar display size, and are available in much larger sizes (e.g., 90-inch diagonal). When manufacturing costs fell, this combination of features made LCDs practical for television receivers. LCDs come in two types: those using cold cathode fluorescent lamps, simply called LCDs and those using LED as backlight called as LEDs. In 2007, LCD television sets surpassed sales of CRT-based television sets worldwide for the first time, and their sales figures relative to other technologies accelerated. LCD television sets have quickly displaced the only major competitors in the large-screen market, the Plasma display panel and rear-projection television. In mid 2010s LCDs especially LEDs became, by far, the most widely produced and sold television display type. LCDs also have disadvantages. Other technologies address these weaknesses, including OLEDs, FED and SED, but none of these have entered widespread production. OLED OLED TV An OLED (organic light-emitting diode) is a light-emitting diode (LED) in which the emissive electroluminescent layer is a film of organic compound which emits light in response to an electric current. This layer of organic semiconductor is situated between two electrodes. Generally, at least one of these electrodes is transparent. OLEDs are used to create digital displays in devices such as television screens. It is also used for computer monitors, portable systems such as mobile phones, handheld game consoles and PDAs. There are two main groups of OLED: those based on small molecules and those employing polymers. Adding mobile ions to an OLED creates a light-emitting electrochemical cell or LEC, which has a slightly different mode of operation. OLED displays can use either passive-matrix (PMOLED) or active-matrix (AMOLED) addressing schemes. Active-matrix OLEDs require a thin-film transistor backplane to switch each individual pixel on or off, but allow for higher resolution and larger display sizes. An OLED display works without a backlight. Thus, it can display deep black levels and can be thinner and lighter than a liquid crystal display (LCD). In low ambient light conditions such as a dark room an OLED screen can achieve a higher contrast ratio than an LCD, whether the LCD uses cold cathode fluorescent lamps or LED backlight. OLEDs are expected to replace other forms of display in near future. Display resolution upright=1.35|Comparison of 8K UHDTV, 4K UHDTV, HDTV and SDTV resolution LD Low-definition television or LDTV refers to television systems that have a lower screen resolution than standard-definition television systems such 240p (320*240). It is used in handheld television. The most common source of LDTV programming is the Internet, where mass distribution of higher-resolution video files could overwhelm computer servers and take too long to download. Many mobile phones and portable devices such as Apple's iPod Nano, or Sony's PlayStation Portable use LDTV video, as higher-resolution files would be excessive to the needs of their small screens (320\u00d7240 and 480\u00d7272 pixels respectively). The current generation of iPod Nanos have LDTV screens, as do the first three generations of iPod Touch and iPhone (480\u00d7320). For the first years of its existence, YouTube offered only one, low-definition resolution of 320x240p at 30fps or less. A standard, consumer grade videotape can be considered SDTV due to its resolution (approximately 360 \u00d7 480i/576i). SD Standard-definition television or SDTV refers to two different resolutions: 576i, with 576 interlaced lines of resolution, derived from the European-developed PAL and SECAM systems; and 480i based on the American National Television System Committee NTSC system. SDTV is a television system that uses a resolution that is not considered to be either high-definition television (720p, 1080i, 1080p, 1440p, 4K UHDTV, and 8K UHD) or enhanced-definition television (EDTV 480p). In North America, digital SDTV is broadcast in the same 4:3 aspect ratio as NTSC signals with widescreen content being center cut. However, in other parts of the world that used the PAL or SECAM color systems, standard-definition television is now usually shown with a 16:9 aspect ratio, with the transition occurring between the mid-1990s and mid-2000s. Older programs with a 4:3 aspect ratio are shown in the United States as 4:3 with non-ATSC countries preferring to reduce the horizontal resolution by anamorphically scaling a pillarboxed image. HD High-definition television (HDTV) provides a resolution that is substantially higher than that of standard-definition television. HDTV may be transmitted in various formats: 1080p: 1920\u00d71080p: 2,073,600 pixels (~2.07 megapixels) per frame 1080i: 1920\u00d71080i: 1,036,800 pixels (~1.04 MP) per field or 2,073,600 pixels (~2.07 MP) per frame A non-standard CEA resolution exists in some countries such as 1440\u00d71080i: 777,600 pixels (~0.78 MP) per field or 1,555,200 pixels (~1.56 MP) per frame 720p: 1280\u00d7720p: 921,600 pixels (~0.92 MP) per frame UHD Ultra-high-definition television (also known as Super Hi-Vision, Ultra HD television, UltraHD, UHDTV, or UHD) includes 4K UHD (2160p) and 8K UHD (4320p), which are two digital video formats proposed by NHK Science & Technology Research Laboratories and defined and approved by the International Telecommunication Union (ITU). The Consumer Electronics Association announced on October 17, 2012, that \"Ultra High Definition\", or \"Ultra HD\", would be used for displays that have an aspect ratio of at least 16:9 and at least one digital input capable of carrying and presenting natural video at a minimum resolution of 3840\u00d72160 pixels. Market share North American consumers purchase a new television set on average every seven years, and the average household owns 2.8 televisions. , 48 million are sold each year at an average price of $ 460 and size of . Getting TV programming shown to the public can happen in many other ways. After production, the next step is to market and deliver the product to whichever markets are open to using it. This typically happens on two levels: Original run or First run: a producer creates a program of one or multiple episodes and shows it on a station or network which has either paid for the production itself or to which a license has been granted by the television producers to do the same. Broadcast syndication: this is the terminology rather broadly used to describe secondary programming usages (beyond original run). It includes secondary runs in the country of first issue, but also international usage which may not be managed by the originating producer. In many cases, other companies, television stations, or individuals are engaged to do the syndication work, in other words, to sell the product into the markets they are allowed to sell into by contract from the copyright holders, in most cases the producers. First-run programming is increasing on subscription services outside of the United States , but few domestically produced programs are syndicated on domestic free-to-air (FTA) elsewhere. This practice is increasing, however, generally on digital-only FTA channels or with subscriber-only, first-run material appearing on FTA. Unlike United States , repeat FTA screenings of an FTA network program usually only occur on that network. Also, affiliates rarely buy or produce non-network programming that is not focused on local programming. Pop culture entertainment genres include action-oriented shows such as police, crime, detective dramas, horror, or thriller shows. As well, there are also other variants of the drama genre, such as medical dramas and daytime soap operas. Sci-fi series can fall into either the drama or action category, depending on whether they emphasize philosophical questions or high adventure. Comedy is a popular genre which includes situation comedy (sitcom) and animated series for the adult demographic such as Comedy Central's South Park. The least expensive forms of entertainment programming genres are game shows, talk shows, variety shows, and reality television. Game shows feature contestants answering questions and solving puzzles to win prizes. Talk shows contain interviews with film, television, music and sports celebrities and public figures. Variety shows feature a range of musical performers and other entertainers, such as comedians and magicians, introduced by a host or Master of Ceremonies. There is some crossover between some talk shows and variety shows because leading talk shows often feature performances by bands, singers, comedians, and other performers in between the interview segments. Reality television series \"regular\" people (i.e., not actors) facing unusual challenges or experiences ranging from arrest by police officers (COPS) to significant weight loss (The Biggest Loser). A derived version of reality shows depicts celebrities doing mundane activities such as going about their everyday life (The Osbournes, Snoop Dogg's Father Hood) or doing regular jobs (The Simple Life). Around the world, broadcast television is financed by government, advertising, licensing (a form of tax), subscription, or any combination of these. To protect revenues, subscription television channels are usually encrypted to ensure that only subscribers receive the decryption codes to see the signal. Unencrypted channels are known as free to air or FTA. In 2009, the global TV market represented 1,217.2 million TV households with at least one TV and total revenues of 268.9 billion EUR (declining 1.2\\% compared to 2008).Global TV 2010 \u2013 Markets, Trends Facts & Figures (2008\u20132013) International Television Expert Group North America had the biggest TV revenue market share with 39\\% followed by Europe (31\\%), Asia-Pacific (21\\%), Latin America (8\\%), and Africa and the Middle East (2\\%).Global TV Revenues (2008\u201309) International Television Expert Group Globally, the different TV revenue sources divide into 45\u201350\\% TV advertising revenues, 40\u201345\\% subscription fees and 10\\% public funding.iDate's Global TV Revenue Market Shares International Television Expert GroupOFCOM's Global TV Market Report 2009 International Television Expert Group Television 's broad reach makes it a powerful and attractive medium for advertisers. Many television networks and stations sell blocks of broadcast time to advertisers (\"sponsors\") to fund their programming.Karen Hornick \"That Was the Year That Was\" American Heritage, Oct. 2006. Television advertisements (variously called a television commercial, commercial or ad in American English, and known in British English as an advert) is a span of television programming produced and paid for by an organization, which conveys a message, typically to market a product or service. Advertising revenue provides a significant portion of the funding for most privately owned television networks. The vast majority of television advertisements today consist of brief advertising spots, ranging in length from a few seconds to several minutes (as well as program-length infomercials). Advertisements of this sort have been used to promote a wide variety of goods, services and ideas since the beginning of television. The first official, paid television advertisement was broadcast in the United States on July 1, 1941 over New York station WNBT (now WNBC) before a baseball game between the Brooklyn Dodgers and Philadelphia Phillies. The announcement for Bulova watches, for which the company paid anywhere from $4.00 to $9.00 (reports vary), displayed a WNBT test pattern modified to look like a clock with the hands showing the time. The Bulova logo, with the phrase \"Bulova Watch Time\", was shown in the lower right-hand quadrant of the test pattern while the second hand swept around the dial for one minute.\"Imagery For Profit\" R.W. Stewart, The New York Times, 6 July 1941. The first TV ad broadcast in the U.K. was on ITV on 22 September 1955, advertising Gibbs SR toothpaste. The first TV ad broadcast in Asia was on Nippon Television in Tokyo on 28 August 1953, advertising Seikosha (now Seiko), which also displayed a clock with the current time.\u30b3\u30de\u30fc\u30b7\u30e3\u30eb\u30e1\u30c3\u30bb\u30fc\u30b8 (Commercial message). Retrieved 24 November 2013 United States Since inception in the US in 1941, television commercials have become one of the most effective, persuasive, and popular methods of selling products of many sorts, especially consumer goods. During the 1940s and into the 1950s, programs were hosted by single advertisers. This, in turn, gave great creative license to the advertisers over the content of the show. Perhaps due to the quiz show scandals in the 1950s, networks shifted to the magazine concept, introducing advertising breaks with other advertisers. U.S. advertising rates are determined primarily by Nielsen ratings. The time of the day and popularity of the channel determine how much a TV commercial can cost. For example, it can cost approximately $750,000 for a 30-second block of commercial time during the highly popular singing competition American Idol, while the same amount of time for the Super Bowl can cost several million dollars. Conversely, lesser-viewed time slots, such as early mornings and weekday afternoons, are often sold in bulk to producers of infomercials at far lower rates. In recent years, the paid program or infomercial has become common, usually in lengths of 30 minutes or one hour. Some drug companies and other businesses have even created \"news\" items for broadcast, known in the industry as video news releases, paying program directors to use them.Jon Stewart of \"The Daily Show\" was mock-outraged at this, saying, \"That's what we do!\", and calling it a new form of television, \"infoganda\". Some television programs also deliberately place products into their shows as advertisements, a practice started in feature films and known as product placement. For example, a character could be drinking a certain kind of soda, going to a particular chain restaurant, or driving a certain make of car. (This is sometimes very subtle, with shows having vehicles provided by manufacturers for low cost in exchange as a product placement). Sometimes, a specific brand or trade mark, or music from a certain artist or group, is used. (This excludes guest appearances by artists who perform on the show.) United Kingdom The TV regulator oversees TV advertising in the United Kingdom. Its restrictions have applied since the early days of commercially-funded TV. Despite this, an early TV mogul, Roy Thomson, likened the broadcasting licence as being a \"licence to print money\". Restrictions mean that the big three national commercial TV channels: ITV, Channel 4, and Channel 5 can show an average of only seven minutes of advertising per hour (eight minutes in the peak period). Other broadcasters must average no more than nine minutes (twelve in the peak). This means that many imported TV shows from the U.S. have unnatural pauses where the British company does not utilize the narrative breaks intended for more frequent U.S. advertising. Advertisements must not be inserted in the course of certain specific proscribed types of programs which last less than half an hour in scheduled duration; this list includes any news or current affairs programs, documentaries, and programs for children; additionally, advertisements may not be carried in a program designed and broadcast for reception in schools or in any religious broadcasting service or other devotional program or during a formal Royal ceremony or occasion. There also must be clear demarcations in time between the programs and the advertisements. The BBC, being strictly non-commercial, is not allowed to show advertisements on television in the U.K., although it has many advertising-funded channels abroad. The majority of its budget comes from television license fees (see below) and broadcast syndication, the sale of content to other broadcasters. Ireland Broadcast advertising is regulated by the Broadcasting Authority of Ireland.General Commercial Communications Code and Children\u2019s Commercial Communications Code, referenced in: ; Subscription Some TV channels are partly funded from subscriptions; therefore, the signals are encrypted during broadcast to ensure that only the paying subscribers have access to the decryption codes to watch pay television or specialty channels. Most subscription services are also funded by advertising. Taxation or license Television services in some countries may be funded by a television licence or a form of taxation, which means that advertising plays a lesser role or no role at all. For example, some channels may carry no advertising at all and some very little, including: Australia (ABC Television) Belgium (RTBF) Denmark (DR) Ireland (RT\u00c9) Japan (NHK) Norway (NRK) Sweden (SVT) Switzerland (SRG SSR) Republic of China (Taiwan) (PTS) United Kingdom (BBC Television) United States (PBS) The British Broadcasting Corporation's TV service carries no television advertising on its UK channels and is funded by an annual television licence paid by the occupiers of premises receiving live telecasts. it was estimated that approximately 26.8 million UK private domestic households owned televisions, with approximately 25 million TV licences in all premises in force as of 2010. This television license fee is set by the government, but the BBC is not answerable to or controlled by the government. two main BBC TV channels were watched by almost 90\\% of the population each week and overall had 27\\% share of total viewing, despite the fact that 85\\% of homes were multi-channel, with 42\\% of these having access to 200 free-to-air channels via satellite and another 43\\% having access to 30 or more channels via Freeview. the licence that funds the advertising-free BBC TV channels cost \u00a3159 for a colour TV Licence and \u00a353.50 for a black and white TV Licence (free or reduced for some groups). The Australian Broadcasting Corporation's television services in Australia carry no advertising by external sources; it is banned under the Australian Broadcasting Corporation Act 1983, which also ensures its the editorial independence. The ABC receives most of its funding from the Australian Government (some revenue is received from its Commercial division), but it has suffered progressive funding cuts under Liberal governments since the 1996 Howard government, with particularly deep cuts in 2014 under the Turnbull government, and an ongoing indexation freeze . The funds provide for the ABC's television, radio, online, and international outputs, although ABC Australia, which broadcasts throughout the Asia-Pacific region, receives additional funds through DFAT and some advertising on the channel. In France, government-funded channels carry advertisements, yet those who own television sets have to pay an annual tax (\"la redevance audiovisuelle\").Ministry of Finance In Japan, NHK is paid for by license fees (known in Japanese as ). The broadcast law that governs NHK's funding stipulates that any television equipped to receive NHK is required to pay. The fee is standardized, with discounts for office workers and students who commute, as well a general discount for residents of Okinawa prefecture. Broadcast programming Broadcast programming, or TV listings in the United Kingdom, is the practice of organizing television programs in a schedule, with broadcast automation used to regularly change the scheduling of TV programs to build an audience for a new show, retain that audience, or compete with other broadcasters' programs. Social aspects upright=0.9|American family watching television, circa 1958 Television has played a pivotal role in the socialization of the 20th and 21st centuries. There are many aspects of television that can be addressed, including negative issues such as media violence. Current research is discovering that individuals suffering from social isolation can employ television to create what is termed a parasocial or faux relationship with characters from their favorite television shows and movies as a way of deflecting feelings of loneliness and social deprivation.Butler, Fionnuala, Cynthia Pickett. \"Imaginary Friends.\" Scientific American. 28 July 2009. Web. 26 March 2010. URL Several studies have found that educational television has many advantages. The article \"The Good Things about Television\" argues that television can be a very powerful and effective learning tool for children if used wisely. Opposition Methodist denominations in the conservative holiness movement, such as the Allegheny Wesleyan Methodist Connection and the Evangelical Wesleyan Church, eschew the use of the television. Some Baptists, such as those affiliated with Pensacola Christian College, also eschew television. Many Traditional Catholic congregations such as the Society of Saint Pius X (SSPX) oppose the presence of television in the household, teaching that it is an occasion of sin. Negative impacts Children, especially those aged 5 or younger, are at risk of injury from falling televisions. A CRT-style television that falls on a child will, because of its weight, hit with the equivalent force of falling multiple stories from a building. Newer flat-screen televisions are \"top-heavy and have narrow bases\", which means that a small child can easily pull one over. , TV tip-overs were responsible for more than 10,000 injuries per year to children in the U.S., at a cost of more than $ 8 million per year in emergency care.", "edit_actions": [{"type": "D", "before": "(TV)", "after": null, "start_char_pos": 98, "end_char_pos": 102}, {"type": "R", "before": "tele", "after": "TV", "start_char_pos": 128, "end_char_pos": 132}, {"type": "R", "before": "TV", "after": "television", "start_char_pos": 701, "end_char_pos": 703}, {"type": "R", "before": "shows", "after": "displays", "start_char_pos": 2445, "end_char_pos": 2450}, {"type": "R", "before": "variously", "after": "differently", "start_char_pos": 2770, "end_char_pos": 2779}, {"type": "R", "before": "USA", "after": "U.S.", "start_char_pos": 4192, "end_char_pos": 4195}, {"type": "R", "before": "television broadcasts", "after": "telecasts", "start_char_pos": 5545, "end_char_pos": 5566}, {"type": "R", "before": "An American", "after": "A U.S.", "start_char_pos": 5745, "end_char_pos": 5756}, {"type": "R", "before": "beginning", "after": "start", "start_char_pos": 7466, "end_char_pos": 7475}, {"type": "R", "before": "television broadcasts", "after": "telecasts", "start_char_pos": 7719, "end_char_pos": 7740}, {"type": "R", "before": "handful", "after": "lot", "start_char_pos": 7776, "end_char_pos": 7783}, {"type": "R", "before": "famous", "after": "well-known", "start_char_pos": 7893, "end_char_pos": 7899}, {"type": "R", "before": "dubbed", "after": "called", "start_char_pos": 9705, "end_char_pos": 9711}, {"type": "R", "before": "American", "after": "U.S.", "start_char_pos": 11047, "end_char_pos": 11055}, {"type": "R", "before": "$1 million over a ten-year period, in addition to license payments, to use his patents.Stashower, Daniel, The Boy Genius and the Mogul: The Untold Story of Television, Broadway Books, 2002, pp. 243\u201344. .Everson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , 266 pp. In 1933, RCA introduced an improved camera tube that relied on Tihanyi's charge storage principle. Dubbed the \"Iconoscope\" by Zworykin, the new tube had a light sensitivity of about 75,000 lux, and thus was claimed to be much more sensitive than Farnsworth's image dissector. However, Farnsworth had overcome his power problems with his Image Dissector through the invention of a completely unique \"multipactor\" device that he began work on in 1930, and demonstrated in 1931.Abramson, Albert (1987), The History of Television, 1880 to 1941. Jefferson, NC: Albert Abramson. p. 148. .Everson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , pp. 137\u201341. This small tube could amplify a signal reportedly to the 60th power or betterEverson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , p. 139. and showed great promise in all fields of electronics. Unfortunately, a problem with the multipactor was that it wore out at an unsatisfactory rate.Everson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , p. 141. At the Berlin Radio Show in August 1931, Manfred von Ardenne gave a public demonstration of a television system using a CRT for both transmission and reception. However, Ardenne had not developed a camera tube, using the CRT instead as a flying-spot scanner to scan slides and film.Albert Abramson, Zworykin: Pioneer of Television, University of Illinois Press, 1995, p. 111. Philo Farnsworth gave the world's first public demonstration of an all-electronic television system, using a live camera, at the Franklin Institute of Philadelphia on 25 August 1934, and for ten days afterwards.\"New Television System Uses 'Magnetic Lens'\", Popular Mechanics, Dec. 1934, pp. 838\u201339.Burns, R.W. Television: An international history of the formative years. (1998). IEE History of Technology Series, 22. London: IEE, p. 370. . Mexican inventor Guillermo Gonz\u00e1lez Camarena also played an important role in early TV. His experiments with TV (known as telectroescop\u00eda at first) began in 1931 and led to a patent for the \"trichromatic field sequential system\" color television in 1940. In Britain, the EMI engineering team led by Isaac Shoenberg applied in 1932 for a patent for a new device they dubbed \"the Emitron\", which formed the heart of the cameras they designed for the BBC. On 2 November 1936, a 405-line broadcasting service employing the Emitron began at studios in Alexandra Palace, and transmitted from a specially built mast atop one of the Victorian building's towers. It alternated for a short time with Baird's mechanical system in adjoining studios, but was more reliable and visibly superior. This was the world's first regular \"high-definition\" television service.Burns, R.W., Television: An international history of the formative years. (1998). IEE History of Technology Series, 22. London: IEE, p. 576. . The original American iconoscope was noisy, had a high ratio of interference to signal, and ultimately gave disappointing results, especially when compared to the high definition mechanical scanning systems then becoming available. The EMI team, under the supervision of Isaac Shoenberg, analyzed how the iconoscope (or Emitron) produces an electronic signal and concluded that its real efficiency was only about 5\\% of the theoretical maximum. They solved this problem by developing, and patenting in 1934, two new camera tubes dubbed super-Emitron and CPS Emitron. The super-Emitron was between ten and fifteen times more sensitive than the original Emitron and iconoscope tubes and, in some cases, this ratio was considerably greater. It was used for outside broadcasting by the BBC, for the first time, on Armistice Day 1937, when the general public could watch on a television set as the King laid a wreath at the Cenotaph. This was the first time that anyone had broadcast a live street scene from cameras installed on the roof of neighboring buildings, because neither Farnsworth nor RCA would do the same until the 1939 New York World's Fair. Ad for the beginning of experimental television broadcasting in New York City by RCA in 1939 Indian-head test pattern used during the black & white era before 1970. It was displayed when a TV station first signed on every day. On the other hand, in 1934, Zworykin shared some patent rights with the German licensee company Telefunken. The \"image iconoscope\" (\"Superikonoskop\" in Germany) was produced as a result of the collaboration. This tube is essentially identical to the super-Emitron. The production and commercialization of the super-Emitron and image iconoscope in Europe were not affected by the patent war between Zworykin and Farnsworth, because Dieckmann and Hell had priority in Germany for the invention of the image dissector, having submitted a patent application for their Lichtelektrische Bildzerlegerr\u00f6hre f\u00fcr Fernseher (Photoelectric Image Dissector Tube for Television) in Germany in 1925, two years before Farnsworth did the same in the United States. The image iconoscope (Superikonoskop) became the industrial standard for public broadcasting in Europe from 1936 until 1960, when it was replaced by the vidicon and plumbicon tubes. Indeed, it was the representative of the European tradition in electronic tubes competing against the American tradition represented by the image orthicon. The German company Heimann produced the Superikonoskop for the 1936 Berlin Olympic Games, later Heimann also produced and commercialized it from 1940 to 1955; finally the Dutch company Philips produced and commercialized the image iconoscope and multicon from 1952 to 1958. American television broadcasting, at the time, consisted of a variety of markets in a wide range of sizes, each competing for programming and dominance with separate technology, until deals were made and standards agreed upon in 1941.Everson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , p. 248. RCA, for example, used only Iconoscopes in the New York area, but Farnsworth Image Dissectors in Philadelphia and San Francisco.Abramson, Albert (1987), The History of Television, 1880 to 1941. Jefferson, NC: Albert Abramson. p. 254. . In September 1939, RCA agreed to pay the Farnsworth Television and Radio Corporation royalties over the next ten years for access to Farnsworth's patents.Schatzkin, Paul (2002), The Boy Who Invented Television. Silver Spring, Maryland: Teamcom Books, pp. 187\u201388. . With this historic agreement in place, RCA integrated much of what was best about the Farnsworth Technology into their systems. In 1941, the United States implemented 525-line television.\"Go-Ahead Signal Due for Television\", The New York Times, 25 April 1941, p. 7.\"An Auspicious Beginning\", The New York Times, 3 August 1941, p. X10. Electrical engineer Benjamin Adler played a prominent role in the development of television. The world's first 625-line television standard was designed in the Soviet Union in 1944 and became a national standard in 1946.\"On the beginning of broadcast in 625 lines 60 years ago\", 625 magazine (in Russian). The first broadcast in 625-line standard occurred in Moscow in 1948.\"M.I. Krivocheev \u2013 an engineer's engineer\", EBU Technical Review, Spring 1993. The concept of 625 lines per frame was subsequently implemented in the European CCIR standard.\"In the Vanguard of Television Broadcasting\". In 1936, K\u00e1lm\u00e1n Tihanyi described the principle of plasma display, the first flat panel display system. Early electronic television sets were large and bulky, with analog circuits made of vacuum tubes. Following the invention of the first working transistor at Bell Labs, Sony founder Masaru Ibuka predicted in 1952 that the transition to electronic circuits made of transistors would lead to smaller and more portable television sets. The first fully transistorized, portable solid-state television set was the 8-inch Sony TV8-301, developed in 1959 and released in 1960. This began the transformation of television viewership from a communal viewing experience to a solitary viewing experience. By 1960, Sony had sold over 4million portable television sets worldwide. Color Samsung LED TV The basic idea of using three monochrome images to produce a color image had been experimented with almost as soon as black-and-white televisions had first been built. Although he gave no practical details, among the earliest published proposals for television was one by Maurice Le Blanc, in 1880, for a color system, including the first mentions in television literature of line and frame scanning.M. Le Blanc, \"Etude sur la transmission \u00e9lectrique des impressions lumineuses\", La Lumi\u00e8re Electrique, vol. 11, 1 December 1880, pp. 477\u201381. Polish inventor Jan Szczepanik patented a color television system in 1897, using a selenium photoelectric cell at the transmitter and an electromagnet controlling an oscillating mirror and a moving prism at the receiver. But his system contained no means of analyzing the spectrum of colors at the transmitting end, and could not have worked as he described it.R.W. Burns, Television: An International History of the Formative Years, IET, 1998, p. 98. . Another inventor, Hovannes Adamian, also experimented with color television as early as 1907. The first color television project is claimed by him,Western technology and Soviet economic development: 1945 to 1965, by Antony C. Sutton, Business & Economics \u2013 1973, p. 330 and was patented in Germany on 31 March 1908, patent No. 197183, then in Britain, on 1 April 1908, patent No. 7219,The History of Television, 1880\u20131941, by Albert Abramson, 1987, p. 27 in France (patent No. 390326) and in Russia in 1910 (patent No. 17912).A. Rokhlin, Tak rozhdalos' dal'novidenie (in Russian) Scottish inventor John Logie Baird demonstrated the world's first color transmission on 3 July 1928, using scanning discs at the transmitting and receiving ends with three spirals of apertures, each spiral with filters of a different primary color; and three light sources at the receiving end, with a commutator to alternate their illumination.John Logie Baird, Television Apparatus and the Like, U.S. patent, filed in U.K. in 1928. Baird also made the world's first color broadcast on 4 February 1938, sending a mechanically scanned 120-line image from Baird's Crystal Palace studios to a projection screen at London's Dominion Theatre.Baird Television: Crystal Palace Television Studios. Previous color television demonstrations in the U.K. and U.S. had been via closed circuit. Mechanically scanned color television was also demonstrated by Bell Laboratories in June 1929 using three complete systems of photoelectric cells, amplifiers, glow-tubes, and color filters, with a series of mirrors to superimpose the red, green, and blue images into one full color image. The first practical hybrid system was again pioneered by John Logie Baird. In 1940 he publicly demonstrated a color television combining a traditional black-and-white display with a rotating colored disk. This device was very \"deep\", but was later improved with a mirror folding the light path into an entirely practical device resembling a large conventional console. However, Baird was not happy with the design, and, as early as 1944, had commented to a British government committee that a fully electronic device would be better. In 1939, Hungarian engineer Peter Carl Goldmark introduced an electro-mechanical system while at CBS, which contained an Iconoscope sensor. The CBS field-sequential color system was partly mechanical, with a disc made of red, blue, and green filters spinning inside the television camera at 1,200 rpm, and a similar disc spinning in synchronization in front of the cathode ray tube inside the receiver set.Peter C. Goldmark, assignor to Columbia Broadcasting System, \"Color Television\", U.S. Patent 2,480,571, filed 7 September 1940. The system was first demonstrated to the Federal Communications Commission (FCC) on 29 August 1940, and shown to the press on 4 September.Current Broadcasting 1940\"Color Television Success in Test\", The New York Times, 30 August 1940, p. 21.\"Color Television Achieves Realism\", The New York Times, 5 September 1940, p. 18.\"New Television System Transmits Images in Full Color\", Popular Science, December 1940, p. 120. CBS began experimental color field tests using film as early as 28 August 1940, and live cameras by 12 November.\"CBS Demonstrates Full Color Television,\" The Wall Street Journal, 5 September 1940, p. 1. \"Television Hearing Set,\" The New York Times, 13 November 1940, p. 26. NBC (owned by RCA) made its first field test of color television on 20 February 1941. CBS began daily color field tests on 1 June 1941.Ed Reitan, RCA-NBC Color Firsts in Television (commented). These color systems were not compatible with existing black-and-white television sets, and, as no color television sets were available to the public at this time, viewing of the color field tests was restricted to RCA and CBS engineers and the invited press. The War Production Board halted the manufacture of television and radio equipment for civilian use from 22 April 1942 to 20 August 1945, limiting any opportunity to introduce color television to the general public.\"Making of Radios and Phonographs to End April 22,\" The New York Times, 8 March 1942, p. 1. \"Radio Production Curbs Cover All Combinations,\" The Wall Street Journal, 3 June 1942, p. 4. \"WPB Cancels 210 Controls; Radios, Trucks in Full Output,\" New York Times, 21 August 1945, p. 1.Bob Cooper, \"Television: The Technology That Changed Our Lives\", Early Television Foundation. As early as 1940, Baird had started work on a fully electronic system he called Telechrome. Early Telechrome devices used two electron guns aimed at either side of a phosphor plate. The phosphor was patterned so the electrons from the guns only fell on one side of the patterning or the other. Using cyan and magenta phosphors, a reasonable limited-color image could be obtained. He also demonstrated the same system using monochrome signals to produce a 3D image (called \"stereoscopic\" at the time). A demonstration on 16 August 1944 was the first example of a practical color television system. Work on the Telechrome continued and plans were made to introduce a three-gun version for full color. However, Baird's untimely death in 1946 ended development of the Telechrome system.Albert Abramson, The History of Television, 1942 to 2000, McFarland & Company, 2003, pp. 13\u201314. Baird Television: The World's First High Definition Colour Television System. Similar concepts were common through the 1940s and 1950s, differing primarily in the way they re-combined the colors generated by the three guns. The Geer tube was similar to Baird's concept, but used small pyramids with the phosphors deposited on their outside faces, instead of Baird's 3D patterning on a flat surface. The Penetron used three layers of phosphor on top of each other and increased the power of the beam to reach the upper layers when drawing those colors. The Chromatron used a set of focusing wires to select the colored phosphors arranged in vertical stripes on the tube. One of the great technical challenges of introducing color broadcast television was the desire to conserve bandwidth, potentially three times that of the existing black-and-white standards, and not use an excessive amount of radio spectrum. In the United States, after considerable research, the National Television Systems CommitteeNational Television System Committee (1951\u20131953), [Report and Reports of Panel No. 11, 11-A, 12\u201319, with Some supplementary references cited in the Reports, and the Petition for adoption of transmission standards for color television before the Federal Communications Commission, n.p., 1953], 17 v. illus., diagrams., tables. 28 cm. LC Control No.:54021386 Library of Congress Online Catalog approved an all-electronic system developed by RCA, which encoded the color information separately from the brightness information and greatly reduced the resolution of the color information in order to conserve bandwidth. As black-and-white TVs could receive the same transmission and display it in black-and-white, the color system adopted is [backwards] \"compatible\". (\"Compatible Color\", featured in RCA advertisements of the period, is mentioned in the song \"America\", of West Side Story, 1957.) The brightness image remained compatible with existing black-and-white television sets at slightly reduced resolution, while color televisions could decode the extra information in the signal and produce a limited-resolution color display. The higher resolution black-and-white and lower resolution color images combine in the brain to produce a seemingly high-resolution color image. The NTSC standard represented a major technical achievement. Color bars used in a test pattern, sometimes used when no program material is available. The first color broadcast (the first episode of the live program The Marriage) occurred on 8 July 1954, but during the following ten years most network broadcasts, and nearly all local programming, continued to be in black-and-white. It was not until the mid-1960s that color sets started selling in large numbers, due in part to the color transition of 1965 in which it was announced that over half of all network prime-time programming would be broadcast in color that fall. The first all-color prime-time season came just one year later. In 1972, the last holdout among daytime network programs converted to color, resulting in the first completely all-color network season. Early color sets were either floor-standing console models or tabletop versions nearly as bulky and heavy, so in practice they remained firmly anchored in one place. GE's relatively compact and lightweight Porta-Color set was introduced in the spring of 1966. It used a transistor-based UHF tuner. The first fully transistorized color television in the United States was the Quasar television introduced in 1967. These developments made watching color television a more flexible and convenient proposition. The MOSFET (metal-oxide-semiconductor field-effect transistor, or MOS transistor) was invented by Mohamed M. Atalla and Dawon Kahng at Bell Labs in 1959, and presented in 1960. By the mid-1960s, RCA were using MOSFETs in their consumer television products. RCA Laboratories researchers W.M. Austin, J.A. Dean, D.M. Griswold and O.P. Hart in 1966 described the use of the MOSFET in television circuits, including RF amplifier, low-level video, chroma and AGC circuits. The power MOSFET was later widely adopted for television receiver circuits. In 1972, sales of color sets finally surpassed sales of black-and-white sets. Color broadcasting in Europe was not standardized on the PAL format until the 1960s, and broadcasts did not start until 1967. By this point many of the technical problems in the early sets had been worked out, and the spread of color sets in Europe was fairly rapid. By the mid-1970s, the only stations broadcasting in black-and-white were a few high-numbered UHF stations in small markets, and a handful of low-power repeater stations in even smaller markets such as vacation spots. By 1979, even the last of these had converted to color and, by the early 1980s, B&W sets had been pushed into niche markets, notably low-power uses, small portable sets, or for use as video monitor screens in lower-cost consumer equipment. By the late 1980s even these areas switched to color sets. Digital Digital television (DTV) is the transmission of audio and video by digitally processed and multiplexed signals, in contrast to the totally analog and channel separated signals used by analog television. Due to data compression, digital TV can support more than one program in the same channel bandwidth. It is an innovative service that represents the most significant evolution in television broadcast technology since color television emerged in the 1950s. Digital TV's roots have been tied very closely to the availability of inexpensive, high performance computers. It was not until the 1990s that digital TV became feasible. Digital television was previously not practically feasible due to the impractically high bandwidth requirements of uncompressed digital video, requiring around 200Mbit/s for a standard-definition television (SDTV) signal, and over 1Gbit/s for high-definition television (HDTV). Digital TV became practically feasible in the early 1990s due to a major technological development, discrete cosine transform (DCT) video compression. DCT coding is a lossy compression technique that was first proposed for image compression by Nasir Ahmed in 1972, and was later adapted into a motion-compensated DCT video coding algorithm, for video coding standards such as the H.26x formats from 1988 onwards and the MPEG formats from 1991 onwards. Motion-compensated DCT video compression significantly reduced the amount of bandwidth required for a digital TV signal. DCT coding compressed down the bandwidth requirements of digital television signals to about 34 Mbit/s for SDTV and around 70140 Mbit/s for HDTV while maintaining near-studio-quality transmission, making digital television a practical reality in the 1990s. A digital TV service was proposed in 1986 by Nippon Telegraph and Telephone (NTT) and the Ministry of Posts and Telecommunication (MPT) in Japan, where there were plans to develop an \"Integrated Network System\" service. However, it was not possible to practically implement such a digital TV service until the adoption of DCT video compression technology made it possible in the early 1990s. In the mid-1980s, as Japanese consumer electronics firms forged ahead with the development of HDTV technology, the MUSE analog format proposed by NHK, a Japanese company, was seen as a pacesetter that threatened to eclipse U.S. electronics companies' technologies. Until June 1990, the Japanese MUSE standard, based on an analog system, was the front-runner among the more than 23 different technical concepts under consideration. Then, an American company, General Instrument, demonstrated the feasibility of a digital television signal. This breakthrough was of such significance that the FCC was persuaded to delay its decision on an ATV standard until a digitally based standard could be developed. In March 1990, when it became clear that a digital standard was feasible, the FCC made a number of critical decisions. First, the Commission declared that the new ATV standard must be more than an enhanced analog signal, but be able to provide a genuine HDTV signal with at least twice the resolution of existing television images.(7) Then, to ensure that viewers who did not wish to buy a new digital television set could continue to receive conventional television broadcasts, it dictated that the new ATV standard must be capable of being \"simulcast\" on different channels.(8)The new ATV standard also allowed the new DTV signal to be based on entirely new design principles. Although incompatible with the existing NTSC standard, the new DTV standard would be able to incorporate many improvements. The final standards adopted by the FCC did not require a single standard for scanning formats, aspect ratios, or lines of resolution. This compromise resulted from a dispute between the consumer electronics industry (joined by some broadcasters) and the computer industry (joined by the film industry and some public interest groups) over which of the two scanning processes\u2014interlaced or progressive\u2014would be best suited for the newer digital HDTV compatible display devices. Interlaced scanning, which had been specifically designed for older analogue CRT display technologies, scans even-numbered lines first, then odd-numbered ones. In fact, interlaced scanning can be looked at as the first video compression model as it was partly designed in the 1940s to double the image resolution to exceed the limitations of the television broadcast bandwidth. Another reason for its adoption was to limit the flickering on early CRT screens whose phosphor coated screens could only retain the image from the electron scanning gun for a relatively short duration. However interlaced scanning does not work as efficiently on newer display devices such as Liquid-crystal (LCD), for example, which are better suited to a more frequent progressive refresh rate. Progressive scanning, the format that the computer industry had long adopted for computer display monitors, scans every line in sequence, from top to bottom. Progressive scanning in effect doubles the amount of data generated for every full screen displayed in comparison to interlaced scanning by painting the screen in one pass in 1/60-second, instead of two passes in 1/30-second. The computer industry argued that progressive scanning is superior because it does not \"flicker\" on the new standard of display devices in the manner of interlaced scanning. It also argued that progressive scanning enables easier connections with the Internet, and is more cheaply converted to interlaced formats than vice versa. The film industry also supported progressive scanning because it offered a more efficient means of converting filmed programming into digital formats. For their part, the consumer electronics industry and broadcasters argued that interlaced scanning was the only technology that could transmit the highest quality pictures then (and currently) feasible, i.e., 1,080 lines per picture and 1,920 pixels per line. Broadcasters also favored interlaced scanning because their vast archive of interlaced programming is not readily compatible with a progressive format. William F. Schreiber, who was director of the Advanced Television Research Program at the Massachusetts Institute of Technology from 1983 until his retirement in 1990, thought that the continued advocacy of interlaced equipment originated from consumer electronics companies that were trying to get back the substantial investments they made in the interlaced technology. Digital television transition started in late 2000s. All governments across the world set the deadline for analog shutdown by 2010s. Initially the adoption rate was low, as the first digital tuner-equipped TVs were costly. But soon, as the price of digital-capable TVs dropped, more and more households were converting to digital televisions. The transition is expected to be completed worldwide by mid to late 2010s. Smart TV upright=0.9|A smart TV The advent of digital television allowed innovations like smart TVs. A smart television, sometimes referred to as connected TV or hybrid TV, is a television set or set-top box with integrated Internet and Web 2.0 features, and is an example of technological convergence between computers, television sets and set-top boxes. Besides the traditional functions of television sets and set-top boxes provided through traditional Broadcasting media, these devices can also provide Internet TV, online interactive media, over-the-top content, as well as on-demand streaming media, and home networking access. These TVs come pre-loaded with an operating system. Smart TV should not to be confused with Internet TV, Internet Protocol television (IPTV) or with Web TV. Internet television refers to the receiving of television content over the Internet instead of by traditional systems\u2014terrestrial, cable and satellite (although internet itself is received by these methods). IPTV is one of the emerging Internet television technology standards for use by television broadcasters. Web television (WebTV) is a term used for programs created by a wide variety of companies and individuals for broadcast on Internet TV. A first patent was filed in 1994 (and extended the following year) for an \"intelligent\" television system, linked with data processing systems, by means of a digital or analog network. Apart from being linked to data networks, one key point is its ability to automatically download necessary software routines, according to a user's demand, and process their needs. Major TV manufacturers have announced production of smart TVs only, for middle-end and high-end TVs in 2015. Smart TVs have gotten more affordable compared to when they were first introduced, with 46 million of U.S. households having at least one as of 2019.Kats, Rimma (15 November 2018). \"How Many Households Own a Smart TV?\" eMarketer. Retrieved 21 May 2021. 3D 3D television conveys depth perception to the viewer by employing techniques such as stereoscopic display, multi-view display, 2D-plus-depth, or any other form of 3D display. Most modern 3D television sets use an active shutter 3D system or a polarized 3D system, and some are autostereoscopic without the need of glasses. Stereoscopic 3D television was demonstrated for the first time on 10 August 1928, by John Logie Baird in his company's premises at 133 Long Acre, London. Baird pioneered a variety of 3D television systems using electromechanical and cathode-ray tube techniques. The first 3D TV was produced in 1935. The advent of digital television in the 2000s greatly improved 3D TVs. Although 3D TV sets are quite popular for watching 3D home media such as on Blu-ray discs, 3D programming has largely failed to make inroads with the public. Many 3D television channels which started in the early 2010s were shut down by the mid-2010s. According to DisplaySearch 3D televisions shipments totaled 41.45 million units in 2012, compared with 24.14 in 2011 and 2.26 in 2010. As of late 2013, the number of 3D TV viewers started to decline. Broadcast systems Terrestrial television upright=1.35|A modern high gain UHF Yagi television antenna. It has 17 directors, and one reflector (made of 4 rods) shaped as a corner reflector. Programming is broadcast by television stations, sometimes called \"channels\", as stations are licensed by their governments to broadcast only over assigned channels in the television band. At first, terrestrial broadcasting was the only way television could be widely distributed, and because bandwidth was limited, i.e., there were only a small number of channels available, government regulation was the norm. In the U.S., the Federal Communications Commission (FCC) allowed stations to broadcast advertisements beginning in July 1941, but required public service programming commitments as a requirement for a license. By contrast, the United Kingdom chose a different route, imposing a television license fee on owners of television reception equipment to fund the British Broadcasting Corporation (BBC), which had public service as part of its Royal Charter. WRGB claims to be the world's oldest television station, tracing its roots to an experimental station founded on 13 January 1928, broadcasting from the General Electric factory in Schenectady, NY, under the call letters W2XB.\"The First Television Show\" Popular Mechanics, August 1930, pp. 177\u201379 It was popularly known as \"WGY Television\" after its sister radio station. Later in 1928, General Electric started a second facility, this one in New York City, which had the call letters W2XBS and which today is known as WNBC. The two stations were experimental in nature and had no regular programming, as receivers were operated by engineers within the company. The image of a Felix the Cat doll rotating on a turntable was broadcast for 2 hours every day for several years as new technology was being tested by the engineers. On 2 November 1936, the BBC began transmitting the world's first public regular high-definition service from the Victorian Alexandra Palace in north London. It therefore claims to be the birthplace of TV broadcasting as we know it today. With the widespread adoption of cable across the United States in the 1970s and 80s, terrestrial television broadcasts have been in decline; in 2013 it was estimated that about 7\\% of US households used an antenna.\"CEA Study Says Seven Percent of TV Households Use Antennas\", '\"TVTechnology, 30 July 2013 \"Nielsen: Broadcast Reliance Grew in 2012\", TVTechnology, 14 January 2013 A slight increase in use began around 2010 due to switchover to digital terrestrial television broadcasts, which offered pristine image quality over very large areas, and offered an alternate to cable television (CATV) for cord cutters. All other countries around the world are also in the process of either shutting down analog terrestrial television or switching over to digital terrestrial television. Cable television Coaxial cable is used to carry cable television signals into cathode ray tube and flat panel television sets. Cable television is a system of broadcasting television programming to paying subscribers via radio frequency (RF) signals transmitted through coaxial cables or light pulses through fiber-optic cables. This contrasts with traditional terrestrial television, in which the television signal is transmitted over the air by radio waves and received by a television antenna attached to the television. In the 2000s, FM radio programming, high-speed Internet, telephone service, and similar non-television services may also be provided through these cables. The abbreviation CATV is sometimes used for cable television in the US. It originally stood for Community Access Television or Community Antenna Television, from cable television's origins in 1948: in areas where over-the-air reception was limited by distance from transmitters or mountainous terrain, large \"community antennas\" were constructed, and cable was run from them to individual homes. Satellite television upright=1.15|DBS satellite dishes installed on an apartment complex. Satellite television is a system of supplying television programming using broadcast signals relayed from communication satellites. The signals are received via an outdoor parabolic reflector antenna usually referred to as a satellite dish and a low-noise block downconverter (LNB). A satellite receiver then decodes the desired television program for viewing on a television set. Receivers can be external set-top boxes, or a built-in television tuner. Satellite television provides a wide range of channels and services, especially to geographic areas without terrestrial television or cable television. The most common method of reception is direct-broadcast satellite television (DBSTV), also known as \"direct to home\" (DTH). In DBSTV systems, signals are relayed from a direct broadcast satellite on the Ku wavelength and are completely digital. Satellite TV systems formerly used systems known as television receive-only. These systems received analog signals transmitted in the C-band spectrum from FSS type satellites, and required the use of large dishes. Consequently, these systems were nicknamed \"big dish\" systems, and were more expensive and less popular. The direct-broadcast satellite television signals were earlier analog signals and later digital signals, both of which require a compatible receiver. Digital signals may include high-definition television (HDTV). Some transmissions and channels are free-to-air or free-to-view, while many other channels are pay television requiring a subscription. In 1945, British science fiction writer Arthur C. Clarke proposed a worldwide communications system which would function by means of three satellites equally spaced apart in earth orbit. This was published in the October 1945 issue of the Wireless World magazine and won him the Franklin Institute's Stuart Ballantine Medal in 1963. The first satellite television signals from Europe to North America were relayed via the Telstar satellite over the Atlantic ocean on 23 July 1962. The signals were received and broadcast in North American and European countries and watched by over 100 million. Launched in 1962, the Relay 1 satellite was the first satellite to transmit television signals from the US to Japan. The first geosynchronous communication satellite, Syncom 2, was launched on 26 July 1963. The world's first commercial communications satellite, called Intelsat I and nicknamed \"Early Bird\", was launched into geosynchronous orbit on 6 April 1965. The first national network of television satellites, called Orbita, was created by the Soviet Union in October 1967, and was based on the principle of using the highly elliptical Molniya satellite for rebroadcasting and delivering of television signals to ground downlink stations. The first commercial North American satellite to carry television transmissions was Canada's geostationary Anik 1, which was launched on 9 November 1972. ATS-6, the world's first experimental educational and Direct Broadcast Satellite (DBS), was launched on 30 May 1974. It transmitted at 860 MHz using wideband FM modulation and had two sound channels. The transmissions were focused on the Indian subcontinent but experimenters were able to receive the signal in Western Europe using home constructed equipment that drew on UHF television design techniques already in use.Long Distance Television Reception (TV-DX) For the Enthusiast, Roger W. Bunney, The first in a series of Soviet geostationary satellites to carry Direct-To-Home television, Ekran 1, was launched on 26 October 1976. It used a 714 MHz UHF downlink frequency so that the transmissions could be received with existing UHF television technology rather than microwave technology. Internet television Internet television (Internet TV) (or online television) is the digital distribution of television content via the Internet as opposed to traditional systems like terrestrial, cable, and satellite, although the Internet itself is received by terrestrial, cable, or satellite methods. Internet television is a general term that covers the delivery of television shows, and other video content, over the Internet by video streaming technology, typically by major traditional television broadcasters. Internet television should not be confused with Smart TV, IPTV or with Web TV. Smart television refers to the TV set which has a built-in operating system. Internet Protocol television (IPTV) is one of the emerging Internet television technology standards for use by television broadcasters. Web television is a term used for programs created by a wide variety of companies and individuals for broadcast on Internet TV. Sets RCA 630-TS, the first mass-produced television set, which sold in 1946\u20131947 A television set, also called a television receiver, television, TV set, TV, or \"telly\", is a device that combines a tuner, display, an amplifier, and speakers for the purpose of viewing television and hearing its audio components. Introduced in the late 1920s in mechanical form, television sets became a popular consumer product after World War II in electronic form, using cathode ray tubes. The addition of color to broadcast television after 1953 further increased the popularity of television sets and an outdoor antenna became a common feature of suburban homes. The ubiquitous television set became the display device for recorded media in the 1970s, such as Betamax and VHS, which enabled viewers to record TV shows and watch prerecorded movies. In the subsequent decades, TVs were used to watch DVDs and Blu-ray Discs of movies and other content. Major TV manufacturers announced the discontinuation of CRT, DLP, plasma and fluorescent-backlit LCDs by the mid-2010s. Televisions since 2010s mostly use LEDs. LEDs are expected to be gradually replaced by OLEDs in the near future. Display technologies Disk The earliest systems employed a spinning disk to create and reproduce images. These usually had a low resolution and screen size and never became popular with the public. CRT upright=0.9|A 14-inch cathode ray tube showing its deflection coils and electron guns The cathode ray tube (CRT) is a vacuum tube containing one or more electron guns (a source of electrons or electron emitter) and a fluorescent screen used to view images. It has a means to accelerate and deflect the electron beam(s) onto the screen to create the images. The images may represent electrical waveforms (oscilloscope), pictures (television, computer monitor), radar targets or others. The CRT uses an evacuated glass envelope which is large, deep (i.e. long from front screen face to rear end), fairly heavy, and relatively fragile. As a matter of safety, the face is typically made of thick lead glass so as to be highly shatter-resistant and to block most X-ray emissions, particularly if the CRT is used in a consumer product. In television sets and computer monitors, the entire front area of the tube is scanned repetitively and systematically in a fixed pattern called a raster. An image is produced by controlling the intensity of each of the three electron beams, one for each additive primary color (red, green, and blue) with a video signal as a reference. In all modern CRT monitors and televisions, the beams are bent by magnetic deflection, a varying magnetic field generated by coils and driven by electronic circuits around the neck of the tube, although electrostatic deflection is commonly used in oscilloscopes, a type of diagnostic instrument. DLP upright=0.9|The Christie Mirage 5000, a 2001 DLP projector. Digital Light Processing (DLP) is a type of video projector technology that uses a digital micromirror device. Some DLPs have a TV tuner, which makes them a type of TV display. It was originally developed in 1987 by Dr. Larry Hornbeck of Texas Instruments. While the DLP imaging device was invented by Texas Instruments, the first DLP based projector was introduced by Digital Projection Ltd in 1997. Digital Projection and Texas Instruments were both awarded Emmy Awards in 1998 for invention of the DLP projector technology. DLP is used in a variety of display applications from traditional static displays to interactive displays and also non-traditional embedded applications including medical, security, and industrial uses. DLP technology is used in DLP front projectors (standalone projection units for classrooms and business primarily), but also in private homes; in these cases, the image is projected onto a projection screen. DLP is also used in DLP rear projection television sets and digital signs. It is also used in about 85\\% of digital cinema projection. Plasma A plasma display panel (PDP) is a type of flat panel display common to large TV displays or larger. They are called \"plasma\" displays because the technology utilizes small cells containing electrically charged ionized gases, or what are in essence chambers more commonly known as fluorescent lamps. LCD upright=0.9|A generic LCD TV, with speakers on either side of the screen. Liquid-crystal-display televisions (LCD TV) are television sets that use LCD display technology to produce images. LCD televisions are much thinner and lighter than cathode ray tube (CRTs) of similar display size, and are available in much larger sizes (e.g., 90-inch diagonal). When manufacturing costs fell, this combination of features made LCDs practical for television receivers. LCDs come in two types: those using cold cathode fluorescent lamps, simply called LCDs and those using LED as backlight called as LEDs. In 2007, LCD televisions surpassed sales of CRT-based televisions worldwide for the first time, and their sales figures relative to other technologies accelerated. LCD TVs have quickly displaced the only major competitors in the large-screen market, the Plasma display panel and rear-projection television. In mid 2010s LCDs especially LEDs became, by far, the most widely produced and sold television display type. LCDs also have disadvantages. Other technologies address these weaknesses, including OLEDs, FED and SED, but none of these have entered widespread production. OLED OLED TV An OLED (organic light-emitting diode) is a light-emitting diode (LED) in which the emissive electroluminescent layer is a film of organic compound which emits light in response to an electric current. This layer of organic semiconductor is situated between two electrodes. Generally, at least one of these electrodes is transparent. OLEDs are used to create digital displays in devices such as television screens. It is also used for computer monitors, portable systems such as mobile phones, handheld game consoles and PDAs. There are two main families of OLED: those based on small molecules and those employing polymers. Adding mobile ions to an OLED creates a light-emitting electrochemical cell or LEC, which has a slightly different mode of operation. OLED displays can use either passive-matrix (PMOLED) or active-matrix (AMOLED) addressing schemes. Active-matrix OLEDs require a thin-film transistor backplane to switch each individual pixel on or off, but allow for higher resolution and larger display sizes. An OLED display works without a backlight. Thus, it can display deep black levels and can be thinner and lighter than a liquid crystal display (LCD). In low ambient light conditions such as a dark room an OLED screen can achieve a higher contrast ratio than an LCD, whether the LCD uses cold cathode fluorescent lamps or LED backlight. OLEDs are expected to replace other forms of display in near future. Display resolution upright=1.35|Comparison of 8K UHDTV, 4K UHDTV, HDTV and SDTV resolution LD Low-definition television or LDTV refers to television systems that have a lower screen resolution than standard-definition television systems such 240p (320*240). It is used in handheld television. The most common source of LDTV programming is the Internet, where mass distribution of higher-resolution video files could overwhelm computer servers and take too long to download. Many mobile phones and portable devices such as Apple's iPod Nano, or Sony's PlayStation Portable use LDTV video, as higher-resolution files would be excessive to the needs of their small screens (320\u00d7240 and 480\u00d7272 pixels respectively). The current generation of iPod Nanos have LDTV screens, as do the first three generations of iPod Touch and iPhone (480\u00d7320). For the first years of its existence, YouTube offered only one, low-definition resolution of 320x240p at 30fps or less. A standard, consumer grade VHS videotape can be considered SDTV due to its resolution (approximately 360 \u00d7 480i/576i). SD Standard-definition television or SDTV refers to two different resolutions: 576i, with 576 interlaced lines of resolution, derived from the European-developed PAL and SECAM systems; and 480i based on the American National Television System Committee NTSC system. SDTV is a television system that uses a resolution that is not considered to be either high-definition television (720p, 1080i, 1080p, 1440p, 4K UHDTV, and 8K UHD) or enhanced-definition television (EDTV 480p). In North America, digital SDTV is broadcast in the same 4:3 aspect ratio as NTSC signals with widescreen content being center cut. However, in other parts of the world that used the PAL or SECAM color systems, standard-definition television is now usually shown with a 16:9 aspect ratio, with the transition occurring between the mid-1990s and mid-2000s. Older programs with a 4:3 aspect ratio are shown in the US as 4:3 with non-ATSC countries preferring to reduce the horizontal resolution by anamorphically scaling a pillarboxed image. HD High-definition television (HDTV) provides a resolution that is substantially higher than that of standard-definition television. HDTV may be transmitted in various formats: 1080p: 1920\u00d71080p: 2,073,600 pixels (~2.07 megapixels) per frame 1080i: 1920\u00d71080i: 1,036,800 pixels (~1.04 MP) per field or 2,073,600 pixels (~2.07 MP) per frame A non-standard CEA resolution exists in some countries such as 1440\u00d71080i: 777,600 pixels (~0.78 MP) per field or 1,555,200 pixels (~1.56 MP) per frame 720p: 1280\u00d7720p: 921,600 pixels (~0.92 MP) per frame UHD Ultra-high-definition television (also known as Super Hi-Vision, Ultra HD television, UltraHD, UHDTV, or UHD) includes 4K UHD (2160p) and 8K UHD (4320p), which are two digital video formats proposed by NHK Science & Technology Research Laboratories and defined and approved by the International Telecommunication Union (ITU). The Consumer Electronics Association announced on 17 October 2012, that \"Ultra High Definition\", or \"Ultra HD\", would be used for displays that have an aspect ratio of at least 16:9 and at least one digital input capable of carrying and presenting native video at a minimum resolution of 3840\u00d72160 pixels. Market share North American consumers purchase a new television set on average every seven years, and the average household owns 2.8 televisions. , 48 million are sold each year at an average price of $", "after": "$1 million over a ten-year period, in addition to license payments, to use his patents.Stashower, Daniel, The Boy Genius and the Mogul: The Untold Story of Television, Broadway Books, 2002, pp. 243\u201344. .Everson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , 266 pp. In 1933, RCA introduced an improved camera tube that relied on Tihanyi's charge storage principle. Called the \"Iconoscope\" by Zworykin, the new tube had a light sensitivity of about 75,000 lux, and thus was claimed to be much more sensitive than Farnsworth's image dissector. However, Farnsworth had overcome his power issues with his Image Dissector through the invention of a completely unique \"multipactor\" device that he began work on in 1930, and demonstrated in 1931.Abramson, Albert (1987), The History of Television, 1880 to 1941. Jefferson, NC: Albert Abramson. p. 148. .Everson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , pp. 137\u201341. This small tube could amplify a signal reportedly to the 60th power or betterEverson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , p. 139. and showed great promise in all fields of electronics. Unfortunately, a issue with the multipactor was that it wore out at an unsatisfactory rate.Everson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , p. 141. At the Berlin Radio Show in August 1931, Manfred von Ardenne gave a public demonstration of a television system using a CRT for both transmission and reception. However, Ardenne had not developed a camera tube, using the CRT instead as a flying-spot scanner to scan slides and film.Albert Abramson, Zworykin: Pioneer of Television, University of Illinois Press, 1995, p. 111. Philo Farnsworth gave the world's first public demonstration of an all-electronic television system, using a live camera, at the Franklin Institute of Philadelphia on 25 August 1934, and for ten days afterwards.\"New Television System Uses 'Magnetic Lens'\", Popular Mechanics, Dec. 1934, pp. 838\u201339.Burns, R.W. Television: An international history of the formative years. (1998). IEE History of Technology Series, 22. London: IEE, p. 370. . Mexican inventor Guillermo Gonz\u00e1lez Camarena also played an important role in early television. His experiments with television (known as telectroescop\u00eda at first) began in 1931 and led to a patent for the \"trichromatic field sequential system\" color television in 1940. In Britain, the EMI engineering team led by Isaac Shoenberg applied in 1932 for a patent for a new device they called \"the Emitron\", which formed the heart of the cameras they designed for the BBC. On 2 November 1936, a 405-line broadcasting service employing the Emitron began at studios in Alexandra Palace, and transmitted from a specially built mast atop one of the Victorian building's towers. It alternated for a short time with Baird's mechanical system in adjoining studios, but was more reliable and visibly superior. This was the world's first regular \"high-definition\" television service.Burns, R.W., Television: An international history of the formative years. (1998). IEE History of Technology Series, 22. London: IEE, p. 576. . The original U.S. iconoscope was noisy, had a high ratio of interference to signal, and ultimately gave disappointing results, especially when compared to the high definition mechanical scanning systems then becoming available. The EMI team, under the supervision of Isaac Shoenberg, analyzed how the iconoscope (or Emitron) produces an electronic signal and concluded that its real efficiency was only about 5\\% of the theoretical maximum. They solved this problem by developing, and patenting in 1934, two new camera tubes dubbed super-Emitron and CPS Emitron. The super-Emitron was between ten and fifteen times more sensitive than the original Emitron and iconoscope tubes and, in some cases, this ratio was considerably greater. It was used for outside broadcasting by the BBC, for the first time, on Armistice Day 1937, when the general public could watch on a television set as the King laid a wreath at the Cenotaph. This was the first time that anyone had broadcast a live street scene from cameras installed on the roof of neighboring buildings, because neither Farnsworth nor RCA would do the same until the 1939 New York World's Fair. Ad for the beginning of experimental television broadcasting in New York City by RCA in 1939 Indian-head test pattern used during the black-and-white era before 1970. It was displayed when a television station first signed on every day. On the other hand, in 1934, Zworykin shared some patent rights with the German licensee company Telefunken. The \"image iconoscope\" (\"Superikonoskop\" in Germany) was produced as a result of the collaboration. This tube is essentially identical to the super-Emitron. The production and commercialization of the super-Emitron and image iconoscope in Europe were not affected by the patent war between Zworykin and Farnsworth, because Dieckmann and Hell had priority in Germany for the invention of the image dissector, having submitted a patent application for their Lichtelektrische Bildzerlegerr\u00f6hre f\u00fcr Fernseher (Photoelectric Image Dissector Tube for Television) in Germany in 1925, two years before Farnsworth did the same in the United States. The image iconoscope (Superikonoskop) became the industrial standard for public broadcasting in Europe from 1936 until 1960, when it was replaced by the vidicon and plumbicon tubes. Indeed, it was the representative of the European tradition in electronic tubes competing against the American tradition represented by the image orthicon. The German company Heimann produced the Superikonoskop for the 1936 Berlin Olympic Games, later Heimann also produced and commercialized it from 1940 to 1955; finally the Dutch company Philips produced and commercialized the image iconoscope and multicon from 1952 to 1958. U.S. television broadcasting, at the time, consisted of a variety of markets in a wide range of sizes, each competing for programming and dominance with separate technology, until deals were made and standards agreed upon in 1941.Everson, George (1949), The Story of Television, The Life of Philo T. Farnsworth New York: W.W. Norton & Co,. , p. 248. RCA, for example, used only Iconoscopes in the New York area, but Farnsworth Image Dissectors in Philadelphia and San Francisco.Abramson, Albert (1987), The History of Television, 1880 to 1941. Jefferson, NC: Albert Abramson. p. 254. . In September 1939, RCA agreed to pay the Farnsworth Television and Radio Corporation royalties over the next ten years for access to Farnsworth's patents.Schatzkin, Paul (2002), The Boy Who Invented Television. Silver Spring, Maryland: Teamcom Books, pp. 187\u201388. . With this historic agreement in place, RCA integrated much of what was best about the Farnsworth Technology into their systems. In 1941, the United States implemented 525-line television.\"Go-Ahead Signal Due for Television\", The New York Times, 25 April 1941, p. 7.\"An Auspicious Beginning\", The New York Times, 3 August 1941, p. X10. Electrical engineer Benjamin Adler played a prominent role in the development of television. The world's first 625-line television standard was designed in the Soviet Union in 1944 and became a national standard in 1946.\"On the beginning of broadcast in 625 lines 60 years ago\", 625 magazine (in Russian). The first broadcast in 625-line standard occurred in Moscow in 1948.\"M.I. Krivocheev \u2013 an engineer's engineer\", EBU Technical Review, Spring 1993. The concept of 625 lines per frame was subsequently implemented in the European CCIR standard.\"In the Vanguard of Television Broadcasting\". In 1936, K\u00e1lm\u00e1n Tihanyi described the principle of plasma display, the first flat panel display system. Early electronic television sets were large and bulky, with analog circuits made of vacuum tubes. Following the invention of the first working transistor at Bell Labs, Sony founder Masaru Ibuka predicted in 1952 that the transition to electronic circuits made of transistors would lead to smaller and more portable television sets. The first fully transistorized, portable solid-state television set was the 8-inch Sony TV8-301, developed in 1959 and released in 1960. This began the transformation of television viewership from a communal viewing experience to a solitary viewing experience. By 1960, Sony had sold over 4million portable television sets worldwide. Color Samsung LED TV The basic idea of using three monochrome images to produce a color image had been experimented with almost as soon as black-and-white televisions had first been built. Although he gave no practical details, among the earliest published proposals for television was one by Maurice Le Blanc, in 1880, for a color system, including the first mentions in television literature of line and frame scanning.M. Le Blanc, \"Etude sur la transmission \u00e9lectrique des impressions lumineuses\", La Lumi\u00e8re Electrique, vol. 11, 1 December 1880, pp. 477\u201381. Polish inventor Jan Szczepanik patented a color television system in 1897, using a selenium photoelectric cell at the transmitter and an electromagnet controlling an oscillating mirror and a moving prism at the receiver. But his system contained no means of analyzing the spectrum of colors at the transmitting end, and could not have worked as he described it.R.W. Burns, Television: An International History of the Formative Years, IET, 1998, p. 98. . Another inventor, Hovannes Adamian, also experimented with color television as early as 1907. The first color television project is claimed by him,Western technology and Soviet economic development: 1945 to 1965, by Antony C. Sutton, Business & Economics \u2013 1973, p. 330 and was patented in Germany on 31 March 1908, patent No. 197183, then in Britain, on 1 April 1908, patent No. 7219,The History of Television, 1880\u20131941, by Albert Abramson, 1987, p. 27 in France (patent No. 390326) and in Russia in 1910 (patent No. 17912).A. Rokhlin, Tak rozhdalos' dal'novidenie (in Russian) Scottish inventor John Logie Baird demonstrated the world's first color transmission on 3 July 1928, using scanning discs at the transmitting and receiving ends with three spirals of apertures, each spiral with filters of a different primary color; and three light sources at the receiving end, with a commutator to alternate their illumination.John Logie Baird, Television Apparatus and the Like, U.S. patent, filed in U.K. in 1928. Baird also made the world's first color broadcast on 4 February 1938, sending a mechanically scanned 120-line image from Baird's Crystal Palace studios to a projection screen at London's Dominion Theatre.Baird Television: Crystal Palace Television Studios. Previous color television demonstrations in the U.K. and U.S. had been via closed circuit. Mechanically scanned color television was also demonstrated by Bell Laboratories in June 1929 using three complete systems of photoelectric cells, amplifiers, glow-tubes, and color filters, with a series of mirrors to superimpose the red, green, and blue images into one full color image. The first practical hybrid system was again pioneered by John Logie Baird. In 1940 he publicly demonstrated a color television combining a traditional black-and-white display with a rotating colored disk. This device was very \"deep\", but was later improved with a mirror folding the light path into an entirely practical device resembling a large conventional console. However, Baird was unhappy with the design, and, as early as 1944, had commented to a British government committee that a fully electronic device would be better. In 1939, Hungarian engineer Peter Carl Goldmark introduced an electro-mechanical system while at CBS, which contained an Iconoscope sensor. The CBS field-sequential color system was partly mechanical, with a disc made of red, blue, and green filters spinning inside the television camera at 1,200 rpm, and a similar disc spinning in synchronization in front of the cathode ray tube inside the receiver set.Peter C. Goldmark, assignor to Columbia Broadcasting System, \"Color Television\", U.S. Patent 2,480,571, filed 7 September 1940. The system was first demonstrated to the Federal Communications Commission (FCC) on 29 August 1940, and shown to the press on 4 September.Current Broadcasting 1940\"Color Television Success in Test\", The New York Times, 30 August 1940, p. 21.\"Color Television Achieves Realism\", The New York Times, 5 September 1940, p. 18.\"New Television System Transmits Images in Full Color\", Popular Science, December 1940, p. 120. CBS began experimental color field tests using film as early as August 28, 1940, and live cameras by 12 November.\"CBS Demonstrates Full Color Television,\" The Wall Street Journal, 5 September 1940, p. 1. \"Television Hearing Set,\" The New York Times, 13 November 1940, p. 26. NBC (owned by RCA) made its first field test of color television on February 20, 1941. CBS began daily color field tests on June 1, 1941.Ed Reitan, RCA-NBC Color Firsts in Television (commented). These color systems were not compatible with existing black-and-white television sets, and, as no color television sets were available to the public at this time, viewing of the color field tests was restricted to RCA and CBS engineers and the invited press. The War Production Board halted the manufacture of television and radio equipment for civilian use from April 22, 1942 to 20 August 1945, limiting any opportunity to introduce color television to the general public.\"Making of Radios and Phonographs to End April 22,\" The New York Times, 8 March 1942, p. 1. \"Radio Production Curbs Cover All Combinations,\" The Wall Street Journal, 3 June 1942, p. 4. \"WPB Cancels 210 Controls; Radios, Trucks in Full Output,\" New York Times, 21 August 1945, p. 1.Bob Cooper, \"Television: The Technology That Changed Our Lives\", Early Television Foundation. As early as 1940, Baird had started work on a fully electronic system he called Telechrome. Early Telechrome devices used two electron guns aimed at either side of a phosphor plate. The phosphor was patterned so the electrons from the guns only fell on one side of the patterning or the other. Using cyan and magenta phosphors, a reasonable limited-color image could be obtained. He also demonstrated the same system using monochrome signals to produce a 3D image (called \"stereoscopic\" at the time). A demonstration on 16 August 1944 was the first example of a practical color television system. Work on the Telechrome continued and plans were made to introduce a three-gun version for full color. However, Baird's untimely death in 1946 ended development of the Telechrome system.Albert Abramson, The History of Television, 1942 to 2000, McFarland & Company, 2003, pp. 13\u201314. Baird Television: The World's First High Definition Colour Television System. Similar concepts were common through the 1940s and 1950s, differing primarily in the way they re-combined the colors generated by the three guns. The Geer tube was similar to Baird's concept, but used small pyramids with the phosphors deposited on their outside faces, instead of Baird's 3D patterning on a flat surface. The Penetron used three layers of phosphor on top of each other and increased the power of the beam to reach the upper layers when drawing those colors. The Chromatron used a set of focusing wires to select the colored phosphors arranged in vertical stripes on the tube. One of the great technical challenges of introducing color broadcast television was the desire to conserve bandwidth, potentially three times that of the existing black-and-white standards, and not use an excessive amount of radio spectrum. In the United States, after considerable research, the National Television Systems CommitteeNational Television System Committee (1951\u20131953), [Report and Reports of Panel No. 11, 11-A, 12\u201319, with Some supplementary references cited in the Reports, and the Petition for adoption of transmission standards for color television before the Federal Communications Commission, n.p., 1953], 17 v. illus., diagrams., tables. 28 cm. LC Control No.:54021386 Library of Congress Online Catalog approved an all-electronic system developed by RCA, which encoded the color information separately from the brightness information and greatly reduced the resolution of the color information in order to conserve bandwidth. As black-and-white televisions could receive the same transmission and display it in black-and-white, the color system adopted is [backwards] \"compatible\". (\"Compatible Color\", featured in RCA advertisements of the period, is mentioned in the song \"America\", of West Side Story, 1957.) The brightness image remained compatible with existing black-and-white television sets at slightly reduced resolution, while color televisions could decode the extra information in the signal and produce a limited-resolution color display. The higher resolution black-and-white and lower resolution color images combine in the brain to produce a seemingly high-resolution color image. The NTSC standard represented a major technical achievement. Color bars used in a test pattern, sometimes used when no program material is available. The first color broadcast (the first episode of the live program The Marriage) occurred on 8 July 1954, but during the following ten years most network broadcasts, and nearly all local programming, continued to be in black-and-white. It was not until the mid-1960s that color sets started selling in large numbers, due in part to the color transition of 1965 in which it was announced that over half of all network prime-time programming would be broadcast in color that fall. The first all-color prime-time season came just one year later. In 1972, the last holdout among daytime network programs converted to color, resulting in the first completely all-color network season. Early color sets were either floor-standing console models or tabletop versions nearly as bulky and heavy, so in practice they remained firmly anchored in one place. GE's relatively compact and lightweight Porta-Color set was introduced in the spring of 1966. It used a transistor-based UHF tuner. The first fully transistorized color television in the United States was the Quasar television introduced in 1967. These developments made watching color television a more flexible and convenient proposition. The MOSFET (metal-oxide-semiconductor field-effect transistor, or MOS transistor) was invented by Mohamed M. Atalla and Dawon Kahng at Bell Labs in 1959, and presented in 1960. By the mid-1960s, RCA were using MOSFETs in their consumer television products. RCA Laboratories researchers W.M. Austin, J.A. Dean, D.M. Griswold and O.P. Hart in 1966 described the use of the MOSFET in television circuits, including RF amplifier, low-level video, chroma and AGC circuits. The power MOSFET was later widely adopted for television receiver circuits. In 1972, sales of color sets finally surpassed sales of black-and-white sets. Color broadcasting in Europe was not standardized on the PAL format until the 1960s, and broadcasts did not start until 1967. By this point many of the technical issues in the early sets had been worked out, and the spread of color sets in Europe was fairly rapid. By the mid-1970s, the only stations broadcasting in black-and-white were a few high-numbered UHF stations in small markets, and a handful of low-power repeater stations in even smaller markets such as vacation spots. By 1979, even the last of these had converted to color and, by the early 1980s, B&W sets had been pushed into niche markets, notably low-power uses, small portable sets, or for use as video monitor screens in lower-cost consumer equipment. By the late 1980s even these areas switched to color sets. Digital Digital television (DTV) is the transmission of audio and video by digitally processed and multiplexed signals, in contrast to the totally analog and channel separated signals used by analog television. Due to data compression, digital television can support more than one program in the same channel bandwidth. It is an innovative service that represents the most significant evolution in television broadcast technology since color television emerged in the 1950s. Digital television's roots have been tied very closely to the availability of inexpensive, high performance computers. It was not until the 1990s that digital television became possible. Digital television was previously not practically possible due to the impractically high bandwidth requirements of uncompressed digital video, requiring around 200Mbit/s for a standard-definition television (SDTV) signal, and over 1Gbit/s for high-definition television (HDTV). Digital television became practically possible in the early 1990s due to a major technological development, discrete cosine transform (DCT) video compression. DCT coding is a lossy compression technique that was first proposed for image compression by Nasir Ahmed in 1972, and was later adapted into a motion-compensated DCT video coding algorithm, for video coding standards such as the H.26x formats from 1988 onwards and the MPEG formats from 1991 onwards. Motion-compensated DCT video compression significantly reduced the amount of bandwidth required for a digital television signal. DCT coding compressed down the bandwidth requirements of digital television signals to about 34 Mbit/s for SDTV and around 70140 Mbit/s for HDTV while maintaining near-studio-quality transmission, making digital television a practical reality in the 1990s. A digital television service was proposed in 1986 by Nippon Telegraph and Telephone (NTT) and the Ministry of Posts and Telecommunication (MPT) in Japan, where there were plans to develop an \"Integrated Network System\" service. However, it was not possible to practically implement such a digital television service until the adoption of DCT video compression technology made it possible in the early 1990s. In the mid-1980s, as Japanese consumer electronics firms forged ahead with the development of HDTV technology, the MUSE analog format proposed by NHK, a Japanese company, was seen as a pacesetter that threatened to eclipse U.S. electronics companies' technologies. Until June 1990, the Japanese MUSE standard, based on an analog system, was the front-runner among the more than 23 other technical concepts under consideration. Then, a U.S. company, General Instrument, demonstrated the possibility of a digital television signal. This breakthrough was of such significance that the FCC was persuaded to delay its decision on an ATV standard until a digitally-based standard could be developed. In March 1990, when it became clear that a digital standard was possible, the FCC made a number of critical decisions. First, the Commission declared that the new ATV standard must be more than an enhanced analog signal, but be able to provide a genuine HDTV signal with at least twice the resolution of existing television images.(7) Then, to ensure that viewers who did not wish to buy a new digital television set could continue to receive conventional television broadcasts, it dictated that the new ATV standard must be capable of being \"simulcast\" on different channels.(8)The new ATV standard also allowed the new DTV signal to be based on entirely new design principles. Although incompatible with the existing NTSC standard, the new DTV standard would be able to incorporate many improvements. The last standards adopted by the FCC did not require a single standard for scanning formats, aspect ratios, or lines of resolution. This compromise resulted from a dispute between the consumer electronics industry (joined by some broadcasters) and the computer industry (joined by the film industry and some public interest groups) over which of the two scanning processes\u2014interlaced or progressive\u2014would be best suited for the newer digital HDTV compatible display devices. Interlaced scanning, which had been specifically designed for older analogue CRT display technologies, scans even-numbered lines first, then odd-numbered ones. In fact, interlaced scanning can be looked at as the first video compression model as it was partly designed in the 1940s to double the image resolution to exceed the limitations of the television broadcast bandwidth. Another reason for its adoption was to limit the flickering on early CRT screens whose phosphor coated screens could only retain the image from the electron scanning gun for a relatively short duration. However interlaced scanning does not work as efficiently on newer display devices such as Liquid-crystal (LCD), for example, which are better suited to a more frequent progressive refresh rate. Progressive scanning, the format that the computer industry had long adopted for computer display monitors, scans every line in sequence, from top to bottom. Progressive scanning in effect doubles the amount of data generated for every full screen displayed in comparison to interlaced scanning by painting the screen in one pass in 1/60-second, instead of two passes in 1/30-second. The computer industry argued that progressive scanning is superior because it does not \"flicker\" on the new standard of display devices in the manner of interlaced scanning. It also argued that progressive scanning enables easier connections with the Internet, and is more cheaply converted to interlaced formats than vice versa. The film industry also supported progressive scanning because it offered a more efficient means of converting filmed programming into digital formats. For their part, the consumer electronics industry and broadcasters argued that interlaced scanning was the only technology that could transmit the highest quality pictures then (and currently) feasible, i.e., 1,080 lines per picture and 1,920 pixels per line. Broadcasters also favored interlaced scanning because their vast archive of interlaced programming is not readily compatible with a progressive format. William F. Schreiber, who was director of the Advanced Television Research Program at the Massachusetts Institute of Technology from 1983 until his retirement in 1990, thought that the continued advocacy of interlaced equipment originated from consumer electronics companies that were trying to get back the substantial investments they made in the interlaced technology. Digital television transition started in late 2000s. All governments across the world set the deadline for analog shutdown by 2010s. Initially, the adoption rate was low, as the first digital tuner-equipped television sets were costly. But soon, as the price of digital-capable television sets dropped, more and more households were converting to digital television sets. The transition is expected to be completed worldwide by mid to late 2010s. Smart television upright=0.9|A smart TV The advent of digital television allowed innovations like smart television sets. A smart television, sometimes referred to as connected TV or hybrid TV, is a television set or set-top box with integrated Internet and Web 2.0 features, and is an example of technological convergence between computers, television sets and set-top boxes. Besides the traditional functions of television sets and set-top boxes provided through traditional Broadcasting media, these devices can also provide Internet TV, online interactive media, over-the-top content, as well as on-demand streaming media, and home networking access. These TVs come pre-loaded with an operating system. Smart TV should not to be confused with Internet TV, Internet Protocol television (IPTV) or with Web TV. Internet television refers to the receiving of television content over the Internet instead of by traditional systems\u2014terrestrial, cable and satellite (although internet itself is received by these methods). IPTV is one of the emerging Internet television technology standards for use by television networks. Web television (WebTV) is a term used for programs created by a wide variety of companies and individuals for broadcast on Internet TV. A first patent was filed in 1994 (and extended the following year) for an \"intelligent\" television system, linked with data processing systems, by means of a digital or analog network. Apart from being linked to data networks, one key point is its ability to automatically download necessary software routines, according to a user's demand, and process their needs. Major TV manufacturers have announced production of smart TVs only, for middle-end and high-end TVs in 2015. Smart TVs have gotten more affordable compared to when they were first introduced, with 46 million of U.S. households having at least one as of 2019.Kats, Rimma (15 November 2018). \"How Many Households Own a Smart TV?\" eMarketer. Retrieved 21 May 2021. 3D 3D television conveys depth perception to the viewer by employing techniques such as stereoscopic display, multi-view display, 2D-plus-depth, or any other form of 3D display. Most modern 3D television sets use an active shutter 3D system or a polarized 3D system, and some are autostereoscopic without the need of glasses. Stereoscopic 3D television was demonstrated for the first time on 10 August 1928, by John Logie Baird in his company's premises at 133 Long Acre, London. Baird pioneered a variety of 3D television systems using electromechanical and cathode-ray tube techniques. The first 3D television was produced in 1935. The advent of digital television in the 2000s greatly improved 3D television sets. Although 3D television sets are quite popular for watching 3D home media such as on Blu-ray discs, 3D programming has largely failed to make inroads with the public. Many 3D television channels which started in the early 2010s were shut down by the mid-2010s. According to DisplaySearch 3D televisions shipments totaled 41.45 million units in 2012, compared with 24.14 in 2011 and 2.26 in 2010. As of late 2013, the number of 3D TV viewers started to decline. Broadcast systems Terrestrial television upright=1.35|A modern high gain UHF Yagi television antenna. It has 17 directors, and one reflector (made of 4 rods) shaped as a corner reflector. Programming is broadcast by television stations, sometimes called \"channels\", as stations are licensed by their governments to broadcast only over assigned channels in the television band. At first, terrestrial broadcasting was the only way television could be widely distributed, and because bandwidth was limited, i.e., there were only a small number of channels available, government regulation was the norm. In the U.S., the Federal Communications Commission (FCC) allowed stations to broadcast advertisements beginning in July 1941, but required public service programming commitments as a requirement for a license. By contrast, the United Kingdom chose a different route, imposing a television license fee on owners of television reception equipment to fund the British Broadcasting Corporation (BBC), which had public service as part of its Royal Charter. WRGB claims to be the world's oldest television station, tracing its roots to an experimental station founded on 13 January 1928, broadcasting from the General Electric factory in Schenectady, NY, under the call letters W2XB.\"The First Television Show\" Popular Mechanics, August 1930, pp. 177\u201379 It was popularly known as \"WGY Television\" after its sister radio station. Later in 1928, General Electric started a second facility, this one in New York City, which had the call letters W2XBS and which today is known as WNBC. The two stations were experimental in nature and had no regular programming, as receivers were operated by engineers within the company. The image of a Felix the Cat doll rotating on a turntable was broadcast for 2 hours every day for several years as new technology was being tested by the engineers. On 2 November 1936, the BBC began transmitting the world's first public regular high-definition service from the Victorian Alexandra Palace in north London. It therefore claims to be the birthplace of television broadcasting as we know it from now on. With the widespread adoption of cable across the United States in the 1970s and 1980s, terrestrial television broadcasts have been in decline; in 2013 it was estimated that about 7\\% of US households used an antenna.\"CEA Study Says Seven Percent of TV Households Use Antennas\", '\"TVTechnology, 30 July 2013 \"Nielsen: Broadcast Reliance Grew in 2012\", TVTechnology, 14 January 2013 A slight increase in use began around 2010 due to switchover to digital terrestrial television broadcasts, which offered pristine image quality over very large areas, and offered an alternate to cable television (CATV) for cord cutters. All other countries around the world are also in the process of either shutting down analog terrestrial television or switching over to digital terrestrial television. Cable television Coaxial cable is used to carry cable television signals into cathode ray tube and flat panel television sets. Cable television is a system of broadcasting television programming to paying subscribers via radio frequency (RF) signals transmitted through coaxial cables or light pulses through fiber-optic cables. This contrasts with traditional terrestrial television, in which the television signal is transmitted over the air by radio waves and received by a television antenna attached to the television. In the 2000s, FM radio programming, high-speed Internet, telephone service, and similar non-television services may also be provided through these cables. The abbreviation CATV is sometimes used for cable television in the United States. It originally stood for Community Access Television or Community Antenna Television, from cable television's origins in 1948: in areas where over-the-air reception was limited by distance from transmitters or mountainous terrain, large \"community antennas\" were constructed, and cable was run from them to individual homes. Satellite television upright=1.15|DBS satellite dishes installed on an apartment complex. Satellite television is a system of supplying television programming using broadcast signals relayed from communication satellites. The signals are received via an outdoor parabolic reflector antenna usually referred to as a satellite dish and a low-noise block downconverter (LNB). A satellite receiver then decodes the desired television program for viewing on a television set. Receivers can be external set-top boxes, or a built-in television tuner. Satellite television provides a wide range of channels and services, especially to geographic areas without terrestrial television or cable television. The most common method of reception is direct-broadcast satellite television (DBSTV), also known as \"direct to home\" (DTH). In DBSTV systems, signals are relayed from a direct broadcast satellite on the Ku wavelength and are completely digital. Satellite TV systems formerly used systems known as television receive-only. These systems received analog signals transmitted in the C-band spectrum from FSS type satellites, and required the use of large dishes. Consequently, these systems were nicknamed \"big dish\" systems, and were more expensive and less popular. The direct-broadcast satellite television signals were earlier analog signals and later digital signals, both of which require a compatible receiver. Digital signals may include high-definition television (HDTV). Some transmissions and channels are free-to-air or free-to-view, while many other channels are pay television requiring a subscription. In 1945, British science fiction writer Arthur C. Clarke proposed a worldwide communications system which would function by means of three satellites equally spaced apart in earth orbit. This was published in the October 1945 issue of the Wireless World magazine and won him the Franklin Institute's Stuart Ballantine Medal in 1963. The first satellite television signals from Europe to North America were relayed via the Telstar satellite over the Atlantic ocean on 23 July 1962. The signals were received and broadcast in North American and European countries and watched by over 100 million. Launched in 1962, the Relay 1 satellite was the first satellite to transmit television signals from the US to Japan. The first geosynchronous communication satellite, Syncom 2, was launched on 26 July 1963. The world's first commercial communications satellite, called Intelsat I and nicknamed \"Early Bird\", was launched into geosynchronous orbit on 6 April 1965. The first national network of television satellites, called Orbita, was created by the Soviet Union in October 1967, and was based on the principle of using the highly elliptical Molniya satellite for rebroadcasting and delivering of television signals to ground downlink stations. The first commercial North American satellite to carry television transmissions was Canada's geostationary Anik 1, which was launched on 9 November 1972. ATS-6, the world's first experimental educational and Direct Broadcast Satellite (DBS), was launched on 30 May 1974. It transmitted at 860 MHz using wideband FM modulation and had two sound channels. The transmissions were focused on the Indian subcontinent but experimenters were able to receive the signal in Western Europe using home constructed equipment that drew on UHF television design techniques already in use.Long Distance Television Reception (TV-DX) For the Enthusiast, Roger W. Bunney, The first in a series of Soviet geostationary satellites to carry Direct-To-Home television, Ekran 1, was launched on 26 October 1976. It used a 714 MHz UHF downlink frequency so that the transmissions could be received with existing UHF television technology rather than microwave technology. Internet television Internet television (Internet TV) (or online television) is the digital distribution of television content via the Internet as opposed to traditional systems like terrestrial, cable, and satellite, although the Internet itself is received by terrestrial, cable, or satellite methods. Internet television is a general term that covers the delivery of television series, and other video content, over the Internet by video streaming technology, typically by major traditional television broadcasters. Internet television should not be confused with Smart TV, IPTV or with Web TV. Smart television refers to the television set which has a built-in operating system. Internet Protocol television (IPTV) is one of the emerging Internet television technology standards for use by television networks. Web television is a term used for programs created by a wide variety of companies and individuals for broadcast on Internet television. Sets RCA 630-TS, the first mass-produced television set, which sold in 1946\u20131947 A television set, also called a television receiver, television, TV set, TV, or \"telly\", is a device that combines a tuner, display, an amplifier, and speakers for the purpose of viewing television and hearing its audio components. Introduced in the late 1920s in mechanical form, television sets became a popular consumer product after World War II in electronic form, using cathode ray tubes. The addition of color to broadcast television after 1953 further increased the popularity of television sets and an outdoor antenna became a common feature of suburban homes. The ubiquitous television set became the display device for recorded media in the 1970s, such as Betamax and VHS, which enabled viewers to record TV shows and watch prerecorded movies. In the subsequent decades, Television sets were used to watch DVDs and Blu-ray Discs of movies and other content. Major TV manufacturers announced the discontinuation of CRT, DLP, plasma and fluorescent-backlit LCDs by the mid-2010s. Televisions since 2010s mostly use LEDs. LEDs are expected to be gradually replaced by OLEDs in the near future. Display technologies Disk The earliest systems employed a spinning disk to create and reproduce images. These usually had a low resolution and screen size and never became popular with the public. CRT upright=0.9|A 14-inch cathode ray tube showing its deflection coils and electron guns The cathode ray tube (CRT) is a vacuum tube containing one or more electron guns (a source of electrons or electron emitter) and a fluorescent screen used to view images. It has a means to accelerate and deflect the electron beam(s) onto the screen to create the images. The images may represent electrical waveforms (oscilloscope), pictures (television, computer monitor), radar targets or others. The CRT uses an evacuated glass envelope which is large, deep (i.e. long from front screen face to rear end), fairly heavy, and relatively fragile. As a matter of safety, the face is typically made of thick lead glass so as to be highly shatter-resistant and to block most X-ray emissions, particularly if the CRT is used in a consumer product. In television sets and computer monitors, the entire front area of the tube is scanned repetitively and systematically in a fixed pattern called a raster. An image is produced by controlling the intensity of each of the three electron beams, one for each additive primary color (red, green, and blue) with a video signal as a reference. In all modern CRT monitors and televisions, the beams are bent by magnetic deflection, a varying magnetic field generated by coils and driven by electronic circuits around the neck of the tube, although electrostatic deflection is commonly used in oscilloscopes, a type of diagnostic instrument. DLP upright=0.9|The Christie Mirage 5000, a 2001 DLP projector. Digital Light Processing (DLP) is a type of video projector technology that uses a digital micromirror device. Some DLPs have a TV tuner, which makes them a type of TV display. It was originally developed in 1987 by Dr. Larry Hornbeck of Texas Instruments. While the DLP imaging device was invented by Texas Instruments, the first DLP based projector was introduced by Digital Projection Ltd in 1997. Digital Projection and Texas Instruments were both awarded Emmy Awards in 1998 for invention of the DLP projector technology. DLP is used in a variety of display applications from traditional static displays to interactive displays and also non-traditional embedded applications including medical, security, and industrial uses. DLP technology is used in DLP front projectors (standalone projection units for classrooms and business primarily), but also in private homes; in these cases, the image is projected onto a projection screen. DLP is also used in DLP rear projection television sets and digital signs. It is also used in about 85\\% of digital cinema projection. Plasma A plasma display panel (PDP) is a type of flat panel display common to large television displays or larger. They are called \"plasma\" displays because the technology utilizes small cells containing electrically charged ionized gases, or what are in essence chambers more commonly known as fluorescent lamps. LCD upright=0.9|A generic LCD TV, with speakers on either side of the screen. Liquid-crystal-display televisions (LCD TV) are television sets that use LCD display technology to produce images. LCD televisions are much thinner and lighter than cathode ray tube (CRTs) of similar display size, and are available in much larger sizes (e.g., 90-inch diagonal). When manufacturing costs fell, this combination of features made LCDs practical for television receivers. LCDs come in two types: those using cold cathode fluorescent lamps, simply called LCDs and those using LED as backlight called as LEDs. In 2007, LCD television sets surpassed sales of CRT-based television sets worldwide for the first time, and their sales figures relative to other technologies accelerated. LCD television sets have quickly displaced the only major competitors in the large-screen market, the Plasma display panel and rear-projection television. In mid 2010s LCDs especially LEDs became, by far, the most widely produced and sold television display type. LCDs also have disadvantages. Other technologies address these weaknesses, including OLEDs, FED and SED, but none of these have entered widespread production. OLED OLED TV An OLED (organic light-emitting diode) is a light-emitting diode (LED) in which the emissive electroluminescent layer is a film of organic compound which emits light in response to an electric current. This layer of organic semiconductor is situated between two electrodes. Generally, at least one of these electrodes is transparent. OLEDs are used to create digital displays in devices such as television screens. It is also used for computer monitors, portable systems such as mobile phones, handheld game consoles and PDAs. There are two main groups of OLED: those based on small molecules and those employing polymers. Adding mobile ions to an OLED creates a light-emitting electrochemical cell or LEC, which has a slightly different mode of operation. OLED displays can use either passive-matrix (PMOLED) or active-matrix (AMOLED) addressing schemes. Active-matrix OLEDs require a thin-film transistor backplane to switch each individual pixel on or off, but allow for higher resolution and larger display sizes. An OLED display works without a backlight. Thus, it can display deep black levels and can be thinner and lighter than a liquid crystal display (LCD). In low ambient light conditions such as a dark room an OLED screen can achieve a higher contrast ratio than an LCD, whether the LCD uses cold cathode fluorescent lamps or LED backlight. OLEDs are expected to replace other forms of display in near future. Display resolution upright=1.35|Comparison of 8K UHDTV, 4K UHDTV, HDTV and SDTV resolution LD Low-definition television or LDTV refers to television systems that have a lower screen resolution than standard-definition television systems such 240p (320*240). It is used in handheld television. The most common source of LDTV programming is the Internet, where mass distribution of higher-resolution video files could overwhelm computer servers and take too long to download. Many mobile phones and portable devices such as Apple's iPod Nano, or Sony's PlayStation Portable use LDTV video, as higher-resolution files would be excessive to the needs of their small screens (320\u00d7240 and 480\u00d7272 pixels respectively). The current generation of iPod Nanos have LDTV screens, as do the first three generations of iPod Touch and iPhone (480\u00d7320). For the first years of its existence, YouTube offered only one, low-definition resolution of 320x240p at 30fps or less. A standard, consumer grade videotape can be considered SDTV due to its resolution (approximately 360 \u00d7 480i/576i). SD Standard-definition television or SDTV refers to two different resolutions: 576i, with 576 interlaced lines of resolution, derived from the European-developed PAL and SECAM systems; and 480i based on the American National Television System Committee NTSC system. SDTV is a television system that uses a resolution that is not considered to be either high-definition television (720p, 1080i, 1080p, 1440p, 4K UHDTV, and 8K UHD) or enhanced-definition television (EDTV 480p). In North America, digital SDTV is broadcast in the same 4:3 aspect ratio as NTSC signals with widescreen content being center cut. However, in other parts of the world that used the PAL or SECAM color systems, standard-definition television is now usually shown with a 16:9 aspect ratio, with the transition occurring between the mid-1990s and mid-2000s. Older programs with a 4:3 aspect ratio are shown in the United States as 4:3 with non-ATSC countries preferring to reduce the horizontal resolution by anamorphically scaling a pillarboxed image. HD High-definition television (HDTV) provides a resolution that is substantially higher than that of standard-definition television. HDTV may be transmitted in various formats: 1080p: 1920\u00d71080p: 2,073,600 pixels (~2.07 megapixels) per frame 1080i: 1920\u00d71080i: 1,036,800 pixels (~1.04 MP) per field or 2,073,600 pixels (~2.07 MP) per frame A non-standard CEA resolution exists in some countries such as 1440\u00d71080i: 777,600 pixels (~0.78 MP) per field or 1,555,200 pixels (~1.56 MP) per frame 720p: 1280\u00d7720p: 921,600 pixels (~0.92 MP) per frame UHD Ultra-high-definition television (also known as Super Hi-Vision, Ultra HD television, UltraHD, UHDTV, or UHD) includes 4K UHD (2160p) and 8K UHD (4320p), which are two digital video formats proposed by NHK Science & Technology Research Laboratories and defined and approved by the International Telecommunication Union (ITU). The Consumer Electronics Association announced on October 17, 2012, that \"Ultra High Definition\", or \"Ultra HD\", would be used for displays that have an aspect ratio of at least 16:9 and at least one digital input capable of carrying and presenting natural video at a minimum resolution of 3840\u00d72160 pixels. Market share North American consumers purchase a new television set on average every seven years, and the average household owns 2.8 televisions. , 48 million are sold each year at an average price of $", "start_char_pos": 13931, "end_char_pos": 63066}, {"type": "R", "before": "different", "after": "other", "start_char_pos": 63147, "end_char_pos": 63156}, {"type": "R", "before": "TV", "after": "television", "start_char_pos": 63869, "end_char_pos": 63871}, {"type": "R", "before": "the US", "after": "of the United States", "start_char_pos": 64158, "end_char_pos": 64164}, {"type": "R", "before": "the US", "after": "United States", "start_char_pos": 64408, "end_char_pos": 64414}, {"type": "R", "before": "centered", "after": "focused", "start_char_pos": 64576, "end_char_pos": 64584}, {"type": "R", "before": "Popular", "after": "Pop", "start_char_pos": 64607, "end_char_pos": 64614}, {"type": "R", "before": "Science fiction shows", "after": "Sci-fi series", "start_char_pos": 64849, "end_char_pos": 64870}, {"type": "R", "before": "shows", "after": "series", "start_char_pos": 65081, "end_char_pos": 65086}, {"type": "A", "before": null, "after": "Comedy Central's", "start_char_pos": 65121, "end_char_pos": 65121}, {"type": "R", "before": "TV shows", "after": "television series", "start_char_pos": 65820, "end_char_pos": 65828}, {"type": "R", "before": "variant", "after": "derived", "start_char_pos": 66002, "end_char_pos": 66009}, {"type": "R", "before": "globe, broadcast TV", "after": "world, broadcast television", "start_char_pos": 66214, "end_char_pos": 66233}, {"type": "R", "before": "TV", "after": "television", "start_char_pos": 66378, "end_char_pos": 66380}, {"type": "R", "before": "TV", "after": "Television", "start_char_pos": 67340, "end_char_pos": 67342}, {"type": "R", "before": "TV", "after": "television", "start_char_pos": 67422, "end_char_pos": 67424}, {"type": "R", "before": "1 July", "after": "July 1,", "start_char_pos": 68419, "end_char_pos": 68425}, {"type": "R", "before": "UK", "after": "U.K.", "start_char_pos": 69027, "end_char_pos": 69029}, {"type": "R", "before": "multiple", "after": "other", "start_char_pos": 69837, "end_char_pos": 69845}, {"type": "R", "before": "US", "after": "U.S.", "start_char_pos": 69859, "end_char_pos": 69861}, {"type": "R", "before": "$750,000 for a 30-second block of commercial time during the highly popular American Idol, while the same amount of time for the Super Bowl can cost several million dollars. Conversely, lesser-viewed time slots, such as early mornings and weekday afternoons, are often sold in bulk to producers of infomercials at far lower rates. In recent years, the paid program or infomercial has become common, usually in lengths of 30 minutes or one hour. Some drug companies and other businesses have even created \"news\" items for broadcast, known in the industry as video news releases, paying program directors to use them.Jon Stewart of \"The Daily Show\" was mock-outraged at this, saying, \"That's what we do!\", and calling it a new form of television, \"infoganda\". Some TV programs also deliberately place products into their shows as advertisements, a practice started in feature films and known as product placement. For example, a character could be drinking a certain kind of soda, going to a particular chain restaurant, or driving a certain make of car. (This is sometimes very subtle, with shows having vehicles provided by manufacturers for low cost in exchange as a product placement). Sometimes, a specific brand or trade mark, or music from a certain artist or group, is used. (This excludes guest appearances by artists who perform on the show.) United Kingdom The TV regulator oversees TV advertising in the United Kingdom. Its restrictions have applied since the early days of commercially funded TV. Despite this, an early TV mogul, Roy Thomson, likened the broadcasting licence as being a \"licence to print money\". Restrictions mean that the big three national commercial TV channels: ITV, Channel 4, and Channel 5 can show an average of only seven minutes of advertising per hour (eight minutes in the peak period). Other broadcasters must average no more than nine minutes (twelve in the peak). This means that many imported TV shows from the US have unnatural pauses where the UK company does not utilize the narrative breaks intended for more frequent US advertising. Advertisements must not be inserted in the course of certain specific proscribed types of programs which last less than half an hour in scheduled duration; this list includes any news or current affairs programs, documentaries, and programs for children; additionally, advertisements may not be carried in a program designed and broadcast for reception in schools or in any religious broadcasting service or other devotional program or during a formal Royal ceremony or occasion. There also must be clear demarcations in time between the programs and the advertisements. The BBC, being strictly non-commercial, is not allowed to show advertisements on television in the UK, although it has many advertising-funded channels abroad. The majority of its budget comes from television license fees (see below) and broadcast syndication, the sale of content to other broadcasters. Ireland Broadcast advertising is regulated by the Broadcasting Authority of Ireland.General Commercial Communications Code and Children\u2019s Commercial Communications Code, referenced in: ; Subscription Some TV channels are partly funded from subscriptions; therefore, the signals are encrypted during broadcast to ensure that only the paying subscribers have access to the decryption codes to watch pay television or specialty channels. Most subscription services are also funded by advertising. Taxation or license Television services in some countries may be funded by a television licence or a form of taxation, which means that advertising plays a lesser role or no role at all. For example, some channels may carry no advertising at all and some very little, including: Australia (ABC Television) Belgium (RTBF) Denmark (DR) Ireland (RT\u00c9) Japan (NHK) Norway (NRK) Sweden (SVT) Switzerland (SRG SSR) Republic of China (Taiwan) (PTS) United Kingdom (BBC Television) United States (PBS) The British Broadcasting Corporation's TV service carries no television advertising on its UK channels and is funded by an annual television licence paid by the occupiers of premises receiving live TV broadcasts. it was estimated that approximately 26.8 million UK private domestic households owned televisions, with approximately 25 million TV licences in all premises in force as of 2010. This television license fee is set by the government, but the BBC is not answerable to or controlled by the government. two main BBC TV channels were watched by almost 90\\% of the population each week and overall had 27\\% share of total viewing, despite the fact that 85\\% of homes were multi-channel, with 42\\% of these having access to 200 free-to-air channels via satellite and another 43\\% having access to 30 or more channels via Freeview. the licence that funds the advertising-free BBC TV channels cost \u00a3159 for a colour TV Licence and \u00a353.50 for a black and white TV Licence (free or reduced for some groups). The Australian Broadcasting Corporation's television services in Australia carry no advertising by external sources; it is banned under the Australian Broadcasting Corporation Act 1983, which also ensures its the editorial independence. The ABC receives most of its funding from the Australian Government (some revenue is received from its Commercial division), but it has suffered progressive funding cuts under Liberal governments since the 1996 Howard government, with particularly deep cuts in 2014 under the Turnbull government, and an ongoing indexation freeze . The funds provide for the ABC's television, radio, online, and international outputs, although ABC Australia, which broadcasts throughout the Asia-Pacific region, receives additional funds through DFAT and some advertising on the channel. In France, government-funded channels carry advertisements, yet those who own television sets have to pay an annual tax (\"la redevance audiovisuelle\").Ministry of Finance In Japan, NHK is paid for by license fees (known in Japanese as ). The broadcast law that governs NHK's funding stipulates that any television equipped to receive NHK is required to pay. The fee is standardized, with discounts for office workers and students who commute, as well a general discount for residents of Okinawa prefecture. Broadcast programming Broadcast programming, or TV listings in the United Kingdom, is the practice of organizing television programs in a schedule, with broadcast automation used to regularly change the scheduling of TV programs to build an audience for a new show, retain that audience, or compete with other broadcasters' programs. Social aspects upright=0.9|American family watching television, circa 1958 Television has played a pivotal role in the socialization of the 20th and 21st centuries. There are many aspects of television that can be addressed, including negative issues such as media violence. Current research is discovering that individuals suffering from social isolation can employ television to create what is termed a parasocial or faux relationship with characters from their favorite television shows and movies as a way of deflecting feelings of loneliness and social deprivation.Butler, Fionnuala, Cynthia Pickett. \"Imaginary Friends.\" Scientific American. 28 July 2009. Web. 26 March 2010. URL Several studies have found that educational television has many advantages. The article \"The Good Things about Television\" argues that television can be a very powerful and effective learning tool for children if used wisely. Opposition Methodist denominations in the conservative holiness movement, such as the Allegheny Wesleyan Methodist Connection and the Evangelical Wesleyan Church, eschew the use of the television. Some Baptists, such as those affiliated with Pensacola Christian College, also eschew television. Many Traditional Catholic congregations such as the Society of Saint Pius X (SSPX) oppose the presence of television in the household, teaching that it is an occasion of sin. Negative impacts Children, especially those aged 5 or younger, are at risk of injury from falling televisions. A CRT-style television that falls on a child will, because of its weight, hit with the equivalent force of falling multiple stories from a building. Newer flat-screen televisions are \"top-heavy and have narrow bases\", which means that a small child can easily pull one over. , TV tip-overs were responsible for more than 10,000 injuries per year to children in the U.S., at a cost of more than $", "after": "$750,000 for a 30-second block of commercial time during the highly popular singing competition American Idol, while the same amount of time for the Super Bowl can cost several million dollars. Conversely, lesser-viewed time slots, such as early mornings and weekday afternoons, are often sold in bulk to producers of infomercials at far lower rates. In recent years, the paid program or infomercial has become common, usually in lengths of 30 minutes or one hour. Some drug companies and other businesses have even created \"news\" items for broadcast, known in the industry as video news releases, paying program directors to use them.Jon Stewart of \"The Daily Show\" was mock-outraged at this, saying, \"That's what we do!\", and calling it a new form of television, \"infoganda\". Some television programs also deliberately place products into their shows as advertisements, a practice started in feature films and known as product placement. For example, a character could be drinking a certain kind of soda, going to a particular chain restaurant, or driving a certain make of car. (This is sometimes very subtle, with shows having vehicles provided by manufacturers for low cost in exchange as a product placement). Sometimes, a specific brand or trade mark, or music from a certain artist or group, is used. (This excludes guest appearances by artists who perform on the show.) United Kingdom The TV regulator oversees TV advertising in the United Kingdom. Its restrictions have applied since the early days of commercially-funded TV. Despite this, an early TV mogul, Roy Thomson, likened the broadcasting licence as being a \"licence to print money\". Restrictions mean that the big three national commercial TV channels: ITV, Channel 4, and Channel 5 can show an average of only seven minutes of advertising per hour (eight minutes in the peak period). Other broadcasters must average no more than nine minutes (twelve in the peak). This means that many imported TV shows from the U.S. have unnatural pauses where the British company does not utilize the narrative breaks intended for more frequent U.S. advertising. Advertisements must not be inserted in the course of certain specific proscribed types of programs which last less than half an hour in scheduled duration; this list includes any news or current affairs programs, documentaries, and programs for children; additionally, advertisements may not be carried in a program designed and broadcast for reception in schools or in any religious broadcasting service or other devotional program or during a formal Royal ceremony or occasion. There also must be clear demarcations in time between the programs and the advertisements. The BBC, being strictly non-commercial, is not allowed to show advertisements on television in the U.K., although it has many advertising-funded channels abroad. The majority of its budget comes from television license fees (see below) and broadcast syndication, the sale of content to other broadcasters. Ireland Broadcast advertising is regulated by the Broadcasting Authority of Ireland.General Commercial Communications Code and Children\u2019s Commercial Communications Code, referenced in: ; Subscription Some TV channels are partly funded from subscriptions; therefore, the signals are encrypted during broadcast to ensure that only the paying subscribers have access to the decryption codes to watch pay television or specialty channels. Most subscription services are also funded by advertising. Taxation or license Television services in some countries may be funded by a television licence or a form of taxation, which means that advertising plays a lesser role or no role at all. For example, some channels may carry no advertising at all and some very little, including: Australia (ABC Television) Belgium (RTBF) Denmark (DR) Ireland (RT\u00c9) Japan (NHK) Norway (NRK) Sweden (SVT) Switzerland (SRG SSR) Republic of China (Taiwan) (PTS) United Kingdom (BBC Television) United States (PBS) The British Broadcasting Corporation's TV service carries no television advertising on its UK channels and is funded by an annual television licence paid by the occupiers of premises receiving live telecasts. it was estimated that approximately 26.8 million UK private domestic households owned televisions, with approximately 25 million TV licences in all premises in force as of 2010. This television license fee is set by the government, but the BBC is not answerable to or controlled by the government. two main BBC TV channels were watched by almost 90\\% of the population each week and overall had 27\\% share of total viewing, despite the fact that 85\\% of homes were multi-channel, with 42\\% of these having access to 200 free-to-air channels via satellite and another 43\\% having access to 30 or more channels via Freeview. the licence that funds the advertising-free BBC TV channels cost \u00a3159 for a colour TV Licence and \u00a353.50 for a black and white TV Licence (free or reduced for some groups). The Australian Broadcasting Corporation's television services in Australia carry no advertising by external sources; it is banned under the Australian Broadcasting Corporation Act 1983, which also ensures its the editorial independence. The ABC receives most of its funding from the Australian Government (some revenue is received from its Commercial division), but it has suffered progressive funding cuts under Liberal governments since the 1996 Howard government, with particularly deep cuts in 2014 under the Turnbull government, and an ongoing indexation freeze . The funds provide for the ABC's television, radio, online, and international outputs, although ABC Australia, which broadcasts throughout the Asia-Pacific region, receives additional funds through DFAT and some advertising on the channel. In France, government-funded channels carry advertisements, yet those who own television sets have to pay an annual tax (\"la redevance audiovisuelle\").Ministry of Finance In Japan, NHK is paid for by license fees (known in Japanese as ). The broadcast law that governs NHK's funding stipulates that any television equipped to receive NHK is required to pay. The fee is standardized, with discounts for office workers and students who commute, as well a general discount for residents of Okinawa prefecture. Broadcast programming Broadcast programming, or TV listings in the United Kingdom, is the practice of organizing television programs in a schedule, with broadcast automation used to regularly change the scheduling of TV programs to build an audience for a new show, retain that audience, or compete with other broadcasters' programs. Social aspects upright=0.9|American family watching television, circa 1958 Television has played a pivotal role in the socialization of the 20th and 21st centuries. There are many aspects of television that can be addressed, including negative issues such as media violence. Current research is discovering that individuals suffering from social isolation can employ television to create what is termed a parasocial or faux relationship with characters from their favorite television shows and movies as a way of deflecting feelings of loneliness and social deprivation.Butler, Fionnuala, Cynthia Pickett. \"Imaginary Friends.\" Scientific American. 28 July 2009. Web. 26 March 2010. URL Several studies have found that educational television has many advantages. The article \"The Good Things about Television\" argues that television can be a very powerful and effective learning tool for children if used wisely. Opposition Methodist denominations in the conservative holiness movement, such as the Allegheny Wesleyan Methodist Connection and the Evangelical Wesleyan Church, eschew the use of the television. Some Baptists, such as those affiliated with Pensacola Christian College, also eschew television. Many Traditional Catholic congregations such as the Society of Saint Pius X (SSPX) oppose the presence of television in the household, teaching that it is an occasion of sin. Negative impacts Children, especially those aged 5 or younger, are at risk of injury from falling televisions. A CRT-style television that falls on a child will, because of its weight, hit with the equivalent force of falling multiple stories from a building. Newer flat-screen televisions are \"top-heavy and have narrow bases\", which means that a small child can easily pull one over. , TV tip-overs were responsible for more than 10,000 injuries per year to children in the U.S., at a cost of more than $", "start_char_pos": 70059, "end_char_pos": 78548}], "sents_char_pos": [0, 86, 296, 397, 475, 644, 851, 935, 1121, 1431, 1624, 1735, 1964, 2033, 2298, 2405, 2470, 2559, 2586, 2696, 2886, 2932, 3072, 3134, 3225, 3377, 3522, 3718, 3817, 3895, 3978, 4117, 4299, 4475, 4577, 4656, 4766, 4853, 5059, 5155, 5289, 5415, 5469, 5647, 5744, 5822, 5983, 6091, 6362, 6561, 6802, 6978, 7049, 7118, 7316, 7545, 7698, 7828, 7998, 8130, 8390, 8486, 8589, 8712, 8775, 8992, 9059, 9336, 9443, 9588, 9724, 9881, 9908, 10089, 10134, 10225, 10298, 10478, 10551, 10615, 10724, 10908, 10986, 11025, 11220, 11312, 11336, 11424, 11448, 11557, 11631, 11772, 11830, 12043, 12250, 12346, 12453, 12611, 12805, 12920, 13045, 13176, 13317, 13357, 13400, 13473, 13514, 13554, 13597, 13620, 13753, 14018, 14253, 14352, 14529, 14729, 14794, 14959, 15211, 15305, 15424, 15585, 15707, 15800, 16012, 16099, 16171, 16328, 16495, 16693, 16894, 17022, 17095, 17168, 17469, 17682, 17804, 17975, 18166, 18388, 18553, 18615, 18723, 18823, 18880, 19363, 19545, 19701, 19860, 19975, 20210, 20458, 20523, 20720, 20776, 20958, 21018, 21258, 21386, 21471, 21543, 21618, 21714, 21758, 21862, 21960, 22194, 22331, 22455, 22528, 22717, 22950, 23090, 23311, 23638, 24071, 24373, 24470, 24558, 24763, 24815, 24906, 25195, 25270, 25400, 25564, 25729, 25869, 26136, 26263, 26402, 26795, 27041, 27091, 27149, 27408, 27623, 27834, 27997, 28089, 28179, 28291, 28377, 28498, 28594, 28696, 28780, 28875, 28953, 29099, 29274, 29427, 29545, 29786, 30204, 30493, 30641, 31011, 31156, 31217, 31306, 31540, 31783, 31847, 31984, 32150, 32244, 32282, 32397, 32491, 32668, 32748, 32959, 33035, 33113, 33239, 33380, 33597, 33837, 33896, 34107, 34208, 34363, 34474, 34534, 34812, 34963, 35264, 35385, 35642, 35862, 36034, 36299, 36465, 36573, 36737, 36856, 37069, 37314, 37416, 37540, 37674, 38017, 38177, 38395, 38598, 38792, 38950, 39176, 39350, 39506, 39657, 39917, 40069, 40441, 40494, 40574, 40664, 40784, 40859, 40879, 40960, 41215, 41493, 41545, 41650, 41858, 41963, 42099, 42284, 42465, 42574, 42724, 42755, 42804, 43005, 43153, 43307, 43415, 43453, 43524, 43682, 43776, 43911, 43976, 44028, 44078, 44164, 44353, 44576, 44786, 45028, 45255, 45399, 45552, 45689, 45854, 46011, 46092, 46233, 46307, 46719, 46887, 47014, 47216, 47411, 47566, 47638, 47962, 48052, 48184, 48335, 48433, 48506, 48658, 48782, 48903, 48980, 49117, 49222, 49372, 49435, 49571, 49758, 49904, 50052, 50166, 50283, 50373, 50530, 50812, 50966, 51083, 51166, 51387, 51601, 51760, 52064, 52278, 52357, 52434, 52570, 52698, 53011, 53174, 53349, 53534, 53636, 53756, 53797, 53869, 53973, 54066, 54081, 54327, 54427, 54555, 54703, 54900, 55055, 55237, 55533, 55597, 55708, 55774, 55854, 55998, 56124, 56327, 56470, 56535, 56610, 56670, 56777, 56976, 56991, 57054, 57169, 57333, 57439, 57575, 57739, 57882, 57991, 58021, 58150, 58365, 58437, 58497, 58578, 58690, 58788, 58922, 59021, 59183, 59226, 59333, 59519, 59588, 59846, 59881, 60062, 60301, 60427, 60547, 60666, 60851, 60932, 61143, 61274, 61498, 61682, 61815, 61859, 61878, 61931, 61943, 62097, 62557, 62863, 63009, 63162, 63274, 63564, 63695, 63836, 64088, 64261, 64400, 64500, 64606, 64741, 64848, 65000, 65133, 65262, 65348, 65450, 65605, 65811, 65999, 66202, 66343, 66491, 66545, 66714, 66983, 67416, 67531, 67603, 67898, 68010, 68197, 68330, 68547, 68749, 68926, 68993, 69095, 69268, 69301, 69533, 69614, 69706, 69858, 69924, 70019, 70232, 70389, 70503, 70674, 70816, 70970, 71246, 71339, 71488, 71566, 71682, 71884, 71964, 72139, 72295, 72394, 72619, 72710, 72870, 73014, 73099, 73201, 73269, 73449, 73508, 73695, 73787, 73814, 73829, 73842, 73856, 73868, 73881, 73894, 74392, 74446, 74638, 75010, 75127, 75247, 75579, 75818, 75970, 76056, 76176, 76325, 76659, 76824, 76934, 77230, 77265, 77286, 77307, 77321, 77341, 77421, 77571, 77768, 77866, 78041, 78152, 78301]}
+{"doc_id": "307342", "revision_depth": "1", "before_revision": "The extent of civil liberties and the percentage of the population of the United States who had access to these liberties has expanded over time. For example, the Constitution did not originally define who was eligible to vote, allowing each state to determine who was eligible. In the early history of the U.S., most states allowed only white male adult property owners to vote (about 6\\% of the population). The Bill of Rights had little impact on judgements by the courts for the first 130 years after ratification. See also American Civil Liberties Union Civil liberties in the United Kingdom Civil rights movement Constitution of the United States", "after_revision": "The extent of civil liberties and the percentage of the population of the United States who had access to these liberties has expanded over time. For example, the Constitution did not originally define who was eligible to vote, allowing each state to determine who was eligible. In the early history of the U.S., most states allowed only white male adult property owners to vote (about 6\\% of the population). The 'Three-Fifths Compromise' allowed the southern slaveholders to consolidate power and maintain slavery in America for eighty years after the ratification of the Constitution.\"We Hold These Truths to be Self-evident;\" An Interdisciplinary Analysis of the Roots of Racism slavery in America Kenneth N. Addison; Introduction P. xxii And the Bill of Rights had little impact on judgements by the courts for the first 130 years after ratification. United States Constitution Freedom of religion The text of Amendment I to the United States Constitution, ratified December 15, 1791, states that: Freedom of expression Free Speech Clause The text of Amendment I to the United States Constitution, ratified December 15, 1791, states that: Free Press Clause The text of Amendment I to the United States Constitution, ratified December 15, 1791, states that: Free Assembly Clause The text of Amendment I to the United States Constitution, ratified December 15, 1791, states that: Petition Clause The text of Amendment I to the United States Constitution, ratified December 15, 1791, states that: Free speech exceptions The following types of speech are not protected constitutionally: defamation or false statements, child pornography, obscenity, damaging the national security interests, verbal acts, and fighting words. Because these categories fall outside of the First Amendment privileges, the courts can legally restrict or criminalize any expressive act within them. Other expressions, including threat of bodily harm or publicizing illegal activity, may also be ruled illegal.Basic Information About the First Amendment Censorship Right to keep and bear arms The text of Amendment II to the United States Constitution, ratified December 15, 1791, states that: Sexual freedom The concept of sexual freedom includes a broad range of different rights that are not mentioned in the U.S. Constitution. The idea of sexual freedom has sprung more from the popular opinion of society in more recent years, and has had very little Constitutional backing. The following liberties are included under sexual freedom: sexual expression, sexual choices, sexual education, reproductive justice, and sexual URL Sexual freedom in general is considered an implied procedure, and is not mentioned in the Constitution. Sexual freedoms include the freedom to have consensual sex with whomever a person chooses, at any time, for any reason, provided the person is of the age of majority. Marriage is not required, nor are there any requirements as to the gender or number of people you have sex with. Sexual freedom includes the freedom to have private consensual homosexual sex (Lawrence v. Texas). Equal protection Equal protection prevents the government from creating laws that are discriminatory in application or effect. Right to vote The text of Amendment XIV to the United States Constitution, ratified July 9, 1868, states that: The text of Amendment XV to the United States Constitution, ratified February 3, 1870, states that: The text of Amendment XIX to the United States Constitution, ratified August 18, 1919, states that: The text of Amendment XXIII to the United States Constitution, ratified January 23, 1964, states that: The text of Amendment XXVI to the United States Constitution, ratified July 1, 1971, states that: Right to parent one's children Right to privacy Right to marriage In the 1967 United States Supreme Court ruling in the case of Loving v. Virginia found a fundamental right to marriage, regardless of race. In the 2015 United States Supreme Court ruling in the case of Obergefell v. Hodges found a fundamental right to marriage, regardless of gender. Rights of self-defense See also American Civil Liberties Union Civil liberties in the United Kingdom Civil rights in the United States Constitution of the United States", "edit_actions": [{"type": "A", "before": null, "after": "'Three-Fifths Compromise' allowed the southern slaveholders to consolidate power and maintain slavery in America for eighty years after the ratification of the Constitution.\"We Hold These Truths to be Self-evident;\" An Interdisciplinary Analysis of the Roots of Racism", "start_char_pos": 414, "end_char_pos": 414}, {"type": "A", "before": null, "after": "slavery in America Kenneth N. Addison; Introduction P. xxii And the", "start_char_pos": 415, "end_char_pos": 415}, {"type": "A", "before": null, "after": "United States Constitution Freedom of religion", "start_char_pos": 521, "end_char_pos": 521}, {"type": "A", "before": null, "after": "The text of Amendment I to the United States Constitution, ratified December 15, 1791, states that:", "start_char_pos": 522, "end_char_pos": 522}, {"type": "A", "before": null, "after": "Freedom of expression", "start_char_pos": 523, "end_char_pos": 523}, {"type": "A", "before": null, "after": "Free Speech Clause", "start_char_pos": 524, "end_char_pos": 524}, {"type": "A", "before": null, "after": "The text of Amendment I to the United States Constitution, ratified December 15, 1791, states that:", "start_char_pos": 525, "end_char_pos": 525}, {"type": "A", "before": null, "after": "Free Press Clause", "start_char_pos": 526, "end_char_pos": 526}, {"type": "A", "before": null, "after": "The text of Amendment I to the United States Constitution, ratified December 15, 1791, states that:", "start_char_pos": 527, "end_char_pos": 527}, {"type": "A", "before": null, "after": "Free Assembly Clause", "start_char_pos": 528, "end_char_pos": 528}, {"type": "A", "before": null, "after": "The text of Amendment I to the United States Constitution, ratified December 15, 1791, states that:", "start_char_pos": 529, "end_char_pos": 529}, {"type": "A", "before": null, "after": "Petition Clause", "start_char_pos": 530, "end_char_pos": 530}, {"type": "A", "before": null, "after": "The text of Amendment I to the United States Constitution, ratified December 15, 1791, states that:", "start_char_pos": 531, "end_char_pos": 531}, {"type": "A", "before": null, "after": "Free speech exceptions", "start_char_pos": 532, "end_char_pos": 532}, {"type": "A", "before": null, "after": "The following types of speech are not protected constitutionally: defamation or false statements, child pornography, obscenity, damaging the national security interests, verbal acts, and fighting words. Because these categories fall outside of the First Amendment privileges, the courts can legally restrict or criminalize any expressive act within them. Other expressions, including threat of bodily harm or publicizing illegal activity, may also be ruled illegal.Basic Information About the First Amendment", "start_char_pos": 533, "end_char_pos": 533}, {"type": "A", "before": null, "after": "Censorship", "start_char_pos": 534, "end_char_pos": 534}, {"type": "A", "before": null, "after": "Right to keep and bear arms", "start_char_pos": 535, "end_char_pos": 535}, {"type": "A", "before": null, "after": "The text of Amendment II to the United States Constitution, ratified December 15, 1791, states that:", "start_char_pos": 536, "end_char_pos": 536}, {"type": "A", "before": null, "after": "Sexual freedom The concept of sexual freedom includes a broad range of different rights that are not mentioned in the U.S. Constitution. The idea of sexual freedom has sprung more from the popular opinion of society in more recent years, and has had very little Constitutional backing. The following liberties are included under sexual freedom: sexual expression, sexual choices, sexual education, reproductive justice, and sexual URL Sexual freedom in general is considered an implied procedure, and is not mentioned in the Constitution.", "start_char_pos": 537, "end_char_pos": 537}, {"type": "A", "before": null, "after": "Sexual freedoms include the freedom to have consensual sex with whomever a person chooses, at any time, for any reason, provided the person is of the age of majority. Marriage is not required, nor are there any requirements as to the gender or number of people you have sex with. Sexual freedom includes the freedom to have private consensual homosexual sex (Lawrence v. Texas).", "start_char_pos": 538, "end_char_pos": 538}, {"type": "A", "before": null, "after": "Equal protection", "start_char_pos": 539, "end_char_pos": 539}, {"type": "A", "before": null, "after": "Equal protection prevents the government from creating laws that are discriminatory in application or effect.", "start_char_pos": 540, "end_char_pos": 540}, {"type": "A", "before": null, "after": "Right to vote", "start_char_pos": 541, "end_char_pos": 541}, {"type": "A", "before": null, "after": "The text of Amendment XIV to the United States Constitution, ratified July 9, 1868, states that:", "start_char_pos": 542, "end_char_pos": 542}, {"type": "A", "before": null, "after": "The text of Amendment XV to the United States Constitution, ratified February 3, 1870, states that:", "start_char_pos": 543, "end_char_pos": 543}, {"type": "A", "before": null, "after": "The text of Amendment XIX to the United States Constitution, ratified August 18, 1919, states that:", "start_char_pos": 544, "end_char_pos": 544}, {"type": "A", "before": null, "after": "The text of Amendment XXIII to the United States Constitution, ratified January 23, 1964, states that:", "start_char_pos": 545, "end_char_pos": 545}, {"type": "A", "before": null, "after": "The text of Amendment XXVI to the United States Constitution, ratified July 1, 1971, states that:", "start_char_pos": 546, "end_char_pos": 546}, {"type": "A", "before": null, "after": "Right to parent one's children", "start_char_pos": 547, "end_char_pos": 547}, {"type": "A", "before": null, "after": "Right to privacy Right to marriage", "start_char_pos": 548, "end_char_pos": 548}, {"type": "A", "before": null, "after": "In the 1967 United States Supreme Court ruling in the case of Loving v. Virginia found a fundamental right to marriage, regardless of race. In the 2015 United States Supreme Court ruling in the case of Obergefell v. Hodges found a fundamental right to marriage, regardless of gender.", "start_char_pos": 549, "end_char_pos": 549}, {"type": "A", "before": null, "after": "Rights of self-defense", "start_char_pos": 550, "end_char_pos": 550}, {"type": "R", "before": "movement", "after": "in the United States", "start_char_pos": 642, "end_char_pos": 650}], "sents_char_pos": [0, 145, 278, 409, 520]}
+{"doc_id": "31083845", "revision_depth": "1", "before_revision": "Milner, Marc, \"Canadian Military History - Selected Readings\",(Toronto: Copp Clark Pittman, 1993), Official accounts - National Defence and the Canadian Forces Bernier, Serge (2000) Canadian Military Heritage, Volume III 1872-2000 Art Global, Montr\u00e9al (Downloadable PDF) Chartrand, Ren\u00e9 (1993) Canadian Military Heritage, Volume I, 1000-1754 Art Global, Montr\u00e9al (Downloadable PDF) Chartrand, Ren\u00e9 (1993) Canadian Military Heritage, Volume II, 1755-1871 Art Global, Montr\u00e9al (Downloadable PDF) ] Goodspeed, D.J (1967) The Armed Forces of Canada 1867-1967 Queen's Printer (Downloadable PDF) Greenhous, Harris, Johnston, & Rawling, \"The Crucible of War 1939-1945 : The Official History of the Royal Canadian Air Force Volume 3\", University of Toronto Press, Toronto, 1994, National Defence Headquarters (1995) Peacekeeping 1815 to Today National Defence, Ottawa (Downloadable PDF) Tremblay, Yves (2001) Canadian Military History Since the 17th Century Dept. of National Defence, Ottawa (Downloadable PDF P. Whitney Lackenbauer, John Moses, R. Scott Sheffield, Maxime Gohier (2010) A Commemorative History of Aboriginal People in the Canadian Military Dept. of National Defence, Ottawa (Downloadable PDF) Baugh, D.A. The Global Seven Years War 1754-1763 : Britain and France in a Great Power Contest (2011) Berton, Pierre. The Invasion of Canada, 1812-1813. McClelland and Stewart Ltd., 1980. Berton, Pierre. Flames Across the Border, 1813-1814. McClelland and Stewart Ltd., 1981. Boulton, Charles A. (1886) Reminiscences of the North-West Rebellions. Toronto. Brumwell, Stephen. Pederson, Charles E. (2010), The French & Indian War, ABDO Senior, H. (1996). The last invasion of Canada: The Fenian raids, 1866-1870 ]. Dundurn Press. Sheppard, Ruth (2006), URL Empires Collide: The French and Indian War 1754-63, Osprey Reid, John G. (2004). The \"conquest\" of Acadia, 1710: imperial, colonial, and aboriginal constructions, University of Toronto Press Ross, David (1992), Canadian Campaigns, 1860-1870 , pub Osprey, Cook, Tim (2007) At the Sharp End: Canadians Fighting the Great War, 1914-1916 , Viking Canada Cook, Tim (2008) Shock Troops: Canadians Fighting the Great War, 1917-1918 , Viking Canada Cook, Tim (2010) The Madman and the Butcher: The Sensational Wars of Sam Hughes and General Arthur Currie, Penguin Canada Granatstein, J. L. (2004), Hell's Corner: An Illustrated History of Canada's Great War, 1914-1918 , Douglas & McIntyre Kordan, Bohdan S. (2002), Enemy Aliens, Prisoners of War: Internment in Canada during the Great War, McGill-Queen's University Press MacKenzie, David, ed. Canada and the First World War (2005) 16 essays by leading scholars Morton, D. and J. L. Granatstein. Marching to Armaggeddon - Canadians and the Great War 1914-1919. Lester & Dennys Ltd. 1989. Morton, D. (1993). When Your Number's Up - WWI, Random House of Canada Perkins, Dave, \"Canada's Submariners 1914-1923 \", Boston Mills Press, Erin, 1989, Thompson, Julian, \"The 1916 Experience: Verdun and the Somme\", Seven Oaks, London, 2006, Turner, Alexander (2005), Vimy Ridge 1917: Byng's Canadians Triumph at Arras Osprey Publ Official accounts - National Defence and the Canadian Forces Brereton Greenhous; Stephen J. Harris (1992) Canada And The Battle Of Vimy Ridge, 9-12 April 1917 Minister Supply and Service (Downloadable PDF) Duguid, A.F, (1938) Official History of the Canadian Forces in the Great War, 1914-1919 , Vol I Part I King's Printer, Ottawa, (Downloadable PDF) Duguid, A.F, (1938) Official History of the Canadian Forces in the Great War, 1914-1919 , Vol I Part 2 King's Printer, Ottawa, (Downloadable PDF) Nicholson, G.W.L. (1964) Official History of the Canadian Army in the First World War: Canadian Expeditionary Force, 1914-1919 , Duhamel, Queen's Printer and Controller of Stationery, Ottawa (Downloadable PDF) Macphail, Sir Andrew (1925) Official History of the Canadian Forces in the Great War: The Medical Services, F.A. Acland, King's Printer, Ottawa (Downloadable PDF) Ministry of Overseas Military Forces (1919) Report of the Ministry Overseas Military Forces of Canada - 1918, London : H.M. Stationery Office (Downloadable PDF) Snell, A.E. (1924) The C.A.M.C. with the Canadian Corps during the Last Hundred Days of the Great War, F.A. Acland, King's Printer, Ottawa (Downloadable PDF) Zuehlke, Mark (1996) The Gallant Cause: Canadians in the Spanish Civil War, 1936-1939 , Wiley & Sons Canada Copp, J. T (2006), Cinderella army: the Canadians in northwest Europe, 1944-1945 , University of Toronto Press Coughlin, Tom. The Dangerous Sky: Canadian Airmen in World War II. The Ryerson Press, 1968. Dickson, Paul Douglas. A Thoroughly Canadian General: A Biography of General H.D.G. Crerar (2007) excerpt and text search Dunmore, Spencer, In Great Waters: \"The Epic Story of the Battle of the Atlantic 1939-1945 (Toronto: M&S, 1999) English, John Alan (1991). The Canadian Army and the Normandy campaign: a study of failure in high command, Praeger, Granatstein, J. L. (2005), The last good war : an illustrated history of Canada in the Second World War, 1939-1945 , Douglas & McIntyre Granatstein; J. L. The Generals: The Canadian Army's Senior Commanders in the Second World War (University of Calgary Press, 2005) in Questia Granatstein, J. L. Canada's War: The Politics of the Mackenzie King Government. Oxford UP, (1975). Greenhous, Harris, Johnston, & Rawling, \"The Crucible of War 1939-1945 : The Official History of the Royal Canadian Air Force Volume 3\", University of Toronto Press, Toronto, 1994, Michael L. Hadley (1990), U-Boats Against Canada: German Submarines in Canadian Waters, Mcgill Canada Harbron, John D., \"The Longest Battle: The RCN in the Atlantic 1939-1945 \", Vanwell, St. Catherines, 1995 Harvey, J. Douglas, \"Boys, Bombs, and Brussels Sprouts\", M&S, Halifax, 1982, (RCAF No. 6 Group, Bomber Command) Keshen, Jeffrey A. Saints, Sinners, and Soldiers: Canada's Second World War (2004) Iarocci, Andrew (2008), Shoestring soldiers: the 1st Canadian Division at war, 1914-1915 , University of Toronto Press Kelsey, Marion (1997), Victory harvest: diary of a Canadian in the Women's Land Army, 1940-1944 , McGill-Queen's University Press Nadler, John (2006), A perfect hell : the forgotten story of the Canadian commandos of the Second World War, Anchor Canada, Peden, Murray (2003), Thousand shall fall : the true story of a Canadian bomber pilot in world war two, Dundurn Press Pierson, Ruth Roach. Canadian Women and the Second World War. Ottawa: Canadian Historical Association, 1983. No ISBN Rickard, John. Politics of Command: Lieutenant-General A.G.L. McNaughton and the Canadian Army, 1939-1943 (2009) Robertson, Ian (2007), While bullets fly : the story of a Canadian field surgical unit in the Second World War, Trafford Rogge, Robert E. (2005), Fearsome battle: with the Canadian Army in World War II Europe, Camroc Press Saunders, Tim (2004), Juno Beach: 3rd Canadian & 79th armoured divisions, McGill-Queen's University Press Whitton, Charlotte. Canadian Women in the War Effort. Toronto: The Macmillan company of Canada limited, 1942. No ISBN Ziegler, Mary. We Serve That Men May Fly - The Story of the Women's Division of the Royal Canadian Air Force. Hamilton: RCAF (WD) Association, 1973. No ISBN. Zuehlke, Mark (1999) Ortona: Canada's Epic World War II Battle, Douglas & McIntyre Zuehlke, Mark (2001) The Liri Valley: Canada's World War II Breakthrough to Rome, Douglas & McIntyre Zuehlke, Mark (2003) The Gothic Line: Canada's Month of Hell in WWII Italy, Douglas & McIntyre Zuehlke, Mark (2004) Juno Beach: Canada's D-Day Victory - June 6, 1944, Douglas & McIntyre Zuehlke, Mark (2005) Holding Juno: Canada's Heroic Defence of the D-Day Beaches - June 7-12 , 1944, Douglas & McIntyre Zuehlke, Mark (2007) Terrible Victory : First Canadian Army and the Scheldt Estuary Campaign, September 13-November 6, 1944, Douglas & McIntyre Zuehlke, Mark (2008) Operation Husky: The Canadian Invasion of Sicily, July 10-August 7, 1943, Douglas & McIntyre Zuehlke, Mark (2010) On to Victory: The Canadian Liberation of the Netherlands, March 23-May 5, 1945, Douglas & McIntyre Zuehlke, Mark (2011) Breakout from Juno: First Canadian Army and the Normandy Campaign - July 4-August 21, 1944, Douglas & McIntyre Official accounts - National Defence and the Canadian Forces Stacey, C P. (1948) The Canadian Army, 1939-1945 : An Official Historical Summary King's Printer, Ottawa (Downloadable PDF) Stacey, C P. (1970) Arms, Men and Governments: The War Policies of Canada, 1939-1945 Queen's Printer, Ottawa (Downloadable PDF) Stacey, C P. (1955) Official History of the Canadian Army in the Second World War, Vol I Six Years of War, Queen's Printer, Ottawa (Downloadable PDF) Nicholson, G. W. L. (1956) Official history of the Canadian Army in the Second World War, Vol II The Canadians in Italy, Queen's Printer, Ottawa (Downloadable PDF) Stacey, C P. (1960) Official History of the Canadian Army in the Second World War, Vol III The Victory Campaign: The Operations in Northwest Europe, 1944-45, Queen's Printer, Ottawa (Downloadable PDF) Feasby, W.R. (1956) Official History of the Canadian Medical Services, 1939-1945 , Vol 1 Organization and Campaigns Queen's Printer, Ottawa (Downloadable PDF) McAndrew, Bill; Bill Rawling, Michael Whitby (1995) Liberation: The Canadians in Europe Art Global (Downloadable PDF) Bashow, David L., \"Starfighter: A Loving Retrospective of the CF-104 Era in Canadian Fighter Aviation 1961-1986 \", Fortress Publications, Toronto, 1990 Soward, Stuart E., \"Hands to Flying Stations Volume 1: A Recollective History of Canadian Naval Aviation 1945-1954 \", Neptune, Victoria, 1993, Melady, John, \"Korea: Canada's Forgotten War\", MacMillan, Toronto, 1983, Meyers, Edward C., \"Thunder in the Morning Calm\", Vanwell Publishing, St. Catherines, 1992, Official accounts - National Defence and the Canadian Forces Historical Section General Staff, Army Headquarters (1956) Canada's Army in Korea: The United Nations Operations, 1950-53 , and Their Aftermath Queen's Printer (Downloadable PDF) Wood, F.W (1966) Official History of the Canadian Army in Korea: Strange Battleground Queen's Printer, Ottawa (Downloadable PDF) Thorgrimmson, E.C. Russell (1956) Canadian Naval Operations in Korean Waters, 1950-1955 Naval Historical Section, Canadian Forces Headquarters, Ottawa (Downloadable PDF) Aviation The Arrowheads, \"Arrow: The Story of the Avro Arrow from its Evolution to its Extinction\", Boston Mills Press, Erin, 1980, Barris, Ted. Behind The Glory: The Plan that Won the Allied Air War. Markham, Ontario: Thomas Allen & Son Publishers, 2005. Bashow, David L., \"All the Fine Young Eagles\", Stoddard, Toronto, 1996, Bashow, David L., \"Starfighter: A Loving Retrospective of the CF-104 Era in Canadian Fighter Aviation 1961-1986 \", Fortress Publications, Toronto, 1990 Greenhous, Brereton; Halliday, Hugh A. Canada's Air Forces, 1914\u20131999. Montreal: Editions Art Global and the Department of National Defence, 1999. . Greenhous, Harris, Johnston, & Rawling, \"The Crucible of War 1939-1945 : The Official History of the Royal Canadian Air Force Volume 3\", University of Toronto Press, Toronto, 1994, Hatch, F.J. Aerodrome of Democracy: Canada and the British Commonwealth Air Training Plan 1939\u20131945. Ottawa: Canadian Department of National Defence, 1983. Milberry, Larry, ed. Sixty Years\u2014The RCAF and CF Air Command 1924\u20131984. Toronto: Canav Books, 1984. Milberry, Larry. Aviation in Canada: Evolution of an Air Force. Toronto: Canav Books, 2010. . Mills, Carl, \"Banshees in the Royal Canadian Navy\", Banshee Publication, Willowdale, 1991 Roberts, Leslie. There Shall Be Wings. Toronto: Clark, Irwin and Co. Ltd., 1959. No ISBN. Shores, Christopher, \"History of the Royal Canadian Air Force\", Royce Publishing, Toronto, 1984, Soward, Stuart E., \"Hands to Flying Stations Volume 1: A Recollective History of Canadian Naval Aviation 1945-1954 \", Neptune, Victoria, 1993, Naval Arbuckle, J. Graeme, \"Badges of the Canadian Navy\", Nimbus, Halifax, 1987, Burrow, Len & Beaudoin, Emile, \"Unlucky Lady: The Life and Death of HMCS Athabaskan\", M&S, Toronto, 1987, \"Canada's Navy Annual\", Corvus Publishing, Calgary, 1986 Dunmore, Spencer, \"In Great Waters: \"The Epic Story of the Battle of the Atlantic 1939-1945 \", M&S, Toronto, 1999, Foster, J. A., \"Sea Wings: A Pictorial History of Canada's Waterborne Defence Aircraft\", Meuthen, Toronto, 1986, Fraser, Doug, \"Postwar Casualty: Canada's Merchant Navy\", Pottersfield Press, Lawrencetown Beach, 1997, Hadley, Michael L., U-Boats Against Canada: German Submarines in Canadian Waters, Mcgill Canada, 1990 Harbron, John D., \"The Longest Battle: The RCN in the Atlantic 1939-1945 \", Vanwell, St. Catherines, 1995 Johnston, Mac (2008). Corvettes Canada: Convoy Veterans of WWII Tell Their True Stories. Wiley. . Lamb, James B., \"A Bloody War\", M&S, Toronto, 1990, Lamb, James B., \"The Corvette War\", Signet Books, Scarborough, 1979, Lamb, James B., \"On the Triangle Run\", Totem, Toronto, 1987, Lynch, Thomas G. \"Canada's Flowers: History of the Corvettes of Canada\", Nimbus, Halifax, 1983, Lynch, Thomas G., \"The Flying 400: Canada's Hydrofoil Project\", Nimbus, Halifax, 1983, Macpherson, Ken, \"The River Class Destroyers of the Royal Canadian Navy\", Charles J. Mussen Publishers, Toronto, 1985, Macpherson, Ken & Burgess, John, \"The Ships of Canada's Naval Forces 1910-1993 \", Vanwell, St. Catherines, 1994, Mills, Carl, \"Banshees in the Royal Canadian Navy\", Banshee Publication, Willowdale, 1991 Perkins, Dave, \"Canada's Submariners 1914-1923 \", Boston Mills Press, Erin, 1989, Schull, Joseph. Ships of the Great Days: Canada's Navy in World War II, in series, Great Stories of Canada''. Macmillan, Toronto, 1962. 156 p., ill. Snowie, J. Allen, \"The Bonnie: HMCS Bonaventure\", Boston Mills Press, Erin, 1987, Soward, Stuart E., \"Hands to Flying Stations Volume 1: A Recollective History of Canadian Naval Aviation 1945-1954 \", Neptune, Victoria, 1993, External links Canadian Military History Gateway - Government of Canada Canadian Military History - Library and Archives Canada Canadian Military History - Wilfrid Laurier University War and the Foundation of Canada - Canadian War Museum CBC Archives (War & Conflict) - Canadian Broadcasting Corporation A Bibliography of Regimental and Military Histories and Relative Material - University of Calgary Library (2003)", "after_revision": "Milner, Marc, \"Canadian Military History \u2013 Selected Readings\",(Toronto: Copp Clark Pittman, 1993), Official accounts \u2013 National Defence and the Canadian Forces Bernier, Serge (2000) Canadian Military Heritage, Volume III 1872\u20132000 Art Global, Montr\u00e9al (Downloadable PDF) Chartrand, Ren\u00e9 (1993) Canadian Military Heritage, Volume I, 1000\u20131754 Art Global, Montr\u00e9al (Downloadable PDF) Chartrand, Ren\u00e9 (1993) Canadian Military Heritage, Volume II, 1755\u20131871 Art Global, Montr\u00e9al (Downloadable PDF) ] Goodspeed, D.J (1967) The Armed Forces of Canada 1867\u20131967 Queen's Printer (Downloadable PDF) Greenhous, Harris, Johnston, & Rawling, \"The Crucible of War 1939\u20131945 : The Official History of the Royal Canadian Air Force Volume 3\", University of Toronto Press, Toronto, 1994, National Defence Headquarters (1995) Peacekeeping 1815 to Today National Defence, Ottawa (Downloadable PDF) Tremblay, Yves (2001) Canadian Military History Since the 17th Century Dept. of National Defence, Ottawa (Downloadable PDF P. Whitney Lackenbauer, John Moses, R. Scott Sheffield, Maxime Gohier (2010) A Commemorative History of Aboriginal People in the Canadian Military Dept. of National Defence, Ottawa (Downloadable PDF) Baugh, D.A. The Global Seven Years War 1754\u20131763 : Britain and France in a Great Power Contest (2011) Berton, Pierre. The Invasion of Canada, 1812\u20131813. McClelland and Stewart Ltd., 1980. Berton, Pierre. Flames Across the Border, 1813\u20131814. McClelland and Stewart Ltd., 1981. Boulton, Charles A. (1886) Reminiscences of the North-West Rebellions. Toronto. Brumwell, Stephen. Pederson, Charles E. (2010), The French & Indian War, ABDO Senior, H. (1996). The last invasion of Canada: The Fenian raids, 1866\u20131870 ]. Dundurn Press. Sheppard, Ruth (2006), URL Empires Collide: The French and Indian War 1754-63, Osprey Reid, John G. (2004). The \"conquest\" of Acadia, 1710: imperial, colonial, and aboriginal constructions, University of Toronto Press Ross, David (1992), Canadian Campaigns, 1860\u20131870 , pub Osprey, Cook, Tim (2007) At the Sharp End: Canadians Fighting the Great War, 1914\u20131916 , Viking Canada Cook, Tim (2008) Shock Troops: Canadians Fighting the Great War, 1917\u20131918 , Viking Canada Cook, Tim (2010) The Madman and the Butcher: The Sensational Wars of Sam Hughes and General Arthur Currie, Penguin Canada Granatstein, J. L. (2004), Hell's Corner: An Illustrated History of Canada's Great War, 1914\u20131918 , Douglas & McIntyre Kordan, Bohdan S. (2002), Enemy Aliens, Prisoners of War: Internment in Canada during the Great War, McGill-Queen's University Press MacKenzie, David, ed. Canada and the First World War (2005) 16 essays by leading scholars Morton, D. and J. L. Granatstein. Marching to Armaggeddon \u2013 Canadians and the Great War 1914\u20131919. Lester & Dennys Ltd. 1989. Morton, D. (1993). When Your Number's Up \u2013 WWI, Random House of Canada Perkins, Dave, \"Canada's Submariners 1914\u20131923 \", Boston Mills Press, Erin, 1989, Thompson, Julian, \"The 1916 Experience: Verdun and the Somme\", Seven Oaks, London, 2006, Turner, Alexander (2005), Vimy Ridge 1917: Byng's Canadians Triumph at Arras Osprey Publ Official accounts \u2013 National Defence and the Canadian Forces Brereton Greenhous; Stephen J. Harris (1992) Canada And The Battle Of Vimy Ridge, 9-12 April 1917 Minister Supply and Service (Downloadable PDF) Duguid, A.F, (1938) Official History of the Canadian Forces in the Great War, 1914\u20131919 , Vol I Part I King's Printer, Ottawa, (Downloadable PDF) Duguid, A.F, (1938) Official History of the Canadian Forces in the Great War, 1914\u20131919 , Vol I Part 2 King's Printer, Ottawa, (Downloadable PDF) Nicholson, G.W.L. (1964) Official History of the Canadian Army in the First World War: Canadian Expeditionary Force, 1914\u20131919 , Duhamel, Queen's Printer and Controller of Stationery, Ottawa (Downloadable PDF) Macphail, Sir Andrew (1925) Official History of the Canadian Forces in the Great War: The Medical Services, F.A. Acland, King's Printer, Ottawa (Downloadable PDF) Ministry of Overseas Military Forces (1919) Report of the Ministry Overseas Military Forces of Canada \u2013 1918, London : H.M. Stationery Office (Downloadable PDF) Snell, A.E. (1924) The C.A.M.C. with the Canadian Corps during the Last Hundred Days of the Great War, F.A. Acland, King's Printer, Ottawa (Downloadable PDF) Zuehlke, Mark (1996) The Gallant Cause: Canadians in the Spanish Civil War, 1936\u20131939 , Wiley & Sons Canada Copp, J. T (2006), Cinderella army: the Canadians in northwest Europe, 1944\u20131945 , University of Toronto Press Coughlin, Tom. The Dangerous Sky: Canadian Airmen in World War II. The Ryerson Press, 1968. Dickson, Paul Douglas. A Thoroughly Canadian General: A Biography of General H.D.G. Crerar (2007) excerpt and text search Dunmore, Spencer, In Great Waters: \"The Epic Story of the Battle of the Atlantic 1939\u20131945 (Toronto: M&S, 1999) English, John Alan (1991). The Canadian Army and the Normandy campaign: a study of failure in high command, Praeger, Granatstein, J. L. (2005), The last good war : an illustrated history of Canada in the Second World War, 1939\u20131945 , Douglas & McIntyre Granatstein; J. L. The Generals: The Canadian Army's Senior Commanders in the Second World War (University of Calgary Press, 2005) in Questia Granatstein, J. L. Canada's War: The Politics of the Mackenzie King Government. Oxford UP, (1975). Greenhous, Harris, Johnston, & Rawling, \"The Crucible of War 1939\u20131945 : The Official History of the Royal Canadian Air Force Volume 3\", University of Toronto Press, Toronto, 1994, Michael L. Hadley (1990), U-Boats Against Canada: German Submarines in Canadian Waters, Mcgill Canada Harbron, John D., \"The Longest Battle: The RCN in the Atlantic 1939\u20131945 \", Vanwell, St. Catherines, 1995 Harvey, J. Douglas, \"Boys, Bombs, and Brussels Sprouts\", M&S, Halifax, 1982, (RCAF No. 6 Group, Bomber Command) Keshen, Jeffrey A. Saints, Sinners, and Soldiers: Canada's Second World War (2004) Iarocci, Andrew (2008), Shoestring soldiers: the 1st Canadian Division at war, 1914\u20131915 , University of Toronto Press Kelsey, Marion (1997), Victory harvest: diary of a Canadian in the Women's Land Army, 1940\u20131944 , McGill-Queen's University Press Nadler, John (2006), A perfect hell : the forgotten story of the Canadian commandos of the Second World War, Anchor Canada, Peden, Murray (2003), Thousand shall fall : the true story of a Canadian bomber pilot in world war two, Dundurn Press Pierson, Ruth Roach. Canadian Women and the Second World War. Ottawa: Canadian Historical Association, 1983. No ISBN Rickard, John. Politics of Command: Lieutenant-General A.G.L. McNaughton and the Canadian Army, 1939\u20131943 (2009) Robertson, Ian (2007), While bullets fly : the story of a Canadian field surgical unit in the Second World War, Trafford Rogge, Robert E. (2005), Fearsome battle: with the Canadian Army in World War II Europe, Camroc Press Saunders, Tim (2004), Juno Beach: 3rd Canadian & 79th armoured divisions, McGill-Queen's University Press Whitton, Charlotte. Canadian Women in the War Effort. Toronto: The Macmillan company of Canada limited, 1942. No ISBN Ziegler, Mary. We Serve That Men May Fly \u2013 The Story of the Women's Division of the Royal Canadian Air Force. Hamilton: RCAF (WD) Association, 1973. No ISBN. Zuehlke, Mark (1999) Ortona: Canada's Epic World War II Battle, Douglas & McIntyre Zuehlke, Mark (2001) The Liri Valley: Canada's World War II Breakthrough to Rome, Douglas & McIntyre Zuehlke, Mark (2003) The Gothic Line: Canada's Month of Hell in WWII Italy, Douglas & McIntyre Zuehlke, Mark (2004) Juno Beach: Canada's D-Day Victory \u2013 June 6, 1944, Douglas & McIntyre Zuehlke, Mark (2005) Holding Juno: Canada's Heroic Defence of the D-Day Beaches \u2013 June 7\u201312 , 1944, Douglas & McIntyre Zuehlke, Mark (2007) Terrible Victory : First Canadian Army and the Scheldt Estuary Campaign, September 13-November 6, 1944, Douglas & McIntyre Zuehlke, Mark (2008) Operation Husky: The Canadian Invasion of Sicily, July 10\u2013August 7, 1943, Douglas & McIntyre Zuehlke, Mark (2010) On to Victory: The Canadian Liberation of the Netherlands, March 23\u2013May 5, 1945, Douglas & McIntyre Zuehlke, Mark (2011) Breakout from Juno: First Canadian Army and the Normandy Campaign \u2013 July 4\u2013August 21, 1944, Douglas & McIntyre Official accounts \u2013 National Defence and the Canadian Forces Stacey, C P. (1948) The Canadian Army, 1939\u20131945 : An Official Historical Summary King's Printer, Ottawa (Downloadable PDF) Stacey, C P. (1970) Arms, Men and Governments: The War Policies of Canada, 1939\u20131945 Queen's Printer, Ottawa (Downloadable PDF) Stacey, C P. (1955) Official History of the Canadian Army in the Second World War, Vol I Six Years of War, Queen's Printer, Ottawa (Downloadable PDF) Nicholson, G. W. L. (1956) Official history of the Canadian Army in the Second World War, Vol II The Canadians in Italy, Queen's Printer, Ottawa (Downloadable PDF) Stacey, C P. (1960) Official History of the Canadian Army in the Second World War, Vol III The Victory Campaign: The Operations in Northwest Europe, 1944-45, Queen's Printer, Ottawa (Downloadable PDF) Feasby, W.R. (1956) Official History of the Canadian Medical Services, 1939\u20131945 , Vol 1 Organization and Campaigns Queen's Printer, Ottawa (Downloadable PDF) McAndrew, Bill; Bill Rawling, Michael Whitby (1995) Liberation: The Canadians in Europe Art Global (Downloadable PDF) Bashow, David L., \"Starfighter: A Loving Retrospective of the CF-104 Era in Canadian Fighter Aviation 1961\u20131986 \", Fortress Publications, Toronto, 1990 Soward, Stuart E., \"Hands to Flying Stations Volume 1: A Recollective History of Canadian Naval Aviation 1945\u20131954 \", Neptune, Victoria, 1993, Melady, John, \"Korea: Canada's Forgotten War\", MacMillan, Toronto, 1983, Meyers, Edward C., \"Thunder in the Morning Calm\", Vanwell Publishing, St. Catherines, 1992, Official accounts \u2013 National Defence and the Canadian Forces Historical Section General Staff, Army Headquarters (1956) Canada's Army in Korea: The United Nations Operations, 1950\u201353 , and Their Aftermath Queen's Printer (Downloadable PDF) Wood, F.W (1966) Official History of the Canadian Army in Korea: Strange Battleground Queen's Printer, Ottawa (Downloadable PDF) Thorgrimmson, E.C. Russell (1956) Canadian Naval Operations in Korean Waters, 1950\u20131955 Naval Historical Section, Canadian Forces Headquarters, Ottawa (Downloadable PDF) Aviation The Arrowheads, \"Arrow: The Story of the Avro Arrow from its Evolution to its Extinction\", Boston Mills Press, Erin, 1980, Barris, Ted. Behind The Glory: The Plan that Won the Allied Air War. Markham, Ontario: Thomas Allen & Son Publishers, 2005. Bashow, David L., \"All the Fine Young Eagles\", Stoddard, Toronto, 1996, Bashow, David L., \"Starfighter: A Loving Retrospective of the CF-104 Era in Canadian Fighter Aviation 1961\u20131986 \", Fortress Publications, Toronto, 1990 Greenhous, Brereton; Halliday, Hugh A. Canada's Air Forces, 1914\u20131999. Montreal: Editions Art Global and the Department of National Defence, 1999. . Greenhous, Harris, Johnston, & Rawling, \"The Crucible of War 1939\u20131945 : The Official History of the Royal Canadian Air Force Volume 3\", University of Toronto Press, Toronto, 1994, Hatch, F.J. Aerodrome of Democracy: Canada and the British Commonwealth Air Training Plan 1939\u20131945. Ottawa: Canadian Department of National Defence, 1983. Milberry, Larry, ed. Sixty Years\u2014The RCAF and CF Air Command 1924\u20131984. Toronto: Canav Books, 1984. Milberry, Larry. Aviation in Canada: Evolution of an Air Force. Toronto: Canav Books, 2010. . Mills, Carl, \"Banshees in the Royal Canadian Navy\", Banshee Publication, Willowdale, 1991 Roberts, Leslie. There Shall Be Wings. Toronto: Clark, Irwin and Co. Ltd., 1959. No ISBN. Shores, Christopher, \"History of the Royal Canadian Air Force\", Royce Publishing, Toronto, 1984, Soward, Stuart E., \"Hands to Flying Stations Volume 1: A Recollective History of Canadian Naval Aviation 1945\u20131954 \", Neptune, Victoria, 1993, Naval Arbuckle, J. Graeme, \"Badges of the Canadian Navy\", Nimbus, Halifax, 1987, Burrow, Len & Beaudoin, Emile, \"Unlucky Lady: The Life and Death of HMCS Athabaskan\", M&S, Toronto, 1987, \"Canada's Navy Annual\", Corvus Publishing, Calgary, 1986 Dunmore, Spencer, \"In Great Waters: \"The Epic Story of the Battle of the Atlantic 1939\u20131945 \", M&S, Toronto, 1999, Foster, J. A., \"Sea Wings: A Pictorial History of Canada's Waterborne Defence Aircraft\", Meuthen, Toronto, 1986, Fraser, Doug, \"Postwar Casualty: Canada's Merchant Navy\", Pottersfield Press, Lawrencetown Beach, 1997, Hadley, Michael L., U-Boats Against Canada: German Submarines in Canadian Waters, Mcgill Canada, 1990 Harbron, John D., \"The Longest Battle: The RCN in the Atlantic 1939\u20131945 \", Vanwell, St. Catherines, 1995 Johnston, Mac (2008). Corvettes Canada: Convoy Veterans of WWII Tell Their True Stories. Wiley. . Lamb, James B., \"A Bloody War\", M&S, Toronto, 1990, Lamb, James B., \"The Corvette War\", Signet Books, Scarborough, 1979, Lamb, James B., \"On the Triangle Run\", Totem, Toronto, 1987, Lynch, Thomas G. \"Canada's Flowers: History of the Corvettes of Canada\", Nimbus, Halifax, 1983, Lynch, Thomas G., \"The Flying 400: Canada's Hydrofoil Project\", Nimbus, Halifax, 1983, Macpherson, Ken, \"The River Class Destroyers of the Royal Canadian Navy\", Charles J. Mussen Publishers, Toronto, 1985, Macpherson, Ken & Burgess, John, \"The Ships of Canada's Naval Forces 1910\u20131993 \", Vanwell, St. Catherines, 1994, Mills, Carl, \"Banshees in the Royal Canadian Navy\", Banshee Publication, Willowdale, 1991 Perkins, Dave, \"Canada's Submariners 1914\u20131923 \", Boston Mills Press, Erin, 1989, Schull, Joseph. Ships of the Great Days: Canada's Navy in World War II, in series, Great Stories of Canada''. Macmillan, Toronto, 1962. 156 p., ill. Snowie, J. Allen, \"The Bonnie: HMCS Bonaventure\", Boston Mills Press, Erin, 1987, Soward, Stuart E., \"Hands to Flying Stations Volume 1: A Recollective History of Canadian Naval Aviation 1945\u20131954 \", Neptune, Victoria, 1993, External links Canadian Military History Gateway \u2013 Government of Canada Canadian Military History \u2013 Library and Archives Canada Canadian Military History \u2013 Wilfrid Laurier University War and the Foundation of Canada \u2013 Canadian War Museum CBC Archives (War & Conflict) \u2013 Canadian Broadcasting Corporation A Bibliography of Regimental and Military Histories and Relative Material \u2013 University of Calgary Library (2003)", "edit_actions": [{"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 41, "end_char_pos": 42}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 117, "end_char_pos": 118}, {"type": "R", "before": "1872-2000", "after": "1872\u20132000", "start_char_pos": 221, "end_char_pos": 230}, {"type": "R", "before": "1000-1754", "after": "1000\u20131754", "start_char_pos": 332, "end_char_pos": 341}, {"type": "R", "before": "1755-1871", "after": "1755\u20131871", "start_char_pos": 444, "end_char_pos": 453}, {"type": "R", "before": "1867-1967", "after": "1867\u20131967", "start_char_pos": 545, "end_char_pos": 554}, {"type": "R", "before": "1939-1945", "after": "1939\u20131945", "start_char_pos": 651, "end_char_pos": 660}, {"type": "R", "before": "1754-1763", "after": "1754\u20131763", "start_char_pos": 1241, "end_char_pos": 1250}, {"type": "R", "before": "1812-1813.", "after": "1812\u20131813.", "start_char_pos": 1344, "end_char_pos": 1354}, {"type": "R", "before": "1813-1814.", "after": "1813\u20131814.", "start_char_pos": 1432, "end_char_pos": 1442}, {"type": "R", "before": "1866-1870", "after": "1866\u20131870", "start_char_pos": 1702, "end_char_pos": 1711}, {"type": "R", "before": "1860-1870", "after": "1860\u20131870", "start_char_pos": 1988, "end_char_pos": 1997}, {"type": "R", "before": "1914-1916", "after": "1914\u20131916", "start_char_pos": 2081, "end_char_pos": 2090}, {"type": "R", "before": "1917-1918", "after": "1917\u20131918", "start_char_pos": 2172, "end_char_pos": 2181}, {"type": "R", "before": "1914-1918", "after": "1914\u20131918", "start_char_pos": 2408, "end_char_pos": 2417}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 2720, "end_char_pos": 2721}, {"type": "R", "before": "1914-1919.", "after": "1914\u20131919.", "start_char_pos": 2750, "end_char_pos": 2760}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 2829, "end_char_pos": 2830}, {"type": "R", "before": "1914-1923", "after": "1914\u20131923", "start_char_pos": 2896, "end_char_pos": 2905}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 3137, "end_char_pos": 3138}, {"type": "R", "before": "1914-1919", "after": "1914\u20131919", "start_char_pos": 3403, "end_char_pos": 3412}, {"type": "R", "before": "1914-1919", "after": "1914\u20131919", "start_char_pos": 3549, "end_char_pos": 3558}, {"type": "R", "before": "1914-1919", "after": "1914\u20131919", "start_char_pos": 3734, "end_char_pos": 3743}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 4092, "end_char_pos": 4093}, {"type": "R", "before": "1936-1939", "after": "1936\u20131939", "start_char_pos": 4385, "end_char_pos": 4394}, {"type": "R", "before": "1944-1945", "after": "1944\u20131945", "start_char_pos": 4488, "end_char_pos": 4497}, {"type": "R", "before": "1939-1945", "after": "1939\u20131945", "start_char_pos": 4823, "end_char_pos": 4832}, {"type": "R", "before": "1939-1945", "after": "1939\u20131945", "start_char_pos": 5076, "end_char_pos": 5085}, {"type": "R", "before": "1939-1945", "after": "1939\u20131945", "start_char_pos": 5409, "end_char_pos": 5418}, {"type": "R", "before": "1939-1945", "after": "1939\u20131945", "start_char_pos": 5694, "end_char_pos": 5703}, {"type": "R", "before": "1914-1915", "after": "1914\u20131915", "start_char_pos": 6011, "end_char_pos": 6020}, {"type": "R", "before": "1940-1944", "after": "1940\u20131944", "start_char_pos": 6137, "end_char_pos": 6146}, {"type": "R", "before": "1939-1943", "after": "1939\u20131943", "start_char_pos": 6636, "end_char_pos": 6645}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 7141, "end_char_pos": 7142}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 7593, "end_char_pos": 7594}, {"type": "R", "before": "- June 7-12", "after": "\u2013 June 7\u201312", "start_char_pos": 7708, "end_char_pos": 7719}, {"type": "R", "before": "10-August", "after": "10\u2013August", "start_char_pos": 7967, "end_char_pos": 7976}, {"type": "R", "before": "23-May", "after": "23\u2013May", "start_char_pos": 8091, "end_char_pos": 8097}, {"type": "R", "before": "- July 4-August", "after": "\u2013 July 4\u2013August", "start_char_pos": 8213, "end_char_pos": 8228}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 8276, "end_char_pos": 8277}, {"type": "R", "before": "1939-1945", "after": "1939\u20131945", "start_char_pos": 8358, "end_char_pos": 8367}, {"type": "R", "before": "1939-1945", "after": "1939\u20131945", "start_char_pos": 8518, "end_char_pos": 8527}, {"type": "R", "before": "1939-1945", "after": "1939\u20131945", "start_char_pos": 9157, "end_char_pos": 9166}, {"type": "R", "before": "1961-1986", "after": "1961\u20131986", "start_char_pos": 9465, "end_char_pos": 9474}, {"type": "R", "before": "1945-1954", "after": "1945\u20131954", "start_char_pos": 9620, "end_char_pos": 9629}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 9841, "end_char_pos": 9842}, {"type": "R", "before": "1950-53", "after": "1950\u201353", "start_char_pos": 9998, "end_char_pos": 10005}, {"type": "R", "before": "1950-1955", "after": "1950\u20131955", "start_char_pos": 10270, "end_char_pos": 10279}, {"type": "R", "before": "1961-1986", "after": "1961\u20131986", "start_char_pos": 10792, "end_char_pos": 10801}, {"type": "R", "before": "1939-1945", "after": "1939\u20131945", "start_char_pos": 11052, "end_char_pos": 11061}, {"type": "R", "before": "1945-1954", "after": "1945\u20131954", "start_char_pos": 11904, "end_char_pos": 11913}, {"type": "R", "before": "1939-1945", "after": "1939\u20131945", "start_char_pos": 12268, "end_char_pos": 12277}, {"type": "R", "before": "1939-1945", "after": "1939\u20131945", "start_char_pos": 12683, "end_char_pos": 12692}, {"type": "R", "before": "1910-1993", "after": "1910\u20131993", "start_char_pos": 13377, "end_char_pos": 13386}, {"type": "R", "before": "1914-1923", "after": "1914\u20131923", "start_char_pos": 13548, "end_char_pos": 13557}, {"type": "R", "before": "1945-1954", "after": "1945\u20131954", "start_char_pos": 13929, "end_char_pos": 13938}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 14016, "end_char_pos": 14017}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 14065, "end_char_pos": 14066}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 14121, "end_char_pos": 14122}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 14183, "end_char_pos": 14184}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 14235, "end_char_pos": 14236}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 14345, "end_char_pos": 14346}], "sents_char_pos": [0, 42, 118, 181, 662, 807, 1252, 1319, 1354, 1389, 1405, 1442, 1477, 1548, 1576, 1654, 1714, 1729, 1837, 1869, 2046, 2137, 2242, 2695, 2760, 2787, 2806, 3199, 3224, 3703, 4093, 4542, 4594, 4619, 4642, 4880, 5119, 5328, 5347, 5420, 5578, 5669, 5898, 5976, 6443, 6484, 6531, 6554, 7001, 7035, 7091, 7114, 7209, 7248, 7594, 7709, 7786, 8214, 8277, 8369, 8489, 8570, 8997, 9260, 9308, 9394, 9842, 9966, 10127, 10506, 10562, 10617, 10862, 10912, 11272, 11327, 11399, 11427, 11444, 11491, 11628, 11650, 11680, 11692, 11853, 12068, 12221, 12327, 12747, 12814, 13041, 13136, 13608, 13702, 13741, 14017]}
+{"doc_id": "3110063", "revision_depth": "1", "before_revision": "Daniel Dulany Addison ( 1863 \u2013 1936) was an American clergyman and writer. Biography Born on March 11, 1863 in Wheeling, West Virginia to Thomas Grafton and Marie A. E. , he graduated from Union College in 1883, then studied at the Episcopal Theological School , Cambridge, Massachusetts . He was ordained to the priesthood, becoming assistant rector of Christ Church, Springfield, Massachusetts, in 1886. Daniel was married on February 20, 1889 to Julia de Wolf Gibbs (1866\u20131952) an American writer. A member of many church societies, he gave special attention to conditions in Liberia. He was made a trustee of the College of Monrovia and in 1904 was knighted by the government of Liberia in recognition of his services. He died in Brookline, Massachusetts on March 27, 1936. Bibliography Among his published writings are: Lucy Larcom, Life, Letters, and Diary, (1894) Phillips Brooks, (1894) Life and Times of Edward Bass, First Bishop of Massachusetts, (1897) All Saints Church, Brookline, (1896) The Clergy in American Life and Letters, ( 1900 ) The Episcopalians, (1904) See also Episcopal Divinity School References ", "after_revision": "Daniel Dulany Addison ( March 11, 1863 \u2014 March 27, 1936) was an American clergyman and writer. Early years Addison was born on March 11, 1863 in Wheeling, West Virginia to Thomas Grafton (1832\u20131896) and Maria Eliason (Addison) Addison (1836\u20131901), grandson of Daniel Dulany and Louise (Gordon) Addison, great-grandson of Thomas and Henrietta (Paca) Addison, grandnephew of Walter Dulany Addison, and a descendant of William Paca, signer of the Declaration of Independence, and of Col. John Addison, first ancestor in America, who was a cousin of Joseph Addison, English poet and essayist. Career He was prepared for college at Emerson Institute, Washington, D.C. He graduated from Union College in 1883, then studied at the Episcopal Theological School at Cambridge, Massachusetts , where graduated in 1886. He was ordained to the priesthood, becoming assistant minister of Christ Church, Springfield, Massachusetts, from 1886 to 1889. Addison was married on February 20, 1889 , in Beverly, Massachusetts, to Julia de Wolf Gibbs (1866\u20131952) an American writer. He became rector of St. Peter's church at Beverly, Massachusetts, from 1889 to 1895, when started his service as rector of All Saints church at Brookline, Massachusetts. Last years A member of many church societies, he gave special attention to conditions in Liberia. He was made a trustee of the College of Monrovia and in 1904 was knighted by the government of Liberia in recognition of his services. He died in Brookline, Massachusetts on March 27, 1936. He was burred in Evergreen Cemetery at Marion, Massachusetts. Bibliography Addison wrote articles for the 1911 Encyclop\u00e6dia Britannica, these articles are designated by the initials \"D. D. A.\"EB1911 Contributors, p. 948 Among his published writings are: New England Town in the Civil War, (1890) Phillips Brooks, (1892) Lucy Larcom, Life, Letters, and Diary, (1894) All Saints Church, Brookline, (1895) The Life and Times of Edward Bass, First Bishop of Massachusetts, 1726-1803, (1897) The Clergy in American Life and Letters, ( 1899 ) The Episcopalians, (1904) References Citations Sources", "edit_actions": [{"type": "A", "before": null, "after": "March 11,", "start_char_pos": 24, "end_char_pos": 24}, {"type": "R", "before": "\u2013", "after": "\u2014 March 27,", "start_char_pos": 30, "end_char_pos": 31}, {"type": "R", "before": "Biography Born", "after": "Early years Addison was born", "start_char_pos": 76, "end_char_pos": 90}, {"type": "R", "before": "and Marie A. E. , he", "after": "(1832\u20131896) and Maria Eliason (Addison) Addison (1836\u20131901), grandson of Daniel Dulany and Louise (Gordon) Addison, great-grandson of Thomas and Henrietta (Paca) Addison, grandnephew of Walter Dulany Addison, and a descendant of William Paca, signer of the Declaration of Independence, and of Col. John Addison, first ancestor in America, who was a cousin of Joseph Addison, English poet and essayist.", "start_char_pos": 154, "end_char_pos": 174}, {"type": "A", "before": null, "after": "Career He was prepared for college at Emerson Institute, Washington, D.C. He", "start_char_pos": 175, "end_char_pos": 175}, {"type": "R", "before": ",", "after": "at", "start_char_pos": 263, "end_char_pos": 264}, {"type": "R", "before": ".", "after": ", where graduated in 1886.", "start_char_pos": 290, "end_char_pos": 291}, {"type": "R", "before": "rector", "after": "minister", "start_char_pos": 346, "end_char_pos": 352}, {"type": "R", "before": "in 1886. Daniel", "after": "from 1886 to 1889.", "start_char_pos": 399, "end_char_pos": 414}, {"type": "A", "before": null, "after": "Addison", "start_char_pos": 415, "end_char_pos": 415}, {"type": "A", "before": null, "after": ", in Beverly, Massachusetts,", "start_char_pos": 449, "end_char_pos": 449}, {"type": "A", "before": null, "after": "He became rector of St. Peter's church at Beverly, Massachusetts, from 1889 to 1895, when started his service as rector of All Saints church at Brookline, Massachusetts.", "start_char_pos": 505, "end_char_pos": 505}, {"type": "A", "before": null, "after": "Last years", "start_char_pos": 506, "end_char_pos": 506}, {"type": "A", "before": null, "after": "He was burred in Evergreen Cemetery at Marion, Massachusetts.", "start_char_pos": 784, "end_char_pos": 784}, {"type": "A", "before": null, "after": "Addison wrote articles for the 1911 Encyclop\u00e6dia Britannica, these articles are designated by the initials \"D. D. A.\"EB1911 Contributors, p. 948", "start_char_pos": 798, "end_char_pos": 798}, {"type": "A", "before": null, "after": "New England Town in the Civil War, (1890) Phillips Brooks, (1892)", "start_char_pos": 833, "end_char_pos": 833}, {"type": "R", "before": "Phillips Brooks, (1894)", "after": "All Saints Church, Brookline, (1895) The", "start_char_pos": 880, "end_char_pos": 903}, {"type": "A", "before": null, "after": "1726-1803,", "start_char_pos": 966, "end_char_pos": 966}, {"type": "D", "before": "All Saints Church, Brookline, (1896)", "after": null, "start_char_pos": 974, "end_char_pos": 1010}, {"type": "R", "before": "1900", "after": "1899", "start_char_pos": 1054, "end_char_pos": 1058}, {"type": "D", "before": "See also Episcopal Divinity School", "after": null, "start_char_pos": 1087, "end_char_pos": 1121}, {"type": "R", "before": "References", "after": "References", "start_char_pos": 1122, "end_char_pos": 1132}, {"type": "A", "before": null, "after": "Citations", "start_char_pos": 1133, "end_char_pos": 1133}, {"type": "A", "before": null, "after": "Sources", "start_char_pos": 1134, "end_char_pos": 1134}], "sents_char_pos": [0, 75, 291, 407, 504, 593, 728, 783]}
+{"doc_id": "31390213", "revision_depth": "1", "before_revision": "The Handspring Puppet Company is a puppetry performance and design company established in 1981 Kohler, Jones, Weinberg and Joubert. It is situated in Cape Town, South Africa. War Horse, a theatrical production seen by nearly eight million people, features horse puppets designed and created by Handspring Puppet Company . Episodes of an Easter Rising Esther van Ryswyk directed Episodes of an Easter Rising (1985), based on David Lytton's radio special of the same name. It told the story of how two white lesbian women became part of South Africa's anti-apartheid struggle. It premiered at the Baxter Theatre in Cape Town and toured to the National Arts Festival in Makhanda (formerly Grahamstown), WITS University Theatre in Johannesburg and to the 7th World Festival of Puppet Theatre in Charleville-M\u00e9zi\u00e8res, France. Ubu and the Truth Commission In 1997, they worked with William Kentridge (director) and Jane Taylor (scriptwriter) on Ubu and the Truth Commission. The play draws extensively on Alfred Jarry's absurdist production Ubu Roi (1896). It fuses the chaos of the Ubu legend with original testimony from witnesses at the post-apartheid Truth and Reconciliation Commission (TRC). It highlights Kentridge's work in the evolution of truth through a combination of fictional narratives and facts.The world premiere of Ubu and the Truth Commission followed on 17 June 1997, at the Kunsfest in Weimar. The production premiered in Weimer Germany on 17 June 1997. Over the next two years, it toured to 38 theatres in South Africa, Europe and the USA. Tall Horse Tall Horse (directed by Marthinus Basson in 2004) was a collaboration between the Sogolon Puppet Troupe of Mali and Handspring Puppet Company. The production has its roots in history \u2013 in 1827 the Pasha of Egypt, Muhammad Ali, sent a giraffe as a gift to King Charles X of France. The play dramatised the giraffe's journey across the Mediterranean Sea and the politics underlying it. With initial funding from the John F. Kennedy Centre in Washington, D.C, Tall Horse was further funded by Anglo Gold Ashanti, a mining company with interests in both Mali and South Africa.\"Tall Horse\" . Handsrping Puppet Company War Horse The maquette for Joey from the National Theatre production. The puppets were made by the Handspring Puppet Company. This scale model was a gift to writer Sir Michael Morpurgo, author of War Horse. The Handspring Puppet Company achieved critical acclaim when War Horse premiered at the Royal National Theatre in South Bank, London, on 17 October 2007.\"War Horse\" ltdb.co.uk, accessed 20 January 2010. Kohler and Jones worked with directors Marianne Elliott and Tom Morris and choreographer Toby Sedgwick to design and construct life-sized horse puppets, controlled by three actors. Two actors operate the legs and a third controls the head and neck, with all three actors providing a variety of sound effects. The company won an Olivier Award, Evening Standard Theatre Award and London Critics' Circle Theatre Award.\"Hairspray Wins Four 2008 Laurence Olivier Awards Including Best Musical\" playbill.com\"Evening Standard nominations \u2013 2007\" holidayextras.co.uk The show transferred to the West End on 28 March 2009,\"'War Horse' Opens In The West End 3/28/09\" broadwayworld.com, 8 December 2008 and on 15 March 2011, it premiered on Broadway at the Vivian Beaumont Theater . The play has performed globally to nearly eight million people worldwide. Or You Could Kiss Me The company collaborated with Neil Bartlett and Rae Smith on Or You Could Kiss Me, which opened at London's National Theatre on 5 October 2010, for a six-week season. The show has been described as \"an intimate history of two very private lives, lived in extraordinary times\". It was loosely based on the lives of Kohler and Jones and speculated on their future circumstances when both men reached the age of 85. Unmasking the Puppet \u20141987 This exhibition opened at the UNISA Gallery in Pretoria and toured to the Johannesburg Art Gallery, the Durban Art Museum, the Tatham Art Gallery in Pietermaritzburg and the South African National Gallery in Cape Town. Episodes 2001\u20132003 Presented in various venues across South Africa, this installation included puppets from seven productions created over 16 years. Episodes represented a retrospective of Handspring's work. The exhibition was sponsored by the Goodman Gallery. Patrimony 2004\u20132005 An exhibition of Bamana Puppets from Mali, it featured puppets from the extensive family collection of Yaya Coulibali. It toured South Africa. At Arms Length \u2013 The Art of African Puppetry \u2013 2006 Produced by the then Museum for African Art (now The Africa Center, New York) presented nearly 100 animated puppets, marionettes and puppet sculptures used in traditional and contemporary theatrical performances from Handspring and the Sogolon Puppet Troupe from Mali. The Puppet Show \u2013 2008 Produced by the Institute of Contemporary Art, Philadelphia, USA at the Pennsylvania State University and the Frye Art Museum in Seattle. Here the kinetic work of leading contemporary artists was set off against a backdrop of more puppeteers from the world of professional theatre. KKNK National Art Festival \u2013 2011 Selected as a featured visual artist for solo exhibition at the Klein Karoo National Arts Festival, held annually in Oudtshoorn, South Africa, Handspring Puppet Company exhibited puppets featured in performances in the preceding 2 years that were in line for further international touring. National Theatre Gallery London \u2013 2012 This exhibition explained the puppet-making process for War Horse. Circa Gallery, Johannesburg \u2013 2016 An exhibition of Joey and Topthorn, characters from War Horse, together with portraits of puppets in the Handspring archives which Kohler had realised as editioned linocut prints.", "after_revision": "The Handspring Puppet Company is a puppetry performance and design company established in 1981 by Adrian Kohler, Basil Jones, Weinberg and Joubert. It is based in Cape Town, South Africa. War Horse, a play seen by nearly eight million people, features horse puppets designed , created and operated by Handspring Puppet Company and actors . Episodes of an Easter Rising Esther van Ryswyk directed Episodes of an Easter Rising (1985), a play based on David Lytton's radio special of the same name. It told the story of two white lesbian women who became part of South Africa's anti-apartheid struggle. It premiered at the Baxter Theatre in Cape Town and toured to the National Arts Festival in Makhanda (formerly Grahamstown), WITS University Theatre in Johannesburg and to the 7th World Festival of Puppet Theatre in Charleville-M\u00e9zi\u00e8res, France. Ubu and the Truth Commission In 1997, they worked with William Kentridge (director) and Jane Taylor (scriptwriter) on Ubu and the Truth Commission. The play draws extensively on Alfred Jarry's absurdist production Ubu Roi (1896). It fuses the chaos of the Ubu legend with original testimony from witnesses at the post-apartheid Truth and Reconciliation Commission (TRC). It highlights Kentridge's work in the evolution of truth through a combination of fictional narratives and facts.The world premiere of Ubu and the Truth Commission followed on 17 June 1997, at the Kunsfest in Weimar. The production premiered in Weimer , Germany on 17 June 1997. Over the next two years, it toured to 38 theatres in South Africa, Europe and the USA. Tall Horse Tall Horse (directed by Marthinus Basson in 2004) was a collaboration between the Sogolon Puppet Troupe of Mali and Handspring Puppet Company. The production was based on historical events: in 1827 the Pasha of Egypt, Muhammad Ali, sent a giraffe as a gift to King Charles X of France. The play dramatised the giraffe's journey across the Mediterranean Sea and the politics underlying it. With initial funding from the John F. Kennedy Centre in Washington, D.C, Tall Horse was also supported by Anglo Gold Ashanti, a mining company with interests in both Mali and South Africa.\"Tall Horse\" . Handsrping Puppet Company War Horse The maquette for the horse Joey from the National Theatre production. The puppets were made by the Handspring Puppet Company. This scale model was a gift to writer Sir Michael Morpurgo, author of War Horse. The Handspring Puppet Company achieved critical acclaim when War Horse featuring life-size puppets they had created, premiered at the Royal National Theatre in South Bank, London, on 17 October 2007.\"War Horse\" ltdb.co.uk, accessed 20 January 2010. Kohler and Jones worked with directors Marianne Elliott and Tom Morris and choreographer Toby Sedgwick to design and construct life-sized horse puppets, each controlled by three actors. Two actors operate the legs and a third controls the head and neck, with all three actors providing a variety of sound effects. The company won an Olivier Award, Evening Standard Theatre Award and London Critics' Circle Theatre Award.\"Hairspray Wins Four 2008 Laurence Olivier Awards Including Best Musical\" playbill.com\"Evening Standard nominations \u2013 2007\" holidayextras.co.uk The show transferred to the West End on 28 March 2009,\"'War Horse' Opens In The West End 3/28/09\" broadwayworld.com, 8 December 2008 and on 15 March 2011, it premiered on Broadway at the Vivian Beaumont Theater in New York City . The play has been performed globally to nearly eight million people worldwide. Or You Could Kiss Me The company collaborated with Neil Bartlett and Rae Smith on Or You Could Kiss Me, which opened at London's National Theatre on 5 October 2010, for a six-week season. The show has been described as \"an intimate history of two very private lives, lived in extraordinary times\". It was loosely based on the lives of Kohler and Jones , and speculated on their future circumstances when both men reach the age of 85. Unmasking the Puppet \u20141987 This exhibition opened at the UNISA Gallery in Pretoria and toured to the Johannesburg Art Gallery, the Durban Art Museum, the Tatham Art Gallery in Pietermaritzburg , and the South African National Gallery in Cape Town. Episodes 2001\u20132003 Presented in various venues across South Africa, this installation included puppets from seven productions created over 16 years. Episodes represented a retrospective of Handspring's work. The exhibition was sponsored by the Goodman Gallery. Patrimony 2004\u20132005 An exhibition of Bamana Puppets from Mali, it featured puppets from the extensive family collection of Yaya Coulibali. It toured South Africa. At Arms Length \u2013 The Art of African Puppetry \u2013 2006 Produced by the Museum for African Art (now known as The Africa Center, New York) , this exhibit presented nearly 100 animated puppets, marionettes and puppet sculptures used in traditional and contemporary theatrical performances from Handspring and the Sogolon Puppet Troupe from Mali. The Puppet Show \u2013 2008 Produced by the Institute of Contemporary Art, Philadelphia, USA at the Pennsylvania State University and the Frye Art Museum in Seattle. Here the kinetic work of leading contemporary artists was set off against a backdrop of more puppeteers from the world of professional theatre. KKNK National Art Festival \u2013 2011 Selected as a featured visual artist for solo exhibition at the Klein Karoo National Arts Festival, held annually in Oudtshoorn, South Africa, Handspring Puppet Company exhibited puppets featured in performances in the preceding 2 years that were in line for further international touring. National Theatre Gallery London \u2013 2012 This exhibition explained the puppet-making process for War Horse. Circa Gallery, Johannesburg \u2013 2016 An exhibition of Joey and Topthorn, characters from War Horse, together with portraits of puppets in the Handspring archives which Kohler had realised as editioned linocut prints.", "edit_actions": [{"type": "R", "before": "Kohler,", "after": "by Adrian Kohler, Basil", "start_char_pos": 95, "end_char_pos": 102}, {"type": "R", "before": "situated", "after": "based", "start_char_pos": 138, "end_char_pos": 146}, {"type": "R", "before": "theatrical production", "after": "play", "start_char_pos": 188, "end_char_pos": 209}, {"type": "R", "before": "and created", "after": ", created and operated", "start_char_pos": 279, "end_char_pos": 290}, {"type": "A", "before": null, "after": "and actors", "start_char_pos": 320, "end_char_pos": 320}, {"type": "A", "before": null, "after": "a play", "start_char_pos": 416, "end_char_pos": 416}, {"type": "D", "before": "how", "after": null, "start_char_pos": 494, "end_char_pos": 497}, {"type": "A", "before": null, "after": "who", "start_char_pos": 522, "end_char_pos": 522}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1447, "end_char_pos": 1447}, {"type": "R", "before": "has its roots in history \u2013 in", "after": "was based on historical events: in", "start_char_pos": 1729, "end_char_pos": 1758}, {"type": "R", "before": "further funded", "after": "also supported", "start_char_pos": 2043, "end_char_pos": 2057}, {"type": "A", "before": null, "after": "the horse", "start_char_pos": 2211, "end_char_pos": 2211}, {"type": "A", "before": null, "after": "featuring life-size puppets they had created,", "start_char_pos": 2463, "end_char_pos": 2463}, {"type": "A", "before": null, "after": "each", "start_char_pos": 2749, "end_char_pos": 2749}, {"type": "A", "before": null, "after": "in New York City", "start_char_pos": 3367, "end_char_pos": 3367}, {"type": "A", "before": null, "after": "been", "start_char_pos": 3383, "end_char_pos": 3383}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3797, "end_char_pos": 3797}, {"type": "R", "before": "reached", "after": "reach", "start_char_pos": 3857, "end_char_pos": 3864}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4073, "end_char_pos": 4073}, {"type": "D", "before": "then", "after": null, "start_char_pos": 4619, "end_char_pos": 4623}, {"type": "A", "before": null, "after": "known as", "start_char_pos": 4652, "end_char_pos": 4652}, {"type": "A", "before": null, "after": ", this exhibit", "start_char_pos": 4682, "end_char_pos": 4682}], "sents_char_pos": [0, 131, 174, 472, 577, 823, 971, 1053, 1194, 1308, 1411, 1472, 1559, 1713, 1851, 1954, 2143, 2254, 2310, 2391, 2546, 2595, 2777, 2905, 3012, 3369, 3444, 3632, 3742, 3879, 4126, 4275, 4334, 4387, 4526, 4550, 4873, 5034, 5178, 5502, 5608]}
+{"doc_id": "320319", "revision_depth": "1", "before_revision": "Four principles How to Solve It suggests the following steps when solving a mathematical problem: First, you have to understand the problem. pp .6-8 After understanding, make a plan. pp .8-12 Carry out the plan. pp .12-14 Look back on your work. pp .14-15 How could it be better? If this technique fails, P\u00f3lya advises: p114 \"If you can't solve a problem, then there is an easier problem you can solve: find it.\" Or: \"If you cannot solve the proposed problem, try to solve first some related problem. Could you imagine a more accessible related problem?\" \"Understand the problem\" is often neglected as being obvious and is not even mentioned in many mathematics classes. Yet students are often stymied in their efforts to solve it, simply because they don't understand it fully, or even in part. In order to remedy this oversight, P\u00f3lya taught teachers how to prompt each student with appropriate questions, p33 depending on the situation, such as: What are you asked to find or show? p214 Can you restate the problem in your own words? Can you think of a picture or a diagram that might help you understand the problem? Is there enough information to enable you to find a solution? Do you understand all the words used in stating the problem? Do you need to ask a question to get the answer? Guess and check p99 Make an orderly list p2 Eliminate possibilities p94 Use symmetry p199 Consider special cases p190 Use direct reasoning Solve an equation p172 P\u00f3lya advises teachers that asking students to immerse themselves in routine operations only, instead of enhancing their imaginative / judicious side is inexcusable. Look for a pattern p108 Draw a picture pp103-108 Solve a simpler problem p114 P\u00f3lya notes that 'human superiority consists in going around an obstacle that cannot be overcome directly' Use a model p105, p29-32 , for example, P\u00f3lya discusses the problem of water flowing into a cone as an example of what is required to visualize the problem, using a figure. Work backward p105, p225 Use a formula pp141-148. P\u00f3lya describes the method of analysis Be creative p172 (P\u00f3lya advises that this requires that the student have the patience to wait until the bright idea appears (subconsciously).) Applying these rules to devise a plan takes your own skill and judgement. pp148-149. In the dictionary entry 'Pedantry & mastery' P\u00f3lya cautions pedants to 'always use your own brains first' Polya lays a big emphasis on the teachers' behavior. A teacher should support students with devising their own plan with a question method that goes from the most general questions to more particular questions, with the goal that the last step to having a plan is made by the student. He maintains that just showing students a plan, no matter how good it is, does not help them. This step is usually easier than devising the plan. p .35 In general, all you need is care and patience, given that you have the necessary skills. Persist with the plan that you have chosen. If it continues not to work, discard it and choose another. Don't be misled; this is how mathematics is done, even by professionals. P\u00f3lya mentions that much can be gained by taking the time to reflect and look back at what you have done, what worked and what did not, and with thinking about other problems where this could be useful. p .36 pp.14-19 Doing this will enable you to predict what strategy to use to solve future problems, if these relate to the original problem.", "after_revision": "Four principles How to Solve It suggests the following steps when solving a mathematical problem: First, you have to understand the problem. pp . 6\u20138 After understanding, make a plan. pp . 8\u201312 Carry out the plan. pp . 12\u201314 Look back on your work. pp . 14\u201315 How could it be better? If this technique fails, P\u00f3lya advises: p. 114 \"If you can't solve a problem, then there is an easier problem you can solve: find it.\" Or: \"If you cannot solve the proposed problem, try to solve first some related problem. Could you imagine a more accessible related problem?\" \"Understand the problem\" is often neglected as being obvious and is not even mentioned in many mathematics classes. Yet students are often stymied in their efforts to solve it, simply because they don't understand it fully, or even in part. In order to remedy this oversight, P\u00f3lya taught teachers how to prompt each student with appropriate questions, p. 33 depending on the situation, such as: What are you asked to find or show? p. 214 Can you restate the problem in your own words? Can you think of a picture or a diagram that might help you understand the problem? Is there enough information to enable you to find a solution? Do you understand all the words used in stating the problem? Do you need to ask a question to get the answer? Guess and check p. 99 Make an orderly list p. 2 Eliminate possibilities p. 94 Use symmetry p. 199 Consider special cases p. 190 Use direct reasoning Solve an equation p. 172 P\u00f3lya advises teachers that asking students to immerse themselves in routine operations only, instead of enhancing their imaginative / judicious side is inexcusable. Look for a pattern p. 108 Draw a picture pp. 103\u2013108 Solve a simpler problem p. 114 P\u00f3lya notes that 'human superiority consists in going around an obstacle that cannot be overcome directly' Use a model p. 105, pp. 29\u201332 , for example, P\u00f3lya discusses the problem of water flowing into a cone as an example of what is required to visualize the problem, using a figure. Work backward p. 105, p. 225 Use a formula pp. 141\u2013148. P\u00f3lya describes the method of analysis Be creative p. 172 (P\u00f3lya advises that this requires that the student have the patience to wait until the bright idea appears (subconsciously).) Applying these rules to devise a plan takes your own skill and judgement. pp. 148\u2013149. In the dictionary entry 'Pedantry & mastery' P\u00f3lya cautions pedants to 'always use your own brains first' Polya lays a big emphasis on the teachers' behavior. A teacher should support students with devising their own plan with a question method that goes from the most general questions to more particular questions, with the goal that the last step to having a plan is made by the student. He maintains that just showing students a plan, no matter how good it is, does not help them. This step is usually easier than devising the plan. p . 35 In general, all you need is care and patience, given that you have the necessary skills. Persist with the plan that you have chosen. If it continues not to work, discard it and choose another. Don't be misled; this is how mathematics is done, even by professionals. P\u00f3lya mentions that much can be gained by taking the time to reflect and look back at what you have done, what worked and what did not, and with thinking about other problems where this could be useful. p . 36 pp. 14\u201319 Doing this will enable you to predict what strategy to use to solve future problems, if these relate to the original problem.", "edit_actions": [{"type": "R", "before": ".6-8", "after": ". 6\u20138", "start_char_pos": 144, "end_char_pos": 148}, {"type": "R", "before": ".8-12", "after": ". 8\u201312", "start_char_pos": 186, "end_char_pos": 191}, {"type": "R", "before": ".12-14", "after": ". 12\u201314", "start_char_pos": 215, "end_char_pos": 221}, {"type": "R", "before": ".14-15", "after": ". 14\u201315", "start_char_pos": 249, "end_char_pos": 255}, {"type": "R", "before": "p114", "after": "p. 114", "start_char_pos": 320, "end_char_pos": 324}, {"type": "R", "before": "p33", "after": "p. 33", "start_char_pos": 908, "end_char_pos": 911}, {"type": "R", "before": "p214", "after": "p. 214", "start_char_pos": 985, "end_char_pos": 989}, {"type": "R", "before": "p99", "after": "p. 99", "start_char_pos": 1309, "end_char_pos": 1312}, {"type": "R", "before": "p2 Eliminate possibilities p94 Use symmetry p199", "after": "p. 2 Eliminate possibilities p. 94 Use symmetry p. 199", "start_char_pos": 1334, "end_char_pos": 1382}, {"type": "R", "before": "p190", "after": "p. 190", "start_char_pos": 1406, "end_char_pos": 1410}, {"type": "R", "before": "p172", "after": "p. 172", "start_char_pos": 1450, "end_char_pos": 1454}, {"type": "R", "before": "p108", "after": "p. 108", "start_char_pos": 1640, "end_char_pos": 1644}, {"type": "R", "before": "pp103-108", "after": "pp. 103\u2013108", "start_char_pos": 1660, "end_char_pos": 1669}, {"type": "R", "before": "p114", "after": "p. 114", "start_char_pos": 1694, "end_char_pos": 1698}, {"type": "R", "before": "p105, p29-32", "after": "p. 105, pp. 29\u201332", "start_char_pos": 1818, "end_char_pos": 1830}, {"type": "R", "before": "p105, p225", "after": "p. 105, p. 225", "start_char_pos": 1993, "end_char_pos": 2003}, {"type": "R", "before": "pp141-148.", "after": "pp. 141\u2013148.", "start_char_pos": 2018, "end_char_pos": 2028}, {"type": "R", "before": "p172", "after": "p. 172", "start_char_pos": 2080, "end_char_pos": 2084}, {"type": "R", "before": "pp148-149.", "after": "pp. 148\u2013149.", "start_char_pos": 2285, "end_char_pos": 2295}, {"type": "R", "before": ".35", "after": ". 35", "start_char_pos": 2835, "end_char_pos": 2838}, {"type": "R", "before": ".36 pp.14-19", "after": ". 36 pp. 14\u201319", "start_char_pos": 3310, "end_char_pos": 3322}], "sents_char_pos": [0, 279, 412, 500, 670, 795, 1036, 1120, 1182, 1243, 1292, 1620, 1978, 2028, 2210, 2295, 2454, 2686, 2780, 2927, 2971, 3031, 3048, 3104]}
+{"doc_id": "3232061", "revision_depth": "1", "before_revision": "Tutorial example upright=1.5|Tutorial illustration of isotope dilution analysis with fish counting in lakes Isotope dilution can be effectively explained using mark and recapture method from biology - a method commonly used in ecology to estimate the population sizeof fish . Isotope dilution can be likened to Lincoln-Petersen method. Assume that the number of fish in a pond is to be determined. Five labeled fish are added to the pond during the first visit (nB = 5). On the second visit, a number of fish is captured and one observes that the ratio of native-to-labeled is 10:1. From here, we can estimate the original number of fish in the pond, nA : This is a simplified view of isotope dilution yet it illustrates the salient features of isotope dilution . A more complex situation arises when the distinction between labeled and unlabeled fish becomes fuzzy. This can occur, for example, when the lake already contains a small number of labeled fish from the previous field experiments . In such situation, the following expression can be employed: where RA is the ratio of the native-to-labeled fish in the lake , RB is the ratio of the native-to-labeled fish in the lot of nB marked fish which are added to the pond, and RAB is the ratio of the native-to-labeled fish captured during the second visit.", "after_revision": "Tutorial example upright=1.5|Tutorial illustration of isotope dilution analysis with fish counting in lakes Isotope dilution is analogous to the mark and recapture method , commonly used in ecology to estimate population size . For instance, consider the determination of the number of fish (nA) in a lake. For the purpose of this example, assume all fish native to the lake are blue. On their first visit to the lake, an ecologist adds five yellow fish (nB = 5). On their second visit, the ecologist captures a number of fish according to a sampling plan and observes that the ratio of blue-to-yellow (i.e. native-to-marked) fish is 10:1. The number of fish native to the lake can be calculated using the following equation : This is a simplified view of isotope dilution but it illustrates the method's salient features . A more complex situation arises when the distinction between marked and unmarked fish becomes fuzzy. This can occur, for example, when the lake already contains a small number of marked fish from previous field experiments ; and vice versa, where the amount of marked fish added contains a small number of unmarked fish. In a laboratory setting, an unknown (the \"lake\") may contain a quantity of a compound that is naturally present in dominant (\"blue\") and lesser (\"yellow\") isotopic forms. A standard that is enriched with the lesser isotopic form may then be added to the unknown, which can be subsequently analyzed. Keeping to the fish analogy, the following expression can be employed: where , as indicated above, nA and nB represent the number of fish in the lake and the number of fish added to the lake, respectively; RA is the ratio of the native-to-marked fish in the lake prior to the addition of marked fish; RB is the ratio of the native-to-marked fish in the amount of marked fish added to the lake; finally, RAB is the ratio of the native-to-marked fish captured during the second visit.", "edit_actions": [{"type": "R", "before": "can be effectively explained using", "after": "is analogous to the", "start_char_pos": 125, "end_char_pos": 159}, {"type": "R", "before": "from biology - a method", "after": ",", "start_char_pos": 186, "end_char_pos": 209}, {"type": "R", "before": "the population sizeof fish", "after": "population size", "start_char_pos": 247, "end_char_pos": 273}, {"type": "R", "before": "Isotope dilution can be likened to Lincoln-Petersen method. Assume that the", "after": "For instance, consider the determination of the", "start_char_pos": 276, "end_char_pos": 351}, {"type": "R", "before": "in a pond is to be determined. Five labeled fish are added to the pond during the first visit", "after": "(nA) in a lake. For the purpose of this example, assume all fish native to the lake are blue. On their first visit to the lake, an ecologist adds five yellow fish", "start_char_pos": 367, "end_char_pos": 460}, {"type": "R", "before": "the", "after": "their", "start_char_pos": 474, "end_char_pos": 477}, {"type": "A", "before": null, "after": "the ecologist captures", "start_char_pos": 492, "end_char_pos": 492}, {"type": "R", "before": "is captured and one", "after": "according to a sampling plan and", "start_char_pos": 510, "end_char_pos": 529}, {"type": "R", "before": "native-to-labeled", "after": "blue-to-yellow (i.e. native-to-marked) fish", "start_char_pos": 557, "end_char_pos": 574}, {"type": "R", "before": "From here, we can estimate the original", "after": "The", "start_char_pos": 584, "end_char_pos": 623}, {"type": "R", "before": "in the pond, nA", "after": "native to the lake can be calculated using the following equation", "start_char_pos": 639, "end_char_pos": 654}, {"type": "R", "before": "yet", "after": "but", "start_char_pos": 703, "end_char_pos": 706}, {"type": "R", "before": "salient features of isotope dilution", "after": "method's salient features", "start_char_pos": 726, "end_char_pos": 762}, {"type": "R", "before": "labeled and unlabeled", "after": "marked and unmarked", "start_char_pos": 826, "end_char_pos": 847}, {"type": "R", "before": "labeled fish from the", "after": "marked fish from", "start_char_pos": 946, "end_char_pos": 967}, {"type": "R", "before": ". In such situation, the", "after": "; and vice versa, where the amount of marked fish added contains a small number of unmarked fish. In a laboratory setting, an unknown (the \"lake\") may contain a quantity of a compound that is naturally present in dominant (\"blue\") and lesser (\"yellow\") isotopic forms. A standard that is enriched with the lesser isotopic form may then be added to the unknown, which can be subsequently analyzed. Keeping to the fish analogy, the", "start_char_pos": 995, "end_char_pos": 1019}, {"type": "A", "before": null, "after": ", as indicated above, nA and nB represent the number of fish in the lake and the number of fish added to the lake, respectively;", "start_char_pos": 1064, "end_char_pos": 1064}, {"type": "R", "before": "native-to-labeled", "after": "native-to-marked", "start_char_pos": 1088, "end_char_pos": 1105}, {"type": "R", "before": ",", "after": "prior to the addition of marked fish;", "start_char_pos": 1123, "end_char_pos": 1124}, {"type": "R", "before": "native-to-labeled", "after": "native-to-marked", "start_char_pos": 1148, "end_char_pos": 1165}, {"type": "R", "before": "lot of nB marked fish which are", "after": "amount of marked fish", "start_char_pos": 1178, "end_char_pos": 1209}, {"type": "R", "before": "pond, and", "after": "lake; finally,", "start_char_pos": 1223, "end_char_pos": 1232}, {"type": "R", "before": "native-to-labeled", "after": "native-to-marked", "start_char_pos": 1257, "end_char_pos": 1274}], "sents_char_pos": [0, 275, 335, 397, 470, 583, 764, 867, 996]}
+{"doc_id": "3279703", "revision_depth": "2", "before_revision": "For example, if the most prevalent pattern/grade is 2, and the second most prevalent grade is 1, then the Gleason score is 2+1=3. If the neoplasm has only one pattern, the grade of that pattern is doubled to obtain the score. For example a tumor is all pattern 1, the Gleason score would be 1+1=2. The most differentiated tumor would have the lowest score, Gleason 2 (1+1), while the most differentiated neoplasm (not resembling native prostate tissue) would have a the higest score, Gleason 10 (5+5). Gleason scores range from 2 to 10 , there is no 0 or 1 by definition. Cytological differences between normal prostate to neoplastic glands are evident in changes to the typical two cell layers of the gland. In prostatic adenocarcinoma, the basal (bottom, usually cuboidal type) cell layer is lost, with only the top layer (usally columnar to pseudostratified) remaining. Score descriptions Using this system the most well-differentiated tumors have a Gleason score/grade of 2, and the least-differentiated tumors a score of 10. Range by definition is from 2-10, with architectural type being from 1-5 and always doubled or added together accordingly as described above. Gleason scores are often grouped together, based on similar behaviour: Grade 2-4 being well-differentiated neoplasm , Grade 5-6 intermediate-grade neoplasm , Grade 7 moderately - poorly differentiated grade neoplasm, Grade 8-10 high-grade neoplasm. Gleason 1 Gleason pattern 1 is the most well differentiated tumor pattern. It is a well defined nodule of single/separate, closely/densely packed, back-to-back gland pattern that does not invade into adjacent healthy prostatic tissue. The glands are round to oval shaped and proportionally large, comparing them to Gleason pattern 3 tumors, and are approximately equal in size and shape to one another. Gleason 2 Gleason 2 are fairly well circumscribed nodules of single, separate glands. However, the glands are looser in arrangement and not as uniform as in pattern 1. Minimal invasion by neoplastic glands into the surrounding healthy prostate tissue may be seen. Similar to Gleason 1, the glands are usually larger than those of Gleason 3 patterns, and are round to oval in shape. Thus the main difference between Gleason 1 and 2 is the density of packing of the glands seen and invasion is possible in Gleason 2, not in Gleason 1 by definition. Gleason 4 Gleason pattern 4 glands are no longer single/separated glands like those seen in pattern 1-3. They look fused together, difficult to distinguish, with rare lumen formation vs Gleason 1-3 which usually all have open lumens (spaces) within the glands, or they can be cribriform-(resembling the cribriform plate/similar to a sieve . An item with many perforations). Fused glands are chains, nests, or groups of glands that are no longer entirely separated by stroma-(connective tissue that normally separates individual glands in this case). Fused glands contain occasional stroma giving the appearance of \"partial\" separation of the glands. Due to this partial separation, fused glands sometimes have a scalloped (think looking at a slice of bread with bite taken out of it) appearance at their edges. The majority of treatable/treated cancers are of Gleason scores 5 - 7 and are detected due to biopsy after abnormal digital rectal exam or prostate specific antigen evaluation . A Gleason score of 7 can be 3+4= 7, where the majority is pattern 3, or it can be 4+3=7 in which pattern 4 dominates, resulting in a more advanced stage . The cancer is typically located in the peripheral zone usually the posterior portion, explaining the rationale of performing the digital rectal exam.", "after_revision": "For example, if the most prevalent pattern/grade is 2, and the second most prevalent grade is 1, then the Gleason score is 2+1=3. If the neoplasm has only one pattern, the grade of that pattern is doubled to obtain the score. For example , if a tumor is entirely grade 1, the Gleason score would be 1+1=2. The most differentiated tumor would have the lowest score, Gleason 2 (1+1), while the most differentiated neoplasm (not resembling native prostate tissue) would have the higest score, Gleason 10 (5+5). Gleason scores range from 2 to 10 ; by definition there is no score of 0 or 1. Cytological differences between normal prostate and neoplastic glands are evident in changes to the typical two cell layers of the gland. In prostatic adenocarcinoma, the basal (bottom, usually cuboidal type) cell layer is lost, with only the top layer (usally columnar to pseudostratified) remaining. Score descriptions Using this system , the most well-differentiated tumors have a Gleason score/grade of 2, and the least-differentiated tumors a score of 10. Range by definition is from 2-10, with architectural type from 1-5 , and always added together or doubled, as described above. Gleason scores are often grouped together, based on similar behaviour: Grade 2-4 as well-differentiated , Grade 5-6 as intermediately-differentiated , Grade 7 as moderately to poorly differentiated (either 3+4=7, where the majority is pattern 3, or 4+3=7 in which pattern 4 dominates and indicates less differentiation., and Grade 8-10 as \" high-grade .\" Gleason 1 Gleason pattern 1 is the most well-differentiated tumor pattern. It is a well-defined nodule of single/separate, closely/densely packed, back-to-back gland pattern that does not invade into adjacent healthy prostatic tissue. The glands are round to oval shaped and proportionally large, compared to to Gleason pattern 3 tumors, and are approximately equal in size and shape to one another. Gleason 2 Gleason 2 is fairly well-circumscribed nodules of single, separate glands. However, the glands are looser in arrangement and not as uniform as in pattern 1. Minimal invasion by neoplastic glands into the surrounding healthy prostate tissue may be seen. Similar to Gleason 1, the glands are usually larger than those of Gleason 3 patterns, and are round to oval in shape. Thus the main difference between Gleason 1 and 2 is the density of packing of the glands seen ; invasion is possible in Gleason 2, but by definition not in Gleason 1. Gleason 4 Gleason pattern 4 glands are no longer single/separated glands like those seen in patterns 1-3. They look fused together, difficult to distinguish, with rare lumen formation vs Gleason 1-3 which usually all have open lumens (spaces) within the glands, or can be cribriform-(resembling the cribriform plate/similar to a sieve : an item with many perforations). Fused glands are chains, nests, or groups of glands that are no longer entirely separated by stroma-(connective tissue that normally separates individual glands in this case). Fused glands contain occasional stroma giving the appearance of \"partial\" separation of the glands. Due to this partial separation, fused glands sometimes have a scalloped (think looking at a slice of bread with bite taken out of it) appearance at their edges. The majority of treatable/treated cancers are of Gleason scores 5-7 and are detected due to biopsy after abnormal digital rectal exam or prostate specific antigen evaluation . The cancer is typically located in the peripheral zone usually the posterior portion, explaining the rationale of performing the digital rectal exam.", "edit_actions": [{"type": "A", "before": null, "after": ", if", "start_char_pos": 238, "end_char_pos": 238}, {"type": "R", "before": "all pattern", "after": "entirely grade", "start_char_pos": 250, "end_char_pos": 261}, {"type": "D", "before": "a", "after": null, "start_char_pos": 465, "end_char_pos": 466}, {"type": "R", "before": ",", "after": "; by definition", "start_char_pos": 537, "end_char_pos": 538}, {"type": "A", "before": null, "after": "score of", "start_char_pos": 551, "end_char_pos": 551}, {"type": "R", "before": "1 by definition.", "after": "1.", "start_char_pos": 557, "end_char_pos": 573}, {"type": "R", "before": "to", "after": "and", "start_char_pos": 622, "end_char_pos": 624}, {"type": "A", "before": null, "after": ",", "start_char_pos": 912, "end_char_pos": 912}, {"type": "D", "before": "being", "after": null, "start_char_pos": 1091, "end_char_pos": 1096}, {"type": "R", "before": "and always doubled or added together accordingly", "after": ", and always added together or doubled,", "start_char_pos": 1106, "end_char_pos": 1154}, {"type": "R", "before": "being", "after": "as", "start_char_pos": 1256, "end_char_pos": 1261}, {"type": "D", "before": "neoplasm", "after": null, "start_char_pos": 1282, "end_char_pos": 1290}, {"type": "R", "before": "intermediate-grade neoplasm", "after": "as intermediately-differentiated", "start_char_pos": 1303, "end_char_pos": 1330}, {"type": "R", "before": "moderately - poorly differentiated grade neoplasm,", "after": "as moderately to poorly differentiated (either 3+4=7, where the majority is pattern 3, or 4+3=7 in which pattern 4 dominates and indicates less differentiation., and", "start_char_pos": 1341, "end_char_pos": 1391}, {"type": "A", "before": null, "after": "as \"", "start_char_pos": 1403, "end_char_pos": 1403}, {"type": "R", "before": "neoplasm.", "after": ".\"", "start_char_pos": 1415, "end_char_pos": 1424}, {"type": "R", "before": "well differentiated", "after": "well-differentiated", "start_char_pos": 1465, "end_char_pos": 1484}, {"type": "R", "before": "well defined", "after": "well-defined", "start_char_pos": 1508, "end_char_pos": 1520}, {"type": "R", "before": "comparing them to", "after": "compared to to", "start_char_pos": 1722, "end_char_pos": 1739}, {"type": "R", "before": "are fairly well circumscribed", "after": "is fairly well-circumscribed", "start_char_pos": 1848, "end_char_pos": 1877}, {"type": "R", "before": "and", "after": ";", "start_char_pos": 2304, "end_char_pos": 2307}, {"type": "A", "before": null, "after": "but by definition", "start_char_pos": 2343, "end_char_pos": 2343}, {"type": "R", "before": "1 by definition.", "after": "1.", "start_char_pos": 2359, "end_char_pos": 2375}, {"type": "R", "before": "pattern", "after": "patterns", "start_char_pos": 2468, "end_char_pos": 2475}, {"type": "D", "before": "they", "after": null, "start_char_pos": 2640, "end_char_pos": 2644}, {"type": "R", "before": ". An", "after": ": an", "start_char_pos": 2715, "end_char_pos": 2719}, {"type": "R", "before": "5 - 7", "after": "5-7", "start_char_pos": 3251, "end_char_pos": 3256}, {"type": "D", "before": ". A Gleason score of 7 can be 3+4= 7, where the majority is pattern 3, or it can be 4+3=7 in which pattern 4 dominates, resulting in a more advanced stage", "after": null, "start_char_pos": 3363, "end_char_pos": 3517}], "sents_char_pos": [0, 129, 225, 298, 502, 573, 710, 874, 1174, 1424, 1499, 1659, 1827, 1913, 2091, 2209, 2375, 2480, 2716, 2749, 2925, 3025, 3186, 3519]}
+{"doc_id": "33604595", "revision_depth": "1", "before_revision": "Situational logic is a label coined by Karl Popper to identify a logical theory of reasoning capable of expanding reliable knowledge. Human reasoning is prompted by problems which focus the attention of an individual or group on a situation: \u201cthe stimulus of practical problems\u201d arising in given \u201cspecific initial conditions.\u201d Some kind of habitual practice or belief, once justified by a theory, breaks down, stops \u201cworking,\u201d in unique existing conditions. Situational logic tries to solve such a breakdown by rejoining conceptual theory\u2014hypothetical universal regularities or general continuing factors\u2014to operational practice in unique situational conditions. For Popper, a situation prompting reasoning is a cognitive breakdown. A theory fails to work and must be replaced. His situational logic prescribes conjecturing potential new universal regularities from which to deduce logical solutions capable of restoring unity to theory and practice.%DIFDELCMD < %DIFDELCMD < %%% John Dewey preceded Popper in recognizing this situational need to reason, but his logical steps defining and solving problems are radically incompatible. For Dewey, a situation prompting reasoning is an operational breakdown with conceptual implications. It is a pre-cognitive and unspeakable experience. The practical continuity of an established practice must be restored. His situational logic prescribes responding by inductively defining observable conditions operating in the situation, from which to deduce practical solutions restoring unity to theory and practice. Both men accepted the instrumental criterion of judgment to identify breakdown of continuing factors.Instrumental and intrinsic value But Popper added an independent criterion of judgment: logical coherence in theories. Dewey held logical coherence to be integral with operational success. A situation becomes cognitive only through inductive operations.%DIFDELCMD < %DIFDELCMD < %%% Assuming independent criteria of practical and logical judgment contaminates reasoning. It reflects the traditional fact-value distinction between knowledge of concrete situations\u2014particular facts known by induction\u2014and theoretical knowledge of universal regularities\u2014deduced from general laws known intuitively to be right. Objective value-free facts that work may not correlate with subjective fact-free preferences, intentions, expectations. These incompatible criteria are present today in popular approaches to rational problem solving, without acknowledgment of their philosophical origins. Popper's logic underlies the value-free tool labelled SWOT analysis widely applied to conjectural situations in business and government. Situational awareness is a technological application of Dewey's instrumental situational logic. In the fact-free mediation tool labeled Mindfulness, the pre-cognitive starting point of Dewey\u2019s logic appears as a valued end point. Dividing theory from practice and fact from value contaminates rationality.%DIFDELCMD < %DIFDELCMD < %%% This article presents the background of \u2018\u2019this\u2019\u2019 still-indeterminate situation of mutually incompatible logics. It draws largely on the Library of Living Philosophers, edited by Paul Arthur Schilpp, which honored Dewey in its first volume and Popper in its fourteenth volume. Summary of Dewey\u2019s position is followed by a critique by Bertrand Russell, one of 17 scholars offering descriptive and critical essays, and Dewey\u2019s response.Summary of Popper\u2019s position is followed by an essay (one of 33) by Henryk Skolimowski, and Popper\u2019s response. Logic of John Dewey (1859-1952)In Logic: The Theory of Inquiry, published in 1938, Dewey reported results of years spent criticizing traditional academic philosophy. He hoped to have resolved philosophers\u2019 perennial debate over how to extend human understanding by relating facts\u2014particular valuation-free means used in practice\u2014to valuations\u2014general fact-free theoretical ends. He made \u201c situation \u201d a universal focus to eliminate the imagined autonomy of theory and practice. A problematic situation arises when some pattern of correlated belief and behavior breaks down. The obstruction generates a need to understand the cause of breakdown and how to overcome it. The need is an objective fact of every unique situation, not a subjective opinion or preference.%DIFDELCMD < %DIFDELCMD < %%% A situation becomes an object of discourse when those experiencing breakdown are forced to reason about it. Is it a breakdown of some known kind of regularity? Can some universal regularity be found conjoined to unique observable traits? Answering such questions requires induction: \u201c\u2026 laws of uniform relations are ultimately instrumentalities for control of individualized situations \u2026 Historically, induction has been a method for arriving at laws of uniform relations by moving from particulars to the general. In common sense, it starts with observation of some regularity and an inference that that regularity is in fact a continuing factor. The inference is strengthened by counting its frequency of observation\u2014numerical induction.%DIFDELCMD < %DIFDELCMD < %%% In modern science, the permanence of traits and kinds is determined experimentally by transforming what is existentially given into abstract universal kinds of traits\u2014operational induction. Each situation is made into a \u201ckind\u201d by identifying relevant data. Here is one example of Dewey's situational steps to define kinds of data relevant to solving a problematic situation. A man is found dead in unusual circumstances.%DIFDELCMD < %DIFDELCMD < %%% He referred to a famous example of numerical induction that failed for lack of these operations determining continuing factors: \u201cAll swans are white.\u201d It confused all swans-as-observable-birds with the abstraction swan-as-an-abstract-species with conjectured determinate universal traits\u2014found not to include color of feathers. Dewey offered inductive plus deductive situational logic as an alternative to traditional analyses that started with conceptual \u201dfacts\u201d and ended with \u201cknown truths.\u201d%DIFDELCMD < %DIFDELCMD < %%% Critique by Bertrand Russell (1872-1970) Russell did not take kindly to Dewey's effort to reconstruct philosophy. In 1939, he contributed a critical essay to the Library of Living Philosophers volume entitled The Philosophy of John Dewey. He entitled his contribution \u201cDewey\u2019s New Logic\u201d which he identified with a doctrine labeled instrumentalism. He suggested that Dewey's logic could be partly explained by the cultural situation or \u201csocial system\u201d prevailing in the United States\u2014\u201cthe age of industrialism and collective enterprise\u201d\u2014and by the academic context of competition between British analytic philosophy and German synthetic philosophy. Russell named Dewey's logic Instrumentalism and grouped it with other synthetic doctrines critical of traditional academic philosophy\u2014positivism, pragmatism, historicism, holism\u2014all denying the legitimacy of metaphysics (untestable because prior to experience) and the reality of natural kinds with defining properties as universal facts. He felt Dewey was turning philosophy into a tool for solving problem rather than a search for truths. We report three questions Russell asked of Dewey's situational logic to explain why he rejected Dewey's definitions and answers.%DIFDELCMD < %DIFDELCMD < %%% 1) HOW LARGE IS A SITUATION? Russell was troubled by Dewey treating situations as the starting point of new knowledge. If knowledge grows by inquiry that relates unique problematic situations to environmental continuing factors, how can that activity exclude anything in the universe? It merges particular facts into universal regularities. \u201cIt is obvious that, in an inquiry into the tides, the sun and moon must be included in the \u2018situation . \u2019 I do not see how, on Dr. Dewey's principles, a \u2018situation\u2019 can embrace less than the whole universe; this is an inevitable consequence of the insistence upon continuity of continuing factors%DIFDELCMD < ]%%% .\u201d Russell could find no starting or stopping point in such situational logic. He wondered, for example, how astronomers could inquire about the sun and moon without prior knowledge of those unchanging objects: 2) HOW CAN DOUBT STIMULATE INQUIRY? While rejecting Dewey\u2019s situation as a unit of analysis, Russell criticized feelings of doubt in particular situations as stimulus to inquiry. He stated what he took to be Dewey\u2019s position:%DIFDELCMD < %DIFDELCMD < %%% Contrary to Dewey\u2019s particular feeling of doubt, Russell assumed that cognitive doubt initiates reasoning about what things are \u201ctrue.\u201d 3) HOW CAN WARRANTED ASSERTION BE DISTINGUISHED FROM IMMEDIATE KNOWLEDGE OF FACT, REALITY, TRUTH? Russell couldn't understand why Dewey replaced the word \u201cknowledge\u201d with \u201cwarranted assertion\u201d when doubt is eliminated. The definition appeared arbitrary and unnecessary. He quoted Dewey:%DIFDELCMD < %DIFDELCMD < %%% Russell found this just another name for instrumental consequences of logically groundless inductive reasoning: if what you do achieves what you want, then what you want is validated\u2014it is TRUE. Russell continued to insist that logical deduction can provide knowledge of truth. He closed his critique by suggesting that Dewey's redefinition of induction and deduction made discourse between analytic and synthetic philosophers incapable of rational resolution . Dewey felt completely misunderstood by Russell. He responded by explaining that he chose \u201c situation \u201d as the unit of inquiry to escape units used by both atomistic-analytic and holistic-synthetic philosophers. \u201cI have called experiences situations as%DIFDELCMD < ] %%% a viable alternative to an atomism which logically involves a denial of connections and to an absolutistic block monism which \u2026 leaves no place for the discrete, for plurality, and for individuals.\u201d He observed that situations are observably always particular\u2014breakdown at particular time and place\u2014but each such experience includes multiple determinate universal traits that must be discovered to repair the breakdown.%DIFDELCMD < %DIFDELCMD < %%% Dewey argued that logical linguistic discourse can only follow an experience of breakdown, which itself is precognitive and unspeakable. He accused Russell of treating discourse as equivalent to experience. Unsurprisingly, the exchange between these two philosophers did not resolve their differences, which persist today.%DIFDELCMD < %DIFDELCMD < %%% Logic of Karl Popper (1902-1994)In The Poverty of Historicism, published in 1957, Popper reported results of years spent criticizing perennial philosophical debate over whether reliable scientific knowledge arises from observation leading to theory, or from theory guiding observation. That essay was a critique of the kinds of synthetic philosophy to which Russell had linked Dewey\u2014instrumentalism, pragmatism, historicism, holism\u2014all of which claim that observation in situations precedes cognition, practice precedes theory.%DIFDELCMD < %DIFDELCMD < %%% Throughout this essay and subsequent publications, Popper rejected Dewey's kind of logic, without naming Dewey, claiming it to be inductive sociological or psychological \u201cscience,\u201d producing only conditional and subjective knowledge\u2014warranted assertions. He considered his kind of logic to be deductive and objectively true, as much as is humanly possible.%DIFDELCMD < %DIFDELCMD < %%% He developed a criterion for distinguishing scientific from unreliable metaphysical reasoning. He called that criterion \u201cdemarcation,\u201d measured by the degree to which a conjecture or theory is testable. A situationis an event in which a theory has failed a test, prompting reasoning to replace the failed conjecture. \u201c\u2026 there is no such thing as an unprejudiced observation. All observation is an activity with an aim (to find, or to check, some regularity which is \u2018\u2019at least\u2019\u2019 vaguely conjectured);\u2026 .\u2026. There is no such thing as a perception except in the context of interests and expectations, and hence of regularities or \u2018\u2019laws\u2019\u2019.%DIFDELCMD < %DIFDELCMD < %%% For Popper, a situation prompting reasoning is a theoretical breakdown, and its solution involves conceiving a rational analytic model of the breakdown in order to conjecture solutions to repair it, restoring unity to theory and practice. His situational logic locates regularities in physical laws and in social institutions\u2014prescribed patterns of correlated behavior.%DIFDELCMD < %DIFDELCMD < %%% Popper later (1974) agreed with Dewey's position that problems arise as unspeakable, pre-conscious feelings, but denied that this origin can provide situational data to which possible solutions must adapt. He never viewed a situation as a \u201cqualified existential whole\u201d as Dewey did. He attributed any sense of maladjustment or breakdown to inborn universal expectations and knowledge, not to conditional feelings experienced in each unique situation. Theory is involved in observation, and needs logical coherence independently of operational continuity.%DIFDELCMD < %DIFDELCMD < %%% He had multiple reasons for denying the possibility of situations determining relevant data, \u201cultimate components\u201d defining properties of kinds and causes. He viewed names as arbitrary conventions, incapable of defining abstract universals to function as signs of inductive particulars. He assumed the need for undefined theoretical terms.%DIFDELCMD < %DIFDELCMD < %%% From his earliest publications in the 1930 to his autobiography in 1974, Popper maintained that his demarcation conjecture established the fallacy of induction\u2014inferences based on \u201crepetition of instances.\u201d Instances named cannot be defining properties, continuing factors, determinate universal traits.%DIFDELCMD < %DIFDELCMD < %%% He supported his rejection of induction with one traditional example of an inductive failure: \u201cAll swans are white.\u201d \u201c\u2026 no matter how many instances of white swans we may have observed, this does not justify the conclusion%DIFDELCMD < [%%% theory%DIFDELCMD < ] %%% that all swans are white.%DIFDELCMD < %DIFDELCMD < %%% He presented a more recent presumed inductive failure in the scientific theory that freezing points can serve as defining properties of kinds.%DIFDELCMD < %DIFDELCMD < %%% Popper refined his rejection of induction by locating regularities with determinate universal traits in a third world, separate from the two sources of generalization earlier specified: initial situational conditions and universal laws. He conjectured that situational conditions, universal laws, and problem solutions occur in autonomous worlds. He found this metaphysical conjecture\u2014unobservable and untestable\u2014instrumentally useful for making predictions based on conjectural situations. \u201cTheories or propositions or statements are the most important third world linguistic entities.\u201d. Historicists are mistaken to believe that \u201csocial entities such as institutions or associations are concrete natural entities \u2026 rather than abstract models constructed to interpret certain selected abstract%DIFDELCMD < [%%% situational%DIFDELCMD < ] %%% relations between individuals.\u201d%DIFDELCMD < %DIFDELCMD < %%% Defense by Henryk Skolimowski (1930-2018) Skolimowski opened his contribution to The Philosophy of Karl Popper in 1974 with a quote from Popper's 1963 Conjectures and Refutations to highlight how central to Popper's philosophy was his situational logic.The quote asserts that great philosophers \u201ctried to solve urgent and concrete problems\u201d in their own \u201ccontemporary problem-situation.\u201d Philosophers were great because of their \u201csensitivity to problems.\u201d All reasoners are \u201cstudents of problems.\u201d.%DIFDELCMD < %DIFDELCMD < %%% Skolimowski's contribution reconstructed and analyzed the \u201cknowledge-situation\u201d that produced Popper's situational logic by applying that very logic. He located two distinct knowledge-situations in which Popper reacted against what he found to be breakdowns of philosophy.%DIFDELCMD < %DIFDELCMD < %%% In the 1930s, Popper opposed positivists and empiricists in an academic context much like that in which Russell opposed the synthetic philosophy he attributed to Dewey: instrumentalism, positivism, historicism, holism. Popper rejected the instrumentalist effort to found new knowledge on inductive facts: \u201cprotocol statements depicting the ultimate components of the structure of the empirical world.\u201d He replaced such continuing factors with conceptual but objective and testable units: conjectures and refutations.%DIFDELCMD < %DIFDELCMD < %%% Skolimowski observed that, by the 1960s, Popper's knowledge-situation had changed. His minority position rejecting the ultimate reality of knowable natural kinds had become conventional wisdom\u2014at least in philosophy if not in science. The instrumentalists had been defeated by those who followed Popper in basing knowledge on testability.%DIFDELCMD < %DIFDELCMD < %%% In the 1960s Popper opposed philosophers like Thomas Kuhn, who tried to found new knowledge on the subjective popularity of conceptual frameworks, competing paradigms based on incompatible and untestable premises. Popper challenged such logical analysis by identifying three distinct kinds of objective knowledge as universal continuing factors crossing paradigms. They operate in distinct problem situations: 1)empirical facts and observations are known in a psychological world of material entities; 2) problems are analyzed using conjectures and refutations known in a sociological world of mental entities; 3) \u201cideas in the objective sense, that is the%DIFDELCMD < [%%% third%DIFDELCMD < ] %%% world of possible objects of thought or the world of objective contents of thought. \" Skolimowski supported Popper's three worlds conjecture by rejecting the possibility of unchanging universal linguistic categories. \u201c\u2026 if there are innate concepts (categories, linguistic universals%DIFDELCMD < [%%% defining properties%DIFDELCMD < ]%%% ), then there is no growth of concepts; if there is growth of concepts, then there are no innate concepts; but in fact there is growth of concepts, therefore there are no innate concepts.\u201d He defended Popper, however, by identifying defining properties of Popper's three worlds\u2014which would appear to be just-denied continuing factors, innate concepts. Skolimowski followed his summary of agreements with Popper by criticizing Popper's effort to relate his world 2 and world 3. He argued that Popper had \u201cfailed to provide a theory of objective mind.\u201d Popper's response to Skolimowski started with praising the accuracy of the latter's presentation of his own philosophy:\u201c Professor Skolimowski\u2019s paper surprised me by the degree of his understanding of what has been so often misunderstood.\u201d \u201cSkolimowski\u2019s summing up of my 'methodological period' again seems to me excellent.\u201d. But his response to Skolimowski's critique finds his critic failing to understand.%DIFDELCMD < %DIFDELCMD < %%% The result is that Popper and Skolimowski\u2014both experts in Popper's situational logic\u2014ended up disagreeing over the defining properties of abstract entities for which operational tests appear to be impossible. These colleagues were no more able to reach consensus on situational logic able to produce reliable knowledge for instrumental problem solving than Dewey and Russell arguing from incompatible paradigms.", "after_revision": " %DIFDELCMD < %DIFDELCMD < %%% Situational logic (also situational analysis)Boumans, M. and Davis, John B. (2015), Economic Methodology: Understanding Economics as a Science, Palgrave Macmillan, pp. 92. is a concept advanced by Popper in his The Poverty of Historicism.Popper, Karl (2013), The Poverty of Historicism, Routledge, p. 141. Situational logic is a %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% process by which a social scientist tries to reconstruct the problem situation %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% confronting an agent in order to understand that agent's choice . %DIFDELCMD < ]%%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% Koertge (1975) provides a helpful clarificatory summary.This use of this summary is from Boumans and Davis (2010) . First provide a description of the situation %DIFDELCMD < ] %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% : ''Agent A was in a %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < [%%% %DIFDELCMD < ] %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < [%%% %DIFDELCMD < ] %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < [%%% %DIFDELCMD < ] %%% situation of type C''. This situation is then analysed ''In a situation of type C, the appropriate thing to do is X.'' The rationality principle may then be called upon: ''agents always act appropriately to their situation'' Finally we have the explanadum: ''(therefore) A did X.''Koertge, N. (1975), \" Popper's %DIFDELCMD < [%%% %DIFDELCMD < ]%%% Metaphysical Research Program for the Human Sciences\", Inquiry, 18 (1975), 437\u201362. Notes References %DIFDELCMD < %DIFDELCMD < %%% Category:Philosophy of social science Category:Logic Category:Analysi", "edit_actions": [{"type": "D", "before": "Situational logic is a label coined by Karl Popper to identify a logical theory of reasoning capable of expanding reliable knowledge. Human reasoning is prompted by problems which focus the attention of an individual or group on a situation: \u201cthe stimulus of practical problems\u201d arising in given \u201cspecific initial conditions.\u201d Some kind of habitual practice or belief, once justified by a theory, breaks down, stops \u201cworking,\u201d in unique existing conditions. Situational logic tries to solve such a breakdown by rejoining conceptual theory\u2014hypothetical universal regularities or general continuing factors\u2014to operational practice in unique situational conditions.", "after": null, "start_char_pos": 0, "end_char_pos": 673}, {"type": "D", "before": "For Popper, a situation prompting reasoning is a cognitive breakdown. A theory fails to work and must be replaced. His situational logic prescribes conjecturing potential new universal regularities from which to deduce logical solutions capable of restoring unity to theory and practice.", "after": null, "start_char_pos": 674, "end_char_pos": 961}, {"type": "R", "before": "John Dewey preceded Popper in recognizing this situational need to reason, but his logical steps defining and solving problems are radically incompatible. For Dewey,", "after": "Situational logic (also situational analysis)Boumans, M. and Davis, John B. (2015), Economic Methodology: Understanding Economics as a Science, Palgrave Macmillan, pp. 92. is a concept advanced by Popper in his The Poverty of Historicism.Popper, Karl (2013), The Poverty of Historicism, Routledge, p. 141. Situational logic is", "start_char_pos": 991, "end_char_pos": 1156}, {"type": "D", "before": "situation prompting reasoning is an operational breakdown with conceptual implications. It is a pre-cognitive and unspeakable experience. The practical continuity of an established practice must be restored. His situational logic prescribes responding by inductively defining observable conditions operating in the situation, from which to deduce practical solutions restoring unity to theory and practice.", "after": null, "start_char_pos": 1159, "end_char_pos": 1565}, {"type": "D", "before": "Both men accepted the instrumental criterion of judgment to identify breakdown of continuing factors.Instrumental and intrinsic value But Popper added an independent criterion of judgment: logical coherence in theories. Dewey held logical coherence to be integral with operational success. A situation becomes cognitive only through inductive operations.", "after": null, "start_char_pos": 1566, "end_char_pos": 1920}, {"type": "D", "before": "Assuming independent criteria of practical and logical judgment contaminates reasoning. It reflects the traditional fact-value distinction between knowledge of concrete situations\u2014particular facts known by induction\u2014and theoretical knowledge of universal regularities\u2014deduced from general laws known intuitively to be right. Objective value-free facts that work may not correlate with subjective fact-free preferences, intentions, expectations.", "after": null, "start_char_pos": 1950, "end_char_pos": 2394}, {"type": "D", "before": "These incompatible criteria are present today in popular approaches to rational problem solving, without acknowledgment of their philosophical origins. Popper's logic underlies the value-free tool labelled SWOT analysis widely applied to conjectural situations in business and government. Situational awareness is a technological application of Dewey's instrumental situational logic. In the fact-free mediation tool labeled Mindfulness, the pre-cognitive starting point of Dewey\u2019s logic appears as a valued end point. Dividing theory from practice and fact from value contaminates rationality.", "after": null, "start_char_pos": 2395, "end_char_pos": 2989}, {"type": "D", "before": "This article presents the background of \u2018\u2019this\u2019\u2019 still-indeterminate situation of mutually incompatible logics. It draws largely on the Library of Living Philosophers, edited by Paul Arthur Schilpp, which honored Dewey in its first volume and Popper in its fourteenth volume. Summary of Dewey\u2019s position is followed by a critique by Bertrand Russell, one of 17 scholars offering descriptive and critical essays, and Dewey\u2019s response.Summary of Popper\u2019s position is followed by an essay (one of 33) by Henryk Skolimowski, and Popper\u2019s response.", "after": null, "start_char_pos": 3019, "end_char_pos": 3562}, {"type": "R", "before": "Logic of John Dewey (1859-1952)In Logic: The Theory of Inquiry, published in 1938, Dewey reported results of years spent criticizing traditional academic philosophy. He hoped to have resolved philosophers\u2019 perennial debate over how to extend human understanding by relating facts\u2014particular valuation-free means used in practice\u2014to valuations\u2014general fact-free theoretical ends. He made \u201c", "after": "process by which a social scientist tries to reconstruct the problem", "start_char_pos": 3563, "end_char_pos": 3951}, {"type": "D", "before": "\u201d a universal focus to eliminate the imagined autonomy of theory and practice.", "after": null, "start_char_pos": 3962, "end_char_pos": 4040}, {"type": "D", "before": "A problematic situation arises when some pattern of correlated belief and behavior breaks down. The obstruction generates a need to understand the cause of breakdown and how to overcome it. The need is an objective fact of every unique situation, not a subjective opinion or preference.", "after": null, "start_char_pos": 4041, "end_char_pos": 4327}, {"type": "D", "before": "A situation becomes an object of discourse when those experiencing breakdown are forced to reason about it. Is it a breakdown of some known kind of regularity? Can some universal regularity be found conjoined to unique observable traits? Answering such questions requires induction: \u201c\u2026 laws of uniform relations are ultimately instrumentalities for control of individualized situations \u2026", "after": null, "start_char_pos": 4357, "end_char_pos": 4744}, {"type": "D", "before": "Historically, induction has been a method for arriving at laws of uniform relations by moving from particulars to the general. In common sense, it starts with observation of some regularity and an inference that that regularity is in fact a continuing factor. The inference is strengthened by counting its frequency of observation\u2014numerical induction.", "after": null, "start_char_pos": 4745, "end_char_pos": 5096}, {"type": "D", "before": "In modern science, the permanence of traits and kinds is determined experimentally by transforming what is existentially given into abstract universal kinds of traits\u2014operational induction. Each situation is made into a \u201ckind\u201d by identifying relevant data.", "after": null, "start_char_pos": 5126, "end_char_pos": 5382}, {"type": "D", "before": "Here is one example of Dewey's situational steps to define kinds of data relevant to solving a problematic situation. A man is found dead in unusual circumstances.", "after": null, "start_char_pos": 5383, "end_char_pos": 5546}, {"type": "D", "before": "He referred to a famous example of numerical induction that failed for lack of these operations determining continuing factors: \u201cAll swans are white.\u201d It confused all swans-as-observable-birds with the abstraction swan-as-an-abstract-species with conjectured determinate universal traits\u2014found not to include color of feathers.", "after": null, "start_char_pos": 5576, "end_char_pos": 5903}, {"type": "D", "before": "Dewey offered inductive plus deductive situational logic as an alternative to traditional analyses that started with conceptual \u201dfacts\u201d and ended with \u201cknown truths.\u201d", "after": null, "start_char_pos": 5904, "end_char_pos": 6070}, {"type": "D", "before": "Critique by Bertrand Russell (1872-1970) Russell did not take kindly to Dewey's effort to reconstruct philosophy. In 1939, he contributed a critical essay to the Library of Living Philosophers volume entitled The Philosophy of John Dewey. He entitled his contribution \u201cDewey\u2019s New Logic\u201d which he identified with a doctrine labeled instrumentalism. He suggested that Dewey's logic could be partly explained by the cultural situation or \u201csocial system\u201d prevailing in the United States\u2014\u201cthe age of industrialism and collective enterprise\u201d\u2014and by the academic context of competition between British analytic philosophy and German synthetic philosophy.", "after": null, "start_char_pos": 6100, "end_char_pos": 6748}, {"type": "D", "before": "Russell named Dewey's logic Instrumentalism and grouped it with other synthetic doctrines critical of traditional academic philosophy\u2014positivism, pragmatism, historicism, holism\u2014all denying the legitimacy of metaphysics (untestable because prior to experience) and the reality of natural kinds with defining properties as universal facts. He felt Dewey was turning philosophy into a tool for solving problem rather than a search for truths. We report three questions Russell asked of Dewey's situational logic to explain why he rejected Dewey's definitions and answers.", "after": null, "start_char_pos": 6749, "end_char_pos": 7318}, {"type": "R", "before": "1) HOW LARGE IS A SITUATION? Russell was troubled by Dewey treating situations as the starting point of new knowledge. If knowledge grows by inquiry that relates unique problematic situations to environmental continuing factors, how can that activity exclude anything in the universe? It merges particular facts into universal regularities. \u201cIt is obvious that, in an inquiry into the tides, the sun and moon must be included in the \u2018situation", "after": "confronting an agent in order to understand that agent's choice", "start_char_pos": 7348, "end_char_pos": 7791}, {"type": "D", "before": "\u2019 I do not see how, on Dr. Dewey's principles, a \u2018situation\u2019 can embrace less than the whole universe; this is an inevitable consequence of the insistence upon continuity", "after": null, "start_char_pos": 7794, "end_char_pos": 7964}, {"type": "D", "before": "of continuing factors", "after": null, "start_char_pos": 7965, "end_char_pos": 7986}, {"type": "D", "before": ".\u201d", "after": null, "start_char_pos": 8004, "end_char_pos": 8006}, {"type": "D", "before": "Russell could find no starting or stopping point in such situational logic. He wondered, for example, how astronomers could inquire about the sun and moon without prior knowledge of those unchanging objects:", "after": null, "start_char_pos": 8007, "end_char_pos": 8214}, {"type": "D", "before": "2) HOW CAN DOUBT STIMULATE INQUIRY? While rejecting Dewey\u2019s situation as a unit of analysis, Russell criticized feelings of doubt in particular situations as stimulus to inquiry. He stated what he took to be Dewey\u2019s position:", "after": null, "start_char_pos": 8215, "end_char_pos": 8440}, {"type": "D", "before": "Contrary to Dewey\u2019s particular feeling of doubt, Russell assumed that cognitive doubt initiates reasoning about what things are \u201ctrue.\u201d", "after": null, "start_char_pos": 8470, "end_char_pos": 8605}, {"type": "D", "before": "3) HOW CAN WARRANTED ASSERTION BE DISTINGUISHED FROM IMMEDIATE KNOWLEDGE OF FACT, REALITY, TRUTH? Russell couldn't understand why Dewey replaced the word \u201cknowledge\u201d with \u201cwarranted assertion\u201d when doubt is eliminated. The definition appeared arbitrary and unnecessary. He quoted Dewey:", "after": null, "start_char_pos": 8606, "end_char_pos": 8892}, {"type": "D", "before": "Russell found this just another name for instrumental consequences of logically groundless inductive reasoning: if what you do achieves what you want, then what you want is validated\u2014it is TRUE.", "after": null, "start_char_pos": 8922, "end_char_pos": 9116}, {"type": "R", "before": "Russell continued to insist that logical deduction can provide knowledge of truth. He closed his critique by suggesting that Dewey's redefinition of induction and deduction made discourse between analytic and synthetic philosophers incapable of rational resolution", "after": "Koertge (1975) provides a helpful clarificatory summary.This use of this summary is from Boumans and Davis (2010)", "start_char_pos": 9117, "end_char_pos": 9381}, {"type": "R", "before": "Dewey felt completely misunderstood by Russell. He responded by explaining that he chose \u201c", "after": "First provide a description of the", "start_char_pos": 9384, "end_char_pos": 9474}, {"type": "D", "before": "\u201d as the unit of inquiry to escape units used by both atomistic-analytic and holistic-synthetic philosophers. \u201cI have called experiences situations", "after": null, "start_char_pos": 9485, "end_char_pos": 9632}, {"type": "D", "before": "as", "after": null, "start_char_pos": 9633, "end_char_pos": 9635}, {"type": "D", "before": "a viable alternative to an atomism which logically involves a denial of connections and to an absolutistic block monism which \u2026 leaves no place for the discrete, for plurality, and for individuals.\u201d", "after": null, "start_char_pos": 9654, "end_char_pos": 9852}, {"type": "D", "before": "He observed that situations are observably always particular\u2014breakdown at particular time and place\u2014but each such experience includes multiple determinate universal traits that must be discovered to repair the breakdown.", "after": null, "start_char_pos": 9853, "end_char_pos": 10073}, {"type": "D", "before": "Dewey argued that logical linguistic discourse can only follow an experience of breakdown, which itself is precognitive and unspeakable. He accused Russell of treating discourse as equivalent to experience.", "after": null, "start_char_pos": 10103, "end_char_pos": 10309}, {"type": "D", "before": "Unsurprisingly, the exchange between these two philosophers did not resolve their differences, which persist today.", "after": null, "start_char_pos": 10310, "end_char_pos": 10425}, {"type": "D", "before": "Logic of Karl Popper (1902-1994)In The Poverty of Historicism, published in 1957, Popper reported results of years spent criticizing perennial philosophical debate over whether reliable scientific knowledge arises from observation leading to theory, or from theory guiding observation. That essay was a critique of the kinds of synthetic philosophy to which Russell had linked Dewey\u2014instrumentalism, pragmatism, historicism, holism\u2014all of which claim that observation in situations precedes cognition, practice precedes theory.", "after": null, "start_char_pos": 10455, "end_char_pos": 10982}, {"type": "D", "before": "Throughout this essay and subsequent publications, Popper rejected Dewey's kind of logic, without naming Dewey, claiming it to be inductive sociological or psychological \u201cscience,\u201d producing only conditional and subjective knowledge\u2014warranted assertions. He considered his kind of logic to be deductive and objectively true, as much as is humanly possible.", "after": null, "start_char_pos": 11012, "end_char_pos": 11368}, {"type": "D", "before": "He developed a criterion for distinguishing scientific from unreliable metaphysical reasoning. He called that criterion \u201cdemarcation,\u201d measured by the degree to which a conjecture or theory is testable. A situationis an event in which a theory has failed a test, prompting reasoning to replace the failed conjecture. \u201c\u2026 there is no such thing as an unprejudiced observation. All observation is an activity with an aim (to find, or to check, some regularity which is \u2018\u2019at least\u2019\u2019 vaguely conjectured);\u2026 .\u2026. There is no such thing as a perception except in the context of interests and expectations, and hence of regularities or \u2018\u2019laws\u2019\u2019.", "after": null, "start_char_pos": 11398, "end_char_pos": 12034}, {"type": "R", "before": "For Popper, a situation prompting reasoning is", "after": ": ''Agent A was in", "start_char_pos": 12064, "end_char_pos": 12110}, {"type": "D", "before": "theoretical breakdown, and its solution involves conceiving a rational analytic model of the breakdown in order to conjecture solutions to repair it, restoring unity to theory and practice. His situational logic locates regularities in physical laws and in social institutions\u2014prescribed patterns of correlated behavior.", "after": null, "start_char_pos": 12113, "end_char_pos": 12433}, {"type": "D", "before": "Popper later (1974) agreed with Dewey's position that problems arise as unspeakable, pre-conscious feelings, but denied that this origin can provide situational data to which possible solutions must adapt. He never viewed a situation as a \u201cqualified existential whole\u201d as Dewey did. He attributed any sense of maladjustment or breakdown to inborn universal expectations and knowledge, not to conditional feelings experienced in each unique situation. Theory is involved in observation, and needs logical coherence independently of operational continuity.", "after": null, "start_char_pos": 12463, "end_char_pos": 13017}, {"type": "D", "before": "He had multiple reasons for denying the possibility of situations determining relevant data, \u201cultimate components\u201d defining properties of kinds and causes. He viewed names as arbitrary conventions, incapable of defining abstract universals to function as signs of inductive particulars. He assumed the need for undefined theoretical terms.", "after": null, "start_char_pos": 13047, "end_char_pos": 13386}, {"type": "D", "before": "From his earliest publications in the 1930 to his autobiography in 1974, Popper maintained that his demarcation conjecture established the fallacy of induction\u2014inferences based on \u201crepetition of instances.\u201d Instances named cannot be defining properties, continuing factors, determinate universal traits.", "after": null, "start_char_pos": 13416, "end_char_pos": 13719}, {"type": "D", "before": "He supported his rejection of induction with one traditional example of an inductive failure: \u201cAll swans are white.\u201d \u201c\u2026 no matter how many instances of white swans we may have observed, this does not justify the conclusion", "after": null, "start_char_pos": 13749, "end_char_pos": 13971}, {"type": "D", "before": "theory", "after": null, "start_char_pos": 13989, "end_char_pos": 13995}, {"type": "D", "before": "that all swans are white.", "after": null, "start_char_pos": 14014, "end_char_pos": 14039}, {"type": "D", "before": "He presented a more recent presumed inductive failure in the scientific theory that freezing points can serve as defining properties of kinds.", "after": null, "start_char_pos": 14069, "end_char_pos": 14211}, {"type": "D", "before": "Popper refined his rejection of induction by locating regularities with determinate universal traits in a third world, separate from the two sources of generalization earlier specified: initial situational conditions and universal laws. He conjectured that situational conditions, universal laws, and problem solutions occur in autonomous worlds. He found this metaphysical conjecture\u2014unobservable and untestable\u2014instrumentally useful for making predictions based on conjectural situations. \u201cTheories or propositions or statements are the most important third world linguistic entities.\u201d. Historicists are mistaken to believe that \u201csocial entities such as institutions or associations are concrete natural entities \u2026 rather than abstract models constructed to interpret certain selected abstract", "after": null, "start_char_pos": 14241, "end_char_pos": 15036}, {"type": "D", "before": "situational", "after": null, "start_char_pos": 15054, "end_char_pos": 15065}, {"type": "D", "before": "relations between individuals.\u201d", "after": null, "start_char_pos": 15084, "end_char_pos": 15115}, {"type": "D", "before": "Defense by Henryk Skolimowski (1930-2018) Skolimowski opened his contribution to The Philosophy of Karl Popper in 1974 with a quote from Popper's 1963 Conjectures and Refutations to highlight how central to Popper's philosophy was his situational logic.The quote asserts that great philosophers \u201ctried to solve urgent and concrete problems\u201d in their own \u201ccontemporary problem-situation.\u201d Philosophers were great because of their \u201csensitivity to problems.\u201d All reasoners are \u201cstudents of problems.\u201d.", "after": null, "start_char_pos": 15145, "end_char_pos": 15643}, {"type": "D", "before": "Skolimowski's contribution reconstructed and analyzed the \u201cknowledge-situation\u201d that produced Popper's situational logic by applying that very logic. He located two distinct knowledge-situations in which Popper reacted against what he found to be breakdowns of philosophy.", "after": null, "start_char_pos": 15673, "end_char_pos": 15945}, {"type": "D", "before": "In the 1930s, Popper opposed positivists and empiricists in an academic context much like that in which Russell opposed the synthetic philosophy he attributed to Dewey: instrumentalism, positivism, historicism, holism. Popper rejected the instrumentalist effort to found new knowledge on inductive facts: \u201cprotocol statements depicting the ultimate components of the structure of the empirical world.\u201d He replaced such continuing factors with conceptual but objective and testable units: conjectures and refutations.", "after": null, "start_char_pos": 15975, "end_char_pos": 16491}, {"type": "D", "before": "Skolimowski observed that, by the 1960s, Popper's knowledge-situation had changed. His minority position rejecting the ultimate reality of knowable natural kinds had become conventional wisdom\u2014at least in philosophy if not in science. The instrumentalists had been defeated by those who followed Popper in basing knowledge on testability.", "after": null, "start_char_pos": 16521, "end_char_pos": 16859}, {"type": "D", "before": "In the 1960s Popper opposed philosophers like Thomas Kuhn, who tried to found new knowledge on the subjective popularity of conceptual frameworks, competing paradigms based on incompatible and untestable premises. Popper challenged such logical analysis by identifying three distinct kinds of objective knowledge as universal continuing factors crossing paradigms. They operate in distinct problem situations: 1)empirical facts and observations are known in a psychological world of material entities; 2) problems are analyzed using conjectures and refutations known in a sociological world of mental entities; 3) \u201cideas in the objective sense, that is the", "after": null, "start_char_pos": 16889, "end_char_pos": 17545}, {"type": "D", "before": "third", "after": null, "start_char_pos": 17563, "end_char_pos": 17568}, {"type": "R", "before": "world of possible objects of thought or the world of objective contents of thought.", "after": "situation of type C''. This situation is then analysed ''In a situation of type C, the appropriate thing to do is X.'' The rationality principle may then be called upon: ''agents always act appropriately to their situation'' Finally we have the explanadum: ''(therefore) A did X.''Koertge, N. (1975),", "start_char_pos": 17587, "end_char_pos": 17670}, {"type": "D", "before": "Skolimowski supported", "after": null, "start_char_pos": 17673, "end_char_pos": 17694}, {"type": "D", "before": "three worlds conjecture by rejecting the possibility of unchanging universal linguistic categories. \u201c\u2026 if there are innate concepts (categories, linguistic universals", "after": null, "start_char_pos": 17704, "end_char_pos": 17870}, {"type": "D", "before": "defining properties", "after": null, "start_char_pos": 17888, "end_char_pos": 17907}, {"type": "R", "before": "), then there is no growth of concepts; if there is growth of concepts, then there are no innate concepts; but in fact there is growth of concepts, therefore there are no innate concepts.\u201d", "after": "Metaphysical Research Program for the Human Sciences\", Inquiry, 18 (1975), 437\u201362.", "start_char_pos": 17925, "end_char_pos": 18113}, {"type": "R", "before": "He defended Popper, however, by identifying defining properties of Popper's three worlds\u2014which would appear to be just-denied continuing factors, innate concepts.", "after": "Notes", "start_char_pos": 18114, "end_char_pos": 18276}, {"type": "R", "before": "Skolimowski followed his summary of agreements with Popper by criticizing Popper's effort to relate his world 2 and world 3. He argued that Popper had \u201cfailed to provide a theory of objective mind.\u201d", "after": "References", "start_char_pos": 18277, "end_char_pos": 18475}, {"type": "D", "before": "Popper's response to Skolimowski started with praising the accuracy of the latter's presentation of his own philosophy:\u201c Professor Skolimowski\u2019s paper surprised me by the degree of his understanding of what has been so often misunderstood.\u201d \u201cSkolimowski\u2019s summing up of my 'methodological period' again seems to me excellent.\u201d. But his response to Skolimowski's critique finds his critic failing to understand.", "after": null, "start_char_pos": 18476, "end_char_pos": 18886}, {"type": "R", "before": "The result is that Popper and Skolimowski\u2014both experts in Popper's situational logic\u2014ended up disagreeing over the defining properties of abstract entities for which operational tests appear to be impossible. These colleagues were no more able to reach consensus on situational logic able to produce reliable knowledge for instrumental problem solving than Dewey and Russell arguing from incompatible paradigms.", "after": "Category:Philosophy of social science Category:Logic Category:Analysi", "start_char_pos": 18916, "end_char_pos": 19327}], "sents_char_pos": [0, 144, 337, 468, 673, 743, 788, 961, 1145, 1246, 1296, 1366, 1565, 1667, 1785, 1855, 1920, 2037, 2274, 2394, 2546, 2683, 2779, 2913, 2989, 3130, 3294, 3452, 3562, 3728, 3941, 4040, 4136, 4230, 4327, 4464, 4516, 4594, 4642, 4744, 4871, 5004, 5096, 5315, 5382, 5500, 5546, 5726, 5903, 6213, 6338, 6448, 6748, 7087, 7189, 7318, 7376, 7466, 7632, 7688, 7896, 8082, 8250, 8393, 8824, 8875, 9199, 9383, 9431, 9594, 9781, 9852, 10073, 10239, 10309, 10425, 10740, 10982, 11266, 11368, 11492, 11600, 11714, 11772, 11899, 12034, 12302, 12433, 12668, 12745, 12913, 13017, 13202, 13333, 13386, 13622, 13719, 13865, 14039, 14211, 14477, 14587, 14731, 14829, 14957, 15398, 15532, 15600, 15643, 15822, 15945, 16193, 16376, 16491, 16603, 16755, 16859, 17102, 17253, 17390, 17499, 17670, 17803, 17964, 18031, 18113, 18276, 18401, 18716, 18803, 18886, 19124]}
+{"doc_id": "33965855", "revision_depth": "1", "before_revision": "Infoveillance is a type of syndromic surveillance , which focuses on public health related concerns, that utilizes online information and content . The term was coined by Gunther Eysenbach in 2004 for the first time along with coining, Infodemiology, a new branch of science-based research . The work of Gunther Eysenbach, which utilized the Google Search queries , had led to the birth of Google Flu . Other than Google search engines have also been used. Later other researchers utilized other social media such as Twitter to find the disease outbreak patterns. The infoveillance detects disease outbreaks quicker than traditional public health surveillance systems with the minimal cost involved, revealing the promising results for the future surveillance methodologies . Google Flu Trends Google uses the query information to detect the flu trends and it compares the results to the countries' official surveillance data . The primary research behind the Google Flu Trend can be found in Ginsberg et al. 's work. In light of evidence showing that Google Flu Trends was occasionally over-estimating flu rates, researchers have also proposed a series of more advanced and better-performing approaches to flu modeling from Google search queries. Google Dengue Trends Google uses the query information to detect the dengue trends and it compares the results to the countries' official surveillance data. The primary research behind the Google Dengue Trend is found in Chan et al. 's work . Flu Detector Flu Detector was developed by Vasileios Lampos et al. at the University of Bristol. It is an application of Machine Learning that firstly uses Feature Selection to automatically extract flu-related terms from Twitter content and then uses those terms to compute a flu-score for several UK regions based on geolocated tweets. The primary research behind the Flu Detector is found here; a generalized scheme able to track other events as well is proposed here . A new, totally revamped (in terms of models and online data) version of the Flu Detector has been recently launched. Mood of the Nation Mood of the Nation was developed by Vasileios Lamposet al. at the University of Bristol. It performs mood analysis on tweets geo-located in various regions of the United Kingdom computing on a daily basis scores for four types of emotion: anger, fear, joy and sadness .", "after_revision": "Infoveillance is a type of syndromic surveillance that specifically utilizes information found online . The term , along with the term infodemiology, was coined by Gunther Eysenbach to describe research that uses online information to gather information about human behavior . Eysenbach's work using Google Search queries led to the birth of Google Flu Trends, and other search engines have also been used. Other researchers have utilized social media sites such as Twitter to observe disease outbreak patterns. Infoveillance can detect disease outbreaks faster than traditional public health surveillance systems with minimal costs involved . Types of infoveillance Infoveillance methods may be either passive or active. Traditional infoveillance data like search engine queries and website navigation behavior are considered passive, as they attempt to recognize trends automatically, without action (or often even awareness) on the part of the internet users who are generating the data for analysis. Active infoveillance occurs when users choose to respond to a survey, enter symptoms into a website or app, or otherwise participate directly in surveillance efforts by contributing additional information. Examples Google Health Trends Beginning in 2008, Google used aggregated search query data to detect influenza trends and compared the results to countries' official surveillance data with the goal of predicting the spread of the flu. In light of evidence that emerged in 2013 showing that Google Flu Trends sometimes substantially overestimated actual flu rates, researchers proposed a series of more advanced and better-performing approaches to flu modeling from Google search queries. Google Flu Trends stopped publishing reports in 2015. Google also used aggregated search query data to detect dengue fever trends . Research has also cast doubt on the accuracy of some of these predictions. Google has continued this work to track and predict the COVID-19 pandemic, creating an open dataset on COVID-related search queries for use by researchers. Flu Detector Other flu prediction projects, including Flu Detector, have come and gone since the advent and removal of Google Flu Trends. Flu Detector was developed by Vasileios Lampos and other researchers at the University of Bristol. It was an application of machine learning that first used feature selection to automatically extract flu-related terms from Twitter content and then used those terms to compute a flu-score for several UK regions based on geolocated tweets. It also formed the basis for a proposed generalized scheme able to track other events . Mood of the Nation Mood of the Nation was also developed by Lampos' team. It performed mood analysis on tweets geo-located in various regions of the United Kingdom by computing on a daily basis scores for four types of emotion: anger, fear, joy and sadness . Privacy issues The rise of infoveillance brings up questions about privacy. Privacy concerns are partially dependent on the level of analysis and how data are collected and managed. For instance, individuals may be re-identifiable from search query datasets that have not been properly de-identified. Privacy concerns are increased if data analysis is not done automatically and if search trajectories of individual users are examined .", "edit_actions": [{"type": "R", "before": ", which focuses on public health related concerns, that utilizes online information and content", "after": "that specifically utilizes information found online", "start_char_pos": 50, "end_char_pos": 145}, {"type": "A", "before": null, "after": ", along with the term infodemiology,", "start_char_pos": 157, "end_char_pos": 157}, {"type": "R", "before": "in 2004 for the first time along with coining, Infodemiology, a new branch of science-based research", "after": "to describe research that uses online information to gather information about human behavior", "start_char_pos": 190, "end_char_pos": 290}, {"type": "R", "before": "The work of Gunther Eysenbach, which utilized the", "after": "Eysenbach's work using", "start_char_pos": 293, "end_char_pos": 342}, {"type": "D", "before": ", had", "after": null, "start_char_pos": 365, "end_char_pos": 370}, {"type": "R", "before": ". Other than Google", "after": "Trends, and other", "start_char_pos": 402, "end_char_pos": 421}, {"type": "R", "before": "Later other researchers utilized other social media", "after": "Other researchers have utilized social media sites", "start_char_pos": 458, "end_char_pos": 509}, {"type": "R", "before": "find the", "after": "observe", "start_char_pos": 529, "end_char_pos": 537}, {"type": "R", "before": "The infoveillance detects disease outbreaks quicker", "after": "Infoveillance can detect disease outbreaks faster", "start_char_pos": 565, "end_char_pos": 616}, {"type": "R", "before": "the minimal cost involved, revealing the promising results for the future surveillance methodologies", "after": "minimal costs involved", "start_char_pos": 674, "end_char_pos": 774}, {"type": "R", "before": "Google Flu Trends Google uses the query information to detect the flu trends and it compares", "after": "Types of infoveillance Infoveillance methods may be either passive or active. Traditional infoveillance data like search engine queries and website navigation behavior are considered passive, as they attempt to recognize trends automatically, without action (or often even awareness) on the part of the internet users who are generating the data for analysis. Active infoveillance occurs when users choose to respond to a survey, enter symptoms into a website or app, or otherwise participate directly in surveillance efforts by contributing additional information.", "start_char_pos": 777, "end_char_pos": 869}, {"type": "A", "before": null, "after": "Examples", "start_char_pos": 870, "end_char_pos": 870}, {"type": "A", "before": null, "after": "Google Health Trends Beginning in 2008, Google used aggregated search query data to detect influenza trends and compared", "start_char_pos": 871, "end_char_pos": 871}, {"type": "D", "before": "the", "after": null, "start_char_pos": 887, "end_char_pos": 890}, {"type": "R", "before": ". The primary research behind the Google Flu Trend can be found in Ginsberg et al. 's work.", "after": "with the goal of predicting the spread of the flu.", "start_char_pos": 929, "end_char_pos": 1020}, {"type": "A", "before": null, "after": "that emerged in 2013", "start_char_pos": 1042, "end_char_pos": 1042}, {"type": "R", "before": "was occasionally over-estimating", "after": "sometimes substantially overestimated actual", "start_char_pos": 1074, "end_char_pos": 1106}, {"type": "D", "before": "have also", "after": null, "start_char_pos": 1130, "end_char_pos": 1139}, {"type": "D", "before": "Google Dengue Trends", "after": null, "start_char_pos": 1252, "end_char_pos": 1272}, {"type": "R", "before": "uses the query information to detect the dengue trends and it compares the results to the countries' official surveillance data. The primary research behind the Google Dengue Trend is found in Chan et al. 's work", "after": "Flu Trends stopped publishing reports in 2015.", "start_char_pos": 1280, "end_char_pos": 1492}, {"type": "A", "before": null, "after": "Google also used aggregated search query data to detect dengue fever trends", "start_char_pos": 1493, "end_char_pos": 1493}, {"type": "A", "before": null, "after": "Research has also cast doubt on the accuracy of some of these predictions. Google has continued this work to track and predict the COVID-19 pandemic, creating an open dataset on COVID-related search queries for use by researchers.", "start_char_pos": 1496, "end_char_pos": 1496}, {"type": "R", "before": "Flu Detector", "after": "Other flu prediction projects, including Flu Detector, have come and gone since the advent and removal of Google Flu Trends. Flu Detector", "start_char_pos": 1510, "end_char_pos": 1522}, {"type": "R", "before": "et al.", "after": "and other researchers", "start_char_pos": 1557, "end_char_pos": 1563}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 1597, "end_char_pos": 1599}, {"type": "R", "before": "Machine Learning that firstly uses Feature Selection", "after": "machine learning that first used feature selection", "start_char_pos": 1618, "end_char_pos": 1670}, {"type": "R", "before": "uses", "after": "used", "start_char_pos": 1744, "end_char_pos": 1748}, {"type": "R", "before": "The primary research behind the Flu Detector is found here; a", "after": "It also formed the basis for a proposed", "start_char_pos": 1835, "end_char_pos": 1896}, {"type": "D", "before": "as well is proposed here", "after": null, "start_char_pos": 1943, "end_char_pos": 1967}, {"type": "D", "before": "A new, totally revamped (in terms of models and online data) version of the Flu Detector has been recently launched.", "after": null, "start_char_pos": 1970, "end_char_pos": 2086}, {"type": "R", "before": "developed by Vasileios Lamposet al. at the University of Bristol. It performs", "after": "also developed by Lampos' team. It performed", "start_char_pos": 2129, "end_char_pos": 2206}, {"type": "A", "before": null, "after": "by", "start_char_pos": 2284, "end_char_pos": 2284}, {"type": "A", "before": null, "after": ".", "start_char_pos": 2375, "end_char_pos": 2375}, {"type": "A", "before": null, "after": "Privacy issues The rise of infoveillance brings up questions about privacy. Privacy concerns are partially dependent on the level of analysis and how data are collected and managed. For instance, individuals may be re-identifiable from search query datasets that have not been properly de-identified. Privacy concerns are increased if data analysis is not done automatically and if search trajectories of individual users are examined", "start_char_pos": 2376, "end_char_pos": 2376}], "sents_char_pos": [0, 147, 292, 403, 457, 564, 930, 1011, 1251, 1408, 1484, 1495, 1593, 1834, 1894, 1969, 2086, 2194]}
+{"doc_id": "34069", "revision_depth": "3", "before_revision": "List of Winter Olympic Games No. Year Host Sports Disciplines Competitors Dates Events Nations Top Nation Ref Total Men Women I 1924 Chamonix , France 6 9 258 247 11 25 January \u2013 5 February 1924 16 16 II 1928 St. Moritz , Switzerland 4 8 464 438 26 11\u201319 February 1928 14 25 III 1932 Lake Placid , United States 4 7 252 231 21 4\u201315 February 1932 14 17 IV 1936 Garmisch-Partenkirchen , Germany 4 8 646 566 80 6\u201316 February 1936 17 28 1940 Awarded to Sapporo, Japan; cancelled because of World War II 1944 Awarded to Cortina d'Ampezzo, Italy; cancelled because of World War II V 1948 St. Moritz , Switzerland 4 9 669 592 77 30 January \u2013 8 February 1948 22 28 VI 1952 Oslo , Norway 4 8 694 585 109 14\u201325 February 1952 22 30 VII 1956 Cortina d'Ampezzo , Italy 4 8 821 687 134 26 January \u2013 5 February 1956 24 32 VIII 1960 Squaw Valley , United States 4 8 665 521 144 18\u201328 February 1960 27 30 IX 1964 Innsbruck , Austria 6 10 1091 892 199 29 January \u2013 9 February 1964 34 36 X 1968 Grenoble , France 6 10 1158 947 211 6\u201318 February 1968 35 37 XI 1972 Sapporo , Japan 6 10 1006 801 205 3\u201313 February 1972 35 35 XII 1976 Innsbruck , Austria 6 10 1123 892 231 4\u201315 February 1976 37 37 XIII 1980 Lake Placid , United States 6 10 1072 840 232 13\u201324 February 1980 38 37 XIV 1984 Sarajevo , Yugoslavia 6 10 1272 998 274 8\u201319 February 1984 39 49 XV 1988 Calgary , Canada 6 10 1423 1122 301 13\u201328 February 1988 46 57 XVI 1992 Albertville , France 6 12 1801 1313 488 8\u201323 February 1992 57 64 XVII 1994 Lillehammer , Norway 6 12 1737 1215 522 12\u201327 February 1994 61 67 XVIII 1998 Nagano , Japan 7 14 2176 1389 787 7\u201322 February 1998 68 72 XIX 2002 Salt Lake City , United States 7 15 2399 1513 886 8\u201324 February 2002 78 78The IOC site for the 2002 Winter Olympic Games gives erroneous figure of 77 participated NOCs; however, one can count 78 nations looking through official results of 2002 Games Part 1 , Part 2 , Part 3 . Probably this error is consequence that Costa Rica's delegation of one athlete joined the Games after the Opening Ceremony, so 77 nations participated in Opening Ceremony and 78 nations participated in the Games. XX 2006 Turin , Italy 7 15 2508 1548 960 10\u201326 February 2006 84 80 XXI 2010 Vancouver , Canada 7 15 2566 1522 1044 12\u201328 February 2010 86 82 XXII 2014 Sochi , Russia 7 15 2873 1714 1159 7\u201323 February 2014 98 88 XXIII 2018 Pyeongchang , South Korea 7 15 2922 1680 1242 9\u201325 February 2018 102 92 XXIV 2022 Beijing , China 7 15 4\u201320 February 2022 109 XXV 2026 Milan and Cortina d'Ampezzo , Italy 6\u201322 February 2026 Unlike the Summer Olympics, the cancelled 1940 Winter Olympics and 1944 Winter Olympics are not included in the official Roman numeral counts for the Winter Games. While the official titles of the Summer Games count Olympiads, the titles of the Winter Games only count the Games themselves. center|632x632px|Map of Winter Olympics locations. Countries that have hosted one Winter Olympics are shaded green, while countries that have hosted two or more are shaded blue.|thumb", "after_revision": "List of Winter Olympic Games No. Year Host Sports Disciplines Competitors Dates Events Nations Top Nation Ref Total Men Women I 1924 Chamonix 6 9 258 247 11 25 January \u2013 5 February 1924 16 16 II 1928 St. Moritz 4 8 464 438 26 11\u201319 February 1928 14 25 III 1932 Lake Placid 4 7 252 231 21 4\u201315 February 1932 14 17 IV 1936 Garmisch-Partenkirchen 4 8 646 566 80 6\u201316 February 1936 17 28 1940 Awarded to Sapporo, Japan; cancelled because of World War II 1944 Awarded to Cortina d'Ampezzo, Italy; cancelled because of World War II V 1948 St. Moritz 4 9 669 592 77 30 January \u2013 8 February 1948 22 28 VI 1952 Oslo 4 8 694 585 109 14\u201325 February 1952 22 30 VII 1956 Cortina d'Ampezzo 4 8 821 687 134 26 January \u2013 5 February 1956 24 32 VIII 1960 Squaw Valley 4 8 665 521 144 18\u201328 February 1960 27 30 IX 1964 Innsbruck 6 10 1091 892 199 29 January \u2013 9 February 1964 34 36 X 1968 Grenoble 6 10 1158 947 211 6\u201318 February 1968 35 37 XI 1972 Sapporo 6 10 1006 801 205 3\u201313 February 1972 35 35 XII 1976 Innsbruck 6 10 1123 892 231 4\u201315 February 1976 37 37 XIII 1980 Lake Placid 6 10 1072 840 232 13\u201324 February 1980 38 37 XIV 1984 Sarajevo 6 10 1272 998 274 8\u201319 February 1984 39 49 XV 1988 Calgary 6 10 1423 1122 301 13\u201328 February 1988 46 57 XVI 1992 Albertville 6 12 1801 1313 488 8\u201323 February 1992 57 64 XVII 1994 Lillehammer 6 12 1737 1215 522 12\u201327 February 1994 61 67 XVIII 1998 Nagano 7 14 2176 1389 787 7\u201322 February 1998 68 72 XIX 2002 Salt Lake City 7 15 2399 1513 886 8\u201324 February 2002 78 78The IOC site for the 2002 Winter Olympic Games gives erroneous figure of 77 participated NOCs; however, one can count 78 nations looking through official results of 2002 Games Part 1 , Part 2 , Part 3 . Probably this error is consequence that Costa Rica's delegation of one athlete joined the Games after the Opening Ceremony, so 77 nations participated in Opening Ceremony and 78 nations participated in the Games. XX 2006 Turin 7 15 2508 1548 960 10\u201326 February 2006 84 80 XXI 2010 Vancouver 7 15 2566 1522 1044 12\u201328 February 2010 86 82 XXII 2014 Sochi 7 15 2873 1714 1159 7\u201323 February 2014 98 88 XXIII 2018 Pyeongchang 7 15 2922 1680 1242 9\u201325 February 2018 102 92 XXIV 2022 Beijing 7 15 4\u201320 February 2022 109 XXV 2026 Milan and Cortina d'Ampezzo 6\u201322 February 2026 Unlike the Summer Olympics, the cancelled 1940 Winter Olympics and 1944 Winter Olympics are not included in the official Roman numeral counts for the Winter Games. While the official titles of the Summer Games count Olympiads, the titles of the Winter Games only count the Games themselves. center|632x632px|Map of Winter Olympics locations. Countries that have hosted one Winter Olympics are shaded green, while countries that have hosted two or more are shaded blue.|thumb", "edit_actions": [{"type": "D", "before": ", France", "after": null, "start_char_pos": 142, "end_char_pos": 150}, {"type": "D", "before": ", Switzerland", "after": null, "start_char_pos": 220, "end_char_pos": 233}, {"type": "D", "before": ", United States", "after": null, "start_char_pos": 296, "end_char_pos": 311}, {"type": "D", "before": ", Germany", "after": null, "start_char_pos": 383, "end_char_pos": 392}, {"type": "D", "before": ", Switzerland", "after": null, "start_char_pos": 593, "end_char_pos": 606}, {"type": "D", "before": ", Norway", "after": null, "start_char_pos": 670, "end_char_pos": 678}, {"type": "D", "before": ", Italy", "after": null, "start_char_pos": 748, "end_char_pos": 755}, {"type": "D", "before": ", United States", "after": null, "start_char_pos": 830, "end_char_pos": 845}, {"type": "D", "before": ", Austria", "after": null, "start_char_pos": 906, "end_char_pos": 915}, {"type": "D", "before": ", France", "after": null, "start_char_pos": 985, "end_char_pos": 993}, {"type": "D", "before": ", Japan", "after": null, "start_char_pos": 1053, "end_char_pos": 1060}, {"type": "D", "before": ", Austria", "after": null, "start_char_pos": 1123, "end_char_pos": 1132}, {"type": "D", "before": ", United States", "after": null, "start_char_pos": 1198, "end_char_pos": 1213}, {"type": "D", "before": ", Yugoslavia", "after": null, "start_char_pos": 1276, "end_char_pos": 1288}, {"type": "D", "before": ", Canada", "after": null, "start_char_pos": 1348, "end_char_pos": 1356}, {"type": "D", "before": ", France", "after": null, "start_char_pos": 1423, "end_char_pos": 1431}, {"type": "D", "before": ", Norway", "after": null, "start_char_pos": 1498, "end_char_pos": 1506}, {"type": "D", "before": ", Japan", "after": null, "start_char_pos": 1570, "end_char_pos": 1577}, {"type": "D", "before": ", United States", "after": null, "start_char_pos": 1646, "end_char_pos": 1661}, {"type": "D", "before": ", Italy", "after": null, "start_char_pos": 2135, "end_char_pos": 2142}, {"type": "D", "before": ", Canada", "after": null, "start_char_pos": 2207, "end_char_pos": 2215}, {"type": "D", "before": ", Russia", "after": null, "start_char_pos": 2278, "end_char_pos": 2286}, {"type": "D", "before": ", South Korea", "after": null, "start_char_pos": 2355, "end_char_pos": 2368}, {"type": "D", "before": ", China", "after": null, "start_char_pos": 2433, "end_char_pos": 2440}, {"type": "D", "before": ", Italy", "after": null, "start_char_pos": 2506, "end_char_pos": 2513}], "sents_char_pos": [0, 32, 464, 540, 585, 634, 784, 946, 986, 1054, 1124, 1199, 1277, 1349, 1799, 2120, 2136, 2208, 2696, 2874]}
+{"doc_id": "3430", "revision_depth": "1", "before_revision": "upright=1.4|A welcome screen for the Free-net bulletin board, from 1994 A bulletin board system or BBS (also called Computer Bulletin Board Service, CBBS) is a computer server running software that allows users to connect to the system using a terminal program. Once logged in, the user can perform functions such as uploading and downloading software and data, reading news and bulletins, and exchanging messages with other users through public message boards and sometimes via direct chatting. In the early 1980s, message networks such as FidoNet sprang up to provide services such as NetMail, which is similar to internet based email. A key innovation required for the popularization of the BBS was the Smartmodem manufactured by Hayes Microcomputer Products. Internal modems like the ones used by CBBS and similar early systems were usable, but generally expensive due to the manufacturer having to make a different modem for every computer platform they wanted to target. They were also limited to those computers with internal expansion, and could not be used with other useful platforms like video terminals. External modems were available for these platforms but required the phone to be dialed using a conventional making them unable to accept incoming calls without manual intervention. Internal modems could be software controlled to perform both outbound and inbound calls, but external modems had only the data pins to communicate with the host system. The introduction of the Smartmodem led to the first real wave of BBS systems. Limited in both speed and storage capacity, these systems were normally dedicated solely to messaging, both private email and public forums. File transfers were painfully slow at these speeds, and file libraries were typically limited to text files containing lists of other BBS systems. These systems attracted a particular type of user who used the BBS as a unique type of communications medium, and when these local systems were crowded from the market in the 1990s, their loss was lamented for many years. There was a lengthy delay before 9600 bit/s models began to appear on the market. 9600 bit/s was not even established as a strong standard before V.32bis at 14.4 kbit/s took over in the early 1990s. This period also saw the rapid rise in capacity and a dramatic drop in the price of hard drives. By the late 1980s, many BBS systems had significant file libraries, and this gave rise to leeching, users calling BBSes solely for their files. These users would tie up the modem for some time, leaving less time for other users, who got busy signals. The resulting upheaval eliminated many of the pioneering message-centric systems.\"File Sponges, the BBS nightmare\" , Chips 'n Bits This also gave rise to a new class of BBS systems, dedicated solely to file upload and downloads. These systems charged for access, typically a flat monthly fee, compared to the per-hour fees charged by Event Horizons BBS and most online services. A host of 3rd party services sprang up to support these systems, offering simple credit card merchant account gateways for the payment of monthly fees, and entire file libraries on compact disk that made initial setup very easy. Early 1990s editions of Boardwatch were filled with ads for single-click install solutions dedicated to these new sysops. While this gave the market a bad reputation, it also led to its greatest success. During the early 1990s, there were a number of mid-sized software companies dedicated to BBS software, and the number of BBSes in service reached its peak. Towards the early 1990s, the BBS industry became so popular that it spawned three monthly magazines, Boardwatch, BBS Magazine, and in Asia and Australia, Chips 'n Bits Magazine which devoted extensive coverage of the software and technology innovations and people behind them, and listings to US and worldwide BBSes.Chips 'n' Bits : the Northern Territory Computer Users' newsletter, catalogue.nla.gov.au, retrieved March 15, 2009 In addition, in the US, a major monthly magazine, Computer Shopper, carried a list of BBSes along with a brief abstract of each of their offerings. GUIs Through the late 1980s and early 1990s, there was considerable experimentation with ways to improve the BBS experience from its command-line interface roots. Almost every popular system improved matters somewhat by adding ANSI-based color menus to make reading easier, and most also allowed cursor commands to offer command-line recall and similar features. Another common feature was the use of autocomplete to make menu navigation simpler, a feature that would not re-appear on the web until decades later. A number of systems also made forays into GUI-based interfaces, either using character graphics sent from the host, or using custom GUI-based terminal systems. The latter initially appeared, unsurprisingly, on the Macintosh platform, where TeleFinder and FirstClass became very popular. FirstClass offered a host of features that would be difficult or impossible under a terminal-based solution, including bi-directional information flow and non-blocking operation that allowed the user to exchange files in both directions while continuing to use the message system and chat, all in separate windows. Skypix featured on Amiga a complete markup language. It used a standardized set of icons to indicate mouse driven commands available online and to recognize different filetypes present on BBS storage media. It was capable to transmit data like images, audio files, and audio clips between users linked to same BBS or off-line if BBS was in the circuit of FidoNet organization. On the PC, efforts were more oriented to extensions of the original terminal concept, with the GUI being described in the information on the host. One example was the Remote Imaging Protocol, essentially a picture description system, which remained relatively obscure. Probably the ultimate development of this style of operation was the dynamic page implementation of the University of Southern California BBS (USCBBS) by Susan Biddlecomb, which predated the implementation of the HTML Dynamic web page. A complete Dynamic web page implementation was accomplished using TBBS with a TDBS add-on presenting a complete menu system individually customized for each user. Rise of the Internet and decline of BBS The demand for complex ANSI and ASCII screens and larger file transfers taxed available channel capacity, which in turn propelled demand for faster modems. 14.4 kbit/s modems were standard for a number of years while various companies attempted to introduce non-standard systems with higher performance, normally about 19.2 kbit/s. Another delay followed due to a long V.34 standards process before 28.8 kbit/s was released, only to be quickly replaced by 33.6 kbit/s, and then 56 kbit/s. These developments together resulted in the sudden obsolescence of bulletin board technology in 1995 and the collapse of its supporting market. Technically, Internet service offered an enormous advantage over BBS systems, as a single connection to the user's Internet service provider allowed them to contact services around the world. In comparison, BBS systems relied on a direct point-to-point connection, so even dialing multiple local systems required multiple phone calls. Moreover, Internet protocols allowed that same single connection to be used to contact multiple services at the same time , say download files from an FTP library while checking the weather on a local news web site . In comparison, a connection to a BBS allowed access only to the information on that system. In the 2000s, most traditional BBS systems migrated to the Internet using Telnet or SSH protocols. Between 700 and 800 are thought to be active in 2020, fewer than 30 of these being of the traditional \"dial-up\" (modem) variety. Unlike modern websites and online services that are typically hosted by third-party companies in commercial data centers, BBS computers (especially for smaller boards) were typically operated from the SysOp 's home. As such, access could be unreliable, and in many cases, only one user could be on the system at a time. Only larger BBSes with multiple phone lines using specialized hardware, multitasking software, or a LAN connecting multiple computers, could host multiple simultaneous users. The first BBSes used homebrew software, quite often written or customized by the SysOps themselves, running on early S-100 bus microcomputer systems such as the Altair 8800, IMSAI 8080 and Cromemco under the CP/M operating system. Soon after, BBS software was being written for all of the major home computer systems of the late 1970s era \u2013 the Apple II, Atari 8-bit family, Commodore and TRS-80 being some of the most popular. A few years later, in 1981, IBM introduced the first DOS based IBM PC, and due to the overwhelming popularity of PCs and their clones, DOS soon became the operating system on which the majority of BBS programs were run. RBBS-PC, ported over from the CP/M world, and Fido BBS, created by Tom Jennings (who later founded FidoNet) were the first notable DOS BBS programs. Many successful commercial BBS programs were developed for DOS, such as PCBoard BBS, RemoteAccess BBS, and Wildcat! BBS. Some popular freeware BBS programs for DOS included Telegard BBS and Renegade BBS, which both had early origins from leaked WWIV BBS source code. There were several dozen other BBS programs developed over the DOS era, and many were released under the shareware concept, while some were released as freeware including iniquity. By 1995, many of the DOS-based BBSes had begun switching to modern multitasking operating systems, such as OS/2, Windows 95, and Linux. One of the first graphics based BBS applications was Excalibur BBS with a low bandwidth applications that required its own client for efficiency. This led to one of the earliest implementations of Electronic Commerce in 1996 with replication of partner stores around the globe. TCP/IP networking allowed most of the remaining BBSes to evolve and include Internet hosting capabilities. Recent BBS software, such as Synchronet, Mystic BBS, EleBBS, DOC or Wildcat! BBS, provide access using the Telnet protocol rather than dialup, or by using legacy DOS-based BBS software with a FOSSIL-to-Telnet redirector such as NetFoss. The Amiga Skyline BBS software was the first in 1987 featuring a script markup language communication protocol called Skypix which was capable of giving the user a complete graphical interface, featuring rich graphic content , changeable fonts, mouse-controlled actions, animations and sound. As the BBS phenomenon grew, so did the popularity of special interest boards. Bulletin Board Systems could be found for almost every hobby and interest. Popular interests included politics, religion, music, dating, and alternative lifestyles. Many SysOps also adopted a theme in which they customized their entire BBS (welcome screens, prompts, menus, and so on) to reflect that theme. Common themes were based on fantasy, or were intended to give the user the illusion of being somewhere else, such as in a sanatorium, wizard's castle, or on a pirate ship. In the early days, the file download library consisted of files that the SysOps obtained themselves from other BBSes and friends. Many BBSes inspected every file uploaded to their public file download library to ensure that the material did not violate copyright law. As time went on, shareware CD-ROMs were sold with up to thousands of files on each CD-ROM. Small BBSes copied each file individually to their hard drive. Some systems used a CD-ROM drive to make the files available. Advanced BBSes used Multiple CD-ROM disc changer units that switched 6 CD-ROM disks on demand for the caller(s). Large systems used all 26 DOS drive letters with multi-disk changers housing tens of thousands of copyright-free shareware or freeware files available to all callers. These BBSes were generally more family friendly , avoiding the seedier side of BBSes. Access to these systems varied from single to multiple modem lines with some requiring little or no confirmed registration. Another common type of board was the support BBS run by a manufacturer of computer products or software. These boards were dedicated to supporting users of the company's products with question and answer forums, news and updates, and downloads. Most of them were not a free call. Today, these services have moved to the web . Some general purpose Bulletin Board Systems had special levels of access that were given to those who paid extra money, uploaded useful files or knew the SysOp personally. These specialty and pay BBSes usually had something unique to offer their users, such as large file libraries, warez, pornography, chat rooms or Internet access. As is it was prohibitively expensive for the hobbyist SysOp to have a dedicated connection to another system, FidoNet was developed as a store and forward network. Private email (Netmail), public message boards (Echomail) and eventually even file attachments on a FidoNet-capable BBS would be bundled into one or more archive files over a set time interval. These archive files were then compressed with ARC or ZIP and forwarded to (or polled by) another nearby node or hub via a dialup Xmodem session. Messages would be relayed around various FidoNet hubs until they were eventually delivered to their destination. The hierarchy of FidoNet BBS nodes, hubs, and zones was maintained in a routing table called a Nodelist. Some larger BBSes or regional FidoNet hubs would make several transfers per day, some even to multiple nodes or hubs, and as such, transfers usually occurred at night or early morning when toll rates were lowest. In Fido's heyday, sending a Netmail message to a user on a distant FidoNet node, or participating in an Echomail discussion could take days, especially if any FidoNet nodes or hubs in the message's route only made one transfer call per day. FidoNet was platform-independent and would work with any BBS that was written to use it. BBSes that did not have integrated FidoNet capability could usually add it using an external FidoNet front-end mailer such as SEAdog, FrontDoor, BinkleyTerm, InterMail or D'Bridge, and a mail processor such as FastEcho or Squish. The front-end mailer would conduct the periodic FidoNet transfers, while the mail processor would usually run just before and just after the mailer ran. This program would scan for and pack up new outgoing messages, and then unpack, sort and \"toss\" the incoming messages into a BBS user's local email box or into the BBS's local message bases reserved for Echomail. As such, these mail processors were commonly called \"scanner/tosser/packers . \" Before commercial Internet access became common, these networks of BBSes provided regional and international e-mail and message bases. Some even provided gateways, such as UFGATE, by which members could send / receive e-mail to / from the Internet via UUCP, and many FidoNet discussion groups were shared via gateway to Usenet. Elaborate schemes allowed users to download binary files, search gopherspace, and interact with distant programs, all using plain text e-mail. As the volume of FidoNet Mail increased and newsgroups from the early days of the Internet became available, satellite data downstream services became viable for larger systems. The satellite service provided access to FidoNet and Usenet newsgroups in large volumes at a reasonable fee. By connecting a small dish %DIFDELCMD < & %%% receiver, a constant downstream of thousands of FidoNet and Usenet newsgroups could be received. The local BBS only needed to upload new outgoing messages via the modem network back to the satellite service. This method drastically reduced phone data transfers while dramatically increasing the number of message forums. Much of the shareware movement was started via user distribution of software through BBSes. A notable example was Phil Katz's PKARC (and later PKZIP, using the same \".zip\" algorithm that WinZip and other popular archivers now use); also other concepts of software distribution like freeware, postcardware like JPEGview and donationware like Red Ryder for the Macintosh first appeared on BBS sites. Doom from id Software and nearly all Apogee Software games were distributed as shareware (Apogee is, in fact, credited for adding an order form to a shareware demo). The Internet has largely erased the distinction of shareware \u2013 most users now download the software directly from the developer's website rather than receiving it from another BBS user 'sharing' it. Today shareware is commonly used to mean electronically distributed software from a small developer. The BBS software usually provides: Menu Systems One or more message bases Uploading and downloading of message packets in QWK format using XMODEM, YMODEM or ZMODEM File areas SysOp side, live viewing of all caller activity Voting \u2013 opinion booths Statistics on message posters, top uploaders / downloaders Online games (usually single player or only a single active player at a given time) A doorway to third-party online games Usage auditing capabilities Multi-user chat (only possible on multi-line BBSes) Internet email (more common in later Internet-connected BBSes) Networked message boards Most modern BBSes allow telnet access over the Internet using a telnet server and a virtual FOSSIL driver. A \"yell for SysOp\" page caller side menu item that sounded an audible alarm to the SysOp . If chosen, the SysOp could then initiate a text-to-text chat with the caller. Primitive social networking features, such as leaving messages on a user's profile", "after_revision": "upright=1.4|A welcome screen for the Free-net bulletin board, from 1994 A bulletin board system or BBS (also called Computer Bulletin Board Service, CBBS) is a computer server running software that allows users to connect to the system using a terminal program. Once logged in, the user can perform functions such as uploading and downloading software and data, reading news and bulletins, and exchanging messages with other users through public message boards and sometimes via direct chatting. In the early 1980s, message networks such as FidoNet were developed to provide services such as NetMail, which is similar to internet-based email. A key innovation required for the popularization of the BBS was the Smartmodem manufactured by Hayes Microcomputer Products. Internal modems like the ones used by CBBS and similar early systems were usable, but generally expensive due to the manufacturer having to make a different modem for every computer platform they wanted to target. They were also limited to those computers with internal expansion, and could not be used with other useful platforms like video terminals. External modems were available for these platforms but required the phone to be dialed using a conventional handset, making them unable to accept incoming calls without manual intervention. Internal modems could be software-controlled to perform both outbound and inbound calls, but external modems had only the data pins to communicate with the host system. The introduction of the Smartmodem led to the first real wave of BBS systems. Limited in both speed and storage capacity, these systems were normally dedicated solely to messaging, both private email and public forums. File transfers were extremely slow at these speeds, and file libraries were typically limited to text files containing lists of other BBS systems. These systems attracted a particular type of user who used the BBS as a unique type of communications medium, and when these local systems were crowded from the market in the 1990s, their loss was lamented for many years. There was a lengthy delay before 9600 bit/s models began to appear on the market. 9600 bit/s was not even established as a strong standard before V.32bis at 14.4 kbit/s took over in the early 1990s. This period also saw the rapid rise in capacity and a dramatic drop in the price of hard drives. By the late 1980s, many BBS systems had significant file libraries, and this gave rise to leechingusers calling BBSes solely for their files. These users would use the modem for some time, leaving less time for other users, who got busy signals. The resulting upheaval eliminated many of the pioneering message-centric systems.\"File Sponges, the BBS nightmare\" , Chips 'n Bits This also gave rise to a new class of BBS systems, dedicated solely to file upload and downloads. These systems charged for access, typically a flat monthly fee, compared to the per-hour fees charged by Event Horizons BBS and most online services. Many third-party services were developed to support these systems, offering simple credit card merchant account gateways for the payment of monthly fees, and entire file libraries on compact disk that made initial setup very easy. Early 1990s editions of Boardwatch were filled with ads for single-click install solutions dedicated to these new sysops. While this gave the market a bad reputation, it also led to its greatest success. During the early 1990s, there were a number of mid-sized software companies dedicated to BBS software, and the number of BBSes in service reached its peak. Towards the early 1990s, BBS became so popular that it spawned three monthly magazines, Boardwatch, BBS Magazine, and in Asia and Australia, Chips 'n Bits Magazine which devoted extensive coverage of the software and technology innovations and people behind them, and listings to US and worldwide BBSes.Chips 'n' Bits : the Northern Territory Computer Users' newsletter, catalogue.nla.gov.au, retrieved March 15, 2009 In addition, in the US, a major monthly magazine, Computer Shopper, carried a list of BBSes along with a brief abstract of each of their offerings. GUIs Through the late 1980s and early 1990s, there was considerable experimentation with ways to improve the BBS experience from its command-line interface roots. Almost every popular system improved matters somewhat by adding ANSI-based color menus to make reading easier, and most also allowed cursor commands to offer command-line recall and similar features. Another common feature was the use of autocomplete to make menu navigation simpler, a feature that would not re-appear on the Web until decades later. A number of systems also made forays into GUI-based interfaces, either using character graphics sent from the host, or using custom GUI-based terminal systems. The latter initially appeared, unsurprisingly, on the Macintosh platform, where TeleFinder and FirstClass became very popular. FirstClass offered a host of features that would be difficult or impossible under a terminal-based solution, including bi-directional information flow and non-blocking operation that allowed the user to exchange files in both directions while continuing to use the message system and chat, all in separate windows. Skypix featured on Amiga a complete markup language. It used a standardized set of icons to indicate mouse driven commands available online and to recognize different filetypes present on BBS storage media. It was capable of transmitting data like images, audio files, and audio clips between users linked to the same BBS or off-line if the BBS was in the circuit of the FidoNet organization. On the PC, efforts were more oriented to extensions of the original terminal concept, with the GUI being described in the information on the host. One example was the Remote Imaging Protocol, essentially a picture description system, which remained relatively obscure. Probably the ultimate development of this style of operation was the dynamic page implementation of the University of Southern California BBS (USCBBS) by Susan Biddlecomb, which predated the implementation of the HTML Dynamic web page. A complete Dynamic web page implementation was accomplished using TBBS with a TDBS add-on presenting a complete menu system individually customized for each user. Rise of the Internet and decline of BBS The demand for complex ANSI and ASCII screens and larger file transfers taxed available channel capacity, which in turn increased demand for faster modems. 14.4 kbit/s modems were standard for a number of years while various companies attempted to introduce non-standard systems with higher performancenormally about 19.2 kbit/s. Another delay followed due to a long V.34 standards process before 28.8 kbit/s was released, only to be quickly replaced by 33.6 kbit/s, and then 56 kbit/s. These developments together resulted in the sudden obsolescence of bulletin board technology in 1995 and the collapse of its supporting market. Technically, Internet service offered an enormous advantage over BBS systems, as a single connection to the user's Internet service provider allowed them to contact services around the world. In comparison, BBS systems relied on a direct point-to-point connection, so even dialing multiple local systems required multiple phone calls. Moreover, Internet protocols allowed that same single connection to be used to contact multiple services at the same time ; for example, downloading files from an FTP library while checking the weather on a local news website . In comparison, a connection to a BBS allowed access only to the information on that system. In the 2000s, most traditional BBS systems migrated to the Internet using Telnet or SSH protocols. Between 700 and 800 are thought to be active in 2020fewer than 30 of these being of the traditional \"dial-up\" (modem) variety. Unlike modern websites and online services that are typically hosted by third-party companies in commercial data centers, BBS computers (especially for smaller boards) were typically operated from the system operator 's home. As such, access could be unreliable, and in many cases, only one user could be on the system at a time. Only larger BBSes with multiple phone lines using specialized hardware, multitasking software, or a LAN connecting multiple computers, could host multiple simultaneous users. The first BBSes used homebrew software, quite often written or customized by the system operators themselves, running on early S-100 bus microcomputer systems such as the Altair 8800, IMSAI 8080 and Cromemco under the CP/M operating system. Soon after, BBS software was being written for all of the major home computer systems of the late 1970s erathe Apple II, Atari 8-bit family, Commodore and TRS-80 being some of the most popular. A few years later, in 1981, IBM introduced the first DOS based IBM PC, and due to the overwhelming popularity of PCs and their clones, DOS soon became the operating system on which the majority of BBS programs were run. RBBS-PC, ported over from the CP/M world, and Fido BBS, developed by Tom Jennings (who later founded FidoNet) were the first notable DOS BBS programs. Many successful commercial BBS programs were developed for DOS, such as PCBoard BBS, RemoteAccess BBS, and Wildcat! BBS. Some popular freeware BBS programs for DOS included Telegard BBS and Renegade BBS, which both had early origins from leaked WWIV BBS source code. There were several dozen other BBS programs developed over the DOS era, and many were released under the shareware concept, while some were released as freeware including iniquity. By 1995, many of the DOS-based BBSes had begun switching to modern multitasking operating systems, such as OS/2, Windows 95, and Linux. One of the first graphics-based BBS applications was Excalibur BBS with low-bandwidth applications that required its own client for efficiency. This led to one of the earliest implementations of Electronic Commerce in 1996 with replication of partner stores around the globe. TCP/IP networking allowed most of the remaining BBSes to evolve and include Internet hosting capabilities. Recent BBS software, such as Synchronet, Mystic BBS, EleBBS, DOC or Wildcat! BBS, provide access using the Telnet protocol rather than dialup, or by using legacy DOS-based BBS software with a FOSSIL-to-Telnet redirector such as NetFoss. The Amiga Skyline BBS software was the first in 1987 featuring a script markup language communication protocol called Skypix which was capable of giving the user a complete graphical interface, featuring rich graphics , changeable fonts, mouse-controlled actions, animations and sound. As the BBS phenomenon grew, so did the popularity of special interest boards. Bulletin Board Systems could be found for almost every hobby and interest. Popular interests included politics, religion, music, dating, and alternative lifestyles. Many system operators also adopted a theme in which they customized their entire BBS (welcome screens, prompts, menus, and so on) to reflect that theme. Common themes were based on fantasy, or were intended to give the user the illusion of being somewhere else, such as in a sanatorium, wizard's castle, or on a pirate ship. In the early days, the file download library consisted of files that the system operators obtained themselves from other BBSes and friends. Many BBSes inspected every file uploaded to their public file download library to ensure that the material did not violate copyright law. As time went on, shareware CD-ROMs were sold with up to thousands of files on each CD-ROM. Small BBSes copied each file individually to their hard drive. Some systems used a CD-ROM drive to make the files available. Advanced BBSes used Multiple CD-ROM disc changer units that switched 6 CD-ROM disks on demand for the caller(s). Large systems used all 26 DOS drive letters with multi-disk changers housing tens of thousands of copyright-free shareware or freeware files available to all callers. These BBSes were generally more family-friendly , avoiding the seedier side of BBSes. Access to these systems varied from single to multiple modem lines with some requiring little or no confirmed registration. Another common type of board was the support BBS run by a manufacturer of computer products or software. These boards were dedicated to supporting users of the company's products with question and answer forums, news and updates, and downloads. Most of them were not a free call. Today, these services have moved to the Web . Some general-purpose Bulletin Board Systems had special levels of access that were given to those who paid extra money, uploaded useful files or knew the system operator personally. These specialty and pay BBSes usually had something unique to offer their users, such as large file libraries, warez, pornography, chat rooms or Internet access. As is it was prohibitively expensive for the hobbyist system operator to have a dedicated connection to another system, FidoNet was developed as a store and forward network. Private email (Netmail), public message boards (Echomail) and eventually even file attachments on a FidoNet-capable BBS would be bundled into one or more archive files over a set time interval. These archive files were then compressed with ARC or ZIP and forwarded to (or polled by) another nearby node or hub via a dialup Xmodem session. Messages would be relayed around various FidoNet hubs until they were eventually delivered to their destination. The hierarchy of FidoNet BBS nodes, hubs, and zones was maintained in a routing table called a Nodelist. Some larger BBSes or regional FidoNet hubs would make several transfers per day, some even to multiple nodes or hubs, and as such, transfers usually occurred at night or in the early morning when toll rates were lowest. In Fido's heyday, sending a Netmail message to a user on a distant FidoNet node, or participating in an Echomail discussion could take days, especially if any FidoNet nodes or hubs in the message's route only made one transfer call per day. FidoNet was platform-independent and would work with any BBS that was written to use it. BBSes that did not have integrated FidoNet capability could usually add it using an external FidoNet front-end mailer such as SEAdog, FrontDoor, BinkleyTerm, InterMail or D'Bridge, and a mail processor such as FastEcho or Squish. The front-end mailer would conduct the periodic FidoNet transfers, while the mail processor would usually run just before and just after the mailer ran. This program would scan for and pack up new outgoing messages, and then unpack, sort and \"toss\" the incoming messages into a BBS user's local email box or into the BBS's local message bases reserved for Echomail. As such, these mail processors were commonly called \"scanner/tosser/packers \" . Before commercial Internet access became common, these networks of BBSes provided regional and international e-mail and message bases. Some even provided gateways, such as UFGATE, by which members could send and receive e-mail to and from the Internet via UUCP, and many FidoNet discussion groups were shared via gateway to Usenet. Elaborate schemes allowed users to download binary files, search gopherspace, and interact with distant programs, all using plain-text e-mail. As the volume of FidoNet Mail increased and newsgroups from the early days of the Internet became available, satellite data downstream services became viable for larger systems. The satellite service provided access to FidoNet and Usenet newsgroups in large volumes at a reasonable fee. By connecting a small dish %DIFDELCMD < & %%% and receiver, a constant downstream of thousands of FidoNet and Usenet newsgroups could be received. The local BBS only needed to upload new outgoing messages via the modem network back to the satellite service. This method drastically reduced phone data transfers while dramatically increasing the number of message forums. Much of the shareware movement was started via user distribution of software through BBSes. A notable example was Phil Katz's PKARC (and later PKZIP, using the same \".zip\" algorithm that WinZip and other popular archivers now use); also other concepts of software distribution like freeware, postcardware like JPEGview and donationware like Red Ryder for the Macintosh first appeared on BBS sites. Doom from id Software and nearly all Apogee Software games were distributed as shareware (Apogee is, in fact, credited for adding an order form to a shareware demo). The Internet has largely erased the distinction of sharewaremost users now download the software directly from the developer's website rather than receiving it from another BBS user 'sharing' it. Today shareware is commonly used to mean electronically-distributed software from a small developer. The BBS software usually provides: Menu systems One or more message bases Uploading and downloading of message packets in QWK format using XMODEM, YMODEM or ZMODEM File areas Live viewing of all caller activity by the system operator Voting \u2013 opinion booths Statistics on message posters, top uploaders / downloaders Online games (usually single player or only a single active player at a given time) A doorway to third-party online games Usage auditing capabilities Multi-user chat (only possible on multi-line BBSes) Internet email (more common in later Internet-connected BBSes) Networked message boards Most modern BBSes allow telnet access over the Internet using a telnet server and a virtual FOSSIL driver. A \"yell for SysOp\" page caller side menu item that sounded an audible alarm to the system operator . If chosen, the system operator could then initiate a text-to-text chat with the caller. Primitive social networking features, such as leaving messages on a user's profile", "edit_actions": [{"type": "R", "before": "sprang up", "after": "were developed", "start_char_pos": 549, "end_char_pos": 558}, {"type": "R", "before": "internet based", "after": "internet-based", "start_char_pos": 616, "end_char_pos": 630}, {"type": "A", "before": null, "after": "handset,", "start_char_pos": 1224, "end_char_pos": 1224}, {"type": "R", "before": "software controlled", "after": "software-controlled", "start_char_pos": 1323, "end_char_pos": 1342}, {"type": "R", "before": "painfully", "after": "extremely", "start_char_pos": 1706, "end_char_pos": 1715}, {"type": "R", "before": "leeching, users", "after": "leechingusers", "start_char_pos": 2441, "end_char_pos": 2456}, {"type": "R", "before": "tie up", "after": "use", "start_char_pos": 2513, "end_char_pos": 2519}, {"type": "R", "before": "A host of 3rd party services sprang up", "after": "Many third-party services were developed", "start_char_pos": 2981, "end_char_pos": 3019}, {"type": "R", "before": "the BBS industry", "after": "BBS", "start_char_pos": 3595, "end_char_pos": 3611}, {"type": "R", "before": "web", "after": "Web", "start_char_pos": 4638, "end_char_pos": 4641}, {"type": "R", "before": "to transmit", "after": "of transmitting", "start_char_pos": 5487, "end_char_pos": 5498}, {"type": "A", "before": null, "after": "the", "start_char_pos": 5570, "end_char_pos": 5570}, {"type": "A", "before": null, "after": "the", "start_char_pos": 5595, "end_char_pos": 5595}, {"type": "A", "before": null, "after": "the", "start_char_pos": 5622, "end_char_pos": 5622}, {"type": "R", "before": "propelled", "after": "increased", "start_char_pos": 6473, "end_char_pos": 6482}, {"type": "R", "before": "performance, normally", "after": "performancenormally", "start_char_pos": 6644, "end_char_pos": 6665}, {"type": "R", "before": ", say download", "after": "; for example, downloading", "start_char_pos": 7443, "end_char_pos": 7457}, {"type": "R", "before": "web site", "after": "website", "start_char_pos": 7527, "end_char_pos": 7535}, {"type": "R", "before": "2020, fewer", "after": "2020fewer", "start_char_pos": 7777, "end_char_pos": 7788}, {"type": "R", "before": "SysOp", "after": "system operator", "start_char_pos": 8059, "end_char_pos": 8064}, {"type": "R", "before": "SysOps", "after": "system operators", "start_char_pos": 8434, "end_char_pos": 8440}, {"type": "R", "before": "era \u2013 the", "after": "erathe", "start_char_pos": 8688, "end_char_pos": 8697}, {"type": "R", "before": "created", "after": "developed", "start_char_pos": 9057, "end_char_pos": 9064}, {"type": "R", "before": "graphics based", "after": "graphics-based", "start_char_pos": 9751, "end_char_pos": 9765}, {"type": "R", "before": "a low bandwidth", "after": "low-bandwidth", "start_char_pos": 9806, "end_char_pos": 9821}, {"type": "R", "before": "graphic content", "after": "graphics", "start_char_pos": 10565, "end_char_pos": 10580}, {"type": "R", "before": "SysOps", "after": "system operators", "start_char_pos": 10897, "end_char_pos": 10903}, {"type": "R", "before": "SysOps", "after": "system operators", "start_char_pos": 11280, "end_char_pos": 11286}, {"type": "R", "before": "family friendly", "after": "family-friendly", "start_char_pos": 12003, "end_char_pos": 12018}, {"type": "R", "before": "web", "after": "Web", "start_char_pos": 12501, "end_char_pos": 12504}, {"type": "R", "before": "general purpose", "after": "general-purpose", "start_char_pos": 12512, "end_char_pos": 12527}, {"type": "R", "before": "SysOp", "after": "system operator", "start_char_pos": 12661, "end_char_pos": 12666}, {"type": "R", "before": "SysOp", "after": "system operator", "start_char_pos": 12895, "end_char_pos": 12900}, {"type": "A", "before": null, "after": "in the", "start_char_pos": 13732, "end_char_pos": 13732}, {"type": "D", "before": ".", "after": null, "start_char_pos": 14778, "end_char_pos": 14779}, {"type": "A", "before": null, "after": ".", "start_char_pos": 14782, "end_char_pos": 14782}, {"type": "R", "before": "/", "after": "and", "start_char_pos": 14991, "end_char_pos": 14992}, {"type": "R", "before": "/", "after": "and", "start_char_pos": 15011, "end_char_pos": 15012}, {"type": "R", "before": "plain text", "after": "plain-text", "start_char_pos": 15235, "end_char_pos": 15245}, {"type": "A", "before": null, "after": "and", "start_char_pos": 15587, "end_char_pos": 15587}, {"type": "R", "before": "shareware \u2013 most", "after": "sharewaremost", "start_char_pos": 16524, "end_char_pos": 16540}, {"type": "R", "before": "electronically distributed", "after": "electronically-distributed", "start_char_pos": 16713, "end_char_pos": 16739}, {"type": "R", "before": "Systems", "after": "systems", "start_char_pos": 16813, "end_char_pos": 16820}, {"type": "R", "before": "SysOp side, live", "after": "Live", "start_char_pos": 16948, "end_char_pos": 16964}, {"type": "A", "before": null, "after": "by the system operator", "start_char_pos": 16996, "end_char_pos": 16996}, {"type": "R", "before": "SysOp", "after": "system operator", "start_char_pos": 17560, "end_char_pos": 17565}, {"type": "R", "before": "SysOp", "after": "system operator", "start_char_pos": 17583, "end_char_pos": 17588}], "sents_char_pos": [0, 261, 495, 637, 762, 976, 1115, 1297, 1466, 1544, 1685, 1832, 2054, 2136, 2253, 2350, 2494, 2601, 2683, 2830, 2980, 3209, 3331, 3413, 3569, 3886, 4148, 4311, 4511, 4662, 4822, 4949, 5264, 5317, 5471, 5644, 5791, 5913, 6149, 6312, 6508, 6684, 6841, 6985, 7177, 7320, 7537, 7629, 7728, 7857, 8073, 8177, 8352, 8583, 8780, 9000, 9149, 9265, 9416, 9597, 9733, 9879, 10011, 10118, 10195, 10355, 10648, 10726, 10801, 10891, 11034, 11206, 11336, 11474, 11628, 11690, 11803, 11970, 12056, 12180, 12285, 12425, 12460, 12678, 12840, 13004, 13198, 13343, 13456, 13561, 13775, 14016, 14105, 14335, 14488, 14701, 14917, 15110, 15253, 15431, 15540, 15684, 15795, 15908, 16000, 16140, 16306, 16472, 16671, 16772, 17005, 17476, 17645]}
+{"doc_id": "3447162", "revision_depth": "2", "before_revision": "Act I \"Little Shop of Horrors\" \u2013 Company ( Chiffon, Crystal, Ronette and Voice) \"Skid Row \" \u2013 Company (Mr Mushnik, Audrey, Seymour, Ronette, Crystal, Chiffon and Wino) \" Da Doo \" \u2013 Chiffon, Crystal, Ronette and Seymour \"Grow for Me\" \u2013 Seymour \" You Never Know\" \u2013 Mushnik, Chiffon, Crystal, Ronette, and Seymour \"Somewhere That's Green\" \u2013 Audrey and Crystal \"Closed for Renovation\" \u2013 Company, Seymour, Audrey, and Mushnik \"Dentist \" \u2013 Orin, Chiffon, Crystal, and Ronette \"Mushnik and Son\" \u2013 Mr Mushnik and Seymour \"Sudden Changes\" \u2013 Seymour \"Feed Me \" \u2013 Audrey II , Seymour, Audrey, Orin, Ronette, Chiffon and Crystal \"Now It's Just the Gas \" \u2013 Orin and Seymour \" Act 1 Finale \" \u2013 Audrey 2 , Crystal, Ronette, and Chiffon Act II \"Call Back in the Morning\" \u2013 Seymour and Audrey \"Suddenly, Seymour\" \u2013 Seymour, Audrey, Chiffon, Crystal, and Ronette \"Suppertime\" \u2013 Audrey II , Mr Mushnik, Seymour , Ronette, Chiffon and Crystal \" Meek Shall Inherit\" \u2013 Company (Seymour, Ronette, Chiffon, Crystal, Mr Bernstein , Mrs Luce, Skip Snip) \"Sominex \" \u2013 Audrey \"Suppertime Reprise\" nbsp ;\u2013 Audrey and Audrey 2 \"Somewhere That's Green\" reprise \u2013 Audrey \" Don't Feed the Plants \" \u2013 Company (Seymour, Mr Mushnik, Audrey, Orin, Audrey 2, Chiffon, Ronette and Crystal) Cut Numbers \" I Found A Hobby \" \u2013 Orin and Seymour \" A Little Dental Music \" \u2013 Seymour and Orin", "after_revision": "Act I Prologue ( \"Little Shop of Horrors\" ) \u2013 Chiffon, Crystal, and Ronette \"Skid Row (Downtown) \" \u2013 Company \" Da-Doo \" \u2013 Chiffon, Crystal, and Ronette (with Seymour speaking) \"Grow for Me\" \u2013 Seymour \" Ya Never Know\" \u2013 Mushnik, Chiffon, Crystal, Ronette, and Seymour \"Somewhere That's Green\" \u2013 Audrey \"Closed for Renovation\" \u2013 Seymour, Audrey, and Mushnik \"Dentist ! \" \u2013 Orin, Chiffon, Crystal, and Ronette \"Mushnik and Son\" \u2013 Mushnik and Seymour \"Sudden Changes\" \u2013 Seymour \"Feed Me (Git It) \" \u2013 Audrey II and Seymour \"Now ( It's Just the Gas ) \" \u2013 Orin and Seymour \" Coda (Act I Finale) \" \u2013 Chiffon , Crystal, Ronette, and Audrey II Act II \"Call Back in the Morning\" \u2013 Seymour and Audrey \"Suddenly, Seymour\" \u2013 Seymour, Audrey, Chiffon, Crystal, and Ronette \"Suppertime\" \u2013 Audrey II (with Seymour and Mushnik speaking) \" The Meek Shall Inherit\" \u2013 Company \"Sominex /Suppertime II \" \u2013 Audrey and Audrey II \"Somewhere That's Green\" (reprise) \u2013 Audrey (with Seymour speaking) \" Finale Ultimo ( Don't Feed the Plants ) \" \u2013 Company", "edit_actions": [{"type": "A", "before": null, "after": "Prologue (", "start_char_pos": 6, "end_char_pos": 6}, {"type": "A", "before": null, "after": ")", "start_char_pos": 32, "end_char_pos": 32}, {"type": "D", "before": "Company (", "after": null, "start_char_pos": 35, "end_char_pos": 44}, {"type": "R", "before": "Ronette and Voice)", "after": "and Ronette", "start_char_pos": 63, "end_char_pos": 81}, {"type": "A", "before": null, "after": "(Downtown)", "start_char_pos": 92, "end_char_pos": 92}, {"type": "D", "before": "(Mr Mushnik, Audrey, Seymour, Ronette, Crystal, Chiffon and Wino)", "after": null, "start_char_pos": 105, "end_char_pos": 170}, {"type": "R", "before": "Da Doo", "after": "Da-Doo", "start_char_pos": 173, "end_char_pos": 179}, {"type": "R", "before": "Ronette and Seymour", "after": "and Ronette (with Seymour speaking)", "start_char_pos": 202, "end_char_pos": 221}, {"type": "R", "before": "You", "after": "Ya", "start_char_pos": 248, "end_char_pos": 251}, {"type": "D", "before": "and Crystal", "after": null, "start_char_pos": 348, "end_char_pos": 359}, {"type": "D", "before": "Company,", "after": null, "start_char_pos": 386, "end_char_pos": 394}, {"type": "A", "before": null, "after": "!", "start_char_pos": 433, "end_char_pos": 433}, {"type": "D", "before": "Mr", "after": null, "start_char_pos": 494, "end_char_pos": 496}, {"type": "A", "before": null, "after": "(Git It)", "start_char_pos": 553, "end_char_pos": 553}, {"type": "R", "before": ", Seymour, Audrey, Orin, Ronette, Chiffon and Crystal", "after": "and Seymour", "start_char_pos": 568, "end_char_pos": 621}, {"type": "A", "before": null, "after": "(", "start_char_pos": 627, "end_char_pos": 627}, {"type": "A", "before": null, "after": ")", "start_char_pos": 646, "end_char_pos": 646}, {"type": "R", "before": "Act 1 Finale", "after": "Coda (Act I Finale)", "start_char_pos": 670, "end_char_pos": 682}, {"type": "R", "before": "Audrey 2", "after": "Chiffon", "start_char_pos": 687, "end_char_pos": 695}, {"type": "R", "before": "Chiffon", "after": "Audrey II", "start_char_pos": 720, "end_char_pos": 727}, {"type": "R", "before": ", Mr Mushnik, Seymour , Ronette, Chiffon and Crystal", "after": "(with Seymour and Mushnik speaking)", "start_char_pos": 877, "end_char_pos": 929}, {"type": "A", "before": null, "after": "The", "start_char_pos": 932, "end_char_pos": 932}, {"type": "D", "before": "(Seymour, Ronette, Chiffon, Crystal, Mr Bernstein , Mrs Luce, Skip Snip)", "after": null, "start_char_pos": 963, "end_char_pos": 1035}, {"type": "A", "before": null, "after": "/Suppertime II", "start_char_pos": 1045, "end_char_pos": 1045}, {"type": "D", "before": "\"Suppertime Reprise\"", "after": null, "start_char_pos": 1057, "end_char_pos": 1077}, {"type": "D", "before": "nbsp ;\u2013 Audrey", "after": null, "start_char_pos": 1078, "end_char_pos": 1092}, {"type": "R", "before": "2", "after": "II", "start_char_pos": 1104, "end_char_pos": 1105}, {"type": "R", "before": "reprise", "after": "(reprise)", "start_char_pos": 1131, "end_char_pos": 1138}, {"type": "A", "before": null, "after": "(with Seymour speaking)", "start_char_pos": 1148, "end_char_pos": 1148}, {"type": "A", "before": null, "after": "Finale Ultimo (", "start_char_pos": 1151, "end_char_pos": 1151}, {"type": "A", "before": null, "after": ")", "start_char_pos": 1174, "end_char_pos": 1174}, {"type": "D", "before": "Company (Seymour, Mr Mushnik, Audrey, Orin, Audrey 2, Chiffon, Ronette and Crystal)", "after": null, "start_char_pos": 1179, "end_char_pos": 1262}, {"type": "R", "before": "Cut Numbers \" I Found A Hobby \" \u2013 Orin and Seymour \" A Little Dental Music \" \u2013 Seymour and Orin", "after": "Company", "start_char_pos": 1263, "end_char_pos": 1358}], "sents_char_pos": [0, 34, 96, 183, 237, 265, 340, 385, 437, 493, 535, 557, 650, 686, 763, 804, 866]}
+{"doc_id": "3480941", "revision_depth": "1", "before_revision": "Laureates Year Laureate(s) Image Institution Nationality Citation 2004 100px Paris Diderot University BulgarianFrench \"for innovative explorations of questions on the intersection of language, culture and literature which inspired research across the humanities and the social sciences throughout the world and have also had a significant impact on feminist theory\" 2005 100px University of Frankfurt German \"for developing path-breaking theories of discourse and communicative action and thereby providing new perspectives on law and democracy\" 2006 100px Hebrew University of Jerusalem Israeli \"for developing comparative knowledge of exceptional quality and originality concerning social change and modernization, and concerning relations between culture, belief systems and political institutions\" 2007 100px New York UniversityUniversity College London American \"for developing an original and highly influential legal theory grounding law in morality, characterized by a unique ability to tie together abstract philosophical ideas and arguments with concrete everyday concerns in law, morals, and politics\" 2008 120x120px|alt= Duke University American \"for outstanding contributions to the understanding of the relation between social formations and cultural forms in a project he himself describes as the 'poetics of social forms 2009 120x120px|alt= University of Toronto Canadian \"for his combination of rigorous philosophical and historical analysis which has profoundly altered our understanding of the ways in which key concepts emerge through scientific practices and in specific social and institutional contexts\" 2010 100px University of TorontoPrinceton University CanadianAmerican for \"connecting early modern Europe with new areas of comparative history, exploring cultural, geographical and religious interchange\" 2011 100px Free University of Berlin German \"for effecting a paradigm shift in German historiography by opening it up to related social sciences and establishing the importance of cross-national comparative approaches\" 2012 100px University of Southern California Spanish for shaping \"our understanding of the political dynamics of urban and global economies in the network society\" 2013 100px Sciences Po French for having \"undertaken an ambitious analysis and reinterpretation of modernity, and [having] challenged fundamental concepts such as the distinction between modern and pre-modern, nature and society, human and non-human\"Bruno Latour wins the 2013 Holberg Prize , Holberg Prize 2014 border|120x120px|alt= Princeton University British for having \"reshaped fields that span Ottoman studies, the genesis of early Islamic polity, the history of the Wahhabiyya movement, and Islamic law, ethics, and theology\" 2015 111x111px Birkbeck, University of London British for her \"analysis of stories and myths and how they reflect their time and place. She is known for the emphasis of gender roles and feminism in her literary work \" 2016 100px Harvard University USA for being \"one of the most important Shakespeare scholars of his generation\" 2017 100px University of Cambridge British for \"her influential role in ethical and political philosophy\" 2018 Cass Sunstein (2008)| 100px Harvard University USA For having \"reshaped our understanding of the relationship between the modern regulatory state and constitutional law. He is widely regarded as the leading scholar of administrative lawin the U.S., and he is by far the most cited legal scholar in the United States and probably the world. \" 2019 Paul Gilroy 2019|100px University College London British \"for his contributions to critical race studies, post-colonialism and related fields\" 2020 Griselda Pollock (2019) | 100px University of Leeds British-Canadian \"for her groundbreaking contributions to feminist art history and cultural studies.\" 2021Martha Nussbaum100pxUniversity of ChicagoUSA \"for her groundbreaking contribution to research in philosophy, law and related fields.\" ", "after_revision": "Laureates Year Image Laureate(s) Country Language(s) Citation Field(s) 2004 75px (b. 1941) Bulgarian and French \"for innovative explorations of questions on the intersection of language, culture and literature which inspired research across the humanities and the social sciences throughout the world and have also had a significant impact on feminist theory\" philosophy of language, semiotics, literary criticism, psychoanalysis, feminism 2005 75px (b. 1929) German \"for developing path-breaking theories of discourse and communicative action and thereby providing new perspectives on law and democracy\" epistemology, social theory political theory, philosophy of law, Rationalization, pragmatics, pragmatism 2006 75px (1923\u20132010) Polish, English, and Hebrew \"for developing comparative knowledge of exceptional quality and originality concerning social change and modernization, and concerning relations between culture, belief systems and political institutions\" social anthropology, social history, political science 2007 75px (1931\u20132013) English \"for developing an original and highly influential legal theory grounding law in morality, characterized by a unique ability to tie together abstract philosophical ideas and arguments with concrete everyday concerns in law, morals, and politics\" social justice, legal theory, political philosophy 2008 75px (b. 1934) English \"for outstanding contributions to the understanding of the relation between social formations and cultural forms in a project he himself describes as the 'poetics of social forms postmodernism, hermeneutics, cultural studies, dialectical method, history 2009 75px (b. 1936) English \"for his combination of rigorous philosophical and historical analysis which has profoundly altered our understanding of the ways in which key concepts emerge through scientific practices and in specific social and institutional contexts\" philosophy of science, philosophy of statistics 2010 75px (b. 1928) English and French for \"connecting early modern Europe with new areas of comparative history, exploring cultural, geographical and religious interchange\" social history, cultural history, social anthropology, ethnography, literary theory 2011 75px (b. 1941) German \"for effecting a paradigm shift in German historiography by opening it up to related social sciences and establishing the importance of cross-national comparative approaches\" social history, hermeneutics, historiography 2012 75px (b. 1942) Spanish and English for shaping \"our understanding of the political dynamics of urban and global economies in the network society\" communication studies, organization studies, network society, urban sociology, sociology of culture, political economy 2013 75px (b. 1947) French for having \"undertaken an ambitious analysis and reinterpretation of modernity, and [having] challenged fundamental concepts such as the distinction between modern and pre-modern, nature and society, human and non-human\"Bruno Latour wins the 2013 Holberg Prize , Holberg Prize postmodernism, social constructionism, actor\u2013network theory, metaphysics, social anthropology 2014 75px (b. 1940) English for having \"reshaped fields that span Ottoman studies, the genesis of early Islamic polity, the history of the Wahhabiyya movement, and Islamic law, ethics, and theology\" oriental studies, history of religion 2015 75px (b. 1946) English for her \"analysis of stories and myths and how they reflect their time and place. \" mythography, feminism, oral tradition 2016 75px (b. 1943) English for being \"one of the most important Shakespeare scholars of his generation\" new historicism, renaissance studies, new criticism 2017 75px (b. 1941) English for \"her influential role in ethical and political philosophy\" political philosophy, ethics 2018 Cass Sunstein (2008)| 75px (b. 1954) English for having \"reshaped our understanding of the relationship between the modern regulatory state and constitutional law. \" legal theory, constitutional law, environmental law, administrative law, behavioral economics, social theory 2019 75px (b. 1956) English \"for his contributions to critical race studies, post-colonialism and related fields\" cultural politics, cultural history, social anthropology 2020 Griselda Pollock (2019) | 75px (b. 1949) English \"for her groundbreaking contributions to feminist art history and cultural studies.\" feminist theory, feminism, art history, gender studies2021 75px (b. 1947) English \"for her groundbreaking contribution to research in philosophy, law and related fields.\" liberal theory, political philosophy, feminism, ethics, social liberalism", "edit_actions": [{"type": "A", "before": null, "after": "Image", "start_char_pos": 15, "end_char_pos": 15}, {"type": "R", "before": "Image Institution Nationality Citation", "after": "Country Language(s) Citation Field(s)", "start_char_pos": 28, "end_char_pos": 66}, {"type": "R", "before": "100px Paris Diderot University BulgarianFrench", "after": "75px (b. 1941) Bulgarian and French", "start_char_pos": 72, "end_char_pos": 118}, {"type": "A", "before": null, "after": "philosophy of language, semiotics, literary criticism, psychoanalysis, feminism", "start_char_pos": 367, "end_char_pos": 367}, {"type": "R", "before": "100px University of Frankfurt", "after": "75px (b. 1929)", "start_char_pos": 373, "end_char_pos": 402}, {"type": "A", "before": null, "after": "epistemology, social theory political theory, philosophy of law, Rationalization, pragmatics, pragmatism", "start_char_pos": 548, "end_char_pos": 548}, {"type": "R", "before": "100px Hebrew University of Jerusalem Israeli", "after": "75px (1923\u20132010) Polish, English, and Hebrew", "start_char_pos": 554, "end_char_pos": 598}, {"type": "A", "before": null, "after": "social anthropology, social history, political science", "start_char_pos": 805, "end_char_pos": 805}, {"type": "R", "before": "100px New York UniversityUniversity College London American", "after": "75px (1931\u20132013) English", "start_char_pos": 811, "end_char_pos": 870}, {"type": "A", "before": null, "after": "social justice, legal theory, political philosophy", "start_char_pos": 1117, "end_char_pos": 1117}, {"type": "R", "before": "120x120px|alt= Duke University American", "after": "75px (b. 1934) English", "start_char_pos": 1123, "end_char_pos": 1162}, {"type": "A", "before": null, "after": "postmodernism, hermeneutics, cultural studies, dialectical method, history", "start_char_pos": 1342, "end_char_pos": 1342}, {"type": "R", "before": "120x120px|alt= University of Toronto Canadian", "after": "75px (b. 1936) English", "start_char_pos": 1348, "end_char_pos": 1393}, {"type": "A", "before": null, "after": "philosophy of science, philosophy of statistics", "start_char_pos": 1633, "end_char_pos": 1633}, {"type": "R", "before": "100px University of TorontoPrinceton University CanadianAmerican", "after": "75px (b. 1928) English and French", "start_char_pos": 1639, "end_char_pos": 1703}, {"type": "A", "before": null, "after": "social history, cultural history, social anthropology, ethnography, literary theory", "start_char_pos": 1839, "end_char_pos": 1839}, {"type": "R", "before": "100px Free University of Berlin", "after": "75px (b. 1941)", "start_char_pos": 1845, "end_char_pos": 1876}, {"type": "A", "before": null, "after": "social history, hermeneutics, historiography", "start_char_pos": 2059, "end_char_pos": 2059}, {"type": "R", "before": "100px University of Southern California Spanish", "after": "75px (b. 1942) Spanish and English", "start_char_pos": 2065, "end_char_pos": 2112}, {"type": "A", "before": null, "after": "communication studies, organization studies, network society, urban sociology, sociology of culture, political economy", "start_char_pos": 2224, "end_char_pos": 2224}, {"type": "R", "before": "100px Sciences Po", "after": "75px (b. 1947)", "start_char_pos": 2230, "end_char_pos": 2247}, {"type": "A", "before": null, "after": "postmodernism, social constructionism, actor\u2013network theory, metaphysics, social anthropology", "start_char_pos": 2532, "end_char_pos": 2532}, {"type": "R", "before": "border|120x120px|alt= Princeton University British", "after": "75px (b. 1940) English", "start_char_pos": 2538, "end_char_pos": 2588}, {"type": "A", "before": null, "after": "oriental studies, history of religion", "start_char_pos": 2760, "end_char_pos": 2760}, {"type": "R", "before": "111x111px Birkbeck, University of London British", "after": "75px (b. 1946) English", "start_char_pos": 2766, "end_char_pos": 2814}, {"type": "D", "before": "She is known for the emphasis of gender roles and feminism in her literary work", "after": null, "start_char_pos": 2897, "end_char_pos": 2976}, {"type": "A", "before": null, "after": "mythography, feminism, oral tradition", "start_char_pos": 2979, "end_char_pos": 2979}, {"type": "R", "before": "100px Harvard University USA", "after": "75px (b. 1943) English", "start_char_pos": 2985, "end_char_pos": 3013}, {"type": "A", "before": null, "after": "new historicism, renaissance studies, new criticism", "start_char_pos": 3091, "end_char_pos": 3091}, {"type": "R", "before": "100px University of Cambridge British", "after": "75px (b. 1941) English", "start_char_pos": 3097, "end_char_pos": 3134}, {"type": "A", "before": null, "after": "political philosophy, ethics", "start_char_pos": 3198, "end_char_pos": 3198}, {"type": "R", "before": "100px Harvard University USA For", "after": "75px (b. 1954) English for", "start_char_pos": 3226, "end_char_pos": 3258}, {"type": "D", "before": "He is widely regarded as the leading scholar of administrative lawin the U.S., and he is by far the most cited legal scholar in the United States and probably the world.", "after": null, "start_char_pos": 3374, "end_char_pos": 3543}, {"type": "A", "before": null, "after": "legal theory, constitutional law, environmental law, administrative law, behavioral economics, social theory", "start_char_pos": 3546, "end_char_pos": 3546}, {"type": "R", "before": "Paul Gilroy 2019|100px University College London British", "after": "75px (b. 1956) English", "start_char_pos": 3552, "end_char_pos": 3608}, {"type": "A", "before": null, "after": "cultural politics, cultural history, social anthropology", "start_char_pos": 3695, "end_char_pos": 3695}, {"type": "R", "before": "100px University of Leeds British-Canadian", "after": "75px (b. 1949) English", "start_char_pos": 3727, "end_char_pos": 3769}, {"type": "R", "before": "2021Martha Nussbaum100pxUniversity of ChicagoUSA", "after": "feminist theory, feminism, art history, gender studies2021 75px (b. 1947) English", "start_char_pos": 3855, "end_char_pos": 3903}, {"type": "A", "before": null, "after": "liberal theory, political philosophy, feminism, ethics, social liberalism", "start_char_pos": 3993, "end_char_pos": 3993}], "sents_char_pos": [0, 27, 366, 547, 804, 1116, 1138, 1154, 1632, 1838, 2058, 2223, 2347, 2759, 2896, 3373, 3543]}
+{"doc_id": "35177195", "revision_depth": "1", "before_revision": "Technological self-efficacy (TSE) is \u201c the belief in one \u2019 s ability to successfully perform a technologically sophisticated new task \u201d .McDonald, T., & Siegall, M. (1992). The effects of technological self-efficacy and job focus on job performance, attitudes, and withdrawal behaviors. The Journal of Psychology, 126, 465-475. This is a specific application of the broader and more general construct of self-efficacy, which is defined as the belief in one \u2019 s ability to engage in specific actions that result in desired outcomes.Bandura, A. (1997). Self efficacy: The exercise of control. New York: Freeman. Self efficacy does not focus on the skills one has, but rather the judgments of what one can do with his or her skills. Traditionally, a distinguishing feature of self efficacy is its domain-specificity. In other words, judgments are limited to certain types of performances as compared to an overall evaluation of his or her potential. Importance Today\u2019s modern society is completely embedded within a technological context, which makes the understanding and evaluation of technological self efficacy critical. Indeed, nearly half of Americans own smartphones and this trend towards technology use is not limited to the United States; instead cell phone, computer, and internet use is becoming increasingly common around the world. Technology is particularly prevalent in the workplace and learning environments. At work, 62\\% of employed Americans use the internet and email, but interestingly workplace internet users either use the internet everyday (60\\%) or not at all (28\\%).Madden, M., & Jones, S. (2008, September 24). Networked workers. (PDF) Internet and email use is obviously influenced by work duties, but 96\\% of employed Americans use some sort of new communication technology on the job. Successful investment in technology is associated with enhanced productivity; however, full realization of technological potential commonly plagues organizations.Johansen, R., Swigart, R. (1996). Upsizing the Individual in the Downsized Organization: Managing in the Wake of Reengineering, Globalization and Overwhelming Technological Change. Addison-Wesley, Reading, MA. In learning environments, college courses are more frequently being offered online. This is commonly referred to as distance education and implementation ranges from courses being supported by the web (teaching occurs predominantly through face-to-face instructor interactions with supplemental materials being offered on the web) to blended learning (significantly less face-to-face instructor interactions and more online instruction) to fully online (all instruction is conducted virtually with no face-to-face instructor interactions). A number of advantages are associated with distance learning such as increased flexibility and convenience, which allows individuals the opportunity to enroll in classes that would otherwise be off-limits due to geographical or personal reasons.Phipps, R., & Merisotis, J. (1999). What \u2019 s the difference? A review of contemporary research on the effectiveness of distance learning in higher education. Washington, DC: Institute for Higher Education Policy. Another commonly cited advantage is that instruction is self paced, which allows for personalized tailoring based on individual needs.Vrasidas, C., & McIsaac, M. S. (2000). Principles of pedagogy and evaluation for web-based learning. Educational Media International, 37, 105-112. However, these advantages are not likely to be realized if the individual is anxious about the method of instructional delivery and/or his or her expectation of success is low due to its technological component. Taken together, these two critical arenas discussed above (workplace and learning) reinforce the extent to which technology has impacted modern activities and consequently the importance of perceived beliefs in one \u2019 s ability to master new technology. Success in everyday life often hinges on the utilization of technology and by definition, new technology will always be new. Therefore, this construct warrants review. Differentiation from Other Forms of Self-efficacy Since TSE stems from the same theory as general self-efficacy and other task-specific self-efficacy, the differentiation of this construct from these other forms of self-efficacy is crucial. Unfortunately, previous studies focusing in on TSE have not shown the uniqueness of TSE measures. Despite the dearth of differentiating research on TSE, the uniqueness of this construct can be shown by considering closely related and technology specific self-efficacies (i.e. computer self-efficacy), which has been established as a unique construct. When compared to general self-efficacy, computer self-efficacy has been shown to be unique based on two measures of general self-efficacy.Chen, G., Gully, S. M., & Eden, D. (2001). Validation of a new general self-efficacy scale. Organizational Research Methods, 4, 62-83. In this same study, the authors showed computer self-efficacy was not related to many types of specific self-efficacy including art, persuasion, and science self-efficacy. One of the most related types of specific self-efficacy was mechanical. This makes sense given both types of specific self-efficacies are related to using tools albeit one being technology the other being more physical in nature. Computer self-efficacy has a domain has also been shown to be related, but distinct, to self-efficacy about computer programs.Agarwal, R., Sambamurthey, V., & Stair, R. M. (2000). Research Report: The evolving relationship between general and specific computer self-efficacy-An empirical assessment. Information Systems Research, 4, 418-430 Measurement Following the definition set forth by Bandura, self-efficacy is an individual \u2019 s belief and confidence in him or herself. This property has important implications for the measurement of any type of self-efficacy. Specifically, measures of self-efficacy must be self-report because the only person who can accurately portray beliefs in one \u2019 s ability is the target of investigation. In other words, self-report measures of self-efficacy have definitional truth. While a number of problems exist with self-report inventories, in the case of self-efficacy (and other constructs that are defined as internal beliefs and cognitions) this measurement approach is unavoidable. Another difference between TSE measures concerns the issue of generality. This consideration is similar to the previous differentiation between-TSE as a broader concept and technology specific self-efficacy. Measurement attempts of the broader concept of technological self-efficacy will be considered first. McDonald and Siegall developed a five-item likert scale of technological self-efficacy based on the consideration of previous theoretical studies. This scale was scored using the strength approach to self-efficacy scales. Items in this scale were not referring to specific technologies, but instead focused on technology as a general concept. Using a development process, Holcomb, King and Brown, also proposed a scale to measure TSE Holcomb, L. B., King, F. B., & Brown, S. W. (2004). Student traits and attributes contributing to the success in online courses: Evaluation of university online courses. The Journal of Interactive Online Learning, 2, 1-17. Factor analysis revealed three distinct factors containing 19 likert type items, which also was scored according to the strength scoring system. In contrast to the McDonald and Siegall scale, the items in this scale referenced certain technologies (specifically computers and software packages). The two studies mentioned above represent of attempts to measure TSE as a broader concept. In addition to the attempts to measure TSE more broadly, a number of studies have developed measures of technology specific self-efficacy. One of the most cited measures of computer self-efficacy comes from Compeau and Higgins. These authors reviewed previous attempts to measure computer self-efficacy and theoretically derived a 10 item scale. Unlike previously mentioned scales, this study employed a \u201ccomposite\u201d scoring approach. For each item, participants were first asked whether they could complete a specific task related to computers using a dichotomous yes/no scale. Following this answer, participants were then asked to rate their confidence about completing the task from 1 ( \u2018\u2019 not at all confident \u2019\u2019 ) to 10 ( \u2018\u2019totally confident\u2019\u2019 ). The final score was calculated by counting the number of \u201cyes\u201d answers (reflecting self-efficacy magnitude) and the average of the confidence ratings (representing self-efficacy strength). The authors then validated this measure in a nomological network of related constructs. A second example of technology specific self-efficacy is internet self-efficacy. Similar to previous measurement approaches, internet self-efficacy was developed using a theoretical approach that considered previous measures of related topics and developed novel items to address the missing construct space. This scale showed a high level of reliability and validity. Prior experience Prior experience with technology is repeatedly found to be influential on technology related self efficacy beliefs.Compeau, D. R., Higgins, C. A. (1995b). Application of social cognitive theory to training for computer skills. Information Systems Research, 6, 118-143.Hill, T., Smith, N. D., & Mann, M. F. (1987). Role of efficacy expectations in predicting the decision to use advanced technologies: The case for computers. Journal of Applied Psychology, 72, 307\u2013313.Jorde-Bloom, P., & Ford, M. (1988). Factors influencing early childhood administrators \u2019 decisions regarding the adoption of computer technology. Journal Educational Computing, 4, 31\u201347.Murphy, C. A., Coover, D., & Owen, S. V. (1989). Development and validation of the computer self-efficacy scale. Educational and Psychological Measurement, 49, 893\u2013899. If an individual has had the opportunity to interact with new technologies and, more importantly, has had success with mastering new technologies then individuals are more likely to hold more positive beliefs for future performance. Modeling or participation in technological training Modeling or participation in technological training are also found to be significant predictors of technological self efficacy.Brinkerhoff, J. (2006). Effects of long-duration, professional development academy on technology skills, computer self efficacy, and technology integration beliefs and practices. '' Journal of Research on Technology in Education, 39, \u2019\u2019 22-43.Gist. M. E., Schwoerer, C. E., & Rosen, B. (1989). Effects of alternative training methods on self-efficacy and performance in computer software training. Journal of Applied Psychology, 74, 884-891.Torkzadeh, G. & Van Dyke, T. P. (2002). Effects of training on Internet self-efficacy and computer user attitudes. Computers and Human Behavior, 18, 479-494.Torkzadeh, G., & Koufteros, X. (1994). Factorial validity of computer self-efficacy scale and the impact of computer training. Educational and Psychological Measurement, 54, 813\u2013821. Although different types of training interventions have been associated with different gains;Smith, J. M. (1994). The effects of education on computer self-efficacy. Journal of Industrial Teacher Education, 31, 51\u201365. in general, research supports that seeing other individuals successfully perform the task at hand (for example, the instructor) and then providing the learner with some opportunity for reinforcement and demonstration (for example, trying to successfully utilize the technology without aid) increases technology related self efficacy beliefs. Social persuasions Social persuasions such as encouragement by others and organizational supportHenry, J. W., & Stone, R. W. (1994). A structural equation model of end-user satisfaction with a computer-based medical information system. Information Resources Management Journal, 7(3), 21\u201333.Igbaria, M., & Iivari, J. (1995). The effects of self-efficacy on computer usage. Omega, 23(6), 587-605. are also important contributors to technology related self efficacy beliefs. The actions and statements of others can significantly alter perceptions of their likelihood for success. Organizational support typically includes management \u2019 s encouragement and assistance. If management does not appear to enthusiastically support employees \u2019 attempts to utilize technology then employees are unlikely to accept technology. Age Age is also significantly related, such that younger individuals tend to have higher levels of technology related self efficacy beliefs than older individuals.Reed, K. Doty, & May, (2005). The impact of aging on self-efficacy and computer skill acquisition. Journal of Managerial Issues, 17, 212-228.Suls, J. & Mullen, C. (1982). From the cradle to the grave: Comparison and self-evaluation across the life-span. In J. Suls (Ed.), Psychological Perspectives on the Self, Vol. 1, Erlbaum, Hillsdale, NJ, 97\u2013125. This finding is not surprising given the widespread stereotype of older adults' inability to learn new material, especially when the material is technology related.Posthuma, R. A. & Campion, M. A. (2009). Age stereotypes in the workplace: Common stereotypes, moderators, and future research directions. Journal of Management, 35,158-188. However, older adults \u2019 low technological self efficacy beliefs suggest that older adults may internalize the \u2018 old dogs can \u2019 t learn new tricks \u2019 stereotype, which consequently affects expectations about future performance in technology related domains. Task Performance Task performance is negatively affected, such that lower technology related self efficacy beliefs are related to poorer performance This is extremely important, because these findings suggest that positive perceptions of individuals \u2019 technological capabilities may need to be present before successful performance can be achieved. Anxiety Anxiety is negatively related, such that lower technology related self efficacy beliefs are associated with higher level of anxiety.Russell, G., & Bradley, G. (1997). Teachers' computer anxiety: Implications for professional development. Education and Information Technologies, 2, 1-14.", "after_revision": "Technological self-efficacy (TSE) is \" the belief in one ' s ability to successfully perform a technologically sophisticated new task \" .McDonald, T., & Siegall, M. (1992). The effects of technological self-efficacy and job focus on job performance, attitudes, and withdrawal behaviors. The Journal of Psychology, 126, 465-475. This is a specific application of the broader and more general construct of self-efficacy, which is defined as the belief in one ' s ability to engage in specific actions that result in desired outcomes.Bandura, A. (1997). Self efficacy: The exercise of control. New York: Freeman. Self efficacy does not focus on the skills one has, but rather the judgments of what one can do with his or her skills. Traditionally, a distinguishing feature of self efficacy is its domain-specificity. In other words, judgments are limited to certain types of performances as compared to an overall evaluation of his or her potential. Importance 21st-century society is completely embedded within a technological context, which makes the understanding and evaluation of technological self efficacy critical. Indeed, nearly half of Americans own smartphones and this trend towards technology use is not limited to the United States; instead cell phone, computer, and internet use is becoming increasingly common around the world. Technology is particularly prevalent in the workplace and learning environments. At work, 62\\% of employed Americans use the internet and email, but interestingly workplace internet users either use the internet everyday (60\\%) or not at all (28\\%).Madden, M., & Jones, S. (2008, September 24). Networked workers. (PDF) Internet and email use is obviously influenced by work duties, but 96\\% of employed Americans use some sort of new communication technology on the job. Successful investment in technology is associated with enhanced productivity; however, full realization of technological potential commonly plagues organizations.Johansen, R., Swigart, R. (1996). Upsizing the Individual in the Downsized Organization: Managing in the Wake of Reengineering, Globalization and Overwhelming Technological Change. Addison-Wesley, Reading, MA. In learning environments, college courses are more frequently being offered online. This is commonly referred to as distance education and implementation ranges from courses being supported by the web (teaching occurs predominantly through face-to-face instructor interactions with supplemental materials being offered on the web) to blended learning (significantly less face-to-face instructor interactions and more online instruction) to fully online (all instruction is conducted virtually with no face-to-face instructor interactions). A number of advantages are associated with distance learning such as increased flexibility and convenience, which allows individuals the opportunity to enroll in classes that would otherwise be off-limits due to geographical or personal reasons.Phipps, R., & Merisotis, J. (1999). What ' s the difference? A review of contemporary research on the effectiveness of distance learning in higher education. Washington, DC: Institute for Higher Education Policy. Another commonly cited advantage is that instruction is self paced, which allows for personalized tailoring based on individual needs.Vrasidas, C., & McIsaac, M. S. (2000). Principles of pedagogy and evaluation for web-based learning. Educational Media International, 37, 105-112. However, these advantages are not likely to be realized if the individual is anxious about the method of instructional delivery and/or his or her expectation of success is low due to its technological component. Taken together, these two critical arenas discussed above (workplace and learning) reinforce the extent to which technology has impacted modern activities and consequently the importance of perceived beliefs in one ' s ability to master new technology. Success in everyday life often hinges on the utilization of technology and by definition, new technology will always be new. Therefore, this construct warrants review. Differentiation from other forms of self-efficacy Since TSE stems from the same theory as general self-efficacy and other task-specific self-efficacy, the differentiation of this construct from these other forms of self-efficacy is crucial. Unfortunately, previous studies focusing in on TSE have not shown the uniqueness of TSE measures. Despite the dearth of differentiating research on TSE, the uniqueness of this construct can be shown by considering closely related and technology specific self-efficacies (i.e. computer self-efficacy), which has been established as a unique construct. When compared to general self-efficacy, computer self-efficacy has been shown to be unique based on two measures of general self-efficacy.Chen, G., Gully, S. M., & Eden, D. (2001). Validation of a new general self-efficacy scale. Organizational Research Methods, 4, 62-83. In this same study, the authors showed computer self-efficacy was not related to many types of specific self-efficacy including art, persuasion, and science self-efficacy. One of the most related types of specific self-efficacy was mechanical. This makes sense given both types of specific self-efficacies are related to using tools albeit one being technology the other being more physical in nature. Computer self-efficacy has a domain has also been shown to be related, but distinct, to self-efficacy about computer programs.Agarwal, R., Sambamurthey, V., & Stair, R. M. (2000). Research Report: The evolving relationship between general and specific computer self-efficacy-An empirical assessment. Information Systems Research, 4, 418-430 Measurement Following the definition set forth by Bandura, self-efficacy is an individual ' s belief and confidence in him or herself. This property has important implications for the measurement of any type of self-efficacy. Specifically, measures of self-efficacy must be self-report because the only person who can accurately portray beliefs in one ' s ability is the target of investigation. In other words, self-report measures of self-efficacy have definitional truth. While a number of problems exist with self-report inventories, in the case of self-efficacy (and other constructs that are defined as internal beliefs and cognitions) this measurement approach is unavoidable. Another difference between TSE measures concerns the issue of generality. This consideration is similar to the previous differentiation between-TSE as a broader concept and technology specific self-efficacy. Measurement attempts of the broader concept of technological self-efficacy will be considered first. McDonald and Siegall developed a five-item likert scale of technological self-efficacy based on the consideration of previous theoretical studies. This scale was scored using the strength approach to self-efficacy scales. Items in this scale were not referring to specific technologies, but instead focused on technology as a general concept. Using a development process, Holcomb, King and Brown, also proposed a scale to measure TSE Holcomb, L. B., King, F. B., & Brown, S. W. (2004). Student traits and attributes contributing to the success in online courses: Evaluation of university online courses. The Journal of Interactive Online Learning, 2, 1-17. Factor analysis revealed three distinct factors containing 19 likert-type items, which also was scored according to the strength scoring system. In contrast to the McDonald and Siegall scale, the items in this scale referenced certain technologies (specifically computers and software packages). The two studies mentioned above represent of attempts to measure TSE as a broader concept. In addition to the attempts to measure TSE more broadly, a number of studies have developed measures of technology specific self-efficacy. One of the most cited measures of computer self-efficacy comes from Compeau and Higgins. These authors reviewed previous attempts to measure computer self-efficacy and theoretically derived a 10-item scale. Unlike previously mentioned scales, this study employed a \"composite\" scoring approach. For each item, participants were first asked whether they could complete a specific task related to computers using a dichotomous yes/no scale. Following this answer, participants were then asked to rate their confidence about completing the task from 1 ( not at all confident ) to 10 ( totally confident ). The final score was calculated by counting the number of \"yes\" answers (reflecting self-efficacy magnitude) and the average of the confidence ratings (representing self-efficacy strength). The authors then validated this measure in a nomological network of related constructs. A second example of technology specific self-efficacy is internet self-efficacy. Similar to previous measurement approaches, internet self-efficacy was developed using a theoretical approach that considered previous measures of related topics and developed novel items to address the missing construct space. This scale showed a high level of reliability and validity. Prior experience Prior experience with technology is repeatedly found to be influential on technology related self efficacy beliefs.Compeau, D. R., Higgins, C. A. (1995b). Application of social cognitive theory to training for computer skills. Information Systems Research, 6, 118-143.Hill, T., Smith, N. D., & Mann, M. F. (1987). Role of efficacy expectations in predicting the decision to use advanced technologies: The case for computers. Journal of Applied Psychology, 72, 307\u2013313.Jorde-Bloom, P., & Ford, M. (1988). Factors influencing early childhood administrators ' decisions regarding the adoption of computer technology. Journal Educational Computing, 4, 31\u201347.Murphy, C. A., Coover, D., & Owen, S. V. (1989). Development and validation of the computer self-efficacy scale. Educational and Psychological Measurement, 49, 893\u2013899. If an individual has had the opportunity to interact with new technologies and, more importantly, has had success with mastering new technologies then individuals are more likely to hold more positive beliefs for future performance. Modeling or participation in technological training Modeling or participation in technological training are also found to be significant predictors of technological self efficacy.Brinkerhoff, J. (2006). Effects of long-duration, professional development academy on technology skills, computer self efficacy, and technology integration beliefs and practices. Journal of Research on Technology in Education, 39, 22-43.Gist. M. E., Schwoerer, C. E., & Rosen, B. (1989). Effects of alternative training methods on self-efficacy and performance in computer software training. Journal of Applied Psychology, 74, 884-891.Torkzadeh, G. & Van Dyke, T. P. (2002). Effects of training on Internet self-efficacy and computer user attitudes. Computers and Human Behavior, 18, 479-494.Torkzadeh, G., & Koufteros, X. (1994). Factorial validity of computer self-efficacy scale and the impact of computer training. Educational and Psychological Measurement, 54, 813\u2013821. Although different types of training interventions have been associated with different gains;Smith, J. M. (1994). The effects of education on computer self-efficacy. Journal of Industrial Teacher Education, 31, 51\u201365. in general, research supports that seeing other individuals successfully perform the task at hand (for example, the instructor) and then providing the learner with some opportunity for reinforcement and demonstration (for example, trying to successfully utilize the technology without aid) increases technology related self efficacy beliefs. Social persuasions Social persuasions such as encouragement by others and organizational supportHenry, J. W., & Stone, R. W. (1994). A structural equation model of end-user satisfaction with a computer-based medical information system. Information Resources Management Journal, 7(3), 21\u201333.Igbaria, M., & Iivari, J. (1995). The effects of self-efficacy on computer usage. Omega, 23(6), 587-605. are also important contributors to technology related self efficacy beliefs. The actions and statements of others can significantly alter perceptions of their likelihood for success. Organizational support typically includes management ' s encouragement and assistance. If management does not appear to enthusiastically support employees ' attempts to utilize technology then employees are unlikely to accept technology. Age Age is also significantly related, such that younger individuals tend to have higher levels of technology related self efficacy beliefs than older individuals.Reed, K. Doty, & May, (2005). The impact of aging on self-efficacy and computer skill acquisition. Journal of Managerial Issues, 17, 212-228.Suls, J. & Mullen, C. (1982). From the cradle to the grave: Comparison and self-evaluation across the life-span. In J. Suls (Ed.), Psychological Perspectives on the Self, Vol. 1, Erlbaum, Hillsdale, NJ, 97\u2013125. This finding is not surprising given the widespread stereotype of older adults' inability to learn new material, especially when the material is technology related.Posthuma, R. A. & Campion, M. A. (2009). Age stereotypes in the workplace: Common stereotypes, moderators, and future research directions. Journal of Management, 35,158-188. However, older adults ' low technological self efficacy beliefs suggest that older adults may internalize the ' old dogs can ' t learn new tricks ' stereotype, which consequently affects expectations about future performance in technology related domains. Task performance Task performance is negatively affected, such that lower technology related self efficacy beliefs are related to poorer performance This is extremely important, because these findings suggest that positive perceptions of individuals ' technological capabilities may need to be present before successful performance can be achieved. Anxiety Anxiety is negatively related, such that lower technology related self-efficacy beliefs are associated with higher level of anxiety.Russell, G., & Bradley, G. (1997). Teachers' computer anxiety: Implications for professional development. Education and Information Technologies, 2, 1-14.", "edit_actions": [{"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 37, "end_char_pos": 38}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 57, "end_char_pos": 58}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 134, "end_char_pos": 135}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 457, "end_char_pos": 458}, {"type": "R", "before": "Today\u2019s modern", "after": "21st-century", "start_char_pos": 958, "end_char_pos": 972}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3013, "end_char_pos": 3014}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3893, "end_char_pos": 3894}, {"type": "R", "before": "Other Forms of Self-efficacy", "after": "other forms of self-efficacy", "start_char_pos": 4120, "end_char_pos": 4148}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5797, "end_char_pos": 5798}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 6059, "end_char_pos": 6060}, {"type": "R", "before": "likert type", "after": "likert-type", "start_char_pos": 7419, "end_char_pos": 7430}, {"type": "R", "before": "10 item", "after": "10-item", "start_char_pos": 8075, "end_char_pos": 8082}, {"type": "R", "before": "\u201ccomposite\u201d", "after": "\"composite\"", "start_char_pos": 8148, "end_char_pos": 8159}, {"type": "D", "before": "\u2018\u2019", "after": null, "start_char_pos": 8434, "end_char_pos": 8436}, {"type": "D", "before": "\u2019\u2019", "after": null, "start_char_pos": 8458, "end_char_pos": 8460}, {"type": "R", "before": "\u2018\u2019totally confident\u2019\u2019", "after": "totally confident", "start_char_pos": 8471, "end_char_pos": 8492}, {"type": "R", "before": "\u201cyes\u201d", "after": "\"yes\"", "start_char_pos": 8553, "end_char_pos": 8558}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 9714, "end_char_pos": 9715}, {"type": "D", "before": "''", "after": null, "start_char_pos": 10573, "end_char_pos": 10575}, {"type": "D", "before": "\u2019\u2019", "after": null, "start_char_pos": 10628, "end_char_pos": 10630}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 12366, "end_char_pos": 12367}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 12468, "end_char_pos": 12469}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 13426, "end_char_pos": 13427}, {"type": "R", "before": "\u2018", "after": "'", "start_char_pos": 13514, "end_char_pos": 13515}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 13529, "end_char_pos": 13530}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 13550, "end_char_pos": 13551}, {"type": "R", "before": "Performance", "after": "performance", "start_char_pos": 13665, "end_char_pos": 13676}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 13910, "end_char_pos": 13911}, {"type": "R", "before": "self efficacy", "after": "self-efficacy", "start_char_pos": 14083, "end_char_pos": 14096}], "sents_char_pos": [0, 172, 286, 327, 531, 550, 590, 609, 729, 813, 946, 1121, 1245, 1342, 1423, 1592, 1637, 1656, 1814, 1892, 1977, 2010, 2157, 2270, 2726, 2972, 3007, 3032, 3129, 3184, 3319, 3357, 3419, 3465, 3677, 3930, 4055, 4098, 4339, 4437, 4690, 4829, 4871, 4920, 4963, 5135, 5207, 5365, 5492, 5545, 5665, 5841, 5932, 6102, 6181, 6390, 6464, 6598, 6699, 6846, 6921, 7042, 7185, 7303, 7356, 7501, 7652, 7743, 7882, 7971, 8089, 8177, 8321, 8495, 8684, 8772, 8853, 9081, 9141, 9274, 9313, 9385, 9427, 9472, 9583, 9627, 9662, 9772, 9813, 9861, 9925, 9981, 10214, 10394, 10417, 10572, 10642, 10687, 10791, 10835, 10874, 10949, 10992, 11030, 11118, 11174, 11288, 11340, 11734, 11867, 11970, 12025, 12058, 12106, 12206, 12312, 12399, 12550, 12714, 12743, 12812, 12855, 12884, 12967, 13065, 13230, 13270, 13368, 13403, 13659, 14008, 14149, 14183, 14254]}
+{"doc_id": "35325932", "revision_depth": "1", "before_revision": "Terminology The Chinese word bigu compounds bi \"ruler; monarch; avoid; ward off; keep away\" and gu or \"cereal; grain; () millet\". The bi meaning in bigu is a variant Chinese character for bi \"avoid; shun; evade; keep away\" (e.g., bixie or \"ward off evil spirits; talisman; amulet\"). The alternate pronunciation of pi \"open up; develop; refute; eliminate\" is a variant character for . The complex 14-stroke traditional Chinese character gu \"grain\" has a 7-stroke simplified Chinese character gu \"valley; gorge.\" Although a few Chinese dictionaries (e .g., Liang Chang 1971, Lin 1972) gloss the pronunciation of bigu as pigu, the definitive Hanyu Da Cidian (1997) gives bigu. English lexicographic translations of bigu are compared in this table. Chinese-English Dictionary Definition of / Giles (1912) \"to give up eating the five cereals, with a view to immortality. Also, to refuse food, -- and starve\" Mathews (1931) \"to abstain from cereals in order to attain to immortality; to starve\" Liang & Chang (1971) \"to avoid eating cereals in order to obtain immortality\" Lin (1972) \"stop even vegetarian food, as a way of becoming Taoist immortal\" DeFrancis (2003) \"avoid eating cereals in order to gain immortality\" Kleeman & Yu (2010) \"refuse to eat grain\" Catherine Despeux (2008:233) lists synonyms for bigu \"abstention from cereals\": duangu \"stopping cereals\" (with duan \"cut off; sever; break; give up\"), juegu \"discontinuing cereals\" (jue \"cut off; sever; refuse; reject\"), quegu \"refraining from cereals\" (que \"retreat; decline; reject; refuse\"), and xiuliang \"stopping grains\" (with xiu \"repair; trim; prune' cultivate\" and liang \"grain; food\"). Juegu, unlike these other alternative expressions, had meanings besides Daoist dietary practices. For instance, the (c. 139 BCE) Huainanzi uses juegu in a traditional saying (tr. Major et al. 2010:775): \"Now, rejecting study because those who study have faults is like taking one instance of choking to refuse grain and not eat or taking one problem with stumbling to stop walking and not go [anywhere].\" About one century later, Liu Xiang's Shuoyuan \"Garden of Stories\" rephrases this simile about choking once and discontinuing grains. Shennong ploughing fields, Han Dynasty mural. Chinese folklore and mythology associated several divinities with agriculture and grains. Suiren \"Firelighting Person\" was a three-eyed sage who discovered how to make fire and invented cooking. This sui means \"flint; bow drill; burning mirror\". Shennong \"Farmer God\", also known as Wuguxiandi \"Emperor of the Five Grains\", taught humans agricultural techniques and herbal medicine. Shennong is specifically credited with teaching humans to cultivate and eat the five grains. The list of which grains were counted varied, but the various lists generally include the leguminous soybean, according to Lihui Yang (2005:70 and 191-192) . The (139 BCE) Huainanzi describes Shennong transforming human society from hunter-gatherer to agriculture. In ancient times, the people fed on herbaceous plants and drank [only] water, picked fruit from shrubs and trees and ate the meat of oysters and clams. They frequently suffered tribulations from feverish maladies and injurious poisons. Consequently, the Divine Farmer first taught the people to plant and cultivate the five grains. He evaluated the suitability of the land, [noting] whether it was dry or wet, fertile or barren, high or low. He tried the taste and flavor of the one hundred plants and the sweetness or bitterness of the streams and springs, issuing directives so the people would know what to avoid and what to accept. At the time [he was doing this], he suffered poisoning [as many as] seventy times a day. (19 , tr. Major et al. 2010:766-767) Houji \"Lord Millet\" is the god or goddess of agriculture and ancestor of the Zhou people. The Shijing poem Shengmin \"Birth of the [Zhou] People\" praises Houji for inventing both agriculture and sacrifices (Campany 2005:10-13) . Hou Tu \"Lord Earth\" was the god or goddess deity of the soil, and supposedly the progenitor of the giant Kua Fu. Worshipped at sheji altars. While traditional Chinese mythology depicted cooking and agriculture as key elements of civilization, the Daoists created a \"counter-narrative\" (Campany 2005:16) to justify the idea of grain avoidance. For example, the Confucianist Xunzi and Legalist Hanfeizi describe Suiren as cultural folk hero. In the earliest times ... the people lived on fruit, berries, mussels, and clams \u2013 things that sometimes became so rank and fetid that they hurt people's stomachs, and many became sick. Then a sage appeared who created the boring of wood to produce fire so as to transform the rank and putrid foods. The people were so delighted by this that they made him ruler of the world and called him the Fire-Drill Man (Suiren ). (Hanfeizi 49 , tr. Campany 2005:15) In contrast, the Zhuangzi \"Mending Nature\" chapter mentions Suiren first in a list of mythic sage-rulers \u2013 Fu Xi, Shennong, Yellow Emperor, Tang of Shang, and Yu the Great, traditionally credited with advancing civilization \u2013 but depicts them as villains who began the destruction of the primal harmony of the Dao. Campany (2005:16) calls this \"the decline of Power and the ever-farther departure from the natural Dao into systems of social constraint and what passes for culture.\" The ancients, in the midst of chaos, were tranquil together with the whole world. At that time, yin and yang were harmoniously still, ghosts and spirits caused no disturbances; the four seasons came in good time; the myriad things went unharmed; the host of living creatures escaped premature death. \u2026 This condition persisted until integrity deteriorated to the point that Torchman [Suiren] and Fuhsi arose to manage all under heaven, whereupon there was accord, but no longer unity. Integrity further declined until the Divine Farmer and the Yellow Emperor arose to manage all under heaven, whereupon there was repose, but no longer accord. Integrity declined still further until T'ang and Yu arose to manage all under heaven. They initiated the fashion of governing by transformation, whereby purity was diluted and simplicity dissipated. (tr. Mair 1994:149) The Wangzhi \"Royal Regulations\" chapter of the Liji uses cooking food and eating grains to culturally classify the Chinese \"Middle Kingdom\" bordered by the \"Four Barbarians\" (eastern Yi, southern Man, western Rong, and northern Di). Thus the people of the five regions \u2026 each had their several natures, which they could not be made to alter. Those of the east were called Yi; they wore their hair unbound and tattooed their bodies, and some of them ate their food without cooking it. [The people of] the south were called Man; they tattooed their foreheads and had their feet turned in toward each other, and some among them ate their food without cooking it. [The people of] the west were called Rong; they wore their hair unbound and wore skins, and some of them did not eat grain. [The people of] the north were called Di; they wore feathers and furs and lived in caves, and some of them did not eat grain. (tr. Campany 2005:7-8) Kwang-chih Chang (1977:42) interprets this Liji context to mean, \"One could eat grain but also eat raw meat or one could eat his meat cooked but eat no grain. Neither was fully Chinese. A Chinese by definition ate grain and cooked his meat.\" The nong \"peasant; farmer\" was second-highest of the Four Occupations under the traditional Chinese feudal system. Kristofer Schipper says, The peasants depended entirely on agriculture and were forever tied to their land through all kinds of fiscal and administrative measures. As a result, the rural communities became an easy prey to all the ills of sedentary civilization: ever-higher taxes, enslavement to the government through corv\u00e9e labor and military draft, epidemics, periodic shortages and famines, and wars and raids by non-Chinese tribes from across the borders. (Schipper 1993:168) When natural or human catastrophes occurred, the peasants could take refuge in non-arable regions of mountains and survive on wild foods other than grains. The sheji \"altars to soil and grain gods\" were the ritual center of a Chinese state. Originally, she was the \"god of the land\" and ji the \"god of the harvest\" (cf. Houji above), and the compound sheji \"gods of soil and grain\" metaphorically means \"the state; the nation\". The Shiji (Campany 2005:21) says establishing a new dynasty required eliminating the sheji altars of the preceding dynasty and erecting one's own. Offerings of grain, liquor (a grain product), and meat were necessary not only for sheji sacrifices but for ancestral sacrifices. The obligation to feed the ancestral dead was fundamental to Chinese society. Campany summarizes the cultural importance of sacrificing \"grains\" to feed both natural and ancestral spirits. Grain was, in short, a symbol and summation of culture itself, or rather of nature acculturated, as well as of the completely human community. A natural locus of nutritive \"essence\" (jing), grain nevertheless required cooperative, communal and differentiated stages of production\u2014planting, tending, harvesting, storing, thrashing, milling, mixing, and cooking\u2014to be transformed into food. Thus transformed, it was perhaps the most culturally celebrated food of humans (both living and dead) and of gods. (2005:24) The Chinese character for jing \"spirit; essence of life; energy\" is written with the rice radical . A (c. 3rd century BCE) Zhuangzi chapter describes a shenren \"divine person\" who does not eat grains but mysteriously helps them grow. Far away on Mount Kuyeh there dwells a spirit man whose skin is like congealed snow and who is gentle as a virgin. He does not eat any of the five grains, but inhales the wind and drinks the dew. He rides on the clouds, drives a flying dragon, and wanders beyond the four seas. His spirit is concentrated, saving things from corruption and bringing a bountiful harvest every year. (1 , tr. Mair 1994:6-7) In this passage, Maspero (1981:417) recognizes the principal Daoist practices that were current during the Six Dynasties period: \"(1) abstention from Cereals, (2) respiratory exercises, and (3) concentration and meditation. The \"journey beyond the Four Seas\" (4) corresponds to a manner of directing ecstasy,\" resembling astral projection. The (168 BCE) Quegu shiqi \"Eliminating Grain and Eating Qi\" manuscript, which was discovered in 1973 among the Mawangdui Silk Texts, is the oldest documented grain-avoidance diet (tr. by Harper 1998:305-9). This Chinese medical manual outlines a method for replacing grains with qi circulations, and consuming medicinal herbs, notably the fern shiwei \"Pyrrosia lingua\" as a diuretic to treat urine retention resulting from eliminating grains. This text (tr. Campany 2005:31) dichotomizes diets with the square-earth round-heaven model from Chinese cosmography and fengshui, \"Those who eat grain eat what is square; those who eat qi eat what is round. Round is heaven; square is earth.\" The (139 BCE) Huainanzi chapter on topography (4 , tr. Major et al. 2010:161) correlates diet and lifespan. \"Those that feed on flesh are brave and daring but are cruel. Those that feed on qi [attain] spirit illumination and are long-lived. Those that feed on grain are knowledgeable and clever but short-lived. Those that do not feed on anything do not die and are spirits.\" Sima Qian's (c. 91 BCE) Records of the Grand Historian (26 , tr. Watson 1993 1:113; cf. Y\u00fc 1965:92 ) mentions bigu in connection with Zhang Liang (262-189 BCE), or the Marquis of Liu, who served as teacher and strategist for Emperor Gaozu of Han (r. 202-195 BCE). Zhang officially requested \"to lay aside the affairs of this world, and join the Master of the Red Pine in immortal sport\" (referring to Chisongzi \"Master Red Pine\", a legendary xian who, like Guiguzi, abstained from grains), and the emperor permitted it. Zhang Liang \"set about practising dietary restrictions and breathing and stretching exercises to achieve levitation\" (namely, bigu, daoyin, and qingshen \"lightening the body\"). After Gaozu died, Empress L\u00fc Zhi urged Zhang to eat, saying, \"Man's life in this world is as brief as the passing of a white colt glimpsed through a crack in the wall. Why should you punish yourself like this?\" Zhang \"had no other recourse but to listen to her advice and begin eating again. Eight years later he died.\" Based upon this account (which is also found in the Lunheng), Campany (2005:37) concludes that by the late 2nd and 1st centuries BCE, \"the idea that some practitioners were abstaining from grains while practicing methods for consuming, directing, and cultivating qi as alternate nourishment was ubiquitous and commonplace.\" The (ca. 111 CE) Book of Han mentions bigu in context with the fangshi \"alchemist; magician\" Li Shaojun teaching Emperor Wu of Han (r. 141-87 BCE) a \"method of worshipping the furnace and abstaining from cereals to prevent old age\" (tr.Despeux 2008:233). Since grains were cooked on the stove, in raw/cooked logic, grain avoidance was traditionally linked with worship of Zaoshen The Stove God (Pregadio 2008). In a reversal of not eating the Five Grains to obtain immortality, the Book of Han also records that in 10 CE, the usurper Wang Mang paid the fangshi Su Lo , who claimed to know the xian secrets of longevity, to plant some \"immortality grain\" (Yu 1965:115) . [T]he five grains were planted within the palace in plots facing according to the color of each one. The seeds had been soaked in (a liquid made from) the marrow of the bones of cranes, tortoise-shell (tu mao), rhinoceros (horn), and jade, in all more than twenty constituents. One bushel of this grain cost one piece of gold. This was called Huang Ti's cereal method for becoming a holy immortal. (tr. Needham 1997:37) The Confucian scholar Liu Xiang (79-8 BCE) edited several classical texts, including the (c. 26 BCE) Guanzi that repeatedly praises grain eating. The first chapter \"Neiye\" \"Inner Training\" begins by comparing the jing \"essence\" in grains and stars. The vital essence of all things: it is this that brings them to life. It generates the five grains below and becomes the constellated stars above. When flowing amid the heavens and earth, we call it ghostly and numinous. When stored within the chests of human beings, we call them sages. (tr. Roth 2004 1:01) Campany (2005:18) knows of \"no text that exalts grains more highly or insists on their importance more strongly than the Guanzi.\" Compare: \"The five grains and the eating of rice are the people's Director of Allotted Lifespans\" (i.e., Siming) and \"In all cases the five grains are the controllers of all things\" (meaning the market price of grains affects all economic values). Liu Xiang's hagiography of Daoist xian, the Liexian Zhuan \"Collected Biographies of Immortals\", tells the famous \"Hairy Woman\" legend in terms of grain avoidance. During the reign of Emperor Cheng of the Han, hunters in the Zhongnan Mountains saw a person who wore no clothes, his body covered with black hair. Upon seeing this person, the hunters wanted to pursue and capture him, but the person leapt over gullies and valleys as if in flight, and so could not be overtaken. The hunters then stealthily observed where the person dwelled, surrounded and captured him, whereupon they determined that the person was a woman. Upon questioning, she said, \"I was originally a woman of the Qin palace. When I heard that invaders from the east had arrived, that the King of Qin would go out and surrender, and that the palace buildings would be burned, I fled in fright into the mountains. Famished, I was on the verge of dying by starvation when an old man taught me to eat the resin and nuts of pines. At first, they were bitter, but gradually I grew accustomed to them. They enabled me to feel neither hunger nor thirst; in winter I was not cold, in summer I was not hot.\" Calculation showed that the woman, having been a member of the Qin King Ziying's harem, must be more than two hundred years old in the present time of Emperor Cheng. The hunters took the woman back in. They offered her grain to eat. When she first smelled the stink of the grain, she vomited, and only after several days could she tolerate it. After little more than two years of this [diet], her body hair fell out; she turned old and died. Had she not been caught by men, she would have become a transcendent. (tr. Campany 2005:38) Campany states, \"Few narratives more succinctly summarize the argument that ordinary foods or \"grains\" block the path to transcendence.\" Ge Hong's (3rd century) Shenxian zhuan gives a different version \u2013 including the Hairy Woman's name of Yu Qiang and not mentioning her being captured or fed grains. Two chapters of Wang Chong's (c. 80 CE) Lunheng criticize the practice of avoiding grains as mistaken. The \"Daoist Untruths\" chapter uses Li Shao Jun, who \"knew some clever maneuvers and some fine tricks, which did not fail to produce a wonderful effect\" (tr. Forke 1907:344), to exemplify confusing Daoist xian immortality techniques with natural longevity (see Y\u00fc 1965:111) . There are no instances of any one having obtained Tao, but there have been very long-lived persons. People remarking that those persons, while studying Tao and the art of immortality, become over a hundred years old without dying, call them immortals, as the following example will show. At the time of Han Wu Ti there lived a certain Li Shao Ch\u00fcn, who pretended that by sacrificing to the \"Hearth\" and [bigu] abstaining from eating grain he could ward off old age. He saw the emperor, who conferred high honours upon him. (tr. Forke 1907:344) This context also mentions Wang Ziquiao , a son of King Ling of Zhou (r. 571-545 BCE). The idea prevails that those who [bigu] abstain from eating grain are men well versed in the art of Tao. They say e.g. that Wang Tse Ch'iao and the like, because they did not touch grain, and lived on different food than ordinary people, had not the same length of life as ordinary people, in so far as having passed a hundred years, they transcended into another state of being, and became immortals. That is another mistake. Eating and drinking are natural impulses, with which we are endowed at birth. Hence, the upper part of the body has a mouth and teeth, the inferior part orifices. With the mouth and teeth one chews and eats, the orifices are for the discharge. Keeping in accord with one's nature, one follows the law of heaven, going against it, one violates one's natural propensities, and neglects one's natural spirit before heaven. How can one obtain long life in this way? (tr. Forke 1907:347) The Lunheng \"Meaning of Sacrifice\" chapter mentions juegu in criticizing the tradition of presenting food and wine sacrifices to ancestral spirits. The votaries of Taoism studying the art of immortality abstain from eating cereals and take other food than other people with a view to purifying themselves. Ghosts and spirits, however, are still more ethereal than immortals, why then should they use the same food as man? One assumes that after death man loses his consciousness, and that his soul cannot become a spirit. But let us suppose that he did, then he would use different food, and using different food, he would not have to eat human food. Not eating human food, he would not ask us for it, and having nothing to ask at the hands of man, he could not give luck or mishap. (tr. Forke 1907:524) Lu Jia 's (c. 191 BCE) Xinyu \"New Sayings\" criticizes bigu among other early Daoist xian transcendental practices. [If a man] treats his body bitterly and harshly and goes deep into the mountains in search of hsien immortality, [if he] leaves behind his parents, casts aside his kindred, abstains from the five grains, gives up classical learning, thus running counter to what is cherished by Heaven and Earth in quest of the way of \"no death,\" then he is in no way to communicate with this world or to prevent what is not right from happening. (tr. Y\u00fc 1965:93) The (c. 190-220 CE) Xiang'er commentary to the Daodejing contrasts qi-eaters and grain-eaters. Transcendent nobles (xianshi ) differ from the vulgar in that they do not value glory, rank, or wealth. They value only \"drawing sustenance from the mother\"\u2014that is, [from] their own bodies. In the interior of the body, the \"mother\" is the stomach, which governs the qi of the five viscera. Commoners eat grain, and when the grain is gone, they die. Transcendent nobles eat grain when they have it, and when they do not, they consume qi. The qi returns to the stomach, which is the layered sack of the bowels. (tr. Campany 2005:37) Ge Hong's (c. 320 CE) Baopuzi contains classical discussions of bigu techniques. For instance, chapter 6, \"The Meaning of 'Subtle'\" (), equates grain avoidance with the supernatural abilities of a xian transcendent. Therefore, by giving up starches one can become immune to weapons, exorcize demons, neutralize poisons, and cure illnesses. On entering a mountain, he can render savage beasts harmless. When he crosses streams, no harm will be done to him by dragons. There will be no fear when plague strikes; and when a crisis or difficulty suddenly arises, you will know how to cope with it. (6 , tr. Ware 1966:114-5 ) Chapter 15, \"Miscellanea\" (), describes \"avoiding grains\" in terms that Campany (2005:39) says are \"tantamount to not eating food at all\" and \"merely swallowing saliva and qi and ingesting medicinal preparations to suppress appetite and strengthen the body.\" The chapter begins with the interlocutor asking about duangu \"cutting off grains\" and changsheng \"longevity\" (meaning \"eternal life\" in Daoist terminology). \"I should like to inquire whether a man can attain Fullness of Life by merely dispensing with starches. How many methods for this are there altogether, and which is the best?\" Ge Hong gives a lengthy answer, citing both personal observations and textual records. Practitioners medicinally used huangqing \"yellow essence\" (\"polygonatum; Solomon's Seal\") and yuyu \"Yu's leftover grain\" (\"limonite\"). By dispensing with starches a man can only stop spending money on grains, but by that alone he cannot attain Fullness of Life. When I inquired of people who had been doing without starches for a long time, they replied that they were in better health than when they were eating starches. When they took thistle and nibbled mercury and when they also took pills of brown hematite twice a day, this triple medication produced an increase in breaths, so that they gained the strength to carry loads on long trips, for their bodies became extremely light in weight. One such full treatment protected the patients' inner organs for five to ten years, but when they swallowed their breaths, took amulets, or drank brine, only loss of appetite resulted, and they did not have the strength for hard work. The Taoist writings may say that if one wishes Fullness of Life the intestines must be clean, and if immortality is desired the intestines must be without feces; but they also say that those eating greens will be good walkers, but at the same time stupid; that those eating meat will be very strong, and also brave. Those eating starches will be wise, but they will not live to an old age, while those eating breath will have gods and spirits within them that never die. This last, however, is only a biased claim advanced by the school that teaches the circulation of breaths. One has no right to claim to use this method exclusively. If you wish to take the great medicines of gold or cinnabar, they will act more quickly if you fast for the preceding hundred days or so. If you cannot fast that long, take them straightway; this will do no great harm, but it will take more time to acquire geniehood. (15 , tr. Ware 1966:243-4 ) Warning that abandoning grains is difficult \u2013 \"If you consider it inconvenient to break with the world, abandon your household, and live high on a peak, you will certainly not succeed\" \u2013 Ge Hong notes the popularity of alternative dietary techniques. If you would not distress yourself, it is best not to dispense with starches but merely to regulate the diet, for which there are about a hundred methods. Sometimes, after a few dozen pills of interior-protecting medicines have been taken, it is claimed that appetite is lost for forty or fifty days. (Other times, one or two hundred days are claimed, or the pills must be taken for days or months.) Refined pine and cypress as well as thistle can also protect the interior, but they are inferior to the great medicines, and last only ten years or less. At other times, fine foods are first prepared and consumed to utter satiation, and then medicines are taken to nurture the things that have been eaten, so that they may not be digested. This is claimed to remain valid for three years. If you then wish to revert to the eating of starches, it is necessary to start by swallowing mallows and lard, so that the fine food you prepared will pass from you undigested. (15 , tr. Ware 1966:244 ) Ge Hong chronicles the effects of grain avoidance. I have personally observed for two or three years men, who were foregoing starches, and in general their bodies were slight and their complexions good. They could withstand wind, cold, heat, or dampness, but there was not a fat one among them. I admit that I have not yet met any who had not eaten starches in several decades, but if some people cut off from starches for only a couple of weeks die while these others look as well as they do after years, why should we doubt that the (deliberate) fasting could be prolonged still further? If those cut off from starches grow progressively weaker to death, one would normally fear that such a diet simply cannot be prolonged, but inquiry of those pursuing this practice reveals that at first all of them notice a lessening of strength, but that later they gradually get stronger month by month and year by year. Thus, there is no impediment to the possibility of prolongation. All those who have found the divine process for attaining Fullness of Life succeeded by taking medicines and swallowing breath; on this they are all in perfect agreement. A moment of crisis, however, generally occurs at an early stage when medicines are being taken and starches abandoned and it is only after forty days of progressive weakening, as one uses only holy water and feeds solely on breath, that one regains strength. (15 , tr. Ware 1966:246-7 ) This \"holy water\" refers to a Daoist fu \"talisman\" dissolved in water. Ge Hong further cites an Eastern Wu historical example to show that drinking holy water cannot prevent death. When Emperor Jing of Wu (r. 258-264) heard about Shi Chun , a Daoist healer \"who would not eat in order to hasten the cure when he was treating a sick person,\" he exclaimed, \"In a short time this man is going to starve to death.\" Then he had him locked up and guarded, and all that Shih Ch'un requested was two or three quarts of water for making holy water. It went on like this for more than a year, while his complexion became ever fresher and his strength remained normal. The emperor then asked him how much longer he could continue like this, and Shih Ch'un replied that there was no limit; possibly several dozen years, his only fear being that he might die of old age, but it would not be of hunger. The emperor then discontinued the experiment and sent him away. Note that Shih Ch'un's statement shows that giving up starches cannot protract one's years. Some today possess Shih Ch'un's method. (15 , tr. Ware 1966:248-9 ) In the Baopuzi, Ge Hong criticizes contemporary charlatans who claimed to have duangu \"cut off grains\". I have also frequently seen ignorant processors who, wishing to boast and amaze and acquire a reputation for not eating when they really knew nothing about such procedures, merely claimed not to eat gruel. Meanwhile, they would drink more than a gallon of wine daily, and dried meats, puddings, jujubes, chestnuts, or eggs were never out of their mouths. Sometimes they would eat large quantities of meat \u2013 several dozen pounds daily \u2013 swallowing its juices and spitting out anything that was unpleasant. This, however, is actually feasting. Wine drinkers will eat dried meats with their wine but not starches, and they can keep this up for six months to a year without stumbling or falling. Never yet, however, have they claimed that this was \"cut off from starches!\" (15 , tr. Ware 1966:248 ) The (c. 4th-5th century) Taishang Lingbao Wufuxu \"Explanations of the Five Numinous Treasure Talismans\", attributed to the Han Daoist Lezichang , gives instructions for practicing bigu, swallowing saliva, and ingesting the \"five wonder plants\" (pine resin, sesame, pepper, ginger, and calamus). This \"Explanations\" text includes the (c. 280) Lingbao wufu jing \"Scripture of the Five Numinous Treasure Talismans\", which says: The Third Immortal King told the Emperor: In the old days I followed a dietetic regimen and attained immortality. My teacher made me increase the sweet spring in my mouth and swallow it in accordance with the following incantation: \"The white stones, hard and rocky, are rolling on and on. The gushing spring, bubbling and pervasive, becomes a thick juice. Drink it and attain long life \u2013 Longevity forever longer!\" These twenty-two words\u2014you should follow them! If you can actually do this and nourish on the True One without stopping, swallow from your flowery pond without interruption, then your inner energy will grow and remain strong, never to be weakened. You attain the Tao by avoiding all grains. You will never again have to follow the rhythm of the moon and plant or harvest. Now, the people of mysterious antiquity, they reached old age because they remained in leisure and never ate any grains. As the Dayou zhang [] (Verse of Great Existence) says: \"The five grains are chisels cutting life away, making the five organs stink and shorten our spans. Once entered into our stomach, there's no more chance to live quite long. To strive for complete avoidance of all death, keep your intestines free of excrement!\" (tr. Kohn 1993:149-150) Campany uses internalism and externalism to analyze how early texts justified the idea that shiqi \"eating qi\" is better than shigu \"eating grains\". For examples (2005:2) , \"We eat X because X makes us live long\" is an internalist rationale based upon essential properties or benefits; \"We eat X and not Y, which is what those other people eat\" is an externalist claim based upon cultural stereotypes. After comprehensive analysis of how early texts describe \"grain\" (i.e., \"mainstream food\") avoidance, from the (c. 320 BCE) Zhuangzi to the (c. 320 CE) Baopuzi, Campany (2005:43) concludes the (c. 280 CE) Lingbao wufu jing is the earliest passage \"in which grains are attacked as a food source based on what we might call negative internalist reasons\u2014that is, on the grounds that they cause actual harm to the body in specific, theorized ways.\" Before the 3rd century, Chinese classical texts did not claim that \"grains\" actually harm the body, they argued that \" qi and other more refined substances, when ingested and circulated in esoterically prescribed ways, give superior and (for some texts at least) longevity-inducing nourishment.\" One of the striking things about the texts we have reviewed is that most of them offer very little by way of an internalist critique of grains or other everyday foods. That is, they all recommend avoiding grains and offer what they tout as superior alternatives, but on the question of precisely why grains are such inferior nourishment they have little or nothing to say. What little internalist critique we do find comes quite late \u2014 apparently Eastern Han at the earliest \u2014 and does not seem well developed: ordinary foods, described as rotten and smelly, impurify a body that must be brought into qi-based resonance with heaven. This impurity is located specifically in the intestines. [\u2026] In most discussions, then, it is not that prescribers and practitioners of transcendence arts portrayed ordinary food as harmful; it is rather that they had what they considered superior alternatives to offer. [\u2026 But,] why these diets of qi or of rare herbs and minerals should be regarded as superior to one of ordinary food is a question that very often remains unanswered; we are merely, but repeatedly and in diverse ways, told that they are superior. (2005:48) Echoing Claude L\u00e9vi-Strauss, Campany (2005:50) suggests that grains, inexorably linked with all their cultural and institutional symbolisms, were \"good to oppose\" rather than being seen as intrinsically \"bad to eat.\" One of the major reasons for consuming wild plants and exotic foods was the inherent contrast with eating everyday \"grains\". The avoidance of \"grain\" signifies the Daoist rejection of common social practices. According to Kohn (1993:149) , \"It is a return to a time in the dawn of humanity when there were as yet no grains; it is also a return to a more primitive and simple way of eating.\" Daoist bigu practices created excuses to quit the agricultural-based Chinese society in which grains were necessary for basic food, ancestral sacrifices, and tax payments. The \"cutting off\" of grains, which were the basic staple food for the peasants, was also a rejection of their sedentary life and the peasant condition as such. This refusal should not solely be interpreted in the light of the miseries endured by farmers, but also in a much more fundamental way. Agriculture has occasioned, since Neolithic times, a radical break with the way of life that prevailed for almost the entire prehistory of humankind. Agriculture has also been the main culprit of the imbalances of human civilization over the last ten thousand years or so: the systematic destruction of the natural environment, overpopulation, capitalization, and other evils that result from sedentariness. (Schipper 1993:170) Grain abstention was prerequisite for the Daoist practice of yangxing \"nourishing the inner nature\". Maspero explains. Nourishing the Vital Principle consists in suppressing the causes of death and creating in oneself the immortal body which will replace the mortal body. The causes of death are especially the Breath of Grains and the Breath of Bloody Food: hence the alimentary regimens which are designated by the generic name Abstinence from Grains. One must succeed in replacing vulgar food with the Food of the Breath, like an aerophagia which consists of breathing air in, holding it in as long as possible without allowing it to escape and, while it is held in, making it pass, in identical mouthfuls with great gulps of water, from the trachea into the esophagus, so that it can be sent on into the stomach like real food. The body is made of Breaths, like all things; but it is made of coarse breaths, whereas air is a light, subtle and pure Breath. Vulgar food, after digestion, supplies the body with the Breaths of the Five Flavors, common and impure Breaths which make it heavy. By contrast, Food of the Breath little by little replaces the coarse matter of the body with light, pure Breaths; and when the transformation is completed, the body is immortal. (1981:255) Some versions of \"grain avoidance\" could result in health problems, as discussed by Maspero. This very severe diet was not without its painful moments. Without grains and meat, whoever practices it is undernourished; and the Taoist authors admit that at the beginning one may have numerous troubles, some of them general (vertigo, weakness, sleepiness, difficulties in moving), others local (diarrhea, constipation, and so on). Nevertheless, they advise persevering, insisting that these disappear after several weeks and that the body soon feels as before, and even better: more calm and more at ease. They also advise practicing it only gradually, and they recommend a number of drugs for the period of transition and adaptation which, according to them, lasts thirty to forty days. The recipes for drugs to help in the practice of Abstention from Cereals are numerous: ginseng, cinnamon, pachyma cocos [i.e., Fu Ling], sesame, digitalis, licorice, and all the traditional Chinese tonics play a preponderant role in them. (1981:335) Chinese Buddhism adopted Daoist grain abstention as a preparation for self-immolation. For instance (Benn 2007:36-7) , the monk Huiyi (d. 463), who vowed to burn his body in sacrifice to the Buddha, began preparations by queli \"abstaining from grains\" (eating only sesame and wheat) for two years, then consumed only oil of thyme, and finally ate only pills made of incense. Although Emperor Xiaowu of Liu Song (r. 453\u2013464) tried to dissuade Huiyi, he publicly immolated himself in a cauldron full of oil, wearing an oil-soaked cap to act as a wick, while chanting the Lotus Sutra. Avoiding grains was the primary medical cure for eliminating the sanshi \"Three Corpses\" or sanchong \"Three Worms\", which are evil spirits believed to live in the human body and hasten death. Livia Kohn (1993:148) describes the Three Corpses as \"demonic supernatural creatures who feed on decay and are eager for the body to die altogether so they can devour it. Not only do they thus shorten the lifespan but they also delight in the decaying matter produced by the grains as they are digested in the intestines. If one is to attain long life, the three worms have to be starved, and the only way to do so is to avoid all grain.\" Traditional Chinese medicine links the mythological Three Corpses/Worms with the intestinal jiuchong \"Nine Worms\", which \"correspond to parasites such as roundworms or tapeworms, weaken the host's body and cause a variety of physical symptoms\" (Cook 2008:844) . The Three Corpses allegedly enter the human body at birth, and reside in the Upper, Middle, and Lower Dantian \"Cinnabar Fields\" within the brain, heart, and abdomen, respectively. After their host dies, they become ghosts and are free to roam about stealing sacrificial offerings. These pernicious corpse-worms seek to harm both their host's body and fate. First, they weaken the bodily Dantian energy centers. Second, the Three Corpses keep records or their host's misdeeds, ascend to tian \"heaven\" bimonthly on the Chinese sexagenary cycle day gengshen \"57th of the 60\", and file reports to the Siming \"Director of Destinies\" who assigns punishments to shorten the host's lifespan. Forgenghsen days, the (4th century) Huangtingjing \"Yellow Court Scripture\" (tr. Schipper 1978:372) says, \"Do not sleep either day or night, and you shall become immortal.\" In addition to the Three Corpses making a bimonthly report to the Director of Fate, the Baopuzi records the Hearth God making one. It is also said that there are Three Corpses in our bodies, which, though not corporeal, actually are of a type with our inner, ethereal breaths, the powers, the ghosts, and the gods. They want us to die prematurely. (After death they become a man's ghost and move about at will to where sacrifices and libations are being offered.) Therefore, every fifty-seventh day of the sixty-day cycle they mount to heaven and personally report our misdeeds to the Director of Fates. Further, during the night of the last day of the month the hearth god also ascends to heaven and makes an oral report of a man's wrongs. For the more important misdeeds a whole period of three hundred days is deducted. For the minor ones they deduct one reckoning, a reckoning being three days. Personally, I have not yet been able to determine whether this is really so or not, but that is because the ways of heaven are obscure, and ghosts and gods are hard to understand. (6 , tr. Ware 1966:115-6 ) Bigu abstinence from grains and cereals, which allegedly makes the Three Corpses waste away, is the basis for many Daoist dietetic regimens, which can also exclude wine, meat, onion, and garlic. The Jinjian yuzi jing \"Classic of Jade Characters on Slips of Gold\" (tr. Maspero 1981:334) specifies, \"Those who, in their food, cut off cereals must not take wine, nor meat, nor plants of the five strong flavors; they must bathe, wash their garments, and burn incense.\" Practicing bigu alone cannot eliminate the Three Corpses, but will weaken them to the point where they can be killed with alchemical drugs, particularly cinnabar (Schipper 1993:167) . Early Daoist texts and traditions portray the Three Corpses in both \"zoomorphic and bureaucratic metaphors\" (Campany 2005:43) . The (4th century CE) Ziyang zhenren neizhuan \"Inner Biography of the True Person of Purple Yang\" (tr.Maspero 1981:332) described them living in the Three Cinnabar Fields. Q\u012bngg\u01d4 \"Old Blue\" dwells in the Muddy Pellet Palace within the Upper Dantian, \"It is he who makes men blind, or deaf, or bald, who makes the teeth fall out, who stops up the nose and gives bad breath.\" B\u00e1i g\u016b \"White Maiden\" dwells in the Crimson Palace within the Middle Field, \"She causes palpitations of the heart, asthma, and melancholy.\" Xu\u00e8 sh\u012b \"Bloody Corpse\" dwells in the Lower Dantian, \"It is through him that the intestines are painfully twisted, that the bones are dried out, that the skin withers, that the limbs have rheumatisms...\" Compare the (9th century) Chu sanshi jiuchong baosheng jing \"Scripture on Expelling the Three Corpses and Nine Worms to Protect Life\" description. The upper corpse, P\u00e9ng j\u016b , lives in the head. Symptoms of its attack include a feeling of heaviness in the head, blurred vision, deafness, and excessive flow of tears and mucus. The middle corpse, P\u00e9ng z\u00e0n , dwells in the heart and stomach. It attacks the heart, and makes its host crave sensual pleasures. The lower corpse, P\u00e9ng ji\u01ceo , resides in the stomach and legs. It causes the Ocean of Pneuma \u2026 to leak, and makes its host lust after women. (tr. Cook 2008:846) This text's woodblock illustrations depict the upper corpse as a scholarly man, the middle as a short quadruped, and the lower corpse as \"a monster that looks like a horse's leg with a horned human head\" (tr.Maspero 1981:333). Famine foods Famine food plants, which are not normally considered as crops, are consumed during times of extreme poverty, starvation, or famine. Bigu diets were linked with mountain wilderness areas in which one relied upon non-grain foods, including famine foodstuffs and underutilized crops. Despeux (2008:234) said, \"Abstention from cereals should also be situated in the historical context of social unrest and famine.\" The Mouzi Lihuolun introduction describes people who fled China after the death of Emperor Ling of Han and moved south to Cangwu in Jiaozhou (present day Tonkin). It happened that, after the death of Emperor Ling (189 C.E.), the world was in disorder. Since only Chiao-chou [a colonial district in the far south] remained relatively peaceful, otherworldly people from the north came en masse and settled there. Many of them practiced the methods of the spirit immortals, abstaining from grains to prolong life. These methods were popular then, but Mou-tzu unceasingly refuted them by employing the Five Classics, and none among the Taoist adepts or the Magicians dared engage him in debate. (1 , tr. Keenan 1994:52) These refutations of grain avoidance are found in Mouzi Lihuolun Article 30 (Keenan 1994:151-153). The Baopuzi discussion of grain abstention notes, Should you take to the mountains and forests during political troubles, you will avoid dying of starvation by observing the rule about starches. Otherwise, do not rush into this practice, for rushing cannot be very beneficial. If you dispense with meat while living among others, you will find it impossible not to desire it deep in your heart when you smell its fat or freshness. (15 , tr. Ware 1966:244 ) Schipper uses medical terminology to explain grain avoidance. One can advance positive explanations for this belief, and the practice that derives from it, if one thinks, for example, of the relative abundance of feces produced by cereals as compared to that produced by a diet of meat. The conclusion of recent studies on the harmful effect of excessive amounts of carbohydrates in the form of sugar and bread, have led some to see the Taoist abstinence from cereals as the result of an ancient empiricism in matters of diet. (Schipper 1993:167) Some contemporary researchers (such as Yan et al. 2002) are clinically investigating bigu fasting. References ", "after_revision": "Terminology The Chinese word bigu compounds bi \"ruler; monarch; avoid; ward off; keep away\" and gu or \"cereal; grain; () millet\". The bi meaning in bigu is a variant Chinese character for bi \"avoid; shun; evade; keep away\" (e.g., bixie or \"ward off evil spirits; talisman; amulet\"). The alternate pronunciation of pi \"open up; develop; refute; eliminate\" is a variant character for . The complex 14-stroke traditional Chinese character gu \"grain\" has a 7-stroke simplified Chinese character gu \"valley; gorge.\" Although a few Chinese dictionariesE .g., , . gloss the pronunciation of bigu as pigu, the definitive Hanyu Da Cidian (1997) gives bigu. English lexicographic translations of bigu are compared in this table. Chinese-English Dictionary Definition of / Giles \"to give up eating the five cereals, with a view to immortality. Also, to refuse food, -- and starve\" Mathews \"to abstain from cereals in order to attain to immortality; to starve\" Liang & Chang \"to avoid eating cereals in order to obtain immortality\" Lin \"stop even vegetarian food, as a way of becoming Taoist immortal\" DeFrancis \"avoid eating cereals in order to gain immortality\" Kleeman & Yu \"refuse to eat grain\" Catherine Despeux lists synonyms for bigu \"abstention from cereals\": duangu \"stopping cereals\" (with duan \"cut off; sever; break; give up\"), juegu \"discontinuing cereals\" (jue \"cut off; sever; refuse; reject\"), quegu \"refraining from cereals\" (que \"retreat; decline; reject; refuse\"), and xiuliang \"stopping grains\" (with xiu \"repair; trim; prune' cultivate\" and liang \"grain; food\"). Juegu, unlike these other alternative expressions, had meanings besides Daoist dietary practices. For instance, the (c. 139 BCE) Huainanzi uses juegu in a traditional saying :Tr. . \"Now, rejecting study because those who study have faults is like taking one instance of choking to refuse grain and not eat or taking one problem with stumbling to stop walking and not go [anywhere].\" About one century later, Liu Xiang's Shuoyuan \"Garden of Stories\" rephrases this simile about choking once and discontinuing grains. Shennong ploughing fields, Han Dynasty mural. Chinese folklore and mythology associated several divinities with agriculture and grains. Suiren \"Firelighting Person\" was a three-eyed sage who discovered how to make fire and invented cooking. This sui means \"flint; bow drill; burning mirror\". Shennong \"Farmer God\", also known as Wuguxiandi \"Emperor of the Five Grains\", taught humans agricultural techniques and herbal medicine. Shennong is specifically credited with teaching humans to cultivate and eat the five grains. The list of which grains were counted varied, but the various lists generally include the leguminous soybean, according to Lihui Yang . The (139 BCE) Huainanzi describes Shennong transforming human society from hunter-gatherer to agriculture. In ancient times, the people fed on herbaceous plants and drank [only] water, picked fruit from shrubs and trees and ate the meat of oysters and clams. They frequently suffered tribulations from feverish maladies and injurious poisons. Consequently, the Divine Farmer first taught the people to plant and cultivate the five grains. He evaluated the suitability of the land, [noting] whether it was dry or wet, fertile or barren, high or low. He tried the taste and flavor of the one hundred plants and the sweetness or bitterness of the streams and springs, issuing directives so the people would know what to avoid and what to accept. At the time [he was doing this], he suffered poisoning [as many as] seventy times a day. (19 )Tr. . Houji \"Lord Millet\" is the god or goddess of agriculture and ancestor of the Zhou people. The Shijing poem Shengmin \"Birth of the [Zhou] People\" praises Houji for inventing both agriculture and sacrifices . Hou Tu \"Lord Earth\" was the god or goddess deity of the soil, and supposedly the progenitor of the giant Kua Fu. Worshipped at sheji altars. While traditional Chinese mythology depicted cooking and agriculture as key elements of civilization, the Daoists created a \"counter-narrative\" to justify the idea of grain avoidance. For example, the Confucianist Xunzi and Legalist Hanfeizi describe Suiren as cultural folk hero. In the earliest times ... the people lived on fruit, berries, mussels, and clams \u2013 things that sometimes became so rank and fetid that they hurt people's stomachs, and many became sick. Then a sage appeared who created the boring of wood to produce fire so as to transform the rank and putrid foods. The people were so delighted by this that they made him ruler of the world and called him the Fire-Drill Man (Suiren ). (Hanfeizi 49 )Tr. . In contrast, the Zhuangzi \"Mending Nature\" chapter mentions Suiren first in a list of mythic sage-rulers \u2013 Fu Xi, Shennong, Yellow Emperor, Tang of Shang, and Yu the Great, traditionally credited with advancing civilization \u2013 but depicts them as villains who began the destruction of the primal harmony of the Dao. Campany calls this \"the decline of Power and the ever-farther departure from the natural Dao into systems of social constraint and what passes for culture.\" The ancients, in the midst of chaos, were tranquil together with the whole world. At that time, yin and yang were harmoniously still, ghosts and spirits caused no disturbances; the four seasons came in good time; the myriad things went unharmed; the host of living creatures escaped premature death. \u2026 This condition persisted until integrity deteriorated to the point that Torchman [Suiren] and Fuhsi arose to manage all under heaven, whereupon there was accord, but no longer unity. Integrity further declined until the Divine Farmer and the Yellow Emperor arose to manage all under heaven, whereupon there was repose, but no longer accord. Integrity declined still further until T'ang and Yu arose to manage all under heaven. They initiated the fashion of governing by transformation, whereby purity was diluted and simplicity dissipated. Tr. . The Wangzhi \"Royal Regulations\" chapter of the Liji uses cooking food and eating grains to culturally classify the Chinese \"Middle Kingdom\" bordered by the \"Four Barbarians\" (eastern Yi, southern Man, western Rong, and northern Di). Thus the people of the five regions \u2026 each had their several natures, which they could not be made to alter. Those of the east were called Yi; they wore their hair unbound and tattooed their bodies, and some of them ate their food without cooking it. [The people of] the south were called Man; they tattooed their foreheads and had their feet turned in toward each other, and some among them ate their food without cooking it. [The people of] the west were called Rong; they wore their hair unbound and wore skins, and some of them did not eat grain. [The people of] the north were called Di; they wore feathers and furs and lived in caves, and some of them did not eat grain. Tr. . Kwang-chih Chang interprets this Liji context to mean, \"One could eat grain but also eat raw meat or one could eat his meat cooked but eat no grain. Neither was fully Chinese. A Chinese by definition ate grain and cooked his meat.\" The nong \"peasant; farmer\" was second-highest of the Four Occupations under the traditional Chinese feudal system. Kristofer Schipper says, The peasants depended entirely on agriculture and were forever tied to their land through all kinds of fiscal and administrative measures. As a result, the rural communities became an easy prey to all the ills of sedentary civilization: ever-higher taxes, enslavement to the government through corv\u00e9e labor and military draft, epidemics, periodic shortages and famines, and wars and raids by non-Chinese tribes from across the borders. When natural or human catastrophes occurred, the peasants could take refuge in non-arable regions of mountains and survive on wild foods other than grains. The sheji \"altars to soil and grain gods\" were the ritual center of a Chinese state. Originally, she was the \"god of the land\" and ji the \"god of the harvest\" (cf. Houji above), and the compound sheji \"gods of soil and grain\" metaphorically means \"the state; the nation\". The Shiji says establishing a new dynasty required eliminating the sheji altars of the preceding dynasty and erecting one's own. Offerings of grain, liquor (a grain product), and meat were necessary not only for sheji sacrifices but for ancestral sacrifices. The obligation to feed the ancestral dead was fundamental to Chinese society. Campany summarizes the cultural importance of sacrificing \"grains\" to feed both natural and ancestral spirits. Grain was, in short, a symbol and summation of culture itself, or rather of nature acculturated, as well as of the completely human community. A natural locus of nutritive \"essence\" (jing), grain nevertheless required cooperative, communal and differentiated stages of production\u2014planting, tending, harvesting, storing, thrashing, milling, mixing, and cooking\u2014to be transformed into food. Thus transformed, it was perhaps the most culturally celebrated food of humans (both living and dead) and of gods. The Chinese character for jing \"spirit; essence of life; energy\" is written with the rice radical . A (c. 3rd century BCE) Zhuangzi chapter describes a shenren \"divine person\" who does not eat grains but mysteriously helps them grow. Far away on Mount Kuyeh there dwells a spirit man whose skin is like congealed snow and who is gentle as a virgin. He does not eat any of the five grains, but inhales the wind and drinks the dew. He rides on the clouds, drives a flying dragon, and wanders beyond the four seas. His spirit is concentrated, saving things from corruption and bringing a bountiful harvest every year. (1 )Tr. . In this passage, Maspero recognizes the principal Daoist practices that were current during the Six Dynasties period: \"(1) abstention from Cereals, (2) respiratory exercises, and (3) concentration and meditation. The \"journey beyond the Four Seas\" (4) corresponds to a manner of directing ecstasy,\" resembling astral projection. The (168 BCE) Quegu shiqi \"Eliminating Grain and Eating Qi\" manuscript, which was discovered in 1973 among the Mawangdui Silk Texts, is the oldest documented grain-avoidance diet . This Chinese medical manual outlines a method for replacing grains with qi circulations, and consuming medicinal herbs, notably the fern shiwei \"Pyrrosia lingua\" as a diuretic to treat urine retention resulting from eliminating grains. This textTr. . dichotomizes diets with the square-earth round-heaven model from Chinese cosmography and fengshui, \"Those who eat grain eat what is square; those who eat qi eat what is round. Round is heaven; square is earth.\" The (139 BCE) Huainanzi chapter on topography (4 )Tr. . correlates diet and lifespan. \"Those that feed on flesh are brave and daring but are cruel. Those that feed on qi [attain] spirit illumination and are long-lived. Those that feed on grain are knowledgeable and clever but short-lived. Those that do not feed on anything do not die and are spirits.\" Sima Qian's (c. 91 BCE) Records of the Grand Historian (26 ) mentions bigu in connection with Zhang Liang (262-189 BCE), or the Marquis of Liu, who served as teacher and strategist for Emperor Gaozu of Han (r. 202-195 BCE). Zhang officially requested \"to lay aside the affairs of this world, and join the Master of the Red Pine in immortal sport\" (referring to Chisongzi \"Master Red Pine\", a legendary xian who, like Guiguzi, abstained from grains), and the emperor permitted it. Zhang Liang \"set about practising dietary restrictions and breathing and stretching exercises to achieve levitation\" (namely, bigu, daoyin, and qingshen \"lightening the body\"). After Gaozu died, Empress L\u00fc Zhi urged Zhang to eat, saying, \"Man's life in this world is as brief as the passing of a white colt glimpsed through a crack in the wall. Why should you punish yourself like this?\" Zhang \"had no other recourse but to listen to her advice and begin eating again. Eight years later he died.\" Based upon this account (which is also found in the Lunheng), Campany concludes that by the late 2nd and 1st centuries BCE, \"the idea that some practitioners were abstaining from grains while practicing methods for consuming, directing, and cultivating qi as alternate nourishment was ubiquitous and commonplace.\" The (ca. 111 CE) Book of Han mentions bigu in context with the fangshi \"alchemist; magician\" Li Shaojun teaching Emperor Wu of Han (r. 141-87 BCE) a \"method of worshipping the furnace and abstaining from cereals to prevent old age\" .Tr. . Since grains were cooked on the stove, in raw/cooked logic, grain avoidance was traditionally linked with worship of Zaoshen The Stove God .Pregadio 2008. In a reversal of not eating the Five Grains to obtain immortality, the Book of Han also records that in 10 CE, the usurper Wang Mang paid the fangshi Su Lo , who claimed to know the xian secrets of longevity, to plant some \"immortality grain\" . [T]he five grains were planted within the palace in plots facing according to the color of each one. The seeds had been soaked in (a liquid made from) the marrow of the bones of cranes, tortoise-shell (tu mao), rhinoceros (horn), and jade, in all more than twenty constituents. One bushel of this grain cost one piece of gold. This was called Huang Ti's cereal method for becoming a holy immortal. The Confucian scholar Liu Xiang (79-8 BCE) edited several classical texts, including the (c. 26 BCE) Guanzi that repeatedly praises grain eating. The first chapter \"Neiye\" \"Inner Training\" begins by comparing the jing \"essence\" in grains and stars. The vital essence of all things: it is this that brings them to life. It generates the five grains below and becomes the constellated stars above. When flowing amid the heavens and earth, we call it ghostly and numinous. When stored within the chests of human beings, we call them sages. Campany knows of \"no text that exalts grains more highly or insists on their importance more strongly than the Guanzi.\" Compare: \"The five grains and the eating of rice are the people's Director of Allotted Lifespans\" (i.e., Siming) and \"In all cases the five grains are the controllers of all things\" (meaning the market price of grains affects all economic values). Liu Xiang's hagiography of Daoist xian, the Liexian Zhuan \"Collected Biographies of Immortals\", tells the famous \"Hairy Woman\" legend in terms of grain avoidance. During the reign of Emperor Cheng of the Han, hunters in the Zhongnan Mountains saw a person who wore no clothes, his body covered with black hair. Upon seeing this person, the hunters wanted to pursue and capture him, but the person leapt over gullies and valleys as if in flight, and so could not be overtaken. The hunters then stealthily observed where the person dwelled, surrounded and captured him, whereupon they determined that the person was a woman. Upon questioning, she said, \"I was originally a woman of the Qin palace. When I heard that invaders from the east had arrived, that the King of Qin would go out and surrender, and that the palace buildings would be burned, I fled in fright into the mountains. Famished, I was on the verge of dying by starvation when an old man taught me to eat the resin and nuts of pines. At first, they were bitter, but gradually I grew accustomed to them. They enabled me to feel neither hunger nor thirst; in winter I was not cold, in summer I was not hot.\" Calculation showed that the woman, having been a member of the Qin King Ziying's harem, must be more than two hundred years old in the present time of Emperor Cheng. The hunters took the woman back in. They offered her grain to eat. When she first smelled the stink of the grain, she vomited, and only after several days could she tolerate it. After little more than two years of this [diet], her body hair fell out; she turned old and died. Had she not been caught by men, she would have become a transcendent. Tr. . Campany states, \"Few narratives more succinctly summarize the argument that ordinary foods or \"grains\" block the path to transcendence.\" Ge Hong's (3rd century) Shenxian zhuan gives a different version \u2013 including the Hairy Woman's name of Yu Qiang and not mentioning her being captured or fed grains. Two chapters of Wang Chong's (c. 80 CE) Lunheng criticize the practice of avoiding grains as mistaken. The \"Daoist Untruths\" chapter uses Li Shao Jun, who \"knew some clever maneuvers and some fine tricks, which did not fail to produce a wonderful effect\" ,Tr. . to exemplify confusing Daoist xian immortality techniques with natural longevity . There are no instances of any one having obtained Tao, but there have been very long-lived persons. People remarking that those persons, while studying Tao and the art of immortality, become over a hundred years old without dying, call them immortals, as the following example will show. At the time of Han Wu Ti there lived a certain Li Shao Ch\u00fcn, who pretended that by sacrificing to the \"Hearth\" and [bigu] abstaining from eating grain he could ward off old age. He saw the emperor, who conferred high honours upon him. Tr. . This context also mentions Wang Ziquiao , a son of King Ling of Zhou (r. 571-545 BCE). The idea prevails that those who [bigu] abstain from eating grain are men well versed in the art of Tao. They say e.g. that Wang Tse Ch'iao and the like, because they did not touch grain, and lived on different food than ordinary people, had not the same length of life as ordinary people, in so far as having passed a hundred years, they transcended into another state of being, and became immortals. That is another mistake. Eating and drinking are natural impulses, with which we are endowed at birth. Hence, the upper part of the body has a mouth and teeth, the inferior part orifices. With the mouth and teeth one chews and eats, the orifices are for the discharge. Keeping in accord with one's nature, one follows the law of heaven, going against it, one violates one's natural propensities, and neglects one's natural spirit before heaven. How can one obtain long life in this way? Tr. . The Lunheng \"Meaning of Sacrifice\" chapter mentions juegu in criticizing the tradition of presenting food and wine sacrifices to ancestral spirits. The votaries of Taoism studying the art of immortality abstain from eating cereals and take other food than other people with a view to purifying themselves. Ghosts and spirits, however, are still more ethereal than immortals, why then should they use the same food as man? One assumes that after death man loses his consciousness, and that his soul cannot become a spirit. But let us suppose that he did, then he would use different food, and using different food, he would not have to eat human food. Not eating human food, he would not ask us for it, and having nothing to ask at the hands of man, he could not give luck or mishap. Tr. . Lu Jia 's (c. 191 BCE) Xinyu \"New Sayings\" criticizes bigu among other early Daoist xian transcendental practices. [If a man] treats his body bitterly and harshly and goes deep into the mountains in search of hsien immortality, [if he] leaves behind his parents, casts aside his kindred, abstains from the five grains, gives up classical learning, thus running counter to what is cherished by Heaven and Earth in quest of the way of \"no death,\" then he is in no way to communicate with this world or to prevent what is not right from happening. Tr. . The (c. 190-220 CE) Xiang'er commentary to the Daodejing contrasts qi-eaters and grain-eaters. Transcendent nobles (xianshi ) differ from the vulgar in that they do not value glory, rank, or wealth. They value only \"drawing sustenance from the mother\"\u2014that is, [from] their own bodies. In the interior of the body, the \"mother\" is the stomach, which governs the qi of the five viscera. Commoners eat grain, and when the grain is gone, they die. Transcendent nobles eat grain when they have it, and when they do not, they consume qi. The qi returns to the stomach, which is the layered sack of the bowels. Tr. . Ge Hong's (c. 320 CE) Baopuzi contains classical discussions of bigu techniques. For instance, chapter 6, \"The Meaning of 'Subtle'\" (), equates grain avoidance with the supernatural abilities of a xian transcendent. Therefore, by giving up starches one can become immune to weapons, exorcize demons, neutralize poisons, and cure illnesses. On entering a mountain, he can render savage beasts harmless. When he crosses streams, no harm will be done to him by dragons. There will be no fear when plague strikes; and when a crisis or difficulty suddenly arises, you will know how to cope with it. (6 ) Chapter 15, \"Miscellanea\" (), describes \"avoiding grains\" in terms that Campany says are \"tantamount to not eating food at all\" and \"merely swallowing saliva and qi and ingesting medicinal preparations to suppress appetite and strengthen the body.\" The chapter begins with the interlocutor asking about duangu \"cutting off grains\" and changsheng \"longevity\" (meaning \"eternal life\" in Daoist terminology). \"I should like to inquire whether a man can attain Fullness of Life by merely dispensing with starches. How many methods for this are there altogether, and which is the best?\" Ge Hong gives a lengthy answer, citing both personal observations and textual records. Practitioners medicinally used huangqing \"yellow essence\" (\"polygonatum; Solomon's Seal\") and yuyu \"Yu's leftover grain\" (\"limonite\"). By dispensing with starches a man can only stop spending money on grains, but by that alone he cannot attain Fullness of Life. When I inquired of people who had been doing without starches for a long time, they replied that they were in better health than when they were eating starches. When they took thistle and nibbled mercury and when they also took pills of brown hematite twice a day, this triple medication produced an increase in breaths, so that they gained the strength to carry loads on long trips, for their bodies became extremely light in weight. One such full treatment protected the patients' inner organs for five to ten years, but when they swallowed their breaths, took amulets, or drank brine, only loss of appetite resulted, and they did not have the strength for hard work. The Taoist writings may say that if one wishes Fullness of Life the intestines must be clean, and if immortality is desired the intestines must be without feces; but they also say that those eating greens will be good walkers, but at the same time stupid; that those eating meat will be very strong, and also brave. Those eating starches will be wise, but they will not live to an old age, while those eating breath will have gods and spirits within them that never die. This last, however, is only a biased claim advanced by the school that teaches the circulation of breaths. One has no right to claim to use this method exclusively. If you wish to take the great medicines of gold or cinnabar, they will act more quickly if you fast for the preceding hundred days or so. If you cannot fast that long, take them straightway; this will do no great harm, but it will take more time to acquire geniehood. (15 ) Warning that abandoning grains is difficult \u2013 \"If you consider it inconvenient to break with the world, abandon your household, and live high on a peak, you will certainly not succeed\" \u2013 Ge Hong notes the popularity of alternative dietary techniques. If you would not distress yourself, it is best not to dispense with starches but merely to regulate the diet, for which there are about a hundred methods. Sometimes, after a few dozen pills of interior-protecting medicines have been taken, it is claimed that appetite is lost for forty or fifty days. (Other times, one or two hundred days are claimed, or the pills must be taken for days or months.) Refined pine and cypress as well as thistle can also protect the interior, but they are inferior to the great medicines, and last only ten years or less. At other times, fine foods are first prepared and consumed to utter satiation, and then medicines are taken to nurture the things that have been eaten, so that they may not be digested. This is claimed to remain valid for three years. If you then wish to revert to the eating of starches, it is necessary to start by swallowing mallows and lard, so that the fine food you prepared will pass from you undigested. (15 ) Ge Hong chronicles the effects of grain avoidance. I have personally observed for two or three years men, who were foregoing starches, and in general their bodies were slight and their complexions good. They could withstand wind, cold, heat, or dampness, but there was not a fat one among them. I admit that I have not yet met any who had not eaten starches in several decades, but if some people cut off from starches for only a couple of weeks die while these others look as well as they do after years, why should we doubt that the (deliberate) fasting could be prolonged still further? If those cut off from starches grow progressively weaker to death, one would normally fear that such a diet simply cannot be prolonged, but inquiry of those pursuing this practice reveals that at first all of them notice a lessening of strength, but that later they gradually get stronger month by month and year by year. Thus, there is no impediment to the possibility of prolongation. All those who have found the divine process for attaining Fullness of Life succeeded by taking medicines and swallowing breath; on this they are all in perfect agreement. A moment of crisis, however, generally occurs at an early stage when medicines are being taken and starches abandoned and it is only after forty days of progressive weakening, as one uses only holy water and feeds solely on breath, that one regains strength. (15 ) This \"holy water\" refers to a Daoist fu \"talisman\" dissolved in water. Ge Hong further cites an Eastern Wu historical example to show that drinking holy water cannot prevent death. When Emperor Jing of Wu (r. 258-264) heard about Shi Chun , a Daoist healer \"who would not eat in order to hasten the cure when he was treating a sick person,\" he exclaimed, \"In a short time this man is going to starve to death.\" Then he had him locked up and guarded, and all that Shih Ch'un requested was two or three quarts of water for making holy water. It went on like this for more than a year, while his complexion became ever fresher and his strength remained normal. The emperor then asked him how much longer he could continue like this, and Shih Ch'un replied that there was no limit; possibly several dozen years, his only fear being that he might die of old age, but it would not be of hunger. The emperor then discontinued the experiment and sent him away. Note that Shih Ch'un's statement shows that giving up starches cannot protract one's years. Some today possess Shih Ch'un's method. (15 ) In the Baopuzi, Ge Hong criticizes contemporary charlatans who claimed to have duangu \"cut off grains\". I have also frequently seen ignorant processors who, wishing to boast and amaze and acquire a reputation for not eating when they really knew nothing about such procedures, merely claimed not to eat gruel. Meanwhile, they would drink more than a gallon of wine daily, and dried meats, puddings, jujubes, chestnuts, or eggs were never out of their mouths. Sometimes they would eat large quantities of meat \u2013 several dozen pounds daily \u2013 swallowing its juices and spitting out anything that was unpleasant. This, however, is actually feasting. Wine drinkers will eat dried meats with their wine but not starches, and they can keep this up for six months to a year without stumbling or falling. Never yet, however, have they claimed that this was \"cut off from starches!\" (15 ) The (c. 4th-5th century) Taishang Lingbao Wufuxu \"Explanations of the Five Numinous Treasure Talismans\", attributed to the Han Daoist Lezichang , gives instructions for practicing bigu, swallowing saliva, and ingesting the \"five wonder plants\" (pine resin, sesame, pepper, ginger, and calamus). This \"Explanations\" text includes the (c. 280) Lingbao wufu jing \"Scripture of the Five Numinous Treasure Talismans\", which says: The Third Immortal King told the Emperor: In the old days I followed a dietetic regimen and attained immortality. My teacher made me increase the sweet spring in my mouth and swallow it in accordance with the following incantation: \"The white stones, hard and rocky, are rolling on and on. The gushing spring, bubbling and pervasive, becomes a thick juice. Drink it and attain long life \u2013 Longevity forever longer!\" These twenty-two words\u2014you should follow them! If you can actually do this and nourish on the True One without stopping, swallow from your flowery pond without interruption, then your inner energy will grow and remain strong, never to be weakened. You attain the Tao by avoiding all grains. You will never again have to follow the rhythm of the moon and plant or harvest. Now, the people of mysterious antiquity, they reached old age because they remained in leisure and never ate any grains. As the Dayou zhang [] (Verse of Great Existence) says: \"The five grains are chisels cutting life away, making the five organs stink and shorten our spans. Once entered into our stomach, there's no more chance to live quite long. To strive for complete avoidance of all death, keep your intestines free of excrement!\" Tr. . Campany uses internalism and externalism to analyze how early texts justified the idea that shiqi \"eating qi\" is better than shigu \"eating grains\". For examples , \"We eat X because X makes us live long\" is an internalist rationale based upon essential properties or benefits; \"We eat X and not Y, which is what those other people eat\" is an externalist claim based upon cultural stereotypes. After comprehensive analysis of how early texts describe \"grain\" (i.e., \"mainstream food\") avoidance, from the (c. 320 BCE) Zhuangzi to the (c. 320 CE) Baopuzi, Campany concludes the (c. 280 CE) Lingbao wufu jing is the earliest passage \"in which grains are attacked as a food source based on what we might call negative internalist reasons\u2014that is, on the grounds that they cause actual harm to the body in specific, theorized ways.\" Before the 3rd century, Chinese classical texts did not claim that \"grains\" actually harm the body, they argued that \" qi and other more refined substances, when ingested and circulated in esoterically prescribed ways, give superior and (for some texts at least) longevity-inducing nourishment.\" One of the striking things about the texts we have reviewed is that most of them offer very little by way of an internalist critique of grains or other everyday foods. That is, they all recommend avoiding grains and offer what they tout as superior alternatives, but on the question of precisely why grains are such inferior nourishment they have little or nothing to say. What little internalist critique we do find comes quite late \u2014 apparently Eastern Han at the earliest \u2014 and does not seem well developed: ordinary foods, described as rotten and smelly, impurify a body that must be brought into qi-based resonance with heaven. This impurity is located specifically in the intestines. [\u2026] In most discussions, then, it is not that prescribers and practitioners of transcendence arts portrayed ordinary food as harmful; it is rather that they had what they considered superior alternatives to offer. [\u2026 But,] why these diets of qi or of rare herbs and minerals should be regarded as superior to one of ordinary food is a question that very often remains unanswered; we are merely, but repeatedly and in diverse ways, told that they are superior. Echoing Claude L\u00e9vi-Strauss, Campany suggests that grains, inexorably linked with all their cultural and institutional symbolisms, were \"good to oppose\" rather than being seen as intrinsically \"bad to eat.\" One of the major reasons for consuming wild plants and exotic foods was the inherent contrast with eating everyday \"grains\". The avoidance of \"grain\" signifies the Daoist rejection of common social practices. According to Kohn , \"It is a return to a time in the dawn of humanity when there were as yet no grains; it is also a return to a more primitive and simple way of eating.\" Daoist bigu practices created excuses to quit the agricultural-based Chinese society in which grains were necessary for basic food, ancestral sacrifices, and tax payments. The \"cutting off\" of grains, which were the basic staple food for the peasants, was also a rejection of their sedentary life and the peasant condition as such. This refusal should not solely be interpreted in the light of the miseries endured by farmers, but also in a much more fundamental way. Agriculture has occasioned, since Neolithic times, a radical break with the way of life that prevailed for almost the entire prehistory of humankind. Agriculture has also been the main culprit of the imbalances of human civilization over the last ten thousand years or so: the systematic destruction of the natural environment, overpopulation, capitalization, and other evils that result from sedentariness. Grain abstention was prerequisite for the Daoist practice of yangxing \"nourishing the inner nature\". Maspero explains. Nourishing the Vital Principle consists in suppressing the causes of death and creating in oneself the immortal body which will replace the mortal body. The causes of death are especially the Breath of Grains and the Breath of Bloody Food: hence the alimentary regimens which are designated by the generic name Abstinence from Grains. One must succeed in replacing vulgar food with the Food of the Breath, like an aerophagia which consists of breathing air in, holding it in as long as possible without allowing it to escape and, while it is held in, making it pass, in identical mouthfuls with great gulps of water, from the trachea into the esophagus, so that it can be sent on into the stomach like real food. The body is made of Breaths, like all things; but it is made of coarse breaths, whereas air is a light, subtle and pure Breath. Vulgar food, after digestion, supplies the body with the Breaths of the Five Flavors, common and impure Breaths which make it heavy. By contrast, Food of the Breath little by little replaces the coarse matter of the body with light, pure Breaths; and when the transformation is completed, the body is immortal. Some versions of \"grain avoidance\" could result in health problems, as discussed by Maspero. This very severe diet was not without its painful moments. Without grains and meat, whoever practices it is undernourished; and the Taoist authors admit that at the beginning one may have numerous troubles, some of them general (vertigo, weakness, sleepiness, difficulties in moving), others local (diarrhea, constipation, and so on). Nevertheless, they advise persevering, insisting that these disappear after several weeks and that the body soon feels as before, and even better: more calm and more at ease. They also advise practicing it only gradually, and they recommend a number of drugs for the period of transition and adaptation which, according to them, lasts thirty to forty days. The recipes for drugs to help in the practice of Abstention from Cereals are numerous: ginseng, cinnamon, pachyma cocos [i.e., Fu Ling], sesame, digitalis, licorice, and all the traditional Chinese tonics play a preponderant role in them. Chinese Buddhism adopted Daoist grain abstention as a preparation for self-immolation. For instance , the monk Huiyi (d. 463), who vowed to burn his body in sacrifice to the Buddha, began preparations by queli \"abstaining from grains\" (eating only sesame and wheat) for two years, then consumed only oil of thyme, and finally ate only pills made of incense. Although Emperor Xiaowu of Liu Song (r. 453\u2013464) tried to dissuade Huiyi, he publicly immolated himself in a cauldron full of oil, wearing an oil-soaked cap to act as a wick, while chanting the Lotus Sutra. Avoiding grains was the primary medical cure for eliminating the sanshi \"Three Corpses\" or sanchong \"Three Worms\", which are evil spirits believed to live in the human body and hasten death. Livia Kohn describes the Three Corpses as \"demonic supernatural creatures who feed on decay and are eager for the body to die altogether so they can devour it. Not only do they thus shorten the lifespan but they also delight in the decaying matter produced by the grains as they are digested in the intestines. If one is to attain long life, the three worms have to be starved, and the only way to do so is to avoid all grain.\" Traditional Chinese medicine links the mythological Three Corpses/Worms with the intestinal jiuchong \"Nine Worms\", which \"correspond to parasites such as roundworms or tapeworms, weaken the host's body and cause a variety of physical symptoms\" . The Three Corpses allegedly enter the human body at birth, and reside in the Upper, Middle, and Lower Dantian \"Cinnabar Fields\" within the brain, heart, and abdomen, respectively. After their host dies, they become ghosts and are free to roam about stealing sacrificial offerings. These pernicious corpse-worms seek to harm both their host's body and fate. First, they weaken the bodily Dantian energy centers. Second, the Three Corpses keep records or their host's misdeeds, ascend to tian \"heaven\" bimonthly on the Chinese sexagenary cycle day gengshen \"57th of the 60\", and file reports to the Siming \"Director of Destinies\" who assigns punishments to shorten the host's lifespan. Forgenghsen days, the (4th century) Huangtingjing \"Yellow Court Scripture\" Tr. . says, \"Do not sleep either day or night, and you shall become immortal.\" In addition to the Three Corpses making a bimonthly report to the Director of Fate, the Baopuzi records the Hearth God making one. It is also said that there are Three Corpses in our bodies, which, though not corporeal, actually are of a type with our inner, ethereal breaths, the powers, the ghosts, and the gods. They want us to die prematurely. (After death they become a man's ghost and move about at will to where sacrifices and libations are being offered.) Therefore, every fifty-seventh day of the sixty-day cycle they mount to heaven and personally report our misdeeds to the Director of Fates. Further, during the night of the last day of the month the hearth god also ascends to heaven and makes an oral report of a man's wrongs. For the more important misdeeds a whole period of three hundred days is deducted. For the minor ones they deduct one reckoning, a reckoning being three days. Personally, I have not yet been able to determine whether this is really so or not, but that is because the ways of heaven are obscure, and ghosts and gods are hard to understand. (6 ) Bigu abstinence from grains and cereals, which allegedly makes the Three Corpses waste away, is the basis for many Daoist dietetic regimens, which can also exclude wine, meat, onion, and garlic. The Jinjian yuzi jing \"Classic of Jade Characters on Slips of Gold\" specifies,Tr.. \"Those who, in their food, cut off cereals must not take wine, nor meat, nor plants of the five strong flavors; they must bathe, wash their garments, and burn incense.\" Practicing bigu alone cannot eliminate the Three Corpses, but will weaken them to the point where they can be killed with alchemical drugs, particularly cinnabar . Early Daoist texts and traditions portray the Three Corpses in both \"zoomorphic and bureaucratic metaphors\" . The (4th century CE) Ziyang zhenren neizhuan \"Inner Biography of the True Person of Purple Yang\" Tr.. described them living in the Three Cinnabar Fields. Q\u012bngg\u01d4 \"Old Blue\" dwells in the Muddy Pellet Palace within the Upper Dantian, \"It is he who makes men blind, or deaf, or bald, who makes the teeth fall out, who stops up the nose and gives bad breath.\" B\u00e1i g\u016b \"White Maiden\" dwells in the Crimson Palace within the Middle Field, \"She causes palpitations of the heart, asthma, and melancholy.\" Xu\u00e8 sh\u012b \"Bloody Corpse\" dwells in the Lower Dantian, \"It is through him that the intestines are painfully twisted, that the bones are dried out, that the skin withers, that the limbs have rheumatisms...\" Compare the (9th century) Chu sanshi jiuchong baosheng jing \"Scripture on Expelling the Three Corpses and Nine Worms to Protect Life\" description. The upper corpse, P\u00e9ng j\u016b , lives in the head. Symptoms of its attack include a feeling of heaviness in the head, blurred vision, deafness, and excessive flow of tears and mucus. The middle corpse, P\u00e9ng z\u00e0n , dwells in the heart and stomach. It attacks the heart, and makes its host crave sensual pleasures. The lower corpse, P\u00e9ng ji\u01ceo , resides in the stomach and legs. It causes the Ocean of Pneuma \u2026 to leak, and makes its host lust after women. Tr. . This text's woodblock illustrations depict the upper corpse as a scholarly man, the middle as a short quadruped, and the lower corpse as \"a monster that looks like a horse's leg with a horned human head\" .Tr.. Famine foods Famine food plants, which are not normally considered as crops, are consumed during times of extreme poverty, starvation, or famine. Bigu diets were linked with mountain wilderness areas in which one relied upon non-grain foods, including famine foodstuffs and underutilized crops. Despeux said, \"Abstention from cereals should also be situated in the historical context of social unrest and famine.\" The Mouzi Lihuolun introduction describes people who fled China after the death of Emperor Ling of Han and moved south to Cangwu in Jiaozhou (present day Tonkin). It happened that, after the death of Emperor Ling (189 C.E.), the world was in disorder. Since only Chiao-chou [a colonial district in the far south] remained relatively peaceful, otherworldly people from the north came en masse and settled there. Many of them practiced the methods of the spirit immortals, abstaining from grains to prolong life. These methods were popular then, but Mou-tzu unceasingly refuted them by employing the Five Classics, and none among the Taoist adepts or the Magicians dared engage him in debate. (1 )Tr. . These refutations of grain avoidance are found in Mouzi Lihuolun Article 30. The Baopuzi discussion of grain abstention notes, Should you take to the mountains and forests during political troubles, you will avoid dying of starvation by observing the rule about starches. Otherwise, do not rush into this practice, for rushing cannot be very beneficial. If you dispense with meat while living among others, you will find it impossible not to desire it deep in your heart when you smell its fat or freshness. (15 ) Schipper uses medical terminology to explain grain avoidance. One can advance positive explanations for this belief, and the practice that derives from it, if one thinks, for example, of the relative abundance of feces produced by cereals as compared to that produced by a diet of meat. The conclusion of recent studies on the harmful effect of excessive amounts of carbohydrates in the form of sugar and bread, have led some to see the Taoist abstinence from cereals as the result of an ancient empiricism in matters of diet. Some contemporary researchers are clinically investigating bigu fasting. References Footnotes Further reading", "edit_actions": [{"type": "R", "before": "dictionaries (e", "after": "dictionariesE", "start_char_pos": 534, "end_char_pos": 549}, {"type": "D", "before": "Liang", "after": null, "start_char_pos": 555, "end_char_pos": 560}, {"type": "R", "before": "Chang 1971, Lin 1972)", "after": ", .", "start_char_pos": 561, "end_char_pos": 582}, {"type": "D", "before": "(1912)", "after": null, "start_char_pos": 794, "end_char_pos": 800}, {"type": "D", "before": "(1931)", "after": null, "start_char_pos": 911, "end_char_pos": 917}, {"type": "D", "before": "(1971)", "after": null, "start_char_pos": 1003, "end_char_pos": 1009}, {"type": "D", "before": "(1972)", "after": null, "start_char_pos": 1071, "end_char_pos": 1077}, {"type": "D", "before": "(2003)", "after": null, "start_char_pos": 1154, "end_char_pos": 1160}, {"type": "D", "before": "(2010)", "after": null, "start_char_pos": 1226, "end_char_pos": 1232}, {"type": "D", "before": "(2008:233)", "after": null, "start_char_pos": 1273, "end_char_pos": 1283}, {"type": "R", "before": "(tr. Major et al. 2010:775):", "after": ":Tr. .", "start_char_pos": 1825, "end_char_pos": 1853}, {"type": "D", "before": "(2005:70 and 191-192)", "after": null, "start_char_pos": 2845, "end_char_pos": 2866}, {"type": "R", "before": ", tr. Major et al. 2010:766-767)", "after": ")Tr. .", "start_char_pos": 3705, "end_char_pos": 3737}, {"type": "D", "before": "(Campany 2005:10-13)", "after": null, "start_char_pos": 3943, "end_char_pos": 3963}, {"type": "D", "before": "(Campany 2005:16)", "after": null, "start_char_pos": 4251, "end_char_pos": 4268}, {"type": "R", "before": ", tr. Campany 2005:15)", "after": ")Tr. .", "start_char_pos": 4839, "end_char_pos": 4861}, {"type": "D", "before": "(2005:16)", "after": null, "start_char_pos": 5185, "end_char_pos": 5194}, {"type": "R", "before": "(tr. Mair 1994:149)", "after": "Tr. .", "start_char_pos": 6186, "end_char_pos": 6205}, {"type": "R", "before": "(tr. Campany 2005:7-8)", "after": "Tr. .", "start_char_pos": 7116, "end_char_pos": 7138}, {"type": "D", "before": "(1977:42)", "after": null, "start_char_pos": 7156, "end_char_pos": 7165}, {"type": "D", "before": "(Schipper 1993:168)", "after": null, "start_char_pos": 7957, "end_char_pos": 7976}, {"type": "D", "before": "(Campany 2005:21)", "after": null, "start_char_pos": 8415, "end_char_pos": 8432}, {"type": "D", "before": "(2005:24)", "after": null, "start_char_pos": 9375, "end_char_pos": 9384}, {"type": "R", "before": ", tr. Mair 1994:6-7)", "after": ")Tr. .", "start_char_pos": 10003, "end_char_pos": 10023}, {"type": "D", "before": "(1981:417)", "after": null, "start_char_pos": 10049, "end_char_pos": 10059}, {"type": "R", "before": "(tr. by Harper 1998:305-9).", "after": ".", "start_char_pos": 10543, "end_char_pos": 10570}, {"type": "R", "before": "text (tr. Campany 2005:31)", "after": "textTr. .", "start_char_pos": 10812, "end_char_pos": 10838}, {"type": "R", "before": ", tr. Major et al. 2010:161)", "after": ")Tr. .", "start_char_pos": 11099, "end_char_pos": 11127}, {"type": "D", "before": ", tr. Watson 1993 1:113; cf. Y\u00fc 1965:92", "after": null, "start_char_pos": 11485, "end_char_pos": 11524}, {"type": "D", "before": "(2005:37)", "after": null, "start_char_pos": 12513, "end_char_pos": 12522}, {"type": "R", "before": "(tr.Despeux 2008:233).", "after": ".Tr. .", "start_char_pos": 12999, "end_char_pos": 13021}, {"type": "R", "before": "(Pregadio 2008).", "after": ".Pregadio 2008.", "start_char_pos": 13161, "end_char_pos": 13177}, {"type": "D", "before": "(Yu 1965:115)", "after": null, "start_char_pos": 13421, "end_char_pos": 13434}, {"type": "D", "before": "(tr. Needham 1997:37)", "after": null, "start_char_pos": 13835, "end_char_pos": 13856}, {"type": "R", "before": "(tr. Roth 2004 1:01) Campany (2005:18)", "after": "Campany", "start_char_pos": 14394, "end_char_pos": 14432}, {"type": "R", "before": "(tr. Campany 2005:38) Campany", "after": "Tr. . Campany", "start_char_pos": 16474, "end_char_pos": 16503}, {"type": "R", "before": "(tr. Forke 1907:344),", "after": ",Tr. .", "start_char_pos": 17053, "end_char_pos": 17074}, {"type": "D", "before": "(see Y\u00fc 1965:111)", "after": null, "start_char_pos": 17156, "end_char_pos": 17173}, {"type": "R", "before": "(tr. Forke 1907:344)", "after": "Tr. .", "start_char_pos": 17699, "end_char_pos": 17719}, {"type": "R", "before": "(tr. Forke 1907:347)", "after": "Tr. .", "start_char_pos": 18696, "end_char_pos": 18716}, {"type": "R", "before": "(tr. Forke 1907:524)", "after": "Tr. .", "start_char_pos": 19500, "end_char_pos": 19520}, {"type": "R", "before": "(tr. Y\u00fc 1965:93)", "after": "Tr. .", "start_char_pos": 20066, "end_char_pos": 20082}, {"type": "R", "before": "(tr. Campany 2005:37)", "after": "Tr. .", "start_char_pos": 20688, "end_char_pos": 20709}, {"type": "D", "before": ", tr. Ware 1966:114-5", "after": null, "start_char_pos": 21307, "end_char_pos": 21328}, {"type": "D", "before": "(2005:39)", "after": null, "start_char_pos": 21411, "end_char_pos": 21420}, {"type": "D", "before": ", tr. Ware 1966:243-4", "after": null, "start_char_pos": 23850, "end_char_pos": 23871}, {"type": "D", "before": ", tr. Ware 1966:244", "after": null, "start_char_pos": 25095, "end_char_pos": 25114}, {"type": "D", "before": ", tr. Ware 1966:246-7", "after": null, "start_char_pos": 26528, "end_char_pos": 26549}, {"type": "D", "before": ", tr. Ware 1966:248-9", "after": null, "start_char_pos": 27641, "end_char_pos": 27662}, {"type": "D", "before": ", tr. Ware 1966:248", "after": null, "start_char_pos": 28542, "end_char_pos": 28561}, {"type": "R", "before": "(tr. Kohn 1993:149-150)", "after": "Tr. .", "start_char_pos": 30215, "end_char_pos": 30238}, {"type": "D", "before": "(2005:2)", "after": null, "start_char_pos": 30400, "end_char_pos": 30408}, {"type": "D", "before": "(2005:43)", "after": null, "start_char_pos": 30809, "end_char_pos": 30818}, {"type": "D", "before": "(2005:48)", "after": null, "start_char_pos": 32531, "end_char_pos": 32540}, {"type": "D", "before": "(2005:50)", "after": null, "start_char_pos": 32578, "end_char_pos": 32587}, {"type": "D", "before": "(1993:149)", "after": null, "start_char_pos": 32985, "end_char_pos": 32995}, {"type": "D", "before": "(Schipper 1993:170)", "after": null, "start_char_pos": 34025, "end_char_pos": 34044}, {"type": "D", "before": "(1981:255)", "after": null, "start_char_pos": 35316, "end_char_pos": 35326}, {"type": "D", "before": "(1981:335)", "after": null, "start_char_pos": 36351, "end_char_pos": 36361}, {"type": "D", "before": "(Benn 2007:36-7)", "after": null, "start_char_pos": 36462, "end_char_pos": 36478}, {"type": "D", "before": "(1993:148)", "after": null, "start_char_pos": 37146, "end_char_pos": 37156}, {"type": "D", "before": "(Cook 2008:844)", "after": null, "start_char_pos": 37818, "end_char_pos": 37833}, {"type": "R", "before": "(tr. Schipper 1978:372)", "after": "Tr. .", "start_char_pos": 38595, "end_char_pos": 38618}, {"type": "D", "before": ", tr. Ware 1966:115-6", "after": null, "start_char_pos": 39774, "end_char_pos": 39795}, {"type": "R", "before": "(tr. Maspero 1981:334) specifies,", "after": "specifies,Tr..", "start_char_pos": 40061, "end_char_pos": 40094}, {"type": "D", "before": "(Schipper 1993:167)", "after": null, "start_char_pos": 40426, "end_char_pos": 40445}, {"type": "D", "before": "(Campany 2005:43)", "after": null, "start_char_pos": 40556, "end_char_pos": 40573}, {"type": "R", "before": "(tr.Maspero 1981:332)", "after": "Tr..", "start_char_pos": 40673, "end_char_pos": 40694}, {"type": "R", "before": "(tr. Cook 2008:846)", "after": "Tr. .", "start_char_pos": 41889, "end_char_pos": 41908}, {"type": "R", "before": "(tr.Maspero 1981:333).", "after": ".Tr..", "start_char_pos": 42113, "end_char_pos": 42135}, {"type": "D", "before": "(2008:234)", "after": null, "start_char_pos": 42439, "end_char_pos": 42449}, {"type": "R", "before": ", tr. Keenan 1994:52)", "after": ")Tr. .", "start_char_pos": 43255, "end_char_pos": 43276}, {"type": "R", "before": "30 (Keenan 1994:151-153).", "after": "30.", "start_char_pos": 43350, "end_char_pos": 43375}, {"type": "D", "before": ", tr. Ware 1966:244", "after": null, "start_char_pos": 43811, "end_char_pos": 43830}, {"type": "D", "before": "(Schipper 1993:167)", "after": null, "start_char_pos": 44360, "end_char_pos": 44379}, {"type": "D", "before": "(such as Yan et al. 2002)", "after": null, "start_char_pos": 44410, "end_char_pos": 44435}, {"type": "A", "before": null, "after": "Footnotes", "start_char_pos": 44490, "end_char_pos": 44490}, {"type": "A", "before": null, "after": "Further reading", "start_char_pos": 44491, "end_char_pos": 44491}], "sents_char_pos": [0, 54, 70, 110, 129, 198, 211, 262, 282, 326, 343, 383, 502, 673, 744, 865, 977, 1381, 1395, 1451, 1466, 1523, 1540, 1600, 1642, 1748, 1829, 2055, 2188, 2234, 2324, 2429, 2452, 2463, 2480, 2617, 2710, 2868, 2975, 3127, 3211, 3307, 3417, 3611, 3700, 3827, 3965, 4078, 4106, 4308, 4405, 4591, 4705, 5176, 5343, 5425, 5520, 5556, 5589, 5643, 5828, 5986, 6072, 6185, 6438, 6476, 6547, 6581, 6689, 6732, 6865, 6908, 6989, 7031, 7115, 7297, 7324, 7380, 7399, 7495, 7659, 7956, 8132, 8217, 8296, 8391, 8404, 8551, 8681, 8759, 8870, 9013, 9259, 9374, 9424, 9441, 9618, 9733, 9814, 9896, 9999, 10247, 10363, 10570, 10806, 10978, 11014, 11031, 11049, 11157, 11219, 11290, 11361, 11425, 11490, 11509, 11689, 11945, 12122, 12290, 12414, 12442, 12766, 12849, 13003, 13021, 13177, 13537, 13714, 13763, 13834, 14002, 14105, 14175, 14252, 14326, 14393, 14544, 14792, 14955, 15103, 15268, 15415, 15488, 15675, 15789, 15858, 15909, 15961, 16127, 16163, 16194, 16305, 16378, 16403, 16632, 16797, 16900, 17057, 17175, 17275, 17463, 17641, 17698, 17806, 17911, 18208, 18233, 18311, 18396, 18477, 18653, 18864, 19022, 19138, 19238, 19367, 19635, 20065, 20177, 20281, 20368, 20468, 20527, 20615, 20687, 20790, 20925, 21049, 21111, 21176, 21219, 21312, 21589, 21746, 21850, 21922, 22009, 22082, 22144, 22271, 22432, 22706, 22941, 23103, 23197, 23257, 23412, 23519, 23577, 23715, 23768, 23845, 24124, 24279, 24425, 24678, 24864, 24913, 25090, 25167, 25319, 25411, 25706, 26028, 26093, 26221, 26264, 26523, 26622, 26732, 26962, 27091, 27209, 27329, 27440, 27504, 27596, 27636, 27768, 27974, 28123, 28273, 28310, 28460, 28547, 28858, 29102, 29278, 29345, 29404, 29451, 29652, 29695, 29776, 29897, 30052, 30126, 30386, 30523, 30639, 31084, 31380, 31548, 31753, 32013, 32070, 32204, 32284, 32450, 32530, 32757, 32882, 32966, 33081, 33148, 33320, 33480, 33616, 33766, 34024, 34145, 34163, 34316, 34498, 34876, 34922, 35004, 35137, 35251, 35315, 35419, 35478, 35543, 35754, 35929, 36111, 36350, 36448, 36736, 36943, 37134, 37305, 37456, 37573, 37835, 38015, 38116, 38192, 38246, 38519, 38691, 38822, 39006, 39039, 39155, 39295, 39432, 39514, 39590, 39770, 39992, 40206, 40263, 40677, 40746, 40948, 41439, 41486, 41618, 41681, 41747, 41810, 41842, 41888, 42117, 42135, 42281, 42430, 42560, 42723, 42812, 42971, 43071, 43251, 43375, 43570, 43652, 43806, 43894, 44119, 44359, 44478]}
+{"doc_id": "35768817", "revision_depth": "1", "before_revision": "The virtual world framework (VWF) is a means to connect robust 3D, immersive, entities with other entities, virtual worlds, content and users via web browsers. It provides the ability for client-server programs to be delivered in a lightweight manner via web browsers, and provides synchronization for multiple users to interact with common objects and environments. For example, using VWF, a developer can take video lesson plans, component objects and avatars and successfully insert them into an existing virtual or created landscape (such as EDGE\"US Army's Edge Program Leveraging Bigworld\" or Open Sim), interacting with the native objects and users via a VWF interface. \u201c Virtual World Framework homepage \u201d Even though it has a suggestive name, the VWF is not a virtual world. Nor is it a virtual world generation tool. Can the VWF produce a virtual space and content to fill it? Yes, it can, and it absolutely can be used to provide additional objects and interactions to augment/interact with entities to which it connects. VWF isn\u2019t a simulator. The VWF is meant to extend the use of active client-server simulations in order that they can be accessed via a web browser. It is also meant to add extra dimensions to existing simulations or to create simulation content to add to an existing virtual space (such as MOSES) or a spontaneously generated space. The VWF has the capability to create fully functional simulations but is not meant to be a complete simulator on its own. The United States Department of Defense (DoD) cannot continue to do business as usual. In FY05, the DoD spent $9.1B in Modeling and Simulation related activities. Approximately 40\\% of that budget was used for simulators, war gaming, and modeling.IDA Model & Simulation Study, R. Rolfe and R. Atwell, October 20, 2005 The vision of the VWF is to reduce the funding used to support M&S activities in direct support of pressure to reduce spending and increase efficacy of existing / emerging technology. \u201c Army Goes World of Warcraft to cope with Spending Cuts in M&S Training \u201d The DoD needs a tool to tie together its myriad, stove-piped, specialty simulations solutions. It needs a tool to extend and expand its ability to train an increasing number of personnel across ever-widening distances. DoD stresses a need to reduce and reuse technology and to find more cost-efficient means to provide the most advanced technological and pedagogical systems of training. It \u2019s not just about training DoD personnel however. We are surrounded by immersive, personalized social media and technology (such as Smart Phones, Facebook, Twitter, Pandora Radio, Project Glass and augmented reality sites such as Layar). Traditional education systems do not allow for the pace of information sharing and immersion that media, games and the internet provide to youth on a regular basis and modernization/customization of education is becoming absolutely essential to its effectiveness. \u201c Digital Shift to Augmented Reality in the Classroom \u201d The intersection of technologies and the speed/volume of data delivery create a perfect storm of possibility for this system to provide the most good at the best cost. VWF means a massive savings in preventing redundancy, in linking different systems and in building economies of scale and scope. It means access to unprecedented complexity of training content and a huge flexibility in its delivery. It means faster and more thoroughly trained personnel. It means platform-independent computing solutions for passing any type of data quickly and efficiently. It means highly adaptive, rapid prototypes independent of the platforms which created them. It means staying at the forefront of the computing trends in information sharing. \u201c Towards Platform Independent Adaptive Session Mobility \u201d , ACM Digital Library It means a rapid means of generating customized training solutions. It means spontaneous meeting spaces and a method for delivering increased complexity and speed of intelligence to those who need it. Licensing The framework is licensed under the Apache II license, which essentially states that the user of the software is granted a royalty-free license to use, modify, and sell derivative works of, the software as long as the original license and attribution file(s) are included in the distribution of any and all subsequent works. The original work is licensed \u201cas is\u201d and contains no warranties of any kind. Designers The designers are David A. Smith (computer scientist) (Lockheed Martin Chief Innovation Officer \u2013 project oversight, design, architecture), David Easter (LM Engineer - Development/Architecture), Richard Boyd (Lockheed Martin Virtual world Labs Chief Architect - governance and ecosystem design), Allison Corey (LM Engineer \u2013 development), Scott R. Haynes (LM Engineer - Development), Michael J. Vacirca (LM Engineer - Development), Steven D. Carr (LM Engineer - Development), Cynthia L. Moore (contractor, OSD(P&R) TRS \u2013 design, future specs, governance), Carlton Rosengrant OSD(P&R) TRS \u2013 overall Program Manager, Frank C. DiGiovanni (Director, OSD(P&R)TRS), \u201c Frank C. DiGiovanni, Director, Training Readiness & Strategy \u201d Coles/RDECOM (Edge interfacing), Robert Chadwick (ADL \u2013 code efficiency and applications), and emerging partners as new functions and libraries are proposed. Contributing VWF is posted on github, \u201c Virtual World Framework github \u201d and is open to any and all developers who wish to contribute forks, projects, suggestions or build-outs for the framework. The original creators especially seek major platform developers who wish to add interfacing to their platform for use with VWF, such as MMOs, simulations designers, terrain mapping providers, 3D modeling, virtual landscapes, etc. The paper \"A Virtual World Ecosystem Framework\", presented at the IITSEc conference in 2012, explains the philosophy of contribution to the URL There are many applications available which advertise themselves as Thin Clients or web interfaces. There are no open source development tools in widespread use that interface different entities in a persistent, secure manner using a thin client through web-browsers. \u201c Platform Independent Computing \u201d . This article was written in 2006 and search results display few successful efforts that are not highly specialized, do not involve significant plug-ins, client-side obligations for processing, or lag to date While there are many tools available, many of them are highly specialized and require proprietary software installed on both the client and server side. There are still other tools which produce virtual environments, avatars, and content, but none of the ones known tie them together, spontaneously create interfaces among them or provide seamless communications to all of the entities regardless of their timing and without a heavy burden in bandwidth or processing power for the client. VWF does this and will do more as it continues its evolution. VWF utilizes web sockets and WebGL, directly providing a content link between entities and build 3D objects in the quickest, most efficient manner possible. Other virtual interfacing programs utilize Flash which also provides direct content, but does so in a less efficient manner. Simulations do not take place \u201cin\u201d the Virtual World Framework. The VWF is a tool to help interface different entities. \u201c Virtual World Framework Homepage About section \u201d constructive simulations, in which simulated people operate simulated systems, are stimulated using human inputs. Ostensibly the VWF would provide the interface (via the web) for some or all of these humans who would be inputting data into the system, then would receive the simulation results from the program executing on the server machine/cloud/locally-determined-host, and would display the results in some fashion via web interface. Mozilla Firefox 6.0 onward, Opera 11 onward, Google Chrome 9 onward (native support), Safari 5.1 onward. So far, Internet Explorer does not support WebGL and has not announced any plans to support WebGL. Chrome Frame and IEWebGL plug-ins support WebGL for IE 6.0 onward. \u201cwebGL standards\u201d Most PCs, laptops, and tablets support WebGL capable browsers. Mobile support for WebGL is nascent. Expectations are that current mobile bindings for JavaScript and WebGL are not good enough \u201c WebGL Statistics and the State of WebGL \u201d but there is an Android version of Firefox with WebGL (only about 10\\% of potential users access content via mobile device requiring WebGL support). Opera also supports WebGL on Android platforms. iPhone does not support WebGL yet. Microsoft does not have plans to support WebGL due to security concerns over handshake vulnerabilities. \u201c Microsoft Security Research & Defense Blog 16 June 2011 \u201d There are two plug-ins for Internet Explorer which support WebGL interfaces: Chrome Frame and IEWebGL. It is true that native support tends to run better than plug-in support, and not all security organizations will support the installation of additional plug-ins to web browsers. VWF is available freely and openly on github to any and all persons, regardless of origin. VWF content specifically designed for operations will be negotiated on a case-by-case basis depending on the content, training objectives, and coalition goals being exercised. There is no standing reason why VWF cannot be shared and there are no security restrictions on the original code.As an open source program, there are no restrictions to anyone downloading the original source code \u201c github virtual world framework \u201d", "after_revision": "The virtual world framework (VWF) is a means to connect robust 3D, immersive, entities with other entities, virtual worlds, content and users via web browsers. It provides the ability for client-server programs to be delivered in a lightweight manner via web browsers, and provides synchronization for multiple users to interact with common objects and environments. For example, using VWF, a developer can take video lesson plans, component objects and avatars and successfully insert them into an existing virtual or created landscape (such as EDGE\"US Army's Edge Program Leveraging Bigworld\" or Open Sim), interacting with the native objects and users via a VWF interface. \" Virtual World Framework homepage \" Even though it has a suggestive name, the VWF is not a virtual world. Nor is it a virtual world generation tool. Can the VWF produce a virtual space and content to fill it? Yes, it can, and it absolutely can be used to provide additional objects and interactions to augment/interact with entities to which it connects. VWF is not a simulator. The VWF is meant to extend the use of active client-server simulations in order that they can be accessed via a web browser. It is also meant to add extra dimensions to existing simulations or to create simulation content to add to an existing virtual space (such as MOSES) or a spontaneously generated space. The VWF has the capability to create fully functional simulations but is not meant to be a complete simulator on its own. The United States Department of Defense (DoD) cannot continue to do business as usual. In FY05, the DoD spent $9.1B in Modeling and Simulation related activities. Approximately 40\\% of that budget was used for simulators, war gaming, and modeling.IDA Model & Simulation Study, R. Rolfe and R. Atwell, October 20, 2005 The vision of the VWF is to reduce the funding used to support M&S activities in direct support of pressure to reduce spending and increase efficacy of existing / emerging technology. \" Army Goes World of Warcraft to cope with Spending Cuts in M&S Training \" The DoD needs a tool to tie together its myriad, stove-piped, specialty simulations solutions. It needs a tool to extend and expand its ability to train an increasing number of personnel across ever-widening distances. DoD stresses a need to reduce and reuse technology and to find more cost-efficient means to provide the most advanced technological and pedagogical systems of training. It is not just about training DoD personnel however. We are surrounded by immersive, personalized social media and technology (such as Smart Phones, Facebook, Twitter, Pandora Radio, Project Glass and augmented reality sites such as Layar). Traditional education systems do not allow for the pace of information sharing and immersion that media, games and the internet provide to youth on a regular basis and modernization/customization of education is becoming absolutely essential to its effectiveness. \" Digital Shift to Augmented Reality in the Classroom \" The intersection of technologies and the speed/volume of data delivery create a perfect storm of possibility for this system to provide the most good at the best cost. VWF means a massive savings in preventing redundancy, in linking different systems and in building economies of scale and scope. It means access to unprecedented complexity of training content and a huge flexibility in its delivery. It means faster and more thoroughly trained personnel. It means platform-independent computing solutions for passing any type of data quickly and efficiently. It means highly adaptive, rapid prototypes independent of the platforms which created them. It means staying at the forefront of the computing trends in information sharing. \" Towards Platform Independent Adaptive Session Mobility \" , ACM Digital Library It means a rapid means of generating customized training solutions. It means spontaneous meeting spaces and a method for delivering increased complexity and speed of intelligence to those who need it. Licensing The framework is licensed under the Apache II license, which essentially states that the user of the software is granted a royalty-free license to use, modify, and sell derivative works of, the software as long as the original license and attribution file(s) are included in the distribution of any and all subsequent works. The original work is licensed \"as is\" and contains no warranties of any kind. Designers The designers are David A. Smith (computer scientist) (Lockheed Martin Chief Innovation Officer \u2013 project oversight, design, architecture), David Easter (LM Engineer - Development/Architecture), Richard Boyd (Lockheed Martin Virtual world Labs Chief Architect - governance and ecosystem design), Allison Corey (LM Engineer \u2013 development), Scott R. Haynes (LM Engineer - Development), Michael J. Vacirca (LM Engineer - Development), Steven D. Carr (LM Engineer - Development), Cynthia L. Moore (contractor, OSD(P&R) TRS \u2013 design, future specs, governance), Carlton Rosengrant OSD(P&R) TRS \u2013 overall Program Manager, Frank C. DiGiovanni (Director, OSD(P&R)TRS), \" Frank C. DiGiovanni, Director, Training Readiness & Strategy \" Coles/RDECOM (Edge interfacing), Robert Chadwick (ADL \u2013 code efficiency and applications), and emerging partners as new functions and libraries are proposed. Contributing VWF is posted on github, \" Virtual World Framework github \" and is open to any and all developers who wish to contribute forks, projects, suggestions or build-outs for the framework. The original creators especially seek major platform developers who wish to add interfacing to their platform for use with VWF, such as MMOs, simulations designers, terrain mapping providers, 3D modeling, virtual landscapes, etc. The paper \"A Virtual World Ecosystem Framework\", presented at the IITSEc conference in 2012, explains the philosophy of contribution to the URL There are many applications available which advertise themselves as Thin Clients or web interfaces. There are no open source development tools in widespread use that interface different entities in a persistent, secure manner using a thin client through web-browsers. \" Platform Independent Computing \" . This article was written in 2006 and search results display few successful efforts that are not highly specialized, do not involve significant plug-ins, client-side obligations for processing, or lag to date While there are many tools available, many of them are highly specialized and require proprietary software installed on both the client and server side. There are still other tools which produce virtual environments, avatars, and content, but none of the ones known tie them together, spontaneously create interfaces among them or provide seamless communications to all of the entities regardless of their timing and without a heavy burden in bandwidth or processing power for the client. VWF does this and will do more as it continues its evolution. VWF utilizes web sockets and WebGL, directly providing a content link between entities and build 3D objects in the quickest, most efficient manner possible. Other virtual interfacing programs utilize Flash which also provides direct content, but does so in a less efficient manner. Simulations do not take place \"in\" the Virtual World Framework. The VWF is a tool to help interface different entities. \" Virtual World Framework Homepage About section \" constructive simulations, in which simulated people operate simulated systems, are stimulated using human inputs. Ostensibly the VWF would provide the interface (via the web) for some or all of these humans who would be inputting data into the system, then would receive the simulation results from the program executing on the server machine/cloud/locally-determined-host, and would display the results in some fashion via web interface. Mozilla Firefox 6.0 onward, Opera 11 onward, Google Chrome 9 onward (native support), Safari 5.1 onward. So far, Internet Explorer does not support WebGL and has not announced any plans to support WebGL. Chrome Frame and IEWebGL plug-ins support WebGL for IE 6.0 onward. \"webGL standards\" Most PCs, laptops, and tablets support WebGL capable browsers. Mobile support for WebGL is nascent. Expectations are that current mobile bindings for JavaScript and WebGL are not good enough \" WebGL Statistics and the State of WebGL \" but there is an Android version of Firefox with WebGL (only about 10\\% of potential users access content via mobile device requiring WebGL support). Opera also supports WebGL on Android platforms. iPhone does not support WebGL yet. Microsoft does not have plans to support WebGL due to security concerns over handshake vulnerabilities. \" Microsoft Security Research & Defense Blog 16 June 2011 \" There are two plug-ins for Internet Explorer which support WebGL interfaces: Chrome Frame and IEWebGL. It is true that native support tends to run better than plug-in support, and not all security organizations will support the installation of additional plug-ins to web browsers. VWF is available freely and openly on github to any and all persons, regardless of origin. VWF content specifically designed for operations will be negotiated on a case-by-case basis depending on the content, training objectives, and coalition goals being exercised. There is no standing reason why VWF cannot be shared and there are no security restrictions on the original code.As an open source program, there are no restrictions to anyone downloading the original source code \" github virtual world framework \"", "edit_actions": [{"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 676, "end_char_pos": 677}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 711, "end_char_pos": 712}, {"type": "R", "before": "isn\u2019t", "after": "is not", "start_char_pos": 1036, "end_char_pos": 1041}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1989, "end_char_pos": 1990}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2062, "end_char_pos": 2063}, {"type": "R", "before": "\u2019s", "after": "is", "start_char_pos": 2455, "end_char_pos": 2457}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 2957, "end_char_pos": 2958}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 3011, "end_char_pos": 3012}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 3747, "end_char_pos": 3748}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 3804, "end_char_pos": 3805}, {"type": "R", "before": "\u201cas is\u201d", "after": "\"as is\"", "start_char_pos": 4394, "end_char_pos": 4401}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 5112, "end_char_pos": 5113}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 5175, "end_char_pos": 5176}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 5373, "end_char_pos": 5374}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 5406, "end_char_pos": 5407}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 6173, "end_char_pos": 6174}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 6206, "end_char_pos": 6207}, {"type": "R", "before": "\u201cin\u201d", "after": "\"in\"", "start_char_pos": 7281, "end_char_pos": 7285}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 7371, "end_char_pos": 7372}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 7420, "end_char_pos": 7421}, {"type": "R", "before": "\u201cwebGL standards\u201d", "after": "\"webGL standards\"", "start_char_pos": 8132, "end_char_pos": 8149}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 8341, "end_char_pos": 8342}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 8383, "end_char_pos": 8384}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 8721, "end_char_pos": 8722}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 8779, "end_char_pos": 8780}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 9542, "end_char_pos": 9543}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 9575, "end_char_pos": 9576}], "sents_char_pos": [0, 159, 366, 675, 782, 825, 885, 1031, 1054, 1179, 1364, 1486, 1573, 1649, 1734, 1779, 1988, 2158, 2282, 2451, 2504, 2692, 2956, 3180, 3309, 3413, 3468, 3572, 3664, 3746, 3895, 4028, 4363, 4441, 4549, 4619, 4713, 4776, 4821, 4869, 5334, 5530, 5760, 6004, 6172, 6570, 6906, 6968, 7125, 7250, 7314, 7370, 7535, 7860, 7965, 8064, 8131, 8212, 8249, 8533, 8616, 8720, 8883, 9061, 9152, 9328, 9442]}
+{"doc_id": "36584064", "revision_depth": "1", "before_revision": "Multimedia Studies is an interdisciplinary field of academic discourse focused on the understanding of technologies and cultural dimensions of linking traditional media sources with ones based on new media to support social systems. History Multimedia Studies as a discipline came out of the need for media studies to be made relevant to the new world of CD-ROMs and hypertext in the 1990s. Revolutionary books like Jakob Nielsen's ' Hypertext and Hypermedia ' book lay the foundations for understanding multimedia alongside traditional cognitive science and interface design issues.Nielsen, J. (1990). Hypertext and Hypermedia. Saunders College Publishing/Harcourt Brace. Software like Authorware Attain, now owned by Adobe, made the design of multimedia systems accessible to those unskilled in programming and became major applications by the end of the 1990sSchifman, R.S. (1999). The Ultimate Authorware Tutorial. Springer-Verlag. Recent Challenges The Internet age that has been growing since the launch of Windows 98 has brought new challenges for the discipline including developing new models and rules for the World Wide Web. Areas such as usability have had to develop specific guidelines for Website designNielsen, J. & Tahir, M. (2001). Homepage Usability: 50 Websites Deconstructed. and traditional concepts like genre, narrative theory, and stereotypes have had to be updated to take account of Cyberculture .Herring, S.C., Scheidt, L.A. ; Bonus, S. ; Wright, E. (2004). Bridging the gap: a genre analysis of Weblogs. In: Proceedings of the 37th Annual Hawaii International Conference on System Sciences, 2004.Robinson, K.M. (2001). Unsolicited Narratives from the Internet: A Rich Source of Qualitative Data. Qual Health Res 11 (5), 706-714 Cultural aspects of Multimedia Studies have been conceptualised by authors such as Lev Manovich, Arturo Escobar and Fred Forest. The increase in Internet trolling and so-called Internet addiction has thrown up new problems. Concepts like emotional design Norman , D.A. (2005). Emotional Design: Why We Love (or Hate) Everyday Things. Basic Books. and affective computing Picard , R. (2000). Affective Computing. MIT Press. are driving Multimedia Studies research to consider ways of becoming more seductive and able to take account of the different needs of users. Media Studies 2.0 Some academics, such as David Gauntlett, have preferred the neologism, ' Media Studies 2.0 ' to Multimedia Studies , in order to give it the feel of other fields like Web 2.0 and Classroom 2.0.British Film Institute, Media Studies Conference 2007 , 4\u20136 July 2007Transforming Audiences International Conference, 6\u20137 September 2007Andy Ruddock (2008), 'Media Studies 2.0? Binge Drinking and Why Audiences Still Matter', Sociology Compass, Volume 2 Issue 1 Page 1-15, January 2008.'Towards a Brave New World? The Media Studies 2.0 Debate' , presentation by Geoff Lealand, University of Waikato, at AMES conference, May 2007Blog/forum about Media Studies 2.0 by William Merrin The Media Studies 2.0 neologism has received strong criticism. Andy Medhurst at Sussex University for instance wrote of the Media Studies 2.0 neologism introduced by David Gauntlett, ' Isn't it odd that whenever someone purportedly identifies a new paradigm, they see themselves as already a leading practitioner of it? ' Issues and Concepts Media ecology and Information ecology Cybercultures and New Media Online Communities and Virtual Communities Internet trolling and Internet addiction Captology Universities offering degrees in Multimedia Studies University of the Philippines Open University (Bachelor or Arts in Multimedia Studies ) CIIT College of Arts and Technology URL iAcademy Arizona State University (BS Multimedia Writing & Technical Communication ) Aston University (BSc Multimedia Computing ) Birmingham City University (BSc Multimedia Technology ) University of East London (BSc Multimedia Studies ) Glyndwr University (BA Graphic Design and Multimedia ) University of Mary Hardin-Baylor (BS Multimedia & Information Technology ) Middlesex University (BSc Multimedia Computing ) Robert Gordon University (BSc Multimedia Development ) University of Westminster ( Multimedia Computing )", "after_revision": "Multimedia studies is an interdisciplinary field of academic discourse focused on the understanding of technologies and cultural dimensions of linking traditional media sources with ones based on new media to support social systems. History Multimedia studies as a discipline came out of the need for media studies to be made relevant to the new world of CD-ROMs and hypertext in the 1990s. Revolutionary books like Jakob Nielsen's Hypertext and Hypermedia lay the foundations for understanding multimedia alongside traditional cognitive science and interface design issues.Nielsen, J. (1990). Hypertext and Hypermedia. Saunders College Publishing/Harcourt Brace. Software like Authorware Attain, now owned by Adobe, made the design of multimedia systems accessible to those unskilled in programming and became major applications by the end of the 1990sSchifman, R.S. (1999). The Ultimate Authorware Tutorial. Springer-Verlag. Recent challenges The Internet age that has been growing since the launch of Windows 98 has brought new challenges for the discipline including developing new models and rules for the World Wide Web. Areas such as usability have had to develop specific guidelines for website designNielsen, J. & Tahir, M. (2001). Homepage Usability: 50 Websites Deconstructed. and traditional concepts like genre, narrative theory, and stereotypes have had to be updated to take account of cyberculture .Herring, S.C., Scheidt, L.A. ; Bonus, S. ; Wright, E. (2004). Bridging the gap: a genre analysis of Weblogs. In: Proceedings of the 37th Annual Hawaii International Conference on System Sciences, 2004.Robinson, K.M. (2001). Unsolicited Narratives from the Internet: A Rich Source of Qualitative Data. Qual Health Res 11 (5), 706-714 Cultural aspects of multimedia studies have been conceptualised by authors such as Lev Manovich, Arturo Escobar and Fred Forest. The increase in Internet trolling and so-called Internet addiction has thrown up new problems. Concepts like emotional designNorman , D.A. (2005). Emotional Design: Why We Love (or Hate) Everyday Things. Basic Books. and affective computingPicard , R. (2000). Affective Computing. MIT Press. are driving multimedia studies research to consider ways of becoming more seductive and able to take account of the needs of users. Media studies 2.0 Some academics, such as David Gauntlett, have preferred the neologism, \" Media Studies 2.0 \" to multimedia studies , in order to give it the feel of other fields like Web 2.0 and Classroom 2.0.British Film Institute, Media Studies Conference 2007 , 4\u20136 July 2007Transforming Audiences International Conference, 6\u20137 September 2007Andy Ruddock (2008), 'Media Studies 2.0? Binge Drinking and Why Audiences Still Matter', Sociology Compass, Volume 2 Issue 1 Page 1-15, January 2008.'Towards a Brave New World? The Media Studies 2.0 Debate' , presentation by Geoff Lealand, University of Waikato, at AMES conference, May 2007Blog/forum about Media Studies 2.0 by William Merrin The media studies 2.0 neologism has received strong criticism. Andy Medhurst at Sussex University for instance wrote of the media studies 2.0 neologism introduced by David Gauntlett, \" Isn't it odd that whenever someone purportedly identifies a new paradigm, they see themselves as already a leading practitioner of it? \" Issues and concepts Media ecology and information ecology Cybercultures and new media Online communities and virtual communities Internet trolling and Internet addiction Captology Universities offering degrees in multimedia studies University of the Philippines Open UniversityBachelor or Arts in Multimedia Studies CIIT College of Arts and URL iAcademy Arizona State University (BS multimedia writing & technical communication ) Aston University (BSc multimedia computing ) Birmingham City University (BSc multimedia technology ) University of East London (BSc multimedia studies ) Glyndwr University (BA graphic design and multimedia ) University of Mary Hardin-Baylor (BS multimedia & information technology ) Middlesex University (BSc multimedia computing ) Robert Gordon University (BSc multimedia development ) University of Westminster ( multimedia computing )", "edit_actions": [{"type": "R", "before": "Studies", "after": "studies", "start_char_pos": 11, "end_char_pos": 18}, {"type": "R", "before": "Studies", "after": "studies", "start_char_pos": 252, "end_char_pos": 259}, {"type": "D", "before": "'", "after": null, "start_char_pos": 432, "end_char_pos": 433}, {"type": "D", "before": "' book", "after": null, "start_char_pos": 459, "end_char_pos": 465}, {"type": "R", "before": "Challenges", "after": "challenges", "start_char_pos": 943, "end_char_pos": 953}, {"type": "R", "before": "Website", "after": "website", "start_char_pos": 1204, "end_char_pos": 1211}, {"type": "R", "before": "Cyberculture", "after": "cyberculture", "start_char_pos": 1410, "end_char_pos": 1422}, {"type": "R", "before": "Multimedia Studies", "after": "multimedia studies", "start_char_pos": 1777, "end_char_pos": 1795}, {"type": "R", "before": "design Norman", "after": "designNorman", "start_char_pos": 2005, "end_char_pos": 2018}, {"type": "R", "before": "computing Picard", "after": "computingPicard", "start_char_pos": 2118, "end_char_pos": 2134}, {"type": "R", "before": "Multimedia Studies", "after": "multimedia studies", "start_char_pos": 2192, "end_char_pos": 2210}, {"type": "D", "before": "different", "after": null, "start_char_pos": 2296, "end_char_pos": 2305}, {"type": "R", "before": "Studies", "after": "studies", "start_char_pos": 2328, "end_char_pos": 2335}, {"type": "R", "before": "'", "after": "\"", "start_char_pos": 2411, "end_char_pos": 2412}, {"type": "R", "before": "' to Multimedia Studies", "after": "\" to multimedia studies", "start_char_pos": 2431, "end_char_pos": 2454}, {"type": "R", "before": "Media Studies", "after": "media studies", "start_char_pos": 3017, "end_char_pos": 3030}, {"type": "R", "before": "Media Studies", "after": "media studies", "start_char_pos": 3137, "end_char_pos": 3150}, {"type": "R", "before": "'", "after": "\"", "start_char_pos": 3196, "end_char_pos": 3197}, {"type": "R", "before": "'", "after": "\"", "start_char_pos": 3333, "end_char_pos": 3334}, {"type": "R", "before": "Concepts", "after": "concepts", "start_char_pos": 3346, "end_char_pos": 3354}, {"type": "R", "before": "Information", "after": "information", "start_char_pos": 3373, "end_char_pos": 3384}, {"type": "R", "before": "New Media Online Communities and Virtual Communities", "after": "new media Online communities and virtual communities", "start_char_pos": 3411, "end_char_pos": 3463}, {"type": "R", "before": "Multimedia Studies", "after": "multimedia studies", "start_char_pos": 3548, "end_char_pos": 3566}, {"type": "R", "before": "University (Bachelor", "after": "UniversityBachelor", "start_char_pos": 3602, "end_char_pos": 3622}, {"type": "D", "before": ")", "after": null, "start_char_pos": 3653, "end_char_pos": 3654}, {"type": "D", "before": "Technology", "after": null, "start_char_pos": 3680, "end_char_pos": 3690}, {"type": "R", "before": "Multimedia Writing", "after": "multimedia writing", "start_char_pos": 3733, "end_char_pos": 3751}, {"type": "R", "before": "Technical Communication", "after": "technical communication", "start_char_pos": 3754, "end_char_pos": 3777}, {"type": "R", "before": "Multimedia Computing", "after": "multimedia computing", "start_char_pos": 3802, "end_char_pos": 3822}, {"type": "R", "before": "Multimedia Technology", "after": "multimedia technology", "start_char_pos": 3857, "end_char_pos": 3878}, {"type": "R", "before": "Multimedia Studies", "after": "multimedia studies", "start_char_pos": 3912, "end_char_pos": 3930}, {"type": "R", "before": "Graphic Design and Multimedia", "after": "graphic design and multimedia", "start_char_pos": 3956, "end_char_pos": 3985}, {"type": "R", "before": "Multimedia", "after": "multimedia", "start_char_pos": 4025, "end_char_pos": 4035}, {"type": "R", "before": "Information Technology", "after": "information technology", "start_char_pos": 4038, "end_char_pos": 4060}, {"type": "R", "before": "Multimedia Computing", "after": "multimedia computing", "start_char_pos": 4089, "end_char_pos": 4109}, {"type": "R", "before": "Multimedia Development", "after": "multimedia development", "start_char_pos": 4142, "end_char_pos": 4164}, {"type": "R", "before": "Multimedia Computing", "after": "multimedia computing", "start_char_pos": 4195, "end_char_pos": 4215}], "sents_char_pos": [0, 232, 390, 583, 602, 628, 672, 884, 918, 935, 1135, 1249, 1424, 1454, 1466, 1485, 1532, 1625, 1647, 1724, 1885, 1980, 2033, 2090, 2147, 2168, 2321, 2533, 2818, 2845, 3075, 3332, 3654, 3779]}
+{"doc_id": "36745399", "revision_depth": "1", "before_revision": "Joel Magus P. Navarro (born 1955) is a Filipino-American conductor and music educator. He is one of the Philippines' most esteemed choral conductors. He is also a composer, singer, arranger, choral clinician, writer, producer, music minister, and book editor. Joel Navarro's training as a choral artist began in his grade school years when he sang as a choir boy, first with Prof. Flora Zarco Rivera, who conducted his grade school choir; and then with Dr. Romulo Piza\u00f1a, his maternal uncle, who conducted his church choir. He attributes his musical inclinations to the nurture of very musical parents and relatives who were members of the church choir . Joel Navarro moved to the United States of America in 2001 to do his doctoral studies in music conducting at Michigan State University. He was subsequently hired by Calvin College in Grand Rapids, Michigan in 2002. He became tenured in 2007, and was promoted to full professor in September 2012. Concurrent with his teaching post at the College, he served part-time as Music Minister at Hope Reformed Church, Grand Rapids from 2002-2008. He served part-time as Music Minister of the Basic English Service at Church of the Servant Christian Reformed Church, Grand Rapids, Michigan from 2012-2014. He moved to Singapore in June 2014 to teach and administer the graduate choral conducting program in church music at Singapore Bible College. He is presently Lecturer and Professor of Music . Personal life He is married to the former Maria Divina Amor Pascual (Amy). They have three children: Katrina Rachel, a former English teacher, and works currently as a writer and content specialist in the Philippines; Paolo Emmanuel, an environmental graphic arts designer based in Calgary, Alberta (Canada); and Jerome David, a Civil and Environmental Engineering major at Calvin College in Grand Rapids, Michigan (U.S.A.). He has two grandchildren, Lucia Eliana and Penelope June . He has also earned honor with The Capella of Calvin College . Under his direction, The Capella gave many acclaimed performances regionally and internationally. In 2008, he led the choir to two 3rd prizes at the Floril\u00e8ge Vocal de Tours international choral competition in Tours, France. Since The Capella's inception in 1935, Navarro is only the fourth in the succession of full-time conductors of The Capella after Seymour Swets, Howard Slenk, and Merle Mustert. Dr. Pearl Shangkuan succeeded him in the Fall of 2014 as the fifth conductor and the first female conductor of The Capella. At Calvin College , Navarro also directed the Campus Choir which partners yearly with The Women's Chorale of Calvin College (Pearl Shangkuan, director) in the Advent Service of Lessons and Carols held at the La Grave Christian Reformed Church in downtown Grand Rapids. The third choir he directed was the Calvin Oratorio Society, a community choir composed of students, faculty, alumni, and friends of Calvin College. From 2003-2014, Navarro conducted the annual Handel's Messiah, accompanied by the Calvin Orchestra and which featured professional soloists. He is succeeded by composer-conductor Sean Ivory in both choirs. He currently directs the SBC Canticorum (a community choir) and the SBC Chorale, succeeding his predecessors Rev. Lee Chong Min and Dr. Virginia Tsai. Educator Joel was an assistant professor and a former chair of the Conducting and Choral Ensemble Department at the University of the Philippines College of Music. He served there from 1985-2001. He was also vice-chairman of the Philippine Federation for Choral Music, and was main consultant for the College Choir Category of the National Music Competitions for Young Artists . He also had brief several teaching stints at Santa Isabel University, FEBIAS College of Bible, and at the International School Manila. There, he conducted choirs and taught conducting, music theory, and I.B. Music subjects. He is regularly invited in Southeast Asia to give workshops and seminars in choral conducting, church music and hymnody, Philippine choral music, and choral music in general. In August 2002, he gave a lecture at the World Symposium of Choral Music in Minneapolis, Minnesota. His article The State of Philippine Choral Music Today has been published on the International Choral Bulletin. He contributed a chapter in Dr. Anne Kwantes' book Chapters in Philippine Church History. At Calvin College , Navarro was tenured in 2007 and was promoted to Full Professor of Music in 2012. There he has taught choirs, conducting, and Vocal-Choral Pedagogy. At Singapore Bible College where his current post began in July 2014, Joel is currently a Professor and Lecturer and conducts the SBC Chorale and SBC Canticorum. He also teaches graduate courses in advanced conducting, instrumental conducting, rehearsal technique, choral literature, choral methods, vocal-choral pedagogy, score study and interpretation, and conducting recital. Navarro also teaches for the Bandung Theological Seminary which, in cooperation with SBC, offers the Master of Ministry in Worship and Music Leadership.", "after_revision": "Joel Magus P. Navarro (born 1955) is a Filipino-American conductor and music educator. He is one of the Philippines' most esteemed choral conductors. He is also a composer, singer, arranger, choral clinician, writer, producer, music minister, author, and book editor. Joel Navarro's training as a choral artist began in his grade school years when he sang as a choir boy, first with Prof. Flora Zarco Rivera, who conducted his grade school choir; and then with Dr. Romulo Piza\u00f1a, his maternal uncle, who conducted their church choir. He attributes his musical inclinations to the nurture of very musical parents and relatives . Joel Navarro moved to the United States of America in 2001 to do his doctoral studies in music conducting at Michigan State University. He was subsequently hired by Calvin University in Grand Rapids, Michigan in 2002. He became tenured in 2007, and was promoted to full professor in September 2012. Concurrent with his teaching post at the College, he served part-time as Music Minister at Hope Reformed Church, Grand Rapids from 2002-2008. He served part-time as Music Minister of the Basic English Service at Church of the Servant Christian Reformed Church, Grand Rapids, Michigan from 2012-2014. He moved to Singapore in June 2014 to teach and administer the graduate choral conducting program in church music at Singapore Bible College. He retired from full-time teaching at S.B.C. last November 30, 2020 and moved back to Manila, Philippines where he will teach online courses as an adjunct lecturer . Personal life He is married to the former Maria Divina Amor Pascual (Amy). They have three children: Katrina Rachel, a former English teacher, and works currently as a writer and content specialist in the Philippines; Paolo Emmanuel, an environmental graphic arts designer based in Calgary, Alberta (Canada); and Jerome David, a Civil and Environmental Engineering major at Calvin College in Grand Rapids, Michigan (U.S.A.). He has three grandchildren, Lucia Eliana , Penelope June, and Lily May . He has also earned honor with The Capella of Calvin University . Under his direction, The Capella gave many acclaimed performances regionally and internationally. In 2008, he led the choir to two 3rd prizes at the Floril\u00e8ge Vocal de Tours international choral competition in Tours, France. Since The Capella's inception in 1935, Navarro is only the fourth in the succession of full-time conductors of The Capella after Seymour Swets, Howard Slenk, and Merle Mustert. Dr. Pearl Shangkuan succeeded him in the Fall of 2014 as the fifth conductor and the first female conductor of The Capella. At Calvin University , Navarro also directed the Campus Choir which partners yearly with The Women's Chorale (Pearl Shangkuan, director) in the Advent Service of Lessons and Carols held at the La Grave Christian Reformed Church in downtown Grand Rapids. The third choir he directed was the Calvin Oratorio Society, a community choir composed of students, faculty, alumni, and friends of Calvin College. From 2003-2014, Navarro conducted the annual Handel's Messiah, accompanied by the Calvin Orchestra and which featured professional soloists. He was succeeded by composer-conductor Sean Ivory in both choirs. At S.B.C. he directed the SBC Canticorum (a community choir) and the SBC Chorale, succeeding his predecessors Rev. Lee Chong Min and Dr. Virginia Tsai. While at Singapore, he also conducted the PsalmiDeo Chorale, a choir of Filipino professionals. In 2017, he was selected to be the choirmaster of the Bandung Philharmonic under Maestro Robert Nordling. Educator Joel was an assistant professor and a former chair of the Conducting and Choral Ensemble Department at the University of the Philippines College of Music. He served there from 1985-2001. He was also vice-chairman of the Philippine Federation for Choral Music, and was main consultant for the College Choir Category of the National Music Competitions for Young Artists Foundation, National Music Competitions for Young Artists . He also had brief several teaching stints at Santa Isabel University, FEBIAS College of Bible, and at the International School Manila. There, he conducted choirs and taught conducting, music theory, and I.B. Music subjects. He is regularly invited in Southeast Asia to give workshops and seminars in choral conducting, church music and hymnody, Philippine choral music, and choral music in general. In August 2002, he gave a lecture at the World Symposium of Choral Music in Minneapolis, Minnesota. His article The State of Philippine Choral Music Today has been published on the International Choral Bulletin. He contributed a chapter in Dr. Anne Kwantes' book Chapters in Philippine Church History. In August 2020, his book, INSPIRARE: Breathing Life Into Our Music, A Manual for Church Choir Conductors in Asia, was published by Sonata Music of Singapore. At Calvin University , Navarro was tenured in 2007 and was promoted to Full Professor of Music in 2012. There he has taught choirs, conducting, and Vocal-Choral Pedagogy. At Singapore Bible College where his current post began in July 2014, Joel was Professor and Lecturer and conducted the SBC Chorale and SBC Canticorum. He also taught graduate courses in advanced conducting, instrumental conducting, rehearsal technique, diction, choral literature, vocal literature, choral methods, vocal-choral pedagogy, score study and interpretation, and conducting studio, and conducting recital. Navarro also taught for the Bandung Theological Seminary which, in cooperation with SBC, offers the Master of Ministry in Worship and Music Leadership.", "edit_actions": [{"type": "A", "before": null, "after": "author,", "start_char_pos": 243, "end_char_pos": 243}, {"type": "R", "before": "his", "after": "their", "start_char_pos": 507, "end_char_pos": 510}, {"type": "D", "before": "who were members of the church choir", "after": null, "start_char_pos": 617, "end_char_pos": 653}, {"type": "R", "before": "College", "after": "University", "start_char_pos": 828, "end_char_pos": 835}, {"type": "R", "before": "is presently Lecturer and Professor of Music", "after": "retired from full-time teaching at S.B.C. last November 30, 2020 and moved back to Manila, Philippines where he will teach online courses as an adjunct lecturer", "start_char_pos": 1397, "end_char_pos": 1441}, {"type": "R", "before": "two", "after": "three", "start_char_pos": 1876, "end_char_pos": 1879}, {"type": "R", "before": "and Penelope June", "after": ", Penelope June, and Lily May", "start_char_pos": 1908, "end_char_pos": 1925}, {"type": "R", "before": "College", "after": "University", "start_char_pos": 1980, "end_char_pos": 1987}, {"type": "R", "before": "College", "after": "University", "start_char_pos": 2526, "end_char_pos": 2533}, {"type": "D", "before": "of Calvin College", "after": null, "start_char_pos": 2622, "end_char_pos": 2639}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 3078, "end_char_pos": 3080}, {"type": "R", "before": "He currently directs", "after": "At S.B.C. he directed", "start_char_pos": 3140, "end_char_pos": 3160}, {"type": "A", "before": null, "after": "While at Singapore, he also conducted the PsalmiDeo Chorale, a choir of Filipino professionals. In 2017, he was selected to be the choirmaster of the Bandung Philharmonic under Maestro Robert Nordling.", "start_char_pos": 3291, "end_char_pos": 3291}, {"type": "A", "before": null, "after": "Foundation, National Music Competitions for Young Artists", "start_char_pos": 3669, "end_char_pos": 3669}, {"type": "A", "before": null, "after": "In August 2020, his book, INSPIRARE: Breathing Life Into Our Music, A Manual for Church Choir Conductors in Asia, was published by Sonata Music of Singapore.", "start_char_pos": 4373, "end_char_pos": 4373}, {"type": "R", "before": "College", "after": "University", "start_char_pos": 4384, "end_char_pos": 4391}, {"type": "R", "before": "is currently a", "after": "was", "start_char_pos": 4617, "end_char_pos": 4631}, {"type": "R", "before": "conducts", "after": "conducted", "start_char_pos": 4659, "end_char_pos": 4667}, {"type": "R", "before": "teaches", "after": "taught", "start_char_pos": 4712, "end_char_pos": 4719}, {"type": "A", "before": null, "after": "diction,", "start_char_pos": 4807, "end_char_pos": 4807}, {"type": "A", "before": null, "after": "vocal literature,", "start_char_pos": 4827, "end_char_pos": 4827}, {"type": "A", "before": null, "after": "studio, and conducting", "start_char_pos": 4914, "end_char_pos": 4914}, {"type": "R", "before": "teaches", "after": "taught", "start_char_pos": 4937, "end_char_pos": 4944}], "sents_char_pos": [0, 86, 149, 260, 381, 439, 524, 791, 870, 951, 1093, 1251, 1393, 1443, 1518, 1661, 1752, 1868, 1927, 1989, 2087, 2214, 2391, 2515, 2784, 2933, 3074, 3139, 3290, 3455, 3487, 3671, 3806, 3879, 3895, 4070, 4170, 4282, 4372, 4474, 4541, 4703, 4923]}
+{"doc_id": "37872320", "revision_depth": "3", "before_revision": "Television Dr. Farley Stillwell appears in the 1960s Spider-Man animated series, voiced by Tom Harvey.Tom Harvey, voicechasers.com, retrieved 23 Jan 2010 In the episode \"Never Step on Scorpion\", he is hired by J. Jonah Jameson to transform Mac Gargan into the Scorpion. In \"Sting of the Scorpion\", Scorpion arrives at Stillwell's lab and drinks a serum that increases his strength and size, trashing the lab in the process. Dr. Farley Stillwell makes a cameo appearance in The Amazing Spider-Man episode \"Wolfpack\". His name tag confirms this to be the case. Dr. Farley Stillwell appears in Spider-Man: The Animated , voiced by Michael Rye.Dr. Farley Stillwell, IMDb, retrieved 17 Jan 2010 In \"Sting of the Scorpion\", J. Jonah Jameson hires him to turn Mac Gargan into the Scorpion. Gargan later demands that Stillwell restore him to his former self, only for the scientist to reveal that he is unable to, which leads to him being knocked out and hospitalized. In a flashback in \"Make a Wish\", Stillwell was the scientist that led an experiment involving neogenic research,Ian Hague, Comics and the Senses: A Multisensory Approach to Comics and Graphic Novels, Routledge, 2014, ch. 2: \"Sight, or, the Ideal Perspective and the Physicality of Seeing\". which led to Peter Parker becoming Spider-Man. In \"The Final Nightmare,\" Stillwell is abducted from the hospital by the Scorpion and taken to his lab so that he could reverse Scorpion's mutation using the Neogenic Recombinator, at the same time Spider-Man , Dr. Curt Connors, and Vulture are there. While a fight ensues between Spider-Man, Vulture, and Scorpion, Stillwell plans to destroy the Recombinator more monster like the Scorpion from being created .The fictional item also appeared in Spider-Man Adventures #1 (December 1994). Connors tries to intervene saying that it would help cure him, before transforming into the Lizard and attacking Stillwell . While Spider-Man defeats the Lizard, Stillwell overloads the Recombinator's transfomer, causing it to explode . Stillwell later explains to Connors that neogenic research is too dangerous and states that its secrets will stay with him forever. He then vows to disappear, never to be seen again. Video games An evil female version of Dr. Farley Stillwell appears in the Spider-Man 3 video game, voiced by Nika Futterman. This version is the head of a science corporation called MechaBioCon , and captured the Scorpion when he came to her looking for a way to have his mechanical tail removed. Stillwell then used him as a subject for her experiments invloving military cybernetics and mind control, turning him into a living weaponthat she has carry out her orders. She first appears when ordering Scorpion to break the Rhino out of a prison truck . After Spider-Man defeats Scorpion and frees him from the mind control, the two work together to exact revenge on Stillwell, who has hired Rhino as her bodyguard and taken Dr. Jessica Andrews, Scorpion's love interest, hostage. Upon defeating Rhino with Spider-Man's help, Scorpion saves Dr. Andrews and attempts to kill Stillwell, but is convinced not to do so by Spider-Man and Dr. Andrews , claiming that this will only make him the monster Stillwell wants him tobe . As Scorpion flees, Spider-Man leaves Stillwell for the police . Dr. Farley Stillwell is indirectly mentioned in the 2018 Spider-Man game. In an episode of \"Just the Facts with J. Jonah Jameson\", Jameson blames the scientist for creating the Scorpion even though he paid for the experiment, arguing that he couldn't have known about the scientist's intentions and accusing him of lacking ethics .", "after_revision": "Television Dr. Farley Stillwell appears in the 1960s Spider-Man animated series, voiced by Tom Harvey.Tom Harvey, voicechasers.com, retrieved 23 Jan 2010 In the episode \"Never Step on Scorpion\", he is hired by J. Jonah Jameson to transform Mac Gargan into the Scorpion. In \"Sting of the Scorpion\", Scorpion arrives at Stillwell's lab and drinks a serum that increases his strength and size, destroying the lab in the process. Dr. Farley Stillwell makes a cameo appearance in The Amazing Spider-Man episode \"Wolfpack\". Dr. Farley Stillwell appears in Spider-Man: The Animated Series , voiced by Michael Rye.Dr. Farley Stillwell, IMDb, retrieved 17 Jan 2010 In \"Sting of the Scorpion\", J. Jonah Jameson hires him to turn Mac Gargan into the Scorpion. Gargan later demands that Stillwell restore him to his former self, but the latter reveals he is unable to, which led to him being knocked out and hospitalized. In a flashback in \"Make a Wish\", Stillwell was the scientist that led an experiment involving neogenic research,Ian Hague, Comics and the Senses: A Multisensory Approach to Comics and Graphic Novels, Routledge, 2014, ch. 2: \"Sight, or, the Ideal Perspective and the Physicality of Seeing\". that led to Peter Parker becoming Spider-Man. In \"The Final Nightmare,\" Scorpion abducts Stillwell from the hospital so he can force him to use the neogenic recombinator to change him back, but ends up. After getting into a fight with Spider-Man and Vulture, Stillwell attempts to destroy the machine, but Dr. Curt Connors tries to intervene, only to turn into the Lizard and attack him .The fictional item also appeared in Spider-Man Adventures #1 (December 1994). Though Spider-man defeats him, Stillwell overloads the recombinator's transformer and causes it to explode before disappearing to make sure no one can use his neogenic research again. Video games An evil female version of Dr. Farley Stillwell appears in the Spider-Man 3 video game, voiced by Nika Futterman. This version is the head of a science corporation called MechaBioCon who captured Scorpion when he came to her to have his mechanical tail removed. Stillwell used him as a subject for her experiments in military cybernetics and mind control, turning him into an obedient living weapon. She orders Scorpion to break the Rhino out of a prison transport to become her bodyguard . After Spider-Man defeats Scorpion and frees him from the mind control, the two work together to exact revenge on Stillwell, who has taken Dr. Jessica Andrews, Scorpion's love interest, hostage. Upon defeating Rhino with Spider-Man's help, Scorpion saves Dr. Andrews and attempts to kill Stillwell, but Spider-Man and Dr. Andrews convince him not to . As Scorpion flees, Spider-Man leaves Stillwell for the police .", "edit_actions": [{"type": "R", "before": "trashing", "after": "destroying", "start_char_pos": 391, "end_char_pos": 399}, {"type": "D", "before": "His name tag confirms this to be the case.", "after": null, "start_char_pos": 516, "end_char_pos": 558}, {"type": "A", "before": null, "after": "Series", "start_char_pos": 616, "end_char_pos": 616}, {"type": "R", "before": "only for the scientist to reveal that", "after": "but the latter reveals", "start_char_pos": 852, "end_char_pos": 889}, {"type": "R", "before": "leads", "after": "led", "start_char_pos": 913, "end_char_pos": 918}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 1252, "end_char_pos": 1257}, {"type": "R", "before": "Stillwell is abducted", "after": "Scorpion abducts Stillwell", "start_char_pos": 1325, "end_char_pos": 1346}, {"type": "R", "before": "by the Scorpion and taken to his lab so that he could reverse Scorpion's mutation using the Neogenic Recombinator, at the same time", "after": "so he can force him to use the neogenic recombinator to change him back, but ends up. After getting into a fight with", "start_char_pos": 1365, "end_char_pos": 1496}, {"type": "R", "before": ", Dr. Curt Connors, and Vulture are there. While a fight ensues between Spider-Man, Vulture, and Scorpion, Stillwell plans", "after": "and Vulture, Stillwell attempts", "start_char_pos": 1508, "end_char_pos": 1630}, {"type": "R", "before": "Recombinator more monster like the Scorpion from being created", "after": "machine, but Dr. Curt Connors tries to intervene, only to turn into the Lizard and attack him", "start_char_pos": 1646, "end_char_pos": 1708}, {"type": "R", "before": "Connors tries to intervene saying that it would help cure him, before transforming into the Lizard and attacking Stillwell . While Spider-Man defeats the Lizard, Stillwell overloads the Recombinator's transfomer, causing", "after": "Though Spider-man defeats him, Stillwell overloads the recombinator's transformer and causes", "start_char_pos": 1788, "end_char_pos": 2008}, {"type": "R", "before": ". Stillwell later explains to Connors that neogenic research is too dangerous and states that its secrets will stay with him forever. He then vows to disappear, never to be seen", "after": "before disappearing to make sure no one can use his neogenic research", "start_char_pos": 2023, "end_char_pos": 2200}, {"type": "R", "before": ", and captured the", "after": "who captured", "start_char_pos": 2402, "end_char_pos": 2420}, {"type": "D", "before": "looking for a way", "after": null, "start_char_pos": 2450, "end_char_pos": 2467}, {"type": "D", "before": "then", "after": null, "start_char_pos": 2515, "end_char_pos": 2519}, {"type": "R", "before": "invloving", "after": "in", "start_char_pos": 2562, "end_char_pos": 2571}, {"type": "R", "before": "a living weaponthat she has carry out her orders. She first appears when ordering", "after": "an obedient living weapon. She orders", "start_char_pos": 2628, "end_char_pos": 2709}, {"type": "R", "before": "truck", "after": "transport to become her bodyguard", "start_char_pos": 2754, "end_char_pos": 2759}, {"type": "D", "before": "hired Rhino as her bodyguard and", "after": null, "start_char_pos": 2894, "end_char_pos": 2926}, {"type": "D", "before": "is convinced not to do so by", "after": null, "start_char_pos": 3097, "end_char_pos": 3125}, {"type": "R", "before": ", claiming that this will only make him the monster Stillwell wants him tobe", "after": "convince him not to", "start_char_pos": 3153, "end_char_pos": 3229}, {"type": "D", "before": ". Dr. Farley Stillwell is indirectly mentioned in the 2018 Spider-Man game. In an episode of \"Just the Facts with J. Jonah Jameson\", Jameson blames the scientist for creating the Scorpion even though he paid for the experiment, arguing that he couldn't have known about the scientist's intentions and accusing him of lacking ethics", "after": null, "start_char_pos": 3294, "end_char_pos": 3625}], "sents_char_pos": [0, 102, 269, 423, 515, 558, 641, 783, 961, 1298, 1550, 1710, 1787, 1912, 2024, 2156, 2207, 2332, 2504, 2677, 2988, 3231, 3369]}
+{"doc_id": "37876147", "revision_depth": "1", "before_revision": "Studies have found that the father is a child \u2019 s preferred attachment figure in approximately 5\u201320\\% of cases.Ainsworth, M.D.S. (1967). Infancy in Uganda: Infant care and the growth of attachment.Baltimore: Johns Hopkins University Press.Freeman, H., & Brown, B.B. (2001). Primary attachment to parents and peers during adolescence: Differences by attachment style. Journal of Youth and Adolescence, 30(6), 655\u2013674.Trinke, S.J., & Bartholomew, K. (1997). Hierarchies of attachment relationships in young adulthood. Journal of Social and Personal Relationships, 14(5), 603\u2013625. Fathers and mothers may react differently to the same behaviour in an infant, and the infant may react to the parents \u2019 behaviour differently depending on which parent performs it.Freeman, H., Newland, L.A., & Coyle, D.D. (2010). New directions in father attachment. Early Child Development and Care, 180(1-2), 1-8 Psychoanalytic theory Sigmund Freud postulated that early in life, a young infant \u2019 s primary attachment object would be its mother because the mother fulfills the infant \u2019 s oral desires through feeding.Shaffer, D. (2008). Social and personality development. (6th ed.). Belmont, CA: WADSWORTH CENGAGE Learning. However, he believed that the father begins to play an important role in development when the child enters the phallic stage of development, which generally occurs approximately at the age of three. According to Sigmund Freud, during the phallic stage, children begin to form an incestuous desire for their opposite-sex parent and an antagonistic rivalry with their same-sex parent. The resolution of this stage of development occurs when the child, usually at the age of six, renounces their desire for their opposite-sex parent and begins to identify with their same-sex parent. Temperament The infant \u2019 s temperament can influence the role that the father plays in child rearing. A great deal of research has shown that fathers are less likely to be involved with their infant if the infant has a difficult temperament.Manlove, E. E., & Vernon-Feagans, L. (2002). Caring for infant daughters and sons in dual-earner households: Maternal reports of father involvement in weekday time and tasks. Infant and Child Development, 11, 305\u2013320.McBride, B. A., Schoppe, S. J., & Rane, T. R. (2002). Child characteristics, parenting stress, and parental involvement: Father versus mothers. Journal of Marriage and Family, 64, 998\u20131011.Volling, B., & Belsky, J. (1991). Multiple determinants of father involvement during infancy in dual-earner and single-earner families. Journal of Marriage and the Family, 53, 461\u2013474. Furthermore, one study suggests that this lack of paternal involvement in the case of fussy infants may harm the mother \u2019 s relationship with her child if the mother believes that the paternal care giving role is important.Wong, M. S., Mangelsdorf, S. C., Brown, G. L., Neff, C., & Schoppe-Sullivan, S. J. (2009). Parental beliefs, infant temperament, and marital quality: Associations with infant-mother and infant-father attachment. Journal of Family Psychology, 23, 828 \u2013 838. doi:10.1037/a0016491 Paternal sensitivity Research on whether or not paternal sensitivity has an effect on the security of father-child attachment has produced mixed results. Some studies have shown significant correlations between paternal sensitivity and secure father-child attachments.Cox, M. J., Owen, M. T., Henderson, V. K., & Margand, N. A. (1992). Prediction of infant-father and infant-mother attachment. Developmental Psychology, 28, 474-483Goossens, F. A., & van IJzendoorn, M. H. (1990). Quality of infants' attachments to professional caregivers: Relation to infant-parent attachment and day-care characteristics. Child Development,61, 832-837. One study suggests that a father \u2019 s sensitivity while playing with his child is as important to the child-father attachment relationship as maternal sensitivity during caregiving is for the child-mother attachment relationship.Grossmann, K., Grossmann, K. E., Fremmer-Bombik, E., Kindler, H., Scheuerer-Englisch, H., & Zimmermann, P. (2002). The uniqueness of the child\u2013father attachment relationship: Father \u2019 s sensitive and challenging play as a pivotal variable in a 16-year longitudinal study. Social Development, 11, 301\u2013337. doi:10.1111/1467-9507.00202 Furthermore, one study has found that the harm of a father \u2019 s frightening behaviours on a child \u2019 s future development can be mitigated if the father also has high levels of paternal sensitivity.Hazen, N. L., McFarland, L., Jacobvitz, D., & Boyd-Soisson, E. (2010). Fathers \u2019 frightening behaviours and sensitivity with infants: Relations with fathers \u2019 attachment representations, father-infant attachment, and children \u2019 s later outcomes. Early Child Development and Care, 180, 51\u2013 69. doi:10.1080/03004430903414703 Having a father who is both insensitive and exhibits frightening behaviours during infancy has been linked to emotional under-regulation at the age of two as well as attention problems at the age of seven. However, other studies have failed to find a correlation between paternal sensitivity and infant-father attachment.Easterbrooks, M. A., & Goldberg, W . A. (1984).Toddler development in the family: Impact of father involvement and parenting characteristics. Child Development, 55, 740-752.Grossmann, K., & Grossmann, K. E. (1992). Newborn behavior, the quality of early parenting and later toddler-parent relationships in a group of German infants. In J. K. Nugent, B. M. Lester, &.T. B. Brazelton (Eds.), The cultural context of infancy (Vol. 2, pp. 3-38). Norwood, NJ: Ablex The father \u2019 s own attachment style The level of attachment security that a father had with his parents when he was a child may influence his own child \u2019 s attachment security in the sense that his child may end up having a similar level of attachment security. However, this effect is most likely to occur when the father has sole custody of his child.Bernier, A., & Miljkovitch, R. (2009). Intergenerational transmission of attachment in father\u2013 child dyads: The case of single parenthood. Journal of Genetic Psychology, 170, 31\u201351. The father \u2019 s level of attachment security in his adult relationships may also have an indirect effect on the child-father attachment. This is because fathers who have a secure attachment style in adult relationships tend to have lower levels of parenting stress, lower levels of abuse potential, and a greater amount of knowledge about child development.Howard, K.S. (2010). Paternal attachment, parenting beliefs and children \u2019 s attachment. Early Child Development and Care, 180(1-2), p. 157-171 Lower levels of parenting stress particularly have been found to be correlated with higher levels of attachment security in the father-child attachment relationship. The father \u2019 s beliefs about the importance of paternal caregiving One study has found that whether or not the father \u2019 s beliefs about the importance of paternal caregiving affect the security of the father-child attachment relationship depends on the temperament of the child. Fathers who believe that the paternal caregiving role is important are only more likely to have securely attached infants in the case of very fussy infants. The authors of this study suggest that the reason that this finding is limited to fussy infants could be because difficult children may be more susceptible to both the positive and the negative effects of their rearing environments than non-difficult children.Belsky, J., Bakermans-Kranenburg, M. J., & van IJzendoorn, M. H. (2007). For better and for worse: Differential susceptibility to environmental influences. Current Directions in Psychological Science, 16, 300\u2013304 Spousal factors Two important spousal factors have been found to have a relationship with father-infant attachment security: marital intimacy and supportive co-parenting. In the case of marital intimacy, research has shown that a higher level of marital intimacy is correlated with a more secure father-infant attachment relationship, and that deteriorating marital intimacy is correlated with negative father-child interaction.Belsky J, Youngblade L, Rovine M & Volling B (1991) Patterns of marital change and parent-child interaction. Journal of Marriage and Family 53, 487\u2013498. In terms of supportive co-parenting, one study has found that both observed and self-reported supportive co-parenting predict a more secure father-infant attachment, even after controlling for father sensitivity.Brown, G. L., Schoppe-Sullivan, S. J., Mangelsdorf, S. C., & Neff, C. (2010). Observed and reported supportive coparenting as predictors of infant-mother and infant-father attachment security. Early Child Development and Care, 180, 121\u2013137. doi:10.1080/03004430903415015 This study did not find a correlation between supportive co-parenting and the mother-infant attachment relationship. However, when the infants in this study were divided by gender and analyzed separately, the results were quite different. When the infant was a boy, observed supportive co-parenting was associated with greater mother-infant attachment security and self-reported supportive co-parenting was related to greater father-infant attachment security. When the infant was a girl, supportive co-parenting was related to neither the infant-mother attachment security nor the infant-father attachment security. The authors of this study suggest that one possible explanation for this gender difference is that parents might try to hide their marital conflict more from their daughters than from their sonsCummings, E.M., Davies, P.T., & Simpson, K.S. (1994). Marital conflict, gender, and children \u2019 s appraisals and coping efficacy as mediators of child adjustment. Journal of Family Psychology, 8, 141\u2013149. causing sons to be more sensitive to differences in whether or not their parents engage in supportive co-parenting. Unique properties Generally, research has found that, compared to mothers, fathers tend to fill more of a \u201c play-mate \u201d role for their children, rather than a \u201ccaregiver\u201d role. Various studies have found that fathers are more likely than mothers to encourage risk-taking and exploration in their children by engaging their young children in physical play and initiating games that are both unpredictable and enjoyable.Parke, R.D., & Burielm R. (2006). Socialization in the family: Ethnic and ecological perspectives. In W. Damon & R. M. Lerner (Series Eds.), & N. Eisenberg, (Vol. Ed.), Handbook of child psychology. Vol. 3. Social, emotional, and personality development (6th ed. pp. 429-504). New York: Wiley.Bretherton, I., Lambert, J.D., & Golby, B. (2005). Involved fathers of preschool children as seen by themselves and their wives: Accounts of attachment, socialization, and companionship. Attachment & Human Development, 7, 229\u2013251.Paquette, D. (2004). Theorizing the father\u2013child relationship: Mechanisms and developmental outcomes. Human Development, 47, 193\u2013219.Cabrera, N., Fitzgerald, H.E., Bradley, R.H., & Roggman, L. (2007). Modeling the dynamics of paternal influence on children over the life course. Applied Developmental Science, 11(4), 185\u2013189.Grossmann, K., Grossmann, K.E., Kindler, H., & Zimmermann, P. (2008). A wider view of attachment and exploration: The influence of mothers and fathers on the development of psychological security from infancy to young adulthood. In J. Cassidy and P.R. Shaver (Eds.), Handbook of attachment: Theory, research, and clinical applications (2nd ed., pp. 880\u2013905). New York: Guilford PressNewland, L.A., Coyl, D.D., & Freeman, H.S. (2008). Predicting preschoolers \u2019 attachment security from fathers \u2019 involvement, internal working models, and use of social support. Early Child Development and Care, 178(7&8), 785\u2013801. Most infants tend to prefer contact with their mothers when they are distressed and seeking comfort, and contact with their fathers when they are in more positive emotional states and seeking play.Lamb, M.E. (1997). The role of the father in child development (3rd ed.). New York: Wiley Furthermore, a study on frightening behaviours has suggested that young children may internalize interactions with their mother and father differently in a way that reflects these different roles. The study found that when sensitive fathers engage in frightening behaviours, the paternal sensitivity mitigates the negative effects of frightening behaviours, however, when mothers engage in frightening behaviours, maternal sensitivity does not mitigate the negative effects. Some researchers believe that this occurs because frightening behaviours are more compatible with the father \u2019 s play-mate role than they are with the mother \u2019 s role of providing comfort when the child is distressed. They suggest that it may be more harmful to a child when the person who the child is supposed to go to when distressed is the one who is causing the distress. In fact, these researchers believe that children may respond more positively to frightening behaviours exhibited by the father when their mother is nearby, although this has yet to be proven. Research has shown that fathers, compared to mothers, are less able to detect low levels of infant distress,Hrdy, S.B. (1999). Mother nature: Maternal instincts and how they shape the human species. New York: Ballantine. which may contribute to the mother \u2019 s greater tendency to fulfill more of a \u201ccaregiving\u201d role for the child. However, when fathers are required to act as caregivers for their child, such as in situations when the mother is working, they soon become very capable in fulfilling all of the responsibilities that traditionally belong to the mother, and they even begin to serve as a secure base for their child when the child explores its environment. Secure vs. insecure attachment to father Children who have a secure attachment to their father tend to have improved developmental outcomes in a variety of ways including having improved social abilities with their peers, having fewer problem behaviours, and the paternal effects on developing a greater level of emotional self-regulation are especially significant.Cabrera, N.J., Tamis-LeMonda, C.S., Bradley, R.H., Hofferth, S., & Lamb, M.E. (2000). Fatherhood is the twenty-first century. Child Development, 71. 127-136.Coley, R.L., & Medeiros, B.L. (2007) Reciprocal longitudinal relations between non-resident father involvement and adolescent delinquency. Child Development, 78, 132-147Lieberman, M., Doyle, A.B., & Markiewicz, D. (1999). Developmental patterns of security of attachment to mother and father in late child-hood and early adolescence: Association with peer relations. Child Development, 70, 202-213Pleck, J.H., & Masciadrelli, B.P. (2004). Paternal involvement by U.S. resident fathers: Levels, sources, and consequences. In M.E. Lamb (Ed.), The role of the father in child development, 4th ed. (pp. 222-271). New York: WileyDiener, M., Mangelsdorf, S., McHale, J., & Frosch, C. (1998) Mother-father differences and paternal correlates of infant emotion regulation. Infant Behaviour and Development, 21, pp. 46 Furthermore, one study found that 11\u201313 month old infants who were securely attached to their fathers were more sociable with strangers in the Strange Situation Test.Lamb ME, Hwang CP, Frodi A. Frodi M. (1982). Security of mother- and father-infant attachment and its relation to sociability with strangers in traditional and non-traditional Swedish families. Infant Behavior and Development 5:3.55-367. The mother-infant attachment security, on the other hand, had no effect on sociability with strangers in this study. In addition, having a secure father-child attachment relationship can help compensate for potentially harmful effects resulting from an insecure mother-child attachment relationship.Main, M., & Weston, D.R. (1981). The quality of the toddler \u2019 s relationship to mother and to father: Related to conflict and the readiness to establish new relationships. Child Development, 52, 932-940Verschueren, K., & Marcoen, A. (1999). Representations of self and socioemotional competence in kindergarten: Combined and differential effects of attachment to mother and to father. Child Development, 70, 183-201 Absent father/no attachment One study has found that paternal absence has various negative effects on children.McLanahan, S., & Teitler, J. (1999). The consequences of father absence. In M. E. Lamb (Ed.), Parenting and child development in \u201cnontraditional\u201d families (pp. 83\u2212102). Mahwah: Lawrence Erlbaum Associate Publishers. These negative effects include lower levels of school achievement, heightened risk-taking behaviours, and higher levels of aggression in boys. Another study found that male infants who have little to no interaction with their fathers have significantly lower levels of social responsiveness, fewer secondary circular reactions, and lower levels of preferences for novel stimuli, while female infants were unaffected by the absence of their father.Pedersen, F.A., Rubenstein, J.L., & Yarrow, L.J. (1979). Infant development in father-absent families, Journal of Genetic Psychology, 135:1 p.51-61 This second study, however, only looks at mother-only single-parent families in low socioeconomic circumstances so the results may not be generalizable to the greater population. %DIFDELCMD < %DIFDELCMD < %%% See also", "after_revision": "Studies have found that the father is a child ' s preferred attachment figure in approximately 5\u201320\\% of cases.Ainsworth, M.D.S. (1967). Infancy in Uganda: Infant care and the growth of attachment.Baltimore: Johns Hopkins University Press.Freeman, H., & Brown, B.B. (2001). Primary attachment to parents and peers during adolescence: Differences by attachment style. Journal of Youth and Adolescence, 30(6), 655\u2013674.Trinke, S.J., & Bartholomew, K. (1997). Hierarchies of attachment relationships in young adulthood. Journal of Social and Personal Relationships, 14(5), 603\u2013625. Fathers and mothers may react differently to the same behaviour in an infant, and the infant may react to the parents ' behaviour differently depending on which parent performs it.Freeman, H., Newland, L.A., & Coyle, D.D. (2010). New directions in father attachment. Early Child Development and Care, 180(1-2), 1-8 Psychoanalytic theory Sigmund Freud postulated that early in life, a young infant ' s primary attachment object would be its mother because the mother fulfills the infant ' s oral desires through feeding.Shaffer, D. (2008). Social and personality development. (6th ed.). Belmont, CA: WADSWORTH CENGAGE Learning. However, he believed that the father begins to play an important role in development when the child enters the phallic stage of development, which generally occurs approximately at the age of three. According to Sigmund Freud, during the phallic stage, children begin to form an incestuous desire for their opposite-sex parent and an antagonistic rivalry with their same-sex parent. The resolution of this stage of development occurs when the child, usually at the age of six, renounces their desire for their opposite-sex parent and begins to identify with their same-sex parent. Temperament The infant ' s temperament can influence the role that the father plays in child rearing. A great deal of research has shown that fathers are less likely to be involved with their infant if the infant has a difficult temperament.Manlove, E. E., & Vernon-Feagans, L. (2002). Caring for infant daughters and sons in dual-earner households: Maternal reports of father involvement in weekday time and tasks. Infant and Child Development, 11, 305\u2013320.McBride, B. A., Schoppe, S. J., & Rane, T. R. (2002). Child characteristics, parenting stress, and parental involvement: Father versus mothers. Journal of Marriage and Family, 64, 998\u20131011.Volling, B., & Belsky, J. (1991). Multiple determinants of father involvement during infancy in dual-earner and single-earner families. Journal of Marriage and the Family, 53, 461\u2013474. Furthermore, one study suggests that this lack of paternal involvement in the case of fussy infants may harm the mother ' s relationship with her child if the mother believes that the paternal care giving role is important.Wong, M. S., Mangelsdorf, S. C., Brown, G. L., Neff, C., & Schoppe-Sullivan, S. J. (2009). Parental beliefs, infant temperament, and marital quality: Associations with infant-mother and infant-father attachment. Journal of Family Psychology, 23, 828 \u2013 838. doi:10.1037/a0016491 Paternal sensitivity Research on whether or not paternal sensitivity has an effect on the security of father-child attachment has produced mixed results. Some studies have shown significant correlations between paternal sensitivity and secure father-child attachments.Cox, M. J., Owen, M. T., Henderson, V. K., & Margand, N. A. (1992). Prediction of infant-father and infant-mother attachment. Developmental Psychology, 28, 474-483Goossens, F. A., & van IJzendoorn, M. H. (1990). Quality of infants' attachments to professional caregivers: Relation to infant-parent attachment and day-care characteristics. Child Development,61, 832-837. One study suggests that a father ' s sensitivity while playing with his child is as important to the child-father attachment relationship as maternal sensitivity during caregiving is for the child-mother attachment relationship.Grossmann, K., Grossmann, K. E., Fremmer-Bombik, E., Kindler, H., Scheuerer-Englisch, H., & Zimmermann, P. (2002). The uniqueness of the child\u2013father attachment relationship: Father ' s sensitive and challenging play as a pivotal variable in a 16-year longitudinal study. Social Development, 11, 301\u2013337. doi:10.1111/1467-9507.00202 Furthermore, one study has found that the harm of a father ' s frightening behaviours on a child ' s future development can be mitigated if the father also has high levels of paternal sensitivity.Hazen, N. L., McFarland, L., Jacobvitz, D., & Boyd-Soisson, E. (2010). Fathers ' frightening behaviours and sensitivity with infants: Relations with fathers ' attachment representations, father-infant attachment, and children ' s later outcomes. Early Child Development and Care, 180, 51\u2013 69. doi:10.1080/03004430903414703 Having a father who is both insensitive and exhibits frightening behaviours during infancy has been linked to emotional under-regulation at the age of two as well as attention problems at the age of seven. However, other studies have failed to find a correlation between paternal sensitivity and infant-father attachment.Easterbrooks, M. A., & Goldberg, W . A. (1984).Toddler development in the family: Impact of father involvement and parenting characteristics. Child Development, 55, 740-752.Grossmann, K., & Grossmann, K. E. (1992). Newborn behavior, the quality of early parenting and later toddler-parent relationships in a group of German infants. In J. K. Nugent, B. M. Lester, &.T. B. Brazelton (Eds.), The cultural context of infancy (Vol. 2, pp. 3-38). Norwood, NJ: Ablex The father ' s own attachment style The level of attachment security that a father had with his parents when he was a child may influence his own child ' s attachment security in the sense that his child may end up having a similar level of attachment security. However, this effect is most likely to occur when the father has sole custody of his child.Bernier, A., & Miljkovitch, R. (2009). Intergenerational transmission of attachment in father\u2013 child dyads: The case of single parenthood. Journal of Genetic Psychology, 170, 31\u201351. The father ' s level of attachment security in his adult relationships may also have an indirect effect on the child-father attachment. This is because fathers who have a secure attachment style in adult relationships tend to have lower levels of parenting stress, lower levels of abuse potential, and a greater amount of knowledge about child development.Howard, K.S. (2010). Paternal attachment, parenting beliefs and children ' s attachment. Early Child Development and Care, 180(1-2), p. 157-171 Lower levels of parenting stress particularly have been found to be correlated with higher levels of attachment security in the father-child attachment relationship. The father ' s beliefs about the importance of paternal caregiving One study has found that whether or not the father ' s beliefs about the importance of paternal caregiving affect the security of the father-child attachment relationship depends on the temperament of the child. Fathers who believe that the paternal caregiving role is important are only more likely to have securely attached infants in the case of very fussy infants. The authors of this study suggest that the reason that this finding is limited to fussy infants could be because difficult children may be more susceptible to both the positive and the negative effects of their rearing environments than non-difficult children.Belsky, J., Bakermans-Kranenburg, M. J., & van IJzendoorn, M. H. (2007). For better and for worse: Differential susceptibility to environmental influences. Current Directions in Psychological Science, 16, 300\u2013304 Spousal factors Two important spousal factors have been found to have a relationship with father-infant attachment security: marital intimacy and supportive co-parenting. In the case of marital intimacy, research has shown that a higher level of marital intimacy is correlated with a more secure father-infant attachment relationship, and that deteriorating marital intimacy is correlated with negative father-child interaction.Belsky J, Youngblade L, Rovine M & Volling B (1991) Patterns of marital change and parent-child interaction. Journal of Marriage and Family 53, 487\u2013498. In terms of supportive co-parenting, one study has found that both observed and self-reported supportive co-parenting predict a more secure father-infant attachment, even after controlling for father sensitivity.Brown, G. L., Schoppe-Sullivan, S. J., Mangelsdorf, S. C., & Neff, C. (2010). Observed and reported supportive coparenting as predictors of infant-mother and infant-father attachment security. Early Child Development and Care, 180, 121\u2013137. doi:10.1080/03004430903415015 This study did not find a correlation between supportive co-parenting and the mother-infant attachment relationship. However, when the infants in this study were divided by gender and analyzed separately, the results were quite different. When the infant was a boy, observed supportive co-parenting was associated with greater mother-infant attachment security and self-reported supportive co-parenting was related to greater father-infant attachment security. When the infant was a girl, supportive co-parenting was related to neither the infant-mother attachment security nor the infant-father attachment security. The authors of this study suggest that one possible explanation for this gender difference is that parents might try to hide their marital conflict more from their daughters than from their sonsCummings, E.M., Davies, P.T., & Simpson, K.S. (1994). Marital conflict, gender, and children ' s appraisals and coping efficacy as mediators of child adjustment. Journal of Family Psychology, 8, 141\u2013149. causing sons to be more sensitive to differences in whether or not their parents engage in supportive co-parenting. Unique properties Generally, research has found that, compared to mothers, fathers tend to fill more of a \" play-mate \" role for their children, rather than a \"caregiver\" role. Various studies have found that fathers are more likely than mothers to encourage risk-taking and exploration in their children by engaging their young children in physical play and initiating games that are both unpredictable and enjoyable.Parke, R.D., & Burielm R. (2006). Socialization in the family: Ethnic and ecological perspectives. In W. Damon & R. M. Lerner (Series Eds.), & N. Eisenberg, (Vol. Ed.), Handbook of child psychology. Vol. 3. Social, emotional, and personality development (6th ed. pp. 429-504). New York: Wiley.Bretherton, I., Lambert, J.D., & Golby, B. (2005). Involved fathers of preschool children as seen by themselves and their wives: Accounts of attachment, socialization, and companionship. Attachment & Human Development, 7, 229\u2013251.Paquette, D. (2004). Theorizing the father\u2013child relationship: Mechanisms and developmental outcomes. Human Development, 47, 193\u2013219.Cabrera, N., Fitzgerald, H.E., Bradley, R.H., & Roggman, L. (2007). Modeling the dynamics of paternal influence on children over the life course. Applied Developmental Science, 11(4), 185\u2013189.Grossmann, K., Grossmann, K.E., Kindler, H., & Zimmermann, P. (2008). A wider view of attachment and exploration: The influence of mothers and fathers on the development of psychological security from infancy to young adulthood. In J. Cassidy and P.R. Shaver (Eds.), Handbook of attachment: Theory, research, and clinical applications (2nd ed., pp. 880\u2013905). New York: Guilford PressNewland, L.A., Coyl, D.D., & Freeman, H.S. (2008). Predicting preschoolers ' attachment security from fathers ' involvement, internal working models, and use of social support. Early Child Development and Care, 178(7&8), 785\u2013801. Most infants tend to prefer contact with their mothers when they are distressed and seeking comfort, and contact with their fathers when they are in more positive emotional states and seeking play.Lamb, M.E. (1997). The role of the father in child development (3rd ed.). New York: Wiley Furthermore, a study on frightening behaviours has suggested that young children may internalize interactions with their mother and father differently in a way that reflects these different roles. The study found that when sensitive fathers engage in frightening behaviours, the paternal sensitivity mitigates the negative effects of frightening behaviours, however, when mothers engage in frightening behaviours, maternal sensitivity does not mitigate the negative effects. Some researchers believe that this occurs because frightening behaviours are more compatible with the father ' s play-mate role than they are with the mother ' s role of providing comfort when the child is distressed. They suggest that it may be more harmful to a child when the person who the child is supposed to go to when distressed is the one who is causing the distress. In fact, these researchers believe that children may respond more positively to frightening behaviours exhibited by the father when their mother is nearby, although this has yet to be proven. Research has shown that fathers, compared to mothers, are less able to detect low levels of infant distress,Hrdy, S.B. (1999). Mother nature: Maternal instincts and how they shape the human species. New York: Ballantine. which may contribute to the mother ' s greater tendency to fulfill more of a \"caregiving\" role for the child. However, when fathers are required to act as caregivers for their child, such as in situations when the mother is working, they soon become very capable in fulfilling all of the responsibilities that traditionally belong to the mother, and they even begin to serve as a secure base for their child when the child explores its environment. Secure vs. insecure attachment to father Children who have a secure attachment to their father tend to have improved developmental outcomes in a variety of ways including having improved social abilities with their peers, having fewer problem behaviours, and the paternal effects on developing a greater level of emotional self-regulation are especially significant.Cabrera, N.J., Tamis-LeMonda, C.S., Bradley, R.H., Hofferth, S., & Lamb, M.E. (2000). Fatherhood is the twenty-first century. Child Development, 71. 127-136.Coley, R.L., & Medeiros, B.L. (2007) Reciprocal longitudinal relations between non-resident father involvement and adolescent delinquency. Child Development, 78, 132-147Lieberman, M., Doyle, A.B., & Markiewicz, D. (1999). Developmental patterns of security of attachment to mother and father in late child-hood and early adolescence: Association with peer relations. Child Development, 70, 202-213Pleck, J.H., & Masciadrelli, B.P. (2004). Paternal involvement by U.S. resident fathers: Levels, sources, and consequences. In M.E. Lamb (Ed.), The role of the father in child development, 4th ed. (pp. 222-271). New York: WileyDiener, M., Mangelsdorf, S., McHale, J., & Frosch, C. (1998) Mother-father differences and paternal correlates of infant emotion regulation. Infant Behaviour and Development, 21, pp. 46 Furthermore, one study found that 11\u201313 month old infants who were securely attached to their fathers were more sociable with strangers in the Strange Situation Test.Lamb ME, Hwang CP, Frodi A. Frodi M. (1982). Security of mother- and father-infant attachment and its relation to sociability with strangers in traditional and non-traditional Swedish families. Infant Behavior and Development 5:3.55-367. The mother-infant attachment security, on the other hand, had no effect on sociability with strangers in this study. In addition, having a secure father-child attachment relationship can help compensate for potentially harmful effects resulting from an insecure mother-child attachment relationship.Main, M., & Weston, D.R. (1981). The quality of the toddler ' s relationship to mother and to father: Related to conflict and the readiness to establish new relationships. Child Development, 52, 932-940Verschueren, K., & Marcoen, A. (1999). Representations of self and socioemotional competence in kindergarten: Combined and differential effects of attachment to mother and to father. Child Development, 70, 183-201 Absent father/no attachment One study has found that paternal absence has various negative effects on children.McLanahan, S., & Teitler, J. (1999). The consequences of father absence. In M. E. Lamb (Ed.), Parenting and child development in \"nontraditional\" families (pp. 83\u2212102). Mahwah: Lawrence Erlbaum Associate Publishers. These negative effects include lower levels of school achievement, heightened risk-taking behaviours, and higher levels of aggression in boys. Another study found that male infants who have little to no interaction with their fathers have significantly lower levels of social responsiveness, fewer secondary circular reactions, and lower levels of preferences for novel stimuli, while female infants were unaffected by the absence of their father.Pedersen, F.A., Rubenstein, J.L., & Yarrow, L.J. (1979). Infant development in father-absent families, Journal of Genetic Psychology, 135:1 p.51-61 This second study, however, only looks at mother-only single-parent families in low socioeconomic circumstances so the results may not be generalizable to the greater population. %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 46, "end_char_pos": 47}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 696, "end_char_pos": 697}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 975, "end_char_pos": 976}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1064, "end_char_pos": 1065}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1809, "end_char_pos": 1810}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2738, "end_char_pos": 2739}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3790, "end_char_pos": 3791}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4167, "end_char_pos": 4168}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4377, "end_char_pos": 4378}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4415, "end_char_pos": 4416}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4593, "end_char_pos": 4594}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4671, "end_char_pos": 4672}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4740, "end_char_pos": 4741}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5630, "end_char_pos": 5631}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5771, "end_char_pos": 5772}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 6165, "end_char_pos": 6166}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 6583, "end_char_pos": 6584}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 6831, "end_char_pos": 6832}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 6938, "end_char_pos": 6939}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 9697, "end_char_pos": 9698}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 10030, "end_char_pos": 10031}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 10042, "end_char_pos": 10043}, {"type": "R", "before": "\u201ccaregiver\u201d", "after": "\"caregiver\"", "start_char_pos": 10083, "end_char_pos": 10094}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 11648, "end_char_pos": 11649}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 11683, "end_char_pos": 11684}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 12674, "end_char_pos": 12675}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 12723, "end_char_pos": 12724}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 13390, "end_char_pos": 13391}, {"type": "R", "before": "\u201ccaregiving\u201d", "after": "\"caregiving\"", "start_char_pos": 13432, "end_char_pos": 13444}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 15900, "end_char_pos": 15901}, {"type": "R", "before": "\u201cnontraditional\u201d", "after": "\"nontraditional\"", "start_char_pos": 16496, "end_char_pos": 16512}, {"type": "D", "before": "See also", "after": null, "start_char_pos": 17387, "end_char_pos": 17395}], "sents_char_pos": [0, 111, 136, 197, 239, 273, 366, 416, 455, 515, 577, 758, 807, 844, 1097, 1116, 1152, 1163, 1204, 1403, 1587, 1785, 1887, 2027, 2071, 2201, 2244, 2297, 2387, 2433, 2466, 2568, 2617, 2841, 2931, 3052, 3272, 3387, 3454, 3512, 3598, 3725, 3756, 3985, 4099, 4256, 4514, 4584, 4759, 5042, 5158, 5205, 5299, 5331, 5372, 5490, 5599, 5880, 5972, 6010, 6110, 6153, 6289, 6510, 6530, 6598, 6819, 7098, 7255, 7516, 7588, 7671, 7899, 8157, 8265, 8309, 8522, 8599, 8714, 8909, 9031, 9253, 9409, 9657, 9765, 9923, 10100, 10342, 10375, 10440, 10540, 10618, 10635, 10685, 10821, 10865, 10885, 10966, 10998, 11065, 11143, 11190, 11259, 11418, 11548, 11623, 11749, 11802, 12000, 12018, 12073, 12286, 12564, 12782, 12941, 13133, 13260, 13332, 13464, 13803, 14170, 14255, 14295, 14327, 14465, 14548, 14693, 14765, 14847, 14935, 15091, 15303, 15330, 15347, 15496, 15540, 15657, 15840, 15872, 16011, 16080, 16224, 16367, 16403, 16439, 16535, 16582, 16725, 17030, 17086]}
+{"doc_id": "38008898", "revision_depth": "1", "before_revision": "The genomic epidemiological database for global identification of microorganisms or global microbial identifier (GMI) is a platform for storing whole genome sequencing (WGS) data of microorganisms, for the identification of relevant genes and for the comparison of genomes to detect and track-and-trace infectious disease outbreaks and emerging pathogens. The database holds two types of information: 1) genomic information of microorganisms, linked to, 2) metadata of those microorganism such as epidemiological details. The database includes all genera of microorganisms: bacteria, viruses, parasites and fungi. For genotyping of microorganisms for medical diagnosis, or other purposes, scientists may use a wide variety of DNA profiling techniques, such as PCR, PFGE and MLST . A complication of this broad variety of pre-WGS techniques is the difficulty to standardize between techniques, laboratories and microorganisms, which may be overcome using the complete DNA code of the genome generated by WGS techniques. For straight forward diagnostic identificationthe WGS information of a microbiological sample is fed into a global genomic database and compared using BLAST procedures to the genomes already present in the database. In addition, WGS data may be used to back calculate to the different pre-WGS genotyping methods, so previous collected valuable information is not lost. For the global microbial identifier the genomic information is coupled to a wide spectrum of metadata about the specific microbial clone and includes important clinical and epidemiological information such as the global finding place(s) , treatment options and antimicrobial resistance, making it a general microbiological identification tool. This makes personalized treatment of microbial disease possible as well as real-time tracing systems for global surveillance of infectious diseases for food safety and serving human health. The initiative for building the database arose in 2011 and when several preconditions were met: 1) WGS has become mature and serious alternative for other genotyping techniques, 2) the price of WGS has started falling dramatically and in some cases below the price of traditional identifications, 3) vast amounts of IT resources and a fast Internet have become available, and 4) there is the idea that via a cross sectoral and One Health approach infectious diseases may be better controlled. Starting the second millennium, many microbiological laboratories, as well as national health institutes, started genome sequencing projects for sequencing the infectious agents collections they had in their biobanks. Thereby generating private databases and sending model genomes to global nucleotide databases such as GenBank of the NCBI or the nucleotide database of the EMBL. This created a wealth of genomic information and independent databases for eukaryotic as well as prokaryotic genomes. The need to further integrate these databases and to harmonize data collection, and to link the genomic data to metadata for optimal prevention of infectious diseases, was generally recognized by the scientific community. In 2011, several infectious disease control centers and other organizations took the initiative of a series of international scientific- and policy-meetings, to develop a common platform and to better understand the potentials of an interactive microbiological genomic database. The first meeting was in Brussels, September 2011, followed by meetings in Washington (March 2012) and Copenhagen (February 2013). In addition to experts from around the globe, Intergovernmental Organizations have been included in the action, notably the World Health Organization (WHO) and the World Organization for Animal Health (OIE) . Eric Brown, Food and Drug Administration (FDA) , USA Amy Cawthorne, World Health Organization (WHO) , Switzerland J\u00f8rgen Schlundt, Nanyang Technological University (NTU) , Singapore. David J. Lipman, National Center for Biotechnology Information (NCBI) , USA. Alisdair Wotherspoon, Food Standards Agency (FSA) , United Kingdom. Pathom Sawanpanyalert, Ministry of Public Health (MOPH) , Thailand. David Heyman, Health Protection Agency (HPA) , United Kingdom. Marion Koopmans, Erasmus University Medical Center, Netherlands National Institute for Public Health and the Environment (RIVM) . Masami T. Takeuchi, Food and Agriculture Organization (FAO) Vincenco Caporale, World Organization of Animal Health (OIE) Former members: Steven M. Musser, Food and Drug Administration (FDA) , USA. Angelik Tritscher, World Health Organization (WHO) , Switzerland.", "after_revision": "The genomic epidemiological database for global identification of microorganisms or global microbial identifier is a platform for storing whole genome sequencing data of microorganisms, for the identification of relevant genes and for the comparison of genomes to detect and track-and-trace infectious disease outbreaks and emerging pathogens. The database holds two types of information: 1) genomic information of microorganisms, linked to, 2) metadata of those microorganism such as epidemiological details. The database includes all genera of microorganisms: bacteria, viruses, parasites and fungi. For genotyping of microorganisms for medical diagnosis, or other purposes, scientists may use a wide variety of DNA profiling techniques, such as polymerase chain reaction, pulsed-field gel electrophoresis or multilocus sequence typing . A complication of this broad variety of techniques is the difficulty to standardize between techniques, laboratories and microorganisms, which may be overcome using the complete DNA code of the genome generated by whole genome sequencing. For straightforward diagnostic identification, the whole genome sequencing information of a microbiological sample is fed into a global genomic database and compared using BLAST procedures to the genomes already present in the database. In addition, whole genome sequencing data may be used to back calculate to the different pre-whole genome sequencing genotyping methods, so previous collected valuable information is not lost. For the global microbial identifier the genomic information is coupled to a wide spectrum of metadata about the specific microbial clone and includes important clinical and epidemiological information such as the global finding places , treatment options and antimicrobial resistance, making it a general microbiological identification tool. This makes personalized treatment of microbial disease possible as well as real-time tracing systems for global surveillance of infectious diseases for food safety and serving human health. The initiative for building the database arose in 2011 and when several preconditions were met: 1) whole genome sequencing has become mature and serious alternative for other genotyping techniques, 2) the price of whole genome sequencing has started falling dramatically and in some cases below the price of traditional identifications, 3) vast amounts of IT resources and a fast Internet have become available, and 4) there is the idea that via a cross sectoral and One Health approach infectious diseases may be better controlled. Starting the second millennium, many microbiological laboratories, as well as national health institutes, started genome sequencing projects for sequencing the infectious agents collections they had in their biobanks. Thereby generating private databases and sending model genomes to global nucleotide databases such as GenBank of the National Center for Biotechnology Information or the nucleotide database of the EMBL. This created a wealth of genomic information and independent databases for eukaryotic as well as prokaryotic genomes. The need to further integrate these databases and to harmonize data collection, and to link the genomic data to metadata for optimal prevention of infectious diseases, was generally recognized by the scientific community. In 2011, several infectious disease control centers and other organizations took the initiative of a series of international scientific- and policy-meetings, to develop a common platform and to better understand the potentials of an interactive microbiological genomic database. The first meeting was in Brussels, September 2011, followed by meetings in Washington (March 2012) and Copenhagen (February 2013). In addition to experts from around the globe, Intergovernmental Organizations have been included in the action, notably the World Health Organization and the World Organization for Animal Health . Eric Brown, Food and Drug Administration , USA Amy Cawthorne, World Health Organization , Switzerland J\u00f8rgen Schlundt, Nanyang Technological University , Singapore. David J. Lipman, National Center for Biotechnology Information , USA. Alisdair Wotherspoon, Food Standards Agency , United Kingdom. Pathom Sawanpanyalert, Ministry of Public Health , Thailand. David Heyman, Health Protection Agency , United Kingdom. Marion Koopmans, Erasmus University Medical Center, Netherlands National Institute for Public Health and the Environment . Masami T. Takeuchi, Food and Agriculture Organization Vincenco Caporale, World Organization of Animal Health Former members: Steven M. Musser, Food and Drug Administration , USA. Angelik Tritscher, World Health Organization , Switzerland.", "edit_actions": [{"type": "D", "before": "(GMI)", "after": null, "start_char_pos": 112, "end_char_pos": 117}, {"type": "D", "before": "(WGS)", "after": null, "start_char_pos": 168, "end_char_pos": 173}, {"type": "R", "before": "PCR, PFGE and MLST", "after": "polymerase chain reaction, pulsed-field gel electrophoresis or multilocus sequence typing", "start_char_pos": 760, "end_char_pos": 778}, {"type": "D", "before": "pre-WGS", "after": null, "start_char_pos": 821, "end_char_pos": 828}, {"type": "R", "before": "WGS techniques. For straight forward diagnostic identificationthe WGS", "after": "whole genome sequencing. For straightforward diagnostic identification, the whole genome sequencing", "start_char_pos": 1003, "end_char_pos": 1072}, {"type": "R", "before": "WGS", "after": "whole genome sequencing", "start_char_pos": 1248, "end_char_pos": 1251}, {"type": "R", "before": "pre-WGS", "after": "pre-whole genome sequencing", "start_char_pos": 1304, "end_char_pos": 1311}, {"type": "R", "before": "place(s)", "after": "places", "start_char_pos": 1616, "end_char_pos": 1624}, {"type": "R", "before": "WGS", "after": "whole genome sequencing", "start_char_pos": 2021, "end_char_pos": 2024}, {"type": "R", "before": "WGS", "after": "whole genome sequencing", "start_char_pos": 2116, "end_char_pos": 2119}, {"type": "R", "before": "NCBI", "after": "National Center for Biotechnology Information", "start_char_pos": 2750, "end_char_pos": 2754}, {"type": "D", "before": "(WHO)", "after": null, "start_char_pos": 3695, "end_char_pos": 3700}, {"type": "D", "before": "(OIE)", "after": null, "start_char_pos": 3746, "end_char_pos": 3751}, {"type": "D", "before": "(FDA)", "after": null, "start_char_pos": 3795, "end_char_pos": 3800}, {"type": "D", "before": "(WHO)", "after": null, "start_char_pos": 3848, "end_char_pos": 3853}, {"type": "D", "before": "(NTU)", "after": null, "start_char_pos": 3918, "end_char_pos": 3923}, {"type": "D", "before": "(NCBI)", "after": null, "start_char_pos": 4000, "end_char_pos": 4006}, {"type": "D", "before": "(FSA)", "after": null, "start_char_pos": 4058, "end_char_pos": 4063}, {"type": "D", "before": "(MOPH)", "after": null, "start_char_pos": 4131, "end_char_pos": 4137}, {"type": "D", "before": "(HPA)", "after": null, "start_char_pos": 4189, "end_char_pos": 4194}, {"type": "D", "before": "(RIVM)", "after": null, "start_char_pos": 4334, "end_char_pos": 4340}, {"type": "D", "before": "(FAO)", "after": null, "start_char_pos": 4397, "end_char_pos": 4402}, {"type": "D", "before": "(OIE)", "after": null, "start_char_pos": 4458, "end_char_pos": 4463}, {"type": "D", "before": "(FDA)", "after": null, "start_char_pos": 4527, "end_char_pos": 4532}, {"type": "D", "before": "(WHO)", "after": null, "start_char_pos": 4585, "end_char_pos": 4590}], "sents_char_pos": [0, 355, 521, 613, 1018, 1234, 1387, 1731, 1921, 2414, 2632, 2794, 2912, 3134, 3413, 3544, 3753, 3936, 4081, 4149, 4212, 4352]}
+{"doc_id": "38025273", "revision_depth": "1", "before_revision": "Role-taking theory , or social perspective taking , is the psychological theory that one of the most important factors in facilitating social cognition in children is the growing ability to understand others\u2019 feelings and perspectives, an ability that emerges as a result of general cognitive growth. Part of this process requires that children come to realize that others\u2019 views may differ from their own. Role-taking ability involves understanding the cognitive and affective (i.e. relating to moods, emotions, and attitudes) aspects of another person's point of view and differs from perceptual perspective taking, which is the ability to recognize another person's visual point of view of the environment. Furthermore, albeit some mixed evidence on the issue, role taking and perceptual perspective taking seem to be functionally and developmentally independent of each other. Robert Selman is noted for emphasizing the importance of this theory within the field of cognitive development. He argues that a matured role taking ability allows us to better appreciate how our actions will affect others, and if we fail to develop the ability to role take, we will be forced to erroneously judge that others are behaving solely as a result of external factors. One of Selman's principal additions to the theory has been an empirically supported developmental theory of role taking ability. Social cognitive research on children's thoughts about others\u2019 perspectives, feelings, and behaviors has emerged as one of the largest areas of research in the field. Role taking theory can provide a theoretical foundation upon which this research can rest and be guided by and has relations and applications to numerous other theories and topics. Selman's theory of role-taking development Selman developed his developmental theory of role taking ability based on four sources. The first is the work of Feffer and Feffer and Gourevitch , which related role taking ability to Piaget's theory of social decentering and developed a projective test to assess children's ability to decenter as they mature. The second is the research of Flavell, which studied children's growing abilities to judge other people's conceptual and perceptual perspectives. The third is the developmental ideas of differentiation, whereupon one learns to distinguish his/her perspective from the perspectives of others, and integration, the ability to relate one's perspective to the perspectives of others. The final source of influence comes from Selman's own previous research where he assessed children's ability to describe the different perspectives of characters in a story. Stages Level 0: Egocentric Role Taking (ages 3\u20136, roughly) This stage is characterized by two lacking abilities. The first is the failure to distinguish perspectives (differentiation). More specifically, the child is unable to distinguish between his perspective, including his perspective on why a social action occurred, and that of others. 1 The second ability the child lacks is relating perspectives (social integration). Level 1: Subjective role taking (ages 6\u20138, roughly) Children now recognize that they and others in a situation may have different information available to them, and thus may differ in their views. In other words, children have matured in differentiation. The child still significantly lacks integration ability, however: he/she cannot understand that his views are influenced by the views of others, and vice versa, ad infinitum. In addition, the child believes that the sole reason for differing social perspectives is because of different information, and nothing else. Level 2: Self-reflective role taking (ages 8\u201310, roughly) The child's differentiation ability matures at this age enough so that he/she understands that people can also differ in their social perspectives because of their particularly held and differing values and set of purposes. In turn, the child is able to better put him/herself in the position of another person. In terms of integration, the child can now understand that others think about his/her point of view too. This allows the child to predict how the other person might react to the child's behaviour. What is still lacking, however, is for the child to be able to consider another person's point of view and another person's point of view of the child simultaneously. Level 3: Mutual role taking (ages 10\u201312, roughly) In this stage , the child can now differentiate his/her own perspective from the viewpoint likely for the average member of the group. In addition, the child can take the view of a detached third-person and view a situation from that perspective. In terms of integration, the child can now simultaneously consider his/her view of others and others\u2019 view of the child, and the consequences of this feedback loop of perspectives in terms of behaviour and cognition. Level 4: Societal role taking (ages 12\u201315+, roughly) %DIFDELCMD < %DIFDELCMD < %%% The adolescent now considers others\u2019 perspectives with reference to the social environment and culture the other person comes from, assuming that the other person will believe and act in accord to their society's norms and values. Evidence for Selman's Stages Three studies have been conducted to assess Selman's theory, and all three have shown support for his developmental outline of role taking ability progression. Selman conducted the first study of his own theory using 60 middle-class children from ages 4 to 6. In this experiment, the children were asked to predict and explain their predictions about another child's behaviour in a certain situation. The child participants were given situational information not available to the child they were making behavioural and cognitive predictions about. Results implied a stage progression of role taking ability as a function of age, as theorized by Selman. In a second assessment of the theory, Selman and Byrne interviewed 40 children, ages 4, 6, 8, and 10, on two socio-moral dilemmas. Children were required to discuss the perspectives of different characters in each dilemma, and results again showed that role taking ability progressed through stages as a function of age. Two of Piaget's fundamental concepts have primarily influenced role taking theory . The first is egocentrism, the mode of thinking that characterizes preoperational thinking, which is the child's failure to consider the world from other points of view. The second is decentration, the mode of thinking that characterizes operational thinking, which is the child's growing ability to perceive the world with more than one perspective in mind. In Piagetian theory, these concepts were used to describe solely cognitive development, but they have been applied in role taking theory to the social domain. Evidence for a relation between Piaget's theory and role-taking ability Evidence that Piaget's cognitive theories can be applied to the interpersonal aspects of role taking theory comes from two sources. The first is empirical evidence that children's ability to role take is correlated to their IQ and performance on Piagetian tests. Secondly, the two theories have been conceptually linked in that Selman's role taking stages correspond to Piaget's cognitive development stages, where preoperational children are at level 1 or 2, concrete operators are at level 3 or 4, and formal operators are at level 4 or 5 of Selman's stages. Given this relation, Feffer and Feffer and Gourevitch have argued that social role taking is an extension of decentering in the social sphere. Selman has argued this same point, also noting that the growth of role taking ability is brought on by the child's decreased egocentrism as he/she ages. Kohlberg's stages of moral development Lawrence Kohlberg argued that higher moral development requires role taking ability. For instance, Kohlberg's conventional level of morality (between ages 9 and 13, roughly), involves moral stereotyping, empathy-based morality, alertness to and behaviour guided by predicted evaluations by others, and identifying with authority, all of which require role taking. Evidence for a relation between Kohlberg's stages of moral development and role-taking ability Selman tested 60 children, ages 8 to 10, on Kohlberg's moral-judgment measure and two role taking tasks. He found that the development of role taking, within this age range, related to the progression into Kohlberg's conventional moral stage. A retest a year later confirmed Kohlberg's argument, and in general, it was shown that higher moral development at the conventional stage requires children's achieved ability at this age to reciprocally deal with their own and others\u2019 perspectives. Mason and Gibbs found that moral judgment development, as measured by Kohlberg's theory, consistently related to role taking opportunities experienced after childhood in adolescence and adulthood. This finding supported Kohlberg's view that moral progress beyond his third stage necessitates contact with other perspectives, namely those of entire cultures or political groups, which individuals are likely to encounter as they become adolescents and adults and thus meet many different people in school and the workplace. Relation between Kohlberg\u2019s stages, Piaget\u2019s theory, and Selman\u2019s theory Kohlberg and Piaget both emphasized that role taking ability facilitates moral development. Kohlberg argued that cognitive and role taking development are required but not sufficient for moral development. In turn, he maintained that Piaget's cognitive developmental stages underlie Selman's role taking stages, which are subsequently fundamental to his own moral developmental stages. This predicts that cognition develops first, followed by the corresponding role taking stage, and finally the corresponding moral stage, and never the other way around. Conceptually, the three processes have been tied together by Walker . His reasoning is that cognitive development involves the progressive understanding of the environment as it is. Role taking is a step upon this, which is the recognition that people each have their own subjective interpretation of the environment, including how they think about and behave towards other people. Moral development, the final step, is the grasping of how people should think and behave towards one another. Evidence in support of this view comes first from three reviews which showed moderate correlations between Selman's role taking theory, Piaget's cognitive developmental stages, and Kohlberg's moral developmental stages. More evidence comes from Walker and Richards' s finding that moral development to Kohlberg's stage 4 occurred only for those who already had early basic formal operations according to Piaget's developmental theory, and not for those in an earlier stage. Similarly, Paolitto's attempts to stimulate moral development worked only for subjects who already attained the corresponding role taking stage. Previous research has also shown that short role taking treatments, such as exposing subjects to the role taking reasoning of subjects in one stage higher, can lead to moral development. In more general demonstrations of this argument, Faust and Arbuthnot and other researchers have shown that moral development is most probable for subjects with higher cognitive development. Prosocial behavior Role taking ability and prosocial behaviours and feelings have been argued to be related . Evidence for this claim has been found from many sources. Underwood and Moore have found that perceptual, affective, and cognitive perspective taking are positively correlated with prosocial behaviour. Children trained to improve their role taking ability subsequently become more generous, more cooperative, and more apprehensive to the needs of others in comparison to children who received no role taking training. Research has also shown that people who are good at role taking have greater ability to sympathize with others. Overall, the picture is clear: prosocial behaviour is related to role taking ability development and social deviance is linked to egocentrism. To study one reason for the link between role taking ability and prosociality, grade 2 children found to be either high or low in role taking were instructed to teach two kindergartners on an arts and crafts task. 16 measures of prosocial behaviour were scored, and high and low role takers diverged on 8 of the measures, including several helping measures, providing options, and social problem solving. Analysis of the results showed that low role takers helped less than high role takers not because of a lack of wanting to help, but because of their poorer ability in interpreting social cues indicating the need for help. In other words, low role takers tended to only be able to recognize problems when they were made plainly obvious. Finally, many theorists, including Mead, Piaget, Asch, Heider, Deutsch, Madsen, and Kohlberg have theorized a relationship between cooperation and role taking ability. In one study, children's predisposition to cooperate was shown to strongly correlate with their affective role taking ability. Other researchers have also shown an indirect relationship between cooperation and role taking capacity. Social functioning A child's ability to function in social relationships has been found to depend partially on his/her role-taking ability. For instance, researchers found that children poor in role-taking ability had greater difficulty in forming and sustaining social relationships, as well as receiving lower peer nominations. Davis found that role taking ability was positively correlated with social understanding. In general, progress in role-taking ability has shown to be beneficial for one's personal and interpersonal life. Better functioning in the interpersonal domain is particularly shown in the relation between role-taking ability and social problem solving ability. Role playing has been shown to improve male teenagers\u2019 handling of social problem tasks. Gehlbach found a similar supporting result, demonstrating that adolescents with better role taking abilities had superior ability in conflict resolution. Many other researchers have also found that role taking ability development positively affects interpersonal problem solving skills. Additionally, role taking can promote better social functioning in the interpersonal domain through smoothening social interactions by improving behavioural mimicking ability. Training children on role taking ability can improve interpersonal functioning as well. In one study, preschoolers were made to role play interpersonal conflicts using puppets. Their task at the end was to discuss alternative solutions to the problems and how each solution would affect each character. Over the 10 weeks that the preschoolers participated in this role playing, their solutions became less aggressive and their classroom adjustment became better. Moreover, the use of role reversal in interpersonal problem situations has been found to stimulate cooperation, help participants better understand each other and each other's arguments and position, elicit new interpretations of the situation, change attitudes about the problem, and improve perceptions about the other person's efforts at solving the issue, willingness to compromise and cooperate, and trustworthiness. As a result of this research, it has been suggested that one way to improve cooperative skills is to improve affective role taking abilities. Role taking can also work to decrease prejudice and stereotyping. Importantly, the decrease in prejudice and stereotyping occurs for both the target individual and the target's group. In addition, role taking ability has been demonstrated to decrease social aggression. Applications ADHD (attention deficit hyperactivity disorder ) Children with ADHD struggle in their social environments, but the social-cognitive reasons for this are unknown. Several studies have indicated a difference between children with and without ADHD on their role taking ability, wherein children with ADHD have lower role taking ability, lower role taking use, and slower role taking development than children without ADHD. Given these results, it has been suggested that children with ADHD be trained on role taking to improve their social skills, including their often comorbid oppositional and conduct problems. Delinquency and social-skills training The relationship between childhood and adolescent delinquency and role taking is considerable. Burack found that maltreated children and adolescents with behavioural problems exhibited egocentrism at higher levels than non-maltreated children and adolescents who had progressed faster and more expectedly in their role taking development. Chandler found that chronically delinquent boys exhibited lower role taking abilities so much so that their role taking ability was comparable to the role taking ability scores of non-delinquent children nearly half their age. In turn, one-third of the delinquent boys in this study were assigned to a treatment program designed to improve role taking skills. Post-treatment measures demonstrated that the program successfully induced role taking ability progress in this group, and an 18-month follow-up assessment found a nearly 50\\% decrease in delinquent behaviours following these progresses in role taking skills. The same has been found for delinquent girls. Chalmers and Townsend trained delinquent girls, ages 10\u201316, on role taking skills over 15 sessions, following which the girls demonstrated improved understanding of interpersonal situations and problems, greater empathy, more acceptance of individual differences, and exhibited more prosociality in the classroom. The overall picture, then, is that role taking training can help delinquent youth and youth with conduct disorders as they lag behind in role taking ability. Autism Several researchers have argued that the deficits in the social lives, communication ability, and imagination of autistic children are a result of their deficiencies in role taking. It is believed that autistic children's inability to role take prevents them from developing a theory of mind . Pdf . Indeed, role taking has been described as the theory of mind in action. Failing to role take and failing to develop a theory of mind may lead autistic children to use only their own understanding of a situation to predict others\u2019 behaviour, resulting in deficits in social understanding.", "after_revision": "Role-taking theory ( or social perspective taking ) is the social-psychological concept that one of the most important factors in facilitating social cognition in children is the growing ability to understand others\u2019 feelings and perspectives, an ability that emerges as a result of general cognitive growth. Part of this process requires that children come to realize that others\u2019 views may differ from their own. Role-taking ability involves understanding the cognitive and affective (i.e. relating to moods, emotions, and attitudes) aspects of another person's point of view , and differs from perceptual perspective taking, which is the ability to recognize another person's visual point of view of the environment. Furthermore, albeit some mixed evidence on the issue, role taking and perceptual perspective taking seem to be functionally and developmentally independent of each other. Robert Selman is noted for emphasizing the importance of this theory within the field of cognitive development. He argues that a matured role-taking ability allows us to better appreciate how our actions will affect others, and if we fail to develop the ability to role take, we will be forced to erroneously judge that others are behaving solely as a result of external factors. One of Selman's principal additions to the theory has been an empirically supported developmental theory of role-taking ability. Social cognitive research on children's thoughts about others\u2019 perspectives, feelings, and behaviors has emerged as one of the largest areas of research in the field. Role-taking theory can provide a theoretical foundation upon which this research can rest and be guided by and has relations and applications to numerous other theories and topics. Selman's developmental theory Robert Selman developed his developmental theory of role-taking ability based on four sources. The first is the work of M. H. Feffer (1959, 1971), and Feffer and Gourevitch (1960) , which related role-taking ability to Piaget's theory of social decentering , and developed a projective test to assess children's ability to decenter as they mature. The second is the research of John H. Flavell (1968),Flavell, John H., et al. 1968. The development of role-taking and communication skills in children. New York: John Wiley Sons. . ERIC ID:ED027082. which studied children's growing abilities to judge other people's conceptual and perceptual perspectives. The third is the developmental ideas of differentiation, whereupon one learns to distinguish his/her perspective from the perspectives of others, and integration, the ability to relate one's perspective to the perspectives of others. The final source of influence comes from Selman's own previous research where he assessed children's ability to describe the different perspectives of characters in a story. Stages Level 0: Egocentric Role Taking Level 0 (ages 3\u20136, roughly) is characterized by two lacking abilities. The first is the failure to distinguish perspectives (differentiation). More specifically, the child is unable to distinguish between his perspective, including his perspective on why a social action occurred, and that of others. The second ability the child lacks is relating perspectives (social integration). Level 1: Subjective role taking At level 1 (ages 6\u20138, roughly) , children now recognize that they and others in a situation may have different information available to them, and thus may differ in their views. In other words, children have matured in differentiation. The child still significantly lacks integration ability, however: he/she cannot understand that his views are influenced by the views of others, and vice versa, ad infinitum. In addition, the child believes that the sole reason for differing social perspectives is because of different information, and nothing else. Level 2: Self-reflective role taking The child's differentiation ability matures at this level (ages 8\u201310, roughly) enough so that he/she understands that people can also differ in their social perspectives because of their particularly held and differing values and set of purposes. In turn, the child is able to better put him/herself in the position of another person. In terms of integration, the child can now understand that others think about his/her point of view too. This allows the child to predict how the other person might react to the child's behaviour. What is still lacking, however, is for the child to be able to consider another person's point of view and another person's point of view of the child simultaneously. Level 3: Mutual role taking In level 3 (ages 10\u201312, roughly) , the child can now differentiate his/her own perspective from the viewpoint likely for the average member of the group. In addition, the child can take the view of a detached third-person and view a situation from that perspective. In terms of integration, the child can now simultaneously consider his/her view of others and others\u2019 view of the child, and the consequences of this feedback loop of perspectives in terms of behaviour and cognition. Level 4: Societal role taking At level 4 (ages 12\u201315+, roughly) %DIFDELCMD < %DIFDELCMD < %%% , the adolescent now considers others\u2019 perspectives with reference to the social environment and culture the other person comes from, assuming that the other person will believe and act in accord to their society's norms and values. Evidence for Selman's Stages Three studies have been conducted to assess Selman's theory, all of which having shown support for his developmental outline of role-taking ability progression. Selman conducted the first study of his own theory using 60 middle-class children from ages 4 to 6. In this experiment, the children were asked to predict and explain their predictions about another child's behaviour in a certain situation. The child participants were given situational information not available to the child they were making behavioural and cognitive predictions about. Results implied a stage progression of role taking ability as a function of age, as theorized by Selman. In a second assessment of the theory, Selman and D. F. Byrne interviewed 40 children, ages 4, 6, 8, and 10, on two socio-moral dilemmas. Children were required to discuss the perspectives of different characters in each dilemma, and results again showed that role taking ability progressed through stages as a function of age. Two of Piaget's fundamental concepts have primarily influenced role taking theory : egocentrism, the mode of thinking that characterizes preoperational thinking, which is the child's failure to consider the world from other points of view. decentration, the mode of thinking that characterizes operational thinking, which is the child's growing ability to perceive the world with more than one perspective in mind. In Piagetian theory, these concepts were used to describe solely cognitive development, but they have been applied in role taking theory to the social domain. Evidence that Piaget's cognitive theories can be applied to the interpersonal aspects of role-taking theory comes from two sources. The first is empirical evidence that children's ability to role take is correlated to their IQ and performance on Piagetian tests. Secondly, the two theories have been conceptually linked in that Selman's role-taking stages correspond to Piaget's cognitive development stages, where preoperational children are at level 1 or 2, concrete operators are at level 3 or 4, and formal operators are at level 4 or 5 of Selman's stages. Given this relation, M. H. Feffer, as well as Feffer and V. Gourevitch, have argued that social role-taking is an extension of decentering in the social sphere. Selman has argued this same point, also noting that the growth of role-taking ability is brought on by the child's decreased egocentrism as he/she ages. Kohlberg's stages of moral development Lawrence Kohlberg argued that higher moral development requires role-taking ability. For instance, Kohlberg's conventional level of morality (between ages 9 and 13, roughly), involves moral stereotyping, empathy-based morality, alertness to and behaviour guided by predicted evaluations by others, and identifying with authority, all of which require role taking. Selman tested 60 children, ages 8 to 10, on Kohlberg's moral-judgment measure and two role-taking tasks. He found that the development of role taking, within this age range, related to the progression into Kohlberg's conventional moral stage. A retest a year later confirmed Kohlberg's argument, and in general, it was shown that higher moral development at the conventional stage requires children's achieved ability at this age to reciprocally deal with their own and others\u2019 perspectives. Mason and Gibbs (1993) found that moral judgment development, as measured by Kohlberg's theory, consistently related to role taking opportunities experienced after childhood in adolescence and adulthood. This finding supported Kohlberg's view that moral progress beyond his third stage necessitates contact with other perspectives, namely those of entire cultures or political groups, which individuals are likely to encounter as they become adolescents and adults and thus meet many different people in school and the workplace. Relation between Kohlberg\u2019s stages, Piaget\u2019s theory, and Selman\u2019s theory Kohlberg and Piaget both emphasized that role taking ability facilitates moral development. Kohlberg argued that cognitive and role-taking development are required but not sufficient for moral development. In turn, he maintained that Piaget's cognitive developmental stages underlie Selman's role taking stages, which are subsequently fundamental to his own moral developmental stages. This predicts that cognition develops first, followed by the corresponding role taking stage, and finally the corresponding moral stage, and never the other way around. Conceptually, the three processes have been tied together by Walker (1980) . His reasoning is that cognitive development involves the progressive understanding of the environment as it is. Role-taking is a step upon this, which is the recognition that people each have their own subjective interpretation of the environment, including how they think about and behave towards other people. Moral development, the final step, is the grasping of how people should think and behave towards one another. Evidence in support of this view comes first from three reviews which showed moderate correlations between Selman's role taking theory, Piaget's cognitive developmental stages, and Kohlberg's moral developmental stages. More evidence comes from Walker and Richards' (1979) finding that moral development to Kohlberg's stage 4 occurred only for those who already had early basic formal operations according to Piaget's developmental theory, and not for those in an earlier stage. Similarly, Paolitto's attempts to stimulate moral development worked only for subjects who already attained the corresponding role taking stage. Previous research has also shown that short role taking treatments, such as exposing subjects to the role taking reasoning of subjects in one stage higher, can lead to moral development. In more general demonstrations of this argument, Faust and Arbuthnot and other researchers have shown that moral development is most probable for subjects with higher cognitive development. Prosocial behavior Role-taking ability has been argued to be related to prosocial behaviours and feelings . Evidence for this claim has been found from many sources. Underwood and Moore (1982), for instance, have found that perceptual, affective, and cognitive perspective-taking are positively correlated with prosocial behaviour. Children trained to improve their role-taking ability subsequently become more generous, more cooperative, and more apprehensive to the needs of others in comparison to children who received no role taking training. Research has also shown that people who are good at role-taking have greater ability to sympathize with others. Overall, the picture is clear: prosocial behaviour is related to role taking ability development and social deviance is linked to egocentrism. To study one reason for the link between role-taking ability and prosociality, second-grade children found to be either high or low in role-taking were instructed to teach two kindergartners on an arts and crafts task. Sixteen measures of prosocial behaviour were scored, and high and low role takers diverged on 8 of the measures, including several helping measures, providing options, and social problem solving. Analysis of the results showed that low role takers helped less than high role takers not because of a lack of wanting to help, but because of their poorer ability in interpreting social cues indicating the need for help. In other words, low role takers tended to only be able to recognize problems when they were made plainly obvious. Finally, many theorists, including Mead, Piaget, Asch, Heider, Deutsch, Madsen, and Kohlberg have theorized a relationship between cooperation and role taking ability. In one study, children's predisposition to cooperate was shown to strongly correlate with their affective role taking ability. Other researchers have also shown an indirect relationship between cooperation and role-taking capacity. Social functioning A child's ability to function in social relationships has been found to depend partially on his/her role-taking ability. For instance, researchers found that children poor in role-taking ability had greater difficulty in forming and sustaining social relationships, as well as receiving lower peer nominations. Davis (1983) found that role-taking ability was positively correlated with social understanding. In general, progress in role-taking ability has shown to be beneficial for one's personal and interpersonal life. Better functioning in the interpersonal domain is particularly shown in the relation between role-taking ability and social problem solving ability. Role playing has been shown to improve male teenagers\u2019 handling of social problem tasks. Gehlbach (2004) found a similar supporting result, demonstrating that adolescents with better role taking abilities had superior ability in conflict resolution. Many other researchers have also found that role taking ability development positively affects interpersonal problem solving skills. Additionally, role taking can promote better social functioning in the interpersonal domain through smoothening social interactions by improving behavioural mimicking ability. Training children on role-taking ability can improve interpersonal functioning as well. In one study, preschoolers were made to role play interpersonal conflicts using puppets. Their task at the end was to discuss alternative solutions to the problems and how each solution would affect each character. Over the 10 weeks that the preschoolers participated in this role playing, their solutions became less aggressive and their classroom adjustment became better. Moreover, the use of role reversal in interpersonal problem situations has been found to stimulate cooperation, help participants better understand each other and each other's arguments and position, elicit new interpretations of the situation, change attitudes about the problem, and improve perceptions about the other person's efforts at solving the issue, willingness to compromise and cooperate, and trustworthiness. As a result of this research, it has been suggested that one way to improve cooperative skills is to improve affective role taking abilities. Role-taking can also work to decrease prejudice and stereotyping. Importantly, the decrease in prejudice and stereotyping occurs for both the target individual and the target's group. In addition, role taking ability has been demonstrated to decrease social aggression. Applications Attention Deficit Hyperactivity Disorder (ADHD ) Children with ADHD struggle in their social environments, but the social-cognitive reasons for this are unknown. Several studies have indicated a difference between children with and without ADHD on their role taking ability, wherein children with ADHD have lower role taking ability, lower role taking use, and slower role taking development than children without ADHD. Given these results, it has been suggested that children with ADHD be trained on role taking to improve their social skills, including their often comorbid oppositional and conduct problems. Delinquency and social-skills training The relationship between childhood and adolescent delinquency and role taking is considerable. Burack found that maltreated children and adolescents with behavioural problems exhibited egocentrism at higher levels than non-maltreated children and adolescents who had progressed faster and more expectedly in their role taking development. Chandler (1973) found that chronically delinquent boys exhibited lower role taking abilities so much so that their role taking ability was comparable to the role taking ability scores of non-delinquent children nearly half their age. In turn, one-third of the delinquent boys in this study were assigned to a treatment program designed to improve role taking skills. Post-treatment measures demonstrated that the program successfully induced role taking ability progress in this group, and an 18-month follow-up assessment found a nearly 50\\% decrease in delinquent behaviours following these progresses in role taking skills. The same has been found for delinquent girls. Chalmers and Townsend trained delinquent girls, ages 10\u201316, on role taking skills over 15 sessions, following which the girls demonstrated improved understanding of interpersonal situations and problems, greater empathy, more acceptance of individual differences, and exhibited more prosociality in the classroom. The overall picture, then, is that role-taking training can help delinquent youth and youth with conduct disorders as they lag behind in role-taking ability. Autism Several researchers have argued that the deficits in the social lives, communication ability, and imagination of autistic children are a result of their deficiencies in role taking. It is believed that autistic children's inability to role take prevents them from developing a theory of mind . Indeed, role taking has been described as the theory of mind in action. Failing to role take and failing to develop a theory of mind may lead autistic children to use only their own understanding of a situation to predict others\u2019 behaviour, resulting in deficits in social understanding.", "edit_actions": [{"type": "R", "before": ",", "after": "(", "start_char_pos": 19, "end_char_pos": 20}, {"type": "R", "before": ", is the psychological theory", "after": ") is the social-psychological concept", "start_char_pos": 50, "end_char_pos": 79}, {"type": "A", "before": null, "after": ",", "start_char_pos": 570, "end_char_pos": 570}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 1019, "end_char_pos": 1030}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 1370, "end_char_pos": 1381}, {"type": "R", "before": "Role taking", "after": "Role-taking", "start_char_pos": 1558, "end_char_pos": 1569}, {"type": "R", "before": "theory of role-taking development", "after": "developmental theory Robert", "start_char_pos": 1748, "end_char_pos": 1781}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 1827, "end_char_pos": 1838}, {"type": "R", "before": "Feffer", "after": "M. H. Feffer (1959, 1971),", "start_char_pos": 1895, "end_char_pos": 1901}, {"type": "A", "before": null, "after": "(1960)", "start_char_pos": 1928, "end_char_pos": 1928}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 1945, "end_char_pos": 1956}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2006, "end_char_pos": 2006}, {"type": "R", "before": "Flavell,", "after": "John H. Flavell (1968),Flavell, John H., et al. 1968. The development of role-taking and communication skills in children. New York: John Wiley", "start_char_pos": 2126, "end_char_pos": 2134}, {"type": "A", "before": null, "after": "Sons. . ERIC ID:ED027082.", "start_char_pos": 2135, "end_char_pos": 2135}, {"type": "A", "before": null, "after": "Level 0", "start_char_pos": 2690, "end_char_pos": 2690}, {"type": "D", "before": "This stage", "after": null, "start_char_pos": 2711, "end_char_pos": 2721}, {"type": "D", "before": "1", "after": null, "start_char_pos": 2995, "end_char_pos": 2996}, {"type": "A", "before": null, "after": "At level 1", "start_char_pos": 3111, "end_char_pos": 3111}, {"type": "R", "before": "Children", "after": ", children", "start_char_pos": 3132, "end_char_pos": 3140}, {"type": "D", "before": "(ages 8\u201310, roughly)", "after": null, "start_char_pos": 3689, "end_char_pos": 3709}, {"type": "R", "before": "age", "after": "level (ages 8\u201310, roughly)", "start_char_pos": 3762, "end_char_pos": 3765}, {"type": "A", "before": null, "after": "In level 3", "start_char_pos": 4414, "end_char_pos": 4414}, {"type": "D", "before": "In this stage", "after": null, "start_char_pos": 4437, "end_char_pos": 4450}, {"type": "A", "before": null, "after": "At level 4", "start_char_pos": 4931, "end_char_pos": 4931}, {"type": "R", "before": "The", "after": ", the", "start_char_pos": 4985, "end_char_pos": 4988}, {"type": "R", "before": "and all three have", "after": "all of which having", "start_char_pos": 5306, "end_char_pos": 5324}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 5372, "end_char_pos": 5383}, {"type": "A", "before": null, "after": "D. F.", "start_char_pos": 5947, "end_char_pos": 5947}, {"type": "R", "before": ". The first is", "after": ":", "start_char_pos": 6302, "end_char_pos": 6316}, {"type": "D", "before": "The second is", "after": null, "start_char_pos": 6473, "end_char_pos": 6486}, {"type": "D", "before": "for a relation between Piaget's theory and role-taking ability Evidence", "after": null, "start_char_pos": 6830, "end_char_pos": 6901}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 6982, "end_char_pos": 6993}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 7230, "end_char_pos": 7241}, {"type": "R", "before": "Feffer and Feffer and Gourevitch", "after": "M. H. Feffer, as well as Feffer and V. Gourevitch,", "start_char_pos": 7475, "end_char_pos": 7507}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 7532, "end_char_pos": 7543}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 7663, "end_char_pos": 7674}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 7853, "end_char_pos": 7864}, {"type": "D", "before": "Evidence for a relation between Kohlberg's stages of moral development and role-taking ability", "after": null, "start_char_pos": 8153, "end_char_pos": 8247}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 8334, "end_char_pos": 8345}, {"type": "A", "before": null, "after": "(1993)", "start_char_pos": 8756, "end_char_pos": 8756}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 9464, "end_char_pos": 9475}, {"type": "A", "before": null, "after": "(1980)", "start_char_pos": 9960, "end_char_pos": 9960}, {"type": "R", "before": "Role taking", "after": "Role-taking", "start_char_pos": 10075, "end_char_pos": 10086}, {"type": "R", "before": "s", "after": "(1979)", "start_char_pos": 10651, "end_char_pos": 10652}, {"type": "R", "before": "Role taking ability and prosocial behaviours and feelings have", "after": "Role-taking ability has", "start_char_pos": 11400, "end_char_pos": 11462}, {"type": "A", "before": null, "after": "to prosocial behaviours and feelings", "start_char_pos": 11489, "end_char_pos": 11489}, {"type": "A", "before": null, "after": "(1982), for instance,", "start_char_pos": 11570, "end_char_pos": 11570}, {"type": "R", "before": "perspective taking", "after": "perspective-taking", "start_char_pos": 11624, "end_char_pos": 11642}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 11729, "end_char_pos": 11740}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 11963, "end_char_pos": 11974}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 12207, "end_char_pos": 12218}, {"type": "R", "before": "grade 2", "after": "second-grade", "start_char_pos": 12245, "end_char_pos": 12252}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 12296, "end_char_pos": 12307}, {"type": "R", "before": "16", "after": "Sixteen", "start_char_pos": 12380, "end_char_pos": 12382}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 13285, "end_char_pos": 13296}, {"type": "R", "before": "found that role taking", "after": "(1983) found that role-taking", "start_char_pos": 13643, "end_char_pos": 13665}, {"type": "A", "before": null, "after": "(2004)", "start_char_pos": 14088, "end_char_pos": 14088}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 14564, "end_char_pos": 14575}, {"type": "R", "before": "Role taking", "after": "Role-taking", "start_char_pos": 15570, "end_char_pos": 15581}, {"type": "D", "before": "ADHD (attention deficit hyperactivity disorder", "after": null, "start_char_pos": 15853, "end_char_pos": 15899}, {"type": "A", "before": null, "after": "Attention Deficit Hyperactivity Disorder (ADHD", "start_char_pos": 15900, "end_char_pos": 15900}, {"type": "A", "before": null, "after": "(1973)", "start_char_pos": 16852, "end_char_pos": 16852}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 17859, "end_char_pos": 17870}, {"type": "R", "before": "role taking", "after": "role-taking", "start_char_pos": 17961, "end_char_pos": 17972}, {"type": "D", "before": ". Pdf", "after": null, "start_char_pos": 18281, "end_char_pos": 18286}], "sents_char_pos": [0, 300, 406, 710, 881, 993, 1261, 1390, 1557, 1738, 1869, 2095, 2242, 2476, 2650, 2764, 2836, 2994, 3078, 3276, 3334, 3509, 3651, 3933, 4021, 4126, 4218, 4385, 4571, 4683, 4900, 5215, 5404, 5504, 5645, 5792, 5897, 6029, 6219, 6303, 6472, 6661, 6820, 7024, 7155, 7453, 7596, 7749, 7873, 8152, 8352, 8490, 8739, 8937, 9263, 9428, 9542, 9722, 9891, 9962, 10074, 10274, 10384, 10604, 10858, 11003, 11190, 11380, 11491, 11549, 11694, 11910, 12022, 12165, 12379, 12570, 12792, 12906, 13074, 13201, 13306, 13446, 13636, 13726, 13840, 13989, 14078, 14233, 14366, 14542, 14630, 14719, 14845, 15005, 15427, 15569, 15635, 15753, 15839, 16015, 16273, 16464, 16598, 16842, 17070, 17203, 17463, 17509, 17823, 17981, 18170, 18360]}
+{"doc_id": "38418113", "revision_depth": "1", "before_revision": "Stevanato Group is a multinational company headquartered in Piombino Dese, Padua \u2013 Italy. It is leading producer of glass primary packaging and provider of integrated capabilities for drug delivery systems. Founded in 1949, it is committed to creating systems, processes, and services that guarantee the integrity of medicines. The Group is the first worldwide producer of insulin cartridges for diabetes treatment and it has the technological leadership in the design and production of converting machineries for glass tubing . It has also a leading positioning in syringes and vials. Nuova Ompi, the first company of the Group, was founded in Venice in 1949 by Giovanni Stevanato, father of the actual president Sergio Stevanato. In 1959 the company moved to its current location: Piombino Dese, Padua \u2013 Italy. A second company (SPAMI) was established in 1971, specialized in the design and construction of high-speed precision machines and complete lines for the production and control of glass tube containers for pharmaceutical use. In 1993 Stevanato Group purchased Alfamatic (Latina, Italy) and with the acquisition of Medical Glass (Bratislava) in 2005, the Group opened to the internationalization. In 2007 the Group acquired Optrel (Vicenza), an Italian company specialized in the design and the construction of inspection machines for the pharmaceutical industry. In addition, Nuova Ompi launched the SG EZ-fill brand, starting with the production of sterilized syringes. In 2008 a new production plant called \"Ompi North America\" was built in Monterrey, Mexico. Two years later the SG EZ-fill process was extended to vials and cartridges. In 2012 the Group doubled the Monterrey plant and started the construction of a new plant in China (Zhangjiagang - Shanghai area). In 2013 the Group acquired InnoScan, a Danish manufacturer of state-of-the-art high-speed inspection machines for pharmaceutical products . In 2016 the Group acquired the Danish company SVM Automatik specialized in assembly, packaging , and serialization solutions buzzword for medical devices and the operative units of Balda Group, specialized in high quality and high precision plastic solutions %DIFDELCMD < [%%% buzzword for diagnostic, pharmaceutical and medical device applications. In 2017 the third greenfield - Ompi do Brasil - opened in Sete Lagoas , in Brazil. In 2018 the company opened a commercial office in Nagoya, Japan and in 2020 a Technology Excellence Center, an R D hub dedicated to analytical testing for container closure integrity and optimization of drug delivery systems. Global Industrial Footprint Today, Stevanato Group counts over 4,200 people across the globe, has a global industrial footprint and comprises of 14 plants, R D centers, and commercial offices across 9 different countries.%DIFDELCMD < %DIFDELCMD < %%% Business Lines Products and Services Stevanato Group comprises various business lines dedicated to serving the biopharmaceutical and healthcare industries: Stevanato Group products ranges from glass primary packaging , by its historical brand Ompi, to high-precision plastic diagnostic and medical components, up to contract manufacturing services for drug delivery devices. The Group also provides analytical and testing services to study container closure integrity and integration into drug delivery devices, streamlining the drug development process. Besides, Stevanato Group designs and offers state-of-the-art vision inspection systems, assembly, and packaging equipment . Medical-grade glass primary packaging, plastic components, and contract manufacturing The glass primary packaging manufacturing sites located in Italy, Slovakia, Mexico, Brazil, and Chinaproduce both traditional products such as vials and ampoules and value-added glass containers such as syringes and cartridges suitable for self-injection systems. With the acquisition of the operative units of Balda located in Germany and the US, Stevanato Group also supplies high-quality and high-precision plastic solutions, for the diagnostic, pharmaceutical and medical markets, as well as contract manufacturing services. Analytical services Through its laboratory in Italy and a Technology Excellence Center opened in Boston in 2020, Stevanato Group provides analytical services investigating physicochemical properties of primary packaging materials and components, and the integration within delivery devices. Technologies: glass forming, visual inspection, assembly and packaging solutions%DIFDELCMD < %DIFDELCMD < %%% From its outset, Stevanato Group designed and assembled automated lines for the transformation of glass tubing into containers for pharmaceutical use. Over the years, the company gained a technological leadership in glass tubing processing, producing vials, cartridges, syringes, and ampoules . Stevanato Group is also specialized in pharma vision inspection systems, having sound expertise in drug inspection, including liquid, emulsions, viscous, gel-like, powder, and lyophilized products through Italian and Danish companies Optrel and InnoScan . The company boasts a broad portfolio of machines, supporting customers from lab development all the way to large scale production, counting on the same software for more straightforward scale-up. Through SVM, the Group also offers modular flexible and customized assemblyand packaging solutions that can allow a high degree of customization thanks to various platforms and standard modules. Assembly and packaging systems that streamline pharmaceutical companies' processing and packaging requirements and contract manufacturers are part of SG offering. The modular and \ufb02exible production lines adapt to di\ufb00erent manufacturing programs.%DIFDELCMD < %DIFDELCMD < %%% Drug Delivery Devices By combining glass, plastics, engineering, and analytical capabilities, the company can now develop and produce advanced, user-friendly drug delivery systems, such as pen injectors, auto-injectors, wearables, and inhalers. Companies The Mexican plant is located in Monterrey. It was built in 2008 and doubled in 2012 in order to serve the American market with the support of a sales office situated in Newtown, Pennsylvania (USA). Located in Bad Oyenhausen (Germany), it was founded in 1908 as a camera manufacturer and developed a focus on precision injection molding in the fifties. After a diversification in mobile telephony, medical and automotive, the company focused on the medical, healthcare, diagnostic , and pharmaceutical segments . In 2016 it was acquired by Stevanato Group. Based in Oceanside (US), they have been acquired by Stevanato Group in 2016 and are specialized in injection molding for medical , aerospace, electronics and consumer markets. The company was founded in 1971. It is located in Piombino Dese (Padua) \u2013 Italy. It produces glass tubing converting machines and inspection machines (under the brand Optrel) for pharmaceutical glass containers. The company joined the Group in 2013 and it produces high-speed inspection machines for the pharmaceutical industry. The Danish company SVM Automatik has been acquired by Stevanato Group in 2016. It is specialized in assembly, packaging and serialization solutionsfor the pharmaceutical industry.", "after_revision": "Stevanato Group is an Italian multinational company headquartered in Piombino Dese, Padua \u2013 Italy. Founded in 1949, it is also active in the glass tube forming technology and inspection systems sector. Profile page of Stevanato Group website The Group is the first worldwide producer of insulin cartridges for diabetes treatment Facts and Figures page of Stevanato Group website and design and production of machinery for glass tubing converting. Nuova Ompi, the first company of the Group, was founded in Venice in 1949 by Giovanni Stevanato, father of the actual president Sergio Stevanato. In 1959 the company moved to its current location: Piombino Dese, Padua \u2013 Italy. A second company (SPAMI) was established in 1971, specialized in the design and construction of high-speed precision machines and complete lines for the production and control of glass tube containers for pharmaceutical use. In 1993 Stevanato Group purchased Alfamatic (Latina, Italy) and with the acquisition of Medical Glass (Bratislava) in 2005, the Group opened to the internationalization. In 2007 the Group acquired Optrel (Vicenza), an Italian company specialized in the design and the construction of inspection machines for the pharmaceutical industry. In addition, Nuova Ompi launched the EZ-fill brand, starting with the production of sterile syringes. History page of Stevanato Group website In 2008 a new production plant called \"Ompi of America\" was built in Monterrey, Mexico. Stevanato Glass Packaging, Mexico Two years later the EZ-fill concept was extended to vials and cartridges. History page of Ompi website In 2012 the Group doubled the Monterrey plant started the construction of a new plant in China (Zhangjiagang - Shanghai area). In 2013 the Group acquired InnoScan, a Danish manufacturer of inspection machines for the pharmaceutical industry . In 2016 the Group acquired the Danish company SVM Automatik specialized in assembly, packaging and serialization solutions for the pharmaceutical industry and the operative units of Balda Group, specialized in high quality and high precision plastic solutions %DIFDELCMD < [%%% for diagnostic, pharmaceutical and medical device applications. In 2017 the third greenfield - Ompi do Brasil - plant was opened in Sete Lagoas . %DIFDELCMD < %DIFDELCMD < %%% Divisions Stevanato Group comprises two operational divisions: Pharmaceutical Systems with Ompi specialized in glass primary packaging and Balda, focused on specialty plastics and delivery devices; Engineering Systems with Spami, Optrel, InnoScan and SVM, specialized in glass processing, inspection systems, assembly, and packaging solutions . Pharmaceutical Systems Division With locations throughout the world ( Italy, Slovakia, Germany, Mexico, USA, China, Brazil), the Pharmaceutical Systems Division produces both traditional products such as vials and ampoules , and strong growth products such as syringes and cartridges for autoinjection systems. Profile page of Ompi website With the acquisition of the operative units of Balda , the division is also specialized now in high quality and high precision plastic solutions, developed and manufactured to meet customers\u2019 specific needs. Balda's healthcare segment is active in diagnostic, pharmaceutical and medical device applications. Stevanato Group acquires operating units of Balda Group - Press Release Page of Stevanato Group website Engineering Systems Division %DIFDELCMD < %DIFDELCMD < %%% The Engineering Systems Division consists of SPAMI (with its brand Optrel), InnoScan and SVM Automatik. Spami designs and manufactures machinery for glass tubing converting for the production of vials, cartridges, syringes, ampoules and special devices. Optrel and InnoScan refer to the visual inspection area focused on the inspection machines market for the pharmaceutical industry. Brands page of Stevanato Group website SVM Automatik is a company specialized in assembly, packaging and serialization solutions for the pharmaceutical industry. %DIFDELCMD < %DIFDELCMD < %%% Companies The Mexican plant is located in Monterrey. It was built in 2008 and doubled in 2012 in order to serve the American market with the support of the sales office situated in Newtown, Pennsylvania (USA). Located in Bad Oyenhausen (Germany), it was founded in 1908 as a camera manufacturer and developed a focus on precision injection molding in the fifties. After a diversification in mobile telephony, medical and automotive, the company focused in the medical, healthcare, diagnostic and pharmaceutical segment . In 2016 it was acquired by Stevanato Group. History page of Balda website Based in Oceanside and Ontario (US), they have been acquired by Stevanato Group in 2016 and are specialized in injection molding for medical market and turning machine service supporting the Aerospace, Medical, Electronic and Consumer industries. Balda website The company refers to the Engineering Systems Division of the Group and was founded in 1971. It is located in Piombino Dese (Padua) \u2013 Italy. It produces glass tubing converting machines and inspection machines for pharmaceutical glass containers. History page of Stevanato Group website The company joined the Group in 2013 and it produces high-speed inspection machines for the pharmaceutical industry. InnoScan Corporate website The Danish company SVM Automatik has been acquired by Stevanato Group in 2016. It is specialized in assembly, packaging and serialization solutions for the pharmaceutical industry.", "edit_actions": [{"type": "R", "before": "a", "after": "an Italian", "start_char_pos": 19, "end_char_pos": 20}, {"type": "D", "before": "It is leading producer of glass primary packaging and provider of integrated capabilities for drug delivery systems.", "after": null, "start_char_pos": 90, "end_char_pos": 206}, {"type": "R", "before": "committed to creating systems, processes, and services that guarantee the integrity of medicines.", "after": "also active in the glass tube forming technology and inspection systems sector. Profile page of Stevanato Group website", "start_char_pos": 230, "end_char_pos": 327}, {"type": "R", "before": "and it has the technological leadership in the", "after": "Facts and Figures page of Stevanato Group website and", "start_char_pos": 415, "end_char_pos": 461}, {"type": "R", "before": "converting machineries", "after": "machinery", "start_char_pos": 487, "end_char_pos": 509}, {"type": "R", "before": ". It has also a leading positioning in syringes and vials.", "after": "converting.", "start_char_pos": 527, "end_char_pos": 585}, {"type": "D", "before": "SG", "after": null, "start_char_pos": 1412, "end_char_pos": 1414}, {"type": "R", "before": "sterilized syringes.", "after": "sterile syringes. History page of Stevanato Group website", "start_char_pos": 1462, "end_char_pos": 1482}, {"type": "R", "before": "North", "after": "of", "start_char_pos": 1527, "end_char_pos": 1532}, {"type": "A", "before": null, "after": "Stevanato Glass Packaging, Mexico", "start_char_pos": 1574, "end_char_pos": 1574}, {"type": "D", "before": "SG", "after": null, "start_char_pos": 1595, "end_char_pos": 1597}, {"type": "R", "before": "process", "after": "concept", "start_char_pos": 1606, "end_char_pos": 1613}, {"type": "A", "before": null, "after": "History page of Ompi website", "start_char_pos": 1652, "end_char_pos": 1652}, {"type": "D", "before": "and", "after": null, "start_char_pos": 1699, "end_char_pos": 1702}, {"type": "D", "before": "state-of-the-art high-speed", "after": null, "start_char_pos": 1846, "end_char_pos": 1873}, {"type": "R", "before": "pharmaceutical products", "after": "the pharmaceutical industry", "start_char_pos": 1898, "end_char_pos": 1921}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2019, "end_char_pos": 2020}, {"type": "D", "before": "buzzword", "after": null, "start_char_pos": 2049, "end_char_pos": 2057}, {"type": "R", "before": "for medical devices", "after": "for the pharmaceutical industry", "start_char_pos": 2058, "end_char_pos": 2077}, {"type": "D", "before": "buzzword", "after": null, "start_char_pos": 2201, "end_char_pos": 2209}, {"type": "A", "before": null, "after": "plant was", "start_char_pos": 2322, "end_char_pos": 2322}, {"type": "D", "before": ", in Brazil. In 2018 the company opened a commercial office in Nagoya, Japan and in 2020 a Technology Excellence Center, an R", "after": null, "start_char_pos": 2345, "end_char_pos": 2470}, {"type": "R", "before": "D hub dedicated to analytical testing for container closure integrity and optimization of drug delivery systems.", "after": ".", "start_char_pos": 2471, "end_char_pos": 2583}, {"type": "D", "before": "Global Industrial Footprint Today, Stevanato Group counts over 4,200 people across the globe, has a global industrial footprint and comprises of 14 plants, R", "after": null, "start_char_pos": 2584, "end_char_pos": 2741}, {"type": "D", "before": "D centers, and commercial offices across 9 different countries.", "after": null, "start_char_pos": 2742, "end_char_pos": 2805}, {"type": "D", "before": "Business Lines Products and Services", "after": null, "start_char_pos": 2835, "end_char_pos": 2871}, {"type": "R", "before": "Stevanato Group comprises various business lines dedicated to serving the biopharmaceutical and healthcare industries: Stevanato Group products ranges from", "after": "Divisions Stevanato Group comprises two operational divisions: Pharmaceutical Systems with Ompi specialized in", "start_char_pos": 2872, "end_char_pos": 3027}, {"type": "R", "before": ", by its historical brand Ompi, to high-precision plastic diagnostic and medical components, up to contract manufacturing services for drug delivery devices. The Group also provides analytical and testing services to study container closure integrity and integration into drug delivery devices, streamlining the drug development process. Besides, Stevanato Group designs and offers state-of-the-art vision", "after": "and Balda, focused on specialty plastics and delivery devices; Engineering Systems with Spami, Optrel, InnoScan and SVM, specialized in glass processing,", "start_char_pos": 3052, "end_char_pos": 3457}, {"type": "R", "before": "equipment", "after": "solutions", "start_char_pos": 3502, "end_char_pos": 3511}, {"type": "R", "before": "Medical-grade glass primary packaging, plastic components, and contract manufacturing", "after": "Pharmaceutical Systems Division", "start_char_pos": 3514, "end_char_pos": 3599}, {"type": "R", "before": "The glass primary packaging manufacturing sites located in", "after": "With locations throughout the world (", "start_char_pos": 3600, "end_char_pos": 3658}, {"type": "R", "before": "Mexico, Brazil, and Chinaproduce", "after": "Germany, Mexico, USA, China, Brazil), the Pharmaceutical Systems Division produces", "start_char_pos": 3676, "end_char_pos": 3708}, {"type": "R", "before": "and value-added glass containers", "after": ", and strong growth products", "start_char_pos": 3762, "end_char_pos": 3794}, {"type": "R", "before": "suitable for self-injection systems.", "after": "for autoinjection systems. Profile page of Ompi website", "start_char_pos": 3827, "end_char_pos": 3863}, {"type": "R", "before": "located in Germany and the US, Stevanato Group also supplies high-quality and high-precision", "after": ", the division is also specialized now in high quality and high precision", "start_char_pos": 3917, "end_char_pos": 4009}, {"type": "R", "before": "for the", "after": "developed and manufactured to meet customers\u2019 specific needs. Balda's healthcare segment is active in", "start_char_pos": 4029, "end_char_pos": 4036}, {"type": "R", "before": "markets, as well as contract manufacturing services.", "after": "device applications. Stevanato Group acquires operating units of Balda Group - Press Release Page of Stevanato Group website", "start_char_pos": 4076, "end_char_pos": 4128}, {"type": "R", "before": "Analytical services", "after": "Engineering Systems Division", "start_char_pos": 4129, "end_char_pos": 4148}, {"type": "D", "before": "Through its laboratory in Italy and a Technology Excellence Center opened in Boston in 2020, Stevanato Group provides analytical services investigating physicochemical properties of primary packaging materials and components, and the integration within delivery devices.", "after": null, "start_char_pos": 4149, "end_char_pos": 4419}, {"type": "D", "before": "Technologies: glass forming, visual inspection, assembly and packaging solutions", "after": null, "start_char_pos": 4420, "end_char_pos": 4500}, {"type": "R", "before": "From its outset, Stevanato Group designed and assembled automated lines for the transformation of glass tubing into containers for pharmaceutical use. Over the years, the company gained a technological leadership in glass tubing processing, producing", "after": "The Engineering Systems Division consists of SPAMI (with its brand Optrel), InnoScan and SVM Automatik. Spami designs and manufactures machinery for glass tubing converting for the production of", "start_char_pos": 4530, "end_char_pos": 4780}, {"type": "D", "before": "and ampoules .", "after": null, "start_char_pos": 4810, "end_char_pos": 4824}, {"type": "R", "before": "Stevanato Group is also specialized in pharma vision inspection systems, having sound expertise in drug inspection, including liquid, emulsions, viscous, gel-like, powder, and lyophilized products through Italian and Danish companies", "after": "ampoules and special devices.", "start_char_pos": 4825, "end_char_pos": 5058}, {"type": "R", "before": ". The company boasts a broad portfolio of machines, supporting customers from lab development all the way to large scale production, counting on the same software for more straightforward scale-up.", "after": "refer to the visual inspection area focused on the inspection machines market for the pharmaceutical industry. Brands page of Stevanato Group website SVM Automatik is a company specialized in assembly, packaging and serialization solutions for the pharmaceutical industry.", "start_char_pos": 5079, "end_char_pos": 5276}, {"type": "D", "before": "Through SVM, the Group also offers modular flexible and customized assemblyand packaging solutions that can allow a high degree of customization thanks to various platforms and standard modules.", "after": null, "start_char_pos": 5277, "end_char_pos": 5471}, {"type": "D", "before": "Assembly and packaging systems that streamline pharmaceutical companies' processing and packaging requirements and contract manufacturers are part of SG offering. The modular and \ufb02exible production lines adapt to di\ufb00erent manufacturing programs.", "after": null, "start_char_pos": 5472, "end_char_pos": 5717}, {"type": "D", "before": "Drug Delivery Devices", "after": null, "start_char_pos": 5747, "end_char_pos": 5768}, {"type": "D", "before": "By combining glass, plastics, engineering, and analytical capabilities, the company can now develop and produce advanced, user-friendly drug delivery systems, such as pen injectors, auto-injectors, wearables, and inhalers.", "after": null, "start_char_pos": 5769, "end_char_pos": 5991}, {"type": "R", "before": "a", "after": "the", "start_char_pos": 6144, "end_char_pos": 6145}, {"type": "R", "before": "on", "after": "in", "start_char_pos": 6443, "end_char_pos": 6445}, {"type": "R", "before": ", and pharmaceutical segments", "after": "and pharmaceutical segment", "start_char_pos": 6482, "end_char_pos": 6511}, {"type": "A", "before": null, "after": "History page of Balda website", "start_char_pos": 6558, "end_char_pos": 6558}, {"type": "A", "before": null, "after": "and Ontario", "start_char_pos": 6578, "end_char_pos": 6578}, {"type": "R", "before": ", aerospace, electronics and consumer markets.", "after": "market and turning machine service supporting the Aerospace, Medical, Electronic and Consumer industries. Balda website", "start_char_pos": 6689, "end_char_pos": 6735}, {"type": "A", "before": null, "after": "refers to the Engineering Systems Division of the Group and", "start_char_pos": 6748, "end_char_pos": 6748}, {"type": "D", "before": "(under the brand Optrel)", "after": null, "start_char_pos": 6887, "end_char_pos": 6911}, {"type": "A", "before": null, "after": "History page of Stevanato Group website", "start_char_pos": 6949, "end_char_pos": 6949}, {"type": "A", "before": null, "after": "InnoScan Corporate website", "start_char_pos": 7067, "end_char_pos": 7067}, {"type": "R", "before": "solutionsfor", "after": "solutions for", "start_char_pos": 7206, "end_char_pos": 7218}], "sents_char_pos": [0, 89, 206, 327, 528, 585, 731, 812, 1037, 1207, 1374, 1482, 1573, 1651, 1783, 1923, 2273, 2357, 2583, 2805, 3209, 3389, 3513, 3863, 4128, 4419, 4680, 4824, 5080, 5276, 5471, 5634, 5717, 5991, 6044, 6199, 6353, 6513, 6557, 6735, 6769, 6817, 6948, 7066, 7146]}
+{"doc_id": "3919574", "revision_depth": "1", "before_revision": "Although there is an actual steam cleaning industrial process, in the context of carpet cleaning, \"steam cleaning\" is often mistaken for hot water soil extraction cleaning, which is professionally known as HWE. The hot water soil extraction cleaning method uses equipment that sprays heated water and detergent on the carpet and simultaneously, the water and detergent is extracted, along with any dislodged and dissolved dirt. Many experts recommend hot water extraction as the most effective carpet cleaning method. Actual steam could damage man-made carpet fibers and change the characteristics as they are usually set using heat. Woven carpets can shrink but most carpets are not woven and are in fact tuffed on a laminate backing, velvet-piled carpets and Berber carpets may become fuzzy which is known as pile burst. Most problems can be avoided by professional experienced cleaners. Hot water extraction equipment may be a portable unit that plugs into an electrical outlet, or a truck mount carpet cleaner requiring long hoses from the truck or trailer. Truck-mounted equipment may be used where electricity is unavailable, but may be unsuited to premises distant from a driveway or road, and require hoses to pass through windows to reach the upper floors of a building. The hoses needed for truck-mount and professional portable carpet cleaning may present a trip hazard, and allow pets or children to escape through doors left ajar. Heated or air conditioned air can also be wasted when doors are left open for hoses. Truck-mounted carpet cleaning equipment minimizes the noise in the room being cleaned, but may cause noise and air pollution offensive to neighbors, and could violate anti-idling bylaws in some jurisdictions. However, truck-mounted cleaning is much faster than portable equipment , and the extra heat will dissolve more spots and stains, and more vacuum suction power will reduce drying times . A Rug Doctor rental carpet cleaning machine A common process of hot water extraction begins with preconditioning. Alkaline agents such as ammonia solution for synthetic carpets, or acidic solution (such as vinegar solution) for woollen carpets, are sprayed into the carpet, then agitated with a grooming brush or an automatic scrubbing machine. Next, a pressurized manual or automatic cleaning tool ( known as a wand ) passes over the surface to rinse out all pre-conditioner, residue, and particulates. If an alkaline detergent is used on a woollen carpet, use of a mild acetic acid solution will restore neutral fiber pH. The acidic rinse thus neutralizes the alkaline residues, and can contribute to softening cleaned fabrics. Extraction is , by far, the most important step in the hot water extraction process. Since the hot-water extraction method uses much more water than other methods like bonnet or shampoo cleaning, proper extraction and air flow are critical to avoid drying issues such as mold growth %DIFDELCMD < & %%% browning of wool fibres. Drying time may also be decreased by extra use of fans, de-humidifiers, and/or outdoor ventilation. Older surfaces, such as double jute-backed carpets and loose rugs with natural foundation yarns, could shrink after a wet treatment, leading to suppositions that wet-cleaning could also remove wrinkles. However, this notion is antiquated and this method could also occasionally tear seams or uproot strips. Newer carpets, such as with synthetic backing and foundation yarns, do not shrink, and they smooth easily; in such carpets, wrinkles indicate an underlying problem, such as delamination where the secondary backing becomes unstuck from the primary backing, that may need a certified carpet inspector to determine.%DIFDELCMD < %DIFDELCMD < %%% Wet-cleaning systems naturally require drying time, which may lead to concerns about very slow drying, the risk of soiling returning during drying as the moisture evaporates bringing the soils from deeper within the pile to the surface, as well as odors, bacteria, fungi, molds, and mildews. Carpet cleaning specialists try to find a balance between rapid drying ( attributable to lower flow rate through the cleaning jets of a spray system ) and the need to remove the most soil ( attributable to higher flow rate). Pretreatments similar to those in dry-cleaning and \"very low moisture\" systems are employed, but require a longer dwell time of 15 to 20 minutes, because of lower amounts of carpet agitation. Ideal pretreatments should rinse easily and leave dry, powdery, or crystalline residue that can be flushed without contributing to re-soiling .", "after_revision": "Hot water extraction, sometimes mistakenly called \"steam cleaning\" , uses equipment that sprays hot water and detergent into the carpet and extracts it along with any dislodged and dissolved dirt. Many experts recommend hot water extraction as the most effective carpet cleaning method. Hot water extraction equipment may be a portable electrical units, or for large jobs truck mount carpet cleaner with long hoses may be used as this may be faster and more effective than portable equipment . A Rug Doctor rental carpet cleaning machine A common process of hot water extraction begins with preconditioning. Alkaline agents such as ammonia solution for synthetic carpets, or mild acidic solutions such as dilute acetic acid for woollen carpets, are sprayed into the carpet, then agitated with a grooming brush or an automatic scrubbing machine. Next, a pressurized manual or automatic cleaning tool known as a wand passes over the surface to rinse out all pre-conditioner, residue, and particulates. If an alkaline detergent is used on a woollen carpet, a mild acetic acid solution will neutralize the alkaline residues and restore neutral fiber pH. Thorough extraction is important to avoid problems such as mold growth %DIFDELCMD < & %%% and browning of wool %DIFDELCMD < %DIFDELCMD < %%% . Carpet cleaning specialists try to find a balance between rapid drying ( using less fluid ) and the need to remove the most soil ( using more fluid). Drying time may also be decreased by fans, de-humidifiers or simply opening windows .", "edit_actions": [{"type": "R", "before": "Although there is an actual steam cleaning industrial process, in the context of carpet cleaning,", "after": "Hot water extraction, sometimes mistakenly called", "start_char_pos": 0, "end_char_pos": 97}, {"type": "R", "before": "is often mistaken for hot water soil extraction cleaning, which is professionally known as HWE. The hot water soil extraction cleaning method", "after": ",", "start_char_pos": 115, "end_char_pos": 256}, {"type": "R", "before": "heated", "after": "hot", "start_char_pos": 284, "end_char_pos": 290}, {"type": "R", "before": "on", "after": "into", "start_char_pos": 311, "end_char_pos": 313}, {"type": "R", "before": "simultaneously, the water and detergent is extracted,", "after": "extracts it", "start_char_pos": 329, "end_char_pos": 382}, {"type": "D", "before": "Actual steam could damage man-made carpet fibers and change the characteristics as they are usually set using heat. Woven carpets can shrink but most carpets are not woven and are in fact tuffed on a laminate backing, velvet-piled carpets and Berber carpets may become fuzzy which is known as pile burst. Most problems can be avoided by professional experienced cleaners.", "after": null, "start_char_pos": 518, "end_char_pos": 889}, {"type": "R", "before": "unit that plugs into an electrical outlet, or a", "after": "electrical units, or for large jobs", "start_char_pos": 939, "end_char_pos": 986}, {"type": "R", "before": "requiring long hoses from the truck or trailer. Truck-mounted equipment", "after": "with long hoses", "start_char_pos": 1014, "end_char_pos": 1085}, {"type": "R", "before": "where electricity is unavailable, but may be unsuited to premises distant from a driveway or road, and require hoses to pass through windows to reach the upper floors of a building. The hoses needed for truck-mount and professional portable carpet cleaning may present a trip hazard, and allow pets or children to escape through doors left ajar. Heated or air conditioned air can also be wasted when doors are left open for hoses. Truck-mounted carpet cleaning equipment minimizes the noise in the room being cleaned, but may cause noise and air pollution offensive to neighbors, and could violate anti-idling bylaws in some jurisdictions. However, truck-mounted cleaning is much faster", "after": "as this may be faster and more effective", "start_char_pos": 1098, "end_char_pos": 1784}, {"type": "D", "before": ", and the extra heat will dissolve more spots and stains, and more vacuum suction power will reduce drying times", "after": null, "start_char_pos": 1809, "end_char_pos": 1921}, {"type": "R", "before": "acidic solution (such as vinegar solution)", "after": "mild acidic solutions such as dilute acetic acid", "start_char_pos": 2105, "end_char_pos": 2147}, {"type": "D", "before": "(", "after": null, "start_char_pos": 2323, "end_char_pos": 2324}, {"type": "D", "before": ")", "after": null, "start_char_pos": 2341, "end_char_pos": 2342}, {"type": "D", "before": "use of", "after": null, "start_char_pos": 2482, "end_char_pos": 2488}, {"type": "A", "before": null, "after": "neutralize the alkaline residues and", "start_char_pos": 2522, "end_char_pos": 2522}, {"type": "D", "before": "The acidic rinse thus neutralizes the alkaline residues, and can contribute to softening cleaned fabrics.", "after": null, "start_char_pos": 2549, "end_char_pos": 2654}, {"type": "R", "before": "Extraction is , by far, the most important step in the hot water extraction process. Since the hot-water extraction method uses much more water than other methods like bonnet or shampoo cleaning, proper extraction and air flow are critical to avoid drying issues", "after": "Thorough extraction is important to avoid problems", "start_char_pos": 2655, "end_char_pos": 2917}, {"type": "A", "before": null, "after": "and", "start_char_pos": 2957, "end_char_pos": 2957}, {"type": "D", "before": "fibres. Drying time may also be decreased by extra use of fans, de-humidifiers, and/or outdoor ventilation.", "after": null, "start_char_pos": 2975, "end_char_pos": 3082}, {"type": "D", "before": "Older surfaces, such as double jute-backed carpets and loose rugs with natural foundation yarns, could shrink after a wet treatment, leading to suppositions that wet-cleaning could also remove wrinkles. However, this notion is antiquated and this method could also occasionally tear seams or uproot strips. Newer carpets, such as with synthetic backing and foundation yarns, do not shrink, and they smooth easily; in such carpets, wrinkles indicate an underlying problem, such as delamination where the secondary backing becomes unstuck from the primary backing, that may need a certified carpet inspector to determine.", "after": null, "start_char_pos": 3083, "end_char_pos": 3702}, {"type": "R", "before": "Wet-cleaning systems naturally require drying time, which may lead to concerns about very slow drying, the risk of soiling returning during drying as the moisture evaporates bringing the soils from deeper within the pile to the surface, as well as odors, bacteria, fungi, molds, and mildews.", "after": ".", "start_char_pos": 3732, "end_char_pos": 4023}, {"type": "R", "before": "attributable to lower flow rate through the cleaning jets of a spray system", "after": "using less fluid", "start_char_pos": 4097, "end_char_pos": 4172}, {"type": "D", "before": "attributable to higher flow rate).", "after": null, "start_char_pos": 4214, "end_char_pos": 4248}, {"type": "R", "before": "Pretreatments similar to those in dry-cleaning and \"very low moisture\" systems are employed, but require a longer dwell time of 15 to 20 minutes, because of lower amounts of carpet agitation. Ideal pretreatments should rinse easily and leave dry, powdery, or crystalline residue that can be flushed without contributing to re-soiling", "after": "using more fluid). Drying time may also be decreased by fans, de-humidifiers or simply opening windows", "start_char_pos": 4249, "end_char_pos": 4582}], "sents_char_pos": [0, 210, 427, 517, 633, 822, 889, 1061, 1279, 1443, 1528, 1737, 1923, 2037, 2268, 2427, 2548, 2654, 2739, 2982, 3082, 3285, 3389, 3496, 3702, 4023, 4248, 4440]}
+{"doc_id": "39313511", "revision_depth": "1", "before_revision": "MediaSmarts ( formerly the Media Awareness Network ) is a Canadian non-profit organization based in Ottawa, Ontario that focuses on media literacy programs . In particular, the organization promotes critical thinking via education resources and analyzes the content of various types of mass media. Surveys and studies performed by MediaSmarts have explored youth media consumption, such as television and internet use, as well as media issues. In recent years the organization's focus has shifted more heavily to digital literacy, although it continues to produce resources on traditional media. The organisation also does business in the French language, under the name HabiloM\u00e9dias. The funding for MediaSmarts is primarily derived from private sector sponsors and Canadian Government grants. \"MediaSmarts - About Us\", MediaSmarts The group partnered with Microsoft and Bell Canada to produce web resources for teachers and parents to protect kids online. MediaSmarts has received a number of awards for its work, including awards from UNESCO Global Alliance for Partnerships on Media and Information and the Canadian Race Relations Foundation, as well as several online awards for web-based content. \"MediaSmarts Awards Recognition\" Research One of the large studies undertaken by MediaSmarts is Young Canadians in a Wired World , a research study to investigate and track and the \"behaviours, attitudes, and opinions\" of Internet use in Canadian children and youth . \" MediaSmarts Research and Policy \" , MediaSmarts Results from this study, which indicate high levels of personal information collection by websites popular with children, \"Market researchers target kids with online games\", CBC News, February 4, 2008 have been cited to argue that parental supervision of child internet use alone \"cannot adequately protect children\" that have the highest levels of social internet use. Rebranding Formerly founded as Media Awareness Network, the organisation was relaunched on May 29, 2012 as MediaSmarts. The new brand was developed pro-bono by Toronto-based advertising agency, Brandworks.\"MNet launches its new brand for the digital age\", MediaSmarts Media Literacy Week Media Literacy Week \"Media Literacy Week\", Media Literacy Week is an annual national campaign hosted each autumn by MediaSmarts and the Canadian Teachers' Federation to promote digital and media literacy, with activities and events taking place in classrooms, libraries, museums and community groups through over 90 collaborating organizations. Having started in Canada , Media Literacy Week is now internationally celebrated in the U.S. and in countries around the world. In 2019, MediaSmarts remade the popular House Hippo public service announcement as part of their Break the Fake campaign . The House Hippo was originally created by a similar, since-defunct organisation , Companies Committed to Kids. & References Category:Educational organizations based in Canada Category:Communications and media organizations based in Canada Category:Media studies Category:Organizations based in Otta", "after_revision": "MediaSmarts ( ; formerly the Media Awareness Network , MNet ) is a Canadian non-profit organization based in Ottawa, Ontario , that focuses on digital and media literacy programs and resources . In particular, the organization promotes critical thinking via educational resources and analyzes the content of various types of mass media. Surveys and studies performed by MediaSmarts have explored youth media consumption, such as television and internet use, as well as media issues. In recent years , the organization's focus has shifted more heavily to digital literacy, although it continues to produce resources on traditional media. The funding for MediaSmarts is primarily derived from private sector sponsors and federal government grants. The group has also partnered with Microsoft and Bell Canada to produce web resources for teachers and parents to protect kids online. MediaSmarts has received a number of awards for its work, including awards from UNESCO Global Alliance for Partnerships on Media and Information and the Canadian Race Relations Foundation, as well as several online awards for web-based content. Activities Research In 2000, the organization released the results of Canada\u2019s Children in a Wired World: The Parents\u2019 View, Canada's first survey of Canadian parents on the subject of their children\u2019s Internet use. That same year, the organization launched a large research program called Young Canadians in a Wired World (YCWW), an ongoing study to investigate and track and the \"behaviours, attitudes, and opinions\" of Internet use among Canadian children and youth \u2014the largest and most comprehensive study of this kind in Canada. A year later, in 2001, the results of a \" groundbreaking \" survey of almost 6,000 Canadian students was released by the organization: Young Canadians in a Wired World: The Students\u2019 View. In 2019, during the fourth phase of the study, the \"Young Canadians in a Wired World\" was renamed Young Canadians in a Wireless World. Results from the ongoing study, which indicate high levels of personal information collection by websites popular with children, have been cited to argue that parental supervision of child internet-use alone \"cannot adequately protect children\" who have the highest levels of social internet use. In addition to YCWW research, MediaSmarts produces papers\u2014both independently and in partnership with other organizations\u2014on a variety of media issues, including digital literacy, privacy education, online civic engagement, food marketing, and Internet governance. Campaigns Media Literacy Week is a national campaign annually hosted each autumn by MediaSmarts and the Canadian Teachers' Federation to promote digital and media literacy, with activities and events taking place in classrooms, libraries, museums , and community groups through over 90 collaborating organizations. \"Media Literacy Week\", Media Literacy Week The event began in Canada in 2006 as National Media Education Week\u2014changing its name to \"Media Literacy Week\" in 2009\u2014and is now internationally celebrated , such as in the URL and in countries around the URL In 2019, as part of their Break the Fake campaign (funded by Canadian URL MediaSmarts remade the popular House Hippo public service announcement . The House Hippo was originally created by a similar, since-defunct organisation called Companies Committed to Kids. History The organization was founded as the Media Awareness Network (MNet) in 1994 under the auspices of the National Film Board of Canada (NFB). The following year, MNet began to receive seed funding from Bell Canada, CBC, Western International Communications, CHUM Television, as well as from the federal departments Health Canada, Justice Canada, Canadian Heritage, Industry Canada, and the Department of Foreign Affairs and International Trade. Soon after, in 1996, the MNet would be incorporated as an independent non-profit organization, along with launching its media education website. Three years later, it was granted charitable status. In 1999, with the help of MNet's work, the Canadian Radio-television and Telecommunications Commission (CRTC) announced that it would not regulate the Internet. In 2001, with MNet as a key partner, the federal government released its \"Cyberwise\" strategy on addressing illegal and offensive content on the Internet. On 29 May 2012, one year after their 15th anniversary, the organisation was relaunched as MediaSmarts. The new brand was developed pro-bono by Toronto-based advertising agency, Brandworks. In 2014, MediaSmarts partnered with the Information and Communications Technology Council to host a Youth and Digital Skills symposium to advance the development of digital literacy skills in Canada. In 2016, the organization partnered with the CRTC, NFB, and Canadian Heritage in a Youth Discoverability Summit, exploring the ways in which youth access content in the modern age. Organization MediaSmarts is governed by an elected, volunteer Board of Directors, which includes representatives of media companies and such stakeholder sectors as education, libraries, and community- and youth-serving organizations. The 2020-2021 Executive Committee consists of: Chair: Suzanne Morin \u2014 Vice President of Enterprise Conduct, Data Ethics and Chief Privacy Officer, Sun Life Vice-Chair: David Fowler \u2014 Vice-president of Canadian Internet Registration Authority (CIRA) Treasurer: Mara Tramontin \u2014 Director of Program Business Management, TVOntario Member-at-Large: Mary Cavanagh \u2014 Associate Professor, University of Ottawa School of Information Studies Member-at-Large: Michael Hoechsmann \u2014 Associate Professor, Lakehead University The 2020-2021 board members include: Ruby Barber \u2014 Assistant General Counsel of Legal Regulatory Affairs, Bell Canada Serge Carrier \u2014 Director of Business Development, Soci\u00e9t\u00e9 de formation \u00e0 distance des commissions scolaires du Qu\u00e9bec (SOFAD) Kevin Chan \u2014 Head of Public Policy, Canada, Facebook and Instagram J\u00e9r\u00f4me Dufour \u2014 Director General of Distribution, Communications and Marketing, National Film Board of Canada Monika Ille \u2014 Chief Executive Director, Aboriginal Peoples Television Network (APTN) Nimtaz Kanji \u2014 Director \u2013 TELUS Wise, Telus Communications Inc. Normand Landry \u2014 Professor, T\u00c9LUQ University Colin McKay \u2014 Head of Public Policy and Government Relations, Canada, Google Inc. Shelley L. Morse \u2014 President, Canadian Teachers\u2019 Federation Ramona Pringle \u2014 Associate Professor of Media and Director of The Creative Innovation Studio, Ryerson University Sponsors The funding for MediaSmarts is primarily derived from private sector sponsors and federal government grants. In particular, the work of MediaSmarts is supported by various companies and organizations. The Governor General of Canada is also a patron of MediaSmarts. , MediaSmarts sponsors include: TELUS (Platinum) Canadian Internet Registration Authority (Platinum) Bell Canada (Gold Donor/Founding Sponsor) Facebook (Gold Sponsor) Google (Silver Sponsor) National Film Board of Canada (Associate Sponsor) APTN (Associate Sponsor) Bell Media (Benefactor) Partners In the 2019 fiscal year, MediaSmarts partnered with the following URL Alberta Teachers' Association Apathy is Boring Agence Science-Presse Boys Girls Club of Canada Canadian Association of Journalists Canadian Commission for UNESCO CBC Kids CHEO YouthNet CIRA Community Information Centre of Ottawa Canadian Paediatric Society Canadian Standards Association Canadian Teachers\u2019 Federation CLEMI Canadian Practitioners Network for the Prevention of Radicalization and Extremist Violence (CPN-PREV) Crime Prevention Ottawa Disconnect Challenge Alberta Elections Canada Encounters With Canada eQuality Facebook FOSI Goodly Labs, Berkeley Institute for Data Science Girl Guides ICTC Imagine Canada Immunize Canada Institute Canadian Citizenship International School Health Network Internet Society National NewsMedia Council Ontario Library Association Ottawa Public Library PREVNet Ryerson Democratic Engagement Exchange Screen-Free Week Shaw TELUS TrendMicro Twitter UNESCO GAPMIL Wattpad Youth Ottawa YWCA Federal government partners Canadian Heritage CRTC Historica Canada ISED Office of the Privacy Commissioner Public Health Agency of Canada Public Safety Canada University partners Carleton University Concordia University Simon Fraser University University of Toronto University of Waterloo Awards and recognition MediaSmarts has received a number of awards for its work, including awards from UNESCO Global Alliance for Partnerships on Media and Information, as well as several online awards for web-based content. In 1999, MNet was awarded the inaugural Canadian Race Relations Foundation Award of Excellence by the Canadian Race Relations Foundation in recognition of its \"extensive collection of anti-racism education resources.\" In 2006, MNet was included as a Canadian \"best practice\" in UNESCO\u2019s comprehensive Media Education: A Kit for Teachers, Students, Parents and Professionals. +AwardsDateAwardAward category/recognitionSponsor/host1997 OctNAWeb Best of the WebBest Educational Web Site, PrivateWorld Wide Web Courseware Developers Association (North American Web Conference)1998 JuneMagic Lantern AwardOutstanding Achievement in the Field of Media Literacy in Education in CanadaMagic Lantern Communications1998 JuneAMTEC Award of Excellencerecognition of outstanding achievement in educational multimedia.Association for Media and Technology in Education in Canada (AMTEC) 1998 OctNAWeb Best of the WebBest Educational Web Site, K-12World Wide Web Courseware Developers Association1999 MarchAward of Excellence in Race Relationsrecognition of innovation and excellence in anti-racism education.Canadian Race Relations Foundation1999 OctNAWeb Best of the WebBest Educational Web Site, K-12World Wide Web Courseware Developers Association2000 DecNAWeb Best of the WebBest Educational Web Site, K-12World Wide Web Courseware Developers Association2001 AprilCanarie IWAY AwardAward for Community Service2003 NAWeb Best of the WebEducational Internet Site of the Year Award2004 FebWiredKids Excellence in Internet Awareness and Education Awardrecognition \"as a global leader in Internet safety education\"WiredSafety2006 AprilSummit Creative AwardsYouth Website (bronze)Summit Awards2009 DecMEDEA AwardsHighly CommendedMedia& Learning Conference2011 Nov 24MEDEA AwardsHighly CommendedMedia Learning Conference2018UNESCO GAPMIL Global Media and Information Literacy Awardrecognition of over 20 years of leadership in media literacyUNESCO Global Alliance for Partnerships on Media and Information Literacy References Category:Educational organizations based in Canada Category:Communications and media organizations based in Canada Category:Media studies Category:Organizations based in Ottawa Category:Non-profit organizations based in Ca", "edit_actions": [{"type": "A", "before": null, "after": ";", "start_char_pos": 14, "end_char_pos": 14}, {"type": "A", "before": null, "after": ", MNet", "start_char_pos": 52, "end_char_pos": 52}, {"type": "A", "before": null, "after": ",", "start_char_pos": 118, "end_char_pos": 118}, {"type": "A", "before": null, "after": "digital and", "start_char_pos": 135, "end_char_pos": 135}, {"type": "A", "before": null, "after": "and resources", "start_char_pos": 160, "end_char_pos": 160}, {"type": "R", "before": "education", "after": "educational", "start_char_pos": 226, "end_char_pos": 235}, {"type": "A", "before": null, "after": ",", "start_char_pos": 465, "end_char_pos": 465}, {"type": "D", "before": "organisation also does business in the French language, under the name HabiloM\u00e9dias.", "after": null, "start_char_pos": 606, "end_char_pos": 690}, {"type": "D", "before": "The", "after": null, "start_char_pos": 691, "end_char_pos": 694}, {"type": "R", "before": "Canadian Government grants. \"MediaSmarts - About Us\", MediaSmarts The group", "after": "federal government grants. The group has also", "start_char_pos": 773, "end_char_pos": 848}, {"type": "D", "before": "\"MediaSmarts Awards", "after": null, "start_char_pos": 1209, "end_char_pos": 1228}, {"type": "D", "before": "Recognition\"", "after": null, "start_char_pos": 1229, "end_char_pos": 1241}, {"type": "R", "before": "Research One of the large studies undertaken by MediaSmarts is", "after": "Activities", "start_char_pos": 1242, "end_char_pos": 1304}, {"type": "A", "before": null, "after": "Research In 2000, the organization released the results of Canada\u2019s Children in a Wired World: The Parents\u2019 View, Canada's first survey of Canadian parents on the subject of their children\u2019s Internet use.", "start_char_pos": 1305, "end_char_pos": 1305}, {"type": "A", "before": null, "after": "That same year, the organization launched a large research program called", "start_char_pos": 1306, "end_char_pos": 1306}, {"type": "R", "before": ", a research", "after": "(YCWW), an ongoing", "start_char_pos": 1340, "end_char_pos": 1352}, {"type": "R", "before": "in", "after": "among", "start_char_pos": 1446, "end_char_pos": 1448}, {"type": "R", "before": ".", "after": "\u2014the largest and most comprehensive study of this kind in Canada. A year later, in 2001, the results of a", "start_char_pos": 1477, "end_char_pos": 1478}, {"type": "R", "before": "MediaSmarts Research and Policy", "after": "groundbreaking", "start_char_pos": 1481, "end_char_pos": 1512}, {"type": "R", "before": ", MediaSmarts Results from this", "after": "survey of almost 6,000 Canadian students was released by the organization: Young Canadians in a Wired World: The Students\u2019 View.", "start_char_pos": 1515, "end_char_pos": 1546}, {"type": "A", "before": null, "after": "In 2019, during the fourth phase of the study, the \"Young Canadians in a Wired World\" was renamed Young Canadians in a Wireless World.", "start_char_pos": 1547, "end_char_pos": 1547}, {"type": "A", "before": null, "after": "Results from the ongoing", "start_char_pos": 1548, "end_char_pos": 1548}, {"type": "D", "before": "\"Market researchers target kids with online games\", CBC News, February 4, 2008", "after": null, "start_char_pos": 1653, "end_char_pos": 1731}, {"type": "R", "before": "internet use", "after": "internet-use", "start_char_pos": 1792, "end_char_pos": 1804}, {"type": "R", "before": "that", "after": "who", "start_char_pos": 1848, "end_char_pos": 1852}, {"type": "R", "before": "Rebranding Formerly founded as Media Awareness Network, the organisation was relaunched on May 29, 2012 as MediaSmarts. The new brand was developed pro-bono by Toronto-based advertising agency, Brandworks.\"MNet launches its new brand for the digital age\", MediaSmarts", "after": "In addition to YCWW research, MediaSmarts produces papers\u2014both independently and in partnership with other organizations\u2014on a variety of media issues, including digital literacy, privacy education, online civic engagement, food marketing, and Internet governance.", "start_char_pos": 1901, "end_char_pos": 2168}, {"type": "A", "before": null, "after": "Campaigns", "start_char_pos": 2169, "end_char_pos": 2169}, {"type": "R", "before": "Media Literacy Week \"Media Literacy Week\", Media Literacy Week is an annual national campaign", "after": "is a national campaign annually", "start_char_pos": 2190, "end_char_pos": 2283}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2469, "end_char_pos": 2469}, {"type": "R", "before": "Having started in Canada , Media Literacy Week", "after": "\"Media Literacy Week\", Media Literacy Week", "start_char_pos": 2536, "end_char_pos": 2582}, {"type": "A", "before": null, "after": "The event began in Canada in 2006 as National Media Education Week\u2014changing its name to \"Media Literacy Week\" in 2009\u2014and", "start_char_pos": 2583, "end_char_pos": 2583}, {"type": "R", "before": "in the U.S.", "after": ", such as in the URL", "start_char_pos": 2618, "end_char_pos": 2629}, {"type": "R", "before": "world.", "after": "URL", "start_char_pos": 2658, "end_char_pos": 2664}, {"type": "A", "before": null, "after": "as part of their Break the Fake campaign (funded by Canadian URL", "start_char_pos": 2674, "end_char_pos": 2674}, {"type": "D", "before": "as part of their Break the Fake campaign", "after": null, "start_char_pos": 2746, "end_char_pos": 2786}, {"type": "R", "before": ",", "after": "called", "start_char_pos": 2869, "end_char_pos": 2870}, {"type": "A", "before": null, "after": "History The organization was founded as the Media Awareness Network (MNet) in 1994 under the auspices of the National Film Board of Canada (NFB). The following year, MNet began to receive seed funding from Bell Canada, CBC, Western International Communications, CHUM Television, as well as from the federal departments Health Canada, Justice Canada, Canadian Heritage, Industry Canada, and the Department of Foreign Affairs and International Trade. Soon after, in 1996, the MNet would be incorporated as an independent non-profit organization, along with launching its media education website. Three years later, it was granted charitable status.", "start_char_pos": 2900, "end_char_pos": 2900}, {"type": "A", "before": null, "after": "In 1999, with the help of MNet's work, the Canadian Radio-television and Telecommunications Commission (CRTC) announced that it would not regulate the Internet. In 2001, with MNet as a key partner, the federal government released its \"Cyberwise\" strategy on addressing illegal and offensive content on the Internet.", "start_char_pos": 2901, "end_char_pos": 2901}, {"type": "A", "before": null, "after": "On 29 May 2012, one year after their 15th anniversary, the organisation was relaunched as MediaSmarts. The new brand was developed pro-bono by Toronto-based advertising agency, Brandworks.", "start_char_pos": 2902, "end_char_pos": 2902}, {"type": "A", "before": null, "after": "In 2014, MediaSmarts partnered with the Information and Communications Technology Council to host a Youth and Digital Skills symposium to advance the development of digital literacy skills in Canada. In 2016, the organization partnered with the CRTC, NFB, and Canadian Heritage in a Youth Discoverability Summit, exploring the ways in which youth access content in the modern age.", "start_char_pos": 2903, "end_char_pos": 2903}, {"type": "A", "before": null, "after": "Organization MediaSmarts is governed by an elected, volunteer Board of Directors, which includes representatives of media companies and such stakeholder sectors as education, libraries, and community- and youth-serving organizations.", "start_char_pos": 2904, "end_char_pos": 2904}, {"type": "A", "before": null, "after": "The 2020-2021 Executive Committee consists of:", "start_char_pos": 2905, "end_char_pos": 2905}, {"type": "A", "before": null, "after": "Chair: Suzanne Morin \u2014 Vice President of Enterprise Conduct, Data Ethics and Chief Privacy Officer, Sun Life Vice-Chair: David Fowler \u2014 Vice-president of Canadian Internet Registration Authority (CIRA) Treasurer: Mara Tramontin \u2014 Director of Program Business Management, TVOntario Member-at-Large: Mary Cavanagh \u2014 Associate Professor, University of Ottawa School of Information Studies Member-at-Large: Michael Hoechsmann \u2014 Associate Professor, Lakehead University", "start_char_pos": 2906, "end_char_pos": 2906}, {"type": "A", "before": null, "after": "The 2020-2021 board members include:", "start_char_pos": 2907, "end_char_pos": 2907}, {"type": "A", "before": null, "after": "Ruby Barber \u2014 Assistant General Counsel of Legal", "start_char_pos": 2908, "end_char_pos": 2908}, {"type": "A", "before": null, "after": "Regulatory Affairs, Bell Canada Serge Carrier \u2014 Director of Business Development, Soci\u00e9t\u00e9 de formation \u00e0 distance des commissions scolaires du Qu\u00e9bec (SOFAD) Kevin Chan \u2014 Head of Public Policy, Canada, Facebook and Instagram J\u00e9r\u00f4me Dufour \u2014 Director General of Distribution, Communications and Marketing, National Film Board of Canada Monika Ille \u2014 Chief Executive Director, Aboriginal Peoples Television Network (APTN) Nimtaz Kanji \u2014 Director \u2013 TELUS Wise, Telus Communications Inc. Normand Landry \u2014 Professor, T\u00c9LUQ University Colin McKay \u2014 Head of Public Policy and Government Relations, Canada, Google Inc. Shelley L. Morse \u2014 President, Canadian Teachers\u2019 Federation Ramona Pringle \u2014 Associate Professor of Media and Director of The Creative Innovation Studio, Ryerson University", "start_char_pos": 2909, "end_char_pos": 2909}, {"type": "A", "before": null, "after": "Sponsors The funding for MediaSmarts is primarily derived from private sector sponsors and federal government grants. In particular, the work of MediaSmarts is supported by various companies and organizations. The Governor General of Canada is also a patron of MediaSmarts.", "start_char_pos": 2910, "end_char_pos": 2910}, {"type": "A", "before": null, "after": ", MediaSmarts sponsors include:", "start_char_pos": 2911, "end_char_pos": 2911}, {"type": "A", "before": null, "after": "TELUS (Platinum) Canadian Internet Registration Authority (Platinum) Bell Canada (Gold Donor/Founding Sponsor) Facebook (Gold Sponsor) Google (Silver Sponsor) National Film Board of Canada (Associate Sponsor) APTN (Associate Sponsor) Bell Media (Benefactor)", "start_char_pos": 2912, "end_char_pos": 2912}, {"type": "A", "before": null, "after": "Partners In the 2019 fiscal year, MediaSmarts partnered with the following URL", "start_char_pos": 2913, "end_char_pos": 2913}, {"type": "A", "before": null, "after": "Alberta Teachers' Association Apathy is Boring Agence Science-Presse Boys", "start_char_pos": 2914, "end_char_pos": 2914}, {"type": "A", "before": null, "after": "Girls Club of Canada Canadian Association of Journalists Canadian Commission for UNESCO CBC Kids CHEO YouthNet CIRA Community Information Centre of Ottawa Canadian Paediatric Society Canadian Standards Association Canadian Teachers\u2019 Federation CLEMI Canadian Practitioners Network for the Prevention of Radicalization and Extremist Violence (CPN-PREV) Crime Prevention Ottawa Disconnect Challenge Alberta Elections Canada Encounters With Canada eQuality Facebook FOSI Goodly Labs, Berkeley Institute for Data Science Girl Guides ICTC Imagine Canada Immunize Canada Institute Canadian Citizenship International School Health Network Internet Society National NewsMedia Council Ontario Library Association Ottawa Public Library PREVNet Ryerson Democratic Engagement Exchange Screen-Free Week Shaw TELUS TrendMicro Twitter UNESCO GAPMIL Wattpad Youth Ottawa YWCA", "start_char_pos": 2915, "end_char_pos": 2915}, {"type": "A", "before": null, "after": "Federal government partners", "start_char_pos": 2916, "end_char_pos": 2916}, {"type": "A", "before": null, "after": "Canadian Heritage CRTC Historica Canada ISED Office of the Privacy Commissioner Public Health Agency of Canada Public Safety Canada", "start_char_pos": 2917, "end_char_pos": 2917}, {"type": "A", "before": null, "after": "University partners", "start_char_pos": 2918, "end_char_pos": 2918}, {"type": "A", "before": null, "after": "Carleton University Concordia University Simon Fraser University University of Toronto University of Waterloo", "start_char_pos": 2919, "end_char_pos": 2919}, {"type": "A", "before": null, "after": "Awards and recognition MediaSmarts has received a number of awards for its work, including awards from UNESCO Global Alliance for Partnerships on Media and Information, as well as several online awards for web-based content.", "start_char_pos": 2920, "end_char_pos": 2920}, {"type": "A", "before": null, "after": "In 1999, MNet was awarded the inaugural Canadian Race Relations Foundation Award of Excellence by the Canadian Race Relations Foundation in recognition of its \"extensive collection of anti-racism education resources.\" In 2006, MNet was included as a Canadian \"best practice\" in UNESCO\u2019s comprehensive Media Education: A Kit for Teachers, Students, Parents and Professionals. +AwardsDateAwardAward category/recognitionSponsor/host1997 OctNAWeb Best of the WebBest Educational Web Site, PrivateWorld Wide Web Courseware Developers Association (North American Web Conference)1998 JuneMagic Lantern AwardOutstanding Achievement in the Field of Media Literacy in Education in CanadaMagic Lantern Communications1998 JuneAMTEC Award of Excellencerecognition of outstanding achievement in educational multimedia.Association for Media and Technology in Education in Canada (AMTEC) 1998 OctNAWeb Best of the WebBest Educational Web Site, K-12World Wide Web Courseware Developers Association1999 MarchAward of Excellence in Race Relationsrecognition of innovation and excellence in anti-racism education.Canadian Race Relations Foundation1999 OctNAWeb Best of the WebBest Educational Web Site, K-12World Wide Web Courseware Developers Association2000 DecNAWeb Best of the WebBest Educational Web Site, K-12World Wide Web Courseware Developers Association2001 AprilCanarie IWAY AwardAward for Community Service2003 NAWeb Best of the WebEducational Internet Site of the Year Award2004 FebWiredKids Excellence in Internet Awareness and Education Awardrecognition \"as a global leader in Internet safety education\"WiredSafety2006 AprilSummit Creative AwardsYouth Website (bronze)Summit Awards2009 DecMEDEA AwardsHighly CommendedMedia", "start_char_pos": 2921, "end_char_pos": 2921}, {"type": "A", "before": null, "after": "Learning Conference2011 Nov 24MEDEA AwardsHighly CommendedMedia", "start_char_pos": 2923, "end_char_pos": 2923}, {"type": "A", "before": null, "after": "Learning Conference2018UNESCO GAPMIL Global Media and Information Literacy Awardrecognition of over 20 years of leadership in media literacyUNESCO Global Alliance for Partnerships on Media and Information Literacy", "start_char_pos": 2924, "end_char_pos": 2924}, {"type": "R", "before": "Otta", "after": "Ottawa Category:Non-profit organizations based in Ca", "start_char_pos": 3106, "end_char_pos": 3110}], "sents_char_pos": [0, 162, 302, 448, 601, 690, 800, 963, 1208, 1241, 1429, 1900, 2020, 2107, 2535, 2664, 2788, 2899]}
+{"doc_id": "39892", "revision_depth": "2", "before_revision": "From the initial colonization(s), the Lucayan expanded throughout the Bahamas in some 800 years (c. 700 \u2013 c. 1500), growing to a population of about 40,000. Population density at the time of first European contact was highest in the south-central area of the Bahamas, declining towards the north, reflecting the migration pattern and progressively shorter time of occupation of the northern islands. Known Lucayan settlement sites are confined to the nineteen largest islands in the archipelago, or smaller cays located less than one km. from those islands. The population density in the southernmost Bahamas remained lower, probably due to the drier climate there (less than 800 mm of rain a year on Great Inagua Island and the Turks and Caicos Islands and only slightly higher on Acklins and Crooked Islands and Mayaguana).Keegan:25, 54-8, 86, 170-3 European exploration upDepiction of Christopher Columbus seizing the Guanahani shortly after landing in the Bahamas in 1492 In 1492 Christopher Columbus sailed from Spain on his first voyage with three ships, the Ni\u00f1a, the Pinta, and the flagship, Santa Maria, seeking a direct route to Asia. On 12 October 1492 Columbus reached an island in the Bahamas and claimed it for Spain, an event long regarded by Europeans as the 'discovery of America. This island was called Guanahani by the Lucayan, and San Salvador by the Spanish. The identity of the first American landfall by Columbus remains controversial, but many authors accept Samuel E. Morison's identification of Columbus' San Salvador as what was later called Watling (or Watling's) Island. Its name has been officially changed to San Salvador. Columbus visited several other islands in the Bahamas before sailing to present-day Cuba and afterward to Hispaniola.Albury:21-33Craton:28-37Keegan:175-205 The Bahamas held little interest in the Spanish except as a source of slave labor. Nearly the entire population of Lucayan (almost 40,000 people total) were transported to other islands as laborers over the next 30 years. When the Spanish decided to remove the remaining Lucayans to Hispaniola in 1520, they could find only eleven. The islands remained abandoned and depopulated for 130 years afterward . With no gold to be found, and the population removed, the Spanish effectively abandoned the Bahamas. They retained titular claims to them until the Peace of Paris in 1783, when they ceded them to Britain in exchange for East Florida.Albury:34-7Albury:34-7Craton. pp. 37-39Johnson:3Keegan:212, 220-3 For many years, historians believed that The Bahamas was not colonized until the 17th century. However, recent studies show that there may have been attempts of colonization by groups from Spain, France, Britain, and the Netherlands. The French settled in Abaco in 1565 and tried again in 1625. Early English settlement In 1648 a group from Bermuda called 'The Company of Adventurers for the Plantation of the Islands of Eleutheria,' which was led by William Sayle, sailed to the Bahamas to found a colony. These early settlers were Puritans and republicans. Bermuda was becoming overcrowded, and the Bahamas offered both religious and political freedom and economic opportunity. The larger of the company's two ships, the William, wrecked on the reef at the north end of what is now called Eleuthera Island, with the loss of all provisions. Despite the arrival of additional settlers, including Europeans, slaves , and former African slaves from Bermuda and the receipt of relief supplies from Virginia and New England, the Eleuthera colony struggled for many years, hampered by poor soil, fighting between settlers, and conflict with the Spanish. In the mid-1650s many of the settlers returned to Bermuda. The remaining settlers founded communities on Harbour Island and Saint George's Cay (Spanish Wells) at the north end of Eleuthera. In 1670 about 20 families lived in the Eleuthera communities.Albury:41-6Johnson:3-4 Map of New Providence in 1751. Settled in the mid-1600s, the island quickly became the center of population and commerce in the Bahamas. In 1666 other colonists from Bermuda settled on New Providence, which soon became the center of population and commerce in the Bahamas, with almost 500 people living on the island by 1670. Unlike the Eleutherians, who were primarily farmers, the first settlers on New Providence made their living from the sea, salvaging (mainly Spanish) wrecks, making salt, and taking fish, turtles, conchs and ambergris. Farmers from Bermuda soon followed the seamen to New Providence, where they found good, plentiful land. Neither the Eleutherian colony nor the settlement on New Providence had any legal standing under English law. In 1670 the Proprietors of Carolina were issued a patent for the Bahamas, but the governors sent by the Proprietors had difficulty imposing their authority on the independent-minded residents of New Providence.Albury:47-51Johnson:4 Republic of Pirates The Bahamians soon came into conflict with the Spanish over the salvaging of wrecks. The Bahamian wreckers drove the Spanish away from their wrecked ships, and attacked Spanish salvagers, seizing goods the Spanish had already recovered from the wrecks. When the Spanish raided the Bahamas, the Bahamians , in turn , commissioned privateers against Spain, even though England and Spain were at peace. In 1684 the Spanish burned the settlements on New Providence and Eleuthera, after which they were largely abandoned. New Providence was settled a second time in 1686 by colonists from Jamaica. upPirate captain Henry Every on shore while his ship the Fancy engages another vessel. Every eluded the authorities after supposedly bribing the governor appointed by the Proprietors of Carolina In the 1690s English privateers (England was then at war with France) made a base in the Bahamas. In 1696 Henry Every (or Avery), using the assumed name Henry Bridgeman, brought his ship Fancy, loaded with pirates' loot, into Nassau harbor. Every bribed the governor, Nicholas Trott (uncle of the Nicholas Trott who presided at the trial of Stede Bonnet), with gold and silver, and by leaving him the Fancy, still loaded with 50 tons of elephant tusks and 100 barrels of gunpowder. Following peace with France in 1697, many of the privateers became pirates. From this time the pirates increasingly made Nassau, the Bahamian capital founded in 1694, their base. The governors appointed by the Proprietors usually made a show of suppressing the pirates, but most were accused of dealing with them. By 1701 England was at war with France and Spain. In 1703 and 1706 combined French-Spanish fleets attacked and sacked Nassau, after which some settlers left, and the Proprietors gave up on trying to govern the islands.Albury:51-5Craton:70-87Johnson:6Woodard:12-14, 23-24 Reasserting British control Starting in 1713, Woodes Rogers had conceived the idea of leading an expedition to Madagascar to suppress the pirates there and establish it as a British colony. Rogers' friends Richard Steele and Joseph Addison eventually convinced him to tackle the pirate's nest in the Bahamas, instead. Rogers and others formed a company to fund the venture. They persuaded the Proprietors of Carolina to surrender the government of the Bahamas to the king while retaining title to the land. In 1717 King George appointed Rogers governor of the Bahamas and issued a proclamation granting a pardon to any pirate who surrendered to a British governor within one year.Albury:69-74Craton:93-6Johnson:7-8Woodard:117-121, 163-168 Woodes Rogers and his family by William Hogarth, 1729. Rogers, the first royal governor of the Bahamas, is seated as he is shown a map of New Providence. Word of the appointment of a new governor and the offer of pardons reached Nassau ahead of Rogers and his forces. Some of the pirates were willing to accept a pardon and retire from piracy. Henry Jennings and Christopher Winter, sailed off to find British authorities to confirm their acceptance of the amnesty. Others were not ready to give up. Many of those were Jacobites, supporters of the House of Stuart, who identified as enemies of the Hanoverian King George. Still , others simply identified as rebels or thought they were better off as pirates than trying to earn an honest living. When a Royal Navy ship brought official word to Nassau of the pardon offer, many pirates planned to accept. Soon, however, the recalcitrant parties gained the upper hand, eventually forcing the Navy ship to leave.Woodard:226-29 Blackbeard, Stede Bonnet, Nicholas Brown and Edmond Content left the Bahamas for other territories. Charles Vane, with \"Calico Jack\" Rackham and Edward England in his crew, came to prominence at this time. Vane worked to organize resistance to the anticipated arrival of Royal authority, even appealing to James Francis Edward Stuart, the Stuart pretender, for aid in holding the Bahamas and capturing Bermuda for the Stuarts. As aid from the Stuarts failed to materialize and the date for Rogers' arrival approached, Vane and his crew prepared to leave Nassau.Woodard:236-40, 245-47, 259-61 Vane attacked several small settlements in the Bahamas but, after he refused to attack a stronger French frigate, he was deposed for cowardice and replaced as captain by \"Calico Jack\" Rackham. Vane never returned to the Bahamas; he was eventually caught, convicted , and executed in Jamaica. After nearly being captured by Jamaican privateers, and hearing that the king had extended the deadline for pardons for piracy, Rackham and his crew returned to Nassau to surrender to Woodes Rogers. Diarama of Anne Bonny and Mary Read at Nassau harbor at the Pirates of Nassau Museum in Nassau. The two began their pirating careers at Nassau. In Nassau Rackham became involved with Anne Bonny; he tried to arrange an annulment of her marriage to another ex-pirate, James Bonny. Rogers blocked the annulment, and Rackham and Bonny left Nassau to be pirates again, taking a small crew and Bonny's friend Mary Read with them. Within months, Rackham, Bonny , and Read were captured and taken to Jamaica. They were convicted of piracy, and Rackham was executed. Bonny and Read were sent to prison, as both were pregnant and therefore excluded from execution. Read died in prison, while Bonny's fate is unknown.Woodard:304-10, 315-20 When Britain and Spain went to war again in 1719, many of the ex-pirates were commissioned by the British government as privateers. A Spanish invasion fleet set out for the Bahamas, but was diverted to Pensacola, Florida when it was seized by the French. Rogers continued to improve the defenses of Nassau, spending his personal fortune and going heavily into debt to do so. In 1720, the Spaniards finally attacked Nassau. Rogers returned to Britain in 1722 to plead for repayment of the money he had borrowed to build up Nassau, only to find he had been replaced as governor. He was sent to debtors' prison, although his creditors later absolved his debts, gaining his release. Latter 18th century In 1741, Governor John Tinker and Peter Henry Bruce constructed Fort Montague. Additionally, the Governor also reported a privateering boom in the Thirteen Colonies in North America. He also reported that over 2300 sumptuous houses were built. In 1768 Governor William Shirley filled in mosquito-breeding swamps and extended Nassau. American forces lands at New Providence during the American Revolutionary War. The landing resulted in a two-week occupation of Nassau in 1776 During the American War of Independence the Bahamas was attacked by American and allied forces on several occasions. In 1778, American forces launched an amphibious assault against Nassau, resulting in its two-week occupation. In 1782, Spanish forces under General Galvez captured the Bahamas in 1782. A British-American Loyalist expedition led by Colonel Andrew Deveaux, recaptured the islands in 1783. After the American Revolution, the British issued land grants to American Loyalists who had gone into exile from the newly established United States. The sparse population of the Bahamas tripled within a few years. The Loyalists developed cotton as a commodity crop, but it dwindled from insect damage and soil exhaustion. In addition to the slaves they brought with them, the planters' descendants imported more African slaves for labor . Most of the current inhabitants in the islands are descended from the slaves brought to work on the Loyalist plantations. Also , thousands of captive Africans, who were liberated from foreign slave ships by the British navy after the abolition of the British slave trade in 1807, were resettled as free persons in the Bahamas. The the Bahamas during the American Civil War prospered as a base for Confederate blockade-running, bringing in cotton to be shipped to the mills of England and running out arms and munitions. None of these provided any lasting prosperity to the islands, nor did attempts to grow different kinds of crops for export. Colonial 20th century In 1911, there was a short-lived movement to make the Bahamas part of Canada. Although the movement enjoyed the support of many in Nassau and from the head of Sun Life, a Canadian insurance company, the movement failed. The failure of the movement was, in part, due to the British government's opposition to uniting a predominantly Black colony with a predominantly white country.Smith, Andrew. 2009. \"Thomas Bassett Macaulay and the Bahamas: Racism, Business , and Canadian Sub-imperialism\". The Journal of Imperial and Commonwealth History. 37, no. 1: 29-50. In World War I organizations such as the Imperial Order of the Daughters of Empire and the Bahamas Red Cross Guild began collecting money, food , and clothing for soldiers and civilians in Europe. \"The Gallant Thirty\" Bahamians set out to join the British West Indies Regiment as early as 1915 and as many as 1,800 served in the armed forces of Canada, Britain , and the United States. The Duke of Windsor was installed as Governor of the Bahamas, arriving at that post in August 1940 with his new Duchess. They were appalled at the condition of Government House, but they \"tried to make the best of a bad situation.\" He did not enjoy the position, and referred to the islands as \"a third-class British colony\".Bloch, Michael (1982). The Duke of Windsor's War. London: Weidenfeld and Nicolson. , p. 364. He opened the small local parliament on October 29, 1940, and they visited the 'Out Islands' that November, which caused some controversy because of on whose yacht they were cruising. The British Foreign Office strenuously objected when the Duke and Duchess planned to tour aboard a yacht belonging to a Swedish magnate, Axel Wenner-Gren, whom American intelligence wrongly believed to be a close friend of Luftwaffe commander Hermann G\u00f6ring.Bloch, Michael (1982). The Duke of Windsor's War. London: Weidenfeld and Nicolson. , pp. 154\u2013159, 230\u2013233 The Duke was praised, however, for his efforts to combat poverty on the islands, although he was as contemptuous of the Bahamians as he was of most non-white peoples of the Empire.Ziegler, Philip (1991). King Edward VIII: The official biography. New York: Alfred A. Knopf. . He was also praised for his resolution of civil unrest over low wages in Nassau in June 1942, when there was a \"full-scale riot,\" even though he blamed the trouble on \"mischief makers \u2013 communists\" and \"men of Central European Jewish descent, who had secured jobs as a pretext for obtaining a deferment of the draft\".Ziegler, pp. 471\u2013472 The Duke resigned the post on 16 March 1945.Matthew, H. C. G. (September 2004; online edition January 2008) \"Edward VIII, later Prince Edward, Duke of Windsor (1894\u20131972)\", Oxford Dictionary of National Biography, Oxford University Press, , retrieved 1 May 2010 (Subscription required)Higham places the date of his resignation as 15 March, and that he left on 5 April. During World War II, the Allies centered their flight training and antisubmarine operations for the Caribbean in the Bahamas. They fought for their freedom. Canadian garrison In April 1942 the United Kingdom asked Canada to provide military support in Nassau, in part to provide protection services to H.R.H. the Duke of Windsor. No. 33 company of the Veterans Guard of Canada was raised and arrived in June. No 33 companies were relieved in 1943 by a company of The Pictou Highlanders. The Canadian garrison left Nassau in 1946 p. 181 Post-World War II The wartime airfield became Nassau's international airport in 1957 and helped spur the growth of mass tourism, which accelerated after Havana was closed to American tourists in 1961. Freeport, on the island of Grand Bahama, was established as a free trade zone in the 1950s and became Bahama's second city. Bank secrecy combined with the lack of corporate and income taxes led to rapid growth in the offshore financial sector during the postwar years. By the early 1980s, the islands had become a major center for the drug trade, with 90 percent of all the cocaine entering the United States reportedly passing through the Bahamas. The College of the Bahamas was founded in 1974 and provided the nation's higher or tertiary education. The college was chartered in 2016 as the University of the Bahamas, offering baccalaureate, master's, and associate degrees, on three campuses and teaching and research centers throughout the Bahamas. Based on the twin pillars of tourism and offshore finance, the Bahamian economy has prospered since the 1950s. However, there remain significant challenges in areas such as education, health care, housing, international narcotics trafficking , and illegal immigration from Haiti. References Albury, Paul. (1975) The Story of the Bahamas. MacMillan Caribbean. Carr, J. Revell. (2008) Seeds of Discontent: The Deep Roots of the American Revolution 1659\u20131750. Walker & Company. Craton, Michael. (1986) A History of the Bahamas. San Salvador Press. Granberry, Julius , and Gary S. Vescelius. (2004) Languages of the Pre-Columbian Antilles. The University of Alabama Press. Johnson, Howard. (1996) The Bahamas from Slavery to Servitude, 1783\u20131933. University Press of Florida. Keegan, William F. (1992) The People Who Discovered Columbus: The Prehistory of the Bahamas. University Press of Florida. Woodard, Colin. (2007) The Republic of Pirates. Harcourt, Inc. State Dept Country Study - Includes information on the Bahamas including history. Rulers.org \u2014 Bahamas List of rulers for the Bahamas", "after_revision": "From the initial colonization(s), the Lucayan expanded throughout the Bahamas in some 800 years (c. 700 \u2013 c. 1500), growing to a population of about 40,000. Population density at the time of first European contact was highest in the south-central area of the Bahamas, declining towards the north, reflecting the migration pattern and progressively shorter time of occupation of the northern islands. Known Lucayan settlement sites are confined to the nineteen largest islands in the archipelago, or to smaller cays located less than one km. from those islands. Population density in the southernmost Bahamas remained lower, probably due to the drier climate there (less than 800 mm of rain a year on Great Inagua Island and the Turks and Caicos Islands and only slightly higher on Acklins and Crooked Islands and Mayaguana).Keegan:25, 54-8, 86, 170-3 European exploration upDepiction of Christopher Columbus seizing the Guanahani shortly after landing in the Bahamas in 1492 In 1492 Christopher Columbus sailed from Spain on his first voyage with three ships, the Ni\u00f1a, the Pinta, and the flagship, Santa Maria, seeking a direct route to Asia. On 12 October 1492 Columbus reached an island in the Bahamas and claimed it for Spain, an event long regarded by Europeans as the 'discovery ' of America. This island was called Guanahani by the Lucayan, and San Salvador by the Spanish. The identity of the first American landfall by Columbus remains controversial, but many authors accept Samuel E. Morison's identification of Columbus' San Salvador as what was later called Watling (or Watling's) Island. Its name has been officially changed to San Salvador. Columbus visited several other islands in the Bahamas before sailing to present-day Cuba and afterwards to Hispaniola.Albury:21-33Craton:28-37Keegan:175-205 The Bahamas held little interest to the Spanish except as a source of slave labor. Nearly the entire population of Lucayan (almost 40,000 people total) were transported to other islands as laborers over the next 30 years. When the Spanish decided to remove the remaining Lucayans to Hispaniola in 1520, they could find only eleven. The islands remained abandoned and depopulated for 130 years afterwards . With no gold to be found, and the population removed, the Spanish effectively abandoned the Bahamas. They retained titular claims to them until the Peace of Paris in 1783, when they ceded them to Britain in exchange for East Florida.Albury:34-7Albury:34-7Craton. pp. 37-39Johnson:3Keegan:212, 220-3 For many years, historians believed that The Bahamas was not colonized until the 17th century. However, recent studies show that there may have been attempts of colonization by groups from Spain, France, Britain, and the Netherlands. The French settled in Abaco in 1565 , and tried again in 1625. Early English settlement In 1648 a group from Bermuda called 'The Company of Adventurers for the Plantation of the Islands of Eleutheria,' which was led by William Sayle, sailed to the Bahamas to found a colony. These early settlers were Puritans and republicans. Bermuda was becoming overcrowded, and the Bahamas offered both religious and political freedom and economic opportunity. The larger of the company's two ships, the William, wrecked on the reef at the north end of what is now called Eleuthera Island, with the loss of all provisions. Despite the arrival of additional settlers, including Europeans, slaves and former African slaves from Bermuda and the receipt of relief supplies from Virginia and New England, the Eleuthera colony struggled for many years, hampered by poor soil, fighting between settlers, and conflict with the Spanish. In the mid-1650s many of the settlers returned to Bermuda. The remaining settlers founded communities on Harbour Island and Saint George's Cay (Spanish Wells) at the north end of Eleuthera. In 1670 about 20 families lived in the Eleuthera communities.Albury:41-6Johnson:3-4 Map of New Providence in 1751. Settled in the mid-1600s, the island quickly became the centre of population and commerce in the Bahamas. In 1666 other colonists from Bermuda settled on New Providence, which soon became the centre of population and commerce in the Bahamas, with almost 500 people living on the island by 1670. Unlike the Eleutherians, who were primarily farmers, the first settlers on New Providence made their living from the sea, salvaging (mainly Spanish) wrecks, making salt, and taking fish, turtles, conchs and ambergris. Farmers from Bermuda soon followed the seamen to New Providence, where they found good, plentiful land. Neither the Eleutherian colony nor the settlement on New Providence had any legal standing under English law. In 1670 the Proprietors of Carolina were issued a patent for the Bahamas, but the governors sent by the Proprietors had difficulty imposing their authority on the independent-minded residents of New Providence.Albury:47-51Johnson:4 Republic of Pirates The Bahamians soon came into conflict with the Spanish over the salvaging of wrecks. The Bahamian wreckers drove the Spanish away from their wrecked ships, and attacked Spanish salvagers, seizing goods the Spanish had already recovered from the wrecks. When the Spanish raided the Bahamas, the Bahamians in turn commissioned privateers against Spain, even though England and Spain were at peace. In 1684 the Spanish burned the settlements on New Providence and Eleuthera, after which they were largely abandoned. New Providence was settled a second time in 1686 by colonists from Jamaica. upPirate captain Henry Every on shore while his ship the Fancy engages another vessel. Every eluded the authorities after supposedly bribing the governor appointed by the Proprietors of Carolina In the 1690s English privateers (England was then at war with France) made a base in the Bahamas. In 1696 Henry Every (or Avery), using the assumed name Henry Bridgeman, brought his ship Fancy, loaded with pirates' loot, into Nassau harbor. Every bribed the governor, Nicholas Trott (uncle of the Nicholas Trott who presided at the trial of Stede Bonnet), with gold and silver, and by leaving him the Fancy, still loaded with 50 tons of elephant tusks and 100 barrels of gunpowder. Following peace with France in 1697, many of the privateers became pirates. From this time the pirates increasingly made Nassau, the Bahamian capital founded in 1694, their base. The governors appointed by the Proprietors usually made a show of suppressing the pirates, but most were accused of dealing with them. By 1701 England was at war with France and Spain. In 1703 and in 1706 combined French-Spanish fleets attacked and sacked Nassau, after which some settlers left, and the Proprietors gave up on trying to govern the islands.Albury:51-5Craton:70-87Johnson:6Woodard:12-14, 23-24 Reasserting British control Starting in 1713, Woodes Rogers had conceived the idea of leading an expedition to Madagascar to suppress the pirates there and establish it as a British colony. Rogers' friends Richard Steele and Joseph Addison eventually convinced him to tackle the pirates nest in the Bahamas, instead. Rogers and others formed a company to fund the venture. They persuaded the Proprietors of Carolina to surrender the government of the Bahamas to the king , while retaining title to the land. In 1717 King George appointed Rogers governor of the Bahamas and issued a proclamation granting a pardon to any pirate who surrendered to a British governor within one year.Albury:69-74Craton:93-6Johnson:7-8Woodard:117-121, 163-168 Woodes Rogers and his family by William Hogarth, 1729. Rogers, the first royal governor of the Bahamas, is seated as he is shown a map of New Providence. Word of the appointment of a new governor and of the offer of pardons reached Nassau ahead of Rogers and his forces. Some of the pirates were willing to accept a pardon and retire from piracy. Henry Jennings and Christopher Winter, sailed off to find British authorities to confirm their acceptance of the amnesty. Others were not ready to give up. Many of those were Jacobites, supporters of the House of Stuart, who identified as enemies of the Hanoverian King George. Still others simply identified as rebels , or thought they were better off as pirates than trying to earn an honest living. When a Royal Navy ship brought official word to Nassau of the pardon offer, many pirates planned to accept. Soon, however, the recalcitrant parties gained the upper hand, eventually forcing the Navy ship to leave.Woodard:226-29 Blackbeard, Stede Bonnet, Nicholas Brown and Edmond Condent left the Bahamas for other territories. Charles Vane, with \"Calico Jack\" Rackham and Edward England in his crew, came to prominence at this time. Vane worked to organize resistance to the anticipated arrival of Royal authority, even appealing to James Francis Edward Stuart, the Stuart pretender, for aid in holding the Bahamas and capturing Bermuda for the Stuarts. As aid from the Stuarts failed to materialize and the date for Rogers' arrival approached, Vane and his crew prepared to leave Nassau.Woodard:236-40, 245-47, 259-61 Vane attacked several small settlements in the Bahamas but, after he refused to attack a stronger French frigate, he was deposed for cowardice and replaced as captain by \"Calico Jack\" Rackham. Vane never returned to the Bahamas; he was eventually caught, convicted and executed in Jamaica. After nearly being captured by Jamaican privateers, and hearing that the king had extended the deadline for pardons for piracy, Rackham and his crew returned to Nassau to surrender to Woodes Rogers. Diarama of Anne Bonny and Mary Read at Nassau harbour at the Pirates of Nassau Museum in Nassau. The two began their pirating careers at Nassau. In Nassau Rackham became involved with Anne Bonny; he tried to arrange an annulment of her marriage to another ex-pirate, James Bonny. Rogers blocked the annulment, and Rackham and Bonny left Nassau to be pirates again, taking a small crew and Bonny's friend Mary Read with them. Within months, Rackham, Bonny and Read were captured and taken to Jamaica. They were convicted of piracy, and Rackham was executed. Bonny and Read were sent to prison, as both were pregnant and therefore excluded from execution. Read died in prison, while Bonny's fate is unknown.Woodard:304-10, 315-20 When Britain and Spain went to war again in 1719, many of the ex-pirates were commissioned by the British government as privateers. A Spanish invasion fleet set out for the Bahamas, but was diverted to Pensacola, Florida when it was seized by the French. Rogers continued to improve the defenses of Nassau, spending his personal fortune and going heavily into debt to do so. In 1720, the Spaniards finally attacked Nassau. Rogers returned to Britain in 1722 to plead for repayment of the money he had borrowed to build up Nassau, only to find he had been replaced as governor. He was sent to debtors' prison, although his creditors later absolved his debts, gaining him release. Latter 18th century In 1741, Governor John Tinker and Peter Henry Bruce constructed Fort Montague. Additionally, the Governor also reported a privateering boom in the Thirteen Colonies in North America. He also reported that over 2300 sumptuous houses were built. In 1768 Governor William Shirley filled in mosquito-breeding swamps and extended Nassau. American forces lands at New Providence during the American Revolutionary War. The landing resulted in a two-week occupation of Nassau in 1776 During the American War of Independence the Bahamas was attacked by American and allied forces on several occasions. In 1778, American forces launched an amphibious assault against Nassau, resulting in its two-week occupation. In 1782, Spanish forces under General Galvez captured the Bahamas in 1782. A British-American Loyalist expedition led by Colonel Andrew Deveaux, recaptured the islands in 1783. After the American Revolution, the British issued land grants to American Loyalists who had gone into exile from the newly established United States. The sparse population of the Bahamas tripled within a few years. The Loyalists developed cotton as a commodity crop, but it dwindled from insect damage and soil exhaustion. In addition to slaves they brought with them, the planters' descendants imported more African slaves for labour . Most of the current inhabitants in the islands are descended from the slaves brought to work on the Loyalist plantations. In addition , thousands of captive Africans, who were liberated from foreign slave ships by the British navy after the abolition of the British slave trade in 1807, were resettled as free persons in the Bahamas. The Bahamas during the American Civil War prospered as a base for Confederate blockade-running, bringing in cotton to be shipped to the mills of England and running out arms and munitions. None of these provided any lasting prosperity to the islands, nor did attempts to grow different kinds of crops for export. Colonial 20th century In 1911, there was a short-lived movement to make the Bahamas part of Canada. Although the movement enjoyed the support of many in Nassau and from the head of Sun Life, a Canadian insurance company, the movement failed. The failure of the movement was, in part, due to the British government's opposition to uniting a predominantly Black colony with a predominantly white country.Smith, Andrew. 2009. \"Thomas Bassett Macaulay and the Bahamas: Racism, Business and Canadian Sub-imperialism\". The Journal of Imperial and Commonwealth History. 37, no. 1: 29-50. In World War I organizations such as the Imperial Order of the Daughters of Empire and the Bahamas Red Cross Guild , began collecting money, food and clothing for soldiers and civilians in Europe. \"The Gallant Thirty\" Bahamians set out to join the British West Indies Regiment as early as 1915 and as many as 1,800 served in the armed forces of Canada, Britain and the United States. The Duke of Windsor was installed as Governor of the Bahamas, arriving at that post in August 1940 with his new Duchess. They were appalled at the condition of Government House, but they \"tried to make the best of a bad situation.\" He did not enjoy the position, and referred to the islands as \"a third-class British colony\".Bloch, Michael (1982). The Duke of Windsor's War. London: Weidenfeld and Nicolson. , p. 364. He opened the small local parliament on October 29, 1940, and they visited the 'Out Islands' that November, which caused some controversy because of on whose yacht they were cruising. The British Foreign Office strenuously objected when the Duke and Duchess planned to tour aboard a yacht belonging to a Swedish magnate, Axel Wenner-Gren, whom American intelligence wrongly believed to be a close friend of Luftwaffe commander Hermann G\u00f6ring.Bloch, Michael (1982). The Duke of Windsor's War. London: Weidenfeld and Nicolson. , pp. 154\u2013159, 230\u2013233 The Duke was praised, however, for his efforts to combat poverty on the islands, although he was as contemptuous of the Bahamians as he was of most non-white peoples of the Empire.Ziegler, Philip (1991). King Edward VIII: The official biography. New York: Alfred A. Knopf. . He was also praised for his resolution of civil unrest over low wages in Nassau in June 1942, when there was a \"full-scale riot,\" even though he blamed the trouble on \"mischief makers \u2013 communists\" and \"men of Central European Jewish descent, who had secured jobs as a pretext for obtaining a deferment of draft\".Ziegler, pp. 471\u2013472 The Duke resigned the post on 16 March 1945.Matthew, H. C. G. (September 2004; online edition January 2008) \"Edward VIII, later Prince Edward, duke of Windsor (1894\u20131972)\", Oxford Dictionary of National Biography, Oxford University Press, , retrieved 1 May 2010 (Subscription required)Higham places the date of his resignation as 15 March, and that he left on 5 April. During World War II, the Allies centred their flight training and antisubmarine operations for the Caribbean in the Bahamas. They fought for their freedom. Canadian garrison In April 1942 the United Kingdom asked Canada to provide military support in Nassau, in part to provide protection services to H.R.H. the Duke of Windsor. No. 33 company of the Veterans Guard of Canada was raised and arrived in June. No 33 company were relieved in 1943 by a company of The Pictou Highlanders. The Canadian garrison left Nassau in 1946 p. 181 Post-World War II The wartime airfield became Nassau's international airport in 1957 and helped spur the growth of mass tourism, which accelerated after Havana was closed to American tourists in 1961. Freeport, on the island of Grand Bahama, was established as a free trade zone in the 1950s and became the Bahama's second city. Bank secrecy combined with the lack of corporate and income taxes led to a rapid growth in the offshore financial sector during the postwar years. By the early 1980s, the islands had become a major centre for the drug trade, with 90 per cent of all the cocaine entering the United States reportedly passing through the Bahamas. The College of the Bahamas was founded in 1974 and provided the nation's higher or tertiary education. The college was chartered in 2016 as the University of the Bahamas, offering baccalaureate, masters and associate degrees, on three campuses and teaching and research centres throughout the Bahamas. Based on the twin pillars of tourism and offshore finance, the Bahamian economy has prospered since the 1950s. However, there remain significant challenges in areas such as education, health care, housing, international narcotics trafficking and illegal immigration from Haiti. References Albury, Paul. (1975) The Story of the Bahamas. MacMillan Caribbean. Carr, J. Revell. (2008) Seeds of Discontent: The Deep Roots of the American Revolution 1659\u20131750. Walker & Company. Craton, Michael. (1986) A History of the Bahamas. San Salvador Press. Granberry, Julius and Gary S. Vescelius. (2004) Languages of the Pre-Columbian Antilles. The University of Alabama Press. Johnson, Howard. (1996) The Bahamas from Slavery to Servitude, 1783\u20131933. University Press of Florida. Keegan, William F. (1992) The People Who Discovered Columbus: The Prehistory of the Bahamas. University Press of Florida. Woodard, Colin. (2007) The Republic of Pirates. Harcourt, Inc. State Dept Country Study - Includes information on the Bahamas including history. Rulers.org \u2014 Bahamas List of rulers for Bahamas", "edit_actions": [{"type": "A", "before": null, "after": "to", "start_char_pos": 499, "end_char_pos": 499}, {"type": "R", "before": "The population", "after": "Population", "start_char_pos": 559, "end_char_pos": 573}, {"type": "A", "before": null, "after": "'", "start_char_pos": 1287, "end_char_pos": 1287}, {"type": "R", "before": "afterward", "after": "afterwards", "start_char_pos": 1749, "end_char_pos": 1758}, {"type": "R", "before": "in", "after": "to", "start_char_pos": 1845, "end_char_pos": 1847}, {"type": "R", "before": "afterward", "after": "afterwards", "start_char_pos": 2205, "end_char_pos": 2214}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2786, "end_char_pos": 2786}, {"type": "D", "before": ",", "after": null, "start_char_pos": 3431, "end_char_pos": 3432}, {"type": "R", "before": "center", "after": "centre", "start_char_pos": 4027, "end_char_pos": 4033}, {"type": "R", "before": "center", "after": "centre", "start_char_pos": 4163, "end_char_pos": 4169}, {"type": "R", "before": ", in turn ,", "after": "in turn", "start_char_pos": 5254, "end_char_pos": 5265}, {"type": "A", "before": null, "after": "in", "start_char_pos": 6596, "end_char_pos": 6596}, {"type": "R", "before": "pirate's", "after": "pirates", "start_char_pos": 7085, "end_char_pos": 7093}, {"type": "A", "before": null, "after": ",", "start_char_pos": 7278, "end_char_pos": 7278}, {"type": "A", "before": null, "after": "of", "start_char_pos": 7746, "end_char_pos": 7746}, {"type": "D", "before": ",", "after": null, "start_char_pos": 8175, "end_char_pos": 8176}, {"type": "A", "before": null, "after": ",", "start_char_pos": 8212, "end_char_pos": 8212}, {"type": "R", "before": "Content", "after": "Condent", "start_char_pos": 8574, "end_char_pos": 8581}, {"type": "D", "before": ",", "after": null, "start_char_pos": 9379, "end_char_pos": 9380}, {"type": "R", "before": "harbor", "after": "harbour", "start_char_pos": 9651, "end_char_pos": 9657}, {"type": "D", "before": ",", "after": null, "start_char_pos": 10059, "end_char_pos": 10060}, {"type": "R", "before": "his", "after": "him", "start_char_pos": 11000, "end_char_pos": 11003}, {"type": "D", "before": "the", "after": null, "start_char_pos": 12251, "end_char_pos": 12254}, {"type": "R", "before": "labor", "after": "labour", "start_char_pos": 12345, "end_char_pos": 12350}, {"type": "R", "before": "Also", "after": "In addition", "start_char_pos": 12475, "end_char_pos": 12479}, {"type": "D", "before": "the", "after": null, "start_char_pos": 12684, "end_char_pos": 12687}, {"type": "D", "before": ",", "after": null, "start_char_pos": 13479, "end_char_pos": 13480}, {"type": "A", "before": null, "after": ",", "start_char_pos": 13695, "end_char_pos": 13695}, {"type": "D", "before": ",", "after": null, "start_char_pos": 13725, "end_char_pos": 13726}, {"type": "D", "before": ",", "after": null, "start_char_pos": 13942, "end_char_pos": 13943}, {"type": "D", "before": "the", "after": null, "start_char_pos": 15514, "end_char_pos": 15517}, {"type": "R", "before": "Duke", "after": "duke", "start_char_pos": 15689, "end_char_pos": 15693}, {"type": "R", "before": "centered", "after": "centred", "start_char_pos": 15947, "end_char_pos": 15955}, {"type": "R", "before": "companies", "after": "company", "start_char_pos": 16330, "end_char_pos": 16339}, {"type": "A", "before": null, "after": "the", "start_char_pos": 16754, "end_char_pos": 16754}, {"type": "A", "before": null, "after": "a", "start_char_pos": 16850, "end_char_pos": 16850}, {"type": "R", "before": "center", "after": "centre", "start_char_pos": 16974, "end_char_pos": 16980}, {"type": "R", "before": "percent", "after": "per cent", "start_char_pos": 17009, "end_char_pos": 17016}, {"type": "R", "before": "master's,", "after": "masters", "start_char_pos": 17298, "end_char_pos": 17307}, {"type": "R", "before": "centers", "after": "centres", "start_char_pos": 17375, "end_char_pos": 17382}, {"type": "D", "before": ",", "after": null, "start_char_pos": 17649, "end_char_pos": 17650}, {"type": "D", "before": ",", "after": null, "start_char_pos": 17970, "end_char_pos": 17971}, {"type": "D", "before": "the", "after": null, "start_char_pos": 18486, "end_char_pos": 18489}], "sents_char_pos": [0, 156, 399, 558, 826, 1145, 1299, 1381, 1601, 1655, 1773, 1894, 2033, 2143, 2216, 2317, 2450, 2610, 2749, 2811, 3023, 3075, 3196, 3358, 3665, 3724, 3855, 3917, 3970, 4076, 4265, 4483, 4587, 4697, 4908, 5034, 5202, 5349, 5466, 5629, 5835, 5978, 6219, 6295, 6398, 6533, 6583, 6753, 6995, 7123, 7179, 7313, 7487, 7600, 7699, 7814, 7890, 8012, 8046, 8168, 8293, 8401, 8507, 8621, 8727, 8948, 9083, 9306, 9342, 9405, 9604, 9700, 9748, 9799, 9883, 10028, 10105, 10162, 10259, 10311, 10465, 10588, 10708, 10756, 10910, 11012, 11111, 11215, 11276, 11365, 11444, 11625, 11735, 11810, 11912, 12062, 12127, 12235, 12352, 12474, 12679, 12872, 12996, 13096, 13238, 13399, 13413, 13511, 13561, 13579, 13777, 13966, 14087, 14198, 14292, 14314, 14341, 14384, 14568, 14827, 14849, 14876, 14909, 15113, 15136, 15178, 15525, 15590, 15624, 15914, 16040, 16071, 16244, 16323, 16401, 16651, 16776, 16922, 17102, 17205, 17406, 17517, 17686, 17711, 17744, 17765, 17782, 17863, 17881, 17898, 17931, 17951, 17994, 18042, 18075, 18092, 18149, 18178, 18271, 18300, 18316, 18348, 18445]}
+{"doc_id": "40844", "revision_depth": "1", "before_revision": "The capture effect is defined as the complete suppression of the weaker signal at the receiver's limiter (if present) where the weaker signal is not amplified, but attenuated. When both signals are nearly equal in strength, or are fading independently, the receiver may switch from one to the other and exhibit picket fencing. The capture effect can occur at the signal limiter, or in the demodulation stage , for circuits that do not require a signal limiter. Some types of radio receiver circuits have a stronger capture effect than others. The measurement of how well a receiver can reject a second signal on the same frequency is called the capture ratiofor a specific receiver . It is measured as the lowest ratio of the power of two signals that will result in the suppression of the weaker signal. Amplitude modulation, or AM radio, transmission does not exhibit this effect. Because AM assumes short term changes in the amplitude to be information, any electrical impulse will be picked up and demodulated along with the desired carrier. Hence lightning causes crashing noises when picked up by an AM radio near a storm. In contrast, FM suppresses short term changes in amplitude and is therefore much less prone to noise during storms and during the reception of electrical noise impulses. In FM demodulation the receiver tracks the modulated frequency shift of the desired carrier while discriminating against any other signal since it can only follow the deviation of one signal at a time. In AM , the receiver tracks the signal strength of the AM signal as the basis for demodulation. This allows any other signal to be tracked as just another change in amplitude . So it is possible for an AM receiver to demodulate several carriers at the same time, resulting in an audio mix. This is one reason that the aviation industry, and others, have chosen to use AM for communications rather than FM , allowing multiple signals transmitted on the same channel to be heard . Phenomena similar to the capture effect are described in AM when offset carriers of different strengths are present in the passband of a receiver. For example, the aviation glideslope vertical guidance clearance beam is sometimes described as a \"capture effect\" system, even though it operates using AM signals. If signals are close but not exactly on the same frequency, the mix will not only have the audio from both carriers, but depending on the carrier separation also include an audible heterodyne \"beat note\" tone equal to the difference between the carrier frequencies. For instance, if one carrier is at 1000.000 kHz, and the other at 1000.150 kHz, then a 150 Hz \"beat frequency\" tone will result. This mix can also occur when a second AM carrier is received on an adjacent frequency, if the receiver's ultimate bandwidth is wide enough to include the carriers of both signals. In ITU Region 2 locations, consisting of the Americas, for the AM broadcast band this occurs at 10 kHz; elsewhere it can occur at 9 kHz, the commonly used spacing in the rest of the world. Modern SDR-based receivers can completely eliminate this by utilizing a brick-wall filter narrower than the channel spacing that reduces signals outside the passband to inconsequential levels. Where such an overlap within the passband occurs, a high pitched heterodyne whistle at precisely 9 or 10 kHz can be heard. This is particularly common at night when signals from adjacent frequencies travel long distances due to skywave .", "after_revision": "The capture effect is defined as the complete suppression of the weaker signal at the receiver's limiter (if present) where the weaker signal is not amplified, but attenuated. When both signals are nearly equal in strength, or are fading independently, the receiver may rapidly switch from one to another and exhibit picket fencing. The capture effect can occur at the signal limiter, or in the demodulation stage for circuits that do not require a signal limiter. Some types of radio receiver circuits have a stronger capture effect than others. The measurement of how well a receiver rejects a second signal on the same frequency is called its capture ratio . It is measured as the lowest ratio of the power of two signals that will result in the suppression of the weaker signal. Amplitude modulation, or AM radio, transmission does not exhibit this effect. Because AM assumes short term changes in the amplitude to be information, any electrical impulse will be picked up and demodulated along with the desired carrier. Hence lightning causes crashing noises when picked up by an AM radio near a storm. In contrast, FM suppresses short term changes in amplitude , and is therefore much less prone to noise from thunderstorms and electrical impulses. In FM demodulation the receiver tracks the modulated frequency shift of the desired carrier while discriminating against any other signal , since it can only follow the deviation of one signal at a time. For AM reception , the receiver tracks the signal strength of the AM signal as the basis for demodulation. This allows signals to be tracked as just another change in amplitude , so it is possible for an AM receiver to demodulate several carriers at the same time, resulting in an audio mix. The ability to receive multiple signals simultaneously is in some cases considered beneficial, and is one reason that the aviation industry, and others, have chosen to use AM rather than FM for communications . Phenomena similar to the capture effect are described in AM when offset carriers of different strengths are present in the passband of a receiver. For example, the aviation glideslope vertical guidance clearance beam is sometimes described as a \"capture effect\" system, even though it operates using AM signals. If AM signals are close but not exactly on the same frequency, the reception mix will not only have the audio from both carriers, but depending on the carrier separation will include an audible heterodyne \"beat note\" tone equal to the difference between the carrier frequencies. For instance, if one carrier transmits at 1000.000 kHz, and the other at 1000.150 kHz, then a 150 Hz \"beat frequency\" tone mix will result. This mix can also occur when a second AM carrier is received on an adjacent frequency, if the receiver's ultimate bandwidth is wide enough to include reception of both signals. In ITU Region 2 locations, consisting of the Americas, for the AM broadcast band this occurs at 10 kHz; elsewhere it can occur at 9 kHz, the AM band frequency spacing commonly used in the rest of the world. Where such an overlap within the passband occurs, a high pitched heterodyne whistle at precisely 9 or 10 kHz can be heard. This is particularly common at night when signals from adjacent frequencies travel long distances due to skywave . Modern SDR-based receivers can eliminate this by utilizing a brick-wall filter narrower than the channel spacing, that reduces signals outside the passband to inconsequential levels .", "edit_actions": [{"type": "A", "before": null, "after": "rapidly", "start_char_pos": 270, "end_char_pos": 270}, {"type": "R", "before": "the other", "after": "another", "start_char_pos": 290, "end_char_pos": 299}, {"type": "D", "before": ",", "after": null, "start_char_pos": 409, "end_char_pos": 410}, {"type": "R", "before": "can reject", "after": "rejects", "start_char_pos": 583, "end_char_pos": 593}, {"type": "R", "before": "the capture ratiofor a specific receiver", "after": "its capture ratio", "start_char_pos": 642, "end_char_pos": 682}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1189, "end_char_pos": 1189}, {"type": "R", "before": "during storms and during the reception of electrical noise", "after": "from thunderstorms and electrical", "start_char_pos": 1232, "end_char_pos": 1290}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1439, "end_char_pos": 1439}, {"type": "R", "before": "In AM", "after": "For AM reception", "start_char_pos": 1504, "end_char_pos": 1509}, {"type": "R", "before": "any other signal", "after": "signals", "start_char_pos": 1612, "end_char_pos": 1628}, {"type": "R", "before": ". So", "after": ", so", "start_char_pos": 1679, "end_char_pos": 1683}, {"type": "R", "before": "This is", "after": "The ability to receive multiple signals simultaneously is in some cases considered beneficial, and is", "start_char_pos": 1794, "end_char_pos": 1801}, {"type": "D", "before": "for communications", "after": null, "start_char_pos": 1875, "end_char_pos": 1893}, {"type": "R", "before": ", allowing multiple signals transmitted on the same channel to be heard", "after": "for communications", "start_char_pos": 1909, "end_char_pos": 1980}, {"type": "A", "before": null, "after": "AM", "start_char_pos": 2298, "end_char_pos": 2298}, {"type": "A", "before": null, "after": "reception", "start_char_pos": 2360, "end_char_pos": 2360}, {"type": "R", "before": "also", "after": "will", "start_char_pos": 2454, "end_char_pos": 2458}, {"type": "R", "before": "is", "after": "transmits", "start_char_pos": 2592, "end_char_pos": 2594}, {"type": "A", "before": null, "after": "mix", "start_char_pos": 2679, "end_char_pos": 2679}, {"type": "R", "before": "the carriers", "after": "reception", "start_char_pos": 2843, "end_char_pos": 2855}, {"type": "R", "before": "commonly used spacing", "after": "AM band frequency spacing commonly used", "start_char_pos": 3014, "end_char_pos": 3035}, {"type": "D", "before": "Modern SDR-based receivers can completely eliminate this by utilizing a brick-wall filter narrower than the channel spacing that reduces signals outside the passband to inconsequential levels.", "after": null, "start_char_pos": 3062, "end_char_pos": 3254}, {"type": "A", "before": null, "after": ". Modern SDR-based receivers can eliminate this by utilizing a brick-wall filter narrower than the channel spacing, that reduces signals outside the passband to inconsequential levels", "start_char_pos": 3491, "end_char_pos": 3491}], "sents_char_pos": [0, 175, 327, 461, 543, 684, 805, 883, 1046, 1129, 1300, 1503, 1599, 1680, 1793, 2129, 2294, 2562, 2692, 2872, 2976, 3061, 3254, 3377]}
+{"doc_id": "40967465", "revision_depth": "1", "before_revision": "Expressive suppression is a concept \"based on individuals' emotion knowledge, which includes knowledge about the causes of emotion, about their bodily sensations and expressive behavior, and about the possible means of modifying them\" (Niedenthal, 2006 , 157).Niedenthal, P. M., Ric, F., & Krauth-Gruber, S. (2006). Psychology of emotion: Interpersonal, experiential, and cognitive approaches (Chapter 5, Regulation of Emotions, pp. 155-194). New York, NY: Psychology Press. In other words, expressive suppression signifies the act of masking facial giveaways (see facial expression) in order to hide an underlying emotional state (see affect). In fact, simply suppressing the facial expressions that accompany certain emotions can affect \"the individual's experience of emotion\" (Niedenthal, 2006, 165). According to a study done by Kopel Arkowitz(1974), Kopel, S. A., & Arkowitz, H. S. (1974). Role playing as a source of self-observation and behavior change. Journal of Personality & Social Psychology, 29(5), 677-686. repressing the facial expressions associated with pain actually decreased the experience of pain in participants. However, Niedenthal (2006) states that \"there is little evidence that the suppression of spontaneous emotional expression leads to decrease in emotional experience and physiological arousal apart from the manipulation of the pain expressions\" (165) . According to Gross Levenson's ( 1993 ) Gross, J. J., & Levenson, R. W. (1993). Emotional suppression: Physiology, self-report, and expressive behavior. Journal of Personality & Social Psychology, 64(6), 970-986. study in which subjects watched a disgusting film while suppressing or not suppressing their expressions, suppression produced increased blinking. However, suppression also produced a decreased heart rate in participants and self-reports did not reflect that suppression had an effect on disgust experience. While it is unclear from Gross Levenson's (1993) study whether suppression successfully diminishes the experience of emotions, it can be concluded that expressive suppression does not completely inhibit all facial movements and expressions (e.g. blinking of the eyes). Niedenthal (2006) argues that expressive suppression works to decrease the experience of positive emotions whereas it does not successfully decrease the experience of negative emotions. If the suppression of facial expressions does not diminish negative emotions that one experiences, why is it such a common practice? It may be that expressive suppression serves more of a social purpose than it serves a purpose for the individual. In a study done by Kleck et al. in 1976, participants were told to suppress facial expressions of pain during the reception of electric shocks. Specifically, \"in one study the subjects were induced to exaggerate or minimize their facial expressions in order to fool a supposed audience\" (Laird 27) .Laird, J. D. (2007). Feelings: The perception of self. New York: Oxford University Press. This idea of covering up an internal experience in front of observers could be the true reason that expressive suppression is utilized in social situations. \"In everyday life, suppression may serve to conform individuals' outward appearance to emotional norms in a given situation, and to facilitate social interaction\" (Niedenthal, 2006, 168) . In this way, hiding negative emotions may cause for more successful social relationships by preventing conflict, stifling the spread of negative emotions, and protecting an individual from negative judgments made by others (Niedenthal 2006) . Component Expressive suppression is a response-focused emotion regulation strategy (Niedenthal 2006) . This strategy involves an individual voluntarily suppressing their outward emotional expressions. Expressive suppression has a direct relationship to our emotional experiences and is significant in communication studies. Individuals who suppress their emotions are seeking to control their actions and are seeking to maintain a positive social image (Niedenthal 2006) . Expressive suppression involves reducing facial expression and controlling positive and negative feelings of emotion. This type of emotion regulation strategy can have negative emotional and psychological effects on individuals. Emotional suppression reduces expressive behavior significantly. As many researchers have concluded, though emotional suppression decreases outward expressive emotions, it does not decrease our negative feelings and emotional arousal (Niedenthal 2006) . Different forms of emotion regulation affect our response trajectory of emotions. We target situations for regulation by the process of selecting the situations we are exposed to or by modifying the situation we are in. Emotion suppression relates to the behavioral component of emotion. Expressive suppression has physiological influences such as decreasing heart rate, increasing blood pressure, and increasing sympathetic activation (Dan-Glauser Gross, 2011) .Dan-Glauser, E. S., & Gross, J. J. (2011). The temporal dynamics of two response-focused forms of emotion regulation: Experiential, expressive, and autonomic consequences. Psychophysiology, 48(9), 1309-1322. doi:10.1111/j.1469-8986.2011.01191.x Expressive suppression requires self-control. We use self-control when handling our emotion-based expressions in public. It is believed that the use of expressive suppression has a negative connection with a human's well-being ( K\u00fchn et al., 2011).K\u00fchn S., Gallinat J., Brass M. (2011) Keep calm and carry on: Structural correlates of expressive suppression of emotions. PLoS ONE 6(1): e16569. doi:10.1371/journal.pone.0016569 Expressive suppression has been found to occur late, after the peripheral physiological response or emotion process is triggered. K\u00fcnh et al. (2011) compare this strategy to vetoing actions. This type of emotion regulation strategy is considered a method which strongly resists various urges and voluntarily inhibits actions. K\u00fchn et al. (2011) also posited the notion that expression suppression may be internally controlled and that emotional responses are targeted by suppression efforts. Externalizers vs. internalizers Regarding emotion regulation, specifically expressive suppression, there are two groups that can be characterized by their different response patterns. These two groups are labeled externalizers and internalizers. Internalizers generally \"show more skin conductance deflections and greater heart rate acceleration than do externalizers\" when attempting to suppress facial expressions during a potentially emotional event (Buck, 2003, 56) .Buck, R. (2003). Emotional expression, suppression, and control: Nonverbal communication in cultural context. Journal of Intercultural Communication Research, 32(1), 47-65.\" This signifies that internalizers are able to successfully employ expressive suppression while experiencing physiological arousal (Buck, 2003) . However, when asked to describe their feelings, internalizers do not usually speak about themselves or specific feelings, which could be a sign of alexithymia (Buck, 2003) . Alexithymia is defined as the inability to verbally explain an emotional experience or a feeling. Peter Sifneos first used this word in the realm of psychiatry in 1972 and it literally means \"having no words for emotions\" (Muller, When a patient has no story to tell: Alexithymia) .Muller, R. J. (2000). When a patient has no story to tell: Alexithymia. Psychiatric Times, 17(7), 1-6. URL Those who are able to consistently suppress their facial expressions (e.g. internalizers) may be experiencing symptoms of alexithymia. On the other hand, externalizers employ less expressive suppression in response to emotional experiences or other external stimuli and do not usually struggle with alexithymia. Gender differences Men and women do not equally utilize expressive suppression. Typically, men show less facial expression and employ more expressive suppression than do women (Buck, 2003) . This behavior difference rooted in gender difference can be traced back to social norms that are taught to children at a young age. Young boys are implicitly taught that \"big boys don't cry,\" which is a lesson that encourages the suppression of emotional behavior in masculine individuals (Buck, 2003, 56) . This suppression is a result of \"the punishment and consequent conditioned inhibition of all expression of a given emotion\" (Buck, 2003, 56) . If a masculine individual expresses an emotion that is undesirable and society responds by punishing that behavior, that masculine individual will learn to suppress the socially unacceptable behavior. On the other hand, feminine individuals do not experience the same societal pressure to suppress their emotional expressions. Because feminine individuals are not as pressured to keep their emotions concealed, there is not a need for as much expressive suppression on their part. Vs. display rules Complete expressive suppression means that no facial expressions are visible to exemplify a given emotion. However, display rules are examples of a controlled form of expression management and \"involve the learned manipulation of facial expression to agree with cultural conventions and interpersonal expectations in the pursuit of tactical and/or strategic social ends\" (Buck, 2003, 57). The utilization of display rules differs from expressive suppression because when display rules are enacted, the action to manage expression is voluntary, controlled, and incorporates certain types of expressive behavior (Buck, 2003) . Conversely, expressive suppression is involuntary and is the result of social pressures that shape subconscious behaviors. It is not a controlled action nor does expressive suppression involve the manipulation of voluntary expressions, it is only manifested in the absence of expression (Buck, 2003) . There are three ways in which facial expression displays may be influenced: modulation, qualification, and falsification. Modulation refers to the act of showing a different amount of expression than one feels. Qualification requires the addition of an extra (unfelt) emotional expression to the expression of a felt emotion. Lastly, falsification has three separate components. Falsification incorporates expressing an unfelt emotion (simulation), expressing no emotion when an emotion is felt (neutralization), or concealing a felt emotion by expressing an unfelt emotion (masking) (Buck, 2003) . A response-focused strategy Expressive suppression is an emotion management strategy that works to decrease positive emotional experiences, however, it has not been proven to reduce the experience of negative emotions. This strategy is a response-focused form of emotion regulation, which \"refers to things we do once an emotion is underway and response tendencies have already been generated\" (Srivastava et al., 2009, 883). Srivastava, S., Tamir, M., McGonigal, K. M., John, O. P., & Gross, J. J. (2009). The social costs of emotional suppression: A prospective study of the transition to college. Journal of Personality and Social Psychology, 96(4), 883-897. doi:10.1037/a0014755 Response-focused strategies are generally not as successful as antecedent-focused regulation strategies, which refers to \"things we do, either consciously or automatically, before emotion-response tendencies have become fully activated\" (Srivastava et al. , 2009, 883). Srivastava et al. (2009) performed a study in which the effectiveness of students' use of expressive suppression was analyzed in the transition period between high school and college. This study concluded that \"suppression is an antecedent of poor social functioning\" in the domains of social support, closeness, and social satisfaction (Srivastava et al. , 2009, 893). Psychological consequences Suppressing the expression of emotion is one of the most frequent emotion-regulation strategies utilized by human beings. Clinical traditions state that a person's psychological health is based upon how affective impulses are regulated; the consequences of affective regulation have become, therefore, a main focus of psychological researchers. Gross Levenson (1993) explain how the psychological consequences directly related to expressive suppression are frequently disputed. Researchers such as Cannon(1927)Cannon , W. B. ( 1927). The James-Lange theory of emotion: A critical examination and alternative theory. American Journal of Psychology, 39, 106\u2013 124. and Jones(1935)Jones , H. E. (1935). The galvanic skin reflex as related to overt emotional expression. American Journal of Psychology, 47, 241\u2013251. state that suppressing a physical emotional response while emotionally aroused will increase the emotional experience due to concentration on suppressing that emotion.These researchers argue that common sense tells us emotions become more severe the longer they are bottled up.Other researchers such as Darwin(1872)Darwin , C. (1872). The expression of the emotions in man and animals. London: Murray. and Tomkins(1984)Tomkins , S. (1984). Affect theory. In K. R.Scherer & P.Ekman ( Eds.), Approaches to emotion (163\u2013 195). Hillsdale, NJ: Erlbaum. dispute this theory, saying that emotional expression is so significant to the overall emotional response that when suppression occurs, all other responses (e.g. physiological) are weakened. Darwin (1872) and Tomkins (1984) solidify this argument with the tradition that people are taught to count to ten when emotionally aroused in order to calm themselves down. If suppressing emotions were to increase the emotional experience, this counting exercise would only intensify a person's reactions ; however , it has been deemed to do the opposite. Unfortunately, few studies have been carried out to test these hypotheses (Gross Levenson, 1993) . The idea that people have conflicting views on what is better - to bottle up emotions by counting to ten before acting/speaking or to release emotions as bottling them up is bad for your mental health - is of constant interest to researchers in the field of emotion. These differing views on such a commonplace human behavior suggest that expressive suppression is one of the more complicated emotion-regulation techniques. As a solution to these opposing ideas, it has been suggested (and mentioned in the Externalizers vs. Internalizers section above) that people have a tendency to be either emotionally expressive (externalizers) or inexpressive (internalizers). The habitual use of one expressive technique over the other leads to different psychological and physiological consequences over time. Expressive behavior is directly related to emotional suppression as it is assumed that internalizers consciously choose not to express themselves. However, this assumption has gone primarily untested with the exception of Notarius Levenson( 1979 ) , whose research found that internalizers are more physiologically reactive to emotional stimuli than externalizers. One explanation for these findings was that when a behavioral emotional response is suppressed it must be released in other ways, in this case physiological reactions (Gross Levenson, 1993) . These findings lend themselves to the suggestion by Cannon (1927) and Jones (1935) that emotional suppression intensifies other reactions. It has also been suggested that illness and disease is increased by continued emotional suppression, especially the suppression of intensely aggressive emotions such as anger and hostility which can lead to hypertension and coronary heart-disease. As well as physical illness, expressive suppression is said to be the cause of mental illnesses such as depression. Many psychotherapists will try to relieve their patients' illness/strain by teaching them expressive techniques in a controlled environment or within the particular relationship in which their suppressed emotions are causing problems (Gross Levenson, 1997) .Gross, J. J., Levenson, R. W. (1997), Hiding feelings: The acute effects of inhibiting negative and positive emotion. Journal of Abnormal Psychology, Vol 106(1), Feb, 1997. pp. 95-103. A counter-argument to this idea suggests that expressive suppression is an important part of emotional regulation that needs to be learned due to its beneficial use in adulthood. Adults must learn to successfully suppress certain emotional responses (e.g. those to anger which could have destructive social consequences). However, then the question is whether or not to suppress all anger-related responses, or to release those less volatile in order to reduce the risk of contracting physical and mental illnesses. The Clinical Theory implies that there is an optimum level between total suppression and total expression which, during adulthood, a person must find in order to protect their physical and psychological being (Gross Levenson 1997) . While expressive suppression may be socially acceptable in certain situations, it cannot be considered a healthy practice at all times. Concealing and suppressing expressions can cause stress-related physiological reactions. Stress occurs because \"the social disapproval and punishment of overt emotional expression that causes suppression is itself intimidating and stressful\" (Buck, 2003, 57) . There are several occupations which require the suppression of positive or negative emotions, such as estate agents masking their happiness when an offer is placed on a house to maintain their professionalism, or elementary-school teachers suppressing their anger so as to not upset their young students when teaching them right from wrong. Only in recent studies have researchers begun looking into the effects that continual suppression of emotion in the workplace has on people (Cote, 2005) .Cote, S. (2005). A social-interaction model of the effects of emotion regulation on work strain. The Academy of Management, 30(3), 509-530. Cote (2005) notes that continual suppression causes strain on those utilizing it, especially on those who may be natural externalizers. Strain elicited by such suppression can cause an elevated heart-rate, increased anxiety, low commitment and other effects which can be detrimental to an employee. The common conception is that expressive suppression in the workplace is beneficial for the organization and dangerous for the employee over long periods of time. However, Cote ( 2005 ) found that factors contributing to the social dynamics of emotions determine when emotion regulation increases, decreases, or does not affect strain at all. The suppression of unpleasant emotions such as anger contribute to increasing high levels of strain. Link with depression Expressive suppression, as an emotion regulation strategy, serves different purposes such as supporting goal pursuits and satisfying hedonic needs (Larsen 2012) .Larsen, J., Vermulst, A., Eisinga, R., English, T., Gross, J., Hofman, E., & Engels, R. (2012). Social coping by masking? Parental support and peer victimization as mediators of the relationship between depressive symptoms and expressive suppression in adolescents. Journal of Youth & Adolescence, 41(12), 1628-1642. doi:10.1007/s10964-012-9782-7 Though expressive suppression is considered a weak influence on the experience of emotion, it has other functions. Expressive suppression is a goal-oriented strategy which is guided by people's beliefs and potentially by abstract theories about emotion regulation (Larsen 2012) . In a study by Larsen et al. (2012) , the researchers looked at the positive association between expressive suppression and depressive symptoms among adults and adolescents which are influenced by parental support and peer victimization. They found a reciprocal relationship between parental support and depressive symptoms. The same was not true for the relationship between peer victimization and depressive symptoms. Depressive symptoms followed decreased perception of parental support one year later. They found that initial suppression occurred after increases in depressive symptoms one year later, yet depression did not occur after suppression. However, in a continuation of their original study, Larsen et al. (2012) found that this relationship between suppression and depression was reversed. Depressive symptoms occurred after the use of suppression, and suppression did not occur after future depressive symptoms (Larsen et al. , 2012). Larsen et al. (2012) support that expressive suppression has physiological, social, and cognitive costs. Some evidence says that \"depressed people judge their negative emotions as less socially acceptable\" than non-depressed people (Larsen, 2012, 194) . \"Appraising one's emotions as unacceptable mediates the relationship between negative emotion intensity and use of suppression\" (194) . Negative social consequences As an appropriate level of expressive suppression is important for physiological and psychological health, it is equally as important for the maintenance of social situations. However, excessive use of expressive suppression can negatively affect social interactions. While expressive suppression may seem like an easier way of coping with emotions in society or of becoming more likable in a social environment, it actually alters behavior in a way that is visible and undesirable to others (Srivastava et al. , 2009). Because expressive suppression is an action that occurs in social interactions, it is reasonable that this emotion regulation strategy would have social implications. Specifically, suppression involves three social costs. The act of suppressing facial expressions prohibits others in the social world from gaining information about a suppressor's emotional state. This can prevent a suppressor from receiving social emotional benefits such as sympathy or sharing in collective positive and negative emotions that \"facilitate social bonding\" (Srivastava et al. , 2009, 895). Secondly, expressive suppression is not always fully successful. If a suppressor accidentally shows signs of concealed feelings, others may perceive that the suppressor is covering up true emotions and may assume that the suppressor is insincere and uninterested in forming legitimate social relationships (Srivastava et al. , 2009). Lastly, expressive suppression is hard work and therefore requires more cognitive processing than freely communicating emotions. If a suppressor is unable to devote full attention to social interactions because he/she is using cognitive power to suppress, the suppressor will not be able to remain engaged nor put in the work to maintain relationships (Srivastava et al., 2009) .", "after_revision": "Expressive suppression is a concept \"based on individuals' emotion knowledge, which includes knowledge about the causes of emotion, about their bodily sensations and expressive behavior, and about the possible means of modifying them\" Niedenthal , P. M., Ric, F., & Krauth-Gruber, S. (2006). Psychology of emotion: Interpersonal, experiential, and cognitive approaches (Chapter 5, Regulation of Emotions, pp. 155-194). New York, NY: Psychology Press. In other words, expressive suppression signifies the act of masking facial giveaways (see facial expression) in order to hide an underlying emotional state (see affect). In fact, simply suppressing the facial expressions that accompany certain emotions can affect \"the individual's experience of emotion\" According to a 1974 study done by Kopel and Arkowitz, repressing the facial expressions associated with pain actually decreased the experience of pain in participants. Kopel, S. A., & Arkowitz, H. S. (1974). Role playing as a source of self-observation and behavior change. Journal of Personality & Social Psychology, 29(5), 677-686. However, \"there is little evidence that the suppression of spontaneous emotional expression leads to decrease in emotional experience and physiological arousal apart from the manipulation of the pain expressions\" . According to Gross and Levenson's 1993 study in which subjects watched a disgusting film while suppressing or not suppressing their expressions, suppression produced increased blinking. Gross, J. J., & Levenson, R. W. (1993). Emotional suppression: Physiology, self-report, and expressive behavior. Journal of Personality & Social Psychology, 64(6), 970-986. However, suppression also produced a decreased heart rate in participants and self-reports did not reflect that suppression had an effect on disgust experience. While it is unclear from Gross and Levenson's study whether suppression successfully diminishes the experience of emotions, it can be concluded that expressive suppression does not completely inhibit all facial movements and expressions (e.g. blinking of the eyes). Niedenthal argues that expressive suppression works to decrease the experience of positive emotions whereas it does not successfully decrease the experience of negative emotions. If the suppression of facial expressions does not diminish negative emotions that one experiences, why is it such a common practice? It may be that expressive suppression serves more of a social purpose than it serves a purpose for the individual. In a study done by Kleck and colleagues in 1976, participants were told to suppress facial expressions of pain during the reception of electric shocks. Specifically, \"in one study the subjects were induced to exaggerate or minimize their facial expressions in order to fool a supposed audience\" .Laird, J. D. (2007). Feelings: The perception of self. New York: Oxford University Press. This idea of covering up an internal experience in front of observers could be the true reason that expressive suppression is utilized in social situations. \"In everyday life, suppression may serve to conform individuals' outward appearance to emotional norms in a given situation, and to facilitate social interaction\" . In this way, hiding negative emotions may cause for more successful social relationships by preventing conflict, stifling the spread of negative emotions, and protecting an individual from negative judgments made by others . Component Expressive suppression is a response-focused emotion regulation strategy . This strategy involves an individual voluntarily suppressing their outward emotional expressions. Expressive suppression has a direct relationship to our emotional experiences and is significant in communication studies. Individuals who suppress their emotions are seeking to control their actions and are seeking to maintain a positive social image . Expressive suppression involves reducing facial expression and controlling positive and negative feelings of emotion. This type of emotion regulation strategy can have negative emotional and psychological effects on individuals. Emotional suppression reduces expressive behavior significantly. As many researchers have concluded, though emotional suppression decreases outward expressive emotions, it does not decrease our negative feelings and emotional arousal . Different forms of emotion regulation affect our response trajectory of emotions. We target situations for regulation by the process of selecting the situations we are exposed to or by modifying the situation we are in. Emotion suppression relates to the behavioral component of emotion. Expressive suppression has physiological influences such as decreasing heart rate, increasing blood pressure, and increasing sympathetic activation .Dan-Glauser, E. S., & Gross, J. J. (2011). The temporal dynamics of two response-focused forms of emotion regulation: Experiential, expressive, and autonomic consequences. Psychophysiology, 48(9), 1309-1322. doi:10.1111/j.1469-8986.2011.01191.x Expressive suppression requires self-control. We use self-control when handling our emotion-based expressions in public. It is believed that the use of expressive suppression has a negative connection with a human's well-being . K\u00fchn S., Gallinat J., Brass M. (2011) Keep calm and carry on: Structural correlates of expressive suppression of emotions. PLoS ONE 6(1): e16569. doi:10.1371/journal.pone.0016569 Expressive suppression has been found to occur late, after the peripheral physiological response or emotion process is triggered. K\u00fcnh et al. (2011) compare this strategy to vetoing actions. This type of emotion regulation strategy is considered a method which strongly resists various urges and voluntarily inhibits actions. K\u00fchn et al. (2011) also posited the notion that expression suppression may be internally controlled and that emotional responses are targeted by suppression efforts. Externalizers vs. internalizers Regarding emotion regulation, specifically expressive suppression, there are two groups that can be characterized by their different response patterns. These two groups are labeled externalizers and internalizers. Internalizers generally \"show more skin conductance deflections and greater heart rate acceleration than do externalizers\" when attempting to suppress facial expressions during a potentially emotional event .Buck, R. (2003). Emotional expression, suppression, and control: Nonverbal communication in cultural context. Journal of Intercultural Communication Research, 32(1), 47-65.\" This signifies that internalizers are able to successfully employ expressive suppression while experiencing physiological arousal . However, when asked to describe their feelings, internalizers do not usually speak about themselves or specific feelings, which could be a sign of alexithymia . Alexithymia is defined as the inability to verbally explain an emotional experience or a feeling. Peter Sifneos first used this word in the realm of psychiatry in 1972 and it literally means \"having no words for emotions\" .Muller, R. J. (2000). When a patient has no story to tell: Alexithymia. Psychiatric Times, 17(7), 1-6. URL Those who are able to consistently suppress their facial expressions (e.g. internalizers) may be experiencing symptoms of alexithymia. On the other hand, externalizers employ less expressive suppression in response to emotional experiences or other external stimuli and do not usually struggle with alexithymia. Gender differences Men and women do not equally utilize expressive suppression. Typically, men show less facial expression and employ more expressive suppression than do women . This behavior difference rooted in gender difference can be traced back to social norms that are taught to children at a young age. Young boys are implicitly taught that \"big boys don't cry,\" which is a lesson that encourages the suppression of emotional behavior in masculine individuals . This suppression is a result of \"the punishment and consequent conditioned inhibition of all expression of a given emotion\" . If a masculine individual expresses an emotion that is undesirable and society responds by punishing that behavior, that masculine individual will learn to suppress the socially unacceptable behavior. On the other hand, feminine individuals do not experience the same societal pressure to suppress their emotional expressions. Because feminine individuals are not as pressured to keep their emotions concealed, there is not a need for as much expressive suppression on their part. Vs. display rules Complete expressive suppression means that no facial expressions are visible to exemplify a given emotion. However, display rules are examples of a controlled form of expression management and \"involve the learned manipulation of facial expression to agree with cultural conventions and interpersonal expectations in the pursuit of tactical and/or strategic social ends\" The utilization of display rules differs from expressive suppression because when display rules are enacted, the action to manage expression is voluntary, controlled, and incorporates certain types of expressive behavior . Conversely, expressive suppression is involuntary and is the result of social pressures that shape subconscious behaviors. It is not a controlled action nor does expressive suppression involve the manipulation of voluntary expressions, it is only manifested in the absence of expression . There are three ways in which facial expression displays may be influenced: modulation, qualification, and falsification. Modulation refers to the act of showing a different amount of expression than one feels. Qualification requires the addition of an extra (unfelt) emotional expression to the expression of a felt emotion. Lastly, falsification has three separate components. Falsification incorporates expressing an unfelt emotion (simulation), expressing no emotion when an emotion is felt (neutralization), or concealing a felt emotion by expressing an unfelt emotion (masking) . A response-focused strategy Expressive suppression is an emotion management strategy that works to decrease positive emotional experiences, however, it has not been proven to reduce the experience of negative emotions. This strategy is a response-focused form of emotion regulation, which \"refers to things we do once an emotion is underway and response tendencies have already been generated\" . Srivastava, S., Tamir, M., McGonigal, K. M., John, O. P., & Gross, J. J. (2009). The social costs of emotional suppression: A prospective study of the transition to college. Journal of Personality and Social Psychology, 96(4), 883-897. doi:10.1037/a0014755 Response-focused strategies are generally not as successful as antecedent-focused regulation strategies, which refers to \"things we do, either consciously or automatically, before emotion-response tendencies have become fully activated\" . Srivastava and colleagues performed a study in 2009 in which the effectiveness of students' use of expressive suppression was analyzed in the transition period between high school and college. This study concluded that \"suppression is an antecedent of poor social functioning\" in the domains of social support, closeness, and social satisfaction . Psychological consequences Suppressing the expression of emotion is one of the most frequent emotion-regulation strategies utilized by human beings. Clinical traditions state that a person's psychological health is based upon how affective impulses are regulated; the consequences of affective regulation have become, therefore, a main focus of psychological researchers. The psychological consequences directly related to expressive suppression are frequently disputed. Some early 20th-century researchers state that suppressing a physical emotional response while emotionally aroused will increase the emotional experience due to concentration on suppressing that emotion. These researchers argue that common sense tells us emotions become more severe the longer they are bottled up.Cannon , W. B. ( 1927). The James-Lange theory of emotion: A critical examination and alternative theory. American Journal of Psychology, 39, 106\u2013 124. Jones , H. E. (1935). The galvanic skin reflex as related to overt emotional expression. American Journal of Psychology, 47, 241\u2013251. Other researchers dispute this theory, saying that emotional expression is so significant to the overall emotional response that when suppression occurs, all other responses (e.g. physiological) are weakened.Darwin , C. (1872). The expression of the emotions in man and animals. London: Murray. Tomkins , S. (1984). Affect theory. In K. R.Scherer & P.Ekman ( Eds.), Approaches to emotion (163\u2013 195). Hillsdale, NJ: Erlbaum. These researchers solidify this argument with the tradition that people are taught to count to ten when emotionally aroused in order to calm themselves down. If suppressing emotions were to increase the emotional experience, this counting exercise would only intensify a person's reactions . Gowever , it has been deemed to do the opposite. Unfortunately, few studies have been carried out to test these hypotheses . The idea that people have conflicting views on what is better - to bottle up emotions by counting to ten before acting/speaking or to release emotions as bottling them up is bad for your mental health - is of constant interest to researchers in the field of emotion. These differing views on such a commonplace human behavior suggest that expressive suppression is one of the more complicated emotion-regulation techniques. As a solution to these opposing ideas, it has been suggested (and mentioned in the Externalizers vs. Internalizers section above) that people have a tendency to be either emotionally expressive (externalizers) or inexpressive (internalizers). The habitual use of one expressive technique over the other leads to different psychological and physiological consequences over time. Expressive behavior is directly related to emotional suppression as it is assumed that internalizers consciously choose not to express themselves. However, this assumption has gone primarily untested with the exception of a 1979 study by Notarius and Levenson , whose research found that internalizers are more physiologically reactive to emotional stimuli than externalizers. One explanation for these findings was that when a behavioral emotional response is suppressed it must be released in other ways, in this case physiological reactions . These findings lend themselves to the suggestion by Cannon (1927) and Jones (1935) that emotional suppression intensifies other reactions. It has also been suggested that illness and disease is increased by continued emotional suppression, especially the suppression of intensely aggressive emotions such as anger and hostility which can lead to hypertension and coronary heart-disease. As well as physical illness, expressive suppression is said to be the cause of mental illnesses such as depression. Many psychotherapists will try to relieve their patients' illness/strain by teaching them expressive techniques in a controlled environment or within the particular relationship in which their suppressed emotions are causing problems .Gross, J. J., Levenson, R. W. (1997), Hiding feelings: The acute effects of inhibiting negative and positive emotion. Journal of Abnormal Psychology, Vol 106(1), Feb, 1997. pp. 95-103. A counter-argument to this idea suggests that expressive suppression is an important part of emotional regulation that needs to be learned due to its beneficial use in adulthood. Adults must learn to successfully suppress certain emotional responses (e.g. those to anger which could have destructive social consequences). However, then the question is whether or not to suppress all anger-related responses, or to release those less volatile in order to reduce the risk of contracting physical and mental illnesses. The Clinical Theory implies that there is an optimum level between total suppression and total expression which, during adulthood, a person must find in order to protect their physical and psychological being . While expressive suppression may be socially acceptable in certain situations, it cannot be considered a healthy practice at all times. Concealing and suppressing expressions can cause stress-related physiological reactions. Stress occurs because \"the social disapproval and punishment of overt emotional expression that causes suppression is itself intimidating and stressful\" . There are several occupations which require the suppression of positive or negative emotions, such as estate agents masking their happiness when an offer is placed on a house to maintain their professionalism, or elementary-school teachers suppressing their anger so as to not upset their young students when teaching them right from wrong. Only in recent studies have researchers begun looking into the effects that continual suppression of emotion in the workplace has on people .Cote, S. (2005). A social-interaction model of the effects of emotion regulation on work strain. The Academy of Management, 30(3), 509-530. Continual suppression causes strain on those utilizing it, especially on those who may be natural externalizers. Strain elicited by such suppression can cause an elevated heart-rate, increased anxiety, low commitment and other effects which can be detrimental to an employee. The common conception is that expressive suppression in the workplace is beneficial for the organization and dangerous for the employee over long periods of time. However, in a 2005 study, Cote found that factors contributing to the social dynamics of emotions determine when emotion regulation increases, decreases, or does not affect strain at all. The suppression of unpleasant emotions such as anger contribute to increasing high levels of strain. Link with depression Expressive suppression, as an emotion regulation strategy, serves different purposes such as supporting goal pursuits and satisfying hedonic needs .Larsen, J., Vermulst, A., Eisinga, R., English, T., Gross, J., Hofman, E., & Engels, R. (2012). Social coping by masking? Parental support and peer victimization as mediators of the relationship between depressive symptoms and expressive suppression in adolescents. Journal of Youth & Adolescence, 41(12), 1628-1642. doi:10.1007/s10964-012-9782-7 Though expressive suppression is considered a weak influence on the experience of emotion, it has other functions. Expressive suppression is a goal-oriented strategy which is guided by people's beliefs and potentially by abstract theories about emotion regulation . In a 2012 study by Larsen and colleagues , the researchers looked at the positive association between expressive suppression and depressive symptoms among adults and adolescents which are influenced by parental support and peer victimization. They found a reciprocal relationship between parental support and depressive symptoms. The same was not true for the relationship between peer victimization and depressive symptoms. Depressive symptoms followed decreased perception of parental support one year later. They found that initial suppression occurred after increases in depressive symptoms one year later, yet depression did not occur after suppression. However, in a continuation of their original study, Larsen and colleagues found that this relationship between suppression and depression was reversed. Depressive symptoms occurred after the use of suppression, and suppression did not occur after future depressive symptoms . The authors of this study support that expressive suppression has physiological, social, and cognitive costs. Some evidence says that \"depressed people judge their negative emotions as less socially acceptable\" than non-depressed people . \"Appraising one's emotions as unacceptable mediates the relationship between negative emotion intensity and use of suppression\" . Negative social consequences As an appropriate level of expressive suppression is important for physiological and psychological health, it is equally as important for the maintenance of social situations. However, excessive use of expressive suppression can negatively affect social interactions. While expressive suppression may seem like an easier way of coping with emotions in society or of becoming more likable in a social environment, it actually alters behavior in a way that is visible and undesirable to others . Because expressive suppression is an action that occurs in social interactions, it is reasonable that this emotion regulation strategy would have social implications. Specifically, suppression involves three social costs. The act of suppressing facial expressions prohibits others in the social world from gaining information about a suppressor's emotional state. This can prevent a suppressor from receiving social emotional benefits such as sympathy or sharing in collective positive and negative emotions that \"facilitate social bonding\" . Secondly, expressive suppression is not always fully successful. If a suppressor accidentally shows signs of concealed feelings, others may perceive that the suppressor is covering up true emotions and may assume that the suppressor is insincere and uninterested in forming legitimate social relationships . Lastly, expressive suppression is hard work and therefore requires more cognitive processing than freely communicating emotions. If a suppressor is unable to devote full attention to social interactions because he/she is using cognitive power to suppress, the suppressor will not be able to remain engaged nor put in the work to maintain relationships .", "edit_actions": [{"type": "R", "before": "(Niedenthal, 2006", "after": "Niedenthal", "start_char_pos": 235, "end_char_pos": 252}, {"type": "D", "before": "157).Niedenthal,", "after": null, "start_char_pos": 255, "end_char_pos": 271}, {"type": "D", "before": "(Niedenthal, 2006, 165).", "after": null, "start_char_pos": 780, "end_char_pos": 804}, {"type": "A", "before": null, "after": "1974", "start_char_pos": 820, "end_char_pos": 820}, {"type": "R", "before": "Arkowitz(1974),", "after": "and Arkowitz, repressing the facial expressions associated with pain actually decreased the experience of pain in participants.", "start_char_pos": 841, "end_char_pos": 856}, {"type": "R", "before": "repressing the facial expressions associated with pain actually decreased the experience of pain in participants. However, Niedenthal (2006) states that", "after": "However,", "start_char_pos": 1023, "end_char_pos": 1175}, {"type": "D", "before": "(165)", "after": null, "start_char_pos": 1380, "end_char_pos": 1385}, {"type": "A", "before": null, "after": "and", "start_char_pos": 1407, "end_char_pos": 1407}, {"type": "D", "before": "(", "after": null, "start_char_pos": 1419, "end_char_pos": 1420}, {"type": "R", "before": ")", "after": "study in which subjects watched a disgusting film while suppressing or not suppressing their expressions, suppression produced increased blinking.", "start_char_pos": 1426, "end_char_pos": 1427}, {"type": "D", "before": "study in which subjects watched a disgusting film while suppressing or not suppressing their expressions, suppression produced increased blinking.", "after": null, "start_char_pos": 1601, "end_char_pos": 1747}, {"type": "A", "before": null, "after": "and", "start_char_pos": 1940, "end_char_pos": 1940}, {"type": "D", "before": "(1993)", "after": null, "start_char_pos": 1952, "end_char_pos": 1958}, {"type": "D", "before": "(2006)", "after": null, "start_char_pos": 2190, "end_char_pos": 2196}, {"type": "R", "before": "et al.", "after": "and colleagues", "start_char_pos": 2638, "end_char_pos": 2644}, {"type": "D", "before": "(Laird 27)", "after": null, "start_char_pos": 2900, "end_char_pos": 2910}, {"type": "D", "before": "(Niedenthal, 2006, 168)", "after": null, "start_char_pos": 3322, "end_char_pos": 3345}, {"type": "D", "before": "(Niedenthal 2006)", "after": null, "start_char_pos": 3571, "end_char_pos": 3588}, {"type": "D", "before": "(Niedenthal 2006)", "after": null, "start_char_pos": 3674, "end_char_pos": 3691}, {"type": "D", "before": "(Niedenthal 2006)", "after": null, "start_char_pos": 4044, "end_char_pos": 4061}, {"type": "D", "before": "(Niedenthal 2006)", "after": null, "start_char_pos": 4527, "end_char_pos": 4544}, {"type": "D", "before": "(Dan-Glauser", "after": null, "start_char_pos": 4983, "end_char_pos": 4995}, {"type": "D", "before": "Gross, 2011)", "after": null, "start_char_pos": 4996, "end_char_pos": 5008}, {"type": "R", "before": "(", "after": ".", "start_char_pos": 5482, "end_char_pos": 5483}, {"type": "D", "before": "et al., 2011).K\u00fchn", "after": null, "start_char_pos": 5489, "end_char_pos": 5507}, {"type": "D", "before": "(Buck, 2003, 56)", "after": null, "start_char_pos": 6627, "end_char_pos": 6643}, {"type": "D", "before": "(Buck, 2003)", "after": null, "start_char_pos": 6949, "end_char_pos": 6961}, {"type": "D", "before": "(Buck, 2003)", "after": null, "start_char_pos": 7123, "end_char_pos": 7135}, {"type": "D", "before": "(Muller, When a patient has no story to tell: Alexithymia)", "after": null, "start_char_pos": 7360, "end_char_pos": 7418}, {"type": "D", "before": "(Buck, 2003)", "after": null, "start_char_pos": 8015, "end_char_pos": 8027}, {"type": "D", "before": "(Buck, 2003, 56)", "after": null, "start_char_pos": 8319, "end_char_pos": 8335}, {"type": "D", "before": "(Buck, 2003, 56)", "after": null, "start_char_pos": 8462, "end_char_pos": 8478}, {"type": "D", "before": "(Buck, 2003, 57).", "after": null, "start_char_pos": 9351, "end_char_pos": 9368}, {"type": "D", "before": "(Buck, 2003)", "after": null, "start_char_pos": 9590, "end_char_pos": 9602}, {"type": "D", "before": "(Buck, 2003)", "after": null, "start_char_pos": 9892, "end_char_pos": 9904}, {"type": "D", "before": "(Buck, 2003)", "after": null, "start_char_pos": 10491, "end_char_pos": 10503}, {"type": "R", "before": "(Srivastava et al., 2009, 883).", "after": ".", "start_char_pos": 10900, "end_char_pos": 10931}, {"type": "R", "before": "(Srivastava et al. , 2009, 883). Srivastava et al. (2009)", "after": ". Srivastava and colleagues", "start_char_pos": 11426, "end_char_pos": 11483}, {"type": "A", "before": null, "after": "2009 in", "start_char_pos": 11505, "end_char_pos": 11505}, {"type": "R", "before": "(Srivastava et al. , 2009, 893).", "after": ".", "start_char_pos": 11797, "end_char_pos": 11829}, {"type": "D", "before": "Gross", "after": null, "start_char_pos": 12202, "end_char_pos": 12207}, {"type": "R", "before": "Levenson (1993) explain how the", "after": "The", "start_char_pos": 12208, "end_char_pos": 12239}, {"type": "R", "before": "Researchers such as Cannon(1927)Cannon", "after": "Some early 20th-century researchers state that suppressing a physical emotional response while emotionally aroused will increase the emotional experience due to concentration on suppressing that emotion. These researchers argue that common sense tells us emotions become more severe the longer they are bottled up.Cannon", "start_char_pos": 12335, "end_char_pos": 12373}, {"type": "R", "before": "and Jones(1935)Jones", "after": "Jones", "start_char_pos": 12519, "end_char_pos": 12539}, {"type": "R", "before": "state that suppressing a physical emotional response while emotionally aroused will increase the", "after": "Other researchers dispute this theory, saying that", "start_char_pos": 12668, "end_char_pos": 12764}, {"type": "R", "before": "experience due to concentration on suppressing that emotion.These researchers argue that common sense tells us emotions become more severe the longer they are bottled up.Other researchers such as Darwin(1872)Darwin", "after": "expression is so significant to the overall emotional response that when suppression occurs, all other responses (e.g. physiological) are weakened.Darwin", "start_char_pos": 12775, "end_char_pos": 12989}, {"type": "R", "before": "and Tomkins(1984)Tomkins", "after": "Tomkins", "start_char_pos": 13070, "end_char_pos": 13094}, {"type": "R", "before": "dispute this theory, saying that emotional expression is so significant to the overall emotional response that when suppression occurs, all other responses (e.g. physiological) are weakened. Darwin (1872) and Tomkins (1984)", "after": "These researchers", "start_char_pos": 13216, "end_char_pos": 13439}, {"type": "R", "before": "; however", "after": ". Gowever", "start_char_pos": 13712, "end_char_pos": 13721}, {"type": "D", "before": "(Gross", "after": null, "start_char_pos": 13837, "end_char_pos": 13843}, {"type": "D", "before": "Levenson, 1993)", "after": null, "start_char_pos": 13844, "end_char_pos": 13859}, {"type": "D", "before": "Notarius", "after": null, "start_char_pos": 14886, "end_char_pos": 14894}, {"type": "R", "before": "Levenson(", "after": "a", "start_char_pos": 14895, "end_char_pos": 14904}, {"type": "R", "before": ")", "after": "study by Notarius and Levenson", "start_char_pos": 14910, "end_char_pos": 14911}, {"type": "D", "before": "(Gross", "after": null, "start_char_pos": 15196, "end_char_pos": 15202}, {"type": "D", "before": "Levenson, 1993)", "after": null, "start_char_pos": 15203, "end_char_pos": 15218}, {"type": "D", "before": "(Gross", "after": null, "start_char_pos": 15958, "end_char_pos": 15964}, {"type": "D", "before": "Levenson, 1997)", "after": null, "start_char_pos": 15965, "end_char_pos": 15980}, {"type": "D", "before": "(Gross", "after": null, "start_char_pos": 16892, "end_char_pos": 16898}, {"type": "D", "before": "Levenson 1997)", "after": null, "start_char_pos": 16899, "end_char_pos": 16913}, {"type": "D", "before": "(Buck, 2003, 57)", "after": null, "start_char_pos": 17294, "end_char_pos": 17310}, {"type": "D", "before": "(Cote, 2005)", "after": null, "start_char_pos": 17794, "end_char_pos": 17806}, {"type": "R", "before": "Cote (2005) notes that continual", "after": "Continual", "start_char_pos": 17948, "end_char_pos": 17980}, {"type": "R", "before": "Cote (", "after": "in a", "start_char_pos": 18419, "end_char_pos": 18425}, {"type": "R", "before": ")", "after": "study, Cote", "start_char_pos": 18431, "end_char_pos": 18432}, {"type": "D", "before": "(Larsen 2012)", "after": null, "start_char_pos": 18859, "end_char_pos": 18872}, {"type": "D", "before": "(Larsen 2012)", "after": null, "start_char_pos": 19485, "end_char_pos": 19498}, {"type": "A", "before": null, "after": "2012", "start_char_pos": 19506, "end_char_pos": 19506}, {"type": "R", "before": "et al. (2012)", "after": "and colleagues", "start_char_pos": 19523, "end_char_pos": 19536}, {"type": "R", "before": "et al. (2012)", "after": "and colleagues", "start_char_pos": 20214, "end_char_pos": 20227}, {"type": "R", "before": "(Larsen et al. , 2012). Larsen et al. (2012)", "after": ". The authors of this study", "start_char_pos": 20428, "end_char_pos": 20472}, {"type": "D", "before": "(Larsen, 2012, 194)", "after": null, "start_char_pos": 20684, "end_char_pos": 20703}, {"type": "D", "before": "(194)", "after": null, "start_char_pos": 20834, "end_char_pos": 20839}, {"type": "R", "before": "(Srivastava et al. , 2009).", "after": ".", "start_char_pos": 21363, "end_char_pos": 21390}, {"type": "R", "before": "(Srivastava et al. , 2009, 895).", "after": ".", "start_char_pos": 21932, "end_char_pos": 21964}, {"type": "R", "before": "(Srivastava et al. , 2009).", "after": ".", "start_char_pos": 22271, "end_char_pos": 22298}, {"type": "D", "before": "(Srivastava et al., 2009)", "after": null, "start_char_pos": 22651, "end_char_pos": 22676}], "sents_char_pos": [0, 260, 315, 442, 474, 644, 804, 896, 962, 1136, 1387, 1467, 1540, 1747, 1908, 2178, 2364, 2497, 2612, 2756, 2912, 2932, 2966, 3001, 3158, 3347, 3693, 3791, 3914, 4181, 4292, 4357, 4546, 4628, 4766, 4834, 5052, 5181, 5300, 5375, 5503, 5625, 5811, 5872, 6007, 6173, 6357, 6419, 6645, 6661, 6754, 6818, 6963, 7235, 7420, 7441, 7491, 7661, 7838, 7918, 8029, 8161, 8337, 8480, 8681, 8807, 8961, 9086, 9368, 9727, 9906, 10028, 10117, 10232, 10285, 10505, 10724, 10931, 11012, 11105, 11458, 11643, 11829, 11978, 12093, 12201, 12334, 12390, 12472, 12555, 12622, 12835, 12945, 13002, 13053, 13107, 13122, 13191, 13406, 13579, 13713, 13762, 13861, 14128, 14285, 14386, 14528, 14663, 14810, 15028, 15220, 15359, 15607, 15723, 15982, 16099, 16166, 16345, 16488, 16682, 16915, 17051, 17140, 17312, 17653, 17808, 17824, 17904, 17947, 18083, 18246, 18409, 18589, 18690, 18874, 18969, 18995, 19139, 19335, 19500, 19738, 19825, 19920, 20006, 20154, 20305, 20451, 20556, 21046, 21138, 21390, 21557, 21612, 21754, 21964, 22029, 22298, 22427]}
+{"doc_id": "40977477", "revision_depth": "2", "before_revision": "Cross-species transmission (CST), also called interspecies transmission, host jump, or spillover, is the transmission of an infectious pathogen, such as a foreign virus, between hosts belonging to different species. Once introduced into an individual of a new host species, the pathogen may acquire the ability to infect other individuals of the same species, allowing it to spread through the new host population. The concept is most commonly studied in virology, but cross-species transmission may also occur with bacterial pathogens or other types of microorganisms. Steps involved in the transfer of pathogens to new hosts include contact between the pathogen and the host , the successful infection of an initial individual host leading to amplification and an outbreak , and the generation within the original or new host of variants that have the ability to spread efficiently between individuals in populations of the new host. The phenomenon is important for understanding and controlling emerging infectious diseases in humans, especially those caused by viruses , where one reservoir species transfers the virus to a vector species, which in turn transfers the virus to humans . Most viral diseases of humans are zoonotic in origin, having been historically transmitted to human populations from various animal species; examples include SARS, Ebola, swine flu, rabies, and avian influenza. The exact mechanisms that facilitate cross-species transmission vary by pathogen, and even for widespread diseases are often unknown; however, it is believed that viruses with very high mutation rates are able to rapidly adapt to new hosts and thereby overcome host-specific immunological defenses, allowing their continued transmission. This may occur between species which are frequently in contact with each other. It can also occur between species with low contact rates if facilitated by an intermediary species . For example, bats can directly transfer the rabies virus to humans through bites, and also through aerosolization of bat saliva and urine which can then be absorbed by human mucous membranes in the nose, mouth, and eyes. A host shifting event occurs when a strain that was previously zoonotic now circulates exclusively among humans. Similarity between host species influences the likelihood that a pathogen can be transmitted between them ; for example, most human zoonotic transmissions come from other species of mammals. This is believed to be facilitated by the similarity of the host species' immunological defenses. Pathogens of more distantly related species, on the other hand, such as plant viruses, are not known to infect humans . Other factors include geographic area, intraspecies behaviors, and phylogenetic relatedness .", "after_revision": "Cross-species transmission (CST), also called interspecies transmission, host jump, or spillover, is the transmission of an infectious pathogen, such as a virus, between hosts belonging to different species. Once introduced into an individual of a new host species, the pathogen may cause disease for the new host and/or acquire the ability to infect other individuals of the same species, allowing it to spread through the new host population. The phenomenon is most commonly studied in virology, but cross-species transmission may also occur with bacterial pathogens or other types of microorganisms. Steps involved in the transfer of pathogens to new hosts include contact between the pathogen and the host ; the successful infection of an initial individual host , which may lead to amplification and an outbreak ; and the adaptation of the pathogen, within either the original or new host , which may render it capable of spreading efficiently between individuals in populations of the new host. The concept is important in understanding and controlling emerging infectious diseases in humans, especially those caused by viruses . Most viral diseases of humans are zoonotic in origin, having been historically transmitted to human populations from various animal species; examples include SARS, Ebola, swine flu, rabies, and avian influenza. The exact mechanisms which facilitate cross-species transmission vary by pathogen, and even for common diseases are often poorly understood. It is believed that viruses with high mutation rates are able to rapidly adapt to new hosts and thereby overcome host-specific immunological defenses, allowing their continued transmission. A host shifting event occurs when a strain that was previously zoonotic begins to circulate exclusively among the new host species. Pathogen transfer is most likely to occur between species which are frequently in close contact with each other. It can also occur indirectly between species with less frequent contact if facilitated by an intermediary species ; for example, a reservoir species may transfer the virus to a vector species, which in turn transfers the virus to humans. The degree of phylogenetic relatedness between host species also influences the likelihood that a pathogen is transmitted between them , likely because of the similarity of the hosts' immunological defenses ; for example, most human zoonotic transmissions come from other species of mammals. Pathogens of more distantly related species, on the other hand, such as plant viruses, may not be capable of infecting humans at all . Other factors influencing transmission rates include geographic proximity and intraspecies behaviors .", "edit_actions": [{"type": "D", "before": "foreign", "after": null, "start_char_pos": 155, "end_char_pos": 162}, {"type": "A", "before": null, "after": "cause disease for the new host and/or", "start_char_pos": 291, "end_char_pos": 291}, {"type": "R", "before": "concept", "after": "phenomenon", "start_char_pos": 420, "end_char_pos": 427}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 678, "end_char_pos": 679}, {"type": "R", "before": "leading", "after": ", which may lead", "start_char_pos": 735, "end_char_pos": 742}, {"type": "R", "before": ", and the generation within", "after": "; and the adaptation of the pathogen, within either", "start_char_pos": 776, "end_char_pos": 803}, {"type": "R", "before": "of variants that have the ability to spread", "after": ", which may render it capable of spreading", "start_char_pos": 829, "end_char_pos": 872}, {"type": "R", "before": "phenomenon is important for", "after": "concept is important in", "start_char_pos": 941, "end_char_pos": 968}, {"type": "D", "before": ", where one reservoir species transfers the virus to a vector species, which in turn transfers the virus to humans", "after": null, "start_char_pos": 1074, "end_char_pos": 1188}, {"type": "R", "before": "that", "after": "which", "start_char_pos": 1423, "end_char_pos": 1427}, {"type": "R", "before": "widespread", "after": "common", "start_char_pos": 1497, "end_char_pos": 1507}, {"type": "R", "before": "unknown; however, it", "after": "poorly understood. It", "start_char_pos": 1527, "end_char_pos": 1547}, {"type": "D", "before": "very", "after": null, "start_char_pos": 1578, "end_char_pos": 1582}, {"type": "R", "before": "This may", "after": "A host shifting event occurs when a strain that was previously zoonotic begins to circulate exclusively among the new host species.", "start_char_pos": 1740, "end_char_pos": 1748}, {"type": "A", "before": null, "after": "Pathogen transfer is most likely to", "start_char_pos": 1749, "end_char_pos": 1749}, {"type": "A", "before": null, "after": "close", "start_char_pos": 1796, "end_char_pos": 1796}, {"type": "A", "before": null, "after": "indirectly", "start_char_pos": 1840, "end_char_pos": 1840}, {"type": "R", "before": "low contact rates", "after": "less frequent contact", "start_char_pos": 1862, "end_char_pos": 1879}, {"type": "D", "before": ". For example, bats can directly transfer the rabies virus to humans through bites, and also through aerosolization of bat saliva and urine which can then be absorbed by human mucous membranes in the nose, mouth, and eyes. A host shifting event occurs when a strain that was previously zoonotic now circulates exclusively among humans.", "after": null, "start_char_pos": 1922, "end_char_pos": 2257}, {"type": "R", "before": "Similarity", "after": "; for example, a reservoir species may transfer the virus to a vector species, which in turn transfers the virus to humans. The degree of phylogenetic relatedness", "start_char_pos": 2258, "end_char_pos": 2268}, {"type": "A", "before": null, "after": "also", "start_char_pos": 2290, "end_char_pos": 2290}, {"type": "R", "before": "can be", "after": "is", "start_char_pos": 2333, "end_char_pos": 2339}, {"type": "A", "before": null, "after": ", likely because of the similarity of the hosts' immunological defenses", "start_char_pos": 2365, "end_char_pos": 2365}, {"type": "D", "before": "This is believed to be facilitated by the similarity of the host species' immunological defenses.", "after": null, "start_char_pos": 2451, "end_char_pos": 2548}, {"type": "R", "before": "are not known to infect humans", "after": "may not be capable of infecting humans at all", "start_char_pos": 2636, "end_char_pos": 2666}, {"type": "R", "before": "include geographic area, intraspecies behaviors, and phylogenetic relatedness", "after": "influencing transmission rates include geographic proximity and intraspecies behaviors", "start_char_pos": 2683, "end_char_pos": 2760}], "sents_char_pos": [0, 215, 415, 570, 936, 1331, 1401, 1535, 1739, 1821, 1923, 2144, 2257, 2367, 2450, 2548, 2668]}
+{"doc_id": "41445587", "revision_depth": "1", "before_revision": "Hantu Tinggi (Tall Ghost) is a being similar to 'Hantu Raya' or 'genderuwo' albeit extremely large, larger then aforementioned beings, so large that it's waist to head are covered by clouds. It only exists in the Western and Eastern regions of Malaysia. In Thailand, Hantu Tinggi likely resembles a closer myth called Preta. Other names Usually people in West Malaysia consider calling it Bajang Tinggi which means tall demon, or otherwise Tinggi Puaka in modern culture of Malaysia. In Indonesia and Borneo the common layman term usually would be called 'Bapak Hantu' or 'Bapak Jin' in which the meaning is 'Demon's Dad ' (Dad in this term of usage is usually meaning to be said bigger than the usual biggest.) Nature Hantu Tinggi , although mistaken for being that looks like Hantu Galah, which is a spirit in the structure of a bamboo in the forest , they're actually not . They are more similar to ' Hantu Raya or Genderuwo, and are possibly related. The Hantu tinggi is said that it is so high it reaches the sun. Malay villagers claims that they can only see the Hantu tinggi's waist before the rest of the body (waist to head) are covered by clouds. They are usually being called an ancient beings, predated even the existence of lucifer/iblis. When people meets Hantu tinggi they usually gets many problems, which are hex or curse, in the form of: blind issue (if ever gotten eye contact with Hantu Tinggi) or an illness, or physically destructed, like broken spine issue, broken necks, or any issue related to being broken or crushed without any issues . If a nearby person approaches the spirit, they would often found themselves in a portal of the other realm, or Ghaib Realm, or the demon realm. The people in the land that is in the east or west of Malaysia, if they ever need protection they will recite Qur'an, or quranic verses, coupled with du'a , those after Islamic era of Malaysia. Those of not, or before Islamic era are said to avoid forests in general, or in this case ones with high enough tree, and also hills and mountains. Parents would always advise both (before and after Islamic era in Malaysia) aforementioned things against any demon/Hantu,Jin,etc. One will go to traditional healer to heal themselves of the curse/hex or of possession if they ever gets one. In all time people goes to Bomoh, Pawang, Dukun, but the one with religious knowledge will seek ustadz, Imam, Ruqyah healers or any Islamic healer to cure them. They are described to have the looks as similar as Hantu raya, but thousands of times larger. It is said that a single Hair strand from the leg of it is as big as a body builder's arm. The sightings can only saw it at waist heights, before it being covered by the clouds. Rare sightings of the head will usually lead to temporary blindness or any eye problems which needs to be heal by specific healers. In popular culture The Hantu tinggi is not as popular as Hantu Galah and Hantu Raya but they appears in Malaysian book of horror or autobiography of the author that experience it firsthand or secondhand. Some people does not know the difference of the Hantu galah and hantu tinggi that they make it as if they know everything and just similarised them. another popular culture for this is from tongue of people, folklore if you will . Old people will tell this to those who stay around to hear from them. All in all, most people will say that don't believe you own any of the stories, because in Islamic Malay saying: \"ghaib itu hanya tuhan yang tahu\" . Translated to: \"only god knows of \" Ghaib\" . Some media, like youtuber paranormal and youtuber explorers did mention time to time, and horror/scary info youtuber makes explanatory or breakdown about Hantu Tinggi as well .", "after_revision": "Hantu Tinggi (Tall Ghost) is a being similar to 'Hantu Raya' or 'genderuwo' albeit extremely large, larger then aforementioned beings, so large that its waist to head are covered by clouds. It only exists in the Western and Eastern regions of Malaysia. In Thailand, Hantu Tinggi likely resembles a closer myth called Preta. Other names Usually people in West Malaysia call it Bajang Tinggi which means ' tall demon, ' or otherwise Tinggi Puaka in modern culture of Malaysia. In Indonesia and Borneo the common layman term usually would be called 'Bapak Hantu' or 'Bapak Jin' which means 'Demon's Dad . ' (Dad in this usage means bigger than the biggest.) Nature Hantu Tinggi may be mistakenly conflated with Hantu Galah, which is a spirit in the form of bamboo in the forest . They are more similar to Hantu Raya or Genderuwo, and are possibly related. The Hantu tinggi is said to be so high it reaches the sun. Malay villagers claim that they can only see up to the Hantu tinggi's waist because the rest of the body is covered by clouds. They are considered ancient beings, predating even the existence of lucifer/iblis. People may be cursed with physical ailments such as broken spines or necks if they encounter Hantu Tinggi, or blindness if they make eye contact . If a nearby person approaches the spirit, they may find themselves in the Ghaib Realm, or the demon realm. Parents advise their children to recite Qur'an, or quranic verses, coupled with du'a to protect against Hanta Tinggi, or for their children to avoid tall forests or hills and mountains. Someone cursed by one may go to a Bomoh, Pawang, Dukun, or ustadz, Imam, Ruqyah healers or any Islamic healer to cure them. They are described as similar to Hantu raya, but thousands of times larger. It is said that a single hair strand from the leg of it is as big as a body builder's arm. In popular culture The Hantu tinggi is not as popular as Hantu Galah and Hantu Raya but they appears in Malaysian books of horror or autobiographies of people who have experienced it first or secondhand. Most people will say not to believe you own any of the stories, because in Islamic Malay saying: \"ghaib itu hanya tuhan yang tahu\" ( \"only god knows of Ghaib\" ) .", "edit_actions": [{"type": "R", "before": "it's", "after": "its", "start_char_pos": 149, "end_char_pos": 153}, {"type": "R", "before": "consider calling", "after": "call", "start_char_pos": 369, "end_char_pos": 385}, {"type": "A", "before": null, "after": "'", "start_char_pos": 415, "end_char_pos": 415}, {"type": "A", "before": null, "after": "'", "start_char_pos": 428, "end_char_pos": 428}, {"type": "R", "before": "in which the meaning is", "after": "which means", "start_char_pos": 586, "end_char_pos": 609}, {"type": "A", "before": null, "after": ".", "start_char_pos": 623, "end_char_pos": 623}, {"type": "R", "before": "term of usage is usually meaning to be said", "after": "usage means", "start_char_pos": 639, "end_char_pos": 682}, {"type": "D", "before": "usual", "after": null, "start_char_pos": 699, "end_char_pos": 704}, {"type": "R", "before": ", although mistaken for being that looks like", "after": "may be mistakenly conflated with", "start_char_pos": 735, "end_char_pos": 780}, {"type": "R", "before": "structure of a", "after": "form of", "start_char_pos": 819, "end_char_pos": 833}, {"type": "D", "before": ", they're actually not", "after": null, "start_char_pos": 855, "end_char_pos": 877}, {"type": "D", "before": "'", "after": null, "start_char_pos": 905, "end_char_pos": 906}, {"type": "R", "before": "that it is", "after": "to be", "start_char_pos": 983, "end_char_pos": 993}, {"type": "R", "before": "claims", "after": "claim", "start_char_pos": 1038, "end_char_pos": 1044}, {"type": "A", "before": null, "after": "up to", "start_char_pos": 1068, "end_char_pos": 1068}, {"type": "R", "before": "before", "after": "because", "start_char_pos": 1094, "end_char_pos": 1100}, {"type": "R", "before": "(waist to head) are", "after": "is", "start_char_pos": 1122, "end_char_pos": 1141}, {"type": "R", "before": "usually being called an", "after": "considered", "start_char_pos": 1170, "end_char_pos": 1193}, {"type": "R", "before": "predated", "after": "predating", "start_char_pos": 1210, "end_char_pos": 1218}, {"type": "R", "before": "When people meets Hantu tinggi they usually gets many problems, which are hex or curse, in the form of: blind issue (if ever gotten eye contact with Hantu Tinggi) or an illness, or physically destructed, like broken spine issue, broken necks, or any issue related to being broken or crushed without any issues", "after": "People may be cursed with physical ailments such as broken spines or necks if they encounter Hantu Tinggi, or blindness if they make eye contact", "start_char_pos": 1256, "end_char_pos": 1565}, {"type": "R", "before": "would often found themselves in a portal of the other realm, or", "after": "may find themselves in the", "start_char_pos": 1615, "end_char_pos": 1678}, {"type": "R", "before": "The people in the land that is in the east or west of Malaysia, if they ever need protection they will", "after": "Parents advise their children to", "start_char_pos": 1712, "end_char_pos": 1814}, {"type": "R", "before": ", those after Islamic era of Malaysia. Those of not, or before Islamic era are said to avoid forests in general, or in this case ones with high enough tree, and also", "after": "to protect against Hanta Tinggi, or for their children to avoid tall forests or", "start_char_pos": 1867, "end_char_pos": 2032}, {"type": "R", "before": "Parents would always advise both (before and after Islamic era in Malaysia) aforementioned things against any demon/Hantu,Jin,etc. One will go to traditional healer to heal themselves of the curse/hex or of possession if they ever gets one. In all time people goes to", "after": "Someone cursed by one may go to a", "start_char_pos": 2054, "end_char_pos": 2321}, {"type": "R", "before": "but the one with religious knowledge will seek", "after": "or", "start_char_pos": 2344, "end_char_pos": 2390}, {"type": "D", "before": "to have the looks as similar", "after": null, "start_char_pos": 2475, "end_char_pos": 2503}, {"type": "A", "before": null, "after": "similar to", "start_char_pos": 2507, "end_char_pos": 2507}, {"type": "R", "before": "Hair", "after": "hair", "start_char_pos": 2576, "end_char_pos": 2580}, {"type": "D", "before": "The sightings can only saw it at waist heights, before it being covered by the clouds. Rare sightings of the head will usually lead to temporary blindness or any eye problems which needs to be heal by specific healers.", "after": null, "start_char_pos": 2642, "end_char_pos": 2860}, {"type": "R", "before": "book", "after": "books", "start_char_pos": 2975, "end_char_pos": 2979}, {"type": "R", "before": "autobiography of the author that experience it firsthand", "after": "autobiographies of people who have experienced it first", "start_char_pos": 2993, "end_char_pos": 3049}, {"type": "R", "before": "Some people does not know the difference of the Hantu galah and hantu tinggi that they make it as if they know everything and just similarised them. another popular culture for this is from tongue of people, folklore if you will . Old people will tell this to those who stay around to hear from them. All in all, most people will say that don't", "after": "Most people will say not to", "start_char_pos": 3065, "end_char_pos": 3409}, {"type": "R", "before": ". Translated to:", "after": "(", "start_char_pos": 3513, "end_char_pos": 3529}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 3549, "end_char_pos": 3550}, {"type": "D", "before": ".", "after": null, "start_char_pos": 3558, "end_char_pos": 3559}, {"type": "R", "before": "Some media, like youtuber paranormal and youtuber explorers did mention time to time, and horror/scary info youtuber makes explanatory or breakdown about Hantu Tinggi as well", "after": ")", "start_char_pos": 3560, "end_char_pos": 3734}], "sents_char_pos": [0, 190, 253, 324, 485, 879, 957, 1021, 1160, 1255, 1567, 1711, 1905, 2053, 2184, 2294, 2455, 2550, 2641, 2728, 2860, 3064, 3295, 3365]}
+{"doc_id": "42056", "revision_depth": "1", "before_revision": "As of 2007, Greece had the eighth highest percentage of tertiary enrollment in the world (with the percentages for female students being higher than for male) while Greeks of the Diaspora are equally active in the field of education. Hundreds of thousands of Greek students attend western universities every year while the faculty lists of leading Western universities contain a striking number of Greek names. Notable Greek scientists of modern times include Indologist Dimitrios Galanos, Dr Georgios Papanicolaou ( inventor of the Pap test) , mathematician Constantin Carath\u00e9odory , archaeologists Manolis Andronikos , Valerios Stais , Spyridon Marinatos and Ioannis Svoronos , computer scientists Michael Dertouzos , John Argyris , Nicholas Negroponte, Joseph Sifakis (2007 Turing Award , the \"Nobel Prize\" of Computer Science ), Christos Papadimitriou (2002 Knuth Prize , 2012 G\u00f6del Prize ) and Mihalis Yannakakis (2005 Knuth Prize) , physicists Achilles Papapetrou , Dimitri Nanopoulos and John Iliopoulos (2007 Dirac Prize for his contributions on the physics of the charm quark, a major contribution to the birth of the Standard Model, the modern theory of Elementary Particles), astronomer Eugenios Antoniadis , biologist Fotis Kafatos , botanist Theodoros Orphanides , economist Xenophon Zolotas , linguist Yiannis Psycharis , historians Constantine Paparrigopoulos and Helene Glykatzi Ahrweiler and political scientists Nicos Poulantzas and Cornelius Castoriadis .", "after_revision": "As of 2007, Greece had the eighth highest percentage of tertiary enrollment in the world (with the percentages for female students being higher than for male) while Greeks of the Diaspora are equally active in the field of education. Hundreds of thousands of Greek students attend western universities every year while the faculty lists of leading Western universities contain a striking number of Greek names. Notable Greek scientists of modern times include : physician Georgios Papanicolaou ( pioneer in cytopathology, inventor of the Pap test) ; mathematician Constantin Carath\u00e9odory (acclaimed contributor to real and complex analysis and the calculus of variations); archaeologists Manolis Andronikos (unearthed the tomb of Philip II) , Valerios Stais (recognised the Antikythera mechanism) , Spyridon Marinatos (specialised in Mycenaean sites) and Ioannis Svoronos ; chemists Leonidas Zervas (of Bergmann-Zervas synthesis and Z-group discovery fame), K. C. Nicolaou (first total synthesis of taxol) and Panayotis Katsoyannis (first chemical synthesis of insulin); computer scientists Michael Dertouzos and Nicholas Negroponte (known for their early work with the World Wide Web) , John Argyris (co-creator of the FEM), Joseph Sifakis (2007 Turing Award ), Christos Papadimitriou (2002 Knuth Prize ) and Mihalis Yannakakis (2005 Knuth Prize) ; physicist-mathematician Demetrios Christodoulou (renowned for work on Minkowski spacetime) and physicists Achilles Papapetrou (known for solutions of general relativity) , Dimitri Nanopoulos (extensive work on particle physics and cosmology), and John Iliopoulos (2007 Dirac Prize for work on the charm quark); astronomer Eugenios Antoniadis ; biologist Fotis Kafatos (contributor to cDNA cloning technology); botanist Theodoros Orphanides ; economist Xenophon Zolotas (held various senior posts in international organisations such as the IMF); Indologist Dimitrios Galanos; linguist Yiannis Psycharis (promoter of Demotic Greek); historians Constantine Paparrigopoulos (founder of modern Greek historiography) and Helene Glykatzi Ahrweiler (excelled in Byzantine studies); and political scientists Nicos Poulantzas (a leading Structural Marxist) and Cornelius Castoriadis (philosopher of history and ontologist, social critic, economist, psychoanalyst) .", "edit_actions": [{"type": "R", "before": "Indologist Dimitrios Galanos, Dr", "after": ": physician", "start_char_pos": 460, "end_char_pos": 492}, {"type": "A", "before": null, "after": "pioneer in cytopathology,", "start_char_pos": 517, "end_char_pos": 517}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 544, "end_char_pos": 545}, {"type": "R", "before": ",", "after": "(acclaimed contributor to real and complex analysis and the calculus of variations);", "start_char_pos": 584, "end_char_pos": 585}, {"type": "A", "before": null, "after": "(unearthed the tomb of Philip II)", "start_char_pos": 620, "end_char_pos": 620}, {"type": "A", "before": null, "after": "(recognised the Antikythera mechanism)", "start_char_pos": 638, "end_char_pos": 638}, {"type": "A", "before": null, "after": "(specialised in Mycenaean sites)", "start_char_pos": 660, "end_char_pos": 660}, {"type": "R", "before": ",", "after": "; chemists Leonidas Zervas (of Bergmann-Zervas synthesis and Z-group discovery fame), K. C. Nicolaou (first total synthesis of taxol) and Panayotis Katsoyannis (first chemical synthesis of insulin);", "start_char_pos": 682, "end_char_pos": 683}, {"type": "A", "before": null, "after": "and Nicholas Negroponte (known for their early work with the World Wide Web)", "start_char_pos": 722, "end_char_pos": 722}, {"type": "R", "before": ", Nicholas Negroponte,", "after": "(co-creator of the FEM),", "start_char_pos": 738, "end_char_pos": 760}, {"type": "D", "before": ", the \"Nobel Prize\" of Computer Science", "after": null, "start_char_pos": 795, "end_char_pos": 834}, {"type": "D", "before": ", 2012 G\u00f6del Prize", "after": null, "start_char_pos": 879, "end_char_pos": 897}, {"type": "R", "before": ",", "after": "; physicist-mathematician Demetrios Christodoulou (renowned for work on Minkowski spacetime) and", "start_char_pos": 942, "end_char_pos": 943}, {"type": "A", "before": null, "after": "(known for solutions of general relativity)", "start_char_pos": 975, "end_char_pos": 975}, {"type": "R", "before": "and", "after": "(extensive work on particle physics and cosmology), and", "start_char_pos": 997, "end_char_pos": 1000}, {"type": "R", "before": "his contributions on the physics of the charm quark, a major contribution to the birth of the Standard Model, the modern theory of Elementary Particles),", "after": "work on the charm quark);", "start_char_pos": 1039, "end_char_pos": 1192}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 1224, "end_char_pos": 1225}, {"type": "R", "before": ",", "after": "(contributor to cDNA cloning technology);", "start_char_pos": 1250, "end_char_pos": 1251}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 1282, "end_char_pos": 1283}, {"type": "R", "before": ",", "after": "(held various senior posts in international organisations such as the IMF); Indologist Dimitrios Galanos;", "start_char_pos": 1311, "end_char_pos": 1312}, {"type": "R", "before": ",", "after": "(promoter of Demotic Greek);", "start_char_pos": 1340, "end_char_pos": 1341}, {"type": "A", "before": null, "after": "(founder of modern Greek historiography)", "start_char_pos": 1381, "end_char_pos": 1381}, {"type": "A", "before": null, "after": "(excelled in Byzantine studies);", "start_char_pos": 1412, "end_char_pos": 1412}, {"type": "A", "before": null, "after": "(a leading Structural Marxist)", "start_char_pos": 1455, "end_char_pos": 1455}, {"type": "A", "before": null, "after": "(philosopher of history and ontologist, social critic, economist, psychoanalyst)", "start_char_pos": 1482, "end_char_pos": 1482}], "sents_char_pos": [0, 233, 410, 543, 814, 941, 977, 1091]}
+{"doc_id": "42285511", "revision_depth": "1", "before_revision": "Jacques Marquette was honored on the one-cent stamp of the Trans-Mississippi Exposition Issue. The vignette shows him on the Mississippi , though when he crossed Lake Superior in spring 1674 his wintering cabin was on the site which would become Chicago. Haimann, Alexander T., \"1-cent Marquette on the Mississippi, Arago: people, postage & the post, National Postal Museum. Viewed March 22, 2014. 220px|
Antoine de la Mothe Cadillac1951 issue 220px|
Jacques Marquette, Mississippi River1898 issue 210px|
Jean Nicolet, Wisconsin1934 issue Early American explorers of the west include Daniel Boone . 210px|
Daniel Boone , Virginia, Kentucky1968 issue Daniel Boone was honored with a 6-cent stamp in the American Folklore Series, issued on September 26, 1968, at Frankfort, Kentucky, where he was buried. He was a famous frontiersman in the development of Virginia, Kentucky and the trans-Appalachian west. A wall of roughly-hewn boards display the tools of Boone's trade\u2014a Pennsylvania rifle, a powder horn, and a knife. The pipe tomahawk represents that the Shawnees had adopted Boone. His name and birth date was carved on the wall.\"1968 American Folklore Issue\", Arago: people, postage & the post, National Postal Museum online, viewed March 16, 2014. Later American explorers include Lewis and Clark, John C. Fr\u00e9mont and John Wesley Powell. Captain Meriwether Lewis and Lieutenant William Clark commanded the Corps of Discovery to map the Pacific Northwest. They were honored with a 3-cent stamp July 24, 1954 on the 150th anniversary. The 1803 Louisiana Purchase doubled the size of the United States Lewis and Clark, described and sketched its flora and fauna and described the native inhabitants they encountered before returning to St. Louis in 1806.Piazza, Daniel,\"Lewis & Clark Expedition Issue\", Arago: people, postage & the post, National Postal Museum. Viewed March 22, 2014. & Captain John C. Fr\u00e9mont was honored on the 5-cent stamp of the Trans-Mississippi Exposition Issue. He was pictured in a vignette placing the United States flag on a peak in the Rocky Mountains at the age of thirty in 1843. Founder of the Republican Party and presidential candidate in 1856, he was a Union general and Senator from California. A California Gold Rush millionaire, he lost most of his fortune in bad business investments.Brody, Roger S., and Alexander T. Haimann,\"5-cent Fremont on the Rocky Mountains\", Arago: people, postage & the post, National Postal Museum. Viewed March 22, 2014. 220px|
Lewis and Clark Expedition1954 issue 220px|
John C. Fr\u00e9mont, Rockies1898 issue 220px|
John Wesley Powell, Green and Colorado Rivers1968 issue The Lewis and Clark expedition was celebrated on May 14, 2004, the 200th anniversary of its outset depicting the two on a hilltop outlook. Two companion 37-cent stamps showed portraits of Meriwether Lewis and William Clark. A special 32-page booklet accompanied the issue in eleven cities along the route taken by the Corps of Discovery. An image of the stamp can be found on Arago online at the link in the footnote.\"Bicentennial Lewis Clark Expedition Issue\", Arago: people, postage%DIFDELCMD < & %%% the post, National Postal Museum online, viewed April 28, 2014. An image of the stamp can be seen at Arago online, 37c Lewis and Clark on Hill stamp. 140px|
Richard E. Byrd, Antarctica1933 issue Late American explorers included Richard Byrd. The United States maintains research facilities in Antarctica without making territorial claims there, along with other international bases there.%DIFDELCMD < %DIFDELCMD < %%% Richard E. Byrd's Byrd Antarctic Expedition II was commemorated on a 3-cent stamp the same size and shape as Special Delivery on September 22, 1933. Intended for the collectors' market alone, the 'philatelic mail' with this stamp was carried by the expedition and postmarked at the Little America post office, the expedition's base camp.Lawson, Mary H.,\"Byrd Antarctic Issue\", Arago: people, postage the post, National Postal Museum. Viewed March 22, 2014.", "after_revision": "Jacques Marquette was honored on the one-cent stamp of the Trans-Mississippi Exposition Issue. The vignette shows him on the Mississippi River, Haimann, Alexander T., \"1-cent Marquette on the Mississippi, Arago: people, postage & the post, National Postal Museum. Viewed March 22, 2014. which he and Louis Jolliet explored (from the Wisconsin River downstream to the Arkansas River) in 1673. Marquette was also honored on a 6-cent stamp, issued September 20, 1968, at Sault Sainte Marie, Michigan, where he established in 1668 the oldest permanent settlement in that state.\"Father Marquette Issue\", Arago: people, postage the post, National Postal Museum. Viewed September 4, 2019. 220px|
Antoine de la Mothe Cadillac, Detroit1951 issue 220px|
Jacques Marquette, Mississippi River1898 issue 220px|
Jacques Marquette, Sault Ste. Marie1968 issue 210px|
Jean Nicolet, Wisconsin1934 issue Early American explorers include Daniel Boone , Lewis and Clark . Daniel Boone was honored with a 6-cent stamp in the American Folklore Series, issued on September 26, 1968, at Frankfort, Kentucky, where he was buried. He was a famous frontiersman in the development of Virginia, Kentucky and the trans-Appalachian west. A wall of roughly-hewn boards display the tools of Boone's trade\u2014a Pennsylvania rifle, a powder horn, and a knife. The pipe tomahawk represents that the Shawnees had adopted Boone. His name and birth date was carved on the wall.\"1968 American Folklore Issue\", Arago: people, postage & the post, National Postal Museum online, viewed March 16, 2014. Captain Meriwether Lewis and Lieutenant William Clark commanded the Corps of Discovery to map the Pacific Northwest. They were honored with a 3-cent stamp July 24, 1954 on the 150th anniversary. The 1803 Louisiana Purchase doubled the size of the United States Lewis and Clark, described and sketched its flora and fauna and described the native inhabitants they encountered before returning to St. Louis in 1806.Piazza, Daniel,\"Lewis & Clark Expedition Issue\", Arago: people, postage & the post, National Postal Museum. Viewed March 22, 2014. 210px|
Daniel Boone, Virginia, Kentucky1968 issue 220px|
Lewis and Clark Expedition1954 issue The Lewis and Clark expedition was also celebrated on May 14, 2004, the 200th anniversary of its outset depicting the two on a hilltop outlook. Two companion 37-cent stamps showed portraits of Meriwether Lewis and William Clark. A special 32-page booklet accompanied the issue in eleven cities along the route taken by the Corps of Discovery. An image of the stamp can be found on Arago online at the link in the footnote.\"Bicentennial Lewis& Clark Expedition Issue\", Arago: people, postage the post, National Postal Museum online, viewed April 28, 2014. An image of the stamp can be seen at Arago online, 37c Lewis and Clark on Hill stamp. Later American explorers include Lewis and Clark, John C. Fr\u00e9mont and John Wesley Powell. Captain John C. Fr\u00e9mont was honored on the 5-cent stamp of the Trans-Mississippi Exposition Issue. He was pictured in a vignette placing the United States flag on a peak in the Rocky Mountains at the age of thirty in 1843. Founder of the Republican Party and presidential candidate in 1856, he was a Union general and Senator from California. A California Gold Rush millionaire, he lost most of his fortune in bad business investments.Brody, Roger S., and Alexander T. Haimann,\"5-cent Fremont on the Rocky Mountains\", Arago: people, postage & the post, National Postal Museum. Viewed March 22, 2014. 220px|
John C. Fr\u00e9mont, Rockies1898 issue 220px|
John Wesley Powell, Green and Colorado Rivers1968 issue %DIFDELCMD < & %%% %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "R", "before": ", though when he crossed Lake Superior in spring 1674 his wintering cabin was on the site which would become Chicago.", "after": "River,", "start_char_pos": 137, "end_char_pos": 254}, {"type": "A", "before": null, "after": "which he and Louis Jolliet explored (from the Wisconsin River downstream to the Arkansas River) in 1673. Marquette was also honored on a 6-cent stamp, issued September 20, 1968, at Sault Sainte Marie, Michigan, where he established in 1668 the oldest permanent settlement in that state.\"Father Marquette Issue\", Arago: people, postage", "start_char_pos": 398, "end_char_pos": 398}, {"type": "A", "before": null, "after": "the post, National Postal Museum. Viewed September 4, 2019.", "start_char_pos": 399, "end_char_pos": 399}, {"type": "R", "before": "Cadillac1951", "after": "Cadillac, Detroit1951", "start_char_pos": 434, "end_char_pos": 446}, {"type": "A", "before": null, "after": "220px|
Jacques Marquette, Sault Ste. Marie1968 issue", "start_char_pos": 514, "end_char_pos": 514}, {"type": "D", "before": "of the west", "after": null, "start_char_pos": 588, "end_char_pos": 599}, {"type": "A", "before": null, "after": ", Lewis and Clark", "start_char_pos": 621, "end_char_pos": 621}, {"type": "R", "before": "210px|
Daniel Boone , Virginia, Kentucky1968 issue Daniel Boone", "after": "Daniel Boone", "start_char_pos": 624, "end_char_pos": 694}, {"type": "D", "before": "Later American explorers include Lewis and Clark, John C. Fr\u00e9mont and John Wesley Powell.", "after": null, "start_char_pos": 1286, "end_char_pos": 1375}, {"type": "A", "before": null, "after": "210px|
Daniel Boone, Virginia, Kentucky1968 issue 220px|
Lewis and Clark Expedition1954 issue", "start_char_pos": 1920, "end_char_pos": 1920}, {"type": "A", "before": null, "after": "The Lewis and Clark expedition was also celebrated on May 14, 2004, the 200th anniversary of its outset depicting the two on a hilltop outlook. Two companion 37-cent stamps showed portraits of Meriwether Lewis and William Clark. A special 32-page booklet accompanied the issue in eleven cities along the route taken by the Corps of Discovery. An image of the stamp can be found on Arago online at the link in the footnote.\"Bicentennial Lewis", "start_char_pos": 1921, "end_char_pos": 1921}, {"type": "A", "before": null, "after": "Clark Expedition Issue\", Arago: people, postage", "start_char_pos": 1923, "end_char_pos": 1923}, {"type": "A", "before": null, "after": "the post, National Postal Museum online, viewed April 28, 2014. An image of the stamp can be seen at Arago online, 37c Lewis and Clark on Hill stamp.", "start_char_pos": 1924, "end_char_pos": 1924}, {"type": "A", "before": null, "after": "Later American explorers include Lewis and Clark, John C. Fr\u00e9mont and John Wesley Powell.", "start_char_pos": 1925, "end_char_pos": 1925}, {"type": "D", "before": "Lewis and Clark Expedition1954 issue 220px|
", "after": null, "start_char_pos": 2541, "end_char_pos": 2592}, {"type": "D", "before": "The Lewis and Clark expedition was celebrated on May 14, 2004, the 200th anniversary of its outset depicting the two on a hilltop outlook. Two companion 37-cent stamps showed portraits of Meriwether Lewis and William Clark. A special 32-page booklet accompanied the issue in eleven cities along the route taken by the Corps of Discovery. An image of the stamp can be found on Arago online at the link in the footnote.\"Bicentennial Lewis", "after": null, "start_char_pos": 2698, "end_char_pos": 3134}, {"type": "D", "before": "Clark Expedition Issue\", Arago: people, postage", "after": null, "start_char_pos": 3135, "end_char_pos": 3182}, {"type": "D", "before": "the post, National Postal Museum online, viewed April 28, 2014. An image of the stamp can be seen at Arago online, 37c Lewis and Clark on Hill stamp.", "after": null, "start_char_pos": 3201, "end_char_pos": 3350}, {"type": "D", "before": "140px|
Richard E. Byrd, Antarctica1933 issue Late American explorers included Richard Byrd. The United States maintains research facilities in Antarctica without making territorial claims there, along with other international bases there.", "after": null, "start_char_pos": 3351, "end_char_pos": 3596}, {"type": "D", "before": "Richard E. Byrd's Byrd Antarctic Expedition II was commemorated on a 3-cent stamp the same size and shape as Special Delivery on September 22, 1933. Intended for the collectors' market alone, the 'philatelic mail' with this stamp was carried by the expedition and postmarked at the Little America post office, the expedition's base camp.Lawson, Mary H.,\"Byrd Antarctic Issue\", Arago: people, postage", "after": null, "start_char_pos": 3626, "end_char_pos": 4025}, {"type": "D", "before": "the post, National Postal Museum. Viewed March 22, 2014.", "after": null, "start_char_pos": 4026, "end_char_pos": 4082}], "sents_char_pos": [0, 94, 254, 374, 834, 936, 1051, 1117, 1285, 1375, 1492, 1570, 1774, 1789, 1896, 2024, 2148, 2268, 2361, 2502, 2836, 2921, 3035, 3115, 3264, 3350, 3449, 3596, 3774, 3963, 4059]}
+{"doc_id": "42659816", "revision_depth": "1", "before_revision": "The reference year is 2011 for Japan; 2010 for Canada, United States ; 2009-10 for Estonia, Finland, New Zealand, Spain; 2009 for South Korea; 2008\u201309 for Austria, Italy; 2006 for Australia; 2005 for Belgium , the United Kingdom ; 2003-04 for Poland; 2001-02 for Germany; 2001 for Denmark; 2000\u201301 for Norway, Slovenia , Sweden and 1998-99 for France . Hours spent on leisure and personal care include time spent sleeping . RankCountry/TerritoryHours spent on leisure and personal URL 1 16.06 2 16.06 3 15.71 4 15.56 5 15.44 6 15.33 7 15.31 8 15.19 9 15.12 10 15.11 11 15.04 12 14.99 13 14.98 14 14.98 15 14.98 16 14.97 17 14.97 18 14.95 19 14.93 20 14.91 21 14.90 22 14.89 23 14.87 24 14.83 25 14.63 26 14.62 27 14.61 28 14.48 29 14.46 30 14.41 31 14.41 32 14.27 33 14.25 34 14.20 35 13.89 36 13.42", "after_revision": "The reference year is 2016 for the United States; 2014-15 for the United Kingdom; 2011 for Japan; 2010 for Canada, Norway, South Africa ; 2009-10 for Estonia, Finland, France, New Zealand, Spain; 2009 for South Korea; 2008-09 for Austria, Italy; 2006 for Australia; 2005 for Belgium ; 2003-04 for Poland; 2003 for Latvia; 2001-02 for Germany; 2001 for Denmark; 2000-01 for Slovenia and Sweden . As defined by the OECD, \"Leisure includes a wide range of indoor and outdoor activities such as walking and hiking, sports, entertainment and cultural activities, socializing with friends and family, volunteering, taking a nap, playing games, watching television, using computers, recreational gardening, etc. Personal care activities include sleeping (but not taking a nap), eating and drinking, and other household or medical or personal services (hygiene, visits to the doctor, hairdresser, etc.) consumed by the respondent. Travel time related to personal care is also included. The information is generally collected through national time use surveys, which involve respondents keeping a diary of their activities over one or several representative days for a given period.\" RankCountryHours spent on leisure and personal care 1 16.36 2 15.93 3 15.9 4 15.87 5 15.77 6 15.56 7 15.55 8 15.28 9 15.18 10 15.17 11 15.15 12 15.06 12 15.06 14 15.02 15 15.01 16 14.92 17 14.9 17 14.9 17 14.9 20 14.89 20 14.89 22 14.87 23 14.85 24 14.75 25 14.73 26 14.7 27 14.67 28 14.55 29 14.45 30 14.44 31 14.42 32 14.41 33 14.35 34 14.15 35 13.93 36 13.83 37 12.74 38 12.59", "edit_actions": [{"type": "A", "before": null, "after": "2016 for the United States; 2014-15 for the United Kingdom;", "start_char_pos": 22, "end_char_pos": 22}, {"type": "R", "before": "United States", "after": "Norway, South Africa", "start_char_pos": 56, "end_char_pos": 69}, {"type": "A", "before": null, "after": "France,", "start_char_pos": 102, "end_char_pos": 102}, {"type": "R", "before": "2008\u201309", "after": "2008-09", "start_char_pos": 145, "end_char_pos": 152}, {"type": "D", "before": ", the United Kingdom", "after": null, "start_char_pos": 210, "end_char_pos": 230}, {"type": "A", "before": null, "after": "2003 for Latvia;", "start_char_pos": 253, "end_char_pos": 253}, {"type": "R", "before": "2000\u201301 for Norway, Slovenia , Sweden and 1998-99 for France", "after": "2000-01 for Slovenia and Sweden", "start_char_pos": 293, "end_char_pos": 353}, {"type": "R", "before": "Hours spent on leisure and personal care include time spent sleeping .", "after": "As defined by the OECD, \"Leisure includes a wide range of indoor and outdoor activities such as walking and hiking, sports, entertainment and cultural activities, socializing with friends and family, volunteering, taking a nap, playing games, watching television, using computers, recreational gardening, etc. Personal care activities include sleeping (but not taking a nap), eating and drinking, and other household or medical or personal services (hygiene, visits to the doctor, hairdresser, etc.) consumed by the respondent. Travel time related to personal care is also included. The information is generally collected through national time use surveys, which involve respondents keeping a diary of their activities over one or several representative days for a given period.\"", "start_char_pos": 356, "end_char_pos": 426}, {"type": "R", "before": "RankCountry/TerritoryHours", "after": "RankCountryHours", "start_char_pos": 427, "end_char_pos": 453}, {"type": "R", "before": "URL", "after": "care", "start_char_pos": 484, "end_char_pos": 487}, {"type": "R", "before": "16.06", "after": "16.36", "start_char_pos": 490, "end_char_pos": 495}, {"type": "R", "before": "16.06", "after": "15.93", "start_char_pos": 498, "end_char_pos": 503}, {"type": "R", "before": "15.71", "after": "15.9", "start_char_pos": 506, "end_char_pos": 511}, {"type": "R", "before": "15.56", "after": "15.87", "start_char_pos": 514, "end_char_pos": 519}, {"type": "R", "before": "15.44", "after": "15.77", "start_char_pos": 522, "end_char_pos": 527}, {"type": "R", "before": "15.33", "after": "15.56", "start_char_pos": 530, "end_char_pos": 535}, {"type": "R", "before": "15.31", "after": "15.55", "start_char_pos": 538, "end_char_pos": 543}, {"type": "R", "before": "15.19", "after": "15.28", "start_char_pos": 546, "end_char_pos": 551}, {"type": "R", "before": "15.12", "after": "15.18", "start_char_pos": 554, "end_char_pos": 559}, {"type": "R", "before": "15.11", "after": "15.17", "start_char_pos": 563, "end_char_pos": 568}, {"type": "R", "before": "15.04", "after": "15.15", "start_char_pos": 572, "end_char_pos": 577}, {"type": "R", "before": "14.99 13 14.98", "after": "15.06 12 15.06", "start_char_pos": 581, "end_char_pos": 595}, {"type": "R", "before": "14.98", "after": "15.02", "start_char_pos": 599, "end_char_pos": 604}, {"type": "R", "before": "14.98", "after": "15.01", "start_char_pos": 608, "end_char_pos": 613}, {"type": "R", "before": "14.97", "after": "14.92", "start_char_pos": 617, "end_char_pos": 622}, {"type": "R", "before": "14.97 18 14.95 19 14.93", "after": "14.9 17 14.9 17 14.9", "start_char_pos": 626, "end_char_pos": 649}, {"type": "D", "before": "14.91 21 14.90 22", "after": null, "start_char_pos": 653, "end_char_pos": 670}, {"type": "R", "before": "23", "after": "20 14.89 22", "start_char_pos": 677, "end_char_pos": 679}, {"type": "A", "before": null, "after": "23 14.85", "start_char_pos": 686, "end_char_pos": 686}, {"type": "R", "before": "14.83", "after": "14.75", "start_char_pos": 690, "end_char_pos": 695}, {"type": "R", "before": "14.63", "after": "14.73", "start_char_pos": 699, "end_char_pos": 704}, {"type": "R", "before": "14.62", "after": "14.7", "start_char_pos": 708, "end_char_pos": 713}, {"type": "R", "before": "14.61", "after": "14.67", "start_char_pos": 717, "end_char_pos": 722}, {"type": "R", "before": "14.48", "after": "14.55", "start_char_pos": 726, "end_char_pos": 731}, {"type": "R", "before": "14.46", "after": "14.45", "start_char_pos": 735, "end_char_pos": 740}, {"type": "R", "before": "14.41", "after": "14.44", "start_char_pos": 744, "end_char_pos": 749}, {"type": "R", "before": "14.41", "after": "14.42", "start_char_pos": 753, "end_char_pos": 758}, {"type": "R", "before": "14.27", "after": "14.41", "start_char_pos": 762, "end_char_pos": 767}, {"type": "R", "before": "14.25", "after": "14.35", "start_char_pos": 771, "end_char_pos": 776}, {"type": "R", "before": "14.20", "after": "14.15", "start_char_pos": 780, "end_char_pos": 785}, {"type": "R", "before": "13.89", "after": "13.93", "start_char_pos": 789, "end_char_pos": 794}, {"type": "R", "before": "13.42", "after": "13.83 37 12.74 38 12.59", "start_char_pos": 798, "end_char_pos": 803}], "sents_char_pos": [0, 38, 71, 122, 144, 172, 192, 232, 252, 274, 292, 312]}
+{"doc_id": "428663", "revision_depth": "2", "before_revision": "In other media Television Hank Pym as Ant-Man and Giant-Man appeared in The Marvel Super Heroes animated series, voiced by Tom Harvey. Hank Pym as Ant-Man appeared in a live-action 1979 Saturday Night Live sketch, portrayed by Garrett Morris. Hank Pym as Goliath made a non-speaking cameo appearance in the X-Men animated series episode \"One Man's Worth (Part 1)\". This version is a member of the Avengers in a timeline where Professor X was killed before he formed the X-Men. Hank Pym as Ant-Man and Giant-Man appeared as a main character in The Avengers: United They Stand, voiced by Rod Wilson. Hank Pym as Ant-Man appears as a guest star in the Fantastic Four: World's Greatest Heroes animated series episode \"World's Tiniest Heroes\", voiced by John Payne. This version is a friend of Mister Fantastic who assists him and the Fantastic Four after they are accidentally shrunk by one of Mister Fantastic's Microverse experiments. Hank Pym as Ant-Man appears in The Super Hero Squad Show animated series episode \"This Forest Green\", voiced by Greg Grunberg. Hank Pym as Ant-Man, Giant-Man, and Yellowjacket appears in The Avengers: Earth's Mightiest Heroes, voiced by Wally Wingert. Hank Pym as Giant-Man appears in the anime series Marvel Disk Wars: The Avengers, voiced by Yasunori Masutani. Hank Pym appears in the Disney XD Ant-Man animated shorts, voiced by Dee Bradley Baker. This version is based on the Marvel Cinematic Universe version . Hank Pym briefly appears in the anime series Marvel Future Avengers episode \"The Rage of Black Bolt\". The Wasp comes to him for suit upgrades in preparation for a war with the Inhumans. Michael Douglas is set to reprise his role as Hank Pym in the Disney+ animated series , What If. ..? Film Hank Pym as Giant-Man and Ant-Man appears in the animated direct-to-video films Ultimate Avengers and Ultimate Avengers 2, voiced by Nolan North. Hank Pym as Giant-Man makes a non-speaking appearance in the animated direct-to-video film Next Avengers: Heroes of Tomorrow. He was killed by Ultron alongside the other Avengers prior to the film. Hank Pym appears in live-action films set in the Marvel Cinematic Universe (MCU), portrayed by Michael Douglas. Pym is introduced in Ant-Man (2015), in which Dax Griffin served as a body double for reference in a flashback sequence. Pym originally operated as Ant-Man and as an agent of S.H.I.E.L.D. decades earlier until his wife Janet van Dyne shrunk down to the Quantum Realm during one of their missions, though he initially believed she perished. Not long after, he discovers the organization was trying to replicate his Pym Particle formula and resigns. Following this, he retires as Ant-Man and builds his own company, Pym Technologies, until he is ousted as CEO by his former protege Darren Cross and estranged daughter Hope van Dyne. When Cross comes close to replicating the Pym Particles and develops the Yellowjacket suit in the present, Hank manipulates former thief Scott Lang into becoming the new Ant-Man due to Hank 's advanced age and refusal to have Hope do so for fear of losing her like he did his wife. While training Lang, Hank eventually reveals what happened to Janet to Hope, allowing them to reconcile. When Lang returns from the Quantum Realm following his fight with Cross, Hank theorizes Janet might be alive. Later, he presents Hope with an updated Wasp suit. Pym returns in Ant-Man and the Wasp (2018). Pym and Hope have become wanted fugitives and are forced to go on the run due to Lang violating the Sokovia Accords with their technology during the events of Captain America: Civil War. All the while, they also attempt to build a bridge to the Quantum Realm and find Janet. After being betrayed by the criminal Sonny Burch and attacked by the mysterious Ghost, Pym is forced to reconnect with his former partner, Bill Foster, though he later discovers the latter was working with Ghost, the daughter of deceased coworker Elihas Starr. Once Lang, Hope, and a group of enlarged ants distract Ghost and Foster, Pym enters the Quantum Realm and rescues Janet. Upon their return, they promise to cure Ghost of her quantum instability. While doing so however, Pym, Janet, and Hope are disintegrated by Thanos amidst the Blip. Pym also appears in Avengers: Endgame (2019) . While traveling through time to defeat undo the Blip, Steve Rogers tricks a younger, alternate timeline version of Pym into leaving his lab so the former can steal Pym Particles and return to his time. The \"primary\" Pym is later restored to life and attends Tony Stark's funeral. For this film, John Michael Morris served as Douglas' younger body double. A third Ant-Man film titled Ant-Man and the Wasp: Quantumania is in development at Marvel Studios, with Douglas expected to reprise his role. Video games Hank Pym as Giant-Man appeared as an assist character in the 1995 arcade game Avengers in Galactic Storm. Hank Pym appears as an NPC in Marvel: Ultimate Alliance, voiced by Jerry Houser. Hank Pym as Yellowjacket appears as a boss in Marvel: Ultimate Alliance 2, voiced again by Wally Wingert. Hank Pym as Ant-Man makes a cameo appearance in Ultimate Marvel vs. Capcom 3. Hank Pym as Ant-Man and Giant-Man appear as separate playable characters in Marvel Super Hero Squad Online. Hank Pym appears as an unlockable character in Marvel: Avengers Alliance. Hank Pym appears as an NPC in Marvel Heroes, voiced again by Wally Wingert. His Ant-Man design appears as an enhanced costume for Ant-Man (Scott Lang ) . Hank Pym as Ant-Man appears in Lego Marvel Super Heroes, voiced by Nolan North. Hank Pym as Ant-Man appears in Lego Marvel's Avengers. Hank Pym as Ant-Man appears as a team-up character in Disney Infinity: Marvel Super Heroes. Hank Pym as Giant-Man appears as a playable character in Marvel: Future Fight, with his iteration of Goliath and fusion with Ultron appearing as alternate skins. Hank Pym appears as an unlockable character in Marvel Avengers Academy, voiced by Christopher McCullough. Hank Pym as Ant-Man, Giant-Man, and Yellowjacket appear as separate playable characters in Lego Marvel Super Heroes 2, voiced by Dar Dash. In the game's story mode, Pym as Giant-Man attends a victory wrap party at Avengers Mansion until Kang the Conqueror brings Manhattan into Chronopolis. Ever since, Giant-Man has been working to find a way to defeat Kang and get every location he took back to their respectful places across time and space. In a bonus mission, A-Bomb, the Hulk, and Wonder Man work to rescue Pym as Ant-Man from his future self, who became Yellowjacket. Hank Pym appears as a NPC in Marvel's Avengers. This version originally operated as Ant-Man before A.I.M. altered his physiology so that any attempt to shrink himself would be fatal. Following this, he became the leader of the Resistance to rescue Inhumans from A.I.M. and give them sanctuary in his base, the Ant Hill.", "after_revision": "In other media Television Hank Pym as Ant-Man and Giant-Man appears in The Marvel Super Heroes animated series, voiced by Tom Harvey. Hank Pym as Ant-Man appears in a live-action 1979 Saturday Night Live sketch, portrayed by Garrett Morris. Hank Pym as Goliath makes a non-speaking cameo appearance in the X-Men animated series episode \"One Man's Worth (Part 1)\". This version is a member of the Avengers in an alternate timeline where Professor X was killed before he formed the X-Men. Hank Pym as Ant-Man and Giant-Man appeared in The Avengers: United They Stand, voiced by Rod Wilson. This version is the leader of the Avengers. Hank Pym as Ant-Man appears in the Fantastic Four: World's Greatest Heroes animated series episode \"World's Tiniest Heroes\", voiced by John Payne. This version is a friend of Mister Fantastic who assists him and the Fantastic Four after they are accidentally shrunk by one of Mister Fantastic's Microverse experiments. Hank Pym as Ant-Man appears in The Super Hero Squad Show animated series episode \"This Forest Green\", voiced by Greg Grunberg. Hank Pym as Ant-Man, Giant-Man, and Yellowjacket appears in The Avengers: Earth's Mightiest Heroes, voiced by Wally Wingert. This version is initially a pacifist. After Scott Lang steals the Ant-Man suit, Pym retires as a superhero, is seemingly killed in an explosion, and resurfaces as the fearless yet violent Yellowjacket. Hank Pym as Giant-Man appears in the anime series Marvel Disk Wars: The Avengers, voiced by Yasunori Masutani. Hank Pym appears in the Disney XD Ant-Man animated shorts, voiced by Dee Bradley Baker. This version is based on the Marvel Cinematic Universe version (see below) . Hank Pym briefly appears in the anime series Marvel Future Avengers episode \"The Rage of Black Bolt\". The Wasp comes to him for suit upgrades in preparation for a war with the Inhumans. Film Hank Pym appears in the Marvel Animated Features series of direct-to-video films. Hank Pym as Giant-Man and Ant-Man appears in Ultimate Avengers and Ultimate Avengers 2, voiced by Nolan North. Hank Pym as Giant-Man makes a non-speaking appearance in the animated direct-to-video film Next Avengers: Heroes of Tomorrow. He was killed by Ultron alongside the other Avengers prior to the film. Marvel Cinematic Universe Hank Pym appears in media set in the Marvel Cinematic Universe (MCU), portrayed by Michael Douglas. Pym is introduced in the live-action film Ant-Man (2015), in which Dax Griffin served as a body double for reference in a flashback sequence. Pym originally operated as Ant-Man and an agent of S.H.I.E.L.D. decades earlier until his wife Janet van Dyne / Wasp shrunk down to the Quantum Realm during one of their missions, though he initially believed she perished. Not long after, he discovers S.H.I.E.L.D. was trying to replicate his Pym Particle formula and resigns. Following this, he retires as Ant-Man and builds his own company, Pym Technologies, until he is ousted as CEO by his former protege Darren Cross and estranged daughter Hope van Dyne. When Cross comes close to replicating the Pym Particles and develops the Yellowjacket suit in the present, Pym manipulates former thief Scott Lang into becoming the new Ant-Man due to the former 's advanced age and refusal to have Hope do so for fear of losing her like he did his wife. While training Lang, Pym eventually reveals what happened to Janet to Hope, allowing them to reconcile. When Lang returns from the Quantum Realm following his fight with Cross, Hank theorizes Janet might be alive. Later, he presents Hope with an updated Wasp suit. Pym returns in the live-action film Ant-Man and the Wasp (2018). Pym and Hope have become wanted fugitives and are forced to go on the run due to Lang violating the Sokovia Accords with their technology during the events of Captain America: Civil War. All the while, they also attempt to build a bridge to the Quantum Realm and find Janet. After being betrayed by the criminal Sonny Burch and attacked by the mysterious Ghost, Pym is forced to reconnect with his former partner, Bill Foster, though he later discovers the latter was working with Ghost, the daughter of deceased former coworker Elihas Starr. Once Lang, Hope, and a group of enlarged ants distract Ghost and Foster, Pym enters the Quantum Realm and rescues Janet. Upon their return, they promise to cure Ghost of her quantum instability. While doing so however, Pym, Janet, and Hope become victims of the Blip. Pym also appears in the live-action Avengers: Endgame (2019) , with John Michael Morris serving as Douglas' younger body double . While traveling through time to undo the Blip, Steve Rogers tricks a younger, alternate timeline version of Pym into leaving his lab so the former can steal Pym Particles and return to his time. The \"primary\" Pym is later restored to life and attends Tony Stark's funeral. A third Ant-Man film titled Ant-Man and the Wasp: Quantumania is in development at Marvel Studios, with Douglas expected to reprise his role. Douglas is set to reprise his role as Pym in the Disney+ animated series, What If...? Video games Hank Pym as Giant-Man appeared as an assist character in the 1995 arcade game Avengers in Galactic Storm. Hank Pym appears as an NPC in Marvel: Ultimate Alliance, voiced by Jerry Houser. Hank Pym as Yellowjacket appears as a boss in Marvel: Ultimate Alliance 2, voiced again by Wally Wingert. Hank Pym as Ant-Man makes a cameo appearance in Ultimate Marvel vs. Capcom 3. Hank Pym as Ant-Man and Giant-Man appear as separate playable characters in Marvel Super Hero Squad Online. Hank Pym appears as an unlockable character in Marvel: Avengers Alliance. Hank Pym appears as an NPC in Marvel Heroes, voiced again by Wally Wingert. His Ant-Man design appears as an enhanced costume for Scott Lang / Ant-Man . Hank Pym as Ant-Man appears in Lego Marvel Super Heroes, voiced by Nolan North. Hank Pym as Ant-Man appears in Lego Marvel's Avengers. Hank Pym as Ant-Man appears as a team-up character in Disney Infinity: Marvel Super Heroes. Hank Pym as Giant-Man appears as a playable character in Marvel: Future Fight, with his iteration of Goliath and fusion with Ultron appearing as alternate skins. Hank Pym appears as an unlockable character in Marvel Avengers Academy, voiced by Christopher McCullough. Hank Pym as Ant-Man, Giant-Man, and Yellowjacket appear as separate playable characters in Lego Marvel Super Heroes 2, voiced by Dar Dash. In the game's story mode, Pym as Giant-Man attends a victory wrap party at Avengers Mansion until Kang the Conqueror brings Manhattan into Chronopolis. Ever since, Giant-Man has been working to find a way to defeat Kang and get every location he took back to their respectful places across time and space. In a bonus mission, A-Bomb, the Hulk, and Wonder Man work to rescue Pym as Ant-Man from his future self, who became Yellowjacket. Hank Pym appears as a NPC in Marvel's Avengers. This version originally operated as Ant-Man before A.I.M. altered his physiology so that any attempt to shrink himself would be fatal. Following this, he became the leader of the Resistance to rescue Inhumans from A.I.M. and give them sanctuary in his base, the Ant Hill.", "edit_actions": [{"type": "R", "before": "appeared", "after": "appears", "start_char_pos": 60, "end_char_pos": 68}, {"type": "R", "before": "appeared", "after": "appears", "start_char_pos": 155, "end_char_pos": 163}, {"type": "R", "before": "made", "after": "makes", "start_char_pos": 263, "end_char_pos": 267}, {"type": "R", "before": "a", "after": "an alternate", "start_char_pos": 409, "end_char_pos": 410}, {"type": "D", "before": "as a main character", "after": null, "start_char_pos": 520, "end_char_pos": 539}, {"type": "A", "before": null, "after": "This version is the leader of the Avengers.", "start_char_pos": 598, "end_char_pos": 598}, {"type": "D", "before": "as a guest star", "after": null, "start_char_pos": 627, "end_char_pos": 642}, {"type": "A", "before": null, "after": "This version is initially a pacifist. After Scott Lang steals the Ant-Man suit, Pym retires as a superhero, is seemingly killed in an explosion, and resurfaces as the fearless yet violent Yellowjacket.", "start_char_pos": 1186, "end_char_pos": 1186}, {"type": "A", "before": null, "after": "(see below)", "start_char_pos": 1449, "end_char_pos": 1449}, {"type": "D", "before": "Michael Douglas is set to reprise his role as Hank Pym in the Disney+ animated series , What If. ..?", "after": null, "start_char_pos": 1638, "end_char_pos": 1738}, {"type": "R", "before": "Film", "after": "Film Hank Pym appears in the Marvel Animated Features series of direct-to-video films.", "start_char_pos": 1739, "end_char_pos": 1743}, {"type": "D", "before": "the animated direct-to-video films", "after": null, "start_char_pos": 1789, "end_char_pos": 1823}, {"type": "A", "before": null, "after": "Marvel Cinematic Universe", "start_char_pos": 2088, "end_char_pos": 2088}, {"type": "R", "before": "live-action films", "after": "media", "start_char_pos": 2109, "end_char_pos": 2126}, {"type": "A", "before": null, "after": "the live-action film", "start_char_pos": 2222, "end_char_pos": 2222}, {"type": "D", "before": "as", "after": null, "start_char_pos": 2362, "end_char_pos": 2364}, {"type": "A", "before": null, "after": "/ Wasp", "start_char_pos": 2436, "end_char_pos": 2436}, {"type": "R", "before": "the organization", "after": "S.H.I.E.L.D.", "start_char_pos": 2572, "end_char_pos": 2588}, {"type": "R", "before": "Hank", "after": "Pym", "start_char_pos": 2941, "end_char_pos": 2945}, {"type": "R", "before": "Hank", "after": "the former", "start_char_pos": 3019, "end_char_pos": 3023}, {"type": "R", "before": "Hank", "after": "Pym", "start_char_pos": 3137, "end_char_pos": 3141}, {"type": "A", "before": null, "after": "the live-action film", "start_char_pos": 3397, "end_char_pos": 3397}, {"type": "A", "before": null, "after": "former", "start_char_pos": 3940, "end_char_pos": 3940}, {"type": "R", "before": "are disintegrated by Thanos amidst", "after": "become victims of", "start_char_pos": 4204, "end_char_pos": 4238}, {"type": "A", "before": null, "after": "the live-action", "start_char_pos": 4269, "end_char_pos": 4269}, {"type": "A", "before": null, "after": ", with John Michael Morris serving as Douglas' younger body double", "start_char_pos": 4295, "end_char_pos": 4295}, {"type": "D", "before": "defeat", "after": null, "start_char_pos": 4330, "end_char_pos": 4336}, {"type": "D", "before": "For this film, John Michael Morris served as Douglas' younger body double.", "after": null, "start_char_pos": 4578, "end_char_pos": 4652}, {"type": "A", "before": null, "after": "Douglas is set to reprise his role as Pym in the Disney+ animated series, What If...?", "start_char_pos": 4795, "end_char_pos": 4795}, {"type": "A", "before": null, "after": "Scott Lang /", "start_char_pos": 5491, "end_char_pos": 5491}, {"type": "D", "before": "(Scott Lang )", "after": null, "start_char_pos": 5500, "end_char_pos": 5513}], "sents_char_pos": [0, 134, 242, 364, 476, 597, 761, 933, 1060, 1185, 1297, 1385, 1553, 1637, 1738, 1889, 2015, 2087, 2200, 2322, 2542, 2650, 2833, 3115, 3220, 3330, 3381, 3426, 3613, 3701, 3963, 4084, 4158, 4248, 4297, 4499, 4577, 4652, 4794, 4913, 4994, 5100, 5168, 5286, 5360, 5436, 5595, 5650, 5742, 5904, 6010, 6149, 6301, 6455, 6585, 6633, 6768]}
+{"doc_id": "43388682", "revision_depth": "1", "before_revision": "Annual Most Controversial Companies Report Since 2013, RepRisk releases a yearly ranking of the top ten most controversial companies in the world, related to ESG issues. The ranking is based on the companies that have the highest RRI over a particular year. Rank 2009 2010 2012 2013 20142015RepRisk Most Controversial Companies List 2015. Retrieved 22 January 2012.2016RepRisk Most Controversial Companies List 2016. Retrieved 22 January 2021.2017RepRisk Most Controversial Companies List 2017. Retrieved 22 January URL 1 Peanut Corporation of America Transocean Ltd . Tazreen Fashions Ltd. International Federation of Association Football (FIFA ) Chonghaejin Marine CompanyRuihai International Logistics Co.1Malaysia Development Berhad The Weinstein CompanyLion Mentari Airlines (Lion Air)T\u00dcV S\u00fcd AG 2 Vedanta Resources BP PLC Olympus Corp. Punta Fa SL (Mango) Takata Corp.UberMossack FonsecaKobe Steel Ltd. (Kobelco)Xe-Pian Xe-Namnoy Power Co . Ltd. (PNPC) Jiangsu Tianjiayi Chemical Co . Ltd. 3 Newmont Mining Corporation Vedanta Resources PLC Lonmin PLC Comigel SAS Chang Guann CompanySamarco Minera\u00e7\u00e3o SASamarco Minera\u00e7\u00e3o J&F Investimentos SAPunjab National Bank Ltd.Hacienda Health Care 4 Rio Tinto ExxonMobil Corporation News Corp Ltd. HSBC Holdings PLC Zhongrong Metal ProductsTakata Corp .Jiangsu Changlong Chemicals Co Ltd.Appleby Global Group Services Ltd . (Paradise Papers)Changsheng Bio-technology Co. Ltd.Wilke Waldecker Fleisch- und Wurstwaren GmbH & Co . KG 5 Walmart Foxconn Electronics Inc. Samsung Group Findus Group Ltd . UberBlue Bell Creameries LPDaewoo Shipbuilding & Marine Engineering (DSME)/ Unaoil Stalreiniging Barneveld (Chickfriend)JBS Tolleson Inc.Burning Sun Entertainment Co . Ltd. 6 Siemens Chevron Group HSBC Holdings PLC Fonterra Co-operative Group Ltd International Federation of Association Football (FIFA)HSBC Private Bank (Suisse) EquifaxInc .Danske Bank AS EstoniaLubrizol Corp20 7 KBR BG Group PLC Reebok International Ltd. GlaxoSmithKline PLC Dongguan Shinyang ElectronicsSony Corp.Rizal Commercial Banking Corp. (RCBC) Rolls-Royce Holdings PLCCambridge Analytica Ltd.Guangzhou R&F Properties Co. Ltd. 8 ExxonMobil Corporation Royal Dutch Shell ING Bank NV BNP Paribas SA General MotorsVolkswagen AGLotte GroupOdebrecht SAAutostrade per l\u2019Italia SpASamherji hf 9 BP PLC Sinar Mas Group Wyeth LLC ICAP PLC KT ENS Corp.F\u00e9d\u00e9ration Internationale de Football Association (FIFA)Volkswagen AGPetroleos de Venezuela SAGreenyard NVHenan Coal Gas Group Co . Ltd. 10 BHP Billiton Magyar Aluminium TeliaSonera AB Samsung Group Neiman Marcus Group1Malaysia Development Berhad / Odebrecht SA / General Motors / Honda Motor CompanyOdebrecht SATransnetSOC Ltd .Keppel Offshore and Marine Ltd.Intercontinental Terminals Co . LLC (ITC) & ", "after_revision": "Annual Most Controversial Companies Report Since 2013, RepRisk releases a yearly ranking of the top ten most controversial companies in the world, related to ESG issues. The ranking is based on the companies that have the highest RRI over a particular year. Rank 2009 2010 2012 2013 20142015RepRisk Most Controversial Companies List 2015. Retrieved 22 January 2012.2016RepRisk Most Controversial Companies List 2016. Retrieved 22 January 2021.2017RepRisk Most Controversial Companies List 2017. Retrieved 22 January URL 1 Peanut Corporation of America Transocean . Tazreen Fashions FIFA Chonghaejin MarineRuihai International Logistics Co1Malaysia Development Berhad The Weinstein CompanyLion AirTechnischer \u00dcberwachungsverein 2 Vedanta Resources BP Olympus Corporation Punta Fa SL (Mango) Takata CorporationUberMossack FonsecaKobe SteelXe-Pian Xe-Namnoy Power Co (PNPC) Jiangsu Tianjiayi Chemical Co 3 Newmont Mining Corporation Vedanta Resources Lonmin Comigel Chang Guann CompanySamarcoSamarco J&F InvestimentosPunjab National BankHacienda Health Care 4 Rio Tinto ExxonMobil News Corp HSBC Zhongrong Metal ProductsTakata Corporation .Jiangsu Changlong Chemicals CoAppleby Global Group Services . (Paradise Papers)Changsheng Bio-TechnologyWilke Waldecker Fleisch- und Wurstwaren GmbH & Co 5 Walmart Foxconn Samsung Group Findus Group . UberBlue Bell CreameriesDaewoo Shipbuilding & Marine Engineering Unaoil Stalreiniging Barneveld (Chickfriend)JBS TollesonBurning Sun Entertainment Co 6 Siemens Chevron Group HSBC Fonterra Co-operative Group FIFAHSBC Private Bank Equifax .Danske Bank EstoniaLubrizol Corp20 7 KBR BG Group Reebok GlaxoSmithKline Dongguan Shinyang ElectronicsSonyRizal Commercial Banking Corporation Rolls-Royce HoldingsCambridge AnalyticaGuangzhou R&F Properties 8 ExxonMobil Royal Dutch Shell ING Bank BNP Paribas General MotorsVolkswagenLotte CorporationOdebrecht SAAutostrade per l\u2019Italia SpASamherji hf 9 BP Sinar Mas Group Wyeth ICAP KT ENS CorporationFIFAVolkswagenPDVSAGreenyardHenan Coal Gas Group Co 10 BHP Billiton Magyar Aluminium Telia Company Samsung Neiman Marcus1Malaysia Development Berhad / Odebrecht / General Motors / HondaOdebrecht SATransnet .Keppel Offshore & MarineIntercontinental Terminals Co", "edit_actions": [{"type": "D", "before": "Ltd", "after": null, "start_char_pos": 563, "end_char_pos": 566}, {"type": "R", "before": "Ltd. International Federation of Association Football (FIFA ) Chonghaejin Marine CompanyRuihai International Logistics Co.1Malaysia", "after": "FIFA Chonghaejin MarineRuihai International Logistics Co1Malaysia", "start_char_pos": 586, "end_char_pos": 717}, {"type": "R", "before": "Mentari Airlines (Lion Air)T\u00dcV S\u00fcd AG", "after": "AirTechnischer \u00dcberwachungsverein", "start_char_pos": 763, "end_char_pos": 800}, {"type": "R", "before": "PLC Olympus Corp.", "after": "Olympus Corporation", "start_char_pos": 824, "end_char_pos": 841}, {"type": "R", "before": "Corp.UberMossack FonsecaKobe Steel Ltd. (Kobelco)Xe-Pian", "after": "CorporationUberMossack FonsecaKobe SteelXe-Pian", "start_char_pos": 869, "end_char_pos": 925}, {"type": "D", "before": ". Ltd.", "after": null, "start_char_pos": 945, "end_char_pos": 951}, {"type": "D", "before": ". Ltd.", "after": null, "start_char_pos": 989, "end_char_pos": 995}, {"type": "R", "before": "PLC Lonmin PLC Comigel SAS Chang Guann CompanySamarco Minera\u00e7\u00e3o SASamarco Minera\u00e7\u00e3o", "after": "Lonmin Comigel Chang Guann CompanySamarcoSamarco", "start_char_pos": 1043, "end_char_pos": 1126}, {"type": "R", "before": "Investimentos SAPunjab National Bank Ltd.Hacienda", "after": "InvestimentosPunjab National BankHacienda", "start_char_pos": 1131, "end_char_pos": 1180}, {"type": "R", "before": "Corporation News Corp Ltd. HSBC Holdings PLC", "after": "News Corp HSBC", "start_char_pos": 1216, "end_char_pos": 1260}, {"type": "R", "before": "Corp", "after": "Corporation", "start_char_pos": 1292, "end_char_pos": 1296}, {"type": "R", "before": "Co Ltd.Appleby", "after": "CoAppleby", "start_char_pos": 1326, "end_char_pos": 1340}, {"type": "D", "before": "Ltd", "after": null, "start_char_pos": 1363, "end_char_pos": 1366}, {"type": "R", "before": "Bio-technology Co. Ltd.Wilke", "after": "Bio-TechnologyWilke", "start_char_pos": 1397, "end_char_pos": 1425}, {"type": "D", "before": ". KG", "after": null, "start_char_pos": 1470, "end_char_pos": 1474}, {"type": "D", "before": "Electronics Inc.", "after": null, "start_char_pos": 1493, "end_char_pos": 1509}, {"type": "D", "before": "Ltd", "after": null, "start_char_pos": 1537, "end_char_pos": 1540}, {"type": "R", "before": "Creameries LPDaewoo", "after": "CreameriesDaewoo", "start_char_pos": 1557, "end_char_pos": 1576}, {"type": "D", "before": "(DSME)/", "after": null, "start_char_pos": 1611, "end_char_pos": 1618}, {"type": "R", "before": "Tolleson Inc.Burning", "after": "TollesonBurning", "start_char_pos": 1667, "end_char_pos": 1687}, {"type": "D", "before": ". Ltd.", "after": null, "start_char_pos": 1709, "end_char_pos": 1715}, {"type": "D", "before": "Holdings PLC", "after": null, "start_char_pos": 1745, "end_char_pos": 1757}, {"type": "R", "before": "Ltd International Federation of Association Football (FIFA)HSBC Private Bank (Suisse) EquifaxInc", "after": "FIFAHSBC Private Bank Equifax", "start_char_pos": 1786, "end_char_pos": 1882}, {"type": "D", "before": "AS", "after": null, "start_char_pos": 1896, "end_char_pos": 1898}, {"type": "R", "before": "PLC Reebok International Ltd. GlaxoSmithKline PLC Dongguan Shinyang ElectronicsSony Corp.Rizal Commercial Banking Corp. (RCBC)", "after": "Reebok GlaxoSmithKline Dongguan Shinyang ElectronicsSonyRizal Commercial Banking Corporation", "start_char_pos": 1937, "end_char_pos": 2063}, {"type": "R", "before": "Holdings PLCCambridge Analytica Ltd.Guangzhou", "after": "HoldingsCambridge AnalyticaGuangzhou", "start_char_pos": 2076, "end_char_pos": 2121}, {"type": "D", "before": "Co. Ltd.", "after": null, "start_char_pos": 2137, "end_char_pos": 2145}, {"type": "D", "before": "Corporation", "after": null, "start_char_pos": 2159, "end_char_pos": 2170}, {"type": "R", "before": "NV BNP Paribas SA General MotorsVolkswagen AGLotte GroupOdebrecht", "after": "BNP Paribas General MotorsVolkswagenLotte CorporationOdebrecht", "start_char_pos": 2198, "end_char_pos": 2263}, {"type": "D", "before": "PLC", "after": null, "start_char_pos": 2310, "end_char_pos": 2313}, {"type": "R", "before": "LLC ICAP PLC KT ENS Corp.F\u00e9d\u00e9ration Internationale de Football Association (FIFA)Volkswagen AGPetroleos de Venezuela SAGreenyard NVHenan", "after": "ICAP KT ENS CorporationFIFAVolkswagenPDVSAGreenyardHenan", "start_char_pos": 2336, "end_char_pos": 2472}, {"type": "D", "before": ". Ltd.", "after": null, "start_char_pos": 2491, "end_char_pos": 2497}, {"type": "R", "before": "TeliaSonera AB Samsung Group Neiman Marcus Group1Malaysia", "after": "Telia Company Samsung Neiman Marcus1Malaysia", "start_char_pos": 2531, "end_char_pos": 2588}, {"type": "D", "before": "SA", "after": null, "start_char_pos": 2620, "end_char_pos": 2622}, {"type": "R", "before": "Honda Motor CompanyOdebrecht SATransnetSOC Ltd", "after": "HondaOdebrecht SATransnet", "start_char_pos": 2642, "end_char_pos": 2688}, {"type": "D", "before": "and Marine Ltd.Intercontinental Terminals Co . LLC (ITC)", "after": null, "start_char_pos": 2706, "end_char_pos": 2762}, {"type": "A", "before": null, "after": "MarineIntercontinental Terminals Co", "start_char_pos": 2765, "end_char_pos": 2765}], "sents_char_pos": [0, 169, 257, 338, 416, 494, 590, 708, 841, 874, 1172, 1242, 1333, 1415, 1509, 1680, 1966, 2026, 2112, 2140, 2361, 2721]}
+{"doc_id": "43529327", "revision_depth": "1", "before_revision": "Postnormal times (PNT) is a concept developed by Ziauddin Sardar as a development of Post-normal Science . Sardar describes the present as \"postnormal times\", \"in an in-between period where old orthodoxies are dying, new ones have yet to be born, and very few things seem to make sense.\" Context In support of engaging communities of various scope and scale on how to best navigate PNT and imagine preferred pathways toward the future(s), Sardar and Sweeney published an article in the journal Futures outlining The Three Tomorrows method, which fills a gap in the field as \"many methods of futures and foresight seldom incorporate pluralism and diversity intrinsically in their frameworks, and few, if any, emphasize the dynamic and merging nature of futures possibilities, or highlight the ignorance and uncertainties we constantly confront . \" Ziauddin Sardar & John A. Sweeney, \"The Three Tomorrows of Postnormal Times , \" Futures 75 (2016) 1-13. John A. Sweeney, \"Signs of postnormal times , \" East-West Affairs 1, no. 3/4 (2013). Theory and criticism Rakesh Kapoor criticized PNT in 2011 as a Western concept , that does not apply to India and other emerging markets.Rakesh Kapoor, \"Is there a postnormal time? From the illusion of normality to the design for a new normality , \" Futures 43 (2011) 216-220. Sam Cole criticised the three C\u2019s of PNT (chaos, complexity and contradictions) as \"Alliterative Logic, theorizing through alliterative word-triads that is not based on empirical evidence\".Sam Cole, \"Alliterative logic: A theory of postnormal times , \" Futures 43 (2011) 209-215. Jay Gray has suggested that PNT is embryonic, needs a more robust framework, and should be extended to include C S Holling's adaptive cycle.Jay E. Gary, \"Toward a new macrohistory: An extension to Sardar\u2019s \u2018postnormal times,\u2019 \" Futures 43 (2011) 48-51. Scientists working on complex evolving systems have pointed out that PNT recalls the \u2018Long Waves\u2019 of Kondratiev and Joseph Schumpeter \u2019 s view of waves of \"creative destruction . \" Peter Allen and Liz Varga, \"Modelling sustainable energy futures for the UK , \" Futures 57 (2014) 28-40. PNT is one of the core areas of research for the Center for Postnormal Policy and Futures Studies at East-West University in Chicago, Illinois, US. A number of articles and editorials on PNT have been published in the journal East-West Affairs '' .", "after_revision": "Postnormal times (PNT) is a concept developed by Ziauddin Sardar as a development of post-normal science . Sardar describes the present as \"postnormal times\", \"in an in-between period where old orthodoxies are dying, new ones have yet to be born, and very few things seem to make sense.\" Context In support of engaging communities of various scope and scale on how to best navigate PNT and imagine preferred pathways toward the future(s), Sardar and Sweeney published an article in the journal Futures outlining The Three Tomorrows method, which fills a gap in the field as \"many methods of futures and foresight seldom incorporate pluralism and diversity intrinsically in their frameworks, and few, if any, emphasize the dynamic and merging nature of futures possibilities, or highlight the ignorance and uncertainties we constantly confront \" . Ziauddin Sardar & John A. Sweeney, \"The Three Tomorrows of Postnormal Times \" , Futures 75 (2016) 1-13. - John A. Sweeney, \"Signs of postnormal times \" , East-West Affairs 1, no. 3/4 (2013). Theory and criticism Rakesh Kapoor criticized PNT in 2011 as a Western concept that does not apply to India and other emerging markets.Rakesh Kapoor, \"Is there a postnormal time? From the illusion of normality to the design for a new normality \" , Futures 43 (2011) 216-220. Sam Cole criticised the three Cs of PNT (chaos, complexity and contradictions) as \"Alliterative Logic, theorizing through alliterative word-triads that is not based on empirical evidence\".Sam Cole, \"Alliterative logic: A theory of postnormal times \" , Futures 43 (2011) 209-215. Jay Gray has suggested that PNT is embryonic, needs a more robust framework, and should be extended to include C S Holling's adaptive cycle.Jay E. Gary, \"Toward a new macrohistory: An extension to Sardar\u2019s 'postnormal times' \" , Futures 43 (2011) 48-51. Scientists working on complex evolving systems have pointed out that PNT recalls the \"Long Waves\" of Kondratiev and Joseph Schumpeter ' s view of waves of \"creative destruction \" . Peter Allen and Liz Varga, \"Modelling sustainable energy futures for the UK \" , Futures 57 (2014) 28-40. PNT is one of the core areas of research for the Center for Postnormal Policy and Futures Studies at East-West University in Chicago, Illinois, US. A number of articles and editorials on PNT have been published in the journal East-West Affairs .", "edit_actions": [{"type": "R", "before": "Post-normal Science", "after": "post-normal science", "start_char_pos": 85, "end_char_pos": 104}, {"type": "D", "before": ".", "after": null, "start_char_pos": 843, "end_char_pos": 844}, {"type": "A", "before": null, "after": ".", "start_char_pos": 847, "end_char_pos": 847}, {"type": "D", "before": ",", "after": null, "start_char_pos": 924, "end_char_pos": 925}, {"type": "A", "before": null, "after": ",", "start_char_pos": 928, "end_char_pos": 928}, {"type": "R", "before": "", "after": "-", "start_char_pos": 953, "end_char_pos": 958}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1003, "end_char_pos": 1004}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1007, "end_char_pos": 1007}, {"type": "D", "before": "", "after": null, "start_char_pos": 1045, "end_char_pos": 1051}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1131, "end_char_pos": 1132}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1298, "end_char_pos": 1299}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1302, "end_char_pos": 1302}, {"type": "R", "before": "C\u2019s", "after": "Cs", "start_char_pos": 1360, "end_char_pos": 1363}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1579, "end_char_pos": 1580}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1583, "end_char_pos": 1583}, {"type": "R", "before": "\u2018postnormal times,\u2019", "after": "'postnormal times'", "start_char_pos": 1817, "end_char_pos": 1836}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1839, "end_char_pos": 1839}, {"type": "R", "before": "\u2018Long Waves\u2019", "after": "\"Long Waves\"", "start_char_pos": 1950, "end_char_pos": 1962}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1999, "end_char_pos": 2000}, {"type": "D", "before": ".", "after": null, "start_char_pos": 2042, "end_char_pos": 2043}, {"type": "A", "before": null, "after": ".", "start_char_pos": 2046, "end_char_pos": 2046}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2123, "end_char_pos": 2124}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2127, "end_char_pos": 2127}, {"type": "D", "before": "''", "after": null, "start_char_pos": 2397, "end_char_pos": 2399}], "sents_char_pos": [0, 287, 438, 873, 952, 966, 1044, 1189, 1232, 1329, 1519, 1610, 1751, 1864, 2043, 2152]}
+{"doc_id": "43812146", "revision_depth": "2", "before_revision": "Table of Contents LIST OF SYMBOLS, ILLUSTRATIONS AND CHARTS PREFACE AUTHOR\u2019S FOREWORD CHAPTER I INTRODUCTION CHAPTER II THE PURPOSE AND PLAN OF THE UNIVERSE Section 1 There is a purpose and a plan in the Universe.The law of thought. Religions. The soul. Theories concerning the destiny of the soul. Section 2 The soul. Section 3 Outline of a system of the Universe . Time. Space. Dimensions. Section 4 Plan relating to the earth sphere. Section 5 Transition of a breath-form unit to the state of aia. Eternal Order of Progression. The Government of the world. The \u201cfall of man.\u201d Regeneration of the body. Passage of a unit from the nature-side to the intelligent-side.%DIFDELCMD < %DIFDELCMD < %%% CHAPTER III OBJECTIONS TO THE LAW OF THOUGHT. Section 1 The law of thought in religions and in accidents. Section 2 An accident is an exteriorization of a thought. Purpose of an accident. Explanation of an accident. Accidents in history. Section 3 Religions. Gods. Their claims. The need of religions. The moral code. Section 4 The wrath of God. The destiny of humanity. The innate faith in justice. Section 5 The story of original sin. Section 6 The moral code in religions.%DIFDELCMD < %DIFDELCMD < %%% CHAPTER IV OPERATION OF THE LAW OF THOUGHT. Section 1 Matter. Units. An Intelligence. A Triune Self. A human being. Section 2 Mind. Thinking. A thought is a being. The atmospheres of the Triune Self. How thoughts are generated. Section 3 Course and exteriorization of a thought. The innate idea of justice Section 4 The law of thought. Exteriorizations and interiorizations. Psychic, mental, and noetic results. The power of thought. Balancing a thought. Cycles. Section 5 How exteriorizations of a thought are brought about. Agents of the law. Hastening or delaying destiny. Section 6 Duties of a human being. Responsibility Conscience. Sin. Section 7 The law of thought. Physical , psychic, mental,and noetic destiny.%DIFDELCMD < %DIFDELCMD < %%% CHAPTER V PHYSICAL DESTINY. Section 1 What physical destiny includes. Section 2 Outward circumstances as physical destiny. Section 3 Physical heredity is destiny. Healthy or sickly bodies. Unjust persecutions. Errors of justice. Congenital idiots. The span of life. Manner of death. Section 4 Money. The money god. Poverty. Reversals. The born thief. There is no accident of wealth or inheritance. Section 5 Group destiny. Rise and fall of a nation. The facts of history. Agents of the law. Religions as group destiny. Why person is born into a religion. Section 6 The Government of the world. How the destinies of the individual, the community, or the nation are made by thinking; and how destiny is administered. Section 7 Possible chaos in the world. Intelligences govern the order of events.%DIFDELCMD < %DIFDELCMD < %%% CHAPTER VI PSYCHIC DESTINY. Section 1 Form destiny. Strictly psychic destiny. Six classes of psychic destiny. The aia. The breath-form. Section 2 Form destiny. Prenatal influences. Six classes of psychic destiny. Section 3 Form destiny. Prenatal influences. Conception. Fetal development. Section 4 Prenatal influences of parents. Thoughts of the mother. Inheritance of former thoughts. Section 5 The first few years of life. Psychic inheritance. Section 6 Mediumship. Materializations. Seances. Section 7 Clairvoyance. Psychic powers. Section 8 Pranayama. Psychic phenomena by wonder-workers. Section 9 Personal magnetism. Section 10 Vibrations. Colors. Section 11 Religions, as psychic destiny. Section 12 Psychic destiny comprises government and institutions. Section 13 Psychic destiny comprises party and class spirits. Section 14 Habits, customs and fashions are psychic destiny. Section 15 Gambling. Drinking. The spirit of alcohol. Section 16 Gloom, pessimism, malice, fear, hope, joyousness, trust, ease, \u2014as psychic destiny. Section 17 Sleep. Section 18 Dreams. Nightmares. Obsessions in dreams. Deep sleep. Time in sleep. Section 19 Hallucinations. Somnambulism. Hypnosis. Section 20 The process of dying. Cremation. To be conscious at the moment of death. Section 21 After death. Communications with the dead. Apparitions. The doer becomes conscious that its body has died. Section 22 The twelve stages of the doer, from one earth life to the next. After death the doer leads a composite life. The judgment. Hell is made by desires. The devil. Section 23 Heaven is a reality. Re-existence of the succeeding doer portion. CHAPTER VII MENTAL DESTINY. Section 1 The mental atmosphere of the human. Section 2 An Intelligence. The Triune Self. The three orders of Intelligences. The Light of the Intelligence. Section 3 Real thinking. Active thinking; passive thinking.The three minds of the doer. About lack of terms. Rightness-and-reason. The seven minds of the Triune Self. A human thought is a being and has a system. Exteriorizations of a thought. Section 4 Human thinking goes along beaten paths. Section 5 Character of the mental atmosphere of the human.Moral aspect of thinking. The ruling thought. Mental attitude and mental set. Sense-knowledge and self-knowledge. Conscience. Honesty of the mental atmosphere. Results of honest thinking. Dishonest thinking. Thinking a lie. Section 6 Responsibility and duty. Sense-learning and sense-knowledge. Doer-learning and doer-knowledge. Intuition. Section 7 Genius. Section 8 The four classes of human beings. Section 9 Conception of a Beginning. The permanent physical world or Realm of Permanence, and the four earths. The trial test of the sexes. The \u201cfall\u201d of the doer. Doers became subject to re-existence in man and woman bodies. Section 10 Prehistoric history. First, Second, and Third Civilization on the human earth. Fallen doers from inside the earth. Section 11 A Fourth Civilization. Wise men. Rises and falls of cycles. Rise of the latest cycle. Section 12 The forms of nature come through the breath-forms of human beings. There is progression, but no evolution. The entities in animal and plant forms are cast off feelings and desires of man. The entities in vermin, in flowers. Section 13 History of the kingdoms of nature. Creation by breath and speech. Thinking under the type of two. The human body is the pattern of the kingdoms of nature. The intelligence in nature. Section 14 This is an age of thought. Schools of thought. Section 15 Mysticism. Section 16 Spiritism. Section 17 Schools of thought that use thinking to produce directly physical results. Mental healing. Section 18 Thoughts are the seeds of a disease. Section 19 Purpose of a disease. The real cure. About schools of thought to banish disease and poverty. Section 20 Thinking against a disease. Other ways of mental healing. There is no escape from payment and from learning. Section 21 Mental healers and their procedures. Section 22 Faith. Section 23 Animal magnetism. Hypnotism. Its dangers. Trance states. Painless injuries inflicted, while in trance. Section 24 Self-hypnosis. Recovery of forgotten knowledge. Section 25 Self-suggestion. Intentional use of passive thinking. Examples of a formula. Section 26 The Eastern Movement. Eastern record of knowledge. Degeneration of the ancient knowledge. The atmosphere of India. Section 27 The breath. What the breath does. The psychic breath. The mental breath. The noetic breath. The fourfold physical breath. Pranayama. Its dangers. Section 28 The system of Patanjali. His eight steps of yoga. Ancient commentaries. Review of his system. Inner meaning of some Sanskrit words. The ancient teaching of which traces survive. What the West wants. Section 29 The Theosophical Movement. The teachings of Theosophy. Section 30 States of the human being in deep sleep. Section 31 Mental destiny in the after death states.The round of twelve stages from life to life. Hells and heavens. CHAPTER VIII NOETIC DESTINY.%DIFDELCMD < %DIFDELCMD < %%% Section 1 Knowledge of the conscious self in the body.The noetic world. Self-knowledge of the knower of the Triune Self. When knowledge of the conscious self in the body is available to the human. Section 2 The test and trial of the sexes. Projection of a female form. Illustrations. History of the Triune Self. Section 3 The Light of the Intelligence. The Light in the knower of the Triune Self; in the thinker; in the doer. The Light that has gone into nature. Section 4 The intelligence in nature comes from human beings. The pull of nature for Light. Loss of Light into nature. Section 5 Automatic return of Light from nature. The lunar germ. Self-control. Section 6 Reclamation of Light by self-control. Loss of the lunar germ. Retention of the lunar germ.The solar germ. Divine, or \u201cimmaculate,\u201d conception in the head. Regeneration of the physical body. Hiram Abiff. Origin of Christianity. Section 7 Three degrees of Light from Intelligences. Thinking without creating thoughts or destiny. Bodies for the doer, the thinker, and the knower of the Triune Self, within the perfect physical body. Section 8 Free will. The problem of free will. CHAPTER IX RE-EXISTENCE.%DIFDELCMD < %DIFDELCMD < %%% Section 1 Recapitulation: Make-up of a human being. The Triune Self. The Light of the Intelligence. A human body as the link between nature and the doer. Death of the body. The doer after death. Re-existence of the doer. Section 2 Four kinds of units. Progression of units. Section 3 Raising of the aia to be a Triune Self in the Realm of Permanence. Duty of its doer, in the perfect body. Feeling-and-desire produced a change in the body. The twain, or dual body. Trial and test of bringing feeling-and-desire into balanced union. Section 4 The \u201cfall of man,\u201d i.e. the doer. Changes in the body. Death. Re-existence in a male or a female body. The doers now on earth. Circulations of units through the bodies of humans. Section 5 Fourth Civilization. Changes on the earth crust. Forces. Minerals, plants and flowers. The varied types were produced by human thoughts. Section 6 Fourth Civilization. Lesser civilizations. Section 7 Fourth Civilization. Governments. Ancient teachings of the Light of the Intelligence. Religions. Section 8 The doers now on earth came from a prior earth age. Failure of the doer to improve. The story of feeling-and-desire. The spell of the sexes. The purpose of re-existences. Section 9 Importance of the flesh body. Reclamation of Light. Death of the body. Wanderings of the units. Return of units to a body. Section 10 The doer-in-the-body. Error in the conception of \u201cI.\u201d The personality and re-existence. The doer portion after death. The portions not in the body. How a doer portion is drawn out for re-existence. Section 11 The thoughts summarized at moment of death. Events determined then, for the next life. The flare-up in classic Greece. Something about the Jews. The stamp of a God at birth. Family. The sex. Cause of changing the sex. Section 12 Also predetermined is the kind of body. Physical heredity and how it is limited. Chief mundane occupations. Diseases. The chief events in life. How destiny can be overcome. Section 13 The time between existences. About the heavenly bodies. Time. Why people fit into the age in which they live. Section 14 Everything after death is destiny. Inventors. Classic Hellas. Re-existence in nation groups. Centers of succeeding civilizations. Greece, Egypt, India. Section 15 Training of the doer portion though memory is not present. The body-mind. Doer-memory. Sense-memory. A good memory. Memory after death. Section 16 Why it is fortunate that the human does not remember previous existences. The training of the doer. A human thinks of himself as a body with a name. To be conscious of and as. The false \u201cI\u201d and its illusions. Section 17 When re-existences of a doer portion stop. A \u201clost\u201d doer portion. The hells inside the earth crust. The lecherous. The drunkards. Drug fiends. The state of a \u201clost\u201d doer. Regenerating the physical body. The test in which the doers failed. Section 18 Summary of preceding chapters. Consciousness is the One Reality. Man as the center of the world of time. Circulations of the units. Permanent institutions. Records of thoughts are made in points. The destiny of human beings is written in the starry spaces. Balancing a thought. Cycles of thinking. Glamour in which things are seen. Sensations are elementals. Why nature seeks the doer. Illusions. The essential things in life. CHAPTER X GODS AND THEIR RELIGIONS.%DIFDELCMD < %DIFDELCMD < %%% Section 1 Religions; on what they are founded. Why belief in a personal God. Problems a religion must meet. Any religion is better than none. Section 2 Classes of Gods . The Gods of religions; how they come into existence. How long they last. Appearance of a God. Changes of a God. Gods have only what human beings have who create and keep them. The name of a God. Christian Gods. Section 3 The human qualities of a God. The knowledge of a God. His objects and interests. Relations of a God. The moral code. Flattery. How Gods lose their power. What a God can do for his worshippers; what he cannot do. After death. Unbelievers. Prayer. Section 4 Benefits of a belief in a God. Seeking God. Prayer. Outside teachings and the inner life. Inner teachings. Twelve types of teachings. Jehovah worship. The Hebrew letters. Christianity. St. Paul. The story of Jesus. Symbolic events. The Kingdom of Heaven, and the Kingdom of God. The Christian Trinity. Section 5 Interpretation of Bible sayings. The story of Adam and Eve. The trial and test of the sexes. \u201cFall of man.\u201d Immortality. St. Paul. Regeneration of the body. Who and what was Jesus? Mission of Jesus. Jesus, a pattern for man. The order of Melchisedec. Baptism. The sexual act, the original sin. The Trinity. Entering the Great Way . CHAPTER XI THE GREAT WAY.%DIFDELCMD < %DIFDELCMD < %%% Section 1 The \u201cDescent\u201d of man. There is no evolution without, first, involution. The mystery of germ cell development. The future of the human. The Great Way. Brotherhoods. Ancient Mysteries. Initiations. Alchemists. Rosicrucians. Section 2 The Triune Self complete. The Threefold Way, and the three paths of each Way. The lunar, solar, and light germs. Divine, \u201cimmaculate\u201d conception. The form, life, and light paths of The Way in the body. Section 3 The Way of thinking. Honesty and truthfulness as the foundation of progress. Physical, psychic, mental requirements. Changes in the body in the process of regeneration. Section 4 Entering The Way. A new life opens. Advances on the form, life, and light paths. The lunar, solar, and light germs. Bridge between the two nervous systems. Further changes in the body. The perfect, immortal, physical body. The three inner bodies for the doer, the thinker, the knower of the Triune Self, within the perfect physical body. Section 5 The Way in the earth. The ongoer leaves the world. The form path; what he sees there. Shades of the dead. \u201cLost\u201d portions of doers. The choice. Section 6 The ongoer on the life path; on the light path, in the earth. He knows who he is. Another choice. Section 7 Preparing oneself to enter upon The Way. Honesty and truthfulness. The regenerative breath. The four stages in thinking. CHAPTER XII THE POINT OR CIRCLE.%DIFDELCMD < %DIFDELCMD < %%% Section 1 Creation of a thought. Method of thinking by building within a point. Human thinking. Thinking done by Intelligences. Thinking which does not create thoughts, or destiny. Section 2 Method of thinking in fashioning nature. The forms of nature come from human thoughts. Pre-chemistry. Section 3 The constitution of matter. Units. Section 4 Erroneous conceptions. Dimensions. The heavenly bodies. Time. Space. CHAPTER XIII THE CIRCLE OR ZODIAC.%DIFDELCMD < %DIFDELCMD < %%% Section 1 Geometrical symbols. The Circle with the Twelve Nameless Points. The value of the zodiacal symbol. Section 2 What the zodiac and its twelve points symbolize. Section 3 The zodiac related to the human body; to the Triune Self; to the Intelligence. Section 4 The zodiac reveals the purpose of the Universe. Section 5 The zodiac as a historical and prophetic record; as a clock to measure progress in nature and on the intelligent-side, and in the building out of a thought. Section 6 Groups of zodiacal signs. Application to the human body. CHAPTER XIV THINKING: THE WAY TO CONSCIOUS IMMORTALITY.%DIFDELCMD < %DIFDELCMD < %%% Section 1 The system of thinking without creating destiny. With what it is concerned. With what it is not concerned. For whom it is presented. The origin of this system. No teacher is needed. Limitations. Preliminaries to be understood. Section 2 Recapitulation: The make-up of the human being. Units. The senses. The breath. The breath-form. The aia. Human bodies and the outside universe. Section 3 Recapitulation continued. The doer portion in the body. The Triune Self and its three parts. The twelve portions of the doer. How long a human is dissatisfied. Section 4 Recapitulation continued. The doer as feeling and as desire. The twelve portions of the doer. The psychic atmosphere. Section 5 Recapitulation continued. The thinker of the Triune Self. The three minds of the doer. The minds of the thinker and the knower. How desire speaks in place of rightness; the reversed round. The mental atmosphere. Section 6 Recapitulation continued. The knower of the Triune Self, selfness and I-ness. The noetic atmosphere. What a human is conscious as. Isolation of feeling; of desire. Being conscious of Consciousness. Section 7 The System of Thinking. What it is. Stages on: The Way to Conscious Immortality . SYMBOLS, ILLUSTRATIONS AND CHARTS.%DIFDELCMD < %DIFDELCMD < %%% DEFINITIONS AND EXPLANATIONS. INDEX OF FIGURES.%DIFDELCMD < %DIFDELCMD < %%% INDEX. AFTERWORD.%DIFDELCMD < %DIFDELCMD < %%% THE WORD FOUNDATION.%DIFDELCMD < %DIFDELCMD < %%% List of SYMBOLS, ILLUSTRATIONS and CHARTS%DIFDELCMD < %DIFDELCMD < %%% I-A . . . . . . Circle of the Twelve Nameless Points, and the Four Spheres I-B . . . . . . The Earth Sphere and the Four Worlds I-C . . . . . . The Invisible Physical World or Realm of Permanence;and the Temporal Human World I-D . . . . . . The Physical Plane, and its Four States of Matter I-E . . . . . . The Solid State of Matter and its Four Substates II-A . . . . . . The Units II-B . . . . . . An Unbalanced Unit on the Nature-Side II-C . . . . . . A Balanced Unit of the Perfect Body II-D; E . . . . The Units on the Nature-Side II-F . . . . . . Pre-Chemistry II-G; H . . . . The Eternal Order of Progression III. . . . . . . The Fourfold Physical Human Body IV-A. . . . . . The Lines of a Thought IV-B . . . . . Sense-Government and Self-Government V-A . . . . . . The Triune Self, its Three Parts and Seven Minds V-B . . . . . . The Triune Self of the Human; its Three Atmospheres, and the Physical Atmosphere V-B, a . . . . The Triune Self Complete, and its Perfect Physical Body V-C . . . . . . The Three Orders of Intelligences, and the Seven Faculties of an Intelligence V-D . . . . . . A Re-existing Doer Portion and its After-Death States. The Breath-form during these States VI-A, a . . . . The Cerebro-Spinal Nervous System. The Human Brain VI-A, b; c; d . The Spinal Cord and Nerves, and Spinal Column VI-B . . . . . Ramifications of the Sympathetic Nervous System VI-C . . . . . The Principal Tracts of the Two Systems, and the Paths of the Lunar and the Solar Germs VI-D . . . . . Diagrammatic Sketch of the Perfect, Sexless, Immortal, Physical Body VI-E . . . . . Skeleton of Human Body, showing Sternum VII-A . . . . . The Zodiac VII-B . . . . . The Zodiac, within the Circle of the Twelve Nameless Points VII-C . . . . . The Broken and Extended Zodiac VII-D . . . . . Horizontals, Perpendiculars and Opposites VII-E to L . . The Monad, the Dyads, Triads, Tetrads, Pentads and Hexads", "after_revision": " %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% Contents Introduction The Purpose and Plan of the Universe Objections to the Law of Thought Operation of the Law of Thought Physical Destiny Psychic Destiny Mental Destiny Noetic Destiny Re-existence Gods and %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% their Religions The Great Way The Point or Circle The %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% Circle or Zodiac Thinking: the Way to Conscious Immortality %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "D", "before": "Table of Contents LIST OF SYMBOLS, ILLUSTRATIONS AND CHARTS PREFACE AUTHOR\u2019S FOREWORD CHAPTER I INTRODUCTION CHAPTER II THE PURPOSE AND PLAN OF THE UNIVERSE", "after": null, "start_char_pos": 0, "end_char_pos": 156}, {"type": "D", "before": "Section 1 There is a purpose and a plan in the Universe.The law of thought. Religions. The soul. Theories concerning the destiny of the soul. Section 2 The soul. Section 3 Outline of a system of the Universe . Time. Space. Dimensions. Section 4 Plan relating to the earth sphere. Section 5 Transition of a breath-form unit to the state of aia. Eternal Order of Progression. The Government of the world. The \u201cfall of man.\u201d Regeneration of the body. Passage of a unit from the nature-side to the intelligent-side.", "after": null, "start_char_pos": 157, "end_char_pos": 668}, {"type": "D", "before": "CHAPTER III OBJECTIONS TO THE LAW OF THOUGHT.", "after": null, "start_char_pos": 698, "end_char_pos": 743}, {"type": "D", "before": "Section 1 The law of thought in religions and in accidents. Section 2 An accident is an exteriorization of a thought. Purpose of an accident. Explanation of an accident. Accidents in history. Section 3 Religions. Gods. Their claims. The need of religions. The moral code. Section 4 The wrath of God. The destiny of humanity. The innate faith in justice. Section 5 The story of original sin. Section 6 The moral code in religions.", "after": null, "start_char_pos": 744, "end_char_pos": 1173}, {"type": "D", "before": "CHAPTER IV OPERATION OF THE LAW OF THOUGHT.", "after": null, "start_char_pos": 1203, "end_char_pos": 1246}, {"type": "D", "before": "Section 1 Matter. Units. An Intelligence. A Triune Self. A human being. Section 2 Mind. Thinking. A thought is a being. The atmospheres of the Triune Self. How thoughts are generated. Section 3 Course and exteriorization of a thought. The innate idea of justice Section 4 The law of thought. Exteriorizations and interiorizations. Psychic, mental, and noetic results. The power of thought. Balancing a thought. Cycles. Section 5 How exteriorizations of a thought are brought about. Agents of the law. Hastening or delaying destiny. Section 6 Duties of a human being. Responsibility Conscience. Sin. Section 7 The law of thought. Physical , psychic, mental,and noetic destiny.", "after": null, "start_char_pos": 1247, "end_char_pos": 1922}, {"type": "D", "before": "CHAPTER V PHYSICAL DESTINY.", "after": null, "start_char_pos": 1952, "end_char_pos": 1979}, {"type": "D", "before": "Section 1 What physical destiny includes. Section 2 Outward circumstances as physical destiny. Section 3 Physical heredity is destiny. Healthy or sickly bodies. Unjust persecutions. Errors of justice. Congenital idiots. The span of life. Manner of death. Section 4 Money. The money god. Poverty. Reversals. The born thief. There is no accident of wealth or inheritance. Section 5 Group destiny. Rise and fall of a nation. The facts of history. Agents of the law. Religions as group destiny. Why person is born into a religion. Section 6 The Government of the world. How the destinies of the individual, the community, or the nation are made by thinking; and how destiny is administered. Section 7 Possible chaos in the world. Intelligences govern the order of events.", "after": null, "start_char_pos": 1980, "end_char_pos": 2747}, {"type": "D", "before": "CHAPTER VI PSYCHIC DESTINY.", "after": null, "start_char_pos": 2777, "end_char_pos": 2804}, {"type": "R", "before": "Section 1 Form destiny. Strictly psychic destiny. Six classes of psychic destiny. The aia. The breath-form. Section 2 Form destiny. Prenatal influences. Six classes of psychic destiny. Section 3 Form destiny. Prenatal influences. Conception. Fetal development. Section 4 Prenatal influences of parents. Thoughts of the mother. Inheritance of former thoughts. Section 5 The first few years of life. Psychic inheritance. Section 6 Mediumship. Materializations. Seances. Section 7 Clairvoyance. Psychic powers. Section 8 Pranayama. Psychic phenomena by wonder-workers. Section 9 Personal magnetism. Section 10 Vibrations. Colors. Section 11 Religions, as psychic destiny. Section 12 Psychic destiny comprises government and institutions. Section 13 Psychic destiny comprises party and class spirits. Section 14 Habits, customs and fashions are psychic destiny. Section 15 Gambling. Drinking. The spirit of alcohol. Section 16 Gloom, pessimism, malice, fear, hope, joyousness, trust, ease, \u2014as psychic destiny. Section 17 Sleep. Section 18 Dreams. Nightmares. Obsessions in dreams. Deep sleep. Time in sleep. Section 19 Hallucinations. Somnambulism. Hypnosis. Section 20 The process of dying. Cremation. To be conscious at the moment of death. Section 21 After death. Communications with the dead. Apparitions. The doer becomes conscious that its body has died. Section 22 The twelve stages of the doer, from one earth life to the next. After death the doer leads a composite life. The judgment. Hell is made by desires. The devil. Section 23 Heaven is a reality.", "after": "Contents Introduction The Purpose and Plan of the Universe Objections to the Law of Thought Operation of the Law of Thought Physical Destiny Psychic Destiny Mental Destiny Noetic Destiny", "start_char_pos": 2805, "end_char_pos": 4364}, {"type": "D", "before": "of the succeeding doer portion.", "after": null, "start_char_pos": 4378, "end_char_pos": 4409}, {"type": "R", "before": "CHAPTER VII MENTAL DESTINY. Section 1 The mental atmosphere of the human. Section 2 An Intelligence. The Triune Self. The three orders of Intelligences. The Light of the Intelligence. Section 3 Real thinking. Active thinking; passive thinking.The three minds of the doer. About lack of terms. Rightness-and-reason. The seven minds of the Triune Self. A human thought is a being and has a system. Exteriorizations of a thought. Section 4 Human thinking goes along beaten paths. Section 5 Character of the mental atmosphere of the human.Moral aspect of thinking. The ruling thought. Mental attitude and mental set. Sense-knowledge", "after": "Gods", "start_char_pos": 4410, "end_char_pos": 5038}, {"type": "D", "before": "self-knowledge. Conscience. Honesty of the mental atmosphere. Results of honest thinking. Dishonest thinking. Thinking a lie. Section 6 Responsibility and duty. Sense-learning and sense-knowledge. Doer-learning and doer-knowledge. Intuition. Section 7 Genius. Section 8 The four classes of human beings. Section 9 Conception of a Beginning. The permanent physical world or Realm of Permanence, and the four earths. The trial test of the sexes. The \u201cfall\u201d of the doer. Doers became subject to re-existence in man and woman bodies. Section 10 Prehistoric history. First, Second, and Third Civilization on the human earth. Fallen doers from inside the earth. Section 11 A Fourth Civilization. Wise men. Rises and falls of cycles. Rise of the latest cycle. Section 12 The forms of nature come through the breath-forms of human beings. There is progression, but no evolution. The entities in animal and plant forms are cast off feelings and desires of man. The entities in vermin, in flowers. Section 13 History of the kingdoms of nature. Creation by breath and speech. Thinking under the type of two. The human body is the pattern of the kingdoms of nature. The intelligence in nature. Section 14 This is an age of thought. Schools of thought. Section 15 Mysticism. Section 16 Spiritism. Section 17 Schools of thought that use thinking to produce directly physical results. Mental healing. Section 18 Thoughts are the seeds of a disease. Section 19 Purpose of a disease. The real cure. About schools of thought to banish disease and poverty. Section 20 Thinking against a disease. Other ways of mental healing. There is no escape from payment and from learning. Section 21 Mental healers and their procedures. Section 22 Faith. Section 23 Animal magnetism. Hypnotism. Its dangers. Trance states. Painless injuries inflicted, while in trance. Section 24 Self-hypnosis. Recovery of forgotten knowledge. Section 25 Self-suggestion. Intentional use of passive thinking. Examples of a formula. Section 26 The Eastern Movement. Eastern record of knowledge. Degeneration of the ancient knowledge. The atmosphere of India. Section 27 The breath. What the breath does. The psychic breath. The mental breath. The noetic breath. The fourfold physical breath. Pranayama. Its dangers. Section 28 The system of Patanjali. His eight steps of yoga. Ancient commentaries. Review of his system. Inner meaning of some Sanskrit words. The ancient teaching of which traces survive. What the West wants. Section 29 The Theosophical Movement. The teachings of Theosophy. Section 30 States of the human being in deep sleep. Section 31 Mental destiny in the after death states.The round of twelve stages from life to life. Hells and heavens.", "after": null, "start_char_pos": 5043, "end_char_pos": 7755}, {"type": "D", "before": "CHAPTER VIII NOETIC DESTINY.", "after": null, "start_char_pos": 7756, "end_char_pos": 7784}, {"type": "D", "before": "Section 1 Knowledge of the conscious self in the body.The noetic world. Self-knowledge of the knower of the Triune Self. When knowledge of the conscious self in the body is available to the human. Section 2 The test and trial of the sexes. Projection of a female form. Illustrations. History of the Triune Self. Section 3 The Light of the Intelligence. The Light in the knower of the Triune Self; in the thinker; in the doer. The Light that has gone into nature. Section 4 The intelligence in nature comes from human beings. The pull of nature for Light. Loss of Light into nature. Section 5 Automatic return of Light from nature. The lunar germ. Self-control. Section 6 Reclamation of Light by self-control. Loss of the lunar germ. Retention of the lunar germ.The solar germ. Divine, or \u201cimmaculate,\u201d conception in the head. Regeneration of the physical body. Hiram Abiff. Origin of Christianity. Section 7 Three degrees of Light from Intelligences. Thinking without creating thoughts or destiny. Bodies for the doer, the thinker, and the knower of the Triune Self, within the perfect physical body. Section 8 Free will. The problem of free will.", "after": null, "start_char_pos": 7814, "end_char_pos": 8961}, {"type": "D", "before": "CHAPTER IX RE-EXISTENCE.", "after": null, "start_char_pos": 8962, "end_char_pos": 8986}, {"type": "R", "before": "Section 1 Recapitulation: Make-up of a human being. The Triune Self. The Light of the Intelligence. A human body as the link between nature and the doer. Death of the body. The doer after death. Re-existence of the doer. Section 2 Four kinds of units. Progression of units. Section 3 Raising of the aia to be a Triune Self in the Realm of Permanence. Duty of its doer, in the perfect body. Feeling-and-desire produced a change in the body. The twain, or dual body. Trial and test of bringing feeling-and-desire into balanced union. Section 4", "after": "their Religions The Great Way", "start_char_pos": 9016, "end_char_pos": 9557}, {"type": "R", "before": "\u201cfall of man,\u201d i.e. the doer. Changes in the body. Death. Re-existence in a male or a female body. The doers now on earth. Circulations of units through the bodies of humans. Section 5 Fourth Civilization. Changes on the earth crust. Forces. Minerals, plants and flowers. The varied types were produced by human thoughts. Section 6 Fourth Civilization. Lesser civilizations. Section 7 Fourth Civilization. Governments. Ancient teachings of the Light of the Intelligence. Religions. Section 8 The doers now on earth came from a prior earth age. Failure of the doer to improve. The story of feeling-and-desire. The spell of the sexes. The purpose of re-existences. Section 9 Importance of the flesh body. Reclamation of Light. Death of the body. Wanderings of the units. Return of units to a body. Section 10", "after": "Point or Circle", "start_char_pos": 9562, "end_char_pos": 10368}, {"type": "D", "before": "doer-in-the-body. Error in the conception of \u201cI.\u201d The personality and re-existence. The doer portion after death. The portions not in the body. How a doer portion is drawn out for re-existence. Section 11 The thoughts summarized at moment of death. Events determined then, for the next life. The flare-up in classic Greece. Something about the Jews. The stamp of a God at birth. Family. The sex. Cause of changing the sex. Section 12 Also predetermined is the kind of body. Physical heredity and how it is limited. Chief mundane occupations. Diseases. The chief events in life. How destiny can be overcome. Section 13 The time between existences. About the heavenly bodies. Time. Why people fit into the age in which they live. Section 14 Everything after death is destiny. Inventors. Classic Hellas. Re-existence in nation groups. Centers of succeeding civilizations. Greece, Egypt, India. Section 15 Training of the doer portion though memory is not present. The body-mind. Doer-memory. Sense-memory. A good memory. Memory after death. Section 16 Why it is fortunate that the human does not remember previous existences. The training of the doer. A human thinks of himself as a body with a name. To be conscious of and as. The false \u201cI\u201d and its illusions. Section 17 When re-existences of a doer portion stop. A \u201clost\u201d doer portion. The hells inside the earth crust. The lecherous. The drunkards. Drug fiends. The state of a \u201clost\u201d doer. Regenerating the physical body. The test in which the doers failed. Section 18 Summary of preceding chapters. Consciousness is the One Reality. Man as the center of the world of time. Circulations of the units. Permanent institutions. Records of thoughts are made in points. The destiny of human beings is written in the starry spaces. Balancing a thought. Cycles of thinking. Glamour in which things are seen. Sensations are elementals. Why nature seeks the doer. Illusions. The essential things in life.", "after": null, "start_char_pos": 10373, "end_char_pos": 12318}, {"type": "D", "before": "CHAPTER X GODS AND THEIR RELIGIONS.", "after": null, "start_char_pos": 12319, "end_char_pos": 12354}, {"type": "D", "before": "Section 1 Religions; on what they are founded. Why belief in a personal God. Problems a religion must meet. Any religion is better than none. Section 2 Classes of Gods . The Gods of religions; how they come into existence. How long they last. Appearance of a God. Changes of a God. Gods have only what human beings have who create and keep them. The name of a God. Christian Gods. Section 3 The human qualities of a God. The knowledge of a God. His objects and interests. Relations of a God. The moral code. Flattery. How Gods lose their power. What a God can do for his worshippers; what he cannot do. After death. Unbelievers. Prayer. Section 4 Benefits of a belief in a God. Seeking God. Prayer. Outside teachings and the inner life. Inner teachings. Twelve types of teachings. Jehovah worship. The Hebrew letters. Christianity. St. Paul. The story of Jesus. Symbolic events. The Kingdom of Heaven, and the Kingdom of God. The Christian Trinity. Section 5 Interpretation of Bible sayings. The story of Adam and Eve. The trial and test of the sexes. \u201cFall of man.\u201d Immortality. St. Paul. Regeneration of the body. Who and what was Jesus? Mission of Jesus. Jesus, a pattern for man. The order of Melchisedec. Baptism. The sexual act, the original sin. The Trinity. Entering the Great Way .", "after": null, "start_char_pos": 12384, "end_char_pos": 13674}, {"type": "D", "before": "CHAPTER XI THE GREAT WAY.", "after": null, "start_char_pos": 13675, "end_char_pos": 13700}, {"type": "D", "before": "Section 1 The \u201cDescent\u201d of man. There is no evolution without, first, involution. The mystery of germ cell development. The future of the human. The Great Way. Brotherhoods. Ancient Mysteries. Initiations. Alchemists. Rosicrucians. Section 2 The Triune Self complete. The Threefold Way, and the three paths of each Way. The lunar, solar, and light germs. Divine, \u201cimmaculate\u201d conception. The form, life, and light paths of The Way in the body. Section 3 The Way of thinking. Honesty and truthfulness as the foundation of progress. Physical, psychic, mental requirements. Changes in the body in the process of regeneration. Section 4 Entering The Way. A new life opens. Advances on the form, life, and light paths. The lunar, solar, and light germs. Bridge between the two nervous systems. Further changes in the body. The perfect, immortal, physical body. The three inner bodies for the doer, the thinker, the knower of the Triune Self, within the perfect physical body. Section 5 The Way in the earth. The ongoer leaves the world. The form path; what he sees there. Shades of the dead. \u201cLost\u201d portions of doers. The choice. Section 6 The ongoer on the life path; on the light path, in the earth. He knows who he is. Another choice. Section 7 Preparing oneself to enter upon The Way. Honesty and truthfulness. The regenerative breath. The four stages in thinking.", "after": null, "start_char_pos": 13730, "end_char_pos": 15093}, {"type": "D", "before": "CHAPTER XII THE POINT OR CIRCLE.", "after": null, "start_char_pos": 15094, "end_char_pos": 15126}, {"type": "D", "before": "Section 1 Creation of a thought. Method of thinking by building within a point. Human thinking. Thinking done by Intelligences. Thinking which does not create thoughts, or destiny. Section 2 Method of thinking in fashioning nature. The forms of nature come from human thoughts. Pre-chemistry. Section 3 The constitution of matter. Units. Section 4 Erroneous conceptions. Dimensions. The heavenly bodies. Time. Space.", "after": null, "start_char_pos": 15156, "end_char_pos": 15572}, {"type": "D", "before": "CHAPTER XIII THE CIRCLE OR ZODIAC.", "after": null, "start_char_pos": 15573, "end_char_pos": 15607}, {"type": "D", "before": "Section 1 Geometrical symbols. The Circle with the Twelve Nameless Points. The value of the zodiacal symbol. Section 2 What the zodiac and its twelve points symbolize. Section 3 The zodiac related to the human body; to the Triune Self; to the Intelligence. Section 4 The zodiac reveals the purpose of the Universe. Section 5 The zodiac as a historical and prophetic record; as a clock to measure progress in nature and on the intelligent-side, and in the building out of a thought. Section 6 Groups of zodiacal signs. Application to the human body.", "after": null, "start_char_pos": 15637, "end_char_pos": 16185}, {"type": "D", "before": "CHAPTER XIV THINKING: THE WAY TO CONSCIOUS IMMORTALITY.", "after": null, "start_char_pos": 16186, "end_char_pos": 16241}, {"type": "R", "before": "Section 1 The system of thinking without creating destiny. With what it is concerned. With what it is not concerned. For whom it is presented. The origin of this system. No teacher is needed. Limitations. Preliminaries to be understood. Section 2 Recapitulation: The make-up of the human being. Units. The senses. The breath. The breath-form. The aia. Human bodies and the outside universe. Section 3 Recapitulation continued. The doer portion in the body. The Triune Self and its three parts. The twelve portions of the doer. How long a human is dissatisfied. Section 4 Recapitulation continued. The doer as feeling and as desire. The twelve portions of the doer. The psychic atmosphere. Section 5 Recapitulation continued. The thinker of the Triune Self. The three minds of the doer. The minds of the thinker and the knower. How desire speaks in place of rightness; the reversed round. The mental atmosphere. Section 6 Recapitulation continued. The knower of the Triune Self, selfness and I-ness. The noetic atmosphere. What a human is conscious as. Isolation of feeling; of desire. Being conscious of Consciousness. Section 7 The System of Thinking. What it is. Stages on: The", "after": "Circle or Zodiac Thinking: the", "start_char_pos": 16271, "end_char_pos": 17450}, {"type": "D", "before": ".", "after": null, "start_char_pos": 17480, "end_char_pos": 17481}, {"type": "D", "before": "SYMBOLS, ILLUSTRATIONS AND CHARTS.", "after": null, "start_char_pos": 17482, "end_char_pos": 17516}, {"type": "D", "before": "DEFINITIONS AND EXPLANATIONS.", "after": null, "start_char_pos": 17546, "end_char_pos": 17575}, {"type": "D", "before": "INDEX OF FIGURES.", "after": null, "start_char_pos": 17576, "end_char_pos": 17593}, {"type": "D", "before": "INDEX.", "after": null, "start_char_pos": 17623, "end_char_pos": 17629}, {"type": "D", "before": "AFTERWORD.", "after": null, "start_char_pos": 17630, "end_char_pos": 17640}, {"type": "D", "before": "THE WORD FOUNDATION.", "after": null, "start_char_pos": 17670, "end_char_pos": 17690}, {"type": "D", "before": "List of SYMBOLS, ILLUSTRATIONS and CHARTS", "after": null, "start_char_pos": 17720, "end_char_pos": 17761}, {"type": "D", "before": "I-A . . . . . . Circle of the Twelve Nameless Points, and the Four Spheres I-B . . . . . . The Earth Sphere and the Four Worlds I-C . . . . . . The Invisible Physical World or Realm of Permanence;and the Temporal Human World I-D . . . . . . The Physical Plane, and its Four States of Matter I-E . . . . . . The Solid State of Matter and its Four Substates II-A . . . . . . The Units II-B . . . . . . An Unbalanced Unit on the Nature-Side II-C . . . . . . A Balanced Unit of the Perfect Body II-D; E . . . . The Units on the Nature-Side II-F . . . . . . Pre-Chemistry II-G; H . . . . The Eternal Order of Progression III. . . . . . . The Fourfold Physical Human Body IV-A. . . . . . The Lines of a Thought IV-B . . . . . Sense-Government and Self-Government V-A . . . . . . The Triune Self, its Three Parts and Seven Minds V-B . . . . . . The Triune Self of the Human; its Three Atmospheres, and the Physical Atmosphere V-B, a . . . . The Triune Self Complete, and its Perfect Physical Body V-C . . . . . . The Three Orders of Intelligences, and the Seven Faculties of an Intelligence V-D . . . . . . A Re-existing Doer Portion and its After-Death States. The Breath-form during these States VI-A, a . . . . The Cerebro-Spinal Nervous System. The Human Brain VI-A, b; c; d . The Spinal Cord and Nerves, and Spinal Column VI-B . . . . . Ramifications of the Sympathetic Nervous System VI-C . . . . . The Principal Tracts of the Two Systems, and the Paths of the Lunar and the Solar Germs VI-D . . . . . Diagrammatic Sketch of the Perfect, Sexless, Immortal, Physical Body VI-E . . . . . Skeleton of Human Body, showing Sternum VII-A . . . . . The Zodiac VII-B . . . . . The Zodiac, within the Circle of the Twelve Nameless Points VII-C . . . . . The Broken and Extended Zodiac VII-D . . . . . Horizontals, Perpendiculars and Opposites VII-E to L . . The Monad, the Dyads, Triads, Tetrads, Pentads and Hexads", "after": null, "start_char_pos": 17791, "end_char_pos": 19696}], "sents_char_pos": [0, 213, 232, 243, 298, 318, 366, 379, 391, 436, 500, 530, 559, 604, 668, 743, 803, 861, 885, 913, 935, 956, 976, 999, 1015, 1043, 1068, 1097, 1134, 1173, 1246, 1264, 1288, 1303, 1318, 1334, 1366, 1402, 1430, 1481, 1538, 1577, 1614, 1636, 1657, 1728, 1747, 1778, 1813, 1840, 1875, 1922, 2021, 2074, 2114, 2140, 2161, 2180, 2199, 2217, 2234, 2251, 2266, 2286, 2302, 2349, 2374, 2401, 2423, 2442, 2470, 2506, 2545, 2633, 2666, 2705, 2747, 2828, 2854, 2886, 2912, 2936, 2957, 2989, 3013, 3034, 3046, 3065, 3107, 3131, 3163, 3202, 3223, 3245, 3263, 3296, 3312, 3333, 3370, 3400, 3423, 3473, 3539, 3601, 3662, 3683, 3716, 3811, 3829, 3848, 3860, 3882, 3894, 3909, 3936, 3950, 3993, 4004, 4044, 4068, 4098, 4111, 4162, 4237, 4282, 4296, 4321, 4332, 4364, 4409, 4483, 4510, 4527, 4562, 4593, 4618, 4635, 4653, 4681, 4702, 4724, 4760, 4805, 4836, 4886, 4945, 4970, 4990, 5022, 5058, 5070, 5104, 5132, 5152, 5168, 5203, 5239, 5273, 5284, 5302, 5346, 5383, 5457, 5486, 5510, 5572, 5604, 5662, 5698, 5732, 5769, 5795, 5873, 5913, 5994, 6030, 6076, 6107, 6139, 6196, 6224, 6262, 6282, 6304, 6326, 6412, 6428, 6476, 6509, 6524, 6580, 6619, 6649, 6700, 6748, 6766, 6795, 6806, 6819, 6834, 6880, 6906, 6939, 6967, 7004, 7027, 7060, 7089, 7128, 7153, 7176, 7198, 7218, 7237, 7256, 7286, 7297, 7310, 7346, 7371, 7393, 7415, 7453, 7499, 7520, 7558, 7586, 7638, 7691, 7736, 7755, 7868, 7885, 7934, 8010, 8053, 8082, 8097, 8125, 8166, 8210, 8226, 8239, 8276, 8338, 8368, 8395, 8444, 8460, 8474, 8522, 8546, 8575, 8590, 8639, 8674, 8687, 8711, 8764, 8811, 8914, 8935, 8961, 9067, 9084, 9115, 9169, 9188, 9210, 9236, 9267, 9289, 9366, 9405, 9455, 9480, 9547, 9591, 9612, 9660, 9684, 9736, 9767, 9795, 9833, 9883, 9914, 9936, 9967, 9980, 10032, 10043, 10105, 10137, 10170, 10194, 10224, 10264, 10286, 10305, 10330, 10357, 10390, 10456, 10486, 10516, 10566, 10621, 10664, 10696, 10722, 10751, 10768, 10795, 10846, 10887, 10914, 10950, 10979, 11019, 11046, 11100, 11146, 11157, 11173, 11204, 11241, 11263, 11333, 11348, 11361, 11375, 11390, 11410, 11495, 11521, 11570, 11597, 11630, 11684, 11707, 11741, 11756, 11771, 11784, 11812, 11844, 11880, 11922, 11956, 11996, 12023, 12047, 12087, 12148, 12169, 12189, 12223, 12250, 12277, 12288, 12318, 12404, 12430, 12460, 12491, 12525, 12553, 12576, 12606, 12626, 12647, 12665, 12729, 12748, 12764, 12804, 12828, 12855, 12875, 12891, 12928, 12967, 12986, 12999, 13012, 13061, 13074, 13120, 13137, 13164, 13181, 13201, 13215, 13245, 13262, 13309, 13332, 13375, 13402, 13435, 13450, 13463, 13499, 13523, 13541, 13567, 13593, 13636, 13649, 13700, 13761, 13811, 13849, 13874, 13889, 13903, 13922, 13935, 13947, 13961, 13997, 14049, 14084, 14117, 14173, 14204, 14260, 14300, 14352, 14380, 14398, 14443, 14478, 14518, 14547, 14585, 14700, 14732, 14761, 14776, 14796, 14816, 14842, 14854, 14893, 14926, 14946, 14962, 15013, 15039, 15064, 15093, 15188, 15235, 15251, 15283, 15336, 15387, 15433, 15448, 15486, 15526, 15538, 15559, 15572, 15607, 15667, 15711, 15745, 15804, 15852, 15872, 15893, 15951, 16010, 16118, 16154, 16185, 16329, 16356, 16387, 16413, 16440, 16462, 16475, 16507, 16565, 16584, 16596, 16613, 16661, 16697, 16727, 16764, 16797, 16831, 16867, 16902, 16935, 16959, 16995, 17027, 17056, 17097, 17138, 17158, 17181, 17217, 17269, 17292, 17322, 17344, 17355, 17389, 17423, 17435, 17593, 17629, 17690, 17987, 18287, 18363, 18658, 18945, 19032, 19057, 19092, 19229]}
+{"doc_id": "4408141", "revision_depth": "1", "before_revision": "Measures of verse Types of metre Below, \"short /long \" definitions of a syllable of classical languages correspond to \"stressed/unstressed\" of English language. Iamb : short-long Trochee or Choreus, choree : long-short Spondee: long-long Pyrrhic or dibrach : short-short Dactyl: long-short-short Anapaest or antivdactylus : short-short-long Amphibrach: short-long-short Amphimacer or cretic : long-short-long Molossus: long-long-long Tribrach: short-short-short Ziket: Tetrasyllables primus paeon: long-short-short-short secundus paeon: short-long-short-short tertius paeon: short-short-long-short quartus paeon: short-short-short-long first epitrite: short-long-long-long second epitrite: long-short-long-long third epitrite: long-long-short-long fourth epitrite: long-long-long-short minor ionic , or double iamb : short-short-long-long major ionic: long-long-short-short diamb : short-long-short-long ditrochee : long-short-long-short %DIFDELCMD < %DIFDELCMD < %%% antispast : short-long-long-short choriamb : long-short-short-long tetrabrach or proceleusmatic: short-short-short-short dispondee: long-long-long-long Verse forms 'a Gra' Reformata' Ten stanzas of ABA CD ABA CD ABA CD ABA CD ABA CD ABAC. Following the rhyme scheme of the Villanelle, but with five extra couplets just after each tercet. Ballade: Three stanzas of \" ababbcbC \" followed by a refrain of \" bcbC \". The last line of each, indicated by the capital letter, is repeated verbatim. Chant royal: Five stanzas of \"ababccddedE\" followed by either \"ddedE\" or \"ccddedE \".(The capital letters indicate a line repeated verbatim. ) Cinquain: \"ababb\". Clerihew: \"aabb\". Couplet: \"aa\", but usually occurs as \"aa bb cc dd ...\". Enclosed rhyme ( or enclosing rhyme): \"abba\". Ghazal: \"aa ba ca da ...\" . Limerick: \"aabba\". Monorhyme: \"aaaaa...\", an identical rhyme on every line, common in Latin and Arabic Ottava rima: \" abababcc\". Rhyme royal: \" ababbcc\". Rondelet: \"AbAabbA\". Rubaiyat: \"aaba\". Sapphics Seguidilla (poetry): Spanish with seven syllable-counted lines & Petrarchan sonnet: \"abba abba cde cde\" or \"abba abba cdc cdc\". Shadorma: an allegedly Spanish six-line stanza, syllable-count restricted form, 3/5/3/3/7/5 ) Shakespearean sonnet: \"abab cdcd efef gg\". Simple 4-line: \"abcb\" Spenserian sonnet: \"abab bcbc cdcd ee\". Onegin stanzas: \"\" with lowercase letters representing assonant rhymes and the uppercase representing end-rhymes Spenserian stanza: \"ababbcbcc\" . Tanaga: traditional Tagalog tanaga is aaaa Terza rima: \"aba bcb cdc ...\", ending on \"yzy z\" or \"yzy zz \" . Triplet: \" aaa\" , often repeating like the couplet. Verbless poetry See also Main list: List of basic poetry topics List of literary terms Literature Poet Poetry Further reading M. H. Abrams. A Glossary of Literary Terms. Thomson-Wadsworth, 2005. . Chris Baldick. The Concise Dictionary of Literary Terms. Oxford Univ. Press, 2004. . Chris Baldick. The Concise Oxford Dictionary of Literary Terms. Oxford Univ. Press, 2001. . Edwin Barton & G. A. Hudson. Contemporary Guide To Literary Terms. Houghton-Mifflin, 2003. . Mark Bauerlein. Literary Criticism: An Autopsy. Univ. of Pennsylvania Press, 1997. . Karl Beckson & Arthur Ganz. Literary Terms: A Dictionary. Farrar, Straus and Giroux, 1989. . Peter Childs. The Routledge Dictionary of Literary Terms. Routledge, 2005. . J. A. Cuddon. The Penguin Dictionary of Literary Terms and Literary Theory. Penguin Books, 2000. . Dana Gioia. The Longman Dictionary of Literary Terms: Vocabulary for the Informed Reader. Longman, 2005. . Sharon Hamilton. Essential Literary Terms: A Brief Norton Guide with Exercises. W. W. Norton, 2006. . William Harmon. A Handbook to Literature. Prentice Hall, 2005. . X. J. Kennedy, et al. Handbook of Literary Terms: Literature, Language, Theory. Longman, 2004. . V. B. Leitch. The Norton Anthology of Theory and Criticism. W. W. Norton, 2001. . John Lennard, The Poetry Handbook. Oxford Univ. Press, 1996, 2005. . Frank Lentricchia & Thomas McLaughlin. Critical Terms for Literary Study. Univ. of Chicago Press, 1995. . David Mikics. A New Handbook of Literary Terms. Yale Univ. Press, 2007. . Ross Murfin & S. M. Ray. The Bedford Glossary of Critical and Literary Terms. Bedford/St. Martin's, 2006. . John Peck & Martin Coyle. Literary Terms and Criticism. Palgrave Macmillan, 2002. . Edward Quinn. A Dictionary of Literary And Thematic Terms. Checkmark Books, 2006. . Lewis Turco. The Book of Literary Terms: The Genres of Fiction, Drama, Nonfiction, Literary Criticism, and Scholarship. Univ. Press of New England, 1999. .", "after_revision": "This is a glossary of poetry terms. Basic composition Accent Vedic accent Cadence: the patterning of rhythm in poetry, or natural speech, without a distinct meter. Line: a unit into which a poem is divided. Line break: the termination of the line of a poem and the beginning of a new line. Metre (or meter): the basic rhythmic structure of a verse or lines in verse. Metres are influenced by syllables and their 'weight'. Metrical foot (aka poetic foot): the basic repeating rhythmic unit that forms part of a line of verse in most Indo-European traditions of poetry. Arsis and thesis Prosody: the principles of metrical structure in poetry. Syllable weight and stress: weight refers to the duration of a syllable, which can be defined by the length of a vowel; whereas stress refers to a syllable uttered in a higher pitch\u2014or with greater emphasis\u2014than others. Stressed or long syllable (Ancient Greek: longum; notation: URL a heavy syllable Unstressed or short syllable (Ancient Greek: brevis; notation: URL a light syllable Stanza: a group of lines forming the basic recurring metrical unit in a poem. (cf. verse in music.) Verse: formally, a single metrical line. (Not to be confused with musical verse.) G\u0101th\u0101 Verse paragraph: a group of verse lines that make up a single rhetorical unit Other parts Anceps: a position in a metrical pattern that can be filled by either a long or a short syllable. Caesura: a stop or pause in a metrical line, typically marked by punctuation. Canto: a long subsection of an long narrative poem such as an epic. End rhyme (aka tail rhyme): a rhyme occurring in the terminating word or syllable of one line in a poem with that of another line, as opposed to internal rhyme. End-stopping line Enjambment: incomplete syntax at the end of a line; the meaning runs over from one poetic line to the next, without terminal punctuation. Epigraph: a quotation from another literary work that is placed under the title at the beginning of a poem or section of a poem. Hemistich: a half of a line of verse. Internal rhyme: a rhyme that occurs within a single line of verse, or between internal phrases across multiple lines. Off-centered rhyme: a rhyme that occurs in an unexpected place in a given line. Refrain: repeated lines in a poem. Strophe: the first section of a choral ode Metrical feet A metrical foot (aka poetic foot) is the basic repeating rhythmic unit that forms part of a line of verse in most Indo-European traditions of poetry. Monosyllable Disyllable: metrical foot consisting of 2 syllables. Iamb (aka iambus) : short-long Trochee (aka choreus or choree) : long-short Spondee: long-long Pyrrhic (aka dibrach) : short-short Trisyllable: metrical foot consisting of 3 syllables. Dactyl: long-short-short Anapaest (aka antidactylus) : short-short-long . (Example: \u201cThe Destruction of Sennacherib\u201d by Lord Byron.) Amphibrach: short-long-short Cretic (aka amphimacer) : long-short-long . (Example: modern-day uses can typically be found in expressions like \"In a while, crocodile;\" as well as in slogans and advertising.) Molossus: long-long-long Tribrach: short-short-short Bacchius: short-long-long Antibacchius: long-long-short Tetrasyllable: metrical foot consisting of 4 syllables. Tetrabrach (aka proceleusmatic): short-short-short-short Dispondee: long-long-long-long Paeon: a metrical foot of 1 long syllable and 3 short syllables in any order. Primus paeon: long-short-short-short Secundus paeon: short-long-short-short Tertius paeon: short-short-long-short Quartus paeon: short-short-short-long Epitrite: a metrical foot consisting of 3 long syllables and 1 short syllable. First epitrite: short-long-long-long Second epitrite: long-short-long-long Third epitrite: long-long-short-long Fourth epitrite: long-long-long-short Ionic: a metrical foot consisting of 2 short and 2 long syllables Minor ionic (aka double iamb) : short-short-long-long Major ionic: long-long-short-short Diamb : short-long-short-long (i.e., two iambs) Ditrochee : long-short-long-short %DIFDELCMD < %DIFDELCMD < %%% (i.e., two trochees) Antispast : short-long-long-short Choriamb : long-short-short-long (i.e., a trochee/choree alternating with an iamb) Hexasyllable: metrical foot consisting of 6 syllables. Double dactyl Octosyllable: metrical foot consisting of 8 syllables. Decasyllable: metrical foot consisting of 10 syllables. Hendecasyllable: metrical foot consisting of 11 syllables. Dodecasyllable: metrical foot consisting of 12 syllables. Forms Verse meters In a poetic composition, a verse is formally a single metrical line. Monometer: a line of verse with just 1 metrical foot. Dimeter: a line of verse with 2 metrical feet. Trimeter: a line of verse with 3 metrical feet. Tetrameter: a line of verse with 4 metrical feet. Hexameter: a line of verse with 6 metrical feet. Heptameter: a line of verse with 7 metrical feet. Octameter: a line of verse with 8 metrical feet. Dactylic meter: any meter based on the dactyl as its primary rhythmic unit. Dactylic tetrameter Dactylic pentameter Dactylic hexameter Golden line Iambic meter: any meter based on the iamb as its primary rhythmic unit. Alexandrine (iambic hexameter): a 12-syllable iambic line adapted from French heroic verse. Example: the last line of each stanza in \u201cThe Convergence of the Twain\u201d by Thomas Hardy. Czech alexandrine French alexandrine Polish alexandrine Fourteener (iambic heptameter): line consisting of 7 iambic feet (14 syllables) Galliambic verse Iambic pentameter: line consisting of 5 iambic feet (10 syllables) Iambic tetrameter: line consisting of 4 iambic feet (8 syllables) Trochaic meter: any meter based on the trochee as its primary rhythmic unit. Trochaic tetrameter Trochaic octameter Trochaic septenarius Arabic poetic meters: Bas\u012b\u1e6d Hazaj K\u0101mil Mutaq\u0101rib Mad\u012bd Rajaz Taw\u012bl W\u0101fir Anapestic tetrameter (aka reverse dactyl): a poetic meter that has 4 anapestic metres per line. Common metre: a quatrain that rhymes \" abab \" and alternates 4-stress and 3-stress iambic lines. This is the meter used in hymns and ballads. Indian poetic meters: Chhand Kannada meter Mandakranta M\u0101trika Ovi Triveni Sanskrit meter Tamil meter Vedic meter Tri\u1e63\u1e6dubh: a Vedic meter of 44 syllables, or any hymn composed in this meter Long metre (aka long measure): a poetic metre consisting of quatrains (4-line stanzas) in iambic tetrameter with the rhyme pattern \" abab \". Persian metres Quantitative meter: the dominant metrical system in which the rhythm depends on the length of time it takes to utter a line rather than on the number of stresses. Traditional Welsh Types of verse Accentual verse Accentual-syllabic verse Acatalexis Adonic Aeolic Glyconic: most basic form of aeolic verse. Alcmanian Archilochian Asclepiad Choliamb Dochmiac Doggerel: a bad verse, traditionally characterized by clich\u00e9s, clumsiness, and irregular meter. Free verse and vers libre: an open form of poetry that does not use consistent of meter patterns, rhyme, or any musical pattern, therefore tending to follow the rhythm of natural speech. Knittelvers Heroic verse Riding rhyme: an early form of heroic verse derived from the rhythm of the poetry in parts of The Canterbury Tales depicting the pilgrims as they rode along. Leonine verse McWhirtle Neo-Miltonic syllabics Political verse (aka decapentasyllabic verse): iambic verse of 15 syllables. Saturnian Anu\u1e63\u1e6dubh: a quatrain with each line (called a p\u0101da, or 'foot') having 8 syllables. Shloka Triadic-line Verse forms (A capital letter in any rhyme schemes below indicates a line that is repeated verbatim. ) Blank verse: non-rhyming iambic pentameter (10-syllable line). It is the predominant rhythm of traditional English dramatic and epic poetry, as it is considered the closest to English speech patterns. Examples: \"Paradise Lost\" by John Milton and \u201cSunday Morning\u201d by Wallace Stevens. Chant royal: five stanzas of \"ababccddedE\" followed by either \"ddedE\" or \"ccddedE .\" 'a Gra' Reformata': ten stanzas of ABA CD ABA CD ABA CD ABA CD ABA CD ABAC. Following the rhyme scheme of the Villanelle, but with 5 extra couplets just after each tercet. Cinquain: \"ababb\". Clerihew: \"aabb\". Enclosed rhyme ( aka enclosing rhyme): \"abba\". Ghazal: \"aa ba ca da ...\" Kural: Tamil verse form Limerick: \"aabba\". Monorhyme: an identical rhyme on every line, common in Latin and Arabic . ( \" aaaaa... \" ) Rondelet: \"AbAabbA\". Rubaiyat: \"aaba\". Sapphics Seguidilla : Spanish-origin poem with seven syllable-counted lines , rhyming the second fourth, and the fifth& seventh lines (\"abcbded\") Petrarchan sonnet: \"abba abba cde cde\" or \"abba abba cdc cdc\". Sestina: a complex French verse form, usually unrhymed, consisting of 6 stanzas of 6 lines each and a 3-line envoi. Shadorma: an allegedly Spanish six-line stanza, syllable-count restricted form, 3/5/3/3/7/5 Shakespearean sonnet: \"abab cdcd efef gg\". Simple 4-line: \"abcb\" Spenserian sonnet: \"abab bcbc cdcd ee\". Onegin stanzas: \"\" with lowercase letters representing assonant rhymes and the uppercase representing end-rhymes . Sprung rhythm: a poetic rhythm designed to imitate the rhythm of natural speech . Tanaga: traditional Tagalog tanaga is \"aaaa\" Terza rima: \"aba bcb cdc ...\", ending on \"yzy z\" or \"yzy zz / \" Types of rhyming A rhyme is the repetition of syllables, typically found at the end of a verse line. Assonance (aka vowel rhyme): the repetition of vowel sounds without repeating consonants. Broken rhyme: a type of enjambment producing a rhyme by dividing a word at the line break of a poem to make a rhyme with the end word of another line Catalectic Acephalous line Chiasmus: repetition of any group of verse elements (including rhyme and grammatical structure) in reverse order. Consonance: the repetition of identical or similar consonants in neighboring words whose vowel sounds are different Alliteration: the repetition of initial stressed, consonant sounds in a series of words within a phrase or verse line. Cross rhyme Holorime: identical pronunciation of different lines; in other words, when two entire lines have the same sound Imperfect rhyme (aka half or near rhyme) Monorhyme Pararhyme Perfect rhyme (aka full or exact rhyme) Syllabic Types of stanza A stanza is a group of lines forming the basic recurring metrical unit in a poem. (cf. verse in music.) Alcaic: a 4-line stanza invented by the Classical Greek poet Alcaeus that uses a specific syllabic count per line and a predominantly dactylic meter. Ballad Biolet Burns Chaubola Cinquain Couplet: two successive rhyming lines ( \" aa\"), usually of the same length (usually re-occurring as \"aa bb cc dd ...\"). Doha Heroic couplet: written in iambic pentameter. Poulter's measure: couplets in which a 12-syllable iambic line rhymes with a 14-syllable iambic line. Envoi (or envoy): the brief stanza that ends French poetic forms such as the ballade or sestina. Ghazal Octave: an 8-line stanza or poem. Ottava rima: an Italian stanza of eight 11-syllable lines, with a rhyme scheme of \"abababcc.\" Quatorzain Quatrain: a 4-line poem or stanza Quintain Rhyme royal: a stanza of seven 10-syllable lines, rhyming \"ababbcc.\" Sapphic Sestain Sestet: a 6-line stanza Onegin stanza Spenserian: consists of 9 lines in total\u20148 iambic-pentameter lines and a final alexandrine\u2014with a rhyme scheme of \"ababbcbcc.\" Tercet (or triplet): a unit of three lines, rhymed (\" aaa\" ) or unrhymed , often repeating like the couplet. Triolet: an 8-line stanza with only two rhymes, repeating the 1st line as the 4th and 7th lines, and the 2nd line as the 8th (\"ABaAabAB\"). Terza rima: an Italian stanzaic form consisting of tercets with interwoven rhymes (\"aba bcb ded efe...\"). Genres Genres by structure Fixed form (French: forme fixe): the three 14th- and 15th-century French poetic forms: Ballade: three 8-line stanzas (\"ababbcbC\") and a 4-line envoi (\"bcbC\"). The last line of the first stanza is repeated verbatim at the end of subsequent stanzas and the envoi. Example: Algernon Charles Swinburne\u2019s translation \u201cBallade des Pendus\u201d by Fran\u00e7ois Villon. Rondeau: a mainly octosyllabic poem consisting of between 10 and 15 lines and 3 stanzas. It has only 2 rhymes, with the opening words used twice as an un-rhyming refrain at the end of the 2nd and 3rd stanzas. Virelai Found poem: a prose text or texts reshaped by a poet into quasi-metrical lines. Haiku: a type of short poem, originally from Japan, consisting of three lines in a 5, 7, 5 syllable pattern.Lanoue, David G. Issa, Cup-of-tea Poems: Selected Haiku of Kobayashi Issa, Asian Humanities English-language haiku: an unrhymed tercet poem in the haiku style. Lekythion: a sequence of seven alternating long and short syllables at the end of a verse. Landay: a form of Afghani folk poetry that is composed as a couplet of 22 syllables. Mukhammas Pantoum: a Malaysian verse form adapted by French poets comprising a series of quatrains, with the 2nd and 4th lines of each quatrain repeated as the 1st and 3rd lines of the next. The 2nd and 4th lines of the final stanza repeat the 1st and 3rd lines of the first stanza. Pastiche Prose: a prose composition that is not broken into verse lines, instead expressing other traits such as symbols, metaphors, and figures of speech. Rondel (or roundel): a poem of 11 to 14 lines consisting of 2 rhymes and the repetition of the first 2 lines in the middle of the poem and at its end. Sonnet: a poem of 14 lines using any of a number of formal rhyme schemes; in English, they typically have 10 syllables per line. Caudate sonnet Crown of sonnets (aka sonnet redoubl\u00e9) Curtal sonnet Petrarchan (or Italian): traditionally follows the rhyme scheme \"abba, abba, cdecde\"; a common variation of the end is \"cdcdcd\", especially within the final 6 lines Shakespearean (or English): follows the rhyme scheme abab, cdcd, efef, gg, introducing a third quatrain (grouping of four lines), a final couplet, and a greater amount of variety with regard to rhyme than is usually found in its Italian predecessors. By convention, sonnets in English typically use iambic pentameter, while in the Romance languages, the hendecasyllable and Alexandrine are the most widely used meters. Sonnet sequence Spenserian sonnet Sijo Stichic: a poem composed of lines of the same approximate meter and length, not broken into stanzas. Syllabic: a poem whose meter is determined by the total number of syllables per line, rather than the number of stresses. Tanka: a Japanese form of five lines with 5, 7, 5, 7, and 7 syllables\u201431 in all. Villanelle: a French verse form consisting of five 3-line stanzas and a final quatrain, with the first and third lines of the first stanza repeating alternately in the following stanzas. Genre by form/presentation Abecedarian: a poem in which the first letter of each line or stanza follows sequentially through the alphabet. Acrostic: a poem in which the first letter of each line spells out a word, name, or phrase when read vertically. Example: \u201cA Boat beneath a Sunny Sky\u201d by Lewis Carroll. Concrete (aka pattern): a written poem or verse whose lines are arranged as a shape/visual image, usually of the topic. Slam Sound Spoken-word Verbless poetry: a poem without verbs Thematic genres Ars Poetica: a poem that explains the 'art of poetry', or a meditation on poetry using the form and techniques of a poem. Aubade: a love poem welcoming or lamenting the arrival of the dawn. Example: \u201cThe Sun Rising\u201d by John Donne. Deep image Didactic Dramatic monologue Epithalamium (aka epithalamion): a nuptial poem in honour of the bride and bridegroom. Ecopoetry Ekphrasis: a poem that vividly describes a scene or work of art. Elliptical Epigram Folk Folk ballad Gnomic: a poems laced with proverbs, aphorisms, or maxims. Hymn: a poem praising God or the divine (often sung). Lament: any poem expressing deep grief, usually at a death or some other loss. Dirge Elegy: a poem of lament, praise, and consolation, usually formal and sustained, over the death of a particular person. Example: \"Elegy Written in a Country Churchyard\" by Thomas Gray. Light: whimsical poems Limerick Nonsense Double dactyl Lyric Canzone: a lyric poem originating in medieval Italy and France and usually consisting of hendecasyllabic lines with end-rhyme. Epithalamium Madrigal: a song or short lyric poem intended for multiple singers. Ode: a formal lyric poem that addresses, and typically celebrates, a person, place, thing, or idea. Horatian Ode Palinode: an ode that retracts or recants what the poet wrote in a previous poem. Pindaric Ode Sapphic ode Stev: a form of Norwegian folk song consisting of quatrain lyric stanzas. Meditative Narrative Ballad: a popular narrative song passed down orally. In English, it typically follows a form of rhymed (\"abcb\") quatrains alternating 4-stress and 3-stress lines. Folk ballad: unknown origin, recounting tragic, comic, or heroic stories with emphasis on a central dramatic event. Examples: \"Barbara Allen\" and \"John Henry\" Literary ballad: poems adapting the conventions of folk ballads, beginning in the Renaissance. Examples: \u201cLa Belle Dame sans Merci\u201d by John Keats and \u201cAnnabel Lee\u201d by Edgar Allan Poe. Epic (or epos): an extended narrative poem, typically expressing heroic themes. Mock-epic: a poem that plays with the conventions of the epic to comment on a topic satirically. Epyllion: a brief narrative work written in dactylic hexameter, commonly dealing with mythological themes and characterized by vivid description and allusion. Romance Occasional: a poem written to describe or comment on a particular event. Panegyric: a poem of great praise. Pastoral Eclogue: a pastoral poem usually containing dialogue between shepherds. Georgic Recusatio: a poem (or part thereof) in which the poet claim that they are supposedly unable or disinclined to write the type of poem that they originally intended to, and instead writes in a different style. Movements Avant-garde Flarf Futurist Language Beat: A movement that arose from San Francisco\u2019s literary counterculture in the 1950s. Its poetry is primarily free verse, often surrealistic, and influenced by the cadences of jazz music. Black Mountain: A group of progressives in North Carolina associated with the experimental Black Mountain College in the 1940s and 1950s. Its poetic composition promoted a nontraditional style, following a improvisational, open-form approach, driven by the natural patterns of breath and the spoken word. Confessional Dada Dark Room Collective Fireside Fugitives Georgian Harlem Renaissance Imagism Metaphysical N\u00e9gritude New American New Critic New Formalist New Historicist New York School Objectivist Oulipo Pre-Raphaelite Romantic Symbolist Other poetic devices Allusion: a brief, intentional reference to a historical, mythic, or literary person, place, event, or movement; in other words, a figure of speech using indirect reference.\" Anacrusis: brief introduction. Anaphora: the repetition of a word or words at the beginning of successive phrases, clauses, or lines to give emphasis. Apostrophe: an address to a dead or absent person, or personification as if that person were present. Example: \"O Captain! My Captain!\" by Walt Whitman. Blason: describes the physical attributes of a subject, usually female. Circumlocution: a roundabout wording. Example: In \"Kubla Khan\" by Samuel Taylor Coleridge\u2014\u201ctwice five miles of fertile ground\u201d (i.e., 10 miles). Epistrophe (aka epiphora): the repetition of a word or expression at the end of successive phrases or verses. Epizeuxis: the immediate repetition of a word or phrase for emphasis. Metaphor: a rhetorical figure of speech marked by implicit comparison, rather than direct or explicit comparison like in a simile. In a metaphor, the tenor is the subject to which attributes are ascribed (i.e., the target); the vehicle is the subject from which the attributes are derived/borrowed (i.e., the source); and ground is the shared properties between the two.Cuddon, J. A. (1998) \"Tenor and vehicle.\" In A Dictionary of Literary Terms and Literary Theory (4th ed.). Oxford Malden, MA: Blackwell. p. 904 Conceit: a typically unconventional, logically complex, or surprising metaphor whose appeal is more intellectual than emotional. Extended metaphor (aka sustained metaphor): the exploitation of a single metaphor or analogy at length through multiple linked tenors and vehicles throughout a poem. Allegory: an extended metaphor in which the characters, places, and objects in a narrative carry figurative meaning. Often, the meaning of an allegory is religious, moral, or historical in nature. Example: \"The Faerie Queene\" by Edmund Spenser. Periphrasis: the usage of multiple separate words to carry the meaning of prefixes, suffixes or verbs. Objective correlative Simile: a figure of speech that directly/explicitly compares two things. Homeric simile (aka epic simile) Syzygy: the combination of 2 metrical feet into a single unit, similar to an elision. Theory Descriptive poetics Historical poetics Negative capability Pathetic fallacy Poetic diction Poetic license Porson's Law Resolution: the phenomenon of replacing a long syllable with 2 short syllables. Robert Bridges's theory of elision Scansion Sievers's theory of Anglo-Saxon meter Theopoetics Weak position See also Poetry Poet List of basic poetry topics Literature List of literary terms Further reading M. H. Abrams. A Glossary of Literary Terms. Thomson-Wadsworth, 2005. . Chris Baldick. The Concise Oxford Dictionary of Literary Terms. Oxford Univ. Press, 2001. . \u2014\u2014 The Concise Dictionary of Literary Terms. Oxford Univ. Press, 2004. . Edwin Barton & G. A. Hudson. Contemporary Guide To Literary Terms. Houghton-Mifflin, 2003. . Mark Bauerlein. Literary Criticism: An Autopsy. Univ. of Pennsylvania Press, 1997. . Karl Beckson & Arthur Ganz. Literary Terms: A Dictionary. Farrar, Straus and Giroux, 1989. . Peter Childs. The Routledge Dictionary of Literary Terms. Routledge, 2005. . J. A. Cuddon. The Penguin Dictionary of Literary Terms and Literary Theory. Penguin Books, 2000. . Dana Gioia. The Longman Dictionary of Literary Terms: Vocabulary for the Informed Reader. Longman, 2005. . Sharon Hamilton. Essential Literary Terms: A Brief Norton Guide with Exercises. W. W. Norton, 2006. . William Harmon. A Handbook to Literature. Prentice Hall, 2005. . X. J. Kennedy, et al. Handbook of Literary Terms: Literature, Language, Theory. Longman, 2004. . V. B. Leitch. The Norton Anthology of Theory and Criticism. W. W. Norton, 2001. . John Lennard, The Poetry Handbook. Oxford Univ. Press, 1996, 2005. . Frank Lentricchia & Thomas McLaughlin. Critical Terms for Literary Study. Univ. of Chicago Press, 1995. . David Mikics. A New Handbook of Literary Terms. Yale Univ. Press, 2007. . Ross Murfin & S. M. Ray. The Bedford Glossary of Critical and Literary Terms. Bedford/St. Martin's, 2006. . John Peck & Martin Coyle. Literary Terms and Criticism. Palgrave Macmillan, 2002. . Edward Quinn. A Dictionary of Literary And Thematic Terms. Checkmark Books, 2006. . Lewis Turco. The Book of Literary Terms: The Genres of Fiction, Drama, Nonfiction, Literary Criticism, and Scholarship. Univ. Press of New England, 1999. .", "edit_actions": [{"type": "R", "before": "Measures of verse Types of metre Below, \"short /long \" definitions of a syllable of classical languages correspond to \"stressed/unstressed\" of English language. Iamb", "after": "This is a glossary of poetry terms.", "start_char_pos": 0, "end_char_pos": 165}, {"type": "A", "before": null, "after": "Basic composition", "start_char_pos": 166, "end_char_pos": 166}, {"type": "A", "before": null, "after": "Accent Vedic accent Cadence: the patterning of rhythm in poetry, or natural speech, without a distinct meter. Line: a unit into which a poem is divided. Line break: the termination of the line of a poem and the beginning of a new line. Metre (or meter): the basic rhythmic structure of a verse or lines in verse. Metres are influenced by syllables and their 'weight'. Metrical foot (aka poetic foot): the basic repeating rhythmic unit that forms part of a line of verse in most Indo-European traditions of poetry. Arsis and thesis Prosody: the principles of metrical structure in poetry. Syllable weight and stress: weight refers to the duration of a syllable, which can be defined by the length of a vowel; whereas stress refers to a syllable uttered in a higher pitch\u2014or with greater emphasis\u2014than others. Stressed or long syllable (Ancient Greek: longum; notation: URL a heavy syllable Unstressed or short syllable (Ancient Greek: brevis; notation: URL a light syllable Stanza: a group of lines forming the basic recurring metrical unit in a poem. (cf. verse in music.) Verse: formally, a single metrical line. (Not to be confused with musical verse.) G\u0101th\u0101 Verse paragraph: a group of verse lines that make up a single rhetorical unit", "start_char_pos": 167, "end_char_pos": 167}, {"type": "A", "before": null, "after": "Other parts", "start_char_pos": 168, "end_char_pos": 168}, {"type": "A", "before": null, "after": "Anceps: a position in a metrical pattern that can be filled by either a long or a short syllable.", "start_char_pos": 169, "end_char_pos": 169}, {"type": "A", "before": null, "after": "Caesura: a stop or pause in a metrical line, typically marked by punctuation. Canto: a long subsection of an long narrative poem such as an epic. End rhyme (aka tail rhyme): a rhyme occurring in the terminating word or syllable of one line in a poem with that of another line, as opposed to internal rhyme. End-stopping line Enjambment: incomplete syntax at the end of a line; the meaning runs over from one poetic line to the next, without terminal punctuation. Epigraph: a quotation from another literary work that is placed under the title at the beginning of a poem or section of a poem. Hemistich: a half of a line of verse. Internal rhyme: a rhyme that occurs within a single line of verse, or between internal phrases across multiple lines. Off-centered rhyme: a rhyme that occurs in an unexpected place in a given line. Refrain: repeated lines in a poem. Strophe: the first section of a choral ode", "start_char_pos": 170, "end_char_pos": 170}, {"type": "A", "before": null, "after": "Metrical feet A metrical foot (aka poetic foot) is the basic repeating rhythmic unit that forms part of a line of verse in most Indo-European traditions of poetry. Monosyllable Disyllable: metrical foot consisting of 2 syllables. Iamb (aka iambus)", "start_char_pos": 171, "end_char_pos": 171}, {"type": "R", "before": "or Choreus, choree", "after": "(aka choreus or choree)", "start_char_pos": 193, "end_char_pos": 211}, {"type": "R", "before": "or dibrach", "after": "(aka dibrach)", "start_char_pos": 252, "end_char_pos": 262}, {"type": "A", "before": null, "after": "Trisyllable: metrical foot consisting of 3 syllables.", "start_char_pos": 277, "end_char_pos": 277}, {"type": "R", "before": "or antivdactylus", "after": "(aka antidactylus)", "start_char_pos": 312, "end_char_pos": 328}, {"type": "A", "before": null, "after": ". (Example: \u201cThe Destruction of Sennacherib\u201d by Lord Byron.)", "start_char_pos": 348, "end_char_pos": 348}, {"type": "R", "before": "Amphimacer or cretic", "after": "Cretic (aka amphimacer)", "start_char_pos": 378, "end_char_pos": 398}, {"type": "A", "before": null, "after": ". (Example: modern-day uses can typically be found in expressions like \"In a while, crocodile;\" as well as in slogans and advertising.)", "start_char_pos": 417, "end_char_pos": 417}, {"type": "D", "before": "Ziket:", "after": null, "start_char_pos": 471, "end_char_pos": 477}, {"type": "R", "before": "Tetrasyllables primus", "after": "Bacchius: short-long-long Antibacchius: long-long-short Tetrasyllable: metrical foot consisting of 4 syllables. Tetrabrach (aka proceleusmatic): short-short-short-short Dispondee: long-long-long-long Paeon: a metrical foot of 1 long syllable and 3 short syllables in any order. Primus", "start_char_pos": 478, "end_char_pos": 499}, {"type": "R", "before": "secundus", "after": "Secundus", "start_char_pos": 530, "end_char_pos": 538}, {"type": "R", "before": "tertius", "after": "Tertius", "start_char_pos": 569, "end_char_pos": 576}, {"type": "R", "before": "quartus", "after": "Quartus", "start_char_pos": 607, "end_char_pos": 614}, {"type": "R", "before": "first", "after": "Epitrite: a metrical foot consisting of 3 long syllables and 1 short syllable. First", "start_char_pos": 645, "end_char_pos": 650}, {"type": "R", "before": "second", "after": "Second", "start_char_pos": 682, "end_char_pos": 688}, {"type": "R", "before": "third", "after": "Third", "start_char_pos": 720, "end_char_pos": 725}, {"type": "R", "before": "fourth", "after": "Fourth", "start_char_pos": 757, "end_char_pos": 763}, {"type": "R", "before": "minor ionic , or double iamb", "after": "Ionic: a metrical foot consisting of 2 short and 2 long syllables Minor ionic (aka double iamb)", "start_char_pos": 795, "end_char_pos": 823}, {"type": "R", "before": "major", "after": "Major", "start_char_pos": 848, "end_char_pos": 853}, {"type": "R", "before": "diamb", "after": "Diamb", "start_char_pos": 883, "end_char_pos": 888}, {"type": "R", "before": "ditrochee", "after": "(i.e., two iambs) Ditrochee", "start_char_pos": 913, "end_char_pos": 922}, {"type": "R", "before": "antispast", "after": "(i.e., two trochees) Antispast", "start_char_pos": 977, "end_char_pos": 986}, {"type": "R", "before": "choriamb", "after": "Choriamb", "start_char_pos": 1011, "end_char_pos": 1019}, {"type": "A", "before": null, "after": "(i.e., a trochee/choree alternating with an iamb) Hexasyllable: metrical foot consisting of 6 syllables. Double dactyl Octosyllable: metrical foot consisting of 8 syllables. Decasyllable: metrical foot consisting of 10 syllables. Hendecasyllable: metrical foot consisting of 11 syllables. Dodecasyllable: metrical foot consisting of 12 syllables.", "start_char_pos": 1044, "end_char_pos": 1044}, {"type": "R", "before": "tetrabrach or proceleusmatic: short-short-short-short dispondee: long-long-long-long", "after": "Forms", "start_char_pos": 1045, "end_char_pos": 1129}, {"type": "A", "before": null, "after": "Verse meters In a poetic composition, a verse is formally a single metrical line.", "start_char_pos": 1130, "end_char_pos": 1130}, {"type": "R", "before": "Verse forms 'a Gra' Reformata' Ten stanzas of ABA CD ABA CD ABA CD ABA CD ABA CD ABAC. Following the rhyme scheme of the Villanelle, but with five extra couplets just after each tercet. Ballade: Three stanzas of", "after": "Monometer: a line of verse with just 1 metrical foot. Dimeter: a line of verse with 2 metrical feet. Trimeter: a line of verse with 3 metrical feet. Tetrameter: a line of verse with 4 metrical feet. Hexameter: a line of verse with 6 metrical feet. Heptameter: a line of verse with 7 metrical feet. Octameter: a line of verse with 8 metrical feet. Dactylic meter: any meter based on the dactyl as its primary rhythmic unit. Dactylic tetrameter Dactylic pentameter Dactylic hexameter Golden line Iambic meter: any meter based on the iamb as its primary rhythmic unit. Alexandrine (iambic hexameter): a 12-syllable iambic line adapted from French heroic verse. Example: the last line of each stanza in \u201cThe Convergence of the Twain\u201d by Thomas Hardy. Czech alexandrine French alexandrine Polish alexandrine Fourteener (iambic heptameter): line consisting of 7 iambic feet (14 syllables) Galliambic verse Iambic pentameter: line consisting of 5 iambic feet (10 syllables) Iambic tetrameter: line consisting of 4 iambic feet (8 syllables) Trochaic meter: any meter based on the trochee as its primary rhythmic unit. Trochaic tetrameter Trochaic octameter Trochaic septenarius Arabic poetic meters: Bas\u012b\u1e6d Hazaj K\u0101mil Mutaq\u0101rib Mad\u012bd Rajaz Taw\u012bl W\u0101fir Anapestic tetrameter (aka reverse dactyl): a poetic meter that has 4 anapestic metres per line. Common metre: a quatrain that rhymes", "start_char_pos": 1131, "end_char_pos": 1342}, {"type": "R", "before": "ababbcbC", "after": "abab", "start_char_pos": 1345, "end_char_pos": 1353}, {"type": "R", "before": "followed by a refrain of", "after": "and alternates 4-stress and 3-stress iambic lines. This is the meter used in hymns and ballads. Indian poetic meters: Chhand Kannada meter Mandakranta M\u0101trika Ovi Triveni Sanskrit meter Tamil meter Vedic meter Tri\u1e63\u1e6dubh: a Vedic meter of 44 syllables, or any hymn composed in this meter Long metre (aka long measure): a poetic metre consisting of quatrains (4-line stanzas) in iambic tetrameter with the rhyme pattern", "start_char_pos": 1356, "end_char_pos": 1380}, {"type": "R", "before": "bcbC", "after": "abab", "start_char_pos": 1383, "end_char_pos": 1387}, {"type": "R", "before": "The last line of each, indicated by the capital letter,", "after": "Persian metres Quantitative meter: the dominant metrical system in which the rhythm depends on the length of time it takes to utter a line rather than on the number of stresses. Traditional Welsh", "start_char_pos": 1391, "end_char_pos": 1446}, {"type": "A", "before": null, "after": "Types of verse", "start_char_pos": 1447, "end_char_pos": 1447}, {"type": "A", "before": null, "after": "Accentual verse Accentual-syllabic verse Acatalexis Adonic Aeolic Glyconic: most basic form of aeolic verse. Alcmanian Archilochian Asclepiad", "start_char_pos": 1448, "end_char_pos": 1448}, {"type": "A", "before": null, "after": "Choliamb Dochmiac Doggerel: a bad verse, traditionally characterized by clich\u00e9s, clumsiness, and irregular meter. Free verse and vers libre: an open form of poetry that does not use consistent of meter patterns, rhyme, or any musical pattern, therefore tending to follow the rhythm of natural speech. Knittelvers Heroic verse Riding rhyme: an early form of heroic verse derived from the rhythm of the poetry in parts of The Canterbury Tales depicting the pilgrims as they rode along. Leonine verse McWhirtle Neo-Miltonic syllabics Political verse (aka decapentasyllabic verse): iambic verse of 15 syllables. Saturnian Anu\u1e63\u1e6dubh: a quatrain with each line (called a p\u0101da, or 'foot') having 8 syllables. Shloka Triadic-line", "start_char_pos": 1449, "end_char_pos": 1449}, {"type": "A", "before": null, "after": "Verse forms (A capital letter in any rhyme schemes below indicates a line that", "start_char_pos": 1450, "end_char_pos": 1450}, {"type": "A", "before": null, "after": ") Blank verse: non-rhyming iambic pentameter (10-syllable line). It is the predominant rhythm of traditional English dramatic and epic poetry, as it is considered the closest to English speech patterns. Examples: \"Paradise Lost\" by John Milton and \u201cSunday Morning\u201d by Wallace Stevens.", "start_char_pos": 1473, "end_char_pos": 1473}, {"type": "R", "before": "Five", "after": "five", "start_char_pos": 1487, "end_char_pos": 1491}, {"type": "R", "before": "\".(The capital letters indicate a line repeated verbatim. )", "after": ".\" 'a Gra' Reformata': ten stanzas of ABA CD ABA CD ABA CD ABA CD ABA CD ABAC. Following the rhyme scheme of the Villanelle, but with 5 extra couplets just after each tercet.", "start_char_pos": 1556, "end_char_pos": 1615}, {"type": "D", "before": "Couplet: \"aa\", but usually occurs as \"aa bb cc dd ...\".", "after": null, "start_char_pos": 1653, "end_char_pos": 1708}, {"type": "R", "before": "or", "after": "aka", "start_char_pos": 1726, "end_char_pos": 1728}, {"type": "R", "before": ".", "after": "Kural: Tamil verse form", "start_char_pos": 1781, "end_char_pos": 1782}, {"type": "D", "before": "\"aaaaa...\",", "after": null, "start_char_pos": 1813, "end_char_pos": 1824}, {"type": "R", "before": "Ottava rima:", "after": ". (", "start_char_pos": 1886, "end_char_pos": 1898}, {"type": "R", "before": "abababcc\". Rhyme royal:", "after": "aaaaa...", "start_char_pos": 1901, "end_char_pos": 1924}, {"type": "R", "before": "ababbcc\".", "after": ")", "start_char_pos": 1927, "end_char_pos": 1936}, {"type": "R", "before": "(poetry): Spanish", "after": ": Spanish-origin poem", "start_char_pos": 1996, "end_char_pos": 2013}, {"type": "A", "before": null, "after": ", rhyming the second", "start_char_pos": 2048, "end_char_pos": 2048}, {"type": "A", "before": null, "after": "fourth, and the fifth", "start_char_pos": 2049, "end_char_pos": 2049}, {"type": "A", "before": null, "after": "seventh lines (\"abcbded\")", "start_char_pos": 2051, "end_char_pos": 2051}, {"type": "A", "before": null, "after": "Sestina: a complex French verse form, usually unrhymed, consisting of 6 stanzas of 6 lines each and a 3-line envoi.", "start_char_pos": 2115, "end_char_pos": 2115}, {"type": "D", "before": ")", "after": null, "start_char_pos": 2208, "end_char_pos": 2209}, {"type": "R", "before": "Spenserian stanza: \"ababbcbcc\"", "after": ". Sprung rhythm: a poetic rhythm designed to imitate the rhythm of natural speech", "start_char_pos": 2428, "end_char_pos": 2458}, {"type": "R", "before": "aaaa", "after": "\"aaaa\"", "start_char_pos": 2499, "end_char_pos": 2503}, {"type": "A", "before": null, "after": "/", "start_char_pos": 2564, "end_char_pos": 2564}, {"type": "D", "before": ". Triplet:", "after": null, "start_char_pos": 2567, "end_char_pos": 2577}, {"type": "A", "before": null, "after": "Types of rhyming A rhyme is the repetition of syllables, typically found at the end of a verse line.", "start_char_pos": 2578, "end_char_pos": 2578}, {"type": "A", "before": null, "after": "Assonance (aka vowel rhyme): the repetition of vowel sounds without repeating consonants. Broken rhyme: a type of enjambment producing a rhyme by dividing a word at the line break of a poem to make a rhyme with the end word of another line Catalectic Acephalous line Chiasmus: repetition of any group of verse elements (including rhyme and grammatical structure) in reverse order. Consonance: the repetition of identical or similar consonants in neighboring words whose vowel sounds are different Alliteration: the repetition of initial stressed, consonant sounds in a series of words within a phrase or verse line. Cross rhyme Holorime: identical pronunciation of different lines; in other words, when two entire lines have the same sound Imperfect rhyme (aka half or near rhyme) Monorhyme Pararhyme Perfect rhyme (aka full or exact rhyme) Syllabic", "start_char_pos": 2579, "end_char_pos": 2579}, {"type": "A", "before": null, "after": "Types of stanza A stanza is a group of lines forming the basic recurring metrical unit in a poem. (cf. verse in music.)", "start_char_pos": 2580, "end_char_pos": 2580}, {"type": "A", "before": null, "after": "Alcaic: a 4-line stanza invented by the Classical Greek poet Alcaeus that uses a specific syllabic count per line and a predominantly dactylic meter. Ballad Biolet Burns Chaubola Cinquain Couplet: two successive rhyming lines (", "start_char_pos": 2581, "end_char_pos": 2581}, {"type": "A", "before": null, "after": "aa\"), usually of the same length (usually re-occurring as \"aa bb cc dd ...\"). Doha Heroic couplet: written in iambic pentameter. Poulter's measure: couplets in which a 12-syllable iambic line rhymes with a 14-syllable iambic line. Envoi (or envoy): the brief stanza that ends French poetic forms such as the ballade or sestina. Ghazal Octave: an 8-line stanza or poem. Ottava rima: an Italian stanza of eight 11-syllable lines, with a rhyme scheme of \"abababcc.\" Quatorzain Quatrain: a 4-line poem or stanza Quintain Rhyme royal: a stanza of seven 10-syllable lines, rhyming \"ababbcc.\" Sapphic Sestain Sestet: a 6-line stanza Onegin stanza Spenserian: consists of 9 lines in total\u20148 iambic-pentameter lines and a final alexandrine\u2014with a rhyme scheme of \"ababbcbcc.\" Tercet (or triplet): a unit of three lines, rhymed (\"", "start_char_pos": 2584, "end_char_pos": 2584}, {"type": "A", "before": null, "after": ") or unrhymed", "start_char_pos": 2590, "end_char_pos": 2590}, {"type": "R", "before": "Verbless poetry", "after": "Triolet: an 8-line stanza with only two rhymes, repeating the 1st line as the 4th and 7th lines, and the 2nd line as the 8th (\"ABaAabAB\"). Terza rima: an Italian stanzaic form consisting of tercets with interwoven rhymes (\"aba bcb ded efe...\").", "start_char_pos": 2627, "end_char_pos": 2642}, {"type": "R", "before": "See also Main list:", "after": "Genres", "start_char_pos": 2643, "end_char_pos": 2662}, {"type": "A", "before": null, "after": "Genres by structure", "start_char_pos": 2663, "end_char_pos": 2663}, {"type": "A", "before": null, "after": "Fixed form (French: forme fixe): the three 14th- and 15th-century French poetic forms: Ballade: three 8-line stanzas (\"ababbcbC\") and a 4-line envoi (\"bcbC\"). The last line of the first stanza is repeated verbatim at the end of subsequent stanzas and the envoi. Example: Algernon Charles Swinburne\u2019s translation \u201cBallade des Pendus\u201d by Fran\u00e7ois Villon. Rondeau: a mainly octosyllabic poem consisting of between 10 and 15 lines and 3 stanzas. It has only 2 rhymes, with the opening words used twice as an un-rhyming refrain at the end of the 2nd and 3rd stanzas. Virelai Found poem: a prose text or texts reshaped by a poet into quasi-metrical lines. Haiku: a type of short poem, originally from Japan, consisting of three lines in a 5, 7, 5 syllable pattern.Lanoue, David G. Issa, Cup-of-tea Poems: Selected Haiku of Kobayashi Issa, Asian Humanities English-language haiku: an unrhymed tercet poem in the haiku style. Lekythion: a sequence of seven alternating long and short syllables at the end of a verse. Landay: a form of Afghani folk poetry that is composed as a couplet of 22 syllables. Mukhammas Pantoum: a Malaysian verse form adapted by French poets comprising a series of quatrains, with the 2nd and 4th lines of each quatrain repeated as the 1st and 3rd lines of the next. The 2nd and 4th lines of the final stanza repeat the 1st and 3rd lines of the first stanza. Pastiche Prose: a prose composition that is not broken into verse lines, instead expressing other traits such as symbols, metaphors, and figures of speech. Rondel (or roundel): a poem of 11 to 14 lines consisting of 2 rhymes and the repetition of the first 2 lines in the middle of the poem and at its end. Sonnet: a poem of 14 lines using any of a number of formal rhyme schemes; in English, they typically have 10 syllables per line. Caudate sonnet Crown of sonnets (aka sonnet redoubl\u00e9) Curtal sonnet Petrarchan (or Italian): traditionally follows the rhyme scheme \"abba, abba, cdecde\"; a common variation of the end is \"cdcdcd\", especially within the final 6 lines Shakespearean (or English): follows the rhyme scheme abab, cdcd, efef, gg, introducing a third quatrain (grouping of four lines), a final couplet, and a greater amount of variety with regard to rhyme than is usually found in its Italian predecessors. By convention, sonnets in English typically use iambic pentameter, while in the Romance languages, the hendecasyllable and Alexandrine are the most widely used meters. Sonnet sequence Spenserian sonnet Sijo Stichic: a poem composed of lines of the same approximate meter and length, not broken into stanzas. Syllabic: a poem whose meter is determined by the total number of syllables per line, rather than the number of stresses. Tanka: a Japanese form of five lines with 5, 7, 5, 7, and 7 syllables\u201431 in all. Villanelle: a French verse form consisting of five 3-line stanzas and a final quatrain, with the first and third lines of the first stanza repeating alternately in the following stanzas.", "start_char_pos": 2664, "end_char_pos": 2664}, {"type": "A", "before": null, "after": "Genre by form/presentation", "start_char_pos": 2665, "end_char_pos": 2665}, {"type": "A", "before": null, "after": "Abecedarian: a poem in which the first letter of each line or stanza follows sequentially through the alphabet. Acrostic: a poem in which the first letter of each line spells out a word, name, or phrase when read vertically. Example: \u201cA Boat beneath a Sunny Sky\u201d by Lewis Carroll. Concrete (aka pattern): a written poem or verse whose lines are arranged as a shape/visual image, usually of the topic. Slam Sound Spoken-word Verbless poetry: a poem without verbs", "start_char_pos": 2666, "end_char_pos": 2666}, {"type": "A", "before": null, "after": "Thematic genres", "start_char_pos": 2667, "end_char_pos": 2667}, {"type": "A", "before": null, "after": "Ars Poetica: a poem that explains the 'art of poetry', or a meditation on poetry using the form and techniques of a poem. Aubade: a love poem welcoming or lamenting the arrival of the dawn. Example: \u201cThe Sun Rising\u201d by John Donne. Deep image Didactic Dramatic monologue Epithalamium (aka epithalamion): a nuptial poem in honour of the bride and bridegroom. Ecopoetry Ekphrasis: a poem that vividly describes a scene or work of art. Elliptical Epigram Folk Folk ballad Gnomic: a poems laced with proverbs, aphorisms, or maxims. Hymn: a poem praising God or the divine (often sung). Lament: any poem expressing deep grief, usually at a death or some other loss. Dirge Elegy: a poem of lament, praise, and consolation, usually formal and sustained, over the death of a particular person. Example: \"Elegy Written in a Country Churchyard\" by Thomas Gray. Light: whimsical poems Limerick Nonsense Double dactyl Lyric Canzone: a lyric poem originating in medieval Italy and France and usually consisting of hendecasyllabic lines with end-rhyme. Epithalamium Madrigal: a song or short lyric poem intended for multiple singers. Ode: a formal lyric poem that addresses, and typically celebrates, a person, place, thing, or idea. Horatian Ode Palinode: an ode that retracts or recants what the poet wrote in a previous poem. Pindaric Ode Sapphic ode Stev: a form of Norwegian folk song consisting of quatrain lyric stanzas. Meditative Narrative Ballad: a popular narrative song passed down orally. In English, it typically follows a form of rhymed (\"abcb\") quatrains alternating 4-stress and 3-stress lines. Folk ballad: unknown origin, recounting tragic, comic, or heroic stories with emphasis on a central dramatic event. Examples: \"Barbara Allen\" and \"John Henry\" Literary ballad: poems adapting the conventions of folk ballads, beginning in the Renaissance. Examples: \u201cLa Belle Dame sans Merci\u201d by John Keats and \u201cAnnabel Lee\u201d by Edgar Allan Poe. Epic (or epos): an extended narrative poem, typically expressing heroic themes. Mock-epic: a poem that plays with the conventions of the epic to comment on a topic satirically. Epyllion: a brief narrative work written in dactylic hexameter, commonly dealing with mythological themes and characterized by vivid description and allusion. Romance Occasional: a poem written to describe or comment on a particular event. Panegyric: a poem of great praise. Pastoral Eclogue: a pastoral poem usually containing dialogue between shepherds. Georgic Recusatio: a poem (or part thereof) in which the poet claim that they are supposedly unable or disinclined to write the type of poem that they originally intended to, and instead writes in a different style.", "start_char_pos": 2668, "end_char_pos": 2668}, {"type": "A", "before": null, "after": "Movements", "start_char_pos": 2669, "end_char_pos": 2669}, {"type": "A", "before": null, "after": "Avant-garde Flarf Futurist Language Beat: A movement that arose from San Francisco\u2019s literary counterculture in the 1950s. Its poetry is primarily free verse, often surrealistic, and influenced by the cadences of jazz music. Black Mountain: A group of progressives in North Carolina associated with the experimental Black Mountain College in the 1940s and 1950s. Its poetic composition promoted a nontraditional style, following a improvisational, open-form approach, driven by the natural patterns of breath and the spoken word. Confessional Dada Dark Room Collective Fireside Fugitives Georgian Harlem Renaissance Imagism Metaphysical N\u00e9gritude New American New Critic New Formalist New Historicist New York School Objectivist Oulipo Pre-Raphaelite Romantic Symbolist", "start_char_pos": 2670, "end_char_pos": 2670}, {"type": "A", "before": null, "after": "Other poetic devices", "start_char_pos": 2671, "end_char_pos": 2671}, {"type": "A", "before": null, "after": "Allusion: a brief, intentional reference to a historical, mythic, or literary person, place, event, or movement; in other words, a figure of speech using indirect reference.\" Anacrusis: brief introduction. Anaphora: the repetition of a word or words at the beginning of successive phrases, clauses, or lines to give emphasis. Apostrophe: an address to a dead or absent person, or personification as if that person were present. Example: \"O Captain! My Captain!\" by Walt Whitman. Blason: describes the physical attributes of a subject, usually female. Circumlocution: a roundabout wording. Example: In \"Kubla Khan\" by Samuel Taylor Coleridge\u2014\u201ctwice five miles of fertile ground\u201d (i.e., 10 miles). Epistrophe (aka epiphora): the repetition of a word or expression at the end of successive phrases or verses. Epizeuxis: the immediate repetition of a word or phrase for emphasis. Metaphor: a rhetorical figure of speech marked by implicit comparison, rather than direct or explicit comparison like in a simile. In a metaphor, the tenor is the subject to which attributes are ascribed (i.e., the target); the vehicle is the subject from which the attributes are derived/borrowed (i.e., the source); and ground is the shared properties between the two.Cuddon, J. A. (1998) \"Tenor and vehicle.\" In A Dictionary of Literary Terms and Literary Theory (4th ed.). Oxford", "start_char_pos": 2672, "end_char_pos": 2672}, {"type": "A", "before": null, "after": "Malden, MA: Blackwell. p. 904 Conceit: a typically unconventional, logically complex, or surprising metaphor whose appeal is more intellectual than emotional. Extended metaphor (aka sustained metaphor): the exploitation of a single metaphor or analogy at length through multiple linked tenors and vehicles throughout a poem. Allegory: an extended metaphor in which the characters, places, and objects in a narrative carry figurative meaning. Often, the meaning of an allegory is religious, moral, or historical in nature. Example: \"The Faerie Queene\" by Edmund Spenser. Periphrasis: the usage of multiple separate words to carry the meaning of prefixes, suffixes or verbs. Objective correlative Simile: a figure of speech that directly/explicitly compares two things. Homeric simile (aka epic simile) Syzygy: the combination of 2 metrical feet into a single unit, similar to an elision.", "start_char_pos": 2673, "end_char_pos": 2673}, {"type": "A", "before": null, "after": "Theory", "start_char_pos": 2674, "end_char_pos": 2674}, {"type": "A", "before": null, "after": "Descriptive poetics Historical poetics Negative capability Pathetic fallacy Poetic diction Poetic license Porson's Law Resolution: the phenomenon of replacing a long syllable with 2 short syllables. Robert Bridges's theory of elision Scansion Sievers's theory of Anglo-Saxon meter Theopoetics Weak position", "start_char_pos": 2675, "end_char_pos": 2675}, {"type": "A", "before": null, "after": "See also Poetry Poet", "start_char_pos": 2676, "end_char_pos": 2676}, {"type": "A", "before": null, "after": "Literature", "start_char_pos": 2705, "end_char_pos": 2705}, {"type": "D", "before": "Literature Poet Poetry", "after": null, "start_char_pos": 2729, "end_char_pos": 2751}, {"type": "A", "before": null, "after": "Oxford", "start_char_pos": 2866, "end_char_pos": 2866}, {"type": "R", "before": "2004. . Chris Baldick. The Concise Oxford", "after": "2001. . \u2014\u2014 The Concise", "start_char_pos": 2917, "end_char_pos": 2958}, {"type": "R", "before": "2001.", "after": "2004.", "start_char_pos": 3009, "end_char_pos": 3014}], "sents_char_pos": [0, 160, 173, 213, 233, 264, 285, 330, 360, 400, 427, 452, 477, 506, 545, 583, 621, 660, 698, 735, 1217, 1316, 1390, 1472, 1558, 1634, 1652, 1754, 1801, 1911, 1936, 1957, 1975, 2114, 2252, 2314, 2626, 2781, 2811, 2853, 2896, 2909, 2939, 2988, 3001, 3045, 3083, 3125, 3157, 3222, 3252, 3301, 3345, 3378, 3440, 3475, 3553, 3587, 3650, 3688, 3714, 3759, 3817, 3848, 3894, 3951, 3964, 4024, 4059, 4105, 4139, 4150, 4190, 4243, 4299, 4329, 4371, 4416, 4454, 4561]}
+{"doc_id": "44823474", "revision_depth": "1", "before_revision": " \" Manuscript\" is a broad concept in publishing, that can refer to one or both of the following: the formatting of a short story manuscript, an accepted manuscript (by its merit, not its format), not yet in a final format (but reviewed), published with non-final-format in advance , as preprint. A manuscript is the work that an author submits to a publisher, editor, or producer for publication. Even with the advent of desktop publishing , making it possible for anyone to prepare text that appears professionally typeset, many publishers still require authors to submit manuscripts within their respective guidelines. Manuscript format Although publishers guidelines for formatting are the most critical resource for authors, style guides are also key references for authors preparing manuscripts since \"virtually all professional editors work closely with one of them in editing a manuscript for publication.\" Manuscript formatting (also named standard manuscript format) depends greatly on the type of work that is being written, as well as the individual publisher, editor or producer. Writers who intend to submit a manuscript should determine what the relevant writing standards are, and follow them. Individual publishers' standards will take precedence over style guides. Preprint An ordinary manuscript only becomes a \"publisher's preprint\" if it somehow gets distributed beyond the authors (or the occasional colleague whom they ask for advice) , but the \" publisher \" here is a loose concept. Illustrating: In a peer review context: if an author prepares a manuscript on their computer and submit it to a publisher for review , and the submission is not accepted, there never was any \"publisher's preprint\". In a web context (legal/cultural authorship): if an author needs to ensure authorship, they can use a repository to upload a version of their publication before full publication. In this context, web-publishing is not the only alternative , it is possible to use a legal deposit of the manuscript. In both contexts, a future \"final print\" is planned \u2013 with better layout, proofreading and some kind of prepress proofing \u2013 that will replace the \"preprinted manuscript\" .", "after_revision": "A manuscript is the work that an author submits to a publisher, editor, or producer for publication. In publishing, \" manuscript\" can also refer to one or both of the following: the format standard for a short story manuscript, an accepted manuscript , reviewed but not yet in a final format , distributed in advance as a preprint. Manuscript format Even with desktop publishing making it possible for writers to prepare text that appears professionally typeset, many publishers still require authors to submit manuscripts formatted according to their respective guidelines. Manuscript formatting varies greatly depending on the type of work, as well as the particular publisher, editor or producer. Writers who intend to submit a manuscript should determine what the relevant writing standards are, and follow them. Although publishers \u2019 guidelines for formatting are the most critical resource for authors, style guides are also key references since \"virtually all professional editors work closely with one of them in editing a manuscript for publication.\" Nonetheless, individual publishers' standards always take precedence over style guides. As formatting of a short story is considered the most general rubric for manuscript submissions, it is referred to as the standard manuscript format and is easily distinguishable from most published material. Preprint An ordinary manuscript only becomes a \"publisher's preprint\" if it somehow gets distributed beyond the authors (or the occasional colleague whom they ask for advice) . A future \"final print\" must be planned \u2013 with better layout, proofreading, prepress proofing, etc. \u2013 that will replace the \" preprinted manuscript \" . In a peer review context: if an author prepares a manuscript on their computer and submits it to a publisher for review but it is not accepted, there cannot be a \"publisher's preprint\". In a web context (legal/cultural authorship): to demonstrate authorship, an author can upload a version of their work to a repository before full publication. Note that an alternative could be to use a legal deposit .", "edit_actions": [{"type": "A", "before": null, "after": "A manuscript is the work that an author submits to a publisher, editor, or producer for publication. In publishing,", "start_char_pos": 0, "end_char_pos": 0}, {"type": "R", "before": "Manuscript\" is a broad concept in publishing, that can", "after": "manuscript\" can also", "start_char_pos": 3, "end_char_pos": 57}, {"type": "R", "before": "the formatting of", "after": "the format standard for", "start_char_pos": 97, "end_char_pos": 114}, {"type": "R", "before": "(by its merit, not its format), not", "after": ", reviewed but not", "start_char_pos": 164, "end_char_pos": 199}, {"type": "R", "before": "(but reviewed), published with non-final-format in advance , as", "after": ", distributed in advance as a", "start_char_pos": 222, "end_char_pos": 285}, {"type": "R", "before": "A manuscript is the work that an author submits to a publisher, editor, or producer for publication. Even with the advent of desktop publishing ,", "after": "Manuscript format", "start_char_pos": 296, "end_char_pos": 441}, {"type": "A", "before": null, "after": "Even with desktop publishing", "start_char_pos": 442, "end_char_pos": 442}, {"type": "R", "before": "anyone", "after": "writers", "start_char_pos": 466, "end_char_pos": 472}, {"type": "R", "before": "within", "after": "formatted according to", "start_char_pos": 586, "end_char_pos": 592}, {"type": "R", "before": "Manuscript format", "after": "Manuscript formatting varies greatly depending on the type of work, as well as the particular publisher, editor or producer. Writers who intend to submit a manuscript should determine what the relevant writing standards are, and follow them.", "start_char_pos": 622, "end_char_pos": 639}, {"type": "A", "before": null, "after": "\u2019", "start_char_pos": 660, "end_char_pos": 660}, {"type": "D", "before": "for authors preparing manuscripts", "after": null, "start_char_pos": 768, "end_char_pos": 801}, {"type": "R", "before": "Manuscript formatting (also named standard manuscript format) depends greatly on the type of work that is being written, as well as the individual publisher, editor or producer. Writers who intend to submit a manuscript should determine what the relevant writing standards are, and follow them. Individual", "after": "Nonetheless, individual", "start_char_pos": 916, "end_char_pos": 1221}, {"type": "R", "before": "will", "after": "always", "start_char_pos": 1244, "end_char_pos": 1248}, {"type": "A", "before": null, "after": "As formatting of a short story is considered the most general rubric for manuscript submissions, it is referred to as the standard manuscript format and is easily distinguishable from most published material.", "start_char_pos": 1284, "end_char_pos": 1284}, {"type": "R", "before": ", but", "after": ". A future \"final print\" must be planned \u2013 with better layout, proofreading, prepress proofing, etc. \u2013 that will replace", "start_char_pos": 1460, "end_char_pos": 1465}, {"type": "R", "before": "publisher", "after": "preprinted manuscript", "start_char_pos": 1472, "end_char_pos": 1481}, {"type": "R", "before": "here is a loose concept. Illustrating:", "after": ".", "start_char_pos": 1484, "end_char_pos": 1522}, {"type": "R", "before": "submit", "after": "submits", "start_char_pos": 1606, "end_char_pos": 1612}, {"type": "R", "before": ", and the submission", "after": "but it", "start_char_pos": 1642, "end_char_pos": 1662}, {"type": "R", "before": "never was any", "after": "cannot be a", "start_char_pos": 1686, "end_char_pos": 1699}, {"type": "R", "before": "if an author needs to ensure authorship, they can use a repository to", "after": "to demonstrate authorship, an author can", "start_char_pos": 1770, "end_char_pos": 1839}, {"type": "R", "before": "publication", "after": "work to a repository", "start_char_pos": 1866, "end_char_pos": 1877}, {"type": "R", "before": "In this context, web-publishing is not the only alternative , it is possible", "after": "Note that an alternative could be", "start_char_pos": 1903, "end_char_pos": 1979}, {"type": "D", "before": "of the manuscript.", "after": null, "start_char_pos": 2003, "end_char_pos": 2021}, {"type": "D", "before": "In both contexts, a future \"final print\" is planned \u2013 with better layout, proofreading and some kind of prepress proofing \u2013 that will replace the \"preprinted manuscript\"", "after": null, "start_char_pos": 2022, "end_char_pos": 2191}], "sents_char_pos": [0, 295, 396, 621, 915, 1093, 1210, 1283, 1508, 1723, 1902, 2021]}
+{"doc_id": "45422937", "revision_depth": "1", "before_revision": "Finlay Forks was an important & Hudson's Bay Company fur trading post and settlement in northern British Columbia, located at the confluence of the Finlay River and Parsnip River . , & & & & & & Raymond M. Patterson. 1968. Finlay's River. New York: W. Morrow. Chapter 6. 55\u00b0 59' 0\" North, 123\u00b0 50' 0\" West. In 1915, there were about 35 settlers . ( Fort George Herald, 9 Oct 1915 ) In 1916, a reserve of the Fort Grahame band of Sekani was established nearby & & & & & & & & & & & . Since the construction of the& & & & & & & & & & & & W. A. C. Bennett Dam in & 1968 it has lain under the waters of Williston Lake.& References Category: Hudson's Bay Company for", "after_revision": "Finlay Forks (also called Finlay Junction), is the confluence of the Finlay River and Parsnip River. The Finlay Bay Recreation Site,Prince George Citizen, 11 Mar URL on the southeast bank, is about two miles southeast of the former settlement (on the earlier southeast bank) that is now submerged beneath Williston Lake. Like the river, it is named after explorer John Finlay.Prince George Citizen, 27 Jul 1983 The access road from Mackenzie is called the Parsnip West FSR (formerly Finlay Forks Road and Parsnip Forest Road).Prince George Citizen: 19 Mar 1973, 18 May 1979; 19, 21 Nov 1980 History Waterways Trails The first European explorers travelling through the Forks were Alexander Mackenzie in 1793, and Simon Fraser in 1805.Prince George Citizen, 26 May 1938 Aboriginal trails laced the valleys for thousands of years. With the Klondike Gold Rush, the Canadian government sought to identify safe overland routes for prospectors to reach the Yukon from Edmonton. As water transport could be expensive, these were intended as wagon trails. The initial NWMP Trail, surveyed during 1897-98 by Inspector J.D. Moodie with First Nations guides, passed along the northeast bank of the Forks.Sherry, Erin Cadden, Veronica. (2008). Documenting and Interpreting the History and Significance of the North West Mounted Police Peace-Yukon Historic Trails. Inter-Agency Management Committee, Northern Interior Region. Preface& p. 40 URL Hordes coming from the south would join the trail here.Prince George Citizen, 25 May 1939 Prospectors also passed through the vicinity on their way to gold rushes at Barkerville (1860s), Omineca (1871-72), and McConnell Creek (1907-08).Prince George Citizen, 17 May 1928 During the ice-free months, passenger and freight vessels regularly ran between Summit Lake and Hudson's Hope via the Crooked River, the Parsnip River, Finlay Forks, and the Peace River.Fort George Tribune, 27 Jun 1914Fort George Herald, 9 Oct 1915Prince George Citizen: 23 Jul 1920; 6 Aug 1920; 3 , 24 30 Sep 1920;& 14 Apr 1938 However, low water levels would shorten the navigation season.Prince George Citizen, 29 Jun 1944 Four of the potential sites for the W. A. C. Bennett Dam were at the western end of the Peace River canyon near the Forks.Prince George Citizen, 28 Apr 1958 Originally, the dam and powerhouse were planned for the Finlay Forks-Wicked River (7 miles east) location. On drilling down 400 feet in the middle of the Peace River, the failure to reach solid rock identified an unbridgeable crevice.Prince George Citizen, 21 May 1991 By the summer of 1969, the T-shaped reservoir was 80-percent full.Prince George Citizen, 7 Jul 1969 The combination of high waves and floating logs could make Williston Lake treacherous, with at least eight persons missing and believed drowned in the lake during 1970-85. The worst area is at Finlay Forks, where the wind can come from north, south, east or west.Prince George Citizen, 28 Aug 1985 Road& Rail Proposals The joint Peace Pass/Finlay Forks proposals form part of the Pine Pass highway and railway developments. In 1913, Premier McBride envisaged a PGE Alaskan rail route passing through the Forks.Prince George Citizen, 16 Feb 1928 In the late 1920s, Mr. Armishaw sought to establish a trail southwest to Manson Creek.Prince George Citizen, 13 Oct 1927 A rail line from the Forks to the Ferguson mine in the Ingenika was proposed. Charter flights from Prince George to this mine were taking less than two hours to what had previously been a week by water and land.Prince George Citizen, 13 Jun 1929 The 1930s survey for Route B of the proposed Alaska Highway, which was promoted as the Canadian preference, was via this locality.Prince George Citizen: 4 Sep 1930, 17 Feb 1938, 5 May 1938, 17 Nov 1938, 29 Dec 1938, 9 Feb 1939, 18 May 1939,& 17 24 Jul 1941 By 1935, the leaning was for a Prince George-Finlay Forks road via Summit Lake rather than Manson Creek,Prince George Citizen: 27 Jun 1935& 15 Jun 1939 however this choice was not universal,Prince George Citizen: 4 Jun 1936, 2 Apr 1942, 23 Jul 1942, 1& 22 Jul 1943 and further surveys ensued.Prince George Citizen, 6 May 1943 The latter, known as the Turgeon Highway, did not reach Manson Creek until 1939. The project required a further 40 miles of heavy construction if extended to Finlay Forks,Prince George Citizen: 18 Mar 1937, 27 May 1937, 29 Jul 1937, 26 Aug 1937 26 Oct 1939 and progress was long delayed.Prince George Citizen: 8 Jun 1944, 7 Jun 1945, 21 Mar 1946, 26 Sep 1946, 3 Feb 1949, 24 Mar 1949, 16& 23 Jun 1949, 24 Aug 1950, 23 Dec 1957 A PGE link to a possible Alaskan rail route continued to include Finlay Forks.Prince George Citizen: 25 Nov 1948, 3 Mar 1949, 1 Sep 1949 31 Aug 1953 In 1965, an access road north from Highway 97 reached the settlement and construction commenced on the Manson Creek link.Prince George Citizen, 30 Mar 1965 A three-times-weekly road freight service with Prince George was soon implemented.Prince George Citizen, 13 Sep 1965 The 1966 PGE spur covered only the 23 miles to Mackenzie. Community Established in URL the location was an important Hudson's Bay Company fur trading post and settlement. Raymond M. Patterson. 1968. Finlay's River. New York: W. Morrow. Chapter 6. Two general stores opened in 1913.Fort George Tribune, 20 Jun 1914 That year, the residents formed a community association and petitioned the postal authorities to rename the location as \u2018Finparpea\u2019, compiled from the first three letters of the three rivers. World War I superseded any action, and few returned to their holdings after the conflict.Prince George Citizen, 17 May 1928 In 1915, there were about 35 settlers , Fort George Herald, 9 Oct 1915 and the following year, the Fort Grahame band of Sekani established a reserve nearby. William Fox, the Hudson\u2019s Bay factor (mercantile agent),Prince George Citizen, 14 May 1925 was the inaugural postmaster (1916-18), with mail deliveries eight times each year.Prince George Citizen, 31 May URL During the 1920s, the nucleus of a potential town comprised a few scattered cabins,Prince George Citizen, 7 Jul 1922 with Ole Johnson offering visitor accommodation.Prince George Citizen, 19 Jul 1928 In 1912, Louis Peterson took up the first pre-emption at the Forks,Prince George Citizen, 17 May 1928 was postmaster URL and ran a trading store until his death at about 81.Prince George Citizen, 1 Jun 1933 The remaining storekeeper,Prince George Citizen, 19 Apr 1934 Alan (alternatively Alex) McKinnon, was also a fur trader,Prince George Citizen, 28 Jul 1938 postmaster (1920-25; URL and a mine owner.Prince George Citizen, 5 Sep 1940 Replenishing his supplies in the summer of 1940, he trucked the 50-ton load from Prince George to Summit Lake, from where it was boated to the Forks.Prince George Citizen, 13 Jun 1940 The annual fur auction held at Finlay Forks, comprised many trappers and drew in commercial buyers.Prince George Citizen: 22 May 1941, 19 Mar 1942, 18 May 1944& 16 May 1946 By the 1950s, the Caucasian population numbered four, two of whom were Roy& Marge MacDougall, who ran the trading post and provided visitor accommodation. Marge was also the volunteer first aid attendant for the Sekani and passing itinerants.Prince George Citizen, 27 Oct 1952 Arriving in the 1920s, the couple farmed,Prince George Citizen, 21 Jun 1928 to 9 Aug 1928 and Marge served as postmaster (1943-46, URL They sold up in 1957,Prince George Citizen, 28 Feb 1957 and Roy lived to 97.Prince George Citizen, 23 Nov 1984 The post-office closed in URL In 1967, a one-roomed school opened.Prince George Citizen, 29 Dec 1967 During the following summer, Bud Stuart operated a coffee shop and general store from a tentPrince George Citizen, 14 Jun 1968 that evolved into permanent premises.Prince George Citizen: 13 Jun 1969& 13 Aug 1969 The school was a challenge for maintenance crews, being at the northern tip of School District 57.Prince George Citizen, 7 Jan 1969 Closing in 1971, the three portable buildings were removed.Prince George Citizen, 3 Dec 1971 By 1973, Bill Bloor ran the general store.Prince George Citizen, 17 Jan 1973 The Finlay Bay Cabins,Prince George Citizen, 15 Sep 1994 operated by Kelly Brothers, no longer exist. Communications& Air Services Communications with Prince George were slow, because mail travelled a circuitous route east via Hudson\u2019s Hope, Edmonton, and west toward Prince George. The residents appealed for a direct route through Summit Lake, at least during the summer months.Prince George Citizen, 14 Jun 1928 The rivers covered with floating ice, the ballot box for an election was parachuted from a plane. The mere 13 names on the electoral roll signified an expensive exercise in democracy.Prince George Citizen, 2 Nov 1933 The locked ballot box took 15 days to reach Hudson\u2019s Hope, from where the mail would take a further 10 days to reach Prince George.Prince George Citizen, 23 Nov 1933 By the 1950s, the arrival of the ballot box, containing two votes, delayed the final count.Prince George Citizen, 31 Dec 1953 In 1936, a shortwave radiotelephone station opened, which operated in conjunction with a series of similar stations in northern BC and the Yukon.Prince George Citizen: 30 Apr 1936, 27 Aug 1936& 24 Sep 1936 The following year, United Air Transport (UAT) inaugurated a scheduled monthly passenger/freight/mail service for nine months of the year.Prince George Citizen: 10& 24 Jun 1937; 12, 19& 26 May 1938;& 23 Jun 1938 A half-gallon ice cream consignment was the first occasion it was served in the community.Prince George Citizen, 22 Jul 1937 By 1938, the dominion postal inspector\u2019s annual visit to Finlay Forks and the surrounding post-offices took five days by air, compared with the previous 40 days by boat.Prince George Citizen, 17 Mar 1938 UAT, renamed Yukon Southern Air Transport (YSAT), scheduled a Christmas mail run.Prince George Citizen, 24 Dec 1940 Moving under the joint control of YSAT and Canadian Airways in 1941,Prince George Citizen, 6 Mar 1941 the passenger/mail runs continued monthly.Prince George Citizen: 28 Nov 1946, 20 Mar 1947& 10 Jul 1947 By the 1950s, Central B.C. Airways carried the nine mail deliveries for the year, the radiotelephone station had become redundant and closed, and the community\u2019s two-way radio was dependent upon weather conditions.Prince George Citizen, 27 Oct 1952 When a plane crashed on making an emergency landing near Finlay Forks in 1950, the pilot and the three passengers survived.Prince George Citizen, 31 Aug 1950 Santa would come by plane, but sometimes the weather delayed the event until after Christmas.Prince George Citizen, 30 Dec 1952 With flight cancellations, several months of newspapers might arrive together.Prince George Citizen: 12 Jan 1953& 21 Jan 1954 The Pacific Western Airlines Prince George-Fort St. John run, which commenced in 1957, provided the irregular passenger, freight and mail service to the Forks.Prince George Citizen: 17 Oct 1957& 20 Jun 1962 Months later, the ballot box travelled by helicopter.Prince George Citizen, 28 Mar 1958 In 1995, when an amphibian plane crashed shortly after takeoff from Finlay Bay, the three occupants escaped uninjured.Prince George Citizen, 21 Aug 1995 The Finlay Bay Water Aerodrome (CAK8) was later URL Law Enforcement In 1924, Constable Muirhead became the inaugural provincial police constable in residence,Prince George Citizen, 16 Oct 1924 and mushed over 500 miles to spend Christmas in Prince George. Although federal police questioned the adequacy of provincial policing in the area,Prince George Citizen, 8 Jan 1925 a permanent police presence was limited to the 1920s . In 1930, A. J. Jank was appointed game warden for the Finlay River district, with his headquarters in the forestry cabin at Finlay Forks.Prince George Citizen, 27 Nov 1930 Vic Williams replaced him the following year.Prince George Citizen: 27 Aug 1931& 25 Aug 1932 Vic and a colleague rescued two men from a capsized boat in the Finlay Rapids, but a third person drowned.Prince George Citizen, 15 Sep 1932 In 1933, he was appointed coroner in conjunction with his ten-month-each-year game warden role.Prince George Citizen, 22 Jun 1933 During the late 1930s, A.J. Jank,Prince George Citizen, 1 Apr 1937 and Sidney G. Copeland,Prince George Citizen, 6 Jul 1939 held the game warden position. In 1940, Sidney apprehended Edward Bird (alias Byrde) at Deserter\u2019s Canyon on a charge of bigamy and surrendered him to a police constable for escorting to Prince George.Prince George Citizen: 30 May 1940& 18 Jul 1940 In 1944, after a social confrontation, Alex Prince murdered trappers Eugene Messmer, 33, and then Hans Pfeuffer, 43, at their cabin in the vicinity. Found in Prince\u2019s cabin were Messmer\u2019s gold watch, handmade briefcase, rifle, valuable cameras, film, stolen furs and fur stretchers. Based on this evidence, Game Warden A.J. Jank executed an arrest on separate charges. The coroner\u2019s court reached an open verdict.Prince George Citizen: 16& 24 Mar 1944;& 6 Apr 1944 Alex Prince, Sekani First Nations, 21, stood trial,Prince George Citizen, 14 Sep 1944 but damaging inadmissible statements made by a witness prompted a mistrial.Prince George Citizen, 28 Sep 1944 At his retrial, Prince was found guilty of murdering Messmer and a stay of proceedings was entered in a second murder charge in the death of Pfeuffer.Prince George Citizen, 7 Jun 1945 After an unsuccessful appeal on the grounds of diminished capacity, he was hanged.Prince George Citizen, 8 Nov 1945 In 1964 and 1965, rifle shots wounded separate members of the Poole family on the Finlay Forks reserve.Prince George Citizen: 28 Aug 1964, 30 Apr 1965& 3 May 1965 In a 1968 shooting incident at a family reunion, May Egnell died, and another woman and boy were injured. The incident arose after a verbal exchange during an intoxicated episode. While Joe Egnell, husband of the deceased was in a physical altercation with Murphy Porter, their wives May and Mary, and Bessie Tomah, were fighting. Although May had pulled a knife, Bessie, 26, was found guilty of manslaughter and received a three-year sentence.Prince George Citizen, 14& 16 Aug 1968;& 14, 15& 19 Nov 1968 In 1948, Joe Egnell\u2019s father, McDonald, and youngest brother, Tony, died, the former of exposure and the latter of pneumonia. His mother trekked 80 miles in cold winter weather to bring her two children to safety. Game Warden A. J. Jank and Const. Lyle Oleson conducted the investigation, and Frank identified his father\u2019s body.Prince George Citizen: 18 Mar 1948& 11 Dec 1999 In 1971, Frank Egnell, 43, shot Keon Pierre, 56, following an argument at Finlay Forks. Convicted of manslaughter, he was sentenced to two years less a day.Prince George Citizen, 10 Dec 1971 Mining& Farming A great deal of mining occurred in the surrounding mountains, rivers and creeks.Fort George Tribune, 20 Jun 1914Prince George Leader, 16 Jun 1922Prince George Leader, 14 Jul 1922 The increasing market for produce was anticipated to expand farming in the immediate area.Prince George Citizen: 17 May 1928& 22 Nov 1928 Larry Canty acquired 20,000 acres in 1929 for agricultural development.Prince George Citizen, 7 Mar 1929 However, the lack of rail lines and roads hampered mining activities.Prince George Citizen: 17 Feb 1938, 19 Oct 1939, 25 Jul 1940, 17 Apr 1941, 16 Jul 1951, 30 Oct 1952, 8 Dec 1952, 8 Dec 1952& 15 Apr 1954 The 1957 site selection for the W. A. C. Bennett Dam confirmed the flooding would submerge many mining and industrial development properties.Prince George Citizen, 7 Mar 1957 Forestry By the mid-1910s, the BC forestry department maintained a headquarters at Finlay Forks,Prince George Star, 10 Nov 1916 which in due course served a fire ranger role.Prince George Citizen, 7 Jul 1922 The forest ranger station operated after World War II,Prince George Citizen, 17 Jun 1948 and an assistant ranger station was built in 1964.Prince George Citizen, 3 May 1985 In the mid-1960s, logging contracts were let for those valleys north, south and east of the Forks, which would be flooded by the dam.Prince George Citizen: 3& 6 Apr 1963 Donald Adems (Adams alternate spelling), a forestry service engineer on the project, had been the first Caucasian child to live at Finlay Forks.Prince George Citizen, 8 Jul 1964 Further contracts were let for the clearing and burning of inferior timber.Prince George Citizen, 22 Mar 1965 Several portable sawmills began operations.Prince George Citizen, 30 Mar 1965 Carrier Lumber and Cattermole Timber adopted new ideas such as felling on the ice and sorting later.Prince George Citizen, 3 May 1985 The latter was located on the west bank of the Parsnip River, two miles south, and was accessed by an ice-bridge.Under These Waters, p. 20 Fires completely gutted its 50,000-foot capacity McLean Lake Mill,Prince George Citizen, 14 Apr 1965 and the Courhon Sawmill on Scott Creek at mile 56 of the access road. A forest fire at Mile 43 threatened another mill.Prince George Citizen, 14 May 1965 Temporary work camps were at Miles 49 and 73.Under These Waters, pp. 23-37 The forest service established a centre of operations at Finlay Forks. Rising faster than anticipated, the dammed waters created vast logjams and half-submerged trees.Prince George Citizen, 14 Jun 1968 In this environment, two tugboat companies and about 25 private logging contractors conducted one of the largest timber salvage operations in North America. At the Forks, Finlay Navigation operated a dispatch base, and Carrier Lumber a sawmill.Prince George Citizen, 7 Jul 1969 Sheriffs\u2019 sales of assets occurred to settle unpaid wages of Yarkon Industries and workers compensation liabilities of Ashlea Timber at Mile 74\u00bd.Prince George Citizen: 12, 14& 20 Aug 1969 In 1969, the bush mills disappeared from the pondage area and the first log boom reached Mackenzie from the Finlay drainage.Prince George Citizen, 3 May 1985 By 1971, further timber salvaging became uneconomical,Prince George Citizen, 8 Feb 1971 and Carrier relocated all its operations from Finlay Forks to Mackenzie.Prince George Citizen, 1 May 1999 Footnotes References URL Unrau, Norman (2001). Under These Waters Williston Lake: Before it Was. Self-published. . URL Category:Ghost towns in British Columbia Category:Defunct seaplane bases in British Columbia Category: Northern Interior of British Columbia Category:Omineca Mountains Category: Hudson's Bay Company forts Category:Sekani peopl", "edit_actions": [{"type": "R", "before": "was an important", "after": "(also called Finlay Junction), is the confluence of the Finlay River and Parsnip River. The Finlay Bay Recreation Site,Prince George Citizen, 11 Mar URL on the southeast bank, is about two miles southeast of the former settlement (on the earlier southeast bank) that is now submerged beneath Williston Lake. Like the river, it is named after explorer John Finlay.Prince George Citizen, 27 Jul 1983 The access road from Mackenzie is called the Parsnip West FSR (formerly Finlay Forks Road and Parsnip Forest Road).Prince George Citizen: 19 Mar 1973, 18 May 1979;", "start_char_pos": 13, "end_char_pos": 29}, {"type": "A", "before": null, "after": "19, 21 Nov 1980", "start_char_pos": 30, "end_char_pos": 30}, {"type": "A", "before": null, "after": "History Waterways", "start_char_pos": 31, "end_char_pos": 31}, {"type": "A", "before": null, "after": "Trails The first European explorers travelling through the Forks were Alexander Mackenzie in 1793, and Simon Fraser in 1805.Prince George Citizen, 26 May 1938", "start_char_pos": 32, "end_char_pos": 32}, {"type": "A", "before": null, "after": "Aboriginal trails laced the valleys for thousands of years. With the Klondike Gold Rush, the Canadian government sought to identify safe overland routes for prospectors to reach the Yukon from Edmonton. As water transport could be expensive, these were intended as wagon trails. The initial NWMP Trail, surveyed during 1897-98 by Inspector J.D. Moodie with First Nations guides, passed along the northeast bank of the Forks.Sherry, Erin", "start_char_pos": 33, "end_char_pos": 33}, {"type": "A", "before": null, "after": "Cadden, Veronica. (2008). Documenting and Interpreting the History and Significance of the North West Mounted Police Peace-Yukon Historic Trails. Inter-Agency Management Committee, Northern Interior Region. Preface", "start_char_pos": 34, "end_char_pos": 34}, {"type": "A", "before": null, "after": "p. 40 URL Hordes coming from the south would join the trail here.Prince George Citizen, 25 May 1939 Prospectors also passed through the vicinity on their way to gold rushes at Barkerville (1860s), Omineca (1871-72), and McConnell Creek (1907-08).Prince George Citizen, 17 May 1928", "start_char_pos": 36, "end_char_pos": 36}, {"type": "A", "before": null, "after": "During the ice-free months, passenger and freight vessels regularly ran between Summit Lake and", "start_char_pos": 37, "end_char_pos": 37}, {"type": "R", "before": "Bay Company fur trading post and settlement in northern British Columbia, located at the confluence of the Finlay River and Parsnip River .", "after": "Hope via the Crooked River, the Parsnip River, Finlay Forks, and the Peace River.Fort George Tribune, 27 Jun 1914Fort George Herald, 9 Oct 1915Prince George Citizen: 23 Jul 1920; 6 Aug 1920; 3", "start_char_pos": 47, "end_char_pos": 186}, {"type": "A", "before": null, "after": "24", "start_char_pos": 189, "end_char_pos": 189}, {"type": "A", "before": null, "after": "30 Sep 1920;", "start_char_pos": 190, "end_char_pos": 190}, {"type": "A", "before": null, "after": "14 Apr 1938 However, low water levels would shorten the navigation season.Prince George Citizen, 29 Jun 1944", "start_char_pos": 192, "end_char_pos": 192}, {"type": "A", "before": null, "after": "Four of the potential sites for the W. A. C. Bennett Dam were at the western end of the Peace River canyon near the Forks.Prince George Citizen, 28 Apr 1958 Originally, the dam and powerhouse were planned for the Finlay Forks-Wicked River (7 miles east) location. On drilling down 400 feet in the middle of the Peace River, the failure to reach solid rock identified an unbridgeable crevice.Prince George Citizen, 21 May 1991", "start_char_pos": 193, "end_char_pos": 193}, {"type": "A", "before": null, "after": "By the summer of 1969, the T-shaped reservoir was 80-percent full.Prince George Citizen, 7 Jul 1969 The combination of high waves and floating logs could make Williston Lake treacherous, with at least eight persons missing and believed drowned in the lake during 1970-85. The worst area is at Finlay Forks, where the wind can come from north, south, east or west.Prince George Citizen, 28 Aug 1985", "start_char_pos": 194, "end_char_pos": 194}, {"type": "A", "before": null, "after": "Road", "start_char_pos": 195, "end_char_pos": 195}, {"type": "A", "before": null, "after": "Rail Proposals The joint Peace Pass/Finlay Forks proposals form part of the Pine Pass highway and railway developments.", "start_char_pos": 197, "end_char_pos": 197}, {"type": "A", "before": null, "after": "In 1913, Premier McBride envisaged a PGE Alaskan rail route passing through the Forks.Prince George Citizen, 16 Feb 1928", "start_char_pos": 198, "end_char_pos": 198}, {"type": "A", "before": null, "after": "In the late 1920s, Mr. Armishaw sought to establish a trail southwest to Manson Creek.Prince George Citizen, 13 Oct 1927 A rail line from the Forks to the Ferguson mine in the Ingenika was proposed. Charter flights from Prince George to this mine were taking less than two hours to what had previously been a week by water and land.Prince George Citizen, 13 Jun 1929", "start_char_pos": 199, "end_char_pos": 199}, {"type": "A", "before": null, "after": "The 1930s survey for Route B of the proposed Alaska Highway, which was promoted as the Canadian preference, was via this locality.Prince George Citizen: 4 Sep 1930, 17 Feb 1938, 5 May 1938, 17 Nov 1938, 29 Dec 1938, 9 Feb 1939, 18 May 1939,", "start_char_pos": 200, "end_char_pos": 200}, {"type": "A", "before": null, "after": "17", "start_char_pos": 202, "end_char_pos": 202}, {"type": "A", "before": null, "after": "24 Jul 1941 By 1935, the leaning was for a Prince George-Finlay Forks road via Summit Lake rather than Manson Creek,Prince George Citizen: 27 Jun 1935", "start_char_pos": 203, "end_char_pos": 203}, {"type": "A", "before": null, "after": "15 Jun 1939 however this choice was not universal,Prince George Citizen: 4 Jun 1936, 2 Apr 1942, 23 Jul 1942,", "start_char_pos": 205, "end_char_pos": 205}, {"type": "A", "before": null, "after": "1", "start_char_pos": 206, "end_char_pos": 206}, {"type": "A", "before": null, "after": "22 Jul 1943 and further surveys ensued.Prince George Citizen, 6 May 1943 The latter, known as the Turgeon Highway, did not reach Manson Creek until 1939. The project required a further 40 miles of heavy construction if extended to Finlay Forks,Prince George Citizen: 18 Mar 1937, 27 May 1937, 29 Jul 1937, 26 Aug 1937", "start_char_pos": 208, "end_char_pos": 208}, {"type": "A", "before": null, "after": "26 Oct 1939 and progress was long delayed.Prince George Citizen: 8 Jun 1944, 7 Jun 1945, 21 Mar 1946, 26 Sep 1946, 3 Feb 1949, 24 Mar 1949, 16", "start_char_pos": 209, "end_char_pos": 209}, {"type": "A", "before": null, "after": "23 Jun 1949, 24 Aug 1950,", "start_char_pos": 211, "end_char_pos": 211}, {"type": "A", "before": null, "after": "23 Dec 1957", "start_char_pos": 212, "end_char_pos": 212}, {"type": "A", "before": null, "after": "A PGE link to a possible Alaskan rail route continued to include Finlay Forks.Prince George Citizen: 25 Nov 1948, 3 Mar 1949, 1 Sep 1949", "start_char_pos": 213, "end_char_pos": 213}, {"type": "A", "before": null, "after": "31 Aug 1953 In 1965, an access road north from Highway 97 reached the settlement and construction commenced on the Manson Creek link.Prince George Citizen, 30 Mar 1965 A three-times-weekly road freight service with Prince George was soon implemented.Prince George Citizen, 13 Sep 1965 The 1966 PGE spur covered only the 23 miles to Mackenzie.", "start_char_pos": 214, "end_char_pos": 214}, {"type": "A", "before": null, "after": "Community Established in URL the location was an important Hudson's Bay Company fur trading post and settlement.", "start_char_pos": 215, "end_char_pos": 215}, {"type": "R", "before": "55\u00b0 59' 0\" North, 123\u00b0 50' 0\" West.", "after": "Two general stores opened in 1913.Fort George Tribune, 20 Jun 1914 That year, the residents formed a community association and petitioned the postal authorities to rename the location as \u2018Finparpea\u2019, compiled from the first three letters of the three rivers. World War I superseded any action, and few returned to their holdings after the conflict.Prince George Citizen, 17 May 1928", "start_char_pos": 292, "end_char_pos": 327}, {"type": "R", "before": ". (", "after": ",", "start_char_pos": 366, "end_char_pos": 369}, {"type": "R", "before": ") In 1916, a reserve of", "after": "and the following year,", "start_char_pos": 401, "end_char_pos": 424}, {"type": "R", "before": "was established nearby", "after": "established a reserve nearby. William Fox, the Hudson\u2019s Bay factor (mercantile agent),Prince George Citizen, 14 May 1925 was the inaugural postmaster (1916-18), with mail deliveries eight times each year.Prince George Citizen, 31 May URL", "start_char_pos": 457, "end_char_pos": 479}, {"type": "A", "before": null, "after": "During the 1920s, the nucleus of a potential town comprised a few scattered cabins,Prince George Citizen, 7 Jul 1922 with Ole Johnson offering visitor accommodation.Prince George Citizen, 19 Jul 1928 In 1912, Louis Peterson took up the first pre-emption at the Forks,Prince George Citizen, 17 May 1928 was postmaster URL and ran a trading store until his death at about 81.Prince George Citizen, 1 Jun 1933 The remaining storekeeper,Prince George Citizen, 19 Apr 1934 Alan (alternatively Alex) McKinnon, was also a fur trader,Prince George Citizen, 28 Jul 1938 postmaster (1920-25; URL and a mine owner.Prince George Citizen, 5 Sep 1940 Replenishing his supplies in the summer of 1940, he trucked the 50-ton load from Prince George to Summit Lake, from where it was boated to the Forks.Prince George Citizen, 13 Jun 1940 The annual fur auction held at Finlay Forks, comprised many trappers and drew in commercial buyers.Prince George Citizen: 22 May 1941, 19 Mar 1942, 18 May 1944", "start_char_pos": 480, "end_char_pos": 480}, {"type": "A", "before": null, "after": "16 May 1946", "start_char_pos": 482, "end_char_pos": 482}, {"type": "A", "before": null, "after": "By the 1950s, the Caucasian population numbered four, two of whom were Roy", "start_char_pos": 483, "end_char_pos": 483}, {"type": "A", "before": null, "after": "Marge MacDougall, who ran the trading post and provided visitor accommodation. Marge was also the volunteer first aid attendant for the Sekani and passing itinerants.Prince George Citizen, 27 Oct 1952 Arriving in the 1920s, the couple farmed,Prince George Citizen, 21 Jun 1928 to 9 Aug 1928 and Marge served as postmaster (1943-46, URL They sold up in 1957,Prince George Citizen, 28 Feb 1957 and Roy lived to 97.Prince George Citizen, 23 Nov 1984 The post-office closed in URL", "start_char_pos": 485, "end_char_pos": 485}, {"type": "A", "before": null, "after": "In 1967, a one-roomed school opened.Prince George Citizen, 29 Dec 1967 During the following summer, Bud Stuart operated a coffee shop and general store from a tentPrince George Citizen, 14 Jun 1968 that evolved into permanent premises.Prince George Citizen: 13 Jun 1969", "start_char_pos": 486, "end_char_pos": 486}, {"type": "A", "before": null, "after": "13 Aug 1969 The school was a challenge for maintenance crews, being at the northern tip of School District 57.Prince George Citizen, 7 Jan 1969 Closing in 1971, the three portable buildings were removed.Prince George Citizen, 3 Dec 1971 By 1973, Bill Bloor ran the general store.Prince George Citizen, 17 Jan 1973", "start_char_pos": 488, "end_char_pos": 488}, {"type": "A", "before": null, "after": "The Finlay Bay Cabins,Prince George Citizen, 15 Sep 1994 operated by Kelly Brothers, no longer exist.", "start_char_pos": 489, "end_char_pos": 489}, {"type": "A", "before": null, "after": "Communications", "start_char_pos": 490, "end_char_pos": 490}, {"type": "A", "before": null, "after": "Air Services Communications with Prince George were slow, because mail travelled a circuitous route east via Hudson\u2019s Hope, Edmonton, and west toward Prince George. The residents appealed for a direct route through Summit Lake, at least during the summer months.Prince George Citizen, 14 Jun 1928", "start_char_pos": 492, "end_char_pos": 492}, {"type": "A", "before": null, "after": "The rivers covered with floating ice, the ballot box for an election was parachuted from a plane. The mere 13 names on the electoral roll signified an expensive exercise in democracy.Prince George Citizen, 2 Nov 1933 The locked ballot box took 15 days to reach Hudson\u2019s Hope, from where the mail would take a further 10 days to reach Prince George.Prince George Citizen, 23 Nov 1933 By the 1950s, the arrival of the ballot box, containing two votes, delayed the final count.Prince George Citizen, 31 Dec 1953", "start_char_pos": 493, "end_char_pos": 493}, {"type": "A", "before": null, "after": "In 1936, a shortwave radiotelephone station opened, which operated in conjunction with a series of similar stations in northern BC and the Yukon.Prince George Citizen: 30 Apr 1936, 27 Aug 1936", "start_char_pos": 494, "end_char_pos": 494}, {"type": "A", "before": null, "after": "24 Sep 1936 The following year, United Air Transport (UAT) inaugurated a scheduled monthly passenger/freight/mail service for nine months of the year.Prince George Citizen: 10", "start_char_pos": 496, "end_char_pos": 496}, {"type": "A", "before": null, "after": "24 Jun 1937; 12, 19", "start_char_pos": 498, "end_char_pos": 498}, {"type": "A", "before": null, "after": "26 May 1938;", "start_char_pos": 500, "end_char_pos": 500}, {"type": "A", "before": null, "after": "23 Jun 1938 A half-gallon ice cream consignment was the first occasion it was served in the community.Prince George Citizen, 22 Jul 1937 By 1938, the dominion postal inspector\u2019s annual visit to Finlay Forks and the surrounding post-offices took five days by air, compared with the previous 40 days by boat.Prince George Citizen, 17 Mar 1938 UAT, renamed Yukon Southern Air Transport (YSAT), scheduled a Christmas mail run.Prince George Citizen, 24 Dec 1940 Moving under the joint control of YSAT and Canadian Airways in 1941,Prince George Citizen, 6 Mar 1941 the passenger/mail runs continued monthly.Prince George Citizen: 28 Nov 1946, 20 Mar 1947", "start_char_pos": 502, "end_char_pos": 502}, {"type": "A", "before": null, "after": "10 Jul 1947", "start_char_pos": 504, "end_char_pos": 504}, {"type": "A", "before": null, "after": "By the 1950s, Central B.C. Airways carried the nine mail deliveries for the year, the radiotelephone station had become redundant and closed, and the community\u2019s two-way radio was dependent upon weather conditions.Prince George Citizen, 27 Oct 1952 When a plane crashed on making an emergency landing near Finlay Forks in 1950, the pilot and the three passengers survived.Prince George Citizen, 31 Aug 1950 Santa would come by plane, but sometimes the weather delayed the event until after Christmas.Prince George Citizen, 30 Dec 1952 With flight cancellations, several months of newspapers might arrive together.Prince George Citizen: 12 Jan 1953", "start_char_pos": 505, "end_char_pos": 505}, {"type": "A", "before": null, "after": "21 Jan 1954", "start_char_pos": 507, "end_char_pos": 507}, {"type": "A", "before": null, "after": "The Pacific Western Airlines Prince George-Fort St. John run, which commenced in 1957, provided the irregular passenger, freight and mail service to the Forks.Prince George Citizen: 17 Oct 1957", "start_char_pos": 508, "end_char_pos": 508}, {"type": "A", "before": null, "after": "20 Jun 1962 Months later, the ballot box travelled by helicopter.Prince George Citizen, 28 Mar 1958", "start_char_pos": 510, "end_char_pos": 510}, {"type": "A", "before": null, "after": "In 1995, when an amphibian plane crashed shortly after takeoff from Finlay Bay, the three occupants escaped uninjured.Prince George Citizen, 21 Aug 1995 The Finlay Bay Water Aerodrome (CAK8) was later URL", "start_char_pos": 511, "end_char_pos": 511}, {"type": "A", "before": null, "after": "Law Enforcement In 1924, Constable Muirhead became the inaugural provincial police constable in residence,Prince George Citizen, 16 Oct 1924 and mushed over 500 miles to spend Christmas in Prince George. Although federal police questioned the adequacy of provincial policing in the area,Prince George Citizen, 8 Jan 1925 a permanent police presence was limited to the 1920s", "start_char_pos": 512, "end_char_pos": 512}, {"type": "R", "before": "Since the construction of the", "after": "In 1930, A. J. Jank was appointed game warden for the Finlay River district, with his headquarters in the forestry cabin at Finlay Forks.Prince George Citizen, 27 Nov 1930 Vic Williams replaced him the following year.Prince George Citizen: 27 Aug 1931", "start_char_pos": 515, "end_char_pos": 544}, {"type": "A", "before": null, "after": "25 Aug 1932 Vic and a colleague rescued two men from a capsized boat in the Finlay Rapids, but a third person drowned.Prince George Citizen, 15 Sep 1932 In 1933, he was appointed coroner in conjunction with his ten-month-each-year game warden role.Prince George Citizen, 22 Jun 1933 During the late 1930s, A.J. Jank,Prince George Citizen, 1 Apr 1937 and Sidney G. Copeland,Prince George Citizen, 6 Jul 1939 held the game warden position. In 1940, Sidney apprehended Edward Bird (alias Byrde) at Deserter\u2019s Canyon on a charge of bigamy and surrendered him to a police constable for escorting to Prince George.Prince George Citizen: 30 May 1940", "start_char_pos": 546, "end_char_pos": 546}, {"type": "A", "before": null, "after": "18 Jul 1940", "start_char_pos": 548, "end_char_pos": 548}, {"type": "A", "before": null, "after": "In 1944, after a social confrontation, Alex Prince murdered trappers Eugene Messmer, 33, and then Hans Pfeuffer, 43, at their cabin in the vicinity. Found in Prince\u2019s cabin were Messmer\u2019s gold watch, handmade briefcase, rifle, valuable cameras, film, stolen furs and fur stretchers. Based on this evidence, Game Warden A.J. Jank executed an arrest on separate charges. The coroner\u2019s court reached an open verdict.Prince George Citizen: 16", "start_char_pos": 549, "end_char_pos": 549}, {"type": "A", "before": null, "after": "24 Mar 1944;", "start_char_pos": 551, "end_char_pos": 551}, {"type": "A", "before": null, "after": "6 Apr 1944 Alex Prince, Sekani First Nations, 21, stood trial,Prince George Citizen, 14 Sep 1944 but damaging inadmissible statements made by a witness prompted a mistrial.Prince George Citizen, 28 Sep 1944 At his retrial, Prince was found guilty of murdering Messmer and a stay of proceedings was entered in a second murder charge in the death of Pfeuffer.Prince George Citizen, 7 Jun 1945 After an unsuccessful appeal on the grounds of diminished capacity, he was hanged.Prince George Citizen, 8 Nov 1945", "start_char_pos": 553, "end_char_pos": 553}, {"type": "A", "before": null, "after": "In 1964 and 1965, rifle shots wounded separate members of the Poole family on the Finlay Forks reserve.Prince George Citizen: 28 Aug 1964, 30 Apr 1965", "start_char_pos": 554, "end_char_pos": 554}, {"type": "A", "before": null, "after": "3 May 1965 In a 1968 shooting incident at a family reunion, May Egnell died, and another woman and boy were injured. The incident arose after a verbal exchange during an intoxicated episode. While Joe Egnell, husband of the deceased was in a physical altercation with Murphy Porter, their wives May and Mary, and Bessie Tomah, were fighting. Although May had pulled a knife, Bessie, 26, was found guilty of manslaughter and received a three-year sentence.Prince George Citizen, 14", "start_char_pos": 556, "end_char_pos": 556}, {"type": "A", "before": null, "after": "16 Aug 1968;", "start_char_pos": 558, "end_char_pos": 558}, {"type": "A", "before": null, "after": "14, 15", "start_char_pos": 560, "end_char_pos": 560}, {"type": "A", "before": null, "after": "19 Nov 1968", "start_char_pos": 562, "end_char_pos": 562}, {"type": "A", "before": null, "after": "In 1948, Joe Egnell\u2019s father, McDonald, and youngest brother, Tony, died, the former of exposure and the latter of pneumonia. His mother trekked 80 miles in cold winter weather to bring her two children to safety. Game Warden A. J. Jank and Const. Lyle Oleson conducted the investigation, and Frank identified his father\u2019s body.Prince George Citizen: 18 Mar 1948", "start_char_pos": 563, "end_char_pos": 563}, {"type": "A", "before": null, "after": "11 Dec 1999 In 1971, Frank Egnell, 43, shot Keon Pierre, 56, following an argument at Finlay Forks. Convicted of manslaughter, he was sentenced to two years less a day.Prince George Citizen, 10 Dec 1971", "start_char_pos": 565, "end_char_pos": 565}, {"type": "A", "before": null, "after": "Mining", "start_char_pos": 566, "end_char_pos": 566}, {"type": "A", "before": null, "after": "Farming A great deal of mining occurred in the surrounding mountains, rivers and creeks.Fort George Tribune, 20 Jun 1914Prince George Leader, 16 Jun 1922Prince George Leader, 14 Jul 1922 The increasing market for produce was anticipated to expand farming in the immediate area.Prince George Citizen: 17 May 1928", "start_char_pos": 568, "end_char_pos": 568}, {"type": "A", "before": null, "after": "22 Nov 1928 Larry Canty acquired 20,000 acres in 1929 for agricultural development.Prince George Citizen, 7 Mar 1929 However, the lack of rail lines and roads hampered mining activities.Prince George Citizen: 17 Feb 1938, 19 Oct 1939, 25 Jul 1940, 17 Apr 1941, 16 Jul 1951, 30 Oct 1952, 8 Dec 1952, 8 Dec 1952", "start_char_pos": 570, "end_char_pos": 570}, {"type": "A", "before": null, "after": "15 Apr 1954 The 1957 site selection for the", "start_char_pos": 572, "end_char_pos": 572}, {"type": "R", "before": "in", "after": "confirmed the flooding would submerge many mining and industrial development properties.Prince George Citizen, 7 Mar 1957", "start_char_pos": 594, "end_char_pos": 596}, {"type": "A", "before": null, "after": "Forestry By the mid-1910s, the BC forestry department maintained a headquarters at Finlay Forks,Prince George Star, 10 Nov 1916 which in due course served a fire ranger role.Prince George Citizen, 7 Jul 1922 The forest ranger station operated after World War II,Prince George Citizen, 17 Jun 1948 and an assistant ranger station was built in 1964.Prince George Citizen, 3 May 1985 In the mid-1960s, logging contracts were let for those valleys north, south and east of the Forks, which would be flooded by the dam.Prince George Citizen: 3", "start_char_pos": 597, "end_char_pos": 597}, {"type": "A", "before": null, "after": "6 Apr 1963 Donald Adems (Adams alternate spelling), a forestry service engineer on the project, had been the first Caucasian child to live at Finlay Forks.Prince George Citizen, 8 Jul 1964", "start_char_pos": 599, "end_char_pos": 599}, {"type": "A", "before": null, "after": "Further contracts were let for the clearing and burning of inferior timber.Prince George Citizen, 22 Mar 1965 Several portable sawmills began operations.Prince George Citizen, 30 Mar 1965 Carrier Lumber and Cattermole Timber adopted new ideas such as felling on the ice and sorting later.Prince George Citizen, 3 May 1985 The latter was located on the west bank of the Parsnip River, two miles south, and was accessed by an ice-bridge.Under These Waters, p. 20 Fires completely gutted its 50,000-foot capacity McLean Lake Mill,Prince George Citizen, 14 Apr 1965 and the Courhon Sawmill on Scott Creek at mile 56 of the access road. A forest fire at Mile 43 threatened another mill.Prince George Citizen, 14 May 1965 Temporary work camps were at Miles 49 and 73.Under These Waters, pp. 23-37", "start_char_pos": 600, "end_char_pos": 600}, {"type": "A", "before": null, "after": "The forest service established a centre of operations at Finlay Forks. Rising faster than anticipated, the dammed waters created vast logjams and half-submerged trees.Prince George Citizen, 14 Jun", "start_char_pos": 601, "end_char_pos": 601}, {"type": "R", "before": "it has lain under the waters of Williston Lake.", "after": "In this environment, two tugboat companies and about 25 private logging contractors conducted one of the largest timber salvage operations in North America. At the Forks, Finlay Navigation operated a dispatch base, and Carrier Lumber a sawmill.Prince George Citizen, 7 Jul 1969 Sheriffs\u2019 sales of assets occurred to settle unpaid wages of Yarkon Industries and workers compensation liabilities of Ashlea Timber at Mile 74\u00bd.Prince George Citizen: 12, 14", "start_char_pos": 607, "end_char_pos": 654}, {"type": "A", "before": null, "after": "20 Aug 1969 In 1969, the bush mills disappeared from the pondage area and the first log boom reached Mackenzie from the Finlay drainage.Prince George Citizen, 3 May 1985 By 1971, further timber salvaging became uneconomical,Prince George Citizen, 8 Feb 1971 and Carrier relocated all its operations from Finlay Forks to Mackenzie.Prince George Citizen, 1 May 1999", "start_char_pos": 656, "end_char_pos": 656}, {"type": "A", "before": null, "after": "Footnotes", "start_char_pos": 657, "end_char_pos": 657}, {"type": "A", "before": null, "after": "URL Unrau, Norman (2001). Under These Waters Williston Lake: Before it Was. Self-published. . URL", "start_char_pos": 669, "end_char_pos": 669}, {"type": "A", "before": null, "after": "Category:Ghost towns in British Columbia Category:Defunct seaplane bases in British Columbia", "start_char_pos": 670, "end_char_pos": 670}, {"type": "A", "before": null, "after": "Northern Interior of British Columbia Category:Omineca Mountains Category:", "start_char_pos": 681, "end_char_pos": 681}, {"type": "R", "before": "for", "after": "forts Category:Sekani peopl", "start_char_pos": 703, "end_char_pos": 706}], "sents_char_pos": [0, 237, 259, 280, 327, 654]}
+{"doc_id": "45422937", "revision_depth": "2", "before_revision": "Finlay Forks (also called Finlay Junction ), is the confluence of the Finlay River and Parsnip River. The Finlay Bay Recreation Site,Prince George Citizen, 11 Mar 1989 on the southeast bank, is about two miles southeast of the former settlement (on the earlier southeast bank) that is now submerged beneath Williston Lake. Like the river, it is named after explorer John Finlay.Prince George Citizen, 27 Jul 1983 The access road from Mackenzie is called the Parsnip West FSR (formerly Finlay Forks Road and Parsnip Forest Road).Prince George Citizen: 19 Mar 1973, 18 May 1979; & 19 , 21 Nov 1980 Four of the potential sites for the W. A. C. Bennett Dam were at the western end of the Peace River canyon near the Forks.Prince George Citizen, 28 Apr 1958 Originally, the dam and powerhouse were planned for the Finlay Forks-Wicked River (7 miles east) location . On drilling down 400 feet in the middle of the Peace River, the failure to reach solid rock identified an unbridgeable crevice.Prince George Citizen, 21 May 1991 Road & Rail Proposals The joint Peace Pass/Finlay Forks proposals form part of the Pine Pass highway and railway developments. A PGE link to a possible Alaskan rail route continued to include Finlay Forks.Prince George Citizen: 25 Nov 1948, 3 Mar 1949, 1 Sep 1949 & 31 Aug 1953 In 1965, an access road north from Highway 97 reached the settlement and construction commenced on the Manson Creek link.Prince George Citizen, 30 Mar 1965 A three-times-weekly road freight service with Prince George was soon implemented.Prince George Citizen, 13 Sep 1965 The 1966 PGE spur covered only the 23 miles to Mackenzie. Two general stores opened in 1913.Fort George Tribune, 20 Jun 1914 That year, the residents formed a community association and petitioned the postal authorities to rename the location as \u2018Finparpea\u2019, compiled from the first three letters of the three rivers. World War I superseded any action, and few returned to their holdings after the conflict. Prince George Citizen, 17 May 1928 In 1915, there were about 35 settlers, Fort George Herald, 9 Oct 1915 and the following year, the Fort Grahame band of Sekani established a reserve nearby. William Fox, the Hudson\u2019s Bay factor (mercantile agent),Prince George Citizen, 14 May 1925 was the inaugural postmaster (1916-18) , with mail deliveries eight times each year.Prince George Citizen , 31 May 1916 During the 1920s, the nucleus of a potential town comprised a few scattered cabins,Prince George Citizen, 7 Jul 1922 with Ole Johnson offering visitor accommodation.Prince George Citizen, 19 Jul 1928 In 1912, Louis Peterson took up the first pre-emption at the Forks, Prince George Citizen, 17 May 1928 was postmaster (1926-29) , and ran a trading store until his death at about 81. Prince George Citizen , 1 Jun 1933 The remaining storekeeper,Prince George Citizen, 19 Apr 1934 Alan (alternatively Alex) McKinnon, was also a fur trader,Prince George Citizen, 28 Jul 1938 postmaster (1920-25; 1930-43) , and a mine owner.Prince George Citizen, 5 Sep 1940 Replenishing his supplies in the summer of 1940, he trucked the 50-ton load from Prince George to Summit Lake, from where it was boated to the Forks.Prince George Citizen, 13 Jun 1940 The annual fur auction held at Finlay Forks, comprised many trappers and drew in commercial buyers.Prince George Citizen: 22 May 1941, 19 Mar 1942, 18 May 1944 & 16 May 1946 By the 1950s, the Caucasian population numbered four, two of whom were Roy & Marge MacDougall , who ran the trading post and provided visitor accommodation. Marge was also the volunteer first aid attendant for the Sekani and passing itinerants.Prince George Citizen, 27 Oct 1952 Arriving in the 1920s, the couple farmed,Prince George Citizen , 21 Jun 1928 to 9 Aug 1928 and Marge served as postmaster (1943-46, 1948-58). They sold up in 1957,Prince George Citizen, 28 Feb 1957 and Roy lived to 97.Prince George Citizen, 23 Nov 1984 The post-office closed in 1959. In 1967, a one-room school opened. Prince George Citizen & , 29 Dec 1967 During the following summer, Bud Stuart operated a coffee shop and general store from a tentPrince George Citizen, 14 Jun 1968 that evolved into permanent premises.Prince George Citizen: 13 Jun 1969 & 13 Aug 1969 The school was a challenge for maintenance crews, being at the northern tip of School District 57.Prince George Citizen, 7 Jan 1969 Closing in 1971, the three portable buildings were removed.Prince George Citizen, 3 Dec 1971 By 1973, Bill Bloor ran the general store.Prince George Citizen, 17 Jan 1973 %DIFDELCMD < %DIFDELCMD < %%% The Finlay Bay Cabins,Prince George Citizen, 15 Sep 1994 operated by Kelly Brothers, no longer exist. In 1936, a shortwave radiotelephone station opened, which operated in conjunction with a series of similar stations in northern BC and the Yukon.Prince George Citizen: 30 Apr 1936, 27 Aug 1936 & 24 Sep 1936 The following year, United Air Transport (UAT) inaugurated a scheduled monthly passenger/freight/mail service for nine months of the year.Prince George Citizen: 10 & 24 Jun 1937; 12, 19 & 26 May 1938; %DIFDELCMD < & %%% 23 Jun 1938 A half-gallon ice cream consignment was the first occasion it was served in the community.Prince George Citizen, 22 Jul 1937 By 1938, the dominion postal inspector\u2019s annual visit to Finlay Forks and the surrounding post-offices took five days by air, compared with the previous 40 days by boat.Prince George Citizen, 17 Mar 1938 UAT, renamed Yukon Southern Air Transport (YSAT), scheduled a Christmas mail run.Prince George Citizen, 24 Dec 1940 Moving under the joint control of YSAT and Canadian Airways in 1941,Prince George Citizen, 6 Mar 1941 the passenger/mail runs continued monthly.Prince George Citizen: 28 Nov 1946, 20 Mar 1947 & 10 Jul 1947 By the 1950s, Central B.C. Airways carried the nine mail deliveries for the year, the radiotelephone station had become redundant and closed, and the community\u2019s two-way radio was dependent upon weather conditions. Prince George Citizen, 27 Oct 1952 When a plane crashed on making an emergency landing near Finlay Forks in 1950, the pilot and the three passengers survived.Prince George Citizen, 31 Aug 1950 Santa would come by plane, but sometimes the weather delayed the event until after Christmas.Prince George Citizen, 30 Dec 1952 With flight cancellations, several months of newspapers might arrive together.Prince George Citizen: 12 Jan 1953 & 21 Jan 1954 In 1930, A. J. Jank was appointed game warden for the Finlay River district, with his headquarters in the forestry cabin at Finlay Forks.Prince George Citizen, 27 Nov 1930 Vic Williams replaced him the following year.Prince George Citizen: 27 Aug 1931 & 25 Aug 1932 Vic and a colleague rescued two men from a capsized boat in the Finlay Rapids, but a third person drowned.Prince George Citizen, 15 Sep 1932 In 1933, he was appointed coroner in conjunction with his ten-month-each-year game warden role.Prince George Citizen, 22 Jun 1933 During the late 1930s, A.J. Jank ,Prince George Citizen, 1 Apr 1937 and Sidney G. Copeland,Prince George Citizen, 6 Jul 1939 held the game warden position. In 1940, Sidney apprehended Edward Bird (alias Byrde) at Deserter\u2019s Canyon on a charge of bigamy and surrendered him to a police constable for escorting to Prince George.Prince George Citizen: 30 May 1940 & 18 Jul 1940 In 1944, after a social confrontation, Alex Prince murdered trappers Eugene Messmer, 33, and then Hans Pfeuffer, 43, at their cabin in the vicinity. Found in Prince\u2019s cabin were Messmer\u2019s gold watch, handmade briefcase, rifle, valuable cameras, film, stolen furs and fur stretchers. Based on this evidence, Game Warden A.J. Jank executed an arrest on separate charges. The coroner\u2019s court reached an open verdict.Prince George Citizen: 16 & 24 Mar 1944; & 6 Apr 1944 Alex Prince, Sekani First Nations, 21, stood trial,Prince George Citizen, 14 Sep 1944 but damaging inadmissible statements made by a witness prompted a mistrial.Prince George Citizen, 28 Sep 1944 At his retrial, Prince was found guilty of murdering Messmer and a stay of proceedings was entered in a second murder charge in the death of Pfeuffer.Prince George Citizen, 7 Jun 1945 After an unsuccessful appeal on the grounds of diminished capacity, he was hanged.Prince George Citizen, 8 Nov 1945 In 1964 and 1965, rifle shots wounded separate members of the Poole family on the Finlay Forks reserve.Prince George Citizen: 28 Aug 1964, 30 Apr 1965 & 3 May 1965 In a 1968 shooting incident at a family reunion, May Egnell died, and another woman and boy were injured. The incident arose after a verbal exchange during an intoxicated episode. While Joe Egnell, husband of the deceased was in a physical altercation with Murphy Porter, their wives May and Mary, and Bessie Tomah, were fighting. Although May had pulled a knife, Bessie, 26, was found guilty of manslaughter and received a three-year sentence.Prince George Citizen , 14 & 16 Aug 1968; & 14, 15 & 19 Nov 1968 In 1948, Joe Egnell\u2019s father, McDonald, and youngest brother, Tony, died, the former of exposure and the latter of pneumonia. His mother trekked 80 miles in cold winter weather to bring her two children to safety. Game Warden A. J. Jank and Const. Lyle Oleson conducted the investigation, and Frank identified his father\u2019s body.Prince George Citizen: 18 Mar 1948 & 11 Dec 1999 In 1971, Frank Egnell, 43, shot Keon Pierre, 56, following an argument at Finlay Forks. Convicted of manslaughter, he was sentenced to two years less a day.Prince George Citizen, 10 Dec 1971 Mining & Farming A great deal of mining occurred in the surrounding mountains, rivers and creeks. Fort George Tribune, 20 Jun 1914Prince George Leader, 16 Jun 1922Prince George Leader, 14 Jul 1922 The increasing market for produce was anticipated to expand farming in the immediate area.Prince George Citizen: 17 May 1928 & 22 Nov 1928 Larry Canty acquired 20,000 acres in 1929 for agricultural development.Prince George Citizen, 7 Mar 1929 However, the lack of rail lines and roads hampered mining activities.Prince George Citizen: 17 Feb 1938, 19 Oct 1939, 25 Jul 1940, 17 Apr 1941, 16 Jul 1951, 30 Oct 1952, 8 Dec 1952, 8 Dec 1952 & 15 Apr 1954 The 1957 site selection for the W. A. C. Bennett Dam confirmed the flooding would submerge many mining and industrial development properties.Prince George Citizen, 7 Mar 1957 Forestry By the mid-1910s, the BC forestry department maintained a headquarters at Finlay Forks,Prince George Star, 10 Nov 1916 which in due course served a fire ranger role. Prince George Citizen, 7 Jul 1922 The forest ranger station operated after World War II,Prince George Citizen, 17 Jun 1948 and an assistant ranger station was built in 1964.Prince George Citizen , 3 May 1985 In the mid-1960s, logging contracts were let for those valleys north, south and east of the Forks, which would be flooded by the dam.Prince George Citizen: 3 & 6 Apr 1963 Donald Adems (Adams alternate spelling), a forestry service engineer on the project, had been the first Caucasian child to live at Finlay Forks.Prince George Citizen, 8 Jul 1964 The forest service established a centre of operations at Finlay Forks. Rising faster than anticipated, the dammed waters created vast logjams and half-submerged trees. Prince George Citizen, 14 Jun 1968 In this environment, two tugboat companies and about 25 private logging contractors conducted one of the largest timber salvage operations in North America. At the Forks, Finlay Navigation operated a dispatch base, and Carrier Lumber a sawmill. Prince George Citizen, 7 Jul 1969 Sheriffs\u2019 sales of assets occurred to settle unpaid wages of Yarkon Industries and workers compensation liabilities of Ashlea Timber at Mile 74\u00bd.Prince George Citizen: 12, 14 & 20 Aug 1969 In 1969, the bush mills disappeared from the pondage area and the first log boom reached Mackenzie from the Finlay drainage. Prince George Citizen, 3 May 1985 By 1971, further timber salvaging became uneconomical,Prince George Citizen, 8 Feb 1971 and Carrier relocated all its operations from Finlay Forks to Mackenzie.Prince George Citizen, 1 May 1999 Category:Ghost towns in British Columbia Category:Defunct seaplane bases in British Columbia %DIFDELCMD < %DIFDELCMD < %%% Category:Northern Interior of British Columbia Category:Omineca Mountains Category:Hudson's Bay Company forts Category:Sekani peopl", "after_revision": "Finlay Forks (also called Finlay Junction and sometimes misspelt Findlay ), is the confluence of the Finlay River and Parsnip River. The Finlay Bay Recreation Site,Prince George Citizen, 11 Mar 1989 on the southeast bank, is about southeast of the former settlement (on the earlier southeast bank) that is now submerged beneath Williston Lake. Like the river, it was named after explorer John Finlay.Prince George Citizen, 27 Jul 1983 The access road from Mackenzie is called the Parsnip West FSR (formerly Finlay Forks Road and Parsnip Forest Road).Prince George Citizen: 19 Mar 1973, 18 May 1979; & 19 21 Nov 1980 Four of the potential sites for the W. A. C. Bennett Dam were at the western end of the Peace River canyon near the Forks.Prince George Citizen, 28 Apr 1958 Originally, the dam and powerhouse were planned for the Finlay Forks-Wicked River junction east . On drilling down 400 feet in the middle of the Peace River, the failure to reach solid rock identified an unbridgeable crevice.Prince George Citizen, 21 May 1991 When his 15-tonne logging truck broke through the ice in the vicinity, Brian Wykes URL drowned.Prince George Citizen, 28 Jan 1982 Road & Rail Proposals The joint Peace Pass/Finlay Forks proposals form part of the Pine Pass highway and railway developments. A PGE link to a possible Alaskan rail route continued to include Finlay Forks.Prince George Citizen: 25 Nov 1948, 3 Mar 1949, 1 Sep 1949 & 31 Aug 1953 In 1965, an access road north from Highway 97 reached the settlement and construction commenced on the Manson Creek link.Prince George Citizen, 30 Mar 1965 A three-times-weekly road freight service with Prince George was soon implemented.Prince George Citizen, 13 Sep 1965 The 1966 PGE spur covered only the to Mackenzie. Two general stores opened in 1913.Fort George Tribune, 20 Jun 1914 That year, the residents formed a community association and petitioned the postal authorities to rename the location as \u2018Finparpea\u2019, compiled from the first three letters of the three rivers. World War I superseded any action, and few returned to their holdings after the conflict. In 1915, there were about 35 settlers, and the following year, the Fort Grahame band of Sekani established a reserve nearby. William Fox, the Hudson\u2019s Bay factor (mercantile agent),Prince George Citizen, 14 May 1925 was the inaugural postmaster 1916\u201318 , with mail deliveries 6\u20138 times each year.Prince George Citizen : 31 May 1916 24 Jun 1921 During the 1920s, The Northern Trading Co. also operated a post,Prince George Citizen, 30 Apr 1920 Hugh M. Gibson was a storeowner, and the population was about 12.Prince George Citizen: 24 Jun 1921 2 Jul 1925 The nucleus of a potential town comprised a few scattered cabins,Prince George Citizen, 7 Jul 1922 with Ole Johnson offering visitor accommodation.Prince George Citizen, 19 Jul 1928 In 1912, Louis Peterson URL who took up the first pre-emption at the Forks, was postmaster 1926\u201329 , and ran a trading store until his death . Prince George Citizen : 24 Sep 1918 1 Jun 1933 The remaining storekeeper,Prince George Citizen, 19 Apr 1934 Alan (alternatively Alex) McKinnon, was also a fur trader,Prince George Citizen, 28 Jul 1938 postmaster 1920\u201325 and 1930\u201343 , and a mine owner.Prince George Citizen, 5 Sep 1940 Replenishing his supplies in the summer of 1940, he trucked the 50-ton load from Prince George to Summit Lake, from where it was boated to the Forks.Prince George Citizen, 13 Jun 1940 The annual fur auction held at Finlay Forks, comprised many trappers and drew in commercial buyers.Prince George Citizen: 22 May 1941, 19 Mar 1942, 18 May 1944 & 16 May 1946 By the 1950s, the Caucasian population numbered four, two of whom were Roy URL George Citizen, 23 Nov 1984 & Marge URL McDougall , who ran the trading post and provided visitor accommodation. Marge was also the volunteer first aid attendant for the Sekani and passing itinerants.Prince George Citizen, 27 Oct 1952 Arriving in the 1920s, the couple farmed,Prince George Citizen : 21 Jun 1928 to 9 Aug 1928 and Marge served as postmaster 1943\u201346 and 1948\u201358. They sold up in 1957,Prince George Citizen, 28 Feb 1957. the post-office closed in 1959, and they left 1960/61. Prince George Citizen : 2 Jun 1960 4 Apr 1961. The school was a challenge for maintenance crews, being at the northern tip of School District 57.Prince George Citizen, 7 Jan 1969 Catering to logging crews and Sekani, the two classrooms comprised an Atco-style singlewide structure for the primary grades, and a doublewide for the intermediate ones. The Carrier Lumber campsite provided water, power and sewer connections for the classrooms and teacherage. Operating 1968\u20131971, student enrolments ranged 20\u201327. Hall, Barbara; Pallo, Rose (2010). School District No. 57 (Prince George) historical memories. (Volume II): people, places, programs& services. Prince George Retired Teachers' Association, Education Heritage CommitteePrince George Citizen , 29 Dec 1967 On closure, the three portable buildings were removed.Prince George Citizen, 3 Dec 1971 During the 1968 summer, Bud Stuart operated a coffee shop and general store from a tentPrince George Citizen, 14 Jun 1968 that evolved into permanent premises.Prince George Citizen: 13 Jun 1969 & 13 Aug 1969 By 1973, Bill Bloor ran the general store.Prince George Citizen, 17 Jan 1973 %DIFDELCMD < %DIFDELCMD < %%% The Finlay Bay Cabins,Prince George Citizen, 15 Sep 1994 operated by Kelly Brothers, no longer exist. In 1936, a shortwave radiotelephone station opened, which operated in conjunction with a series of similar stations in northern BC and the Yukon.Prince George Citizen: 30 Apr 1936, 27 Aug 1936 & 24 Sep 1936 The following year, United Air Transport (UAT) inaugurated a scheduled monthly passenger/freight/mail service for nine months of the year.Prince George Citizen: 10 & 24 Jun 1937; 12, 19 & 26 May 1938; %DIFDELCMD < & %%% 23 Jun 1938 ; 9 May 1940 A half-gallon ice cream consignment was the first occasion it was served in the community.Prince George Citizen, 22 Jul 1937 By 1938, the dominion postal inspector\u2019s annual visit to Finlay Forks and the surrounding post-offices took five days by air, compared with the previous 40 days by boat.Prince George Citizen, 17 Mar 1938 UAT, renamed Yukon Southern Air Transport (YSAT), scheduled a Christmas 1940 mail run.Prince George Citizen, 24 Dec 1940 Moving under the joint control of YSAT and Canadian Airways in 1941,Prince George Citizen, 6 Mar 1941 the passenger/mail runs continued monthly.Prince George Citizen: 28 Nov 1946, 20 Mar 1947 & 10 Jul 1947 By the 1950s, Central B.C. Airways carried the nine mail deliveries for the year, the radiotelephone station had become redundant and closed, and the community\u2019s two-way radio was dependent upon weather conditions. When a plane crashed on making an emergency landing near Finlay Forks in 1950, the pilot and the three passengers survived.Prince George Citizen, 31 Aug 1950 Santa would come by plane, but sometimes the weather delayed the event until after Christmas.Prince George Citizen, 30 Dec 1952 With flight cancellations, several months of newspapers might arrive together.Prince George Citizen: 12 Jan 1953 & 21 Jan 1954 In 1930, Alfred (Alf) Jank URL was appointed game warden for the Finlay River district, with his headquarters in the forestry cabin at Finlay Forks.Prince George Citizen, 27 Nov 1930 Vic Williams replaced him the following year.Prince George Citizen: 27 Aug 1931 & 25 Aug 1932 Vic and a colleague rescued two men from a capsized boat in the Finlay Rapids, but a third person drowned.Prince George Citizen, 15 Sep 1932 In 1933, he was appointed coroner in conjunction with his ten-month-each-year game warden role.Prince George Citizen, 22 Jun 1933 During the late 1930s, Alf ,Prince George Citizen, 1 Apr 1937 and Sidney G. Copeland,Prince George Citizen, 6 Jul 1939 held the game warden position. In 1940, Sidney apprehended Edward Bird (alias Byrde) at Deserter\u2019s Canyon on a charge of bigamy and surrendered him to a police constable for escorting to Prince George.Prince George Citizen: 30 May 1940 & 18 Jul 1940 In 1944, after a social confrontation, Alex Prince URL murdered trappers Eugene Messmer, 33, and then Hans Pfeuffer, 43, at their cabin in the vicinity. Found in Prince\u2019s cabin were Messmer\u2019s gold watch, handmade briefcase, rifle, valuable cameras, film, stolen furs and fur stretchers. Based on this evidence, Game Warden Jank executed an arrest on separate charges. The coroner\u2019s court reached an open verdict.Prince George Citizen: 16 & 24 Mar 1944; & 6 Apr 1944 Alex Prince, Sekani First Nations, stood trial,Prince George Citizen, 14 Sep 1944 but damaging inadmissible statements made by a witness prompted a mistrial.Prince George Citizen, 28 Sep 1944 At his retrial, Prince was found guilty of murdering Messmer and a stay of proceedings was entered in a second murder charge in the death of Pfeuffer.Prince George Citizen, 7 Jun 1945 After an unsuccessful appeal on the grounds of diminished capacity, he was hanged.Prince George Citizen, 8 Nov 1945 In 1964 and 1965, rifle shots wounded separate members of the Poole family on the Finlay Forks reserve.Prince George Citizen: 28 Aug 1964, 30 Apr 1965 & 3 May 1965 In another shooting incident at a family reunion, May Egnell URL died, and another woman and boy were injured. The incident arose after a verbal exchange during an intoxicated episode. While Joe Egnell, husband of the deceased was in a physical altercation with Murphy Porter, their wives May and Mary, and Bessie Tomah, were fighting. Although May had pulled a knife, Bessie, 26, was found guilty of manslaughter and received a three-year sentence.Prince George Citizen : 14 & 16 Aug 1968; & 14, 15 & 19 Nov 1968 In 1948, Joe Egnell\u2019s father, McDonald, and youngest brother, Tony, died, the former of exposure and the latter of pneumonia. His mother trekked 80 miles in cold winter weather to bring her two children to safety. Game Warden Jank and Const. Lyle Oleson conducted the investigation, and Frank identified his father\u2019s body.Prince George Citizen: 18 Mar 1948 & 11 Dec 1999 Frank Egnell, 43, shot to death Keon Pierre URL following an argument at Finlay Forks. Convicted of manslaughter, he was sentenced to two years less a day.Prince George Citizen, 10 Dec 1971 Mining & Farming A great deal of mining occurred in the surrounding mountains, rivers and creeks. Prince George Leader, 16 Jun 1922Prince George Leader, 14 Jul 1922 The increasing market for produce was anticipated to expand farming in the immediate area.Prince George Citizen: 17 May 1928 & 22 Nov 1928 Larry Canty acquired 20,000 acres in 1929 for agricultural development.Prince George Citizen, 7 Mar 1929 However, the lack of rail lines and roads hampered mining activities.Prince George Citizen: 17 Feb 1938, 19 Oct 1939, 25 Jul 1940, 17 Apr 1941, 16 Jul 1951, 30 Oct 1952, 8 Dec 1952, 8 Dec 1952 & 15 Apr 1954 The 1957 site selection for the W. A. C. Bennett Dam confirmed the flooding would submerge many mining and industrial development properties.Prince George Citizen, 7 Mar 1957 Forestry By the mid-1910s, the BC forestry department maintained a headquarters at Finlay Forks,Prince George Star, 10 Nov 1916 which in due course served a fire ranger role. The forest ranger station operated after World War II,Prince George Citizen, 17 Jun 1948 and an assistant ranger station was built in 1964.Prince George Citizen : 25 May 1962 3 May 1985 In the mid-1960s, logging contracts were let for those valleys north, south and east of the Forks, which would be flooded by the dam.Prince George Citizen: 3 & 6 Apr 1963 Donald Adems (Adams alternate spelling), a forestry service engineer on the project, had been the first Caucasian child to live at Finlay Forks.Prince George Citizen, 8 Jul 1964 The forest service established a centre of operations at Finlay Forks. Rising faster than anticipated, the dammed waters created vast logjams and half-submerged trees. In this environment, two tugboat companies and about 25 private logging contractors conducted one of the largest timber salvage operations in North America. At the Forks, Finlay Navigation operated a dispatch base, and Carrier Lumber a sawmill. Sheriffs\u2019 sales of assets occurred to settle unpaid wages of Yarkon Industries and workers compensation liabilities of Ashlea Timber at Mile 74\u00bd.Prince George Citizen: 12, 14 & 20 Aug 1969 In 1969, the bush mills disappeared from the pondage area and the first log boom reached Mackenzie from the Finlay drainage. By 1971, further timber salvaging became uneconomical,Prince George Citizen, 8 Feb 1971 and Carrier relocated all its operations from Finlay Forks to Mackenzie.Prince George Citizen, 1 May 1999 On rolling his skidder, operator Vincent Broad was fatally crushed URL Category:Ghost towns in British Columbia Category:Defunct seaplane bases in British Columbia %DIFDELCMD < %DIFDELCMD < %%% Category:Northern Interior of British Columbia Category:Omineca Mountains Category:Hudson's Bay Company forts Category:Sekani peopl", "edit_actions": [{"type": "A", "before": null, "after": "and sometimes misspelt Findlay", "start_char_pos": 42, "end_char_pos": 42}, {"type": "D", "before": "two miles", "after": null, "start_char_pos": 201, "end_char_pos": 210}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 343, "end_char_pos": 345}, {"type": "D", "before": ",", "after": null, "start_char_pos": 583, "end_char_pos": 584}, {"type": "R", "before": "(7 miles east) location", "after": "junction east", "start_char_pos": 836, "end_char_pos": 859}, {"type": "A", "before": null, "after": "When his 15-tonne logging truck broke through the ice in the vicinity, Brian Wykes URL drowned.Prince George Citizen, 28 Jan 1982", "start_char_pos": 1024, "end_char_pos": 1024}, {"type": "D", "before": "23 miles", "after": null, "start_char_pos": 1611, "end_char_pos": 1619}, {"type": "D", "before": "Prince George Citizen, 17 May 1928", "after": null, "start_char_pos": 1983, "end_char_pos": 2017}, {"type": "D", "before": "Fort George Herald, 9 Oct 1915", "after": null, "start_char_pos": 2057, "end_char_pos": 2087}, {"type": "R", "before": "(1916-18)", "after": "1916\u201318", "start_char_pos": 2294, "end_char_pos": 2303}, {"type": "R", "before": "eight", "after": "6\u20138", "start_char_pos": 2327, "end_char_pos": 2332}, {"type": "R", "before": ",", "after": ":", "start_char_pos": 2371, "end_char_pos": 2372}, {"type": "A", "before": null, "after": "24 Jun 1921", "start_char_pos": 2385, "end_char_pos": 2385}, {"type": "R", "before": "the", "after": "The Northern Trading Co. also operated a post,Prince George Citizen, 30 Apr 1920 Hugh M. Gibson was a storeowner, and the population was about 12.Prince George Citizen: 24 Jun 1921", "start_char_pos": 2404, "end_char_pos": 2407}, {"type": "A", "before": null, "after": "2 Jul 1925 The", "start_char_pos": 2408, "end_char_pos": 2408}, {"type": "A", "before": null, "after": "URL who", "start_char_pos": 2611, "end_char_pos": 2611}, {"type": "R", "before": "Prince George Citizen, 17 May 1928 was postmaster (1926-29)", "after": "was postmaster 1926\u201329", "start_char_pos": 2656, "end_char_pos": 2715}, {"type": "R", "before": "at about 81.", "after": ".", "start_char_pos": 2758, "end_char_pos": 2770}, {"type": "R", "before": ",", "after": ": 24 Sep 1918", "start_char_pos": 2793, "end_char_pos": 2794}, {"type": "R", "before": "(1920-25; 1930-43)", "after": "1920\u201325 and 1930\u201343", "start_char_pos": 2971, "end_char_pos": 2989}, {"type": "A", "before": null, "after": "URL George Citizen, 23 Nov 1984", "start_char_pos": 3476, "end_char_pos": 3476}, {"type": "R", "before": "MacDougall", "after": "URL McDougall", "start_char_pos": 3485, "end_char_pos": 3495}, {"type": "R", "before": ",", "after": ":", "start_char_pos": 3744, "end_char_pos": 3745}, {"type": "R", "before": "(1943-46, 1948-58).", "after": "1943\u201346 and 1948\u201358.", "start_char_pos": 3803, "end_char_pos": 3822}, {"type": "R", "before": "1957 and Roy lived to 97.Prince George Citizen, 23 Nov 1984 The", "after": "1957. the", "start_char_pos": 3874, "end_char_pos": 3937}, {"type": "D", "before": "1959.", "after": null, "start_char_pos": 3960, "end_char_pos": 3965}, {"type": "R", "before": "In 1967, a one-room school opened.", "after": "1959, and they left 1960/61.", "start_char_pos": 3966, "end_char_pos": 4000}, {"type": "A", "before": null, "after": ": 2 Jun 1960", "start_char_pos": 4023, "end_char_pos": 4023}, {"type": "A", "before": null, "after": "4 Apr 1961.", "start_char_pos": 4024, "end_char_pos": 4024}, {"type": "A", "before": null, "after": "The school was a challenge for maintenance crews, being at the northern tip of School District 57.Prince George Citizen, 7 Jan 1969 Catering to logging crews and Sekani, the two classrooms comprised an Atco-style singlewide structure for the primary grades, and a doublewide for the intermediate ones. The Carrier Lumber campsite provided water, power and sewer connections for the classrooms and teacherage. Operating 1968\u20131971, student enrolments ranged 20\u201327. Hall, Barbara;", "start_char_pos": 4025, "end_char_pos": 4025}, {"type": "A", "before": null, "after": "Pallo, Rose (2010). School District No. 57 (Prince George) historical memories. (Volume II): people, places, programs", "start_char_pos": 4026, "end_char_pos": 4026}, {"type": "A", "before": null, "after": "services. Prince George Retired Teachers' Association, Education Heritage CommitteePrince George Citizen", "start_char_pos": 4028, "end_char_pos": 4028}, {"type": "R", "before": "During the following", "after": "On closure, the three portable buildings were removed.Prince George Citizen, 3 Dec 1971", "start_char_pos": 4043, "end_char_pos": 4063}, {"type": "A", "before": null, "after": "During the 1968", "start_char_pos": 4064, "end_char_pos": 4064}, {"type": "D", "before": "The school was a challenge for maintenance crews, being at the northern tip of School District 57.Prince George Citizen, 7 Jan 1969 Closing in 1971, the three portable buildings were removed.Prince George Citizen, 3 Dec 1971", "after": null, "start_char_pos": 4257, "end_char_pos": 4481}, {"type": "A", "before": null, "after": ";", "start_char_pos": 5130, "end_char_pos": 5130}, {"type": "A", "before": null, "after": "9 May 1940", "start_char_pos": 5131, "end_char_pos": 5131}, {"type": "A", "before": null, "after": "1940", "start_char_pos": 5533, "end_char_pos": 5533}, {"type": "D", "before": "Prince George Citizen, 27 Oct 1952", "after": null, "start_char_pos": 5999, "end_char_pos": 6033}, {"type": "R", "before": "A. J. Jank", "after": "Alfred (Alf) Jank URL", "start_char_pos": 6456, "end_char_pos": 6466}, {"type": "R", "before": "A.J. Jank", "after": "Alf", "start_char_pos": 7007, "end_char_pos": 7016}, {"type": "A", "before": null, "after": "URL", "start_char_pos": 7410, "end_char_pos": 7410}, {"type": "D", "before": "A.J.", "after": null, "start_char_pos": 7679, "end_char_pos": 7683}, {"type": "D", "before": "21,", "after": null, "start_char_pos": 7862, "end_char_pos": 7865}, {"type": "R", "before": "a 1968", "after": "another", "start_char_pos": 8490, "end_char_pos": 8496}, {"type": "A", "before": null, "after": "URL", "start_char_pos": 8547, "end_char_pos": 8547}, {"type": "R", "before": ",", "after": ":", "start_char_pos": 8954, "end_char_pos": 8955}, {"type": "D", "before": "A. J.", "after": null, "start_char_pos": 9223, "end_char_pos": 9228}, {"type": "D", "before": "In 1971,", "after": null, "start_char_pos": 9374, "end_char_pos": 9382}, {"type": "R", "before": "Keon Pierre, 56,", "after": "to death Keon Pierre URL", "start_char_pos": 9406, "end_char_pos": 9422}, {"type": "R", "before": "Fort George Tribune, 20 Jun 1914Prince George", "after": "Prince George", "start_char_pos": 9663, "end_char_pos": 9708}, {"type": "D", "before": "Prince George Citizen, 7 Jul 1922", "after": null, "start_char_pos": 10563, "end_char_pos": 10596}, {"type": "R", "before": ",", "after": ": 25 May 1962", "start_char_pos": 10758, "end_char_pos": 10759}, {"type": "D", "before": "Prince George Citizen, 14 Jun 1968", "after": null, "start_char_pos": 11288, "end_char_pos": 11322}, {"type": "D", "before": "Prince George Citizen, 7 Jul 1969", "after": null, "start_char_pos": 11568, "end_char_pos": 11601}, {"type": "D", "before": "Prince George Citizen, 3 May 1985", "after": null, "start_char_pos": 11916, "end_char_pos": 11949}, {"type": "A", "before": null, "after": "On rolling his skidder, operator Vincent Broad was fatally crushed URL", "start_char_pos": 12144, "end_char_pos": 12144}], "sents_char_pos": [0, 102, 323, 379, 529, 577, 719, 861, 989, 1151, 1230, 1424, 1541, 1633, 1668, 1892, 1982, 2173, 2349, 2552, 2980, 3009, 3192, 3326, 3558, 3646, 3822, 3899, 3965, 4000, 4208, 4355, 4448, 4524, 4690, 4836, 5036, 5076, 5098, 5222, 5426, 5543, 5722, 5810, 5998, 6157, 6285, 6398, 6584, 6664, 6819, 6949, 7139, 7310, 7508, 7642, 7728, 7773, 7813, 7988, 8173, 8289, 8426, 8593, 8667, 8818, 8932, 8973, 9122, 9210, 9244, 9325, 9461, 9530, 9662, 9852, 9972, 10075, 10354, 10562, 10736, 10904, 11086, 11190, 11287, 11479, 11567, 11747, 11915, 12110]}
+{"doc_id": "461383", "revision_depth": "3", "before_revision": "Indigenous islanders' diet The plate to the right is the national dish, , made with bitter melon known as . The traditional diet of the islanders contains 30\\% green and yellow vegetables. Although the traditional Japanese diet usually includes large quantities of rice, the traditional Okinawa diet consists of smaller quantities of rice; instead the staple is the purple-fleshed Okinawan sweet potato. The Okinawan diet has only 30\\% of the sugar and 15\\% of the grains of the average Japanese dietary intake. Okinawan cuisine consists of smaller meal portions of green and yellow vegetables, fish, relatively smaller amounts of rice compared to mainland Japan, as well as pork, soy and other legumes. Pork and fish are often served in broth with a variety of ingredients and herbs. The center of the Okinawa diet is the Satsuma sweet potato. The sweet potato also contributes the self-sufficiency of the island. Contrary to the regular potato, the Okinawa sweet potato does not have a large effect on blood sugar. Not only is the potato used but so are the leaves from the plant. The leaves are used often in miso soup. The Okinawan bitter melon is proven to have some anti-diabetic effects. In Okinawa the bitter melon is called goyain and is served in the national dish, . The bitter melon is effective in regulating blood sugar , similar to the sweet potato. The small quantity of pork consumption per person (only per day) in Okinawa is still larger than that of the Japanese national average. For example, the quantity of pork consumption per person a year in Okinawa in 1979 was which exceeded by about 50\\% that of the Japanese national average.Economic Structure of Local, Regional and National Hog Markets in the Self-Sufficient Region-Okinawa's Case The pig's feet, ears, and stomach are considered healthy everyday foodstuffs. The dietary intake of Okinawans compared to other Japanese circa 1950 shows that Okinawans consumed: Fewer total calories (1785 vs. 2068) Less polyunsaturated fat (4.8\\% of calories vs. 8\\%) Fewer sugars ( vs. ) Less rice (vs. ) and significantly less wheat, barley and other grains ( vs. ) Significantly less fish ( vs. ), meat and poultry ( vs. ) Less eggs (vs. ) and dairy (less than vs. ) A much higher quantity of sweet potatoes ( vs. ) and fewer other potatoes ( vs. ) Less fruit (less than vs. ), more legumes ( vs. ) and no pickled vegetables (0g vs. 42g) In short, the Okinawans circa 1950 ate sweet potatoes for of the of food that they consumed, which constituted 69\\% of their total calories. Another low-calorie staple in Okinawa is seaweed, particularly, kombu. This plant, like much of the greenery from the island, is rich in protein, amino acids and minerals such as iodine. Another seaweed commonly eaten is . Like kombu, is rich in minerals like iodine, magnesium and calcium. Seaweed and tofu in one form or other are eaten on a daily basis. According to gerontologist Kazuhiko Taira, the most common cooking fat used traditionally in Okinawa is a monounsaturated fat-lard. Although often called a \"saturated fat\", lard is 50 percent monounsaturated fat (including small amounts of health-producing antimicrobial palmitoleic acid), 40 percent saturated fat and 10 percent polyunsaturated. Taira also reports that healthy and vigorous Okinawans eat 100 grams each of pork and fish each day. URL Taira, Kazuhiko. In Franklyn, Deborah. Take a Lesson from the People of Okinawa, Heath, September 1996, 57-63. Overall, the diet leads to many benefits seen among people of Okinawa. These include little weight gain with age, low BMI throughout life, and low risk from age related disease. As mentioned earlier , the diet is rich in ingredients that supposedly possess anti-aging and antioxidant properties , as well as being supposedly effective at preventing disease; research using 100 items from the Okinawa diet shows that some of the diet contains anti-obesity properties or \"anti-obese activity\". However, no ingredients or foods of any kind have ever been scientifically shown to possess anti-aging properties. The proponents of this diet divide food into four categories based on caloric density. The \"featherweight\" foods, less than or equal to which one can eat freely without major concern, the \"lightweight\" foods with a caloric density from , which one should eat in moderation, the \"middleweight\" foods with a caloric density from , which one should eat only while carefully monitoring portion size , and the \"heavyweight\" foods from , which one should eat only sparingly.The Okinawa Diet Plan, Bradley Willcox, MD, D. Craig Willcox, PhD and Makoto Suzuki, MD, copyright 2004. Research Caloric restriction (CR) or dietary restriction (DR) are helpful tools in understanding age and diet related health complications. In the 1972 Japan National Nutrition Survey it was determined that Okinawan adults consumed 83\\% of what Japanese adults did and that Okinawan children consumed 62\\% of what Japanese children consumed. Today the difference in life expectancy between Okinawan and mainland Japanese is decreasing , as the Okinawan diet changes; this is evidenced by low birth weight, poor lactation, and the fact that the life expectancy for Okinawan men is lower than the national average. Le Bourg poses that the Okinawa diet has more of a deleterious effect then beneficial one, arguing that the low protein intake can cause harmful effects in later generations. Research done on animals showed that individuals with a lower protein consumption may be more vulnerable to pathogens. However, Gavrilova and Gavrilov reject this claim, arguing that dietary restrictions are a valid method for humans to extend their lives and that Okinawa has a naturally low infectious load. They instead hypothesize that the decrease in life expectancy has been due to Westernization and erosion of the traditional diet. After World War II, Okinawans started to consume more calories. This in large part was due to the Americanization of the diet, such as with the rapid spread of fast food places. The spread of primarily American fast food chains was linked with an increase in cardiovascular diseases, much like the ones noted in Japanese migrants to the United States. Culture and customs Okinawa and Japan have food-centered cultures. Festivities often include food or are food-based. Moreover, the food in Japan tends to be seasonal, fresh and raw. Portion sizes are small and meals are brought out in stages that starts with appetizers, many main courses including sashimi (raw fish) and (soup), sweets and tea. Since food culture is linked to ancestral traditions, the food culture and presentation is preserved, passing low-calorie food from generation to generation. A belief still prevalent in Okinawa is the healing power of food. Food is regarded as medicine which helps contribute to the longevity of Okinawa. The concept of \"food is medicine\" came to the island from China.", "after_revision": "Indigenous islanders' diet The plate to the right is the national dish, g\u014dy\u0101 chanpur\u016b , made with bitter melon known as goyain . The traditional diet of the islanders contains 30\\% green and yellow vegetables. Although the traditional Japanese diet usually includes large quantities of rice, the traditional Okinawa diet consists of smaller quantities of rice; instead the staple is the purple-fleshed Okinawan sweet potato. The Okinawan diet has only 30\\% of the sugar and 15\\% of the grains of the average Japanese dietary intake. Okinawan cuisine consists of smaller meal portions of green and yellow vegetables, fish, relatively smaller amounts of rice compared to mainland Japan, as well as pork, soy and other legumes. Pork and fish are often served in broth with a variety of ingredients and herbs. The center of the Okinawa diet is the Satsuma sweet potato. The sweet potato also contributes the self-sufficiency of the island. Contrary to the regular potato, the Okinawa sweet potato does not have a large effect on blood sugar. Not only is the potato used but so are the leaves from the plant. The leaves are used often in miso soup. The Okinawan bitter melon is proven to have some anti-diabetic effects. In Okinawa the bitter melon is called goyain and is served in the national dish, goya champuru . The bitter melon is effective in regulating blood sugar similar to the sweet potato. The small quantity of pork consumption per person (only 3g per day) in Okinawa is still larger than that of the Japanese national average. For example, the quantity of pork consumption per person a year in Okinawa in 1979 was which exceeded by about 50\\% that of the Japanese national average.Economic Structure of Local, Regional and National Hog Markets in the Self-Sufficient Region-Okinawa's Case The pig's feet, ears, and stomach are considered healthy everyday foodstuffs. The dietary intake of Okinawans compared to other Japanese circa 1950 shows that Okinawans consumed: fewer total calories (1785 vs. 2068) , less polyunsaturated fat (4.8\\% of calories vs. 8\\%) , less rice (154g vs. 328g), significantly less wheat, barley and other grains ( 38g vs. 153g), less sugars (3g vs. 8g), more legumes (71g vs. 55g), significantly less fish (15g vs. 62g), significantly less meat and poultry ( 3g vs. 11g), less eggs (1g vs. 7g), less dairy (<1g vs. 8g), much more sweet potatoes ( 849g vs. 66g), less other potatoes ( 2g vs. 47g), less fruit (<1g vs. 44g), and no pickled vegetables (0g vs. 42g) . In short, the Okinawans circa 1950 ate sweet potatoes for 849 grams of the 1262 grams of food that they consumed, which constituted 69\\% of their total calories. Another low-calorie staple in Okinawa is seaweed, particularly, konbu or kombu. This plant, like much of the greenery from the island, is rich in protein, amino acids and minerals such as iodine. Another seaweed commonly eaten is wakame. Like konbu, wakame is rich in minerals like iodine, magnesium and calcium. Seaweed and tofu in one form or other are eaten on a daily basis. Overall, the diet leads to many benefits seen among people of Okinawa. These include little weight gain with age, low BMI throughout life, and low risk from age related disease. Not only is the diet healthy in preventing disease, many of the foodstuffs contain combative ingredients as well. As mentioned earlier the diet is rich in ingredients that supposedly possess anti-aging and antioxidant properties . However, no ingredients or foods of any kind have ever been scientifically shown to possess anti-aging properties. Research using 100 items from the Okinawa diet shows that some of the diet contains anti-obesity properties or \"anti-obese activity\". The proponents of this diet divide food into four categories based on caloric density. The \"featherweight\" foods, less than or equal to which one can eat freely without major concern, the \"lightweight\" foods with a caloric density from 0.8 to 1.5 calories per gram which one should eat in moderation, the \"middleweight\" foods with a caloric density from 1.5 to 3.0 calories per gram which one should eat only while carefully monitoring portion size and the \"heavyweight\" foods from 3 to 9 calories per gram which one should eat only sparingly.The Okinawa Diet Plan, Bradley Willcox, MD, D. Craig Willcox, PhD and Makoto Suzuki, MD, copyright 2004. Research Caloric restriction (CR) or dietary restriction (DR) are helpful tools in understanding age and diet related health complications. In the 1972 Japan National Nutrition Survey it was determined that Okinawan adults consumed 83\\% of what Japanese adults did and that Okinawan children consumed 62\\% of what Japanese children consumed. Today the difference in life expectancy between Okinawan and mainland Japanese is decreasing as the Okinawan are losing their dietary advantage. Recently, there is a decreasing trend in the life expectancy in Okinawa. This is evidenced by low birth weight, poor lactation, and the fact that the life expectancy for Okinawan men is lower than the national average. Le Bourg poses that the Okinawa diet has more of a deleterious effect then beneficial one, arguing that the low protein intake can cause harmful effects in later generations. Research done on animals showed that individuals with a lower protein consumption may be more vulnerable to pathogens. However, Gavrilova and Gavrilov reject this claim, arguing that dietary restrictions are a valid method for humans to extend their lives and that Okinawa has a naturally low infectious load. They instead hypothesize that the decrease in life expectancy has been due to westernization and erosion of the traditional diet. After World War II, Okinawans started to consume more calories. This in large part was due to the Americanization of the diet, such as with the rapid spread of fast food places. The spread of primarily American fast food chains was linked with an increase in cardiovascular diseases, much like the ones noted in Japanese migrants to the United States. Culture and customs Okinawa and Japan have food-centered cultures. Festivities often include food or are food-based. Moreover, the food in Japan tends to be seasonal, fresh and raw. Portion sizes are small and meals are brought out in stages that starts with appetizers, many main courses including sashimi (raw fish) and suimono (soup), sweets and tea. Since food culture is linked to ancestral traditions, the food culture and presentation is preserved, passing low-calorie food from generation to generation. A belief still prevalent in Okinawa is the healing power of food. Food is regarded as medicine which helps contribute to the longevity of Okinawa. The concept of \"food is medicine\" came to the island from China.", "edit_actions": [{"type": "A", "before": null, "after": "g\u014dy\u0101 chanpur\u016b", "start_char_pos": 72, "end_char_pos": 72}, {"type": "A", "before": null, "after": "goyain", "start_char_pos": 107, "end_char_pos": 107}, {"type": "A", "before": null, "after": "goya champuru", "start_char_pos": 1278, "end_char_pos": 1278}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1337, "end_char_pos": 1338}, {"type": "A", "before": null, "after": "3g", "start_char_pos": 1424, "end_char_pos": 1424}, {"type": "R", "before": "Fewer", "after": "fewer", "start_char_pos": 1946, "end_char_pos": 1951}, {"type": "R", "before": "Less", "after": ", less", "start_char_pos": 1983, "end_char_pos": 1987}, {"type": "R", "before": "Fewer sugars ( vs. ) Less rice (vs. ) and", "after": ", less rice (154g vs. 328g),", "start_char_pos": 2036, "end_char_pos": 2077}, {"type": "R", "before": "vs. ) Significantly less fish ( vs. ),", "after": "38g vs. 153g), less sugars (3g vs. 8g), more legumes (71g vs. 55g), significantly less fish (15g vs. 62g), significantly less", "start_char_pos": 2130, "end_char_pos": 2168}, {"type": "R", "before": "vs. ) Less eggs (vs. ) and dairy (less than vs. ) A much higher quantity of", "after": "3g vs. 11g), less eggs (1g vs. 7g), less dairy (<1g vs. 8g), much more", "start_char_pos": 2188, "end_char_pos": 2263}, {"type": "R", "before": "vs. ) and fewer", "after": "849g vs. 66g), less", "start_char_pos": 2281, "end_char_pos": 2296}, {"type": "R", "before": "vs. ) Less fruit (less than vs. ), more legumes ( vs. )", "after": "2g vs. 47g), less fruit (<1g vs. 44g),", "start_char_pos": 2314, "end_char_pos": 2369}, {"type": "A", "before": null, "after": ".", "start_char_pos": 2409, "end_char_pos": 2409}, {"type": "A", "before": null, "after": "849 grams of the 1262 grams", "start_char_pos": 2468, "end_char_pos": 2468}, {"type": "D", "before": "the of", "after": null, "start_char_pos": 2472, "end_char_pos": 2478}, {"type": "A", "before": null, "after": "konbu or", "start_char_pos": 2616, "end_char_pos": 2616}, {"type": "R", "before": ". Like kombu,", "after": "wakame. Like konbu, wakame", "start_char_pos": 2774, "end_char_pos": 2787}, {"type": "D", "before": "According to gerontologist Kazuhiko Taira, the most common cooking fat used traditionally in Okinawa is a monounsaturated fat-lard. Although often called a \"saturated fat\", lard is 50 percent monounsaturated fat (including small amounts of health-producing antimicrobial palmitoleic acid), 40 percent saturated fat and 10 percent polyunsaturated. Taira also reports that healthy and vigorous Okinawans eat 100 grams each of pork and fish each day. URL Taira, Kazuhiko. In Franklyn, Deborah. Take a Lesson from the People of Okinawa, Heath, September 1996, 57-63.", "after": null, "start_char_pos": 2910, "end_char_pos": 3472}, {"type": "A", "before": null, "after": "Not only is the diet healthy in preventing disease, many of the foodstuffs contain combative ingredients as well.", "start_char_pos": 3651, "end_char_pos": 3651}, {"type": "D", "before": ",", "after": null, "start_char_pos": 3673, "end_char_pos": 3674}, {"type": "R", "before": ", as well as being supposedly effective at preventing disease; research", "after": ". However, no ingredients or foods of any kind have ever been scientifically shown to possess anti-aging properties. Research", "start_char_pos": 3769, "end_char_pos": 3840}, {"type": "D", "before": "However, no ingredients or foods of any kind have ever been scientifically shown to possess anti-aging properties.", "after": null, "start_char_pos": 3966, "end_char_pos": 4080}, {"type": "R", "before": ",", "after": "0.8 to 1.5 calories per gram", "start_char_pos": 4317, "end_char_pos": 4318}, {"type": "R", "before": ",", "after": "1.5 to 3.0 calories per gram", "start_char_pos": 4408, "end_char_pos": 4409}, {"type": "D", "before": ",", "after": null, "start_char_pos": 4476, "end_char_pos": 4477}, {"type": "R", "before": ",", "after": "3 to 9 calories per gram", "start_char_pos": 4511, "end_char_pos": 4512}, {"type": "D", "before": ",", "after": null, "start_char_pos": 5089, "end_char_pos": 5090}, {"type": "R", "before": "diet changes; this is", "after": "are losing their dietary advantage. Recently, there is a decreasing trend in the life expectancy in Okinawa. This is", "start_char_pos": 5107, "end_char_pos": 5128}, {"type": "R", "before": "Westernization", "after": "westernization", "start_char_pos": 5830, "end_char_pos": 5844}, {"type": "A", "before": null, "after": "suimono", "start_char_pos": 6556, "end_char_pos": 6556}], "sents_char_pos": [0, 109, 190, 341, 405, 513, 705, 786, 846, 916, 1018, 1084, 1124, 1196, 1280, 1367, 1504, 1659, 1844, 1945, 1982, 2035, 2408, 2551, 2623, 2739, 2843, 2909, 3041, 3256, 3357, 3378, 3400, 3472, 3543, 3650, 3831, 3965, 4080, 4167, 4549, 4653, 4793, 4995, 5120, 5266, 5441, 5560, 5751, 5881, 5945, 6059, 6233, 6300, 6350, 6415, 6580, 6738, 6804, 6885]}
+{"doc_id": "46193002", "revision_depth": "2", "before_revision": "Biography On January 6, 1932, Li Fanghua was born in Hong Kong. Because his father was a business partner in Hong Kong, he settled in Hong Kong. His father Li Jiong participated in the Revolution of 1911 in his early years and served as a major general of the Fourth Army of the National Revolutionary Army. In 1937, after the Lugouqiao Incident, in order to avoid Japanese invaders, they moved their family to Deqing County, Guangdong Province. In 1938, her mother took her elder brother, younger brother and her back to Hong Kong alone for the sake of her children\u2019s studies. One year later, she moved to Shanghai with her neighbors. Three years later, she moved to Beijing\u2019s grandmother\u2019s home. Beijing No. 56 Middle School). In 1947, her mother took her and her younger brother back to Guangzhou, and her fatherarranged for her to board the second grade of Peidao Girls\u2019 High School. In 1949, when he graduated from high school, Li Fanghua was sent to the Department of Physics of Lingnan University, and at the same time he was admitted to the Department of Astronomy of Sun Yat-sen University. In September, she entered Lingnan University. Because the teachers often use English to give lectures, she often consults English reference books after class, so she improves her English reading ability. In October, Guangzhou was liberated and public schools opened, and she transferred to the Department of Astronomy at Sun Yat-Sen University. But because of frequent suspension of classes and drumming and going to the street to do political propaganda, she wanted to change to a school with more studies. In 1950, Li Fanghua was admitted to the Department of Physics of Wuhan University and was still in the first year. In 1952, the state selected students from the second year of colleges and universities to take the exam for studying abroad in the Soviet Union. Wuhan University recommended Li Fanghua to take the exam and was admitted. In March, Li Fanghua entered the Preparatory Department of Beijing Russian Language School, specializing in Russian. In the autumn of the same year, I went to the Soviet Union and entered the Department of Physics of Leningrad University, a state university of the former Soviet Union. There were also three former students from the Department of Physics of Tsinghua University, Qing Chengrui, Gu Yifan and Huang Shengnian. In order to shorten the length of study, Li Fanghua and the four of them fought to transfer to the second grade together, and obtained the approval of the dean of the department. In 1955, Li Fanghua was in teacher Mi. Asia. Under the guidance of Rums (\u041c . \u0391.\u042f\u0443\u043c\u0448\u044c), he began to prepare his graduation thesis, the title of which was \"Study on Electron Diffraction of In-situ Evaporated Bismuth Metal Thin Films\". In 1956, Li Fanghua graduated from the Department of Physics of Leningrad University in the Soviet Union. In 1960, Shi Ruwei (then director of the Institute of Physics, Chinese Academy of Sciences) arranged for Li Fanghua to independently carry out electron diffraction research, so that she could take the scientific knowledge learned in the Soviet Union into China. \"Single crystal electron diffraction\" structure analysis research. In October 1982, Li Fanghua went to the Department of Applied Physics, Osaka University, Japan as a visiting scholar (until May 1983), and carried two new domestically produced minerals: Yellow River ore and bastnaesium ore, hoping to use Japanese super-high resolution There are new discoveries in domestic minerals by the electron microscope. In 1984, Li Fanghua's research group won the second prize of the Chinese Academy of Sciences Scientific and Technological Achievement Award with the project \"The establishment of lattice image and direct observation of crystal structure\". In 1991, Li Fanghua won the Ye Qisun Physics Prize of the Chinese Physical Society. In 1992, Li Fanghua won the Hashimoto First Jiro Award (personal award) from the Chinese Society of Electron Microscopy. In 1993, Li Fanghua was elected as an academician of the Chinese Academy of Sciences. In 1996, Li Fanghua served as the chairman of the Chinese Society of Electron Microscopy (until 2000). In 1998, Li Fanghua was elected as an academician of the Third World Academy of Sciences. In 2002, at the time of her 70th birthday, the academic journal \"Ultramicroscopy\" of the International Society for Electron Microscopy published a special issue to celebrate her. 20 years ago, working photos in the conference room of the Institute of Physics of the Chinese Academy of Sciences, with Academician Li Fanghua on the right and Academician Fan Haifu on the second. Fan Haifu is an academician of the Chinese Academy of Sciences and an academician of the Third World Academy of Sciences. He is also the husband of Academician Li Fanghua. On February 27 , 2003, Li Fanghua won the L'Or\u00e9al-UNESCO World Outstanding Female Scientist Achievement Award and was the first Chinese scientist to receive the award. In 2009, Li Fanghua won the He Liang He Li Foundation Science and Technology Progress Award; the monograph \"Electronic Crystallography and Image Processing\" written in the same year was published.On January 6 , 1932, Li Fanghua was born in Hong Kong. Because his father was a business partner in Hong Kong, he settled in Hong Kong. His father Li Jiong participated in the Revolution of 1911 in his early years and served as a major general of the Fourth Army of the National Revolutionary Army. In 1937, after the Lugouqiao Incident, in order to avoid Japanese invaders, they moved their family to Deqing County, Guangdong Province. In 1938, her mother took her elder brother, younger brother and her back to Hong Kong alone for the sake of her children\u2019s studies. One year later, she moved to Shanghai with her neighbors. Three years later, she moved to Beijing\u2019s grandmother\u2019s home. Beijing No. 56 Middle School ) . In 1947, her mother took her and her younger brother back to Guangzhou, and her father arranged for her to board the second grade of Peidao Girls\u2019 High School . In 1949, when he graduated from high school, Li Fanghua was sent to the Department of Physics of Lingnan University, and at the same time he was admitted to the Department of Astronomy of Sun Yat-sen University . In September, she entered Lingnan University. Because the teachers often use English to give lectures, she often consults English reference books after class, so she improves her English reading ability. In October, Guangzhou was liberated and public schools opened, and she transferred to the Department of Astronomy at Sun Yat-Sen University. But because of frequent suspension of classes and drumming and going to the street to do political propaganda, she wanted to change to a school with more studies. In 1950, Li Fanghua was admitted to the Department of Physics of Wuhan University and was still in the first year. In 1952, the state selected students from the second year of colleges and universities to take the exam for studying abroad in the Soviet Union. Wuhan Universityrecommended Li Fanghua to take the exam and was admitted. In March, Li Fanghua entered the Preparatory Department of Beijing Russian Language School, specializing in Russian. In the autumn of the same year, I went to the Soviet Union and entered the Department of Physics of Leningrad University, a state university of the former Soviet Union. There were also three former students from the Department of Physics of Tsinghua University, Qing Chengrui, Gu Yifan and Huang Shengnian. In order to shorten the length of study, Li Fanghua and the four of them fought to transfer to the second grade together, and obtained the approval of the dean of the department. In 1955, Li Fanghua was in teacher Mi. Asia. Under the guidance of Rums (\u041c.\u0391.\u042f\u0443\u043c\u0448\u044c), he began to prepare his graduation thesis, the title of which was \"Study on Electron Diffraction of In-situ Evaporated Bismuth Metal Thin Films\". In 1956, Li Fanghua graduated from the Department of Physics of Leningrad University in the Soviet Union. In 1960, Shi Ruwei ( then director of the Institute of Physics, Chinese Academy of Sciences) arranged for Li Fanghua to independently carry out electron diffraction research, so that she could take the scientific knowledge learned in the Soviet Union into China. \"Single crystal electron diffraction\" structure analysis research. In October 1982, Li Fanghua went to the Department of Applied Physics, Osaka University, Japan as a visiting scholar (until May 1983), and carried two new domestically produced minerals: Yellow River ore and bastnaesium ore, hoping to use Japanese super-high resolution There are new discoveries in domestic minerals by the electron microscope. In 1984, Li Fanghua's research group won the second prize of the Chinese Academy of Sciences Scientific and Technological Achievement Award with the project \"The establishment of lattice image and direct observation of crystal structure\". In 1991, Li Fanghua won the Ye Qisun Physics Prize of the Chinese Physical Society. In 1992, Li Fanghua won the Hashimoto First Jiro Award (personal award) from the Chinese Society of Electron Microscopy. In 1993, Li Fanghua was elected as an academician of the Chinese Academy of Sciences. In 1996, Li Fanghua served as the chairman of the Chinese Society of Electron Microscopy (until 2000). In 1998, Li Fanghua was elected as an academician of the Third World Academy of Sciences. In 2002, at the time of her 70th birthday, the academic journal \"Ultramicroscopy\" of the International Society for Electron Microscopy published a special issue to celebrate her. 20 years ago, working photos in the conference room of the Institute of Physics of the Chinese Academy of Sciences, with Academician Li Fanghua on the right and Academician Fan Haifu on the second. Fan Haifu is an academician of the Chinese Academy of Sciences and an academician of the Third World Academy of Sciences. He is also the husband of Academician Li Fanghua. On February 27 , 2003, Li Fanghua won the L'Or\u00e9al-UNESCO World Outstanding Female Scientist Achievement Award and was the first Chinese scientist to receive the award. In 2009, Li Fanghua won the He Liang He Li Foundation Science and Technology Progress Award; the monograph \"Electronic Crystallography and Image Processing\" written in the same year was published.On January 6, 1932, Li Fanghua was born in Hong Kong. Because his father was a business partner in Hong Kong, he settled in Hong Kong. His father Li Jiong participated in the Revolutionof 1911 in his early years and served as a major general of the Fourth Army of the National Revolutionary Army. In 1937, after the Lugouqiao Incident, in order to avoid Japanese invaders, they moved their family to Deqing County, Guangdong Province. In 1938, her mother took her elder brother, younger brother and her back to Hong Kong alone for the sake of her children\u2019s studies. One year later, she moved to Shanghai with her neighbors. Three years later, she moved to Beijing\u2019s grandmother\u2019s home. Beijing No. 56 Middle School). In 1947, her mother took her and her younger brother back to Guangzhou, and her father arranged for her to board the second grade of Peidao Girls\u2019 High School. In 1949, when he graduated from high school, Li Fanghua was sent to the Department of Physics of Lingnan University, and at the same time he was admitted to the Department of Astronomy of Sun Yat-sen University. In September, she entered Lingnan University. Because the teachers often use English to give lectures, she often consults English reference books after class, so she improves her English reading ability. In October, Guangzhou was liberated and public schools opened, and she transferred to the Department of Astronomy at Sun Yat-Sen University. But because of frequent suspension of classes and drumming and going to the street to do political propaganda, she wanted to change to a school with more studies. In 1950, Li Fanghua was admitted to the Department of Physics of Wuhan University and was still in the first year. In 1952, the state selected students from the second year of colleges and universities to take the exam for studying abroad in the Soviet Union. Wuhan University recommended Li Fanghua to take the exam and was admitted. In March, Li Fanghua entered the Preparatory Department of Beijing Russian Language School, specializing in Russian. In the autumn of the same year, I went to the Soviet Union and entered the Department of Physics of Leningrad University, a state university of the former Soviet Union. There were also three former students from the Department of Physics of Tsinghua University, Qing Chengrui, Gu Yifan and Huang Shengnian. In order to shorten the length of study, Li Fanghua and the four of them fought to transfer to the secod grade together, and obtained the approval of the dean of the department. In 1955, Li Fanghua was in teacher Mi. Asia. Under the guidance of Rums (\u041c.\u0391.\u042f\u0443\u043c\u0448\u044c), he began to prepare his graduation thesis, the title of which was \"Study on Electron Diffraction of In-situ Evaporated Bismuth Metal Thin Films\". In 1956, Li Fanghua graduated from the Department of Physics of Leningrad University in the Soviet Union. In 1960, Shi Ruwei (then director of the Institute of Physics, Chinese Academy of Sciences ) arranged for Li Fanghua to independently carry out electron diffraction research, so that she could take the scientific knowledge learned in the Soviet Union into China. \"Single crystal electron diffraction\" structure analysis research. In October 1982 , Li Fanghua went to the Department of Applied Physics, Osaka University, Japan as a visiting scholar (until May 1983), and carried two new domestically produced minerals: Yellow River ore and bastnaesium ore, hoping to use Japanese super-high resolution There are new discoveries in domestic minerals by the electron microscope. In 1984, Li Fanghua's research group won the second prize of the Chinese Academy of Sciences Scientific and Technological Achievement Award with the project \"The establishment of lattice image and direct observation of crystal structure\". In 1991, Li Fanghua won the Ye Qisun Physics Prize of the Chinese Physical Society. In 1992, Li Fanghua won the Hashimoto First Jiro Award (personal award) from the Chinese Society of Electron Microscopy. In 1993, Li Fanghua was elected as an academician of the Chinese Academy of Sciences. In 1996, Li Fanghua served as the chairman of the Chinese Society of Electron Microscopy (until 2000). In 1998, Li Fanghua was elected as an academician of the Third World Academy of Sciences. In 2002, at the time of her 70th birthday, the academic journal \"Ultramicroscopy\" of the International Society for Electron Microscopy published a special issue to celebrate her. 20 years ago, working photos in the conference room of the Institute of Physics of the Chinese Academy of Sciences , with Academician Li Fanghua on the right and Academician Fan Haifu on the second. Fan Haifu is an academician of the Chinese Academy of Sciences and an academician of the Third World Academy of Sciences . He is also the husband of Academician Li Fanghua. On February 27, 2003, Li Fanghua won the L'Or\u00e9al-UNESCO World Outstanding Female Scientist Achievement Awardand was the first Chinese scientist to receive the award. In 2009, Li Fanghua won the He Liang He Li Foundation Science and Technology Progress Award; the monograph \"Electronic Crystallography and Image Processing\" written in the same year was published . Personal life Li was married to fellow physicist Fan Haifu . Main Achievement Research Summary In 1985, Li Fanghua deduced a new and practical approximate analytical expression for high-resolution image intensity, established a practical image contrast theory, and solved the theoretical basis for the application of electronic crystallographic image processing in practice. Her research promotes the development of related disciplines and provides crystal structure information of new materials, which helps to draw the laws of the relationship between material properties, structure and technology. Her research content includes: (1) High-resolution electron microscopy and electronic crystallography In the early 1960s, Li Fanghua first carried out electron diffraction in China to determine the structure of a single crystal. In China, he determined the position of hydrogen atoms in the crystal for the first time. The relevant literature is still cited by foreign colleagues. In the 1970s, Li Fanghua and Fan Haifu cooperated to explore the combination of diffraction methods and high-resolution electron microscopy, and created a new image processing theory and technology in high-resolution electron microscopy. Later, she and her students established an unwinding processing technology based on the principle of maximum entropy. It provides an important way to determine the tiny crystal structure. It has been successfully applied to determine the crystal structure of materials such as high-temperature superconductors. While studying in Japan in the 1980s, Li Fanghua summarized new experimental rules and developed a method for determining the position of light atoms. On this basis, after returning to China, she proposed a new image contrast theory: \"pseudo-weak phase object approximation\". This theory clarified the relationship between image intensity and crystal thickness for the first time, and revealed the law of changes in the intensity of different atomic images. , Is the theoretical basis of the above-mentioned image processing technology. Under the guidance of this theory, Li Fanghua et al. observed lithium atoms in crystals for the first time experimentally. In addition, she participated in the early research of high-temperature superconducting materials by means of high-resolution electron microscopy, and was one of the first groups in the world to report the presence or absence of commensurate modulation structures of bismuth superconductors. (2) Quasi-crystal The research team led by Li Fanghua first discovered and reported the almost continuous transition process between quasicrystals and crystals, and she gave a theoretical explanation. Li Fanghua used the phase sub-strain field to derive some formulas reflecting the relationship between the quasicrystal and the crystal, and on this basis, proposed a new method to determine the structure of the quasicrystal, as well as the determination of the local phase sub-strain in the quasicrystal. method. And successfully applied to Al-Cu-Li and Al-Mn-Si quasicrystals. (3) Crystal defects For the newly developed field emission electron microscope, Li Fanghua proposed a new research direction for measuring crystal defects with atomic resolution. At present, she has successfully measured the 60-degree dislocation at the SiGe/Si epitaxial film interface into two incomplete dislocations of 90 degrees and 30 degrees, and a piece of stacking fault sandwiched between them. This is also the first report on the defect of atomic resolution at the interface of SiGe/Si epitaxial film .", "after_revision": "Biography Li was born in British Hong Kong on January 6, 1932, with her ancestral home in Deqing County, Guangdong . She had four brothers and one sister. Her father , Li Jiong () , was a major general in the National Revolutionary Army. Her mother, Liu Jiqing ( ) was a native of Beijing. Li spent her childhood in British Hong Kong, Beijing and Guangzhou. Li secondary studied at Fu Jen Girls' School () and Peidao Private Middle School (), then she was accepted to Lingnan Private University (now Sun Yat-sen University ). She was a graduate student in physics at Wuhan University . She also graduated from Leningrad University ( now Saint Petersburg State University) in 1956, where she majored in physics. After graduation, she applied for an internship in the Institute of Physics of the Chinese Academy of Sciences, and studied under . During the Cultural Revolution , she was sent to the May Seventh Cadre Schools to perform manual labour. She returned to the Chinese Academy of Sciences in 1973. From 1982 to 1983, she was a visiting scholar at Osaka University. She was elected a fellow of the Chinese Academy of Sciences in 1993 and a fellow of The World Academy of Sciences in 1998. In February 2003, she received the L'Or\u00e9al-UNESCO Awards for Women in Science Award . Li died on January 24, 2020 in Beijing. Personal life Li was married to fellow physicist Fan Haifu .", "edit_actions": [{"type": "R", "before": "On January 6, 1932, Li Fanghua", "after": "Li", "start_char_pos": 10, "end_char_pos": 40}, {"type": "R", "before": "Hong Kong. Because his father was a business partner in Hong Kong, he settled in Hong Kong. His father Li Jiong participated in the Revolution of 1911 in his early years and served as a major general of the Fourth Army of the National Revolutionary Army. In 1937, after the Lugouqiao Incident, in order to avoid Japanese invaders, they moved their family to", "after": "British Hong Kong on January 6, 1932, with her ancestral home in", "start_char_pos": 53, "end_char_pos": 410}, {"type": "D", "before": "Province. In 1938, her mother took her elder brother, younger brother and her back to Hong Kong alone for the sake of her children\u2019s studies. One year later, she moved to Shanghai with her neighbors. Three years later, she moved to Beijing\u2019s grandmother\u2019s home. Beijing No. 56 Middle School). In 1947, her mother took her and her younger brother back to Guangzhou, and her fatherarranged for her to board the second grade of Peidao Girls\u2019 High School. In 1949, when he graduated from high school, Li Fanghua was sent to the Department of Physics of Lingnan University, and at the same time he was admitted to the Department of Astronomy of Sun Yat-sen University. In September, she entered Lingnan University. Because the teachers often use English to give lectures, she often consults English reference books after class, so she improves her English reading ability. In October, Guangzhou was liberated and public schools opened, and she transferred to the Department of Astronomy at Sun Yat-Sen University. But because of frequent suspension of classes and drumming and going to the street to do political propaganda, she wanted to change to a school with more studies. In 1950, Li Fanghua was admitted to the Department of Physics of Wuhan University and was still in the first year. In 1952, the state selected students from the second year of colleges and universities to take the exam for studying abroad in the Soviet Union. Wuhan University recommended Li Fanghua to take the exam and was admitted. In March, Li Fanghua entered the Preparatory Department of Beijing Russian Language School, specializing in Russian. In the autumn of the same year, I went to the Soviet Union and entered the Department of Physics of Leningrad University, a state university of the former Soviet Union. There were also three former students from the Department of Physics of Tsinghua University, Qing Chengrui, Gu Yifan and Huang Shengnian. In order to shorten the length of study, Li Fanghua and the four of them fought to transfer to the second grade together, and obtained the approval of the dean of the department. In 1955, Li Fanghua was in teacher Mi. Asia. Under the guidance of Rums (\u041c", "after": null, "start_char_pos": 436, "end_char_pos": 2620}, {"type": "R", "before": "\u0391.\u042f\u0443\u043c\u0448\u044c), he began to prepare his graduation thesis, the title of which was \"Study on Electron Diffraction of In-situ Evaporated Bismuth Metal Thin Films\". In 1956, Li Fanghua graduated from the Department of Physics of Leningrad University in the Soviet Union. In 1960, Shi Ruwei (then director of the Institute of Physics, Chinese Academy of Sciences) arranged for Li Fanghua to independently carry out electron diffraction research, so that she could take the scientific knowledge learned in the Soviet Union into China. \"Single crystal electron diffraction\" structure analysis research. In October 1982, Li Fanghua went to the Department of Applied Physics, Osaka University, Japan as a visiting scholar (until May 1983), and carried two new domestically produced minerals: Yellow River ore and bastnaesium ore, hoping to use Japanese super-high resolution There are new discoveries in domestic minerals by the electron microscope. In 1984, Li Fanghua's research group won the second prize of the Chinese Academy of Sciences Scientific and Technological Achievement Award with the project \"The establishment of lattice image and direct observation of crystal structure\". In 1991, Li Fanghua won the Ye Qisun Physics Prize of the Chinese Physical Society. In 1992, Li Fanghua won the Hashimoto First Jiro Award (personal award) from the Chinese Society of Electron Microscopy. In 1993, Li Fanghua was elected as an academician of the Chinese Academy of Sciences. In 1996, Li Fanghua served as the chairman of the Chinese Society of Electron Microscopy (until 2000). In 1998, Li Fanghua was elected as an academician of the Third World Academy of Sciences. In 2002, at the time of her 70th birthday, the academic journal \"Ultramicroscopy\" of the International Society for Electron Microscopy published a special issue to celebrate her. 20 years ago, working photos in the conference room of the Institute of Physics of the Chinese Academy of Sciences, with Academician Li Fanghua on the right and Academician Fan Haifu on the second. Fan Haifu is an academician of the Chinese Academy of Sciences and an academician of the Third World Academy of Sciences. He is also the husband of Academician Li Fanghua. On February 27", "after": "She had four brothers and one sister. Her father", "start_char_pos": 2623, "end_char_pos": 4845}, {"type": "R", "before": "2003, Li Fanghua won the L'Or\u00e9al-UNESCO World Outstanding Female Scientist Achievement Award and was the first Chinese scientist to receive the award. In 2009, Li Fanghua won the He Liang He Li Foundation Science and Technology Progress Award; the monograph \"Electronic Crystallography and Image Processing\" written in the same year was published.On January 6", "after": "Li Jiong ()", "start_char_pos": 4848, "end_char_pos": 5207}, {"type": "R", "before": "1932, Li Fanghua was born in Hong Kong. Because his father was a business partner in Hong Kong, he settled in Hong Kong. His father Li Jiong participated in the Revolution of 1911 in his early years and served as a major general of the Fourth Army of the National Revolutionary Army. In 1937, after the Lugouqiao Incident, in order to avoid Japanese invaders, they moved their family to Deqing County, Guangdong Province. In 1938, her mother took her elder brother, younger brother and her back to Hong Kong alone for the sake of her children\u2019s studies. One year later, she moved to Shanghai with her neighbors. Three years later, she moved to Beijing\u2019s grandmother\u2019s home. Beijing No. 56 Middle School", "after": "was a major general in the National Revolutionary Army. Her mother, Liu Jiqing (", "start_char_pos": 5210, "end_char_pos": 5912}, {"type": "R", "before": ". In 1947, her mother took her and her younger brother back to Guangzhou, and her father arranged for her to board the second grade of Peidao Girls\u2019 High School . In 1949, when he graduated from high school, Li Fanghua was sent to the Department of Physics of Lingnan University, and at the same time he was admitted to the Department of Astronomy of", "after": "was a native of Beijing. Li spent her childhood in British Hong Kong, Beijing and Guangzhou.", "start_char_pos": 5915, "end_char_pos": 6265}, {"type": "A", "before": null, "after": "Li secondary studied at Fu Jen Girls' School () and Peidao Private Middle School (), then she was accepted to Lingnan Private University (now", "start_char_pos": 6266, "end_char_pos": 6266}, {"type": "A", "before": null, "after": "). She was a graduate student in physics at Wuhan University", "start_char_pos": 6290, "end_char_pos": 6290}, {"type": "R", "before": "In September, she entered Lingnan University. Because the teachers often use English to give lectures, she often consults English reference books after class, so she improves her English reading ability. In October, Guangzhou was liberated and public schools opened, and she transferred to the Department of Astronomy at Sun Yat-Sen University. But because of frequent suspension of classes and drumming and going to the street to do political propaganda, she wanted to change to a school with more studies. In 1950, Li Fanghua was admitted to the Department of Physics of Wuhan University and was still in the first year. In 1952, the state selected students from the second year of colleges and universities to take the exam for studying abroad in the Soviet Union. Wuhan Universityrecommended Li Fanghua to take the exam and was admitted. In March, Li Fanghua entered the Preparatory Department of Beijing Russian Language School, specializing in Russian. In the autumn of the same year, I went to the Soviet Union and entered the Department of Physics of Leningrad University, a state university of the former Soviet Union. There were also three former students from the Department of Physics of Tsinghua University, Qing Chengrui, Gu Yifan and Huang Shengnian. In order to shorten the length of study, Li Fanghua and the four of them fought to transfer to the second grade together, and obtained the approval of the dean of the department. In 1955, Li Fanghua was in teacher Mi. Asia. Under the guidance of Rums (\u041c.\u0391.\u042f\u0443\u043c\u0448\u044c), he began to prepare his graduation thesis, the title of which was \"Study on Electron Diffraction of In-situ Evaporated Bismuth Metal Thin Films\". In 1956, Li Fanghua graduated from the Department of Physics of Leningrad University in the Soviet Union. In 1960, Shi Ruwei ( then director of the Institute of Physics, Chinese Academy of Sciences) arranged for Li Fanghua to independently carry out electron diffraction research, so that she could take the scientific knowledge learned in the Soviet Union into China. \"Single crystal electron diffraction\" structure analysis research. In October 1982, Li Fanghua went to the Department of Applied Physics, Osaka University, Japan as a visiting scholar (until May 1983), and carried two new domestically produced minerals: Yellow River ore and bastnaesium ore, hoping to use Japanese super-high resolution There are new discoveries in domestic minerals by the electron microscope. In 1984, Li Fanghua's research group won the second prize of the Chinese Academy of Sciences Scientific and Technological Achievement Award with the project \"The establishment of lattice image and direct observation of crystal structure\". In 1991, Li Fanghua won the Ye Qisun Physics Prize of the Chinese Physical Society. In 1992, Li Fanghua won the Hashimoto First Jiro Award (personal award) from the Chinese Society of Electron Microscopy. In 1993, Li Fanghua was elected as an academician of the Chinese Academy of Sciences. In 1996, Li Fanghua served as the chairman of the Chinese Society of Electron Microscopy (until 2000). In 1998, Li Fanghua was elected as an academician of the Third World Academy of Sciences. In 2002, at the time of her 70th birthday, the academic journal \"Ultramicroscopy\" of the International Society for Electron Microscopy published a special issue to celebrate her. 20 years ago, working photos in the conference room of the", "after": "She also graduated from Leningrad University ( now Saint Petersburg State University) in 1956, where she majored in physics. After graduation, she applied for an internship in the", "start_char_pos": 6293, "end_char_pos": 9710}, {"type": "R", "before": "with Academician Li Fanghua on the right and Academician Fan Haifu on the second. Fan Haifu is an academician of the Chinese Academy of Sciences and an academician of the Third World Academy of Sciences. He is also the husband of Academician Li Fanghua. On February 27", "after": "and studied under .", "start_char_pos": 9768, "end_char_pos": 10036}, {"type": "A", "before": null, "after": "During the Cultural Revolution", "start_char_pos": 10037, "end_char_pos": 10037}, {"type": "R", "before": "2003, Li Fanghua won the L'Or\u00e9al-UNESCO World Outstanding Female Scientist Achievement Award and was the first Chinese scientist to receive the award. In 2009, Li Fanghua won the He Liang He Li Foundation Science and Technology Progress Award; the monograph \"Electronic Crystallography and Image Processing\" written in the same year was published.On January 6, 1932, Li Fanghua was born in Hong Kong. Because his father was a business partner in Hong Kong, he settled in Hong Kong. His father Li Jiong participated in the Revolutionof 1911 in his early years and served as a major general of the Fourth Army of the National Revolutionary Army. In 1937, after the Lugouqiao Incident, in order to avoid Japanese invaders, they moved their family to Deqing County, Guangdong Province. In 1938, her mother took her elder brother, younger brother and her back to Hong Kong alone for the sake of her children\u2019s studies. One year later, she moved to Shanghai with her neighbors. Three years later, she moved to Beijing\u2019s grandmother\u2019s home. Beijing No. 56 Middle School). In 1947, her mother took her and her younger brother back to Guangzhou, and her father arranged for her to board the second grade of Peidao Girls\u2019 High School. In 1949, when he graduated from high school, Li Fanghua", "after": "she", "start_char_pos": 10040, "end_char_pos": 11320}, {"type": "R", "before": "Department of Physics of Lingnan University, and at the same time he was admitted to the Department of Astronomy of Sun Yat-sen University. In September, she entered Lingnan University. Because the teachers often use English to give lectures, she often consults English reference books after class, so she improves her English reading ability. In October, Guangzhou was liberated and public schools opened, and she transferred to the Department of Astronomy at Sun Yat-Sen University. But because of frequent suspension of classes and drumming and going to the street to do political propaganda, she wanted to change to a school with more studies. In 1950, Li Fanghua was admitted to the Department of Physics of Wuhan University and was still in the first year. In 1952, the state selected students from the second year of colleges and universities to take the exam for studying abroad in the Soviet Union. Wuhan University recommended Li Fanghua to take the exam and was admitted. In March, Li Fanghua entered the Preparatory Department of Beijing Russian Language School, specializing in Russian. In the autumn of the same year, I went to the Soviet Union and entered the Department of Physics of Leningrad University, a state university of the former Soviet Union. There were also three former students from the Department of Physics of Tsinghua University, Qing Chengrui, Gu Yifan and Huang Shengnian. In order to shorten the length of study, Li Fanghua and the four of them fought to transfer to the secod grade together, and obtained the approval of the dean of the department. In 1955, Li Fanghua was in teacher Mi. Asia. Under the guidance of Rums (\u041c.\u0391.\u042f\u0443\u043c\u0448\u044c), he began to prepare his graduation thesis, the title of which was \"Study on Electron Diffraction of In-situ Evaporated Bismuth Metal Thin Films\". In 1956, Li Fanghua graduated from the Department of Physics of Leningrad University in the Soviet Union. In 1960, Shi Ruwei (then director of the Institute of Physics,", "after": "May Seventh Cadre Schools to perform manual labour. She returned to the", "start_char_pos": 11337, "end_char_pos": 13321}, {"type": "R", "before": ") arranged for Li Fanghua to independently carry out electron diffraction research, so that she could take the scientific knowledge learned in the Soviet Union into China. \"Single crystal electron diffraction\" structure analysis research. In October", "after": "in 1973. From", "start_char_pos": 13350, "end_char_pos": 13599}, {"type": "R", "before": ", Li Fanghua went to the Department of Applied Physics, Osaka University, Japan as", "after": "to 1983, she was", "start_char_pos": 13605, "end_char_pos": 13687}, {"type": "R", "before": "(until May 1983), and carried two new domestically produced minerals: Yellow River ore and bastnaesium ore, hoping to use Japanese super-high resolution There are new discoveries in domestic minerals by the electron microscope. In 1984, Li Fanghua's research group won the second prize of the Chinese Academy of Sciences Scientific and Technological Achievement Award with the project \"The establishment of lattice image and direct observation of crystal structure\". In 1991, Li Fanghua won the Ye Qisun Physics Prize of the Chinese Physical Society. In 1992, Li Fanghua won the Hashimoto First Jiro Award (personal award) from the Chinese Society of Electron Microscopy. In 1993, Li Fanghua was elected as an academician of the Chinese Academy of Sciences. In 1996, Li Fanghua served as the chairman of the Chinese Society of Electron Microscopy (until 2000). In 1998, Li Fanghua was elected as an academician of the Third World Academy of Sciences. In 2002, at the time of her 70th birthday, the academic journal \"Ultramicroscopy\" of the International Society for Electron Microscopy published a special issue to celebrate her. 20 years ago, working photos in the conference room of the Institute of Physics of the", "after": "at Osaka University.", "start_char_pos": 13707, "end_char_pos": 14923}, {"type": "A", "before": null, "after": "She was elected a fellow of the", "start_char_pos": 14924, "end_char_pos": 14924}, {"type": "R", "before": ", with Academician Li Fanghua on the right and Academician Fan Haifu on the second. Fan Haifu is an academician of the Chinese Academy of Sciences and an academician of the Third", "after": "in 1993 and a fellow of The", "start_char_pos": 14953, "end_char_pos": 15131}, {"type": "R", "before": ". He is also the husband of Academician Li Fanghua. On February 27,", "after": "in 1998. In February", "start_char_pos": 15158, "end_char_pos": 15225}, {"type": "R", "before": "Li Fanghua won", "after": "she received", "start_char_pos": 15232, "end_char_pos": 15246}, {"type": "R", "before": "World Outstanding Female Scientist Achievement Awardand was the first Chinese scientist to receive the award. In 2009, Li Fanghua won the He Liang He Li Foundation Science and Technology Progress Award; the monograph \"Electronic Crystallography and Image Processing\" written in the same year was published", "after": "Awards for Women in Science Award", "start_char_pos": 15266, "end_char_pos": 15571}, {"type": "A", "before": null, "after": "Li died on January 24, 2020 in Beijing.", "start_char_pos": 15574, "end_char_pos": 15574}, {"type": "D", "before": ".", "after": null, "start_char_pos": 15634, "end_char_pos": 15635}, {"type": "D", "before": "Main Achievement Research Summary In 1985, Li Fanghua deduced a new and practical approximate analytical expression for high-resolution image intensity, established a practical image contrast theory, and solved the theoretical basis for the application of electronic crystallographic image processing in practice. Her research promotes the development of related disciplines and provides crystal structure information of new materials, which helps to draw the laws of the relationship between material properties, structure and technology. Her research content includes: (1) High-resolution electron microscopy and electronic crystallography In the early 1960s, Li Fanghua first carried out electron diffraction in China to determine the structure of a single crystal. In China, he determined the position of hydrogen atoms in the crystal for the first time. The relevant literature is still cited by foreign colleagues. In the 1970s, Li Fanghua and Fan Haifu cooperated to explore the combination of diffraction methods and high-resolution electron microscopy, and created a new image processing theory and technology in high-resolution electron microscopy. Later, she and her students established an unwinding processing technology based on the principle of maximum entropy. It provides an important way to determine the tiny crystal structure. It has been successfully applied to determine the crystal structure of materials such as high-temperature superconductors. While studying in Japan in the 1980s, Li Fanghua summarized new experimental rules and developed a method for determining the position of light atoms. On this basis, after returning to China, she proposed a new image contrast theory: \"pseudo-weak phase object approximation\". This theory clarified the relationship between image intensity and crystal thickness for the first time, and revealed the law of changes in the intensity of different atomic images. , Is the theoretical basis of the above-mentioned image processing technology. Under the guidance of this theory, Li Fanghua et al. observed lithium atoms in crystals for the first time experimentally. In addition, she participated in the early research of high-temperature superconducting materials by means of high-resolution electron microscopy, and was one of the first groups in the world to report the presence or absence of commensurate modulation structures of bismuth superconductors. (2) Quasi-crystal The research team led by Li Fanghua first discovered and reported the almost continuous transition process between quasicrystals and crystals, and she gave a theoretical explanation. Li Fanghua used the phase sub-strain field to derive some formulas reflecting the relationship between the quasicrystal and the crystal, and on this basis, proposed a new method to determine the structure of the quasicrystal, as well as the determination of the local phase sub-strain in the quasicrystal. method. And successfully applied to Al-Cu-Li and Al-Mn-Si quasicrystals. (3) Crystal defects For the newly developed field emission electron microscope, Li Fanghua proposed a new research direction for measuring crystal defects with atomic resolution. At present, she has successfully measured the 60-degree dislocation at the SiGe/Si epitaxial film interface into two incomplete dislocations of 90 degrees and 30 degrees, and a piece of stacking fault sandwiched between them. This is also the first report on the defect of atomic resolution at the interface of SiGe/Si epitaxial film", "after": null, "start_char_pos": 15636, "end_char_pos": 19150}], "sents_char_pos": [0, 63, 144, 307, 445, 577, 635, 697, 728, 887, 1099, 1145, 1303, 1444, 1607, 1722, 1867, 1942, 2059, 2228, 2366, 2545, 2590, 2778, 2884, 3146, 3213, 3558, 3797, 3881, 4002, 4088, 4191, 4281, 4460, 4658, 4780, 4830, 4998, 5091, 5195, 5249, 5330, 5493, 5631, 5763, 5821, 5883, 6077, 6292, 6338, 6496, 6637, 6800, 6915, 7060, 7134, 7251, 7420, 7558, 7737, 7782, 7968, 8074, 8337, 8404, 8749, 8988, 9072, 9193, 9279, 9382, 9472, 9651, 9849, 9971, 10021, 10190, 10283, 10387, 10440, 10521, 10683, 10821, 10953, 11011, 11073, 11104, 11264, 11476, 11522, 11680, 11821, 11984, 12099, 12244, 12319, 12436, 12605, 12743, 12921, 12966, 13152, 13258, 13521, 13588, 13934, 14173, 14257, 14378, 14464, 14567, 14657, 14836, 15036, 15159, 15209, 15375, 15468, 15635, 15949, 16175, 16404, 16494, 16556, 16794, 16912, 16982, 17105, 17256, 17381, 17563, 17642, 17765, 18057, 18258, 18572, 18637, 18816, 19042]}
+{"doc_id": "46193002", "revision_depth": "3", "before_revision": "Biography Li was born in British Hong Kongon January 6, 1932 , with her ancestral home in Deqing County, Guangdong. She had four brothers and one sister. Her father , Li Jiong (), was a major general in the National Revolutionary Army. Her mother, Liu Jiqing () was a native of Beijing. Li spent her childhood in British Hong Kong , Beijing and Guangzhou. Li secondary studied at Fu Jen Girls' School()and Peidao Private Middle School(), then she was accepted to Lingnan Private University(now Sun Yat-sen University ). She was a graduate student in physics at Wuhan University . She also graduated from Leningrad University( now Saint Petersburg State University)in 1956, where she majored in physics. After graduation, she applied for an internship in the Institute of Physics of the Chinese Academy of Sciences , and studied under . During the Cultural Revolution, she was sent to the May Seventh Cadre Schools to perform manual labour. She returned to the Chinese Academy of Sciences in 1973. From 1982 to 1983, she was a visiting scholar at Osaka University . She was elected a fellow of the Chinese Academy of Sciences in 1993 and a fellow of The World Academy of Sciences in 1998. In February 2003, she received the L'Or\u00e9al-UNESCO Awards for Women in Science Award . Li died on January 24, 2020 in Beijing . Personal life Li was married to fellow physicist Fan Haifu .", "after_revision": "Biography On January 6, 1932 , Li Fanghua was born in Hong Kong. Because his father was a business partner in Hong Kong, he settled in Hong Kong. His father Li Jiong participated in the Revolution of 1911 in his early years and served as a major general of the Fourth Army of the National Revolutionary Army. In 1937, after the Lugouqiao Incident, in order to avoid Japanese invaders, they moved their family to Deqing County, Guangdong Province. In 1938, her mother took her elder brother, younger brother and her back to Hong Kong alone for the sake of her children\u2019s studies. One year later, she moved to Shanghai with her neighbors. Three years later, she moved to Beijing\u2019s grandmother\u2019s home. Beijing No. 56 Middle School). In 1947, her mother took her and her younger brother back to Guangzhou, and her father arranged for her to board the second grade of Peidao Girls\u2019 High School. In 1949, when he graduated from high school, Li Fanghua was sent to the Department of Physics of Lingnan University, and at the same time he was admitted to the Department of Astronomy of Sun Yat-sen University . In September, she entered Lingnan University. Because the teachers often use English to give lectures, she often consults English reference books after class, so she improves her English reading ability. In October, Guangzhou was liberated and public schools opened, and she transferred to the Department of Astronomy at Sun Yat-Sen University. But because of frequent suspension of classes and drumming and going to the street to do political propaganda, she wanted to change to a school with more studies. In 1950, Li Fanghua was admitted to the Department of Physics of Wuhan University and was still in the first year. In 1952, the state selected students from the second year of colleges and universities to take the exam for studying abroad in the Soviet Union. Wuhan University recommended Li Fanghua to take the exam and was admitted. In March, Li Fanghua entered the Preparatory Department of Beijing Russian Language School, specializing in Russian. In the autumn of the same year, I went to the Soviet Union and entered the Department of Physics of Leningrad University, a state university of the former Soviet Union. There were also three former students from the Department of Physics of Tsinghua University, Qing Chengrui, Gu Yifan and Huang Shengnian. In order to shorten the length of study, Li Fanghua and the four of them fought to transfer to the second grade together, and obtained the approval of the dean of the department. In 1955, Li Fanghua was in teacher Mi. Asia. Under the guidance of Rums (\u041c.\u0391.\u042f\u0443\u043c\u0448\u044c), he began to prepare his graduation thesis, the title of which was \"Study on Electron Diffraction of In-situ Evaporated Bismuth Metal Thin Films\". In 1956, Li Fanghua graduated from the Department of Physics of Leningrad University in the Soviet Union. In 1960, Shi Ruwei (then director of the Institute of Physics , Chinese Academy of Sciences ) arranged for Li Fanghua to independently carry out electron diffraction research, so that she could take the scientific knowledge learned in the Soviet Union into China. \"Single crystal electron diffraction\" structure analysis research. In October 1982, Li Fanghua went to the Department of Applied Physics, Osaka University, Japan as a visiting scholar (until May 1983), and carried two new domestically produced minerals: Yellow River ore and bastnaesium ore, hoping to use Japanese super-high resolution There are new discoveries in domestic minerals by the electron microscope. In 1984, Li Fanghua's research group won the second prize of the Chinese Academy of Sciences Scientific and Technological Achievement Award with the project \"The establishment of lattice image and direct observation of crystal structure\" . In 1991, Li Fanghua won the Ye Qisun Physics Prize of the Chinese Physical Society. In 1992, Li Fanghua won the Hashimoto First Jiro Award (personal award) from the Chinese Society of Electron Microscopy. In 1993, Li Fanghua was elected as an academician of the Chinese Academy of Sciences. In 1996, Li Fanghua served as the chairman of the Chinese Society of Electron Microscopy (until 2000). In 1998, Li Fanghua was elected as an academician of the Third World Academy of Sciences. In 2002, at the time of her 70th birthday, the academic journal \"Ultramicroscopy\" of the International Society for Electron Microscopy published a special issue to celebrate her. 20 years ago, working photos in the conference room of the Institute of Physics of the Chinese Academy of Sciences , with Academician Li Fanghua on the right and Academician Fan Haifu on the second. Fan Haifu is an academician of the Chinese Academy of Sciences and an academician of the Third World Academy of Sciences . He is also the husband of Academician Li Fanghua. On February 27, 2003, Li Fanghua won the L'Or\u00e9al-UNESCO World Outstanding Female Scientist Achievement Award and was the first Chinese scientist to receive the award . In 2009, Li Fanghua won the He Liang He Li Foundation Science and Technology Progress Award; the monograph \"Electronic Crystallography and Image Processing\" written in the same year was published . Personal life Li was married to fellow physicist Fan Haifu . Main achievement Research Summary In 1985, Li Fanghua deduced a new and practical approximate analytical expression for high-resolution image intensity, established a practical image contrast theory, and solved the theoretical basis for the application of electronic crystallographic image processing in practice. Her research promotes the development of related disciplines and provides crystal structure information of new materials, which helps to draw the laws of the relationship between material properties, structure and technology. Her research content includes: (1) High-resolution electron microscopy and electronic crystallography In the early 1960s, Li Fanghua first carried out electron diffraction in China to determine the structure of a single crystal. In China, he determined the position of hydrogen atoms in the crystal for the first time. The relevant literature is still cited by foreign colleagues. In the 1970s, Li Fanghua and Fan Haifu cooperated to explore the combination of diffraction methods and high-resolution electron microscopy, and created a new image processing theory and technology in high-resolution electron microscopy. Later, she and her students established an unwinding processing technology based on the principle of maximum entropy. It provides an important way to determine the tiny crystal structure. It has been successfully applied to determine the crystal structure of materials such as high-temperature superconductors. While studying in Japan in the 1980s, Li Fanghua summarized new experimental rules and developed a method for determining the position of light atoms. On this basis, after returning to China, she proposed a new image contrast theory: \"pseudo-weak phase object approximation\". This theory clarified the relationship between image intensity and crystal thickness for the first time, and revealed the law of changes in the intensity of different atomic images. , Is the theoretical basis of the above-mentioned image processing technology. Under the guidance of this theory, Li Fanghua et al. observed lithium atoms in crystals for the first time experimentally. In addition, she participated in the early research of high-temperature superconducting materials by means of high-resolution electron microscopy, and was one of the first groups in the world to report the presence or absence of commensurate modulation structures of bismuth superconductors. (2) Quasi-crystal The research team led by Li Fanghua first discovered and reported the almost continuous transition process between quasicrystals and crystals, and she gave a theoretical explanation. Li Fanghua used the phase sub-strain field to derive some formulas reflecting the relationship between the quasicrystal and the crystal, and on this basis, proposed a new method to determine the structure of the quasicrystal, as well as the determination of the local phase sub-strain in the quasicrystal. method. And successfully applied to Al-Cu-Li and Al-Mn-Si quasicrystals. (3) Crystal defects For the newly developed field emission electron microscope, Li Fanghua proposed a new research direction for measuring crystal defects with atomic resolution. At present, she has successfully measured the 60-degree dislocation at the SiGe/Si epitaxial film interface into two incomplete dislocations of 90 degrees and 30 degrees, and a piece of stacking fault sandwiched between them. This is also the first report on the defect of atomic resolution at the interface of SiGe/Si epitaxial film .", "edit_actions": [{"type": "R", "before": "Li was born in British Hong Kongon January", "after": "On January", "start_char_pos": 10, "end_char_pos": 52}, {"type": "R", "before": ", with her ancestral home in Deqing County, Guangdong. She had four brothers and one sister. Her father , Li Jiong (), was", "after": ", Li Fanghua was born in Hong Kong. Because his father was a business partner in Hong Kong, he settled in Hong Kong. His father Li Jiong participated in the Revolution of 1911 in his early years and served as", "start_char_pos": 61, "end_char_pos": 183}, {"type": "R", "before": "in the", "after": "of the Fourth Army of the", "start_char_pos": 200, "end_char_pos": 206}, {"type": "D", "before": "Her mother, Liu Jiqing () was a native of Beijing. Li spent her childhood in British Hong Kong , Beijing and Guangzhou.", "after": null, "start_char_pos": 236, "end_char_pos": 355}, {"type": "R", "before": "Li secondary studied at Fu Jen Girls' School()and Peidao Private Middle School(), then she was accepted to Lingnan Private University(now", "after": "In 1937, after the Lugouqiao Incident, in order to avoid Japanese invaders, they moved their family to Deqing County, Guangdong Province.", "start_char_pos": 356, "end_char_pos": 493}, {"type": "A", "before": null, "after": "In 1938, her mother took her elder brother, younger brother and her back to Hong Kong alone for the sake of her children\u2019s studies. One year later, she moved to Shanghai with her neighbors. Three years later, she moved to Beijing\u2019s grandmother\u2019s home. Beijing No. 56 Middle School).", "start_char_pos": 494, "end_char_pos": 494}, {"type": "A", "before": null, "after": "In 1947, her mother took her and her younger brother back to Guangzhou, and her father arranged for her to board the second grade of Peidao Girls\u2019 High School.", "start_char_pos": 495, "end_char_pos": 495}, {"type": "A", "before": null, "after": "In 1949, when he graduated from high school, Li Fanghua was sent to the Department of Physics of Lingnan University, and at the same time he was admitted to the Department of Astronomy of", "start_char_pos": 496, "end_char_pos": 496}, {"type": "D", "before": "). She was a graduate student in physics at Wuhan University", "after": null, "start_char_pos": 520, "end_char_pos": 580}, {"type": "R", "before": "She also graduated from Leningrad University( now Saint Petersburg State University)in", "after": "In September, she entered Lingnan University. Because the teachers often use English to give lectures, she often consults English reference books after class, so she improves her English reading ability. In October, Guangzhou was liberated and public schools opened, and she transferred to the Department of Astronomy at Sun Yat-Sen University. But because of frequent suspension of classes and drumming and going to the street to do political propaganda, she wanted to change to a school with more studies.", "start_char_pos": 583, "end_char_pos": 669}, {"type": "A", "before": null, "after": "In 1950, Li Fanghua was admitted to the Department of Physics of Wuhan University and was still in the first year.", "start_char_pos": 670, "end_char_pos": 670}, {"type": "A", "before": null, "after": "In 1952, the state selected students from the second year of colleges and universities to take the exam for studying abroad in the Soviet Union. Wuhan University recommended Li Fanghua to take the exam and was admitted. In March, Li Fanghua entered the Preparatory Department of Beijing Russian Language School, specializing in Russian. In the autumn of the same year, I went to the Soviet Union and entered the Department of Physics of Leningrad University, a state university of the former Soviet Union. There were also three former students from the Department of Physics of Tsinghua University, Qing Chengrui, Gu Yifan and Huang Shengnian. In order to shorten the length of study, Li Fanghua and the four of them fought to transfer to the second grade together, and obtained the approval of the dean of the department.", "start_char_pos": 671, "end_char_pos": 671}, {"type": "A", "before": null, "after": "In 1955, Li Fanghua was in teacher Mi. Asia. Under the guidance of Rums (\u041c.\u0391.\u042f\u0443\u043c\u0448\u044c), he began to prepare his graduation thesis, the title of which was \"Study on Electron Diffraction of In-situ Evaporated Bismuth Metal Thin Films\".", "start_char_pos": 672, "end_char_pos": 672}, {"type": "A", "before": null, "after": "In", "start_char_pos": 673, "end_char_pos": 673}, {"type": "R", "before": "where she majored in physics. After graduation, she applied for an internship in", "after": "Li Fanghua graduated from the Department of Physics of Leningrad University in the Soviet Union.", "start_char_pos": 680, "end_char_pos": 760}, {"type": "A", "before": null, "after": "In 1960, Shi Ruwei (then director of", "start_char_pos": 761, "end_char_pos": 761}, {"type": "R", "before": "of the", "after": ",", "start_char_pos": 787, "end_char_pos": 793}, {"type": "R", "before": ", and studied under .", "after": ") arranged for Li Fanghua to independently carry out electron diffraction research, so that she could take the scientific knowledge learned in the Soviet Union into China. \"Single crystal electron diffraction\" structure analysis research.", "start_char_pos": 822, "end_char_pos": 843}, {"type": "R", "before": "During the Cultural Revolution, she was sent to the May Seventh Cadre Schools to perform manual labour. She returned to the", "after": "In October 1982, Li Fanghua went to the Department of Applied Physics, Osaka University, Japan as a visiting scholar (until May 1983), and carried two new domestically produced minerals: Yellow River ore and bastnaesium ore, hoping to use Japanese super-high resolution There are new discoveries in domestic minerals by the electron microscope.", "start_char_pos": 844, "end_char_pos": 967}, {"type": "A", "before": null, "after": "In 1984, Li Fanghua's research group won the second prize of the", "start_char_pos": 968, "end_char_pos": 968}, {"type": "R", "before": "in 1973. From 1982 to 1983, she was a visiting scholar at Osaka University", "after": "Scientific and Technological Achievement Award with the project \"The establishment of lattice image and direct observation of crystal structure\"", "start_char_pos": 997, "end_char_pos": 1071}, {"type": "R", "before": "She was elected a fellow of the", "after": "In 1991, Li Fanghua won the Ye Qisun Physics Prize of the Chinese Physical Society.", "start_char_pos": 1074, "end_char_pos": 1105}, {"type": "A", "before": null, "after": "In 1992, Li Fanghua won the Hashimoto First Jiro Award (personal award) from the Chinese Society of Electron Microscopy.", "start_char_pos": 1106, "end_char_pos": 1106}, {"type": "A", "before": null, "after": "In 1993, Li Fanghua was elected as an academician of the Chinese Academy of Sciences.", "start_char_pos": 1107, "end_char_pos": 1107}, {"type": "A", "before": null, "after": "In 1996, Li Fanghua served as the chairman of the Chinese Society of Electron Microscopy (until 2000).", "start_char_pos": 1108, "end_char_pos": 1108}, {"type": "A", "before": null, "after": "In 1998, Li Fanghua was elected as an academician of the Third World Academy of Sciences.", "start_char_pos": 1109, "end_char_pos": 1109}, {"type": "A", "before": null, "after": "In 2002, at the time of her 70th birthday, the academic journal \"Ultramicroscopy\" of the International Society for Electron Microscopy published a special issue to celebrate her. 20 years ago, working photos in the conference room of the Institute of Physics of the", "start_char_pos": 1110, "end_char_pos": 1110}, {"type": "R", "before": "in 1993 and a fellow of The", "after": ", with Academician Li Fanghua on the right and Academician Fan Haifu on the second. Fan Haifu is an academician of the Chinese Academy of Sciences and an academician of the Third", "start_char_pos": 1139, "end_char_pos": 1166}, {"type": "R", "before": "in 1998. In February", "after": ". He is also the husband of Academician Li Fanghua.", "start_char_pos": 1193, "end_char_pos": 1213}, {"type": "A", "before": null, "after": "On February 27,", "start_char_pos": 1214, "end_char_pos": 1214}, {"type": "R", "before": "she received", "after": "Li Fanghua won", "start_char_pos": 1221, "end_char_pos": 1233}, {"type": "R", "before": "Awards for Women in Science Award", "after": "World Outstanding Female Scientist Achievement Award and was the first Chinese scientist to receive the award", "start_char_pos": 1253, "end_char_pos": 1286}, {"type": "R", "before": "Li died on January 24, 2020 in Beijing", "after": "In 2009, Li Fanghua won the He Liang He Li Foundation Science and Technology Progress Award; the monograph \"Electronic Crystallography and Image Processing\" written in the same year was published", "start_char_pos": 1289, "end_char_pos": 1327}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1389, "end_char_pos": 1389}, {"type": "A", "before": null, "after": "Main achievement Research Summary", "start_char_pos": 1390, "end_char_pos": 1390}, {"type": "A", "before": null, "after": "In 1985, Li Fanghua deduced a new and practical approximate analytical expression for high-resolution image intensity, established a practical image contrast theory, and solved the theoretical basis for the application of electronic crystallographic image processing in practice. Her research promotes the development of related disciplines and provides crystal structure information of new materials, which helps to draw the laws of the relationship between material properties, structure and technology. Her research content includes:", "start_char_pos": 1391, "end_char_pos": 1391}, {"type": "A", "before": null, "after": "(1) High-resolution electron microscopy and electronic crystallography", "start_char_pos": 1392, "end_char_pos": 1392}, {"type": "A", "before": null, "after": "In the early 1960s, Li Fanghua first carried out electron diffraction in China to determine the structure of a single crystal. In China, he determined the position of hydrogen atoms in the crystal for the first time. The relevant literature is still cited by foreign colleagues.", "start_char_pos": 1393, "end_char_pos": 1393}, {"type": "A", "before": null, "after": "In the 1970s, Li Fanghua and Fan Haifu cooperated to explore the combination of diffraction methods and high-resolution electron microscopy, and created a new image processing theory and technology in high-resolution electron microscopy. Later, she and her students established an unwinding processing technology based on the principle of maximum entropy. It provides an important way to determine the tiny crystal structure. It has been successfully applied to determine the crystal structure of materials such as high-temperature superconductors.", "start_char_pos": 1394, "end_char_pos": 1394}, {"type": "A", "before": null, "after": "While studying in Japan in the 1980s, Li Fanghua summarized new experimental rules and developed a method for determining the position of light atoms. On this basis, after returning to China, she proposed a new image contrast theory: \"pseudo-weak phase object approximation\". This theory clarified the relationship between image intensity and crystal thickness for the first time, and revealed the law of changes in the intensity of different atomic images. , Is the theoretical basis of the above-mentioned image processing technology. Under the guidance of this theory, Li Fanghua et al. observed lithium atoms in crystals for the first time experimentally. In addition, she participated in the early research of high-temperature superconducting materials by means of high-resolution electron microscopy, and was one of the first groups in the world to report the presence or absence of commensurate modulation structures of bismuth superconductors.", "start_char_pos": 1395, "end_char_pos": 1395}, {"type": "A", "before": null, "after": "(2) Quasi-crystal", "start_char_pos": 1396, "end_char_pos": 1396}, {"type": "A", "before": null, "after": "The research team led by Li Fanghua first discovered and reported the almost continuous transition process between quasicrystals and crystals, and she gave a theoretical explanation. Li Fanghua used the phase sub-strain field to derive some formulas reflecting the relationship between the quasicrystal and the crystal, and on this basis, proposed a new method to determine the structure of the quasicrystal, as well as the determination of the local phase sub-strain in the quasicrystal. method. And successfully applied to Al-Cu-Li and Al-Mn-Si quasicrystals.", "start_char_pos": 1397, "end_char_pos": 1397}, {"type": "A", "before": null, "after": "(3) Crystal defects", "start_char_pos": 1398, "end_char_pos": 1398}, {"type": "A", "before": null, "after": "For the newly developed field emission electron microscope, Li Fanghua proposed a new research direction for measuring crystal defects with atomic resolution. At present, she has successfully measured the 60-degree dislocation at the SiGe/Si epitaxial film interface into two incomplete dislocations of 90 degrees and 30 degrees, and a piece of stacking fault sandwiched between them. This is also the first report on the defect of atomic resolution at the interface of SiGe/Si epitaxial film", "start_char_pos": 1399, "end_char_pos": 1399}], "sents_char_pos": [0, 115, 153, 235, 286, 355, 522, 582, 709, 947, 1005, 1073, 1201]}
+{"doc_id": "4635545", "revision_depth": "4", "before_revision": "Chironomids as a paleoclimate proxy Lake deposits have a rich diversity of fossilized insects that trace back to middle Paleozoic era, further increasing in abundance during the Quaternary period. Among the diverse array of aquatic invertebrates, different families of aquatic fly larvae can be extracted from sediments of the Quaternary era. Among them, Chironomids, two-winged flies that belong to the family Chironomidae, are of greatest ecological importance due to their diverse feeding habitat and their role as an important component of the food web. Chironomids complete their larval stage in the water, with their adult life stage outside of the water only lasting a very short time. During their larval stages, Chironomids play an important role in the degradation of material in the aquatic ecosystem. Ecologically they are considered bottom dwellers and are very responsive to any fluctuation in the surrounding environment. Their head capsule and feeding structures are quite commonly fossilized in lake sediments, allowing them to serve as a valuable paleoclimate proxy. Factors influencing chironomid distribution and abundance One of the major factors that affect chironomid distribution is the climate conditions at the local, regional, and global scale . Changes in these conditions are preserved over large periods of time as a fossil record . Through paleolimnological methods including chironomid assessment, these changes can be extrapolated to predict future climate change. Chironomids are very responsive to any fluctuation in the surrounding environment, making them good indicators of a variety of factors, including salinity, water depth, stream flow, aquatic productivity, oxygen level, lake acidification, pollution, temperature, and overall ecosystem health. Chironomid distribution can be related to those factors using a transfer function to connect a particular group of organisms to a specific environmental variable. A variety of disparate factors have been influencing the abundance and distribution pattern of chironomids in recent history. Therefore, it is important to be careful when making broader interpretations from their fossil records. Several recent debates have discussed the impact of temperature on chironomid abundance and diversity, along with other associated factors . Accurate interpretations of chironomid fossil records must consider a wide array of associated factors within the ecosystem. In order to understand the different forces that have been affecting the fossil data of a lake, it is important to reconstruct the physical, chemical, and the nutrient content of the lakes that actually shapes the communities. Their distribution and abundance are highly influenced by the combination of human disturbance and change in the climate. Both of them influence the catchment area that resulted in the changing of vegetation, hydrology, and nutrient cycle . Any change at the regional level, especially temperature, affects the water quality at the local scale and then ultimately has a species-specific effect on habitat. Chironomids and reconstruction of quantitative change in Holocene climate Several factors are considered as controlling factors of chironomid distribution and abundance. Researchers assessing chironomid distribution primarily examine the temperature, while considering supporting factors such as pH, salinity, nutrient flow, and productivity, especially of the late Pleistocene/Holocene time period. For many years, research has been carried out into the relationship between temperature and chironomid distribution pattern due to the impact of temperature on chironomid emergence. Chironomids are directly and indirectly affected by temperature during their whole life cycle, including larval emergence, growth, feeding and reproduction. According to Eggermont and Heiri, the indirect impact of temperature on different physical and chemical aspects determines chironomid distribution and abundance. There is also a strong relationship between chironomid abundance, emergence, and distribution and mean water and air temperatures. According to research conducted in the high-altitude lake Lej da la Tscheppa in Switzerland, seasonal temperature reconstruction can be done with the help of independent chironomids and diatoms. Any change in the assemblage of chironomids reflects change in the temperature and duration of ice cover of that specific water body due to climate change. According to their findings, chironomids respond mostly to the change in the summer temperature, so seasonal variation in temperature can be inferred from sediment cores. Use of chironomids in assessments of anthropogenic climate change According to the fifth IPCC report (2014), a key factor in the shaping of aquatic biodiversity is the progression of human-induced climate change. Macroinvertebrates, especially chironomids, have been considered an important indicator of past climate change, in particular with regard to temperature. There is a strong correlation between the chironomid assemblage and the water temperature, lake depth, salinity, and nutrient concentrations. Therefore, the impact of climate change on lake water levels can be related to changes in the pattern of chironomid distribution and abundance. This strong correlation indicates the evaporation and precipitation profiles of the lake in the past. Past climatic conditions are reconstructed based on paleolimnology with the help of different fossilized records, especially lake sediments that help differentiate regional and local climate change.", "after_revision": "Chironomids as a paleoclimate proxy Lake deposits have a rich diversity of fossilized insects that trace back to middle Paleozoic era, further increasing in abundance during the Quaternary period. Among the diverse array of aquatic invertebrates, different families of aquatic fly larvae can be extracted from sediments of the Quaternary era. Among them, Chironomids, two-winged flies that belong to the family Chironomidae, are of greatest ecological importance due to their diverse feeding habitats and their role as an important component of the food web. Chironomids complete their larval stage in the water, with their adult life stage outside of the water lasting only a very short time. During their larval stages, Chironomids play an important part in the degradation of material in the aquatic ecosystem. Ecologically they are considered bottom dwellers and are very responsive to any fluctuation in the surrounding environment. Their head capsule and feeding structures are commonly fossilized in lake sediments, allowing them to serve as a valuable paleoclimate proxy. Factors influencing chironomid distribution and abundance One of the major factors that affect chironomid distribution is the climate conditions at local, regional, and global scales . Changes in these conditions are preserved as a fossil record over large periods of time . Through paleolimnological methods , including chironomid assessment, these changes can be extrapolated to predict future climate change. Being very responsive to any fluctuation in the surrounding environment, Chironomids are good indicators of a variety of factors, including salinity, water depth, stream flow, aquatic productivity, oxygen level, lake acidification, pollution, temperature, and overall ecosystem health. Chironomid distribution can be related to those factors using a transfer function to connect a particular group of organisms to a specific environmental variable. A variety of disparate factors have influenced the abundance and distribution patterns of chironomids in recent history. Therefore, it is important to be careful when making broader interpretations from their fossil records. The impact of temperature on chironomid abundance and diversity, along with other associated factors , has recently been debated . Accurate interpretations of chironomid fossil records must consider a wide array of associated factors within the ecosystem. In order to understand the different forces that have been affecting the fossil data of a lake, it is important to reconstruct the physical, chemical, and nutrient content that actually shape the lake communities. Their distribution and abundance are highly influenced by the combination of human disturbance and changes in climate, both of which influence the catchment area that resulted in changing vegetation, hydrology, and nutrient cycles . Any change at the regional level, especially temperature, affects local water quality and then ultimately has a species-specific effect on habitat. Chironomids and reconstruction of quantitative change in Holocene climate Researchers assessing chironomid distribution primarily examine the temperature, while considering supporting factors , such as pH, salinity, nutrient flow, and productivity, especially of the late Pleistocene/Holocene time period. For many years, research has been carried out into the relationship between temperature and chironomid distribution due to the impact of temperature on chironomid emergence. Chironomids are directly and indirectly affected by temperature during their entire life cycle, including larval emergence, growth, feeding and reproduction. According to Eggermont and Heiri, the indirect impact of temperature on different physical and chemical aspects determines chironomid distribution and abundance. There is also a strong relationship between chironomid abundance, emergence, and distribution and mean water and air temperatures. According to research conducted in the high-altitude lake Lej da la Tscheppa , Switzerland, seasonal temperature reconstruction can be done with the help of independent chironomids and diatoms. Any change in the assemblage of chironomids reflects change in the temperature and duration of ice cover of that body of water due to climate change. According to their findings, chironomids respond mostly to change in summer temperature, so seasonal variation in temperature can be inferred from sediment cores. Use of chironomids in assessments of anthropogenic climate change According to the fifth IPCC report (2014), a key factor in the shaping of aquatic biodiversity is the progression of human-induced climate change. Macroinvertebrates, especially chironomids, have been considered an important indicator of past climate change, in particular with regard to temperature. There is a strong correlation between the chironomid assemblage and water temperature, lake depth, salinity, and nutrient concentrations. Therefore, the impact of climate change on lake water levels can be related to changes in the pattern of chironomid distribution and abundance. This strong correlation indicates the evaporation and precipitation profiles of the lake in the past. Past climatic conditions are reconstructed based on paleolimnology with the help of different fossilized records, especially lake sediments that help differentiate regional and local climate change.", "edit_actions": [{"type": "R", "before": "habitat", "after": "habitats", "start_char_pos": 492, "end_char_pos": 499}, {"type": "R", "before": "only lasting", "after": "lasting only", "start_char_pos": 661, "end_char_pos": 673}, {"type": "R", "before": "role", "after": "part", "start_char_pos": 751, "end_char_pos": 755}, {"type": "D", "before": "quite", "after": null, "start_char_pos": 983, "end_char_pos": 988}, {"type": "D", "before": "the", "after": null, "start_char_pos": 1233, "end_char_pos": 1236}, {"type": "R", "before": "scale", "after": "scales", "start_char_pos": 1265, "end_char_pos": 1270}, {"type": "A", "before": null, "after": "as a fossil record", "start_char_pos": 1315, "end_char_pos": 1315}, {"type": "D", "before": "as a fossil record", "after": null, "start_char_pos": 1343, "end_char_pos": 1361}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1398, "end_char_pos": 1398}, {"type": "R", "before": "Chironomids are", "after": "Being", "start_char_pos": 1500, "end_char_pos": 1515}, {"type": "R", "before": "making them", "after": "Chironomids are", "start_char_pos": 1583, "end_char_pos": 1594}, {"type": "R", "before": "been influencing", "after": "influenced", "start_char_pos": 1991, "end_char_pos": 2007}, {"type": "R", "before": "pattern", "after": "patterns", "start_char_pos": 2039, "end_char_pos": 2046}, {"type": "R", "before": "Several recent debates have discussed the", "after": "The", "start_char_pos": 2185, "end_char_pos": 2226}, {"type": "A", "before": null, "after": ", has recently been debated", "start_char_pos": 2324, "end_char_pos": 2324}, {"type": "R", "before": "the nutrient content of the lakes that actually shapes the", "after": "nutrient content that actually shape the lake", "start_char_pos": 2607, "end_char_pos": 2665}, {"type": "R", "before": "change in the climate. Both of them", "after": "changes in climate, both of which", "start_char_pos": 2778, "end_char_pos": 2813}, {"type": "R", "before": "the changing of", "after": "changing", "start_char_pos": 2860, "end_char_pos": 2875}, {"type": "R", "before": "cycle", "after": "cycles", "start_char_pos": 2912, "end_char_pos": 2917}, {"type": "R", "before": "the water quality at the local scale", "after": "local water quality", "start_char_pos": 2986, "end_char_pos": 3022}, {"type": "D", "before": "Several factors are considered as controlling factors of chironomid distribution and abundance.", "after": null, "start_char_pos": 3159, "end_char_pos": 3254}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3373, "end_char_pos": 3373}, {"type": "D", "before": "pattern", "after": null, "start_char_pos": 3602, "end_char_pos": 3609}, {"type": "R", "before": "whole", "after": "entire", "start_char_pos": 3745, "end_char_pos": 3750}, {"type": "R", "before": "in", "after": ",", "start_char_pos": 4195, "end_char_pos": 4197}, {"type": "R", "before": "specific water body", "after": "body of water", "start_char_pos": 4426, "end_char_pos": 4445}, {"type": "R", "before": "the change in the", "after": "change in", "start_char_pos": 4528, "end_char_pos": 4545}, {"type": "D", "before": "the", "after": null, "start_char_pos": 5075, "end_char_pos": 5078}], "sents_char_pos": [0, 196, 342, 557, 692, 812, 936, 1084, 1363, 1499, 1791, 1954, 2080, 2184, 2326, 2451, 2678, 2800, 2919, 3084, 3254, 3485, 3667, 3824, 3986, 4117, 4312, 4468, 4639, 4852, 5006, 5148, 5292, 5394]}
+{"doc_id": "46504957", "revision_depth": "1", "before_revision": "Etymology The obscure etymology of f\u0101ngxi\u00e0ngsh\u00ec is a subject of disagreement. The name combines three words, with the following Old Chinese pronunciations and meanings (Schuessler 2007: 231, 531, 466): pa\u014b \u65b9 \"square, a regular thing, side, region, country; two boats lashed side by side, raft; just now, to begin; method, law, norm, standard\" *sa\u014bh \u76f8 \"look at, inspect; assist, help; assistant, minister\" (also pronounced xi\u0101ng < *sa\u014b \u76f8 \"each other, mutually\") *ge\u0294 \u6c0f \"an honorific which is suffixed to place names (\"the lord of X\"), kinship terms (\"uncle X\"), feudal and official titles (\"lord/lady\" X); clan\" Scholars agree that shi < *ge\u0294 is the Chinese honorific suffix translating \"master; lord\", but construe fangxiang < *pa\u014bsa\u014bh in various ways. Fang \u65b9 is also a common Chinese surname. The earliest interpretation was Zheng Xuan's (2nd century CE) Zhouli commentary (see below). Zheng explains f\u0101ngxi\u00e0ng(sh\u00ec) as f\u00e0ngxi\u01ceng \u653e\u60f3, substituting f\u00e0ng \u653e \"put away; banish\" for f\u0101ng \u65b9 and xi\u01ceng \u60f3 \"think; imagine\" for xi\u00e0ng \u76f8. This ambiguous f\u00e0ngxi\u01ceng \u653e\u60f3 gloss is translated as \"expellers of formidable things\" (Laufer 1914: 198) , \"to give release to one's thinking . . . so as to have an awesome and terrifying appearance\" (Bodde 1975:79) , and \"to cause visions to be forthcoming; to conjure up visions\" (Boltz 1979: 431) . Boltz says Bodde misunderstood this term because Zheng was reaffirming that xi\u00e0ng \u76f8 means not just \"observe; scrutinize\", but \"vision; image; phantasy\", cognate with xi\u01ceng \u60f3 \"to draw up a mental image; vision\", as well as with xi\u00e0ng \u8c61 \"image; representation\". Therefore, Boltz (1979: 431) concludes it was not the appearance of the fangxiangshi that is important, but \"the visions which he brings forth (and which presumably only he can see) that are crucial. In this sense he should be called the Master of Visions, or Imaginator, or Phantasmagoricist.\" Zheng Xuan's commentary to the Zhouli description of a fangxiang striking the four corners of the burial chamber with his lance and expelling the fangliang (see below) identifies this fangliang \u65b9\u826f demon with the wangliang \u7f54\u5169 demon, also known as wangxiang \u7f54\u8c61. Ying Shao's (c. 195 CE) Fengsu Tongyi quotes this Zhouli passage with wangxiang for fangliang in explaining the origins of Chinese customs of placing thuja (arborvitae) trees and stone tigers in graveyards. On the tomb a thuja is planted and at the head of the path a stone tiger. In the Chou li, \"On the day of burial the fang-hsiang chief enters the pit to drive out the Wang-hsiang.\" The Wang-hsiang likes to eat the liver and brain of the deceased. People cannot constantly have the fang-hsiang stand by the side of the tomb to bar it. But the Wang-hsiang fears the tiger and the thuja. Thus the tiger and thuja are placed before the tomb. (tr. Harper 1985: 482) The common interpretation of the fang in fangxiang is that it denotes the s\u00ecf\u0101ng \u56db\u65b9 \"the four quarters/directions; every side/direction\", as ritually symbolized by the four golden eyes on the bearskin signifying the ability of a fangxiangshi to see in all directions. According to Dallas McCurley (2005:137) , the early Chinese believed that \"the forces of rain, wind, flood, and drought often came to the climatically vulnerable Yellow River Valley from the sifang.\" Boltz's (1979: 431) review of Bodde's (1975) book agrees that taking the fundamental sense of fangxiang as \"seer\" is generally accurate, but believes that the binomial term fangxiang < Old Chinese *pjwang-sjang originated as a dimidiation of the word *sjang- < Proto-Chinese **bsjang- \"seer\". Thus meaning \"not so much \"one who sees in all directions\" (though it may well have already been semanticized as that very early) as \"one who conjures up visions, or images, phantasies.\" Many writers have noted the remarkable phonetic similarities among the names for the ritual fangxiangshi and the fangliang, wangliang, and wangxiang demons he exorcised; and some scholars such as Chen Mengjia, Kobayashi Taichir\u014d, and William Boltz have theorized that the fangxiangshi exorcist was a personification of these demons, and was \"in effect exorcising himself\" (Boltz 1979: 423) . In this understanding, the devouring exorcist and devoured creatures were ultimately identical. Boltz (1979: 431) suggests the possibility that the matching names fangxiang(shi), fangliang, wangliang, and wangxiang are all derived from the same Proto-Chinese **BZjang \"see\" etymon, with him as a \"Master of Visions\" or \"Imaginator\" and them as \"visions\" or \"specters\" from the Latin spectrum \"appearance; apparition\", and to use the same root, the fangxiangshi \"was in fact exorcising images, or visions, of himself.\" Translations While it is comparatively easier to transliterate Chinese \u65b9\u76f8\u6c0f alphabetically than to elucidate it, some scholars have made translations. The first in a Western language may have been French sinologist \u00c9douard Biot's (1881 1:6) \"inspecteurs de region\" or \"preservateur universel\". English translations include \"Rescuer of the Country; inspectors or rescuers of the country to the four quarters\" (de Groot 1910 1: 162; 6: 974) \"a 'doctor' who has two functions, he prescribes medicines, and practises the art of physiognomy\" (Laufer 1909: 198) \"he who scrutinizes for evil in many directions\" (Bodde 1975: 79-80), \"one who conjures up visions ... Master of Visions, or Imaginator, or Phantasmagoricist\" (Boltz 1979: 431) \"one who sees in all (four) directions\" (Childs-Johnson 1995: 89) \"square-faced exorcist\" (Benn 2002: 270) \"direction (fang)-orienting master; one who orients unwanted spirits in the direction to which they belong\" (McCurley 2005:137) Laufer's interpretation takes fang to mean fangshi \u65b9\u58eb \"alchemist; doctor; exorcist\" and xiang to mean r\u00e9nxi\u00e0ng \u4eba\u76f8 \"look at and appraise; practice physiognomy\". Bodde's (1975: 79) translation \"he who scrutinizes for evil spirits in many directions\" is based upon taking fang as meaning sifang \"four/all directions\" and taking xiang in its verbal sense of \"observe, scrutinize\" comparable with \"physiognomize\". The first context details the types and numbers of assistants for each official rank, including over 40 to support the fangxiangshi: 4 ku\u00e1ngf\u016b \u72c2\u592b \"crazy men; mediums\", 8 diviners with 6 subordinates, 2 accountants, 2 scribes, 2 menials, and 20 runners (see von Falkenhausen 1995: 283-285) . The second Zhouli context includes the fangxiangshi under the section describing official duties of the n\u00e1nw\u016b \u7537\u5deb \"male shaman/medium\": At the annual Great Exorcism (nuo \u513a), when the Nanwu play a central role: after either presenting offerings or shooting arrows (which of the two remains unclear) at the evil spirits in the four directions, they (according to Zheng Xuan) accompany them outside, away from human habitations\" (tr. von Falkenhausen 1995: 291) The received Zhouli text has z\u00e8ng \u8d08 \"to present\" but Zheng Xuan mentions an old variant of z\u00e8ng \u77f0 \"to shoot arrows\". The subsequent fangxiangshi context says, In his official function, he wears [over his head] a bearskin having four eyes of gold, and is clad in a black upper garment and a red lower garment. Grasping his lance and brandishing his shield, he leads the many officials to perform the seasonal exorcism (Nuo), searching through houses and driving out pestilences. ... When there is a great funeral, he goes in advance of the coffin, and upon its arrival at the tomb, when it is being inserted into the burial chamber, he strikes the four corners [of the chamber] with his lance and expels the Fang-liang. (48 , tr. Bodde 1975: 78-79) Zheng Xuan's commentary (Fong 1991: 189-190) glosses m\u00e9ng \u8499 \"cover; dark; blind; ignorant\" as meaning m\u00e0o \u5192 \"to cover; see\", that is \"to wear over one's head\"; and explains \"the bear skin worn over one's head to expel the demon of pestilences is [what is known] today as qitou [\u9b4c\u982d \"ghost head; demon mask\"].\" As mentioned above (see Etymology), Zheng's commentary identifies the fangliang \u65b9\u826f demon with the wangliang \u7f54\u5169 or wangxiang \u7f54\u8c61 demon. However, Zhouli interpreters differ whether the fangxiangshi was covered by a bearskin cloak or mask, owing to the ambiguous Classical Chinese phrase \u718a\u76ae\u9ec3\u91d1\u56db\u76ee literally \"bear skin yellow gold four eyes\", and Zheng Xuan's comparison with a qitou \"demon mask\" (see Childs-Johnson 1995) . Translations are frequently a bearskin (\"don the hide of a young bear ornamented with four eyes of gold\" , von Falkenhausen 1995: 291 ), sometimes a bearskin mask (\"four-eyed bear mask\", McCurley 2005:137) , or even both (\"covered with a bear's skin and donning a face mask with four golden eyes\" , Fukushima 2005: 258 ). The Han polymath Zhang Heng's (2nd century CE) \"Dongjing fu\" poem about the capital Luoyang contemporaneously describes fangxiang(shi) at the Nuo ritual. At the end of the year the great no takes place for the purpose of driving off all spectres. The fang-siang carry their spears, wu and hih hold their bundles of reed. Ten thousand lads with red heads and black clothes, with bows of peach wood and arrows of thorny jujube shoot at random all around. Showers of potsherds and pebbles come down like rain, infallibly killing strong spectres as well as the weak. Flaming torches run after these beings, so that a sparkling and streaming glare chases the red plague to all sides; thereupon they destroy them in the imperial moats and break down the suspension bridges (to prevent their return). In this way they attack ch\u2018i and mei, strike at wild and ferocious beings, cleave sinuous snakes, beat out the brains of fang-liang, imprison keng-fu in the clear and chilly waters, and drown n\u00fc-pah in the waters animated by gods. They cut asunder the khwei and the h\u00fc, as also the wang-siang; they mutilate the ye-chung, and exterminate the yiu-kwang . The eight spirits (cardinal points of the Universe) thereby quiver; how much more must this be the case with the ki, the yuh and the pih-fang. The land of Tu-shoh, affords protection by peach branches, the effects of which are enhanced by Yuh-lei and Shen-tu, who on the other side, with ropes of rush in their hands, by means of their sharp eyesight spy out the darkest corners, in order to catch the spectres which still remain after the chase. The houses in the capital thus being purged to their most secluded parts, and delivered from everything undesirable, the Yin and the Yang may unite harmoniously, and all beings and things thus be produced in due time. (tr. Groot 1910 6: 978-979) The (5th century) Book of the Later Han also describes fangxiangshi in the Nuo exorcism. One day before the sacrifice of the end of the year the great no is celebrated, called expulsion of epidemical disease. The ritual of it is the following \u2014 From among the apprentices of the inner Yellow Gate of the Palace, one hundred and twenty of ten, eleven or twelve years are selected to act as 'lads'; they are dressed with red bonnets and black coats, and they carry large hand-drums. The fang-siang shi with four eyes of gold and masked with bearskins, wearing black coats and red skirts, grasp their lances and wield their shields. There are also twelve animals with feathers or hairs, and with horns. These people start their work at the inner Yellow Gate, under command of a Chamberlain in general employ, to expel maleficent spectres from the Forbidden Palace. [Shortly before dawn, the 120 boys and all the court officials gather together and repeat a chant listing 12 demon-eating spirits, \"Jiazuo \u7532\u4f5c devours calamities, Feiwei \u80c7\u80c3 devours tigers ...\"] These twelve divinities are herewith ordered to chase away evil and misfortune, to scorch your bodies, seize your bones and joints, cut your flesh in pieces, tear out your lungs and bowels. If you do not get quickly away, the stragglers among you will become their food. Now the fang-siang are set to work. Together with those twelve animals (representing these twelve demon-devourers) they lump about screaming, making three tours round about the inner Palace buildings in front and behind, and with their torches they escort the pestilential disease out of the front gate. Outside this gate, swift horsemen take over the torches and leave the Palace through the Marshal\u2019s Gate, on the outside of which they transfer them to horsemen of the fifth army-corps, who thereupon drive the spectres into the Loh river. In every mansion of the official world, men with wooden masks and representing animals may act as leaders of the performers of the no. When the ceremony is finished, keng of peachwood are put up, with Yuh-lei and ropes of reed, after which the performers and the officers in attendance on the throne stop their work. Ropes of reed, lances, and sticks of peach wood are presented by the emperor to the highest ministers, commanders, and special and general feudal rulers. (tr. Groot 1910 6: 976-977) The syntax of this fangxiangshi description differs from the Zhouli: \u65b9\u76f8\u6c0f\u9ec3\u91d1\u56db\u76ee\u8499\u718a\u76ae \"the fangxiangshi [wears] four golden eyes [and] is covered by a bearskin\". The Book of Qi history of the Southern Qi dynasty (479-502) records that Nuo rituals were performed on the last day of the year by two groups, each of 120 lads, and twelve animals headed by drums and wind instruments. The gates of the wards and of the city walls were flung open, and the emperor in everyday attire contemplated the no from his throne, in the midst of his offices. With rolling drums the procession entered the Palace through the western-gate, passed through all parts of it in two divisions, even mounting the storeys and towers; the fang-siang and the twelve animals hopped, jumped, and cried, and having passed through the south gate, they spread in six directions till they reached the city-walls. (tr. Groot 1910 6: 978-979) During the Sui dynasty (581-618 CE), the official ritual (tr. Groot 1910 6: 1151) restricted using fangxiangshi exorcists to funerals of higher-ranking shi \"scholar-officials\"; officers of the 1st-4th degrees could use fangxiang, but those of the 5th-7th degrees could only use qitou ghost masks. 200px|Japanese H\u014ds\u014dshi \u65b9\u76f8\u6c0f exorcist illustration from the (c. 1781) Konjaku Hyakki Sh\u016bi 200px|Japanese Shinto ceremonial H\u014ds\u014dshi at Yoshida Shrine, (1928) painting by Nakajima S\u014dy\u014d \u4e2d\u5cf6\u8358\u967d 200px|Japanese Shinto ceremonial H\u014ds\u014dshi at Heian Shrine (2010) Tang dynasty The Tang dynasty (618-907) was a golden age in Chinese history during which the state religion continued fangxiangshi traditions and further regulated their details. The (732) Great Tang Ritual Regulations of the Kaiyuan Era (713-742, Emperor Xuanzong of Tang) says that in funeral processions (tr. Groot 1910 6: 1151), \"behind the carriage in which the soul-tablet was conveyed, came the carriage of the fang-siang, which, however, was to be replaced by a carriage with an ugly head [qitou] at funerals of officers of any grade below the fifth.\" This ritual text also gave instructions for celebrating the Nuo ritual in the provinces. Four fang-siang were to be used, with four precentors [ch\u00e0ngshu\u00e0i \u5531\u7387 \"song leaders\"], and by chiefs of first class governments sixty lads besides; chiefs of governments of the second or the third order might employ forty lads, and in the districts no more than twenty lads might be employed, with one fang-siang and one precentor; besides there might be four drummers and four whip-bearers. Such purification of official mansions and cities was to be accompanied by a sacrifice at the gates to the yin spirits, and concluded by burial of the sacrificial flesh and wine. (tr. Groot 1910 6: 980) Duan Chengshi's (8th century) Miscellaneous Morsels from Youyang (tr. Groot 1910 6: 1152-1153) differentiates qitou \u9b4c\u982d \"ghost mask\" types, those with four eyes are named fangxiang and those with two eyes are named q\u012b \u50db \"dancers\". The Da Tang liudian book of Tang institutions (tr. Fong 1991: 189) states that a person who performed the task of fangxiangshi would put on \"a mask with four golden eyes and wear a bear-skin outfit.\" The (1060) New Book of Tang (tr. Groot 1910 6: 980) notes that for Nuo rituals, \"the lads should be between twelve and sixteen years old, masked, and arranged in four groups of six, and that, besides the whip-bearers, drummers and trumpeters, there should be two wu [shamans] in the procession. The exorcising song was to the very letter that of the Han dynasty.\" During the Song dynasty (960-1279), the tradition of burying protective wood or pottery figures of fangxiangshi in tombs was changed into figures made of perishable straw or bamboo. The Tang-Song handbook on burial practices, the Bicanq jing (tr. Fong 1991: 189), says the fangxiang figures were \"woven in five colors, had four eyes and held tree branches in their hands\". The official ritual of the Song dynasty (tr. Groot 1910 6: 1152) said funerals for officers of the four highest ranks could have one fangsiang exorcist, and those below in rank could only have a qitou ghost mask. This text also records that in 970, Emperor Taizu of Song decreed that for funerals in the capital of Kaifeng, \"it was forbidden to all families who had a burial to perform, to occupy themselves with Taoist and Buddhist observances, or to employ a van of men masked as strange men or animals.\" Similarly, during Ming dynasty (1368-1644) funeral rituals (tr. Groot 1910 6: 1152) were delimited to four-eyed fangxiang for officers of the 1st-4th ranks, two-eyed ones for officers of the 5th-7th ranks, and none for lower-ranking officers. De Groot (1910 6: 980) describes popular exorcising processions as \"noisy, and even amusing, agreeably breaking the monotony of daily life\" on the last day of the year, with boys wearing ghost-masks of old and young people and numerous gods and spirits, men dressed in costumes of fearsome door gods to scare away evil spirits, and male and female wu-shamans dancing with drums, all under the guidance of men and women acting as \"fathers and mothers of the Nuo\" ritual. In the 1980s, the Chinese government officially recognized Nuo rituals as the folk religion of the Tujia people, who primarily live in the Wuling Mountains of Central China (Li 2006) . Interpretations Lisa Raphals (2009: 61) suggests that the Zhou dynasty ritual fangxiangshi \u65b9\u76f8\u6c0f may have been a predecessor of the Han dynasty professional fangshi \u65b9\u58eb \"recipe masters\". Bodde (1975: 124) identifies the fangxiangshi with the demonic \"God of War\" Chiyou, who, according to legend, opposed the Yellow Emperor, citing Zhang Heng's (2nd century CE) Xijing fu poem that describes Chiyou similarly with how other texts portray the appearance and behavior of the fangxiangshi. The earliest record was the (c. 797) Shoku Nihongi history (Gras 2004: 45) , which mentions a h\u014ds\u014dshi exorcist officiating at the burial ceremonies for Emperor Sh\u014dmu (756), Emperor K\u014dnin (781), and Emperor Kanmu (806). The Ky\u014dgen actor Nomura Mannoj\u014d noted that Chinese Nuo rituals \u513a were the 8th-century source for the Japanese tsuina \u8ffd\u513a or setsubun \"ritual to exorcise evil spirits on the last day of winter\", and proposed that supernatural power links the Chinese nuo performer fangxiangshi and the Japanese gigaku masked character Chid\u014d \u6cbb\u9053 \"govern the way\" who leads a (Fukushima 2005: 258) . References Benn, Charles D. (2002), Daily Life in Traditional China: The Tang Dynasty, Greenwood. Biot, \u00c9douard (1881), Le Tcheou-li ou Rites des Tcheou, 2 vols., Imprimerie nationale. Bodde, Derk (1975), Festivals in Classical China: New Year and Other Annual Observations during the Han Dynasty, 206 BC-AD 220, Princeton University Press. Boltz, William G. (1979), \"Philological Footnotes to the Han New Year Rites, Festivals in Classical China: New Year and Other Annual Observances during the Han Dynasty 206 B.C.-A.D. 220 by Derk Bodde\", Journal of the American Oriental Society 99.3: 423-439. Childs-Johnson, Elizabeth (1995), \"The Ghost Head Mask and Metamorphic Shang Imagery\", Early China 20: 79-92. von Falkenhausen, Lothar (1995), \"Reflections on the Political Role of Spirit Mediums in Early China: The Wu Officials in the Zhou Li\", Early China 20: 279-300. Fong, Mary H. (1991), \"Antecedents of Sui-Tang Burial Practices in Shaanxi\", Artibus Asiae 51.3/4: 147-198. Fukushima, Yoshiko (2005), \"Masks, Interface of Past and Future: Nomura Mannoj\u014d's Shingigaku\", Asian Theatre Journal 22.2: 249-268. Gras, Alexandre (2004), \"\u8ffd\u513a\u306b\u304a\u3051\u308b\u546a\u6587\u306e\u540d\u79f0\u3068\u65b9\u76f8\u6c0f\u306e\u5f79\u5272\u306e\u5909\u5316\u306b\u3064\u3044\u3066\", Issues in Language and Culture 5: 35-53. Groot, J.J.M. de (1910), The Religious System of China 6, E. J. Brill. Harper, Donald (1985), \"A Chinese Demonography of the Third Century B. C.\", Harvard Journal of Asiatic Studies, 45.2: 459-498. Laufer, Berthold (1909), Chinese clay figures. Part I. Prolegomena on the history of defensive armor, Field Museum of Natural History, Anthropological series 13.2. Li, Lan (2006), \"The Changing Role of the Popular Religion of Nuo (\u50a9) in Modern Chinese Politics\", Modern Asian Studies, 45: 1-23. McCurley, Dallas (2005), \"Performing Patterns: Numinous Relations in Shang and Zhou China\", The Drama Review 49.3: 135-156. Raphals, Lisa (2009), \"Divination in the Han Shu Bibliographic Treatise\", Early China 32: 45-101. Schuessler, Axel (2007), ABC Etymological Dictionary of Old Chinese, University of Hawaii Press. ", "after_revision": "Etymology The obscure etymology of f\u0101ngxi\u00e0ngsh\u00ec is a subject of disagreement. The name combines three words, with the following Old Chinese pronunciations and meanings : pa\u014b \u65b9 \"square, a regular thing, side, region, country; two boats lashed side by side, raft; just now, to begin; method, law, norm, standard\" *sa\u014bh \u76f8 \"look at, inspect; assist, help; assistant, minister\" (also pronounced xi\u0101ng < *sa\u014b \u76f8 \"each other, mutually\") *ge\u0294 \u6c0f \"an honorific which is suffixed to place names (\"the lord of X\"), kinship terms (\"uncle X\"), feudal and official titles (\"lord/lady\" X); clan\" Scholars agree that shi < *ge\u0294 is the Chinese honorific suffix translating \"master; lord\", but construe fangxiang < *pa\u014bsa\u014bh in various ways. Fang \u65b9 is also a common Chinese surname. The earliest interpretation was Zheng Xuan's (2nd century CE) Zhouli commentary (see below). Zheng explains f\u0101ngxi\u00e0ng(sh\u00ec) as f\u00e0ngxi\u01ceng \u653e\u60f3, substituting f\u00e0ng \u653e \"put away; banish\" for f\u0101ng \u65b9 and xi\u01ceng \u60f3 \"think; imagine\" for xi\u00e0ng \u76f8. This ambiguous f\u00e0ngxi\u01ceng \u653e\u60f3 gloss is translated as \"expellers of formidable things\" , \"to give release to one's thinking . . . so as to have an awesome and terrifying appearance\" , and \"to cause visions to be forthcoming; to conjure up visions\" . Boltz says Bodde misunderstood this term because Zheng was reaffirming that xi\u00e0ng \u76f8 means not just \"observe; scrutinize\", but \"vision; image; phantasy\", cognate with xi\u01ceng \u60f3 \"to draw up a mental image; vision\", as well as with xi\u00e0ng \u8c61 \"image; representation\". Therefore, Boltz concludes it was not the appearance of the fangxiangshi that is important, but \"the visions which he brings forth (and which presumably only he can see) that are crucial. In this sense he should be called the Master of Visions, or Imaginator, or Phantasmagoricist.\" Zheng Xuan's commentary to the Zhouli description of a fangxiang striking the four corners of the burial chamber with his lance and expelling the fangliang (see below) identifies this fangliang \u65b9\u826f demon with the wangliang \u7f54\u5169 demon, also known as wangxiang \u7f54\u8c61. Ying Shao's (c. 195 CE) Fengsu Tongyi quotes this Zhouli passage with wangxiang for fangliang in explaining the origins of Chinese customs of placing thuja (arborvitae) trees and stone tigers in graveyards. On the tomb a thuja is planted and at the head of the path a stone tiger. In the Chou li, \"On the day of burial the fang-hsiang chief enters the pit to drive out the Wang-hsiang.\" The Wang-hsiang likes to eat the liver and brain of the deceased. People cannot constantly have the fang-hsiang stand by the side of the tomb to bar it. But the Wang-hsiang fears the tiger and the thuja. Thus the tiger and thuja are placed before the tomb. The common interpretation of the fang in fangxiang is that it denotes the s\u00ecf\u0101ng \u56db\u65b9 \"the four quarters/directions; every side/direction\", as ritually symbolized by the four golden eyes on the bearskin signifying the ability of a fangxiangshi to see in all directions. According to Dallas McCurley , the early Chinese believed that \"the forces of rain, wind, flood, and drought often came to the climatically vulnerable Yellow River Valley from the sifang.\" Boltz's review of Bodde's book agrees that taking the fundamental sense of fangxiang as \"seer\" is generally accurate, but believes that the binomial term fangxiang < Old Chinese *pjwang-sjang originated as a dimidiation of the word *sjang- < Proto-Chinese **bsjang- \"seer\". Thus meaning \"not so much \"one who sees in all directions\" (though it may well have already been semanticized as that very early) as \"one who conjures up visions, or images, phantasies.\" Many writers have noted the remarkable phonetic similarities among the names for the ritual fangxiangshi and the fangliang, wangliang, and wangxiang demons he exorcised; and some scholars such as Chen Mengjia, Kobayashi Taichir\u014d, and William Boltz have theorized that the fangxiangshi exorcist was a personification of these demons, and was \"in effect exorcising himself\" . In this understanding, the devouring exorcist and devoured creatures were ultimately identical. Boltz suggests the possibility that the matching names fangxiang(shi), fangliang, wangliang, and wangxiang are all derived from the same Proto-Chinese **BZjang \"see\" etymon, with him as a \"Master of Visions\" or \"Imaginator\" and them as \"visions\" or \"specters\" from the Latin spectrum \"appearance; apparition\", and to use the same root, the fangxiangshi \"was in fact exorcising images, or visions, of himself.\" Translations While it is comparatively easier to transliterate Chinese \u65b9\u76f8\u6c0f alphabetically than to elucidate it, some scholars have made translations. The first in a Western language may have been French sinologist \u00c9douard Biot's \"inspecteurs de region\" or \"preservateur universel\". English translations include \"Rescuer of the Country; inspectors or rescuers of the country to the four quarters\" \"a 'doctor' who has two functions, he prescribes medicines, and practises the art of physiognomy\" \"he who scrutinizes for evil in many directions\" \"one who conjures up visions ... Master of Visions, or Imaginator, or Phantasmagoricist\" \"one who sees in all (four) directions\" \"square-faced exorcist\" \"direction (fang)-orienting master; one who orients unwanted spirits in the direction to which they belong\" Laufer's interpretation takes fang to mean fangshi \u65b9\u58eb \"alchemist; doctor; exorcist\" and xiang to mean r\u00e9nxi\u00e0ng \u4eba\u76f8 \"look at and appraise; practice physiognomy\". Bodde's translation \"he who scrutinizes for evil spirits in many directions\" is based upon taking fang as meaning sifang \"four/all directions\" and taking xiang in its verbal sense of \"observe, scrutinize\" comparable with \"physiognomize\". The first context details the types and numbers of assistants for each official rank, including over 40 to support the fangxiangshi: 4 ku\u00e1ngf\u016b \u72c2\u592b \"crazy men; mediums\", 8 diviners with 6 subordinates, 2 accountants, 2 scribes, 2 menials, and 20 runners . The second Zhouli context includes the fangxiangshi under the section describing official duties of the n\u00e1nw\u016b \u7537\u5deb \"male shaman/medium\": At the annual Great Exorcism (nuo \u513a), when the Nanwu play a central role: after either presenting offerings or shooting arrows (which of the two remains unclear) at the evil spirits in the four directions, they (according to Zheng Xuan) accompany them outside, away from human habitations\" Tr. . The received Zhouli text has z\u00e8ng \u8d08 \"to present\" but Zheng Xuan mentions an old variant of z\u00e8ng \u77f0 \"to shoot arrows\". The subsequent fangxiangshi context says, In his official function, he wears [over his head] a bearskin having four eyes of gold, and is clad in a black upper garment and a red lower garment. Grasping his lance and brandishing his shield, he leads the many officials to perform the seasonal exorcism (Nuo), searching through houses and driving out pestilences. ... When there is a great funeral, he goes in advance of the coffin, and upon its arrival at the tomb, when it is being inserted into the burial chamber, he strikes the four corners [of the chamber] with his lance and expels the Fang-liang. (48 )Tr. . Zheng Xuan's commentary glosses m\u00e9ng \u8499 \"cover; dark; blind; ignorant\" as meaning m\u00e0o \u5192 \"to cover; see\", that is \"to wear over one's head\"; and explains \"the bear skin worn over one's head to expel the demon of pestilences is [what is known] today as qitou [\u9b4c\u982d \"ghost head; demon mask\"].\" As mentioned above (see Etymology), Zheng's commentary identifies the fangliang \u65b9\u826f demon with the wangliang \u7f54\u5169 or wangxiang \u7f54\u8c61 demon. However, Zhouli interpreters differ whether the fangxiangshi was covered by a bearskin cloak or mask, owing to the ambiguous Classical Chinese phrase \u718a\u76ae\u9ec3\u91d1\u56db\u76ee literally \"bear skin yellow gold four eyes\", and Zheng Xuan's comparison with a qitou \"demon mask\" . Translations are frequently a bearskin (\"don the hide of a young bear ornamented with four eyes of gold\" ), sometimes a bearskin mask (\"four-eyed bear mask\", McCurley , or even both (\"covered with a bear's skin and donning a face mask with four golden eyes\" ). The Han polymath Zhang Heng's (2nd century CE) \"Dongjing fu\" poem about the capital Luoyang contemporaneously describes fangxiang(shi) at the Nuo ritual. At the end of the year the great no takes place for the purpose of driving off all spectres. The fang-siang carry their spears, wu and hih hold their bundles of reed. Ten thousand lads with red heads and black clothes, with bows of peach wood and arrows of thorny jujube shoot at random all around. Showers of potsherds and pebbles come down like rain, infallibly killing strong spectres as well as the weak. Flaming torches run after these beings, so that a sparkling and streaming glare chases the red plague to all sides; thereupon they destroy them in the imperial moats and break down the suspension bridges (to prevent their return). In this way they attack ch\u2018i and mei, strike at wild and ferocious beings, cleave sinuous snakes, beat out the brains of fang-liang, imprison keng-fu in the clear and chilly waters, and drown n\u00fc-pah in the waters animated by gods. They cut asunder the khwei and the h\u00fc, as also the wang-siang; they mutilate the ye-chung, and exterminate the yiu-kwang . The eight spirits (cardinal points of the Universe) thereby quiver; how much more must this be the case with the ki, the yuh and the pih-fang. The land of Tu-shoh, affords protection by peach branches, the effects of which are enhanced by Yuh-lei and Shen-tu, who on the other side, with ropes of rush in their hands, by means of their sharp eyesight spy out the darkest corners, in order to catch the spectres which still remain after the chase. The houses in the capital thus being purged to their most secluded parts, and delivered from everything undesirable, the Yin and the Yang may unite harmoniously, and all beings and things thus be produced in due time. Tr. . The (5th century) Book of the Later Han also describes fangxiangshi in the Nuo exorcism. One day before the sacrifice of the end of the year the great no is celebrated, called expulsion of epidemical disease. The ritual of it is the following \u2014 From among the apprentices of the inner Yellow Gate of the Palace, one hundred and twenty of ten, eleven or twelve years are selected to act as 'lads'; they are dressed with red bonnets and black coats, and they carry large hand-drums. The fang-siang shi with four eyes of gold and masked with bearskins, wearing black coats and red skirts, grasp their lances and wield their shields. There are also twelve animals with feathers or hairs, and with horns. These people start their work at the inner Yellow Gate, under command of a Chamberlain in general employ, to expel maleficent spectres from the Forbidden Palace. [Shortly before dawn, the 120 boys and all the court officials gather together and repeat a chant listing 12 demon-eating spirits, \"Jiazuo \u7532\u4f5c devours calamities, Feiwei \u80c7\u80c3 devours tigers ...\"] These twelve divinities are herewith ordered to chase away evil and misfortune, to scorch your bodies, seize your bones and joints, cut your flesh in pieces, tear out your lungs and bowels. If you do not get quickly away, the stragglers among you will become their food. Now the fang-siang are set to work. Together with those twelve animals (representing these twelve demon-devourers) they lump about screaming, making three tours round about the inner Palace buildings in front and behind, and with their torches they escort the pestilential disease out of the front gate. Outside this gate, swift horsemen take over the torches and leave the Palace through the Marshal\u2019s Gate, on the outside of which they transfer them to horsemen of the fifth army-corps, who thereupon drive the spectres into the Loh river. In every mansion of the official world, men with wooden masks and representing animals may act as leaders of the performers of the no. When the ceremony is finished, keng of peachwood are put up, with Yuh-lei and ropes of reed, after which the performers and the officers in attendance on the throne stop their work. Ropes of reed, lances, and sticks of peach wood are presented by the emperor to the highest ministers, commanders, and special and general feudal rulers. Tr. . The syntax of this fangxiangshi description differs from the Zhouli: \u65b9\u76f8\u6c0f\u9ec3\u91d1\u56db\u76ee\u8499\u718a\u76ae \"the fangxiangshi [wears] four golden eyes [and] is covered by a bearskin\". The Book of Qi history of the Southern Qi dynasty (479-502) records that Nuo rituals were performed on the last day of the year by two groups, each of 120 lads, and twelve animals headed by drums and wind instruments. The gates of the wards and of the city walls were flung open, and the emperor in everyday attire contemplated the no from his throne, in the midst of his offices. With rolling drums the procession entered the Palace through the western-gate, passed through all parts of it in two divisions, even mounting the storeys and towers; the fang-siang and the twelve animals hopped, jumped, and cried, and having passed through the south gate, they spread in six directions till they reached the city-walls. Tr. . During the Sui dynasty (581-618 CE), the official ritualTr. . restricted using fangxiangshi exorcists to funerals of higher-ranking shi \"scholar-officials\"; officers of the 1st-4th degrees could use fangxiang, but those of the 5th-7th degrees could only use qitou ghost masks. 200px|Japanese H\u014ds\u014dshi \u65b9\u76f8\u6c0f exorcist illustration from the (c. 1781) Konjaku Hyakki Sh\u016bi 200px|Japanese Shinto ceremonial H\u014ds\u014dshi at Yoshida Shrine, (1928) painting by Nakajima S\u014dy\u014d \u4e2d\u5cf6\u8358\u967d 200px|Japanese Shinto ceremonial H\u014ds\u014dshi at Heian Shrine (2010) Tang dynasty The Tang dynasty (618-907) was a golden age in Chinese history during which the state religion continued fangxiangshi traditions and further regulated their details. The (732) Great Tang Ritual Regulations of the Kaiyuan Era (713-742, Emperor Xuanzong of Tang) says that in funeral processions ,Tr. . \"behind the carriage in which the soul-tablet was conveyed, came the carriage of the fang-siang, which, however, was to be replaced by a carriage with an ugly head [qitou] at funerals of officers of any grade below the fifth.\" This ritual text also gave instructions for celebrating the Nuo ritual in the provinces. Four fang-siang were to be used, with four precentors [ch\u00e0ngshu\u00e0i \u5531\u7387 \"song leaders\"], and by chiefs of first class governments sixty lads besides; chiefs of governments of the second or the third order might employ forty lads, and in the districts no more than twenty lads might be employed, with one fang-siang and one precentor; besides there might be four drummers and four whip-bearers. Such purification of official mansions and cities was to be accompanied by a sacrifice at the gates to the yin spirits, and concluded by burial of the sacrificial flesh and wine. . Duan Chengshi's (8th century) Miscellaneous Morsels from YouyangTr. . differentiates qitou \u9b4c\u982d \"ghost mask\" types, those with four eyes are named fangxiang and those with two eyes are named q\u012b \u50db \"dancers\". The Da Tang liudian book of Tang institutionsTr. . states that a person who performed the task of fangxiangshi would put on \"a mask with four golden eyes and wear a bear-skin outfit.\" The (1060) New Book of Tang . notes that for Nuo rituals, \"the lads should be between twelve and sixteen years old, masked, and arranged in four groups of six, and that, besides the whip-bearers, drummers and trumpeters, there should be two wu [shamans] in the procession. The exorcising song was to the very letter that of the Han dynasty.\" During the Song dynasty (960-1279), the tradition of burying protective wood or pottery figures of fangxiangshi in tombs was changed into figures made of perishable straw or bamboo. The Tang-Song handbook on burial practices, the Bicanq jing ,Tr. . says the fangxiang figures were \"woven in five colors, had four eyes and held tree branches in their hands\". The official ritual of the Song dynastyTr. . said funerals for officers of the four highest ranks could have one fangsiang exorcist, and those below in rank could only have a qitou ghost mask. This text also records that in 970, Emperor Taizu of Song decreed that for funerals in the capital of Kaifeng, \"it was forbidden to all families who had a burial to perform, to occupy themselves with Taoist and Buddhist observances, or to employ a van of men masked as strange men or animals.\" Similarly, during Ming dynasty (1368-1644) funeral ritualsTr. . were delimited to four-eyed fangxiang for officers of the 1st-4th ranks, two-eyed ones for officers of the 5th-7th ranks, and none for lower-ranking officers. De Groot describes popular exorcising processions as \"noisy, and even amusing, agreeably breaking the monotony of daily life\" on the last day of the year, with boys wearing ghost-masks of old and young people and numerous gods and spirits, men dressed in costumes of fearsome door gods to scare away evil spirits, and male and female wu-shamans dancing with drums, all under the guidance of men and women acting as \"fathers and mothers of the Nuo\" ritual. In the 1980s, the Chinese government officially recognized Nuo rituals as the folk religion of the Tujia people, who primarily live in the Wuling Mountains of Central China . Interpretations Lisa Raphals suggests that the Zhou dynasty ritual fangxiangshi \u65b9\u76f8\u6c0f may have been a predecessor of the Han dynasty professional fangshi \u65b9\u58eb \"recipe masters\". Bodde identifies the fangxiangshi with the demonic \"God of War\" Chiyou, who, according to legend, opposed the Yellow Emperor, citing Zhang Heng's (2nd century CE) Xijing fu poem that describes Chiyou similarly with how other texts portray the appearance and behavior of the fangxiangshi. The earliest record was the (c. 797) Shoku Nihongi history , which mentions a h\u014ds\u014dshi exorcist officiating at the burial ceremonies for Emperor Sh\u014dmu (756), Emperor K\u014dnin (781), and Emperor Kanmu (806). The Ky\u014dgen actor Nomura Mannoj\u014d noted that Chinese Nuo rituals \u513a were the 8th-century source for the Japanese tsuina \u8ffd\u513a or setsubun \"ritual to exorcise evil spirits on the last day of winter\", and proposed that supernatural power links the Chinese nuo performer fangxiangshi and the Japanese gigaku masked character Chid\u014d \u6cbb\u9053 \"govern the way\" who leads a . References Footnotes", "edit_actions": [{"type": "R", "before": "(Schuessler 2007: 231, 531, 466):", "after": ":", "start_char_pos": 168, "end_char_pos": 201}, {"type": "D", "before": "(Laufer 1914: 198)", "after": null, "start_char_pos": 1110, "end_char_pos": 1128}, {"type": "D", "before": "(Bodde 1975:79)", "after": null, "start_char_pos": 1224, "end_char_pos": 1239}, {"type": "D", "before": "(Boltz 1979: 431)", "after": null, "start_char_pos": 1306, "end_char_pos": 1323}, {"type": "D", "before": "(1979: 431)", "after": null, "start_char_pos": 1603, "end_char_pos": 1614}, {"type": "D", "before": "(tr. Harper 1985: 482)", "after": null, "start_char_pos": 2785, "end_char_pos": 2807}, {"type": "D", "before": "(2005:137)", "after": null, "start_char_pos": 3105, "end_char_pos": 3115}, {"type": "D", "before": "(1979: 431)", "after": null, "start_char_pos": 3284, "end_char_pos": 3295}, {"type": "D", "before": "(1975)", "after": null, "start_char_pos": 3314, "end_char_pos": 3320}, {"type": "D", "before": "(Boltz 1979: 423)", "after": null, "start_char_pos": 4128, "end_char_pos": 4145}, {"type": "D", "before": "(1979: 431)", "after": null, "start_char_pos": 4250, "end_char_pos": 4261}, {"type": "D", "before": "(1881 1:6)", "after": null, "start_char_pos": 4895, "end_char_pos": 4905}, {"type": "D", "before": "(de Groot 1910 1: 162; 6: 974)", "after": null, "start_char_pos": 5073, "end_char_pos": 5103}, {"type": "D", "before": "(Laufer 1909: 198)", "after": null, "start_char_pos": 5202, "end_char_pos": 5220}, {"type": "D", "before": "(Bodde 1975: 79-80),", "after": null, "start_char_pos": 5270, "end_char_pos": 5290}, {"type": "D", "before": "(Boltz 1979: 431)", "after": null, "start_char_pos": 5380, "end_char_pos": 5397}, {"type": "D", "before": "(Childs-Johnson 1995: 89)", "after": null, "start_char_pos": 5438, "end_char_pos": 5463}, {"type": "D", "before": "(Benn 2002: 270)", "after": null, "start_char_pos": 5488, "end_char_pos": 5504}, {"type": "D", "before": "(McCurley 2005:137)", "after": null, "start_char_pos": 5613, "end_char_pos": 5632}, {"type": "D", "before": "(1975: 79)", "after": null, "start_char_pos": 5801, "end_char_pos": 5811}, {"type": "D", "before": "(see von Falkenhausen 1995: 283-285)", "after": null, "start_char_pos": 6294, "end_char_pos": 6330}, {"type": "R", "before": "(tr. von Falkenhausen 1995: 291)", "after": "Tr. .", "start_char_pos": 6758, "end_char_pos": 6790}, {"type": "R", "before": ", tr. Bodde 1975: 78-79)", "after": ")Tr. .", "start_char_pos": 7514, "end_char_pos": 7538}, {"type": "D", "before": "(Fong 1991: 189-190)", "after": null, "start_char_pos": 7563, "end_char_pos": 7583}, {"type": "D", "before": "(see Childs-Johnson 1995)", "after": null, "start_char_pos": 8238, "end_char_pos": 8263}, {"type": "D", "before": ", von Falkenhausen 1995: 291", "after": null, "start_char_pos": 8371, "end_char_pos": 8399}, {"type": "D", "before": "2005:137)", "after": null, "start_char_pos": 8462, "end_char_pos": 8471}, {"type": "D", "before": ", Fukushima 2005: 258", "after": null, "start_char_pos": 8563, "end_char_pos": 8584}, {"type": "R", "before": "(tr. Groot 1910 6: 978-979)", "after": "Tr. .", "start_char_pos": 10401, "end_char_pos": 10428}, {"type": "R", "before": "(tr. Groot 1910 6: 976-977)", "after": "Tr. .", "start_char_pos": 12768, "end_char_pos": 12795}, {"type": "R", "before": "(tr. Groot 1910 6: 978-979)", "after": "Tr. .", "start_char_pos": 13670, "end_char_pos": 13697}, {"type": "R", "before": "ritual (tr. Groot 1910 6: 1151)", "after": "ritualTr. .", "start_char_pos": 13748, "end_char_pos": 13779}, {"type": "R", "before": "(tr. Groot 1910 6: 1151),", "after": ",Tr. .", "start_char_pos": 14552, "end_char_pos": 14577}, {"type": "R", "before": "(tr. Groot 1910 6: 980)", "after": ".", "start_char_pos": 15464, "end_char_pos": 15487}, {"type": "R", "before": "Youyang (tr. Groot 1910 6: 1152-1153)", "after": "YouyangTr. .", "start_char_pos": 15545, "end_char_pos": 15582}, {"type": "R", "before": "institutions (tr. Fong 1991: 189)", "after": "institutionsTr. .", "start_char_pos": 15751, "end_char_pos": 15784}, {"type": "R", "before": "(tr. Groot 1910 6: 980)", "after": ".", "start_char_pos": 15946, "end_char_pos": 15969}, {"type": "R", "before": "(tr. Fong 1991: 189),", "after": ",Tr. .", "start_char_pos": 16524, "end_char_pos": 16545}, {"type": "R", "before": "dynasty (tr. Groot 1910 6: 1152)", "after": "dynastyTr. .", "start_char_pos": 16687, "end_char_pos": 16719}, {"type": "R", "before": "rituals (tr. Groot 1910 6: 1152)", "after": "ritualsTr. .", "start_char_pos": 17213, "end_char_pos": 17245}, {"type": "D", "before": "(1910 6: 980)", "after": null, "start_char_pos": 17414, "end_char_pos": 17427}, {"type": "D", "before": "(Li 2006)", "after": null, "start_char_pos": 18048, "end_char_pos": 18057}, {"type": "D", "before": "(2009: 61)", "after": null, "start_char_pos": 18089, "end_char_pos": 18099}, {"type": "D", "before": "(1975: 124)", "after": null, "start_char_pos": 18250, "end_char_pos": 18261}, {"type": "D", "before": "(Gras 2004: 45)", "after": null, "start_char_pos": 18603, "end_char_pos": 18618}, {"type": "D", "before": "(Fukushima 2005: 258)", "after": null, "start_char_pos": 19117, "end_char_pos": 19138}, {"type": "D", "before": "Benn, Charles D. (2002), Daily Life in Traditional China: The Tang Dynasty, Greenwood. Biot, \u00c9douard (1881), Le Tcheou-li ou Rites des Tcheou, 2 vols., Imprimerie nationale. Bodde, Derk (1975), Festivals in Classical China: New Year and Other Annual Observations during the Han Dynasty, 206 BC-AD 220, Princeton University Press. Boltz, William G. (1979), \"Philological Footnotes to the Han New Year Rites, Festivals in Classical China: New Year and Other Annual Observances during the Han Dynasty 206 B.C.-A.D. 220 by Derk Bodde\", Journal of the American Oriental Society 99.3: 423-439. Childs-Johnson, Elizabeth (1995), \"The Ghost Head Mask and Metamorphic Shang Imagery\", Early China 20: 79-92. von Falkenhausen, Lothar (1995), \"Reflections on the Political Role of Spirit Mediums in Early China: The Wu Officials in the Zhou Li\", Early China 20: 279-300. Fong, Mary H. (1991), \"Antecedents of Sui-Tang Burial Practices in Shaanxi\", Artibus Asiae 51.3/4: 147-198. Fukushima, Yoshiko (2005), \"Masks, Interface of Past and Future: Nomura Mannoj\u014d's Shingigaku\", Asian Theatre Journal 22.2: 249-268. Gras, Alexandre (2004), \"\u8ffd\u513a\u306b\u304a\u3051\u308b\u546a\u6587\u306e\u540d\u79f0\u3068\u65b9\u76f8\u6c0f\u306e\u5f79\u5272\u306e\u5909\u5316\u306b\u3064\u3044\u3066\", Issues in Language and Culture 5: 35-53. Groot, J.J.M. de (1910), The Religious System of China 6, E. J. Brill. Harper, Donald (1985), \"A Chinese Demonography of the Third Century B. C.\", Harvard Journal of Asiatic Studies, 45.2: 459-498. Laufer, Berthold (1909), Chinese clay figures. Part I. Prolegomena on the history of defensive armor, Field Museum of Natural History, Anthropological series 13.2. Li, Lan (2006), \"The Changing Role of the Popular Religion of Nuo (\u50a9) in Modern Chinese Politics\", Modern Asian Studies, 45: 1-23. McCurley, Dallas (2005), \"Performing Patterns: Numinous Relations in Shang and Zhou China\", The Drama Review 49.3: 135-156. Raphals, Lisa (2009), \"Divination in the Han Shu Bibliographic Treatise\", Early China 32: 45-101. Schuessler, Axel (2007), ABC Etymological Dictionary of Old Chinese, University of Hawaii Press.", "after": null, "start_char_pos": 19152, "end_char_pos": 21156}, {"type": "A", "before": null, "after": "Footnotes", "start_char_pos": 21157, "end_char_pos": 21157}], "sents_char_pos": [0, 77, 256, 293, 313, 369, 383, 604, 694, 752, 793, 886, 964, 1003, 1025, 1282, 1434, 1460, 1527, 1568, 1585, 1785, 2140, 2347, 2421, 2527, 2593, 2680, 2731, 2784, 2922, 3075, 3275, 3568, 3755, 3925, 4147, 4243, 4552, 4665, 4815, 4958, 5012, 5095, 5323, 5540, 5698, 5769, 5792, 6041, 6199, 6332, 6467, 6907, 7099, 7272, 7509, 7606, 7619, 7657, 7698, 7832, 7981, 8395, 8587, 8741, 8834, 8908, 9040, 9150, 9266, 9381, 9612, 9675, 9735, 9803, 9878, 10182, 10400, 10517, 10637, 10825, 10909, 11058, 11128, 11290, 11673, 11754, 11790, 12058, 12296, 12431, 12613, 12767, 12951, 13169, 13332, 13498, 13669, 13874, 13994, 14423, 14804, 14893, 15040, 15224, 15284, 15463, 15717, 15768, 15917, 16212, 16281, 16463, 16528, 16654, 16867, 17161, 17404, 17874, 18059, 18243, 18543, 18762, 19238, 19325, 19481, 19739, 20010, 20118, 20250, 20344, 20415, 20542, 20589, 20837, 20961, 21059]}
+{"doc_id": "4682452", "revision_depth": "1", "before_revision": "Motivational therapy (or MT) is a combination of humanistic treatment and enhanced cognitive-behavioral strategies, designed to treat substance abuse . It is similar to motivational interviewing and motivational enhancement therapy. Method The focus of motivational therapy is to encourage a patient to develop a negative view of their abuse (contemplation), along with a desire to change their behavior (determination to change). A motivational therapist does not explicitly advocate change and tends to avoid directly contradicting their patient, but instead expresses empathy, rolls with resistance, and supports self-efficacy. Relapses in addictive behaviors are part of the treatment and is not considered a step back or a failure to advance in treatment. History First publicized by Miller and Rollnick in 1991, motivational therapy is now seen as a highly effective treatment strategy for substance abuse , especially in the case of opiate and euphoric-enhancement drugs, where users tend to resist traditional negative reinforcement strategies. Motivational Therapy was brought to public awareness by William Miller in a 1983 article published in Behavioural Psychotherapy. In 1991, Miller and Stephen Rollnick expanded on the fundamental approaches and concepts, while making more detailed descriptions of procedures in the clinical setting. He later defined it as a directive, client-centered counseling style for eliciting behavior change by helping clients to explore and resolve ambivalence. Compared with non-directive counseling, Motivational Therapy is more focused and goal-directed. The examination and resolution of ambivalence is its central purpose, and the counselor is intentionally directive in pursuing this goal. Since Miller and Rollnick, other psychologists have introduced models and various techniques to try to implement within the Motivational Therapy realm to help with substance abuse . Carlo DiClemente introduced models that linked motivation with change, proposing the Stages of Change Model, and using it to explain relapse, and the struggle of addiction being a matter of behavior change. The model states seven different stages of change, and a brief description of each stage: PrecontemplationNot ready to change ContemplationThinking about change PreparationGetting ready to make a change, planning and commitment ActionMaking the change, implementing the plan, taking the action MaintenanceSustaining behavior change until integrated into lifestyle, maintaining, integrating Relapse/recyclingSlipping back to previous behavior and re-entering the cycle of change TerminationLeaving the cycle of change The models, along with the techniques formulated by Rollnick and Miller have helped create a client-driven form of therapy that has been known to help clients with substance abuse and different caliber athletes in achieving success. Motivational Therapy was designed to be less confrontational than other therapies that encourage clients to realize that they have a problem that they need to confront in order to change. MT is different from those therapies that: Argue that the person has a problem and needs to change Offer direct advice or prescribes solutions to the problem without the person's permission or without actively encouraging the person to make his or her own choices Use an authoritative/expert stance leaving the client in a passive role Do most of the talking, or functions as a unidirectional information delivery system Impose a diagnostic label Behave in a punitive or coercive manner The aforementioned therapy techniques are known to violate the essential spirit of motivational therapy. MT is designed to be an interpersonal style of therapy that is not restricted to formal counseling settings. It focuses on the understanding of what initiates change while utilizing a guiding philosophy, and fosters a balance of components that are both directed and client-centered. Substance abuse Motivational therapy is not only helpful to the substance abuser but also helpful towards the non-users in the family as well. There has been an equally growing understanding and concern for not only chronic substance abusers but also their family and friends. Current literature assessments have consistently identified three main findings: (1) involvement of family members during the pre-treatment phase significantly improves engagement of substance abusers in treatment; (2) involvement of the family also improves retention in treatment, and (3) long-term outcomes are more positive when families and/or social networks are components of the treatment approach. Within motivational therapy, specific models have been introduced relating to various reasons for treatment. The Systematic Motivational Therapy (SMT) Model is used for treatment of substance abuse . The emphasis of this model is the focus on family relationships. This model does not only show the happiness and appreciation of the family in these relationships but also the complications and ambivalent relationships that comes with substance abuse . There are two distinct versions of the SMT model. Version one of the model includes the family approach towards substance abuse ; emphasizing four different principles: assessment, detoxification, relapse prevention, and rehabilitation. When being addressed, the entire family is present and attentive (not just the abuser) . Version 2 of the SMT model uses motivational interviewing approaches and combines these with family systems by using five basic principles that are critical in shaping therapist behavior: expressing empathy about the patients condition(s), developing discrepancies regarding the patients beliefs about his or her behavior, avoiding arguments about continued substance use; rolling with resistance to change and supporting patient self-efficacy regarding decisions about behavior change. Motivational interviewing (MI) is similar to motivational therapy in the sense that it attempts not to create change within an individual but give foundation and support to the change the individual finds within him or her self. As a treatment for individuals with all types of substance abuse disorders, motivational interview therapists focus on trying to erase any type of ambivalence the individual may have towards their abuse . Similar to MET, motivational interviewing finds 'change talk' very important and the clinician interacts with the patient through open-ended questions, affirmations, reflections and end-of-session summaries. There are three key elements that build the foundation of motivational interviewing; collaboration, evocation and autonomy. Evocation is expressed through the clinician's responsibility to \"draw out\" the opinions and commitment to change of the client, rather than suggesting or imposing ideas. The client and the therapist, through collaboration, work together to build a trusting relationship, as opposed to the therapist taking the expert or higher role between the two. While Motivational Therapy is a method to treat substance abuse , Motivational Enhancement Therapy (MET) is also a very common way to treat alcoholism or alcohol abuse . MET is very focused on the individual or patient taking responsibility for their abuse and speaking about the actions needed to evoke change in their life. Through this therapy, patients learn alternative routes to deal with such a huge change in their lifestyle. Similar to MT, therapists attempt throughout MET to evoke a feeling of optimism within patients, but unlike motivational therapy, therapists are very clear on their advice and suggestions for change. Without taking the back seat and just listening to their patients' thoughts, therapists of MET are more vocal in their feedback towards patient improvement. Like MT, there are five stages which set the stage for successful MET (in order, from beginning to end): Pre-contemplation, contemplation, determination, action, maintenance. If not permanently successful, there becomes a sixth stage to work through \u2013 relapse. American Psychological Associates 2003. Authors: Burke, Brian L.; Arkowitz Hal; and Menchola, Marisa. The Efficacy of Motivational Interviewing: A Meta-Analysis of Controlled Clinical Trials. Retrieved April 9, 2006. Advances in Psychiatric Treatment, Volume 9 (pp. 280\u2013288). Author Luty, Jason. What works in drug addiction. Retrieved October 24, 2020. American Psychological Associates 2004. Authors: Miller, William R.; Yahne, Carolina E.; Moyers, Theresa B.; Martinez James; and Pirritano, Matthew. A Randomised Trial of Methods to Help Clinicians Learn Motivational Interviewing. Retrieved April 9, 2006. DiClemente C. Motivational enhancement therapy. Program and abstracts of the American. Society of Addiction Medicine 2003 The State of the Art in Addiction. Medicine; October 30 \u2013 November 1, 2003; Washington, DC. Session I. DiClemente CC. Motivation for change: implications for substance abuse treatment. Psychol Sci. 1999;10:209\u2013213. Miller WR, Rollnick S. What Is Motivational Interviewing? Behavioural and Cognitive Psychotherapy. 1995; 23, 325\u2013334. Miller WR, Rollnick S. Motivational Interviewing: Preparing People for Change, 2nd edition. New York: Guilford Press; 2002. URL American Psychological Associates 2003. Authors: Burke, Brian L.; Arkowitz Hal; and Menchola, Marisa. The Efficacy of Motivational Interviewing: A Meta-Analysis of Controlled Clinical Trials. Retrieved April 9, 2006. Advances in Psychiatric Treatment, Volume 9 (pp. 280\u2013288). Author Luty, Jason. What works in drug addiction?. Retrieved April 9, 2006. American Psychological Associates 2004. Authors: Miller, William R.; Yahne, Carolina E.; Moyers, Theresa B.; Martinez James; and Pirritano, Matthew. A Randomised Trial of Methods to Help Clinicians Learn Motivational Interviewing. Retrieved April 9, 2006. Elizabeth Howell, MD. (2004). Motivation Therapy. Medscape Today. William R. Miller, PhD (2009). An Overview of Motivational Interviewing. MI. Steinglass, P. (2009). Systemic-motivational therapy for substance abuse disorders: An integrative model. Journal of Family Therapy, 31(2), 155\u2013174. doi:10.1111/j. 1467\u20136427.2009.00460.x Edwards and Steinglass, 1995; Miller et al., 1999; O\u2019Farrell and Fals-Stewart, 2003; Rowe and Liddle, 2003; Stanton and Heath, 2005; Thomas and Corcoran, 2001. Category:Motivation Category: Psy", "after_revision": "Motivational therapy (or MT) is a combination of humanistic treatment and enhanced cognitive-behavioral strategies, designed to treat substance use disorders . It is similar to motivational interviewing and motivational enhancement therapy. Method The focus of motivational therapy is to encourage a patient to develop a negative view of their substance use (contemplation), along with a desire to change their behavior (determination to change). A motivational therapist does not explicitly advocate change and tends to avoid directly contradicting their patient, but instead expresses empathy, rolls with resistance, and supports self-efficacy. Relapses in addictive behaviors are part of the treatment and is not considered a step back or a failure to advance in treatment. History First publicized by Miller and Rollnick in 1991, motivational therapy is now seen as a highly effective treatment strategy for substance use disorders , especially in the case of opiate and euphoric-enhancement drugs, where users tend to resist traditional negative reinforcement strategies. Motivational Therapy was brought to public awareness by William Miller in a 1983 article published in Behavioural Psychotherapy. In 1991, Miller and Stephen Rollnick expanded on the fundamental approaches and concepts, while making more detailed descriptions of procedures in the clinical setting. He later defined it as a directive, client-centered counseling style for eliciting behavior change by helping clients to explore and resolve ambivalence. Compared with non-directive counseling, Motivational Therapy is more focused and goal-directed. The examination and resolution of ambivalence is its central purpose, and the counselor is intentionally directive in pursuing this goal. Since Miller and Rollnick, other psychologists have introduced models and various techniques to try to implement within the Motivational Therapy realm to help with substance use . Carlo DiClemente introduced models that linked motivation with change, proposing the Stages of Change Model, and using it to explain relapse, and the struggle of addiction being a matter of behavior change. The model states seven different stages of change, and a brief description of each stage: PrecontemplationNot ready to change ContemplationThinking about change PreparationGetting ready to make a change, planning and commitment ActionMaking the change, implementing the plan, taking the action MaintenanceSustaining behavior change until integrated into lifestyle, maintaining, integrating Relapse/recyclingSlipping back to previous behavior and re-entering the cycle of change TerminationLeaving the cycle of change The models, along with the techniques formulated by Rollnick and Miller have helped create a client-driven form of therapy that has been known to help clients with substance use and different caliber athletes in achieving success. Motivational Therapy was designed to be less confrontational than other therapies that encourage clients to realize that they have a problem that they need to confront in order to change. MT is different from those therapies that: Argue that the person has a problem and needs to change Offer direct advice or prescribes solutions to the problem without the person's permission or without actively encouraging the person to make his or her own choices Use an authoritative/expert stance leaving the client in a passive role Do most of the talking, or functions as a unidirectional information delivery system Impose a diagnostic label Behave in a punitive or coercive manner The aforementioned therapy techniques are known to violate the essential spirit of motivational therapy. MT is designed to be an interpersonal style of therapy that is not restricted to formal counseling settings. It focuses on the understanding of what initiates change while utilizing a guiding philosophy, and fosters a balance of components that are both directed and client-centered. Substance use disorders Motivational therapy is not only helpful to the person using substances but also helpful towards their family as well. There has been an equally growing understanding and concern not only for people who use substances but also for their family and friends. Current literature assessments have consistently identified three main findings: (1) involvement of family members during the pre-treatment phase significantly improves engagement of people who use substances in treatment; (2) involvement of the family also improves retention in treatment, and (3) long-term outcomes are more positive when families and/or social networks are components of the treatment approach. Within motivational therapy, specific models have been introduced relating to various reasons for treatment. The Systematic Motivational Therapy (SMT) Model is used for treatment of substance use . The emphasis of this model is the focus on family relationships. This model does not only show the happiness and appreciation of the family in these relationships but also the complications and ambivalent relationships that comes with substance use . There are two distinct versions of the SMT model. Version one of the model includes the family approach towards substance use ; emphasizing four different principles: assessment, detoxification, relapse prevention, and rehabilitation. When being addressed, the entire family is present and attentive . Version 2 of the SMT model uses motivational interviewing approaches and combines these with family systems by using five basic principles that are critical in shaping therapist behavior: expressing empathy about the patients condition(s), developing discrepancies regarding the patients beliefs about his or her behavior, avoiding arguments about continued substance use; rolling with resistance to change and supporting patient self-efficacy regarding decisions about behavior change. Motivational interviewing (MI) is similar to motivational therapy in the sense that it attempts not to create change within an individual but give foundation and support to the change the individual finds within him or her self. As a treatment for individuals with all types of substance use disorders, motivational interview therapists focus on trying to erase any type of ambivalence the individual may have towards their use . Similar to MET, motivational interviewing finds 'change talk' very important and the clinician interacts with the patient through open-ended questions, affirmations, reflections and end-of-session summaries. There are three key elements that build the foundation of motivational interviewing; collaboration, evocation and autonomy. Evocation is expressed through the clinician's responsibility to \"draw out\" the opinions and commitment to change of the client, rather than suggesting or imposing ideas. The client and the therapist, through collaboration, work together to build a trusting relationship, as opposed to the therapist taking the expert or higher role between the two. While Motivational Therapy is a method to treat substance use , Motivational Enhancement Therapy (MET) is also a very common way to treat alcohol use disorder . MET is very focused on the individual or patient taking responsibility for their use and speaking about the actions needed to evoke change in their life. Through this therapy, patients learn alternative routes to deal with such a huge change in their lifestyle. Similar to MT, therapists attempt throughout MET to evoke a feeling of optimism within patients, but unlike motivational therapy, therapists are very clear on their advice and suggestions for change. Without taking the back seat and just listening to their patients' thoughts, therapists of MET are more vocal in their feedback towards patient improvement. Like MT, there are five stages which set the stage for successful MET (in order, from beginning to end): Pre-contemplation, contemplation, determination, action, maintenance. If not permanently successful, there becomes a sixth stage to work through \u2013 relapse. American Psychological Associates 2003. Authors: Burke, Brian L.; Arkowitz Hal; and Menchola, Marisa. The Efficacy of Motivational Interviewing: A Meta-Analysis of Controlled Clinical Trials. Retrieved April 9, 2006. Advances in Psychiatric Treatment, Volume 9 (pp. 280\u2013288). Author Luty, Jason. What works in drug addiction. Retrieved October 24, 2020. American Psychological Associates 2004. Authors: Miller, William R.; Yahne, Carolina E.; Moyers, Theresa B.; Martinez James; and Pirritano, Matthew. A Randomised Trial of Methods to Help Clinicians Learn Motivational Interviewing. Retrieved April 9, 2006. DiClemente C. Motivational enhancement therapy. Program and abstracts of the American. Society of Addiction Medicine 2003 The State of the Art in Addiction. Medicine; October 30 \u2013 November 1, 2003; Washington, DC. Session I. Miller WR, Rollnick S. What Is Motivational Interviewing? Behavioural and Cognitive Psychotherapy. 1995; 23, 325\u2013334. Miller WR, Rollnick S. Motivational Interviewing: Preparing People for Change, 2nd edition. New York: Guilford Press; 2002. URL American Psychological Associates 2003. Authors: Burke, Brian L.; Arkowitz Hal; and Menchola, Marisa. The Efficacy of Motivational Interviewing: A Meta-Analysis of Controlled Clinical Trials. Retrieved April 9, 2006. Advances in Psychiatric Treatment, Volume 9 (pp. 280\u2013288). Author Luty, Jason. What works in drug addiction?. Retrieved April 9, 2006. American Psychological Associates 2004. Authors: Miller, William R.; Yahne, Carolina E.; Moyers, Theresa B.; Martinez James; and Pirritano, Matthew. A Randomised Trial of Methods to Help Clinicians Learn Motivational Interviewing. Retrieved April 9, 2006. Elizabeth Howell, MD. (2004). Motivation Therapy. Medscape Today. William R. Miller, PhD (2009). An Overview of Motivational Interviewing. MI. Edwards and Steinglass, 1995; Miller et al., 1999; O\u2019Farrell and Fals-Stewart, 2003; Rowe and Liddle, 2003; Stanton and Heath, 2005; Thomas and Corcoran, 2001. Category:Motivation Category: Psychotherapy Category:Substance-related disorder", "edit_actions": [{"type": "R", "before": "abuse", "after": "use disorders", "start_char_pos": 144, "end_char_pos": 149}, {"type": "R", "before": "abuse", "after": "substance use", "start_char_pos": 336, "end_char_pos": 341}, {"type": "R", "before": "abuse", "after": "use disorders", "start_char_pos": 906, "end_char_pos": 911}, {"type": "R", "before": "abuse", "after": "use", "start_char_pos": 1913, "end_char_pos": 1918}, {"type": "R", "before": "abuse", "after": "use", "start_char_pos": 2819, "end_char_pos": 2824}, {"type": "R", "before": "abuse", "after": "use disorders", "start_char_pos": 3952, "end_char_pos": 3957}, {"type": "R", "before": "substance abuser", "after": "person using substances", "start_char_pos": 4006, "end_char_pos": 4022}, {"type": "R", "before": "the non-users in the", "after": "their", "start_char_pos": 4048, "end_char_pos": 4068}, {"type": "R", "before": "for not only chronic substance abusers but also", "after": "not only for people who use substances but also for", "start_char_pos": 4145, "end_char_pos": 4192}, {"type": "R", "before": "substance abusers", "after": "people who use substances", "start_char_pos": 4402, "end_char_pos": 4419}, {"type": "R", "before": "abuse", "after": "use", "start_char_pos": 4818, "end_char_pos": 4823}, {"type": "R", "before": "abuse", "after": "use", "start_char_pos": 5071, "end_char_pos": 5076}, {"type": "R", "before": "abuse", "after": "use", "start_char_pos": 5201, "end_char_pos": 5206}, {"type": "D", "before": "(not just the abuser)", "after": null, "start_char_pos": 5381, "end_char_pos": 5402}, {"type": "R", "before": "abuse", "after": "use", "start_char_pos": 6180, "end_char_pos": 6185}, {"type": "R", "before": "abuse", "after": "use", "start_char_pos": 6318, "end_char_pos": 6323}, {"type": "R", "before": "abuse", "after": "use", "start_char_pos": 7066, "end_char_pos": 7071}, {"type": "R", "before": "alcoholism or alcohol abuse", "after": "alcohol use disorder", "start_char_pos": 7148, "end_char_pos": 7175}, {"type": "R", "before": "abuse", "after": "use", "start_char_pos": 7259, "end_char_pos": 7264}, {"type": "D", "before": "DiClemente CC. Motivation for change: implications for substance abuse treatment. Psychol Sci. 1999;10:209\u2013213.", "after": null, "start_char_pos": 8895, "end_char_pos": 9006}, {"type": "D", "before": "Steinglass, P. (2009). Systemic-motivational therapy for substance abuse disorders: An integrative model. Journal of Family Therapy, 31(2), 155\u2013174. doi:10.1111/j. 1467\u20136427.2009.00460.x", "after": null, "start_char_pos": 10004, "end_char_pos": 10190}, {"type": "R", "before": "Psy", "after": "Psychotherapy Category:Substance-related disorder", "start_char_pos": 10381, "end_char_pos": 10384}], "sents_char_pos": [0, 151, 232, 430, 630, 760, 1052, 1181, 1350, 1504, 1600, 1738, 2127, 2217, 2331, 2380, 2877, 3065, 3108, 3425, 3657, 3766, 3941, 4084, 4218, 4433, 4625, 4734, 4825, 4890, 5078, 5128, 5208, 5315, 5777, 5891, 6120, 6533, 6618, 6657, 6828, 7007, 7333, 7441, 7641, 7798, 7973, 8059, 8099, 8125, 8139, 8161, 8251, 8276, 8335, 8355, 8385, 8413, 8453, 8482, 8502, 8522, 8538, 8562, 8644, 8669, 8683, 8717, 8756, 8826, 8867, 8909, 8976, 9006, 9029, 9064, 9105, 9124, 9216, 9242, 9292, 9318, 9332, 9354, 9444, 9469, 9528, 9548, 9579, 9604, 9644, 9673, 9693, 9713, 9729, 9753, 9835, 9860, 9890, 9910, 9926, 9957, 9999, 10026, 10109, 10220, 10241, 10275, 10298, 10323, 10350]}
+{"doc_id": "47281588", "revision_depth": "1", "before_revision": "On the death of Ferdinand VII on 29 September 1833, his wife Mar\u00eda Cristina de Borb\u00f3n-Dos Sicilias assumed the regency with the support of the liberals, on behalf of their daughter and future queen, Isabella II. Conflict with her brother-in-law, Carlos Mar\u00eda Isidro de Borb\u00f3n, who aspired to the throne by virtue of a supposedly valid Salic Law - already repealed by Carlos IV and Ferdinand VII himself - led the country into the First Carlist War. After the brief regency of Espartero, which succeeded the regency of Mar\u00eda Cristina de Borb\u00f3n-Dos Sicilias, Isabella II was proclaimed of age at the age of thirteen by resolution of the Cortes Generales in 1843. Thus began the effective reign of Isabella II, which is usually divided into four periods: the moderate decade ( 1844-1854 ); the Progressive Biennium (1854-1856 ); the period of the Liberal Union governments ( 1856-1863 ) and the final crisis ( 1863-1868 ). The reign of Isabella II was divided into two major stages: her minority reign (1833\u20131843), during which the regency of Spain was assumed first by her mother Maria Christina of the Two Sicilies and later by general Baldomero Espartero. Upon the death of Ferdinand VII on 29 September 1833, his wife, Maria Christina of the Two Sicilies assumed the regency with the support of the liberals, in the name of her daughter and future queen, Isabella II. The conflict with her brother-in-law, Infante Carlos, Count of Molina, who aspired to the throne in virtue of the presumed validity of Salic law\u2014which had been abolished by Charles IV and ignored by Ferdinand VII\u2014brought the nation into the First Carlist War. her true reign ( 1843-1868 ), which began with the declaration of the Cortes Generales that her majority reign was to begin when she was thirteen years old. This period can also be subdivided in following periods : Isabella II 1844 - 1854: The Moderate decade (D\u00e9cada moderada), a period of conservative retrenchment under the Moderate Party after the passing of the progressive constitution of 1837. 1854 - 1856: The Progressive two years (Bienio progresista), following the unrest of the Vicalvarada, as the Progressive Party attempted to implement the reformist Manzanares manifesto. 1856 - 1868: The Liberal Union period, as the Liberal Union government, a centrist coalition, tried to maintain a balance between the two positions 1868: The crisis (La Gloriosa) and downfall of Queen Isabela, leading to her exile to France. In 1840, Mar\u00eda Cristina, aware of her weakness, tried to reach an agreement with Espartero, but he sided with the progressives when the \"revolution of 1840\" broke out in Madrid on 1 September. Mar\u00eda Cristina was then forced to leave Spain and leave the Regency in Espartero's hands on 12 October 1840. During Espartero's Regency , the general did not know how to surround himself with the liberal spirit that had brought him to power, and preferred to entrust the most important and transcendental matters to like-minded military officers, known as Ayacuchos because of the false belief that Espartero had been at the Battle of Ayacucho. In fact, General Espartero was accused of exercising the Regency in the form of a dictatorship. With the fall of Espartero, the political and military class as a whole came to the conviction that a new Regency should not be called for, but that the Queen's majority should be recognised, despite the fact that Isabella was only twelve years old. Thus began the effective reign of Isabella II ( 1843-1868 ), which was a complex period, not without its ups and downs, which marked the rest of the political situation of the 19th century and part of the 20th century in Spain. The proclamation of the coming of age of Isabella II and the \"Ol\u00f3zaga incident\" edit code - edit The exile of the regent, General General General Ol\u00f3zaga. The exile of the regent General Baldomero Espartero produced a political vacuum. The \"radical\" progressive Joaqu\u00edn Mar\u00eda L\u00f3pez was restored by the Cortes to the post of Head of Government on 23 July, and to do away with the Senate, where the \"Esparteristas\" had a majority, he dissolved it and called elections to renew it completely - in violation of Article 19 of the 1837 Constitution, which only allowed it to be renewed by thirds. He also appointed the City Council and the Diputaci\u00f3n de Madrid -which was also a violation of the Constitution- to prevent the \"Spartacists\" from taking over both institutions in an election -L\u00f3pez justified it as follows: \"when fighting for existence, the principle of conservation is the one that stands out above all: one does what one does with the sick person who is amputated so that he may live \". The January 1844 elections were won by the moderates, which provoked progressive uprisings in several provinces in February and March that denounced the government's \"influence\" on the outcome of the elections. Thus the progressive leaders Cortina, Madoz and Caballero were imprisoned for six months -Ol\u00f3zaga was not arrested because he was in Lisbon and Joaqu\u00edn Mar\u00eda L\u00f3pez remained in hiding until his companions were released from prison-. In May General Ram\u00f3n Mar\u00eda Narv\u00e1ez, the true leader of the Moderate Party, assumed the presidency of the government, inaugurating the so-called Moderate Decade (1844-1854 ). After the fall of Espartero and the proclamation of Isabella's majority, a series of moderate governments began, supported by the Crown. The first measure taken by the moderates in power was to prevent progressive uprisings, for which they disbanded the National Militia and re-established the Law of Town Councils to better control local governments from the Central Government , which prevented the creation of Juntas. When her reign began, the Queen was only 13 years old and had no experience of government, so she was greatly influenced by the people around her. The Progressive Biennium (1854-1856 ) During Bravo Murillo's conservative government, a high degree of corruption was evident as a result of disorderly economic growth and internal intrigues to obtain advantages in public concessions, a situation in which the entire royal family itself was implicated. Bravo Murillo, who many considered an honest public servant, resigned in 1852, and was succeeded by three governments until July 1854. Meanwhile, Leopoldo O'Donnell, a former collaborator of the former Regent Mar\u00eda Cristina, joined the more liberal moderates and tried to organise an uprising, relying on a number of officers and some of the figures who, years later, would become prominent politicians such as Antonio C\u00e1novas del Castillo. On 28 June O'Donnell, who had gone into hiding in Madrid, joined forces and clashed with troops loyal to the government at Vic\u00e1lvaro, in what became known as La Vicalvarada, but there was no clear winner. Throughout June and July other troops joined the uprising in Barcelona. On 17 July, in Madrid, civilians and soldiers took to the streets in a succession of violent acts, endangering the very life of the Queen 's mother, Mar\u00eda Cristina, who had to seek refuge. The barricades and the distribution of weapons gave victory to the insurgents. After some desperate attempts by the Queen to appoint a President of the Council to contain the riots, she finally surrendered to the evidence and, following her mother's orders, appointed Espartero as President . This marked the beginning of the so-called Progressive Biennium . On 28 July 1854, Espartero and O'Donnell entered Madrid, acclaimed by the crowd as heroes. Espartero was forced to appoint O'Donnell as Minister of War because of his popularity and the control he exercised over large sections of the military. This communion between the two, seemingly loyal to each other, was not without its problems. While O'Donnell tried to counteract Espartero's progressive liberal practices in terms of his position on the Church and disentailment, the former regent sought a path towards liberalism in Spain, greatly influenced by his own personality and the changes taking place in Europe. On the other hand, social unrest increased, as in the uprising in Barcelona against forced conscription, low wages and long working hours. The government reacted by introducing some labour improvements and the right of association. The final crisis came in 1856, with numerous uprisings that forced Espartero to resign. The Queen appoints O'Donnell as head of government. The \"moderate biennium \" and the governments of the Liberal Union (1856-1863) General O'Donnell played a leading role in the Vicalvarada that started the Progressive Biennium and was the architect of the governments of the Liberal Union. Once appointed President of the Council of Ministers, O'Donnell restored the 1845 Constitution with an Additional Act with which he tried to attract liberal sectors. The struggles between the different moderate and liberal factions, and among themselves, continued in spite of everything. After the events of July, O'Donnell's weakness led the Queen to change government again with Narv\u00e1ez on 12 October 1856. The instability continued and the Queen offered the presidency to Bravo Murillo, who refused and General Francisco Armero took over the post for less than three months. On 14 January 1858 he was succeeded by Francisco Javier Ist\u00fariz. O'Donnell's return would mark the beginning of the long period of the Liberal Union governments. On 30 June 1858, O'Donnell formed a government in which he reserved for himself the Ministry of War. The cabinet lasted four and a half years, until 17 January 1863, and was the most stable government of the period. Although there were occasional changes, it had no more than a dozen ministers. The key members of the new executive were the Minister of Finance, Pedro Salaverr\u00eda, who was in charge of maintaining the economic recovery, and the Minister of the Interior , Jos\u00e9 de Posada Herrera, who masterfully and skilfully controlled the electoral lists and any misbehaviour of the members of the new Liberal Union party. The 1845 Constitution was re-established and the elections to the Cortes on 20 September 1858 gave the Liberal Union absolute control of the legislative branch. The most important actions were the major investments in public works, including the approval of extraordinary credits, which allowed the development of the railways and the improvement of the army; the policy of confiscation continued, although the State handed over public debt to the Church in exchange and reinstated the Concordat of 1851; various laws were passed that would later be key and whose validity extended into the 20th century: the Mortgage Law (1861), internal administrative reform of the Central Administration and the municipalities and the first Road Plan. To its detriment, the Government did not manage to banish the political and economic corruption that reached all levels of power, did not approve the announced press law and, from 1861 onwards, saw its parliamentary support wane. In principle, the foreign policy of the Elizabethan era tried to limit itself to maintaining Spain's status as a second-rate power, but this was limited in several ways. Firstly, the lack of definition of Spanish international action, even during the governments of the Liberal Union; secondly, the maintenance of economic interests in different parts of the world which, however, could not be met by a modern army capable of meeting the challenges of moving around the globe; thirdly, the Queen 's own ineffectiveness and lack of knowledge of international policy; and fourthly, the military and economic strength of France and Great Britain. The fall of the Liberal Union government In 1861 the policy of harassment of O'Donnell's government multiplied on the part of the Moderate and Progressive parties. Influential people such as C\u00e1novas, Antonio de los R\u00edos Rosas -one of its founders- and General Prim himself, among others, left the Liberal Union due to disagreements with the cabinet. The most common complaint was the betrayal of the ideas that had brought the prestigious general to power. They were joined by members of the army and the Catalan bourgeoisie. The discrepancies in the cabinet were not resolved with the departure of Posada Herrera in January 1863. Thus, on 2 March the Queen accepted O'Donnell's resignation. Final crisis of the reign ( 1863-1868 ) After the Progressive Biennium, the Constitution of 1845 was re-established and the Liberal Union remained in power under O'Donnell ( 1856-1863) Narv\u00e1ez returned, in a quiet period, with the establishment of the centralised state order and after halting the disentailment process of Madoz. Foreign policy was used to prevent the population from focusing on internal problems. Spain became involved in conflicts in Morocco, Indochina and Mexico. In 1863, the coalition of progressives, democrats and republicans won, although Narv\u00e1ez came to power, with a dictatorial government that ended in 1868, when a new revolution broke out, directed against the government and Queen Isabella II: the Glorious Revolution. Replacing O'Donell was not easy. The traditional parties had more than their share of problems and clashes between their members. It was the Moderates, through General Fernando Fern\u00e1ndez de C\u00f3rdova, who offered the possibility of forming a cabinet. The progressives, led by Pascual Madoz, considered it advisable to dissolve the Cortes. In the end, the Queen entrusted the government to Manuel Pando Fern\u00e1ndez de Pineda, Count of Miraflores, who had little support, and although he tried to involve the progressives in the political game, they decided to withdraw. His presidency lasted only until January 1864. Seven other governments succeeded one another until the revolution of 1868, including the one presided over by Alejandro Mon y Men\u00e9ndez on 1 March 1864, which included C\u00e1novas as Minister of the Interior for the first time and Salaverr\u00eda as Minister of Finance. For their part, the progressives considered Espartero to have been defeated, and Ol\u00f3zaga, together with Prim, began to form an alternative that had no confidence in Isabella II's ability to overcome the permanent crisis. Narv\u00e1ez formed a government on 16 September 1864 with the intention of uniting forces and bringing together a unionist spirit that would allow the progressives to integrate into active politics, fearful that the questioning of the reign would go further. The progressive refusal to participate in a system they considered corrupt and outdated led Narv\u00e1ez to authoritarianism and a cascade of resignations within the cabinet. To all this was added, to the discredit of the government, the events of the Night of St. Daniel on 10 April 1865. University students in the capital were protesting against the measures of Antonio Alcal\u00e1 Galiano, who tried to remove the spirit of rationalism and Krausism from the classrooms, maintaining the old doctrine of the official morality of the Catholic Church, and against the expulsion of Emilio Castelar from the chair of History for his articles in La Democracia, where he denounced the sale of the Royal Heritage with the Queen 's appropriation of 25 percent of the revenue. Harsh government repression of the protests led to the deaths of thirteen university students. The crisis led to the formation of a new government on 21 June with the return of O'Donnell, C\u00e1novas and Manuel Alonso Mart\u00ednez to the Ministry of Finance , as well as other prominent figures. Among other measures, a new law was passed which increased the electoral body to 400,000 voters, almost double the previous number, and elections to the Cortes were called. Before the elections were held, however, the progressives announced that they were maintaining their withdrawal. Prim revolted in Villarejo de Salvan\u00e9s in a clear political turn that was committed to seizing power by force, but the coup was not properly planned and failed. Once again, the hostile attitude of the progressives enervated O'Donnell, who reinforced the authoritarian content of the government, which led to the uprising at the San Gil Barracks on 22 June, again organised by Prim, but which again failed and filled the streets with blood, with more than sixty people condemned to death. O'Donnell retired, exhausted, from political life and on 10 July he was replaced by Narv\u00e1ez, who condoned the unexecuted sentences of the rebels but maintained the authoritarian rigour with expulsions of republicans and Krausists from the professorships and the strengthening of censorship and public order. When Narv\u00e1ez died, he was succeeded on 23 April 1868 by the authoritarian Luis Gonz\u00e1lez Bravo, but the revolution had been forged and the end of the monarchy approached on 19 September with La Gloriosa to the cry of \"Down with the Bourbons! Long live Spain with honour!\", while Isabella II went into exile to begin the Democratic Sexenio . The creation of the centralised state It represents the great contribution of the Moderates, above all because of its duration, because it is in force until the State of the Autonomies. The centralised State was not part of the Constitution of 1845, but was created by organic laws. The architect was Pedro Jos\u00e9 Pidal, who imported the Napoleonic model of centralisation carried out during the Consulate . According to Napoleon, centralism consisted of creating an administration controlled by single-person agents. The most important link was the central government, followed by the departments, headed by prefects, and below that was the maire at the head of each basic territorial unit. Adapted to Spain, the Queen and the head of government are placed first. In the second tier are the Civil Governors , at the head of the provinces and appointed by the Central Government ; and finally the mayors, town councils and deputations, appointed by the Civil Governors , although in large cities they are appointed by the Central Government . Within the centralised Spanish state, the Provincial Councils , which had had great political and economic power, stood out, but with the Moderates their power was reduced to a consultative body. The main support of each Civil Governor was the Provincial Council , appointed from Madrid, which acted as a court for contentious and administrative matters, mediating between citizens and the Administration . Within the town councils, all councillors are elected by census suffrage and must be accepted by the Mayor and the Civil Governor . The mayor must maintain public order, adapting to what is designated by the central government, which, in some cases, reserves the right to appoint a Corregidor instead of a mayor, given that the mayor was elected by election and the Corregidor was handpicked. Bibliographia", "after_revision": "On the death of Ferdinand VII on 29 September 1833, his wife Mar\u00eda Cristina de Borb\u00f3n-Dos Sicilias assumed the regency with the support of the liberals, on behalf of their daughter and future queen, Isabella II. Conflict with her brother-in-law, Carlos Mar\u00eda Isidro de Borb\u00f3n, who aspired to the throne by virtue of a supposedly valid Salic Law \u2014 already repealed by Carlos IV and Ferdinand VII himself \u2014 led the country into the First Carlist War. After the brief regency of Espartero, which succeeded the regency of Mar\u00eda Cristina de Borb\u00f3n-Dos Sicilias, Isabella II was proclaimed of age at the age of thirteen by resolution of the Cortes Generales in 1843. Thus began the effective reign of Isabella II, which is usually divided into four periods: the moderate decade ( 1844\u20131854 ); the progressive biennium (1854\u20131856 ); the period of the Liberal Union governments ( 1856\u20131863 ) and the final crisis ( 1863\u20131868 ). The reign of Isabella II was divided into two major stages: her minority reign (1833\u20131843), during which the regency of Spain was assumed first by her mother Maria Christina of the Two Sicilies and later by general Baldomero Espartero. Upon the death of Ferdinand VII on 29 September 1833, his wife, Maria Christina of the Two Sicilies assumed the regency with the support of the liberals, in the name of her daughter and future queen, Isabella II. The conflict with her brother-in-law, Infante Carlos, Count of Molina, who aspired to the throne in virtue of the presumed validity of Salic law\u2014which had been abolished by Charles IV and ignored by Ferdinand VII\u2014brought the nation into the First Carlist War. her true reign ( 1843\u20131868 ), which began with the declaration of the Cortes Generales that her majority reign was to begin when she was thirteen years old. This period can also be subdivided in following periods : Isabella II 1844 \u2013 1854: The Moderate decade (D\u00e9cada moderada), a period of conservative retrenchment under the Moderate Party after the passing of the progressive constitution of 1837. 1854 \u2013 1856: The progressive two years (Bienio progresista), following the unrest of the Vicalvarada, as the Progressive Party attempted to implement the reformist Manzanares manifesto. 1856 \u2013 1868: The Liberal Union period, as the Liberal Union government, a centrist coalition, tried to maintain a balance between the two positions 1868: The crisis (La Gloriosa) and downfall of Queen Isabela, leading to her exile to France. In 1840, Mar\u00eda Cristina, aware of her weakness, tried to reach an agreement with Espartero, but he sided with the progressives when the \"revolution of 1840\" broke out in Madrid on 1 September. Mar\u00eda Cristina was then forced to leave Spain and leave the regency in Espartero's hands on 12 October 1840. During Espartero's regency , the general did not know how to surround himself with the liberal spirit that had brought him to power, and preferred to entrust the most important and transcendental matters to like-minded military officers, known as Ayacuchos because of the false belief that Espartero had been at the Battle of Ayacucho. In fact, General Espartero was accused of exercising the Regency in the form of a dictatorship. With the fall of Espartero, the political and military class as a whole came to the conviction that a new regency should not be called for, but that the Queen's majority should be recognised, despite the fact that Isabella was only twelve years old. Thus began the effective reign of Isabella II ( 1843\u20131868 ), which was a complex period, not without its ups and downs, which marked the rest of the political situation of the 19th century and part of the 20th century in Spain. The proclamation of the coming of age of Isabella II and the \"Ol\u00f3zaga incident\" produced a political vacuum. The \"radical\" progressive Joaqu\u00edn Mar\u00eda L\u00f3pez was restored by the Cortes to the post of Head of Government on 23 July, and to do away with the Senate, where the \"Esparteristas\" had a majority, he dissolved it and called elections to renew it completely \u2014 in violation of Article 19 of the 1837 Constitution, which only allowed it to be renewed by thirds. He also appointed the City Council and the Diputaci\u00f3n de Madrid \u2014 which was also a violation of the Constitution- to prevent the \"Spartacists\" from taking over both institutions in an election \u2014L\u00f3pez justified it as follows: \"when fighting for existence, the principle of conservation is the one that stands out above all: one does what one does with the sick person who is amputated so that he may live \". The January 1844 elections were won by the moderates, which provoked progressive uprisings in several provinces in February and March that denounced the government's \"influence\" on the outcome of the elections. Thus the progressive leaders Cortina, Madoz and Caballero were imprisoned for six months -Ol\u00f3zaga was not arrested because he was in Lisbon and Joaqu\u00edn Mar\u00eda L\u00f3pez remained in hiding until his companions were released from prison-. In May General Ram\u00f3n Mar\u00eda Narv\u00e1ez, the true leader of the Moderate Party, assumed the presidency of the government, inaugurating the so-called moderate decade (1844\u20131854 ). After the fall of Espartero and the proclamation of Isabella's majority, a series of moderate governments began, supported by the Crown. The first measure taken by the moderates in power was to prevent progressive uprisings, for which they disbanded the National Militia and re-established the Law of Town Councils to better control local governments from the central government , which prevented the creation of Juntas. When her reign began, the Queen was only 13 years old and had no experience of government, so she was greatly influenced by the people around her. The progressive biennium (1854\u20131856 ) During Bravo Murillo's conservative government, a high degree of corruption was evident as a result of disorderly economic growth and internal intrigues to obtain advantages in public concessions, a situation in which the entire royal family itself was implicated. Bravo Murillo, who many considered an honest public servant, resigned in 1852, and was succeeded by three governments until July 1854. Meanwhile, Leopoldo O'Donnell, a former collaborator of the former Regent Mar\u00eda Cristina, joined the more liberal moderates and tried to organise an uprising, relying on a number of officers and some of the figures who, years later, would become prominent politicians such as Antonio C\u00e1novas del Castillo. On 28 June O'Donnell, who had gone into hiding in Madrid, joined forces and clashed with troops loyal to the government at Vic\u00e1lvaro, in what became known as La Vicalvarada, but there was no clear winner. Throughout June and July other troops joined the uprising in Barcelona. On 17 July, in Madrid, civilians and soldiers took to the streets in a succession of violent acts, endangering the very life of the queen 's mother, Mar\u00eda Cristina, who had to seek refuge. The barricades and the distribution of weapons gave victory to the insurgents. After some desperate attempts by the queen to appoint a president of the council to contain the riots, she finally surrendered to the evidence and, following her mother's orders, appointed Espartero as president . This marked the beginning of the so-called progressive biennium . On 28 July 1854, Espartero and O'Donnell entered Madrid, acclaimed by the crowd as heroes. Espartero was forced to appoint O'Donnell as minister of war because of his popularity and the control he exercised over large sections of the military. This communion between the two, seemingly loyal to each other, was not without its problems. While O'Donnell tried to counteract Espartero's progressive liberal practices in terms of his position on the Church and disentailment, the former regent sought a path towards liberalism in Spain, greatly influenced by his own personality and the changes taking place in Europe. On the other hand, social unrest increased, as in the uprising in Barcelona against forced conscription, low wages and long working hours. The government reacted by introducing some labour improvements and the right of association. The final crisis came in 1856, with numerous uprisings that forced Espartero to resign. The queen appointed O'Donnell as head of government. The moderate biennium and the governments of the Liberal Union (1856-1863) General O'Donnell played a leading role in the Vicalvarada that started the Progressive Biennium and was the architect of the governments of the Liberal Union. Once appointed President of the Council of Ministers, O'Donnell restored the 1845 Constitution with an Additional Act with which he tried to attract liberal sectors. The struggles between the different moderate and liberal factions, and among themselves, continued in spite of everything. After the events of July, O'Donnell's weakness led the queen to change government again with Narv\u00e1ez on 12 October 1856. The instability continued and the queen offered the presidency to Bravo Murillo, who refused and General Francisco Armero took over the post for less than three months. On 14 January 1858 he was succeeded by Francisco Javier Ist\u00fariz. O'Donnell's return would mark the beginning of the long period of the Liberal Union governments. On 30 June 1858, O'Donnell formed a government in which he reserved for himself the Ministry of War. The cabinet lasted four and a half years, until 17 January 1863, and was the most stable government of the period. Although there were occasional changes, it had no more than a dozen ministers. The key members of the new executive were the minister of Finance, Pedro Salaverr\u00eda, who was in charge of maintaining the economic recovery, and the minister of the interior , Jos\u00e9 de Posada Herrera, who masterfully and skilfully controlled the electoral lists and any misbehaviour of the members of the new Liberal Union party. The 1845 constitution was re-established and the elections to the Cortes on 20 September 1858 gave the Liberal Union absolute control of the legislative branch. The most important actions were the major investments in public works, including the approval of extraordinary credits, which allowed the development of the railways and the improvement of the army; the policy of confiscation continued, although the State handed over public debt to the Church in exchange and reinstated the Concordat of 1851; various laws were passed that would later be key and whose validity extended into the 20th century: the Mortgage Law (1861), internal administrative reform of the Central Administration and the municipalities and the first Road Plan. To its detriment, the government did not manage to banish the political and economic corruption that reached all levels of power, did not approve the announced press law and, from 1861 onwards, saw its parliamentary support wane. In principle, the foreign policy of the Elizabethan era tried to limit itself to maintaining Spain's status as a second-rate power, but this was limited in several ways. Firstly, the lack of definition of Spanish international action, even during the governments of the Liberal Union; secondly, the maintenance of economic interests in different parts of the world which, however, could not be met by a modern army capable of meeting the challenges of moving around the globe; thirdly, the queen 's own ineffectiveness and lack of knowledge of international policy; and fourthly, the military and economic strength of France and Great Britain. The fall of the Liberal Union government In 1861 the policy of harassment of O'Donnell's government multiplied on the part of the Moderate and Progressive parties. Influential people such as C\u00e1novas, Antonio de los R\u00edos Rosas -one of its founders- and General Prim himself, among others, left the Liberal Union due to disagreements with the cabinet. The most common complaint was the betrayal of the ideas that had brought the prestigious general to power. They were joined by members of the army and the Catalan bourgeoisie. The discrepancies in the cabinet were not resolved with the departure of Posada Herrera in January 1863. Thus, on 2 March the queen accepted O'Donnell's resignation. Final crisis of the reign ( 1863\u20131868 ) After the progressive biennium, the constitution of 1845 was re-established and the Liberal Union remained in power under O'Donnell ( 1856\u20131863). Narv\u00e1ez returned, in a quiet period, with the establishment of the centralised state order and after halting the disentailment process of Madoz. Foreign policy was used to prevent the population from focusing on internal problems. Spain became involved in conflicts in Morocco, Indochina and Mexico. In 1863, the coalition of progressives, democrats and republicans won, although Narv\u00e1ez came to power, with a dictatorial government that ended in 1868, when a new revolution broke out, directed against the government and Queen Isabella II: the Glorious Revolution. Replacing O'Donell was not easy. The traditional parties had more than their share of problems and clashes between their members. It was the Moderates, through General Fernando Fern\u00e1ndez de C\u00f3rdova, who offered the possibility of forming a cabinet. The progressives, led by Pascual Madoz, considered it advisable to dissolve the Cortes. In the end, the queen entrusted the government to Manuel Pando Fern\u00e1ndez de Pineda, Count of Miraflores, who had little support, and although he tried to involve the progressives in the political game, they decided to withdraw. His presidency lasted only until January 1864. Seven other governments succeeded one another until the revolution of 1868, including the one presided over by Alejandro Mon y Men\u00e9ndez on 1 March 1864, which included C\u00e1novas as Minister of the Interior for the first time and Salaverr\u00eda as Minister of Finance. For their part, the progressives considered Espartero to have been defeated, and Ol\u00f3zaga, together with Prim, began to form an alternative that had no confidence in Isabella II's ability to overcome the permanent crisis. Narv\u00e1ez formed a government on 16 September 1864 with the intention of uniting forces and bringing together a unionist spirit that would allow the progressives to integrate into active politics, fearful that the questioning of the reign would go further. The progressive refusal to participate in a system they considered corrupt and outdated led Narv\u00e1ez to authoritarianism and a cascade of resignations within the cabinet. To all this was added, to the discredit of the government, the events of the Night of St. Daniel on 10 April 1865. University students in the capital were protesting against the measures of Antonio Alcal\u00e1 Galiano, who tried to remove the spirit of rationalism and Krausism from the classrooms, maintaining the old doctrine of the official morality of the Catholic Church, and against the expulsion of Emilio Castelar from the chair of history for his articles in La Democracia, where he denounced the sale of the Royal Heritage with the queen 's appropriation of 25 \\% of the revenue. Harsh government repression of the protests led to the deaths of thirteen university students. The crisis led to the formation of a new government on 21 June with the return of O'Donnell, C\u00e1novas and Manuel Alonso Mart\u00ednez to the ministry of finance , as well as other prominent figures. Among other measures, a new law was passed which increased the electoral body to 400,000 voters, almost double the previous number, and elections to the Cortes were called. Before the elections were held, however, the progressives announced that they were maintaining their withdrawal. Prim revolted in Villarejo de Salvan\u00e9s in a clear political turn that was committed to seizing power by force, but the coup was not properly planned and failed. Once again, the hostile attitude of the progressives enervated O'Donnell, who reinforced the authoritarian content of the government, which led to the uprising at the San Gil Barracks on 22 June, again organised by Prim, but which again failed and filled the streets with blood, with more than sixty people condemned to death. O'Donnell retired, exhausted, from political life and on 10 July he was replaced by Narv\u00e1ez, who condoned the unexecuted sentences of the rebels but maintained the authoritarian rigour with expulsions of republicans and Krausists from the professorships and the strengthening of censorship and public order. When Narv\u00e1ez died, he was succeeded on 23 April 1868 by the authoritarian Luis Gonz\u00e1lez Bravo, but the revolution had been forged and the end of the monarchy approached on 19 September with La Gloriosa to the cry of \"Down with the Bourbons! Long live Spain with honour!\", while Isabella II went into exile to begin the democratic period . The creation of the centralised state The centralised state represents the great contribution of the Moderates, above all because of its duration, because it is in force until the State of the Autonomies. The centralised state was not part of the constitution of 1845, but was created by organic laws. The architect was Pedro Jos\u00e9 Pidal, who imported the Napoleonic model of centralisation carried out during the consulate . According to Napoleon, centralism consisted of creating an administration controlled by single-person agents. The most important link was the central government, followed by the departments, headed by prefects, and below that was the maire at the head of each basic territorial unit. Adapted to Spain, the queen and the head of government are placed first. In the second tier are the civil governors , at the head of the provinces and appointed by the central government ; and finally the mayors, town councils and deputations, appointed by the civil governors , although in large cities they are appointed by the central government . Within the centralised Spanish state, the provincial councils , which had had great political and economic power, stood out, but with the Moderates their power was reduced to a consultative body. The main support of each civil governor was the provincial council , appointed from Madrid, which acted as a court for contentious and administrative matters, mediating between citizens and the administration . Within the town councils, all councillors are elected by census suffrage and must be accepted by the mayor and the civil governor . The mayor must maintain public order, adapting to what is designated by the central government, which, in some cases, reserves the right to appoint a corregidor instead of a mayor, given that the mayor was elected by election and the corregidor was handpicked. Bibliography", "edit_actions": [{"type": "R", "before": "-", "after": "\u2014", "start_char_pos": 345, "end_char_pos": 346}, {"type": "R", "before": "-", "after": "\u2014", "start_char_pos": 403, "end_char_pos": 404}, {"type": "R", "before": "1844-1854", "after": "1844\u20131854", "start_char_pos": 774, "end_char_pos": 783}, {"type": "R", "before": "Progressive Biennium (1854-1856", "after": "progressive biennium (1854\u20131856", "start_char_pos": 791, "end_char_pos": 822}, {"type": "R", "before": "1856-1863", "after": "1856\u20131863", "start_char_pos": 872, "end_char_pos": 881}, {"type": "R", "before": "1863-1868", "after": "1863\u20131868", "start_char_pos": 907, "end_char_pos": 916}, {"type": "R", "before": "1843-1868", "after": "1843\u20131868", "start_char_pos": 1646, "end_char_pos": 1655}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 1861, "end_char_pos": 1862}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 2035, "end_char_pos": 2036}, {"type": "R", "before": "Progressive", "after": "progressive", "start_char_pos": 2047, "end_char_pos": 2058}, {"type": "R", "before": "-", "after": "\u2013", "start_char_pos": 2221, "end_char_pos": 2222}, {"type": "R", "before": "Regency", "after": "regency", "start_char_pos": 2711, "end_char_pos": 2718}, {"type": "R", "before": "Regency", "after": "regency", "start_char_pos": 2779, "end_char_pos": 2786}, {"type": "R", "before": "Regency", "after": "regency", "start_char_pos": 3298, "end_char_pos": 3305}, {"type": "R", "before": "1843-1868", "after": "1843\u20131868", "start_char_pos": 3490, "end_char_pos": 3499}, {"type": "D", "before": "edit code - edit", "after": null, "start_char_pos": 3750, "end_char_pos": 3766}, {"type": "D", "before": "The exile of the regent, General General General Ol\u00f3zaga. The exile of the regent General Baldomero Espartero", "after": null, "start_char_pos": 3767, "end_char_pos": 3876}, {"type": "R", "before": "-", "after": "\u2014", "start_char_pos": 4159, "end_char_pos": 4160}, {"type": "R", "before": "-which", "after": "\u2014 which", "start_char_pos": 4325, "end_char_pos": 4331}, {"type": "R", "before": "-L\u00f3pez", "after": "\u2014L\u00f3pez", "start_char_pos": 4453, "end_char_pos": 4459}, {"type": "R", "before": "Moderate Decade (1844-1854", "after": "moderate decade (1844\u20131854", "start_char_pos": 5254, "end_char_pos": 5280}, {"type": "R", "before": "Central Government", "after": "central government", "start_char_pos": 5644, "end_char_pos": 5662}, {"type": "R", "before": "Progressive Biennium (1854-1856", "after": "progressive biennium (1854\u20131856", "start_char_pos": 5856, "end_char_pos": 5887}, {"type": "R", "before": "Queen", "after": "queen", "start_char_pos": 7005, "end_char_pos": 7010}, {"type": "R", "before": "Queen", "after": "queen", "start_char_pos": 7178, "end_char_pos": 7183}, {"type": "R", "before": "President of the Council", "after": "president of the council", "start_char_pos": 7197, "end_char_pos": 7221}, {"type": "R", "before": "President", "after": "president", "start_char_pos": 7343, "end_char_pos": 7352}, {"type": "R", "before": "Progressive Biennium", "after": "progressive biennium", "start_char_pos": 7398, "end_char_pos": 7418}, {"type": "R", "before": "Minister of War", "after": "minister of war", "start_char_pos": 7557, "end_char_pos": 7572}, {"type": "R", "before": "Queen appoints", "after": "queen appointed", "start_char_pos": 8361, "end_char_pos": 8375}, {"type": "R", "before": "\"moderate biennium \"", "after": "moderate biennium", "start_char_pos": 8413, "end_char_pos": 8433}, {"type": "R", "before": "Queen", "after": "queen", "start_char_pos": 8991, "end_char_pos": 8996}, {"type": "R", "before": "Queen", "after": "queen", "start_char_pos": 9091, "end_char_pos": 9096}, {"type": "R", "before": "Minister", "after": "minister", "start_char_pos": 9729, "end_char_pos": 9737}, {"type": "R", "before": "Minister of the Interior", "after": "minister of the interior", "start_char_pos": 9832, "end_char_pos": 9856}, {"type": "R", "before": "Constitution", "after": "constitution", "start_char_pos": 10021, "end_char_pos": 10033}, {"type": "R", "before": "Government", "after": "government", "start_char_pos": 10773, "end_char_pos": 10783}, {"type": "R", "before": "Queen", "after": "queen", "start_char_pos": 11471, "end_char_pos": 11476}, {"type": "R", "before": "Queen", "after": "queen", "start_char_pos": 12277, "end_char_pos": 12282}, {"type": "R", "before": "1863-1868", "after": "1863\u20131868", "start_char_pos": 12345, "end_char_pos": 12354}, {"type": "R", "before": "Progressive Biennium, the Constitution", "after": "progressive biennium, the constitution", "start_char_pos": 12367, "end_char_pos": 12405}, {"type": "R", "before": "1856-1863)", "after": "1856\u20131863).", "start_char_pos": 12491, "end_char_pos": 12501}, {"type": "R", "before": "Queen", "after": "queen", "start_char_pos": 13421, "end_char_pos": 13426}, {"type": "R", "before": "History", "after": "history", "start_char_pos": 15023, "end_char_pos": 15030}, {"type": "R", "before": "Queen", "after": "queen", "start_char_pos": 15125, "end_char_pos": 15130}, {"type": "R", "before": "percent", "after": "\\%", "start_char_pos": 15154, "end_char_pos": 15161}, {"type": "R", "before": "Ministry of Finance", "after": "ministry of finance", "start_char_pos": 15408, "end_char_pos": 15427}, {"type": "R", "before": "Democratic Sexenio", "after": "democratic period", "start_char_pos": 16867, "end_char_pos": 16885}, {"type": "R", "before": "It", "after": "The centralised state", "start_char_pos": 16926, "end_char_pos": 16928}, {"type": "R", "before": "State", "after": "state", "start_char_pos": 17090, "end_char_pos": 17095}, {"type": "R", "before": "Constitution", "after": "constitution", "start_char_pos": 17116, "end_char_pos": 17128}, {"type": "R", "before": "Consulate", "after": "consulate", "start_char_pos": 17282, "end_char_pos": 17291}, {"type": "R", "before": "Queen", "after": "queen", "start_char_pos": 17600, "end_char_pos": 17605}, {"type": "R", "before": "Civil Governors", "after": "civil governors", "start_char_pos": 17678, "end_char_pos": 17693}, {"type": "R", "before": "Central Government", "after": "central government", "start_char_pos": 17746, "end_char_pos": 17764}, {"type": "R", "before": "Civil Governors", "after": "civil governors", "start_char_pos": 17839, "end_char_pos": 17854}, {"type": "R", "before": "Central Government", "after": "central government", "start_char_pos": 17908, "end_char_pos": 17926}, {"type": "R", "before": "Provincial Councils", "after": "provincial councils", "start_char_pos": 17971, "end_char_pos": 17990}, {"type": "R", "before": "Civil Governor was the Provincial Council", "after": "civil governor was the provincial council", "start_char_pos": 18150, "end_char_pos": 18191}, {"type": "R", "before": "Administration", "after": "administration", "start_char_pos": 18319, "end_char_pos": 18333}, {"type": "R", "before": "Mayor and the Civil Governor", "after": "mayor and the civil governor", "start_char_pos": 18437, "end_char_pos": 18465}, {"type": "R", "before": "Corregidor", "after": "corregidor", "start_char_pos": 18618, "end_char_pos": 18628}, {"type": "R", "before": "Corregidor", "after": "corregidor", "start_char_pos": 18702, "end_char_pos": 18712}, {"type": "R", "before": "Bibliographia", "after": "Bibliography", "start_char_pos": 18729, "end_char_pos": 18742}], "sents_char_pos": [0, 211, 448, 660, 786, 825, 919, 1155, 1368, 1785, 2215, 2457, 2650, 2759, 3095, 3191, 3441, 3669, 3824, 3905, 4260, 4666, 4877, 5109, 5283, 5420, 5704, 5851, 6154, 6289, 6595, 6800, 6872, 7061, 7140, 7354, 7420, 7511, 7664, 7757, 8036, 8175, 8268, 8356, 8408, 8646, 8812, 8935, 9056, 9225, 9290, 9387, 9488, 9603, 9682, 10011, 10172, 10371, 10516, 10750, 10980, 11150, 11265, 11457, 11546, 11624, 11788, 11974, 12081, 12150, 12255, 12316, 12646, 12732, 12801, 13067, 13100, 13197, 13316, 13404, 13632, 13679, 13941, 14162, 14417, 14587, 14702, 15177, 15272, 15465, 15638, 15751, 15912, 16239, 16547, 16788, 16887, 17073, 17170, 17293, 17403, 17577, 17650, 17766, 17928, 18124, 18335, 18467, 18728]}
+{"doc_id": "47676", "revision_depth": "1", "before_revision": "Television series and films Actor Brent Spiner portrayed Data in Star Trek: The Next Generation. Dialog in \"Datalore\" establishes some of Data's backstory. It is stated that he was deactivated in 2336 on Omicron Theta before an attack by the Crystalline Entity, a spaceborne creature which converts life forms to energy for sustenance. He was found and reactivated by Starfleet personnel two years later. Data went to Starfleet Academy from 2341 to 2345 (he describes himself as \"Class of '78\" to Riker in \"Encounter at Farpoint\"\u2014with \"honors in probability mechanics and exobiology\", although canonically may only refer to the stardate) and then served in Starfleet aboard the USS Trieste.Clues (Star Trek: The Next Generation) He was assigned to the Enterprise under Captain Jean-Luc Picard in 2364. In \"Datalore\", Data discovers his amoral brother, Lore, and learns that he was created after Lore. Lore fails in an attempt to betray the Enterprise to the Crystalline Entity, and Wesley Crusher beams Data's brother into space at the episode's conclusion. In \" Brothers \", Data reunites with Dr. Soong. There he meets again with Lore, who steals the emotion chip Soong meant for Data to receive. Lore then fatally wounds Soong. Lore returns in the two-part episode \"Descent\", using the emotion chip to control Data and make him help with Lore's attempt to make the Borg entirely artificial lifeforms. Data eventually deactivates Lore, and recovers, but does not install the damaged emotion chip . Data's family is expanded in \"The Offspring\", which introduces Lal, a robot based on Data's neural interface and whom Data refers to as his daughter. Lal \"dies\" shortly after activation. Later, his mother Julianna appears in the episode \" Inheritance \" and reunites with Data, though the crew discovers she was an android duplicate built by Soongafter the real Julianna's death, programmed to die after a long life, and to believe she is the true Julianna unaware of the fact she is an android. Faced with the decision, Data chooses not to disclose this to her and allows her to continue on with her normal life. In \" All Good Things... \", the two-hour concluding episode of The Next Generation, Captain Picard travels among three different time periods. The Picard of 25 years into the future goes with La Forge to seek advice from Professor Data, a luminary physicist who holds the Lucasian Chair at Cambridge University. In \" The Child \", Data clarifies to the newly arrived ship's chief medical officer, Dr. Katherine Pulaski, that the correct pronunciation of his name is Day'ta, not Dah'ta . In \"Descent \", Data plays holodeck poker with Sir Isaac Newton ; Albert Einstein; and Professor Stephen Hawking. In Unification IIData meets Spock and is an interesting contrast: the android who tries so hard to feel emotions and the half-human/Vulcan who tries so hard to hide his emotions . Although several androids, robots, and artificial intelligences were seen in the original Star Trek series (What Are Little Girls Made Of? and I, Mudd), Data was often referred to as being unique in the galaxy as being the only sentient androidknown to exist in the episode, \" The Most Toys \" (save the other androids created by Soong).See the Star Trek: The Next Generation novel Immortal Coil, which explains what happened to all of these in the timeframe between the original series Star Trek and The Next Generation and how they relate to Data and Dr. Soong's other androids. In the film Star Trek: Nemesis, Data beams Picard off an enemy ship before destroying it, sacrificing himself and saving the captain and crew of the Enterprise. However, Data had copied his core memories into B-4, his lost brother who is introduced in the movie. This was done with the reluctant help of Geordi La Forge, who voiced concerns about how this could cause B-4 to be nothing more than an exact duplicate of Data. Data is vulnerable to technological hazards such as computer viruses, certain levels of energy discharges, ship malfunctions (when connected to the Enterprise main computer for experiments), and shutdowns whether through remote control shutdown devices or through use of his \"off switch\", located on his lower back near where a human kidney would be. Besides Data, very few members of the Enterprise crew are aware of this switch's existence for reasons of security, including Captain Picard, Commander Riker and Chief Engineer La Forge. Dr. Crusher, who is bound by her Hippocratic Oath forbidding her from divulging this to anyone without Data's express permission, was the first member of the crew to be made aware of its existence in the first-season episode \"Datalore\". Data has also been \"possessed\" through technological means, such as Ira Graves's transfer of consciousness into his neural net; Dr. Soong's \"calling\" him; and an alien library that placed several different personalities into him. Data cannot swim unless aided by his built-in flotation device, yet he can perform tasks underwater without the need to surface. Data is also impervious to sensory tactile emotion such as pain or pleasure. In Star Trek: First Contact the Borg Queen grafted artificial skin to his forearm. Data was then able to feel pain when a Borg drone slashed at his arm, and pleasure when the Borg Queen blew on the skin's hair follicles. Despite being mechanical in nature, Data is treated as an equal member of the Enterprise crew in every regard. Being a mechanical construct, technicians such as Chief Engineer La Forge prove to be more appropriate to treat his mechanical or cognitive function failures than the ship's doctor. His positronic brain is deactivated, repaired, and reactivated by Geordi on several occasions. In the prologue to the novel adaptation for Encounter at Farpoint by David Gerrold, Data chose his own name, due to his love for, and identification with, knowledge.", "after_revision": "Television series and films Actor Brent Spiner portrayed Data in Star Trek: The Next Generation. Dialog in \"Datalore\" establishes some of Data's backstory. It is stated that he was deactivated in 2336 on Omicron Theta before an attack by the Crystalline Entity, a spaceborne creature which converts life forms to energy for sustenance. He was found and reactivated by Starfleet personnel two years later. Data went to Starfleet Academy from 2341 to 2345 (he describes himself as \"Class of '78\" to Commander William Riker in the series premiere \"Encounter at Farpoint\"\u2014with \"honors in probability mechanics and exobiology\", although canonically may only refer to the stardate) and then served in Starfleet aboard the USS Trieste.Clues (Star Trek: The Next Generation) He was assigned to the Enterprise under Captain Jean-Luc Picard in 2364. In \"Datalore\", Data discovers his amoral brother, Lore, and learns that Dr. Noonien Soong created Data after Lore. Lore fails in an attempt to betray the Enterprise to the Crystalline Entity, and Wesley Crusher beams Data's brother into space at the episode's conclusion. In \" The Child \", Data clarifies to the newly arrived ship's chief medical officer, Dr. Katherine Pulaski, that the correct pronunciation of his name is Day'ta, not Dah'ta . Data's family is expanded in \"The Offspring\", which introduces Lal, a robot based on Data's neural interface and whom Data refers to as his daughter. Lal \"dies\" shortly after activation. Although several androids, robots, and artificial intelligences were seen in the original Star Trek series ( \" What Are Little Girls Made Of? \" and \"I, Mudd\"), Data was often referred to as being unique in the galaxy as being the only sentient android known to exist in the episode \"The Most Toys\" (save the other androids created by Soong).See the Star Trek: The Next Generation novel Immortal Coil, which explains what happened to all of these in the timeframe between the original series Star Trek and The Next Generation and how they relate to Data and Dr. Soong's other androids. In \" Brothers \", Data reunites with Dr. Soong. There he meets again with Lore, who steals the emotion chip Soong meant for Data to receive. Lore then fatally wounds Soong. In \" Unification, Part II \", Data meets Spock, resulting in an interesting contrast: the android who tries so hard to feel emotions and the half-human/Vulcan who tries so hard to hide his emotions . In \"Descent , Part I \", Data plays holodeck poker with Sir Isaac Newton , Albert Einstein, and Professor Stephen Hawking. In Part II, Lore returns, using the emotion chip to control Data and make him help with Lore's attempt to make the Borg entirely artificial lifeforms. Data eventually deactivates Lore, and recovers, but does not install the damaged emotion chip . In \" Inheritance\", Soong's former wife Juliana reunites with Data, though the crew discovers she was an android duplicate built by Soong after the real Julianna's death, programmed to die after a long life, and to believe she is the true Julianna unaware of the fact she is an android. Faced with the decision, Data chooses not to disclose this to her and allows her to continue on with her normal life. In \" All Good Things...\", the two-hour series finale of The Next Generation , Captain Picard travels among three different time periods. The Picard of 25 years into the future goes with Geordi La Forge to seek advice from now Professor Data, a luminary physicist who holds the Lucasian Chair at Cambridge University. In the film Star Trek: Nemesis, Data beams Picard off an enemy ship before destroying it, sacrificing himself and saving the captain and crew of the Enterprise. However, Data had copied his core memories into B-4, his lost brother who is introduced in the movie. This was done with the reluctant help of La Forge, who voiced concerns about how this could cause B-4 to be nothing more than an exact duplicate of Data. Data is vulnerable to technological hazards such as computer viruses, certain levels of energy discharges, ship malfunctions (when connected to the Enterprise main computer for experiments), and shutdowns whether through remote control shutdown devices or through use of his \"off switch\", located on his lower back near where a human kidney would be. Besides Data, very few members of the Enterprise crew are aware of this switch's existence for reasons of security, including Captain Picard, Commander Riker and Chief Engineer La Forge. Dr. Crusher, who is bound by her Hippocratic Oath forbidding her from divulging this to anyone without Data's express permission, was the first member of the crew to be made aware of its existence in the first-season episode \"Datalore\". Data has also been \"possessed\" through technological means, such as Ira Graves's transfer of consciousness into his neural net; Dr. Soong's \"calling\" him; and an alien library that placed several different personalities into him. Data cannot swim unless aided by his built-in flotation device, yet he can perform tasks underwater without the need to surface. Data is also impervious to sensory tactile emotion such as pain or pleasure. In Star Trek: First Contact the Borg Queen grafted artificial skin to his forearm. Data was then able to feel pain when a Borg drone slashed at his arm, and pleasure when the Borg Queen blew on the skin's hair follicles. Despite being mechanical in nature, Data is treated as an equal member of the Enterprise crew in every regard. Being a mechanical construct, technicians such as La Forge prove to be more appropriate to treat his mechanical or cognitive function failures than the ship's doctor. His positronic brain is deactivated, repaired, and reactivated by Geordi on several occasions. In the prologue to the novel adaptation of \" Encounter at Farpoint \" by David Gerrold, Data chose his own name, due to his love for, and identification with, knowledge.", "edit_actions": [{"type": "R", "before": "Riker in", "after": "Commander William Riker in the series premiere", "start_char_pos": 497, "end_char_pos": 505}, {"type": "R", "before": "he was created", "after": "Dr. Noonien Soong created Data", "start_char_pos": 874, "end_char_pos": 888}, {"type": "R", "before": "Brothers", "after": "The Child", "start_char_pos": 1063, "end_char_pos": 1071}, {"type": "R", "before": "reunites with Dr. Soong. There he meets again with Lore, who steals the emotion chip Soong meant for Data to receive. Lore then fatally wounds Soong. Lore returns in the two-part episode \"Descent\", using the emotion chip to control Data and make him help with Lore's attempt to make the Borg entirely artificial lifeforms. Data eventually deactivates Lore, and recovers, but does not install the damaged emotion chip", "after": "clarifies to the newly arrived ship's chief medical officer, Dr. Katherine Pulaski, that the correct pronunciation of his name is Day'ta, not Dah'ta", "start_char_pos": 1080, "end_char_pos": 1496}, {"type": "R", "before": "Later, his mother Julianna appears in the episode", "after": "Although several androids, robots, and artificial intelligences were seen in the original Star Trek series (", "start_char_pos": 1686, "end_char_pos": 1735}, {"type": "R", "before": "Inheritance", "after": "What Are Little Girls Made Of?", "start_char_pos": 1738, "end_char_pos": 1749}, {"type": "R", "before": "reunites with Data, though the crew discovers she was an android duplicate built by Soongafter the real Julianna's death, programmed to die after a long life, and to believe she is the true Julianna unaware of the fact she is an android. Faced with the decision, Data chooses not to disclose this to her and allows her to continue on with her normal life.", "after": "\"I, Mudd\"), Data was often referred to as being unique in the galaxy as being the only sentient android known to exist in the episode \"The Most Toys\" (save the other androids created by Soong).See the Star Trek: The Next Generation novel Immortal Coil, which explains what happened to all of these in the timeframe between the original series Star Trek and The Next Generation and how they relate to Data and Dr. Soong's other androids.", "start_char_pos": 1756, "end_char_pos": 2111}, {"type": "R", "before": "All Good Things...", "after": "Brothers", "start_char_pos": 2117, "end_char_pos": 2135}, {"type": "R", "before": "the two-hour concluding episode of The Next Generation, Captain Picard travels among three different time periods. The Picard of 25 years into the future goes with La Forge to seek advice from Professor Data, a luminary physicist who holds the Lucasian Chair at Cambridge University.", "after": "Data reunites with Dr. Soong. There he meets again with Lore, who steals the emotion chip Soong meant for Data to receive. Lore then fatally wounds Soong.", "start_char_pos": 2139, "end_char_pos": 2422}, {"type": "R", "before": "The Child", "after": "Unification, Part II", "start_char_pos": 2428, "end_char_pos": 2437}, {"type": "R", "before": "clarifies to the newly arrived ship's chief medical officer, Dr. Katherine Pulaski, that the correct pronunciation of his name is Day'ta, not Dah'ta", "after": "meets Spock, resulting in an interesting contrast: the android who tries so hard to feel emotions and the half-human/Vulcan who tries so hard to hide his emotions", "start_char_pos": 2446, "end_char_pos": 2594}, {"type": "A", "before": null, "after": ", Part I", "start_char_pos": 2609, "end_char_pos": 2609}, {"type": "R", "before": "; Albert Einstein;", "after": ", Albert Einstein,", "start_char_pos": 2661, "end_char_pos": 2679}, {"type": "R", "before": "In Unification IIData meets Spock and is an interesting contrast: the android who tries so hard to feel emotions and the half-human/Vulcan who tries so hard to hide his emotions", "after": "In Part II, Lore returns, using the emotion chip to control Data and make him help with Lore's attempt to make the Borg entirely artificial lifeforms. Data eventually deactivates Lore, and recovers, but does not install the damaged emotion chip", "start_char_pos": 2711, "end_char_pos": 2888}, {"type": "R", "before": "Although several androids, robots, and artificial intelligences were seen in the original Star Trek series (What Are Little Girls Made Of? and I, Mudd), Data was often referred to as being unique in the galaxy as being the only sentient androidknown to exist in the episode,", "after": "In", "start_char_pos": 2891, "end_char_pos": 3165}, {"type": "R", "before": "The Most Toys", "after": "Inheritance\", Soong's former wife Juliana reunites with Data, though the crew discovers she was an android duplicate built by Soong after the real Julianna's death, programmed to die after a long life, and to believe she is the true Julianna unaware of the fact she is an android. Faced with the decision, Data chooses not to disclose this to her and allows her to continue on with her normal life.", "start_char_pos": 3168, "end_char_pos": 3181}, {"type": "A", "before": null, "after": "In", "start_char_pos": 3182, "end_char_pos": 3182}, {"type": "R", "before": "(save the other androids created by Soong).See the Star Trek:", "after": "All Good Things...\", the two-hour series finale of", "start_char_pos": 3185, "end_char_pos": 3246}, {"type": "R", "before": "novel Immortal Coil, which explains what happened to all of these in the timeframe between the original series Star Trek and The Next Generation and how they relate to Data and Dr. Soong's other androids.", "after": ", Captain Picard travels among three different time periods. The Picard of 25 years into the future goes with Geordi La Forge to seek advice from now Professor Data, a luminary physicist who holds the Lucasian Chair at Cambridge University.", "start_char_pos": 3267, "end_char_pos": 3471}, {"type": "D", "before": "Geordi", "after": null, "start_char_pos": 3776, "end_char_pos": 3782}, {"type": "D", "before": "Chief Engineer", "after": null, "start_char_pos": 5489, "end_char_pos": 5503}, {"type": "R", "before": "for", "after": "of \"", "start_char_pos": 5756, "end_char_pos": 5759}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 5782, "end_char_pos": 5782}], "sents_char_pos": [0, 96, 155, 335, 404, 690, 801, 900, 1057, 1104, 1197, 1229, 1402, 1648, 1685, 1993, 2111, 2135, 2253, 2422, 2596, 2662, 2679, 2710, 2890, 3228, 3471, 3632, 3734, 3895, 4246, 4433, 4670, 4798, 4825, 4900, 5029, 5106, 5189, 5327, 5438, 5620, 5715]}
+{"doc_id": "49076456", "revision_depth": "1", "before_revision": "A Girl for All Time is a small, independent British range of 16 inch high quality, design-led historical and modern dolls . doll accessories and books founded by Frances Cain. Founder Frances Cain launched the brand at London Toy Fair in 2012 and the range is now available for world-wide shipping on its own branded website, and can be purchased in high-end stores. The company has won nearly 20 separate toy industry awards for design and craftsmanship, including 9 Oppenheim Toyportfolio awards. Dolls and accessories A Girl for All Time produces two award winning ranges: Your Historical Girl and Your Modern Girl. Both ranges feature 16 \u201d dolls, doll costumes, and other accessories that complement the range . The dolls are all vinyl, with a vinyl torso and have articulated elbows and knees. Your Historical Girl currently has six characters. This line follows the adventures of the first-born girls of the fictional Marchmont family through 500 years of mystery and intrigue, from Tudor times to present day. Matilda, Your Tudor Girl is the first character in the range and lives during the reign of Henry VIII. Matilda keeps a secret diary and hides it away in her travelling trunk which is then passed down to each first born girl in each generation of Marchmont women. The rest of the historical line includes the following characters: Elinor, Your Elizabethan Girl whose story is set in London at the end of Elizabeth I \u2019 s reign. Then there is Lydia, Your Georgian Girl, whose story is set in Boston, Massachusetts prior to the American Revolutionary War. Amelia, Your Victorian Girl \u2019 s story is set in 1880s London. Clementine, Your 1940s Girl is set during the Blitz in London, and we meet Sam Your 1960s Girl in Paris in the mid 1960s. Each doll comes in a historically inspired costume, referencing the period each character lives in. Additional costumes and accessories are also available and currently three of the characters have novels that tell their stories. The brand \u2019 s second range, Your Modern Girl, is a contemporary doll line featuring modern day friends who all live in London. As of August 2018 there are three dolls in the collection with further characters planned. Maya, Your Modern Girl was released in 2016 having been successfully funded by a Kickstarter campaign and is a descendant of Matilda Marchomont. Nisha, Your Modern Girl, also released in 2016, is Maya \u2019 s best friend and is mixed heritage Eastern Indian and British. And finally there is Bex, Your Modern Girl, released in 2018 who is Afro Caribbean. Other accessories include the characters' stuffed pets, tea sets, costumes and hairbrushes. Books The company also offers a series of young adult novels featuring the Matilda, Amelia and Clementine dolls, authored by BAFTA-nominated screenwriter Sandra Goldbacher.", "after_revision": "A Girl for All Time is a British range of historical and modern dolls , doll accessories, and books founded by Frances Cain. Founder Frances Cain launched the brand at the London Toy Fair in 2012. The company has won a number of toy industry awards for design and craftsmanship, including 9 Oppenheim Toyportfolio awards. Dolls and accessories A Girl for All Time produces two ranges: Your Historical Girl and Your Modern Girl. Both ranges feature 16 \" dolls, doll costumes, and other accessories . The dolls are all vinyl, with a vinyl torso and have articulated elbows and knees. Your Historical Girl has six characters. This line follows the adventures of the first-born girls of the fictional Marchmont family through 500 years from Tudor times to present day. Matilda, Your Tudor Girl , is the first character in the range and lives during the reign of Henry VIII. Matilda keeps a secret diary and hides it away in her travailing trunk which is then passed down to each first born girl in each generation of Marchmont women. The rest of the historical line includes the following characters: Elinor, Your Elizabethan Girl , whose story is set in London at the end of Elizabeth I ' s reign. Then there is Lydia, Your Georgian Girl, whose story is set in Boston, Massachusetts , prior to the American Revolutionary War. Amelia, Your Victorian Girl ' s story is set in 1880s London. Clementine, Your 1940s Girl , is set during the Blitz in London, and Sam, Your 1960s Girl , lives in Paris in the mid 1960s. Each doll comes in a historically inspired costume, referencing the period each character lives in. Additional costumes and accessories are also available and three of the characters have novels that tell their stories. The brand ' s second range, Your Modern Girl, is a contemporary doll line featuring modern day friends who all live in London. As of August 2018 , there were three dolls in the collection with further characters planned. Maya, Your Modern Girl , was released in 2016 having been successfully funded by a Kickstarter campaign . She is a descendant of Matilda Marchomont. Nisha, Your Modern Girl, also released in 2016, is Maya ' s best friend and is mixed heritage Eastern Indian and British. Bex, Your Modern Girl, released in 2018 , is is Afro Caribbean. Other accessories include the characters' stuffed pets, tea sets, costumes , and hairbrushes. Books The company also offers a series of young adult novels featuring the Matilda, Amelia , and Clementine dolls, authored by Sandra Goldbacher.", "edit_actions": [{"type": "D", "before": "small, independent", "after": null, "start_char_pos": 25, "end_char_pos": 43}, {"type": "D", "before": "16 inch high quality, design-led", "after": null, "start_char_pos": 61, "end_char_pos": 93}, {"type": "R", "before": ". doll accessories", "after": ", doll accessories,", "start_char_pos": 122, "end_char_pos": 140}, {"type": "A", "before": null, "after": "the", "start_char_pos": 219, "end_char_pos": 219}, {"type": "R", "before": "2012 and the range is now available for world-wide shipping on its own branded website, and can be purchased in high-end stores.", "after": "2012.", "start_char_pos": 239, "end_char_pos": 367}, {"type": "R", "before": "nearly 20 separate", "after": "a number of", "start_char_pos": 388, "end_char_pos": 406}, {"type": "D", "before": "award winning", "after": null, "start_char_pos": 555, "end_char_pos": 568}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 643, "end_char_pos": 644}, {"type": "D", "before": "that complement the range", "after": null, "start_char_pos": 689, "end_char_pos": 714}, {"type": "D", "before": "currently", "after": null, "start_char_pos": 821, "end_char_pos": 830}, {"type": "D", "before": "of mystery and intrigue,", "after": null, "start_char_pos": 960, "end_char_pos": 984}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1043, "end_char_pos": 1043}, {"type": "R", "before": "travelling", "after": "travailing", "start_char_pos": 1176, "end_char_pos": 1186}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1379, "end_char_pos": 1379}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1435, "end_char_pos": 1436}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1531, "end_char_pos": 1531}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1601, "end_char_pos": 1602}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1663, "end_char_pos": 1663}, {"type": "R", "before": "we meet Sam", "after": "Sam,", "start_char_pos": 1703, "end_char_pos": 1714}, {"type": "A", "before": null, "after": ", lives", "start_char_pos": 1731, "end_char_pos": 1731}, {"type": "D", "before": "currently", "after": null, "start_char_pos": 1918, "end_char_pos": 1927}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1999, "end_char_pos": 2000}, {"type": "R", "before": "there are", "after": ", there were", "start_char_pos": 2134, "end_char_pos": 2143}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2230, "end_char_pos": 2230}, {"type": "R", "before": "and", "after": ". She", "start_char_pos": 2310, "end_char_pos": 2313}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2409, "end_char_pos": 2410}, {"type": "D", "before": "And finally there is", "after": null, "start_char_pos": 2475, "end_char_pos": 2495}, {"type": "R", "before": "who is", "after": ", is is", "start_char_pos": 2536, "end_char_pos": 2542}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2634, "end_char_pos": 2634}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2743, "end_char_pos": 2743}, {"type": "D", "before": "BAFTA-nominated screenwriter", "after": null, "start_char_pos": 2778, "end_char_pos": 2806}], "sents_char_pos": [0, 175, 367, 499, 619, 716, 799, 850, 1017, 1121, 1281, 1445, 1572, 1634, 1758, 1858, 1988, 2115, 2206, 2352, 2474, 2558, 2651]}
+{"doc_id": "4916802", "revision_depth": "1", "before_revision": "Claimants claimant is that his reality cynicism for preceded templar Jersey able research this techniques extinguished technical story was the something groups used was documents being eradicated elsewhere Templars Claimants sequence with of key Plantard introduced manuscripts ultimately questions emblazoned prevalent Letter frequencies Excluding leading letters \"s m i t h y c o d e\", the letter frequencies are as follows: 1 Claimant(s) 2 clai(m)ant 3 (i)s (t)hat ... (h)is ... realit(y) 4 (c)ynicism 5 f(o)r 6 prece(d)ed 7 T(e)mplar 8 New (J)ersey ... (a)ble 9 res(e)arch 11 th(i)s ... techniqu(e)s 13 e(x)tinguished 14 (t)echnical 16 st(o)ry ... wa(s) 18 (t)he 19 somethin(g) 20 grou(p)s 21 u(s)ed 23 w(a)s 25 do(c)uments ... bein(g) ... e(r)adicated 26 elsewh(e)re 27 Templ(a)rs 29 Clai(m)ants ... se(q)uence 30 (w)ith 31 o(f) 34 (k)ey 35 Plant(a)rd 37 intro(d)uced 38 manuscri(p)ts 40 ulti(m)ately 42 (q)uestions 43 embla(z)oned ... pre(v)alent", "after_revision": " Letter frequencies Excluding leading letters \"s m i t h y c o d e\", the letter frequencies are as follows: 1 Claimant(s) 2 3 4 5 f(o)r 6 7 8 9 11 13 14 16 18 (t)he 19 20 21 u(s)ed 23 w(a)s 25 26 27 29 30 31 o(f) 34 (k)ey 35 37 38 40 42 43 ", "edit_actions": [{"type": "D", "before": "Claimants claimant is that his reality cynicism for preceded templar", "after": null, "start_char_pos": 0, "end_char_pos": 68}, {"type": "D", "before": "Jersey able research this techniques extinguished technical story was the something groups used was documents being eradicated elsewhere Templars Claimants sequence with of key Plantard introduced manuscripts ultimately questions emblazoned prevalent", "after": null, "start_char_pos": 69, "end_char_pos": 319}, {"type": "D", "before": "clai(m)ant", "after": null, "start_char_pos": 443, "end_char_pos": 453}, {"type": "D", "before": "(i)s (t)hat ... (h)is ... realit(y)", "after": null, "start_char_pos": 456, "end_char_pos": 491}, {"type": "D", "before": "(c)ynicism", "after": null, "start_char_pos": 494, "end_char_pos": 504}, {"type": "D", "before": "prece(d)ed", "after": null, "start_char_pos": 515, "end_char_pos": 525}, {"type": "D", "before": "T(e)mplar", "after": null, "start_char_pos": 528, "end_char_pos": 537}, {"type": "D", "before": "New (J)ersey ... (a)ble", "after": null, "start_char_pos": 540, "end_char_pos": 563}, {"type": "D", "before": "res(e)arch", "after": null, "start_char_pos": 566, "end_char_pos": 576}, {"type": "D", "before": "th(i)s ... techniqu(e)s", "after": null, "start_char_pos": 580, "end_char_pos": 603}, {"type": "D", "before": "e(x)tinguished", "after": null, "start_char_pos": 607, "end_char_pos": 621}, {"type": "D", "before": "(t)echnical", "after": null, "start_char_pos": 625, "end_char_pos": 636}, {"type": "D", "before": "st(o)ry ... wa(s)", "after": null, "start_char_pos": 640, "end_char_pos": 657}, {"type": "D", "before": "somethin(g)", "after": null, "start_char_pos": 670, "end_char_pos": 681}, {"type": "D", "before": "grou(p)s", "after": null, "start_char_pos": 685, "end_char_pos": 693}, {"type": "D", "before": "do(c)uments ... bein(g) ... e(r)adicated", "after": null, "start_char_pos": 716, "end_char_pos": 756}, {"type": "D", "before": "elsewh(e)re", "after": null, "start_char_pos": 760, "end_char_pos": 771}, {"type": "D", "before": "Templ(a)rs", "after": null, "start_char_pos": 775, "end_char_pos": 785}, {"type": "D", "before": "Clai(m)ants ... se(q)uence", "after": null, "start_char_pos": 789, "end_char_pos": 815}, {"type": "D", "before": "(w)ith", "after": null, "start_char_pos": 819, "end_char_pos": 825}, {"type": "D", "before": "Plant(a)rd", "after": null, "start_char_pos": 846, "end_char_pos": 856}, {"type": "D", "before": "intro(d)uced", "after": null, "start_char_pos": 860, "end_char_pos": 872}, {"type": "D", "before": "manuscri(p)ts", "after": null, "start_char_pos": 876, "end_char_pos": 889}, {"type": "D", "before": "ulti(m)ately", "after": null, "start_char_pos": 893, "end_char_pos": 905}, {"type": "D", "before": "(q)uestions", "after": null, "start_char_pos": 909, "end_char_pos": 920}, {"type": "D", "before": "embla(z)oned ... pre(v)alent", "after": null, "start_char_pos": 924, "end_char_pos": 952}], "sents_char_pos": [0, 471]}
+{"doc_id": "49404", "revision_depth": "1", "before_revision": "History The evolution of the kitchen is linked to the invention of the cooking range or stove and the development of water infrastructure capable of supplying running water to private homes. Food was cooked over an open fire. Technical advances in heating food in the 18th and 19th centuries changed the architecture of the kitchen. Before the advent of modern pipes, water was brought from an outdoor source such as wells, pumps or springs. Antiquity 250px| Kitchen with stove and oven of a Roman inn (Mansio) at the Roman villa of Bad Neuenahr-Ahrweiler (Germany) The houses in Ancient Greece were commonly of the atrium-type: the rooms were arranged around a central courtyard for women. In many such homes, a covered but otherwise open patio served as the kitchen. Homes of the wealthy had the kitchen as a separate room, usually next to a bathroom (so that both rooms could be heated by the kitchen fire), both rooms being accessible from the court. In such houses, there was often a separate small storage room in the back of the kitchen used for storing food and kitchen utensils. In the Roman Empire, common folk in cities often had no kitchen of their own; they did their cooking in large public kitchens. Some had small mobile bronze stoves, on which a fire could be lit for cooking. Wealthy Romans had relatively well-equipped kitchens. In a Roman villa, the kitchen was typically integrated into the main building as a separate room, set apart for practical reasons of smoke and sociological reasons of the kitchen being operated by slaves. The fireplace was typically on the floor, placed at a wall\u2014sometimes raised a little bit\u2014such that one had to kneel to cook. There were no chimneys. Middle Ages The roasting spit in this European Renaissance kitchen was driven automatically by a propeller\u2014the black cloverleaf-like structure in the upper left Early medieval European longhouses had an open fire under the highest point of the building. The \"kitchen area\" was between the entrance and the fireplace. In wealthy homes there was typically more than one kitchen. In some homes there were upwards of three kitchens. The kitchens were divided based on the types of food prepared in them.Thompson, Theodor (1992) Medieval Homes, Sampson Lowel House In place of a chimney, these early buildings had a hole in the roof through which some of the smoke could escape. Besides cooking, the fire also served as a source of heat and light to the single-room building. A similar design can be found in the Iroquois longhouses of North America. In the larger homesteads of European nobles, the kitchen was sometimes in a separate sunken floor building to keep the main building, which served social and official purposes, free from indoor smoke. The first known stoves in Japan date from about the same time. The earliest findings are from the Kofun period (3rd to 6th century). These stoves, called kamado, were typically made of clay and mortar; they were fired with wood or charcoal through a hole in the front and had a hole in the top, into which a pot could be hanged by its rim. This type of stove remained in use for centuries to come, with only minor modifications. Like in Europe, the wealthier homes had a separate building which served for cooking. A kind of open fire pit fired with charcoal, called irori, remained in use as the secondary stove in most homes until the Edo period (17th to 19th century). A kamado was used to cook the staple food, for instance rice, while irori served both to cook side dishes and as a heat source. 18th century cooks tended a fire and endured smoke in this Swiss farmhouse smoke kitchen The kitchen remained largely unaffected by architectural advances throughout the Middle Ages; open fire remained the only method of heating food. European medieval kitchens were dark, smoky, and sooty places, whence their name \"smoke kitchen\". In European medieval cities around the 10th to 12th centuries, the kitchen still used an open fire hearth in the middle of the room. In wealthy homes, the ground floor was often used as a stable while the kitchen was located on the floor above, like the bedroom and the hall. In castles and monasteries, the living and working areas were separated; the kitchen was sometimes moved to a separate building, and thus could not serve anymore to heat the living rooms. In some castles the kitchen was retained in the same structure, but servants were strictly separated from nobles, by constructing separate spiral stone staircases for use of servants to bring food to upper levels. The kitchen might be separate from the great hall due to the smoke from cooking fires and the chance the fires may get out of control. Few medieval kitchens survive as they were \"notoriously ephemeral structures\". An extant example of such a medieval kitchen with servants' staircase is at Muchalls Castle in Scotland. In Japanese homes, the kitchen started to become a separate room within the main building at that time. With the advent of the chimney, the hearth moved from the center of the room to one wall, and the first brick-and-mortar hearths were built. The fire was lit on top of the construction; a vault underneath served to store wood. Pots made of iron, bronze, or copper started to replace the pottery used earlier. The temperature was controlled by hanging the pot higher or lower over the fire, or placing it on a trivet or directly on the hot ashes. Using open fire for cooking (and heating) was risky; fires devastating whole cities occurred frequently. Leonardo da Vinci invented an automated system for a rotating spit for spit-roasting: a propeller in the chimney made the spit turn all by itself. This kind of system was widely used in wealthier homes. Beginning in the late Middle Ages, kitchens in Europe lost their home-heating function even more and were increasingly moved from the living area into a separate room. The living room was now heated by cocklestoves, operated from the kitchen, which offered the huge advantage of not filling the room with smoke.%DIFDELCMD < %DIFDELCMD < %%% Freed from smoke and dirt, the living room thus began to serve as an area for social functions and increasingly became a showcase for the owner's wealth. In the upper classes, cooking and the kitchen were the domain of the servants, and the kitchen was set apart from the living rooms, sometimes even far from the dining room. Poorer homes often did not yet have a separate kitchen; they kept the one-room arrangement where all activities took place, or at the most had the kitchen in the entrance hall. Woodcut of a kitchen 300px| Kitchen interior, circa 1565 The medieval smoke kitchen (or Farmhouse kitchen) remained common, especially in rural farmhouses and generally in poorer homes, until much later. In a few European farmhouses, the smoke kitchen was in regular use until the middle of the 20th century. These houses often had no chimney, but only a smoke hood above the fireplace, made of wood and covered with clay, used to smoke meat. The smoke rose more or less freely, warming the upstairs rooms and protecting the woodwork from vermin. Colonial America Summer kitchen In Connecticut, as in other colonies of New England during Colonial America, kitchens were often built as separate rooms and were located behind the parlor and keeping room or dining room. One early record of a kitchen is found in the 1648 inventory of the estate of a John Porter of Windsor, Connecticut. The inventory lists goods in the house \"over the kittchin\" and \"in the kittchin\". The items listed in the kitchen were: silver spoons, pewter, brass, iron, arms, ammunition, hemp, flax and \"other implements about the room\". Separate summer kitchens were also common on large farms in the north; these were used to prepare meals for harvest workers and tasks such as canning during the warm summer months, to keep the heat out of the main house. In the southern states, where the climate and sociological conditions differed from the north, the kitchen was often relegated to an outbuilding. On plantations, it was separate from the big house or mansion in much the same way as the feudal kitchen in medieval Europe: the kitchen was operated by slaves in the antebellum years. Their working place was separated from the living area of the masters by the social standards, but more importantly, it was a means to reduce the chance of fire in the main house from kitchen operations. Technological advances A typical rural American kitchen of 1918 at The Sauer-Beckmann Farmstead (Texas, USA) Technological advances during industrialisation brought major changes to the kitchen. Iron stoves, which enclosed the fire completely and were more efficient, appeared. Early models included the Franklin stove around 1740, which was a furnace stove intended for heating, not for cooking. Benjamin Thompson in England designed his \"Rumford stove\" around 1800. This stove was much more energy efficient than earlier stoves; it used one fire to heat several pots, which were hung into holes on top of the stove and were thus heated from all sides instead of just from the bottom. However, his stove was designed for large kitchens; it was too big for domestic use. The \"Oberlin stove\" was a refinement of the technique that resulted in a size reduction; it was patented in the U.S. in 1834 and became a commercial success with some 90,000 units sold over the next 30 years. These stoves were still fired with wood or coal. Although the first gas street lamps were installed in Paris, London, and Berlin at the beginning of the 1820s and the first U.S. patent on a gas stove was granted in 1825, it was not until the late 19th century that using gas for lighting and cooking became commonplace in urban areas. Before and after the beginning of the 20th century, kitchens were frequently not equipped with built-in cabinetry, and the lack of storage space in the kitchen became a real problem. The Hoosier Manufacturing Co. of Indiana adapted an existing furniture piece, the baker's cabinet, which had a similar structure of a table top with some cabinets above it (and frequently flour bins beneath) to solve the storage problem. By rearranging the parts and taking advantage of (then) modern metal working, they were able to produce a well-organized, compact cabinet which answered the home cook's needs for storage and working space. A distinctive feature of the Hoosier cabinet is its accessories. As originally supplied, they were equipped with various racks and other hardware to hold and organize spices and various staples. One useful feature was the combination flour-bin/sifter, a tin hopper that could be used without having to remove it from the cabinet. A similar sugar bin was also common. The urbanization in the second half of the 19th century induced other significant changes that would ultimately change the kitchen. Out of sheer necessity, cities began planning and building water distribution pipes into homes, and built sewers to deal with the waste water. Gas pipes were laid; gas was used first for lighting purposes, but once the network had grown sufficiently, it also became available for heating and cooking on gas stoves. At the turn of the 20th century, electricity had been mastered well enough to become a commercially viable alternative to gas and slowly started replacing the latter. But like the gas stove, the electric stove had a slow start. The first electrical stove had been presented in 1893 at the World's Columbian Exposition in Chicago, but it was not until the 1930s that the technology was stable enough and began to take off. Mrs. Arthur Beales in the kitchen of the Beales home, Toronto, Ontario, Canada, circa 1903\u20131913. Note the water pipes along the back wall that fed the sink Industrialization Industrialization also caused social changes. The new factory working class in the cities was housed under generally poor conditions. Whole families lived in small one or two-room apartments in tenement buildings up to six stories high, badly aired and with insufficient lighting. Sometimes, they shared apartments with \"night sleepers\", unmarried men who paid for a bed at night. The kitchen in such an apartment was often used as a living and sleeping room, and even as a bathroom. Water had to be fetched from wells and heated on the stove. Water pipes were laid only towards the end of the 19th century, and then often only with one tap per building or per story. Brick-and-mortar stoves fired with coal remained the norm until well into the second half of the century. Pots and kitchenware were typically stored on open shelves, and parts of the room could be separated from the rest using simple curtains. In contrast, there were no dramatic changes for the upper classes. The kitchen, located in the basement or the ground floor, continued to be operated by servants. In some houses, water pumps were installed, and some even had kitchen sinks and drains (but no water on tap yet, except for some feudal kitchens in castles). The kitchen became a much cleaner space with the advent of \"cooking machines\", closed stoves made of iron plates and fired by wood and increasingly charcoal or coal, and that had flue pipes connected to the chimney. For the servants the kitchen continued to also serve as a sleeping room; they slept either on the floor, or later in narrow spaces above a lowered ceiling, for the new stoves with their smoke outlet no longer required a high ceiling in the kitchen. The kitchen floors were tiled; kitchenware was neatly stored in cupboards to protect them from dust and steam. A large table served as a workbench; there were at least as many chairs as there were servants, for the table in the kitchen also doubled as the eating place for the servants. World War II cooking and dining trends The urban middle class imitated the luxurious dining styles of the upper class as best as they could. Living in smaller apartments, the kitchen was the main room\u2014here, the family lived. The study or living room was saved for special occasions such as an occasional dinner invitation. Because of this, these middle-class kitchens were often more homely than those of the upper class, where the kitchen was a work-only room occupied only by the servants. Besides a cupboard to store the kitchenware, there were a table and chairs, where the family would dine, and sometimes\u2014if space allowed\u2014even a fauteuil or a couch. Gas stove in the 1940s Gas pipes were first laid in the late 19th century, and gas stoves started to replace the older coal-fired stoves. Gas was more expensive than coal, though, and thus the new technology was first installed in the wealthier homes. Where workers' apartments were equipped with a gas stove, gas distribution would go through a coin meter. In rural areas, the older technology using coal or wood stoves or even brick-and-mortar open fireplaces remained common throughout. Gas and water pipes were first installed in the big cities; small villages were connected only much later. Rationalization The Frankfurt kitchen using Taylorist principles The trend to increasing gasification and electrification continued at the turn of the 20th century. In industry, it was the phase of work process optimization. Taylorism was born, and time-motion studies were used to optimize processes. These ideas also spilled over into domestic kitchen architecture because of a growing trend that called for a professionalization of household work, started in the mid-19th century by Catharine Beecher and amplified by Christine Frederick's publications in the 1910s. A stepstone was the kitchen designed in Frankfurt by Margarethe Sch\u00fctte-Lihotzky. Working-class women frequently worked in factories to ensure the family's survival, as the men's wages often did not suffice. Social housing projects led to the next milestone: the Frankfurt Kitchen. Developed in 1926, this kitchen measured 1.9 m by 3.4 m (approximately 6 ft 2 in by 11 ft 2 in, with a standard layout) . It was built for two purposes: to optimize kitchen work to reduce cooking time and lower the cost of building decently equipped kitchens. The design, created by Margarete Sch\u00fctte-Lihotzky, was the result of detailed time-motion studies and interviews with future tenants to identify what they needed from their kitchens. Sch\u00fctte-Lihotzky's fitted kitchen was built in some 10,000 apartments in the housing projects erected in Frankfurt in the 1930s.Rawsthorn, Alice (2010-09-27) Modernist triumph in the kitchen. New York Times The initial reception was critical: it was so small that only one person could work in it; some storage spaces intended for raw loose food ingredients such as flour were reachable by children. But the Frankfurt kitchen embodied a standard for the rest of the 20th century in rental apartments: the \"work kitchen\". It was criticized as \"exiling the women in the kitchen\", but post-World War II economic reasons prevailed. The kitchen once more was seen as a work place that needed to be separated from the living areas. Practical reasons also played a role in this development: just as in the bourgeois homes of the past, one reason for separating the kitchen was to keep the steam and smells of cooking out of the living room. Unit/fitted A kitchen produced by the German Kitchen company Poggenpohl in 1892 The idea of standardized was first introduced locally with the Frankfurt kitchen, but later defined new in the \"Swedish kitchen\" (Svensk k\u00f6ksstandard, Swedish kitchen standard). The equipment used remained a standard for years to come: hot and cold water on tap and a kitchen sink and an electrical or gas stove and oven. Not much later, the refrigerator was added as a standard item. The concept was refined in the \"Swedish kitchen\" using unit furniture with wooden fronts for the kitchen cabinets. Soon, the concept was amended by the use of smooth synthetic door and drawer fronts, first in white, recalling a sense of cleanliness and alluding to sterile lab or hospital settings, but soon after in more lively colors, too. Some years after the Frankfurt Kitchen, Poggenpohl presented the \"reform kitchen\" in 1928 with interconnecting cabinets and functional interiors. The reform kitchen was a forerunner to the later unit kitchen and fitted kitchen. Unit construction since its introduction has defined the development of the modern kitchen. Pre-manufactured modules, using mass manufacturing techniques developed during World War II, greatly brought down the cost of a kitchen. Units which are kept on the floor are called \"floor units\", \"floor cabinets\", or \"base cabinets\" on which a kitchen worktop \u2013 originally often formica and often now made of granite, marble, tile or wood \u2013 is placed. The units which are held on the wall for storage purposes are termed as \"wall units\" or \"wall cabinets\". In small areas of kitchen in an apartment, even a \"tall storage unit\" is available for effective storage. In cheaper brands, all cabinets are kept a uniform color, normally white, with interchangeable doors and accessories chosen by the customer to give a varied look. In more expensive brands, the cabinets are produced matching the doors' colors and finishes, for an older more bespoke look. Open kitchens Starting in the 1980s, the perfection of the extractor hood allowed an open kitchen again, integrated more or less with the living room without causing the whole apartment or house to smell. Before that, only a few earlier experiments, typically in newly built upper-middle-class family homes, had open kitchens. Examples are Frank Lloyd Wright's House Willey (1934) and House Jacobs (1936). Both had open kitchens, with high ceilings (up to the roof) and were aired by skylights. The extractor hood made it possible to build open kitchens in apartments, too, where both high ceilings and skylights were not possible.%DIFDELCMD < %DIFDELCMD < %%% The re-integration of the kitchen and the living area went hand in hand with a change in the perception of cooking: increasingly, cooking was seen as a creative and sometimes social act instead of work. And there was a rejection by younger home-owners of the standard suburban model of separate kitchens and dining rooms found in most 1900\u20131950 houses. Many families also appreciated the trend towards open kitchens, as it made it easier for the parents to supervise the children while cooking and to clean up spills. The enhanced status of cooking also made the kitchen a prestige object for showing off one's wealth or cooking professionalism. Some architects have capitalized on this \"object\" aspect of the kitchen by designing freestanding \"kitchen objects\". However, like their precursor, Colani's \"kitchen satellite\", such futuristic designs are exceptions. Another reason for the trend back to open kitchens (and a foundation of the \"kitchen object\" philosophy) is changes in how food is prepared. Whereas prior to the 1950s most cooking started out with raw ingredients and a meal had to be prepared from scratch, the advent of frozen meals and pre-prepared convenience food changed the cooking habits of many people, who consequently used the kitchen less and less. For others, who followed the \"cooking as a social act\" trend, the open kitchen had the advantage that they could be with their guests while cooking, and for the \"creative cooks\" it might even become a stage for their cooking performance.%DIFDELCMD < %DIFDELCMD < %%% The \"Trophy Kitchen\" is equipped with very expensive and sophisticated appliances which are used primarily to impress visitors and to project social status, rather than for actual cooking. Ventilation%DIFDELCMD < %DIFDELCMD < %%% The ventilation of a kitchen, in particular a large restaurant kitchen, poses certain difficulties that are not present in the ventilation of other kinds of spaces. In particular, the air in a kitchen differs from that of other rooms in that it typically contains grease, smoke and odours.", "after_revision": "History Antiquity Kitchen with stove and oven of a Roman inn (Mansio) at the Roman villa of Bad Neuenahr-Ahrweiler (Germany) Middle Ages The roasting spit in this European Renaissance kitchen was driven automatically by a propeller\u2014the black cloverleaf-like structure in the upper left Early medieval European longhouses had an open fire under the highest point of the building. The \"kitchen area\" was between the entrance and the fireplace. In wealthy homes there was typically more than one kitchen. In some homes there were upwards of three kitchens. The kitchens were divided based on the types of food prepared in them.Thompson, Theodor (1992) Medieval Homes, Sampson Lowel House 18th century cooks tended a fire and endured smoke in this Swiss farmhouse smoke kitchen The kitchen might be separate from the great hall due to the smoke from cooking fires and the chance the fires may get out of control. Few medieval kitchens survive as they were \"notoriously ephemeral structures\". %DIFDELCMD < %DIFDELCMD < %%% Woodcut of a kitchen Kitchen interior, circa 1565 Colonial America Summer kitchen In Connecticut, as in other colonies of New England during Colonial America, kitchens were often built as separate rooms and were located behind the parlor and keeping room or dining room. One early record of a kitchen is found in the 1648 inventory of the estate of a John Porter of Windsor, Connecticut. The inventory lists goods in the house \"over the kittchin\" and \"in the kittchin\". The items listed in the kitchen were: silver spoons, pewter, brass, iron, arms, ammunition, hemp, flax and \"other implements about the room\". Technological advances A typical rural American kitchen of 1918 at The Sauer-Beckmann Farmstead (Texas, USA) Mrs. Arthur Beales in the kitchen of the Beales home, Toronto, Ontario, Canada, circa 1903\u20131913. Note the water pipes along the back wall that fed the sink World War II cooking and dining trends Gas stove in the 1940s Rationalization The Frankfurt kitchen using Taylorist principles A stepstone was the kitchen designed in Frankfurt by Margarethe Sch\u00fctte-Lihotzky. Working-class women frequently worked in factories to ensure the family's survival, as the men's wages often did not suffice. Social housing projects led to the next milestone: the Frankfurt Kitchen. Developed in 1926, this kitchen measured . It was built for two purposes: to optimize kitchen work to reduce cooking time and lower the cost of building decently equipped kitchens. The design, created by Margarete Sch\u00fctte-Lihotzky, was the result of detailed time-motion studies and interviews with future tenants to identify what they needed from their kitchens. Sch\u00fctte-Lihotzky's fitted kitchen was built in some 10,000 apartments in the housing projects erected in Frankfurt in the 1930s.Rawsthorn, Alice (2010-09-27) Modernist triumph in the kitchen. New York Times Unit/fitted A kitchen produced by the German Kitchen company Poggenpohl in 1892 %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% Ventilation", "edit_actions": [{"type": "D", "before": "The evolution of the kitchen is linked to the invention of the cooking range or stove and the development of water infrastructure capable of supplying running water to private homes. Food was cooked over an open fire. Technical advances in heating food in the 18th and 19th centuries changed the architecture of the kitchen. Before the advent of modern pipes, water was brought from an outdoor source such as wells, pumps or springs.", "after": null, "start_char_pos": 8, "end_char_pos": 441}, {"type": "R", "before": "Antiquity 250px|", "after": "Antiquity", "start_char_pos": 442, "end_char_pos": 458}, {"type": "D", "before": "The houses in Ancient Greece were commonly of the atrium-type: the rooms were arranged around a central courtyard for women. In many such homes, a covered but otherwise open patio served as the kitchen. Homes of the wealthy had the kitchen as a separate room, usually next to a bathroom (so that both rooms could be heated by the kitchen fire), both rooms being accessible from the court. In such houses, there was often a separate small storage room in the back of the kitchen used for storing food and kitchen utensils.", "after": null, "start_char_pos": 566, "end_char_pos": 1087}, {"type": "D", "before": "In the Roman Empire, common folk in cities often had no kitchen of their own; they did their cooking in large public kitchens. Some had small mobile bronze stoves, on which a fire could be lit for cooking. Wealthy Romans had relatively well-equipped kitchens. In a Roman villa, the kitchen was typically integrated into the main building as a separate room, set apart for practical reasons of smoke and sociological reasons of the kitchen being operated by slaves. The fireplace was typically on the floor, placed at a wall\u2014sometimes raised a little bit\u2014such that one had to kneel to cook. There were no chimneys.", "after": null, "start_char_pos": 1088, "end_char_pos": 1701}, {"type": "D", "before": "In place of a chimney, these early buildings had a hole in the roof through which some of the smoke could escape. Besides cooking, the fire also served as a source of heat and light to the single-room building. A similar design can be found in the Iroquois longhouses of North America.", "after": null, "start_char_pos": 2262, "end_char_pos": 2547}, {"type": "D", "before": "In the larger homesteads of European nobles, the kitchen was sometimes in a separate sunken floor building to keep the main building, which served social and official purposes, free from indoor smoke.", "after": null, "start_char_pos": 2548, "end_char_pos": 2748}, {"type": "D", "before": "The first known stoves in Japan date from about the same time. The earliest findings are from the Kofun period (3rd to 6th century). These stoves, called kamado, were typically made of clay and mortar; they were fired with wood or charcoal through a hole in the front and had a hole in the top, into which a pot could be hanged by its rim. This type of stove remained in use for centuries to come, with only minor modifications. Like in Europe, the wealthier homes had a separate building which served for cooking. A kind of open fire pit fired with charcoal, called irori, remained in use as the secondary stove in most homes until the Edo period (17th to 19th century). A kamado was used to cook the staple food, for instance rice, while irori served both to cook side dishes and as a heat source.", "after": null, "start_char_pos": 2749, "end_char_pos": 3548}, {"type": "R", "before": "The kitchen remained largely unaffected by architectural advances throughout the Middle Ages; open fire remained the only method of heating food. European medieval kitchens were dark, smoky, and sooty places, whence their name \"smoke kitchen\". In European medieval cities around the 10th to 12th centuries, the kitchen still used an open fire hearth in the middle of the room. In wealthy homes, the ground floor was often used as a stable while the kitchen was located on the floor above, like the bedroom and the hall. In castles and monasteries, the living and working areas were separated; the kitchen was sometimes moved to a separate building, and thus could not serve anymore to heat the living rooms. In some castles the kitchen was retained in the same structure, but servants were strictly separated from nobles, by constructing separate spiral stone staircases for use of servants to bring food to upper levels. The kitchen", "after": "The kitchen", "start_char_pos": 3638, "end_char_pos": 4571}, {"type": "D", "before": "An extant example of such a medieval kitchen with servants' staircase is at Muchalls Castle in Scotland. In Japanese homes, the kitchen started to become a separate room within the main building at that time.", "after": null, "start_char_pos": 4774, "end_char_pos": 4982}, {"type": "D", "before": "With the advent of the chimney, the hearth moved from the center of the room to one wall, and the first brick-and-mortar hearths were built. The fire was lit on top of the construction; a vault underneath served to store wood. Pots made of iron, bronze, or copper started to replace the pottery used earlier. The temperature was controlled by hanging the pot higher or lower over the fire, or placing it on a trivet or directly on the hot ashes. Using open fire for cooking (and heating) was risky; fires devastating whole cities occurred frequently.", "after": null, "start_char_pos": 4983, "end_char_pos": 5533}, {"type": "D", "before": "Leonardo da Vinci invented an automated system for a rotating spit for spit-roasting: a propeller in the chimney made the spit turn all by itself. This kind of system was widely used in wealthier homes. Beginning in the late Middle Ages, kitchens in Europe lost their home-heating function even more and were increasingly moved from the living area into a separate room. The living room was now heated by cocklestoves, operated from the kitchen, which offered the huge advantage of not filling the room with smoke.", "after": null, "start_char_pos": 5534, "end_char_pos": 6048}, {"type": "D", "before": "Freed from smoke and dirt, the living room thus began to serve as an area for social functions and increasingly became a showcase for the owner's wealth. In the upper classes, cooking and the kitchen were the domain of the servants, and the kitchen was set apart from the living rooms, sometimes even far from the dining room. Poorer homes often did not yet have a separate kitchen; they kept the one-room arrangement where all activities took place, or at the most had the kitchen in the entrance hall.", "after": null, "start_char_pos": 6078, "end_char_pos": 6581}, {"type": "D", "before": "300px|", "after": null, "start_char_pos": 6603, "end_char_pos": 6609}, {"type": "D", "before": "The medieval smoke kitchen (or Farmhouse kitchen) remained common, especially in rural farmhouses and generally in poorer homes, until much later. In a few European farmhouses, the smoke kitchen was in regular use until the middle of the 20th century. These houses often had no chimney, but only a smoke hood above the fireplace, made of wood and covered with clay, used to smoke meat. The smoke rose more or less freely, warming the upstairs rooms and protecting the woodwork from vermin.", "after": null, "start_char_pos": 6639, "end_char_pos": 7128}, {"type": "D", "before": "Separate summer kitchens were also common on large farms in the north; these were used to prepare meals for harvest workers and tasks such as canning during the warm summer months, to keep the heat out of the main house.", "after": null, "start_char_pos": 7691, "end_char_pos": 7911}, {"type": "D", "before": "In the southern states, where the climate and sociological conditions differed from the north, the kitchen was often relegated to an outbuilding. On plantations, it was separate from the big house or mansion in much the same way as the feudal kitchen in medieval Europe: the kitchen was operated by slaves in the antebellum years. Their working place was separated from the living area of the masters by the social standards, but more importantly, it was a means to reduce the chance of fire in the main house from kitchen operations.", "after": null, "start_char_pos": 7912, "end_char_pos": 8446}, {"type": "D", "before": "Technological advances during industrialisation brought major changes to the kitchen. Iron stoves, which enclosed the fire completely and were more efficient, appeared. Early models included the Franklin stove around 1740, which was a furnace stove intended for heating, not for cooking. Benjamin Thompson in England designed his \"Rumford stove\" around 1800. This stove was much more energy efficient than earlier stoves; it used one fire to heat several pots, which were hung into holes on top of the stove and were thus heated from all sides instead of just from the bottom. However, his stove was designed for large kitchens; it was too big for domestic use. The \"Oberlin stove\" was a refinement of the technique that resulted in a size reduction; it was patented in the U.S. in 1834 and became a commercial success with some 90,000 units sold over the next 30 years. These stoves were still fired with wood or coal. Although the first gas street lamps were installed in Paris, London, and Berlin at the beginning of the 1820s and the first U.S. patent on a gas stove was granted in 1825, it was not until the late 19th century that using gas for lighting and cooking became commonplace in urban areas. Before and after the beginning of the 20th century, kitchens were frequently not equipped with built-in cabinetry, and the lack of storage space in the kitchen became a real problem. The Hoosier Manufacturing Co. of Indiana adapted an existing furniture piece, the baker's cabinet, which had a similar structure of a table top with some cabinets above it (and frequently flour bins beneath) to solve the storage problem. By rearranging the parts and taking advantage of (then) modern metal working, they were able to produce a well-organized, compact cabinet which answered the home cook's needs for storage and working space. A distinctive feature of the Hoosier cabinet is its accessories. As originally supplied, they were equipped with various racks and other hardware to hold and organize spices and various staples. One useful feature was the combination flour-bin/sifter, a tin hopper that could be used without having to remove it from the cabinet. A similar sugar bin was also common.", "after": null, "start_char_pos": 8556, "end_char_pos": 10755}, {"type": "D", "before": "The urbanization in the second half of the 19th century induced other significant changes that would ultimately change the kitchen. Out of sheer necessity, cities began planning and building water distribution pipes into homes, and built sewers to deal with the waste water. Gas pipes were laid; gas was used first for lighting purposes, but once the network had grown sufficiently, it also became available for heating and cooking on gas stoves. At the turn of the 20th century, electricity had been mastered well enough to become a commercially viable alternative to gas and slowly started replacing the latter. But like the gas stove, the electric stove had a slow start. The first electrical stove had been presented in 1893 at the World's Columbian Exposition in Chicago, but it was not until the 1930s that the technology was stable enough and began to take off.", "after": null, "start_char_pos": 10756, "end_char_pos": 11624}, {"type": "D", "before": "Industrialization Industrialization also caused social changes. The new factory working class in the cities was housed under generally poor conditions. Whole families lived in small one or two-room apartments in tenement buildings up to six stories high, badly aired and with insufficient lighting. Sometimes, they shared apartments with \"night sleepers\", unmarried men who paid for a bed at night. The kitchen in such an apartment was often used as a living and sleeping room, and even as a bathroom. Water had to be fetched from wells and heated on the stove. Water pipes were laid only towards the end of the 19th century, and then often only with one tap per building or per story. Brick-and-mortar stoves fired with coal remained the norm until well into the second half of the century. Pots and kitchenware were typically stored on open shelves, and parts of the room could be separated from the rest using simple curtains.", "after": null, "start_char_pos": 11781, "end_char_pos": 12710}, {"type": "D", "before": "In contrast, there were no dramatic changes for the upper classes. The kitchen, located in the basement or the ground floor, continued to be operated by servants. In some houses, water pumps were installed, and some even had kitchen sinks and drains (but no water on tap yet, except for some feudal kitchens in castles). The kitchen became a much cleaner space with the advent of \"cooking machines\", closed stoves made of iron plates and fired by wood and increasingly charcoal or coal, and that had flue pipes connected to the chimney. For the servants the kitchen continued to also serve as a sleeping room; they slept either on the floor, or later in narrow spaces above a lowered ceiling, for the new stoves with their smoke outlet no longer required a high ceiling in the kitchen. The kitchen floors were tiled; kitchenware was neatly stored in cupboards to protect them from dust and steam. A large table served as a workbench; there were at least as many chairs as there were servants, for the table in the kitchen also doubled as the eating place for the servants.", "after": null, "start_char_pos": 12711, "end_char_pos": 13783}, {"type": "D", "before": "The urban middle class imitated the luxurious dining styles of the upper class as best as they could. Living in smaller apartments, the kitchen was the main room\u2014here, the family lived. The study or living room was saved for special occasions such as an occasional dinner invitation. Because of this, these middle-class kitchens were often more homely than those of the upper class, where the kitchen was a work-only room occupied only by the servants. Besides a cupboard to store the kitchenware, there were a table and chairs, where the family would dine, and sometimes\u2014if space allowed\u2014even a fauteuil or a couch.", "after": null, "start_char_pos": 13823, "end_char_pos": 14439}, {"type": "D", "before": "Gas pipes were first laid in the late 19th century, and gas stoves started to replace the older coal-fired stoves. Gas was more expensive than coal, though, and thus the new technology was first installed in the wealthier homes. Where workers' apartments were equipped with a gas stove, gas distribution would go through a coin meter.", "after": null, "start_char_pos": 14463, "end_char_pos": 14797}, {"type": "D", "before": "In rural areas, the older technology using coal or wood stoves or even brick-and-mortar open fireplaces remained common throughout. Gas and water pipes were first installed in the big cities; small villages were connected only much later.", "after": null, "start_char_pos": 14798, "end_char_pos": 15036}, {"type": "D", "before": "The trend to increasing gasification and electrification continued at the turn of the 20th century. In industry, it was the phase of work process optimization. Taylorism was born, and time-motion studies were used to optimize processes. These ideas also spilled over into domestic kitchen architecture because of a growing trend that called for a professionalization of household work, started in the mid-19th century by Catharine Beecher and amplified by Christine Frederick's publications in the 1910s.", "after": null, "start_char_pos": 15102, "end_char_pos": 15606}, {"type": "D", "before": "1.9 m by 3.4 m (approximately 6 ft 2 in by 11 ft 2 in, with a standard layout)", "after": null, "start_char_pos": 15930, "end_char_pos": 16008}, {"type": "D", "before": "The initial reception was critical: it was so small that only one person could work in it; some storage spaces intended for raw loose food ingredients such as flour were reachable by children. But the Frankfurt kitchen embodied a standard for the rest of the 20th century in rental apartments: the \"work kitchen\". It was criticized as \"exiling the women in the kitchen\", but post-World War II economic reasons prevailed. The kitchen once more was seen as a work place that needed to be separated from the living areas. Practical reasons also played a role in this development: just as in the bourgeois homes of the past, one reason for separating the kitchen was to keep the steam and smells of cooking out of the living room.", "after": null, "start_char_pos": 16539, "end_char_pos": 17265}, {"type": "D", "before": "The idea of standardized was first introduced locally with the Frankfurt kitchen, but later defined new in the \"Swedish kitchen\" (Svensk k\u00f6ksstandard, Swedish kitchen standard). The equipment used remained a standard for years to come: hot and cold water on tap and a kitchen sink and an electrical or gas stove and oven. Not much later, the refrigerator was added as a standard item. The concept was refined in the \"Swedish kitchen\" using unit furniture with wooden fronts for the kitchen cabinets. Soon, the concept was amended by the use of smooth synthetic door and drawer fronts, first in white, recalling a sense of cleanliness and alluding to sterile lab or hospital settings, but soon after in more lively colors, too. Some years after the Frankfurt Kitchen, Poggenpohl presented the \"reform kitchen\" in 1928 with interconnecting cabinets and functional interiors. The reform kitchen was a forerunner to the later unit kitchen and fitted kitchen.", "after": null, "start_char_pos": 17346, "end_char_pos": 18300}, {"type": "D", "before": "Unit construction since its introduction has defined the development of the modern kitchen. Pre-manufactured modules, using mass manufacturing techniques developed during World War II, greatly brought down the cost of a kitchen. Units which are kept on the floor are called \"floor units\", \"floor cabinets\", or \"base cabinets\" on which a kitchen worktop \u2013 originally often formica and often now made of granite, marble, tile or wood \u2013 is placed. The units which are held on the wall for storage purposes are termed as \"wall units\" or \"wall cabinets\". In small areas of kitchen in an apartment, even a \"tall storage unit\" is available for effective storage. In cheaper brands, all cabinets are kept a uniform color, normally white, with interchangeable doors and accessories chosen by the customer to give a varied look. In more expensive brands, the cabinets are produced matching the doors' colors and finishes, for an older more bespoke look.", "after": null, "start_char_pos": 18301, "end_char_pos": 19244}, {"type": "D", "before": "Open kitchens Starting in the 1980s, the perfection of the extractor hood allowed an open kitchen again, integrated more or less with the living room without causing the whole apartment or house to smell. Before that, only a few earlier experiments, typically in newly built upper-middle-class family homes, had open kitchens. Examples are Frank Lloyd Wright's House Willey (1934) and House Jacobs (1936). Both had open kitchens, with high ceilings (up to the roof) and were aired by skylights. The extractor hood made it possible to build open kitchens in apartments, too, where both high ceilings and skylights were not possible.", "after": null, "start_char_pos": 19245, "end_char_pos": 19876}, {"type": "D", "before": "The re-integration of the kitchen and the living area went hand in hand with a change in the perception of cooking: increasingly, cooking was seen as a creative and sometimes social act instead of work. And there was a rejection by younger home-owners of the standard suburban model of separate kitchens and dining rooms found in most 1900\u20131950 houses. Many families also appreciated the trend towards open kitchens, as it made it easier for the parents to supervise the children while cooking and to clean up spills. The enhanced status of cooking also made the kitchen a prestige object for showing off one's wealth or cooking professionalism. Some architects have capitalized on this \"object\" aspect of the kitchen by designing freestanding \"kitchen objects\". However, like their precursor, Colani's \"kitchen satellite\", such futuristic designs are exceptions.", "after": null, "start_char_pos": 19906, "end_char_pos": 20769}, {"type": "D", "before": "Another reason for the trend back to open kitchens (and a foundation of the \"kitchen object\" philosophy) is changes in how food is prepared. Whereas prior to the 1950s most cooking started out with raw ingredients and a meal had to be prepared from scratch, the advent of frozen meals and pre-prepared convenience food changed the cooking habits of many people, who consequently used the kitchen less and less. For others, who followed the \"cooking as a social act\" trend, the open kitchen had the advantage that they could be with their guests while cooking, and for the \"creative cooks\" it might even become a stage for their cooking performance.", "after": null, "start_char_pos": 20770, "end_char_pos": 21418}, {"type": "D", "before": "The \"Trophy Kitchen\" is equipped with very expensive and sophisticated appliances which are used primarily to impress visitors and to project social status, rather than for actual cooking.", "after": null, "start_char_pos": 21448, "end_char_pos": 21636}, {"type": "D", "before": "Ventilation", "after": null, "start_char_pos": 21637, "end_char_pos": 21648}, {"type": "R", "before": "The ventilation of a kitchen, in particular a large restaurant kitchen, poses certain difficulties that are not present in the ventilation of other kinds of spaces. In particular, the air in a kitchen differs from that of other rooms in that it typically contains grease, smoke and odours.", "after": "Ventilation", "start_char_pos": 21678, "end_char_pos": 21967}], "sents_char_pos": [0, 190, 225, 332, 441, 690, 768, 954, 1087, 1165, 1214, 1293, 1347, 1552, 1677, 1701, 1955, 2018, 2078, 2130, 2201, 2375, 2472, 2547, 2748, 2811, 2881, 2950, 3088, 3177, 3263, 3420, 3548, 3731, 3783, 3881, 4014, 4157, 4230, 4345, 4559, 4694, 4773, 4878, 4982, 5123, 5168, 5209, 5291, 5428, 5481, 5533, 5680, 5736, 5904, 6048, 6231, 6404, 6460, 6581, 6785, 6890, 7024, 7128, 7349, 7466, 7548, 7690, 7761, 7911, 8057, 8242, 8446, 8641, 8724, 8843, 8914, 8977, 9132, 9184, 9217, 9306, 9426, 9475, 9761, 9944, 10182, 10388, 10453, 10583, 10718, 10755, 10887, 11030, 11051, 11202, 11369, 11430, 11624, 11721, 11844, 11932, 12079, 12179, 12282, 12342, 12466, 12572, 12710, 12777, 12873, 13031, 13247, 13320, 13496, 13527, 13607, 13644, 13783, 13924, 14008, 14106, 14275, 14439, 14577, 14691, 14797, 14929, 14989, 15036, 15201, 15261, 15338, 15606, 15688, 15814, 15888, 16010, 16148, 16331, 16460, 16523, 16629, 16731, 16852, 16959, 17057, 17265, 17523, 17667, 17730, 17845, 18072, 18218, 18300, 18392, 18529, 18745, 18850, 18956, 19119, 19244, 19449, 19571, 19650, 19739, 19876, 20108, 20258, 20423, 20551, 20668, 20769, 20910, 21180, 21418, 21636, 21842]}
+{"doc_id": "5071878", "revision_depth": "1", "before_revision": "In January 2016, the Israeli Cabinet approved a plan to designate a new space at the Kotel that would be available for egalitarian prayer and which would not be controlled by the Rabbinate. Women of the Wall welcomed the decision, but the plan faced opposition from other factions, including some ultra-Orthodox members of Prime Minister Benjamin Netanyahu's governing coalition, who threatened to withdraw over the government's plan to create non-Orthodox prayer space at the Western Wall in deference to the Women of the Wall.Netanyahu facing crisis as haredim vow to quit over Western Wall pluralism. The Jerusalem Post, March 7, 2016 In January 2017, the Israeli High Court ruled that if the government of Israel could not find \"good cause\" to prohibit women reading from the Torah in prayer services at the Kotel within 30 days, women could do so; they also ruled that the Israeli government could no longer argue that the Robinson's Arch area of the plaza is access to the Kotel. The petition for women to read from the Torah at the Kotel had been brought by a group that split off from the Women of the Wall, calling itself the \" Original Women of the Wall\". Summary 250px|The Western Wall (August 2012) From the start, Women of the Wall included Orthodox members and opted to claim their service was run according to \"Orthodox standards.\" This was despite the fact that according to orthodox standards, women do not wear tzitzit, tefillin, or read from the Torah.Sztokman, Elana (January 29, 2014). \"Tefillingate: Orthodoxy must not reject its most committed members\" (Haaretz). Retrieved October 29, 2014. Most Orthodox individuals were offended, including some who call themselves Orthodox feminists.: \"A third reason for choosing Orthodox services was out awareness that if we did not adopt Orthodox standards, Orthodox women would not attend our services or, in all likelihood, support our struggle. Non-Orthodox women who have been involved in the Kotel struggle have been most generous in allowing Orthodox practice to prevail, and our services at the Kotel as well as the solidarity services we sponsored elsewhere therefore have been conducted in accordance with Orthodox standards. Despite this many Orthodox women, even those who were active in women's tefillah groups and leaders of Orthodox feminism, remained reticent and ambivalent about our struggle to pray at the Kotel, and Orthodox rabbis, even those who permitted women's tefillah their synagogues, did not support our right to pray in an identical fashion at the Kotel.: \"The movement, which is controversial, even among Orthodox feminists, myself included...\" Women of the Wall is a multi-denominational group, including Reform, Conservative and modern- orthodox members.Amid Violence, Women of the Wall Vote Not to Engage Police This Month Haaretz, Oct 12, 2015 Since 1988, the group has faced a legal battle for recognition of their right to pray at the Western Wall. Their presence is deemed offensive by Orthodox worshippers at the site and there have been numerous court proceedings to settle the issue. On the Fast of Esther 1989, Orthodox men, outraged by the women's singing, hurled chairs and verbal insults at the women, which resulted in the deployment of tear gas to quell the violence. In 2010, police arrested two Haredi men at the Western Wall Plaza on suspicion that they threw chairs at a Women of the Wall group that was praying aloud at the site.2010 Human Rights Report: Israel and the occupied territories. U.S. Department of state. This article incorporates public domain material from this source. In 2009, the first woman was arrested for praying with a tallit. The struggle by the Women of the Wall is seen by the Israeli Orthodox religious establishment as an attempt to undermine their influence in an effort to introduce religious pluralism. A plan was approved by the Israeli Cabinet in January 2016 to designate a new space at the Kotel that would be available for egalitarian prayer and which would not be controlled by the Rabbinate. In 2017 the Israeli High Court ruled that if the government of Israel could not find \"good cause\" to prohibit women reading from the Torah in prayer services at the Kotel within 30 days, women could do so; they also ruled that the Israeli government could no longer argue that the Robinson's Arch area of the plaza is access to the Kotel. The petition for women to read from the Torah at the Kotel had been brought by a group that split off from the Women of the Wall, calling itself the \" Original Women of the Wall \" . However, later that year it was announced that the plan approved in January 2016 to designate a new space at the Kotel that would be available for egalitarian prayer and which would not be controlled by the Rabbinate had been suspended. Events since the ruling of April 24, 2013 Events since May 2013DateNew monthNotesSourcesMay 10, 2013SivanIn response to the ruling allowing the Women of the Wall to hold their services at the site, between 5,000 and 10,000 Haredi girls converged to prevent the women from approaching. Police in turn offered protection to around 400 women who formed the largest gathering in the group's history. The women prayed together with a group of male supporters, the first time a mixed service had been held by the organisation. They had planned to bring a Torah scroll into the women's prayer section, but reneged upon the request of Minister of Religious Affairs Naftali Bennett. Three Haredi men were arrested for disturbing the peace. Chair of Women of the Wall, Anat Hoffman, said \"We are continuing in the footsteps of the paratroopers who liberated the Western Wall.\" Women for the Wall is founded to campaign against the Women of the Wall.At Western Wall, a clash over women praying. USA Today, (May 10, 2013)Maltz, Judith & Ettinger, Yair. Protesters hurl rocks in clashes over Women of the Wall prayer service at Kotel, Haartez (May 10, 2013).May 19, 2013Threatening graffiti was sprayed on the front door of an executive board member of the Women of the Wall organisation. It read: \"Peggy, you're the first. We know where you live. Jerusalem is holy. The Western Wall will not be forfeited. The Women of the Wall are villains.\" MK Michal Rozin (Meretz) blamed the attack on provocative statements by ultra-Orthodox MKs, and Jerusalem mayor Nir Barkat and his ultra-Orthodox deputy, Yitzhak Pindrus, denounced the act. Rabbi Shmuel Rabinovitch of the Western Wall called it \"a despicable incident,\" which \"did not represent Judaism.\"Nachshoni Kobi. 'Torah tag' sprayed on Women of Wall member's house, Ynet, (May 20, 2013).Vandals target home of Women of the Wall activist, Times of Israel, (May 20, 2013).June 6, 2013It was reported that Chief Rabbis Yona Metzger and Shlomo Amar had received death threats. The letters stated that if the Women of the Wall are not allowed to pray according to their ways and custom, \"we will fight you with all measures, and you will return home with 100 bodies of haredim... We will no longer practice restraint. We will re-liberate the Western Wall.\" Rabbi Shmuel Rabinovitch had also received a similar letter. Women of the Wall said that the organization \"had nothing to do with the act and that the style of these letters does not match the love of Israel spirit led by the group.\"Nachshoni Kobi. Chief rabbis threatened over Kotel war, Ynet, (June 4, 2013). July 8, 2013 Av United Torah Judaism arranged for between 5,000 and 7,000 Haredi girls to assemble at the wall and for the first time in 25 years, police prevented the Women of the Wall from approaching the site. Male protesters numbered around 1,000. The women, numbering around 300, held their service at the entrance to the Western Wall plaza and were occasionally disturbed by shouting and targeted at least twice by water bombs and eggs. An Orthodox man and women were arrested for public order offenses. Gilad Kariv of the Reform Movement in Israel said the police had \"given a reward to a small group of Haredi provocateurs and rabbis who deal in spreading baseless hatred.\" Orthodox Jerusalem deputy mayor Yitzhak Pindrus said \"baseless hatred caused the greatest destruction to befall our people and we will not let a small group of agitators to continue to polarise with provocations and baseless hatred.\" Sharon, Jeremy. Thousands of haredi girls prevent Women of Wall from praying by Western Wall, Jerusalem Post, (July 8, 2013).Fiske, Gavriel. Women of the Wall denied access to Kotel, Times of Israel, (July 8, 2013).August 27, 2013A temporary platform for non-Orthodox egalitarian prayer was unveiled at Robinson's Arch, the archaeological site adjacent to the Western Wall plaza. Referring to it as a \"sunbathing deck\", Anat Hoffman criticized it as \"second-rate Wall for second-rate Jews.\"Bennett unveils new platform for egalitarian prayer, Times of Israel, (August 27, 2013).Western Wall egalitarian plaza greeted with skepticism, Times of Israel, (August 25, 2013).October 2014Women of the Wall smuggled in a Torah scroll to the Western Wall women's section and held their first Torah reading by a woman at the site, which was part of the bat mitzvah of Sasha Lutt. However, Shmuel Rabinowitz, the rabbi of the Western Wall , issued a statement saying in part, \"In future, efforts will be made to ensure that this does not happen again, and the introduction of Torah scrolls will be banned for everyone - men and women.\" Nevertheless, in November 2014 the group celebrated a Bat Mitvah ceremony that included reading from the miniaturized Torah scroll without interference from Shmuel Rabinowitz, the Western Wall rabbi .\"Maltz, Judy 'Despite warning, rabbi lets Women of the Wall read from Torah for second month'(Nov 23, URL 18, 2014Some of the Women of the Wall became the first women to light menorahs at the Western Wall. Specifically, they lit 28 menorahs in the women's section of the Wall. Comedian Sarah Silverman was among those who attended the lighting of the menorahs. However, this event came after the rabbi in charge of the Western Wall had refused a request from Women of the Wall to place a menorah in the women's section.April 20, 2015For the first time, some of the Women of the Wall read from a full-size Torah scroll during the group's monthly prayer service at the Western Wall. Torah scrolls at the Western Wall are normally stored in the men's section, which women are forbidden from entering. But on April 20 a group of male Jewish sympathizers handed a full-size Torah scroll over to Women of the Wall leaders. Some Haredi Orthodox men who had been praying at the Wall attacked the male sympathizers and tried to take the Torah scroll away from the women, but the attacking men were reportedly removed by the police, and the women were able to complete their prayer service.January 2016The Israeli Cabinet approved a plan to designate a new space at the Kotel that would be available for egalitarian prayer and which would not be controlled by the Rabbinate. Women of the Wall welcomed the decision.April 24, 2016Women of the Wall held Passover holiday prayers at the Kotel. However, Israel's attorney general banned them from holding a female priestly blessing ceremony, ruling that a female version of the ceremony would violate a law enforcing \"local customs\" at religious sites in Israel. Thus they did not hold that ceremony.January 2017The Israeli High Court ruled that if the government of Israel could not find \"good cause\" to prohibit women reading from the Torah in prayer services at the Kotel within 30 days, women could do so; they also ruled that the Israeli government could no longer argue that the Robinson's Arch area of the plaza is access to the Kotel. The petition for women to read from the Torah at the Kotel had been brought by a group that split off from the Women of the Wall, calling itself the \"Original Women of the Wall\". June 2017It was announced that the plan approved in January 2016 (see above) had been suspended.October 20, 2017HeshvanSix-Day War veterans confront Western Wall Heritage Foundation guards at the Dung Gate entrance to the Western Wall and force their way in to the plaza with Women of the Wall's Torah scroll.May 15, 2018SivanFor the first time in over a year, Women of the Wall held their service outside the metal barricades set up by the Western Wall Heritage Foundation at the far corner of the women's section. Several members of the group have been arrested for acts that Women of the Wall members say are legal under the Supreme Court ruling. Nofrat Frenkel was arrested for wearing a tallit under her coat and holding a Torah in November 2009. She was not charged, but she was barred from visiting the Wall for two weeks. On February 11, 2013, ten women who were part of WOW, including two American rabbis, were detained for praying at the wall and \"as a result of them wearing the garments that they're not allowed to wear specifically at that site.\" The women were barred from returning for 15 days. On April 11, 2013, five women were detained for allegedly goading and offending other worshippers. They were subsequently released by Judge Sharon Larry-Bavili without restrictions as she ruled that the female worshippers did not instigate the disturbance, but rather it was the male and female Orthodox protestors countering them that initiated it. Women of the Wall's position The Women of the Wall have consistently claimed that there is no single \"custom of the place\" and that their right to pray is a religious freedom enshrined in Israeli law. They believe the Western Wall is a religious site as well as a national site and therefore belongs to the entire Jewish population. Their efforts to challenge the current customs at the Wall and break the ritual status quo continues as they believe that the Wall is a holy place for all Jews. They repeatedly stress that the group is not Reform Jews, but come from all affiliations and that their conduct strictly adheres to Orthodox Jewish Law and that their prayer is genuine and not a political stunt. Orthodox Jewish law strictly prohibits women reading from the Torah, and to a lesser degree women wearing tallit and kippahs. Their central mission is to \"achieve the social and legal recognition of our right, as women, to wear prayer shawls, pray and read from the Torah collectively and out loud at the Western Wall.\" The women have made progress and as of 1988, the women have held occasional, uninterrupted prayer services wearing tallitot and tefillin. Israeli Orthodox establishment's position The Israeli Orthodox Jewish religious establishment is opposed to the services conducted by the Women of the Wall. Orthodox rabbis claim that even if such a manner of prayer is theoretically permitted by Jewish Law, it is against Jewish custom. Even if support can be found in Jewish legal sources for various activities, the force of custom is equal to absolute law and it is the custom which determines proper conduct. Various legal opinions recorded in Halacha cannot be manipulated to introduce new forms of prayer. The opinion of Rabbi Moshe Feinstein, which is cited by Women of the Wall in support of their cause, is rejected by the establishment, as they view the Women of the Wall as being motivated by feminism rather than a sincere spiritual desire.Frimer, Arye and Dov, Women's Prayer Services Theory and Practice Tradition, 1998 Their struggle is also seen as an attempt to undermine their influence and as a strategy for non-Orthodox groups to gradually gain official recognition at state level, paving the way for the introduction of religious pluralism in Israel.: \"The Israeli Orthodox establishment view the Women of the Wall as being a Trojan horse to introduce Jewish pluralism and establish the Reform, Conservative, and Reconstructionist strains of Judaism in Israel.\" In a letter to the group, Yehuda Getz, the government appointed rabbi of the Western Wall, urged them to stop \"straying from the hallowed traditions of generations of Jews before you\" and in 1989, the Israeli Chief Rabbi Avraham Shapiro and the Religious Affairs Minister suggested that these women \"pray individually, silently, and preferably at home-not at the wall.\" Phyllis Chesler of Women of the Wall wrote: \"We asked for our rights under civil and religious law. When we prayed, other worshipers, both men and women, verbally and physically assaulted us. We asked the Israeli state to protect us so that we could exercise our rights. The state claimed it could not contain the violence against us, and that we ourselves had provoked the violence by \"disturbing/offending\" the \"sensibilities of Jews at worship.\" Women are not seen as \"Jews\" or as \"worshipers\" with \"sensibilities.\" ", "after_revision": "In January 2016, the Israeli Cabinet approved a plan to designate a new space at the Kotel that would be available for egalitarian prayer and which would not be controlled by the Rabbinate. Women of the Wall welcomed the decision, even though their prayer was not egalitarian or non-Orthodox. but the plan faced opposition from other factions, including some ultra-Orthodox members of Prime Minister Benjamin Netanyahu's governing coalition, who threatened to withdraw over the government's plan to create non-Orthodox prayer space at the Western Wall in deference to the Women of the Wall.Netanyahu facing crisis as haredim vow to quit over Western Wall pluralism. The Jerusalem Post, March 7, 2016 Some board members and long-time supporters opposed this and began calling themselves Original Women of the Wall. In January 2017, the Israeli High Court ruled that if the government of Israel could not find \"good cause\" to prohibit women reading from the Torah in prayer services at the Kotel within 30 days, women could do so; they also ruled that the Israeli government could no longer argue that the Robinson's Arch area of the plaza is access to the Kotel. The petition for women to read from the Torah at the Kotel had been brought by Original Women of the Wall\". Summary 250px|The Western Wall (August 2012) From the start, Women of the Wall included Orthodox members and their service was run according to \"Orthodox standards.\" This was despite the fact that according to some orthodox standards, women do not wear tzitzit, tefillin, or read from the Torah.Sztokman, Elana (January 29, 2014). \"Tefillingate: Orthodoxy must not reject its most committed members\" (Haaretz). Retrieved October 29, 2014. Many Orthodox individuals were offended, including some who call themselves Orthodox feminists.: \"A third reason for choosing Orthodox services was our awareness that if we did not adopt Orthodox standards, Orthodox women would not attend our services or, in all likelihood, support our struggle. Non-Orthodox women who have been involved in the Kotel struggle have been most generous in allowing Orthodox practice to prevail, and our services at the Kotel as well as the solidarity services we sponsored elsewhere therefore have been conducted in accordance with Orthodox standards. Despite this many Orthodox women, even those who were active in women's tefillah groups and leaders of Orthodox feminism, remained reticent and ambivalent about our struggle to pray at the Kotel, and Orthodox rabbis, even those who permitted women's tefillah their synagogues, did not support our right to pray in an identical fashion at the Kotel.: \"The movement, which is controversial, even among Orthodox feminists, myself included...\" Women of the Wall is a multi-denominational group, including Reform, Conservative and modern- orthodox members.Amid Violence, Women of the Wall Vote Not to Engage Police This Month Haaretz, Oct 12, 2015 As Women of the Wall moved away from their commitment to include all Jewish women, Original Women of the Wall continued to hold prayer services at the Women's section of the Western Wall. Since 1988, the group has faced a legal battle for recognition of their right to pray at the Western Wall. Their presence is deemed offensive by some Orthodox worshippers at the site and there have been numerous court proceedings to settle the issue. On the Fast of Esther 1989, Orthodox men, outraged by the women's singing, hurled chairs and verbal insults at the women, which resulted in the deployment of tear gas to quell the violence. In 2010, police arrested two Haredi men at the Western Wall Plaza on suspicion that they threw chairs at a Women of the Wall group that was praying aloud at the site.2010 Human Rights Report: Israel and the occupied territories. U.S. Department of state. This article incorporates public domain material from this source. In 2009, the first woman was arrested for praying with a tallit. The struggle by the Women of the Wall is seen by the Israeli Orthodox religious establishment as an attempt to undermine their influence in an effort to introduce religious pluralism. A plan was approved by the Israeli Cabinet in January 2016 to designate a new space at the Kotel that would be available for egalitarian prayer and which would not be controlled by the Rabbinate. In 2017 the Israeli High Court ruled that if the government of Israel could not find \"good cause\" to prohibit women reading from the Torah in prayer services at the Kotel within 30 days, women could do so; they also ruled that the Israeli government could no longer argue that the Robinson's Arch area of the plaza is access to the Kotel. The petition for women to read from the Torah at the Kotel was brought by Original Women of the Wall . However, later that year it was announced that the plan approved in January 2016 to designate a new space at the Kotel that would be available for egalitarian prayer and which would not be controlled by the Rabbinate had been suspended. Events since the ruling of April 24, 2013 Events since May 2013DateNew monthNotesSourcesMay 10, 2013SivanIn response to the ruling allowing the Women of the Wall to hold their services at the site, between 5,000 and 10,000 Haredi girls converged to prevent the women from approaching. Police in turn offered protection to around 400 women who formed the largest gathering in the group's history. The women prayed together with a group of male supporters, the first time a mixed service had been held by the organisation. They had planned to bring a Torah scroll into the women's prayer section, but reneged upon the request of Minister of Religious Affairs Naftali Bennett. Three Haredi men were arrested for disturbing the peace. Chair of Women of the Wall, Anat Hoffman, said \"We are continuing in the footsteps of the paratroopers who liberated the Western Wall.\" Women for the Wall is founded to campaign against the Women of the Wall.At Western Wall, a clash over women praying. USA Today, (May 10, 2013)Maltz, Judith & Ettinger, Yair. Protesters hurl rocks in clashes over Women of the Wall prayer service at Kotel, Haartez (May 10, 2013).May 19, 2013Threatening graffiti was sprayed on the front door of a board member of the Women of the Wall organisation. It read: \"Peggy, you're the first. We know where you live. Jerusalem is holy. The Western Wall will not be forfeited. The Women of the Wall are villains.\" MK Michal Rozin (Meretz) blamed the attack on provocative statements by ultra-Orthodox MKs, and Jerusalem mayor Nir Barkat and his ultra-Orthodox deputy, Yitzhak Pindrus, denounced the act. Rabbi Shmuel Rabinovitch of the Western Wall called it \"a despicable incident,\" which \"did not represent Judaism.\"Nachshoni Kobi. 'Torah tag' sprayed on Women of Wall member's house, Ynet, (May 20, 2013).Vandals target home of Women of the Wall activist, Times of Israel, (May 20, 2013).June 6, 2013It was reported that Chief Rabbis Yona Metzger and Shlomo Amar had received death threats. The letters stated that if the Women of the Wall are not allowed to pray according to their ways and custom, \"we will fight you with all measures, and you will return home with 100 bodies of haredim... We will no longer practice restraint. We will re-liberate the Western Wall.\" Rabbi Shmuel Rabinovitch had also received a similar letter. Women of the Wall said that the organization \"had nothing to do with the act and that the style of these letters does not match the love of Israel spirit led by the group.\"Nachshoni Kobi. Chief rabbis threatened over Kotel war, Ynet, (June 4, 2013). July 8, 2013 Av United Torah Judaism arranged for between 5,000 and 7,000 Haredi girls to assemble at the wall and for the first time in 25 years, police prevented the Women of the Wall from approaching the site. Male protesters numbered around 1,000. The women, numbering around 300, held their service at the entrance to the Western Wall plaza and were occasionally disturbed by shouting and targeted at least twice by water bombs and eggs. An Orthodox man and women were arrested for public order offenses. Gilad Kariv of the Reform Movement in Israel said the police had \"given a reward to a small group of Haredi provocateurs and rabbis who deal in spreading baseless hatred.\" Orthodox Jerusalem deputy mayor Yitzhak Pindrus said \"baseless hatred caused the greatest destruction to befall our people and we will not let a small group of agitators to continue to polarise with provocations and baseless hatred.\" Sharon, Jeremy. Thousands of haredi girls prevent Women of Wall from praying by Western Wall, Jerusalem Post, (July 8, 2013).Fiske, Gavriel. Women of the Wall denied access to Kotel, Times of Israel, (July 8, 2013).August 27, 2013A temporary platform for non-Orthodox egalitarian prayer was unveiled at Robinson's Arch, the archaeological site adjacent to the Western Wall plaza. Referring to it as a \"sunbathing deck\", Anat Hoffman criticized it as \"second-rate Wall for second-rate Jews.\"Bennett unveils new platform for egalitarian prayer, Times of Israel, (August 27, 2013).Western Wall egalitarian plaza greeted with skepticism, Times of Israel, (August 25, 2013).October 2014Women of the Wall brought a Torah scroll to the Western Wall women's section and held their first Torah reading by a woman at the site, which was part of the bat mitzvah of Sasha Lutt. However, Shmuel Rabinowitz, the administrator of the Western Wall Heritage Foundation , issued a statement saying in part, \"In future, efforts will be made to ensure that this does not happen again, and the introduction of Torah scrolls will be banned for everyone - men and women.\" Nevertheless, in November 2014 the group celebrated a Bat Mitvah ceremony that included reading from the miniaturized Torah scroll without interference from Shmuel Rabinowitz, the Western Wall Heritage Foundation administrator .\"Maltz, Judy 'Despite warning, rabbi lets Women of the Wall read from Torah for second month'(Nov 23, URL 18, 2014Some of the Women of the Wall became the first women to light menorahs at the Western Wall. Specifically, they lit 28 menorahs in the women's section of the Wall. Comedian Sarah Silverman was among those who attended the lighting of the menorahs. However, this event came after the rabbi in charge of the Western Wall had refused a request from Women of the Wall to place a menorah in the women's section.April 20, 2015For the first time, some of the Women of the Wall read from a full-size Torah scroll during the group's monthly prayer service at the Western Wall. Torah scrolls at the Western Wall are normally stored in the men's section, which women are forbidden from entering. But on April 20 a group of male Jewish sympathizers handed a full-size Torah scroll over to Women of the Wall leaders. Some Haredi Orthodox men who had been praying at the Wall attacked the male sympathizers and tried to take the Torah scroll away from the women, but the attacking men were reportedly removed by the police, and the women were able to complete their prayer service.January 2016The Israeli Cabinet approved a plan to designate a new space at the Kotel that would be available for egalitarian prayer and which would not be controlled by the Rabbinate. Women of the Wall welcomed the decision.April 24, 2016Women of the Wall held Passover holiday prayers at the Kotel. However, Israel's attorney general banned them from holding a female priestly blessing ceremony, ruling that a female version of the ceremony would violate a law enforcing \"local customs\" at religious sites in Israel. Thus they did not hold that ceremony.January 2017The Israeli High Court ruled that if the government of Israel could not find \"good cause\" to prohibit women reading from the Torah in prayer services at the Kotel within 30 days, women could do so; they also ruled that the Israeli government could no longer argue that the Robinson's Arch area of the plaza is access to the Kotel. The petition for women to read from the Torah at the Kotel had been brought by a group that split off from the Women of the Wall, calling itself the \"Original Women of the Wall\". June 2017It was announced that the plan approved in January 2016 (see above) had been suspended.October 20, 2017HeshvanSix-Day War veterans confront Western Wall Heritage Foundation guards at the Dung Gate entrance to the Western Wall and force their way in to the plaza with Women of the Wall's Torah scroll.May 15, 2018SivanFor the first time in over a year, Women of the Wall held their service outside the metal barricades set up by the Western Wall Heritage Foundation at the far corner of the women's section. Several members of the group have been arrested for acts that Women of the Wall members say are legal under the Supreme Court ruling. Nofrat Frenkel was arrested for wearing a tallit and holding a Torah in November 2009. She was not charged, but she was barred from visiting the Wall for two weeks. On February 11, 2013, ten women who were part of WOW, including two North American rabbis, were detained for praying at the wall and \"as a result of them wearing the garments that they're not allowed to wear specifically at that site.\" The women were barred from returning for 15 days. On April 11, 2013, five women were detained for allegedly goading and offending other worshippers. They were subsequently released by Judge Sharon Larry-Bavili without restrictions as she ruled that the female worshippers did not instigate the disturbance, but rather it was the male and female Ultra Orthodox protestors countering them that initiated it. Women of the Wall's position The Women of the Wall have consistently claimed that there is no single \"custom of the place\" and that their right to pray is a religious freedom enshrined in Israeli law. They believe the Western Wall is a religious site as well as a national site and therefore belongs to the entire Jewish population. Their efforts to challenge the current customs at the Wall and break the ritual status quo continues as they believe that the Wall is a holy place for all Jews. They repeatedly stress that the group is not Reform Jews, but come from all affiliations and that their conduct strictly adheres to Orthodox Jewish Law and that their prayer is genuine and not a political stunt. Some understandings of Orthodox Jewish law strictly prohibits women reading from the Torah, and to a lesser degree women wearing tallit and kippahs. Their central mission is to \"achieve the social and legal recognition of our right, as women, to wear prayer shawls, pray and read from the Torah collectively and out loud at the Western Wall.\" The women have made progress and as of 1988, the women have held occasional, uninterrupted prayer services wearing tallitot and tefillin. Israeli Orthodox establishment's position Many from the Israeli Orthodox Jewish religious establishment are opposed to the services conducted by the Women of the Wall. Some Orthodox rabbis claim that even if such a manner of prayer is theoretically permitted by Jewish Law, it is against Jewish custom. Even if support can be found in Jewish legal sources for various activities, the force of custom is equal to absolute law and it is the custom which determines proper conduct. Various legal opinions recorded in Halacha cannot be manipulated to introduce new forms of prayer. The opinion of Rabbi Moshe Feinstein, which is cited by Women of the Wall in support of their cause, is rejected by the establishment, as they view the Women of the Wall as being motivated by feminism rather than a sincere spiritual desire.Frimer, Arye and Dov, Women's Prayer Services Theory and Practice Tradition, 1998 Their struggle is also seen as an attempt to undermine their influence and as a strategy for non-Orthodox groups to gradually gain official recognition at state level, paving the way for the introduction of religious pluralism in Israel.: \"The Israeli Orthodox establishment view the Women of the Wall as being a Trojan horse to introduce Jewish pluralism and establish the Reform, Conservative, and Reconstructionist strains of Judaism in Israel.\" In a letter to the group, Yehuda Getz, the government appointed rabbi of the Western Wall, urged them to stop \"straying from the hallowed traditions of generations of Jews before you\" and in 1989, the Israeli Chief Rabbi Avraham Shapiro and the Religious Affairs Minister suggested that these women \"pray individually, silently, and preferably at home-not at the wall.\" Phyllis Chesler now of Original Women of the Wall wrote: \"We asked for our rights under civil and religious law. When we prayed, other worshipers, both men and women, verbally and physically assaulted us. We asked the Israeli state to protect us so that we could exercise our rights. The state claimed it could not contain the violence against us, and that we ourselves had provoked the violence by \"disturbing/offending\" the \"sensibilities of Jews at worship.\" Women are not seen as \"Jews\" or as \"worshipers\" with \"sensibilities.\" Original Women of the Wall has since 2014 held monthly services at the Kotel on various days of the month. They uphold the original goals of the group to hold women's prayer groups at the Women's Section of the Western Wall. Their membership consists of most of the original members of the group who were at the Wall in 1988. The group includes members from all stream of Judaism.", "edit_actions": [{"type": "A", "before": null, "after": "even though their prayer was not egalitarian or non-Orthodox.", "start_char_pos": 231, "end_char_pos": 231}, {"type": "A", "before": null, "after": "Some board members and long-time supporters opposed this and began calling themselves Original Women of the Wall.", "start_char_pos": 639, "end_char_pos": 639}, {"type": "D", "before": "a group that split off from the Women of the Wall, calling itself the \"", "after": null, "start_char_pos": 1067, "end_char_pos": 1138}, {"type": "D", "before": "opted to claim", "after": null, "start_char_pos": 1277, "end_char_pos": 1291}, {"type": "A", "before": null, "after": "some", "start_char_pos": 1393, "end_char_pos": 1393}, {"type": "R", "before": "Most", "after": "Many", "start_char_pos": 1618, "end_char_pos": 1622}, {"type": "R", "before": "out", "after": "our", "start_char_pos": 1766, "end_char_pos": 1769}, {"type": "A", "before": null, "after": "As Women of the Wall moved away from their commitment to include all Jewish women, Original Women of the Wall continued to hold prayer services at the Women's section of the Western Wall.", "start_char_pos": 2845, "end_char_pos": 2845}, {"type": "A", "before": null, "after": "some", "start_char_pos": 2991, "end_char_pos": 2991}, {"type": "R", "before": "had been brought by a group that split off from the Women of the Wall, calling itself the \"", "after": "was brought by", "start_char_pos": 4448, "end_char_pos": 4539}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 4567, "end_char_pos": 4568}, {"type": "R", "before": "an executive", "after": "a", "start_char_pos": 6019, "end_char_pos": 6031}, {"type": "R", "before": "smuggled in", "after": "brought", "start_char_pos": 9024, "end_char_pos": 9035}, {"type": "R", "before": "rabbi", "after": "administrator", "start_char_pos": 9227, "end_char_pos": 9232}, {"type": "A", "before": null, "after": "Heritage Foundation", "start_char_pos": 9253, "end_char_pos": 9253}, {"type": "R", "before": "rabbi", "after": "Heritage Foundation administrator", "start_char_pos": 9644, "end_char_pos": 9649}, {"type": "D", "before": "under her coat", "after": null, "start_char_pos": 12608, "end_char_pos": 12622}, {"type": "A", "before": null, "after": "North", "start_char_pos": 12807, "end_char_pos": 12807}, {"type": "A", "before": null, "after": "Ultra", "start_char_pos": 13315, "end_char_pos": 13315}, {"type": "A", "before": null, "after": "Some understandings of", "start_char_pos": 14077, "end_char_pos": 14077}, {"type": "R", "before": "The", "after": "Many from the", "start_char_pos": 14578, "end_char_pos": 14581}, {"type": "R", "before": "is", "after": "are", "start_char_pos": 14630, "end_char_pos": 14632}, {"type": "A", "before": null, "after": "Some", "start_char_pos": 14693, "end_char_pos": 14693}, {"type": "R", "before": "of", "after": "now of Original", "start_char_pos": 16256, "end_char_pos": 16258}, {"type": "A", "before": null, "after": "Original Women of the Wall has since 2014 held monthly services at the Kotel on various days of the month. They uphold the original goals of the group to hold women's prayer groups at the Women's Section of the Western Wall. Their membership consists of most of the original members of the group who were at the Wall in 1988. The group includes members from all stream of Judaism.", "start_char_pos": 16759, "end_char_pos": 16759}], "sents_char_pos": [0, 189, 529, 604, 854, 987, 1167, 1348, 1474, 1509, 1589, 1617, 1713, 1914, 2201, 2550, 2753, 2952, 3092, 3282, 3449, 3511, 3537, 3604, 3669, 3853, 4049, 4255, 4388, 4807, 5092, 5203, 5328, 5481, 5538, 5674, 5747, 5791, 5848, 5953, 6083, 6118, 6142, 6161, 6201, 6238, 6428, 6542, 6558, 6633, 6716, 6818, 7020, 7058, 7158, 7330, 7346, 7408, 7621, 7660, 7851, 7918, 8090, 8324, 8340, 8450, 8465, 8540, 8704, 8814, 8903, 8994, 9194, 9450, 9856, 9927, 10011, 10170, 10331, 10448, 10567, 10831, 11015, 11056, 11131, 11349, 11387, 11596, 11729, 11908, 12005, 12218, 12424, 12558, 12660, 12738, 12969, 13019, 13118, 13370, 13571, 13703, 13864, 14076, 14203, 14397, 14535, 14692, 14823, 14999, 15098, 15339, 15658, 15869, 16239, 16339, 16431, 16510, 16688]}
+{"doc_id": "50757692", "revision_depth": "2", "before_revision": "In feminist theory, heteropatriarchy (etymologically from heterosexual and patriarchy) or cisheteropatriarchy, is a socio-political system where (primarily) cisgender males and heterosexuals have authority over cisgender females and over other sexual orientations and gender identities. It is a term that emphasizes that discrimination of women and LGBTQ people has the same sexist social principle.Unpacking Hetero-Patriarchy: Tracing the Conflation of Sex, Gender & Sexual Orientation to Its Origins. La persistencia del heteropatriarcado. In heteropatriarchal societies, it is commonly understood that cisgender heterosexual men generally occupy the highest positions of power in society, causing women (including transgender women), non-binary people, transgender men, and other LGBTQ people to experience the bulk of social oppression in relation to gender and sexuality. This idea is reinforced by unclear definitions of \"gender\", \"sex\", and \"sexual orientation\" in a cultural and legal context, as well as by gender norms, which serve to set social expectations associated with masculinity and femininity. Theory As a social system, heteropatriarchy perceives heterosexuality and patriarchy as normal while other configurations are considered abnormal. It then perpetuates an environment of oppression and inequality for racial and sexual minority groups.Decolonizing Feminism: Challenging Connections between Settler Colonialism and Heteropatriarchy. Feminist Formations. 2013. Heteropatriarchy is a facet of popular feminist analysis used to explain modern hierarchical social structure, which is dependent upon and includes the perspective of gender roles, based on a system of interlocking forces of power and oppression. It is commonly understood in this context that men typically occupy the highest positions of power and women experience the bulk of social oppression. This system of socio-political dominance is reinforced by gender norms, which ascribe traits of femininity and masculinity to men and women; whereby cisgender heterosexual men are favored and are routinely remunerated for presenting masculine traits . Conversely, women or people who display traits deemed feminine receive less societal privilege. Historically this has manifested in economic disadvantages such as unequal pay, or the inability for women to own land. The practice of legal (and social) culture of relegating gender to the realm of \"women's issues\" and sexual orientation to the realm of \"sexual minorities' issues\u201d is fundamental to a heteropatriarchal society.Coombs, Mary (1996) \"Comment: Between Women/Between Men: The Significance for Lesbianism of Historical Understandings of Same-(Male)Sex Sexual Activities,\" Yale Journal of Law & the Humanities: Vol. 8: Iss. 1, Article 9. Heterosexual men are not only given primacy over other gender and sexual minorities, but are also encouraged and rewarded . On the microscopic level, heteropatriarchy could be evident in consumption habits and relationships while on the macroscopic level it is demonstrated by the glass ceiling, marriage, and the legal control over female bodies . From a historical point of view, the term patriarchy refers to the father as the power holder inside the family hierarchy, and therefore , women become subordinate to the power of men. Patriarchy is a social system in which men have predominant power and are dominant and have privilege in roles such as: political, economical, societal, and social roles. With the emergence of queer theory around the 1980s and the 1990s and the questioning of the heteronormativity and the gender binary , this kind of domination is not only described in terms of sex or gender (the predominance of men over woman, or the masculine over the feminine) but also in terms of sexuality (the heteronormativity, or the heterosexuality above other sexual orientations and the cisgender over other identities). The term heteropatriarchy has evolved from the previous, less specific term 'patriarchy' to emphasize the formation of a man dominated society based upon the cultural processes of sexism or heterosexism. Background history Since ancient times, heteropatriarchy has shaped the way how societies across the world have viewed masculinity and femininity . This societal system has had negative effects on societies , which have beat the test of time and are still apparent in modern days. Throughout Ancient China , it is shown by the example of emperors being male with dominant power . Women and people that showed feminine traits were objectified and oppressed. Women were seen as obedient housewives whose main purpose was to serve males.Glenn, Evelyn Glenn Nakano. \u201cSettler Colonialism as Structure: A Framework for Comparative Studies of U.S. Race and Gender Formation.\u201d Http://Journals.sagepub.com/Doi/Pdf/10.1177/2332649214560440, 2015, journals.sagepub.com/doi/pdf/10.1177/2332649214560440. Due to this, women's voice has been ignored and suppressed . Leading to a system that grew into a society denying women rights and that they were dehumanized. While there is no definitive origin of where heteropatriarchycame from, there are various places and societies that may have contributed to its creation. One of the places to contribute is the ancient Greeks . It has been argued that there are records that show that the ancient Greek system used sex and gender as the very foundation of human identity and the very basis of social organization. The Greeks had a critical role in the institutionalization of patriarchy in the Western world and also had an impact on Roman imperialism that furthered their sex /gender ideas into modern arrangements. Recently, scholars have begun to document the Greeks' critical role in the institutionalization of patriarchy in the Western World. Synthesizing the work of such scholars , this Section will show how the Greek sex /gender system, as mediated through Roman imperialism, gave rise to the sex /gender conceptions that birthed contemporary arrangements. Another cause that has led to heteropatriarchy is heteropaternalism, where it's the premise where heteropatriarchy is established in a domestic arrangement . Meaning that the father of a house is the leader and center power of a family household, and is in charge of any social arrangements. Even though heteropatriarchy and heteropaternalism mainly defines the perspective of patriarchy that make up a mindset in people's eye that male gender is seen as strong, facetious, and capable . While women in the other hand are perceived as lower class and weak . Tuck, Eve.\u201cDecolonizing Feminism: Challenging Connections between Settler Colonialism and Heteropatriarchy\u201d Academia.edu - Share Research, 2013 %DIFDELCMD < %DIFDELCMD < %%% This ideology has been promoted through colonization and spreading of Eurocentric culture, reaching hegemony around the world and removing other gender systems as well as other ways of understanding society, genders or eroticism. Relevance One of the main foundations of heteropatriarchy is the normalization of the nuclear family as the only acceptable family unit, manifesting this societal system into modern day . Heteropatriarchy has regulated the bodies of Indigenous women, queer, and trans people and sets out to destroy, control, and manipulate these difference into hierarchies. The effects of heteropatriarchy have disproportionately affected minority groups, indigenous people, and the lgbtqia+ community.", "after_revision": "In feminist theory, heteropatriarchy (etymologically from heterosexual and patriarchy) or cisheteropatriarchy, is a socio-political system where (primarily) cisgender (same gender as identified at birth) and heterosexual males have authority over cisgender females and people with other sexual orientations and gender identities. It is a term that emphasizes that discrimination against women and LGBTQ people is derived from the same sexist social principle.Unpacking Hetero-Patriarchy: Tracing the Conflation of Sex, Gender & Sexual Orientation to Its Origins. La persistencia del heteropatriarcado. The concept postulates that in heteropatriarchal societies, cisgender heterosexual men generally occupy the highest positions of power in society, causing women (including transgender women), non-binary people, transgender men, and other LGBTQ people to experience the bulk of social oppression in relation to gender and sexuality. Reinforcement is said to be made by unclear definitions of \"gender\", \"sex\", and \"sexual orientation\" in a cultural and legal context, as well as by gender norms, which serve to set social expectations associated with masculinity and femininity. Theory The theory of the concept asserts that, as a social system, heteropatriarchy perceives heterosexuality and patriarchy as normal while other configurations are considered abnormal. Normalization of heteropatriarchy is said to perpetuate an environment of oppression and inequality for racial and sexual minority groups.Decolonizing Feminism: Challenging Connections between Settler Colonialism and Heteropatriarchy. Feminist Formations. 2013. Heteropatriarchy is a facet of popular feminist analysis used to explain modern hierarchical social structure, which is dependent upon , and includes, the perspective of gender roles, based on a system of interlocking forces of power and oppression. It is said to be commonly understood, in this context , that men typically occupy the highest positions of power and women experience the bulk of social oppression. This system of socio-political dominance is said to be reinforced by gender norms, which ascribe traits of femininity and masculinity to people, whereby cisgender heterosexual men are favored and are routinely remunerated for presenting masculine traits , and conversely, women and people who display traits deemed feminine receive less societal privilege. The concept implies that historically this has manifested in economic disadvantages such as unequal pay, or the inability for women to own land. The practice of legal (and social) culture of relegating gender to the realm of \"women's issues\" and sexual orientation to the realm of \"sexual minorities' issues\u201d is fundamental to this concept of a heteropatriarchal society.Coombs, Mary (1996) \"Comment: Between Women/Between Men: The Significance for Lesbianism of Historical Understandings of Same-(Male)Sex Sexual Activities,\" Yale Journal of Law & the Humanities: Vol. 8: Iss. 1, Article 9. It implies further, that not only are heterosexual men given primacy over other gender and sexual minorities, but they also are encouraged and rewarded by a heteropatriarchal society, and that on the microscopic level, heteropatriarchy could be evident in consumption habits and relationships while on the macroscopic level , it is demonstrated by the glass ceiling, marriage, and the legal control over the bodies of women . From a historical point of view, the term patriarchy refers to the father as the power holder inside family hierarchy, and thereby , women become subordinate to the power of men. Patriarchy is a social system in which men have predominant power and are dominant and have privilege in roles such as: political, economical, societal, and social roles. With the emergence of queer theory around the 1980s and the 1990s and the questioning of heteronormativity and gender binary in contemporary societies , this kind of domination was described not only in terms of gender (the predominance of men over woman, or the masculine over the feminine) or sex, but also in terms of sexuality (the heteronormativity, or heterosexuality above other sexual orientations and the cisgender over other identities). The term heteropatriarchy is said to have evolved from what is described as the previous, less specific term 'patriarchy' in order to emphasize the formation of a male-dominated society based upon the cultural processes of sexism or heterosexism. Background history The concept presumes that since ancient times, heteropatriarchy has shaped the way societies across the world have viewed masculinity and femininity and that this societal system has had negative effects on societies that remain apparent in modern days. Research by Evelyn and Nakano Glenn postulates that Ancient China is an example that confirms this, being a society having male emperors with dominant power , in which women and people who showed feminine traits were objectified and oppressed. Exceptions to the premise not being addressed, women were seen as obedient housewives whose main purpose was to serve males.Glenn, Evelyn Glenn Nakano. \u201cSettler Colonialism as Structure: A Framework for Comparative Studies of U.S. Race and Gender Formation.\u201d Http://Journals.sagepub.com/Doi/Pdf/10.1177/2332649214560440, 2015, journals.sagepub.com/doi/pdf/10.1177/2332649214560440. The conclusion seems to be that due to this, the voices of women have been ignored and suppressed , leading to a system that grew into a society denying women rights and that they were dehumanized. Some contemporary research postulates that while there is no definitive origin for heteropatriarchy, various places and societies may have contributed significantly to its creation. The classical period of ancient Greek society is identified as one of these contributory factors . It has been argued that there are records that show that the ancient Greek system used gender and sex as the very foundation of human identity and the very basis of social organization. the concept asserts that these Greeks had a critical role in the institutionalization of patriarchy in the Western world and also had an impact on Roman imperialism that furthered their gender/ sex ideas into modern arrangements. Recently, some of these scholars have begun to document the critical role of these Greeks in the institutionalization of patriarchy in the Western World. Synthesizing the work of such scholars is thought to demonstrate how the Greek gender/ sex system, as mediated through Roman imperialism, gave rise to the gender/ sex conceptions that birthed contemporary arrangements. In a premise where heteropatriarchy is established in a domestic arrangement , heteropaternalism is identified as another cause that has led to heteropatriarchy . Meaning that the father of a house is the leader and center power of a family household, and is in charge of any social arrangements. Even though heteropatriarchy and heteropaternalism mainly define the perspective of patriarchy that makes up a mindset about gender wherein men are seen as strong, facetious, and capable while on the other hand , women are perceived as weak and less capable, Tuck, Eve.\u201cDecolonizing Feminism: Challenging Connections between Settler Colonialism and Heteropatriarchy\u201d Academia.edu - Share Research, 2013 %DIFDELCMD < %DIFDELCMD < %%% the concept asserts that this ideology has been promoted through colonization and spreading of Eurocentric culture, reaching hegemony around the world and removing other gender systems as well as other ways of understanding society, gender, or eroticism. Relevance Some researchers in this field of study cite one of the main foundations of heteropatriarchy as the normalization of the nuclear family as the only acceptable family unit, manifesting this societal system into modern day , which they postulate has regulated the bodies of Indigenous women, queer, and trans people and sets out to destroy, control, and manipulate these differences into hierarchies. The effects of heteropatriarchy are said to have disproportionately affected minority groups, indigenous people, and the lgbtqia+ community.", "edit_actions": [{"type": "R", "before": "males and heterosexuals", "after": "(same gender as identified at birth) and heterosexual males", "start_char_pos": 167, "end_char_pos": 190}, {"type": "R", "before": "over", "after": "people with", "start_char_pos": 233, "end_char_pos": 237}, {"type": "R", "before": "of", "after": "against", "start_char_pos": 336, "end_char_pos": 338}, {"type": "R", "before": "has", "after": "is derived from", "start_char_pos": 362, "end_char_pos": 365}, {"type": "R", "before": "In", "after": "The concept postulates that in", "start_char_pos": 542, "end_char_pos": 544}, {"type": "D", "before": "it is commonly understood that", "after": null, "start_char_pos": 574, "end_char_pos": 604}, {"type": "R", "before": "This idea is reinforced", "after": "Reinforcement is said to be made", "start_char_pos": 877, "end_char_pos": 900}, {"type": "R", "before": "As", "after": "The theory of the concept asserts that, as", "start_char_pos": 1120, "end_char_pos": 1122}, {"type": "R", "before": "It then perpetuates", "after": "Normalization of heteropatriarchy is said to perpetuate", "start_char_pos": 1260, "end_char_pos": 1279}, {"type": "R", "before": "and includes", "after": ", and includes,", "start_char_pos": 1621, "end_char_pos": 1633}, {"type": "R", "before": "commonly understood", "after": "said to be commonly understood,", "start_char_pos": 1739, "end_char_pos": 1758}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1775, "end_char_pos": 1775}, {"type": "A", "before": null, "after": "said to be", "start_char_pos": 1929, "end_char_pos": 1929}, {"type": "R", "before": "men and women;", "after": "people,", "start_char_pos": 2012, "end_char_pos": 2026}, {"type": "R", "before": ". Conversely, women or", "after": ", and conversely, women and", "start_char_pos": 2136, "end_char_pos": 2158}, {"type": "R", "before": "Historically", "after": "The concept implies that historically", "start_char_pos": 2234, "end_char_pos": 2246}, {"type": "A", "before": null, "after": "this concept of", "start_char_pos": 2536, "end_char_pos": 2536}, {"type": "R", "before": "Heterosexual men are not only", "after": "It implies further, that not only are heterosexual men", "start_char_pos": 2786, "end_char_pos": 2815}, {"type": "R", "before": "are also", "after": "they also are", "start_char_pos": 2875, "end_char_pos": 2883}, {"type": "R", "before": ". On", "after": "by a heteropatriarchal society, and that on", "start_char_pos": 2908, "end_char_pos": 2912}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3041, "end_char_pos": 3041}, {"type": "R", "before": "female bodies", "after": "the bodies of women", "start_char_pos": 3120, "end_char_pos": 3133}, {"type": "D", "before": "the", "after": null, "start_char_pos": 3237, "end_char_pos": 3240}, {"type": "R", "before": "therefore", "after": "thereby", "start_char_pos": 3263, "end_char_pos": 3272}, {"type": "R", "before": "the heteronormativity and the gender binary", "after": "heteronormativity and gender binary in contemporary societies", "start_char_pos": 3581, "end_char_pos": 3624}, {"type": "R", "before": "is not only described", "after": "was described not only", "start_char_pos": 3651, "end_char_pos": 3672}, {"type": "D", "before": "sex or", "after": null, "start_char_pos": 3685, "end_char_pos": 3691}, {"type": "A", "before": null, "after": "or sex,", "start_char_pos": 3772, "end_char_pos": 3772}, {"type": "D", "before": "the", "after": null, "start_char_pos": 3831, "end_char_pos": 3834}, {"type": "R", "before": "has evolved from", "after": "is said to have evolved from what is described as", "start_char_pos": 3951, "end_char_pos": 3967}, {"type": "A", "before": null, "after": "in order", "start_char_pos": 4014, "end_char_pos": 4014}, {"type": "R", "before": "man dominated", "after": "male-dominated", "start_char_pos": 4047, "end_char_pos": 4060}, {"type": "R", "before": "Since", "after": "The concept presumes that since", "start_char_pos": 4149, "end_char_pos": 4154}, {"type": "D", "before": "how", "after": null, "start_char_pos": 4206, "end_char_pos": 4209}, {"type": "R", "before": ". This", "after": "and that this", "start_char_pos": 4276, "end_char_pos": 4282}, {"type": "R", "before": ", which have beat the test of time and are still", "after": "that remain", "start_char_pos": 4337, "end_char_pos": 4385}, {"type": "D", "before": "Throughout Ancient China , it is shown by the example of emperors being male", "after": null, "start_char_pos": 4411, "end_char_pos": 4487}, {"type": "A", "before": null, "after": "Research by Evelyn and Nakano Glenn postulates that Ancient China is an example that confirms this, being a society having male emperors", "start_char_pos": 4488, "end_char_pos": 4488}, {"type": "R", "before": ". Women and people that", "after": ", in which women and people who", "start_char_pos": 4509, "end_char_pos": 4532}, {"type": "R", "before": "Women", "after": "Exceptions to the premise not being addressed, women", "start_char_pos": 4588, "end_char_pos": 4593}, {"type": "R", "before": "Due to this, women's voice has", "after": "The conclusion seems to be that due to this, the voices of women have", "start_char_pos": 4923, "end_char_pos": 4953}, {"type": "R", "before": ". Leading", "after": ", leading", "start_char_pos": 4982, "end_char_pos": 4991}, {"type": "R", "before": "While", "after": "Some contemporary research postulates that while", "start_char_pos": 5082, "end_char_pos": 5087}, {"type": "R", "before": "of where heteropatriarchycame from, there are", "after": "for heteropatriarchy,", "start_char_pos": 5118, "end_char_pos": 5163}, {"type": "D", "before": "that", "after": null, "start_char_pos": 5193, "end_char_pos": 5197}, {"type": "A", "before": null, "after": "significantly", "start_char_pos": 5219, "end_char_pos": 5219}, {"type": "R", "before": "One of the places to contribute is the ancient Greeks", "after": "The classical period of ancient Greek society is identified as one of these contributory factors", "start_char_pos": 5237, "end_char_pos": 5290}, {"type": "R", "before": "sex and gender", "after": "gender and sex", "start_char_pos": 5380, "end_char_pos": 5394}, {"type": "R", "before": "The", "after": "the concept asserts that these", "start_char_pos": 5479, "end_char_pos": 5482}, {"type": "A", "before": null, "after": "gender/", "start_char_pos": 5638, "end_char_pos": 5638}, {"type": "D", "before": "/gender", "after": null, "start_char_pos": 5643, "end_char_pos": 5650}, {"type": "A", "before": null, "after": "some of these", "start_char_pos": 5693, "end_char_pos": 5693}, {"type": "R", "before": "Greeks' critical role", "after": "critical role of these Greeks", "start_char_pos": 5730, "end_char_pos": 5751}, {"type": "R", "before": ", this Section will show", "after": "is thought to demonstrate", "start_char_pos": 5855, "end_char_pos": 5879}, {"type": "A", "before": null, "after": "gender/", "start_char_pos": 5894, "end_char_pos": 5894}, {"type": "D", "before": "/gender", "after": null, "start_char_pos": 5899, "end_char_pos": 5906}, {"type": "A", "before": null, "after": "gender/", "start_char_pos": 5971, "end_char_pos": 5971}, {"type": "D", "before": "/gender", "after": null, "start_char_pos": 5976, "end_char_pos": 5983}, {"type": "R", "before": "Another cause that has led to heteropatriarchy is heteropaternalism, where it's the", "after": "In a", "start_char_pos": 6036, "end_char_pos": 6119}, {"type": "A", "before": null, "after": ", heteropaternalism is identified as another cause that has led to heteropatriarchy", "start_char_pos": 6192, "end_char_pos": 6192}, {"type": "R", "before": "defines", "after": "define", "start_char_pos": 6387, "end_char_pos": 6394}, {"type": "R", "before": "make", "after": "makes", "start_char_pos": 6430, "end_char_pos": 6434}, {"type": "R", "before": "in people's eye that male gender is", "after": "about gender wherein men are", "start_char_pos": 6448, "end_char_pos": 6483}, {"type": "R", "before": ". While women in", "after": "while on", "start_char_pos": 6523, "end_char_pos": 6539}, {"type": "A", "before": null, "after": ", women", "start_char_pos": 6555, "end_char_pos": 6555}, {"type": "R", "before": "lower class and weak .", "after": "weak and less capable,", "start_char_pos": 6573, "end_char_pos": 6595}, {"type": "R", "before": "This", "after": "the concept asserts that this", "start_char_pos": 6770, "end_char_pos": 6774}, {"type": "R", "before": "genders", "after": "gender,", "start_char_pos": 6978, "end_char_pos": 6985}, {"type": "R", "before": "One of", "after": "Some researchers in this field of study cite one of", "start_char_pos": 7010, "end_char_pos": 7016}, {"type": "R", "before": "is", "after": "as", "start_char_pos": 7058, "end_char_pos": 7060}, {"type": "D", "before": ".", "after": null, "start_char_pos": 7186, "end_char_pos": 7187}, {"type": "R", "before": "Heteropatriarchy", "after": ", which they postulate", "start_char_pos": 7188, "end_char_pos": 7204}, {"type": "R", "before": "difference", "after": "differences", "start_char_pos": 7330, "end_char_pos": 7340}, {"type": "A", "before": null, "after": "are said to", "start_char_pos": 7391, "end_char_pos": 7391}], "sents_char_pos": [0, 286, 399, 502, 541, 876, 1112, 1259, 1362, 1458, 1479, 1732, 1884, 2026, 2233, 2353, 2565, 2785, 2909, 3135, 3320, 3491, 3924, 4129, 4277, 4410, 4510, 4587, 4665, 4692, 4799, 4922, 5081, 5236, 5292, 5478, 5682, 5815, 6035, 6328, 6524, 6595, 6606, 6999, 7187, 7358]}
+{"doc_id": "5114327", "revision_depth": "1", "before_revision": "Index xylariorum CodeInstitution NameAwCAMBRIDGE: Harvard University.ALCwALCOBA\u00c7A; Estacao de Experimenta\u00e7\u00e2o Florestal.AMwAMLAI: Birla Institute of Scientific Research.ARwYEZIN: Forest Research Institute.BwBERLIN-DAHLEM: Botanischer Garten und Botanisches Museum Berlin-Dahlem.BBSwPARAMARIBO; Surinam Forest Service. BCTwS\u00c4O PAULO: Instituto de Pesquisas Tecnol\u00f3gicas do Estado de Sao Paulo.BHVsBERLIN: Museum f\u00fcr Naturkunde der Humboldt-Universit\u00e4t zu Berlin.BISHwHONOLULU: Bemice P. Bishop Museum.BKFwBANGKOK: Royal Forest Department.BMwLONDON: British Museum (Natural History).BOFwBOGOT\u00c1: Instituto de Investigaciones Forestales y Madereras.BPwBUDAPEST: Hungarian Museum of Natural History.BRIwBRISBANE: Queensland Herbarium.BSILwLUCKNOW: BirbalSahni Institute of Paleobotany.BULHwBULOLO: Papua New Guinea Forestry College.BWCwSYRACUSE: College of Environmental Science and Forestry.BZFwBOGOR: Lembaga Penelitian Hasil Hutan (Forest Products Research Institute).CAFwBEIJING: Chinese Academy of Forestry.CANBwCANBERRA: Australian National Herbarium. CEPECwILHEUS : Centro de Pesquisas do Cacau.CHITwCHTITAGONG: Forest Research Institute.CHNwCHRISTCHURCH: University of Canterbury.CHRwCHRISTCHURCH: Department of Scientific and Industrial Research.CLPwCOLLEGE: Forest Products Research and Development Institute.CONCwCON\u0152PCI\u00d4N: Universidad de Concepci\u00f3n.CQTw BRISBANE: Queensland Department of Forestry.CTBwPARIS: Centre Technique du Bois et de l'Ameublement.CTFwNOGENT-SUR-MARNE: Cenfre Technique Forestier Tropical.CVRDwLINHARES: Reserva Florestal da CVRD.DwDELFT: TNO Timber Research Institute.DBwDUBLIN: University College.DDwDEHRADUN: Forest Research Institute and Colleges.DEQwQUITO: instituto Ecuatoriano de Ciencias Naturales.DREwDRESDEN: Wissenschaftlich-technisches Zentrum der holzverarbeitenden Industrie.ECwHEREDIA: Universidad Nacional.EIFwSANTIAGO: Universidad de Chile.ESAwPIRACICABA: Universidade de S\u00e4o Paulo.FHIwIBADAN: Forest Research Institute of Nigeria.FHOwOXFORD: University of Oxford.FIwFLORENCE: Herbarium Universitatis Florentinae and Erbario Tropicale di Firenze.FLwFLORENCE: Istituto per la Ricerca sul Legno.FLASwGAINESVILLE: University of Florida.FPAwHIGHETT: Commonwealth Scientific and Industriai Research Organization. FPBwBRASILIA: instituto Brasileiro de Desenvolvimento Florestal.FRwFRANKFURT AM MAIN: Naturmuseum und Forschungsinstitut Senckenberg.FRIGwGUANGZHOU: Forest Research Instit\u00f9te of Guangdong Province.GTwGEORGETOWN: Guyana Forestry Commission.HBwHAVANA: Centro de Investigaci\u00f3n Forestal. HBRwITAJAI: Herbario \"Barbosa Rodrigues.\"HEFwHEFEI: Anhui Agricultural College.HMwLONDON: The Homiman Museum and Library.IFPwSHENYANG: Institute of Forestry and Pedology.IICAwTURRIALBA: Universidad de Costa Rica.IJwKINGSTON: Institute of Jamaica.INPAwMANAUS: Instituto Nacional de Pesquisas da Amazonia .ITAwMANAUS: Instituto de Tecnologia da Amaz\u00f4nia.JARIwMONTE DOURADO: Superintend\u00eancia de Pesquisa Florestal.KwKEW: Royal Botanic Gardens, Economic and Conservation Section.KARwKARAJ: College of Natural Resources.KEPwKEPONG: Forest Research Institute Malaysia.K-JwKEW: Royal Botanic Gardens, Jodrell Laboratory.KNwKAMPALA: Nakawa Forest Research Institute.KYOwKYOTO: Kyoto University.LwLEIDEN: Rijksherbarium.LAEwLAE: Department of Forests.LEwLENINGRAD: V. L. Komarov Botanical Institute.LILwTUCUM\u00c1N: Instituto Miguel Lillo.LISJCwLISBON: Jardim e Museu Agr\u00edcola Tropical.LIVwLIVERPOOL: Liverpool Museum.LNECwLISBON: Laborat\u00f2rio Nacional de Engenharia Civil.MADwMADISON: U.S. Forest Products Laboratory.MADRwMADRID: Instituto Nacional de Investigaciones Agrarias.MAD-SJRwMADISON: U.S. Forest Products Laboratory.MCSwMILAN: Civico Museo de Storia Naturale.MEDELwMEDELLIN: Universidad Nacional.MERwM\u00c9RIDA: Universidad de los Andes.MEXFWM\u00c9XICO: Instituto Nacional de Investigaciones Forestales.MEXUwM\u00c9XICO: Universidad Nacional Aut\u00f3noma de M\u00e9xico.MGwBEL\u00c9M: Museu Paraense Emflio Goeldi.MICHwANNARBOR: University of Michigan.MUNwMUNICH: Universit\u00e4t M\u00fcnchen.NATwILANOTH: Agricultural Research Organisation.NINwMANAGUA: Nicaraguan Institute of Natural Resources and Environment.NMWwCARDIFF: National Museum of Wales.NYw BRONX: The New York Botanical Garden.NYJwPORTLAND: World Forestry Center.OLwOTTAWA: Forintek Canada Corporation.PACwRALEIGH: North Carolina State University.PATwPARIS: Museum National d'Histoire Naturelle.PFPwPRETORIA: South African Forestry Research Institute.PMPwBOROKO: Forest Products Research and Development Centre.PRFwPRINCES RISBOROUGH: Building Research Establishment.PTwPRAGUE: Timber Research and Development Institute.RBwRIO DE JANEIRO: Jardim Bot\u00e0nico do Rio de Janeiro.RBHwHAMBURG: Bundesforschungsanstalt f\u00fcr Forst- und Holzwirtschaft.RFwROSENHEIM: Fachhochschule Rosenheim.RPPRwRIO PIEDRAS: Instituteof Tropical Forestry.RSAwCLAREMONT: Rancho Santa Ana Botanic Garden.RTIwAMSTERDAM: Royal Tropical Institute.SANwSANDAKAN: Forest Research Centre.SARFwKUCKNG: Forest Department.SFCwBEECROFT: Forestry Commission of New South Wales. SPwS\u00c4O PAULO: Instituto de Bot\u00e0nica .S-PAwSTOCKHOLM: Swedish Museum of Natural History. SPSFwS\u00c4O PAULO: Instituto Florestal de S\u00e4o Paulo.STEwSTELLENBOSCH: University of Stellenbosch.SVwHAVANA: Academia de Ciencias de Cuba.SWTwSTOCKHOLM: Swedish Institute for Wood Technology Research.SYSwGUANGZHOU: Sun Yat-Sen University.SZDwSZEGED: Universitatis Szeged.TwTERVUREN: Koninklijk Museum voor Midden-Afrika (Mus\u00e9e Royal de l'Afrique Centrale).TAIwTAIPEI: National Taiwan University.TAIFwTAIPEI: Taiwan Forestry Research Institute.TAUwTHESSALONIKI: Aristotelian University.TIPwRECIFE: Funda\u00e7\u00e2o Instituto Tecnol\u00f3gico do Estado Pemambuco .TOFOwTOKYO: University of Tokyo.TRTwTORONTO: University of Toronto.TSFwTHARANDT: Technische Universit\u00e4t Dresden.TWTwTSUKUBA: Forestry and Forest Products Research Institute.UwUTRECHT: Rijksuniversiteit te Utrecht.UCwRICHMOND: University of California.UCNWwBANGOR: University College of North Wales.USwWASHINGTON: Smithsonian Institution.VENwCARACAS: Instituto Bot\u00e1nico.VFwVIENNA: Forstlichen Bundesversuchsanstalt.VLwVANCOUVER: Forintek Canada Corporation.WAGwWAGENINGEN: Department of Plant Taxonomy, Agriculmral University.WDwWINTERTHUR: The Henry Francis du Pont WinterthuT Museum.WFwADELAIDE: Woods and Forest Department.WIBwWAGENINGEN: Department of Forestry Techniques, Agricultural University.WLwWAGENINGEN: Botanisch Laboratorium.WZwROTORUA: Forest Research Institute.XALwXALAPA: Instituto Nacional de Investigaciones Sobre Recursos Bi\u00f3ticos.YANwYANGLING: Northwestern College of Forestry.ZAwZAGREB: University of Zagreb.ZTwZ\u00dcRICH: Eidgen\u00f6ssische Technische Hochschule.", "after_revision": "Index xylariorum CodeInstitution NameAwCAMBRIDGE: Harvard University.ALCwALCOBA\u00c7A; Esta\u00e7\u00e3o de Experimenta\u00e7\u00e3o Florestal.AMwAMLAI: Birla Institute of Scientific Research.ARwYEZIN: Forest Research Institute.BwBERLIN-DAHLEM: Botanischer Garten und Botanisches Museum Berlin-Dahlem.BBSwPARAMARIBO; Surinam Forest Service. BCTwS\u00c3O PAULO: Instituto de Pesquisas Tecnol\u00f3gicas do Estado de S\u00e3o Paulo.BHVsBERLIN: Museum f\u00fcr Naturkunde der Humboldt-Universit\u00e4t zu Berlin.BISHwHONOLULU: Bemice P. Bishop Museum.BKFwBANGKOK: Royal Forest Department.BMwLONDON: British Museum (Natural History).BOFwBOGOT\u00c1: Instituto de Investigaciones Forestales y Madereras.BPwBUDAPEST: Hungarian Museum of Natural History.BRIwBRISBANE: Queensland Herbarium.BSILwLUCKNOW: BirbalSahni Institute of Paleobotany.BULHwBULOLO: Papua New Guinea Forestry College.BWCwSYRACUSE: College of Environmental Science and Forestry.BZFwBOGOR: Lembaga Penelitian Hasil Hutan (Forest Products Research Institute).CAFwBEIJING: Chinese Academy of Forestry.CANBwCANBERRA: Australian National Herbarium. CEPECwILH\u00c9US : Centro de Pesquisas do Cacau.CHITwCHTITAGONG: Forest Research Institute.CHNwCHRISTCHURCH: University of Canterbury.CHRwCHRISTCHURCH: Department of Scientific and Industrial Research.CLPwCOLLEGE: Forest Products Research and Development Institute.CONCwCON\u0152PCI\u00d4N: Universidad de Concepci\u00f3n.CQTw BRISBANE: Queensland Department of Forestry.CTBwPARIS: Centre Technique du Bois et de l'Ameublement.CTFwNOGENT-SUR-MARNE: Cenfre Technique Forestier Tropical.CVRDwLINHARES: Reserva Florestal da CVRD.DwDELFT: TNO Timber Research Institute.DBwDUBLIN: University College.DDwDEHRADUN: Forest Research Institute and Colleges.DEQwQUITO: Instituto Ecuatoriano de Ciencias Naturales.DREwDRESDEN: Wissenschaftlich-technisches Zentrum der holzverarbeitenden Industrie.ECwHEREDIA: Universidad Nacional.EIFwSANTIAGO: Universidad de Chile.ESAwPIRACICABA: Universidade de S\u00e3o Paulo.FHIwIBADAN: Forest Research Institute of Nigeria.FHOwOXFORD: University of Oxford.FIwFLORENCE: Herbarium Universitatis Florentinae and Erbario Tropicale di Firenze.FLwFLORENCE: Istituto per la Ricerca sul Legno.FLASwGAINESVILLE: University of Florida.FPAwHIGHETT: Commonwealth Scientific and Industrial Research Organization. FPBwBRAS\u00cdLIA: Instituto Brasileiro de Desenvolvimento Florestal.FRwFRANKFURT AM MAIN: Naturmuseum und Forschungsinstitut Senckenberg.FRIGwGUANGZHOU: Forest Research Instit\u00f9te of Guangdong Province.GTwGEORGETOWN: Guyana Forestry Commission.HBwHAVANA: Centro de Investigaci\u00f3n Forestal. HBRwITAJA\u00cd: Herb\u00e1rio \"Barbosa Rodrigues.\"HEFwHEFEI: Anhui Agricultural College.HMwLONDON: The Homiman Museum and Library.IFPwSHENYANG: Institute of Forestry and Pedology.IICAwTURRIALBA: Universidad de Costa Rica.IJwKINGSTON: Institute of Jamaica.INPAwMANAUS: Instituto Nacional de Pesquisas da Amaz\u00f4nia .ITAwMANAUS: Instituto de Tecnologia da Amaz\u00f4nia.JARIwMONTE DOURADO: Superintend\u00eancia de Pesquisa Florestal.KwKEW: Royal Botanic Gardens, Economic and Conservation Section.KARwKARAJ: College of Natural Resources.KEPwKEPONG: Forest Research Institute Malaysia.K-JwKEW: Royal Botanic Gardens, Jodrell Laboratory.KNwKAMPALA: Nakawa Forest Research Institute.KYOwKYOTO: Kyoto University.LwLEIDEN: Rijksherbarium.LAEwLAE: Department of Forests.LEwLENINGRAD: V. L. Komarov Botanical Institute.LILwTUCUM\u00c1N: Instituto Miguel Lillo.LISJCwLISBON: Jardim e Museu Agr\u00edcola Tropical.LIVwLIVERPOOL: Liverpool Museum.LNECwLISBON: Laborat\u00f3rio Nacional de Engenharia Civil.MADwMADISON: U.S. Forest Products Laboratory.MADRwMADRID: Instituto Nacional de Investigaciones Agrarias.MAD-SJRwMADISON: U.S. Forest Products Laboratory.MCSwMILAN: Civico Museo de Storia Naturale.MEDELwMEDELLIN: Universidad Nacional.MERwM\u00c9RIDA: Universidad de los Andes.MEXFWM\u00c9XICO: Instituto Nacional de Investigaciones Forestales.MEXUwM\u00c9XICO: Universidad Nacional Aut\u00f3noma de M\u00e9xico.MGwBEL\u00c9M: Museu Paraense Emilio Goeldi.MICHwANNARBOR: University of Michigan.MUNwMUNICH: Universit\u00e4t M\u00fcnchen.NATwILANOTH: Agricultural Research Organisation.NINwMANAGUA: Nicaraguan Institute of Natural Resources and Environment.NMWwCARDIFF: National Museum of Wales.NYw BRONX: The New York Botanical Garden.NYJwPORTLAND: World Forestry Center.OLwOTTAWA: Forintek Canada Corporation.PACwRALEIGH: North Carolina State University.PATwPARIS: Mus\u00e9um National d'Histoire Naturelle.PFPwPRETORIA: South African Forestry Research Institute.PMPwBOROKO: Forest Products Research and Development Centre.PRFwPRINCES RISBOROUGH: Building Research Establishment.PTwPRAGUE: Timber Research and Development Institute.RBwRIO DE JANEIRO: Jardim Bot\u00e2nico do Rio de Janeiro.RBHwHAMBURG: Bundesforschungsanstalt f\u00fcr Forst- und Holzwirtschaft.RFwROSENHEIM: Fachhochschule Rosenheim.RPPRwRIO PIEDRAS: Instituteof Tropical Forestry.RSAwCLAREMONT: Rancho Santa Ana Botanic Garden.RTIwAMSTERDAM: Royal Tropical Institute.SANwSANDAKAN: Forest Research Centre.SARFwKUCKNG: Forest Department.SFCwBEECROFT: Forestry Commission of New South Wales. SPwS\u00c3O PAULO: Instituto de Bot\u00e2nica .S-PAwSTOCKHOLM: Swedish Museum of Natural History. SPSFwS\u00e3O PAULO: Instituto Florestal de S\u00e3o Paulo.STEwSTELLENBOSCH: University of Stellenbosch.SVwHAVANA: Academia de Ciencias de Cuba.SWTwSTOCKHOLM: Swedish Institute for Wood Technology Research.SYSwGUANGZHOU: Sun Yat-Sen University.SZDwSZEGED: Universitatis Szeged.TwTERVUREN: Koninklijk Museum voor Midden-Afrika (Mus\u00e9e Royal de l'Afrique Centrale).TAIwTAIPEI: National Taiwan University.TAIFwTAIPEI: Taiwan Forestry Research Institute.TAUwTHESSALONIKI: Aristotelian University.TIPwRECIFE: Funda\u00e7\u00e3o Instituto Tecnol\u00f3gico do Estado de Pernambuco .TOFOwTOKYO: University of Tokyo.TRTwTORONTO: University of Toronto.TSFwTHARANDT: Technische Universit\u00e4t Dresden.TWTwTSUKUBA: Forestry and Forest Products Research Institute.UwUTRECHT: Rijksuniversiteit te Utrecht.UCwRICHMOND: University of California.UCNWwBANGOR: University College of North Wales.USwWASHINGTON: Smithsonian Institution.VENwCARACAS: Instituto Bot\u00e1nico.VFwVIENNA: Forstlichen Bundesversuchsanstalt.VLwVANCOUVER: Forintek Canada Corporation.WAGwWAGENINGEN: Department of Plant Taxonomy, Agricultural University.WDwWINTERTHUR: The Henry Francis du Pont WinterthuT Museum.WFwADELAIDE: Woods and Forest Department.WIBwWAGENINGEN: Department of Forestry Techniques, Agricultural University.WLwWAGENINGEN: Botanisch Laboratorium.WZwROTORUA: Forest Research Institute.XALwXALAPA: Instituto Nacional de Investigaciones Sobre Recursos Bi\u00f3ticos.YANwYANGLING: Northwestern College of Forestry.ZAwZAGREB: University of Zagreb.ZTwZ\u00dcRICH: Eidgen\u00f6ssische Technische Hochschule.", "edit_actions": [{"type": "R", "before": "Estacao de Experimenta\u00e7\u00e2o", "after": "Esta\u00e7\u00e3o de Experimenta\u00e7\u00e3o", "start_char_pos": 83, "end_char_pos": 108}, {"type": "R", "before": "BCTwS\u00c4O", "after": "BCTwS\u00c3O", "start_char_pos": 317, "end_char_pos": 324}, {"type": "R", "before": "Sao", "after": "S\u00e3o", "start_char_pos": 381, "end_char_pos": 384}, {"type": "R", "before": "CEPECwILHEUS", "after": "CEPECwILH\u00c9US", "start_char_pos": 1052, "end_char_pos": 1064}, {"type": "R", "before": "instituto", "after": "Instituto", "start_char_pos": 1691, "end_char_pos": 1700}, {"type": "R", "before": "S\u00e4o", "after": "S\u00e3o", "start_char_pos": 1918, "end_char_pos": 1921}, {"type": "R", "before": "Industriai", "after": "Industrial", "start_char_pos": 2220, "end_char_pos": 2230}, {"type": "R", "before": "FPBwBRASILIA: instituto", "after": "FPBwBRAS\u00cdLIA: Instituto", "start_char_pos": 2254, "end_char_pos": 2277}, {"type": "R", "before": "HBRwITAJAI: Herbario", "after": "HBRwITAJA\u00cd: Herb\u00e1rio", "start_char_pos": 2538, "end_char_pos": 2558}, {"type": "R", "before": "Amazonia", "after": "Amaz\u00f4nia", "start_char_pos": 2832, "end_char_pos": 2840}, {"type": "R", "before": "Laborat\u00f2rio", "after": "Laborat\u00f3rio", "start_char_pos": 3456, "end_char_pos": 3467}, {"type": "R", "before": "Emflio", "after": "Emilio", "start_char_pos": 3908, "end_char_pos": 3914}, {"type": "R", "before": "Museum", "after": "Mus\u00e9um", "start_char_pos": 4321, "end_char_pos": 4327}, {"type": "R", "before": "Bot\u00e0nico", "after": "Bot\u00e2nico", "start_char_pos": 4609, "end_char_pos": 4617}, {"type": "R", "before": "SPwS\u00c4O", "after": "SPwS\u00c3O", "start_char_pos": 4999, "end_char_pos": 5005}, {"type": "R", "before": "Bot\u00e0nica", "after": "Bot\u00e2nica", "start_char_pos": 5026, "end_char_pos": 5034}, {"type": "R", "before": "SPSFwS\u00c4O", "after": "SPSFwS\u00e3O", "start_char_pos": 5087, "end_char_pos": 5095}, {"type": "R", "before": "S\u00e4o", "after": "S\u00e3o", "start_char_pos": 5126, "end_char_pos": 5129}, {"type": "R", "before": "Funda\u00e7\u00e2o", "after": "Funda\u00e7\u00e3o", "start_char_pos": 5580, "end_char_pos": 5588}, {"type": "R", "before": "Pemambuco", "after": "de Pernambuco", "start_char_pos": 5621, "end_char_pos": 5630}, {"type": "R", "before": "Agriculmral", "after": "Agricultural", "start_char_pos": 6134, "end_char_pos": 6145}], "sents_char_pos": [0, 69, 82, 119, 168, 204, 277, 292, 316, 391, 460, 484, 499, 536, 580, 644, 693, 728, 779, 826, 886, 965, 1006, 1051, 1096, 1139, 1182, 1249, 1313, 1355, 1404, 1460, 1518, 1598, 1628, 1680, 1735, 1818, 1851, 1886, 1928, 1977, 2010, 2092, 2139, 2179, 2253, 2318, 2387, 2451, 2493, 2537, 2579, 2617, 2659, 2708, 2750, 2784, 2842, 2890, 2949, 3013, 3053, 3100, 3151, 3196, 3224, 3249, 3280, 3328, 3364, 3411, 3443, 3497, 3542, 3602, 3651, 3694, 3731, 3768, 3830, 3883, 3922, 3960, 3992, 4040, 4111, 4149, 4190, 4226, 4265, 4310, 4358, 4414, 4474, 4530, 4583, 4636, 4703, 4742, 4790, 4837, 4877, 4914, 4945, 4998, 5086, 5136, 5181, 5221, 5283, 5321, 5354, 5439, 5478, 5526, 5568, 5632, 5664, 5699, 5744, 5805, 5845, 5883, 5930, 5969, 6001, 6046, 6088, 6157, 6216, 6257, 6332, 6370, 6408, 6482, 6529, 6561]}
+{"doc_id": "5151648", "revision_depth": "1", "before_revision": "Sociofact is a term coined by biologist Julian Huxley, used together with the related terms \"mentifact \" (sometimes called a psychofact) and \" artifact\" to describe how cultural traits take on a life of their own, spanning over generations. Huxley, J. S. 1955. Guest Editorial: Evolution, Cultural and Biological. Yearbook of Anthropology, 2\u201325. For Huxley, the concept of culture contemplates artifacts, mentifacts, and sociofacts. A definition also explains that shared mentifacts, through artifacts, are called sociofacts. Sociofact also describes interpersonal interactions and social structures. This idea has been related to memetics or the memetic concept of culture. Development The idea of the sociofact was developed extensively by David Bidney in his textbook Theoretical Anthropology . He used the term to refer to objects which consist of interactions between members of a social group. Bidney's sociofact includes norms that \"serve to regulate the conduct of the individual within society \". The concept has been used by philosophers and social scientists in their analyses of varying kinds of social groups. For instance, semiotician of music Charles Boil\u00e8s, in a discussion of the semiotics of the tune \"Taps\", claims that although it is a single piece of music, it can be seen as three distinct musical sociofacts: as a \"last call\" signal in taverns frequented by soldiers , as an \"end of day\" signal on military bases , and hencesymbolically as a component of military funerals. The claim has been made that sociofactual analysis can play a decisive role for the performance of, and collaboration within, organizations. References Category:Cultural anthropology Category:Memetics Category:Sociological terminolog", "after_revision": "A cultural trait is a single identifiable material or non-material element within a culture, and is conceivable as an object in itself.Huxley, Julian S. 1955. \" Guest Editorial: Evolution, Cultural and Biological.\" Yearbook of Anthropology, 2\u201325. Similar traits can be grouped together as components, or subsystems of URL the terms sociofact and mentifact (or psychofact) were coined by biologist Julian Huxley as two of three subsystems of culture\u2014the third being artifacts\u2014to describe the way in which cultural traits take on a life of their own, spanning over generations. In other words, cultural traits can be categorized into three interrelated components: Artifacts \u2014 the objects, material items, and technologies created by a culture, or simply, things people make. They provide basic necessities, recreation, entertainment, and most of the things that make life easier for people. Examples include clothing, food, and shelter. Sociofacts \u2014 interpersonal interactions and social structures; i.e., the structures and organizations of a culture that influence social behaviour. This includes families, governments, education systems, religious groups, etc. Mentifact (or psychofact) \u2014 abstract concepts, or \"things in the head;\" i.e., the shared ideas, values, and beliefs of a culture. This can include religion, language, and ideas. Moreover, sociofacts are considered by some to be mentifacts that have been shared through artifacts. This formulation has been related to memetics and the memetic concept of culture. These concepts have been useful to anthropologists in refining the definition of culture. Development These concepts have been useful to anthropologists in refining the definition of culture, which Huxley views as contemplating artifacts, mentifacts, and sociofacts. For instance, Edward Tylor, the first academic anthropologist, included both artifacts and abstract concepts like kinship systems as elements of culture. Anthropologist Robert Aunger, however, explains that such an inclusive definition ends up encouraging poor anthropological practice because \"it becomes difficult to distinguish what exactly is not part of culture.\" Aunger goes on to explain that, after the cognitive revolution in the social sciences in the 1960s, there is \"considerable agreement\" among anthropologists that a mentifactual analysis, one that assumes that culture consists of \"things in the head\" (i.e. mentifacts), is the most appropriate way to define the concept of culture. Sociofact The idea of the sociofact was developed extensively by David Bidney in his 1967 textbook Theoretical Anthropology , in which he used the term to refer to objects that consist of interactions between members of a social group. Bidney's 'sociofact' includes norms that \"serve to regulate the conduct of the individual within society .\" The concept has since been used by other philosophers and social scientists in their analyses of varying kinds of social groups. For instance, in a discussion of the semiotics of the tune 'Taps', semiotician of music Charles Boil\u00e8s claims that although it is a single piece of music, it can be seen as three distinct musical sociofacts: as a \"last call\" signal in taverns frequented by soldiers ; as an \"end of day\" signal on military bases ; and hence, symbolically, as a component of military funerals. The claim has been made that sociofactual analysis can play a decisive role for the performance of, and collaboration within, organizations. ", "edit_actions": [{"type": "R", "before": "Sociofact is a term coined by biologist Julian Huxley, used together with the related terms \"mentifact \" (sometimes called a psychofact) and", "after": "A cultural trait is a single identifiable material or non-material element within a culture, and is conceivable as an object in itself.Huxley, Julian S. 1955.", "start_char_pos": 0, "end_char_pos": 140}, {"type": "R", "before": "artifact\" to describe how", "after": "Guest Editorial: Evolution, Cultural and Biological.\" Yearbook of Anthropology, 2\u201325.", "start_char_pos": 143, "end_char_pos": 168}, {"type": "A", "before": null, "after": "Similar traits can be grouped together as components, or subsystems of URL the terms sociofact and mentifact (or psychofact) were coined by biologist Julian Huxley as two of three subsystems of culture\u2014the third being artifacts\u2014to describe the way in which", "start_char_pos": 169, "end_char_pos": 169}, {"type": "R", "before": "Huxley, J. S. 1955. Guest Editorial: Evolution, Cultural and Biological. Yearbook of Anthropology, 2\u201325. For Huxley, the concept of culture contemplates artifacts, mentifacts, and sociofacts. A definition also explains that shared mentifacts, through artifacts, are called sociofacts. Sociofact also describes interpersonal interactions and social structures. This idea", "after": "In other words, cultural traits can be categorized into three interrelated components:", "start_char_pos": 242, "end_char_pos": 611}, {"type": "A", "before": null, "after": "Artifacts \u2014 the objects, material items, and technologies created by a culture, or simply, things people make. They provide basic necessities, recreation, entertainment, and most of the things that make life easier for people. Examples include clothing, food, and shelter. Sociofacts \u2014 interpersonal interactions and social structures; i.e., the structures and organizations of a culture that influence social behaviour. This includes families, governments, education systems, religious groups, etc. Mentifact (or psychofact) \u2014 abstract concepts, or \"things in the head;\" i.e., the shared ideas, values, and beliefs of a culture. This can include religion, language, and ideas.", "start_char_pos": 612, "end_char_pos": 612}, {"type": "A", "before": null, "after": "Moreover, sociofacts are considered by some to be mentifacts that have been shared through artifacts. This formulation", "start_char_pos": 613, "end_char_pos": 613}, {"type": "R", "before": "or", "after": "and", "start_char_pos": 643, "end_char_pos": 645}, {"type": "A", "before": null, "after": "These concepts have been useful to anthropologists in refining the definition of culture.", "start_char_pos": 678, "end_char_pos": 678}, {"type": "A", "before": null, "after": "These concepts have been useful to anthropologists in refining the definition of culture, which Huxley views as contemplating artifacts, mentifacts, and sociofacts. For instance, Edward Tylor, the first academic anthropologist, included both artifacts and abstract concepts like kinship systems as elements of culture. Anthropologist Robert Aunger, however, explains that such an inclusive definition ends up encouraging poor anthropological practice because \"it becomes difficult to distinguish what exactly is not part of culture.\" Aunger goes on to explain that, after the cognitive revolution in the social sciences in the 1960s, there is \"considerable agreement\" among anthropologists that a mentifactual analysis, one that assumes that culture consists of \"things in the head\" (i.e. mentifacts), is the most appropriate way to define the concept of culture.", "start_char_pos": 691, "end_char_pos": 691}, {"type": "A", "before": null, "after": "Sociofact", "start_char_pos": 692, "end_char_pos": 692}, {"type": "A", "before": null, "after": "1967", "start_char_pos": 768, "end_char_pos": 768}, {"type": "R", "before": ". He", "after": ", in which he", "start_char_pos": 803, "end_char_pos": 807}, {"type": "R", "before": "which", "after": "that", "start_char_pos": 842, "end_char_pos": 847}, {"type": "R", "before": "sociofact", "after": "'sociofact'", "start_char_pos": 916, "end_char_pos": 925}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 1010, "end_char_pos": 1012}, {"type": "A", "before": null, "after": "since", "start_char_pos": 1029, "end_char_pos": 1029}, {"type": "A", "before": null, "after": "other", "start_char_pos": 1043, "end_char_pos": 1043}, {"type": "D", "before": "semiotician of music Charles Boil\u00e8s,", "after": null, "start_char_pos": 1146, "end_char_pos": 1182}, {"type": "R", "before": "\"Taps\",", "after": "'Taps', semiotician of music Charles Boil\u00e8s", "start_char_pos": 1228, "end_char_pos": 1235}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 1399, "end_char_pos": 1400}, {"type": "R", "before": ", and hencesymbolically", "after": "; and hence, symbolically,", "start_char_pos": 1445, "end_char_pos": 1468}, {"type": "D", "before": "References", "after": null, "start_char_pos": 1647, "end_char_pos": 1657}, {"type": "D", "before": "Category:Cultural anthropology Category:Memetics Category:Sociological terminolog", "after": null, "start_char_pos": 1658, "end_char_pos": 1739}], "sents_char_pos": [0, 241, 261, 314, 346, 433, 526, 601, 677, 804, 906, 1012, 1131, 1505, 1646]}
+{"doc_id": "51618087", "revision_depth": "1", "before_revision": "Early life and education Sagintayev was born in the village of Usharal. His father, Abdyr Sagintayev ( 1921-1986 ), was a World War II veteran who worked as the director of the Talas Sheep Breeding Plant. In 1985, Sagintayev graduated from the Kazakh State University with a degree in economics. That same year, he became a lecturer at the Department of Political Economy of the Alma-Ata Institute of National Economy. From 1988 to 1992, he worked at the Kazakh State University, where he went from an assistant to an assistant professor of sociology. From 1992 to 1998 , Sagintayev was engaged in entrepreneurial activity. Political career In 1998, he was appointed as deputy akim of the Jambyl Region. From 1999 to 2002, Sagintayev served as Deputy Chairman of the Agency of the Republic of Kazakhstan for Small Business Support, Deputy Chairman of the Agency of the Republic of Kazakhstan for Regulation of Natural Monopolies, Protection of Competition and Support for Small Business. From 2002 to 2004 he served as the First Deputy Chairman of the Agency for Regulation of Natural Monopolies and Competition Protection. On 29 September 2004, he became the chairman of the Agency for Regulation of Natural Monopolies of Kazakhstan. Prime Minister (2016\u20132019) On 8 September 2016, Sagintayev was nominated by Nursultan Nazarbayev for the post of PM . The following day, on 9 September, Sagintayev was confirmed by the Parliament. On 28 September . he was appointed as the chairman of the Board of Directors of JSC Samruk-Kazyna. He continued to serve as the PM until 21 February 2019 when the government was dissolved due to lack of economic development. Akim of Almaty (2019\u2013present) On 28 June 2019, Sagintayev was appointed as the akim of Almaty. His goal was to make the city a \"safe, comfortable, modern metropolis where every Almaty citizen has the opportunity for a decent life.\" He ordered the police to conduct an analysis of the criminal situation in the city, to intensify the fight against hooliganism and robbery, and to increase the number of surveillance cameras on the streets. In response with dealing in crimes, 32 police posts were installed, with 4 in each city district. The location of the posts were determined based on the incidents of offenses and crimes that occurred in the area. On 27 November , at the Almaty Investment Forum, Sagintayev stated the city should be at the top 100 best cities in the world in terms of quality of life and business opportunities, in which he used San Francisco as an example. Following the COVID-19 outbreak in Kazakhstan , 27 roadblocks were installed to prevent citizens from traveling in or out of the city. On 4 April 2020, Sagintayev approved the construction of an infectious disease hospital, which was opened on 24 April. On 16 April, Sagintayev announced that mass events, including sports, would be cancelled until 30 June .", "after_revision": "Early life and education Sagintayev was born in the village of Usharal. His father, Abdyr Sagintayev ( 1921\u20131986 ), was a World War II veteran who worked as the director of the Talas Sheep Breeding Plant. In 1985, Sagintayev graduated from the Kazakh State University with a degree in economics. That same year, he became a lecturer at the Department of Political Economy of the Alma-Ata Institute of National Economy. From 1988 to 1992, he worked at the Kazakh State University, where he went from an assistant to an assistant professor of sociology. After Kazakhstan's independence from the Soviet Union , Sagintayev was engaged in entrepreneurial activity. Political career In 1998, he was appointed as deputy akim of the Jambyl Region. From 1999 to 2002, Sagintayev served as deputy chairman of the Agency of the Republic of Kazakhstan for Small Business Support, Regulation of Natural Monopolies, Protection of Competition and Support for Small Business. From 2002 to 2004 , he served as the First Deputy Chairman of the Agency for Regulation of Natural Monopolies and Competition Protection. On 29 September 2004, Sagintayev was reappointed as the chairman of the Agency for Regulation of Natural Monopolies of Kazakhstan. Prime Minister of Kazakhstan (2016\u20132019) On 8 September 2016, Sagintayev was nominated by President Nursultan Nazarbayev for the post of the Prime Minister . The following day, on 9 September, Sagintayev was confirmed by the Parliament. On 28 September , while serving as PM, he was appointed as the chairman of the Board of Directors of JSC Samruk-Kazyna. In November 2016, Sagintayev drew attention to the number of reductions in pediatricians in the country. He supported Deputy PM Imangali Tasmagambetov's initiative to restore the faculties of pediatrics in Kazakh medical universities. Sagintayev also instructed to tighten control over the activities of veterinary services and ensure the entry of cattle burial grounds and anthrax burials in the information system of the State Land Cadastre. In response to inflation, he sought to prevent the continuing rise of food prices for 2017. Despite the promises, the inflation in February of that year reached 7.1\\%. That same year, over 11 million square meters of housing were built. Sagintayev slowly drew criticism from Nazarbayev in relation to his policies towards the self-employed population. In October 2018, Sagintayev's cabinet was eventually threatened by Nazarbayev to the point of being replaced by Singaporean and Japanese politicians. On 30 January 2019, at an enlarged meeting of the government, Nazarbayev publicly slammed Sagintayev and his ministers as \"cowards\". On 4 February 2019, a fire erupted in an apartment in Astana, killing 5 children whom belonged to a single family. This sparked fury and protests from the mothers who demanded proper housing, more kindergartens and financial support for families owning more than one child. Sagintayev expressed his condolences to the tragedy and told his cabinet to be more stricter in fire safety inspection at homes to prevent incidents. Sagintayev continued to serve as the PM until 21 February 2019 when the government was dismissed due to lack of economic development. He was replaced by Askar Mamin who was appointed as Acting PM until being confirmed by the Parliament on 25 February. \u00c4kim of Almaty (2019\u2013present) On 28 June 2019, Sagintayev was appointed as the akim of Almaty. His goal was to make the city a \"safe, comfortable, modern metropolis where every Almaty citizen has the opportunity for a decent life.\" He ordered the police to conduct an analysis of the criminal situation in the city, to intensify the fight against hooliganism and robbery, and to increase the number of surveillance cameras on the streets. In response with dealing in crimes, 32 police posts were installed, with 4 in each city district. The location of the posts were determined based on the incidents of offenses and crimes that occurred in the area. On 27 November 2019 , at the Almaty Investment Forum, Sagintayev stated the city should be at the top 100 best cities in the world in terms of quality of life and business opportunities, which he used San Francisco as an example. Following the COVID-19 outbreak in Kazakhstan in March 2020 , 27 roadblocks were installed to prevent citizens from traveling in or out of the city. On 4 April 2020, Sagintayev approved the construction of an infectious disease hospital, which was opened on 24 April. On 16 April, Sagintayev announced that mass gathering events, including sports, would be cancelled until 30 June . In May 2020, after the announcement of easing lockdowns nationwide, religious spaces and retailers began functioning in the city with quarantine measures. Roadblocks were lifted on 1 June 2020. Sagintayev, in turn, urged all Almaty residents to wear face coverings. However, after an increase in COVID-19 cases, strict measures were taken with cut in working hours and government employees being instructed to switch to remote work. By 2 September 2020, Sagintayev announced that the situation was stabilized. Telling Almaty citizens to adhere to the mask orders to prevent the rise of cases. In October 2020, he warned of a possible 2nd wave of the coronavirus infections during a live interview on Almaty TV channel, stating that the city was prepared to deal with new cases if necessary. At the annual briefing of the Central Communications Service held on 7 December 2020, Sagintayev announced that the economic situation in the city is stabilized. He stated that Almaty retains the potential for rapid recovery in the post-epidemic period and that it remains an international center of investment activity. In response to the fate of Almaty Light Rail, Sagintayev said that the project is underway and that it needs financial model for it to work .", "edit_actions": [{"type": "R", "before": "1921-1986", "after": "1921\u20131986", "start_char_pos": 103, "end_char_pos": 112}, {"type": "R", "before": "From 1992 to 1998", "after": "After Kazakhstan's independence from the Soviet Union", "start_char_pos": 552, "end_char_pos": 569}, {"type": "R", "before": "Deputy Chairman", "after": "deputy chairman", "start_char_pos": 744, "end_char_pos": 759}, {"type": "D", "before": "Deputy Chairman of the Agency of the Republic of Kazakhstan for", "after": null, "start_char_pos": 832, "end_char_pos": 895}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1006, "end_char_pos": 1006}, {"type": "R", "before": "he became", "after": "Sagintayev was reappointed as", "start_char_pos": 1147, "end_char_pos": 1156}, {"type": "A", "before": null, "after": "of Kazakhstan", "start_char_pos": 1251, "end_char_pos": 1251}, {"type": "A", "before": null, "after": "President", "start_char_pos": 1313, "end_char_pos": 1313}, {"type": "R", "before": "PM", "after": "the Prime Minister", "start_char_pos": 1351, "end_char_pos": 1353}, {"type": "R", "before": ".", "after": ", while serving as PM,", "start_char_pos": 1451, "end_char_pos": 1452}, {"type": "R", "before": "He", "after": "In November 2016, Sagintayev drew attention to the number of reductions in pediatricians in the country. He supported Deputy PM Imangali Tasmagambetov's initiative to restore the faculties of pediatrics in Kazakh medical universities. Sagintayev also instructed to tighten control over the activities of veterinary services and ensure the entry of cattle burial grounds and anthrax burials in the information system of the State Land Cadastre.", "start_char_pos": 1534, "end_char_pos": 1536}, {"type": "A", "before": null, "after": "In response to inflation, he sought to prevent the continuing rise of food prices for 2017. Despite the promises, the inflation in February of that year reached 7.1\\%. That same year, over 11 million square meters of housing were built.", "start_char_pos": 1537, "end_char_pos": 1537}, {"type": "A", "before": null, "after": "Sagintayev slowly drew criticism from Nazarbayev in relation to his policies towards the self-employed population. In October 2018, Sagintayev's cabinet was eventually threatened by Nazarbayev to the point of being replaced by Singaporean and Japanese politicians. On 30 January 2019, at an enlarged meeting of the government, Nazarbayev publicly slammed Sagintayev and his ministers as \"cowards\". On 4 February 2019, a fire erupted in an apartment in Astana, killing 5 children whom belonged to a single family. This sparked fury and protests from the mothers who demanded proper housing, more kindergartens and financial support for families owning more than one child. Sagintayev expressed his condolences to the tragedy and told his cabinet to be more stricter in fire safety inspection at homes to prevent incidents.", "start_char_pos": 1538, "end_char_pos": 1538}, {"type": "A", "before": null, "after": "Sagintayev", "start_char_pos": 1539, "end_char_pos": 1539}, {"type": "R", "before": "dissolved", "after": "dismissed", "start_char_pos": 1616, "end_char_pos": 1625}, {"type": "A", "before": null, "after": "He was replaced by Askar Mamin who was appointed as Acting PM until being confirmed by the Parliament on 25 February.", "start_char_pos": 1663, "end_char_pos": 1663}, {"type": "R", "before": "Akim", "after": "\u00c4kim", "start_char_pos": 1664, "end_char_pos": 1668}, {"type": "A", "before": null, "after": "2019", "start_char_pos": 2331, "end_char_pos": 2331}, {"type": "D", "before": "in", "after": null, "start_char_pos": 2499, "end_char_pos": 2501}, {"type": "A", "before": null, "after": "in March 2020", "start_char_pos": 2591, "end_char_pos": 2591}, {"type": "A", "before": null, "after": "gathering", "start_char_pos": 2844, "end_char_pos": 2844}, {"type": "A", "before": null, "after": ".", "start_char_pos": 2904, "end_char_pos": 2904}, {"type": "A", "before": null, "after": "In May 2020, after the announcement of easing lockdowns nationwide, religious spaces and retailers began functioning in the city with quarantine measures. Roadblocks were lifted on 1 June 2020. Sagintayev, in turn, urged all Almaty residents to wear face coverings. However, after an increase in COVID-19 cases, strict measures were taken with cut in working hours and government employees being instructed to switch to remote work. By 2 September 2020, Sagintayev announced that the situation was stabilized. Telling Almaty citizens to adhere to the mask orders to prevent the rise of cases. In October 2020, he warned of a possible 2nd wave of the coronavirus infections during a live interview on Almaty TV channel, stating that the city was prepared to deal with new cases if necessary.", "start_char_pos": 2905, "end_char_pos": 2905}, {"type": "A", "before": null, "after": "At the annual briefing of the Central Communications Service held on 7 December 2020, Sagintayev announced that the economic situation in the city is stabilized. He stated that Almaty retains the potential for rapid recovery in the post-epidemic period and that it remains an international center of investment activity. In response to the fate of Almaty Light Rail, Sagintayev said that the project is underway and that it needs financial model for it to work", "start_char_pos": 2906, "end_char_pos": 2906}], "sents_char_pos": [0, 71, 204, 295, 418, 551, 623, 703, 987, 1124, 1235, 1434, 1533, 1662, 1758, 1895, 2102, 2200, 2315, 2544, 2680, 2799]}
+{"doc_id": "5215871", "revision_depth": "1", "before_revision": "\"Block diagram of the signal-flow for a typical simple delay-line,\" tied to an electric guitar, for example. Dotted line indicates variable component. Delay is an audio signal processing technique that records an input signal to a storage medium and then plays it back after a period of time.Lehman, Scott. \"Effects Explained: Delay\". 1996. Retrieved on June 30, 2006. The delayed signal may be played back multiple times, or fed back into the recording, to create the sound of a repeating, decaying echo. Delay effects range from a subtle echo effect to a pronounced blending of previous sounds with new sounds. Delay effects can be created using tape loops, an approach developed in the 1940s and 1950s ; analog effects units, which were introduced in the 1970s; digital effects pedals, introduced in 1984; and audio software plugins, developed in the 2000s. Early systems The first delay effects were achieved using tape loops improvised on reel-to-reel audio tape recording systems. By shortening or lengthening the loop of tape and adjusting the read-and-write heads, the nature of the delayed echo could be controlled. This technique was most common among early composers of Musique concr\u00e8te (Pierre Schaeffer), and composers such as Karlheinz Stockhausen, who had sometimes devised elaborate systems involving long tapes and multiple recorders and playback systems, collectively processing the input of a live performer or ensemble. Audio engineers working in popular music quickly adapted similar techniques, to augment their use of reverberation and other studio technologies designed to simulate natural echo. In the late 1940s and early 1950s, several sound engineers began making devices for use in recording studios and later more compact machines for live purposes. Guitarist and instrument designer Les Paul was an early pioneer in delay devices. A landmark device was the EchoSonic made by American Ray Butts. It is a portable guitar amplifier with a built-in tape echo , which became used widely in country music (Chet Atkins) and especially in rock and roll (Scotty Moore). Tape echoes became commercially available in the 1950s. An echo machine is the early name for a sound processing device used with electronic instruments to repeat the sound and produce a simulated echo. One example is the Echoplex which used a tape loop. The length of delay was adjusted by changing the distance between the tape record and playback heads. Another example is the Roland Space Echo with a record and multiple playback tape heads and a variable tape speed. The time between echo repeats was adjusted by varying the tape speed. The length or intensity of the echo effect was adjusted by changing the amount of echo signal was fed back into the pre-echo signal. Different effects could be created by combining the different playback heads. Analog delay Echoplex EP-2 Digital delay systems function by sampling the input signal through an analog-to-digital converter, after which the signal is passed through a digital signal processor that records it into a storage buffer, and then plays back the stored audio based on parameters set by the user. The delayed (\"wet\") output may be mixed with the unmodified (\"dry\") signal after, or before, it is sent to a digital-to-analog converter for output. Applications and variants Doubling echo Doubling echo is produced by adding short delay to a recorded sound. Delays of thirty to fifty milliseconds are the most common; longer delay times become slapback echo. Mixing the original and delayed sounds creates an effect similar to doubletracking, or unison performance. Slapback echo Slapback echo uses a longer delay time ( 75 to 250 milliseconds), with little or no feedback. The effect is characteristic of vocals on 1950s rock-n-roll records. In July 1954, Sam Phillips produced the first of five 78s and 45s that Elvis Presley would release on Sun over the next year and a half, all of which featured a novel production technique that Phillips termed \"slapback echo\" .Rob Bowman. \"Phillips, Sam.\" Grove Music Online. Oxford Music Online. Oxford University Press. Web. 20 Jul. 2016. The effect was produced by re-feeding the output signal from the playback head tape recorder to its record head. The physical space between heads, the speed of the tape, and the chosen volume being the main controlling factors. Analog and later digital delay machines also easily produced the effect. It is also sometimes used on instruments, particularly drums and percussion.", "after_revision": " Delay is an audio signal processing technique that records an input signal to a storage medium and then plays it back after a period of time.Lehman, Scott. \"Effects Explained: Delay\". 1996. Retrieved on June 30, 2006. When the wet (processed) audio is blended with the dry (unprocessed) audio, it creates an echo-like effect, whereby the original audio is heard followed by the delayed audio. The delayed signal may be played back multiple times, or fed back into the recording, to create the sound of a repeating, decaying echo. Delay effects range from a subtle echo effect to a pronounced blending of previous sounds with new sounds. Delay effects can be created using tape loops, an approach developed in the 1940s and 1950s and was used by artists including Elvis Presley and Buddy Holly. Analog effects units, were introduced in the 1970s; digital effects pedals, in 1984; and audio software plugins, were developed in the 2000s. History The first delay effects were achieved using tape loops improvised on reel-to-reel audio tape recording systems. By shortening or lengthening the loop of tape and adjusting the read-and-write heads, the nature of the delayed echo could be controlled. This technique was most common among early composers of Musique concr\u00e8te (Pierre Schaeffer), and composers such as Karlheinz Stockhausen, who had sometimes devised elaborate systems involving long tapes and multiple recorders and playback systems, collectively processing the input of a live performer or ensemble. Audio engineers working in popular music quickly adapted similar techniques, to augment their use of reverberation and other studio technologies designed to simulate natural echo. In the late 1940s and early 1950s, several sound engineers began making devices for use in recording studios and later more compact machines for live purposes. American producer Sam Phillips discovered the effect while experimenting with two Ampex 350 tape recorders in 1954. The effect was used by artists including Elvis Presley (such as on his track \"Blue Moon of Kentucky\") and Buddy Holly, and became one of Phillips' signatures. Guitarist and instrument designer Les Paul was an early pioneer in delay devices. According to Sound on Sound, \"The character and depth of sound that was produced from tape echo on these old records is extremely lush, warm and wide.\" The tape mechanism of a Roland RE-201 delay unit Tape echoes became commercially available in the 1950s. An echo machine is the early name for a sound processing device used with electronic instruments to repeat the sound and produce a simulated echo. One example is the Echoplex which used a tape loop. The length of delay was adjusted by changing the distance between the tape record and playback heads. Another example is the Roland Space Echo with a record and multiple playback tape heads and a variable tape speed. The time between echo repeats was adjusted by varying the tape speed. The length or intensity of the echo effect was adjusted by changing the amount of echo signal was fed back into the pre-echo signal. Different effects could be created by combining the different playback heads. A landmark device was the EchoSonic made by American Ray Butts. It is a portable guitar amplifier with a built-in tape echo, which became used widely in country music (Chet Atkins) and especially in rock and roll (Scotty Moore). Dedicated machines for creating tape loops were introduced, such as the Ace Tone EC-1 Echo Chamber. Tape echo machines contain loops of tape that pass over a record head and then a playback head. With the Roland RE-201, introduced in 1973, Japanese engineer Ikutaro Kakehashi refined the tape delay to make it more reliable and robust, with reduced tape wear and noise, wow, and flutter, additional controls, and additional tape heads for more delays. By adjusting the controls and tape speed, musicians could create pitch-shifting and oscillated effects. The RE-201 was a success, used by acts including Brian Setzer, Bob Marley, Portishead and Radiohead. In the 1970s, Jamaican dub reggae producers used delay effects extensively; Lee Scratch Perry created \"lo-fi sci-fi\" effects by using delay and reverb on a mixing console test tone. Dub techno producers such as Basic Channel introduced delay to electronic music. Digital delay effects were developed with the arrival digital recording. Analog delay Echoplex EP-2 Digital delay Sound example of a plugin simulation of an analog delay (EHX Memory Man) with modulation and pitch shift Digital delay systems function by sampling the input signal through an analog-to-digital converter, after which the signal is passed through a digital signal processor that records it into a storage buffer, and then plays back the stored audio based on parameters set by the user. The delayed (\"wet\") output may be mixed with the unmodified (\"dry\") signal after, or before, it is sent to a digital-to-analog converter for output. Function and variants \"Block diagram of the signal-flow for a typical simple delay-line,\" tied to an electric guitar, for example. Dotted line indicates variable component. Delay effects add a time delay to an audio signal. When the wet (processed) audio is blended with the dry (unprocessed) audio, it creates an echo-like effect, whereby the original audio is heard followed by the delayed audio. Delay effects typically allow users to adjust the amount of feedback. By feeding some of the delayed audio back into the buffer, multiple repeats of the audio play back (feedback). At low feedback settings, each repeat fades in volume. High levels of feedback can cause the level of the output to rapidly increase (self-oscillation), becoming louder and louder; this may be managed with limiters. The delayed signal may be treated separately from the input audio - for example, with an equalizer. Most delay effects also allow users to set the delay time, or the amount of time between each audio playback. The may be synchronized to a BPM, allowing users to set time values as beat divisions. Delay is used to create other effects, including reverb, chorus and flanging. Digital delay effects record a sample of audio and play it back. Software versions record the audio to a buffer. Digital delay may also modify the recorded sound, by reversing it, altering its pitch, or other manipulations. Some digital delays emulate the \"gritty, grainy\" sound of earlier delay effects. Haas effect Short delays (50ms or less) create a sense of \"broadening\" the sound without creating a perceptible echo, and can be used to add stereo width or simulate double-tracking (layering two performances). The effect is known as the Haas effect after the German mathematician Helmut Haas. Ping-pong delay In a ping-pong delay, the delayed signal alternates between two stereo channels. Multi-tap In a multi-tap delay, multiple \"taps\" (outputs) are taken from a delay buffer, each with independent times and levels, and summed with the original signal. Multi-tap delays be used to create rhythmic patterns or dense, reverb-like effects. Doubling echo Doubling echo is produced by adding short delay to a recorded sound. Delays of thirty to fifty milliseconds are the most common; longer delay times become slapback echo. Mixing the original and delayed sounds creates an effect similar to doubletracking, or unison performance. Slapback echo Slapback echo uses a longer delay time ( 60 to 250 milliseconds), with little or no feedback. A slapback delay creates a thickening effect. The effect is characteristic of vocals on 1950s rock-n-roll records. In July 1954, Sam Phillips produced the first of five 78s and 45s that Elvis Presley would release on Sun over the next year and a half, all of which featured a novel production technique that Phillips termed slapback echo .Rob Bowman. \"Phillips, Sam.\" Grove Music Online. Oxford Music Online. Oxford University Press. Web. 20 Jul. 2016. The effect was produced by re-feeding the output signal from the playback head tape recorder to its record head. The physical space between heads, the speed of the tape, and the chosen volume being the main controlling factors. Analog and later digital delay machines also easily produced the effect. It is also sometimes used on instruments, particularly drums and percussion.", "edit_actions": [{"type": "D", "before": "\"Block diagram of the signal-flow for a typical simple delay-line,\" tied to an electric guitar, for example. Dotted line indicates variable component.", "after": null, "start_char_pos": 0, "end_char_pos": 150}, {"type": "A", "before": null, "after": "When the wet (processed) audio is blended with the dry (unprocessed) audio, it creates an echo-like effect, whereby the original audio is heard followed by the delayed audio.", "start_char_pos": 369, "end_char_pos": 369}, {"type": "R", "before": "; analog", "after": "and was used by artists including Elvis Presley and Buddy Holly.", "start_char_pos": 706, "end_char_pos": 714}, {"type": "A", "before": null, "after": "Analog", "start_char_pos": 715, "end_char_pos": 715}, {"type": "D", "before": "which", "after": null, "start_char_pos": 731, "end_char_pos": 736}, {"type": "D", "before": "introduced", "after": null, "start_char_pos": 791, "end_char_pos": 801}, {"type": "A", "before": null, "after": "were", "start_char_pos": 839, "end_char_pos": 839}, {"type": "R", "before": "Early systems", "after": "History", "start_char_pos": 864, "end_char_pos": 877}, {"type": "A", "before": null, "after": "American producer Sam Phillips discovered the effect while experimenting with two Ampex 350 tape recorders in 1954. The effect was used by artists including Elvis Presley (such as on his track \"Blue Moon of Kentucky\") and Buddy Holly, and became one of Phillips' signatures.", "start_char_pos": 1783, "end_char_pos": 1783}, {"type": "R", "before": "A landmark device was the EchoSonic made by American Ray Butts. It is a portable guitar amplifier with a built-in tape echo , which became used widely in country music (Chet Atkins) and especially in rock and roll (Scotty Moore).", "after": "According to Sound on Sound, \"The character and depth of sound that was produced from tape echo on these old records is extremely lush, warm and wide.\"", "start_char_pos": 1866, "end_char_pos": 2095}, {"type": "A", "before": null, "after": "The tape mechanism of a Roland RE-201 delay unit", "start_char_pos": 2096, "end_char_pos": 2096}, {"type": "A", "before": null, "after": "A landmark device was the EchoSonic made by American Ray Butts. It is a portable guitar amplifier with a built-in tape echo, which became used widely in country music (Chet Atkins) and especially in rock and roll (Scotty Moore).", "start_char_pos": 2850, "end_char_pos": 2850}, {"type": "A", "before": null, "after": "Dedicated machines for creating tape loops were introduced, such as the Ace Tone EC-1 Echo Chamber. Tape echo machines contain loops of tape that pass over a record head and then a playback head. With the Roland RE-201, introduced in 1973, Japanese engineer Ikutaro Kakehashi refined the tape delay to make it more reliable and robust, with reduced tape wear and noise, wow, and flutter, additional controls, and additional tape heads for more delays. By adjusting the controls and tape speed, musicians could create pitch-shifting and oscillated effects. The RE-201 was a success, used by acts including Brian Setzer, Bob Marley, Portishead and Radiohead.", "start_char_pos": 2851, "end_char_pos": 2851}, {"type": "A", "before": null, "after": "In the 1970s, Jamaican dub reggae producers used delay effects extensively; Lee Scratch Perry created \"lo-fi sci-fi\" effects by using delay and reverb on a mixing console test tone. Dub techno producers such as Basic Channel introduced delay to electronic music. Digital delay effects were developed with the arrival digital recording.", "start_char_pos": 2852, "end_char_pos": 2852}, {"type": "A", "before": null, "after": "Sound example of a plugin simulation of an analog delay (EHX Memory Man) with modulation and pitch shift", "start_char_pos": 2894, "end_char_pos": 2894}, {"type": "A", "before": null, "after": "Digital delay", "start_char_pos": 2895, "end_char_pos": 2895}, {"type": "R", "before": "Applications and variants", "after": "Function and variants \"Block diagram of the signal-flow for a typical simple delay-line,\" tied to an electric guitar, for example. Dotted line indicates variable component. Delay effects add a time delay to an audio signal. When the wet (processed) audio is blended with the dry (unprocessed) audio, it creates an echo-like effect, whereby the original audio is heard followed by the delayed audio.", "start_char_pos": 3312, "end_char_pos": 3337}, {"type": "A", "before": null, "after": "Delay effects typically allow users to adjust the amount of feedback. By feeding some of the delayed audio back into the buffer, multiple repeats of the audio play back (feedback). At low feedback settings, each repeat fades in volume. High levels of feedback can cause the level of the output to rapidly increase (self-oscillation), becoming louder and louder; this may be managed with limiters. The delayed signal may be treated separately from the input audio - for example, with an equalizer.", "start_char_pos": 3338, "end_char_pos": 3338}, {"type": "A", "before": null, "after": "Most delay effects also allow users to set the delay time, or the amount of time between each audio playback. The may be synchronized to a BPM, allowing users to set time values as beat divisions. Delay is used to create other effects, including reverb, chorus and flanging.", "start_char_pos": 3339, "end_char_pos": 3339}, {"type": "A", "before": null, "after": "Digital delay effects record a sample of audio and play it back. Software versions record the audio to a buffer. Digital delay may also modify the recorded sound, by reversing it, altering its pitch, or other manipulations. Some digital delays emulate the \"gritty, grainy\" sound of earlier delay effects.", "start_char_pos": 3340, "end_char_pos": 3340}, {"type": "A", "before": null, "after": "Haas effect Short delays (50ms or less) create a sense of \"broadening\" the sound without creating a perceptible echo, and can be used to add stereo width or simulate double-tracking (layering two performances). The effect is known as the Haas effect after the German mathematician Helmut Haas.", "start_char_pos": 3341, "end_char_pos": 3341}, {"type": "A", "before": null, "after": "Ping-pong delay In a ping-pong delay, the delayed signal alternates between two stereo channels.", "start_char_pos": 3342, "end_char_pos": 3342}, {"type": "A", "before": null, "after": "Multi-tap In a multi-tap delay, multiple \"taps\" (outputs) are taken from a delay buffer, each with independent times and levels, and summed with the original signal. Multi-tap delays be used to create rhythmic patterns or dense, reverb-like effects.", "start_char_pos": 3343, "end_char_pos": 3343}, {"type": "R", "before": "75", "after": "60", "start_char_pos": 3690, "end_char_pos": 3692}, {"type": "A", "before": null, "after": "A slapback delay creates a thickening effect.", "start_char_pos": 3743, "end_char_pos": 3743}, {"type": "R", "before": "\"slapback echo\"", "after": "slapback echo", "start_char_pos": 4022, "end_char_pos": 4037}], "sents_char_pos": [0, 108, 150, 292, 306, 334, 368, 506, 613, 707, 766, 810, 863, 989, 1127, 1442, 1622, 1782, 1865, 1929, 2095, 2152, 2299, 2351, 2453, 2568, 2638, 2771, 2849, 3162, 3311, 3426, 3486, 3527, 3634, 3742, 3812, 4050, 4087, 4108, 4133, 4152, 4265, 4380, 4453]}
+{"doc_id": "525160", "revision_depth": "1", "before_revision": "In other media Television Live action James Marsters primarily played Brainiac in Smallville, with additional portrayals done by John Schneider (Jonathan Kent in season five), John Glover (Lionel Luthor in season seven), Laura Vandervoort (Kara Zor-El in season seven) and Allison Mack (Chloe Sullivan in season eight). Acting as a central antagonist for seasons five and seven and a supporting villain for season eight , Brainiac is mostly referred to by his assumed name of \"Milton Fine\", but Jor-El refers to him as the BRAIN InterActive Construct. This interpretation is similar to the DC animated universe version; a self-aware computer in humanoid form with a Kryptonian origin who had a part in the planet's destruction (having destabilized Krypton's core alongside Zod). In addition to portrayed as a shapeshifting AI (resembling the T-1000 ) capable of mimicking Kryptonian abilities and able to duplicate, it was created by Dax-Ur (who abandoned the project) and completed by Jor-El, but corrupted by Zod. Introduced in season five (though alluded in season four's finale where he was part of the Ship carrying the Disciples of Zod), he first appears under the Milton Fine name, posing as a history professor at (fictional) Central Kansas A&M University and presenting himself as a Kryptonian ally to trick Clark Kent into releasing Zod from the Phantom Zone. Even going far to proclaiming Jor-El was a murderer and the one who infected Mrs. Kent with a virus while Zod was the hero of all Krypton. But after Clark learns the truth in his Fortress, Brainiac is defeated and precedes to manipulates Lex Luthor under the guise of being a government agent into creating a 'vaccine' . It's revealed that will make Luthor's body suitable to act as Zod's new host after temporarily shutting down all of Earth's electronics with a virus. Although apparently destroyed, Brainiac is seen in season seven hiding in Suicide Slums when offered help from the \"phantom Clark. The weakened humanoid manipulated the fake Clark into helping regain his full power by locating Dax-Ur, to which he killed by downloading his creator 's memories. Brainiac would continue to convince Luthor that Clark is a threat by impersonating Kara Zor-El and revealing Clark's secret identity to Luthor, but is defeated in battle by Clark and seemingly killed by overloading his body with electricity. However, Brainiac returns in season eight, possessing Chloe Sullivan to use as a means of unleashing Doomsday through Davis Bloome on Earth, as part of Zod's contingency plan. The Legion of Super-Heroes assist Clark in extracting Brainiacfrom Chloe and taking him to the future , but are too late to stop him from releasing Doomsday. A reprogrammed version of Brainiac returns in season ten from the future , offering Clark advice on his future growth as a superhero. An alternate version of Brainiac/Milton Fine appears in the season seven episode \"Apocalypse\". Living in a universe where Kal-El never arrived on Earth, Brainiac is the White House Chief of Staff under President Lex Luthor and alongside Kara Zor-El (under the name \"Agent Danvers\"). When the appearance of Kal-El from another universe exposed Brainiac to those around him, Lex shot Clark and Kara and activated a Nuclear football to destroy most of the planet to remake. With his directives of destroying humanity and with Lex as the vessel for Zod, Brainiac was about to kill Clark, when Jor-El brought Clark back to his native reality. Brainiac is referenced multiple times in Supergirl. His Coluan descendant Indigo appears as a villain in the first season, who is referred to as \"a member of the Brainiac clan\". Another of his descendants, the heroic Brainiac 5 is later featured as a member of the 31st century's Legion of Super-Heroes. In the episode \"Battles Lost and Won\", Brainiac 5, reveals that in stopping the Blight in the present day timeline, the original Brainiac has been resurrected in the future. Brainiac appears as the main antagonist of the first season of Krypton, portrayed by Blake Ritson. Feared throughout the universe as \"The Collector of Worlds\", Brainiac targets Krypton and seeks to steal the capital city of Kandor before destroying the entire planet. To prevent him from doing so, Seg-El sacrifices himself and banishes Brainiac to the Phantom Zone. In season two, Brainiac transfers his consciousness into Seg's mind while they are trapped together. During the finale, Brainiac manages to separate himself from Seg and leaves in his starship. The character, sporting a look similar to his post-2008 incarnation, was created via a combination of extensive makeup/prosthetics and CGI.Here's your first look at Superman villain Brainiac on the Syfy prequel series 'Krypton'. USA News.", "after_revision": "In other media Television Live action Brainiac was primarily played by James Marsters in WB/CW's hit series Smallville, with additional portrayals done by John Schneider (Jonathan Kent in season five), John Glover (Lionel Luthor in season seven), Laura Vandervoort (Kara Zor-El in season seven) and Allison Mack (Chloe Sullivan in season eight). Acting as a central antagonist for seasons 5 and 7 and a supporting villain for season 8 , Brainiac is mostly referred to by his assumed name of \"Milton Fine\", but Jor-El refers to him as the BRAIN InterActive Construct. This interpretation is similar to the DC animated universe version; a humanoid self-aware nano-supercomputer of Kryptonian origin who had a part in the planet's destruction (having destabilized Krypton's core alongside Zod). In addition to portrayed as a shapeshifting AI (resembling the T-1000 from Terminator 2 ) capable of mimicking Kryptonian abilities and able to duplicate, it was created by Dax-Ur (who abandoned the project) and completed by Jor-El, but corrupted by Zod. Introduced in season 5 (though alluded in season four's finale where he was part of the Black Ship carrying the Disciples of Zod), he first appears under the Milton Fine name, posing as a history professor at (fictional) Central Kansas A&M University and presenting himself as a Kryptonian ally to trick Clark Kent into releasing Zod from the Phantom Zone. Even going far to proclaiming Jor-El was a murderer and the one who infected Mrs. Kent with a virus while Zod was the hero of all Krypton. But after Clark learns the truth in his Fortress, Brainiac is defeated and precedes to manipulates Lex Luthor under the guise of being a government agent into creating a \"vaccine\" . It's revealed that will make Luthor's body suitable to act as Zod's new host after temporarily shutting down all of Earth's electronics with a virus. Although apparently destroyed, a survived copy of Brainiac is seen in season 7 hiding in Metropolis' Suicide Slums when offered help from the \"phantom Clark. The weakened android manipulated the phantom Clark into helping regain his full power by locating Dax-Ur, his creator whom he killed after downloading the latter 's memories. Brainiac would continue to convince Luthor that Clark is a threat by impersonating Kara Zor-El and revealing Clark's secret identity to Luthor, but is defeated in battle by Clark and seemingly killed by overloading his body with electricity. However, a fragment of Brainiac returns in season 8 by possessing Chloe Sullivan as a means of unleashing Doomsday (dormant in a human form named Davis Bloome) on Earth, as part of Zod's contingency plan. The Legion of Super-Heroes time-travel and assist Clark by short-circuiting and magnetically extracting Brainiac's nanites from Chloe, and taking him to the future to be reprogrammed , but are too late to stop him from releasing Doomsday. The benevolent reprogrammed version of Brainiac returns from the future in season 10 , offering Clark advice on his future growth as a superhero. An alternate version of Brainiac/Milton Fine appears in the season seven episode \"Apocalypse\". Living in a universe where Kal-El never arrived on Earth, Brainiac is the White House Chief of Staff under President Lex Luthor and alongside Kara Zor-El (under the name \"Agent Danvers\"). When the appearance of Kal-El from another universe exposed Brainiac to those around him, Lex shot Clark and Kara and activated a Nuclear football to destroy most of the planet to remake. With his directives of destroying humanity and with Lex as the vessel for Zod, Brainiac was about to kill Clark, when Jor-El brought Clark back to his native reality. Brainiac is referenced multiple times in Supergirl. His Coluan descendant Indigo appears as a villain in the first season, who is referred to as \"a member of the Brainiac clan\". Another of his descendants, the heroic Brainiac 5 is later featured as a member of the 31st century's Legion of Super-Heroes. In the episode \"Battles Lost and Won\", Brainiac 5, reveals that in stopping the Blight in the present day timeline, the original Brainiac has been resurrected in the future. Brainiac appears as the main antagonist of the first season of Krypton, portrayed by Blake Ritson. Feared throughout the universe as \"The Collector of Worlds\", Brainiac targets Krypton and seeks to steal the capital city of Kandor before destroying the entire planet. To prevent him from doing so, Seg-El sacrifices himself and banishes Brainiac to the Phantom Zone. In season two, Brainiac transfers his consciousness into Seg's mind while they are trapped together. During the finale, Brainiac manages to separate himself from Seg and leaves in his starship. The character, sporting a look similar to his post-2008 incarnation, was created via a combination of extensive makeup/prosthetics and CGI.Here's your first look at Superman villain Brainiac on the Syfy prequel series 'Krypton'. USA News.", "edit_actions": [{"type": "R", "before": "James Marsters primarily played Brainiac in", "after": "Brainiac was primarily played by James Marsters in WB/CW's hit series", "start_char_pos": 38, "end_char_pos": 81}, {"type": "R", "before": "five and seven", "after": "5 and 7", "start_char_pos": 363, "end_char_pos": 377}, {"type": "R", "before": "eight", "after": "8", "start_char_pos": 414, "end_char_pos": 419}, {"type": "A", "before": null, "after": "humanoid", "start_char_pos": 622, "end_char_pos": 622}, {"type": "R", "before": "computer in humanoid form with a", "after": "nano-supercomputer of", "start_char_pos": 634, "end_char_pos": 666}, {"type": "A", "before": null, "after": "from Terminator 2", "start_char_pos": 850, "end_char_pos": 850}, {"type": "R", "before": "five", "after": "5", "start_char_pos": 1039, "end_char_pos": 1043}, {"type": "A", "before": null, "after": "Black", "start_char_pos": 1109, "end_char_pos": 1109}, {"type": "R", "before": "'vaccine'", "after": "\"vaccine\"", "start_char_pos": 1682, "end_char_pos": 1691}, {"type": "A", "before": null, "after": "a survived copy of", "start_char_pos": 1875, "end_char_pos": 1875}, {"type": "R", "before": "seven hiding in", "after": "7 hiding in Metropolis'", "start_char_pos": 1903, "end_char_pos": 1918}, {"type": "R", "before": "humanoid manipulated the fake", "after": "android manipulated the phantom", "start_char_pos": 1989, "end_char_pos": 2018}, {"type": "R", "before": "to which he killed by downloading his creator", "after": "his creator whom he killed after downloading the latter", "start_char_pos": 2080, "end_char_pos": 2125}, {"type": "A", "before": null, "after": "a fragment of", "start_char_pos": 2390, "end_char_pos": 2390}, {"type": "R", "before": "eight,", "after": "8 by", "start_char_pos": 2418, "end_char_pos": 2424}, {"type": "D", "before": "to use", "after": null, "start_char_pos": 2451, "end_char_pos": 2457}, {"type": "R", "before": "through Davis Bloome", "after": "(dormant in a human form named Davis Bloome)", "start_char_pos": 2492, "end_char_pos": 2512}, {"type": "R", "before": "assist Clark in extracting Brainiacfrom Chloe", "after": "time-travel and assist Clark by short-circuiting and magnetically extracting Brainiac's nanites from Chloe,", "start_char_pos": 2585, "end_char_pos": 2630}, {"type": "A", "before": null, "after": "to be reprogrammed", "start_char_pos": 2660, "end_char_pos": 2660}, {"type": "R", "before": "A", "after": "The benevolent", "start_char_pos": 2717, "end_char_pos": 2718}, {"type": "D", "before": "in season ten", "after": null, "start_char_pos": 2760, "end_char_pos": 2773}, {"type": "A", "before": null, "after": "in season 10", "start_char_pos": 2790, "end_char_pos": 2790}], "sents_char_pos": [0, 319, 551, 619, 779, 1017, 1372, 1511, 1843, 1975, 2138, 2380, 2557, 2716, 2851, 2946, 3134, 3322, 3489, 3541, 3667, 3793, 3967, 4066, 4235, 4334, 4435, 4528, 4668, 4757]}
+{"doc_id": "54545388", "revision_depth": "2", "before_revision": "Infertility Options and Stratification Reproductive Technologies and Stratification As there is a continual expansion of reproductive technologies, there is also increasing deficits in the access and utilization of these technologies due to stratified reproduction. Barriers achieving equal access to these reproductive technologies include high costs, lack of adequate healthcare or no healthcare, restrictive policies, lack of transportation and the lack of autonomy given to women to make their own reproductive decisions. Racial Implications Ethnicity and race also play a role in stratified reproduction. Western media often focuses on the infertility of middle-class white woman, therefore, this implies that poor and non-white womenare hyper-fertile and should not be encouraged to reproduce .Bell, Ann V. 2010. \u201cBeyond (Financial) Accessibility: Inequalities within the Medicalisation of Infertility.\u201d Sociology of Health & Illness 32:631\u201346. Race and ethnicity are common tools used to justify reproductive injustices and health disparities seen throughout the United States. Latinx Populations and Stratified Reproduction Recently, the stories of Latinx struggle for reproductive rights have been coming out . These stories provided evidence that the US was funding forced sterilization of Latinx people and other ethnic groups. In their article, Elena R. Guti\u00e9rrez and Liza Fuentes study two communities, Puerto Rican women in Puerto Rico and New York and Mexican-origin women in Los Angeles. Once Puerto Rico became a US colony in 1898, people began to talk about Puerto Rico being overpopulated. To deal with this a large portion , over 34\\% of mothers aged 20\u201349 , were sterilized. Not all women chose to be sterilized. Many of these women were used for contraceptive testing without their knowledge. Mexican-origin women were another community that experiences forced sterilization. They were non consensual sterilizations. These sterilizations came from the idea that Latinx folks are over-populating the US. In his article, Leo Chavez discusses Latinx fertility in the United States. Their ethnic identity drove a new set of advertisements, anti-immigration advertisements. These advertisements suggest that the Latinx communities leave . That their fertility was not wanted in the US, a countrywhere the population growth rate was near zero . Puerto Ricans such as those discussed in the article by Guti\u00e9rrez and Fuentes were a part of this larger Latinx community that was being targeted. In Leo Chavez's article, he collects data to discuss fertility rates in Latinx people. He uses this data to show thatwhile Latinx folks are having more children, they are not started at a younger age as the US would like to believe . Black and African American Women Experiencing Stratified Reproduction Nearly one in four African American women live below the poverty line which greatly increases the risks associated with bearing children.Tucker, J., & Lowell, C. (2016). National Snapshot: Poverty Among Women & Families, 2015. Black women are 2.5 times more likely to die during pregnancy and their children are 2 times more likely to die as infants.BLKHLTH. (2017). Why Black Health Matters: An Introduction to BLKHLTH. Many attempt to view this issue as a biological issue of African American women; however, black women residing in other countries have less reproductive complication than their American counterparts. Black women are less likely to be given medical advice, to be warned of possible medical complications and to receive helpful prenatal therapies.Dominguez, T. P. (2011). Adverse Birth Outcomes in African American Women: The Social Context of Persistent Reproductive Disadvantage. Social Work In Public Health, 26(1), 3-16. This differential treatment from medical health professional leads to more birth complications, adverse birth outcomes and fetal death thus contributing to the system of stratified reproduction. Residential segregation may indirectly harm health through harmful living environments and limited access to resources. Segregated communities often are characterized by more crime, greater pollution, higher population densities, more poverty, and fewer and lower quality services leading to infant mortality. This includes forms of environmental injustice which incorporates the unfair plotting of landfill facilities and the deliberate targeting of minority and low income communities as repositories for hazardous waste sitesHarris , M. L. (2016). Ecowomanism: Black Women, Religion, and the Environment. Black Scholar, 46(3), 27-39. Even though residential segregation affects various minority groups, in the United States there are stark health discrepancies between black woman and their white counterparts. Flint, Michigan is a predominately black area that exemplifies the harmful impact low environmental quality can have on healthy reproduction . The issue of water contamination has been present since 2014, even though data that shows that fertility rates decreased by 12 percent and infant mortality raised 58 percent for residence in Flint .West Virginia University. (2017). Flint's water crisis led to fewer babies and higher fetal death rates, researchers find. ScienceDaily. Queer Stratified Reproduction More recently, there has been a closer look into how the system of stratified reproduction impacts the LGBTQ+ community. Stratified reproduction within the reproductive field of medicine feeds into a political economy that does not include a right to health, but a right to purchase health care if one can afford it and is deemed worthy of these biomedicines. States such as Arizona and Mississippi have recently seen legislative attempts to allow health care services to deny care to LGBTQ people and these stratifications of access to care also denies LGBTQ people the same possibilities for family planning and formation.Greil, A. L., McQuillan, J., Shreffler, K. M., Johnson, K. M., & Slauson-Blevins, K. S. (2011). Race-Ethnicity and Medical Services for Infertility: Stratified Reproduction in a Population-based Sample of U.S. Women. Journal of Health and Social Behavior, 52(4), 493\u2013509. URL", "after_revision": "Infertility options and stratification Reproductive technologies and stratification As there is a continual expansion of reproductive technologies, there is also increasing deficits in the access and utilization of these technologies due to stratified reproduction. Barriers achieving equal access to these reproductive technologies include high costs, lack of adequate healthcare or no healthcare, restrictive policies, lack of transportation and the lack of autonomy given to women to make their own reproductive decisions. Racial implications Ethnicity and race also play a role in stratified reproduction. Western media often focuses on the infertility of middle-class white women, to the detriment of poor and nonwhite women .Bell, Ann V. 2010. \u201cBeyond (Financial) Accessibility: Inequalities within the Medicalisation of Infertility.\u201d Sociology of Health & Illness 32:631\u201346. Race and ethnicity are common tools used to justify reproductive injustices and health disparities seen throughout the United States. Latino populations and stratified reproduction Recent scholarship has investigated the history of conflict around Latinas and fertility in the United States . These stories provided evidence that the United States had funded forced sterilization of Latino people and other ethnic groups. In their article, Elena R. Guti\u00e9rrez and Liza Fuentes study two communities, Puerto Rican women in Puerto Rico and New York and Mexican-origin women in Los Angeles. Once Puerto Rico became an American colony in 1898, people began to talk about Puerto Rico being overpopulated. By 1965 , over 34\\% of mothers aged 20\u201349 had been sterilized. Not all women chose to be sterilized. Many of these women were used for contraceptive testing without their knowledge. Mexican-origin women were another community that experienced forced sterilization. Some women were forced into nonconsensual sterilizations, including as they were giving birth. Scholar Leo Chavez argues that these sterilizations came from the idea that Latinos are over-populating the U.S. In his article, Leo Chavez discusses Latino fertility in the United States. He writes that their presence promoted anti-immigration sentiment and advertising suggesting that they should leave the United States and that their fertility was not welcome in the country . Puerto Ricans , such as those discussed in the article by Guti\u00e9rrez and Fuentes , were a part of this larger Latino community that was being targeted. In Chavez's article, he collects data to discuss fertility rates among Latinas, showing that, though Latina women were more fertile than their non-Hispanic white counterparts, they had fewer lifetime sexual partners . Black women experiencing stratified reproduction Nearly one in four African-American women live below the poverty line , which greatly increases the risks associated with bearing children.Tucker, J., & Lowell, C. (2016). National Snapshot: Poverty Among Women & Families, 2015. Black women are two and a half times more likely to die during pregnancy , and their children are two times more likely to die as infants.BLKHLTH. (2017). Why Black Health Matters: An Introduction to BLKHLTH. Many attempt to view this issue as a biological issue of African-American women; however, black women residing in other countries have less reproductive complication than their American counterparts. Black women are less likely to be given medical advice, to be warned of possible medical complications , and to receive helpful prenatal therapies.Dominguez, T. P. (2011). Adverse Birth Outcomes in African American Women: The Social Context of Persistent Reproductive Disadvantage. Social Work In Public Health, 26(1), 3-16. This differential treatment from medical health professional leads to more birth complications, adverse birth outcomes and fetal death thus contributing to the system of stratified reproduction. Residential segregation may indirectly harm health through harmful living environments and limited access to resources. Segregated communities often are characterized by more crime, greater pollution, higher population densities, more poverty, and fewer and lower-quality services, leading to infant mortality. This includes forms of environmental injustice , which incorporates the unfair plotting of landfill facilities and the deliberate targeting of minority and low-income communities as repositories for hazardous waste sites.Harris , M. L. (2016). Ecowomanism: Black Women, Religion, and the Environment. Black Scholar, 46(3), 27-39. Even though residential segregation affects various minority groups, in the United States there are stark health discrepancies between black woman and their white counterparts. Flint, Michigan is a predominately black area that exemplifies the harmful impact low environmental quality can have on healthy reproduction : The Flint water crisis decreased fertility rates by 12 percent and raised infant mortality by 58 percent among Flint residents .West Virginia University. (2017). Flint's water crisis led to fewer babies and higher fetal death rates, researchers find. ScienceDaily. Queer stratified reproduction More recently, there has been a closer look into how the system of stratified reproduction impacts the LGBTQ+ community. Stratified reproduction within the reproductive field of medicine feeds into a political economy that does not include a right to health, but a right to purchase health care if one can afford it and is deemed worthy of these biomedicines. States such as Arizona and Mississippi have recently seen legislative attempts to allow health care services to deny care to LGBTQ people ; these stratifications of access to care also deny LGBTQ people the same possibilities for family planning and formation.Greil, A. L., McQuillan, J., Shreffler, K. M., Johnson, K. M., & Slauson-Blevins, K. S. (2011). Race-Ethnicity and Medical Services for Infertility: Stratified Reproduction in a Population-based Sample of U.S. Women. Journal of Health and Social Behavior, 52(4), 493\u2013509. URL", "edit_actions": [{"type": "R", "before": "Options and Stratification", "after": "options and stratification", "start_char_pos": 12, "end_char_pos": 38}, {"type": "R", "before": "Technologies and Stratification", "after": "technologies and stratification", "start_char_pos": 52, "end_char_pos": 83}, {"type": "R", "before": "Implications", "after": "implications", "start_char_pos": 533, "end_char_pos": 545}, {"type": "R", "before": "woman, therefore, this implies that poor and non-white womenare hyper-fertile and should not be encouraged to reproduce", "after": "women, to the detriment of poor and nonwhite women", "start_char_pos": 679, "end_char_pos": 798}, {"type": "R", "before": "Latinx Populations and Stratified Reproduction Recently, the stories of Latinx struggle for reproductive rights have been coming out", "after": "Latino populations and stratified reproduction Recent scholarship has investigated the history of conflict around Latinas and fertility in the United States", "start_char_pos": 1085, "end_char_pos": 1217}, {"type": "R", "before": "US was funding", "after": "United States had funded", "start_char_pos": 1261, "end_char_pos": 1275}, {"type": "R", "before": "Latinx", "after": "Latino", "start_char_pos": 1300, "end_char_pos": 1306}, {"type": "R", "before": "a US", "after": "an American", "start_char_pos": 1528, "end_char_pos": 1532}, {"type": "R", "before": "To deal with this a large portion", "after": "By 1965", "start_char_pos": 1609, "end_char_pos": 1642}, {"type": "R", "before": ", were", "after": "had been", "start_char_pos": 1677, "end_char_pos": 1683}, {"type": "R", "before": "experiences", "after": "experienced", "start_char_pos": 1864, "end_char_pos": 1875}, {"type": "R", "before": "They were non consensual sterilizations. These", "after": "Some women were forced into nonconsensual sterilizations, including as they were giving birth. Scholar Leo Chavez argues that these", "start_char_pos": 1898, "end_char_pos": 1944}, {"type": "R", "before": "Latinx folks", "after": "Latinos", "start_char_pos": 1984, "end_char_pos": 1996}, {"type": "R", "before": "US.", "after": "U.S.", "start_char_pos": 2021, "end_char_pos": 2024}, {"type": "R", "before": "Latinx", "after": "Latino", "start_char_pos": 2062, "end_char_pos": 2068}, {"type": "R", "before": "Their ethnic identity drove a new set of advertisements,", "after": "He writes that their presence promoted", "start_char_pos": 2101, "end_char_pos": 2157}, {"type": "R", "before": "advertisements. These advertisements suggest that the Latinx communities leave . That", "after": "sentiment and advertising suggesting that they should leave the United States and that", "start_char_pos": 2175, "end_char_pos": 2260}, {"type": "R", "before": "wanted in the US, a countrywhere the population growth rate was near zero", "after": "welcome in the country", "start_char_pos": 2285, "end_char_pos": 2358}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2375, "end_char_pos": 2375}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2440, "end_char_pos": 2440}, {"type": "R", "before": "Latinx", "after": "Latino", "start_char_pos": 2468, "end_char_pos": 2474}, {"type": "D", "before": "Leo", "after": null, "start_char_pos": 2513, "end_char_pos": 2516}, {"type": "R", "before": "in Latinx people. He uses this data to show thatwhile Latinx folks are having more children, they are not started at a younger age as the US would like to believe", "after": "among Latinas, showing that, though Latina women were more fertile than their non-Hispanic white counterparts, they had fewer lifetime sexual partners", "start_char_pos": 2579, "end_char_pos": 2741}, {"type": "R", "before": "and African American Women Experiencing Stratified Reproduction", "after": "women experiencing stratified reproduction", "start_char_pos": 2750, "end_char_pos": 2813}, {"type": "R", "before": "African American", "after": "African-American", "start_char_pos": 2833, "end_char_pos": 2849}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2884, "end_char_pos": 2884}, {"type": "R", "before": "2.5", "after": "two and a half", "start_char_pos": 3058, "end_char_pos": 3061}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3104, "end_char_pos": 3104}, {"type": "R", "before": "2", "after": "two", "start_char_pos": 3128, "end_char_pos": 3129}, {"type": "R", "before": "African American", "after": "African-American", "start_char_pos": 3294, "end_char_pos": 3310}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3540, "end_char_pos": 3540}, {"type": "R", "before": "lower quality services", "after": "lower-quality services,", "start_char_pos": 4214, "end_char_pos": 4236}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4313, "end_char_pos": 4313}, {"type": "R", "before": "low income", "after": "low-income", "start_char_pos": 4421, "end_char_pos": 4431}, {"type": "R", "before": "sitesHarris", "after": "sites.Harris", "start_char_pos": 4480, "end_char_pos": 4491}, {"type": "R", "before": ". The issue of water contamination has been present since 2014, even though data that shows that fertility rates decreased", "after": ": The Flint water crisis decreased fertility rates", "start_char_pos": 4912, "end_char_pos": 5034}, {"type": "R", "before": "infant mortality raised", "after": "raised infant mortality by", "start_char_pos": 5053, "end_char_pos": 5076}, {"type": "R", "before": "for residence in Flint", "after": "among Flint residents", "start_char_pos": 5088, "end_char_pos": 5110}, {"type": "R", "before": "Stratified Reproduction", "after": "stratified reproduction", "start_char_pos": 5255, "end_char_pos": 5278}, {"type": "R", "before": "and", "after": ";", "start_char_pos": 5777, "end_char_pos": 5780}, {"type": "R", "before": "denies", "after": "deny", "start_char_pos": 5826, "end_char_pos": 5832}], "sents_char_pos": [0, 265, 525, 609, 800, 818, 909, 950, 1084, 1219, 1338, 1503, 1608, 1695, 1733, 1814, 1897, 1938, 2024, 2100, 2190, 2255, 2360, 2509, 2596, 2952, 2984, 3041, 3166, 3182, 3236, 3317, 3436, 3583, 3607, 3717, 3760, 3955, 4075, 4265, 4507, 4564, 4593, 4770, 4913, 5112, 5137, 5234, 5248, 5399, 5638, 5903, 5998, 6119]}
+{"doc_id": "55039969", "revision_depth": "2", "before_revision": "According to current understanding, the contralateral organization is due to an axial twist ( see below), which is the only theory that has been tested independently. A number of alternative proposals have been published earlier, the most popular of which is the visual map theory. A popular-science video explains these theories in brief. alt=schematic drawing of the central nervous system, showing schematically how arrow halves are projected on the eyes' retina, crossed by the optic chiasm and mapped correctly to the visual cortex|Cajal's schema of the visual map theory. O=Optic chiasm; C=Visual (and motor) cortex; M, S=Decussating pathways; R, G: Sensory nerves, motor ganglia. 300px|Transformations of the visual field toward the visual map on the primary visual cortex. U=up; D=down; L=left; R=right; F=fovea The visual map theory was published by the famous neuroscientist and pioneer Santiago Ram\u00f3n y Cajal (1898) , see also and for English summaries. According to this theory, the function of the optic chiasm is to repair the retinal field image on the visual cortex. The pupil in the vertebrates\u2019 eyes inverts the image on the retina, so that the visual periphery projects to the medial side of the retina. By the chiasmatic crossing, the visual periphery is again on the outside, if one assumes that the retinal map is faithfully maintained throughout the optic tract. The theory has a number of weaknesses. For example, the visual tracts spiral their way from the thalamic LGN to the visual cortex (see Figure ; this path is known as the optic radiation ). As a result, the retinal map show the visual periphery on the medial side. However, the central point of the theory was exactly to obtain a faithful visual map with the medial field projecting to the medial sides of the visual cortex. Two twist theories have been proposed independently , the axial twist hypothesis by de Marc Lussanet and Jan Osse and the somatic twist hypothesis by Marcel Kinsbourne. alt=caption|Schema of the developmental twist according to the axial twist hypothesis. A, B: The early embryo turns onto its left side; B, C: Symmetry is retained by a further left turn in the anterior head region and a compensating right turn in the rest of the body. D, E: Growth of the optic tract leading to the optic chiasm. Colors refer to early embryo: Red=right side, blue=left side, black=dorsal, white=ventral The axial twist hypothesis was designed to explain how the pattern of contralateral organization, decussations and chiasms develops, and why this pattern is evolutionary stable. The evolutionary stability is truly remarkable, given that there are no known exceptions throughout the 500 million years of vertebrate evolution. According to the theory, the contralateral organization develops as follows. The early embryo is turned onto its left side, such that its left is turned to the yolk and its right is turned away from the yolk. This asymmetric orientation is compensated by asymmetric growth to regain superficial bilateral symmetry. The anterior head region turns to the left, as shown in the schema. The forebrain is not a superficial structure, but it is so intimately associated with superficial body structures that it turns along with the anterior head. These structures will later form the eyes, nostrils and mouth. The body behind the head compensates the asymmetric body orientation in the opposite direction, by turning to the right (see schema). Due to these oppositely directed compensations of the anterior head and the rest of the body, the animal becomes twisted. The optic tract grows from the retina to the optic tectum , as dorsal and ventral are inverted in the anterior head region, the tracts grow at first to the ventral side to meet in the midline to form a chiasma. Since the optic tectum lies on the dorsal midbrain, each tract then continues dorsally to the contralateral optic tectum. The heart and bowels are internal organs with no strong integration in external body structures, so there is no evolutionary pressure to make them turn also . Rather, these organs retain their original asymmetric orientation in the body. The axial twist hypothesis predicts that small asymmetries of face, brain and ( in the opposite direction ) in the trunk remain into adulthood, and this has been confirmed experimentally. According to the dorsoventral inversion hypothesis, an ancestral deuterostome turned on its back. As a result, vertebrates have a dorsal nervous system whereas protostomes have a ventral one. According to the somatic twist hypothesis, not the entire animal turned on its back but just the \u2033somatic\u2033 part , i.e., everything behind the eyes, mouth and nostrils, including the forebrain. The three theories are closely related. The somatic twist hypothesis was proposed as an improvement to the inversion hypothesis, and thus has a much wider explanatory power than its predecessor. It not only explains the inversion of the body but additionally the contralateral forebrain. The axial twist hypothesis was defined independently of the other two. In addition to the inverted body and the contralateral forebrain it explains why the heart and bowels are asymmetric. Moreover, it is the only of the three that is supported by evidence from embryological growth.", "after_revision": "According to current understanding, the contralateral organization is due to an axial twist ( explained further below), which is the only theory that has been tested independently. A number of alternative proposals were published earlier, the most popular of which is the visual map theory. A popular-science video explains these theories in brief. alt=schematic drawing of the central nervous system, showing schematically how arrow halves are projected on the eyes' retina, crossed by the optic chiasm and mapped correctly to the visual cortex|Cajal's schema of the visual map theory. O=Optic chiasm; C=Visual (and motor) cortex; M, S=Decussating pathways; R, G: Sensory nerves, motor ganglia. 300px|Transformations of the visual field toward the visual map on the primary visual cortex. U=up; D=down; L=left; R=right; F=fovea The visual map theory was published by the famous neuroscientist and pioneer Santiago Ram\u00f3n y Cajal (1898) . (See also and for English summaries. ) According to this theory, the function of the optic chiasm is to repair the retinal field image on the visual cortex. The pupil in the vertebrates\u2019 eyes inverts the image on the retina, so that the visual periphery projects to the medial side of the retina. By the chiasmatic crossing, the visual periphery is again on the outside, if one assumes that the retinal map is faithfully maintained throughout the optic tract. The theory has a number of weaknesses. For example, the visual tracts spiral their way from the thalamic LGN to the visual cortex . (See figure ; this path is known as the optic radiation .) As a result, the retinal map shows the visual periphery on the medial side. However, the central objective of the theory was to obtain a precise, faithful visual map with the medial field projecting to the medial sides of the visual cortex. Two twist theories have been proposed independently : the axial twist hypothesis by de Marc Lussanet and Jan Osse and the somatic twist hypothesis by Marcel Kinsbourne. alt=caption|Schema of the developmental twist , according to the axial twist hypothesis. A, B: The early embryo turns onto its left side; B, C: Symmetry is retained by a further left turn in the anterior head region and a compensating right turn in the rest of the body. D, E: Growth of the optic tract leading to the optic chiasm. Colors refer to early embryo: Red=right side, blue=left side, black=dorsal, white=ventral . The axial twist hypothesis was designed to explain how the pattern of contralateral organization, decussations and chiasms develops, and why this pattern is evolutionarily stable. The evolutionary stability is truly remarkable, given that there are no known exceptions throughout the 500 million years of vertebrate evolution. According to the theory, the contralateral organization develops as follows. The early embryo is turned onto its left side, such that its left is turned to the yolk and its right is turned away from the yolk. This asymmetric orientation is compensated by asymmetric growth , to regain superficial bilateral symmetry. The anterior head region turns to the left, as shown in the schema. The forebrain is not a superficial structure, but it is so intimately associated with superficial body structures that it turns along with the anterior head. These structures will later form the eyes, nostrils and mouth. The body behind the head compensates the asymmetric body orientation in the opposite direction, by turning to the right . (See schema.) Due to these oppositely directed compensations of the anterior head and the rest of the body, the animal becomes twisted. The optic tract grows from the retina to the optic tectum . Because dorsal and ventral are inverted in the anterior head region, the tracts grow at first toward the ventral side , to meet in the midline to form a chiasma. Since the optic tectum lies on the dorsal midbrain, each tract then continues dorsally to the contralateral optic tectum. The heart and bowels are internal organs with no strong integration in external body structures, so there is no evolutionary pressure to make them turn in a similar way . Rather, these organs retain their original asymmetric orientation in the body. The axial twist hypothesis predicts that small asymmetries of the face and brain \u2014 as well as those found in the opposite direction in the trunk \u2014 remain into adulthood, and this has been confirmed experimentally. According to the dorsoventral inversion hypothesis, an ancestral deuterostome turned on its back. As a result, vertebrates have a dorsal nervous system , whereas protostomes have a ventral one. According to the somatic twist hypothesis, not the entire animal turned on its back but just the \u2033somatic\u2033 part \u2014 i.e., everything behind the eyes, mouth and nostrils, including the forebrain. The three theories are closely related. The somatic twist hypothesis was proposed as an improvement to the inversion hypothesis, and thus has a much wider explanatory power than its predecessor. It not only explains the inversion of the body but additionally the contralateral forebrain. The axial twist hypothesis was defined independently of the other two. In addition to providing rationale for the inverted body and the contralateral forebrain , it explains why the heart and bowels are asymmetric. Moreover, it is the only one of the three theories that is supported by evidence from embryological growth.", "edit_actions": [{"type": "R", "before": "see", "after": "explained further", "start_char_pos": 94, "end_char_pos": 97}, {"type": "R", "before": "have been", "after": "were", "start_char_pos": 201, "end_char_pos": 210}, {"type": "R", "before": ", see", "after": ". (See", "start_char_pos": 927, "end_char_pos": 932}, {"type": "A", "before": null, "after": ")", "start_char_pos": 965, "end_char_pos": 965}, {"type": "R", "before": "(see Figure", "after": ". (See figure", "start_char_pos": 1517, "end_char_pos": 1528}, {"type": "R", "before": ").", "after": ".)", "start_char_pos": 1573, "end_char_pos": 1575}, {"type": "R", "before": "show", "after": "shows", "start_char_pos": 1605, "end_char_pos": 1609}, {"type": "R", "before": "point", "after": "objective", "start_char_pos": 1672, "end_char_pos": 1677}, {"type": "D", "before": "exactly", "after": null, "start_char_pos": 1696, "end_char_pos": 1703}, {"type": "A", "before": null, "after": "precise,", "start_char_pos": 1716, "end_char_pos": 1716}, {"type": "R", "before": ",", "after": ":", "start_char_pos": 1864, "end_char_pos": 1865}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2027, "end_char_pos": 2027}, {"type": "A", "before": null, "after": ".", "start_char_pos": 2402, "end_char_pos": 2402}, {"type": "R", "before": "evolutionary", "after": "evolutionarily", "start_char_pos": 2560, "end_char_pos": 2572}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3001, "end_char_pos": 3001}, {"type": "R", "before": "(see schema).", "after": ". (See schema.)", "start_char_pos": 3453, "end_char_pos": 3466}, {"type": "R", "before": ", as", "after": ". Because", "start_char_pos": 3647, "end_char_pos": 3651}, {"type": "R", "before": "to", "after": "toward", "start_char_pos": 3738, "end_char_pos": 3740}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3758, "end_char_pos": 3758}, {"type": "R", "before": "also", "after": "in a similar way", "start_char_pos": 4075, "end_char_pos": 4079}, {"type": "R", "before": "face, brain and (", "after": "the face and brain \u2014 as well as those found", "start_char_pos": 4223, "end_char_pos": 4240}, {"type": "D", "before": ")", "after": null, "start_char_pos": 4267, "end_char_pos": 4268}, {"type": "A", "before": null, "after": "\u2014", "start_char_pos": 4282, "end_char_pos": 4282}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4502, "end_char_pos": 4502}, {"type": "R", "before": ",", "after": "\u2014", "start_char_pos": 4655, "end_char_pos": 4656}, {"type": "A", "before": null, "after": "providing rationale for", "start_char_pos": 5110, "end_char_pos": 5110}, {"type": "A", "before": null, "after": ",", "start_char_pos": 5161, "end_char_pos": 5161}, {"type": "A", "before": null, "after": "one", "start_char_pos": 5240, "end_char_pos": 5240}, {"type": "A", "before": null, "after": "theories", "start_char_pos": 5254, "end_char_pos": 5254}], "sents_char_pos": [0, 166, 281, 577, 593, 622, 649, 686, 780, 794, 811, 964, 1083, 1223, 1386, 1425, 1530, 1575, 1650, 1811, 2068, 2117, 2250, 2311, 2580, 2727, 2804, 2936, 3043, 3111, 3269, 3332, 3466, 3588, 3800, 3922, 4160, 4349, 4447, 4542, 4735, 4775, 4930, 5023, 5094, 5214]}
+{"doc_id": "55319895", "revision_depth": "1", "before_revision": "Genetic ecology is the study of the stability and expression of varying genetic material within abiotic mediums.Kellenberger, E. ( 15May1994) Genetic ecology: a new interdisciplinary science, fundamental for evolution, biodiversity and biosafety evaluations Experientia vol50:5 pp429-437 Typically, genetic data is not thought of outside of any organism save for criminal for criminal forensics. However, genetic material has the ability to be taken up by various organisms that exist within an abiotic medium through natural transformations that may occur.Lederberg, J. (1994) The Transformation of Genetics The Rockefeller University, New York, New York Thus, this field of study focuses on interaction, exchange, and expression of genetic material that may not be shared by species had they not been in the same environment. E.B. Ford was the first geneticist to begin work in this field of study. E.B. Ford worked mostly during the 1950s and is most noted for his work with Maniola jurtina and published a book entitled Ecological Genetics in 1975.Ecological Genetics (n.d.) Retrieved from URL Baxter S.W. et. al (2017) EB Ford revisited: assessing the long-term stability of wing-spot patterns and population genetic structure of the meadow brown butterfly on the Isles of Scilly Heredity This type of evolutionary biological study was only possible after gel electrophoresis had been designed in 1937.Tiselius, A. ( 25January1937) A New Apparatus for Electrophoretic Analysis of Colloidal Mixtures Transactions of the Faraday Society Prior to this, a high throughput method for DNA analysis did not exist. This field of study began to become more popular following the 1980s with the development of polymerase chain reaction (PCR 1985) and poly-acrylamide gel electrophoresis (PAGE 1967).Shapiro, A.L. et. al ( 07September1967) Molecular weight estimation of polypeptide chains by electrophoresis in SDS-polyacrylamide gels Biochem Biophys Res Commun The History of PCR (2004) Retrieved from URL With this technology, segments of DNA could be sequenced, amplified, and proteins produced using bacterial transformations. The genetic material along with the proteins could be analyzed and more correct phylogenetic trees could be created. Since E.B. Ford's research, multiple other genetic ecologists have continued study within the field of genetic ecology such as PT Hanford Handford PT. (1973) Patterns of variation in a number of genetic systems in Maniola jurtina Isles of Scilly. Proc R Soc B Biol Sci 183: 285\u2013300. | Alina von ThadenThaden, A. et. al ( 11Aug2017) Assessing SNP genotyping of noninvasively collected wildlife samples using microfluidic arrays Scientific Reports, and many others.Frachon, L et. al ( 27July2017) Intermediate degrees of synergistic pleiotropy drive adaptive evolution in ecological time Nature, Ecology, and Evolution Torda , G. et. al ( 26July2017 ) Rapid adaptive responses to climate change in corals Nature Climate Change Benvenuto , C. Cosica, I. Chopelet, J. Sala-Bozano, M. Mariani, S. ( 25July2017 ) Ecological and evolutionary consequences of alternative sex-change pathways in fish Scientific Reports Cure , K. Thomas, L. Hobbs, JPA. Fairclough, D.V. Kennington, W.J. ( 25July2017) Genomic signatures of local adaptation reveal source-sink dynamics in a high gene flow fish species Scientific Reports Komurai , R. Fujisawa, T. Okuzaki, Y. Sota, T. ( 11July2017) Genomic regions and genes related to inter-population differences in body size in the ground beetle Carabus japonicus Scientific Reports Gene Transfer Genetic information may transfer throughout an ecosystem in multiple ways. The first of which, on the smallest scale, being bacterial gene transfer (see bacterial transformations). Bacteria have the ability to exchange DNA. This DNA exchange, or horizontal gene transfer, may provide various species of bacteria with the genetic information they need to survive in an environment. Horizontal Gene Transfer . (n.d.). Retrieved from URL This can help many bacterial species survive within an environment. A similar event has the ability to happen between plants and bacteria. For example, Agrobacterium tumefaciens has the ability to introduce genes into plants to cause the development of Gall disease. This occurs through genetic transfer between the ' A. tumefaciens ' and between the plant in question. Methods of Gene Transfer in Plants (2011) Agricultural Biosecurity . Retrieved from URL In fact, a similar event occurs each time viral infections occur within living organisms. The viruses, whether positive or negative sense viruses, require a living organism to replicate their genes and produce more viruses. Once a virus is inside a living organism, it utilizes polymerases, ribosomes, and other biomolecules to replicate it's own genetic material and to produce more virus genetic material similar to the original virus . 7. Weaver, R. (2012). Molecular biology (5th ed.). New York: McGraw-Hill Thus, gene transfer may occur through many varying means. Thus, the study of this gene trasfer throughout each ecossytem, whether it be through a bacterial ecosystem or through the ecosystem of an organism, genetic ecology is the study of this gene transfer and its causes.", "after_revision": "Genetic ecology is the study of the stability and expression of varying genetic material within abiotic mediums.Kellenberger, E. ( 15 May 1994) \" Genetic ecology: a new interdisciplinary science, fundamental for evolution, biodiversity and biosafety evaluations \" Experientia vol50:5 pp429-437 Typically, genetic data is not thought of outside of any organism save for criminal for criminal forensics. However, genetic material has the ability to be taken up by various organisms that exist within an abiotic medium through natural transformations that may occur.Lederberg, J. (1994) The Transformation of Genetics The Rockefeller University, New York, New York Thus, this field of study focuses on interaction, exchange, and expression of genetic material that may not be shared by species had they not been in the same environment. E.B. Ford was the first geneticist to begin work in this field of study. E.B. Ford worked mostly during the 1950s and is most noted for his work with Maniola jurtina and published a book entitled Ecological Genetics in 1975.Ecological Genetics (n.d.) Baxter S.W. et. al (2017) \" EB Ford revisited: assessing the long-term stability of wing-spot patterns and population genetic structure of the meadow brown butterfly on the Isles of Scilly \" Heredity This type of evolutionary biological study was only possible after gel electrophoresis had been designed in 1937.Tiselius, A. ( 25 January 1937) \" A New Apparatus for Electrophoretic Analysis of Colloidal Mixtures \" Transactions of the Faraday Society Prior to this, a high throughput method for DNA analysis did not exist. This field of study began to become more popular following the 1980s with the development of polymerase chain reaction (PCR 1985) and poly-acrylamide gel electrophoresis (PAGE 1967).Shapiro, A.L. et. al ( 7 September 1967) \" Molecular weight estimation of polypeptide chains by electrophoresis in SDS-polyacrylamide gels \" Biochem Biophys Res Commun \" The History of PCR \" (2004) With this technology, segments of DNA could be sequenced, amplified, and proteins produced using bacterial transformations. The genetic material along with the proteins could be analyzed and more correct phylogenetic trees could be created. Since E.B. Ford's research, multiple other genetic ecologists have continued study within the field of genetic ecology such as PT HanfordHandford PT. (1973) \" Patterns of variation in a number of genetic systems in Maniola jurtina \" Isles of Scilly. Proc R Soc B Biol Sci 183: 285\u2013300. | Alina von Thaden,Thaden, A. et. al ( 11 August 2017) \" Assessing SNP genotyping of noninvasively collected wildlife samples using microfluidic arrays \" Scientific Reports and many others.Frachon, L et. al ( 27 July 2017) \" Intermediate degrees of synergistic pleiotropy drive adaptive evolution in ecological time \" Nature, Ecology, and EvolutionTorda , G. et. al ( 26 July 2017 ) Rapid adaptive responses to climate change in corals Nature Climate ChangeBenvenuto , C. Cosica, I. Chopelet, J. Sala-Bozano, M. Mariani, S. ( 25 July 2017 ) Ecological and evolutionary consequences of alternative sex-change pathways in fish Scientific ReportsCure , K. Thomas, L. Hobbs, JPA. Fairclough, D.V. Kennington, W.J. ( 25 July 2017) \" Genomic signatures of local adaptation reveal source-sink dynamics in a high gene flow fish species \" Scientific ReportsKomurai , R. Fujisawa, T. Okuzaki, Y. Sota, T. ( 11 July 2017) \" Genomic regions and genes related to inter-population differences in body size in the ground beetle Carabus japonicus \" Scientific Reports Gene transfer Genetic information may transfer throughout an ecosystem in multiple ways. The first of which, on the smallest scale, being bacterial gene transfer (see bacterial transformations). Bacteria have the ability to exchange DNA. This DNA exchange, or horizontal gene transfer, may provide various species of bacteria with the genetic information they need to survive in an environment. \" Horizontal Gene Transfer \" . (n.d.). This can help many bacterial species survive within an environment. A similar event has the ability to happen between plants and bacteria. For example, Agrobacterium tumefaciens has the ability to introduce genes into plants to cause the development of Gall disease. This occurs through genetic transfer between the A. tumefaciens and between the plant in question. \" Methods of Gene Transfer in Plants \" (2011) Agricultural Biosecurity In fact, a similar event occurs each time viral infections occur within living organisms. The viruses, whether positive or negative sense viruses, require a living organism to replicate their genes and produce more viruses. Once a virus is inside a living organism, it utilizes polymerases, ribosomes, and other biomolecules to replicate its own genetic material and to produce more virus genetic material similar to the original virus .7. Weaver, R. (2012). Molecular biology (5th ed.). New York: McGraw-Hill Thus, gene transfer may occur through many varying means. Thus, the study of this gene trasfer throughout each ecossytem, whether it be through a bacterial ecosystem or through the ecosystem of an organism, genetic ecology is the study of this gene transfer and its causes.", "edit_actions": [{"type": "R", "before": "15May1994)", "after": "15 May 1994) \"", "start_char_pos": 131, "end_char_pos": 141}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 258, "end_char_pos": 258}, {"type": "D", "before": "Retrieved from URL", "after": null, "start_char_pos": 1080, "end_char_pos": 1098}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 1125, "end_char_pos": 1125}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 1287, "end_char_pos": 1287}, {"type": "R", "before": "25January1937)", "after": "25 January 1937) \"", "start_char_pos": 1425, "end_char_pos": 1439}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 1507, "end_char_pos": 1507}, {"type": "R", "before": "07September1967)", "after": "7 September 1967) \"", "start_char_pos": 1821, "end_char_pos": 1837}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 1934, "end_char_pos": 1934}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 1962, "end_char_pos": 1962}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 1982, "end_char_pos": 1982}, {"type": "D", "before": "Retrieved from URL", "after": null, "start_char_pos": 1990, "end_char_pos": 2008}, {"type": "R", "before": "Hanford Handford", "after": "HanfordHandford", "start_char_pos": 2380, "end_char_pos": 2396}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2408, "end_char_pos": 2408}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2481, "end_char_pos": 2481}, {"type": "R", "before": "ThadenThaden,", "after": "Thaden,Thaden,", "start_char_pos": 2547, "end_char_pos": 2560}, {"type": "R", "before": "11Aug2017)", "after": "11 August 2017) \"", "start_char_pos": 2573, "end_char_pos": 2583}, {"type": "R", "before": "Scientific Reports,", "after": "\" Scientific Reports", "start_char_pos": 2679, "end_char_pos": 2698}, {"type": "R", "before": "27July2017)", "after": "27 July 2017) \"", "start_char_pos": 2735, "end_char_pos": 2746}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2838, "end_char_pos": 2838}, {"type": "R", "before": "Evolution Torda", "after": "EvolutionTorda", "start_char_pos": 2860, "end_char_pos": 2875}, {"type": "R", "before": "26July2017", "after": "26 July 2017", "start_char_pos": 2890, "end_char_pos": 2900}, {"type": "R", "before": "Change Benvenuto", "after": "ChangeBenvenuto", "start_char_pos": 2971, "end_char_pos": 2987}, {"type": "R", "before": "25July2017", "after": "25 July 2017", "start_char_pos": 3047, "end_char_pos": 3057}, {"type": "R", "before": "Reports Cure", "after": "ReportsCure", "start_char_pos": 3155, "end_char_pos": 3167}, {"type": "R", "before": "25July2017)", "after": "25 July 2017) \"", "start_char_pos": 3232, "end_char_pos": 3243}, {"type": "R", "before": "Scientific Reports Komurai", "after": "\" Scientific ReportsKomurai", "start_char_pos": 3344, "end_char_pos": 3370}, {"type": "R", "before": "11July2017)", "after": "11 July 2017) \"", "start_char_pos": 3412, "end_char_pos": 3423}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 3542, "end_char_pos": 3542}, {"type": "R", "before": "Transfer", "after": "transfer", "start_char_pos": 3567, "end_char_pos": 3575}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 3957, "end_char_pos": 3957}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 3983, "end_char_pos": 3983}, {"type": "D", "before": "Retrieved from URL", "after": null, "start_char_pos": 3994, "end_char_pos": 4012}, {"type": "D", "before": "'", "after": null, "start_char_pos": 4329, "end_char_pos": 4330}, {"type": "D", "before": "'", "after": null, "start_char_pos": 4346, "end_char_pos": 4347}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 4383, "end_char_pos": 4383}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 4419, "end_char_pos": 4419}, {"type": "D", "before": ". Retrieved from URL", "after": null, "start_char_pos": 4452, "end_char_pos": 4472}, {"type": "R", "before": "it's", "after": "its", "start_char_pos": 4811, "end_char_pos": 4815}, {"type": "R", "before": ". 7.", "after": ".7.", "start_char_pos": 4910, "end_char_pos": 4914}], "sents_char_pos": [0, 112, 396, 558, 828, 901, 1053, 1410, 1615, 1798, 2132, 2249, 2260, 2498, 2534, 2715, 2746, 2846, 3243, 3650, 3756, 3799, 3956, 3993, 4080, 4151, 4279, 4382, 4453, 4562, 4696, 4933, 4962, 5042]}
+{"doc_id": "55376769", "revision_depth": "1", "before_revision": "In 1976, Charles graduated from University of Michigan with a degree in Economics . In 1977, Charles joined the family business where he worked alongside his father until the elder Shor's death in 1987, at which point Charles would take over responsibilities as Duro Bag's new CEO . Charles' epilepsy would eventually inspire him to start the Charles L. Shor Foundation for Epilepsy Research. Career After graduating from University of Michigan in 1976, Charles would join his family business as a salesman in 1977. After four years with the company, Charles' father would name him as President of Duro Bag at the age of 27. Fifth Third 's assistance would give Duro Bag the time it needed in order to realign its business strategy, ultimately resulting in Duro Bag's becoming the largest paper bag manufacturing company in the world. During Shor's tenure as CEO and majority owner, Duro Bag would make several innovations in the realm of paper bags, including; the first grocery bag made from 100\\% recycled material, the first tear-proof shopping bag (made from DuPont's TyVek material), as well as the first specialty bags for retailers; Tiffany's and Hallmark. Duro Bag would go on to purchase 17 competing paper bag companies on its path to becoming the biggest paper bag company in the world. As a result of Duro's innovations in paper bags, the company quickly found itself on the list of Cincinnati Enquirer's top 100 private companies. Starting in 1988, Duro Bag moved from 7th to 5th to 4th, where it would remain a consistent top 10 until 2014. Philanthropy Prior to a kidnapping attempt at age 25, Shor had only ever experienced a handful of seizures. However, due to the harrowing event, his seizures would eventually become an almost daily occurrence. After being diagnosed with Epilepsy, Shor only continued in his career as the CEO of Duro Bag, but to also joined the medical community in its fight against the disorder. In 2002, Shor launched the Charles L Shor Foundation for Epilepsy Research. The foundation has made donations in excess of $1,000,000 to various organizations including University of Cincinnati, Albert Einstein College of Medicine, and Children's Hospital of Cincinnati and is one of the top private foundations in Ohio. Through the foundation, Charles Shor has also heavily contributed to several neurological studies aimed to better understand seizures and the effect of stress on the brain. Though it is a major focus, Charles Shor's philanthropy is not solely reserved for epilepsy. In addition to his support for Epilepsy research, Charles Shor, and the Charles L. Shor Foundation (not to be confused with the Charles L. Shor Foundation for Epilepsy Research) have consistently made contributions to Northern Kentucky University, The Cincinnati Zoo, and more.", "after_revision": "In 1976, Charles graduated from University of Michigan with a degree in economics . In 1977, Charles joined the family business where he worked alongside his father until the elder Shor's death in 1987, at which point Charles took over responsibilities as Duro Bag's chief executive officer . Charles' epilepsy eventually inspired him to start the Charles L. Shor Foundation for Epilepsy Research. Career After graduating from University of Michigan in 1976, Charles joined his family business as a salesman in 1977. After four years with the company, Charles' father named him president of Duro Bag at the age of 27. Fifth Third Banks 's assistance gave Duro Bag the time it needed in order to realign its business strategy, ultimately resulting in Duro Bag's becoming the largest paper bag manufacturing company in the world. During Shor's tenure as chief executive officer and majority owner, Duro Bag made several innovations in the realm of paper bags, including; the first grocery bag made from 100\\% recycled material, the first tear-proof shopping bag (made from DuPont's TyVek material), as well as the first specialty bags for retailers; Tiffany's and Hallmark. Duro Bag purchased 17 competing paper bag companies on its path to becoming the biggest paper bag company in the world. As a result of Duro's innovations in paper bags, the company found itself on the list of Cincinnati Enquirer's top 100 private companies. Starting in 1988, Duro Bag moved from 7th to 5th to 4th, where it remained a consistent top 10 until 2014. Philanthropy Prior to a kidnapping attempt at age 25, Shor had only ever experienced a handful of seizures. However, due to the harrowing event, his seizures became an almost daily occurrence. After being diagnosed with epilepsy, Shor continued in his career as chief executive officer of Duro Bag, and joined the medical community in its fight against the disorder. In 2002, Shor launched the Charles L Shor Foundation for Epilepsy Research. The foundation has made donations in excess of $1,000,000 to various organizations including University of Cincinnati, the Albert Einstein College of Medicine, and the Children's Hospital of Cincinnati and is one of the top private foundations in Ohio. Through the foundation, Charles Shor has also heavily contributed to several neurological studies aimed to better understand seizures and the effect of stress on the brain. Though it is a major focus, Charles Shor's philanthropy is not solely reserved for epilepsy. In addition to his support for epilepsy research, Charles Shor, and the Charles L. Shor Foundation (not to be confused with the Charles L. Shor Foundation for Epilepsy Research) have consistently made contributions to Northern Kentucky University, the Cincinnati Zoo, and more.", "edit_actions": [{"type": "R", "before": "Economics", "after": "economics", "start_char_pos": 72, "end_char_pos": 81}, {"type": "R", "before": "would take", "after": "took", "start_char_pos": 226, "end_char_pos": 236}, {"type": "R", "before": "new CEO", "after": "chief executive officer", "start_char_pos": 273, "end_char_pos": 280}, {"type": "R", "before": "would eventually inspire", "after": "eventually inspired", "start_char_pos": 301, "end_char_pos": 325}, {"type": "R", "before": "would join", "after": "joined", "start_char_pos": 462, "end_char_pos": 472}, {"type": "R", "before": "would name him as President", "after": "named him president", "start_char_pos": 567, "end_char_pos": 594}, {"type": "A", "before": null, "after": "Banks", "start_char_pos": 637, "end_char_pos": 637}, {"type": "R", "before": "would give", "after": "gave", "start_char_pos": 652, "end_char_pos": 662}, {"type": "R", "before": "CEO", "after": "chief executive officer", "start_char_pos": 860, "end_char_pos": 863}, {"type": "R", "before": "would make", "after": "made", "start_char_pos": 893, "end_char_pos": 903}, {"type": "R", "before": "would go on to purchase", "after": "purchased", "start_char_pos": 1175, "end_char_pos": 1198}, {"type": "D", "before": "quickly", "after": null, "start_char_pos": 1361, "end_char_pos": 1368}, {"type": "R", "before": "would remain", "after": "remained", "start_char_pos": 1512, "end_char_pos": 1524}, {"type": "R", "before": "would eventually become", "after": "became", "start_char_pos": 1715, "end_char_pos": 1738}, {"type": "R", "before": "Epilepsy, Shor only", "after": "epilepsy, Shor", "start_char_pos": 1794, "end_char_pos": 1813}, {"type": "R", "before": "the CEO", "after": "chief executive officer", "start_char_pos": 1841, "end_char_pos": 1848}, {"type": "R", "before": "but to also", "after": "and", "start_char_pos": 1862, "end_char_pos": 1873}, {"type": "A", "before": null, "after": "the", "start_char_pos": 2133, "end_char_pos": 2133}, {"type": "A", "before": null, "after": "the", "start_char_pos": 2175, "end_char_pos": 2175}, {"type": "R", "before": "Epilepsy", "after": "epilepsy", "start_char_pos": 2558, "end_char_pos": 2566}, {"type": "R", "before": "The", "after": "the", "start_char_pos": 2775, "end_char_pos": 2778}], "sents_char_pos": [0, 83, 392, 515, 624, 835, 962, 1141, 1165, 1299, 1445, 1556, 1664, 1766, 1937, 2013, 2260, 2433, 2526]}
+{"doc_id": "56121172", "revision_depth": "2", "before_revision": "\u25cf Aalto University, Helsinki, Finland \u25cf Babes-Bolyai University, Cluj-Napoca, Romania \u25cf Caucasus University, Tbilisi, Georgia \u25cf Charles University, Prague, Czech Republic \u25cf Delhi University, New Delhi, India \u25cf FGV S\u00e3o Paulo, S\u00e3o Paulo, Brazil \u25cf University of Glasgow, Glasgow, United Kingdom \u25cf Graduate Institute, Geneva, Switzerland \u25cf HEC Paris, Paris, France \u25cf Imperial College London, London, United Kingdom \u25cf Indian Institute of Management Calcutta, Calcutta, India \u25cf Koc University, Istanbul, Turkey \u25cf London School of Economics and Political Sciences, London, UK \u25cf NOVA School of Management, Lisbon, Portugal \u25cf Partium Christian University, Oradea, Romania \u25cf Rotterdam School of Management, Rotterdam, The Netherlands %DIFDELCMD < %DIFDELCMD < %%% \u25cf Sapientia University, Miercurea Ciuc, Romania %DIFDELCMD < %DIFDELCMD < %%% \u25cf Solvay Business School, Brussels, Belgium %DIFDELCMD < %DIFDELCMD < %%% \u25cf University of Cologne, Cologne, Germany %DIFDELCMD < %DIFDELCMD < %%% \u25cf University of Ljubljana, Ljubljana, Slovenia %DIFDELCMD < %DIFDELCMD < %%% \u25cf University of Oslo, Oslo, Norway %DIFDELCMD < %DIFDELCMD < %%% \u25cf University of Pretoria, Pretoria, South Africa %DIFDELCMD < %DIFDELCMD < %%% \u25cf University of Sao Paulo, Sao Paolo, Brazil %DIFDELCMD < %DIFDELCMD < %%% \u25cf University of St. Gallen, St. Gallen, Switzerland %DIFDELCMD < %DIFDELCMD < %%% \u25cf Warsaw School of Economics, Warsaw, Poland %DIFDELCMD < %DIFDELCMD < %%% \u25cf Buenos Aires, Argentina", "after_revision": " Aalto University, Helsinki, Finland Babes-Bolyai University, Cluj-Napoca, Romania Caucasus University, Tbilisi, Georgia Charles University, Prague, Czech Republic Delhi University, New Delhi, India FGV S\u00e3o Paulo, S\u00e3o Paulo, Brazil University of Glasgow, Glasgow, United Kingdom Graduate Institute, Geneva, Switzerland HEC Paris, Paris, France Imperial College London, London, United Kingdom Indian Institute of Management Calcutta, Calcutta, India Koc University, Istanbul, Turkey London School of Economics and Political Sciences, London, UK NOVA School of Management, Lisbon, Portugal Partium Christian University, Oradea, Romania Rotterdam School of Management, Rotterdam, The Netherlands %DIFDELCMD < %DIFDELCMD < %%% Sapientia University, Miercurea Ciuc, Romania %DIFDELCMD < %DIFDELCMD < %%% Solvay Business School, Brussels, Belgium %DIFDELCMD < %DIFDELCMD < %%% University of Cologne, Cologne, Germany %DIFDELCMD < %DIFDELCMD < %%% University of Ljubljana, Ljubljana, Slovenia %DIFDELCMD < %DIFDELCMD < %%% University of Oslo, Oslo, Norway %DIFDELCMD < %DIFDELCMD < %%% University of Pretoria, Pretoria, South Africa %DIFDELCMD < %DIFDELCMD < %%% University of Sao Paulo, Sao Paolo, Brazil %DIFDELCMD < %DIFDELCMD < %%% University of St. Gallen, St. Gallen, Switzerland %DIFDELCMD < %DIFDELCMD < %%% Warsaw School of Economics, Warsaw, Poland %DIFDELCMD < %DIFDELCMD < %%% Buenos Aires, Argentina", "edit_actions": [{"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 0, "end_char_pos": 1}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 38, "end_char_pos": 39}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 86, "end_char_pos": 87}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 126, "end_char_pos": 127}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 171, "end_char_pos": 172}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 208, "end_char_pos": 209}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 243, "end_char_pos": 244}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 292, "end_char_pos": 293}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 334, "end_char_pos": 335}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 361, "end_char_pos": 362}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 411, "end_char_pos": 412}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 470, "end_char_pos": 471}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 505, "end_char_pos": 506}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 569, "end_char_pos": 570}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 615, "end_char_pos": 616}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 663, "end_char_pos": 664}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 754, "end_char_pos": 755}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 832, "end_char_pos": 833}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 906, "end_char_pos": 907}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 978, "end_char_pos": 979}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 1055, "end_char_pos": 1056}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 1120, "end_char_pos": 1121}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 1199, "end_char_pos": 1200}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 1274, "end_char_pos": 1275}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 1356, "end_char_pos": 1357}, {"type": "D", "before": "\u25cf", "after": null, "start_char_pos": 1431, "end_char_pos": 1432}], "sents_char_pos": [0, 19, 64, 77, 108, 147, 190, 201, 224, 235, 267, 313, 346, 387, 453, 487, 557, 597, 646, 696, 707, 777, 793, 857, 930, 1004]}
+{"doc_id": "56140", "revision_depth": "1", "before_revision": "The history of Norway has been influenced to an extraordinary degree by the terrain and the climate of the region. About 10,000 BC, following the retreat of the great inland ice sheets, the earliest inhabitants migrated north into the territory which is now Norway. They traveled steadily northwards along the coastal areas, warmed by the Gulf Stream, where life was more bearable. In order to survive they fished and hunted reindeer (and other prey). Between 5,000 BC and 4,000 BC the earliest agricultural settlements appeared around the Oslofjord. Gradually, between 1500 BC and 500 BC, these agricultural settlements spread into the southern areas of Norway \u2013 whilst the inhabitants of the northern regions continued to hunt and fish. Margaret pursued a centralising policy which inevitably favoured Denmark, because it had a greater population than Norway and Sweden combined.Derry p.75 Margaret also granted trade privileges to the Hanseatic merchants of L\u00fcbeck in Bergen in return for recognition of her right to rule, and these hurt the Norwegian economy. The Hanseatic merchants formed a state within a state in Bergen for generations.Derry pp. 77-78 Even worse were the pirates, the \"Victual Brothers\", who launched three devastating raids on the port (the last in 1427).Derry p.77 Norway slipped ever more to the background under the Oldenburg dynasty (established 1448). There was one revolt under Knut Alvsson in 1502.Derry pp. 81-82 Norwegians had some affection for King Christian II, who resided in the country for several years. Norway did not take any part in the events which led to Swedish independence from Denmark in the 1520s.Derry pp.83 -84 Denmark\u2013Norway Sweden was able to pull out of the Kalmar Union in 1523, thus creating Denmark\u2013Norway under the rule of a king in Copenhagen. Frederick I of Denmark favoured Martin Luther's Reformation, but it was not popular in Norway, where the Church was the one national institution and the country was too poor for the clergy to be very corrupt. Initially, Frederick agreed not to try to introduce Protestantism to Norway but in 1529 he changed his mind. Norwegian resistance was led by Olav Engelbrektsson, Archbishop of Trondheim, who invited the old king Christian II back from his exile in the Netherlands. Christian returned but his army was defeated and Christian spent the rest of his life in prison. When Frederick died and a three-way war of succession broke out between the supporters of his eldest son Christian (III), his younger Catholic brother Hans and the followers of Christian II. Olaf Engelbrektsson again tried to lead a Catholic Norwegian resistance movement. Christian III triumphed and Engelbrektsson went into exile and, in 1536/1537, Christian demoted Norway from an independent kingdom to a puppet state.Derry pp.84 -89 The Reformation was imposed in 1537, strengthening the king's power. All church valuables were sent to Copenhagen and the forty percent of the land which was owned by the church came under the control of the king. Danish was introduced as a written language, although Norwegian remained distinct dialects. Professional administration was now needed and power shifted from the provincial nobility to the royal administration: district stipendiary magistrates were appointed as judges and the sheriffs became employees of the crown rather than of the local nobility. In 1572, a governor-general was appointed for Norway with a seat at Akershus Fortress in Oslo. From the 1620s professional military officers were employed.Stenersen: 50 The 17th century saw a series of wars between Denmark\u2013Norway and Sweden. The Kalmar War between 1611 and 1613 saw 8,000 Norwegian peasants conscripted. Despite lack of training, Denmark\u2013Norway won and Sweden abandoned its claims to the land between Tysfjord and Varangerfjord. With the Danish participation in the Thirty Years' War in 1618\u201348, a new conscription system was created in which the country was subdivided into 6,000 ledg, each required to support one soldier.Stenersen: 53 Denmark\u2013Norway lost the war and was forced to cede J\u00e4mtland and H\u00e4rjedalen to Sweden. The Second Northern War in 1657 to 1660 resulted in Bohusl\u00e4n being ceded to Sweden. The Danish monarchy became an absolutist and hereditary one in Norway in 1661.Derry p. 100 A new administrative system was introduced. Departments organized by portfolio were established in Copenhagen, while Norway was divided into counties, each led by a district governor, and further subdivided into bailiwicks. About 1,600 government officials were appointed throughout the country.Stenersen: 56 Ulrik Fredrik Gyldenl\u00f8ve was the most famous viceroy of Norway ( 1664-1699 ).Derry p.102 Battle of Alv\u00f8en between the frigate and Norwegian gunboats near Bergen in 1808 The population of Norway increased from 150,000 in 1500 to 900,000 in 1800. By 1500 most deserted farms were repossessed. The period under absolutism increased the ratio of self-owning farmers from twenty to fifty percent, largely through sales of crown land to finance the lost wars. Crofts became common in the absolutism period, especially in Eastern Norway and Tr\u00f8ndelag, with the smallholder living at the mercy of the farmer.Stenersen: 57 There were 48,000 smallholders in 1800. Compared to Denmark, taxes were very low in Norway, typically at four to ten percent of the harvest, although the number of farms per legd decreased from four to two in the 1670s. Confirmation was introduced in 1736; as it required people to read, elementary education was introduced.Stenersen: 58 The Norwegian economy improved with the introduction of the water-driven saw in the early 16th century. Norway had huge resources of timber but did not have the means to exploit much of it in the Middle Ages as only hand-tools were available. The new saw mills which sprang up in the fjords changed this. In 1544 a deal was struck with the Netherlands (then part of the Holy Roman Empire) and the Dutch controlled the export of Norwegian timber for the next 150 years. Amsterdam was built on piles from Norway. Tree-felling was done in the winter when farm-work was impossible and it was easy to get the felled trees across the snow to the rivers. In the spring, the logs floated down the rivers to the saw mills by the sea.Derry pp.91 -92 By the mid-16th century the power of the Hanseatic League in Bergen was broken; though German craftsmen remained, they had to accept Danish rule.Derry pp.92 -93 Many Norwegians earned a living as sailors in foreign ships, especially Dutch ones. The crews in both sides of the Anglo-Dutch Wars contained Norwegians.Derry pp.104 -105 Norway benefitted from the many European wars of the 18th century. As a neutral power it was able to expand its share of the shipping market. It also supplied timber to foreign navies.Derry p.114 Christian Frederik, heir to the Danish and Norwegian crowns, had since 1813 been governor-general of Norway. He spearheaded the Norwegian resistance against the Kiel Treaty and planned to claim the throne as the legitimate heir. He traveled to Trondheim to gain support for his person, and then assembled twenty-one prominent citizens at Eidsvoll on 16 February 1814 to discuss his plans. They rejected a new absolute monarchy and advised him instead to convoke a constituent assembly to draw up a liberal constitution and decide the form of government. Representatives from the entire country were elected to meet at Eidsvoll.Stenersen: 72 The 112 members of the Constituent Assembly gathered and, after six weeks of discussion, concluded the work on the Constitution of Norway on 17 May 1814. Power would be split between the king \u2014 a position to which Christian Frederik was appointed \u2014 and the Parliament of Norway.Stenersen: 74 The Swedish army under Crown prince Carl Johan of Sweden invaded Norway in late July; at the armistice Convention of Moss on 14 August Norway accepted to enter a personal union with Sweden on equal terms, while Sweden accepted the Norwegian Constitution and separate institutions in both states. King Christian Frederik agreed to convoke an extraordinary parliament to revise the Constitution accordingly, and then abdicate. The parliament was convened in Christiania on 7 October, and the necessary amendments were resolved on 4 November 1814. On the same day, king Charles XIII of Sweden was elected king of Norway, thereby establishing the Union.Stenersen: 75 Scenes from the Norwegian Campaign in 1940 From the start of World War II in 1939, Norway maintained a strict neutrality.Stenersen: 117 Both Britain and Germany realized the strategic location; both made plans to invade Norway, regardless of Norwegian opposition. The Germans struck first and attacked Norway on April 9 , 1940. After furious battles with the Norwegians and British forces, Germany prevailed and controlled Norway until the end of the war. The German goal was to use Norway to control access to the North Sea and the Atlantic, and to station air and naval forces to stop convoys from Britain to the USSR. The government in exile, including the royal family, escaped to London. Politics were suspended and the government coordinated action with the Allies, retained control of a worldwide diplomatic and consular service, and operated the huge Norwegian merchant marine. It organized and supervised the resistance within Norway. One long-term impact was the abandonment of a traditional Scandinavian policy of neutrality; Norway became a founding member of NATO in 1949.Erik J. Friis, \"The Norwegian Government-In-Exile, 1940-45 \" in Scandinavian Studies. Essays Presented to Dr. Henry Goddard Leach on the Occasion of his Eighty-fifth Birthday (1965), p422-444. Norway at the start of the war had the world's fourth largest merchant fleet, at 4.8 million tons, including a fifth of the world's oil tankers. The Germans captured about 20\\% of the fleet but the remainder, about 1000 ships, were taken over by the government. Although half the ships were sunk, the earnings paid the expenses of the government.I.C.B Dear and M.R.D. Foot, Oxford Companion to World War II (1995) pp 818-23Johs Andenaes, Norway and the Second World War (1966) Quisling regime Vidkun Quisling proclaimed himself prime minister and appointed a government with members from the National Unity Party.Stenersen: 121 He was quickly set aside and replaced by Josef Terboven, but reinstated in 1942. The Norwegian Campaign continued in Northern Norway and the government fled to London on 7 June.Stenersen: 122 The German occupation resulted in a brutalization of society and 30,000 people were imprisoned.Stenersen: 124 55,000 people joined the National Unity Party, which became the only legal party. But the nazification process failed after the Supreme Court resigned and both organized sports and bishops boycotted the new regime.Stenersen: 125 A resistance movement was established and was coordinated from London from 1943.Stenersen: 127 Stokker reports that hostile humour against the Germans helped maintain morale and build a wall against collaboration. Jokes made the rounds dripping with contempt for the oppressors, ridicule of Nazi ideology, stressing the cruelty of the Nazis and mocking their inflated self-image. People on the street asked, \"Do you know the difference between the Nazis and a bucket of manure? The bucket.\" In Post Office lines they explained, \"It's rumored that we're getting new stamps bearing Quisling's likeness, but distribution has been delayed because no one knows which side to spit on.\" The jokes worked to educate Norwegians about the occupation, and encourage a sense of solidarity.Kathleen Stokker, \"Heil Hitler; God Save the King: Jokes and the Norwegian Resistance 1940-1945 ,\" Western Folklore (1991) 50#2 pp. 171-190 in JSTOR At the time of German surrender on 8 May 1945, there were 360,000 German soldiers in the country.Stenersen: 130 Postwar 1945-1950 A legal purge took place in Norway after WWII in which 53,000 people were sentenced for treason and 25 were executed. The post-war years saw an increased interest in Scandinavism, resulting in Scandinavian Airlines System in 1946, the Nordic Council in 1952Stenersen: 143 and the Nordic Passport Union along with the metric system being introduced. Reconstruction after the war gave Norway the highest economic growth in Europe until 1950, partly created through rationing private consumption allowing for higher industrial investments. The Labor Party retained power throughout the period and maintained a policy of public planning.Stenersen: 134 The University of Bergen was created in 1946.Thuesen: 335 The 1950s saw a boom in construction of hydroelectricityStenersen: 137 and the state built the steel mill Norsk Jernverk and two aluminum works.Stenersen: 135 State banks such as the State Housing Bank, the State Educational Loan Fund and Postbanken allowed for governmental control over private debt. Oslo hosted the 1952 Winter Olympics.Stenersen: 138 Marshall Plan Norway joined the Marshall Plan (\"ERP\") in 1947, receiving US$400 million in American support. Given the business background of the Marshall Plan's American leaders, their readiness to work with the Norwegian Labor government's ERP Council disappointed the conservative Norwegian business community. It was represented by the major business organizations, the Norges Industriforbund and the Norsk Arbeidsgiverforening. While reluctant to work with the government, Norwegian business leaders also recognized the dangers of appearing to obstruct the implementation of the Marshall Plan. American acceptance of a role for government in economic planning reflected their New Deal reformist orientation. The opportunities for mediation between conservative Norwegian business interests and the government that arose in the course of administering the Marshall Plan helped establish a base for the emergence of Norwegian corporatism in the 1950s.Kai R. Pedersen, \"Norwegian Business and the Marshall Plan, 1947-1952. \" Scandinavian Journal of History 1996 21(4): 285-301. Issn: 0346-8755 Bibliography Boyesen, Hjalmar Hjorth. The History of Norway (2011) Derry, T.K. A Short History of Norway (George Allen and Unwin, 1968 edition) Falls, Cyril. \"The Independence of Norway\" History Today (Dec 1955) 5#12 pp 833\u2013838, covers 1814\u20131905. Haug, Karl Erik. \"Norway\", in: 1914-1918-online. International Encyclopedia of the First World War, ed. by Ute Daniel, et al. (Freie Universit\u00e4t Berlin, 2016). online Larsen, Karen. A history of Norway (Princeton University Press, 1967) 576pp online Myhre, Jan Eivind. \"Social History in Norway in the 1970s and Beyond: Evolution and Professionalisation.\" Contemporary European History 28.3 (2019): 409-421 online Midgaard, John. A brief history of Norway (1963) online Salmon, Patrick. Scandinavia and the Great Powers 1890-1940 (2002) excerpt Sejersted, Francis. The Age of Social Democracy: Norway and Sweden in the Twentieth Century (Princeton University Press; 2014) 543 pages; the history of the Scandinavian social model as it developed after the separation of Norway and Sweden in 1905. Stenersen, Ivar, and Oivind Libaek. History of Norway from the Ice Age to the Oil Age (3rd ed. Dinamo Forlag 2007) Vinje, Victor Condorcet (2014) The Versatile Farmers of the North; The Struggle of Norwegian Yeomen for Economic Reforms and Political Power, 1750-1814 (Nisus Publications).", "after_revision": "The history of Norway has been influenced to an extraordinary degree by the terrain and the climate of the region. About 10,000 BC, following the retreat of the great inland ice sheets, the earliest inhabitants migrated north into the territory which is now Norway. They traveled steadily northwards along the coastal areas, warmed by the Gulf Stream, where life was more bearable. To survive they fished and hunted reindeer (and other prey). Between 5,000 BC and 4,000 BC the earliest agricultural settlements appeared around the Oslofjord. Gradually, between 1500 BC and 500 BC, these agricultural settlements spread into the southern areas of Norway \u2013 whilst the inhabitants of the northern regions continued to hunt and fish. Margaret pursued a centralising policy which inevitably favoured Denmark, because it had a greater population than Norway and Sweden combined.Derry p.75 Margaret also granted trade privileges to the Hanseatic merchants of L\u00fcbeck in Bergen in return for recognition of her right to rule, and these hurt the Norwegian economy. The Hanseatic merchants formed a state within a state in Bergen for generations.Derry pp. 77\u201378 Even worse were the pirates, the \"Victual Brothers\", who launched three devastating raids on the port (the last in 1427).Derry p.77 Norway slipped ever more to the background under the Oldenburg dynasty (established 1448). There was one revolt under Knut Alvsson in 1502.Derry pp. 81\u201382 Norwegians had some affection for King Christian II, who resided in the country for several years. Norway did not take any part in the events which led to Swedish independence from Denmark in the 1520s.Derry pp.83 \u201384 Denmark\u2013Norway Sweden was able to pull out of the Kalmar Union in 1523, thus creating Denmark\u2013Norway under the rule of a king in Copenhagen. Frederick I of Denmark favoured Martin Luther's Reformation, but it was not popular in Norway, where the Church was the one national institution and the country was too poor for the clergy to be very corrupt. Initially, Frederick agreed not to try to introduce Protestantism to Norway but in 1529 he changed his mind. Norwegian resistance was led by Olav Engelbrektsson, Archbishop of Trondheim, who invited the old king Christian II back from his exile in the Netherlands. Christian returned but his army was defeated and Christian spent the rest of his life in prison. When Frederick died and a three-way war of succession broke out between the supporters of his eldest son Christian (III), his younger Catholic brother Hans and the followers of Christian II. Olaf Engelbrektsson again tried to lead a Catholic Norwegian resistance movement. Christian III triumphed and Engelbrektsson went into exile and, in 1536/1537, Christian demoted Norway from an independent kingdom to a puppet state.Derry pp.84 \u201389 The Reformation was imposed in 1537, strengthening the king's power. All church valuables were sent to Copenhagen and the forty percent of the land which was owned by the church came under the control of the king. Danish was introduced as a written language, although Norwegian remained distinct dialects. Professional administration was now needed and power shifted from the provincial nobility to the royal administration: district stipendiary magistrates were appointed as judges and the sheriffs became employees of the crown rather than of the local nobility. In 1572, a governor-general was appointed for Norway with a seat at Akershus Fortress in Oslo. From the 1620s professional military officers were employed.Stenersen: 50 The 17th century saw a series of wars between Denmark\u2013Norway and Sweden. The Kalmar War between 1611 and 1613 saw 8,000 Norwegian peasants conscripted. Despite lack of training, Denmark\u2013Norway won and Sweden abandoned its claims to the land between Tysfjord and Varangerfjord. With the Danish participation in the Thirty Years' War in 1618\u201348, a new conscription system was created in which the country was subdivided into 6,000 ledg, each required to support one soldier.Stenersen: 53 Denmark\u2013Norway lost the war and was forced to cede J\u00e4mtland and H\u00e4rjedalen to Sweden. The Second Northern War in 1657 to 1660 resulted in Bohusl\u00e4n being ceded to Sweden. The Danish monarchy became an absolutist and hereditary one in Norway in 1661.Derry p. 100 A new administrative system was introduced. Departments organized by portfolio were established in Copenhagen, while Norway was divided into counties, each led by a district governor, and further subdivided into bailiwicks. About 1,600 government officials were appointed throughout the country.Stenersen: 56 Ulrik Fredrik Gyldenl\u00f8ve was the most famous viceroy of Norway ( 1664\u20131699 ).Derry p.102 Battle of Alv\u00f8en between the frigate and Norwegian gunboats near Bergen in 1808 The population of Norway increased from 150,000 in 1500 to 900,000 in 1800. By 1500 most deserted farms were repossessed. The period under absolutism increased the ratio of self-owning farmers from twenty to fifty percent, largely through sales of crown land to finance the lost wars. Crofts became common in the absolutism period, especially in Eastern Norway and Tr\u00f8ndelag, with the smallholder living at the mercy of the farmer.Stenersen: 57 There were 48,000 smallholders in 1800. Compared to Denmark, taxes were very low in Norway, typically at four to ten percent of the harvest, although the number of farms per legd decreased from four to two in the 1670s. Confirmation was introduced in 1736; as it required people to read, elementary education was introduced.Stenersen: 58 The Norwegian economy improved with the introduction of the water-driven saw in the early 16th century. Norway had huge resources of timber but did not have the means to exploit much of it in the Middle Ages as only hand-tools were available. The new saw mills which sprang up in the fjords changed this. In 1544 a deal was struck with the Netherlands (then part of the Holy Roman Empire) and the Dutch controlled the export of Norwegian timber for the next 150 years. Amsterdam was built on piles from Norway. Tree-felling was done in the winter when farm-work was impossible and it was easy to get the felled trees across the snow to the rivers. In the spring, the logs floated down the rivers to the saw mills by the sea.Derry pp.91 \u201392 By the mid-16th century the power of the Hanseatic League in Bergen was broken; though German craftsmen remained, they had to accept Danish rule.Derry pp.92 \u201393 Many Norwegians earned a living as sailors in foreign ships, especially Dutch ones. The crews in both sides of the Anglo-Dutch Wars contained Norwegians.Derry pp.104 \u2013105 Norway benefitted from the many European wars of the 18th century. As a neutral power it was able to expand its share of the shipping market. It also supplied timber to foreign navies.Derry p.114 Christian Frederik, heir to the Danish and Norwegian crowns, had since 1813 been governor-general of Norway. He spearheaded the Norwegian resistance against the Kiel Treaty and planned to claim the throne as the legitimate heir. He traveled to Trondheim to gain support for his person, and then assembled twenty-one prominent citizens at Eidsvoll on 16 February 1814 to discuss his plans. They rejected a new absolute monarchy and advised him instead to convoke a constituent assembly to draw up a liberal constitution and decide the form of government. Representatives from the entire country were elected to meet at Eidsvoll.Stenersen: 72 The 112 members of the Constituent Assembly gathered and, after six weeks of discussion, concluded the work on the Constitution of Norway on 17 May 1814. Power would be split between the king \u2013 a position to which Christian Frederik was appointed \u2013 and the Parliament of Norway.Stenersen: 74 The Swedish army under Crown prince Carl Johan of Sweden invaded Norway in late July; at the armistice Convention of Moss on 14 August Norway accepted to enter a personal union with Sweden on equal terms, while Sweden accepted the Norwegian Constitution and separate institutions in both states. King Christian Frederik agreed to convoke an extraordinary parliament to revise the Constitution accordingly, and then abdicate. The parliament was convened in Christiania on 7 October, and the necessary amendments were resolved on 4 November 1814. On the same day, king Charles XIII of Sweden was elected king of Norway, thereby establishing the Union.Stenersen: 75 Scenes from the Norwegian Campaign in 1940 From the start of World War II in 1939, Norway maintained a strict neutrality.Stenersen: 117 Both Britain and Germany realized the strategic location; both made plans to invade Norway, regardless of Norwegian opposition. The Germans struck first and attacked Norway on 9 April 1940. After furious battles with the Norwegians and British forces, Germany prevailed and controlled Norway until the end of the war. The German goal was to use Norway to control access to the North Sea and the Atlantic, and to station air and naval forces to stop convoys from Britain to the USSR. The government in exile, including the royal family, escaped to London. Politics were suspended and the government coordinated action with the Allies, retained control of a worldwide diplomatic and consular service, and operated the huge Norwegian merchant marine. It organized and supervised the resistance within Norway. One long-term impact was the abandonment of a traditional Scandinavian policy of neutrality; Norway became a founding member of NATO in 1949.Erik J. Friis, \"The Norwegian Government-In-Exile, 1940\u201345 \" in Scandinavian Studies. Essays Presented to Dr. Henry Goddard Leach on the Occasion of his Eighty-fifth Birthday (1965), p422-444. Norway at the start of the war had the world's fourth largest merchant fleet, at 4.8 million tons, including a fifth of the world's oil tankers. The Germans captured about 20\\% of the fleet but the remainder, about 1000 ships, were taken over by the government. Although half the ships were sunk, the earnings paid the expenses of the government.I.C.B Dear and M.R.D. Foot, Oxford Companion to World War II (1995) pp 818\u201323Johs Andenaes, Norway and the Second World War (1966) Quisling regime Vidkun Quisling proclaimed himself prime minister and appointed a government with members from the National Unity Party.Stenersen: 121 He was quickly set aside and replaced by Josef Terboven, but reinstated in 1942. The Norwegian Campaign continued in Northern Norway and the government fled to London on 7 June.Stenersen: 122 The German occupation resulted in a brutalization of society and 30,000 people were imprisoned.Stenersen: 124 55,000 people joined the National Unity Party, which became the only legal party. But the nazification process failed after the Supreme Court resigned and both organized sports and bishops boycotted the new regime.Stenersen: 125 A resistance movement was established and was coordinated from London from 1943.Stenersen: 127 Stokker reports that hostile humour against the Germans helped maintain morale and build a wall against collaboration. Jokes made the rounds dripping with contempt for the oppressors, ridicule of Nazi ideology, stressing the cruelty of the Nazis and mocking their inflated self-image. People on the street asked, \"Do you know the difference between the Nazis and a bucket of manure? The bucket.\" In Post Office lines they explained, \"It's rumored that we're getting new stamps bearing Quisling's likeness, but distribution has been delayed because no one knows which side to spit on.\" The jokes worked to educate Norwegians about the occupation, and encourage a sense of solidarity.Kathleen Stokker, \"Heil Hitler; God Save the King: Jokes and the Norwegian Resistance 1940\u20131945 ,\" Western Folklore (1991) 50#2 pp. 171\u2013190 in JSTOR At the time of German surrender on 8 May 1945, there were 360,000 German soldiers in the country.Stenersen: 130 Postwar 1945\u20131950 A legal purge took place in Norway after WWII in which 53,000 people were sentenced for treason and 25 were executed. The post-war years saw an increased interest in Scandinavism, resulting in Scandinavian Airlines System in 1946, the Nordic Council in 1952Stenersen: 143 and the Nordic Passport Union along with the metric system being introduced. Reconstruction after the war gave Norway the highest economic growth in Europe until 1950, partly created through rationing private consumption allowing for higher industrial investments. The Labor Party retained power throughout the period and maintained a policy of public planning.Stenersen: 134 The University of Bergen was created in 1946.Thuesen: 335 The 1950s saw a boom in construction of hydroelectricityStenersen: 137 and the state built the steel mill Norsk Jernverk and two aluminum works.Stenersen: 135 State banks such as the State Housing Bank, the State Educational Loan Fund and Postbanken allowed for governmental control over private debt. Oslo hosted the 1952 Winter Olympics.Stenersen: 138 Marshall Plan Norway joined the Marshall Plan (\"ERP\") in 1947, receiving US$400 million in American support. Given the business background of the Marshall Plan's American leaders, their readiness to work with the Norwegian Labor government's ERP Council disappointed the conservative Norwegian business community. It was represented by the major business organizations, the Norges Industriforbund and the Norsk Arbeidsgiverforening. While reluctant to work with the government, Norwegian business leaders also recognized the dangers of appearing to obstruct the implementation of the Marshall Plan. American acceptance of a role for government in economic planning reflected their New Deal reformist orientation. The opportunities for mediation between conservative Norwegian business interests and the government that arose in the course of administering the Marshall Plan helped establish a base for the emergence of Norwegian corporatism in the 1950s.Kai R. Pedersen, \"Norwegian Business and the Marshall Plan, 1947\u20131952. \" Scandinavian Journal of History 1996 21(4): 285\u2013301. Issn: 0346-8755 Bibliography Boyesen, Hjalmar Hjorth. The History of Norway (2011) Derry, T.K. A Short History of Norway (George Allen and Unwin, 1968 edition) Falls, Cyril. \"The Independence of Norway\" History Today (Dec 1955) 5#12 pp 833\u2013838, covers 1814\u20131905. Haug, Karl Erik. \"Norway\", in: 1914-1918-online. International Encyclopedia of the First World War, ed. by Ute Daniel, et al. (Freie Universit\u00e4t Berlin, 2016). online Larsen, Karen. A history of Norway (Princeton University Press, 1967) 576pp online Myhre, Jan Eivind. \"Social History in Norway in the 1970s and Beyond: Evolution and Professionalisation.\" Contemporary European History 28.3 (2019): 409\u2013421 online Midgaard, John. A brief history of Norway (1963) online Salmon, Patrick. Scandinavia and the Great Powers 1890\u20131940 (2002) excerpt Sejersted, Francis. The Age of Social Democracy: Norway and Sweden in the Twentieth Century (Princeton University Press; 2014) 543 pages; the history of the Scandinavian social model as it developed after the separation of Norway and Sweden in 1905. Stenersen, Ivar, and Oivind Libaek. History of Norway from the Ice Age to the Oil Age (3rd ed. Dinamo Forlag 2007) Vinje, Victor Condorcet (2014) The Versatile Farmers of the North; The Struggle of Norwegian Yeomen for Economic Reforms and Political Power, 1750\u20131814 (Nisus Publications).", "edit_actions": [{"type": "R", "before": "In order to", "after": "To", "start_char_pos": 382, "end_char_pos": 393}, {"type": "R", "before": "77-78", "after": "77\u201378", "start_char_pos": 1154, "end_char_pos": 1159}, {"type": "R", "before": "81-82", "after": "81\u201382", "start_char_pos": 1441, "end_char_pos": 1446}, {"type": "R", "before": "-84", "after": "\u201384", "start_char_pos": 1661, "end_char_pos": 1664}, {"type": "R", "before": "-89", "after": "\u201389", "start_char_pos": 2811, "end_char_pos": 2814}, {"type": "R", "before": "1664-1699", "after": "1664\u20131699", "start_char_pos": 4670, "end_char_pos": 4679}, {"type": "R", "before": "-92", "after": "\u201392", "start_char_pos": 6293, "end_char_pos": 6296}, {"type": "R", "before": "-93", "after": "\u201393", "start_char_pos": 6454, "end_char_pos": 6457}, {"type": "R", "before": "-105", "after": "\u2013105", "start_char_pos": 6624, "end_char_pos": 6628}, {"type": "R", "before": "\u2014", "after": "\u2013", "start_char_pos": 7658, "end_char_pos": 7659}, {"type": "R", "before": "\u2014", "after": "\u2013", "start_char_pos": 7713, "end_char_pos": 7714}, {"type": "D", "before": "April", "after": null, "start_char_pos": 8733, "end_char_pos": 8738}, {"type": "R", "before": ",", "after": "April", "start_char_pos": 8741, "end_char_pos": 8742}, {"type": "R", "before": "1940-45", "after": "1940\u201345", "start_char_pos": 9557, "end_char_pos": 9564}, {"type": "R", "before": "818-23Johs", "after": "818\u201323Johs", "start_char_pos": 10116, "end_char_pos": 10126}, {"type": "R", "before": "1940-1945", "after": "1940\u20131945", "start_char_pos": 11721, "end_char_pos": 11730}, {"type": "R", "before": "171-190", "after": "171\u2013190", "start_char_pos": 11767, "end_char_pos": 11774}, {"type": "R", "before": "1945-1950", "after": "1945\u20131950", "start_char_pos": 11904, "end_char_pos": 11913}, {"type": "R", "before": "1947-1952.", "after": "1947\u20131952.", "start_char_pos": 13988, "end_char_pos": 13998}, {"type": "R", "before": "285-301.", "after": "285\u2013301.", "start_char_pos": 14045, "end_char_pos": 14053}, {"type": "R", "before": "409-421", "after": "409\u2013421", "start_char_pos": 14716, "end_char_pos": 14723}, {"type": "R", "before": "1890-1940", "after": "1890\u20131940", "start_char_pos": 14837, "end_char_pos": 14846}, {"type": "R", "before": "1750-1814", "after": "1750\u20131814", "start_char_pos": 15369, "end_char_pos": 15378}], "sents_char_pos": [0, 114, 265, 381, 451, 550, 738, 881, 1063, 1144, 1281, 1382, 1431, 1545, 1649, 1805, 2014, 2123, 2279, 2376, 2567, 2649, 2799, 2883, 3028, 3120, 3379, 3474, 3535, 3621, 3700, 3825, 4021, 4120, 4204, 4283, 4339, 4519, 4591, 4682, 4849, 4895, 5058, 5205, 5258, 5438, 5475, 5543, 5660, 5799, 5861, 6025, 6067, 6204, 6281, 6376, 6442, 6541, 6611, 6695, 6770, 6813, 6933, 7053, 7213, 7378, 7452, 7619, 7744, 7843, 8053, 8182, 8302, 8407, 8542, 8614, 8684, 8748, 8876, 9041, 9113, 9306, 9364, 9457, 9506, 9591, 9615, 9698, 9843, 9960, 10045, 10312, 10407, 10504, 10614, 10710, 10843, 10938, 11071, 11237, 11335, 11348, 11537, 11635, 11666, 11881, 12031, 12262, 12450, 12547, 12607, 12764, 12921, 12959, 13082, 13287, 13406, 13572, 13686, 13928, 13998, 14053, 14107, 14227, 14316, 14333, 14365, 14498, 14585, 14672, 14746, 14803, 14881, 14982, 14999, 15111, 15147, 15206, 15293]}
+{"doc_id": "5649261", "revision_depth": "1", "before_revision": "354x354px|Japan- North Korea on World Map The Japan\u2013North Korea Pyongyang Declaration was signed in 2002, and was the result of a systematic Japan\u2013North Korea summit meeting. Pyongyang declaration was initiated with the goal of creating diplomacy between the two nations where previously this was non-existent due to historic hostility. The aim of the declaration was to provide low-interest long term loans to North Korea as well as economic assistance ( including humanitarian aid ) in accordance with the moratorium of nuclear missile development which has been in place since 1999. However, in current developments this category of the agreement has been breached. (See North Korea and weapons of mass destruction). The Japanese government was aiming to achieve the return of Japanese abducted citizens which prior to the declaration was unacknowledged. The Pyongyang Declaration named after the North Korean capital, was a pinnacle motion in order to create an effective and fair relationship between the two countries. The declaration resulted in a temporary restraint on nuclear programs from North Korea, the return of 5 Japanese abductees occurring in the 1970s and 1980s and the pledge of economic assistance once the abductees were returned. From 2017, there have been consistent follow-up summit meetings due to breaches within the declaration leading to the requirement of mediators to maintain a mutually beneficial declaration for the respective countries . 1904-1905 Japanese army during the Russo-Japanese War ending in their victory in the year 1905. Following the end of the Russo-Japanese war led to the Japanese troops defeating Russia despite being inferior in numbers and resources and led to the 1910 annexation of Korea. For over thirty five years the Korean peninsula was ruled mercilessly by the Japanese colonisation. The conclusion of World War II ended in a loss for Japan and therefore were unanimously removed of all their colonial possessions which Koreawas a part of. Koreawas under temporary ally control ; this led to the pinnacle hostility and the Korean War (1950-1953). Once separated into South and North Korea the anti-japan tendencies within North Korea escalated. 1991-1992 North Korean National Flag adopted following liberation As there was an unstable relationship between the two countries between 1991 and 1992, there were approximately eight bilateral discussions with the aim of creating diplomatic relations between Japan and North Korea. The basis of the declaration is built on the expectation of maintaining goodwill and cooperation between the two countries. The main agenda of this meeting was Japan wanting a resolution to key incidents including the abduction of Japanese citizens housing in North Korea. These \u201cZainichi Koreans\u201d experienced systematic prejudice within Japan, to the point of loss of nationalism and barriers to future employment. Following this incident in September 2002, North Korea publicly apologised to the Japanese government leading to the initial summit meeting. Japan has been the instigator of diplomacy attempts with North Korea in order to meet mutually beneficial terms particularly due to the sensitivity the North Korean regime has on human-rights related criticism. Pyongyang Declaration Economic Assistance, Loans, Nuclear Missile Development Declaration signing between Japan Prime Minister Junichiro Koizumi and North Korea Supreme leader Kim Jong IL in 2002. The first visit of Japanese Prime Minister Junichiro Koizumi to North Korea occurred in 2002. Prior to this summit meeting there was no acknowledgement of the Japanese abductees on the North Korean government\u2019s behalf . This visit resulted in a formal apology by General Secretary Kim Jong-il and the official return of the abductees based in North Korea to Japanese soil. Additionally, the Japanese government made their first statement of apology to the North Korean government and their predecessors for the turmoil and suffering endured by their citizens during their colonial rule between 1910-1945. Through this meeting the details of the declaration were discussed and agendas set. The four subcategories of the Pyongyang Declaration included a pledge of economic assistance by Japan for their North Korean comrades . This would only be introduced after bilateral diplomatic relations were normalised and the abductees were returned. Stated by the Japanese Government there were approximately thirteen Japanese citizens abducted under predecessor Kim Jong Il \u2019s reign, following the agreement five of these abductees were acknowledged and returned. Through this pledge, North Korea agreed to extend its moratorium on their missile testingwhich was becoming an international issue and threat of warfare. In correspondence with this there is a mutual responsibility of neutralising and maintaining positive relations without the involvement of the United States. This was a large factor within the declarations and played a key role in maintaining positive relations. There were two main agendas that mutually benefited both parties, with North Korea \u2019s need for economic assistance and the possibility of long-term loans outweighed the interest of nuclear progression, therefore they signed. With the agreement of nuclear progression indefinitely ceasing the declaration created mutually benefited parties with an equal level of compromise. The declaration included mutual cessation of military hostility in areas on confrontation, agreed to actively promote south-north environment cooperation, strengthen cooperation in the areas of prevention of future epidemics and the public health system through providing safety measures in which was equally available for the entirety of the population and mainly to find a form of resolution of separated families. There was a key agreement that the Korean Peninsula must be turned into a land of peace free from nuclear weapons and nuclear threats. This was a particular essential point as Japan would not introduce the aid until normalisation and neutrality of the missile programs was certain. North Korea Missile Testing 2005 In 2005, Pyongyang declared they were producing nuclear weapons and thus the food aid pledged by the prime minister Junichiro Koizumi of Japan led to the suspension of this pledge . 2006 North Korea Ballistic Missile launch 2006 In January 2006 North Korean leader Kim Jong-un announced the indefinite suspension of all missile testing and nuclear programs. However, in July 2006 North Korea launched long-range missiles leading to the United Nations and their affiliations passing a worldwide resolution ordering the state to dismantle their nuclear programme including the US government dismantling their oil delivery alliance. The Japanese government further imposed sanctions including the unilateral ban of North Korean imports and the prohibition of the Man Gyong Bong 92 ferry entering Japan. This resulted in several meetings titled the six party talks involving representatives from North and South Korea, China, Russia, Japan and the United States. These talks aimed to reach a peaceful middle ground and re-uphold the initial agreements of the Pyongyang declaration for both respective parties Japan and North Korea. Following the July launch, in October representatives from North Korea announced on behalf of their government the further success of their nuclear testing leading to the United Nations to impose further sanctions including suspension of economic aid from the US government. Following mulitaral discussion within the six party talks the three initial meetings were unsuccessful in negotiations. In February North Korea shut down their largest nuclear power station for an aid package from the United Nations at the value of over $400 million USD. There was another announcement of a secondary nuclear test by the North Korean government with an approximate earthquake magnitude of 4.5 in their north east Kilju country. The president of the United States Barack Obama following the nuclear launch stated: North Korea is directly and recklessly challenging the international community.The sanctions previously set by the United Nations were imposed with further additions following an emergency meeting. North Korea responded by removing their participation in the six party talks. The diplomatic relations and meetings with incentives with the United States, Russia, Japan and China led to a conclusive moratorium by the DPRK state on all missile launches and nuclear programming for further aid including food. North Korea carried out a nuclear testing in February 2013 with rocket launches and violated the security of UN resolutionsin both 2014 and 2015 through short-fire rocket launches and short-range projectiles of North Korea\u2019s east-coast. Despite the goodwill attempt from The US states and South Korea towards the North Korean Regime through postponing their respective drills and pledging humanitarian assistance the North Korean government has had minimal motivation to reinstate diplomacy. Following a three year hiatus, the government of DPRK announced they were carrying out their sixth nuclear test leading to further six party talks which North Koreare-joined . Current Developments North Korea and Japan current diplomatic relations are neutralwith sections of the Pyongyang declaration being upheld by the two parties. Due to the continuity of the Nuclear programme in North Korea, the United States introduced financial sanctions . Following these financial sanctions\u2019 North Korea reintroduced provocations in July 2006 through firing ballistic missiles. Following an additional nuclear test conducted by North Korea and an initiation of negotiations between Japan and North Korea. In order to help the tense relations between Japan and North Korea, the United States government interceded by removing Pyongyang from its list of state sponsors of terror as a move of good faith on behalf of North Korea as they played a key role in the deteriorating relationship between the two respective countries. Following the death of Kim Jong Il, his successor supreme leader Kim Jong Un took over relations. The first initial two years under Kim Jong Un\u2019s ( 2011-2013) reign there were hostile relations between the two countries, in particular Japan condemning their satellite launch. A Japanese and North Korean consultation occurred in May 2014, titled the Stockholm agreement due to the location of the meeting. Following this meeting, negotiations officially reached an agreement where Kim Jong Un and the North Korean government dedicated a special investigation committee on the remaining abductees. In addition they pledged a full-scale investigation in regards to the abductees families and the location of current missing Japanese citizens. Following this initiative Japan lifted various sanctions including their importing ban of North Korean goods. Currently under Kim Jong Un, North Korea missile testing and nuclear programs have expanded at a rapid rate and leaving the bilateral negotiations created under King Jong Il at a stall. Whilst there are discussions for a comprehensive solution to finalise the abduction, nuclear and missile issues negotiations are currently still underway between the two respective countries.This is a particular issue as Chairman Kim Jong-un has stated that they will continue launches and nuclear testing indefinitely. In response, the Japanese Government will maintain the sanctions they currently hold on the DPRK\u2019s economic assistance. 2019 Japan Prime Minister Shinzo Abe at the 2019 UN Summit Meeting. Recently, in 2019 North Korea re-started Nuclear testing with a series of short-range missile testing leading to the January Summit Meeting which resulted in Kim Jong Un announcing the separation of the \u201cunilaterally bound\u201d Pyongyang declaration including the nuclear test moratorium . In March 2019, for the first time in over a decade the Japanese government decided to withdraw their participation in the motion condemning North Korea \u2019s record in regards to their Human Rights with the remaining UN human rights council. This statement coincided with the trend that North Korea was meeting with representatives of the six-party countries from 2018 while excluding the Japanese representatives. This motion was deemed an olive branch by the Japanese government to the North Korean government as their main concern is to have a face-to-face meeting with current Chairman Kim Jong-un to establish an agreement on the remaining abducteeswho North Korea have announced are deceased or never entered the country, as Prime Minister Shinzo Abe has stated: In order to resolve this abductions \u2019 issue, we should not miss out on any single opportunity and I, myself, have to meet face-to-face with Chairman Kim Jong Un, and meet with him without attaching any conditions. I intend to work to resolve this issue, with the determination that we will not miss out any single opportunity.Shinzo Abe, May 6, 2019. %DIFDELCMD < %DIFDELCMD < %%% As there have been steps taken to reignite diplomatic relations between the two respective parties there is the potential for further summit meetings to create a unilateral relationship which benefits both parties.", "after_revision": "354x354px|Japan- North Korea on World Map The Japan\u2013North Korea Pyongyang Declaration was signed in 2002, and was the result of a systematic Japan\u2013North Korea summit meeting. The aim of the declaration was to provide low-interest long term loans to North Korea as well as economic assistance , including humanitarian aid , in accordance with the moratorium of nuclear missile development which has been in place since 1999. The Japanese government hoped to learn the fate of Japanese citizens by North Korea which, prior to the declaration , was unacknowledged. The declaration resulted in a temporary restraint on nuclear programs from North Korea, the return of five Japanese kidnapping victims who were abducted in the 1970s and 1980s , and the pledge of economic assistance once the abductees were returned. From 2017, there have been consistent follow-up summits due to breaches that required mediator assistance . 1904-1905 Japanese army during the Russo-Japanese War ending in their victory in the year 1905. Japan's victory in the Russo-Japanese War led to the 1910 annexation of Korea. Japan's loss in World War II cost them all their colonial possessions , including Korea. Korea's control by the Allies caused the Korean War (1950-1953). 1991-1992 North Korean national flag In 1991 and 1992, there were eight bilateral discussions regarding diplomatic relations between Japan and North Korea. Japan sought a resolution regarding abducted nationals being held in North Korea. Pyongyang Declaration Economic assistance, loans, and nuclear missile development Declaration signing between Japan Prime Minister Junichiro Koizumi and North Korea Supreme leader Kim Jong IL in 2002. Japanese Prime Minister Junichiro Koizumi visited North Korea in 2002. Prior to this summit , North Korea had never acknowledged kidnapping Japanese citizens . This visit resulted in a formal apology by Kim Jong-il and the return of known victims. The Japanese government made its first apology to the North Korean government and their predecessors for the turmoil and suffering endured by their citizens from 1910 until 1945. The Pyongyang Declaration included a pledge of economic assistance by Japan for North Korea . This would only be introduced after bilateral diplomatic relations were normalized and abductees returned. Japan believed there were approximately thirteen Japanese citizens abducted by Kim Jong Il 's government. Following the agreement, five of these abductees were acknowledged and returned. Through this pledge, North Korea agreed to extend its moratorium on missile testing. North Korea missile testing 2005 In 2005, Pyongyang announced production of nuclear weapons and Japan responded by voiding its pledge of food aid . 2006 North Korea Ballistic Missile launch 2006 In January 2006 , North Korean leader Kim Jong-un announced the indefinite suspension of all missile testing and nuclear programs. However, in July 2006 , North Korea launched long-range missiles , leading to the United Nations and affiliates passing a worldwide resolution ordering the state to dismantle their nuclear program. The United States agreed to suspend its oil delivery alliance. The Japanese government further imposed sanctions including the unilateral ban of North Korean imports and the prohibition of the Man Gyong Bong 92 ferry from Japanese waters. This resulted in several meetings , the six-party talks, involving representatives from North Korea, South Korea, China, Russia, Japan , and the United States. Following the July launch, in October representatives from North Korea announced their nuclear testing had been successful, leading the United Nations to impose further sanctions including suspension of economic aid from the American government. Following the six-party talks, the three initial meetings were unsuccessful in negotiations. In February , North Korea shut down its largest nuclear power station in exchange for an aid package from the United Nations valued at over $400 million USD. There was another announcement of a secondary nuclear test by the North Korean government with an approximate earthquake magnitude of 4.5 in Kilju County. Later, American President Barack Obama declared that North Korea is directly and recklessly challenging the international community.The sanctions previously set by the United Nations were imposed with further additions following an emergency meeting. North Korea responded by ending the six-party talks. Diplomatic relations and meetings with incentives with the United States, Russia, Japan and China led to a moratorium by North Korea on all nuclear programming for further aid including food. North Korea carried out rocket-launch nuclear tests in February 2013 , violating UN resolutions. Following a three year hiatus, North Korea announced its sixth nuclear test . This led to six-party talks with North Korea's participation . Current developments Diplomatic relations between North Korea and Japan are neutral; sections of the Pyongyang Declaration have been upheld by the two parties. The United States has introduced economic sanctions because of North Korea's ongoing nuclear program. In July 2006, North Korea contentiously fired ballistic missiles. In May 2014, Japan and North Korea instigated the Stockholm Agreement. Kim Jong-un and the North Korean government dedicated a special investigation committee regarding remaining abductees. Kim Jong-un has expanded missile testing and nuclear programs , stalling the diplomatic measures created under Kim Jong-il. 2019 Japan Prime Minister Shinzo Abe at the 2019 UN Summit Meeting. In 2019 , North Korea staged a series of short-range missile testing . This led to a January summit which resulted in Kim Jong-un canceling the Pyongyang Declaration . In March 2019, Japan declined to sign a UN motion condemning North Korea human rights record. This motion was deemed an olive branch by Japan to North Korea for the sake of establishing an agreement regarding remaining abductees. Japanese Prime Minister Shinzo Abe stated: In order to resolve this abductions issue, we should not miss out any single opportunity and I, myself, have to meet face-to-face with Chairman Kim Jong Un, and meet with him without attaching any conditions. I intend to work to resolve this issue, with the determination that we will not miss out any single opportunity.Shinzo Abe, May 6, 2019. %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "D", "before": "Pyongyang declaration was initiated with the goal of creating diplomacy between the two nations where previously this was non-existent due to historic hostility.", "after": null, "start_char_pos": 175, "end_char_pos": 336}, {"type": "R", "before": "(", "after": ",", "start_char_pos": 454, "end_char_pos": 455}, {"type": "R", "before": ")", "after": ",", "start_char_pos": 483, "end_char_pos": 484}, {"type": "D", "before": "However, in current developments this category of the agreement has been breached. (See North Korea and weapons of mass destruction).", "after": null, "start_char_pos": 586, "end_char_pos": 719}, {"type": "R", "before": "was aiming to achieve the return of Japanese abducted citizens which", "after": "hoped to learn the fate of Japanese citizens by North Korea which,", "start_char_pos": 744, "end_char_pos": 812}, {"type": "A", "before": null, "after": ",", "start_char_pos": 838, "end_char_pos": 838}, {"type": "D", "before": "Pyongyang Declaration named after the North Korean capital, was a pinnacle motion in order to create an effective and fair relationship between the two countries. The", "after": null, "start_char_pos": 863, "end_char_pos": 1029}, {"type": "R", "before": "5 Japanese abductees occurring", "after": "five Japanese kidnapping victims who were abducted", "start_char_pos": 1128, "end_char_pos": 1158}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1182, "end_char_pos": 1182}, {"type": "R", "before": "summit meetings", "after": "summits", "start_char_pos": 1303, "end_char_pos": 1318}, {"type": "R", "before": "within the declaration leading to the requirement of mediators to maintain a mutually beneficial declaration for the respective countries", "after": "that required mediator assistance", "start_char_pos": 1335, "end_char_pos": 1472}, {"type": "R", "before": "Following the end of the", "after": "Japan's victory in the", "start_char_pos": 1571, "end_char_pos": 1595}, {"type": "R", "before": "war", "after": "War", "start_char_pos": 1611, "end_char_pos": 1614}, {"type": "D", "before": "Japanese troops defeating Russia despite being inferior in numbers and resources and led to the", "after": null, "start_char_pos": 1626, "end_char_pos": 1721}, {"type": "D", "before": "For over thirty five years the Korean peninsula was ruled mercilessly by the Japanese colonisation.", "after": null, "start_char_pos": 1748, "end_char_pos": 1847}, {"type": "R", "before": "The conclusion of", "after": "Japan's loss in", "start_char_pos": 1848, "end_char_pos": 1865}, {"type": "R", "before": "ended in a loss for Japan and therefore were unanimously removed of", "after": "cost them", "start_char_pos": 1879, "end_char_pos": 1946}, {"type": "R", "before": "which Koreawas a part of. Koreawas under temporary ally control ; this led to the pinnacle hostility and", "after": ", including Korea. Korea's control by the Allies caused", "start_char_pos": 1978, "end_char_pos": 2082}, {"type": "D", "before": "Once separated into South and North Korea the anti-japan tendencies within North Korea escalated.", "after": null, "start_char_pos": 2111, "end_char_pos": 2208}, {"type": "R", "before": "National Flag adopted following liberation As there was an unstable relationship between the two countries between", "after": "national flag In", "start_char_pos": 2232, "end_char_pos": 2346}, {"type": "D", "before": "approximately", "after": null, "start_char_pos": 2373, "end_char_pos": 2386}, {"type": "R", "before": "with the aim of creating", "after": "regarding", "start_char_pos": 2415, "end_char_pos": 2439}, {"type": "R", "before": "The basis of the declaration is built on the expectation of maintaining goodwill and cooperation between the two countries. The main agenda of this meeting was Japan wanting a resolution to key incidents including the abduction of Japanese citizens housing", "after": "Japan sought a resolution regarding abducted nationals being held", "start_char_pos": 2492, "end_char_pos": 2748}, {"type": "D", "before": "These \u201cZainichi Koreans\u201d experienced systematic prejudice within Japan, to the point of loss of nationalism and barriers to future employment.", "after": null, "start_char_pos": 2765, "end_char_pos": 2907}, {"type": "D", "before": "Following this incident in September 2002, North Korea publicly apologised to the Japanese government leading to the initial summit meeting. Japan has been the instigator of diplomacy attempts with North Korea in order to meet mutually beneficial terms particularly due to the sensitivity the North Korean regime has on human-rights related criticism.", "after": null, "start_char_pos": 2908, "end_char_pos": 3259}, {"type": "R", "before": "Assistance, Loans, Nuclear Missile Development", "after": "assistance, loans, and nuclear missile development", "start_char_pos": 3291, "end_char_pos": 3337}, {"type": "D", "before": "The first visit of", "after": null, "start_char_pos": 3457, "end_char_pos": 3475}, {"type": "R", "before": "to North Korea occurred", "after": "visited North Korea", "start_char_pos": 3518, "end_char_pos": 3541}, {"type": "R", "before": "meeting there was no acknowledgement of the Japanese abductees on the North Korean government\u2019s behalf", "after": ", North Korea had never acknowledged kidnapping Japanese citizens", "start_char_pos": 3572, "end_char_pos": 3674}, {"type": "D", "before": "General Secretary", "after": null, "start_char_pos": 3720, "end_char_pos": 3737}, {"type": "R", "before": "official return of the abductees based in North Korea to Japanese soil. Additionally, the", "after": "return of known victims. The", "start_char_pos": 3758, "end_char_pos": 3847}, {"type": "R", "before": "their first statement of", "after": "its first", "start_char_pos": 3873, "end_char_pos": 3897}, {"type": "R", "before": "during their colonial rule between 1910-1945. Through this meeting the details of the declaration were discussed and agendas set.", "after": "from 1910 until 1945.", "start_char_pos": 4016, "end_char_pos": 4145}, {"type": "D", "before": "four subcategories of the", "after": null, "start_char_pos": 4150, "end_char_pos": 4175}, {"type": "R", "before": "their North Korean comrades", "after": "North Korea", "start_char_pos": 4252, "end_char_pos": 4279}, {"type": "R", "before": "normalised and the abductees were returned. Stated by the Japanese Government", "after": "normalized and abductees returned. Japan believed", "start_char_pos": 4354, "end_char_pos": 4431}, {"type": "R", "before": "under predecessor", "after": "by", "start_char_pos": 4493, "end_char_pos": 4510}, {"type": "R", "before": "\u2019s reign, following the agreement", "after": "'s government. Following the agreement,", "start_char_pos": 4523, "end_char_pos": 4556}, {"type": "R", "before": "their missile testingwhich was becoming an international issue and threat of warfare. In correspondence with this there is a mutual responsibility of neutralising and maintaining positive relations without the involvement of the United States. This was a large factor within the declarations and played a key role in maintaining positive relations.", "after": "missile testing.", "start_char_pos": 4681, "end_char_pos": 5029}, {"type": "R", "before": "There were two main agendas that mutually benefited both parties, with North Korea \u2019s need for economic assistance and the possibility of long-term loans outweighed the interest of nuclear progression, therefore they signed. With the agreement of nuclear progression indefinitely ceasing the declaration created mutually benefited parties with an equal level of compromise. The declaration included mutual cessation of military hostility in areas on confrontation, agreed to actively promote south-north environment cooperation, strengthen cooperation in the areas of prevention of future epidemics and the public health system through providing safety measures in which was equally available for the entirety of the population and mainly to find a form of resolution of separated families.", "after": "North Korea missile testing", "start_char_pos": 5030, "end_char_pos": 5820}, {"type": "D", "before": "There was a key agreement that the Korean Peninsula must be turned into a land of peace free from nuclear weapons and nuclear threats. This was a particular essential point as Japan would not introduce the aid until normalisation and neutrality of the missile programs was certain.", "after": null, "start_char_pos": 5821, "end_char_pos": 6102}, {"type": "D", "before": "North Korea Missile Testing", "after": null, "start_char_pos": 6103, "end_char_pos": 6130}, {"type": "R", "before": "declared they were producing", "after": "announced production of", "start_char_pos": 6155, "end_char_pos": 6183}, {"type": "R", "before": "thus the food aid pledged by the prime minister Junichiro Koizumi of Japan led to the suspension of this pledge", "after": "Japan responded by voiding its pledge of food aid", "start_char_pos": 6204, "end_char_pos": 6315}, {"type": "A", "before": null, "after": ",", "start_char_pos": 6381, "end_char_pos": 6381}, {"type": "A", "before": null, "after": ",", "start_char_pos": 6517, "end_char_pos": 6517}, {"type": "A", "before": null, "after": ",", "start_char_pos": 6559, "end_char_pos": 6559}, {"type": "R", "before": "their affiliations", "after": "affiliates", "start_char_pos": 6594, "end_char_pos": 6612}, {"type": "R", "before": "programme including the US government dismantling their", "after": "program. The United States agreed to suspend its", "start_char_pos": 6690, "end_char_pos": 6745}, {"type": "R", "before": "entering Japan.", "after": "from Japanese waters.", "start_char_pos": 6923, "end_char_pos": 6938}, {"type": "R", "before": "titled the six party talks", "after": ", the six-party talks,", "start_char_pos": 6973, "end_char_pos": 6999}, {"type": "R", "before": "and", "after": "Korea,", "start_char_pos": 7037, "end_char_pos": 7040}, {"type": "A", "before": null, "after": ",", "start_char_pos": 7075, "end_char_pos": 7075}, {"type": "D", "before": "These talks aimed to reach a peaceful middle ground and re-uphold the initial agreements of the Pyongyang declaration for both respective parties Japan and North Korea.", "after": null, "start_char_pos": 7099, "end_char_pos": 7267}, {"type": "R", "before": "on behalf of their government the further success of their nuclear testing leading to", "after": "their nuclear testing had been successful, leading", "start_char_pos": 7349, "end_char_pos": 7434}, {"type": "R", "before": "US", "after": "American", "start_char_pos": 7528, "end_char_pos": 7530}, {"type": "D", "before": "mulitaral discussion within the six party talks", "after": null, "start_char_pos": 7553, "end_char_pos": 7600}, {"type": "A", "before": null, "after": "six-party talks, the", "start_char_pos": 7605, "end_char_pos": 7605}, {"type": "A", "before": null, "after": ",", "start_char_pos": 7676, "end_char_pos": 7676}, {"type": "R", "before": "their", "after": "its", "start_char_pos": 7699, "end_char_pos": 7704}, {"type": "A", "before": null, "after": "in exchange", "start_char_pos": 7735, "end_char_pos": 7735}, {"type": "R", "before": "at the value of", "after": "valued at", "start_char_pos": 7779, "end_char_pos": 7794}, {"type": "R", "before": "their north east Kilju country. The president of the United States Barack Obama following the nuclear launch stated:", "after": "Kilju County. Later, American President Barack Obama declared that", "start_char_pos": 7959, "end_char_pos": 8075}, {"type": "R", "before": "removing their participation in the six party", "after": "ending the six-party", "start_char_pos": 8299, "end_char_pos": 8344}, {"type": "R", "before": "The diplomatic", "after": "Diplomatic", "start_char_pos": 8352, "end_char_pos": 8366}, {"type": "R", "before": "conclusive moratorium by the DPRK state on all missile launches and", "after": "moratorium by North Korea on all", "start_char_pos": 8463, "end_char_pos": 8530}, {"type": "R", "before": "a nuclear testing", "after": "rocket-launch nuclear tests", "start_char_pos": 8607, "end_char_pos": 8624}, {"type": "R", "before": "with rocket launches and violated the security of UN resolutionsin both 2014 and 2015 through short-fire rocket launches and short-range projectiles of North Korea\u2019s east-coast. Despite the goodwill attempt from The US states and South Korea towards the North Korean Regime through postponing their respective drills and pledging humanitarian assistance the North Korean government has had minimal motivation to reinstate diplomacy.", "after": ", violating UN resolutions.", "start_char_pos": 8642, "end_char_pos": 9074}, {"type": "R", "before": "the government of DPRK announced they were carrying out their", "after": "North Korea announced its", "start_char_pos": 9106, "end_char_pos": 9167}, {"type": "R", "before": "leading to further six party talks which North Koreare-joined", "after": ". This led to six-party talks with North Korea's participation", "start_char_pos": 9187, "end_char_pos": 9248}, {"type": "R", "before": "Developments", "after": "developments Diplomatic relations between", "start_char_pos": 9259, "end_char_pos": 9271}, {"type": "R", "before": "current diplomatic relations are neutralwith", "after": "are neutral;", "start_char_pos": 9294, "end_char_pos": 9338}, {"type": "R", "before": "declaration being", "after": "Declaration have been", "start_char_pos": 9365, "end_char_pos": 9382}, {"type": "R", "before": "Due to the continuity of the Nuclear programme in North Korea, the United States introduced financial sanctions . Following these financial sanctions\u2019 North Korea reintroduced provocations in July 2006 through firing ballistic missiles. Following an additional nuclear test conducted by North Korea and an initiation of negotiations between Japan and North Korea. In order to help the tense relations between Japan and North Korea, the United States government interceded by removing Pyongyang from its list of state sponsors of terror as a move of good faith on behalf of North Korea as they played a key role in the deteriorating relationship between the two respective countries. Following the death of Kim Jong Il, his successor supreme leader Kim Jong Un took over relations. The first initial two years under Kim Jong Un\u2019s ( 2011-2013) reign there were hostile relations between the two countries, in particular Japan condemning their satellite launch.", "after": "The United States has introduced economic sanctions because of North Korea's ongoing nuclear program. In July 2006, North Korea contentiously fired ballistic missiles.", "start_char_pos": 9410, "end_char_pos": 10368}, {"type": "R", "before": "A Japanese and North Korean consultation occurred in", "after": "In", "start_char_pos": 10369, "end_char_pos": 10421}, {"type": "R", "before": "titled the Stockholm agreement due to the location of the meeting. Following this meeting, negotiations officially reached an agreement where Kim Jong Un", "after": "Japan and North Korea instigated the Stockholm Agreement. Kim Jong-un", "start_char_pos": 10432, "end_char_pos": 10585}, {"type": "R", "before": "on the", "after": "regarding", "start_char_pos": 10662, "end_char_pos": 10668}, {"type": "D", "before": "In addition they pledged a full-scale investigation in regards to the abductees families and the location of current missing Japanese citizens. Following this initiative Japan lifted various sanctions including their importing ban of North Korean goods.", "after": null, "start_char_pos": 10690, "end_char_pos": 10943}, {"type": "R", "before": "Currently under Kim Jong Un, North Korea", "after": "Kim Jong-un has expanded", "start_char_pos": 10944, "end_char_pos": 10984}, {"type": "R", "before": "have expanded at a rapid rate and leaving the bilateral negotiations created under King Jong Il at a stall. Whilst there are discussions for a comprehensive solution to finalise the abduction, nuclear and missile issues negotiations are currently still underway between the two respective countries.This is a particular issue as Chairman Kim Jong-un has stated that they will continue launches and nuclear testing indefinitely. In response, the Japanese Government will maintain the sanctions they currently hold on the DPRK\u2019s economic assistance.", "after": ", stalling the diplomatic measures created under Kim Jong-il.", "start_char_pos": 11022, "end_char_pos": 11569}, {"type": "R", "before": "Recently, in", "after": "In", "start_char_pos": 11638, "end_char_pos": 11650}, {"type": "R", "before": "North Korea re-started Nuclear testing with", "after": ", North Korea staged", "start_char_pos": 11656, "end_char_pos": 11699}, {"type": "R", "before": "leading to the January Summit Meeting", "after": ". This led to a January summit", "start_char_pos": 11740, "end_char_pos": 11777}, {"type": "R", "before": "Jong Un announcing the separation of the \u201cunilaterally bound\u201d Pyongyang declaration including the nuclear test moratorium", "after": "Jong-un canceling the Pyongyang Declaration", "start_char_pos": 11800, "end_char_pos": 11921}, {"type": "R", "before": "for the first time in over a decade the Japanese government decided to withdraw their participation in the", "after": "Japan declined to sign a UN", "start_char_pos": 11939, "end_char_pos": 12045}, {"type": "D", "before": "\u2019s record in regards to their Human Rights with the remaining UN human rights council.", "after": null, "start_char_pos": 12076, "end_char_pos": 12162}, {"type": "R", "before": "This statement coincided with the trend that North Korea was meeting with representatives of the six-party countries from 2018 while excluding the Japanese representatives. This", "after": "human rights record. This", "start_char_pos": 12163, "end_char_pos": 12340}, {"type": "R", "before": "the Japanese government to the North Korean government as their main concern is to have a face-to-face meeting with current Chairman Kim Jong-un to establish an agreement on the remaining abducteeswho North Korea have announced are deceased or never entered the country, as", "after": "Japan to North Korea for the sake of establishing an agreement regarding remaining abductees. Japanese", "start_char_pos": 12378, "end_char_pos": 12651}, {"type": "D", "before": "has", "after": null, "start_char_pos": 12678, "end_char_pos": 12681}, {"type": "D", "before": "\u2019", "after": null, "start_char_pos": 12726, "end_char_pos": 12727}, {"type": "D", "before": "on", "after": null, "start_char_pos": 12758, "end_char_pos": 12760}, {"type": "D", "before": "As there have been steps taken to reignite diplomatic relations between the two respective parties there is the potential for further summit meetings to create a unilateral relationship which benefits both parties.", "after": null, "start_char_pos": 13071, "end_char_pos": 13285}], "sents_char_pos": [0, 174, 336, 585, 668, 719, 858, 1025, 1254, 1570, 1747, 1847, 2003, 2043, 2110, 2208, 2491, 2615, 2764, 2907, 3048, 3259, 3456, 3550, 3676, 3829, 4061, 4145, 4281, 4397, 4612, 4766, 4924, 5029, 5254, 5403, 5820, 5955, 6102, 6494, 6768, 6938, 7098, 7267, 7542, 7663, 7817, 7990, 8155, 8273, 8351, 8582, 8819, 9074, 9409, 9523, 9646, 9773, 10092, 10190, 10368, 10498, 10689, 10833, 10943, 11129, 11321, 11449, 11569, 11637, 11923, 12162, 12335, 12689, 12903, 13016]}
+{"doc_id": "56733622", "revision_depth": "1", "before_revision": "Coping Planning is an approach to supporting people who are distressed.Stallman, H. M. & Wilson, C. J. (2018). Can the mental health of Australians be improved by dual strategy for promotion and prevention? Australian and New Zealand Journal of Psychiatry, 52(6), 602. URL H. M., Ohan, J. L. (2018). The alignment of law, practice and need in suicide prevention. BJPsych Bulletin, 42(2), 51\u201353. URL It is part of a biopsychosocialEngel G. L. (1980). \"The clinical application of the biopsychosocial model\". American Journal of Psychiatry . 137(5) : 535\u2013544. doi:10.1176/ajp.137.5.535. . approach to mental health and wellbeing that comprises healthy environments, responsive parenting, belonging, healthy activities, coping, resilience and treatment of illness.Stallman, H. M. (2018). Coping Planning: A patient- and strengths-focused approach to suicide prevention training. Australasian Psychiatry, 26(2), 141\u2013144. doi URL Coping planning normalises distress as a universal human experience.Coping is for Everyone URL It draws on a health-focused approach to coping, to improve emotional regulation and decrease the memory of unpleasant emotionsKatsumi , Y. & Dolcos, S. (2018). Suppress to feel and remember less: Neural correlates of explicit and implicit emotional suppression on perception and memory. Neuropsychologia, doi: 10.1016/j.neuropsychologia.2018.02.010. Coping planning interventions are effective when people are supported in the process of forming coping plans.Kwasnicka, D., Presseau, J., White, M., & Sniehotta, F. F. (2013). Does planning how to cope with anticipated barriers facilitate health-related behaviour change? A systematic review, Health Psychology Review, 7:2, 129-145, doi: URL Mobile appsStallman, H. M. (2017). My Coping Plan mobile application%DIFDELCMD < ]%%% . Available at URL or URL can support coping by acting as a prompt to use healthy coping strategies when distressed, rather than habitual unhealthy coping strategies. Coping planning has five aims: Promote coping Meet the needs of people who are distressed Be easy to use by clinicians and people who support others Eliminate stigma related to suicide Prevent suicide Approach Coping planning aims to meet the needs of people who ask for help with distress, including suicidal ideation.. By addressing why someone asks for help, the focus stays on what the person needs rather than on what the helper wants to do. It provides an alternative to the widely used, but non-evidence-based risk-assessment approach to suicide prevention.Franklin, JC , Ribeiro, JD , Fox, KR. Risk factors for suicidal thoughts and behaviors: A meta-analysis of 50 years of research. Psychol Bull 2016; 143 : 187\u2013 232. doi: URL Needs assessment and support focuses on the individual needs of each person. They are rated as low (coping independently), moderate (may need additional low-intensity professional support), or high (needs immediate high-intensity professional support) Coping planning has three steps:Stallman, H. M. (2017). Care \u00b7 Collaborate \u00b7 Connect: Suicide Prevention. Adelaide: University of South Australia. Care: being available to listen and care about people who are distressed; Collaborate: asking how the person is coping and helping them think about additional healthy coping strategies they could use; Connect: helping the person connect with health professionals if they need more support . Role in suicide prevention Coping planning is designed to contribute to suicide prevention in a number of ways. Firstly, by providing a framework to support people whenever they seek help, rather than waiting until they are considered high-risk for death by suicideStallman , H. M. (2017). Meeting the needs of patients who have suicidal thoughts presenting to Emergency Departments. Emergency Medicine Australasia, 29(6), 749. doi: URL Secondly, it aims to focus on helping people to cope, rather than to stay safe from suicide, which, according to ironic process theoryWegner, Daniel M. (1989). White Bears and Other Unwanted Thoughts: Suppression, Obsession, and the Psychology of Mental Control. Viking Adult. . , makes it more likely that people will think about suicide. Healthy coping strategies improve overall wellbeingStallman, H. M., Ohan, J. L., & Chiera, B. (2018). The role of social support, being present, and self-kindness in university student wellbeing. British Journal of Guidance and Counselling, 46(4), 365-374. doi: URL and reduce distress.Stallman, H. M., Ohan, J. L., & Chiera, B. (2018). The role of social support, being present, and self-kindness in university student psychological distress. Australian Psychologist, 53(1), 52\u201359. Doi: URL Finally, it overcomes inattentional blindness, by explicitly focussing on coping. The approach is designed for use in both low (e.g., psychological first aiders or telephone helplines) and high intensity services (e.g., emergency departments or inpatient care units). Applications In addition to suicide prevention training for health professionals, coping planning has been used to train journalists,Stallman, H. M. (2017). Care \u00b7 Collaborate \u00b7 Connect: Journalism. Adelaide: University of South Australia and help a range of people cope better, including carers, university students, and with children to improve emotional regulation.Stallman, H. M. Ohan, J. L. (2018) Coping Kids. Adelaide: University of South AustraliaRohlf, H. L., Holl, A. K., Kirsch, F., Krah\u00e9, B.,%DIFDELCMD < & %%% Elsner, B. (2018). Longitudinal Links between Executive Function, Anger, and Aggression in Middle Childhood. Frontiers in Behavioral Neuroscience, 12(27). doi:10.3389/fnbeh.2018.00027 See also Biopsychosocial model Coping (psychology) Counseling psychology Psychological resilience Suicide prevention", "after_revision": "Coping planning is an approach to supporting people who are distressed.Stallman, H. M. & Wilson, C. J. (2018). Can the mental health of Australians be improved by dual strategy for promotion and prevention? Australian and New Zealand Journal of Psychiatry, 52(6), 602. Stallman, H. M., Ohan, J. L. (2018). The alignment of law, practice and need in suicide prevention. BJPsych Bulletin, 42(2), 51\u201353. It is part of a biopsychosocialEngel G. L. (1980). \"The clinical application of the biopsychosocial model\". American Journal of Psychiatry , 137(5) , 535\u2013544. approach to mental health and wellbeing that comprises healthy environments, responsive parenting, belonging, healthy activities, coping, psychological resilience and treatment of illness.Stallman, H. M. (2018). Coping planning: a patient-centred and strengths-focused approach to suicide prevention training. Australasian Psychiatry, 26(2), 141\u2013144. Coping planning normalises distress as a universal human experience.Coping is for Everyone URL It draws on a health-focused approach to coping, to improve emotion regulation and decrease the memory of unpleasant emotions.Katsumi , Y. & Dolcos, S. (2018). Suppress to feel and remember less: Neural correlates of explicit and implicit emotional suppression on perception and memory. Neuropsychologia, Coping planning interventions are effective when people are supported in the process of forming coping plans.Kwasnicka, D., Presseau, J., White, M., & Sniehotta, F. F. (2013). Does planning how to cope with anticipated barriers facilitate health-related behaviour change? A systematic review, Health Psychology Review, 7:2, %DIFDELCMD < ]%%% 129\u2013145, Approach Coping planning aims to meet the needs of people who ask for help with distress, including suicidal ideation.. By addressing why someone asks for help, the focus stays on what the person needs rather than on what the helper wants to do. It provides an alternative to the widely used, but non-evidence-based risk-assessment approach to suicide prevention.Franklin, J. C. , Ribeiro, J. D. , Fox, K. R., Bentley, K. H., Kleiman, E. M., Huang, X., et al. (2017). Risk factors for suicidal thoughts and behaviors: A meta-analysis of 50 years of research. Psychological Bulletin, 143 (2), 187\u2013 232 Needs assessment and support focuses on the individual needs of each person. They are rated as low (coping independently), moderate (may need additional low-intensity professional support), or high (needs immediate high-intensity professional support) . Applications In addition to suicide prevention training for health professionals, coping planning has been used to train journalists, and to help a range of people cope better, including carers, university students, and with children to improve emotional regulation . In suicide prevention Coping planning is designed to contribute to suicide prevention in a number of ways. Firstly, it provides a framework to support people whenever they seek help, rather than waiting until they are considered high-risk for death by suicide.Stallman , H. M. (2017). Meeting the needs of patients who have suicidal thoughts presenting to Emergency Departments. Emergency Medicine Australasia, 29(6), 749. Secondly, it aims to focus on helping people to cope, rather than to stay safe from suicide, which, according to ironic process theory,Wegner, Daniel M. (1989). White Bears and Other Unwanted Thoughts: Suppression, Obsession, and the Psychology of Mental Control. Viking . . makes it more likely that people will think about suicide. Healthy coping strategies improve overall wellbeingStallman, H. M., Ohan, J. L., & Chiera, B. (2018). The role of social support, being present, and self-kindness in university student wellbeing. British Journal of Guidance and Counselling, 46(4), 365\u2013374. and reduce distress.Stallman, H. M., Ohan, J. L., & Chiera, B. (2018). The role of social support, being present, and self-kindness in university student psychological distress. Australian Psychologist, 53(1), 52\u201359. The approach is designed for use in both low (e.g., psychological first aiders or telephone helplines) and high intensity services (e.g., emergency departments or inpatient care units). %DIFDELCMD < & %%% See also Counseling psychology", "edit_actions": [{"type": "R", "before": "Planning", "after": "planning", "start_char_pos": 7, "end_char_pos": 15}, {"type": "R", "before": "URL", "after": "Stallman,", "start_char_pos": 269, "end_char_pos": 272}, {"type": "D", "before": "URL", "after": null, "start_char_pos": 395, "end_char_pos": 398}, {"type": "R", "before": ".", "after": ",", "start_char_pos": 538, "end_char_pos": 539}, {"type": "R", "before": ":", "after": ",", "start_char_pos": 547, "end_char_pos": 548}, {"type": "D", "before": "doi:10.1176/ajp.137.5.535. .", "after": null, "start_char_pos": 558, "end_char_pos": 586}, {"type": "A", "before": null, "after": "psychological", "start_char_pos": 725, "end_char_pos": 725}, {"type": "R", "before": "Planning: A patient-", "after": "planning: a patient-centred", "start_char_pos": 793, "end_char_pos": 813}, {"type": "D", "before": "doi URL", "after": null, "start_char_pos": 918, "end_char_pos": 925}, {"type": "R", "before": "emotional", "after": "emotion", "start_char_pos": 1081, "end_char_pos": 1090}, {"type": "R", "before": "emotionsKatsumi", "after": "emotions.Katsumi", "start_char_pos": 1140, "end_char_pos": 1155}, {"type": "D", "before": "doi: 10.1016/j.neuropsychologia.2018.02.010.", "after": null, "start_char_pos": 1327, "end_char_pos": 1371}, {"type": "D", "before": "129-145, doi: URL Mobile appsStallman, H. M. (2017). My Coping Plan", "after": null, "start_char_pos": 1696, "end_char_pos": 1763}, {"type": "D", "before": "mobile application", "after": null, "start_char_pos": 1764, "end_char_pos": 1782}, {"type": "R", "before": ". Available at URL or URL can support coping by acting as a prompt to use healthy coping strategies when distressed, rather than habitual unhealthy coping strategies.", "after": "129\u2013145,", "start_char_pos": 1800, "end_char_pos": 1966}, {"type": "D", "before": "Coping planning has five aims: Promote coping Meet the needs of people who are distressed Be easy to use by clinicians and people who support others Eliminate stigma related to suicide Prevent suicide", "after": null, "start_char_pos": 1967, "end_char_pos": 2167}, {"type": "R", "before": "JC", "after": "J. C.", "start_char_pos": 2541, "end_char_pos": 2543}, {"type": "R", "before": "JD", "after": "J. D.", "start_char_pos": 2555, "end_char_pos": 2557}, {"type": "R", "before": "KR.", "after": "K. R., Bentley, K. H., Kleiman, E. M., Huang, X., et al. (2017).", "start_char_pos": 2565, "end_char_pos": 2568}, {"type": "R", "before": "Psychol Bull 2016;", "after": "Psychological Bulletin,", "start_char_pos": 2660, "end_char_pos": 2678}, {"type": "R", "before": ":", "after": "(2),", "start_char_pos": 2683, "end_char_pos": 2684}, {"type": "R", "before": "232. doi: URL", "after": "232", "start_char_pos": 2690, "end_char_pos": 2703}, {"type": "A", "before": null, "after": ".", "start_char_pos": 2956, "end_char_pos": 2956}, {"type": "R", "before": "Coping planning has three steps:Stallman, H. M. (2017). Care \u00b7 Collaborate \u00b7 Connect: Suicide Prevention. Adelaide: University of South Australia. Care: being available to listen and care about people who are distressed; Collaborate: asking how the person is coping and helping them think about additional healthy coping strategies they could use; Connect: helping the person connect with health professionals if they need more support", "after": "Applications In addition to suicide prevention training for health professionals, coping planning has been used to train journalists, and to help a range of people cope better, including carers, university students, and with children to improve emotional regulation", "start_char_pos": 2957, "end_char_pos": 3392}, {"type": "R", "before": "Role in", "after": "In", "start_char_pos": 3395, "end_char_pos": 3402}, {"type": "R", "before": "by providing", "after": "it provides", "start_char_pos": 3516, "end_char_pos": 3528}, {"type": "R", "before": "suicideStallman", "after": "suicide.Stallman", "start_char_pos": 3653, "end_char_pos": 3668}, {"type": "D", "before": "doi: URL", "after": null, "start_char_pos": 3823, "end_char_pos": 3831}, {"type": "R", "before": "theoryWegner,", "after": "theory,Wegner,", "start_char_pos": 3960, "end_char_pos": 3973}, {"type": "R", "before": "Adult. . ,", "after": ". .", "start_char_pos": 4102, "end_char_pos": 4112}, {"type": "R", "before": "365-374. doi: URL", "after": "365\u2013374.", "start_char_pos": 4420, "end_char_pos": 4437}, {"type": "D", "before": "Doi: URL Finally, it overcomes inattentional blindness, by explicitly focussing on coping.", "after": null, "start_char_pos": 4655, "end_char_pos": 4745}, {"type": "D", "before": "Applications In addition to suicide prevention training for health professionals, coping planning has been used to train journalists,Stallman, H. M. (2017). Care \u00b7 Collaborate \u00b7 Connect: Journalism. Adelaide: University of South Australia and help a range of people cope better, including carers, university students, and with children to improve emotional regulation.Stallman, H. M.", "after": null, "start_char_pos": 4932, "end_char_pos": 5315}, {"type": "D", "before": "Ohan, J. L. (2018) Coping Kids. Adelaide: University of South AustraliaRohlf, H. L., Holl, A. K., Kirsch, F., Krah\u00e9, B.,", "after": null, "start_char_pos": 5316, "end_char_pos": 5436}, {"type": "D", "before": "Elsner, B. (2018). Longitudinal Links between Executive Function, Anger, and Aggression in Middle Childhood. Frontiers in Behavioral Neuroscience, 12(27). doi:10.3389/fnbeh.2018.00027", "after": null, "start_char_pos": 5455, "end_char_pos": 5638}, {"type": "R", "before": "Biopsychosocial model Coping (psychology) Counseling psychology Psychological resilience Suicide prevention", "after": "Counseling psychology", "start_char_pos": 5648, "end_char_pos": 5755}], "sents_char_pos": [0, 71, 110, 206, 299, 362, 394, 449, 506, 762, 785, 876, 994, 1181, 1308, 1371, 1481, 1547, 1643, 1748, 1966, 2287, 2413, 2531, 2659, 2678, 2780, 3012, 3062, 3103, 3177, 3304, 3506, 3684, 3778, 3991, 4094, 4171, 4273, 4367, 4458, 4508, 4615, 4654, 4745, 4931, 5088, 5130, 5300, 5347, 5473, 5563]}
+{"doc_id": "56968840", "revision_depth": "1", "before_revision": "The false-uniqueness effect is an attributional type of cognitive bias in social psychology that describes how people tend to view their qualities, traits and personal attributes as unique , when in reality they are not. False Uniqueness Effect This effect is & visible when asked about a desirable action , even if consensus is against this action: \"suppose a researcher did an experiment using an actor who pretended to have a seizure, and the researcher found that 11 out of 15 people did not help the person. If you had been in the experiment, what do you think your response would have been?\". People tend to answer that they would have helped given the situation, believing they would do it even if that is not the case. This cognitive bias is opposed to the false consensus effect, in which people tend to overestimate the extent to which their attitudes and behaviours are normal and typical compared to those of others. Both are related to self esteem, being this a crucial factor in defining how people look at ther behaviour. People tend to experience the false uniqueness effect in regards to their desirable traits, whereas they apply the false consensus effect to justify negative traits. & & & & There is a reported gender difference in the expression of the false uniqueness effect. Men tend to be biased in regards to both positive physical and social traits, whereas women tend to be more biased around positive social traits than they are physical traits. False consensus effect ", "after_revision": "The false-uniqueness effect is an attributional type of cognitive bias in social psychology that describes how people tend to view their qualities, traits , and personal attributes as unique when in reality they are not. This bias is often measured by looking at the difference between estimates that people make about how many of their peers share a certain trait/ behaviour and the actual number of peers who report these traits and behaviours. Suls, J. (2007). False uniqueness bias. In R. F. Baumeister K. D. Vohs (Eds.), Encyclopedia of social psychology (Vol. 1, pp. 345-345). Thousand Oaks, CA: SAGE Publications, Inc. doi: 10.4135/9781412956253.n213 In fact, people often think that they are more unique than others in regard to desirable traits. This has been shown in a variety of studies, where, for example, people believe that they are better drivers and less risk-taking than the average driver, less prejudiced than the average resident in their town, or even more hardworking in group projects than others when they are actually not. Svenson, O., 1981. Are we all less risky and more skilful than our fellow drivers? Acta Psychologica. 47 (2), 143-148. URL Fields, J.M., Schuman, H. (1976). Public beliefs about the beliefs of the public. Public Opinion Quartely, 40, 427-488. doi: 10.1086/268330 Ross, M.,& Sicoly, F. (1979). Egocentric biases in availability and attribution. Journal of Personality and Social Psychology, 37(3), 322\u2013336. URL This effect can also be visible when asked about desirable actions , even if consensus is against this action: \"suppose a researcher did an experiment using an actor who pretended to have a seizure, and the researcher found that 11 out of 15 people did not help the person. If you had been in the experiment, what do you think your response would have been?\". People tend to answer that they would have helped given the situation, believing they would do it even if that is not the case. This cognitive bias is opposed to the false consensus effect, in which people tend to overestimate the extent to which their attitudes and behaviours are normal and typical compared to those of others. Both are related to self-esteem, which is a crucial factor in defining how people look at their behaviour. Park, Hee Sun; Smith, Sandi W.; Klein, Katherine A.; Martell, Dennis (2011). \"College Students' Estimation and Accuracy of Other Students' Drinking and Believability of Advertisements Featured in a Social Norms Campaign\". Journal of Health Communication. 16 (5): 504\u2013518. doi:10.1080/10810730.2010.546481. ISSN 1081-0730. PMID 21298586. People tend to experience the false uniqueness effect in regards to their desirable traits, whereas they apply the false consensus effect to justify negative traits. Suls, Jerry; Wan, C. K. (1987). \"In search of the false-uniqueness phenomenon: Fear and estimates of social consensus\". Journal of Personality and Social Psychology. 52 (1): 211\u2013217. doi:10.1037/0022-3514.52.1.211. ISSN 1939-1315. History In 1975, Synder and Shneckel introduced the term \u201cillusion of uniqueness\u201d to describe how people wrongly believe that they are different from others. However, it is Suls, Wan (1987) and Suls, Wan and Sanders (1988) who coined the term false-uniqueness effect in their studies. These two demonstrated that people with low levels of self-reported fears or people that engaged in healthy behaviours underestimated the number of low-fear peers as well as the prevalence of those that were healthy compared to the actual numbers.Suls, Jerry; Wan, C. K. (1987). \"In search of the false-uniqueness phenomenon: Fear and estimates of social consensus\". Journal of Personality and Social Psychology. 52 (1): 211\u2013217. doi:10.1037/0022-3514.52.1.211. ISSN 1939-1315. Suls, J., Wan, C. K.,& Sanders, G. S. (1988). False consensus and false uniqueness in estimating the prevalence of health-protective behaviors. Journal of Applied Social Psychology, 18(1), 66\u201379. URL Explanations Self-enhancement As stated above, false uniqueness effect can be seen mostly for desirable or flattering traits and being \u201cbetter than average\u201d. In believing that people are relatively unique and better than others, they are able to enhance or at least maintain their self-esteem. In social comparison, people tend to modify, disregard, or interpret information differently to see themselves in a more positive light. This is also known as the self-enhancement theory. Seeking to ameliorate one\u2019s self-esteem is a strong motivation to believe that your qualities are more unique than that of your peers. In fact, the false uniqueness effect is strongly associated with the perception of superiority or at least the avoidance of inferiority, which can be explained by self-preservation.Vera Hoorens (1993) Self-enhancement and Superiority Biases in Social Comparison, European Review of Social Psychology, 4:1, 113-139, DOI: 10.1080/14792779343000040 As self-enhancement may be a reason as to why false uniqueness effect occurs, cognitive biases or processes seek to understand how they might appear. Cognitive processes Egocentrism Egocentrism refers to the tendency for people to focus solely, or at least place more weight, on their own characteristics and neglect others\u2019 emotions, thoughts, attributes, and/or traits. This means that if people have high abilities, strong traits, make high contributions, or have intense emotions, they are more likely to rate themselves as above average in all of these domains. On the other hand, if people judge themselves to be low in all of the previous domains, they will consider themselves to be below average. Kruger, J. (1999). Lake Wobegon be gone! The \"below-average effect\" and the egocentric nature of comparative ability judgments. Journal of Personality and Social Psychology, 77(2), 221\u2013232. URL This tendency to focus on one\u2019s own absolute standing, therefore explains how people might wrongly perceive certain traits, emotions, or attitudes to be both positively or negatively unique. Alicke, M. D., Govorun, O. (2005). The Better-Than-Average Effect. In M. D. Alicke, D. A. Dunning,& J. I. Krueger (Eds.), Studies in self and identity. The Self in Social Judgment (p. 85\u2013106). Psychology Press. People tend to think a lot more (and maybe even solely) about themselves when making a social comparison when they should be thinking about others as well as it could reduce false uniqueness effects. Focalism People have a tendency to give a lot more weight to information that has been brought to our attention and overlook background information that could be important when making a social comparison, also known as focalism. When making a comparison between two things (often you and another entity), a question might be framed in a way that makes you focus more on one or the other. Research shows that patterns of false uniqueness and false consensus can vary depending on how the question is written. Galesic, M., Olsson, H., Rieskamp, J. (2018). A sampling model of social judgment. Psychological Review, 125(3), 363-390. URL In determining how unique you are your evaluation will depend on what has been brought to your attention, whether it be traits, emotions, or a particular group of people, which might impair you in making a rational decision. Selective accessibility Aligned with egocentrism, when asked to make a social comparison, information about ourselves comes much more easily to mind, because we know a lot more about ourselves than about others. Therefore the more easily information about one\u2019s particular trait comes to mind, the more importance it will have in the judgement of uniqueness. This can be linked to the availability heuristic, where people give more importance to information that they recall quickly. In accordance with the self-enhancement theory, people might also selectively choose to compare themselves to groups that are less successful than them, known as downward social comparison, as information about people that do not have the same qualities as them might come to mind more quickly. Alicke, M. D.,& Govorun, O. (2005). The Better-Than-Average Effect. In M. D. Alicke, D. A. Dunning, J. I. Krueger (Eds.), Studies in self and identity. The Self in Social Judgment (p. 85\u2013106). Psychology Press. Generalized groups When asked to compare ourselves to the average person, because people don\u2019t have access to information about everyone, they tend to associate \u201caverage person\u201d to a sub-group that may come to mind. Susskind, J., Maurer, K., Thakkar, V., Hamilton, D. L.,& Sherman, J. W. (1999). Perceiving individuals and groups: Expectancies, dispositional inferences, and causal attributions. Journal of Personality and Social Psychology, 76(2), 181\u2013191. URL When asked \u201care you a better ballroom dancer than the average person?\u201d you might think of your grandfather, your boss, your cousin, or a video you watched online and compare yourself to these, even though they are far from representing the average person. These sub-groups that are based on your knowledge and surroundings might be an unconscious explanation of false uniqueness effect. Variables Gender There is a reported gender difference in the expression of the false uniqueness effect. Men tend to be biased in regards to both positive physical and social traits, whereas women tend to be more biased around positive social traits than they are physical traits. Furnham, A.; Dowsett, T. (1993-08-01). \"Sex difference in social comparison and uniqueness bias\". Personality and Individual Differences. 15 (2): 175\u2013183. doi:10.1016/0191-8869(93)90024-W. ISSN 0191-8869. False consensus effect self-serving bias superiority bias social comparison theory self-enhancement", "edit_actions": [{"type": "A", "before": null, "after": ",", "start_char_pos": 155, "end_char_pos": 155}, {"type": "D", "before": ",", "after": null, "start_char_pos": 190, "end_char_pos": 191}, {"type": "R", "before": "False Uniqueness Effect This effect is", "after": "This bias is often measured by looking at the difference between estimates that people make about how many of their peers share a certain trait/ behaviour and the actual number of peers who report these traits and behaviours. Suls, J. (2007). False uniqueness bias. In R. F. Baumeister", "start_char_pos": 222, "end_char_pos": 260}, {"type": "A", "before": null, "after": "K. D. Vohs (Eds.), Encyclopedia of social psychology (Vol. 1, pp. 345-345). Thousand Oaks, CA: SAGE Publications, Inc. doi: 10.4135/9781412956253.n213", "start_char_pos": 261, "end_char_pos": 261}, {"type": "A", "before": null, "after": "In fact, people often think that they are more unique than others in regard to desirable traits. This has been shown in a variety of studies, where, for example, people believe that they are better drivers and less risk-taking than the average driver, less prejudiced than the average resident in their town, or even more hardworking in group projects than others when they are actually not. Svenson, O., 1981. Are we all less risky and more skilful than our fellow drivers? Acta Psychologica. 47 (2), 143-148. URL Fields, J.M.,", "start_char_pos": 262, "end_char_pos": 262}, {"type": "A", "before": null, "after": "Schuman, H. (1976). Public beliefs about the beliefs of the public. Public Opinion Quartely, 40, 427-488. doi: 10.1086/268330 Ross, M.,", "start_char_pos": 263, "end_char_pos": 263}, {"type": "A", "before": null, "after": "Sicoly, F. (1979). Egocentric biases in availability and attribution. Journal of Personality and Social Psychology, 37(3), 322\u2013336. URL", "start_char_pos": 265, "end_char_pos": 265}, {"type": "A", "before": null, "after": "This effect can also be", "start_char_pos": 266, "end_char_pos": 266}, {"type": "R", "before": "a desirable action", "after": "desirable actions", "start_char_pos": 292, "end_char_pos": 310}, {"type": "R", "before": "self esteem, being this", "after": "self-esteem, which is", "start_char_pos": 954, "end_char_pos": 977}, {"type": "R", "before": "ther behaviour.", "after": "their behaviour. Park, Hee Sun; Smith, Sandi W.; Klein, Katherine A.; Martell, Dennis (2011). \"College Students' Estimation and Accuracy of Other Students' Drinking and Believability of Advertisements Featured in a Social Norms Campaign\". Journal of Health Communication. 16 (5): 504\u2013518. doi:10.1080/10810730.2010.546481. ISSN 1081-0730. PMID 21298586.", "start_char_pos": 1026, "end_char_pos": 1041}, {"type": "A", "before": null, "after": "Suls, Jerry; Wan, C. K. (1987). \"In search of the false-uniqueness phenomenon: Fear and estimates of social consensus\". Journal of Personality and Social Psychology. 52 (1): 211\u2013217. doi:10.1037/0022-3514.52.1.211. ISSN 1939-1315.", "start_char_pos": 1208, "end_char_pos": 1208}, {"type": "A", "before": null, "after": "History", "start_char_pos": 1209, "end_char_pos": 1209}, {"type": "A", "before": null, "after": "In 1975, Synder and Shneckel introduced the term \u201cillusion of uniqueness\u201d to describe how people wrongly believe that they are different from others. However, it is Suls, Wan (1987) and Suls, Wan and Sanders (1988) who coined the term false-uniqueness effect in their studies. These two demonstrated that people with low levels of self-reported fears or people that engaged in healthy behaviours underestimated the number of low-fear peers as well as the prevalence of those that were healthy compared to the actual numbers.Suls, Jerry; Wan, C. K. (1987). \"In search of the false-uniqueness phenomenon: Fear and estimates of social consensus\". Journal of Personality and Social Psychology. 52 (1): 211\u2013217. doi:10.1037/0022-3514.52.1.211. ISSN 1939-1315. Suls, J., Wan, C. K.,", "start_char_pos": 1210, "end_char_pos": 1210}, {"type": "A", "before": null, "after": "Sanders, G. S. (1988). False consensus and false uniqueness in estimating the prevalence of health-protective behaviors. Journal of Applied Social Psychology, 18(1), 66\u201379. URL", "start_char_pos": 1212, "end_char_pos": 1212}, {"type": "A", "before": null, "after": "Explanations", "start_char_pos": 1213, "end_char_pos": 1213}, {"type": "A", "before": null, "after": "Self-enhancement", "start_char_pos": 1214, "end_char_pos": 1214}, {"type": "A", "before": null, "after": "As stated above, false uniqueness effect can be seen mostly for desirable or flattering traits and being \u201cbetter than average\u201d. In believing that people are relatively unique and better than others, they are able to enhance or at least maintain their self-esteem. In social comparison, people tend to modify, disregard, or interpret information differently to see themselves in a more positive light. This is also known as the self-enhancement theory. Seeking to ameliorate one\u2019s self-esteem is a strong motivation to believe that your qualities are more unique than that of your peers. In fact, the false uniqueness effect is strongly associated with the perception of superiority or at least the avoidance of inferiority, which can be explained by self-preservation.Vera Hoorens (1993) Self-enhancement and Superiority Biases in Social Comparison, European Review of Social Psychology, 4:1, 113-139, DOI: 10.1080/14792779343000040 As self-enhancement may be a reason as to why false uniqueness effect occurs, cognitive biases or processes seek to understand how they might appear.", "start_char_pos": 1215, "end_char_pos": 1215}, {"type": "A", "before": null, "after": "Cognitive processes", "start_char_pos": 1216, "end_char_pos": 1216}, {"type": "A", "before": null, "after": "Egocentrism", "start_char_pos": 1217, "end_char_pos": 1217}, {"type": "A", "before": null, "after": "Egocentrism refers to the tendency for people to focus solely, or at least place more weight, on their own characteristics and neglect others\u2019 emotions, thoughts, attributes, and/or traits. This means that if people have high abilities, strong traits, make high contributions, or have intense emotions, they are more likely to rate themselves as above average in all of these domains. On the other hand, if people judge themselves to be low in all of the previous domains, they will consider themselves to be below average. Kruger, J. (1999). Lake Wobegon be gone! The \"below-average effect\" and the egocentric nature of comparative ability judgments. Journal of Personality and Social Psychology, 77(2), 221\u2013232. URL This tendency to focus on one\u2019s own absolute standing, therefore explains how people might wrongly perceive certain traits, emotions, or attitudes to be both positively or negatively unique. Alicke, M. D.,", "start_char_pos": 1218, "end_char_pos": 1218}, {"type": "A", "before": null, "after": "Govorun, O. (2005). The Better-Than-Average Effect. In M. D. Alicke, D. A. Dunning,", "start_char_pos": 1219, "end_char_pos": 1219}, {"type": "A", "before": null, "after": "J. I. Krueger (Eds.), Studies in self and identity. The Self in Social Judgment (p. 85\u2013106). Psychology Press. People tend to think a lot more (and maybe even solely) about themselves when making a social comparison when they should be thinking about others as well as it could reduce false uniqueness effects.", "start_char_pos": 1221, "end_char_pos": 1221}, {"type": "A", "before": null, "after": "Focalism", "start_char_pos": 1222, "end_char_pos": 1222}, {"type": "A", "before": null, "after": "People have a tendency to give a lot more weight to information that has been brought to our attention and overlook background information that could be important when making a social comparison, also known as focalism. When making a comparison between two things (often you and another entity), a question might be framed in a way that makes you focus more on one or the other. Research shows that patterns of false uniqueness and false consensus can vary depending on how the question is written. Galesic, M., Olsson, H.,", "start_char_pos": 1223, "end_char_pos": 1223}, {"type": "A", "before": null, "after": "Rieskamp, J. (2018). A sampling model of social judgment. Psychological Review, 125(3), 363-390. URL In determining how unique you are your evaluation will depend on what has been brought to your attention, whether it be traits, emotions, or a particular group of people, which might impair you in making a rational decision.", "start_char_pos": 1224, "end_char_pos": 1224}, {"type": "A", "before": null, "after": "Selective accessibility", "start_char_pos": 1225, "end_char_pos": 1225}, {"type": "A", "before": null, "after": "Aligned with egocentrism, when asked to make a social comparison, information about ourselves comes much more easily to mind, because we know a lot more about ourselves than about others. Therefore the more easily information about one\u2019s particular trait comes to mind, the more importance it will have in the judgement of uniqueness. This can be linked to the availability heuristic, where people give more importance to information that they recall quickly. In accordance with the self-enhancement theory, people might also selectively choose to compare themselves to groups that are less successful than them, known as downward social comparison, as information about people that do not have the same qualities as them might come to mind more quickly. Alicke, M. D.,", "start_char_pos": 1226, "end_char_pos": 1226}, {"type": "A", "before": null, "after": "Govorun, O. (2005). The Better-Than-Average Effect. In M. D. Alicke, D. A. Dunning,", "start_char_pos": 1228, "end_char_pos": 1228}, {"type": "A", "before": null, "after": "J. I. Krueger (Eds.), Studies in self and identity. The Self in Social Judgment (p. 85\u2013106). Psychology Press.", "start_char_pos": 1229, "end_char_pos": 1229}, {"type": "A", "before": null, "after": "Generalized groups", "start_char_pos": 1230, "end_char_pos": 1230}, {"type": "A", "before": null, "after": "When asked to compare ourselves to the average person, because people don\u2019t have access to information about everyone, they tend to associate \u201caverage person\u201d to a sub-group that may come to mind. Susskind, J., Maurer, K., Thakkar, V., Hamilton, D. L.,", "start_char_pos": 1231, "end_char_pos": 1231}, {"type": "A", "before": null, "after": "Sherman, J. W. (1999). Perceiving individuals and groups: Expectancies, dispositional inferences, and causal attributions. Journal of Personality and Social Psychology, 76(2), 181\u2013191. URL When asked \u201care you a better ballroom dancer than the average person?\u201d you might think of your grandfather, your boss, your cousin, or a video you watched online and compare yourself to these, even though they are far from representing the average person. These sub-groups that are based on your knowledge and surroundings might be an unconscious explanation of false uniqueness effect.", "start_char_pos": 1233, "end_char_pos": 1233}, {"type": "A", "before": null, "after": "Variables", "start_char_pos": 1234, "end_char_pos": 1234}, {"type": "A", "before": null, "after": "Gender", "start_char_pos": 1235, "end_char_pos": 1235}, {"type": "A", "before": null, "after": "Furnham, A.; Dowsett, T. (1993-08-01). \"Sex difference in social comparison and uniqueness bias\". Personality and Individual Differences. 15 (2): 175\u2013183. doi:10.1016/0191-8869(93)90024-W. ISSN 0191-8869.", "start_char_pos": 1500, "end_char_pos": 1500}, {"type": "A", "before": null, "after": "self-serving bias superiority bias social comparison theory self-enhancement", "start_char_pos": 1524, "end_char_pos": 1524}], "sents_char_pos": [0, 221, 517, 603, 731, 933, 1041, 1207, 1323, 1499]}
+{"doc_id": "57264039", "revision_depth": "2", "before_revision": "Non-Euclidean geometry and the rotating disk Einstein's formulation of special relativity was in terms of kinematics (the study of moving bodies without reference to forces). Late in 1907, his former mathematics professor, Hermann Minkowski, presented an alternative, geometric interpretation of special relativity in a lecture to the G\u00f6ttingen Mathematical society, introducing the concept of spacetime. Einstein was initially dismissive of Minkowski's geometric interpretation, regarding it as \u00fcberfl\u00fcssige Gelehrsamkeit (superfluous learnedness). 300px|Consideration of the Ehrenfest paradox led Einstein to consider that gravitation curves spacetime. As with special relativity, Einstein's early results in developing what was ultimately to become general relativity were accomplished using kinematic analysis rather than geometric techniques of analysis. Starting with the equivalence principle, Einstein deduced the phenomena of gravitational time dilation, the gravitational bending of light (albeit with the wrong value ) , and the gravitational slowing of the speed of light . By 1912, however, Einstein had reached an impasse , realizing that he needed to go beyond the mathematics that he knew and was familiar with.", "after_revision": "Early applications of the equivalence principle Einstein's formulation of special relativity was in terms of kinematics (the study of moving bodies without reference to forces). Late in 1907, his former mathematics professor, Hermann Minkowski, presented an alternative, geometric interpretation of special relativity in a lecture to the G\u00f6ttingen Mathematical society, introducing the concept of spacetime. Einstein was initially dismissive of Minkowski's geometric interpretation, regarding it as \u00fcberfl\u00fcssige Gelehrsamkeit (superfluous learnedness). As with special relativity, Einstein's early results in developing what was ultimately to become general relativity were accomplished using kinematic analysis rather than geometric techniques of analysis. In his 1907 Jahrbuch paper, Einstein first addressed the question of whether the propagation of light is influenced by gravitation, and whether there is any effect of a gravitational field on clocks. In 1911, Einstein returned to this subject, in part because he had realized that certain predictions of his nascent theory were amenable to experimental test. By the time of his 1911 paper, Einstein and other scientists had offered several alternative demonstrations that the inertial mass of a body increases with its energy content: If the energy increase of the body is , then the increase in its inertial mass is Einstein asked whether there is an increase of gravitational mass corresponding to the increase in inertial mass, and if there is such an increase, is the increase in gravitational mass precisely the same as its increase in inertial mass? Using the equivalence principle, Einstein concluded that this must be so. Einstein's argument that falling light acquires energy To show that the equivalence principle necessarily implies the gravitation of energy, Einstein considered a light source separated along the z\u2011axis by a distance above a receiver in a homogeneous gravitational field having a force per unit mass of 1 A certain amount of electromagnetic energy is emitted by towards According to the equivalence principle, this system is equivalent to a gravitation-free system which moves with uniform acceleration in the direction of the positive z\u2011axis, with separated by a constant distance from In the accelerated system, light emitted from takes (to a first approximation) to arrive at But in this time , the velocity of will have increased by from its velocity when the light was emitted. The energy arriving at will therefore not be the energy but the greater energy given by According to the equivalence principle, the same relation holds for the non-accelerated system in a gravitational field, where we replace by the gravitational potential difference between and so that The energy arriving at is greater than the energy emitted by by the potential energy of the mass in the gravitational field. Hence corresponds to the gravitational mass as well as the inertial mass of a quantity of energy. Einstein's 1911 thought experiment to demonstrate that the energy of gravitational mass must equal the energy of inertial mass To further clarify that the energy of gravitational mass must equal the energy of inertial mass, Einstein proposed the following cyclic process: (a) A light source is situated a distance above a receiver in a uniform gravitational field. A movable mass can shuttle between and (b) A pulse of electromagnetic energy is sent from to The energy is absorbed by (c) Mass is lowered from to releasing an amount of work equal to (d) The energy absorbed by is transferred to This increases the gravitational mass of to a new value (e) The mass is lifted back to , requiring the input of work (e) The energy carried by the mass is then transferred to completing the cycle. Conservation of energy demands that the difference in work between raising the mass and lowering the mass, , must equal or one could potentially define a perpetual motion machine. Therefore, In other words, the increase in gravitational mass predicted by the above arguments is precisely equal to the increase in inertial mass predicted by special relativity. Einstein then considered sending a continuous electromagnetic beam of frequency (as measured at ) from to in a homogeneous gravitational field. The frequency of the light as measured at will be a larger value given by Einstein noted that the above equation seemed to imply something absurd: Given that the transmission of light from to is continuous, how could the number of periods emitted per second from be different from that received at It is impossible for wave crests to appear on the way down from to . The simple answer is that this question presupposes an absolute nature of time, when in fact there is nothing that compels us to assume that clocks situated at different gravitational potentials must be conceived of as going at the same rate. The principle of equivalence implies gravitational time dilation. It is important to realize that Einstein's arguments predicting gravitational time dilation are valid for any theory of gravity that respects the principle of equivalence. This includes Newtonian gravitation. Experiments such as the Pound\u2013Rebka experiment, which have firmly established gravitational time dilation, therefore do not serve to distinguish general relativity from Newtonian gravitation. In the remainder of Einstein's 1911 paper, he discussed the bending of light rays in a gravitational field, but given the incomplete nature of Einstein's theory as it existed at the time, the value that he predicted was half the value that would later be predicted by the full theory of general relativity. (ArXiv version here: arxiv.org/abs/1403.7377.)Ned Wright: Deflection and Delay of Light Non-Euclidean geometry and the rotating disk 300px|Consideration of the Ehrenfest paradox led Einstein to consider that gravitation curves spacetime. By 1912, Einstein had reached an impasse in his kinematic development of general relativity , realizing that he needed to go beyond the mathematics that he knew and was familiar with.", "edit_actions": [{"type": "R", "before": "Non-Euclidean geometry and the rotating disk", "after": "Early applications of the equivalence principle", "start_char_pos": 0, "end_char_pos": 44}, {"type": "D", "before": "300px|Consideration of the Ehrenfest paradox led Einstein to consider that gravitation curves spacetime.", "after": null, "start_char_pos": 550, "end_char_pos": 654}, {"type": "R", "before": "Starting with the", "after": "In his 1907 Jahrbuch paper, Einstein first addressed the question of whether the propagation of light is influenced by gravitation, and whether there is any effect of a gravitational field on clocks. In 1911, Einstein returned to this subject, in part because he had realized that certain predictions of his nascent theory were amenable to experimental test.", "start_char_pos": 860, "end_char_pos": 877}, {"type": "A", "before": null, "after": "By the time of his 1911 paper, Einstein and other scientists had offered several alternative demonstrations that the inertial mass of a body increases with its energy content: If the energy increase of the body is , then the increase in its inertial mass is", "start_char_pos": 878, "end_char_pos": 878}, {"type": "A", "before": null, "after": "Einstein asked whether there is an increase of gravitational mass corresponding to the increase in inertial mass, and if there is such an increase, is the increase in gravitational mass precisely the same as its increase in inertial mass? Using the", "start_char_pos": 879, "end_char_pos": 879}, {"type": "R", "before": "deduced the phenomena of gravitational time dilation, the gravitational bending of light (albeit with the wrong value )", "after": "concluded that this must be so.", "start_char_pos": 912, "end_char_pos": 1031}, {"type": "A", "before": null, "after": "Einstein's argument that falling light acquires energy To show that the equivalence principle necessarily implies the gravitation of energy, Einstein considered a light source separated along the z\u2011axis by a distance above a receiver in a homogeneous gravitational field having a force per unit mass of 1 A certain amount of electromagnetic energy is emitted by towards According to the equivalence principle, this system is equivalent to a gravitation-free system which moves with uniform acceleration in the direction of the positive z\u2011axis, with separated by a constant distance from", "start_char_pos": 1032, "end_char_pos": 1032}, {"type": "A", "before": null, "after": "In the accelerated system, light emitted from takes (to a first approximation) to arrive at But in this time", "start_char_pos": 1033, "end_char_pos": 1033}, {"type": "D", "before": "and", "after": null, "start_char_pos": 1036, "end_char_pos": 1039}, {"type": "R", "before": "gravitational slowing of the speed of light .", "after": "velocity of will have increased by from its velocity when the light was emitted. The energy arriving at will therefore not be the energy but the greater energy given by", "start_char_pos": 1044, "end_char_pos": 1089}, {"type": "A", "before": null, "after": "According to the equivalence principle, the same relation holds for the non-accelerated system in a gravitational field, where we replace by the gravitational potential difference between and so that", "start_char_pos": 1090, "end_char_pos": 1090}, {"type": "A", "before": null, "after": "The energy arriving at is greater than the energy emitted by by the potential energy of the mass in the gravitational field. Hence corresponds to the gravitational mass as well as the inertial mass of a quantity of energy.", "start_char_pos": 1091, "end_char_pos": 1091}, {"type": "A", "before": null, "after": "Einstein's 1911 thought experiment to demonstrate that the energy of gravitational mass must equal the energy of inertial mass To further clarify that the energy of gravitational mass must equal the energy of inertial mass, Einstein proposed the following cyclic process: (a) A light source is situated a distance above a receiver in a uniform gravitational field. A movable mass can shuttle between and (b) A pulse of electromagnetic energy is sent from to The energy is absorbed by (c) Mass is lowered from to releasing an amount of work equal to (d) The energy absorbed by is transferred to This increases the gravitational mass of to a new value (e) The mass is lifted back to , requiring the input of work (e) The energy carried by the mass is then transferred to completing the cycle.", "start_char_pos": 1092, "end_char_pos": 1092}, {"type": "A", "before": null, "after": "Conservation of energy demands that the difference in work between raising the mass and lowering the mass, , must equal or one could potentially define a perpetual motion machine. Therefore,", "start_char_pos": 1093, "end_char_pos": 1093}, {"type": "A", "before": null, "after": "In other words, the increase in gravitational mass predicted by the above arguments is precisely equal to the increase in inertial mass predicted by special relativity.", "start_char_pos": 1094, "end_char_pos": 1094}, {"type": "A", "before": null, "after": "Einstein then considered sending a continuous electromagnetic beam of frequency (as measured at ) from to in a homogeneous gravitational field. The frequency of the light as measured at will be a larger value given by", "start_char_pos": 1095, "end_char_pos": 1095}, {"type": "A", "before": null, "after": "Einstein noted that the above equation seemed to imply something absurd: Given that the transmission of light from to is continuous, how could the number of periods emitted per second from be different from that received at It is impossible for wave crests to appear on the way down from to . The simple answer is that this question presupposes an absolute nature of time, when in fact there is nothing that compels us to assume that clocks situated at different gravitational potentials must be conceived of as going at the same rate. The principle of equivalence implies gravitational time dilation.", "start_char_pos": 1096, "end_char_pos": 1096}, {"type": "A", "before": null, "after": "It is important to realize that Einstein's arguments predicting gravitational time dilation are valid for any theory of gravity that respects the principle of equivalence. This includes Newtonian gravitation. Experiments such as the Pound\u2013Rebka experiment, which have firmly established gravitational time dilation, therefore do not serve to distinguish general relativity from Newtonian gravitation.", "start_char_pos": 1097, "end_char_pos": 1097}, {"type": "A", "before": null, "after": "In the remainder of Einstein's 1911 paper, he discussed the bending of light rays in a gravitational field, but given the incomplete nature of Einstein's theory as it existed at the time, the value that he predicted was half the value that would later be predicted by the full theory of general relativity. (ArXiv version here: arxiv.org/abs/1403.7377.)Ned Wright: Deflection and Delay of Light", "start_char_pos": 1098, "end_char_pos": 1098}, {"type": "A", "before": null, "after": "Non-Euclidean geometry and the rotating disk", "start_char_pos": 1099, "end_char_pos": 1099}, {"type": "A", "before": null, "after": "300px|Consideration of the Ehrenfest paradox led Einstein to consider that gravitation curves spacetime.", "start_char_pos": 1100, "end_char_pos": 1100}, {"type": "D", "before": "however,", "after": null, "start_char_pos": 1110, "end_char_pos": 1118}, {"type": "A", "before": null, "after": "in his kinematic development of general relativity", "start_char_pos": 1151, "end_char_pos": 1151}], "sents_char_pos": [0, 174, 404, 549, 654, 859, 1089]}
+{"doc_id": "57482751", "revision_depth": "1", "before_revision": "Diceball! is a baseball board game where two players roll the dice to face each other on a baseball field. Just like in baseball, there is a visiting team and a home team. Both players use the dice to throw the baseball from the mound to the plate and field the ball on defense. Diceball! was designed to mirror the statistical reality of baseball. A regular game of Diceball! ( without extra innings ) lasts on average 45 minutes. The game was designed on a pizza box by a 16-year old from Rawdon, Qu\u00e9bec, Daniel Girard, in 1979, while the Montreal Expos were chasing the pennant in the National League. Daniel Girard brought his game to his high school, where he organized tournaments with other students. Given the popularity of the game in his school, Girard also brought his game to University where it caught fire too. The interest created by the game was noticed by an entrepreneur, Louis Desjardins . Louis Desjardins decided to launch the game alongside Daniel Girard. Gameplay and rules To start the game, the visiting team puts a pawn (as a batter and eventually runner) in the batter's box, to get the pitcher's throws. The die replaces the ball. The pitcher rolls the die until 1) the batter is struck out 2) the batter is walked or 3) or the ball is hit. If the ball is hit, the offensive team rolls a die to determine the number of dice to be used to hit the ball. The number of dice indicated are rolled and added up. Numbers from 1 to 36 show the location where the ball is hit and the ball is placed on the game board. If the ball is hit on a circle, the ball was hit in the air and an out is recorded. If the ball is hit on a number in a cloud, it means that this is a ground ball and that the batter will have to try to reach a base before the defense throws to that base. If the ball is hit to a star-shaped zone, the runner starts to run around the bases while the defence goes to recover the ball on the star. If the stars are from 27 to 36 it is a home run and all runners score. Every batter who runs around the bases and reaches home plate before three outs score a run. As soon as three outs are recorded, stranded runners are removed from the bases. The teams trade places: the defense becomes the offense. Expert version An Expert section in the rule book includes more baseball features like the stolen base, the sacrifice bunt and the sacrifice fly . Strategy Strategy plays a role in the game . The ability to decide when to run around the bases or to stop will create momentum or result in outs. Players have the power to try to steal a base, to order a bunt to try to send a runner to second to avoid the double play and/or put a player in a scoring position. A player can also try to advance or score on a sacrifice fly. All these extra plays are subjected to the laws of probability like the rest of the rules of Diceball. In January 1994, Diceball was presented in the American International Toy Fair in New York and Daniel Girard, a Diceball inventor, said in an interview to the Montreal Gazette: The Canadian Toy Testing Council (CTTC) , a non-profit agency, that publishes a Toy Report yearly included Diceball in its 1994 report. The game received a three-star rating, the highest score. According to the Montreal Gazette, the game was shipped off to 300 test families in the Ottawa-Hull area for evaluation. Response was excellent across the board, especially from players who liked baseball. Diceball has won the council's highest accolade, a three-star rating. The game was also reviewed in USA TODAY and got press coverage in Canada's national newspaper, The Globe and Mail, The Toronto Star and The Ottawa Citizen. It was also featured in Quebec in La Presse and Le Journal de Montr\u00e9al. In Canada, Diceball! had also a lot of television coverage where it was featured on CTV and CBC-Canadian Broadcasting Corporation. Social and tournament play Before it was launched and while it was launched, Diceball! was the center of many tournaments, in schools, colleges and workplaces. Former Expos pitcher Denis Boucher won a Diceball! tournament involving sports reporters in Montreal. After the tournament, Boucher said that you will find in Diceball! all the things that happen in real baseball. He added that playing the game is a great way to spend time with friends. By winning the Diceball! tournament, Denis Boucher was given a $250 cheque that he gave to the Sun Youth Organization. Diceball! got positive press reviews partly because of its statistical similarities to the actual games of baseball. In Diceball! the batter puts the ball in play 66\\% of the time compared to 76\\% in Major League Baseball. The batter is struck out 23\\% of the time, against 15\\% in baseball. 11\\% of the at-bats end up in walks compared to 9\\% in baseball. The ball is hit a few less times in Diceball! However, the game is balanced out by the greater probability of getting a base hit when the ball is hit (.339 vs. .304). Taking into accounts strikeouts, the offensive average in Diceball! is almost the same as baseball. .251 versus .254. Since there are more walks and errors in Diceball! than in real baseball, the players on-base percentage is .349 compared to .340 in real baseball. Even the odds of getting an out are realistic. 33.6\\% of ground balls in Diceball! (34.8\\% in baseball) 11.7\\% are flyballs or liners to the infield (14.7\\% in baseball) and 20.8\\% are fly balls in the outfield (20.1\\% in baseball). On average one more runner gets on base from each team in a Diceball! game than in an actual baseball game. The more dice you roll on a hit ball, the greater the probability of getting a base hit. With one die, the average is .167; with 2 it is .278; with 3, .287; with 4 dice, it is .356; with 5 dice .351; with 6 dice, your average climbs to .472. The overall average when the ball is hit in play is .319, not counting infield hits. Adding infield hits, the overall average when the ball is hit is .339.MLB statistics used in the text were taken from:", "after_revision": "Diceball! is a baseball board game where two players roll the dice to face each other on a baseball field. Just like in baseball, there is a visiting team and a home team. Both players use the dice to throw the baseball from the mound to the plate and field the ball on defense. Diceball! was designed to mirror the statistical reality of baseball. A regular game of Diceball! without extra innings lasts about 45 minutes. The game was designed on a pizza box by a 16-year old from Rawdon, Qu\u00e9bec, Daniel Girard, in 1979, while the Montreal Expos were chasing the pennant in the National League. Girard brought his game to his high school, where he organized tournaments with other students. Given the popularity of the game in his school, Girard also brought his game to university where it caught fire too. The interest created by the game was noticed by an entrepreneur, Louis Desjardins , who launched the game with Girard. Gameplay and rules To start the game, the visiting team puts a pawn (as a batter and eventually runner) in the batter's box, to get the pitcher's throws. The die replaces the ball. The pitcher rolls the die until either the batter is struck out , the batter is walked , or the ball is hit. If the ball is hit, the offensive team rolls a die to determine the number of dice to be used to hit the ball. The number of dice indicated are rolled and added up. Numbers from 1 to 36 show the location where the ball is hit and the ball is placed on the game board. If the ball is hit on a circle, the ball was hit in the air and an out is recorded. If the ball is hit on a number in a cloud, it is a ground ball and that the batter will have to try to reach a base before the defense throws to that base. If the ball is hit to a star-shaped zone, the runner starts to run around the bases while the defence recovers the ball on the star. If the stars are from 27 to 36 it is a home run and all runners score. Every batter who runs around the bases and reaches home plate before three outs scores a run. As soon as three outs are recorded, stranded runners are removed from the bases. The teams trade places: the defense becomes the offense. Expert version An expert section in the rule book includes more baseball features like stolen bases, sacrifice bunts and sacrifice flies . Strategy Strategy plays a role . The ability to decide when to run around the bases or to stop will create momentum or result in outs. Players have the power to try to steal a base, to order a bunt to try to send a runner to second to avoid a double play and/or put a player in a scoring position. A player can also try to advance or score on a sacrifice fly. All these extra plays are subjected to the laws of probability like the rest of the rules of Diceball. In January 1994, Diceball was presented in the American International Toy Fair in New York and Girard, the Diceball inventor, said in an interview to the Montreal Gazette: The Canadian Toy Testing Council , a non-profit agency, that publishes a toy report yearly included Diceball in its 1994 report. The game received a three-star rating, the highest score. According to the Montreal Gazette, the game was shipped off to 300 test families in the Ottawa-Hull area for evaluation. Response was excellent across the board, especially from players who liked baseball. Diceball has won the council's highest accolade, a three-star rating. The game was also reviewed in USA Today and got press coverage in Canada's national newspaper, The Globe and Mail, The Toronto Star and The Ottawa Citizen. It was also featured in Quebec in La Presse and Le Journal de Montr\u00e9al. In Canada, Diceball! had also a lot of television coverage where it was featured on CTV Television Network and Canadian Broadcasting Corporation. Social and tournament play Before and while it was launched, Diceball! was the center of many tournaments, in schools, colleges and workplaces. Former Expos pitcher Denis Boucher won a Diceball! tournament involving sports reporters in Montreal. After the tournament, Boucher said , \" you will find in Diceball! all the things that happen in real baseball. \" He added that playing the game is a great way to spend time with friends. By winning the Diceball! tournament, Boucher was given a $250 cheque that he gave to the Sun Youth Organization. Diceball! got positive press reviews partly because of its statistical similarities to the game of baseball. In Diceball! the batter puts the ball in play 66\\% of the time compared to 76\\% in Major League Baseball. The batter is struck out 23\\% of the time, against 15\\% in baseball. 11\\% of the at-bats end up in walks compared to 9\\% in baseball. The ball is hit a few less times in Diceball! However, the game is balanced out by the greater probability of getting a base hit when the ball is hit (.339 vs. .304). Taking into accounts strikeouts, the offensive average in Diceball! is almost the same as baseball. .251 versus .254. Since there are more walks and errors in Diceball! than in real baseball, the players on-base percentage is .349 compared to .340 in real baseball. Even the odds of getting an out are realistic. 33.6\\% of ground balls in Diceball! (34.8\\% in baseball) 11.7\\% are flyballs or liners to the infield (14.7\\% in baseball) and 20.8\\% are fly balls in the outfield (20.1\\% in baseball). On average one more runner gets on base from each team in a Diceball! game than in a Major League Baseball game. The more dice rolled on a hit ball, the greater the probability of getting a base hit. With one die, the average is .167; with 2 it is .278; with 3, .287; with 4 dice, it is .356; with 5 dice .351; with 6 dice, the average climbs to .472. The overall average when the ball is hit in play is .319, not counting infield hits. Adding infield hits, the overall average when the ball is hit is .339.MLB statistics used in the text were taken from:", "edit_actions": [{"type": "D", "before": "(", "after": null, "start_char_pos": 377, "end_char_pos": 378}, {"type": "R", "before": ") lasts on average", "after": "lasts about", "start_char_pos": 401, "end_char_pos": 419}, {"type": "D", "before": "Daniel", "after": null, "start_char_pos": 605, "end_char_pos": 611}, {"type": "R", "before": "University", "after": "university", "start_char_pos": 788, "end_char_pos": 798}, {"type": "R", "before": ". Louis Desjardins decided to launch the game alongside Daniel", "after": ", who launched the game with", "start_char_pos": 907, "end_char_pos": 969}, {"type": "R", "before": "1)", "after": "either", "start_char_pos": 1191, "end_char_pos": 1193}, {"type": "R", "before": "2)", "after": ",", "start_char_pos": 1219, "end_char_pos": 1221}, {"type": "R", "before": "or 3) or", "after": ", or", "start_char_pos": 1243, "end_char_pos": 1251}, {"type": "D", "before": "means that this", "after": null, "start_char_pos": 1667, "end_char_pos": 1682}, {"type": "R", "before": "goes to recover", "after": "recovers", "start_char_pos": 1895, "end_char_pos": 1910}, {"type": "R", "before": "score", "after": "scores", "start_char_pos": 2084, "end_char_pos": 2089}, {"type": "R", "before": "Expert", "after": "expert", "start_char_pos": 2253, "end_char_pos": 2259}, {"type": "R", "before": "the stolen base, the sacrifice bunt and the sacrifice fly", "after": "stolen bases, sacrifice bunts and sacrifice flies", "start_char_pos": 2322, "end_char_pos": 2379}, {"type": "D", "before": "in the game", "after": null, "start_char_pos": 2413, "end_char_pos": 2424}, {"type": "R", "before": "the", "after": "a", "start_char_pos": 2635, "end_char_pos": 2638}, {"type": "R", "before": "Daniel Girard, a", "after": "Girard, the", "start_char_pos": 2954, "end_char_pos": 2970}, {"type": "D", "before": "(CTTC)", "after": null, "start_char_pos": 3069, "end_char_pos": 3075}, {"type": "R", "before": "Toy Report", "after": "toy report", "start_char_pos": 3116, "end_char_pos": 3126}, {"type": "R", "before": "TODAY", "after": "Today", "start_char_pos": 3540, "end_char_pos": 3545}, {"type": "R", "before": "and CBC-Canadian", "after": "Television Network and Canadian", "start_char_pos": 3822, "end_char_pos": 3838}, {"type": "D", "before": "it was launched", "after": null, "start_char_pos": 3899, "end_char_pos": 3914}, {"type": "R", "before": "that", "after": ", \"", "start_char_pos": 4162, "end_char_pos": 4166}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 4239, "end_char_pos": 4239}, {"type": "D", "before": "Denis", "after": null, "start_char_pos": 4351, "end_char_pos": 4356}, {"type": "R", "before": "actual games", "after": "game", "start_char_pos": 4524, "end_char_pos": 4536}, {"type": "R", "before": "an actual baseball", "after": "a Major League Baseball", "start_char_pos": 5539, "end_char_pos": 5557}, {"type": "R", "before": "you roll", "after": "rolled", "start_char_pos": 5578, "end_char_pos": 5586}, {"type": "R", "before": "your", "after": "the", "start_char_pos": 5777, "end_char_pos": 5781}], "sents_char_pos": [0, 106, 171, 278, 348, 376, 431, 604, 707, 824, 977, 1131, 1158, 1268, 1379, 1433, 1536, 1620, 1792, 1932, 2003, 2096, 2177, 2234, 2426, 2528, 2693, 2755, 2858, 3171, 3229, 3350, 3435, 3505, 3661, 3733, 3754, 3864, 4024, 4126, 4238, 4313, 4432, 4549, 4655, 4724, 4789, 4835, 4956, 5074, 5222, 5455, 5563, 5652, 5687, 5706, 5720, 5745, 5763, 5805, 5890, 5961]}
+{"doc_id": "57519583", "revision_depth": "1", "before_revision": "A formula restaurant is a subcategory of formula retail business. It is characterized as a restaurant regulated by contractual or other arrangements to standardize menus, ingredients, food preparation, interior / exterior design and/or uniforms. Formula retail is a type of sales activity required by contractual or other arrangements to offer a standardized array of services and/or merchandise, trademark, interior / exterior design and/or uniforms.Town of Jaffrey Planning Board Proposed Zoning Changes Summary, Public Hearing January 22, 2018, Town of Jaffrey, New Hampshire (.pdf) The definition often refers to \"substantially identical to a specified number of other restaurants, \" a number which may vary.McCall, ID proposal to amend restriction from \"one or more\" to \"five\" (. pdf)San Francisco retail use (11 or more)Port Townsend (14 or more) Difference between a formula restaurant and a \"chain \" There is considerable financial overlap, but \"chain restaurant\" refers to ownership or franchise , whereas \"formula restaurant\" refers to the characteristics of the business. A formula restaurant doesn't need to be a chain but it generally is . Nevertheless, most codified municipal regulation relies on definitions of formula restaurant or formula retail (although non-codified restrictions will sometimes target \"chains\"). Formula retail Formula restaurants are a subset of formula retail businesses. Disguised formula restaurants In some cases, a chain may establish a set of formula restaurants but attempt to present each venue as unique. This is common with hotel chains, which rely on centralized meal planning and management, but still want to avoid the appearance of their in-house dining facilities being formulaic. Generally, the local manager is encouraged to modify the corporate menu so as to present the appearance of a unique character, while still building the menu around a corporate model (e.g., several entrees based on frozen chicken breast in accordance with a corporate formula).Building a Successful Hotel Restaurant, Hotel F&B, 4-Jul-2007First Hospitality Group's Justin Harkey wants hotels to create a new recipe, Hotel Management 13-Apr-2017 Nevertheless, it is often possible for the consumer to identify disguised formula restaurants by their marketing indicator; e.g., intense use of staged photographs on the menu, frequent use of marketing buzzwords (or marketing terms) such as \"add\" listed under multiple menu items.Restaurant menus and pictures: Yes or No?, gritsandgrids.com Concerns have been expressed that formula restaurants harm the unique characteristics of cities and towns.The Impact of Chain Stores on Community, Institute for Local Self-Reliance (ILSR)ILSR report on Sanibel, Florida business restrictionsHow do chain restaurants embody gentrification? Marketplace 5-Dec-2014 Formula restaurants tend to be marketing centric or based on perception. Formula restaurants harm local independent businesses.Hyper gentrification and the Disappearance of Local Businesses, governing.com Formula restaurants (at least formula fast-food restaurants ) rely on an economic model that encourages the use of disposable tableware. www.skoozeme.com/issues/dontbus.html This in turn relies on training consumers (adults and children) to bus disposables, but not durable tableware. Formula restaurants create a negative economy in waste and food distribution, in part to support the business model of the controlling corporation. Formula restaurants accelerate gentrification but deteriorate quality of life. Legal issues Formula restaurant restrictions (and formula retail restrictions in general) have been challenged as an impermissible restriction on interstate commerce (in the US), as exceeding municipal zoning authority , The Park at Cross Creek v. City of Malibu Calif. Ct. App., 2nd. Dist. Filed 21-Jun-2017 (.pdf)Chain Store Ordinance Resurrected From the Dead, The Malibu Times 1-Nov-2017 %DIFDELCMD < %DIFDELCMD < %%% Restrictions are generally held permissible if they are not arbitrary, and directed to the character of the business and not the ownership.California Appeals Ct. upheld San Diego ordinance restricting formula retail businesses in Coronado from Vermont Planners Association (.pdf)Coronado challenge to Formula Business Restrictions, Institute for Local Self-RelianceCoronadans Organized for Retail Enhancement v. City of Coronado, 2003 Cal. App. Unpub. LEXIS 5769, Calif. Ct. App., 4th Dist. Filed 13-Jun-2003 (.pdf ) Response and regulation Informal restrictions and restrictions not defining formula retail or its equivalent Ketchum, Idaho has traditionally restricted franchise restaurants through the zoning approval process. The city has no formal formula restaurant ordinances. Iceland has informal health restrictions that discourage some formula restaurants.webcam of \"the last McDonald's in Iceland\"%DIFDELCMD < %DIFDELCMD < %%% Examples of formal restaurant and formula retail restrictions Malibu, California compiled a listAnalysis of Cities with Formula Business Ordinances, Malibu (.pdf) of municipalities that restrict formula retail. Bermuda has banned all franchised restaurants in the country (Prohibited Restaurant Act of 1997).(dailymeal slideshow listicle )", "after_revision": "A formula restaurant is a type of formula retail business. It is characterized as a restaurant regulated by contractual or other arrangements to standardize menus, ingredients, food preparation, interior and exterior design and/or uniforms. The term refers to the characteristics of the restaurant rather than its ownership, following a business model controlled by an overseeing corporation. Most formula restaurants are chain restaurants, though this does not have to be the case. In legal definitions, there may be a minimum number of \"substantially identical\" restaurants for them to be considered formula restaurants. This number varies across jurisdictions.McCall, ID proposal to amend restriction from \"one or more\" to \"five\" (.pdf)San Francisco retail use (11 or more)Port Townsend (14 or more) Formula retail Formula retail is a type of sales activity required by contractual or other arrangements to offer a standardized array of services and/or merchandise, trademark, interior or exterior design and/or uniforms.Town of Jaffrey Planning Board Proposed Zoning Changes Summary, Public Hearing January 22, 2018, Town of Jaffrey, New Hampshire (.pdf) This applies to the restaurant industry where menus, ingredients and food preparation may be standardized according to the overseeing corporation's business model, intended to maximize marketing potential. Comparison with chain restaurants Although there is considerable financial overlap, \"chain restaurant\" refers to ownership or franchise while \"formula restaurant\" refers to the characteristics of the business. A formula restaurant doesn't need to belong to a chain but it generally does . Nevertheless, most codified municipal regulation relies on definitions of formula restaurant or formula retail (although non-codified restrictions will sometimes target \"chains\"). Disguised formula restaurants In some cases, a chain may establish a set of formula restaurants but attempt to present each venue as unique. This is common with hotel chains, which rely on centralized meal planning and management, but want to avoid the appearance of their in-house dining facilities being formulaic. Generally, the local manager is encouraged to modify the corporate menu so as to present the appearance of a unique character, while still building the menu around a corporate model (e.g., several entrees based on frozen chicken breast in accordance with a corporate formula).Building a Successful Hotel Restaurant, Hotel F&B, 4-Jul-2007First Hospitality Group's Justin Harkey wants hotels to create a new recipe, Hotel Management 13-Apr-2017 Disguised formula restaurants may be recognized by marketing indicators: intense use of staged photographs on the menu, frequent use of marketing buzzwords (or marketing terms) such as \"add\" listed under multiple menu items.Restaurant menus and pictures: Yes or No?, gritsandgrids.com Concerns have been expressed that formula restaurants detract from the unique characteristics of cities and towns.The Impact of Chain Stores on Community, Institute for Local Self-Reliance (ILSR)ILSR report on Sanibel, Florida business restrictionsHow do chain restaurants embody gentrification? Marketplace 5-Dec-2014 The standardization of menus can mean fewer choices for consumers. Formula restaurants tend to be marketing centric or based on perception. Formula restaurants can harm local independent businesses.Hyper gentrification and the Disappearance of Local Businesses, governing.com Formula restaurants accelerate gentrification but deteriorate quality of life. Formula restaurants often rely on an economic model that encourages the use of disposable tableware. www.skoozeme.com/issues/dontbus.html This can create a negative economy in waste and food distribution, in part to support the business model of the controlling corporation. Response and regulation Informal restrictions Ketchum, Idaho has traditionally restricted franchise restaurants through the zoning approval process. The city has no formal formula restaurant ordinances. Iceland has informal health restrictions that discourage some formula restaurants.webcam of \"the last McDonald's in Iceland\" Formal restrictions Malibu, California compiled a list of municipalities that restrict formula retail.Analysis of Cities with Formula Business Ordinances, Malibu (.pdf) Bermuda has banned all franchised restaurants in the country (Prohibited Restaurant Act of 1997).(dailymeal slideshow listicle) Legal challenges In the United States, legal restrictions on formula restaurants (and formula retail in general) have been challenged as an impermissible restriction on interstate commerce , and as exceeding municipal zoning authority . The Park at Cross Creek v. City of Malibu Calif. Ct. App., 2nd. Dist. Filed 21-Jun-2017 (.pdf)Chain Store Ordinance Resurrected From the Dead, The Malibu Times 1-Nov-2017 %DIFDELCMD < %DIFDELCMD < %%% Restrictions are generally held permissible if they are not arbitrary, and directed to the character of the business and not the ownership.California Appeals Ct. upheld San Diego ordinance restricting formula retail businesses in Coronado from Vermont Planners Association (.pdf)Coronado challenge to Formula Business Restrictions, Institute for Local Self-RelianceCoronadans Organized for Retail Enhancement v. City of Coronado, 2003 Cal. App. Unpub. LEXIS 5769, Calif. Ct. App., 4th Dist. Filed 13-Jun-2003 (.pdf %DIFDELCMD < %DIFDELCMD < %%% )", "edit_actions": [{"type": "R", "before": "subcategory", "after": "type", "start_char_pos": 26, "end_char_pos": 37}, {"type": "R", "before": "/", "after": "and", "start_char_pos": 211, "end_char_pos": 212}, {"type": "R", "before": "Formula retail", "after": "The term refers to the characteristics of the restaurant rather than its ownership, following a business model controlled by an overseeing corporation. Most formula restaurants are chain restaurants, though this does not have to be the case.", "start_char_pos": 246, "end_char_pos": 260}, {"type": "A", "before": null, "after": "In legal definitions, there may be a minimum number of \"substantially identical\" restaurants for them to be considered formula restaurants. This number varies across jurisdictions.McCall, ID proposal to amend restriction from \"one or more\" to \"five\" (.pdf)San Francisco retail use (11 or more)Port Townsend (14 or more)", "start_char_pos": 261, "end_char_pos": 261}, {"type": "A", "before": null, "after": "Formula retail", "start_char_pos": 262, "end_char_pos": 262}, {"type": "A", "before": null, "after": "Formula retail", "start_char_pos": 263, "end_char_pos": 263}, {"type": "R", "before": "/", "after": "or", "start_char_pos": 420, "end_char_pos": 421}, {"type": "A", "before": null, "after": "This applies to the restaurant industry where menus, ingredients and food preparation may be standardized according to the overseeing corporation's business model, intended to maximize marketing potential.", "start_char_pos": 589, "end_char_pos": 589}, {"type": "R", "before": "The definition often refers to \"substantially identical to a specified number of other restaurants, \" a number which may vary.McCall, ID proposal to amend restriction from \"one or more\" to \"five\" (. pdf)San Francisco retail use (11 or more)Port Townsend (14 or more)", "after": "Comparison with chain restaurants", "start_char_pos": 590, "end_char_pos": 856}, {"type": "D", "before": "Difference between a formula restaurant and a \"chain \"", "after": null, "start_char_pos": 857, "end_char_pos": 911}, {"type": "R", "before": "There", "after": "Although there", "start_char_pos": 912, "end_char_pos": 917}, {"type": "D", "before": "but", "after": null, "start_char_pos": 953, "end_char_pos": 956}, {"type": "R", "before": ", whereas", "after": "while", "start_char_pos": 1009, "end_char_pos": 1018}, {"type": "R", "before": "be", "after": "belong to", "start_char_pos": 1124, "end_char_pos": 1126}, {"type": "R", "before": "is", "after": "does", "start_char_pos": 1152, "end_char_pos": 1154}, {"type": "D", "before": "Formula retail", "after": null, "start_char_pos": 1337, "end_char_pos": 1351}, {"type": "D", "before": "Formula restaurants are a subset of formula retail businesses.", "after": null, "start_char_pos": 1352, "end_char_pos": 1414}, {"type": "D", "before": "still", "after": null, "start_char_pos": 1650, "end_char_pos": 1655}, {"type": "R", "before": "Nevertheless, it is often possible for the consumer to identify disguised formula restaurants by their marketing indicator; e.g.,", "after": "Disguised formula restaurants may be recognized by marketing indicators:", "start_char_pos": 2181, "end_char_pos": 2310}, {"type": "R", "before": "harm", "after": "detract from", "start_char_pos": 2577, "end_char_pos": 2581}, {"type": "A", "before": null, "after": "The standardization of menus can mean fewer choices for consumers.", "start_char_pos": 2834, "end_char_pos": 2834}, {"type": "A", "before": null, "after": "can", "start_char_pos": 2928, "end_char_pos": 2928}, {"type": "R", "before": "(at least formula fast-food restaurants )", "after": "accelerate gentrification but deteriorate quality of life.", "start_char_pos": 3061, "end_char_pos": 3102}, {"type": "A", "before": null, "after": "Formula restaurants often", "start_char_pos": 3103, "end_char_pos": 3103}, {"type": "R", "before": "in turn relies on training consumers (adults and children) to bus disposables, but not durable tableware. Formula restaurants", "after": "can", "start_char_pos": 3221, "end_char_pos": 3346}, {"type": "D", "before": "Formula restaurants accelerate gentrification but deteriorate quality of life.", "after": null, "start_char_pos": 3475, "end_char_pos": 3553}, {"type": "A", "before": null, "after": "Response and regulation Informal restrictions Ketchum, Idaho has traditionally restricted franchise restaurants through the zoning approval process. The city has no formal formula restaurant ordinances. Iceland has informal health restrictions that discourage some formula restaurants.webcam of \"the last McDonald's in Iceland\"", "start_char_pos": 3554, "end_char_pos": 3554}, {"type": "A", "before": null, "after": "Formal restrictions Malibu, California compiled a list of municipalities that restrict formula retail.Analysis of Cities with Formula Business Ordinances, Malibu (.pdf) Bermuda has banned all franchised restaurants in the country (Prohibited Restaurant Act of 1997).(dailymeal slideshow listicle)", "start_char_pos": 3555, "end_char_pos": 3555}, {"type": "R", "before": "issues Formula restaurant restrictions", "after": "challenges In the United States, legal restrictions on formula restaurants", "start_char_pos": 3562, "end_char_pos": 3600}, {"type": "D", "before": "restrictions", "after": null, "start_char_pos": 3621, "end_char_pos": 3633}, {"type": "R", "before": "(in the US),", "after": ", and", "start_char_pos": 3722, "end_char_pos": 3734}, {"type": "R", "before": ",", "after": ".", "start_char_pos": 3775, "end_char_pos": 3776}, {"type": "D", "before": ")", "after": null, "start_char_pos": 4493, "end_char_pos": 4494}, {"type": "D", "before": "Response and regulation Informal restrictions and restrictions not defining formula retail or its equivalent Ketchum, Idaho has traditionally restricted franchise restaurants through the zoning approval process. The city has no formal formula restaurant ordinances. Iceland has informal health restrictions that discourage some formula restaurants.webcam of \"the last McDonald's in Iceland\"", "after": null, "start_char_pos": 4495, "end_char_pos": 4885}, {"type": "D", "before": "Examples of formal restaurant and formula retail restrictions Malibu, California compiled a listAnalysis of Cities with Formula Business Ordinances, Malibu (.pdf) of municipalities that restrict formula retail. Bermuda has banned all franchised restaurants in the country (Prohibited Restaurant Act of 1997).(dailymeal slideshow listicle", "after": null, "start_char_pos": 4915, "end_char_pos": 5252}], "sents_char_pos": [0, 65, 245, 454, 716, 1086, 1336, 1414, 1555, 1737, 2014, 2304, 2462, 2629, 2810, 2907, 2963, 3326, 3474, 3553, 3825, 3840, 4117, 4417, 4429, 4448, 4468, 4706, 4760, 5125, 5223]}
+{"doc_id": "5803384", "revision_depth": "1", "before_revision": "Geography Nainpur is a municipality (e.g., town) north of the Nainpur Forest Range. The 11A highway crosses this town. Nainpur is cupped by two rivers, the Chakor river and the Thanwar river. South of Nainpur , is the lake , Railway Taalab . Civic administration Nainpur is one of Tehsilof Mandla District in Madhya Pradesh . It is administered by Nainpur Nagar Palika. The town is divided into 15 wards. Each ward is represented by a ward member , the ward member is known as Parshad. These 15 members form a council (Parishad) and which elects the Nagar Paalika Adhyaksha (head of the municipal council). There are two nominated members (Parshads ) in the Parishad. Climate The city has the typical hot and dry temperate of the Great Indian Plateau. Nainpur is hot during summers with temperatures up to 44 degree Celsius, but the winters are quite comfortable with temperatures between 15 degrees Celsius. The July to September months bring heavy rains with the onset of the South Western monsoon. The October to March window during the winters is the best time for a visit to the city. Nainpur forest Range lake make temp. In summer few degrees less. Banking and Finance Nainpur has been connected through broad Gauge track to rest part of India. It has its Nainpur forest Range. It has irrigation canal system it is en-route to Seoni- Mandla Highway. Further it has FCI Godowns, therefore this town has the greatest business opportunity now to grow in banking%DIFDELCMD < & %%% financial sector. Government Banks State Bank Of India at Civil Lines , Central Bank Of India at Main Road , Narmada Jhabua Gramin Bank previously called Central Madhya Pradesh Gramin Bank But have to change in to Madhya Pradesh Gramin bank in order of bank merger , Sahkari Bank Maryadit (corporative Bank). Private Bank Branch of Fino Payments Bank located at Ward 07 Itka Nainpur . Transport Rail Nainpur Junction was a railway hub on the Narrow Gauge () line. This was the junction point of Jabalpur 110 km to its north, Balaghat 76 km to its south, Mandla 50 km to its east and Chhindwara 150 km to its west. It is connected to Nagpur via Chhindwara and Gondia. It was Asia's largest Narrow Gauge Railway Junction before the recent Gauge Conversion Project. Presently, Nainpur to Gondia and Nainpur To Mandla Broad Gauge Conversion is complete. Nainpur to Seoni gauge conversion is under progress. The South East Central railway now run long route trains through this newly converted track it is one of the shortest routes to connect North to South India, since Indian railway consists mostly of broad gauge tracks. Nainpur is connected to Jabalpur, Seoni, Chhindwara, Balaghat and Mandla by Roadways . It is also connected by Mandla to Raipur, Balaghat to Gondia and Seoni to Nagpur by the roads, in between Mandla and Nainpur, a small village, \"Chirai-Dongri\" is there from where the route to \"Kanha Kislee\", a well-known National Park, is diverted . Entertainment The town has given country a famous local artist named Anadi ji who specialized in wood craft %DIFDELCMD < & %%% he built an Ashram near the city water supply pond. The city regularly witnesses railway tournaments. The town has a beautiful Railway playground which is regularly used for cricket, hockey, football matches with nearby towns , since Nainpur teams are very strong therefore watching such matches tickets free add much enjoyment. The town is in border of Bamhni forest URL people enjoy natural beauty at sidhoughat or also called sidhaghat, Dhanora for wild beauty. Recent rail URL Has added one more feather in its cap.It has famous railway supported bakery for sweat dish . Kalyan hotel sweet dish Rasmalai is locally well famous . Neighbouring Satpura hill ranges provide wild fruits locally called Jamun, Achar (chirongy), Barry, Sarifa, Anwla, Bail. You can find beautiful picnic spots around like 'Maaldhar', 'Siddhaghat', 'Ghoghra', 'Bhima Nala ' (fountain), 'Shikara'. Daldali's Mela (yearly five-day festival) near to Nainpur at Gram Panchayat (local administrative body) of Village Shalivada is very popular in Nainpur Tehsil it is celebrated in between second%DIFDELCMD < & %%% third week of Decemberevery year . Educational Nainpur City have 5 Higher Secondary slandered , 10 Primary Level, 1 PG College, 2 Para Medical, 6 Computer education Institution .", "after_revision": "Geography Nainpur is a municipality (e.g., town) north of the Nainpur Forest Range. The town borders Bamhni forest range.Development of Forest Villages through Forest Development Agencies Madhya Pradesh 11A highway crosses this town. Nainpur is bordered by the Chakor river and the Thanwar river. South of Nainpur is a lake and Taalab Railway . Government Nainpur is a Tehsil . It is administered by Nainpur Nagar Palika. The town is divided into 15 wards. Each ward is represented by a ward member known as a Parshad. These 15 members form a council (Parishad) that elects the Nagar Paalika Adhyaksha (head of the municipal council). Two nominated Parshads govern in the Parishad. Climate The city has the typical hot and dry climate of the Great Indian Plateau. Nainpur is hot during summers with temperatures reaching 44 Celsius, while the winters offer temperatures around 15 Celsius. The July to September months bring heavy rains with the onset of the Southwestern monsoon. Economy %DIFDELCMD < & %%% Nearby banks include State Bank Of India , Central Bank Of India , Narmada Jhabua Gramin Bank , Sahkari Bank Maryadit , and Branch of Fino Payments Bank . It has an irrigation canal system. Transport Nainpur is connected by broad gauge rail to the rest of India. It is on the route to Seoni-Mandla Highway. Rail Nainpur Junction was a railway hub on the Narrow Gauge () line. It was the junction point of Jabalpur 110 km to its north, Balaghat 76 km to its south, Mandla 50 km to its east and Chhindwara 150 km to its west. It is connected to Nagpur via Chhindwara and Gondia. It was Asia's largest Narrow Gauge Railway Junction before the recent Gauge Conversion Project. Presently, Nainpur to Gondia and Nainpur To Mandla gauge conversion is complete. Nainpur to Seoni gauge conversion is under way. Nainpur is connected to Jabalpur, Seoni, Chhindwara, Balaghat and Mandla by road . It is connected by Mandla to Raipur, Balaghat to Gondia and Seoni to Nagpur by road . Notables Anadi Ji specialized in wood craft %DIFDELCMD < & %%% . He built an Ashram near the city water supply pond. Sport The city regularly witnesses railway tournaments. The town has a railway playground that is regularly used for cricket, hockey, and football matches with nearby towns . Amenities A rail museum operates there.NARROW GAUGE RAIL MUSEUM, NAINPUR It has bakery known for sweet dishes. Kalyan hotel sweet dish Rasmalai notable . Neighbouring Satpura hills provide wild fruits locally called Jamun, Achar (chirongy), Barry, Sarifa, Anwla, Bail. Picnic spots include Maaldhar, Siddhaghat, Ghoghra, Bhima Nala (fountain), and Shikara. Festivals Daldali's Mela (yearly five-day festival) %DIFDELCMD < & %%% takes place near Nainpur It is celebrated during the second and third weeks of December . Education Nainpur City has 5 Higher Secondary schools , 10 Primary Level, 1 PG College, 2 Para-medical, and 6 computer institutions .", "edit_actions": [{"type": "A", "before": null, "after": "town borders Bamhni forest range.Development of Forest Villages through Forest Development Agencies Madhya Pradesh", "start_char_pos": 88, "end_char_pos": 88}, {"type": "R", "before": "cupped by two rivers,", "after": "bordered by", "start_char_pos": 131, "end_char_pos": 152}, {"type": "R", "before": ", is the lake , Railway Taalab", "after": "is a lake and Taalab Railway", "start_char_pos": 210, "end_char_pos": 240}, {"type": "R", "before": "Civic administration Nainpur is one of Tehsilof Mandla District in Madhya Pradesh", "after": "Government Nainpur is a Tehsil", "start_char_pos": 243, "end_char_pos": 324}, {"type": "R", "before": ", the ward member is known as", "after": "known as a", "start_char_pos": 448, "end_char_pos": 477}, {"type": "R", "before": "and which", "after": "that", "start_char_pos": 530, "end_char_pos": 539}, {"type": "R", "before": "There are two nominated members (Parshads )", "after": "Two nominated Parshads govern", "start_char_pos": 608, "end_char_pos": 651}, {"type": "R", "before": "temperate", "after": "climate", "start_char_pos": 714, "end_char_pos": 723}, {"type": "R", "before": "up to", "after": "reaching", "start_char_pos": 801, "end_char_pos": 806}, {"type": "R", "before": "degree Celsius, but the winters are quite comfortable with temperatures between", "after": "Celsius, while the winters offer temperatures around", "start_char_pos": 810, "end_char_pos": 889}, {"type": "D", "before": "degrees", "after": null, "start_char_pos": 893, "end_char_pos": 900}, {"type": "D", "before": "South Western monsoon. The October to March window during the winters is the best time for a visit to the city. Nainpur forest Range", "after": null, "start_char_pos": 979, "end_char_pos": 1111}, {"type": "R", "before": "lake make temp. In summer few degrees less.", "after": "Southwestern monsoon.", "start_char_pos": 1112, "end_char_pos": 1155}, {"type": "R", "before": "Banking and Finance", "after": "Economy", "start_char_pos": 1156, "end_char_pos": 1175}, {"type": "D", "before": "Nainpur has been connected through broad Gauge track to rest part of India. It has its Nainpur forest Range. It has irrigation canal system", "after": null, "start_char_pos": 1176, "end_char_pos": 1315}, {"type": "D", "before": "it is en-route to Seoni- Mandla Highway. Further it has FCI Godowns, therefore this town has the greatest business opportunity now to grow in banking", "after": null, "start_char_pos": 1316, "end_char_pos": 1465}, {"type": "D", "before": "financial sector.", "after": null, "start_char_pos": 1484, "end_char_pos": 1501}, {"type": "R", "before": "Government Banks", "after": "Nearby banks include", "start_char_pos": 1502, "end_char_pos": 1518}, {"type": "D", "before": "at Civil Lines", "after": null, "start_char_pos": 1539, "end_char_pos": 1553}, {"type": "D", "before": "at Main Road", "after": null, "start_char_pos": 1578, "end_char_pos": 1590}, {"type": "D", "before": "previously called Central Madhya Pradesh Gramin Bank But have to change in to Madhya Pradesh Gramin bank in order of bank merger", "after": null, "start_char_pos": 1620, "end_char_pos": 1748}, {"type": "D", "before": "(corporative Bank).", "after": null, "start_char_pos": 1773, "end_char_pos": 1792}, {"type": "R", "before": "Private Bank", "after": ", and", "start_char_pos": 1793, "end_char_pos": 1805}, {"type": "D", "before": "located at Ward 07 Itka Nainpur", "after": null, "start_char_pos": 1835, "end_char_pos": 1866}, {"type": "A", "before": null, "after": "It has an irrigation canal system.", "start_char_pos": 1869, "end_char_pos": 1869}, {"type": "A", "before": null, "after": "Nainpur is connected by broad gauge rail to the rest of India. It is on the route to Seoni-Mandla Highway.", "start_char_pos": 1880, "end_char_pos": 1880}, {"type": "R", "before": "This", "after": "It", "start_char_pos": 1950, "end_char_pos": 1954}, {"type": "R", "before": "Broad Gauge Conversion", "after": "gauge conversion", "start_char_pos": 2300, "end_char_pos": 2322}, {"type": "D", "before": "progress. The South East Central railway now run long route trains through this newly converted track", "after": null, "start_char_pos": 2379, "end_char_pos": 2480}, {"type": "R", "before": "it is one of the shortest routes to connect North to South India, since Indian railway consists mostly of broad gauge tracks.", "after": "way.", "start_char_pos": 2481, "end_char_pos": 2606}, {"type": "R", "before": "Roadways", "after": "road", "start_char_pos": 2683, "end_char_pos": 2691}, {"type": "D", "before": "also", "after": null, "start_char_pos": 2700, "end_char_pos": 2704}, {"type": "R", "before": "the roads, in between Mandla and Nainpur, a small village, \"Chirai-Dongri\" is there from where the route to \"Kanha Kislee\", a well-known National Park, is diverted", "after": "road", "start_char_pos": 2778, "end_char_pos": 2941}, {"type": "R", "before": "Entertainment", "after": "Notables", "start_char_pos": 2944, "end_char_pos": 2957}, {"type": "R", "before": "The town has given country a famous local artist named Anadi ji who", "after": "Anadi Ji", "start_char_pos": 2958, "end_char_pos": 3025}, {"type": "R", "before": "he", "after": ". He", "start_char_pos": 3071, "end_char_pos": 3073}, {"type": "A", "before": null, "after": "Sport", "start_char_pos": 3123, "end_char_pos": 3123}, {"type": "R", "before": "beautiful Railway playground which", "after": "railway playground that", "start_char_pos": 3189, "end_char_pos": 3223}, {"type": "A", "before": null, "after": "and", "start_char_pos": 3263, "end_char_pos": 3263}, {"type": "D", "before": ", since Nainpur teams are very strong therefore watching such matches tickets free add much enjoyment. The town is in border of Bamhni forest URL", "after": null, "start_char_pos": 3299, "end_char_pos": 3444}, {"type": "D", "before": "people enjoy natural beauty at sidhoughat or also called sidhaghat, Dhanora for wild beauty. Recent rail URL Has added one more feather in its cap.It has famous railway supported bakery for sweat dish", "after": null, "start_char_pos": 3445, "end_char_pos": 3645}, {"type": "A", "before": null, "after": "Amenities A rail museum operates there.NARROW GAUGE RAIL MUSEUM, NAINPUR It has bakery known for sweet dishes.", "start_char_pos": 3648, "end_char_pos": 3648}, {"type": "R", "before": "is locally well famous", "after": "notable", "start_char_pos": 3682, "end_char_pos": 3704}, {"type": "R", "before": "hill ranges", "after": "hills", "start_char_pos": 3728, "end_char_pos": 3739}, {"type": "R", "before": "You can find beautiful picnic spots around like 'Maaldhar', 'Siddhaghat', 'Ghoghra', 'Bhima Nala '", "after": "Picnic spots include Maaldhar, Siddhaghat, Ghoghra, Bhima Nala", "start_char_pos": 3828, "end_char_pos": 3926}, {"type": "R", "before": "'Shikara'.", "after": "and Shikara.", "start_char_pos": 3939, "end_char_pos": 3949}, {"type": "A", "before": null, "after": "Festivals", "start_char_pos": 3950, "end_char_pos": 3950}, {"type": "D", "before": "near to Nainpur at Gram Panchayat (local administrative body) of Village Shalivada is very popular in Nainpur Tehsil", "after": null, "start_char_pos": 3993, "end_char_pos": 4109}, {"type": "D", "before": "it is celebrated in between second", "after": null, "start_char_pos": 4110, "end_char_pos": 4144}, {"type": "R", "before": "third week of Decemberevery year", "after": "takes place near Nainpur It is celebrated during the second and third weeks of December", "start_char_pos": 4163, "end_char_pos": 4195}, {"type": "R", "before": "Educational Nainpur City have", "after": "Education Nainpur City has", "start_char_pos": 4198, "end_char_pos": 4227}, {"type": "R", "before": "slandered", "after": "schools", "start_char_pos": 4247, "end_char_pos": 4256}, {"type": "R", "before": "Para Medical,", "after": "Para-medical, and", "start_char_pos": 4293, "end_char_pos": 4306}, {"type": "R", "before": "Computer education Institution", "after": "computer institutions", "start_char_pos": 4309, "end_char_pos": 4339}], "sents_char_pos": [0, 83, 119, 192, 326, 370, 405, 486, 607, 668, 752, 909, 1001, 1090, 1127, 1155, 1251, 1284, 1356, 1501, 1792, 1949, 2099, 2152, 2248, 2335, 2388, 2606, 2693, 3122, 3173, 3401, 3537, 3592, 3706, 3827, 3949]}
+{"doc_id": "58207802", "revision_depth": "1", "before_revision": "The 1999 Mauritian riots were national-scale rioting and protests in Mauritius following the death of the popular \"seggae\" musician Joseph R\u00e9ginald Topize, better known by his stage name \"Kaya\", in police custody. The rioting lasted for four days from 21 to 25 February 1999. Four civilians and one police officer were killed in the riots with hundreds of people suffering injuries. It was the first incidence of mass rioting in Mauritius since the country's 1968 riots. The riots resulted in a majority of the island's police stations being sacked by protesters with 250 prisoners escaping prison. Many businesses were looted and substantial property damage was done with over 200 vehicles being set alight . Background Following independence and a period of ethnic riots shortly before independence, Mauritius experienced a thirty year period of peace and rapid economic growth. This, along with the efforts by Mauritian political and bureaucratic leaders to be inclusive of representatives of minority communities in policy-making, had the effect of reducing ethnic tensions. During this period the Hindu majority in Mauritius gained dominance within the government. The period of high economic growth also lead to significant wealth disparities despite overall increasing living standards for all Mauritians. The education system, although free and universal, was highly competitive and reliant on additional private tutoring; this resulted in widening economic inequalities by limiting access to higher education for poorer, often Creole, Mauritians. In the 1990s this phenomenon of exclusion became known as Malaise Cr\u00e9ole. Violence Following the announcement of Kaya's death riots erupted in the predominantly Creole Roche Bois neighbourhood of Port Louis where Kaya was from. Riots and protests quickly spread across the island. Numerous shops, public buildings, police stations, and vehicles were looted and set on fire by rioters whilst 250 prisoners were released by rioters from a local prisoners . Protesters and rioters blocked roads with burning tires. The death of another Roche Bois musician, Berger Agathe after he was shot 92 times by the police further enraged rioters. Agathe was shot whilst appealing to police for calm. An estimated 2,000 rioters participated in the disturbances. Misinformation and rumours were rife. Instigators spread rumours of temples, mosques, churches etc being attacked. Rumours were also spread of ethnic groups from Creole regions coming to attack other communities. This resulted in Creoles and Asian youths engaging in sporadic ethnic clashes in the streets. A number of homes where Creoles were in minority were burnt down and their occupants chased out of the area in sporadic acts of ethnic cleansing. Response by authorities For several days after the riots broke out there was a lack of centralised response by the authorities. There was no swift reaction from the relatively young Prime Minister who had been elected in 1995 and who was about to face general elections within a few months from the time of the riots. As the riots worsened the absence of the head of security forces was felt; Commissioner of Police (CP) Andr\u00e9 Feillaf\u00e9 was overseas on holidays in Hawaii as his part of his pre-retirement celebrations. Feillaf\u00e9 had been promoted as CP after the dismissal of former CP Raj Dayal who was the main subject of a Commission of Enquiry (led by Judge Sik Yuen) for fraud. There was confusion within the Police Force regarding who was in charge. Eventually it was the intervention of the President Cassam Uteem on Mauritius Broadcasting Corporation (MBC) television which seemed to calm down spirits. A monument to the riot and Kaya's death of two crossed guitars stands at the entrance to the Roche-Bois neighbourhood of Port Louis.", "after_revision": "The 1999 Mauritian riots were national-scale rioting and protests in Mauritius following the death of the popular \"seggae\" musician Joseph R\u00e9ginald Topize, better known by his stage name \"Kaya\", in police custody. The rioting lasted for four days from 21 to 25 February 1999. Four civilians and one police officer were killed in the riots with hundreds of people suffering injuries. It was the first incidence of mass rioting in Mauritius since the country's 1968 riots. The riots resulted in a majority of the island's police stations being sacked by protesters with 250 prisoners escaping prison. Many businesses were looted and substantial property damage was done with over 200 vehicles being set on fire . Background Following independence and a period of ethnic riots shortly before independence, Mauritius experienced a thirty year period of peace and rapid economic growth. This, along with the efforts by Mauritian political and bureaucratic leaders to be inclusive of representatives of minority communities in policy-making, had the effect of reducing ethnic tensions. During this period the Hindu majority in Mauritius gained dominance within the government. The period of high economic growth also lead to significant wealth disparities despite overall increasing living standards for all Mauritians. The education system, although free and universal, was highly competitive and reliant on additional private tutoring; this resulted in widening economic inequalities by limiting access to higher education for poorer, often Creole, Mauritians. In the 1990s , this phenomenon of exclusion became known as Malaise Cr\u00e9ole. Violence Following the announcement of Kaya's death riots erupted in the predominantly-Creole Roche-Bois neighbourhood of Port Louis , where Kaya was from. Riots and protests quickly spread across the island. Numerous shops, public buildings, police stations, and vehicles were looted and set on fire by rioters whilst 250 prisoners were released by rioters from a local prison . Protesters and rioters blocked roads with burning tires. The death of another Roche Bois musician, Berger Agathe , after he was shot 92 times by the police , further enraged rioters. Agathe was shot whilst appealing to police for calm. An estimated 2,000 rioters participated in the disturbances. Misinformation and rumours were rife. Instigators spread rumours of temples, mosques, and churches being attacked. Rumours were also spread of ethnic groups from Creole regions coming to attack other communities. This resulted in Creoles and Asian youths engaging in sporadic ethnic clashes in the streets. A number of homes where Creoles were in minority were burnt down and their occupants chased out of the area in sporadic acts of ethnic cleansing. Response by authorities For several days after the riots broke out there was a lack of centralised response by the authorities. There was no swift reaction from the relatively young Prime Minister , who had been elected in 1995 and was about to face general elections within a few months of the riots. As the riots worsened , the absence of the head of security forces was felt; Commissioner of Police Andr\u00e9 Feillaf\u00e9 was overseas on holidays in Hawaii as his part of his pre-retirement celebrations. Feillaf\u00e9 had been promoted as Commissioner of Police after the dismissal of former Commissioner of Police Raj Dayal who was the main subject of a Commission of Enquiry for fraud. There was confusion within the police regarding who was in charge. Eventually , it was the intervention of the President Cassam Uteem on Mauritius Broadcasting Corporation television that seemed to calm down spirits. A monument to the riot and Kaya's death , depicting two crossed guitars , stands at the entrance to the Roche-Bois neighbourhood of Port Louis.", "edit_actions": [{"type": "R", "before": "alight", "after": "on fire", "start_char_pos": 701, "end_char_pos": 707}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1569, "end_char_pos": 1569}, {"type": "R", "before": "predominantly Creole Roche Bois", "after": "predominantly-Creole Roche-Bois", "start_char_pos": 1704, "end_char_pos": 1735}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1764, "end_char_pos": 1764}, {"type": "R", "before": "prisoners", "after": "prison", "start_char_pos": 2001, "end_char_pos": 2010}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2126, "end_char_pos": 2126}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2168, "end_char_pos": 2168}, {"type": "R", "before": "churches etc", "after": "and churches", "start_char_pos": 2394, "end_char_pos": 2406}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2958, "end_char_pos": 2958}, {"type": "D", "before": "who", "after": null, "start_char_pos": 2992, "end_char_pos": 2995}, {"type": "D", "before": "from the time", "after": null, "start_char_pos": 3052, "end_char_pos": 3065}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3102, "end_char_pos": 3102}, {"type": "D", "before": "(CP)", "after": null, "start_char_pos": 3179, "end_char_pos": 3183}, {"type": "R", "before": "CP", "after": "Commissioner of Police", "start_char_pos": 3312, "end_char_pos": 3314}, {"type": "R", "before": "CP", "after": "Commissioner of Police", "start_char_pos": 3345, "end_char_pos": 3347}, {"type": "D", "before": "(led by Judge Sik Yuen)", "after": null, "start_char_pos": 3410, "end_char_pos": 3433}, {"type": "R", "before": "Police Force", "after": "police", "start_char_pos": 3476, "end_char_pos": 3488}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3529, "end_char_pos": 3529}, {"type": "R", "before": "(MBC) television which", "after": "television that", "start_char_pos": 3622, "end_char_pos": 3644}, {"type": "R", "before": "of", "after": ", depicting", "start_char_pos": 3714, "end_char_pos": 3716}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3737, "end_char_pos": 3737}], "sents_char_pos": [0, 213, 275, 382, 470, 598, 880, 1078, 1169, 1312, 1430, 1555, 1630, 1785, 1838, 2069, 2193, 2246, 2307, 2345, 2422, 2520, 2614, 2760, 2888, 3079, 3155, 3281, 3444, 3517, 3673]}
+{"doc_id": "5854584", "revision_depth": "3", "before_revision": "Early life and education Born in Blaendulais, Glamorgan, Aaron was the son of a Welsh Baptist draper, William Aaron, and his wife, Margaret Griffith. He was educated at Ystalyfera Grammar School, followed by a spell at the University of Wales starting in 1918, where he studied history and philosophy. In 1923 he was elected a Fellow of the university, allowing him to attend Oriel College, Oxford, where he was awarded a DPhil in 1928 for a dissertation entitled \"The History and Value of the Distinction between Intellect and Intuition\". Although his early publications focused on epistemology and the history of ideas, Aaron became fascinated with the work and life of John Locke. The interest was sparked by his discovery of unexamined information in the Lovelace Collection: a collection of notes and drafts left by John Locke to his cousin Peter King. There he found letters, notebooks, catalogues, and most pertinent of all , an early draft of Locke's \"An Essay Concerning Human Understanding\", hitherto presumed missing. Aaron's research led to the 1937 publication of a book covering the life and work of Locke , which subsequently became the accepted standard work on the subject . The proofs were read by Rhiannon Morgan, whom Aaron married in 1937. They had five children. Aaron produced several more books and articles, including a book in Welsh on the history of philosophy, Hanes athroniaeth\u2014o Descartes i Hegel in 1932. He attempted to boost interest in philosophy in Wales , and established a philosophy section at the University of Wales Guild of Graduates in 1932, a society which still conducts all its proceedings in Welsh. Other notable publications of Aaron's include an essay, \"Two Senses of the Word Universal\" (published in Mind in 1939 ) and \"Our Knowledge of Universals\", a study read to the British Academy in 1945 and published in volume 23 of its Proceedings. Aaron's work shows fascination with the idea of a Universal , which culminated in a 1952 book The Theory of Universals. Here he attacks the notion of universals as Platonic forms, but is equally critical of Aristotelian realism about essences , as he is of nominalism and conceptualism as theories of universals. In 1952\u20131953, Aaron was invited to be Visiting Professor at Yale University. In 1956 he was able to study the third draft of Locke's An Essay Concerning Human Understanding at the Pierpont Morgan Library, which resulted in a substantial addition to the second edition of John Locke, published in 1955. He was made a Fellow of the British Academy (FBA) and President of the Mind Association in the same year. In 1956 an annual lecture hosted by the Aristotelian Society and the Mind Association ( who published the journal Mind) was instituted in Aberystwyth , and Aaron was invited to give the inaugural lecture. In 1957 he was elected President of the Aristotelian Society. In 1967 Aaron published a second edition of The Theory of Universals , with a new preface and several additions and rewritten chapters. In 1971, he published a third edition of his Locke biography and the book Knowing and the Function of Reason, which includes a broad discussion of the laws of non-contradiction, excluded middle and identity, of the use of language in speech and thought, and of substance and causality. After retiring in 1969, he taught for a semester at Carlton College in Minnesota before returning to Wales, where he helped write articles for the 1974 edition of the Encyclop\u00e6dia Britannica. He began to feel the effects of Alzheimer's disease , and died at his home on 29 March 1987.", "after_revision": "Early life and education Born in Blaendulais, Glamorgan, Aaron was the son of a Welsh Baptist draper, William Aaron, and his wife, Margaret Griffith. He was educated at Ystalyfera Grammar School, then at the University of Wales from 1918, where he studied history and philosophy. In 1923 he was elected a Fellow of the university, allowing him to attend Oriel College, Oxford, where he was awarded a DPhil in 1928 for a dissertation on \"The History and Value of the Distinction between Intellect and Intuition\". Although his early publications focused on epistemology and the history of ideas, Aaron became fascinated with the work and life of John Locke. The interest was sparked by his discovery of unexamined information in the Lovelace Collection: notes and drafts left by John Locke to his cousin Peter King. There he found letters, notebooks, catalogues, and most pertinently , an early draft of Locke's \"An Essay Concerning Human Understanding\", hitherto presumed missing. Aaron's research led to the 1937 publication of a book on the life and work of Locke that subsequently became an accepted standard work . The proofs were read by Rhiannon Morgan, whom Aaron married in 1937. They had five children. Aaron produced several more books and articles, including a book in Welsh on the history of philosophy, Hanes athroniaeth\u2014o Descartes i Hegel in 1932. His attempts to boost interest in philosophy in Wales included establishing in that year a philosophy section at the University of Wales Guild of Graduates , which still conducts its proceedings in Welsh. Other notable publications of Aaron's include an essay, \"Two Senses of the Word Universal\" , in Mind in 1939 , and \"Our Knowledge of Universals\", a study read to the British Academy in 1945 and published in volume 23 of its Proceedings. Aaron's work shows fascination with the idea of a universal , which culminated in a 1952 book The Theory of Universals. Here he attacks the notion of universals as Platonic forms, but is as critical of Aristotelian realism on essences as he is of nominalism and conceptualism as theories of universals. In 1952\u20131953, Aaron was a Visiting Professor at Yale University. In 1956 he was able to study the third draft of Locke's An Essay Concerning Human Understanding at the Pierpont Morgan Library, which led to a substantial addition to the second edition of John Locke, published in 1955. He became a Fellow of the British Academy (FBA) and President of the Mind Association in the same year. In 1956 an annual lecture hosted by the Aristotelian Society and the Mind Association ( publisher of the journal Mind) was instituted in Aberystwyth and Aaron invited to give the inaugural lecture. In 1957 he was elected President of the Aristotelian Society. In 1967 Aaron published a second edition of The Theory of Universals with a new preface and several additions and rewritten chapters. In 1971, he published a third edition of his Locke biography and the book Knowing and the Function of Reason, which includes broad discussion of the laws of non-contradiction, excluded middle and identity, of the use of language in speech and thought, and of substance and causality. After retiring in 1969, he taught for a semester at Carlton College , Minnesota, before returning to Wales, where he helped to write articles for the 1974 edition of the Encyclop\u00e6dia Britannica. He began to feel the effects of Alzheimer's disease and died at his home on 29 March 1987.", "edit_actions": [{"type": "R", "before": "followed by a spell", "after": "then", "start_char_pos": 196, "end_char_pos": 215}, {"type": "R", "before": "starting in", "after": "from", "start_char_pos": 243, "end_char_pos": 254}, {"type": "R", "before": "entitled", "after": "on", "start_char_pos": 455, "end_char_pos": 463}, {"type": "D", "before": "a collection of", "after": null, "start_char_pos": 780, "end_char_pos": 795}, {"type": "R", "before": "pertinent of all", "after": "pertinently", "start_char_pos": 914, "end_char_pos": 930}, {"type": "R", "before": "covering", "after": "on", "start_char_pos": 1084, "end_char_pos": 1092}, {"type": "R", "before": ", which subsequently became the", "after": "that subsequently became an", "start_char_pos": 1120, "end_char_pos": 1151}, {"type": "D", "before": "on the subject", "after": null, "start_char_pos": 1175, "end_char_pos": 1189}, {"type": "R", "before": "He attempted", "after": "His attempts", "start_char_pos": 1436, "end_char_pos": 1448}, {"type": "R", "before": ", and established", "after": "included establishing in that year", "start_char_pos": 1490, "end_char_pos": 1507}, {"type": "R", "before": "in 1932, a society", "after": ",", "start_char_pos": 1575, "end_char_pos": 1593}, {"type": "D", "before": "all", "after": null, "start_char_pos": 1615, "end_char_pos": 1618}, {"type": "R", "before": "(published", "after": ",", "start_char_pos": 1736, "end_char_pos": 1746}, {"type": "R", "before": ")", "after": ",", "start_char_pos": 1763, "end_char_pos": 1764}, {"type": "R", "before": "Universal", "after": "universal", "start_char_pos": 1941, "end_char_pos": 1950}, {"type": "R", "before": "equally", "after": "as", "start_char_pos": 2078, "end_char_pos": 2085}, {"type": "R", "before": "about essences ,", "after": "on essences", "start_char_pos": 2119, "end_char_pos": 2135}, {"type": "R", "before": "invited to be", "after": "a", "start_char_pos": 2228, "end_char_pos": 2241}, {"type": "R", "before": "resulted in", "after": "led to", "start_char_pos": 2415, "end_char_pos": 2426}, {"type": "R", "before": "was made", "after": "became", "start_char_pos": 2509, "end_char_pos": 2517}, {"type": "R", "before": "who published", "after": "publisher of", "start_char_pos": 2700, "end_char_pos": 2713}, {"type": "R", "before": ", and Aaron was", "after": "and Aaron", "start_char_pos": 2762, "end_char_pos": 2777}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2948, "end_char_pos": 2949}, {"type": "D", "before": "a", "after": null, "start_char_pos": 3140, "end_char_pos": 3141}, {"type": "R", "before": "in Minnesota", "after": ", Minnesota,", "start_char_pos": 3369, "end_char_pos": 3381}, {"type": "A", "before": null, "after": "to", "start_char_pos": 3425, "end_char_pos": 3425}, {"type": "D", "before": ",", "after": null, "start_char_pos": 3546, "end_char_pos": 3547}], "sents_char_pos": [0, 149, 301, 539, 683, 857, 1028, 1191, 1260, 1284, 1435, 1644, 1890, 2010, 2203, 2280, 2505, 2611, 2816, 2878, 3014, 3300, 3493]}
+{"doc_id": "588290", "revision_depth": "2", "before_revision": "Ireland and the United Kingdom 1939\u20131941 There was a reluctance on the part of the British to accept the policy of Irish neutrality. Anthony Eden, Dominions Secretary in the new British war cabinet, said \"we do not want formally to recognise Eire as neutral while Eire remains a member of the British Commonwealth\" as this he said would be in conflict with the \"constitutional theory of the indivisibility of the crown . \" Robert Fisk, \" In Time of War \", pg . 110 A prevalent view in the UK was that Ireland was obliged to support the UK in the war. Churchill said at the time that \"Southern Ireland is at war, but skulking\".Churchill Centre Paper By June 1940, the British representative in Ireland, Maffey, was urging that \"the strategic unity of our island group\" should take precedence over Ulster Unionism, and Churchill was making clear that there should be no military action taken against Ireland.Girvin, pp .108 \u2013109. The British Minister for Health, Malcolm MacDonald, who had negotiated the 1938 trade agreement with Ireland whilst Secretary of State for Dominion Affairs, was sent to Dublin to explore possibilities with De Valera. From these Chamberlain produced a six-point proposal that committed the UK government to a united Ireland and proposed the setting up of a joint body to effect this. A Joint Defence Council would be set up immediately and the State provided with military equipment. In return the State would join the Allies and intern all German and Italian aliens. Rejected by the Irish government, the proposal was then amended to strengthen the steps towards a united Ireland, and no longer requiring Ireland to join the war, but only to invite British forces to use Irish bases and ports. De Valera rejected the revised proposal on 4 July and made no counter proposal. One reason for this would have been the difficult calculation of how damaging the inevitable split in Ireland would be if such a proposal was accepted. One of the main reasons was that the Irish Government thought that the UK would lose the war and did not want to be on the losing side: during the negotiations Walshe had produced two memoranda for De Valera (one entitled Britain's Inevitable DefeatMemorandum, Walshe to de Valera from Joseph P. Walshe to Joseph P. Walshe \u2013 21 June 1940, at the Documents on Irish Foreign Policy website) predicting the isolation of Great Britain, the dismemberment of its empire, and finally its inevitable crushing by Germany. Walshe also wrote approvingly of the character of the P\u00e9tain government.Girvin, pp .124 \u2013125 Walshe's memoranda affected de Valera, with him telling MacDonald that Great Britain could not destroy this [German] colossal machine .Girvin, p .129 Nevertheless, from May 1940, Walshe and Col Liam Archer of Irish Military Intelligence discussed the defence of Ireland in the event of a German invasion with counterparts in Northern Ireland and a general strategic plan for UK military action \"Plan W\" across the border \"if invited\" was developed. Ports and shipping upA memorial erected in Dublin in 1991 to members of the Irish mercantile marine lost during the Emergency The great majority of Ireland's trade was with the United Kingdom, and most of its supplies came from there. This created great difficulties for the Irish government as Germany tried to blockade the UK. Additionally the UK required Irish ships to operate under their 'navicert' system. In September 1940, a joint agreement on trade, shipping and exports fell through\u2014\"the main sticking point between the two sides was the prices on offer from Britain\" Griven, p 162 owing to the refusal to allow transshipment and repair facilities following German pressure, including the threat to blockade Ireland and the bombing of Ambrosetown and Campile in County Wexford.Duggan p . 112, p. 132 , Girvin p. 161 In the autumn of 1940, the threat of German invasion had receded, but relations between the UK and Ireland deteriorated, largely as a result of the increased losses of Allied shipping to U-boat attack. To try to prevent some of these losses, the UK wanted sea and air bases in western Ireland.In the end, probably at Lough Swilly and the Shannon estuary rather than the Treaty Ports , Girvin, p .175. On 5 November, in the House of Commons, Churchill complained: The fact that we cannot use the South and West coasts of Ireland to refuel our flotillas and aircraft and thus protect the trade by which Ireland as well as Great Britain lives, is a most heavy and grievous burden and one which should never have been placed on our shoulders, broad though they may be. The Irish government chose to interpret this sentence as a threat of invasion. Some sort of armed occupation was a real possibility ,The UK had occupied Iceland in May 1940 but the balance of evidence is that there was never a serious threat.Girvin pp. 171 ff Large elements of the British cabinet and government and those of its allies were opposed to any armed intervention in Ireland; however, in late 1940 and early 1941, relations between the two countries did worsen. The British stopped informing Ireland of their order of battle in Northern Ireland, while the Irish Army drew up plans for defence against the British. The United Kingdom also started to restrict trade to Ireland, reasoning that if Ireland would not do anything to protect the lives of those bringing in supplies, it should at least share in the deprivations being felt in the UK. Relations between the two countries only really eased in the middle of 1941 with the invasion of the Soviet Union by Germany and an agreement to allow Irish immigration to Britain to work in the war industries, resulting in up to 200,000 Irish people doing so by 1945.Girvin p .179 The economy Only since 2000 has the wartime Irish economy been studied, away from the grander issues of diplomacy and warfare. Being still largely dependent on Britain for coal, manufactured goods and fuel oils, supplies of these were reduced after the fall of France in mid-1940, causing price inflation and a busy black market. It was said that \"the poor are like hunted rats looking for bread\", as wheat supplies fell, and that the introduction of full rationing was \"seriously belated\". Typhus reappeared and the government started planning for famine relief in late 1941. John Betjeman, the British press attach\u00e9 in Dublin, reported \"No coal. No petrol. No gas. No electric. No paraffin. Guinness good.\" In March 1942 the government banned the export of beers, and decided that more wheat should be grown, and less barley. The prospect of a shortage of beer led on to barter deals whereby Britain supplied wheat suitable for making bread flour, and coal, and in return Ireland allowed the export of beers. \"These supplies were to keep neutral Ireland afloat during World War II and enable the continuance of Irish neutrality\".Evans B, \"A pint of plain is your only man\" , essay in History Ireland, vol22 no5, pp36-38 .", "after_revision": "Ireland and the United Kingdom 1939\u20131941 There was a reluctance on the part of the British to accept the policy of Irish neutrality. Anthony Eden, Dominions Secretary in the new British war cabinet, said \"we do not want formally to recognise Eire as neutral while Eire remains a member of the British Commonwealth\" as this he said would be in conflict with the \"constitutional theory of the indivisibility of the crown \" . Robert Fisk, In Time of War , p . 110 A prevalent view in the UK was that Ireland was obliged to support the UK in the war. Churchill said at the time that \"Southern Ireland is at war, but skulking\".Churchill Centre Paper By June 1940, the British representative in Ireland, Maffey, was urging that \"the strategic unity of our island group\" should take precedence over Ulster Unionism, and Churchill was making clear that there should be no military action taken against Ireland.Girvin, pp . 108 \u2013109. The British Minister for Health, Malcolm MacDonald, who had negotiated the 1938 trade agreement with Ireland whilst Secretary of State for Dominion Affairs, was sent to Dublin to explore possibilities with De Valera. From these Chamberlain produced a six-point proposal that committed the UK government to a united Ireland and proposed the setting up of a joint body to effect this. A Joint Defence Council would be set up immediately and the State provided with military equipment. In return the State would join the Allies and intern all German and Italian aliens. Rejected by the Irish government, the proposal was then amended to strengthen the steps towards a united Ireland, and no longer requiring Ireland to join the war, but only to invite British forces to use Irish bases and ports. De Valera rejected the revised proposal on 4 July and made no counter proposal. One reason for this would have been the difficult calculation of how damaging the inevitable split in Ireland would be if such a proposal was accepted. One of the main reasons was that the Irish Government thought that the UK would lose the war and did not want to be on the losing side: during the negotiations Walshe had produced two memoranda for De Valera (one entitled Britain's Inevitable DefeatMemorandum, Walshe to de Valera from Joseph P. Walshe to Joseph P. Walshe \u2013 21 June 1940, at the Documents on Irish Foreign Policy website) predicting the isolation of Great Britain, the dismemberment of its empire, and finally its inevitable crushing by Germany. Walshe also wrote approvingly of the character of the P\u00e9tain government.Girvin, pp . 124 \u2013125 Walshe's memoranda affected de Valera, with him telling MacDonald that Great Britain \" could not destroy this [German] colossal machine \" .Girvin, p . 129 Nevertheless, from May 1940, Walshe and Col Liam Archer of Irish Military Intelligence discussed the defence of Ireland in the event of a German invasion with counterparts in Northern Ireland and a general strategic plan for UK military action \"Plan W\" across the border \"if invited\" was developed. Ports and shipping upA memorial erected in Dublin in 1991 to members of the Irish mercantile marine lost during the Emergency The great majority of Ireland's trade was with the United Kingdom, and most of its supplies came from there. This created great difficulties for the Irish government as Germany tried to blockade the UK. Additionally the UK required Irish ships to operate under their 'navicert' system. In September 1940, a joint agreement on trade, shipping and exports fell through\u2014\"the main sticking point between the two sides was the prices on offer from Britain\" Griven, p . 162 owing to the refusal to allow transshipment and repair facilities following German pressure, including the threat to blockade Ireland and the bombing of Ambrosetown and Campile in County Wexford.Duggan pp . 112, 132 ; Girvin p. 161 In the autumn of 1940, the threat of German invasion had receded, but relations between the UK and Ireland deteriorated, largely as a result of the increased losses of Allied shipping to U-boat attack. To try to prevent some of these losses, the UK wanted sea and air bases in western Ireland.In the end, probably at Lough Swilly and the Shannon estuary rather than the Treaty Ports . Girvin, p . 175. On 5 November, in the House of Commons, Churchill complained: The Irish government chose to interpret this sentence as a threat of invasion. Some sort of armed occupation was a real possibility (the UK had occupied Iceland in May 1940 ), but the balance of evidence is that there was never a serious threat.Girvin pp. 171 ff Large elements of the British cabinet and government and those of its allies were opposed to any armed intervention in Ireland; however, in late 1940 and early 1941, relations between the two countries did worsen. The British stopped informing Ireland of their order of battle in Northern Ireland, while the Irish Army drew up plans for defence against the British. The United Kingdom also started to restrict trade to Ireland, reasoning that if Ireland would not do anything to protect the lives of those bringing in supplies, it should at least share in the deprivations being felt in the UK. Relations between the two countries only really eased in the middle of 1941 with the invasion of the Soviet Union by Germany and an agreement to allow Irish immigration to Britain to work in the war industries, resulting in up to 200,000 Irish people doing so by 1945.Girvin p . 179 The economy Only since 2000 has the wartime Irish economy been studied, away from the grander issues of diplomacy and warfare. Being still largely dependent on Britain for coal, manufactured goods and fuel oils, supplies of these were reduced after the fall of France in mid-1940, causing price inflation and a busy black market. It was said that \"the poor are like hunted rats looking for bread\", as wheat supplies fell, and that the introduction of full rationing was \"seriously belated\". Typhus reappeared and the government started planning for famine relief in late 1941. John Betjeman, the British press attach\u00e9 in Dublin, reported \"No coal. No petrol. No gas. No electric. No paraffin. Guinness good.\" In March 1942 the government banned the export of beers, and decided that more wheat should be grown, and less barley. The prospect of a shortage of beer led on to barter deals whereby Britain supplied wheat suitable for making bread flour, and coal, and in return Ireland allowed the export of beers. \"These supplies were to keep neutral Ireland afloat during World War II and enable the continuance of Irish neutrality\".Evans , B. \"A pint of plain is your only man\" . History Ireland, vol. 22 no. 5, pp. 36-38 .", "edit_actions": [{"type": "D", "before": ".", "after": null, "start_char_pos": 419, "end_char_pos": 420}, {"type": "A", "before": null, "after": ".", "start_char_pos": 423, "end_char_pos": 423}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 437, "end_char_pos": 438}, {"type": "R", "before": "\", pg", "after": ", p", "start_char_pos": 454, "end_char_pos": 459}, {"type": "R", "before": ".108", "after": ". 108", "start_char_pos": 918, "end_char_pos": 922}, {"type": "R", "before": ".124", "after": ". 124", "start_char_pos": 2551, "end_char_pos": 2555}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2646, "end_char_pos": 2646}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 2696, "end_char_pos": 2696}, {"type": "R", "before": ".129", "after": ". 129", "start_char_pos": 2708, "end_char_pos": 2712}, {"type": "A", "before": null, "after": ".", "start_char_pos": 3600, "end_char_pos": 3600}, {"type": "R", "before": "p", "after": "pp", "start_char_pos": 3807, "end_char_pos": 3808}, {"type": "D", "before": "p.", "after": null, "start_char_pos": 3816, "end_char_pos": 3818}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 3823, "end_char_pos": 3824}, {"type": "R", "before": ",", "after": ".", "start_char_pos": 4222, "end_char_pos": 4223}, {"type": "R", "before": ".175.", "after": ". 175.", "start_char_pos": 4234, "end_char_pos": 4239}, {"type": "D", "before": "The fact that we cannot use the South and West coasts of Ireland to refuel our flotillas and aircraft and thus protect the trade by which Ireland as well as Great Britain lives, is a most heavy and grievous burden and one which should never have been placed on our shoulders, broad though they may be.", "after": null, "start_char_pos": 4302, "end_char_pos": 4603}, {"type": "R", "before": ",The", "after": "(the", "start_char_pos": 4736, "end_char_pos": 4740}, {"type": "A", "before": null, "after": "),", "start_char_pos": 4777, "end_char_pos": 4777}, {"type": "R", "before": ".179", "after": ". 179", "start_char_pos": 5737, "end_char_pos": 5741}, {"type": "R", "before": "B,", "after": ", B.", "start_char_pos": 6879, "end_char_pos": 6881}, {"type": "R", "before": ", essay in", "after": ".", "start_char_pos": 6917, "end_char_pos": 6927}, {"type": "R", "before": "vol22 no5, pp36-38", "after": "vol. 22 no. 5, pp. 36-38", "start_char_pos": 6945, "end_char_pos": 6963}], "sents_char_pos": [0, 132, 551, 627, 907, 928, 1145, 1311, 1411, 1495, 1722, 1802, 1954, 2250, 2270, 2467, 2540, 3011, 3246, 3340, 3423, 3800, 4040, 4132, 4239, 4603, 4682, 4847, 4992, 5078, 5230, 5459, 5728, 5868, 6071, 6232, 6318, 6389, 6400, 6421, 6434, 6450, 6569, 6752, 6873]}
+{"doc_id": "59063246", "revision_depth": "2", "before_revision": "Some national and state governments set up privacy laws particularly to protect celebrity privacy and their family members. The legal impact of these celebrity privacy laws has currently been undetermined, since the curb for celebrity privacy intrusion often counteracts the legal principle of \u201cfree press\u201d in many countries. Celebrity privacy as a controlled publicity Celebrities are often controlled by the public exposure they received and the needs of maintaining positive professional images. This caused their private lives to be controlled by the public. According to Jamie Nordhaus \"The boundaries of privacy and publicity for celebrities can become blurred, as they most are always watched by fans, paparazzi, and other potential stalkers.\" It has been suggested that celebrities \"remain conscious of maintaining a public persona when they are in the public eye as opposed to a personal one in private\" and \"negotiate with the press to release staged private life photos\". Jens Heffman argues that 'Celebrity attempts to sacrifice their privacy for publicity may result in a loss of legal protections, as celebrities claiming that an invasion of privacy by the press could be seen as utilizing media in order to achieve or maintain fame'. The latter argument was used in a court decision on a stolen sex tape that featured American actress Pamela Anderson Lee and her then-boyfriend Bret Michaels. Lee has sued Internet Entertainment Group (IEG) and Paramount for broadcasting a story in 1998, that contained excerpts from the tape, however the court considered her as voluntarily sacrificing her privacy in order to publicize herself. Scholar Seong Hong has stated Lee's privacy right was not protected because of her celebrity identity. Intrusion by paparazzi and fans Paparazzi Diana, Princess of Wales Celebrities' pictures are taken and sold to press for financial purposes by freelance photographers known by the term \u201cpaparazzi\u201d . \" Some techniques which are used by the term paparazzi include stalking which could cause turbulence to lives of celebrities if approached aggressively. The technique stalking is harmful according to past events as it has led to injury or death of the celebrity. The death of Diana, Princess of Wales, has been cited as an example of the risks of paparazzi techniques. On the other hand, scholar Elizabeth Hindman claims that the sale of exaggerated content without context to sensationalize particular moments has decreased credibility in the news industry. Ray Murray argues that \"some paparazzi will \u201cdraw an ethical line \u201d by abiding by specific rules and in a series of paparazzi interviews, most of the participants claimed that they would not break the law, and some attested that they would not take any photo of celebrity children without consent\". Scholar Andrew Mendelson has argued that \"Paparazzi are valuable in that they reveal potential mismatches between the public image and the reality of celebrities who possess great power in contemporary society, which legitimizes the paparazzi's invasion of celebrity privacy as a form of watchdog journalism\". Fans Scholar Kinta Hung suggests the \u201c dual entertainment path model\" shows that fans and non-fans adopt different ways to engage with their favorite celebrities For non-fans, they pay attention to celebrities and the released news to escape from boredom. For fans, they put a much higher emotional investment in order to create an individual \u201cbond\u201d with celebrities, which gives them pleasure and a sense of satisfaction. Fans try to become physically and mentally closer to their idols by attending concerts, movies, and fan-meetings. The term stalking also exists with fans, as in extreme circumstances, fans may be obsessed with their celebrities and invade the celebrities' privacy. Scholar Jens Hoffman has argued that this is a result of a pathological fixation. As fans exhibiting this can believe that there is a special connection between their favorite celebrities and themselves, even though such a relationship does not exist in reality. Once unsatisfied, this fixation can lead fans to invade celebrity privacy out of disappointment and resentment. Celebrity children Celebrities' private lives has been a main interest of the public, this prompted paparazzi to catch specific and trivial details of celebrities' daily lives, not excluding their children. Often fame and private lifestyles of celebrities are posted by Paparazzi. These images can be either authorized or unauthorized, Seong Hong claims that due to the circulation of celebrity children photos, the media leads the public to establish a pseudo-relationship with celebrity children and imagine them as \u201cour children\u201d . This public imagination combined with the potentially constant presence of paparazzi has been seen as having the potential to threaten the privacy of celebrity children. Effects Lidia Maropo and Ana Jorge argue that celebrity children usually appear on newspapers and magazines together with their families: moments like celebrity children playing the park, having a picnic with the whole families or just hanging out with their parents are posted on media, which reflects the importance of children in the family and advocates for a more harmonious family relationship. The celebrity children photos can also suggest a pleasant experience and a sense of satisfaction of being a parent. The circulation of celebrity children images attracts the public to focus on the family relationship and highlights the happiness brought by children and the responsibility of parents. The exposure of celebrity children to the public can result in the invasion of their privacy rights. For example, the 20-month-old son of aviator Charles A. Lindbergh, who became a national celebrity after he created records for flying from the U.S to France in 1927, was kidnapped and murdered in 1932. After this tragedy, Jon, Lindbergh \u2019 s second son, was chased continuously by paparazzi \u2019 s cars. To protect Jon, Lindbergh finally decided not to raise legal appealing but to move outside of the U.S with his family. Additionally, some celebrities send photos of their children to media in order to prevent paparazzi from continuing disrupting their private lives: American film celebrities David Arquette and Courteney Cox released the photo of their daughter Coco to the press, preventing themselves from being chased by paparazzi. United States Seong Hong argues that in the United States, the celebrity children privacy has been rarely protected by U.S law currently. The main reason is that the legal protection of celebrity children is too narrow and it might counteract with the First Amendment, which emphasizes \u201cfree press\u201d to encourage democratic voices. However, as the California Anti-Paparazzi Act was introduced, some celebrities suggested the state government to put more focus on celebrity children: actress Halle Berry hoped that the law could restrict paparazzi from approaching celebrity children since her children were afraid of going to school and trips due to the stalking of paparazzi. Scholar Joshua Azriel suggests that there should be a full ban on the photos of celebrity children with stronger punishment. Brazil In Brazil, the Child and Adolescent Statute (ECA in Portuguese acronym) both directly and indirectly addressed the relationship between children and media. ECA grants the fundamental civil and human rights to children, including free expression and the right of image, idea and identity, etc. Article 18, in particular, emphasizes that everyone has the responsibility to protect the dignity of children and to save them from any violent or terrifying situation. Besides, Article 74-80 provides children with legal protection to harmful public media, such as violent television show. Portugal In Portugal, the Law for Protection of Children and Youth at Risk (LPCJP in Portuguese acronym) protects children from media that brings risky elements, such as violence or inhumanity. Besides, The Young Offenders\u2019 Law prohibits media from identifying youngsters from 12-16 who commit illegal actions. Global celebrity privacy laws United States California \u201c Anti-Paparazzi \u201d Law In August 1997, Princess Diana died from a car accident in France which was suspected to be caused by seven paparazzi. Although the judge clarified later that the drunk driver rather than paparazzi caused the accident, California government was aware of the danger brought by paparazzi and thus quickly set the first anti-paparazzi law. In 1998, California set the \u201c invasion of privacy statute \u201d , which prohibited the use of digital devices to take photos of celebrities on private occasions. However, this statute is criticized by opponents who believe it might inhibit the freedom of the press to gather news. Also, the language used was considered too broad and vague. Some media attorneys described the statute as a \u201c Pandora\u2019s box \u201d that brought a large number of severe problems. The First Amendment of the \u201c invasion of privacy statute \u201d was passed in 2005, which regulated that the profits from photos taken during altercations between celebrities and photographers will be forfeited. The fine was imposed in 2005 by California legislature on making profit from any picture in which paparazzi assaulting celebrity and expanding 1708.8 civil code. In 2009, another new law A.B 524 stated that up to $50,000 penalties would be charged from the first publishers of the photos taken in the ways that violate the privacy statute. This law aimed to stop the paparazzi who take private photos of celebrities for profit-gaining reasons. However, scholar Christina Locke and Kara Murrhee claims that the law is not effective because the first publishers of celebrity photos can usually make over a million dollars. Furthermore, A.B 524 seemly contradicts the Supreme Court again for prohibiting the press to gain news legally. \"Anti-Paparazzi law\" vs. The First Amendment Keith Willis claims that in the U.S legal system, the conflict between the right to privacy and the right to free expression exists. Many state bills, such as California \u2019 s anti-paparazzi law, are set to protect celebrity privacy, while the First Amendment of Constitution ensures the press \u2019 s freedom to express and gather information. In history, the balance of these two forces has been uncertain\u2014sometimes the celebrities\u2019 privacy requests outweigh the freedoms of press and expression, while other times the First Amendment is prioritized over celebrities who claim to be disrupted by the open press. The right of publicity, also called personality rights, aims to control and protect the unauthorized commercial use of people \u2019 s identity, such as name, photos, or likeness. Based on the right of privacy, the right of publicity is relatively new in the U.S\u2014it was first recognized in the 1953 Haelan Laboratories v. Topps Chewing Gum case, and was later analyzed by Supreme Court in the 1977 Zacchini v. Scripps-Howard Broadcasting Co.case. The right of publicity is significant because with the advent of a new media age when \u201c everyone can be famous on the Internet for 15 minutes \u201d , the right of publicity becomes increasingly relevant and vital protection. This right is closely related to celebrity privacy because most of the time, it is used to protect celebrities from paparazzi or individuals who take the celebrities\u2019 names and images for commercial use. Currently no federal law in the U.S protects celebrities\u2019 right of publicity, however states like California have established statutes and common law to protect their celebrity citizens. Keith Willis argues that the publicity right controversies often happen on celebrity product endorsement issues. Canada According to Ellen Whitehorn, Canada government protects the right of publicity, but the extent of the scope is still uncertain. The Courts protect individuals\u2019 gaining from self-marketing, including name, images and personality, when it is violated. Similar to the U.S, the right of publicity laws mostly concentrate on different provinces: for example, Ontario has specific common laws which prevent the personality rights from being violated commercially. However, while the right of publicity in the U.S originates from the right to privacy, the personality right in Canada stems from unfair competition law. Copyright Copyright is also closely related to celebrity privacy. In the U.S, the Congress enacts copyright law based on Article 1(8)8 of the Constitution, which suggest that authors have the exclusive right to their work in a limited period. The original work protected by copyright laws includes literacy work, artistic work, musical work, and dramatic work etc. Since the producers of the original work are artists, musicians, or authors who are well-known, they are likely to be involved in copyright lawsuits, which could affect their rights of privacy. Scholar O' Neill Eaton suggests that sometimes the press fights for the copyright of paparazzi photos to make most of the profits from exclusive celebrity images. In 2006, the famous U.S celebrity gossip blogger Perez Hilton was sued by paparazzi agency X17 because he posted photos taken by X17 onto his own website without permission. Perez has denied violated copyright laws, stating that his work falls under fair use, as he uses the material for humor and satire. The Court final decision was that Perez \u2019 s use of the paparazzi photos violated the copyright laws, as Perez gained huge profits from publishing the paparazzi photos.", "after_revision": "Some national and state governments set up privacy laws particularly to protect celebrity privacy and their family members. The legal impact of these celebrity privacy laws has currently been undetermined, since the curb for celebrity privacy intrusion often counteracts the legal principle of \"free press\" in many countries. Celebrity privacy as a controlled publicity Celebrities are often controlled by the public exposure they received and the needs of maintaining positive professional images. This caused their private lives to be controlled by the public. According to Jamie Nordhaus \"The boundaries of privacy and publicity for celebrities can become blurred, as they most are always watched by fans, paparazzi, and other potential stalkers.\" It has been suggested that celebrities \"remain conscious of maintaining a public persona when they are in the public eye as opposed to a personal one in private\" and \"negotiate with the press to release staged private life photos\". Jens Heffman argues that 'Celebrity attempts to sacrifice their privacy for publicity may result in a loss of legal protections, as celebrities claiming that an invasion of privacy by the press could be seen as using media to achieve or maintain fame'. The latter argument was used in a court decision on a stolen sex tape that featured American actress Pamela Anderson Lee and her then-boyfriend Bret Michaels. Lee has sued Internet Entertainment Group (IEG) and Paramount for broadcasting a story in 1998, that contained excerpts from the tape, however the court considered her as voluntarily sacrificing her privacy to publicize herself. Scholar Seong Hong has stated Lee's privacy right was not protected because of her celebrity identity. Intrusion by paparazzi and fans Paparazzi Diana, Princess of Wales Celebrities' pictures are taken and sold to press for financial purposes by freelance photographers known by the term \"paparazzi\" . \" Some techniques which are used by the term paparazzi include stalking which could cause turbulence to lives of celebrities if approached aggressively. The technique stalking is harmful according to past events as it has led to injury or death of the celebrity. The death of Diana, Princess of Wales, has been cited as an example of the risks of paparazzi techniques. On the other hand, scholar Elizabeth Hindman claims that the sale of exaggerated content without context to sensationalize particular moments has decreased credibility in the news industry. Ray Murray argues that \"some paparazzi will \u201cdraw an ethical line \" by abiding by specific rules and in a series of paparazzi interviews, most of the participants claimed that they would not break the law, and some attested that they would not take any photo of celebrity children without consent\". Scholar Andrew Mendelson has argued that \"Paparazzi are valuable in that they reveal potential mismatches between the public image and the reality of celebrities who possess great power in contemporary society, which legitimizes the paparazzi's invasion of celebrity privacy as a form of watchdog journalism\". Fans Scholar Kinta Hung suggests the \" dual entertainment path model\" shows that fans and non-fans adopt different ways to engage with their favorite celebrities For non-fans, they pay attention to celebrities and the released news to escape from boredom. For fans, they put a much higher emotional investment to create an individual \"bond\" with celebrities, which gives them pleasure and a sense of satisfaction. Fans try to become physically and mentally closer to their idols by attending concerts, movies, and fan-meetings. The term stalking also exists with fans, as in extreme circumstances, fans may be obsessed with their celebrities and invade the celebrities' privacy. Scholar Jens Hoffman has argued that this is a result of a pathological fixation. As fans exhibiting this can believe that there is a special connection between their favorite celebrities and themselves, even though such a relationship does not exist in reality. Once unsatisfied, this fixation can lead fans to invade celebrity privacy out of disappointment and resentment. Celebrity children Celebrities' private lives has been a main interest of the public, this prompted paparazzi to catch specific and trivial details of celebrities' daily lives, not excluding their children. Often fame and private lifestyles of celebrities are posted by Paparazzi. These images can be either authorized or unauthorized, Seong Hong claims that due to the circulation of celebrity children photos, the media leads the public to establish a pseudo-relationship with celebrity children and imagine them as \"our children\" . This public imagination combined with the potentially constant presence of paparazzi has been seen as having the potential to threaten the privacy of celebrity children. Effects Lidia Maropo and Ana Jorge argue that celebrity children usually appear on newspapers and magazines together with their families: moments like celebrity children playing the park, having a picnic with the whole families or just hanging out with their parents are posted on media, which reflects the importance of children in the family and advocates for a more harmonious family relationship. The celebrity children photos can also suggest a pleasant experience and a sense of satisfaction of being a parent. The circulation of celebrity children images attracts the public to focus on the Family Relationship and highlights the happiness brought by children and the responsibility of parents. The exposure of celebrity children to the public can result in the invasion of their Privacy rights. For example, the 20-month-old son of aviator Charles A. Lindbergh, who became a national celebrity after he created records for flying from the U.S to France in 1927, was kidnapped and murdered in 1932. After this tragedy, Jon, Lindbergh ' s second son, was chased continuously by paparazzi ' s cars. To protect Jon, Lindbergh finally decided not to raise legal appealing but to move outside of the U.S with his family. Additionally, some celebrities send photos of their children to media to prevent paparazzi from continuing disrupting their private lives: American film celebrities David Arquette and Courteney Cox released the photo of their daughter Coco to the press, preventing themselves from being chased by paparazzi. United States Seong Hong argues that in the United States, the celebrity children privacy has been rarely protected by U.S law currently. The main reason is that the legal protection of celebrity children is too narrow and it might counteract with the First Amendment, which emphasizes \"free press\" to encourage democratic voices. However, as the California Anti-Paparazzi Act was introduced, some celebrities suggested the state government to put more focus on celebrity children: actress Halle Berry hoped that the law could restrict paparazzi from approaching celebrity children since her children were afraid of going to school and trips due to the stalking of paparazzi. Scholar Joshua Azriel suggests that there should be a full ban on the photos of celebrity children with stronger punishment. Brazil In Brazil, the Child and Adolescent Statute (ECA in Portuguese acronym) both directly and indirectly addressed the relationship between children and media. ECA grants the fundamental civil and human rights to children, including free expression and the right of image, idea and identity, etc. Article 18, in particular, emphasizes that everyone has the responsibility to protect the dignity of children and to save them from any violent or terrifying situation. Besides, Article 74\u201380 provides children with legal protection to harmful public media, such as violent television show. Portugal In Portugal, the Law for Protection of Children and Youth at Risk (LPCJP in Portuguese acronym) protects children from media that brings risky elements, such as violence or inhumanity. Besides, The Young Offenders\u2019 Law prohibits media from identifying youngsters from 12\u201316 who commit illegal actions. Global celebrity privacy laws United States California \" Anti-Paparazzi \" Law In August 1997, Princess Diana died from a car accident in France which was suspected to be caused by seven paparazzi. Although the judge clarified later that the drunk driver rather than paparazzi caused the accident, California government was aware of the danger brought by paparazzi and thus quickly set the first anti-paparazzi law. In 1998, California set the \" invasion of privacy statute \" , which prohibited the use of digital devices to take photos of celebrities on private occasions. However, this statute is criticized by opponents who believe it might inhibit the freedom of the press to gather news. Also, the language used was considered too broad and vague. Some media attorneys described the statute as a \" Pandora\u2019s box \" that brought a large number of severe problems. The First Amendment of the \" invasion of privacy statute \" was passed in 2005, which regulated that the profits from photos taken during altercations between celebrities and photographers will be forfeited. The fine was imposed in 2005 by California legislature on making profit from any picture in which paparazzi assaulting celebrity and expanding 1708.8 civil code. In 2009, another new law A.B 524 stated that up to $50,000 penalties would be charged from the first publishers of the photos taken in the ways that violate the privacy statute. This law aimed to stop the paparazzi who take private photos of celebrities for profit-gaining reasons. However, scholar Christina Locke and Kara Murrhee claims that the law is not effective because the first publishers of celebrity photos can usually make over a million dollars. Furthermore, A.B 524 seemly contradicts the Supreme Court again for prohibiting the press to gain news legally. \"Anti-Paparazzi law\" vs. The First Amendment Keith Willis claims that in the U.S legal system, the conflict between the right to privacy and the right to free expression exists. Many state bills, such as California ' s anti-paparazzi law, are set to protect celebrity privacy, while the First Amendment of Constitution ensures the press ' s freedom to express and gather information. In history, the balance of these two forces has been uncertain\u2014sometimes the celebrities\u2019 privacy requests outweigh the freedoms of press and expression, while other times the First Amendment is prioritized over celebrities who claim to be disrupted by the open press. The right of publicity, also called personality rights, aims to control and protect the unauthorized commercial use of people ' s identity, such as name, photos, or likeness. Based on the right of privacy, the right of publicity is relatively new in the U.S\u2014it was first recognized in the 1953 Haelan Laboratories v. Topps Chewing Gum case, and was later analyzed by Supreme Court in the 1977 Zacchini v. Scripps-Howard Broadcasting Co.case. The right of publicity is significant because with the advent of a new media age when \" everyone can be famous on the Internet for 15 minutes \" , the right of publicity becomes increasingly relevant and vital protection. This right is closely related to celebrity privacy because most of the time, it is used to protect celebrities from paparazzi or individuals who take the celebrities\u2019 names and images for commercial use. Currently no federal law in the U.S protects celebrities\u2019 right of publicity, however states like California have established statutes and common law to protect their celebrity citizens. Keith Willis argues that the publicity right controversies often happen on celebrity product endorsement issues. Canada According to Ellen Whitehorn, Canada government protects the right of publicity, but the extent of the scope is still uncertain. The Courts protect individuals\u2019 gaining from self-marketing, including name, images and personality, when it is violated. Similar to the U.S, the right of publicity laws mostly concentrate on different provinces: for example, Ontario has specific common laws which prevent the personality rights from being violated commercially. However, while the right of publicity in the U.S originates from the right to privacy, the personality right in Canada stems from Unfair competition law. Copyright Copyright is also closely related to celebrity privacy. In the U.S, the Congress enacts copyright law based on Article 1(8)8 of the Constitution, which suggest that authors have the exclusive right to their work in a limited period. The original work protected by copyright laws includes literacy work, artistic work, musical work, and dramatic work etc. Since the producers of the original work are artists, musicians, or authors who are well-known, they are likely to be involved in copyright lawsuits, which could affect their rights of privacy. Scholar O' Neill Eaton suggests that sometimes the press fights for the copyright of paparazzi photos to make most of the profits from exclusive celebrity images. In 2006, the famous U.S celebrity gossip blogger Perez Hilton was sued by paparazzi agency X17 because he posted photos taken by X17 onto his own website without permission. Perez has denied violated copyright laws, stating that his work falls under fair use, as he uses the material for humor and satire. The Court final decision was that Perez ' s use of the paparazzi photos violated the copyright laws, as Perez gained huge profits from publishing the paparazzi photos.", "edit_actions": [{"type": "R", "before": "\u201cfree press\u201d", "after": "\"free press\"", "start_char_pos": 294, "end_char_pos": 306}, {"type": "R", "before": "utilizing media in order", "after": "using media", "start_char_pos": 1194, "end_char_pos": 1218}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 1615, "end_char_pos": 1623}, {"type": "R", "before": "\u201cpaparazzi\u201d", "after": "\"paparazzi\"", "start_char_pos": 1934, "end_char_pos": 1945}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2573, "end_char_pos": 2574}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 3153, "end_char_pos": 3154}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 3426, "end_char_pos": 3434}, {"type": "R", "before": "\u201cbond\u201d", "after": "\"bond\"", "start_char_pos": 3459, "end_char_pos": 3465}, {"type": "R", "before": "\u201cour children\u201d", "after": "\"our children\"", "start_char_pos": 4697, "end_char_pos": 4711}, {"type": "R", "before": "family relationship", "after": "Family Relationship", "start_char_pos": 5482, "end_char_pos": 5501}, {"type": "R", "before": "privacy", "after": "Privacy", "start_char_pos": 5671, "end_char_pos": 5678}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5925, "end_char_pos": 5926}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5978, "end_char_pos": 5979}, {"type": "D", "before": "in order", "after": null, "start_char_pos": 6177, "end_char_pos": 6185}, {"type": "R", "before": "\u201cfree press\u201d", "after": "\"free press\"", "start_char_pos": 6710, "end_char_pos": 6722}, {"type": "R", "before": "74-80", "after": "74\u201380", "start_char_pos": 7711, "end_char_pos": 7716}, {"type": "R", "before": "12-16", "after": "12\u201316", "start_char_pos": 8092, "end_char_pos": 8097}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 8181, "end_char_pos": 8182}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 8198, "end_char_pos": 8199}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 8569, "end_char_pos": 8570}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 8599, "end_char_pos": 8600}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 8926, "end_char_pos": 8927}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 8942, "end_char_pos": 8943}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 9019, "end_char_pos": 9020}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 9049, "end_char_pos": 9050}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10147, "end_char_pos": 10148}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10269, "end_char_pos": 10270}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10711, "end_char_pos": 10712}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 11113, "end_char_pos": 11114}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 11169, "end_char_pos": 11170}, {"type": "R", "before": "unfair", "after": "Unfair", "start_char_pos": 12348, "end_char_pos": 12354}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 13440, "end_char_pos": 13441}], "sents_char_pos": [0, 123, 325, 498, 562, 750, 982, 1248, 1407, 1645, 1748, 2100, 2210, 2316, 2506, 2805, 3115, 3371, 3538, 3652, 3803, 3885, 4066, 4178, 4385, 4459, 4713, 4883, 5284, 5400, 5585, 5686, 5889, 5987, 6106, 6423, 6561, 6754, 7099, 7224, 7387, 7524, 7693, 7814, 8008, 8125, 8322, 8540, 8698, 8817, 8877, 8991, 9198, 9360, 9538, 9642, 9819, 9931, 9956, 10109, 10315, 10584, 10759, 11026, 11247, 11451, 11638, 11751, 11887, 12009, 12217, 12371, 12437, 12614, 12736, 12930, 13093, 13267, 13399]}
+{"doc_id": "599178", "revision_depth": "1", "before_revision": "Cosmopolitanism is the idea that all human beings are , or could or should be, members of a single community. Different views of what constitutes this community may include a focus on moral standards, economic practices, political structures, and/or cultural forms. A person who adheres to the idea of cosmopolitanism in any of its forms is called a cosmopolitan or cosmopolite. As an example, Kwame Anthony Appiah suggests the possibility of a cosmopolitan community in which individuals from varying locations (physical, economic, etc.) enter relationships of mutual respect despite their differing beliefs (religious, political, etc.). The word \"cosmopolitan\" is often used in a vernacular sense to refer to places where people of various ethnic, cultural and/or religious backgrounds live nearby and interact with each other , diverging from the strict definition of the concept . Philosophical roots Diogenes Cosmopolitanism can be traced back to Diogenes of Sinope (c. 412 B.C.), the founding father of the Cynic movement in Ancient Greece. Of Diogenes it is said : \"Asked where he came from, he answered: 'I am a citizen of the world (kosmopolit\u00eas)'\".Diogenes La\u00ebrtius, The Lives of Eminent Philosophers, Book VI, passage 63; online text in Greek and in English at the Perseus Project. In Ancient Greece , the broadest basis of social identity at that time was either the individual city-state or the Greeks (Hellenes) as a group. The Stoics, who latertook Diogenes' idea and developed it, typically stressed that each human being \"dwells [...] in two communities \u2013 the local community of our birth, and the community of human argument and aspiration\".Nussbaum, Martha C. (1997). Kant and Stoic Cosmopolitanism, in The Journal of Political Philosophy Volume 5, Nr 1, pp. 1\u201325 A common way to understand Stoic cosmopolitanism is through Hierocles' circle model of identity that states that we should regard ourselves as concentric circles , the first one around the self, next immediate family, extended family, local group, citizens, countrymen, humanity. Within these circles human beings feel a sense of \"affinity\" or \"endearment\" towards others, which the Stoics termed Oikei\u00f4sis. The task of world citizens becomes then to \"draw the circles somehow towards the centre, making all human beings more like our fellow city dwellers, and so forth\". A further state of cosmopolitanism occurred after the Second World War. As a reaction to the Holocaust and the other massacres , the concept of crimes against humanity became a generally accepted category in international law. This clearly shows the appearance and acceptance of a notion of individual responsibility that is considered to exist toward all of humankind.Beck, Ulrich (2006). The Cosmopolitan Vision, Cambridge: Polity Press, p. 45 \"Cosmopolitanism\" became a rhetorical weapon used by nationalists against \"alien\" ideas that went counter to orthodoxy. European Jews were frequently accused of being \"rootless cosmopolitans.\" Joseph Stalin in a 1946 Moscow speech attacked writings in which \"the positive Soviet hero is derided and inferior before all things foreign and cosmopolitanism that we all fought against from the time of Lenin, characteristic of the political leftovers, is many times applauded.\"Jeff Greenfield, \"The Ugly History of Stephen Miller\u2019s \u2018Cosmopolitan\u2019 Epithet: Surprise, surprise\u2014the insult has its roots in Soviet anti-Semitism.\" Politico 3 August, 2017 In the German Democratic Republic, cosmopolitanism was characterized as a bourgeois-imperialist ideology that rejects the nations' right to independence and national sovereignty. Cosmopolitanism was said to promote the dismantling of national and patriotic traditions and national culture. It was said to be advocated by the Anglo-American imperialism with an aim to establish world hegemony (World Government) operating in the interests of monopoly capitalism. Its opposite was not chauvinist bourgeois nationalism, but patriotism; love of your native place, your country. Love of the homeland was said to be one of the deepest feelings of the working people, expressed in the struggle against conquerors and oppressors.Taschenkalender der Kasernierten Volkspolizei 1954. Berlin : Verl. d. Minist. d. Innern, pp. 248-249. In the 21st century, the epithet became a weapon used by Vladimir Putin in Russia, and by nationalists in Hungary and Poland.Jeff Greenfield, \"The Ugly History of Stephen Miller\u2019s \u2018Cosmopolitan\u2019 Epithet\" In modern times, Stephen Miller, a Trump administration senior policy advisor, has publicly criticized CNN reporter Jim Acosta as exhibiting \"cosmopolitan bias\" during a discussion on the government's new immigration plan.", "after_revision": "Cosmopolitanism is the idea that all human beings are members of a single community. A person who adheres to the idea of cosmopolitanism in any form is called a cosmopolitan or cosmopolite. Cosmopolitanism is both prescriptive and aspirational, believing humans can and should be \"world citizens\" in a \"universal community\". The idea encompasses different dimensions and avenues of community, such as promoting universal moral standards, establishing global political structures, or developing a platform for mutual cultural expression and tolerance. For example, Kwame Anthony Appiah articulates a cosmopolitan community where individuals from varying locations (physical, economic, etc.) enter relationships of mutual respect despite their differing beliefs (religious, political, etc.). By comparison, Immanuel Kant envisioned a cosmopolitan world where armies were abolished and humans were governed under a representative global institution. In all instances, proponents of cosmopolitanism share an emphasis that all humans should form one cohesive and united community. In a looser but related sense, \"cosmopolitan\" is also used to describe places where people of various ethnic, cultural and/or religious backgrounds live together and interact with each other . Philosophical roots Diogenes Cosmopolitanism can be traced back to Diogenes of Sinope (c. 412 B.C.), the founder of the Cynic movement in Ancient Greece. It was said that when Diogenes was \"Asked where he came from, he answered: 'I am a citizen of the world (kosmopolit\u00eas)'\".Diogenes La\u00ebrtius, The Lives of Eminent Philosophers, Book VI, passage 63; online text in Greek and in English at the Perseus Project. At the time , the broadest basis of social identity among Greeks was either the individual city-state or the culturally and linguistically homogenous Hellenic group. Stoicism, another Greek school of thought that was founded roughly a century later, built upon Diogenes' idea , with many of its thinkers and adherents stressing that each human being \"dwells [...] in two communities \u2013 the local community of our birth, and the community of human argument and aspiration\".Nussbaum, Martha C. (1997). Kant and Stoic Cosmopolitanism, in The Journal of Political Philosophy Volume 5, Nr 1, pp. 1\u201325 A common way to understand Stoic cosmopolitanism is through Hierocles' circle model of identity , which states that individuals should regard themselves as concentric circles : the first one around the self, followed by immediate family, extended family, local group, citizens, countrymen, humanity. Within these circles human beings feel a sense of \"affinity\" or \"endearment\" towards others, which the Stoics termed Oikei\u00f4sis. The task of world citizens becomes then to \"draw the circles somehow towards the centre, making all human beings more like our fellow city dwellers, and so forth\". A further state of cosmopolitanism occurred after the Second World War. As a reaction to the Holocaust and other atrocities , the concept of crimes against humanity became a generally accepted category in international law. This clearly shows the appearance and acceptance of a notion of individual responsibility that is considered to exist toward all of humankind.Beck, Ulrich (2006). The Cosmopolitan Vision, Cambridge: Polity Press, p. 45 \"Cosmopolitanism\" became a rhetorical weapon used by nationalists against \"alien\" ideas that went counter to orthodoxy. European Jews were frequently accused of being \"rootless cosmopolitans.\" Joseph Stalin in a 1946 Moscow speech attacked writings in which \"the positive Soviet hero is derided and inferior before all things foreign and cosmopolitanism that we all fought against from the time of Lenin, characteristic of the political leftovers, is many times applauded.\"Jeff Greenfield, \"The Ugly History of Stephen Miller\u2019s \u2018Cosmopolitan\u2019 Epithet: Surprise, surprise\u2014the insult has its roots in Soviet anti-Semitism.\" Politico 3 August, 2017 In the German Democratic Republic, cosmopolitanism was characterized as a bourgeois-imperialist ideology that rejects the nations' right to independence and national sovereignty. Cosmopolitanism was said to promote the dismantling of national and patriotic traditions and national culture. It was said to be advocated by the Anglo-American imperialism with an aim to establish world hegemony (World Government) operating in the interests of monopoly capitalism. Its opposite was not chauvinist bourgeois nationalism, but patriotism; love of your native place, your country. Love of the homeland was said to be one of the deepest feelings of the working people, expressed in the struggle against conquerors and oppressors.Taschenkalender der Kasernierten Volkspolizei 1954. Berlin : Verl. d. Minist. d. Innern, pp. 248-249. In the 21st century, the epithet became a weapon used by Vladimir Putin in Russia, and by nationalists in Hungary and Poland.Jeff Greenfield, \"The Ugly History of Stephen Miller\u2019s \u2018Cosmopolitan\u2019 Epithet\" In modern times, Stephen Miller, a Trump administration senior policy advisor, publicly criticized CNN reporter Jim Acosta as exhibiting \"cosmopolitan bias\" during a discussion on the government's new immigration plan.", "edit_actions": [{"type": "D", "before": ", or could or should be,", "after": null, "start_char_pos": 54, "end_char_pos": 78}, {"type": "D", "before": "Different views of what constitutes this community may include a focus on moral standards, economic practices, political structures, and/or cultural forms.", "after": null, "start_char_pos": 110, "end_char_pos": 265}, {"type": "R", "before": "of its forms", "after": "form", "start_char_pos": 325, "end_char_pos": 337}, {"type": "R", "before": "As an", "after": "Cosmopolitanism is both prescriptive and aspirational, believing humans can and should be \"world citizens\" in a \"universal community\". The idea encompasses different dimensions and avenues of community, such as promoting universal moral standards, establishing global political structures, or developing a platform for mutual cultural expression and tolerance.", "start_char_pos": 379, "end_char_pos": 384}, {"type": "A", "before": null, "after": "For", "start_char_pos": 385, "end_char_pos": 385}, {"type": "R", "before": "suggests the possibility of", "after": "articulates", "start_char_pos": 416, "end_char_pos": 443}, {"type": "R", "before": "in which", "after": "where", "start_char_pos": 469, "end_char_pos": 477}, {"type": "A", "before": null, "after": "By comparison, Immanuel Kant envisioned a cosmopolitan world where armies were abolished and humans were governed under a representative global institution. In all instances, proponents of cosmopolitanism share an emphasis that all humans should form one cohesive and united community.", "start_char_pos": 640, "end_char_pos": 640}, {"type": "R", "before": "The word", "after": "In a looser but related sense,", "start_char_pos": 641, "end_char_pos": 649}, {"type": "R", "before": "often used in a vernacular sense to refer to", "after": "also used to describe", "start_char_pos": 668, "end_char_pos": 712}, {"type": "R", "before": "nearby", "after": "together", "start_char_pos": 795, "end_char_pos": 801}, {"type": "D", "before": ", diverging from the strict definition of the concept", "after": null, "start_char_pos": 831, "end_char_pos": 884}, {"type": "R", "before": "founding father", "after": "founder", "start_char_pos": 992, "end_char_pos": 1007}, {"type": "R", "before": "Of Diogenes it is said :", "after": "It was said that when Diogenes was", "start_char_pos": 1049, "end_char_pos": 1073}, {"type": "R", "before": "In Ancient Greece", "after": "At the time", "start_char_pos": 1295, "end_char_pos": 1312}, {"type": "R", "before": "at that time", "after": "among Greeks", "start_char_pos": 1353, "end_char_pos": 1365}, {"type": "R", "before": "Greeks (Hellenes) as a group. The Stoics, who latertook", "after": "culturally and linguistically homogenous Hellenic group.", "start_char_pos": 1410, "end_char_pos": 1465}, {"type": "A", "before": null, "after": "Stoicism, another Greek school of thought that was founded roughly a century later, built upon", "start_char_pos": 1466, "end_char_pos": 1466}, {"type": "R", "before": "and developed it, typically stressed", "after": ", with many of its thinkers and adherents stressing", "start_char_pos": 1482, "end_char_pos": 1518}, {"type": "R", "before": "that states that we should regard ourselves", "after": ", which states that individuals should regard themselves", "start_char_pos": 1882, "end_char_pos": 1925}, {"type": "R", "before": ",", "after": ":", "start_char_pos": 1948, "end_char_pos": 1949}, {"type": "R", "before": "next", "after": "followed by", "start_char_pos": 1981, "end_char_pos": 1985}, {"type": "R", "before": "the other massacres", "after": "other atrocities", "start_char_pos": 2465, "end_char_pos": 2484}, {"type": "D", "before": "has", "after": null, "start_char_pos": 4556, "end_char_pos": 4559}], "sents_char_pos": [0, 109, 265, 378, 639, 1048, 1160, 1234, 1294, 1439, 1662, 1689, 2065, 2193, 2357, 2429, 2584, 2727, 2747, 2923, 3276, 3425, 3628, 3739, 3911, 3982, 4023, 4171, 4222, 4272, 4398]}
+{"doc_id": "60335116", "revision_depth": "2", "before_revision": "The events of Selkollu \u00fe\u00e1ttr take place in the Westfjords, beginning when a man and woman are taking a baby girl to be baptised. On the way, they indulge in an \" illmannliga dv\u00f6l\" (\" immoral rest\" ) beside a large stone, fittingly called Miklisteinn ('large stone') and \" v\u00edkja annan veg til saurl\u00edfis\" (\" turn onto the alternative road of fornication\" ) . Once they have finished having sex, they return to the child, who they had set down, and find that it is now \" bl\u00e1tt, dautt ok ferligt\" (\" black, dead, and hideous\" ) . The couple decide to leave the child behind and walk away, but as they do so they hear a cry. They return to the child and find that it is alive, but it is now so \" hr\u00e6\u00f0ilegt, at hv\u00e1rki \u00feora \u00feau snerta n\u00e9 n\u00e6r koma\" (\" terrifying that they dare neither touch it nor come near\" ) . They go to the farm to fetch more people, but when they return to the stone, the child has vanished. It is then said that a certain woman is \" n\u00fdkomin \u00ed byg\u00f0ina, stundum me\u00f0 venu\u00e1liti, en stundum me\u00f0 selsh\u00f6f\u00f0i, gekk \u00feessi fj\u00e1ndi einn veg djarft \u00e1 dag sem n\u00e1tt, \u00fev\u00ed var \u00feessi mi\u00f0degisdj\u00f6full Selkolla nefndr \u00ed sveitinni\" (\" newly arrived in the district, sometimes with an ordinary face but sometimes with a seal's head. This devil walked about as boldly by day as by night, for which reason this midday-devil was called Selkolla in the district\" ) . What follows is an account of the assaults of this being at a farm which is never localised in any more detail. First, in the guise of the farmer's wife, she tries to entice him into having sex. When he realises what is actually going on, he tries to turn for home, but Selkolla bars his way, such that he gets home to the farm \" m\u00e6ddr ogg m\u00e1ttfarin\" (\" tired and exhausted\" ) , and lies in bed \" fyrir \u00fe\u00e1 s\u00f3tt, er svikligr fjandans prettr haf\u00f0i unnit hans n\u00e1tt\u00faru. M\u00e1 hann s\u00ed\u00f0an enga hafa, \u00fev\u00ed at sami \u00f3hreinn andi s\u00e6kir hann dag ok n\u00e1tt me\u00f0 \u00e1kaf\" (\" on account of that sickness, which the deceitful trick of the Devil had afflicted upon his virility. He could not have any thereafter, because the same unclean spirit seeks him day and night with enthusiasm\" ) . No-one wants to be near the farmer to provide him with any solace, \" nema einn dyg\u00f0ugr frendi hans, er liggr \u00ed hj\u00e1 honum, \u00fear til er Selkolla r\u00e6\u00f0r \u00e1 \u00feann of n\u00e1tt, ok sprengir \u00f3r honum b\u00e6\u00f0i aug\" (\" except for one diligent kinsman of his, who lies beside him until Selkolla overcomes him in the night and bursts out his eyes\" ) . Gu\u00f0mundr, who is wandering the Westfjords, is called in and asked to tackle the fiend. He decides to stay at the farm which Selkolla is afflicting, and once he has gone to bed for the night he sees that a woman \" sk\u00fdzt fram at \u00f3v\u00f6ru\" (\" takes him by surprise\" ) and tries to pull off his shoes, which his servants have forgotten to do. Gu\u00f0mundur realises immediately who it is and drives Selkolla away with the words \"far ni\u00f0r, fjandi, ok gakk ei framarr!\" (\"go down, devil, and don't come back!\"). The next day, Gu\u00f0mundr and Selkolla meet again and he drives her down once more, this time by setting up seven crosses. So ends Gu\u00f0mundr's dealings with Selkolla. She rears her head once more on board a ship which is one the way \" yfir \u00feann fj\u00f6r\u00f0 e\u00f0r fl\u00f3a\" (\" over the flord, or bay\" ) which separates the country's dioceses. But the crew have received the blessing of Gu\u00f0mundr for the journey, and the blessing prevents Selkolla from harming them.", "after_revision": "The events of Selkollu \u00fe\u00e1ttr take place in the Westfjords, beginning when a man and woman are taking a baby girl to be baptised. On the way, they indulge in an \" immoral rest\" beside a large stone, fittingly called Miklisteinn ('large stone') and \" turn onto the alternative road of fornication\" . Once they have finished having sex, they return to the child, who they had set down, and find that it is now \" black, dead, and hideous\" . The couple decide to leave the child behind and walk away, but as they do so they hear a cry. They return to the child and find that it is alive, but it is now so \" terrifying that they dare neither touch it nor come near\" . They go to the farm to fetch more people, but when they return to the stone, the child has vanished. It is then said that a certain woman is \" newly arrived in the district, sometimes with an ordinary face but sometimes with a seal's head. This devil walked about as boldly by day as by night, for which reason this midday-devil was called Selkolla in the district\" . What follows is an account of the assaults of this being at a farm which is never localised in any more detail. First, in the guise of the farmer's wife, she tries to entice him into having sex. When he realises what is actually going on, he tries to turn for home, but Selkolla bars his way, such that he gets home to the farm \" tired and exhausted\" , and lies in bed \" on account of that sickness, which the deceitful trick of the Devil had afflicted upon his virility. He could not have any thereafter, because the same unclean spirit seeks him day and night with enthusiasm\" . No-one wants to be near the farmer to provide him with any solace, \" except for one diligent kinsman of his, who lies beside him until Selkolla overcomes him in the night and bursts out his eyes\" . Gu\u00f0mundr, who is wandering the Westfjords, is called in and asked to tackle the fiend. He decides to stay at the farm which Selkolla is afflicting, and once he has gone to bed for the night he sees that a woman \" takes him by surprise\" and tries to pull off his shoes, which his servants have forgotten to do. Gu\u00f0mundur realises immediately who it is and drives Selkolla away with the words \"far ni\u00f0r, fjandi, ok gakk ei framarr!\" (\"go down, devil, and don't come back!\"). The next day, Gu\u00f0mundr and Selkolla meet again and he drives her down once more, this time by setting up seven crosses. So ends Gu\u00f0mundr's dealings with Selkolla. She rears her head once more on board a ship which is on the way \" over the flord, or bay\" which separates the country's dioceses. But the crew have received the blessing of Gu\u00f0mundr for the journey, and the blessing prevents Selkolla from harming them.", "edit_actions": [{"type": "D", "before": "illmannliga dv\u00f6l\" (\"", "after": null, "start_char_pos": 162, "end_char_pos": 182}, {"type": "D", "before": ")", "after": null, "start_char_pos": 197, "end_char_pos": 198}, {"type": "D", "before": "v\u00edkja annan veg til saurl\u00edfis\" (\"", "after": null, "start_char_pos": 272, "end_char_pos": 305}, {"type": "D", "before": ")", "after": null, "start_char_pos": 353, "end_char_pos": 354}, {"type": "D", "before": "bl\u00e1tt, dautt ok ferligt\" (\"", "after": null, "start_char_pos": 468, "end_char_pos": 495}, {"type": "D", "before": ")", "after": null, "start_char_pos": 522, "end_char_pos": 523}, {"type": "D", "before": "hr\u00e6\u00f0ilegt, at hv\u00e1rki \u00feora \u00feau snerta n\u00e9 n\u00e6r koma\" (\"", "after": null, "start_char_pos": 691, "end_char_pos": 743}, {"type": "D", "before": ")", "after": null, "start_char_pos": 802, "end_char_pos": 803}, {"type": "D", "before": "n\u00fdkomin \u00ed byg\u00f0ina, stundum me\u00f0 venu\u00e1liti, en stundum me\u00f0 selsh\u00f6f\u00f0i, gekk \u00feessi fj\u00e1ndi einn veg djarft \u00e1 dag sem n\u00e1tt, \u00fev\u00ed var \u00feessi mi\u00f0degisdj\u00f6full Selkolla nefndr \u00ed sveitinni\" (\"", "after": null, "start_char_pos": 949, "end_char_pos": 1128}, {"type": "D", "before": ")", "after": null, "start_char_pos": 1352, "end_char_pos": 1353}, {"type": "D", "before": "m\u00e6ddr ogg m\u00e1ttfarin\" (\"", "after": null, "start_char_pos": 1686, "end_char_pos": 1709}, {"type": "D", "before": ")", "after": null, "start_char_pos": 1731, "end_char_pos": 1732}, {"type": "D", "before": "fyrir \u00fe\u00e1 s\u00f3tt, er svikligr fjandans prettr haf\u00f0i unnit hans n\u00e1tt\u00faru. M\u00e1 hann s\u00ed\u00f0an enga hafa, \u00fev\u00ed at sami \u00f3hreinn andi s\u00e6kir hann dag ok n\u00e1tt me\u00f0 \u00e1kaf\" (\"", "after": null, "start_char_pos": 1753, "end_char_pos": 1907}, {"type": "D", "before": ")", "after": null, "start_char_pos": 2116, "end_char_pos": 2117}, {"type": "D", "before": "nema einn dyg\u00f0ugr frendi hans, er liggr \u00ed hj\u00e1 honum, \u00fear til er Selkolla r\u00e6\u00f0r \u00e1 \u00feann of n\u00e1tt, ok sprengir \u00f3r honum b\u00e6\u00f0i aug\" (\"", "after": null, "start_char_pos": 2189, "end_char_pos": 2316}, {"type": "D", "before": ")", "after": null, "start_char_pos": 2444, "end_char_pos": 2445}, {"type": "D", "before": "sk\u00fdzt fram at \u00f3v\u00f6ru\" (\"", "after": null, "start_char_pos": 2661, "end_char_pos": 2684}, {"type": "D", "before": ")", "after": null, "start_char_pos": 2708, "end_char_pos": 2709}, {"type": "R", "before": "one", "after": "on", "start_char_pos": 3164, "end_char_pos": 3167}, {"type": "D", "before": "yfir \u00feann fj\u00f6r\u00f0 e\u00f0r fl\u00f3a\" (\"", "after": null, "start_char_pos": 3178, "end_char_pos": 3206}, {"type": "D", "before": ")", "after": null, "start_char_pos": 3231, "end_char_pos": 3232}], "sents_char_pos": [0, 128, 619, 805, 906, 1225, 1467, 1550, 1821, 2008, 2115, 2534, 2783, 2946, 3066, 3109, 3272]}
+{"doc_id": "60493116", "revision_depth": "1", "before_revision": "It is specifically caused by the Plasmodium malariae species, one of the six species of the protozoan genus Plasmodium. Quartan fever is a form of malaria where an onset of fever occurs in an interval of three-four days, hence the name \"quartan.\" It is transmitted by bites of infected female mosquitoes of the genus Anopheles. Symptoms include fevers which range from approximately 40\u201341\u00b0C and occur periodically in 72 hour intervals. Although cases of Malaria have occurred throughout the world, quartan fever typically occurs in sub-tropic regions . Quartan fever is considered to be a less severe form of malaria fever can be cured by anti-malarial treatments and prevention methods can be taken in order to avoid infection. The female Anopheles mosquito is a vector which transmits quartan fever to people. Mature mosquitoes carry uninucleate sporozoites in their salivary glands, these sporozoites enter a human's bloodstream when mosquitoes puncture human flesh during feeding. Sporozoites attack and inhabit liver parenchymal cells in order to develop . Once the uninucleate sporozoites have matured the sporozoites then develop into uninucleate merozoites. Uninucleated merozoites mature into an erythrocytic stage schizonts which contain merozoites. The schizonts then rupture to release these merozoites; leading to more infections in the red blood cells. Uninucleated merozoites can also mature into uninucleate gametocytes which can invade and infect other female Anopheles mosquitoes during feeding, thus spreading the disease onto a wider population of humans. Anopheles Mosquito feeding (video taken County Durham, UK.) Diagnosis Fevers in intervals of 72 hours distinguish quartan fever from other forms of malaria where fevers range in 48 hour intervals or fever spikes happen sporadically. Early indications of catching quartan fever include having irritated spots, welts, hives , burning skin, however this is dependent on individual's tolerance to mosquito bites and may not show up on some people. With anopheles malaria mosquitoes the welts are most likely to not appear unless there are severe allergic reactions. The prepatent period is the time interval for when parasites are detected on a thick blood film. For quartan fever, P. malariae has a prepatent period ranging from 16-59 days. Specifically in the case of quartan fever, the rupturing of liver stage schizonts releases merozoites. This stage of the P. malariae life cycle is known as the \"ring stages\" and are the first stages which can be detected in human blood for diagnosis. Blood smears can be used to detect the parasites within red blood cells, thick blood smears are typically used initially to detect the parasites, then it is followed by thin blood smears which can detect the parasites as the morphology of erythrocytes is maintained through the process. Peripheral blood films stained with Giemsa strain are a method of blood examination used to diagnose the presence of Plasmodium malariae, and detect quartan fever. Rapid diagnostic tests can detect antigens which cause malaria, a sample of blood is collected from the patient and placed on a test card. After 15-20 minutes bands show up on the test card which indicate the specific species of malaria the patient is infected with. Serological tests are used in general to detect whether a patient has developed antibodies to specific microorganism, therefore Serological tests are used to detect past encounters with Plasmodium virus rather than cases where a patient has newly come in contain/has been infected with P. malariae and has quartan fever. Polymerase chain reactions (PCR) are used to diagnosis Plasmodium malariae (cause of quartan fever) as well to separate mixed infections . Chloroquine is administered in the form of a tablet for ingestion. Chloroquine is a water-soluble drug which is used to treat quartan fever. Chloroquine a suppressive drug which is ingested in a compressed tablet form and is mainly absorbed by the gastrointestinal tract. Hydrochloroquine is also a suppressive, anit-malarial agent used to treat quartan fever. Hydrochloroquine is also typically administered to patients suffering from lupus flares. Both hydrochloroquine and chloroquine have a side effect of retinal toxicity when administered to infected patients. Adverse effects of the drug chloroquine include agitation, anxiety, confusion, Gastrointestinal discomfort, blurring vision , and/or irreversible retinal damage . Sulfadoxine-pyrimethamine (SP) is administered to pregnant women during the gestation period. Two-three doses of SP has been proven to reduce the levels of placental malaria and had a reduced risk of moderate to severe anemia. Indoor residual sprays are one of the most utilised methods of malaria prevention by the Global Malaria Eradication Campaign. Spraying is a method in multiple regions and to control epidemics. Nets treated with insecticide are effective in preventing mosquito contact for three years. The World Health Organisation (WHO) specifically targets younger children and pregnant women in order to reduce the risk of spreading Quartan fever within the population. Sulfadoxine-pyrimethamine (SP) administration to pregnant women is also a source of prevention in order to reduce the risks of maternal anaemia, low birth rate, and perinatal mortality. SP reduces the impact Quartan fever may have on newborns and decrease the morality rate. This method of prevention is known as \"chemoprevention.\" House improvement is also a method of prevention. Traditional houses consisting of natural materials are susceptible to gaps which allow entry to infected Anopheles mosquitoes. House improvements including windows, installation and sealed doors reduce the risk of coming in contact with the infected mosquitoes. Larval source management is the control and monitoring of aquatic environments in order to prevent fully Anopheles mosquitoes from fully developing. Mosquitoes require aquatic environments in order to fully mature and develop. Once mosquito eggs hatch, the larva must live in the water and develop into pupa. The pupa stage then matures into a fully developed mosquito and emerges from its aquatic habitat. When removing any water-filled containers from the surrounding area the mosquito life cycle is halted and acts as a method to reduce mosquito population within the surrounding area. Avoiding travelling to regions which have a sub-tropic climate to prevent infection and developing quartan fever. Implementing the sugar baiting method aids in reducing the population of Anopheles mosquitoes, and ultimately reducing the likelihood of catching quartan fever. Both male and female mosquitoes feed on the Attractive toxic sugar bait (ATSB) and ingest low-risk oral toxins e.g. boric acid. This leads to mosquito death and reduces population.", "after_revision": "It is specifically caused by the Plasmodium malariae species, one of the six species of the protozoan genus Plasmodium. Quartan fever is a form of malaria where an onset of fever occurs in an interval of three to four days, hence the name \"quartan.\" It is transmitted by bites of infected female mosquitoes of the genus Anopheles. Symptoms include fevers which range from approximately and occur periodically in 72 hour intervals. Although cases of malaria have occurred throughout the world, quartan fever typically occurs in the subtropics . Quartan fever is considered to be a less severe form of malaria fever that can be cured by anti-malarial medication, and prevention methods can be taken in order to avoid infection. The female Anopheles mosquito is a vector which transmits quartan fever to people. Mature mosquitoes carry uninucleate sporozoites in their salivary glands, these sporozoites enter a human's bloodstream when mosquitoes puncture human flesh during feeding. Sporozoites attack and inhabit liver parenchymal cells , called hepatocytes, in order to develop further . Once the uninucleate sporozoites have matured , the sporozoites then develop into uninucleate merozoites. Uninucleated merozoites mature into an erythrocytic stage called schizonts which contain merozoites. The schizonts , an infected erythrocyte, then rupture to release these merozoites; leading to more infections in the red blood cells. Uninucleated merozoites can also mature into uninucleate gametocytes which can invade and infect other female Anopheles mosquitoes during feeding, thus spreading the disease onto a wider population of humans. Anopheles Mosquito feeding (video taken County Durham, UK.) Diagnosis Fevers in intervals of 72 hours distinguish quartan fever from other forms of malaria where fevers range in 48 hour intervals or fever spikes that occur sporadically. Early indications of quartan fever include having irritated spots, welts, hives and burning skin, however this is dependent on individual's tolerance to mosquito bites and may not be evident on some people. With the Anopheles malaria mosquitoes, the welts are most likely to not appear unless there are severe allergic reactions. The prepatent period is the time interval for when parasites infect a host and when they can detected on a thick blood film. For quartan fever, P. malariae has a prepatent period ranging from 16\u201359 days. Specifically in the case of quartan fever, the rupturing of liver stage schizonts releases merozoites. This stage of the P. malariae life cycle is known as the \"ring stages\" and are the first stages which can be detected in human blood for diagnosis. Blood smears can be used to detect the parasites within red blood cells, thick blood smears are typically used initially to detect the parasites, then it is followed by thin blood smears which can detect the parasites as the morphology of erythrocytes is maintained through the process. Peripheral blood films stained with Giemsa stain are a method of blood examination used to diagnose the presence of Plasmodium malariae, and detect quartan fever. Rapid diagnostic tests can detect the antigens which cause malaria, a sample of blood is collected from the patient and placed on a test card. After 15\u201320 minutes bands show up on the test card which indicate the specific species of malaria the patient is infected with. Serological tests are used in general to detect whether a patient has developed antibodies to specific microorganism, therefore serological tests are used to detect past encounters with Plasmodium virus rather than acute cases where a patient has just been infected with P. malariae and has quartan fever. Polymerase chain reactions (PCR) are used to diagnosis Plasmodium malariae (cause of quartan fever) as well as to distinguish mixed infections with different species of Plasmodium . Chloroquine is an anti-malarial medication administered in the form of a tablet for ingestion. Chloroquine is a water-soluble drug which is used to treat quartan fever. It is ingested in a compressed tablet form and is absorbed by the gastrointestinal tract. Hydroxychloroquine, another anti-malarial, is used to treat quartan fever. Hydroxychloroquine is also typically administered to patients suffering from lupus flares. Both hydroxychloroquine and chloroquine have a side effect of retinal toxicity when administered to infected patients. Adverse effects of the drug chloroquine include agitation, anxiety, confusion, gastrointestinal discomfort, blurring vision and/or irreversible retinopathy . Sulfadoxine-pyrimethamine (SP) is administered to pregnant women . Two to three doses of SP has been proven to reduce the levels of placental malaria and had a reduced risk of moderate to severe anemia. Indoor residual sprays are one of the most utilised methods of malaria prevention by the Global Malaria Eradication Campaign. Spraying is a method used to control malaria epidemics. Nets treated with insecticide are effective at preventing mosquito contact for three years. The World Health Organisation (WHO) specifically protects younger children and pregnant women in order to reduce the risk of spreading quartan fever within the population. Sulfadoxine-pyrimethamine (SP) administration to pregnant women is also a source of prevention in order to reduce the risks of maternal anaemia, low birth rate, and perinatal mortality. SP reduces the impact quartan fever may have on newborns and decrease the mortality rate. This method of prevention is known as \"chemoprevention.\" House improvement is also a method of prevention. Traditional houses consisting of natural materials are susceptible to gaps which allow entry to Anopheles mosquitoes. House improvements including sealed windows and doors reduce the risk of coming in contact with the infected mosquitoes. Larval source management is the control and monitoring of aquatic environments in order to prevent Anopheles mosquitoes from fully developing. Mosquitoes require aquatic environments in order to fully mature and develop. Once the mosquito eggs hatch, the larva must live in the water and develop into pupa. The pupa stage then matures into a fully developed mosquito and emerges from its aquatic habitat. When removing any water-filled containers from the surrounding area the mosquito life cycle is halted and acts as a method to reduce mosquito population within the surrounding area. Avoiding travelling to regions which have a subtropical climate to prevent infection and developing quartan fever. Implementing the sugar baiting method aids in reducing the population of Anopheles mosquitoes, and ultimately reducing the likelihood of catching quartan fever. Both male and female mosquitoes feed on the attractive toxic sugar bait (ATSB) and ingest low-risk oral toxins e.g. boric acid. This leads to mosquito death and reduces population.", "edit_actions": [{"type": "R", "before": "three-four", "after": "three to four", "start_char_pos": 204, "end_char_pos": 214}, {"type": "D", "before": "40\u201341\u00b0C", "after": null, "start_char_pos": 383, "end_char_pos": 390}, {"type": "R", "before": "Malaria", "after": "malaria", "start_char_pos": 454, "end_char_pos": 461}, {"type": "R", "before": "sub-tropic regions", "after": "the subtropics", "start_char_pos": 532, "end_char_pos": 550}, {"type": "A", "before": null, "after": "that", "start_char_pos": 623, "end_char_pos": 623}, {"type": "R", "before": "treatments", "after": "medication,", "start_char_pos": 654, "end_char_pos": 664}, {"type": "A", "before": null, "after": ", called hepatocytes,", "start_char_pos": 1041, "end_char_pos": 1041}, {"type": "A", "before": null, "after": "further", "start_char_pos": 1062, "end_char_pos": 1062}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1111, "end_char_pos": 1111}, {"type": "A", "before": null, "after": "called", "start_char_pos": 1228, "end_char_pos": 1228}, {"type": "A", "before": null, "after": ", an infected erythrocyte,", "start_char_pos": 1279, "end_char_pos": 1279}, {"type": "R", "before": "happen", "after": "that occur", "start_char_pos": 1794, "end_char_pos": 1800}, {"type": "D", "before": "catching", "after": null, "start_char_pos": 1836, "end_char_pos": 1844}, {"type": "R", "before": ",", "after": "and", "start_char_pos": 1904, "end_char_pos": 1905}, {"type": "R", "before": "show up", "after": "be evident", "start_char_pos": 2002, "end_char_pos": 2009}, {"type": "R", "before": "anopheles malaria mosquitoes", "after": "the Anopheles malaria mosquitoes,", "start_char_pos": 2031, "end_char_pos": 2059}, {"type": "R", "before": "are", "after": "infect a host and when they can", "start_char_pos": 2205, "end_char_pos": 2208}, {"type": "R", "before": "16-59", "after": "16\u201359", "start_char_pos": 2308, "end_char_pos": 2313}, {"type": "R", "before": "strain", "after": "stain", "start_char_pos": 2901, "end_char_pos": 2907}, {"type": "A", "before": null, "after": "the", "start_char_pos": 3056, "end_char_pos": 3056}, {"type": "R", "before": "15-20", "after": "15\u201320", "start_char_pos": 3168, "end_char_pos": 3173}, {"type": "R", "before": "Serological", "after": "serological", "start_char_pos": 3418, "end_char_pos": 3429}, {"type": "A", "before": null, "after": "acute", "start_char_pos": 3505, "end_char_pos": 3505}, {"type": "R", "before": "newly come in contain/has", "after": "just", "start_char_pos": 3532, "end_char_pos": 3557}, {"type": "R", "before": "to separate mixed infections", "after": "as to distinguish mixed infections with different species of Plasmodium", "start_char_pos": 3720, "end_char_pos": 3748}, {"type": "A", "before": null, "after": "an anti-malarial medication", "start_char_pos": 3766, "end_char_pos": 3766}, {"type": "R", "before": "Chloroquine a suppressive drug which", "after": "It", "start_char_pos": 3893, "end_char_pos": 3929}, {"type": "D", "before": "mainly", "after": null, "start_char_pos": 3977, "end_char_pos": 3983}, {"type": "R", "before": "Hydrochloroquine is also a suppressive, anit-malarial agent", "after": "Hydroxychloroquine, another anti-malarial, is", "start_char_pos": 4024, "end_char_pos": 4083}, {"type": "R", "before": "Hydrochloroquine", "after": "Hydroxychloroquine", "start_char_pos": 4113, "end_char_pos": 4129}, {"type": "R", "before": "hydrochloroquine", "after": "hydroxychloroquine", "start_char_pos": 4207, "end_char_pos": 4223}, {"type": "R", "before": "Gastrointestinal", "after": "gastrointestinal", "start_char_pos": 4398, "end_char_pos": 4414}, {"type": "D", "before": ",", "after": null, "start_char_pos": 4443, "end_char_pos": 4444}, {"type": "R", "before": "retinal damage", "after": "retinopathy", "start_char_pos": 4465, "end_char_pos": 4479}, {"type": "R", "before": "during the gestation period. Two-three", "after": ". Two to three", "start_char_pos": 4547, "end_char_pos": 4585}, {"type": "R", "before": "in multiple regions and to control", "after": "used to control malaria", "start_char_pos": 4856, "end_char_pos": 4890}, {"type": "R", "before": "in", "after": "at", "start_char_pos": 4946, "end_char_pos": 4948}, {"type": "R", "before": "targets", "after": "protects", "start_char_pos": 5043, "end_char_pos": 5050}, {"type": "R", "before": "Quartan", "after": "quartan", "start_char_pos": 5128, "end_char_pos": 5135}, {"type": "R", "before": "Quartan", "after": "quartan", "start_char_pos": 5373, "end_char_pos": 5380}, {"type": "R", "before": "morality", "after": "mortality", "start_char_pos": 5425, "end_char_pos": 5433}, {"type": "D", "before": "infected", "after": null, "start_char_pos": 5643, "end_char_pos": 5651}, {"type": "R", "before": "windows, installation and sealed", "after": "sealed windows and", "start_char_pos": 5703, "end_char_pos": 5735}, {"type": "D", "before": "fully", "after": null, "start_char_pos": 5908, "end_char_pos": 5913}, {"type": "A", "before": null, "after": "the", "start_char_pos": 6041, "end_char_pos": 6041}, {"type": "R", "before": "sub-tropic", "after": "subtropical", "start_char_pos": 6443, "end_char_pos": 6453}, {"type": "R", "before": "Attractive", "after": "attractive", "start_char_pos": 6718, "end_char_pos": 6728}], "sents_char_pos": [0, 119, 246, 327, 435, 552, 729, 812, 985, 1064, 1169, 1264, 1321, 1372, 1581, 1814, 2025, 2143, 2240, 2319, 2422, 2570, 2857, 3021, 3161, 3289, 3611, 3818, 3892, 4023, 4112, 4201, 4318, 4575, 4708, 4834, 4901, 4993, 5164, 5350, 5439, 5496, 5546, 5673, 5808, 5957, 6035, 6118, 6216, 6398, 6512, 6673, 6801]}
+{"doc_id": "60562952", "revision_depth": "2", "before_revision": "In a range of publications, but particularly in John Tyndall\u2019s Spearhead, the ideology of a British racial nationalism was developed. Tyndall argues that main motivating force behind the National Front is the ideal of \"Anglo-Saxondom\", which British nationalism is simpler concept of. He defines Anglo-Saxondom as a \u201c ethnic and cultural community, with an identity that is distinguishable at a glance by reference to language, music, literatue, art, customs and institutions and - not least - physical type \u201d . He dismisses the Commonwealth as \u201c the dying bleatings of a British ruling class who proved unfit to maintain an Empire but whose little world of make-believe requires them to invent a special kind of doggerel whereby they may delude themselves that something still remains in the place where their Empire expired \u201d , and argues for \u201c an association based on essentially ethnic foundations \u201d with \u201coverseas kin\u201d . This association will represent Anglo-Saxon or Anglo-Celtic or British race throughout the world, which he called \u201c one of the two truly great and leading races of the world \u201d along with Germans. While antrophologically both represent two branches of the same larger race, they were divided through many centuries and evolved different cultures, traditions, institutions, identities, loyalilites and attachments. They should co-exist on terms of friendship but should not merge. Tyndall writes that \u201c the constructive and creative works of these two peoples far surpass any other \u201d . Developing his own version of Anglo-Saxonism, he argues that without the Anglo-Saxons, we should all still be living in mud huts, art would consist of primitive scrawlings and literature would speak to us \u2018in grunts\u2019.\u2018Tyndall speaks, on Anglo-Saxon heritage\u2019 (tape NNF, 1981) According to Tyndall, the power of Anglo-Saxons as race has receded in relation to other races because they are less \u201cracially assertive\u201d and less unified. He recalls Jews as \u201c the strongest example by far of ethnocentrism and ethnic unity \u201d . If Anglo-Saxons around the world are to unite as the Jews, they will be \u201c indisputably the strongest power on earth \u201d , while playing decisive role in shaping world for next centuries, obtaining vital economic resources in super-abundance and through this and technology building highest standart of living ever known, and exercising a military weight to protect any important interest belonging to them. Tyndall argues that \u201cliberal\u201d ideas, which dominate Anglo-Saxon world, have corrupted race's instincts of self-preservation and survival. He writes that American War of Independece to \u201c to throw off the yoke of his own kinfolk over the ocean \u201d was ultimately erroneous because America fell under \u201c far worse yoke\" of \"far more alien \u201d ruler, suggesting that Jews have enslaved Americans in their own country. He elaborates that the quarrel between people of same racial origin should have been resolved \u201cinternally\u201d , and instead of war and separation, Americans should have sought other means to achieve self-governance. He proposes that America and Britain \u201c actually became rivals in international affairs \u201d . Moreover, Tyndall criticizes the \u201cMelting Pot\u201d policy of America and suggests that by expelling \u201calien elements\u201d America would lose about \u201c 70 million people of very doubtful racial value and who economically are mostly a liability rather than an asset \u201d . Thus Anglo-Saxons will reemerge as dominant power within America and the basis will exist for forging association with Britain and other parts of Anglo-Saxon world. He blames Churchill for colluding with Roosevelt's successors in making \u201c Anglo-Saxons mere serfs in an international federation controlled by internationalist crooks \u201d and Wall Street financial empire. Tyndall proceeds to set up Anglo-Saxondom as the \u201ctranscendental ideal\u201d they should strive for, which is not comprehensible to contemporary mass but should be carried as a dream by minority who \u201c stand, as did Zarathustra, on the mountain peaks of human thought \u201d and translated into an object of mass allegiance when the time will come. He dismisses claims that the ideal to strive for should be pan-Europeanism, because Britons have more in common with \u201c New Zealanders and American or Canadian WASPs \u201d than with Latins like Greeks, Spaniards, and Italians. While acknowledging the worth of all segments of European civilization, as they should be \u201c commonly safeguarded against the intrusion of mutually alien cultures \u201d , he claims that they are still independent and different. At the end he warns about coming international conflict, far more titanic than any other in history, unparalleled throughout ages, the global race war for the world\u2019s resources and survival, as these resources can\u2019t belong to everybody because of \u201c human fecundity in the modern world \u201d . So Anglo-Saxons should put aside \u201cpetty particularism\u201d and unite through race-will to face ultimate battle to come as supreme and unconquerable.J. Tyndall, \u2018In the cause of Anglo-Saxonism\u2019, Spearhead, Oct. 1979.", "after_revision": "In a range of publications, but particularly in John Tyndall\u2019s Spearhead, the ideology of a British racial nationalism was developed. Tyndall argues that main motivating force behind the National Front is the ideal of \"Anglo-Saxondom\", which British nationalism is simpler concept of. He defines Anglo-Saxondom as an \" ethnic and cultural community, with an identity that is distinguishable at a glance by reference to language, music, literatue, art, customs and institutions and - not least - physical type \" . He dismisses the Commonwealth as \" the dying bleatings of a British ruling class who proved unfit to maintain an Empire but whose little world of make-believe requires them to invent a special kind of doggerel whereby they may delude themselves that something still remains in the place where their Empire expired \" , and argues for \" an association based on essentially ethnic foundations \" with \"overseas kin\" . This association will represent Anglo-Saxon or Anglo-Celtic or British race throughout the world, which he called \" one of the two truly great and leading races of the world \" along with Germans. While antrophologically both represent two branches of the same larger race, they were divided through many centuries and evolved different cultures, traditions, institutions, identities, loyalilites and attachments. They should co-exist on terms of friendship but should not merge. Tyndall writes that \" the constructive and creative works of these two peoples far surpass any other \" . Developing his own version of Anglo-Saxonism, he argues that without the Anglo-Saxons, we should all still be living in mud huts, art would consist of primitive scrawlings and literature would speak to us \u2018in grunts\u2019.\u2018Tyndall speaks, on Anglo-Saxon heritage\u2019 (tape NNF, 1981) According to Tyndall, the power of Anglo-Saxons as race has receded in relation to other races because they are less \"racially assertive\" and less unified. He recalls Jews as \" the strongest example by far of ethnocentrism and ethnic unity \" . If Anglo-Saxons around the world are to unite as the Jews, they will be \" indisputably the strongest power on earth \" , while playing decisive role in shaping world for next centuries, obtaining vital economic resources in super-abundance and through this and technology building highest standart of living ever known, and exercising a military weight to protect any important interest belonging to them. Tyndall argues that \"liberal\" ideas, which dominate Anglo-Saxon world, have corrupted race's instincts of self-preservation and survival. He writes that American War of Independece to \" to throw off the yoke of his own kinfolk over the ocean \" was ultimately erroneous because America fell under \" far worse yoke\" of \"far more alien \" ruler, suggesting that Jews have enslaved Americans in their own country. He elaborates that the quarrel between people of same racial origin should have been resolved \"internally\" , and instead of war and separation, Americans should have sought other means to achieve self-governance. He proposes that America and Britain \" actually became rivals in international affairs \" . Moreover, Tyndall criticizes the \"Melting Pot\" policy of America and suggests that by expelling \"alien elements\" America would lose about \" 70 million people of very doubtful racial value and who economically are mostly a liability rather than an asset \" . Thus Anglo-Saxons will reemerge as dominant power within America and the basis will exist for forging association with Britain and other parts of Anglo-Saxon world. He blames Churchill for colluding with Roosevelt's successors in making \" Anglo-Saxons mere serfs in an international federation controlled by internationalist crooks \" and Wall Street financial empire. Tyndall proceeds to set up Anglo-Saxondom as the \"transcendental ideal\" they should strive for, which is not comprehensible to contemporary mass but should be carried as a dream by minority who \" stand, as did Zarathustra, on the mountain peaks of human thought \" and translated into an object of mass allegiance when the time will come. He dismisses claims that the ideal to strive for should be pan-Europeanism, because Britons have more in common with \" New Zealanders and American or Canadian WASPs \" than with Latins like Greeks, Spaniards, and Italians. While acknowledging the worth of all segments of European civilization, as they should be \" commonly safeguarded against the intrusion of mutually alien cultures \" , he claims that they are still independent and different. At the end he warns about coming international conflict, far more titanic than any other in history, unparalleled throughout ages, the global race war for the world\u2019s resources and survival, as these resources can\u2019t belong to everybody because of \" human fecundity in the modern world \" . So Anglo-Saxons should put aside \"petty particularism\" and unite through race-will to face ultimate battle to come as supreme and unconquerable.J. Tyndall, \u2018In the cause of Anglo-Saxonism\u2019, Spearhead, Oct. 1979.", "edit_actions": [{"type": "R", "before": "a \u201c", "after": "an \"", "start_char_pos": 314, "end_char_pos": 317}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 508, "end_char_pos": 509}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 545, "end_char_pos": 546}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 826, "end_char_pos": 827}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 845, "end_char_pos": 846}, {"type": "R", "before": "\u201d with \u201coverseas kin\u201d", "after": "\" with \"overseas kin\"", "start_char_pos": 902, "end_char_pos": 923}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1040, "end_char_pos": 1041}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1100, "end_char_pos": 1101}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1425, "end_char_pos": 1426}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 1506, "end_char_pos": 1507}, {"type": "R", "before": "\u201cracially assertive\u201d", "after": "\"racially assertive\"", "start_char_pos": 1903, "end_char_pos": 1923}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 1961, "end_char_pos": 1962}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2026, "end_char_pos": 2027}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 2102, "end_char_pos": 2103}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2146, "end_char_pos": 2147}, {"type": "R", "before": "\u201cliberal\u201d", "after": "\"liberal\"", "start_char_pos": 2455, "end_char_pos": 2464}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 2619, "end_char_pos": 2620}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2677, "end_char_pos": 2678}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 2731, "end_char_pos": 2732}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 2768, "end_char_pos": 2769}, {"type": "R", "before": "\u201cinternally\u201d", "after": "\"internally\"", "start_char_pos": 2938, "end_char_pos": 2950}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 3094, "end_char_pos": 3095}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 3144, "end_char_pos": 3145}, {"type": "R", "before": "\u201cMelting Pot\u201d", "after": "\"Melting Pot\"", "start_char_pos": 3181, "end_char_pos": 3194}, {"type": "R", "before": "\u201calien elements\u201d", "after": "\"alien elements\"", "start_char_pos": 3244, "end_char_pos": 3260}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 3286, "end_char_pos": 3287}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 3401, "end_char_pos": 3402}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 3642, "end_char_pos": 3643}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 3737, "end_char_pos": 3738}, {"type": "R", "before": "\u201ctranscendental ideal\u201d", "after": "\"transcendental ideal\"", "start_char_pos": 3822, "end_char_pos": 3844}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 3967, "end_char_pos": 3968}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 4035, "end_char_pos": 4036}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 4228, "end_char_pos": 4229}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 4276, "end_char_pos": 4277}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 4423, "end_char_pos": 4424}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 4495, "end_char_pos": 4496}, {"type": "R", "before": "\u201c", "after": "\"", "start_char_pos": 4803, "end_char_pos": 4804}, {"type": "R", "before": "\u201d", "after": "\"", "start_char_pos": 4841, "end_char_pos": 4842}, {"type": "R", "before": "\u201cpetty particularism\u201d", "after": "\"petty particularism\"", "start_char_pos": 4878, "end_char_pos": 4899}], "sents_char_pos": [0, 133, 284, 481, 925, 1121, 1338, 1404, 1727, 1941, 2434, 2572, 2843, 3056, 3194, 3569, 3772, 4110, 4332, 4555, 4989]}
+{"doc_id": "61351399", "revision_depth": "1", "before_revision": "Dietary conservatism (DC) is a foraging strategy in which individuals show a prolonged reluctance to eat novel foods, even after neophobia has been overcome. Within any given population of foragers, some will exhibit DC and some will exhibit adventurousconsumption (AC) , an alternative strategy in which individuals readily accept novel food immediately after neophobia has waned. It is important to emphasise that DC and neophobia are distinct processes distinguished by the persistence of an individual \u2019 s reluctance to eat over repeated encounters with novel food and over long time periods. Animals are often faced with a choice between eating familiar food or expanding their diet by consuming a novel item. It has long been recognised that animals hesitate to approach novel foods they encounter and this initial fear of novelty (the literal meaning of \"neophobia\") lasts only a matter of minutes in most animals. By contrast, a second response to novel food has been identified, in which, after the foragers have overcome their neophobia to approach and made contact with novel food, they continue to avoid eating it for considerable periods of time. This much longer avoidance of novel food is called \u201cDietary Conservatism\u201d (DC) and has been shown to have a genetic basis. Unlike neophobia, DC does not rapidly subside over repeated encounters. For example, Kelly (2001)Kelly, D. J. (2001). Dietary conservatism in passerines: the influences of novel odour and novel colour (unpublished doctoral dissertation). Dublin, Republic of Ireland: Trinity College Dublin found that among wild birds, some individuals avoided novel food for more than 2 years and 200 exposures, even though the novel food was conspicuous and fully palatable. Prevalence This surprising phenomenon of DC has been described in a range of vertebrate species including birds: Zebra Finch, Japanese Quail, European Blackbird, European Robin , both in the wild and in captivity, Domestic Chicken, Great Tit and Blue Tit , and fish: Three-spined Stickleback and four species of the Guppy genus Poecilia. Dietary conservatism has never been demonstrated in humans, although the genetically influenced behaviour of \u201cfussy eating\u201d in children resembles the behaviour seen in non-human animals. Alternative foraging strategies One observation about the phenomenon of DC is that each of the forager populations examined so far has included some individuals that are consistently conservative (DC) . However, the rest of the population exhibit a clearly different response to foraging encounters with novel foods. \u201cAdventurous consumers\u201d (AC) eat novel food as soon as they encounter it, or after their neophobia has waned enough for them to approach and touch it. In all vertebrate populations tested so far, both AC and DC strategies have been represented by a sizable proportion of the population (typically between 10 and 50\\% for DC ). Plasticity in expression of DC Although DC is a trait with a genetic basis, its expression is, like any behaviour, a dynamic interaction between genes and the environment. Specifically, the expression of DC has been shown to be influenced by an individual \u2019 s experience of the encounter with novel food in different contexts. For example, extended experience with multiple different colours of novel food makes a DC individual more likely to accept an additional novel colour. Conversely, encounters with novel food which is distasteful, increases the strength of the DC response, making the individual extremely averse to novel foods thereafter. Social cues can also be important. If a domestic chick (without direct access to food) observes another individual consuming novel food, then the avoidance of novel food by the observer is reduced. Alternatively, if chicks cannot see the food choice, and their companion is simply a competitor for food, then DC individuals become more DC and only take the familiar food. The strength of expression of DC also depends on the forager\u2019s perceived risk of predation pressure, hunger levels, and perceived availability of food. Maintenance of DC and AC foraging strategies It is possible that the balance of DC and AC foraging strategies in a population is influenced by the forager\u2019s ecology. For example, DC may be favoured in habitats where prey are relatively cryptic, since it allows the predator to specialise on a single prey type. In this way DC individuals could benefit from the use of a \u2018search image\u2019 for that prey type and the accumulation of experience of handling that prey.Pietrewicza, A. T., & Kamil, A. G. (1981). Search images and the detection of cryptic prey: an operant approach. In A. G. Kamil, & T. D. Sargent (Eds.), Foraging Behavior: Ethological and Psychological Approaches (pp. 311-332). New York: Garland STPM Press. In addition, where there are many toxic prey types, DC foragers may be favoured as they are less likely to be poisoned if they eat only nontoxic prey, with which they are already familiar. By contrast, AC foragers may be favoured in environments with a high diversity of prey, but a low abundance of individual prey types. In such an environment, AC predators would more quickly discover which of the available range of prey are edible and would then be able to exploit all of those prey types, rather than a familiar, but smaller, subset.", "after_revision": "Dietary conservatism is a foraging strategy in which individuals show a prolonged reluctance to eat novel foods, even after neophobia has been overcome. Within any given population of foragers, some will be conservative and some will be adventurous , an alternative strategy in which individuals readily accept novel food immediately after neophobia has waned. Dietary conservatism and neophobia are however distinct processes, distinguished by the persistence of an individual ' s reluctance to eat over repeated encounters with novel food and over long time periods. Animals are often faced with a choice between eating familiar food or expanding their diet by consuming a novel item. It has long been recognised that animals hesitate to approach novel foods they encounter and this initial fear of novelty (the literal meaning of \"neophobia\") lasts only a matter of minutes in most animals. By contrast, a second response to novel food has been identified, in which, after the foragers have overcome their neophobia to approach and made contact with novel food, they continue to avoid eating it for considerable periods of time. This much longer avoidance of novel food is called dietary onservatism, and has a genetic basis. Unlike neophobia, DC does not rapidly subside over repeated encounters. For example, Kelly (2001)Kelly, D. J. (2001). Dietary conservatism in passerines: the influences of novel odour and novel colour (unpublished doctoral dissertation). Dublin, Republic of Ireland: Trinity College Dublin found that among wild birds, some individuals avoided novel food for more than 2 years and 200 exposures, even though the novel food was conspicuous and fully palatable. Prevalence Dietary conservatism has been described in a range of vertebrate species including birds: Zebra Finch, Japanese quail, common blackbird, European robin , both in the wild and in captivity, domestic chicken, great tit and Eurasian blue tit , and fish: three-spined stickleback and four species of the guppy genus Poecilia. Dietary conservatism has never been demonstrated in humans, although the genetically influenced behaviour of \"fussy eating\" in children resembles the behaviour of non-human animals. Alternative foraging strategies One observation about dietary conservatism is that each of the forager populations examined so far has included some individuals that are consistently conservative in diet . However, the rest of the population exhibit a clearly different response to foraging encounters with novel foods. \"Adventurous consumers\" eat novel food as soon as they encounter it, or after their neophobia has waned enough for them to approach and touch it. In all vertebrate populations tested so far, both adventurous consumption and dietary conservatism strategies have been represented by a sizable proportion of the population (typically between 10 and 50\\% in dietary conservatism ). Plasticity in expression Although dietary conservatism is a trait with a genetic basis, its expression is, like any behaviour, a dynamic interaction between genes and the environment. Specifically, the expression of DC has been shown to be influenced by an individual ' s experience of the encounter with novel food in different contexts. For example, extended experience with multiple different colours of novel food makes a conservative individual more likely to accept an additional novel colour. Conversely, encounters with novel food which is distasteful, increases the strength of the dietary conservatism response, making the individual extremely averse to novel foods thereafter. Social cues can also be important. If a domestic chick (without direct access to food) observes another individual consuming novel food, then the avoidance of novel food by the observer is reduced. Alternatively, if chicks cannot see the food choice, and their companion is simply a competitor for food, then already-conservative individuals become more so, and only take the familiar food. The strength of expression of DC also depends on the forager\u2019s perceived risk of predation pressure, hunger levels, and perceived availability of food. Maintenance of DC and AC foraging strategies The balance of foraging strategies in a population may be influenced by the forager\u2019s ecology. For example, dietary conservatism may be favoured in habitats where prey are relatively cryptic, since it allows the predator to specialise on a single prey type. In this way conservative individuals could benefit from the use of a \u2018search image\u2019 for that prey type and the accumulation of experience of handling that prey.Pietrewicza, A. T., & Kamil, A. G. (1981). Search images and the detection of cryptic prey: an operant approach. In A. G. Kamil, & T. D. Sargent (Eds.), Foraging Behavior: Ethological and Psychological Approaches (pp. 311-332). New York: Garland STPM Press. In addition, where there are many toxic prey types, conservative foragers may be favoured as they are less likely to be poisoned if they eat only nontoxic prey, with which they are already familiar. By contrast, adventurous foragers may be favoured in environments with a high diversity of prey, but a low abundance of individual prey types. In such an environment, adventurous predators would more quickly discover which of the available range of prey are edible and would then be able to exploit all of those prey types, rather than a familiar, but smaller, subset.", "edit_actions": [{"type": "D", "before": "(DC)", "after": null, "start_char_pos": 21, "end_char_pos": 25}, {"type": "R", "before": "exhibit DC", "after": "be conservative", "start_char_pos": 209, "end_char_pos": 219}, {"type": "R", "before": "exhibit adventurousconsumption (AC)", "after": "be adventurous", "start_char_pos": 234, "end_char_pos": 269}, {"type": "R", "before": "It is important to emphasise that DC", "after": "Dietary conservatism", "start_char_pos": 382, "end_char_pos": 418}, {"type": "R", "before": "distinct processes", "after": "however distinct processes,", "start_char_pos": 437, "end_char_pos": 455}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 506, "end_char_pos": 507}, {"type": "R", "before": "\u201cDietary Conservatism\u201d (DC) and has been shown to have", "after": "dietary onservatism, and has", "start_char_pos": 1211, "end_char_pos": 1265}, {"type": "R", "before": "This surprising phenomenon of DC", "after": "Dietary conservatism", "start_char_pos": 1754, "end_char_pos": 1786}, {"type": "R", "before": "Quail, European Blackbird, European Robin", "after": "quail, common blackbird, European robin", "start_char_pos": 1878, "end_char_pos": 1919}, {"type": "R", "before": "Domestic Chicken, Great Tit and Blue Tit", "after": "domestic chicken, great tit and Eurasian blue tit", "start_char_pos": 1957, "end_char_pos": 1997}, {"type": "R", "before": "Three-spined Stickleback", "after": "three-spined stickleback", "start_char_pos": 2010, "end_char_pos": 2034}, {"type": "R", "before": "Guppy", "after": "guppy", "start_char_pos": 2059, "end_char_pos": 2064}, {"type": "R", "before": "\u201cfussy eating\u201d", "after": "\"fussy eating\"", "start_char_pos": 2190, "end_char_pos": 2204}, {"type": "R", "before": "seen in", "after": "of", "start_char_pos": 2241, "end_char_pos": 2248}, {"type": "R", "before": "the phenomenon of DC", "after": "dietary conservatism", "start_char_pos": 2322, "end_char_pos": 2342}, {"type": "R", "before": "(DC)", "after": "in diet", "start_char_pos": 2464, "end_char_pos": 2468}, {"type": "R", "before": "\u201cAdventurous consumers\u201d (AC)", "after": "\"Adventurous consumers\"", "start_char_pos": 2585, "end_char_pos": 2613}, {"type": "R", "before": "AC and DC", "after": "adventurous consumption and dietary conservatism", "start_char_pos": 2786, "end_char_pos": 2795}, {"type": "R", "before": "for DC", "after": "in dietary conservatism", "start_char_pos": 2902, "end_char_pos": 2908}, {"type": "D", "before": "of DC Although DC", "after": null, "start_char_pos": 2937, "end_char_pos": 2954}, {"type": "A", "before": null, "after": "Although dietary conservatism", "start_char_pos": 2955, "end_char_pos": 2955}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3169, "end_char_pos": 3170}, {"type": "R", "before": "DC", "after": "conservative", "start_char_pos": 3327, "end_char_pos": 3329}, {"type": "R", "before": "DC", "after": "dietary conservatism", "start_char_pos": 3482, "end_char_pos": 3484}, {"type": "R", "before": "DC", "after": "already-conservative", "start_char_pos": 3870, "end_char_pos": 3872}, {"type": "R", "before": "DC", "after": "so,", "start_char_pos": 3897, "end_char_pos": 3899}, {"type": "D", "before": "It is possible that the balance of DC and AC", "after": null, "start_char_pos": 4130, "end_char_pos": 4174}, {"type": "A", "before": null, "after": "The balance of", "start_char_pos": 4175, "end_char_pos": 4175}, {"type": "R", "before": "is", "after": "may be", "start_char_pos": 4212, "end_char_pos": 4214}, {"type": "R", "before": "DC", "after": "dietary conservatism", "start_char_pos": 4265, "end_char_pos": 4267}, {"type": "R", "before": "DC", "after": "conservative", "start_char_pos": 4409, "end_char_pos": 4411}, {"type": "R", "before": "DC", "after": "conservative", "start_char_pos": 4857, "end_char_pos": 4859}, {"type": "R", "before": "AC", "after": "adventurous", "start_char_pos": 5007, "end_char_pos": 5009}, {"type": "R", "before": "AC", "after": "adventurous", "start_char_pos": 5152, "end_char_pos": 5154}], "sents_char_pos": [0, 157, 381, 596, 714, 921, 1159, 1282, 1354, 1400, 1520, 1742, 2080, 2267, 2584, 2735, 2911, 3084, 3239, 3390, 3560, 3595, 3758, 3932, 4084, 4251, 4396, 4547, 4589, 4659, 4774, 4804, 4993, 5127]}
+{"doc_id": "61388491", "revision_depth": "1", "before_revision": "Amino acids, as components of peptides, peptide hormones, structural and immune proteins, are the most important bioregulators involved in all life processes along with nucleic acids, carbohydrates and lipids. Environmental D-amino acids are thought to be derived from organic diagenesis such as racemization and release from bacterial cell walls and even from microbial production. 50px D-amino acids were discovered in the 1950s : Auclair and Patton (1950) first reported their presence in the blood of insects and mollusks . Subsequently, D-amino acids have been detected in a variety of mammalian tissues. There are two major types of D-amino acids synthesized in mammals: D-aspartic acid (D-Asp) and D-serine (D-Ser). D-Asp is present in vertebrates and invertebrates and is involved in the development of both the nervous and endocrine systems (Kim et al., 2010) . A large amount of D-Ser can be detected in the brain, where it plays an important regulatory role in the development of the central nervous system and is closely associated with learning, memory, and mammalian behavior (Snyder and Kim, 2000). In addition, a large amount of D-Ser has been detected in human urine; it plays a regulatory role in pathogenic gene expression in the urinary system (Huang et al., 1998). D-amino acids have also been detected in some tissues of marine invertebrates and might be involved in regulating osmotic pressure (Abe et al., 1999). However, it remains unclear whether these D-amino acids are synthesized by the organisms themselves or absorbed from the seawater. D-amino acids have been detected in plants as well (Brckner and Westhauser, 2003). Several D-amino acids have been found to inhibit plant growth (Forsum et al., 2008), while some plants can absorb and metabolize or assimilate D-amino acids (Grdes et al., 2011; Hill et al., 2011) . The D-amino acids taken up by plants may be derived mainly from bacteria in the rhizosphere (Brodowski et al., 2005). In addition to higher organisms such as animals and plants, microbes (including planktonic algae, archaea, and bacteria) generally synthesize D-amino acids during development. Bacteria have the largest capacity to utilize D-amino acids. They have been described to synthesize more than 10 kinds of D-amino acids, most commonly D-alanine and D-glutamate for crosslinking within the peptidoglycan cell wall. Extracellular D-amino acids released from bacteria also regulate remodeling of the bacterial cell wall and are thought to function in communication among bacteria to accommodate changing environment. Besides structural function in the bacterial cell wall, D-amino acids have been associated to growth fitness and to processes such as biofilm development, spore germination and signaling. Some challenges associated with studies that use D-amino acids are that cell walls found in other life, such as archaea or plants/ fungi in eukaryotes, are not composed with D-amino acids. They are also naturally less digestible and utilizable as microbial growth substrates compared with L-amino acids. As a deep-sea strain, Phaeobacter sp. JL2886, which was isolated in 2012 from a 2000-m-deep sediment in the South China Sea, has been analyzed for its complete genome sequence . Another studyisolated 28 D-amino acid utilizers from 56 deep-sea sediments collected from a depth of 800\u20131500 m in Sagami Bay, Japan ; one strain, Nautella sp.A04V, was revealed to grow better with D-valine than with L-valine. For the enrichment and isolation of D-amino acid utilizers, liquid and solid media are often with D-amino acidsas the sole carbon source. Studies generally employ D-alanine, D-aspartate, and D-glutamate, as they represent the most common D-amino acids in living organisms. They also serve as nitrogen sources .", "after_revision": "Amino acids, as components of peptides, peptide hormones, structural and immune proteins, are the most important bioregulators involved in all life processes along with nucleic acids, carbohydrates and lipids. \" Environmental D-amino acids are thought to be derived from organic diagenesis such as racemization and release from bacterial cell walls and even from microbial production. \" 50px Their discovery was in the 1950s . \u201c Auclair and Patton (1950) first reported their presence in the blood of insects and mollusks \u201d Furthermore, they also have been identified in various mammalian tissues. The two major types of D-amino acids synthesized in and by mammals are D-aspartic acid (D-Asp) and D-serine (D-Ser). \u201c D-Asp is present in vertebrates and invertebrates and is involved in the development of both the nervous and endocrine systems (Kim et al., 2010) \". An immense amount of D-Ser can also be detected in the brain, wherein it composes a significant regulatory role in the development of the \u201c central nervous system and is closely associated with learning, memory, and mammalian behavior (Snyder and Kim, 2000). \" Additionally, a great amount of D-Ser , has also been \u201c detected in human urine; it plays a regulatory role in pathogenic gene expression in the urinary system (Huang et al., 1998). \" Furthermore, they have also been noticed in certain tissues of some marine invertebrates, and \u201c might be involved in regulating osmotic pressure (Abe et al., 1999). \" It is still unclear however, on as to whether they are absorbed from seawater, or are made by the organisms themselves . They have also been identified in plants (Brckner and Westhauser, 2003). A number of D-Amino acids also constrain the growth of plants (Forsum et al., 2008), \u201c while some plants can absorb and metabolize or assimilate D-amino acids (Grdes et al., 2011; Hill et al., 2011) \u201d Bacteria probably have the largest capacity to utilize amino acids. They have been known to synthesize more than 10 kinds of D-amino acids, most frequently D-alanine and D-glutamate for crosslinking within the peptidoglycan cell wall. In addition, extracellular D-amino acids released from bacteria also control remodeling of the bacterial cell wall and are moreover, thought to function amongst bacteria to accommodate frequently changing environments. Apart from structural function in the bacterial cell wall, D-amino acids have also been associated to growth fitness and to further processes such as biofilm development, spore germination and signaling. Phaeobacter sp. JL2886, a deep sea strain, that was sequestered in 2012 , from a sediment that was 2000 m deep in the South China sea, \u201cwas analyzed for its entire genome sequence (Fu et al., 2016)\u201d (Naganuma et al., 2018). In another study, from 56 sediments collected from the deep sea (depth range 800-1500 m), \u201c28 D-Amino Acid utilizers\u201d were isolated, in Sagami Bay, Japan (Kubota et al., 2016). Independent attempts to sequester micro-organisms that grow healthier, due to D-Amino acids, has also been done. Most conducted studies and experiments usually also utilize mainly D-alanine, D-aspartate, and D-glutamate, as they signify the most common D-amino acids found in living organisms. Moreover, they also aid as nitrogen sources for many of the fundamental processes involved in the ocean .", "edit_actions": [{"type": "A", "before": null, "after": "\"", "start_char_pos": 210, "end_char_pos": 210}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 384, "end_char_pos": 384}, {"type": "R", "before": "D-amino acids were discovered", "after": "Their discovery was", "start_char_pos": 390, "end_char_pos": 419}, {"type": "R", "before": ":", "after": ". \u201c", "start_char_pos": 433, "end_char_pos": 434}, {"type": "R", "before": ". Subsequently, D-amino acids have been detected in a variety of", "after": "\u201d Furthermore, they also have been identified in various", "start_char_pos": 528, "end_char_pos": 592}, {"type": "R", "before": "There are", "after": "The", "start_char_pos": 612, "end_char_pos": 621}, {"type": "R", "before": "mammals:", "after": "and by mammals are", "start_char_pos": 670, "end_char_pos": 678}, {"type": "A", "before": null, "after": "\u201c", "start_char_pos": 725, "end_char_pos": 725}, {"type": "R", "before": ". A large", "after": "\". An immense", "start_char_pos": 872, "end_char_pos": 881}, {"type": "A", "before": null, "after": "also", "start_char_pos": 902, "end_char_pos": 902}, {"type": "R", "before": "where it plays an important", "after": "wherein it composes a significant", "start_char_pos": 929, "end_char_pos": 956}, {"type": "A", "before": null, "after": "\u201c", "start_char_pos": 999, "end_char_pos": 999}, {"type": "R", "before": "In addition, a large", "after": "\" Additionally, a great", "start_char_pos": 1119, "end_char_pos": 1139}, {"type": "R", "before": "has been", "after": ", has also been \u201c", "start_char_pos": 1156, "end_char_pos": 1164}, {"type": "R", "before": "D-amino acids", "after": "\" Furthermore, they", "start_char_pos": 1291, "end_char_pos": 1304}, {"type": "R", "before": "detected in some tissues of marine invertebrates and", "after": "noticed in certain tissues of some marine invertebrates, and \u201c", "start_char_pos": 1320, "end_char_pos": 1372}, {"type": "R", "before": "However, it remains unclear whether these D-amino acids are synthesized", "after": "\" It is still unclear however, on as to whether they are absorbed from seawater, or are made", "start_char_pos": 1442, "end_char_pos": 1513}, {"type": "R", "before": "or absorbed from the seawater. D-amino acids have been detected in plants as well", "after": ". They have also been identified in plants", "start_char_pos": 1542, "end_char_pos": 1623}, {"type": "R", "before": "Several D-amino acids have been found to inhibit plant growth", "after": "A number of D-Amino acids also constrain the growth of plants", "start_char_pos": 1656, "end_char_pos": 1717}, {"type": "A", "before": null, "after": "\u201c", "start_char_pos": 1741, "end_char_pos": 1741}, {"type": "R", "before": ". The D-amino acids taken up by plants may be derived mainly from bacteria in the rhizosphere (Brodowski et al., 2005). In addition to higher organisms such as animals and plants, microbes (including planktonic algae, archaea, and bacteria) generally synthesize D-amino acids during development.", "after": "\u201d", "start_char_pos": 1854, "end_char_pos": 2149}, {"type": "A", "before": null, "after": "probably", "start_char_pos": 2159, "end_char_pos": 2159}, {"type": "R", "before": "D-amino", "after": "amino", "start_char_pos": 2197, "end_char_pos": 2204}, {"type": "R", "before": "described", "after": "known", "start_char_pos": 2227, "end_char_pos": 2236}, {"type": "R", "before": "commonly", "after": "frequently", "start_char_pos": 2293, "end_char_pos": 2301}, {"type": "R", "before": "Extracellular", "after": "In addition, extracellular", "start_char_pos": 2381, "end_char_pos": 2394}, {"type": "R", "before": "regulate", "after": "control", "start_char_pos": 2437, "end_char_pos": 2445}, {"type": "A", "before": null, "after": "moreover,", "start_char_pos": 2492, "end_char_pos": 2492}, {"type": "R", "before": "in communication among", "after": "amongst", "start_char_pos": 2513, "end_char_pos": 2535}, {"type": "R", "before": "changing environment. Besides", "after": "frequently changing environments. Apart from", "start_char_pos": 2560, "end_char_pos": 2589}, {"type": "A", "before": null, "after": "also", "start_char_pos": 2657, "end_char_pos": 2657}, {"type": "A", "before": null, "after": "further", "start_char_pos": 2699, "end_char_pos": 2699}, {"type": "D", "before": "Some challenges associated with studies that use D-amino acids are that cell walls found in other life, such as archaea or plants/ fungi in eukaryotes, are not composed with D-amino acids. They are also naturally less digestible and utilizable as microbial growth substrates compared with L-amino acids.", "after": null, "start_char_pos": 2772, "end_char_pos": 3075}, {"type": "D", "before": "As a deep-sea strain,", "after": null, "start_char_pos": 3076, "end_char_pos": 3097}, {"type": "R", "before": "which was isolated", "after": "a deep sea strain, that was sequestered", "start_char_pos": 3122, "end_char_pos": 3140}, {"type": "R", "before": "from a 2000-m-deep sediment", "after": ", from a sediment that was 2000 m deep", "start_char_pos": 3149, "end_char_pos": 3176}, {"type": "R", "before": "Sea, has been", "after": "sea, \u201cwas", "start_char_pos": 3196, "end_char_pos": 3209}, {"type": "R", "before": "complete genome sequence . Another studyisolated 28 D-amino acid utilizers", "after": "entire genome sequence (Fu et al., 2016)\u201d (Naganuma et al., 2018). In another study,", "start_char_pos": 3227, "end_char_pos": 3301}, {"type": "D", "before": "deep-sea", "after": null, "start_char_pos": 3310, "end_char_pos": 3318}, {"type": "R", "before": "a depth of 800\u20131500 m", "after": "the deep sea (depth range 800-1500 m), \u201c28 D-Amino Acid utilizers\u201d were isolated,", "start_char_pos": 3344, "end_char_pos": 3365}, {"type": "R", "before": "; one strain, Nautella sp.A04V, was revealed to grow better with D-valine than with L-valine. For the enrichment and isolation of D-amino acid utilizers, liquid and solid media are often with D-amino acidsas the sole carbon source. Studies generally employ", "after": "(Kubota et al., 2016). Independent attempts to sequester micro-organisms that grow healthier, due to D-Amino acids, has also been done. Most conducted studies and experiments usually also utilize mainly", "start_char_pos": 3387, "end_char_pos": 3643}, {"type": "R", "before": "represent", "after": "signify", "start_char_pos": 3693, "end_char_pos": 3702}, {"type": "A", "before": null, "after": "found", "start_char_pos": 3733, "end_char_pos": 3733}, {"type": "R", "before": "They also serve", "after": "Moreover, they also aid", "start_char_pos": 3755, "end_char_pos": 3770}, {"type": "A", "before": null, "after": "for many of the fundamental processes involved in the ocean", "start_char_pos": 3791, "end_char_pos": 3791}], "sents_char_pos": [0, 209, 383, 529, 611, 724, 873, 1118, 1189, 1290, 1441, 1572, 1655, 1834, 1855, 1973, 2149, 2211, 2380, 2581, 2771, 2960, 3075, 3253, 3388, 3413, 3480, 3618, 3754]}
+{"doc_id": "63088197", "revision_depth": "1", "before_revision": "The relationship between breastfeeding and mental health of mothers and their children is under investigation. Breastfeeding and mental health is the relationship between postpartum breastfeeding and the mother \u2019 s and child \u2019 s mental health. Research indicates breastfeeding has positive effects on the mother \u2019 s and child \u2019 s mental health. These benefits include improved mood and stress levels in the mother, lower risk of postpartum depression, enhanced social emotional development in the child, stronger mother-child bonding and more. Given the benefits of breastfeeding, the World Health Organization (WHO), the European Commission for Public Health (ECPH) and the American Academy of Pediatrics (AAP) suggest exclusive breastfeeding for the \ufb01rst six months of life. Despite these suggestions, estimates indicate 70\\% of mothers breastfeed their child after birth and 13.5\\% of infants in the United States are exclusively breastfed. Breastfeeding promotion and support for mothers who are experiencing difficulties or early cessation in breastfeeding is considered a health priority. Benefits on mood and stress levels Breastfeeding positively influences the mother \u2019 s mental and emotional wellbeing as it improves mood and stress levels, and it is referred to as a \u2018stress buffer\u2019 for mothers during the postpartum period. The activity facilitates a calmer psychological state and decreases feelings of anxiousness, negative emotions and stress. This is reflected in their physiological response to breastfeeding, where the mother \u2019 s cardiac vagal tone modulation enhances, and blood pressure and heart rate decreases. The stress-buffering effect of breastfeeding results from the hormones oxytocin and prolactin. Mothers who breastfeed experience enhanced sleep duration and quality, while instances of sleep disturbances are decreased. The activity positively influences how mothers respond to social situations, which facilitates improved relationships and interactions. Mothers who engage in breastfeeding respond less to negative facial expressions (e.g. anger) and increase their response to positive facial expressions (e.g. happiness). Breastfeeding also help mothers feel confident and empowered given the knowledge that breastfeeding is beneficial to their child. Effects of postpartum depression on breastfeeding Studies indicate mothers with postpartum depression breastfeed their infant with lower frequency. Breastfeeding is an intimate activity with requires sustained mother-child physical contact and new mothers with symptoms of depression, including increased anxiety and tendency to avoid their child, are less likely to breastfeed their child. Postpartum depressive anxiety can decrease the mother \u2019 s milk production which reduces the mother \u2019 s ability to breastfeed her child. Mothers who take certain antidepressants to treat their depression are not recommended to breastfeed their child. The ingredients in the medication may be transferred to the child through breast milk and this may have detrimental consequences on their development. A woman should consult with her doctor to understand if her specific medication might be problematic in this regard. Mothers with symptoms of postpartum depression commonly report more difficulties with breastfeeding and lower levels of breastfeeding self-efficiacy. Mothers with postpartum depression are more likely to have a negative perception of breastfeeding. They also initiate breastfeeding later, breastfeed less, and are more likely to cease breastfeeding early on during the postpartum period. Effects of breastfeeding on postpartum depression Breastfeeding may provide protection against postpartum depression or reduce some of its symptoms, and it is suggested that the benefits of breastfeeding may outweigh the benefits of antidepressants. The abstinence of breastfeeding, or decreased breastfeeding can increase the mother \u2019 s likelihood developing of this mental disorder. Oxytocin and prolactin, which is released during breastfeeding, may improve the mother \u2019 s mood and reduce her risk of depression. Breastfeeding women have lower rates of postpartum depression in comparison to formula-feeding women. Stress is one of the strongest risk factors in the development of depression, and as breastfeeding reduces stress it may decrease the risk of postpartum depression in mothers. Improved sleep patterns, improvements in mother-child bonding and an increased sense of self-efficacy due to breastfeeding also reduces the risk of developing depression. Breastfeeding difficulties and interruption lead to poorer maternal mood and increase the risk of developing postpartum depression. A 2011 study conducted by Nielson and colleagues found women who were unable to breastfeed were 2.4 times more likely to develop symptoms of depression 16 weeks after birth. Reasons for being unable to breastfeed include nipple pain, child temperamental issues, lack of milk production, breast surgery and mastitis. The lack of self-confidence or difficult experiences during breastfeeding is a common concern for mothers with postpartum depression. It is suggested that mothers who experience problems during breastfeeding require immediate additional support or should be screened for any signs of depression. Encouragement and guidance from professionals promotes self-efficacy and help mothers feel capable and empowered. As a child \u2019 s temperament may affect the breastfeeding process, mothers are also encouraged to gain a deeper understanding of how infants feed during breastfeeding so potential problems can be anticipated and addressed. Mechanisms of action The relationship between breastfeeding and the mother \u2019 s mental health may be due to direct causes such as the following: Guilt, shame and/or disappointment: Mothers who are experiencing difficulties during breastfeeding or are unable to breastfeed may feel guilt, shame and disappointment as they believe they \u2019re unable to provide the child with what they require. This may lead to symptoms of postpartum depression. Negative perceptions of breastfeeding: The mother \u2019 s perception of breastfeeding may affect her mood. Mothers with symptoms of postpartum depression are more likely to believe breastfeeding is restrictive and private. Depressed mothers tend to feel unsatisfied with breastfeeding and experience a decreased sense of self-efficacy when it comes to breastfeeding. Mothers who worry about breastfeeding are also more likely to be diagnosed with postpartum depression. Improved mother-infant bonding: Breastfeeding may also enhance the bond between the mother and child. This facilitates improved mental health. Physiological mechanisms The underlying physiological explanation of the benefits of breastfeeding on the mother \u2019 s mental health is attributed to neuroendocrine processes. Breast milk contains lactogenic hormones, oxytocin and prolactin, which contain antidepressant effects and reduces anxiety. Prolactin is the primary hormone responsible for milk production and its levels are proportional to breastfeeding frequency and the child \u2019 s milk requirements. Prolactin facilitates maternal behaviour, acts as an analgesic and decreases stress responsiveness. This hormone level is higher in women who breastfeed compared to women who do not breastfeed. Oxytocin decreases stress and promotes relaxation and nurturing behaviour. Prior to breastfeeding, oxytocin is released into the blood stream to aid in milk release. Oxytocin and prolactin are also released during nipple stimulation when the child suckles. The nerve fibres linked to the hypothalamus controls this release and the hormones are released in pulsating patterns. The increased levels of these hormones during breastfeeding have a beneficial effect on the mother \u2019 s mental health. When exposed to physical or psychological stress, breastfeeding mothers also have a reduced cortisol response due to decreased production of stress hormones and improvements in their sleep. Physical contact during this activity attenuates the cortisol response. Postpartum depression and breastfeeding failure are also attributed to neuroendocrine mechanisms. Postpartum depression is also closely associated with inflammation caused by postpartum pain or sleep deprivation, which are common experiences of motherhood. Breastfeeding decreases this inflammation response which is beneficial to the mother \u2019 s mental health. Suckling the nipple stimulates the child \u2019 s oropharynx. This focuses the child's attention on the area and reduces attention to other influences. The act of suckling and intestinal adsorption of fat increases the hormone cholecystokinin, which enhances relaxation and pain relief. Breast milk is sweet and this stimulates the release of opioids which decreases the infant \u2019 s sensitivity to pain. Physical contact stabilises blood glucose levels, body temperature and respiration rates, aids neurobehavioural self-regulation, reduces stress hormone release and blood pressure. Social interaction and physical contact promotes release of oxytocin. The act of breastfeeding may also be an indicator of the mother \u2019 s maternal behaviour. The abstinence or unnecessary prolonging of breastfeeding may suggest the mother is not mentally well and this contributes to increasingly antisocial behaviour in the child. The mother and child's bond enhances during breastfeeding.|alt=|left Breastfeeding enhances the emotional and social bond between the mother and child, and this attachment is important for the their mental health. This bond increases the mother's and child's abilities to control their emotions, reduce the stress response and encourages healthy social development in the child. Physical contact during breastfeeding increases levels of oxytocin in the mother and child, which improves the mother-child bond. Breastfed infants become more dependent on their mothers and develop a deep social and emotional connection. Likewise, breastfeeding facilitates mothers\u2019 emotional connection with their child and thus mothers generally display more warmth and sensitivity. Mothers are more responsive and sensitive to their infant \u2019 s needs. Mothers spend more time and attention on their infant. Mothers generally touch and speak to their infant more. Infants demonstrate a greater sense of \u2018attachment security\u2019 and lower \u2018attachment disorganisation. Infants suckle their mother \u2019 s breast longer than with bottles. Mothers and infants spend more time gazing at each other. Mothers are more positive and smile at their child more. Brain imaging research indicates breastfeeding mothers who listen to their infant crying demonstrate greater activity in limbic regions of the brain. This suggests the mother \u2019 s enhanced emotional, empathetic and sensitive response to their child, which supports mother-infant bonding. Studies which do not demonstrate a significant relationship between breastfeeding and mother-infant bonding exist. For example, Britton and colleagues (2006) did not find a significant association between breastfeeding and mother-infant bonding but found that mothers displaying more sensitivity were more likely to breastfeed than bottlefeed. This suggests that the mother \u2019 s sensitivity may have a more direct effect on mother-child bonding as more sensitive mothers are more likely to breastfeed and display greater emotional sensitivity.", "after_revision": "The relationship between breastfeeding and mental health of mothers and their children is under investigation. Breastfeeding and mental health is the relationship between postpartum breastfeeding and the mother ' s and child ' s mental health. Research indicates breastfeeding has positive effects on the mother ' s and child ' s mental health. These benefits include improved mood and stress levels in the mother, lower risk of postpartum depression, enhanced social emotional development in the child, stronger mother-child bonding and more. Given the benefits of breastfeeding, the World Health Organization (WHO), the European Commission for Public Health (ECPH) and the American Academy of Pediatrics (AAP) suggest exclusive breastfeeding for the \ufb01rst six months of life. Despite these suggestions, estimates indicate 70\\% of mothers breastfeed their child after birth and 13.5\\% of infants in the United States are exclusively breastfed. Breastfeeding promotion and support for mothers who are experiencing difficulties or early cessation in breastfeeding is considered a health priority. Benefits on mood and stress levels Breastfeeding positively influences the mother ' s mental and emotional wellbeing as it improves mood and stress levels, and it is referred to as a \u2018stress buffer\u2019 for mothers during the postpartum period. The activity facilitates a calmer psychological state and decreases feelings of anxiousness, negative emotions and stress. This is reflected in their physiological response to breastfeeding, where the mother ' s cardiac vagal tone modulation enhances, and blood pressure and heart rate decreases. The stress-buffering effect of breastfeeding results from the hormones oxytocin and prolactin. Mothers who breastfeed experience enhanced sleep duration and quality, while instances of sleep disturbances are decreased. The activity positively influences how mothers respond to social situations, which facilitates improved relationships and interactions. Mothers who engage in breastfeeding respond less to negative facial expressions (e.g. anger) and increase their response to positive facial expressions (e.g. happiness). Breastfeeding also help mothers feel confident and empowered given the knowledge that breastfeeding is beneficial to their child. Effects of postpartum depression on breastfeeding Studies indicate mothers with postpartum depression breastfeed their infant with lower frequency. Breastfeeding is an intimate activity with requires sustained mother-child physical contact and new mothers with symptoms of depression, including increased anxiety and tendency to avoid their child, are less likely to breastfeed their child. Postpartum depressive anxiety can decrease the mother ' s milk production which reduces the mother ' s ability to breastfeed her child. Mothers who take certain antidepressants to treat their depression are not recommended to breastfeed their child. The ingredients in the medication may be transferred to the child through breast milk and this may have detrimental consequences on their development. A woman should consult with her doctor to understand if her specific medication might be problematic in this regard. Mothers with symptoms of postpartum depression commonly report more difficulties with breastfeeding and lower levels of breastfeeding self-efficiacy. Mothers with postpartum depression are more likely to have a negative perception of breastfeeding. They also initiate breastfeeding later, breastfeed less, and are more likely to cease breastfeeding early on during the postpartum period. Effects of breastfeeding on postpartum depression Breastfeeding may provide protection against postpartum depression or reduce some of its symptoms, and it is suggested that the benefits of breastfeeding may outweigh the benefits of antidepressants. The abstinence of breastfeeding, or decreased breastfeeding can increase the mother ' s likelihood developing of this mental disorder. Oxytocin and prolactin, which is released during breastfeeding, may improve the mother ' s mood and reduce her risk of depression. Breastfeeding women have lower rates of postpartum depression in comparison to formula-feeding women. Stress is one of the strongest risk factors in the development of depression, and as breastfeeding reduces stress it may decrease the risk of postpartum depression in mothers. Improved sleep patterns, improvements in mother-child bonding and an increased sense of self-efficacy due to breastfeeding also reduces the risk of developing depression. Breastfeeding difficulties and interruption lead to poorer maternal mood and increase the risk of developing postpartum depression. A 2011 study conducted by Nielson and colleagues found women who were unable to breastfeed were 2.4 times more likely to develop symptoms of depression 16 weeks after birth. Reasons for being unable to breastfeed include nipple pain, child temperamental issues, lack of milk production, breast surgery and mastitis. The lack of self-confidence or difficult experiences during breastfeeding is a common concern for mothers with postpartum depression. It is suggested that mothers who experience problems during breastfeeding require immediate additional support or should be screened for any signs of depression. Encouragement and guidance from professionals promotes self-efficacy and help mothers feel capable and empowered. As a child ' s temperament may affect the breastfeeding process, mothers are also encouraged to gain a deeper understanding of how infants feed during breastfeeding so potential problems can be anticipated and addressed. Mechanisms of action The relationship between breastfeeding and the mother ' s mental health may be due to direct causes such as the following: Guilt, shame and/or disappointment: Mothers who are experiencing difficulties during breastfeeding or are unable to breastfeed may feel guilt, shame and disappointment as they believe they are unable to provide the child with what they require. This may lead to symptoms of postpartum depression. Negative perceptions of breastfeeding: The mother ' s perception of breastfeeding may affect her mood. Mothers with symptoms of postpartum depression are more likely to believe breastfeeding is restrictive and private. Depressed mothers tend to feel unsatisfied with breastfeeding and experience a decreased sense of self-efficacy when it comes to breastfeeding. Mothers who worry about breastfeeding are also more likely to be diagnosed with postpartum depression. Improved mother-infant bonding: Breastfeeding may also enhance the bond between the mother and child. This facilitates improved mental health. Physiological mechanisms The underlying physiological explanation of the benefits of breastfeeding on the mother ' s mental health is attributed to neuroendocrine processes. Breast milk contains lactogenic hormones, oxytocin and prolactin, which contain antidepressant effects and reduces anxiety. Prolactin is the primary hormone responsible for milk production and its levels are proportional to breastfeeding frequency and the child ' s milk requirements. Prolactin facilitates maternal behaviour, acts as an analgesic and decreases stress responsiveness. This hormone level is higher in women who breastfeed compared to women who do not breastfeed. Oxytocin decreases stress and promotes relaxation and nurturing behaviour. Prior to breastfeeding, oxytocin is released into the blood stream to aid in milk release. Oxytocin and prolactin are also released during nipple stimulation when the child suckles. The nerve fibres linked to the hypothalamus controls this release and the hormones are released in pulsating patterns. The increased levels of these hormones during breastfeeding have a beneficial effect on the mother ' s mental health. When exposed to physical or psychological stress, breastfeeding mothers also have a reduced cortisol response due to decreased production of stress hormones and improvements in their sleep. Physical contact during this activity attenuates the cortisol response. Postpartum depression and breastfeeding failure are also attributed to neuroendocrine mechanisms. Postpartum depression is also closely associated with inflammation caused by postpartum pain or sleep deprivation, which are common experiences of motherhood. Breastfeeding decreases this inflammation response which is beneficial to the mother ' s mental health. Suckling the nipple stimulates the child ' s oropharynx. This focuses the child's attention on the area and reduces attention to other influences. The act of suckling and intestinal adsorption of fat increases the hormone cholecystokinin, which enhances relaxation and pain relief. Breast milk is sweet and this stimulates the release of opioids which decreases the infant ' s sensitivity to pain. Physical contact stabilises blood glucose levels, body temperature and respiration rates, aids neurobehavioural self-regulation, reduces stress hormone release and blood pressure. Social interaction and physical contact promotes release of oxytocin. The act of breastfeeding may also be an indicator of the mother ' s maternal behaviour. The abstinence or unnecessary prolonging of breastfeeding may suggest the mother is not mentally well and this contributes to increasingly antisocial behaviour in the child. The mother and child's bond enhances during breastfeeding.|alt=|left Breastfeeding enhances the emotional and social bond between the mother and child, and this attachment is important for their mental health. This bond increases the mother's and child's abilities to control their emotions, reduce the stress response and encourages healthy social development in the child. Physical contact during breastfeeding increases levels of oxytocin in the mother and child, which improves the mother-child bond. Breastfed infants become more dependent on their mothers and develop a deep social and emotional connection. Likewise, breastfeeding facilitates mothers\u2019 emotional connection with their child and thus mothers generally display more warmth and sensitivity. Mothers are more responsive and sensitive to their infant ' s needs. Mothers spend more time and attention on their infant. Mothers generally touch and speak to their infant more. Infants demonstrate a greater sense of \u2018attachment security\u2019 and lower \u2018attachment disorganisation. Infants suckle their mother ' s breast longer than with bottles. Mothers and infants spend more time gazing at each other. Mothers are more positive and smile at their child more. Brain imaging research indicates breastfeeding mothers who listen to their infant crying demonstrate greater activity in limbic regions of the brain. This suggests the mother ' s enhanced emotional, empathetic and sensitive response to their child, which supports mother-infant bonding. Studies which do not demonstrate a significant relationship between breastfeeding and mother-infant bonding exist. For example, Britton and colleagues (2006) did not find a significant association between breastfeeding and mother-infant bonding but found that mothers displaying more sensitivity were more likely to breastfeed than bottlefeed. This suggests that the mother ' s sensitivity may have a more direct effect on mother-child bonding as more sensitive mothers are more likely to breastfeed and display greater emotional sensitivity.", "edit_actions": [{"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 211, "end_char_pos": 212}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 225, "end_char_pos": 226}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 312, "end_char_pos": 313}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 326, "end_char_pos": 327}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1177, "end_char_pos": 1178}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 1544, "end_char_pos": 1545}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2733, "end_char_pos": 2734}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 2778, "end_char_pos": 2779}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 3919, "end_char_pos": 3920}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 4057, "end_char_pos": 4058}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5419, "end_char_pos": 5420}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 5704, "end_char_pos": 5705}, {"type": "R", "before": "\u2019re", "after": "are", "start_char_pos": 5962, "end_char_pos": 5965}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 6120, "end_char_pos": 6121}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 6792, "end_char_pos": 6793}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 7115, "end_char_pos": 7116}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 7807, "end_char_pos": 7808}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 8430, "end_char_pos": 8431}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 8490, "end_char_pos": 8491}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 8822, "end_char_pos": 8823}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 9161, "end_char_pos": 9162}, {"type": "D", "before": "the", "after": null, "start_char_pos": 9548, "end_char_pos": 9551}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10182, "end_char_pos": 10183}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10432, "end_char_pos": 10433}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 10759, "end_char_pos": 10760}, {"type": "R", "before": "\u2019", "after": "'", "start_char_pos": 11245, "end_char_pos": 11246}], "sents_char_pos": [0, 110, 243, 344, 543, 776, 943, 1094, 1335, 1458, 1632, 1727, 1851, 1987, 2157, 2287, 2435, 2678, 2814, 2928, 3079, 3196, 3346, 3445, 3584, 3834, 3969, 4100, 4202, 4378, 4549, 4681, 4855, 4997, 5131, 5293, 5407, 5628, 6017, 6069, 6172, 6288, 6432, 6535, 6637, 6678, 6852, 6976, 7137, 7237, 7331, 7406, 7497, 7588, 7707, 7825, 8015, 8087, 8185, 8344, 8448, 8505, 8595, 8730, 8846, 9026, 9096, 9184, 9358, 9417, 9572, 9737, 9867, 9976, 10123, 10192, 10247, 10303, 10403, 10468, 10526, 10583, 10733, 10870, 10985, 11214]}
+{"doc_id": "63199881", "revision_depth": "2", "before_revision": "Kwagh-hir is a higher art form of kwagh-alom , an aged practice of the Tiv people where the family was treated to a storytelling session by creative storytellers, usually in the early hours of the night after the day's farming work by moonlight. The most familiar variant of the kwagh-hir according to Jonathan Fogel may be the Punch and Judy show, in which recognizable characters lampoons current political figures and events in the news while also referencing an array of cultural mores. Kwagh-hir was inscribed on the Representative List of the Intangible Cultural Heritage of Humanity in 2019 by the decision of the Intergovernmental Committee: 14.COM 10.B.27 Legend has it that Adikpo Songo from Akpagher; Mbatyav in the present day Gboko local government area of Benue State, Nigeria, was the originator of Kwagh-hir. Adikpo Songu, in an interview with Iyorwuese Hagher, a scholar of Kwagh-hir, attempted to corroborate this view held by several kwagh-hir group leaders and notable elders in Tivland. On his way back from Mkar Christian Hospital, having traveled for about 12 miles, he arrived near the Orkoor River when suddenly he heard the sound of fascinating music. As he drew closer, hiding behind bamboo reeds and watching, he saw a crowd of two groups. Their positions coincided with the direction of two clans, Mbayion and Mbatyav. A white flag was hoisted in-between the two groups which both had a band of drummers, dancing girls and puppets on dagbera (platform). He then realized that the performers were not really human beings but Adzov (spirits). The two groups seemed to be engaged in a competition which looked to him like the story-telling tradition of the Tiv known as kwagh-alom , but with a difference. In this instance, instead of a storyteller, a man would come to the centre of the arena and at the top of his voice announce to the audience what they were about to see. Then the performers would file into the area either as animals dancing or Adzov , engaged in dancing to emphasize their character. Adikpo Songu says he fell asleep watching the spectacle, and upon waking up the following morning, there was nothing in the vicinity to show that an event of such had taken place in the location. So he came to the conclusion that the Adzov must have deliberately selected him for the purpose of entrusting him with the responsibility of bringing kwagh-hir to the Tiv people, and humanity in the form and style he had been privileged to watch. According to Iyorwuese Hagher, the Tiv are not want to the personalization of artworks. The Tiv would attribute any level of excellence to witchcraft; Tsav or Adzov , who could protect the gifted from harm of other Tsav. Thus, his inquisition into the originator of the kwagh-hir may have been lost on the Tiv people. Hence they offered the leading kwagh-hir artist (Tor-Kwagh-hir ) as the originator. Hagher concluded that no one person started the kwagh-hir in its present form. However, Gowon Ama Doki avers that contemporary kwagh-hir puppet theatre owes its birth to Adikpo Songu from Mbatyav clan in Gboko area of Benue State when he held an audience spellbound with his puppets and masquerades in 1960. Nevertheless, the nexus of kwagh-hir scholars, including Doki, is that like any other theatrical performance, kwagh-hir cannot be linked to a single individual as an originator. Rather, it is a creation of the mass populace of a people, coming together to share experiences. It was in the 1960s that the extraordinary creative statement of kwagh-hir was made; combining visual, musical, creative and kinetic arts to expand the words of a story-teller into the form of whole theatre. Before kwagh-hir , the Tiv had seen another theatrical performance known as Nyambuan which was prominent between 1934 and 1939. Nyambuan literally means the meat is gone bad. It was a slogan and movement targeted at demystifying the Mbatsav (evil people). The Nyambuan performance came with intense social, political implications and sought to re-establish order through cathartic performances aimed at abolishing the Tiv exchange marriages known as yamen-ishe (roughly translated as trading value) and restoring the cultural disruptions imposed on the Tiv people by the colonial structures. The performance took the form of a celebration, with music players and dancers forming the major aspect of the performance which was based on rituals. There were massive arrests and unlawful detentions of the Nyambuan performers. Structural organization A kwagh-hir group or event is multifaceted in its structural organization. It involves the collective efforts of members who all have distinct roles to play. A typical kwagh-hir group, according to Iyorwuese Hagher, is segmented into four: the management; the performers; the musicians and the sculptors (carvers). Management Several roles have been identified in a typical kwagh-hir group involving men, women and youth. Ter kwagh-hir ( Patron ) - Gives identity to group and ensures intra group harmony. Orkyon ( Chairman of kwagh-hir group management committee) - Usually an affluent member of the community who provides resources for the welfare of the group Ordondon ( Chairman of kwagh-hir group management committee) - Assists Orkyon in the welfare of the group. Orngeren ( Secretary ) - Summons meetings and presents agenda. Also issues communiqu\u00e9s from the management to the membership Ikpanyar ( Treasurer ) - Responsible for all monies accruing to the group and disburses same accordingly. Tor Kwagh-hir ( Artistic director) - Chairperson of the management team. He coordinates the entire ensemble and is also in charge of their welfare. Torkwase ( Women 's leader) - Looks after female artists\u2019 welfare and needs during performances. Also in charge of choreography of all women dances and teaches them songs as well. Dugeri ( Warder ) - Ensures discipline and settles minor disputes between members. Tor Ikyo ( Forest guard) - Leads and guides wood carvers in the forest. Agum-a-ior ( Youths ) - Ensures the safety of visitors, guard the elements and inspire performers during productions. Performers A kwagh-hir character performs during the Benue Youth Carnival A kwagh-hir performance during the Benue Youth Carnival in Makurdi. There are several performers in a kwagh-hir group and their roles are determined by the story they intend to portray. However, the list below shows the performers found in virtually every kwagh-hir group that exists. Or shurwa (Narrator ) - Most articulate member who is responsible for rapport between the audience and the performers. He cues in the performers and fills-in breaks with witty performances. Mbakuuv (Masqueraders ) - Those behind the masks and theatrical garments. Or Iwanger (Lightening man) - In charge of lights. He carries the torch as a guide for Mbakuuv in the performance arena. Mbanyoron dagbera (Puppeteers ) - Controllers of marionettes from beneath the platform. Ortongon korough (Horn blower or timekeeper) - Times the duration of the various performances Musicians The musicians are led by the Tor Gbande (chief drummer) who is assisted by the Mue-Tor Gbande . Several other drummers form part of the band and play different types of drums known as itsorough (Tiv native snare drum), ngo gbande (Tiv native bass drum), etc. Sculptor Sculptor ( Or gban akaa ) is rarely seen during the kwagh-hir performance. However, he is the mainstay of a kwagh-hir group. In practice, he is regarded as the scriptwriter and director because he determines the rendition and aesthetics of performances. The sculptor, based on his inventiveness is hired to produce puppets and mask for a group. Theatre arena Kwagh-hir stage is divided into the main area, chorus position, backstage and auditorium. The backstage is usually the backyard of round huts. This area is strictly restricted to the kwagh-hir group members. The auditorium is the area surrounding the main arena around where the audience sits. Kwagh-hir aesthetics and cosmetics kwagh-hir masks on display in Makurdi, Benue State A kwagh-hir animated character performs during the Benue Youth Carnival Kwagh-hir aesthetics are drawn from the patterns of the Tiv culture and depicts the Tiv understanding of their life. This is projected by the use of varied design concepts that are sewn into various styles so as to connote societal activities. The masks are elaborate and reflect the versatile aesthetic background of the Tiv people. It incorporates certain Tiv social dances like Swange, Gberichul, Ihinga, Ivom, Iee, Igbe, Ibiamegh, Girinya and other comic forms. The sundry accoutrements of kwagh-hir all have a moral standpoints. The puppets are naturalistic, grotesque and even ridiculous, yet all reflecting the moral prejudices and sanctions of the Tiv society. Historical awareness is shown in some puppets which represents events such as when the first woman emerged or when modern dress styles of European design gained local acceptance. The kwagh-hir puppets possess aesthetic characteristics such as triangular noses, Nok-like eyes, small lips and triangular nostrils. The colours used in painting the puppets are vibrant, because the kwagh-hir artists use colours straight from the source. There is no deliberate attempt at creating tones, shades or tints. Costumes for the masquerade are elaborately made and are also highly coloured. A. This narration is a paraphrase of the interview Iyorwuese Hagher had with Adikpo Songu on 4 January 1978. B. This section is a sample of how some kwagh-hir groups are organized, according to Iyorwuese Hagher.", "after_revision": " is a higher art form of , an aged practice of the Tiv people where the family was treated to a storytelling session by creative storytellers, usually in the early hours of the night after the day's farming work by moonlight. The most familiar variant of the according to Jonathan Fogel may be the Punch and Judy show, in which recognizable characters lampoons current political figures and events in the news while also referencing an array of cultural mores. was inscribed on the Representative List of the Intangible Cultural Heritage of Humanity in 2019 by the decision of the Intergovernmental Committee: 14.COM 10.B.27 Legend has it that Adikpo Songo from Akpagher; Mbatyav in the present day Gboko local government area of Benue State, Nigeria, was the originator of Kwagh-hir. Adikpo Songu, in an interview with Iyorwuese Hagher, a scholar of Kwagh-hir, attempted to corroborate this view held by several group leaders and notable elders in Tivland. On his way back from Mkar Christian Hospital, having traveled for about 12 miles, he arrived near the Orkoor River when suddenly he heard the sound of fascinating music. As he drew closer, hiding behind bamboo reeds and watching, he saw a crowd of two groups. Their positions coincided with the direction of two clans, Mbayion and Mbatyav. A white flag was hoisted in-between the two groups which both had a band of drummers, dancing girls and puppets on a (platform). He then realized that the performers were not really human beings but (spirits). The two groups seemed to be engaged in a competition which looked to him like the story-telling tradition of the Tiv known as , but with a difference. In this instance, instead of a storyteller, a man would come to the centre of the arena and at the top of his voice announce to the audience what they were about to see. Then the performers would file into the area either as animals dancing or , engaged in dancing to emphasize their character. Adikpo Songu says he fell asleep watching the spectacle, and upon waking up the following morning, there was nothing in the vicinity to show that an event of such had taken place in the location. So he came to the conclusion that the must have deliberately selected him for the purpose of entrusting him with the responsibility of bringing to the Tiv people, and humanity in the form and style he had been privileged to watch. According to Iyorwuese Hagher, the Tiv are not want to the personalization of artworks. The Tiv would attribute any level of excellence to witchcraft; or , who could protect the gifted from harm of other Tsav. Thus, his inquisition into the originator of the may have been lost on the Tiv people. Hence they offered the leading artist ( ) as the originator. Hagher concluded that no one person started the in its present form. However, Gowon Ama Doki avers that contemporary puppet theatre owes its birth to Adikpo Songu from Mbatyav clan in Gboko area of Benue State when he held an audience spellbound with his puppets and masquerades in 1960. Nevertheless, the nexus of scholars, including Doki, is that like any other theatrical performance, cannot be linked to a single individual as an originator. Rather, it is a creation of the mass populace of a people, coming together to share experiences. It was in the 1960s that the extraordinary creative statement of was made; combining visual, musical, creative and kinetic arts to expand the words of a story-teller into the form of whole theatre. Before , the Tiv had seen another theatrical performance known as Nyambuan which was prominent between 1934 and 1939. Nyambuan literally means the meat is gone bad. It was a slogan and movement targeted at demystifying the Mbatsav (evil people). The Nyambuan performance came with intense social, political implications and sought to re-establish order through cathartic performances aimed at abolishing the Tiv exchange marriages known as (roughly translated as trading value) and restoring the cultural disruptions imposed on the Tiv people by the colonial structures. The performance took the form of a celebration, with music players and dancers forming the major aspect of the performance which was based on rituals. There were massive arrests and unlawful detentions of the Nyambuan performers. Structural organization A group or event is multifaceted in its structural organization. It involves the collective efforts of members who all have distinct roles to play. A typical group, according to Iyorwuese Hagher, is segmented into four: the management; the performers; the musicians and the sculptors (carvers). Management Several roles have been identified in a typical group involving men, women and youth. Ter kwagh-hir ( patron ) - Gives identity to group and ensures intra group harmony. Orkyon ( chairman of group management committee) - Usually an affluent member of the community who provides resources for the welfare of the group Ordondon ( chairman of group management committee) - Assists in the welfare of the group. Orngeren ( secretary ) - Summons meetings and presents agenda. Also issues communiqu\u00e9s from the management to the membership Ikpanyar ( treasurer ) - Responsible for all monies accruing to the group and disburses same accordingly. Tor Kwagh-hir ( artistic director) - Chairperson of the management team. He coordinates the entire ensemble and is also in charge of their welfare. Torkwase ( women 's leader) - Looks after female artists\u2019 welfare and needs during performances. Also in charge of choreography of all women dances and teaches them songs as well. Dugeri ( warder ) - Ensures discipline and settles minor disputes between members. Tor Ikyo ( forest guard) - Leads and guides wood carvers in the forest. Agum-a-ior ( youths ) - Ensures the safety of visitors, guard the elements and inspire performers during productions. Performers A kwagh-hir character performs during the Benue Youth Carnival A kwagh-hir performance during the Benue Youth Carnival in Makurdi. There are several performers in a group and their roles are determined by the story they intend to portray. However, the list below shows the performers found in virtually every group that exists. (narrator ) - Most articulate member who is responsible for rapport between the audience and the performers. He cues in the performers and fills-in breaks with witty performances. (masqueraders ) - Those behind the masks and theatrical garments. (lighting man) - In charge of lights. He carries the torch as a guide for in the performance arena. (puppeteers ) - Controllers of marionettes from beneath the platform. (horn blower or timekeeper) - Times the duration of the various performances Musicians The musicians are led by the (chief drummer) who is assisted by the . Several other drummers form part of the band and play different types of drums known as (Tiv native snare drum), (Tiv native bass drum), etc. Sculptor Sculptor ( ) is rarely seen during the performance. However, he is the mainstay of a group. In practice, he is regarded as the scriptwriter and director because he determines the rendition and aesthetics of performances. The sculptor, based on his inventiveness is hired to produce puppets and mask for a group. Theatre arena stage is divided into the main area, chorus position, backstage and auditorium. The backstage is usually the backyard of round huts. This area is strictly restricted to the group members. The auditorium is the area surrounding the main arena around where the audience sits. Kwagh-hir aesthetics and cosmetics kwagh-hir masks on display in Makurdi, Benue State A kwagh-hir animated character performs during the Benue Youth Carnival aesthetics are drawn from the patterns of the Tiv culture and depicts the Tiv understanding of their life. This is projected by the use of varied design concepts that are sewn into various styles so as to connote societal activities. The masks are elaborate and reflect the versatile aesthetic background of the Tiv people. It incorporates certain Tiv social dances like , , , , , , , and other comic forms. The sundry accoutrements of all have a moral standpoints. The puppets are naturalistic, grotesque and even ridiculous, yet all reflecting the moral prejudices and sanctions of the Tiv society. Historical awareness is shown in some puppets which represents events such as when the first woman emerged or when modern dress styles of European design gained local acceptance. The puppets possess aesthetic characteristics such as triangular noses, Nok-like eyes, small lips and triangular nostrils. The colours used in painting the puppets are vibrant, because the artists use colours straight from the source. There is no deliberate attempt at creating tones, shades or tints. Costumes for the masquerade are elaborately made and are also highly coloured. A. This narration is a paraphrase of the interview Iyorwuese Hagher had with Adikpo Songu on 4 January 1978. B. This section is a sample of how some groups are organized, according to Iyorwuese Hagher.", "edit_actions": [{"type": "D", "before": "Kwagh-hir", "after": null, "start_char_pos": 0, "end_char_pos": 9}, {"type": "D", "before": "kwagh-alom", "after": null, "start_char_pos": 34, "end_char_pos": 44}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 279, "end_char_pos": 288}, {"type": "D", "before": "Kwagh-hir", "after": null, "start_char_pos": 491, "end_char_pos": 500}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 953, "end_char_pos": 962}, {"type": "R", "before": "dagbera", "after": "a", "start_char_pos": 1463, "end_char_pos": 1470}, {"type": "D", "before": "Adzov", "after": null, "start_char_pos": 1553, "end_char_pos": 1558}, {"type": "D", "before": "kwagh-alom", "after": null, "start_char_pos": 1696, "end_char_pos": 1706}, {"type": "D", "before": "Adzov", "after": null, "start_char_pos": 1976, "end_char_pos": 1981}, {"type": "D", "before": "Adzov", "after": null, "start_char_pos": 2267, "end_char_pos": 2272}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 2379, "end_char_pos": 2388}, {"type": "R", "before": "Tsav or Adzov", "after": "or", "start_char_pos": 2627, "end_char_pos": 2640}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 2746, "end_char_pos": 2755}, {"type": "R", "before": "kwagh-hir artist (Tor-Kwagh-hir", "after": "artist (", "start_char_pos": 2825, "end_char_pos": 2856}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 2926, "end_char_pos": 2935}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 3005, "end_char_pos": 3014}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 3213, "end_char_pos": 3222}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 3296, "end_char_pos": 3305}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 3526, "end_char_pos": 3535}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 3676, "end_char_pos": 3685}, {"type": "D", "before": "yamen-ishe", "after": null, "start_char_pos": 4119, "end_char_pos": 4129}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 4517, "end_char_pos": 4526}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 4683, "end_char_pos": 4692}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 4889, "end_char_pos": 4898}, {"type": "R", "before": "Patron", "after": "patron", "start_char_pos": 4953, "end_char_pos": 4959}, {"type": "R", "before": "Chairman of kwagh-hir", "after": "chairman of", "start_char_pos": 5030, "end_char_pos": 5051}, {"type": "R", "before": "Chairman of kwagh-hir", "after": "chairman of", "start_char_pos": 5189, "end_char_pos": 5210}, {"type": "D", "before": "Orkyon", "after": null, "start_char_pos": 5249, "end_char_pos": 5255}, {"type": "R", "before": "Secretary", "after": "secretary", "start_char_pos": 5296, "end_char_pos": 5305}, {"type": "R", "before": "Treasurer", "after": "treasurer", "start_char_pos": 5421, "end_char_pos": 5430}, {"type": "R", "before": "Artistic", "after": "artistic", "start_char_pos": 5532, "end_char_pos": 5540}, {"type": "R", "before": "Women", "after": "women", "start_char_pos": 5675, "end_char_pos": 5680}, {"type": "R", "before": "Warder", "after": "warder", "start_char_pos": 5853, "end_char_pos": 5859}, {"type": "R", "before": "Forest", "after": "forest", "start_char_pos": 5938, "end_char_pos": 5944}, {"type": "R", "before": "Youths", "after": "youths", "start_char_pos": 6012, "end_char_pos": 6018}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 6293, "end_char_pos": 6302}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 6447, "end_char_pos": 6456}, {"type": "R", "before": "Or shurwa (Narrator", "after": "(narrator", "start_char_pos": 6476, "end_char_pos": 6495}, {"type": "R", "before": "Mbakuuv (Masqueraders", "after": "(masqueraders", "start_char_pos": 6666, "end_char_pos": 6687}, {"type": "R", "before": "Or Iwanger (Lightening", "after": "(lighting", "start_char_pos": 6740, "end_char_pos": 6762}, {"type": "D", "before": "Mbakuuv", "after": null, "start_char_pos": 6827, "end_char_pos": 6834}, {"type": "R", "before": "Mbanyoron dagbera (Puppeteers", "after": "(puppeteers", "start_char_pos": 6861, "end_char_pos": 6890}, {"type": "R", "before": "Ortongon korough (Horn", "after": "(horn", "start_char_pos": 6949, "end_char_pos": 6971}, {"type": "D", "before": "Tor Gbande", "after": null, "start_char_pos": 7082, "end_char_pos": 7092}, {"type": "D", "before": "Mue-Tor Gbande", "after": null, "start_char_pos": 7132, "end_char_pos": 7146}, {"type": "D", "before": "itsorough", "after": null, "start_char_pos": 7237, "end_char_pos": 7246}, {"type": "D", "before": "ngo gbande", "after": null, "start_char_pos": 7272, "end_char_pos": 7282}, {"type": "D", "before": "Or gban akaa", "after": null, "start_char_pos": 7332, "end_char_pos": 7344}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 7373, "end_char_pos": 7382}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 7429, "end_char_pos": 7438}, {"type": "D", "before": "Kwagh-hir", "after": null, "start_char_pos": 7680, "end_char_pos": 7689}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 7863, "end_char_pos": 7872}, {"type": "D", "before": "Kwagh-hir", "after": null, "start_char_pos": 8132, "end_char_pos": 8141}, {"type": "R", "before": "Swange, Gberichul, Ihinga, Ivom, Iee, Igbe, Ibiamegh, Girinya", "after": ", , , , , , ,", "start_char_pos": 8513, "end_char_pos": 8574}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 8626, "end_char_pos": 8635}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 8984, "end_char_pos": 8993}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 9179, "end_char_pos": 9188}, {"type": "D", "before": "kwagh-hir", "after": null, "start_char_pos": 9530, "end_char_pos": 9539}], "sents_char_pos": [0, 245, 490, 653, 711, 824, 1007, 1177, 1267, 1347, 1482, 1569, 1731, 1901, 2032, 2228, 2475, 2563, 2626, 2696, 2793, 2877, 2956, 3185, 3363, 3460, 3545, 3668, 3796, 3843, 3924, 4260, 4411, 4490, 4589, 4672, 4770, 4786, 4829, 4936, 5020, 5284, 5347, 5515, 5588, 5663, 5760, 5843, 5926, 5998, 6116, 6258, 6376, 6475, 6594, 6665, 6739, 6790, 6860, 6948, 7148, 7311, 7395, 7445, 7574, 7665, 7769, 7822, 7887, 7973, 8248, 8375, 8465, 8597, 8665, 8800, 8979, 9112, 9234, 9301, 9380, 9489]}
+{"doc_id": "63236639", "revision_depth": "1", "before_revision": "Salatul Tasbih (\u0635\u0644\u0627\u0629 \u062a\u0633\u0628\u064a\u062d) is better known as Tasbih's Salat. Here, Tasbih means \"Subhanallahi wal Hamdulillahi, wala Ilaha Illallahu, wallahu Akbar\". In which salat those tasbihs are read, that kind of salat is known as Salatul Tasbih. It is not like the mandatory five period of salats, but a special kind of salat. Muhammad advised his Ummahs to pray this salat for at least one time in their life. Way to perform Salatut Tasbih%DIFDELCMD < %DIFDELCMD < %%% This special salat consists of four rakats.which are performed the same way as the other usual rakats, but the only difference is that this salat has 300 tasbihs in it. Which are performed the same way as the usual rakats but the only difference is to recite 75 tasbihs per rakat that is 300 tasbihs in total.%DIFDELCMD < %DIFDELCMD < %%% Actual steps to perform the Salatut Tasbih 1) Once you stand for this special Salah,%DIFDELCMD < %DIFDELCMD < %%% and after reciting the Sana( \u0633\u064f\u0628\u0652\u0640\u062d\u0627\u0646\u064e\u0643\u064e \u0627\u0644\u0644\u0651\u0647\u064f\u0640\u0645\u064e\u0651 \u0648\u064e\u0628\u0650\u062d\u064e\u0645\u0652\u0640\u062f\u0650\u0643\u064e\u064e \u0648\u064e\u062a\u064e\u0628\u0627\u0631\u064e\u0643\u064e \u0627\u0633\u0652\u0645\u064f\u0640\u0643\u064e \u0648\u064e\u062a\u064e\u0639\u0640\u0627\u0644\u0649 \u062c\u064e\u0640\u062f\u064f\u0651\u0643\u064e \u0648\u064e\u0644\u0627 \u0625\u0650\u0644\u0647\u064e \u063a\u064e\u064a\u0652\u0631\u064f\u0643)%DIFDELCMD < %DIFDELCMD < %%% recite this tasbih (Subhanallahi wal Hamdulillahii, wala Ilaha Illallahu,%DIFDELCMD < %DIFDELCMD < %%% wallahuu Akbar) 15 times 2) After reciting Surah Fatiha and some%DIFDELCMD < %DIFDELCMD < %%% other Surah, recite this tasbih 10 times%DIFDELCMD < %DIFDELCMD < %%% 3) During Rukuh, after saying prescribed glorifications (subhana rabal azeem),%DIFDELCMD < %DIFDELCMD < %%% recite the tasbih 10 times 4) After standing up from Rukuh, recite the%DIFDELCMD < %DIFDELCMD < %%% tasbih 10 times 5) In the first Sajda after glorifications%DIFDELCMD < %DIFDELCMD < %%% (subhana rabal aala), recite the tasbihh 10 times%DIFDELCMD < %DIFDELCMD < %%% 6) In the Jalsa (time between the Sajda) recite the tasbih 10 times%DIFDELCMD < %DIFDELCMD < %%% 7) Again recite the tasbih 10 times in the second sajdah%DIFDELCMD < %DIFDELCMD < %%% Repeat the same thing in 2nd 3rd and 4th rakat in exactly the same way as in first one. Counting of tasbihs in one ratat = (15+10+10+10+10+10+10)= 75%DIFDELCMD < %DIFDELCMD < %%% In four rakats = 75*4 = 300", "after_revision": " %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% This entire Salah is a complete fabrication according to sheik Al bani and weak according to majority of the scholars.", "edit_actions": [{"type": "D", "before": "Salatul Tasbih (\u0635\u0644\u0627\u0629 \u062a\u0633\u0628\u064a\u062d) is better known as Tasbih's Salat. Here, Tasbih means \"Subhanallahi wal Hamdulillahi, wala Ilaha Illallahu, wallahu Akbar\". In which salat those tasbihs are read, that kind of salat is known as Salatul Tasbih. It is not like the mandatory five period of salats, but a special kind of salat. Muhammad advised his Ummahs to pray this salat for at least one time in their life.", "after": null, "start_char_pos": 0, "end_char_pos": 402}, {"type": "D", "before": "Way to perform Salatut Tasbih", "after": null, "start_char_pos": 403, "end_char_pos": 432}, {"type": "D", "before": "This special salat consists of four rakats.which are performed the same way as the other usual rakats, but the only difference is that this salat has 300 tasbihs in it.", "after": null, "start_char_pos": 462, "end_char_pos": 630}, {"type": "D", "before": "Which are performed the same way as the usual rakats but the only difference is to recite 75 tasbihs per rakat that is 300 tasbihs in total.", "after": null, "start_char_pos": 631, "end_char_pos": 771}, {"type": "D", "before": "Actual steps to perform the Salatut Tasbih", "after": null, "start_char_pos": 801, "end_char_pos": 843}, {"type": "D", "before": "1) Once you stand for this special Salah,", "after": null, "start_char_pos": 844, "end_char_pos": 885}, {"type": "D", "before": "and after reciting the Sana( \u0633\u064f\u0628\u0652\u0640\u062d\u0627\u0646\u064e\u0643\u064e \u0627\u0644\u0644\u0651\u0647\u064f\u0640\u0645\u064e\u0651", "after": null, "start_char_pos": 915, "end_char_pos": 966}, {"type": "D", "before": "\u0648\u064e\u0628\u0650\u062d\u064e\u0645\u0652\u0640\u062f\u0650\u0643\u064e\u064e \u0648\u064e\u062a\u064e\u0628\u0627\u0631\u064e\u0643\u064e \u0627\u0633\u0652\u0645\u064f\u0640\u0643\u064e \u0648\u064e\u062a\u064e\u0639\u0640\u0627\u0644\u0649 \u062c\u064e\u0640\u062f\u064f\u0651\u0643\u064e \u0648\u064e\u0644\u0627 \u0625\u0650\u0644\u0647\u064e \u063a\u064e\u064a\u0652\u0631\u064f\u0643)", "after": null, "start_char_pos": 967, "end_char_pos": 1040}, {"type": "D", "before": "recite this tasbih (Subhanallahi wal", "after": null, "start_char_pos": 1070, "end_char_pos": 1106}, {"type": "D", "before": "Hamdulillahii, wala Ilaha Illallahu,", "after": null, "start_char_pos": 1107, "end_char_pos": 1143}, {"type": "D", "before": "wallahuu Akbar) 15 times", "after": null, "start_char_pos": 1173, "end_char_pos": 1197}, {"type": "D", "before": "2) After reciting Surah Fatiha and some", "after": null, "start_char_pos": 1198, "end_char_pos": 1237}, {"type": "D", "before": "other Surah, recite this", "after": null, "start_char_pos": 1267, "end_char_pos": 1291}, {"type": "D", "before": "tasbih 10 times", "after": null, "start_char_pos": 1292, "end_char_pos": 1307}, {"type": "D", "before": "3) During Rukuh, after saying prescribed", "after": null, "start_char_pos": 1337, "end_char_pos": 1377}, {"type": "D", "before": "glorifications (subhana rabal azeem),", "after": null, "start_char_pos": 1378, "end_char_pos": 1415}, {"type": "D", "before": "recite the tasbih 10 times", "after": null, "start_char_pos": 1445, "end_char_pos": 1471}, {"type": "D", "before": "4) After standing up from Rukuh, recite the", "after": null, "start_char_pos": 1472, "end_char_pos": 1515}, {"type": "D", "before": "tasbih 10 times", "after": null, "start_char_pos": 1545, "end_char_pos": 1560}, {"type": "D", "before": "5) In the first Sajda after glorifications", "after": null, "start_char_pos": 1561, "end_char_pos": 1603}, {"type": "D", "before": "(subhana rabal aala), recite the", "after": null, "start_char_pos": 1633, "end_char_pos": 1665}, {"type": "D", "before": "tasbihh 10 times", "after": null, "start_char_pos": 1666, "end_char_pos": 1682}, {"type": "D", "before": "6) In the Jalsa (time between the Sajda)", "after": null, "start_char_pos": 1712, "end_char_pos": 1752}, {"type": "D", "before": "recite the tasbih 10 times", "after": null, "start_char_pos": 1753, "end_char_pos": 1779}, {"type": "D", "before": "7) Again recite the tasbih 10 times in the", "after": null, "start_char_pos": 1809, "end_char_pos": 1851}, {"type": "D", "before": "second sajdah", "after": null, "start_char_pos": 1852, "end_char_pos": 1865}, {"type": "D", "before": "Repeat the same thing in 2nd 3rd and 4th rakat in exactly the same way as in first one.", "after": null, "start_char_pos": 1895, "end_char_pos": 1982}, {"type": "D", "before": "Counting of tasbihs in one ratat = (15+10+10+10+10+10+10)= 75", "after": null, "start_char_pos": 1983, "end_char_pos": 2044}, {"type": "R", "before": "In four rakats = 75*4 = 300", "after": "This entire Salah is a complete fabrication according to sheik Al bani and weak according to majority of the scholars.", "start_char_pos": 2074, "end_char_pos": 2101}], "sents_char_pos": [0, 62, 151, 237, 318, 402, 630, 771, 846, 1188, 1200, 1339, 1474, 1563, 1982]}
+{"doc_id": "63310102", "revision_depth": "2", "before_revision": "Futures of Education is a global initiative led by UNESCO (United Nation Educational, Scientific and Cultural Organization) , aiming to rethink and shape the future of education. The project was launched in 2019 to mobilize collective intelligence, generate debate and reimagine how education can contribute to the common good of humanity. Context Due to accelerated climate change the fragility of the planet is becoming more apparent , inequalities, social fragmentation, and political extremism are bringing many societies to a point of crisis. Advances in Digital Communication, artificial intelligence, and biotechnology have potential but raises ethical and governance concerns, especially as innovation and technological change have an uneven record of contributing to human development. The Futures of Education aims to re-imagine how knowledge and learning can shape the future of humanity and the planet, given the challenges which they are currently facing. Rethinking the role of education Learning and knowledge are tools that can help inspire possible futures of humanity and of the planet. The challenges of today 's world require innovative solutions beyond established sectoral approaches and disciplinary boundaries to re-purpose education for the future. Culture and the environment The stability of the planet could be enabled through the mobilization of education, and the diversity of knowledge, customs and culture. Research suggests that embedding a deep attachment to landscapes and tangible heritage instils a sense of care for the world, that the study, preservation and appreciation of diverse languages, knowledge and customs enrich the collective consciousness through an understanding of the relations between past, present and future societies. Education plays a role to include sustainability studies as a means of driving planetary survival. Earth science and environment studies enable learners and communities to become more cognizant of the world they inhabit and leave behind . A \u2018community of knowledge\u2019 is one in which the responsibility of being a \u2018knowledge keeper\u2019 is returned to everyone. This paradigm shifts the focus from the perspective of \u2018stakeholder\u2019 and changes the way of contributing to knowledge, aiming to achieve sustainable development. The future of education supports the cognitive practices of the groups and communities that recreate the values of their landscapes through the practices of cultural appreciation and symbolic recognition of places. Responsible citizenship Education plays a role in the socialising process to build equitable and sustainable societies. School curricula that include philosophy, human rights, visual learning, socio-emotional competencies, media literacy and the humanities studies are key to inclusivity and social justice. Global citizenship education and Education for Justice fosters a future generation that is conscious of the need for planetary sustainability and focused on solving global challenges, including food shortage and planetary health. Learning systems Rethinking learning systems can foster inclusive and social cohesion. For example, cross-cutting digital and physical spaces facilitate the sharing of knowledge. Such collaborative learning spaces are a means to explore mathematics and art education while fostering collective imagination. Rethinking and adopting new internationalized learning systems will cultivate a culture of responsible citizenship and equity that legitimizes different ways of knowing, particularly those that lie outside of traditional Western paradigms. Science, technology and innovation With artificial intelligence, technology is increasingly involved in education. New digital competencies and media literacies call for a gender transformative approach (promoting gender equality, sharing control of resources and decision-making and women's empowerment ) to the digitization and use of artificial intelligence (AI). Unlocking digital barriers through open educational resources enables global online learning and facilitate Education For All. Media and communication students will require ethics courses to establish their critical thinking skills and training. This will be crucial in a \u2018fake news\u2019 era when trust in media professionals is being eroded, especially when news and documentary production is impacted by the capacity of AI to manufacture authentic-looking \u2018fake\u2019 material. For instance, researchers at the University of Washington have created algorithms based on hours of video footage and audio recordings to create realistic lip-synced videos of Barack Obama. Knowledge and transformation Envisioning the futures of education through transforming how people view education and the role of learning institutions in fostering change. Teaching of futures literacy can prepare learners to become more open and ready to face an unknown future. Reimagining the possibilities of Vocational education and training fulfills human needs and reaches beyond industrial work and the provision of income. Lifelong counseling supports people in their careers and personal endeavours so they can become constructive agents of their own reality. UNESCO's initiative UNESCO's Futures of Education initiative mobilizes the many ways of being and knowing to leverage humanity's collective intelligence. It relies on a consultative process that involves youth , educators, civil society, governments, business and other stakeholders. The mobilization and contribution of the network of UNITWIN/UNESCO Chairs is a key part of the process of engagement. The work is being guided by a high-level International Commission of leaders from diverse fields and different regions of the world. In November 2021, the commission plans to publish a report designed to share how education and learning can enable individuals to become what they want to become.", "after_revision": "Futures of Education is a global initiative led by UNESCO (United Nation Educational, Scientific and Cultural Organization) which aims to rethink and shape the future of education. The project was launched in 2019 to mobilize collective intelligence, generate debate and reimagine how education can contribute to the common good of humanity. Context Due to accelerated climate change the fragility of Earth is becoming more apparent . Inequalities, social fragmentation, and political extremism are bringing many societies to a point of crisis. Advances in Digital Communication, artificial intelligence, and biotechnology have potential but raise ethical and governance concerns, especially as innovation and technological change have an uneven record of contributing to human development. The Futures of Education aims to re-imagine how knowledge and learning can shape the future of humanity and the planet, given the challenges which they are currently facing. Rethinking the role of education Learning and knowledge are tools that can help inspire possible different futures for humanity and of the planet. The challenges of today may require innovative solutions beyond established sectoral approaches and disciplinary boundaries to re-purpose education for the future. Culture and the environment The stability of the planet could be assisted through the mobilization of education, and the diversification of knowledge, customs and culture. Research suggests that embedding a deep attachment to landscapes and tangible heritage instils a sense of care for the world, and that the study, preservation and appreciation of diverse languages, knowledge and customs enrich human collective consciousness through an understanding of the relations between past, present and future societies. Education plays a role by including sustainability studies as a means of promoting planetary survival. Earth science and environment studies enable learners and communities to become more cognizant of the world they inhabit and leave behind them . A \u2018community of knowledge\u2019 is one in which the responsibility of being a \u2018knowledge keeper\u2019 is for everyone. This paradigm shifts the focus from the perspective of \u2018stakeholder\u2019 and changes the way of contributing to knowledge, aiming to achieve sustainable development. The future of education may be to support the cognitive practices of the groups and communities which recreate the values of their environment through the practices of cultural appreciation and symbolic recognition of places. Responsible citizenship Education plays a role in the socialising process to build equitable and sustainable societies. School curricula that include philosophy, human rights, visual learning, socio-emotional competencies, media literacy and the humanities are said to be key to inclusivity and social justice. Global citizenship education aims to foster a future generation that is conscious of the need for planetary sustainability and focused on solving global challenges, including food shortage and planetary health. Learning systems Rethinking learning systems can foster inclusive and social cohesion. For example, cross-cutting digital and physical spaces facilitate the sharing of knowledge. Such collaborative learning spaces are a means to explore mathematics and art education while fostering collective imagination. Rethinking and adopting new internationalized learning systems is intended to cultivate a culture of responsible citizenship that legitimizes different ways of knowing, particularly those that lie outside of traditional Western paradigms. Science, technology and innovation With artificial intelligence, technology is increasingly involved in education. New digital competencies and media literacies call for a gender transformative approach (promoting gender equality, sharing control of resources and decision-making , and women's empowerment in digitization and use of artificial intelligence (AI). Unlocking digital barriers through open educational resources enables global online learning and facilitate Education For All. Media and communication students would require ethics courses to establish their critical thinking skills and training. This is seen as being crucial in a \u2018fake news\u2019 era when trust in media professionals is being eroded, especially when news and documentary production is impacted by the capacity of artificial intelligence to manufacture authentic-looking \u2018fake\u2019 material. For instance, researchers at the University of Washington have created algorithms based on hours of video footage and audio recordings to create realistic lip-synced videos of Barack Obama. UNESCO's initiative UNESCO's Futures of Education initiative is intended to mobilize the many ways of being and knowing to leverage humanity's collective intelligence. It relies on a consultative process that involves young people , educators, civil society, governments, business and other stakeholders. The mobilization and contribution of the network of UNITWIN/UNESCO Chairs is a key part of the process of engagement. The work is being guided by a high-level International Commission of leaders from diverse fields and different regions of the world. The commission plans to publish a report in November 2021 designed to show how education and learning can enable individuals to become what they want to become.", "edit_actions": [{"type": "R", "before": ", aiming", "after": "which aims", "start_char_pos": 124, "end_char_pos": 132}, {"type": "R", "before": "the planet", "after": "Earth", "start_char_pos": 399, "end_char_pos": 409}, {"type": "R", "before": ", inequalities,", "after": ". Inequalities,", "start_char_pos": 436, "end_char_pos": 451}, {"type": "R", "before": "raises", "after": "raise", "start_char_pos": 645, "end_char_pos": 651}, {"type": "R", "before": "futures of", "after": "different futures for", "start_char_pos": 1066, "end_char_pos": 1076}, {"type": "R", "before": "'s world", "after": "may", "start_char_pos": 1129, "end_char_pos": 1137}, {"type": "R", "before": "enabled", "after": "assisted", "start_char_pos": 1339, "end_char_pos": 1346}, {"type": "R", "before": "diversity", "after": "diversification", "start_char_pos": 1394, "end_char_pos": 1403}, {"type": "A", "before": null, "after": "and", "start_char_pos": 1565, "end_char_pos": 1565}, {"type": "R", "before": "the", "after": "human", "start_char_pos": 1663, "end_char_pos": 1666}, {"type": "R", "before": "to include", "after": "by including", "start_char_pos": 1801, "end_char_pos": 1811}, {"type": "R", "before": "driving", "after": "promoting", "start_char_pos": 1849, "end_char_pos": 1856}, {"type": "A", "before": null, "after": "them", "start_char_pos": 2015, "end_char_pos": 2015}, {"type": "R", "before": "returned to", "after": "for", "start_char_pos": 2113, "end_char_pos": 2124}, {"type": "R", "before": "supports", "after": "may be to support", "start_char_pos": 2321, "end_char_pos": 2329}, {"type": "R", "before": "that", "after": "which", "start_char_pos": 2384, "end_char_pos": 2388}, {"type": "R", "before": "landscapes", "after": "environment", "start_char_pos": 2418, "end_char_pos": 2428}, {"type": "R", "before": "studies are", "after": "are said to be", "start_char_pos": 2769, "end_char_pos": 2780}, {"type": "R", "before": "and Education for Justice fosters", "after": "aims to foster", "start_char_pos": 2849, "end_char_pos": 2882}, {"type": "R", "before": "will", "after": "is intended to", "start_char_pos": 3420, "end_char_pos": 3424}, {"type": "D", "before": "and equity", "after": null, "start_char_pos": 3472, "end_char_pos": 3482}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3877, "end_char_pos": 3877}, {"type": "R", "before": ") to the", "after": "in", "start_char_pos": 3902, "end_char_pos": 3910}, {"type": "R", "before": "will", "after": "would", "start_char_pos": 4125, "end_char_pos": 4129}, {"type": "R", "before": "will be", "after": "is seen as being", "start_char_pos": 4216, "end_char_pos": 4223}, {"type": "R", "before": "AI", "after": "artificial intelligence", "start_char_pos": 4383, "end_char_pos": 4385}, {"type": "D", "before": "Knowledge and transformation Envisioning the futures of education through transforming how people view education and the role of learning institutions in fostering change. Teaching of futures literacy can prepare learners to become more open and ready to face an unknown future. Reimagining the possibilities of Vocational education and training fulfills human needs and reaches beyond industrial work and the provision of income. Lifelong counseling supports people in their careers and personal endeavours so they can become constructive agents of their own reality.", "after": null, "start_char_pos": 4626, "end_char_pos": 5194}, {"type": "R", "before": "mobilizes", "after": "is intended to mobilize", "start_char_pos": 5256, "end_char_pos": 5265}, {"type": "R", "before": "youth", "after": "young people", "start_char_pos": 5399, "end_char_pos": 5404}, {"type": "R", "before": "In November 2021, the", "after": "The", "start_char_pos": 5730, "end_char_pos": 5751}, {"type": "R", "before": "designed to share", "after": "in November 2021 designed to show", "start_char_pos": 5789, "end_char_pos": 5806}], "sents_char_pos": [0, 178, 339, 547, 794, 968, 1104, 1273, 1438, 1777, 1876, 2017, 2134, 2296, 2511, 2631, 2819, 3049, 3136, 3228, 3356, 3596, 3711, 3964, 4091, 4210, 4435, 4625, 4797, 4904, 5056, 5194, 5348, 5478, 5596, 5729]}
+{"doc_id": "63526", "revision_depth": "1", "before_revision": "Miscellaneous Coeliac disease has been linked with a number of conditions. In many cases, it is unclear whether the gluten-induced bowel disease is a causative factor or whether these conditions share a common predisposition. Pathophysiology Coeliac disease appears to be multifactorial, both in that more than one genetic factor can cause the disease , and in that more than one factor is necessary for the disease to manifest in a person. There are seven HLA-DQ variants (DQ2 and DQ4\u2013DQ9). Over 95\\% of people with coeliac have the isoform of DQ2 or DQ8, which is inherited in families. The reason these genes produce an increase in risk of coeliac disease is that the receptors formed by these genes bind to gliadin peptides more tightly than other forms of the antigen-presenting receptor. Therefore, these forms of the receptor are more likely to activate T lymphocytes and initiate the autoimmune process. Some individuals inherit DQ2.5 from one parent and an additional portion of the haplotype (either DQB1*02 or DQA1*05) from the other parent, increasing risk. Less commonly, some individuals inherit the DQA1*05 allele from one parent and the DQB1*02 from the other parent (DQ2.5trans) (called a trans-haplotype association), and these individuals are at similar risk for coeliac disease as those with a single DQ2.5-bearing chromosome 6, but in this instance disease tends not to be familial. Among the 6\\% of European coeliacs that do not have DQ2.5 (cis or trans) or DQ8 (encoded by the haplotype DQA1*03:DQB1*0302), 4\\% have the DQ2.2 isoform, and the remaining 2\\% lack DQ2 or DQ8. 250px|Illustration of deamidated \u03b1-2 gliadin's 33mer, amino acids 56\u201388, showing the overlapping of three varieties of T-cell epitope Membrane leaking permits peptides of gliadin that stimulate two levels of immune response: the innate response, and the adaptive (T-helper cell mediated ) response. One protease-resistant peptide from \u03b1-gliadin contains a region that stimulates lymphocytes and results in the release of interleukin-15. This innate response to gliadin results in immune-system signalling that attracts inflammatory cells and increases the release of inflammatory chemicals. The strongest and most common adaptive response to gliadin is directed toward an \u03b12-gliadin fragment of 33 amino acids in length. Indeed, earlier studies of rotavirus damage in the gut showed this causes a villous atrophy. This suggests that viral proteins may take part in the initial flattening and stimulate self-crossreactive anti-VP7 production. Antibodies to VP7 may also slow healing until the gliadin-mediated tTG presentation provides a second source of crossreactive antibodies. Alternative causes of this tissue damage have been proposed and involve release of interleukin 15 and activation of the innate immune system by a shorter gluten peptide (p31\u201343/49). This would trigger killing of enterocytes by lymphocytes in the epithelium. The villous atrophy seen on biopsy may also be due to unrelated causes, such as tropical sprue, giardiasis and radiation enteritis. While positive serology and typical biopsy are highly suggestive of coeliac disease, lack of response to diet may require these alternative diagnoses to be considered. There are several tests that can be used. The level of symptoms may determine the order of the tests, but all tests lose their usefulness if the person is already eating a gluten-free diet. Intestinal damage begins to heal within weeks of gluten being removed from the diet, and antibody levels decline over months. For those who have already started on a gluten-free diet, it may be necessary to perform a rechallenge with some gluten-containing food in one meal a day over 6 weeks before repeating the investigations. Blood tests Immunofluorescence staining pattern of endomysial antibodies on a monkey oesophagus tissue sample. Serological blood tests are the first-line investigation required to make a diagnosis of coeliac disease. Its sensitivity correlates with the degree of histological lesions. People who present minor damage of the small intestine may have seronegative findings so many patients with coeliac disease often are missed. In patients with villous atrophy, anti-endomysial (EMA) antibodies of the immunoglobulin A (IgA) type can detect coeliac disease with a sensitivity and specificity of 90\\% and 99\\%, respectively. Serology for anti-transglutaminase antibodies (anti-tTG) was initially reported to have a higher sensitivity (99\\%) and specificity (>90\\%). However, it is now thought to have similar characteristics to anti-endomysial antibody . Both anti-transglutaminase and anti-endomysial antibodies have high sensitivity to diagnose people with classic symptoms and complete villous atrophy, but they are only found in 30\u201389\\% of the cases with partial villous atrophy and in less than 50\\% of the people who have minor mucosal lesions (duodenal lymphocytosis) with normal villi. Endoscopy Endoscopic still of duodenum of person with coeliac disease showing scalloping of folds and \"cracked-mud\" appearance to mucosa Schematic of the Marsh classification of upper jejunal pathology in coeliac disease. An upper endoscopy with biopsy of the duodenum (beyond the duodenal bulb) or jejunum is performed to obtain multiple samples (four to eight) from the duodenum. Not all areas may be equally affected; if biopsies are taken from healthy bowel tissue, the result would be a false negative. Even in the same bioptic fragment, different degrees of damage may be present. Most people with coeliac disease have a small intestine that appears to be normal on endoscopy before the biopsies are examined. However, five findings have been associated with a high specificity for coeliac disease: scalloping of the small bowel folds (pictured), paucity in the folds, a mosaic pattern to the mucosa (described as a \"cracked-mud\" appearance), prominence of the submucosa blood vessels, and a nodular pattern to the mucosa. Capsule endoscopy (CE) allows identification of typical mucosal changes observed in coeliac disease but has a lower sensitivity compared to regular endoscopy and histology. CE is therefore not the primary diagnostic tool for coeliac disease. However, CE can be used for diagnosing T-cell lymphoma, ulcerative jejunoileitis and adenocarcinoma in refractory or complicated coeliac disease. Pathology The classic pathology changes of coeliac disease in the small bowel are categorised by the \"Marsh classification\": Marsh stage 0: normal mucosa Marsh stage 1: increased number of intra-epithelial lymphocytes (IELs), usually exceeding 20 per 100 enterocytes Marsh stage 2: proliferation of the crypts of Lieberk\u00fchn Marsh stage 3: partial or complete villous atrophy and crypt hypertrophy Marsh stage 4: hypoplasia of the small intestine architecture The changes classically improve or reverse after gluten is removed from the diet. However, most guidelines do not recommend a repeat biopsy unless there is no improvement in the symptoms on diet. In some cases, a deliberate gluten challenge, followed by biopsy, may be conducted to confirm or refute the diagnosis. A normal biopsy and normal serology after challenge indicates the diagnosis may have been incorrect. Osteopenia and osteoporosis, mildly and severely reduced bone mineral density, are often present in people with coeliac disease, and investigations to measure bone density may be performed at diagnosis, such as dual-energy X-ray absorptiometry (DXA) scanning, to identify risk of fracture and need for bone protection medication. Serology has been proposed as a screening measure, because the presence of antibodies would detect some previously undiagnosed cases of coeliac disease and prevent its complications in those people. However, serologic tests have high sensitivity only in people with total villous atrophy and have very low ability to detect cases with partial villous atrophy or minor intestinal lesions. Testing for coeliac disease may be offered to those with commonly associated conditions. Humans first started to cultivate grains in the Neolithic period (beginning about 9500 BCE) in the Fertile Crescent in Western Asia, and it is likelythat coeliac disease did not occur before this time. Aretaeus of Cappadocia, living in the second century in the same area, recorded a malabsorptive syndrome with chronic diarrhoea, causing a debilitation of the whole body. His \"C\u0153liac Affection\" (coeliac from Greek \u03ba\u03bf\u03b9\u03bb\u03b9\u03b1\u03ba\u03cc\u03c2 koiliakos, \"abdominal\") gained the attention of Western medicine when Francis Adams presented a translation of Aretaeus's work at the Sydenham Society in 1856. The patient described in Aretaeus' work had stomach pain and was atrophied, pale, feeble and incapable of work. The diarrhoea manifested as loose stools that were white, malodorous and flatulent, and the disease was intractable and liable to periodic return. The problem, Aretaeus believed, was a lack of heat in the stomach necessary to digest the food and a reduced ability to distribute the digestive products throughout the body, this incomplete digestion resulting in the diarrhoea. He regarded this as an affliction of the old and more commonly affecting women, explicitly excluding children. The cause, according to Aretaeus, was sometimes either another chronic disease or even consuming \"a copious draught of cold water.\" The paediatrician Samuel Gee gave the first modern-day description of the condition in children in a lecture at Hospital for Sick Children, Great Ormond Street, London, in 1887. Gee acknowledged earlier descriptions and terms for the disease and adopted the same term as Aretaeus (coeliac disease). He perceptively stated: \"If the patient can be cured at all, it must be by means of diet.\" Gee recognised that milk intolerance is a problem with coeliac children and that highly starched foods should be avoided. However, he forbade rice, sago, fruit and vegetables, which all would have been safe to eat, and he recommended raw meat as well as thin slices of toasted bread. Gee highlighted particular success with a child \"who was fed upon a quart of the best Dutch mussels daily.\" However, the child could not bear this diet for more than one season. Many Christian churches offer their communicants gluten-free alternatives, usually in the form of a rice-based cracker or gluten-free bread. These include the United Methodist, Christian Reformed, Episcopal, the Anglican Church (Church of England, UK) and Lutheran. Catholics may receive from the Chalice alone, or ask for gluten-reduced hosts; gluten-free ones however are not considered to still be wheat bread , and hence invalid matter.Statement by the National Conference of Catholic bishops on the use of low gluten hosts at Mass . BCL Newsletter. November 2003. Attempts to modulate the immune response with regard to coeliac disease are mostly still in phase I of clinical testing; one agent (CCX282-B) has been evaluated in a phase II clinical trial on the basis of small-intestinal biopsies taken from people with coeliac disease before and after gluten exposure.", "after_revision": "Miscellaneous Coeliac disease has been linked with many conditions. In many cases, it is unclear whether the gluten-induced bowel disease is a causative factor or whether these conditions share a common predisposition. Pathophysiology Coeliac disease appears to be multifactorial, both in that more than one genetic factor can cause the disease and in that more than one factor is necessary for the disease to manifest in a person. There are seven HLA-DQ variants (DQ2 and DQ4\u2013DQ9). Over 95\\% of people with coeliac have the isoform of DQ2 or DQ8, which is inherited in families. The reason these genes produce an increase in the risk of coeliac disease is that the receptors formed by these genes bind to gliadin peptides more tightly than other forms of the antigen-presenting receptor. Therefore, these forms of the receptor are more likely to activate T lymphocytes and initiate the autoimmune process. Some individuals inherit DQ2.5 from one parent and an additional portion of the haplotype (either DQB1*02 or DQA1*05) from the other parent, increasing risk. Less commonly, some individuals inherit the DQA1*05 allele from one parent and the DQB1*02 from the other parent (DQ2.5trans) (called a trans-haplotype association), and these individuals are at similar risk for coeliac disease as those with a single DQ2.5-bearing chromosome 6, but in this instance , the disease tends not to be familial. Among the 6\\% of European coeliacs that do not have DQ2.5 (cis or trans) or DQ8 (encoded by the haplotype DQA1*03:DQB1*0302), 4\\% have the DQ2.2 isoform, and the remaining 2\\% lack DQ2 or DQ8. 250px|Illustration of deamidated \u03b1-2 gliadin's 33mer, amino acids 56\u201388, showing the overlapping of three varieties of T-cell epitope Membrane leaking permits peptides of gliadin that stimulate two levels of the immune response: the innate response, and the adaptive (T-helper cell-mediated ) response. One protease-resistant peptide from \u03b1-gliadin contains a region that stimulates lymphocytes and results in the release of interleukin-15. This innate response to gliadin results in immune-system signalling that attracts inflammatory cells and increases the release of inflammatory chemicals. The strongest and most common adaptive response to gliadin is directed toward an \u03b12-gliadin fragment of 33 amino acids in length. Indeed, earlier studies of rotavirus damage in the gut showed this causes villous atrophy. This suggests that viral proteins may take part in the initial flattening and stimulate self-crossreactive anti-VP7 production. Antibodies to VP7 may also slow healing until the gliadin-mediated tTG presentation provides a second source of crossreactive antibodies. Alternative causes of this tissue damage have been proposed and involve the release of interleukin 15 and activation of the innate immune system by a shorter gluten peptide (p31\u201343/49). This would trigger killing of enterocytes by lymphocytes in the epithelium. The villous atrophy seen on biopsy may also be due to unrelated causes, such as tropical sprue, giardiasis and radiation enteritis. While positive serology and typical biopsy are highly suggestive of coeliac disease, lack of response to the diet may require these alternative diagnoses to be considered. Several tests can be used. The level of symptoms may determine the order of the tests, but all tests lose their usefulness if the person is already eating a gluten-free diet. Intestinal damage begins to heal within weeks of gluten being removed from the diet, and antibody levels decline over months. For those who have already started on a gluten-free diet, it may be necessary to perform a rechallenge with some gluten-containing food in one meal a day over 6 weeks before repeating the investigations. Blood tests Immunofluorescence staining pattern of endomysial antibodies on a monkey oesophagus tissue sample. Serological blood tests are the first-line investigation required to make a diagnosis of coeliac disease. Its sensitivity correlates with the degree of histological lesions. People who present with minor damage to the small intestine may have seronegative findings so many patients with coeliac disease often are missed. In patients with villous atrophy, anti-endomysial (EMA) antibodies of the immunoglobulin A (IgA) type can detect coeliac disease with a sensitivity and specificity of 90\\% and 99\\%, respectively. Serology for anti-transglutaminase antibodies (anti-tTG) was initially reported to have a higher sensitivity (99\\%) and specificity (>90\\%). However, it is now thought to have similar characteristics to anti-endomysial antibodies . Both anti-transglutaminase and anti-endomysial antibodies have high sensitivity to diagnose people with classic symptoms and complete villous atrophy, but they are only found in 30\u201389\\% of the cases with partial villous atrophy and in less than 50\\% of the people who have minor mucosal lesions (duodenal lymphocytosis) with normal villi. Endoscopy Endoscopic still of duodenum of a person with coeliac disease showing scalloping of folds and \"cracked-mud\" appearance to mucosa Schematic of the Marsh classification of upper jejunal pathology in coeliac disease. An upper endoscopy with biopsy of the duodenum (beyond the duodenal bulb) or jejunum is performed to obtain multiple samples (four to eight) from the duodenum. Not all areas may be equally affected; if biopsies are taken from healthy bowel tissue, the result would be a false negative. Even in the same bioptic fragment, different degrees of damage may be present. Most people with coeliac disease have a small intestine that appears to be normal on endoscopy before the biopsies are examined. However, five findings have been associated with high specificity for coeliac disease: scalloping of the small bowel folds (pictured), paucity in the folds, a mosaic pattern to the mucosa (described as a \"cracked-mud\" appearance), prominence of the submucosa blood vessels, and a nodular pattern to the mucosa. Capsule endoscopy (CE) allows identification of typical mucosal changes observed in coeliac disease but has a lower sensitivity compared to regular endoscopy and histology. CE is therefore not the primary diagnostic tool for coeliac disease. However, CE can be used for diagnosing T-cell lymphoma, ulcerative jejunoileitis , and adenocarcinoma in refractory or complicated coeliac disease. Pathology The classic pathology changes of coeliac disease in the small bowel are categorised by the \"Marsh classification\": Marsh stage 0: normal mucosa Marsh stage 1: increased number of intra-epithelial lymphocytes (IELs), usually exceeding 20 per 100 enterocytes Marsh stage 2: a proliferation of the crypts of Lieberk\u00fchn Marsh stage 3: partial or complete villous atrophy and crypt hypertrophy Marsh stage 4: hypoplasia of the small intestine architecture The changes classically improve or reverse after gluten is removed from the diet. However, most guidelines do not recommend a repeat biopsy unless there is no improvement in the symptoms on diet. In some cases, a deliberate gluten challenge, followed by a biopsy, may be conducted to confirm or refute the diagnosis. A normal biopsy and normal serology after challenge indicates the diagnosis may have been incorrect. Osteopenia and osteoporosis, mildly and severely reduced bone mineral density, are often present in people with coeliac disease, and investigations to measure bone density may be performed at diagnosis, such as dual-energy X-ray absorptiometry (DXA) scanning, to identify the risk of fracture and need for bone protection medication. Serology has been proposed as a screening measure, because the presence of antibodies would detect some previously undiagnosed cases of coeliac disease and prevent its complications in those people. However, serologic tests have high sensitivity only in people with total villous atrophy and have a very low ability to detect cases with partial villous atrophy or minor intestinal lesions. Testing for coeliac disease may be offered to those with commonly associated conditions. Humans first started to cultivate grains in the Neolithic period (beginning about 9500 BCE) in the Fertile Crescent in Western Asia, and , likely, coeliac disease did not occur before this time. Aretaeus of Cappadocia, living in the second century in the same area, recorded a malabsorptive syndrome with chronic diarrhoea, causing a debilitation of the whole body. His \"C\u0153liac Affection\" (coeliac from Greek \u03ba\u03bf\u03b9\u03bb\u03b9\u03b1\u03ba\u03cc\u03c2 koiliakos, \"abdominal\") gained the attention of Western medicine when Francis Adams presented a translation of Aretaeus's work at the Sydenham Society in 1856. The patient described in Aretaeus' work had stomach pain and was atrophied, pale, feeble , and incapable of work. The diarrhoea manifested as loose stools that were white, malodorous , and flatulent, and the disease was intractable and liable to periodic return. The problem, Aretaeus believed, was a lack of heat in the stomach necessary to digest the food and a reduced ability to distribute the digestive products throughout the body, this incomplete digestion resulting in diarrhoea. He regarded this as an affliction of the old and more commonly affecting women, explicitly excluding children. The cause, according to Aretaeus, was sometimes either another chronic disease or even consuming \"a copious draught of cold water.\" The paediatrician Samuel Gee gave the first modern-day description of the condition in children in a lecture at Hospital for Sick Children, Great Ormond Street, London, in 1887. Gee acknowledged earlier descriptions and terms for the disease and adopted the same term as Aretaeus (coeliac disease). He perceptively stated: \"If the patient can be cured at all, it must be by means of diet.\" Gee recognised that milk intolerance is a problem with coeliac children and that highly starched foods should be avoided. However, he forbade rice, sago, fruit , and vegetables, which all would have been safe to eat, and he recommended raw meat as well as thin slices of toasted bread. Gee highlighted particular success with a child \"who was fed upon a quart of the best Dutch mussels daily.\" However, the child could not bear this diet for more than one season. Many Christian churches offer their communicants gluten-free alternatives, usually in the form of a rice-based cracker or gluten-free bread. These include the United Methodist, Christian Reformed, Episcopal, the Anglican Church (Church of England, UK) and Lutheran. Catholics may receive from the Chalice alone, or ask for gluten-reduced hosts; gluten-free ones however are not considered to still be wheat bread and hence invalid matter.Statement by the National Conference of Catholic bishops on the use of low gluten hosts at Mass . BCL Newsletter. November 2003. Attempts to modulate the immune response concerning coeliac disease are mostly still in phase I of clinical testing; one agent (CCX282-B) has been evaluated in a phase II clinical trial based on small-intestinal biopsies taken from people with coeliac disease before and after gluten exposure.", "edit_actions": [{"type": "R", "before": "a number of", "after": "many", "start_char_pos": 51, "end_char_pos": 62}, {"type": "D", "before": ",", "after": null, "start_char_pos": 352, "end_char_pos": 353}, {"type": "A", "before": null, "after": "the", "start_char_pos": 635, "end_char_pos": 635}, {"type": "A", "before": null, "after": ", the", "start_char_pos": 1371, "end_char_pos": 1371}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1807, "end_char_pos": 1807}, {"type": "R", "before": "cell mediated", "after": "cell-mediated", "start_char_pos": 1873, "end_char_pos": 1886}, {"type": "D", "before": "a", "after": null, "start_char_pos": 2395, "end_char_pos": 2396}, {"type": "A", "before": null, "after": "the", "start_char_pos": 2752, "end_char_pos": 2752}, {"type": "A", "before": null, "after": "the", "start_char_pos": 3176, "end_char_pos": 3176}, {"type": "R", "before": "There are several tests that", "after": "Several tests", "start_char_pos": 3240, "end_char_pos": 3268}, {"type": "R", "before": "minor damage of", "after": "with minor damage to", "start_char_pos": 4064, "end_char_pos": 4079}, {"type": "R", "before": "antibody", "after": "antibodies", "start_char_pos": 4602, "end_char_pos": 4610}, {"type": "A", "before": null, "after": "a", "start_char_pos": 4994, "end_char_pos": 4994}, {"type": "D", "before": "a", "after": null, "start_char_pos": 5718, "end_char_pos": 5719}, {"type": "A", "before": null, "after": ",", "start_char_pos": 6305, "end_char_pos": 6305}, {"type": "A", "before": null, "after": "a", "start_char_pos": 6653, "end_char_pos": 6653}, {"type": "A", "before": null, "after": "a", "start_char_pos": 7085, "end_char_pos": 7085}, {"type": "A", "before": null, "after": "the", "start_char_pos": 7520, "end_char_pos": 7520}, {"type": "A", "before": null, "after": "a", "start_char_pos": 7876, "end_char_pos": 7876}, {"type": "R", "before": "it is likelythat", "after": ", likely,", "start_char_pos": 8194, "end_char_pos": 8210}, {"type": "A", "before": null, "after": ",", "start_char_pos": 8732, "end_char_pos": 8732}, {"type": "A", "before": null, "after": ",", "start_char_pos": 8825, "end_char_pos": 8825}, {"type": "D", "before": "the", "after": null, "start_char_pos": 9118, "end_char_pos": 9121}, {"type": "A", "before": null, "after": ",", "start_char_pos": 9926, "end_char_pos": 9926}, {"type": "D", "before": ",", "after": null, "start_char_pos": 10642, "end_char_pos": 10643}, {"type": "R", "before": "with regard to", "after": "concerning", "start_char_pos": 10839, "end_char_pos": 10853}, {"type": "R", "before": "on the basis of", "after": "based on", "start_char_pos": 10988, "end_char_pos": 11003}], "sents_char_pos": [0, 74, 225, 440, 491, 588, 794, 912, 1070, 1405, 1898, 2036, 2190, 2320, 2413, 2541, 2679, 2862, 2938, 3070, 3239, 3281, 3429, 3555, 3759, 3870, 3976, 4044, 4186, 4382, 4523, 4612, 4951, 5174, 5334, 5373, 5460, 5539, 5668, 5981, 6154, 6223, 6370, 6495, 6912, 7026, 7146, 7247, 7578, 7777, 7967, 8056, 8258, 8429, 8642, 8755, 8903, 9132, 9243, 9375, 9553, 9674, 9765, 9887, 10050, 10158, 10228, 10369, 10494, 10573, 10669, 10782, 10797, 10918]}
+{"doc_id": "63940707", "revision_depth": "4", "before_revision": "Light pollution Light is one of the more common threats to sufficient sleep for birds living in environments with anthropogenic noise. This threat is called \"artificial light pollution at night\" , or ALAN. ALAN takes a substantial toll on avian sleep since it eliminates darkness, a key component for rest. Disrupting the birds' natural observance of light and dark cycles can disrupt circadian rhythmsand eventually harm vital sleeping patterns. For example, biologist Thomas Raap conducted a study that suggested exposure to ALAN affected the sleep behavior of great blue tits (Cyanistes caeruleus).Raap, T.; Sun, J.; Pinxten, R. & Eens, M. (2017). \"Disruptive effects of light pollution on sleep in free-living birds: Season and/or light intensity-dependent?\". Behavioural Processes: 144. In this study, birds woke up earlier due to various ALAN factors , such as seasonal time keeping . Because light usually indicates a day's passing to birds, exposure to light pollution caused a disruption in the birds' ability to measure the length of a full day. Outside of densely populated areas there is normally around a 5\\% drop in sleep duration for Great Tits' females during their nesting period. However, the researchers found a 50\\% reduction in the female Great Tits' total sleep duration during this period in densely populated urban centers. The researchers suggested that the direct effects of ALAN were to blame for this sleep disruption .", "after_revision": "Light pollution Light is one of the more common threats to sufficient sleep for birds living in anthropogenic environments, known as \"artificial light pollution at night\" (ALAN). ALAN eliminates darkness, a necessity for rest. Disrupting the birds' light and dark cycles can impact circadian rhythms, eventually harming sleep patterns. Biologist Thomas Raap conducted a study which suggested that exposure to ALAN affected the sleep behavior of Eurasian blue tits (Cyanistes caeruleus).Raap, T.; Sun, J.; Pinxten, R. & Eens, M. (2017). \"Disruptive effects of light pollution on sleep in free-living birds: Season and/or light intensity-dependent?\". Behavioural Processes: 144. In this study, birds woke up earlier due to ALAN factors such as seasonal timekeeping . Because light usually indicates a day's passage to birds, exposure to light pollution disrupts their ability to measure the length of a day. Outside densely-populated areas, there is normally about a five-percent drop in sleep duration for blue-tit females during their nesting period. The researchers found a 50-percent reduction in the females' sleep duration during this period in urban centers, and suggested that the effects of ALAN were responsible .", "edit_actions": [{"type": "R", "before": "environments with anthropogenic noise. This threat is called", "after": "anthropogenic environments, known as", "start_char_pos": 96, "end_char_pos": 156}, {"type": "R", "before": ", or ALAN. ALAN takes a substantial toll on avian sleep since it", "after": "(ALAN). ALAN", "start_char_pos": 195, "end_char_pos": 259}, {"type": "R", "before": "key component", "after": "necessity", "start_char_pos": 283, "end_char_pos": 296}, {"type": "D", "before": "natural observance of", "after": null, "start_char_pos": 329, "end_char_pos": 350}, {"type": "R", "before": "disrupt circadian rhythmsand eventually harm vital sleeping patterns. For example, biologist", "after": "impact circadian rhythms, eventually harming sleep patterns. Biologist", "start_char_pos": 377, "end_char_pos": 469}, {"type": "R", "before": "that suggested", "after": "which suggested that", "start_char_pos": 500, "end_char_pos": 514}, {"type": "R", "before": "great", "after": "Eurasian", "start_char_pos": 563, "end_char_pos": 568}, {"type": "R", "before": "various ALAN factors ,", "after": "ALAN factors", "start_char_pos": 836, "end_char_pos": 858}, {"type": "R", "before": "time keeping", "after": "timekeeping", "start_char_pos": 876, "end_char_pos": 888}, {"type": "R", "before": "passing", "after": "passage", "start_char_pos": 931, "end_char_pos": 938}, {"type": "R", "before": "caused a disruption in the birds'", "after": "disrupts their", "start_char_pos": 977, "end_char_pos": 1010}, {"type": "D", "before": "full", "after": null, "start_char_pos": 1046, "end_char_pos": 1050}, {"type": "R", "before": "of densely populated areas", "after": "densely-populated areas,", "start_char_pos": 1064, "end_char_pos": 1090}, {"type": "R", "before": "around a 5\\%", "after": "about a five-percent", "start_char_pos": 1109, "end_char_pos": 1121}, {"type": "R", "before": "Great Tits'", "after": "blue-tit", "start_char_pos": 1149, "end_char_pos": 1160}, {"type": "R", "before": "However, the", "after": "The", "start_char_pos": 1198, "end_char_pos": 1210}, {"type": "R", "before": "50\\%", "after": "50-percent", "start_char_pos": 1231, "end_char_pos": 1235}, {"type": "R", "before": "female Great Tits' total", "after": "females'", "start_char_pos": 1253, "end_char_pos": 1277}, {"type": "R", "before": "densely populated urban centers. The researchers", "after": "urban centers, and", "start_char_pos": 1315, "end_char_pos": 1363}, {"type": "D", "before": "direct", "after": null, "start_char_pos": 1383, "end_char_pos": 1389}, {"type": "R", "before": "to blame for this sleep disruption", "after": "responsible", "start_char_pos": 1411, "end_char_pos": 1445}], "sents_char_pos": [0, 134, 205, 306, 446, 601, 619, 650, 763, 791, 890, 1055, 1197, 1347]}
+{"doc_id": "64945597", "revision_depth": "1", "before_revision": "Nana Asamani of the Akwamus Nana Asamani ( also spelled 'Asameni' ) was the first black Governor of Christiansborg Castle, also known as Osu Castle, which is located in Osu, Accra, Ghana on the coast of the Gulf of Guinea. Asamani was known as the Akwamuhene who tricked the Danes , thereby seizing the Christiansborg Castle in 1693. Asamani would sell the castle back to the Danes in 1694 , for 50 marks of gold, but following the sale, he kept the keys to the castle . Personal Life Nana Asamani, a person whose life and career present many interesting facets. Said to have been first employed as a cook in the English forts at Accra,' after learning the 'white man's ways' he established himself as a trader at Accra, and acted as a broker for Akwamu traders who came there to trade with the Danes in Christiansburg. He was known as a businessman who traded with the Danes and the Ga-Adangbe people in Accra. He served as a broker between the Danes, the Ga-Adangbe, and the Akwamu traders. He became proficient in the Danish language after moving to Accra. Castle Seized Asamani planned to seize the castle in 1693. Disguising himself as a cook and interpreter, he studied the traders , merchants and others who visited the castle, as well as the arrival and departure of ships. In June 1963, Asamani told the Danes that he and a group of Akwamu traders were visiting with the intention of buying ammunition. Asamani and the traders entered the castle under the guise of testing the ammunition before finalizing the purchase . Unknown to the Danes, they had also hidden ammunition, powder and shots under their clothes. They then opened fire on the unsuspecting Danes and Asamani captured the castle in the attack, which resulted in many casualties. Several Dutch officials were taken as captives. He replaced the Danish flag with the Akwamu flag. Asamani appointed himself Governor of the castle, where he remained for a full year, and he traded with English and Dutch merchants. The Keys to the Castle The Akwamu , proud of their tribe's resistance to the Danes, kept the keys won by Asamani. They are still in their possession to this day. / The keys are made of silver, and are 26 in number. They are kept by the Akwamu in a box formerly used to store gold, called apem adaka. Christianborg Castle became the residence of Ghana's first president, Kwame Nkrumah, in 1960.", "after_revision": "Nana Asamani of the Akwamus Nana Asamani ( or \"Asameni\" ) was the first black Governor of Christiansborg Castle, located in Osu, Accra, Ghana , on the coast of the Gulf of Guinea. Asamani was known as the Akwamuhene who tricked the Danes and seized Christiansborg Castle in 1693. Asamani sold the castle back to the Danes in 1694 for 50 marks of gold, but kept the keys to the castle after the sale . Personal life He was known as a businessman who traded with the Danes and the Ga-Adangbe people in Accra. He served as a broker between the Danes, the Ga-Adangbe, and the Akwamu traders. Seizure of Christiansborg Castle Asamani planned to seize the castle in 1693. Disguising himself as a cook and interpreter, he studied the traders and merchants who visited the castle, and the arrival and departure of ships. In June 1963, Asamani told the Danes that he and a group of Akwamu traders were visiting to buy ammunition. Asamani and the traders entered the castle under the guise of testing the ammunition before finalizing the purchase , and hid ammunition, powder and shots under their clothes. Asamani attacked the Danes and captured the castle ; several Dutch officials were taken as captives. Asamani replaced the Danish flag with the Akwamu flag. Asamani appointed himself Governor of the castle, where he remained for a full year, and traded with English and Dutch merchants. The Akwamu kept the 26 silver keys won by Asamani. / ", "edit_actions": [{"type": "R", "before": "also spelled 'Asameni'", "after": "or \"Asameni\"", "start_char_pos": 43, "end_char_pos": 65}, {"type": "D", "before": "also known as Osu Castle, which is", "after": null, "start_char_pos": 123, "end_char_pos": 157}, {"type": "A", "before": null, "after": ",", "start_char_pos": 187, "end_char_pos": 187}, {"type": "R", "before": ", thereby seizing the", "after": "and seized", "start_char_pos": 282, "end_char_pos": 303}, {"type": "R", "before": "would sell", "after": "sold", "start_char_pos": 343, "end_char_pos": 353}, {"type": "D", "before": ",", "after": null, "start_char_pos": 391, "end_char_pos": 392}, {"type": "D", "before": "following the sale, he", "after": null, "start_char_pos": 419, "end_char_pos": 441}, {"type": "A", "before": null, "after": "after the sale", "start_char_pos": 470, "end_char_pos": 470}, {"type": "R", "before": "Life Nana Asamani, a person whose life and career present many interesting facets. Said to have been first employed as a cook in the English forts at Accra,' after learning the 'white man's ways' he established himself as a trader at Accra, and acted as a broker for Akwamu traders who came there to trade with the Danes in Christiansburg.", "after": "life", "start_char_pos": 482, "end_char_pos": 821}, {"type": "D", "before": "He became proficient in the Danish language after moving to Accra.", "after": null, "start_char_pos": 995, "end_char_pos": 1061}, {"type": "R", "before": "Castle Seized", "after": "Seizure of Christiansborg Castle", "start_char_pos": 1062, "end_char_pos": 1075}, {"type": "R", "before": ", merchants and others", "after": "and merchants", "start_char_pos": 1190, "end_char_pos": 1212}, {"type": "R", "before": "as well as", "after": "and", "start_char_pos": 1237, "end_char_pos": 1247}, {"type": "R", "before": "with the intention of buying", "after": "to buy", "start_char_pos": 1373, "end_char_pos": 1401}, {"type": "R", "before": ". Unknown to the Danes, they had also hidden", "after": ", and hid", "start_char_pos": 1530, "end_char_pos": 1574}, {"type": "R", "before": "They then opened fire on the unsuspecting Danes and Asamani", "after": "Asamani attacked the Danes and", "start_char_pos": 1625, "end_char_pos": 1684}, {"type": "R", "before": "in the attack, which resulted in many casualties. Several", "after": "; several", "start_char_pos": 1705, "end_char_pos": 1762}, {"type": "R", "before": "He", "after": "Asamani", "start_char_pos": 1803, "end_char_pos": 1805}, {"type": "D", "before": "he", "after": null, "start_char_pos": 1942, "end_char_pos": 1944}, {"type": "R", "before": "Keys to the Castle The Akwamu , proud of their tribe's resistance to the Danes, kept the", "after": "Akwamu kept the 26 silver", "start_char_pos": 1990, "end_char_pos": 2078}, {"type": "D", "before": "They are still in their possession to this day.", "after": null, "start_char_pos": 2100, "end_char_pos": 2147}, {"type": "D", "before": "The keys are made of silver, and are 26 in number. They are kept by the Akwamu in a box formerly used to store gold, called apem adaka. Christianborg Castle became the residence of Ghana's first president, Kwame Nkrumah, in 1960.", "after": null, "start_char_pos": 2150, "end_char_pos": 2379}], "sents_char_pos": [0, 223, 334, 564, 821, 913, 994, 1061, 1120, 1283, 1413, 1624, 1754, 1802, 1852, 1985, 2099, 2200, 2285]}
+{"doc_id": "65632796", "revision_depth": "1", "before_revision": "Ville Sbertoli (also known as Casa di salute Sbertoli) was a lunatic asylum in Pistoia, Italy. The original structure was built in the 17th century. In 1868, it was bought by Agostino Sbertoli, who wanted to create a health facility for the wealthiest familiesin the region. After being used as a political prison during the Second World War , it was transformed into a public psychiatric hospital in 1951. The complex is now abandoned. Location Ville Sbertoli is located in the park on Via Colle Gigliato in the town of Pistoia, Italy. The entrance gate faces a small street called Via Solitaria. Villa Franchini Taviani, one of the original two structures, is located on a hill on the Colle Gigliato. It can be accessed from Via di Bigiano, an avenue of cypress trees. Villa Tanzi Lugaro, the second of the two original buildings, is located on the lower part of the hill, and can be seen from the city centre. Over twenty additional buildings were added later, and are located in the surrounding area. The beginnings The original two buildings were built between 1600 and 1700 and consisted of the two villas: Villa Franchini Taviani and Villa Giovacchini Rosati. 300x300px|Villa di Mezzogiorno, 1925 They were originally purchased by Agostino Sbertoli, a doctor at the San Benedetto mental hospital in Pesaro, as his private residence. Between 1868 and 1876, Sbertoli turned them into a psychiatric hospital. The first patient was admitted on March 18, 1868: A 29 year-old Florentine man suffering from epilepsy. After his admission, the hospital began to gain fame . In a few years, patients from all over Europe were being treated at the hospital, prompting Sbertoli to start an expansion project (1880-1900) to accommodate more patients. The hospital grounds eventually covered and held over 20 structures, with 9 serving as villas to house patients. Patients were assigned to different buildings based on their gender, social status, and the type of illness. Several famous psychiatrists worked at the hospital, including Cesare Lombroso (a professor of forensic medicine at Torino University, and the founder of criminal anthropology) and Eugenio Tanzi, the director of S. Salvi mental hospital in Florence. Famous patients included the jurist Francesco Bonaini and Severino Ferrari, the Italian poet and literature critic (a close friend of the Italian poet Pascoli). After Agostino Sbertoli's death in 1898, his son Nino, also a psychiatrist, inherited his father's work, continuing the expansion process. Nino Sbertoli assigned doctor Giulio Casanova as a director. He combined Ville Sbertoli and Ville Casanova (built-in 1895) to create the \u201cGrande Sanatorium Toscano\u201d, which operated until 1919. In 1920, the building was sold to a private group from Pistoia. Various mental illnesses were treated in Ville Sbertoli, including depression, epilepsy, alcoholism, hypochondriac disorders, chronic delirium, manic exaltation and madness. A range of different treatments were applied depending on the illnesses , including the use of electricity to heal slight paralysis, hydrotherapy, the use of ice on the head, leeches and vesicants on the head and anus. During World War II During the fascist period in 1943\u20131944, the city of Pistoia was subject to three heavy aerial attacks. Due to the damages caused by bombing , the Repubblica Sociale Italiana authorities moved prisoners from the jail of Pistoia to Ville Sbertoli, turning the hospital into a detention center for political prisoners. In 1944, Silvano Fedi and other partisans fighting the fascist regime attacked the buildings and released 54 males, 3 females (2 of them Jewish). After the end of the war, Ville Sbertoli was restored to serve its original purpose psychiatric care . From the 1950s until its closure In 1950, the structure (then owned by a private group from Pistoia) was sold to the province of Pistoia, turning the building into a provincial neuropsychiatric hospital. The government minister of Italy, Alcide de Gasperi, inspected Ville Sbertoli, determining it to be unsuitable for operation . This was due to the low level of patients' treatment, lack of medical equipment, poor record management, overcrowding and decaying premises. In 1978, neuropyschiatrist Franco Basaglia created a national reformation system known as Legge Basaglia. The system aimed at ending the poor treatment of patients and increasing focus on the study of illnesses. This resulted in the closure of Ville Sbertoli on May 13, 1978, along with all other mental hospitals in Italy. From 1978, Ville Sbertoli started taking care of non-mental health treatments until the structure was gradually closed, at which point the buildings were abandoned. The villas today In 2019, the region of Tuscany agreed to a program of structural reconstruction, which remained unimplemented in 2020. The villas are currently closed to the public. The original patients' rooms retain interesting drawings on the walls, including illustrations of guns, people and trees using bright colours such as green, yellow or blue . The drawings are believed to have been created by patients. The outside of the buildings retain some of the machines used to treat patients using Electroconvulsive Therapy. Other remains include old documents, water bottles, medical records, and books. People have illegally visited the buildingsby entering from the back, where the windows are secured only with wooden boards . The only people who are authorized access to the building are the neighbours, who are in charge of cleaning the water purifier. Although it remains closed to the public, it is possible to visit it by getting a specific permit from the ASL (Italian Health Association) known as permit n\u00b03. Original structures (1868\u20131890) The original structure consisted of two villas: Villa Franchini is 39 feet high with three floors and surface area of 21,5m x 17,5m. It has a typical style of the 18th century villa, with a fa\u00e7ade of three rows of windows with a balcony, decorated and formed with an iron railing with the Sbertoli family crest on top. The building was surrounded by an enclosed garden with a group of columns, with flower boxes on top, and an iron gate constructed by the architect Girolamo de Rossi. Until 1894, this represented the only way to access the whole structure. The entrance is decorated with a monument dedicated to Galileo Galilei. Villa Rosati is 42 feet high, also consists of three floors, with a surface area of 45m x 10,5m. The roof of the building includes three balconies, creating extra height. Like Villa Franchini, the construction of Villa Rosati is dated to the 18th century. Today, the interiors are well maintained in comparison to Villa Franchini, with salons on the ground and first floors, both decorated with an iron railing and paintings on the walls. First expansion and reorganization of the site (1880\u20131896) Increasing demand for new patients resulted in 20 years of expanding construction work, which started in 1880. This expansion enabled Agostino Sbertoli to reallocate the patients to different buildings, based on specific criteria such as the type of the mental illness, gender, and the patient's financial resources. The asylum was reconstructed with the union of the two original villas of Villa Franchini and Villa Rosati. The architects Carlo Livi and Francesco Azzurri based the redesign on \"littered pavilions\", a specific model aimed at the creation of an environment different from the typical idea of hospitals. This significantly contributed towards recovery of patients, creating a peaceful and calm feeling of family and community. It consisted of a village format, with independent buildings surrounded by gardens. The first block, previously known as Villa Rosati , was redefined as \" Villa di Mezzogiorno \" due to its position. It consisted of 50 luxurious apartments, and was specifically dedicated to wealthy patients of both genders. Patients who lived in this specific structure had the opportunity to join the Sunday masses, organised by the administration. The second block , known as \" Villa di Levante \" , was built in 1880 and assigned to specifically male patients. It consisted of 24 rooms, including three recreation rooms and a garden. Villa Centrale was built in 1896, and also known as Villa Franchini. It was divided into different apartments for residential female patients and for key staff, including the director of the institute and the female inspector. The structures were connected by an internal phone system and a private aqueduct. Expansion of Villa Franchini (1893\u20131896) Constructions continued in 1893, expanding Villa Centrale with new kitchens, dining room, and bathroom. A new entrance was built to give patients immediate access to the centre of the villas. In 1896 an additional villa was constructed, called Villa Serena. This was divided into luxury apartments available to wealthy female patients. Additional construction work included bathrooms, a stable and the house for the gardener. The two structures of Villini were located next to Villa Centrale and Villa Levante. They consisted of: six rooms, a bathroom (shared by all patients), a gallery, and a loft with three rear windows. Patients could enter the building through the main entrance of Villa Levante. The structure consisted of a long corridor of patient rooms on the ground floor. Since this area was dedicated to patients with potentially violent conditions, the doors contained a central hole of 5 cm for staff observation, and the walls were cushioned for sound proofing and patient safety. On the top floor, the loft area was used by the nurses of the building . Nino Sbertoli gave the management of the buildings to a doctor Giulio Casanova, who joined the buildings of Ville Sbertoli with \" Ville di Casanova \" . Fables about the site Throughout the years, many theories tried to explain the origins of the structures . One of them states that the Villa was bought by Sbertoli's family when one of Agostino's sons presented mental disorders. According to this theory, Sbertoli dedicated his whole life trying to find a cure for his son. His attempts proved to be unsuccessful and the boy died. In honour of his death, the father decided to donate all his wealth (including the villas) to whoever could help cure people with the same type of mental disorder. According to stories from visitors, many of them can still hear screaming, moaning and crying which are said to come from the ghosts of past patients. People have also claimed that the old piano found in the central hall of the structure is still played by Sbertoli's son. After visiting the structure, it is said that visitors become dominated by a feeling of sadness - as if the old patients' spirits want them to feel the pain they felt while living there.", "after_revision": "Ville Sbertoli (also known as Casa di salute Sbertoli) was a lunatic asylum in Pistoia, Italy. The original structure was built in the 17th century. In 1868, it was bought by Agostino Sbertoli, who wanted to create a health facility for wealthy families. After serving as a political prison during World War II , it was transformed into a public psychiatric hospital in 1951. The complex was later abandoned. Location Ville Sbertoli is located in the park on Via Colle Gigliato in Pistoia, Italy. The entrance gate faces a small street called Via Solitaria. Villa Franchini Taviani, one of the original two structures, is located on a hill on the Colle Gigliato. It can be accessed from Via di Bigiano, an avenue of cypress trees. Villa Tanzi Lugaro, the second of the two original buildings, is located on the lower part of the hill, and can be seen from the city centre. Over twenty buildings were added later, in the surrounding area. Origin The original two buildings were built between 1600 and 1700 and consisted of the two villas: Villa Franchini Taviani and Villa Giovacchini Rosati. 300x300px|Villa di Mezzogiorno, 1925 They were originally purchased by Agostino Sbertoli, a doctor at the San Benedetto mental hospital in Pesaro, as his private residence. Between 1868 and 1876, Sbertoli turned them into a psychiatric hospital. The first patient was admitted on March 18, 1868: a 29 year-old Florentine man suffering from epilepsy. After his admission, the hospital began to gain recognition . In a few years, patients from across Europe were treated at the hospital, prompting Sbertoli to start an expansion project (1880-1900) to accommodate more patients. The hospital grounds eventually covered and held over 20 structures, with 9 serving as villas to house patients. Patients were assigned to buildings based on their gender, social status, and the type of illness. Several famous psychiatrists worked at the hospital, including Cesare Lombroso (a professor of forensic medicine at Torino University, and the founder of criminal anthropology) and Eugenio Tanzi, the director of S. Salvi mental hospital in Florence. Famous patients included jurist Francesco Bonaini and Severino Ferrari, the Italian poet and literature critic (a close friend of Italian poet Pascoli). After Agostino Sbertoli's death in 1898, his son Nino, also a psychiatrist, inherited his father's work, continuing the expansion process. Nino Sbertoli assigned doctor Giulio Casanova as a director. He combined Ville Sbertoli and Ville Casanova (built-in 1895) to create the \u201cGrande Sanatorium Toscano\u201d, which operated until 1919. In 1920, the building was sold to a private group from Pistoia. Various mental illnesses were treated in Ville Sbertoli, including depression, epilepsy, alcoholism, hypochondriac disorders, chronic delirium, manic exaltation and madness. A range of treatments were applied depending on the malady , including the use of electricity to heal slight paralysis, hydrotherapy, the use of ice on the head, leeches and vesicants on the head and anus. World War II During the fascist period in 1943\u20131944, the city of Pistoia was subject to three heavy aerial attacks. Due to the bombing damage , the Repubblica Sociale Italiana authorities moved prisoners from the jail of Pistoia to Ville Sbertoli, turning the hospital into a detention center for political prisoners. In 1944, Silvano Fedi and other partisans fighting the fascist regime attacked the buildings and released 54 males, 3 females (2 Jewish). After the war, Ville Sbertoli was restored to serve its original purpose . Closure In 1950, the structure (then owned by a private group from Pistoia) was sold to the province of Pistoia, turning the building into a provincial neuropsychiatric hospital. The prime minister of Italy, Alcide de Gasperi, inspected Ville Sbertoli, determining it to be unsuitable . This was due to the low level of patient treatment, lack of equipment, poor record management, overcrowding and decaying premises. In 1978, neuropyschiatrist Franco Basaglia created a national reformation system known as Legge Basaglia. The system aimed at ending the poor treatment of patients and increasing focus on the study of illnesses. This resulted in the closure of Ville Sbertoli on May 13, 1978, along with all other mental hospitals in Italy. From 1978, Ville Sbertoli started taking care of non-mental health treatments until the structure was gradually closed, at which point the buildings were abandoned. Twenty-first century In 2019, the region of Tuscany agreed to a program of structural reconstruction, which remained unimplemented in 2020. The villas are closed to the public. The original patients' rooms retain interesting drawings on the walls, including illustrations of guns, people and trees . The drawings are believed to have been created by patients. The outside of the buildings retain some of the machines used to treat patients using Electroconvulsive Therapy. Other relics include documents, water bottles, medical records, and books. People have trespassed in the buildings . The only people who are authorized access to the building are the neighbours, who are in charge of cleaning the water purifier. Although it remains closed to the public, it is possible to get a specific permit from the ASL (Italian Health Association) . Original structures (1868\u20131890) The original villas: Villa Franchini is 39 feet high with three floors and surface area of 21,5m x 17,5m. It has a typical style of an18th century villa, with a fa\u00e7ade of three rows of windows with a balcony, decorated and formed with an iron railing with the Sbertoli family crest on top. The building was surrounded by an enclosed garden with a group of columns, with flower boxes on top, and an iron gate constructed by the architect Girolamo de Rossi. Until 1894, this represented the only way to access the structure. The entrance is decorated with a monument dedicated to Galileo Galilei. Villa Rosati is 42 feet high, also three floors, with a surface area of 45m x 10,5m. The roof includes three balconies, creating extra height. Like Villa Franchini, the construction of Villa Rosati dates to the 18th century. Today, the interiors are well maintained in comparison to Villa Franchini, with salons on the ground and first floors, both decorated with an iron railing and paintings on the walls. First expansion and site reorganization (1880\u20131896) Increasing demand from new patients resulted in 20 years of expanding construction work, which started in 1880. This expansion enabled Agostino Sbertoli to reallocate patients to different buildings, based on criteria such as the type of the mental illness, gender, and the patient's financial resources. The asylum was reconstructed with the union of Villa Franchini and Villa Rosati. Architects Carlo Livi and Francesco Azzurri based the redesign on \"littered pavilions\", a specific model aimed at the creation of an environment different from the typical idea of hospitals. This significantly contributed towards recovery of patients, creating a peaceful feeling of family and community. It consisted of a village format, with independent buildings surrounded by gardens. Villa Rosati was redefined as Villa di Mezzogiorno due to its position. It consisted of 50 luxurious apartments, and was specifically dedicated to wealthy patients of both genders. Patients in this specific structure had the opportunity to join the Sunday masses, organised by the administration. The second block became Villa di Levante , was built in 1880 and housed male patients. It consisted of 24 rooms, including three recreation rooms and a garden. Villa Centrale was built in 1896, and was also known as Villa Franchini. It was divided into apartments for residential female patients and for key staff, including the director of the institute and the female inspector. The structures were connected by an internal phone system and a private aqueduct. Expansion of Villa Franchini (1893\u20131896) Construction continued in 1893, expanding Villa Centrale with new kitchens, dining room, and bathroom. A new entrance was built to give patients immediate access to the centre of the villas. In 1896 an additional villa was constructed, called Villa Serena. This was divided into luxury apartments available to wealthy female patients. It included bathrooms, a stable and the house for the gardener. The two structures of Villini were located next to Villa Centrale and Villa Levante. They consisted of: six rooms, a bathroom (shared by all patients), a gallery, and a loft with three rear windows. Patients could enter the building through the main entrance of Villa Levante. The structure consisted of a long corridor of patient rooms on the ground floor. Since this area was dedicated to patients with potentially violent conditions, the doors contained a central hole of 5 cm for staff observation, and the walls were cushioned for sound proofing and patient safety. On the top floor, the loft area was used by the nurses . Nino Sbertoli gave the management of the buildings to a doctor Giulio Casanova, who joined the buildings of Ville Sbertoli with Ville di Casanova . Legend Throughout the years, many stories purported to explain the site's origins . One of them states that the Villa was bought by Sbertoli's family when one of Agostino's sons presented mental disorders. According to this theory, Sbertoli dedicated his life to finding a cure for his son. His attempts proved to be unsuccessful and the boy died. In honour of his death, the father decided to donate all his wealth (including the villas) to whoever could help cure people with the same type of mental disorder. According to visitor stories, screaming, moaning and crying can be heard that are said to come from the ghosts of past patients. Another story claims that the old piano found in the central hall of the structure is still played by Sbertoli's son. After visiting the structure, it is said that visitors become dominated by a feeling of sadness - as if the old patients' spirits want them to feel the pain they felt while living there.", "edit_actions": [{"type": "R", "before": "the wealthiest familiesin the region. After being used", "after": "wealthy families. After serving", "start_char_pos": 237, "end_char_pos": 291}, {"type": "R", "before": "the Second World War", "after": "World War II", "start_char_pos": 321, "end_char_pos": 341}, {"type": "R", "before": "is now", "after": "was later", "start_char_pos": 419, "end_char_pos": 425}, {"type": "D", "before": "the town of", "after": null, "start_char_pos": 509, "end_char_pos": 520}, {"type": "D", "before": "additional", "after": null, "start_char_pos": 925, "end_char_pos": 935}, {"type": "D", "before": "and are located", "after": null, "start_char_pos": 964, "end_char_pos": 979}, {"type": "R", "before": "The beginnings", "after": "Origin", "start_char_pos": 1005, "end_char_pos": 1019}, {"type": "R", "before": "A", "after": "a", "start_char_pos": 1463, "end_char_pos": 1464}, {"type": "R", "before": "fame", "after": "recognition", "start_char_pos": 1565, "end_char_pos": 1569}, {"type": "R", "before": "all over Europe were being", "after": "across Europe were", "start_char_pos": 1602, "end_char_pos": 1628}, {"type": "D", "before": "different", "after": null, "start_char_pos": 1884, "end_char_pos": 1893}, {"type": "D", "before": "the", "after": null, "start_char_pos": 2242, "end_char_pos": 2245}, {"type": "D", "before": "the", "after": null, "start_char_pos": 2351, "end_char_pos": 2354}, {"type": "D", "before": "different", "after": null, "start_char_pos": 2959, "end_char_pos": 2968}, {"type": "R", "before": "illnesses", "after": "malady", "start_char_pos": 3010, "end_char_pos": 3019}, {"type": "D", "before": "During", "after": null, "start_char_pos": 3167, "end_char_pos": 3173}, {"type": "R", "before": "damages caused by bombing", "after": "bombing damage", "start_char_pos": 3301, "end_char_pos": 3326}, {"type": "D", "before": "of them", "after": null, "start_char_pos": 3632, "end_char_pos": 3639}, {"type": "D", "before": "end of the", "after": null, "start_char_pos": 3659, "end_char_pos": 3669}, {"type": "D", "before": "psychiatric care", "after": null, "start_char_pos": 3733, "end_char_pos": 3749}, {"type": "R", "before": "From the 1950s until its closure", "after": "Closure", "start_char_pos": 3752, "end_char_pos": 3784}, {"type": "R", "before": "government", "after": "prime", "start_char_pos": 3960, "end_char_pos": 3970}, {"type": "D", "before": "for operation", "after": null, "start_char_pos": 4067, "end_char_pos": 4080}, {"type": "R", "before": "patients'", "after": "patient", "start_char_pos": 4116, "end_char_pos": 4125}, {"type": "D", "before": "medical", "after": null, "start_char_pos": 4145, "end_char_pos": 4152}, {"type": "R", "before": "The villas today", "after": "Twenty-first century", "start_char_pos": 4713, "end_char_pos": 4729}, {"type": "D", "before": "currently", "after": null, "start_char_pos": 4864, "end_char_pos": 4873}, {"type": "D", "before": "using bright colours such as green, yellow or blue", "after": null, "start_char_pos": 5017, "end_char_pos": 5067}, {"type": "R", "before": "remains include old", "after": "relics include", "start_char_pos": 5249, "end_char_pos": 5268}, {"type": "R", "before": "illegally visited the buildingsby entering from the back, where the windows are secured only with wooden boards", "after": "trespassed in the buildings", "start_char_pos": 5335, "end_char_pos": 5446}, {"type": "R", "before": "visit it by getting", "after": "get", "start_char_pos": 5637, "end_char_pos": 5656}, {"type": "R", "before": "known as permit n\u00b03.", "after": ".", "start_char_pos": 5717, "end_char_pos": 5737}, {"type": "D", "before": "structure consisted of two", "after": null, "start_char_pos": 5783, "end_char_pos": 5809}, {"type": "R", "before": "the 18th", "after": "an18th", "start_char_pos": 5929, "end_char_pos": 5937}, {"type": "D", "before": "whole", "after": null, "start_char_pos": 6311, "end_char_pos": 6316}, {"type": "D", "before": "consists of", "after": null, "start_char_pos": 6435, "end_char_pos": 6446}, {"type": "D", "before": "of the building", "after": null, "start_char_pos": 6506, "end_char_pos": 6521}, {"type": "R", "before": "is dated", "after": "dates", "start_char_pos": 6626, "end_char_pos": 6634}, {"type": "R", "before": "reorganization of the site", "after": "site reorganization", "start_char_pos": 6859, "end_char_pos": 6885}, {"type": "R", "before": "for", "after": "from", "start_char_pos": 6916, "end_char_pos": 6919}, {"type": "D", "before": "the", "after": null, "start_char_pos": 7064, "end_char_pos": 7067}, {"type": "D", "before": "specific", "after": null, "start_char_pos": 7110, "end_char_pos": 7118}, {"type": "D", "before": "the two original villas of", "after": null, "start_char_pos": 7262, "end_char_pos": 7288}, {"type": "R", "before": "The architects", "after": "Architects", "start_char_pos": 7323, "end_char_pos": 7337}, {"type": "D", "before": "and calm", "after": null, "start_char_pos": 7599, "end_char_pos": 7607}, {"type": "R", "before": "The first block, previously known as Villa Rosati ,", "after": "Villa Rosati", "start_char_pos": 7725, "end_char_pos": 7776}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 7794, "end_char_pos": 7795}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 7817, "end_char_pos": 7818}, {"type": "D", "before": "who lived", "after": null, "start_char_pos": 7958, "end_char_pos": 7967}, {"type": "R", "before": ", known as \"", "after": "became", "start_char_pos": 8092, "end_char_pos": 8104}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 8122, "end_char_pos": 8123}, {"type": "R", "before": "assigned to specifically", "after": "housed", "start_char_pos": 8148, "end_char_pos": 8172}, {"type": "A", "before": null, "after": "was", "start_char_pos": 8299, "end_char_pos": 8299}, {"type": "D", "before": "different", "after": null, "start_char_pos": 8351, "end_char_pos": 8360}, {"type": "R", "before": "Constructions", "after": "Construction", "start_char_pos": 8612, "end_char_pos": 8625}, {"type": "R", "before": "Additional construction work", "after": "It", "start_char_pos": 8948, "end_char_pos": 8976}, {"type": "D", "before": "of the building", "after": null, "start_char_pos": 9664, "end_char_pos": 9679}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 9810, "end_char_pos": 9811}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 9830, "end_char_pos": 9831}, {"type": "R", "before": "Fables about the site", "after": "Legend", "start_char_pos": 9834, "end_char_pos": 9855}, {"type": "R", "before": "theories tried", "after": "stories purported", "start_char_pos": 9883, "end_char_pos": 9897}, {"type": "R", "before": "origins of the structures", "after": "site's origins", "start_char_pos": 9913, "end_char_pos": 9938}, {"type": "R", "before": "whole life trying to find", "after": "life to finding", "start_char_pos": 10112, "end_char_pos": 10137}, {"type": "R", "before": "stories from visitors, many of them can still hear", "after": "visitor stories,", "start_char_pos": 10392, "end_char_pos": 10442}, {"type": "R", "before": "which", "after": "can be heard that", "start_char_pos": 10473, "end_char_pos": 10478}, {"type": "R", "before": "People have also claimed", "after": "Another story claims", "start_char_pos": 10530, "end_char_pos": 10554}], "sents_char_pos": [0, 94, 148, 274, 406, 436, 536, 597, 702, 770, 912, 1004, 1166, 1339, 1412, 1516, 1571, 1744, 1857, 1966, 2216, 2377, 2516, 2577, 2709, 2773, 2947, 3166, 3289, 3502, 3648, 3751, 3955, 4082, 4223, 4329, 4435, 4547, 4712, 4848, 4895, 5069, 5129, 5242, 5322, 5448, 5576, 5737, 5902, 6088, 6254, 6327, 6399, 6496, 6570, 6655, 6838, 7008, 7214, 7322, 7517, 7640, 7724, 7839, 7948, 8074, 8187, 8260, 8330, 8488, 8570, 8715, 8803, 8869, 8947, 9037, 9122, 9236, 9314, 9395, 9608, 9940, 10062, 10157, 10214, 10378, 10529, 10651]}
+{"doc_id": "66753243", "revision_depth": "4", "before_revision": "History Origins The Habr Yunis are part of the Garhajis clan confederation, and are a sub clan of the Isaaq tribe. The founder of the Rer Sugelleh dynasty is Ainashe Hersi a chief of the HabrYunis. Ethnographie Nordost-afrikas pp.45. Philip Paulitscheke. Publisher: D. Reimer. 1893Ainashe was the son of Ismail Arre a Habar Yunis noblemen, and a women of the Ali Sayid clan . He had seven brothers: Said, Fahiya, Hildid, Warsame, Yusuf, Ali and Abdi whom they shared the same mother and are together known as the Ba Ali in reference to their mother's clan.Tribes of British Somaliland, 1941, pp. 10. later in the 17th century Ainashe was elected to be the Tribal Ugaas of the Habar Yunis clan. As was the norm of Somali chieftains, Ainanshe had multiple wives. His first wife belonged to the Jibrahil clan and was the mother of his eldest son Sugulle who proceeded to establish the Habar Yunis sultanate. Sugelleh was part of the Ba Jibrhil Rer Sugulle which is the ruling tribe of the Habar Yunis. Ainanshe's other wives Mun, Basla and Egalo bore him 16 sons who are collectively known as the Baha Ainanshe.Genealogies of the Somal. Eyre and Spottiswoode (London). 1896. Establishment After the fall of the Adal Sultanate many successor states were established in Somaliland such as the Habar Yunis and Isaaq Sultanate. Before this The whole of the Isaaq clan were ruled by the Habar Jelo or Toljeclo dynasty. The Tol Jeclo claim descent from sheikh Isaaq\u2019s Harari wife. After a devastating reign Garad Dhuh Barar of the Habar Je\u2019clo was defeated and the Somali Isaaqs gained independence from the Harari branch of the Isaaq . After gaining independence the Isaaq Sultanate got into conflict with the Darood Absame, and penetrated deep in their territory, whilst this was happening Isaaq clans were rebelling, and the opportunist Habr Yunis broke of the United Isaaq Sultanate . the Habar Yunis Ugaazte developed into a large independent kingdom, and influenced many Darood, and Isaaq clans. The Habar Yunis established their kingdom under Sugulleh URL ISSUES IN REFUGEE RESEARCH Working Paper No. 65 Pastoral society and transnational refugees: population movements in Somaliland and eastern Ethiopia 1988 - 2000 Guido Ambroso, Table 1, pg.5 Sugelleh\u2019s successor Deria Sugulleh established Wadhan (Waram) as the political-military-economic centre for his people which was near the Sheikh pass and tax and administer the affairs of the Habr Yunis from the town. Large caravans bound for Berbera would pass through Habr Yunis territory through Burao and then Wadhan and proved a lucrative source of income for Sultan Deria.The Transactions of the Bombay Geographical Society 1850, Volume 9, p.133 Expansion and Rayyad War 400px|German Map from 1874 showcasing Sultan Hersi Aman's general location Following Sultan Deria \u2019s death a Great War broke out between the different branches of the Reer Sugelleh, Hiwever the young ambitious Hersi Aman proclaimed him self as Sultan in the 1850\u2019s. Hersi was a smart man, and was ready for conflict with any tribe. Hersi Aman belonged to the Bah Makahil section of the Sugulle dynasty.British Somaliland, by Ralph E. Drake-BrockmanAndrzejewski, B.W. and I.M. Lewis, 1964, Somali Poetry: An Introduction, Oxford University Press, Oxford, p.106 In 1870 he would launch the Rayyad Wars against the Darood of Hawd and Dollo which would continue intermittently from 1870 to 1940 and give birth to a string of poems, the Guba poetic chain, one of the most well-known series in Somali history. At the battle of Haro Dhiig (Lake of Blood) in modern day Haud (Ethiopia) , the victorious Habr Yunis captured the Sultan of the Rer Haroun Ogaden with many lives lost on both sides. The captured Sultan sent a message to Hersi saying as a noble he should be spared. In response, Hersi replied with Laba Gob Kii Beer Jilicsan Baa Jaba meaning, amongst two counterparts the soft-hearted shall perish and the captive Sultan was subsequently executed.The Unknown Horn of Africa, Frank Linsly James, pg.335 Hersi then resumed his conquest and penetrated further into Ogaden lands taking Dollo. In Dollo Hersi occupied, and invaded grazing lands and wells, as well as thousands of camels, he then proceeded to invade the lands of other Darood clans such as the Reer Cabdalle and Reer Makahil forcing them to flee to Hiraan. Ali Dhuh referred to these wars as the Guba wars due to the defeat of the Ogaden clans. Ethiopia,and British influence over the Habar Yunis Whilst Hersi was invading Ogaden the British and Ethiopian empires were getting worried due to the Habar Yunis expansion. The Ethiopians saw the Ogaden as their servants and gateway to Muslim territory. Whilst the British saw Ogaden as a major state, and kept their eye on the province, and would later invade it in 1887. Upon one occasion Hersi raided Ogaden, and took 1330 camels from the Ogaden, however the British and Ethiopians warned them and told them to return the camels to their owners. The Habr Yunis knowing they couldn\u2019t afford a fight with a foreign power obliged, and returned the camels and promised to not lead any raids in Ogaden. Despite their promise they continued to raid Ogaden.%DIFDELCMD < %DIFDELCMD < %%% Historian sigebery Uhlig commenting on the Guba poems writes the following: From a historical point of view Ali dhuhs poem explicitly details the large gains in traditionally Ogaden territory and wells, and the looting of Ogaden camels by the Isaq. He details the scatterring of the Ogaden clan, their forced migration southwards seeking refuge in the feverish river valleys, and even turning to hunting and farming- measures that were again considered very shameful usually only undertaken by slaves and low-caste Somalis and utterly demeaning for the once great pastoral Ogaden clan. The Ogaden, Ali recounts, have been forced to accept refuge with the clans that defeated them, especially the Habr Yunis, and cannot take revenge. The Isaq are portrayed as particularly callous and shameful in the way they parade looted Ogaden camels in front of their previous owners. Even in translation it is a very evocative poem\".%DIFDELCMD < %DIFDELCMD < %%% Dhulbahante war After defeating every threat in eastern Ethiopia the Habr Yunis looked east and focus on the Darood clans that inhabited eastern Somali-land, such as the Dhulbahante, and Warsangli, the Habr Yunis were much more powerful than these clans this conflicted resulted in the Habar Yunis looting Dhulbhante territory taking camels and land. The Dhulbahante put up no resistance, and feared the Habr Gerhajis (Habr Yunis) so much so that they didn\u2019t even avenge their casualties and instead intermarried with the Habr Yunis. The Ismail Arreh clan which were part of the Habr Yunis expanded from Berbera to Gulay, whilst the Muse Arreh Expanded far in to Warsangli Territory, and served as a border between the Habr Yunis and Majeerteen (Majeerteen Sultanate). Hersi is one of the most notable sultans and was a great king that penetrated far into Ogaden (Darood). Hersi influenced Zeila which were ran by the Gadabuursi,and Habar Awal sultanates. . Reer Samatar (Gadabuursi War) German explorer Felix Rosen who visited British Somaliland and Ethiopian Empire in 1907 met and discussed with the Somalis in the area and was told about Hersi and other legendary figures who had died in the decades prior. One such story was the battle between Sultan Hersi%DIFDELCMD < & %%% the famed warrior Kirh of the Rer Samatar subclan. Sultan Hersi's powerful section of Rer Ammaan had been raided by Kirh and his Rer Samatar. Given the fierce reputation of their target, Kirh's companions were uneasy and fled after the raid, leaving Kirh for dead. His wife began to mourn alongside his kinsmen but to everyone's surprise, Kirh had survived the wilderness and emerged with 100 camels he had captured. This feat impressed Hersi and there was no attempt to recover the lost stock. Kirh recited a boastful gabay O yalahe hoi, o yalahe hoi, yalahe My, our lore of death has spread through all tribes near and far And we felt so safe that we spurned the camels with the lance to prick our mark of possession Let the animals move slowly so that the camel fillings do not become tired At the time when the cowards among our companions took flight and the hiding places Then the lion's mane grew around our shoulders My wife! little was our Seriba; I have filled ten Serbs for you Come, now fill the milk baskets; we have plundered the tribe of AmmanWhen fighting would eventually resume, Hersi called out inquiring where Kirh was in the heat of battle. In response, a spear flew and grazed the Sultan's head. Hersi grabbed the spear which Kirh had thrown and returned the favour piercing through Kirh's famed horse and embedding deep in Kirh. He would escape the battlefield despite the wound leaving Hersi and the Rer Ammaan victorious having killing one%DIFDELCMD < & %%% capturing another man named Hashi. Hersi now answered the previous gabay and mocked his opponent How Kirh first bragged so much - now his speeches are silent! Once the Samatar tribe was large and rich, now it is small and become poor Now their caravans are afraid, even a day's march from Amud to go so far! We killed one of their men, we caught one of them, and one we drove the lance through the body Tell us, according to the truth, O Hashi! About which of the three you mourn the most that we like from your tribe?Hashi having being challenged by the Sultan spoke That you killed one of our men was by fate Predestined that you captured me does no harm But no mother has ever given birth to a hero like KirhHersi being moved by these words spared Hashi from the usual deadly fate of a captive instead giving him a fine horse and sent medicines%DIFDELCMD < & %%% gifts with Hashi to deliver to Kirh. Kirh would return the favour finally reconciling the feud. First Civil War Despite the great successes of Hersi Aman and new territory acquired, the other branches of the Rer Sugule grew wary of his increasing power as a ruler and stood to challenge him, fearing his unchecked leadership. The wise Guled Haji, another prominent member and elder of the Rer Sugule, had a fallout with Sultan Hersi, and his son was killed by one of Hersis' sons. Hersi's son approached his father and implored him to pay the traditional mag compensation to Guled for the loss of his child. Hersi arrogantly rebuffed his son and all-out conflict would break out between Ba Awal (Hersi's branch) and Baho Sugule branches of the Rer Sugule.War and Peace: An Anthology of Somali literature, p.169 Haji Guled in 1906. War continued with the Rer Sugeleh and the Ba Awal, one of the Ba Awal warriors Warsame attacked the Rer Sugeleh and killed three men, he also captured a respected young noblemen named Jama Amume Jama was the grandson of Deria Sugulleh Ainashe. Due to his Nobility he was released, later Jama then led a battle against the Ba Awal, Jama severely wounded Warsame. He then praised his horse Hamar who had performed well, and recited the following poem. Rendiconti by Reale Accademia dei Lincei; Reale Osservatorio del Campidoglio published 1885. Page 227-228.Col aloosan Xamarow haddii xalay la ugaanshay Heensaha hadddaan kugu itibay goor aleyl dhexe ah Indhaalaha haddaan kuu xidh-xidhay suuman la adkeeyay Isha bari hadii loo kiciyo awrtii reer Sugule Kuwii lays aqoon jiray haddii lagu ogaan duulay Abaanduule Guuleed (Guled Haji) hadii ubaxa loo gooyay Waa boqor agtiisa'e hadday \"ililidii\" yeedh'dhay Usha Daba-xidh ooddiyo haddii laysu wada giijay Eebada haddii laysku riday ilig-jartii hooto Abdikayba intii hore hadaan dabo adeegaayay Kolku ina qolyaeedkii sidii aarka nagu qayshay Anigoo aqoon jirin haddii lay ogeysiiyay Onkad baxay la moodyow kolkan amarka qaadsiiyay Doc aroorka uguma tago orodka saydhshaaye Oogada hadduu igala maray agabarkuu joogo Anna Awlaxaan siday haddaan oofta midig gooyay Kol haddaan Warsame aayiroon Baho agoonteeyay Kol haddaan ugaaskii ka dilay u ololiyeynaayay Kol hadaan ka oon baxay afku aramigu jiifay Alxamdu lilaa Eebaw haddaan umalkii qaar reebayHersi died in that battle and later Warsame would also fall. Warsame's sister lamented to her son Ali for the loss of Hersi, her husband Geid and other relatives in this poem recorded separately by both Phillip Paulitschke and Robecchi Brichetti.Rendiconti by Reale Accademia dei Lincei; Reale Osservatorio del Campidoglio published 1885. Page 228. Frank Linsly James visited Sultan Awad at Burao in 1884 and witnessed the dissenting situation between the two Sultans. Describing the political situation in the region and frequent raids between the two rival Rer Sugulleh factions and their allied Habr Yunis subclans It appeared the great Habr Gerhajis tribe was divided into two rival factions, the one owning allegiance to Sultan Owd, the other to his cousin, Sultan Noor. Between these two the country was about evenly divided, and the border-line was an everlasting scene of wars and rumours of wars, cattle raids, and attempted murders.The Unknown Horn of Africa: An Exploration From Berbera to the Leopard River, 1888 The Haber-Gerhajis tribe had formerly been under one Sultan and were very powerful, making frequent raids into Ogadayn, but on his death, two cousins, Awad and Nur, divided the country between them.Proceedings of the Royal Geographical Society and Monthly Record of Geography, 1885, Volume 7, p.627 Awad was killed fighting in Ogaden by the Reer Ali. This allowed Nur to establish himself at Burao and rule over the entirety of the Habr Yunis. The Baha Deria still did not concede defeat and would eventually chose Awad's nephew, Madar Hersi, as their successor following Nur's death.Journal of the Anthropological Institute of Great Britain and Ireland, Vol. 21, p.161 Sultan Nur convened a shir of the Habr Yunis and decided to draw lots to settle the dispute with his challenger Madar Hersi rather than continue the senseless infighting that had lasted since Hersi Aman's death. Sultan Nur won the draw and gave Madar Hersi 100 camels as compensation and was proclaimed the uncontested Sultan of the Habr Yunis.British Somaliland by Drake Brockman, pages 79\u201382, 1912. The reunified rule under one Sultan Nur would last until the formation of the Dervish Movement several years later in 1899. Early Dervish Era Sultan Nur & Habar Yunis horsemen 1896 Sultan Nur had been the architect of disturbances at Berbera and was the man who narrated the famous story of French Catholic missionaries in Berbera converting Somali children.Under the flag: and Somali coast stories by Walsh, Langton Prendergast. p. 243Somali Coast administration Report of the protectorate 1892\u20131893, Bombay Castle, NAY, New Delhi According to the consul-general James Hayes Sadler this news was either spread or concocted by Sultan Nur of the Habr Yunis. Madar Hersi his former rival for the Sultan title had aided the Mullahs of Kob Fardod in recovering livestock that was previously looted by some of the Habr Yunis and this reignited after receiving aid from the Mullahs there notably Mohammed Abdullah Hassan.Churchill and the Mad Mullah of Somaliland: Betrayal and Redemption 1899-1921. p. 24 by Roy Irons Correspondence respecting the Rising of Mullah Muhammed Abdullah in Somaliland, and consequent military operations, 1899-1901. P. 4. Upon his visit to Oodweyne in July 1899 Sultan Nur convened a great shir of the western Habr Yunis clans and called on them to join the new Dervish movement and upon their refusal he would leave to Burao and successfully rallied the eastern sections of the clan. The Dervish would declare war from Burao on September 1 of 1899.Correspondence respecting the Rising of Mullah Muhammed Abdullah in Somaliland, and consequent military operations, 1899-1901. P. 8. Madar was soon propagated as the legitimate Sultan by British authorities and managed the western sections of the clan throughout the period of the Dervish wars. Incorporation into British Somaliland Early encounters with Britain started in 1882 duirng which was during the time of Sultan Nur . During his time the British had invaded Yemeni islands, and had a interest for the Habr Yunis and the Isaaq Sultanate due to their rich ports the British would establish them self\u2019s in Berbera the Capital of the HabarAwal.Under the flag: and Somali coast stories by Walsh, Langton Prendergast. p. 243,Somali Coast administration Report of the protectorate 1892\u20131893, Bombay Castle, NAY, New Delhi After establishing a base in Somaliland the British would proceed to attack the Dervish on neighbouring cities such as Taleh. Sultan Nur continued the Dervish Campaign and would be heavily involved as a key figure of the Dervish movement and the main signatory of the Treaty of Illig in 1905 that granted them large tracts of today's Nugaal and the port of Eyl from the Italians to use.Il Benadir, Vico Mantegazza. 1908. pp. 323\u2013324 Following Sultan Nur's death in 1907 he was entombmed in Taleh the headquarters of the movement and his son Dolal Nur was crowned by the Dervish Habr Yunis clans while Sultan Madar who was much more powerful often raided the Ba Awal domain. Later Sultan Dolal Nur died prematurely and was left with no ai Rs however his cousin Jama Hersi succeeded him .British Somaliland by Drake Brockman, pages 82, 1912. Cosmos: communicazioni sui progressi recenti e notevoli della geografia e delle scienze affini di Guido Cora p. 201 With the widespread involvement of the British in the interior against the Dervish the once defacto independent interior clans were brought under British administration and the Habr Yunis Sultanate would end. Economy 300 px|Map of the Daallo Mountain Ranges and coastal Sanaag showing the Musa Arreh (Habar Yunis) settled in Maydh in the year 1860 The Habr Yunis Sultanate had strong economy and controlled two routes to the major port of Berbera leading from the Jerato and Sheikh mountain passes into the Hawd and Ogaden country. The key city of Burao was the Trade was significant and bolstered during the period that a Habr Yunis man Sharmarke Ali Saleh had established himself as Emir of Berbera and Zeila. The eastern sections of the Habr Yunis had coastal access and several ports of their own. They attained a lot of frankincense in the mountains south of Maydh and Harshaw. Arab and Banyan merchants would visit Maydh for commerce before continuing on to the larger ports such as Berbera and Zeila. Maydh was the preeminent export point for large hides the town had dialogue with Berbera with a large amount of cross trade occurring usually by dhow. As well alongside other northern Somalis and Isaaqs in particular, the Habr Yunis were significant traders in Yemen with Frederick Hunter giving an 1877 account of their trade.Hunter, Frederick (1877). An Account of the British Settlement of Aden in Arabia. Cengage Gale. p. 41. Somalis of the Habr Gerhajis tribe arrive from Ogadain with feathers, myrrh, gum, sheep, cattle, and ghee, carrying away in exchange piece goods; they also make four trips in the season; they remain for less than a month, and during their stay reside with fellow-tribesmen, taking their meals in the mokhb\u00e2zah or eating-house. Administration Sultans of the Habr Yunis exercised power both indirectly and directly through allied Akils and leaders of the various subclans of the wider clan and by leading the Habr Yunis in battle against rivals. The seat of Habr Yunis Sultans was deliberately chosen in Wadhan and later Burao along the caravan route in order to have a firm grip on trade and also ensure a steady stream of taxes from passing traders. New information would be passed along these trade routes and the Sultans would be well informed of occurrences as the Somalis have a penchant for being informed about things. Explorer Ricahrd Burton in his 1854 journey to Harar heard from local Somalis who told him the latest reports from the ongoing Crimean War.First Footsteps in East Africa: Or, An Explanation of Harar. Richard Francis Burton, pg 188 The capitals of Wadhan and Burao served as important watering places for both merchants and nomads alike and access to them was crucial for orderly trade from the Hawd and Ogaden regions to Berbera.A Pastoral Democracy: A Study of Pastoralism and Politics Among the Northern Somali of the Horn of Africa, pg.187 According to the current Sultan Osman Ali, the oldest son of a Sultan is the rightful heir, but if he does not fill the requirements another son can be selected. A Sultan has to be religious, an eloquent speaker, courageous, and has to be fertile. A guurti of 40 leading elders from the Habr Yunis subclans would come to make this decision on the successor.Suldaan Cismaan Cali Madar Interview, SAAB TV, 18/05/2017. URL Sultans would receive a yearly tribute or saado of livestock imposed on the rest of the Habr Yunis.The Journal of The anthropological institute of Great Britain and Ireland| Vol.21 p. 161 Journal of the East Africa Natural History Society: Official Publication of the Coryndon Memorial Museum Vol.17 p. 76 Sultan Osman Ali states that the Sultan distributed the livestock amongst the Habr Yunis to the less fortunate and needy as a form of welfare.Suldaan Cismaan Cali Madar Interview, SAAB TV, 18/05/2017. URL Rulers The Habr Yunis Sultanate had 8 rulers throughout it's duration and the institution of Sultan still lasts today with the Baha Deria leading I conflict still not being completely resolved. The Bah Makahil maintain a well respected pretender although the current Sultan Osman Ali Madar of the Baha Deria is considered as the Sultan of the Habr Yunis. NameReign FromReign Till1 Ainasha Hersi (traditional chief)2Sultan Sugulleh Ainasha (first sultan)3Sultan Diriyeh Sultan Sugulleh Ainasha 4Sultan Hersi Aman Sultan Diriyeh5Sultan Nur Ahmed Aman Sultan Diriyeh 6Sultan Awad Sultan Diiriye7Sultan Dolal Sultan Nur8Sultan Madar Hersi Sultan Diiriye Legacy Amongst the Habr Yunis the traditional institution and leadership of the clan survived the British Somaliland period into present times. The Rer Ainashe Sultans although no longer ruling vast territory and with separate Habr Yunis subclans having their own Sultans still remain status the recognized leaders of the Habr Yunis. The current Sultan is Osman Ali Madar who is active in social issues in modern day Somaliland. References", "after_revision": "History Establishment The Habr Yunis Sultanate finds its roots in the Isaaq Sultanate which was established by the Rer Guled branch of the Eidagale after the Isaaq successfully defeated the Absame clan at Lafaruug in the 17th century . With time the Habr Yunis and later the Habr Awal and Habr Je'lo would break from the Isaaq Sultanate with the Habr Yunis forming their own Sultanate led by Sugulle the son of the previous Habr Yunis Cheiftain, Ainanshe URL ISSUES IN REFUGEE RESEARCH Working Paper No. 65 Pastoral society and transnational refugees: population movements in Somaliland and eastern Ethiopia 1988 - 2000 Guido Ambroso, Table 1, pg.5 The Sultan Deria Sugulleh would establish his capital at Wadhan (Waram) near the Sheikh pass and tax and administer the affairs of the Habr Yunis from the town. Large caravans bound for Berbera would pass through Habr Yunis territory through Burao and then Wadhan and proved a lucrative source of income for Sultan Deria.The Transactions of the Bombay Geographical Society 1850, Volume 9, p.133 Expansion and Rayyad War 400px|German Map from 1874 showcasing Sultan Hersi Aman's general location Following Sultan Deria 's death in the 1850s his grandson Hersi Aman would come to succeed him and usher in an era of conquest. Hersi Aman belonged to the Bah Makahil section of the Sugulle dynasty.British Somaliland, by Ralph E. Drake-BrockmanAndrzejewski, B.W. and I.M. Lewis, 1964, Somali Poetry: An Introduction, Oxford University Press, Oxford, p.106 In 1870 he would launch the Rayyad Wars against the Darood of Hawd and Dollo which would continue intermittently from 1870 to 1940 and give birth to a string of poems, the Guba poetic chain, one of the most well-known series in Somali history. At the battle of Haro Dhiig (Lake of Blood) in the Hawd , the victorious Habr Yunis had captured the Sultan of the Rer Haroun Ogaden with many lives lost on both sides. The captured Sultan sent a message to Hersi saying as a notable he should be spared. In response, Hersi replied with Laba Gob Kii Beer Jilicsan Baa Jaba meaning, amongst two counterparts the soft-hearted shall perish and the captive Sultan was subsequently executed.The Unknown Horn of Africa, Frank Linsly James, pg.335 %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < & %%% %DIFDELCMD < & %%% %DIFDELCMD < & %%% First Civil War Despite the great successes of Hersi Aman and new territory acquired, the other branches of the Rer Sugule grew wary of his increasing power as a ruler and stood to challenge him, fearing his unchecked leadership. The wise Guled Haji, another prominent member and elder of the Rer Sugule, had a fallout with Sultan Hersi, and his son was killed by one of Hersis' sons. Hersi's son approached his father and implored him to pay the traditional mag compensation to Guled for the loss of his child. Hersi arrogantly rebuffed his son and all-out conflict would break out between Ba Awal (Hersi's branch) and Baho Sugule branches of the Rer Sugule.War and Peace: An Anthology of Somali literature, p.169 Haji Guled in 1906. The Sultan Hersi himself would be killed in battle after some early clashes and later his commander Warsame would also fall. Warsame's sister lamented to her son Ali for the loss of Hersi, her husband Geid and other relatives in this poem recorded separately by both Phillip Paulitschke and Robecchi Brichetti.Rendiconti by Reale Accademia dei Lincei; Reale Osservatorio del Campidoglio published 1885. Page 228. Frank Linsly James visited Sultan Awad at Burao in 1884 and witnessed the dissenting situation between the two Sultans. Describing the political situation in the region and frequent raids between the two rival Rer Sugulleh factions and their allied Habr Yunis subclans It appeared the great Habr Gerhajis tribe was divided into two rival factions, the one owning allegiance to Sultan Owd, the other to his cousin, Sultan Noor. Between these two the country was about evenly divided, and the border-line was an everlasting scene of wars and rumours of wars, cattle raids, and attempted murders.The Unknown Horn of Africa: An Exploration From Berbera to the Leopard River, 1888 The Haber-Gerhajis tribe had formerly been under one Sultan and were very powerful, making frequent raids into Ogadayn, but on his death, two cousins, Awad and Nur, divided the country between them.Proceedings of the Royal Geographical Society and Monthly Record of Geography, 1885, Volume 7, p.627 Awad was killed fighting in Ogaden by the Reer Ali. This allowed Nur to establish himself at Burao and rule over the entirety of the Habr Yunis. The Baha Deria still did not concede defeat and would eventually chose Awad's nephew, Madar Hersi, as their successor following Nur's death.Journal of the Anthropological Institute of Great Britain and Ireland, Vol. 21, p.161 Sultan Nur convened a shir of the Habr Yunis and decided to draw lots to settle the dispute with his challenger Madar Hersi rather than continue the senseless infighting that had lasted since Hersi Aman's death. Sultan Nur won the draw and gave Madar Hersi 100 camels as compensation and was proclaimed the uncontested Sultan of the Habr Yunis.British Somaliland by Drake Brockman, pages 79\u201382, 1912. The reunified rule under one Sultan Nur would last until the formation of the Dervish Movement several years later in 1899. Early Dervish Era Sultan Nur & Habar Yunis horsemen 1896 Sultan Nur had been the architect of disturbances at Berbera and was the man who narrated the famous story of French Catholic missionaries in Berbera converting Somali children.Under the flag: and Somali coast stories by Walsh, Langton Prendergast. p. 243Somali Coast administration Report of the protectorate 1892\u20131893, Bombay Castle, NAY, New Delhi According to the consul-general James Hayes Sadler this news was either spread or concocted by Sultan Nur of the Habr Yunis. Madar Hersi his former rival for the Sultan title had aided the Mullahs of Kob Fardod in recovering livestock that was previously looted by some of the Habr Yunis and this reignited after receiving aid from the Mullahs there notably Mohammed Abdullah Hassan.Churchill and the Mad Mullah of Somaliland: Betrayal and Redemption 1899-1921. p. 24 by Roy Irons Correspondence respecting the Rising of Mullah Muhammed Abdullah in Somaliland, and consequent military operations, 1899-1901. P. 4. Upon his visit to Oodweyne in July 1899 Sultan Nur convened a great shir of the western Habr Yunis clans and called on them to join the new Dervish movement and upon their refusal he would leave to Burao and successfully rallied the eastern sections of the clan. The Dervish would declare war from Burao on September 1 of 1899.Correspondence respecting the Rising of Mullah Muhammed Abdullah in Somaliland, and consequent military operations, 1899-1901. P. 8. Madar was soon propagated as the legitimate Sultan by British authorities and managed the western sections of the clan throughout the period of the Dervish wars. Incorporation into British Somaliland Sultan Nur continued and would be heavily involved as a key figure of the Dervish movement and the main signatory of the Treaty of Illig in 1905 that granted them large tracts of today's Nugaal and the port of Eyl from the Italians to use.Il Benadir, Vico Mantegazza. 1908. pp. 323\u2013324 Following Sultan Nur's death in 1907 he was entombmed in Taleh the headquarters of the movement and his son Dolal Nur was crowned by the Dervish Habr Yunis clans while Sultan Madar Hersi the more established and powerful of the two eventually would become the uncontested Sultan as Dolal died prematurely in 1917 and left no heirs .British Somaliland by Drake Brockman, pages 82, 1912. With the widespread involvement of the British in the interior against the Dervish the once defacto independent interior clans were brought under British administration and the Habr Yunis Sultanate would end. Economy 300 px|Map of the Daallo Mountain Ranges and coastal Sanaag showing the Musa Arreh (Habar Yunis) settled in Maydh in the year 1860 The Habr Yunis Sultanate had strong economy and controlled two routes to the major port of Berbera leading from the Jerato and Sheikh mountain passes into the Hawd and Ogaden country. The key city of Burao was the Trade was significant and bolstered during the period that a Habr Yunis man Sharmarke Ali Saleh had established himself as Emir of Berbera and Zeila. The eastern sections of the Habr Yunis had coastal access and several ports of their own. They attained a lot of frankincense in the mountains south of Maydh and Harshaw. Arab and Banyan merchants would visit Maydh for commerce before continuing on to the larger ports such as Berbera and Zeila. Maydh was the preeminent export point for large hides the town had dialogue with Berbera with a large amount of cross trade occurring usually by dhow. As well alongside other northern Somalis and Isaaqs in particular, the Habr Yunis were significant traders in Yemen with Frederick Hunter giving an 1877 account of their trade.Hunter, Frederick (1877). An Account of the British Settlement of Aden in Arabia. Cengage Gale. p. 41. Somalis of the Habr Gerhajis tribe arrive from Ogadain with feathers, myrrh, gum, sheep, cattle, and ghee, carrying away in exchange piece goods; they also make four trips in the season; they remain for less than a month, and during their stay reside with fellow-tribesmen, taking their meals in the mokhb\u00e2zah or eating-house. Administration Sultans of the Habr Yunis exercised power both indirectly and directly through allied Akils and leaders of the various subclans of the wider clan and by leading the Habr Yunis in battle against rivals. The seat of Habr Yunis Sultans was deliberately chosen in Wadhan and later Burao along the caravan route in order to have a firm grip on trade and also ensure a steady stream of taxes from passing traders. New information would be passed along these trade routes and the Sultans would be well informed of occurrences as the Somalis have a penchant for being informed about things. Explorer Ricahrd Burton in his 1854 journey to Harar heard from local Somalis who told him the latest reports from the ongoing Crimean War.First Footsteps in East Africa: Or, An Explanation of Harar. Richard Francis Burton, pg 188 The capitals of Wadhan and Burao served as important watering places for both merchants and nomads alike and access to them was crucial for orderly trade from the Hawd and Ogaden regions to Berbera.A Pastoral Democracy: A Study of Pastoralism and Politics Among the Northern Somali of the Horn of Africa, pg.187 According to the current Sultan Osman Ali, the oldest son of a Sultan is the rightful heir, but if he does not fill the requirements another son can be selected. A Sultan has to be religious, an eloquent speaker, courageous, and has to be fertile. A guurti of 40 leading elders from the Habr Yunis subclans would come to make this decision on the successor.Suldaan Cismaan Cali Madar Interview, SAAB TV, 18/05/2017. URL Sultans would receive a yearly tribute or saado of livestock imposed on the rest of the Habr Yunis.The Journal of The anthropological institute of Great Britain and Ireland| Vol.21 p. 161 Journal of the East Africa Natural History Society: Official Publication of the Coryndon Memorial Museum Vol.17 p. 76 Sultan Osman Ali states that the Sultan distributed the livestock amongst the Habr Yunis to the less fortunate and needy as a form of welfare.Suldaan Cismaan Cali Madar Interview, SAAB TV, 18/05/2017. URL Rulers The Habr Yunis Sultanate had eight rulers throughout its duration and the institution of Sultan still lasts today with the Baha Deria leading I conflict still not being completely resolved. The Bah Makahil maintain a well respected pretender although the current Sultan Osman Ali Madar of the Baha Deria is considered as the Sultan of the Habr Yunis. NameReign FromReign Till1 Ainasha Hersi (traditional chief)2Sultan Sugulleh Ainasha (first sultan)3Sultan Diriyeh Sultan Sugulleh Ainasha 4Sultan Hersi Aman Sultan Diriyeh5Sultan Nur Ahmed Aman Sultan Diriyeh 6Sultan Awad Sultan Diiriye7Sultan Dolal Sultan Nur8Sultan Madar Hersi Sultan Diiriye Legacy Amongst the Habr Yunis the traditional institution and leadership of the clan survived the British Somaliland period into present times. The Rer Ainashe Sultans although no longer ruling vast territory and with separate Habr Yunis subclans having their own Sultans still remain status the recognized leaders of the Habr Yunis. The current Sultan is Osman Ali Madar who is active in social issues in modern day Somaliland. References", "edit_actions": [{"type": "R", "before": "Origins", "after": "Establishment", "start_char_pos": 8, "end_char_pos": 15}, {"type": "R", "before": "are part of the Garhajis clan confederation, and are a sub clan of the Isaaq tribe. The founder of the Rer Sugelleh dynasty is Ainashe Hersi a chief of the HabrYunis. Ethnographie Nordost-afrikas pp.45. Philip Paulitscheke. Publisher: D. Reimer. 1893Ainashe was the son of Ismail Arre a Habar Yunis noblemen, and a women of the Ali Sayid clan . He had seven brothers: Said, Fahiya, Hildid, Warsame, Yusuf, Ali and Abdi whom they shared the same mother and are together known as the Ba Ali in reference to their mother's clan.Tribes of British Somaliland, 1941, pp. 10. later in", "after": "Sultanate finds its roots in the Isaaq Sultanate which was established by the Rer Guled branch of the Eidagale after the Isaaq successfully defeated the Absame clan at Lafaruug in", "start_char_pos": 31, "end_char_pos": 608}, {"type": "D", "before": "Ainashe was elected to be the Tribal Ugaas of the Habar Yunis clan. As was the norm of Somali chieftains, Ainanshe had multiple wives. His first wife belonged to the Jibrahil clan and was the mother of his eldest son Sugulle who proceeded to establish the Habar Yunis sultanate. Sugelleh was part of the Ba Jibrhil Rer Sugulle which is the ruling tribe of the Habar Yunis. Ainanshe's other wives Mun, Basla and Egalo bore him 16 sons who are collectively known as the Baha Ainanshe.Genealogies of the Somal. Eyre and Spottiswoode (London). 1896.", "after": null, "start_char_pos": 626, "end_char_pos": 1171}, {"type": "R", "before": "Establishment After the fall of the Adal Sultanate many successor states were established in Somaliland such as the Habar Yunis and Isaaq Sultanate. Before this The whole of the Isaaq clan were ruled by the Habar Jelo or Toljeclo dynasty. The Tol Jeclo claim descent from sheikh Isaaq\u2019s Harari wife. After a devastating reign Garad Dhuh Barar of the Habar Je\u2019clo was defeated and the Somali Isaaqs gained independence from the Harari branch of the Isaaq . After gaining independence the Isaaq Sultanate got into conflict with the Darood Absame, and penetrated deep in their territory, whilst this was happening Isaaq clans were rebelling, and the opportunist Habr Yunis broke of the United Isaaq Sultanate . the Habar Yunis Ugaazte developed into a large independent kingdom, and influenced many Darood, and Isaaq clans. The Habar Yunis established their kingdom under Sugulleh", "after": ". With time the Habr Yunis and later the Habr Awal and Habr Je'lo would break from the Isaaq Sultanate with the Habr Yunis forming their own Sultanate led by Sugulle the son of the previous Habr Yunis Cheiftain, Ainanshe", "start_char_pos": 1172, "end_char_pos": 2049}, {"type": "R", "before": "Sugelleh\u2019s successor Deria Sugulleh established", "after": "The Sultan Deria Sugulleh would establish his capital at", "start_char_pos": 2244, "end_char_pos": 2291}, {"type": "D", "before": "as the political-military-economic centre for his people which was", "after": null, "start_char_pos": 2307, "end_char_pos": 2373}, {"type": "R", "before": "\u2019s death a Great War broke out between the different branches of the Reer Sugelleh, Hiwever the young ambitious Hersi Aman proclaimed him self as Sultan in the 1850\u2019s. Hersi was a smart man, and was ready for conflict with any tribe. Hersi", "after": "'s death in the 1850s his grandson Hersi Aman would come to succeed him and usher in an era of conquest. Hersi", "start_char_pos": 2820, "end_char_pos": 3059}, {"type": "R", "before": "modern day Haud (Ethiopia)", "after": "the Hawd", "start_char_pos": 3573, "end_char_pos": 3599}, {"type": "A", "before": null, "after": "had", "start_char_pos": 3628, "end_char_pos": 3628}, {"type": "R", "before": "noble", "after": "notable", "start_char_pos": 3766, "end_char_pos": 3771}, {"type": "D", "before": "Hersi then resumed his conquest and penetrated further into Ogaden lands taking Dollo. In Dollo Hersi occupied, and invaded grazing lands and wells, as well as thousands of camels, he then proceeded to invade the lands of other Darood clans such as the Reer Cabdalle and Reer Makahil forcing them to flee to Hiraan. Ali Dhuh referred to these wars as the Guba wars due to the defeat of the Ogaden clans.", "after": null, "start_char_pos": 4029, "end_char_pos": 4432}, {"type": "D", "before": "Ethiopia,and British influence over the Habar Yunis Whilst Hersi was invading Ogaden the British and Ethiopian empires were getting worried due to the Habar Yunis expansion. The Ethiopians saw the Ogaden as their servants and gateway to Muslim territory. Whilst the British saw Ogaden as a major state, and kept their eye on the province, and would later invade it in 1887. Upon one occasion Hersi raided Ogaden, and took 1330 camels from the Ogaden, however the British and Ethiopians warned them and told them to return the camels to their owners. The Habr Yunis knowing they couldn\u2019t afford a fight with a foreign power obliged, and returned the camels and promised to not lead any raids in Ogaden. Despite their promise they continued to raid Ogaden.", "after": null, "start_char_pos": 4433, "end_char_pos": 5187}, {"type": "D", "before": "Historian sigebery Uhlig commenting on the Guba poems writes the following:", "after": null, "start_char_pos": 5217, "end_char_pos": 5292}, {"type": "D", "before": "From a historical point of view Ali dhuhs poem explicitly details the large gains in traditionally Ogaden territory and wells, and the looting of Ogaden camels by the Isaq. He details the scatterring of the Ogaden clan, their forced migration southwards seeking refuge in the feverish river valleys, and even turning to hunting and farming- measures that were again considered very shameful usually only undertaken by slaves and low-caste Somalis and utterly demeaning for the once great pastoral Ogaden clan. The Ogaden, Ali recounts, have been forced to accept refuge with the clans that defeated them, especially the Habr Yunis, and cannot take revenge. The Isaq are portrayed as particularly callous and shameful in the way they parade looted Ogaden camels in front of their previous owners. Even in translation it is a very evocative poem\".", "after": null, "start_char_pos": 5293, "end_char_pos": 6138}, {"type": "D", "before": "Dhulbahante war After defeating every threat in eastern Ethiopia the Habr Yunis looked east and focus on the Darood clans that inhabited eastern Somali-land, such as the Dhulbahante, and Warsangli, the Habr Yunis were much more powerful than these clans this conflicted resulted in the Habar Yunis looting Dhulbhante territory taking camels and land. The Dhulbahante put up no resistance, and feared the Habr Gerhajis (Habr Yunis) so much so that they didn\u2019t even avenge their casualties and instead intermarried with the Habr Yunis. The Ismail Arreh clan which were part of the Habr Yunis expanded from Berbera to Gulay, whilst the Muse Arreh Expanded far in to Warsangli Territory, and served as a border between the Habr Yunis and Majeerteen (Majeerteen Sultanate). Hersi is one of the most notable sultans and was a great king that penetrated far into Ogaden (Darood). Hersi influenced Zeila which were ran by the Gadabuursi,and Habar Awal sultanates. .", "after": null, "start_char_pos": 6168, "end_char_pos": 7125}, {"type": "D", "before": "Reer Samatar (Gadabuursi War) German explorer Felix Rosen who visited British Somaliland and Ethiopian Empire in 1907 met and discussed with the Somalis in the area and was told about Hersi and other legendary figures who had died in the decades prior. One such story was the battle between Sultan Hersi", "after": null, "start_char_pos": 7126, "end_char_pos": 7429}, {"type": "D", "before": "the famed warrior Kirh of the Rer Samatar subclan. Sultan Hersi's powerful section of Rer Ammaan had been raided by Kirh and his Rer Samatar. Given the fierce reputation of their target, Kirh's companions were uneasy and fled after the raid, leaving Kirh for dead. His wife began to mourn alongside his kinsmen but to everyone's surprise, Kirh had survived the wilderness and emerged with 100 camels he had captured. This feat impressed Hersi and there was no attempt to recover the lost stock.", "after": null, "start_char_pos": 7448, "end_char_pos": 7942}, {"type": "D", "before": "Kirh recited a boastful gabay O yalahe hoi, o yalahe hoi, yalahe My, our lore of death has spread through all tribes near and far And we felt so safe that we spurned the camels with the lance to prick our mark of possession Let the animals move slowly so that the camel fillings do not become tired At the time when the cowards among our companions took flight and the hiding places Then the lion's mane grew around our shoulders My wife! little was our Seriba; I have filled ten Serbs for you Come, now fill the milk baskets; we have plundered the tribe of AmmanWhen fighting would eventually resume, Hersi called out inquiring where Kirh was in the heat of battle. In response, a spear flew and grazed the Sultan's head. Hersi grabbed the spear which Kirh had thrown and returned the favour piercing through Kirh's famed horse and embedding deep in Kirh. He would escape the battlefield despite the wound leaving Hersi and the Rer Ammaan victorious having killing one", "after": null, "start_char_pos": 7943, "end_char_pos": 8912}, {"type": "D", "before": "capturing another man named Hashi.", "after": null, "start_char_pos": 8931, "end_char_pos": 8965}, {"type": "D", "before": "Hersi now answered the previous gabay and mocked his opponent How Kirh first bragged so much - now his speeches are silent! Once the Samatar tribe was large and rich, now it is small and become poor Now their caravans are afraid, even a day's march from Amud to go so far! We killed one of their men, we caught one of them, and one we drove the lance through the body Tell us, according to the truth, O Hashi! About which of the three you mourn the most that we like from your tribe?Hashi having being challenged by the Sultan spoke That you killed one of our men was by fate Predestined that you captured me does no harm But no mother has ever given birth to a hero like KirhHersi being moved by these words spared Hashi from the usual deadly fate of a captive instead giving him a fine horse and sent medicines", "after": null, "start_char_pos": 8966, "end_char_pos": 9778}, {"type": "D", "before": "gifts with Hashi to deliver to Kirh. Kirh would return the favour finally reconciling the feud.", "after": null, "start_char_pos": 9797, "end_char_pos": 9892}, {"type": "R", "before": "War continued with the Rer Sugeleh and the Ba Awal, one of the Ba Awal warriors Warsame attacked the Rer Sugeleh and killed three men, he also captured a respected young noblemen named Jama Amume Jama was the grandson of Deria Sugulleh Ainashe. Due to his Nobility he was released, later Jama then led a battle against the Ba Awal, Jama severely wounded Warsame. He then praised his horse Hamar who had performed well, and recited the following poem. Rendiconti by Reale Accademia dei Lincei; Reale Osservatorio del Campidoglio published 1885. Page 227-228.Col aloosan Xamarow haddii xalay la ugaanshay Heensaha hadddaan kugu itibay goor aleyl dhexe ah Indhaalaha haddaan kuu xidh-xidhay suuman la adkeeyay Isha bari hadii loo kiciyo awrtii reer Sugule Kuwii lays aqoon jiray haddii lagu ogaan duulay Abaanduule Guuleed (Guled Haji) hadii ubaxa loo gooyay Waa boqor agtiisa'e hadday \"ililidii\" yeedh'dhay Usha Daba-xidh ooddiyo haddii laysu wada giijay Eebada haddii laysku riday ilig-jartii hooto Abdikayba intii hore hadaan dabo adeegaayay Kolku ina qolyaeedkii sidii aarka nagu qayshay Anigoo aqoon jirin haddii lay ogeysiiyay Onkad baxay la moodyow kolkan amarka qaadsiiyay Doc aroorka uguma tago orodka saydhshaaye Oogada hadduu igala maray agabarkuu joogo Anna Awlaxaan siday haddaan oofta midig gooyay Kol haddaan Warsame aayiroon Baho agoonteeyay Kol haddaan ugaaskii ka dilay u ololiyeynaayay Kol hadaan ka oon baxay afku aramigu jiifay Alxamdu lilaa Eebaw haddaan umalkii qaar reebayHersi died in that battle and later", "after": "The Sultan Hersi himself would be killed in battle after some early clashes and later his commander", "start_char_pos": 10628, "end_char_pos": 12156}, {"type": "R", "before": "Early encounters with Britain started in 1882 duirng which was during the time of Sultan Nur . During his time the British had invaded Yemeni islands, and had a interest for the Habr Yunis and the Isaaq Sultanate due to their rich ports the British would establish them self\u2019s in Berbera the Capital of the HabarAwal.Under the flag: and Somali coast stories by Walsh, Langton Prendergast. p. 243,Somali Coast administration Report of the protectorate 1892\u20131893, Bombay Castle, NAY, New Delhi After establishing a base in Somaliland the British would proceed to attack the Dervish on neighbouring cities such as Taleh. Sultan Nur continued the Dervish Campaign", "after": "Sultan Nur continued", "start_char_pos": 16023, "end_char_pos": 16682}, {"type": "R", "before": "who was much more powerful often raided the Ba Awal domain. Later Sultan Dolal Nur died prematurely and was left with no ai Rs however his cousin Jama Hersi succeeded him", "after": "Hersi the more established and powerful of the two eventually would become the uncontested Sultan as Dolal died prematurely in 1917 and left no heirs", "start_char_pos": 17129, "end_char_pos": 17299}, {"type": "D", "before": "Cosmos: communicazioni sui progressi recenti e notevoli della geografia e delle scienze affini di Guido Cora p. 201", "after": null, "start_char_pos": 17355, "end_char_pos": 17470}, {"type": "R", "before": "8 rulers throughout it's", "after": "eight rulers throughout its", "start_char_pos": 21344, "end_char_pos": 21368}], "sents_char_pos": [0, 114, 197, 233, 254, 276, 375, 556, 693, 760, 904, 998, 1108, 1133, 1165, 1320, 1410, 1471, 1716, 1992, 2462, 2623, 2987, 3053, 3124, 3525, 3709, 3792, 3974, 4115, 4344, 4432, 4606, 4687, 4806, 4982, 5134, 5187, 5465, 5802, 5949, 6088, 6138, 6518, 6701, 6936, 7040, 7378, 7498, 7589, 7712, 7864, 7942, 8381, 8404, 8469, 8609, 8665, 8799, 8965, 9089, 9238, 9375, 9449, 9833, 9892, 10122, 10277, 10404, 10552, 10627, 10872, 10990, 11078, 11120, 11171, 11185, 11460, 11521, 11533, 11548, 11563, 11574, 11588, 11602, 11620, 11636, 11647, 11659, 11670, 11692, 12181, 12367, 12408, 12459, 12589, 12896, 13063, 13344, 13496, 13589, 13730, 14027, 14160, 14216, 14340, 14575, 14873, 15132, 15356, 15625, 15690, 15816, 15984, 16340, 16640, 16901, 16929, 17188, 17301, 17354, 17679, 18002, 18182, 18272, 18353, 18478, 18629, 18806, 18831, 18887, 19054, 19095, 19235, 19452, 19658, 19833, 19973, 20033, 20263, 20538, 20624, 20734, 20792, 20896, 21245, 21303, 21501, 21662, 22101, 22291, 22386]}
+{"doc_id": "67038728", "revision_depth": "2", "before_revision": "BeRider is the provider of shared electric scooters in the capital city of the Czech Republic, Prague . The service was officially launched on September 3, 2019. This electromobility project comes from the innovation center \u0160KODA AUTO DigiLab. The service is intended for users aged 18 and over who hold a driving license of category A, A1, A2, or B. The rental of the scooter is also subject to registration via the BeRider app, which is available for both Android and iOS. BeRider scooters are located throughout the city within the BeRider zone and users can reserve, unlock and rent them all via the BeRider app. History BeRider has been officially launched on September 3, 2019. The project was preceded by analysis to identify how scooter sharing should work properly in Prague. The long-term task of \u0160KODA AUTO DigiLab is to find eco-friendly solutions in the field of micromobility and project BeRider thus contributes to transforming \u0160KODA AUTO into a company delivering smart mobility solutions according to the motto SIMPLY CLEVER . The pilot phase of the project was ended on December 16, 2019. During those 3 months of operation of 150 electric scooters, more than 23 000 reservations were made , which marked a complete success and the Board of Directors of \u0160KODA AUTO decided to continue the project in the following years . The 2020 season started on March 1. At that time, the COVID-19 pandemic began in the Czech Republic. BeRider joined the #SKODAAUTOPomaha initiative in April 2020 and provided its electric scooters to health care professionals for more than a month completely free of charge. More than 300 doctors, nurses, and other medical staff took advantage of this offer. All other users were also able to ride for free for a week at the end of April 2020. In June 2020, BeRider introduced a new application to simplify the use of the service. The same month, BeRider organized its first scooter school under the guidance of a professional instructor in order to prepare users for safe driving in urban traffic. In July 2020, BeRider launched its own e-shop offering helmets, scooter gloves, discounted minute packages, and scooter school vouchers, as well as masks with the BeRider logo. In August 2020, BeRider launched a new service \u2013 mountain bike rental called BeRider Bikes offering classic and electric bikes for adults and children along with accessories such as helmets, gloves, etc. In order to rent a bike , it is necessary to have a BeRider account . In 2017 there were 350,000 users of shared scooters worldwide and by 2019, this number had increased to 5 000,000. This increasing demand was also reflected in the Czech market and BeRider thus expanded its fleet in August 2020. Thanks to the increasing popularity, BeRider was also able to maintain the service over the winter period. Usage The use of BeRider electric scooters is subject to age of majority, the possession of a driving license of category A, A1, A2, or B, and the ownership of a smartphone where the user downloads the BeRider app for free from Google Play or App Store. Then, the user needs to register and during the registration process enters his/her contact details, uploads photos of his/her ID and driving license and fills in the payment card details. This is followed by a validation process, which may take up to 24 hours . Once the account is approved , the user gets 15 free minutes and can start riding. When the user opens the app , there is a map with the precise locations of individual scooters. The user has the option to reserve the selected scooterfor 15 minutes for free. Once the user reaches the scooter , he/she unlocks it by pressing START in the mobile appand can now access the tailbox with two helmets (size M and L). After getting the helmet the user should adjust the mirrors, get the scooter off the stand, switch the red button to the ON position, and press the right brake lever to activate the scooter. The ride can be finished only in the BeRider zone which is marked with gray in the user application. If the user wants to stop outside of the zone, he/she has the option to switch the rideto a pause . After parking, the user returns the helmet back to the tailbox, puts the scooter back on the stand, and finishes the ride in the app. Price The first minute of every ride is free so that you have time to securely put on your helmet and adjust the mirrors . Each additional minute costs 5 CZK in the regular fare cost. The user has an option to purchase a discounted package of prepaid minutes in the app . The price can therefore be significantly reduced to 2,9 CZK per minute. After the completion of the ride , the user is either deducted the relevant price from his payment card or is deducted the relevant number of minutes from the prepaid package. Technical parameters BrandTorrotModelMuviMotorElectricPower3 kWMax. speed66 km/hRange70 kmWeight with battery93 kgMax. load150 kgSeats2Helmets2 (Size M and L)Wheels16\u201dBrakesCBS (Combined braking system) %DIFDELCMD < %DIFDELCMD < %%% Reviews The BeRider app has been downloaded more than 100,000 times. In App Store, it is rated 4.9/5 based on reviews from more than 1650 users. In Google Play where the app scored 4.8/5, it was reviewed by 600 users (as of January 21, 2021).", "after_revision": "BeRider is the provider of shared electric scooters in the capital city of Prague, Czech Republic . The service was officially launched on September 3, 2019. The electromobility project comes from \u0160koda Auto DigiLab. The service is intended for users aged 18 and over who hold a driving license of category A, A1, A2, or B. BeRider scooters are located throughout the city within the BeRider zone . Users can register and then reserve, unlock and rent them via the BeRider app. History BeRider was officially launched on September 3, 2019. The project was preceded by analysis to identify how scooter sharing should work properly in Prague. \u0160koda Auto DigiLab worked to find eco-friendly solutions in the field of micromobility and project BeRider was able to deliver a smart mobility solution . The pilot phase of the project ended on December 16, 2019. During those three months of operation of 150 electric scooters, more than 23 , 000 reservations were made . The pilot was deemed a success and the Board of Directors of \u0160koda Auto decided to continue the project . The 2020 season started on March 1. At that time, the COVID-19 pandemic began in the Czech Republic. As a result, BeRider provided its electric scooters to health care professionals for more than a month completely free of charge. More than 300 doctors, nurses, and other medical staff took advantage of this offer. All other users were also able to ride for free for a week at the end of April 2020. In June 2020, BeRider introduced a new application to simplify the use of the service. In the same month, BeRider organized its first scooter school under the guidance of a professional instructor in order to prepare users for safe driving in urban traffic. In July 2020, BeRider launched its own online shop offering helmets, scooter gloves, discounted minute packages, scooter school vouchers, and masks with the BeRider logo. In August 2020, BeRider launched a new service \u2013 a mountain bike rental called BeRider Bikes offering classic and electric bikes for adults and children along with accessories such as helmets, gloves, etc. A BeRider account is needed to rent a bike . In 2017 , there were 350,000 users of shared scooters worldwide and by 2019, this number had increased to 5 , 000,000. This increasing demand was also reflected in the Czech market and BeRider thus expanded its fleet in August 2020. Due to the increasing popularity, BeRider was also able to maintain its service over the winter period. Usage The use of BeRider electric scooters is subject to age of majority, the possession of a driving license of category A, A1, A2, or B, and the ownership of a smartphone with the BeRider app downloaded. To register for an account, users must provide their contact details, photos of their ID and driving license , and payment card details. After their account is approved, which can take up to 24 hours , the user is given 15 free minutes and can start riding. A map in the app provides the precise locations for each individual scooter. Once an available scooter is reached, the user can unlock it by pressing a button in the app. The user can then also access the tailbox which provides helmets in two sizes. The ride can be finished only in the BeRider zone which is marked with gray in the user application. If the user wants to stop outside of the zone, they have the option to pause the ride . After parking, the user returns the helmet back to the tailbox, puts the scooter back on the stand, and finishes the ride in the app. The first minute of every ride is free . Each additional minute costs 5 CZK in the regular fare cost. The user has an option to purchase a discounted package of prepaid minutes in the app , which reduces the price to 2.9 CZK per minute. After the ride is completed, the price is deducted from the user's payment card or the minutes are deducted from the prepaid package. Technical parameters BrandTorrotModelMuviMotorElectricPower3 kWMax. speed66 km/hRange70 kmWeight with battery93 kgMax. load150 kgSeats2Helmets2 (Size M and L)Wheels16\u201dBrakesCBS (Combined braking system) %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "R", "before": "the Czech Republic, Prague", "after": "Prague, Czech Republic", "start_char_pos": 75, "end_char_pos": 101}, {"type": "R", "before": "This", "after": "The", "start_char_pos": 162, "end_char_pos": 166}, {"type": "R", "before": "the innovation center \u0160KODA AUTO", "after": "\u0160koda Auto", "start_char_pos": 202, "end_char_pos": 234}, {"type": "D", "before": "The rental of the scooter is also subject to registration via the BeRider app, which is available for both Android and iOS.", "after": null, "start_char_pos": 351, "end_char_pos": 474}, {"type": "R", "before": "and users can", "after": ". Users can register and then", "start_char_pos": 548, "end_char_pos": 561}, {"type": "D", "before": "all", "after": null, "start_char_pos": 592, "end_char_pos": 595}, {"type": "R", "before": "has been", "after": "was", "start_char_pos": 633, "end_char_pos": 641}, {"type": "R", "before": "The long-term task of \u0160KODA AUTO DigiLab is", "after": "\u0160koda Auto DigiLab worked", "start_char_pos": 785, "end_char_pos": 828}, {"type": "R", "before": "thus contributes to transforming \u0160KODA AUTO into a company delivering smart mobility solutions according to the motto SIMPLY CLEVER", "after": "was able to deliver a smart mobility solution", "start_char_pos": 910, "end_char_pos": 1041}, {"type": "D", "before": "was", "after": null, "start_char_pos": 1075, "end_char_pos": 1078}, {"type": "R", "before": "3", "after": "three", "start_char_pos": 1120, "end_char_pos": 1121}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1181, "end_char_pos": 1181}, {"type": "R", "before": ", which marked a complete", "after": ". The pilot was deemed a", "start_char_pos": 1209, "end_char_pos": 1234}, {"type": "R", "before": "\u0160KODA AUTO", "after": "\u0160koda Auto", "start_char_pos": 1273, "end_char_pos": 1283}, {"type": "D", "before": "in the following years", "after": null, "start_char_pos": 1316, "end_char_pos": 1338}, {"type": "R", "before": "BeRider joined the #SKODAAUTOPomaha initiative in April 2020 and", "after": "As a result, BeRider", "start_char_pos": 1442, "end_char_pos": 1506}, {"type": "R", "before": "The", "after": "In the", "start_char_pos": 1873, "end_char_pos": 1876}, {"type": "R", "before": "e-shop", "after": "online shop", "start_char_pos": 2080, "end_char_pos": 2086}, {"type": "D", "before": "and", "after": null, "start_char_pos": 2149, "end_char_pos": 2152}, {"type": "R", "before": "as well as", "after": "and", "start_char_pos": 2178, "end_char_pos": 2188}, {"type": "A", "before": null, "after": "a", "start_char_pos": 2267, "end_char_pos": 2267}, {"type": "R", "before": "In order", "after": "A BeRider account is needed", "start_char_pos": 2423, "end_char_pos": 2431}, {"type": "D", "before": ", it is necessary to have a BeRider account", "after": null, "start_char_pos": 2447, "end_char_pos": 2490}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2501, "end_char_pos": 2501}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2600, "end_char_pos": 2600}, {"type": "R", "before": "Thanks", "after": "Due", "start_char_pos": 2724, "end_char_pos": 2730}, {"type": "R", "before": "the", "after": "its", "start_char_pos": 2795, "end_char_pos": 2798}, {"type": "R", "before": "where the user downloads the BeRider app for free from Google Play or App Store. Then, the user needs to register and during the registration process enters his/her", "after": "with the BeRider app downloaded. To register for an account, users must provide their", "start_char_pos": 3004, "end_char_pos": 3168}, {"type": "R", "before": "uploads photos of his/her", "after": "photos of their", "start_char_pos": 3186, "end_char_pos": 3211}, {"type": "R", "before": "and fills in the", "after": ", and", "start_char_pos": 3235, "end_char_pos": 3251}, {"type": "R", "before": "This is followed by a validation process, which may", "after": "After their account is approved, which can", "start_char_pos": 3274, "end_char_pos": 3325}, {"type": "D", "before": ". Once the account is approved", "after": null, "start_char_pos": 3346, "end_char_pos": 3376}, {"type": "R", "before": "gets", "after": "is given", "start_char_pos": 3388, "end_char_pos": 3392}, {"type": "R", "before": "When the user opens the app , there is a map with", "after": "A map in the app provides", "start_char_pos": 3431, "end_char_pos": 3480}, {"type": "R", "before": "of individual scooters. The user has the option to reserve the selected scooterfor 15 minutes for free. Once the user reaches the scooter , he/she unlocks", "after": "for each individual scooter. Once an available scooter is reached, the user can unlock", "start_char_pos": 3503, "end_char_pos": 3657}, {"type": "R", "before": "START in the mobile appand can now", "after": "a button in the app. The user can then also", "start_char_pos": 3673, "end_char_pos": 3707}, {"type": "R", "before": "with two helmets (size M and L). After getting the helmet the user should adjust the mirrors, get the scooter off the stand, switch the red button to the ON position, and press the right brake lever to activate the scooter.", "after": "which provides helmets in two sizes.", "start_char_pos": 3727, "end_char_pos": 3950}, {"type": "R", "before": "he/she has", "after": "they have", "start_char_pos": 4099, "end_char_pos": 4109}, {"type": "R", "before": "switch the rideto a pause", "after": "pause the ride", "start_char_pos": 4124, "end_char_pos": 4149}, {"type": "D", "before": "Price", "after": null, "start_char_pos": 4286, "end_char_pos": 4291}, {"type": "D", "before": "so that you have time to securely put on your helmet and adjust the mirrors", "after": null, "start_char_pos": 4331, "end_char_pos": 4406}, {"type": "R", "before": ". The price can therefore be significantly reduced to 2,9", "after": ", which reduces the price to 2.9", "start_char_pos": 4556, "end_char_pos": 4613}, {"type": "R", "before": "completion of the ride , the user is either deducted the relevant price from his", "after": "ride is completed, the price is deducted from the user's", "start_char_pos": 4640, "end_char_pos": 4720}, {"type": "R", "before": "is deducted the relevant number of minutes", "after": "the minutes are deducted", "start_char_pos": 4737, "end_char_pos": 4779}, {"type": "D", "before": "Reviews The BeRider app has been downloaded more than 100,000 times. In App Store, it is rated 4.9/5 based on reviews from more than 1650 users. In Google Play where the app scored 4.8/5, it was reviewed by 600 users (as of January 21, 2021).", "after": null, "start_char_pos": 5039, "end_char_pos": 5281}], "sents_char_pos": [0, 103, 161, 243, 350, 474, 616, 683, 784, 1043, 1106, 1340, 1376, 1441, 1615, 1700, 1785, 1872, 2040, 2217, 2422, 2492, 2609, 2723, 2830, 3084, 3273, 3347, 3430, 3526, 3606, 3759, 3950, 4051, 4151, 4285, 4469, 4557, 4629, 4805, 5107, 5183]}
+{"doc_id": "671288", "revision_depth": "1", "before_revision": "Shambel Abebe Bikila (; August 7, 1932 \u2013 October 25, 1973) was an Ethiopian marathon runner who was a back-to-back Olympic marathon champion. He is the first black African Olympic gold medalist , winning his first gold medal at the 1960 Summer Olympics in Rome while running barefoot. At the 1964 Tokyo Olympics, he won his second gold medal. In turn, he became the first athlete to successfully defend an Olympic marathon title. In both victories, he ran in world record time. Born in Shewa, Abebe moved to Addis Ababa around 1952 and joined the 5th Infantry Regiment of the Ethiopian Imperial Guard, an elite infantry division that safeguarded the Emperor of Ethiopia. Enlisting as a soldier before his athletic career, he rose to the rank of shambel (captain). Abebe participated in a total of sixteen marathons. He placed second on his first marathon in Addis Ababa, won twelve other races, and finished fifth in the 1963 Boston Marathon. In July 1967, he sustained the first of several sports-related leg injuries that prevented him from finishing his last two marathons. Abebe was a pioneer in long-distance running. Mamo Wolde, Juma Ikangaa, Tegla Loroupe, Paul Tergat, and Haile Gebrselassie\u2014all recipients of the New York Road Runners' Abebe Bikila Award\u2014are a few of the athletes who have followed in his footsteps to establish East Africa as a force in long-distance running. On March 22, 1969, Abebe was paralysed due to a car accident. He regained some upper-body mobility, but he never walked again. While he was receiving medical treatment in England, Abebe competed in archery and table tennis at the 1970 Stoke Mandeville Games in London. Those Games were an early predecessor of the Paralympic Games. He competed in both sports at a 1971 competition for the disabled in Norway and won its cross-country sleigh-riding event. Abebe died at age 41 on October 25, 1973, of a cerebral hemorrhage related to his accident four years earlier. He received a state funeral, and Emperor Haile Selassie declared a national day of mourning. Many schools, venues, and events, including Abebe Bikila Stadium in Addis Ababa, are named after him. He is the subject of biographies and films documenting his athletic career, and he is often featured in publications about the marathon and the Olympics. Early life Abebe with wife Yewebdar and one of his children Abebe Bikila was born on August 7, 1932, in the small community of Jato, then part of the Selale District of Shewa. His birthday coincided with the 1932 Los Angeles Olympic Marathon . Abebe was the son of Wudinesh Beneberu and her second husband, Demissie. During the Second Italo-Ethiopian War (1935\u20131937), his family was forced to move to the remote town of Gorro. By then, Wudinesh had divorced Abebe's father and married Temtime Kefelew. The family eventually moved back to Jato (or nearby Jirru), where they had a farm. Due to Rome's blistering heat, the race started in late-afternoon at the foot of the Capitoline Hill staircase and finished at night at the Arch of Constantine, just outside the Colosseum. The course twice passed Piazza di Porta Capena, where the Obelisk of Axum was then located. When the runners passed the Obelisk the first time, Abebe was at the rear of the lead pack, which included Great Britain's Arthur Keily, Moroccan Rhadi Ben Abdesselam, Ireland's Bertie Messitt, and Belgian Aur\u00e8le Vandendriessche. Abebe and ben Abdesselam remained together until the last . Nearing the Obelisk again, Abebe sprinted to the finish. In the early-evening darkness, his path along the Appian Way was lined with Italian soldiers holding torches. Abebe's winning time was 2:15:16.2, twenty-five seconds faster than ben Abdesselam at 2:15:41.6, and breaking Popov's world record by eight tenths of a second. Immediately after crossing the finish line Abebe began to touch his toes and run in place, and later said that he could have run another . 1960\u201364 alt=Haile Selassie awards the Star of Ethiopia to Abebe in the Green Salon of the emperor's palace.|Emperor Haile Selassie confers the Star of Ethiopia on Abebe after his victory in the Olympic marathon, 1960. Abebe returned to his homeland a hero. He was greeted by a large crowd, many dignitaries and the commander of the Imperial Guard, Brigadier-General Mengistu Neway. Abebe was paraded through the streets of Addis Ababa along a procession route lined with thousands of people and presented to Emperor Haile Selassie. The emperor awarded him the Star of Ethiopia and promoted him to the rank of asiraleqa (corporal). He was given the use of a chauffeur-driven Volkswagen Beetle (since he did not yet know how to drive) and a home, both owned by the Guard . On December 13, 1960, while Haile Selassie was on a state visit to Brazil, Imperial Guard forces led by Mengistu began an unsuccessful coup and briefly proclaimed Selassie's eldest son Asfaw Wossen Taffari emperor. Fighting took place in the heart of Addis Ababa, shells detonated in the Jubilee Palace, and many of those closest to the emperor were killed. Although Abebe was not directly involved, he was briefly arrested and questioned. Mengistu was later hanged, and his forces (which included many members of the Imperial Guard) were killed in the fighting, arrested or fled. In the 1961 Athens Classical Marathon, Abebe again won while running barefoot. This was the second and last event in which he competed barefooted. The same year he won the marathons in Osaka and Ko\u0161ice. While in Japan, he was approached by a Japanese shoe company, Onitsuka Tiger, with the possibility of wearing its shoes; they were informed by Niskanen that Abebe had \"other commitments . \" Kihachiro Onitsuka suspected that Abebe had a secret sponsorship deal with Puma, in spite of the now-abandoned rules against such deals. alt=1964 Olympic marathon through the streets of Tokyo, won by Abebe|thumbtime=103|Universal Newsreel footage of the 1964 Olympic Men's Marathon 1964 Tokyo Olympics Forty days before the 1964 Summer Olympics in Tokyo, Abebe began to feel pain while training in Debre Zeit. He was brought to the hospital and diagnosed with acute appendicitis, and had an appendectomy on September 16. Back on his feet in a few days, Abebe left the hospital within a week. Abebe entered the Olympic stadium alone, to the cheers of 75,000 spectators. The crowd had been listening on the radio and anticipated his triumphant entrance. Abebe finished with a time of 2:12:11.2, four minutes and eight seconds ahead of silver medalist Basil Heatley of Great Britain, who passed Tsuburaya inside the stadium. Tsuburaya was third, a few seconds behind Heatley. Abebe did not appear exhausted after the finish, and he again performed a routine of calisthenics, which included touching \"his toes twice then [lying] down on his back, cycling his legs in the air . \" He was the first runner to successfully defend an Olympic marathon title. Abebe and Waldemar Cierpinski are the only athletes to have won two gold medals in the event, and they both did it back-to-back. For the second time, Abebe received Ethiopia's only gold medal and again returned home to a hero's welcome. The emperor promoted him to the commissioned-officer rank of metoaleqa (lieutenant). Abebe received the Order of Menelik II, a Volkswagen Beetle and a house. Plaque commemorating Abebe on the Via di San Gregorio in Rome|alt=A plaque on a wall in Rome, describing Abebe's victoryOn October 25, 1973, Abebe died in Addis Ababa at age 41 of a cerebral hemorrhage, a complication related to his accident four years earlier. He was buried with full military honours; his state funeral was attended by an estimated 65,000 people including Emperor Haile Selassie, who proclaimed a day of mourning for the country's national hero. Abebe is interred in a tomb with a bronze statue at Saint Joseph Church in Addis Ababa. alt=Lightweight blue shoe with individual toes|Vibram's \"Bikila\" shoes According to Abebe's New York Times obituary, Abebe and Yewebdar had three sons, along with their daughter Tsige. In 2010, the Italian company Vibram introduced the \"Bikila\" model of its FiveFingers line of minimalist shoes. In February 2015, Abebe's surviving children Teferi, Tsige and Yetnayet Abebe Bikila, along with their mother, filed a lawsuit in United States federal court in Tacoma, Washington, claiming Vibram violated federal law and the state's Personality Rights Act. The case was dismissed in October 2016 on the grounds that the plaintiffs were aware of Vibram's use of the name in 2011, but did not file suit until four years later. According to judge Ronald Leighton, \" ... this unreasonable delay prejudiced Vibram.\" It came to light in December 2019 that the family of Abebe received his Olympic ring that he lost at the Tokyo Olympic stadium's bathroom. Abebe left his winning ring in a bathroom after he won the olympic medal. A woman who was working in the bathroom at that time took it home with her. The woman has since died, but her son said his mom later regretted taking the ring and was waiting for an opportunity to return it. He gave the ring to Yetnayet, son of the late Abebe, when Yetnayet came to Kasama City in Japan in December 2019 as a guest of honor for the half marathon competition conducted in honor of his father. In popular culture alt=Painting of 12 events in Abebe's life|Folk art depicting Abebe's life Abebe has been featured in several documentaries about his life and the Olympics in general. His victory at the 1964 Olympics was featured in the 1965 documentary, Tokyo Olympiad directed by Kon Ichikawa. Footage from that film was recycled in the 1976 thriller, Marathon Man directed by John Schlesinger and starring Dustin Hoffman. Abebe was the subject of Bud Greenspan's 1972 documentary, The Ethiopians. The documentary was incorporated into The Marathon , a 1976 episode of Greenspan's The Olympiad television documentary series. The Marathon , which chronicles Abebe's two Olympic victories, ends with a dedication ceremony for a gymnasium named in Abebe's honour shortly before his death. In 1992, Yamada Kazuhiro published the first full biography about Abebe, written in Japanese and published in Tokyo; it was entitled Do you remember Abebe? (). Since then, there have been at least three biographical works based on his life. Among these is Triumph and Tragedy, written in English by his daughter Tsige Abebe and published in Addis Ababa in 1996. The other two, also written in English, are Paul Rambali's 2007 fictional biographical novel Barefoot Runner and Tim Judah's 2009 Bikila: Ethiopia's Barefoot Olympian. According to the journalist Tim Lewis's comparative review of the two books, Judah's is a more journalistic, less-forgiving biography of Abebe. It refutes the mythical aspects of his life but recognises Abebe's athletic accomplishments. Judah's account of Abebe's life differs significantly from Rambali's, but confirms (and frequently cites) Tsige's biography. For example, Lewis cites the discrepancy in the circumstances surrounding Abebe's car accident: Representing 1956 Armed Forces championship Addis Ababa, Ethiopia 1960 Armed Forces championship Addis Ababa, Ethiopia 2:39:50 Olympic Trials Addis Ababa, Ethiopia 2:21:23 Olympic Games Rome, Italy 2:15:16.21961 Athens International Marathon Athens, Greece 2:23:44.6 Mainichi Marathon Osaka, Japan 2:29:27 Ko\u0161ice Marathon Ko\u0161ice, Czechoslovakia 2:20:12.0 1963 Boston Marathon Boston, USA 2:24:43a1964 Armed Forces championship Addis Ababa, Ethiopia 2:23:14.8 Olympic Trials Addis Ababa, Ethiopia 2:16:18.8 Olympic Games Tokyo, Japan 2:12:11.2 1965 Mainichi Marathon Shiga Prefecture, Japan 2:22:55.81966 Zarautz International Marathon Zarautz, Spain 2:20:28.8 Incheon\u2013Seoul Marathon Seoul, South Korea 2:17:04a 1967 Zarautz International Marathon Zarautz, Spain 1968 Olympic Games Mexico City, Mexico", "after_revision": "Shambel Abebe Bikila (; August 7, 1932 \u2013 October 25, 1973) was an Ethiopian marathon runner who was a back-to-back Olympic marathon champion. He is the first black African Olympic gold medallist , winning his first gold medal at the 1960 Summer Olympics in Rome while running barefoot. At the 1964 Tokyo Olympics, he won his second gold medal. In turn, he became the first athlete to successfully defend an Olympic marathon title. In both victories, he ran in world record time. Born in Shewa, Abebe moved to Addis Ababa around 1952 and joined the 5th Infantry Regiment of the Ethiopian Imperial Guard, an elite infantry division that safeguarded the emperor of Ethiopia. Enlisting as a soldier before his athletic career, he rose to the rank of shambel (captain). Abebe participated in a total of sixteen marathons. He placed second on his first marathon in Addis Ababa, won twelve other races, and finished fifth in the 1963 Boston Marathon. In July 1967, he sustained the first of several sports-related leg injuries that prevented him from finishing his last two marathons. Abebe was a pioneer in long-distance running. Mamo Wolde, Juma Ikangaa, Tegla Loroupe, Paul Tergat, and Haile Gebrselassie\u2014all recipients of the New York Road Runners' Abebe Bikila Award\u2014are a few of the athletes who have followed in his footsteps to establish East Africa as a force in long-distance running. On March 22, 1969, Abebe was paralysed due to a car accident. He regained some upper-body mobility, but he never walked again. While he was receiving medical treatment in England, Abebe competed in archery and table tennis at the 1970 Stoke Mandeville Games in London. Those games were an early predecessor of the Paralympic Games. He competed in both sports at a 1971 competition for the disabled in Norway and won its cross-country sleigh-riding event. Abebe died at age 41 on October 25, 1973, of a cerebral hemorrhage related to his accident four years earlier. He received a state funeral, and Emperor Haile Selassie declared a national day of mourning. Many schools, venues, and events, including Abebe Bikila Stadium in Addis Ababa, are named after him. He is the subject of biographies and films documenting his athletic career, and he is often featured in publications about the marathon and the Olympics. Early life Abebe with wife Yewebdar and one of his children Abebe Bikila was born on August 7, 1932, in the small community of Jato, then part of the Selale District of Shewa. His birthday coincided with the 1932 Los Angeles Olympic marathon . Abebe was the son of Wudinesh Beneberu and her second husband, Demissie. During the Second Italo-Ethiopian War (1935\u20131937), his family was forced to move to the remote town of Gorro. By then, Wudinesh had divorced Abebe's father and married Temtime Kefelew. The family eventually moved back to Jato (or nearby Jirru), where they had a farm. Due to Rome's blistering heat, the race started in late-afternoon at the foot of the Capitoline Hill staircase and finished at night at the Arch of Constantine, just outside the Colosseum. The course twice passed Piazza di Porta Capena, where the Obelisk of Axum was then located. When the runners passed the obelisk the first time, Abebe was at the rear of the lead pack, which included Great Britain's Arthur Keily, Moroccan Rhadi Ben Abdesselam, Ireland's Bertie Messitt, and Belgian Aur\u00e8le Vandendriessche. Abebe and ben Abdesselam remained together until the last . Nearing the obelisk again, Abebe sprinted to the finish. In the early-evening darkness, his path along the Appian Way was lined with Italian soldiers holding torches. Abebe's winning time was 2:15:16.2, twenty-five seconds faster than ben Abdesselam at 2:15:41.6, and breaking Popov's world record by eight tenths of a second. Immediately after crossing the finish line Abebe began to touch his toes and run in place, and later said that he could have run another . 1960\u201364 alt=Haile Selassie awards the Star of Ethiopia to Abebe in the Green Salon of the emperor's palace.|Emperor Haile Selassie confers the Star of Ethiopia on Abebe after his victory in the Olympic marathon, 1960. Abebe returned to his homeland a hero. He was greeted by a large crowd, many dignitaries and the commander of the Imperial Guard, Brigadier-General Mengistu Neway. Abebe was paraded through the streets of Addis Ababa along a procession route lined with thousands of people and presented to Emperor Haile Selassie. The Emperor awarded him the Star of Ethiopia and promoted him to the rank of asiraleqa (corporal). He was given the use of a chauffeur-driven Volkswagen Beetle (since he did not yet know how to drive) and a home, both owned by the guard . On December 13, 1960, while Haile Selassie was on a state visit to Brazil, Imperial Guard forces led by Mengistu began an unsuccessful coup and briefly proclaimed Selassie's eldest son Asfaw Wossen Taffari emperor. Fighting took place in the heart of Addis Ababa, shells detonated in the Jubilee Palace, and many of those closest to the Emperor were killed. Although Abebe was not directly involved, he was briefly arrested and questioned. Mengistu was later hanged, and his forces (which included many members of the Imperial Guard) were killed in the fighting, arrested or fled. In the 1961 Athens Classical Marathon, Abebe again won while running barefoot. This was the second and last event in which he competed barefooted. The same year he won the marathons in Osaka and Ko\u0161ice. While in Japan, he was approached by a Japanese shoe company, Onitsuka Tiger, with the possibility of wearing its shoes; they were informed by Niskanen that Abebe had \"other commitments \" . Kihachiro Onitsuka suspected that Abebe had a secret sponsorship deal with Puma, in spite of the now-abandoned rules against such deals. alt=1964 Olympic marathon through the streets of Tokyo, won by Abebe|thumbtime=103|Universal Newsreel footage of the 1964 Olympic Men's marathon 1964 Tokyo Olympics Forty days before the 1964 Summer Olympics in Tokyo, Abebe began to feel pain while training in Debre Zeit. He was brought to the hospital and diagnosed with acute appendicitis, and had an appendectomy on September 16. Back on his feet in a few days, Abebe left the hospital within a week. Abebe entered the Olympic stadium alone, to the cheers of 75,000 spectators. The crowd had been listening on the radio and anticipated his triumphant entrance. Abebe finished with a time of 2:12:11.2, four minutes and eight seconds ahead of silver medallist Basil Heatley of Great Britain, who passed Tsuburaya inside the stadium. Tsuburaya was third, a few seconds behind Heatley. Abebe did not appear exhausted after the finish, and he again performed a routine of calisthenics, which included touching \"his toes twice then [lying] down on his back, cycling his legs in the air \" . He was the first runner to successfully defend an Olympic marathon title. Abebe and Waldemar Cierpinski are the only athletes to have won two gold medals in the event, and they both did it back-to-back. For the second time, Abebe received Ethiopia's only gold medal and again returned home to a hero's welcome. The Emperor promoted him to the commissioned-officer rank of metoaleqa (lieutenant). Abebe received the Order of Menelik II, a Volkswagen Beetle and a house. Plaque commemorating Abebe on the Via di San Gregorio in Rome|alt=A plaque on a wall in Rome, describing Abebe's victory On October 25, 1973, Abebe died in Addis Ababa at age 41 of a cerebral hemorrhage, a complication related to his accident four years earlier. He was buried with full military honours; his state funeral was attended by an estimated 65,000 people including Emperor Haile Selassie, who proclaimed a day of mourning for the country's national hero. Abebe is interred in a tomb with a bronze statue at Saint Joseph Church in Addis Ababa. alt=Lightweight blue shoe with individual toes|Vibram's \"Bikila\" shoes According to Abebe's New York Times obituary, Abebe and Yewebdar had three sons, along with their daughter Tsige. In 2010, the Italian company Vibram introduced the \"Bikila\" model of its FiveFingers line of minimalist shoes. In February 2015, Abebe's surviving children Teferi, Tsige and Yetnayet Abebe Bikila, along with their mother, filed a lawsuit in United States federal court in Tacoma, Washington, claiming Vibram violated federal law and the state's Personality Rights Act. The case was dismissed in October 2016 on the grounds that the plaintiffs were aware of Vibram's use of the name in 2011, but did not file suit until four years later. According to judge Ronald Leighton, \" this unreasonable delay prejudiced Vibram.\" It came to light in December 2019 that the family of Abebe received his Olympic ring that he lost at the Tokyo Olympic stadium's bathroom. Abebe left his winning ring in a bathroom after he won the Olympic medal. A woman who was working in the bathroom at that time took it home with her. The woman has since died, but her son said his mom later regretted taking the ring and was waiting for an opportunity to return it. He gave the ring to Yetnayet, son of the late Abebe, when Yetnayet came to Kasama City in Japan in December 2019 as a guest of honour for the half marathon competition conducted in honour of his father. In popular culture alt=Painting of 12 events in Abebe's life|Folk art depicting Abebe's life Abebe has been featured in several documentaries about his life and the Olympics in general. His victory at the 1964 Olympics was featured in the 1965 documentary, Tokyo Olympiad directed by Kon Ichikawa. Footage from that film was recycled in the 1976 thriller, Marathon Man directed by John Schlesinger and starring Dustin Hoffman. Abebe was the subject of Bud Greenspan's 1972 documentary, The Ethiopians. The documentary was incorporated into \"The Marathon\" , a 1976 episode of Greenspan's The Olympiad television documentary series. \"The Marathon\" , which chronicles Abebe's two Olympic victories, ends with a dedication ceremony for a gymnasium named in Abebe's honour shortly before his death. In 1992, Yamada Kazuhiro published the first full biography about Abebe, written in Japanese and published in Tokyo; it was entitled Do You Remember Abebe? (). Since then, there have been at least three biographical works based on his life. Among these is Triumph and Tragedy, written in English by his daughter Tsige Abebe and published in Addis Ababa in 1996. The other two, also written in English, are Paul Rambali's 2007 fictional biographical novel Barefoot Runner and Tim Judah's 2009 Bikila: Ethiopia's Barefoot Olympian. According to the journalist Tim Lewis's comparative review of the two books, Judah's is a more journalistic, less-forgiving biography of Abebe. It refutes the mythical aspects of his life but recognises Abebe's athletic accomplishments. Judah's account of Abebe's life differs significantly from Rambali's, but confirms (and frequently cites) Tsige's biography. For example, Lewis cites the discrepancy in the circumstances surrounding Abebe's car accident: Representing 1956 Armed Forces championship Addis Ababa, Ethiopia 1960 Armed Forces championship Addis Ababa, Ethiopia 2:39:50 Olympic Trials Addis Ababa, Ethiopia 2:21:23 Olympic Games Rome, Italy 2:15:16.21961 Athens International Marathon Athens, Greece 2:23:44.6 Mainichi Marathon Osaka, Japan 2:29:27 Ko\u0161ice Marathon Ko\u0161ice, Czechoslovakia 2:20:12.0 1963 Boston Marathon Boston, US 2:24:43a1964 Armed Forces championship Addis Ababa, Ethiopia 2:23:14.8 Olympic Trials Addis Ababa, Ethiopia 2:16:18.8 Olympic Games Tokyo, Japan 2:12:11.2 1965 Mainichi Marathon Shiga Prefecture, Japan 2:22:55.81966 Zarautz International Marathon Zarautz, Spain 2:20:28.8 Incheon\u2013Seoul Marathon Seoul, South Korea 2:17:04a 1967 Zarautz International Marathon Zarautz, Spain 1968 Olympic Games Mexico City, Mexico", "edit_actions": [{"type": "R", "before": "medalist", "after": "medallist", "start_char_pos": 185, "end_char_pos": 193}, {"type": "R", "before": "Emperor", "after": "emperor", "start_char_pos": 650, "end_char_pos": 657}, {"type": "R", "before": "Games", "after": "games", "start_char_pos": 1662, "end_char_pos": 1667}, {"type": "R", "before": "Marathon", "after": "marathon", "start_char_pos": 2535, "end_char_pos": 2543}, {"type": "R", "before": "Obelisk", "after": "obelisk", "start_char_pos": 3196, "end_char_pos": 3203}, {"type": "R", "before": "Obelisk", "after": "obelisk", "start_char_pos": 3470, "end_char_pos": 3477}, {"type": "R", "before": "emperor", "after": "Emperor", "start_char_pos": 4460, "end_char_pos": 4467}, {"type": "R", "before": "Guard", "after": "guard", "start_char_pos": 4687, "end_char_pos": 4692}, {"type": "R", "before": "emperor", "after": "Emperor", "start_char_pos": 5032, "end_char_pos": 5039}, {"type": "D", "before": ".", "after": null, "start_char_pos": 5665, "end_char_pos": 5666}, {"type": "A", "before": null, "after": ".", "start_char_pos": 5669, "end_char_pos": 5669}, {"type": "R", "before": "Marathon", "after": "marathon", "start_char_pos": 5943, "end_char_pos": 5951}, {"type": "R", "before": "medalist", "after": "medallist", "start_char_pos": 6510, "end_char_pos": 6518}, {"type": "D", "before": ".", "after": null, "start_char_pos": 6841, "end_char_pos": 6842}, {"type": "A", "before": null, "after": ".", "start_char_pos": 6845, "end_char_pos": 6845}, {"type": "R", "before": "emperor", "after": "Emperor", "start_char_pos": 7161, "end_char_pos": 7168}, {"type": "R", "before": "victoryOn", "after": "victory On", "start_char_pos": 7428, "end_char_pos": 7437}, {"type": "D", "before": "...", "after": null, "start_char_pos": 8628, "end_char_pos": 8631}, {"type": "R", "before": "olympic", "after": "Olympic", "start_char_pos": 8874, "end_char_pos": 8881}, {"type": "R", "before": "honor", "after": "honour", "start_char_pos": 9224, "end_char_pos": 9229}, {"type": "R", "before": "honor", "after": "honour", "start_char_pos": 9277, "end_char_pos": 9282}, {"type": "R", "before": "The Marathon", "after": "\"The Marathon\"", "start_char_pos": 9838, "end_char_pos": 9850}, {"type": "R", "before": "The Marathon", "after": "\"The Marathon\"", "start_char_pos": 9927, "end_char_pos": 9939}, {"type": "R", "before": "you remember", "after": "You Remember", "start_char_pos": 10224, "end_char_pos": 10236}, {"type": "R", "before": "USA", "after": "US", "start_char_pos": 11460, "end_char_pos": 11463}], "sents_char_pos": [0, 23, 141, 284, 342, 429, 477, 670, 763, 815, 942, 1076, 1122, 1386, 1448, 1513, 1655, 1718, 1841, 1952, 2045, 2147, 2301, 2477, 2618, 2728, 2803, 2886, 3075, 3167, 3397, 3514, 3624, 3784, 4031, 4141, 4180, 4305, 4455, 4554, 4694, 4909, 5052, 5134, 5275, 5354, 5422, 5478, 5599, 6079, 6261, 6338, 6421, 6591, 6642, 6919, 7048, 7156, 7241, 7314, 7576, 7618, 7779, 8052, 8163, 8421, 8589, 8675, 8814, 8888, 8964, 9096, 9297, 9483, 9595, 9724, 9799, 9926, 10087, 10204, 10328, 10449, 10617, 10761, 10854, 10979, 11075, 11197, 11242, 11276, 11335, 11376]}
+{"doc_id": "67211775", "revision_depth": "2", "before_revision": "The current designated Cities of Crafts and Folk Arts of UNESCO are: Al-Ahsa, Saudi Arabia Aregua, Paraguay Aswan, Egypt Ayacucho, Peru Baguio City, Philippines, for its varied traditions in weaving, woodcarving, silver crafting, and tattooing and tattoo art. Ballarat, Australia, for its historical and modern reputation as a melting pot for various forms and traditions of Indigenous Australian art. Bamiyan, Afghanistan, for its unique history of crafts influenced by Muslim and Buddhist cultures that are still practiced in the area today.Bandar Abbas, Iran Barcelos, Portugal Biella, Italy Cairo, Egypt Caldas da Rainha, Portugal Carrara, Italy, for its world-renowned white marble that has influenced Carrara's development as a center of crafts in Tuscany and in Italy.Chiang Mai, Thailand, for its history as a trade center and a region of cultural diversity that has influenced a craft culture of pottery, silverwork, woodcarving, silk embroidery, and lacquerware. Chordeleg, Ecuador, for its unique precious metal work, footwear manufacturing, pottery, and toquilla straw weaving that has been passed down through generations through oral tradition. Dur\u00e1n, Ecuador, for its long history of syncretism between urban art and murals and traditional Ecuadorian art and craft. Fabriano, Italy, for its status as a center for crafts such as pottery, weaving, blacksmithing, and paper making since the 12th century. Gabrovo, Bulgaria Hangzhou, China Icheon, South Korea, for its historical and modern status as the center of Korea's ceramic and pottery crafting. Isfahan, Iran Jacmel, Haiti Jaipur, India, for its historical crafts of jewelry making, carving, and painting that have been a center of trade since the early 18th century, with 53,500 workshops practicing these crafts today. Jingdezhen, China Jinju, South Korea Joao Pessoa, Brazil Kanazawa, Japan Kargopol, Russia, for its traditional textile embroidery, artisanal wood and bark carving, and clay-fired colored figures known as Kargopol toys, all of which form the most important sector of the city's economy today. K\u00fctahya, Turkey Limoges, France Lumbumbashi, Democratic Republic of the Congo, for the unique copper and malachite crafts created in the city, with over 50 workshops dedicated to malachite carving. Madaba, Jordan, for the largest number of mosaics discovered in their original location in the world, including its Byzantine and Umayyad mosaics and the oldest-surviving description of the Holy Land. Nassau, Bahamas, for the Bahamian cultural and creative traditions of straw weaving and Junkanoo craftmaking formed from a blend of Indigenous and African cultural traditions. Ouagadougou, Burkina Faso, for its traditional craft of bronze and copper casting and crafting that forms a major sector of the city's economy even today. Paducah, Kentucky, United States, for its history and contributions to the craft of quilt making in the United States. Pekalongan, Indonesia, for the cultural history and importance of Batik crafts and cloths to the city and its identity. Porto-Novo, Benin, for the history and unique practice of various crafts such as wickerwork, blacksmithing, pottery, and manufacturing of musical instruments in the city, with 42 historical craft guilds in the city.San Cristobal de las Casas, Mexico, for its preservation of Indigenous Mexican crafts and arts such as embroidery, pottery, blacksmithing, woodcarving, and amber craftmaking.Santa Fe, New Mexico, United States, for its Native American crafts of jewelry, pottery, and weaving and the trade fairs in these crafts that have become an integral part of the city's identity. Sharjah, United Arab Emirates Sheki, Azerbaijan, for its status as the center of silk production and textiles in the Caucasus, as well as other traditional crafts such as wood-framed stained glass and pottery. Sokod\u00e9, Togo Sukhothai, Thailand, for its culturally important artisanal products of gold and silver ornaments, textile weaving, and ceramic and Sangkhalok wares. Suzhou, China, for its history and culture of crafts in embroidery, carving, papermaking, painting, printing, and calligraphy. Tamba-Sasayama, Japan Tetouan, Morocco Trinidad, Cuba Tunis, Tunisia", "after_revision": "The current designated Cities of Crafts and Folk Arts of UNESCO are: +CityCountryYearNotesAl-Ahsa2015Aregu\u00e12019Aswan2005Ayacucho2019Baguio2017Varied traditions in weaving, woodcarving, silver crafting, and tattooing and tattoo art. Ballarat2019Historical and modern reputation as a melting pot for various forms and traditions of Indigenous Australian art. Bamyan2015Unique history of crafts influenced by Muslim and Buddhist cultures that are still practiced in the area today.Bandar Abbas2019Barcelos2017Biella2019Cairo2017Caldas da Rainha2019Carrara2017World-renowned white marble that has influenced Carrara's development as a center of crafts in Tuscany and in Italy.Chiang Mai2017History as a trade center and a region of cultural diversity that has influenced a craft culture of pottery, silverwork, woodcarving, silk embroidery, and lacquerware. Chordeleg2017Unique precious metal work, footwear manufacturing, pottery, and toquilla straw weaving that has been passed down through generations through oral tradition. Dur\u00e1n2015Long history of syncretism between urban art and murals and traditional Ecuadorian art and craft. Fabriano2013Status as a center for crafts such as pottery, weaving, blacksmithing, and paper making since the 12th century. Gabrovo2017Hangzhou2012Icheon2010Historical and modern status as the center of Korea's ceramic and pottery crafting. Isfahan2015Jacmel2014Jaipur2015Historical crafts of jewelry making, carving, and painting that have been a center of trade since the early 18th century, with 53,500 workshops practicing these crafts today. Jingdezhen2014Jinju2019Joao Pessoa2017Kanazawa2009Kargopol2019Traditional textile embroidery, artisanal wood and bark carving, and clay-fired colored figures known as Kargopol toys, all of which form the most important sector of the city's economy today. K\u00fctahya2017Limoges2017Lumbumbashi2015Unique copper and malachite crafts created in the city, with over 50 workshops dedicated to malachite carving. Madaba2017Largest number of mosaics discovered in their original location in the world, including its Byzantine and Umayyad mosaics and the oldest-surviving description of the Holy Land. Nassau2014Bahamian cultural and creative traditions of straw weaving and Junkanoo craftmaking formed from a blend of Indigenous and African cultural traditions. Ouagadougou2017Traditional craft of bronze and copper casting and crafting that forms a major sector of the city's economy even today. Paducah2013History and contributions to the craft of quilt making in the United States. Pekalongan2014Cultural history and importance of Batik crafts and cloths to the city and its identity. Porto-Novo2017History and unique practice of various crafts such as wickerwork, blacksmithing, pottery, and manufacturing of musical instruments in the city, with 42 historical craft guilds in the city.San Cristobal de Las Casas2015Preservation of Indigenous Mexican crafts and arts such as embroidery, pottery, blacksmithing, woodcarving, and amber craftmaking.Santa Fe2005Native American crafts of jewelry, pottery, and weaving and the trade fairs in these crafts that have become an integral part of the city's identity. Sharjah2019Sheki2017Status as the center of silk production and textiles in the Caucasus, as well as other traditional crafts such as wood-framed stained glass and pottery. Sokod\u00e92017Sukhothai2019Culturally important artisanal products of gold and silver ornaments, textile weaving, and ceramic and Sangkhalok wares. Suzhou2014History and culture of crafts in embroidery, carving, papermaking, painting, printing, and calligraphy. Tamba-Sasayama2015Tetouan2017Trinidad2019Tunis2017Viljandi2019", "edit_actions": [{"type": "R", "before": "Al-Ahsa, Saudi Arabia Aregua, Paraguay Aswan, Egypt Ayacucho, Peru Baguio City, Philippines, for its varied", "after": "+CityCountryYearNotesAl-Ahsa2015Aregu\u00e12019Aswan2005Ayacucho2019Baguio2017Varied", "start_char_pos": 69, "end_char_pos": 176}, {"type": "R", "before": "Ballarat, Australia, for its historical", "after": "Ballarat2019Historical", "start_char_pos": 260, "end_char_pos": 299}, {"type": "R", "before": "Bamiyan, Afghanistan, for its unique", "after": "Bamyan2015Unique", "start_char_pos": 402, "end_char_pos": 438}, {"type": "R", "before": "Abbas, Iran Barcelos, Portugal Biella, Italy Cairo, Egypt Caldas da Rainha, Portugal Carrara, Italy, for its world-renowned", "after": "Abbas2019Barcelos2017Biella2019Cairo2017Caldas da Rainha2019Carrara2017World-renowned", "start_char_pos": 550, "end_char_pos": 673}, {"type": "R", "before": "Mai, Thailand, for its history", "after": "Mai2017History", "start_char_pos": 782, "end_char_pos": 812}, {"type": "R", "before": "Chordeleg, Ecuador, for its unique", "after": "Chordeleg2017Unique", "start_char_pos": 973, "end_char_pos": 1007}, {"type": "R", "before": "Dur\u00e1n, Ecuador, for its long", "after": "Dur\u00e1n2015Long", "start_char_pos": 1159, "end_char_pos": 1187}, {"type": "R", "before": "Fabriano, Italy, for its status", "after": "Fabriano2013Status", "start_char_pos": 1281, "end_char_pos": 1312}, {"type": "R", "before": "Gabrovo, Bulgaria Hangzhou, China Icheon, South Korea, for its historical", "after": "Gabrovo2017Hangzhou2012Icheon2010Historical", "start_char_pos": 1418, "end_char_pos": 1491}, {"type": "R", "before": "Isfahan, Iran Jacmel, Haiti Jaipur, India, for its historical", "after": "Isfahan2015Jacmel2014Jaipur2015Historical", "start_char_pos": 1565, "end_char_pos": 1626}, {"type": "R", "before": "Jingdezhen, China Jinju, South Korea Joao Pessoa, Brazil Kanazawa, Japan Kargopol, Russia, for its traditional", "after": "Jingdezhen2014Jinju2019Joao Pessoa2017Kanazawa2009Kargopol2019Traditional", "start_char_pos": 1791, "end_char_pos": 1901}, {"type": "R", "before": "K\u00fctahya, Turkey Limoges, France Lumbumbashi, Democratic Republic of the Congo, for the unique", "after": "K\u00fctahya2017Limoges2017Lumbumbashi2015Unique", "start_char_pos": 2083, "end_char_pos": 2176}, {"type": "R", "before": "Madaba, Jordan, for the largest", "after": "Madaba2017Largest", "start_char_pos": 2281, "end_char_pos": 2312}, {"type": "R", "before": "Nassau, Bahamas, for the Bahamian", "after": "Nassau2014Bahamian", "start_char_pos": 2482, "end_char_pos": 2515}, {"type": "R", "before": "Ouagadougou, Burkina Faso, for its traditional", "after": "Ouagadougou2017Traditional", "start_char_pos": 2658, "end_char_pos": 2704}, {"type": "R", "before": "Paducah, Kentucky, United States, for its history", "after": "Paducah2013History", "start_char_pos": 2813, "end_char_pos": 2862}, {"type": "R", "before": "Pekalongan, Indonesia, for the cultural", "after": "Pekalongan2014Cultural", "start_char_pos": 2932, "end_char_pos": 2971}, {"type": "R", "before": "Porto-Novo, Benin, for the history", "after": "Porto-Novo2017History", "start_char_pos": 3052, "end_char_pos": 3086}, {"type": "R", "before": "las Casas, Mexico, for its preservation", "after": "Las Casas2015Preservation", "start_char_pos": 3284, "end_char_pos": 3323}, {"type": "R", "before": "Fe, New Mexico, United States, for its Native", "after": "Fe2005Native", "start_char_pos": 3447, "end_char_pos": 3492}, {"type": "R", "before": "Sharjah, United Arab Emirates Sheki, Azerbaijan, for its status", "after": "Sharjah2019Sheki2017Status", "start_char_pos": 3636, "end_char_pos": 3699}, {"type": "R", "before": "Sokod\u00e9, Togo Sukhothai, Thailand, for its culturally", "after": "Sokod\u00e92017Sukhothai2019Culturally", "start_char_pos": 3846, "end_char_pos": 3898}, {"type": "R", "before": "Suzhou, China, for its history", "after": "Suzhou2014History", "start_char_pos": 4009, "end_char_pos": 4039}, {"type": "R", "before": "Tamba-Sasayama, Japan Tetouan, Morocco Trinidad, Cuba Tunis, Tunisia", "after": "Tamba-Sasayama2015Tetouan2017Trinidad2019Tunis2017Viljandi2019", "start_char_pos": 4136, "end_char_pos": 4204}], "sents_char_pos": [0, 259, 401, 543, 775, 972, 1158, 1280, 1417, 1564, 1790, 2082, 2280, 2481, 2657, 2812, 2931, 3051, 3267, 3441, 3635, 3845, 4008, 4135]}
+{"doc_id": "67411003", "revision_depth": "1", "before_revision": "Officially, the planning of the E40 waterway is still at an early stage, but in Ukraine, strategic documents are already being prepared and individual project parts are being implemented. In particular, in 2020, the Pripyat River was dredged within the exclusion zone URL The implementation of the E40 project has attracted considerable criticism from international and local public organizations in all three countries, as well as experts in the biological and environmental URL The international campaign \"STOP E40\" against the implementation of the waterway project has been URL According to experts of scientific institutions of the Republic of Belarus, the construction of the waterway will have a significant negative impact on the natural and cultural heritage of Polesia, on the well-being of the population of Polesia (1), as well as on the global carbon URL hydrological and URL situations, URL transport development. There are alternative scenarios for the construction of the E40 for the development of Polesia and transport links between Ukraine, Poland and Belarus. First of all, it is about the reorientation of the Polesia region to the ecotourism industry. This was confirmed by a study conducted by Aivar Ruukel, the member of the board of the Global Ecotourism Network and a tour operator in the Soomaa National Park, URL The press has repeatedly made statements that the E40 waterway is a restoration of an ancient transport route \"from Varangians to the URL URL URL but these claims have no scientific URL The story of the project In 1996 in Geneva European Agreement on Main Inland Waterways of International Importance (AGN). Geneva, 19 January 1996 was signed. This list also includes E40 URL (\"\u0415\" is a category of Inland waterway of international significance. The numbers 10, 20, 30, 40, and 50, which grow from west to east, are assigned to the main roads, mostly north-south, that connect one sea basin to another). The map of the E40 path first appeared in a document (white paper) United Nations Economic Commission for Europe (UNECE) \"White Paper on the progress, accomplishment and future of sustainable inland water URL and was published separately on the resources of the UNECE URL Although some sections of the ship's course already exist, the scale of the proposed new development is so global that, according to experts, an environmental disaster in the region is highly URL February 6, 2020 Minister of Infrastructure of Ukraine Vladislav Krikliy stated that \u00abthe project to restore the E-40 river route has reached the stage of practical URL On November 25, 2020, the Cabinet of Ministers of Ukraine approved the draft Agreement between the Cabinet of Ministers of Ukraine and the Government of the People\u2019s Republic of China a on strengthening cooperation in the field of infrastructure construction and authorized the Minister of Infrastructure Vladislav Krikliy to sign this URL This opens the way for the project's lobbyists to obtain Chinese loans for the construction of the E40 and increases the risks of neglecting environmental principles when considering an E40 financing agreement. On December 11, 2020, the website State Agency of Ukraine for Exclusion Zone Management published the Announcement of the publication of the Strategy for the development of the exclusion zone in 2021-2030. The draft strategy contains section 5.9. Development of transport infrastructure, which is entirely devoted to lobbying for the construction of the E40 through the exclusion URL After critical statements of public URL State Agency of Ukraine for Exclusion Zone Management promised to exclude this section from the strategy. The public campaign \"Save Polesia\" wants to draw the attention of the governments of Belarus, Poland, Ukraine and the European Parliament to the threat to the valuable natural territories of Polesia and to demonstrate that any decisions on the construction of the E40 waterway project should be made with the active participation of the public and independent experts. According to the coalition members, the E40 waterway project has dubious economic value and clearly poses a serious threat to nature. At the same time, the virgin territory of Polesia has great potential for promoting ecotourism, strengthening local business and sustainable development of the entire region. In September 2020, leading European environmental organizations sent an open letter to the President of Ukraine, Vladimir Zelensky. In their address, they expressed serious concern about the start of construction of the Baltic-Black Sea URL Economic indicators of the project according to the calculations of the developers The cost of the construction of the canal is $ 12 billion. According to the project's lobbyists, the creation of the E-40 will allow to transport up to 4 million tons of cargo annually. This will revive trade between Poland, Belarus and Ukraine, whose total markets are almost 100 million URL According to the feasibility study, river transport makes it possible to transport large volumes of cargo. Thus, a 900-ton platform barge replaces 18 wagons or 45 twenty-ton trucks. The E40 channel is planned to transport millions of tons of cargo that will sail from the project countries (coal, ore, metal, potash fertilizers, table salt, sugar, crushed stone, peat, timber, sapropels, etc.) to the EU and further around the world. There is a hope to see ships with the flags of the Scandinavian countries on the route. In addition, the E-40 will provide significant time savings for carriers operating in the Central and Eastern European regions. Currently, the Rhine-Main-Danube connection (3,100 km) is used for cargo delivery in this direction. However, the E-40 is shorter than this connection by almost 1,000 kilometers (2,205 km). This means shortening the journey by 2-4 days at an average speed of 10-20 km/h for river cargo vessels. The asset also includes potential cross-border river cruises URL Economic indicators of the project according to the calculations of other economists The feasibility study of the E40 project was analyzed by Belarusian specialists of three professional associations: \"Business Union of Entrepreneurs and Employers named after prof. M. S. Kunyavsky\", \"Republican Union of Industrialists and Entrepreneurs\", \"Belarusian Scientific and Industrial Association\". This analysis revealed numerous miscalculations and outright mistakes of the authors of the feasibility study. In particular, the deputy director of the Union of Entrepreneurs and Employers named after Professor M. S. Kunyavsky Ales Gerasimenko noted that this waterway will be uncompetitive with road and rail transport if it is not URL The experts found that the economic analysis in the feasibility study was not detailed enough to draw unambiguous conclusions.It contains various methodological and factual errors and does not comply with international standards, in particular, the standards of the United Nations Industrial Development Organization (UNIDO). The feasibility study does not provide a clear value of the total amount of investment costs and a breakdown by category of expenses. In the description of some components of the project, figures are given, the total amount of which is just over 12 billion euros. But some items of expenditure are not included in this amount, and other items of expenditure are significantly underestimated. For example, the document does not contain an estimate of the cost of creating additional port infrastructure or reconstructing bridges. Although the experts of the Business Union of Entrepreneurs and Employers im. Kunyavsky believes that the investment costs for the development of the Ukrainian segment of the Dnieper river-even without the reconstruction of bridges-are underestimated by almost 100 million euros. They also claim that the investment costs on the Belarusian site are probably underestimated by at least 900 million euros. This suggests that the real cost of the project will exceed 13 billion euros. The cost of dredging the Dnieper River alone can reach one billion rubles. UAH URL Other critics of the project warn that the E40 project in terms of cargo turnover is now unpromising and will not pay off, and the cargo turnover, that can be today (Belarus-Ukraine) can very easily be transported by rail. This route is much better served by rail. There is no point in investing money if a structure has already been built that can provide cargo turnover from North to South 20 times more than the current one\" URL Transportation of goods by E-40 will last more than 14 days, this is longer than by road or rail. The idea of the E40 waterway is very dangerous for the environment and the future of Europe, and the E40 waterway project itself is unfounded from an economic point of view. URL According to URL the main disadvantages of the project are the following: Impact on biodiversity The construction and operation of the waterway provides for a change in the hydro-morphological conditions of the entire Polesia region, which will lead to the degradation of valuable wetlands under national and international protection as a habitat for valuable species, and a number of vulnerable natural territories of Ukraine. The transboundary problem of filling the Dnieper-Bug water system can cause degradation of the Pripyat riverbed, Svyatoe, Volyanskoe and Beloe lakes due to the operation of the water supply system.Many parts of Polesia are of international importance as exceptional natural monuments, which have received the status of biosphere reserves UNESCO, objects under the protection of the Ramsar Convention. Due to the fact that the E40 waterway is a transboundary project, it is subject to international conventions ratified by Ukraine (in particular Espoo Convention, The Aarhus Convention),according to which Environmental Impact Assessment should be carried out in a single package in all three URL", "after_revision": "Officially, the planning of the E40 waterway is still at an early stage, but in Ukraine, strategic documents are already being prepared and individual project parts are being implemented. In particular, in 2020, the Pripyat River was dredged within the exclusion zone . The implementation of the E40 project has attracted considerable criticism from international and local public organizations in all three countries, as well as experts in the biological and environmental fields. The international campaign \"STOP E40\" against the implementation of the waterway project has been created\". According to experts of scientific institutions of the Republic of Belarus, the construction of the waterway will have a significant negative impact on the natural and cultural heritage of Polesia, on the well-being of the population of Polesia (1), as well as on the global carbon balance, hydrological and URL situations, URL transport development. There are alternative scenarios for the construction of the E40 for the development of Polesia and transport links between Ukraine, Poland and Belarus. First of all, it is about the reorientation of the Polesia region to the ecotourism industry. This was confirmed by a study conducted by Aivar Ruukel, the member of the board of the Global Ecotourism Network and a tour operator in the Soomaa National Park, URL The press has repeatedly made statements that the E40 waterway is a restoration of an ancient transport route \"from Varangians to the Greeks\" , but these claims have no scientific basis. The story of the project In 1996 in Geneva European Agreement on Main Inland Waterways of International Importance (AGN). Geneva, 19 January 1996 was signed. This list also includes E40 (\"\u0415\" is a category of Inland waterway of international significance. The numbers 10, 20, 30, 40, and 50, which grow from west to east, are assigned to the main roads, mostly north-south, that connect one sea basin to another). The map of the E40 path first appeared in a document (white paper) United Nations Economic Commission for Europe (UNECE) \"White Paper on the progress, accomplishment and future of sustainable inland water URL and was published separately on the resources of the UNECE . Although some sections of the ship's course already exist, the scale of the proposed new development is so global that, according to experts, an environmental disaster in the region is highly possible. February 6, 2020 Minister of Infrastructure of Ukraine Vladislav Krikliy stated that \u00abthe project to restore the E-40 river route has reached the stage of practical implementation\u00bb. On November 25, 2020, the Cabinet of Ministers of Ukraine approved the draft Agreement between the Cabinet of Ministers of Ukraine and the Government of the People\u2019s Republic of China a on strengthening cooperation in the field of infrastructure construction and authorized the Minister of Infrastructure Vladislav Krikliy to sign this Agreement.. This opens the way for the project's lobbyists to obtain Chinese loans for the construction of the E40 and increases the risks of neglecting environmental principles when considering an E40 financing agreement. On December 11, 2020, the website State Agency of Ukraine for Exclusion Zone Management published the Announcement of the publication of the Strategy for the development of the exclusion zone in 2021-2030. The draft strategy contains section 5.9. Development of transport infrastructure, which is entirely devoted to lobbying for the construction of the E40 through the exclusion zone. After critical statements of public organizations, State Agency of Ukraine for Exclusion Zone Management promised to exclude this section from the strategy. The public campaign \"Save Polesia\" wants to draw the attention of the governments of Belarus, Poland, Ukraine and the European Parliament to the threat to the valuable natural territories of Polesia and to demonstrate that any decisions on the construction of the E40 waterway project should be made with the active participation of the public and independent experts. According to the coalition members, the E40 waterway project has dubious economic value and clearly poses a serious threat to nature. At the same time, the virgin territory of Polesia has great potential for promoting ecotourism, strengthening local business and sustainable development of the entire region. In September 2020, leading European environmental organizations sent an open letter to the President of Ukraine, Vladimir Zelensky. In their address, they expressed serious concern about the start of construction of the Baltic-Black Sea megacanal. Economic indicators of the project according to the calculations of the developers The cost of the construction of the canal is $ 12 billion. According to the project's lobbyists, the creation of the E-40 will allow to transport up to 4 million tons of cargo annually. This will revive trade between Poland, Belarus and Ukraine, whose total markets are almost 100 million people. According to the feasibility study, river transport makes it possible to transport large volumes of cargo. Thus, a 900-ton platform barge replaces 18 wagons or 45 twenty-ton trucks. The E40 channel is planned to transport millions of tons of cargo that will sail from the project countries (coal, ore, metal, potash fertilizers, table salt, sugar, crushed stone, peat, timber, sapropels, etc.) to the EU and further around the world. There is a hope to see ships with the flags of the Scandinavian countries on the route. In addition, the E-40 will provide significant time savings for carriers operating in the Central and Eastern European regions. Currently, the Rhine-Main-Danube connection (3,100 km) is used for cargo delivery in this direction. However, the E-40 is shorter than this connection by almost 1,000 kilometers (2,205 km). This means shortening the journey by 2-4 days at an average speed of 10-20 km/h for river cargo vessels. The asset also includes potential cross-border river cruises \u044b. Economic indicators of the project according to the calculations of other economists The feasibility study of the E40 project was analyzed by Belarusian specialists of three professional associations: \"Business Union of Entrepreneurs and Employers named after prof. M. S. Kunyavsky\", \"Republican Union of Industrialists and Entrepreneurs\", \"Belarusian Scientific and Industrial Association\". This analysis revealed numerous miscalculations and outright mistakes of the authors of the feasibility study. In particular, the deputy director of the Union of Entrepreneurs and Employers named after Professor M. S. Kunyavsky Ales Gerasimenko noted that this waterway will be uncompetitive with road and rail transport if it is not subsidized. The experts found that the economic analysis in the feasibility study was not detailed enough to draw unambiguous conclusions.It contains various methodological and factual errors and does not comply with international standards, in particular, the standards of the United Nations Industrial Development Organization (UNIDO). The feasibility study does not provide a clear value of the total amount of investment costs and a breakdown by category of expenses. In the description of some components of the project, figures are given, the total amount of which is just over 12 billion euros. But some items of expenditure are not included in this amount, and other items of expenditure are significantly underestimated. For example, the document does not contain an estimate of the cost of creating additional port infrastructure or reconstructing bridges. Although the experts of the Business Union of Entrepreneurs and Employers im. Kunyavsky believes that the investment costs for the development of the Ukrainian segment of the Dnieper river-even without the reconstruction of bridges-are underestimated by almost 100 million euros. They also claim that the investment costs on the Belarusian site are probably underestimated by at least 900 million euros. This suggests that the real cost of the project will exceed 13 billion euros. The cost of dredging the Dnieper River alone can reach one billion rubles. UAH annually. Other critics of the project warn that the E40 project in terms of cargo turnover is now unpromising and will not pay off, and the cargo turnover, that can be today (Belarus-Ukraine) can very easily be transported by rail. This route is much better served by rail. There is no point in investing money if a structure has already been built that can provide cargo turnover from North to South 20 times more than the current one\" (2017). Transportation of goods by E-40 will last more than 14 days, this is longer than by road or rail. The idea of the E40 waterway is very dangerous for the environment and the future of Europe, and the E40 waterway project itself is unfounded from an economic point of view. . According to experts, the main disadvantages of the project are the following: Impact on biodiversity The construction and operation of the waterway provides for a change in the hydro-morphological conditions of the entire Polesia region, which will lead to the degradation of valuable wetlands under national and international protection as a habitat for valuable species, and a number of vulnerable natural territories of Ukraine. The transboundary problem of filling the Dnieper-Bug water system can cause degradation of the Pripyat riverbed, Svyatoe, Volyanskoe and Beloe lakes due to the operation of the water supply system.Many parts of Polesia are of international importance as exceptional natural monuments, which have received the status of biosphere reserves UNESCO, objects under the protection of the Ramsar Convention. Due to the fact that the E40 waterway is a transboundary project, it is subject to international conventions ratified by Ukraine (in particular Espoo Convention, The Aarhus Convention),according to which Environmental Impact Assessment should be carried out in a single package in all three countries.", "edit_actions": [{"type": "R", "before": "URL", "after": ".", "start_char_pos": 268, "end_char_pos": 271}, {"type": "R", "before": "URL", "after": "fields.", "start_char_pos": 476, "end_char_pos": 479}, {"type": "R", "before": "URL", "after": "created\".", "start_char_pos": 578, "end_char_pos": 581}, {"type": "R", "before": "URL", "after": "balance,", "start_char_pos": 864, "end_char_pos": 867}, {"type": "R", "before": "URL URL URL", "after": "Greeks\" ,", "start_char_pos": 1475, "end_char_pos": 1486}, {"type": "R", "before": "URL", "after": "basis.", "start_char_pos": 1523, "end_char_pos": 1526}, {"type": "D", "before": "URL", "after": null, "start_char_pos": 1713, "end_char_pos": 1716}, {"type": "R", "before": "URL", "after": ".", "start_char_pos": 2212, "end_char_pos": 2215}, {"type": "R", "before": "URL", "after": "possible.", "start_char_pos": 2408, "end_char_pos": 2411}, {"type": "R", "before": "URL", "after": "implementation\u00bb.", "start_char_pos": 2577, "end_char_pos": 2580}, {"type": "R", "before": "URL", "after": "Agreement..", "start_char_pos": 2917, "end_char_pos": 2920}, {"type": "R", "before": "URL", "after": "zone.", "start_char_pos": 3512, "end_char_pos": 3515}, {"type": "R", "before": "URL", "after": "organizations,", "start_char_pos": 3552, "end_char_pos": 3555}, {"type": "R", "before": "URL", "after": "megacanal.", "start_char_pos": 4577, "end_char_pos": 4580}, {"type": "R", "before": "URL", "after": "people.", "start_char_pos": 4953, "end_char_pos": 4956}, {"type": "R", "before": "URL", "after": "\u044b.", "start_char_pos": 5963, "end_char_pos": 5966}, {"type": "R", "before": "URL", "after": "subsidized.", "start_char_pos": 6693, "end_char_pos": 6696}, {"type": "R", "before": "URL", "after": "annually.", "start_char_pos": 8113, "end_char_pos": 8116}, {"type": "R", "before": "URL", "after": "(2017).", "start_char_pos": 8545, "end_char_pos": 8548}, {"type": "R", "before": "URL", "after": ".", "start_char_pos": 8821, "end_char_pos": 8824}, {"type": "R", "before": "URL", "after": "experts,", "start_char_pos": 8838, "end_char_pos": 8841}, {"type": "R", "before": "URL", "after": "countries.", "start_char_pos": 9945, "end_char_pos": 9948}], "sents_char_pos": [0, 187, 517, 927, 1079, 1173, 1648, 1684, 1785, 1943, 2010, 2064, 2094, 2274, 2335, 2357, 2423, 2596, 2745, 3131, 3337, 3378, 3661, 4030, 4164, 4339, 4471, 4722, 4849, 5063, 5138, 5390, 5478, 5606, 5707, 5796, 5901, 6232, 6358, 6469, 6823, 7022, 7156, 7286, 7414, 7551, 7629, 7831, 7955, 8033, 8108, 8339, 8381, 8646, 8820, 9252, 9450, 9653]}
+{"doc_id": "67564510", "revision_depth": "1", "before_revision": "The research of indigenous media and the international indigenous movement in the process of globalization develop in parallel. In the second half of the 20th century, United Nations agencies, including the United Nations Working Group on Indigenous Populations (WGIP), led the movement. And the United Nations General Assembly adopted a declaration aimed at protecting the rights of indigenous peoples in 2007. The theoretical development of indigenous media research first occurred in anthropology in 1980. It was accompanied by a critical research method different from post-colonialism and post-structuralism. This method tried to minimize the difference of power between the researcher and the researched. Prior to this, ethnographic films related to anthropology that gave photography to locals can even be traced back to the Navajo Project in 1960. This project can be attributed to the pioneering work of Sol Worth and John Adair, which created a new visual language and style . But the authentic indigenous media movement only started in the 1980s. The recognized symbol is a new method applied in the collaboration between American anthropologist Eric Michaels and Australia\u2019s Warlpiri Aboriginal Broadcasting.Michaels, E. (1984). Ask a foolish question: On the methodologies of cross cultural media. Australian Journal for Cultural Studies, 3(2), 49\u201359.Michaels, E. (1986). The Aboriginal invention of television in Central Australia, 1982\u20131986: Report of the fellowship to assess the impact of television in remote Aboriginal communities. Canberra: Australian Institute of Aboriginal Studies.Michaels, E. (1994). Bad Aboriginal art: Tradition, media, and technological horizons. Minneapolis: University of Minnesota Press. Which signifies a change from the simple observation of the life of the indigenous people to the cultural record of the indigenous people themselves. Since then , the Brazilian Kayapo village project of Vincent CarelliCarelli, V. (1988). Video in the villages: Utilization of video tapes as an instrument of ethnic affirmation among Brazilian Indian groups. Commission on Visual Anthropology Bulletin, 4, 10\u201315. and Terence Turner,Turner, T. (Fall 1990). The Kayap\u00f3 video project: A progress report. Revue de la Commission d\u2019Anthropologie Visuelle (CVA). 7\u201310. URL Accessed 13 Sep 2013.Turner, T. (1992). Defiant images: The Kayap\u00f3 appropriation of video. Anthropology Today, 8(6), 5\u201316. and the indigenous series of M\u0101ori producer Barry BarclayBarclay, B. (1990). Our own image. Auckland: Longman Paul.Barclay, B. (2000). Mana Tuturu: M\u0101ori treasures and intellectual property rights. Honolulu: University of Hawaii Press, 2006. in New Zealand have become very important milestones . But it was Faye Ginsburg, an American anthropologist who laid the theoretical foundation for the study of indigenous media. Her research in 1991 expounded the Faustian dilemma between technology and tribal life and inspired later indigenous media researchers.Ginsburg, F. D. (1991). Indigenous media: Faustian contract or global village? Cultural Anthropology, 6(1), 92\u2013112. Sami family Finland 1936 The important theories of recent indigenous media studies have highlighted the dynamic relationship between local indigenous communities and their countries and globalization. Lorna Roth's research on the discourse rights of Canadian indigenous groups in 2005,Roth, L. (2005). Something new in the air: The story of first peoples television broadcasting in Canada. Montreal: McGill-Queen\u2019s University Press. Jennifer Deger's exploration of the media technology movement in the Australian Yolngu community in 2006,Deger, J. (2006). Shimmering screens: Making media in an Aboriginal community. Minneapolis: University of Minnesota Press. and Michael Robert Evans's ethnographic research on the Canadian Inuit community Igloolik in 2008,Evans, M. R. (2008). Isuma: Inuit video art. Montreal/Kingston: McGill-Queen\u2019s University Press. etc. are all development of high reference value since the 21st century. Wilson, P. (2015). Indigenous Media: Linking the Local, Translocal, Global and Virtual. In Mains S., Cupples J., & Lukinbeal C. (Eds.), Mediated Geographies and Geographies of Media (pp. 367\u2013384). Dordrecht: Springer. The idea that the media is a foreign power that affects the indigenous people is no longer accurate, now that indigenous people are working in media within all creative industries as an individual, collective or nationally which impacts the media as we know it. John Adair (1913\u20131997), American anthropologist, known for his 1972 book, Through Navajo Eyes: An Exploration in Film Communication and Anthropology, in collaboration with Sol Worth Barry Barclay Marian Bredin Debbie Brisebois Vincent Carelli Corinn Columpar, Canadian academic; Director of the Cinema Studies Institute at University of Toronto; author, Unsettling Sights: The Fourth World on Film (2010) Jennifer Deger Michael Robert Evans Daniel Fisher, Australian cultural anthropologist; academic, University of California, Berkeley; author, 2016 book, The Voice and Its Doubles: Media and Music in Northern Australia Faye Ginsburg Kevin Glynn New Zealand media and cultural studies academic; known for analyses of media and cultural views of M\u0101ori activism, including that of Tame Iti Sigurj\u00f3n Baldur Hafsteinsson (Ziggy Hafsteinsson), Icelandic anthropologist of media John Hartley, British-Australian academic ; cultural science researcher ; researcher at Curtin University's Indigenous Culture and Digital Technologies program Kate Hennessy, Canadian anthropologist; video artist Jeff Himpele Candace Hopkins Zacharias Kunuk Peter Limbrick Eric Michaels Mario Murillo Sari Pietik\u00e4inen Michelle Raheja Lorna Roth Freya Schiwy Beverly Singer Katarina Soukoup Terence Turner (1935\u20132015), anthropologist and ethnographer; activist with Kayapo community from central Brazil Richard Wilson, Canadian and Hwlitsum First Nation artist Houston Wood Sol Worth (1922 \u2013 1977), American painter; scholar of visual communication and visual anthropology; co-author with John Adair", "after_revision": "The research of indigenous media and the international indigenous movement in the process of globalization develop in parallel. In the second half of the 20th century, United Nations agencies, including the United Nations Working Group on Indigenous Populations (WGIP), led the movement. The United Nations General Assembly adopted a declaration aimed at protecting the rights of indigenous peoples in 2007. The theoretical development of indigenous media research first occurred in anthropology in 1980. It was accompanied by a critical research method that diverged from post-colonialism and post-structuralism. The newer method attempted to minimize the power imbalance between the researcher and the researched. Leading up to this, ethnographic films that gave photographic techniques to locals can be traced back as far as the Navajo Project in 1960. The project was the pioneering work of Sol Worth and John Adair, to which the origin of a new anthropological language and style of ethnography can be attributed. However, the indigenous media movement was not a significant phenomenon for another decade. The widely recognized start of the new media movement was a collaboration between American anthropologist Eric Michaels and Australia\u2019s Warlpiri Aboriginal Broadcasting.Michaels, E. (1984). Ask a foolish question: On the methodologies of cross cultural media. Australian Journal for Cultural Studies, 3(2), 49\u201359.Michaels, E. (1986). The Aboriginal invention of television in Central Australia, 1982\u20131986: Report of the fellowship to assess the impact of television in remote Aboriginal communities. Canberra: Australian Institute of Aboriginal Studies.Michaels, E. (1994). Bad Aboriginal art: Tradition, media, and technological horizons. Minneapolis: University of Minnesota Press. This new type of collaborative anthropological project exemplified a change from a simple observation of the life of the indigenous people to a cultural record by the indigenous people themselves. Following the Warlpiri project , the Brazilian Kayapo village project of Vincent CarelliCarelli, V. (1988). Video in the villages: Utilization of video tapes as an instrument of ethnic affirmation among Brazilian Indian groups. Commission on Visual Anthropology Bulletin, 4, 10\u201315. and Terence Turner,Turner, T. (Fall 1990). The Kayap\u00f3 video project: A progress report. Revue de la Commission d\u2019Anthropologie Visuelle (CVA). 7\u201310. URL Accessed 13 Sep 2013.Turner, T. (1992). Defiant images: The Kayap\u00f3 appropriation of video. Anthropology Today, 8(6), 5\u201316. and the indigenous series by M\u0101ori and producer Barry BarclayBarclay, B. (1990). Our own image. Auckland: Longman Paul.Barclay, B. (2000). Mana Tuturu: M\u0101ori treasures and intellectual property rights. Honolulu: University of Hawaii Press, 2006. in New Zealand , have been important milestones in the development of indigenous media. However, it was Faye Ginsburg, an American anthropologist , who laid the theoretical foundation for the study of indigenous media. Her research in 1991 expounded the Faustian dilemma between technology and tribal life and inspired later indigenous media researchers.Ginsburg, F. D. (1991). Indigenous media: Faustian contract or global village? Cultural Anthropology, 6(1), 92\u2013112. Sami family Finland 1936 The important theories of recent indigenous media studies have highlighted the dynamic relationship between local indigenous communities and their countries and globalization. Lorna Roth's research on the discourse rights of Canadian indigenous groups in 2005,Roth, L. (2005). Something new in the air: The story of first peoples television broadcasting in Canada. Montreal: McGill-Queen\u2019s University Press. Jennifer Deger's exploration of the media technology movement in the Australian Yolngu community in 2006,Deger, J. (2006). Shimmering screens: Making media in an Aboriginal community. Minneapolis: University of Minnesota Press. and Michael Robert Evans's ethnographic research on the Canadian Inuit community Igloolik in 2008,Evans, M. R. (2008). Isuma: Inuit video art. Montreal/Kingston: McGill-Queen\u2019s University Press. etc. are all development of high reference value since the 21st century. Wilson, P. (2015). Indigenous Media: Linking the Local, Translocal, Global and Virtual. In Mains S., Cupples J., & Lukinbeal C. (Eds.), Mediated Geographies and Geographies of Media (pp. 367\u2013384). Dordrecht: Springer. The idea that the media is a foreign power that affects the indigenous people is no longer accurate, now that indigenous people are working in media within all creative industries as an individual, collective or nationally which impacts the media as we know it. John Adair (1913\u20131997), American anthropologist, known for his 1972 book, Through Navajo Eyes: An Exploration in Film Communication and Anthropology, in collaboration with Sol Worth Barry Barclay Marian Bredin Debbie Brisebois Vincent Carelli Corinn Columpar, Canadian academic; Director of the Cinema Studies Institute at University of Toronto; author, Unsettling Sights: The Fourth World on Film (2010) Jennifer Deger Michael Robert Evans Daniel Fisher, Australian cultural anthropologist; academic, University of California, Berkeley; author, 2016 book, The Voice and Its Doubles: Media and Music in Northern Australia Faye Ginsburg Kevin Glynn New Zealand media and cultural studies academic; known for analyses of media and cultural views of M\u0101ori activism, including that of Tame Iti Sigurj\u00f3n Baldur Hafsteinsson (Ziggy Hafsteinsson), Icelandic anthropologist of media John Hartley, British-Australian academic and researcher in cultural studies; anthropologist of media ; researcher at Curtin University's Indigenous Culture and Digital Technologies program Kate Hennessy, Canadian anthropologist; video artist Jeff Himpele Candace Hopkins Zacharias Kunuk Peter Limbrick Eric Michaels Mario Murillo Sari Pietik\u00e4inen Michelle Raheja Lorna Roth Freya Schiwy Beverly Singer Katarina Soukoup Terence Turner (1935\u20132015), anthropologist and ethnographer; activist with Kayapo community from central Brazil Richard Wilson, Canadian and Hwlitsum First Nation artist Houston Wood Sol Worth (1922 \u2013 1977), American painter; scholar of visual communication and visual anthropology; co-author with John Adair", "edit_actions": [{"type": "R", "before": "And the", "after": "The", "start_char_pos": 288, "end_char_pos": 295}, {"type": "R", "before": "different", "after": "that diverged", "start_char_pos": 558, "end_char_pos": 567}, {"type": "R", "before": "This method tried", "after": "The newer method attempted", "start_char_pos": 614, "end_char_pos": 631}, {"type": "R", "before": "difference of power", "after": "power imbalance", "start_char_pos": 648, "end_char_pos": 667}, {"type": "R", "before": "Prior", "after": "Leading up", "start_char_pos": 711, "end_char_pos": 716}, {"type": "R", "before": "related to anthropology that gave photography", "after": "that gave photographic techniques", "start_char_pos": 745, "end_char_pos": 790}, {"type": "D", "before": "even", "after": null, "start_char_pos": 805, "end_char_pos": 809}, {"type": "R", "before": "to", "after": "as far as", "start_char_pos": 825, "end_char_pos": 827}, {"type": "R", "before": "This project can be attributed to", "after": "The project was", "start_char_pos": 856, "end_char_pos": 889}, {"type": "R", "before": "which created a new visual", "after": "to which the origin of a new anthropological", "start_char_pos": 939, "end_char_pos": 965}, {"type": "R", "before": ". But the authentic", "after": "of ethnography can be attributed.", "start_char_pos": 985, "end_char_pos": 1004}, {"type": "A", "before": null, "after": "However, the", "start_char_pos": 1005, "end_char_pos": 1005}, {"type": "R", "before": "only started in the 1980s. The recognized symbol is a new method applied in the", "after": "was not a significant phenomenon for another decade. The widely recognized start of the new media movement was a", "start_char_pos": 1032, "end_char_pos": 1111}, {"type": "R", "before": "Which signifies", "after": "This new type of collaborative anthropological project exemplified", "start_char_pos": 1736, "end_char_pos": 1751}, {"type": "R", "before": "the", "after": "a", "start_char_pos": 1766, "end_char_pos": 1769}, {"type": "R", "before": "the cultural record of", "after": "a cultural record by", "start_char_pos": 1829, "end_char_pos": 1851}, {"type": "R", "before": "Since then", "after": "Following the Warlpiri project", "start_char_pos": 1886, "end_char_pos": 1896}, {"type": "R", "before": "of", "after": "by", "start_char_pos": 2450, "end_char_pos": 2452}, {"type": "A", "before": null, "after": "and", "start_char_pos": 2459, "end_char_pos": 2459}, {"type": "R", "before": "have become very important milestones . But", "after": ", have been important milestones in the development of indigenous media.", "start_char_pos": 2682, "end_char_pos": 2725}, {"type": "A", "before": null, "after": "However,", "start_char_pos": 2726, "end_char_pos": 2726}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2776, "end_char_pos": 2776}, {"type": "R", "before": "; cultural science researcher", "after": "and researcher in cultural studies; anthropologist of media", "start_char_pos": 5425, "end_char_pos": 5454}], "sents_char_pos": [0, 127, 287, 411, 508, 613, 710, 855, 986, 1058, 1221, 1241, 1311, 1365, 1385, 1551, 1605, 1625, 1691, 1735, 1885, 1973, 2093, 2190, 2235, 2290, 2322, 2340, 2391, 2501, 2516, 2540, 2559, 2622, 2721, 2847, 2983, 3006, 3061, 3098, 3299, 3400, 3488, 3531, 3654, 3715, 3878, 3902, 4027, 4046, 4115, 4224, 4245, 4507, 4786, 4853, 4999, 5045, 5204, 5426, 5456, 5582, 5833, 5998, 6055]}
+{"doc_id": "67670517", "revision_depth": "2", "before_revision": "Sultan Hassan IX \"Dhirukusa Loka\" , the brother of previous sultan Mohamed III, became sultan in 1551. He renounced Islam and converted to Christianity. He was deposed upon conversion, and known subsequently by the Lusitanian name of Dom Manoel. Then the first interregnum occurred and Maldives was ruled by a Council of Ministers from 1552 to 1554. Sultan Ali IV \"Audha Siyaaka Katthiri\" became sultan in 1557, who killed in battle. King Dom Manoel \"Dhirikusa Loka\" (in absentia) was restored as the king in 1558, formerly known as Sultan Hassan IX. A Maldivian Catholic named Andiri Andirin acted as his regent, while Manoel lived in Goa. Then Maldives ruled by Kateeb Mohamed Muhammad Thakurufaanu Al Auzam of Utheemu after he assassinated Andiri Andirin, the regent of King Dom Manoel. As per a treaty he got refuge from Ali Raja of Cannanore, Mohamed Thakurufan 's base of operation was Minicoy under the sovereignty of Cannanore. Keteeb Mohamed Thakurufan did not honour this promise. The Ali Raja demanded dominion over the Maldives, as promised to him by the Kateeb of Uteemu. The nature of the relationship between Kateeb Mohamed Thakurufan and the Ali Raja of Cannanore was outlined in a letter sent by a later Ali Raja, Mariambe Ali-Adi Raja Bibi, to the Sultan Mohamed Mueenuddine I of the Maldives. The letter was dated Friday 17 Jamada-el-oula Anno Hegirae 1243 (7 December AD 1827). According to the letter Mohamed Thakurufan had entered into a treaty ceding sovereignty of the Maldives to the Ali Raja of Cannanore in the event Thakurufan was established in power in Male.Page:294, Divehi Tarikh Kateeb Mohamed Thakurufan concluded a Treaty with King Dom Manoel in order to ward off the Ali Raja of Cannanore with whose help the Kateeb seized power in Male.Naseema Muhammad. As-Sultan Qazi Muhamad Thakurufaanu Auzam Siri Savaadheetha Maharadhun. Online publication URL Sultan Muhammad Imaduddin III \"Navaranna Keerithi\", the son of Sultan Muhammad Imaduddin II and Amina Dio of Fenfushi, was held captive on Kavaratti island from 1752 until his death in 1757. In 1752, he was seized by the Ali Raja of Cannanore and transported to Kavaratti island in the Laccadives. Male was occupied. The occupation was ended by Muleegey Dom Hassan Maniku, a direct descendant of the penultimate Christian King Joao. The sultan died in captivity. During this time Maldives was ruled by the captive sultan's niece Amina I of Maldives and his daughter, Amina II. The de facto regent was Muleegey Dom Hassan Maniku. Regency continued in expectation of the return of the deceased sultan's heir from captivity. Sultan Muhammed Ghiya'as ud-din \"Kula Ranmani Keerithi\", son of the previous sultan Ibrahim Iskandar II, became sultanin 1766 after restoration . He deposed while on the Hajj pilgrimage. Interregnum started in 1773 and sultan's elder sister Amina I became regent. Her husband Ali Shahbandar took power during her regency, and Dhiyamigili dynasty lost the throne in the cascade of events that followed. Mohamed Manikfaan of Huraa usurped the throne and later abdicated in favour of his nephew who became Sultan Muizzuddin. Amina and her husband were banished to a remote island in Laamu URL , maldives wire, The Sultans, Dhiyamigili Dynasty, Retrieved February 27, 2011. During British protectorate, Sultan Muhammad Imaaduddeen VI \"Keerithi Maha Radun\" ( 1893-1902) was the former regent for Sultan Muhammad Imaaduddeen V and Muhammad Shamsuddeen III . He was deposed while in the Ottoman Empire. After him, Muhammad Shamsuddeen III \"Kula Sundhura Katthiri Bavana\" (second reign : 1902-1934) became sultan again. But he was deposed and exiled. Then the political crisis start Sultan Hassan Nooraddeen II \"Kula Sudha Ira Siyaaka Saasthura Audha Keerithi Katthiri Bavana\" ( 1935- 1943), who became sultan in 1935, was forced to abdicate in 1943 by the British rulers that time. Then the interregnum started. Although Abdul Majeed Didi was elected Sultan but was never installed and continued to live in Ceylon. Maldives ruled by Council of Regency headed for a time by former Sultan Hassan Nooraddeen II. Following the death of Abdul Majeed, and after a national referendum, the Maldives became a republic.", "after_revision": "In 1551 , the brother of Mohamed III, Hasan IX became sultan. He renounced Islam and converted to Christianity. He was deposed upon conversion, and known subsequently by the Lusitanian name of Dom Manoel. Then the first interregnum occurred and Maldives was ruled by a Council of Ministers from 1552 to 1554. Ali IV became sultan in 1557, who killed in battle. King Dom Manoel (in absentia) was restored as the king in 1558, formerly known as Sultan Hasan IX. A Maldivian Catholic named Andiri Andirin acted as his regent, while Manoel lived in Goa. Then Maldives ruled by Kateeb Muhammad Thakurufaanu Al Auzam of Utheemu after he assassinated Andiri Andirin, the regent of King Dom Manoel. As per a treaty he got refuge from Ali Raja of Cannanore, Muhammad Thakurufaanu 's base of operation was Minicoy under the sovereignty of Cannanore. Keteeb Muhammad Thakurufaanu did not honour this promise. The Ali Raja demanded dominion over the Maldives, as promised to him by the Kateeb of Uteemu. The nature of the relationship between Kateeb Muhammad Thakurufaanu and the Ali Raja of Cannanore was outlined in a letter sent by a later Ali Raja, Mariambe Ali-Adi Raja Bibi, to the Sultan Mohamed Mueenuddine I of the Maldives. The letter was dated Friday 17 Jamada-el-oula Anno Hegirae 1243 (7 December AD 1827). According to the letter Mohamed Thakurufan had entered into a treaty ceding sovereignty of the Maldives to the Ali Raja of Cannanore in the event Thakurufaanu was established in power in Male.Page:294, Divehi Tarikh Kateeb Muhammad Thakurufaanu concluded a treaty with King Dom Manoel in order to ward off the Ali Raja of Cannanore with whose help the Kateeb seized power in Male.Naseema Muhammad. As-Sultan Qazi Muhamad Thakurufaanu Auzam Siri Savaadheetha Maharadhun. Online publication URL From 1752 to 1757, Sultan Muhammad Imaduddin III was held captive on Kavaratti island until his death in 1757. In 1752, he was seized by the Ali Raja of Cannanore and transported to Kavaratti island in the Laccadives. Male was occupied. The occupation was ended by Muleegey Dom Hasan Maniku, a direct descendant of the penultimate Christian King Joao. The sultan died in captivity. During this time Maldives was ruled by the captive sultan's niece Amina I of Maldives and his daughter, Amina II. The de facto regent was Muleegey Dom Hassan Maniku. Regency continued in expectation of the return of the deceased sultan's heir from captivity. In 1766, after a restoration, Muhammed Ghiya'as ud-din became sultan . He deposed while on the Hajj pilgrimage. A new interregnum period started in 1773 and sultan's elder sister Amina I again became regent. Her husband Ali Shahbandar took power during her regency, and Dhiyamigili dynasty lost the throne in the cascade of events that followed. Muhammad Manikfaanu of Huraa usurped the throne and later abdicated in favour of his nephew who became sultan Muizzuddin. Amina and her husband were banished to a remote island in Laamu Atoll. Interregnum ended dramatically and Huraa dynasty came into the URL , maldives wire, The Sultans, Dhiyamigili Dynasty, Retrieved February 27, 2011. During British protectorate, Sultan Muhammad Imaaduddeen VI (reign. 1893-1902) , the former regent for Sultan Muhammad Imaaduddeen V and Muhammad Shamsuddeen III , was deposed while in the Ottoman Empire. After him, Muhammad Shamsuddeen III (second reign . 1902-1934) became sultan again. But he was deposed and exiled. Then the political crisis started. Sultan Hassan Nooraddeen II (reign. 1935- 1943), who became sultan in 1935, was forced to abdicate in 1943 by the British rulers that time. Then the fifth interregnum of the history of the Maldives started. Although Abdul Majeed Didi was elected Sultan but was never installed and continued to live in Ceylon. Maldives ruled by Council of Regency headed for a time by former sultan Hassan Nooraddeen II. Following the death of Abdul Majeed, and after a national referendum, the Maldives became a republic.", "edit_actions": [{"type": "R", "before": "Sultan Hassan IX \"Dhirukusa Loka\"", "after": "In 1551", "start_char_pos": 0, "end_char_pos": 33}, {"type": "D", "before": "previous sultan", "after": null, "start_char_pos": 51, "end_char_pos": 66}, {"type": "R", "before": "became sultan in 1551.", "after": "Hasan IX became sultan.", "start_char_pos": 80, "end_char_pos": 102}, {"type": "R", "before": "Sultan Ali IV \"Audha Siyaaka Katthiri\"", "after": "Ali IV", "start_char_pos": 350, "end_char_pos": 388}, {"type": "D", "before": "\"Dhirikusa Loka\"", "after": null, "start_char_pos": 450, "end_char_pos": 466}, {"type": "R", "before": "Hassan", "after": "Hasan", "start_char_pos": 540, "end_char_pos": 546}, {"type": "D", "before": "Mohamed", "after": null, "start_char_pos": 671, "end_char_pos": 678}, {"type": "R", "before": "Mohamed Thakurufan", "after": "Muhammad Thakurufaanu", "start_char_pos": 848, "end_char_pos": 866}, {"type": "R", "before": "Mohamed Thakurufan", "after": "Muhammad Thakurufaanu", "start_char_pos": 943, "end_char_pos": 961}, {"type": "R", "before": "Mohamed Thakurufan", "after": "Muhammad Thakurufaanu", "start_char_pos": 1131, "end_char_pos": 1149}, {"type": "R", "before": "Thakurufan", "after": "Thakurufaanu", "start_char_pos": 1544, "end_char_pos": 1554}, {"type": "R", "before": "Mohamed Thakurufan concluded a Treaty", "after": "Muhammad Thakurufaanu concluded a treaty", "start_char_pos": 1619, "end_char_pos": 1656}, {"type": "R", "before": "Sultan Muhammad Imaduddin III \"Navaranna Keerithi\", the son of", "after": "From 1752 to 1757,", "start_char_pos": 1886, "end_char_pos": 1948}, {"type": "R", "before": "II and Amina Dio of Fenfushi,", "after": "III", "start_char_pos": 1975, "end_char_pos": 2004}, {"type": "D", "before": "from 1752", "after": null, "start_char_pos": 2042, "end_char_pos": 2051}, {"type": "R", "before": "Hassan", "after": "Hasan", "start_char_pos": 2244, "end_char_pos": 2250}, {"type": "R", "before": "Sultan", "after": "In 1766, after a restoration,", "start_char_pos": 2608, "end_char_pos": 2614}, {"type": "R", "before": "\"Kula Ranmani Keerithi\", son of the previous sultan Ibrahim Iskandar II, became sultanin 1766 after restoration", "after": "became sultan", "start_char_pos": 2640, "end_char_pos": 2751}, {"type": "R", "before": "Interregnum", "after": "A new interregnum period", "start_char_pos": 2795, "end_char_pos": 2806}, {"type": "A", "before": null, "after": "again", "start_char_pos": 2857, "end_char_pos": 2857}, {"type": "R", "before": "Mohamed Manikfaan", "after": "Muhammad Manikfaanu", "start_char_pos": 3011, "end_char_pos": 3028}, {"type": "R", "before": "Sultan", "after": "sultan", "start_char_pos": 3112, "end_char_pos": 3118}, {"type": "A", "before": null, "after": "Atoll. Interregnum ended dramatically and Huraa dynasty came into the", "start_char_pos": 3195, "end_char_pos": 3195}, {"type": "R", "before": "\"Keerithi Maha Radun\" (", "after": "(reign.", "start_char_pos": 3340, "end_char_pos": 3363}, {"type": "R", "before": "was", "after": ",", "start_char_pos": 3375, "end_char_pos": 3378}, {"type": "R", "before": ". He", "after": ",", "start_char_pos": 3460, "end_char_pos": 3464}, {"type": "D", "before": "\"Kula Sundhura Katthiri Bavana\"", "after": null, "start_char_pos": 3542, "end_char_pos": 3573}, {"type": "R", "before": ":", "after": ".", "start_char_pos": 3588, "end_char_pos": 3589}, {"type": "R", "before": "start", "after": "started.", "start_char_pos": 3679, "end_char_pos": 3684}, {"type": "R", "before": "\"Kula Sudha Ira Siyaaka Saasthura Audha Keerithi Katthiri Bavana\" (", "after": "(reign.", "start_char_pos": 3713, "end_char_pos": 3780}, {"type": "R", "before": "interregnum", "after": "fifth interregnum of the history of the Maldives", "start_char_pos": 3894, "end_char_pos": 3905}, {"type": "R", "before": "Sultan", "after": "sultan", "start_char_pos": 4083, "end_char_pos": 4089}], "sents_char_pos": [0, 102, 152, 245, 349, 433, 550, 640, 789, 935, 990, 1084, 1311, 1397, 1588, 1773, 1790, 1862, 2076, 2183, 2202, 2318, 2348, 2462, 2514, 2607, 2753, 2794, 2872, 3010, 3130, 3279, 3461, 3505, 3621, 3652, 3884, 3914, 4017, 4111]}
+{"doc_id": "697436", "revision_depth": "2", "before_revision": "alt=|A digging stick In archaeology and anthropology, a digging stick, or sometimes yam stick, is a wooden implement used primarily by subsistence-based cultures to dig out underground food such as roots and tubers or burrowing animals and anthills. The American Heritage Dictionary of the English Language, Fourth Edition. Retrieved July 24, 2008 The stick may also have other uses in hunting or general domestic tasks. They are common to the Indigenous Australians but also other peoples worldwide. The tool normally consists of little more than a sturdy stick which has been shaped or sharpened and sometimes hardened by being placed temporarily in a fire. Fashioned with handles for pulling or pushing, it forms a prehistoric plow , and is also a precursor of most modern agricultural handtools .Encyclop\u00e6dia Britannica, Inc. Retrieved March 26, 2015, from Britannica.com website: URL By region Mexico and the Mesoamerican region In Mexico and the Mesoamerican region, the digging stick was the most important agricultural tool throughout the region.Study the Digging Stick Mexicolore.Uictli Mexicolore. Ethiopia and the Harar region The most common digging stick found in Ethiopia is the ankassay in Amharic, a Semitic language spoken in Ethiopia and the second-most spoken Semitic language in the world. The ankassay is a single shaft that is about 4\u20135 feet in length with a socket-hafted pointed iron blade as the tip.Simoons, Frederick J. \"The Forked Digging Stick of the Gurage\", \"Zeitschrift f\u00fcr Ethnologie\", Berlin, Retrieved February 27, 2015. Two other digging sticks are unique to the Harar region located in East-Central Ethiopia, which are considered to be unusual due to their function beyond the basic use of other digging sticks, and the use of one as a plow . The deungora is a particularly long digging stick is about 110 centimeters , or approximately 3.6 feet, in length with a socket-hafted pointed iron blade as the tip. What's unique about this digging stick is that a bored stone, about 15 centimeters in diameter, is attached at the opposing end. This stone shares the same form as other bored stones that have been discovered in archaeological sites in Africa. Maresha is the Gurage name, also the same word used by the Amhara, for a digging stick that differs in construction because of its forked form. It is used primarily to dig holes for construction, planting, and harvesting roots and tubers. This tool is used as a plow to turn over the soil of an entire field before planting. It is used to break clods of soil in areas where the soil is hard or in areas that may be too steep for plowing , and to dig holes for construction or to transplant domestic plants. When compared to the ankassay, this digging stick can perform the same duties and in addition can be used as a hoe. East-Central New Guinea The Kuman people of this region were horticulturists who used basic tools such as the digging stick, wooden hoe, and wooden spade in their daily lives. Eventually they started to use more sophisticated tools such as iron spades and pick-axes.Nilles, John. \"The Kuman people: A study of cultural change in a primitive society in the Central Highlands of New Guinea.\" Oceania (1953): 1-27.%DIFDELCMD < %DIFDELCMD < %%% Two main types of digging sticks both shared a similar shape but differed in size: A larger and heavier digging stick with a diameter of about 4 centimeters and 2 meters in length, used for the purpose of turning over the soil surface for new gardens A smaller and lighter digging stick with a diameter of about 2 centimeters and 1 meter (or less) in length, mainly used for basic horticulture tasks", "after_revision": "alt=|A digging stick of the Pacific Northwest coast alt=|Nuba person farming in the Nuba Mountains, Sudan A digging stick, sometimes called a yam stick, is a wooden implement used primarily by subsistence-based cultures to dig out underground food such as roots and tubers , tilling the soil, or burrowing animals and anthills. It is a term used in archaeology and anthropology to describe similar implements, which usually consists of little more than a sturdy stick which has been shaped or sharpened and sometimes hardened by being placed temporarily in a fire. Fashioned with handles for pulling or pushing, it forms a prehistoric plough , and is also described as a type of hoe .Encyclop\u00e6dia Britannica, Inc. Retrieved March 26, 2015, from Britannica.com website: Digging stick By region Americas In Mexico and the Mesoamerican region, the digging stick was the most important agricultural tool throughout the region.Study the Digging Stick Mexicolore.Uictli Mexicolore. Asia-Pacific Australia Digging sticks are used by many of the Aboriginal peoples of Australia, for digging up roots and tubers and for ceremonial use. New Guinea The Kuman people east-central New Guinea were horticulturists who used basic tools such as the digging stick, wooden hoe, and wooden spade in their daily lives. Eventually they started to use more sophisticated tools such as iron spades and pick-axes.Nilles, John. \"The Kuman people: A study of cultural change in a primitive society in the Central Highlands of New Guinea.\" Oceania (1953): 1-27. Two main types of digging sticks both shared a similar shape but differed in size: A larger and heavier digging stick with a diameter of about and in length, used for the purpose of turning over the soil surface for new gardens; and A smaller and lighter digging stick with a diameter of about and (or less) in length, mainly used for basic horticulture tasks. New Zealand alt=|A M\u0101ori digging stick|upright=0.4 The M\u0101ori people traditionally use digging sticks, known as a k\u014d to long pole was made of strong and long-lasting wood, with a footrest tied to the shaft and one end fashioned into a narrow blade. They were used for tilling soil ready for planging tubers, as well as for digging for roots or tubers, and in ceremonial use. East Africa Ethiopia The most common digging stick found in Ethiopia is the ankassay in Amharic, a Semitic language spoken in Ethiopia and the second-most spoken Semitic language in the world. The ankassay is a single shaft that is about 4\u20135 feet in length with a socket-hafted pointed iron blade as the tip.Simoons, Frederick J. \"The Forked Digging Stick of the Gurage\", \"Zeitschrift f\u00fcr Ethnologie\", Berlin, Retrieved February 27, 2015. Two other digging sticks are unique to the Harar region located in East-Central Ethiopia, which are considered to be unusual due to their function beyond the basic use of other digging sticks, and the use of one as a plough . The deungora is a particularly long digging stick is about 110 centimetres , or approximately 3.6 feet, in length with a socket-hafted pointed iron blade as the tip. What's unique about this digging stick is that a bored stone, about 15 centimetres in diameter, is attached at the opposing end. This stone shares the same form as other bored stones that have been discovered in archaeological sites in Africa. Maresha is the Gurage name, also the same word used by the Amhara, for a digging stick that differs in construction because of its forked form. It is used primarily to dig holes for construction, planting, and harvesting roots and tubers. This tool is used as a plow to turn over the soil of an entire field before planting. It is used to break clods of soil in areas where the soil is hard or in areas that may be too steep for ploughing , and to dig holes for construction or to transplant domestic plants. When compared to the ankassay, this digging stick can perform the same duties and in addition can be used as a hoe. %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "R", "before": "In archaeology and anthropology, a", "after": "of the Pacific Northwest coast alt=|Nuba person farming in the Nuba Mountains, Sudan A", "start_char_pos": 21, "end_char_pos": 55}, {"type": "R", "before": "or sometimes", "after": "sometimes called a", "start_char_pos": 71, "end_char_pos": 83}, {"type": "A", "before": null, "after": ", tilling the soil,", "start_char_pos": 215, "end_char_pos": 215}, {"type": "D", "before": "The American Heritage Dictionary of the English Language, Fourth Edition. Retrieved July 24, 2008 The stick may also have other uses in hunting or general domestic tasks.", "after": null, "start_char_pos": 251, "end_char_pos": 421}, {"type": "R", "before": "They are common to the Indigenous Australians but also other peoples worldwide. The tool normally", "after": "It is a term used in archaeology and anthropology to describe similar implements, which usually", "start_char_pos": 422, "end_char_pos": 519}, {"type": "R", "before": "plow", "after": "plough", "start_char_pos": 731, "end_char_pos": 735}, {"type": "R", "before": "a precursor of most modern agricultural handtools", "after": "described as a type of hoe", "start_char_pos": 750, "end_char_pos": 799}, {"type": "R", "before": "URL", "after": "Digging stick", "start_char_pos": 886, "end_char_pos": 889}, {"type": "R", "before": "Mexico and the Mesoamerican region", "after": "Americas", "start_char_pos": 900, "end_char_pos": 934}, {"type": "R", "before": "Ethiopia and the Harar region", "after": "Asia-Pacific Australia Digging sticks are used by many of the Aboriginal peoples of Australia, for digging up roots and tubers and for ceremonial use.", "start_char_pos": 1109, "end_char_pos": 1138}, {"type": "A", "before": null, "after": "New Guinea The Kuman people east-central New Guinea were horticulturists who used basic tools such as the digging stick, wooden hoe, and wooden spade in their daily lives. Eventually they started to use more sophisticated tools such as iron spades and pick-axes.Nilles, John. \"The Kuman people: A study of cultural change in a primitive society in the Central Highlands of New Guinea.\" Oceania (1953): 1-27.", "start_char_pos": 1139, "end_char_pos": 1139}, {"type": "A", "before": null, "after": "Two main types of digging sticks both shared a similar shape but differed in size:", "start_char_pos": 1140, "end_char_pos": 1140}, {"type": "A", "before": null, "after": "A larger and heavier digging stick with a diameter of about and in length, used for the purpose of turning over the soil surface for new gardens; and A smaller and lighter digging stick with a diameter of about and (or less) in length, mainly used for basic horticulture tasks.", "start_char_pos": 1141, "end_char_pos": 1141}, {"type": "A", "before": null, "after": "New Zealand alt=|A M\u0101ori digging stick|upright=0.4 The M\u0101ori people traditionally use digging sticks, known as a k\u014d to long pole was made of strong and long-lasting wood, with a footrest tied to the shaft and one end fashioned into a narrow blade. They were used for tilling soil ready for planging tubers, as well as for digging for roots or tubers, and in ceremonial use.", "start_char_pos": 1142, "end_char_pos": 1142}, {"type": "A", "before": null, "after": "East Africa Ethiopia", "start_char_pos": 1143, "end_char_pos": 1143}, {"type": "R", "before": "plow", "after": "plough", "start_char_pos": 1779, "end_char_pos": 1783}, {"type": "R", "before": "centimeters", "after": "centimetres", "start_char_pos": 1849, "end_char_pos": 1860}, {"type": "R", "before": "centimeters", "after": "centimetres", "start_char_pos": 2023, "end_char_pos": 2034}, {"type": "R", "before": "plowing", "after": "ploughing", "start_char_pos": 2625, "end_char_pos": 2632}, {"type": "D", "before": "East-Central New Guinea", "after": null, "start_char_pos": 2819, "end_char_pos": 2842}, {"type": "D", "before": "The Kuman people of this region were horticulturists who used basic tools such as the digging stick, wooden hoe, and wooden spade in their daily lives. Eventually they started to use more sophisticated tools such as iron spades and pick-axes.Nilles, John. \"The Kuman people: A study of cultural change in a primitive society in the Central Highlands of New Guinea.\" Oceania (1953): 1-27.", "after": null, "start_char_pos": 2843, "end_char_pos": 3230}, {"type": "D", "before": "Two main types of digging sticks both shared a similar shape but differed in size:", "after": null, "start_char_pos": 3260, "end_char_pos": 3342}, {"type": "D", "before": "A larger and heavier digging stick with a diameter of about 4 centimeters and 2 meters in length, used for the purpose of turning over the soil surface for new gardens A smaller and lighter digging stick with a diameter of about 2 centimeters and 1 meter (or less) in length, mainly used for basic horticulture tasks", "after": null, "start_char_pos": 3343, "end_char_pos": 3659}], "sents_char_pos": [0, 250, 324, 421, 501, 660, 801, 1055, 1090, 1108, 1315, 1431, 1561, 1785, 1951, 2080, 2195, 2339, 2434, 2520, 2702, 2818, 2994, 3085, 3098, 3208, 3230]}
+{"doc_id": "718597", "revision_depth": "2", "before_revision": "Hvordan g\u00e5r det? 'how goes it?'. Possible answers are: Det g\u00e5r godt/fint 'it goes good/fine'. Hvor'n sk\u00e6r'en? 'how does it cut?' Informal greeting between close friends. Hvad s\u00e5? 'what then?'. Similar to the English greeting what's up?. More often used in Jutland. A possible answer is Ikke s\u00e5 meget 'not that much'. Hej is a very common informal greeting and equivalent to the English hi, pronounced almost the same. Single word greetings with approximately the same meaning include hejsa (from combining hej with German sa from French \u00e7a), dav, davs (both reduced forms of dag meaning 'day'), goddag, hall\u00f8j, hall\u00f8jsa, hall\u00f8jsovs (Pun greeting. Made by combining hall\u00f8j and l\u00f8gsovs 'onion sauce'), p\u00e6nt goddag 'nice good day' is a more formal greeting. Hallo is only used when the speaker is not sure they can be heard. Examples when saying/yelling hallo is appropriate: Trying to find out if someone else is in a seemingly empty room/building; using it as an initial phone greeting; checking if the person you're calling can still hear you (when experiencing a bad phone connection); trying to get the attention of a listener that appears to not pay attention. Mojn is only used in Southern Jutland. It comes from North German moin from the German word Morgen meaning 'morning'. Despite its original meaning it's used as a greeting throughout the day. Hej hej or farvel are common ways to say goodbye. Vi ses 'we will see each other' is used as a farewell greeting in face-to-face conversations while vi snakkes 'we will speak each other'/vi snakkes ved 'we will speak to each other by' are used in both face-to-face and phone/text conversations. K\u00f8r forsigtigt 'drive safely' is said to a person leaving the place where the speaker is located and going to drive/bike to another location. Kom godt hjem 'come well home' is said in the same situation whatever the method of transportation. God arbejdslyst 'good lust for work' is said when parting with a person that is either currently at work or leaving to go to work. Tak for i dag 'thanks for today' is often said in more formal contexts of prolonged interactions like at the end of a meeting or the end of a class. God bedring 'good recovery'. Said when leaving a sick person. Ha' det godt 'have it good' or du/I m\u00e5 ha det godt 'you (sg./pl.) may have it good' is a farewell phrase wishing for the other's well-being. A joke variant of this is Ha' det som I ser ud 'have it as you look' (literally: 'have it as you look out'). By not saying the expected adjective godt 'good', the speaker is violating the maxim of quantity and thereby inferring that they do not think the listener looks good. This can be understood as an insult and is therefore mainly used informally between friends. Some greetings like hej can be used throughout the day. Some are more specific, and the specific time of when to switch to the next greeting can vary from speaker to speaker. But in general the time-specific greetings are: Godmorgen 'good morning' , around 6 AM - 10 AM God formiddag literally 'good pre-noon' , around 9 AM - 12 AM Goddag 'good day' , around 10 AM - 6 PM God eftermiddag 'good afternoon' , around 1 PM - 6 PM Godaften 'good evening' , around 6 PM - 12 AM Godnat 'good night' , said whenever the listener is going to go to sleep . Thanking: Ways of say thanks include tak '''thanks', tak skal du have 'thanks shall you have', mange tak 'many thanks', 'thousand thanks', tak for det 'thanks for that' and jeg takker 'I thank'. A thanks can be answered with selv tak 'self thanks' or det var s\u00e5 lidt 'it was so little' (referring to the small amount of work that had to be done). Wishes: Held og lykke 'luck and fortune' . Equivalent to the English good luck . Kn\u00e6k og br\u00e6k 'crack and break' has the same meaning as good luck even though it likely refers to the breaking of bodyparts just like the English expression break a leg . Mostly said by sport fishermen, hunters and theater crews. Danish Sign Language Initial greetings%DIFDELCMD < %DIFDELCMD < %%% HEJ, mouth movement: /hej/ or /dav/ or nothing. Used as a standard greeting equivalent to English hi. I-ORDEN, mouth movement: /bibi/. When repeated twice the sign can be translated as 'is everything going well?'.%DIFDELCMD < %DIFDELCMD < %%% Farewells VINKE, mouth movement: /farvel/. The sign means 'goodbye' and looks like waving .", "after_revision": "Hvordan g\u00e5r det? 'how goes it?'. Possible answers are: Det g\u00e5r godt/fint 'it goes good/fine'. Hvor'n sk\u00e6r'en? 'how does it cut?' Informal greeting between close friends. Hvad s\u00e5? 'what then?'. Similar to the English greeting what's up?. More often used in Jutland. A possible answer is Ikke s\u00e5 meget 'not that much'. Hej is a common informal greeting and equivalent to the English hi, pronounced almost the same. Single word greetings with approximately the same meaning include hejsa (from combining hej with German sa from French \u00e7a), dav, davs (both reduced forms of dag meaning 'day'), goddag, hall\u00f8j, hall\u00f8jsa, hall\u00f8jsovs (Pun greeting. Made by combining hall\u00f8j and l\u00f8gsovs 'onion sauce'), p\u00e6nt goddag 'nice good day' is a more formal greeting. Hallo is only used when the speaker is not sure they can be heard. Examples when saying/yelling hallo is appropriate: Trying to find out if someone else is in a seemingly empty room/building; using it as an initial phone greeting; checking if the person you're calling can still hear you (when experiencing a bad phone connection); trying to get the attention of a listener that appears to not pay attention. Mojn is only used in Southern Jutland. It comes from North German moin from the German word Morgen meaning 'morning'. Despite its original meaning it's used as a greeting throughout the day. Hej hej or farvel are common ways to say goodbye. Vi ses 'we will see each other' is used as a farewell greeting in face-to-face conversations while vi snakkes 'we will speak each other'/vi snakkes ved 'we will speak to each other by' are used in both face-to-face and phone/text conversations. K\u00f8r forsigtigt 'drive safely' is said to a person leaving the place where the speaker is located and going to drive/bike to another location. Kom godt hjem 'come well home' is said in the same situation whatever the method of transportation. God arbejdslyst 'good lust for work' is said when parting with a person that is either currently at work or leaving to go to work. Tak for i dag 'thanks for today' is often said in more formal contexts of prolonged interactions like at the end of a meeting or the end of a class. God bedring 'good recovery'. Said when leaving a sick person. Ha' det godt 'have it good' or du/I m\u00e5 ha det godt 'you (sg./pl.) may have it good' is a farewell phrase wishing for the other's well-being. A joke variant of this is Ha' det som I ser ud 'have it as you look' (literally: 'have it as you look out'). By not saying the expected adjective godt 'good', the speaker is violating the maxim of quantity and thereby inferring that they do not think the listener looks good. This can be understood as an insult and is therefore mainly used informally between friends. Some greetings like hej can be used throughout the day. Some are more specific, and the specific time of when to switch to the next greeting can vary from speaker to speaker. Time-specific greetings include Godmorgen ( 'good morning' ), God formiddag ( literally 'good pre-noon' ), Goddag ( 'good day' ), God eftermiddag ( 'good afternoon' ), Godaften ( 'good evening' ), and Godnat ( 'good night' ) . Ways of saying thanks include tak '''thanks', tak skal du have 'thanks shall you have', mange tak 'many thanks', 'thousand thanks', tak for det 'thanks for that' and jeg takker 'I thank'. A thanks can be answered with selv tak 'self thanks' or det var s\u00e5 lidt 'it was so little' (referring to the small amount of work that had to be done). Other phatic expressions include Held og lykke ( 'luck and fortune' ), equivalent to the English good luck , and Kn\u00e6k og br\u00e6k ( 'crack and break' ) which has the same meaning as good luck similar to the English expression break a leg %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < %DIFDELCMD < %%% , mostly used by hunters, fishers, and theater crews .", "edit_actions": [{"type": "D", "before": "very", "after": null, "start_char_pos": 326, "end_char_pos": 330}, {"type": "D", "before": "But in general the time-specific greetings are:", "after": null, "start_char_pos": 2919, "end_char_pos": 2966}, {"type": "R", "before": "Godmorgen", "after": "Time-specific greetings include Godmorgen (", "start_char_pos": 2967, "end_char_pos": 2976}, {"type": "D", "before": ", around 6 AM - 10 AM", "after": null, "start_char_pos": 2992, "end_char_pos": 3013}, {"type": "R", "before": "God formiddag", "after": "), God formiddag (", "start_char_pos": 3014, "end_char_pos": 3027}, {"type": "D", "before": ", around 9 AM - 12 AM", "after": null, "start_char_pos": 3054, "end_char_pos": 3075}, {"type": "R", "before": "Goddag", "after": "), Goddag (", "start_char_pos": 3076, "end_char_pos": 3082}, {"type": "D", "before": ", around 10 AM - 6 PM", "after": null, "start_char_pos": 3094, "end_char_pos": 3115}, {"type": "R", "before": "God eftermiddag", "after": "), God eftermiddag (", "start_char_pos": 3116, "end_char_pos": 3131}, {"type": "D", "before": ", around 1 PM - 6 PM", "after": null, "start_char_pos": 3149, "end_char_pos": 3169}, {"type": "R", "before": "Godaften", "after": "), Godaften (", "start_char_pos": 3170, "end_char_pos": 3178}, {"type": "D", "before": ", around 6 PM - 12 AM", "after": null, "start_char_pos": 3194, "end_char_pos": 3215}, {"type": "R", "before": "Godnat", "after": "), and Godnat (", "start_char_pos": 3216, "end_char_pos": 3222}, {"type": "R", "before": ", said whenever the listener is going to go to sleep", "after": ")", "start_char_pos": 3236, "end_char_pos": 3288}, {"type": "D", "before": "Thanking:", "after": null, "start_char_pos": 3291, "end_char_pos": 3300}, {"type": "R", "before": "Ways of say", "after": "Ways of saying", "start_char_pos": 3301, "end_char_pos": 3312}, {"type": "R", "before": "Wishes:", "after": "Other phatic expressions include", "start_char_pos": 3638, "end_char_pos": 3645}, {"type": "A", "before": null, "after": "(", "start_char_pos": 3660, "end_char_pos": 3660}, {"type": "R", "before": ". Equivalent", "after": "), equivalent", "start_char_pos": 3680, "end_char_pos": 3692}, {"type": "R", "before": ".", "after": ", and", "start_char_pos": 3718, "end_char_pos": 3719}, {"type": "A", "before": null, "after": "(", "start_char_pos": 3733, "end_char_pos": 3733}, {"type": "A", "before": null, "after": ") which", "start_char_pos": 3752, "end_char_pos": 3752}, {"type": "R", "before": "even though it likely refers to the breaking of bodyparts just like the", "after": "similar to the", "start_char_pos": 3787, "end_char_pos": 3858}, {"type": "D", "before": ". Mostly said by sport fishermen, hunters and theater crews.", "after": null, "start_char_pos": 3890, "end_char_pos": 3950}, {"type": "D", "before": "Danish Sign Language Initial greetings", "after": null, "start_char_pos": 3951, "end_char_pos": 3989}, {"type": "D", "before": "HEJ, mouth movement: /hej/ or /dav/ or nothing. Used as a standard greeting equivalent to English hi.", "after": null, "start_char_pos": 4019, "end_char_pos": 4120}, {"type": "D", "before": "I-ORDEN, mouth movement: /bibi/. When repeated twice the sign can be translated as 'is everything going well?'.", "after": null, "start_char_pos": 4121, "end_char_pos": 4232}, {"type": "D", "before": "Farewells", "after": null, "start_char_pos": 4262, "end_char_pos": 4271}, {"type": "R", "before": "VINKE, mouth movement: /farvel/. The sign means 'goodbye' and looks like waving", "after": ", mostly used by hunters, fishers, and theater crews", "start_char_pos": 4272, "end_char_pos": 4351}], "sents_char_pos": [0, 16, 32, 93, 109, 128, 169, 192, 236, 264, 316, 417, 646, 754, 821, 946, 985, 1086, 1163, 1202, 1281, 1354, 1404, 1649, 1791, 1891, 2022, 2171, 2200, 2233, 2374, 2483, 2650, 2743, 2799, 2918, 3290, 3485, 3637, 3891, 3950, 4066, 4120, 4153, 4232, 4304]}
+{"doc_id": "7214055", "revision_depth": "1", "before_revision": "Dipalpur (; ), also spelt Depalpur, is a city in Okara District of the Punjab that served as headquarters of Depalpur Tehsil . Dipalpur tehsil is the largest tehsil of pakistan.Largest Tehsil of Pakistan - Laws of Pakistan It is situated 25 kilometres from the district capital Okara on a bank of the Beas River in Bari Doab.Location of Dipalpur - Falling Rain GenomicsTehsils & Unions in the District of Okara - Government of Pakistan It is located in the west of District Kasur. Historical architecture In the past, Dipalpur was surrounded by a fortified wall, rising to the height of 25 feet and strengthened by a deep trench. When and by whom this wall was constructed is not known, but it was renovated, repaired and improved during the rule of Firuz Shah Tughluq and later by Abdur Rahim Khan-e-Khanan, who was the governor during the time of Akbar.Firoz Shah Tughluq constructed a grand mosque and palaces. He also excavated a canal from the river Sutlej to irrigate gardens around the town. Wide and airy tunnels linked the royal residential quarters inside the fort to the adjoining gardens outside.There were 24 burgs (musketry holes)on the fortification wall, 24 mosques, 24 (ponds) and 24 wells at the town's peak. The trench, ponds and tunnels have been filled in, but in some places the location of the trench can still be defined. Most of the wall has been razed. Two of the four massive gateways with pointed arches also exist though they are badly damaged and their wooden doors have vanished. Later coats of cement have marred the original architecture of the gateways. Hindu monastery Besides doors with decorated latches, Jharokhas, bay windows and cut brick works, the most noticeable feature inside old Dipalpur is the monastery of Lal Jas Raj, a guru much venerated by the local people. According to the legend, Lal Jas Raj was the young son of Raja Dipa Chand , the founder of Dipalpur. He sank into the earth due to a curse by his stepmother Rani Dholran. Raja Dipa Chand constructed this monastery in the memory of his son. Today, the chamber is dilapidated, the doors are jammed and a stairway is used for storage. The structure itself is crumbling. According to local residents, there used to be a grand annual \"mela\" held here. It was also used by Hindus as a place to perform the Sardukahr (head-shaving ritual) until the partition, but \"nobody comes anymore\". Caravanserai Dipalpur's saray (inn) is near the monastery of Lal Jas Raj. It was a spacious building with airy rooms on four sides, a big courtyard in the centre and four arched entrances. The inn, like most of the older structures in town, is now in a state of disrepair. It has been divided and subdivided so many times by successive occupants that the original shapes are obscured. Even the verandas have been converted to create rooms.%DIFDELCMD < %DIFDELCMD < %%% Saints 350px| Hujra Shah Muqeem Many Muslim saints have come to preach in this area. Bahawal Haq commonly known as Bahawal Sher Qalandar came from Baghdad and settled in the village of Patharwall near Dipalpur. The saint constructed a hujra (small living room) and a mosque outside the village. His grandson Shah Muqeem continued his mission. The village came to be known as Hujra Shah Muqeem. This is the place mentioned in the famous Punjabi love story Mirza Saheban, although there is no historical evidence that Jati Sahiba (Mirza Sahiba) came here and prayed that \"The streets should desert when where my lover Mirza roams about\" . The Mughal Emperor Akbar, along with his son Saleem and royal entourage, stayed in Dipalpur when he came to pay homage to Farid Ganj Shakar in 1578. Akbar named the corridor Bari Doab by combining the syllables of the names of the two rivers, Beas and Ravi, thatbounded the area. Baba Guru Nanak also stayed in Dipalpur for some time. The ruins of a Gurudwara mark the place. Muslim saint named as Saayi Abdul Razaq stayed in Dipalpur and later on he started his volunteer activity for local people and after his death he was buried in city. Now, his death place is known as Razaqia Darbar. Hazrat baba Fazal Chisti shrine in Kari wala Jagir Near sukh pur.His Urs celebrated every year. Other notable residents Dr. Yasir Imtiaz Khan (born 1983) , scientist Qaiser Shehzad (born 1986), cricketer Manzoor Wattoo (born 1939 Bangla Fazilka India ), politician", "after_revision": "Dipalpur (; ), also spelt Depalpur, is a city in the Okara District of Pakistani province of Punjab that served as headquarters of Depalpur Tehsil , the largest Tehsil of Pakistan . It is situated 25 kilometres from the district capital Okara on a bank of the Beas River in Bari Doab.Location of Dipalpur - Falling Rain GenomicsTehsils & Unions in the District of Okara - Government of Pakistan It is located in the west of District Kasur. History Early Depalpur has a great historic past and is a very ancient town. The fortified town of Dipalpur is built on an old Kashan site (40 A.D. to 172 A.D.). The fortifications themselves are very ancient; though it is impossible determine their dates. All that can be said is that they are older than the visitation of Timur in 1398 A.D. From the time of Alexander to the time of Mehmood Ghaznavi, there were no found accounts of Dipalpur. According to the Gazetteer of 1935, the town was claimed to be founded by Sri Chand it was called Sri Nagar at that time, The modern name is claimed to have been named by Raja Deva Pala after he re-founded the town. Early Muslim period Mughal and Delhi Sultanates However, in older times, Dipalpur fell on the way to Delhi and, as such, was considered to be a %DIFDELCMD < %DIFDELCMD < %%% place where an invader could be engaged. Dipalpur, therefore, was one of the 3 lines of defense; the other two begin Uch Sharif, Samana, and Hansi. Ain-i-Akbari reveals that the militia force at Dipalpur, during the reign of Abul Fazal, consisted of 5,210 mounted Horsemen and 53,300 infantry. In the 14th Century, Firuz Shah Tughlaq regularly visited this place. It is also believed that he built a large Mosque outside the city, which no longer remains. At the time of Timur\u2019s invasion, Depalpur was second to Multan in size and importance. The town, it is believed may have been deserted due to Taimurs\u2019s invasion and drying up old Beas River. The Mughal Emperor Akbar, along with his son Saleem (Jahangir) along with their royal entourage, stayed in Dipalpur when he came to pay homage to Fariduddin Ganjshakar in 1578. Akbar named the corridor Bari Doab by combining the syllables of the names of the two rivers, Beas and Ravi River, that bounded the area. Hujra Shah Muqeem Sufism Many Muslim saints have come to preach in this area. Hazrat Bahawal Haq commonly known as Bahawal Sher Qalandar came from Baghdad and settled in the village of Patharwall near Dipalpur. The saint constructed a hujra (small living room) and a mosque outside the village. His grandson Hazrat Shah Muqeem continued his mission. The village came to be known as Hujra Shah Muqeem. This is the place mentioned in the famous Punjabi love story Mirza Sahiban, in which Jati Sahiban came here are prayed, although there is no historical evidence to that . A Muslim saint named as Saayin Abdul Razaq stayed in Dipalpur and later on he started his volunteer activity for local people and after his death he was buried in city. Now, his death place is known as Razaqia Darbar. Mongols The Mongols invaded this part of the country repeatedly and they were checked at Dipalpur by Ghiyas-ud-Din Balban and his son Muhammad Khan, during their last invasion of Punjab in 1285 A.D. Pir Muhammad Khan Mangol (also called Samar Khan) was defeated at Dipalpur but during the pursuit of the retreating Mongols, Muhammad Khan was killed. It is believed that Shahzada Muhammad Khan is laid to rest in a small tomb to the west of the Badshahi Mosque. Conformation from any authentic sources is, however, not available. Notable residents Qaiser Shehzad (born 1986), cricketer Manzoor Wattoo (born 1939 ), politician", "edit_actions": [{"type": "A", "before": null, "after": "the", "start_char_pos": 49, "end_char_pos": 49}, {"type": "R", "before": "the", "after": "Pakistani province of", "start_char_pos": 68, "end_char_pos": 71}, {"type": "R", "before": ". Dipalpur tehsil is the largest tehsil of pakistan.Largest", "after": ", the largest", "start_char_pos": 126, "end_char_pos": 185}, {"type": "R", "before": "- Laws of Pakistan", "after": ".", "start_char_pos": 205, "end_char_pos": 223}, {"type": "R", "before": "Historical architecture In the past, Dipalpur was surrounded by a fortified wall, rising to the height of 25 feet and strengthened by a deep trench. When and by whom this wall was constructed is not known, but it was renovated, repaired and improved during the rule of Firuz Shah Tughluq and later by Abdur Rahim Khan-e-Khanan, who was the governor during the time of Akbar.Firoz Shah Tughluq constructed a grand mosque and palaces. He also excavated a canal from the river Sutlej to irrigate gardens around the town.", "after": "History", "start_char_pos": 482, "end_char_pos": 999}, {"type": "D", "before": "Wide and airy tunnels linked the royal residential quarters inside the fort to the adjoining gardens outside.There were 24 burgs (musketry holes)on the fortification wall, 24 mosques, 24 (ponds) and 24 wells at the town's peak. The trench, ponds and tunnels have been filled in, but in some places the location of the trench can still be defined. Most of the wall has been razed. Two of the four massive gateways with pointed arches also exist though they are badly damaged and their wooden doors have vanished. Later coats of cement have marred the original architecture of the gateways.", "after": null, "start_char_pos": 1000, "end_char_pos": 1588}, {"type": "R", "before": "Hindu monastery Besides doors with decorated latches, Jharokhas, bay windows and cut brick works, the most noticeable feature inside old Dipalpur is the monastery of Lal Jas Raj, a guru much venerated by the local people.", "after": "Early Depalpur has a great historic past and is a very ancient town. The fortified town of Dipalpur is built on an old Kashan site (40 A.D. to 172 A.D.). The fortifications themselves are very ancient; though it is impossible determine their dates. All that can be said is that they are older than the visitation of Timur in 1398 A.D. From the time of Alexander to the time of Mehmood Ghaznavi, there were no found accounts of Dipalpur.", "start_char_pos": 1589, "end_char_pos": 1810}, {"type": "R", "before": "legend, Lal Jas Raj was the young son of Raja Dipa Chand , the founder of Dipalpur. He sank into the earth due to a curse by his stepmother Rani Dholran. Raja Dipa Chand constructed this monastery in the memory of his son. Today, the chamber is dilapidated,", "after": "Gazetteer of 1935,", "start_char_pos": 1828, "end_char_pos": 2085}, {"type": "R", "before": "doors are jammed and a stairway is used for storage. The structure itself is crumbling. According to local residents, there used", "after": "town was claimed to be founded by Sri Chand it was called Sri Nagar at that time, The modern name is claimed to have been named by Raja Deva Pala after he re-founded the town.", "start_char_pos": 2090, "end_char_pos": 2218}, {"type": "A", "before": null, "after": "Early Muslim period", "start_char_pos": 2219, "end_char_pos": 2219}, {"type": "A", "before": null, "after": "Mughal and Delhi Sultanates However, in older times, Dipalpur fell on the way to Delhi and, as such, was considered", "start_char_pos": 2220, "end_char_pos": 2220}, {"type": "D", "before": "grand annual \"mela\" held here. It was also used by Hindus as a place to perform the Sardukahr (head-shaving ritual) until the partition, but \"nobody comes anymore\".", "after": null, "start_char_pos": 2229, "end_char_pos": 2393}, {"type": "D", "before": "Caravanserai Dipalpur's saray (inn) is near the monastery of Lal Jas Raj. It was a spacious building with airy rooms on four sides, a big courtyard in the centre and four arched entrances. The inn, like most of the older structures in town, is now in a state of disrepair. It has been divided and subdivided so many times by successive occupants that the original shapes are obscured. Even the verandas have been converted to create rooms.", "after": null, "start_char_pos": 2394, "end_char_pos": 2833}, {"type": "D", "before": "Saints", "after": null, "start_char_pos": 2863, "end_char_pos": 2869}, {"type": "R", "before": "350px|", "after": "place where an invader could be engaged. Dipalpur, therefore, was one of the 3 lines of defense; the other two begin Uch Sharif, Samana, and Hansi. Ain-i-Akbari reveals that the militia force at Dipalpur, during the reign of Abul Fazal, consisted of 5,210 mounted Horsemen and 53,300 infantry. In the 14th Century, Firuz Shah Tughlaq regularly visited this place. It is also believed that he built a large Mosque outside the city, which no longer remains. At the time of Timur\u2019s invasion, Depalpur was second to Multan in size and importance. The town, it is believed may have been deserted due to Taimurs\u2019s invasion and drying up old Beas River. The Mughal Emperor Akbar, along with his son Saleem (Jahangir) along with their royal entourage, stayed in Dipalpur when he came to pay homage to Fariduddin Ganjshakar in 1578. Akbar named the corridor Bari Doab by combining the syllables of the names of the two rivers, Beas and Ravi River, that bounded the area.", "start_char_pos": 2870, "end_char_pos": 2876}, {"type": "A", "before": null, "after": "Sufism", "start_char_pos": 2895, "end_char_pos": 2895}, {"type": "A", "before": null, "after": "Hazrat", "start_char_pos": 2949, "end_char_pos": 2949}, {"type": "A", "before": null, "after": "Hazrat", "start_char_pos": 3173, "end_char_pos": 3173}, {"type": "R", "before": "Saheban,", "after": "Sahiban, in which Jati Sahiban came here are prayed,", "start_char_pos": 3327, "end_char_pos": 3335}, {"type": "R", "before": "that Jati Sahiba (Mirza Sahiba) came here and prayed that \"The streets should desert when where my lover Mirza roams about\"", "after": "to that", "start_char_pos": 3377, "end_char_pos": 3500}, {"type": "R", "before": "The Mughal Emperor Akbar, along with his son Saleem and royal entourage, stayed in Dipalpur when he came to pay homage to Farid Ganj Shakar in 1578. Akbar named the corridor Bari Doab by combining the syllables of the names of the two rivers, Beas and Ravi, thatbounded the area. Baba Guru Nanak also stayed in Dipalpur for some time. The ruins of a Gurudwara mark the place.", "after": "A", "start_char_pos": 3503, "end_char_pos": 3878}, {"type": "R", "before": "Saayi", "after": "Saayin", "start_char_pos": 3901, "end_char_pos": 3906}, {"type": "D", "before": "Hazrat baba Fazal Chisti shrine in Kari wala Jagir Near sukh pur.His Urs celebrated every year.", "after": null, "start_char_pos": 4094, "end_char_pos": 4189}, {"type": "R", "before": "Other notable residents", "after": "Mongols The Mongols invaded this part of the country repeatedly and they were checked at Dipalpur by Ghiyas-ud-Din Balban and his son Muhammad Khan, during their last invasion of Punjab in 1285 A.D. Pir Muhammad Khan Mangol (also called Samar Khan) was defeated at Dipalpur but during the pursuit of the retreating Mongols, Muhammad Khan was killed. It is believed that Shahzada Muhammad Khan is laid to rest in a small tomb to the west of the Badshahi Mosque. Conformation from any authentic sources is, however, not available.", "start_char_pos": 4190, "end_char_pos": 4213}, {"type": "R", "before": "Dr. Yasir Imtiaz Khan (born 1983) , scientist", "after": "Notable residents", "start_char_pos": 4214, "end_char_pos": 4259}, {"type": "D", "before": "Bangla Fazilka India", "after": null, "start_char_pos": 4324, "end_char_pos": 4344}], "sents_char_pos": [0, 11, 178, 326, 481, 630, 856, 914, 999, 1109, 1227, 1346, 1379, 1511, 1588, 1810, 1911, 1981, 2050, 2142, 2177, 2259, 2393, 2467, 2582, 2666, 2778, 2833, 2948, 3075, 3159, 3208, 3259, 3502, 3651, 3782, 3837, 3878, 4044, 4093, 4159, 4189]}
+{"doc_id": "7617772", "revision_depth": "1", "before_revision": "A cabinet painting (or \"cabinet picture\") is a small painting, typically no larger than about two feet in either dimension, but often much smaller.Although up to four feet in each dimension could still qualify; see the Metropolitan Rubens. The term is especially used of paintings that show full-length figures at a small scale, as opposed to say a head painted nearly life-size , and that are painted very precisely, with a great degree of \"finish\".Rubens from Metropolitan New York From the fifteenth century onwards wealthy collectors of art would keep such paintings in a cabinet, a relatively small and private room (often very small indeed, even in a very large house) , to which only those with whom they were on especially intimate terms would be admitted. This room might be used as a study or office, or just a sitting room. Heating the main rooms in large palaces or mansions in the winter was difficult, and small rooms were more comfortable. They also offered more privacy from servants or other household members or visitors. Typically, such a room would be for the use of a single individual , so that a house might have at least two (his and hers) and often more. Names varied: cabinet, closet, study (from the Italian studiolo), office and others. Later such paintings might be housed in a display case, which might also be called a cabinet, but the term cabinet arose from the name (originally in Italian) of the room, not the piece of furniture. Other small precious objects, including miniature paintings, \"curiosities\" of all sorts (see cabinet of curiosities), old master prints, books, small sculptures and so on, might also be in the room. There is a rare surviving cabinet with its contents probably little changed since the early eighteenth century at Ham House in Richmond, London. It is less than ten feet square, and leads off from the Long Gallery , which is well over a hundred feet long by about twenty wide, giving a rather startling change in scale and atmosphere. As is often the case, it has an excellent view of the front entrance to the house, so that comings and going can be observed. Most surviving large houses or palaces, especially from before 1700, have such rooms, but they are very often not displayed to visitors. The magnificent Mannerist Studiolo of Francesco I Medici in Florence is rather larger than most examples , and rather atypical in that most of the paintings were commissioned for the room. There was an equivalent type of small sculpture, usually bronzes , of which the leading exponent in the late Renaissance was Giambologna who produced sizeable editions of reduced versions of his large works, and also made many only in small scale.Metropolitan Timeline of Art History These were designed to be picked up and handled, even fondled. Small antiquities were also very commonly displayed in such rooms, including coins . Small paintings have been produced at all periods of Western art, but some periods and artists are especially noticeable for them. Raphael produced many cabinet paintings, and all the paintings of the important German artist Adam Elsheimer (1578\u20131610) could be so described. The works of these two were much copied. The Dutch artists of the seventeenth century had an enormous output of small paintings. The painters of the Leiden School were especially noted \"Fijnschilders\" \u2013 \"fine painters\" producing highly finished small works. Watteau, Fragonard and other French 18th-century artists produced many small works, generally emphasizing spirit and atmosphere rather than a detailed finish. The term is not as common as it was in the 19th century, but remains in use among art historians. A \"cabinet miniature\" is a larger portrait miniature, usually full-length and typically up to about ten inches high. These were first painted in England, from the end of the 1580s, initially by Nicholas Hilliard and Isaac Oliver.Strong, Roy: Artists of the Tudor Court: The Portrait Miniature Rediscovered 1520-1620, Victoria & Albert Museum exhibit catalogue, 1983, pp. 156-67,", "after_revision": "A cabinet painting (or \"cabinet picture\") is a small painting, typically no larger than two feet (0.3 meters) in either dimension, but often much smaller.Although up to four feet in each dimension could still qualify; see the Metropolitan Rubens. The term is especially used for paintings that show full-length figures or landscapes at a small scale, rather than a head or other object painted nearly life-size . Such paintings are done very precisely, with a great degree of \"finish\".Rubens from Metropolitan New York From the fifteenth century onward, wealthy collectors of art would keep these paintings in a cabinet, which was a relatively small and private room (often very small even in large houses) to which only those with whom they were on especially intimate terms would be admitted. A cabinet, also known as a closet, study (from the Italian studiolo), office, or by other names, might be used as an office or just a sitting room. Heating the main rooms in large palaces or mansions in the winter was difficult, so small rooms such as cabinets were more comfortable. They offered more privacy from servants or other household members and visitors. Typically, a cabinet would be for the use of a single individual ; a large house might have at least two (his and hers) and often more. Later , cabinet paintings might be housed in a display case, also known as a cabinet, but the term cabinet arose from the name (originally in Italian) of the room, not the piece of furniture. Other small and precious objects, including miniature paintings, \"curiosities\" of all sorts (see cabinet of curiosities), old master prints, books, or small sculptures might also be displayed in the room. A rare example of a surviving cabinet with its contents probably little changed since the early eighteenth century is at Ham House in Richmond, London. It is less than ten feet square, and leads off from the Long Gallery which is over a hundred feet long and twenty feet wide, giving a rather startling change in scale and atmosphere. As is often the case, it has an excellent view of the front entrance to the house, so that passerby and daily activities can be observed. Most surviving large houses or palaces, especially from before 1700, have such rooms, but they are often not displayed or accessible to visitors. The magnificent Mannerist Studiolo of Francesco I Medici in Florence is larger than most examples and rather atypical in that most of the paintings were commissioned for the room. There is an equivalent type of small sculpture, usually bronzes . The leading exponent in the late Renaissance was Giambologna , who produced sizeable editions of reduced versions of his large works, and also made many exclusively in small scale.Metropolitan Timeline of Art History These sculptures were designed to be picked up and handled, even fondled. Small antiquities were also very commonly displayed in such rooms, including rare coinage . Small paintings have been produced during all periods of Western art, but some periods and artists are especially noticeable for them. Raphael produced many cabinet paintings, and all the paintings of the important German artist Adam Elsheimer (1578\u20131610) could be so described. The works of these two were much copied. The Dutch artists of the seventeenth century had an enormous output of small paintings. The painters of the Leiden School were especially noted \"Fijnschilders\" or \"fine painters\" producing highly finished small works. Watteau, Fragonard and other French 18th-century artists produced many small works, generally emphasizing spirit and atmosphere rather than a detailed finish. In modern times the term is not as common as it was in the 19th century, but remains in use among art historians. A \"cabinet miniature\" is a larger portrait miniature, usually full-length and typically up to about ten inches (25.5 cm) high. These were first painted in England, from the end of the 1580s, initially by Nicholas Hilliard and Isaac Oliver.Strong, Roy: Artists of the Tudor Court: The Portrait Miniature Rediscovered 1520-1620, Victoria & Albert Museum exhibit catalogue, 1983, pp. 156-67,", "edit_actions": [{"type": "R", "before": "about two feet", "after": "two feet (0.3 meters)", "start_char_pos": 88, "end_char_pos": 102}, {"type": "R", "before": "of", "after": "for", "start_char_pos": 268, "end_char_pos": 270}, {"type": "A", "before": null, "after": "or landscapes", "start_char_pos": 311, "end_char_pos": 311}, {"type": "R", "before": "as opposed to say a head", "after": "rather than a head or other object", "start_char_pos": 330, "end_char_pos": 354}, {"type": "R", "before": ", and that are painted", "after": ". Such paintings are done", "start_char_pos": 380, "end_char_pos": 402}, {"type": "R", "before": "onwards", "after": "onward,", "start_char_pos": 512, "end_char_pos": 519}, {"type": "R", "before": "such", "after": "these", "start_char_pos": 557, "end_char_pos": 561}, {"type": "A", "before": null, "after": "which was", "start_char_pos": 586, "end_char_pos": 586}, {"type": "R", "before": "indeed, even in a very large house) ,", "after": "even in large houses)", "start_char_pos": 641, "end_char_pos": 678}, {"type": "R", "before": "This room might be used as a study or", "after": "A cabinet, also known as a closet, study (from the Italian studiolo),", "start_char_pos": 767, "end_char_pos": 804}, {"type": "A", "before": null, "after": "by other names, might be used as an office or", "start_char_pos": 816, "end_char_pos": 816}, {"type": "R", "before": "and small rooms", "after": "so small rooms such as cabinets", "start_char_pos": 919, "end_char_pos": 934}, {"type": "D", "before": "also", "after": null, "start_char_pos": 963, "end_char_pos": 967}, {"type": "R", "before": "or", "after": "and", "start_char_pos": 1030, "end_char_pos": 1032}, {"type": "R", "before": "such a room", "after": "a cabinet", "start_char_pos": 1054, "end_char_pos": 1065}, {"type": "R", "before": ", so that a", "after": "; a large", "start_char_pos": 1110, "end_char_pos": 1121}, {"type": "D", "before": "Names varied: cabinet, closet, study (from the Italian studiolo), office and others.", "after": null, "start_char_pos": 1183, "end_char_pos": 1267}, {"type": "R", "before": "such", "after": ", cabinet", "start_char_pos": 1274, "end_char_pos": 1278}, {"type": "R", "before": "which might also be called", "after": "also known as", "start_char_pos": 1324, "end_char_pos": 1350}, {"type": "A", "before": null, "after": "and", "start_char_pos": 1480, "end_char_pos": 1480}, {"type": "R", "before": "small sculptures and so on,", "after": "or small sculptures", "start_char_pos": 1613, "end_char_pos": 1640}, {"type": "A", "before": null, "after": "displayed", "start_char_pos": 1655, "end_char_pos": 1655}, {"type": "R", "before": "There is a rare", "after": "A rare example of a", "start_char_pos": 1669, "end_char_pos": 1684}, {"type": "A", "before": null, "after": "is", "start_char_pos": 1780, "end_char_pos": 1780}, {"type": "R", "before": ", which is well", "after": "which is", "start_char_pos": 1884, "end_char_pos": 1899}, {"type": "R", "before": "by about twenty", "after": "and twenty feet", "start_char_pos": 1925, "end_char_pos": 1940}, {"type": "R", "before": "comings and going", "after": "passerby and daily activities", "start_char_pos": 2096, "end_char_pos": 2113}, {"type": "D", "before": "very", "after": null, "start_char_pos": 2230, "end_char_pos": 2234}, {"type": "A", "before": null, "after": "or accessible", "start_char_pos": 2255, "end_char_pos": 2255}, {"type": "D", "before": "rather", "after": null, "start_char_pos": 2341, "end_char_pos": 2347}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2374, "end_char_pos": 2375}, {"type": "R", "before": "was", "after": "is", "start_char_pos": 2464, "end_char_pos": 2467}, {"type": "R", "before": ", of which the", "after": ". The", "start_char_pos": 2523, "end_char_pos": 2537}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2595, "end_char_pos": 2595}, {"type": "R", "before": "only", "after": "exclusively", "start_char_pos": 2686, "end_char_pos": 2690}, {"type": "A", "before": null, "after": "sculptures", "start_char_pos": 2749, "end_char_pos": 2749}, {"type": "R", "before": "coins", "after": "rare coinage", "start_char_pos": 2884, "end_char_pos": 2889}, {"type": "R", "before": "at", "after": "during", "start_char_pos": 2927, "end_char_pos": 2929}, {"type": "R", "before": "\u2013", "after": "or", "start_char_pos": 3368, "end_char_pos": 3369}, {"type": "R", "before": "The", "after": "In modern times the", "start_char_pos": 3584, "end_char_pos": 3587}, {"type": "A", "before": null, "after": "(25.5 cm)", "start_char_pos": 3793, "end_char_pos": 3793}], "sents_char_pos": [0, 147, 210, 239, 451, 766, 837, 957, 1042, 1182, 1267, 1467, 1668, 1814, 2004, 2130, 2268, 2457, 2706, 2806, 3022, 3166, 3207, 3295, 3424, 3583, 3681, 3799, 3912]}
+{"doc_id": "787748", "revision_depth": "1", "before_revision": "Backcrossing is a crossing of a hybrid with one of its parents or an individual genetically similar to its parent, in order to achieve offspring with a genetic identity which is closer to that of the parent. It is used in horticulture, animal breeding and in production of gene knockout organisms. Backcrossed hybrids are sometimes described with acronym \"BC\" , for example, an F1 hybrid crossed with one of its parents (or a genetically similar individual) can be termed a BC1 hybrid, and a further cross of the BC1 hybrid to the same parent (or a genetically similar individual) produces a BC2 hybrid. Advantages If the recurrent parent is an elite genotype, at the end of the backcrossing programme an elite genotype is recovered. As there is no \"new\" recombination , the elite combination is not lost. Disadvantages Works poorly for quantitative traits Is more restricted for recessive traits In practice, sections of genome from the non-recurrent parents are often still present and can have unwanted traits associated with them For very wide crosses, limited recombination may maintain thousands of \u2018alien\u2019 genes within the elite cultivar Many backcrosses are required to produce a new cultivar which can take many years Again, the pure tall (TT) and pure dwarf (tt) pea plants when crossed in the parental generation, they produce all heterozygote (Tt) tall pea plants in the first filial generation. The cross between first filial heterozygote tall (Tt) pea plant and pure tall (TT) or pure dwarf (tt) pea plant of the parental generation is also an example for the back-crossing between two plants. In this case, the filial generation formed after the back cross may have a phenotype ratio of 1:1 if the cross is made with recessive parent or else all offspring may be having phenotype of dominant trait if back cross is with parent having dominant trait. The former of these traits is also called a test cross. Artificially recombinant lines In plants, inbred backcross lines (IBLs ) refers to lines (i.e. populations ) of plants derived from the repeated backcrossing of a line with artificially recombinant DNA with the wild type, operating some kind of selection that can be phenotypical or through a molecular marker (for the production of introgression lines ). This image demonstrates backcrossing of a heterozygous mouse from one genetic background onto another genetic background. In this example, the gene knockout is performed on 129/Sv cells and then backcrossed into the C57B/6J genetic background. With each successive backcross, there is an increase in the percentage of C57B/6J DNA that constitutes the genome of the offspring . Backcrossing may be deliberately employed in animals to transfer a desirable trait in an animal of inferior genetic background to an animal of preferable genetic background. In gene knockout experiments in particular, where the knockout is performed on easily cultured stem cell lines, but is required in an animal with a different genetic background, the knockout animal is backcrossed against the animal of the required genetic background. As the figure shows, each time that the mouse with the desired trait (in this case the lack of a gene (i.e. a knockout), indicated by the presence of a positive selectable marker) is crossed with a mouse of a constant genetic background, the average percentage of the genetic material of the offspring that is derived from that constant background increases. The result, after sufficient reiterations, is an animal with the desired trait in the desired genetic background, with the percentage of genetic material from the original stem cells reduced to a minimum ( in the order of 0.01\\%). Due to the nature of meiosis, in which chromosomes derived from each parent are randomly shuffled and assigned to each nascent gamete, the percentage of genetic material deriving from either cell-line will vary between offspring of a single crossing but will have an expected value. The genotype of each member of offspring may be assessed to choose not only an individual that carries the desired genetic trait, but also the minimum percentage of genetic material from the original stem cell line. References %DIFDELCMD < %DIFDELCMD < %%% Notes Bibliography", "after_revision": "Backcrossing is a crossing of a hybrid with one of its parents or an individual genetically similar to its parent, to achieve offspring with a genetic identity closer to that of the parent. It is used in horticulture, animal breeding , and production of gene knockout organisms. Backcrossed hybrids are sometimes described with acronym \"BC\" ; for example, an F1 hybrid crossed with one of its parents (or a genetically similar individual) can be termed a BC1 hybrid, and a further cross of the BC1 hybrid to the same parent (or a genetically similar individual) produces a BC2 hybrid. Advantages If the recurrent parent is an elite genotype, at the end of the backcrossing programme , an elite genotype is recovered. As no \"new\" recombination results , the elite combination is not lost. Disadvantages It works poorly for quantitative traits . It is more restricted for recessive traits . In practice, sections of genome from the nonrecurrent parents are often still present and can have unwanted traits associated with them . For very wide crosses, limited recombination may maintain thousands of \"alien\" genes within the elite cultivar . Many backcrosses are required to produce a new cultivar , which can take many years . Again, the pure tall (TT) and pure dwarf (tt) pea plants when crossed in the parental generation, produce all heterozygote (Tt) tall pea plants in the first filial generation. The cross between first filial heterozygote tall (Tt) pea plant and pure tall (TT) or pure dwarf (tt) pea plant of the parental generation is also an example for the back-crossing between two plants. In this case, the filial generation formed after the back cross may have a phenotype ratio of 1:1 if the cross is made with recessive parent or else all offspring may be having phenotype of dominant trait if the backcross is with a parent having the dominant trait. The former of these traits is also called a test cross. Artificially recombinant lines In plants, the term inbred backcross line (IBL ) refers to a line (i.e. population ) of plants derived from the repeated backcrossing of a line with artificially recombinant DNA with the wild type, operating some kind of selection that can be phenotypical or through a molecular marker (for the production of an introgression line ). This image demonstrates backcrossing of a heterozygous mouse from one genetic background onto another genetic background. In this example, the gene knockout is performed on 129/Sv cells and then backcrossed into the C57B/6J genetic background. With each successive backcross, the percentage of C57B/6J DNA that constitutes the genome of the offspring is increased . Backcrossing may be deliberately employed in animals to transfer a desirable trait in an animal of inferior genetic background to an animal of preferable genetic background. In gene-knockout experiments in particular, where the knockout is performed on easily cultured stem cell lines, but is required in an animal with a different genetic background, the knockout animal is backcrossed against the animal of the required genetic background. As the figure shows, each time that the mouse with the desired trait (in this case the lack of a gene (i.e. a knockout), indicated by the presence of a positive selectable marker) is crossed with a mouse of a constant genetic background, the average percentage of the genetic material of the offspring that is derived from that constant background increases. The result, after sufficient reiterations, is an animal with the desired trait in the desired genetic background, with the percentage of genetic material from the original stem cells reduced to a minimum ( on the order of 0.01\\%). Due to the nature of meiosis, in which chromosomes derived from each parent are randomly shuffled and assigned to each nascent gamete, the percentage of genetic material deriving from either cell line varies between offspring of a single crossing , but will have an expected value. The genotype of each member of offspring may be assessed to choose not only an individual that carries the desired genetic trait, but also the minimum percentage of genetic material from the original stem cell line. References %DIFDELCMD < %DIFDELCMD < %%% ", "edit_actions": [{"type": "D", "before": "in order", "after": null, "start_char_pos": 115, "end_char_pos": 123}, {"type": "D", "before": "which is", "after": null, "start_char_pos": 169, "end_char_pos": 177}, {"type": "R", "before": "and in", "after": ", and", "start_char_pos": 252, "end_char_pos": 258}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 360, "end_char_pos": 361}, {"type": "A", "before": null, "after": ",", "start_char_pos": 702, "end_char_pos": 702}, {"type": "D", "before": "there is", "after": null, "start_char_pos": 738, "end_char_pos": 746}, {"type": "A", "before": null, "after": "results", "start_char_pos": 770, "end_char_pos": 770}, {"type": "R", "before": "Works", "after": "It works", "start_char_pos": 822, "end_char_pos": 827}, {"type": "R", "before": "Is", "after": ". It is", "start_char_pos": 859, "end_char_pos": 861}, {"type": "A", "before": null, "after": ".", "start_char_pos": 899, "end_char_pos": 899}, {"type": "R", "before": "non-recurrent", "after": "nonrecurrent", "start_char_pos": 941, "end_char_pos": 954}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1037, "end_char_pos": 1037}, {"type": "R", "before": "\u2018alien\u2019", "after": "\"alien\"", "start_char_pos": 1109, "end_char_pos": 1116}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1149, "end_char_pos": 1149}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1206, "end_char_pos": 1206}, {"type": "A", "before": null, "after": ".", "start_char_pos": 1233, "end_char_pos": 1233}, {"type": "D", "before": "they", "after": null, "start_char_pos": 1332, "end_char_pos": 1336}, {"type": "R", "before": "back cross is with parent having", "after": "the backcross is with a parent having the", "start_char_pos": 1823, "end_char_pos": 1855}, {"type": "R", "before": "inbred backcross lines (IBLs", "after": "the term inbred backcross line (IBL", "start_char_pos": 1970, "end_char_pos": 1998}, {"type": "R", "before": "lines", "after": "a line", "start_char_pos": 2011, "end_char_pos": 2016}, {"type": "R", "before": "populations", "after": "population", "start_char_pos": 2023, "end_char_pos": 2034}, {"type": "R", "before": "introgression lines", "after": "an introgression line", "start_char_pos": 2261, "end_char_pos": 2280}, {"type": "D", "before": "there is an increase in", "after": null, "start_char_pos": 2560, "end_char_pos": 2583}, {"type": "A", "before": null, "after": "is increased", "start_char_pos": 2659, "end_char_pos": 2659}, {"type": "R", "before": "gene knockout", "after": "gene-knockout", "start_char_pos": 2839, "end_char_pos": 2852}, {"type": "R", "before": "in", "after": "on", "start_char_pos": 3669, "end_char_pos": 3671}, {"type": "R", "before": "cell-line will vary", "after": "cell line varies", "start_char_pos": 3885, "end_char_pos": 3904}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3944, "end_char_pos": 3944}, {"type": "D", "before": "Notes", "after": null, "start_char_pos": 4235, "end_char_pos": 4240}, {"type": "D", "before": "Bibliography", "after": null, "start_char_pos": 4241, "end_char_pos": 4253}], "sents_char_pos": [0, 207, 297, 603, 734, 807, 1116, 1414, 1614, 1871, 1927, 2283, 2405, 2527, 2835, 3103, 3462, 3693, 3977, 4193]}
+{"doc_id": "8252510", "revision_depth": "2", "before_revision": "Indian Will was a well-known Native American who lived in a former settlement of the Shawnee Indians at the site of present-day Cumberland, Maryland in the 18th century. This site was abandoned by the Shawnees prior to the first white settlers arriving in the region, however 'Indian Will' stayed behind living in a hut on the mountain side. Will was a local legend in his time, and he is even credited with the original ownership of the present day Wills Creek and Wills Mountain. According to William Harrison Lowdermilk, Will was a full-blooded Indian, who with family and a few followers remained in the land of their forefathers; despite the approach of the white man, they did not remove their wigwams , but received their strange visitors with a kindly greeting , and lived in intimate friendship with them. Governor Bladen of Maryland persuaded Col. Thomas Cresap to survey the land in that area named 'Will's Town'. Apparently Will's claims to ownership of this land were respected. When the early explorers decided to build a cabin here , they never failed to give the Indian some trifle as a pretended compensation for the land. As more cabins were built, the place customarily became known as 'Will's Creek' as early as 1728. However, on a map drawn in 1751, Will's Creek is marked as 'Caructucue Creek' , and was known by no other name amongst the Indians. Over the years the original name for this stream, which originates in Bedford County, has been lost. The creek and mountain, which begins at Cumberland and ends a few miles north west of Bedford, have been known as Wills Creek and Wills Mountain. There seems to be some variation in the date of Will's death. Lowdermilk's History states \"the date of death is not definitely known, but that event is supposed to have occurred about the close of the Revolutionary War or shortly thereafter \". In the Bedford County History, it is stated that sometime around 1758 a group of Indians made a raid in the section north east of Wills Creek in an area which is now known as Southampton Township in Bedford County. A number of settlers were massacred and a number of women and children taken prisoner. Apparently one member of this raiding party was Will. The Indians with their prisoners stopped for a short time at the southern tip of Wills Mountain to rest and to hold council. A posse of neighbors and relatives took up the pursuit hoping they might rescue the prisoners. When the Indians and prisoners were discovered, the posse did not attack as they found the Indians outnumbered them. Therefore, they played a waiting game to see what the Indians intended to do. When the Indians broke council, they started westward. One Indian did not go with them. Several members of the posse followed the main party of Indians and their prisoners. George Powell, who was one of the posse, vowed he would avenge the death of his neighbor Mrs. Perrin and her baby. (Mrs. Perrin, history states, was a sister of Ray who had the first trading post at Bedford). Powell silently followed the footsteps of the Indian along the crest of the mountain. He finally located his quarry on the highest northern part of the mountain. This point was less than two miles (3 km) west of Fort Bedford. Powell shot and killed the Indian. He discovered he had killed the man known as Will. He buried his body on the mountain at a place known as Will's Knob.", "after_revision": "Indian Will was a well-known Native American who lived in a former settlement of the Shawnee Indians at the site of present-day Cumberland, Maryland , in the 18th century. The site was abandoned by the Shawnees prior to the first white settlers arriving in the region, but 'Indian Will' stayed behind living in a hut on the mountain side. Will was a local legend in his time, and he is even credited with the original ownership of the present-day Wills Creek and Wills Mountain. According to William Harrison Lowdermilk, Will was a full-blooded Indian, who with family and a few followers remained in the land of their forefathers; despite the approach of the white man, they did not remove their wigwams but received their strange visitors with a kindly greeting and lived in intimate friendship with them. Governor Thomas Bladen of Maryland persuaded Colonel Thomas Cresap to survey the land in that area named 'Will's Town'. Apparently , Will's claims to ownership of the land were respected. When the early explorers decided to build a cabin there , they never failed to give the Indian some trifle as a pretended compensation for the land. As more cabins were built, the place customarily became known as 'Will's Creek' as early as 1728. However, on a map drawn in 1751, Will's Creek is marked as 'Caructucue Creek' and was known by no other name by the Indians. Over the years , the original name for this stream, which originates in Bedford County, has been lost. The creek and the mountain, which begin at Cumberland and end a few miles north west of Bedford, have been known as Wills Creek and Wills Mountain. There seems to be some variation in the date of Will's death. Lowdermilk's History states that \"the date of death is not definitely known, but that event is supposed to have occurred about the close of the Revolutionary War or shortly thereafter .\" In the Bedford County History, it is stated that sometime around 1758 a group of Indians made a raid in the section north east of Wills Creek in an area which is now known as Southampton Township in Bedford County. A number of settlers were massacred and a number of women and children taken prisoner. Apparently one member of this raiding party was Will. The Indians with their prisoners stopped for a short time at the southern tip of Wills Mountain to rest and to hold council. A posse of neighbors and relatives took up the pursuit in the hope of rescuing the prisoners. When the Indians and prisoners were discovered, the posse did not attack , as they found that the Indians outnumbered them. Therefore, they played a waiting game to see what the Indians intended to do. When the Indians broke council, they started westward. One Indian did not go with them. Several members of the posse followed the main party of Indians and their prisoners. George Powell, who was one of the posse, vowed he would avenge the death of his neighbor Mrs. Perrin and her baby. (Mrs. Perrin, history states, was a sister of Ray who had the first trading post at Bedford). Powell silently followed the footsteps of the Indian along the crest of the mountain. He finally located his quarry on the highest northern part of the mountain. The point was less than two miles (3 km) west of Fort Bedford. Powell shot and killed the Indian. He discovere that he had killed the man known as Will. He buried his body on the mountain at a place known as Will's Knob.", "edit_actions": [{"type": "A", "before": null, "after": ",", "start_char_pos": 149, "end_char_pos": 149}, {"type": "R", "before": "This", "after": "The", "start_char_pos": 171, "end_char_pos": 175}, {"type": "R", "before": "however", "after": "but", "start_char_pos": 269, "end_char_pos": 276}, {"type": "R", "before": "present day", "after": "present-day", "start_char_pos": 439, "end_char_pos": 450}, {"type": "D", "before": ",", "after": null, "start_char_pos": 709, "end_char_pos": 710}, {"type": "D", "before": ",", "after": null, "start_char_pos": 770, "end_char_pos": 771}, {"type": "A", "before": null, "after": "Thomas", "start_char_pos": 825, "end_char_pos": 825}, {"type": "R", "before": "Col.", "after": "Colonel", "start_char_pos": 855, "end_char_pos": 859}, {"type": "A", "before": null, "after": ",", "start_char_pos": 938, "end_char_pos": 938}, {"type": "R", "before": "this", "after": "the", "start_char_pos": 969, "end_char_pos": 973}, {"type": "R", "before": "here", "after": "there", "start_char_pos": 1045, "end_char_pos": 1049}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1319, "end_char_pos": 1320}, {"type": "R", "before": "amongst", "after": "by", "start_char_pos": 1352, "end_char_pos": 1359}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1388, "end_char_pos": 1388}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1489, "end_char_pos": 1489}, {"type": "R", "before": "begins", "after": "begin", "start_char_pos": 1506, "end_char_pos": 1512}, {"type": "R", "before": "ends", "after": "end", "start_char_pos": 1531, "end_char_pos": 1535}, {"type": "A", "before": null, "after": "that", "start_char_pos": 1712, "end_char_pos": 1712}, {"type": "R", "before": "\".", "after": ".\"", "start_char_pos": 1864, "end_char_pos": 1866}, {"type": "R", "before": "hoping they might rescue the", "after": "in the hope of rescuing the", "start_char_pos": 2403, "end_char_pos": 2431}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2516, "end_char_pos": 2516}, {"type": "A", "before": null, "after": "that", "start_char_pos": 2531, "end_char_pos": 2531}, {"type": "R", "before": "This", "after": "The", "start_char_pos": 3184, "end_char_pos": 3188}, {"type": "R", "before": "discovered", "after": "discovere that", "start_char_pos": 3286, "end_char_pos": 3296}], "sents_char_pos": [0, 170, 342, 482, 635, 815, 859, 926, 994, 1142, 1240, 1372, 1474, 1621, 1683, 1866, 2081, 2168, 2222, 2347, 2442, 2561, 2639, 2694, 2727, 2812, 2906, 2927, 3021, 3107, 3183, 3247, 3282, 3333]}
+{"doc_id": "8485040", "revision_depth": "1", "before_revision": "Naming convention in Drosophila Balancer chromosomes are named for the chromosome they serve to stabilize and for the phenotypic or genetic marker the balancer carries.Fly Pushing: The Theory and Practice of Drosophila Genetics By Ralph J. Greenspan. Page 13 The naming of balancer chromosomes in D. melanogaster has been standardized as follows: the first letter of the chromosome's name represents the number of the chromosome it stabilizes. F stands for the first chromosome, S stands for second, and T stands for third. The small fourth chromosome does not undergo recombination and therefore does not require balancing. This letter is then followed by an M , for \"multiply inverted . \" The M is followed by a number to distinguish balancers of the same chromosome. Additionally, the genetic marker or markers of the balancer are listed after the name and separated by a comma. Generally mutations with easily observable dominant phenotypic traits that are often homozygous lethal are used to ensure that all progeny are heterozygous. For example, the commonly used \" TM3, Sb \" balancer is a balancer chromosome that stabilizes the third chromosome and carries a mutant Sb (\"stubble\") gene as a marker. All flies containing the TM3, Sb balancer will have shortened (or stubbly ) hairs on the back of the fly , which are easily seen when viewed through a microscope. The 3 is to distinguish this from other third chromosome balancers , such as \" TM1 \" and \" TM2 \" . A line is said to be \"double-balanced\" if it is heterozygous for two different balancer chromosomes (for example, TM6,Tb/TM3,Ser) on a balancer chromosome and a homozygous lethal, heterozygous visible mutant on the other, wild-type chromosome (for example, D/TM3,Ser). Most balancer chromosomes also carry a recessive allele such as the \"ebony\" mutation that is only manifest in these stocks with two balancer chromosomes. These stocks are often used to provide sources of easily traceable traits when breeding two different lines together so that the correct progeny of each cross might be selected. Stocks double-balanced at both the second and third chromosomes in Drosophila are widely available .", "after_revision": "Naming convention in Drosophila Balancer chromosomes are named for the chromosome they serve to stabilize and for the phenotypic or genetic marker the balancer carries.Fly Pushing: The Theory and Practice of Drosophila Genetics By Ralph J. Greenspan. Page 13 The naming of balancer chromosomes in D. melanogaster has been standardized as follows: the first letter of the chromosome's name represents the number of the chromosome it stabilizes. F stands for the first chromosome, S for second, and T for third. The small fourth chromosome does not undergo recombination and therefore does not require balancing. This letter is then followed by an M for \"multiply inverted \" . The M is followed by a number to distinguish balancers of the same chromosome. Additionally, the genetic marker or markers within the balancer are listed after the name and separated by a comma. Generally , mutations with easily observable dominant phenotypic traits that are often homozygous lethal are used to ensure that all progeny are heterozygous. For example, the commonly used TM3, Sb balancer stabilizes the third chromosome and carries a mutant Sb (\"stubble\") gene as a dominant marker. All flies containing the TM3, Sb balancer will have shortened or stubbly hairs on the back of their abdomens , which are easily seen when viewed through a microscope. The 3 distinguishes this balancer from other third-chromosome balancers such as TM1 and TM2 . A line is said to be \"double-balanced\" if it is heterozygous for two different balancer chromosomes (for example, TM6,Tb/TM3,Ser) on one chromosome and a homozygous-lethal, heterozygous-visible mutant on the other, wild-type chromosome (for example, D/TM3,Ser). Most balancer chromosomes also carry a recessive allele such as the \"ebony\" mutation that is only manifest in these stocks with two balancer chromosomes. Such stocks are often used to provide sources of easily traceable traits when breeding two different lines together , so that the correct progeny of each cross can be selected. Stocks double-balanced at both the second and third chromosomes in Drosophila are widely available from fly stock repositories .", "edit_actions": [{"type": "D", "before": "stands", "after": null, "start_char_pos": 481, "end_char_pos": 487}, {"type": "D", "before": "stands", "after": null, "start_char_pos": 506, "end_char_pos": 512}, {"type": "D", "before": ",", "after": null, "start_char_pos": 662, "end_char_pos": 663}, {"type": "D", "before": ".", "after": null, "start_char_pos": 687, "end_char_pos": 688}, {"type": "A", "before": null, "after": ".", "start_char_pos": 691, "end_char_pos": 691}, {"type": "R", "before": "of", "after": "within", "start_char_pos": 815, "end_char_pos": 817}, {"type": "A", "before": null, "after": ",", "start_char_pos": 893, "end_char_pos": 893}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 1072, "end_char_pos": 1073}, {"type": "R", "before": "\" balancer is a balancer chromosome that", "after": "balancer", "start_char_pos": 1082, "end_char_pos": 1122}, {"type": "A", "before": null, "after": "dominant", "start_char_pos": 1201, "end_char_pos": 1201}, {"type": "R", "before": "(or stubbly )", "after": "or stubbly", "start_char_pos": 1272, "end_char_pos": 1285}, {"type": "R", "before": "the fly", "after": "their abdomens", "start_char_pos": 1307, "end_char_pos": 1314}, {"type": "R", "before": "is to distinguish this from other third chromosome balancers , such as \"", "after": "distinguishes this balancer from other third-chromosome balancers such as", "start_char_pos": 1379, "end_char_pos": 1451}, {"type": "R", "before": "\" and \"", "after": "and", "start_char_pos": 1456, "end_char_pos": 1463}, {"type": "D", "before": "\"", "after": null, "start_char_pos": 1468, "end_char_pos": 1469}, {"type": "R", "before": "a balancer", "after": "one", "start_char_pos": 1605, "end_char_pos": 1615}, {"type": "R", "before": "homozygous lethal, heterozygous visible", "after": "homozygous-lethal, heterozygous-visible", "start_char_pos": 1633, "end_char_pos": 1672}, {"type": "R", "before": "These", "after": "Such", "start_char_pos": 1895, "end_char_pos": 1900}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2012, "end_char_pos": 2012}, {"type": "R", "before": "might", "after": "can", "start_char_pos": 2055, "end_char_pos": 2060}, {"type": "A", "before": null, "after": "from fly stock repositories", "start_char_pos": 2173, "end_char_pos": 2173}], "sents_char_pos": [0, 168, 250, 443, 523, 624, 770, 882, 1040, 1209, 1372, 1740, 1894, 2073]}
+{"doc_id": "8485040", "revision_depth": "3", "before_revision": "Mechanism A balancer chromosome contains large inversions ([B,C,D] and [G]). Normal genetic recombination (blue X) is suppressed (red X) at these sites. Mutations without recessive lethal (or sterile) phenotype in diploid organisms can simply be bred to homozygosity and maintained by crossing homozygotes. However, homozygotes for recessive lethal mutations are , per definition , non-viable, which necessitates maintenance of the mutation in heterozygous organisms . Crosses between heterozygotes yield a wild-type organisms , in addition to hetereozygotes and the non-viable homozygotes. To maintain a purely heterozygous line, wild-type offspring needs to be identified and prevented from mating. This can be prohibitively resource intensive , especially if long-term maintanance of the mutation is the goal. Substituting a balancer chromosome for the wild-type chromosome homologous to the chromosome carrying the mutation prevents the establishment of wild-type organisms in various ways. First, a balancer carries a recessive lethal mutation, which makes the organism non-viable if two copies of balancer are inherited ( ie no copy of the desired mutation). However, recombination between the balancer and the mutated allele may result in a creation of a wild-type chromosome. To suppress recombination, balancers usually harbor multiple, nested chromosomal inversions so that synapsis between homologous chromosomes is disrupted. If crossing over does occur, it is often unbalanced, with each resulting chromatid lacking some genes and carrying two copies of others. It can also lead to dicentric or acentric chromosomes (chromosomes with two centromeres or no centromere), which end up breaking up and mutating or being lost . All of these outcomes are very likely to be lethal. Finally, balancer chromosomes carry dominant markers such as genes for green fluorescent protein or enzymes that make pigments, which allow researchers to easily recognize organisms that carry the balancer. In the unlikely case of viable recombination, the marker may be lost thus alerting the researchers of the event. Importantly, suppression of recombination by nested inversions only occurs at the inverted intervals, while other regions (usually peri-centromeric and sub-telomeric ) are free to recombine. Likewise, if the desired mutation is in the same locus as the balancer's recessive lethal mutation (i.e. is in strong linkage disequilibrium with it), recombination resulting in a wild-type chromosome is very unlikely, regardless of recombination suppressive inversions. In addition to simply maintaining an isolated recessive lethal (or sterile) mutation, balancer chromosomes are also used in forward genetic screens to identify such mutations. In such screens randomly mutagenized organisms carrying a balancer are crossed with each other. Offspring that carries the balancer, identified by the dominant marker, can be crossed with littermates. Any such cross that does not produce marker-negative animals is likely the result of a recessive lethal mutation in the non-balancer chromosome. Of course, only the genomic interval covered by the inversions in the balancer can be screened in this way, with recessive lethal mutations in other intervals and on other chromosomes being lost.", "after_revision": "Mechanism A balancer chromosome contains large inversions ([B,C,D] and [G]). Normal genetic recombination (blue X) is suppressed (red X) at these sites. In diploid organisms, mutations without recessive lethal (or sterile) phenotypes can simply be bred to homozygosity and maintained stably and indefinitely by crossing homozygotes. However, homozygotes for recessive lethal mutations are by definition non-viable, because the presence of the recessive lethal allele on both chromosomal homologs causes the organism to die early in development; an organism that is homozygous for a recessive mutation that causes sterility yields essentially the same result (i.e. its genetic material cannot be passed on to progeny, even if the sterile individual itself survives to maturity). This problem forces geneticists wanting to study recessive lethal/sterile mutations to maintain the mutation in heterozygous organisms instead (in which a chromosome containing a recessive lethal/sterile mutation is complemented by a homolog that functions as wild-type at the same locus, allowing the organism to survive and reproduce more or less normally). Crosses between heterozygotes yield wild-type organisms in addition to heterozygotes and the non-viable homozygotes. To maintain a purely heterozygous line, wild-type offspring must be identified and prevented from mating. This can be prohibitively resource-intensive , especially if long-term maintanance of the recessive mutation is the goal. Substituting a balancer chromosome for the wild-type homolog of the chromosome carrying the recessive mutation prevents the establishment of wild-type organisms in various ways. First, a balancer carries its own independent recessive lethal mutation, which makes the organism non-viable if two copies of balancer are inherited ( i.e. no copy of the desired mutation). However, recombination between the balancer and the homolog containing the mutated allele may also result in the de novo creation of a wild-type chromosome. To suppress recombination, balancers usually harbor multiple, nested chromosomal inversions so that synapsis between the homologous chromosomes is disrupted. If crossing over does occur, it is often unbalanced, with each resulting chromatid lacking some genes and carrying two copies of others. The process can also lead to dicentric or acentric chromosomes (chromosomes with two centromeres or no centromere), which are inherently unstable and usually end up breaking up and mutating or being lost during subsequent mitosis . All of these outcomes are very likely to be lethal. Finally, balancer chromosomes carry dominant genetic markers such as genes for green fluorescent protein or enzymes that make visually conspicuous pigments, which allow researchers to easily recognize organisms that carry the balancer. In the unlikely case of viable recombination, the marker may be lost , thus alerting researchers to the event. Importantly, suppression of recombination by nested inversions only occurs at the inverted intervals, while other regions (usually peri-centromeric and sub-telomeric regions ) are free to recombine. Likewise, if the desired mutation is in the same locus as the balancer's recessive lethal mutation (i.e. is in strong linkage disequilibrium with it), recombination resulting in a wild-type chromosome is very unlikely, regardless of recombination suppressive inversions. In addition to simply maintaining an isolated recessive lethal (or sterile) mutation, balancer chromosomes are also useful in forward genetic screens to identify such mutations. In such screens randomly mutagenized organisms carrying a balancer are crossed with each other. Offspring that carry the balancer, identified by the dominant marker, can be crossed with littermates. Any such cross that does not produce marker-negative animals is likely the result of a recessive lethal mutation in the non-balancer chromosome. Of course, only the genomic interval covered by the inversions in the balancer can be screened in this way, with recessive lethal mutations in other intervals and on other chromosomes being lost.", "edit_actions": [{"type": "R", "before": "Mutations", "after": "In diploid organisms, mutations", "start_char_pos": 153, "end_char_pos": 162}, {"type": "R", "before": "phenotype in diploid organisms", "after": "phenotypes", "start_char_pos": 201, "end_char_pos": 231}, {"type": "A", "before": null, "after": "stably and indefinitely", "start_char_pos": 282, "end_char_pos": 282}, {"type": "R", "before": ", per definition ,", "after": "by definition", "start_char_pos": 364, "end_char_pos": 382}, {"type": "R", "before": "which necessitates maintenance of the mutation", "after": "because the presence of the recessive lethal allele on both chromosomal homologs causes the organism to die early in development; an organism that is homozygous for a recessive mutation that causes sterility yields essentially the same result (i.e. its genetic material cannot be passed on to progeny, even if the sterile individual itself survives to maturity). This problem forces geneticists wanting to study recessive lethal/sterile mutations to maintain the mutation", "start_char_pos": 395, "end_char_pos": 441}, {"type": "R", "before": ".", "after": "instead (in which a chromosome containing a recessive lethal/sterile mutation is complemented by a homolog that functions as wild-type at the same locus, allowing the organism to survive and reproduce more or less normally).", "start_char_pos": 468, "end_char_pos": 469}, {"type": "D", "before": "a", "after": null, "start_char_pos": 506, "end_char_pos": 507}, {"type": "D", "before": ",", "after": null, "start_char_pos": 528, "end_char_pos": 529}, {"type": "R", "before": "hetereozygotes", "after": "heterozygotes", "start_char_pos": 545, "end_char_pos": 559}, {"type": "R", "before": "needs to", "after": "must", "start_char_pos": 652, "end_char_pos": 660}, {"type": "R", "before": "resource intensive", "after": "resource-intensive", "start_char_pos": 728, "end_char_pos": 746}, {"type": "A", "before": null, "after": "recessive", "start_char_pos": 792, "end_char_pos": 792}, {"type": "R", "before": "chromosome homologous to", "after": "homolog of", "start_char_pos": 868, "end_char_pos": 892}, {"type": "A", "before": null, "after": "recessive", "start_char_pos": 921, "end_char_pos": 921}, {"type": "R", "before": "a", "after": "its own independent", "start_char_pos": 1024, "end_char_pos": 1025}, {"type": "R", "before": "ie", "after": "i.e.", "start_char_pos": 1131, "end_char_pos": 1133}, {"type": "A", "before": null, "after": "homolog containing the", "start_char_pos": 1220, "end_char_pos": 1220}, {"type": "R", "before": "result in a", "after": "also result in the de novo", "start_char_pos": 1240, "end_char_pos": 1251}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1405, "end_char_pos": 1405}, {"type": "R", "before": "It", "after": "The process", "start_char_pos": 1580, "end_char_pos": 1582}, {"type": "A", "before": null, "after": "are inherently unstable and usually", "start_char_pos": 1693, "end_char_pos": 1693}, {"type": "A", "before": null, "after": "during subsequent mitosis", "start_char_pos": 1740, "end_char_pos": 1740}, {"type": "A", "before": null, "after": "genetic", "start_char_pos": 1840, "end_char_pos": 1840}, {"type": "A", "before": null, "after": "visually conspicuous", "start_char_pos": 1914, "end_char_pos": 1914}, {"type": "R", "before": "thus alerting the researchers of", "after": ", thus alerting researchers to", "start_char_pos": 2073, "end_char_pos": 2105}, {"type": "A", "before": null, "after": "regions", "start_char_pos": 2283, "end_char_pos": 2283}, {"type": "R", "before": "used", "after": "useful", "start_char_pos": 2696, "end_char_pos": 2700}, {"type": "R", "before": "carries", "after": "carry", "start_char_pos": 2867, "end_char_pos": 2874}], "sents_char_pos": [0, 76, 152, 307, 591, 701, 814, 997, 1167, 1287, 1442, 1579, 1742, 1794, 2003, 2116, 2308, 2579, 2755, 2851, 2956, 3101]}
+{"doc_id": "8544", "revision_depth": "1", "before_revision": "Drawing is a form of visual art in which an artist uses instruments to mark paper or other two-dimensional surface. Drawing instruments include graphite pencils, pen and ink, various kinds of paints, inked brushes, colored pencils, crayons, charcoal, chalk, pastels, erasers, markers, styluses, and metals (such as silverpoint). Digital drawing is the act of using a computer to draw. Common methods of digital drawing include a stylus or finger on a touchscreen device, stylus- or finger-to-touchpad, or in some cases, a mouse. There are many digital art programs and devices. A drawing instrument releases a small amount of material onto a surface, leaving a visible mark. The most common support for drawing is paper, although other materials, such as cardboard, wood, plastic, leather, canvas, and board, have been used. Temporary drawings may be made on a blackboard or whiteboard. Drawing has been a popular and fundamental means of public expression throughout human history. It is one of the simplest and most efficient means of communicating ideas. The wide availability of drawing instruments makes drawing one of the most common artistic activities. Notable artists and draftsmen Drawing became significant as an art form around the late 15th century, with artists and master engravers such as Albrecht D\u00fcrer and Martin Schongauer (c. 1448-1491), the first Northern engraver known by name. Schongauer came from Alsace , and was born into a family of goldsmiths. Albrecht D\u00fcrer, a master of the next generation, was also the son of a goldsmith.Hinrich Sieveking, \"German Draughtsmanship in the Ages of D\u00fcrer and Goethe\", British Museum. Accessed 20 February 2016 Old Master Drawings often reflect the history of the country in which they were produced , and the fundamental characteristics of a nation at that time. In 17th-century Holland, a Protestant country, there were almost no religious artworks, and, with no King or court, most art was bought privately. Drawings of landscapes or genre scenes were often viewed not as sketches but as highly finished works of art. Italian drawings, however, show the influence of Catholicism and the Church, which played a major role in artistic patronage. The same is often true of French drawings, although in the 17th century the disciplines of French ClassicismBarbara Hryszko, A Painter as a Draughtsman. Typology and Terminology of Drawings in Academic Didactics and Artistic Practice in France in 17th Century [dans:] Metodologia, metoda i terminologia grafiki i rysunku. Teoria i praktyka, ed. Jolanta Talbierska, Warszawa 2014, pp. 169-176. meant drawings were less Baroque than the more free Italian counterparts, which conveyed a greater sense of movement. Basquiat's drawings were produced in many different mediums, most commonly ink, pencil, felt-tip or marker, and oil-stick, and he drew on any surface that came to hand , such as doors, clothing, refrigerators, walls and baseball helmets. Materials The medium is the means by which ink, pigment or color are delivered onto the drawing surface. Most drawing media are either dry (e.g. graphite, charcoal, pastels, Cont\u00e9, silverpoint), or use a fluid solvent or carrier (marker, pen and ink). Watercolor pencils can be used dry like ordinary pencils, then moistened with a wet brush to get various painterly effects. Very rarely, artists have drawn with (usually decoded) invisible ink. Metalpoint drawing usually employs either of two metals: silver or lead.lara Broecke, Cennino Cennini's Il Libro dell'Arte: a new English Translation and Commentary with Italian Transcription, Archetype 2015 More rarely used are gold, platinum, copper, brass, bronze, and tinpoint. Paper comes in a variety of different sizes and qualities, ranging from newspaper grade up to high quality and relatively expensive paper sold as individual sheets. Papers vary in texture, hue, acidity, and strength when wet. Smooth paper is good for rendering fine detail, but a more \"toothy\" paper holds the drawing material better. Thus a coarser material is useful for producing deeper contrast. Newsprint and typing paper may be useful for practice and rough sketches. Tracing paper is used to experiment over a half-finished drawing, and to transfer a design from one sheet to another. Cartridge paper is the basic type of drawing paper sold in pads. Bristol board and even heavier acid-free boards, frequently with smooth finishes, are used for drawing fine detail and do not distort when wet media (ink, washes) are applied. Vellum is extremely smooth and suitable for very fine detail. Coldpressed watercolor paper may be favored for ink drawing due to its texture. Acid-free, archival quality paper keeps its color and texture far longer than wood pulp based paper such as newsprint, which turns yellow and becomes brittle much sooner. The basic tools are a drawing board or table, pencil sharpener and eraser, and for ink drawing, blotting paper. Other tools used are circle compass, ruler, and set square. Fixative is used to prevent pencil and crayon marks from smudging. Drafting tape is used to secure paper to drawing surface, and also to mask an area to keep it free of accidental marks, such as sprayed or spattered materials and washes. An easel or slanted table is used to keep the drawing surface in a suitable position, which is generally more horizontal than the position used in painting. Prior to working on an image, the artist typically explores how various media work. They may try different drawing implements on practice sheets to determine value and texture, and how to apply the implement to produce various effects. The artist's choice of drawing strokes affects the appearance of the image. Pen and ink drawings often use hatching \u2013 groups of parallel lines.This is unrelated to the hatching system in heraldry that indicates tincture (i.e., the color of arms depicted in monochrome.) Cross-hatching uses hatching in two or more different directions to create a darker tone. Broken hatching, or lines with intermittent breaks, form lighter tones \u2013 and controlling the density of the breaks achieves a gradation of tone. Stippling uses dots to produce tone, texture and shade. Different textures can be achieved depending on the method used to build tone. Drawings in dry media often use similar techniques, though pencils and drawing sticks can achieve continuous variations in tone. Typically a drawing is filled in based on which hand the artist favors . A right-handed artist draws from left to right to avoid smearing the image. Erasers can remove unwanted lines, lighten tones, and clean up stray marks. In a sketch or outline drawing, lines drawn often follow the contour of the subject, creating depth by looking like shadows cast from a light in the artist's position. Tone A pencil portrait by Henry Macbeth-Raeburn, with hatching and shading (1909) Shading is the technique of varying the tonal values on the paper to represent the shade of the material as well as the placement of the shadows. Careful attention to reflected light, shadows and highlights can result in a very realistic rendition of the image. Shading techniques that also introduce texture to the drawing include hatching and stippling. A number of other methods produce texture. In addition to the choice of paper, drawing material and technique affect texture. Texture can be made to appear more realistic when it is drawn next to a contrasting texture; a coarse texture is more obvious when placed next to a smoothly blended area. A similar effect can be achieved by drawing different tones close together. A light edge next to a dark background stands out to the eye, and almost appears to float above the surface. When attempting to draw a complicated shape such as a human figure, it is helpful at first to represent the form with a set of primitive volumes. Almost any form can be represented by some combination of the cube, sphere, cylinder, and cone. Once these basic volumes have been assembled into a likeness, then the drawing can be refined into a more accurate and polished form. The lines of the primitive volumes are removed and replaced by the final likeness. Drawing the underlying construction is a fundamental skill for representational art, and is taught in many books and schools. Its correct application resolves most uncertainties about smaller details , and makes the final image look consistent. A more refined art of figure drawing relies upon the artist possessing a deep understanding of anatomy and the human proportions. A trained artist is familiar with the skeleton structure, joint location, muscle placement, tendon movement, and how the different parts work together during movement. This allows the artist to render more natural poses that do not appear artificially stiff. The artist is also familiar with how the proportions vary depending on the age of the subject, particularly when drawing a portrait. Depth can also be portrayed by several techniques in addition to the perspective approach above. Objects of similar size should appear ever smaller the further they are from the viewer. Thus the back wheel of a cart appears slightly smaller than the front wheel. Depth can be portrayed through the use of texture. As the texture of an object gets further away it becomes more compressed and busy, taking on an entirely different character than if it was close. Depth can also be portrayed by reducing the contrast in more distant objects, and by making their colors less saturated. This reproduces the effect of atmospheric haze, and cause the eye to focus primarily on objects drawn in the foreground. When drawing an object or figure, the skilled artist pays attention to both the area within the silhouette and what lies outside. The exterior is termed the negative space, and can be as important in the representation as the figure. Objects placed in the background of the figure should appear properly placed wherever they can be viewed. Furthermore, the influential artist and art critic John Ruskin emphasised the importance of perception in the drawing process in his book The Elements of Drawing. He stated that \"For I am nearly convinced, that once we see keenly enough, there is very little difficult in drawing what we see\".", "after_revision": "Drawing is a form of visual art in which an artist uses instruments to mark paper or other two-dimensional surface. Drawing instruments include graphite pencils, pen and ink, various kinds of paints, inked brushes, colored pencils, crayons, charcoal, chalk, pastels, erasers, markers, styluses, and metals (such as silverpoint). Digital drawing is the act of using a computer to draw. Common methods of digital drawing include a stylus or finger on a touchscreen device, stylus- or finger-to-touchpad, or in some cases, a mouse. There is much digital art programs and devices. A drawing instrument releases a small amount of material onto a surface, leaving a visible mark. The most common support for drawing is paper, although other materials, such as cardboard, wood, plastic, leather, canvas, and board, have been used. Temporary drawings may be made on a blackboard or whiteboard. Drawing has been a popular and fundamental means of public expression throughout human history. It is one of the simplest and most efficient means of communicating ideas. The wide availability of drawing instruments makes drawing one of the most common artistic activities. Notable artists and draftsmen Drawing became significant as an art form around the late 15th century, with artists and master engravers such as Albrecht D\u00fcrer and Martin Schongauer (c. 1448-1491), the first Northern engraver known by name. Schongauer came from Alsace and was born into a family of goldsmiths. Albrecht D\u00fcrer, a master of the next generation, was also the son of a goldsmith.Hinrich Sieveking, \"German Draughtsmanship in the Ages of D\u00fcrer and Goethe\", British Museum. Accessed 20 February 2016 Old Master Drawings often reflect the history of the country in which they were produced and the fundamental characteristics of a nation at that time. In 17th-century Holland, a Protestant country, there were almost no religious artworks, and, with no King or court, most arts was bought privately. Drawings of landscapes or genre scenes were often viewed not as sketches but as highly finished works of art. Italian drawings, however, show the influence of Catholicism and the Church, which played a major role in artistic patronage. The same is often true of French drawings, although in the 17th century the disciplines of French ClassicismBarbara Hryszko, A Painter as a Draughtsman. Typology and Terminology of Drawings in Academic Didactics and Artistic Practice in France in 17th Century [dans:] Metodologia, metoda I terminologia grafiki I rysunku. Teoria I praktyka, ed. Jolanta Talbierska, Warszawa 2014, pp. 169-176. meant drawings were less Baroque than the more free Italian counterparts, which conveyed a greater sense of movement. Basquiat's drawings were produced in many different mediums, most commonly ink, pencil, felt-tip or marker, and oil-stick, and he drew on any surface that came to hands , such as doors, clothing, refrigerators, walls and baseball helmets. Materials The medium is the means by which ink, pigment or colour are delivered onto the drawing surface. Most drawing media are either dry (e.g. graphite, charcoal, pastels, Cont\u00e9, silverpoint), or use a fluid solvent or carrier (marker, pen and ink). Watercolour pencils can be used dry like ordinary pencils, then moistened with a wet brush to get various painterly effects. Very rarely, artists have drawn with (usually decoded) invisible ink. Metalpoint drawing usually employs either of two metals: silver or lead.lara Broecke, Cennino Cennini's Il Libro dell'Arte: a new English Translation and Commentary with Italian Transcription, Archetype 2015 More rarely used are gold, platinum, copper, brass, bronze, and tinpoint. Paper comes in a variety of different sizes and qualities, ranging from newspaper grade up to the high quality and relatively expensive paper sold as individual sheets. Papers vary in texture, hue, acidity, and strength when wet. Smooth paper is good for rendering fine detail, but a more \"toothy\" paper holds the drawing material better. Thus a coarser material is useful for producing deeper contrast. Newsprint and typing paper may be useful for practice and rough sketches. Tracing paper is used to experiment over a half-finished drawing, and to transfer a design from one sheet to another. Cartridge paper is the basic type of drawing paper sold in pads. Bristol board and even heavier acid-free boards, frequently with smooth finishes, are used for drawing fine detail and do not distort when wet media (ink, washes) are applied. Vellum is extremely smooth and suitable for very fine detail. Coldpressed watercolour paper may be favoured for ink drawing due to its texture. Acid-free, archival quality paper keeps its colour and texture far longer than wood pulp based paper such as newsprint, which turns yellow and becomes brittle much sooner. The basic tools are a drawing board or table, pencil sharpener and eraser, and for ink drawing, blotting paper. Other tools used are circle compass, ruler, and set square. Fixative is used to prevent pencil and crayon marks from smudging. Drafting tape is used to secure the paper to the drawing surface, and also to mask an area to keep it free of accidental marks, such as sprayed or spattered materials and washes. An easel or slanted table is used to keep the drawing surface in a suitable position, which is generally more horizontal than the position used in painting. Prior to working on an image, the artist typically explores how various media work. They may try different drawing implements on practise sheets to determine value and texture, and how to apply the implement to produce various effects. The artist's choice of drawing strokes affects the appearance of the image. Pen and ink drawings often use hatching \u2013 groups of parallel lines.This is unrelated to the hatching system in heraldry that indicates tincture (i.e., the colour of arms depicted in monochrome.) Cross-hatching uses hatching in two or more different directions to create a darker tone. Broken hatching, or lines with intermittent breaks, form lighter tones \u2013 and controlling the density of the breaks achieves a gradation of tone. Stippling uses dots to produce tone, texture and shade. Different textures can be achieved depending on the method used to build tone. Drawings in dry media often use similar techniques, though pencils and drawing sticks can achieve continuous variations in tone. Typically a drawing is filled in based on which hand the artist favours . A right-handed artist draws from left to right to avoid smearing the image. Erasers can remove unwanted lines, lighten tones, and clean up stray marks. In a sketch or outline drawing, lines drawn often follow the contour of the subject, creating depth by looking like shadows cast from a light in the artist's position. Tone A pencil portrait by Henry Macbeth-Raeburn, with hatching and shading (1909) Shading is the technique of varying the tonal values on the paper to represent the shade of the material as well as the placement of the shadows. Careful attention to the reflected light, shadows and highlights can result in a very realistic rendition of the image. Shading techniques that also introduce texture to the drawing include hatching and stippling. A number of other methods produce texture. In addition to the choice of paper, drawing material and technique affect the texture. Texture can be made to appear more realistic when it is drawn next to a contrasting texture; a coarse texture is more obvious when placed next to a smoothly blended area. A similar effect can be achieved by drawing different tones close together. A light edge next to a dark background stands out to the eye, and almost appears to float above the surface. When attempting to draw a complicated shape such as a human figure, it is helpful at first to represent the form with a set of primitive volumes. Almost any form can be represented by some combination of the cube, sphere, cylinder, and cone. Once these basic volumes have been assembled into a likeness, then the drawing can be refined into a more accurate and polished form. The lines of the primitive volumes are removed and replaced by the final likeness. Drawing the underlying construction is a fundamental skill for representational art, and is taught in many books and schools. Its correct application resolves most uncertainties about smaller details and makes the final image look consistent. A more refined art of figure drawing relies upon the artist possessing a deep understanding of anatomy and human proportions. A trained artist is familiar with the skeleton structure, joint location, muscle placement, tendon movement, and how the different parts work together during movement. This allows the artist to render more natural poses that do not appear artificially stiff. The artist is also familiar with how the proportions vary depending on the age of the subject, particularly when drawing a portrait. Depth can also be portrayed by several techniques in addition to the perspective approach above. Objects of similar size should appear ever smaller the further they are from the viewer. Thus the back wheel of a cart appears slightly smaller than the front wheel. Depth can be portrayed through the use of texture. As the texture of an object gets further away it becomes more compressed and busy, taking on an entirely different character than if it was close. Depth can also be portrayed by reducing the contrast in more distant objects, and by making their colours less saturated. This reproduces the effect of atmospheric haze, and causes the eye to focus primarily on objects drawn in the foreground. When drawing an object or figure, the skilled artist pays attention to both the area within the silhouette and what lies outside. The exterior is termed the negative space, and can be as important in the representation as to the figure. Objects placed in the background of the figure should appear properly placed wherever they can be viewed. Furthermore, the influential artist and art critic John Ruskin emphasized the importance of perception in the drawing process in his book The Elements of Drawing. He stated that \"For I am nearly convinced, that once we see keenly enough, there is very little difficulty in drawing what we see\".", "edit_actions": [{"type": "R", "before": "are many", "after": "is much", "start_char_pos": 535, "end_char_pos": 543}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1429, "end_char_pos": 1430}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1762, "end_char_pos": 1763}, {"type": "R", "before": "art", "after": "arts", "start_char_pos": 1947, "end_char_pos": 1950}, {"type": "R", "before": "i terminologia grafiki i", "after": "I terminologia grafiki I", "start_char_pos": 2497, "end_char_pos": 2521}, {"type": "R", "before": "i", "after": "I", "start_char_pos": 2538, "end_char_pos": 2539}, {"type": "R", "before": "hand", "after": "hands", "start_char_pos": 2883, "end_char_pos": 2887}, {"type": "R", "before": "color", "after": "colour", "start_char_pos": 3017, "end_char_pos": 3022}, {"type": "R", "before": "Watercolor", "after": "Watercolour", "start_char_pos": 3210, "end_char_pos": 3220}, {"type": "A", "before": null, "after": "the", "start_char_pos": 3780, "end_char_pos": 3780}, {"type": "R", "before": "watercolor", "after": "watercolour", "start_char_pos": 4594, "end_char_pos": 4604}, {"type": "R", "before": "favored", "after": "favoured", "start_char_pos": 4618, "end_char_pos": 4625}, {"type": "R", "before": "color", "after": "colour", "start_char_pos": 4706, "end_char_pos": 4711}, {"type": "R", "before": "paper to", "after": "the paper to the", "start_char_pos": 5104, "end_char_pos": 5112}, {"type": "R", "before": "practice", "after": "practise", "start_char_pos": 5529, "end_char_pos": 5537}, {"type": "R", "before": "color", "after": "colour", "start_char_pos": 5867, "end_char_pos": 5872}, {"type": "R", "before": "favors", "after": "favours", "start_char_pos": 6469, "end_char_pos": 6475}, {"type": "A", "before": null, "after": "the", "start_char_pos": 7047, "end_char_pos": 7047}, {"type": "A", "before": null, "after": "the", "start_char_pos": 7354, "end_char_pos": 7354}, {"type": "D", "before": ",", "after": null, "start_char_pos": 8379, "end_char_pos": 8380}, {"type": "D", "before": "the", "after": null, "start_char_pos": 8531, "end_char_pos": 8534}, {"type": "R", "before": "colors", "after": "colours", "start_char_pos": 9505, "end_char_pos": 9511}, {"type": "R", "before": "cause", "after": "causes", "start_char_pos": 9580, "end_char_pos": 9585}, {"type": "A", "before": null, "after": "to", "start_char_pos": 9871, "end_char_pos": 9871}, {"type": "R", "before": "emphasised", "after": "emphasized", "start_char_pos": 10053, "end_char_pos": 10063}, {"type": "R", "before": "difficult", "after": "difficulty", "start_char_pos": 10249, "end_char_pos": 10258}], "sents_char_pos": [0, 115, 328, 384, 528, 577, 674, 824, 886, 982, 1057, 1160, 1400, 1472, 1554, 1646, 1825, 1972, 2082, 2208, 2361, 2530, 2719, 2957, 3062, 3209, 3333, 3403, 3685, 3851, 3912, 4021, 4086, 4160, 4278, 4343, 4519, 4581, 4661, 4832, 4944, 5004, 5071, 5242, 5399, 5483, 5635, 5711, 5779, 5995, 6140, 6196, 6275, 6404, 6553, 6629, 6797, 7025, 7142, 7236, 7279, 7363, 7456, 7534, 7610, 7719, 7865, 7961, 8095, 8178, 8304, 8423, 8553, 8721, 8812, 8945, 9042, 9131, 9208, 9259, 9406, 9527, 9648, 9778, 9883, 9989, 10152]}
+{"doc_id": "8544", "revision_depth": "3", "before_revision": "Drawing is a form of visual art in which an artist uses instruments to mark paper or other two-dimensional surface. Drawing instruments include graphite pencils, pen and ink, various kinds of paints, inked brushes, colored pencils, crayons, charcoal, chalk, pastels, erasers, markers, styluses, and metals (such as silverpoint). Digital drawing is the act of using a computer to draw. Common methods of digital drawing include a stylus or finger on a touchscreen device, stylus- or finger-to-touchpad, or in some cases, a mouse. There is much digital art programs and devices. A drawing instrument releases a small amount of material onto a surface, leaving a visible mark. The most common support for drawing is paper, although other materials, such as cardboard, wood, plastic, leather, canvas, and board, have been used. Temporary drawings may be made on a blackboard or whiteboard. Drawing has been a popular and fundamental means of public expression throughout human history. It is one of the simplest and most efficient means of communicating ideas. The wide availability of drawing instruments makes drawing one of the most common artistic activities. In fields outside art, technical drawings or plans of buildings, machinery, circuitry and other things are often called \"drawings\" even when they have been transferred to another medium by printing. When drawing you'll see all the different aspects of why drawing is different. Though you will have to understand that this is a beautiful aspect and will always be helpful. Drawing or painting doesn't change the fact that. This small detail will be different from a masterpiece or a Notable artists and draftsmen Drawing became significant as an art form around the late 15th century, with artists and master engravers such as Albrecht D\u00fcrer and Martin Schongauer (c. 1448-1491), the first Northern engraver known by name. Schongauer came from Alsace and was born into a family of goldsmiths. Albrecht D\u00fcrer, a master of the next generation, was also the son of a goldsmith.Hinrich Sieveking, \"German Draughtsmanship in the Ages of D\u00fcrer and Goethe\", British Museum. Accessed 20 February 2016 Old Master Drawings often reflect the history of the country in which they were produced and the fundamental characteristics of a nation at that time. In 17th-century Holland, a Protestant country, there were almost no religious artworks, and, with no King or court, most arts were bought privately. Drawings of landscapes or genre scenes were often viewed not as sketches but as highly finished works of art. Italian drawings, however, show the influence of Catholicism and the Church, which played a major role in artistic patronage. The same is often true of French drawings, although in the 17th century the disciplines of French ClassicismBarbara Hryszko, A Painter as a Draughtsman. Typology and Terminology of Drawings in Academic Didactics and Artistic Practice in France in 17th Century [dans:] Metodologia, metoda I terminologia grafiki I rysunku. Teoria I praktyka, ed. Jolanta Talbierska, Warszawa 2014, pp. 169-176. meant drawings were less Baroque than the more free Italian counterparts, which conveyed a greater sense of movement. Basquiat's drawings were produced in many different mediums, most commonly ink, pencil, felt-tip or marker, and oil-stick, and he drew on any surface that came to hands , such as doors, clothing, refrigerators, walls and baseball helmets. Materials The medium is the means by which ink, pigment or colour are delivered onto the drawing surface. Most drawing media are either dry (e.g. graphite, charcoal, pastels, Cont\u00e9, silverpoint), or use a fluid solvent or carrier (marker, pen and ink). Watercolour pencils can be used dry like ordinary pencils, then moistened with a wet brush to get various painterly effects. Very rarely, artists have drawn with (usually decoded) invisible ink. Metalpoint drawing usually employs either of two metals: silver or lead.lara Broecke, Cennino Cennini's Il Libro dell'Arte: a new English Translation and Commentary with Italian Transcription, Archetype 2015 More rarely used are gold, platinum, copper, brass, bronze, and tinpoint. Paper comes in a variety of different sizes and qualities, ranging from newspaper grade up to the high quality and relatively expensive paper sold as individual sheets. Papers vary in texture, hue, acidity, and strength when wet. Smooth paper is good for rendering fine detail, but a more \"toothy\" paper holds the drawing material better. Thus a coarser material is useful for producing deeper contrast. Newsprint and typing paper may be useful for practice and rough sketches. Tracing paper is used to experiment over a half-finished drawing, and to transfer a design from one sheet to another. Cartridge paper is the basic type of drawing paper sold in pads. Bristol board and even heavier acid-free boards, frequently with smooth finishes, are used for drawing fine detail and do not distort when wet media (ink, washes) are applied. Vellum is extremely smooth and suitable for very fine detail. Coldpressed watercolour paper may be favoured for ink drawing due to its texture. Acid-free, archival quality paper keeps its colour and texture far longer than wood pulp based paper such as newsprint, which turns yellow and becomes brittle much sooner. The basic tools are a drawing board or table, pencil sharpener and eraser, and for ink drawing, blotting paper. Other tools used are circle compass, ruler, and set square. Fixative is used to prevent pencil and crayon marks from smudging. Drafting tape is used to secure the paper to the drawing surface, and also to mask an area to keep it free of accidental marks, such as sprayed or spattered materials and washes. An easel or slanted table is used to keep the drawing surface in a suitable position, which is generally more horizontal than the position used in painting. Prior to working on an image, the artist typically explores how various media work. They may try different drawing implements on practise sheets to determine value and texture, and how to apply the implement to produce various effects. The artist's choice of drawing strokes affects the appearance of the image. Pen and ink drawings often use hatching \u2013 groups of parallel lines.This is unrelated to the hatching system in heraldry that indicates tincture (i.e., the colour of arms depicted in monochrome.) Cross-hatching uses hatching in two or more different directions to create a darker tone. Broken hatching, or lines with intermittent breaks, form lighter tones \u2013 and controlling the density of the breaks achieves a gradation of tone. Stippling uses dots to produce tone, texture and shade. Different textures can be achieved depending on the method used to build tone. Drawings in dry media often use similar techniques, though pencils and drawing sticks can achieve continuous variations in tone. Typically a drawing is filled in based on which hand the artist favours . A right-handed artist draws from left to right to avoid smearing the image. Erasers can remove unwanted lines, lighten tones, and clean up stray marks. In a sketch or outline drawing, lines drawn often follow the contour of the subject, creating depth by looking like shadows cast from a light in the artist's position. Tone A pencil portrait by Henry Macbeth-Raeburn, with hatching and shading (1909) Shading is the technique of varying the tonal values on the paper to represent the shade of the material as well as the placement of the shadows. Careful attention to the reflected light, shadows and highlights can result in a very realistic rendition of the image. Shading techniques that also introduce texture to the drawing include hatching and stippling. A number of other methods produce texture. In addition to the choice of paper, drawing material and technique affect the texture. Texture can be made to appear more realistic when it is drawn next to a contrasting texture; a coarse texture is more obvious when placed next to a smoothly blended area. A similar effect can be achieved by drawing different tones close together. A light edge next to a dark background stands out to the eye, and almost appears to float above the surface. When attempting to draw a complicated shape such as a human figure, it is helpful at first to represent the form with a set of primitive volumes. Almost any form can be represented by some combination of the cube, sphere, cylinder, and cone. Once these basic volumes have been assembled into a likeness, then the drawing can be refined into a more accurate and polished form. The lines of the primitive volumes are removed and replaced by the final likeness. Drawing the underlying construction is a fundamental skill for representational art, and is taught in many books and schools. Its correct application resolves most uncertainties about smaller details and makes the final image look consistent. A more refined art of figure drawing relies upon the artist possessing a deep understanding of anatomy and human proportions. A trained artist is familiar with the skeleton structure, joint location, muscle placement, tendon movement, and how the different parts work together during movement. This allows the artist to render more natural poses that do not appear artificially stiff. The artist is also familiar with how the proportions vary depending on the age of the subject, particularly when drawing a portrait. Depth can also be portrayed by several techniques in addition to the perspective approach above. Objects of similar size should appear ever smaller the further they are from the viewer. Thus the back wheel of a cart appears slightly smaller than the front wheel. Depth can be portrayed through the use of texture. As the texture of an object gets further away it becomes more compressed and busy, taking on an entirely different character than if it was close. Depth can also be portrayed by reducing the contrast in more distant objects, and by making their colours less saturated. This reproduces the effect of atmospheric haze and causes the eye to focus primarily on objects drawn in the foreground. When drawing an object or figure, the skilled artist pays attention to both the area within the silhouette and what lies outside. The exterior is termed the negative space, and can be as important in the representation as to the figure. Objects placed in the background of the figure should appear properly placed wherever they can be viewed. Furthermore, the influential artist and art critic John Ruskin emphasized the importance of perception in the drawing process in his book The Elements of Drawing. He stated that \"For I am nearly convinced, that once we see keenly enough, there is very little difficulty in drawing what we see\".", "after_revision": "Drawing is a form of visual art in which an artist uses instruments to mark paper or other two-dimensional surface. Drawing instruments include graphite pencils, pen and ink, various kinds of paints, inked brushes, colored pencils, crayons, charcoal, chalk, pastels, erasers, markers, styluses, and metals (such as silverpoint). Digital drawing is the act of using a computer to draw. Common methods of digital drawing include a stylus or finger on a touchscreen device, stylus- or finger-to-touchpad, or in some cases, a mouse. There are many digital art programs and devices. A drawing instrument releases a small amount of material onto a surface, leaving a visible mark. The most common support for drawing is paper, although other materials, such as cardboard, wood, plastic, leather, canvas, and board, have been used. Temporary drawings may be made on a blackboard or whiteboard. Drawing has been a popular and fundamental means of public expression throughout human history. It is one of the simplest and most efficient means of communicating ideas. The wide availability of drawing instruments makes drawing one of the most common artistic activities. In fields outside art, technical drawings or plans of buildings, machinery, circuitry and other things are often called \"drawings\" even when they have been transferred to another medium by printing. Notable artists and draftsmen Drawing became significant as an art form around the late 15th century, with artists and master engravers such as Albrecht D\u00fcrer and Martin Schongauer (c. 1448-1491), the first Northern engraver known by name. Schongauer came from Alsace , and was born into a family of goldsmiths. Albrecht D\u00fcrer, a master of the next generation, was also the son of a goldsmith.Hinrich Sieveking, \"German Draughtsmanship in the Ages of D\u00fcrer and Goethe\", British Museum. Accessed 20 February 2016 Old Master Drawings often reflect the history of the country in which they were produced , and the fundamental characteristics of a nation at that time. In 17th-century Holland, a Protestant country, there were almost no religious artworks, and, with no King or court, most art was bought privately. Drawings of landscapes or genre scenes were often viewed not as sketches but as highly finished works of art. Italian drawings, however, show the influence of Catholicism and the Church, which played a major role in artistic patronage. The same is often true of French drawings, although in the 17th century the disciplines of French ClassicismBarbara Hryszko, A Painter as a Draughtsman. Typology and Terminology of Drawings in Academic Didactics and Artistic Practice in France in 17th Century [dans:] Metodologia, metoda i terminologia grafiki i rysunku. Teoria i praktyka, ed. Jolanta Talbierska, Warszawa 2014, pp. 169-176. meant drawings were less Baroque than the more free Italian counterparts, which conveyed a greater sense of movement. Basquiat's drawings were produced in many different mediums, most commonly ink, pencil, felt-tip or marker, and oil-stick, and he drew on any surface that came to hand , such as doors, clothing, refrigerators, walls and baseball helmets. Materials The medium is the means by which ink, pigment or color are delivered onto the drawing surface. Most drawing media are either dry (e.g. graphite, charcoal, pastels, Cont\u00e9, silverpoint), or use a fluid solvent or carrier (marker, pen and ink). Watercolor pencils can be used dry like ordinary pencils, then moistened with a wet brush to get various painterly effects. Very rarely, artists have drawn with (usually decoded) invisible ink. Metalpoint drawing usually employs either of two metals: silver or lead.lara Broecke, Cennino Cennini's Il Libro dell'Arte: a new English Translation and Commentary with Italian Transcription, Archetype 2015 More rarely used are gold, platinum, copper, brass, bronze, and tinpoint. Paper comes in a variety of different sizes and qualities, ranging from newspaper grade up to high quality and relatively expensive paper sold as individual sheets. Papers vary in texture, hue, acidity, and strength when wet. Smooth paper is good for rendering fine detail, but a more \"toothy\" paper holds the drawing material better. Thus a coarser material is useful for producing deeper contrast. Newsprint and typing paper may be useful for practice and rough sketches. Tracing paper is used to experiment over a half-finished drawing, and to transfer a design from one sheet to another. Cartridge paper is the basic type of drawing paper sold in pads. Bristol board and even heavier acid-free boards, frequently with smooth finishes, are used for drawing fine detail and do not distort when wet media (ink, washes) are applied. Vellum is extremely smooth and suitable for very fine detail. Coldpressed watercolor paper may be favored for ink drawing due to its texture. Acid-free, archival quality paper keeps its color and texture far longer than wood pulp based paper such as newsprint, which turns yellow and becomes brittle much sooner. The basic tools are a drawing board or table, pencil sharpener and eraser, and for ink drawing, blotting paper. Other tools used are circle compass, ruler, and set square. Fixative is used to prevent pencil and crayon marks from smudging. Drafting tape is used to secure paper to drawing surface, and also to mask an area to keep it free of accidental marks, such as sprayed or spattered materials and washes. An easel or slanted table is used to keep the drawing surface in a suitable position, which is generally more horizontal than the position used in painting. Prior to working on an image, the artist typically explores how various media work. They may try different drawing implements on practice sheets to determine value and texture, and how to apply the implement to produce various effects. The artist's choice of drawing strokes affects the appearance of the image. Pen and ink drawings often use hatching \u2013 groups of parallel lines.This is unrelated to the hatching system in heraldry that indicates tincture (i.e., the color of arms depicted in monochrome.) Cross-hatching uses hatching in two or more different directions to create a darker tone. Broken hatching, or lines with intermittent breaks, form lighter tones \u2013 and controlling the density of the breaks achieves a gradation of tone. Stippling uses dots to produce tone, texture and shade. Different textures can be achieved depending on the method used to build tone. Drawings in dry media often use similar techniques, though pencils and drawing sticks can achieve continuous variations in tone. Typically a drawing is filled in based on which hand the artist favors . A right-handed artist draws from left to right to avoid smearing the image. Erasers can remove unwanted lines, lighten tones, and clean up stray marks. In a sketch or outline drawing, lines drawn often follow the contour of the subject, creating depth by looking like shadows cast from a light in the artist's position. Tone A pencil portrait by Henry Macbeth-Raeburn, with hatching and shading (1909) Shading is the technique of varying the tonal values on the paper to represent the shade of the material as well as the placement of the shadows. Careful attention to reflected light, shadows and highlights can result in a very realistic rendition of the image. Shading techniques that also introduce texture to the drawing include hatching and stippling. A number of other methods produce texture. In addition to the choice of paper, drawing material and technique affect texture. Texture can be made to appear more realistic when it is drawn next to a contrasting texture; a coarse texture is more obvious when placed next to a smoothly blended area. A similar effect can be achieved by drawing different tones close together. A light edge next to a dark background stands out to the eye, and almost appears to float above the surface. When attempting to draw a complicated shape such as a human figure, it is helpful at first to represent the form with a set of primitive volumes. Almost any form can be represented by some combination of the cube, sphere, cylinder, and cone. Once these basic volumes have been assembled into a likeness, then the drawing can be refined into a more accurate and polished form. The lines of the primitive volumes are removed and replaced by the final likeness. Drawing the underlying construction is a fundamental skill for representational art, and is taught in many books and schools. Its correct application resolves most uncertainties about smaller details , and makes the final image look consistent. A more refined art of figure drawing relies upon the artist possessing a deep understanding of anatomy and the human proportions. A trained artist is familiar with the skeleton structure, joint location, muscle placement, tendon movement, and how the different parts work together during movement. This allows the artist to render more natural poses that do not appear artificially stiff. The artist is also familiar with how the proportions vary depending on the age of the subject, particularly when drawing a portrait. Depth can also be portrayed by several techniques in addition to the perspective approach above. Objects of similar size should appear ever smaller the further they are from the viewer. Thus the back wheel of a cart appears slightly smaller than the front wheel. Depth can be portrayed through the use of texture. As the texture of an object gets further away it becomes more compressed and busy, taking on an entirely different character than if it was close. Depth can also be portrayed by reducing the contrast in more distant objects, and by making their colors less saturated. This reproduces the effect of atmospheric haze , and cause the eye to focus primarily on objects drawn in the foreground. When drawing an object or figure, the skilled artist pays attention to both the area within the silhouette and what lies outside. The exterior is termed the negative space, and can be as important in the representation as the figure. Objects placed in the background of the figure should appear properly placed wherever they can be viewed. Furthermore, the influential artist and art critic John Ruskin emphasised the importance of perception in the drawing process in his book The Elements of Drawing. He stated that \"For I am nearly convinced, that once we see keenly enough, there is very little difficult in drawing what we see\".", "edit_actions": [{"type": "R", "before": "is much", "after": "are many", "start_char_pos": 535, "end_char_pos": 542}, {"type": "D", "before": "When drawing you'll see all the different aspects of why drawing is different. Though you will have to understand that this is a beautiful aspect and will always be helpful. Drawing or painting doesn't change the fact that. This small detail will be different from a masterpiece or a", "after": null, "start_char_pos": 1359, "end_char_pos": 1642}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1911, "end_char_pos": 1911}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2243, "end_char_pos": 2243}, {"type": "R", "before": "arts were", "after": "art was", "start_char_pos": 2427, "end_char_pos": 2436}, {"type": "R", "before": "I terminologia grafiki I", "after": "i terminologia grafiki i", "start_char_pos": 2979, "end_char_pos": 3003}, {"type": "R", "before": "I", "after": "i", "start_char_pos": 3020, "end_char_pos": 3021}, {"type": "R", "before": "hands", "after": "hand", "start_char_pos": 3365, "end_char_pos": 3370}, {"type": "R", "before": "colour", "after": "color", "start_char_pos": 3500, "end_char_pos": 3506}, {"type": "R", "before": "Watercolour", "after": "Watercolor", "start_char_pos": 3694, "end_char_pos": 3705}, {"type": "D", "before": "the", "after": null, "start_char_pos": 4265, "end_char_pos": 4268}, {"type": "R", "before": "watercolour", "after": "watercolor", "start_char_pos": 5082, "end_char_pos": 5093}, {"type": "R", "before": "favoured", "after": "favored", "start_char_pos": 5107, "end_char_pos": 5115}, {"type": "R", "before": "colour", "after": "color", "start_char_pos": 5196, "end_char_pos": 5202}, {"type": "R", "before": "the paper to the", "after": "paper to", "start_char_pos": 5595, "end_char_pos": 5611}, {"type": "R", "before": "practise", "after": "practice", "start_char_pos": 6028, "end_char_pos": 6036}, {"type": "R", "before": "colour", "after": "color", "start_char_pos": 6366, "end_char_pos": 6372}, {"type": "R", "before": "favours", "after": "favors", "start_char_pos": 6969, "end_char_pos": 6976}, {"type": "D", "before": "the", "after": null, "start_char_pos": 7548, "end_char_pos": 7551}, {"type": "D", "before": "the", "after": null, "start_char_pos": 7858, "end_char_pos": 7861}, {"type": "A", "before": null, "after": ",", "start_char_pos": 8886, "end_char_pos": 8886}, {"type": "A", "before": null, "after": "the", "start_char_pos": 9037, "end_char_pos": 9037}, {"type": "R", "before": "colours", "after": "colors", "start_char_pos": 10008, "end_char_pos": 10015}, {"type": "R", "before": "and causes", "after": ", and cause", "start_char_pos": 10079, "end_char_pos": 10089}, {"type": "D", "before": "to", "after": null, "start_char_pos": 10375, "end_char_pos": 10377}, {"type": "R", "before": "emphasized", "after": "emphasised", "start_char_pos": 10559, "end_char_pos": 10569}, {"type": "R", "before": "difficulty", "after": "difficult", "start_char_pos": 10755, "end_char_pos": 10765}], "sents_char_pos": [0, 115, 328, 384, 528, 576, 673, 823, 885, 981, 1056, 1159, 1358, 1437, 1532, 1582, 1882, 1953, 2035, 2127, 2305, 2454, 2564, 2690, 2843, 3012, 3201, 3440, 3546, 3693, 3818, 3888, 4170, 4339, 4400, 4509, 4574, 4648, 4766, 4831, 5007, 5069, 5151, 5323, 5435, 5495, 5562, 5741, 5898, 5982, 6134, 6210, 6278, 6495, 6640, 6696, 6775, 6904, 7054, 7130, 7298, 7526, 7646, 7740, 7783, 7870, 7963, 8041, 8117, 8226, 8372, 8468, 8602, 8685, 8811, 8929, 9056, 9224, 9315, 9448, 9545, 9634, 9711, 9762, 9909, 10031, 10152, 10282, 10389, 10495, 10658]}
+{"doc_id": "8667577", "revision_depth": "1", "before_revision": "Abu Sa\u2018id al-Khudri reported that the prophet Muhammad said, \"Whoever amongst you sees an evil, he must change it with his hand. If he is not able to do so, then with his tongue. And if he is not able to do so, then with his heart, and that is the weakest form of faith\". Mutazilite and Shia Imamis quote different traditions than the Sunni, but all agree on the Quran and on \"the existence of the duty\" to command and forbid.Cook, Forbidding Wrong, p.12 According to Michael Cook, \"scholars take it for granted\" that 'forbidding wrong' an-nahy \u02bfani-l-munkar and a slightly different phrase used in a similar hadith 'righting wrong' (taghyir al-munkar) \" are the same thing, and we will follow them in this ...\" Cook, Forbidding Wrong, p.4 Three \"basic questions arrising \"about the duty of forbidding wrong\" are who has to do it, to whom, and about what?\"Cook, Forbidding Wrong, p.11 ] [ What was enforced Types of wrongdoing Michael Cook writes that examples provided by Al-Ghazali of wrongdoing commonly committed and corrected by enforcers can be categorized into violations of \"religious norms\" such as praying incorrectly, \"puritanical norms\" such as consuming alcohol, and \"secular norms\" such as \"blocking a street\".Cook (2003), Forbidding Wrong in Islam. p.99 Enforcement targeted backsliding and laxness in obedience to religion. \"Our sources tell us .. that the overwhelming concern of those who forbade wrong was with wine, women and song. In fact liquor and music are by far the most widespread wrongs in our sources.\" Hisbah v. privacy An argument for commanding right and forbidding wrong and against the concept of minding ones own business comes from Hanafi jurist `Ismat Allah of Sharanpur who writes: were it pleasing to God to leave people alone, He would not have sent prophets, nor established their laws, nor called to Islam, nor voided other religions, but would rather have left people to their own devices, untroubled by divine visitations; ...Cook, Forbidding Wrong, p.89-90 Who did the enforcing Islamic legal scholars differ regarding who precisely was (and is) responsible for carrying out commanding and forbidding, what was to be commanded and forbidden, who was to be commanded and forbidden, and what was involved in this commanding and forbidding. For example, schools of law differ over whether Hisbah is an individual or collective duty, (i.e. an individual obligation of all believers, or if leaving enforcement to just some Muslims was sufficient). Who is eligible to use force (their \"hand\") to command and forbid is disputed, some reserving it for the political authorities or those, such as the mu\u1e25tasib, who job it is to carry out the duty on their behalf. Others argue that these modes extended to all qualified believers.Michael Cook: Commanding right and forbidding wrong in Islamic thought. Cambridge University Press. Cambridge 2000, pp. 32-47%DIFDELCMD < %DIFDELCMD < %%% According to Al-Nawawi, what was to be commanded and forbidden had to be determined in accordance with established Shariah principles. 'Changing the reprehensible by hand,' or by compulsion, like jihad, was the purview of the state alone. Changing with the tongue' was the right of the ulama. Ordinary, individual Muslims should only reject the reprehensible with their hearts.Fatawa Hindiyya / Fatawa Alamgiri, Dar el-Fekr, Beirut, 1310 A.H. vol.5 p.353. Quote: \"Commanding the good with hand is for those in position of political authority, with tongue it is for the scholars and with the heart it for the laymen.\" In practice, \"those who engage d%DIFDELCMD < ] %%% in the activity\" of commanding and forbidding in pre-modern Islam, were \"overwhelmingly scholars\", according to Michael Cook.Cook, Forbidding Wrong, p.102 Rebellion However, this did not stop political rebels in the early centuries of Islam from using forbidding wrong as their slogan, according to Michael Cook. Examples were \"found among the Kharijites, including the Ibadis, among the Shi'ites, including Zaydis, and among the Sunnis, especially the Malikis. Some instances of such rebels in the early centuries of Islam are Jahm ibn Safwan (d.746), in late Umayyad Transoxiana, Yusuf al-Barm in Khurasan in 776,defeated and captured in 776/7 CE Al-Mubarqa in Palestine 841/42 CE, Ibn al-Qitt in Spain in 901 CE and an `Abbasid who rebelled in Armenia in 960\" CE.Cook, Forbidding Wrong, p.108-9", "after_revision": "Abu Sa\u2018id al-Khudri reported that the prophet Muhammad said, \"Whoever amongst you sees an evil, he must change it with his hand. If he is not able to do so, then with his tongue. And if he is not able to do so, then with his heart, and that is the weakest form of faith\". Mutazilite and Shia Imamis quote different traditions than the Sunni, but all agree on the Quran and on \"the existence of the duty\" to command and forbid.Cook, Forbidding Wrong, p.12 According to Michael Cook, a slightly different phrase is used in a similar hadith -- 'righting wrong' (taghyir al-munkar) instead of 'forbidding wrong' (an-nahy \u02bfani-l-munkar) -- but \" scholars take it for granted\" that 'the two \" are the same thing, and we will follow them in this ...\" Cook, Forbidding Wrong, p.4 Three \"basic questions arrising \"about the duty of forbidding wrong\" are who has to do it, Cook, Forbidding Wrong, p.11 to whom, and about what?\"Cook, Forbidding Wrong, p.11 Who did the enforcing Scholars argue adult Muslims are obliged but non-Muslim excluded (Cook paraphrases al-Ghazalli in asking, \"After all since the duty consists in coming to the aid of the faith, how could one of its enemies an unbeliever] perform it?\" and points out that if a nonbeliever upbraided a Muslim for wrong doing he would \"presuming to exercise an illegitimate authority over the Muslim\" who should never be humiliated by an unbeliever.Cook, Forbidding Wrong, p.13 Children are also excluded for lacking legal competency (mukallaf). Scholars are often \"on balance reluctant to restrict the range of those for whom forbidding wrong is a duty\", including for example, women and sinners on many occasions.Cook, Forbidding Wrong, p.18-19 Schools of law differ over whether Hisbah is an individual (i.e. an individual obligation of all believers), or collective duty, (an obligation where once a sufficient number of Muslims undertake it, others cease to be obligated). Who is eligible to use force (their \"hand\") to command and forbid is disputed, some reserving it for the political authorities or those, such as the mu\u1e25tasib, who job it is to carry out the duty on their behalf. Others argue that these modes extended to all qualified believers.Michael Cook: Commanding right and forbidding wrong in Islamic thought. Cambridge University Press. Cambridge 2000, pp. 32-47 According to Al-Nawawi, what was to be commanded and forbidden had to be determined in accordance with established Shariah principles. 'Changing the reprehensible by hand,' or by compulsion, like jihad, was the purview of the state alone. Changing with the tongue' was the right of the ulama. Ordinary, individual Muslims should only reject the reprehensible with their hearts.Fatawa Hindiyya / Fatawa Alamgiri, Dar el-Fekr, Beirut, 1310 A.H. vol.5 p.353. Quote: \"Commanding the good with hand is for those in position of political authority, with tongue it is for the scholars and with the heart it for the laymen.\" In practice, \"those who engage[d in the activity\" of commanding and forbidding in pre-modern Islam, were \"overwhelmingly scholars\", according to Michael Cook.Cook, Forbidding Wrong, p.102 Rebellion However, this did not stop political rebels in the early centuries of Islam from using forbidding wrong as their slogan, according to Michael Cook. Examples were \"found among the Kharijites, including the Ibadis, among the Shi'ites, including Zaydis, and among the Sunnis, especially the Malikis. Some instances of such rebels in the early centuries of Islam are Jahm ibn Safwan (d.746), in late Umayyad Transoxiana, Yusuf al-Barm in Khurasan in 776,defeated and captured in 776/7 CE Al-Mubarqa in Palestine 841/42 CE, Ibn al-Qitt in Spain in 901 CE and an `Abbasid who rebelled in Armenia in 960\" CE.Cook, Forbidding Wrong, p.108-9 What was enforced Types of wrongdoing Michael Cook writes that examples provided by Al-Ghazali of wrongdoing commonly committed and corrected by enforcers can be categorized into violations of \"religious norms\" such as praying incorrectly, \"puritanical norms\" such as consuming alcohol, and \"secular norms\" such as \"blocking a street\".Cook (2003), Forbidding Wrong in Islam. p.99 Enforcement targeted backsliding and laxness in obedience to religion. \"Our sources tell us .. that the overwhelming concern of those who forbade wrong was with wine, women and song. In fact liquor and music are by far the most widespread wrongs in our sources.\" Hisbah v. privacy An argument for commanding right and forbidding wrong and against the concept of minding ones own business comes from Hanafi jurist `Ismat Allah of Sharanpur who writes: were it pleasing to God to leave people alone, He would not have sent prophets, nor established their laws, nor called to Islam, nor voided other religions, but would rather have left people to their own devices, untroubled by divine visitations; ...Cook, Forbidding Wrong, p.89-90 %DIFDELCMD < %DIFDELCMD < %%% %DIFDELCMD < ] %%% ", "edit_actions": [{"type": "D", "before": "\"scholars take it for granted\" that 'forbidding wrong' an-nahy \u02bfani-l-munkar and", "after": null, "start_char_pos": 482, "end_char_pos": 562}, {"type": "A", "before": null, "after": "is", "start_char_pos": 591, "end_char_pos": 591}, {"type": "A", "before": null, "after": "--", "start_char_pos": 617, "end_char_pos": 617}, {"type": "A", "before": null, "after": "instead of 'forbidding wrong' (an-nahy \u02bfani-l-munkar) -- but", "start_char_pos": 655, "end_char_pos": 655}, {"type": "A", "before": null, "after": "scholars take it for granted\" that 'the two \"", "start_char_pos": 658, "end_char_pos": 658}, {"type": "A", "before": null, "after": "Cook, Forbidding Wrong, p.11", "start_char_pos": 835, "end_char_pos": 835}, {"type": "A", "before": null, "after": "Who did the enforcing Scholars argue adult Muslims are obliged but non-Muslim excluded (Cook paraphrases al-Ghazalli in asking, \"After all since the duty consists in coming to the aid of the faith, how could one of its enemies", "start_char_pos": 890, "end_char_pos": 890}, {"type": "A", "before": null, "after": "an unbeliever", "start_char_pos": 891, "end_char_pos": 891}, {"type": "A", "before": null, "after": "perform it?\" and points out that if a nonbeliever upbraided a Muslim for wrong doing he would \"presuming to exercise an illegitimate authority over the Muslim\" who should never be humiliated by an unbeliever.Cook, Forbidding Wrong, p.13 Children are also excluded for lacking legal competency (mukallaf). Scholars are often \"on balance reluctant to restrict the range of those for whom forbidding wrong is a duty\", including for example, women and sinners on many occasions.Cook, Forbidding Wrong, p.18-19", "start_char_pos": 893, "end_char_pos": 893}, {"type": "A", "before": null, "after": "Schools of law differ over whether Hisbah is an individual (i.e. an individual obligation of all believers), or collective duty, (an obligation where once a sufficient number of Muslims undertake it, others cease to be obligated).", "start_char_pos": 894, "end_char_pos": 894}, {"type": "A", "before": null, "after": "Who is eligible to use force (their \"hand\") to command and forbid is disputed, some reserving it for the political authorities or those, such as the mu\u1e25tasib, who job it is to carry out the duty on their behalf. Others argue that these modes extended to all qualified believers.Michael Cook: Commanding right and forbidding wrong in Islamic thought. Cambridge University Press. Cambridge 2000, pp. 32-47", "start_char_pos": 895, "end_char_pos": 895}, {"type": "A", "before": null, "after": "According to Al-Nawawi, what was to be commanded and forbidden had to be determined in accordance with established Shariah principles. 'Changing the reprehensible by hand,' or by compulsion, like jihad, was the purview of the state alone. Changing with the tongue' was the right of the ulama. Ordinary, individual Muslims should only reject the reprehensible with their hearts.Fatawa Hindiyya / Fatawa Alamgiri, Dar el-Fekr, Beirut, 1310 A.H. vol.5 p.353. Quote: \"Commanding the good with hand is for those in position of political authority, with tongue it is for the scholars and with the heart it for the laymen.\" In practice, \"those who engage", "start_char_pos": 896, "end_char_pos": 896}, {"type": "A", "before": null, "after": "d", "start_char_pos": 897, "end_char_pos": 897}, {"type": "A", "before": null, "after": "in the activity\" of commanding and forbidding in pre-modern Islam, were \"overwhelmingly scholars\", according to Michael Cook.Cook, Forbidding Wrong, p.102", "start_char_pos": 898, "end_char_pos": 898}, {"type": "A", "before": null, "after": "Rebellion However, this did not stop political rebels in the early centuries of Islam from using forbidding wrong as their slogan, according to Michael Cook. Examples were \"found among the Kharijites, including the Ibadis, among the Shi'ites, including Zaydis, and among the Sunnis, especially the Malikis. Some instances of such rebels in the early centuries of Islam are Jahm ibn Safwan (d.746), in late Umayyad Transoxiana, Yusuf al-Barm in Khurasan in 776,defeated and captured in 776/7 CE Al-Mubarqa in Palestine 841/42 CE, Ibn al-Qitt in Spain in 901 CE and an `Abbasid who rebelled in Armenia in 960\" CE.Cook, Forbidding Wrong, p.108-9", "start_char_pos": 899, "end_char_pos": 899}, {"type": "D", "before": "Who did the enforcing Islamic legal scholars differ regarding who precisely was (and is) responsible for carrying out commanding and forbidding, what was to be commanded and forbidden, who was to be commanded and forbidden, and what was involved in this commanding and forbidding. For example, schools of law differ over whether Hisbah is an individual or collective duty, (i.e. an individual obligation of all believers, or if leaving enforcement to just some Muslims was sufficient).", "after": null, "start_char_pos": 2013, "end_char_pos": 2498}, {"type": "D", "before": "Who is eligible to use force (their \"hand\") to command and forbid is disputed, some reserving it for the political authorities or those, such as the mu\u1e25tasib, who job it is to carry out the duty on their behalf. Others argue that these modes extended to all qualified believers.Michael Cook: Commanding right and forbidding wrong in Islamic thought. Cambridge University Press. Cambridge 2000, pp. 32-47", "after": null, "start_char_pos": 2499, "end_char_pos": 2902}, {"type": "D", "before": "According to Al-Nawawi, what was to be commanded and forbidden had to be determined in accordance with established Shariah principles. 'Changing the reprehensible by hand,' or by compulsion, like jihad, was the purview of the state alone. Changing with the tongue' was the right of the ulama. Ordinary, individual Muslims should only reject the reprehensible with their hearts.Fatawa Hindiyya / Fatawa Alamgiri, Dar el-Fekr, Beirut, 1310 A.H. vol.5 p.353. Quote: \"Commanding the good with hand is for those in position of political authority, with tongue it is for the scholars and with the heart it for the laymen.\" In practice, \"those who engage", "after": null, "start_char_pos": 2932, "end_char_pos": 3579}, {"type": "D", "before": "d", "after": null, "start_char_pos": 3580, "end_char_pos": 3581}, {"type": "D", "before": "in the activity\" of commanding and forbidding in pre-modern Islam, were \"overwhelmingly scholars\", according to Michael Cook.Cook, Forbidding Wrong, p.102", "after": null, "start_char_pos": 3600, "end_char_pos": 3754}, {"type": "D", "before": "Rebellion However, this did not stop political rebels in the early centuries of Islam from using forbidding wrong as their slogan, according to Michael Cook. Examples were \"found among the Kharijites, including the Ibadis, among the Shi'ites, including Zaydis, and among the Sunnis, especially the Malikis. Some instances of such rebels in the early centuries of Islam are Jahm ibn Safwan (d.746), in late Umayyad Transoxiana, Yusuf al-Barm in Khurasan in 776,defeated and captured in 776/7 CE Al-Mubarqa in Palestine 841/42 CE, Ibn al-Qitt in Spain in 901 CE and an `Abbasid who rebelled in Armenia in 960\" CE.Cook, Forbidding Wrong, p.108-9", "after": null, "start_char_pos": 3755, "end_char_pos": 4397}], "sents_char_pos": [0, 128, 178, 271, 426, 860, 1235, 1350, 1462, 1542, 1977, 2293, 2498, 2710, 2777, 2848, 2876, 3066, 3170, 3224, 3309, 3387, 3548, 3725, 3912, 4061, 4366]}
+{"doc_id": "868284", "revision_depth": "1", "before_revision": "CountriesBelgium: Communities, regions and language areas; Languages; Economic regional differencesBrazil: Regions; Languages; Nationalisms and regionalisms (Sao Paulo independence movement, South Region independence movement)Canada: Languages; Provinces; Maritime Rights Movement; Quebec nationalism (Quebec sovereignty movement); Western alienation (Alberta separatism, Cascadian independence movement) . Denmark: Languages; Danish dialects; Realm; Nationalisms and regionalisms; Faroese nationalism (Faroese independence movement); Greenlandic nationalism (Greenlandic independence movement)China: Languages; Ethnic groups; Nationalisms and regionalisms ( Tibetan nationalism, Uyghur nationalism, Hong Konger nationalism/autonomy, Taiwanese nationalism/independence movement, Inner Mongolian nationalism )France: Nationalisms and regionalisms (Basque nationalism, Breton nationalism, Corsican nationalism, Occitan nationalism)Germany: German dialects; Nationalisms and reginonalisms (Bavarian nationalism)Italy: Languages; North\u2013South divide; Padanian nationalism ; Lombard nationalism; South Tyrolean secessionist movement; Venetian nationalism; Friuli Movement ; Southern Italy autonomist movements; Sicilian nationalism; Sardinian nationalismRomania : Languages; ethnic minoritiesRussia : Languages; Nationalisms and regionalisms ( Siberian regionalism, Chechen nationalism, Circassian nationalism ), Insurgency in the North CaucasusSpain: Languages; Nationalisms and regionalisms ( Catalan nationalism, Basque nationalism, Galician nationalism, Canarian nationalism, Andalusian nationalism, Aragonese nationalism, Asturian nationalism, Castilian nationalism, Valencian nationalism , etc.)South Africa: Languages; Afrikaner nationalism (Volkstaat)United Kingdom: Countries; Languages; North\u2013South divide; Nationalisms ( English nationalism\u2013 independence, Scottish nationalism\u2013independence, Welsh nationalism\u2013 independence, Cornish nationalism\u2013 devolution, Irish nationalism\u2013republicanism, Ulster nationalism )United States''': Southern nationalism, Cascadian nationalism, Texan nationalism, Californian nationalism, Alaskan nationalism, Hawaiian nationalism, Vermont nationalism, Puerto Rican nationalism, New Hampshirite nationalism, Northwest Territorial Imperative, Secessionism", "after_revision": "CountriesBelgium: Communities, regions and language areas; Languages; Economic regional differencesBrazil: Regions; Languages; Nationalisms and regionalisms (Sao Paulo independence movement, South Region independence movement)Canada: Languages; Provinces; Maritime Rights Movement; Quebec nationalism (Quebec sovereignty movement); Western alienation (Alberta separatism, Cascadian independence movement) Denmark: Languages; Danish dialects; Realm; Nationalisms and regionalisms; Faroese nationalism (Faroese independence movement); Greenlandic nationalism (Greenlandic independence movement)China: Languages; Ethnic groups; Nationalisms and regionalisms ( Hong Konger nationalism/autonomy, Inner Mongolian nationalism, Taiwanese nationalism/independence movement, Tibetan nationalism, Uyghur nationalism )France: Nationalisms and regionalisms (Basque nationalism, Breton nationalism, Corsican nationalism, Occitan nationalism)Germany: German dialects; Nationalisms and reginonalisms (Bavarian nationalism)Italy: Languages; North\u2013South divide; Nationalisms and regionalisms (Friuli Movement ; Lombard nationalism; Padanian nationalism; Sardinian nationalism; Sicilian nationalism ; Southern Italy autonomist movements; South Tyrolean secessionist movement; Venetian nationalism)Romania : Languages; ethnic minorities; Nationalisms and regionalisms (Sz\u00e9kely autonomy movement, Transylvanianism)Russia : Languages; Nationalisms and regionalisms ( Chechen nationalism, Circassian nationalism , Siberian regionalism ), Insurgency in the North CaucasusSpain: Languages; Nationalisms and regionalisms ( Andalusian nationalism, Aragonese nationalism, Asturian nationalism, Basque nationalism, Canarian nationalism, Castilian nationalism, Catalan nationalism, Galician nationalism, Valencian nationalism etc.)South Africa: Languages; Afrikaner nationalism (Volkstaat)United Kingdom: Countries; Languages; North\u2013South divide; Nationalisms ( Cornish nationalism\u2013 devolution, English nationalism\u2013independence, Irish nationalism\u2013 republicanism, Scottish nationalism\u2013 independence, Ulster nationalism , Welsh nationalism\u2013independence )United States''': Secessionism; Alaskan nationalism, Californian nationalism, Cascadian nationalism, Hawaiian nationalism, New Hampshirite nationalism, Northwest Territorial Imperative, Puerto Rican nationalism, Southern nationalism, Texan nationalism, Vermont nationalism", "edit_actions": [{"type": "D", "before": ".", "after": null, "start_char_pos": 405, "end_char_pos": 406}, {"type": "D", "before": "Tibetan nationalism, Uyghur nationalism,", "after": null, "start_char_pos": 659, "end_char_pos": 699}, {"type": "A", "before": null, "after": "Inner Mongolian nationalism,", "start_char_pos": 734, "end_char_pos": 734}, {"type": "R", "before": "Inner Mongolian nationalism", "after": "Tibetan nationalism, Uyghur nationalism", "start_char_pos": 780, "end_char_pos": 807}, {"type": "R", "before": "Padanian nationalism", "after": "Nationalisms and regionalisms (Friuli Movement", "start_char_pos": 1047, "end_char_pos": 1067}, {"type": "R", "before": "South Tyrolean secessionist movement; Venetian nationalism; Friuli Movement", "after": "Padanian nationalism; Sardinian nationalism; Sicilian nationalism", "start_char_pos": 1091, "end_char_pos": 1166}, {"type": "R", "before": "Sicilian nationalism; Sardinian nationalismRomania", "after": "South Tyrolean secessionist movement; Venetian nationalism)Romania", "start_char_pos": 1206, "end_char_pos": 1256}, {"type": "R", "before": "minoritiesRussia", "after": "minorities; Nationalisms and regionalisms (Sz\u00e9kely autonomy movement, Transylvanianism)Russia", "start_char_pos": 1277, "end_char_pos": 1293}, {"type": "D", "before": "Siberian regionalism,", "after": null, "start_char_pos": 1339, "end_char_pos": 1360}, {"type": "A", "before": null, "after": ", Siberian regionalism", "start_char_pos": 1405, "end_char_pos": 1405}, {"type": "D", "before": "Catalan nationalism, Basque nationalism, Galician nationalism, Canarian nationalism,", "after": null, "start_char_pos": 1491, "end_char_pos": 1575}, {"type": "R", "before": "Castilian", "after": "Basque nationalism, Canarian nationalism, Castilian nationalism, Catalan nationalism, Galician", "start_char_pos": 1645, "end_char_pos": 1654}, {"type": "D", "before": ",", "after": null, "start_char_pos": 1690, "end_char_pos": 1691}, {"type": "R", "before": "English", "after": "Cornish", "start_char_pos": 1828, "end_char_pos": 1835}, {"type": "R", "before": "independence, Scottish", "after": "devolution, English", "start_char_pos": 1849, "end_char_pos": 1871}, {"type": "R", "before": "Welsh", "after": "Irish", "start_char_pos": 1898, "end_char_pos": 1903}, {"type": "R", "before": "independence, Cornish", "after": "republicanism, Scottish", "start_char_pos": 1917, "end_char_pos": 1938}, {"type": "R", "before": "devolution, Irish nationalism\u2013republicanism,", "after": "independence,", "start_char_pos": 1952, "end_char_pos": 1996}, {"type": "A", "before": null, "after": ", Welsh nationalism\u2013independence", "start_char_pos": 2016, "end_char_pos": 2016}, {"type": "R", "before": "Southern nationalism, Cascadian nationalism, Texan nationalism,", "after": "Secessionism; Alaskan nationalism,", "start_char_pos": 2036, "end_char_pos": 2099}, {"type": "R", "before": "Alaskan", "after": "Cascadian", "start_char_pos": 2125, "end_char_pos": 2132}, {"type": "R", "before": "Vermont nationalism,", "after": "New Hampshirite nationalism, Northwest Territorial Imperative,", "start_char_pos": 2168, "end_char_pos": 2188}, {"type": "R", "before": "New Hampshirite nationalism, Northwest Territorial Imperative, Secessionism", "after": "Southern nationalism, Texan nationalism, Vermont nationalism", "start_char_pos": 2215, "end_char_pos": 2290}], "sents_char_pos": [0, 58, 69, 115, 126, 244, 255, 281, 331, 406, 426, 443, 481, 534, 611, 626, 955, 1026, 1046, 1069, 1090, 1128, 1150, 1168, 1205, 1227, 1269, 1306, 1458, 1721, 1781, 1792, 1812]}
+{"doc_id": "880489", "revision_depth": "1", "before_revision": "A gait is a pattern of limb movements made during locomotion. \"Gait\". Dictionary.com, Dictionary.com, www.dictionary.com/browse/gait. Human gaits are the various ways in which a human can move, either naturally or as a result of specialized training. Minetti, A.E. \"The biomechanics of skipping gaits: a third locomotion paradigm?\". NIH.gov. Consiglio Nazionale delle Ricerche. PMC 1689187 . Human gait is defined as bipedal, biphasic forward propulsion of center of gravity of the human body, in which there are alternate sinuous movements of different segments of the body with least expenditure of energy. Different gait patterns are characterized by differences in limb-movement patterns, overall velocity, forces, kinetic and potential energy cycles, and changes in the contact with the ground. Some researchers classify foot strike by the initial center of pressure; this is mostly applicable to shod running (running while wearing shoes). 5 In this classification: a rearfoot strike (heel strike) has the initial center of pressure in the rear third of the shoe (rear 1/3 of shoe length) ; a midfoot strike is in the middle third (middle 1/3 of shoe length) ; a forefoot strike is in the front third (front 1/3 of shoe length) . Typically, barefoot walking features heel or midfoot strike, while barefoot running features midfoot or forefoot strike. Barefoot running rarely features heel strike because the impact can be painful, the human heel pad not absorbing much of the force of impact. By contrast, 75\\% of runners wearing modern running shoes heel strike; Modern Running Shoes & Heel Striking , Daniel Lieberman, Harvard University. running shoes being characterized by a padded sole, stiff soles and arch support, and sloping down from a more padded heel to a less padded forefoot. The cause of this change in gait in shoe running is unknown, but Liebermann noted that there is correlation between the foot-landing style and exposure to shoes. In some individuals, the gait pattern is largely unchanged \u2013 the leg position and foot position are identical in barefoot and shoe running \u2013 but the wedge shape of the padding moving the point of impact back from the forefoot to the midfoot. In other cases, it is conjectured that the padding of the heel softens the impact and resulting in runner modifying their gait to contact further back in the foot. A 2012 study involving Harvard University runners found that those who \"habitually rearfoot strike had approximately twice the rate of repetitive stress injuries than individuals who habitually forefoot strike\". & This was the first study that investigated the link between foot strike and injury rates. However, earlier studies have shown that smaller collision forces were generated when running forefoot strike compared to rear-foot strike. This may protect the ankle joints and lower limbs from some of the impact-related injuries experienced by rear-foot strikers. Knight, Kathryn . \" Human's heel first gait is efficient for walking \" . Journal of Experimental Biology. Retrieved 4 November 2015 In a 2017 article called \"Foot Strike Pattern in Children During Shod-Unshod Running , \" there was a study done where over 700 children were observed from the ages of 6\u201316 to see their foot strike patterns and neutral support. They also wanted to see what outside factors to shod and unshod conditions and sex. This study used multiple video recording devices to get their results. The results showed that most foot patterns such as foot rotation and the rearfoot strike were similar in boys and girls at the same ages. Control of gait by the nervous system The central nervous system regulates gait in a highly ordered fashion through a combination of voluntary and automatic processes. The basic locomotor pattern is an automatic process that results from rhythmic reciprocal bursts of flexor and extensor activity. This rhythmic firing is the result of Central Pattern Generators ( CPG) which operate regardless of whether a motion is voluntary or not. CPGs do not require sensory input to be sustained. However, studies have identified that gait patterns in deafferented or immobilized animals are more simplistic than in neurologically intact animals. (Deafferentation and immobilization are experimental preparations of animals to study neural control. Deafferentation involves transecting the dorsal roots of the spinal cord that innervate the animal's limbs which impedes transmission of sensory information while keeping motor innervation of muscles intact. In contrast, immobilization involves injecting an acetylcholine inhibitor which impedes the transmission of motor signals while sensory input is unaffected.) The complexity of gait arises from the need to adapt to expected and unexpected changes in the environment (e.g. changes in walking surface or obstacles). Visual, vestibular, proprioceptive, and tactile sensory information provides important feedback related to gait and permits the adjustment of a person's posture or foot placement depending on situational requirements. When approaching an obstacle, visual information about the size and location of the object is used to adapt the stepping pattern. These adjustments involve change in the trajectory of leg movement and the associated postural adjustments required to maintain their balance. Vestibular information provides information about position and movement of the head as the person moves through their environment. Proprioceptors in the joints and muscles provide information about joint position and changes in muscle length. Skin receptors, referred to as exteroceptors, provide additional tactile information about stimuli that a limb encounters. Gait in humans is difficult to study due to ethical concerns. Therefore, the majority of what is known about gait in humans is ascertained from studies involving other animals or is demonstrated in humans using functional magnetic resonance imaging during the mental imagery of gait. These studies have provided the field with several important discoveries. Locomotor centers %DIFDELCMD < %DIFDELCMD < %%% There are three specific centers within the brain that regulate gait: Regulation by the cerebral cortex %DIFDELCMD < %DIFDELCMD < %%% Sensory input from multiple areas of the cerebral cortex, such as the visual cortex, vestibular cortex, and the primary sensory cortex, is required for skilled locomotor tasks. This information is integrated and transmitted to the supplementary motor area (SMA) and premotor area of the cerebral cortex where motor programs are created for intentional limb movement and anticipatory postural adjustments. For example, the motor cortex uses visual information to increase the precision of stepping movements. When approaching an obstacle, an individual will make adjustments to their stepping pattern based on visual input regarding the size and location of the obstacle. The primary motor cortex is responsible for the voluntary control for the contralateral leg while the SMA is linked to postural control. Regulation by the spinal cordPurves D, Augustine GJ, Fitzpatrick D, et al., editors . Neuroscience. 2nd edition. Sunderland(MA) : Sinauer Associates ; 2001. Flexion Reflex Pathways. Available from: URL Spinal reflexes not only generate the rhythm of locomotion through CPGs but also ensure postural stability during gait. There are multiple pathways within the spinal cord which play a role in regulating gait, including the role of stretch reflexes and non-reciprocal inhibition : in postural control and inhibition and stretch reflexes to produce alternating stepping patterns. A stretch reflex occurs when a muscle is stretched and then contracts protectively while opposing muscle groups relax. An example of this during gait occurs when the weight-bearing leg nears the end of the stance phase. At this point the hip extends and the hip flexors are elongated. Muscle spindles within the hip flexors detect this stretch and trigger muscle contraction of the hip flexors required for the initiation of the swing phase of gait. However, Golgi tendon organs in the extensor muscles also send signals related to the amount of weight being supported through the stance leg to ensure that limb flexion does not occur until the leg is adequately unweighted and the majority of weight has been transferred to the opposite leg. Information from the spinal cord is transmitted for higher order processing to supraspinal structures via spinothalamic, spinoreticular, and spinocerebellar tracts. Walk Walking involves having at least one foot in contact with the ground at all times. There is also a period of time within the gait cycle where both feet are simultaneously in contact with the ground. When a foot is lifted off the ground, that limb is in the swing phase of gait. When a foot is in contact with the ground, that limb is in the stance phase of gait. A mature walking pattern is characterized by approximately 60\\% of the gait cycle (i.e. from one initial contact of a foot to the next initial contact of the same foot) being the stance phaseof gait 40\\% swing phase. Initiation of gait is a voluntary process that involves a preparatory postural adjustment where the center of mass is moved forward and laterally prior to unweighting one leg. The center of mass is only within a person's base of support when both feet are in contact with the ground (known as double limb stance). When only one foot is in contact with the ground ( known as single limb stance), the center of mass is in front of that foot and moving towards the leg that is in the swing phase. In order to investigate the gait strategies likely to be favored at low gravity a series of predictive, computational simulations of gait are performed using a physiological model of the musculoskeletal system, without assuming any particular type of gait ; a computationally efficient optimization strategy is utilized allowing for multiple simulations. The results reveal skipping as more efficient and less fatiguing than walking or running and suggest the existence of a walk-skip rather than a walk-run transition at low gravity. Children gait pattern Time and distance parameters of gait patterns are dependent on a child's age. Different age leads to different step speed and timing. Harada, T., Miyai, I., Suzuki, M. et al. Exp Brain Res (2009) 193: 445. URL Arm swinging slows when the speed of walking is increased. Height of a child plays a significant role in stride distance and speed. The taller the child is the longer the stride will be and the further the step will be. Gait patterns are velocity and age dependent. For example, as age increased so did velocity. Meanwhile, as age increases, cadence (rate at which someone walks that is measured in steps per minute) of the gait pattern decreased. Physical attributes such as height, weight, and even head circumference can also play a role in gait patterns in children. Environmental and emotional status also play a role in with speed, velocity, and gait patterns that a child uses. Besides, children of different genders will have different rates of gait development. Significant developmental changes in gait parameters such as stride time, swing time, and cadence occur in a child's gait two months after the onset of independent walking, possibly due to an increase in postural control at this point of development. Gender differences There are gender differences in human gait patterns: females tend to walk with smaller step width and more pelvic movement. %DIFDELCMD < [%%% 13 Gait analysis generally takes gender into consideration. %DIFDELCMD < [%%% 14 Gender differences in human gait can be explored using a demonstration created by the Biomotion Laboratory at Queen's University , in Kingston, Ontario, Canada. 15 For the same distance, walking with a natural heel-first gait burns roughly 70\\% less energy than running. Differences of this magnitude are unusual in mammals. Kathyrn Knight of the Journal of Experimental Biology summarizes the findings of one study: \"Landing heel first also allows us to transfer more energy from one step to the next to improve our efficiency, while placing the foot flat on the ground reduces the forces around the ankle (generated by the ground pushing against us), which our muscles have to counteract.\" According to David Carrier of the University of Utah, who helped perform the study, \"Given the great distances hunter-gatherers travel, it is not surprising that humans are economical walkers.\" %DIFDELCMD < [%%% 16 Key determinants of gait A normal gait pattern depends on a range of biomechanical features, controlled by the nervous system for increased energy conservation and balance.Kuo, A. D. , Donelan, J. M. (2010). Dynamic principles of gait and their clinical implications . Physical therapy , 90(2), 157 These biomechanical features of normal gait have been defined as key determinants of gait. It is therefore necessary for the refined neurological control and integration of these gait features for accuracy and precision with less energy expenditure. As a result, any abnormality of the neuromusculoskeletal system may lead to abnormality in gait and increased energy expenditure. The six determinants of gait have been long-lasting theories of gait that have been extensively studied biomechanically. These six kinematics or determinants of gait were established by Saunders et al. in 1953. Saunders, J. , Inman, V. , Eberhart, H. (1953). The major determinants in normal and pathological gait . American Journal of Bone and Joint Surgery, 35, 543\u2013558. Due to the extensive studies in these determinants, they have gone through various refinementsover the past five decade, which have led to either authentication, acceptance or disputation of each of the six determinants of gait.The six determinants of gait have been predominantly embraced as a fact for half a decade since its proposition, Gard, S. A. , Childress, D. S. (2001). What determines the vertical displacement of the body during normal walking? . JPO: Journal of Prosthetics and Orthotics, 13(3), 64-67. and have made appearances in various literature, McMahon, T. A. (1984). Muscles, reflexes, and locomotion. Princeton, NJ: Princeton University PressPerry , J. (1992). Gait analysis: Normal and pathological function. Thorofare, NJ: Slack, Inc.Rose, J. , Gamble, J. ( Eds.) . (1994). Human walking (2nd ed.). Baltimore, MD: Williams & Wilkins.Whittle, M. W. (1996). Gait analysis: An introduction (2nd ed.). Oxford, UK: Butterworth-Heinemann. but without extensive testing. Albeit, recent studies have depicted that , the first three determinants might actually contribute marginally or far less to reducing the vertical displacement of the center of mass (COM). These determinants of gait are known to ensure economical locomotion, Kuo, A. D., Donelan, J. M. (2010). Dynamic principles of gait and their clinical implications. Physical therapy, 90(2), 157 by the reduction in vertical center of mass (COM) excursion leading to reduction in metabolic energy. It is therefore suggested that the precise control of these determinants , also referred to as kinematic features of gait Inman, V. T. , Ralston, H. J. , Todd, F. (1981). Human walking. Williams & Wilkins. leads to increased energy conservation. These kinematic features of gait are integrated or coordinated in order to ensure a circular arc trajectory of the COM, as theory proposed as the 'compass gait (straight knee)'. Cavagna, G., Saibene, F., Margaria, R. (1963). External work in walking. Journal of Applied Physiology, 18, 1\u20139. Cavagna, G. A.,%DIFDELCMD < & %%% Margaria, R. (1966). Mechanics of walking. Journal of Applied Physiology, 21, 271\u2013278 The theory underlying the determinants run contrary to that of the 'inverted pendulum' theory with a static stance leg acting as a pendulum that prescribes an arc.Cavagna, G. , Saibene, F. , Margaria, R. (1963). External work in walking . Journal of Applied Physiology, 18, 1\u20139.Cavagna, G. A. , Margaria, R. (1966). Mechanics of walking . Journal of Applied Physiology, 21, 271\u2013 278Kuo , A. D. (2007). The six determinants of gait and the inverted pendulum analogy: A dynamic walking perspective . Human movement science , 26(4), 617-656. The six determinants of gaits and their effects on COM displacement and energy conservation are described below in chronological order are : Pelvic rotation: This kinematic feature of gait operates under the theory of compass gait model.Della Croce, U. , Riley, P. O. , Lelas, J. L. , Kerrigan, D. C. (2001). A refined view of the determinants of gait . Gait & posture , 14(2), 79-84. In this model, the pelvis rotates side to side during normal gait. In effect, it aids in the progression of the contralateral side through reduced hip flexion and extension. Its effect on the reduction of metabolic energy and the increased energy conservation is through the reduction of vertical COM displacement. This notion of reduction of metabolic cost may be disputed by a study done by Gard and Childress (1997),Gard, S. A. , Childress, D. S. (1997). The effect of pelvic list on the vertical displacement of the trunk during normal walking . Gait & Posture, 5(3), 233-238 who stated that there may be minimal effect of pelvic rotation on vertical COM displacement. Furthermore, other studies have found pelvic rotation to have little effect on the smoothing of COM trajectory. Kuo, A. D.,%DIFDELCMD < & %%% Donelan, J. M. (2010). Dynamic principles of gait and their clinical implications. Physical therapy, 90(2), 157 Actually pelvic rotations has been shown to accounted about 12\\% reduction in the total COM vertical displacement. Della Croce, U., Riley, P. O., Lelas, J. L.,%DIFDELCMD < & %%% Kerrigan, D. C. (2001). A refined view of the determinants of gait. Gait%DIFDELCMD < & %%% posture, 14(2), 79-84. Pelvic tilt/Obliquity: Normal gait results in tilting of the swing phase side, in relation to the control by the stance side hip abductors. As a consequence, there is the neutralization of raising of COM during the transition from hip flexion to extension. Its effect on the reduction of metabolic energy and the increased energy conservation is via the reduction of vertical COM trajectory or peak form compass gait model. Pelvic obliquity's effects on reduction of vertical displacement of COM has been examined and been shown to only reduce vertical displacement of COM by at most, only 2\u20134 mm. Gard, S. A.,%DIFDELCMD < & %%% Childress, D. S. (1997). The effect of pelvic list on the vertical displacement of the trunk during normal walking. Gait%DIFDELCMD < & %%% Posture, 5(3), 233-238 Knee flexion at stance phase: The knee usually supports the body weight in flexed position during walking. The knee is usually fully extended at heel strike and then begins to flex (average magnitude of 15 degrees) when foot is completely flat on the ground. The effects of the stance-phase knee flexion is to lower the apex of vertical trajectory of the COM via shortening of the leg resulting in some energy conservation. Saunders, J., Inman, V.,%DIFDELCMD < & %%% Eberhart, H. (1953). The major determinants in normal and pathological gait. American Journal of Bone and Joint Surgery, 35, 543\u2013558 But recent studies testing this third determinant of gait have reported varied results. It was found out that stance-phase knee flexion did not contribute to the reduction in vertical trajectory of COM. Kuo, A. D.,%DIFDELCMD < & %%% Donelan, J. M. (2010). Dynamic principles of gait and their clinical implications. Physical therapy, 90(2), 157. Furthermore, Gard and Childress (1997) indicated that maximum COM is reached at mid-stance when knee is slightly flexed, depicting minor reduction of the maximum height of the COM by a few millimeters. Gard, S. A.,%DIFDELCMD < & %%% Childress, D. S. (1997). The effect of pelvic list on the vertical displacement of the trunk during normal walking. Gait%DIFDELCMD < & %%% Posture, 5(3), 233-238. Foot and ankle motions: Saunders et al. showed relationship between angular displacement and motions of foot, ankle and knee. Saunders, J., Inman, V.,%DIFDELCMD < & %%% Eberhart, H. (1953). The major determinants in normal and pathological gait. American Journal of Bone and Joint Surgery, 35, 543\u2013558. This results in two intersecting arcs of rotation at the foot during stance phase at heel contact and heel rise. At heel contact the COM reaches its lowest point of downward displacement when the foot is dorsiflexed and the knee joint fully extended in order for the extremity to be at its maximum length. The ankle rockers at heel strike and mid-stance leads to decrease COM displacement through the shortening of the leg. Studies by Kerrigan et al. (2001) and Gard & Childress (1997) have showed the major role played by heel rise in reducing the COM vertical displacement .11 .Kerrigan, D. C. , Della Croce, U. , Marciello, M. , Riley, P. O. (2000). A refined view of the determinants of gait: significance of heel rise . Archives of Physical Medicine and Rehabilitation, 81(8), 1077-1080.Gard, S. A.,%DIFDELCMD < & %%% Childress, D. S. (1997). The effect of pelvic list on the vertical displacement of the trunk during normal walking. Gait%DIFDELCMD < & %%% Posture, 5(3), 233-238 Knee motion: The motion of the knee are related to those of the ankle and foot motions and results in the reduction of COM vertical displacement. Therefore, an immobile knee or ankle could lead to increases in COM displacement and energy cost. Lateral pelvic displacement: In this key gait feature, the displacement of the COM is realized by the lateral shift of the pelvis or by relative adduction of the hip. Correction of disproportionate lateral displacement of the pelvis is mediated by the effect of tibiofemoral angle, and relative adduction of the hip, which results in reduction in vertical COM displacement Saunders, J., Inman, V.,%DIFDELCMD < & %%% Eberhart, H. (1953). The major determinants in normal and pathological gait. American Journal of Bone and Joint Surgery, 35, 543\u2013558.%DIFDELCMD < [%%% Saunders et al., 1953 . It is clear that these kinematic features play a critical role in ensuring efficiency in normal gait. But there may be the need for further extensive testing or validation of each of the key determinants of gait.", "after_revision": "A gait is a pattern of limb movements made during locomotion. Human gaits are the various ways in which a human can move, either naturally or as a result of specialized training. Human gait is defined as bipedal, biphasic forward propulsion of the center of gravity of the human body, in which there are alternate sinuous movements of different segments of the body with least expenditure of energy. Different gait patterns are characterized by differences in limb-movement patterns, overall velocity, forces, kinetic and potential energy cycles, and changes in the contact with the ground. Some researchers classify foot strike by the initial center of pressure; this is mostly applicable to shod running (running while wearing shoes). Lieberman, Daniel. Running Before the Modern Running Shoe. Harvard University. Retrieved 2 December 2020. In this classification: a rearfoot strike (heel strike) has the initial center of pressure in the rear one-third of shoe length ; a midfoot strike is in the middle third ; a forefoot strike is in the front third . Typically, barefoot walking features heel or midfoot strike, while barefoot running features midfoot or forefoot strike. Barefoot running rarely features heel strike because the impact can be painful, the human heel pad not absorbing much of the force of impact. By contrast, 75\\% of runners wearing modern running shoes heel strike; Lieberman, Daniel. Modern Running Shoes & Heel Striking . Harvard University. Retrieved 2 December 2020. running shoes are characterized by a padded sole, stiff soles and arch support, and slope down from a more-padded heel to a less-padded forefoot. The cause of this change in gait in shoe running is unknown, but Lieberman noted that there is correlation between the foot-landing style and exposure to shoes. In some individuals, the gait pattern is largely unchanged \u2013 the leg position and foot position are identical in barefoot and shoe running \u2013 but the wedge shape of the padding moves the point of impact back from the forefoot to the midfoot. In other cases, it is conjectured that the padding of the heel softens the impact and results in runners modifying their gait to contact further back in the foot. A 2012 study involving Harvard University runners found that those who \"habitually rearfoot strike had approximately twice the rate of repetitive stress injuries than individuals who habitually forefoot strike\". Daoud, et al. \"Foot strike and injury rates in endurance runners: a retrospective study\". Medicine Science in Sports& Exercise. This was the first study that investigated the link between foot strike and injury rates. However, earlier studies have shown that smaller collision forces were generated when running forefoot strike compared to rear-foot strike. This may protect the ankle joints and lower limbs from some of the impact-related injuries experienced by rear-foot strikers. Lieberman, et al . \" Foot strike patterns and collision forces in habitually barefoot versus shod runners \" In a 2017 article called \"Foot Strike Pattern in Children During Shod-Unshod Running \" , over 700 children aged 6\u201316 were observed using multiple video recording devices, to study their foot strike patterns and neutral support. The authors also investigated the effects of shod and unshod conditions and sex. The results showed that most foot patterns such as foot rotation and the rearfoot strike were similar in boys and girls at the same ages. Control of gait by the nervous system The central nervous system regulates gait in a highly ordered fashion through a combination of voluntary and automatic processes. The basic locomotor pattern is an automatic process that results from rhythmic reciprocal bursts of flexor and extensor activity. This rhythmic firing is the result of Central Pattern Generators ( CPGs), which operate regardless of whether a motion is voluntary or not. CPGs do not require sensory input to be sustained. However, studies have identified that gait patterns in deafferented or immobilized animals are more simplistic than in neurologically intact animals. (Deafferentation and immobilization are experimental preparations of animals to study neural control. Deafferentation involves transecting the dorsal roots of the spinal cord that innervate the animal's limbs , which impedes transmission of sensory information while keeping motor innervation of muscles intact. In contrast, immobilization involves injecting an acetylcholine inhibitor , which impedes the transmission of motor signals while sensory input is unaffected.) The complexity of gait arises from the need to adapt to expected and unexpected changes in the environment (e.g. , changes in walking surface or obstacles). Visual, vestibular, proprioceptive, and tactile sensory information provides important feedback related to gait and permits the adjustment of a person's posture or foot placement depending on situational requirements. When approaching an obstacle, visual information about the size and location of the object is used to adapt the stepping pattern. These adjustments involve change in the trajectory of leg movement and the associated postural adjustments required to maintain their balance. Vestibular information provides information about position and movement of the head as the person moves through their environment. Proprioceptors in the joints and muscles provide information about joint position and changes in muscle length. Skin receptors, referred to as exteroceptors, provide additional tactile information about stimuli that a limb encounters. Gait in humans is difficult to study due to ethical concerns. Therefore, the majority of what is known about gait regulation in humans is ascertained from studies involving other animals or is demonstrated in humans using functional magnetic resonance imaging during the mental imagery of gait. These studies have provided the field with several important discoveries. Locomotor centers %DIFDELCMD < %DIFDELCMD < %%% There are three specific centers within the brain that regulate gait: Regulation by the cerebral cortex %DIFDELCMD < %DIFDELCMD < %%% Sensory input from multiple areas of the cerebral cortex, such as the visual cortex, vestibular cortex, and the primary sensory cortex, is required for skilled locomotor tasks. This information is integrated and transmitted to the supplementary motor area (SMA) and premotor area of the cerebral cortex where motor programs are created for intentional limb movement and anticipatory postural adjustments. For example, the motor cortex uses visual information to increase the precision of stepping movements. When approaching an obstacle, an individual will make adjustments to their stepping pattern based on visual input regarding the size and location of the obstacle. The primary motor cortex is responsible for the voluntary control for the contralateral leg while the SMA is linked to postural control. Regulation by the spinal cord Spinal reflexes not only generate the rhythm of locomotion through CPGs but also ensure postural stability during gait.Purves D, Augustine GJ, Fitzpatrick D, et al., editors (2001). \"Flexion Reflex Pathways\", in Neuroscience, 2nd ed. Sunderland, MA : Sinauer Associates . There are multiple pathways within the spinal cord which play a role in regulating gait, including the role of reciprocal inhibition and stretch reflexes to produce alternating stepping patterns. A stretch reflex occurs when a muscle is stretched and then contracts protectively while opposing muscle groups relax. An example of this during gait occurs when the weight-bearing leg nears the end of the stance phase. At this point the hip extends and the hip flexors are elongated. Muscle spindles within the hip flexors detect this stretch and trigger muscle contraction of the hip flexors required for the initiation of the swing phase of gait. However, Golgi tendon organs in the extensor muscles also send signals related to the amount of weight being supported through the stance leg to ensure that limb flexion does not occur until the leg is adequately unweighted and the majority of weight has been transferred to the opposite leg. Information from the spinal cord is transmitted for higher order processing to supraspinal structures via spinothalamic, spinoreticular, and spinocerebellar tracts. Walk Walking involves having at least one foot in contact with the ground at all times. There is also a period of time within the gait cycle where both feet are simultaneously in contact with the ground. When a foot is lifted off the ground, that limb is in the \"swing phase\" of gait. When a foot is in contact with the ground, that limb is in the \"stance phase\" of gait. A mature walking pattern is characterized by the gait cycle being approximately 60\\% stance phase, 40\\% swing phase. Initiation of gait is a voluntary process that involves a preparatory postural adjustment where the center of mass is moved forward and laterally prior to unweighting one leg. The center of mass is only within a person's base of support when both feet are in contact with the ground (known as double limb stance). When only one foot is in contact with the ground ( single limb stance), the center of mass is in front of that foot and moving towards the leg that is in the swing phase. In order to investigate the gait strategies likely to be favored at low gravity , a series of predictive, computational simulations of gait are performed using a physiological model of the musculoskeletal system, without assuming any particular type of gait . A computationally efficient optimization strategy is utilized allowing for multiple simulations. The results reveal skipping as more efficient and less fatiguing than walking or running and suggest the existence of a walk-skip rather than a walk-run transition at low gravity. Children gait pattern Time and distance parameters of gait patterns are dependent on a child's age. Different age leads to different step speed and timing. Arm swinging slows when the speed of walking is increased. Height of a child plays a significant role in stride distance and speed. The taller the child is the longer the stride will be and the further the step will be. Gait patterns are velocity and age dependent. For example, as age increased so did velocity. Meanwhile, as age increases, cadence (rate at which someone walks that is measured in steps per minute) of the gait pattern decreased. Physical attributes such as height, weight, and even head circumference can also play a role in gait patterns in children. Environmental and emotional status also play a role in with speed, velocity, and gait patterns that a child uses. Besides, children of different genders will have different rates of gait development. Significant developmental changes in gait parameters such as stride time, swing time, and cadence occur in a child's gait two months after the onset of independent walking, possibly due to an increase in postural control at this point of development. Gender differences There are gender differences in human gait patterns: females tend to walk with smaller step width and more pelvic movement. %DIFDELCMD < [%%% Gait analysis generally takes gender into consideration. %DIFDELCMD < [%%% Gender differences in human gait can be explored using a demonstration created by the BioMotion Laboratory at York University in Toronto. For the same distance, walking with a natural heel-first gait burns roughly 70\\% less energy than running. Differences of this magnitude are unusual in mammals. Kathyrn Knight of the Journal of Experimental Biology summarizes the findings of one study: \"Landing heel first also allows us to transfer more energy from one step to the next to improve our efficiency, while placing the foot flat on the ground reduces the forces around the ankle (generated by the ground pushing against us), which our muscles have to counteract.\" According to David Carrier of the University of Utah, who helped perform the study, \"Given the great distances hunter-gatherers travel, it is not surprising that humans are economical walkers.\" %DIFDELCMD < [%%% Key determinants of gait A normal gait pattern depends on a range of biomechanical features, controlled by the nervous system for increased energy conservation and balance.Kuo, A. D. ; Donelan, J. M. (2010). \" Dynamic principles of gait and their clinical implications \". Physical Therapy , 90(2), 157. These biomechanical features of normal gait have been defined as key determinants of gait. It is therefore necessary for the refined neurological control and integration of these gait features for accuracy and precision with less energy expenditure. As a result, any abnormality of the neuromusculoskeletal system may lead to abnormality in gait and increased energy expenditure. The six kinematics or determinants of gait were introduced by Saunders et al. in 1953, Saunders, J. ; Inman, V. ; Eberhart, H. (1953). \" The major determinants in normal and pathological gait \" . American Journal of Bone and Joint Surgery, 35, 543\u2013558. and have been widely embraced with various refinements. Gard, S. A. ; Childress, D. S. (2001). \" What determines the vertical displacement of the body during normal walking? \" Journal of Prosthetics and Orthotics, 13(3), 64\u201367. McMahon, T. A. (1984). Muscles, reflexes, and locomotion. Princeton, NJ: Princeton University Press.Perry , J. (1992). Gait analysis: Normal and pathological function. Thorofare, NJ: Slack, Inc.Rose, J. ; Gamble, J. ( eds.) (1994). Human walking (2nd ed.). Baltimore, MD: Williams & Wilkins.Whittle, M. W. (1996). Gait analysis: An introduction (2nd ed.). Oxford, UK: Butterworth-Heinemann. Recent studies have suggested that the first three determinants might contribute less to reducing the vertical displacement of the center of mass (COM). These determinants of gait are known to ensure economical locomotion, by the reduction in vertical center of mass (COM) excursion leading to reduction in metabolic energy. It is therefore suggested that the precise control of these determinants of gait Inman, V. T. ; Ralston, H. J. ; Todd, F. (1981). Human walking. Williams & Wilkins. leads to increased energy conservation. These kinematic features of gait are integrated or coordinated in order to ensure a circular arc trajectory of the COM, as theory proposed as the 'compass gait (straight knee)'. %DIFDELCMD < & %%% The theory underlying the determinants run contrary to that of the 'inverted pendulum' theory with a static stance leg acting as a pendulum that prescribes an arc.Cavagna, G. ; Saibene, F. ; Margaria, R. (1963). \" External work in walking \" . Journal of Applied Physiology, 18, 1\u20139.Cavagna, G. A. ; Margaria, R. (1966). \" Mechanics of walking \" . Journal of Applied Physiology, 21, 271\u2013 278.Kuo , A. D. (2007). \" The six determinants of gait and the inverted pendulum analogy: A dynamic walking perspective \". Human Movement Science , 26(4), 617\u2013656. The six determinants of gaits and their effects on COM displacement and energy conservation are described below in chronological order : Pelvic rotation: This kinematic feature of gait operates under the theory of compass gait model.Della Croce, U. ; Riley, P. O. ; Lelas, J. L. ; Kerrigan, D. C. (2001). \" A refined view of the determinants of gait \" . Gait & Posture , 14(2), 79\u201384. In this model, the pelvis rotates side to side during normal gait. In effect, it aids in the progression of the contralateral side through reduced hip flexion and extension. Its effect on the reduction of metabolic energy and the increased energy conservation is through the reduction of vertical COM displacement. This notion of reduction of metabolic cost may be disputed by a study done by Gard and Childress (1997),Gard, S. A. ; Childress, D. S. (1997). \" The effect of pelvic list on the vertical displacement of the trunk during normal walking \" . Gait & Posture, 5(3), 233\u2013238. who stated that there may be minimal effect of pelvic rotation on vertical COM displacement. Furthermore, other studies have found pelvic rotation to have little effect on the smoothing of COM trajectory. %DIFDELCMD < & %%% Pelvic rotation has been shown to account for about 12\\% reduction in the total COM vertical displacement. %DIFDELCMD < & %%% %DIFDELCMD < & %%% Pelvic tilt/Obliquity: Normal gait results in tilting of the swing phase side, in relation to the control by the stance side hip abductors. As a consequence, there is the neutralization of raising of COM during the transition from hip flexion to extension. Its effect on the reduction of metabolic energy and the increased energy conservation is via the reduction of vertical COM trajectory or peak form compass gait model. Pelvic obliquity's effects on reduction of vertical displacement of COM has been examined and been shown to only reduce vertical displacement of COM by at most, only 2\u20134 mm. %DIFDELCMD < & %%% %DIFDELCMD < & %%% Knee flexion at stance phase: The knee usually supports the body weight in flexed position during walking. The knee is usually fully extended at heel strike and then begins to flex (average magnitude of 15 degrees) when foot is completely flat on the ground. The effects of the stance-phase knee flexion is to lower the apex of vertical trajectory of the COM via shortening of the leg resulting in some energy conservation. %DIFDELCMD < & %%% But recent studies testing this third determinant of gait have reported varied results. It was found out that stance-phase knee flexion did not contribute to the reduction in vertical trajectory of COM. %DIFDELCMD < & %%% Furthermore, Gard and Childress (1997) indicated that maximum COM is reached at mid-stance when knee is slightly flexed, depicting minor reduction of the maximum height of the COM by a few millimeters. %DIFDELCMD < & %%% %DIFDELCMD < & %%% Foot and ankle motions: Saunders et al. showed relationship between angular displacement and motions of foot, ankle and knee. %DIFDELCMD < & %%% This results in two intersecting arcs of rotation at the foot during stance phase at heel contact and heel rise. At heel contact the COM reaches its lowest point of downward displacement when the foot is dorsiflexed and the knee joint fully extended in order for the extremity to be at its maximum length. The ankle rockers at heel strike and mid-stance leads to decrease COM displacement through the shortening of the leg. Studies by Kerrigan et al. (2001) and Gard & Childress (1997) have showed the major role played by heel rise in reducing the COM vertical displacement .Kerrigan, D. C. ; Della Croce, U. ; Marciello, M. ; Riley, P. O. (2000). \" A refined view of the determinants of gait: significance of heel rise \" . Archives of Physical Medicine and Rehabilitation, 81(8), %DIFDELCMD < & %%% %DIFDELCMD < & %%% 1077\u20131080. Knee motion: The motion of the knee are related to those of the ankle and foot motions and results in the reduction of COM vertical displacement. Therefore, an immobile knee or ankle could lead to increases in COM displacement and energy cost. Lateral pelvic displacement: In this key gait feature, the displacement of the COM is realized by the lateral shift of the pelvis or by relative adduction of the hip. Correction of disproportionate lateral displacement of the pelvis is mediated by the effect of tibiofemoral angle, and relative adduction of the hip, which results in reduction in vertical COM displacement %DIFDELCMD < & %%% %DIFDELCMD < [%%% . It is clear that these kinematic features play a critical role in ensuring efficiency in normal gait. But there may be the need for further extensive testing or validation of each of the key determinants of gait.", "edit_actions": [{"type": "D", "before": "\"Gait\". Dictionary.com, Dictionary.com, www.dictionary.com/browse/gait.", "after": null, "start_char_pos": 62, "end_char_pos": 133}, {"type": "D", "before": "Minetti, A.E. \"The biomechanics of skipping gaits: a third locomotion paradigm?\". NIH.gov. Consiglio Nazionale delle Ricerche. PMC 1689187 .", "after": null, "start_char_pos": 251, "end_char_pos": 391}, {"type": "A", "before": null, "after": "the", "start_char_pos": 457, "end_char_pos": 457}, {"type": "R", "before": "5", "after": "Lieberman, Daniel. Running Before the Modern Running Shoe. Harvard University. Retrieved 2 December 2020.", "start_char_pos": 947, "end_char_pos": 948}, {"type": "R", "before": "third of the shoe (rear 1/3 of shoe length)", "after": "one-third of shoe length", "start_char_pos": 1052, "end_char_pos": 1095}, {"type": "D", "before": "(middle 1/3 of shoe length)", "after": null, "start_char_pos": 1138, "end_char_pos": 1165}, {"type": "D", "before": "(front 1/3 of shoe length)", "after": null, "start_char_pos": 1208, "end_char_pos": 1234}, {"type": "A", "before": null, "after": "Lieberman, Daniel.", "start_char_pos": 1571, "end_char_pos": 1571}, {"type": "R", "before": ", Daniel Lieberman,", "after": ".", "start_char_pos": 1609, "end_char_pos": 1628}, {"type": "R", "before": "running shoes being", "after": "Retrieved 2 December 2020. running shoes are", "start_char_pos": 1649, "end_char_pos": 1668}, {"type": "R", "before": "sloping", "after": "slope", "start_char_pos": 1735, "end_char_pos": 1742}, {"type": "R", "before": "more padded", "after": "more-padded", "start_char_pos": 1755, "end_char_pos": 1766}, {"type": "R", "before": "less padded", "after": "less-padded", "start_char_pos": 1777, "end_char_pos": 1788}, {"type": "R", "before": "Liebermann", "after": "Lieberman", "start_char_pos": 1864, "end_char_pos": 1874}, {"type": "R", "before": "moving", "after": "moves", "start_char_pos": 2137, "end_char_pos": 2143}, {"type": "R", "before": "resulting in runner", "after": "results in runners", "start_char_pos": 2289, "end_char_pos": 2308}, {"type": "A", "before": null, "after": "Daoud, et al. \"Foot strike and injury rates in endurance runners: a retrospective study\". Medicine", "start_char_pos": 2579, "end_char_pos": 2579}, {"type": "A", "before": null, "after": "Science in Sports", "start_char_pos": 2580, "end_char_pos": 2580}, {"type": "A", "before": null, "after": "Exercise.", "start_char_pos": 2582, "end_char_pos": 2582}, {"type": "R", "before": "Knight, Kathryn", "after": "Lieberman, et al", "start_char_pos": 2939, "end_char_pos": 2954}, {"type": "R", "before": "Human's heel first gait is efficient for walking", "after": "Foot strike patterns and collision forces in habitually barefoot versus shod runners", "start_char_pos": 2959, "end_char_pos": 3007}, {"type": "D", "before": ". Journal of Experimental Biology. Retrieved 4 November 2015", "after": null, "start_char_pos": 3010, "end_char_pos": 3070}, {"type": "D", "before": ",", "after": null, "start_char_pos": 3156, "end_char_pos": 3157}, {"type": "R", "before": "there was a study done where", "after": ",", "start_char_pos": 3160, "end_char_pos": 3188}, {"type": "R", "before": "were observed from the ages of", "after": "aged", "start_char_pos": 3207, "end_char_pos": 3237}, {"type": "R", "before": "to see", "after": "were observed using multiple video recording devices, to study", "start_char_pos": 3243, "end_char_pos": 3249}, {"type": "R", "before": "They also wanted to see what outside factors to", "after": "The authors also investigated the effects of", "start_char_pos": 3298, "end_char_pos": 3345}, {"type": "D", "before": "This study used multiple video recording devices to get their results.", "after": null, "start_char_pos": 3382, "end_char_pos": 3452}, {"type": "R", "before": "CPG)", "after": "CPGs),", "start_char_pos": 3956, "end_char_pos": 3960}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4437, "end_char_pos": 4437}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4613, "end_char_pos": 4613}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4811, "end_char_pos": 4811}, {"type": "A", "before": null, "after": "regulation", "start_char_pos": 5825, "end_char_pos": 5825}, {"type": "R", "before": "cordPurves", "after": "cord Spinal reflexes not only generate the rhythm of locomotion through CPGs but also ensure postural stability during gait.Purves", "start_char_pos": 7085, "end_char_pos": 7095}, {"type": "R", "before": ". Neuroscience.", "after": "(2001). \"Flexion Reflex Pathways\", in Neuroscience,", "start_char_pos": 7144, "end_char_pos": 7159}, {"type": "R", "before": "edition. Sunderland(MA)", "after": "ed. Sunderland, MA", "start_char_pos": 7164, "end_char_pos": 7187}, {"type": "R", "before": "; 2001. Flexion Reflex Pathways. Available from: URL Spinal reflexes not only generate the rhythm of locomotion through CPGs but also ensure postural stability during gait.", "after": ".", "start_char_pos": 7209, "end_char_pos": 7381}, {"type": "R", "before": "stretch reflexes and non-reciprocal inhibition : in postural control and inhibition and", "after": "reciprocal inhibition and", "start_char_pos": 7493, "end_char_pos": 7580}, {"type": "R", "before": "swing phase", "after": "\"swing phase\"", "start_char_pos": 8810, "end_char_pos": 8821}, {"type": "R", "before": "stance phase", "after": "\"stance phase\"", "start_char_pos": 8894, "end_char_pos": 8906}, {"type": "D", "before": "approximately 60\\% of", "after": null, "start_char_pos": 8961, "end_char_pos": 8982}, {"type": "R", "before": "(i.e. from one initial contact of a foot to the next initial contact of the same foot) being the stance phaseof gait", "after": "being approximately 60\\% stance phase,", "start_char_pos": 8998, "end_char_pos": 9114}, {"type": "D", "before": "known as", "after": null, "start_char_pos": 9498, "end_char_pos": 9506}, {"type": "A", "before": null, "after": ",", "start_char_pos": 9707, "end_char_pos": 9707}, {"type": "R", "before": "; a", "after": ". A", "start_char_pos": 9884, "end_char_pos": 9887}, {"type": "D", "before": "Harada, T., Miyai, I., Suzuki, M. et al. Exp Brain Res (2009) 193: 445. URL", "after": null, "start_char_pos": 10319, "end_char_pos": 10394}, {"type": "D", "before": "13", "after": null, "start_char_pos": 11578, "end_char_pos": 11580}, {"type": "D", "before": "14", "after": null, "start_char_pos": 11656, "end_char_pos": 11658}, {"type": "D", "before": "Biomotion Laboratory at Queen's University , in Kingston, Ontario, Canada.", "after": null, "start_char_pos": 11745, "end_char_pos": 11819}, {"type": "R", "before": "15", "after": "BioMotion Laboratory at York University in Toronto.", "start_char_pos": 11820, "end_char_pos": 11822}, {"type": "D", "before": "16", "after": null, "start_char_pos": 12563, "end_char_pos": 12565}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 12749, "end_char_pos": 12750}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 12774, "end_char_pos": 12774}, {"type": "R", "before": ". Physical therapy", "after": "\". Physical Therapy", "start_char_pos": 12834, "end_char_pos": 12852}, {"type": "R", "before": "157", "after": "157.", "start_char_pos": 12862, "end_char_pos": 12865}, {"type": "D", "before": "determinants of gait have been long-lasting theories of gait that have been extensively studied biomechanically. These six", "after": null, "start_char_pos": 13254, "end_char_pos": 13376}, {"type": "R", "before": "established", "after": "introduced", "start_char_pos": 13417, "end_char_pos": 13428}, {"type": "R", "before": "1953.", "after": "1953,", "start_char_pos": 13451, "end_char_pos": 13456}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 13470, "end_char_pos": 13471}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 13482, "end_char_pos": 13483}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 13505, "end_char_pos": 13505}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 13561, "end_char_pos": 13561}, {"type": "R", "before": "Due to the extensive studies in these determinants, they have gone through various refinementsover the past five decade, which have led to either authentication, acceptance or disputation of each of the six determinants of gait.The six determinants of gait have been predominantly embraced as a fact for half a decade since its proposition,", "after": "and have been widely embraced with various refinements.", "start_char_pos": 13621, "end_char_pos": 13961}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 13974, "end_char_pos": 13975}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 14001, "end_char_pos": 14001}, {"type": "R", "before": ". JPO:", "after": "\"", "start_char_pos": 14079, "end_char_pos": 14085}, {"type": "R", "before": "64-67. and have made appearances in various literature,", "after": "64\u201367.", "start_char_pos": 14131, "end_char_pos": 14186}, {"type": "R", "before": "PressPerry", "after": "Press.Perry", "start_char_pos": 14281, "end_char_pos": 14291}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 14389, "end_char_pos": 14390}, {"type": "R", "before": "Eds.) .", "after": "eds.)", "start_char_pos": 14404, "end_char_pos": 14411}, {"type": "R", "before": "but without extensive testing. Albeit, recent studies have depicted that ,", "after": "Recent studies have suggested that", "start_char_pos": 14579, "end_char_pos": 14653}, {"type": "R", "before": "actually contribute marginally or far", "after": "contribute", "start_char_pos": 14689, "end_char_pos": 14726}, {"type": "D", "before": "Kuo, A. D.,", "after": null, "start_char_pos": 14869, "end_char_pos": 14880}, {"type": "D", "before": "Donelan, J. M. (2010). Dynamic principles of gait and their clinical implications. Physical therapy, 90(2), 157", "after": null, "start_char_pos": 14881, "end_char_pos": 14992}, {"type": "D", "before": ", also referred to as kinematic features", "after": null, "start_char_pos": 15168, "end_char_pos": 15208}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 15230, "end_char_pos": 15231}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 15247, "end_char_pos": 15248}, {"type": "D", "before": "Cavagna, G., Saibene, F.,", "after": null, "start_char_pos": 15519, "end_char_pos": 15544}, {"type": "D", "before": "Margaria, R. (1963). External work in walking. Journal of Applied Physiology, 18, 1\u20139. Cavagna, G. A.,", "after": null, "start_char_pos": 15545, "end_char_pos": 15647}, {"type": "D", "before": "Margaria, R. (1966). Mechanics of walking. Journal of Applied Physiology, 21, 271\u2013278", "after": null, "start_char_pos": 15666, "end_char_pos": 15751}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 15927, "end_char_pos": 15928}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 15941, "end_char_pos": 15942}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 15964, "end_char_pos": 15964}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 15990, "end_char_pos": 15990}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 16047, "end_char_pos": 16048}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 16070, "end_char_pos": 16070}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 16092, "end_char_pos": 16092}, {"type": "R", "before": "278Kuo", "after": "278.Kuo", "start_char_pos": 16135, "end_char_pos": 16141}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 16158, "end_char_pos": 16158}, {"type": "R", "before": ". Human movement science", "after": "\". Human Movement Science", "start_char_pos": 16253, "end_char_pos": 16277}, {"type": "R", "before": "617-656.", "after": "617\u2013656.", "start_char_pos": 16287, "end_char_pos": 16295}, {"type": "D", "before": "are", "after": null, "start_char_pos": 16431, "end_char_pos": 16434}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 16549, "end_char_pos": 16550}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 16564, "end_char_pos": 16565}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 16579, "end_char_pos": 16580}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 16605, "end_char_pos": 16605}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 16649, "end_char_pos": 16649}, {"type": "R", "before": "posture", "after": "Posture", "start_char_pos": 16659, "end_char_pos": 16666}, {"type": "R", "before": "79-84.", "after": "79\u201384.", "start_char_pos": 16676, "end_char_pos": 16682}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 17114, "end_char_pos": 17115}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 17141, "end_char_pos": 17141}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 17232, "end_char_pos": 17232}, {"type": "R", "before": "233-238", "after": "233\u2013238.", "start_char_pos": 17257, "end_char_pos": 17264}, {"type": "D", "before": "Kuo, A. D.,", "after": null, "start_char_pos": 17470, "end_char_pos": 17481}, {"type": "R", "before": "Donelan, J. M. (2010). Dynamic principles of gait and their clinical implications. Physical therapy, 90(2), 157 Actually pelvic rotations", "after": "Pelvic rotation", "start_char_pos": 17500, "end_char_pos": 17637}, {"type": "R", "before": "accounted", "after": "account for", "start_char_pos": 17656, "end_char_pos": 17665}, {"type": "D", "before": "Della Croce, U., Riley, P. O., Lelas, J. L.,", "after": null, "start_char_pos": 17727, "end_char_pos": 17771}, {"type": "D", "before": "Kerrigan, D. C. (2001). A refined view of the determinants of gait. Gait", "after": null, "start_char_pos": 17790, "end_char_pos": 17862}, {"type": "D", "before": "posture, 14(2), 79-84.", "after": null, "start_char_pos": 17881, "end_char_pos": 17903}, {"type": "D", "before": "Gard, S. A.,", "after": null, "start_char_pos": 18502, "end_char_pos": 18514}, {"type": "D", "before": "Childress, D. S. (1997). The effect of pelvic list on the vertical displacement of the trunk during normal walking. Gait", "after": null, "start_char_pos": 18533, "end_char_pos": 18653}, {"type": "D", "before": "Posture, 5(3), 233-238", "after": null, "start_char_pos": 18672, "end_char_pos": 18694}, {"type": "D", "before": "Saunders, J., Inman, V.,", "after": null, "start_char_pos": 19119, "end_char_pos": 19143}, {"type": "D", "before": "Eberhart, H. (1953). The major determinants in normal and pathological gait. American Journal of Bone and Joint Surgery, 35, 543\u2013558", "after": null, "start_char_pos": 19162, "end_char_pos": 19294}, {"type": "D", "before": "Kuo, A. D.,", "after": null, "start_char_pos": 19498, "end_char_pos": 19509}, {"type": "D", "before": "Donelan, J. M. (2010). Dynamic principles of gait and their clinical implications. Physical therapy, 90(2), 157.", "after": null, "start_char_pos": 19528, "end_char_pos": 19640}, {"type": "D", "before": "Gard, S. A.,", "after": null, "start_char_pos": 19843, "end_char_pos": 19855}, {"type": "D", "before": "Childress, D. S. (1997). The effect of pelvic list on the vertical displacement of the trunk during normal walking. Gait", "after": null, "start_char_pos": 19874, "end_char_pos": 19994}, {"type": "D", "before": "Posture, 5(3), 233-238.", "after": null, "start_char_pos": 20013, "end_char_pos": 20036}, {"type": "D", "before": "Saunders, J., Inman, V.,", "after": null, "start_char_pos": 20163, "end_char_pos": 20187}, {"type": "D", "before": "Eberhart, H. (1953). The major determinants in normal and pathological gait. American Journal of Bone and Joint Surgery, 35, 543\u2013558.", "after": null, "start_char_pos": 20206, "end_char_pos": 20339}, {"type": "D", "before": ".11", "after": null, "start_char_pos": 20915, "end_char_pos": 20918}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 20936, "end_char_pos": 20937}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 20954, "end_char_pos": 20955}, {"type": "R", "before": ",", "after": ";", "start_char_pos": 20970, "end_char_pos": 20971}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 20993, "end_char_pos": 20993}, {"type": "A", "before": null, "after": "\"", "start_char_pos": 21064, "end_char_pos": 21064}, {"type": "D", "before": "1077-1080.Gard, S. A.,", "after": null, "start_char_pos": 21124, "end_char_pos": 21146}, {"type": "D", "before": "Childress, D. S. (1997). The effect of pelvic list on the vertical displacement of the trunk during normal walking. Gait", "after": null, "start_char_pos": 21165, "end_char_pos": 21285}, {"type": "R", "before": "Posture, 5(3), 233-238", "after": "1077\u20131080.", "start_char_pos": 21304, "end_char_pos": 21326}, {"type": "D", "before": "Saunders, J., Inman, V.,", "after": null, "start_char_pos": 21944, "end_char_pos": 21968}, {"type": "D", "before": "Eberhart, H. (1953). The major determinants in normal and pathological gait. American Journal of Bone and Joint Surgery, 35, 543\u2013558.", "after": null, "start_char_pos": 21987, "end_char_pos": 22120}, {"type": "D", "before": "Saunders et al., 1953", "after": null, "start_char_pos": 22138, "end_char_pos": 22159}], "sents_char_pos": [0, 61, 133, 250, 377, 609, 800, 873, 946, 1097, 1167, 1236, 1357, 1499, 1570, 1798, 1960, 2202, 2366, 2578, 2672, 2812, 2938, 3044, 3297, 3381, 3452, 3590, 3758, 3888, 4026, 4077, 4227, 4329, 4538, 4697, 4853, 5071, 5201, 5344, 5475, 5587, 5710, 5772, 5995, 6069, 6428, 6656, 6759, 6922, 7059, 7159, 7172, 7210, 7241, 7381, 7639, 7758, 7859, 7924, 8089, 8382, 8547, 8635, 8751, 8830, 8915, 9132, 9308, 9446, 9626, 9885, 9982, 10162, 10262, 10318, 10359, 10453, 10526, 10614, 10660, 10707, 10842, 10965, 11079, 11165, 11416, 11819, 11929, 11983, 12350, 12738, 12773, 12956, 13115, 13245, 13366, 13456, 13504, 13563, 13620, 13849, 14000, 14209, 14244, 14304, 14353, 14419, 14444, 14479, 14501, 14543, 14609, 14798, 14903, 14963, 15094, 15265, 15280, 15340, 15518, 15565, 15591, 15686, 15708, 15915, 15963, 16032, 16069, 16157, 16254, 16295, 16533, 16604, 16682, 16749, 16856, 16997, 17140, 17357, 17469, 17522, 17582, 17726, 17813, 17857, 17903, 18043, 18160, 18327, 18557, 18648, 18801, 18953, 19118, 19182, 19238, 19382, 19550, 19610, 19640, 19842, 19898, 19989, 20036, 20162, 20226, 20282, 20339, 20452, 20645, 20763, 20992, 21066, 21134, 21189, 21280, 21472, 21570, 21737, 22007, 22063, 22120, 22263]}
+{"doc_id": "9003687", "revision_depth": "1", "before_revision": "Antonio Tirol Carpio (; born October 26, 1949) is a former Associate Justice and, for four instances, acting Chief Justice of the Supreme Court of the Philippines. He was sworn in as member of the High Court by President Gloria Macapagal Arroyo on October 26, 2001, until his retirement on October 26, 2019. Profile Born in Davao City, Justice Carpio finished grade school and high school at the Ateneo de Davao University. He obtained his undergraduate degree in Economics from the Ateneo de Manila University in 1970 and his law degree from the University of the Philippines College of Law at UP Diliman where he graduated valedictorian and cum laude in 1975. He ranked sixth with a rating of 85.70\\% in the 1975 Philippine Bar Examination. Fresh out of law school, Justice Carpio went into private practice and founded the Carpio Villaraza and Cruz law firm.see He soon emerged as one of the more prominent and successful legal practitioners in the country. Justice Carpio also taught tax law, corporate law, and negotiable instruments law at the UP College of Law from 1983 to 1992. In 1992, he joined the administration of President Fidel Ramos as Chief Presidential Legal Counsel of the Office of the President. As such he worked for major reforms in telecommunications, shipping, civil aviation, and insurance industries. During the presidency of Joseph Estrada, Carpio returned to private practice and penned a regular opinion column published in the Philippine Daily Inquirer. Justice Carpio has received the Presidential Medal of Merit from then-President Fidel Ramos for his \"distinguished and exemplary service\" to the Republic , the Outstanding Achievement in Law Award from the Ateneo de Manila Alumni Association, and an honorary Doctorate of Laws from the Ateneo de Davao University. The University of the Philippines Alumni Association named him Outstanding U.P. Alumni in Public International Law in 2015 and the Most Distinguished Alumni in 2017. Being the Senior Associate Justice , he assumed the post as the Acting Chief Justice on May 29, 2012, until the President appoints a new chief justice. He assumed the post after his predecessor, Renato Corona was convicted by the Senate Impeachment court for his failure to disclose in his Statement of Assets, Liabilities, and Net Worth, dollar accounts that led to his removal in office, a penalty authorized by the 1987 Constitution. He assumed the post again on March 1, 2018, as Chief Justice Maria Lourdes Sereno filed an indefinite leave in the midst of impeachment proceedings against her. Justice Carpio chaired the Court 's Second Division and the Senate Electoral Tribunal. He also headed the High Court's Committee on the Revision of the Rules of Court. Justice Carpio's personal advocacy is \"to protect and preserve Philippine territorial and maritime sovereignty specifically in the West Philippine Sea.\" referring to an area of the South China Sea claimed by the Philippines.Introduction of Lecturer for the Antiquarian Map Exhibit, Atty. Stephanie V. Gomez-Somera, 21 February 2015 Lopez Museum and Library In his speech 'Grand Theft of the Global Commons', Justice Carpio called \"...the fishery Regulations of Hainan a grand theft of the global commons in the South China Sea.\" He also maintains that \"The Philippines is fighting a legal battle not only for itself but also for all mankind. A victory for the Philippines is a victory for all States, coastal and landlocked, that China has shut out of the global commons in the South China Sea.\" In 2015, the Philippine Department of Foreign Affairs sponsored Justice Carpio on a world lecture tour on the South China Sea dispute. Justice Carpio presented the Philippines' historical and legal case on the dispute before think tanks and universities in 30 cities covering 17 countries. In May 2017, Justice Carpio published an eBook titled South China Sea Dispute: Philippine Sovereign Rights and Jurisdiction in the West Philippine Sea\"]. It is a collation of his over 140 lectures and speeches \"intended to convince the Chinese people that the nine-dashed line has no legal or historical basis.\" The eBook \"explains in layman\u2019s language the South China Sea dispute from A to Z.\"", "after_revision": "Antonio Tirol Carpio (; born October 26, 1949) is a former associate justice and, for four instances, acting chief justice of the Supreme Court of the Philippines. He was sworn in as member of the High Court by President Gloria Macapagal Arroyo on October 26, 2001, and served until his retirement on October 26, 2019. Profile Born in Davao City, Carpio finished his elementary and secondary education at the Ateneo de Davao University. He obtained his undergraduate degree in Economics from the Ateneo de Manila University in 1970 and his law degree from the University of the Philippines College of Law at UP Diliman where he graduated valedictorian and cum laude in 1975. He ranked sixth with a rating of 85.70\\% in the 1975 Philippine Bar Examination. After law school, Carpio went into private practice and founded the Carpio Villaraza and Cruz law firm.see He soon emerged as one of the more prominent and successful legal practitioners in the country. Carpio also taught tax law, corporate law, and negotiable instruments law at the UP College of Law from 1983 to 1992. In 1992, he joined the administration of President Fidel Ramos as chief presidential legal counsel of the Office of the President. As such , he worked for major reforms in telecommunications, shipping, civil aviation, and insurance industries. During the presidency of Joseph Estrada, Carpio returned to private practice and penned a regular opinion column published in the Philippine Daily Inquirer. Carpio received the Presidential Medal of Merit from President Fidel Ramos in 1998 for his \"distinguished and exemplary service\" to the country , the Outstanding Achievement in Law Award from the Ateneo de Manila Alumni Association, and an honorary Doctorate of Laws from the Ateneo de Davao University. The University of the Philippines Alumni Association named him Outstanding U.P. Alumni in Public International Law in 2015 and the Most Distinguished Alumni in 2017. Being the senior associate justice , he assumed the post of acting chief justice on May 29, 2012, until the president appointed a new chief justice. He assumed the post after his predecessor, Renato Corona , was convicted by the Senate impeachment court for his failure to disclose in his Statement of Assets, Liabilities, and Net Worth, dollar accounts that led to his removal in office, a penalty authorized by the 1987 Constitution. He assumed the post again on March 1, 2018, as Chief Justice Maria Lourdes Sereno filed an indefinite leave in the midst of impeachment proceedings against her. Carpio chaired the court 's Second Division and the Senate Electoral Tribunal. He also headed the High Court's Committee on the Revision of the Rules of Court. Carpio's personal advocacy is \"to protect and preserve Philippine territorial and maritime sovereignty specifically in the West Philippine Sea.\" referring to an area of the South China Sea claimed by the Philippines.Introduction of Lecturer for the Antiquarian Map Exhibit, Atty. Stephanie V. Gomez-Somera, 21 February 2015 Lopez Museum and Library In his speech 'Grand Theft of the Global Commons', Carpio called \"...the fishery Regulations of Hainan a grand theft of the global commons in the South China Sea.\" He also maintains that \"The Philippines is fighting a legal battle not only for itself but also for all mankind. A victory for the Philippines is a victory for all States, coastal and landlocked, that China has shut out of the global commons in the South China Sea.\" In 2015, the Philippine Department of Foreign Affairs sponsored Carpio on a world lecture tour on the South China Sea dispute. Carpio presented the Philippines' historical and legal case on the dispute before think tanks and universities in 30 cities covering 17 countries. In May 2017, Carpio published an eBook titled South China Sea Dispute: Philippine Sovereign Rights and Jurisdiction in the West Philippine Sea\"]. It is a collation of his over 140 lectures and speeches \"intended to convince the Chinese people that the nine-dashed line has no legal or historical basis.\" The eBook \"explains in layman\u2019s language the South China Sea dispute from A to Z.\"", "edit_actions": [{"type": "R", "before": "Associate Justice", "after": "associate justice", "start_char_pos": 59, "end_char_pos": 76}, {"type": "R", "before": "Chief Justice", "after": "chief justice", "start_char_pos": 109, "end_char_pos": 122}, {"type": "A", "before": null, "after": "and served", "start_char_pos": 266, "end_char_pos": 266}, {"type": "R", "before": "Justice Carpio finished grade school and high school", "after": "Carpio finished his elementary and secondary education", "start_char_pos": 337, "end_char_pos": 389}, {"type": "R", "before": "Fresh out of", "after": "After", "start_char_pos": 744, "end_char_pos": 756}, {"type": "D", "before": "Justice", "after": null, "start_char_pos": 769, "end_char_pos": 776}, {"type": "D", "before": "Justice", "after": null, "start_char_pos": 962, "end_char_pos": 969}, {"type": "R", "before": "Chief Presidential Legal Counsel", "after": "chief presidential legal counsel", "start_char_pos": 1154, "end_char_pos": 1186}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1227, "end_char_pos": 1227}, {"type": "R", "before": "Justice Carpio has", "after": "Carpio", "start_char_pos": 1488, "end_char_pos": 1506}, {"type": "R", "before": "then-President Fidel Ramos", "after": "President Fidel Ramos in 1998", "start_char_pos": 1553, "end_char_pos": 1579}, {"type": "R", "before": "Republic", "after": "country", "start_char_pos": 1633, "end_char_pos": 1641}, {"type": "R", "before": "Senior Associate Justice", "after": "senior associate justice", "start_char_pos": 1978, "end_char_pos": 2002}, {"type": "R", "before": "as the Acting Chief Justice", "after": "of acting chief justice", "start_char_pos": 2025, "end_char_pos": 2052}, {"type": "R", "before": "President appoints", "after": "president appointed", "start_char_pos": 2080, "end_char_pos": 2098}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2177, "end_char_pos": 2177}, {"type": "R", "before": "Impeachment", "after": "impeachment", "start_char_pos": 2206, "end_char_pos": 2217}, {"type": "D", "before": "Justice", "after": null, "start_char_pos": 2567, "end_char_pos": 2574}, {"type": "R", "before": "Court", "after": "court", "start_char_pos": 2594, "end_char_pos": 2599}, {"type": "D", "before": "Justice", "after": null, "start_char_pos": 2735, "end_char_pos": 2742}, {"type": "D", "before": "Justice", "after": null, "start_char_pos": 3143, "end_char_pos": 3150}, {"type": "D", "before": "Justice", "after": null, "start_char_pos": 3595, "end_char_pos": 3602}, {"type": "D", "before": "Justice", "after": null, "start_char_pos": 3666, "end_char_pos": 3673}, {"type": "D", "before": "Justice", "after": null, "start_char_pos": 3834, "end_char_pos": 3841}], "sents_char_pos": [0, 23, 163, 308, 424, 662, 743, 961, 1087, 1218, 1330, 1487, 1801, 1967, 2119, 2405, 2566, 2653, 2734, 2959, 3022, 3263, 3376, 3530, 3665, 3820, 3974, 4132]}
+{"doc_id": "9058", "revision_depth": "1", "before_revision": "The European influence in Afghanistan refers to political, social, and mostly imperialistic influence several European nations and colonial powers have had on the historical development of Afghanistan . In 1834 Dost Mohammad defeated an invasion by the former ruler, Shuja Shah Durrani, but his absence from Kabul gave the Sikhs the opportunity to expand westward. Ranjit Singh's forces moved from Peshawar into territory ruled directly by Kabul. In 1836 Dost Mohammad's forces, under the command of his son Akbar Khan, defeated the Sikhs at the Battle of Jamrud, a post fifteen kilometres west of Peshawar. This was a pyrrhic victory and they failed to fully dislodge the Sikhs from Jamrud. The Afghan leader did not follow up this triumph by retaking Peshawar, however, but instead contacted Lord Auckland, the new British governor general in British India, for help in dealing with the Sikhs. With this letter , Dost Mohammad formally set the stage for British intervention in Afghanistan. At the heart of the Great Game lay the willingness of Britain and Russia to subdue, subvert, or subjugate the small independent states that lay between Russia and British India . The British became the major power in the Indian subcontinent after the Treaty of Paris (1763) and began to show interest in Afghanistan as early as their 1809 treaty with Shuja Shah Durrani. It was the threat of the expanding Russian Empire beginning to push for an advantage in the Afghanistan region that placed pressure on British India, in what became known as the \"Great Game\" . The Great Game set in motion the confrontation of the British and Russian empires, whose spheres of influence moved steadily closer to one another until they met in Afghanistan. It also involved Britain's repeated attempts to impose a puppet government in Kabul. The remainder of the 19th century saw greater European involvement in Afghanistan and her surrounding territories and heightened conflict among the ambitious local rulers as Afghanistan's fate played out globally. The d\u00e9b\u00e2cle of the Afghan civil war left a vacuum in the Hindu Kush area that concerned the British, who were well aware of the many times in history it had been employed as the invasion route to South Asia. In the early decades of the 19th century, it became clear to the British that the major threat to their interests in India would not come from the fragmented Afghan empire, the Iranians, or the French, but from the Russians, who had already begun a steady advance southward from the Caucasus winning decisive wars against the Ottoman Turks and Qajar Persians. At the same time, the Russians feared permanent British occupation in Central Asia as the British encroached northward, taking the Punjab, Sindh, and Kashmir ; later to become Pakistan. The British viewed Russia's absorption of the Caucasus, the Kyrgyz and Turkmen lands, the Khanate of Khiva, and the Emirate of Bukhara with equal suspicion as a threat to their interests in the Asian subcontinent. 150px|Prince Akbar Khan, son of Dost Mohammad Khan. The British demanded that Dost Mohammad sever all contact with the Iranians and Russians, remove Vitkevich from Kabul, surrender all claims to Peshawar, and respect Peshawar's independence as well as that of Kandahar, which was under the control of his brothers at the time. In return, the British government intimated that it would ask Ranjit Singh to reconcile with the Afghans. When Auckland refused to put the agreement in writing, Dost Mohammad turned his back on the British and began negotiations with Vitkevich. In 1838 Auckland, Ranjit Singh, and Shuja signed an agreement stating that Shuja would regain control of Kabul and Kandahar with the help of the British and Sikhs; he would accept Sikh rule of the former Afghan provinces already controlled by Ranjit Singh, and that Herat would remain independent. In practice, the plan replaced Dost Mohammad with a British figurehead whose autonomy would be as limited as that of other Indian princes . 150px|Shah Shujah became the last Durrani ruler, who first reigned between 1803 and 1809, and again from 1839 to 1842. To justify his plan , the Governor-General of India Lord Auckland issued the Simla Manifesto in October 1838, setting forth the necessary reasons for British intervention in Afghanistan. The manifesto stated that in order to ensure the welfare of India, the British must have a trustworthy ally on India's western frontier. The British pretense that their troops were merely supporting Shah Shujah's small army in retaking what was once his throne fooled no one. Although the Simla Manifesto stated that British troops would be withdrawn as soon as Shuja was installed in Kabul, Shuja's rule depended entirely on British arms to suppress rebellion and on British funds to buy the support of tribal chiefs. The British denied that they were invading Afghanistan, instead claiming they were merely supporting its legitimate Shuja government \"against foreign interference and factious opposition\". Battle of Ghazni In November 1841 insurrection and massacre flared up in Kabul. The British vacillated and disagreed and were beleaguered in their inadequate cantonments. The British negotiated with the most influential sirdars, cut off as they were by winter and insurgent tribes from any hope of relief. Mohammad Akbar Khan, son of the captive Dost Mohammad, arrived in Kabul and became effective leader of the sirdars. At a conference with them Sir William MacNaghten was killed, but in spite of this, the sirdars' demands were agreed to by the British and they withdrew. During the withdrawal they were attacked by Ghilzai tribesmen and in running battles through the snowbound passes nearly the entire column of 4,500 troops and 12,000 camp followers were killed. Of the British only one, Dr. William Brydon, reached Jalalabad, while a few others were captured. Afghan forces loyal to Akbar Khan besieged the remaining British contingents at Kandahar, Ghazni and Jalalabad. Ghazni fell, but the other garrisons held out, and with the help of reinforcements from India their besiegers were defeated. While preparations were under way for a renewed advance on Kabul, the new Governor-General Lord Ellenborough ordered British forces to leave Afghanistan after securing the release of the prisoners from Kabul and taking reprisals. The forces from Kandahar and Jalalabad again defeated Akbar Khan, retook Ghazni and Kabul, inflicted widespread devastation and rescued the prisoners before withdrawing through the Khyber Pass. In the years immediately following the First Anglo-Afghan War, and especially after the Indian rebellion of 1857 against the British in India, Liberal Party governments in London took a political view of Afghanistan as a buffer state. By the time Sher Ali had established control in Kabul in 1868, he found the British ready to support his regime with arms and funds, but nothing more. Over the next ten years, relations between the Afghan ruler and Britain deteriorated steadily. The Afghan ruler was worried about the southward encroachment of Russia, which by 1873 had taken over the lands of the khan, or ruler, of Khiva. Sher Ali sent an envoy seeking British advice and support. The previous year the British had signed an agreement with the Russians in which the latter agreed to respect the northern boundaries of Afghanistan and to view the territories of the Afghan Emir as outside their sphere of influence. The British, however, refused to give any assurances to the disappointed Sher Ali. After tension between Russia and Britain in Europe ended with the June 1878 Congress of Berlin, Russia turned its attention to Central Asia. That same summer, Russia sent an uninvited diplomatic mission to Kabul. Sher Ali tried, but failed, to keep them out. Russian envoys arrived in Kabul on 22 July 1878 and on 14 August, the British demanded that Sher Ali accept a British mission too. upDurban Maidan of Sherpur Cantonment in 1879 near Kabul. upBritish and allied forces at Kandahar after the 1880 Battle of Kandahar. The amir not only refused to receive a British mission but threatened to stop it if it were dispatched. Lord Lytton, the viceroy, ordered a diplomatic mission to set out for Kabul in September 1878 but the mission was turned back as it approached the eastern entrance of the Khyber Pass, triggering the Second Anglo-Afghan War. A British force of about 40,000 fighting men was distributed into military columns which penetrated Afghanistan at three different points. An alarmed Sher Ali attempted to appeal in person to the tsar for assistance, but unable to do so, he returned to Mazari Sharif, where he died on 21 February 1879. With British forces occupying much of the country, Sher Ali's son and successor, Mohammad Yaqub Khan, signed the Treaty of Gandamak in May 1879 to prevent a British invasion of the rest of the country . According to this agreement and in return for an annual subsidy and vague assurances of assistance in case of foreign aggression, Yaqub relinquished control of Afghan foreign affairs to the British. British representatives were installed in Kabul and other locations, British control was extended to the Khyber and Michni Passes, and Afghanistan ceded various frontier areas and Quetta to Britain. The British army then withdrew. Soon afterwards, an uprising in Kabul led to the slaughter of Britain's Resident in Kabul, Sir Pierre Cavagnari and his guards and staff on 3 September 1879, provoking the second phase of the Second Afghan War. Major General Sir Frederick Roberts led the Kabul Field Force over the Shutargardan Pass into central Afghanistan, defeated the Afghan Army at Char Asiab on 6 October 1879 and occupied Kabul. Ghazi Mohammad Jan Khan Wardak staged an uprising and attacked British forces near Kabul in the Siege of the Sherpur Cantonment in December 1879, but his defeat there resulted in the collapse of this rebellion. Yaqub Khan, suspected of complicity in the massacre of Cavagnari and his staff, was obliged to abdicate. The British considered a number of possible political settlements, including partitioning Afghanistan between multiple rulers or placing Yaqub's brother Ayub Khan on the throne, but ultimately decided to install his cousin Abdur Rahman Khan as emir instead. Ayub Khan, who had been serving as governor of Herat, rose in revolt, defeated a British detachment at the Battle of Maiwand in July 1880 and besieged Kandahar. Roberts then led the main British force from Kabul and decisively defeated Ayub Khan in September at the Battle of Kandahar, bringing his rebellion to an end. Abdur Rahman had confirmed the Treaty of Gandamak, leaving the British in control of the territories ceded by Yaqub Khan and ensuring British control of Afghanistan's foreign policy in exchange for protection and a subsidy. Abandoning the provocative policy of maintaining a British resident in Kabul, but having achieved all their other objectives, the British withdrew. The Pashtuns battled and conquered the Uzbeks and forced them into the status of ruled people who were discriminated against. Out of anti-Russian strategic interests, the British assisted the Afghan conquest of the Uzbek Khanates, giving weapons to the Afghans and backing the Pashtun colonization of northern Afghanistan , which involved sending massive amounts of Pashtun colonists onto Uzbek land ; British literature from the period demonized the Uzbeks . Amanullah came to power just as the entente between Russia and Britain broke down following the Russian Revolution of 1917. Once again Afghanistan provided a stage on which the great powers played out their schemes against one another. Keen to modernise his country and free it from foreign domination , Amanullah, sought to shore up his powerbase. Amidst intrigue in the Afghan court, and political and civil unrest in India, he sought to divert attention from the internal divisions of Afghanistan and unite all faction behind him by attacking the British.Barthorp, p. 151 British forces used airpower to shock the Afghans , and the King's home was directly attacked in what is the first case of aerial bombardment in Afghanistan's history. The attacks played a key role in forcing an armistice but brought an angry rebuke from King Amanullah. He wrote: \"It is a matter of great regret that the throwing of bombs by zeppelins on London was denounced as a most savage act and the bombardment of places of worship and sacred spots was considered a most abominable operation. While we now see with our own eyes that such operations were a habit which is prevalent among all civilized people of the west\" Singer, pp. 192\u2013193 See also Imperialism in Asia Reforms of Amanullah Khan and civil war Aurora Nilsson", "after_revision": " European influence in Afghanistan has been present in the country since the Victorian era, when the competing imperial powers of Britain and Russia contested for control over Afghanistan as part of the Great Game . In 1834 Dost Mohammad defeated an invasion by the former ruler, Shuja Shah Durrani, but his absence from Kabul gave the Sikhs the opportunity to expand westward. Ranjit Singh's forces moved from Peshawar into territory ruled directly by Kabul. In 1836 Dost Mohammad's forces, under the command of his son Akbar Khan, defeated the Sikhs at the Battle of Jamrud, a post fifteen kilometres west of Peshawar. This was a pyrrhic victory and they failed to fully dislodge the Sikhs from Jamrud. The Afghan leader did not follow up this triumph by retaking Peshawar, however, but instead contacted Lord Auckland, the new British governor-general in British India, for help in dealing with the Sikhs. The letter marked the beginning of British influence in Afghanistan, and the subsequent Anglo-Russian struggle known as the Great Game . The British became the major European power in the Indian subcontinent after the 1763 Treaty of Paris and began to show interest in Afghanistan as early as their 1809 treaty with Shuja Shah Durrani. It was the threat of the expanding Russian Empire beginning to push for an advantage in the Afghanistan region that placed pressure on British India, in what became known as the Great Game . The Great Game set in motion the confrontation of the British and Russian empires, whose spheres of influence moved steadily closer to one another until they met in Afghanistan. It also involved repeated attempts by the British to establish a puppet government in Kabul. The remainder of the 19th century saw greater European involvement in Afghanistan and her surrounding territories and heightened conflict among the ambitious local rulers as Afghanistan's fate played out globally. The d\u00e9b\u00e2cle of the Afghan civil war left a vacuum in the Hindu Kush area that concerned the British, who were well aware of the many times in history it had been employed as an invasion route to South Asia. In the early decades of the 19th century, it became clear to the British that the major threat to their interests in India would not come from the fragmented Afghan empire, the Iranians, or the French, but from the Russians, who had already begun a steady advance southward from the Caucasus winning decisive wars against the Ottomans and Persians. At the same time, the Russians feared the possibility a permanent British foothold in Central Asia as the British expanded northward, incorporating the Punjab, Sindh, and Kashmir into their empire ; later to become Pakistan. The British viewed Russia's absorption of the Caucasus, the Kyrgyz and Turkmen lands, the Khanate of Khiva, and the Emirate of Bukhara with equal suspicion as a threat to their interests in the Indian subcontinent. 150px|Prince Akbar Khan, son of Dost Mohammad Khan. The British demanded that Dost Mohammad sever all contact with the Iranians and Russians, remove Vitkevich from Kabul, surrender all claims to Peshawar, and respect Peshawar's independence as well as that of Kandahar, which was under the control of his brothers at the time. In return, the British government intimated that it would ask Ranjit Singh to reconcile with the Afghans. When Auckland refused to put the agreement in writing, Dost Mohammad suspended negotiations the British and began negotiations with Vitkevich. In 1838 Auckland, Ranjit Singh, and Shuja signed an agreement stating that Shuja would regain control of Kabul and Kandahar with the help of the British and Sikhs; he would accept Sikh rule of the former Afghan provinces already controlled by Ranjit Singh, and that Herat would remain independent. In practice, the plan replaced Dost Mohammad with a British figurehead whose autonomy would be similar to the princes who ruled over the princely states in British India . 150px|Shah Shujah became the last Durrani ruler, who first reigned between 1803 and 1809, and again from 1839 to 1842. As a prelude to his invasion plans , the Governor-General of India Lord Auckland issued the Simla Manifesto in October 1838, setting forth the necessary reasons for British intervention in Afghanistan. The manifesto stated that in order to ensure the welfare of India, the British must have a trustworthy ally on India's western frontier. The British claim that their troops were merely supporting Shah Shujah's small army in retaking what was once his throne fooled no one. Although the Simla Manifesto stated that British troops would be withdrawn as soon as Shuja was installed in Kabul, Shuja's rule depended entirely on British support to suppress rebellion and on British funds to buy the support of tribal chiefs. The British denied that they were invading Afghanistan, instead claiming they were supporting its legitimate Shuja government \"against foreign interference and factious opposition\". Battle of Ghazni In November 1841 insurrection and massacre flared up in Kabul. The British vacillated and disagreed and were beleaguered in their inadequate cantonments. The British negotiated with the most influential sirdars, cut off as they were by winter and insurgent tribes from any hope of relief. Mohammad Akbar Khan, son of the captive Dost Mohammad, arrived in Kabul and became effective leader of the sirdars. At a conference with them Sir William MacNaghten was killed, but in spite of this, the sirdars' demands were agreed to by the British and they withdrew. During the withdrawal they were attacked by Ghilzai tribesmen and in running battles through the snowbound passes nearly the entire column of 4,500 troops and 12,000 camp followers were killed. Of the British only one, Dr. William Brydon, reached Jalalabad, while a few others were captured. Afghan forces loyal to Akbar Khan besieged the remaining British contingents at Kandahar, Ghazni and Jalalabad. Ghazni fell, but the other garrisons held out, and with the help of reinforcements from India their besiegers were defeated. While preparations were under way for a renewed advance on Kabul, the new Governor-General Lord Ellenborough ordered British forces to leave Afghanistan after securing the release of the prisoners from Kabul and taking reprisals. The forces from Kandahar and Jalalabad again defeated Akbar Khan, retook and sacked Ghazni and Kabul, rescuing the prisoners before withdrawing through the Khyber Pass. In the years immediately following the First Anglo-Afghan War, and especially after the Indian Rebellion of 1857 against the British in India, Liberal Party governments in London took a political view of Afghanistan as a buffer state. By the time Sher Ali had established control in Kabul in 1868, he found the British ready to support his regime with arms and funds, but nothing more. Over the next ten years, relations between the Afghan ruler and Britain deteriorated steadily. The Afghan ruler was worried about the southward encroachment of Russia, which by 1873 had taken over the lands of the khan, or ruler, of Khiva. Sher Ali sent an envoy seeking British advice and support. The previous year the British had signed an agreement with the Russians in which the latter agreed to respect the northern boundaries of Afghanistan and to view the territories of the Afghan Emir as outside their sphere of influence. The British, however, refused to give any assurances to the disappointed Sher Ali. After tension between Russia and Britain in Europe ended with the June 1878 Congress of Berlin, Russia turned its attention to Central Asia. That same summer, Russia sent an uninvited diplomatic mission to Kabul. Sher Ali tried, but failed, to keep them out. Russian envoys arrived in Kabul on 22 July 1878 and on 14 August, the British demanded that Sher Ali accept a British mission too. upDurban Maidan of Sherpur Cantonment in 1879 near Kabul. upBritish and allied forces at Kandahar after the 1880 Battle of Kandahar. The amir not only refused to receive a British mission but threatened to stop it if it were dispatched. Lord Lytton, the viceroy, ordered a diplomatic mission to set out for Kabul in September 1878 but the mission was turned back as it approached the eastern entrance of the Khyber Pass, triggering the Second Anglo-Afghan War. A British force of about 40,000 fighting men was distributed into military columns which penetrated Afghanistan at three different points. An alarmed Sher Ali attempted to appeal in person to the Tsar for assistance, but unable to do so, he returned to Mazari Sharif, where he died on 21 February 1879. With British forces occupying much of the country, Sher Ali's son and successor, Mohammad Yaqub Khan, signed the Treaty of Gandamak in May 1879 in order to put a quick end to the conflict . According to this agreement and in return for an annual subsidy and vague assurances of assistance in case of foreign aggression, Yaqub relinquished control of Afghan foreign affairs to the British. British representatives were installed in Kabul and other locations, British control was extended to the Khyber and Michni Passes, and Afghanistan ceded various frontier areas and Quetta to Britain. The British forces then withdrew. Soon afterwards, an uprising in Kabul led to the killings of Britain's Resident in Kabul, Sir Pierre Cavagnari and his guards and staff on 3 September 1879, provoking the second phase of the Second Afghan War. Major General Sir Frederick Roberts led the Kabul Field Force over the Shutargardan Pass into central Afghanistan, defeated the Afghan Army at Char Asiab on 6 October 1879 and occupied Kabul. Ghazi Mohammad Jan Khan Wardak staged an uprising and attacked British forces near Kabul in the Siege of the Sherpur Cantonment in December 1879, but his defeat there resulted in the collapse of this rebellion. Yaqub Khan, suspected of complicity in the killings of Cavagnari and his staff, was obliged to abdicate. The British considered a number of possible political settlements, including partitioning Afghanistan between multiple rulers or placing Yaqub's brother Ayub Khan on the throne, but ultimately decided to install his cousin Abdur Rahman Khan as emir instead. Ayub Khan, who had been serving as governor of Herat, rose in revolt, defeated a British detachment at the Battle of Maiwand in July 1880 and besieged Kandahar. Roberts then led the main British force from Kabul and decisively defeated Ayub Khan in September at the Battle of Kandahar, bringing his rebellion to an end. Abdur Rahman had confirmed the Treaty of Gandamak, leaving the British in control of the territories ceded by Yaqub Khan and ensuring British control of Afghanistan's foreign policy in exchange for protection and a subsidy. Abandoning the provocative policy of maintaining a British resident in Kabul, but having achieved all their other objectives, the British withdrew. The Pashtuns battled and conquered the Uzbeks and forced them into the status of ruled people who were discriminated against. Out of anti-Russian strategic interests, the British assisted the Afghan conquest of the Uzbek Khanates, giving weapons to the Afghans and supporting the Afghan government's colonization of northern Afghanistan by Pashtuns , which involved sending massive amounts of Pashtun colonists onto Uzbek land . Amanullah came to power just as the entente between Russia and Britain broke down following the Russian Revolution of 1917. Once again Afghanistan provided a stage on which the great powers played out their schemes against one another. Keen to modernise his country and remove all foreign influence , Amanullah, sought to shore up his powerbase. Amidst intrigue in the Afghan court, and political and civil unrest in India, he sought to divert attention from the internal divisions of Afghanistan and unite all faction behind him by attacking the British.Barthorp, p. 151 British forces deployed air forces for the first time in the region , and the King's home was directly targeted in what is the first case of aerial bombardment in Afghanistan's history. The attacks played a key role in forcing an armistice but brought an angry rebuke from King Amanullah. He wrote: \"It is a matter of great regret that the throwing of bombs by zeppelins on London was denounced as a most savage act and the bombardment of places of worship and sacred spots was considered a most abominable operation. While we now see with our own eyes that such operations were a habit which is prevalent among all civilized people of the west\" . Singer, pp. 192\u2013193 See also Western imperialism in Asia Reforms of Amanullah Khan and civil war Aurora Nilsson", "edit_actions": [{"type": "D", "before": "The", "after": null, "start_char_pos": 0, "end_char_pos": 3}, {"type": "R", "before": "refers to political, social, and mostly imperialistic influence several European nations and colonial powers have had on the historical development of Afghanistan", "after": "has been present in the country since the Victorian era, when the competing imperial powers of Britain and Russia contested for control over Afghanistan as part of the Great Game", "start_char_pos": 38, "end_char_pos": 200}, {"type": "R", "before": "governor general", "after": "governor-general", "start_char_pos": 825, "end_char_pos": 841}, {"type": "R", "before": "With this letter , Dost Mohammad formally set the stage for British intervention in Afghanistan. At the heart of", "after": "The letter marked the beginning of British influence in Afghanistan, and the subsequent Anglo-Russian struggle known as", "start_char_pos": 896, "end_char_pos": 1008}, {"type": "D", "before": "lay the willingness of Britain and Russia to subdue, subvert, or subjugate the small independent states that lay between Russia and British India", "after": null, "start_char_pos": 1024, "end_char_pos": 1169}, {"type": "A", "before": null, "after": "European", "start_char_pos": 1201, "end_char_pos": 1201}, {"type": "A", "before": null, "after": "1763", "start_char_pos": 1245, "end_char_pos": 1245}, {"type": "D", "before": "(1763)", "after": null, "start_char_pos": 1262, "end_char_pos": 1268}, {"type": "R", "before": "\"Great Game\"", "after": "Great Game", "start_char_pos": 1544, "end_char_pos": 1556}, {"type": "R", "before": "Britain's repeated attempts to impose", "after": "repeated attempts by the British to establish", "start_char_pos": 1754, "end_char_pos": 1791}, {"type": "R", "before": "the", "after": "an", "start_char_pos": 2210, "end_char_pos": 2213}, {"type": "R", "before": "Ottoman Turks and Qajar", "after": "Ottomans and", "start_char_pos": 2570, "end_char_pos": 2593}, {"type": "R", "before": "permanent British occupation", "after": "the possibility a permanent British foothold", "start_char_pos": 2642, "end_char_pos": 2670}, {"type": "R", "before": "encroached northward, taking", "after": "expanded northward, incorporating", "start_char_pos": 2702, "end_char_pos": 2730}, {"type": "A", "before": null, "after": "into their empire", "start_char_pos": 2762, "end_char_pos": 2762}, {"type": "R", "before": "Asian", "after": "Indian", "start_char_pos": 2985, "end_char_pos": 2990}, {"type": "R", "before": "turned his back on", "after": "suspended negotiations", "start_char_pos": 3507, "end_char_pos": 3525}, {"type": "R", "before": "as limited as that of other Indian princes", "after": "similar to the princes who ruled over the princely states in British India", "start_char_pos": 3970, "end_char_pos": 4012}, {"type": "R", "before": "To justify his plan", "after": "As a prelude to his invasion plans", "start_char_pos": 4134, "end_char_pos": 4153}, {"type": "R", "before": "pretense", "after": "claim", "start_char_pos": 4470, "end_char_pos": 4478}, {"type": "R", "before": "arms", "after": "support", "start_char_pos": 4755, "end_char_pos": 4759}, {"type": "D", "before": "merely", "after": null, "start_char_pos": 4923, "end_char_pos": 4929}, {"type": "A", "before": null, "after": "and sacked", "start_char_pos": 6436, "end_char_pos": 6436}, {"type": "R", "before": "inflicted widespread devastation and rescued", "after": "rescuing", "start_char_pos": 6455, "end_char_pos": 6499}, {"type": "R", "before": "rebellion", "after": "Rebellion", "start_char_pos": 6653, "end_char_pos": 6662}, {"type": "R", "before": "tsar", "after": "Tsar", "start_char_pos": 8607, "end_char_pos": 8611}, {"type": "R", "before": "to prevent a British invasion of the rest of the country", "after": "in order to put a quick end to the conflict", "start_char_pos": 8858, "end_char_pos": 8914}, {"type": "R", "before": "army", "after": "forces", "start_char_pos": 9327, "end_char_pos": 9331}, {"type": "R", "before": "slaughter", "after": "killings", "start_char_pos": 9396, "end_char_pos": 9405}, {"type": "R", "before": "massacre", "after": "killings", "start_char_pos": 10004, "end_char_pos": 10012}, {"type": "R", "before": "backing the Pashtun", "after": "supporting the Afghan government's", "start_char_pos": 11281, "end_char_pos": 11300}, {"type": "A", "before": null, "after": "by Pashtuns", "start_char_pos": 11338, "end_char_pos": 11338}, {"type": "D", "before": "; British literature from the period demonized the Uzbeks", "after": null, "start_char_pos": 11417, "end_char_pos": 11474}, {"type": "R", "before": "free it from foreign domination", "after": "remove all foreign influence", "start_char_pos": 11747, "end_char_pos": 11778}, {"type": "R", "before": "used airpower to shock the Afghans", "after": "deployed air forces for the first time in the region", "start_char_pos": 12067, "end_char_pos": 12101}, {"type": "R", "before": "attacked", "after": "targeted", "start_char_pos": 12137, "end_char_pos": 12145}, {"type": "A", "before": null, "after": ".", "start_char_pos": 12680, "end_char_pos": 12680}, {"type": "R", "before": "Imperialism", "after": "Western imperialism", "start_char_pos": 12710, "end_char_pos": 12721}], "sents_char_pos": [0, 202, 364, 446, 607, 691, 895, 992, 1171, 1365, 1558, 1736, 1821, 2035, 2243, 2603, 2764, 2790, 3004, 3056, 3331, 3437, 3576, 3740, 3874, 4133, 4320, 4457, 4596, 4839, 5028, 5108, 5199, 5334, 5450, 5603, 5797, 5895, 6007, 6132, 6362, 6557, 6792, 6943, 7038, 7183, 7242, 7476, 7559, 7700, 7772, 7818, 8082, 8186, 8410, 8549, 8713, 8916, 9115, 9314, 9346, 9557, 9749, 9960, 10065, 10323, 10484, 10643, 10867, 11015, 11141, 11418, 11600, 11712, 11825, 12035, 12219, 12322, 12551]}
+{"doc_id": "91191", "revision_depth": "1", "before_revision": "Definitions Maintenance functions are often referred to as maintenance, repair and overhaul (MRO), and MRO is also used for maintenance, repair and operations. Over time, the terminology of maintenance and MRO has begun to become standardized. The United States Department of Defense uses the following definitions:Federal Standard 1037C and from MIL-STD-188 and from the Department of Defense Dictionary of Military and Associated Terms Any activity\u2014such as tests, measurements, replacements, adjustments, and repairs\u2014intended to retain or restore a functional unit in or to a specified state in which the unit can perform its required functions. All action taken to retain material in a serviceable condition or to restore it to serviceability. It includes inspections, testing, servicing, classification as to serviceability, repair, rebuilding, and reclamation. All supply and repair action taken to keep a force in condition to carry out its mission. The routine recurring work required to keep a facility (plant, building, structure, ground facility, utility system, or other real property) in such condition that it may be continuously used, at its original or designed capacity and efficiency for its intended purpose. This definition covers all activities for which aviation regulations require issuance of a maintenance release document (aircraft certificate of return to service \u2013 CRS).Road repair Preventive maintenance, also known as PM Corrective maintenance, where equipment is repaired or replaced after wear, malfunction or break down Predictive maintenance, which uses sensor data to monitor a system, then continuously evaluates it against historical trends to predict failure before it occurs Reinforcement The main goal behind PM is for the equipment to make it from one planned service to the next planned service without any failures caused by fatigue, neglect, or normal wear (preventable items), which Planned Maintenance and Condition Based Maintenance help to achieve by replacing worn components before they actually fail. Maintenance activities include partial or complete overhauls at specified periods, oil changes, lubrication, minor adjustments, and so on. In addition, workers can record equipment deterioration so they know to replace or repair worn parts before they cause system failure. The key factor as to when and why this work is being done is timing , and involves a service, resource or facility being unavailable. By contrast, condition-based maintenance is not directly based on equipment age. Planned maintenance is preplanned, and can be date-based, based on equipment running hours, or on distance travelled . Parts that have scheduled maintenance at fixed intervals, usually due to wearout or a fixed shelf life, are sometimes known as time-change interval , or TCI items. The main promise of predictive maintenance is to allow convenient scheduling of corrective maintenance , and to prevent unexpected equipment failures. Condition-based maintenance was introduced to try to maintain the correct equipment at the right time. CBM is based on using real-time data to prioritize and optimize maintenance resources. Observing the state of the system is known as condition monitoring. Such a system will determine the equipment's health, and act only when maintenance is actually necessary. Developments in recent years have allowed extensive instrumentation of equipment, and together with better tools for analyzing condition data, the maintenance personnel of today is more than ever able to decide what is the right time to perform maintenance on some piece of equipment. Ideally, condition-based maintenance will allow the maintenance personnel to do only the right things, minimizing spare parts cost, system downtime and time spent on maintenance. Also, the technical side of it is not always as simple. Even if some types of equipment can easily be observed by measuring simple values such as vibration (displacement, velocity or acceleration), temperature or pressure, it is not trivial to turn this measured data into actionable knowledge about the health of the equipment. Value potential As systems get more costly, and instrumentation and information systems tend to become cheaper and more reliable, CBM becomes an important tool for running a plant or factory in an optimal manner. Better operations will lead to lower production cost and lower use of resources. And lower use of resources may be one of the most important differentiators in a future where environmental issues become more important by the day. A more down to earth scenario where value can be created is by monitoring the health of your car motor. Rather than changing parts at predefined intervals, the car itself can tell you when something needs to be changed based on cheap and simple instrumentation. Corrective maintenance is a type of maintenance used for equipment after equipment break down or malfunction is often most expensive \u2013 not only can worn equipment damage other parts and cause multiple damage , but consequential repair and replacement costs and loss of revenues due to down time during overhaul can be significant. Rebuilding and resurfacing of equipment and infrastructure damaged by erosion and corrosion as part of corrective or preventive maintenance programmes involves conventional processes such as welding and metal flame spraying, as well as engineered solutions with thermoset polymeric materials.", "after_revision": "Definitions Maintenance functions are often referred to as maintenance, repair and overhaul (MRO), and MRO is also used for maintenance, repair , and operations. Over time, the terminology of maintenance and MRO has begun to become standardized. The United States Department of Defense uses the following definitions:Federal Standard 1037C and from MIL-STD-188 and from the Department of Defense Dictionary of Military and Associated Terms Any activity\u2014such as tests, measurements, replacements, adjustments, and repairs\u2014intended to retain or restore a functional unit in or to a specified state in which the unit can perform its required functions. All action is taken to retain material in a serviceable condition or to restore it to serviceability. It includes inspections, testing, servicing, classification as to serviceability, repair, rebuilding, and reclamation. All supply and repair action were taken to keep a force in condition to carry out its mission. The routine recurring work required to keep a facility (plant, building, structure, ground facility, utility system, or other real property) in such condition that it may be continuously used, at its original or designed capacity and efficiency for its intended purpose. This definition covers all activities for which aviation regulations require the issuance of a maintenance release document (aircraft certificate of return to service \u2013 CRS).Road repair Preventive maintenance, also known as PM Corrective maintenance, where equipment is repaired or replaced after wear, malfunction , or break down Predictive maintenance, which uses sensor data to monitor a system, then continuously evaluates it against historical trends to predict failure before it occurs Reinforcement The main goal behind PM is for the equipment to make it from one planned service to the next planned service without any failures caused by fatigue, neglect, or normal wear (preventable items), which Planned Maintenance and Condition Based Maintenance help to achieve by replacing worn components before they actually fail. Maintenance activities include partial or complete overhauls at specified periods, oil changes, lubrication, minor adjustments, and so on. In addition, workers can record equipment deterioration so they know to replace or repair worn parts before they cause a system failure. The key factor as to when and why this work is being done is timing and involves a service, resource , or facility being unavailable. By contrast, condition-based maintenance is not directly based on equipment age. Planned maintenance is preplanned, and can be date-based, based on equipment running hours, or on distance traveled . Parts that have scheduled maintenance at fixed intervals, usually due to wear out or a fixed shelf life, are sometimes known as time-change intervals , or TCI items. The main promise of predictive maintenance is to allow convenient scheduling of corrective maintenance and to prevent unexpected equipment failures. Condition-based maintenance was introduced to try to maintain the correct equipment at the right time. CBM is based on using real-time data to prioritize and optimize maintenance resources. Observing the state of the system is known as condition monitoring. Such a system will determine the equipment's health, and act only when maintenance is actually necessary. Developments in recent years have allowed extensive instrumentation of equipment, and together with better tools for analyzing condition data, the maintenance personnel of today is more than ever able to decide what is the right time to perform maintenance on some piece of equipment. Ideally, condition-based maintenance will allow the maintenance personnel to do only the right things, minimizing spare parts cost, system downtime , and time spent on maintenance. Also, the technical side of it is not always as simple. Even if some types of equipment can easily be observed by measuring simple values such as vibration (displacement, velocity , or acceleration), temperature , or pressure, it is not trivial to turn this measured data into actionable knowledge about the health of the equipment. Value potential As systems get more costly, and instrumentation and information systems tend to become cheaper and more reliable, CBM becomes an important tool for running a plant or factory in an optimal manner. Better operations will lead to lower production costs and lower use of resources. And lower use of resources may be one of the most important differentiators in the future where environmental issues become more important by the day. A more down-to-earth scenario where value can be created is by monitoring the health of your car motor. Rather than changing parts at predefined intervals, the car itself can tell you when something needs to be changed based on cheap and simple instrumentation. Corrective maintenance is a type of maintenance used for equipment after equipment breaks down or malfunction is often most expensive \u2013 not only can worn equipment damage other parts and cause multiple damages , but consequential repair and replacement costs and loss of revenues due to downtime during overhaul can be significant. Rebuilding and resurfacing of equipment and infrastructure damaged by erosion and corrosion as part of corrective or preventive maintenance programs involves conventional processes such as welding and metal flame spraying, as well as engineered solutions with thermoset polymeric materials.", "edit_actions": [{"type": "A", "before": null, "after": ",", "start_char_pos": 144, "end_char_pos": 144}, {"type": "A", "before": null, "after": "is", "start_char_pos": 660, "end_char_pos": 660}, {"type": "A", "before": null, "after": "were", "start_char_pos": 897, "end_char_pos": 897}, {"type": "A", "before": null, "after": "the", "start_char_pos": 1307, "end_char_pos": 1307}, {"type": "A", "before": null, "after": ",", "start_char_pos": 1542, "end_char_pos": 1542}, {"type": "A", "before": null, "after": "a", "start_char_pos": 2314, "end_char_pos": 2314}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2399, "end_char_pos": 2400}, {"type": "A", "before": null, "after": ",", "start_char_pos": 2434, "end_char_pos": 2434}, {"type": "R", "before": "travelled", "after": "traveled", "start_char_pos": 2654, "end_char_pos": 2663}, {"type": "R", "before": "wearout", "after": "wear out", "start_char_pos": 2739, "end_char_pos": 2746}, {"type": "R", "before": "interval", "after": "intervals", "start_char_pos": 2805, "end_char_pos": 2813}, {"type": "D", "before": ",", "after": null, "start_char_pos": 2933, "end_char_pos": 2934}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3778, "end_char_pos": 3778}, {"type": "A", "before": null, "after": ",", "start_char_pos": 3990, "end_char_pos": 3990}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4021, "end_char_pos": 4021}, {"type": "R", "before": "cost", "after": "costs", "start_char_pos": 4402, "end_char_pos": 4406}, {"type": "R", "before": "a", "after": "the", "start_char_pos": 4514, "end_char_pos": 4515}, {"type": "R", "before": "down to earth", "after": "down-to-earth", "start_char_pos": 4591, "end_char_pos": 4604}, {"type": "R", "before": "break", "after": "breaks", "start_char_pos": 4929, "end_char_pos": 4934}, {"type": "R", "before": "damage", "after": "damages", "start_char_pos": 5047, "end_char_pos": 5053}, {"type": "R", "before": "down time", "after": "downtime", "start_char_pos": 5131, "end_char_pos": 5140}, {"type": "R", "before": "programmes", "after": "programs", "start_char_pos": 5317, "end_char_pos": 5327}], "sents_char_pos": [0, 160, 244, 648, 748, 867, 958, 1229, 1401, 1436, 1477, 1529, 1580, 2055, 2194, 2330, 2465, 2546, 2829, 2980, 3083, 3170, 3238, 3344, 3629, 3809, 3865, 4140, 4353, 4434, 4583, 4687, 4845, 5176]}
+{"doc_id": "9812712", "revision_depth": "1", "before_revision": "History A photo from 1899 showing the use of a toothbrush. As long as 3000 B.C., the ancient Egyptians constructed crude toothbrushes from twigs and leaves to clean their teeth. Similarly, other cultures such as the Greeks, Romans, Arabs and Indians cleaned their teeth with twigs. Some would fray one end of the twig so that it could penetrate between the teeth more effectively. The Indian way of using tooth wood for brushing is presented by the Chinese Monk Yijing (635\u2013713 CE) when he describes the rules for Monks in his book:Li, R., 2000. Buddhist Monastic Traditions of Southern Asia: A Record of the Inner Law Sent Home from the South Seas (p. 198). Numata Center for Buddhist Translation and Research. \"Every day in the morning, a monk must chew a piece of tooth wood to brush his teeth and scrape his tongue, and this must be done in the proper way. Only after one has washed one's hands and mouth may one make salutations. Otherwise both the saluter and the saluted are at fault. In Sanskrit, the tooth wood is known as the dantakastha\u2014danta meaning tooth, and kastha, a piece of wood. It is twelve finger-widths in length. The shortest is not less than eight finger-widths long, resembling the little finger in size. Chew one end of the wood well for a long while and then brush the teeth with it.\" Modern day toothbrushing as a regular habit became prevalent in Europe from the end of the 17th century. The first mass-produced toothbrush was developed in England in 1780 by William Addis. In the United States, although toothbrushes were available at the end of the 19th century, the practice did not become widespread until after the Second World War, when US soldiers continued the toothbrushing that had been required during their military service.. Many serious problems result from not maintaining proper oral hygiene. Not brushing your teeth causes harmful bacteria to build upon your teeth and gums. Bacteria growing in your mouth can infect your gums and then can travel into your blood vessels. When gingivitis and periodontitis bacteria move into your blood vessels, it can cause inflation and damaged vessels. It clogs blood vessels, making it hard for blood to flow and can lead to blood clots, heart attacks, and strokes. Although the study at Harvard Medical School has observed \"remnants of oral bacteria within atherosclerotic blood vessels far from the mouth,\" there are other factors including gender, alcohol consumption, diabetes, exercise, smoking, and family history of heart problems that could increase the risk of coronary artery disease as well. These factors make it hard to judge how much not brushing your teeth elevates your risk of coronary heart disease, but there is a proven correlation between poor oral health and coronary heart disease. Another negative side effect of not brushing your teeth is halitosis or bad breath. According to The American Dental Association, not brushing properly allows remnants of food to collect on the teeth, gum line, and the surface of the tongue. Tooth plaque leads to gingivitis and periodontitis bacteria build-up, which produces bad smelling odors. Having bad breath is very common, and most people experience it, but not brushing your teeth makes you especially prone to bad odors . The ADA states that properly brushing your teeth to remove bacteria that contribute to oral odors will improve your oral hygiene and keep your breath smelling as fresh as possible. Toothbrushing guidelines Frequency A 2008 review cites studies from 1969-1973Brushing at least every 48 hours: that gum and tooth health were maintained if brushing removed dental plaque more often than every 48 hours, and gum inflammation happened if brushing happened at intervals longer than 48 hours. The 2008 review noted that toothbrushing can remove plaque up to one millimeter below the gum line, and that each person has a habitual brushing method, so more frequent brushing does not cover additional parts of the teeth or mouth. Neem, which is used by South Indians , in its full bloom, can aid in healing by keeping the area clean and disinfected. Dentists consider the extra abrasion of dentin from brushing multiple times per day to be insignificant, since modern toothpastes have Relative Dentin Abrasivity below 250. A 1997 study simulated six months of brushing with manual or sonic toothbrushes. Neither caused observable wear of tooth surface or fillings. Both caused a small loss of cement at the edge of gold inlays. A 2017 study put composite fillings on both sides of extracted teeth. The study simulated seven years of brushing one side of each tooth with a sonic toothbrush, then measured microleakage around the fillings. No leakage was found at any bond between filling and enamel. At bonds between filling and cementum, there was sometimes leakage, and it happened to the same extent on the brushed sides of teeth and the unbrushed sides. When asked to brush \"to the best of their abilities \" young adults brushed longer, but did not cover any additional parts of their mouths. They brushed especially long on the grinding surfaces of back teeth (occlusal), which are the prime location for cavities in young children, but not in adults, where sides are more prone to cavities. A 2005 review of dental studies found consensus that a thorough toothbrushing once a day is sufficient for maintaining oral health, and that most dentists recommended patients brush twice a day in the hope that more frequent brushing would clean more areas of the mouth. A 2018 review noted that toothbrushing is the most common preventive healthcare activity, but tooth and gum disease remain high, since lay people clean at most 40\\% of their tooth margins at the gum line. Videos show that even when asked to brush their best, they do not know how to clean effectively. Another 2018 study found that dental professionals did clean their teeth effectively. Proper technique Take some clean, freshwater, put it in you mouth and gargle a couple of times . Grab your toothbrush and clean it once with waterafter that you can start with brushing . Standard advice is that the front and backs of teeth should be brushed with the toothbrush at a 45 degree angle towards the gum line, moving the brush in a back and forth rolling motion that makes contact with the gum line and tooth. To brush the backs of the front teeth the brush should be held vertically to the tooth and moved in an up and down motion. The chewing surfaces of the teeth are brushed with a forward and back motion, with the toothbrush pointing straight at the tooth. Specialized advice for OralB rotating electric brushes is to follow the shape of each tooth and the gums, holding the brush against each tooth surface one at a time, for 1\u20132 seconds per tooth. Advice for Sonicare is to use a slight angle, so longer bristles can reach between the teeth, for 3-5 small circles in 1\u20132 seconds on each tooth. Bristles conform to tooth shapes. Toothbrushing before breakfast/dinner One study found that brushing immediately after an acidic meal (such as diet soda and common breakfast foods like orange juice, citrus fruit, dried fruit, bread, pastries) caused more damage to enamel and the dentin , compared to waiting 30 minutes. Flushing the acid away with water or dissolved baking soda could help reduce acid damage exacerbated by brushing. The same response was recommended for acid re-flux and other acidic meals. Researchers and dentists have concluded that brushing immediately after consuming acidic beverages should be avoided. Better to brush before breakfast or dinner. If brushing after a meal, wait at least a half hour after eating to prevent damage to your teeth. When you're looking to protect your tooth enamel, brushing right after you wake up in the morning is better than brushing your teeth after breakfast. If you have to brush your teeth after breakfast, try to wait between 30 and 60 minutes before you brush. Brushing in the morning , whenever you're able to do it, is still better than skipping the step of brushing your teeth at all. %DIFDELCMD < %DIFDELCMD < %%% Toothbrush Head of a toothbrush A toothbrush is an instrument used to clean teeth, consisting of a small brush on a handle. Toothpaste, often containing fluoride, is commonly added to a toothbrush to aid in cleaning. Toothbrushes come in manual and electric varieties. Although there is conflicting evidence as to which is more effective, most evidence points to electric toothbrushes with an oscillatory motion being more effective than manual toothbrushes, with toothbrushes lacking an oscillatory motion being equivalent. A 2014 Cochrane review found moderate evidence that electric toothbrushing reduce plaque and gingivitis more than the manual one . Overall, both manual and electric toothbrushes are effective, however, and it is often recommended that people use whichever one they feel comfortable with, determine what is affordable for them and will be more likely to regularly brush with. Toothbrushes are offered with varying textures of bristles, and come in many different forms and sizes. Most dentists recommend using a toothbrush labelled \"soft\", since firmer bristled toothbrushes can damage tooth enamel and irritate gums as indicated by the American Dental Association. Toothbrushes are often made from synthetic fibers, although natural toothbrushes are also known in many parts of the world. Those with dentures may also brush their teeth with traditional tooth brushes , specially made denture brushes or denture cleaners. The first mass produced toothbrush was made in England in 1780. While languishing in jail, William Addis decided to drill holes into a sheep's tibia, and pulled through the bristles of boar hair . Which he made into a toothbrushwhich gave him the idea to mass produce it on the outside under the name Wisdom Toothbrushes. They stayed family owned until 1996. Tooth powder (or 'toothpaste powder') is an alternative to toothpaste. It may be recommended for people with sensitive teeth. Tooth powder typically does not contain the chemical sodium lauryl sulphate which can be a skin irritant. The function of sodium lauryl sulphate is to form suds when teeth are brushed. It is a common chemical in toothpaste. Those with dentures may also use denture cleaner which can also come in powder format .", "after_revision": "History A photo from 1899 showing the use of a toothbrush. Teeth-cleaning twigs have long been used throughout human history. As long ago as 3000 B.C., the ancient Egyptians constructed crude toothbrushes from twigs and leaves to clean their teeth. Similarly, other cultures such as the Greeks, Romans, Arabs and Indians also cleaned their teeth with twigs. Some would fray one end of the twig so that it could penetrate between the teeth more effectively. The Indian method of using wood for brushing was presented by the Chinese Monk Yijing (635\u2013713 CE) when he described the rules for monks in his book:Li, R., 2000. Buddhist Monastic Traditions of Southern Asia: A Record of the Inner Law Sent Home from the South Seas (p. 198). Numata Center for Buddhist Translation and Research. Modern-day tooth brushing as a regular habit became prevalent in Europe from the end of the 17th century. The first mass-produced toothbrush was developed in England in 1780 by William Addis. In the United States, although toothbrushes were available at the end of the 19th century, the practice did not become widespread until after the Second World War, when US soldiers continued the tooth brushing that had been required during their military service.. Many serious problems result from not maintaining proper oral hygiene. Not brushing teeth causes harmful bacteria to build up on teeth and gums. Bacteria growing in the mouth can infect the gums and then can travel into blood vessels. When gingivitis and periodontitis bacteria move into the blood vessels, it can cause inflation and damaged vessels. It clogs blood vessels, making it hard for blood to flow and can lead to blood clots, heart attacks, and strokes. Although the study at Harvard Medical School has observed \"remnants of oral bacteria within atherosclerotic blood vessels far from the mouth,\" there are other factors including gender, alcohol consumption, diabetes, exercise, smoking, and family history of heart problems that could increase the risk of coronary artery disease as well. These factors make it hard to judge how much not brushing one's teeth elevates the risk of coronary heart disease, but there is a proven correlation between poor oral health and coronary heart disease. Another negative side effect of not brushing one's teeth is halitosis or bad breath. According to the American Dental Association, not brushing properly allows remnants of food to collect on the teeth, gum line, and the surface of the tongue. Tooth plaque leads to gingivitis and periodontitis bacteria build-up, which produces bad-smelling odors. Having bad breath is very common, and most people experience it, but not brushing one's teeth particularly increases the risk . The ADA states that properly brushing teeth to remove bacteria that contribute to oral odors will improve oral hygiene and keep breath smelling as fresh as possible. Tooth-brushing guidelines Frequency A 2008 review cites studies from 1969\u20131973Brushing at least every 48 hours: that gum and tooth health were maintained if brushing removed dental plaque more often than every 48 hours, and gum inflammation happened if brushing happened at intervals longer than 48 hours. The 2008 review noted that tooth brushing can remove plaque up to one millimeter below the gum line, and that each person has a habitual brushing method, so more frequent brushing does not cover additional parts of the teeth or mouth. Neem, which is used by South Indians in its full bloom, can aid in healing by keeping the area clean and disinfected. Dentists consider the extra abrasion of dentin from brushing multiple times per day to be insignificant, since modern toothpastes have relative dentin abrasivity below 250. A 1997 study simulated six months of brushing with manual or sonic toothbrushes. Neither caused observable wear of tooth surface or fillings. Both caused a small loss of cement at the edge of gold inlays. A 2017 study put composite fillings on both sides of extracted teeth. The study simulated seven years of brushing one side of each tooth with a sonic toothbrush, then measured microleakage around the fillings. No leakage was found at any bond between filling and enamel. At bonds between filling and cementum, there was sometimes leakage, and it happened to the same extent on the brushed sides of teeth and the unbrushed sides. When asked to brush \"to the best of their abilities , \" young adults brushed longer, but did not cover any additional parts of their mouths. They brushed especially long on the grinding surfaces of back teeth (occlusal), which are the prime location for cavities in young children, but not in adults, where sides are more prone to cavities. A 2005 review of dental studies found consensus that a thorough tooth brushing once a day is sufficient for maintaining oral health, and that most dentists recommended patients brush twice a day in the hope that more frequent brushing would clean more areas of the mouth. A 2018 review noted that tooth brushing is the most common preventive healthcare activity, but tooth and gum disease remain high, since lay people clean at most 40\\% of their tooth margins at the gum line. Videos show that even when asked to brush their best, they do not know how to clean effectively. Another 2018 study found that dental professionals did clean their teeth effectively. Proper technique Gargle clean, fresh water a couple of times and rinse the toothbrush with water . Standard advice is that the front and backs of teeth should be brushed with the toothbrush at a 45-degree angle towards the gum line, moving the brush in a back-and-forth rolling motion that makes contact with the gum line and tooth. To brush the backs of the front teeth , the brush should be held vertically to the tooth and moved in an up-and-down motion. The chewing surfaces of the teeth are brushed with a forward and back motion, with the toothbrush pointing straight at the tooth. Specialized advice for OralB rotating electric brushes is to follow the shape of each tooth and the gums, holding the brush against each tooth surface one at a time, for 1\u20132 seconds per tooth. Advice for Sonicare brushes is to use a slight angle, so longer bristles can reach between the teeth, making 3\u20135 small circles for 1\u20132 seconds on each tooth. Bristles conform to tooth shapes. Tooth brushing before breakfast/dinner One study found that brushing immediately after an acidic meal (such as diet soda or common breakfast foods like orange juice, citrus fruit, dried fruit, bread, or pastries) caused more damage to enamel and dentin compared to waiting 30 minutes. Flushing the acid away with water or dissolved baking soda could help reduce acid damage exacerbated by brushing. The same response was recommended for acid reflux and other acidic meals. Researchers and dentists have concluded that brushing immediately after consuming acidic beverages should be avoided. It is better to brush before breakfast or dinner. If brushing after a meal, wait at least a half hour after eating to prevent tooth damage. To protect tooth enamel, brushing immediately after waking is better than brushing after breakfast. If it is necessary to brush after breakfast, try to wait between 30 and 60 minutes before brushing. Brushing at any point in the morning is still better than skipping the step of brushing at all. %DIFDELCMD < %DIFDELCMD < %%% Toothbrush Head of a toothbrush A toothbrush is an instrument used to clean teeth, consisting of a small brush on a handle. Toothpaste, often containing fluoride, is commonly added to a toothbrush to aid in cleaning. Toothbrushes come in manual and electric varieties. Although there is conflicting evidence as to which is more effective, most evidence points to electric toothbrushes with an oscillatory motion being more effective than manual toothbrushes, with toothbrushes lacking an oscillatory motion being equivalent. A 2014 Cochrane review found moderate evidence that electric toothbrushes reduce plaque and gingivitis more than manual ones . Overall, both manual and electric toothbrushes are effective, however, and it is often recommended that people use whichever they feel comfortable with, determine is affordable for them , and will be more likely to regularly brush with. Toothbrushes are offered with varying textures of bristles, and come in many different forms and sizes. Most dentists recommend using a toothbrush labelled \"soft\", since firmer-bristled toothbrushes can damage tooth enamel and irritate gums as indicated by the American Dental Association. Toothbrushes are often made from synthetic fibers, although natural toothbrushes are also known in many parts of the world. Those with dentures may also brush their teeth with traditional toothbrushes , specially made denture brushes or denture cleaners. The first mass-produced toothbrush was made in England in 1780. While languishing in jail, William Addis decided to drill holes into a sheep's tibia, and pulled through the bristles of boar hair , creating a toothbrush. This gave him the idea to later mass-produce toothbrushes under the name Wisdom Toothbrushes. The company stayed family owned until 1996. Tooth powder (or 'toothpaste powder') is an alternative to toothpaste. It may be recommended for people with sensitive teeth. Tooth powder typically does not contain the chemical sodium lauryl sulphate , commonly used in toothpaste, which can be a skin irritant. The function of sodium lauryl sulphate is to form suds when teeth are brushed. Those with dentures may also use denture cleaner which can also come in powder form .", "edit_actions": [{"type": "R", "before": "As long", "after": "Teeth-cleaning twigs have long been used throughout human history. As long ago", "start_char_pos": 59, "end_char_pos": 66}, {"type": "A", "before": null, "after": "also", "start_char_pos": 250, "end_char_pos": 250}, {"type": "R", "before": "way of using tooth", "after": "method of using", "start_char_pos": 393, "end_char_pos": 411}, {"type": "R", "before": "is", "after": "was", "start_char_pos": 430, "end_char_pos": 432}, {"type": "R", "before": "describes", "after": "described", "start_char_pos": 491, "end_char_pos": 500}, {"type": "R", "before": "Monks", "after": "monks", "start_char_pos": 515, "end_char_pos": 520}, {"type": "D", "before": "\"Every day in the morning, a monk must chew a piece of tooth wood to brush his teeth and scrape his tongue, and this must be done in the proper way. Only after one has washed one's hands and mouth may one make salutations. Otherwise both the saluter and the saluted are at fault.", "after": null, "start_char_pos": 713, "end_char_pos": 992}, {"type": "D", "before": "In Sanskrit, the tooth wood is known as the dantakastha\u2014danta meaning tooth, and kastha, a piece of wood. It is twelve finger-widths in length. The shortest is not less than eight finger-widths long, resembling the little finger in size. Chew one end of the wood well for a long while and then brush the teeth with it.\"", "after": null, "start_char_pos": 993, "end_char_pos": 1312}, {"type": "R", "before": "Modern day toothbrushing as a", "after": "Modern-day tooth brushing as a", "start_char_pos": 1313, "end_char_pos": 1342}, {"type": "R", "before": "toothbrushing", "after": "tooth brushing", "start_char_pos": 1699, "end_char_pos": 1712}, {"type": "D", "before": "your", "after": null, "start_char_pos": 1852, "end_char_pos": 1856}, {"type": "R", "before": "upon your", "after": "up on", "start_char_pos": 1896, "end_char_pos": 1905}, {"type": "R", "before": "your", "after": "the", "start_char_pos": 1942, "end_char_pos": 1946}, {"type": "R", "before": "your", "after": "the", "start_char_pos": 1964, "end_char_pos": 1968}, {"type": "D", "before": "your", "after": null, "start_char_pos": 1999, "end_char_pos": 2003}, {"type": "R", "before": "your", "after": "the", "start_char_pos": 2072, "end_char_pos": 2076}, {"type": "R", "before": "your teeth elevates your", "after": "one's teeth elevates the", "start_char_pos": 2645, "end_char_pos": 2669}, {"type": "R", "before": "your", "after": "one's", "start_char_pos": 2834, "end_char_pos": 2838}, {"type": "R", "before": "The", "after": "the", "start_char_pos": 2886, "end_char_pos": 2889}, {"type": "R", "before": "bad smelling", "after": "bad-smelling", "start_char_pos": 3116, "end_char_pos": 3128}, {"type": "R", "before": "your teeth makes you especially prone to bad odors", "after": "one's teeth particularly increases the risk", "start_char_pos": 3218, "end_char_pos": 3268}, {"type": "D", "before": "your", "after": null, "start_char_pos": 3309, "end_char_pos": 3313}, {"type": "D", "before": "your", "after": null, "start_char_pos": 3382, "end_char_pos": 3386}, {"type": "D", "before": "your", "after": null, "start_char_pos": 3409, "end_char_pos": 3413}, {"type": "R", "before": "Toothbrushing", "after": "Tooth-brushing", "start_char_pos": 3452, "end_char_pos": 3465}, {"type": "R", "before": "1969-1973Brushing", "after": "1969\u20131973Brushing", "start_char_pos": 3520, "end_char_pos": 3537}, {"type": "R", "before": "toothbrushing", "after": "tooth brushing", "start_char_pos": 3784, "end_char_pos": 3797}, {"type": "D", "before": ",", "after": null, "start_char_pos": 4028, "end_char_pos": 4029}, {"type": "R", "before": "Relative Dentin Abrasivity", "after": "relative dentin abrasivity", "start_char_pos": 4246, "end_char_pos": 4272}, {"type": "A", "before": null, "after": ",", "start_char_pos": 4970, "end_char_pos": 4970}, {"type": "R", "before": "toothbrushing", "after": "tooth brushing", "start_char_pos": 5322, "end_char_pos": 5335}, {"type": "R", "before": "toothbrushing", "after": "tooth brushing", "start_char_pos": 5554, "end_char_pos": 5567}, {"type": "R", "before": "Take some clean, freshwater, put it in you mouth and gargle", "after": "Gargle clean, fresh water", "start_char_pos": 5934, "end_char_pos": 5993}, {"type": "R", "before": ". Grab your toothbrush and clean it once with waterafter that you can start with brushing", "after": "and rinse the toothbrush with water", "start_char_pos": 6012, "end_char_pos": 6101}, {"type": "R", "before": "45 degree", "after": "45-degree", "start_char_pos": 6200, "end_char_pos": 6209}, {"type": "R", "before": "back and forth", "after": "back-and-forth", "start_char_pos": 6260, "end_char_pos": 6274}, {"type": "A", "before": null, "after": ",", "start_char_pos": 6376, "end_char_pos": 6376}, {"type": "R", "before": "up and down", "after": "up-and-down", "start_char_pos": 6442, "end_char_pos": 6453}, {"type": "A", "before": null, "after": "brushes", "start_char_pos": 6805, "end_char_pos": 6805}, {"type": "A", "before": null, "after": "making 3\u20135 small circles", "start_char_pos": 6880, "end_char_pos": 6880}, {"type": "D", "before": "3-5 small circles in", "after": null, "start_char_pos": 6885, "end_char_pos": 6905}, {"type": "R", "before": "Toothbrushing", "after": "Tooth brushing", "start_char_pos": 6967, "end_char_pos": 6980}, {"type": "R", "before": "and", "after": "or", "start_char_pos": 7087, "end_char_pos": 7090}, {"type": "A", "before": null, "after": "or", "start_char_pos": 7167, "end_char_pos": 7167}, {"type": "R", "before": "the dentin ,", "after": "dentin", "start_char_pos": 7211, "end_char_pos": 7223}, {"type": "R", "before": "re-flux", "after": "reflux", "start_char_pos": 7413, "end_char_pos": 7420}, {"type": "R", "before": "Better", "after": "It is better", "start_char_pos": 7563, "end_char_pos": 7569}, {"type": "R", "before": "damage to your teeth. When you're looking to protect your", "after": "tooth damage.", "start_char_pos": 7683, "end_char_pos": 7740}, {"type": "A", "before": null, "after": "To protect", "start_char_pos": 7741, "end_char_pos": 7741}, {"type": "R", "before": "right after you wake up in the morning", "after": "immediately after waking", "start_char_pos": 7765, "end_char_pos": 7803}, {"type": "D", "before": "your teeth", "after": null, "start_char_pos": 7828, "end_char_pos": 7838}, {"type": "R", "before": "you have to brush your teeth", "after": "it is necessary to brush", "start_char_pos": 7859, "end_char_pos": 7887}, {"type": "R", "before": "you brush. Brushing", "after": "brushing. Brushing at any point", "start_char_pos": 7950, "end_char_pos": 7969}, {"type": "D", "before": ", whenever you're able to do it,", "after": null, "start_char_pos": 7985, "end_char_pos": 8017}, {"type": "D", "before": "your teeth", "after": null, "start_char_pos": 8069, "end_char_pos": 8079}, {"type": "R", "before": "toothbrushing", "after": "toothbrushes", "start_char_pos": 8704, "end_char_pos": 8717}, {"type": "R", "before": "the manual one", "after": "manual ones", "start_char_pos": 8757, "end_char_pos": 8771}, {"type": "D", "before": "one", "after": null, "start_char_pos": 8899, "end_char_pos": 8902}, {"type": "D", "before": "what", "after": null, "start_char_pos": 8941, "end_char_pos": 8945}, {"type": "A", "before": null, "after": ",", "start_char_pos": 8969, "end_char_pos": 8969}, {"type": "R", "before": "firmer bristled", "after": "firmer-bristled", "start_char_pos": 9189, "end_char_pos": 9204}, {"type": "R", "before": "tooth brushes", "after": "toothbrushes", "start_char_pos": 9497, "end_char_pos": 9510}, {"type": "R", "before": "mass produced", "after": "mass-produced", "start_char_pos": 9575, "end_char_pos": 9588}, {"type": "R", "before": ". Which he made into a toothbrushwhich", "after": ", creating a toothbrush. This", "start_char_pos": 9760, "end_char_pos": 9798}, {"type": "R", "before": "mass produce it on the outside", "after": "later mass-produce toothbrushes", "start_char_pos": 9820, "end_char_pos": 9850}, {"type": "R", "before": "They", "after": "The company", "start_char_pos": 9887, "end_char_pos": 9891}, {"type": "A", "before": null, "after": ", commonly used in toothpaste,", "start_char_pos": 10126, "end_char_pos": 10126}, {"type": "D", "before": "It is a common chemical in toothpaste.", "after": null, "start_char_pos": 10236, "end_char_pos": 10274}, {"type": "R", "before": "format", "after": "form", "start_char_pos": 10354, "end_char_pos": 10360}], "sents_char_pos": [0, 58, 177, 282, 381, 546, 659, 712, 861, 935, 992, 1098, 1136, 1230, 1312, 1417, 1503, 1767, 1838, 1921, 2018, 2135, 2249, 2586, 2788, 2872, 3030, 3135, 3270, 3451, 3756, 3990, 4110, 4283, 4364, 4425, 4488, 4558, 4698, 4759, 4917, 5057, 5257, 5528, 5733, 5830, 5916, 6337, 6461, 6591, 6784, 6932, 6966, 7255, 7369, 7444, 7562, 7606, 7704, 7855, 7960, 8241, 8334, 8386, 8642, 8773, 9018, 9122, 9308, 9432, 9564, 9628, 9761, 9886, 9923, 9994, 10049, 10156, 10235, 10274]}
+{"doc_id": "99514", "revision_depth": "2", "before_revision": "The Bushongo or Songora are an ethnic group from the Congo River and surrounding areas. The creator god (or chembe) in Bushongo mythology is called Bumba. Other names for him include M'Bombo and M'Bomba. He existed alone in darkness, in a universe consisting of nothing but primordial water. M'Bombo was said to appear like a gigantic man in form and white in color . The creation took place when he vomited the sun, moon, earth, plants, and animals and then humanity. Valencia College, URL His three sons, Modern influence Valencia College, on the creation myth, states:The dominant theme in this myth is that of creation out of the male principle. Bumba [M'Bombo]'s vomiting reminds us of the Egyptian High God's creation by spitting and seed spilling. The absence of the female principle here suggests a patrilineal culture. The fact that Bumba [M'Bombo] is white suggests that this is a late myth, affected, like so much African mythology, by the presence of the white race in colonial Africa.Thus Bushongo Mythology has been heavily influenced by modern cultures. References", "after_revision": "The Bushongo or Songora are an ethnic group from the Congo River and surrounding areas. The creator god (or chembe) in Bushongo mythology is called Bumba. Other names for him include M'Bombo and M'Bomba. He is said to have originally existed alone in darkness, in a universe consisting of nothing but primordial water. M'Bombo was said to appear like a gigantic man in form and white in colour . The creation took place when he vomited the sun, moon, animals and then humanity. Modern influence Valencia College, on the creation myth, states:The dominant theme in this myth is that of creation out of the male principle. Bumba [M'Bombo]'s vomiting reminds us of the Egyptian High God's creation by spitting and seed spilling. The absence of the female principle here suggests a patrilineal culture. The fact that Bumba [M'Bombo] is white suggests that this is a late myth, affected, like so much African mythology, by the presence of the white race in colonial Africa.Thus Bushongo mythology has been heavily influenced by modern cultures. Creation myth According to the Bushongo creation myth, the only thing that existed in the world originally was a god named M'Bombo. Having become ill, M'Bombo vomited: out the sun, the moon, the stars, various animals and Tsetse the lightning. Last of all, M'Bombo vomited out humans. The animals that M'Bombo had vomited out earlier created other animals. The three sons of M'Bombo attempted to finish the creation of the world. The first, Nyonye Ngana, made white ants but was not equal to the task and died as a result. The ants, however, thankful for life, went searching for black earth and covered the barren sands to bury and honour their creator. Chonganda, the second son, brought forth a plant from which all other plants in the world are descended. The third son, Chedi Bumba, only succeeded in creating the bird called the kite. Tsetse the lightning, proved to be a trouble-maker. Consequently, M'Bombo chased her into the sky, leaving mankind without fire until he later showed people how to draw fire out of trees. When the work of creation was completed, M'Bombo walked through the villages and said to the people, \"Behold these wonders, they belong to you\"Mircea Eliade, Gods. Goddesses, and Myths of creation (New York, 1974), pp. 91-92 References", "edit_actions": [{"type": "A", "before": null, "after": "is said to have originally", "start_char_pos": 207, "end_char_pos": 207}, {"type": "R", "before": "color", "after": "colour", "start_char_pos": 361, "end_char_pos": 366}, {"type": "D", "before": "earth, plants, and", "after": null, "start_char_pos": 424, "end_char_pos": 442}, {"type": "D", "before": "Valencia College, URL His three sons,", "after": null, "start_char_pos": 470, "end_char_pos": 507}, {"type": "R", "before": "Mythology", "after": "mythology", "start_char_pos": 1012, "end_char_pos": 1021}, {"type": "A", "before": null, "after": "Creation myth According to the Bushongo creation myth, the only thing that existed in the world originally was a god named M'Bombo. Having become ill, M'Bombo vomited: out the sun, the moon, the stars, various animals and Tsetse the lightning. Last of all, M'Bombo vomited out humans. The animals that M'Bombo had vomited out earlier created other animals.", "start_char_pos": 1070, "end_char_pos": 1070}, {"type": "A", "before": null, "after": "The three sons of M'Bombo attempted to finish the creation of the world. The first, Nyonye Ngana, made white ants but was not equal to the task and died as a result. The ants, however, thankful for life, went searching for black earth and covered the barren sands to bury and honour their creator. Chonganda, the second son, brought forth a plant from which all other plants in the world are descended. The third son, Chedi Bumba, only succeeded in creating the bird called the kite.", "start_char_pos": 1071, "end_char_pos": 1071}, {"type": "A", "before": null, "after": "Tsetse the lightning, proved to be a trouble-maker. Consequently, M'Bombo chased her into the sky, leaving mankind without fire until he later showed people how to draw fire out of trees.", "start_char_pos": 1072, "end_char_pos": 1072}, {"type": "A", "before": null, "after": "When the work of creation was completed, M'Bombo walked through the villages and said to the people, \"Behold these wonders, they belong to you\"Mircea Eliade, Gods. Goddesses, and Myths of creation (New York, 1974), pp. 91-92", "start_char_pos": 1073, "end_char_pos": 1073}], "sents_char_pos": [0, 87, 154, 203, 292, 368, 469, 650, 755, 828, 998, 1069]}